pull down to refresh

The paradox of building these kind of tools

reply

You do realize that governments are already doing that on a massive scale with tools like Chainalysis, TRM Labs or Elliptic for example?

We are making it available to the public similar as OXT.me did so bitcoiners have access to the same tooling and can see for themselves what is possible and how they can improve their privacy.

reply

The state should make their own if they want.
The question is why people build these things. Let them stay in the darkness.
I am not saying that the state will not try to build them, but let them do it because later you can say you didn't approve it or want to pay for it (if you still pay taxes).

WHY do you want to make their life easier? Make it harder, by keeping them in dark, unknown.

reply

Thanks for working on this. Before oxt went away, I was pretty keen on spending time with something like this. Love to see that you all are adding more features!

reply

Thank you for the kind words. I think you will also like our next update. We are working on a node graph. Allowing you to manually plot graphs, or auto plot them with the auto analysis feature when combined with this taint path update. :)

reply

Please show us where is the "taint" in the payment you did to post this on SN, using LN.

reply

Lightning is much more private luckily. :)

reply

Bukele's sats are in fact Bitfinex sats. They are just moving them from one wallet to another (owned by Bitfinex aka Tether) and fool the entire world.

And we already know that, we don't need any mumbo jumbo analyzer for that, we use our brain.

reply
And we already know that, we don't need any mumbo jumbo analyzer for that, we use our brain.

obviously, patriarch speaks for family; however, some curious children, and nosy bureaucrats, do not have any sources of wisdom... neither family with domain expertise, nor friends with technological familiarity. for that sort of orphan, the site is a nifty little gimmick.

I hope @bithypha realizes how intractable the Hard Problem of Correlation gets, once you begin widening your problem domain outside of p2pkh or whatever was your first "complete" dataset.

reply

Are you not even a bit worried about all these "analyzing tools" ?
For example... when I try to visit that link posted I get this. It means my browser BLOCKED something suspicious, that it should not be there...

Yet people are blindly trust and use these "tools".

reply
I try to visit that link posted I get this. It means my browser BLOCKED something suspicious,

first off, thank you for posting that; I don't even feel comfortable doing WHOIS queries without double-checking my network configuration.

Are you not even a bit worried about all these "analyzing tools" ?

of course I worry. perpetuating the genius of Claude Monet does, gradually, perpetuate the sophomoric delusion that particle accelerators will teach something significant about the world, rather than simply providing well-preserved samples of fine art as it was done by one of the greatest masters. does this mean the access to galleries must include mandatory lectures about metaphysics, geometry, and neurology?

taint has only as much relevance as merchants give it; unfortunately, the stinking cat is long out of the bag, and has been marking all over the chain, for well over half a decade. arguments like ours must be done anytime free "taint detection" services are advertised, so the merchants who consider paying for the "professional" ones understand how much of their budget could get wasted chasing these vapors.

reply

Very true, if you follow the unknown outputs on every outgoing tx over here for example you can see that they pretend to "buy" 1 BTC everyday, when in fact they are just moving it around. :P

https://bithypha.com/cluster/address/3EMXXYYEMQvmbVfk18FMoHgry1FWKi3dkX?explorerTab=txs

reply

Thanks for sharing.

reply

This looks like a honeypot.

Unless it is open source and can be run locally (it is not).

In the logs of the web server there are links between the addresses somebody looked up, if browsed via Tor. Or if without Tor then also the person's IP address.

Surely you will claim that you ignore this information and you delete the logs? And people will blindly trust that?

Reminds me of the web sites where you input your credit card number or your passwords to check if they are stolen.

reply