Monero (cryptocurrency)
   HOME

TheInfoList



OR:

Monero (; Abbreviation: XMR) is a decentralized cryptocurrency. It uses a public
distributed ledger A distributed ledger (also called a shared ledger or distributed ledger technology or DLT) is the consensus of replicated, shared, and synchronized digital data that is geographically spread (distributed) across many sites, countries, or institutio ...
with
privacy-enhancing technologies Privacy-enhancing technologies (PET) are technologies that embody fundamental data protection principles by minimizing personal data use, maximizing data security, and empowering individuals. PETs allow User (computing), online users to protect the ...
that obfuscate transactions to achieve anonymity and
fungibility In economics, fungibility is the property of a good or a commodity whose individual units are essentially interchangeable, and each of whose parts is indistinguishable from any other part. Fungible tokens can be exchanged or replaced; for exa ...
. Observers cannot decipher addresses trading monero, transaction amounts, address balances, or transaction histories. The protocol is open source and based on
CryptoNote CryptoNote is an application layer protocol designed for use with cryptocurrencies that aims to solve specific problems identified in Bitcoin. Namely: * Traceability of transactions * The proof-of-work function (see Bitcoin network) * Irregul ...
, a concept described in a 2013
white paper A white paper is a report or guide that informs readers concisely about a complex issue and presents the issuing body's philosophy on the matter. It is meant to help readers understand an issue, solve a problem, or make a decision. A white pape ...
authored by Nicolas van Saberhagen. The cryptography community used this concept to design Monero, and deployed its mainnet in 2014. Monero uses
ring signature In cryptography, a ring signature is a type of digital signature that can be performed by any member of a set of users that each have keys. Therefore, a message signed with a ring signature is endorsed by someone in a particular set of people. On ...
s,
zero-knowledge proof In cryptography, a zero-knowledge proof or zero-knowledge protocol is a method by which one party (the prover) can prove to another party (the verifier) that a given statement is true while the prover avoids conveying any additional information a ...
s, "stealth addresses", and
IP address An Internet Protocol address (IP address) is a numerical label such as that is connected to a computer network that uses the Internet Protocol for communication.. Updated by . An IP address serves two main functions: network interface ident ...
–obscuring methods to obfuscate transaction details. These features are baked into the protocol, though users can optionally share view keys for third-party auditing. Transactions are validated through a miner network running RandomX, a
proof-of-work Proof of work (PoW) is a form of cryptographic proof in which one party (the ''prover'') proves to others (the ''verifiers'') that a certain amount of a specific computational effort has been expended. Verifiers can subsequently confirm this expe ...
algorithm . The algorithm issues new coins to miners, and was designed to be resistant to application-specific integrated circuit ( ASIC) mining. Monero has the third-largest developer community among cryptocurrencies, behind Bitcoin and
Ethereum Ethereum is a decentralized, open-source blockchain with smart contract functionality. Ether (Abbreviation: ETH; sign: Ξ) is the native cryptocurrency of the platform. Among cryptocurrencies, ether is second only to bitcoin in market capita ...
. Its privacy features have attracted
cypherpunk A cypherpunk is any individual advocating widespread use of strong cryptography and privacy-enhancing technologies as a route to social and political change. Originally communicating through the Cypherpunks electronic mailing list, informal g ...
s and users desiring privacy measures not provided in other cryptocurrencies. It is increasingly used in illicit activities such as money laundering, darknet markets, ransomware, and
cryptojacking Cryptojacking is the act of hijacking a computer to mine cryptocurrencies against the users will, through websites, or while the user is unaware. One notable piece of software used for cryptojacking was Coinhive, which was used in over two-thir ...
. The United States Internal Revenue Service (IRS) has posted bounties for contractors that can develop monero-tracing technologies.


Background

Monero's roots can be traced back to
CryptoNote CryptoNote is an application layer protocol designed for use with cryptocurrencies that aims to solve specific problems identified in Bitcoin. Namely: * Traceability of transactions * The proof-of-work function (see Bitcoin network) * Irregul ...
, a cryptocurrency protocol first described in a
white paper A white paper is a report or guide that informs readers concisely about a complex issue and presents the issuing body's philosophy on the matter. It is meant to help readers understand an issue, solve a problem, or make a decision. A white pape ...
published by Nicolas van Saberhagen (presumed pseudonymous) in October 2013. The author described privacy and anonymity as "the most important aspects of electronic cash" and called bitcoin's traceability a "critical flaw". A Bitcointalk forum user "''thankful_for_today''" coded these ideas into a coin they dubbed BitMonero. Other forum users disagreed with ''thankful_for_todays direction for BitMonero, so forked it in 2014 to create monero. ''Monero'' translates to ''coin'' in Esperanto, and the Esperanto ''moneroj'' is sometimes used for plural. Both van Saberhagen and ''thankful_for_today'' remain anonymous. Monero has the third-largest community of developers, behind bitcoin and
Ethereum Ethereum is a decentralized, open-source blockchain with smart contract functionality. Ether (Abbreviation: ETH; sign: Ξ) is the native cryptocurrency of the platform. Among cryptocurrencies, ether is second only to bitcoin in market capita ...
. The protocol's lead maintainer was previously South African developer Riccardo Spagni. Much of the core development team chooses to remain anonymous. Improvements to Monero's protocol and features are, in part, the task of the Monero Research Lab (MRL). The lab is a rotating cast of researchers, scientists, cryptographers, and developers. Similar to the core VC development team, a portion of the MRL chooses to remain anonymous or otherwise work pseudonymously.


Privacy

Monero's key features are those around privacy and anonymity. Even though it is a public and decentralized ledger, all transaction details are obfuscated. This contrasts to bitcoin, where all transaction details, user addresses, and wallet balances are public and transparent. These features have given Monero a loyal following among crypto anarchists,
cypherpunk A cypherpunk is any individual advocating widespread use of strong cryptography and privacy-enhancing technologies as a route to social and political change. Originally communicating through the Cypherpunks electronic mailing list, informal g ...
s, and privacy advocates. The transaction outputs, or notes, of users sending Monero are obfuscated through
ring signature In cryptography, a ring signature is a type of digital signature that can be performed by any member of a set of users that each have keys. Therefore, a message signed with a ring signature is endorsed by someone in a particular set of people. On ...
s, which groups a sender's outputs with other decoy outputs. Encryption of transaction amounts began in 2017 with the implementation of ring confidential transactions (RingCTs). Developers also implemented a
zero-knowledge proof In cryptography, a zero-knowledge proof or zero-knowledge protocol is a method by which one party (the prover) can prove to another party (the verifier) that a given statement is true while the prover avoids conveying any additional information a ...
method, "Bulletproofs", which guarantee a transaction occurred without revealing its value. Monero recipients are protected through "stealth addresses", addresses generated by users to receive funds, but untraceable to an owner by a network observer. These privacy features are enforced on the network by default, though users have the option to share a private view key to permit third party auditing of their wallet, or a transaction key to audit a transaction. Monero uses Dandelion++, a protocol which obscures the
IP address An Internet Protocol address (IP address) is a numerical label such as that is connected to a computer network that uses the Internet Protocol for communication.. Updated by . An IP address serves two main functions: network interface ident ...
of devices producing transactions. This is done through a method of transaction broadcast propagation; new transactions are initially passed to one node on Monero's peer-to-peer network, and a repeated
probabilistic method The probabilistic method is a nonconstructive method, primarily used in combinatorics and pioneered by Paul Erdős, for proving the existence of a prescribed kind of mathematical object. It works by showing that if one randomly chooses objects fr ...
is used to determine when the transaction should be sent to just one node or broadcast to many nodes in a process called flooding. This method was motivated by the growing blockchain analysis market and the potential use of
botnet A botnet is a group of Internet-connected devices, each of which runs one or more bots. Botnets can be used to perform Distributed Denial-of-Service (DDoS) attacks, steal data, send spam, and allow the attacker to access the device and its conn ...
s for analysis.


Efforts to trace transactions

In April 2017, researchers highlighted three major threats to Monero users' privacy. The first relies on leveraging the ring signature size of zero, and ability to see the output amounts. The second, "Leveraging Output Merging", involves tracking transactions where two outputs belong to the same user, such as when they send funds to themselves ("churning"). Finally, "Temporal Analysis", shows that predicting the right output in a ring signature could potentially be easier than previously thought. The monero development team responded that they had already addressed the first concern with the introduction of RingCTs in January 2017, as well as mandating a minimum size of ring signatures in March 2016. In 2018, researchers presented possible vulnerabilities in a paper titled "An Empirical Analysis of Traceability in the Monero Blockchain".Moser, Malte et al. (2018). "An Empirical Analysis of Traceability in the Monero Blockchain". ''Proceedings on Privacy Enhancing Technologies''. 2018 (3): 143. . The Monero team responded in March 2018. In September 2020, the United States Internal Revenue Service's criminal investigation division (IRS-CI), posted a $625,000 bounty for contractors who could develop tools to help trace Monero, other privacy-enhanced cryptocurrencies, the Bitcoin Lightning Network, or other "layer 2" protocols.Franceschi-Bicchierai, Lorenzo (2020-09-12).
The IRS Wants to Buy Tools to Trace Privacy-Focused Cryptocurrency Monero
". ''Motherboard''. Retrieved 2020-12-17.
The contract was awarded to blockchain analysis groups Chainalysis and Integra FEC.


Mining

Monero uses a
proof-of-work Proof of work (PoW) is a form of cryptographic proof in which one party (the ''prover'') proves to others (the ''verifiers'') that a certain amount of a specific computational effort has been expended. Verifiers can subsequently confirm this expe ...
algorithm, RandomX, to validate transactions. The method was introduced in November 2019 to replace the former algorithm CryptoNightR. Both algorithms were designed to be resistant to ASIC mining, which is commonly used to mine other cryptocurrencies such as Bitcoin. Monero can be mined somewhat efficiently on consumer-grade hardware such as
x86 x86 (also known as 80x86 or the 8086 family) is a family of complex instruction set computer (CISC) instruction set architectures initially developed by Intel based on the Intel 8086 microprocessor and its 8088 variant. The 8086 was intr ...
,
x86-64 x86-64 (also known as x64, x86_64, AMD64, and Intel 64) is a 64-bit version of the x86 instruction set, first released in 1999. It introduced two new modes of operation, 64-bit mode and compatibility mode, along with a new 4-level paging ...
,
ARM In human anatomy, the arm refers to the upper limb in common usage, although academically the term specifically means the upper arm between the glenohumeral joint (shoulder joint) and the elbow joint. The distal part of the upper limb between th ...
and
GPU A graphics processing unit (GPU) is a specialized electronic circuit designed to manipulate and alter memory to accelerate the creation of images in a frame buffer intended for output to a display device. GPUs are used in embedded systems, mobi ...
s, a design decision which was based on Monero project's opposition to mining centralisation which ASIC mining creates, but has also resulted in Monero's popularity among malware-based non-consensual miners. In October of 2021 the Monero project introduced P2Pool, a
mining pool In the context of cryptocurrency mining, a mining pool is the pooling of resources by miners, who share their processing power over a network, to split the reward equally, according to the amount of work they contributed to the probability of findi ...
running on a sidechain which gives participants full control of their node as with solo mining configurations.


Illicit use

Monero's privacy features have made it popular for illicit purposes.


Darknet markets

Monero is a common medium of exchange on darknet markets. In August 2016, dark market AlphaBay permitted its vendors to start accepting Monero as an alternative to bitcoin. The site was taken offline by law enforcement in 2017, but it was relaunched in 2021 with Monero as the sole permitted currency. ''Reuters'' reported in 2019 that three of the five largest darknet markets accepted Monero, though bitcoin was still the most widely used form of payment in those markets.


Mining malware

Hackers have embedded malware into websites and applications that hijack victim CPUs to mine Monero (sometimes called
cryptojacking Cryptojacking is the act of hijacking a computer to mine cryptocurrencies against the users will, through websites, or while the user is unaware. One notable piece of software used for cryptojacking was Coinhive, which was used in over two-thir ...
). In late 2017, malware and antivirus service providers blocked Coinhive, a
JavaScript JavaScript (), often abbreviated as JS, is a programming language that is one of the core technologies of the World Wide Web, alongside HTML and CSS. As of 2022, 98% of websites use JavaScript on the client side for webpage behavior, of ...
implementation of a Monero miner that was embedded in websites and apps, in some cases by hackers. Coinhive generated the script as an alternative to advertisements; a website or app could embed it, and use website visitor's CPU to mine the cryptocurrency while the visitor is consuming the content of the webpage, with the site or app owner getting a percentage of the mined coins. Some websites and apps did this without informing visitors, or in some cases using all possible system resources. As a result, the script was blocked by companies offering
ad blocking Ad blocking or ad filtering is a software capability for blocking or altering online advertising in a web browser, an application or a network. This may be done using browser extensions or other methods. Technologies and native countermeasures ...
subscription lists, antivirus services, and antimalware services. Coinhive had been previously found hidden in '' Showtime-''owned streaming platforms and Starbucks Wi-Fi hotspots in Argentina. Researchers in 2018 found similar malware that mined Monero and sent it to
Kim Il-sung University Kim Il-sung University, founded on 1 October 1946, is the first university built in North Korea. It is located on a campus in Pyongyang, the nation's capital. Along with the main academic buildings, the campus contains 10 separate offices, 50 l ...
in
North Korea North Korea, officially the Democratic People's Republic of Korea (DPRK), is a country in East Asia. It constitutes the northern half of the Korean Peninsula and shares borders with China and Russia to the north, at the Yalu (Amnok) and T ...
.


Ransomware

Monero is sometimes used by ransomware groups. According to
CNBC CNBC (formerly Consumer News and Business Channel) is an American basic cable business news channel. It provides business news programming on weekdays from 5:00 a.m. to 7:00 p.m., Eastern Time, while broadcasting talk sho ...
, in the first half of 2018, Monero was used in 44% of cryptocurrency ransomware attacks. One group behind the 2017
WannaCry ransomware attack The WannaCry ransomware attack was a worldwide cyberattack in May 2017 by the WannaCry ransomware cryptoworm, which targeted computers running the Microsoft Windows operating system by encrypting data and demanding ransom payments in the Bitco ...
, the Shadow Brokers, attempted to exchange the ransom they collected in bitcoin to Monero. '' Ars Technica'' and ''
Fast Company ''Fast Company'' is a monthly American business magazine published in print and online that focuses on technology, business, and design. It publishes six print issues per year. History ''Fast Company'' was launched in November 1995 by Alan Web ...
'' reported that the exchange was successful, but
BBC News BBC News is an operational business division of the British Broadcasting Corporation (BBC) responsible for the gathering and broadcasting of news and current affairs in the UK and around the world. The department is the world's largest broad ...
reported that the service the criminal attempted to use,
ShapeShift In mythology, folklore and speculative fiction, shape-shifting is the ability to physically transform oneself through an inherently superhuman ability, divine intervention, demonic manipulation, sorcery, spells or having inherited the ...
, denied any such transfer. The Shadow Brokers began accepting Monero as payment later in 2017. In 2021,
CNBC CNBC (formerly Consumer News and Business Channel) is an American basic cable business news channel. It provides business news programming on weekdays from 5:00 a.m. to 7:00 p.m., Eastern Time, while broadcasting talk sho ...
, the ''
Financial Times The ''Financial Times'' (''FT'') is a British daily newspaper printed in broadsheet and published digitally that focuses on business and economic current affairs. Based in London, England, the paper is owned by a Japanese holding company, Ni ...
'', and ''
Newsweek ''Newsweek'' is an American weekly online news magazine co-owned 50 percent each by Dev Pragad, its president and CEO, and Johnathan Davis, who has no operational role at ''Newsweek''. Founded as a weekly print magazine in 1933, it was widely ...
'' reported that demand for Monero was increasing following the recovery of a bitcoin ransom paid in the Colonial Pipeline cyber attack. The May 2021 hack forced the pipeline to pay a $4.4M ransom in bitcoin, though a large portion was recovered by the United States federal government the following month. The group behind the attack, DarkSide, normally requests payment in either bitcoin or Monero, but charge a 10–20% premium for payments made in bitcoin due to its increased traceability risk. Ransomware group
REvil REvil (Ransomware Evil; also known as Sodinokibi) was a Russia-based or Russian-speaking private ransomware-as-a-service (RaaS) operation. After an attack, REvil would threaten to publish the information on their page ''Happy Blog'' unless the ra ...
removed the option of paying ransom in bitcoin in 2021, demanding only Monero. Ransomware negotiators, groups that help victims pay ransoms, have contacted Monero developers to understand the technology. Despite this, CNBC reported that bitcoin was still the currency of choice demanded in most ransomware attacks, as insurers refuse to pay Monero ransom payments because of traceability concerns.


Regulatory responses

The attribution of Monero to illicit markets has influenced some exchanges to forgo listing it. This has made it more difficult for users to exchange Monero for fiat currencies or other cryptocurrencies. Exchanges in South Korea and Australia have delisted Monero and other privacy coins due to regulatory pressure. In 2018, Europol and its director Rob Wainwright wrote that the year would see criminals shift from using bitcoin to using Monero, as well as Ethereum,
Dash The dash is a punctuation mark consisting of a long horizontal line. It is similar in appearance to the hyphen but is longer and sometimes higher from the baseline. The most common versions are the endash , generally longer than the hyphen ...
, and Zcash. ''
Bloomberg Bloomberg may refer to: People * Daniel J. Bloomberg (1905–1984), audio engineer * Georgina Bloomberg (born 1983), professional equestrian * Michael Bloomberg (born 1942), American businessman and founder of Bloomberg L.P.; politician and m ...
'' and
CNN CNN (Cable News Network) is a multinational cable news channel headquartered in Atlanta, Georgia, U.S. Founded in 1980 by American media proprietor Ted Turner and Reese Schonfeld as a 24-hour cable news channel, and presently owned by ...
reported that this demand for Monero was because authorities were becoming better at monitoring the Bitcoin blockchain.


Publicity

* After many online payment platforms shut down access for
white nationalists White nationalism is a type of racial nationalism or pan-nationalism which espouses the belief that white people are a raceHeidi Beirich and Kevin Hicks. "Chapter 7: White nationalism in America". In Perry, Barbara. ''Hate Crimes''. Greenwoo ...
following the
Unite the Right rally The Unite the Right rally was a white supremacist rally that took place in Charlottesville, Virginia, from August 11 to 12, 2017. Marchers included members of the alt-right, neo-Confederates, neo-fascists, white nationalists, neo-Nazis, ...
in 2017, some of them, including
Christopher Cantwell Christopher Charles Cantwell (born November 12, 1980), also known as the Crying Nazi, is an American white supremacist, neo-Nazi, antisemitic conspiracy theorist, and federal informant. A member of the broader alt-right movement, Cantwell ea ...
and Andrew Auernheimer ("weev"), started using and promoting Monero. * In December 2017, the Monero team announced a partnership with 45 musicians and several online stores for Monero to be used as a form of payment for their merchandise. * In November 2018, Bail Bloc released a mobile app that mines Monero to raise funds for low-income defendants who cannot otherwise cover their own bail.


References


External links

* {{Portal bar, Economics, Free and open-source software, Internet, Numismatics, Money 2014 software Cryptocurrency projects Blockchains Currencies introduced in 2014 Private currencies Software using the MIT license Privacy Privacy software Application layer protocols