Synnr

joined 2 years ago
[–] [email protected] 2 points 9 months ago* (last edited 9 months ago)

Edit: it looks like there is a voice input only app they make that is separate, that is what I use. https://voiceinput.futo.org/

Did you mean "but"? Helioboard is a full-blown keyboard if I remember, and FUTO is offline voice LLM only, with multiple language support. I only speak English but it works great. It's not a keyboard that types, you just click it when you want to speak.

[–] [email protected] 1 points 10 months ago* (last edited 10 months ago)

To be honestly I didn't even know they had aggregated pools, but I will 100% look into it. Where did you find the aggregared swao on the main exchange page?

We operate with two pools of addresses for BTC deposits and transfers - mixed and aggregated. In a mixed pool all received and sent transactions are mixed together and there is no way to discover how many people are behind certain addresses and traceability is extremely difficult, which is very good for privacy but bad for risk scoring. In the aggregated pool all transactions we receive from users are collected on a known single address which is also used to send payments, what will clearly show you have interacted with our exchange and it's good for interacting with other major exchanges to avoid any risks of frozen funds.

These are cons and pros of each pool:

Aggregated pool (bc1qu2dq8w8lv8v3l7lr2c5tvx3yltv22r3nhkx7w0)

Pros:

No risks of being frozen at major exchanges due to low risk score given by chain analysis platform

Chain analysis platforms will know you have interacted with an exchange and won't increase a risk score of your sending addresses

Can be useful when someone asks you for a source of funds

Cons:

Reduced privacy

I had X,XXX eaten by a swap before so now I only use BXYZ to XMR. I wish I knew about this for some trades. Wonder if it's limited to pseudononymous currencies. wish I knew where to find it and more info.

All options I see are flat rate and dynamic rate. Maybe you have to contact them about it.

[–] [email protected] 2 points 10 months ago (2 children)

Not sure about anonexch. Exch.cx is great for whatever to XMR. 5% fee though. Do NOT use them to trade XMR to a pseudononymous crypto like BTC at anywhere that checks KYC or availability of dirty address (Trocador hsd a checjer on their site fwiw) as there's like an 85% chance you'll have to do KYC and explain to get it back.Unless you're using Trocador and are at or under their guarantee, then they will just send the funds back to the original address, no questions asked, provided you have access to it.

[–] [email protected] 1 points 11 months ago* (last edited 11 months ago)

I dunno. They started out with different owners. It's still fully manual (buy prepaid visa, get it in 24 hours, maybe.)

They once advertised cards that would not be detected as prepaid. Surprise, company I bought it for wouldn't accept a prepaid card, no refund just "sorry for luck maybe try another site?"

Edit I had allark and majesticbank confused.

[–] [email protected] 1 points 11 months ago* (last edited 11 months ago) (1 children)

Yes, but setting the environment variables before running setup. The following two coded env vars will set your btcpay server to automatically also run a tor hidden service. Once XMR is configured (only one wallet per server at the moment) you should be able to access the hidden service and pay without issue.

Run btcpay-setup.sh with the right parameters

Set the custom domain you chose to use

export BTCPAY_HOST="btcpay.EXAMPLE.com"

Use Bitcoin on mainnet

export NBITCOIN_NETWORK="mainnet"

Enable Bitcoin support

export BTCPAYGEN_CRYPTO1="btc"

Enable Monero support

export BTCPAYGEN_CRYPTO2="xmr"

opt-add-tor enables Tor support for the UI and Bitcoin node

export BTCPAYGEN_ADDITIONAL_FRAGMENTS="opt-save-storage-xs;opt-add-tor" 
[–] [email protected] 5 points 11 months ago* (last edited 11 months ago)

Survivor bias and and an ad all in one post!

When I see posts like this it gets my glowie senses tingling.

[–] [email protected] 16 points 11 months ago

You may not like it, but this is what peak machine learning performance with 4chan training data looks like.

[–] [email protected] 1 points 11 months ago* (last edited 11 months ago) (3 children)

In the guide you linked, the docker container automatically sets up a hidden service. You don't need to do anything beyond firewall rules if it's not working for you.

[–] [email protected] 1 points 11 months ago

Thank you for answering my questions. Having much more knowledge in this area, what is your gut feeling about it being not random spam DDoS, but a way to get some type of sensitive data, that can make identifying users easier? Happy to receive a PM and won't share.

[–] [email protected] 1 points 11 months ago (3 children)

I just noticed your username. Thank you for the project, Feather is amazing. I have a question though. I know Ruckinum ran an analysis and thinks this is not a black marble flood, but I can't help but think it's a way go somehow break the anonymity of monero, whether just sent amounts, or received amounts, which would still give a wealth of information.

I don't believe this is a random (D)DoS/spam. This is a deanon attack. I know it in my gut. I don't know enough about the internals of monero but I think you might.

Specifically...

The bug was triggered when the number of RingCT outputs on the blockchain exceeded 100 million

For instance, this transaction was constructed using a manipulated output distribution. Can you determine what the true spend is? Notice that all ring members are older than 1y 200d except for one 6-day-old output. Unless the user checks the ring on a block explorer and knows what to look out for, they would not notice that their transactions are being fingerprinted.

My understanding is that the 16 (or 15+real?) rings are all real, prior transactions. Are the transactions reused? If not, then they exhaust the supply of rings and now have great statistical advantage going forward. If they are reused, then they can tell the real spend by discarding any spend that's been used more than once. Is that correct?

I can't help but believe this is part of something larger, along with all the previous attacks in the last 2 years and now Samourai, Liquid pulling out of US, attacks on tor, RISAA and mandatory KYC on US cloud providers and domain registrars...

On that note, we've known LE has tools for years now (Chainalysis and 1-2 others) that can in some circumstances give a lead on who a target is, likely via statistical analysis. The tools are only available to law enforcement so the methods aren't known. My thoughts are, in no particular order:

  1. They run or have compromised a lot of 'activist' nodes and xpubs are sent to the nodes in light wallets, unsure if this is how it works, or if that was unique to Samourai's whirlpool design. If this was the case, light wallets use currently online available servers, so chances are a user connects their wallet to tens of servers. Users who run their own nodes would be unaffected but I think the majority of monero users use light nodes.

  2. They have tools that monitor public ledger chains, and watch the amounts in/out. You use an exchange service to trade $500 of BTC to XMR, the amounts (fees included) are correlated over time, leading to known persons selling via KYC services. Probably least likely option but unsure how XMR works in depth.

  3. They run and/or work with (gag order) no-KYC major services that would have that information, as well as other more 'centralized' helpful no-KYC exchange services that know exactly what amount and address the funds are going to and where they came from.

[–] [email protected] 2 points 1 year ago* (last edited 1 year ago) (1 children)

Oops I was wrong, it looks like I have a penny left in the sending wallet so it was just a lucky coincidence on amounts sent during testing.

view more: next ›