Replies (26)

Fotoart's avatar
Fotoart 5 months ago
Wow, so cool, @Blink Wallet! Even the Stablesats integrated into the wallet, keeping the alternative holding of USD value JUST on the lightning network blew my mind 🀯 Keeping as much on bitcoin as possible. Super cool 😎
Fotoart's avatar
Fotoart 5 months ago
So the cautionary speaker of using "bitcoin" as cryptocurrency, really missed in his education that the @Blink Wallet also has stablecoin (known as Stablesats, super cool project, check it out how it's all done on the bitcoin network) and that's likely better than their Shilling!
Benking's avatar
Benking 5 months ago
Love seeing focus shift to real people using Bitcoin, not just corporations or governments talking about it.
wait until capped supply hoarded by VC wall street banksters and governments and taint the addresses like a bank account. Go ahead, Ai is not your friend.
I don’t agree that it is co-opted. I believe there will be solutions to the problems and bitcoin creators will create the right tools to keep the original vision of peer to peer electronic cash
Grin is basically Monero without ring signatures. It's transaction graph is easily visible to active adversaries monitoring the mempool (which you should assume when designing seriously for privacy). Awesome at scalability, just ok for privacy.
What do Tor exit nodes have to do specifically with Monero? Grin has to use Tor for network privacy too. Tx graph = following flow of funds. Monero has no amounts either and unlinkable addresses. All metadata and past transactions being erased is only true for Grin if you assume feds arent actively running their own Grin nodes and not saving it. That's a big gamble and trivial to do. If "coin mixing" sucks then not mixing at all is even worse. Besides Monero is upgrading to Full Chain Membership Proofs soon which will resolve those issues. Like I said Grin is way better at scaling just not as good for privacy in worst case scenarios.
You can use Monero via i2p or anonymous VPS Besides that ring CT has nothing to do with network anonymity which falls more under opsec. Are you sure you know what you are talking about?
↑