April 6, 2026

Capitalizations Index – B ∞/21M

MimbleWimble: Is BTC [BTC] BTC’s Curse Looming on The Horizon?

Mimblewimble: is btc [btc] btc’s curse looming on the horizon?

MimbleWimble: Is BTC [BTC] BTC’s Curse Looming on The Horizon?


Mimblewimble bitcoin btcusd btc voodoo doll
Cryptocurrency protocol MimbleWimble could challenge BTC [BTC] BTC’s status as the crypto king. | Source: Shutterstock

By CCN.com: MimbleWimble, named after a curse from the Harry Potter book series, is a protocol, much like BTC [BTC] BTC’s blockchain, that contains improved privacy features derived from multiple technologies, some more established than others.

Mimblewimble bitcoin btcusd btc

Key components in MimbleWimble are:

(a) Elliptic Curve Cryptography (ECC), which enables private-public key encryption – a way to prove you know something without revealing the content of the encrypted information;

(b) Confidential Transactions, which allows for public verification of the transaction without revealing any significant details, like the amounts or addresses – which, in essence, do not really exist in MimbleWimble, but I’ll get to that later;

(c) CoinJoins, through a mechanism called anonymity set that enables transactions from multiple senders to be batched into a single transaction; and

(d) Dandelion, an improved gossip protocol network that contains increased privacy working mechanics, by using hops in-between nodes before publicizing the transaction to the neighboring nodes.

History has taught me any technology represents a means to achieve an end, and the purpose of MimbleWimble is quite similar to BTC [BTC] BTC’s: to allow for value to be transferred and stored in a decentralized manner, privately and without intermediaries.

A Brief History of MimbleWimble

My goal today is to explain to non-magical folk how this technology works and why are there so many prominent cryptocurrency enthusiasts, such as BTC [BTC] BTC Core developers Andreas Antonopoulos and Jimmy Song or authors like Chris Dixon and Daniel Jeffries, discussing the hypothesis of MimbleWimble becoming a serious side-chain protocol, by exponentially improving on BTC [BTC] BTC’s privacy features.

The initial MimbleWimble whitepaper was drafted by Tom Jedusor in 2016, with clear references to Greg Maxwell’s work on confidential transactions and CoinJoin, as well as to a previous anonymous paper posted in 2013 introducing one-way aggregate signatures, a functionality which obfuscates inputs and outputs, similar to CoinJoin.

The first MimbleWimble implementation, Beam, was fully released on January 3 and is now live and minable. This means anyone can join to support the network – although in order to do so, one does require both specific hardware, in this case, a GPU processor, and some technical savviness to understand how to set up a node.

Anyhow, the oldest implementation of Milmblewimble (and the one I will focus my attention on), is called Grin.

The first Grin testnet was launched in November 2017, and the project is currently live, since January 15. The Grin repository is currently maintained by anonymous developers and does not have a clear business model just yet, whilst Beam is a much more hierarchical and organized structure, like Blockstream for example.

Both are aiming to achieve the same goal, which is to provide a live and functional network for MimbleWimble.

The Blueprint of Privacy

Mimblewimble grin bitcoin btcusd btc
Source: grin

As mentioned a couple of times already, the purpose MimbleWimble serves is to improve users privacy, as transactions cannot be linked to a specific IP, which is one of the current bottlenecks with BTC [BTC] BTC. Not only that, but the way MimbleWimble works allows for close-to-infinite scalability.

Before we get into the whole scalability ordeal, let’s see how MimbleWimble combines the technologies mentioned initially.

Firstly, both implementations chose to use an ASIC-resistant algorithm, such as Cuckoo Cycle (in Grin) or Equihash Pow (Beam) to promote a higher degree of decentralization while adopting a secure model (a: ECC).

Secondly, when a transaction is broadcast, it will hop to a number of other neighboring nodes before being broadcast to the entire network (d: Dandelion). Remember what I mentioned in the beginning? No one knows the inputs and outputs (b: Confidential Transaction).

Well, good luck trying to find the originator, as each additional hop means an additional node you need to inspect (c: CoinJoin), including its connections – an almost impossible task to accomplish with a set of 3 to 4 hops per transaction.

Thirdly (and lastly), the MimbleWimble blockchain is bound to the number of users using the network, not to the number of transactions/addresses, so you can already imagine the impact on scaling the network: nodes only need to register block headers for current UTXO (unspent transactions), not for the entire chain. Plus, this means there are neither addresses nor transactions.

Right – But How Does MimbleWimble Actually Work?

The first time I read the whitepaper, it did seem…magic!

However, after many failed attempts, I understood how users could transact with neither addresses nor amounts – not an easy accomplishment if you ask me.

The validation of MimbleWimble transactions relies on two basic properties:

  1. Verification of zero sums. The sum of outputs minus inputs always equals zero, proving that the transaction did not create new funds, without revealing the actual amounts.
  2. Possession of private keys. Like with most other cryptocurrencies, ownership of transaction outputs is guaranteed by the possession of ECC private keys. However, the proof that an entity owns those private keys is not achieved by directly signing the transaction.

Simply put, because there are no amounts as the sum of the inputs and outputs is zero, and because users don’t need to sign any transaction with their private keys, there is no need for actual addresses.

What matters in the end are UTXOs or unspent transactions.

A Final Look at MimbleWimble

MimbleWimble has the potential to significantly reduce both transaction costs and blockchain size, where other blockchains necessarily would have to grow over time, the required MimbleWimble dataset does not, which would solve the scaling problem.

From a technological point-of-view, MimbleWimble is a rather intriguing protocol that could offset a new wave of blockchain development. If Grin (and now Beam) can prove this consensus model based on opaque transactions works properly without addresses, amounts, or signatures, we could finally have a serious contender to the king, BTC [BTC] BTC (and to established privacy coins).

The main points the protocol promotes, and its advantages when compared to, BTC [BTC] BTC are:

  • Extremely good scalability, as the great majority of transaction data can be eliminated over time without compromising security.
  • Increased privacy by mixing and removing transaction data.
  • Faster node sync time, as the nodes would connect with the rest of the network very efficiently.

Let’s see what the future holds for both Grin and Beam; will this novel technology do serious damages to prominent privacy coins like Monero, Zcash, and Monaco?

Disclaimer: The views expressed in the article are solely that of the author and do not represent those of, nor should they be attributed to CCN.

Featured image from Shutterstock.

Published at Sun, 20 Jan 2019 19:15:02 +0000

Previous Article

Saudi Arabia and United Arab Emirates to Launch a Cryptocurrency for Banks. Underlying Blockchain Tech Still Undisclosed

Next Article

Güldür Güldür Show 170. Bölüm | Bitcoin [BTC] Pazarı

You might be interested in …

Bitcoin weekly pretty much bearish.

Bitcoin Weekly pretty much bearish.

bitcoin Weekly pretty much bearish. EN English (UK) EN English (IN) DE Deutsch FR Français ES Español IT Italiano PL Polski SV Svenska TR Türkçe RU Русский PT Português ID Bahasa Indonesia MS Bahasa Melayu […]

After Second Hack This Year, South Korean Exchange Youbit Closes Down

After Second Hack This Year, South Korean Exchange Youbit Closes Down

South Korean exchange Youbit announced on its website today that it is closing down after a hack early Tuesday, December 19, 2017, that resulted in the loss of 17 percent of its assets.

The exchange, previously known as Yapizon, did not indicate how many bitcoins or other cryptocurrencies were stolen or what the total fiat value of the attack amounted to, but it was enough to lead to bankruptcy.

This was the second hack the exchange suffered this year. A prior attack in April 2017, resulted in the loss of 3,816 bitcoins, worth around $5 million at the time.

Youbit said hackers broke into its hot wallet, the online account used to pay out cryptocurrencies instantly. While hot wallets offer greater convenience, they also put funds at greater risk because they are connected to the internet.

The remaining coins were kept offline in a cold wallet, the exchange said, resulting in no additional losses. The exchange indicated that customers could withdraw up to 75 percent of their balances, and the rest would be tallied out after the final settlement.

Korea Internet & Security Agency (KISA), the state agency that responds to cyberattacks, is investigating the incident, as reported in Reuters. KISA has maintained that North Korean hackers were behind the first hack.

Chris Doman, threat engineer at software security company AlienVault, told bitcoin Magazine, he suspects BlueNoroff, a subgroup of North Korea’s cyber crime group Lazarus is responsible for the second Youbit attack. Lazarus is known for the November 2014 hack on Sony Pictures Entertainment, one of the biggest corporate breaches in history.

While attacks by Lazarus have mainly been aimed at social disruption, recent reports indicate the group is increasingly going after money. With the value of bitcoin surging to all-time highs, exchanges are becoming a lucrative target.

“The first time I saw them target a bitcoin company was in May this year — the same month they unleashed WannaCry,” Doman said in a statement shared with bitcoin Magazine.

The exchange that Doman was refering to is South Korean bitcoin exchange Bithumb. Around that same time, WannaCry ransomware attacks were encrypting user’s computers and offering to de-encrypt them in exchange for bitcoin. Analysis of the techniques used in the WannaCry attacks show strong links to Lazarus.  

Doman added, “They’ve also used related malware to opportunistically mine Monero coins on compromised servers. Clearly they have a large interest in cryptocurrencies as an easy method for economic gain, as well as an opportunity to economically weaken their enemies.”

Although Youbit is one of the smaller bitcoin exchanges, the hack underscores the risk involved in leaving funds on an exchange, where control of those funds is handed over to a third party and is only as safe as whatever security measures that exchange chooses to use.

Throughout the history of bitcoin, hacks have amounted to painful losses. When bitcoin exchange Mt. Gox began liquidation proceedings in April 2014, the company announced that approximately 850,000 bitcoins were missing, an amount valued at more than $450 million at the time. In August 2016, the bitcoin exchange Bitfinex announced hackers stole approximately 120,000 BTC, worth $72 million at the time.

The post After Second Hack This Year, South Korean Exchange Youbit Closes Down appeared first on Bitcoin Magazine.