• 0 Posts
  • 47 Comments
Joined 16 days ago
cake
Cake day: May 7th, 2026

help-circle
  • They might see that I ate a sandwich and mailed a letter vs my transactions are in a public ledger and can be tied to me at any time in the future when that ledgers cryptography gets broken or my information or the other party’s information gets corroborated.

    Quantum is fake. Everybody knows it but no one talks about it.

    Parallel computing is not fake though, and the technology to do it is being deployed at scale never seen before in our lives. Hash cracking software is already designed to take advantage of video cards, and the same mathematics were put into service and honed on those video cards years before during the crypto boom(s).

    So now you have to contend with the future of ai: if the bubble pops then there’s piles of parallel computing hardware out there that are suddenly upside down on their leases and have to be pressed into service doing something, anything. If the bubble doesn’t pop then consistent improvements in efficiency of new stuff cause old hardware to become available to the part of the market that can afford a little more per millisecond of torch time: crypto and crackers.

    This is already happening.

    The space you need to be able to solve for to transact physically is limited and finite, the same space for digital is unlimited and infinite.



  • I think you’re making some critical errors in this reply. If you make personal privacy or security decisions based on its content, it’s probably a very good idea to reevaluate them with a clear and honest outlook.

    It is easier to develop trust of a single provider than to develop trust of a random decentralized network of providers in a system that has been under confirmed attack for at least 15 years.

    Browser fingerprinting can be defeated or manipulated in many ways to accomplish different goals outside of either using tor or a vpn.

    Cash may not be under active surveillance and provides fantastic anonymity if you are capable of handling it appropriately. Even if you are not, investigating cash transactions is incredibly expensive, cumbersome, time sensitive and is defeated by a million simple methods that have been in practice for millennia.



  • Physical surveillance is barely even circumstantial evidence of the crimes we’re talking about, Hndl troves are incontrovertible. People get caught using monero to do crimes all the time.

    Of course if you dress up like the hamburgler you’re gonna stick out. Just look normal.

    I did not intend to fight you about this, the point of my reply was to provide some context about the often overlooked physical side of things.

    We very often overlook the physical because we think it’s too unknown and that we understand the digital much better but in many years I’ve never met a person who thought that way and could explain in detail how the web works or why certificates are scrubbed.

    Keep your nose clean out there, you never know whose gonna be looking in 20 years…







  • You are not following the point I’m making:

    The account you buy on the darknet works because the rest of the internet already associated it with an identity. That means law enforcement has cause to investigate the new user for impersonation or id theft. It doesn’t matter if they can’t get you for id theft or impersonation on a technicality, they’re already investigating you at that point! Law enforcement attention is what you don’t want!

    It’s like using your neighbors car with an expired tag because you don’t want to have your car show up on the highway cameras.


  • It varies by jurisdiction but if the reseller you bought from is selling you an account used by some other person for some personally identifiable thing (which is why the internet at large trusts that account and why you bought it!) then you’re at the very least toeing the line of Id theft or impersonation and while the cops might not be able to get you for that particular crime they will absolutely have enough suspicion to investigate you and discover other crimes or even just watchlist you.

    I don’t care if you break the law from a moral or ethical standpoint, but it can cause you problems from a practical one.









  • May I interest you in the “ln” command?

    Usually if you wanna access a file (or a directory, that’s a file too!) from some place other than where it is in the filesystem you make a link using ln like “ln /mnt/target link_name”. Which would give you a link type file (that shows up as a link when you give -l to ls) called “link_name” which references “/mnt/target” when you try to do something to it (Like ls!).