06:09:22 Revuo Monero Issue 246: August 17 - 26, 2025. https://www.revuo-xmr.com/weekly/issue-246/ 12:50:46 https://matrix.monero.social/_matrix/media/v1/download/monero.social/ZrFCHYzhVouaixpRosrZXXwT 12:50:59 https://matrix.monero.social/_matrix/media/v1/download/monero.social/ZWqGYiwdapggJkalkIhJkDVk 12:51:59 CfB tweet: https://x.com/c___f___b/status/1960127265012142271 12:52:24 I know this is old by ~13 hours, but I'm just catching up on news. Is it correct that Qubic are acting "ethically" with their re-orgs to avoid causing problems with exchanges? 12:53:45 there is no ethics behind it 12:57:40 Low latency things are affected most. Think exchanges and stuff like that. But the regular peer-to-peer economy isn't necessarily all that affected by this. Because it takes you longer to get products shipped in the mail, then it does to get confirmations. 13:00:16 Gate the type of exchange to send contract killers after you if you fuck with them 13:01:01 right now there is no big company with nearly infinite money on his ass, just some monero people 13:01:23 if he fucks over an exchange they could sue him into the ground 14:46:48 not so much for in person transactions tho 14:53:39 I remember for a couple days before applying correct settings, someone was running the miner on the XMRChat server. Qubic is open source. Just throwing out an idea that it might be worthwhile to look for vulnerabilities. Would be hilarious if we could take over some Qubic miners. https://github.com/qubic 15:00:50 I remember that :P 15:01:54 I dont think qubic's node is publicly accessible. Their miners dont have to run nodes either 15:03:58 their miners are closed source in C# and just connect to a websocket run by pools 15:04:09 which for xmr case, point to stratum 15:19:46 The only have 1 node? 15:23:18 qubic node != computor != pool 15:23:27 a qubic node can exist without being a computor 15:23:35 and multiple "computors" can exist in one node 15:29:39 their miner program effectively listens on a websocket for instructions, including downloading random binaries by provided URL and instantly executing them on the local computers 15:29:58 from what was observed these were xmr or their qubic actual miners 16:26:13 Downloading random binaries and execute them on its own ... say again, which class of programs this reminds me of :) 16:31:25 Windows update /s 16:32:58 Binaries for v0.18.4.2 are now available at https://www.getmonero.org 16:45:02 vtnerd full-time 2025 q3 is now fully funded! https://ccs.getmonero.org/proposals/vtnerd-2025-q3.html @luigi1111 17:02:16 finally 17:02:18 congrats 17:04:17 thx n1oc 17:06:48 thx n1oc 17:40:29 Vulnerability disclosure report: https://github.com/monero-project/monero/issues/10059 17:46:52 Thanks, jeffro256 . Was this found by a HackerOne report, or in FCMP wallet re-factoring? If you run your own node locally, the privacy impact is zero, right? 17:48:02 unless someone is inspecting your network, I guess 17:48:19 how does this interact with pruned trusted nodes? do these make upstream calls? 17:49:31 7 year old bug? That's a bit disheartening how long this survived. 17:51:06 DataHoarder: IIRC, wallets always request pruned versions of txs. Pruned nodes never need to ask unpruned nodes for data to serve wallet requests. 17:51:26 This was pointed out by jberman to me in a DM. It baffled me, so I dug a bit deeper to find out how it actually works (or doesn't lol) and what triggers it. Then I made a PR to get rid of it. I would ask jberman , but I bet he saw it doing wallet work for FCMP++. If you run your own node locally, there could be a privacy impact really only if someone had a packet inspection softwa 17:51:27 re running on your machine without your consent. If using a trusted remote node, with SSL, then someone can inspect packets over the network. If using a trusted remote node with SSL, but without key authentication, someone could MitM your SSL connection and listen to the packets that way. 17:52:08 DataHoarder: yeah it's the exact same with pruned nodes, trusted or untrusted 17:52:13 👍 17:54:44 I need to double check, but if you're running a bootstrap wallet in GUI, I think someone rando with public RPC available gets your outgoing tx history 17:55:01 B/c your bootstrap node will pass the RPC request on to a random node 17:55:34 I wonder if the LionLink spy nodes got spoonfed tx histories this way 17:56:16 ofrnberman 17:56:34 It was in logs that ofrnxmr shared when debugging another bug in FCMP++ fwiw 17:57:27 Nice 17:57:44 is this bug always triggered on a wallets second load after being restored? 17:59:15 If you look at the second paragraph of the technical explanation section, it has some more details. You have to have restored the wallet keys file as well, not just the wallet cache. But if you restored the wallet keys file, then yes, it will trigger every time 18:00:49 From moneronet.info , it seems that the spy nodes in the LionLink AS don't have RPC enabled, but Digital Ocean and Hetzner ones do. 18:01:49 By the way, I enabled downloading the node table there as a CSV file. 18:02:57 yeah I didn't understand if the wallet had to be saved in a weird state for it to be hit or not 18:13:36 sgp_: just continuing the convo here for cleanliness. As for whether or not it has been exploited, since it it a data leak, it is more or less impossible to know whether it has been exploited unless the exploiters tell us it has. However, any basic packet inspection software would pick up this data leak if it was recording. So, if you're using an untrusted remote node for RPC, the 18:13:37 n the answer is: probably. 18:15:36 Due the the Ciphertrace leaked video, we know that their spy nodes are at least monitoring the RPC endpoints for transaction submission (`/sendrawtransaction`), I don't know why they wouldn't also be monitoring the `/gettransactions` endpoint 18:54:46 Remote nodes turn out to be a privacy nightmare #503 18:57:06 cc moneromooo , who asks that we add "this is probably a spy node" when adding a remote node via the cli 19:29:21 Rucknium: moneroconsensus.info causes some kind of memory leak/cpu high usage on client side if you zoom out/init makes the browser try to refresh the image for every zoom %. Had to restart my computer :d 19:29:48 Rucknium: moneroconsensus.info causes some kind of memory leak/cpu high usage on client side if you zoom out/in. It makes the browser try to refresh the image for every zoom %. Had to restart my computer :d 19:38:17 #alwayshasbeen 19:46:12 that was fast ! 19:47:53 Louis-Marie: Sorry. Maybe I need to set `execOnResize = FALSE` https://github.com/rstudio/shiny/issues/2373 22:38:35 it would be funny for if the server gets compromised 22:38:43 it would be funny if the server gets compromised 22:40:15 send out some malware that bricks the $10k servers, oopsie 22:46:18 that would kill rented rigs business