-
m-relay
<solar:monero.social> Network layer metadata?
-
m-relay
<0x1zxq7896lp2zero:monero.social> monero only have dandelion++ and that too for full node
-
m-relay
<0x1zxq7896lp2zero:monero.social> sure tor i2p overlay network can help
-
m-relay
<0x1zxq7896lp2zero:monero.social> but monero need more network layer privacy
-
m-relay
<0x1zxq7896lp2zero:monero.social> monero only have dandelion++ and that works for full node privacy
-
m-relay
<jeffro256:monero.social> end-to-end node encryption plus dandelion++ plus dummy stem payloads would basically hide almost all network level activity, even from ISPs theoretically
-
m-relay
<0x1zxq7896lp2zero:monero.social> better then some other coin that's true 👍️
-
m-relay
<jeffro256:monero.social> Go review
monero-project/monero #8996 if you want to see node E2E encryption happen
-
m-relay
<0x1zxq7896lp2zero:monero.social> yep it's a good direction anyway
-
m-relay
<syntheticbird:monero.social> maybe from ISP but traffic pattern analysis is still something very effective in monerod case
-
m-relay
<syntheticbird:monero.social> there are no packet timing obfuscation
-
m-relay
<syntheticbird:monero.social> there are no packet timing paddings at the moment
-
m-relay
<jeffro256:monero.social> Yes not currently: I should have clarified that better
-
m-relay
<rbrunner7:monero.social> Seeking feedback for the following PR from people that may not following closely what we are up to over in the "No Wallet Left Behind" channel / Seraphis wallet workgroup:
-
m-relay
<rbrunner7:monero.social>
monero-project/monero #9368
-
m-relay
<rbrunner7:monero.social> Valuable would be comments directly at the PR about the PR proper (Does it make sense to move code around that way?) and the general direction of basing the API of the new "post wallet2" wallet on the Wallet API
-
m-relay
<rbrunner7:monero.social> As we see it, a statement from tobtoht would be quite interesting
-
m-relay
<rbrunner7:monero.social> Thanks!
-
m-relay
-
m-relay
<hardhatter:monero.social> Is this still a valid method^ for proof of burn?
-
binaryFate
moneromooo: can you sanity check this?
google/oss-fuzz #12009
-
m-relay
<vtnerd:monero.social> There is randomized padding but no dummy packets (yet) in that SSL patch
-
m-relay
<hardenedsteel:monero.social> I don't see reason to not
-
m-relay
<vtnerd:monero.social> Block notifications are not padded for efficiency reasons - one message is serialized then ref counted to each connection queue
-
m-relay
<hardhatter:monero.social> And it will still work after fcmp?
-
m-relay
<hardenedsteel:monero.social> it should work until the address system gets change for example Seraphis
-
m-relay
<hardhatter:monero.social> Do you think it would be trivial to come up with a similar method for proof of burn after Seraphis?
-
m-relay
<jeffro256:monero.social> Yes, the same principle would apply: create an address deterministically bound to a message such that the discrete log from spendkey to any fixed generator used in consensus is unknown. Then create a spend proof to that address
-
m-relay
<hardenedsteel:monero.social> no i dont think so, Seraphis would have optional privacy
-
m-relay
<jeffro256:monero.social> Wdym by "optional privacy"? All officially supported addressing schemes have been "optionally private"
-
m-relay
<hardenedsteel:monero.social> i mean you can share your private view or transaction key with anyone if you want
-
m-relay
<jeffro256:monero.social> How does that affect burn proofs?
-
m-relay
<hardenedsteel:monero.social> Burn proof is just sharing an OutProof or Tx Secret
-
m-relay
<jeffro256:monero.social> Same principle applies in Jamtis
-
m-relay
<hardhatter:monero.social> Thanks guys I appreciate it
-
moneromooo
binaryFate: I had no idea we were using a specific version in the first place. Looking at what commit did this, it's the same account reverting it, and the original patch touched many projects. So it seems very non malicious to me.
-
m-relay
<jeffro256:monero.social> Specific version of what?