{"type":"rich","version":"1.0","title":"Hanshan wrote","author_name":"Hanshan (npub1lx…6svxa)","author_url":"https://yabu.me/npub1lxzaxzge0jq9u9cecucctdt5lslwgp7hcxmp2l0wn8r2ecjenwasu6svxa","provider_name":"njump","provider_url":"https://yabu.me","html":"Soooo\n\nthis is just regular \"big blocks are bad\" FUD.\nCould be a problem, sure\nbut nobody knows at exactly what point you have to go up a layer to maintain adequate decentralization (whatever that means).\n\nAlso you keep harping on this point \n\n\u003ethe sender always knows the recipient's \"real\" address (the one on the blockchain) and can provably map it to their stealth address.\n\nwhich is completely true.\nBut I'm really having a problem coming up with an attack where that information is useful in any way.\nfor example,\nThe Adversary sends monero to their target.\nso they can see on the chain when that output *might have been* spent.\naaaand....?\n\nits not useful in large scale surveillance. \nand it's barely useful in specific targeted surveillance scenarios.\n\n\u003esetting up an LN node privately is barely more difficult than setting up a monero node.\n\ni call bullshit.\nanyone who can find the cmdline can set up a monero node on old hardware or VPS in an hour copypasta-ing from a guide.\nI spent an hour yesterday just trying to figure out why all payments to my Zeus wallet were failing.\n\nbut almost certainly we both underestimate the difficulties for noobs starting from close to zero.\n¯⁠\\⁠_⁠(⁠ツ⁠)⁠_⁠/⁠¯"}
