Loading AI tools
Privacy-focused cryptocurrency From Wikipedia, the free encyclopedia
Monero (/məˈnɛroʊ/; Abbreviation: XMR) is a cryptocurrency which uses a blockchain with privacy-enhancing technologies to obfuscate transactions to achieve anonymity and fungibility. Observers cannot decipher addresses trading Monero, transaction amounts, address balances, or transaction histories.[2]
Denominations | |
---|---|
Plural | moneroj |
Code | XMR |
Precision | 10−12 |
Subunits | |
1⁄1000 | millinero |
Development | |
Original author(s) | Nicolas van Saberhagen |
White paper | "CryptoNote v 2.0" |
Initial release | 18 April 2014 |
Latest release | 0.18.3.3 / 2 April 2024 |
Code repository | github |
Development status | Active |
Project fork of | Bytecoin[a] |
Written in | C++ |
Operating system | Linux, Windows, macOS, Android, FreeBSD |
Source model | FOSS |
License | MIT License |
Ledger | |
Timestamping scheme | Proof-of-work |
Hash function | RandomX |
Block reward | XMR 0.6 ≥[1] |
Block time | 2 minutes |
Circulating supply | >18,444,828 (2024-06-02) |
Supply limit | Unlimited |
Website | |
Website | getmonero |
|
The protocol is open source and based on CryptoNote v2, a concept described in a 2013 white paper authored by Nicolas van Saberhagen. Developers used this concept to design Monero, and deployed its mainnet in 2014. The Monero protocol includes various methods to obfuscate transaction details, though users can optionally share view keys for third-party auditing.[3] Transactions are validated through a miner network running RandomX, a proof-of-work algorithm. The algorithm issues new coins to miners and was designed to be resistant against application-specific integrated circuit (ASIC) mining.
Monero's privacy features have attracted cypherpunks and users desiring privacy measures not provided in other cryptocurrencies. A Dutch–Italian study published in 2022 decisively concluded "For now, Monero is untraceable. However, it is probably only a matter of time and effort before it changes."[4]
Due to its perceived untraceability Monero is gaining increased use in illicit activities such as money laundering, darknet markets, ransomware, cryptojacking, and other organized crime. The United States Internal Revenue Service (IRS) has posted bounties for contractors that can develop Monero-tracing technologies.[5]
Monero's roots trace back to CryptoNote v2, a cryptocurrency protocol first introduced in a white paper published by the presumed pseudonymous Nicolas van Saberhagen in October 2013.[6] In the paper, the author described privacy and anonymity as "the most important aspects of electronic cash" and characterized bitcoin's traceability as a "critical flaw".[7] A Bitcointalk forum user known as "thankful_for_today" implemented these ideas into a coin they called BitMonero. However, other forum users disagreed with thankful_for_today's direction for BitMonero and decided to fork it in 2014, leading to the creation of Monero.[6] Monero translates to coin in Esperanto.[6] Both van Saberhagen and thankful_for_today remain anonymous.[6]
Monero has the third-largest community of developers, behind Bitcoin and Ethereum.[7] The protocol's lead maintainer was previously South African developer Riccardo Spagni.[8] Much of the core development team chooses to remain anonymous.[9]
Improvements to Monero's protocol and features are, in part, the task of the Monero Research Lab (MRL), some of whom are anonymous.[citation needed]
Monero's key features are those around privacy and anonymity.[10][6][9] Even though it is a public and decentralized ledger, all transaction details are obfuscated.[11] This contrasts to bitcoin, where all transaction details, user addresses, and wallet balances are public and transparent.[6][9] These features have given Monero a loyal following among crypto anarchists, cypherpunks, and privacy advocates.[7]
The transaction outputs, or notes, of users sending Monero are obfuscated through ring signatures, which groups a sender's outputs with other decoy outputs.[citation needed] Encryption of transaction amounts began in 2017 with the implementation of ring confidential transactions (RingCTs).[6][12] Developers also implemented a zero-knowledge proof method, "Bulletproofs", which guarantee a transaction occurred without revealing its value.[13] Monero recipients are protected through "stealth addresses", addresses generated by users to receive funds, but untraceable to an owner by a network observer.[6] These privacy features are enforced on the network by default.[6]
Monero uses Dandelion++, a protocol which obscures the IP address of devices producing transactions. This is done through a method of transaction broadcast propagation; new transactions are initially passed to one node on Monero's peer-to-peer network, and a repeated probabilistic method is used to determine when the transaction should be sent to just one node or broadcast to many nodes in a process called flooding.[14][15]
In April 2017, researchers highlighted three major threats to Monero users' privacy. The first relies on leveraging the ring signature size of zero, and ability to see the output amounts. The second, "Leveraging Output Merging", involves tracking transactions where two outputs belong to the same user, such as when they send funds to themselves ("churning"). Finally, "Temporal Analysis", shows that predicting the right output in a ring signature could potentially be easier than previously thought.[16] In 2018, researchers presented possible vulnerabilities in a paper titled "An Empirical Analysis of Traceability in the Monero Blockchain".[17]
In September 2020, the United States Internal Revenue Service's criminal investigation division (IRS-CI), posted a $625,000 bounty for contractors who could develop tools to help trace Monero, other privacy-enhanced cryptocurrencies, the Bitcoin Lightning Network, or other "layer 2" protocol.[5][7] The contract was awarded to blockchain analysis groups Chainalysis and Integra FEC.[7]
Monero uses a proof-of-work algorithm, RandomX, to validate transactions. The method was introduced in November 2019 to replace the former algorithm CryptoNightR.[citation needed] Both algorithms were designed to be resistant to ASIC mining, which is commonly used to mine other cryptocurrencies such as bitcoin.[18][19] Monero can be mined somewhat efficiently on consumer-grade hardware such as x86, x86-64, ARM and GPUs, a design decision which was based on Monero project's opposition to mining centralisation which ASIC mining creates,[20] but has also resulted in Monero's popularity among malware-based non-consensual miners.[21][22]
Monero's privacy features have made it popular for illicit purposes.[11][23][24]
Monero is a common medium of exchange on darknet markets.[6] In August 2016, dark market AlphaBay permitted its vendors to start accepting Monero as an alternative to bitcoin.[6] The site was taken offline by law enforcement in 2017,[25] but it was relaunched in 2021 with Monero as the sole permitted currency.[26] Reuters reported in 2019 that three of the five largest darknet markets accepted Monero, though bitcoin was still the most widely used form of payment in those markets.[11]
Hackers have embedded malware into websites and applications that hijack victim CPUs to mine Monero (sometimes called cryptojacking).[8][27] In late 2017, malware and antivirus service providers blocked Coinhive, a JavaScript implementation of a Monero miner that was embedded in websites and apps, in some cases by hackers. Coinhive generated the script as an alternative to advertisements; a website or app could embed it, and use website visitor's CPU to mine the cryptocurrency while the visitor is consuming the content of the webpage, with the site or app owner getting a percentage of the mined coins.[28] Some websites and apps did this without informing visitors, or in some cases using all possible system resources. As a result, the script was blocked by companies offering ad blocking subscription lists, antivirus services, and antimalware services.[29][27] Coinhive had been previously found hidden in Showtime-owned streaming platforms[30] and Starbucks Wi-Fi hotspots in Argentina.[8][31] Researchers in 2018 found similar malware that mined Monero and sent it to Kim Il-sung University in North Korea.[32]
Monero is sometimes used by ransomware groups. According to CNBC, in the first half of 2018, Monero was used in 44% of cryptocurrency ransomware attacks.[34]
The perpetrators of the 2017 WannaCry ransomware attack, which was attributed by the US government to North Korean threat actors,[35] attempted to exchange the ransom they collected in Bitcoin to Monero. Ars Technica and Fast Company reported that the exchange was successful,[36][8] but BBC News reported that the service the criminals attempted to use, ShapeShift, denied any such transfer.[37] The Shadow Brokers, who leaked the exploits which were subsequently used in WannaCry but are unlikely to have been involved in the attack, began accepting Monero as payment later in 2017.[36]
In 2021, CNBC, the Financial Times, and Newsweek reported that demand for Monero was increasing following the recovery of a bitcoin ransom paid in the Colonial Pipeline cyber attack.[9][7][38] The May 2021 hack forced the pipeline to pay a $4.4M ransom in bitcoin, though a large portion was recovered by the United States federal government the following month.[38] The group behind the attack, DarkSide, normally requests payment in either bitcoin or Monero, but charge a 10–20% premium for payments made in bitcoin due to its increased traceability risk.[7] Ransomware group REvil removed the option of paying ransom in bitcoin in 2021, demanding only Monero.[7] Ransomware negotiators, groups that help victims pay ransoms, have contacted Monero developers to understand the technology.[7] Despite this, CNBC reported that bitcoin was still the currency of choice demanded in most ransomware attacks, as insurers refuse to pay Monero ransom payments because of traceability concerns.[9]
The attribution of Monero to illicit markets has influenced some exchanges to forgo listing it. This has made it more difficult for users to exchange Monero for fiat currencies or other cryptocurrencies.[9] Exchanges in South Korea and Australia have delisted Monero and other privacy coins due to regulatory pressure.[39]
In 2018, Europol and its director Rob Wainwright wrote that the year would see criminals shift from using bitcoin to using Monero, as well as Ethereum, Dash, and Zcash.[40] Bloomberg and CNN reported that this demand for Monero was because authorities were becoming better at monitoring the Bitcoin blockchain.[41][40]
On 20 February 2024, the cryptocurrency exchange Binance delisted Monero, citing regulatory compliance.[42]
On 11 April 2024, Kraken announced they would be delisting Monero for users located in Ireland and Belgium on June 10, 2024. As of 10 May 2024 Monero deposits and trades have been suspended.[43][non-primary source needed]
Seamless Wikipedia browsing. On steroids.
Every time you click a link to Wikipedia, Wiktionary or Wikiquote in your browser's search results, it will show the modern Wikiwand interface.
Wikiwand extension is a five stars, simple, with minimum permission required to keep your browsing private, safe and transparent.