I'm glad I have my own platform and I think more people should host their own. I'm neither on one side or the other on the political spectrum and I can't speak freely on just about any board, community, or platform because I'll offend someone at some point in time. Hosting my own platform gives me the only place to actually say what I want to say and seems to be the only way to really get a sense of free speech.
Notices by Yuzuki (yuzuki@social.kikuri.cc)
-
Embed this notice
Yuzuki (yuzuki@social.kikuri.cc)'s status on Sunday, 08-Jun-2025 23:06:46 JST
Yuzuki
-
Embed this notice
Yuzuki (yuzuki@social.kikuri.cc)'s status on Saturday, 17-May-2025 21:49:28 JST
Yuzuki
@silverpill Since Mitra currently only support LitePub relays, do you know of any directories or lists of said relays? All I can ever find are the typical Mastodon ones.
-
Embed this notice
Yuzuki (yuzuki@social.kikuri.cc)'s status on Saturday, 10-May-2025 22:53:34 JST
Yuzuki
German and Dutch authorities, the BKA and FIOD, have shut down the eXch crypto swapper, stealing 34 million Euros, seizing the infrastructure, and now having access to any historical data rendering most coins tainted.
It is still surprising to me how many non-KYC exchanges and swappers host their infrastructure in a country like Germany, which is a country that is known to be highly hostile and aggressive towards crypto as a whole and has led several operations to shut down dozens of different swapping services within the past year.
Furthermore, if you do run a swapping service, the only real solution to hide your infrastructure is to make it accessible only as a hidden service or an eep site, if you favor i2p over tor. Either way, the days of hosting these services via the clearnet are long gone and it seems like many of the service providers still haven't taken note of this. Getting a hidden service going isn't particularly difficult, especially when you look at the additional level of security and privacy you derive from it.
For anyone intending on swapping coins, my recommendation is to use P2P services like RetoSwap (Haveno) and Bisq instead of the swappers. The swappers are much quicker and easier to use, but they have a tendency to log any and all data, which likely remain unsecured. If the feds go after them, you can almost be guaranteed they will get access to that data, which taints any historical and present coins you got from the service. If you absolutely have to use one of those services, access them via Tor and use Monero when swapping. Don't exchange clear coins for other clear coins, otherwise you're placing yourself at risk without the ability to mitigate it in the future.
Official message issued by FIOD and BKA:
> To users of the recently dismantled cryptocurrency exch.ange,
>
> *****This message is issued by the Dutch Fiscal Information and Investigation Service (FIOD) and the Bundeskriminalambt (BKA).
>
> The service has been taken offline as part of our enforcement action.
>
> We are actively investigating individuals involved in money laundering and other illegal activities through this swap service.
>
> Some question actions from law enforcement regarding crypto services. We want to make one thing clear: this action is not an attack on privacy. We respect the right to privacy and recognize its importance in the digital age. However, when services are heavily abused to commit crime, we will act.
>
> We urge everyone involved in illicit activity to cease immediately. The legal consequences can be serious. Our mission is to protect the integrity of the financial system and hold those who exploit it accountable.>
> Privacy is not the problem - criminal misuse is.
>
> Sincerely,
>
> FIOD and BKAPress Releases:
- https://www.bka.de/SharedDocs/Kurzmeldungen/DE/Kurzmeldungen/250509_eXch_abgeschaltet.html
- https://www.fiod.nl/bka-and-fiod-shut-down-cryptocurrency-swap-service-exch-e-34-million-in-cryptocurrency-has-been-seized-during-the-operation/ -
Embed this notice
Yuzuki (yuzuki@social.kikuri.cc)'s status on Saturday, 19-Apr-2025 22:54:05 JST
Yuzuki
The Tor Project is turning the Tor Browser more and more to shit. As of April 16th, their Tor Browser 14.5 update removes privacy.resistFingerprinting.spoofOsInUserAgentHeader. It was bad enough when in a previous update they disabled it by default and you had to manually enable it either through a user.js config or through about:config. Now? They removed it completely and adding the pref manually does absolutely nothing. This means your OS will from here on out always be revealed and is no longer set to Windows.
Here is the issue on the Tor Project's git from 6 months ago: http://eweiibe6tdjsdprb4px6rqrzzcsi22m4koia44kc5pcjr7nec2rlxyad.onion/tpo/applications/tor-browser/-/issues/43170
And then the implementation: http://eweiibe6tdjsdprb4px6rqrzzcsi22m4koia44kc5pcjr7nec2rlxyad.onion/tpo/applications/tor-browser/-/issues/43189
Also relevant thread on dread: http://dreadytofatroptsdj6io7l3xptbet6onoyno2yv7jicoxknyazubrad.onion/post/341c93c9ae682dcedf69
Fed Project back at it again turning things to shit.