Discord: @azalty
Steam: https://steamcommunity.com/id/azalty/
Trop de gens de gauche sur cette instance, mais bon, on fait avec…
I’ve tried Signal, Session, Matrix and SimpleX and the most convenient one is Signal. Some will refuse to switch, some, the closest people to you, will agree but probably just for you, unless they see an interest in signal themselves
For WhatsApp users: I’m saying that they leak all the contacts to Meta/Facebook and use it for advertising and tracking, + sending to the US gov because we all know they share data
For discord users: they’re a bit known for not deleting things, and backed by Tencent (if I recall correctly) they could have a reason to start using messages for advertising or similar. They’re already using game activity data to push ads (or quests as they’re called). Based in the US so also probably leaks to the gov.
But most importantantly: I just ask if they’re really to have all their messages, and especially their private messages leaked to the public in case they get hacked. Including all images sent in PMs, and having those analyzed by some other companies as well (often for CP, but still, I’m not really ok with that). Some will say that they’re not, in this case alright, go switch to Signal! Some will say they are okay with it, and tbh they’re probably lying or underestimating the risks and the impact.
Discord is alright, but please, or all sensitive messages, please switch to an encrypted messenger.
I wish it had tenor instead. Giphy seems to really lack content, I never find what I’m searching for
I hate matrix because it’s hard to use and understand, and also most client collect a shit ton of data, which goes against all the privacy benefits
Not everyone plays league of legends 😂
Works fine for me
What the fuck was that x)
😵 some people just don’t care
It’s their job though, not their personal life, so they might care less
I imagine you keep your password manager unlocked, or as not requiring 2FA on trusted devices then? Re entering 2FA each session is annoying
You still have the treat of viruses or similar. If someone gets access on your device while the password manager is unlocked (ex: some trojan on your computer), you’re completely cooked. If anything it makes it worse than not having 2FA at all.
If you can access your password manager without using 2FA on your phone and have the built in phone biometrics to open it like phone pin, finger or face, someone stealing your phone can do some damage. (Well, the same stands for a regular 2FA app, but meh, I just don’t see an improvement)
I have never understood the goal of passkeys. Skipping 2FA seems like a security issue and storing passkeys in my password manager is like storing 2FA keys on it: the whole point is that I should check on 2 devices, and my phone is probably the most secure of them all.
I didn’t get it 🤔
That’s… pretty funny actually x)
Sorry for u my dude
The protocol doesn’t try to use each output 16 times actually, that could be pretty nice I guess. I was just saying that statistically, you should get an average of 16 times because, well, the ring size is 16. The actual may vary quite a bit, and your output might potentially never be featured as a decoy, or featured 100+ times. It isn’t likely though. I just used 16 because it is simpler this way.
I never watched the breaking Monero series, I should take the time to do it
And yea, really excited for FCMP++ as well :) - most chain analysis stuff will go bye bye
For real
OP is literally churning, just to a different wallet if his.
If transactions aren’t completely swept and they keep a non-zero change output, it makes things worse
Churning is fine if you have coin control and keep note of your outputs
Different wallets are fine if you manage to keep track of everything and properly sweep outputs. Avoid spending multiple churned outputs together if you can to prevent linking them together, but apart from that, it’s good.
I was really happy this topic was discussed. Decoys being chosen by the remote node is a real threat. IPs are discussed but any individual willing to hide their identity will either go through tor or a VPN that claims no logs are stored
If you use your XMR on something with your mail on it, with any personal info linked or with a CEX, you’re cooked
You’re right and wrong. Churning will reduce the traces linking back to you, but you’re still exposed at 1 churn per output, when including 10 outputs. You would even be exposed when spending 2 outputs from the same source
As you know, each ring currently has 16 transactions, including you. This means, on average (more or less because of other factors, but still), each output will be featured in 16 transactions. We can therefore assume that 1 in 16 of those transactions is real (in reality the distribution is not that perfect, but as an average, it is important to know the consequences).
You now have a 1 in 16 chance of being traced. Statistically, the transaction you made has 6,25% chance of being made by you. That’s pretty high for a single poisoned output, right?
Now imagine you spend 2 poisoned outputs… the distribution algorithm is not evenly distributed: older outputs are less likely to be picked than newer. This means you get a situation where the older your 2nd poisoned output is, the more you’ll stand out. The math is not that easy the make, but just knowing that each output will only be included 16 times on average, and that there are a lot of transactions so a lot of outputs, it becomes really unlikely that 2 of the poisoned outputs that are linked to the same individual end up in the same transaction if it was not made by the individual of question itself.
With 3+ poisoned outputs you basically confirm that it was the same person. Might not hold up in court, but they’ll definitely know
10+ poisoned outputs? Definitely you.
Churning each output only multiplies the number of possibilities by 32 (16 for one output, 32 in reality because 2 outputs are generated). This will certainly throw off the basic chain analysis methods, but if you’re a person of interest, all the linked outputs will be analyzed. All outputs that are created by including poisoned inputs might be considered, effectively multiplying the number of possibilities by 32 as said earlier. If I tried to spy on someone with this, I would probably set a higher suspicion level on the first transaction level, then less on the second… assuming chain analysis software does that as well, churning would actually divide the chances of being caught by more than 32 but lets assume they don’t do that as it’ll be easier. You now have 1 chance on 16^2=256 so 0,39% chance of having done a transaction with a churned output in between for a single poisoned output. Still pretty high if you want my opinion. If you do that multiple times, you’ll stand out for sure. Including multiple outputs will also expose you a lot. Spending 10 churned poisoned outputs will definitely expose you.
I should just make a blockchain analysis program and test transactions with it 😂
My recommendation: if you’re going to spend multiple poisoned outputs at once: churn them together into 1 output (it’s called sweeping afaik), then churn this individual output. The initial churn merge will make the transaction stand out, but since you only have one output to churn, you reduce the traces.
Please correct me if I’m wrong, I have put a lot of time thinking about all of this but I might have forgot to include some specific things. I already noticed that all transactions include 2 outputs (at least), so the possibilities are multiplied by 32, not 16 as was my initial assumption
Woops I omitted this crucial information from the title, fixed. Sorry for that.
Then it doesn’t explain why the price went up at all
A lot of cryptos increase at the same time