[-] ShadowRebel@monero.town 1 points 9 months ago

Appreciate your time

[-] ShadowRebel@monero.town 1 points 10 months ago* (last edited 10 months ago)

Hey you have to use their blockchain to get short Session names, the name prancer389 isn't assigned. What's the long form numbers and letters of your account?

Edit clarify: By "names" I mean DNS, finding you. You can type anything into the display, just like twitter. But it's not the real username

[-] ShadowRebel@monero.town 1 points 11 months ago

thank you for support

[-] ShadowRebel@monero.town 1 points 11 months ago

Session not only is privacy but also free speech! It’s a huge problem that the government controls DNS or domain names that point to IP addresses. You don’t own a domain, they rent it to you.

Our team has developed software for a distribution bot using Session messenger because Session has blockchain based DNS on top of onion routed privacy. This video explains how it works: https://video.simplifiedprivacy.com/sessionbot/

[-] ShadowRebel@monero.town 1 points 1 year ago

Did you get Pay with Moon to work for bitcoin WITHOUT linking it to Coinbase account?

[-] ShadowRebel@monero.town 1 points 1 year ago

thanks good idea. the r/privacy one is ruthless with take-downs, if you know the moderator let me know

[-] ShadowRebel@monero.town 1 points 1 year ago

I am fairly new to this community, so I have no official say. But has Core considered distributing Monero binaries via Nostr, IPFS, Arweave, akash, Session, or other decentralized means? This would allow for more decentralization of staff and censorship resistance than a credit card government domain. Also could be both. just more options. And then different core members could do the different official channels, which would quickly raise alarm bells if Nostr has a different binary than getmonero.org

[-] ShadowRebel@monero.town 1 points 1 year ago

You’re correct that UDP is not “suspicious”, but it is easier to track from an ISP that a VPN is being used. The video stressed that this was a risk for those concerned with censorship from the ISP for using a VPN. Even the WireGuard official website says this is not ideal for obfuscation.

Regarding the VPN→Tor, it places a greater level of trust on the VPN provider to properly implement WireGuard key rotation. If the VPN provider is using a dedicated server, such as Mullvad, then that’s great. Other VPN providers are shady and use VM clouds from popular datacenters. Cloud computing shares RAM resources and thus it’s keeping in memory longer the association. It’s also possible that the same datacenter can be hosting a Tor node and a VPN. Many VPNs use the same third party datacenters. It’s not that WireGuard is inherently insecure, it’s that there is no benefit to using during Tor for increased risk. And these increased risks all revolve around more trust.

[-] ShadowRebel@monero.town 1 points 1 year ago

We are trying to build trust in our website, it's a business. Gotta start somewhere, everyone is unknown at first

[-] ShadowRebel@monero.town 1 points 1 year ago* (last edited 1 year ago)

The issue with WireGuard depends on your situation. So for low risk activities such as watching a Netflix video, it’s fine. It’s faster and convenience. However, people should be aware of the trade-offs associated with this:

There’s logging of IPs built into the identity of the users, such that it stores it in memory after the connection is closed. This is NOT an issue for low risk activity like video games, but IS an issue for Tor users as they change circuits every 10 minutes. Frequently VPN companies outsource their servers to the same third party servers as Tor VPS hosts and as other VPNs. For example, some well known VPNs, Mullvad and IVPN do share some of the same third party providers. And other providers don't have dedicated servers and use cloud VMs. Keeping your IP in memory from one Tor circuit to another with the same servers providers is a huge risk especially if it involves cloud hosting as it’s shared memory. Depending on the VPS or provider, it could overlap. The video further explains that there is no speed benefit to using WireGuard over OpenVPN with Tor. So you get no bonus for the risk.

There was other stuff covered in the video regarding UDP packets being more obvious to the ISP for a VPN useage, and the potential to put that through a UDP→TCP tunnel with a link to where to find that.

Future videos will have me in a smaller box in the corner, and larger graphics

[-] ShadowRebel@monero.town 1 points 1 year ago

Hey I had a different person tell me that the lightning is not directly integrated with protocol. The lightning payments are custodial. So when I use it on a web browser, I use Flamingo for signing nostr posts, and then Alby wallet for signing bitcoin zaps. So if it can be using separate software like that, I see no reason that other cryptos can't be added on the client side.

The bigger issue is that having public Monero transactions would take away from Ring CT.

view more: ‹ prev next ›

ShadowRebel

joined 1 year ago