diff --git a/xmrnodes/routes/meta.py b/xmrnodes/routes/meta.py index 72042e0..24e3094 100644 --- a/xmrnodes/routes/meta.py +++ b/xmrnodes/routes/meta.py @@ -104,6 +104,11 @@ def about(): return render_template("about.html") +@bp.route("/opsec") +def opsec(): + return render_template("opsec.html") + + @bp.route("/add", methods=["GET", "POST"]) def add(): if request.method == "POST": diff --git a/xmrnodes/static/images/coin_sweep.png b/xmrnodes/static/images/coin_sweep.png new file mode 100644 index 0000000..8d07c6d Binary files /dev/null and b/xmrnodes/static/images/coin_sweep.png differ diff --git a/xmrnodes/static/images/coin_sweep_outputs.png b/xmrnodes/static/images/coin_sweep_outputs.png new file mode 100644 index 0000000..f1357ca Binary files /dev/null and b/xmrnodes/static/images/coin_sweep_outputs.png differ diff --git a/xmrnodes/static/images/tainted_utxos.png b/xmrnodes/static/images/tainted_utxos.png new file mode 100644 index 0000000..f89e96f Binary files /dev/null and b/xmrnodes/static/images/tainted_utxos.png differ diff --git a/xmrnodes/templates/base.html b/xmrnodes/templates/base.html index 3be8971..38c0b77 100644 --- a/xmrnodes/templates/base.html +++ b/xmrnodes/templates/base.html @@ -27,11 +27,47 @@
-
+ There has been an influx of malicious nodes hosted by chain analysis and government agencies which spy on Monero users.
+ Some of them may be in this list - it's impossible to know.
+ To best protect yourself from surveillance please use Tor or run your own node.
+
+ To learn more about the surveillance issue, watch this video
+ How Monero Users Get Traced
+
+ To learn more on how to mitigate the surveillance, read this page: Opsec
+
{{ config.DONATE_ADDRESS }}
+ Chain analysis firms and law enforcement entities are observing the blockchain with spy nodes which log IP addresses. Safeguards such as Dandelion++ intended to mitigate this are not fool-proof. Swap services and exchanges comply with these agencies and provide additional metadata such as IP addresses, transaction hashes, and transaction amounts. Exchanges enforce KYC anyways, you're already identified there. +
+ ++ Additionally, these entities are "poisoning" wallets by sending tainted UTXOs - transactions which can allow them to monitor activity with a high degree of confidence if the user unknowingly spends them. Look at following image: +
+ + + ++ This is the donation wallet address I have hosted on the front page of this site. + It has received several tiny transactions which are very likely tainted UTXOs intended to monitor my wallet activity. + If I were to spend Monero and it ends up in a wallet controlled by a compliant entity then the additional metadata would confirm that the transaction came from my wallet. + Other metadata could be combined to de-anonymize my identity. + My activity can more or less be "traced" if I'm not careful to cover my metadata tracks. +
+ ++ Read more about the discussions here: MRL Notes +
+ ++ Read this. + Watch this. +
++ Here are the best things you can do to mitigate surveillance and protect your financial privacy: +
+ +--tx-proxy
enabled: instructions. Always use your own node for any wallet spending.
+ Doing this ensures your transactions are always sent over anonymous networks and thus your IP won't be captured by listeners.
+ + I run my node with the following command-line arguments (requires this ban list at ~/ban_list.txt and running Tor and I2P proxies). +
+ +
+ monerod \
+ --tx-proxy tor,127.0.0.1:9050,disable_noise \
+ --tx-proxy i2p,127.0.0.1:4444,disable_noise \
+ --enable-dns-blocklist \
+ --ban-list ~/ban_list.txt
+
+
+ + Alternatively, I offer a full node Docker Compose option for those comfortable with running containers. It includes the proxy configurations as well as other helpful monitoring/observability features. docker-monero-node on Github. +
+ + go back +