01:32:35 that's great! could you install rustdesk and give me your access code? i'm just a friendly TERRORISM PREVENTER™ who wants to make sure you're not doing anything wrong 😊 03:10:17 https://matrix.monero.social/_matrix/media/v1/download/monero.social/kEwBrUIAwWtBMMxwOEAHTfoC 03:10:18 Lets gooo babyyyy 03:15:33 Any tips for a new graphene user? 03:16:09 Also are there any cloud storage services (trying to back up my images) that accept monero? 03:22:10 Idea: create “banbanmonero.com”, which advocates for banning banmonero from existing, because “being a terrible straw man for your own cause is a surefire way to let le criminals win” 03:22:27 (That url shouldn’t be clicked currently) 03:24:02 Assuming banmonero isn’t a troll, which it could be, but idk, parts of it seem a bit too real 03:42:00 it's got a "disposal" address, lol 03:44:17 image.png 03:44:24 Waiting for the cease and desist letter any time now. Lol. 03:46:50 <3​21bob321:monero.social> Emailed to hardware⊙go? 04:09:12 https://xcancel.com/rottenwheel1/status/1831903530187424235 04:59:52 Rucknium: looks like the fee issue you identified in Exodus ended up having an impact for a real world investigation 05:02:10 It was so bad for Exodus that you can see their tracing tool can identify Exodus wallet transactions from everything else without additional info lol 05:17:43 Did exodus fix it ? 05:39:21 https://old.reddittorjg6rue252oqsxryoxengawnmo46qy4kyii5wtqnwfj4ooad.onion/r/Monero/comments/176e1zr/privacy_advisory_exodus_desktop_users_update_to/ 05:56:03 someone spamming blockchain with 30/2 05:56:56 What does that mean? 06:04:12 it's satire 06:04:45 it's basically like the "I want to do something illegal... in minecraft" thing 06:05:37 I ran the biggest Minecraft server in the world in 2012 06:06:06 It was only the biggest for 2 years 😂 06:07:59 https://p2pool.io/explorer/txpool scroll that page and notice 20kb txs 06:18:53 hey guys sorry to bother you but is the monero blockchain down? My funds have been unspendable for an hour or two so far; it usually takes only 20 minutes of course 06:19:23 I reinstalled GUI wallet and restored from seed but my funds are still stuck 06:21:09 its strange because i see new blocks being created 06:22:41 is your txid visible on any monero blockchain explorer? 06:22:42 recommended: https://p2pool.io/explorer 06:22:43 Mempool is full at the moment 06:22:44 Blockchain down would be a great title for a blockbuster 06:23:20 I see so that means I should just wait until tommorrow morning I guess 06:23:22 So your transaction doesn't have high enough fee to be mined quickly 06:23:45 No, it will probably take max a few hours to clear the mempool 06:23:53 Ah I see 06:24:02 its not usually like this right? because it hasnt happened before 06:24:34 at least for the past month or two that ive been using Monero 06:24:51 Last time it happened was in March 06:24:57 https://bitinfocharts.com/comparison/monero-transactions.html#3y 06:25:31 I see wow thats a massive spike lol 06:25:46 but i dont see one for today interesting 06:28:17 Today is much smaller scale and it will register on that chart after 24 hours 06:28:24 Ah I see 06:28:58 I was wondering if I did something stupid with my wallet haha; thanks a lot for the help 06:47:30 wow reddit is such a shithole now 06:47:33 https://imgur.com/a/KwvkKMr 06:51:29 now? where you been for the past 5 years? 06:51:48 true 06:51:55 btw I didn't get any notification of why it was removed 06:52:59 did u have a link there? all I remember was a best practices sort of thing 06:53:10 is this spam or just some exchange consolidation? 06:53:57 https://matrix.monero.social/_matrix/media/v1/download/monero.social/emuCxoEssNiPglUzOaFuwLcF 06:54:33 I edited with a couple new links to the Chainalysis video 06:54:43 and it got removed 06:55:42 got it. wow they’re going all out 06:56:58 btw lol https://monero.town/post/4220893 06:57:29 btw lol https://monero.town/post/4220893 https://nyxmr.top/archive/videos/crypto/chainalysis_XMR.mp4 06:59:36 I deleted my first Reddit account out of dissatisfaction, then tried to register another one and it got shadowbanned for pretty much no reason (the comments were very innocent, I blame the custom email domain) 07:01:18 so chainalysis tries to deanonymize monero users, by running monero nodes, to get their ip addresses is what i understood 07:01:21 me mention 07:01:56 waiting on the C&D from chainalysis in my inbox 07:02:16 cookies and donuts 07:02:29 Changenow and Fixedfloat also seem to be the FBI honeypots 07:02:42 and they share users' data with Chainalysis (IP, transaction amounts) 07:03:03 Good thing my threat model is low) 07:03:08 oh yeah any Centralised exchange that forces you to KYC IS a honeypot 07:03:10 and probably their wallet data too (to help eliminate decoys from transactions) 07:03:43 Even with my threat model, I would never KYC on an exchange. Having to do it in places like the bank or the mobile carrier is enough already. 07:03:54 https://matrix.monero.social/_matrix/media/v1/download/nyxmr.top/gtdaEdeRtweGutwlfaaLOgXI 07:03:58 At least just because this shit is leaky. 07:04:13 more likely just that the feds asked "hey what are your node IPs" 07:04:19 at least imo 07:04:52 Where is the table screenshot from? That video? 07:05:22 yeah 07:06:32 is all of chainalysis just an ugly excel sheet 07:06:40 seems that way lmao 07:06:45 even their internal tooling looks like excel 07:07:07 https://matrix.monero.social/_matrix/media/v1/download/nyxmr.top/xnxVfxtIcExAvHYHlFDVMMeS 07:08:01 Not like in Hollywood hacker movies, I'm disappointed 07:08:15 is this just their xmr tooling and the other stuff looks nicer? 07:08:23 internal tooling doesn't even have proxy/vpn detection 07:08:24 they have to outsource that to ipqualityscore 😂 07:08:39 Why would you want nice looking things 07:08:51 to sell 07:08:54 not sure, I don't have internal access 07:09:18 They sell the data, not the data presentation 07:09:22 you also get this guy in the corner near the end of the video 07:09:24 https://matrix.monero.social/_matrix/media/v1/download/nyxmr.top/BGQGaGCyQBUNpoikntrcoYSX 07:10:22 i thought they sold access to their platform 07:10:27 i thought it would be more like arkham 07:10:57 I Don't Know actually. But it's my guess 07:11:16 you know, smart, nice lines connecting wallets, etc. not a guy taking IPs from an excel sheet and googling "is this ip a vpn" 07:12:05 i bet they made this entire thing only to claim they can trace monero & get the bounty 07:12:29 and sometimes someone manually does all of this stuff for big cases 07:12:52 but most of the time they just prey on IP data 07:12:53 image.png 07:13:08 They can't do that obviously, monero's quite good 07:13:19 and most of their LE requests end in an email going "We couldnt find anything" 07:13:23 most they can do is prey on bad opsec 07:13:48 connecting node usage and deducing decoys 07:14:07 which means running your own node renders their methods unusable 07:14:24 and FCMP++ will fully break it 07:14:41 I don't know if this could be parallel construction, but all the times I saw "Tor or Monero user revealed", there is a very plausible OPSEC mistake... 07:15:20 well not always 07:15:24 not always but more often than not 07:15:33 bad opsec is the worst enemy of privacy tooling 07:15:38 there was also that time the feds exploited tor browser and installed backdoors 07:16:05 just look at what happened to incognito market 07:16:18 i think you had to go on a compromised site for that 07:16:51 oh yeah and fedbois love setting up honeypots after getting control of a service 07:16:58 just gathering evidence before the full seizure 07:17:04 monerobull, were there cases when the exploit was Javascript-less btw? 07:17:15 Seems like those would be more expensive... 07:18:00 look up "fbi running half the darknet child porn sites" or something along those lines 07:18:07 from what I can tell all we know is it was a zero day 07:18:11 Incognito? Did see the story but not caught up yet (still). Was he caught because of the transparent crypto transactions or something? I don't remember seeing his main mistakes... 07:18:30 pharao was a moron 07:18:32 monerobull, no thanks, I am out of brain bleach. 07:18:38 he made many mistakes 07:19:14 I wonder if some of the people whom he tried to extort snitched on him lol 07:19:15 like, googling, with his personal google account "what to do when server is down" live while the fbi was copying it 07:19:18 ah 07:19:42 no he was essentially caught 2 years before the arrest 07:19:49 the big mistake pharaoh did was to exchange BTC for something else on a KYC exchange 07:20:28 also exchanging btc through a swapper with bad policy and then complaining on dread "they took my btc D:" 07:20:36 classified even 07:21:00 i replied to a reddit post of him ones lol 07:21:10 nihilist, ah! Yeah, I remember it now. He also spent it on something stupid. 07:22:11 ok I think I found something 07:22:14 seems to have been js 07:22:47 when you have tainted BTCs by default and you go and KYC yourself somewhere using that same wallet, "well shit i should've used monero!" 07:23:02 well to be fair he did use monero 07:23:07 just poorly 07:23:40 iirc the swapping service he used to go from btc -> xmr was kyc and that's how he was caught 07:23:44 https://matrix.monero.social/_matrix/media/v1/download/matrix.org/QNngxDQLFNWPsMSQhZQdLftV 07:24:14 no he wasnt THAT stupid 07:24:28 yeah been a while since I watched it 07:24:48 but he did send btc from DNM wallet to swapper and then directly to kyc exchange 07:24:54 that's worse 07:25:29 HMMMM i wonder who could have made this 1.3 BTC worth of XMR deposit after 1.3 BTC went from the DNM wallet to an instant swapper 07:25:43 yes very good question 07:25:46 maybe it was joe 07:25:48 with only ~20 minutes delay 07:26:00 it was probably joe 07:26:16 "which means running your own node renders their methods unusable" <- also not forgetting to churn your inputs (they can detect consolidation transactions) 07:26:17 yea just watch the volumes coming in and out, preety easy to know who did it 07:26:42 well with FCMP++ their methods will be rendered void anyways 07:27:00 Why tf would you use a KYC SWAPPER of all things. At least buying crypto for fiat is semi-understandable, but swappers are so common KYCless! 07:27:02 WHY 07:27:23 The method of IP farming, waiting for a dummy to submit a transaction to them over clearnet won't be, though 07:30:03 this might be a silly question but what if we made wallet in simple mode behave like node 07:30:35 ok no thats very stupid 07:31:06 youd need to connect to multiple nodes and they could probably easily tell you are sending data slower than the other nodes 08:11:18 monerobull that might be a "light node" https://github.com/monero-project/research-lab/issues/69 08:23:19 i also have a potentially stupid question, as monero takes time to verify all the transactions at first, what if there was an optional way to "trust" the node's verifications to speed that up 08:24:02 we have a trusted node setting already 08:24:13 nah i mean, even with that it takes hours to sync up 08:24:15 but youre not verifying blocks in your wallet 08:24:34 nah i mean, even with that it takes hours to sync up initially 08:24:43 you are checking if you have any transactions 08:25:21 like this? https://www.getmonero.org/downloads/#blockchain 08:25:41 you cant just trust random nodes 08:25:59 they could literally re-write history 08:28:19 let me re-phrase it: so you install monero for the first time, and you choose a trusted remote node. initially it takes hours to sync up right 08:28:30 let me re-phrase it: so you install monero for the first time, and you choose a trusted remote node. initially it takes hours to sync up anyway right 08:28:48 <3​21bob321:monero.social> trust me i have lollies 🤫 08:29:20 let me re-phrase it: so you install monero for the first time, and you choose a trusted remote node. initially it takes hours to sync up anyway right, trying to brainstorm on what could speed it up 08:29:26 yes but you can skip verifications via https://www.getmonero.org/downloads/#blockchain 08:30:08 we really dont want the default to be "rely on trusted nodes not being compromised" 08:30:43 the network could slowly be infiltrated and "rot" away 08:31:10 especially not in the name of making initial sync a bit faster 09:04:07 e> let me re-phrase it: so you install monero for the first time, and you choose a trusted remote node. initially it takes hours to sync up right 09:04:17 Wrong 09:05:38 When you use monero for the first time, and using a trusted remote node, your wallet starts at the chain near the chain tip 09:05:57 At or aroun the chain tip 09:06:04 Syncing takes seconds 09:06:25 they are talking about spinning up a new node+ 09:06:26 they are talking about spinning up a new node 09:32:31 lets turn this into comments and reviews on https://github.com/monero-project/monero-site/pull/2241 09:33:32 https://www.themoneromoon.com/p/the-monero-moon-issue-74 09:49:50 I've got a shitload of those, with the exact same wording, every 2-3 days, to different aliases. They never contained any actual information, only treats of exposing all the illegal activities I've supposedly engaged in. Total bullshit. 09:57:36 yea makes sense 11:07:34 doubt there are any competent services that accept Monero. You can start selfhosting and paying for Stortage VPS in Monero. 11:08:25 enable duress pin, to wipe device when entering specific PIN 11:08:46 تطبيقات خصوصية و امان للأندرويد: 11:08:46 InviZible Pro / Orbot 11:08:48 Brave 11:08:50 Obtainium 11:08:52 F-Droid 11:08:54 SimpleX Chat 11:08:56 NewPipe / Libretube 11:08:58 RiMusic 11:09:00 Aegis Authenticator 11:09:02 KeepassDX 11:09:04 OpenKeychain 11:09:06 <3​21bob321:monero.social> Dont get banned by daniel 11:09:17 InviZible Pro / Orbot 11:09:18 Brave 11:09:20 Obtainium 11:09:22 F-Droid 11:09:24 SimpleX Chat 11:09:26 NewPipe / Libretube 11:09:28 RiMusic 11:09:30 Aegis Authenticator 11:09:32 KeepassDX 11:09:34 OpenKeychain 11:09:36 Breezy Weather 11:10:07 forwarded 11:12:18 You forgot gmail 11:13:51 can use Droidfy (Modern F-droid client) 11:13:52 just stalk people on twitter posting their grapheneos setup etc and choose the one you need 11:22:21 email not secure way for communication and PGP sucks, use protonmail and an alias like simplelogin to prevent spam when signing up to services 11:29:38 nah, people think cartel or whatever are competent in tech, they are not. 11:30:15 they kidnap CS students to do basic tech stuff, don't expect that level of "doxxing" or "hacking" 11:43:15 ProtonVPN is also a really solid way to connect to the havneo app, it does it better than Orbot if you use one of their tor nodes, paid tho 11:44:23 For VPNs: Mullvad, IVPN, ProtonVPN 11:44:29 I think the worst was InviZible, so flakey couldn’t get it to keep a reliable connection, perhaps I didn’t configure well 12:00:02 if only proton worked for me here 12:02:34 Stealth protocol don't work? (Wireguard over TLS) 12:02:39 if you want extreme privacy/Nation state target, never insert a SIM card and always use Airplane mode. For the initial setup of device, do it away from your home becuase there will be some identifiers sent to cell tower 12:02:52 oh maybe you're on liux 12:06:11 I think the way forward is more stealthy shit anyway. 12:07:43 all of these offer obfuscation if your country/place uses DPI 12:08:53 <3​21bob321:monero.social> Hide in bunker with rpi5 12:09:19 Maybe those were just the servers (at least the free tier) IPs being banned. 12:09:57 Also I find the wall above hilarious because it went over things we already know unprompted, and lasted a bit. I thought that was a spammer) 12:24:20 User error! 12:43:03 isn't invizible just Tor? 12:43:06 isn't invizible just Tor/I2P? 12:43:26 you'd probably have a better experience using either of their respective purpose built apps 12:44:53 like [orbot](https://guardianproject.info/apps/org.torproject.android/) or [purple i2pd](https://github.com/PurpleI2P/i2pd-android) 12:51:26 anti forensics, and enable auto-reboot and decrease the timer depending on your situation (default 18h) 12:52:15 just use 1 app, invizible supports stream isolation unlike Orbot 12:53:07 image.png 12:53:25 doesn't it? 12:55:50 nope, https://github.com/guardianproject/orbot/issues/71 12:55:55 see https://github.com/Gedsh/InviZible/commit/0f09df27499075c0bfe7cef67850bcd19936a526 12:56:31 Perhaps, 12:58:01 I think Google won’t allow this 12:58:34 ? 12:58:58 Software restrictions implied to save battery life 12:59:32 I have tested having 1 isolate running for about 6 hours and then it closes 12:59:44 they have their own fdroid repo https://guardianproject.info/fdroid so they dont give a f about Google if they ever implement this feature 12:59:48 It also depends on the phone 13:02:18 Fdroid might not impose those same limitations, if say you’re using graphene or something, but I’ve had a pain keeping stuff running, even orbot doesn’t stay running for me for say longer than 6 hours, but you can trigger it to start periodically with a back workmanager fetch. That all being said, it could just be hardware presets. 13:04:24 Using intents can help keep it running, local notifications. But I imagine several isolates would be hell to manage 😂 if I’m wrong please tell me I’ve spent days on this and very interested in this topic 13:15:07 The Dark Renaissance Man w/ Amir Taaki (MT 322) 13:15:08 TODAY'S 🎙SHOW: Douglas Tuman interviews Amir Taaki, an early Bitcoin developer and cypherpunk. 13:15:10 Amir shares his insights on the importance of privacy and anonymity in cryptocurrency, the need for decentralization, and the potential of crypto to challenge existing 13:15:12 power structures. 13:15:14 He also talks about his project DarkFi, which aims to create anonymous and uncensorable applications. The conversation touches on historical and philosophical 13:15:16 perspectives, drawing parallels between the crypto movement and scientific revolutions of the past. 13:15:18 Watch Here (YouTube)➡️ https://youtube.com/live/0oqLG8UnZbc 13:15:20 Watch Here (Odysee) ➡️ https://odysee.com/@MoneroTalk:8/amir-taaki-the-dark-renaissance-man-epi:3 13:15:22 Listen Here 🎧:https://www.monerotalk.live/monerotalk-322 13:15:24 Coffee & Monero, Go to Gratuitas.org today! 13:15:26 {Buy your MoneroTopia 24 Mexico City Confer tickets TODAY at MoneroTopia.com! } 13:18:50 The Dark Renaissance Man w/ Amir Taaki (MT 322) 13:18:50 TODAY'S 🎙SHOW: Douglas Tuman interviews Amir Taaki, an early Bitcoin developer and cypherpunk. 13:18:52 Amir shares his insights on the importance of privacy and anonymity in cryptocurrency, the need for decentralization, and the potential of crypto to challenge existing 13:18:54 power structures. 13:18:56 He also talks about his project DarkFi, which aims to create anonymous and uncensorable applications. The conversation touches on historical and philosophical 13:18:58 perspectives, drawing parallels between the crypto movement and scientific revolutions of the past. 13:19:00 Watch Here (YouTube)➡️ https://youtube.com/live/0oqLG8UnZbc 13:19:02 Watch Here (Odysee) ➡️ https://odysee.com/@MoneroTalk:8/amir-taaki-the-dark-renaissance-man-epi:3 13:19:04 Listen Here 🎧:https://www.monerotalk.live/monerotalk-322 13:19:06 Coffee & Monero, Go to Gratuitas.org today! 13:19:08 {Buy your MoneroTopia 24 Mexico City Confer tickets TODAY at MoneroTopia.com! } 13:21:10 I run inviz 24/7 13:22:38 - Settings > fast > route all traffic through tor = disable 13:22:38 - settings > fast > select applications = haveno 13:22:40 - settings > dnscrypt > force tcp = off 13:30:13 So it just routes onion traffic through tor? 13:31:04 if routes onion traffic to tor, i2p traffic fo i2p, encrypts dns, and routes all traffic from selected apps to tor 13:31:09 I’ve actually implemented a way for the app to not use a third party VPN wrapper but it’s leaky so wanted to avoid it 13:32:13 Via VPN routing rules? 13:32:45 That’s pretty unique they got I2P working 13:33:01 Is it faster or slower than Tor do you know? 13:33:47 Yea 13:33:59 Via dns rules 13:34:15 The app manages dns, tor and i2p 13:34:54 When it sees onion or i2p requests, it fwds them to the appropriate interface/proxy 13:36:31 I2p? Slower 13:37:14 I will try using it again, my physical device just refused to stay connected to it, I’m unsure if that’s because it’s not designed for long lived HTTP/2 connections 13:37:15 But more reliable, i find 13:37:29 The contrary.. 13:38:02 If o connect to ssh locally, the connection dies eventually. 13:38:02 my onion ssh stays alive tho 13:38:22 If I run a HTTP/2 connection in an isolate on Android and keep it open with Tor however, it does stay pretty stable. 13:38:29 Locally / over lan 13:39:14 I think the number of requests on the channel is what’s messing it up, so I put a cooldown, fetch timer and a cache and that improved things quite a bit. 13:40:46 If open a channel stream, and only send 1 client request synchronously it behaves. Its seems when you try to multiplex it it shits and the VPN restarts 13:43:48 Ive never had any service cause my vpn/inviz to restart 13:44:14 is there actual "proxy" support now? (able to enter 127.0.0.1:9050) 13:45:20 Yeah but it’s leaky 13:45:39 Tbh I am going to get a new Android phone for development 13:46:17 hm. I want to install in work profile but want to run 2 invizibles 13:46:31 I got a Samsung A50 it might just be too shit if of a phone 13:47:02 I’ll probably get a Google pixel 8 and then install graphene :O 13:51:05 What OS do you run? I keep hearing this work profile concept 13:51:55 hello everyone 13:56:05 kewbit: work profiles are an android concept 14:06:50 Android 14:07:16 Download the app "shelter" from fdroid 14:19:42 An alternative is Insular, a free fork of Island 14:27:29 Here's a comparison of the two: https://secure-system.gitlab.io/Insular/faq.html 14:29:41 grapheneos? 14:33:19 Good explanation https://www.privacyguides.org/en/os/android-overview/#user-profiles 14:35:58 >Shelter is recommended over Insular and Island as it supports contact search blocking. 14:41:09 https://yewtu.be/watch?v=20C0FD7mGDY 14:41:54 explains the differences etc 14:55:36 On 1 device, yea 17:13:57 https://matrix.monero.social/_matrix/media/v1/download/monero.social/RhhsqtWnqgcZgzPojPZwfgKB 17:14:12 Monero users. It's time to redeem your sins 17:14:29 Seed it 17:14:31 Let is spread 17:18:13 https://monero.town/post/4220893 17:18:15 im watching it in full right now lol 17:18:25 its a preety interesting watch 17:18:57 yknow what, i'd LOVE to see luke parker comment on that video 17:19:21 yknow what, i'd LOVE to see luke (kayaba) comment on that video, to get his point of view 17:39:22 sneed and feed 17:51:31 Somebody ban @blaxdm0 please. This drivel is not needed here. 18:16:42 why is cpu mining not profitable anymore 18:21:07 botnet + market fluctuations 18:21:22 there are other factors, of course... but these 2 are major contributors imo 18:29:32 was it ever profitable? 18:30:09 just buy a cluster of Antminer x5's 18:30:09 i dont think 18:30:21 also i dont know its worth to buy miners 18:30:31 because theyre expensive 18:30:38 likely more expensive than my PC 18:31:49 it's not 18:32:00 roi would be well over 1000 days for an antminer x5 18:32:26 and even then you're only making about $5 per day per antminer 18:32:31 well 18:32:33 $2-$5 18:32:43 depends how much your electricity costs really 18:33:16 it's 1.35kW 18:33:27 at 212 KH/s 18:34:20 and from what I can tell it's just a custom server board with a bunch of CPUs on it 18:36:51 yeah 18:36:52 https://youtu.be/RkWGbkJjXa8 18:37:12 it's just 6 CPUs 18:37:27 woah that was weird 18:42:45 also they're RISC-V CPUs which is interesting 18:42:51 never seen RISC-V in a consumer board before 18:44:33 happy to see that tbh 18:44:38 for sure 18:44:42 open source architecture 18:44:59 well 18:45:12 open ISA but close enough 18:47:02 yeah, Nvidia was going to buy ARM LTD , glad that we have real Competitive hardware market at least for now 18:47:13 yeah, Nvidia was going to buy ARM LTD , glad that we have a real Competitive hardware market at least for now 18:47:38 well,relatively 18:47:42 well, relatively 18:47:48 the competitive hardware market be like: 18:47:50 https://matrix.monero.social/_matrix/media/v1/download/monero.social/EbDnIaCBRzCtyMeuBBzeGeyH 18:48:58 well with some of the big tech companies like meta shifting away from Nvidia and for server and AI hardware(specially NPU's) is a good start 18:49:54 the real turn over was when risc-v foundation relocated to Switzerland from the US 18:49:54 which made them capable of holding a summit in china and even russia 18:56:48 you're probably right 18:56:56 i just saw an opportunity to post spongebob 19:24:21 hi squidward 19:31:15 if there were more laptops with amd gpus and i didn't need cuda i wouldn't have an nvidia card 19:31:32 the drivers... they're not as bad as they used to be but damn are they annoying 19:31:57 debian sid recently got the open drivers (cuda still closed though) and so far they're not too bad 19:32:20 Hot take: everything but OISC ISAs are bloated 19:32:32 though that's on a 4070, can't speak for older chip users 19:36:39 Hot take: No one know what OISC is 19:37:39 One-instruction set computer 19:38:51 is that a reference to the `mov` instruction? 19:39:29 That’s one type but yeah basically 19:39:53 https://en.m.wikipedia.org/wiki/One-instruction_set_computer 19:41:26 thats interesting 19:41:31 thx for sharing 19:43:01 :) 20:05:10 Which vps would u recommend? 20:05:54 Also is it possible to run a pruned node in a graphene phone 20:07:28 Kyun.host is cheap and reliable hosting that is fully anonymous and use XMR as its primary payment method. Full discloure: I know the owner 20:07:49 depends on the phone model. If you have 128GB of storage then yes it is possible 20:31:46 I've also heard good things about servers.guru 20:31:57 (who also sell dedis) 20:33:05 same, never tried it but heard good things 20:35:22 I've never tried either 20:46:01 I have tried kyun, still have a server but, it gets ddosed 20:58:35 only romanian side 20:58:54 ddos has stopped recently thx to the hard work of Calin from IHostArt 21:10:45 That chainanalysis guy has to be Rucknium right 21:15:58 Or I've mistaken 21:16:22 rucknium blushed 21:16:31 bien joué ammortel 21:17:05 You can tell because I...I mean he...spent the first five minutes praising Monero's devs and researchers 😁 21:18:30 Can't compare voice signatures since I used a voice proxy for my MoneroTalk interview on Wednesday 😛 21:19:02 That is exactly what i thought. And I watched your Interview on Youtube hat I Really liked and I thought that youre both doing stats and stuff 21:19:05 oh so you really talked with a voice changer at monero talk? link? 21:19:47 I hired someone to read aloud my text chat 21:20:32 lmao 21:22:04 Does this link work? https://yewtu.be/watch?v=fXoiYmrXYJc 21:23:26 It works thx 21:25:53 it could be a lot better if you had the questions before the talk + pre written answers for them 21:26:08 with some extra on point questions to make it more interactive 21:26:33 Yeah I anticipated some of the questions, but not all. So I was slower to respond on those. 21:27:19 A real journalist doesn't give their interviewees questions before the interview :) 21:27:29 so you hired someone to talk in your place 21:27:30 what will you do if they catch that someone instead of you 21:27:43 I didn't specifically ask for questions before, though 21:27:45 so you did hire someone to talk in your place 21:27:46 what will you do if they catch that someone instead of you 21:27:51 I paid them in XMR :D 21:28:25 When did this video first leak? https://x.com/monerobull/status/1831756685968548168 21:28:33 Just saw it, fascinating 21:28:36 its cool and all but that kid doesnt know that his life is tied to whatever you do in the future 21:29:18 because he is a guy who represented you in some point... 21:29:55 not nitpicking but kinda risky move, well, he is getting paid after all 21:30:14 because he is the guy who represented you in some point... 21:34:22 someone posted clips from the vid, it was a free course on their website 21:34:56 cool researcher 21:36:25 Oh I thought somebody leaked it. 21:37:32 Someone should start doing it! 21:38:03 if they want everyone to have financial privacy 21:38:36 Well the full video is available 21:38:52 At least the part where they show how to trace the tx 21:40:13 The full video is about 40 minutes AFAIK. 21:40:48 https://lemmy.cafe/post/7732306 21:41:37 yes, but it wasn't a leak, they for some stupid reason uploaded the video on their platform since 2023, but the content of the vid is from 2020 21:42:24 The start of the video has this title slide: 21:42:26 so we are 4 years away from their current tracing methods, but we might actually be 1 year off because they uploaded it in 2023 21:42:52 > Monero (XMR) 21:42:52 > IRS Office Hours 21:42:54 > August 29, 2023 21:43:50 Their case study was from 2021. I am still not sure if their case study was a real case or a hypothetical one. The presenter starts with "Let's introduce our, sort of, simulation" 21:44:07 so yeah, looks like we are 1 year off probably nothing changed yet, but probably will in the future. 21:44:30 But near the end of the case study, he was talking like it was a real case. 21:44:38 (their tracing/investigation methods) 21:45:14 yes, said they were investigating the colombia guy 21:46:43 I worked on the fee non-uniformity problems last year 21:47:21 https://github.com/Rucknium/misc-research/tree/main/Monero-Nonstandard-Fees 21:48:52 https://www.reddit.com/r/Monero/comments/176e1zr/privacy_advisory_exodus_desktop_users_update_to/ 21:48:55 From watching the full video it seems like using your own node solves most problems here. 21:49:09 And churning maybe. 21:51:22 The GUI wallet prunes nodes by default now (since the new August release) so that it's easier for noobs to run nodes on their own machines. I suggested that after I evaluated the safety of every node on the network being pruned (It's very safe). 21:52:51 Appendix B (page 15) here: https://github.com/Rucknium/misc-research/blob/main/Monero-Black-Marble-Flood/pdf/monero-black-marble-optimal-fee-ring-size.pdf 21:53:04 just check if that colombian darknet guy is real or not, if its then we can assume that its not hypothetical situation imo 21:53:42 just check if that colombian darknet guy is real or not, if it is then we can assume that its not hypothetical situation imo 21:53:54 just check if that colombian darknet guy is real or not, if it is then we can assume that its not an hypothetical situation imo 21:53:55 And Monero might implement Clover, an alternative to Dandelion++ that protects the privacy of users with closed router/firewall ports better. 21:54:03 just check if that colombian darknet guy is real or not, if it is then we can assume that its not a hypothetical situation imo 21:54:42 till then, which nodes we should use or verified/not compromised 21:54:44 the excel spread sheet contains transactions info from the darknet 21:55:08 the one you run 21:55:09 till then, which nodes we should use or verified/not compromised? 21:55:15 "When the number of nodes is 681, the probability of not having all 8 pruned node slices is less than 2^-128, which is the probability of guessing a specific 12-word337 BIP39 bitcoin seed phrase with a single guess" 21:55:18 what if i cant run one? 21:55:19 or a friend 21:55:22 cake wallet? 21:55:43 https://github.com/feather-wallet/feather/blob/master/src/assets/nodes.json#L29 21:55:57 I have a public node, but the server is not in my physical control 21:56:34 but u can't trust these either not because the people running these are malicious but could be the VPS they are renting are forwarding traffic to FBI then to chainanalysis 21:56:48 My node is on that list, in clearnet and onion hidden service ^ 21:56:53 "lawful interception" 21:58:00 its a pain in the ass tbh, at least, they did successfully annoy us 21:58:50 I'm pretty sure the video we have rn is giving them a well deserved hard time ;) 21:59:16 and it isn't like there are no mitigations 21:59:19 it might be intentional, for misleading purpose 21:59:32 it might be intentional, for misleading purposes 21:59:34 good OPSEC is hard unless you put time in it 21:59:55 nah, they wouldn't have removed every trace of it from the internet 22:00:28 like who tf forces reddit to remove a post that shared a link to their video??/ 22:00:43 the video hosting company direct link they used 22:01:20 Is there an Android wallet to run one's own node on the phone? 22:01:25 if its for misleading, it is a normal chain of actions 22:01:26 upload, make it spread, delete it, boom they fell for it(ofc, its a IF) 22:01:33 the good practice for sharing illegal content on reddit is sharing the link in base64 encoded 22:01:57 reddit will take more time to take the post down 22:02:03 worked for years on r/riprequest 22:02:40 for nintendo firmware 22:02:43 subreddits 22:02:51 but they aint that stupid 22:03:04 nope 22:05:52 well there are some potential benefits to it 22:05:52 lets say you find few holes/bugs/backdors/... in the target program named: 22:05:54 A, B, C, D 22:05:56 and you know that they are going to have a big update in a year or so that will change a lot of things 22:05:58 what will you do? 22:07:36 lets say they are only aware of B and C and they maybe discover A in the update process but D is impossible 22:07:38 and with any of the bugs alone, you can achieve your goal, as long as one of them remain and they dont fix the all 4 of them 22:10:48 TBH, we knew that they are running their own nodes, or they can track to some extend with enough time and data when you connect to them or if you mess up your OPSEC with how that colombian guy connected to a CEX with his real IP 22:10:48 but it took a lot effort and we didnt see any live example in the action, there is nothing new here in that video, they did shift all of our attention to B and C, specially the devs 22:11:01 to be honest, we knew that they are running their own nodes, or they can track to some extend with enough time and data when you connect to them or if you mess up your OPSEC with how that colombian guy connected to a CEX with his real IP 22:11:02 but it took a lot effort and we didnt see any live example in the action, there is nothing new here in that video, they did shift all of our attention to B and C, specially the devs 22:17:04 it is known that will try to find other ways, not onlt the one shown in the vid 22:18:59 they might have already know the other ways, thats why this video drama started(hypothetically) 22:19:28 probably not 22:20:32 the symptoms they are showing is saying otherwise 22:21:17 ofc we dont even know if its true or not, because Option D was a bug that we are not aware of so you cant defend against something you dont know, but overall i think it would be better if we focus on potential threats than arguing about known facts that video demonstrated for us 22:21:39 <4​n0nu5er:matrix.org> Hey guys, what happened to the monero mining room? 22:21:44 <4​n0nu5er:matrix.org> Can't find it 22:22:36 till then, which nodes we should use or verified/not compromised? <<>> your own 22:23:11 your not going to show your trump cards to your enemy do you 22:23:34 i think they closed the links because of the ongoing spams 22:23:55 let alone giving them a full presentation lol 22:24:01 <4​n0nu5er:matrix.org> I see 22:24:17 <4​n0nu5er:matrix.org> I used to be in that room a while ago but didn't find it so I thought they shut it down