lontivero's avatar
lontivero
_@lontivero.github.io
npub1nccw...z7mj
Bitcoin privacy warrior.
lontivero's avatar
lontivero 8 months ago
The good thing about democratic elections in Europe is that if you vote wrong they give you another chance
lontivero's avatar
lontivero 8 months ago
I've just watched the most shameless propaganda movie of my life: BlacKkKlansman. In fact, this one is even worse than Ip Man 4: The Finale.
lontivero's avatar
lontivero 8 months ago
lontivero's avatar
lontivero 8 months ago
I would like to follow people who hate #WasabiWallet. What npubs subscribe to?
lontivero's avatar
lontivero 8 months ago
Two years ago I wrote Nostra: a F# library, a F# relay and a F# CLI client. I know how nostr works but I have no idea what NIP-46 is about or what ncrypt is about. That means two things: * Things are moving really fast * All UX guys should by fired image
lontivero's avatar
lontivero 8 months ago
WTF! This coinjoin contains a payment to El Salvador's bitcoin address 32ixEdVJWo3kmvJGMTZq5jAQVZZeuwnqzo. It looks more like someone testing the pay-in-coinjoin feature than a real "donation". The curious thing here is that the donor used a standard denomination, something that doesn't make any sense here because the address is already known. I can imagine four reasons for this: 1. Making sure nobody will ever send money to El Salvador using Pay-In-Coinjoin tx again. This is because the coordinators prevent address reuse and then it will be impossible to pay to the same address again. It could be a defense mechanism. 2. Creating a link between El Salvador's bitcoin address and Lazarus addresses. I'm not a chain analysis company and I have no way to know whether or not that tx includes Lazarus funds, but if so, that could be the intention (silly). 3. Inflating the Wasabi calculated anonscore (demonstrating the existence of a bug), but nobody has reported it yet. 4. Donating while playing with Wasabi.
lontivero's avatar
lontivero 8 months ago
Mempool.space address poisoning warnings in Wasabi Coinjoins are false positives because the actual attack involves sending almost dust amounts to addresses that look very similar to one of the target wallet addresses, hoping to trick users who rely on their transaction history to identify their own addresses. image Here the amounts are pretty big, therefore this is not an attack. @mempool a way to improve your heristic could be to take the amounts into consideration.
lontivero's avatar
lontivero 8 months ago
Do not use Wasabi as a mixer because it is not, but even more important is that after you leave Wasabi you lose the ability to manage your privacy and you will lose it immediately. Here you can see an extreme example of someone who not only used Wasabi as a mixer but also move the money out using the exact same pattern with the exact same wallet fingerprint consolidating the exact same number of uxtos which sum approximatelly the same amount, all in a narrow range of blocks (at the same time, basically). image