Monero
From Wikipedia, the free encyclopedia
Jump to navigationJump to search
This article is about the cryptocurrency. For other uses, see Monero (disambiguation).
Monero
Monero-Logo.svg
Denominations
Ticker symbol XMR
Precision 10−12
Subunits
1⁄1012 piconero
Development
Original author(s) Nicolas van Saberhagen
White paper "CryptoNote v 2.0"
Initial release 18 April 2014 (6 years ago)
Latest release 0.17.1.7 / 15 December 2020 (43 days ago)
Code repository github.com/monero-project
Development status Active
Written in C++
Operating system Android, Windows, Linux, macOS, FreeBSD, Solaris
Source model Open source
License MIT License
Website getmonero.org
Ledger
Timestamping scheme Proof of work
Hash function RandomX
Block reward 1.26 XMR
Block time 2 minutes
Block explorer xmrchain.net
Circulating supply 17,788,189
Monero (/məˈnɛroʊ/; XMR) is a privacy-focused cryptocurrency released in 2014. It is an open-source protocol based on CryptoNote. It uses an obfuscated public ledger, meaning anyone can send or broadcast transactions, but no outside observer can tell the source, amount, or destination. A proof of work mechanism is used to issue new coins and incentivize miners to secure the network and validate transactions.
Monero uses different privacy-enhancing technologies to achieve anonymity and fungibility. It has attracted users desiring privacy measures that are not provided in more popular cryptocurrencies. However, it has also gained publicity for illicit use in darknet markets.
Contents
1 History
2 Privacy features
2.1 Ring signatures
2.2 Stealth addresses
2.3 Bulletproofs
2.4 Dandelion++
3 Mining
4 Transaction linkability
5 Regulatory responses
6 References
7 External links
History
In 2014, Bitcointalk forum user thankful_for_today forked the codebase of Bytecoin into the name BitMonero, which is a compound of bit (as in Bitcoin) and monero (literally meaning "coin" in Esperanto). The release of BitMonero was poorly received by the community that initially backed it. Plans to fix and improve Bytecoin with changes to block time, tail emission, and block reward had been ignored, and thankful_for_today simply disappeared from the development scene. A group of users led by Johnny Mnemonic decided that the community should take over the project, and five days later they did while also changing the name to Monero.
Due to its privacy features, Monero experienced rapid growth in market capitalization and transaction volume during 2016, much more than any other cryptocurrency that year. This growth was driven by its uptake in the darknet market, where people used it to buy stolen credit cards, guns, and drugs. Two major darknet markets were shut down in July 2017 by law enforcement. From the beginning, Monero has been used by people holding other cryptocurrencies like Bitcoin to break the link between transactions, with the other cryptocoins first converted to Monero, then after some delay converted back and sent to an address unrelated to those used before.
On 10 January 2017, the privacy of Monero transactions was further strengthened by the adoption of Bitcoin Core developer Gregory Maxwell's algorithm Confidential Transactions, hiding the amounts being transacted, in combination with an improved version of Ring Signatures.
After many online payment platforms shut down access for white nationalists following the Unite the Right rally in 2017, some of them, including Christopher Cantwell and Andrew Auernheimer ("weev"), started using and promoting Monero.
The operators behind the May 2017 global ransomware incident WannaCry converted their proceeds into Monero. In June 2017, The Shadow Brokers, the group that leaked the code used in WannaCry, started accepting payments in Monero.
Malicious hackers have previously embedded Monero mining code into websites and apps seeking profit for themselves. In late 2017, malware and antivirus service providers blocked a JavaScript implementation of Monero miner Coinhive that was embedded in websites and apps, in some cases by hackers. Coinhive generated the script as an alternative to advertisements; a website or app could embed it, and use website visitor's CPU to mine the cryptocurrency while the visitor is consuming the content of the webpage, with the site or app owner getting a percentage of the mined coins. Some websites and apps did this without informing visitors, and some hackers implemented it in way that drained visitors' CPUs. As a result, the script was blocked by companies offering ad blocking subscription lists, antivirus services, and antimalware services.
In January 2018, Bloomberg suggested the hackers who stole approximately 500 million NEM tokens ($530 million) from Coincheck would find it challenging to launder them by selling them for Monero since at least one exchange, ShapeShift, had blocked NEM addresses associated with the theft.
In the first half of 2018, Monero was used in 44% of cryptocurrency ransomware attacks.
In November 2018, Bail Bloc released a mobile app that mines Monero to raise funds for low-income defendants who cannot otherwise cover their own bail.
Privacy features
Monero GUI 0.12.3.0 on Windows 10
Monero enforces privacy by default. It uses different technologies that complement each other to achieve anonymity and fungibility. It aims to meet two criteria: untraceability (having multiple possible senders for a transaction) and unlinkability (being unable to prove that multiple transactions were sent to the same person). Untraceability protects the sender with ring signatures, while unlinkability protects the receiver with stealth addresses.
Ring signatures
Monero is based on the CryptoNote protocol, which deploys one-time ring signatures as the core cryptographic primitive to provide anonymity. Ring Confidential Transactions (RingCTs), a variant of linkable ring signatures, were implemented on 10 January 2017. RingCTs have two components. The first is Multilayered Linkable Spontaneous Anonymous Group (MLSAG) ring signatures, which obfuscate the sender of a transaction. The second is Confidential Transactions (CTs), which use the Pedersen commitment to hide transaction amounts.
Stealth addresses
Monero generates one-time stealth addresses to hide the address of the recipient using the Dual-Key Stealth Address Protocol (DKSAP). It is generated by the sender on behalf of the recipient using two pieces of information. The first is a shared secret produced by the elliptic-curve Diffie–Hellman (ECDH) key agreement. The second is the public key of the recipient who actively scans the blockchain, detects if a transaction is intended for their address, and recovers the private key for this one-time public key to access the funds.
Bulletproofs
In October 2018, Monero implemented bulletproofs, a non-interactive zero-knowledge proof (NIZKP) protocol. It replaced the Borromean ring signatures used in RingCT's range proofs. Bulletproofs substantially reduced the size of transactions, resulting in faster verification times and lower fees.
Dandelion++
Monero uses an unusual method of transaction broadcast propagation to obscure the IP address of the device broadcasting the transaction. The signed transaction is initially passed to only one node and a probablistic method is used to determine when a new signed transaction should be broadcast to all nodes as normal.
Mining
Monero is designed to be resistant to application-specific integrated circuit (ASIC) mining, which is commonly used to mine other cryptocurrencies such as Bitcoin. It can be mined somewhat efficiently on consumer grade hardware such as x86, x86-64, ARM and GPUs, and as a result it is popular among malware-based miners.
Monero introduced the RandomX proof of work algorithm in November 2019 to further increase resistance to ASIC mining.
Transaction linkability
In April 2017, researchers highlighted three major threats to Monero users' privacy. The first relies on leveraging the ring signature size of zero, and ability to see the output amounts. The second, "Leveraging Output Merging", involves tracking transactions where two outputs belong to the same user, such as when they send funds to themselves ("churning"). Finally, "Temporal Analysis", shows that predicting the right output in a ring signature could potentially be easier than previously thought. The Monero development team responded that they had already addressed the first concern with the introduction of RingCTs in January 2017, as well as mandating a minimum size of ring signatures in March 2016.
In 2018, researchers presented possible vulnerabilities in a paper titled "An Empirical Analysis of Traceability in the Monero Blockchain". The Monero team responded in March 2018.
Regulatory responses
Monero and other privacy-oriented currencies have concerned regulators targeting illicit activities and money laundering. Exchanges in South Korea and Australia have delisted Monero and other privacy coins due to regulatory pressure. In September 2020, the IRS Criminal Investigation (IRS-CI) division offered up to $625,000 to contractors who can trace transactions or provide statistical probabilities that connect transaction data to specific users in Monero or Bitcoin's Lightning Network. On 30 September, the IRS awarded one-year contracts to data analysis firms Integra FEC and Chainalysis.
ethereum ico
Other free open source libraries have also been successful within a corporate setting. Bloomberg LP uses and contributes code back to the open source Apache Lucene and Apache Solr projects, which are critical for search functions in its Terminal. BSD, another open source Unix derivative, was the basis for macOS and iOS. Google’s Android is based on Linux.ethereum pool bitcoin linux bitcoin scrypt ethereum web3 bitcoin shop bit bitcoin monero график bitcoin вконтакте
bitcoin calc bitcoin видеокарты bitcoin onecoin ico bitcoin torrent bitcoin кошельки ethereum
bitcoin kran 15 bitcoin monero spelunker bitcoin icons фото bitcoin аккаунт bitcoin заработок bitcoin trade bitcoin
java bitcoin токен ethereum bitcoin mempool bitcoin 99 secp256k1 bitcoin bitcoin аналоги bitcoin fx anomayzer bitcoin кошелек ethereum win bitcoin ethereum github bitcoin auto bitcoin терминалы bitcoin видеокарта bitcoin вирус bitcoin конвертер цена bitcoin bitcoin de цена ethereum gps tether python bitcoin bitcoin фарм tether android genesis bitcoin
bitcoin telegram pizza bitcoin форум bitcoin bitcoin euro up bitcoin mine ethereum bitcoin доходность bitcoin продать перспектива bitcoin bitcoin redex monero core bitcoin технология roll bitcoin top bitcoin bitcoin вконтакте bitcoin dark
разработчик ethereum tether верификация ann ethereum проверить bitcoin дешевеет bitcoin ethereum address donate bitcoin bitcoin япония bitcoin комиссия gift bitcoin bitcoin подтверждение tether отзывы bitcoin cudaminer bitcoin foto monero вывод bubble bitcoin bitcoin payment
обмен ethereum bitcoin bit bitcoin шахты bitcoin депозит bitcoin pdf bitcoin atm bitcoin халява api bitcoin видео bitcoin As an analogy, think of the popular Microsoft Excel spreadsheet program. You can make changes to the data on your own that may differ from earlier versions of the spreadsheet that are shared with others. But if you make changes to a Google Sheets document, on the other hand, those changes also show up in every other shared copy. Similarly, the shared and distributed nature of cryptocurrencies keeps everyone on the same page.Cryptocurrencies fall under the banner of digital currencies, alternative currencies and virtual currencies. They were initially designed to provide an alternative payment method for online transactions. However, cryptocurrencies have not yet been widely accepted by businesses and consumers, and they are currently too volatile to be suitable as methods of payment. As a decentralised currency, it was developed to be free from government oversite or influence, and the cryptocurrency economy is instead monitored by peer-to-peer internet protocol. The individual units that make up a cryptocurrency are encrypted strings of data that have been encoded to represent one unit.china bitcoin view bitcoin bitcoin cudaminer maps bitcoin bitcoin игры
bitcoin auto bitcoin traffic java bitcoin
dice bitcoin bitcoin математика coffee bitcoin bitcoin dice bitcoin china майнер monero почему bitcoin blogspot bitcoin пулы bitcoin widget bitcoin bitcoin развод However, if you don’t need your blockchain, you can just create a token. This way, rather than building your blockchain, you can just build an app that runs on an existing blockchain — like Ethereum or NEO.Dollars are fungible and uniform, that’s good. They are transportable, perhaps even more easily then gold. They have a high value-to-weight ratio. They’re fairly easy to divide and recombine. Looking pretty good so far. But what else?bitcoin p2p trade cryptocurrency bitcoin php алгоритмы ethereum bitcoin friday bitcoin half bitcoin расчет bitcoin earnings оплата bitcoin
tether usb инструкция bitcoin bitcoin значок bitcoin change bitcoin ne bitcoin sberbank bitcoin main калькулятор monero ethereum краны 6000 bitcoin bitcoin brokers ethereum crane bitcoin ocean казино ethereum bitcoin vector bitcoin spin bitcoin приложение ethereum stats ethereum 4pda cz bitcoin blake bitcoin config bitcoin мониторинг bitcoin bitfenix bitcoin bitcoin hunter x bitcoin
bitcoin girls project ethereum прогноз ethereum india bitcoin tether 2 bitcoin apk виджет bitcoin bitcoin mac ethereum кошелек bitcoin roulette matrix bitcoin golden bitcoin wechat bitcoin logo ethereum ethereum обменники kinolix bitcoin ethereum mist facebook bitcoin bitcoin сети bitcoin status
bitcoin eu ethereum mine bitcoin войти loan bitcoin bitcoin кран tether обменник майнить ethereum bitcoin course bitcoin talk bitcoin site cryptocurrency mining bitcoin datadir bitcoin халява trade cryptocurrency ethereum биржа bitcoin создатель продаю bitcoin bitcoin котировки
обмена bitcoin bitcoin metatrader bitcoin bank реклама bitcoin сбербанк bitcoin
ethereum investing monero rur bitcoin сервера bitcoin download Monero generates one-time stealth addresses to hide the address of the recipient using the Dual-Key Stealth Address Protocol (DKSAP). It is generated by the sender on behalf of the recipient using two pieces of information. The first is a shared secret produced by the elliptic-curve Diffie–Hellman (ECDH) key agreement. The second is the public key of the recipient who actively scans the blockchain, detects if a transaction is intended for their address, and recovers the private key for this one-time public key to access the funds.server bitcoin mainer bitcoin bitcoin 4096 запросы bitcoin polkadot su ethereum видеокарты bitcoin online bitcoin vizit dollar bitcoin bitcoin рбк bitcoin торговля locate bitcoin bitcoin signals bitcoin расчет
global bitcoin
hacking bitcoin
bux bitcoin сеть bitcoin обменники bitcoin tether usd bitcoin node
currency bitcoin история ethereum кошелька ethereum bitcoin оборот количество bitcoin bitcoin работать credit bitcoin ethereum coin ethereum developer bitcoin расчет bitcoin xyz love bitcoin bitcoin платформа locate bitcoin bitcoin gambling
bitcoin ira
майнить ethereum third party. Transactions that are computationally impractical to reverse would protect sellersethereum myetherwallet майнер ethereum aliexpress bitcoin
bitcoin antminer разработчик ethereum bitcoin lurkmore bitcoin лайткоин кредиты bitcoin ecdsa bitcoin claim bitcoin clame bitcoin poloniex ethereum ethereum алгоритм bitcoin airbit
coin bitcoin ethereum siacoin баланс bitcoin monero майнинг кости bitcoin ethereum ios raiden ethereum calculator bitcoin ethereum gas txid bitcoin bitcoin up bitcoin cfd bitcoin wallpaper платформ ethereum ethereum gold half bitcoin ios bitcoin wired tether bitcoin landing bitcoin ферма fork bitcoin монета ethereum
direct bitcoin bitcoin бесплатный prune bitcoin ethereum rig pump bitcoin
monero сложность майнинг bitcoin bitcoin компьютер bitcoin daily server bitcoin geth ethereum bitcoin instant
bitcoin protocol кредиты bitcoin bye bitcoin top bitcoin The mechanism behind proof of work was a breakthrough in the space because it simultaneously solved two problems. First, it provided a simple and moderately effective consensus algorithm, allowing nodes in the network to collectively agree on a set of canonical updates to the state of the Bitcoin ledger. Second, it provided a mechanism for allowing free entry into the consensus process, solving the political problem of deciding who gets to influence the consensus, while simultaneously preventing sybil attacks. It does this by substituting a formal barrier to participation, such as the requirement to be registered as a unique entity on a particular list, with an economic barrier - the weight of a single node in the consensus voting process is directly proportional to the computing power that the node brings. Since then, an alternative approach has been proposed called proof of stake, calculating the weight of a node as being proportional to its currency holdings and not computational resources; the discussion of the relative merits of the two approaches is beyond the scope of this paper but it should be noted that both approaches can be used to serve as the backbone of a cryptocurrency.bitcoin help When to Use Cold StorageEducation (like BitDegree!)bitcoin alliance ethereum eth bitcoin goldmine cryptonator ethereum bitcoin заработок фри bitcoin зарабатывать bitcoin network bitcoin bitcoin лотереи bitcoin пузырь usb tether bitcoin earning котировка bitcoin bitcoin робот терминалы bitcoin bitcoin пополнить reverse tether 2018 bitcoin ethereum faucets Professor Nouriel Roubini of New York University has called bitcoin the 'mother of all bubbles', writing that the underlying blockchain technology has 'massive obstacles standing in its way', including a lack of 'common and universal protocols' of the kind that enabled the early Internet. According to Roubini, bitcoin has failed as a unit of account, a means of payment, and as a store of value; he calls the claim that bitcoin cannot be debased 'fraudulent'. 'Scammers, swindlers, charlatans, and carnival barkers (all conflicted insiders) have tapped into clueless retail investors' FOMO ('fear of missing out'), and taken them for a ride,' he writes.bitcoin 2048 status bitcoin 'Oh, tanstaafl. Means there ain’t no such thing as a free lunch. And isn’t,' I added, pointing to a FREE LUNCH sign across room, 'or these drinks would cost half as much. Was reminding her that anything free costs twice as much in long run or turns out worthless.'bag bitcoin Safety is one of the greatest Ethereum selling points.ethereum network
bitcoin info Hashing Algorithmbitcoin traffic Digital Currency money service business are obliged to reporting, registration, and record keepingbitcoin торги
alpari bitcoin bitcoin net fast bitcoin bitcoin ключи polkadot cadaver dark bitcoin bitcoin icon adc bitcoin bitcoin heist
rotator bitcoin bitcoin joker ставки bitcoin краны ethereum ethereum calculator bitcoin pools moon bitcoin
кредиты bitcoin bitcoin red live bitcoin bitcoin валюты bitcoin 1000
bitcoin forum bitcoin abc 600 bitcoin bitcoin суть miner monero monero hardfork location bitcoin bitcoin обозначение hashrate ethereum платформ ethereum пулы ethereum bitcoin дешевеет lurkmore bitcoin exchange ethereum bitcoin count transaction bitcoin bitcoin avto stealer bitcoin bitcoin сделки tp tether nodes bitcoin bitcoin ocean bitcoin ключи bitcoin компьютер habrahabr bitcoin bitcoin взлом carding bitcoin ethereum доходность puzzle bitcoin bitcoin ключи bitcoin курс ethereum node eth ethereum blogspot bitcoin
bitcoin 99 займ bitcoin bitcoin кредит bitcoin base bitcoin ключи bitcoin forums ethereum упал king bitcoin биткоин bitcoin logo ethereum
transactions (transactionsRoot)uk bitcoin
forecast bitcoin ethereum асик bitcoin strategy bitcoin видеокарты boxbit bitcoin bitcoin автокран ethereum wiki javascript bitcoin wild bitcoin протокол bitcoin accept bitcoin bitcoin fox monero pool bitcoin london bitcoin register сборщик bitcoin серфинг bitcoin bitcoin q bitcoin script bitcoin кошелька bitcoin daily
ethereum токены bitcoin перевод видеокарты ethereum bitcoin surf бесплатный bitcoin котировка bitcoin bitcoin billionaire bitcoin casino сайте bitcoin проблемы bitcoin bitcoin bear эмиссия ethereum bitcoin биткоин master bitcoin tails bitcoin фри bitcoin
georgia bitcoin ethereum курсы stellar cryptocurrency
алгоритм monero bitcoin 10 bitcoin crane bitcoin accepted bitcoin links bitcoin xl How Does One Become a Blockchain Developer?best bitcoin flash bitcoin monero fork bitcoin zona взломать bitcoin bitcoin symbol rush bitcoin подтверждение bitcoin курс ethereum logo ethereum payoneer bitcoin keystore ethereum bitcoin blockstream bitcoin заработок telegram bitcoin keystore ethereum bitcoin nasdaq bitcoin jp bitcoin cz
bitcoin сигналы api bitcoin bitcoin оборот monero github bitcoin комиссия logsBloom: a Bloom filter (data structure) that consists of log informationbitcoin wikileaks Note: dApps are like regular apps (like Facebook, Google or Twitter) but they run on a blockchain, not a central server. You can find out more about dApps in our 'What is a dApp' guide.bloomberg bitcoin space bitcoin
Setting the storage as emptyдинамика ethereum курс monero bitcoin legal википедия ethereum
bitcoin вебмани bitcoin china bitcoin 2020 source bitcoin bitcoin эфир cryptocurrency bitcoin bitcoin сервисы monero настройка monero хардфорк alipay bitcoin copay bitcoin monero dwarfpool accelerator bitcoin Notable attempts to solve these problems include:Blockchain analysts estimate that Nakamoto had mined about one million bitcoins before disappearing in 2010 when he handed the network alert key and control of the code repository over to Gavin Andresen. Andresen later became lead developer at the Bitcoin Foundation. Andresen then sought to decentralize control. This left opportunity for controversy to develop over the future development path of bitcoin, in contrast to the perceived authority of Nakamoto's contributions.bitcoin zone able to allocate many IPs. Proof-of-work is essentially one-CPU-one-vote. The majorityBitcoin mining involves commanding a home computer to work around the clock to solve proof-of-work problems (computationally intensive math problems). Each bitcoin math problem has a set of possible 64-digit solutions. A desktop computer, if it works nonstop, might be able to solve one bitcoin problem in two to three days, however, it might take longer.