Completion of the Human Genome Project, development of CRISPR-Cas9 gene editing, commercialization of reusable rockets (Falcon 9), detection of gravitational waves, discovery of the Higgs boson, discovery of thousands of exoplanets, emergence of large language models and generative AI, invention of graphene, first-ever image of a black hole, successful landing of a rover on Mars (Curiosity and Perseverance), development of CAR-T cell therapy for cancer, advancement of quantum computing with demonstrated quantum supremacy, creation of the first synthetic bacterial cell, discovery of accelerating cosmic expansion (dark energy).
Might've forgotten a few along the way.
Hey man, it's right enough to have given us computers, the internet, rockets, cars, refrigeration, airplanes, and all the technological wonders of the modern world.
#FreeSamourai π₯ π₯ π₯
"Mr. President, this week, a man named Keoni Rodriguez is going to federal prison for creating crypto privacy software.
The case was started under the Biden administration, but your DOJ kept it going and secured the conviction.
A lot of people in crypto are saying that this man should be pardoned.
Are you familiar with the case at all, or would you be interested to be there?
I've heard about it. I'll look at it. Well, you think you should be pardoned?
Sounds like it. Sounds like basically your question.
Many people in... Rodriguez, we'll look at that, Pam. Okay? Let's take a look at it.
You'll have to tell me. I don't know anything about it, but we'll take a look."
https://blossom.primal.net/9c2b56efcfe60f33ff165915e20b26eb5f3810a4f6addfa1fcf06f6ac3322b18.mp4
Literally Hitler!!oneoneeleven
You may say I'm a dreamer
But I'm not the only one
Every full node does all the time.
You can perform logical and mathematical operations on things even not knowing said things, as long as certain equations hold.
Holiday stress gets people due to heart attacks!
The tragic face everyone who's ever had boat accident PTSD can make.
Diversity, the gift that keeps on giving.
You never have privacy on bitcoin mainnet. Addresses, asset type and amounts are always known.
You get weak pseudonymity which you can "reset" by doing a coinjoin.
Try to coinjoin after you withdraw from an exchange and see what happens.
That's the lack of privacy biting you in the ass.
You're conflating privacy with anonymity.
The exchange knows who you are, so no anonymity there.
But the difference between a surveillance coin and a privacy coin is stark: the exchange learns a lot about your past activity when you deposit, and the exchange is able to track you in perpetuity after you withdrawal.
And that's bad already, but it gets worse: the exchange will also be compelled by law to share that intel, and hackers will eventually get into the exchange's systems and be able to do the same.
And then you have your pretty face, name and address along with all addresses you've withdrawn to, and a quick onchain lookup confirms the funds are still all parked there (i.e, you have them in self-custody).
How do you think people are targeted?
It's usually not random.
And only a fool couldn't see it coming.
Turns out, there are lots of fools out there.
Imagine: power-hungry bureaucracy takes the opportunity to exert even more control by leveraging most crypto's radical, blatant lack of privacy and weaponizing it against users.
Think for yourself and question everything.
Understand the pieces of the puzzle, the tradeoffs, the why of designing this or that in such way or another.
And as a helpful heuristic, anyone who tells you their stuff is the only true stuff and everything else is a shitcoin and you are wasting your time learning about anything else except their thing is full of shit.
You don't need to become a world-class cryptographer. At some point you'll need to trust certain assumptions.
But even then you can select for open-source, peer-reviewed, etc.
Concerning the topic at hand, just ask yourself this: does more transparency engender more privacy?
And does less privacy engender more freedom and personal autonomy?
Think long and hard about it. Those are some pretty relevant questions today.
Like clockwork.
Lightning.. lol. Not even bitcoiners use it, outside certain bubbles - which by the way, genuinely puzzles me.

Before Satoshi wrote a single line, there was already a battle cry: "Privacy is necessary for an open society". The Cypherpunk Manifesto wasnβt just a text, it was a call to build. Mostro π§ comes from that lineage: sovereignty, code, and resistance. Read it. Share it.
Return to the roots: https://cdn.nakamotoinstitute.org/docs/cypherpunk-manifesto.txt
The solution has existed for close to a decade now.
If only people would treat tools as tools rather than religions π
Can the average joe, even?
A leftist who realizes they've been had, and a leftist white womanβ’ to boot?
Ok, this one I did not see coming.

*unless nostr
No, I'm saying it's a funny meme but if you add up all core and all knots, core comes up on top by a wide margin.
Well, parents have their not-so-small share of responsibility there too.
Of course, when it's time for the hard evidence you skip town.
The ego is a powerful thing, and projection is rampant.
Best of luck to you too, and if it comes to that, remember not to choose the side that cheers on political assassinations.
https://video.nostr.build/96cde2d699b31ba2ba04271820059f27f73dbb29ff00290c650aac67f6955806.mp4
https://video.nostr.build/d653093c048587e2ad725d5f1d1e190a5aebdca2b03f7d491c43f79f223e6839.mp4
https://video.nostr.build/2d2cf608e25a3bc25a332a177221817069bbcc229c59013efa5a69ab889b4e02.mp4
Great, now point me to entire threads of MAGA, conservatives and libertarians laughing about those deaths and compiling lists for more people to target.
Oh, you can't?
Congratulations, now you understand the difference.
.... watch the video I literally posted in reply above?
I get it, the cognitive dissonance is too much to bear.
Do it on your own time. You'll break through eventually.
Nothing like this. A few loose screws, nutters.
And more importantly, the Right in general does NOT cheer them on, or celebrate it, or gleefully laugh at the demise of their opponents.
Look around, read the comments, ask your leftist friends what the mood is in their circles.
It's not everyone, but it's almost all of them.
They think of conservatives as Nazis, so by that "logic" killing Nazis is perfectly justifiable.
https://video.nostr.build/dab4de0320bf3b7a0b81baea0c1434ced5e7b55f0d7cbeb5463675adc6f94fc6.mp4
You're still thinking of kindness when you're dealing with savage animals WHO WANT YOU DEAD.
It's time to wake up to the harsh truth.
This changes everything.
Introducing Mapleβ―Proxy β a powerful bridge that lets you call Mapleβs endβtoβendβencrypted LLMs with any OpenAIβcompatible client, without changing a line of code. https://blossom.primal.net/19887ff7b4b7c95e1b195c5b7790f9457035a75cb5e6690dab0129fc4cb2dc2c.mp4
Read the full announcement or check out the thread
so Maple + goose = β€?
Glad I'm not the only who noticed all the losers coming out of the bushes recently with the #monero drama.
https://reddit.rtrace.io/r/Monero/comments/1ms1zd3/why_do_bitcoiners_hate_monero_so_much_because_a/
How bad actors try to track Monero
Depending on your operational security, the combination of the various attack types in this article may reduce your privacy significantly, to get the real spend in a ring signature.
These methods have been used to arrest the Incognito Market admin, the operators of Archetyp, a Colombian drug dealer, a Finnish blackmailer, the Bitfinex hacker and 18 Japanese fraudsters.
---
# Eve-Alice-Eve attack
This oneβs like a sneaky collusion trick. Two parties (both called Eve) team up to figure out whoβs behind a transaction with Alice. Eve1 sends Monero to Alice in one transaction; Eve2 receives Monero from Alice in another.
They compare their transaction records, if Eve1βs address shows up in Eve2βs ring signature, or if amounts and times match up, they can pretty confidently say Alice was involved. Repeating this over and over makes their case even stronger.
---
# Poisoned output attack
Think of this like "marked bills" in the physical world. Here, the attacker "poisons" some Monero outputs, either with a unique amount or a specific pubkey, and then watches to see if those outputs get sent to someone who knows the identity of those who send them monero, and who has agreed to share data with the attacker to help identify the target.
If the target sends that marked Monero to a known colluder, the attacker can identify who sent it. Repeated use helps build a stronger case.
---
# Timing analysis attack
Sometimes, targets try to dodge the poisoned output trap by splitting amounts or churning (sending to new addresses repeatedly). But if theyβre doing this on a regular schedule, attackers can catch on by watching the timing between transactions.
For example, if an attacker notices that every Tuesday, a certain person receives Monero and then quickly sends it out again, that pattern can reveal who they are, even if they try to hide it.
Anti-privacy adversaries can leverage timing information to increase the probability of guessing the real spend in a ring signature to approximately 1-in-4.2 instead of 1-in-16.
---
# Decoy elimination attack
This trick is handy if someone has a list of transaction IDs and thinks their target sent Monero in those transactions. They might get this list by scanning the blockchain for transactions that include a special kind of public key known to belong to the target, or from someone whoβs interacted with the target a few times, like an exchange or a store.
Once they have the list, they can look up those transactions and check the signatures inside them. These signatures include a bunch of public keys used to hide who actually sent the money. The attacker checks if any of those keys are theirs or someone they know. If they find a match, they can ask the owner if they made that transaction. If not, then that key was just a decoy, not the real sender.
This method helps the attacker narrow down the possible real sender. In the worst case, they can remove all the fake keys and figure out exactly who sent the Monero. From there, they might trace the transaction back or forward, using the same or different techniques, to follow the moneyβs trail.
---
# Spy node attack
Monero transactions are broadcast through nodes, some are run by honest users, others by malicious actors (spy nodes). If your wallet sends transactions through a spy node, they might log your IP address, which can then be linked to your transaction and real identity.
Full nodes try to protect you with protocols like Dandelion++, but theyβre not perfect. Attackers can exploit this by seeing if a transaction is still in its "stem" phase, which can leak your IP.
---
# Tx history lookup attack
If an attacker manages to get hold of your private keys (say, during a raid or if you accidentally share them), they can look up your entire transaction history on the blockchain. This helps them see all the Monero youβve received and sent.
References:
https://www.getmonero.org/2025/04/05/ospead-optimal-ring-signature-research.html
http://openmonero.com/knowledge/how-bad-actors-try-to-track-monero
#Privacy #Markets #HiddenService #News #Work #Monero #Crypto #Hacking #HarmReduction #Guides #Bisq #cakewallet #haveno #retoswap #trading #p2p #escrow #localmonero #dex #cex #moneroju #xmrbaazar #security #agorism #cypherphunk #rugpull #transparency #stats
The real deal instead of the nostr:nprofile1qqszrqlfgavys8g0zf8mmy79dn92ghn723wwawx49py0nqjn7jtmjagpz4mhxue69uhkummnw3ezummcw3ezuer9wchszyrhwden5te0dehhxarj9ekk7mf0qy88wumn8ghj7mn0wvhxcmmv9uynmh4h bullshit.
The term "nuclear energy" is technically accurate but less commonly used than "nuclear power." The phrase "nuclear power" is more conventional and specifically refers to the generation of electrical power from nuclear reactions. "Nuclear energy" is a broader term that encompasses the energy released from nuclear reactions, which can then be converted into various forms, including electricity (nuclear power), heat, or other applications.
So, while "nuclear energy" is not incorrect, "nuclear power" is the more standard and recognized term in the context of electricity generation.
Single strong and independentβ’ women overwhelmingly vote for the big government-daddy-husband who "gives" them their "fair share" of other people's money while it brainwashes and propagandizes them with rampant faux-virtue oh-i-am-such-a-good-person rampant leftism.
Shocking, shocking. Who could have foreseen it!












