Plausible Deniability and Cryptocurrency Privacy Workshop: Difference between revisions

From HOPE Wiki
No edit summary
No edit summary
 
Line 6: Line 6:
<span style="color:orange">'''NOTE:  You do NOT need to register to take this workshop -- please show up early to ensure a seat at Workshop A (D'Angelo 309).'''<br>
<span style="color:orange">'''NOTE:  You do NOT need to register to take this workshop -- please show up early to ensure a seat at Workshop A (D'Angelo 309).'''<br>
<br>
<br>
== Abstract ==
Hackers around the world use cryptocurrencies like bitcoin and ether every day under the mistaken assumption that these networks are somehow privacy-preserving (often conflating pseudonymity for privacy). This couldn't be further from the truth, as it is in fact often easier to trace crypto transactions than fiat transactions. Even so-called private networks like Zcash and Monero aren't failsafe from a privacy perspective. However, with a few tricks and tools it is possible to preserve privacy on cryptographic networks in a robust way. This workshop will present a brief history of privacy successes and failures in cryptocurrency and blockchain with important case studies, will demonstrate tracing and de-anonymization of actual transactions in real time, and will present tools and techniques for guaranteeing strong privacy.


== Presenter(s) ==
== Presenter(s) ==
Line 18: Line 13:
Ahmed Ghappour
Ahmed Ghappour


== Abstract ==
Hackers around the world use cryptocurrencies like bitcoin and ether every day under the mistaken assumption that these networks are somehow privacy-preserving (often conflating pseudonymity for privacy). This couldn't be further from the truth, as it is in fact often easier to trace crypto transactions than fiat transactions. Even so-called private networks like Zcash and Monero aren't failsafe from a privacy perspective. However, with a few tricks and tools it is possible to preserve privacy on cryptographic networks in a robust way. This workshop will present a brief history of privacy successes and failures in cryptocurrency and blockchain with important case studies, will demonstrate tracing and de-anonymization of actual transactions in real time, and will present tools and techniques for guaranteeing strong privacy.


== Full Description ==
== Workshop Agenda ==
Understand where information about your activity may be leaked, across the stack: hardware, software, protocol, and network.<br/>
Understand where information about your activity may be leaked, across the stack: hardware, software, protocol, and network.<br/>
See case studies of how users were identified through their on-chain traces.<br/>
See case studies of how users were identified through their on-chain traces.<br/>

Latest revision as of 06:08, 21 July 2022

Plausible Deniability and Cryptocurrency Privacy workshop

This workshop will be given:
   Day 1: Friday, 22-July-2022, 7:30pm - 10:30pm, Workshop A (D'Angelo 309)

NOTE: You do NOT need to register to take this workshop -- please show up early to ensure a seat at Workshop A (D'Angelo 309).

Presenter(s)

Lane Rettig
Michelle Lai
Arctic Byte
Ahmed Ghappour

Abstract

Hackers around the world use cryptocurrencies like bitcoin and ether every day under the mistaken assumption that these networks are somehow privacy-preserving (often conflating pseudonymity for privacy). This couldn't be further from the truth, as it is in fact often easier to trace crypto transactions than fiat transactions. Even so-called private networks like Zcash and Monero aren't failsafe from a privacy perspective. However, with a few tricks and tools it is possible to preserve privacy on cryptographic networks in a robust way. This workshop will present a brief history of privacy successes and failures in cryptocurrency and blockchain with important case studies, will demonstrate tracing and de-anonymization of actual transactions in real time, and will present tools and techniques for guaranteeing strong privacy.

Workshop Agenda

Understand where information about your activity may be leaked, across the stack: hardware, software, protocol, and network.
See case studies of how users were identified through their on-chain traces.
Learn a framework for how to think about what parts of a transaction can be made private.
Follow along as we demo tools to stay safe at a network level.
We will also demo some privacy-centric wallets and cryptocurrency protocols.

Registration -- NOT required

You do not need to register in advance to take this workshop -- just show up early to ensure a seat.:

What Participants Should Bring to the Workshop (if anything)

If you'd like, bring a laptop with a browser wallet funded with some change.