Zooko Wilcox-O'Hearn

Last updated

Zooko Wilcox-O'Hearn
2017-12-29 Zooko Wilcox-O'Hearn 8102.jpg
Zooko Wilcox-O'Hearn at 34C3 in 2017
Born
Bryce Wilcox

(1974-05-13) May 13, 1974 (age 50)
EmployerElectric Coin Company
Parents
  • Ron Wilcox (father)
  • Olene Harris (mother)
Website zooko on Twitter

Zooko Wilcox-O'Hearn (born Bryce Wilcox; 13 May 1974 in Phoenix, Arizona), is an American Colorado-based computer security specialist, self-proclaimed cypherpunk, and ex-CEO of the Electric Coin Company (ECC), a for-profit company leading the development of Zcash. [1]

Biography

He is known for the Tahoe Least-Authority File Store (or Tahoe-LAFS), a secure, decentralized, fault-tolerant filesystem [2] [3] released under GPL and the TGPPL licenses. He is the creator of the Transitive Grace Period Public Licence (TGPPL). [4]

Wilcox-O'Hearn is the designer of multiple network protocols that incorporate concepts such as self-contained economies and secure reputation systems. [5] He is a member of the development team of ZRTP [6] and the BLAKE2 cryptographic hash function. [7] [8]

Zooko's triangle is named after Wilcox-O'Hearn, who described the schema that relates three desirable properties of identifiers in 2001. [9]

Wilcox-O'Hearn was founder and CEO of Least Authority Enterprises in Boulder, Colorado [1] where he is now an advisor. [10]

Zooko was a developer of the MojoNation [11] P2P system and lead developer of the follow-on Mnet network, [12] and a developer at SimpleGeo. [13]

Wilcox-O'Hearn worked on the first cryptocurrency, DigiCash, with David Chaum in 1996. [14] He is a member of the founding team of the anonymous cryptocurrency Zcash, which launched in 2016. [14] He currently serves as the CEO of the affiliated Electric Coin Company. [15] Wilcox later commissioned the Rand Corporation to study whether anonymous coins were disproportionately represented in criminal transactions; the study found they were not. [15]

Additionally Wilcox-O'Hearn was one of the co-creators of Blake3. [16]

Related Research Articles

A cypherpunk is any individual advocating widespread use of strong cryptography and privacy-enhancing technologies as a route to social and political change. Originally communicating through the Cypherpunks electronic mailing list, informal groups aimed to achieve privacy and security through proactive use of cryptography. Cypherpunks have been engaged in an active movement since at least the late 1980s.

<span class="mw-page-title-main">Cryptographic hash function</span> Hash function that is suitable for use in cryptography

A cryptographic hash function (CHF) is a hash algorithm that has special properties desirable for a cryptographic application:

An anonymous P2P communication system is a peer-to-peer distributed application in which the nodes, which are used to share resources, or participants are anonymous or pseudonymous. Anonymity of participants is usually achieved by special routing overlay networks that hide the physical location of each node from other participants.

Proof of work (PoW) is a form of cryptographic proof in which one party proves to others that a certain amount of a specific computational effort has been expended. Verifiers can subsequently confirm this expenditure with minimal effort on their part. The concept was invented by Moni Naor and Cynthia Dwork in 1993 as a way to deter denial-of-service attacks and other service abuses such as spam on a network by requiring some work from a service requester, usually meaning processing time by a computer. The term "proof of work" was first coined and formalized in a 1999 paper by Markus Jakobsson and Ari Juels. The concept was adapted to digital tokens by Hal Finney in 2004 through the idea of "reusable proof of work" using the 160-bit secure hash algorithm 1 (SHA-1).

<span class="mw-page-title-main">Merkle tree</span> Type of data structure

In cryptography and computer science, a hash tree or Merkle tree is a tree in which every "leaf" node is labelled with the cryptographic hash of a data block, and every node that is not a leaf is labelled with the cryptographic hash of the labels of its child nodes. A hash tree allows efficient and secure verification of the contents of a large data structure. A hash tree is a generalization of a hash list and a hash chain.

A Sybil attack is a type of attack on a computer network service in which an attacker subverts the service's reputation system by creating a large number of pseudonymous identities and uses them to gain a disproportionately large influence. It is named after the subject of the book Sybil, a case study of a woman diagnosed with dissociative identity disorder. The name was suggested in or before 2002 by Brian Zill at Microsoft Research. The term pseudospoofing had previously been coined by L. Detweiler on the Cypherpunks mailing list and used in the literature on peer-to-peer systems for the same class of attacks prior to 2002, but this term did not gain as much influence as "Sybil attack".

<span class="mw-page-title-main">Adam Back</span> British cryptographer and cypherpunk (born 1970)

Adam Back is a British cryptographer and cypherpunk. He is the CEO of Blockstream, which he co-founded in 2014. He invented Hashcash, which is used in the Bitcoin mining process.

Tahoe-LAFS is a free and open, secure, decentralized, fault-tolerant, distributed data store and distributed file system. It can be used as an online backup system, or to serve as a file or Web host similar to Freenet, depending on the front-end used to insert and access files in the Tahoe system. Tahoe can also be used in a RAID-like fashion using multiple disks to make a single large Redundant Array of Inexpensive Nodes (RAIN) pool of reliable data storage.

BLAKE is a cryptographic hash function based on Daniel J. Bernstein's ChaCha stream cipher, but a permuted copy of the input block, XORed with round constants, is added before each ChaCha round. Like SHA-2, there are two variants differing in the word size. ChaCha operates on a 4×4 array of words. BLAKE repeatedly combines an 8-word hash value with 16 message words, truncating the ChaCha result to obtain the next hash value. BLAKE-256 and BLAKE-224 use 32-bit words and produce digest sizes of 256 bits and 224 bits, respectively, while BLAKE-512 and BLAKE-384 use 64-bit words and produce digest sizes of 512 bits and 384 bits, respectively.

Namecoin is a cryptocurrency originally forked from bitcoin software. It uses proof-of-work algorithm. Like bitcoin, it is limited to 21 million coins.

<span class="mw-page-title-main">Bitcoin protocol</span> Rules that govern the functioning of Bitcoin

The Bitcoin protocol is the set of rules that govern the functioning of Bitcoin. Its key components and principles are: a peer-to-peer decentralized network with no central oversight; the blockchain technology, a public ledger that records all Bitcoin transactions; mining and proof of work, the process to create new bitcoins and verify transactions; and cryptographic security.

Zerocoin is a privacy protocol proposed in 2013 by Johns Hopkins University professor Matthew D. Green and his graduate students, Ian Miers and Christina Garman. It was designed as an extension to the Bitcoin protocol that would improve Bitcoin transactions' anonymity by having coin-mixing capabilities natively built into the protocol. Zerocoin is not currently compatible with Bitcoin.

<span class="mw-page-title-main">Matthew D. Green</span> American cryptographer and security technologist (born 1976)

Matthew Daniel Green is an American cryptographer and security technologist. Green is an Associate Professor of Computer Science at the Johns Hopkins Information Security Institute. He specializes in applied cryptography, privacy-enhanced information storage systems, anonymous cryptocurrencies, elliptic curve crypto-systems, and satellite television piracy. He is a member of the teams that developed the Zerocoin anonymous cryptocurrency and Zerocash. He has also been influential in the development of the Zcash system. He has been involved in the groups that exposed vulnerabilities in RSA BSAFE, Speedpass and E-ZPass. Green lives in Baltimore, MD with his wife, Melissa, 2 children and 2 miniature dachshunds.

Monero is a cryptocurrency which uses a blockchain with privacy-enhancing technologies to obfuscate transactions to achieve anonymity and fungibility. Observers cannot decipher addresses trading Monero, transaction amounts, address balances, or transaction histories.

<span class="mw-page-title-main">Zcash</span> Cryptocurrency aimed at privacy

Zcash is a privacy-focused cryptocurrency which is based on Bitcoin's codebase. It shares many similarities, such as a fixed total supply of 21 million units.

Hash-based cryptography is the generic term for constructions of cryptographic primitives based on the security of hash functions. It is of interest as a type of post-quantum cryptography.

A blockchain is a shared database that records transactions between two parties in an immutable ledger. Blockchain documents and confirms pseudonymous ownership of all transactions in a verifiable and sustainable way. After a transaction is validated and cryptographically verified by other participants or nodes in the network, it is made into a "block" on the blockchain. A block contains information about the time the transaction occurred, previous transactions, and details about the transaction. Once recorded as a block, transactions are ordered chronologically and cannot be altered. This technology rose to popularity after the creation of Bitcoin, the first application of blockchain technology, which has since catalyzed other cryptocurrencies and applications.

Dmitry Khovratovich is a Russian cryptographer, currently a Lead Cryptographer for the Dusk Network, researcher for the Ethereum Foundation, and member of the International Association for Cryptologic Research.

References

  1. 1 2 DJ Pangburn (2013). "Introducing the PRISM-Proof Storage Device". motherboard. Vice. Archived from the original on 28 August 2013.
  2. Wilcox-O'Hearn, Zooko, ANNOUNCING allmydata.org "Tahoe", the Least-Authority Filesystem, v1.3 , retrieved 20 April 2009
  3. Orlowski, Andrew (22 April 2009). "Why Whack-a-Tard won't save music". The Register. Retrieved 3 June 2021.
  4. Yee, Ka-Ping (2008). An Open Source License Idea (PDF). PyCon.
  5. Ferne, Peter (21 November 2008). "Collaborative Filtering and Social Capital". World Wide Web Consortium (W3C).
  6. zfoneproject (2010). "About The Zfone™ Project" . Retrieved 31 December 2017.
  7. "BLAKE2 website". BLAKE2 Team. 19 November 2012. Retrieved 3 June 2021.
  8. Jean-Philippe Aumasson; Samuel Neves; Zooko Wilcox-O'Hearn; Christian Winnerlein (2013). "BLAKE2: simpler, smaller, fast as MD5" (PDF). Applied Cryptography and Network Security. Lecture Notes in Computer Science. Vol. 7954. IACR. pp. 119–135. doi:10.1007/978-3-642-38980-1_8. ISBN   978-3-642-38979-5.
  9. Ferdous, Md. Sadek; Jøsang, Audun; Singh, Kuldeep; Borgaonkar, Ravishankar (2009). "Security Usability of Petname Systems" (PDF). Identity and Privacy in the Internet Age. Lecture Notes in Computer Science. Vol. 5838. pp. 44–59. CiteSeerX   10.1.1.617.1149 . doi:10.1007/978-3-642-04766-4_4. ISBN   978-3-642-04765-7.
  10. "About Us". Least Authority Enterprises. 2017. moved to Berlin in 2016
  11. Staff (29 July 2000). "Get Your Music Mojo Working". Wired Magazine . Retrieved 3 June 2021.
  12. "Cutting edge P2P, crypto comes to your PC". The Register. 25 February 2002.
  13. "Post-Funding, SimpleGeo Pounces on a Six Aparter, A Hacker, And Beta Keys". TechCrunch. 14 December 2009.
  14. 1 2 O'Hearn, Zooko (29 December 2017). "Cryptocurrencies, smart contracts, etc.: revolutionary tech?". 34C3 (video). Chaos Computer Club . Retrieved 3 June 2021.
  15. 1 2 del Castillo, Michael (6 May 2020). "Cypherpunk Zooko Wilcox Aims To Bring Anonymous Zcash To Law-Abiding Masses". Forbes. Retrieved 1 June 2020.
  16. "Blake3 github". GitHub .