Premium Only Content
Discussing Bitcoin Privacy and Mixnet With Adam Back
Bitcoin 2022 will be the biggest party & networking event of the year!
Get 21% off tickets with promo code: YTMAG
https://b.tc/conference/
GET YOUR TICKETS TODAY BEFORE THIS PROMOTION ENDS :)
#bitcoin #bitcoimagazine #adamback #crypto
SHOWNOTES:
[00:07] Chapter 1: Reminder to grab your tickets for Bitcoin 2022! Use code ‘Satoshi’ to save and pay in bitcoin to save even more. Learn more at b.tc/conference
[01:50] Chapter 2: Harry Halpin joins the Space and introduces today’s topic.
[03:00] Chapter 3: Outlining issues with IP addresses and Bitcoin privacy. Explaining mixnets.
[08:30] Chapter 4: The history of mixnets and how HashCash and Mixmaster got started.
[13:00] Chapter 5: PipeNet and the Anonymity Trilemma.
[16:32] Chapter 6: Discussing Adam’s paper, Traffic Analysis Attacks and Trade-offs and Anonymity Providing Systems, and concerns with cryptocurrency privacy.
[19:25] Chapter 7: Why latency attacks are so difficult to protect against and discussing threat models.
[24:45] Chapter 8: How Nym differs from Tor.
[31:10] Chapter 9: Are these attacks realistic to de-anonymize Bitcoin users?
[33:10] Chapter 10: Cypherpunk history that’s been forgotten. Discussing what the Freedom Network was and if it differed from Tor.
[44:05] Chapter 11: When did the first use case for mixnets emerge?
[47:20] Chapter 12: How Chaumian e-cash predicted mixnets. The connection between Bitcoin, Mixmaster, PipeNet and Tor.
[55:32] Chapter 13: Is there a more general use for this technology? Ex: proving citizenship, vaccine status, etc.
[1:06:18] Chapter 12: Adam responds to the credential potential and what impact this has for privacy.
[1:08:47] Chapter 11: Q&A: Is Nym looking to have it’s own token? And, why did they accept funding from Andreessen Horowitz?
[1:17:40] Chapter 12: Exploring other solutions needed for privacy and alternative ways to prove identity.
[1:22:48] Chapter 13: What if you want your identity shared publicly?
[1:35:24] Chapter 14: The identity debate: What is needed, what are the options, where does Bitcoin fit in and where do identity technologies draw the line?
[1:48:25] Chapter 15: Everyone’s closing remarks. PKI is a hard problem to solve. Where do we go from here?
-
18:12:15
Bitcoin Magazine
22 days agoLIVE: BITCOIN BULL MARKET WATCH PARTY FEAT. GEMINI
99K46 -
DVR
Simply Bitcoin
1 day agoBitcoin Nomads: Building Circular Economies in Africa
870 -
1:09:06
Mike Rowe
12 hours agoWhy Are There Condoms In Women's Prisons? | Amie Ichikawa #454 | The Way I Heard It
4.87K9 -
34:05
Matt Kohrs
18 hours agoPlan B w/ Preston Pysh || The Matt Kohrs Show
14.8K -
2:10:55
MG Show
18 hours agoPeter Navarro Destroys the CFR; President Trump Meeting with Secretary General of NATO
15K11 -
1:37:13
FreshandFit
11 hours ago74 Year Old Wonders Why She's Still Single
285K13 -
2:08:09
Inverted World Live
10 hours agoThe Titanic, The Gold Standard, and Jekyll Island | Ep. 129
91.5K12 -
2:56:44
TimcastIRL
10 hours agoNBA Games RIGGED, 34 Indictments, Democrat Calls It TRUMP'S REVENGE | Timcast IRL
259K132 -
2:54:13
Laura Loomer
9 hours agoEP152: Texas Man Arrested For Threatening To Kill Laura Loomer
46.1K36 -
1:34:02
Man in America
13 hours agoEXPOSED: What the Vatican, CIA, & Elites Are HIDING About True Human Potential
71.4K36