-
selsta
sech1: is this something you could answer?
monero-project/monero #8233
-
sech1
"sender , receiver address and amount" - Sir, this is Monero
-
sech1
and I answered it on IRC already a couple days ago
-
selsta
do you know which channel this was? then I can copy it into the issue
-
sech1
-
selsta
thanks
-
nollied[m]
has anyone written any code that can interface with monero locally via a python API?
-
nollied[m]
looks like i pretty quickly found the answer to my own question:
github.com/monero-ecosystem/monero-python
-
nollied[m]
this might be a stupid question, but is there a way to interface with monero without using the daemon? like can it be initiated in the runtime for a more light-weight development experience?
-
makkiato[m]
nollied[m]: in the library you linked there is a class (/backends/offline.py) for offline creation of a wallet, private keys, secret phrase etc.
-
makkiato[m]
However you need a node for anything else. What else would you (even conceptually) like to do without the knowledge of the status of the blockchain?
-
nollied[m]
yeah but pretty much all of the functions raise exceptions
-
moneromooo
All the functional tests do just that.
-
nollied[m]
mak_noob[m]: i'm wondering if you can run the blockchain but not in the daemon
-
moneromooo
(interfacing locally with monero)
-
moneromooo
To avoid using the daemon, either (1) code everything again or (2) link with the monero libs, if that counts as "without monero" for yo.
-
makkiato[m]
nollied[m]: no I do not thing the python library can be used to build a "minimal daemon" from scratch if that is what you are asking. I think the python library is basically a RPC interface.
-
moneromooo
2 is going to be a large amount of work though.
-
nollied[m]
linking with the monero libs makes sense, but yeah that would be really hard and unnecessary
-
moneromooo
The blockchain is just data, it does not run. The monerod daemon is what processes it.
-
nollied[m]
is there a live testnet? why do we need to download the testnet data just to be able to develop
-
nollied[m]
separate question
-
moneromooo
There is. You don't.
-
moneromooo
See for instance, again, the python tests.
-
nollied[m]
oh, from that repo it mentioned it was necessary
-
moneromooo
Maybe it's necessary for what they do. I meant in general.
-
nollied[m]
-
nollied[m]
ok cool, is that what offline mode is?
-
makkiato[m]
maybe you should try to read a bit the code and understand what it does.
-
moneromooo
Offline will not connect to other peers, and thus not try to get their chain nor try to upload yours to them.
-
moneromooo
You can then have your own local chain, parallel to the "main" one.
-
makkiato[m]
-
moneromooo
Oh. Again, I was talking of monero, not that particular python lib. I guess I should stop talking since concepts may be different between both :)
-
nollied[m]
mak_noob[m]: i read that. it literally raises exceptions for all functions
-
nollied[m]
moneromooo: you answered my question very well
-
sech1
Meeting here in 1 hour?
-
selsta
yes
-
MajesticBank
If I am correct Dandellion++ protects node from other nodes on the network from finding tx originating IP
-
nikg83[m]
MajesticBank: Yes
-
MajesticBank
what protects light wallet users from clearnet nodes correlating tx size of mempool and traffic analysis?
-
MajesticBank
or when attacker own both wallet / have access to exchange wallet and have ability to see traffic on that clearnet nodes
-
nikg83[m]
MajesticBank: Light wallets use remote nodes ?
-
MajesticBank
it's specially dangerous when mobile wallet is using only one clearnet node for 10k/20k users
-
MajesticBank
ya, mean mobile wallets
-
nikg83[m]
MajesticBank: Ideally all tx broadcasts should be over tor/i2p by default, maybe someday we will have it
-
MajesticBank
both timing and traffic correlation attack would be very easy to perform
-
nikg83[m]
MajesticBank: Yes if there is a mitm attack on remote nodes ?
-
WinslowEric[m]
nikg83[m]: what could it achieve
-
MajesticBank
There is no need for mitm for nodes hosted in US
-
WinslowEric[m]
By the way, how to set up my public node with TLS support
-
WinslowEric[m]
do I need to bind it to a domain name or somethin
-
moneromooo
Don't use strangers' nodes and then wonder why it's dangerous.
-
nikg83[m]
moneromooo: Using Cake wallet nodes would be dangerous?
-
MajesticBank
moneromooo: It's by default in mobile wallets
-
moneromooo
Are they your nodes ?
-
moneromooo
MajesticBank: are you assuming default settings in software are the secure settings ? If so, it's incorrect in general.
-
nikg83[m]
moneromooo: I can’t run my own node, as I am behind nat
-
WinslowEric[m]
nikg83[m]: use frp
-
nikg83[m]
* > <@moneromooo:libera.chat> Are they your nodes ?
-
nikg83[m]
I can’t run my own remote node, as I am behind nat
-
WinslowEric[m]
that is what i did
-
MajesticBank
moneromooo: No, just addressing average user issue
-
WinslowEric[m]
Run daemon on your machine then use FRP to map it to public
-
WinslowEric[m]
WinslowEric[m]: I built xmr.winslow.cloud with that
-
moneromooo
Most of the time, it's fine. Like when leaving a loaded handgun near your toddler.
-
MajesticBank
Was thinking there is some solution at protocol level that could enforce it, traffic noise or making transaction look same for traffic observer
-
onions
lol, that analogy moneromooo.
-
moneromooo
Well, my usual one: don't use a stranger's node. You wouldn't use a stranger's dildo, would you ?
-
merope
nikg83: you can run a node from behind nat just fine. You won't have any incoming connections, but you will be able to open outgoing ones - and data flows both ways
-
onions
MajesticBank: maybe muse about it over in #monero-research-lab, or #monero-research-lounge? I don't know. Stackexchange, reddit?
-
onions
moneromooo: lol ffs.
-
moneromooo
I'd hope it'd make people pay attention, but it hasn't. Such sad.
-
nikg83[m]
merope: Yes I mean when I am outside and need to use mobile wallet, can’t connect to my node; I might try tor setup and see if it helps
-
moneromooo
If your ISP prevents you from connecting to the connection you pay for, you can always complain and see if that helps.
-
moneromooo
It might not help right away, but the more people do it, the more it helps over time.
-
nikg83[m]
moneromooo: They don’t have public IPs, IPv6 is not common here
-
ErCiccione
Meeting here in 10 minutes
-
moneromooo
Same as monero. Making privacy enabled software might not help right now, but the more exist, the likelier we end up at a critical mass at some point.
-
moneromooo
Like voting. A vote ain't changing much. But if you don't vote...
-
WinslowEric[m]
Yeah ask ISP for public IP address
-
WinslowEric[m]
at least give it a shot
-
moneromooo
You mean, the same IP address is used by many people ?
-
moneromooo
If so, yes, that sucks, I hope you get it cheap at least.
-
WinslowEric[m]
no exclusive one
-
WinslowEric[m]
some might provide you free bouncy address
-
moneromooo
If exclusive, then you should be able to connect to it or your ISP is a steaming pile of asshole.
-
WinslowEric[m]
Some ISP here in China does that
-
nikg83[m]
moneromooo: Yes, a billion ppl here & they can’t provide IPs to everyone 😅
-
WinslowEric[m]
WinslowEric[m]: *Means they sometimes alter but you can monitor it with a script
-
merope
You can get your own ipv6 /64 block for free
-
merope
-
moneromooo
Oh. I think I merged two people's lines thinking they were from one.
-
merope
For example
-
merope
Set it up on your router, and then you will be able to reach your home network via ipv6
-
moneromooo
How can you do that if your ISP does not support IPv6 (which I think was implied by "They don’t have public IPs, IPv6 is not common here") ?
-
merope
Tunneled over ipv4
-
moneromooo
If you can get to your server via ipv4, why do you then need ipv6 ?
-
moneromooo
(I know not much of modern networking, so if I'm being dumb, tell me)
-
merope
Because you can't reach it via ipv4, because it's behind a nat
-
merope
Your router opens an ipv4 connection with the broker, which then routes the ipv6 packets destined for you through that tunnel
-
moneromooo
Ah, if your router does this, then you don't need ipv6 in the first place, no ?
-
moneromooo
ie, it's a reverse proxy.
-
merope
But you need something on the other side for that reverse proxy
-
merope
So either you buy your own server/vps/public ipv4 address, or you get this tunneled ipv6
-
merope
And you get a nice massive /64 ipv6 subnet all for you
-
ErCiccione
Ready for the meeting?
-
ArticMine
Yes
-
rbrunner
Hope so :)
-
merope
Have fun!
-
ErCiccione
let's start
-
ErCiccione
Hello folks! This meeting, like the last one, will be focused on the next network upgrade (hard fork)
-
ErCiccione
-
ErCiccione
-
ErCiccione
Quick round of greetings to see who is here:
-
ErCiccione
Hello everyone!
-
UkoeHB
hi
-
binaryFate
hi
-
ArticMine
hi
-
rbrunner
Hello
-
jberman[m]
:waves:
-
WinslowEric[m]
Greetings!
-
mj-xmr[m]
Present
-
selsta
hi
-
sech1
hi
-
ErCiccione
Ok, thanks for being here. I would say we can explore the status of the PRs that need to be merged and the PRs that would be good to have. After we have an idea of the situation, we can decide if makes sense to set a date.
-
ErCiccione
rbrunner made an excellet summary of the situation the we can use as a guide:
monero-project/meta #680#issuecomment-1079924577
-
ErCiccione
I would also like to dedicate a bit of time to discuss the status of multisig in relation to the hard fork, because in-progress projects like Haveno and RINO need multisig to be robust, before being able to launch.
-
ErCiccione
The situation in general looks good, most PRs have already been reviewed or are ready to be merged. So, that's a good start
-
moneromooo
Oh wow, BP+ still not merged. I did that ages ago now...
-
UkoeHB
8149 needs to rebase onto 8061
-
sech1
view tags not merged as well
-
rbrunner
Maybe a gentle ping for vtnerd, as they are involved in so many important reviews ...
-
ErCiccione
Ok, let's start with the first one i would say, fee changes
-
ErCiccione
that mostly only needs to be merged as far as i can tell
-
jberman[m]
fee changes looked good to me
-
rbrunner
Including the compromise from the last meeting, right?
-
jberman[m]
yep
-
» moneromooo gets itchy at the mention of compromise
-
UkoeHB
I think it can be merged
-
ErCiccione
Good. next one is bulletproof+. What's missing?
-
selsta
I can type that up.
-
moneromooo
Nothing AFAIK.
-
ErCiccione
A final approval i would say
-
UkoeHB
it doesn't have any approvals
-
rbrunner
The final signing off of the the review?
-
UkoeHB
0
-
selsta
We have BP+ audited, so in general it should be good to merge. vtnerd reviewed it a while ago but he never approved it.
-
selsta
I asked him for an approval but he kinda started a new review from scratch, and now he is currently unavailable and it's unclear when he will have time again.
-
UkoeHB
maybe jberman[m] and I can do brief reviews (check hard fork mechanics, glance over crypto use)
-
jberman[m]
can do that
-
rbrunner
The testing on Testnet should also have some value, even if something escaped review
-
ErCiccione
nice. Thanks. We should get word from vtnerd to make sure if we should expect a review from him or not
-
binaryFate
he's currently unavalaible and I'm not sure how quickly we can expect that word
-
ErCiccione
alright. Next PR is to bump ringsize to 16
monero-project/monero #8178
-
rbrunner
Pretty simple code, uncontroversial from that point of view
-
ErCiccione
this one shouldn't require any further discussion and only need to be merged
-
jberman[m]
noticed a couple small merge conflicts with tests, will resolve those asap
-
selsta
It looks approved, maybe moneromooo wants to look quickly over it too because I think you are the most experienced with such ring size bump PRs.
-
moneromooo
Sure.
-
jberman[m]
jberman[m]: (sorry thought this was for view tags)
-
jberman[m]
ty moo
-
ErCiccione
Anything else on #8178? Otherwise we can move to the next one
-
selsta
i'd say move on
-
ErCiccione
-
jberman[m]
noticed a couple small merge conflicts with tests, will resolve those asap :)
-
sech1
I not only reviewed view tags, but also implemented it in p2pool and tested it on a private testnet. All went smooth - p2pool could mine, monero-wallet-cli could see payouts.
-
sech1
so #8061 looks good to me
-
rbrunner
Also testet it. Works.
-
selsta
#8061 looks ready
-
jberman[m]
noice
-
rbrunner
Your chance for eternal fame
-
ErCiccione
Nice. Seems like was reviewed and tested quite extensively. I would say only final approvals are needed after jberman's fixes and then can be merged?
-
selsta
The order in which we should merge things is also something we have to discuss later.
-
selsta
Largest changes first and then the smaller ones I assume.
-
rbrunner
Merging will probably limit itself with generating conflicts
-
jberman[m]
It will have some conflicts with multisig stuff and bp+
-
rbrunner
And RPC versions numbers are another source of conflicts
-
sech1
RPC version is easy to resolve since we're doing a hardfork. Just use some new higher number
-
moneromooo
Seemed like a good idea at the time...
-
jberman[m]
One thing we also mentioned briefly in the last MRL meeting was what the "grace period" should be where tx's with view tags and without are allowed, to allow the pool to clear (ring size bump and bp+ also have this grace period). We settled on 1 day same as in the past from what I remember, so just re-affirming that
-
selsta
IIRC we always had 1 day
-
jberman[m]
cool
-
selsta
#7877 is merged so #8149 next to discuss?
-
ErCiccione
alright. We can go back to this if needed. The next PR in the list is the fixes for multisig:
monero-project/monero #8149
-
UkoeHB
I need to rebase that when BP+ and view tags are in
-
rbrunner
Is the original author of that PR, perfect-daemon, still, well, missing? And does that matter in any way?
-
selsta
it kinda was reviewed by UkoeHB and vtnerd, not only vtnerd
-
ErCiccione
I want to stress the importance of having multisig fixed as soon as possible, so would be good to also have two more PRs merged for the hf:
monero-project/monero #8220 and
monero-project/monero #8220
-
rbrunner
That's two times 8220? :)
-
UkoeHB
8203 is the other one
-
ErCiccione
lol sorry: the other one is
monero-project/monero #8203, yes
-
UkoeHB
I need a third pr to add force updating. So 8220 -> new PR -> 8203 to get everything in
-
rbrunner
Yeah, but 8203 is still very much at the beginning, as far as I can see. And does it harmonize with the added control round?
-
UkoeHB
no, I will need to rebase
-
rbrunner
But not much change in logic or even crypto? I am a bit sceptical about that, time-wise, to be honest
-
rbrunner
Does Haveno intend to take advantage of the improvements that this would bring?
-
UkoeHB
not too much change, at least compared to the original PR
-
ErCiccione
rbrunner: Haveno sponsored a good portion of the changes 🙂
-
ErCiccione
So, at the ends looks like multisig is the PR that needs the most attention
-
ErCiccione
Oh, reminder that RINO set a bounty as well of $10000 for merging all three PRs, so that should be a good incentive for the community
-
binaryFate
Do we lack reviews maybe because the vulnerabilities are not really public? I know some background info has been passed to few people only
-
rbrunner
It's 4 multisig PRs, no?
-
selsta
binaryFate: it's all public in the patch
-
ErCiccione
rbrunner: 1 is already merged
-
UkoeHB
we lack people actually able and willing to review
-
binaryFate
selsta: yes but I mean some context maybe making reviewing easier
-
binaryFate
good if not a blocker
-
rbrunner
I think if we aim to take 8203 in, 8220 should get merged as soon as possible, to make that "interim" PR possible
-
ErCiccione
yeah, we should probably reach to the community asking for reviewers if finding them for those changes is an issue
-
jberman[m]
I can review general patterns and such, but don't think I'm able to do a comprehensive crypto review to spot vulnerabilities yet (I've been studying, but not there yet)
-
selsta
I mean if we need more security then an audit would help, but I'm not sure if we will find another review for it in the community.
-
mj-xmr[m]
Same here as jberman[m] . Even less crypto knowledge sadly.
-
rbrunner
Certainly not with vtnerd unavailable ..
-
selsta
rbrunner: I mean vtnerd reviewed it, unless we are talking about a different patch now
-
ErCiccione
could/can luigi1111 give it a shot?
-
rbrunner
I was thinking about 8220, which has no comprehensive review, but only me testing it and moneromoo looking at the code, but not the crypto, if I understood correctly
-
UkoeHB
8220 doesn't have any crypto changes, just key exchange protocol changes
-
selsta
oh ok, I was still mentally at 8149
-
rbrunner
Yeah, that might be a problem if we think we need a second review
-
rbrunner
I would be confident enough to merge 8220 ...
-
ErCiccione
Ok. Then we need to find somebody able to review that PR, if you know somebody, maybe ping them on the pr to catch their attention
-
selsta
8203 is the one without any review currently
-
UkoeHB
is h4sh3d around? maybe he could take a look at 8220
-
h4sh3d
Hi!
-
UkoeHB
8203 is on hold anyway until I can rebase onto 8220 + 1
-
UkoeHB
hi h4sh3d :) feeling up for more multisig review?
-
UkoeHB
-
rbrunner
Should not hurt too much, and the code runs :)
-
h4sh3d
Yeah sure! Time wise it will not be possible for me in the next 2-3 weeks (family getting bigger ;p) but after that for sure! If that’s not too late for you guys?
-
UkoeHB
would it be possible to postpone multisig stuff to a post-fork point release?
-
rbrunner
Well, looks like timewise, it's on the critical path
-
binaryFate
While it doesn't need to be part of a HF, I'm worried that many people using Monero but not following closely may not have seen the multisig issue announcement. So having the fix in the HF is ensuring everyone will at least use updated version after that
-
rbrunner
That would be my proposal for 8203, frankly. I think postponing all would be unfortunate
-
rbrunner
And the rest is really so close ...
-
ErCiccione
I would really prefer to not postpone it. That could create huge problems for Haveno. Like having to hold off launch
-
binaryFate
Multisig wallets would usually be used for large amounts, I'm concerned some big entity out there will get hit by the vulnerabilities unless we force them to update basically (via fix being in HF)
-
UkoeHB
I just mean release it separate from the hf, not delay review/merging (which is happening at a snails pace anyway).
-
binaryFate
Yes but then you lose this force-to-update effect of the HF
-
rbrunner
Isn't that a contradiction?
-
UkoeHB
well it's up to you guys, not much I can do to speed things up on my end
-
rbrunner
Maybe if we ask nicely moneromooo can look a bit deeper into 8220 and approve, and we merely move 8203 into a point release
-
ArticMine
Why not release multi sig with another HF?
-
WinslowEric[m]
Haveno would be delayed for that
-
onions
Two HFs? Back to back? Seems like a lot of headache...
-
r4v3r23[m]
WinslowEric[m]: fine by me. this is a monero update, not a haveno one
-
ArticMine
What is the timeline fro multi sig review etc?
-
binaryFate
ArticMine: IMO too extreme to abuse the HF concept just for this desirable side effect on multisig wallet code
-
ErCiccione
We need to find reviewers, that's the problem. Pushing to another hf seems eccessive
-
ArticMine
Fair enough but there are problems with a partial implementation of multi sig without a HF
-
selsta
BP+ is not approved yet, then we also have to do changes to Ledger and Trezor for BP+ (which supposedly isn't much work but someone has to look into it), that will also take time. It's not like all other stuff is 100% ready and we are only waiting on multisig.
-
selsta
We will also need time to test everything on testnet.
-
binaryFate
what HF timeline are we talking about?
-
ArticMine
For multi sig
-
rbrunner
Is the loose consensus now that we must have a second review for that heavyweight multisig PR 8149?
-
selsta
8149 had two reviews, I doubt we will get more without an audit.
-
UkoeHB
we will need some kind of review when I rebase
-
rbrunner
Because if not, 8220 is peanuts in comparison, and IMHO 8203 nice to have, but not critical. Haveno may disagree.
-
rbrunner
Ah, yes, UkoeHB reviewed the original one.
-
binaryFate
maybe we can make a clear announcement of what exactly needs more reviews, so that external entities out there can decide to step in to finance/organize an audit?
-
ErCiccione
8203 is not urgent for us iirc
-
rbrunner
So where's the problem? :)
-
ErCiccione
Ok so, we have 5 minutes left so to wrap it up:
-
ErCiccione
we need somebody to approve BP+, which has been already extensively reviewed
-
ArticMine
Do we have a timeline for the HF?
-
UkoeHB
what about getting 8149 into the HF, then 8220 + 1 + 8203 into a point release (if necessary)?
-
sech1
we're not discussing HF date in this meeting?
-
UkoeHB
ErCiccione: jberman[m] and I will look at the BP+ PR (probably within 1-2 weeks)
-
jberman[m]
UkoeHB: +1
-
ErCiccione
sech1: if we feel like we already for it sure, but we don't have much time left
-
UkoeHB
usually dev meetings extend past the hour, I don't mind staying
-
ArticMine
I am ok
-
ErCiccione
shouldn't take long anyway
-
rbrunner
A date would be nice, even as an attempt ...
-
selsta
The problem with timeline / setting a date is difficult when some things are unclear with how long they will take. I'd like to have BP+ merged first and then someone who can look into Ledger / Trezor changes.
-
selsta
Last time we set a date there were a lot of things unreviewed and then the date came it it became pointless because we can't just merge things unreviewed.
-
sech1
2 months should be enough for everything probably
-
sech1
we have a nice date approaching
p2pool.io/tail.html
-
binaryFate
:)
-
r4v3r23[m]
as a community member, holding back on a major monero upgrade that brings BP+ and higher ring sizes for the sake of an external project doesn't look like the way to go, especially if the PRs mentioned arent critical to multisig. projects should build around monero's progress, not the other way around
-
ErCiccione
personally i find myself in the middle. I would like to set a date, because pushes people to wrap things up, but i also don't want to get to a point where we postpone it again
-
UkoeHB
mining software might need to double check that they won't get uint64 overflow when the total supply exceeds uint64::max; iirc moneromooo fixed Monero's implementation a couple years ago
-
selsta
So maybe someone can do an extra overview issue on multisig, with the current status of each PR and what is remaining. rbrunner something like your comment
-
rbrunner
Who are the candidates for Ledger and Trezor changes?
-
selsta
well usually the companies do it themselves
-
selsta
but last time I needed a small change from Ledger they took over a month, so I feel like we will have to do the changes ourselves.
-
ErCiccione
selsta: That would be useful
-
UkoeHB
selsta: I guess I can write that
-
selsta
also Trezor only updates their firmware every couple months, that was an issue the last hardfork
-
rbrunner
Does all not sound too happy then
-
selsta
it always works out somehow :P
-
sech1
"uint64 overflow when the total supply exceeds uint64::max" <- this is still a few years away. Tail emission starts before 2^64
-
ErCiccione
alright, then i would say setting a date it's premature, but we could set a date for another meeting?
-
ErCiccione
1 or two weeks away?
-
UkoeHB
selsta: ah
-
UkoeHB
sech1: ah
-
ArticMine
Give it two weeks and look at setting the HF date then?
-
UkoeHB
how about 2 weeks, monerotopia is this week
-
ErCiccione
sounds good to me
-
rbrunner
Yeah, with 2 weeks there might be a chance to have BP+ fully reviewed until then
-
ErCiccione
yeah and we will ahve the status of multisig more clear
-
ErCiccione
ok then
-
ArticMine
or at least have a good idea on the timeline
-
ErCiccione
thanks everybody for joining. Have a good rest of the day and see you in a couple of weeks
-
ArticMine
Thanks
-
binaryFate
thanks everyone
-
rbrunner
Thanks for the moderation
-
ErCiccione
feel free to keep discussing 🙂
-
mj-xmr[m]
Thanks!
-
dEBRUYNE
With respect to reviewing the multisig PRs, would it be worthwhile to hire an audit firm for that?
-
dEBRUYNE
Would definitely speed up the process
-
dEBRUYNE
And I am certain the community would be willing to contribute to a CCS that raises funds for an audit firm
-
dEBRUYNE
JP Aumasson has done a few audits for Monero (related) code if I recall correctly, we could try to contact him
-
WinslowEric[m]
Agree, I'd like to send some monero for that.
-
dEBRUYNE
cc binaryFate ErCiccione
-
dEBRUYNE
Would potentially be worthwhile to dedicate the RINO bounty to that, but it is of course up to RINO's discretion where to allocate the bounty
-
binaryFate
We could put some communication out there describing scope of work, so that external entities could decide to step in and help
-
binaryFate
Maybe some Kraken grants or something like that, exchanges must hate not having multisig
-
rbrunner
An external audit might take quite some time
-
dEBRUYNE
Think it would be faster than finding 'internal' reviewers to be honest
-
dEBRUYNE
Especially if we actively reach out
-
nahnahnah722828[
Hey debout ne
-
nahnahnah722828[
<dEBRUYNE> "Especially if we actively..." <- Hey debruyne
-
nahnahnah722828[
I have a question
-
-
nahnahnah722828[
Sethforprivacy says that an exchange could connect your monero with your id, via targeted attacks… is there some truth to what he’s saying ?
-
nahnahnah722828[
* Sethforprivacy says that an exchange could connect your monero with your id if you kyc… True or false ?
-
louipc
you can do anything with targetted attacks
-
louipc
has nothing to do with monero in that case
-
louipc
your devices can get cracked, keyloggers installed. not monero's fault
-
nahnahnah722828[
louipc: But if you withdraw monero from coinbase to your own wallet, you can start using it as normal without them being able to see anything ?
-
nahnahnah722828[
He’s suggesting that if you have KYC’d monero you can be tracked…
-
louipc
if you read it again he's saying you will be safe
-
louipc
unless you get targetted