• sech1OP
      link
      fedilink
      arrow-up
      5
      ·
      13 days ago

      It’s about how Chainalysis tries to trace Monero - their actual strategies.

        • chillband
          link
          fedilink
          arrow-up
          8
          ·
          13 days ago

          Because it leaked their strategy for “tracking monero users”, running monero nodes so they can farm users IP connecting to their nodes. use Tor/VPN and run your own node.

          • xmr_unlimited
            link
            fedilink
            English
            arrow-up
            2
            ·
            12 days ago

            Monero community was already aware of these avenues tho. I think they just wanted particular details in the video kept…private.

  • g2devi@feddit.nl
    link
    fedilink
    arrow-up
    4
    ·
    13 days ago

    Very interesting video. Is far as I can see, there are really only three points of weakness that were exploited by the chain analysis. The first was if the transaction was started using one of their Monero nodes. The second was exchanges or partner services. The third was the fee structure used. So as long as you use the default fees, use trusted Monero nodes (especially your own), and you either don’t use exchanges/partner services or at the very least, have multiple wallets where each wallet connects to at most one exchange/service (i.e. one wallet has public money inflows from a single service and another has public money outflows from a single service), it would be virtually impossible to have your transactions traced.

    • antidote
      link
      fedilink
      arrow-up
      2
      ·
      13 days ago

      Your suggestion to have separate wallets for inbound, and outbound doxxed transactions is actually very good

  • xmr_unlimited
    link
    fedilink
    English
    arrow-up
    4
    ·
    13 days ago

    I feel sorry for bitcoiners and windows users. They are fucking retards and don’t know it.

  • nihilist
    link
    fedilink
    arrow-up
    3
    ·
    edit-2
    12 days ago

    TLDW :

    1. do not trust random nodes, go and host your own (locally or not) -> to prevent them from logging ip addresses and to deanonymize on the IP level (attacking dandelion from what i understand ?)
    2. if you do end up using a remote node, connect to it through tor to maintain anonymity
    3. Stay off centralised exchanges, never KYC.
  • antidote
    link
    fedilink
    arrow-up
    3
    ·
    13 days ago

    Thanks Nyx!

    It seems the recommendations are:

    • use a trusted VPN
    • use a trusted remote node (like your own remote node)
    • in general, be careful which exchanges you use
  • xmr_unlimited
    link
    fedilink
    English
    arrow-up
    2
    ·
    12 days ago

    List of wallets shows featherwallet being ignored again 😀