<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" encoding="UTF-8" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:sy="http://purl.org/rss/1.0/modules/syndication/" xmlns:admin="http://webns.net/mvcb/" xmlns:atom="http://www.w3.org/2005/Atom/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:googleplay="http://www.google.com/schemas/play-podcasts/1.0" xmlns:itunes="http://www.itunes.com/dtds/podcast-1.0.dtd" xmlns:fireside="http://fireside.fm/modules/rss/fireside">
  <channel>
    <fireside:hostname>web02.fireside.fm</fireside:hostname>
    <fireside:genDate>Wed, 06 May 2026 04:20:37 -0500</fireside:genDate>
    <generator>Fireside (https://fireside.fm)</generator>
    <title>Monero Talk - Episodes Tagged with “Breakingmonero”</title>
    <link>https://www.monerotalk.live/tags/breakingmonero</link>
    <pubDate>Thu, 16 May 2019 13:00:00 -0300</pubDate>
    <description>Monero Talk broadcasts weekly conversations on YouTube (https://www.youtube.com/c/monerotalk) with topical guests to understand what the Monero cryptocurrency is today and what it hopes to become. 
We strive to give birth to new Monero users by simply reporting on the facts in our search to answer the question--Is Monero the truest cryptocurrency of them all? In staying true to the Monero ethos, we aim to always be skeptical. While we are Monero Talk by name, and Monero devotees at heart, the intention of the show is to ultimately discover and support the one blockchain that is most aligned with the original cypherpunk and crypto-anarchist ideals that cryptocurrency was born from. And the one that is most likely to succeed at becoming true digital cash. So far, we believe Monero is the one.
Guests include:
The developers and researchers working on the open source core protocol and the cryptography behind it; 
The people building the projects and infrastructure supporting the protocol; 
Privacy advocates and people building privacy enhancing technologies;
Analysts and investors speculating on Monero's growth;
Journalists and pundits weighing in on Monero's place in the crypto-sphere; and 
Respected (sometimes controversial) contributors and community members.
If you enjoyed the show &amp; would like to support us, a donation of any size would be greatly appreciated and would mean so much!
Monero (XMR) Donation Address:
88MWhce9wToCCENbRgfZ6X54Dx8HF4bYY79YkYN9nXeqCDmykzXuq48HWe6k9eZDkA4iYpLbTsvpXPnAGCALHTTMLUp8cWi
</description>
    <language>en-us</language>
    <itunes:type>episodic</itunes:type>
    <itunes:subtitle>Is Monero the truest cryptocurrency?</itunes:subtitle>
    <itunes:author>Monero Talk</itunes:author>
    <itunes:summary>Monero Talk broadcasts weekly conversations on YouTube (https://www.youtube.com/c/monerotalk) with topical guests to understand what the Monero cryptocurrency is today and what it hopes to become. 
We strive to give birth to new Monero users by simply reporting on the facts in our search to answer the question--Is Monero the truest cryptocurrency of them all? In staying true to the Monero ethos, we aim to always be skeptical. While we are Monero Talk by name, and Monero devotees at heart, the intention of the show is to ultimately discover and support the one blockchain that is most aligned with the original cypherpunk and crypto-anarchist ideals that cryptocurrency was born from. And the one that is most likely to succeed at becoming true digital cash. So far, we believe Monero is the one.
Guests include:
The developers and researchers working on the open source core protocol and the cryptography behind it; 
The people building the projects and infrastructure supporting the protocol; 
Privacy advocates and people building privacy enhancing technologies;
Analysts and investors speculating on Monero's growth;
Journalists and pundits weighing in on Monero's place in the crypto-sphere; and 
Respected (sometimes controversial) contributors and community members.
If you enjoyed the show &amp; would like to support us, a donation of any size would be greatly appreciated and would mean so much!
Monero (XMR) Donation Address:
88MWhce9wToCCENbRgfZ6X54Dx8HF4bYY79YkYN9nXeqCDmykzXuq48HWe6k9eZDkA4iYpLbTsvpXPnAGCALHTTMLUp8cWi
</itunes:summary>
    <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/9/9813d709-5a6d-4a87-8b5e-46ebf14f99d6/cover.jpg?v=26"/>
    <itunes:explicit>no</itunes:explicit>
    <itunes:keywords>bitcoin, blockchain, crypto, cryptocurrency, monero, privacy, privacycoin, xmr, fungible, monerotalk,monerotopia</itunes:keywords>
    <itunes:owner>
      <itunes:name>Monero Talk</itunes:name>
      <itunes:email>monerotalklive@gmail.com</itunes:email>
    </itunes:owner>
<itunes:category text="Technology"/>
<item>
  <title>Breaking Monero Episode 13: Blockchain Explorer OpSec</title>
  <link>https://www.monerotalk.live/breaking-monero-episode-13-blockchain-explorer-opsec</link>
  <guid isPermaLink="false">416afa95-9c5f-486c-88de-4e897f3985d3</guid>
  <pubDate>Thu, 16 May 2019 13:00:00 -0300</pubDate>
  <author>Monero Talk</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/9813d709-5a6d-4a87-8b5e-46ebf14f99d6/416afa95-9c5f-486c-88de-4e897f3985d3.mp3" length="5368048" type="audio/mp3"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>Monero Talk</itunes:author>
  <itunes:subtitle>This is a quick reminder to pay attention to the information you give block explorers. Connecting to them over Tor may not be enough for some threat models. They may not be malicious, but you are giving them the opportunity to collect information about you. Run your own full node instead, and consider running your own block explorer.</itunes:subtitle>
  <itunes:duration>6:53</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/9/9813d709-5a6d-4a87-8b5e-46ebf14f99d6/episodes/4/416afa95-9c5f-486c-88de-4e897f3985d3/cover.jpg?v=1"/>
  <description>&lt;p&gt;This is a quick reminder to pay attention to the information you give block explorers. Connecting to them over Tor may not be enough for some threat models. They may not be malicious, but you are giving them the opportunity to collect information about you. Run your own full node instead, and consider running your own block explorer.&lt;/p&gt;

&lt;iframe width="560" height="315" src="https://www.youtube.com/embed/_A6k4RQ-uIE" frameborder="0" allow="accelerometer; autoplay; encrypted-media; gyroscope; picture-in-picture" allowfullscreen&gt;&lt;/iframe&gt; 
</description>
  <itunes:keywords>bitcoin, blockchain, crypto, cryptocurrency, decentralized, monero, moneronews, privacy, privacycoin, technology, xmr, xmrnews,breakingmonero</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>This is a quick reminder to pay attention to the information you give block explorers. Connecting to them over Tor may not be enough for some threat models. They may not be malicious, but you are giving them the opportunity to collect information about you. Run your own full node instead, and consider running your own block explorer.</p>

<iframe width="560" height="315" src="https://www.youtube.com/embed/_A6k4RQ-uIE" frameborder="0" allow="accelerometer; autoplay; encrypted-media; gyroscope; picture-in-picture" allowfullscreen></iframe>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>This is a quick reminder to pay attention to the information you give block explorers. Connecting to them over Tor may not be enough for some threat models. They may not be malicious, but you are giving them the opportunity to collect information about you. Run your own full node instead, and consider running your own block explorer.</p>

<iframe width="560" height="315" src="https://www.youtube.com/embed/_A6k4RQ-uIE" frameborder="0" allow="accelerometer; autoplay; encrypted-media; gyroscope; picture-in-picture" allowfullscreen></iframe>]]>
  </itunes:summary>
</item>
<item>
  <title>Breaking Monero Episode 12: Input/Output Metadata</title>
  <link>https://www.monerotalk.live/breaking-monero-episode-12-input-output-metadata</link>
  <guid isPermaLink="false">133195e2-a32e-443f-bb61-9574ea0b8c6d</guid>
  <pubDate>Thu, 09 May 2019 13:00:00 -0300</pubDate>
  <author>Monero Talk</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/9813d709-5a6d-4a87-8b5e-46ebf14f99d6/133195e2-a32e-443f-bb61-9574ea0b8c6d.mp3" length="15391292" type="audio/mp3"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>Monero Talk</itunes:author>
  <itunes:subtitle>In this episode, we discuss how the metadata collected by looking at the number of inputs and outputs can limit privacy in some circumstances. We warn against leaking metadata through unusual or repeated, predictable behavior.</itunes:subtitle>
  <itunes:duration>19:54</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/9/9813d709-5a6d-4a87-8b5e-46ebf14f99d6/episodes/1/133195e2-a32e-443f-bb61-9574ea0b8c6d/cover.jpg?v=1"/>
  <description>&lt;p&gt;In this episode, we discuss how the metadata collected by looking at the number of inputs and outputs can limit privacy in some circumstances. We warn against leaking metadata through unusual or repeated, predictable behavior.&lt;/p&gt;

&lt;iframe width="560" height="315" src="https://www.youtube.com/embed/-zJpvsj1rWE" frameborder="0" allow="accelerometer; autoplay; encrypted-media; gyroscope; picture-in-picture" allowfullscreen&gt;&lt;/iframe&gt; 
</description>
  <itunes:keywords>bitcoin, blockchain, crypto, cryptocurrency, decentralized, monero, moneronews, privacy, privacycoin, technology, xmr, xmrnews,breakingmonero</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>In this episode, we discuss how the metadata collected by looking at the number of inputs and outputs can limit privacy in some circumstances. We warn against leaking metadata through unusual or repeated, predictable behavior.</p>

<iframe width="560" height="315" src="https://www.youtube.com/embed/-zJpvsj1rWE" frameborder="0" allow="accelerometer; autoplay; encrypted-media; gyroscope; picture-in-picture" allowfullscreen></iframe>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>In this episode, we discuss how the metadata collected by looking at the number of inputs and outputs can limit privacy in some circumstances. We warn against leaking metadata through unusual or repeated, predictable behavior.</p>

<iframe width="560" height="315" src="https://www.youtube.com/embed/-zJpvsj1rWE" frameborder="0" allow="accelerometer; autoplay; encrypted-media; gyroscope; picture-in-picture" allowfullscreen></iframe>]]>
  </itunes:summary>
</item>
<item>
  <title>Breaking Monero Episode 11: Mailbag Episode</title>
  <link>https://www.monerotalk.live/breaking-moner-episode-11-mailbag-episode</link>
  <guid isPermaLink="false">e4e85337-9824-4a46-9a06-0e8f6e368b93</guid>
  <pubDate>Mon, 29 Apr 2019 13:00:00 -0300</pubDate>
  <author>Monero Talk</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/9813d709-5a6d-4a87-8b5e-46ebf14f99d6/e4e85337-9824-4a46-9a06-0e8f6e368b93.mp3" length="32933011" type="audio/mp3"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>Monero Talk</itunes:author>
  <itunes:subtitle>In this episode, we answer several questions from audience members.</itunes:subtitle>
  <itunes:duration>40:50</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/9/9813d709-5a6d-4a87-8b5e-46ebf14f99d6/episodes/e/e4e85337-9824-4a46-9a06-0e8f6e368b93/cover.jpg?v=1"/>
  <description>&lt;p&gt;In this episode, we answer several questions from audience members.&lt;/p&gt;

&lt;iframe width="560" height="315" src="https://www.youtube.com/embed/q1gdYWsvXDU" frameborder="0" allow="accelerometer; autoplay; encrypted-media; gyroscope; picture-in-picture" allowfullscreen&gt;&lt;/iframe&gt; 
</description>
  <itunes:keywords>bitcoin, blockchain, crypto, cryptocurrency, decentralized, monero, moneronews, privacy, privacycoin, technology, xmr, xmrnews,breakingmonero</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>In this episode, we answer several questions from audience members.</p>

<iframe width="560" height="315" src="https://www.youtube.com/embed/q1gdYWsvXDU" frameborder="0" allow="accelerometer; autoplay; encrypted-media; gyroscope; picture-in-picture" allowfullscreen></iframe>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>In this episode, we answer several questions from audience members.</p>

<iframe width="560" height="315" src="https://www.youtube.com/embed/q1gdYWsvXDU" frameborder="0" allow="accelerometer; autoplay; encrypted-media; gyroscope; picture-in-picture" allowfullscreen></iframe>]]>
  </itunes:summary>
</item>
<item>
  <title>Breaking Monero Episode 10: Public Mining Pools</title>
  <link>https://www.monerotalk.live/breaking-monero-episode-10-public-mining-pools</link>
  <guid isPermaLink="false">6cadb14e-2a8e-431a-bb48-e367f6bebbe3</guid>
  <pubDate>Mon, 25 Feb 2019 12:00:00 -0400</pubDate>
  <author>Monero Talk</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/9813d709-5a6d-4a87-8b5e-46ebf14f99d6/6cadb14e-2a8e-431a-bb48-e367f6bebbe3.mp3" length="15978825" type="audio/mp3"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>Monero Talk</itunes:author>
  <itunes:subtitle>Public mining pools provide a service to miners, but they also reveal a lot of output information that observers can use to learn more about transactions. Sarang and Justin discuss the impact of these and ways users can optionally reduce their exposure to these risks.</itunes:subtitle>
  <itunes:duration>19:55</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/9/9813d709-5a6d-4a87-8b5e-46ebf14f99d6/episodes/6/6cadb14e-2a8e-431a-bb48-e367f6bebbe3/cover.jpg?v=1"/>
  <description>&lt;p&gt;Public mining pools provide a service to miners, but they also reveal a lot of output information that observers can use to learn more about transactions. Sarang and Justin discuss the impact of these and ways users can optionally reduce their exposure to these risks.&lt;/p&gt;

&lt;iframe width="560" height="315" src="https://www.youtube.com/embed/39HSRvuRgAo" frameborder="0" allow="accelerometer; autoplay; encrypted-media; gyroscope; picture-in-picture" allowfullscreen&gt;&lt;/iframe&gt; 
</description>
  <itunes:keywords>bitcoin, blockchain, crypto, cryptocurrency, decentralized, monero, moneronews, privacy, privacycoin, technology, xmr, xmrnews,breakingmonero,publicminingpools</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>Public mining pools provide a service to miners, but they also reveal a lot of output information that observers can use to learn more about transactions. Sarang and Justin discuss the impact of these and ways users can optionally reduce their exposure to these risks.</p>

<iframe width="560" height="315" src="https://www.youtube.com/embed/39HSRvuRgAo" frameborder="0" allow="accelerometer; autoplay; encrypted-media; gyroscope; picture-in-picture" allowfullscreen></iframe>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>Public mining pools provide a service to miners, but they also reveal a lot of output information that observers can use to learn more about transactions. Sarang and Justin discuss the impact of these and ways users can optionally reduce their exposure to these risks.</p>

<iframe width="560" height="315" src="https://www.youtube.com/embed/39HSRvuRgAo" frameborder="0" allow="accelerometer; autoplay; encrypted-media; gyroscope; picture-in-picture" allowfullscreen></iframe>]]>
  </itunes:summary>
</item>
<item>
  <title>Breaking Monero Episode 09 Poisoned Outputs (EAE Attack)</title>
  <link>https://www.monerotalk.live/breaking-monero-episode-09-poisoned-outputs-eae-attack</link>
  <guid isPermaLink="false">cddc0bb4-41a0-4fdf-a413-8f93518a2900</guid>
  <pubDate>Fri, 08 Feb 2019 13:00:00 -0400</pubDate>
  <author>Monero Talk</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/9813d709-5a6d-4a87-8b5e-46ebf14f99d6/cddc0bb4-41a0-4fdf-a413-8f93518a2900.mp3" length="23582555" type="audio/mp3"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>Monero Talk</itunes:author>
  <itunes:subtitle>Monero's ring signatures provide plausible deniability, but they aren't perfect. We model examples where two colluding parties 'E' attempt to learn information about an individual 'A.' By sending outputs to individuals and tracing their transaction graphs, these colluding parties may perform powerful statistical tests to learn significant information, especially for repeated transactions where they would not normally occur by chance.</itunes:subtitle>
  <itunes:duration>31:41</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/9/9813d709-5a6d-4a87-8b5e-46ebf14f99d6/episodes/c/cddc0bb4-41a0-4fdf-a413-8f93518a2900/cover.jpg?v=1"/>
  <description>&lt;p&gt;Monero's ring signatures provide plausible deniability, but they aren't perfect. We model examples where two colluding parties 'E' attempt to learn information about an individual 'A.' By sending outputs to individuals and tracing their transaction graphs, these colluding parties may perform powerful statistical tests to learn significant information, especially for repeated transactions where they would not normally occur by chance.&lt;/p&gt;

&lt;iframe width="560" height="315" src="https://www.youtube.com/embed/iABIcsDJKyM" frameborder="0" allow="accelerometer; autoplay; encrypted-media; gyroscope; picture-in-picture" allowfullscreen&gt;&lt;/iframe&gt; 
</description>
  <itunes:keywords>bitcoin, blockchain, crypto, cryptocurrency, decentralized, monero, moneronews, privacy, privacycoin, technology, xmr, xmrnews,breakingmonero,poisonedoutputs</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>Monero&#39;s ring signatures provide plausible deniability, but they aren&#39;t perfect. We model examples where two colluding parties &#39;E&#39; attempt to learn information about an individual &#39;A.&#39; By sending outputs to individuals and tracing their transaction graphs, these colluding parties may perform powerful statistical tests to learn significant information, especially for repeated transactions where they would not normally occur by chance.</p>

<iframe width="560" height="315" src="https://www.youtube.com/embed/iABIcsDJKyM" frameborder="0" allow="accelerometer; autoplay; encrypted-media; gyroscope; picture-in-picture" allowfullscreen></iframe>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>Monero&#39;s ring signatures provide plausible deniability, but they aren&#39;t perfect. We model examples where two colluding parties &#39;E&#39; attempt to learn information about an individual &#39;A.&#39; By sending outputs to individuals and tracing their transaction graphs, these colluding parties may perform powerful statistical tests to learn significant information, especially for repeated transactions where they would not normally occur by chance.</p>

<iframe width="560" height="315" src="https://www.youtube.com/embed/iABIcsDJKyM" frameborder="0" allow="accelerometer; autoplay; encrypted-media; gyroscope; picture-in-picture" allowfullscreen></iframe>]]>
  </itunes:summary>
</item>
<item>
  <title>Breaking Monero Episode 07: Remote Nodes</title>
  <link>https://www.monerotalk.live/breaking-monero-episode-07-remote-nodes</link>
  <guid isPermaLink="false">1d67afe8-8636-4f8b-81c4-491962608fdd</guid>
  <pubDate>Thu, 24 Jan 2019 12:00:00 -0400</pubDate>
  <author>Monero Talk</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/9813d709-5a6d-4a87-8b5e-46ebf14f99d6/1d67afe8-8636-4f8b-81c4-491962608fdd.mp3" length="16732344" type="audio/mp3"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>Monero Talk</itunes:author>
  <itunes:subtitle>Remote nodes are convenient, and many wallets are configured to use them by default. Unfortunately, there are privacy and security limitations when users rely on others to provide copies of blockchain data. We discuss some of these limitations, some remote node attacks, and how to mitigate against them.
</itunes:subtitle>
  <itunes:duration>21:41</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/9/9813d709-5a6d-4a87-8b5e-46ebf14f99d6/episodes/1/1d67afe8-8636-4f8b-81c4-491962608fdd/cover.jpg?v=1"/>
  <description>&lt;p&gt;Remote nodes are convenient, and many wallets are configured to use them by default. Unfortunately, there are privacy and security limitations when users rely on others to provide copies of blockchain data. We discuss some of these limitations, some remote node attacks, and how to mitigate against them.&lt;/p&gt;

&lt;iframe width="560" height="315" src="https://www.youtube.com/embed/n6Bxp0k7Uqg" frameborder="0" allow="accelerometer; autoplay; encrypted-media; gyroscope; picture-in-picture" allowfullscreen&gt;&lt;/iframe&gt; 
</description>
  <itunes:keywords>bitcoin, blockchain, crypto, cryptocurrency, decentralized, monero, moneronews, privacy, privacycoin, technology, xmr, xmrnews, breakingmonero, remotenodes</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>Remote nodes are convenient, and many wallets are configured to use them by default. Unfortunately, there are privacy and security limitations when users rely on others to provide copies of blockchain data. We discuss some of these limitations, some remote node attacks, and how to mitigate against them.</p>

<iframe width="560" height="315" src="https://www.youtube.com/embed/n6Bxp0k7Uqg" frameborder="0" allow="accelerometer; autoplay; encrypted-media; gyroscope; picture-in-picture" allowfullscreen></iframe><p>Links:</p><ul><li><a title="Monero World" rel="nofollow" href="https://moneroworld.com/">Monero World</a></li><li><a title="Node-O-Matic" rel="nofollow" href="https://node.pwned.systems/">Node-O-Matic</a></li></ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>Remote nodes are convenient, and many wallets are configured to use them by default. Unfortunately, there are privacy and security limitations when users rely on others to provide copies of blockchain data. We discuss some of these limitations, some remote node attacks, and how to mitigate against them.</p>

<iframe width="560" height="315" src="https://www.youtube.com/embed/n6Bxp0k7Uqg" frameborder="0" allow="accelerometer; autoplay; encrypted-media; gyroscope; picture-in-picture" allowfullscreen></iframe><p>Links:</p><ul><li><a title="Monero World" rel="nofollow" href="https://moneroworld.com/">Monero World</a></li><li><a title="Node-O-Matic" rel="nofollow" href="https://node.pwned.systems/">Node-O-Matic</a></li></ul>]]>
  </itunes:summary>
</item>
<item>
  <title>Breaking Monero Episode 06: Unusual Ringsize</title>
  <link>https://www.monerotalk.live/breaking-monero-episode-06-unusual-ringsize</link>
  <guid isPermaLink="false">c86c2f8c-298a-401f-b8e8-0b02d22072d3</guid>
  <pubDate>Fri, 18 Jan 2019 12:00:00 -0400</pubDate>
  <author>Monero Talk</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/9813d709-5a6d-4a87-8b5e-46ebf14f99d6/c86c2f8c-298a-401f-b8e8-0b02d22072d3.mp3" length="8983631" type="audio/mp3"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>Monero Talk</itunes:author>
  <itunes:subtitle>In this short episode, we discuss the unfortunate tradeoff when sending Monero transactions with unusual ringsizes. Some transactions were sent with ringsizes over 1000. Monero moved to consensus-mandated ringsizes in a recent update instead of minimum ringsizes. Thus, the concerns in this video serve an informative purpose, but they do not have any current relevance.</itunes:subtitle>
  <itunes:duration>11:32</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/9/9813d709-5a6d-4a87-8b5e-46ebf14f99d6/episodes/c/c86c2f8c-298a-401f-b8e8-0b02d22072d3/cover.jpg?v=1"/>
  <description>&lt;p&gt;In this short episode, we discuss the unfortunate tradeoff when sending Monero transactions with unusual ringsizes. Some transactions were sent with ringsizes over 1000. Monero moved to consensus-mandated ringsizes in a recent update instead of minimum ringsizes. Thus, the concerns in this video serve an informative purpose, but they do not have any current relevance.&lt;/p&gt;

&lt;iframe width="560" height="315" src="https://www.youtube.com/embed/8rbR1WMUr14" frameborder="0" allow="accelerometer; autoplay; encrypted-media; gyroscope; picture-in-picture" allowfullscreen&gt;&lt;/iframe&gt; 
</description>
  <itunes:keywords>bitcoin, blockchain, crypto, cryptocurrency, decentralized, monero, moneronews, privacy, privacycoin, technology, xmr, xmrnews, breakingmonero, ringsize</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>In this short episode, we discuss the unfortunate tradeoff when sending Monero transactions with unusual ringsizes. Some transactions were sent with ringsizes over 1000. Monero moved to consensus-mandated ringsizes in a recent update instead of minimum ringsizes. Thus, the concerns in this video serve an informative purpose, but they do not have any current relevance.</p>

<iframe width="560" height="315" src="https://www.youtube.com/embed/8rbR1WMUr14" frameborder="0" allow="accelerometer; autoplay; encrypted-media; gyroscope; picture-in-picture" allowfullscreen></iframe>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>In this short episode, we discuss the unfortunate tradeoff when sending Monero transactions with unusual ringsizes. Some transactions were sent with ringsizes over 1000. Monero moved to consensus-mandated ringsizes in a recent update instead of minimum ringsizes. Thus, the concerns in this video serve an informative purpose, but they do not have any current relevance.</p>

<iframe width="560" height="315" src="https://www.youtube.com/embed/8rbR1WMUr14" frameborder="0" allow="accelerometer; autoplay; encrypted-media; gyroscope; picture-in-picture" allowfullscreen></iframe>]]>
  </itunes:summary>
</item>
<item>
  <title>Breaking Monero Episode 05: Input Selection Algorithm</title>
  <link>https://www.monerotalk.live/breaking-monero-episode-05-input-selection-algorithm</link>
  <guid isPermaLink="false">ce98810f-412d-44fe-ba1b-640cd405ca6f</guid>
  <pubDate>Thu, 17 Jan 2019 12:00:00 -0400</pubDate>
  <author>Monero Talk</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/9813d709-5a6d-4a87-8b5e-46ebf14f99d6/ce98810f-412d-44fe-ba1b-640cd405ca6f.mp3" length="10615549" type="audio/mp3"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>Monero Talk</itunes:author>
  <itunes:subtitle>In this episode, Sarang and Justin explain more about how Monero selects decoys for ring signatures, more than just "randomly." We explain how Monero's selection algorithm has evolved over time, and how a strong input selection algorithm is critical for protective ring signatures.

"An Empirical Analysis of Traceability in the Monero Blockchain"
Malte Möser, Kyle Soska, Ethan Heilman, Kevin Lee, Henry Heffan, Shashvat Srivastava, Kyle Hogan, Jason Hennessey, Andrew Miller, Arvind Narayanan, Nicolas Christin
https://arxiv.org/abs/1704.04299</itunes:subtitle>
  <itunes:duration>14:12</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/9/9813d709-5a6d-4a87-8b5e-46ebf14f99d6/episodes/c/ce98810f-412d-44fe-ba1b-640cd405ca6f/cover.jpg?v=1"/>
  <description>&lt;p&gt;In this episode, Sarang and Justin explain more about how Monero selects decoys for ring signatures, more than just "randomly." We explain how Monero's selection algorithm has evolved over time, and how a strong input selection algorithm is critical for protective ring signatures.&lt;/p&gt;

&lt;iframe width="560" height="315" src="https://www.youtube.com/embed/Sn44ahKxC1E" frameborder="0" allow="accelerometer; autoplay; encrypted-media; gyroscope; picture-in-picture" allowfullscreen&gt;&lt;/iframe&gt; 
</description>
  <itunes:keywords>bitcoin, blockchain, crypto, cryptocurrency, decentralized, monero, moneronews, privacy, privacycoin, technology, xmr, xmrnews, breakingmonero,inputselectionalgorithm</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>In this episode, Sarang and Justin explain more about how Monero selects decoys for ring signatures, more than just &quot;randomly.&quot; We explain how Monero&#39;s selection algorithm has evolved over time, and how a strong input selection algorithm is critical for protective ring signatures.</p>

<iframe width="560" height="315" src="https://www.youtube.com/embed/Sn44ahKxC1E" frameborder="0" allow="accelerometer; autoplay; encrypted-media; gyroscope; picture-in-picture" allowfullscreen></iframe><p>Links:</p><ul><li><a title="&quot;An Empirical Analysis of Traceability in the Monero Blockchain&quot; Paper" rel="nofollow" href="https://arxiv.org/abs/1704.04299">"An Empirical Analysis of Traceability in the Monero Blockchain" Paper</a></li></ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>In this episode, Sarang and Justin explain more about how Monero selects decoys for ring signatures, more than just &quot;randomly.&quot; We explain how Monero&#39;s selection algorithm has evolved over time, and how a strong input selection algorithm is critical for protective ring signatures.</p>

<iframe width="560" height="315" src="https://www.youtube.com/embed/Sn44ahKxC1E" frameborder="0" allow="accelerometer; autoplay; encrypted-media; gyroscope; picture-in-picture" allowfullscreen></iframe><p>Links:</p><ul><li><a title="&quot;An Empirical Analysis of Traceability in the Monero Blockchain&quot; Paper" rel="nofollow" href="https://arxiv.org/abs/1704.04299">"An Empirical Analysis of Traceability in the Monero Blockchain" Paper</a></li></ul>]]>
  </itunes:summary>
</item>
<item>
  <title>Breaking Monero Episode 04: Chain Splits (Key Image Reuse Attack)</title>
  <link>https://www.monerotalk.live/breaking-monero-episode-04-chain-splits-key-image-reuse-attack</link>
  <guid isPermaLink="false">d475f6ef-d1aa-44c3-96e7-c36659f01b05</guid>
  <pubDate>Fri, 11 Jan 2019 12:00:00 -0400</pubDate>
  <author>Monero Talk</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/9813d709-5a6d-4a87-8b5e-46ebf14f99d6/d475f6ef-d1aa-44c3-96e7-c36659f01b05.mp3" length="18264288" type="audio/mp3"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>Monero Talk</itunes:author>
  <itunes:subtitle>In this episode, Sarang, Brandon (Suare), and Justin introduce key image reuse concerns. We explain some techniques to protect security and privacy under a number of circumstances. Ultimately, users should not claim "airdrop" funds if they have not thought long and hard about the implications.</itunes:subtitle>
  <itunes:duration>24:57</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/9/9813d709-5a6d-4a87-8b5e-46ebf14f99d6/episodes/d/d475f6ef-d1aa-44c3-96e7-c36659f01b05/cover.jpg?v=1"/>
  <description>&lt;p&gt;In this episode, Sarang, Brandon (Suare), and Justin introduce key image reuse concerns. We explain some techniques to protect security and privacy under a number of circumstances. Ultimately, users should not claim "airdrop" funds if they have not thought long and hard about the implications.&lt;/p&gt;

&lt;iframe width="560" height="315" src="https://www.youtube.com/embed/6CVcirD90pg" frameborder="0" allow="accelerometer; autoplay; encrypted-media; gyroscope; picture-in-picture" allowfullscreen&gt;&lt;/iframe&gt; 
</description>
  <itunes:keywords>bitcoin, blockchain, crypto, cryptocurrency, decentralized, monero, moneronews, privacy, privacycoin, technology, xmr, xmrnews, breakingmonero,chainsplits, keyimagereuseattack</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>In this episode, Sarang, Brandon (Suare), and Justin introduce key image reuse concerns. We explain some techniques to protect security and privacy under a number of circumstances. Ultimately, users should not claim &quot;airdrop&quot; funds if they have not thought long and hard about the implications.</p>

<iframe width="560" height="315" src="https://www.youtube.com/embed/6CVcirD90pg" frameborder="0" allow="accelerometer; autoplay; encrypted-media; gyroscope; picture-in-picture" allowfullscreen></iframe>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>In this episode, Sarang, Brandon (Suare), and Justin introduce key image reuse concerns. We explain some techniques to protect security and privacy under a number of circumstances. Ultimately, users should not claim &quot;airdrop&quot; funds if they have not thought long and hard about the implications.</p>

<iframe width="560" height="315" src="https://www.youtube.com/embed/6CVcirD90pg" frameborder="0" allow="accelerometer; autoplay; encrypted-media; gyroscope; picture-in-picture" allowfullscreen></iframe>]]>
  </itunes:summary>
</item>
<item>
  <title>Breaking Monero Episode 03: 0-Decoy and Chain Reactions</title>
  <link>https://www.monerotalk.live/breaking-monero-episode-03-0-decoy-and-chain-reactions</link>
  <guid isPermaLink="false">cc200648-abc1-4f89-b8dc-df0ad3f35df1</guid>
  <pubDate>Tue, 08 Jan 2019 12:00:00 -0400</pubDate>
  <author>Monero Talk</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/9813d709-5a6d-4a87-8b5e-46ebf14f99d6/cc200648-abc1-4f89-b8dc-df0ad3f35df1.mp3" length="16500589" type="audio/mp3"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>Monero Talk</itunes:author>
  <itunes:subtitle>Sarang and Justin discuss 0-decoy (0-mixin) rings, perhaps the oldest and best-studied past limitation of Monero. We discuss how research created for 0-decoy rings can be applied to other analysis types. We show a spreadsheet tool we use to test chain reaction impacts, which can be caused by a large number of possible Monero attacks. By understanding the basics of 0-decoy research, individuals can more easily understand how we study the potential impacts of other attacks and analysis.</itunes:subtitle>
  <itunes:duration>21:00</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/9/9813d709-5a6d-4a87-8b5e-46ebf14f99d6/episodes/c/cc200648-abc1-4f89-b8dc-df0ad3f35df1/cover.jpg?v=1"/>
  <description>&lt;p&gt;Sarang and Justin discuss 0-decoy (0-mixin) rings, perhaps the oldest and best-studied past limitation of Monero. We discuss how research created for 0-decoy rings can be applied to other analysis types. We show a spreadsheet tool we use to test chain reaction impacts, which can be caused by a large number of possible Monero attacks. By understanding the basics of 0-decoy research, individuals can more easily understand how we study the potential impacts of other attacks and analysis.&lt;/p&gt;

&lt;iframe width="560" height="315" src="https://www.youtube.com/embed/1CfXHC2IFx4" frameborder="0" allow="accelerometer; autoplay; encrypted-media; gyroscope; picture-in-picture" allowfullscreen&gt;&lt;/iframe&gt; 
</description>
  <itunes:keywords>bitcoin, blockchain, crypto, cryptocurrency, decentralized, monero, moneronews, privacy, privacycoin, technology, xmr, xmrnews, breakingmonero, 0-decoy, chainreactions</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>Sarang and Justin discuss 0-decoy (0-mixin) rings, perhaps the oldest and best-studied past limitation of Monero. We discuss how research created for 0-decoy rings can be applied to other analysis types. We show a spreadsheet tool we use to test chain reaction impacts, which can be caused by a large number of possible Monero attacks. By understanding the basics of 0-decoy research, individuals can more easily understand how we study the potential impacts of other attacks and analysis.</p>

<iframe width="560" height="315" src="https://www.youtube.com/embed/1CfXHC2IFx4" frameborder="0" allow="accelerometer; autoplay; encrypted-media; gyroscope; picture-in-picture" allowfullscreen></iframe>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>Sarang and Justin discuss 0-decoy (0-mixin) rings, perhaps the oldest and best-studied past limitation of Monero. We discuss how research created for 0-decoy rings can be applied to other analysis types. We show a spreadsheet tool we use to test chain reaction impacts, which can be caused by a large number of possible Monero attacks. By understanding the basics of 0-decoy research, individuals can more easily understand how we study the potential impacts of other attacks and analysis.</p>

<iframe width="560" height="315" src="https://www.youtube.com/embed/1CfXHC2IFx4" frameborder="0" allow="accelerometer; autoplay; encrypted-media; gyroscope; picture-in-picture" allowfullscreen></iframe>]]>
  </itunes:summary>
</item>
<item>
  <title>Breaking Monero Episode 02: Ring Signatures Introduction</title>
  <link>https://www.monerotalk.live/breaking-monero-episode-02-ring-signatures-introduction</link>
  <guid isPermaLink="false">0441d053-011f-4e44-af5a-6d0877997e26</guid>
  <pubDate>Fri, 04 Jan 2019 18:00:00 -0400</pubDate>
  <author>Monero Talk</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/9813d709-5a6d-4a87-8b5e-46ebf14f99d6/0441d053-011f-4e44-af5a-6d0877997e26.mp3" length="37314544" type="audio/mp3"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>Monero Talk</itunes:author>
  <itunes:subtitle>We discuss the history of Monero's ring signatures and past approaches to improve them.</itunes:subtitle>
  <itunes:duration>47:32</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/9/9813d709-5a6d-4a87-8b5e-46ebf14f99d6/episodes/0/0441d053-011f-4e44-af5a-6d0877997e26/cover.jpg?v=1"/>
  <description>&lt;p&gt;We discuss the history of Monero's ring signatures and past approaches to improve them.&lt;/p&gt;

&lt;iframe width="560" height="315" src="https://www.youtube.com/embed/6k5uOjkLOno" frameborder="0" allow="accelerometer; autoplay; encrypted-media; gyroscope; picture-in-picture" allowfullscreen&gt;&lt;/iframe&gt;
 
</description>
  <itunes:keywords>bitcoin, blockchain, crypto, cryptocurrency, decentralized, monero, moneronews, privacy, privacycoin, technology, xmr, xmrnews, breakingmonero, ringsignatures</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>We discuss the history of Monero&#39;s ring signatures and past approaches to improve them.</p>

<iframe width="560" height="315" src="https://www.youtube.com/embed/6k5uOjkLOno" frameborder="0" allow="accelerometer; autoplay; encrypted-media; gyroscope; picture-in-picture" allowfullscreen></iframe>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>We discuss the history of Monero&#39;s ring signatures and past approaches to improve them.</p>

<iframe width="560" height="315" src="https://www.youtube.com/embed/6k5uOjkLOno" frameborder="0" allow="accelerometer; autoplay; encrypted-media; gyroscope; picture-in-picture" allowfullscreen></iframe>]]>
  </itunes:summary>
</item>
<item>
  <title>Breaking Monero Episode 01: Introduction</title>
  <link>https://www.monerotalk.live/breaking-monero-episode-01-introduction</link>
  <guid isPermaLink="false">d1d28052-6390-4bd6-9903-bceaf7425832</guid>
  <pubDate>Fri, 21 Dec 2018 14:00:00 -0400</pubDate>
  <author>Monero Talk</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/9813d709-5a6d-4a87-8b5e-46ebf14f99d6/d1d28052-6390-4bd6-9903-bceaf7425832.mp3" length="16879999" type="audio/mp3"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>Monero Talk</itunes:author>
  <itunes:subtitle>Welcome to the first episode of Breaking Monero! Breaking Monero is a series of episodes where we explain the limitations of Monero’s security and privacy in a comprehensive and understandable way. We give a sneak peek into some of the work done behind the scenes to evaluate risks and to make Monero better. It’s an ongoing process, and we are happy to have you here along with us for this part of Monero’s journey!</itunes:subtitle>
  <itunes:duration>23:39</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/9/9813d709-5a6d-4a87-8b5e-46ebf14f99d6/episodes/d/d1d28052-6390-4bd6-9903-bceaf7425832/cover.jpg?v=1"/>
  <description>&lt;p&gt;Welcome to the first episode of Breaking Monero! Breaking Monero is a series of episodes where we explain the limitations of Monero’s security and privacy in a comprehensive and understandable way. We give a sneak peek into some of the work done behind the scenes to evaluate risks and to make Monero better. It’s an ongoing process, and we are happy to have you here along with us for this part of Monero’s journey!&lt;/p&gt;

&lt;iframe width="560" height="315" src="https://www.youtube.com/embed/WOyC6OB6ezA" frameborder="0" allow="accelerometer; autoplay; encrypted-media; gyroscope; picture-in-picture" allowfullscreen&gt;&lt;/iframe&gt; 
</description>
  <itunes:keywords>bitcoin, blockchain, crypto, cryptocurrency, decentralized, monero, moneronews, privacy, privacycoin, technology, xmr, xmrnews, breakingmonero</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>Welcome to the first episode of Breaking Monero! Breaking Monero is a series of episodes where we explain the limitations of Monero’s security and privacy in a comprehensive and understandable way. We give a sneak peek into some of the work done behind the scenes to evaluate risks and to make Monero better. It’s an ongoing process, and we are happy to have you here along with us for this part of Monero’s journey!</p>

<iframe width="560" height="315" src="https://www.youtube.com/embed/WOyC6OB6ezA" frameborder="0" allow="accelerometer; autoplay; encrypted-media; gyroscope; picture-in-picture" allowfullscreen></iframe>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>Welcome to the first episode of Breaking Monero! Breaking Monero is a series of episodes where we explain the limitations of Monero’s security and privacy in a comprehensive and understandable way. We give a sneak peek into some of the work done behind the scenes to evaluate risks and to make Monero better. It’s an ongoing process, and we are happy to have you here along with us for this part of Monero’s journey!</p>

<iframe width="560" height="315" src="https://www.youtube.com/embed/WOyC6OB6ezA" frameborder="0" allow="accelerometer; autoplay; encrypted-media; gyroscope; picture-in-picture" allowfullscreen></iframe>]]>
  </itunes:summary>
</item>
  </channel>
</rss>
