In my view, Monero is only one piece of the equation to digital freedom. You need the rest of the “encryption as identity” tech stack:

Monero is to Money, What Session is to Telegram, And Nostr is to Twitter.

Censorship on Twitter has given rise to this decentralized micro-blogging alternative that uses encryption as identity for unstoppable free speech.

I narrated this brand new animated video which goes over how Nostr works and why it matters: https://video.simplifiedprivacy.com/nostr/

Nostr is right now dominated by Bitcoin Maxis, we’re organizing a Monero takeover. DM us on Nostr: npub14slk4lshtylkrqg9z0dvng09gn58h88frvnax7uga3v0h25szj4qzjt5d6

  • Anark Karabey@mitra.karapara.net
    link
    fedilink
    arrow-up
    0
    ·
    1 year ago

    @Saki I like I2P. I use it for my torrenting activities, it is great—no need for VPNs for torrenting anymore.

    However, Tor has its own advantages, being more reachable by a greater number of people who might not be as tech savvy as us, is one of them. Like it or not, Tor’s abundant exit nodes is one other advantage that it has over I2P. In the case of something like mitra.social microblogging service, if one hosts a onion-only instance of it, Tor allows him to federate with clearnet peers over the exit nodes, and thus allow the onion-only instances of mitra/pleroma to be also in connect with the greater fediverse.

    >the Tor network relies on a relatively small number of “centralized” node operators.

    Any sources that makes you say that?

    • Saki@monero.town
      link
      fedilink
      English
      arrow-up
      1
      ·
      edit-2
      1 year ago

      Yes, currently Tor is much more convenient, no argument there :)

      The # of exit nodes is relatively so small and the list is public, anyone that wants to block Tor traffic can do so easily. Plus, for good or for bad, I think the Tor project is US centerd, funded by various American governmental agencies. Bridges, snowflake… they’re more like P2P, but snowflake works via a monopolistic “broker“ that is Google (of all things…?). So in theory, it may be relatively easy to shut down snowflake or selectively block communications via Tor in general.

      That said, if we do use hidden services, then exit nodes are irrelevant and everything may be fine (hopefully). I2P is relatively new; Tor vs. I2P is yet inconclusive—probably both have their own forte. I’d like to experiment (play with) both to get better intuition/understanding. Thanks for you insightful comments.