In this article I intend to discuss just a few of the points on privacy in modern society and in particular how it’s relation to the current state of the global financial system. I will be addressing both transparent and private blockchains as well as the looming new push toward Central Bank Digital Currencies.
BLOG: DEROHE and Homomorphic Encryption Versus Other Blockchain Privacy Solutions – Kryptoid
Homomorphic Encryption is the process of performing operations on encrypted data without decrypting it first. It has often been referred to as the holy grail in cryptography and distrubted computing. It has also been researched by the largest companies in the world such as IBM.
BLOG: DERO dARCH Event 1 – Kryptoid
10,000 DERO Prize Pool
Winners of each round receive exclusive dARCH NFA Trophies!
BLOG: What is DERO? – TheOA
DERO is a general purpose platform for building unstoppable decentralised applications and securely storing and transferring value. It is an original protocol which has been built from scratch and is maintained by the developer team who created it. This is not a fork or translation of any other layer 1 (L1) blockchain protocol.
BLOG: Dero Homomorphic Encryption v Trusted Execution Environment (TEE) for Privacy in Blockchain – TheOA
Trusted Execution Environment is a method like Homomorphic Encryption, to perform operations on data in a form of encrypted state, this form is quite different though. TEE’s work by taking in encrypted data and decrypting it into an encrypted trusted area (called an enclave with Intel SGX) where operations can be performed on the data behind encryption for privacy. The trust in this setup comes from having the data in a decrypted state and having to rely on the surrounding “enclave” to be secure. If you did not create this area, if it is proprietary, then you are trusting it is secure.
BLOG: Dero Homomorphic Encryption v Cryptonote Obfuscation for Privacy in Blockchain – TheOA
The Cryptonote protocol used by Monero, Zano, Haven and a lot of other projects quite often seems to get conflated with encryption when Cryptonote uses sender/receiver obfuscation as key images and stealth addresses. This is partly due to the UTXO model not lending itself to encryption as well as an account model does.