00:50:57 Does a Twitter tipping bot exist for Monero? 02:26:26 Pretty sure cakewallet has a feature where you can put someone's twitter handle as payment, assuming they have their xmr address linked to their bio 02:29:42 Does cakewallet support openalias? I haven’t checked in a while 02:30:23 I know feather does (not mobile obviously) 04:26:31 Yes 07:58:57 Hey, how you doing? 07:59:31 #monero-community-dev 20:30:07 what are the best sms verification sites that accept xmr? 20:30:50 harulenwizard[m]: i used sms-activate.org but it was long time ago 21:20:21 Try JuicySMS.com (accepts Monero) or SMSPVA.com (accepts Bitcoin) 21:21:50 anarkiocrypto[m]: Juicy is currently blocking users on tor browser 21:22:00 juicysms.com/login 21:22:14 its just a never ending loop with cloudflare 21:23:53 Here are some other options: https://kycnot.me/services#SMS 21:23:53 Or you could use Whonix for Tor -> VPN 21:24:52 Onworks.net is a nice tool (generate a virtual machine in your browser with a clean IP). Useful for throwaway accounts or for websites that don't allow you to signup via Tor. 21:25:34 Works with Tor Browser 21:25:59 * Tor Browser (so it is essentially Tor -> VPN) 21:29:34 anarkiocrypto[m]: looks weird. its telling me its a chrome extension 21:29:40 dont think im gonna use that 21:30:12 if i want TOR > VPN connection, all I need to do is download a vpn client in whonix workstation right? i think ill use that instead 21:30:53 Onworks worked for me last month, maybe try this: https://www.onworks.net/os-distributions/ubuntu-based/free-ubuntu-online-version-20 21:31:35 anarkiocrypto[m]: so you just run that in tor browser? 21:33:23 For Tor -> VPN in Whonix Workstation, you can install any VPN client (doesn't matter which VPN, as Tor is hiding your home IP anyway) or use e.g. Firefox with a free VPN add-on (if your goal is simply to bypass a Tor block and you don't need increased security). You may need to disable UDP and IPV6 and possibly make some DNS changes. 21:33:46 anarkiocrypto[m]: make dns changes in the whonix workstation itself? 21:34:18 then maybe ur right, its probably best to just use firefox with a freevpn add on to bypass tor block 21:34:31 Since Tor is hiding my home IP, I don't really care which VPN I connect to. But still be aware that VPNs can log your traffic, even if they only see your Tor exit node. 21:35:08 Bitmask is free (run by Calyx and Riseup) but I didn't try it in Whonix Workstation yet. 21:35:22 anarkiocrypto[m]: unrelated but what is the best way to churn? set up two whonix workstations and send xmr from wallet to wallet? or could this all be done in the same workstation 21:36:23 i personally bypassed the tor block on juicysms.com/login (only the login page is blocked by cloudflare) by using a firefox browser with no addons. somehow just not using the tor browser even if i still had a tor exit node made it work 21:36:23 Here is a good guide and Matrix room: https://matrix.to/#/#anonymity:matrix.anonymousplanet.org https://anonymousplanet.org/guide.html 21:37:22 invite only it seems 21:37:34 "anonymity:matrix.anonymousplanet.org is not accessible at this time. 21:37:34 Try again later, or ask a room or space admin to check if you have access. 21:37:34 M_UNKNOWN was returned while trying to access the room or space. If you think you're seeing this message in error, please submit a bug report." 21:39:08 I have one Whonix Workstation for real life activities (although I use my phone for 99% of real life activities), one for pseudonymous activities (e.g. this username). After receiving Monero, I send it to an intermediate wallet, then to the spending wallet (again separate wallets for real life vs. pseudonymous). I churn between these steps. Keep in mind that the remote node can see your IP address (e.g. Tor exit node) and TXID. So don't 21:39:08 use the same remote node for different wallets. 21:40:18 anarkiocrypto[m]: so I can use two different wallets on the same workstation as long as the use different remote nodes? 21:40:38 im using the monero GUI wallet in advanced mode and it seems like all my wallet accounts all use the same remote node 21:41:01 which made think think it would just be best to use two different workstations and gateways so that my IP address and remote node would be different 21:41:56 If it works in Firefox with a Tor exit node, it could be because privacy.resistFingerprinting is set to false (this doesn't leak your IP, but could make it easier to guess that you are the same person if you login to different accounts in this browser). 21:42:01 You can find privacy.resistFingerprinting in about:config 21:42:29 I use Feather Wallet and you can set a custom node there. 21:42:46 anarkiocrypto[m]: custom node for each different account in feather wallet? 21:43:03 I don't use the accounts feature, but a completely separate wallet/mnemonic per use case. 21:43:12 so how would I churn 21:43:17 with one whonix vm 21:43:26 if i want to churn to seperate wallets completely 21:44:38 If you have enough storage, multiple Whonix Workstations are fine. But I prefer to only boot one Workstation at a time (if I need to switch, I shut down the current Gateway and Workstation, and boot up the other one). 21:46:58 anarkiocrypto[m]: okay yeah. so if someone's specs allow for it, then they should use multiple whonix workstations and churn betwen different wallets correct? 21:47:27 Open the first wallet in Feather, select a remote node, sync, then send your balance to yourself (you can also churn separate inputs in the Coins tab). Don't churn as soon as funds unlock. Personally I like to wait a few hours or even days. After you have churned some times and are ready to send to your second wallet, close your first wallet. Open your second wallet, select a different remote node and copy the address. Then open your 21:47:27 first wallet and send the funds to your second wallet. 21:47:40 i assume that churning between accounts in the same wallet does nothing since its all under the same wallet right 21:48:28 AFAIK you can change the exit node by entering a command in Whonix Workstation (newnym or similar) or rebooting Whonix. Otherwise exit nodes change automatically every 10~ minutes. 21:50:25 On the blockchain, it isn't possible to determine if you are sending to your own address/a different account/a different wallet/a different person/etc. But if your mnemonic was stolen or compromised, they could see that you were sending funds to yourself (compared to 2 separate mnemonics – if one mnemonic was compromised, the trail ends when you sent funds to your second wallet). 21:51:52 s/Workstation/Gateway/ 21:51:53 anarkiocrypto[m]: i see. i didnt realize it wasnt possible to determine whether or not something is an address or a different wallet altogether 21:53:11 do you know what the safest way to convert to btc is? My use case calls for me to convert my monero to btc at times in order to cash out or buy giftcards from certain sites that dont accept monero. in these cases, do you know how i can try to eliminate my risk of getting dirty btc? 21:53:56 are there certain exchanges that are known to give dirty btc and therefore should be avoided? or there certain exchanges with good rep that wouldnt give dirty btc? I dont want to turn my monero into worthless tainted coin 21:55:37 xmrchain.net shows you what an external observer can see (not a lot of info, if someone wanted to track funds, they would need to compromise the original sender and final recipient, e.g. get data from your employer + a crypto ATM or a LocalMonero trader + a DNM). If you churn it creates "noise" or distance and it gets exponentially more difficult to track which input is yours. From 1/16 to 1/256 to 1/4096 etc. 21:56:43 FixedFloat sends clean Bitcoin from an exchange (AFAIK). Avoid exchanges that send other users funds to you (like a mixer). Trocador.app may be able to help. 21:58:32 Maybe this could help: https://medium.com/oxt-research/understanding-bitcoin-privacy-with-oxt-part-1-4-8177a40a5923 21:59:28 Also https://oxt.me/ and https://kycp.org/#/