Saki

joined 1 year ago
MODERATOR OF
[–] Saki@monero.town 6 points 6 months ago

Generally, votes are overrated. Especially if you’re not mainstream, by definition most people won’t support you, won’t agree with you, won’t understand you.

Some things may be downvoted because they’re too stupid. But occasionally, you might be downvoted simply because you’re a bit too early. Like, if you’d said “being gay is not crime” or something 50 years ago, you might have got downvoted… Just a thought.

[–] Saki@monero.town 1 points 6 months ago* (last edited 6 months ago)

Maybe what you’re thinking is like an XMR version of Bisq's “Get your first BTC” room?

https://bisq.wiki/Getting_your_first_BTC This dilemma is real and understandable, while it’s not clear what would be the best solution:

For new users, Bisq requires between 0.002 and 0.007 BTC for traders to make their first trade: [...] It can be difficult for new bitcoiners to acquire their first coins, so this requirement is often a barrier for new Bisq users. The Get your first BTC room offers one possible way to get this initial bitcoin without signing up for a centralized exchange.

Basically the same thing for Haveno, I guess.

 

“It is completely absurd to inflict mass surveillance on the general public under the premise of fighting theft.”

It comes at a cost to the privacy and civil liberties of the people of Britain.

[–] Saki@monero.town 2 points 10 months ago (1 children)

Another bad experience related to Mastercard: https://monero.town/post/1791576

[–] Saki@monero.town 1 points 10 months ago (3 children)

Cake Pay should be fine for most gift cards, I don’t think they usually ask for KYC for those.

So perhaps your recent bad experience with Mastercard EUR cards are rather exceptional?

[–] Saki@monero.town 3 points 10 months ago (5 children)

Thanks for warning. Saw https://monero.town/post/872283 too. Guess Cake Pay may be convenient for those who are fine with KYC. Another option, that Stealths thing is more expensive (higher fees), so basically if you want to buy a gift card here or there, you’ll have to choose between (possible) KYC and higher fees. Or so it seems…

[–] Saki@monero.town 3 points 10 months ago (1 children)

According to @azalty@monero.town, Cake Pay works fine if you’re fine with KYC, and otherwise you may just lose your money: https://monero.town/post/872283

If you’re a privacy advocate not fully supporting KYC but want to try this anyway, then try a small amount, because you may lose all your money. Another recent option is more privacy-friendly and KYC-free, but the fees are higher with them.

[–] Saki@monero.town 2 points 10 months ago

We know the ability to get Monero will not be essentially affected—after all, this is not the first time, nor the second time, when Monero is delisted. It seems reasonable to admit, though, that ultimately the ability/freedom to spend Monero might be limited if legit (e.g. hosting) companies can’t accept it in the future—directly or indirectly because of MiCA etc. Although, what will happen in such a situation may be seen as an interesting experiment.


Since the posted link is not very Tor-friendly behind CF, similar random links just in case…

Following the announcement, privacy tokens such as Dash (DASH), Monero (XMR), and Zcash (ZEC) witnessed a notable decline of up to 10%

The prices of some of these tokens have headed south shortly after the announcement. XMR is down nearly 3% in the past 24 hours, while ZEC has plunged by 10%

[–] Saki@monero.town 4 points 11 months ago (2 children)

The concept may be lovely, but the fact is, many people nowadays have been Pavlov’ed to immediately ignore anything weird that says, "Congratulations! You got some money. Visit this URL and input something." As they say, the Cake is a lie…

Monero could be a wonderful gift to a friend of yours if they’re especially interested in privacy (in that case, you might want to talk to them privately, and perhaps recommend a better wallet). Otherwise, it may be kind of like casting pearls before swine…

[–] Saki@monero.town 2 points 11 months ago (1 children)

The blog post says, “it is possible to build technology used by millions of people with privacy at the heart.” which is also related to Monero, for example. It’s related to online privacy in general, not exclusively about Tor. For example, it includes a clear answer to the “Nothing to hide” argument:
http://wl.vernccvbvyi5qhfzyqengccj7lkove6bjot2xhh5kajhwvidqafczrad.onion/wiki/Nothing_to_hide_argument?lang=en

It’d be nice if even a single non-Tor user is interested in this… but if the link is onion, a non-Tor user can’t read it! Hence a clearnet link… Does that make sense? I too agree with you that, basically, we better promote onion when available. Except I wanted to share the link with people in general, non-Tor users too :)

 

The right time to start protecting your digital privacy is before your trip […] The simplest and most reliable precaution against border searches is to reduce the amount of information that you carry across the border.

image


Sometimes law enforcement officials achieve so-called “consent” by being vague […] You can try to dispel this ambiguity by inquiring whether border agents are asking you or ordering you […] If an agent says it is a request only, you might politely but firmly decline to comply with the request.

If you are a U.S. citizen, border agents cannot stop you from entering the country, even if you refuse to unlock your device, provide your device password, or disclose your social media information. However, agents may escalate the encounter if you refuse.

If you elect to comply with a border agent’s order to unlock your device, provide your password, or disclose your social media information, you can inform the agent that you are complying under protest and that you do not consent.


It is possible that if you unlock your device, and agents then search your device, a court will rule that you consented to the search. […] As noted in Part 1, the best way to avoid an inadvertent “consent” to search is to decline to unlock your device, provide the device password, or provide any social media information.

Technically, you don’t even need to admit that you know the password.

If you believe that border agents violated your digital rights at the border, please contact EFF at borders@eff.org.


See also:

 

The fact that the issue was discovered by Google TAG suggests it was exploited by a nation-state actor or by a surveillance firm.

As usual, Google did not publish details about the attacks exploiting the flaw in the wild.

See also: https://www.cert.europa.eu/publications/security-advisories/2023-100/

This vulnerability also affects Chromium-based web browser such as Microsoft Edge [3], Brave, Opera, and Vivaldi.

[–] Saki@monero.town 2 points 11 months ago (3 children)

Thanks for the suggestion. ONION LINK added in the post. The main link itself is intentionally clearnet, for happiness shall be in heaven over one non-Tor user who feels curious about Tor and privacy, more than over 99 right users, who already use TB 24/7. (Luke 15:7)

TB recently gets rid of blockchair: http://eweiibe6tdjsdprb4px6rqrzzcsi22m4koia44kc5pcjr7nec2rlxyad.onion/tpo/applications/tor-browser/-/issues/42283
and is planning to get rid of Google etc. from its Search Engine Options http://eweiibe6tdjsdprb4px6rqrzzcsi22m4koia44kc5pcjr7nec2rlxyad.onion/tpo/applications/tor-browser/-/issues/41835

[–] Saki@monero.town 8 points 11 months ago* (last edited 11 months ago)

Tor Browser is planning to remove Google from the search engine options a user can choose: https://gitlab.torproject.org/tpo/applications/tor-browser/-/issues/41835

There some say brave onion + no JS is good: https://search.brave4u7jddbv7cyviptqjc7jusxh72uik7zt6adtckl5f4nwy2v72qd.onion/

Mullvad team seems to be considering 4 possible options:


PS: Not disgussing ddg / ddg onion too much, basically because ddg is the long-time default search engine of TB. Most TB users assume ddg is a decent, standard, generic option, esp. its non-JS version.

 

“Some Hackers have figured out there is no quick and easy way for a company that receives one of these EDRs (emergency data request) to know whether it is legitimate,” he said.

“The hackers will send a fake emergency data request along with an attestation that innocent people will likely suffer greatly or die unless the requested data is provided immediately.”

 

privacy has nothing to do with having something to hide. Instead, privacy means protecting the human being that you are, all the personal details that make you, you. What you care about, what you love, what you hate, what you are curious about, what makes you laugh, what you fear. And most importantly, choosing when you decide to share that information and who you share it with.

it is possible to build technology used by millions of people with privacy at the heart. We build technology to advance that right in order to help users reclaim their agency in digital spaces.

(But by default, Tor Browser is not shipped with uBlock Origin.)

PS: ONION LINK http://pzhdfe7jraknpj2qgu5cz2u3i4deuyfwmonvzu5i3nyw4t4bmg7o5pad.onion/tor-in-2023/index.html

[–] Saki@monero.town 1 points 11 months ago

Dr. Strangemoney…

A sister meme by the same OP @rottenwheel : https://monero.town/post/1210342 also titled There's an app for that (Black jokes possibly easily misunderstood)

Unfortunately qu.ax seems to be blocking Tor now.

 

NOTE: This is about the Fifth Amendment protection against self-incrimination after a search warrant for someone’s cell phone is procured; not about digital privacy in general at the U.S. Border (a warrantless search).

See also: https://monero.town/post/1134494 EFF to Supreme Court: Fifth Amendment Protects People from Being Forced to Enter or Hand Over Cell Phone Passcodes to the Police

 

Now before the House, HR 6570 proposes to reauthorize Section 702 for three years — but with reforms including requiring all US intelligence agencies to obtain a warrant before conducting a US person query.

a competing bill, the FISA Reform and Reauthorization Act of 2023 (HR 6611), doesn't include a warrant requirement — and, in fact, includes language that many worry could be used to force private US companies into assisting in government-directed surveillance

 

House Intelligence Committee bill would also expand the definition of an electronic communication service provider include a broader range of providers, including those who “provide hardware through which people communicate on the Internet.”

See also: Tell Congress: They Must Defeat HPSCI’s Horrific Surveillance Bill | EFF Action Center

 

How FinCEN May Be Violating Your Rights
A call to action against FINCEN proposal 2023-0016A
Written By Preston Pysh

Eroding Anonymity Through Additional Verification: The mandate for “Additional Customer Identity Verification Measures for Transactions Involving Unhosted Wallets” is a direct affront to privacy and anonymity. This requirement transgresses on the First Amendment’s sanctuary for anonymous speech

A Direct Assault on Anonymity-Enhanced Currencies: The “Prohibition on the Use of Anonymity-Enhanced Convertible Virtual Currencies (AECVC)” is nothing short of a legislative bulldozer through the edifice of privacy.

See also: Preston Pysh says proposed FinCEN crypto rules violate US Constitution

 

Bis zum Jahr 2030 will die EU allen Bürger:innen eine „European Digital Identity Wallet“ (ID-Wallet) zur Verfügung stellen. Sie soll on- wie offline bei Verwaltungsgängen und Bankgeschäften, aber auch bei Arztbesuchen, Alterskontrollen oder beim Internetshopping zum Einsatz kommen.

(By 2030, the EU wants to provide all citizens with a “European Digital Identity Wallet” (ID wallet). It is intended to be used online and offline for administrative procedures and banking as well as medical visits, age verification, and internet shopping.)

The article (in German) is mostly about eIDAS 45
Cf. https://monero.town/post/1018961 Last Chance to fix eIDAS: Secret EU law threatens Internet security

(There are many English articles about it; see e.g.
https://mullvad.net/en/blog/eu-digital-identity-framework-eidas-another-kind-of-chat-control )

Though not the main topic of the article, this “ID wallet” thing sounds disturbing. (EU politicians calls a normal wallet “unhosted wallet” and don’t like it very much.)

 

Many countries use censorship systems to block access to human rights resources

.onion sites are particularly useful at maximizing internet users' privacy and anonymity because they never leave the Tor network.

While technically I2P might be better, it’s good news that a recognized human rights organization has adopted an onion, because that will improve the “shady” image of Tor, esp. hidden services (aka darknet), as in “privacy technology is good, not for criminals, but for you, for everyone. Using Tor is normal, and Monero is a great tool.”

 

law enforcement has been using […] systems since 2015, in utmost secrecy. The software in question […] can track a person across a network of cameras, for instance, by the color of their sweater

Any policeman […] can request to use [it]

The potential use of facial recognition worries within the institution itself. […] In France, facial recognition is only authorized in rare exceptions

This massive installation was carried out outside the legal framework provided by a European directive and the French Data Protection Act

The National Commission on Informatics and Liberty (CNIL), a French administrative regulatory body, started an investigation against the French Minister of the Interior [1][2]. The Minister, Gérald Darmanin ordered an investigation [2].

La Cnil […] annonce l’ouverture d’une enquête contre le ministère de l’Intérieur. Elle soupçonne la police d’utiliser un logiciel de reconnaissance faciale, depuis 2015, en dehors de tout cadre légal. Qu’en est-il ?

(CNIL suspects the police are using facial recognition outside any legal framework. Comments? - Gérald Darmanin’s answer: The news is true. I ordered an investigation.)

view more: next ›