00:34:08 sethforprivacy: if my btc will get lost, i will hold you liable because i used your site. 00:35:12 bc1q52ta9l354gz2z3hfucl5ls9zd9waretmnm9lkz - address shown in swap.exe for btc-xmr atomic swap 00:41:40 #comit-monero:matrix.org inlight 00:44:07 plowsof[m]: just wrote there 00:44:11 lets see if someone replied 00:44:49 #unstoppableswap:matrix.org worth a try too 00:46:47 ok- wrote there, thanks 00:47:21 btc sent to /dnsaddr/battery.commitcri.me - was the provider 00:49:33 plowsof[m]: their channel is dead- barely any reply 00:55:46 https://sethforprivacy.com/guides/bitcoin-monero-atomic-swaps/#what-to-do-if-the-swap-fails 00:56:10 inlight: have you tried those steps 01:08:17 https://blog.thenewoil.org/why-to-care-about-privacy-after-years-of-sharing-data 01:09:23 guys the night is going to be rough check out Monero: https://www.reddit.com/r/place/?cx=1025&cy=492&edit=&fullscreen=&px=65 maybe give us some help, come to our r/place. 01:11:35 Will the /r/place ever stop? 01:12:07 We get it, cool Discord, reddit fellas. After the 19th post or comment about it, we heard loud and clear. 01:15:29 If you're a Trezor user read this immediately: 01:15:29 https://twitter.com/sethforprivacy/status/1510425457761693705?t=9VpRCgcwEVAboozaNaqIzA&s=19 01:15:29 Massive breach. 01:41:51 is it real though 01:42:28 what is real? 01:42:41 some fools fooling around with pixels on reddit? totes. 01:45:48 seems to be a phishing email / not real according to some comments ( i mean, how can you 'steal my crypto' if im using a hardware wallet ) 01:48:18 "is it real though" <- Yes, it must be (or their email list was hacked/shared and phished) 01:48:29 I use a unique email alias for them which no one else could know/guess. 01:49:25 im going to back up my seed on my iCloud and use the wallet migration service the email linked me to just to be safe šŸ˜› 02:01:17 It's a phish 02:01:35 But Trezors email list was hacked/leaked for sure. No way this email alias was gotten any other way. 02:12:41 yeah email list hack seems most likely answer 02:20:07 "yeah email list hack seems..." <- Yes. 02:20:07 More info and example of the phish: 02:20:07 https://twitter.com/sethforprivacy/status/1510440372010377231?t=rfKt2WkIe1C3Qf-Ddrz54w&s=19 02:43:38 do we have some templates for the monero place drawing? 02:44:17 sorry i should prolly have scrolled up 08:28:54 sethforprivacy: there is a great way to help monitor emails that have been leaked. When signing up for accounts use Gmail (I know, bear with me). You can you + extensions on your Gmail account as aliases, to keep track of what account sign up emails get leaked. So for trezor you email sign up is normalemail+trezorāŠ™gc, which still redirects to normalemailāŠ™gc might work for other email services as well. 08:28:54 That way, if that email ever gets leaked it's obvious it is from Trezor 08:32:03 midipoet scammers know this too and remove +... part is easy 08:39:42 hi in eedh elp 08:40:21 plowsof[m]: 08:40:29 plowsof[m]: i tried swap withdraw-btc 08:40:43 nad it published a transaction, which goes to same address check, not mine 08:41:10 46ab3c269c7c9443eec2fa30bf2820f0a1e160556e9ea674b8d00884aa159a8d 08:41:55 what? 08:46:22 oh i had put the address wrong- had to put my address there 08:51:20 thanks, shall refund now! 08:51:24 exit 12:17:55 "Seth For Privacy: there is a..." <- I used a unique alias and that was one of the reasons I thought it was real, actually. 12:17:56 The alias is only known by Trezor themselves (until this hack), and could not have been guessed etc. 12:18:06 https://twitter.com/Trezor/status/1510548489884815361?t=cM-1QdhZaqgQQlg2xdJWtw&s=19 14:09:03 perfect example how mindset > tools when dealing with privacy/security 14:09:13 anyone reading that email should have known its a scam straight away 14:09:50 indeed, tools alone will not help you if you log into facebook using tails 14:10:38 bridgerton[m]: perfect example 14:10:49 > <@bridgerton:matrix.org> indeed, tools alone will not help you if you log into facebook using tails 14:10:49 * another great example 14:11:00 when people mindless follow guides/recommendations it gives them false sense of security 14:11:16 giving a fuck about your own privacy isnt something you can teach some one on a podcast 14:11:30 s/mindless/mindlessly/ 14:13:32 * r4v3r23[m] uploaded an image: (52KiB) < https://libera.ems.host/_matrix/media/r0/download/matrix.org/cFVfIJTgYKVTkorenbZelzrB/image.png > 14:13:42 this meme sums up everything that is wrong with the privacy/security scene in crypto 14:16:03 https://i.redd.it/tumvi093t9r81.jpg 14:17:20 * r4v3r23[m] uploaded an image: (117KiB) < https://libera.ems.host/_matrix/media/r0/download/matrix.org/SKoIRDcRcujgrMDpgfUNiaWP/image.png > 17:26:44 "this meme sums up everything..." <- exactly, shred your data or hide it somewhere physically without anyone ever knowing it. 17:44:35 netrik182: Do you know anything about the German/Spanish/Italian ccs 'work in progress' proposals that seem to be inactive ( without about 50XMR raised for them) 17:46:51 plowsof: Iā€™d like to complete the CCS translationā€™s proposal in Italian which seems currently inactive 17:50:39 That would be nice errm not sure of the process here, im assuming to contact luigi1111 and / or have it discussed in a community meeting. netrik182 is/was the 'coordinator' but.. https://ccs.getmonero.org/proposals/netrik-translation-coordination-2.html 18:21:01 "this meme sums up everything..." <- My favorite are the people who go even beyond that: biometric fingerprint of faceID or a yubikey instead of passwords. Really secure data you have there, would be a shame if I just held your phone in front of your face. 18:31:20 plowsof[m]: there were some suspicious CCS months ago that used auto translate 18:31:31 machine translations* 18:31:42 are you talking about them? 18:33:41 @selsta oooo šŸæ interesting,, i had no idea of this. i was just looking through the work in progress and noticed these translations seem inactive. seems that 1 person has volunteered to handle the italian translations 18:34:15 i think as a result we changed the rules for translation CCS 20:06:24 i sort of finished the translation from english to portuguese of ztm v2. 20:07:28 there is lots of i dont understand in the extensions part. Therefore the translation must be faulty in many parts... 20:08:02 I wanted to finish it before i explain the randomx and the bulletproofs. 20:08:36 tomorrow i will start my job so i will only have time on the weekends... 20:09:14 i only want to rant at the konferenko about slave blocks :) 20:09:54 im from portugal and my mom does not let me visit her if i dont get that thing in the arm that makes clotty... 20:16:47 smh 20:17:00 she Trusts The Science 20:26:08 https://github.com/slave-blocker/voider_2 20:46:10 "exactly, shred your data or hide..." <- bingo. treat your digital shit like physical property 20:46:30 keeping your shit offline beats any encryption out there 20:47:18 not really, physical theft is one of the scenarios where encryption helps a ton 20:47:31 thats why not all the blocks should be on the blockchain at all time just their hashes. 20:47:33 not if you do it properly 20:47:53 big blockers, small blockers whatever! 20:47:53 I don't think you understood my sentence 20:49:45 bridgerton[m]: i did. the same way you dont keep all your valuables in one place, you do the same with digital assests 20:50:26 Encryption makes theft useless 20:50:36 if you encrypt whatever drive was stolen, the data is at least not in the wrong hands 20:51:43 bridgerton[m]: see meme posted above 20:54:16 I don't see any 21:00:42 * r4v3r23[m] uploaded an image: (48KiB) < https://libera.ems.host/_matrix/media/r0/download/matrix.org/JEbVjcMTzyiJIzjpuoHTajgL/image.png > 21:03:53 Not all encryption involves a password, and theft rarely ever follows up with kidnapping 21:04:05 if they find out the drive is encrypted they'll format it and resell the laptop or phone 21:06:50 not if its a targetted attack 21:07:00 aka they know your a crypto users 21:07:25 s/users/user/ 21:07:37 get better opsec in that case, not relevant to pure theft 21:07:48 also xkcd is gay 21:08:03 if someone just steals your phone you have nothing to worry about regardless 21:08:06 don't use password based encryption 21:08:11 thats not what were talking about here 21:08:20 if they want whats in the phone youve got a problem 21:08:37 like govt agencies or thugs 21:08:40 but im being redundant 21:08:54 are you saying encryption does not help in this scenario 21:09:01 yes 21:09:23 encryption doesnt protect against physical attacks 21:09:41 Encryption does not protect against data destruction, yes 21:09:47 but it protects in data reveal 21:09:54 no it doesnt 21:10:06 not if i want to force you to decrypt it for me 21:10:11 or i bash your head in 21:12:25 funnily enough a bank is one of your safest bets in this situation 21:17:16 can't force me if I don't have the means to decrypt 21:17:24 if you kill me then no coin 21:18:41 i dont think you understand how torture works 21:20:18 In that case, better not encrypt anything incase someone gives you ouchie 21:21:30 again, refer to the meme 21:22:03 Yes, refer to what I said 21:22:11 with a gun to your head or to your family it wont matter what encrpyiton you used 21:22:25 yeah youre just wrong 21:24:34 Yes, purely relying on password based encryption is not good opsec against threat models that high value targets may face 21:24:38 which is not at all what I said 21:24:48 any encryption 21:24:59 youre options are give me what i want or suffer physical harm 21:25:09 s/youre/your/ 21:26:59 you are adding to my points 21:27:28 you just think i am 21:28:13 go ahead and write a guide on how to succesfully escape a crypto kidnap scenario free of harm using encryption 21:28:37 with all your coins untouched 21:28:45 You are still not arguing against my point 21:29:12 " In that case, better..." <- youre talking about encryption 21:29:35 so either make your point or lets wrap this up 21:31:50 I already made my point, scroll up 21:32:26 so were done here 21:33:53 Very mature 22:58:32 i mean you could make the same argument with lots of things.. 22:58:32 why have a car key when someone can point a gun at your face and force you to give them your car key? 22:58:32 the answer is simple, for the times when you need the door to be locked and the attacker isnt using the method mentioned above. 22:59:12 why have locks on your front door to your house when someone can just wait for you to leave and force you to give up the house key at gunpoint.. and etc. why have locks on anything maaan. 22:59:13 its kind of a dumb argument. 23:00:16 you are both dumb because r4v3r23 presented the dumb argument and 23:00:16 Encore argued against it very poorly. 23:10:41 > <@unscottable:antioptic.com> i mean you could make the same argument with lots of things..... (full message at https://libera.ems.host/_matrix/media/r0/download/libera.chat/fee645c5bb0ac1d65b8e74ccc7e79ca8f964ca28) 23:10:47 * cars can have gps tracking and license plates/VINs 23:11:15 theyre not fungible. now try again 23:21:27 so? all of those can be interfered with or altered. cars are stolen and resold all the time. 23:21:27 my point is that the reason you have locks of any kind is that there are times when attackers are not using the method you described. 23:22:52 try tackling the broader point i made instead of trying to sound smart by pointing out that crypto and cars arent the same thing. 23:23:16 imagine actually arguing with r4v3r23[m]. 23:23:33 it's like having a conversation with an 13 years old kid from high school. 23:31:24 the pretentiousness and dullness required to say "try again" after having not addressed the point I made at all. 23:31:41 "it's like having a conversation..." <- Yeah Id agree with that description. 23:32:14 Just hit the ignore button.