Open main menu

Wikipedia β

Monero (XMR) is an open-source cryptocurrency created in April 2014 that focuses on privacy and decentralization. Monero uses a public ledger to record transactions while new units are created through a process called mining.

Monero
Monero-Logo.svg
Monero Logo
Denominations
Plural Monero, moneroj
Symbol ɱ
Ticker symbol XMR[a]
Previous names BitMonero
Subunits
 ​11000000000000 piconero
Development
Original author(s) Nicolas van Saberhagen
White paper CryptoNote v 2.0
Initial release 18 April 2014 (4 years ago) (2014-04-18)
Latest release 0.12.0.0 / 24 March 2018 (3 months ago) (2018-03-24)
Code repository github.com/monero-project
Operating system Windows, Linux, macOS, BSD
Source model BSD 3-Clause
Website getmonero.org
Ledger
Timestamping scheme Proof-of-work
Hash function CryptoNight
Issuance Decentralized, block reward
Block time 2 minutes (previously 1 minute)
Block explorer xmrchain.net
Circulating supply 15,962,350 XMR (as of 24 April 2018)
Valuation
Exchange rate $137 (as of 9 July 2018)
Market cap Increase US$2.2 billion (as of 9 July 2018)
  1. ^ Compatible with ISO 4217.

The focus on privacy has attracted illicit use by people interested in evading law enforcement.[1][2] The egalitarian mining process made it viable to distribute the mining effort opening new funding avenues for both legitimate online publishers and malicious hackers who covertly embed mining code into websites and apps.[3]

Contents

ArchitectureEdit

Unlike many cryptocurrencies that are derivatives of Bitcoin, Monero is based on the CryptoNight proof-of-work hash algorithm, which comes from the CryptoNote protocol.[4] It possesses significant algorithmic differences relating to blockchain obfuscation.[5][6] By providing a high level of privacy, Monero is fungible, meaning that every unit of the currency can be substituted by another unit. This makes Monero different from public-ledger cryptocurrencies like Bitcoin, where addresses with coins previously associated with undesired activity can be blacklisted and have their coins refused by other users.

In particular, the ring signatures mix the spender's input with a group of others, making it exponentially more difficult to establish a link between each subsequent transaction.[2][7] Also, the "stealth addresses" generated for each transaction make it impossible to discover the actual destination address of a transaction by anyone else other than the sender and the receiver. Finally, the "ring confidential transactions" mechanism hides the transferred amount.[2]

Monero is designed to be resistant to application-specific integrated circuit mining, which is commonly used to mine other cryptocurrencies such as Bitcoin.[8] It can be mined somewhat efficiently on consumer grade hardware such as x86, x86-64, ARM and GPUs.[8]

HistoryEdit

The underlying CryptoNote protocol that Monero is based on was originally launched by pseudonymous author Nicolas van Saberhagen in October 2013.[2]

Monero was originally launched by a Bitcointalk forum user only known as "thankful_for_today" under the name BitMonero which is a compound of Bit (as in Bitcoin) and Monero (literally meaning "coin" in Esperanto).[2] Five days later, the currency's supporters opted for the name to be shortened to Monero.[5]

In September 2014, Monero was attacked when an unknown party exploited a flaw in CryptoNote that permitted the creation of two subchains that refused to recognize the validity of transactions on each other. CryptoNote later released a patch for the flaw, which Monero implemented.[9]

Monero experienced rapid growth in market capitalization and transaction volume during the year 2016, partly due to adoption in 2016 by major darknet market AlphaBay,[2] which was closed in July 2017 by law enforcement.[10]

On January 10, 2017, the privacy of Monero transactions were further strengthened by the adoption of Bitcoin Core developer Gregory Maxwell's algorithm Confidential Transactions, hiding the amounts being transacted, in combination with an improved version of Ring Signatures.[11]

Transaction linkabilityEdit

In April 2017 research highlighted three major threats to Monero users' privacy. The first relies on leveraging the ring signature size of zero, and ability to see the output amounts.[12] The second, described as "Leveraging Output Merging", involves tracking transactions where two outputs belong to the same user,[12] such as when a user is sending the funds to himself ("churning"). Finally the third threat, "Temporal Analysis", shows that predicting the right output in a ring signature is easier than previously thought.[12]

Monero development team addressed the first concern in early 2017 with introduction of Ring Confidential Transactions (ringCT)[13] as well as mandating a minimum size of ring signatures in the March 2016 protocol upgrade. Monero developers also noted that Monero Research Labs, their academic and research arm, already noted and outlined the deficiency in two public research papers in 2014 and 2015.[13]

Client softwareEdit

A user needs client software, a so-called wallet, to interact with the Monero network. The reference implementation developed by the Monero Project runs on Windows, MacOS, and Linux[14]; several third party Monero wallets exist for Android and iOS, such as Monerujo[15] and Cakewallet[16]. Finally, a web wallet allows users to interact with the network entirely through the browser using a third party website.

ImplementationsEdit

The feasibility of CPU mining Monero has made it viable for malicious actors to covertly distribute miners embedded in malware, using the victim's hardware and electricity for the financial gain of the malware developer as well as legitimate uses with user consent.[17][3]

The JavaScript implementation of Monero miner Coinhive has made it possible to embed the miner into a website in such a way to use website visitor's CPU to mine the cryptocurrency while the visitor is consuming the content of the webpage. While this can be done with user's consent in an effort to provide an alternative funding model to serving ads,[18] some websites have done this without informed consent which has prompted the in-browser miners to be blocked by browser extensions and ad blocking subscription lists.[17][19] This act is often called "Cryptojacking". The term itself is a portmanteau from the words cryptocurrency and hijacking. Coinhive-like mining scripts might significantly slow down infected devices. Victims of cryptojacking often report sluggish performance, batteries dying out and in some cases the devices run so hot due to the extensive CPU work that they become unusable. [20]

Monero is sometimes employed by Bitcoin users to break link between transactions, with bitcoins first converted to Monero, then after some delay, converted back and sent to an address unrelated to those used before.[7] Researchers have reported that the operators behind the global ransomware incident WannaCry have converted their proceeds into Monero. It is also the payment method of choice for The Shadow Brokers.[1] Exchanges ShapeShift and Changelly are cooperating with police after it emerged that the WannaCry attackers used it to convert Bitcoin to Monero. "Any transactions made through ShapeShift can not be hidden or obscured and are thus 100 percent transparent" stated ShapeShift.[21]

See alsoEdit

ReferencesEdit

  1. ^ a b Gallagher, Sean (4 August 2017). "Researchers say WannaCry operator moved bitcoins to "untraceable" Monero". Ars Technica. 
  2. ^ a b c d e f "Monero, the Drug Dealer's Cryptocurrency of Choice, Is on Fire". WIRED. Retrieved 2017-11-22. 
  3. ^ a b Tung, Liam. "Android security: Coin miners show up in apps and sites to wear out your CPU | ZDNet". ZDNet. Retrieved 2017-11-22. 
  4. ^ "Monero". Cointelegraph. 24 May 2015. 
  5. ^ a b Rizzo, Pete (February 4, 2017). "Drugs, Code and ICOs: Monero's Long Road to Blockchain Respect". CoinDesk. 
  6. ^ Lopp, Jameson (April 9, 2016). "Bitcoin and the Rise of the Cypherpunks". CoinDesk. 
  7. ^ a b van Wirdum, Aaron (September 1, 2016). "How Bitcoin Users Reclaim Their Privacy Through Its Anonymous Sibling, Monero". Bitcoin Magazine. 
  8. ^ a b Tsihitas, Theo (September 22, 2017). "Monero vs Bitcoin: Monero Adopted by Privacy Focused Crypto Users". CoinCentral. 
  9. ^ Werner, Albert (September 8, 2014). "Monero network exploit post-mortem". Cryptonote forum. 
  10. ^ Popper, Nathaniel; Ruiz, Rebecca R. (20 July 2017). "2 Leading Online Black Markets Are Shut Down by Authorities". The New York Times. 
  11. ^ O'Leary, Rachel Rose (September 8, 2017). "Increased Hashrate Forces Premature Monero Hard Fork Sep 8, 2017 at 15:00 UTC by Rachel Rose O'Leary". CoinDesk. 
  12. ^ a b c Kumar, Amrit; Fischer, Clément; Tople, Shruti; Saxena, Prateek. "A Traceability Analysis of Monero's Blockchain" (PDF). eprint.iacr.org. Retrieved 6 November 2017. 
  13. ^ a b "You Can Link Monero Transactions – But Which? And What's the Impact? - CoinDesk". CoinDesk. 2017-04-22. Retrieved 2017-11-15. 
  14. ^ "Downloads | Monero - secure, private, untraceable". getmonero.org, The Monero Project. Retrieved 2018-06-29. 
  15. ^ "Monerujo Android Wallet Makes Using Monero on Mobile Easier". The Merkle. Retrieved 2017-11-22. 
  16. ^ "Monero Introduces Its Official XMR Wallet, Community Expresses Ambivalence". CoinWire. Retrieved 2018-04-29. 
  17. ^ a b Goodin, Dan (October 30, 2017). "A surge of sites and apps are exhausting your CPU to mine cryptocurrency". Ars Technica. 
  18. ^ Thomson, Iain (October 19, 2017). "Stealth web crypto-cash miner Coinhive back to the drawing board as blockers move in". The Register. 
  19. ^ Stankovic, Stefan (4 January 2018). "Monero Guide: A Super Secure Cryptocurrency to Invest In". Unblock. Retrieved 9 April 2018. 
  20. ^ Wallets, Secure Crypto (2018-04-27). "The Pros And Cons Of Cryptojacking". Secure Crypto Wallets. Retrieved 2018-06-27. 
  21. ^ "Bitcoin Exchange ShapeShift Helps Police As WannaCry Attacker Converts To Monero". Cointelegraph. 4 August 2017. 

External linksEdit