Avatar
Ross
7ba14840967b301428dc7eb402687379ce854c4d6cafc35aa1fb76aca63cbe2b
#Bitcoin maxi Running #Bitcoin There is no freedom without privacy

Looks pretty clear to me πŸ˜‰ 2sats/vB right now

🀣@note1sgs4y55lalp5uhsjyat3vjartzs6pwtzzh9lwumhderq9vwkvr2syqfd3a

I appreciate the ⚑ #[0]

I confess I also don't know how it works in detail, perhaps it is possible to verify with an air gap!? But even then it sounds terribly centralized to me. If it was me, I wouldn't use the PIN server verification for that reason. Just use a Bip39 passphrase and you can negate much of the risk of not having a secure element. I guess in the end it depends on ur threat model and the tradeoffs you are willing to make..

PV fren πŸ€™

Yes, you can definitely use Jade fully air-gapped with the built-in cam via QR (a great feature imo).

My point is, to get the benefit of the simulated secure element using the PIN server, won't the device need to be connected via USB cable?

Not sure I like this model too much. Doesn't allow for fully air-gapped use.

Fuck Racism!

Thanks for the zap ⚑ Followed 🀝

Replying to Avatar ODELL

A Cypherpunk's Manifesto

Eric Hughes

March 9, 1993

---------------------

Privacy is necessary for an open society in the electronic age. Privacy is not secrecy. A private matter is something one doesn't want the whole world to know, but a secret matter is something one doesn't want anybody to know. Privacy is the power to selectively reveal oneself to the world.

If two parties have some sort of dealings, then each has a memory of their interaction. Each party can speak about their own memory of this; how could anyone prevent it? One could pass laws against it, but the freedom of speech, even more than privacy, is fundamental to an open society; we seek not to restrict any speech at all. If many parties speak together in the same forum, each can speak to all the others and aggregate together knowledge about individuals and other parties. The power of electronic communications has enabled such group speech, and it will not go away merely because we might want it to.

Since we desire privacy, we must ensure that each party to a transaction have knowledge only of that which is directly necessary for that transaction. Since any information can be spoken of, we must ensure that we reveal as little as possible. In most cases personal identity is not salient. When I purchase a magazine at a store and hand cash to the clerk, there is no need to know who I am. When I ask my electronic mail provider to send and receive messages, my provider need not know to whom I am speaking or what I am saying or what others are saying to me; my provider only need know how to get the message there and how much I owe them in fees. When my identity is revealed by the underlying mechanism of the transaction, I have no privacy. I cannot here selectively reveal myself; I must always reveal myself.

Therefore, privacy in an open society requires anonymous transaction systems. Until now, cash has been the primary such system. An anonymous transaction system is not a secret transaction system. An anonymous system empowers individuals to reveal their identity when desired and only when desired; this is the essence of privacy.

Privacy in an open society also requires cryptography. If I say something, I want it heard only by those for whom I intend it. If the content of my speech is available to the world, I have no privacy. To encrypt is to indicate the desire for privacy, and to encrypt with weak cryptography is to indicate not too much desire for privacy. Furthermore, to reveal one's identity with assurance when the default is anonymity requires the cryptographic signature.

We cannot expect governments, corporations, or other large, faceless organizations to grant us privacy out of their beneficence. It is to their advantage to speak of us, and we should expect that they will speak. To try to prevent their speech is to fight against the realities of information. Information does not just want to be free, it longs to be free. Information expands to fill the available storage space. Information is Rumor's younger, stronger cousin; Information is fleeter of foot, has more eyes, knows more, and understands less than Rumor.

We must defend our own privacy if we expect to have any. We must come together and create systems which allow anonymous transactions to take place. People have been defending their own privacy for centuries with whispers, darkness, envelopes, closed doors, secret handshakes, and couriers. The technologies of the past did not allow for strong privacy, but electronic technologies do.

We the Cypherpunks are dedicated to building anonymous systems. We are defending our privacy with cryptography, with anonymous mail forwarding systems, with digital signatures, and with electronic money.

Cypherpunks write code. We know that someone has to write software to defend privacy, and since we can't get privacy unless we all do, we're going to write it. We publish our code so that our fellow Cypherpunks may practice and play with it. Our code is free for all to use, worldwide. We don't much care if you don't approve of the software we write. We know that software can't be destroyed and that a widely dispersed system can't be shut down.

Cypherpunks deplore regulations on cryptography, for encryption is fundamentally a private act. The act of encryption, in fact, removes information from the public realm. Even laws against cryptography reach only so far as a nation's border and the arm of its violence. Cryptography will ineluctably spread over the whole globe, and with it the anonymous transactions systems that it makes possible.

For privacy to be widespread it must be part of a social contract. People must come and together deploy these systems for the common good. Privacy only extends so far as the cooperation of one's fellows in society. We the Cypherpunks seek your questions and your concerns and hope we may engage you so that we do not deceive ourselves. We will not, however, be moved out of our course because some may disagree with our goals.

The Cypherpunks are actively engaged in making the networks safer for privacy. Let us proceed together apace.

Onward.

πŸ‘€

#[0]

Coin control is often overlooked as a tool for protecting your privacy. Anyone sending #Bitcoin transactions should practice it or at least be aware of it.

πŸ‘‡

A good modern Bitcoin wallet will allow you to view and label individual "coins" or UTXOs (unspent transaction outputs) that together make up your wallet's total Bitcoin balance.

When sending a payment, your wallet bundles together enough UTXOs to cover the payment amount.

This combining of coins could give away secrets about you that will forever be inscribed on the blockchain - no bueno!

For example using a large denomination UTXO for a small payment would leak to the payee (and anyone else watching) information about your BTC balance. You could also accidentally DOX your non-KYC or coin-joined stash by combining their UTXOs with coins you recently bought on Kraken or Coinbase. The list goes on.

Therefore please practice coin control πŸ™and use a wallet that lets you do this. Sparrow and Electrum are good examples but there are many others.

Before making a payment, go to the UTXO tab and carefully select the UTXOs you want to use for the payment (this is where labelling comes in handy) keeping in mind the information others might glean from different UTXO combinations. The transaction input for the payment will now comprise only the selected UTXOs, ideally revealing as little information about you as possible.

πŸ‘‰tldr: active coin controll through labelling and selecting of UTXOs for Bitcoin transaction inputs is an underused feature that has the potential to greatly enhance your privacy and security.

PVπŸ€™

Bitcoiners moving to a new decentralized communications protocol, taking #Bitcoin history with them 🧑

#[0]

Bitcoiners moving to a new decentralized communications protocol, taking #Bitcoin history with them 🧑

Replying to Avatar Lyn Alden

I published a new macro article today: https://www.lynalden.com/broke-federal-reserve/

Since September 2022, the Fed has been operating at a financial loss. This article examines some of the ramifications of that. The main result is that money that would otherwise flow to the US Treasury now flows to US banks and money market funds instead.

Sharing it on Nostr today and Twitter tomorrow. ;)

#[0]

Good man! Made the transition from iPhone to Graphene on a Pixel a year ago and not looked back.

depends on what you want to do with ur bitcoin. If you want to spend it regularly from your mobile wallet, then watch-only is probably not for you. If you want more of a cold storage setup and use it mostly to receive only / stack sats (to generate receive addresses and check your balance), then watch-only is a great option. Better security for sure. I use watch-only mobile using Blue Wallet for a small amount of btc. Hope that helps.

Not healthy, this should not be normalized!

PS: watch only wallets are a great way to improve your security. It allows you to monitor your coins and receive directly into cold storage. The private keys never touch your wallet so funds are SAFU.

For desktop I highly recommend sparrow wallet. Works great as a full wallet AND as a watch-only. Its a Bitcoin only wallet with great functionality and UX imo.