Back to Course

3. Advanced Course

0% Complete
0/0 Steps
  1. 1. What is Taproot?
  2. 2. Blockchain bridges – what are they?
  3. 3. What is Ethereum Plasma?
  4. 4. What is Ethereum Casper?
  5. 5. What is Zk-SNARK and Zk-STARK? 
  6. 6. What is Selfish Mining? 
  7. 7. What is spoofing in the cryptocurrency market? 
  8. 8. Schnorr signatures - what are they? 
  9. 9. MimbleWimble - what is it? 
  10. 10. What is digital property rights in NFT?
  11. 11. What are ETFs and what role do they play in the cryptocurrency market? 
  12. 12. How to verify a cryptocurrency project – cryptocurrency tokenomics 
  13. 13. What is the 51% attack on blockchain?
  14. 14. What is DAO, and how does it work?
  15. 15. Zero-knowledge proof – a protocol that respects privacy 
  16. 16. What is EOSREX?
  17. 17. What is Proof of Elapsed Time (PoET)?
  18. 18. Mirror Protocol – what it is? 
  19. 19. What are synthetic assets? 
  20. 20. How to create your own NFT? 
  21. 21. Definition of DeFi, and what are its liquidations?
  22. 22. New identity system - Polygon ID
  23. 23. Ethereum Foundation and the Scroll protocol - what is it?
  24. 24. What is Byzantine fault tolerance in blockchain technology?
  25. 25. Scalability of blockchain technology - what is it?
  26. 26. Interchain Security - new Cosmos (ATOM) protocol
  27. 27. Coin Mixing vs. Coin Join - definition, opportunities, and threats
  28. 28. What is Ethereum Virtual Machine (EVM) and how does it work?
  29. 29. Soulbound Tokens - what are they, and how do they work?
  30. 30. Definition of LIDO - what is it?
  31. 31. What are Threshold Signatures, and how do they work?
  32. 32. Blockchain technology and cyberattacks.
  33. 33. Bitcoin script - what it is, and what you should know about it.
  34. 34. What is zkEVM, and what are its basic features?
  35. 35. Do confidential transactions on blockchain exist? What is a Confidential Transaction?
  36. 36. Algorithmic stablecoins - everything you should know about them.
  37. 37. Polygon Zk Rollups ZKP - what should you know about it?
  38. 38. What is Web3 Infura?
  39. 39. Mantle - Ethereum L2 scalability - how does it work?
  40. 40. What is the NEAR Rainbow Bridge?
  41. 41. Liquid Staking Ethereum and LSD tokens. What do you need to know about it?
  42. 42. Top 10 blockchain oracles. How do they work? How do they differ?
  43. 43. What are Web3.js and Ether.js? What are the main differences between them?
  44. 44. What is StarkWare, and recursive validity proofs
  45. 45. Quant Network: scalability of the future
  46. 46. Polygon zkEVM - everything you need to know
  47. 47. What is Optimism (OP), and how do its roll-ups work?
  48. 48. What are RPC nodes, and how do they work?
  49. 49. SEI Network: everything you need to know about the Tier 1 solution for DeFi
  50. 50. Types of Proof-of-Stake Consensus Mechanisms: DPoS, LPoS and BPoS
  51. 51. Bedrock: the epileptic curve that ensures security!
  52. 52. What is Tendermint, and how does it work?
  53. 53. Pantos: how to solve the problem of token transfer between blockchains?
  54. 54. What is asymmetric encryption?
  55. 55. Base-58 Function in Cryptocurrencies
  56. 56. What Is the Nostr Protocol and How Does It Work?
  57. 57. What Is the XDAI Bridge and How Does It Work?
  58. 58. Solidity vs. Rust: What Are the Differences Between These Programming Languages?
  59. 59. What Is a Real-Time Operating System (RTOS)?
  60. 60. What Is the Ethereum Rinkeby Testnet and How Does It Work?
  61. 61. What Is Probabilistic Encryption?
  62. 62. What is a Pinata in Web 3? We explain!
  63. 63. What Is EIP-4337? Will Ethereum Account Abstraction Change Web3 Forever?
  64. 64. What are smart contract audits? Which companies are involved?
  65. 65. How does the AirGapped wallet work?
  66. 66. What is proto-danksharding (EIP-4844) on Ethereum?
  67. 67. What is decentralised storage and how does it work?
  68. 68. How to Recover Cryptocurrencies Sent to the Wrong Address or Network: A Practical Guide
  69. 69. MPC Wallet and Multilateral Computing: Innovative Technology for Privacy and Security
  70. 70. Threshold signature in cryptography: an advanced signing technique!
  71. 71. Vanity address in cryptocurrencies: what is it and what are its characteristics?
  72. 72. Reentrancy Attack on smart contracts: a threat to blockchain security!
  73. 73. Slither: a static analyser for smart contracts!
  74. 74. Sandwich Attack at DeFi: explanation and risks!
  75. 75. Blockchain RPC for Web3: A key technology in the world of decentralized finance!
  76. 76. Re-staking: the benefits of re-posting in staking!
  77. 77. Base: Evolving cryptocurrency transactions with a tier-2 solution from Coinbase
  78. 78. IPFS: A new era of decentralized data storage
  79. 79. Typical vulnerabilities and bridge security in blockchain technology
  80. 80. JumpNet - Ethereum's new sidechain
Lesson 9 of 80
In Progress

9. MimbleWimble – what is it? 

The MimbleWimble protocol is something for Harry Potter fans. It is a very fascinating new privacy-focused operating scheme for blockchain. It is designed to revolutionise privacy and security in the cryptocurrency world. 

MimbleWimble was created in 2016. It was created by a person under the pseudonym Tom  Elvis Jedusor. Incidentally, this is the French name of Lord Voldemort. MimbleWimble is also a name from the world of these famous wizards. It is a term for a defensive spell. Tom Elvis  Jedusor has developed a new protocol that has dramatically improved the privacy,  scalability, and volatility conditions of cryptocurrencies. This scheme is said not to work as a  traditional blockchain transaction model. It is more of an implementation that facilitates the process of retrieval, synchronisation and verification. 

How does the protocol work? 

You understand a high level of privacy in transactions is only guaranteed by many cryptocurrencies. Thus, they require a lot of space on the blockchain, which at the same time makes it bigger, heavier and less scalable. A perfect example of this is Bitcoin or Ethereum

The blockchain, which runs on the MimbleWimble protocol, does not contain individual addresses and user transactions. It collects everything into larger groups and writes in a  large transaction. It is then validated and verified without individual, unnecessary details.  MimbleWimble hides the public addresses of the sender and recipient, and the amount of the transaction. This saves space in the blockchain significantly. 

Putting the above facts together, you will have noticed that transactions made using this scheme belong to so-called confidential transactions. As a result, the user can even encrypt the number of coins sent from third parties. As we mentioned above, when verifying transactions in MimbleWimble you only observe the list of inputs, outputs and basic information. What is missing here is the detail that is sometimes necessary. 

So, how are transactions validated? The number of inputs must be equal to the number of outputs. The difference between the two must always be zero. Who is the transaction validator, then? No one. The entire validation process is based on the Pedersen scheme. MimbleWimble has two basic, and most important, features: 

Cut Through a feature that compresses blocks in the blockchain. This removes a lot of unnecessary information from the blockchain without compromising the security of the entire blockchain. 

CoinJoin – is a cryptographic function. It links payments from different users together. The  result is a single, larger transaction in which all data is confidential. Information about addresses, the amount of the transaction, is known only to the parties involved in the process. 

Dandelion protocol 

This is undoubtedly the basis of MimbleWimble’s anonymity. It was proposed by Giulia Fanti.  It proposes privacy and anonymity solutions. It is designed to reduce the risk and probability of the origin of a given transaction on the blockchain. Therefore, Dandelion operates on the  basis of two phases: 

Stem Phaze (we translate this literally as root phase). This is where the entry point of a  transaction is sent to randomly selected nodes. In this way, there is no way for the node to which the transaction goes to recognise where the source and repeat of the transaction is.  Clever. 

Fluff. Phase two. It uses the Gossip protocol in its operation. This is an information relay,  dealing with the distribution of information between the nodes of the network, which operate 

because of MimbleWimble. In phase two, Dandelion sends a given transaction to all pairs,  using the Gosspi protocol just mentioned. 

Advantages 

Surely, you have had time to notice how many advantages MimbleWimble has over other cryptocurrencies. The most significant are three of them: 

∙ Scalability. Transactions made within the MimbleWimble protocol require little space. ∙ Anonymity. The lack of public sender, receiver addresses makes it impossible to track transactions. 

∙ Fungibility. Addresses on the MimbleWimble blockchain are not registered.  Consistent, we cannot know the origin of the coins. As a result, we are therefore unable to mark them negatively. 

Disadvantages 

∙ It is true that the protocol has the potential to revolutionise the blockchain system.  However, it also has its disadvantages: 

∙ It has a longer transaction throughput compared to other protocols. ∙ It is more vulnerable to attacks by quantum computers because it relies on digital signatures. 

∙ 

Cryptocurrencies with MimbleWimble 

Beam – launched in 2018. It has its private investors backing the project. Beam has the  MimbleWimble protocol implemented. Written in C++, it is based on the Proof of Work:  Equihash algorithm. 

Grin – a relatively young cryptocurrency that was created in the second half of 2019. Also supported by donations and its community. Developed in the Rust language, it uses the  Proof of Work: Cuckoo Cycle algorithm. 

MimbleWimble, and Bitcoin 

The protocol can be implemented as a soft fork of Bitcoin. Exactly as it was in the case of  Lightning Network discussed earlier. MimbleWimble would contribute to Bitcoin’s scalability.  To date, there has been considerable discussion about this among the community of this flagship cryptocurrency. 

Some Bitcoin experts or developers believe that implementing this protocol on Bitcoin could be too difficult. The other side believes that MimbleWimble could be a sidechain solution for  Bitcoin. 

Well, if Litecoin was able to implement MimbleWimble, Bitcoin can too. 

MWC – the MimbleWimble coin 

This is, of course, the protocol’s native coin. Often described as ‘superior ghost money’. It is very rare, private and as the MimbleWimble protocol goes – an untraceable currency. It is therefore available on just three exchanges: Bitforex, Hotbit and TradeOgre. It is not one of  the most popular because, given a choice, most crypto users will opt to transact using  Litecoin, Monero or Zcash. 

MimbleWimble, and mining

Yes, you read that right. As the scheme is based on a Proof-of-Work protocol, it can be mined like Bitcoin. MimbleWimble mining is available based on the Cuckarood29 and  cuckAToo31 algorithm. The reward per block is 0.6 MWC. You will use CPU, GPU, and ASIC copters for this. 

Summary

The MimbleWimble protocol can work not only as a standalone network. It will also work well as a sidechain or payment channel solution. It enhances scalability and privacy.  Furthermore, it can be useful in the adoption of virtually the entire cryptocurrency ecosystem.  At this point, we know that the protocol introduces revolutionary solutions and has many good things to offer.