Replying to Avatar Super Testnet

"send XMR to address"

that's what these folks did, and they got arrested:

The finnish guy: https://cointelegraph.com/news/finnish-authorities-traced-monero-vastaamo-hack

The 18 japanese people: https://cointelegraph.com/news/monero-transactions-japanese-authorities-arrest-18-scammers

"Just sending xmr to an address" is also bad advice when the most popular monero wallets (cake wallet and monerujo) are known to have been unwittingly giving a list of nearly all their users' xmr transactions plus your ip address to Chainalysis: https://www.digilol.net/blog/chainanalysis-malicious-xmr.html

It is very easy to leak your personal info, especially your ip address, so do not "just send XMR to address" -- even the Monero website warns against this stupid "just use xmr" meme:

https://www.getmonero.org/get-started/faq/#anchor-magic

You do realize the remote node never learns who you are sending to, or where from (other than IP address, but again, that's not a Monero issue, it's a TCP/IP issue), right?

What it does learn is that you own a certain utxo, if you immediately retry a tx on the same node after the node maliciously rejects it (there will be one ring member that doesn't change between txs, that's the real one).

Reply to this note

Please Login to reply.

Discussion

No replies yet.