03:04:34 yay viewtags visible now: https://testnet.xmrchain.net/tx/7d75c250f7d631be2ea9fcba8702a5b981ffeb85c3ae647d876d8b4e8ec0f6a2 03:39:21 gingeropolous: cool :) jberman and I leaving our mark on the ledger 04:10:18 That's awesome ! 04:10:42 Do we know who runs xmrchain.net ? 04:16:09 The web/admins name of xmrchain beings with g and rhymes with gingeropolous , he will know xd 04:19:52 haha gingeropolous thanks 04:19:57 I use that site all the time 06:36:52 Is there anything keeping UkoeHB's new Seraphis proposal from moving to funding required? https://repo.getmonero.org/monero-project/ccs-proposals/-/merge_requests/314 11:21:31 djh 12:02:59 "@ooo123ooo1234 I guess we have..." <- "https://en.cppreference.com/w/cpp/io/c/setvbuf#Example", So "Uses the system-defined buffer size instead of a hardcoded 4096 value" is literally gratuitous change 12:03:20 "Possible output: BUFSIZ is 8192, but optimal block size is 65536" 12:05:05 "I probably won't be able to..." <- All changes except those 9 lines are noise since it just adds overhead between openssl api and thing wrapper in c++ 12:05:22 And this overhead makes verification harder without any benefits 12:07:09 The final goal determines what is important and what is not, and if you are not approaching it then you're just adding useless overhead 12:07:28 which in the best case will be fixed others, and in the worst case will lead to vulnerability 12:08:46 Full code is complex graph which you don't want to study. And your changes is like doing bit flipping of few edges/vertices without taking into consideration relevant scope. 12:08:57 Context free canges 12:08:58 hahaha 12:10:05 So instead of changing 1 edge to swap SHA256 for EVP_, you've decided to add new entity 12:10:15 and say that it helps 12:10:16 interesting theory 12:39:26 "need a new fundamental concept..." <- Fundamental concept is to approach common goal without compromises and with critical thinking. 12:40:39 I thought that correct cryptography is the most uncontroversial goal. If it would be true then at least code that isn't proven to be correct couldn't be merged. 12:40:42 But it isn't true 12:42:57 In all my previous attempts to deduce goal from the context and attack it fails. I suppose it's time to set goal explicitly 12:43:11 s/In//, s/fails/failed/ 13:07:27 Can’t create view wallet on testnet: https://github.com/monero-project/monero/issues/8339 13:10:39 You say "on testnet" but the command line specifically omits --testnet. Is there a reason ? 13:11:02 Shoot you’re right 13:11:07 My bad 13:30:40 rhetorical question: how many bits of security does monero protocol have ? 13:30:41 any guesses ? 13:40:36 That question doesn't make much sense. Also, read Zero to Monero 13:43:00 It was just a forgotten flag on the command line. 13:46:23 "That question doesn't make..." <- Definition from here https://en.wikipedia.org/wiki/Security_level. Have you already read Z2M ? 13:46:47 To be precise, monero transaction protocol (the thing on top of pow) 13:48:42 I know what security level means. I'm telling you that you can't blindly apply that definition to "the transaction protocol" as a whole, because it is composed of multiple parts - not all of which rely on bits of security. Therefore, go read ZtM2 and look up the security levels of the cryptographic primitives involved 13:49:14 merope: Which part doesn't rely on bits of security ? 13:49:31 Try to call at least 1 13:49:45 merope: No, you don't know. 13:51:11 The number of ring members in a ring signature, for example 13:51:59 Additionally, different parts of the protocol rely on different primitives, so they will have different security levels against different types of attacks 13:52:40 Something you would know, if you bothered doing your own reading instead of demanding to be spoonfed 13:52:55 Do your homework 13:53:01 merope: Number of ring signatures is a parameter of cryptography. It isn't a component. Ring signature is a component. 13:53:03 s/signatures/members/ 13:53:28 merope: Call at least 2 different primitives 13:53:58 This isn't highschool, and you are not a teacher 13:54:38 merope: critical thinking can be used outside of highschool too 13:55:19 merope: What would the goal of that homework ? How to verify that it was reached ? Have you done it already ? 13:55:20 * What would be the goal 13:55:31 Oh look - a shiny ignore button! 13:55:59 merope: as expected 13:56:32 merope: can't answer question -> can't call a troll -> use ignore button 14:07:19 "That question doesn't make..." <- I would read something like this https://www.reddit.com/r/AskEngineers/comments/5hja9q/a_lazy_incompetent_is_ruining_my_topperforming/. More revelant in current context. 14:07:24 s/a_lazy_incompetent_is_ruining_my_topperforming/a\_lazy\_incompetent\_is\_ruining\_my\_topperforming/, s/revelant/relevant/ 14:25:40 ooo123ooo1234[m]: it’s supposed to be ~128 bit. Did you find something that makes it less? 14:26:16 UkoeHB: can't comment 14:26:18 So you guess is 128, ok 14:26:34 s/you/your/ 14:26:59 Why can’t you comment? 14:28:41 What's the precision interval for ~128 ? +-1 ? 14:32:23 Hmm my ballpark would be within 10bits or less 14:32:47 "Is there anything keeping UkoeHB..." <- I would not do so detailed c++ reference implementation without checking security of cryptography. 14:35:13 ooo123ooo1234[m]: most of the code is not dependent on unproven cryptography (can be fixed if/when a problem is found with probably <10hr work) 14:35:59 UkoeHB: hmm, I think it's possible to find at least 1 example that is very dependent 14:36:04 are you really sure ? 14:36:30 it's literally minimum wrapper on top cryptography 14:36:56 Are you saying ed25519 is unproven? Lol 14:37:34 UkoeHB: ed25519 -> transaction protocol of seraphis -> seraphis lib 14:37:45 I'm about "transaction protocol of seraphis" part 14:38:22 Nah, thanks to good code quality it’s very easy to replace any proof or even the entire squashed enote model. 14:38:34 But that’s a bit too big brain I guess 14:40:27 Let me know if you find an unproven piece that is really so critical though. I won’t hold my breath 14:51:46 "Let me know if you find an..." <- In case of cryptography there is presumption of unproven by default, so it must be proven firstly. 14:52:18 "Nah, thanks to good code quality..." <- It would be true if proofs can be combined in arbitrary but still secure way 15:02:28 "Nah, thanks to good code quality..." <- In general it isn't true. But if your assumptions hold then you're right. 15:07:22 ooo123ooo1234[m]: man I am so tired of you typing words but saying nothing; let me know when you have something to contribute and are done with this bs negotiation charade 15:14:14 "ooo123ooo1234: man I am so tired..." <- "bs negotiation charade" every meeting without critical questions looks like this for me 15:19:07 and from spectator point of view it looks like everyone is enjoying participating or pretending that enjoying 16:16:41 ooo123ooo1234 Have you ever contributed code to Monero? 16:18:33 jeffro256[m]: And then gratuitous patches will be used as justification to get badge of monero contributor 16:18:39 typical octorberfest particpant 16:30:14 Maybe that SHA256 patch is "gratuituous", but you're avoiding the question. For someone who hasn't contributed at all, you seem to be ready to argue with anyone about anything on here, not just myself. Why don't you channel some of that energy into something more productive? 16:31:48 "ooo123ooo1234 Have you ever..." <- "who hasn't contributed at all" or contributed, how did you check ? 16:33:06 jeffro256[m]: I've mentioned problem in current game design that can't be fixed with patch to github 16:33:09 or few problems 16:33:25 jeffro256[m]: I don't talk in DM, don't even try 16:33:56 ooo123ooo1234[m]: ‘critical questions’ pretty rich coming from someone who thinks he is too important to answer questions. Nice double standard 16:35:08 I just discovery an "ignore" button on ooo123ooo1234 profile :D 16:39:39 "ooo123ooo1234: ‘critical..." <- Important critical questions. Since there is no common goal or at least it isn't announced explicitly then it's possible to treat any question as not important to answer. 16:41:47 This kind of thing isn't possible in proper competition 16:42:25 Or unimportant critical questions should be penalized 16:48:53 s/discovery/discovered/ 16:50:26 "Maybe that SHA256 patch is "..." <- probably with anyone but not about anything 16:50:47 * probably with, * about anything only anything related to monero development 16:50:49 The amount of effort that went into arguing here is 10x more than needed to review the SHA256 patch from top to bottom. Someone just likes to steal devs time. 16:51:40 sech1: It was balanced with 9 lines patch. And the whole talk was about bigger problem related to many such PRs, not just that one. So you're not right 16:51:54 I am right and you're not right 16:52:12 sech1: explain then 16:52:52 The patch does the needed change and also improves code structure. I don't see any problem with this. Your approach will eventually lead to "hack on top of hack on top of hack on top hack" code 16:52:57 that will need full rewrite 16:53:28 sech1: No. Do you want an example of patch that you would ignore in xmrig or p2pool ? 16:53:42 just because of you don't some changes that are needed since you know code better 16:53:48 * you don't want some changes 16:54:03 the principle of "just fix one thing and don't touch anything else" is sound software engineering. time-tested. used by all large software projects. 16:54:35 "I'm changing this because it's easier for me to read" isn't really a good argument against it. 16:55:27 ooo123ooo1234[m]: It's a matter of basic decency. Oh look, my 'putting up with indecent behavior' meter ran out. Guess you'll need a new account if you want me to read your messages. 16:56:01 I personally wouldn't do this patch the way it was done, I would reduce the changes to the minimum. But I'm totally ok if someone else did tidy up the code in the process. 16:56:21 The patch is not huge and can be reviewed in one go 16:56:45 Bigger refactorings without purpose are no go, but this is below the "no" threshold 16:57:33 sech1: ok, I'm glad you at least take this into consideration and have a threshold in mind 16:57:42 it doesn't sound to me like many others do 16:57:58 sech1: As long as those who are doing bigger changes have capacity. But there are already few examples where you ignore something in xmrig / p2pool 16:59:02 I still personally believe shuffling files and requiring a new header file to be included by multiple source files is out of scope for what the issue was meant to fix. 17:01:10 I mean seriously. it's like saying "hey, this square root function needs to be fixed" and requiring a dozen other files to be updated due to the fix. 17:01:21 I don't merge patches in xmrig. As for p2pool, there are very few examples, you can count them by fingers on one hand. It's either totally broken patches (doesn't compile) or it does something unnecessary. Either way, I comment there and write what's wrong with the patch. 17:09:43 "I don't merge patches in xmrig..." <- There are some ignored issues in p2pool, but 0 ignored PRs. And p2pool is mostly solo project at the moment. But for xmrig which isn't your solo project you ignore almost all PRs since they don't help to achieve the goal (performance optimization). It depends on the goal of project / capacity of developers. 17:10:37 sech1 isn't lead dev on xmrig 17:10:55 you seem to be dragging up a bunch of stuff beyond the scope of this conversation now 17:11:00 p2pool issues are not ignored, they're in my backlog :P 17:11:29 hyc: I've tried to bring some context familiar for sech1. If it isn't true then I can stop. 17:14:08 > <@hyc:libera.chat> you seem to be dragging up a bunch of stuff beyond the scope of this conversation now 17:14:08 * I've tried to bring some context familiar for sech1. If it isn't a cache miss then I can stop. 17:14:38 * I've tried to bring some context familiar for sech1. If it is a cache miss then I can stop. 17:15:05 Do you know that all your edits just spam the IRC side? 17:15:19 the main point remains the same: if it ain't broke don't fix it. only touch what is absolutely needed to fix an issue, and nothing more. 17:15:24 https://p2pool.io/u/b75c6e38f4846678/spam.png 17:15:46 doing anything else - reformatting, restructuring, only adds the risk of introducing new bugs. 17:16:32 for this SHA256 issue the patch is simple enough that we can see it doesn't introduce new bugs. but at the same time, the issue is simple enough that the patch ought to be much much smaller. 17:16:48 the only time any refactoring is justified is when needed to add new features 17:16:57 I want to guage the general sentiment of the SHA256 PR because this is taking up too much bandwidth: https://github.com/monero-project/monero/pull/8322#issuecomment-1129118658. If it's generally negative, I'll close it 17:16:58 hyc: +1. If this project would be about some simple like piping data from left to right with simple processing then it would be ok to allow arbitrary changes. 17:17:07 hyc: +1 17:17:56 jeffro256[m]: you understand that the patch is only an example at this point, highlighting the overal issue, development best practices. 17:17:57 jeffro256[m]: sentiment 17:18:04 it isn't about emotions, but about really problems that will come with it 17:18:40 * it isn't about emotions, but about real problems that comes with that kind of changes 17:19:23 sech1: Yes, but IRC isn't compatible with tor. 17:19:53 It is. Currently connected via Tor right now. 17:19:54 I think up until recently it was tacitly understood by developers. Now I believe it needs to be explicitly stated. 17:20:23 hyc: +1, 4 years ago I thought the same 17:20:39 > <@hyc:libera.chat> I think up until recently it was tacitly understood by developers. Now I believe it needs to be explicitly stated. 17:20:39 * +1, 4 years ago it was more obvious 17:21:53 since moneromooo was maintaining it vocally 17:22:14 4 years ago I hated it but it looks like it's really necessary 17:22:59 Epsilon: How did you register your account ? 17:27:07 ooo123ooo1234[m]: I just followed the guide on Libera's website https://libera.chat/guides/connect worked for me back when Libera launched. 17:27:43 Epsilon: registration is prohibited for proxy/tor/anonymous connections 17:27:59 if you used your real ip then your tor connection is useless since you've already leaked your location 17:29:51 ooo123ooo1234[m]: I don't remember exactly what I did but iirc I just constantly tried reconnecting with different exit nodes or I used a VPN Its been a while 17:30:32 Epsilon: VPN means you leaked your destination too 17:30:47 anyway matrix account setup is easier to do and there is no problems for tor users 17:30:55 s/problems/problem/ 17:32:33 selsta: thanks for your commentary on #8322 that sums it up pretty well. 17:33:21 "ooo123ooo1234: It's a matter..." <- It looks like decency about being conformist within social environment. It isn't compatible with solving hard technical problems. 17:33:53 sometimes pretty evil things are treated as moral 19:21:01 ooo123ooo1234[m]: I am a sucker and checked the logs. I guarantee you'll never accomplish anything when no one wants to work with you. Is this the CLSAG issue you've been alluding to? I swear to god reading tea leaves is a mind-boggling waste of time and energy. https://usercontent.irccloud-cdn.com/file/tijsixQU/0001-clsag-patch-demo.patch 19:21:46 This will never get merged without a concrete proof or argument. 19:27:50 I don't understand what this patch does 19:28:53 sech1: there is some material missing from hashes in the clsag implementation (an oversight) 19:29:30 I see that it adds something to the hash inputs. But the reasoning? 19:29:56 although 'oversight' may be an overstatement; more like 'it could be a little bit more robust' 19:30:14 the reasoning is mostly paranoia, unless mr annoying as hell has a concrete proof 19:32:21 mr annoying as hell has implied there is an issue with clsag, and this is all I could find; if that's the issue, it's up to him to prove it's worth a hf to fix 19:50:07 is the bridge down? 19:51:04 irc side? 19:51:44 no 19:51:56 or not sure, I'm only on irc 19:52:10 irc msgs not showing up on matrix 19:57:53 "is the bridge down?" <- My first assumption was that someone banned me from monero-dev. 19:58:08 hahahaha 19:59:21 "is the bridge down?" <- #monero-dev:libera.chat doesn't work at the moment 20:00:54 "ooo123ooo1234: I am a sucker and..." <- It could be used as a submission for competition. 20:01:14 "ooo123ooo1234: I am a sucker and..." <- Do you really believe that I'll waste someone time with something trivial ? 20:03:46 and unimportant 20:07:15 "I guarantee you'll never accomplish anything when no one wants to work with you." I don't know any way to motivate people to not stick with path of least resistance 20:08:41 "I swear to god reading tea leaves is a mind-boggling waste of time and energy." If there would be at least one rule that I could use as justification that my work is hard and worth something 20:08:53 then i would talk somehow differently 20:26:43 "ooo123ooo1234: I am a sucker and..." <- You said it monero-research-lab that some pushback helped to do something. Is this patch a result of pushback from my side too ? Was it written solely by you ? 20:27:20 s/it/in/ 21:26:46 looks like 8149 needs review again? got a lot going (haven't bailed, promise), working on carving out some time shortly on that 21:29:51 vtnerd_: yeah that would be awesome 21:30:42 hyc: that should be the final version of the patch now, if you can take one last look https://github.com/monero-project/monero/pull/8340 23:27:15 selsta: just 1 trivial change. otherwise looks ok 23:35:30 hyc: done 23:37:42 looks good