Recent from talks
Contribute something
Nothing was collected or created yet.
Monero
View on Wikipedia
| Denominations | |
|---|---|
| Plural | moneroj |
| Code | XMR |
| Precision | 10−12 |
| Development | |
| Original author | Nicolas van Saberhagen |
| White paper | "CryptoNote v 2.0" |
| Initial release | 18 April 2014 |
| Latest release | 0.18.4.3 / 9 October 2025 |
| Code repository | github |
| Development status | Active |
| Project fork of | Bytecoin[a] |
| Written in | C++ |
| Operating system | Linux, Windows, macOS, Android, FreeBSD |
| Source model | FOSS |
| License | MIT License |
| Ledger | |
| Timestamping scheme | Proof-of-work |
| Hash function | RandomX |
| Block reward | XMR 0.6 ≥[1] |
| Block time | 2 minutes |
| Circulating supply | >18,444,828 (2024-06-02) |
| Supply limit | Unlimited |
| Website | |
| Website | getmonero |
| |
Monero (/məˈnɛroʊ/; Abbreviation: XMR) is a blockchain-based cryptocurrency which is private, untraceable, fungible, and decentralized.[2]
The protocol is open source and based on CryptoNote v2, a concept described in a 2013 white paper authored by Nicolas van Saberhagen. Developers used this concept to design Monero, and deployed its mainnet in 2014. The Monero protocol includes various methods to obfuscate transaction details, though users can optionally share view keys for third-party auditing.[3] Transactions are validated through a miner network running RandomX, a proof-of-work algorithm. The algorithm issues new coins to miners and was designed to be resistant against application-specific integrated circuit (ASIC) mining.
Monero's privacy features have attracted cypherpunks and users desiring privacy measures not provided in other cryptocurrencies. A Dutch–Italian study published in 2022 decisively concluded "For now, Monero is untraceable. However, it is probably only a matter of time and effort before it changes."[4]
Due to its perceived untraceability Monero is gaining increased use in illicit activities such as money laundering, darknet markets, ransomware, cryptojacking, and other organized crime. The United States Internal Revenue Service (IRS) has offered funding for contractors that can develop Monero tracing technologies.[5]
Background
[edit]Monero's roots trace back to CryptoNote v2, a cryptocurrency protocol first introduced in a white paper published by the presumed pseudonymous Nicolas van Saberhagen in October 2013.[6] In the paper, the author described privacy and anonymity as "the most important aspects of electronic cash" and characterized bitcoin's traceability as a "critical flaw".[7] A Bitcointalk forum user known as "thankful_for_today" implemented these ideas into a coin they called BitMonero. However, other forum users disagreed with thankful_for_today's direction for BitMonero and decided to fork it in 2014, leading to the creation of Monero.[6] Monero translates to coin in Esperanto.[6] Both van Saberhagen and thankful_for_today remain anonymous.[6]
Monero has the third-largest community of developers, behind bitcoin and Ethereum.[7] The protocol's lead maintainer was previously South African developer Riccardo Spagni.[8] Much of the core development team chooses to remain anonymous.[9]
Improvements to Monero's protocol and features are, in part, the task of the Monero Research Lab (MRL), some of whom are anonymous.[citation needed]
Privacy
[edit]
Monero's key features are those around privacy and anonymity.[10][6][9] Even though it is a public and decentralized ledger, all transaction details are obfuscated.[11] This contrasts to bitcoin, where all transaction details, user addresses, and wallet balances are public and transparent.[6][9] These features have given Monero a loyal following among crypto anarchists, cypherpunks, and privacy advocates.[7]
The transaction outputs, or notes, of users sending Monero are obfuscated through ring signatures, which groups a sender's outputs with other decoy outputs.[citation needed] Encryption of transaction amounts began in 2017 with the implementation of ring confidential transactions (RingCTs).[6][12] Developers also implemented a zero-knowledge proof method, "Bulletproofs", which guarantee a transaction occurred without revealing its value.[13] Monero recipients are protected through "stealth addresses", public keys generated by the sender that are untraceable to the receiver by a network observer.[6] These privacy features are enforced on the network by default.[6]
Monero uses Dandelion++, a protocol which obscures the IP address of devices producing transactions. This is done through a method of transaction broadcast propagation; new transactions are initially passed to one node on Monero's peer-to-peer network, and a repeated probabilistic method is used to determine when the transaction should be sent to just one node or broadcast to many nodes in a process called flooding.[14][15]
Efforts to trace transactions
[edit]In April 2017, researchers highlighted three major threats to Monero users' privacy. The first relies on leveraging the ring signature size of zero, and ability to see the output amounts. The second, "Leveraging Output Merging", involves tracking transactions where two outputs belong to the same user, such as when they send funds to themselves ("churning"). Finally, "Temporal Analysis", shows that predicting the right output in a ring signature could potentially be easier than previously thought.[16] In 2018, researchers presented possible vulnerabilities in a paper titled "An Empirical Analysis of Traceability in the Monero Blockchain".[17]
In September 2020, the United States Internal Revenue Service's criminal investigation division (IRS-CI), posted a $625,000 bounty for contractors who could develop tools to help trace Monero, other privacy-enhanced cryptocurrencies, the Bitcoin Lightning Network, or other "layer 2" protocol.[5][7] The contract was awarded to blockchain analysis groups Chainalysis and Integra FEC.[7]
Mining
[edit]
Monero uses a proof-of-work algorithm, RandomX, to validate transactions. The method was introduced in November 2019 to replace the former algorithm CryptoNightR.[citation needed] Both algorithms were designed to be resistant to ASIC mining, which is commonly used to mine other cryptocurrencies such as bitcoin.[18][19] Monero can be mined somewhat efficiently on consumer-grade hardware such as x86, x86-64, ARM and GPUs, a design decision which was based on Monero project's opposition to mining centralisation which ASIC mining creates,[20] but has also resulted in Monero's popularity among malware-based non-consensual miners.[21][22]
Use
[edit]Monero's privacy features have made it popular for illicit purposes.[11][23][24]
After many online payment platforms shut down access for white nationalists following the Unite the Right rally in 2017, some of them, including Christopher Cantwell and Andrew Auernheimer ("weev"), started using and promoting Monero.[25][26]
Darknet markets
[edit]Monero is a common medium of exchange on darknet markets.[6] In August 2016, dark market AlphaBay permitted its vendors to start accepting Monero as an alternative to bitcoin.[6] The site was taken offline by law enforcement in 2017,[27] but it was relaunched in 2021 with Monero as the sole permitted currency.[28] Reuters reported in 2019 that three of the five largest darknet markets accepted Monero, though bitcoin was still the most widely used form of payment in those markets.[11]
Mining malware
[edit]In late 2017, malware and antivirus service providers blocked Coinhive, a JavaScript implementation of a Monero miner that was embedded in websites and apps, in some cases by hackers. Coinhive generated the script as an alternative to advertisements; a website or app could embed it, and use website visitors' CPU to mine the cryptocurrency while the visitor is consuming the content of the webpage, with the site or app owner getting a percentage of the mined coins.[29] Some websites and apps did this without informing visitors, or in some cases using all possible system resources. As a result, the script was blocked by companies offering ad blocking subscription lists, antivirus services, and antimalware services.[30][31] Coinhive had been previously found hidden in Showtime-owned streaming platforms[32] and Starbucks Wi-Fi hotspots in Argentina.[8][33] Researchers in 2018 found similar malware that mined Monero and sent it to Kim Il-sung University in North Korea.[34]
Ransomware
[edit]
Monero is sometimes used by ransomware groups. According to CNBC, in the first half of 2018, Monero was used in 44% of cryptocurrency ransomware attacks.[36]
The perpetrators of the 2017 WannaCry ransomware attack, which was attributed by the US government to North Korean threat actors,[37] attempted to exchange the ransom they collected in Bitcoin to Monero. Ars Technica and Fast Company reported that the exchange was successful,[38][8] but BBC News reported that the service the criminals attempted to use, ShapeShift, denied any such transfer.[39] The Shadow Brokers, who leaked the exploits which were subsequently used in WannaCry but are unlikely to have been involved in the attack, began accepting Monero as payment later in 2017.[38]
In 2021, CNBC, the Financial Times, and Newsweek reported that demand for Monero was increasing following the recovery of a bitcoin ransom paid in the Colonial Pipeline cyber attack.[9][7][40] The May 2021 hack forced the pipeline to pay a $4.4M ransom in bitcoin, though a large portion was recovered by the United States federal government the following month.[40] The group behind the attack, DarkSide, normally requests payment in either bitcoin or Monero, but charge a 10–20% premium for payments made in bitcoin due to its increased traceability risk.[7] Ransomware group REvil removed the option of paying ransom in bitcoin in 2021, demanding only Monero.[7] Ransomware negotiators, groups that help victims pay ransoms, have contacted Monero developers to understand the technology.[7] Despite this, CNBC reported that bitcoin was still the currency of choice demanded in most ransomware attacks, as insurers refuse to pay Monero ransom payments because of traceability concerns.[9]
Regulatory responses
[edit]The attribution of Monero to illicit markets has influenced some exchanges to forgo listing it. This has made it more difficult for users to exchange Monero for fiat currencies or other cryptocurrencies.[9] Exchanges in South Korea and Australia have delisted Monero and other privacy coins due to regulatory pressure.[41]
In 2018, Europol and its director Rob Wainwright wrote that the year would see criminals shift from using bitcoin to using Monero, as well as Ethereum, Dash, and Zcash.[42] Bloomberg and CNN reported that this demand for Monero was because authorities were becoming better at monitoring the Bitcoin blockchain.[43][42]
On 20 February 2024, the cryptocurrency exchange Binance delisted Monero, citing regulatory compliance.[44]
On 11 April 2024, Kraken announced that they would be delisting Monero for users located in Ireland and Belgium on 10 June. Monero deposits and trades were suspended on 10 May.[45] On 31 October 2024, Kraken halted all trading and deposits of Monero for users in the EEA. In the following months, Monero withdrawals were suspended for EEA users, and any remaining Monero balances were converted to bitcoin.[46][non-primary source needed]
See also
[edit]References
[edit]- ^ Trajcevski, Milko (8 June 2022). "Monero (XMR) Tail Emission Upgrade Explained". Yahoo!Finance. FX Empire. Archived from the original on 3 December 2024. Retrieved 8 July 2024.
- ^ Braun-Dubler, Nils; Gier, Hans-Peter; Bulatnikova, Tetiana; Langhart, Manuel; Merki, Manuela; Roth, Florian; Burret, Antoine; Perdrisat, Simon (16 June 2020). Blockchain: Capabilities, Economic Viability, and the Socio-Technical Environment. vdf Hochschulverlag AG. p. 166. ISBN 978-3-7281-4016-6. Archived from the original on 29 October 2023. Retrieved 11 July 2025.
- ^ Lacity, Mary C.; Lupien, Steven C. (8 August 2022). Blockchain Fundamentals for Web 3.0: -. University of Arkansas Press. pp. 9–33. ISBN 978-1-61075-790-4. Archived from the original on 29 October 2023. Retrieved 22 July 2023.
- ^ Bahamazava K, Nanda R. The shift of DarkNet illegal drug trade preferences in cryptocurrency: The question of traceability and deterrence. For Sci Int: Dig Investigation. 2022;40 doi: 10.1016/j.fsidi.2022.301377.
- ^ a b Franceschi-Bicchierai, Lorenzo (2020-09-12). "The IRS Wants to Buy Tools to Trace Privacy-Focused Cryptocurrency Monero Archived 4 May 2025 at the Wayback Machine ". Motherboard. Retrieved 2020-12-17.
- ^ a b c d e f g h i j k "Monero, the Drug Dealer's Cryptocurrency of Choice, Is on Fire". WIRED. Archived from the original on 10 December 2018. Retrieved 22 November 2017.
- ^ a b c d e f g h i Murphy, Hannah (22 June 2021). "Inside monero, emerging crypto of choice for cybercriminals". Financial Times. Archived from the original on 3 November 2021. Retrieved 22 June 2021.
- ^ a b c Melendez, Steven (18 December 2017). "Highly Anonymized Cryptocurrency Monero Peeks Out Of The Shadows". Fast Company. Archived from the original on 18 December 2017. Retrieved 22 June 2021.
- ^ a b c d e f Sigalos, MacKenzie (13 June 2021). "Why some cyber criminals are ditching bitcoin for a cryptocurrency called monero". CNBC. Archived from the original on 13 June 2021. Retrieved 22 June 2021.
- ^ Hern, Alex (11 December 2017). "Missed the bitcoin boom? Five more baffling cryptocurrencies to blow your savings on". The Guardian. ISSN 0261-3077. Archived from the original on 15 December 2018. Retrieved 11 December 2018.
- ^ a b c Wilson, Tom (15 May 2019). "Explainer: 'Privacy coin' Monero offers near total anonymity". Reuters. Archived from the original on 6 October 2023. Retrieved 11 June 2021.
- ^ "Bittercoin: true blockchain believers versus the trough of disillusionment". TechCrunch. 13 March 2017. Archived from the original on 20 December 2018. Retrieved 19 December 2018.
- ^ Alsalami, Nasser; Zhang, Bingsheng (2019). "SoK: A Systematic Study of Anonymity in Cryptocurrencies". 2019 IEEE Conference on Dependable and Secure Computing (DSC). pp. 1–6. doi:10.1109/DSC47296.2019.8937681.
- ^ Bojja Venkatakrishnan, Shaileshh; Fanti, Giulia; Viswanath, Pramod (13 June 2017). "Dandelion: Redesigning the Bitcoin Network for Anonymity". Proceedings of the ACM on Measurement and Analysis of Computing Systems. 1 (1): 22:1–22:34. arXiv:1701.04439. doi:10.1145/3084459.
- ^ Fanti, Giulia; Venkatakrishnan, Shaileshh Bojja; Bakshi, Surya; Denby, Bradley; Bhargava, Shruti; Miller, Andrew; Viswanath, Pramod (13 June 2018). "Dandelion++: Lightweight Cryptocurrency Networking with Formal Anonymity Guarantees". Proceedings of the ACM on Measurement and Analysis of Computing Systems. 2 (2): 29:1–29:35. arXiv:1805.11060. doi:10.1145/3224424.
- ^ Kumar, Amrit et al. (2017). "A Traceability Analysis of Monero's Blockchain Archived 2017-07-10 at the Wayback Machine". Cryptology ePrint Archive. Retrieved 2020-12-20.
- ^ Moser, Malte et al. (2018). "An Empirical Analysis of Traceability in the Monero Blockchain". Proceedings on Privacy Enhancing Technologies. 2018 (3): 143. doi:10.1515/popets-2018-0025.
- ^ "How a few companies are bitcoining it". The Economist. 19 May 2018. ISSN 0013-0613. Archived from the original on 9 December 2018. Retrieved 11 December 2018.
- ^ Gibbs, Samuel (13 December 2017). "Billions of video site visitors unwittingly mine cryptocurrency as they watch". The Guardian. ISSN 0261-3077. Archived from the original on 13 November 2020. Retrieved 11 December 2018.
- ^ Oberhaus, Daniel (9 April 2018). "What Is an ASIC Miner and Is It the Future of Cryptocurrency?". Vice.com. Vice Media. Archived from the original on 18 August 2022. Retrieved 8 January 2022.
- ^ Brandom, Russell (19 December 2017). "Backdoor coin-mining hacks are spreading as prices rise". The Verge. Archived from the original on 11 December 2018. Retrieved 11 December 2018.
- ^ Palmer, Danny. "Cyber attackers are cashing in on cryptocurrency mining - but here's why they're avoiding bitcoin". ZDNet. Archived from the original on 26 March 2019. Retrieved 11 December 2018.
- ^ Kshetri, Nir (2018). "Cryptocurrencies: Transparency Versus Privacy". Computer. IEEE Computer Society. 51 (11): 99–111. doi:10.1109/MC.2018.2876182.
- ^ "Meet Monero, the Currency Dark Net Dealers Hope Is More Anonymous Than Bitcoin". Motherboard. 23 August 2016. Archived from the original on 18 November 2018. Retrieved 18 November 2018.
- ^ Hayden, Michael Edison (27 March 2018). "White supremacists are investing in a cryptocurrency that promises to be completely untraceable". Newsweek. Archived from the original on 7 April 2019. Retrieved 6 September 2018.
- ^ Cox, Joseph (5 March 2018). "Neo-Nazis Turn to Privacy-Focused Cryptocurrency Monero". Motherboard. Archived from the original on 6 September 2018. Retrieved 6 September 2018.
- ^ Statt, Nick (14 July 2017). "Dark Web drug marketplace AlphaBay was shut down by law enforcement". The Verge. Vox Media. Archived from the original on 15 July 2017.
- ^ Greenberg, Andy (23 September 2021). "He Escaped the Dark Web's Biggest Bust. Now He's Back". Wired. Condé Nast Publications. Archived from the original on 23 September 2021.
- ^ Thomson, Iain (19 October 2017). "Stealth web crypto-cash miner Coinhive back to the drawing board as blockers move in". The Register. Archived from the original on 7 November 2017. Retrieved 3 November 2017.
- ^ Goodin, Dan (30 October 2017). "A surge of sites and apps are exhausting your CPU to mine cryptocurrency". Ars Technica. Archived from the original on 3 November 2017. Retrieved 3 November 2017.
- ^ Tung, Liam. "Android security: Coin miners show up in apps and sites to wear out your CPU". ZDNet. Archived from the original on 5 December 2017. Retrieved 22 November 2017.
- ^ "Showtime's Websites May Have Used Your CPU to Mine Cryptocoin While You Binged on Twin Peaks". Gizmodo. 25 September 2017. Archived from the original on 24 June 2021. Retrieved 22 June 2021.
- ^ "Hackers Hijacked an Internet Provider to Mine Cryptocurrency with Laptops In Starbucks". Vice.com. 14 December 2017. Archived from the original on 24 June 2021. Retrieved 22 June 2021.
- ^ Kharpal, Arjun (9 January 2018). "Hackers have found a way to mine cryptocurrency and send it to North Korea". CNBC. Archived from the original on 9 July 2022. Retrieved 22 June 2021.
- ^ Barrett, Brian (2 July 2021). "A New Kind of Ransomware Tsunami Hits Hundreds of Companies". WIRED. Archived from the original on 3 July 2021.
- ^ Rooney, Kate (7 June 2018). "$1.1 billion in cryptocurrency has been stolen this year, and it was apparently easy to do". CNBC. Archived from the original on 6 September 2018. Retrieved 6 September 2018.
- ^ Uchill, Joe (19 December 2017). "WH: Kim Jong Un behind massive WannaCry malware attack". The Hill. Archived from the original on 13 June 2023. Retrieved 13 June 2023.
- ^ a b Gallagher, Sean (4 August 2017). "Researchers say WannaCry operator moved bitcoins to "untraceable" Monero". Ars Technica. Archived from the original on 22 July 2018. Retrieved 22 June 2021.
- ^ "Wannacry money laundering attempt thwarted". BBC News. 4 August 2017. Archived from the original on 13 July 2023. Retrieved 22 June 2021.
- ^ a b Browne, Ed (15 June 2021). "Monero developer expects more criminal groups to use the crypto for ransoms". Newsweek. Archived from the original on 21 March 2023. Retrieved 22 June 2021.
- ^ Ikeda, Scott (2020-11-17). "South Korea's New Crypto AML Law Bans Trading of "Privacy Coins" (Monero, Zcash) Archived 2020-12-16 at the Wayback Machine". CPO magazine. Retrieved 2020-12-17.
- ^ a b Kottasová, Ivana (3 January 2018). "Bitcoin is too hot for criminals. They're using monero instead". CNNMoney. Archived from the original on 11 February 2023. Retrieved 22 June 2021.
- ^ Kharif, Olga (2 January 2018). "The Criminal Underworld Is Dropping Bitcoin for Another Currency". Bloomberg. Archived from the original on 4 June 2021. Retrieved 4 June 2021.
- ^ "Binance Delisting Sparks Privacy Concerns". ft. Financial Times. Archived from the original on 21 February 2024. Retrieved 21 February 2024.(subscription required)
- ^ "Notice of asset delisting in Ireland and Belgium for Monero (XMR)". Kraken. Archived from the original on 15 April 2024. Retrieved 14 April 2024.
- ^ "Support for Monero (XMR) in Europe". Kraken. Retrieved 1 February 2025.
External links
[edit]Monero
View on GrokipediaMonero (XMR) is an open-source cryptocurrency launched on April 18, 2014, as a community-driven fork of the CryptoNote protocol, designed to enable private, fungible, and untraceable digital transactions by default.[1][2]
It achieves sender anonymity through ring signatures, which mix a user's transaction with decoys from the blockchain; recipient privacy via stealth addresses, generating one-time destinations not publicly linked to the recipient; and amount confidentiality with Ring Confidential Transactions (RingCT), obscuring transferred values while allowing verification of validity.[3][4]
Monero's emphasis on fungibility ensures all units are interchangeable without historical taint, distinguishing it from traceable assets like Bitcoin where transaction graphs enable blacklisting.[5]
The network employs a proof-of-work consensus with the ASIC-resistant RandomX algorithm to promote decentralized mining accessible to general-purpose hardware.[1]
While praised for advancing financial privacy against surveillance, Monero has faced regulatory challenges due to its resistance to blockchain analysis, though its design aligns with first-principles of sound money unhindered by third-party oversight.[3]
History
Origins and Launch
Monero originated as a fork of Bytecoin, the inaugural implementation of the CryptoNote protocol, which had been released in late 2012 but drew widespread criticism for its developers secretly premining over 80% of the total supply, fostering perceptions of centralization and unfair distribution.[6][7] This premine, conducted covertly over an extended period before public announcement, undermined trust in Bytecoin's claim of organic development and highlighted vulnerabilities in early privacy-focused cryptocurrencies to insider control.[8] In April 2014, anonymous developers addressed these issues by forking Bytecoin to launch a new cryptocurrency without any premine or instamine, ensuring a fair distribution from the outset through a pre-announced release of modified CryptoNote reference code.[1] The project debuted on April 18 as BitMonero, emphasizing enhanced privacy to counter the traceability inherent in public blockchains like Bitcoin, where transaction histories enable surveillance and compromise economic fungibility.[9] BitMonero was promptly renamed Monero, with the name drawn from the Esperanto term for "coin," reflecting a commitment to neutrality and universality in its privacy-oriented design.[10][11] Early adoption stemmed from the CryptoNote protocol's core innovations, such as ring signatures, which provided plausible deniability for transactions and positioned Monero as a tool for preserving user anonymity against third-party observation, a feature absent in transparent alternatives.[12] The nascent community coalesced primarily through Internet Relay Chat (IRC) channels and forums like Bitcointalk, where developers and enthusiasts coordinated on codebase refinements and advocated for untraceable digital cash as essential to individual financial sovereignty.[13] This grassroots formation prioritized resistance to centralized oversight, driven by the recognition that observable transactions erode privacy rights in an increasingly monitored digital economy.[1]Key Protocol Upgrades
In January 2017, Monero implemented Ring Confidential Transactions (RingCT) at block height 1,220,516, enabling the obfuscation of transaction amounts alongside sender and receiver addresses through Pedersen commitments and range proofs, thereby enhancing privacy by default without relying on optional features.[14] This upgrade became mandatory for all transactions by September 2017, addressing vulnerabilities in prior transparent amount disclosures that could facilitate blockchain analysis.[14] On November 30, 2019, at block height 1,978,000, Monero activated the RandomX proof-of-work algorithm via hard fork, designed to resist application-specific integrated circuits (ASICs) by emphasizing random code execution on general-purpose CPUs, thereby promoting broader miner decentralization based on empirical observations of ASIC dominance in prior algorithms like CryptoNight.[15] Concurrently, in March 2019, a protocol adjustment refined the dynamic block size mechanism by incorporating a long-term median over the prior 100,000 blocks, mitigating spam-induced bloating attacks—such as the "big bang" exploit—while maintaining scalability through penalty-adjusted rewards for oversized blocks.[16] The tail emission schedule, which ensures perpetual block rewards of 0.6 XMR after the initial emission curve reaches its asymptote near 18.4 million coins, activated on May 31, 2022, at block 2,641,624, providing sustainable incentives for miners independent of transaction volume fluctuations and countering risks of fee market insufficiency observed in other blockchains.[17] On August 13, 2022, at block 2,688,888, Monero increased the default ring size from 11 to 16, expanding the anonymity set for ring signatures and empirically strengthening unlinkability against statistical heuristics in transaction graph analysis, as validated through prior research on smaller ring sizes' limitations.[18] These upgrades, among over 20 consensus-altering hard forks by 2025, reflect iterative responses to identified vulnerabilities, coordinated via community research labs and activated through supermajority node consensus to preserve network integrity.[19]Recent Events and Challenges
In 2025, Monero's Community Crowdfunding System (CCS) successfully raised approximately $925,000, equivalent to 3,086.62 XMR as of September 18, through community donations funding core development, wallet improvements, and research initiatives.[20][21] These funds have supported ongoing efforts toward protocol enhancements, including preparatory work for the Seraphis upgrade, which introduces modular transaction structures to enhance scalability, multisignature support, and privacy without compromising existing address compatibility.[22][23] Despite regulatory pressures on privacy coins, the CCS demonstrates sustained decentralized funding resilience, prioritizing privacy-preserving features amid evolving network demands.[24] On September 14, 2025, the Monero blockchain experienced its largest-ever reorganization, involving 18 consecutive blocks (heights 3,499,659 to 3,499,676) and invalidating 118 previously confirmed transactions over roughly 36 minutes.[25][26] Independent analysts attributed the event to selfish mining tactics by the Qubic mining pool, which withheld blocks to extend its chain preferentially, rather than a full 51% attack, though it raised concerns about double-spend risks and network stability.[27][28] The community opted against a protocol rollback, instead initiating discussions on potential proof-of-work parameter tweaks to mitigate future reorgs while preserving decentralization.[29] This incident, following similar Qubic-related disruptions in August, underscored vulnerabilities in mining pool incentives but highlighted Monero's robustness, as the network recovered without halting operations.[30] Amid cryptocurrency market fluctuations, Monero's price rose from lows around $157 in late 2024 to over $320 by October 2025, reflecting heightened demand for privacy-focused assets despite delistings from some exchanges and U.S. regulatory scrutiny, including a October 24, 2025, seizure of $7.9 million in XMR tied to dark web activities.[31][32] The project's roadmap continues emphasizing privacy enhancements and decentralization, with CCS-backed initiatives addressing scalability and auditability options to counter adversarial mining and evolving threats.[33]Technical Architecture
Core Components
Monero's foundational architecture is built on the CryptoNote protocol, which implements a public blockchain secured by proof-of-work (PoW) consensus to enable permissionless participation and resistance to censorship.[34] This design ensures that network validators compete to solve cryptographic puzzles, appending blocks to the chain in a decentralized manner without requiring approval from any central authority, thereby fostering causal independence from trusted intermediaries.[1] The target block interval is two minutes, dynamically adjusted via difficulty retargeting to balance propagation times and security against low-hashrate attacks.[34] The resulting ledger is an immutable, append-only structure where each block cryptographically links to its predecessor, providing tamper-evident integrity through hash commitments.[35] Default transaction obfuscation integrates into this structure to obscure linkage between inputs, outputs, and amounts, preventing deterministic chain analysis while preserving the ledger's verifiability for aggregate properties like total supply.[35] Optional metadata, such as transaction keys, can be disclosed by senders to enable selective auditability without altering the core obfuscated format.[36] Protocol evolution occurs via community-driven hard forks, typically scheduled every six months, where upgrades are proposed through open discussion on forums and IRC channels, with adoption enforced by the majority of nodes and miners updating their software.[37] This process avoids dependence on dedicated foundations or councils, relying instead on voluntary coordination to maintain consensus rules distinct from more centralized governance models in other cryptocurrencies.[38] Transaction finality emerges probabilistically: a block gains increasing irreversibility with each subsequent confirmation, as reorganizing deep into the chain requires disproportionate computational resources, ensuring practical settlement without deterministic guarantees inherent to permissioned ledgers.[34]Transaction Processing
Monero transactions begin with the sender selecting real inputs from prior outputs on the blockchain and mixing them with decoy outputs through ring signatures, which obscure the true source by allowing verification that at least one input is valid without identifying which.[39] Outputs employ one-time stealth addresses, generated from the recipient's public keys to enable private receipt without linking to the public address.[2] Transaction amounts are concealed via Pedersen commitments, with bulletproof zero-knowledge proofs—introduced in the October 2018 protocol upgrade—verifying that total inputs equal total outputs plus fees without disclosing values, reducing proof sizes from several kilobytes to under 1 KB per output.[40] Upon broadcasting to the peer-to-peer network, full nodes validate transactions by checking ring signature validity, commitment balances through the zero-knowledge proofs, stealth address derivations, and absence of double-spends against the local blockchain copy.[41] Bulletproofs support batch verification, enabling nodes to efficiently confirm multiple proofs in aggregate, which aids scalability despite the privacy overhead.[42] This contrasts with Bitcoin's UTXO model, where Monero's obfuscated outputs require additional cryptographic checks for ring membership and proof integrity, though the system remains UTXO-based under the hood with stealth mechanisms complicating direct tracking.[39] Miners prioritize transactions based on fees, which follow a per-kilobyte minimum scaled by user-selected priority multipliers—ranging from 0.1x for low priority to 4x for highest—affecting relay and inclusion likelihood without a fixed auction market.[43] Post-2018 upgrades, average transaction sizes stabilized at 2-3 KB, roughly 10 times larger than Bitcoin's due to ring and proof data, imposing trade-offs in block space usage and validation compute but enabling privacy without on-chain reveals.[40] Confirmation follows inclusion in a proof-of-work block, with the network's 2-minute target block time yielding probabilistic finality after several subsequent blocks, balancing efficiency against the computational demands of privacy verification.[44]Privacy Mechanisms
Fundamental Technologies
Monero employs ring signatures to obscure the sender of a transaction by mixing the true input with decoy inputs selected from prior outputs on the blockchain, achieving k-anonymity where k represents the ring size.[45] These signatures, derived from the CryptoNote protocol's one-time ring signature scheme, ensure that any member of the ring could plausibly be the signer without revealing the actual one, as the verification algorithm confirms validity without identifying the source. Since the August 2022 hard fork, Monero mandates a minimum ring size of 16, enhancing anonymity by requiring 15 decoys per real spend and mitigating risks from smaller rings that could enable statistical analysis.[46] Stealth addresses conceal the receiver's identity by generating a unique, one-time public key for each transaction output, derived from the recipient's public view and spend keys without exposing the primary address on the blockchain.[47] This mechanism, integral to CryptoNote's design, allows the recipient to scan the blockchain using their private view key to detect and spend the funds, while observers see only ephemeral addresses unlinkable to the true destination. By defaulting to one-time use, stealth addresses prevent address reuse and linkage attacks that plague transparent blockchains.[48] Ring Confidential Transactions (RingCT), activated in September 2017, hide transaction amounts through Pedersen commitments, where the committed value is obscured but verifiable via range proofs ensuring non-negativity and balance equality between inputs and outputs.[49] Initially using Borromean ring signatures for proofs, Monero upgraded to Bulletproofs in October 2018, which employ shorter non-interactive zero-knowledge proofs to reduce transaction size by up to 80% while maintaining confidentiality and preventing overflows or negative values.[40] These technologies collectively provide default unlinkability for senders, receivers, and amounts, with analyses indicating resilience against common tracing heuristics due to the enforced mixing and obfuscation.[50]Auditability Options
Monero incorporates cryptographic tools that enable users to selectively disclose transaction details for verification purposes, balancing inherent privacy with voluntary transparency. The private view key, derived from the account's seed, permits scanning the blockchain to identify and decrypt incoming transactions destined for subaddresses controlled by that account. Sharing the view key grants a third party read-only access to these incoming transactions, revealing amounts received and associated metadata, but without exposing the spend key or enabling fund expenditure.[51] This mechanism supports audits by allowing recipients to prove inflows, such as payments or earnings, while concealing outgoing spends and full transaction graphs obscured by ring signatures.[51][52] Complementing view keys, the transaction private key—generated per outbound transaction—enables senders to furnish cryptographic proof of a specific transfer. By providing the transaction ID, recipient address, and tx key to verifiers, the payment's validity can be confirmed without divulging the sender's private spend key or linking to unrelated activities.[53][54] Official wallet software facilitates extraction of tx keys via commands likeget_tx_key, ensuring proofs remain unlinkable to the broader wallet history.[53] For comprehensive audits, users may additionally disclose key images tied to spent outputs, which, combined with the view key, indicate which inputs were utilized in ring signatures, though full linkage requires cooperative revelation from counterparties.[55]
These options underpin Monero's design as "private by default, optionally transparent," where disclosure is user-initiated and does not alter the protocol's obfuscation for non-participants, thereby upholding fungibility across the network.[51] In practice, view keys have been noted for enabling compliance in regulatory contexts, such as granting auditors visibility into inbound transactions without spend authority, as outlined in analyses of Monero's key structure.[56] This selective revelation addresses scenarios like tax verification, where proving legitimate receipts or payments demonstrates accountability without mandatory exposure, preserving causal privacy for users not opting for disclosure.[56] Limitations persist, as view keys alone yield unreliable balance estimates due to unviewable outflows, and comprehensive tracing demands multiple disclosures.[51]
