Anything that you "can access on your browser" can and will be shut down.
Browsers and WebPKI are designed to guarantee this.
You're gonna have to let go of your browser obsession. Or just not get what you want. One or the other.
Anything that you "can access on your browser" can and will be shut down.
Browsers and WebPKI are designed to guarantee this.
You're gonna have to let go of your browser obsession. Or just not get what you want. One or the other.
it’s weird that they are able to ddos an onion. i thought tor had pow mitigations?
I want to know about this too. Why didn't you use HiddenServicePoWDefensesEnabled?
It's only three hops if, like Trocador, you don't need to hide the location of the server. They can (and should) enable HiddenServiceSingleHopMode. This hides the location of the client but not the location of the server. Six hops is only for darknet sites that need to hide the server location.
suffering non-stop DDoS attacks for the last three weeks, and they are using ToR exit nodes to conduct such attack
This doesn't add up:
Blink twice if you've been threatened by a three-letter agency.
Good luck,
WASM is the millennials getting their turn to learn that "those who do not learn from history are doomed to repeat it".
Letting the bloated web offload more of its bloat to clients will simply result in an even worse web obesity crisis than already exists. The computational burden needs to stay with the side (the content producer) that has the ability to reduce the level of bloat. Anything else is a broken incentive structure.
This is precisely what Hashcash is. Hashcash is widely acknowledged as the primary ancestor of Bitcoin.
Also, Tor now has a system like this built-in. It uses PoW. It's quite new (less than a year old) and you have to explicitly enable it, but I'm sure the trocador admins know about this.
But seriously, regarding enshittification, I don't think javascript makes websites any harder to ddos. Rather, you get ddossed until you cry uncle and comply with the demands that you help MITM and fingerprint your customers. Javascript happens to be useful for fingerprinting. It has very little to do with ddos mitigation.
I also don't understand why websites are still using bespoke hand-rolled XMR payment frontends -- unless they are exchanges or (like localmonero) super-Monero-gurus... BTCPay server's Monero support is so good at this point... I have used it uncountably-many times and not once had any kind of problem.
Please folks, if you're going to accept Monero, consider using BTCPay Server.
First, make sure the transaction was completed for the correct amount net of monero transaction fees.
Yes, I absolutely made sure of that. Even waited for all ten confirmations.
One ~~secure~~ way to contact them is through matrix.
FTFY. And of course the (still!) embargoed clusterf*ck. Don't roll your own crypto, kids.
Not objecting or disagreeing, but could we get more than a one-line explanation for breaking protocol changes? maker selects arbitrator (breaking change) does not inspire a whole lot of confidence. Is there a discussion somewhere I can read that spells out the options and why this one was selected?
when/why was one ever required?
I think the many competing messengers are a good thing.
If they were backward-compatible (with their predecessors) and interoperable, I would agree. But they absolutely aren't. The lack of backward compatibility in the chat/messenger space is abhorrent.
This is like complaining that your new EV doesn't have a large enough gasoline tank.
Haveno is something much better than federated: it is decentralized.