

Have you ever given an “under-the-table” payment for utilities?
Of course not, because I don’t live in an area that manipulates its currency, nor have I needed that level of privacy. I have, however, lived in an area where that type of thing was commonplace. I paid for rent, utilities, and groceries with cash, and you’d have to be incredibly naïve to believe that everyone paid taxes on that money. If I wanted to “go dark” there, I could’ve, all I’d need is a stash of cash.
If you want to live off the grid, you operate in untraceable arrangements, and that protects both you and the service provider.
My point here is that whether you can easily liquidate the medium of exchange isn’t nearly as important as the benefits that medium provides. If you need the protections that privacy coins provide, both sides of the transaction will find a way to make it work.
I won’t go into an in-depth discussion around how you would be tracked
I wish you would, because then we’d have something to discuss.
I assume you’re talking about the $5 wrench idea (i.e. this xkcd), as in get people to rat out the dissidents. Or maybe you’re talking about hacking users devices, or some other side-channel attack (i.e. packet snooping). None of that has nothing to do with the medium of exchange, and there are ways to mitigate that risk.
My point is that Monero has uses today, and it can be more useful if people actually start trying to use it. I see it as similar to Tor, the more people use it, the safer it is for the people who truly need it.
I’m much less worried about an attacker messing w/ my certs (that’s a pretty sophisticated attack) and more worried about privilege escalation where the attacker gets root access. Caddy is intended to be externally facing, so it’ll be getting the brunt of the attacks (like this one that attacks HTTP 1.1). If someone is able to find an exploit to allow remote code execution, being able to run commands with
sudo
is a pretty big deal.That’s a big part of why I run my services in containers, and also why I’m switching from Docker to Podman. Docker runs everything as root by default, and it’s a pain to run things as non-root. Podman runs everything as an underprivileged user by default, which forces the admin to configure it properly. If an attacker is able to break out of Docker, it’ll have root access to the system, whereas if an attacker breaks out of Podman, they’ll just have whatever that user’s permission is.
If I’m going to expose something to the internet, I want to make sure it’s properly configured to reduce the chances of getting a rootkit or something.