[-] Saki@monero.town 5 points 2 years ago

That should be easy if you do some script-fu, etc. Perhaps not so easy on Windows, though.

I understand that you may feel depressed, or even annoyed, for example when told, “Solving the problem foo is trivial if you use bar” when bar is not trivial nor realistic for you (or so you believe). For example, 2^149^−1 is easy to factor if you use elliptic curves, but studying elliptic curves may feel daunting (though it’s not so hard as you might think).

I do understand how you may feel in such a situation. I may be sometimes in a similar situation too.

Obviously, though, not trying to read about the solution bar wouldn’t solve the original problem foo. Not learning ECM doesn’t enable you to factor 2^149^−1 for example. Not trying to listen to about the L-word wouldn’t fix the annoyance of Windows. Annoyance itself may be harmless but everyone knows Windows is privacy-invasive and vulnerable to malware, viruses, keyloggers, etc. So staying too long there, refusing to learn some solution, something really bad might happen to you eventually. Honestly, something like that did happen to ourselves recently. Our community lost a lot of money, apparently stolen by attacker(s)—exactly what happened is still unknown, but the victimized wallet was on Ubuntu connected to Windows 10 via SSH.

You don’t need to ditch Windows. I respect your freedom to use non-free software. In fact, many L-word systems do include non-free blobs too!

That being said, may I suggest that you try different OS(es) just for 10 minutes, booted from a USB stick, when you have time, to see what it’s like. You might be surprised because it just works, actually more intuitive, you can use it easily, not to mention you’re not forced to see ads. Or no invasive telemetry. Feel free to ignore this suggestion if you really love Windows, thinking it’s the best OS ever. I respect freedom of thought!

[-] Saki@monero.town 7 points 2 years ago

I do agree most cryptocurrencies are scammy, or traded speculatively. It’s a free country, so one can do whatever they want to with their own money, but I personally think they’re like greedy gamblers.

I’m a Monero user, not a trader, not an investor. I have Monero because I use it. I support it because I’m a privacy advocate. I’ve never even once used a CEX, totally unrelated to investment. Your points may be valid for those investor people, though.

[-] Saki@monero.town 3 points 2 years ago* (last edited 2 years ago)

Memes are inside jokes, not advertising nor promoting anything targeting outsiders. If you don’t like whatever, feel free to not see it, ignore it, or just block it, because perhaps like many other people, you don’t think you need privacy, you’re not really interested in privacy… and so, understandably, for you, this project is looking like just another shitcoin or scam. Neko ni koban, buta ni shinju :)

[-] Saki@monero.town 3 points 2 years ago

“will only sell its long-distance savings tickets” so you can still buy non-saving (full price) tickets? A “mobile phone number or e-mail address” - how about using TutaNota, signing up anonymously? Or better yet, how about buying your ticket though proxysto.re (unrealistic?). Not too surprising considering airplane tickets (and pobably better than the TSA theater) , but this feels like another step to mass surveillance. (And Germany is supposed to be an anonymity friendly country: no to Client Side Scanning, the Wir speichern nicht movement, etc.)

Credit card fees will rise […] experts have advised to make everyday purchases with debit cards, Giro / EC cards or cash in Germany

Cash is good, but maybe experts don’t know there is another better option…?

22
submitted 2 years ago by Saki@monero.town to c/privacy@monero.town

As enacted, the OSB allows the government to force companies to build technology that can scan regardless of encryption–in other words, build a backdoor.

Paradoxically, U.K. lawmakers have created these new risks in the name of online safety.

The U.K. government has made some recent statements indicating that it actually realizes that getting around end-to-end encryption isn’t compatible with protecting user privacy. But

The problem is, in the U.K. as in the U.S., people do not agree about what type of content is harmful for kids. Putting that decision in the hands of government regulators will lead to politicized censorship decisions.

The OSB will also lead to harmful age-verification systems. This violates fundamental principles about anonymous and simple access

See also: Britain Admits Defeat in Controversial Fight to Break Encryption

18
Undisputed Champion (monero.town)

Libereco estas plej bona.

[-] Saki@monero.town 3 points 2 years ago

Money is bad—it is used for a lot of bad things like trading drugs or hiring killers…? Money is the root cause of mugging, scams, exploitation, killing, corruption…?

Money is good—it can be used to help people…?

Perhaps money is not good nor bad; a person who uses it may be ethical or unethical. Please do not confuse pure mathematics or technology (such as public key cryptography) with its users/abusers.

[-] Saki@monero.town 5 points 2 years ago

Since LibreWolf is libre software, it’s likely that a user has freedom to tweak this maybe via about:config. You just need to ask this directly in the LibreWolf community.

I think I know what you’re talking about, though. Perhaps CSS @font-face is forbidden, because many sites use Google fonts, which allows them to track you.

If Tor Browser is acceptable, give it a try. While TB too has very strict font restrictions to avoid finger-printing (so that a remote site may not know which fonts your system already has), web fonts are allowed by default. It’s relatively harder to distinguish/track individual Tor users, since TB hides your real IP & by default cookies are per session only.

LibreWolf shows your real IP, so it’s understandable and reasonable that it wants to be more careful about fonts. Still a user should be given freedom to do whatever, at their own risk. That’s what free software is all about, after all. Just a thought…

[-] Saki@monero.town 5 points 2 years ago* (last edited 2 years ago)

The current use cases are for Brazilian banking sites. Although free (libre) software users don’t like to be remotely monitored their browsing real-time, the technology itself can be helpful if used right.

The context is, even though Firefox is getting more and more annoying with telemetry, phoning home, etc. (imho the last good version was v52 ESR), it is still much better than Google. So use Firefox, if you don’t like other options.

Mozilla is financially supported by Google, and perhaps they can’t continue their projects without Google, so it’s kind of inevitable that sometimes they have to support that giant. Nevertheless, they still try not to be evil, explicitly against WEI.

Please do support Firefox and/or its forks (LibreWolf, Tor Browser, …). Stop cooperating with Google. They can do evil things because of their monopoly power. We can make Google less powerful, if we refuse to use their products, if we escape from their privacy-invading services.

[-] Saki@monero.town 5 points 2 years ago

Yup, the US. Actually, no anti-cryptography anywhere, please. Didn’t we already do this like 20 years ago? As in, the “Cryptography is a weapon, which you can’t freely export, so you can’t download Netscape from the US” nonsense.

It’s slightly humiliating that, unlike the Tor Project, the EFF does not accept Monero donations while they do accept Zcash for some reason. BTC, ETH are of course accepted.

In case someone does Monero-to-other-coin at Trocador for whatever reason, consider using the affiliate link on the front page https://monero.town/ which is supposed to help Monero.town a bit (your rate shouldn’t change at all).

29
submitted 2 years ago by Saki@monero.town to c/privacy@monero.town

Although the UK government has said that it now won’t force unproven technology on tech companies, […] the controversial clauses remain within the legislation, which is still likely to pass into law.

the continued existence of the powers within the law means encryption-breaking surveillance could still be introduced in the future.

So all ‘until it’s technically feasible’ means is opening the door to scanning in future rather than scanning today. It’s not a change

The implications of the British government backing down, even partially, will reverberate far beyond the UK

“It’s huge in terms of arresting the type of permissive international precedent that this would set […]. The UK was the first jurisdiction to be pushing this kind of mass surveillance. It stops that momentum. And that’s huge for the world.”

5
submitted 2 years ago* (last edited 2 years ago) by Saki@monero.town to c/monero_memes@monero.town

Just an old cliché :) Monero, je te choisis !

门罗币 就决定是你了! ¡Monero, te elijo a ti!

2023-10-24 Testing https://www.imagebam.com/view/MEPORDX using this old post; not sure if direct links to images are okay with them. They seem to be Tor-friendly and one can upload images without registration, so if it works, it may be good to save server space/bandwidth of monero.town.

6
submitted 2 years ago* (last edited 2 years ago) by Saki@monero.town to c/moneromining@monero.town

P2Pool v3.6.2 was released. There were no code changes since v3.6.1, but the MacOS aarch64 build and Windows build were re-compiled with the previous compiler same as in v3.5, to fix reported stability issues.

It is said: “If the previous version works fine for you, you don't need to update.” but even if you think v3.6.1 is working, you may want to carefully monitor the situation (e.g. Hashrate / CPU temperature) to see which compiler works better for you. It is possible that keeping using v3.6.1 is better for some users.

Apparently it is not yet proven that the new compiler is the culprit for this, though a compiler optimization-related issue is suspected.

Changes:

  • macOS aarch64 build is back to using old compiler (same as in v3.5) to fix reported stability issues
  • Windows build is back to using MSVC compiler (same as in v3.5) to fix reported stability issues

Release P2Pool v3.6.2 · SChernykh/p2pool · GitHub

EDIT (Clarification for Windows users)

  • The previous (old) version (v3.6.1) was created with a NEW compiler, and is supposed to run faster (7-8% faster block verification), while there might be crashing bugs or other unexpected issues.
  • The current (new) version (v3.6.2) was created with the OLD compiler (same as v3.5), and is supposed to run only as fast as v3.5 (so 7-8% slower block verification, than v3.6.1), although it might be stabler.
[-] Saki@monero.town 7 points 2 years ago
56
submitted 2 years ago* (last edited 2 years ago) by Saki@monero.town to c/privacy@monero.town

In a well-intentioned yet dangerous move to fight online fraud, France is on the verge of forcing browsers to create a dystopian technical capability. Article 6 (para II and III) of the SREN [sécuriser et réguler l'espace numérique] Bill would force browser providers to create the means to mandatorily block websites present on a government provided list.

--France’s browser-based website blocking proposal will set a disastrous precedent for the open internet

[Unfortunately one should no longer trust Mozilla itself as much as one did 10 years ago. If you do sign, you might want to use a fake name and a disposable email address.]

This bill is obviously disturbing. It could be that eventually they assume that .onion sites are all suspicious and block them, or something similar might happen, which would be bad news for privacy-oriented users including Monero users, for freedom of thought, and for freedom of speech itself. Note that the EU is going to ban anonymous domains too (in NIS2, Article 28).

For a regular end user, if something like this happens and if the block is domain-name-based, then one quick workaround would be using web.archive.org (or Wayback Classic), or ANONYM ÖFFNEN of metager.de (both work without JS). If this is France-specific, of course a French user could just get a clean browser from a free country too (perhaps LibreWolf or Tor Browser, or even Tails), provided that using a non-government-approved browser is not outlawed.

Mozilla, financially supported by Google, states that Google Safe Browsing is a better solution than SREN, but that too has essentially similar problems and privacy implications; especially Gmail's Enhanced Safe Browsing is yet another real-time tracking (although, those who are using Gmail have no privacy to begin with, anyway).

If it's DNS-level blocking, you can just use a better DNS rather than one provided by your local ISP, or perhaps just use Tor Browser. Even if it's browser-side, as long as it's open-source, technically you're free to modify source code and re-compile it yourself, but that may not be easy even for a programmer, since a browser is complicated, with a lot of dependencies; security- and cryptography-related minor details tend to be extremely subtle (just because it compiles doesn't mean it's safe to use), especially given that Firefox/Thunderbird themselves really love to phone home behind the user's back.

See also: Will Browsers Be Required By Law To Stop You From Visiting Infringing Sites?

15
submitted 2 years ago by Saki@monero.town to c/privacy@monero.town

Having free and open-source tools and a decentralized way of fighting back and reclaiming some of that power is very important. Because if we don’t resist, we’re subject to what somebody else does to us

While Tor is useful in several situations, probably we shouldn't believe in it blindly. For clearnet, LibreWolf is a great option too, and I2P might be the future.

9
submitted 2 years ago by Saki@monero.town to c/privacy@monero.town

The Online Safety Bill, now at the final stage before passage in the House of Lords, gives the British government the ability to force backdoors into messaging services, which will destroy end-to-end encryption.

Requiring government-approved software in peoples’ messaging services is an awful precedent. If the Online Safety Bill becomes British law, the damage it causes won’t stop at the borders of the U.K.

Random thoughts...

Even if platform-assisted end-to-end encryption (pseudo e2e) is censored, perhaps we could still use true user-to-user encryption. If "end" means the messenger software itself or a platform endpoint, then the following will be true e2e - "pre-end" to "post-end" encryption:

  1. Alice and Bob exchange their public keys. While using a secure channel for this is ideal, a monitored channel (e.g. a normal message app) is okay too for the time being.
  2. Alice prepares her plain text message locally: Alice.txt
  3. She does gpg -sea -r Bob -o ascii.txt Alice.txt
  4. Alice opens ascii.txt, pastes the ascii string in it to her messenger, sends it to Bob like normally.
  5. So Bob gets this ascii-armored GPG message, and saves it as ascii.txt
  6. gpg -d -o Alice.txt ascii.txt, and he has the original Alice.txt
  7. He types his reply locally (not directly on the messenger): Bob.txt
  8. gpg -sea -r Alice -o ascii.txt Bob.txt and sends back the new ascii string
  9. Alice gets it, so she does gpg -d -o Bob.txt ascii.txt to read Bob.txt

In theory, scanning by government-approved software can't detect anything here: Alice and Bob are simply exchanging harmless ascii strings. Binary files like photos can be ascii-armored too.

Admittedly this will be inconvenient, as you'll have to call gpg manually by yourself. But this way you don't need to trust government-approved software at all, because encryption/decryption will be done by yourself, before and after the ascii string goes through the insecure (monitored) channel.

14
Bad Internet Bills (www.badinternetbills.com)
submitted 2 years ago by Saki@monero.town to c/privacy@monero.town

Congress is trying to push through a swarm of harmful internet bills that would severely impact human rights, expand surveillance, and enable censorship on the internet. On July 20, we’re launching a week of action to get loud about our opposition to legislation like KOSA and EARN IT and demanding that Congress focus on passing badly needed comprehensive privacy legislation to actually protect us from the harms of big tech companies and data brokers, instead of pushing through misguided legislation before August congressional recess.

4
submitted 2 years ago* (last edited 2 years ago) by Saki@monero.town to c/privacy@monero.town
[-] Saki@monero.town 6 points 2 years ago

What Happens if an Instance Disappears?

I may be wrong, but one potential problem in such a case might be that (not you'd totally lose your data but on the contrary) you won't be able to delete your posts etc. even if you want to delete them, since its copy is "mirrored" by many other instances. Not sure though.

view more: ‹ prev next ›

Saki

joined 2 years ago
MODERATOR OF