Key English Chinese (Traditional)
footer->feed RSS Feed RSS Feed
home->choosewallet_para To use Monero, the first thing you are going to need is a wallet. Visit our Downloads page and get the right wallet for you. The Monero wallets are available for a variety of platforms and contain everything you need to use Monero immediately. 以使用門羅幣, 您先必須擁有一錢包. 請造訪我們了下載頁面並選擇最適合您的錢包.
門羅幣錢包適用於多方平台並具有完整素材供您立即使用門羅幣.
downloads->helpsupport1 A guide with an explanation of every section of the wallet is available: A guide with an explanation of every section of the wallet is available:
downloads->gui_helpsupport If you are experiencing issues or you need more info, feel free to reach out to the community. You can find the GUI team at #monero-gui, or else check out the Hangouts page for a more complete list of contacts and chatrooms 如果您遇到問題或是需要更多的資料,請向社群求助。您可以在 #monero-gui 聯繫GUI開發者,或是在聊天室頁面找到完整的聯絡方式及聊天室列表。
downloads->cli_helpsupport If you are experiencing issues or you need more info, feel free to reach out to the community. You can find the CLI team at #monero or #monero-dev, or else check out the Hangouts page for a more complete list of contacts and chatrooms If you are experiencing issues or you need more info, feel free to reach out to the community. You can find the CLI team at #monero or #monero-dev, or else check out the Hangouts page for a more complete list of contacts and chatrooms
downloads->verify1 You are strongly advised to verify the hashes of the archive you downloaded. This will confirm that the files you downloaded perfectly match the files uploaded by the Monero development workgroup. Please don't underestimate this step, a corrupted archive could result in lost funds. You are strongly advised to verify the hashes of the archive you downloaded. This will confirm that the files you downloaded perfectly match the files uploaded by the Monero development workgroup. Please don't underestimate this step, a corrupted archive could result in lost funds. Always verify your downloads!
downloads->showhash3 in the source code Two guides are available to guide you through the verification process:
downloads->mobilelight3 page to see where we are. page to see where we are.
press-kit->marketing Marketing Material Marketing Material
press-kit->dontbuysticker The 'Don't buy Monero' sticker The 'Don't buy Monero' sticker
press-kit->dontbuystickerp Spread Monero everywhere with the help of this sticker. Available in multiple languages and formats (vectors included). Spread Monero everywhere with the help of this sticker. Available in multiple languages and formats (vectors included).
press-kit->guerrillakit Guerrilla Toolkit Guerrilla Toolkit
press-kit->guerrillakitp A document created by the Monero Outreach workgroup containing materials and tips for an effective guerrilla marketing campaign. A document created by the Monero Outreach workgroup containing materials and tips for an effective guerrilla marketing campaign.
faq->intro Find answers to recurring questions and concerns about Monero. 一些常見問題與其相關的解答與資源
what-is-monero->grassroots Monero is a grassroots community attracting the world's best cryptocurrency researchers and engineering talent. 門羅幣是草根型的社群,吸引了全世界頂尖的加密貨幣研究員與工程師
research-lab->mrlhtp Understanding ge_fromfe_frombytes_vartime Understanding ge_fromfe_frombytes_vartime
research-lab->mrlhtp_summary Monero uses a unique hash function that transforms scalars into elliptic curve points. It is useful for creating key images, in particular. This document, authored by Shen Noether, translates its code implementation (the ge_fromfe_frombytes_vartime() function) into mathematical expressions. Monero uses a unique hash function that transforms scalars into elliptic curve points. It is useful for creating key images, in particular. This document, authored by Shen Noether, translates its code implementation (the ge_fromfe_frombytes_vartime() function) into mathematical expressions.
research-lab->mrl1 A Note on Chain Reactions in Traceability in CryptoNote 2.0 A Note on Chain Reactions in Traceability in CryptoNote 2.0
research-lab->mrl1_abstract This research bulletin describes a plausible attack on a ring-signature based anonymity system. We use as motivation the cryptocurrency protocol CryptoNote 2.0 ostensibly published by Nicolas van Saberhagen in 2012. It has been previously demonstrated that the untraceability obscuring a one-time key pair can be dependent upon the untraceability of all of the keys used in composing that ring signature. This allows for the possibility of chain reactions in traceability between ring signatures, causing a critical loss in untraceability across the whole network if parameters are poorly chosen and if an attacker owns a sufficient percentage of the network. The signatures are still one-time, however, and any such attack will still not necessarily violate the anonymity of users. However, such an attack could plausibly weaken the resistance CryptoNote demonstrates against blockchain analysis. This research bulletin has not undergone peer review, and reflects only the results of internal investigation. This research bulletin describes a plausible attack on a ring-signature based anonymity system. We use as motivation the cryptocurrency protocol CryptoNote 2.0 ostensibly published by Nicolas van Saberhagen in 2012. It has been previously demonstrated that the untraceability obscuring a one-time key pair can be dependent upon the untraceability of all of the keys used in composing that ring signature. This allows for the possibility of chain reactions in traceability between ring signatures, causing a critical loss in untraceability across the whole network if parameters are poorly chosen and if an attacker owns a sufficient percentage of the network. The signatures are still one-time, however, and any such attack will still not necessarily violate the anonymity of users. However, such an attack could plausibly weaken the resistance CryptoNote demonstrates against blockchain analysis. This research bulletin has not undergone peer review, and reflects only the results of internal investigation.
research-lab->mrl2 Counterfeiting via Merkle Tree Exploits within Virtual Currencies Employing the CryptoNote Protocol Counterfeiting via Merkle Tree Exploits within Virtual Currencies Employing the CryptoNote Protocol