just stop.

the "recipient" is a one time address which doesn't correlate to anything.

it's more bullshit pedantry to say "its not encrypted"

all a 3rd party knows is it a *possible send somewhere.

but has no idea if it appearing on the chain is a possible decoy or not.

and yeah i wrote a breakdown of the original Nikkei newspaper article when it broke.

I know you know this stories break every year or two and they have NEVER been because LE has made any technical progress in "tracing" monero.

Reply to this note

Please Login to reply.

Discussion

they told us most of how they traced the Finnish guy's monero. After arresting him, they sent an information request to a swap service which knew precisely what address they sent the monero to (because monero does not encrypt the recipient address), and then they sent another information request to binance, who knew that address showed up as a "ring member" in a transaction to their exchange. So they knew it was him. Didn't require breaking any cryptography. Just following the trail through monero's public ledger.

Of course, if the guy had used lightning instead of monero, the Finnish technique wouldn't have worked. The swap service wouldn't know what address received the money (because lightning hides the recipient's address from the sender) and binance would not know what address sent it to their exchange (because lightning hides the sender's address from the recipient)

People *actually understanding* the trade-offs they make is important.

You are actively working against that understanding by spreading bullshit.

Lightning *probably* does provide *some* privacy guarantees.

mostly unquantifiable.

because it depends on a lot.

mostly outside the end users control.

Monero already does provide provable reliable privacy. for all users of the network.

You,

trying to twist every little thing you can

to fit your desired narrative,

works against the security of end users 💀

> Monero already does provide provable reliable privacy. for all users of the network.

Except the ones who keep getting arrested

cope harder bro

Could you give examples?

The only point bro has it about your IP address. Definitely would recommend using Tor or I2P for your Monero wallets or better yet just make some paper wallets.

These people getting busted is not XMR's fault. It's the fault of the users for practicing proper opsec skills!

and he knows it.

it just suits him to walk right up to the edge of outright lying.

and meme when you call him out 🙄

As someone who isn't in the know on all of the technical aspects I have a question. Are you saying that there are, in fact, steps beyond "send monero to monero wallet" (as suggested in your meme and paraphrased) that are required to actually maintain privacy?

Or is it just a matter of using a VPN or TOR to hide your IP?

it's a matter of using Tor or a VPN.

also best if you connect to your own node,

or a trusted one at least,

if you send through a malicious node it can identify the real spend (although nothing before that).

TLDR

it CAN see IP address, last block synced, and potentially manipulate your decoys (reducing your sender privacy)

it CAN'T see amounts, receiver addresses, balances, and transaction history

If you don't run your own node there are practical things you can do to reduce/eliminate what little malicious nodes can see be using TOR/VPN + changing the remote nodes you use for every transaction or at least periodically switching them. But of course the best privacy is always to use your own node.

"potentially manipulate your decoys" part will soon be remedied and be one less thing it can see when Monero upgrades to FCMP

Good resource on what a malicious Monero node can and cant see:

https://localmonero.co/knowledge/remote-nodes-privacy

you would link the actual video of CAs "monero tracing" techniques

if you were interested in actual facts.

but the video is basically a commercial for #monero

so you won't.

https://v.nostr.build/D4Nzp22vRF35IRnz.mp4

Ok, I've been replying to you in good faith here, but now I see you actually have NO IDEA what you are talking about.

Go to a monero block explorer and find me ONE monero address (starts with 4 or 8) there. Go on, I'll wait.

An address shows up on a ring signature? lol! Again, go to the same block explorer, look up a random tx, and see if ring members look like addresses to you.

You clearly have no idea about what you're talking about buddy.

the sad thing is he *does know.

he just thinks he's smarter than everyone else and it's ok to lie.