- cross-posted to:
- [email protected]
- cross-posted to:
- [email protected]
35 crypto companies got together to make a change dot org petition called “Bitcoin Deserves an Emoji”.
F that
35 crypto companies got together to make a change dot org petition called “Bitcoin Deserves an Emoji”.
F that
Lightning payments are onion routed, like Tor traffic.
Still not close to the same. That’s borrowed functions on one chain. Monero is triple encrypted. You crack one and you got no time left before the next chain flips the whole shebang.
If monero is using sane, modern encryption algorithms, “triple encryption” doesn’t really get you meaningfully more security.
It already takes an insane amount of time to brute force good encryption algorithms, so if people are cracking your encryption, they’re doing it via some vulnerability/flaw/exploit in the algorithm which allows then to crack things much faster than brute forcing. If you use the same encryption algorithm for all three layers, you just have to exploit it three times instead of one, which isn’t really adding any difficulty to a competent attacker.
What if you use three different encryption algorithms, you may ask? Well, that’s even worse because you’ve now tripled the attack surface of your encryption scheme.
That’s not at all addressing a single thing over what goes on in Monero. You either get it or you don’t and you just don’t. Go read more, yacky.
If you’ve got some articles handy, feel free to link them. My searches aren’t finding anything about Monero’s “triple encryption”.
https://www.getmonero.org/resources/moneropedia/
Nothing on that site mentions “triple encryption”. Can you clarify what you meant by that?
No. Educate yourself on how Monero works. All I’m saying is that it’s the safest. You want to understand complicated shit then go figure it out. I ain’t here to teach how shit works when the Moneropedia does it all already.
The short is that there are three factors. Each of which are separately encrypted and handle separate parts of the Monero. You have to crack all three to know about any particular exchange. They’re not on top of each other they way you infer.
Thanks, could have just clarified that from the beginning.
It’s not my fault you used a well-known cryptography term incorrectly.
It’s not close to the same thing, but definitely not trackable 100%, and comparable levels of privacy. Having less elegant code doesn’t change that. If you’d like, we can perform a test in which I make a lightning payment and you track it.
I don’t think it’s likely that an attacker can crack even your first layer of encryption in the time it takes for a transaction to propagate and settle.
You don’t get it and i ain’t here to explain what there already exists well made such for understanding.
I don’t even get that sentence!
And I ain’t an english teacher
They earn fucking shit
Money is evil.