-
m-relay<sgp_:monero.social> rando: do you have a summary overview for lionlink? I've been mostly out of the loop for that. I can pitch the story as an idea to the privacy guides journalists
-
plowsof
-
m-relay<ofrnxmr:xmr.mx> b10c.me/observations/05-inbound-connection-flooder-down
-
m-relay<basses:matrix.org> cool thanks, the links shared by plowsof and ofrnxmr should suffice.
-
m-relay<sgp_:monero.social> Alternatively, one or several of you want to take a stab at a research piece to be published there, I could help coordinate that. The cryptocurrency expertise at privacy guides is relatively light, so they may appreciate a starting off point. lmk if any of you want to attempt that
-
m-relay<ofrnxmr:xmr.mx> sgp_ those nodes were also in the chainalysis video (not mentioned)
-
m-relay<ofrnxmr:xmr.mx> Their purpose or impact isnt known. This was, iirc, the first sighting of them b10c.me/observations/05-inbound-connection-flooder-down
-
m-relay<ofrnxmr:xmr.mx> they monitor bitcoin traffic, so its not to defeat dandelion. Ive noticed them for years as they were always present on a new node sync, and used ports like 18380 18480 18580 etc
-
m-relay<ofrnxmr:xmr.mx> Probably more like dragnet surveillance. Collecting data on tor, i2p, bitcoin, and monero, to one day come back and try to decipher
-
m-relay<ofrnxmr:xmr.mx> one of our old sponsors, forked.net, leases them their IPs
-
m-relay<ofrnxmr:xmr.mx> iirc they dont make outgoing connections, so i dont know how they determine who has incoming connections enabled (if they were trying to defeat dandelion)
-
m-relay<ofrnxmr:xmr.mx> All seems rather passive to me, especially since its been running for like 7yrs