"When comes to security tokens, security and privacy protocols are not only a technically challenging and often intimidating subject but also one that can challenge the current foundation of crypto-securities. From all the aspects missing in the current generation of security token architectures, security and privacy are the ones I feel can break the premise of the entire ecosystem."
Links to the best articles, videos and podcasts about Privacy in cryptocurrency space.
"To be a more informed developer, investor, or participant in cryptocurrencies, it is important to understand what privacy actually means in a cryptoeconomic system. We wrote this post to share our perspective on this skill."
"The origins of Zcash (ZEC) can be traced back to Zerocoin, which was first proposed in 2013 by Johns Hopkins University professor Matthew D. Green and his graduate students Ian Miers and Christina Garman. Zerocoin was designed as a privacy-enhancing protocol extension for Bitcoin to let users “burn” coins and bring an equal amount back into circulation later. Although transaction amounts could be a giveaway, there’d be no way to link the “new” coins to the burned coins otherwise."
"In this paper, we examine the extent to which anonymity is achieved in the deployed version of Zcash."
"spying on Bitcoin users is becoming increasingly difficult. Recent months in particular saw the introduction of a number of promising, privacy-enhancing technologies, and several more solutions should be released throughout the rest of the year or the next."
Trusted Execution Environments (TEE); Secure Multi-party Computation (sMPC); Zero-knowledge Proofs (ZKP).
"In this piece we’ll cover the latest experimentation and research in four areas of the privacy landscape: 1) privacy coins, 2) smart contract privacy, 3) privacy infrastructure, and 4) privacy research."
"The possibilities of zkSNARKs are impressive, you can verify the correctness of computations without having to execute them and you will not even learn what was executed - just that it was done correctly. Unfortunately, most explanations of zkSNARKs resort to hand-waving at some point and thus they remain something “magical”, suggesting that only the most enlightened actually understand how and why (and if?) they work. The reality is that zkSNARKs can be reduced to four simple techniques and this blog post aims to explain them. Anyone who can understand how the RSA cryptosystem works, should also get a pretty good understanding of currently employed zkSNARKs. Let’s see if it will achieve its goal!"
The Forbe's piece on benefits of blockchain's privacy.
"While many of the innovations in the space are new, they're built on decades of work that led to this point. By tracing this history, we can understand the motivations behind the movement that spawned bitcoin and share its vision for the future."
“ECC is a way to encrypt data so that only specific people can decrypt it. This has several obvious real life use cases, but the main usage is in encrypting internet data and traffic. For instance, ECC can be used to ensure that when an email is sent, no one but the recipient can read the message.”
The article explores the argument that privacy is vital not only to cryptocurrencies but the whole economy.
Current privacy models and protocols explained (Mixing services, Anonymous crypto schemes, Secure multiparty computation (SMPC), Off-chain constructs).
The analysis of Monero's privacy features. The easy to digest interpretation of a white paper.
"But in a recent paper, a team of researchers from a broad collection of institutions—including Princeton, Carnegie Mellon, Boston University, MIT, and the University of Illinois at Urbana-Champaign—point to flaws in that mixing that make it possible to nonetheless extract individual transactions."
The explanation of STARKS. “ZK-STARKs resolve one of the primary weaknesses of ZK-SNARKs, its reliance on a ‘trusted setup’. They also come with much simpler cryptographic assumptions, avoiding the need for elliptic curves, pairings and the knowledge-of-exponent assumption and instead relying purely on hashes and information theory; this also means that they are secure even against attackers with quantum computers.”