OPSEC discussion

4 Replies, 443 Views

I have some random OpSec points.

Monero community always admits that ring sigs and sizes are the weakest links right now. I think having one wallet for receiving and one wallet for sending is a good idea if you have extreme OpSec needs. Just make sure to a wait a day or two before sending between them after you receive your monero and some time before sending from your sender wallet after you receive to it. But anyway I think this is unnecessary unless you want to mitigate real-world metadata and have a nation-state threat actor. You just need to do it right and make sure you have good amounts of time between all the transference.

https://web.getmonero.org/2019/10/18/sub...janus.html
http://monerotoruzizulg5ttgat2emf4d6fbmi...janus.html
Be aware of Janus attack as well Smile This is easy to mitigate if your wallet supports telling you which stealth address the payment came to. You just have to make sure to check them in these scenarios, or use a separate wallet for identities that are very high opsec to avoid ever slipping up.

https://moonstoneresearch.com/2023/11/03...-Hack.html
Do not use the Pocket Change feature on Monerujo Android Wallet!!! It will make you stand out among the rest of the transactions. The Monero CCS hack was done by the feds because the Monero devs are idiots who used Microsoft  Windows to host the CCS wallet, then used the Monerujo Pocket change features to let themselves be "traced" so as to cause doubt among the Monero community.
(This post was last modified: 06-14-2024, 06:34 AM by orangefrenly. Edit Reason: forgot some words )

Messages In This Thread
OPSEC discussion - by xmrfamily - 05-10-2024, 03:58 PM
RE: OPSEC discussion - by paid2 - 05-10-2024, 04:06 PM
RE: OPSEC discussion - by OrangeFren - 05-10-2024, 04:31 PM
RE: OPSEC discussion - by orangefrenly - 06-14-2024, 06:20 AM
RE: OPSEC discussion - by marketmaker - 06-19-2024, 09:50 AM



Users browsing this thread: 2 Guest(s)