The only point bro has it about your IP address. Definitely would recommend using Tor or I2P for your Monero wallets or better yet just make some paper wallets.

These people getting busted is not XMR's fault. It's the fault of the users for practicing proper opsec skills!

Reply to this note

Please Login to reply.

Discussion

and he knows it.

it just suits him to walk right up to the edge of outright lying.

and meme when you call him out 🙄

As someone who isn't in the know on all of the technical aspects I have a question. Are you saying that there are, in fact, steps beyond "send monero to monero wallet" (as suggested in your meme and paraphrased) that are required to actually maintain privacy?

Or is it just a matter of using a VPN or TOR to hide your IP?

it's a matter of using Tor or a VPN.

also best if you connect to your own node,

or a trusted one at least,

if you send through a malicious node it can identify the real spend (although nothing before that).

TLDR

it CAN see IP address, last block synced, and potentially manipulate your decoys (reducing your sender privacy)

it CAN'T see amounts, receiver addresses, balances, and transaction history

If you don't run your own node there are practical things you can do to reduce/eliminate what little malicious nodes can see be using TOR/VPN + changing the remote nodes you use for every transaction or at least periodically switching them. But of course the best privacy is always to use your own node.

"potentially manipulate your decoys" part will soon be remedied and be one less thing it can see when Monero upgrades to FCMP

Good resource on what a malicious Monero node can and cant see:

https://localmonero.co/knowledge/remote-nodes-privacy