Monero uses ring signatures, zero-knowledge proofs, "stealth addresses", and IP address–obscuring methods to obfuscate transaction details.
FactSnippet No. 1,626,339 |
Monero uses ring signatures, zero-knowledge proofs, "stealth addresses", and IP address–obscuring methods to obfuscate transaction details.
FactSnippet No. 1,626,339 |
Monero has the third-largest community of developers, behind bitcoin and Ethereum.
FactSnippet No. 1,626,341 |
Transaction outputs, or notes, of users sending Monero are obfuscated through ring signatures, which groups a sender's outputs with other decoy outputs.
FactSnippet No. 1,626,342 |
Monero recipients are protected through "stealth addresses", addresses generated by users to receive funds, but untraceable to an owner by a network observer.
FactSnippet No. 1,626,343 |
In October of 2021 the Monero project introduced P2Pool, a mining pool running on a sidechain which gives participants full control of their node as with solo mining configurations.
FactSnippet No. 1,626,344 |
Monero is a common medium of exchange on darknet markets.
FactSnippet No. 1,626,345 |
Researchers in 2018 found similar malware that mined Monero and sent it to Kim Il-sung University in North Korea.
FactSnippet No. 1,626,346 |
In 2021, CNBC, the Financial Times, and Newsweek reported that demand for Monero was increasing following the recovery of a bitcoin ransom paid in the Colonial Pipeline cyber attack.
FactSnippet No. 1,626,347 |
Bloomberg and CNN reported that this demand for Monero was because authorities were becoming better at monitoring the bitcoin blockchain.
FactSnippet No. 1,626,348 |