Discussing Bitcoin Privacy and Mixnet With Adam Back

2 years ago
18

Bitcoin 2022 will be the biggest party & networking event of the year!
Get 21% off tickets with promo code: YTMAG
https://b.tc/conference/

GET YOUR TICKETS TODAY BEFORE THIS PROMOTION ENDS :)

#bitcoin #bitcoimagazine #adamback #crypto

SHOWNOTES:

[00:07] Chapter 1: Reminder to grab your tickets for Bitcoin 2022! Use code ‘Satoshi’ to save and pay in bitcoin to save even more. Learn more at b.tc/conference
[01:50] Chapter 2: Harry Halpin joins the Space and introduces today’s topic.
[03:00] Chapter 3: Outlining issues with IP addresses and Bitcoin privacy. Explaining mixnets.
[08:30] Chapter 4: The history of mixnets and how HashCash and Mixmaster got started.
[13:00] Chapter 5: PipeNet and the Anonymity Trilemma.
[16:32] Chapter 6: Discussing Adam’s paper, Traffic Analysis Attacks and Trade-offs and Anonymity Providing Systems, and concerns with cryptocurrency privacy.
[19:25] Chapter 7: Why latency attacks are so difficult to protect against and discussing threat models.
[24:45] Chapter 8: How Nym differs from Tor.
[31:10] Chapter 9: Are these attacks realistic to de-anonymize Bitcoin users?
[33:10] Chapter 10: Cypherpunk history that’s been forgotten. Discussing what the Freedom Network was and if it differed from Tor.
[44:05] Chapter 11: When did the first use case for mixnets emerge?
[47:20] Chapter 12: How Chaumian e-cash predicted mixnets. The connection between Bitcoin, Mixmaster, PipeNet and Tor.
[55:32] Chapter 13: Is there a more general use for this technology? Ex: proving citizenship, vaccine status, etc.
[1:06:18] Chapter 12: Adam responds to the credential potential and what impact this has for privacy.
[1:08:47] Chapter 11: Q&A: Is Nym looking to have it’s own token? And, why did they accept funding from Andreessen Horowitz?
[1:17:40] Chapter 12: Exploring other solutions needed for privacy and alternative ways to prove identity.
[1:22:48] Chapter 13: What if you want your identity shared publicly?
[1:35:24] Chapter 14: The identity debate: What is needed, what are the options, where does Bitcoin fit in and where do identity technologies draw the line?
[1:48:25] Chapter 15: Everyone’s closing remarks. PKI is a hard problem to solve. Where do we go from here?

Loading comments...