►
From YouTube: Theo Goodman - an Introduction to nym
Description
Berlin Ethereum Meetup - January 2020
A
A
So
I'm
gonna
name
is
a
mix
net
and
but
first
we're
just
gonna.
Have
we're
gonna
go
through
a
discussion
that
some
guys
had
the
other
day?
You
know
because
Internet
traffic
is
observable
by
GPA,
so
GPA
is
global,
passive
adversary.
A
You
know
like
NSA
or
big
China,
all
that
stuff,
but
I
use,
grin,
which
is
a
really
cool
privacy
coin
and
tour
and
signal
on
giant
on
chain
metadata
can
be
harvested
and
Exploited
are
you
signal
traffic
analysis
of
signal
can
reveal
who
is
talking
to
who,
when
and
where
through
the
metadata?
If
you
observe
this,
the
signal
servers
I
thought
if
I
use
a
privacy
coin,
I'm
good
to
go
yeah.
A
A
If
you
use
Z
cache,
if
you
use
a
theory
of
Manero
grin
all
that
stuff,
it's
you
can
all
observe
it
and
you
can
do
chain
analysis
all
the
all
the
things
going
in
and
out
of
the
servers
and
tour
it
just
really
obscures
your
IP
address,
geolocation,
not
the
metadata,
so
we
need
privacy
on
a
different
level
again
and
also
there's
no
incentives
so
tor.
The
usage
of
tor
has
gone
up
a
lot
in
the
last
years,
but
there's
still
only
about
7,000
or
8,000
nodes
and
the
geolocation
of
those
nodes.
A
The
diversity
of
them
is
not
it's
not
expanding,
it's
all
on
a
volunteer
basis.
A
lot
of
them
are
in
Germany,
but
that's
not
really
growing,
as
as
the
network
usage
grows,
so
there's
no,
so
the
incentives
are
messed
up
and
what
can?
What
could
some
of
the
you
know,
global
adversaries?
Passive
adversaries
use
all
this
data
for
what
do
they
want
to
know?
Why
are
they
trying
to?
A
You
know
anticipate
you
know
what
I'm
gonna
drink
if
I'm
gonna
drink,
Grenada,
Apfel,
mate'
or
the
normal
one,
or
what
are
they
using
all
this
for?
Well,
maybe
for
a
social
credit
system,
maybe
for
to
stop
whistleblowers.
Maybe
to
you
know
just
commercialize
mass
surveillance
in
general,
so
just
want
to
tell
you
back
up
a
little
bit
and
tell
you
a
little
bit
about
NIM
and
where
the
team
comes
from,
where
where
some
of
this
technology
comes
from.
A
So
after
the
Snowden
revelations,
some
people
created
panoramix
and
they
approached
the
European
Union
for
funding
to
build
a
mix
net
because
they
said
Europe
can't
depend
just
on
tour.
They
need
to
build
something
stronger
and
not
just
depend
on
on
tour,
and
so
they
and
panoramics
invented
something
called
loop.
X
they
built
loop,
X
and
Lew
picks
is
being
used
in
a
lot
of
mixed
nets
that
right
now
get
into
that
too,
and
over
here
of
the
obscure
loved
antara
that
made
facebook's
Libre
possible.
A
So
there's
also
a
ironic
link
to
NIMH
and
Facebook,
which
seems
weird,
but
at
George
in
the
picture
his
startup
was
bought.
He
fir
he
was
working
on
NIMH,
which
is
anonymous,
mix
net
technology,
and
then
he
was
essentially
poached
by
Facebook,
and
now
he
works
on
Libre.
However,
one
other
guy
from
Dave
from
that
was
also
went
over
to
Facebook
left
Facebook
to
work
on
NIMH.
A
A
Email,
remailers,
good,
for
example,
I
mean
they've
been
around
for
a
while,
for
example,
Adam
Beck
who's
really
into
Bitcoin.
He
used
to
have
an
email
remailer
that
used
a
mix
net.
It
was
really
slow,
high
latency
and
it
was
abused
and
when
Adam
Beck
did
that
he
was
like
damn.
What
maybe
I
need
to
create
something
like
proof
of
work
so
that
it's
not
Sybil
attacked
all
the
time.
So
that
was
one
of
the
motivations
to
do
that.
So
now
we're.
A
But
the
thing
was
they
were
very
they're,
very
slow
and
their
have
high
latency.
But
now
with
the
technology
we
have
today,
we
have
an
opportunity
to
bring
this
old
technology
back
and
maybe
use
it
for
something
really
really
useful.
So
just
like
tor,
maybe
you're
familiar
with
that
it
does
have
multiple
hops.
A
What's
something
that's
unlocked
or
is
that
it
has
decoy
traffic,
so
called
cover
traffic,
and
the
other
thing
that's
very,
very
important,
unlike
tor,
is
that
it
has
the
the
timing
is
obscure.
So
it's
asymmetrical
timing
of
the
cover
traffic.
So
it's
not
like,
like
earlier
I
thought
if
that
was
a
techno
club,
upstairs
someone
was
banging,
but
so,
if
the,
if
the
cover
traffic
is
like
a
techno
club,
well
then
I
mean
a
global
adversary.
Can
you
know
see
through
that
eventually?
But
if
it's
like
a
scratching
DJ,
that's
changing
the
BPM.
A
All
the
time
depend
depending
on
the
packets
coming
in
and
the
amount
of
them.
Then
it's
really
hard
to
figure
out
like
who
is
that
do
I
want
to
watch
this
packet?
What's
this
it
all
kind
of
blends
in,
and
it's
it's
very
plausibly,
deniable
about
what
packet
is,
what
so,
that's
kind
of
a
way
to
explain
it.
You
can
imagine-
and
it's
scalable
like
tor
in
the
sense
that
it's
a
general
mix
net
it's
made
for
so
here
we're
at
the
etherium
Meetup.
A
Well,
the
mix
neck
is
essentially
a
message
can
be
sent
through
and
it
could
be
a
signed
transaction.
It
could
be
a
simple.
A
theorem
transaction
could
be
taps
that
want
to
use
it,
but
we
also
don't
want
to
say:
oh,
this
is
like
only
for
theater
know
it
could
be
Bitcoin.
Could
Bitcoin
transactions
could
go
through
it?
Messaging
system
like
whatsapp,
could
use
it,
for
example,
because
we
are
they.
You
need
a
lot
in
order
to
have
a
good
and
amenity
set.
You
need
a
lot
of
traffic.
You
don't
need
to
specialize.
A
You
need
to
have
more
of
a
general
scope,
like
tour.
Tour.
Also
does
that.
So
this
is
how
it
were
a
basic
outline
of
how
it
works.
The
spins
the
packets
come
in
the
mix
nodes
are
in
the
middle
with
the
N
and
then
the
dummy
packets
or
the
decoy
traffic
also
is
in
their
timing.
Also,
the
timing
thing
happens
all
in
there
and
the
packets
go
out,
and
you
can
compare
that.
So
this
is
I,
don't
fall
down
here.
A
So
maybe
you've
heard
of
Katzen
post,
which
is
a
pretty
cool
project.
It
uses
loop
X.
What
I
was
talking
about
earlier
that
that
they
worked
on
so
that
uses
loop
X
and
while
that's
cool,
it's
highly
specialized.
So
that's
one
problem:
it's
like
right
now,
I
think
it's
used
for
a
mostly
email,
it's
highly
specialized
and
it's
kind
of
unclear
who
gets
to
run
a
node.
It's
not
permission
like
not.
Anyone
can
just
join
the
mix.
Node
Network.
A
As
far
as
I
understand
current
the
current
update
and
then
there
was
this
other
thing
that
came
out
Mason,
but
Mason
is
essentially
a
fork
of
Katzen
post,
which
also
uses
loop
picks,
and
it
says
it's
just
for
aetherium.
So
there's
a
lot
of
problems
there.
The
problem
is:
is
that
it's
highly
specialized
like
I
said
so,
then
the
inanimate,
the
an
amenity
set,
is
just
as
big
as
all
the
daps.
A
Maybe
if
that's
what
it's
made
for
all
the
etherium
users
and
not
as
big
as
as
it
could
be,
for
example,
the
other
thing
is
that
both
cats
on
post
and
Mason-
they
don't
have
the
that
they
don't
change
the
speed
of
the
cover
traffic.
So
there's
a
so
there's
a
problem
there,
so
maybe
it's
just
is
even
questionable
as
if
it's
better
than
using
tor
or
not
so
you're
going
go
through
my
points
again,
centralized
in
permissioned
PKI.
So
it's
not
not
any
one
can
join
either
one
of
those
networks.
A
A
There's
a
very
simplified
way
to
explain
it,
but
that's
how
it
works
and
the
tokens
reward
the
mix
nodes
as
a
kind
of
proof
of
mix
so
yeah-
and
this
is
how
I
was
talking
about
how
the
DJ
is
scratching.
These
changing
the
speed.
Oops
he's
changing
the
speed
of
the
records
and
going
back
and
forth,
and
you
can't
really
tell
so.
This
is
not
it's
dynamically
controlled
how
the
decoy
traffic
and
how
the
network
are
just
so
it's
scalable,
because
if
you
just
set
it
as
one
parameter,
then
it's
it's
easy.
A
A
What
else
validators
transform
named
tokens
into
credentials?
So
the
thing
is
that
the
whole
thing
with
the
validators
you'd
almost
need
a
whole
other
talk
to
to
go
to
go
about
that
and
there's
also
a
video
from
Harry
from
Kaos
communication
camp
that
was
in
the
summer,
but
basically,
like
I,
said,
the
validators
are
just
watching
the
the
mick
the
mix
nodes
and
making
sure
that
they're
not
malicious
and
they're,
actually
doing
what
they
say.
They're
going
to
do
so
timeline,
we
are
actually
on
time
amazing,
so
check
this
out.
A
So
we
get
this
December
2019
test
buddy
test
net
debugging
at
CCC
check
that
happened,
test
net
launched
with
some
volunteers.
From
the
workshop
at
in
Leipzig,
then
January
2020
launch
alpha
test
necks
with
launched
check.
It's
live.
You
can
join
it
now.
February
2020
on
alpha
test
net
should
be
no
problem.
There
is
someone
that
already
has
a
messaging
app
that
is
using
the
test
net
right
now,
so
that's
pretty
cool,
very
big
goal
by
the
end
of
2020,
launch
main
net
and
end
mass
surveillance.
What
you
think
possible,
okay,
wait!
A
A
So
any
questions,
it's
the
PKI,
just
a
smart
contract
or
how's
it
solved
because
I
remember
the
last
time
I
talked
with
Harry.
There
wasn't
really
a
full
solution
to
it.
Good
question:
I,
don't
think
it's
not
just
one
smart
contract,
but
I
also
cannot
explain
it
off
the
cuff
because
they
have
all
these.
So
each
epoch
of
the
mixing
has
some
kind
of
encryption
thing
that
they
do
and
then
the
Valladares
check
it.
A
I
can't
tell
you
much
more
that
it's
not
just
one
smart
contract,
though
it's
more
complicated,
okay,
that's
probably
why
he
couldn't
say
either
all
right.
Thanks
more
questions,
any
other
questions,
please
feel
free
to
contact
me
when
we're
just
hanging
out
here
if
anyone's
around
question
in
the
back
doesn't
have
the
concept
of
hidden
services.
That's
a
good
question!
A
So
right
now
there,
so
there
was
a
question
can't
you
run
the
validator
in
the
mix
net
itself
and
theoretically
you
could
but
right
now
we're
not
there
yet,
because
there's
some
kind
of
there
could
be
I
think
there
could
even
be
collusion
problems.
So
you
want
the
pique
Zuzu's,
for
example,
hidden
service.
Let's
say
that
the
validator
with
the
public
addresses
was
hidden
right.