Become a Patreon

Knowledge Protocol. Daily curated links from the space of blockchain, bitcoin, tokens, cryptocurrencies and protocols. No news, no bullshit, deep knowledge only.

Privacy

Links to the best articles, videos and podcasts about Privacy in cryptocurrency space.

2/ 3
The Elephant in the Room: Security and Privacy Protocols in Security Tokens

"When comes to security tokens, security and privacy protocols are not only a technically challenging and often intimidating subject but also one that can challenge the current foundation of crypto-securities. From all the aspects missing in the current generation of security token architectures, security and privacy are the ones I feel can break the premise of the entire ecosystem."

2/ 3
Privacy in Cryptocurrencies: An Overview

"To be a more informed developer, investor, or participant in cryptocurrencies, it is important to understand what privacy actually means in a cryptoeconomic system. We wrote this post to share our perspective on this skill."

1/ 3
Battle of the Privacycoins: Zcash Is Groundbreaking (If You Trust It)

"The origins of Zcash (ZEC) can be traced back to Zerocoin, which was first proposed in 2013 by Johns Hopkins University professor Matthew D. Green and his graduate students Ian Miers and Christina Garman. Zerocoin was designed as a privacy-enhancing protocol extension for Bitcoin to let users “burn” coins and bring an equal amount back into circulation later. Although transaction amounts could be a giveaway, there’d be no way to link the “new” coins to the burned coins otherwise."

2/ 3
An Empirical Analysis of Anonymity in Zcash

"In this paper, we examine the extent to which anonymity is achieved in the deployed version of Zcash."

3/ 3
BLOCKCHAIN VS. THE SURVEILLANCE STATE | PANEL DISCUSSION | 2018

2/ 3
Bitcoin as a Privacycoin: This Tech is Making Bitcoin More Private

"spying on Bitcoin users is becoming increasingly difficult. Recent months in particular saw the introduction of a number of promising, privacy-enhancing technologies, and several more solutions should be released throughout the rest of the year or the next."

2/ 3
Introduction to Privacy-Preserving Smart Contracts

Trusted Execution Environments (TEE); Secure Multi-party Computation (sMPC); Zero-knowledge Proofs (ZKP).

2/ 3
An Overview of Privacy in Cryptocurrencies

"In this piece we’ll cover the latest experimentation and research in four areas of the privacy landscape: 1) privacy coins, 2) smart contract privacy, 3) privacy infrastructure, and 4) privacy research."

2/ 3
Efficient Zero-Knowledge Range Proofs in Ethereum

Whitepaper.

2/ 3
zkSNARKs in a nutshell

"The possibilities of zkSNARKs are impressive, you can verify the correctness of computations without having to execute them and you will not even learn what was executed - just that it was done correctly. Unfortunately, most explanations of zkSNARKs resort to hand-waving at some point and thus they remain something “magical”, suggesting that only the most enlightened actually understand how and why (and if?) they work. The reality is that zkSNARKs can be reduced to four simple techniques and this blog post aims to explain them. Anyone who can understand how the RSA cryptosystem works, should also get a pretty good understanding of currently employed zkSNARKs. Let’s see if it will achieve its goal!"

1/ 3
Privacy Revolution: How Blockchain Is Reshaping Our Economy

The Forbe's piece on benefits of blockchain's privacy.

2/ 3
Bitcoin and the Rise of the Cypherpunks

"While many of the innovations in the space are new, they're built on decades of work that led to this point. By tracing this history, we can understand the motivations behind the movement that spawned bitcoin and share its vision for the future."

2/ 3
(Very) Basic Elliptic Curve Cryptography

“ECC is a way to encrypt data so that only specific people can decrypt it. This has several obvious real life use cases, but the main usage is in encrypting internet data and traffic. For instance, ECC can be used to ensure that when an email is sent, no one but the recipient can read the message.”

2/ 3
Privacy Is Vital to Crypto – And the Global Economy

The article explores the argument that privacy is vital not only to cryptocurrencies but the whole economy.

2/ 3
Privacy 3.0: Encryption Tools for the Decentralized Web

Current privacy models and protocols explained (Mixing services, Anonymous crypto schemes, Secure multiparty computation (SMPC), Off-chain constructs).

1/ 3
The Dark Web’s Favorite Currency Is Less Untraceable Than It Seems

The analysis of Monero's privacy features. The easy to digest interpretation of a white paper.

2/ 3
An Empirical Analysis of Traceability in the Monero Blockchain

"But in a recent paper, a team of researchers from a broad collection of institutions—including Princeton, Carnegie Mellon, Boston University, MIT, and the University of Illinois at Urbana-Champaign—point to flaws in that mixing that make it possible to nonetheless extract individual transactions."

2/ 3
STARKs, Part I: Proofs with Polynomials

The explanation of STARKS. “ZK-STARKs resolve one of the primary weaknesses of ZK-SNARKs, its reliance on a ‘trusted setup’. They also come with much simpler cryptographic assumptions, avoiding the need for elliptic curves, pairings and the knowledge-of-exponent assumption and instead relying purely on hashes and information theory; this also means that they are secure even against attackers with quantum computers.”

Subscribe to our newsletter - get a weekly round-up right to your inbox.