

Infuse? Or is there a different one?


Infuse? Or is there a different one?


I think you’re making some critical errors in this reply. If you make personal privacy or security decisions based on its content, it’s probably a very good idea to reevaluate them with a clear and honest outlook.
It is easier to develop trust of a single provider than to develop trust of a random decentralized network of providers in a system that has been under confirmed attack for at least 15 years.
Browser fingerprinting can be defeated or manipulated in many ways to accomplish different goals outside of either using tor or a vpn.
Cash may not be under active surveillance and provides fantastic anonymity if you are capable of handling it appropriately. Even if you are not, investigating cash transactions is incredibly expensive, cumbersome, time sensitive and is defeated by a million simple methods that have been in practice for millennia.


We accept that there is a surveillance panopticon that operates on all our actions online. We accept that it collects information that can be compiled to form a frighteningly accurate picture of us as individuals. We accept that the internet as a whole uses the presence of this information to prevent anonymity, ostensibly to stop spammers and scammers.
But it wouldn’t be obvious an account changed hands.


Physical surveillance is barely even circumstantial evidence of the crimes we’re talking about, Hndl troves are incontrovertible. People get caught using monero to do crimes all the time.
Of course if you dress up like the hamburgler you’re gonna stick out. Just look normal.
I did not intend to fight you about this, the point of my reply was to provide some context about the often overlooked physical side of things.
We very often overlook the physical because we think it’s too unknown and that we understand the digital much better but in many years I’ve never met a person who thought that way and could explain in detail how the web works or why certificates are scrubbed.
Keep your nose clean out there, you never know whose gonna be looking in 20 years…


The threat is that someone who learns the material facts of your accounts interactions around the internet would (correctly) recognize that it changed hands and if that person were some kind of cop they would have cause to investigate further, possibly uncovering other facts about you or your activities.
The point is that you’re breaking one of the cardinal rules: “keep your head down and your nose clean!”
Not gonna fight about it, just making it known.


Physical surveillance of mail is incredibly expensive, slow and subject to a bunch of regulations.
It also doesn’t consistently work.
Electronic surveillance of communications is incredibly cheap in comparison, near instantaneous and an evolving new technology that’s loosely regulated if at all.
It also creates a 1:1 copy of the transmission for interpretation at a later date.


Hndl applied to physical surveillance is all metadata. Hndl for digital interactions is content too.


It’s anonymous at the moment you buy it. After that you use it and identifying data and metadata that conflicts with the original users data and metadata starts to accumulate.


Physical movement can be tracked by cameras. All digital transactions are tracked by virtue of the way the internet works.
When you put your trust in digital transactions you are putting your trust in the cryptography that hopefully underpins them. With recent regimes of harvest now decrypt later, you are putting your trust in both the perfect forward and quantum/parallel resistance of that cryptography.
Just some food for thought. Sending cash might be a smarter choice than you think.


You are not following the point I’m making:
The account you buy on the darknet works because the rest of the internet already associated it with an identity. That means law enforcement has cause to investigate the new user for impersonation or id theft. It doesn’t matter if they can’t get you for id theft or impersonation on a technicality, they’re already investigating you at that point! Law enforcement attention is what you don’t want!
It’s like using your neighbors car with an expired tag because you don’t want to have your car show up on the highway cameras.


It varies by jurisdiction but if the reseller you bought from is selling you an account used by some other person for some personally identifiable thing (which is why the internet at large trusts that account and why you bought it!) then you’re at the very least toeing the line of Id theft or impersonation and while the cops might not be able to get you for that particular crime they will absolutely have enough suspicion to investigate you and discover other crimes or even just watchlist you.
I don’t care if you break the law from a moral or ethical standpoint, but it can cause you problems from a practical one.


Yeah I use mullvad.


It’s not a big deal because the answer to the problem is “don’t run snaps”.


Uhh, proton works fine…
You might need to clear your browsing data. You might want to start doing that all the time if you’re concerned about anonymity or privacy.
Everyone telling you email isn’t private is right.
Don’t use it for things you don’t want to be public knowledge.


Get a load of this guy, doesn’t even have a vernier tape measure!


What is your desktop environment?
May I interest you in the “ln” command?
Usually if you wanna access a file (or a directory, that’s a file too!) from some place other than where it is in the filesystem you make a link using ln like “ln /mnt/target link_name”. Which would give you a link type file (that shows up as a link when you give -l to ls) called “link_name” which references “/mnt/target” when you try to do something to it (Like ls!).
They might see that I ate a sandwich and mailed a letter vs my transactions are in a public ledger and can be tied to me at any time in the future when that ledgers cryptography gets broken or my information or the other party’s information gets corroborated.
Quantum is fake. Everybody knows it but no one talks about it.
Parallel computing is not fake though, and the technology to do it is being deployed at scale never seen before in our lives. Hash cracking software is already designed to take advantage of video cards, and the same mathematics were put into service and honed on those video cards years before during the crypto boom(s).
So now you have to contend with the future of ai: if the bubble pops then there’s piles of parallel computing hardware out there that are suddenly upside down on their leases and have to be pressed into service doing something, anything. If the bubble doesn’t pop then consistent improvements in efficiency of new stuff cause old hardware to become available to the part of the market that can afford a little more per millisecond of torch time: crypto and crackers.
This is already happening.
The space you need to be able to solve for to transact physically is limited and finite, the same space for digital is unlimited and infinite.