Author

Topic: [XMR] Monero - A secure, private, untraceable cryptocurrency - page 317. (Read 4671575 times)

sr. member
Activity: 714
Merit: 251
...
Can somebody, an expert, explain to me clearly and honestly why Monero does not go with the big block strategy?[/b]

Monero has a dynamic block size. Blocks will increase in maximum capacity automagically as more transactions are included on a consistent basis. Of course, on chain scaling has limitations, so off-chain stuff like some kind of lightning implementation are being looked at as well I think.

I see, I must have heard the idea from shills. It looks like competitor shills are spewing out a lot of disinformation.

I have always thought that Monero has a small block size, without looking into it, since I have read most stuff from the forum that some shills might have posted.

I am glad to see Monero being so flexible and innovative. The better it is, the more the trolls and competitor shills try to bring it down.
legendary
Activity: 1316
Merit: 1021
2009 Alea iacta est
Help Monero decouple from Bitcoin! LocalMonero Affiliate Program Is Now Live


https://np.reddit.com/r/LocalMonero/comments/78h8q1/help_monero_decouple_from_bitcoin_localmonero/

Monero's price is still somewhat coupled to Bitcoin's, because the vast majority of people today acquire their Monero by going through Bitcoin first. Services like LocalMonero and MoneroForCash which allow you to go directly from fiat to Monero without mandatory ID/address verification still have some work to do when it comes to breaking into the mainstream. Now, you can help decouple Monero from Bitcoin by helping us grow and earn some commission while doing it.
Today, we're launching our affiliate program. You earn 20% of trading fees generated by users that you referred. These payouts will be made on a daily basis as Monero into your LocalMonero wallet. Your referred users will generate commission for you for a period of 1 year from their date of registration.....




full member
Activity: 406
Merit: 105
Chosŏn Minjujuŭi Inmin Konghwaguk
I received few months my free monero coin from smoothie.  I'm interested to setup amd mine this coin but my problem is I don't where to start building my rigs and what are proper specs for each part of the rig is efficient. Anybody wants to help. I watch already too many guides on youtube but its all general and I'm worried about power computation because it might explode.

I can't help except to recommend checking out here: https://www.reddit.com/r/MoneroMining/

Checkout http://monerobenchmarks.info/list.php
7990 is a good work horse, I have a few from the good old bitcoin gpu mining days. 7850 is the most cost effective gpu you can buy, but you do need a dozen to make it worthwhile. The new Vega 56 and 64 gpus have the best hash/watt so they scale up really nice. Nvidia GPUs generally suck for cryptonight mining so stay away from them. rx 470 480 570 580 with blockchain drivers and custom memory mappings get you really good hash rate as well. Also amd ryzen CPU perform very well, almost up to par with GPUs, xenons with AES are decent as well if you have access to server farms.
full member
Activity: 176
Merit: 108
I received few months my free monero coin from smoothie.  I'm interested to setup amd mine this coin but my problem is I don't where to start building my rigs and what are proper specs for each part of the rig is efficient. Anybody wants to help. I watch already too many guides on youtube but its all general and I'm worried about power computation because it might explode.

I can't help except to recommend checking out here: https://www.reddit.com/r/MoneroMining/
hero member
Activity: 837
Merit: 500
I received few months my free monero coin from smoothie.  I'm interested to setup amd mine this coin but my problem is I don't where to start building my rigs and what are proper specs for each part of the rig is efficient. Anybody wants to help. I watch already too many guides on youtube but its all general and I'm worried about power computation because it might explode.
legendary
Activity: 2968
Merit: 1198
Anonymous No More? Monero Exploit Reveals User Identities to Hackers

The researcher, Anthony Russell, says that he can actually locate Monero users through transaction broadcasts.

When users open up their Monero wallets, they connect to the peer-to-peer network, which allows users to then connect to individual wallets.

According to Russell, If the users of those wallets aren’t using TOR or I2P, you can easily determine their IPs.

One potential problem with this method is that it doesn’t necessarily differentiate between server nodes and peers. However, Russell says that this can be overcome by doing a simple whois search............

https://bitsonline.com/monero-exploit-threatens-privacy/

No shit. This is why kovi is under development... Until kovi development is complete, if you really care about privacy, than you need to broadcast your transactions from behind a vpn or tor. This shouldn't be "news" to anyone who knows anything about this project.  Something that everyone always knew or should have known spun as news. Smells like someone with an agenda spreading fud. Wankalone should take notes I guess. This is how it is done.

Kovri isn't needed to address what is being reported as an alleged 'vulnerability' (and mostly doesn't). The IP addresses of nodes on a p2p network are public and you can get them explicitly using print_cn or print_pl in the daemon or netstat (or even see geolocated addresses on a node map). These addresses by themselves tell you nothing about users or transactions.

Even if not transmitting your txs over Tor, VPN, i2p, etc. it is still very difficult for anyone other than your ISP or someone spying directly on your network connection to determine that a transaction originated at a particular node. It could possibly be done with a massive sybil attack on the network, and even then would be unreliable.

I disagree with this a bit. True you cant just look at an ip address and know who it is. But neither can one do this with a bitcoin address. Bitcoin addresses change frequently and are not tied in any way to any geographical data yet attackers use analysis techniques to identify bitcoin users quite trivially. Using similar techniques it should be even easier to uncover real identities using ip addresses than bitcoin addresses. Thus it is reasonable to assume that a compromised ip equals a compromised identity to anyone who cares enough to spend a little time and or money to suss it out.

Yes, an IP address can often be attached to a person, but that alone does not help determine how many Monero you own, where you got them, or what you are spending them on. There is no Monero 'leak' from this. There are network-level vulnerabilities that will eventually be addressed with kovri (and can be worked around today with Tor or a VPN), mostly involving your ISP actively spying on you, but that's a lot more than just an IP address.
legendary
Activity: 1722
Merit: 1217
Anonymous No More? Monero Exploit Reveals User Identities to Hackers

The researcher, Anthony Russell, says that he can actually locate Monero users through transaction broadcasts.

When users open up their Monero wallets, they connect to the peer-to-peer network, which allows users to then connect to individual wallets.

According to Russell, If the users of those wallets aren’t using TOR or I2P, you can easily determine their IPs.

One potential problem with this method is that it doesn’t necessarily differentiate between server nodes and peers. However, Russell says that this can be overcome by doing a simple whois search............

https://bitsonline.com/monero-exploit-threatens-privacy/

No shit. This is why kovi is under development... Until kovi development is complete, if you really care about privacy, than you need to broadcast your transactions from behind a vpn or tor. This shouldn't be "news" to anyone who knows anything about this project.  Something that everyone always knew or should have known spun as news. Smells like someone with an agenda spreading fud. Wankalone should take notes I guess. This is how it is done.

Kovri isn't needed to address what is being reported as an alleged 'vulnerability' (and mostly doesn't). The IP addresses of nodes on a p2p network are public and you can get them explicitly using print_cn or print_pl in the daemon or netstat (or even see geolocated addresses on a node map). These addresses by themselves tell you nothing about users or transactions.

Even if not transmitting your txs over Tor, VPN, i2p, etc. it is still very difficult for anyone other than your ISP or someone spying directly on your network connection to determine that a transaction originated at a particular node. It could possibly be done with a massive sybil attack on the network, and even then would be unreliable.

I disagree with this a bit. True you cant just look at an ip address and know who it is. But neither can one do this with a bitcoin address. Bitcoin addresses change frequently and are not tied in any way to any geographical data yet attackers use analysis techniques to identify bitcoin users quite trivially. Using similar techniques it should be even easier to uncover real identities using ip addresses than bitcoin addresses. Thus it is reasonable to assume that a compromised ip equals a compromised identity to anyone who cares enough to spend a little time and or money to suss it out.
legendary
Activity: 2968
Merit: 1198
Anonymous No More? Monero Exploit Reveals User Identities to Hackers

The researcher, Anthony Russell, says that he can actually locate Monero users through transaction broadcasts.

When users open up their Monero wallets, they connect to the peer-to-peer network, which allows users to then connect to individual wallets.

According to Russell, If the users of those wallets aren’t using TOR or I2P, you can easily determine their IPs.

One potential problem with this method is that it doesn’t necessarily differentiate between server nodes and peers. However, Russell says that this can be overcome by doing a simple whois search............

https://bitsonline.com/monero-exploit-threatens-privacy/

No shit. This is why kovi is under development... Until kovi development is complete, if you really care about privacy, than you need to broadcast your transactions from behind a vpn or tor. This shouldn't be "news" to anyone who knows anything about this project.  Something that everyone always knew or should have known spun as news. Smells like someone with an agenda spreading fud. Wankalone should take notes I guess. This is how it is done.

Kovri isn't needed to address what is being reported as an alleged 'vulnerability' (and mostly doesn't). The IP addresses of nodes on a p2p network are public and you can get them explicitly using print_cn or print_pl in the daemon or netstat (or even see geolocated addresses on a node map). These addresses by themselves tell you nothing about users or transactions.

Even if not transmitting your txs over Tor, VPN, i2p, etc. it is still very difficult for anyone other than your ISP or someone spying directly on your network connection to determine that a transaction originated at a particular node. It could possibly be done with a massive sybil attack on the network, and even then would be unreliable.

legendary
Activity: 3836
Merit: 4969
Doomed to see the future and unable to prevent it
Anonymous No More? Monero Exploit Reveals User Identities to Hackers

The researcher, Anthony Russell, says that he can actually locate Monero users through transaction broadcasts.

When users open up their Monero wallets, they connect to the peer-to-peer network, which allows users to then connect to individual wallets.

According to Russell, If the users of those wallets aren’t using TOR or I2P, you can easily determine their IPs.

One potential problem with this method is that it doesn’t necessarily differentiate between server nodes and peers. However, Russell says that this can be overcome by doing a simple whois search............

https://bitsonline.com/monero-exploit-threatens-privacy/

No shit. This is why kovi is under development... Until kovi development is complete, if you really care about privacy, than you need to broadcast your transactions from behind a vpn or tor. This shouldn't be "news" to anyone who knows anything about this project.  Something that everyone always knew or should have known spun as news. Smells like someone with an agenda spreading fud. Wankalone should take notes I guess. This is how it is done.

Considering the fact that there have been guides around forever to alleviate this it is certainly a non issue and nothing but FUD. Just drop a link to a tutorial on how to get around this wherever you see the fucktard posting this fud. Not to mention using a light wallet or mymonero mitigates this, albeit adding vulnerabilitys in the process.
legendary
Activity: 1722
Merit: 1217
Anonymous No More? Monero Exploit Reveals User Identities to Hackers

The researcher, Anthony Russell, says that he can actually locate Monero users through transaction broadcasts.

When users open up their Monero wallets, they connect to the peer-to-peer network, which allows users to then connect to individual wallets.

According to Russell, If the users of those wallets aren’t using TOR or I2P, you can easily determine their IPs.

One potential problem with this method is that it doesn’t necessarily differentiate between server nodes and peers. However, Russell says that this can be overcome by doing a simple whois search............

https://bitsonline.com/monero-exploit-threatens-privacy/

No shit. This is why kovi is under development... Until kovi development is complete, if you really care about privacy, than you need to broadcast your transactions from behind a vpn or tor. This shouldn't be "news" to anyone who knows anything about this project.  Something that everyone always knew or should have known spun as news. Smells like someone with an agenda spreading fud. Wankalone should take notes I guess. This is how it is done.
legendary
Activity: 3836
Merit: 4969
Doomed to see the future and unable to prevent it
This is decentralized exchange.
nvo.io

The wallet will available at the beginning of the November and exhanchange at Q1 2018.

Project is completely open source and each coins devs can make their own plugin for the wallet. I do not know does the nvo team do the plug in for monero, but anyway monero devs can do it. Monero logo is anyway at nvo demo video in youtube.

Are monero devs aware of this project?

I hope our devs will vett the code for this.

Quote
Transactions
are
processed
simultaneously
through
an
order
matching
engine
from
one
wallet
to
another.
The
validator
on
the
Safenetwork
will
check
if
the
transactions
are
valid
prior
to
being
exchanged.
The
orders
are
then
matched
and
transactions
broadcasted
in
their
respective
networks.
The
validator
process
raw
transactions
and
doesn’t
hold
any
private
keys
or
assets
nor
can
it
sign
transactions resulting in a trustless decentralized exchange using the Safenetwork to validate orders

Nice formatting in the white paper (that quote was a copy paste from it) lol

https://nvo.io/assets/whitepaper.pdf


I'm wondering if the "Validator" can be tricked on one side of the transaction with a modified wallet to just not send the agreed upon amount or use some other workaround like a hard codded wallet balance that doesn't really exist to trick the validator into thinking it sent funds.

This looks like it has the potential to get hacked pretty quickly.
full member
Activity: 308
Merit: 109
This is decentralized exchange.
nvo.io

The wallet will available at the beginning of the November and exhanchange at Q1 2018.

Project is completely open source and each coins devs can make their own plugin for the wallet. I do not know does the nvo team do the plug in for monero, but anyway monero devs can do it. Monero logo is anyway at nvo demo video in youtube.

Are monero devs aware of this project?
legendary
Activity: 1316
Merit: 1021
2009 Alea iacta est
DevMeeting 2017-10-22

Highlights[ ]

Recent code merges
Lightweight Wallet API support
Sub-addresses
Bugfix release(0.11.0.1) may be as early as October 23, 2017 (Monday). (This will *not* enable the features above.)
Discussions involving dotnetrussel's (Verge) twitter bot.
It's really not worth rebuttal as there's no vulnerability.
It's just watching for connections on a port via "netstat". Not indicative of a Monero user or transaction.
dEBRUYNE may write something official up.
Discussions of the Monero Hardware wallet will likely migrate to the Monero Community meetings.
redfish and hyc are working through some database sync and corruption issues.

https://monerobase.com/wiki/DevMeeting_2017-10-22
full member
Activity: 162
Merit: 100
supportXMR.com
Monero trolls allocated countless hours and most of their brain power to FUD Dash, a coin that isn't even targeting the same market needs as them, to end up getting their faces REKT out of know where by zen cash. . . What a classic tale for the history books.  Cheesy
can you point me to said trolling/shilling? I've not seen the monero community FUDing Dash anywhere.
hero member
Activity: 854
Merit: 500
Judging by the schedule in the near future we will see the growth of the coin. Well, if they add COIN  to the Bitfly exchange, I think we'll see x2.

Never heard the name of Bitfly exchange, how good is that exchange and how will it make impact on pricing
full member
Activity: 173
Merit: 101
PR Manager at Crypto Economy
newbie
Activity: 17
Merit: 0
Hi there XMR community, i really like the https://forum.getmonero.org/ website.

Can anyone point me to who developed it or if the code is opened sourced anywhere?

Thnx
hero member
Activity: 682
Merit: 540
Monero trolls allocated countless hours and most of their brain power to FUD Dash, a coin that isn't even targeting the same market needs as them, to end up getting their faces REKT out of know where by zen cash. . . What a classic tale for the history books.  Cheesy
legendary
Activity: 3836
Merit: 4969
Doomed to see the future and unable to prevent it
Anonymous No More? Monero Exploit Reveals User Identities to Hackers

The researcher, Anthony Russell, says that he can actually locate Monero users through transaction broadcasts.

When users open up their Monero wallets, they connect to the peer-to-peer network, which allows users to then connect to individual wallets.

According to Russell, If the users of those wallets aren’t using TOR or I2P, you can easily determine their IPs.

One potential problem with this method is that it doesn’t necessarily differentiate between server nodes and peers. However, Russell says that this can be overcome by doing a simple whois search............

https://bitsonline.com/monero-exploit-threatens-privacy/






Bad news tbh.

Anonymous No More? Monero Exploit Reveals User Identities to Hackers

The researcher, Anthony Russell, says that he can actually locate Monero users through transaction broadcasts.

When users open up their Monero wallets, they connect to the peer-to-peer network, which allows users to then connect to individual wallets.

According to Russell, If the users of those wallets aren’t using TOR or I2P, you can easily determine their IPs.

One potential problem with this method is that it doesn’t necessarily differentiate between server nodes and peers. However, Russell says that this can be overcome by doing a simple whois search............

https://bitsonline.com/monero-exploit-threatens-privacy/






Yay the trolls are back!!! Looks like the bottom is here. Cheesy I grabbed another long at 0.01446773, couldn't get any lower with those fucking Bots. Funny the bots were at a stalemate at 0.01448000   for 0.10077572   Xmr and I grabbed that and they started buying but then backed off. I'm all in now.
sr. member
Activity: 304
Merit: 380
Anonymous No More? Monero Exploit Reveals User Identities to Hackers

The researcher, Anthony Russell, says that he can actually locate Monero users through transaction broadcasts.

When users open up their Monero wallets, they connect to the peer-to-peer network, which allows users to then connect to individual wallets.

According to Russell, If the users of those wallets aren’t using TOR or I2P, you can easily determine their IPs.

One potential problem with this method is that it doesn’t necessarily differentiate between server nodes and peers. However, Russell says that this can be overcome by doing a simple whois search............

https://bitsonline.com/monero-exploit-threatens-privacy/



LOL! Collecting IPs from netstat output reveals identities. This is so fucking retarded.

You've been targeted with FUD! How do you feel about that?

So who does this one work for?  
https://www.youtube.com/watch?v=nmJKY59NX8o
Jump to: