this post was submitted on 01 Sep 2024
6 points (68.8% liked)
Monero
1673 readers
11 users here now
This is the lemmy community of Monero (XMR), a secure, private, untraceable currency that is open-source and freely available to all.
Wallets
Android (Cake Wallet) / (Monero.com)
iOS (Cake Wallet) / (Monero.com)
Instance tags for discoverability:
Monero, XMR, crypto, cryptocurrency
founded 1 year ago
MODERATORS
you are viewing a single comment's thread
view the rest of the comments
view the rest of the comments
Governance
What's the plan when the assault against the monero devs is launched?
The timeline is moving, the arrestation of Durov is a good marker of that.
Some devs are anonymous but that's not a plan, just countermeasures.
The fact that I am asking is a sign that the community does not know how it it will deal with the governance attacks coming up.
Remember, they got BTC via its governance.
What such a plan could look like? I don't see other options except for staying anonymous...
I don't know exactly right now what the plan should look like. We could ask the general fund to have someone at least look at it and give recommendations. Someone in opsec, systems design or the likes would do.
The way I see it, a good way to neutralize monero is to first identity as many important participants as possible and then take the opportunity of the next 'crisis' to bash them very hard and associate them with the worst possible terrorists in the public opinion.
By important participants I don't mean just the core devs. I am talking about people like rbrunner, Justin, Rucknium, etc. All those that are the 5% making the 95% of impact in the ecosystem (compared to us consumers of their marvelous work). They currently don't think their threat level is very high, they should not have to hide anyway. But the issue is that when they will find monero keys for whatever CP ring they can seize that opportunity to frame all our ecosystem as supporters of CP and terrorism. Remember, it doesn't need to be true, just to be repeated again and again to the masses. After that you can just jail a few core devs, a few Dex operators and some event organizers to scare the little bunch back to their caves.
BTW the point is not to find a countermeasure yet but to put ourselves in the shoes of the adversaries and consider their options. The plan will itself come up after considering these points.
Tldr: let's ask the general fund to review our strategic opsec as a project.
it's not complicated, make sure that anonymity is maintained for all developers (like they do all their work from inside a whonix VM let's say), and that you have copies of all the important monero mirrors somewhere (on a gitea instance accessible via .onion or something similar), in case if monero gets the tornadocash treatment.
that way they can't go after the developers' freedom of speech, and even if they take the repositories down from github, the show can go on elsewhere.
i'll pitch in to advise people if opsec is brought up
Good! It would be nice to have that written somewhere accessible for all.
In case of Tornado Cash treatment everyone would also need a way to verify the signatures and authenticity for repos, links etc. That's not trivial either.
Nah that's easy too. you need to make sure the developers use PGP keys to confirm their identity. https://blog.nowhere.moe/opsec/pgp/index.html + https://blog.nowhere.moe/opsec/whonixqemuvms/index.html
but yeah the idea is to have a Disaster recovery plan, kind of idea, totally makes sense.
Great articles btw!
Nice! A disaster recovery plan would fit the bill nicely.
Unrelated, I have personally started switching from pgp to minisign (for signing stuff and confirming it's indeed from me) and age (for encryption, when I don't want prying eyes on my stuff, https://github.com/FiloSottile/age).
Basic OPSEC is not very hard but needs investment in terms of time and money. Running something like Qubes with Whonix/I2P routers should do well enough in terms of traffic obfuscation, and backup and encryption strategies for keys should be the next level.