[-] Saki@monero.town 6 points 6 months ago

Generally, votes are overrated. Especially if you’re not mainstream, by definition most people won’t support you, won’t agree with you, won’t understand you.

Some things may be downvoted because they’re too stupid. But occasionally, you might be downvoted simply because you’re a bit too early. Like, if you’d said “being gay is not crime” or something 50 years ago, you might have got downvoted… Just a thought.

[-] Saki@monero.town 6 points 11 months ago

I value the freedom of free software. A fork is good in that context.

PoS has at least one good aspect: it’s perceived as “green”. Other than that, afaik PoS tends to imply that only a few rich people can determine whether something is okay or not. The Monero network, on the other hand, is carefully designed so that any one with any CPU can participate (at least in principle). This design philosophy feels good.

[-] Saki@monero.town 5 points 1 year ago

Also, one should consider using Bridges (obfs4), so that your local ISP may not know you’re on Tor. Tails suggests that too. Using a VPS is not necessary a best option for that, though it might be a good option under some situation.

[-] Saki@monero.town 6 points 1 year ago

While doing this is generally not recommended, EFF does indeed suggest this option in some context: https://ssd.eff.org/module/choosing-vpn-thats-right-you#things-to-consider-what-vpns-don-t-do

[-] Saki@monero.town 5 points 1 year ago

A Cake contributor or contributors are also running, or related to, a blockchain analytics provider, Moonstone Research, specialized in tracing difficult-to-trace payment methods such as Monero, proudly saying, “Moonstone Research can provide leads when no other blockchain analysis firm can.” How? Maybe because their technology is so great, and/or unlike other companies, they’re running major remote nodes themselves, monitoring and recording a lot of things.

The positive side is, this Moon-Cake duality could help Monero improve, become more private, more untraceable. They simply may have tried to help solve the recent incident, never using it as a promotional opportunity of their unparalleled blockchain analytics.

That said, this reminds me of Team Cymru, a company basically selling its skill to deanonymize netflow data. Someone from Team Cymru had managed to become an important board member of the Tor Project, hosting TorProject.org website and several bridges to the Tor Network. The Tor Project admitted the conflict of interest, and quickly fixed the issues once discovered.

Like mentioned above, the Moon-Cake duality could work positively for Monero. Nevertheless, one might want to think carefully about the potential ramifications of using Cake Wallet, related services, and especially their remote nodes. Nothing personal against Cake, its contributors, developers, supporters/users. On the contrary, I genuinely thank Justin Ehrenhofer (sgp/SamsungGalaxyPlayer) for revealing (at least part of) what they can do, what they’re doing as a side business. Thank you!

[-] Saki@monero.town 6 points 1 year ago* (last edited 1 year ago)

I’d avoid anything related to Cake Wallet (e.g. its remote nodes), seeing that the OP sgp = SamsungGalaxyPlayer is doing this side business—chain analysis, offering suspicious activity reports for CEXes, ready to collaborate with law enforcement if paid.

In 2022, it was noticed that someone from Team Cymru, a company trading net flow data, was a board member of the Tor Project, providing bandwidth, hardware, bridges (entry points to the Tor network). There was a fix: Remove Team Cymru hard-coded bridges.

Now “Moonstone Research” is proudly saying they can trace things that other companies can’t, and they’re related to Cake Wallet directly or at least indirectly, or so it seems.

This possible suspicion aside, the analysis itself is interesting. While it might be good news if we can identify the attacker, that would be actually very bad news for Monero!

[-] Saki@monero.town 5 points 1 year ago

Is multisig such far from being practical yet? Does that also mean Bisq-like platform (Haveno) is still far from being practical?

A Monero user tends to proudly think that Monero is good, rather philosophical, being actually used for good reasons, and community-based… but it’s been hacked… I guess people will laugh now. Everyone can draw a lesson from this, though…

@UncleIroh@merovingian.club While “Windows 10” is obviously alarming, this doesn’t seem as simple like that, like pointed out in the linked thread. Maybe password-based (not key file) SSH was the problem? Btw that “someone” is hinto-janai, the person providing gupax among other things!

5
submitted 1 year ago by Saki@monero.town to c/monero@monero.town

While privacy coins promise enhanced anonymity and financial freedom, they also pose challenges […] they often face heightened regulatory scrutiny, with some governments banning or heavily regulating their use.

the very feature that makes them attractive – their privacy – can also be their Achilles’ heel. […] This dual-edged sword might deter potential new adopters and pose reputational risks for those involved in legitimate uses of privacy coins.

Cryptocurrency privacy is vital for ensuring personal liberty and maintaining fungibility, becoming even more crucial as surveillance and data collection grow. […] a balance of innovative privacy technologies and thoughtful regulation is essential

We all know this; not easy.

1
submitted 1 year ago* (last edited 1 year ago) by Saki@monero.town to c/privacy@monero.town

Send me your seed words.

"Arguing that you don't care about the right to privacy because you have nothing to hide is no different than saying you don't care about free speech because you have nothing to say."

Edward Snowden

https://en.wikipedia.org/wiki/Nothing_to_hide_argument

[-] Saki@monero.town 5 points 1 year ago

This is a sign to me that it’s more valuable than fiat and people are seeing that.

That’s an interesting observation, and I think that’s correct about Monero. If 1 XMR is say 140 €, I do feel 1 XMR is much more precious than 140 €, if that makes sense.

If it’s a relatively small amount, you can try (KYC-free) DEX like listed in kycnot.me — e.g. Bisq for BTC, and (hopefully!) Haveno is coming for XMR. There are also crypto ATMs, depending on the place you live… Also, the rumor has it in Vietnam you can do fiat <--> xmr freely w/o KYC (not sure if it’s true). Either way, like you said, once you get whatever coin, coin-coin is usually trivial.

1
submitted 1 year ago by Saki@monero.town to c/privacy@monero.town

1️⃣ Completely normal photos, such as holiday pictures 🏞️ are considered suspicious.

2️⃣ So our private family photos or the chats and pictures from your sexting yesterday 🍑🍆 also end up on an official table. So we can throw privacy in the bin 🚮

Chances are high that most of your European friends have never heard of chat control. So let them know about the danger and what you think about the chat control proposal.

“The European Commission launched an attack on our civil rights with chat control. I contacted my local MEP to tell him that I oppose the proposal. You can do so too! This Website I found will help you write an e-mail to an MEP using A.I.”

[-] Saki@monero.town 5 points 1 year ago* (last edited 1 year ago)

You can not call yourself a privacy project and rely on githubs good will!

I agree with that statement. It’s strange that some privacy-oriented projects are on Github, letting the user browse and downloading files from there via clearnet, letting Micro$oft track every IP/cookie and all.

That said, when “something bad” happens, it’s probably not as simple as that source code is banned. Like, they did attack Tornado Cash yet they didn’t ban source code (which is after all free speech).

If you’re planning to self-host it only for one year, perhaps you’d be survived by Github anyway. Though again, I do agree with you that Github is not certainly the best place to use.

[-] Saki@monero.town 5 points 1 year ago* (last edited 1 year ago)

“Use this to evade taxes“ -> an easy way to get a negative campaign (“this is a tool for criminals. we must ban it”). Instead, try to use something better. For example:

  • Support poor Ukrainian children in a safe and anonymous way so that Russia never knows who you are and can not retaliate you later. -> Using “poor children” is a good narrative for normies (“they” are doing the same to irrationally attack e2e…). Use LGBT-something or some kind of oppressed minorities instead, if desired. “Russia = bad, Ukraine = good” is a childish narrative, but normies can totally relate to this overly simplified view.

  • Make donations to help poor people: our Load told us: “Do it in such a way that even your left hand will not know what your right hand is doing. Never do it in public in such a way that others will know what you do. Donations must be secret and anonymous so that our Father, who sees what you do in private, will reward you.” -> This narration may work well for religious people. Self-claimed Christians typically don’t know the exact lines of NT, so tweak them a little, like Jesus is talking about xmr lol

  • Don’t waste our resources; be ecological, be wise, be a life hacker! Why do we need to pay high fees to middle-men like ko-fi or paypal? Today we have better technology, p2p-based, blah blah -> When using this narrative, be careful as some people think mining is not green. If questioned, point out that huge credit companies waste much more electricity and that Monero, unlike Bitcoin etc., uses a “more ecological-friendly method” (?) called CPU-mining.

If and when you really attempt good PRs, don’t use Monero-chan pics in an overly sexy way. 50% of normies are girls & such pics won’t be accepted too well…

1
submitted 1 year ago* (last edited 1 year ago) by Saki@monero.town to c/privacy@monero.town

exchanges may randomly use this to freeze and block funds from users, claiming these were "flagged" […]. You are left hostage to their arbitrary decision […]. If you choose to sidestep their invasive process, they might just hold onto your funds indefinitely.

The criminals are using stolen identities from companies that gathered them thanks to these very same regulations that were supposed to combat them.

KYC does not protect individuals; rather, it's a threat to our privacy, freedom, security and integrity.

  • For individuals in areas with poor record-keeping, […] homeless or transient, obtaining these documents can be challenging, if not impossible.

PS: Spanish speakers: KYC? NO PARA MÍ

1
submitted 1 year ago by Saki@monero.town to c/privacy@monero.town

Cloudflare-free link for Tor/Tails users: https://web.archive.org/web/20230926042518/https://balkaninsight.com/2023/09/25/who-benefits-inside-the-eus-fight-over-scanning-for-child-sex-content/

It would introduce a complex legal architecture reliant on AI tools for detecting images, videos and speech – so-called ‘client-side scanning’ – containing sexual abuse against minors and attempts to groom children.

If the regulation undermines encryption, it risks introducing new vulnerabilities, critics argue. “Who will benefit from the legislation?” Gerkens asked. “Not the children.”

Groups like Thorn use everything they can to put this legislation forward, not just because they feel that this is the way forward to combat child sexual abuse, but also because they have a commercial interest in doing so.

they are self-interested in promoting child exploitation as a problem that happens “online,” and then proposing quick (and profitable) technical solutions as a remedy to what is in reality a deep social and cultural problem. (…) I don’t think governments understand just how expensive and fallible these systems are

the regulation has […] been met with alarm from privacy advocates and tech specialists who say it will unleash a massive new surveillance system and threaten the use of end-to-end encryption, currently the ultimate way to secure digital communications

A Dutch government official, speaking on condition of anonymity, said: “The Netherlands has serious concerns with regard to the current proposals to detect unknown CSAM and address grooming, as current technologies lead to a high number of false positives.” “The resulting infringement of fundamental rights is not proportionate.”

1
submitted 1 year ago by Saki@monero.town to c/privacy@monero.town

As enacted, the OSB allows the government to force companies to build technology that can scan regardless of encryption–in other words, build a backdoor.

Paradoxically, U.K. lawmakers have created these new risks in the name of online safety.

The U.K. government has made some recent statements indicating that it actually realizes that getting around end-to-end encryption isn’t compatible with protecting user privacy. But

The problem is, in the U.K. as in the U.S., people do not agree about what type of content is harmful for kids. Putting that decision in the hands of government regulators will lead to politicized censorship decisions.

The OSB will also lead to harmful age-verification systems. This violates fundamental principles about anonymous and simple access

See also: Britain Admits Defeat in Controversial Fight to Break Encryption

[-] Saki@monero.town 6 points 1 year ago

Since LibreWolf is libre software, it’s likely that a user has freedom to tweak this maybe via about:config. You just need to ask this directly in the LibreWolf community.

I think I know what you’re talking about, though. Perhaps CSS @font-face is forbidden, because many sites use Google fonts, which allows them to track you.

If Tor Browser is acceptable, give it a try. While TB too has very strict font restrictions to avoid finger-printing (so that a remote site may not know which fonts your system already has), web fonts are allowed by default. It’s relatively harder to distinguish/track individual Tor users, since TB hides your real IP & by default cookies are per session only.

LibreWolf shows your real IP, so it’s understandable and reasonable that it wants to be more careful about fonts. Still a user should be given freedom to do whatever, at their own risk. That’s what free software is all about, after all. Just a thought…

[-] Saki@monero.town 5 points 1 year ago* (last edited 1 year ago)

The current use cases are for Brazilian banking sites. Although free (libre) software users don’t like to be remotely monitored their browsing real-time, the technology itself can be helpful if used right.

The context is, even though Firefox is getting more and more annoying with telemetry, phoning home, etc. (imho the last good version was v52 ESR), it is still much better than Google. So use Firefox, if you don’t like other options.

Mozilla is financially supported by Google, and perhaps they can’t continue their projects without Google, so it’s kind of inevitable that sometimes they have to support that giant. Nevertheless, they still try not to be evil, explicitly against WEI.

Please do support Firefox and/or its forks (LibreWolf, Tor Browser, …). Stop cooperating with Google. They can do evil things because of their monopoly power. We can make Google less powerful, if we refuse to use their products, if we escape from their privacy-invading services.

1
submitted 1 year ago by Saki@monero.town to c/privacy@monero.town

Although the UK government has said that it now won’t force unproven technology on tech companies, […] the controversial clauses remain within the legislation, which is still likely to pass into law.

the continued existence of the powers within the law means encryption-breaking surveillance could still be introduced in the future.

So all ‘until it’s technically feasible’ means is opening the door to scanning in future rather than scanning today. It’s not a change

The implications of the British government backing down, even partially, will reverberate far beyond the UK

“It’s huge in terms of arresting the type of permissive international precedent that this would set […]. The UK was the first jurisdiction to be pushing this kind of mass surveillance. It stops that momentum. And that’s huge for the world.”

4
submitted 1 year ago by Saki@monero.town to c/monero@monero.town

Windows user who'd like to try Tor + wallet etc.: if this is your first time, it may take like 10-20 minutes, but everything is easy.

Although there may be a easier shortcut (see below), the regular way is like this:

  1. Go to https://www.torproject.org/download/tor/ and get a "Tor Expert Bundle" (get one that says 64 if your CPU is 64-bit). To open this ".tar.gz" file, you may need a tool like 7-zip. (*1)
  2. Open (decompress) it to get a .tar; open (untar) this .tar, and you'll see two folders ("data" and "tor") there. Copy these 2 folders (with everything inside them) to a new folder, created wherever you like.
  3. Open the "tor" folder, and double click on tor.exe. If asked, allow it to run and allow it to make remote connections. A text-based window (console) appears with status messages (read them to see if it's working). That's it. You're now running your own copy of Tor.

Once this is ready, you can optionally Tor-ify any tool that supports proxy (Socks5) server. Go to the "Network" or "Proxy" settings of the tool (e.g. Monero Official GUI), and input the proxy server address "127.0.0.1" (without quotes), port number "9050", and if necessary, select the type of your proxy, "Socks5". Your login name and password (if asked) can be empty or anything random (*2).

(*1) Technically, you're supposed to verify a PGP sig here. For now, let's say if you download a file from (archive.)torproject.org, it should be safe.

(*2) Similarly, you can Tor-ify other tools, e.g. a chat tool, a BitTorrent client. A regular browser can be also Tor-ified but that's a bit tricky and usually unnecessary: for web browsing, using Tor Browser is a good idea.

Official GUI vs. Feather (about Tor)

  • Official GUI: Tor is not used by default. You'll have to do manual settings and run your own copy of Tor, like above.
  • Feather: Tor is used automatically. That's easy. However, according to the docs, Tor is NOT ALWAYS used by default, unless you select "Always over Tor" or you're on Tails, etc. Another potential problem of Feather is, if you automatically use Tor coming with Feather, you might be stuck with an old version of Tor. This is because Tor tends to be updated more often than Feather. A solution is…

The same page states:

Feather releases are bundled with a Tor binary. If the presence of a local Tor daemon on the default port (9050) is not detected, Feather will place the bundled Tor binary in the config folder and run it on port 19450.

This should mean, if Tor is already listening to 9050, then Feather will just use it. So, if you'd like to: Feather + Latest version of Tor = also easy (just like Official GUI + Tor).

Elsewhere I saw some kind of confusion like "Feather does everything via Tor, yet it's fast" "Since Feather does everything via Tor, don't use it on Tails, which is already on Tor" etc. etc. and felt that this should be clarified and the fact should be shared. This confusion about Tails is kind of understandable, though.

A possible shortcut: If you already have Tor Browser, and if you start it, Tor Browser's Tor is listening to 9150 (I think). Thus you should be able to do wallet etc. + Tor 9150 (instead of 9050), if you don't mind always opening Tor Browser. This might feel easier…

1
submitted 1 year ago* (last edited 1 year ago) by Saki@monero.town to c/privacy@monero.town

In a well-intentioned yet dangerous move to fight online fraud, France is on the verge of forcing browsers to create a dystopian technical capability. Article 6 (para II and III) of the SREN [sécuriser et réguler l'espace numérique] Bill would force browser providers to create the means to mandatorily block websites present on a government provided list.

--France’s browser-based website blocking proposal will set a disastrous precedent for the open internet

[Unfortunately one should no longer trust Mozilla itself as much as one did 10 years ago. If you do sign, you might want to use a fake name and a disposable email address.]

This bill is obviously disturbing. It could be that eventually they assume that .onion sites are all suspicious and block them, or something similar might happen, which would be bad news for privacy-oriented users including Monero users, for freedom of thought, and for freedom of speech itself. Note that the EU is going to ban anonymous domains too (in NIS2, Article 28).

For a regular end user, if something like this happens and if the block is domain-name-based, then one quick workaround would be using web.archive.org (or Wayback Classic), or ANONYM ÖFFNEN of metager.de (both work without JS). If this is France-specific, of course a French user could just get a clean browser from a free country too (perhaps LibreWolf or Tor Browser, or even Tails), provided that using a non-government-approved browser is not outlawed.

Mozilla, financially supported by Google, states that Google Safe Browsing is a better solution than SREN, but that too has essentially similar problems and privacy implications; especially Gmail's Enhanced Safe Browsing is yet another real-time tracking (although, those who are using Gmail have no privacy to begin with, anyway).

If it's DNS-level blocking, you can just use a better DNS rather than one provided by your local ISP, or perhaps just use Tor Browser. Even if it's browser-side, as long as it's open-source, technically you're free to modify source code and re-compile it yourself, but that may not be easy even for a programmer, since a browser is complicated, with a lot of dependencies; security- and cryptography-related minor details tend to be extremely subtle (just because it compiles doesn't mean it's safe to use), especially given that Firefox/Thunderbird themselves really love to phone home behind the user's back.

See also: Will Browsers Be Required By Law To Stop You From Visiting Infringing Sites?

1
submitted 1 year ago by Saki@monero.town to c/privacy@monero.town

Having free and open-source tools and a decentralized way of fighting back and reclaiming some of that power is very important. Because if we don’t resist, we’re subject to what somebody else does to us

While Tor is useful in several situations, probably we shouldn't believe in it blindly. For clearnet, LibreWolf is a great option too, and I2P might be the future.

1
submitted 1 year ago by Saki@monero.town to c/privacy@monero.town

The Online Safety Bill, now at the final stage before passage in the House of Lords, gives the British government the ability to force backdoors into messaging services, which will destroy end-to-end encryption.

Requiring government-approved software in peoples’ messaging services is an awful precedent. If the Online Safety Bill becomes British law, the damage it causes won’t stop at the borders of the U.K.

Random thoughts...

Even if platform-assisted end-to-end encryption (pseudo e2e) is censored, perhaps we could still use true user-to-user encryption. If "end" means the messenger software itself or a platform endpoint, then the following will be true e2e - "pre-end" to "post-end" encryption:

  1. Alice and Bob exchange their public keys. While using a secure channel for this is ideal, a monitored channel (e.g. a normal message app) is okay too for the time being.
  2. Alice prepares her plain text message locally: Alice.txt
  3. She does gpg -sea -r Bob -o ascii.txt Alice.txt
  4. Alice opens ascii.txt, pastes the ascii string in it to her messenger, sends it to Bob like normally.
  5. So Bob gets this ascii-armored GPG message, and saves it as ascii.txt
  6. gpg -d -o Alice.txt ascii.txt, and he has the original Alice.txt
  7. He types his reply locally (not directly on the messenger): Bob.txt
  8. gpg -sea -r Alice -o ascii.txt Bob.txt and sends back the new ascii string
  9. Alice gets it, so she does gpg -d -o Bob.txt ascii.txt to read Bob.txt

In theory, scanning by government-approved software can't detect anything here: Alice and Bob are simply exchanging harmless ascii strings. Binary files like photos can be ascii-armored too.

Admittedly this will be inconvenient, as you'll have to call gpg manually by yourself. But this way you don't need to trust government-approved software at all, because encryption/decryption will be done by yourself, before and after the ascii string goes through the insecure (monitored) channel.

1
Bad Internet Bills (www.badinternetbills.com)
submitted 1 year ago by Saki@monero.town to c/privacy@monero.town

Congress is trying to push through a swarm of harmful internet bills that would severely impact human rights, expand surveillance, and enable censorship on the internet. On July 20, we’re launching a week of action to get loud about our opposition to legislation like KOSA and EARN IT and demanding that Congress focus on passing badly needed comprehensive privacy legislation to actually protect us from the harms of big tech companies and data brokers, instead of pushing through misguided legislation before August congressional recess.

view more: ‹ prev next ›

Saki

joined 1 year ago
MODERATOR OF