• 25 Posts
  • 50 Comments
Joined 1 year ago
cake
Cake day: August 14th, 2023

help-circle






  • I was happy to see that you can listen to your podcast on a simple website, without registration or apps. I can only continue to recommend using and advocating open and good technology and avoiding closed things that also perform actions for commercial purposes that are not beneficial to the user. Take social media, for example: Use Twitter less, Mastadon more often instead.

    We should celebrate and use the good and not dwell on the bad and worry about it. Time is better spent trying out the good and helping to spread and improve it. Monero is not without alternatives either, just like Linux. Instead of always using the standard Linux distribution, you can also install BSD to contribute to the diversity of the infrastructure. Monero’s privacy technology could be overtaken by Lightning-like state channels. Good will prevail.










  • 👍

    transactions only to initial nodes they know and trust. I don’t know how to do that

    • Create your own fullnode and leave it running all the time. So don’t just start it when it is needed for transactions or interactions with Monero. There are also very accessible methods for this, such as PiNodeXMR, which easily converts an SBC such as RaspberryPi into a secure Monero full node.

    • Use Tor and a known trusted Tor node, e.g. hashvaultsvg2rinvxz7kos77hdfm6zrd5yco3tx2yh2linsmusfwyad.onion from hashvault Pool.

    • Use VPN (and a known trusted node)


  • explain the need of a ban list? And how it works?

    Adding the ban-list to your Monero GUI wallet or your Monero node prevents connections from being made to other nodes that are suspected of harming the Monero network. You don’t have to add a ban list, it’s voluntary, just an official recommendation. But everyone who adds a ban-list contributes to the security of Monero.







  • Monero GUI wallet

    If your run your own local node through the GUI wallet, go to Settings. In the “Daemon startup flags” box, input “–ban-list <file-path-to-ban-list>”. Then click the orange “Stop daemon” button. It will take a few seconds for the daemon to shut down. Then click the orange “Start daemon” button. If you use a remote node, whoever operates the remote node will decide if the ban list is enabled.