09:31:49 Working on Monero hardware wallet integration. Should bulletproofs be generated on the secure device or can the host generate them? If host generates bulletproofs using commitments and blinding factors from the device, does providing the masks compromise privacy? 09:31:50 What's the recommended approach from all the pros in community? 14:14:44 Do you care if the host devices knows the output amounts of that transaction ? 15:02:22 Personally I won't care if host knows the output (also I am new to monero), but my question is more about what's considered acceptable for hardware wallet implementations in general, just want to make sure I'm following community best practices. 15:02:44 Personally I won't care if host knows the output (also I am new to monero so might be wrong here), but my question is more about what's considered acceptable for hardware wallet implementations in general, just want to make sure I'm following community best practices. 15:38:05 Then you can do them on the host device. In most use cases, basically the only difference between doing the BPs on-device versus not is that the host can *verifiably* prove to a third-party that some amount commitmernt is committed to a certain amount 19:12:44 Thanks sire 19:56:11 Hi. I'm building a Monero block explorer. Are there any special security best practices recommended for doing this properly? Thanks. 19:57:05 It will be a public web explorer. 19:57:09 WTF 19:57:14 sgp_: 19:57:42 there is a new "wanna build an explorer" virus propagating 19:58:00 what? 19:58:09 You are the second person today building a new monero block explorer 19:58:29 and there was a new one like 3 weeks ago 19:58:45 Lol is this a good time to mention I want to build a TUI block explorer. Why not 19:58:57 epic 19:59:10 Well man, monero marketcap grew 190% this yeat, what you were expecting? There will be blogs, explorers, etc.. 19:59:22 For those out of the loop: https://github.com/MAGICGrants/rust-monero-explorer 20:00:04 It's MIT so feel free to have at it 20:01:17 m​NeverHere ofc we support your endeavor, there aren't any security practices regarding the explorer tbh. Just make sure to keep your monero node private to avoid DoS 20:08:38 someone needs to build one for fcmp 20:09:15 testnets are no fun w/o explorers 20:09:28 Sometime soon I hope to modify the onion-blockchain-explorer 20:10:21 For the user, you really just get of rings ig right? 20:10:23 Sometime soon i'll make a fancy blockchain explorer with gambling in it and web assembly mandatory 20:10:46 *get rid of 20:12:08 Regarding Carrot, would it be a good idea to show the view tag (3 bytes) and encrypted janus anchor (16 bytes) ? I can't really imagine what possible use that would have for a blockchain viewer... 20:12:21 But the current view tag is shown per output, so.... 20:12:50 I also don't really know why. Maybe just to differentiate it from non-view-tag outputs? 20:18:07 I guess that by that logic it's not even worth showing stealth addresses anymore since rings don't reference them. Maybe it would be if you could map stealth addresses to key images in your wallet software ? I think the blockchain explorer is going to be really, really boring after FCMP++ lol 20:18:54 More info the better imo, behind flags perhaps 20:19:01 That's good news i might say 22:02:52 spirobel: you mean due to block sizes varying, or more ? 22:03:21 (ie, is it still non deterministic with the same input ?) 22:03:29 (assuming non malicious node) 22:04:45 The reason for this was to "balance" the load, to avoid monster responses as the chain got busy. No other reason. 22:32:40 because of the max response size in combination with varying block size will lead to variable amount of blocks 22:33:24 the structure of the wallet libraries ask for blocks as the unit to scan on 22:34:34 (unknowable amount of blocks is more precise than saying non deterministic) 22:38:53 replacing the max response size in mb with in amount of blocks makes is more tenable 22:39:27 replacing the max response size in mb with in amount of blocks makes it more tenable