pull down to refresh

This was a long one... 7 hours!
There were some parts that were interesting as he was working on Bitcoin very early. One of the main points he likes to rant on is that Bitcoin has a leadership problem. Core has been corrupt for a long time and there's no one accountable for anyting. He want's a bunch of L2's so that people can build secure sidechains on Bitcoin.
I thought Amir was pretty hypocritical and you can tell he's been away from Bitcoin for a long time. Some examples were that he said Monero is great for funding a militia, while later saying ring signatures are broken. He talks of creating "darkfi" to create true anonymity and censorship resistant while not being able to comment on whether there will be a token (of course there will be!).
Sadly Vlad might have been a bit star struck to push back a bit when he's criticizing Bitcoin or nostr. The last year The Bitcoin Takeover pod has become a bit of a sh$tcoin show.
Anyway, there were some interesting stories about Peter Todd and Luke Dashir.
100 sats \ 0 replies \ @k00b 7 Jan
I recall seeing Amir in some of the early bitcoin docs and have been kind of curious where he ended up.
reply
Monero definitely provides much better privacy than Bitcoin. And Amir mentioned FCMP solving ring signatures problems so not sure how that is hypocritical.
reply
21 sats \ 1 reply \ @OT OP 11 Jan
As I understand FCMP is not currently on monero so why is he saying that it's pretty cool that people are using it to fund militias if in it's current form can be traced?
To be fair he also said everything is broken. Coinjoins, Signal, Tor etc. Because there's still not a working product in Darkfi I think it's fair to call him hypocritical. Sounds like he might be a bit of a Jack of all trades, master of none. He has bad blood with a lot of people in the Bitcoin space and it shows.
reply
You're correct FCMP isn't currently on Monero, but should be relatively soon. I thought he was saying Monero was the best privacy tool currently available, relative to everything else, and with the most adoption and clear direction. It has potential edge case attacks, but it is not naively traceable.
reply
21 sats \ 1 reply \ @nym 11 Jan
reply
deleted by author