1 00:00:00,000 --> 00:00:08,000 So as we learned before, the entire ledger used in bitcoins, the whole blockchain is public. 2 00:00:08,000 --> 00:00:14,000 So the ledger contains all transactions done using bitcoins for each transaction. 3 00:00:14,000 --> 00:00:19,000 Anybody can see the sender address, the receiver address and the amount. 4 00:00:20,000 --> 00:00:26,000 Now, if the sender and the receiver are using proper opsec and obtain their bitcoins anonymously, 5 00:00:26,000 --> 00:00:29,000 then these addresses will not be tied to their identities. 6 00:00:29,000 --> 00:00:35,000 But like I said, there are a number of ways that these addresses can tie to a person's identity. 7 00:00:35,000 --> 00:00:43,000 The easiest is if the person bought bitcoins using a coin exchange that requires identity verification, 8 00:00:43,000 --> 00:00:51,000 or if the person or the entity you're sending coins to has made their address public and is linked to 9 00:00:51,000 --> 00:00:53,000 an actual identity. 10 00:00:53,000 --> 00:00:57,000 For example, if you're sending money to unknown store or to unknown market. 11 00:00:57,000 --> 00:01:02,000 Therefore, based on this information, anyone can analyze the blockchain. 12 00:01:02,000 --> 00:01:08,000 They can know exactly the balance of each address by tracing the amount of money sent to this address 13 00:01:08,000 --> 00:01:11,000 so they can know how much money is in your wallet. 14 00:01:11,000 --> 00:01:17,000 They can track your spending habits, and based on that, they can profile you and serve you more things, 15 00:01:17,000 --> 00:01:18,000 more ads and so on. 16 00:01:19,000 --> 00:01:24,000 Not only that, but if you have a considerable amount of coins, then you'll become a target because 17 00:01:24,000 --> 00:01:32,000 people know that you have a lot of coins in your wallet, again, by tracing the amount of coins sent 18 00:01:32,000 --> 00:01:33,000 to your address. 19 00:01:33,000 --> 00:01:40,000 Not to mention the fact that if you're sending money to an entity that is linked to an actual identity 20 00:01:40,000 --> 00:01:46,000 or if your actual identity gets linked to your address, then this will reveal even more information 21 00:01:46,000 --> 00:01:48,000 that you might not want to be public. 22 00:01:49,000 --> 00:01:54,000 All of this was the incentive to making a more private cryptocurrency. 23 00:01:54,000 --> 00:01:57,000 There is a number of private cryptocurrencies. 24 00:01:57,000 --> 00:02:01,000 The most popular at the moment is Monero or XMR. 25 00:02:02,000 --> 00:02:08,000 Now it's similar to Bitcoin, it's decentralized, so there is no single entity that control it. 26 00:02:09,000 --> 00:02:11,000 But unlike Bitcoin, it is private. 27 00:02:11,000 --> 00:02:18,000 So if you analyze the whole blockchain, you won't be able to get useful information on who is sending 28 00:02:18,000 --> 00:02:21,000 money to whom and the amount sent. 29 00:02:21,000 --> 00:02:26,000 So you can see addresses, but the addresses used are temporary and secured. 30 00:02:26,000 --> 00:02:32,000 Therefore you can't see the actual sender, you can't see the actual receiver, and you can see the 31 00:02:32,000 --> 00:02:34,000 real amount being transferred. 32 00:02:35,000 --> 00:02:38,000 Therefore, what you analyze is not very useful. 33 00:02:38,000 --> 00:02:43,000 The transactions are untraceable and the sender and receiver are not likable. 34 00:02:44,000 --> 00:02:51,000 All of this is achieved using ring signatures, ring confidential transactions and stealth addresses. 35 00:02:51,000 --> 00:02:58,000 The exact way how all of this works is a little bit complex and it dives too much on how blockchain 36 00:02:58,000 --> 00:02:59,000 and cryptocurrencies work. 37 00:02:59,000 --> 00:03:05,000 Therefore, I'm not going to cover it in this course, but I will include useful resources in the resources 38 00:03:05,000 --> 00:03:09,000 section of this lecture, which you can read for further information. 39 00:03:10,000 --> 00:03:14,000 Now, unfortunately, Thales does not come with a Monero wallet. 40 00:03:14,000 --> 00:03:18,000 We have to manually install it, but installing it is very, very easy. 41 00:03:19,000 --> 00:03:22,000 So let's go to Thales and see how to do that. 42 00:03:23,000 --> 00:03:28,000 First of all, you need to go to the download page of the official Monero website. 43 00:03:28,000 --> 00:03:34,000 I'll include its link in the resources of this lecture and you want to scroll down to the Linux download 44 00:03:34,000 --> 00:03:35,000 link. 45 00:03:35,000 --> 00:03:39,000 Now I have the 64 bit version of Thales installed. 46 00:03:39,000 --> 00:03:45,000 Therefore I'm going to click in here to download the 64 bit version of the Monero wallet. 47 00:03:46,000 --> 00:03:52,000 Now, just like any other download, you want to click on Save File and select the location where you 48 00:03:52,000 --> 00:03:53,000 want to download it. 49 00:03:53,000 --> 00:03:56,000 So by default it goes into amnesia tor browser. 50 00:03:56,000 --> 00:04:00,000 And as you can see, I've already downloaded it in here, so I'm not going to click on Save. 51 00:04:00,000 --> 00:04:06,000 But in your case, you want to click on Save and wait for it to fully download the wallet for you. 52 00:04:06,000 --> 00:04:11,000 I'm going to click on Cancel because I've already downloaded it before this lecture to save time. 53 00:04:11,000 --> 00:04:15,000 And as you can see, I already have it here in my Tor browser directory. 54 00:04:16,000 --> 00:04:22,000 And before interacting with this file, just like any file we download from the Internet, we need to 55 00:04:22,000 --> 00:04:28,000 make sure that this file did not get modified as it was being downloaded because as explained before, 56 00:04:28,000 --> 00:04:36,000 anything that you download from the Internet can be edited and modified at a number of locations as 57 00:04:36,000 --> 00:04:37,000 it's being downloaded. 58 00:04:37,000 --> 00:04:42,000 So previously we show how to verify downloads using their PGP signature. 59 00:04:42,000 --> 00:04:47,000 The verification process really depends on the information the developer is giving us. 60 00:04:47,000 --> 00:04:54,000 So as you can see in this case and here, the developer is not giving us a pjp signature. 61 00:04:54,000 --> 00:04:57,000 Instead it's giving us a SHA two, five, six hash. 62 00:04:58,000 --> 00:05:07,000 So to verify a downloaded file with its SHA 256 hash, we need to go to applications accessories and 63 00:05:07,000 --> 00:05:11,000 we're going to use an application called GTK Hash. 64 00:05:11,000 --> 00:05:18,000 I'm going to open this application and in the file field in here, I'm going to select the file that 65 00:05:18,000 --> 00:05:19,000 I want to verify. 66 00:05:19,000 --> 00:05:20,000 It's hash. 67 00:05:20,000 --> 00:05:22,000 This is the file that I just downloaded. 68 00:05:22,000 --> 00:05:27,000 So I'm going to click in here and I'm going to go to Tor browser. 69 00:05:28,000 --> 00:05:30,000 And this is the file that we just downloaded. 70 00:05:30,000 --> 00:05:36,000 I'm going to click on Open and I'm going to click on hash to calculate its hash. 71 00:05:37,000 --> 00:05:40,000 Now we have the SHA two, five, six hash in here. 72 00:05:40,000 --> 00:05:46,000 And what I'm going to do is I'm going to copy all of this and compare it to the hash that the developer 73 00:05:46,000 --> 00:05:48,000 is giving us here on the download page. 74 00:05:49,000 --> 00:05:52,000 Now, as you can see, the hashes match. 75 00:05:52,000 --> 00:06:00,000 This means that the file did not get modified as it's been downloaded because if a single bit is changed 76 00:06:00,000 --> 00:06:07,000 in that file, the hash that I just calculated manually on my local computer will not correspond to 77 00:06:07,000 --> 00:06:09,000 the hash that we have on the Web page in here. 78 00:06:09,000 --> 00:06:16,000 So because the hashes are matching, this means that the file did not get modified since this hash right 79 00:06:16,000 --> 00:06:17,000 here got calculated. 80 00:06:18,000 --> 00:06:25,000 So we can interact with this file now safely as long as we trust the developer that gave us the file. 81 00:06:25,000 --> 00:06:31,000 So I'm going to right click this file because it's a package and I'm going to click on extract here 82 00:06:31,000 --> 00:06:32,000 to extract it. 83 00:06:33,000 --> 00:06:34,000 Okay, perfect. 84 00:06:34,000 --> 00:06:35,000 That's done. 85 00:06:35,000 --> 00:06:37,000 So you can leave it here. 86 00:06:37,000 --> 00:06:41,000 But if you leave it here, as you know, tales is amnesic. 87 00:06:41,000 --> 00:06:45,000 So when we restart the computer, these files will not exist. 88 00:06:45,000 --> 00:06:50,000 Therefore, I'm going to copy it and I'm going to paste it in my persistent directory. 89 00:06:51,000 --> 00:06:53,000 So right click and paste. 90 00:06:54,000 --> 00:07:00,000 And if we navigate inside it will actually see another directory for the application itself. 91 00:07:00,000 --> 00:07:06,000 So I'm actually just going to cut this and paste it outside just to make it easier to access. 92 00:07:06,000 --> 00:07:14,000 And I'm going to delete the empty one and I'm going to rename this one to just more narrow guy again, 93 00:07:14,000 --> 00:07:16,000 just to make it easier to access. 94 00:07:17,000 --> 00:07:23,000 And if we navigate inside this directory, you'll see we have a number of files that's needed by the 95 00:07:23,000 --> 00:07:24,000 wallet application. 96 00:07:24,000 --> 00:07:28,000 And the main file that starts the wallet is this file right here. 97 00:07:28,000 --> 00:07:31,000 The start GI Dot is huge. 98 00:07:31,000 --> 00:07:39,000 Now this is a batch file, which means that it can only be executed from the terminal, from the Linux 99 00:07:39,000 --> 00:07:39,000 terminal. 100 00:07:40,000 --> 00:07:44,000 Now, if you've done any of my other courses, this will be very, very easy for you. 101 00:07:44,000 --> 00:07:47,000 If you haven't, then don't worry about it. 102 00:07:47,000 --> 00:07:53,000 And the next lecture, I'll show you how to run it and create our first Monero wallet.