00:04:39 <3​21bob321:monero.social> Magic gets free promo at the expense of false info…winrar 03:03:24 Hello everyone, it appears the Cointelegraph article has caused some commotion. 03:03:26 I’m not sure if anyone has reached out to them but I wanted to mention that I have Jeff Milligan’s telegram, so if anyone wants to help clarify the record, I can reach out to him. 04:20:51 link to article? 05:15:04 From Prototype to Marketplace: Maturing the XMR-BTC Atomic Swaps Ecosystem is now fully funded! https://ccs.getmonero.org/proposals/mature-atomic-swaps-ecosystem.html @luigi1111 05:27:05 https://cointelegraph.com/news/chainalysis-leak-monero-traceability 05:59:47 maybe send him this and ask for a comment 05:59:53 https://x.com/DontTraceMeBruh/status/1833383124383781278 06:40:31 here’s the article they should’ve written if they were competent: https://www.digilol.net/blog/chainanalysis-malicious-xmr.html 06:49:49 thanks jordan_sanchez, iunno why i expected anything interesting from cointelegraph 12:02:53 I wonder what's going on with the transaction count? It was at like 23,000 and now it has shot up to just above 34,000. 12:05:19 Attempted attack again maybe? 12:05:52 Maybe 12:06:28 I'm not aware of any external event that has occurred that would be responsible for the increase. 12:06:50 34k is not that abnormal i think 12:07:28 some payment processor sent xmr to large number of customers 12:07:37 some payment processor sent xmr to large number of customers ? 12:08:36 Could be, it's not so much that 34K seems abnormal as that it seems abnormal to go from 23 to 34 all within a very short amount of time. 12:08:46 creating 10k additional transactions are not that difficult i think 12:10:10 yeah it could be abnormal , but whether its organic traffic or intentional spam we don't know 12:11:22 Could just be a tornado event from a whale to mix 12:11:37 🤔 12:11:56 i was thinking about that. like dnm trying to use monero 12:12:14 Yes it’s probably archetyp cleaning their funds lol 12:12:26 Getting ready for an exit scam 12:12:29 but the fact is that monero doesn't require that mixing. 12:12:30 they could transact millions in few monero transactions 12:13:10 unless they transfer from like multiple Wallets. ,like thousands 12:13:48 You’re right it doesn’t, but what if they were the defcon 10 paranoia level 12:14:35 doing tornado with monero , would be foolish 😂 12:14:47 also there is no public monero mixer 12:15:38 but the fact is that monero doesn't require that mixing. 12:15:40 they could transact millions in few monero transactions and be private. 12:15:46 they won't mix between their own wallets 12:17:58 we forget about exchanges though. 12:18:00 could be a legitimate exchange trying to sort out their funds with users. 12:18:57 but don't know why would they settle all accounts all of sudden. 12:19:29 even binance delisting didn't have significant spike in transactions 12:21:15 It creates more obfuscation by mixing outputs and can confuse analysis tools, and what about if there is significant adversarial control over the Monero network that we’re not even aware of, if that did happen to be the case you can deanonymise right? If you spread it across multiple nodes it might be harder for a single entity to correlate the activity 12:22:27 Please tell me if my understanding is off 😛 12:26:05 tx count? there are now 58 txs in the mempool 12:26:52 now 102 0_o 12:29:30 why use multiple nodes when you can run yours own ? 🤔 12:29:32 even chainanalysis tracking suggested using your own node would make your transactions anonymous 12:29:53 also question is with whom are you mixing your outputs ? 12:30:59 the piconero attack can be overcome by churning wallet balance to a new address 12:32:00 so with a few number transactions you can make millions of xmr untraceable 12:33:07 well , Anyone can correct if i missed something 😅 12:35:26 why does sending to a new address mean anything when addresses are not on the blockchain? 12:35:53 piconeros ? 12:36:58 bbl, cats await me 12:39:36 sorry i am not sure about the details of the attack 😅 12:40:30 but apparently sending small amounts of xmr to target wallet , and see if they transfer that balance to a kyc exchange 12:41:07 so maybe the input and outputs could be co-related to that target 13:04:04 I see, I’ll assume you’re right! but if you send a transaction you can still be known as one of that 10 people that could have sent it right (depends on the amount of people in the ring signature)? If you do thousands of transactions that becomes 1 of several thousands possibilities of people? 13:10:41 I guess I should have used the word wallets instead of people their 13:10:51 I guess I should have used the word wallets instead of people there 14:08:37 kevino: Dusting attacks are much harder in Monero than transparent chains. An adversary needs to have the target's address. Monero addresses don't appear on the blockchain, so the adversary needs information from another source. 14:48:58 I wouldnt say "much" harder 14:49:30 Well, i guess "much" is fair. But not to imply that its unrealistic 14:50:19 Dusting wallets would force cospends with the default coin selection, leading to 2/2 transactions 14:50:56 re: > so with a few number transactions you can make millions of xmr untraceable, I'll say: a few txs provide a few hops of plausible deniability/uncertainty; the more txs, generally, the better (although if you make too many txs that stand out from the "background noise" in some way your efforts may be counterproductive) 14:51:29 Churning the dust definitely helps 14:52:37 *Freezing the dust helps 14:53:45 Donating the dust works too 😂 14:54:24 Dust ofrn's wallet :) 15:58:56 cointelegraph do say sorry sometimes (see https://cointelegraph.com/news/clarification-sharing-false-spot-bitcoin-etf-news) 16:34:47 nice how 1 donation completed binary barron's CCS and yet was overfunded by 1.xx xmr :D 16:35:41 we can put that toward the work night out 16:36:24 congrats binarybaron and einlitre💪 16:39:46 how many times do i need to churn to become almost untraceable ? 16:39:48 also assuming after fcmp++ we won't need to churn 17:08:16 First of all, you need to run your own node, before you even consider churning 18:48:35 Wdym, can’t Chainalysis do it for me? /j 19:13:11 proper churning protocol is unknown 19:15:21 except that you should definitely run your own node 19:15:36 or use one you "trust" (don't trust, run your own node) 19:15:53 i run my own Node + vpn turned on 19:16:09 only 1 layer of vpn?? 19:16:16 /s 19:16:58 yes 19:21:35 <3​21bob321:monero.social> Lol 19:26:16 churn 2-3 times at with random intervals (hours to days between churns) 19:26:38 and don't combine inputs 19:34:57 okay 19:35:55 wdym by not combining inputs ? i should churn each utxo separately ? 19:36:49 are these steps mentioned in a guide somewhere ? 19:37:46 wdym by not combining inputs ? i should churn each utxo separately to different address ? 19:41:17 yes 19:41:18 Or to same address. But each utxo must be separately churned. 19:42:07 you want it to look like a 1:2 in the blockchain as 1:2 and 2:2 seam to be the most commons. 19:42:08 Having a 7:2 glow more 20:37:25 ok i didn't knew this 20:40:27 we should have a guide about this practice for people from DNM 21:02:02 TCMP will make this moot 21:02:20 *FCMP 22:51:14 Total Chain Membership Proofs 23:42:21 Future Chain Membership Proofs 🔮