Avatar
Skhron - VPS for Bitcoin, Lightning and Monero
2641c5060e4eec82089fdb2c9eb84714660fddf7c23a01d731311481983f0175
Privacy-first VPS hosting provider. Servers in Poland, Warsaw and Sweden, Stockholm. We use only own colocated equipment and operate own network behind AS215467. Check us out: - http://skhroneuxrnchfz3wifchkju6spd3nx4krqe6zbx65hsax7qsbubb4qd.onion/ - https://skhron.eu/ - https://skhron.com.ua/ is our old website We accept Bitcoin, Lightning and Monero using self-hosted BTCPayServer and bitcart.ai instances We also operate our own lightning node (CLN): https://amboss.space/node/02f16437c2b9bf9f38bc4a57d7f32d7c36633725392cebf1faadea11b4ea855a7b

To actually own IPv4 block you need to be a LIR, having only ASN is not sufficient. I don't know much about ARIN, but at RIPE it is pretty expensive to be a LIR. It only makes sense if you have large address space, not for a few /24s.

At least you are not flooding those replies

Replying to DesertNomad

💥 Your Bitcoin is at Risk — Read This or Lose Big! 💥 (1 min read)

Too many bitcoin holders are sleeping on the real #dangers out there — physical #attacks are rising! Don’t wait until it’s too late to secure yourself.

You NEED to #protect yourself. Duress wallets? They sound smart, but they’re a double-edged sword. 😱 They can either help you escape or make the situation even worse.

Why #DuressWallets are #Risky:

People who operate outside the law don’t play by rules we understand. Negotiating with a criminal on paper might seem easy, but in real life, it's a whole different game — especially when you're dealing with someone whose mental state is unpredictable.

💣 If they sense you’re holding back, things could escalate fast. And with #duress wallets, it’s pure speculation. We simply don’t have enough evidence to say they consistently work. We’ve seen cases where victims gave up something, and the attackers came back for more. You could be dealing with organized criminals who’ve been watching your every move.

What You Can Do Instead:

Don’t rely solely on duress wallets — they might escalate #violence or make #attackers suspicious.

Stay invisible — practice good #privacy. Don’t make yourself a target in the first place.

Spread your funds in multisig vaults — distribute across multiple locations for added security.

Risks of Ignoring This:

You could lose everything — some attackers will come back for more if they sense you’re holding out.

Your #life, or that of your loved ones, could be at risk if negotiations break down.

Legal trouble — misleading an attacker could even lead to more severe outcomes, or complicate things if the law gets involved.

The best #defense? Strong privacy and securing your #assets across multiple locations using multisig tech. Casa’s vaults can help ensure you don’t become an easy target.

🔗 Follow for more tips and stay updated on how to protect what’s yours! Repost this — your network needs to hear this. #Safety #Bitcoin

I would agree that "Stay invisible — practice good #privacy. Don’t make yourself a target in the first place" is the best approach, however is not applicable for public persons, as they are inevitably will be targeted.

As for duress wallet is makes you an easy target even for non-targeted attackers, which is not a good in long-term.

Depending on personal wealth and environment one lives, different physical security measures should be applied.

If you meant fighting spam proactively - I guess there is no much room for improvement, but I don't think the situation will be worse with the grow of nostr

As nostr gets more popular given the incentives for relay operators, they are the ones who can implement faster moderation due to monetization, which also acts as a fee for an attacker to start an attack

afaik there is poor support for iOS/MacOS

I am not using them personally, have a friend who is struggling to use Syncthing

Replying to DesertNomad

Personal Online Hygiene Security - If you have #Bitcoin be smart. (2 min read)

This list is intended to give you better protection against criminals. Please add your ideas at the end.

Protect your DNA

Secure any samples of your #DNA to prevent unauthorized access or misuse, while weighing the pros and cons of genetic information use.

Detect your leaked information on the #DarkWeb.

Use a forwarding address when dealing with unknowns

Employ a #forwarding address to shield your primary address from potential exposure when interacting with unfamiliar parties.

Compartmentalize your activities and data

Separate different areas of your #digital life to minimize exposure in case one area is compromised.

Privacy guard

Utilize services that help keep your #personal information private, such as WHOIS #privacy protection for domain registrations.

Opt out of personalized ads

Prevent companies from using your #personal data to tailor advertisements based on your browsing behavior.

Assess risks regularly

Periodically evaluate potential #security risks to your #digital assets and #personal information.

Monitor trackers in apps and on websites

Keep an eye on and manage #tracking technologies that collect your personal data while you browse online.

Use smart key for extra security

Employ a physical #security key device to enhance the protection of your online accounts.

Opt-out of caller ID listings

Ensure that your phone number is not publicly available through #caller ID services to maintain privacy.

Self-host where possible

Host your own #services and #data to maintain greater control and reduce dependency on third-party providers.

Be careful with mail signatures

Use caution when including #signatures in emails to avoid inadvertently sharing sensitive information.

Be careful with auto-replies, they might reveal when you are away

Configure auto-replies in a way that does not disclose when you are not available or other personal details.

Don't reveal too much online

Avoid sharing excessive #personal details on the internet to prevent #identity theft or other risks.

Think of all interactions as public

Assume that any information you share online could be seen by others, regardless of privacy settings.

Think of all interactions as permanent

Recognize that online interactions may persist long-term, even if you delete the content.

Think of all interactions as high risk

Consider all online interactions as potentially exposing your #personal information to risk.

Avoid publishing geo data while onsite

Refrain from sharing your exact #location in real-time on social media or other platforms.

Remove metadata before uploading media

Strip out #metadata from files and images before sharing to protect your privacy.

Consider aliasing or anonymous forwarding for emails

Use email #aliases or forwarding services to keep your primary email address confidential.

Use subaddressing for emails

Add tags or variations to your email address to better manage and filter incoming messages.

Use a custom domain for emails

Create a personalized email address using your own #domain for enhanced privacy and professionalism.

Sync emails with a client for backup

Back up your emails locally by syncing with an email #client to ensure you have copies of important messages.

Use plain text in emails

Send emails in #plain text to reduce the risk of exposing sensitive information through formatting.

Avoid connecting third-party apps to your email account

Refrain from linking your email account with third-party #applications to minimize security risks.

Don't share sensitive data via email

Avoid transmitting #confidential information through email to protect your privacy.

Maintain an IP blacklist

Manage a list of blocked #IP addresses to prevent unwanted access to your #network or services.

Implement image cloaking

Use techniques to obscure or mask image #metadata to prevent tracking and privacy violations.

Monitor your credit report regularly

Regularly check your #credit report to detect unauthorized activity or potential fraud.

Review security settings on your devices and accounts regularly

Periodically review and update the #security settings on your devices and online accounts to ensure they remain effective.

Protect your SSID (Wi-Fi network name) from revealing personal info

Choose a neutral #SSID name for your Wi-Fi network to avoid disclosing personal information.

Hide your SSID to prevent unauthorized access

Disable #SSID broadcasting to make your Wi-Fi network less visible to unauthorized users.

Use a guest network for visitors

Set up a separate network for #guests to keep your primary network secure.

Change your router's default IP

Modify the default #IP address of your #router to make it harder for attackers to find and exploit it.

Kill unused processes and services on your router

Turn off unnecessary #processes and #services on your router to reduce potential security risks.

Physically secure your router

Place your #router in a secure location to prevent tampering and unauthorized access.

Disable WiFi on all devices when not in use

Turn off #Wi-Fi on your devices when they are not in use to reduce exposure to potential threats.

Encrypt sensitive communications

Use #encryption methods to safeguard sensitive information during transmission.

Educate yourself on the latest security threats and updates

Stay informed about new #security threats and updates to keep your systems and data protected.

Choose the right mail protocol

Select secure #email protocols, like IMAP over SSL/TLS, to protect the confidentiality of your email communications.

Disable cloud-based management

Turn off features that rely on #cloud services to manage your data, keeping data handling local.

Disable unused remote access protocols

Deactivate #remote access protocols that you do not use to minimize potential security vulnerabilities.

Protecting your digital life is essential in today's connected world. If you found these tips helpful, follow us for more insights, and don’t forget to share this guide with your network! Stay safe online! 🚀 #OnlineSecurity #PrivacyMatters

I would not recommend changing router IP address as it is pretty useless and is leaked using DHCP, so you gain no security benefit. However I would like to recommend implementing separate VLAN that has an access to admin UI and SSH or the router. OpenWRT allows you to dedicate physical Ethernet port to such VLAN so unless attacker gains physical access to the router, router's attack surface is pretty small.

There are some unfriendly hosting-providers who don't like even Tor relays, so as a precaution you should ask support and read their Terms of Service/Acceptable Use Policy beforehand.

I represent hosting provider skhron.com.ua (Tor mirror available) offering KVM VPSes. We are completely fine with Nostr/Tor relays (but not exit ones due to constant abuse complaint burden). We accept #Bitcoin, #Lightning and #Monero using self-hosted payment gateway (bitcart.ai) and do not require #KYC.

Get 150k sats inbound + outbound #Lightning liquidity: https://lightningnetwork.plus/swaps/20471

Useful for new nodes to dive into #LightningNetwork