Monero (dont hoard the info , this keeps us all safe)

  • Thread starter Thread starter Whoopiegoldburgg222
  • Start date Start date
@Clarissa, if someone for instance is running tor over vpn with an encrypted e mail provider on android and uses xmr when at all possible. Is there more one could do for safety ? Im guessing creating a personal pgp key but im not too savvy on that and don't know if it can be done on mobile platforms. Thoughts ? 

 
@LysergamideLandscapes1938 Dude I have chrome os laptop for school and it sucks!! is there anyway for someone like me to be able to download tails on a usb or do you think I just need to get a windows or something? 
TAILS is SUPPOSED to be run on a USB! Of course you can! You should research it! Edward Snowden recommends TAILS. It's an amnesiac OS, meaning when it is shit down it doesn't keep any residual data unless you created an encrypted partition for storage.

 
@Clarissa, if someone for instance is running tor over vpn with an encrypted e mail provider on android and uses xmr when at all possible. Is there more one could do for safety ? Im guessing creating a personal pgp key but im not too savvy on that and don't know if it can be done on mobile platforms. Thoughts ? 
If you want to use PGP on a mobile device, then use OpenKeychain for Android. Idk if they have an iOS counterpart created or if you'd need to use another app, but that is your start. It is very simple. But make sure your PGP keys are always 4096-bit, as anything lower is outdated and less secure. If using OpenKeychain, go to the Advanced tab when creating your PGP, and that is where you will find the means to set the bitrate and more. You should ensure your subkeys also are 4096-bit. You also should enter random gibberish when prompted to enter your email (it won't recognize that it isn't an email, and you don't want your PGP linked to you, and using a made up email with a legitimate domain like Gmail or Protonmail could link it to an innocent party who happens to possess the made up email unbeknownst to you), and do NOT publish your key to the key servers, again for anonymity and security sake. It is good to set an expiration for your keys so that you have to keep rolling your keys using new ones, and the common practice agreed upon is every 3 to 6 months. This way you can't have your keys used to decrypt everything, and thus one key being compromised means only risking a chunk of your encrypted communications and not all the old ones. Also, if you are willing to dedicate a separate key to each contact you have them used with, that means you won't risk communications with everyone you use PGP with if one is compromised.

 
@Clarissa, if someone for instance is running tor over vpn with an encrypted e mail provider on android and uses xmr when at all possible. Is there more one could do for safety ? Im guessing creating a personal pgp key but im not too savvy on that and don't know if it can be done on mobile platforms. Thoughts ? 
@meds7922 Safety from who/whom?  Outside hackers, LE, all the above?  A PGP key is only useful for sending and receiving encrypted messages.  Just creating a private key pair doesn't really make you safe or safer unless you have the public keys of all the recipients you want to communicate with.  PGP is likely redundant if you are already using an encrypted e-mail provider.  I don't know much about using PGP on mobile, but @LysergamideLandscapes1938 seems to have some good advice on how to get started.

If you want to completely insulate yourself then your best bet is to run TAILS from a bootable USB drive with no persistent storage.  It also depends on how you are using XMR.  If you are buying XMR anonymously on a peer-to-peer site like localmonero and paying transactions from your XMR wallet, then you are doing everything right for optimal safety.  The problems with monero safety usually happen early on in the process if you are purchasing BTC through an exchange and then converting to XMR.

I would definitely recommend first looking into TAILS OS because running TOR over VPN isn't really a safe or reliable option.

 
@meds7922 Safety from who/whom?  Outside hackers, LE, all the above?  A PGP key is only useful for sending and receiving encrypted messages.  Just creating a private key pair doesn't really make you safe or safer unless you have the public keys of all the recipients you want to communicate with.  PGP is likely redundant if you are already using an encrypted e-mail provider.  I don't know much about using PGP on mobile, but @LysergamideLandscapes1938 seems to have some good advice on how to get started.

If you want to completely insulate yourself then your best bet is to run TAILS from a bootable USB drive with no persistent storage.  It also depends on how you are using XMR.  If you are buying XMR anonymously on a peer-to-peer site like localmonero and paying transactions from your XMR wallet, then you are doing everything right for optimal safety.  The problems with monero safety usually happen early on in the process if you are purchasing BTC through an exchange and then converting to XMR.

I would definitely recommend first looking into TAILS OS because running TOR over VPN isn't really a safe or reliable option.
Yes, safety from all. I am not really doing a lot of shopping, but it it only takes once to get caught up in some mess. I did figure buying btc from a large cryptocurrency market the converting to xmr really could be a bad idea. I will have to research tails and one part I do know is that would not be able to be done on mobile. Does tails keep all data off the computer and hd ? I believe I also read where there are different steps for keeping everything wiped after each session. It seems when people get lazy and overconfident, we read about their demise.

 
If you want to use PGP on a mobile device, then use OpenKeychain for Android. Idk if they have an iOS counterpart created or if you'd need to use another app, but that is your start. It is very simple. But make sure your PGP keys are always 4096-bit, as anything lower is outdated and less secure. If using OpenKeychain, go to the Advanced tab when creating your PGP, and that is where you will find the means to set the bitrate and more. You should ensure your subkeys also are 4096-bit. You also should enter random gibberish when prompted to enter your email (it won't recognize that it isn't an email, and you don't want your PGP linked to you, and using a made up email with a legitimate domain like Gmail or Protonmail could link it to an innocent party who happens to possess the made up email unbeknownst to you), and do NOT publish your key to the key servers, again for anonymity and security sake. It is good to set an expiration for your keys so that you have to keep rolling your keys using new ones, and the common practice agreed upon is every 3 to 6 months. This way you can't have your keys used to decrypt everything, and thus one key being compromised means only risking a chunk of your encrypted communications and not all the old ones. Also, if you are willing to dedicate a separate key to each contact you have them used with, that means you won't risk communications with everyone you use PGP with if one is compromised.
Thank you, that makes sense to me, everything I researched on it was way above my pay grade !  Lol.

 
Yes, safety from all. I am not really doing a lot of shopping, but it it only takes once to get caught up in some mess. I did figure buying btc from a large cryptocurrency market the converting to xmr really could be a bad idea. I will have to research tails and one part I do know is that would not be able to be done on mobile. Does tails keep all data off the computer and hd ? I believe I also read where there are different steps for keeping everything wiped after each session. It seems when people get lazy and overconfident, we read about their demise.
TAILS does keep your HD safe, as you don't boot from your HD, you boot from your USB containing TAILS. It is totally a separate system, isolated from your HD. Purchase XMR and BTC from Bisq, as it doesn't require KYC, is p2p (Peer-2-Peer), and is configured to route all traffic through TOR when using it .

 
@meds7922 Safety from who/whom?  Outside hackers, LE, all the above?  A PGP key is only useful for sending and receiving encrypted messages.  Just creating a private key pair doesn't really make you safe or safer unless you have the public keys of all the recipients you want to communicate with.  PGP is likely redundant if you are already using an encrypted e-mail provider.  I don't know much about using PGP on mobile, but @LysergamideLandscapes1938 seems to have some good advice on how to get started.

If you want to completely insulate yourself then your best bet is to run TAILS from a bootable USB drive with no persistent storage.  It also depends on how you are using XMR.  If you are buying XMR anonymously on a peer-to-peer site like localmonero and paying transactions from your XMR wallet, then you are doing everything right for optimal safety.  The problems with monero safety usually happen early on in the process if you are purchasing BTC through an exchange and then converting to XMR.

I would definitely recommend first looking into TAILS OS because running TOR over VPN isn't really a safe or reliable option.
TOR over a VPN is not as good as TAILS, but you can use Express as your VPN and they have been the ONLY VPN proven to keep no logs of data of any sort like many VPNs only claim with us having to take them at their word. Express has even had their servers seized by the Turkish government for an investigation, and they found NOTHING on them whatsoever. This, along with many independent audits as well as being open-source on GitHub all verifies their legitimacy. Also, purchasing from localmonero isn't optimal security. It is better than an exchange, but using Bisq is the safest bet, as it runs through TOR itself as well as being KYC-less. Also, Bisq supports several cryptocurrencies including BTC and XMR both.

Also, I've seen talk of how using PGP is redundant when using an encrypted email provider, but it is a NECESSARY AND VALUABLE, PRAGMATIC REDUNDANCY. For one, these email providers only are encrypted between users of the same service, not when emailing to other domain types, and they also can be decrypted and thus made insecure by the services themselves, which means that they are only secure until the service is compromised or they are made to hand over info to LE.

 
Last edited by a moderator:
TOR over a VPN is not as good as TAILS, but you can use Express as your VPN and they have been the ONLY VPN proven to keep no logs of data of any sort like many VPNs only claim with us having to take them at their word. Express has even had their servers seized by the Turkish government for an investigation, and they found NOTHING on them whatsoever. This, along with many independent audits as well as being open-source on GitHub all verifies their legitimacy. Also, purchasing from localmonero isn't optimal security. It is better than an exchange, but using Bisq is the safest bet, as it runs through TOR itself as well as being KYC-less. Also, Bisq supports several cryptocurrencies including BTC and XMR both.

Also, I've seen talk of how using PGP is redundant when using an encrypted email provider, but it is a NECESSARY AND VALUABLE, PRAGMATIC REDUNDANCY. For one, these email providers only are encrypted between users of the same service, not when emailing to other domain types, and they also can be decrypted and thus made insecure by the services themselves, which means that they are only secure until the service is compromised or they are made to hand over info to LE.
@LysergamideLandscapes1938 Everyone (from expert researchers to ordinary users) has their own opinion or data on VPN companies.  I kind of gave up on trying to find the "perfect" VPN.  Express sounds good from what you are telling me, but it's difficult to trust these providers without actually having access to one of their servers to prove their claims.

Yeah I thought I said to purchase from a peer-to-peer like localmonero, not that localmonero is best for security.  It was just the first example I could think of.  I didn't realize Bisq runs through TOR.  I see why you would recommend it over other p2p's.

In this specific context (a beginner looking for easy practical advice), PGP with an encrypted provider may be redundant.  But I don't believe that for all cases.  I would personally rather PGP over encrypted email provider because these providers are vulnerable to attacks and I would rather put my trust in cryptography over a service.

 
@LysergamideLandscapes1938 Everyone (from expert researchers to ordinary users) has their own opinion or data on VPN companies.  I kind of gave up on trying to find the "perfect" VPN.  Express sounds good from what you are telling me, but it's difficult to trust these providers without actually having access to one of their servers to prove their claims.

Yeah I thought I said to purchase from a peer-to-peer like localmonero, not that localmonero is best for security.  It was just the first example I could think of.  I didn't realize Bisq runs through TOR.  I see why you would recommend it over other p2p's.

In this specific context (a beginner looking for easy practical advice), PGP with an encrypted provider may be redundant.  But I don't believe that for all cases.  I would personally rather PGP over encrypted email provider because these providers are vulnerable to attacks and I would rather put my trust in cryptography over a service.
Again, I would like to reiterate that Express got their servers in Turkey seuzed and the Turkish government found literally NOTHING on them, proving their claims. Normally I concur with you about having to take VPNs at their word, but Express has been proven by that seizure to really stick to their guns about not logging data. I appreciate your knowledge about OpSec regarding digital aspects of it. All too rare to find people who do have a healthy knowledge-base to work from. And yeah, Bisq is awesome. I'm very satisfied with how the software is set up.

 
Last edited by a moderator:
Again, I would like to reiterate that Express got their servers in Turkey seuzed and the Turkish government found literally NOTHING on them, proving their claims. Normally I concur with you about having to take VPNs at their word, but Express has been proven by that seizure to really stick to their guns about not logging data. I appreciate your knowledge about OpSec regarding digital aspects of it. All too rare to find people who do have a healthy knowledge-base to work from. And yeah, Bisq is awesome. I'm very satisfied with how the software is set up.
@LysergamideLandscapes1938 I try to pitch in here and there.  I have a Cybersecurity degree that I don't use during the day (well I use the computer science part, just not security).

I wrote a short tutorial about using Monero/XMR somewhere on this forum and I remember referencing Bisq.  I should probably heed my own recommendations and check it out.

 
@LysergamideLandscapes1938 I try to pitch in here and there.  I have a Cybersecurity degree that I don't use during the day (well I use the computer science part, just not security).

I wrote a short tutorial about using Monero/XMR somewhere on this forum and I remember referencing Bisq.  I should probably heed my own recommendations and check it out.
Really? Do you mind swapping DMs? I'm wanting to pick your brain and perhaps I can be of help with educating you as well perhaps. I don't have a cybersecurity degree, but am an avid researcher for my own education and use (as well as to help others like I am trying to do here) in my free time and have by necessity had to implement my knowledge for a decade now due to involvement in the ŘČ scene and the Đ@ŘĶŇ3Ţ scene as well, amongst other activities. 

 
TOR over a VPN is not as good as TAILS, but you can use Express as your VPN and they have been the ONLY VPN proven to keep no logs of data of any sort like many VPNs only claim with us having to take them at their word. Express has even had their servers seized by the Turkish government for an investigation, and they found NOTHING on them whatsoever. This, along with many independent audits as well as being open-source on GitHub all verifies their legitimacy. Also, purchasing from localmonero isn't optimal security. It is better than an exchange, but using Bisq is the safest bet, as it runs through TOR itself as well as being KYC-less. Also, Bisq supports several cryptocurrencies including BTC and XMR both.

Also, I've seen talk of how using PGP is redundant when using an encrypted email provider, but it is a NECESSARY AND VALUABLE, PRAGMATIC REDUNDANCY. For one, these email providers only are encrypted between users of the same service, not when emailing to other domain types, and they also can be decrypted and thus made insecure by the services themselves, which means that they are only secure until the service is compromised or they are made to hand over info to LE.
Thank you for this info. I can use those tips to make things as secure as possible with what I have to work with currently. PGP, another layer of security and I would be able to shop at the W.H. gift shop instead of just looking.  ;)

 
Drugbuyersguide Shoutbox
  1. tiquanunderwood @ tiquanunderwood: What's good guys! Just got back home. Missing football today :( Fuck the probowl lol
  2. shoutback @ shoutback: Volkanovski is the greatest featherweight of all time. Better than Aldo or Holloway at their peaks.
  3. S @ sawganaut: I bet btc bottom is in
  4. D @ dragnetopher: No, I don’t think it. I know it. And it’s not just bitcoin, it’s all crypto. And like I said, they’re selling to acquire liquidity for when countries truly start utilizing what’s been set in place. The USD is under controlled demolition as we speak. This is all part of it.
  5. xenxra @ xenxra: there is no shortage of whales - https://tikolu.net/i/fmnru.png
  6. xenxra @ xenxra: tokenisation is not a plan its already been happening for months, ive been trading this whole move on silver through ethereum
  7. xenxra @ xenxra: you think whales are dumping bitcoin because of something everyone has known about for like 4 years? what does bitcoin liquidity have to do with trading tokenized assets? they don't have pooled liquidity.
  8. D @ dragnetopher: Whales are tanking BTC due to the fact that the future is coming now, literally. There’s a plan to tokenize every single asset possible. This is whales dumping so they can have liquidity for the Springtime.
  9. xenxra @ xenxra: @Gulp2788 this is a terrible spot to buy bitcoin haphazardly because it's going down another $5k -$7k if 80,000 doesn't hold. i told everyone to get the fuck out of bitcoin at $103k. it's better to buy late when the bottom is more certain than throw darts and act like the opposite outcome was unavoidable just because it went down "a lot" and everyone seems to be "freaking out". wait for it to get back over 85k
  10. xenxra @ xenxra: @aarons the last time i said monero was on discount in here it went up 5x in 3 months
  11. Gulp2788 @ Gulp2788: good opportunity to buy more btc if you are gonna do so imo, me I'm buying the btc to switch into better currencies
  12. Gulp2788 @ Gulp2788: bah politics, no need to worry BTC is a honeypot anyway
  13. fishladder @ fishladder: down since trump
  14. Gulp2788 @ Gulp2788: btc has been hovering around 90k for a year everyone is freaking out tbh I am laughing
  15. shoutback @ shoutback: Wow wasn't btc just at 120K or something?
  16. shoutback @ shoutback: Also 1.Usyk 2.Inoue 3.Crawford top 3 and anyone thinks anything else they are crazy
  17. shoutback @ shoutback: So what? No fight fans here?
  18. Gulp2788 @ Gulp2788: xmr has always been what bitcoin wanted to be
  19. Realbenzeyes @ Realbenzeyes: On one hand I would like to see Danrnold finally get his ring after all he’s been through, but on the other hand drake maye taking the pats to the SB in his 2nd year? Idk which I want to see. I’m not a fan of either, I’m a joe shiesty kinda guy lol WHO-DEY
  20. aarons @ aarons: I don't need a privacy coin, I need something to double my money in 18 months :ROFLMAO:
Back
Top