-
plowsof11
Rucknium: bounty 4.2 ~xmr sent to MAGICs wallet @
btcpay.monerofund.org/i/4BdGbZvYQRKx44uYqqjs21
-
unkn8wn69[m]
Hey Guys, does anyone have an idea why monerujo pocketchange sends the always 10x the amount of xmr for each bucket? Wouldn't that make it more fingerprintable on the block change? And also, does it send the xmr to each bucket in the same interval?
-
unkn8wn69[m]
I think randomizing the number of buckets (individual transactions) and intervals between that would make it less obvious that a group of transactions originated through pocketchange
-
ofrnxmr[m]
<unkn8wn69[m]> "I think randomizing the number..." <- No
-
ofrnxmr[m]
<unkn8wn69[m]> "Hey Guys, does anyone have an..." <- Arbitrary and bad number
-
ofrnxmr[m]
yes it does
-
ofrnxmr[m]
i dont know
-
ofrnxmr[m]
s/i dont know/i dont understand the question
-
ofrnxmr[m]
if you mean "in the same transaction", yes
-
ofrnxmr[m]
-
unkn8wn69[m]
Oh I'm dumb it generates a transaction with 10 outputs not 10 transactions.
-
unkn8wn69[m]
I think pocket change is very great, i usually send my xmr to a new wallet frequently to make all into one input again, and therefore i think I'd get into the problem more often when trying to spent small amounts in a frequent manner.
-
r4v3r23[m]
-
r4v3r23[m]
jonjones2000
-
cryptogrampy[m]
<r4v3r23[m]> "
twitter.com/ShrtCrct6102..." <- Very cool. Can you share a screenshot of this in the app?
-
-
r4v3r23[m]
cryptogrampylmk if you can see this video
-
r4v3r23[m]
UI is minimal and a proper UX is being worked on
-
r4v3r23[m]
tested & compatible with CLI wallet
-
cryptogrampy[m]
Wow very nice
-
r4v3r23[m]
you can now burn your ledger/trezor and use old androids as a hww
-
RavFX[m]
r4v3r23[m]: How safe is that? Can you cellebrite* it?
-
r4v3r23[m]
factory reset the phone and keep it on airplane mode
-
r4v3r23[m]
unless mossad is actively targetting you, youre good
-
RavFX[m]
I mean, if I steal you're phone and plug it on my PC to extract the data.
-
r4v3r23[m]
android phones are encrypted
-
RavFX[m]
"Old phone", I mean.
-
RavFX[m]
Once you boot it, if I can get to it I can bypass the encryption.
-
RavFX[m]
The encryption protect the storage on boot, but if you boot it then it go to sleep, afaik I only have to bypass the pin lock (or whatever you got set)
-
RavFX[m]
But I assume the wallet part is encrypted
-
r4v3r23[m]
yes app is also encrypted
-
RavFX[m]
so only risk could be someone tempering with it
-
r4v3r23[m]
id trust an android phone over a trezor/ledger in case a hacker had physical access
-
RavFX[m]
Like replacing the app with the same one, recompiled with an extra backdoor.
-
RavFX[m]
so it leak you're key when you use it
-
ofrnxmr[m]
Adb backup db > restore db to a custom cersion
-
RavFX[m]
Yeah, for backup it's nice
-
RavFX[m]
but yeah, android is soo insecure...
-
r4v3r23[m]
RavFX[m]: > <@gfdshygti53:monero.social> Like replacing the app with the same one, recompiled with an extra backdoor.
-
r4v3r23[m]
> so it leak you're key when you use it
-
r4v3r23[m]
how are you gonna do that when the phone is encrypted at rest?
-
RavFX[m]
Oh wait, you probably mean to extract the db and crack it later.
-
RavFX[m]
r4v3r23[m]: Old phone, you really think you can't bypass them.
-
RavFX[m]
It's probably safer if you leave the phone OFF forever, except when you use the wallet, at least the encryption might actually protect the data
-
r4v3r23[m]
-
RavFX[m]
old already booted phone you can't trust it to be secure
-
r4v3r23[m]
so are trezor.ledgers
-
RavFX[m]
r4v3r23[m]: I know that old exploit, patched long time ago.
-
r4v3r23[m]
RavFX[m]: its not the only one
-
RavFX[m]
just compare the codebase you have in a phone and in a hardware wallet
-
r4v3r23[m]
if youre actively targetted, no hww is gonna keep you safe
-
RavFX[m]
the quantity of code, what can go wrong
-
RavFX[m]
And I can easily get into encrypted phone that are already booted.
-
RavFX[m]
old phone
-
RavFX[m]
old android version....
-
r4v3r23[m]
if you want to talk niche hypothetical attack vectors, sure lets go
-
r4v3r23[m]
RavFX[m]: yeah?
-
RavFX[m]
-
RavFX[m]
things like that, software is available on torrent and usenet
-
RavFX[m]
Yeah, use an old phone...
-
r4v3r23[m]
brute forcing a 4 digit pin? lol
-
r4v3r23[m]
let me store my wealth on a device secured by "6969"
-
RavFX[m]
One of the thing it can do.
-
RavFX[m]
it depend of the phone brand/model.
-
RavFX[m]
It use released exploits... But new exploit are getting founds ... And old phone don't **always** get update.
-
naphtha[m]
xd
-
naphtha[m]
you can set longer pins THOUGH
-
naphtha[m]
mine is 8 digits
-
r4v3r23[m]
or long ass password
-
naphtha[m]
having your wealth protected on a phone is retarded though
-
RavFX[m]
You can yes, But you really think there is only "one" exploit ;)
-
RavFX[m]
That was random video.
-
naphtha[m]
setting long ass pins and passwords gets very annoying
-
naphtha[m]
if you use that device daily
-
r4v3r23[m]
this is an advanced feature. it assumes youre taking basic precautions and dont use "Dogname123" as your password on every service
-
r4v3r23[m]
naphtha[m]: cold storage isnt daily use
-
RavFX[m]
The pass protect the boot. Once it's booted, well.
-
RavFX[m]
If you can reach the target, just put a sim in his phone and use a SMS 0 day (available on some phone). Then you get to install what you want on the phone, or dump data.
-
r4v3r23[m]
exceptions dont invalidate the rule, they affirm it. there will always be edge cases
-
naphtha[m]
right but still i'd imagine the crypto algorithms arent made to be very difficult
-
RavFX[m]
Get a new phone or something, or something well supported
-
r4v3r23[m]
RavFX[m]: > <@gfdshygti53:monero.social> The pass protect the boot. Once it's booted, well.
-
r4v3r23[m]
>
-
r4v3r23[m]
> If you can reach the target, just put a sim in his phone and use a SMS 0 day (available on some phone). Then you get to install what you want on the phone, or dump data.
-
r4v3r23[m]
*airgapped device*
-
naphtha[m]
so you can unlock your phone without waiting 30 seconds for the weak arm cpu to decrypt shit
-
r4v3r23[m]
lets not strawman now
-
naphtha[m]
RavFX[m]: > <@gfdshygti53:monero.social> The pass protect the boot. Once it's booted, well.
-
naphtha[m]
>
-
naphtha[m]
> If you can reach the target, just put a sim in his phone and use a SMS 0 day (available on some phone). Then you get to install what you want on the phone, or dump data.
-
naphtha[m]
depends what os
-
naphtha[m]
and how you have it configured
-
naphtha[m]
my pixel on graphene encrypts itself after a couple of hours automatically
-
r4v3r23[m]
naphtha[m]: this is the recommended setup for this feature
-
r4v3r23[m]
and old pixel running graphene/AOSP
-
RavFX[m]
naphtha[m]: Yeah, not everyone do proper research.... (full message at <
libera.ems.host/_matrix/media/v3/do…7a3161d27007a2071b25ffe134a5a46c661>)
-
RavFX[m]
airgapped devices can be vulnerable still.
-
RavFX[m]
Ideally you could make a stipped down rom
-
RavFX[m]
remove the modem driver....
-
r4v3r23[m]
the idea of a feature like this is to make the attack as hard as possible
-
RavFX[m]
but again there is still the issue if someone take it.
-
r4v3r23[m]
if you want to be super paranoid then memorize your seed and forget it
-
bridgerton[m]
<Disciiple> old?
-
r4v3r23[m]
but with enough force you can brute force a brain
-
r4v3r23[m]
s/forget/thats/
-
RavFX[m]
r4v3r23[m]: like a 5$ wrench ;)
-
r4v3r23[m]
duh
-
bridgerton[m]
<Disciiple> why old pixel instead of new?
-
FrankieYawkey[m]
too much force is the problem
-
RavFX[m]
yeah, use new devices...
-
-
naphtha[m]
meanwhile in reality
-
naphtha[m]
xkcd is soy but this is one of the rare times hes right
-
RavFX[m]
There are way to protect again 5$ wrench attacks, but... lets not go into that
-
r4v3r23[m]
bridgerton[m]: new is fine
-
FrankieYawkey[m]
why would a money printer not just wait
-
r4v3r23[m]
naphtha[m]: exactly
-
RavFX[m]
Ideally you want a phone made by an politically opposed faction... (full message at <
libera.ems.host/_matrix/media/v3/do…da69cd2921db08fc6e8daf4dbf47da34668>)
-
RavFX[m]
I don't know if it's still possible to have phone without radio drivers, aka, no phone/wifi capability (so one could not take over a phone by adding a sim and injecting an exploit that way.
-
ofrnxmr[m]
RavFX[m]: That. Titan phone had hardware toggles iirc
-
ofrnxmr[m]
Maybe a different phone. I remember one where you could physically remove the camera etc, easily
-
RavFX[m]
ofrnxmr[m]: That won't protect you if someone take ownership of you're phone.
-
RavFX[m]
But yes, it's good to have.
-
r4v3r23[m]
<RavFX[m]> "I don't know if it's still..." <- its possible. but for the vast majority of cases, unnecessary
-
RavFX[m]
r4v3r23[m]: indeed