四、LEO币的新隐私设置
LEO币的新隐私设置了LEO币的区块链的新加密功能,这意味着在分类账上记录的每一个移动操作都是加密的。它的编写方式需要世界上所有的计算机花费上千年来解密,这形成了最高的安全级别。每一个身份和每一笔交易都变成了一系列的字母和数字,除非你知道如何把它还原回原来的状态,否则它们是没有任何意义的。把它想象成一个锁着的箱子,我们可以看到有一个箱子,但是里面却什么都没有。
LEO币正在引领数字货币的新方向。LEO币用户现在可以进入一个独特的级别。
这样他们就能够使用这些新的加密功能来“私人化”。这种方法将允许用户选择以一种更安全的形式来交易他们的货币,这是其他数字货币所没有的。
每个钱包都有两个地址,一个是公开的,一个是私人的(也叫秘密地址)。公开的地址和其他数字货币交易的工作方式完全一样——公开记录用户的匿名信息和每一枚LEO币的交易历史。然而,选择私有选项后,将启动“信任圈技术”,该技术将在区块链创建并确认交易,而不会公布潜在的可识别详细信息。该模型称为双密钥秘密地址,它通过不记录任何假名信息来保证用户信息的安全。
隐形地址的生成方式与普通的“比特币”地址不同,但它们具有类似的结构。双密钥隐藏地址包含更多信息,因为它要求事务的交易者知道公共扫描密钥和公共支出密钥,而公共扫描密钥和公共支出密钥不存储在区块链。执行这种事务所需的所有数据都可以从隐藏地址本身导出。
付款人从秘密地址导出一个新的正常地址,资金将被发送到该地址,并且在该过程中,只允许收款人计算相应的私钥。这是基于称为“Diffie - Hellman密钥交换”的数学原理。它只允许两个实体基于它们的密钥来生成共享密钥。就像著名的Enigma机器一样,传输两端的代码都没有关系,但如果没有Enigma机器使用的源代码,则无法翻译它。使用隐形地址系统,即使像巨像这样的超级计算机也无法破解它。
从本质上讲,这些货币是在从原始的钱包里寄出之后被销毁的,然后在它们到达收件人之前重新创建(这意味着这个过程不能被反向工程)。此外,LEO币的新隐私功能还包括一个私信功能,这样一来,交易双方就可以在隐私和私下交易的同时进行沟通。所有消息都由已经验证的AES - 256 - CBC算法加密,并分布在节点之间。即使“攻击者”可以查看整个网络,由于上述加密,消息信息也依然会是加密的。
数字货币是罪犯的朋友还是敌人?
Jason Weinstein是Steptoe & Johnson LLP的合作伙伴,也是美国司法部负责网络犯罪和有组织犯罪的前副总检察长,他最近就数字货币与犯罪使用的关系发表了演讲。
他说,用户的比特币地址就像一个账户号码,与用户保持联系;如果可以将该地址连接到用户,则可以标识和跟踪该用户使用该地址参与的所有事务。与银行一样,执法部门可以通过传票或其他合法程序获取有关地址用户的信息。有一些现有的和快速改进的技术,有助于将这些用户链接到他们的比特币地址和交易,其中包括对交易模式的分析,以便在同一个人使用的多个地址之间建立连接;从社会媒体和公共资源中挖掘数据;以及对用于交易的IP地址的分析。
他补充说,还有一个真正的属性优势:区块链的可追踪性、搜索能力和持久性。无论执法人员在明天或未来两年内确定一个地址的所有者,该代理人都将能够追溯到涉及该地址的每一笔交易,一直追溯到开始。
此外,由于分类账是公开存取的,执法人员不必担心存取数据需要什么类型的法律程序,而且由于分类账是无国界的,执法人员无需经过外国政府就可以获得数据。这就给了执法部门所需的数据,使他们能够以现金永远无法做到的方式“追踪资金”。
比特币的执法仍处于学习阶段,尽管前缉毒署( DEA )特工卡尔·弗力四号( Carl Force IV )在丝绸之路调查期间被判盗取比特币的案件表明,即使在这一早期阶段,执法部门就已经发展了利用区块链追踪比特币的令人印象深刻的能力。
(原文)
The new encryption features of LEOcoin’s blockchain means that every move that is recorded in the ledger is encrypted. It is written in a way that would take all the computers in the world thousands of years to decrypt and brings with it the highest levelof security. Every identity and every transaction is turned into a series ofletters and numbers that make no sense unless you know how to turn it back to its original state. Think of it as a locked chest, we can see that there is a chest but not what’s inside it.LEOcoin is spearheading a new direction for digital currencies. LEOcoin users now have access to a unique levelIs digital currency the criminal’s friend or foe?Jason Weinstein, a partner at Steptoe & Johnson LLP and a former deputy assistant attorney general in the US Department of Justice, in charge of cybercrime and organized crime, gave a recent speech on digital currency in relation to criminal use.He says a user’s Bitcoin address is like an account number that stays with the user; if you can connect that address to a user, you can identify and trace all of the transactions in which that individual has participated using that address.As with banks, law enforcement would be able to obtain information about the address user by serving a subpoena or following other lawful process. There are existing and rapidly improving techniques to help link those users to their Bitcoin addresses and transactions using, among other things, analysis of transaction patterns to make connections among multiple addresses used by the same individual; mining of data from social media and public sources; and analysis of IP addresses used to conduct transactions.He added that there’s also a real attribution advantage: the traceability, search ability, and permanence of the blockchain. Whether a law enforcement agent identifies the owner of an address tomorrow or two years from tomorrow, the agent will then be able to trace back every transaction involving that address, all the way back to the beginning.Moreover, because the ledger is publicly accessible, law enforcement does not have to worry about what type of legal process is required to access the data, and because the ledger is borderless, law enforcement can get the data without having to go through a foreign government. That gives law enforcement the data it needs to ’follow the money‘ in a way that would never be possible with cash.Law enforcement is still on a learning curve with Bitcoin, although the case against Carl Force IV, the former Drug Enforcement Administration (DEA) agent convicted of stealing bitcoins during the Silk Road investigation, demonstrates that even at this early stage, law enforcement has already developed an impressive capacity to follow the money using the blockchain.of functionality that will allow them to use these new encryption features to ‘go private’. This method will allow the user to choose to trade their currency in an even more secure form – something that no other digital currency offers.Every wallet will start with two addresses, one public and one private (also known as Stealth address). The public address will work in exactly the same way that other digital currency transactions work - publicly recording the user’s pseudonymous information and the transaction history of every LEOcoin. However, choosing the private option, launches ‘Ring of Trust Technology’, which essentially creates and confirms the transaction on the blockchain without publishing potentially identifiable details. This model is called Dual-key Stealth Addresses and it keeps users’information safe by not recording any pseudonymous information.Stealth addresses are generated in a different way than normal ‘Bitcoin’ addresses, but they have a similar structure. A dual-key stealth address contains a lot more information because it requires the sender of a transaction to know the public scan key and the public spend key, which is not stored on the blockchain. All data required to perform such a transaction is derivable from the stealth address itself.The payer derives a new, normal address from the Stealth address, to which the funds will be sent and in that process only allows the payee to compute the corresponding private key. This is based on the mathematical principle called the ‘Diffie-Hellman Key Exchange‘. It allows two entities to generate a shared secret based on their keypairs. Like with the famous Enigma machine, it did not matter if you had the code for either end of the transmission, if you didn’t have the source code the Enigma machine was using, you could not translate it. With the Stealth address system even a super computer like Colossus cannot crack it.Essentially, the coins are destroyed after they are sent from the original wallet and created anew before they arrive with the recipient (meaning the process cannot be reverse engineered).What’s more, LEOcoin’s new privacy functions include a private messenger function so that traders can communicate with the utmost privacy as well as trade privately.All messages are encrypted by the proven AES-256-CBC algorithm, and distributed between nodes. Even if the ‘assailants’ could view the entire network the message information would remain private due to the aforementioned encryption.
(翻译:Maisie, Linda)