- Tuta (free): you can send only like 6 email per day. Otherwise, Tor-friendly. No onion. Support forum on Reddit 😞 Germany.
- Posteo.de: 1 €/mo affordable. Nothing fancy. Support via PGP like that’s common sense. Germany. Non-crypto anonymous payments w/ various options (e.g. a prepaid CC): they don’t even ask your name (much less address, cell phone number).
- Disroot.org: Free, pop/smtp, community-based, trusted even by the Tails team. w/ onion. Netherlands.
- Cock.li: Free, pop/smtp etc. Very Tor-friendly w/ fast onion. It’s good if you think it like disposal. Irresponsible in a way (aka Freedom), but actually 10-year-old & stable. Romania.
- Proton (free): bloated, very mixed opinions, yet better than Google. w/ onion (slow). Switzerland. A simple feature like Plain Text view is missing (HTML by default: not serious about privacy).
@ShadowRebel = @SummerBreeze Could you avoid a clickbait-ish title, though? Some users do find (some of) your posts informative and good. Stay cool and don’t sensationalize it :)
See also:
Secretive White House Surveillance Program Gives Cops Access to Trillions of US Phone Records
The French National Police is unlawfully using an Israeli facial recognition software [installed massively and secretly. The Minister ordered an investigation]
Their conclusion might be true in a way, but their “6-point proof” is uninformed if they’re criticizing Monero.
- “All stablecoins are not stable” ← irrelevant to xmr
- “Every non-stable coin is just a bigger fool scam, since there is no use case for crypto” ← what?!
- “Crypto destroys customer protections” ← “no middle men” is what we’re intentionally trying to achieve, at the cost of obvious risk
- “All consensus mechanisms are geared to allow the wealthy to control the crypto economy” ← That’s exactly what Monero is trying to avoid
- “Crypto gives great privacy protections to anonymous criminals and scammers and destroys privacy for anyone using the system as a honest user.” ← the first half is a valid criticism but the whole sentence doesn’t make sense
- “Crypto aims to prevent man-in-the-middle attacks” ← that’s not the main goal of xmr
Either way, Monero is not about making money, if that’s your point of view. Many of us are Monero users, not investors. Correct me if I’m wrong!
The linked article is inaccurate and misleading. Your wild guess is based on that.
Currently the best blockchain analytics publicly available about the incident is this by Moonstone, and even though it seems that the victim shared the secret key with them, nothing much is known due to the nature of the privacy coin. No way other analytics providers could tell more.
Check the original source and some of the comments there before making an irresponsible accusation like the attackers must be North Korean (or Russian, Muslim, Romany, …). A knee-jerk suggestion like that does not only promote unfair racism/stereotypes, but it helps cover up the real mastermind. Although, it’s not your fault that the article is misleading, and we can’t rule out any possibility including what you suggested. The real problem here is this confusing, poorly-written article…
Check kycnot.me - popular options include: localmonero; get coins you can get (e.g. bisq) and swap (e.g. trocador) - or you can do both on bisq too (Haveno is coming soon?)
Because my videos will be a bunch of Monero wallet tutorials.
Sorry I have to say this, but you misinformed people here, saying one shouldn’t use Feather on Tails. It’s okay, everyone makes a mistake, but you stopped engaging conversations here on Monero.town as soon as questions were asked related to your confusing statements. So I’m not sure how to feel about this, although what you’re trying to do seems generally interesting and your website can be informative if one doesn’t believe it blindly.
In fact, your website still claims “Although you’d think Feather wallet would be the slowest because of Tor, it’s actually very efficient and fast as a light wallet. Since the IP address is hidden” etc. which is kind of confusing (Feather is fast by default because syncing is not via Tor, so your IP is not hidden). You’d trivially know such basics if you were an actual wallet user, let alone someone suitable to author wallet tutorials. Perhaps you can help us with other things, not about Monero wallets. Thank you!
Since LibreWolf is libre software, it’s likely that a user has freedom to tweak this maybe via about:config. You just need to ask this directly in the LibreWolf community.
I think I know what you’re talking about, though. Perhaps CSS @font-face is forbidden, because many sites use Google fonts, which allows them to track you.
If Tor Browser is acceptable, give it a try. While TB too has very strict font restrictions to avoid finger-printing (so that a remote site may not know which fonts your system already has), web fonts are allowed by default. It’s relatively harder to distinguish/track individual Tor users, since TB hides your real IP & by default cookies are per session only.
LibreWolf shows your real IP, so it’s understandable and reasonable that it wants to be more careful about fonts. Still a user should be given freedom to do whatever, at their own risk. That’s what free software is all about, after all. Just a thought…
So you are lolcat and spamming the link to 4get.ca? If so, that makes you look a bit uncool.
Good things: unlike DDG or MetaGer, zero tracking. zero ads. Clean. Unlike SearXNG, you’re not using Github (a good move). This might become huge. The fact that it’s not perfect now, doesn’t matter.
Bad things: Obviously it’ll be hard to be better than SearXNG. A donation link is especially bad; ko-fi.com itself can be there, but… In the donation campaign, SearXNG accepted crypto, while you’re only using a Paypal-like thing. That’s not really cool.
Get Tor Browser and/or Tails OS. When privacy is important and you need to be anonymous, use only Tor-friendly instances only via Tor (never once log in showing your real IP - if you accidentally do that, you'll have to re-create another account as a different person).
When an email address is necessary to sign up, get one anonymously (again using Tor Browser), from a privacy-centric company or group, e.g. Tutanota, Disroot. Needless to say never ever use Gmail. https://tosdr.org/en/service/217
Allegedly the “evil hacker” had stolen 2,675.73 XMR, and now allegedly someone “returned” 2,696.73. This feels suspicious, especially 0.73. Thoughts?
PS nitter.net unblocked Tor again. A Tails-friendly link just in case Tor will be re-blocked
https://nitter.oksocial.net/watchfund/status/1732391070216908886