English is not even my second language but it keeps me amazed at how "laughter" is a subset of "slaughter".
Fully self-hosted and open-source, servers.guru uses it, as an example.
Bitcart is fully self-hosted. Servers Guru uses it, as an example.
Servers, domains (although that's more rare), virtual numbers (even esims), refills or vouchers for many existing services, and, in some countries, there even are proxy stores that allow you to buy anything physical from ebay/amazon without disclosing your payment data to them.
I don't see bitpay as often as coinpayments, cryptomus, bitcart, whitebit and others that just allow you to send crypto directly from your own wallet to the specified address.
You can search for some examples at cryptwerk.com, but the list is quite incomplete there.
Still, your address isn't tied to your name (and it won't if you do everything right) and if your balance doesn't exceed six figures (which it shouldn't if you do everything right) then you're much less likely to be noticed by Tether than by your local bank/govt in case of paypal.
I mean, Tron chain itself is not freezable, it's in the smart contract logic. Same picture for USDC. But yes, I have no idea what to use instead of USDT-TRC20 yet, and Ethereum chain is too greedy in terms of fees IMO.
Solana tokens are all freezable by design as far as I see.
Ok. I studied the USDT contract again and it looks like yes, the contract owner has a possibility to blacklist individual Tron addresses as well. Nasty. https://tronscan.org/#/contract/TR7NHqjeKQxGTCi8q8ZY4pL8otSzgjLj6t/code
AFAIK there is no possibility of targeted freezing of USDT-TRC20 transactions on the token smart contract level.
Is there any proof that it can ever be done on the Tron network?
Signal is available outside of Android, but you still need Android (or iOS) to use it outside of Android, which kinda defeats the purpose. As far as I remember, this BS was modeled after WhatsApp.
The issue with spam is mostly related to numbers leaking elsewhere.
While packing a bunch of keypad phones (16, to be exact) and three androids to bring to my best friend tomorrow, I caught myself in the following thought.
There exists only one kind of people I really envy nowadays: those who can live without a cellphone at all.
Yes, that is annoying and I understand the complaints.
But Signals draw is for everyday people that want easy accessible privacy. We aren't the target audience. Most people have phones. Signal is available on iOS too not just Android.
The phone number requirement is for simple spam deterrence and convenient contact discovery for users. Signal can't see phone numbers or contacts because everything is hashed client-side on your device before it goes to their servers.
But like I showed above it's fairly easy to get around using your real phone number and register in an anonymous way. And because of sealed sender Signal can't see your social graph. You can also use forked Molly client for even more security and privacy.
Signal is open source and reproducible so you can verify what the code is doing yourself:
https://github.com/signalapp/Signal-Android/tree/main/reproducible-builds
https://www.signal.org/blog/sealed-sender/
Spam deterrence? There is a lot of Signal-targeted spam these days, specifically through the leaked number databases. It has almost reached the WhatsApp/Viber level of scale where I live. Convenience and security rarely go hand in hand.
If someone uses iOS, what kind of privacy are we talking about, regardless of what's being offered on the application level? It's like typing in the most secure password manager on a keyboard with a hardware keylogger embedded into it. Those who use iOS look like someone who deliberately wants to get pwned, and if one really is privacy-serious, any apple (as well as m$ and google and xiaomi/huawei/etc) products are the first things to get rid of unless you can install a fully custom FOSS system on them. If possible, I'd advise to get rid of anything with non-removable batteries either (unless you can Faraday-cage those things when necessary), but, alas, as of now I can't follow this recommendation myself.
Don't get me wrong, I salute any privacy-improving effort, but a service running on top of the the stock irreplaceable vendor's spyware and collecting phone numbers (which are sometimes totally KYC in some countries, luckily not in mine... yet) upon registration hardly looks like any improvement. And to those who don't know the real deal (and don't buy temporary SMS verification specifically for this purpose), such services can give a false sense of privacy and an illusion of safety. Because you know, there are some places where you can get arrested just for using encrypted calls. With exposed numbers, it is too easy to confirm that you are you (even if they are not KYC but used for PSTN calls or other signups). So, even to noobs, I'd recommend Linphone or SimpleX instead.
Yep, something like that. Except it's not 2009 anymore and we have some cryptos that suit the cypherpunk philosophy much better. They even get delisted for this.
Thanks.
You really like having no alternative to using touchscreen bricks with preinstalled bloatware and illusions of choice, I get it.
Really makes it worth revisiting my attempts to put together a SIP client for KaiOS 2.5.x whenever I have enough time. Although KaiOS is a huge mess on it's own, it's at least _some_ alternative when it comes to userspace.
Depends on the weather where you live.
Here's what the official website says:
> To use the Signal desktop app, Signal must first be installed on your phone.
What if I don't have a phone (in fact, pocket PC) where Signal can be installed? Like, at all. I'm a keypad maxi.
Of course I do have some Androids as well, but what if I don't?
Why do they make this so fucking complicated for those who really are freedom-first? Even Telegram doesn't care where you're registering from.
With a name similar to OnlyFans, it might end up being a paid feature.
Useful public STUN server list, updated regularly: https://gist.github.com/mondain/b0ec1cf5f60ae726202e