Monero (XMR): A Reasonably Private Digital Currency

From Kicksecure

Monero Logo

What is Monero?[edit]

Monero is a private-centric cryptocurrency launched in 2014 to allow direct and anonymous digital payments without being dependent on a central authority.


The monero-gui package is installed by default. No manual installation required. This goes for Monero programs, monero-wallet-gui, monero-wallet-cli, monerod and less frequently used utilities; see footnote. [1]

Apart from these hints, installation and usage of Monero in Kicksecure ™ does not differ from installing Monero on any Linux based distribution.

Version Numbers[edit]

The monero-gui package is maintained similar to Debian stable frozen packages. monero-gui package updates will only include updates which are major releases or releases that fix security or network issues. [2] This is to reduce the maintenance load of the package maintainer.

Should the user wish to use a newer version of Monero than available in the package, it is possible to uninstall the monero-gui package. (Uninstallation is optional if Monero is manually installed in home folder. [3]) Since Kicksecure ™ is based on Debian, the user can optionally install Monero using the usual instructions from the Monero website. Recommendations from the safely installing software wiki page such as Verifying Software Signatures applies. See also Install Newer Software Versions.


To avoid any issues with Kicksecure ™ meta package removal, first install the dummy-dependency package.

Install dummy-dependency. To accomplish that, the following steps A. to D. need to be done.

A. Update the package lists.

sudo apt update

B. Upgrade the system.

sudo apt full-upgrade

C. Install the dummy-dependency package.

Using apt command line parameter --no-install-recommends is in most cases optional.

sudo apt install --no-install-recommends dummy-dependency

D. Done.

The procedure of installing dummy-dependency is complete.

Remove the monero-gui package.

sudo apt purge monero-gui

Done, removal of the monero-gui package is complete.

Forum Discussion[edit]


After installing Monero, please consider making a donation to Kicksecure ™ to help keep it running for many years to come.

Monero accepted here Donate Monero (XMR) to Kicksecure ™.


Kicksecure donate monero.png


Gratitude is expressed to the donors of Monero who funded the proposal Monero Debian Package Repository for 2 years, to @rehrar for helping the creator of the package (Kicksecure ™ developer Patrick Schleizer) with writing the proposal, everyone else who supported the proposal, and the community of Monero developers and users at large for creating Monero. [4]

Major updates will be posted here:

Development blog:


Monero Architecture[edit]

Monero works by having contributors host large files which are equivalent to a public ledger. Any time someone broadcasts a transaction, every ledger maintainer updates their copy of the ledger and ensures no cheating or fraud has occurred. As with most cryptocurrencies, transactions are sent to Public Addresses which are derived from personally created private keys.

Since transactions could otherwise be traced by watching which addresses are sending to each-other, Monero uses a Diffie-Hellman key exchange using the transaction information on the sender's side and the public address on the receiver's end of a transaction to encrypt the recipients address on the ledger. To protect the sender, spending Monero is equivalent to forwarding the output of the previous transaction, so a users address is never stored on the ledger at all - this technique is called Stealth Addressing.

Since this solution is imperfect, and allows EABE attacks and is dependent on ECC for the key exchange, Monero uses a second layer of anonymity called Ring Signatures. When signing a transaction and broadcasting it to the network, Ring Signatures take signers from previous transactions and forge a new signature with Ring Size = N, where you cannot tell which entity in the group N actually authorized a transaction. This further obfuscates the blockchain and reduces the available attack vectors on the cryptocurrency as a whole, as well as introduces several zero knowledge proofs which prevent absolute analysis of the ledger.

Ring Signatures combined with Stealth Addressing prevent many attack vectors, but since new transactions are forwarded outputs from previous ones you can still perform analysis by viewing the amounts spent on-chain. To address this potential issue, a solution called RingCT was introduced which obfuscates the amount spent in a transaction.

Further attack vectors including cross-referencing an address posted in multiple places and IP leaks when connecting to the network are further developments sought out by the Monero community. These potential issues are addressed with Subaddresses and Kovri respectively.


The former Manual Monero Instructions have been archived for historic reasons.

    • monero-blockchain-ancestry
    • monero-blockchain-usage
    • monero-blockchain-mark-spent-outputs
    • monero-blockchain-export
    • monero-blockchain-import
    • monero-wallet-gui
    • monero-blockchain-depth
    • monero-blockchain-prune
    • monero-wallet-cli
    • monerod
    • monero-blockchain-stats
    • monero-blockchain-prune-known-spent-data
    • monero-gen-ssl-cert
    • monero-wallet-rpc
    • monero-gen-trusted-multisig
    The list is also here:
  1. Such as fixes required if the Monero network is under denial of service (DOS) attacks.
  2. A manually installed Monero won't interfere with the monero-gui package. That is, unless the user installs Monero to folder /usr/bin. (Files in that folder would be replaced when the monero-gui package gets updated. However, the Monero start menu entry might be confusing since the start menu entry would start Monero from the monero-gui package (from folder /usr/bin), and not the manually installed Monero.

Unfinished: This wiki is a work in progress. Please do not report broken links until this notice is removed, use Search Engines First and contribute improving this wiki.