03:03:44 Just tried that miner in Chrome browser on a pc running Ubuntu. I'm getting ~560 H/s in browser when I usually get ~16,700 H/s with xmrig. Is there a way to get better results in browser? 03:04:20 I don't think so 03:04:39 a browser is a browser, it's mainly a bloated unoptimized piece of *** 03:05:14 and you go thru abstration layers with browsers 03:05:34 while with xmrig you run code directly on the CPU as optimized as it can be for that specific purpose 04:53:36 Did nobody state clearly so far that mining Monero in a browser is dumb, stupid, and absolutely not worth it, and that this won't change, like probably ever? 04:55:03 They foolishly think Snowflake saved Tor—it didn't. 04:55:05 TLS-like bridges such as Webtunnel save it. 04:57:13 In this bribery war, if Monero wants to win, the only way is to reshape consensus and replace PoW with a [mathematically deterministic solution](https://decentralizedstatemachine.com/), which would at least preserve community cohesion and brand identity, probably. 04:57:57 In this bribery war, if Monero wants to win, the only way is to reshape consensus and replace PoW with a [mathematically deterministic solution](https://decentralizedstatemachine.com/), which would at least [preserve community cohesion and brand identity](https://dmf-archive.github.io/concepts/Economy/), probably. 04:59:15 This is no longer a game about coins, this is an ontological war. 05:02:11 No, randomx performs crap in browser; CN used to work well 05:29:26 In this bribery war, if Monero wants to win, the only way is to reshape consensus and replace PoW with a [mathematically deterministic solution](https://decentralizedstatemachine.com/), which would at least preserve community cohesion and brand identity, probably. 06:15:58 The DSM whitepaper has a number of issues. It seems to imply in one place, for instance, that the creation of new DSM accounts requires trusted entities as a measure to prevent Sybil attacks, yet in another it implies that users can create their own identities. It implies (but doesn't state outright) that double-spend attacks can be detected but makes no suggestion at all about ho 06:15:59 w to proceed when double-spend attacks are detected. In another spot it says that double-spend attacks are impossible, in an offline environment, without even addressing obvious things like saving a snapshot of the app, sending a payment offline to someone, restoring the snapshot, then paying someone else also offline. 06:18:53 Torir: quote from site : "Solves The "Double Spend Problem" without consensus". Like what? Everyone just agrees to have their own version of events? Yeah I dunno what this even about 06:19:32 I think it is AI generated. 06:22:21 You've pointed out the core trade-off. DSM is essentially a network of bilateral state channels. It does require an initial trust anchor for genesis (the paper details a trustless MPC-based setup for this, see Sec. 12), but that's a one-time cost. 06:22:23 Once a relationship is initialized, all subsequent state transitions are self-validating and cryptographically bound. The key shift is moving from continuous global consensus (PoW) to a one-time anchored setup followed by localized, deterministic verification. No more global race. 06:22:25 The offline double-spend (snapshot restore) is mitigated by the recipient co-signing a pre-commitment hash (Sec. 16). When they come back online, any conflicting state publication from the sender would be invalidated by the already broadcasted, co-signed commitment. It transforms the problem from preventing forks to deterministically resolving them. 06:22:27 You've pointed out the core trade-off. DSM is essentially a network of bilateral state channels. It does require an initial trust anchor for genesis (the paper details a trustless MPC-based setup for this, see Sec. 12), but that's a one-time cost. 06:22:29 Once a relationship is initialized, all subsequent state transitions are self-validating and cryptographically bound. The key shift is moving from continuous global consensus (PoW) to a one-time anchored setup followed by localized, deterministic verification. No more global race. 06:22:31 The offline double-spend (snapshot restore) is mitigated by the recipient co-signing a pre-commitment hash (Sec. 16). When they come back online, any conflicting state publication from the sender would be invalidated by the already broadcasted, co-signed commitment. It transforms the problem from preventing forks to deterministically resolving them. 06:23:33 You've pointed out the core trade-off. DSM is essentially a network of bilateral state channels. It does require an initial trust anchor for genesis (the paper details a trustless MPC-based setup for this, see Sec. 12), but that's a one-time cost. 06:23:35 Once a relationship is initialized, all subsequent state transitions are self-validating and cryptographically bound. The key shift is moving from continuous global consensus (PoW or PoS) to a one-time anchored setup followed by localized, deterministic verification. No more global race. 06:23:37 The offline double-spend (snapshot restore) is mitigated by the recipient co-signing a pre-commitment hash (Sec. 16). When they come back online, any conflicting state publication from the sender would be invalidated by the already broadcasted, co-signed commitment. It transforms the problem from preventing forks to deterministically resolving them. 06:24:38 So... the receive thinks they got paid then when they go back online the transaction is undone? 06:25:08 Or the receiver comes online, publishes the transaction, and it undoes an existing transaction already published? 06:25:53 This can be solved by VDF, and Solana has already demonstrated the potential of PoH. 06:26:19 It's just that they use PoS for final anchoring, while DSM implements the idea of state channels more extremely. 06:28:03 Going with it for a moment, 1:1 state channels aren't viable alone. You still need a way to transfer across them. If you have a base layer, why would DSM be notably better than _any_ payment channel network solution that's well-designed? 06:28:17 Is that the argument? DSM is just a well-designed payment channel architecture? 06:33:41 Okay, so better stated in a less wordy than the DSM whitepaper, the project is basically 1:1 payment channels that either party can publicly prove the most recent state of. However, two parties working together could create conflicting states for their shared payment channel, which means that other 1:1 payment channels cannot rely on the word of those two parties. 06:34:00 Correct. DSM avoids Lightning's routing issues by pushing multi-party logic to the app layer (e.g., atomic swaps, not chained HTLCs). For DeFi like AMMs, the counterparty is an always-on MPC network acting as a virtual, trustless entity, providing a persistent anchor for asynchronous swaps while still using deterministic DSM rules. 06:35:12 Almost. Yes, two colluding parties (A&B) can create conflicting states against two different external parties (C and D). But C and D can protect themselves by cross-verifying A's state with each other (or any other honest party interacting with A) before finalizing. The fraud is contained because the inconsistency is cryptographically provable to anyone who cross-references. It do 06:35:13 esn't break the network; it just isolates and burns the reputation of the colluding parties. 06:35:15 Almost. Yes, two colluding parties (A&B) can create conflicting states against two different external parties (C and D). But C and D can protect themselves by cross-verifying A's state with each other (or any other honest party interacting with A) before finalizing. The fraud is contained because the inconsistency is cryptographically provable to anyone who cross-references. It do 06:35:17 esn't break the network; it just isolates and burns the reputation of the colluding parties. 06:35:55 So I have to have verified that A's state is valid by going online before I can accept offline payments from A. 06:36:34 By talking to an entity that I trust that also interacted with A. 06:36:40 It's really hard to send money to strangers in this setup. 06:36:57 This does not require online verification, just accept non-interactive zero-knowledge proofs 06:37:34 Not necessarily online verification. A can provide you with a non-interactive ZK proof from a trusted introducer (say, a well-known exchange E) attesting that "A's state was consistent and solvent as of VDF timestamp T". You trust E's signature on that proof, not A's liveness. It shifts the trust anchor from global state liveness to transferable, signed attestations. 06:37:51 So, why doesn't the whitepaper offer suggestions for how to handle detected double-spend attacks? Or talk about how the reputation damage of a detected double-spend acts as a deterrent? 06:39:46 handling it is an application-level concern, not a protocol-level one. DSM's job is to make double-spends cryptographically detectable and attributable, not to prescribe a universal punishment. One app might implement a public burn list, another might use it for a credit score, a third might trigger legal smart contracts. The protocol provides the irrefutable proof; the social/eco 06:39:47 nomic consequences are built on top, making the system more flexible than a hardcoded protocol-level slash. 06:40:10 There is definitely *some* sort of potential here, but the whitepaper really completely fails to address any of my questions. 06:43:15 What's the story with the Google play wallet ban? 06:44:12 midipoet: From @newsFromGoogle: Thanks for flagging this. Non-custodial wallets are not in scope of Google Play's Cryptocurrency Exchanges and Software Wallets Policy. We are updating the Help Center to make this clear. 06:44:53 Hey, is this even the correct channel for discussion of the DSM whitepaper? 06:44:57 Ah that is good. 06:45:00 https://www.therage.co/google-play-store-ban-wallets/ 06:45:06 Cause this article wasn't clear 06:45:28 I think that tweet or whatever it was came later. I haven't actually gone and found the source. 06:46:28 Found it: https://xcancel.com/NewsFromGoogle/status/1955743865144795581 06:47:47 Ω-418: I'm a 🫖: If VDF are so important to the protocol, why doesn't the whitepaper mention them once? Like... the whitepaper is... weird. 06:50:06 And PoH (from what I've read) requires a degree of centralization which the Monero community is strongly against. This idea *might* have promise, but it needs a lot of work before we can usefully discuss integrating it into Monero. 06:50:20 In my opinion. 06:50:22 Because the original author's solution is hardware-bound to DBRW, ensuring all local states are up-to-date and confined to the device 06:50:58 Because the original author's solution is hardware-bound to [DBRW](https://decentralizedstatemachine.com/DBRW-combined.pdf), ensuring all local states are up-to-date and confined to the device 06:51:02 What is DBRW? 06:51:32 Also, try to not edit your posts on Matrix, it spams the IRC relay bot. 06:51:45 ok. 06:51:47 https://decentralizedstatemachine.com/DBRW-combined.pdf here 06:56:18 So it sounds like DBRW completely fails if I can patch the app to provide a false fingerprint or even a fingerprint from a different device. The fingerprint can only be measured on the device itself, but the user controls the device. 06:57:03 This sounds like a long way to say it doesn't have consensus because it doesn't do anything you'd need consensus for 06:57:58 You control the device, but you don't control the physics of its silicon or the math of the hash function. DBRW's hardware fingerprint is the input to a cryptographic hash that forms the commitment chain. You can patch the app to provide a false fingerprint, but you cannot force that false input to produce the correct hash output that matches the chain's history, unless you can re 06:57:59 verse the hash function. It's like saying you can forge a signature because you control the pen. You can write whatever you want, but you can't make it match my signature. 06:58:01 But the moment you want to do something requiring consensus, we handwave the existence of something with consensus (an MPC group) 06:58:41 In reality, for most "dapps," you have no choice but to trust the contract deployer. 06:58:44 Ω-418: I'm a 🫖: What's stopping me from creating a brand new chain with a false fingerprint the entire time? A closed-source app? A TPM? 06:59:47 The attack that lets me roll back state and copy my wallet to other devices is the one where I only pretend to do DBRW on my device but actually just pick random numbers. 06:59:56 Your genesis state. To interact with me, you need to present your genesis state, which was created at a specific point in time and anchored, for example, via a trustless MPC ceremony with witnesses (Sec. 12). You can create a new chain with a fake fingerprint now, but you cannot retroactively make it the chain I've been interacting with since last week. The genesis event is a uniq 06:59:57 ue, witnessed, temporal anchor. You can't fake history. 07:01:14 So... back to a setup process. During the setup process, what forces me to do honest DBRW on my device? 07:01:24 I believe this is sufficiently off topic it can be kicked to off topic. 07:01:27 Okay. 07:01:42 How do I link to a channel on Matrix? 07:03:01 Nevermind, they left. 07:03:12 <3​21bob321:monero.social> troll 10:31:44 https://github.com/Cuprate/cuprate/issues/512 10:31:46 The level of botting is crazy 10:36:56 we're not using mdbx btw 10:46:44 <1​7lifers:matrix.org> everyone gotta know D: 10:51:08 289 repositories mentioned, thats effectively a hell of a way to make people know 11:11:53 Anyone estimate how much it costs qubic to attack Monero? Wondering if this article's claim of $75 million per day is reasonable, or way off. https://www.mexc.com/es/news/spending-75-million-on-a-network-attack-for-only-100000-in-profit-a-look-back-at-the-monero-and-qubic/65028 11:22:57 > Yu Xian, founder of the security company SlowMist, an attack of this scale could cost as much as $75 million per day 11:23:16 I think article writer got this way off 11:23:30 75k/day 11:30:05 more likely yeah 11:34:37 <3​21bob321:monero.social> Only on weekends ? 12:15:33 dan bob mostly yeah 14:03:16 SyntheticMoo, the true and only one: the author assumes the hardware has to be bought / quotes someone who does 15:01:46 Qubic's "marathon" attack should be happening again now, right? Where can I look to see how that's going? I don't see a current hashrate for Unknown on miningpoolstats site. 15:11:42 i think they will switch to gpu mining a different coin 15:13:31 something that is missing in the article: cpus have a value outside of monero mining. so hardware is not pure cost. could also buy on credit or get people on an "mine ai with cpus" MLM scheme to buy the hardware with buy now pay later services or credit cards. 15:14:20 Can also resell _or rent out_ cpu compute power 15:14:48 Not just on miningrigrentals, but there are other places to loan compute and recoup costs multiple times over 15:16:26 Servers? 15:16:40 to be fair at this point we are in a war of attrition type of situation and the game theoretics of this scenario make it more expensive now 15:32:46 [CCS Proposals] Luke Parker opened merge request #604: kayabaNerve Finality Layer Book https://repo.getmonero.org/monero-project/ccs-proposals/-/merge_requests/604 15:35:00 👋 15:35:39 So, finality layer will be the solution? 15:36:13 I ended up doing a very brief outline for CCS, though obviously I expect the completed work to be similar in content/thickness as my FCMP++ paper (albeit angled for wider understandability throughout the community). 15:36:17 Purple grapes: No? 15:36:28 > The intent of this book would be an educational resource advancing the discussion on finality layers (by ensuring everyone is on the same page) and a reference design, should we ever decide to move forward with implementation. 15:36:50 One of the primary issues right now, as we discuss if a finality layer is a better solution than what we have today, is people don't understand how a finality layer would work/the literal effects. 15:37:24 This would propose a design to advance the discussion and allow us to have an educated opinion on _if_ a finality layer should be the solution. 15:40:47 Got it, thank you 15:42:34 Happy to clarify :) 17:32:11 still way off 18:25:23 Kayabanerve ma 18:25:52 sniper took plowsof? 18:27:09 Ma? Mama? 18:27:17 plowsof's first word ♥ 18:28:02 With my last breath - it has to be a markdown (.md) file ... And whatever you do, please end on a new line x.x 18:29:23 ... did I not make a MD file? 18:29:49 Oh, I didn't assign any ext 18:29:53 Sorry, I'll fix that 18:30:21 Blame the web editor for not ending on a new line though :C I agree it should always be done 18:35:22 plowsof: Fixed 18:47:08 john_r365: Responded 18:50:08 thanks! kayabanerve 20:39:36 https://matrix.monero.social/_matrix/media/v1/download/monero.social/aSHDSbSygqhQjZvobOrPDZtH 20:40:09 Can these stats be relied on? 3.1 GH/s and 40 of the last 100 blocks 20:40:57 Interesting, any orphaned blocks ? 20:41:19 can't see any on https://moneroconsensus.info/ recently 20:42:30 Looks like qubic is here to stay, why not when their team makes xmr and pays in qubic 20:43:09 40 of the last 100, yes. The 3.1 is self-reported though, but sounds accurate 20:45:11 So much for cucnets securing xmr 20:49:10 Supoortxmr lost 400mb 20:50:26 Top 3 pools "only" have 48% atm 21:00:51 looking at the avg using rough numbers, compared to 30 July, the unknown HR increased 1.5GH/s while known pools decreased by the same amount 21:02:57 binaryfate: tevador has a proposal for the general fund to handle immediately, if to be handled, in #monero-research-lounge:monero.social 21:03:15 Also cc luigi1111 , I guess 21:10:06 this is bad 21:10:09 time to open the wallet and fight back with hash power? 21:10:31 Yes every Kh/s helps 21:10:36 [@kayabanerve:matrix.org](https://matrix.to/#/@kayabanerve:matrix.org) i dm'd both on irc 21:12:50 anyone about who can answer some dumb questions / give tips regarding miningrigrentals.com ? maybe who's used it before 21:13:53 ive used it, sup 21:14:12 Damn, 200mh is like 15000usd 21:14:33 We dont have that much btc iirc 21:16:02 john_r365: x3nu had a video on it 21:16:37 https://reddit.com/r/Monero/comments/1mehpak/how_to_quickly_rent_hashrate_to_help_protect_the/ 21:19:27 thanks Rucknium 21:24:29 What's the primary reason for designing a "Monero finality layer", as opposed to just using a checkpoint commitment to prevent reorgs on an existing/larger chain? 21:24:57 Rationally speaking, surely it's just optics? 21:32:19 no 21:33:06 someone earlier said the commitments require you to run a btc node 21:34:29 I don't understand why? Surely it would just be a read/write operation, which can be done without running a full node. 21:37:51 It suppose it might be more secure to run a node so that you can verify the commitments against your own copy of the chain, but i don't understand why it would be a necessity. 21:38:45 midipoet: That would make Bitcoin the finality layer. 21:38:51 It's an option. 21:39:06 Yes, I know that 21:39:11 You'd need a Bitcoin node/competent light client to retrieve the commitments. 21:39:29 Yes, a light client isn't a full node though, right? 21:39:58 So, what is the other primary reason? 21:40:13 Surely it's just "dependency optics". 21:40:38 Reason not to? 21:40:46 Because we can't use Bitcoin due to data availability 21:41:02 We'd have to to use Ethereum or something smaller 21:41:06 Dependency optics 21:41:17 Miners have to pay to publish to an ETH SC 21:41:21 Everyone runs an ETH node 21:41:36 (Albeit they can run a pruned node) 21:42:04 Could we use a stablecoin? Preferably one of the new US regulated ones. 21:42:52 I mean, a stablecoin backed by coinbase/circle/Google or whatever is probably gonna be fairly secure. 21:43:05 If the community is willing to move to Ethereum checkpoints for the next six months, even just as an opt-in safety measure, and the top pools agree (which will effect a soft fork so long as time over time, they have 51%), it probably could be done in a month. 21:51:06 Well, there's now one orphan today. moneroocean and hashvault orphaned a p2pool block. Friendly fire 🫣 21:51:20 would rather trusted nodes with a 10 block max reorg 21:55:41 Boog, rhat can be deployed in like, hours, cant it 21:56:24 the max reorg yes, the trusted node/people part probably not 21:56:45 Trusted node/people = seed nodes or user specified ? 21:57:06 would you just hardcode IPs? maybe add new p2p messages and use hardcoded pupkeys with messages that can be sent around the network? 21:57:40 either ig, we would need hardcoded options though as we cant rely on people setting them 21:57:52 if we do p2p messages they would need to be hardcoded 21:58:31 then is the problem of who is trusted 22:01:35 DNS checkpoint only blocks 10 blocks deep? Local node saves all published checkpoints? If the DNS checkpoint equivocate, nodes just die? 22:01:52 How to avoid the trusted nodes from being the ones hit with the reorg attacks? 22:02:11 you dont you just have an odd number of trusted nodes 22:02:38 go with the majority 22:05:24 or have some other mechanism of choosing between the chains in a consistent manner, in a way which can't be gamed 22:05:44 Can you update DNS records at that frequency? 22:06:31 They are same like dns blocklists, im not sure the ttl 22:07:22 I think dns checkpoints (which are opt-in) arent meant to be updated frequently, but to be updated durong a chainsplit, to get people back on the "correct" chain 22:13:07 Hmm 22:15:43 welcome back