Stay on topic:

  • This thread is only for comments discussing the uncertainties, shortcomings, and concerns some may have about Monero.
  • NOT the positive aspects of it.
  • Discussion can relate to the technology itself or its economics.
  • Talk about community and price is not wanted, but some discussion about it maybe allowed if it relates well.
  • Be as respectful and nice as possible. This discussion has potential to be more emotionally charged as it may bring up issues that are extremely upsetting: many people are not only financially but emotionally invested in the ideas and tools around Monero.

How it works:

  • Post your concerns about Monero in reply to this thread.
  • If you can address these concerns, or add further details to them – reply to that comment. This will make it easily sort-able.
  • Upvote the comments that are the most valid criticisms of it that have few or no real honest solutions/answers to them.
  • The comment that mentions the biggest problems of Monero should have the most karma.

Previous:


The first principle is that you must not fool yourself — and you are the easiest person to fool.

  • Bobr@lemmy.libertarianfellowship.org
    link
    fedilink
    arrow-up
    5
    ·
    edit-2
    3 months ago

    What’s the plan when the assault against the monero devs is launched?

    Some devs are anonymous but that’s not a plan, just countermeasures.

    What such a plan could look like? I don’t see other options except for staying anonymous…

    • antidote@monero.town
      link
      fedilink
      arrow-up
      4
      ·
      3 months ago

      I don’t know exactly right now what the plan should look like. We could ask the general fund to have someone at least look at it and give recommendations. Someone in opsec, systems design or the likes would do.

      The way I see it, a good way to neutralize monero is to first identity as many important participants as possible and then take the opportunity of the next ‘crisis’ to bash them very hard and associate them with the worst possible terrorists in the public opinion.

      By important participants I don’t mean just the core devs. I am talking about people like rbrunner, Justin, Rucknium, etc. All those that are the 5% making the 95% of impact in the ecosystem (compared to us consumers of their marvelous work). They currently don’t think their threat level is very high, they should not have to hide anyway. But the issue is that when they will find monero keys for whatever CP ring they can seize that opportunity to frame all our ecosystem as supporters of CP and terrorism. Remember, it doesn’t need to be true, just to be repeated again and again to the masses. After that you can just jail a few core devs, a few Dex operators and some event organizers to scare the little bunch back to their caves.

      BTW the point is not to find a countermeasure yet but to put ourselves in the shoes of the adversaries and consider their options. The plan will itself come up after considering these points.

      Tldr: let’s ask the general fund to review our strategic opsec as a project.

      • nihilist@monero.town
        link
        fedilink
        arrow-up
        3
        ·
        edit-2
        3 months ago

        it’s not complicated, make sure that anonymity is maintained for all developers (like they do all their work from inside a whonix VM let’s say), and that you have copies of all the important monero mirrors somewhere (on a gitea instance accessible via .onion or something similar), in case if monero gets the tornadocash treatment.

        that way they can’t go after the developers’ freedom of speech, and even if they take the repositories down from github, the show can go on elsewhere.

        i’ll pitch in to advise people if opsec is brought up

      • Findmysec@infosec.pub
        link
        fedilink
        English
        arrow-up
        2
        ·
        3 months ago

        Basic OPSEC is not very hard but needs investment in terms of time and money. Running something like Qubes with Whonix/I2P routers should do well enough in terms of traffic obfuscation, and backup and encryption strategies for keys should be the next level.