-
QuickBASIC
Zero to Monero 2.0 most recent edition?
-
UkoeHB
yes
-
QuickBASIC
ty UkoeHB
-
Rucknium[m]
So I just found this:
-
Rucknium[m]
-
Rucknium[m]
I especially enjoy the MRL Molotov. Tossing truth bombs all over the place 😆
-
sethsimmons
Updated pre-print with security proofs is available now for Lelantus Spark:
eprint.iacr.org/2021/1173.pdf
-
sethsimmons
Also available on Github, but IACR should be viewed as canonical.
-
sgp_[m]
amazing news
-
isthmus
@Halver[m] Got it from the monero database that @neptune maintains
-
Halver[m]
<isthmus> "@Halver[m] Got it from the..." <- Thanks isthmus .
-
Halver[m]
I profit for a silly question : how is it possible for a tx to have more than 11 outputs ?
-
Halver[m]
Are such txs done with unofficial wallets ?
-
isthmus
The current protocol allows up to 16 outputs (correspondingly, I think the core wallet would let you send to 15 recipients + change)
-
isthmus
So the peak at 16 makes sense, people maxing out the allowed number of recipients
-
isthmus
The prevalence of 11 outputs is odd. It could be an unofficial wallet, OR it could be a script/wrapper/whatever around the core wallet that simply batches by 10+change and doesn't take advantage of the full 16 allowed by the protocol
-
nioc
outputs |= ring members
-
Halver[m]
nioc: Indeed, I was making this mistake.
-
Halver[m]
If I'm correct the number of ring members is fixed, at 11 atm,
-
Halver[m]
and it is also mandatory to be accepted in the blockchain ?
-
UkoeHB
correct
-
Halver[m]
<isthmus> "The prevalence of 11 outputs..." <- I guess only a mining pool (old) script could generate such a volume ?
-
midipoet
if every transaction returned change split into 15 seperate outputs would that have a net positive for privacy?
-
isthmus
If the source of the 11 output txns switched to making 16 output txns it would be a very good thing to reduce how much their transactions stand out
-
isthmus
(if we can figure out who/what is behind it, I would politely contact them with a note about updating their max outputs value)
-
isthmus
The plot above is a log y-scale, so that peak at 11 is way bigger than it looks (essentially an order of magnitude over the surrounding output count values)
-
isthmus
There will always be a bunch of transactions with 2 outputs from day-to-day users, and a bunch of transactions that max out the output count of the protocol (currently 16) for things like batched payouts. So if transactions can pick one or the other and blend into there would be best
-
isthmus
I've pondered the notion of requiring #outputs to be a power of 2
-
isthmus
So if you have a 6 output transaction (including change) you would just add 2 dummy outputs so that you're at 2^3=8
-
Halver[m]
Rucknium: Isn't there a meeting programmed at 17:00 UTC today ?
-
Halver[m]
isthmus: What would be the benefits ?
-
UkoeHB
yes 40mins
-
isthmus
It would prevent goofy stuff like some pool generating thousands upon thousands of N=11 outputs that can be traced to each other and ruled out as decoys from other rings :- P
-
Halver[m]
UkoeHB: ah, so my UTC shown time must be wrong
-
UkoeHB
unless I am crazy, it is 16:20 UTC right now
-
Halver[m]
No. You're right, and I was wrong.
-
carrington[m]
<midipoet> "if every transaction returned..." <- Net privacy win, but a block chain bloating problem
-
carrington[m]
Or maybe not
-
UkoeHB
bigger problem is scanning times to find owned outputs
-
jberman[m]
I don't think it's necessarily a net win for privacy if every tx created 16 outputs. I think you'd likely end up having more tx's that have >1 ring with members from the same tx that way (unless all wallets actively prevent this), which makes it easier to identify those outputs as real
-
sgp_[m]
jberman: if that's the norm though, wouldn't it make it basically a wash? Why should anyone send more than 1 output to themselves or another person in normal use?
-
sgp_[m]
minko comes to mind, but that's the only legitimate example I've seen
-
sgp_[m]
I see 16 out as a net privacy win, but at relatively significant cost
-
sgp_[m]
there was an idea earlier for allowing either 2 out or 16 out only, but that's probably not flexible enough
-
jberman[m]
If you have 2 rings in your tx, and both rings reference distinct outputs from the same tx, it's pretty clear that those are the outputs being spent, regardless of whatever else is happening
-
isthmus
True, though that's a non-issue since dummy outputs would have 0 value and would not be consumed by subsequent transactions from the same wallet
-
jberman[m]
If you're dividing up amounts into 16 outputs always, you also have smaller outputs with which to make tx's, so it seems you would also need to use more inputs to send the amount you'd want
-
isthmus
No I'm definitely not proposing that
-
isthmus
Would be a privacy disaster
-
moneromooo
We could change fake out selection to slightly favour using outputs in different rings that come from the same tx. Never did it though.
-
sgp_[m]
oh wow nooooooo, no one is proposing using anything other than dummy outputs here :p
-
sgp_[m]
splitting into tiny amounts just for the lulz is baaad
-
jberman[m]
<midipoet> "if every transaction returned..." <- was answering this q
-
sgp_[m]
ah sorry I missed that
-
sgp_[m]
midipoet: no :)
-
jberman[m]
<moneromooo> "We could change fake out..." <- I think this would be effective though, at the cost of fewer decoys from across the chain (it's sorta like the naive binning approach I was planning to propose)
-
sgp_[m]
what use case are we better protecting where the use case involves spending several outputs from the same transaction
-
sgp_[m]
if anything, a wallet should probably warn if they receive several outputs in a single transaction as a higher risk of receiving poisoned outputs
-
jberman[m]
ya agree I don't see what privacy gains you get from always constructing 16 output tx's. I think the main benefit is likely less time spent waiting to spend cuz of the unlock time (you have more outputs sitting around ready to go)
-
carrington[m]
sgp_[m]: Some wallets are working on features which generate extra change outputs to avoid the 10 block lock
-
UkoeHB
Rucknium[m]: do you want to run the meeting?
-
Rucknium[m]
I could. Usually people with agenda items shouldn't run meetings, though.
-
UkoeHB
ok I will do it
-
sgp_[m]
Want me to run?
-
UkoeHB
let the meeting commence. Logs will be posted on the issue:
monero-project/meta #610
-
UkoeHB
1. greetings
-
UkoeHB
hello everyone
-
Rucknium[m]
Isn't carrington running one of the Monero Community meetings soon? carrington , could you run this one too? I don't know if you are busy though carringtonn
-
ArticMine
Hi
-
neptune
Hello
-
sgp_[m]
hello
-
rbrunner
Hoi zäme
-
coinstudent2048[
Hello
-
Rucknium[m]
Hi.
-
one-horse-wagon[
hello
-
sgp_[m]
I'm cool with koe running for now
-
crypto_grampy[m]
Hi all
-
d3neon[m]
hi
-
jberman[m]
Hello!
-
sgp_[m]
sarang and brandon ran most of the previous ones and they always had agenda items
-
carrington[m]
Hello. A researcher should run the MRL meetings, not me
-
janowitz
Hi
-
wfaressuissia
Hello
-
UkoeHB
2. updates. People working on stuff, a brief summary of what you have been up to.
-
ErCiccione
hi
-
woodser[m]
hello
-
Halver[m]
hi
-
Rucknium[m]
My main thing is working on a roadmap to improve the mixin selection algorithm. Within 12 hours I will submit the roadmap to the Vulnerability Response Process in part so that moneromooo and luigi1111w can redact any sensitive parts before release. jberman and isthmus have seen a draft of it.
-
Rucknium[m]
The I sill submit a CCS proposal to execute it
-
Rucknium[m]
* will submit
-
UkoeHB
Lots of people here :). My summary: The past couple weeks I have been working on PoC for Seraphis. Right now I have working performance mock-ups of RingCT with CLSAG and Triptych on my branch (
github.com/UkoeHB/monero/tree/seraphis_perf), and have a good plan for building out the Seraphis PoC. There are a lot of variations to perf test, so it is taking me a while to design things properly.
-
coinstudent2048[
So Lelantus Spark is out with security proofs. I am working on Seraphis's security proofs. Need verification of security properties I wrote here:
UkoeHB/Seraphis #2#issuecomment-918639450
-
UkoeHB
-
coinstudent2048[
But since Lelantus Spark is "somewhat" of an instance of Seraphis, I guess I'll just "align" my security analysis...
-
UkoeHB
I will give about 3-5mins more for summaries then we can move to discussion :)
-
sgp_[m]
Here's a good casual discussion on Lelantus Spark
youtube.com/watch?v=vEZC1fTYRZk
-
UkoeHB
jberman[m]: would you like to update us?
-
jberman
My summary: recommended patching integer truncation in the wallet & reducing the "recent spend window" (
monero-project/monero #7798#issuecomment-917495021), did a bit more research into the decoy selection algorithm adding the effect of MyMonero+Monero-LWS & openmonero to the mix in response to some of vtnerd's feedback and
-
jberman
criticisms (
monero-project/research-lab #86#issuecomment-915806414), worked on other non-research related tasks, and hoping to talk about binning in today's meeting
-
UkoeHB
Re: binning, my binning proposal was updated a while back (final draft kind of form)
monero-project/research-lab #84
-
UkoeHB
Also research related:
-
UkoeHB
- fee updates have been PRd and I have comments:
monero-project/monero #7819
-
UkoeHB
- multisig address generation fixes have been PRd:
monero-project/monero #7877
-
UkoeHB
Anyone else?
-
sgp_[m]
ty for reviewing the fee changes
-
UkoeHB
3. discussion. Ok I think we can move on. The remainder of the meeting is open ended.
-
sgp_[m]
are we accepting ArticMine's growth parameters then? am I the only one who is concerned with them?
-
UkoeHB
I don't have a strong opinion
-
moneromooo
Ping me when you comment on PRs, I seldom check the repo nowadays.
-
Rucknium[m]
sgp_: I suppose I could look at them.
-
UkoeHB
ah gotcha
-
gingeropolous
sgp_[m], can u briefly summarize ure concerns?
-
Rucknium[m]
I am an economist after all. Maybe I have something to say about fees.
-
ArticMine
I responded to the growth parameters in MRL issue 70 and the pr
-
gingeropolous
ok
-
sgp_[m]
gingeropolous: it's just a generous growth rate allowed
-
sgp_[m]
we don't need to talk about this here among all the other important stuff, but I am worried it is too generous
-
UkoeHB
sgp_[m]: It may be good to circle back to that issue after the fee PR is ready to merge.
-
sgp_[m]
ok
-
gingeropolous
i think Rucknium[m]'s input will be valuable, because it is effectively monetary policy
-
ArticMine
Just a note if you change the grwoth parameters on has to change the whole fee calulation
-
ArticMine
So I would suggest this not be left to the last minute
-
gingeropolous
so whats all the other important stuff? :)
-
Rucknium[m]
-
UkoeHB
It sounds like there isn't anything new to add in this meeting, just a call to action: please take a look if you can (MRL issue 70 and PR 7819).
-
gingeropolous
for those that can't do links
-
gingeropolous
Triptych vs. alternatives
-
gingeropolous
Improvements to the mixin selection algorithm (
-
gingeropolous
Decoy Selection Algorithm - Areas to Improve research-lab#86 ) @j-berman @Rucknium
-
gingeropolous
Removing/fixing/encrypting unlock time (
-
gingeropolous
Removing/Fixing/Encrypting monero's timelocks research-lab#78) (it also affects binning)
-
gingeropolous
Analysis of July-Aug 2021 tx volume anomaly (?) ( isthmus? { @Mitchellpkt } )
-
gingeropolous
Active recruitment of technical talent @Rucknium & others
-
gingeropolous
MRL structure (why aren't things getting done?).
-
gingeropolous
(from Rucknium[m] 's matrix post)
-
Rucknium[m]
Oh, long Matrix posts don't come through nicely on IRC?
-
UkoeHB
These are the items from
monero-project/meta #610
-
UkoeHB
- does anyone have comments/questions about Triptych vs alternatives?
-
ArticMine
Do we have some concise figures on verification time / tx size for comparison?
-
sgp_[m]
I have one question because we haven't really discussed this during a meeting specifically as far as I understand, but it has been discussed elsewhere:
-
wfaressuissia
questions: Triptych isn't competitive even with ideal multisig or multisig is the only blocker ?
-
UkoeHB
ArticMine: I am working on perf tests for that.
-
one-horse-wagon[
Has anyone looked at RingCT 3.0 as an alternative to Triptych?
-
sethsimmons
UkoeHB: My continued preference is explore Seraphis/Lelantus Spark and move to a hard-fork with ring-size change in the meantime.
-
ArticMine
Thanks
-
sethsimmons
Due to improved view keys and multi-sig simplicity, mainly.
-
rbrunner
Well, I have the comment that I can't comment because I am not able to read Sarang's paper and decide how the UX and UI for multisig would change.
-
sgp_[m]
Which of the following is more important: 1) easy transition with compatible address format, or 2) easy multisig
-
rbrunner
I.e. how much more complicated to transact?
-
sgp_[m]
I vote 2
-
sethsimmons
wfaressuissia[m]: Multisig is the main blocker, but there are other advantages to Seraphis/Lelantus Spark.
-
ArticMine
I have to agree with sethsimmons after speaking with sarang at DefCon after his talk. The Multisig simplicity is very significant in my view
-
ErCiccione
I would prioritise whatever gives us a good and usable multisig.
-
rbrunner
Quite some unknown how we would fare with an address format change I guess
-
rbrunner
Sounds quite radical
-
ct[m]
sgp_[m]: I assume the new sofware would prevent users from using old addresses?
-
UkoeHB
wfaressuissia: Seraphis in general has several other benefits over Triptych.
-
UkoeHB
1. possibly more efficient (TBD)
-
UkoeHB
2. new features: membership proof delegation (allows tx chaining, offloading membership proofs to third parties, reduces timing analysis of slow tx like multisig), collaborative funding (multiple funders for a tx without big crypto design effort), better address schemes (several variations)
-
ct[m]
s/sofware/software/
-
Rucknium[m]
BCH more or less did an address format change. Could query them on how to do it right
-
rbrunner
Interesting
-
x3nu[m]
Could address size decrease?
-
ErCiccione
The new format address not be backward compatible?
-
gingeropolous
i imagine with a hardfork, it would be easy to protect users re: address change.
-
UkoeHB
x3nu[m]: there are two sets of address scheme variations, one set is larger
-
sgp_[m]
proper view keys that show the whole balance (while also allowing view keys as we know them today) is a large win
-
UkoeHB
ErCiccione: backward compatible?
-
Rucknium[m]
UkoeHB: "collaborative funding (multiple funders for a tx without big crypto design effort)" Does that mean that a BCH Flipstarter-like crowdfunding system would be easy to put together?
-
sgp_[m]
exporting key images is frankly terrible
-
UkoeHB
hypothetically - depends on various design decisions
-
rbrunner
This new feature list looks so fantastic, somewhat hard to believe for laypeople
-
gingeropolous
sgp_[m], smooth would have disagreed, or at least they expressed pause in the past. for reasons i don't fully remember or understand
-
sgp_[m]
ErCiccione: people would get new Lelantus Spark/Seraphis addresses
-
gingeropolous
re: proper view keys that show whole balance.
-
rbrunner
I mean, if we really get all that for an address change, well then ...
-
sethsimmons
The biggest issue with the address format change is static addresses used in the past would not be valid/usable.
-
sethsimmons
i.e. static donations, saved addresses for friends in address book, etc.
-
rbrunner
static = widely published?
-
sgp_[m]
haha yeah exactly rbrunner , MANY benefits as I see it
-
sethsimmons
As new wallet software after HF would only use the new format, new address generation wouldn't be an issue.
-
UkoeHB
gingeropolous: there is an address scheme variant where view-only identifies owned and spent outputs, but can't read amounts. I like this one personally.
-
ErCiccione
sgp_: my question was if the precedent format will be still accepted, otherwise would impact ux quite a lot
-
sethsimmons
As it's coupled with a HF I don't think it's a huge deal, but it's certainly a bit more headache.
-
wfaressuissia
if the base point of comparison is the best non-reviewed and unproven DAP designs, then Triptych isn't competitive even with multisig. If the base point of comparison is current ring signatures with 10 decoys then even Triptych with a bit more complex multisig is an improvement which was expected to deployed soon.
-
sgp_[m]
Seth: critically funds sent to those addresses would not be unspendable however
-
Rucknium[m]
Zcash is trying to merge t- and z-address formats, I believe. Just another example of another coin doing it.
-
sethsimmons
It would not lead to lost funds with a HF, FWIW, just pain for users when merchants/donation acceptance does not update static addresses.
-
UkoeHB
ErCiccione: the existing format would have to be rejected
-
sgp_[m]
but I assume LS/S funds couldn't be sent to old addresses
-
sethsimmons
sgp_[m]: No, wallet software should just reject the address as invalid and prompt that it's old format
-
sethsimmons
UkoeHB: Woah, thats cool
-
UkoeHB
wfaressuissia: 'soon' is only 'soon' if you find someone to implement that complex multisig
-
sethsimmons
Rucknium[m]: This is different, they all still exist and are usable they just basically use a new URI format that can choose among multiple options.
-
rbrunner
If I see something as good-looking as this I unvolentarily start to look for the catch :)
-
sethsimmons
They aren't phasing out any address format or changing it.
-
gingeropolous
i don't think the change in address format is a cause for concern
-
sethsimmons
It's just a wallet SDK change.
-
d3neon[m]
Would it be possible to convert an old address to a seraphis address?
-
sgp_[m]
Triptych is a year + out even if we were fully on board with running with it, which I think is inadvisable at this point
-
UkoeHB
d3neon[m]: your private keys would stay the same (or at least your base entropy/mnemonic, depending on design choices)
-
ArticMine
One can allow a transition phase afte which sending funds to legacy addresses would not be allowed 6 months would be reasonable
-
wfaressuissia
UkoeHB: 2 people were agree to help with implementation: hyc and vtnerd, but that's for the case when design is ready
-
sethsimmons
d3neon[m]: New wallet software would just provide new addresses, no conversion needed etc.
-
wfaressuissia
Regarding fees. These fees are being used as protection against unlimited blockchain growth (problem with cheap storage and network), unlimited number of malicious txs (problem due to small number of decoys for ring signature) and reward for miners (not very important, since ther is fixed tail emission). How is it possible to justify decrease or increase of fees without any knowledege of hardware available to miners ?
-
d3neon[m]
If you could convert it, that would solve the static address issue
-
sethsimmons
d3neon[m]: You just post a new one, don't need to convert.
-
sethsimmons
The sender couldn't convert it, FWIW.
-
d3neon[m]
alright
-
rbrunner
Yeah, a fully automatic conversion tool, based only on the info in the address, would be surprising
-
sethsimmons
ArticMine: Yes, that is an option to implement both address formats, but obviously added complexity and code.
-
UkoeHB
rbrunner: "I unvolentarily start to look for the catch" The protocol is still experimental and not implemented anywhere - of course there might be a catch no one has seen yet. The more eyes the better.
-
gingeropolous
<sgp_[m]> Triptych is a year + out >>> how far out will seraphis / lelantus / superdooper be?
-
sgp_[m]
Also Year +
-
gingeropolous
or is it 3 +
-
x3nu[m]
So a ring decoy increase should be reconsidered then?
-
x3nu[m]
As a holdover
-
gingeropolous
imo its theater
-
UkoeHB
ArticMine: I also think a big transition period would be good.
-
sgp_[m]
Firo is planning on Q3 2022 for adoption of Lelantus Spark
-
sgp_[m]
just to give a rough idea
-
sethsimmons
x3nu[m]: Yes, IMO.
-
sgp_[m]
sorry, Q2 2022
-
sethsimmons
I think there is pretty broad consensus for a ring-size + BP+ HF with ring-size of 15-17.
-
sgp_[m]
Seth: yup
-
sethsimmons
But the larger improvements to privacy are likely coming via the decoy selection/binning work being done, TBH.
-
merope
wfaressuissia[m] Fees increase/decrease based on number of transactions being sent. They have nothing to do with mining hardware
-
sethsimmons
But ring size bump does help with those in theory, but that's more jbermanRucknium territory
-
coinstudent2048[
Hi! I made an attempt to elucidate Seraphis here. Highly incomplete hahaha. UkoeHB please correct mistakes:
raw.githubusercontent.com/coinstudent2048/writeups/main/seraphis.pdf
-
UkoeHB
wfaressuissia: "How is it possible to justify decrease or increase of fees without any knowledege of hardware available to miners ?" The fee PR has two parts. 1) improve the algorithm design to avoid problematic edge cases. 2) increase the minimum fee. Parameter choice is very difficult and somewhat arbitrary, so yes 'how is it possible' is kind of engineering voodoo (which is seen in other engineering fields too).
-
gingeropolous
ok, so lelantus spark will be ready Q3 2022 ?
-
UkoeHB
coinstudent2048[: cool! I will take a look :)
-
rbrunner
We could turn things on the head and ask whether currently anything still speaks *pro* Triptych
-
rbrunner
Except an existing but non-multisig implementation
-
sethsimmons
gingeropolous: That's their plan, yes, but that's for Firo -- would require implementation for Monero specifically on top of that, but not sure on complexity.
-
sgp_[m]
nice coinstudent2048 !
-
sethsimmons
There is also a PoC implementation of Lelantus Spark:
github.com/cypherstack/spark
-
ErCiccione
sethsimmons: I'm not sure it worth to make a hard fork now if there are more consensus changes being worked on (assuming they are consensus-related)
-
gingeropolous
so i guess, as mentioned before, a key piece of data is compare and contrast lelantus spark / seraphis / triptych re: size and speed etc
-
UkoeHB
rbrunner: If Seraphis/etc. turn out to be flops, Triptych is the best known protocol.
-
sethsimmons
ErCiccione: Ah, forgot to include fee changes, which should also be included.
-
sethsimmons
Past that there are no other consensus changes near-ready that I know of.
-
rbrunner
I see, yes
-
ErCiccione
I think we should prepare a list of what consensus changes would be included in the next hard fork and then have a dedicated meeting about it
-
sethsimmons
And as mentioned a new protocol is still 1y+ out.
-
UkoeHB
That being said, Seraphis/etc. don't introduce any crazy new crypto, so it is unlikely.
-
coinstudent2048[
UkoeHB: I second this.
-
jberman
Agreee with ErCiccione on dedicated meeting about HF
-
sethsimmons
ErCiccione: Agreed.
-
ErCiccione
UkoeHB: but we need it to support multisig in case
-
ErCiccione
meeting again in two weeks then?
-
UkoeHB
yes seems appropriate
-
ErCiccione
there is enough stuff to talk about in any case i would say, beside the hard fork
-
rbrunner
Does Lelantus Spark support multisig then in a reasonable form? Does Firo aim to support multisig?
-
sgp_[m]
HF process falls outside of MRL scope mostly and is more of a -dev thing, but yes very important
-
sethsimmons
rbrunner: Yes, very simple AFAICT.
-
UkoeHB
rbrunner: afaik yes, the Chaum-Pedersen proofs they use can be multisig-d
-
sgp_[m]
rbrunner: yes, Lelantus Spark multisig is a dream compared to Triptych
-
ErCiccione
meeting in monero-dev sunday 3th 17:00 UTC?
-
rbrunner
Nice, one more arrow in the back of Triptych ... ?
-
sethsimmons
-
sethsimmons
-
sethsimmons
-
sgp_[m]
ErCiccione: I'm not aware of any meeting but there should definitely be one imo
-
jberman
sounds good to me ErCiccione
-
UkoeHB
we should move to another topic, this one took a surprising amount of time
-
UkoeHB
- Improvements to the mixin selection algorithm
-
sgp_[m]
rbrunner: that's the main reason not to use Triptych
-
jberman
4 areas to improve decoy selection algo:
-
jberman
1. Integer truncation in the wallet (e.g.: `3 / 2 = 1`)
-
jberman
2. Binning
-
jberman
3. Modifying the distribution estimator (@Rucknium spearheading this)
-
ErCiccione
sgp_: yeah, will post in -dev about it if there is consensus here
-
jberman
4. Validating correct algo used at consenus
-
sgp_[m]
ErCiccione: yes please do
-
jberman
1. Patching integer truncation
-
jberman
Refresher: the decoy selection algo selects *older* outputs than it otherwise would because it truncates an integer (e.g. 3 / 2 = 1, instead of 1.5)
-
jberman
I recommended patching integer truncation in the official wallet:
monero-project/monero #7798#issuecomment-917495021 (and downsizing the "recent spend window" where the wallet re-selects a young output if the algo suggests a locked output).
-
jberman
Summary: patching truncation seems safe on grounds of tx uniformity to me, and I think it's reasonable to assume it would correctly select a decoys that more closely mirror spending patterns.
-
jberman
don't think there is much to talk about on that^
-
coinstudent2048[
rbrunner: I try to post about Sarang's Triptych multisig paper in MRL/Lounge, but not now.
-
rbrunner
TIA!
-
UkoeHB
jberman: +1
-
jberman
Will give 30 more seconds then moving on to binning
-
sgp_[m]
yeah safe to patch
-
rbrunner
Lol, bug killed in 30 seconds :)
-
jberman
:]
-
jberman
I think binning is blocked by the decision on what to do with unlock times
-
jberman
Unlock times have privacy issues (they break tx uniformity & can enable unknowing links), and make binning implementations more vulnerable to particular attacks. So bringing the topic of unlock times back up to try and move toward a decision on what to do with them.
-
jberman
Encrypting unlock times is possible at cost of doubling verification time and increasing tx size. Which seems overkill for a feature barely anyone uses today
-
jberman
Thoughts on how to reach consensus? Seems no one really loves the feature, so no one cares much about it to go one way or another. Is there precedence for deprecating a feature like this?
-
gingeropolous
imo, they seem a novelty
-
sgp_[m]
tbh I'm happy to simply write off binning right now
-
selsta
yea, I don't think they are much used
-
ErCiccione
maybe a dedicated issue could help? So we can see points in favor and points agains? unless there is already one
-
selsta
I don't know any important use cases for them
-
merope
wait, I thought atomic swaps relied on lock times?
-
gingeropolous
precedence? perhaps axing of the clear format tx id or whatever it was.
-
sgp_[m]
ErCiccione: binning has been suggested countless times over many years
-
UkoeHB
merope: no on the Monero side
-
jberman
ErCiccione dedicated issue for handling the unlock time:
monero-project/research-lab #78#issue-726924520
-
sgp_[m]
in practice, ringsizes are too small, and it involves many complexities
-
merope
(or at least, one of the proposed implementations? comit maybe?)
-
Halver[m]
shouldn't a feature like unlock time be treated elsewhere as in the official wallets ?
-
rbrunner
Would existing locks honored if we decide to ax them e.g. in our next-gen protocol?
-
ErCiccione
jberman: nice. Thanks
-
gingeropolous
paymentID. that was deprecated because it didn't do many useful things, but it was replaced with something better.
-
gingeropolous
well it did useful things, but poorly
-
gingeropolous
perhaps thats something to throw into the lelantus / seraphis thing - can these new protocols do some kind of timelock thinger?
-
gingeropolous
in a better way
-
isthmus
@rbrunner interesting question, I would lean towards yes
-
isthmus
(should honor previous timelocks)
-
UkoeHB
rbrunner: yes, since old outputs would be spent using CLSAG
-
UkoeHB
so there is no issue
-
rbrunner
Ok then, good to know
-
sgp_[m]
yup no issue with past compatibility there :)
-
UkoeHB
gingeropolous: not that I know of
-
jberman
Will confirm no swap protocol has plans to use the feature
-
carrington[m]
A consideration for the next gen transaction protocol should also be whether payment channels are possible
-
jberman
Are there any proponents of keeping the lock time assuming not?
-
UkoeHB
carrington[m]: I think someone would need to study that specifically.
-
sgp_[m]
Well, I'm for keeping the lock time as-is for this hardfork, and I'm cautiously for removing it for the next hardfork (but there's a lot of TBD there)
-
gingeropolous
i would vote to deprecate them due to their privacy breaking nature and lack of utility
-
rbrunner
I would vote for retiring them with the HF to the next-gen protocol, for a clean cut
-
sgp_[m]
gingeropolous: are you suggesting that for this immediate update? way too soon imo
-
gingeropolous
i mean they are really only used for 1 purpose currently - im not gonna spend my monero until 2099 ... right?
-
isthmus
hahah
-
gingeropolous
well no we're not talking what goes into the next hf. thats for the dev discussion :)
-
jberman
I figure as soon as someone presents a fleshed out compelling use case that actually needs to use lock times, like payment channels, then there would be no resistance to bringing them back
-
UkoeHB
It seems 1hr was not long enough for this meeting, there are still 3 items on the agenda. How about we schedule another meeting for 1wk from now at the same time (1700 UTC), so all agenda items get proper attention?
-
sgp_[m]
okay, just good to attack rough timelines to these discussions I think
-
Rucknium[m]
Ok I will talk about (3). (Let me know if this doesn't go through to IRC correctly.) I will repost my "update" from above:
-
Rucknium[m]
My main thing is working on a roadmap to improve the mixin selection algorithm. Within 12 hours I will submit the roadmap to the Vulnerability Response Process in part so that moneromooo and luigi1111w can redact any sensitive parts before release. jberman and isthmus have seen a draft of it.
-
Rucknium[m]
Then I will submit a CCS proposal to execute it
-
wfaressuissia
why not to finish right now ? there are a lot of important things and 1 hr / 2 weeks is too small quota to discuss something
-
wfaressuissia
s/finish/continue/
-
UkoeHB
I am gone in 2mins
-
UkoeHB
but the meeting can continue without me if you want
-
rbrunner
Seems good to me to adjourn. We are not in such a hurry to do everything today, seems to me
-
Rucknium[m]
It's a two-stage execution plan. First, what I have termed Optimal Static Parametric Estimation of Arbitrary Distributions (OSPEAD). It's a medium-term solution to stop the bleeding.
-
ArticMine
We can have a meeting in 1 week
-
isthmus
I also have to head out
-
isthmus
+1 ArticMine
-
isthmus
Would be good to reconvene next week
-
gingeropolous
weekly ftw
-
rbrunner
Older people are also a bit exhousted after one such hour :)
-
jberman
In for meeting next week
-
Rucknium[m]
I would be OK with weekly.
-
rbrunner
The Return Of The MRL Meetings.
-
ArticMine
I am fine with weekly
-
carrington[m]
Can someone change the channel description to have the next weeks meeting agenda? Once one is created
-
rbrunner
Yeah, at least until the backlog is cleared.
-
isthmus
For next week I'll have a postmortem of the transaction volume anomaly from a few weeks ago
-
rbrunner
Ah, a cliffhanger
-
rbrunner
Clever
-
isthmus
;- )
-
isthmus
Tune in next week
-
isthmus
Same bat time, same bat channel
-
UkoeHB
Can someone grab logs?
-
carrington[m]
rucknium[m]: Do you have a write up that can be linked here for people to find in the meeting logs?
-
wfaressuissia
-
Rucknium[m]
carrington: Yes I have a write-up. No, I cannot share it until it has been sanitized by the Vulnerability Response Process.
-
sethsimmons
carrington[m]: I can change topic, just ping me once created
-
carrington[m]
Logs posted
-
Rucknium[m]
carrington: It looks like something is wrong with the logs. Not everyone's username shows up
-
carrington[m]
Gah, IRC usernames seem missing
-
carrington[m]
It's because of the <> formatting
-
rbrunner
Yeah, saw it, maybe the Libera log would be better
-
rbrunner
Or did GitHub eat the usernames?
-
carrington[m]
Github did it lol
-
rbrunner
Quote somehow the whole log? ```` or so?
-
hyc
time to :%s/</</g
-
rbrunner
Not sure about MarkDown
-
carrington[m]
I'll have to manually reformat unless someone has another source without the formatting issue
-
rbrunner
The Libera log that wfaressuissia posted above, have a look
-
hyc
^ just search and replace all the < with <
-
rbrunner
-
rbrunner
Arg ... without the double quote at the end of course
-
gingeropolous
did u get a good log? i pulled up my logfile
-
hyc
-
carrington[m]
Fixed
-
rbrunner
Thanks, looks better now :)
-
Rucknium[m]
Did we know about this paper?
-
Rucknium[m]
-
Rucknium[m]
Someone posted in r/Monero about it
-
Rucknium[m]
-
Rucknium[m]
"This can be seen as a theoretical con-
-
Rucknium[m]
firmation of the approach used in Monero, albeit condi-
-
Rucknium[m]
tioned on the strong assumption that Monero chose a
-
Rucknium[m]
good ˆS."
-
Rucknium[m]
^ "S" is the distribution for the mixin selection algorithm. Hmm, yes it is a "strong" assumption that a good S was chosen.
-
carrington[m]
Seth agenda posted
-
carrington[m]
-
sethsimmons
How's that?
-
Rucknium[m]
-
Rucknium[m]
Can someone help me decode this notation? coinstudent2048 ?... (full message at
libera.ems.host/_matrix/media/r0/do…f1ad983a2ab0a4cac3566a86bdbc200208a)
-
Rucknium[m]
Top of page 4 of the PDF
-
Rucknium[m]
Oh, wait, "Logarithms are either with base 2,
-
Rucknium[m]
denoted by lg..."
-
Rucknium[m]
Who denotes log() as lg()? Whaaaat?
-
midipoet
sgp_[m]: what's the privacy loss by forcing 16 outputs for every transaction?
-
sgp_[m]
my first impression is that this is yet another paper recommending binning
-
sgp_[m]
midipoet: it would be a similar effect described in this fuk piece ironically, lol:
medium.com/@crypto_ryo/on-chain-tra…-and-other-cryptonotes-e0afc6752527
-
midipoet
UkoeHB: is the scanning/validation increase linear (or worse) if a wallet forced 16 outputs for every transaction? (Or some other number)
-
sgp_[m]
having extraneous outputs is significantly worse
-
midipoet
Because there is more chance that you have to combine outputs in the subsequent transaction that have come from the same previous transaction?
-
sgp_[m]
basically yes, combining outputs where unnecessary is bad in general
-
sgp_[m]
it also comes with the cost of additional rings
-
midipoet
yeah, I think I get it. Though, I wonder could you compensate with output selection algorithm - which is why I asked about it being a net privacy gain. Having said that, I was just thinking out aloud.
-
sgp_[m]
the big privacy gain is the indistinguishability of every transaction having 16 outputs
-
midipoet
yes. I definitely get that bit.
-
sgp_[m]
but it's far better to use blank outputs rather than splitting the value for the same recipient among several outputs
-
midipoet
But the big loss is that subsequent transactions will need to combine outputs, and those combinations can be identified within rings
-
midipoet
Which is why the 0 value outputs would be better, as you could (in theory) bin them, so they don't get used in rings
-
coinstudent2048[
Rucknium: what PDF? Btw, I sometimes see lg() when base is 2... oh it's indicated hahaha
-
Rucknium[m]
-
moneromooo
UkoeHB: I have a few comments, the rest of the changes is running tests now.
-
coinstudent2048[
Rucknium: That lg() is very confusing. I saw some websites use lg() to mean base 10.
-
Rucknium[m]
coinstudent2048: I have about had it up to here with computer scientists! 😜
-
sech1
lg() meaning log2 is pretty standard in computer science
-
gingeropolous
computer science meats statistics
-
gingeropolous
hrm, the all have 16 output idea might be neat
-
Rucknium[m]
gingeropolous: meats? #monero-beef:monero.social
-
gingeropolous
if the other 15 are 0, they won't get clumped together
-
gingeropolous
lulz
-
» moneromooo looks at the channel with suspicion
-
gingeropolous
so you get a funnel in and then a fan out
-
sech1
did you forget that 16 output transactions are much heavier?
-
Rucknium[m]
coinstudent2048: My question is this: which is better: Optimal "mimicking" or "partitioning". I can't figure it out from a quick look.
-
gingeropolous
and we can finally use the term fake output and mean the product of a transaction that is fake
-
gingeropolous
bah, who cares
-
gingeropolous
magnetic fields on tiny bits of metal were meant for storing data, so lets store some data
-
gingeropolous
i feel like this idea of having fake outputs has been kicked around a while
-
gingeropolous
perhaps the reason its often left alone is the weight
-
gingeropolous
BUT if variable number of outputs is breaking privacy / fungibility, then....
-
sech1
forcing all transactions to 16 outputs will slow down wallet scanning, what... 5-8 times?
-
sech1
Really not well-thought idea
-
gingeropolous
i wonder if there's a way to make the important part of a transaction output somehow stored across multiple piece of data ... no...
-
gingeropolous
thats just optimization sech1
-
» moneromooo wonders why gingeropolous' R stuff takes hours or days to run then
-
Rucknium[m]
moneromooo: Lol. It is easy to write really slow R code. Check out "The R Inferno"
-
Rucknium[m]
On the other hand, if you keep in mind some key issues, then it is easy to write fairly fast code.
-
Rucknium[m]
And if you really need speed, there is Rcpp , a package to do in-line (or imported) C++ calculations to feed into R.
-
gingeropolous
well, perhaps there's a magic number of forced outputs that is a middle ground between privacy gains of uniformity and the cost of heavy txs
-
coinstudent2048[
Rucknium: I don't know... I assume that "mimicking" is like the current monero setup, while "partitioning" is classifying tx's into classes.
-
Rucknium[m]
Mimicking is what Monero currently tries to do, but it does it poorly. My project is to improve the mimicry.
-
coinstudent2048[
Hmm... I downloaded the paper. I'll say "I'll read", but most likely this will take too long for me to understand, but at least the notation *seems* understandable.
-
Rucknium[m]
coinstudent2048: Yeah it's fairly complicated, although at the end of the day it may be saying a whole lot of nothing. Tough to say at this point.
-
UkoeHB
midipoet: worse than linear, because right now 2-out tx can abuse change outputs for 50% speed up on scanning (even if only subaddresses are supported)
-
UkoeHB
* not speed up over current scanning, but relative to 16outputs with subaddresses
-
UkoeHB
* assuming view tags are implemented
-
jberman[m]
forcing 16-output tx's would probably end up shifting a higher degree of tx deformity to the input side of tx's too
-
jberman[m]
instead of mostly 1- and 2-input tx's that we see today, you'd see a wider range, potentially clusters that reveal information
-
atomfried[m]
can i read some kind of summary of the meeting?
-
Rucknium[m]
atomfried: Not a summary. This is the whole log:
-
Rucknium[m]