05:31:26 Is Judecoin developed by the Monero core team? 05:31:27 Judecoin claims to be developed by the Monero core team 09:51:29 anddn: I doubt that's true 12:17:47 It can't be true 12:27:40 judecoin is a fork of Monero, and it is impossible for the Monero core team to fork their own project 12:28:49 its spam 12:30:51 Take judecoin topics to -judecoin or -offtopic, not -dev and -community 13:41:43 Can my public Monero node running as a tor hidden services utilize the new Tor PoW protection mechanism? 13:47:21 why do you go for 12 months in one go ofrn, you know that wont pass 13:48:51 It should be possible, as long as the node is on the TOR network 13:49:52 Bcuz i like it like that. Who says it wont pass? The length wasn't an issue on the first one, the up front payment and the unconventional scope was 13:49:55 Attention whoreism? 13:50:53 yea, you just need to add the pow config lines to your torrc 13:51:15 isnt it unconvetional scope if you scope it for 1 year when some of our top devs have to re-submitt every 3 months 13:51:51 nobody told em to do that. They do it because they choose to, sometimes because of volatility 13:52:10 Some do 2 months, some do 1, some say 3 and go for 6 13:52:57 they dont _have_ to resubmit every 3 months. Its a personal choice 13:53:27 And some also like to raise rates every 3 months 13:56:56 i have already have support on this ccs from two "3 month ccs devs", mrcyjan and 0xfffc. Their work also changes more frequently, which is another reason why they might choose shorter terms 13:58:47 our top devs dont have to scope for 3 months, one of them does it due to volatility 14:06:14 Bcuz i like it like that. Who says it wont pass? The length wasn't an issue on the first one, the up front payment and the unconventional scope was <<>> the length was not a issue compared to the upfront payment and unconventional scope. 14:06:19 One of the big reasons for the max 3 month rule was price volatility resulting in changes in work/completion or people crying that people made $$ 14:07:28 Another issue was proving a new contributor. Although this is a first CCS it is a continuation of work that has been ongoing 14:09:25 1 xmr = 1 xmr as stated in the proposal addresses the volatility. Is that enough of a guarantee? .shrug 14:12:10 judecoin is a fork of Monero, and it is impossible for the Monero core team to fork their own project <= why would this be impossible? That said I've never heard of judecoin. 14:17:49 is this the same judecoin that wants to be added to xmrig sech1 lol 14:18:33 or the one where tevador linked to the 1 million pre-mine in their source 14:18:49 so many monero forks, what a time to be alive 14:19:56 No, it's different 14:22:52 luigi, case in point (depending on definition of "core dev"): townforge 14:25:40 Ik moo doesnt identify as core team. So bad example maybe.. but yeah theres nothing stopping anyone, incl core, from forking to monero 14:27:48 Monero is a fork itself. Doh. 14:30:19 read comments for the full context. geonics issue for info regarding the monero trademark https://github.com/monero-project/meta/issues/730 14:50:41 You can't make that stuff up: Those self-confessed Monero spammers that claimed to bring down DNMs with hard drugs now seem to have offers for such drugs on their very own BBS: https://antidark.net/board/viewtopic.php?t=24 14:51:22 (Probably a case of mod sleeping, but still.) 14:51:24 Nice. Lol. 14:55:48 have they published the keys of the wallet to verify :( 14:58:37 Don't think so. And as was opined in yesterday's MRL meeting: Truth told, we don't really want to float view keys for any of those spam wallets around. Privacy impact. 14:59:53 they are malicious so they would want to do that anyway , hinting toward them not being the culprits 15:00:48 combined with them selling things the whole thing looks like marketing 15:01:52 correction* they are not selling things, someone spammed their forum, so i retract the above 15:02:03 I can't really follow that reasoning. They *claim* they are the good ones, and try to do good, for the children and all. If really so isn't it only logical they don't add further to the damage done to Monero with publishing those view keys. 15:02:27 Yeah, I think that's just a hilarious piece of spam on their board, in any case. 15:03:44 not exactly sure on how the have framed it, but they see monero as enabling evil people so they attacked it. releasing keys would have a privacy impact on those evil people 15:06:26 Anyway, however the truth may be, we have to mitigate, and we are on the way to do exactly that, by working full steam towards getting rid of rings which make "black marbles" possible in the first place, and by stress-testing the Monero daemon further. 15:06:36 Both endevours are coming along nicely IMHO. 15:07:32 release of the keys would allow us to add one of those custom black-marble lists as to not use any of their decoys, so they could use that to not do it 15:08:08 Stressnet had numbers of transactions and block sizes reached that went well beyond what their spam wave reached, by the way 15:08:09 true, it had a net positive on Monero and no transactions where dropped , nothing stopped 15:08:47 At one point there were freaking 3 MB blocks if I remember correctly 15:12:57 > didn’t prove they really made the attack 15:12:57 > Take a look at the post once again. Try it out yourself. Post back the results. Really simple for the smoothest of brains to understand. 15:14:31 https://monero.town/post/3785880/5249182 15:16:28 black marble / sharing of keys reminds me of something 15:17:22 Tor friendly link pls 🙈 15:17:35 hardenedsteel "try it out yourself" > the method for spamming is well known / there are open source repos to perform it sponsored by magic. just because its simple to do doesnt mean they did it 15:18:02 300k in donations too, without proof.. seems profitable 15:18:42 7mb 15:18:44 what kind of person would work with chainalysis companies to share keys though and harm out privacy if they where released, surely nobody here? 15:20:11 Well we can wait for another attack instead of increasing ringsize and fees 15:20:54 And wait for fcmp and bigger blocks to be all tested in a single update 15:21:16 /s 15:21:39 Your sarcasm of terribly misguided 15:21:59 Bigger rings dont solve anything 15:22:33 and we tested bigger blocks, over 10x bigger than this spam attack 15:23:28 Something like 40+tps and 7mb blocks 15:24:01 @plowsof Regarding the "proof of reserves" feature you suggested: We think it would be a useful feature with little to no drawbacks. I've added it to our roadmap and opened a GitHub issue for it: https://github.com/comit-network/xmr-btc-swap/issues/1743 15:24:06 " what kind of person would work with chainalysis companies to share keys though and harm out privacy if they where released, surely nobody here?" < Plow 15:30:11 The "donations" was them draining DNM wallets 15:33:11 i wondered what the quotes meant lol thanks monerobull 15:35:50 Incognito admin couldn't catch a break lol 15:36:14 First lost 300k eth wallet then drained by these guys then tried to exit scam and was arrested 15:37:55 Didnt he get arrested 15:38:08 before the spam? 15:38:29 My timeline is probably off, iguess 15:54:11 they call “donation” to collateral damage 19:58:37 link? 20:25:17 ofrnxmr: !482 milestones from January > August should probably be 2025 (not 2024) 20:25:33 ofrnxmr: !482 milestones from January > July should probably be 2025 (not 2024) 20:39:55 Ty 20:41:37 It does help to keep effective ringsize higher than 5 😅 + add higher fees and it’s much much more expensive for the attacker 20:42:37 Ask wownero how that worksout 20:43:35 Ain’t you a wow moon boy 20:43:37 Higher fees? In per-unit expenses, we spend as much as bitcoin 20:44:13 More rings != more privacy u mess those rings are guaranteed to be clesn 20:44:18 You can buy a ton of xmr for a single btc 20:44:25 Im not a moon and not a boy 20:45:13 And? Theres less xmr than there is btc AND we both pay abt 0.00004 for a regular transaction 20:45:45 Monero != fiat. Are we supposed to hard fork to change the fees to account for usd price? Lol 20:46:30 This is a convo for #monero but im not allowed in there some reason diegoooooooo Diego Salazar: 20:46:39 Xmr is a target, btc isn’t ; keeping fees low = inviting spam attacks , it maybe irrelevant after fcmp but till we use 15 decoys we are vulnerable 20:47:03 Btc isnt a target? So then why is it constantly spammed 20:47:18 Why is 15 a magic number for you? 20:47:30 Btc etf ? Spammed by miners increased feeeees 20:47:49 16 ? 15 decoys 20:47:51 decoys are the weakest part of monero privacy and whether you have 1 or 16, a churn wont save ya 20:48:43 Bump decoys ? Isn’t it common knowledge that effective ringsize was 5 during spam attack 20:49:03 maybe if you had 1000 decoys, youd have plausible deniability when spending multiple outputs together 20:49:32 15 decoys is better than 5 decoys 20:49:40 But 16 is a waste if blockspace. 20:50:16 We can wait for fcmp, but we are just waiting for another spam attack that lowers xmr privacy 20:50:36 Its not though. 20:50:37 if i send you known outouts and you ever mix that change together and send it back to me, ill know youre the spender 20:51:32 And the spam attack wasn’t wasting any blockspace ? Reason there was spam is because it was cheap and effective to lower ring size to 5 20:51:49 unless there are sooooo many decoys that your outputs are constantly being referenced by other people 20:52:00 No. Spam attack was garbage. 20:52:40 wasting blockspace = fake privacy. Bumping ring size to 22 wont fix anything, can still spam your effective ringsize down to 3 just as easily 20:53:21 Spam = paying for blockspace, and those blocks werent even big 20:53:40 Barely did 100ktx/day 20:53:42 Need to bump ringsize to match fcmp tx size + some bump in fee 20:53:45 There's a case for increasing ring size so that tx size is roughly what it will be with FCMP, but the most obvious immediate solution is to artificially raise fees so that there's a fixed cost to create 1 output 20:53:52 On stressnet, were doing 5000 tx/block 20:54:07 No 20:54:24 The most obvious immediate solution js to limit outputs to 2 and 16 20:54:55 No use, it’s still uses those spammed decoys 20:55:00 And increase the effective ring size by not allowing users to oust themselves by having 3-15 out transactions 20:55:16 Youre not listening 20:55:27 Rings are polluted by _rare_ transacrion types. 20:56:05 Your effective ringsize is always low because our decoy selection also will select coinbases and also out wallets let you spend non-standard transactions 20:56:26 our* wallets 20:56:55 Non standard = 1in5out transaction (etc). Anything that isnt 2 or 16 20:57:10 There are reasons you might want to ban 3-15 out txs, but I don't see how it helps with increasing effective ringsize 20:57:24 This is why it was so easy to track the ccs wallet hack 20:57:42 you have bad decoys that use those 20:58:31 When i come to your store and soend some money and you look at the ring full of coinbases and 8-out's. You can exclude those as the true spend, they are all black marbles 20:58:42 The real tx is a 1/2 20:58:54 Sorry, a */2 21:00:21 And if its s 5/2, and youre spending at a central service? and those 5 inputs are change from a central service? Extremely easy to know which outputs are the real spend 21:01:27 Tldr: rings are trash. Believe in steath addresses and CT, dont rely on rings or churning to save you unless you are meticulous with your coincontrol or never spend at centralized services 21:01:29 I see, so it can't be fixed by changing decoy selection to avoid non standard output count txs, since that would leave people withdrawing from exchanges with less privacy 21:02:17 people withdrawing from exchanges are often batched (16 out) 21:02:46 By requiring 2- or 16-out only, exchanges will wait for 16 withdrawals, or fall back to 2-outs 21:02:50 16 out and 2 out are extremely common transactions (present in 100% of rings and 30% of rings, respectively) 21:03:20 You can send a 1/5, it would just create 11 dummy outs and appear as a 1/16 21:04:11 cursed username gave me a ping. But yes, stealth addresses and confidential transactions are solid 21:04:24 (my fault really) 21:04:29 hahaha 21:04:58 So thats why they call you ct. Mr confidential 21:05:17 its unrelated 21:06:58 If we limited outputs to 2 and 16 + segregated coinbase (mrl 109), rings would be much closer to reality 21:07:33 but cmon. Its a ratio. 21:07:33 if someone sends 80% of the transactions, theyll own 80% if the decoys. Doesnt matter if its 16 or 32 21:08:50 Why did the spam attack use 8-outs? It'd be cheaper to use 16 if they wanted to reduce effective ringsize 21:09:57 And if there are 32 decots, but you spend 3 known outputs together, the original sender can just watch the chsin to see when multipke known outs are consolidated. Its easy to exclude the fake outs 21:11:51 I'm not an admin there am I? 21:12:05 Banhammer 21:30:16 <3​21bob321:monero.social> How can you not be an admin in all the rooms 21:37:32 Cuz admin should be the person who champions the room, not just a bureaucrat /politics 21:37:49 Example: scott shouldnt be admin in any room 21:38:04 Yet.. he is in every room 21:39:19 <3​21bob321:monero.social> If you have access to banhammer, then you have access to all the protected rooms anyway 23:57:12 I created github.com/monerojs/monerojs 6 years ago 23:57:13 I want to update it but do so usefully; I'd rather contribute to an up-to-date project rather than probably redoing a lot of work someone else has already done. 23:57:15 I see https://github.com/PsychicCat/monero-nodejs was also last updated 6 years ago 23:57:17 Can anyone please share any similar JavaScript or TypeScript Monero JSON RPC libraries to which I can contribute rather than updating my old code? 23:58:27 is https://github.com/mymonero/mymonero-core-js the preferred JS lib? 23:59:35 no lol badly out of date but i'll release mine in a sec. just as soon as i get literally a few hours to myself