Moneromooo, narrated by Syksy - Townforge (Remote)
An overview of the aspects of Townforge Video link: https://inv.nadeko.net/watch?v=1i6EgP8_AEU
An overview of the aspects of Townforge Video link: https://inv.nadeko.net/watch?v=1i6EgP8_AEU
An introduction to practicing anarchism from ab initio to real life. What is necessary to live free and why. How to build it and challenges in doing so.
Monero is the ideal cryptocurrency for building out circular and parallel economies which allow one to transact without a bank account or government ID. Monerica was created to answer the most important question one should ask about a cryptocurrency: what can I do with it? A discussion of Monerica can address why Monero is the best for real economic activity in a digital world, how one can practically live off Monero, and what attention this project has received since its inception in January 2022.
Following last year’s PocketChange, there’s a new Monerujo feature for the hardcore monerians to battle test, live! SideKick allows users to initiate transactions on their regular phone and then sign them on another spare phone that’s kept offline. It works as a hardware wallet, minus the closed source and the data leaks. This talk delves into the technical aspects of SideKick, explaining how it works and the reasoning behind some of the team’s design decisions and challenges.
We build all our systems under the assumption of opting-out of current countries, but if they are everywhere, covering every inch of available land, then where are we opting-out to? Let’s take a sincere look at what we already have and all the tools we’re still missing. Then embrace the unavoidable advantages of economies of scale while setting up better private foundations, built new systems on top of them, and become the founding fathers and mothers of a better future.
Electronic voting is hard. Really hard! Existing approaches to this problem make many tradeoffs, like leaking voter information or trusting voting authorities not to cheat. What we want is a way to conduct a vote electronically that respects voter privacy, allows anyone to verify the results are correct, and minimizes trust in voting and tallying authorities. This talk will introduce Aura, a voting protocol that meets these goals. Aura uses several privacy-respecting techniques (including some from private transaction protocols!) to do this. We’ll provide a high-level overview of how it works and why it’s useful. This talk should be accessible to everyone, and no particular technical background is assumed.
In the presentation, we detail the integration of confidential assets within the Zano blockchain. This initiative enables anonymous asset transfers and asset swaps (referred to as ‘Ionic swaps’) involving multiple asset types within a single transaction. Additionally, we will discuss how Confidential Assets are combined with Zarcanum, a Proof-of-Stake scheme, to facilitate egalitarian and anonymous staking with hidden amounts.
In an era where privacy concerns loom large and centralized platforms often fall short, the emergence of decentralized, secure chat systems offers a compelling alternative. We will explore how these technologies empower users to engage in confidential conversations without compromising their privacy. Through examples, we highlight the advantages and challenges of leveraging and adapting the decentralized Tari infrastructure to create a secure chat system.
SimpleX Chat (simplex.chat) is the messaging network based on the novel protocol design where users are not assigned any identities, not even random numbers. It allows users to communicate, privately and anonymously, over messaging relays. Unlike federated networks, where servers host users’ accounts, messaging relays are “dumb” - they use anonymous client generated credentials to provide disposable messaging queues, without knowing any users of the network. Unlike mix- and onion-routing networks, SimpleX relays don’t communicate directly with each other and don’t know about each other existence - clients’ themselves form a network. This unique design may provide a higher level of privacy and resilience than traditional federated and p2p network designs. Monero community has been very supportive of SimpleX Chat design and growth, as the values of privacy and protecting participant identities are shared. Evgeny, SimpleX Chat founder will also talk about the evolution of SimpleX Chat protocols, how it increased privacy and security since it launched, and also why it’s very important that privacy and security becomes a hygiene factor for mass-market technology solutions, and not a product category - real privacy is only possible in the network that is used by a large number of people.
Decentralization has been a pivotal term behind significant technological shifts, yet its essence and potential have often been obscured by its transformation into a buzzword. Satoshi Nakamoto’s vision with Bitcoin—to bypass traditional intermediaries—highlighted a path toward decentralization but did not fully avoid the emergence of new middlemen, underscoring the need for continuous engagement with decentralization’s principles. This presentation examines decentralization as a driver for participatory technology across networked commons, including hardware, web3, and geopolitics. It underscores the promise of fostering equitable and sustainable collaborations, juxtaposed against considerable challenges. The principle that “convenience always beats security” reflects a central tension in our digital era, emphasizing that true decentralization requires vigilant effort and adaptability. Monero exemplifies a decentralized community closely aligned with Nakamoto’s initial vision, prioritizing privacy and security to address Bitcoin’s shortcomings. This highlights the potential of decentralized models to faithfully implement foundational ideals. Furthermore, the digital tragedy of the commons, as illustrated by OpenAI’s mission to democratize AI, reveals the difficulty of aligning collective benefits with individual incentives within decentralized frameworks. This situation stresses the complexity of managing shared resources in harmony with decentralization’s ethos. The path toward effective decentralization is fraught with intricacies, advocating for a culture of continuous inquiry. As technology evolves, we stand at a critical juncture, tasked with reevaluating and reshaping control and collaboration mechanisms. Decentralization is not merely a process but a persistent challenge to conventional norms, aiming to create a digital ecosystem that upholds security, sovereignty, and the common good, even when convenience temporarily prevails. This journey demands optimism and scrutiny, reminding us that our digital future should reflect our highest values of equity, participation, and transparency.
This presentation analyzes the relation between the philosophical notion of privacy, its practical implementation in the domain of cryptocurrencies, and the Western regulatory financial environment. A libertarian (anarcho-capitalist, agorist) perspective is adopted. The ability of governments to extract resources from the economy depends on their ability to surveil it: property that is not seen by authorities cannot be taxed. Privacy-preserving cryptocurrencies such as Monero pose a special danger to the state because they allow buyers and sellers to interact directly without relying on regulated financial institutions, thus bolstering black (free) markets. It comes as no surprise, then, that regulators are cracking down on privacy-centric crypto projects, as shown by the Tornado Cash saga. Oddly enough, the clamp down on Tornado Cash elicited only a mild response in the cryptocurrency ecosystem. For example, the focus of proposals like Privacy Pools is on finding a practical equilibrium between the preservation of privacy and regulatory compliance without challenging the ability of the state to define the rules of the game. In order to understand why this appeasement strategy cannot work, a proper philosophical debate on the nature of privacy needs to be carried out. The main objective of this presentation is to investigate what kind of theoretical notion privacy is. Utilitarianism, privacy as a natural right, and privacy as a Kantian-Misesian a priori condition for the preservation of property rights are analyzed. Firstly, it is shown that utilitarian (relativistic) approaches do not work because they end up outsourcing the definition of privacy to the government; the powerful, not utilitarians, get to define the costs and benefits of privacy and surveillance. Secondly, the theory of privacy as a natural right is interesting because it does not depend on the arbitrary wishes of politicians and bureaucrats, but it is discarded because it is not compatible with libertarian reductionism, which correctly holds that property is the only natural right. Moreover, privacy is more of a fight than a right. Thirdly, the main proposal of this presentation is to understand privacy as a Kantian-Misesian a priori condition for the preservation of property: that privacy is required to safeguard property is an a priori truth that does not depend on empirical circumstances. This proposal is coherent with libertarian reductionism because privacy is not interpreted as a natural right; in parallel, it is superior to utilitarianism because the a priori status of privacy protects it from human arbitrariness. While the origin of a priori notions is not empirical, their use is: privacy cannot but impact how the acting man protects real-world property and interacts with fellow human beings. The Kantian-Misesian approach leads to the rejection of self-defeating appeasement strategies and to the adoption of a much more effective adversarial mindset.
An overview of the different moving parts at work behind the BasicSwap DEX protocol, the vision for the project, and exploring how BasicSwap can power a better and more resilient future for XMR, free of central points of failure.
This talk will be an introduction and overview for Serai, a decentralized exchange which will support Monero at launch.
We study blockchain-based provably anonymous payment systems between light clients. Such clients interact with the blockchain through full nodes, who can see what the light clients read and write. The goal of our work is to enable light clients to perform anonymous payments, while maintaining privacy even against the full nodes through which they interact with the blockchain. We formalize the problem in the universal composability model and present a provably secure solution to it. In comparison to existing works, we are the first ones that simultaneously provide strong anonymity guarantees, provable security, and anonymity with respect to the full nodes. Along the way, we make several contributions that may be of independent interest. We define and construct efficient compressible randomness beacons, which produce unpredictable values in regular intervals and allow for storing all published values in a short digest. We define and construct anonymous-coin friendly encryption schemes and we show how they can be used within anonymous payment systems. We define and construct strongly oblivious read-once map, which can be seen as a special data structure that needs to satisfy a stronger notion of obliviousness than what is usually considered. We present a new approach, which is compatible with light clients, for mitigating double- spending attacks in anonymous cryptocurrencies.
New updates to the Jamtis addressing protocol would allow for a tier of light wallets with even greater privacy guarantees and scaling benefits. Before these changes, light wallet servers could tell a client received funds if those funds were sent twice to the same Jamtis address. They could also tell if a client received funds if those funds were sent to a Jamtis address known to the light wallet server. Finally, a light wallet server could identify churning and pocket-change style transactions of the client with high probability. Recent developments to Jamtis fix all those privacy issues, hopefully paving the way for (almost) totally non-deterministic light wallet implementations. In addition to privacy boosts, the addition of “flexible view-tags” provide the ability for the community to react to scaling concerns regarding light wallets, adjusting the balance between privacy and computation demands, without requiring network updates. We discuss the pros/cons of these changes in detail, what is theoretically still left to solve, as well as how these changes could enable real-world use cases.
How does privacy advocacy work in crypto? Web3Privacy Now core team will share a complex overview on key challenges facing privacy advocacy broad range of market actors contributing to privacy share insights on how enthusiasts, projects, and ecosystem players could scale privacy advocacy & empower critical knowledge infra provide W3PN ecosystem outlook from privacy-focused community building to data-driven Explorer project scoring 600+ privacy services
Bity.com is one of the oldest crypto brokers in Switzerland (selling XMR on its ATMs). In front of the Federal Administrative Tribunal, it is suing the Swiss regulator FINMA for a claimed illegal implementation of two FATF rules, the identification limit of 1000 CHF per month (1) and the Travel Rule (2). In both cases, FINMA went beyond what FATF requested, and implemented this through a soft power mechanism that removes the need for the parliament to intervene. The talk will describe how FINMA operates and what is the status of the cases. This case is novel, because it is the first crowdfunded, transparent case against the regulator pushed by the crypto-community. All documents and the crowdfunding (also in XMR) are available here: btcpay.nymte.ch/apps/2aks2XSx8ogQFc2CPuKVben8KNcP/crowdfund
This presentation explores innovative strategies for developing permissionless peer-to-peer networks that prioritize privacy. It delves into mechanisms for preserving user anonymity while implementing effective rate limiting solutions to ensure network efficiency and security.
Tari allows smart contract developers to choose a level of confidentiality for their use case, ranging from none to strong. In this talk we’ll go through each of the levels and what the trade-offs are.
Smart contracts are a frequent request for Monero, yet have significant questions about privacy, efficiency, and complexity. Any VM would have several pages for its specification, with opcodes debatable for years. The denial of service risk would threaten Monero’s stability, and the lack of privacy seen with most VMs would be unacceptable. This talk will establish and go over a potential evolution for the protocol, where smart contracts are expressed in algebraic terms (creating a pure specification) and evaluated in constant time (being without a denial of service risk) while maintaining privacy of the contract code, inputs, and execution without a trusted setup.
Going to provide a talk on returning to cypher punk values and discarding the crypto casino mentality. I will explain what “cypherpunk” means and why the crypto casino does not align with those anti-establishment and anti-authoritarian values. In the second part of the talk, I will discuss the importance of developing a “dark forest” infrastructure, a la Dark Fi, and how to protect ourselves as we push forward for greater and greater freedom, both online and in the meat space. In the final part of the talk, I will discuss what the unification of all “punk” values could look like and why this type of unification is critical.
As far as the political spectrum is concerned, the libertarians and (crypto)anarchists, who have believed in crypto as non-state money from the beginning, are currently the ones who are (and will be) the richest thanks. Rich people can change society the most thanks to capital. Does the fact that crypto is going to the moon mean that there will be many rich and influential libertarians (like never before) and society will become more free because of it? Will the new rich and powerful libertarians and (crypto)anarchists save the world from dystopia?
The current regulatory environment provides serious challenges to the privacy offered by Monero. This can range from Blockchain Surveillance companies making false accusations to the risk of Flood XMR attacks in an attempt to de-anonimize Monero’s ring signatures. The ultimate goal is to remove even the illusion of Blockchain Surveillance. This will require full membership proofs together with a sizable growth in organic Monero adoption. The larger the organic growth the stronger the anonymity set. We will provide a comprehensive set of scaling and fee algorithms that will support a reference transaction size of up to 8000 bytes. This will support the estimated 2 in 2 out transaction size for full membership proofs of approximately 5500 bytes and will even support a ring size of up to 64 using the current proofs as an interim measure. This will further harden the network against Flood XMR by lowering the ratio between the minimum penalty free zone and reference transaction size from 100x to 50x, and by more tightly pricing the growth of the short term median by reducing the surge of the short term median over the long term median from 50x to 16x, while at the same time transferring the growth to the tightly priced long term median. The latter rate of growth will increase from 1.7x to 2x. In addition an ultra long term median of 1,000,000 blocks will be proposed that will cap the overall growth of the network to Nielsen’s Law of Internet Bandwidth for a high end consumer or small business upload Internet connection.
We’ll review recent progress on FFT’s from these papers that enables fast FFT’s over Fp when a large power of two divides p+1. There is recent excitment about this because it enables using very convenient Mersenne prime fields of order 2^k-1
This talk will give a brief history of what free and open source software (FOSS) really means and how the term(s) originated. After covering the high level milestones in the history of this nascent movement, I will try to cover how Monero fits in to this landscape in terms of the ways that Monero software is licensed as well as contributions it has made back to the wider ecosystem.
Monero addresses are already long and unwieldy, and they’re about to get longer with Jamtis. Namecoin is a DNS-like naming system implemented as the first project forked from Bitcoin, predating Monero by 3 years to the day. This talk will cover using Namecoin as a human-meaningful naming layer for Monero addresses, recent anonymity advances that make Namecoin’s privacy more suitable for this use case, how OpenAlias fits in, and how Namecoin compares to the MoneroDNS approach of creating a Monero sidechain for this purpose.
Overview of DarkFi: The coming war on crypto, and how it will undermine states Breakthroughs in cryptography and anonymous smart contracts. DarkFi’s plan to merge mine on Monero Overview of the ecosystem
Zero-knowledge proofs (ZKPs) have evolved from being a theoretical concept providing privacy and verifiability to having practical, real-world implementations, with SNARKs (Succinct Non-Interactive Argument of Knowledge) emerging as one of the most significant innovations. Prior work has mainly focused on designing more efficient SNARK systems and providing security proofs for them. Many think of SNARKs as “just math,” implying that what is proven to be correct and secure is correct in practice. In contrast, this paper focuses on assessing end-to-end security properties of real-life SNARK implementations. We start by building foundations with a system model and by establishing threat models and defining adversarial roles for systems that use SNARKs. Our study encompasses an extensive analysis of 141 actual vulnerabilities in SNARK implementations, providing a detailed taxonomy to aid developers and security researchers in understanding the security threats in systems employing SNARKs. Finally, we evaluate existing defense mechanisms and offer recommendations for enhancing the security of SNARK-based systems, paving the way for more robust and reliable implementations in the future.
Monero is expected to evolve to Seraphis, adopt JAMTIS as our new address scheme, and even adopt Full Chain Membership Proofs for complete sender privacy. All of these rely on Elliptic Curve Cryptography, with the most notable construction being the curve cycle (an elliptic curve whose scalar field embeds the field of an elliptic curve whose scalar field is the original curve’s field) proposed. This talk will go over alternate cryptographic schemes which can offer a more performant membership proof, decrease the storage requirements of Monero, eliminate the need to iteratively scan transactions for near-instant scan times, and increase privacy for users who don’t run their own nodes.
This talk is an introduction to Elliptic Curve Cryptography (ECC). Attendees are expected to have a basic to intermediate understanding of the field. To begin, we will cover the basic principles of asymmetric cryptography. We then discuss ECC curves and security, along with a comparison of asymmetric non-ECC with ECC. Finally, we will cover the mathematical principles behind ECC, including the fundamental mathematical operations, and how elliptic curves are applied in Monero’s cryptographic mechanisms. Email for questions: compunerophd@proton.me
When we look at cryptographic protocols like CLSAG and Bulletproofs and Triptych and Seraphis, we often talk about things like security models and proofs. But what does this mean? In this talk, we’ll take a brief look at what it means to build a secure cryptographic protocol and analyze it. Taking a Monero-centric approach, we’ll introduce the idea of a security model and use examples from the Monero ecosystem to show why it’s an important part of analyzing these constructions. This talk will be accessible to everyone, and will provide a broad look at what cryptographers do behind the scenes to keep Monero safe and secure.
For many of us, self-custody is “the way” of securing our crypto-assets. “True hodlers” keep their crypto stack for the long run, on their own. But one day, when you are “at rest” your crypto will pass to your family or closed ones. Would they know how to get your crypto? In our talk, we will examine potential challenges and risks that can affect self-custody holders and their loved ones who may like to inherit their stack in the future. How can I pass on my heritage securely? And what is important to keep in mind? Let´s find out!
This talk will go over the newly discussed Full Chain Membership Proofs++ protocol, evolving Full Chain Membership Proofs into an upgrade independent of Seraphis and its associated migration.
Bulletproofs++ is a new transparent confidential transaction protocol based on the Bulletproofs inner product argument. It features shorter proof sizes and much faster verification complexity. It also supports efficient multi-asset confidential transactions. This is all made possible by a novel “reciprocal argument” (also known as log derivative lookup).
Cypherpunks were creating a parallel universe of liberty. They were using anonymous communication, encryption, to gain a new territory of liberty. With Bitcoin switching partly to NgU narrative, is Monero taking over the helm of the ship of liberty? And where are we going? Did we solve the technical challenges, or do we have to develop further? And of course …what do we do about the normies? Can they come in? Join me in this cypherpunk/lunarpunk journey.