• 9 Posts
  • 471 Comments
Joined 9 months ago
cake
Cake day: January 8th, 2024

help-circle





  • What you are describing is the tor network.

    1. You connect to a guard node which knows who you are
    2. The Guard node connects to a middle relay node, and that middle relay only knows who the Guard is, but does not know who you are.
    3. If you are going to the standard internet, the relay node connects to an exit node, which knows who the relay operator is, but does not know who the guard node is and does not know who you are.
    4. The exit node connects to Facebook, Google, Amazon, etc. and only knows that the traffic goes back to the relay node when Amazon or whatever it responds. And then the entire thing goes in reverse back to you.

    Now, if you are going to a hidden service and not out to the standard internet, it does this process twice and so you get six hops in between yourself and the hidden service instead of the three to the standard internet.




  • We really don’t have to advocate or evangelize for it much considering the fact that it’s completely used on the dark net for drug purchases. Love them or hate them. Criminals are the first ones to adapt. New better technology. And then everybody else follows on after that. That video is a lot of guesswork and most of it is completely solvable either today or in the very near future. The idea that they can trace Monero depends on compromised nodes which is fixed by running your own node or using somebody you trust as a node provider trading with a centralized exchange which is easily solved by not trading with a centralized exchange, and ring signature weaknesses that are well-known and in the process of being fixed.




  • Oh, I know Monero uses proof of work and therefore uses power. However, my thought is that Monero can replace the banks and so you’ve got to consider how much power it takes to run bank buildings and bank employees cars and armored trucks etc. Also, since Monero is mined with CPUs instead of application-specific integrated circuits, you don’t get a bunch of miners in one place. They are much more distributed throughout the entire power grid. So like we don’t have giant mining farms located in Texas that is causing noise pollution to the nearby towns and stuff like that. We also don’t have big mining companies causing drama in the news.

    Edit: Proof of work is truly required because it literally backs the value of your currency with energy. And proof of stake has no physical backing.



  • shortwavesurfer@lemmy.ziptoPrivacy@lemmy.mlGoogle Messages Alternative
    link
    fedilink
    arrow-up
    5
    arrow-down
    2
    ·
    edit-2
    3 days ago

    I don’t text people because texting is not secure. I use the default AOSP app that comes with lineage OS to receive text message codes like those six digit codes but otherwise I only use messengers such as signal

    Edit: To stop anybody from saying it, yes, I’m quite aware that getting OTP codes via SMS is not secure, and I do not use it for any account that will let me turn it off entirely. But some, unfortunately, will not. And so I do not trust those accounts very much.



  • If it truly keeps no logs, then it cannot tell what you are doing. But otherwise, a VPN provider can indeed tell what you’re doing because you are only shifting the trust from your internet service provider to your VPN provider. I would highly recommend something like IVPN or Mullvad and only pay for it in Monero. That way, even if logs are kept, you are just a number account to them and they do not have a name for you.