Difference between revisions of "Plausible Deniability and Cryptocurrency Privacy Workshop"

From HOPE Wiki
Jump to: navigation, search
Line 9: Line 9:
  
 
== Abstract ==
 
== Abstract ==
abstract text goes here
+
Hackers around the world use cryptocurrencies like bitcoin and ether every day under the mistaken assumption that these networks are somehow privacy-preserving (often conflating pseudonymity for privacy). This couldn't be further from the truth, as it is in fact often easier to trace crypto transactions than fiat transactions. Even so-called private networks like Zcash and Monero aren't failsafe from a privacy perspective. However, with a few tricks and tools it is possible to preserve privacy on cryptographic networks in a robust way. This workshop will present a brief history of privacy successes and failures in cryptocurrency and blockchain with important case studies, will demonstrate tracing and de-anonymization of actual transactions in real time, and will present tools and techniques for guaranteeing strong privacy.
  
  

Revision as of 16:01, 16 July 2022

Plausible Deniability and Cryptocurrency Privacy workshop

This workshop will be given:
   Day 1: Friday, 22-July-2022, 7:30pm - 10:30pm, Workshop A (D'Angelo 309)

NOTE: You do NOT need to register to take this workshop -- please show up early to ensure a seat at Workshop A (D'Angelo 309).


Abstract

Hackers around the world use cryptocurrencies like bitcoin and ether every day under the mistaken assumption that these networks are somehow privacy-preserving (often conflating pseudonymity for privacy). This couldn't be further from the truth, as it is in fact often easier to trace crypto transactions than fiat transactions. Even so-called private networks like Zcash and Monero aren't failsafe from a privacy perspective. However, with a few tricks and tools it is possible to preserve privacy on cryptographic networks in a robust way. This workshop will present a brief history of privacy successes and failures in cryptocurrency and blockchain with important case studies, will demonstrate tracing and de-anonymization of actual transactions in real time, and will present tools and techniques for guaranteeing strong privacy.


Presenter(s)

presenter name(s) go here


Full Description

full description text goes here


Registration -- NOT required

You do not need to register in advance to take this workshop -- just show up early to ensure a seat.:


Required Software

any required software goes here


Links

any links go here