• 7 Posts
  • 185 Comments
Joined 1 year ago
cake
Cake day: June 4th, 2023

help-circle
  • You can make as many Bitcoin addresses as you want. You can look up an addresses balance but not a wallet’s balance. It’s not as clear as you’re making it sound.

    Bitcoin over Lightning is much, much more opaque, and it’s where the majority of Bitcoin transactions are now occurring. You can’t look up somebody’s balance. The only people who know about the transaction are you, the recipient, and any intermediary nodes used to forward the transaction. Privacy is continuing to improve on lightning and main chain.




  • It’s open source, and it’s fully self-custody which are two important features. Having a wallet directly integrated into the e-mail client is nice, being able to send payments to other users just knowing their e-mail address instead of their public key is pretty cool. It does automatic address rotation to preserve privacy. Wish it supported lightning for cheaper/faster transactions and additional privacy but hopefully that feature comes in time.







  • With whirlpool going out of biz, what coinjoin is there for btc?

    There’s plenty for anybody who want to research. Coinjoin is a technique.

    Doesn’t work when mempool fees are high

    LN is disconnected from mempool, that’s the entire point of an L2. Your transactions don’t go on chain or in the mempool. Main chain secures the transactions, lightning stores the transactions. The main chain only stores the start and end balance of a lightning channel, that’s it.

    Most people are forced/nudged into using custodial wallets

    Their choice, some people will always prefer custodial options no matter how easy non-custodial ones are. LN works fine non-custodially, that’s how I use it. You move money from L1 to L2 in a single tx. Now you have a lightning channel that can have functionally unlimited transactions in it between you and anybody else on lightning. Transactions confirm in a second for pennies in fees.

    LN was not designed to be a privacy tool. Bitcoiners tried to shoe-in that it is also a privacy tool

    Privacy continues to enhance, look at the Bolt12 upgrades for example. But I agree, and Bitcoin can’t hold a candle to Monero’s level of privacy.






  • You may want to look into Qubes, it can natively route an entire OS through Tor. Note that routing all your traffic may hurt your anonymity. For example, there what if an app on your machine reaches out to somewhere and reports the serial number of a piece of hardware and it does it through your “anonymous” Tor connection? Virtualizing that hardware can help avoid that. Think through your threat model.




  • Firstly, rich people already do this with our existing currency systems. So that has to be what we’re comparing against. And nobody has done this because there’s zero benefit to doing so.

    The thing you’re talking about is a 51% attack and the answer is:

    • The cost of doing so, which continues to increase and is around a trillion dollars currently. Even if you had the money, there are very significant logistical hurdles which make it difficult and means people would see it coming a mile away. They don’t have to buy coins, they have to buy energy and equipment to turn that energy into mining and they have to keep buying energy as long as they want their attack to continue. That trillion dollar figure is for one block worth of attack (10 minutes). The longer you attack, the more the cost per block goes up too.
    • There is no benefit to doing so. The second your attack ends, the network reverts to the true “main chain”, the system is designed to be really robust

    There are only two things you can do with a 51% attack

    • “double-spend” meaning you spend the same coins twice. But if somebody is going to trade you 1 trillion dollars of stuff, they’re going to wait for more than a few blocks confirmation. The scenarios where this makes any economic sense for anybody to attempt are basically zero.
    • Delay (censor) transactions which will go through the second your attack ends

    Even if you controlled 51% of the network you cannot:

    • Spend money you don’t have the key for
    • Increase the supply beyond 21 million coins
    • Otherwise make invalid transactions

    Because all other nodes would reject your transactions as invalid.