Decentralized mixing services where each node will be a validator of the mixing network is a decent solution, currently being worked by one of the providers of this much needed privacy in the bitcoin community. Soon to be released. Yet, in that case, IMO, due to the fact that their creators are well known and respected and have a business there is a single point of failure that could harm adoption.
  • What are your thoughts?
    • Should developers in the privacy industry go anon?
Note Satoshi understood what it was at stake, he showed the path. Maybe we should take note and build anonymously privacy tools for the community...
JoinMarket is already decentralized, there is no central coordinator and no single messaging channel. Although improvements are possible there too (for example, message channels are list in config file, could use some gossip protocol to find new directory nodes). https://github.com/JoinMarket-Org/joinmarket-clientserver
Another decentralized idea is DMix proposal by Fedi Barbara. https://fadibarbara.it/papers/dmix.pdf
reply
they should always be anon, and I'm counting on bounties being embedded in lightning invoices.
reply
Depends on what you are developing but if you are on the fence about it you should absolutely go anon. Like hash functions privacy only goes one way💯
reply
It is bad news. Devs will probably have to go anon and do like Satoshi once the software is released.
reply
It's not only about getting anon while doing a project, it's everything. Developers lack a place just as like Github where they could dev their projects anonymously.
It would be possible to create on top of NOSTR?
Everything based on keys and also sat tips to incentive projects instead of likes...
As more and more people will use BTC, more government gestapo will try to prosecute developers... that's the harsh reality.
reply
reply
Seems nice, didn't knew about it... Already taking a look this moment.
reply
You can use gitlab
reply
With https://github.com/chr15m/gitnonymous you can contribute pseudonymously to Git repositories over Tor (including Github).
Create a new email address, signup on Github, generate some keys and keep Tor Browser running for the Tor Proxy on port 9150.
Works like a charm.
reply
I thought most TOR endpoints were controlled by the CIA anyway?
reply
Most "end points", unlikely..
Anyone can run its own proxy and provide it as a public service, if you have bandwidth that you do not need you can consider it, as an advantage, your traffic will be mixed with the traffic of many other users, which is considered a smart move. Snowden, in his book "Permanent Record" explain the reason of this cyber security practice.
Now, governments spy agencies and law enforcement on a case basis may create farms as exit nodes to collect and analyze traffic, not an easy task and very expensive.
reply
Feels fragile. If you slip up even once and connect when not over tor, they'll have your IP. I do like the idea of building these sorts of tools on nostr in order to remove github from the equation entirely.
reply
There's still an ongoing suit by Coin Center, filed in Florida.
reply
Going anon is mostly useful for protecting yourself from doxxing. If the govt wants to find you, they will, unless you are absolutely immaculate with your privacy practices and never ever slip up.
reply
Perhaps, I do not think is so hard, they fearmonger people into believing so, but nah, if that was true every big fish cyber criminal will be caught, rarely they are, and when you see one caught it seems a cover story, in the case of Tornado, he was not hiding, openly running a privacy tool...
If a dev wants privacy and a an anon setup, compartmentalization of the development setup is sufficient (including secure networking...)
reply
They should be anon as the developers of Monero.
reply
reply