01:25:49 cannon-c[m] : I would say the current state of privacy is BTC < LN < monero based on current literature. One big issue with LN privacy is that onion routing doesn't seem to be meeting the desired properties at the moment 01:26:43 I haven't spent substantial time on this, and the network is harder to analyze than Blockchain because there "moar stuff" is happening to make analysis more difficult 01:27:50 one issue I would expect to be (not-solveable?) is that each route is never going to be uniform 01:28:51 you cannot select a route from A->B->C uniformly because of liquidity selection. From an information theory perspective, this is suboptimal 01:28:52 whether people come up with crazy work-arounds to alleviate (or whether someone already has), I dunno 01:29:13 https://www.reddit.com/r/Bitcoin/comments/7rrjp3/is_onion_routing_appropriate_for_lightning_network/ is an interesting read, and afaik isn't completely full of crap 01:30:29 in other words, even with "onion routing" B can determine that A is the source based on inferred liquidity 01:30:35 ^*in some cases 01:40:16 In all honesty, we need an ample successor to the Tor Project. The Tor Project lacks independent bandwidth and geographical autonomy. If we could take on the principles of other networks, such as Tor, i2p and Freenet as well as private VPN solutions such as the patent concerning residential p2p networks which are under dispute and many arguments can be made against it, dissolving the patent, it would be a waste of time 01:41:21 to implement Tor into anything private outside of a marketing and publicity ploy. It could increase awareness about Monero by using Tor, but Tor isn't a really good platform for anonymity in it's current health state. 01:41:52 what patent? 01:42:20 There is a patent under dispute in the Marshall District/TX/Fed by a Lithuanian and Israeli company 01:42:34 over a patent concerning residential peer to peer nodes for using a vpn system. 01:42:53 ....high bullshit? 01:42:55 The patent was granted in Mar/2014, there is a lot of evidence that they didn't discover anything 01:43:48 Still under dispute, but something using a residential peer to peer vpn system would be a lot more geographically autonomous and would provide more independent bandwidth than the current Tor system which is predominately a few ASNs in a few countries. 01:44:02 so anyway, a network using padding/fill traffic is sorely needed 01:44:06 tor is a joke 01:44:58 the metrics for tor are pitiful. outside of marketing and awareness, I don't think anyone should be using it for increasing financial security. 01:46:19 right - tor is obviously weak when it comes to resisting 'traffic analysis' and the traffic analysis capabilities of so called 5 eyes (6?) are getting better by the day 01:46:45 they are getting better by the day, but we're 7 years ahead of the Snowden leaks. 01:46:48 is this in response to what I said? in this context onion routing was LN based and separate from Tor 01:47:16 I think we should consider Tor essentially a dead project, with components that would useful for deployment in a newer, more accessible system. 01:48:40 vtnerd, yeah different systems, though I wonder how does traffic analysis of the LN work? 01:49:22 I was reading the other day that someone got targeted ads from Google whilst using Tor Browser on reddit. I don't think anyone should recommend that system as future-proof. Anyone relying on it currently is doing so at their own peril. 01:49:30 its likely to have the same timing issues of Tor, if thats what you mean. I've seen this discussed ... somewhere 01:50:11 so you can correlate encrypted traffic like in tor? 01:50:19 Randomized Network Latency could change node connection predictability. 01:51:32 I think you need constant rate links, and reclocking of the streans, to avoid watermarking. 01:51:39 streams* 01:52:34 Possibly. 01:52:55 I don't recall seeing anything describing padding or randomized latency, but its difficult to keep up with an entirely different system Im not working on 02:52:16 source? likely they were using a windows computer or android phone. need technical info 02:54:07 https://www.reddit.com/r/TOR/comments/em5tjg/ad_targeting_even_when_using_tor/ 02:54:38 because using tor does nothing if your computer spies on you. Reading now 02:56:12 if you have javashit enabled, then you're going to be tracked 02:56:21 https://www.reddit.com/r/TOR/comments/epncwg/confirmed_ad_tracking_by_google_inside_new/ - I haven't read this one, but it seems to be quite a common issue using some alternative device fingerprinting. 02:57:41 KiloLima: lol. 02:57:41 'Because I want to obfuscate the fact that I'm using TOR from my ISP - they also have user profiling incentive - I am using either ExpressVPN or ProtonVPN before connecting to TOR' 02:57:46 interesting 02:58:05 but when I see the words "mac" and "chrome" this is admission of having spyware. Not sure if this spyware would be related or not 02:58:22 I am curious if any non windows or mac or chrome users experience this 02:58:56 Just got to wait for more samples. 02:59:11 I think arma would probably know more about what's going on 02:59:39 I know that googley phones and proprietary consumer computers can communicate with each other using ultrasonic sound 02:59:46 again, if you use javashit, you can be easily tracked 02:59:52 from what I heard. I wonder if this person also has a smartphone 03:00:08 and of course the tor assholes have javashit on by default 03:00:14 because of 'convenience' 03:00:16 need javashit to load any freaking website these days, why I only whitelist using no-script with tor browser inside sandbox 03:01:15 does the sandbox prevent fingerprinting? 03:01:51 hmmm let me check panopticlick 03:03:12 Hmm. If someone wants to fight fire with fire in the US, I wonder if it would work to claim "using tor is a protection system, trying to deanonymize a tor user is illegal circumvention of a security system". 03:03:42 Might not work since it's not your own computer though. 03:03:53 under common law, it's legal for US authorities to hack into any foreign system without a warrant if it may contain evidence of a crime. 03:04:00 security should not be relying on trusting governments or anyone to "please be nice". Security should be made to where even if someone wants to de-anon they cannot 03:04:06 (would only work vs coroporates of course, but that'd be pretty good already) 03:04:07 we seen that used with the Ross trial. 03:04:27 KiloLima they hack US computers illegally anyways. They do not follow laws 03:04:41 OK, missing the point by miles. Back to coding. 03:04:43 Apple got away with monitoring iPhone conversations between employees in a civil lawsuit 03:04:53 sorry 03:05:38 They're suing the guy who founded that chip business off mission college blvd in santa clara, using his own minute/text usage to other staff. 03:05:50 technically an unlawful wiretap 03:05:58 in the air of whether it can be used or not. 03:08:16 moneromooo, I assume you know about this https://www.cbsnews.com/news/telecom-immunity/ 03:16:20 Not sure. I know there are wide randing executive powers for "special" circumstances, usually short term but can be extended indefinitely. My point was about corporates doing this for ads. If you only cre about govt, fine. That was not my point though. 03:20:20 moneromooo, sorry, what I had in mind is that if one were to claim that businesses trying to deanonymize users is somehow illegal, the govt is likely to side with businesses, not users. The telecom immunity thing being an example. 03:22:47 By claiming "we feed off all of this, so it's a natsec issue" ? 03:23:11 I suppose they're kinda dropped the pretense since snowden. 03:23:59 heh 04:01:39 per panopticlick 04:01:39 "Within our dataset of several hundred thousand visitors tested in the past 45 days, only one in 2210.7 browsers have the same fingerprint as yours. 04:01:39 Currently, we estimate that your browser has a fingerprint that conveys 11.11 bits of identifying information." 04:02:15 on a tor browser inside a disposable vm, that I enabled all javascript on 04:02:35 of course I usually have javascript disabled. I am curoius what those 11 bits are, looking more into it. From conversation earlier 04:03:53 Im curious what other tor browser users get for resultss. Since panopticlick test multiple browsers not just tor browser 04:05:53 As for onion routing. I agree that Tor has concerns of timing based analysis. I wish there was something better than Tor or that tor would mitigate global passive adversaries better (does it?). The threat is a global passive adversary that can see all internet traffic in realtime five eyes. 04:06:22 I dont think Tor does random padding between hops with random millisecond delays? If not I think it should 04:08:16 And my research on Lightning is limited. So I could be wrong but I believe lightning packets have padding? I really am curious how resilient lightning is from passive internet observance. Especially if nodes use tor or i2p. 04:08:16 Not to stray off of topic of monero. Just mentioning this as we were talking about lightning earlier and privacy of ln vs xmr. Either way XMR is more privacy than BTC on the blockchain level. And it would be cool if xmr got something like lightning for scalability purposes 04:09:45 or a way to do xmr transactions that do not have to be on the blockchain layer, yet is still enforced by the blockchain layer, like lightning is 04:10:21 * or a way to do xmr transactions that can happen off of the blockchain, yet is still enforced by the blockchain layer, like lightning is 04:17:17 yeah i think second layer stuff like lightning will eventually happen on monero cannon-c[m] 04:17:32 I hope so :) 04:17:56 but if that happens, bitcoin is in trouble 04:18:02 likely 04:18:20 eh. the nation states will keep that one alive 04:29:36 hey does anyone know how anonymous it is to join a telegram group? what is disclosed? 04:31:25 knaccc: I take it you are already on Telegram. You can click this link. This is how your privacy settings should be set up. That way you do not disclose your phone number with anybody, no matter what. https://t.me/OpenSourceTelegram/109 04:31:42 rottensox ooh thanks! 04:32:12 Read these three channels: (i) https://t.me/CloudLeak, (ii) https://t.me/privacytoday and (iii) https://t.me/OpenSourceTelegram knaccc. 04:32:17 They have good content up there. 04:32:39 If on Android F-Droid has a FLOSS version of Telegram. Recommended. 04:32:57 https://f-droid.org/en/packages/org.telegram.messenger/ 04:33:07 https://github.com/Telegram-FOSS-Team/Telegram-FOSS 04:33:15 rottensox very cool, thanks. in general, would you say using telegram for private groups with anonymous membership is silly or pretty good? 04:35:06 cannon-c[m]: Within our dataset of several hundred thousand visitors tested in the past 45 days, one in 67.32 browsers have the same fingerprint as yours. 04:35:06 Currently, we estimate that your browser has a fingerprint that conveys 6.07 bits of identifying information. 04:35:14 knaccc: well... depends on what you consider 'private' to be honest. 04:35:15 That is without any JavaScript on the Tor Browser 04:35:34 and 'anonymous membership', since you're still coupling a phone number with it... 04:35:49 Running Windows 10 LTSC 04:36:29 let's suppose you use a burner phone to create a telegram account, set every privacy setting so that you don't leak phone number, last seen, can't be added to groups, yadda yadda yadda, and use a fake name and don't post sensitive data or use your face as your profile picture. it's okayish. 04:36:44 im checking with javascript disabled 04:36:55 rottensox i guess telegram have the ability to leak my memebership of groups... i'm more concerned with the group owner or participants seeing my identity. telegram seems to be where people are going for uncensorable communications 04:36:57 but you can find lots of useful input in this regard reading up on those three channels i directed you to, frankly. 04:37:06 JS is disabled Tor Browser is configured to safest config. 04:37:35 remember that burner phones still track pin point location 04:37:43 damn. 04:37:50 so can be identified by whatever phone travels with the burner, or where burner is turned on at? 04:37:52 this channel has double extra side of paranoia today. 04:38:09 ok with tor browser javascript disabled 04:38:09 Within our dataset of several hundred thousand visitors tested in the past 45 days, one in 67.3 browsers have the same fingerprint as yours. 04:38:09 Currently, we estimate that your browser has a fingerprint that conveys 6.07 bits of identifying information. 04:38:36 so I appear the same as you now! 04:39:43 But we're working on a non-commercial, i.e. non-continuously updated platform for testing our fingerprint. 04:39:56 I take it you aren't using Windows NT 04:40:51 rottensox: this channel has double extra side of paranoia today. - The plate has been in the kitchen for so long, we might as well bring it out to nom on. 04:41:26 ok mr canadian television. 04:41:56 lol. you're not going to let that one go. i should have read the bitcoin-dev emails before i said anything. 04:43:33 rottensox thank you so much for those links, they convinced me to stay well away :) 04:45:28 lol. probably very wise decision. 04:45:34 xo 12:59:10 define pin point location @ burner phones 14:36:17 .balance 14:36:22 !balance 14:36:25 huh.. 14:36:31 .xmr 14:37:45 hello 14:39:29 is the tipbot dead or something? 14:40:07 I'll give you more than the tip 14:41:34 Client: HexChat 2.12.4 • OS: Unknown Distro • CPU: Intel(R) Core(TM) i5-3340M CPU @ 2.70GHz (2.69GHz) • Memory: Physical: 976.4 MiB Total (862.3 MiB Free) Swap: 62.5 MiB Total (62.5 MiB Free) • Storage: 2.2 GB / 10.0 GB (7.8 GB Free) • VGA: 15ad:0405 @ 8086:1237 • Uptime: 31m 4s 14:42:53 :^v 14:43:01 based 14:59:21 Skirmant: yes tippero is dead since the last monero upgrade 14:59:23 tippero needs to be upgraded but no idea when that might happen 15:01:49 If it's about the payment ids, it'll be whenever someone else patches it. 15:02:19 But it can run with deposits off just fine. 15:20:35 Discord bots are all the rage these days though moneromooo 15:26:11 Someone's free to fork it and add a discord module :) 15:26:35 Or someone else has another bot also based on modules, better there since it's maintained. 15:26:54 Bill48105 I think ? 15:28:16 hey what up moneromooo 15:28:56 Is it you who made a tip/game bot that supports monero ? 15:29:02 my irc bot supports monero but i haven't done a discord one. 15:30:39 i'm 98% done with the rewrite of my Wallet multi coin IRC bot that is now multi platform. Multi IRC (not just freenode), discord, telegram, keybase, matrix & slack working while Twitch is IRC based so technically it's sorta supported 15:31:44 that new bot will support all the coins supported already 15:31:56 what changed on monero that broke tippero? 15:33:02 It's still using old payment ids. 15:33:17 vs integrated? 15:33:29 And given it's been barely used in years, I'm not spending time on this anymore. 15:33:35 That or subaddresses. 15:33:37 guess i didn't use tippero deposit/withdrawal enough 15:34:19 On Wallet I did integrated figuring it was the one most like other wallets people are used to 15:35:12 I've never had a bot 15:36:01 they'e cold & don't cuddle after sex 15:39:16 the channel is welcome to use my bot until the new one is done. I could spin up an instance of my discord bot for monero but I already run 4 stand alone discord bots & would prefer to spend the time getting the new combined one done so i can retire the stand alone ones 15:40:21 I just asked because Mochi101 mentioned it really, I don't know whether people are interested beyond that (they might well be). 15:40:56 yeah i hear ya 15:45:59 I just want to give away or withdraw wat I have on tippero and be done with it 15:46:28 but yeah not to ramble but my new bot is a complete rewrite. modular/pluggable not only for platforms but commands. to add a new platform is just matter of making a class with the neccessary functions. then all commands & functionality is available to the new class so every platform shares the same commands & output calls 15:46:59 maybe a manual withdraw is possible? 15:47:21 there's kinda been ample warning & chance to get monero out 15:47:46 there was? 15:49:13 well not this time but the other times :D 15:49:48 i mean it was offline for months before. that's a pretty good clue that if the bot comes alive again get em out before the next round 15:50:22 then again i'm type of person who prefers to have control over my own coins. he who holds the keys owns the coins 15:51:20 i remind people that often. don't keep any more coins outside your control than you're willing to lose 15:52:14 but yeah running a bot is enough of a time suck but dealing with wallets is awful 15:52:19 fluffypony: any chance you can get tippero back online with deposits off just so people can withdraw ? 15:52:36 that would be cool 15:53:41 yes ofc I tried to give what little I had away but that resulted in me getting it back 10x lol 15:53:53 lol nice ROI! 15:57:48 my bots get good amout of use especially with doge which is by far the most popular but roger ltc & few others of the 15 get enough use to warrant keeping them 15:57:59 forget about my bot let's talk about your dress 15:58:16 it's on the floor 15:58:22 sexy 15:59:02 hopefully integrated addresses don't go anywhere 15:59:09 please no 15:59:18 ikr 16:00:07 Bill48105: Discord bots are pretty easy. I made a basic tipbot on NodeJS for standard bitcoin RPC in a day 16:00:31 yeah discord api and available libraries make it easy 16:00:43 Never tried anything with Monero though 16:01:08 monero uses different rpc api but similar enough to figure out if you know what you're doing 16:01:20 i feel like im too old for discord 16:01:25 probably full of zoomers 16:01:32 lol 16:01:35 ok zoomer 16:01:43 has ring to it 16:01:53 i envision being bombarded with gifs 16:02:01 indeed & worse 16:02:05 thankfully you can disable all that 16:02:13 who uses gifs these days? 16:02:17 it's all about webms 16:02:18 web pages auto load & preview as do links to pictures etc 16:02:40 so your eyes can get a treat without asking 16:03:56 and yeah there are a LOT of *really* shitty bots on discord 16:07:27 Well... you guys do know that dicksword.com redirects there right? 16:07:39 lol 16:07:47 how would we know that :D 16:07:57 .shrug 16:09:25 not a site i'd intentionally go to lol 16:09:33 does sound a lot like discord though 16:13:40 telegram is like lite discord. it's not to bad really 16:16:08 Also terrible. 16:16:32 I checked out the Church of Monero for a few rounds... They had a Telegram channel. 16:16:54 telegram requires your phone number 16:17:02 not a fan of that 16:17:32 right that part sucks 16:17:46 could use burner or virtual number 16:17:56 but it's annoying it's required 16:18:13 try keybase.. they require DNA sample 16:18:45 i forgot about the church of monero, do they still exist? 16:19:06 they push you to confirm 3 places for your protection. luckily one can be paper wallet 16:19:45 does telegram have p2p encryption for group chats? 16:19:50 like whatsapp 16:19:50 i wasn't much of a fan of matrix 16:19:51 why not XMPP? it's federated, has private chats and group chats, and supports end to end encryption :D 16:19:55 matrix and telegram just reinvent it poorly 16:20:34 they each have different goals 16:20:57 private group chats now too with omemo? 16:21:22 omemo supports group chats afaik 16:21:43 i got fatigued adding platforms to the new bot. there are just so many 16:24:35 are we group chatting now? 16:24:44 group arguing 16:31:06 lol that's about it 16:43:53 each platform has pros n cons. IRC is far from perfect 16:56:57 you shut your mouth. irc forever :D 16:57:28 irc4eva 16:57:31 :** 16:57:42 bill is bad name, far from perfect 18:01:54 Bill is best name 18:02:10 arent you on matrix dotflac[m]? lol 18:02:32 yeah 18:02:35 lol 18:02:37 trying it out 18:02:39 and it's shite 18:02:42 shite 2 da max 18:02:59 all the native matrix rooms are dead despite having 18k members 18:03:08 and the bridges don't work half the time 18:03:42 and you can't clear the unread messages indicator without scrolling up and waiting for javascript to register them all as read 18:03:45 and no keyboard shortcuts 18:04:03 i guess those last points are specific to this client but it's basically the flagship client 18:04:17 ok cool just checkin cuz you said irc 4va lol 18:04:23 irc 4 life 18:04:26 die 4 irc 18:04:28 kill 4 irc 18:04:31 irc 4 die 18:05:46 my new bot supports optional cross platform & cross channel bridging. So that users on different platforms can communicate and tip even over cross platform seemlessly 18:05:56 forget about my bot let's talk about your dress 18:58:59 Hi guys, I'm a bit lost I've got a bunch of contradicting info on xmr stak for mining monero - is it still possible or no? 18:59:45 And if so which cryptonight version do I need to mine? 19:01:40 edot, most people are using xmrig these days 19:01:51 Monero does not use cryptonight anymore. It uses randomx. 19:02:30 So xmr-stak is not an option at all? Just use xmrig? (I don't have a preference) 19:09:42 edot: xmrstak can still be used for Monero. But you should use xmrig. Better perfomances and the devs are not complete assholes 19:09:43 People seem to be having less troubles with xmrig 19:10:23 Sounds good to me 19:10:29 Thanks! 19:25:17 The dev, in fairness. psychocrypt hasn't been an asshole AFAIK. 19:42:56 One of the dev, unless fireice is not developing xmr-stak anymore, but doesn't seem like it from his tweets. Didn't psychocrypt co-develop ragerx and participate to the mud-machine fireice built up? (i honestly don't know) 19:50:15 I don't know. But I'll assume he's just coding unless evidence. 20:03:15 I never actually said anything about the devs moneromooo, I've just seen that people come to -pools less often for xmrig 21:33:40 ErCiccione[m]: I don't think I've seen much mud slinging (of any) from psychocrypt. he does development but seems to stay out of the drama. 22:31:44 Got it. Thanks inge-. Btw i was talking about fireice because i assumed he is still developing xmrstak. I might be wrong tho, i don't follow it at all. 22:35:24 it us his team if not him. and I find it fair to inform people considering multiple miners to take into consideration the stated motivations of the people behind the miners. if someone is mining xmr purely for profit, then they will optimize and might not care, but if they want to support the network - it is definitely something they will consider. 22:35:59 so the telegram group for Monero Mining doesn't mince words when someone asks the diff between them. 22:52:20 https://downloads.getmonero.org/gui/monero-gui-win-x64-v0.15.0.3.zip 22:52:23 404 Not Found 22:56:42 MalMen: not released yet 22:56:55 use getmonero.org for the latest release 22:57:06 ahmmm 22:57:07 or compile v0.15.0.3 yourself 22:57:11 https://github.com/monero-project/monero-gui/releases 22:57:18 is the URL on the official download links 22:57:23 *its 22:57:38 yes I know, the link will work once the bins are uploaded 22:57:52 but the binaries are not ready yet 22:58:15 and there is hash already ? 22:58:16 monero-gui-win-x64-v0.15.0.3.zip, 99d9fe30931f29a5fe9cd81328ab1dd0146e77fd5cd15d5ef87d50b395b8b838 22:58:27 lol, just found it funny, no problem for me 22:58:55 yes, the bins were ready but not uploaded yet as someone else will do them 22:59:15 and he has to setup the environment so it will take a bit until they are released 22:59:40 we should remove it probably but I can’t edit the page