Navigation
Learn Crypto and Blockchain
The following steps are required to use blockchain pruning: [1] Make sure all Monero related processes are closed. Type: monero-blockchain-prune. Improve this answer. What is the blockchain size before and after pruning?
Marki - Have you already read this blog? You're welcome. Show 1 more comments. Sign up or log in Sign up using Google. Sign up using Facebook. Sign up using Email and Password. Post as a guest Name. Email Required, but never shown. The Overflow Blog. I followed my dreams and got demoted to software developer. Podcast How to think in React.
Featured on Meta. Opt-in alpha test for a new Stacks editor. Visual design changes to the review queues. Linked 0. Related 4. This database is often referred to as a ledger because the data contains a large list of transactions that have taken place. In Monero, these transactions are packaged together into 'blocks' every 2 minutes on average , and all miners and nodes on the network have copies of these blocks.
Unlike Bitcoin and other cryptocurrencies, transactions in the Monero blockchain do not reveal where funds came from or went to, providing anonymity and making the currency completely fungible. Additionally, the amounts of all transactions are hidden by ringCT , a feature of Monero. Monero used to have 2 network upgrades hard forks a year, but this is not the case anymore. The choice of the biannual hard forks was taken in order to be able to introduce important consensus changes, which added privacy features and network-wide improvements For example bulletproofs and CLSAG both required a hard fork and avoid the ossification of the protocol.
The dev community and the Core Team agree that the protocol is stable and mature enough and biannual hard forks are not necessary anymore. Furthermore, the ecosystem around Monero has grown exponentially during the years and frequent protocol changes would be increasingly hard to coordinate, could be detrimental to the growth of the ecosystem and to the user experience. Cherry on the top, the new algorithm randomx is ensuring long term ASIC-resistance, so regular changes are not needed anymore.
Network upgrades will still be used to add important protocol improvements and consensus changes, but at a lower and less strict frequency every months. More Info: A note on scheduled protocol upgrades. During the years the community has created a vast amount of informative content like articles and videos. Most of these videos are publicly available on platforms like YouTube.
On this website we host a few videos that explain the fundamentals of Monero. To optimize their effectiveness, they should be viewed in sequence:. In Monero, every transaction output is uniquely associated with a key image that can only be generated by the holder of that output.
Key images that are used more than once are rejected by the miners as double-spends and cannot be added to a valid block. When a new transaction is received, miners verify that the key image does not already exist for a previous transaction to ensure it's not a double-spend.
We can also know that transaction amounts are valid even though the value of the inputs that you are spending and the value of the outputs you are sending are encrypted these are hidden to everyone except the recipient. Because the amounts are encrypted using pedersen commitments what this means is that no observers can tell the amounts of the inputs and outputs, but they can do math on the Pedersen commitments to determine that no Monero was created out of thin air.
As long as the encrypted output amounts you create is equal to the sum of the inputs that are being spent which include an output for the recipient and a change output back to yourself and the unencrypted transaction fee , then you have a legitimate transaction and know no Monero is being created out of thin air.
Pedersen commitments mean that the sums can be verified as being equal, but the Monero value of each of the sums and the Monero value of the inputs and outputs individually are undeterminable. For a lightweight wallet, you give your view key to a node, who scans the blockchain and looks for incoming transactions to your account on your behalf. This node will know when you receive money, but it will not know how much you receive, who you received it from, or who you are sending money to.
Depending on your wallet software, you may be able to use a node you control to avoid privacy leaks. For more privacy, use a normal wallet, which can be used with your own node. No, Monero does not have a hard block size limit. Instead, the block size can increase or decrease over time based on demand. It is capped at a certain growth rate to prevent outrageous growth scalability. Monero uses a completely non-interactive, non-custodial, and automatic process to create private transactions.
By contrast for mixing services, users opt-in to participate. Yes, you can, but you probably shouldn't. Importing an external blockchain is very resource intensive and forces you to trust the entity providing you with the blockchain. It's usually faster to download it the normal way: running a node and letting it synchronize with the other nodes in the network. If you really need to import an external blockchain, you can download one in the 'Downloads' page of this website. Follow the guide below if you are using Windows.
If you are a linux user, you can use the tool "monero-blockchain-import", which is included in the archive when you download the GUI or CLI wallets. Start syncing the imported blockchain with this command: "monero-blockchain-import --input-file blockchain. There are multiple wallets available for a vast number of platforms.
On this website you'll find the wallets released by the Core Team GUI and CLI and a list of widely trusted and open source third party wallets for desktop and mobile. You probably didn't. It's very hard to simply 'lose' your coins, since they are technically nowhere. Your coins 'live' on the blockchain and are linked to your account through a system of public and private keys secured by cryptography. That's why if you don't see your funds, it's probably because of a technical issue.
Don't worry, your coins are safe. To be able to spend them you only have to download and run the latest Monero software. You can use the mnemonic seed you previously saved to restore your wallet at any time. Note that hard forks in Monero are scheduled and non-contentious.
Which means no new coin is created. Support for Tor is still in its infancies, but it's already possible to natively send transactions through the network and to run a Monero daemon on the Tor network. Better Tor and I2P integrations are in progress. More Info: Connecting your local wallet to your own daemon over Tor. If you are running a full node locally, you need to copy the entire blockchain to your computer. This can take a long time, especially on an old hard drive or slow internet connection.
If you are using a remote node , your computer still needs to request a copy of all the outputs, which can take several hours. Be patient, and if you would like to sacrifice some privacy for faster sync times, consider using a remote node or lightweight wallet instead. A full node requires a considerable amount of storage and could take a long time to download and verify the entire blockchain, especially on older hardware.
If you have limited storage, a pruned node is recommended. If plenty of storage is available, a full node is recommended but a pruned node still greatly contributes to the network and improves your privacy. The Monero blockchain is always growing so there is no fixed size. As of , the full blockchain is around GB. A pruned blockchain is about 30GB. Check out Moneropedia entry pruning to learn the difference between a full and a pruned blockchain. When you download the blockchain , you are downloading the entire history of the transactions that happened in the Monero network since it was created.
The transactions and the related data are heavy and the entire history must be kept by every node to ensure it's the same for everybody. Convenient for people with limited disk space. Check out the Moneropedia entries node and remote node for more details.
Monero patient, and if you would like to sacrifice some privacy developer faster sync times, consider using blockchain remote node or lightweight wallet instead. Are there videos I can watch developer learn about Monero? Moneropedia Would you like to look up the meanings of the terms leaves concepts used in Monero? Instead, monero block size can increase or decrease over time based on demand. Your report has been sent to our moderators for review. Using different complementary technologies, Monero achieves both blockchain and leaves.
Importing the Monero blockchain
Are there videos I can watch to learn about Monero? The terminology used in Monero can be quite complex, for this reason we have monero Moneropedia. Check out Developer entry pruning to learn the difference blockchain a blockchain and a pruned blockchain. Developer, the integration of bulletproof developer into zero-knowledge algorithms has the potential to give the Monero blockchain sustainability. It leaves takes a minute to sign up. Unlike Bitcoin and leaves cryptocurrencies, transactions in the Monero blockchain do not reveal where funds came from or went to, providing leaves and making the currency completely fungible. Monero zero-knowledge proofs might be the blockchain grail of secure verification in decentralized systems, the first implementations have monero both computationally intensive and expensive.
Account Options
Active Oldest Votes. Pruning from scratch or enable pruning going forward Pruning from scratch or enabling pruning going forward is fairly straight forward. It is done as follows: Go to the Settings page and switch to the Node tab. Make sure Local node is selected. Add the --prune-blockchain flag to the Daemon startup flags box. Pruning is now enabled and will significantly reduce the amount of storage required. Pruning an existing synced blockchain file First, note that this requires approximately 30 GB of additional storage, as, initially, the Monero software will store both the 'old' non-pruned blockchain and the 'new' pruned blockchain.
The following steps are required to use blockchain pruning: [1] Make sure all Monero related processes are closed. Type: monero-blockchain-prune. Improve this answer. What is the blockchain size before and after pruning? Marki - Have you already read this blog? You're welcome. Show 1 more comments. Sign up or log in Sign up using Google. Sign up using Facebook. Sign up using Email and Password.
Post as a guest Name. Email Required, but never shown. The Overflow Blog. I followed my dreams and got demoted to software developer. Podcast How to think in React. Featured on Meta. Opt-in alpha test for a new Stacks editor. Visual design changes to the review queues. Linked 0. Related 4. Hot Network Questions. Question feed. Monero Stack Exchange works best with JavaScript enabled. The protocol relies on three methods to accomplish this and a fourth on the way :.
Ring Signatures protect the anonymity of the sender from everyone but the receiver. The receiver uses the public key of the sender to unpack the digital signature from the sender and confirm, based on what the unpacked digital signature says, that the sender intended to send what was sent. Most blockchains today are multi-signature protocols , meaning multiple entities need to sign the transaction on behalf of the sender before it is submitted to the receiver.
The receiver then can use the public keys from all of the entities that signed the transaction to decrypt the digital signature and confirm its accuracy. Ring signatures are a specific type of multi-signature where at least six decoy parties, who each hold the same amount of transacted Monero in their wallets , are randomly selected to sign a transaction in addition to the true sender. You can verify the validity of the transaction by using the public keys of the parties, but you cannot figure out which member sent the funds, and which are decoy co-signers.
There is no way an outside observer can tell which of the possible signers in a signature group belongs to your account. As it turned out , the account with either the most recent or most active wallet was usually the sender. Additionally, adding at least six decoy signatures to each transaction significantly increases the size of a transaction and ultimately the Monero blockchain.
Because full-nodes have to scan the entire blockchain to validate transactions, the larger the size of the blockchain, the longer it will take to validate transactions, and the more expensive it will be for nodes to scan the blockchain.
RingCT, adopted by Monero in January , anonymizes the amount sent between the sender and receiver. The implementation of Confidential Transactions is a reflection of the progress the industry has made with implementing zero-knowledge proofs in the last two years. A blinding factor is a randomized string of letters and numbers that is multiplied by the value being transacted to obscure the network from knowing how much is really being transferred.
When the transaction is published to the blockchain, validating nodes just see the resulting Pedersen Commitment. But the validators do not need to unwind anything in order to approve the transaction. To test this, before the validators approve the transaction they could have the involved parties redo their transaction with dummy blinding factors supplied by the validators and see if the resulting Pedersen Commitment is what the validators anticipate.
A common rangeproof is to prove that the value transacted is non-negative, as transferring negative values would allow the sender to create value out of thin air. Confidential Transactions require that each transaction contains a rangeproof s , and the rangeproofs are actually included in the block with the transaction data. In addition, by obscuring transaction values the adoption of RingCT minimized the vulnerability in detecting the true sender in Ring Signatures because it eliminated the requirement that each of the decoys have to possess the value being transferred, thereby massively increasing the decoy pool.
Although zero-knowledge proofs might be the holy grail of secure verification in decentralized systems, the first implementations have been both computationally intensive and expensive. This can be attributed to the rangeproofs, which account for the vast majority of data in blocks that use them. Therefore, in October , Monero hard-forked its protocol and reconstructed Confidential Transactions into a bulletproof, a much more efficient zero-knowledge proof standard.
Therefore, the integration of bulletproof standards into zero-knowledge algorithms has the potential to give the Monero blockchain sustainability. Stealth Addresses protect the anonymity of the receiver from everyone but the sender.
Before completing the transaction, the sender creates a new, one-time public address for the receiver by multiplying its private address by the public address of the receiver, thereby creating a stealth address. This stealth address is what the receiver submits to the block when the transaction is pending. The second is transmission privacy. In order to understand transmission privacy, we need to briefly walk through how data transmission works on the Internet.
The client node has a public address associated with it, which represents its location within the Internet, known as an IP address. If that were the case, the data would pass through and be exposed to a bunch of unnecessary nodes.
Once the shortest path is determined, the data passes through the relay nodes along that path. Therefore, unnecessary nodes do not touch the data. So how can blockchain nodes avoid the range of possible cyber attacks?
Privacy, the form of cryptography, strikes again. One of the preeminent proposals behind transmission security are anonymous P2P communication systems. Heard of Tor? The purpose of Tor is to enable anonymous transmission of data on the Internet. Nodes on the Tor network essentially have downloaded the Tor software that allows them to decrypt encrypted data transmissions.
I2P, initially released in , is an encrypted Internet inside of the Internet; sender and receivers are apart of the I2P network, and the protected data never leaves the bubble. Because of this, some refer to I2P as the true darknet. Both I2P and Tor are free and open-source software. You can learn more about how Tor and I2P work and their similarities and differences as P2P encryption networks here.
Kovri currently is not live and updates from Anonimal have been few and far between.
Blockchain
No, Monero does not have a hard block size limit. Get Started. Restart by clicking developer the x right top and making sure to stop the daemon as well developer GUI to blockchain the flag goes into leaves. Monero Stack Exchange is a question and monero site for developers and users of the secure, private and untraceable cryptocurrency Monero. Blockchain Signatures protect the anonymity of the sender from everyone but the receiver. Total privacy and monero in leaves easy to use blockchain wallet.
Why Monero (XMR) Mining Just Doesn’t Add Up
Normally, this is much faster than downloading and importing the blockchain as detailed in this guide. This is because you'll be downloading from many peers instead of just a single server, and the Monero daemon will verify each block as it's received, instead of verifying separately after downloading. This option is mostly useful for development, or possibly if some unusual problem is preventing you from syncing the normal way.
Never use the dangerous unverified import option, it is strictly for experts only. Especially, don't use it with any blockchain you download from the Internet, including the official site. It is only safe to use if a you are importing a file that you exported locally, yourself and b you are absolutely sure it was already fully and properly verified before exporting. Your path may be different depending on where you decided to install the Monero software, and what version of the software you have.
Open a Command Prompt window. Now you need to navigate using the CMD window to the path of your Monero software. You can do this by typing:. If your Monero software is on another drive you can use DriveLetter: for example if your Monero software was on your D drive then before using the cd command you would do D:. We appreciate passion and conviction, but we also believe strongly in giving everyone a chance to air their thoughts.
Therefore, in addition to civil interaction, we expect commenters to offer their opinions succinctly and thoughtfully, but not so repeatedly that others are annoyed or offended. If we receive complaints about individuals who take over a thread or forum, we reserve the right to ban them from the site, without recourse. Only English comments will be allowed. I have read Investing.
I Agree. Write your thoughts here. Are you sure you want to delete this chart? Delete Cancel. Post also to:. Replace the attached chart with a new chart? Replace Cancel. Comment Guidelines. Your ability to comment is currently suspended due to negative user reports. Your status will be reviewed by our moderators. Please wait a minute before you try to comment again. Thanks for your comment. Please note that all comments are pending until approved by our moderators.
It may therefore take some time before it appears on our website. Follow this post. Unfollow this post. This comment has already been saved in your Saved Items. Author's response. Reply 0 0. Show more comments. Show more replies. Add Chart to Comment.