I am optmistic about real privacy in modern times and publish quite effort on the topic, so that others can have verifiable privacy too.

On the other hand my dear counterpart, you have quite a few suspicious hardware decisions on your belt and already got exposed endorsing government developed tools like Tor.

There isn't a particular reason for me to call out the obvious attack vectors of using compromised hardware.

Reply to this note

Please Login to reply.

Discussion

Even Monero shows you how to use Tor with your node.

More hypocrisy.

Just don't trust Monero so blindly, especially when you don't know the developers behind. It is OK to criticize them when seeing odd things.

People like Fluffypony would sell their mother to the government if that means making a profit or not being arrested: https://coinexplorers.com/insights/ex-monero-developer-fluffypony-has-been-in-jail-for-two-weeks-over-theft-at-ownozf

Yes, but i2p is recommended over Tor as the latter is largely compromised. That doesn't mean people shouldn't use Tor over their ISP IP.

SHA-256, the hash function that's fundamental to Bitcoin, was developed by the NSA.

We need an elite security expert like you to get on the case.

Go harass the Bitcoin Core devs and GTFO of here.

Bitcoin itself was developed by an NSA contractor, used since the beginning by government authorities to track drug transactions. Reason why it was replaced by Monero a few years down the road.

It was quite cute those days at the beginning, albeit the hashing is a waste of electricity and computing power. Subsequent projects somehow minimized that kind of waste but I'm yet to see a project that makes PoW useful as byproduct for something else.

The internet started as ARPANET. You might want to stop using that, too.

I did exchanged thoughts many years ago with David Farber, one of the Arpanet founders, was a teacher. The whole Arpanet didn't start as a government project but rather as a university project to connect them.

Moving out of the internet isn't unreasonable and that is a work in progress, look on my profile.

Create networks of devices using radio waves rather than IP addresses. When the grid goes down as seen in parts of Europe this year, radios kept working.

It isn't as convenient as the Internet, in return you do get real privacy and something that keeps working even in tough times.

We are all still here because we want to know hw model and Os that Brito is using in real life, it would be really nice to know. So we cam evaluate if it's a better solution compared to Pixel/graphene combo.

All depends on your security model and needs. Just because I point some obvious hardware flaws, doesn't mean I need to use them myself.

I'm the kind of guy that writes embedded operating systems on dedicated hardware and networks just to know in detail what is used. Even there exist exploits to be aware.

For example, Wi-Fi chips cannot simply be trusted and the alternatives are still expensive: https://archive.fosdem.org/2021/stands.fosdem.org/stands/openwifi/

It is a long and lonely road without fame nor profit. You are welcome to join if you are interested on the topic.