From 1026603aae0cbf763fa1dcd204230329f0386ae1cea85d7cd2758ed3222f581b Mon Sep 17 00:00:00 2001 From: Nicholas Johnson Date: Wed, 5 Feb 2025 00:00:00 +0000 Subject: Replace instances of 'anyways' with 'anyway' 'anyway' is the correct spelling. --- content/entry/warning-to-monero-users.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) (limited to 'content/entry/warning-to-monero-users.md') diff --git a/content/entry/warning-to-monero-users.md b/content/entry/warning-to-monero-users.md index 9c34e6c..51c60d3 100644 --- a/content/entry/warning-to-monero-users.md +++ b/content/entry/warning-to-monero-users.md @@ -5,7 +5,7 @@ tags: ['computing'] draft: false --- # Obligatory -I don't support the use of Monero or other proof of work cryptocurrencies since they're [destroying the planet](/2021/07/18/avoid-using-cryptocurrency/). However, I know people are going to use Monero anyways. So it makes sense to give this warning. +I don't support the use of Monero or other proof of work cryptocurrencies since they're [destroying the planet](/2021/07/18/avoid-using-cryptocurrency/). However, I know people are going to use Monero anyway. So it makes sense to give this warning. # Practical Statistical Attack on Monero There's a practical statistical attack on Monero related to its [decoy selection algorithm](https://ccs.getmonero.org/proposals/Rucknium-OSPEAD-Fortifying-Monero-Against-Statistical-Attack.html). Work to resolve the issue is in progress. It's not clear how severe this vulnerability is, but Monero's adversaries (DEA, FBI, IRS, NSA) may already be using it. -- cgit v1.2.3