this post was submitted on 07 Sep 2024
13 points (100.0% liked)

Monero

1725 readers
13 users here now

This is the lemmy community of Monero (XMR), a secure, private, untraceable currency that is open-source and freely available to all.

GitHub

StackExchange

Twitter

Wallets

Desktop (CLI, GUI)

Desktop (Feather)

Mac & Linux (Cake Wallet)

Web (MyMonero)

Android (Monerujo)

Android (MyMonero)

Android (Cake Wallet) / (Monero.com)

Android (Stack Wallet)

iOS (MyMonero)

iOS (Cake Wallet) / (Monero.com)

iOS (Stack Wallet)

iOS (Edge Wallet)

Instance tags for discoverability:

Monero, XMR, crypto, cryptocurrency

founded 2 years ago
MODERATORS
 

Nihilist puts out another very informative article, great work!

you are viewing a single comment's thread
view the rest of the comments
[–] nihilist@monero.town 3 points 3 months ago* (last edited 3 months ago) (2 children)

my pleasure ;) (if i missed anything, feel free to let me know btw)

[–] roboto@feddit.org 2 points 3 months ago (1 children)

Super helpful, although I’m wondering if running your own node could potentially expose you as well in case someone really wants to find you? Like are there any security risks? And what if others find your node and connect to it would they be able to see your IP?

Just asking because I’m not very familiar with the technology and want to make sure I’m using monero as intended, that is anonymously.

[–] nihilist@monero.town 4 points 3 months ago* (last edited 3 months ago) (1 children)

if you run your own node, it means that the adversary needs to come and ask you directly to give you the details of who connected to the node. and if you keep Tor in between you and your own node, you're maintaining anonymity aswell.

if others find your (remote) node its not changing anything, you're making it available for them to use monero

but still they should run their own monero node to keep decentralizing further

[–] roboto@feddit.org 1 points 3 months ago

Alright got it, but regarding TOR aren’t there also vulnerabilities with compromised exit nodes? I feel like once you go down the rabbit hole of trying to achieve true anonymity there’s always another layer of complications if you wanna do things right.

[–] pedroapero@lemmy.ml 0 points 3 months ago

Subscribed to your RSS this time, thanks!