04:42:32 Question: assume that Monero is successfully 51% attacked. Assume also that a CEX reveals a certain transaction publicly as laundering or otherwise undesirable. Would the attacker be able to “revert” or otherwise prevent this transaction from occurring or being included on the blockchain? 04:43:35 <3​21bob321:monero.social> L2 when 04:48:49 Yes as long as they maintain 51% of the hashpower, they can include/exclude any transactions they please (so long as it follows consensus rules, AKA no infinite inflation) 04:50:54 Ok, thanks for the clarification 04:53:14 If you want to reorg deeper, you need at least 51% hash power of the *cumulative* PoW of the depth of that reorg. So temporary 51% dominance doesn't necessarily mean arbitrarily deep reorgs, but 51% for extended period of time does 04:54:33 Until, at least in the default builds of `monerod`, you hit the last checkpoint. You can't reorg deeper than that 04:58:23 how often are checkpoints set? 05:02:45 Once every release version. Last checkpoint height is 3346800: https://github.com/monero-project/monero/pull/9722/files 05:10:05 I’ve spent today hanging around in the Qubic discord channel, and this is my “very official risk assessment”: 05:10:06 Odds of Qubic having a significant impact on the hashrate: 100% (has already happened; whether this is smoke and mirrors or not is besides the point: they were able to reach a peak of 10% hashrate). 05:10:08 Odds of Qubic reaching 51% territory: coin toss (idk if they currently want to push their network to this, nor do I know if they are actually capable of it. Additionally, it could be possible that they reach 51% on accident by underestimating their network power) 05:10:10 Odds of Qubic using 51% to directly harm the network: 10-15% (isn’t in their best interest to do so, but who knows; it’s not like Monero has a lack of enemies) 05:10:12 Odds of Qubic indirectly harming Monero: 60% 05:12:00 As for what Qubic actually is….from what I gathered, it appears to be a decentralized supercomputer (and I do mean supercomputer; the spec of the protocol requires there to be a minimum of 676 servers, each with a 24 core EPYC and 2 TB of RAM….yeah) 05:48:03 Who actually invests this much ? Seems like a state actor? 05:53:52 thx jeffro 06:04:35 preland: "Odds of Qubic indirectly harming Monero: 60%" Do you have some particular kinds of "harm" in mind already? 06:16:10 3375700* 08:45:48 Certified by CertiK proudly displayed on their page whom appear 9 times in the Rekt leaderboard https://rekt.news/leaderboard 08:49:18 Correction, Not an audit, they confirmed a number of transactions happened per second on a testnet, ok 09:06:43 with 51% the transaction would still just get mined pretty quickly 13:22:14 jeffro256: For clarity, cherrypicking RingCT txs would be difficult. Cherrypicking FCMP txs would be impossible. By "cherrypicking" I mean removing one or a handful of txs from some time point `A` in the blockchain history, yet keeping txs that had been confirmed after time `A`. At least that's what I understand. 13:26:07 In the RingCT case, the entity performing the attack would have to insert one or more valid txs into the correct position in the `A` block to exactly fill the missing set of outputs that the entity had removed when they removed the target transaction(s). Then, the entity would have to do the same for any subsequent transactions that had referenced those specific outputs in their r 13:26:08 ings, because those txs would be invalid (public keys would not have been the same). The further back the target tx, the more complicated this becomes, and the more "collateral damage" you do to non-target txs that have to be discarded. 13:27:00 With FCMP, the FCMP Merkle tree would be altered at point `A`, so the input proofs of txs after that point would all be invalid. AFAIK. 13:27:32 The easy thing for the adversary to do in both cases would be just to mine empty blocks from the point `A` onward, in the attacking chain. 13:28:44 ^ RingCT tx reference rings by index position in the blockchain. That's why the adversary has to replace the outputs in the exact index position. Otherwise, those later txs would have misaligned RingCT offset indices. 13:33:44 I don't know what Qubic is doing, but they could be just renting RandomX hashpower, for publicity. They would not even need to be using their network's consensus nodes to do anything. 13:38:24 Yeah, their hashrate spikes to "400mh" dont last very long at all 13:39:15 maybe a few minutes. Unlike the botnet with 1-1.5gh that would be mining for 12hrs per day 13:41:13 https://matrix.monero.social/_matrix/media/v1/download/xmr.mx/hIVEwYVzUbScTAqsEYMxeYrl 14:21:04 a graph of said hashrate https://qubic-xmr-stats.streamlit.app/ 14:24:22 "Pool Hashrate 14:24:22 0.00 H/s 14:24:24 " 14:32:34 momentarily returning back to our usual status where the top 2 pools combined have >60% of global hash :D 14:34:02 kewbic please 'attack' us with decentralised hashes 😭 14:43:32 Please, focus on qubic 14:44:19 The top pool having 40%? Pay no mind to it. Focus all of your attn on qubic 14:46:46 Is talking about qubic, off topic to this group? What is the topic of this group specifcally? 14:58:23 Yes. Work 15:06:56 I am just researching about qubic etc. and it's pretty interesting even if they won't be able to 51% attack Monero - some links if you are interested: 15:06:56 https://iq.wiki/wiki/sergey-ivancheglo 15:06:58 https://www.iota.org/learn/intro 15:07:00 https://www.iota.org/learn/focus-areas#digital-identity 15:07:02 https://matildaonqubic.com/ 15:07:04 https://www.kv.by/archive/index2000491105.html 15:07:06 So the person (if he's actually behind qubic), who co-founded IOTA which main focus is digital identiy and has the WEF as supporting organisation, wants to 51% attack Monero 15:07:37 * if this is propped up, it is done well 15:10:13 WEF attacking Monero confirmed 15:10:23 Every anons to their battle stations 15:10:28 The war has begun 15:10:33 Maybe, if you have an opinion about this, or know better than me, tell me so if I spead bullshit, I would like to delete my post as fast as possible 15:11:24 m-reIay: m-reIay 15:15:37 maitreyatoaster21: Your deletions on Matrix don't delete messages from the bridged IRC side, nor from the WWW: https://libera.monerologs.net/monero-community 15:17:13 Thanks well than I guess if it's bullshit I am talking, It'll stay out there. 15:17:42 🫥 15:19:03 Like I said ^, it could be a publicity stunt using rentable hashpower already available. If it's a publicity stunt, they got you ;) 15:19:05 no one said you were telling bullshit 15:19:12 I guess it's worth monitoring 15:20:54 A sharp edge. Talking about it or not talking about it. But yeah, if it's the same guy behind IOTA and Qubic, I too think it's worth keeping an eye on 15:21:46 A _real_ way to monitor this would be to perform a scan of the Qubic network to see how many nodes they really have. That would put a reasonable limit on the hashpower they could actually be producing with their consensus nodes. Of course, that assumes that each IP address has not more than one Qubic machine behind it. 15:22:24 And you would want to try to estimate the number of unreachable Qubic nodes, by waiting for them to connect to you. 15:22:55 I guess this is not easily done, right? 15:23:16 Just requires some knowledge and a little time to work. 15:23:42 Unless their network works in a non-standard way, somehow. 15:24:19 I'm proposing the formation of an intelligence and offensive group dedicated to the protection of Monero's interests from the terrorist threat that is Qubic. This group will be called Monero Security Agency and will be under core team direct supervision. 15:33:10 MSA 15:33:17 Close enough 15:34:25 this is a fucking rabbit hole, holy 🫨 15:44:33 IOTA partner Tony Blair foundation video: "Political leaders have a choice. Disrupt (ChatGPT pic.) or be disrupted (Protest pic.). Join the radical reinvention of government." and so on 16:40:02 selsta part-time monero development (3 months) (17) has moved to funding! https://ccs.getmonero.org/proposals/selsta-17p.html 16:41:43 By “harm” I rly just mean in terms of reputation; it seems like *some people* (cough cough) have been overly antagonistic to them, which is honestly why I even put the odds of them attempting to 51% + trying to use it maliciously as high as I did. 16:41:44 Regardless, thanks to the *glowing reception* we gave them, it seems like the community consensus over there is to clown on us 16:45:05 They already admitted that a single machine can take up multiple “slots” in the current system (and it is happening already) 16:45:06 To be honest, this is a red flag, as their design in theory has Sybil preventions both from a technical standpoint (all nodes have to prove that they meet certain requirements) and from a game theory perspective (a powerful computer earns significantly more as one node than the same computer split into multiple nodes) 16:46:51 They are apparently instantly swapping their earnings for Tether, which means as of right now they have earned around 60k USD from mining 16:47:25 Which is a lot, but considering how much effort their network is putting into it….I don’t know if this is sustainable for them 16:48:31 >it seems like the community consensus over there is to clown on us 16:48:36 And as for the sporadic nature of their hashrate, the claim is that they just use excess compute to do it 16:49:04 half their network is used to power LLMs to reply with glaze comments on everything the founder (who is of course staoshi) says 16:49:57 Funny if true 16:49:59 it wouldnt surprise me in the slightest to find out that they just buy the hashrate to further their narrative 16:50:30 everything their founder tweets instantly gets a hundred likes :P 16:50:34 They do (kinda) through their coin 16:50:45 Twitter moment 16:51:12 Speaking of Twitter, the undercover glowie of the week award goes to: 16:51:25 https://matrix.monero.social/_matrix/media/v1/download/monero.social/iwlMxoNbDJVIWkxMaRDNoFEx 16:51:39 This guy, who appears to have started this whole flame war mess 21:49:41 (For posterity’s sake: the above was made *before* that guy got light doxxed by the head of Qubic)