Subscribe for notification
Crypto

EU Innovation Hub Criticizes Privacy Coins, Crypto Mixers

In its first encryption paper, the EU Innovation Hub for Internal Security studied how privacy coins and mixing techniques affect regulation

Individual privacy and collective security can be reconciled through data encryption. Nevertheless, the adoption of cryptocurrency mixing protocols in European legislative frameworks may be a challenging task.

The EU Innovation Hub, a collaborative initiative that includes members from European Union agencies and member states, has released its inaugural report on encryption. The report underscores the “dual-use” characteristics of cryptographic technologies.

Source: Eurojust

The advantages and disadvantages of cryptocurrency

The report advocated for the inherent dependence of cryptocurrency and nonfungible tokens (NFTs) on public-private cryptography for storage, mining, and transfers.

Nevertheless, certain malicious actors exploit the system to evade law enforcement, particularly protocols and privacy currencies that can “obscure” visibility on the blockchain.

The EU Innovation Hub specifically identified cryptocurrencies layer-2 initiatives, zero-knowledge proofs, crypto mixing services, and non-compliant crypto exchanges are all designed to facilitate the laundering of funds by malicious actors. It stated:

Mimblewimble and zero-knowledge proofs are relatively recent developments that can also obscure the visibility of cryptocurrency addresses, balances, and transactions, even though mixers and privacy coins have been complicating tracing for years.

Encrypting concealed tracks

Additionally, crypto hackers and fraudsters frequently utilize services such as Tornado Cash to divert stolen funds and impede traceability. Nevertheless, law enforcement can monitor these transactions:

“When the private keys of the suspect are obtained, law enforcement authorities can still investigate all of these developments.”

The report was authored by six members of the EU Innovation Hub for Internal Security: Europol, Eurojust, the European Commission’s Directorate-General for Migration and Home Affairs, the European Commission’s Joint Research Center, the European Council’s Counter-Terrorism Coordinator, and the European Union Agency for the Operational Management of Large-Scale IT Systems in the Area of Freedom, Security, and Justice.

Alexey Pertsev, the developer of Tornado Cash, a cryptocurrency mixing protocol, was convicted of money trafficking in May. This conviction has the potential to have severe repercussions for open-source code developers.

Tornado Cash is a noncustodial crypto mixing protocol, which means that the funds processed through the protocol are never retained or controlled by it. Nevertheless, the sentencing took place.

Amid Pertsev’s legal battle with law enforcement, a cross-chain bridge exploiter recently utilized Tornado Cash to siphon $47.7 million in stolen funds.

Hillary Ondulohi

Hillary is a media creator with a background in mechanical engineering. He leverages his technical expertise to craft informative pieces on protechbro.com, making complex concepts accessible to a wider audience.

Disqus Comments Loading...

Recent Posts

Apple Acknowledges Security Flaw Exposing Crypto Users—Here’s What to Do

Apple acknowledged on Monday that its devices were susceptible to an exploit that enabled the execution of remote malicious code…

12 minutes ago

Hackers Breach Tate’s Online ‘University,’ Steal Data

Hackers have infiltrated an online course that was established by Andrew Tate, a self-described misogynist and purported influencer The compromise…

5 hours ago

Apple Builds Conversational Siri with LLMs

Apple is reportedly working on an enhanced version of Siri, incorporating large language models (LLMs) to create a more conversational…

5 hours ago

YouTube Shorts Unveils AI Video Backgrounds

Thursday was the day that YouTube announced that its Dream Screen feature for Shorts now allows users to construct movie…

6 hours ago

Marissa Mayer Pitches Ad-backed AI Chatbot Model

Marissa Mayer proposes a business model for AI chatbots funded by advertising, highlighting potential opportunities for monetization Marissa Mayer possesses…

6 hours ago

Palo Alto Networks Warns of Firewall Breaches

By exploiting two new zero-day vulnerabilities discovered in widely used software developed by cybersecurity behemoth Palo Alto Networks, malicious hackers…

6 hours ago