Posts tagged on Monero

What is Stealth Address technology and Why Does Monero Use It?

Monero is based on the CryptoNote protocol and utilizes the most powerful cryptographic techniques in an effort to protect the privacy of the sender, recipient, and obfuscate the amount transacted. See Full Article

What is Stealth Address technology and Why Does Monero Use It? Illustration

Monero Windows and Linux CLI Compromised: The Analysis of Binaries

– As mentioned in the getmonero.org blog post, the binaries of Command Line Interface (CLI) of Monero were recently compromised. See Full Article

Monero Windows and Linux CLI Compromised: The Analysis of Binaries Illustration

MyMonero Phishing – Reversing the fake Android app

– With one of my many honeypots actived around the world wide web, I discovered an interesting script written with the famous Perl programming language. This Perl script is a malware used to remotely control a machine, opening what is technically called backdoor. If this malicious program runs on multiple machines, there is a possibility that the attacker may have created a botnet. See Full Article

MyMonero Phishing – Reversing the fake Android app Illustration

Mastering Monero first edition has been released

‘Mastering Monero: The future of private transactions’ is your guide through the world of Monero, a leading cryptocurrency with a focus on private and censorship-resistant transactions. This book contains everything you need to know to start using Monero in your business or day-to-day life, even if you’ve never understood or interacted with cryptocurrencies before. See Full Article

Mastering Monero first edition has been released Illustration

All tags