WelcomeUser Guide
ToSPrivacyCanary
DonateBugsLicense

©2025 Poal.co

748

(post is archived)

[–] 0 pt

it is really really really difficult to remain hidden unless you have somebody else doing the "job" for you

If this were true darknet markets would not exist (and flourish). Staying anonymous with crypto transactions is actually not that hard. Your personal OPSEC will determine your overall anonymity.

[–] 0 pt

NSA is not coming for a small fish, they are happy to let crypto grow

it is way simple to trace all that goes on if you have access to whatever equipment is on the network

this is of course the reason to be "alarmed" a huawey, since they do not make chinese devices they cannot hack them the way they are used to

[–] 0 pt

NSA is not coming for a small fish, they are happy to let crypto grow

Uneducated comment.

You can trace all the transacrions you want, but there is no identifying info that goes with it unless you are being stupid about it.

Darknet markets are not "small fish" by any means. They go through more money than you can talk about. The feds take down much smaller operations everyday. Happily. They simply can't take down all the markets because they have no clue who to go after. Sure they can see crypto was sent to the market, but they have no clue who bought and who sold. Good OPSEC is all you need to use crypto anonymously. Facts.

It's clear most of you have never even heard of the most simple of tools to stay anonymous. It is obvious why you all so easily believe the negative programming you've received about crypto. If they could track and control it they still wouldn't be trying to regulate it. Derp...

[–] 0 pt

hilarious, as if you knew what is inside your computer or telephone

all modern CPU have "secure enclave", including apple, clearly

what it does now ? you do not know, one windows or linux update (there are plenty of binary drivers even there) and .... side channel opened

at this stage I assume you are NSA and do not want to scare "the fish", fair

for "the fish", think, how effective is the china great firewall ?

how come that we do not hear of the wonderful ways to bypass it ? oh, yes, they exist, for a bit of time, just enough to have an idea of who is the next fish to catch