-
br-m<rucknium> MRL meeting in this room in two hours.
-
br-m<rucknium> Meeting time! monero-project/meta #1333
-
br-m<rucknium> 1. Greetings
-
br-m<jeffro256> Howdy
-
br-m<articmine> Hi
-
rbrunnerHello
-
br-m<gingeropolous> howdy do
-
br-m<emsczkp:matrix.org> hi
-
DataHoarderhullo
-
midipoethi
-
br-m<cyrix126:gupax.io> Hello
-
br-m<jberman> waves
-
br-m<rucknium> 2. Updates. What is everyone working on?
-
DataHoarderRandomX V2 testing, specially around new prefetch parameter tweak now part of the main design github.com/SChernykh/RandomX/blob/v2/doc/design_v2.md (and is considered finalized for the PR)
-
br-m<gingeropolous> trying to put the final touches on the monerosim package.
-
br-m<rucknium> me: Selfish mining countermeasures analysis.
-
br-m<rucknium> @gingeropolous:monero.social: How did your 1000-node test go?
-
br-m<jeffro256> Me: finished reviewing @j-berman's unbiased hash-to-point changes, fixiing beta scaling tests, working on my Monerotopia presentation
-
br-m<gingeropolous> its working well. I want to demonstrate something useful, so im getting a simulation that does a network upgrade (going from one version of monerod to another.... in this case, one that that has tx relay v2 pulled in). Currently the user agent code isn't handling the wallet correctly during the daemon restart. But otherwise it runs
-
br-m<jberman> me: preparing the FCMP++ integration code for auditing, finalizing tx relay v2
-
br-m<rucknium> @gingeropolous:monero.social: Fantastic. Thanks.
-
br-m<rucknium> 3. FCMP and CARROT reviews and audits status (cryptpad.fr/sheet/#/2/sheet/view/yP…9VF6GYm9bXbPdCerdST3UDEEfBxcM/embed).
-
br-m<rucknium> Was the Cypher Stack Generalized Bulletproofs review & suggestions posted? I didn't see it.
-
br-m<jeffro256> No updates from me
-
br-m<rucknium> @diego:cypherstack.com: Has the Generalized Bulletproofs new review been posted?
-
br-m<jberman> @sgp_:monero.social reached out to zkSec (specifically a curve trees author) to review divisors, don't believe there's been an update
-
br-m<jberman> re: integration audit, I'm aiming to have the code ready by EOW, and will start planning an audit approach then
-
br-m<rucknium> @brandon:cypherstack.com: Any update on posting the Generalized Bulletproofs review draft? > <@brandon:cypherstack.com> yeah, i plan on posting it soon(tm)
-
br-m<rucknium> "I'm still cleaning it up" is a valid response :)
-
br-m<rucknium> I'll go to the next agenda item. Maybe Cypher Stack staff will come in later.
-
br-m<rucknium> 5. FCMP alpha stressnet (monero.town/post/6763165).
-
br-m<diego:cypherstack.com> yes > <@rucknium> @diego:cypherstack.com: Has the Generalized Bulletproofs new review been posted?
-
br-m<jberman> I'm still thinking it would be nice to have tx relay v2 tested on alpha. I'm going to prepare all the changes that would be solid for a v1.6 release (nothing significant at this stage), and also port those changes to the staging branch in prep for beta
-
br-m<diego:cypherstack.com> it's on iacr
-
br-m<jberman> If we have capacity to get a v1.6 release out, then that would be solid, but if not, then we'll just have it ready for beta
-
br-m<vtnerd> sorry Im late, here now
-
br-m<jeffro256> So tx relay v2 changes coming along well?
-
br-m<jberman> Generally, I remain confident that alpha achieved a level of stability that is ready to move to beta
-
br-m<diego:cypherstack.com> grabbing the link, moment
-
br-m<jberman> @jeffro256: Yep, changes are pretty much done
-
br-m<jberman> Completed @boog900:monero.social 's latest review round
-
br-m<brandon:cypherstack.com> I submitted the generalized bulletproof paper to iacr last week but the editors have not posted it yet. As soon as I get the link sent to me I will share it here.
-
br-m<rucknium> @brandon:cypherstack.com: Thank you!
-
br-m<jeffro256> @jberman: agreed, thanks for all that work
-
br-m<rucknium> I agree that alpha should try tx relay v2 because we don't know yet if beta stressnet should have changes to Generalized Bulletproofs (GBP).
-
br-m<jberman> ack
-
br-m<rucknium> 6. Bulletproof prover and verifier optimization research.
-
br-m<rucknium> @emsczkp:matrix.org: Did you find time to look at moneroresearch.info/285 Wang, N., Wang, Q., Liu, D., Esgin, M. F., & Abuadbba, A. (2025). BulletCT: Towards More Scalable Ring Confidential Transactions With Transparent Setup. ?
-
br-m<emsczkp:matrix.org> > <@rucknium> @emsczkp:matrix.org: Could you read moneroresearch.info/285 Wang, N., Wang, Q., Liu, D., Esgin, M. F., & Abuadbba, A. (2025). BulletCT: Towards More Scalable Ring Confidential Transactions With Transparent Setup. BulletCT: Towards More Scalable Ring Confidential Transactions With Transparent Setup.
-
br-m<emsczkp:matrix.org> I don't want to dominate this agenda item, just share some thoughts on BulletCT
-
br-m<emsczkp:matrix.org> BulletCT contributes to RingCT signature schemes with a “K-weight” version of K-out-of-N proofs (K/N proofs), inspired by the Any-out-of-N proofs (Any/N proofs), and proposes a new Tag proof.
-
br-m<emsczkp:matrix.org> BulletCT doesn’t bring improvements to Bulletproofs proof system itself; rather, it compares mainly against the Any/N RingCT scheme, the Omniring and RingCT-3.0.
-
br-m<emsczkp:matrix.org> Overall, BulletCT constructs a RingCT signature by combining four proofs, K/N proof, Tag proof, Balance proof and Range proof. The authors only provide the K/N proof and Tag proof. Moreover, both K/N proof and Tag proof follow the Bulletproofs-style proof for two different objectives: K/N proof proves the “existence of a val [... too long, see mrelay.p2pool.observer/e/qLCO-eAKUDhwYVY3 ]
-
br-m<emsczkp:matrix.org> However, it is unclear to me why the authors use separate Bulletproofs-style proofs for the K/N proof and the Tag proof. While the K/N proof appears to be motivated by Bulletproofs’ bit-decomposition constraints, an analogous motivation is not evident for the Tag proof. Finally, neither construction presents an explicit redu [... too long, see mrelay.p2pool.observer/e/qLCO-eAKUDhwYVY3 ]
-
br-m<emsczkp:matrix.org> this is my brief review
-
br-m<emsczkp:matrix.org> i don't agree Bulletct will benefit for Bulletproofs neither FCMP
-
br-m<emsczkp:matrix.org> i didn't read the other paper, but i will do
-
br-m<jberman> Thank you @emsczkp:matrix.org !
-
br-m<emsczkp:matrix.org> welcome
-
br-m<sgp_> Fwiw I don't think anyone claimed that bulletct as written would benefit Monero directly
-
br-m<jberman> @emsczkp:matrix.org: Do you draw this conclusion because you think there isn't enough support for their idea? In other words, do you think they could take your feedback specifically from the second paragraph and iterate? Or that it's fundamentally flawed
-
br-m<emsczkp:matrix.org> here maybe > <@rucknium> Has anyone here closely read any of the papers linked above? It looks like at least one of them (BulletCT) could help with Bulletproofs efficiency. Anyone know anything about it?
-
br-m<rucknium> So my hypothesis was wrong :D
-
br-m<emsczkp:matrix.org> @jberman: i don't see the prover/verifer optimizations in BulletCT. I would like more details on that particular optimizations, or at least which papers do
-
br-m<emsczkp:matrix.org> here the authors claim there are "it seeks to halve the number of computationally expensive group exponentiations required by existing Bulletproofs-based constructions, yielding an almost 2X practical speedup" ... i haven't find this yet > <@ack-j:matrix.org> MAGIC recieved a project proposal with the following research goals that we'd like community feedback on:
-
br-m<sgp_> BulletCT is related work, but it's not "using BulletCT as a direct starting point, we changed this and this to create a Monero compatible proposal". Ack-j can chime in if my understanding is wrong
-
br-m<rucknium> Right. I was trying to get an idea of the researcher's research agenda .
-
br-m<sgp_> They aren't saying BulletCT accomplishes the scope/claims
-
br-m<ack-j:matrix.org> Yea bulletCT is different. The papers that are more relevant are SwiftRange and flashproofs. I will get you a link
-
br-m<rucknium> To fund this, you would want to know if the objective of the research is feasible and if the researcher is likely to succeed in his/her goal.
-
br-m<ack-j:matrix.org> moneroresearch.info/index.php?actio…S_CORE&method=creatorProcess&id=692
-
br-m<ack-j:matrix.org> Here is the authors publications. 3 papers on range proofs and then bulletct is an outlier
-
br-m<rucknium> I suggested the wrong one. Sorry.
-
br-m<ack-j:matrix.org> Update on the MAGIC side. Dr. Nan Wang identified a soundness flaw in their proposed bulletproof+ optimization that affects the verifier efficiency. Their proposal still should double the prover efficiency and benefit verifier efficiency, but the 2x verifier estimate has been reduced.
-
br-m<ack-j:matrix.org> We plan to make a reddit post soon and start the fundraising round
-
br-m<jberman> fwiw, I don't recall exactly how long it takes to construct the BP+, but I at least haven't noticed it to be a perf issue when constructing a tx
-
br-m<jeffro256> Especially after FCMP++ ...
-
br-m<jberman> right
-
br-m<rucknium> Verifier efficiency is usually much more important than prover efficiency, for blockchains.
-
br-m<jberman> FCMP++ construction is still pretty slow especially for large input txs, to the point it would actually be a noticeable thing for users
-
br-m<sgp_> @rucknium: This was emphasized to them by @ack-j:matrix.org fwiw
-
br-m<ack-j:matrix.org> mrelay.p2pool.observer/m/matrix.org/tGRPFJzPclIFBXyRgcohWeCS.pdf (Monero_Proposal 3.pdf)
-
br-m<ack-j:matrix.org> The author agreed to let us share the proposal. Here is the latest revision
-
br-m<rucknium> @emsczkp:matrix.org: Any thoughts on the "Project Feasibility" section?
-
br-m<emsczkp:matrix.org> yea, now I see swiftrange promises BP rangeproof speed-up
-
br-m<emsczkp:matrix.org> I'm not in swiftrange, I'll take a look
-
br-m<jeffro256> It says communication cost up to 2x as the "range size" increases. I'm guessing that that's the 64-bit amount, and not the number of outputs ?
-
br-m<emsczkp:matrix.org> of course, don't want to block the fundraising
-
br-m<rucknium> I think the risks are 1) Cannot be implemented in Monero for unforeseen reasons, 2) Becomes obsolete before a hark fork (after FCMP hark fork) occurs that could use it, 3) Speedup is very little, 4) Soundness does not pass peer review.
-
br-m<rucknium> Of course, all research is risky, so that's not new
-
br-m<emsczkp:matrix.org> @jeffro256: it should be the bit-range domain yes
-
br-m<rucknium> Communication = size in bytes, right?
-
br-m<emsczkp:matrix.org> @rucknium: usually the proof size = communication is bytes
-
br-m<rucknium> Everyone should feel free to give more feedback on the proposal after the meeting or any time.
-
br-m<rucknium> 7. CARROT Outgoing View Keys (OVKs) (github.com/jeffro256/carrot/blob/master/carrot.md#22-new-wallets-only).
-
br-m<rucknium> I have at least two questions. Is there any other known way to get quantum forward secrecy and/or prepare outputs for a post-quantum turnstile to prevent a quantum computer from counterfeiting XMR?
-
br-m<rucknium> Other than OVKs, I mean
-
DataHoarderCurrent PQ Turnstile design for new Carrot wallet with Carrot tx outputs: gist.github.com/jeffro256/146bfd5306ea3a8a2a0ea4d660cd2243
-
br-m<jeffro256> Yes, you can still come up with a wallet format scheme that sends change to a symmetric secret without having an OVK.
-
br-m<jeffro256> And it should be possible to be made compatible with that turnstile design DataHoarder linked
-
br-m<jeffro256> @jeffro256: it would be akin to having two view-incoming keys: one for actual incoming XMR from others, which is the discrete log relation of your Monero address points, and one used for change.
-
DataHoarder[m]Doesn't Carrot generate-image key + Carrot view incoming key effectively means OVK (you can scan inputs, you can generate key images to detect the spends) then, except for internal change?
-
br-m<jeffro256> Plus s_ga (to determine address-specific openings), yes.
-
DataHoarder[m]right, s_ga is derived from s_vb, not k_v
-
br-m<jeffro256> s_ga meaning the "generate-address secret"
-
br-m<rucknium> @jeffro256: The actual UX would be having two view keys? Or usually people would use a concatenated key, combining the two?
-
DataHoarder[m](current key hierarchy github.com/jeffro256/carrot/blob/ma…ster/carrot.md#52-new-key-hierarchy )
-
br-m<rucknium> Is midipoet still here?
-
br-m<jeffro256> @rucknium: For most use cases I envision, if you want the all-inclusive view-balance secret, you can just transmit that 32 byte secret, since it derives the others.
-
midipoetYes
-
br-m<articmine> @rucknium: and how does this address the concerns that have been raised regarding OVKs?
-
br-m<rucknium> There is a fear that users would be persuaded to give up their outgoing view keys to centralized exchanges or other surveillance-adjacent entities. Anyone want to write out thoughts on this hypothesis?
-
br-m<jeffro256> @jeffro256: But you can split it up however you like for different use cases
-
br-m<jberman> My opinion: the tangible benefits the OVK brings are still not very well understood, undervalued, and under-appreciated, especially in how the OVK would improve security (and usability) for hot/cold wallets, multisig, and hw wallets.
-
br-m<jberman> The arguments in favor of SMALL businesses (and businesses of ALL sizes) have been nicely expanded on in various places.
-
br-m<rucknium> I have read of Monero users needing to submit cryptographic payment proofs. I don't know to whom or in what circumstances they are required. Anyone familiar with this behavior? I have not read of anyone needing to submit current incoming view keys.
-
br-m<jberman> On the nayside: the boogeyman argument of "they'll collect the keys and shut out people who don't provide them" is a hypothetical that rests on sheep being sheep and giving up their private keys.
-
br-m<jberman> So in sum: individuals and small businesses who want greater security using Monero, who want to build a circular unfuckwithable economy, are essentially being held back by hypothetical sheep being sheep.
-
midipoetOVKs would be a method towards compliance for any obliged entity, that's for certain. Whether there is appetite for CEXs to implement a system that maintains a database of OVKs for their customers is unknown. Though perhaps they could delegate the analysis to surveillance companies, who would certainly benefit from having access to an OVK database (one would assume).
-
DataHoarder[m]@rucknium: You can accomplish most of the detailed items directly with view incoming keys, specially in legacy wallets, but FCMP++ also removes the ability to do any sort of output/decoy statistical analysis
-
DataHoarder[m](and on an aside, new Carrot wallet is not explicitly a change that is being hardforked, the tx output format change is the one being hardforked and this also benefits legacy wallets)
-
br-m<jeffro256> midipoet: Practically: they would benefit IMMENSELY from having many people's view-incoming keys. With enough keys in a strongly connected subgroup of users, it's similar privacy-wise to having OVKs. Why do you think that this hasn't been done? There must be some political reason, no?
-
br-m<jeffro256> midipoet: This is not to the fact that you can prove your entire tx history of a standard wallet with 100%, without OVKs. Yet there has been no push for this either.
-
br-m<rucknium> AFAIK, if the CCS wallet had disclosed an OVK, the community would have known about the theft immediately instead of a month+ afterward. I think the same thing could have been accomplished by regular export and public posting of key images, but that creates its own type of security risks.
-
br-m<articmine> midipoet: Yes 1 hop compliance is a use case. It is what can be used for travel rule compliance.
-
DataHoarder[m]@rucknium: When looking at the incident txs you could correlate that all inputs had been swept and directly attribute it due to the working of wallet change, but it'd have been entirely clear with OVK
-
br-m<articmine> This is a. far cry from the harm caused by BS
-
br-m<articmine> @rucknium: This is a classic very good use case for OVK
-
br-m<jeffro256> DataHoarder[m]: Especially since they used something akin to Monerujo Pocketchange and it was traceable for like 3 hops IIRC
-
br-m<hbs:matrix.org> @jeffro256: Convenience differs though, in one case there is a need for continous export of KIs, in the other the one time hand out of the OVK is suddicient
-
midipoetsure, but IVKs aren't negotiable are they? OVKs seem to be (as I understand it). The reason that CEXs haven't pushed for access to more view keys, is basically because it's been too complex to implement. It's easier to just delist. With more user friendly view keys this might (?!) change.
-
DataHoarder[m]@jeffro256: blocks.p2pool.observer/tx/ffc82e64d…1278aef0b80a7d16d7ca12ab9a88f5bc56a and the 0-XMR change shows it's a sweep of n inputs!
-
br-m<jberman> midipoet: "So in sum: individuals and small businesses who want greater security using Monero, who want to build a circular unfuckwithable economy, are essentially being held back by hypothetical sheep being sheep."
-
DataHoarder[m]on this @jeffro256:monero.social would a PQ Turnstile be possible without a general Carrot generate-image key for external incoming transactions? > <@rucknium> I have at least two questions. Is there any other known way to get quantum forward secrecy and/or prepare outputs for a post-quantum turnstile to prevent a quantum computer from counterfeiting XMR?
-
br-m<articmine> midipoet: It can also strengthens legal cases against Monero delisting
-
br-m<jeffro256> midipoet: What do you mean by "negotiable"? They aren't technically required for Monero to function, they simply make the UX suck way less. You can technically come up with a wallet format where the view key derives the spend key, no there exists no non-custodial IVKs
-
midipoetarticmine: yes, that might be true. But ultimately any CEX can list or delist whatever coin they want.
-
br-m<jeffro256> @jeffro256: Or you can simply set them equal to each other, but that would be externally observable in the main address
-
br-m<articmine> Any legal challenge would likely target the regulators and regulations
-
midipoetjberman: I don't get the sheep being sheep bit, to be honest. Personally, I am not overly against OVKs, if there are legitimate purposes for them, aside from compliance. It seems (from what I have read) there are.
-
br-m<rucknium> @jeffro256: @jeffro256:monero.social: I wondered about that. But that's a wallet-level change (like carrot), not blockchain-level, right? So it would always be possible to create a new wallet with an IVK.
-
DataHoarder[m]@rucknium: it would always be possible to make a wallet with the scheme, or even a wallet that just reports proofs as needed
-
br-m<jberman> Someone who gives up their OVK is a sheep being a sheep. A business that requires OVK's is a sheep being a sheep
-
br-m<articmine> I am in favor of keeping the OVKs as proposed in Carrot at least as an option for wallet creation
-
DataHoarder[m]the other suggestion was around UX. Don't display these in the GUI, but CLI only, or warn users about them.
-
br-m<gingeropolous> i wonder if they can have a default expiration
-
DataHoarder[m]That said, exchanges could always ask for your seed words :)
-
br-m<jeffro256> @rucknium: CARROT is primarily an addressing protocol. I want to separate that conceptually from its recommended wallet format. So many different wallet formats can, and will, communicate XMR to each other over CARROT. But yes, CARROT has no consensus level rules, except for the new output format, which is simply reserve b [... too long, see mrelay.p2pool.observer/e/jYXp-uAKV1JpQmdS ]
-
DataHoarder[m]@gingeropolous: it's baked in address generation
-
midipoetjberman: ah ok. i.e submitting control of the information is the problem, as opposed to whether it's a view key, a transaction id, a private key, etc.
-
br-m<jeffro256> > <DataHoarder[m]> it would always be possible to make a wallet with the scheme, or even a wallet that just reports proofs as needed
-
br-m<jeffro256> Exactly. If user convenience is the limiting factor for regulators, regulators could require you to use an auto-reporting wallet software TODAY, which is cryptographically verifiable if you try to evade that software, for that specific wallet, once you have disclosed the view-incoming key.
-
br-m<articmine> @gingeropolous: Sweep the wallet and claim the spend key was compromised . There are workarounds with very reasonable plausibility
-
DataHoarder[m]☝️ > <@jeffro256> Exactly. If user convenience is the limiting factor for regulators, regulators could require you to use an auto-reporting wallet software TODAY, which is cryptographically verifiable if you try to evade that software, for that specific wallet, once you have disclosed the view-incoming key.
-
midipoetHaving said all that, there is a level of technological determinism to the whole thing. If we make view keys really easy to use, the use of them might become normalised. That would be detrimental to the way we imagine Monero being used as a currency. The fact view keys/key image sharing hasn't become normalised is probably very strongly correlated to the current technical/usability barriers to the sharing/generating
-
midipoetprocess.
-
DataHoarder[m]Users use view keys already when they make a view-only wallet in GUI, or use a hardware wallet
-
DataHoarder[m](or multisig, but that is an advanced feature)
-
br-m<jeffro256> @gingeropolous: It's completely possible to export OVKs per-address. But in the boogeyman scenario, why would the boogeyman ask for the inferior per-address OVKs instead of the main one?
-
DataHoarder[m]OVK in the case of these massively simplifies interacting with hardware wallets or making multisig txs. You also no longer need to bring the cold keys from storage or connect the hw wallet to check balances, as hw wallet setups atm can't export key images.
-
DataHoarder[m]So you can't share these with a secondary wallet in a different computer.
-
br-m<jberman> midipoet: Collecting JUST view keys of today is effectively 99% as useful as OVK's, since they can see change and therefore see the vast majority of outgoing transactions as well (the spends are extremely straightforward to pinpoint)
-
br-m<jberman> ESPECIALLY to a surveillance panopticon
-
DataHoarder[m]@jberman: Yeah. Today it would be quite harmful due to the ability to tag an output and trace it statistically in decoys. Akin to how p2pool.observer/sweeps works
-
br-m<jberman> "The fact view keys/key image sharing hasn't become normalised is probably very strongly correlated to the current technical/usability barriers to the sharing/generating process" -> there is no reason to think this
-
DataHoarder[m]FCMP++ entirely removes the ability to do this, so a lot of the specific knowledge and behavior around view keys also changes
-
br-m<jberman> no evidence to support that claim
-
br-m<articmine> How practical is this at scale? > <@jberman> Collecting JUST view keys of today is effectively 99% as useful as OVK's, since they can see change and therefore see the vast majority of outgoing transactions as well (the spends are extremely straightforward to pinpoint)
-
br-m<just_another_day:matrix.org> One of the reasons can be to conceal their intentions until OVKs are adopted > <@jeffro256> Practically: they would benefit IMMENSELY from having many people's view-incoming keys. With enough keys in a strongly connected subgroup of users, it's similar privacy-wise to having OVKs. Why do you think that this hasn't been done? There must be some political reason, no?
-
br-m<jberman> @just_another_day:matrix.org: One can spin up boogeymen endlessly
-
br-m<jeffro256> > <@jberman> Collecting JUST view keys of today is effectively 99% as useful as OVK's, since they can see change and therefore see the vast majority of outgoing transactions as well (the spends are extremely straightforward to pinpoint)
-
br-m<jeffro256> Funnily enough, I have a link to a presentation video which covers this exact topic. I think you would be interested in it: youtube.com/watch?v=MYzZ1DzSWCY
-
midipoetSure. spinning up boogyman is basically what threat assesment is. Monero users love doing it.
-
midipoetDoesn't invalidate it
-
br-m<intr:unredacted.org> the problem is that most of these boogeymen involve voluntary user actions, in the same vein you may be "compelled" to give up your private spend key
-
br-m<jberman> @intr:unredacted.org: So in sum: individuals and small businesses who want greater security using Monero, who want to build a circular unfuckwithable economy, are essentially being held back by hypothetical sheep being sheep.
-
br-m<articmine> @jberman: This is only part of the problem
-
midipoetHow do OVKs provide greater security for an individual that uses Monero. Like what is the use case there?
-
DataHoarder[m]midipoet: There is no longer need to bring any spend key online until it's time to spend, even in-memory.
-
DataHoarder[m]You could now implement a wallet that has a different extra password to spend/show seed words
-
br-m<jberman> midipoet: 1. Hot/cold wallet users frequently check their balance. That occurs in the real world, they're going to do it. Not needing to load the spend key to do so is reducing attack surface for said users.
-
br-m<articmine> midipoet: Auditing and monitoring without using the spend key
-
br-m<gingeropolous> light wallets work better too right
-
br-m<gingeropolous> try as I might i've never gotten my mobile monero wallet to be useful. its always out of sync
-
br-m<articmine> Hardware wallets for example are just a special case of auditing and monitoring
-
midipoetSo then most of here agree that the benefits outweigh the costs, and the potential (boogeyman) risks. What is the problem then?
-
midipoet*most here
-
br-m<jberman> 2. Multisig users. Same for them. To see their balance requires communicating with other multisig users who all have to load their spend keys to generate key images. Eliminating that requirement is a +1 for multisig security and a MJAJOR +10 for multisig usability, which has been a MAJOR pain implementing for Monero
-
br-m<jeffro256> midipoet: Software wallets: spend key can stay decrypted during sync. Hot/cold wallets: improved UX and security b/c cold wallet does not need to be consulted unless to sign transactions. Multisig: improved UX and security b/c participants do not have to consult with each other to calculate key images during refresh. Hardware [... too long, see mrelay.p2pool.observer/e/hpac--AKYWlpV0o0 ]
-
DataHoarder[m]@jeffro256: *spend key can stay encrypted during sync.
-
br-m<jberman> Another overlooked benefit for hw wallets is how much simpler it is to design a hw wallet that does not have to ingest outputs and generate key images and export them back to the software wallet
-
br-m<rucknium> midipoet: midipoet: Informed consent. The information known here needs to be communicated better to the whole Monero user community.
-
midipoetrucknium: seems fair.
-
br-m<jberman> Has anyone noticed the plethora of failed hw wallet projects in Monero? How long have we been waiting for a seed-signer like device? Does anyone recall why Passport didn't end up supporting Monero?
-
DataHoarder[m]On this part FCMP++ allows signing and then the wallet can be the one filling the membership proofs right? which also eases hw wallet construction
-
br-m<jberman> Simplifying hw wallet design will make it easier for various people to design hw wallets for Monero, again improving security for Monero users
-
br-m<hbs:matrix.org> @jberman: On a side note, with Ledger filing for its IPO in the US soon there is a non zero probability that Monero support be dropped in the future
-
br-m<gingeropolous> @rucknium: perhaps we need a good long blog post on getmonero.org
-
br-m<gingeropolous> you can't trust me to write it tho cause im hooked on llms
-
rbrunnerIs it so ...
-
DataHoarder[m]@gingeropolous: The previous blogpost on the topic was getmonero.org/2024/04/27/fcmps.html (which mentions OVK) so this can be further expanded to Carrot tx output format and Carrot wallet
-
midipoetgingeropolous: do you have an llm-based partner as well?
-
rbrunnerYeah, sometimes I like to write such posts, but right now I would rather wait for the storm to subside before even thinking about it
-
midipoetYou could have a panel on risks v benefits at Monerotopia/MoneroKon
-
rbrunnerI see the discussions on Reddit over almost a week now as a more or less lost case
-
br-m<rucknium> Why not @jeffro256:monero.social write it, then check for ease of understanding by someone else?
-
br-m<jeffro256> @jberman: Hardware / cold wallets' implementation requirements right now are basically an entire wallet engine, including burning bug mitigations, enote scanning, key image communication, BP+ proving (range proofs are included in signature hash), CLSAG proving, etc. After FCMP++/Carrot/new wallet format, it changes to just [... too long, see mrelay.p2pool.observer/e/m_Gz--AKTXMzY192 ]
-
br-m<jeffro256> Plus exporting the other keys.
-
br-m<jeffro256> @rucknium: I was planning on doing this for Monerotopia in just over 2 weeks ;)
-
rbrunnerI volunteer to review and comment anything in this direction, if that's of any use
-
rbrunnerIf it has the form of a presentation, I mean
-
br-m<jberman> happy to review/comment as well!
-
DataHoarder[m]I don't know if this message got lost in the discussion or was answered before (AFAIK we only answered what to do with internal change, not external incoming outputs) > <DataHoarder[m]> on this @jeffro256:monero.social would a PQ Turnstile be possible without a general Carrot generate-image key for external incoming transactions?
-
br-m<jeffro256> Good question. It may be possible, but not with the current design AFAICT > <DataHoarder[m]> on this @jeffro256:monero.social would a PQ Turnstile be possible without a general Carrot generate-image key for external incoming transactions?
-
midipoetoh, I see. A lot has been said on Reddit. Missed all of that.
-
rbrunnerAbout 1000 comments now in total, probably? Some people have been very busy, and very persistent.
-
midipoetYeah. At least it's people getting enthused though.
-
rbrunnerYes, lol. I look at a certain other coin subreddit and see 2, 3 messages per day. Well :)
-
DataHoarder[m]+Twitter, and it woke up several people to come to reddit to start disproving lies in comments or misunderstandings
-
br-m<intr:unredacted.org> including fluffypony
-
DataHoarder[m]@jeffro256: Might be curious how one would look as due diligence (with a wallet hierarchy to match) to see what such change it'd allow if each of the keys was shared except main spend keys (or whatever allows producing txs)
-
DataHoarder[m]Changes in address format (cryptonote addresses) would allow much more IIRC but that's not in scope (JAMTIS is doing that)
-
br-m<rucknium> We have spent an hour on this agenda item, so I will end the meeting here. Thanks everyone.
-
br-m<articmine> Thanks
-
br-m<jeffro256> Agreed. I'll into into it. I suspect an issue will be that if you make your opening over T depend on the opening over G, revealing the key image opening (to prove PQ soundness), will necessarily reveal your entire signing key, so authorization will be broken.
-
br-m<jeffro256> Thanks everyone!
-
rbrunnerHmm, the ease of support in hardware wallets for Carrot wallets may mean that if somebody wants to continue with a legacy wallet, hardware wallet support may not be there anymore?
-
DataHoarder[m]rbrunner: Some of the FCMP++ benefits also map over to legacy ones, regarding tx construction
-
DataHoarder[m]online spend keys would still be needed for decoding spends
-
rbrunnerYes, I see, but our offer to people that we continue legacy wallets indefinitely, with 2 secret keys, would have a small "but": No hardware, only software. No drama though IMHO
-
DataHoarder[m]@jeffro256: Yeah, I think this was also partially discussed when someone suggested making two keys/secrets the same instead of being derived differently, that it broke certain aspects against a quantum capable adversary, but I do not remember the specifics
-
DataHoarder[m]rbrunner: As in, the hardware does the same work as in new carrot wallet, besides different derivation and can only provide view incoming key. The signing still happens the same way on both with spend keys, then wallet software can fill the rest.
-
DataHoarder[m]And ofc, you need to actively query the hw wallet (with the spend key) for legacy wallets to check spend status.
-
rbrunnerDataHoarder: Thanks. That's sounds better than I feared. It's not that much much for firmware writers to continue to support both, if I understand you correctly
-
rbrunner*much work
-
rbrunnerThanks to some "magic" that FCMP++ itself is providing
-
br-m<sgp_> I don't think that any of the arguments against view keys is grounded in sound argument, personally
-
br-m<sgp_> anyone at gunpoint can ask for your private spend key, if we're talking highly theoretical risks for the worst case
-
br-m<sgp_> maybe this would be a concern if you had to pay for a new Monero wallet, or get one made by an regulated entity for you. But you don't. Wallets are free and permissionless
3 minutes ago