23

Another reason to steer clear of CEXs

you are viewing a single comment's thread
view the rest of the comments
[-] Saki@monero.town 4 points 11 months ago

The scary part is, that the US can do something like this if it wants to. A service provider saying “We’re privacy-friendly. Your email address is all we ask.” could end up this way. Think about so-called bullet-proof hosting providers or so-called trusted no-long VPN providers.

The only safe way, if any, may be that you never show them your IP… (much less any identifying information)

[-] snitchy_asc@monero.im 2 points 11 months ago* (last edited 11 months ago)

For a good opsec on CEXs:

  • Only use Tor, why not a RDP to bypass WAF & restrictions.
  • One mail account & SMS activation per registered account.
  • Only use Monero for deposits and withdrawals. You also can do account less cryptoswaps, it's the best deal. For example with intercambio you can access and aggregate all available crypto swaps over Tor without JS, to get the best rates and swap anonymously.
[-] Saki@monero.town 2 points 11 months ago

If you were actually always on Tor, you’d never post a non-Tor friendly link. The right answer is: use DEX.

[-] snitchy_asc@monero.im 1 points 11 months ago* (last edited 11 months ago)

The problem is you dont know or visited what you're talking about (sorry to be rude).

[-] Saki@monero.town 1 points 11 months ago

Nitter had been indeed generally Tor-friendly until around September, 2023. After that, even the official instance nitter.net started blocking Tor from time to time (currently not blocking), and there are now relatively few working instances for Tor users.

This is something most Tor users know through daily experiences. The problem seems to be, your link was a "meta link" redirected to a random Nitter instance, right? If so, that’s the problem; not every instance is Tor-friendly. Another problem is, your knowledge about this privacy front end is not up-to-date.

The current situation is so obvious for actual users that if you were actually using Tor/Tails every day, you would have never done what you did. But it’s okay. Thanks for a $20 donation to Tails, you seem to be very proud of. Well, xmr user would be more likely to send or say 0.2 XMR etc. because we tend to think in our native currency :)

[-] snitchy_asc@monero.im 1 points 11 months ago* (last edited 11 months ago)

"your knowledge about this privacy front end is not up-to-date" you talk about the restriction put on specific instances. It not affects the majority, this haves nothing to do about the code 😕 The donation were published to give engagement for Tails donations, some of us already donated to projects without saying it and this is off-topic regarding to the post but if you want you can PM me on SimpleXChat

[-] Saki@monero.town 0 points 11 months ago

I meant the situation. Your assumption that Nitter instances are generally Tor-friendly (with only a few exceptions) used to be true, but anymore. The situation has changed and as such your understanding is slightly outdated.

[-] snitchy_asc@monero.im 1 points 11 months ago

I use untrackme and libredirect setup with farside. Orbot on the phone and Tor for libredirect. I think I got blocked one time but ok

this post was submitted on 06 Dec 2023
23 points (96.0% liked)

Monero

1690 readers
8 users here now

This is the lemmy community of Monero (XMR), a secure, private, untraceable currency that is open-source and freely available to all.

GitHub

StackExchange

Twitter

Wallets

Desktop (CLI, GUI)

Desktop (Feather)

Mac & Linux (Cake Wallet)

Web (MyMonero)

Android (Monerujo)

Android (MyMonero)

Android (Cake Wallet) / (Monero.com)

Android (Stack Wallet)

iOS (MyMonero)

iOS (Cake Wallet) / (Monero.com)

iOS (Stack Wallet)

iOS (Edge Wallet)

Instance tags for discoverability:

Monero, XMR, crypto, cryptocurrency

founded 1 year ago
MODERATORS