Pages:
Author

Topic: [XMR] Monero - A secure, private, untraceable cryptocurrency - page 84. (Read 4671660 times)

newbie
Activity: 28
Merit: 8
legendary
Activity: 2268
Merit: 1141
In the OP it’s been said they’re moving away from this forum. Is this now only community based or is a team member still active on the thread as well? Privacy is key and Monero stands for privacy. Monero = key.

There are still developers as well as core-team members active here. Additionally, there's a large and vibrant community on reddit:

https://www.reddit.com/r/Monero/

Perhaps the OP of the thread requires an update.
legendary
Activity: 2268
Merit: 1141
Is there a way for Ledger to integrate XMR into Ledger Live without having to store the viewkeys off all their users?

Because if they store them, then US gov agencies will ask them, and those agencies will be able to map a good chunk of XMR distribution.

Behind that lies this important question: is their a way for XMR to become more user friendly without sacrifing privacy? Or will the only way to ensure privacy be forever to run a full node oneself?

They could technically use the GUI's libwallet as library (Monerujo does this for instance), which would result in the wallet being able to connect to a remote node (and thus not having to send the private view key to a server to delegate scanning).

I'd argue using a remote node is fairly user friendly.

Lastly, note the subtle difference between a light server and a remote node. The former requires the private view key, whereas the latter does not.
legendary
Activity: 2702
Merit: 2053
Free spirit
There are team members still active here

Also they recommend joining their reddits for more detailed info.
full member
Activity: 392
Merit: 115
In the OP it’s been said they’re moving away from this forum. Is this now only community based or is a team member still active on the thread as well? Privacy is key and Monero stands for privacy. Monero = key.
legendary
Activity: 861
Merit: 1010
Is there a way for Ledger to integrate XMR into Ledger Live without having to store the viewkeys off all their users?

Because if they store them, then US gov agencies will ask them, and those agencies will be able to map a good chunk of XMR distribution.

Behind that lies this important question: is their a way for XMR to become more user friendly without sacrifing privacy? Or will the only way to ensure privacy be forever to run a full node oneself?
hero member
Activity: 1848
Merit: 640
*Brute force will solve any Bitcoin problem*
When somebody hacked me and got 7000 xmr, Hueristic was about the only guy who took me seriously.  Most of the others piled on with predictable abuse.
Also, he's a very knowledgable guy, and I value that.
Overall, Hueristic's valuable contributions outweigh his little irritable outbursts.   As an older fellow with physical problems, I also let my annoyance get the better of me.
Hueristic, you should know we're on your side.  Next time something gets your goat, just think positive -- we're all your friends here.


it was my team...sorry brah  Grin  #game over lol
legendary
Activity: 3836
Merit: 4969
Doomed to see the future and unable to prevent it
When somebody hacked me and got 7000 xmr, Hueristic was about the only guy who took me seriously.  Most of the others piled on with predictable abuse.
Also, he's a very knowledgable guy, and I value that.
Overall, Hueristic's valuable contributions outweigh his little irritable outbursts.   As an older fellow with physical problems, I also let my annoyance get the better of me.
Hueristic, you should know we're on your side.  Next time something gets your goat, just think positive -- we're all your friends here.


Thanks Br0. Smiley


Quote
Hack Reveals Russian Plan to Deanonymize Tor Traffic

https://www.pcmag.com/news/369660/hack-reveals-russian-plan-to-deanonymize-tor-traffic
hero member
Activity: 870
Merit: 585
When somebody hacked me and got 7000 xmr, Hueristic was about the only guy who took me seriously.  Most of the others piled on with predictable abuse.
Also, he's a very knowledgable guy, and I value that.
Overall, Hueristic's valuable contributions outweigh his little irritable outbursts.   As an older fellow with physical problems, I also let my annoyance get the better of me.
Hueristic, you should know we're on your side.  Next time something gets your goat, just think positive -- we're all your friends here.
member
Activity: 952
Merit: 17
raskul
The third audit (by X41) of RandomX has successfully been completed!

https://www.reddit.com/r/Monero/comments/ca71ok/randomx_audit_statuas/


Can one still use this algo to install malware to run on a website so that website visitors mine XMR with the users CPU?
Wasn't there any consideration to the algorithm that would negate this specific security issue with XMR and why is this not mentioned in the audit?

thanks.

Due to the random code generation part of the proof-of-work, a web miner is significantly more difficult to create (though definitely not impossible). Additionally, the 2GB RAM requirement somewhat mitigates the malware issue.

this is the kind of response i had hoped to read. thank you for that.
Glad that some of us are a little less easily-triggered!

peace.

Yes, this was not at all an insult to the community as a whole. I think your lucky you got a civil answer at all. But I was abrasive so that is on me for allowing you to bait me. Be assured that won't happen again.

no it was a genuine question.. but feel free to see it as fud if you like.
my concern is that i had some comparative-crypto website open for a few hours yesterday on my browser and when i returned to my computer, it had almost melted the CPU. I know this type of shady deployment of malware has been inherent within the XMR community in the past so wanted to ask. I think your attitude to the question answered it specifically. thank you.

I refrained from stating 'within the XMR ecosystem, because it is not a fault of the developers, it is indeed people mining XMR via shady malware, which is indeed 'people involved in XMR' = "xmr community members"

You got triggered and defensive on my choice of phrase, perhaps you need some time with your head in a good novel or something friend, come away from 'Interent Formus' - it's an awful anxiety-enducing state to be in.



Take the advice of your peers:

Hueristic, I respect you, but in recent weeks and months you've been frothing at the mouth.

+1, let's keep it civil.
legendary
Activity: 3836
Merit: 4969
Doomed to see the future and unable to prevent it
The third audit (by X41) of RandomX has successfully been completed!

https://www.reddit.com/r/Monero/comments/ca71ok/randomx_audit_statuas/


Can one still use this algo to install malware to run on a website so that website visitors mine XMR with the users CPU?
Wasn't there any consideration to the algorithm that would negate this specific security issue with XMR and why is this not mentioned in the audit?

thanks.

Due to the random code generation part of the proof-of-work, a web miner is significantly more difficult to create (though definitely not impossible). Additionally, the 2GB RAM requirement somewhat mitigates the malware issue.

this is the kind of response i had hoped to read. thank you for that.
Glad that some of us are a little less easily-triggered!

peace.

Yes, this was not at all an insult to the community as a whole. I think your lucky you got a civil answer at all. But I was abrasive so that is on me for allowing you to bait me. Be assured that won't happen again.

no it was a genuine question.. but feel free to see it as fud if you like.
my concern is that i had some comparative-crypto website open for a few hours yesterday on my browser and when i returned to my computer, it had almost melted the CPU. I know this type of shady deployment of malware has been inherent within the XMR community in the past so wanted to ask. I think your attitude to the question answered it specifically. thank you.
member
Activity: 952
Merit: 17
raskul
The third audit (by X41) of RandomX has successfully been completed!

https://www.reddit.com/r/Monero/comments/ca71ok/randomx_audit_statuas/


Can one still use this algo to install malware to run on a website so that website visitors mine XMR with the users CPU?
Wasn't there any consideration to the algorithm that would negate this specific security issue with XMR and why is this not mentioned in the audit?

thanks.

Due to the random code generation part of the proof-of-work, a web miner is significantly more difficult to create (though definitely not impossible). Additionally, the 2GB RAM requirement somewhat mitigates the malware issue.

this is the kind of response i had hoped to read. thank you for that.
Glad that some of us are a little less easily-triggered!

peace.
sr. member
Activity: 1451
Merit: 258

monero is the best altcoin for what concerns the privacy and anonymity, many others have tried to imitate it but without reaching its levels, unfortunately i could not follow all the news concerning it (monero) someone can update me? the last fork? can no longer be mined with cryptonight? was born a new altcoin monero7?...

Indeed, as a matter of fact, most are only imitating but not entirely, all of which is wasted like garbage. I also don't understand why most people imitate and why not make something different. For what you ask, besides that, I also didn't follow the news so far.
legendary
Activity: 3836
Merit: 4969
Doomed to see the future and unable to prevent it

Pain? Hopefully not physical pain, but I have a feeling you are talking about wallet pains after longing Monero once we hit $100 again or something like that.  (ツ)

A bit of both I guess. Smiley
hero member
Activity: 3066
Merit: 605

monero is the best altcoin for what concerns the privacy and anonymity, many others have tried to imitate it but without reaching its levels, unfortunately i could not follow all the news concerning it (monero) someone can update me? the last fork? can no longer be mined with cryptonight? was born a new altcoin monero7?...
hero member
Activity: 1874
Merit: 840
Keep what's important, and know who's your friend
Hueristic, I respect you, but in recent weeks and months you've been frothing at the mouth.

I know, not sure whats wrong.
I think too much pain is taking a toll. Sad

I'll lose the red, but leave the post so others know what you guys mean.
Still looks like a beam fudder to me though.

Pain? Hopefully not physical pain, but I have a feeling you are talking about wallet pains after longing Monero once we hit $100 again or something like that.  (ツ)
legendary
Activity: 3836
Merit: 4969
Doomed to see the future and unable to prevent it
Hueristic, I respect you, but in recent weeks and months you've been frothing at the mouth.

I know, not sure whats wrong.
I think too much pain is taking a toll. Sad

I'll lose the red, but leave the post so others know what you guys mean.
Still looks like a beam fudder to me though.
legendary
Activity: 2268
Merit: 1141
Hueristic, I respect you, but in recent weeks and months you've been frothing at the mouth.

+1, let's keep it civil.
legendary
Activity: 2268
Merit: 1141
They plan to release a desktop version in the foreseeable future.
Do you know when exactly? There is an ETA? In short in 2020 or in 2025?

They did not provide an ETA, but I am reasonably certain 2020 is way more likely than 2025 :-P
Are you sure? In crypto 2025 is more likely than 2020 generally

I deem it more likely that the desktop wallet is out in 2020 than 2025, yes.
legendary
Activity: 2268
Merit: 1141
The third audit (by X41) of RandomX has successfully been completed!

https://www.reddit.com/r/Monero/comments/ca71ok/randomx_audit_statuas/


Can one still use this algo to install malware to run on a website so that website visitors mine XMR with the users CPU?
Wasn't there any consideration to the algorithm that would negate this specific security issue with XMR and why is this not mentioned in the audit?

thanks.

Due to the random code generation part of the proof-of-work, a web miner is significantly more difficult to create (though definitely not impossible). Additionally, the 2GB RAM requirement somewhat mitigates the malware issue.
Pages:
Jump to: