Комментарии:
Disappointed in Kraken.
ОтветитьMonero fucking sucks, no government condemns it and it’s inflationary, it’s bound to fail.
Ответитьjust transact everything through urbit
Users have unique cryptographic identities that are not tied to their real-world identities or locations. This helps protect users' privacy and makes it difficult to link a user to a physical address.
Quality content as usual.
ОтветитьUsing monero is cheaper than using a card in modern day shops with their surcharges rip
ОтветитьRight now monero doesn't work, move everything to a different coin before monero stops existing forever
ОтветитьDo you still think atomic swaps are the future?
Ответитьirs giving out money for things we already knew about monero and can easily work around is pure comedy
ОтветитьWhat about FeatherWallet? It has a built in option to connect to Tor automatically, doesn't that do the job?
ОтветитьDon't know what this is I just clicked for anime girl
ОтветитьL crypto guys
ОтветитьMental is the guy you would never notice in a store as being so knowledgeable about the dark web. He’s clean cut and articulate. Typically you picture these hippie types that haven’t showered in a week or more 😆 love this shit bro
ОтветитьWhat are your favorite non-KYC exchanges?
ОтветитьWhen you run full node your ip participating in possible criminal transactions on the network, so the feds can knock on your door one day. Don't do it. You wouldn't want to hangout in a drug cartel neighborhood righ?, why then you want to hangout on monero network?
ОтветитьGreat video like alwasys. Keep up the gokd work.
Ответитьthe glowies cant STAND not having power over monero users…
ОтветитьBut when your node broadcast transaction -- it would be possible to trace at which node it first appeared, given enough poisoned nodes.
ОтветитьTo the OPSEC advice with the swap services you mean the following (please tell me if I got it right):
When Swapping lets say USDT on ETH main (for relatability in this case) to stealthEX, I shall then use a specific stealthEX recieving Adress I set up in my GUI Wallet for example and then spend the whole UTXO I get from that to that stealthEX recieving address to another recieving address in my wallet to prevent EAE attacks in specific? Am I getting this right?
In short:
ETH Adress 1 ---> StealthEX ETH Adress |[Swap happens]| StealthEX XMR Adress ---> My StealthEX recieving Adress for all my ETH Address 1 swaps ---> Any other consolidation adress within my wallet.
Whenever swapping something from XMR to anything else - do not use the same amount. Use a private node. Is this perfect OPSEC?
I always use a private node and I always use one recieving Address for each Sender when using Monero. I then always consolidate them to my consolidation addresses that nobody else uses to spend from there for wahtever purposes, in order to prevent EAE attacks. I always use a private node and have a full copy of the complete not pruned blockchain. I never reuse the same amount when dealing with the same entity on the recieving end, who doesnt straight up know its me again (such as any swapping service). Is my OPSEC lacking in any spot?
From my understanding on how monero works, reusing adresses under certain circumstances (recieving from the same entity who already knows its you) cannot cause any OPSEC weaknesses. So it should be safe to recieve to the same adress, when it comes from the same adress (in case you swap even more USDT from the exact same ETH adress, through the same swap service for example). Consolidating to the same inner wallet only recieving adress should also be perfectly safe from my understanding. If you are swapping from a different adress or from a different network (lets say Bitcoin) through the same service, you obviously want to recieve on a different adress but should be safe to consolidate to the same.
EAE attacks should only be possible if you send from the same adress you recieved to, to the sender you recieved to on that adress from that same sender. Any other way makes EAE impossible. Am I correct with this?
Run ur own monero node if you can, if you cant then connect to trusted remote nodes with VPNs/TOR/I2P whatever enabled. Plus Always churns(Sending balance to urself) 1-2 times but it can be more, depends on ur threat models, also add random times between churns.
ОтветитьA blind man can see that the united states government has their noses stuck all the way up everyone's rears as of lately. With increasing censorship being possible (adult site thing) people should be getting worried. Drug transactions or PEZ dispencers, it is our right to have an anonymous currency. Often the glowies forget the United States was founded TO NOT be like this.
ОтветитьAin't you always shilling it?
ОтветитьMaybe a n00b question but if they generate decoy outputs doesn't that leave those nodes to identification as poisoned nodes by flagging this behaviour?
Ответитьsweet a new video from my favorite monero shilltuber 👌
ОтветитьMonero dev from Minnesota rahhhhhhhhhhhh
ОтветитьAh damn so ive been being tracked the entire time. Ive been using one use wallets though.
ОтветитьQuestion what would be the easiest way to run a remote monero node on a ddns server?
ОтветитьIt's easier for your ISP to trace your Node. It's even easier for your hosting company to maliciously modify your Node. Possibilities are ♾️
So develop your threat model. Most people don't have technical expertise to run nodes. It's also very costly. Also, if you can't self-host it, that's another attack surface your are adding.
I miss the old days of trade and barter, then gold came along...
ОтветитьThis would work if only tor hadnt been compromised and entirely run by the feds since ages ago...
ОтветитьShould’ve mentioned unstoppable swap. It does bitcoin monero atomic swaps over tor. No need to trust an exchange ever.
Oh yeah, and haveno-reto
Everyone loves crypto until it’s actually private
Ответитьhow are your thumbnails always so good
ОтветитьLOL, the nsa has more then enough compute to follow all your monero transactions signer addresses to track your monero
ОтветитьCan someone say complicated?
ОтветитьBut can your own node be traced by it’s IP and some other network signature? Isn’t running your own node actually just like carrying your money in a nice shiny armored suitcase through a criminal district? Safer in a moment but also less safe overall?
Ответитьwhat is your opinion on delete me
Ответитьahh yes my fav fed
ОтветитьHave you seen the recent andriod blocking sideloading? It's already affecting phones like mine :/
ОтветитьI'm wondering if some of the OpSec leaks are coming from improperly configured killswitches, and an over confidence that if their proxy/tor dies then they can't connect out.
ОтветитьWhat about feather
ОтветитьIt would be an interesting tutorial video to create a VPS (like on DigitalOcean) just to setup a node you trust.
Ответитьthe feather wallet uses tor by default so maybe recommend that?
Ответитьdon't care for that at the moment... most people use xmr only to buy small amount of drugs or guns... the feds know that, but as long as it is not high quantity they won't go behind you.
ОтветитьWhoever doesn’t run their own node is their own insider threat.
Ответитьaicryptoregs AI fixes this. Monero users tracing discussion video.
ОтветитьReject crypto embrace debt
ОтветитьMonero is easily my favourite crypto based on the anonymity it provides and the sheer will of the devs to remain that way
ОтветитьCongrats in advance for when you make your thousandth video!
ОтветитьO kenny man, just giving you a shout real quick here. Tried to shoot ya an email and what do ya know the email doesn't seem to exist anymore! the one linked up in yer little about page, with the 'view email address' button. figured id give ya a heads up :)
Ответить