Saki

joined 2 years ago
MODERATOR OF
[–] Saki@monero.town 1 points 2 years ago* (last edited 2 years ago) (1 children)

When trying to swap something to XMR (esp. a large amount? or at a small CEX?), it seems that there is always a possibility that the CEX (which may claim you can swap any amount) may not actually have enough XMR.

(They might be offering to sell Monero, when they don’t have enough.)

PS. Historically there are a few warnings: https://metager.de/meta/meta.ger3?eingabe=Exolix%20Monero

[–] Saki@monero.town 1 points 2 years ago* (last edited 2 years ago) (2 children)

You clearly said: “Unlike others exchange aggregator Intercambio is created by Trusted Monero Community members” — implying yours is better, more trusted than Trocador.

If you’re “friendly”, you can ask, “I don’t understand what you mean. Could you explain?“ — Saying “Yes theres uBlock, and ?” doesn’t sound too friendly, not willing to learn new things. It’s irrelevant whether you personally dislike me or not; what you do is honest and good, your business might be successful. We’ll see.

[–] Saki@monero.town 1 points 2 years ago (3 children)

See also: https://monero.town/post/942859 How to sell $300k+ Monero without origin of funds?

[–] Saki@monero.town 1 points 2 years ago

@heikomat@lemmy.world If you’re still interested, now the recommendation is, that “in” is bigger: https://monero.town/post/1163754

[–] Saki@monero.town 0 points 2 years ago

the market made it’s choice

Theses networks usage peaked the last bullrun

Perhaps by “the market” you mean like exchanges, where investors trades tokens. Most ppl here use xmr to buy things or services. That might be why you sound a bit off.

[–] Saki@monero.town 1 points 2 years ago (5 children)

Imho this idea seems a bit too pushy, while your monero.im multisig escrow experiment is respectable. (I have nothing against you personally. Some of your ideas are interesting! Ideas and a person are different.)

You claimed you’re a “Trusted Monero Community member”; you claimed “I’m pretty known” To cover up these false claims “retrospectively”, now you’re trying to become better-know here (so your pro-profit business might be successful).
Recently you made several questionable moves: you said your page is no-js no-log but CF becon js is there. You didn’t understand Tails uBO subtlety either. And you disrepect Trocador.app … Frankly your posts seem a bit iffy. Nevertheless, some of your ideas might become splendid ones :)

[–] Saki@monero.town 3 points 2 years ago (1 children)

Are you new to Monero? To ditch something, you’d have to use it in the first place.

In some areas, xmr are used more than btc, and that was like last year’s news.

[–] Saki@monero.town 1 points 2 years ago (1 children)

Both in the EU and in the US… things are not looking too good.

Pysh also objected to FinCEN’s record-keeping demands regarding “anonymity enhanced CVCs.” These refer to digital assets with enhanced privacy protocols like Monero.

To FinCEN’s credit, malicious actors like North Korea’s Lazarus Group have certainly used Monero to launder money while covering their tracks. However, everyday US citizens also use Monero for legitimate purposes, like purchasing art, video games, or even gifting presents when the sender wants the gift to be a surprise even for tech-savvy recipients.

[–] Saki@monero.town 1 points 2 years ago* (last edited 2 years ago) (2 children)

A copycat in a way, but having more options is not bad. Except this FAQ statement feels a bit disrespectful & preposterous.

Is it really anonymous?

Unlike others exchange aggregator Intercambio is created by Trusted Monero Community members who have years of experience in providing the best possible privacy to their users.

They mean, “Unlike Trocador”…?! “Trusted Monero Community members 🤥”???

image

[–] Saki@monero.town 0 points 2 years ago (1 children)

I meant the situation. Your assumption that Nitter instances are generally Tor-friendly (with only a few exceptions) used to be true, but anymore. The situation has changed and as such your understanding is slightly outdated.

[–] Saki@monero.town 1 points 2 years ago (1 children)

I’ll accept that you’re saying you did this out of good will. So you too can accept that the results were not necessarily ideal, as many instances are not (or no longer) exactly Tor-friendly.

When talking to Tails users next time, you might want to consider nitter.oksocial.net (officially used by EFF too)

[–] Saki@monero.town 2 points 2 years ago* (last edited 2 years ago) (1 children)

a nice no-log, no-js site…

https://static(.)cloudflareinsights(.)com/beacon.min.js/v84a3a4012de94ce1a686ba8c167c359c1696973893317 etc.

 

Having free and open-source tools and a decentralized way of fighting back and reclaiming some of that power is very important. Because if we don’t resist, we’re subject to what somebody else does to us

While Tor is useful in several situations, probably we shouldn't believe in it blindly. For clearnet, LibreWolf is a great option too, and I2P might be the future.

 

The Online Safety Bill, now at the final stage before passage in the House of Lords, gives the British government the ability to force backdoors into messaging services, which will destroy end-to-end encryption.

Requiring government-approved software in peoples’ messaging services is an awful precedent. If the Online Safety Bill becomes British law, the damage it causes won’t stop at the borders of the U.K.

Random thoughts...

Even if platform-assisted end-to-end encryption (pseudo e2e) is censored, perhaps we could still use true user-to-user encryption. If "end" means the messenger software itself or a platform endpoint, then the following will be true e2e - "pre-end" to "post-end" encryption:

  1. Alice and Bob exchange their public keys. While using a secure channel for this is ideal, a monitored channel (e.g. a normal message app) is okay too for the time being.
  2. Alice prepares her plain text message locally: Alice.txt
  3. She does gpg -sea -r Bob -o ascii.txt Alice.txt
  4. Alice opens ascii.txt, pastes the ascii string in it to her messenger, sends it to Bob like normally.
  5. So Bob gets this ascii-armored GPG message, and saves it as ascii.txt
  6. gpg -d -o Alice.txt ascii.txt, and he has the original Alice.txt
  7. He types his reply locally (not directly on the messenger): Bob.txt
  8. gpg -sea -r Alice -o ascii.txt Bob.txt and sends back the new ascii string
  9. Alice gets it, so she does gpg -d -o Bob.txt ascii.txt to read Bob.txt

In theory, scanning by government-approved software can't detect anything here: Alice and Bob are simply exchanging harmless ascii strings. Binary files like photos can be ascii-armored too.

Admittedly this will be inconvenient, as you'll have to call gpg manually by yourself. But this way you don't need to trust government-approved software at all, because encryption/decryption will be done by yourself, before and after the ascii string goes through the insecure (monitored) channel.

1
Bad Internet Bills (www.badinternetbills.com)
 

Congress is trying to push through a swarm of harmful internet bills that would severely impact human rights, expand surveillance, and enable censorship on the internet. On July 20, we’re launching a week of action to get loud about our opposition to legislation like KOSA and EARN IT and demanding that Congress focus on passing badly needed comprehensive privacy legislation to actually protect us from the harms of big tech companies and data brokers, instead of pushing through misguided legislation before August congressional recess.

view more: ‹ prev next ›