Difference between revisions of "Plausible Deniability and Cryptocurrency Privacy Workshop"

From HOPE Wiki
Jump to: navigation, search
Line 20: Line 20:
  
 
== Full Description ==
 
== Full Description ==
full description text goes here
+
Understand where information about your activity may be leaked, across the stack: hardware, software, protocol, and network. See case studies of how users were identified through their on-chain traces. Learn a framework for how to think about what parts of a transaction can be made private. Follow along as we demo tools to stay safe at a network level. We will also demo some privacy-centric wallets and cryptocurrency protocols.
  
  

Revision as of 06:03, 21 July 2022

Plausible Deniability and Cryptocurrency Privacy workshop

This workshop will be given:
   Day 1: Friday, 22-July-2022, 7:30pm - 10:30pm, Workshop A (D'Angelo 309)

NOTE: You do NOT need to register to take this workshop -- please show up early to ensure a seat at Workshop A (D'Angelo 309).


Abstract

Hackers around the world use cryptocurrencies like bitcoin and ether every day under the mistaken assumption that these networks are somehow privacy-preserving (often conflating pseudonymity for privacy). This couldn't be further from the truth, as it is in fact often easier to trace crypto transactions than fiat transactions. Even so-called private networks like Zcash and Monero aren't failsafe from a privacy perspective. However, with a few tricks and tools it is possible to preserve privacy on cryptographic networks in a robust way. This workshop will present a brief history of privacy successes and failures in cryptocurrency and blockchain with important case studies, will demonstrate tracing and de-anonymization of actual transactions in real time, and will present tools and techniques for guaranteeing strong privacy.


Presenter(s)

Lane Rettig
Michelle Lai
Arctic Byte
Ahmed Ghappour


Full Description

Understand where information about your activity may be leaked, across the stack: hardware, software, protocol, and network. See case studies of how users were identified through their on-chain traces. Learn a framework for how to think about what parts of a transaction can be made private. Follow along as we demo tools to stay safe at a network level. We will also demo some privacy-centric wallets and cryptocurrency protocols.


Registration -- NOT required

You do not need to register in advance to take this workshop -- just show up early to ensure a seat.:


Required Software

any required software goes here


What Participants Should Bring to the Workshop (if anything)

any optional or required stuff to bring go here


Links

any links go here