uTalk

Official forum for Utopia Community

You are not logged in.

#201 Re: Articles and News » The Central Bank of Russia strikes at exchanges and exchangers » 2022-01-06 17:47:00

Makedonskiy;721 wrote:

<p>The news in short: the central bank of my country takes control of the accounts of citizens, issuing recommendations for blocking the cards of individuals. The measure is aimed at limiting the work of exchangers.</p><p>The news is good for the utopia ecosystem: there is a potential to create a crypto-commodity market.</p><p>And what measures are used in your countries to restrict working with crypto assets?</p>

I think that sooner or later it will happen and the central bank will change its policy to ban cryptocurrencies and make all crypto holders pay taxes. smile

If you are interested in my hunch in full, reply to my post.

#202 Re: Articles and News » Anonymity. Expensive pleasure? » 2022-01-06 17:43:17

Posi;1309 wrote:

<div class="quotebox"><cite>Cromanes;1293 wrote:</cite><blockquote><div><p>If you look at the side of &quot;Utopia&quot; then partly it will also contain some crumbs of information about you</p></div></blockquote></div><p>What information are you relating to? Because I dont see any reason Utopia will contain crumb information since your private information is needed to participate in their ecosystem if the user dont doxxed his/herself.</p><div class="quotebox"><cite>Cromanes;1293 wrote:</cite><blockquote><div><p> and there will be a technical solution such as discentarization</p></div></blockquote></div><p> discentarization ?</p>

They are actually inside the ecosystem, whether they are accessible or not. The fact is that the information is created and it is there.

Ouch. My mistake. Decentralization.

#203 General Discussion » The slander of the messenger "Utopia" and its ecosystem. » 2022-01-06 15:56:45

Cromanes
Replies: 59

This topic is intended to appeal to the community of the ecosystem "Utopia" to raise awareness of the fact that on platforms like YouTube is served unreasonable cliche messenger "Utopia" and its ecosystem due to technical ignorance and obscurity of certain functions. And for the community to take any action to combat the tarnishing of the reputation of the Utopia blockchain ecosystem.

Here you can attach links to criticism from various internet platforms to discuss and give back "counter" criticism to protect the reputation of "Utopia".

#204 Re: General Discussion » Is It Possible To Make Other Blockchains Lives On The Utopia Network? » 2022-01-06 15:39:01

I don't think so. The product "Utopia" and its blockchain system is sufficiently pro-playtard will not give the possibility of creating another one inside the blockchain.

#205 Re: General Discussion » Utopia and Crypton (CRP) in 2022 » 2022-01-06 15:29:27

Honestly, I want to see a welcome demand to buy cryptocurrency and its liquidity as it is currently dropping lower again from $1. And I also want to see activity in the Utopia ecosystem by audiences of people from autocratic countries and where uprisings are experienced with this.

#206 Re: General Discussion » A compilation of reasons and arguments why one should be anonymous. » 2022-01-06 15:21:59

Posi;1300 wrote:

Anonymity is needed so that hackers can't go through your online file for their illicit gain.

Your topic is very interesting and I wish you would cover it here in as much detail as possible.

#207 Re: General Discussion » A compilation of reasons and arguments why one should be anonymous. » 2022-01-06 15:19:14

I think the potential problem is that Big Data is a pair of marketers working with the government to analyze certain needs, and this information about their people hand in hand with the marketers and the government will set the trend that everything will be moving towards autocracies and changing popular culture into a culture of indexing with the possible creation of a potential digital slavery.

#208 Re: General Discussion » Open Source - again! » 2022-01-06 14:49:46

TheMerchant;1083 wrote:

The concern is valid, however it is very important to take a pragmatic approach to the subject and recognize the drawbacks of every decision. In this case, the developers felt the drawbacks of having open source (community division through forks primarily, but also potential exploitation) outweigh the potential benefits. While it is true that having the code open makes it available for greater scrutiny and helps gain trust, it certainly does not guarantee greater security as we have seen with so many open protocols in defi today being exploited. Ultimately, the team believes trust will be established over time and the utility of the ecosystem will help gain greater adoption. The team does also intend to obtain a 3rd party audit as well, when the code is ready.

Aren't certain forks of the messenger "Utopia" a guarantee that the idea and mission of Group 1984 is noble and worthy of life, and people are willing to develop it.And what potential fork will prevent the spread of cryptocurrency krypton to take the leading places, examples of this can serve the popular crypto coins Bitcoin Cash and Ethereum Classic, yes they are created in a certain counterweight to the original coins, but the consistency did not find, but more showed the consistency of the original idea. And I think that it is worth to maintain the organicity between the messenger "Utopia" and the audience, allowing to use for their own needs and to some extent to learn from self-taught new technical solutions and goals, performing their forks.

#209 Re: General Discussion » Open Source - again! » 2022-01-06 14:16:31

Makedonskiy;1081 wrote:

<p>I am personally against the opening of sources. I don&#039;t need network forks. You can understand the developers: the software is unique, a lot of effort has been spent, and it is unwise to give it to everyone.</p><p>It is curious, but a fact: only 1-2 out of 100,000 users can conduct a real audit of the source code. Open source applications are being hacked much more often.</p><p>Thus, open sources become just a tick in marketing.</p>

Yes, in part, it does not guarantee the security of the code itself. But it removes the developers' responsibility for hiding a potential backdoor in an application that will collect data about you by default. And as for me this product's theme as anonymity of actions in the network should imply open source code as for self-study of what potential risks there could be and what responsibility the user can bear himself, instead of shifting the blame to those who developed it. And until a certain solution to open source is applied, the messenger "Utopia" will continue to be called, "The Business of Anonymity".

#210 Re: Questions and Help » Timestamp Synchronization On The Utopia Client » 2022-01-05 08:19:40

Elon;1033 wrote:

<p>Not sure if this problem only happens to me, but the timestamp only follows my online time.<br />For example, I go online at 11.00 am, then I will see some posts from today has the same timestamp as my online time, although it&#039;s actually posted at a different time.</p>

This is the problem I have with cryptocurrency payment transactions. I wonder where is this inaccuracy coming from?

#211 Re: Questions and Help » Problems with the "Idyll" browser. » 2022-01-05 08:16:32

I have a problem with the browser "Idyll" that any provided links that should open, very long loading, but spent the download time is even and gives the following error.

What to do?

#212 Questions and Help » Problems with the "Idyll" browser. » 2022-01-05 08:09:19

Cromanes
Replies: 2

Here you can post counter problems with the built-in "Idyll" browser. Attaching a screenshot of the problem and a detailed explanation of your problem.

#213 Re: General Discussion » SEC. Are there any opportunities? » 2022-01-05 07:57:46

Posi;1258 wrote:

Yeah its a good question, i'm waiting impacient a good answer

I found an opinion among the Russian community about those behind Utopia. And if you want if you want I can translate, yes the author says that it is an assumption, if you are interested, I can translate for you in English to study.

Here's a link to the video: https://www.youtube.com/watch?v=-h8Kt58 … nnel=Pulse

#214 Re: General Discussion » Utopia Mobile Application » 2022-01-05 07:21:27

Posi;1255 wrote:

Meanwhile there's still chance to make use of the Utopia app on linux mobile phone or use windows emulator on android phone that has 4Gb plus ram.

It also depends on the first seconds of installation. And as I know there need phones with special processors for more or less stable operation of the network need to use those phones where the operating system "Windows Phone".

#215 Re: General Discussion » Utopia is the future of the darknet? CRIME like TOR? » 2022-01-05 06:32:54

ACrow;1260 wrote:

Yeah I also think the best way to go for untraceable transactions is actually Monero..
Does anyone know by the way ways to mine Monero at 2021-2022 with a decent home PC?

Here I think you should consider the complexity of mining Monero, but who can sporosat with technical questions about mining Monero, if in that time it will be relevant and you read this answer then write to me in messenger "Telegram" here is my contact: @Cromanes

#216 Re: General Discussion » Updating the forum as such. » 2022-01-05 06:27:41

So far, the first idea and I think the least difficult technical solution to adapt the dark theme to save your eyes.

#217 Re: General Discussion » Is the utopia ecosystem suitable for conducting opposition activities? » 2022-01-05 06:22:30

youtube;647 wrote:

utopia is suitable for everything related to privacy and anonymity. I'm tired of the fact that every money transaction I make, every site I visit is tracked

Well. If you don't do any illegal things outside of the law, maybe it will keep track of you. smile But I agree that "Big Data" prevents a quiet life, but here what is strange and bad that business and the state go hand in hand and it is not clear what it will lead to in the near future ...

By the way, I would like to hear your arguments about what will happen in the future and what the tracking policy progresses into.

#218 Re: General Discussion » Is the utopia ecosystem suitable for conducting opposition activities? » 2022-01-05 06:16:10

Wild Goat;265 wrote:

Utopia is decentralized and censorship free platform, it can not be shut down and what activities are carried out by like minded communities can not be censored/muted/deleted/modified because there is no central server controlling it, as I said 'decentralized'

Anything can be built over Utopia with it's API . for instance CRP.is is an exchange using the same API and see how well incorporated it is

Mobile app hopefully should come in this YEAR. We all are waiting for it anxiously !!

According to the will, in principle, yes. But here the problem is that the code of Utopia is closed and we do not know all the details of earnings so that we can not say confidently and partly believe the statement of the developers unfortunately...

#219 Re: Merchants Accepting Crypton » Payment gateway with crp? » 2022-01-05 06:04:46

Posi;1307 wrote:

This is the first time I will hear about Utopia Pay and merely looking at it, it's an incredible idea but with Crypton exchange haven't added pairs for top coins like BTC which the crypto used mostly for crypto payment around the world. Is it possible to reach BTC, CRP, USDT, ETH payment using Utopia Pay?

As for me "Utopia pay" is a good development, but useless at this time of development and need to attract the movement and liquidity of cryptocurrency CRP and steilbkoin UUSD. In exchange markets, and then gradually promote it, as I think.

#220 Re: Articles and News » Mikrotik and Mining » 2022-01-04 17:35:59

Makedonskiy;146 wrote:

Utopia has been set up, all ticks burn green, and utopia, in turn, does not want to dial in incoming connections, even in a few days of continuous operation of the client or bots. This is the picture that routerboard users expect from the mikrotik company.

Brief summary: mikrotik - router for advanced, ideally skilled network engineers, people, allows you to manage traffic as you want. Without appropriate knowledge, it is better not to take the setup.

For our joy, there will be no special tricks associated with deviating from the default configuration of the routerboard settings. But still, there are nuances, including those related to the use of UpNp:

1.    When using UpNp, it is possible to connect to you from the outside. It is crucial to configure the firewall correctly so that you do not get unwanted patients around your neck. The fact is that routerboard can be easily turned into a hacker Noda or vpn for dark cases, so hackers of different stripes just love these routers

2.    The use of some specific technologies in traffic routing dictates special configuration requirements if you want to fully contain the master node.

Protecting the router:

1.    The first thing to do is to disable unnecessary services through which you can access the router. Click IP > Services. The correct configuration should look like this: we leave only "winbox" enabled for access, from your IP range. How to do this - can be found on the Internet, unfortunately, at this stage I did not find how to upload an image to the forum.

2.    The second, very important point is to disable the definition of your router through the service "neighbors" on the WAN. Click IP > Neighbors > Discovery settings. Personally, I have the option of defining the router within the home network, as evidenced by the inscription "LAN". Again, I sincerely apologize, without images

3.    The third and most important point is the correct firewall configuration. A default configuration is quite enough. Let's not overload the manual with screenshots, let's take the rule print out of the console, with an explanation to each rule. Console in Router OS is intuitive, if desired, there will be no difficulties to recreate the rules in GUI.

0 D ;;; special dummy rule to show fasttrack counters
      chain=forward action=passthrough
Default rule for observation. If you want, you can't do anything to him.

1 ;;; defconf: accept established, related, untracked
      chain=input action=accept connection-state=established,related,untracked
      log=no log-prefix=""
A rule that allows ALL management packets on the router itself. That's what the "Input" chain says. You can find more information on the Internet.

2 ;;; defconf: drop invalid
      chain=input action=drop connection-state=invalid log=no log-prefix=".
Rule for dropping unidentified connections. We'll talk about him separately later.

3 ;;; defconf: accept ICMP
      chain=input action=accept protocol=icmp log=no log-prefix=".
Enables ICMP packets to pass directly to the router. Simply put, it allows you to use the "ping" command to get an answer.

4 ;;; defconf: accept to local loopback (for CAPsMAN)
      chain=input action=accept dst-address=127.0.0.1 log=no log-prefix=""
Default capsule rule. Doesn't affect anything.

5 ;;; defconf: drop all not coming from LAN
      chain=input action=drop in-interface-list=!LAN log=no log-prefix=""
One of the most important. Completely forbids the router to pass control commands OUTSIDE. You can see from the descriptor that all the incoming ones that didn't come from the local network are crashing.

6 ;;; defconf: accept in ipsec policy
      chain=forward action=accept log=no log-prefix="" ipsec-policy=in,ipsec
IPsecurity policy. It doesn't affect us in any way, we can keep it.
At this point, the protection setting can be considered complete. Not the most meticulous option, but for a safe start of mining on microtycles is quite suitable, especially if you do not want to get into all the details.

0 D ;;; special dummy rule to show fasttrack counters
      chain=forward action=passthrough
Default rule for observation. If you want, you can't do anything to him.

1 ;;; defconf: accept established, related, untracked
      chain=input action=accept connection-state=established,related,untracked
      log=no log-prefix=""
A rule that allows ALL management packets on the router itself. That's what the "Input" chain says. You can find more information on the Internet.

2 ;;; defconf: drop invalid
      chain=input action=drop connection-state=invalid log=no log-prefix=".
Rule for dropping unidentified connections. We'll talk about him separately later.

3 ;;; defconf: accept ICMP
      chain=input action=accept protocol=icmp log=no log-prefix=".
Enables ICMP packets to pass directly to the router. Simply put, it allows you to use the "ping" command to get an answer.

4 ;;; defconf: accept to local loopback (for CAPsMAN)
      chain=input action=accept dst-address=127.0.0.1 log=no log-prefix=""
Default capsule rule. Doesn't affect anything.

5 ;;; defconf: drop all not coming from LAN
      chain=input action=drop in-interface-list=!LAN log=no log-prefix=""
One of the most important. Completely forbids the router to pass control commands OUTSIDE. You can see from the descriptor that all the incoming ones that didn't come from the local network are crashing.

6 ;;; defconf: accept in ipsec policy
      chain=forward action=accept log=no log-prefix="" ipsec-policy=in,ipsec
IPsecurity policy. It doesn't affect us in any way, we can keep it.
At this point, the protection setting can be considered complete. Not the most meticulous option, but for a safe start of mining on microtycles is quite suitable, especially if you do not want to get into all the details. On most routers, this setting is installed "out of the box".

Configuration nuances. Drop of inactive compounds and fast-track technology.

Fast-Track is a technology for accelerating the transmission of packets through a miKrotiK, bypassing queue rules. It's hard to say how much faster. The point is, she marks the bags in a special way. According to the author's observations, while the fast track was on, the mining didn't want to start. It was worth disconnecting - after some time the incoming connections appeared. Disables in Ip >Firewall 

Rule of dropping inactive compounds. In the screenshot above, item #10, that's exactly the rule. An alleged mechanism to influence utopia: traffic at certain points stops waiting for the next packet, leaving the connection open. Accordingly, this rule closes the connection at this point ("fluttering"), which may prevent the mining. After it was turned off, the author's mining also became more active.

Turning on Upnp. It is written in detail on the Internet, it will not be difficult to enable.

After all the described manipulations the mining is fully available from the author. Remember that it doesn't start instantly, once the bot or client is started (current for version 5490) it takes time for the network to accept the master node, it can happen in an hour or a day.

Important!

After updating the network protocol, everything worked fine with the "FASTTRACK" and "drop invalid" functions enabled. Turn them on or off - at your discretion!

Thank you for your attention and successful mining!

Hmm. It seems to me that this breakdown should be implemented in the intuitive new messenger interface "Utopia" so that the new blood does not torture the community with its typical questions. Or make the implementation visual for general and easy understanding.

#221 Re: Questions and Help » Quick Quote Shows Plain Text » 2022-01-04 17:24:44

Elon;989 wrote:

I am trying to reply with quick quote features on this forum but seems like it posted plain text instead of the HTML version.
do I need to click something or make an adjustment on the setting? The normal quotes work normally.

I want to know that, too. But in general, man, this site is already terribly outdated and it should finally be updated. I suggest that we somehow get through to the developers, rather than trying to study the rudemeter, which is long overdue in the past.

#222 Re: Articles and News » Anonymity. Expensive pleasure? » 2022-01-04 05:10:51

youtube;656 wrote:

<p>I will never forget reading Richard Feynman&#039;s autobiography. When he started working on the creation of a nuclear bomb, he arrived in a very protected area where many scientists worked. At that time, he began to get interested in breaking locks, it became very interesting to him. One evening, he decided to try to crack a very simple lock of the cabinet door with glass inserts. When he did this, he was amazed, behind this door there were secret documents about the creation of a nuclear bomb. And then think for yourself</p>

If you look at the side of "Utopia" then partly it will also contain some crumbs of information about you, and there will be a technical solution such as discentarization and so on, but in fact the account you create is saved in the ecosystem "Utopia", yes in fact you can delete the case found it, but not completely and if you want you can still restore it a matter of effort. As for me, it is not even worth to hammer on this topic and observe not mediocre and simple rules of working with the network.

#223 Re: Articles and News » Anonymity. Expensive pleasure? » 2022-01-04 05:04:52

Makedonskiy;360 wrote:

Oh, that brings me to mind. Apparently, not everyone who knows the word "anonymity" understands the word in its full sense.

So what is anonymity? The root of the word goes back to the word "noname" and its progenitors. And by name, as we know, a person can be identified, and surveillance can be organised. So it turns out that anonymity as an attribute of any action is the absence of any trace leading to the identification of the real name of its perpetrator.

Now, let's get to the subject of the monologue. How realistic is real anonymity? In what ways can a person be de-anonymised online? Which ones are most often used by law enforcement agencies, and how did famous spies fail?

For example, a group of Richard Sorge (a famous Soviet spy) was caught on a band-aided radio, at one of the points from which he was regularly sending information. And when they caught the group - they could not believe their eyes: they believed to the last that Sorge was a simple German journalist.

There are stories of how someone blabbed when drunk and one of the spies once forgot a briefcase with copies of important documents in a bar. The briefcase was opened by the special services, who were summoned to the scene and thought it might contain an explosive device.

But those were things that happened in the past. But what about today? How did they catch the owner of the famous Silk Road site?

Very simple. Ridiculously simple. Following the text of the indictment revealing the details of the operation to de-anonymise him, this was done using the usual open sources: comparing dates, activity and the very information that could be obtained. The funny thing is, the man wasn't really hiding anything, it was enough to do a lot of systematic work without involving a huge number of specialists, the more so because on linked.in this man didn't even hide that he was going to create something similar (we are talking about Silk Road).

So what is the main enemy of a person who wants to remain anonymous? The answer is simple and banal - himself. If you register at the U and choose the same nickname you have on public sites, then you can forget about anonymity once and for all: Anyone can easily google, and find your profiles in social networks and God knows where else, without resorting to special means.

Anonymity is not a set of tools. Since the main problem with anonymity is the human factor (and we all live in society), the problem is multiplied by exactly how many people are able to see you. You may be a good salesman and be incognito online, but if the barmaid at the doorway sees you driving an expensive car and doesn't know what you're doing, they will eventually become suspicious, and then you'll be reported.

The same is true for other places where you live. There is one harmful characteristic of the man: he tends to fill the vacuum of information with all sorts of speculation. If you do not fill the vacuum in time you need information, he will do it himself, or someone will do it for you, and, as you know, there are no guarantees.

Going back to the question. Anonymity is a way of thinking and therefore, a way of life. True anonymous are scouts who give themselves away (and usually everything is documented!), who knows the enemy's language perfectly well, and who lead a double or even triple life, but they too can make mistakes, and they are usually caused by human error. 

Pay close attention to detail! It's the best thing you can do to protect your information.

I hope I have been helpful.

As for me it is fizic and abrasive that it is not possible to be absolutely anonymous. After all any matra saying that "you are obliged to do this, that and the other to be exclusively anonymous, on the ground so that after your foot did not leave a trace on the ground" is absolutely not possible, and as for me it seems not necessary to achieve this synthetic stupidity and at desire and your potential value you anyway will find and no matter how much time to it will need. Observing such radical mantras on absolutely 0 information will not leave and you are not capable to do such by the nature and more to say you will go to the roof. I can offer only one thing, it is to use a measure of dispossession not over occupying obsession of the given idea not to ruin your valuable life which you can waste on more important for you affairs, and partly to accept that it is not possible and more so to say to stir up new paints of the information portrait for complexity of tracing by you of undesirable people.

#224 Re: Articles and News » Don't follow the rules? Then you're a potential victim! » 2022-01-04 04:54:35

Makedonskiy;178 wrote:

<p>Despite all its simplicity, the issue needs separate coverage:</p><p>&quot;Cryptocurrency trader robbed of $450,000 in Hong Kong&quot;.</p><p>&quot;Recall that in December a bitcoin trader was robbed of 12 million rubles in a Moscow pub.&quot;</p><p>&quot;The managing director of cryptocurrency exchange EXMO was kidnapped near his office in Kyiv. The robbers, wearing dark clothes and face-hiding balaclavas, forcibly dragged the blockchain specialist into a Mercedes-Benz car and drove him away in an unknown direction.&quot;</p><p>These are all excerpts from news reports in the recent past, the methods of robbery are different each time, but they all have one thing in common: the victims were either media personalities or simply not shy about openly showing off their savings. To put it simply, in Russian parlance, they were &quot;selling their faces&quot;. Is this wise?</p><p>The answer is no, not at all. You don&#039;t reveal your fiat money schemes to anyone except trusted people, do you? So why go for a large crypto deal without taking security measures? That&#039;s just it. </p><p>The rule of thumb from the above is to never, ever, ever &quot;shine&quot; your actual disposable income, storage conditions, shipping details to anyone, anywhere. Don&#039;t conduct transactions from hand to hand without taking the necessary security measures, and then your chances of losing what you&#039;ve gained are drastically reduced.</p><p>Second, and equally important is the viral load on the network and existing network vulnerabilities. I see three methods as the most dangerous:</p><p>1.&#160; &#160; Theft of coins through software that substitutes the contents of the buffer while copying the wallet address. I.e., when you copy the wallet address, the program replaces the address at the moment of &quot;paste&quot; operation, and your coins will go to another address.<br />2.&#160; &#160; making transfers via open Wi-Fi networks. This is what they are: the traffic can always be monitored. Beware of such places, especially if you visit some expensive places.<br />3.&#160; &#160; Phishing sites. They are like Chinese copies of real sites - transfer any funds to the addresses listed there, and you can forever say goodbye to the amount transferred.</p><p>What are your thoughts on the above?</p><p>Rule one: get in the habit of using official applications on the gadget or computer that is involved in the cryptocurrency exchange. Otherwise, there is a great risk of catching a bug, and after all, respect the work of the programmers (this does not apply to pirated &quot;windows&quot;). If you need to run something questionable - install a virtual machine. Any thumb drives that have been inserted into other computers should also be run in a virtual machine first.</p><p>Rule number two: Always check the credentials with great care. Check the address bar of your browser. There is no other way. </p><p>Rule three: only use a secure connection. No open networks, for everyone.<br />By following the four simple and obvious (apparently not to everyone) rules outlined above, your chances of losing your money are reduced manifold.</p>

By the way, a question for you. Why didn't you leave a link to the source of this news? Maybe you know everyone here, but in the future the influx of new blood will demand it.

#225 Re: Articles and News » Don't follow the rules? Then you're a potential victim! » 2022-01-04 04:50:11

CleverGUY28;712 wrote:

A lot of useful information on how to stay safe. I definitely advise everyone to take it on board!

There is an idea how to write a code of information security, and collect all known data on how to use network security and possible struggle in case of PC infection.

Board footer

Powered by FluxBB