00:25:14 just seen this reddit thread https://www.reddit.com/r/Monero/comments/1jl1t6x/built_a_site_to_swap_monero_with_other/ 00:25:54 you're thinking.. another crypto swap service.. for 1-2% what? but wait , this one is unique 00:26:20 "Operation is processed manually. Our service handles orders within 10 to 60 minutes after full confirmation, provided the operator’s status is online" :D 00:26:36 your swaps are hand delivered 💪 00:38:02 "Manual operation" just means KYC/AML scam. Exchangers from Eastern Europe are well known for this. 00:40:00 "i queried my telegram AML bot and the random number generator says that the funds are tainted" 00:41:31 Is there a way to disable asking for password on Monero GUI startup? 00:48:31 no the wallet files are always encrypted even with an empty password i think 06:39:06 babo67, it's the Magic 8 Ball that says that, don't you dare disbelieve him. 13:37:22 can anyone confirm if im being stupid in this thread https://old.reddit.com/r/Monero/comments/1jdg512/running_a_full_node_through_a_vpn/ ; monerod doesn't mandate 18080 for p2p right??? I would expect you can select whatever port you want to advertise as your p2p port 13:41:02 didnt click link. Yes, you can use any port 13:42:52 Looks like someone is mistakenly saying if you wanted to port forward through vpn's running your monerod node so you could accept inbound connections it means you have to use 18080 13:42:54 "I don't know of any VPN that can forward a valid port for Monero exchanges (18080). This port cannot be modified and is hard-coded into the Monerod code, advertised by root servers that are also hard-coded." 13:44:02 --p2p-bind-port=47732 13:45:40 kk, if anyone knows owner of full node cenox.org ; I think they are a little off on their understanding of how monerod operates and seem to be off on their commentary and advice on the subreddit 14:02:49 ohchase: lol, every paragraph of his post is false sans the last one 14:04:29 "my node with 1000 peers (you can't exceed this value)" - isn't he just hitting the default Linux file descriptor limit that can be modified? 14:05:04 Probably 14:08:06 and the rest of the post dismisses running nodes via Tor and VPN on the basis that the guvehment won't surveil you (it does) and it won't prosecute you for running an XMR node (it will) 14:12:54 I find particularly, "It is not recommended to synchronize nodes on the Tor network, only to expose restrictive RPC interfaces on the network. Tor is a community-managed network and it would be a shame to impact its bandwidth for uses that don't need it. " is a dangerous comment. Since monerod syncing does grab significant amount of blocks from a peer, I don't think it is appropri 14:12:56 ate to compare monerod syncing over tor to torrenting where the connections are so volatile 14:37:24 I don’t understand why ppl use vpns like mullvad and proton, because you can literally buy yourself a vps for a buck and set up your own vpn with more control over it and also install whatever you want 14:38:35 With WireGuard/openvpn installer script from GitHub it can’t be easier and all open source 🤷‍♂️ 14:39:23 tons of reasons 14:41:18 Reasons to buy mullvad/protonvpn? 14:41:29 Instead of a vps 14:44:53 yes 14:45:04 you can think about it, it is muuch better than a VPS 14:45:33 That IP address is tied to you + one location + nosy VPS providers 14:46:54 ppl wanting VPN usually use it to circumvent geo-locks 14:47:53 not to have a remote server to set up 14:48:55 This ip will be tied to you, yes, because you will have to connect to this ip with your real ip (to use the vpn basically) even if you bought it with crypto, that’s true, but what do you mean by nosy vps provider? 14:50:11 I can understand it, maybe it’s easier for most ppl, especially for those who doesn’t know what ssh is 14:54:14 When traffic is coming from VPN with many users you can sort of hide in that pool of people whereas if coming from one person on one VPS IP, it's easier to find. I suppose you'd use Tor or i2p if that was important though 14:55:51 You'd also have to trust no log policy, so there's that 14:59:07 I remember sharing my vpn with others for that reason but when I found out that in my country vps providers and isp is obliged to save logs for 6 months even with exact connection ports in and requests out, so now I doubt that multiple ppl using same vpn improve privacy, maybe a little bit 15:00:30 Also using vpn + tor hides the fact that you are using tor from your isp, I think it’s better to have than not 15:02:13 Also using vpn + tor hides the fact that you are using tor from your isp, I think it’s better to have than not, + dns through vpn hides websites that you visit, and you encrypt not encrypted http, there are a lot of pros but you have to trust your vpn provider at that point 15:04:38 I think dns encryption is a big component on the clearnet 15:06:18 I think dns encryption is a big component on the clearnet, but not through a central place like cloudflare 15:08:25 Yea I try to use something except cloudflares 1.1.1.1 and googles 8.8.8.8, btw what are good dns servers nowadays I wonder? 15:09:50 mental outlaw has a guide to setup one on a vps https://www.youtube.com/watch?v=pj_jyVG7sB4 15:20:46 as long as port-forwarded VPNs are still available, buying and managing a VPS is a waste of time 15:21:26 wasting valuable IP space for something that isn't necessary 15:33:57 x3cc, a) not everyone has even the basic skill for setting up a VPS (like, I only learned a few years ago to use a computer with command-line only); b) you might want multiple servers in multiple countries. 15:34:31 babo67, it is not a waste of time, just a different usecase. 15:35:52 Like, if you want more flexibility in what obfuscation to use. Or less of a chance to be detected as a VPN. 15:46:58 Soo is cake wallet good? 15:47:26 And if you use it do you use clearnet or tor nodes? 16:07:48 also, "torrenting/pushing large amounts of data via tor = bad" is repeating a strawman argument made in 2010, when tor network capacity was literally 2% the current amount 16:08:24 True, but I still would rather not clog it with big files. 16:10:26 bitcoin is 10x the size of monero, both in the number of peers and the amount of data transmitted during block sync. it's explicitly configured to cause as much strain on tor network as possible and does a pretty good job of it, yet nobody complains since it hasn't been an issue for a long long time 16:10:42 ? 16:11:05 the points Robert raised 16:13:55 You connect to mullvad over tor? 16:15:39 the difference here, is that you trust the service provider (vpn) and dont trust the service/website being accessed through it 16:15:59 torrenting/crypto node synchronization is a legitimate traffic that belongs on tor as much as anything else. you shouldn't be compromising your privacy over an outdated issue that's no longer relevant 16:16:18 I don't trust either, so obv i'm not connecting to mullvad from my clearnet ip 16:17:00 I remember there being concerns that you can leak your IP more easily than usual when torrenting over Tor, but this might've been changed. 16:17:52 to treating over tor is (or was) not good for privacy at all 16:18:15 But I think depends on torrenting what. A risky book or documentary? Yeah, understandable. HD Game Of Thrones? How much that demands from the network is not proportional to how much protection you need. 16:18:17 If you want to torrrnt on an anon net, you use i2p 16:18:44 If youre torrenting on tor, you might as well use clearnet 16:18:47 Also yeah! Remembering recent Chainalysis leaks that were specifically shared on i2p) 16:20:05 BTW I haven't been on i2p for a while and forgot whether there was some big tracker, or whether it's mostly individual links. 16:20:36 (also remember that there was a library I downloaded quite a bit from that just vanished, rest in peace, at least I got everything I wanted) 16:20:53 ofrnxmr: "torrenting over tor is bad for privacy" - another argument irrelevant since the dawn of airgapped tor VMs 16:21:32 What? Torrent on tor leaks your ip 16:21:59 I wonder if this can be configured properly though... 16:22:42 ofrnxmr: if you configure it properly (which is easy), there's nothing to leak 16:24:40 but anyhow, torrenting over tor is a bad idea because the experience sucks, and it's hard to actually saturate the connection due to the nature of bittorrent protocol. for monero/bitcoin sync it works wonderfully 16:26:00 and the predditor saying you shouldn't use monero over tor is putting people at risk 16:26:45 You shouldn't us monero over tor tho 16:27:04 Why? 16:27:19 because it doesnt support incoming connections 16:28:27 Puts centralized the network around nodes that do support incoming. If everyone uses tor, there are no nodes to accept incoming, and thereby there are no nodes that can communicate with one another 16:28:35 But it's supported by a lot of Monero infrastructure somehow. 16:29:00 Also, if you're using a remote node - seems kinda necessary to remain safe, as Chainalysis vid implies. 16:29:05 it it doesn't support onion HS for incoming connections like bitcoin does, that's an oversight 16:29:26 Ah, so you just use only specific nodes. Will look into this, didn't know. 16:29:41 Is it hard to set up such a node? 16:30:35 ofrnxmr: of course it does, what were you thinking: https://github.com/monero-project/monero/blob/master/docs/ANONYMITY_NETWORKS.md 16:31:21 Its not an oversight, its a design choice 16:31:24 But correct, it does not support onion/i2p incoming for blockchain sync 16:31:26 Using tor/i2p for rpc/wallets is fine 16:37:00 Ah, you mean it works if you're connecting a wallet to a node, but not if you're connecting a node to the rest of the network? 16:41:27 Yea 16:43:08 node<>node doesnt have onion support for syncing chain. 16:43:08 node<> node does have onion support for relaying transactions. 16:43:10 wallet<>node does have onion support for syncing wallets etc 16:51:03 to solve node<>node doesnt have onion support for syncing chain. this would require having nodes set up temporal hidden services correct 16:51:25 No 16:51:54 It would requires some checks to be removed in monerod code 16:54:45 >> other blockchains allow block sync over these networks.[...] 16:54:46 > This can be done immediately [...] by removing a few checks. Syncing over these networks was never allowed due to concerns over possible sybil attacks - you can't easily block a tor/i2p peer. We could let the users decide for themselves instead. 16:55:34 just night thoughts, but it feels like monerod could benefit from being compartmentalized and push all this rpc and p2p logic to a completely separate project. E.g. monerod just defines the specs of the blockchain but doesn't dictate the rpc or p2p protocols. Trial by fire and let who evers p2p implementation best win as well as rpc 16:57:09 probably sleeptalking :) 16:57:18 is there other blockchains that do something like this? 16:57:38 Monerod doesnt dictate rpc protocols, it dictates its own rpc calls 16:57:47 Bitcoin and all of its forks 16:58:52 There are only a handful of novel blockchains, and they all run their own rpc interfaces 17:00:18 Btc based forks are virtually identical. cryptonote based forks are virtually identical. Evm stuff , etc etc 17:00:26 my other shower/sleep thought was having a contact method endpoint on monerod nodes and I still feel like that has some merit to it https://github.com/feather-wallet/feather-nodes 17:01:24 if you're a bad actor, go for it and post a ton of nodes and don't let people know its the same owner. But if you're a good actor, I mean let it be known you own all of them. 17:02:44 this was met with strong discouragement though, so i could definitely be sleep talking :D 17:03:26 Wownero has a donation section on the rpc info 17:03:39 Why? Lol 17:04:47 if youre a bad actor.. you target good actors 💯 17:05:47 putting a target on our backs is nice and all, but seed nodes, feather/wallet nodes etc are all attacked 17:06:02 Putting your name on something costs $ 17:06:45 wouldn't it just be like a gpg public key and optional email? 17:06:52 If i dont know which node is ohchase's, i dont know which one to ddos 17:09:39 yea but if i run nodes as a just benevolent actor, and have it routed through multiple different domain names; I could take the time to independently set up ddos protections in front of my rpcs and since I'm going to use a whois protection but cool with people having my pgp key then you'd have a scrolly list in your wallet before selecting a remote node and it could confidently le 17:09:40 t you know its me running it 17:10:07 instead of having to scour reddit and clearnet phishing websites to try and confirm if im really running these nodes 17:10:23 Or stop using random nodes that you find in dark alleys 17:10:58 Moneroworld literally fwd'd to chainalysis for 7yrs 17:11:16 I just don't see that stopping currently for a while, it seems the reign of remote nodes is just here to stay for a while 17:11:41 You dont know anything about whether you can trust a node just bcuz of a pgp key 17:12:26 i think simple mode / public-node + bootstrap-daemon=auto needs to die 17:13:33 well for instance since I read and have to make some form of decision to trust someone at some point if I really needed a remote node, I'd probably go for xxx and yyy person I see posting guides and information, warnings, etc in their free time 17:15:00 totally understand, but that's a monumental task in my opinion. a pruned node syncing over tor is a good 20-40 hours or more to get operational 17:17:20 Its more like 8-18hrs 17:17:23 "progress not perfection" 17:17:50 And theres nothing stopping you from using bootstrap-daemon=someothernode:18089 17:19:14 Im doing something fucking wrong then with my whonix setup lol 17:20:58 ssd? Maybe your internet / tor connection is slow 17:21:31 nvme, maybe whonix-ws app template base is the problem? 17:22:11 clearnet internet definitely not slow 17:22:28 i couldnt tell you, all ik is that i synced checkpoints in 8-12hrs repeatedly (like 30+x) for the past couple weeks 17:22:46 And my sys isnt the fastest 17:23:10 Have seen others achieve the full sync in 8, and some faster systems on hdd do it in under 24hr 18:01:18 30~ hours for this corei5 + kind of internal ssd 18:02:22 Wen 0.18.4.0 release 18:04:54 nioc: in the coming days if bF is available 18:05:34 Thx 19:10:12 Noice 21:15:05 Every single time I try to setup a node using terminal, I get stuck at "vim .bitmonero/bitmonero.conf" It is supposed to list "no-igd=1" and " restricted-rpc=1" but my screen is always blank. If I add those two lines, I cannot :wq, not allowed. Any ideas? 21:19:01 How do i use vim? 21:23:29 How do i get to the vim step 21:23:51 Idea: use nano 21:25:25 just use nano™️ 21:32:12 I tried sudo nano vim, nano vim, and just vim but the same error persists. The config file is blank, I add in the required text but then I cannot save it. E212: Cant open the file for writing. 21:35:38 You might not have the directory created. Try running "mkdir .bitmonero" first. 21:36:03 nano is another editor, not a command that uses vim. 21:37:21 vim > nano 21:37:28 or used micro 21:37:31 *use 22:03:47 Revuo Monero Issue 233: March 23 - 30, 2025. https://www.revuo-xmr.com/weekly/issue-233/ 22:12:50 How to setup node: 22:12:52 `./monerod --rpc-restricted-bind-port=18089 --rpc-restricted-bind-ip=0.0.0.0` 23:26:58 Btc mempool is empty it’s a ghost chain 23:39:49 <3​21bob321:monero.social> Flood it with morbs