You're already trusting thousands of pieces built on more thousands of pieces for bitcoin to work. With #monero, it's all that plus a few equations. For great privacy, I'll take my chances. And by the way, even Satoshi recognized the lack of privacy in Bitcoin and felt that it needed to be addressed, but the tech didn't exist back then. It's more a matter of an ultra conservative bitcoin culture these days, but forget even that, **it's about the fact that bitcoin has been captured and assimilated into the system it sought to deprecate**, and the only reason that ever happened is that **like the legacy financial system, it is a tool for control, and you cannot have control without surveillance, and you cannot have surveillance without a backdoor or, even better, full transparency**. And then, if bitcoin actually revolted and reminded itself (so to speak) of its cypherpunk roots (huh, Mr. Cypherpunk?), privacy and anonymity would be baked in - but that would be the immediate end of all your NGU fanatics' dreams. So, it's not gonna happen. And that's alright. Bitcoin can be the harmless NGU money machine - hey, I like that too. But I came to crypto for freedom and privacy like so many others. Bitcoin delivers NGU, and that's great, but it's a golden cage -- **wealth without privacy is a dangerous combination**. #monero delivers a frontal *fuck you* to the system of financial control and repression we live under. It does not play by the rules. It stands by what is right and true. And so it's been unplugged from the shadows from the legacy system. **Because it works**. Therefore, any serious freedom-loving people have found and continue to find #monero - we are thankful for bitcoin's service, but without anonymity & privacy, **as the original cypherpunks knew**, it will always fall short of the old cypherpunkian dream: **anonymous, private digital cash**. #monero *is* that. not tomorrow, *today*.

Replies (4)

Decoy-analysis heuristucs uses basic statistical heuristics to strip away unlikely decoys in a ring and isolate the real spend, an approach that does not break cryptography but is trivial for a state-level adversary with ample data and resources to execute at scale.
Finally.... I see my constant hassling has paid off 👍 when was the last time you actually verified the Bitcoin supply yourself? or do you instead trust somebody else's code to do it for you? what about all the other cryptographic primitives that ensure that nobody else can spend your coins, unique addresses are created, etc.... nobody does. very few people EVER have. The number of people who will trust *more difficult* cryptographic primitives will only increase as time goes on.