this post was submitted on 01 Sep 2024
6 points (68.8% liked)
Monero
1675 readers
25 users here now
This is the lemmy community of Monero (XMR), a secure, private, untraceable currency that is open-source and freely available to all.
Wallets
Android (Cake Wallet) / (Monero.com)
iOS (Cake Wallet) / (Monero.com)
Instance tags for discoverability:
Monero, XMR, crypto, cryptocurrency
founded 1 year ago
MODERATORS
you are viewing a single comment's thread
view the rest of the comments
view the rest of the comments
Notice that Signal isn't attacked (at least not yet). Telegram is optionally end to end encrypted and it is a for profit company. Those are two vectors that Durov was attacked on. It's the same reason Samurai Wallet was attacked on and Tornado Cash. Going after Monero would be much harder. It is not a for profit company (or even DAO). It's privacy is part of the protocol, like SSH and when ring signatures are gone the final legal potential weakness will be gone. Legally, there is no clear way to attack Monero since if Monero is attacked, any privacy technology like VPNs and SSH and HTTPS could also be attacked and that would have a major industry backlash. It is far more likely that if an attack happens, the infrastructure would be attacked (e.g. getting Monero off github, etc) by putting pressure on the web hosts, but there are already several projects that work on GIT over TOR so this is more an inconvenience than a threat. At the moment, I'm not worried. If Signal and ZCash are attacked, then I'd start to be more worried.
Good points, I also think that they have easier fish to fry right now but that time will come, and the project needs to be ready for that. And when we start worrying is not a good time to start thinking about what to do.
I am a bit uncomfortable about the lack of shared knowledge about what are the attack vectors, when should we start to worrying about this or that, etc.