[-] Wave@monero.town 1 points 11 hours ago

Will my KYC exchange account get restricted if I sell my crypto on XMR-listing, non-kyc exchange like Trocador for let's say ETH and send it to my KYC exchange account?

No, you can of course read the terms and conditions, but the simple answer is that the KYC exchange cannot see this at all. The best thing to do is to first send the amount for the sale from your normal wallet to a newly created wallet and from there to the instant exchange after a certain amount of time. So take an intermediate step, an additional new wallet.

4
submitted 2 weeks ago by Wave@monero.town to c/monero@monero.town

new GetMonero.org website in Astro

First demo view:

5
submitted 1 month ago by Wave@monero.town to c/monero@monero.town

Whenever possible, use QR codes from sub-addresses to share your wallet.

Alphanumeric character strings, as we know our wallets, are much easier for analysis companies and AI to collect and analyze.

15
submitted 1 month ago by Wave@monero.town to c/monero@monero.town

From min 3:53 about Monero.

7
submitted 1 month ago by Wave@monero.town to c/monero@monero.town

cross-posted from: https://monero.town/post/4625591

cross-posted from: https://monero.town/post/4625590

https://github.com/Cyrix126/gupaxx/releases/tag/v1.5.1

Gupaxx v1.5.1 important fixes

- Freeze after some time
- Xmrig could not be started after Xmrig-Proxy manually (Linux/MacOS)
- Node and Proxy custom args were not parsed correctly
- Node and Proxy custom args were applied if not empty in simple mode
- Unable to save node selection in Proxy Tab
- P2Pool status could not get green if verbosity level was below 3
- Crashes on Wayland
10
eXMR - fraud (monero.town)
submitted 1 month ago by Wave@monero.town to c/monero@monero.town

Fraud eXMR

An article on coinmarketcap caught my attention because Monero was mentioned. It mentioned a centralized exchange called yobit, which I had never heard of before, so I did some research.

It seems EXMR is offered there.

Perhaps the websites concerned will be made aware that this is a scam, the name 'Monero' and 'XMR' are being used. coinmarketcap.com also has a certain responsibility due to its reach.

5
submitted 1 month ago by Wave@monero.town to c/monero@monero.town

Fidelity hacked ($5.4 trillion asset manager)

Confirmed hacked: 77000+ customer records including license, social security numbers and personal information.

We should celebrate that this has nothing to do with Monero. BTCETF investors had better put a few XMR's in their wallets.

0
submitted 1 month ago* (last edited 1 month ago) by Wave@monero.town to c/monero@monero.town

A few hours ago, we listened to the podcast (twitter) in which Fluffypony talked about merged mining with Tari, among other things. Anyway, it was also discussed that Google now also has information about saberhagen.eth and Google AI also processes email content. Google knows a lot. hf in Kenya opexodus77

A friendly reminder not to use public spying chains.eth or Google.

8
submitted 1 month ago by Wave@monero.town to c/monero@monero.town

Governments are increasingly stepping up their efforts to regulate the use of cryptocurrencies, particularly those that enhance user privacy, amid concerns over money laundering and illicit activities. A recent academic paper suggests that targeting privacy-preserving blockchains, such as Monero, could help combat financial crimes, while the United States government has filed legal complaints to recover millions in digital assets stolen by North Korean hackers.

Lazarus Group Faces Asset Seizure as US Targets Stolen Crypto

US Government Moves to Seize Over $2.67 Million in Digital Assets Stolen by North Korean Lazarus Group

The United States government filed two legal complaints on Oct. 4, 2024, aiming to seize more than $2.67 million in digital assets linked to the notorious Lazarus hacking group. The digital assets were stolen in two high-profile hacks targeting the Deribit options exchange in 2022 and the Stake.com gambling platform in 2023.

According to court documents, the US government seeks to reclaim approximately $1.7 million in Tether (USDT) stolen in the 2022 Deribit hack, which resulted in a loss of $28 million for the cryptocurrency options exchange. The hack involved Lazarus Group breaching Deribit’s hot wallet, then funneling the stolen assets through the Tornado Cash mixer—an anonymizing service—followed by several Ethereum addresses in an attempt to avoid being traced by law enforcement.

The second legal filing targets roughly $970,000 in Avalanche-bridged Bitcoin (BTC.b) that was stolen in the 2023 Stake.com hack. The Lazarus Group’s attack on the popular gambling platform led to more than $41 million in losses, making it one of the most severe crypto-related security breaches in recent history.

Both filings mark a concerted effort by the US government to not only recover funds from the Lazarus Group’s hacking operations but also to disrupt the organization’s financial infrastructure, which is reportedly used to fund illicit activities on behalf of the North Korean government.

The Lazarus Group, a state-sponsored hacking organization based in North Korea, has been implicated in a series of high-profile cyberattacks on cryptocurrency exchanges and other digital financial platforms. The group’s activities are believed to be part of a broader strategy by the North Korean regime to circumvent international sanctions through cybercrime.

The Deribit and Stake.com hacks, while substantial, represent only a fraction of the group’s operations. On-chain investigators have linked the Lazarus Group to numerous other attacks, including the July 2024 breach of the WazirX exchange. This incident saw over $235 million stolen from the platform, further cementing the Lazarus Group’s reputation as a global menace in the cryptocurrency space.

The group's use of advanced techniques, such as leveraging decentralized finance (DeFi) platforms, cross-chain bridges, and anonymizing mixers, has made them a difficult target for authorities. However, the Oct. 4 filings reflect growing success in law enforcement’s ability to track stolen assets on-chain, signaling a potential shift in the fight against state-sponsored hacking.

North Korean Developers Infiltrating Crypto Projects

The Lazarus Group’s cybercrime activities extend beyond direct attacks on exchanges. In an alarming report released on Aug. 15, 2024, on-chain sleuth ZackXBT revealed that North Korean developers have infiltrated at least 25 cryptocurrency projects. Operating under fake identities, these developers reportedly compromised codebases and looted project treasuries, all while working under the direction of a single North Korean entity. This revelation raises serious concerns about the security of decentralized finance projects and the broader crypto ecosystem. With rogue developers accessing critical infrastructure, the Lazarus Group’s reach extends well beyond the hacks that make headlines, posing an ongoing threat to the cryptocurrency community.

In response to the Lazarus Group’s persistent cyberattacks, the US Federal Bureau of Investigation (FBI) issued multiple warnings in September 2024. The FBI highlighted the group’s use of social engineering scams to target unsuspecting individuals.

One such scam involved fake job offers designed to trick victims into downloading malware disguised as employment documents. After building a rapport with their targets, the hackers would encourage them to open these malicious files, leading to theft or the exposure of sensitive personal data.

The US government’s aggressive moves to recover stolen digital assets signal a growing international effort to crack down on state-sponsored cybercrime. The Lazarus Group’s continued activities also highlight the persistent vulnerabilities in the crypto space, especially concerning the use of decentralized finance platforms, mixers, and cross-chain bridges for laundering stolen assets.

As the legal battle to recover stolen funds unfolds, the case could set important precedents for law enforcement's ability to track and seize digital assets in cybercrime cases.

Cryptocurrency exchanges, DeFi platforms, and other digital asset providers will likely face increased pressure to enhance their security protocols in response to these developments. In addition, regulators around the world may accelerate their efforts to establish stronger frameworks for digital asset security, particularly in the context of protecting consumers from state-sponsored cyberattacks.

Academic Paper Suggests Targeting Privacy-Preserving Cryptocurrencies to Combat Money Laundering

In a paper titled ”Reconciliation of Anti-Money Laundering Instruments and European Data Protection Requirements in Permissionless Blockchain Spaces,” published in the Journal of Cybersecurity, the author suggests that governments should consider targeting cryptocurrencies—particularly privacy-preserving chains like Monero—to combat money laundering. The paper explores various methods of undermining trust in permissionless blockchains and outlines the difficult balance between enforcing anti-money laundering (AML) regulations and preserving user privacy in the European Union’s data protection framework. The paper's insights, published in 2021, have recently gained renewed relevance, as debates around the use of cryptocurrencies for illicit purposes intensify. Privacy-enhancing cryptocurrencies and decentralized platforms like mixers are increasingly under scrutiny by regulators, especially in light of the rise in digital asset adoption and the regulatory challenges it presents.

In the academic paper, the author outlines several methods that could potentially be employed by governments to undermine trust in permissionless blockchain networks. These methods include:

51% Attacks: This involves a group gaining majority control of a network's mining or staking power, enabling them to alter the blockchain's transaction history or double-spend assets. Price Suppression: Through market manipulation, governments could cause the price of privacy-focused cryptocurrencies to plummet, reducing confidence in their use as a store of value. Sybil Attacks: A malicious actor creates numerous fake identities within a network to gain disproportionate influence, allowing them to manipulate or disrupt its operations.

These strategies, the author argues, could shake user confidence in permissionless blockchains by casting doubt on the ability of the network’s protocol to ensure smooth and secure operations. Undermining the security and stability of blockchain networks could, in turn, dissuade users from adopting privacy-enhancing cryptocurrencies, potentially curbing their use for money laundering and other illicit activities.

However, the paper warns that such drastic measures should only be considered as a last resort, once other regulatory approaches have been exhausted. The author argues that governments should first focus on more conventional tools, such as:

Blacklisting suspicious wallet addresses Flagging suspicious transactions Enforcing sanctions on known bad actors Strengthening existing Know Your Customer (KYC) and AML regulations

The paper ultimately calls for a nuanced approach that balances the need for regulatory compliance with the importance of innovation and user privacy. As the author concludes, any action taken should aim to promote both the safety of the financial system and the protection of individual privacy rights.

Monero and the Debate Over Privacy Coins

Although the paper was published in 2021, its findings are now being viewed through a sharper lens, particularly in the context of privacy coins like Monero. Some observers have begun to theorize that tactics similar to those proposed in the academic paper may already be in play, as seen in the perceived manipulation of Monero’s price.

Monero has long been in the crosshairs of regulators due to its privacy-preserving features, which make it difficult for law enforcement agencies to track transactions. The debate over the cryptocurrency has escalated in recent years, with some exchanges, including Kraken, opting to delist Monero in specific jurisdictions such as the European Economic Area.

This renewed focus on privacy coins has led to questions about their viability in an increasingly regulated environment. As governments worldwide seek to clamp down on crypto-related money laundering, privacy coins like Monero find themselves at the center of the debate between financial transparency and individual privacy.

One of the central questions raised by critics is whether the focus on cryptocurrency-related money laundering is an excuse for governments to impose tighter control over digital assets. Several reports have suggested that the use of cryptocurrencies for criminal activities is relatively low compared to traditional forms of finance.

In 2022, United Nations officials revealed that terrorist organizations predominantly use cash to finance illicit activities, a claim that was later corroborated by the United States Treasury. According to a 2024 report from the US Treasury, fiat currency remains the preferred medium for criminal enterprises, even when digital assets are used in illicit schemes.

The Treasury report further admitted that the crimes committed using digital assets often mirror age-old scams that could just as easily have been carried out using cash or other forms of value. This raises questions about the true motivations behind the regulatory crackdown on cryptocurrencies and whether traditional financial systems are receiving less scrutiny despite being the primary tool for money laundering and terrorism financing.

Despite these findings, governments around the world continue to target privacy-enhancing tools in the cryptocurrency space. A high-profile example is the ongoing legal case against Roman Storm, co-founder of the Tornado Cash mixer. Tornado Cash, which enables users to obscure the origin of their transactions, has faced severe backlash from regulators, particularly in the United States.

On Sept. 26, 2024, a US judge ruled that the case against Storm could proceed, marking a significant step in the government’s efforts to curtail the use of crypto mixers for illicit purposes. Tornado Cash has been accused of facilitating money laundering by enabling users to anonymize transactions, making it difficult for law enforcement agencies to trace funds back to their origin.

This crackdown on privacy-enhancing tools has ignited a heated debate within the cryptocurrency community. While some argue that tools like Tornado Cash play an essential role in maintaining user privacy, others contend that such services are too easily abused by bad actors, necessitating stricter regulation or outright prohibition.

As the regulatory landscape continues to evolve, the fate of privacy coins and crypto mixers remains uncertain. Many experts believe that regulators are unlikely to allow these tools to operate freely without significant oversight. The recent actions taken by the US government, along with similar moves in other jurisdictions, indicate that a more stringent regulatory framework is on the horizon.

For privacy coins like Monero, this could mean tighter restrictions on where and how they can be traded. Several exchanges have already delisted Monero in response to regulatory pressure, and more may follow suit if the global crackdown on privacy coins intensifies.

By Coinpaper.com

8
submitted 1 month ago by Wave@monero.town to c/monero@monero.town
7
submitted 1 month ago by Wave@monero.town to c/monero@monero.town

Form https://www.reddit.com/r/Monero/comments/1fwmhto/rino_wallet_closing_down_end_of_october/

Hello everyone,

It is with a heavy heart that we announce the upcoming winding-down of RINO.

A few years ago we realised Monero was missing critical bits of professional tooling for teams, be it companies, NGOs or fluid groups of individuals. One missing tool we identified was a wallet software that allows multiple users to deal with shared funds in a secure way. Professional principles such as splitting roles among transaction preparers and approvers, hierarchical transaction limits within an organisation etc were not just available for every other large blockchain project, they are the de-facto standard used in the industry.

And so we embarked on a mission to offer similar tooling for Monero, aiming to boost its adoption by the industry at large. This was and remains a worthy and exciting goal, especially as the Monero project is too often delisted or unsupported, often out of regulatory concerns but also because the usual tools expected by the industry are still largely absent.

While we attempted to monetize the platform via paying businesses, we’ve also always offered a free version of RINO so the community benefit from its features. It was not just the main RINO wallet product: many of you will remember using our “community tools” over the years, such as nodes, explorers, faucets, docker images etc. We are very proud of this and grateful to all community members for the nice words over the years. Ultimately though, our attempts to monetize the product never bore fruit to a point where the product could sustain itself, and at some point we have to cut our losses. As a consequence, we decided to discontinue the RINO product.

We will shut down the platform on October 31st, 2024. If you want to withdraw your funds via the RINO platform, please do so until that date. After that date, you will have to use your recovery document, allowing you to access your funds locally.

Long live Monero, and a big thank you to everyone who supported us. We hope to build more cool things with Monero in the future :)

The RINO team

PS: Note that there is a known bug affecting wallets that haven’t been accessed for a long time, due to a synchronisation issue. If you connect for the first time since many months, it is possible your wallet will hang when attempting to send a transaction. If it is the case, just wait ~1h (your wallet will automatically resync on our servers), after which it will be fully functional. This only affects old wallets not accessed for a while, and will only affect them once.

PPS: Unfortunately there is no “sweep” feature on RINO. If you want to empty your wallet via the RINO platform it is possible some picoxmr dust remains on your wallet if you do not take exactly into account the transaction fees. Use your recovery document if you want to access remaining dust.

3
submitted 1 month ago by Wave@monero.town to c/monero@monero.town

cross-posted from: https://monero.town/post/4529359

Video @ Youtube

https://youtube.com/watch?v=0cRu98XSap0

SimpleX Chat - Next Level Private Messaging

There are still people who do not yet use SimpleX chat. It really is time to install SimpleX.chat

31
submitted 1 month ago by Wave@monero.town to c/technology@lemmy.world

Video @ Youtube

https://youtube.com/watch?v=0cRu98XSap0

SimpleX Chat - Next Level Private Messaging

There are still people who do not yet use SimpleX chat. It really is time to install SimpleX.chat

[-] Wave@monero.town 6 points 3 months ago

Do not use this. If you try to find something there, you are only giving away that you have done something there by trying to find something.

Imagine who is looking for a specific transaction? Even in other block explorers! Who is searching for a transaction or the details of a transaction at this point in time? Of course, most likely only someone who actually has something to do with it.

Operate your own fullnode and, if possible, refrain completely from researching transactions on third-party websites.

[-] Wave@monero.town 9 points 4 months ago

In the past, Reddit was the place where the Monero community met for many years. This is now a thing of the past. Ever since people started accepting unacceptable terms and conditions when using Reddit, its use has been frowned upon and widely avoided.

[-] Wave@monero.town 7 points 6 months ago

Edward Snowden,

I've been warning Bitcoin developers for ten years that privacy needs to be provided for at the protocol level. This is the final warning. The clock is ticking.

[-] Wave@monero.town 11 points 1 year ago

I don't know how iOS looks, so no problem for me.

[-] Wave@monero.town 7 points 1 year ago

It's really more about the eOS.

[-] Wave@monero.town 9 points 1 year ago

Yes, exactly that's the reason. To make you appear more equal to others. It is one part of how Mullvad Browser is providing you more privacy.

[-] Wave@monero.town 8 points 1 year ago

You can compare Mullvad Browser with your Firefox Browser. Just do a Fingerprint Test:

coveryourtracks.eff.org

Is your Firefox better? Does it hide more details about you? No.

Your Firefox is likely very unique. So your settings and extensions appear to be special; let's say you stick out of the others. Also your Screen-Size and if its a touchable screen and how much RAM your device has and so on.... Mullvad Browser makes all users look much more like the same user - users are less identifiable.

[-] Wave@monero.town 6 points 1 year ago

It is, just like Tor Browser, based on Firefox ESR.

[-] Wave@monero.town 8 points 1 year ago

Mullvad Browser is Tor Browser without Tor. TorBrowser evolved over many years, with a very long track record and is recommended uncountable times all over the world. So, if you want the TorBrowser without all the Tor stuff: here is it.

[-] Wave@monero.town 13 points 1 year ago

github.com/mullvad/mullvad-browser Firefox ESR - it's basically Tor Browser without Tor. Mullvad gets name recognition 100%

[-] Wave@monero.town 7 points 1 year ago* (last edited 1 year ago)

Yes, dailydrive. More anonymous than firefox with addons.

view more: next ›

Wave

joined 1 year ago