-
Inge
pauliouk: do remember that depending upon what country you are in, this will also reduce how much goes to your pension, vacation pay etc
-
hyc
hey, does merge mining some other coin work with p2pool?
-
moneromoooo
Last time I knew, no. p2pool needs to switch from a hash to a merkle tree root for some value I don't remember somewhere in the header, like Tari and TF do.
-
hyc
thanks, I vaguely recall it needed a change.
-
Inge
merge-mining townforge + tari + xmr w/p2pool WEN?
-
gonbatfire[m]
New GUI XMRIG+P2Pool miner, Gupax
-
gonbatfire[m]
-
gonbatfire[m]
* New GUI XMRig+P2Pool miner, Gupax
-
gonbatfire[m]
reddit.com/r/Monero/comments/zqonn1/gupax\_v100\_released\_gui\_for\_p2poolxmrig/?utm\_source=share&utm\_medium=web2x&context=3
-
gonbatfire[m]
How much does it help for decentralization to mine P2Pool using a remote node? Does the remote node still control the hashrate?
-
sech1
Monero node is ultimately controlling everything
-
sech1
But if node owner will try any funky stuff, p2pool will start to complain a lot and spam lots of warnings
-
sech1
also, I don't think any single node can handle enough connected home miners to get any significant % of the network
-
sech1
it must be 10k and more connections
-
hyc
yeah I don't think epee is efficient enough for so many connections
-
hyc
OpenLDAP has been tested to at least that many high volume connections...
-
sech1
even if some node gets 51% of the network through p2pool and tries an attack, all honest p2pool miners will see it in their logs immediately
-
sech1
so it can't be done stealthily
-
sech1
as soon as a miner gets serious than just run a coupls PCs with gupax, they'll start thinking about their own node
-
sech1
*more serious
-
sech1
hyc btw some p2pool miners connect 5000+ miners to p2pool directly and it works
-
hyc
using libuv right?
-
sech1
yes
-
gonbatfire[m]
<sech1> "even if some node gets 51% of..." <- Mmm not sure, if this actually catches on and hundred of thousands of non tech-savvies start mining, they may not care enough to change their node same way they didn't care about switching away from minexmr
-
gonbatfire[m]
or certainly won't react immediately (who checks their logs?)
-
sech1
But all the other tech-savvies will see it in their logs and alert everyone
-
gonbatfire[m]
sure, but how did that go for minexmr
-
gonbatfire[m]
it's an improvement nonetheless, but perhaps it should make users run their own node by default
-
sech1
minexmr didn't do 51% attacks
-
gonbatfire[m]
true but if it did would people have even cared enough to swtich?
-
gonbatfire[m]
I'm not sure, we are talking about many thousands of individuals, not large scale farms
-
gonbatfire[m]
individuals pay a lot less attention/care
-
sech1
oh, I totally forgot about one thing
-
sech1
all blocks found on p2pool are broadcasted to all p2pool nodes
-
gonbatfire[m]
* of individuals (with minuscule hashrate each), not
-
sech1
so you can't start mining an alternative chain in secret even if your node has 51%
-
sech1
because all your blocks will be broadcasted
-
sech1
it takes one honest p2pool node to prevent this attack
-
gonbatfire[m]
what? so p2pool can't act maliciously?
-
sech1
malicious node can still mine empty blocks
-
sech1
for example
-
sech1
and orphan all non-empty blocks
-
sech1
yes, p2pool architecture works like this: p2pool node finds a block -> sends it to other p2pool nodes -> they all submit it to _their_ monerod
-
gonbatfire[m]
yes but why I couldn't mine in alternative chain if it controls the hashrate?
-
sech1
because when you find a block, it gets submitted to other Monero nodes
-
sech1
so it becomes the main chain
-
gonbatfire[m]
oh!
-
gonbatfire[m]
so while they can create the blocks, they can't submit them themselves like a regular pool would?
-
sech1
no, block template creation and submission is done by p2pool nodes
-
sech1
Monero nodes only provide transactions to mine and some crucial data to build block templates
-
sech1
like current height, previous block, current block size etc.
-
gonbatfire[m]
ah got it, but why it takes a single honest monerod to prevent a chain split?
-
gonbatfire[m]
* single honest node (not sure monerod, * monerod or p2pool one) to prevent
-
gonbatfire[m]
* single honest node (not sure if monerod, * monerod or p2pool one) to prevent
-
gonbatfire[m]
>sends it to other p2pool nodes -> they all submit it to _their_ monerod
-
gonbatfire[m]
at what stage would a malicious block fail? how would an honest node detect it? and what majority would the attacker need to control in order to prevent an honest node from detecting it?
-
gonbatfire[m]
* > sends it to other p2pool nodes -> they all submit it to _their_ monerod
-
gonbatfire[m]
at what stage would a malicious block fail? how would an honest node detect it (and prevent its submissions) ? and what majority would the attacker need to control in order to prevent an honest node from detecting it?
-
sech1
it's not a malicious block, it's an alternative chain
-
sech1
if it gets submitted, and it has more PoW, it just becomes the main chain
-
sech1
"malicious" part is when an attacker doesn't submit it until the attack is over