<oembed><type>rich</type><version>1.0</version><title>LiberLion wrote</title><author_name>LiberLion (npub1wp…hzs7p)</author_name><author_url>https://yabu.me/npub1wpzpvzfkn4m754fasp0wnt6ck20ycww4kz9nj4n5rquu9ul7a0xq4hzs7p</author_url><provider_name>njump</provider_name><provider_url>https://yabu.me</provider_url><html>A leaked video from Chainalysis, a company trying to trace #Monero transactions, revealed that their techniques rely on known vulnerabilities, not cryptographic breaches.&#xA;&#xA;The primary risk lies in malicious nodes logging users&#39; IP addresses, a key method for tracking transactions.&#xA;&#xA;According to available information, specific Monero nodes publicly known to be operated by Chainalysis include:&#xA;—node.moneroworld.com: This domain was pointed at Chainalysis nodes around 2020, specifically nodes #003 and #140 based on DNS records.&#xA;—dallas.xmrmode.com (IP: 104.223.103.222): This node was identified in investigations related to node.moneroworld.com. &#xA;&#xA;Watch this video: https://x.com/schmidt1024/status/1878388407296053635&#xA;&#xA;Key Points and Advice:&#xA;&#xA;1. Run Your Node: Self-hosted Monero nodes protect your IP and reduce reliance on potentially compromised public nodes. Running a node requires significant storage (60GB for a pruned node, 200GB for a full node), which can be challenging for mobile users.&#xA;&#xA;2. Use Privacy Tools: If you can&#39;t run your node, use a VPN or proxy when connecting to remote nodes. For added privacy, opt for onion nodes via Tor or i2p.&#xA;&#xA;3. Avoid Malicious Nodes: Malicious nodes can create &#34;poisoned&#34; decoy outputs in transactions and track user activity. Chainalysis reportedly operates some public Monero nodes.&#xA;&#xA;4. Limit Exchange Use: Exchanges may log or share user data. Use intermediary wallets for deposits/withdrawals, avoiding direct links between exchanges and your primary wallet.&#xA;&#xA;5. Focus on Spending: Instead of trading Monero, spend it as intended. Businesses can adopt Monero as a payment method, promoting its use while preserving privacy.&#xA;&#xA;Identifying malicious nodes, including those potentially run by Chainalysis, requires vigilance and specific strategies since they operate covertly. Use Decentralized Lists and Community Tools like https://moneroworld.com/&#xA;&#xA;</html></oembed>