Monero

From HandWiki - Reading time: 10 min

Short description: Privacy-focused cryptocurrency
Monero
Monero-Logo.svg
Ticker symbolXMR
Development
Original author(s)Nicolas van Saberhagen
White paper"CryptoNote v 2.0"
Initial release18 April 2014 (7 years ago) (2014-04-18)
Latest release0.17.2.3 / 1 September 2021 (4 months ago) (2021-09-01)
Development statusActive
Source modelOpen source
LicenseMIT License
Websitegetmonero.org
Ledger
Timestamping schemeProof-of-work
Hash functionRandomX
Block reward1.16 XMR
Block time2 minutes
Circulating supply~18,009,002
Supply limitUnlimited

Monero (/məˈnɛr/; XMR) is a decentralized cryptocurrency. It uses a public distributed ledger with privacy-enhancing technologies that obfuscate transactions to achieve anonymity and fungibility. Observers cannot decipher addresses trading monero, transaction amounts, address balances, or transaction histories.

The protocol is open source and based on CryptoNote, a concept described in a 2013 white paper authored by Nicolas van Saberhagen. The cryptography community used this concept to design Monero, and deployed its mainnet in 2014. Monero uses ring signatures, zero-knowledge proofs, and "stealth addresses" to obfuscate transaction details. These features are baked into the protocol, though users can optionally share view keys for third party auditing. Transactions are validated through a miner network running RandomX, a proof of work algorithm. The algorithm issues new coins to miners, and was designed to be resistant to ASIC mining.

Monero has the third largest developer community among cryptocurrencies, behind bitcoin and Ethereum. Its privacy features have attracted cypherpunks and users desiring privacy measures not provided in other cryptocurrencies. It is increasingly used in illicit activities such as money laundering, darknet markets, ransomware, and cryptojacking. The United States Internal Revenue Service (IRS) has posted bounties for contractors that can develop monero tracing technologies.[1]

Background

Monero's roots can be traced back to CryptoNote, a cryptocurrency protocol first described in a white paper published by Nicolas van Saberhagen (presumed pseudonymous) in October 2013.[2] The author described privacy and anonymity as "the most important aspects of electronic cash" and called bitcoin's traceability a "critical flaw".[3] A Bitcointalk forum user "thankful_for_today" coded these ideas into a coin they dubbed BitMonero. Other forum users disagreed with thankful_for_today's direction for BitMonero, so forked it in 2014 to create monero.[2] Monero translates to coin in Esperanto,[2] and the Esperanto moneroj is sometimes used for plural.[4] Both van Saberhagen and thankful_for_today remain anonymous.[2]

Monero has the third largest community of developers, behind bitcoin and Ethereum.[3] The protocol's lead maintainer was previously South African developer Riccardo Spagni.[5] Much of the core development team chooses to remain anonymous.[6]

Privacy

Ring signatures create ambiguity in blockchain analysis
Marketing material distributed by the monero community[7] promoting crypto-anarchism

Monero's key features are those around privacy and anonymity.[8][2][6] Even though it is a public and decentralized ledger, all transaction details are obfuscated.[9] This contrasts to bitcoin, where all transaction details, user addresses, and wallet balances are public and transparent.[2][6] These features have given monero a loyal following among crypto anarchists, cypherpunks, and privacy advocates.[3]

The addresses of users sending monero are protected through ring signatures, which groups a sender's address with other addresses.[2] Obfuscation of transaction amounts began in 2017 with the implementation of ring confidential transactions (RingCTs).[2][10] Developers also implemented a zero-knowledge proof method, "Bulletproofs", which guarantee a transaction occurred without revealing its value.[11] Monero recipients are protected through "stealth addresses", addresses genereated by users to receive funds, but untraceable to an owner by a network observer.[2] These privacy features are enforced on the network by default,[2] though users have the option to share a private view key to permit third party auditing of their wallet,[12] or a transaction key to audit a transaction.[13]

The monero protocol obscures the IP address of devices producing transactions. This is done through a method of transaction broadcast propagation; new transactions are initially passed to one node on monero's peer-to-peer network, and a repeated probabilistic method is used to determine when the transaction should be sent to just one node or broadcast to many nodes in a process called flooding.[14][15][16] This method was motivated by the growing blockchain analysis market and the potential use of botnets for analysis.[16]

Efforts to trace transactions

In April 2017, researchers highlighted three major threats to monero users' privacy. The first relies on leveraging the ring signature size of zero, and ability to see the output amounts. The second, "Leveraging Output Merging", involves tracking transactions where two outputs belong to the same user, such as when they send funds to themselves ("churning"). Finally, "Temporal Analysis", shows that predicting the right output in a ring signature could potentially be easier than previously thought.[17] The monero development team responded that they had already addressed the first concern with the introduction of RingCTs in January 2017, as well as mandating a minimum size of ring signatures in March 2016.[18] In 2018, researchers presented possible vulnerabilities in a paper titled "An Empirical Analysis of Traceability in the Monero Blockchain".[19] The monero team responded in March 2018.[20]

In September 2020, the United States Internal Revenue Service's criminal investigation division (IRS-CI), posted a $625,000 bounty for contractors who could develop tools to help trace monero, other privacy-enhanced cryptocurrencies, the bitcoin Lightning Network, or other "layer 2" protocols.[21][3] The contract was awarded to blockchain analysis groups Chainalysis and Integra FEC.[3]

Mining

Monero GUI running on a remote node

Monero uses a proof of work algorithm, RandomX, to validate transactions. The method was introduced in November 2019 to replace the former algorithm CryptoNightR.[22][23] Both algorithms were designed to be resistant to application-specific integrated circuit (ASIC) mining, which is commonly used to mine other cryptocurrencies such as bitcoin.[24][25] Monero can be mined somewhat efficiently on consumer grade hardware such as x86, x86-64, ARM and GPUs, and as a result it is popular among malware-based miners.[26][27]

Illicit use

Monero's privacy features have made it popular for illicit purposes.[9][28][29]

Darknet markets

Monero is a common medium of exchange on darknet markets.[2] In August 2016, dark market AlphaBay permitted its vendors to start accepting monero as an alternative to bitcoin.[2] Reuters reported in 2019 that three of the five largest darknet markets accepted monero, though bitcoin was still the most widely used form of payment in those markets.[9]

Mining malware

Hackers have embedded malware into websites and applications that hijack victim CPUs to mine monero (sometimes called cryptojacking).[5][30] In late 2017, malware and antivirus service providers blocked Coinhive, a JavaScript implementation of a monero miner that was embedded in websites and apps, in some cases by hackers. Coinhive generated the script as an alternative to advertisements; a website or app could embed it, and use website visitor's CPU to mine the cryptocurrency while the visitor is consuming the content of the webpage, with the site or app owner getting a percentage of the mined coins.[31] Some websites and apps did this without informing visitors, and some hackers implemented it in way that drained visitors' CPUs. As a result, the script was blocked by companies offering ad blocking subscription lists, antivirus services, and antimalware services.[32][30] Coinhive had been previously found hidden in Showtime-owned streaming platforms,[33] as well as Starbucks Wi-Fi hotspots in Argentina.[5][34] In 2018, researchers found similar malware that mines monero and sends it to Kim Il-sung University in North Korea.[35]

Ransomware

Ransomware deployed in 2021 by REvil. The hackers are demanding payment in monero.[36]

Monero is sometimes used by ransomware groups. According to CNBC , in the first half of 2018, monero was used in 44% of cryptocurrency ransomware attacks.[37]

One group behind the 2017 WannaCry ransomware attack, the Shadow Brokers, attempted to exchange the ransom they collected in bitcoin to monero. Ars Technica and Fast Company reported that the exchange was successful,[38][5] but BBC News reported that the service the criminal attempted to use, ShapeShift, denied any such transfer.[39] The Shadow Brokers began accepting monero as payment later in 2017.[38]

In 2021, CNBC , the Financial Times , and Newsweek reported that demand for monero was increasing following the recovery of a bitcoin ransom paid in the Colonial Pipeline cyber attack.[6][3][40] The May 2021 hack forced the pipeline to pay a $4.4M ransom in bitcoin, though a large portion was recovered by the United States federal government the following month.[40] The group behind the attack, DarkSide, normally requests payment in either bitcoin or monero, but charge a 10-20% premium for payments made in bitcoin due to its increased traceability risk.[3] Ransomware group REvil removed the option of paying ransom in bitcoin in 2021, demanding only monero.[3] Ransomware negotiators, groups that help victims pay ransoms, have contacted monero developers to understand the technology.[3] Despite this, CNBC reported that bitcoin was still the currency of choice demanded in most ransomware attacks, as insurers refuse to pay monero ransom payments because of traceability concerns.[6]

Regulatory responses

The attribution of monero to illlicit markets has influenced some exchanges to forgo listing it. This has made it more difficult for users to exchange monero for fiat currencies or other cryptocurrencies.[6] Exchanges in South Korea and Australia have delisted monero and other privacy coins due to regulatory pressure.[41]

In 2018, Europol and its director Rob Wainwright wrote that the year would see criminals shift from using bitcoin to using monero, as well as Ethereum, dash, and zcash.[42] Bloomberg News and CNN reported that this demand for monero was because authorities were becoming better at monitoring the bitcoin blockchain.[43][42]

Publicity

  • After many online payment platforms shut down access for white nationalists following the Unite the Right rally in 2017, some of them, including Christopher Cantwell and Andrew Auernheimer ("weev"), started using and promoting monero.[44][45]
  • In December 2017, the monero team announced a partnership with 45 musicians and several online stores for monero to be used as a form of payment for their merchandise.[5]
  • In November 2018, Bail Bloc released a mobile app that mines monero to raise funds for low-income defendants who cannot otherwise cover their own bail.[46][47]

References

  1. Phillips Erb, Kelly. "IRS Will Pay Up To $625,000 If You Can Crack Monero, Other Privacy Coins". Forbes. https://www.forbes.com/sites/kellyphillipserb/2020/09/14/irs-will-pay-up-to-625000-if-you-can-crack-monero-other-privacy-coins/?sh=3749d97585cc. 
  2. 2.00 2.01 2.02 2.03 2.04 2.05 2.06 2.07 2.08 2.09 2.10 2.11 "Monero, the Drug Dealer's Cryptocurrency of Choice, Is on Fire". WIRED. https://www.wired.com/2017/01/monero-drug-dealers-cryptocurrency-choice-fire/. 
  3. 3.0 3.1 3.2 3.3 3.4 3.5 3.6 3.7 3.8 Murphy, Hannah (2021-06-22). "Inside monero, emerging crypto of choice for cybercriminals". https://www.ft.com/content/13fb66ed-b4e2-4f5f-926a-7d34dc40d8b6. 
  4. "Moneropedia: Mnemonic Seed" (in en). https://www.getmonero.org//resources/moneropedia/mnemonicseed.html. 
  5. 5.0 5.1 5.2 5.3 5.4 Melendez, Steven (2017-12-18). "Highly Anonymized Cryptocurrency Monero Peeks Out Of The Shadows" (in en-US). https://www.fastcompany.com/40505925/highly-anonymous-cryptocurrency-monero-peeks-out-of-the-shadows. 
  6. 6.0 6.1 6.2 6.3 6.4 6.5 Sigalos, MacKenzie (2021-06-13). "Why some cyber criminals are ditching bitcoin for a cryptocurrency called monero" (in en). https://www.cnbc.com/2021/06/13/what-is-monero-new-cryptocurrency-of-choice-for-cyber-criminals.html. 
  7. "Press Kit" (in en). https://www.getmonero.org//press-kit/index.html. 
  8. Hern, Alex (2017-12-11). "Missed the bitcoin boom? Five more baffling cryptocurrencies to blow your savings on". The Guardian. ISSN 0261-3077. https://www.theguardian.com/technology/shortcuts/2017/dec/11/missed-bitcoin-boom-five-more-baffling-cryptocurrencies-to-blow-your-savings-on. 
  9. 9.0 9.1 9.2 Wilson, Tom (2019-05-15). "Explainer: 'Privacy coin' Monero offers near total anonymity" (in en). Reuters. https://www.reuters.com/article/us-crypto-currencies-altcoins-explainer-idUSKCN1SL0F0. 
  10. "Bittercoin: true blockchain believers versus the trough of disillusionment". https://techcrunch.com/2017/03/12/bittercoin-true-blockchain-believers-vs-the-trough-of-disillusionment/. 
  11. Alsalami, Nasser; Zhang, Bingsheng (2019). "SoK: A Systematic Study of Anonymity in Cryptocurrencies". 2019 IEEE Conference on Dependable and Secure Computing (DSC). pp. 1–6. doi:10.1109/DSC47296.2019.8937681.
  12. "How to Verify Your Funds with a Private View Key". https://www.monero.how/how-to-verify-your-monero-funds-with-a-private-view-key. 
  13. "How to Prove Payment". https://web.getmonero.org/resources/user-guides/prove-payment.html. 
  14. Bojja Venkatakrishnan, Shaileshh; Fanti, Giulia; Viswanath, Pramod (2017-06-13). "Dandelion: Redesigning the Bitcoin Network for Anonymity". Proceedings of the ACM on Measurement and Analysis of Computing Systems 1 (1): 22:1–22:34. doi:10.1145/3084459. 
  15. Fanti, Giulia; Venkatakrishnan, Shaileshh Bojja; Bakshi, Surya; Denby, Bradley; Bhargava, Shruti; Miller, Andrew; Viswanath, Pramod (2018-06-13). "Dandelion++: Lightweight Cryptocurrency Networking with Formal Anonymity Guarantees". Proceedings of the ACM on Measurement and Analysis of Computing Systems 2 (2): 29:1–29:35. doi:10.1145/3224424. 
  16. 16.0 16.1 "Dandelion for Monero". 2020-03-03. https://www.monerooutreach.org/stories/dandelion.html. 
  17. Kumar, Amrit et al. (2017). "A Traceability Analysis of Monero's Blockchain ". Cryptology ePrint Archive. Retrieved 2020-12-20.
  18. "An Unofficial Response to 'An Empirical Analysis of Linkability in the Monero Blockchain' ". GetMonero.org. Retrieved 2020-12-20.
  19. Moser, Malte et al. (2018). "An Empirical Analysis of Traceability in the Monero Blockchain". Proceedings on Privacy Enhancing Technologies. 2018 (3): 143. doi:10.1515/popets-2018-0025.
  20. "Response to "An Empirical Analysis of Traceability in the Monero Blockchain", Version 2 ". GetMonero.org. Retrieved 2020-12-20.
  21. Franceschi-Bicchierai, Lorenzo (2020-09-12). "The IRS Wants to Buy Tools to Trace Privacy-Focused Cryptocurrency Monero ". Motherboard. Retrieved 2020-12-17.
  22. "RandomX is a new Proof-of-Work (PoW) algorithm used where decentralisation matters". 2019-06-05. https://www.monerooutreach.org/stories/RandomX.php. 
  23. ErCiccione. "Monero 0.15.0.0 "Carbon Chamaeleon" released". https://web.getmonero.org/2019/11/12/monero-0.15-released.html. 
  24. "How a few companies are bitcoining it". The Economist. 2018-05-19. ISSN 0013-0613. https://www.economist.com/business/2018/05/19/how-a-few-companies-are-bitcoining-it. 
  25. Gibbs, Samuel (2017-12-13). "Billions of video site visitors unwittingly mine cryptocurrency as they watch". The Guardian. ISSN 0261-3077. https://www.theguardian.com/technology/2017/dec/13/video-site-visitors-unwittingly-mine-cryptocurrency-as-they-watch-report-openload-streamango-rapidvideo-onlinevideoconverter-monero. 
  26. Brandom, Russell (2017-12-19). "Backdoor coin-mining hacks are spreading as prices rise". https://www.theverge.com/2017/12/19/16796084/backdoor-coin-mining-hacks-are-spreading-as-prices-rise. 
  27. Palmer, Danny. "Cyber attackers are cashing in on cryptocurrency mining - but here's why they're avoiding bitcoin". https://www.zdnet.com/article/cyber-attackers-are-cashing-in-on-cryptocurrency-mining-but-heres-why-theyre-avoiding-bitcoin/. 
  28. Kshetri, Nir (2018). "Cryptocurrencies: Transparency Versus Privacy". Computer. IEEE Computer Society. 51 (11): 99–111. doi:10.1109/MC.2018.2876182.
  29. "Meet Monero, the Currency Dark Net Dealers Hope Is More Anonymous Than Bitcoin". Motherboard. 2016-08-23. https://motherboard.vice.com/en_us/article/jpgv8k/monero-cryptocurrency-dark-net-drug-dealers-hope-more-anonymous-than-bitcoin-alphabay. 
  30. 30.0 30.1 Tung, Liam. "Android security: Coin miners show up in apps and sites to wear out your CPU | ZDNet". ZDNet. http://www.zdnet.com/article/android-security-coin-miners-show-up-in-apps-and-sites-to-wear-out-your-cpu/. 
  31. Thomson, Iain (19 October 2017). "Stealth web crypto-cash miner Coinhive back to the drawing board as blockers move in". The Register. https://www.theregister.co.uk/2017/10/19/malwarebytes_blocking_coin_hive_browser_cryptocurrency_miner_after_user_revolt/. 
  32. Goodin, Dan (30 October 2017). "A surge of sites and apps are exhausting your CPU to mine cryptocurrency". Ars Technica. https://arstechnica.com/information-technology/2017/10/a-surge-of-sites-and-apps-are-exhausting-your-cpu-to-mine-cryptocurrency/. 
  33. "Showtime's Websites May Have Used Your CPU to Mine Cryptocoin While You Binged on Twin Peaks" (in en-us). https://gizmodo.com/showtimes-websites-may-have-used-your-cpu-to-mine-crypt-1818763497. 
  34. "Hackers Hijacked an Internet Provider to Mine Cryptocurrency with Laptops In Starbucks" (in en). https://www.vice.com/en/article/evabb7/an-argentine-isp-was-hacked-to-inject-cryptocurrency-miner-code-into-starbucks-wi-fi. 
  35. Kharpal, Arjun (2018-01-09). "Hackers have found a way to mine cryptocurrency and send it to North Korea" (in en). https://www.cnbc.com/2018/01/09/north-korea-hackers-create-malware-to-mine-monero.html. 
  36. Barrett, Brian (2 July 2021). "A New Kind of Ransomware Tsunami Hits Hundreds of Companies". https://www.wired.com/story/kaseya-supply-chain-ransomware-attack-msps/. 
  37. Rooney, Kate (2018-06-07). "$1.1 billion in cryptocurrency has been stolen this year, and it was apparently easy to do". CNBC. https://www.cnbc.com/2018/06/07/1-point-1b-in-cryptocurrency-was-stolen-this-year-and-it-was-easy-to-do.html. 
  38. 38.0 38.1 Gallagher, Sean (2017-08-04). "Researchers say WannaCry operator moved bitcoins to "untraceable" Monero" (in en-us). https://arstechnica.com/gadgets/2017/08/researchers-say-wannacry-operator-moved-bitcoins-to-untraceable-monero/. 
  39. "Wannacry money laundering attempt thwarted" (in en-GB). BBC News. 2017-08-04. https://www.bbc.com/news/technology-40826056. 
  40. 40.0 40.1 Browne, Ed (2021-06-15). "Monero developer expects more criminal groups to use the crypto for ransoms" (in en). https://www.newsweek.com/monero-developer-criminal-groups-use-crypto-ransoms-justin-ehrenhofer-1600884. 
  41. Ikeda, Scott (2020-11-17). "South Korea's New Crypto AML Law Bans Trading of "Privacy Coins" (Monero, Zcash) ". CPO magazine. Retrieved 2020-12-17.
  42. 42.0 42.1 Kottasová, Ivana (2018-01-03). "Bitcoin is too hot for criminals. They're using monero instead". https://money.cnn.com/2018/01/03/technology/bitcoin-popularity-criminals-monero/index.html. 
  43. Kharif, Olga (2 January 2018). "The Criminal Underworld Is Dropping Bitcoin for Another Currency". https://www.bloomberg.com/news/articles/2018-01-02/criminal-underworld-is-dropping-bitcoin-for-another-currency. 
  44. Hayden, Michael Edison (27 March 2018). "White supremacists are investing in a cryptocurrency that promises to be completely untraceable". Newsweek. https://www.newsweek.com/white-supremacists-cryptocurrency-monero-bitcoin-861104. 
  45. Cox, Joseph (5 March 2018). "Neo-Nazis Turn to Privacy-Focused Cryptocurrency Monero". Motherboard. https://motherboard.vice.com/en_us/article/neqy7z/neo-nazis-monero-weev-daily-stormer. 
  46. "Mining cryptocurrency helps raise bail for those who can't | CBC Radio". CBC. https://www.cbc.ca/radio/spark/379-integrated-shopping-leaving-silicon-valley-wifi-enabled-plastic-and-more-1.4474658/mining-cryptocurrency-helps-raise-bail-for-those-who-can-t-1.4474674. 
  47. "You Can Now Mine Cryptocurrency to Bail People Out of Jail". Motherboard. 2017-11-15. https://motherboard.vice.com/en_us/article/vb3j93/you-can-now-mine-cryptocurrency-to-bail-people-out-of-jail-bail-bloc. 

External links




Licensed under CC BY-SA 3.0 | Source: https://handwiki.org/wiki/Finance:Monero
9 views | Status: cached on April 23 2022 16:14:02
↧ Download this article as ZWI file
Encyclosphere.org EncycloReader is supported by the EncyclosphereKSF