boldsuck

joined 7 months ago
[–] boldsuck@scribe.disroot.org 1 points 3 months ago* (last edited 3 months ago)

They first collect your TAX and other data. Then comes a 2nd verification with ID and video chat. I exchanged everything for XMR at Kraken Germany on June 5th and then closed my account. That would have been the 3rd or 4th verification with them. I'm fed up with handing over my ID and video images everywhere. The verification is done via 3rd party services and I'm afraid of AI deepfakes. Haveno, Bisq and soon Serai DEX is enough for me.

[–] boldsuck@scribe.disroot.org 2 points 3 months ago

https://github.com/haveno-dex/haveno/issues/987 (Monero misspelled twice) Are u/KTzer087 & u/haveno-user the HavenoMain scammers? Apparently they want Tether in Haveno but can't program it themselves. They probably can't do anything more than click the fork button and buy domains. ¯\(ツ)

[–] boldsuck@scribe.disroot.org 3 points 3 months ago* (last edited 3 months ago) (1 children)

Yes, for years we in the Tor community have been trying to point out this to new relay operators: https://community.torproject.org/relay/technical-considerations/ Try to avoid the following hosters:

  • OVH SAS (AS16276)
  • Online S.a.s. (AS12876)
  • Hetzner Online GmbH (AS24940)
  • DigitalOcean, LLC (AS14061)
  • Frantech/BuyVM (AS53667) is also often full, because Francisco allows exits and he takes care of the abuse mail shit.

Guards, bridges and middle relays can actually be operated at nearly any hoster. They don't get abuse and don't attract attention. It's difficult to find a hoster for an exit. It's best to have your own AS.

[–] boldsuck@scribe.disroot.org 4 points 3 months ago (4 children)

In the Tor community we are considering how much a relay operator can have in total and where we draw the line. NTH currently has almost 20% exit traffic and we (5 orgs in an AS) have a bit more. https://nusenu.github.io/OrNetStats/

[–] boldsuck@scribe.disroot.org 1 points 3 months ago (1 children)

And by sending a signal watermark embedded with the onion address to the Tor circuit, we establish a correlation between the onion address and IP address of a Monero Tor hidden service node

And what does that achieve? He can also easily find my Monero node IP's + IPv6's + onion addresses in a Github issue and does not need research wodoo. ;-) He cannot see who connects his wallet there via Tor.

[–] boldsuck@scribe.disroot.org 6 points 3 months ago

The people Interpool is after don't need Duress. They simply refuse to give out their password. Current Pixel and iPhones phones cannt be cracked with forensic tools. https://discuss.grapheneos.org/d/12848-claims-made-by-forensics-companies-their-capabilities-and-how-grapheneos-fares

[–] boldsuck@scribe.disroot.org 5 points 3 months ago* (last edited 3 months ago)

TBH, in order to be forced to unlock your phone under duress, you’d have to be a pretty high profile target.

Why, that can happen to anyone at the airport when entering the USA, UK, Australia, etc. Or if you have been in a car accident, your cell phone will be confiscated in Germany, for example. Or when you were forced to unlock the phones and banking apps at gunpoint: https://www.cbsnews.com/chicago/news/robbers-unlock-phones-banking-apps-gunpoint-bucktown-chicago/

[–] boldsuck@scribe.disroot.org 4 points 4 months ago

You can have it done yourself at any stamp service. Monero Stamps