03:26:39 Decided to never come back to this community again 03:27:05 fluffypony: I think you're a pos scammer and a liar 03:27:39 You screwed over a lot of ppl and I hope they get justice 03:27:52 Bye 👋 08:51:14 Hey Monero Community. I have access to some free Digital Ocean droplets. I want to contribute to the network. Where do I start? 08:54:47 setup a node, post it on monero.fail, then you can setup a p2pool node and start mining 08:55:05 hosting a node and mining are the best ways to support the network afaik 10:21:34 Why there are no reproducible Monero wallets on mobile? 10:58:58 <3​21bob321:monero.social> APIs ? 11:02:46 <3​21bob321:monero.social> https://codeberg.org/acx/monfluo/ 11:50:10 it is reproducible? 13:50:45 https://github.com/cake-tech/cake_wallet/issues/337#issuecomment-2648546880 15:24:07 hey peeps. any official response or analysis from the Monero community on the ArchTyp takedown? 15:27:07 on what exactly? 15:27:15 Of course there's no official response from monero community 15:31:02 minus the official part. Just open on hearing viewpoints on how a Monero-only market's vendors were traced. Obviously building upon past takedowns of other DNMs. 15:31:59 It's not down to monero. It was an illegal online market selling illegal shit. 15:32:22 since so many of these operations are named xxxTor - i'm guessing Tor has something to do with it. ;( 15:34:07 it's always opsec failures 15:35:05 i just want to know, could monero be traced by FBI? 15:35:24 yeah, trying to maintain opsec at that scale is virtually impossible 15:35:37 well - people are trying to use the DNM takedowns as evidence that Monero can't protect you 15:35:48 from what we know publicly, no one have "traced" monero 15:44:35 not without controlling entry and/or exit points or some other metadata 15:45:03 sure. which is more than plausible. 15:45:07 ok here's a better question. 15:45:37 how do you think the operation estimated the total transaction volume of the platform? 15:48:08 If they take over a platform, then I assume they can get data about the platform. 15:49:14 duh - right. 16:29:11 Zano de-anon: 16:29:12 g7cpug4k6ydyq5dlxrji35xnfq5n5rba3n7holux4tmdsm42ju543tad.onion 16:30:52 Oh noooooooooo 😂 16:31:26 Still work 10$ 16:31:46 worth** 17:35:54 Just finished reading through the "Zano de-anon". Pretty interesting, solid, I can recommend it. Life as a small coin with a small dev pool is hard ... 17:37:11 And read about the size of their network, you will be shocked :) 17:39:44 well, they didn't make it any easier on themselves with all the aggressive marketing and influencing 17:41:39 Maybe that's needed to avoid being totally forgotten and falling completely to the wayside if you are small? 17:42:26 Monero has critical mass, and more or less sells itself. I don't think we would be able to do proper marketing for our dear life :) 17:43:18 I did read it too. 17:43:20 Really interresting read indeed 17:44:15 See what happened to the cute, little, nice coin call Aeon 18:30:16 @xmr 18:30:17 318.29 18:34:32 we had 2 chain deanons so far this year, Dero and Zano 18:47:12 is there a clearnet article 18:59:27 So it mean that the people who do transaction with there own local node, without VPN and without tx-proxy, can be the easiest to identity (you can get the IP of the TX) 19:00:36 then after you raid thing like Archtyp and get there data, you can match IP->TX assuming they keep wallet in there 19:01:27 Things should start use TOR and/or I2P be default at very minimum 19:02:04 Feather wallet users are mostly fine (they use trusted node and a big chunk of them use TOR I think as it include TOR) 19:06:43 Should the ban list come with monerod? (and updated at every release) 19:12:56 Tor* 19:14:56 Yeah. ISP's know the origin of tx, even with dandelion++ 19:15:44 i2p* 19:17:05 Tor is a permissioned system. It works, but i prefer i2p or i2p+tor 19:24:38 i2p + Tor 🤔 19:24:46 u should try mixnets like nym 19:28:00 At the end it depend for what you use the system for 19:28:00 ~2s pings are fine for messages and sending TX but it's unusable for a lot of things 19:29:24 I did test Nym services recently 19:32:21 Mixnet : PASS (ping ~1.5s to ~2.5s). Expected for the kind of service 19:32:22 Fast "Wireguard" AmneziaWG : FAIL (Disconnected during the mandatory 30 minutes video streaming test, would not reconnect because entry VPN was down and the client don't switch to another one automatically) 19:34:35 And problem with that one is that it take over the network routing so ideally if you want to use it's Mixnet thing that is actually nice, you have to use a VM and setup a Socks server on it, so you can set the thing that you want to use the mixnet with to go thru that VM proxy. 19:35:48 So it's not something "easy to use" if you only want mixthing for a few thing. 19:35:48 I think it could be nicely paired with Qubes OS usages. (Can have a mixnet Qube) 19:36:17 And set a few Qubes that need to go thru mixnet to route to that Qube 19:38:36 There other service (fast with amneziaWG) would be really great for normal VPNing, if it was more reliable. Would make good alternative to Mullvad and ivpn. 19:52:22 Also: 19:52:24 It distrurb connection to your network (192.168.x.x, 10.x.x.x etc etc) 19:52:26 And VPN lost internet connectivity (they connect thru a network bridge to the main network interface, in my case) 19:52:39 Also: 19:52:40 It distrurb connection to your network (192.168.x.x, 10.x.x.x etc etc) 19:52:42 And VM lost internet connectivity (they connect thru a network bridge to the main network interface, in my case) 20:40:52 what kind of piss me off is that nym is making marketing on how they are better than Tor and even invited people to try browsing the web with mixnet, yet there is literally no one that is able to do so 20:41:13 They are too smart for being delusional so i'll call it disingenuous 20:41:34 nym with mixnet have no value at all, and mixnet is useless, so it currently has no value 20:41:57 nym without mixnet* 20:44:30 mixnet is usefull, just stuff that shit in a VM and route the traffic you want to mix to that vm 20:44:45 mixnet is unusable 20:44:50 so useless 20:45:09 i've never been able to even curl some shit through it 20:45:13 only pings worked 20:45:15 ping is big so yeah, it's unusable for normal web surfing imo 20:45:33 Saffing is a better contender for most use case afaik 20:45:44 portmaster? 20:45:46 it's more reliable in my test (for the multi-hops VPNs) 20:45:49 yes, portmaster 20:46:02 might try it 20:46:06 if you recommend 20:46:14 and it's less of a pain to use (when you need to have non-vpn traffics and use the local network 20:47:10 well, it's more reliable than mixnet. 20:47:10 But it's slow still (multi hops, and they don't have enough nodes) 20:47:22 but at least it's usable for surfing and even for youtube and shit 20:48:04 when it shiat you can reset the saffing shit. 20:48:06 Id say, try it for one month to see if it work for you, if you did intended to test it anyway 20:50:45 <3​21bob321:monero.social> Spn network ? 20:51:01 Yes 20:52:59 <3​21bob321:monero.social> CEO with respond 20:54:17 <3​21bob321:monero.social> Will* 23:41:05 hello 23:41:15 https://i.imgur.com/BTnr2n4.png 23:41:20 what does the second line mean 23:41:45 like there are 2x lines that track blocks, i only ever see activity in the top line, but just now i see activity in both