00:07:19 You can always sell stack premium wallet for $1 on apple app store 00:08:13 Comes with priority customer support and a smile 00:08:53 Comes with crossword puzzles and sudoku in app. 00:09:15 Stack non-premium comes with angry support 00:10:41 Now you're thinking 00:22:05 <3​21bob321:monero.social> instead of passphrase login ? 00:22:17 <3​21bob321:monero.social> complete this puzzle to unlock 00:25:19 Turn on your camera and perform this TikTok dance correctly to unlock. 00:25:42 <3​21bob321:monero.social> whilst holding 3 fingers up 00:52:38 diego stackwallet or stack-wallet ? 00:53:09 stack_wallet 00:53:12 you mean our twitter? 00:55:40 Website 00:57:12 With the - it sent thru a cloudflare check first on tor browser 00:59:46 Now they both behave and end up in ty he same place 06:51:06 Really? That kinda hurt my feelings 😢 07:33:55 <1​7lifers:matrix.org> do y'all know anyone using fedi then ._. 08:26:57 the drama on such platforms is mostly engagement farming, especially for the troll saying outrageous stuff. 'thats enough! join my space and settle this!' and of course you need to follow the person if you wanted to listen in. drama must be FOSS at ALL stages how many times do i have to say it. 14:18:55 lmao ah I remember those times 14:19:10 remember the mass exodus to mastodon after elon bought X? 16:32:11 <1​7lifers:matrix.org> misskey the best fedi >.< 16:48:38 Hello i am new to monero and not sure if this is the right channel for this question. I am searching for a way to anonymously transfer crypto coins from a centralized exchange to a private hardware wallet. I found monero as a privacy coin that hides all transaction informations. But for me it is not clear how this helps me with an exchange. E.g. i have TRON (TRX) on the exchange. 16:48:39 I can sent it to a private wallet, but because the exchange knows my identity through KYC, this means they know then my private wallet address. Maybe i can then swap the TRX to XRM and all i read so far is that XRM uses stealth addresses. But then the exchange knows my TRX address and my stealth address. Of course i can sent then the XRM coins in another transaction to another wal 16:48:41 let, but i guess then the exchange just knows this second stealth address and can make links to my identity. So how is anonymity guaranted in this situation? 16:53:08 Or in other words, what is the best way/recommendation to break the link between an exchange and a private wallet to preserve my anonymity. 16:53:27 The address the exchange sends to is never published on-chain 16:54:29 Look up "breaking monero" on youtube, episode about EAE 16:54:31 To break link, you simply dont send the xmr back to the exchange 16:57:01 This will only work when the exchange supports directly monero. I did not found an exchange here in EU/germany that supports monero. Seems every exchange delisted it. I found Cake Wallet where i can buy monero. But my usecase is more to buy any coin on an exchange and then i want to move it privately to my hardware wallet. Of course i want also to send coins back to exchange for cash out. 17:01:48 Or at least i need a way to buy any coin with SEPA bank transfer and later i want to cash out it via SEPA. But nobody should know my private wallet address. Of course as easy as possible. What i currently see is only to use 2 wallets. Wallet A is for communicating with exchange. But i swap then all coins in wallet A to monero. Then sending the monero to wallet B and swap it back t 17:01:49 o the original coin. For cash out i could do the reverse. Maybe with Cake wallet i can cash out monero directly. 17:04:27 But thank you for the youtube tip. Seems a lot of video documentation. I will have a look at it 17:13:35 Maybe one more question. With monero i can give the sender just my public key as usual and then there is the stealth address generated, which is then recorded on block chain. That means the sender/exchange knows my public key, but nothing else and it cannot be found because it is never recorded in block chain. If so, it will make now more sense to me how it is working and how anon 17:13:37 ymity is preserved. But of course the exchange can potentially know my stealth address and makes an identity link in their databases? 17:26:40 This idea doesnt work 17:27:15 Monero isnt a coin washer 17:35:39 Can it work with 2 wallets? I transfer funds from exchange to wallet A. Then i swap inside wallet A the coin to monero. Inside the monero network i transfer the funds to wallet B. In wallet B i swap monero back to original coin. Should'nt that break the link to my identity on the exchange? For cash out i can do the reverse way. Of course i should always preserve the coin type and 17:35:41 number of coins when i communicate with exchange to not get trouble with proof of origin. That is the reason why it is better to swap monero to original coin in wallet B. Because when you use another coin for longterm store and it increases differently than your original coin, you probably get more coins out that you transferred from exchange to wallet A, which is of course a mone 17:35:43 y washer to prevent taxes. That is not what i want. I want just to preserve my privacy 17:49:31 If you swap in and out of monero, your new trx is easily associsted with your old trx 17:50:44 This isn't a monero problem 17:51:25 Its a problem with using transparent blockchains in general 17:51:33 It effects all "optional" privacy blockchains the samr way 17:55:27 That is what i not really understand. I have in wallet A my TRX.A with address A. This address A is known by the exchange because i used it as receiving address. If i go through the monero network and move it to a completely other wallet B, then also the TRX.B has another address B. I mean here HD wallets with multiple coins. Why should be there an association between the address 17:55:29 A and address B, when they are in distinct HD wallets. Makes no sense for me. 17:58:33 [CCS Proposals] selsta opened merge request #588: selsta part-time monero development (3 months) (17) https://repo.getmonero.org/monero-project/ccs-proposals/-/merge_requests/588 17:59:39 Because an exchange knows that you swapped 17:59:41 986trx -> 1xmr then 1xmr -> 986trx 18:00:53 Okay that is a serious reason. That means i should use multiple transactions to wallet B with different addresses and different amounts 18:02:16 if wallet B ends up holding the same amount that went in, its still tracable 18:02:17 if wallet B ends up holding the same amount that went in, its still traceable 18:02:20 Thank you for that hint. One reason more to use a cold wallet that supports multiple receiving addresses 18:02:21 you would have to use multiple different wallets 18:02:23 EAE. The exchange can determine that youre sending the same xmr to them over and over 18:03:27 Amyway, this isnt how-to-launder-trx-101 18:03:31 Buy monero, hold monero, use monero 18:04:05 safest way 18:04:11 Most of the cold wallets i tested so far like Tangem, OneKey and Safepal do not have the feature of multiple addresses with changing BIP39 transaction index. Maybe multiple wallets would be an option. 18:04:17 If you want to use transparent chains, being trivially traced is a feature of those chains 18:04:19 Its not monero's job to fix their design choices 18:04:28 Yeah monero could be an option 😉 18:04:48 But of course i want to hold also other coins 18:28:31 If i buy monero through Cake wallet. Is'nt it the case that then the exchange like onramper knows my stealth address and also the amount? If i understood it right, i give them my public address, they create the stealth address. But they can record this stealth address and amount in their database linked to my identity. If my assumption is right then i need at least 1 transaction m 18:28:33 ore inside the monero network to move these funds to hide them really. Sounds like an equal problem to my exchange/non-monero problem, but without all the swapping and amount/wallet splitting. 18:31:48 you cant monitor a stealth address directly 18:36:09 If i think twice about it, maybe it does not matter, because Monero hides the amount. Ok the exchange knows the stealth address and amount, but they cannot see the amount on blockchain, so potentially the stealth address is useless for them. They can only record the stealth address/amount in their own databases. But they dont know if that stealth address still contains really that 18:36:11 amount. It could be already spend/moved through a second transaction. 18:37:18 Yeah and then there are ring signatures on top of that 18:37:38 The address that you send to is not the stealth address, hence why it is a stealth add 18:37:40 The real way people get traced is by connecting to spy nodes without vpn 18:38:07 I like really the idea of Monero. It sounds for me it is the only real crypto currency to get financial freedom ☺️ 18:38:43 That's why most of us are here :) 18:39:19 But it's advisable to use only stealth addresses, right? 18:40:13 Correct me, i am a newbie 🤣. When Alice wants to send me (Bob) something, then i give my public key to Alice. Alice generates then the stealth address. That means Alice knows my public and stealth address. Is'nt that correct? 18:40:36 All addresses become stealth addressed 18:40:40 and why many suggest that we use Cake wallet over Monerujo wallet 18:41:15 iOS? 18:41:23 Android 18:41:34 Both are fine 18:42:41 Monerujo synchronization is superior with low-speed data on Android 18:42:51 Monerujo supports subaddresses. Cake is suggested over monerujo because its maintained. It used to be "cake or monerujo", but monerujo isnt so hot anymore 18:44:18 Nobody wants to ask , bro which is ? It’s better to just say use cake wallet 18:44:19 What do you mean it's not so hot? 18:44:35 If someone asks me which android wallet, I do tell them monerujo and cake 18:44:51 Not active 18:45:10 big thanks for the clarification 18:45:10 Nobody wants to ask , bro which os ? It’s better to just say use cake wallet 18:45:51 It has a pretty ui, but monfluo is a better wallet than monerujo atm 18:46:23 why it's better? 18:48:19 He already told “pretty ui” 18:50:39 ah okay 👌🏻 I love minimalist thing = pretty ui 18:50:54 less is more 18:53:56 whats a stealth address? https://www.getmonero.org/resources/moneropedia/stealthaddress.html , to play around with addresses https://monerotech.info/Home/Address via rbrunner 18:55:01 whats monfluo https://repo.getmonero.org/monero-project/ccs-proposals/-/merge_requests/557 18:55:06 cool 😎 18:56:08 whats EAE https://yewtu.be/watch?v=iABIcsDJKyM?v=iABIcsDJKyM 18:58:25 FCMP++? https://www.getmonero.org/resources/roadmap/ 18:58:56 Well, we're aging as well as we can 18:59:24 EP150 EP159? https://github.com/monero-project/monero/issues/9941 😆 19:01:08 Has someone a answer for me? 19:01:58 is that your question 19:04:31 unique75m: Say you have some Monero address. Every time someone sends something to that address, the output public key that appears on the blockchain is different. 19:05:26 So someone would "know" the output public key only of the transaction that they sent you, not the output public key of other transactions sent to that same address. 19:06:21 unique75m: yes they know your stealth address *for that transfer*. Everyone else who sends to your public address derives a new, unlinkable stealth address from the public address, so they are not relatable on-chain. The person that sent you XMR knows *their* stealth address that they derived for you, and can track its "uses" on-chain, i.e. when it is referenced in a ring signatur 19:06:23 e. However, they cannot tell which ring member reference is a "true spend" or when it is being used a decoy 19:07:24 However, say that you give Alice and Bob the same address (starting with 4 or 8), but you pretend to be a different user. If Alice and Bob share data with each other, they will realize you are the same user, of course, since you gave them the same information, but you pretended to be two distinct users. 19:08:27 Yeah it's not like you have one stealth address for one public address. There is a practically unlimited (technically the range of the hash-to-scalar function Monero uses) number of stealth addresses per one public address 19:09:03 This is why I prefer to use the term "one-time address" instead of "stealth address" 19:10:16 Ok thank you. That means that Alice (the exchange like onramper) knows the stealth address. But as Monero also hides the amount they cannot trace if this stealth address still have that amount. So maybe knowing only the stealth address is potentially useless for them. 19:16:44 A stealth address is a onetime address, which means that you can send to it exactly once, and withdraw from it exactly once. The amount therefore is fixed per stealth address. But b/c of RingCT, the amount of an *input* spending that onetime address isn't public, so yeah them knowing the amount of the stealth address with 100% certainty doesn't mean anything when it comes to traci 19:16:45 ng where it is spent. Before RingCT, the amounts were public, but you'd only use decoys of one-time addresses with the exact same amount as the one you're trying to spend. For example, look at this pre-RingCT transaction: https://xmrchain.net/tx/8d7aea7480fcf53e6b9bef5d398c4031d923b0a0a47d6e088f69b49a8674a542. It has four 4 inputs, worth 0.07 XMR, 2.0 XMR, 0.000006 XMR, and 10 XMR 19:16:47 respectively. Each ring member in each of those rings has the same amount as each other ring member. But if you look at a current RingCT transaction, the input amounts are all unknown 19:19:37 I'm waiting for the proxy support. Orbot support has been broken for years 19:25:03 what's your take on sidekick possibilities? 19:31:42 I dont like bluetooth for airgapped 19:31:54 sidekick is iirc using ledger-hq bluetooth library 19:32:18 Would have oreferred if they used the URQR that anonero, cake, and fearher use 19:32:29 Keystone actual HW waller uses URQR too 19:33:39 Will monerujo be around for fcmp++? 19:39:03 🚧 We're busy porting FCMP++ , until then we recommend users try out monerujo-wallet-cli via termux 🚧 19:39:26 it better come with some ascii gunthers 19:39:52 Wen ASCII monerochan 20:06:17 Of course. We may be a little slow polishing the UX but we plan to support the latest monero for the foreseeable future. 20:32:59 Wownerochan has ascii on cli wallet, maybe need to take inspiration from it 20:37:58 did it come in the Kunty Karen release? 21:13:15 I yhink so 21:13:39 Its the one where shes on knees. Monerochan is cropped out 21:26:49 Weekly monerochan art lore 21:41:29 I commissioned the other ones lol 23:52:34 https://www.reddit.com/r/MoneroMining/s/b3sVTxP7EI 23:55:16 https://ibb.co/yFw6wVDN 23:58:33 🚀 AIDRig Dev Test Build Coming Next Week (Optimized Android Miner for Big Cores) 23:58:33 Hey everyone, 23:58:33 I’m excited to announce that after an intensive phase of internal testing and fine-tuning, I’m planning to release the very first AIDRig Dev Test public build next week — if all goes smoothly. 23:58:33 AIDRig is a native Android miner, based on XMRig, but deeply optimized for ARM big.LITTLE CPUs — specifically targeting the big performance cores (e.g. Cortex-A78) for significantly better stability and hash performance on mobile. 23:58:33 ▶️ Example Termux launch command: 23:58:34 ./aidrig -a rx -o stratum+ssl://rx.unmineable.com:443 -u XMR:WALLET.Your_work_name -p x -k -t2 --cpu-affinity 6-7 23:58:34 🔧 Notice: 23:58:34 To get optimal performance, make sure to set the --cpu-affinity flag to assign AIDRig only to the big cores (e.g., cores 6-7 on Poco X5 5G devices). Using little cores reduces overall performance and efficiency. 23:58:35 💡 What to expect: 23:58:35 - Runs directly in Termux, no root needed 23:58:36 - Focused CPU scheduling and affinity for efficient big-core mining 23:58:37 - ~3x higher H/s compared to stock XMRig (on same settings & cores) 23:59:46 Wheres the source code