-
UkoeHB
ArticMine: I will try to review it by the end of next week
-
ArticMine
Thanks
-
mj-xmr[m]
.merges
-
xmr-pr
7805 7822
-
mj-xmr[m]
selsta: I will have time to go through the PRs for review today from 4 hours from now, onward. I will have some questions though.
-
selsta
mj-xmr[m]: sure, just ask
-
jtgrassie[m]
Just a reminder, we need #7341 in the release branch.
-
mj-xmr[m]
selsta: 7805 : 2(3) comments from me.
-
selsta
-
selsta
it's included here
-
selsta
mj-xmr[m]: will reply later
-
mj-xmr[m]
k
-
corklander[m]
Does anyone know if there's another stagenet faucet, other than
community.xmr.to/faucet/stagenet/?
-
corklander[m]
I'd like to test out the swaps, but don't have stagenet coins. :(
-
plowsof[m]
-
corklander[m]
Awesome Opossum!
-
cooldiggs[m]
Hey guys, I have a question regarding the implementation of key_image in src/crypto/crypto.h
-
cooldiggs[m]
I want to assign my own value to the key_image object like say a key image I generated myself or one from a raw transaction but Im having trouble understanding how I would go about doing that with how it is implemented
-
cooldiggs[m]
POD_CLASS key_image: ec_point {
-
cooldiggs[m]
friend class crypto_ops;
-
cooldiggs[m]
};
-
cooldiggs[m]
This is how its implemented in crypto.h and it borrows from ec_point which is... (full message at
libera.ems.host/_matrix/media/r0/do…bb2c104375581ba72fef73ffa52c316e724)
-
moneromooo
It can't be any value, it has to be deterministic or it won't verify.
-
cooldiggs[m]
Ah gotcha, so you basically have to use the generate_key_image function with the pub key + priv key in order for it to have a deterministic value?
-
moneromooo
Yes, or equivalent.
-
cooldiggs[m]
Hmmm ok, that clears some things up
-
cooldiggs[m]
I guess ill try to understand how generate_key_image functions but theres a lot of things up in the air about it, at least to me haha
-
cooldiggs[m]
I somewhat understand hash_to_ec, but ge_scalarmult kinda makes my head spin
-
cooldiggs[m]
Stackexchange has been of help regarding hash_to_ec but theres not a whole lot of documentation on ge_scalarmult, and im not formally educated in cryptography so its hard to understand the functions implementation, for me at least
-
cooldiggs[m]
To my understanding a key image is calculated by I = x*H(P) (x being single use private key, P which is basically x * the base point G) and H being the scary hash_to_ec function
-
cooldiggs[m]
Im guessing that ge_scalarmult multiples the private key by the base point?
-
cooldiggs[m]
Or perhaps multiples the whole thing by the base point as a sanity check? Again sorry for my ignorance on this matter, I find the implementation there confusing
-
moneromooo
The name suggests it does so. ge == group element (uesd as pubkeys), scalars are used as secret keys.
-
cooldiggs[m]
Oh im a dummy, ge == group element, I should have realized that haha
-
moneromooo
ge_* functions are from djb code (supercop IIRC), there might be documentation about that somewhere on the internet.
-
cooldiggs[m]
I heard some things about supercop littered in some of the comments there, I think that edward crypto guy made it so Ill do some digging there
-
x3nu[m]
hello, I have a question: suppose a kyc exchange wants to target an individual. So they set it up where the person receiving the monero is going to get repeated transactions that they are monitoring. Would the exchange know which of the 11 decoys is the real output that the send to the targets wallet? The way i understand it, the only way this output could be known for sure is if it was a coinbase transaction. Is this correct?
-
moneromooo
An exchange trivially knows which output they send. They themselves choose the fake outputs to use in the rings.
-
x3nu[m]
how would they go about choosingthe fake outputs?
-
x3nu[m]
I wasn't aware that could be done
-
moneromooo
Typically by running monero-wallet-rpc, which does it for them.
-
moneromooo
And that picks random inputs based on some predefined probability distribution.
-
x3nu[m]
ah so they can manipulate that to easily compose fake outputs
-
moneromooo
However, your question was vague so I might have misinterpreted. Feel free to ask more precisely.
-
x3nu[m]
nope that was it. I had assumed that inputs are always randomized, but I hadn't considered that somebody could actually pull inputs that they know aren't the real one