enow.com Web Search

Search results

  1. Results from the WOW.Com Content Network
  2. Monero - Wikipedia

    en.wikipedia.org/wiki/Monero

    Monero's roots trace back to CryptoNote v2, a cryptocurrency protocol first introduced in a white paper published by the presumed pseudonymous Nicolas van Saberhagen in October 2013. [6] In the paper, the author described privacy and anonymity as "the most important aspects of electronic cash" and characterized bitcoin 's traceability as a ...

  3. Unspent transaction output - Wikipedia

    en.wikipedia.org/wiki/Unspent_transaction_output

    The conceptual framework of the UTXO model can be traced back to Hal Finney's Reusable Proofs of Work proposal, [4] which itself was based on Adam Back's 1997 Hashcash proposal. [5] Bitcoin, released in 2009, was the first widespread implementation of the UTXO model in practice. [1]

  4. Cypherpunk - Wikipedia

    en.wikipedia.org/wiki/Cypherpunk

    The people in this room hope for a world where an individual's informational footprints—everything from an opinion on abortion to the medical record of an actual abortion—can be traced only if the individual involved chooses to reveal them; a world where coherent messages shoot around the globe by network and microwave, but intruders and ...

  5. Cryptocurrency tumbler - Wikipedia

    en.wikipedia.org/wiki/Cryptocurrency_tumbler

    In February 2015, a total of 7,170 Bitcoin was stolen from the Chinese exchange Bter.com and traced back to the same tumbler. [ 9 ] In May 2019, FinCEN published a Guidance document that mentioned anonymizing services and mentioned particularly "tumblers".

  6. Monero (cryptocurrency) - Wikipedia

    en.wikipedia.org/?title=Monero_(cryptocurrency...

    Semi-protected: This is a redirect from a title that is semi-protected from editing for any of several possible reasons.. Please do not replace these redirected links with links directly to the target page unless expressly advised to do so below or elsewhere on this page, or if the change is supported by a policy or guideline.

  7. Cryptocurrency and crime - Wikipedia

    en.wikipedia.org/wiki/Cryptocurrency_and_crime

    As of June 2018, most ransomware attackers preferred to use currencies other than bitcoin, with 44% of attacks in the first half of 2018 demanding Monero, which is highly private and difficult to trace, compared to 10% for bitcoin and 11% for Ether. [145]

  8. Dash (cryptocurrency) - Wikipedia

    en.wikipedia.org/wiki/Dash_(cryptocurrency)

    One of Dash's distinguishing features is CoinJoin, a privacy-enhancing technology that enables users to mix their transactions, making it more difficult to trace transaction histories. [ 11 ] Additionally, the platform introduced InstantSend, which allows for near-instant transactions by locking inputs in a transaction through consensus among ...

  9. Zealot Campaign - Wikipedia

    en.wikipedia.org/wiki/Zealot_Campaign

    The Zealot Campaign is a cryptocurrency mining malware collected from a series of stolen National Security Agency (NSA) exploits, released by the Shadow Brokers group on both Windows and Linux machines to mine cryptocurrency, specifically Monero.