Members

The directory of privacy tech

Monero

Unlike many cryptocurrencies that are derivatives of Bitcoin, Monero is based on the CryptoNight proof-of-work hash algorithm, which comes from the CryptoNote protocol. The CryptoNote protocol possesses significant algorithmic differences relating to blockchain obfuscation. In particular, the ring signatures mix the spender's input with a group of others, making it exponentially more difficult to establish a link between each subsequent transaction

 

Visit Website