-
noobcake2465[m]
<selsta> "noobcake2465: did you check on..." <- i don't have multiple accounts no
-
noobcake2465[m]
selsta: figured out where it went though....
-
noobcake2465[m]
i sent it to my friend twice
-
noobcake2465[m]
and yeah i think you're 100% right, the client crashed and didn't record the TX key
-
noobcake2465[m]
or where i sent it
-
noobcake2465[m]
he says:
-
noobcake2465[m]
> sure enough, 8 hours after the first 1.75 XMR, I received another 1.75 😆
-
Xair[m]
interesting
-
Xair[m]
glad it got solved man!
-
Xair[m]
hopefully it can get send back :)
-
noobcake2465[m]
but i think your theory about not writing the TX key and address it was sent to straight away
-
noobcake2465[m]
is exactly a what i would expect software to do
-
Xair[m]
sadly what software should do and what users expect is generally at odds haha
-
Xair[m]
makes UX design hard sometimes
-
noobcake2465[m]
maybe, even if it it was cached to disk
-
noobcake2465[m]
it should still sync some data to disk
-
noobcake2465[m]
so that it can be recovered when reopened
-
Xair[m]
yeah I think they suggested syncing it to disk immediately
-
Xair[m]
to make this less of an issue
-
noobcake2465[m]
should i lodge a bug?
-
Xair[m]
I'm not sure
-
Xair[m]
I don't think it's a bug per-say, but maybe opening an issue to discuss adding this functionality would be good
-
selsta
noobcake2465[m]: ok, that's what I expected :)
-
lightloved[m]
What's the right way to connect to a remote onion node with the CLI?
-
lightloved[m]
./monero-wallet-cli --proxy 127.0.0.1:9150 --daemon-host site.onion:port OR torsocks ./monero-wallet-cli --daemon-address site.onion:port?
-
lightloved[m]
And what can be leaked considering a) you're not using Whonix/Tails as base OS and b) you don't own the remote node?
-
lightloved[m]
I'm just evaluating if it's even worth it to torify the connection in the first place.
-
lightloved[m]
This can be useful for people with threat models that include their ISP awareness of Monero at the top of the list. But they don't/can't use Whonix/Tails as base os.
-
Xair[m]
do not use torsocks with the monero client
-
Xair[m]
use the built in proxy code
-
Xair[m]
it is far more reliable
-
Xair[m]
the proxy code is configured to work over socks4/5 and will correctly connect to Tor for you
-
Xair[m]
`./monero-wallet-cli --proxy 127.0.0.1:9150 --daemon-address <onion URL>` is the correct way to do that`
-
Xair[m]
although `9150` is the default port for the node which the tor browser bundle runs, I would suggest you run a dedicated tor node for this, which will use port 9050 instead :)
-
Xair[m]
* `./monero-wallet-cli --proxy 127.0.0.1:9150 --daemon-address <onion URL>` is the correct way to do that
-
lightloved[m]
Xair[m]: How would one go about doing that?
-
Xair[m]
on a linux distribution it is generally provided by the distro repos
-
Xair[m]
you can install it the same way you usually install other software
-
lightloved[m]
I already have tor on Debian and the 9050 port is used.
-
lightloved[m]
I assume you'd want to use a different port so there's no overlap over the monero wallet and the browser, right?
-
Xair[m]
mostly yes, the potential problems from doing that are kinda low... it doesn't have much of an impact on your traffic since tor routes each TCP flow independently anyway, but it's best practice to keep them separated just to be sure
-
Xair[m]
if 9050 is used by the tor daemon running on debian, best to just use 9050 anyway
-
lightloved[m]
What about all the warnings when connecting to the remote onion? Should I add the trusted daemon flag?
-
lightloved[m]
Warning: using an untrusted daemon at <onion>
-
lightloved[m]
Using your own without SSL exposes your RPC traffic to monitoring
-
lightloved[m]
* `Using your own without SSL exposes your RPC traffic to monitoring`
-
lightloved[m]
* `Warning: using an untrusted daemon at <onion>`
-
Xair[m]
do not trust remote daemons
-
Xair[m]
they are by nature untrusted unless you run a private daemon
-
Xair[m]
the warning about RPC traffic being monitored is ok, since tor connections to onion addresses are end-to-end encrypted by default
-
Xair[m]
so SSL is not required in this case, but it's good to keep in mind, especially if connecting to daemons on the regular web
-
lightloved[m]
Oh so they kept it for "http" over clear net. Makes sense.
-
Xair[m]
yeah pretty much :p
-
Xair[m]
the monero wallet doesn't understand the difference between an onion address and a normal website since Tor handles all that behind the scenes
-
lightloved[m]
I see `--trusted-daemon` allows some extra commands like `rescan_spent` and mining. I guess you should only use it with your own self hosted remote node daemon.
-
Xair[m]
yes pretty much
-
Xair[m]
using those on a random node exposes you to security risks
-
lightloved[m]
So essentially this is a decent way of using the network to preserve middle-way privacy I guess (ISP threat model): normal OS (Debian) + cli wallet + proxy tor to remote onion. Am I close? I assume running your own remote node might enhance this a bit.
-
lightloved[m]
But assuming tor usage is more normal to your ISP vs monero usage, I see no other better way really.
-
Xair[m]
well, yes, it depends on your specific threat model
-
Xair[m]
but that is a decently private and secure way to use monero
-
lightloved[m]
Yeah. Thanks for your comments, appreciate your input! <3
-
Xair[m]
np man
-
NicholasvonKlitz
What ended up happening to Kovri?
-
NicholasvonKlitz
-
NicholasvonKlitz
It looks like it's been very inactive
-
sethsimmons
Never materialized due to many different issues, mostly around the main contributor.
-
sethsimmons
Tor/i2p and Dandelion++ mostly replaced it.
-
NicholasvonKlitz
Is dandelion live by default now?
-
Xair[m]
iirc yes
-
Xair[m]
has been for a long time
-
sethsimmons
Yup
-
sethsimmons
It's by default for all nodes.
-
NicholasvonKlitz
is there still an advantag of using tor/i2p if dandelion is enabled
-
Xair[m]
btw is there a release to mitigate that statistical issue in decoy selection yet?>
-
Xair[m]
* btw is there a release to mitigate that statistical issue in decoy selection yet?
-
sethsimmons
Higher anonymity but also higher risk of Sybil attacks and other issues.
-
sethsimmons
Xair[m]: No, being worked on as we speak.
-
sethsimmons
#soon AFAIK
-
Xair[m]
ahh nice, hopefully soon :)
-
sethsimmons
NicholasvonKlitz: For most threat models, no IMO.
-
sethsimmons
But if you do use Tor to relay TXs it automatically disables Dandelion++ usage.
-
NicholasvonKlitz
ah okay. interesting
-
Xair[m]
why is that?
-
Xair[m]
I would assume it could work regardless
-
sethsimmons
You wouldn't want to use Dandelion++ over Tor, and don't need to as the broadcasting node is hidden via Tor.
-
sethsimmons
It would just cause more problems with propagation/Sybil attacks without any benefit.
-
Xair[m]
ahh, yeah that makes sense
-
sgp_[m]
I scheduled a Telegram voice chat in 45 mins:
t.me/monero?voicechat
-
carrington[m]
<sgp_[m]> "I scheduled a Telegram voice cha" <- "Link is no longer active"?
-
sgp_[m]
try t.me/monero
-
carrington[m]
That worked
-
plowsof[m]
Interesting call, thanks!
-
hyperviper[m]
why is the majority of the community on matrix instead of other websites?