-
UkoeHB
reminder: meeting in 4.75hr (1700 UTC)
monero-project/meta #611
-
gingeropolous
meetings like kinda soon right?
-
sethsimmons
10min in theory :)
-
asdf234[m]
>.>
-
asdf234[m]
>>.>
-
asdf234[m]
hello!
-
UkoeHB
meeting time:
monero-project/meta #611 I will take chair unless someone else steps up
-
UkoeHB
1. greetings
-
UkoeHB
hello
-
Rucknium[m]
Hi
-
rbrunner
hi there
-
Halver[m]
Hello
-
asdf234[m]
hello! here to watch
-
jberman
Hello
-
carrington[m]
Howdy
-
UkoeHB
Today we will skip updates in favor of agenda items.
-
UkoeHB
2. Improvements to the mixin selection algorithm
-
wfaressuissia
Hello
-
sethsimmons
Hi all
-
gingeropolous
hi
-
rottenstonks
waddap.
-
Rucknium[m]
Mixin selection algo: I submitted my Vulnerability Response Process submission a week ago. moneromooo has looked at it. Not sure exactly what I can share from that conversation. Anyway, I expect to have a draft CCS by tomorrow or Friday and do the PR thing on the CCS website
-
Rucknium[m]
Work is proceeding apace
-
Rucknium[m]
jberman has some updates on enforcement of the distribution at the consensus level I think
-
jberman
Reminder of 4 areas are:
-
jberman
1. Integer truncation in the wallet (e.g.: `3 / 2 = 1`)
-
jberman
2. Binning
-
jberman
3. Modifying the distribution estimator (@Rucknium spearheading this)
-
jberman
4. Validating correct algo used at consenus
-
Rucknium[m]
I guess I have also been taking a dip into the literature. The number of papers on Monero has been increasing rapidly. That's part of the agenda item on MRL structure.
-
jberman
[1] Integer truncation is still out for review in PR 7798, nothing to update there
-
jberman
[2] Binning is still mostly relevant to discuss in context of what to do with timelocks, again
-
jberman
[3] Ruck's update clarifies what he's up to there
-
jberman
[4] Validating the correct algo used at consensus: I shared a poc for validation at consensus level, but imo it is still premature to get deep into the weeds going through it
-
Rucknium[m]
I agree that [4] is going to be very tricky. It will need months of dedicated study.
-
UkoeHB
[2] Binning: I think if we want large rings, then this will become a problem if timelocks aren't changed. To reference large rings without any deterministic compression techniques, requires a lot of data. Suppose 100 ring members - at 2-5 bytes per varint offset, this can be 200-500 bytes (vs 20-40 bytes currently with 11 ring members).
-
sethsimmons
AFAICT timelocks have no support, and could be removed without any major ecosystem effect.
-
gingeropolous
^
-
sethsimmons
I haven't heard from a single person or project that uses them, atomic swaps do not rely on them, and wallets do not normally use/allow them except official CLI.
-
UkoeHB
It would be helpful for people to look at the alternative solutions and express opinions/ideas (instead of silently agreeing).
-
sethsimmons
I don't think there are any issues with deprecation there.
-
Rucknium[m]
Seth For Privacy: jberman has written up some initial thoughts about ecosystem impact here:
-
Rucknium[m]
-
jberman
I think the most interesting known use case for it is proof of unspent funds
-
jberman
Described there and in that discussion
-
carrington[m]
Alternative solutions?
-
moneromooo
FWIW I removed unlock_time for all txes except coinbase and nothing broke.
-
rbrunner
You mean in a test branch of yours?
-
moneromooo
Yes (TF).
-
Rucknium[m]
People in r/Monero are railing against Binance and saying that Binance and other exchanges should release info on proof of funds. Could time locks help with that? Just throwing out ideas.
-
moneromooo
Proof of balance does not use timelocks.
-
noizecore[m]
encryption option sounds like the best bet besides the increase in t size
-
noizecore[m]
how much bigger are we talking?
-
noizecore[m]
s/t/tx/
-
UkoeHB
noizecore[m]: something like 25-50%
-
sethsimmons
Just read the jberman details, still all for removal.
-
jberman
Right, people/Binance could use that proof of balance (get_reserve_proof) instead
-
sethsimmons
The size/verification loss due to encryption is way too major, and leaving un-encrypted goes against a core tenet of Monero -- standardize TXs as much as possible.
-
noizecore[m]
UkoeHB: and besides that it has a clear benefit over all other options yeah?
-
sethsimmons
Not to mention the issues with binning etc.
-
moneromooo
It does leak private info though (ie, which outputs are yours IIRC).
-
sethsimmons
Increased dev time and no real use case ATM.
-
UkoeHB
it does? I haven't looked at it too closely
-
moneromooo
Though that could be mitigated. It uses 1-rings IIRC. Could be made to use 11-rings or whatever else.
-
sethsimmons
The encrypted option would involve extra dev work AFAIK.
-
moneromooo
In fact, it could use huge rings since we don't really care that much about size or verification time.
-
Halver[m]
My understanding is that, if needed, a timelock feature can probably be implemented on the client side.
-
Halver[m]
(but I may be wrong ?).
-
Halver[m]
So I don't see as crucial to put such a feature in the protocol.
-
Halver[m]
s///
-
moneromooo
Anyway, for unlock_time, my preference is remove and add later if needed for L2 purposes or the like (and possibly with different semantics).
-
gingeropolous
+1
-
sethsimmons
moneromooo: Agreed!
-
UkoeHB
I also prefer to remove. It is a legacy thing mainly used to lock coinbase outputs (probably added for that purpose originally).
-
sethsimmons
Can coinbase outputs be locked another way?
-
sethsimmons
What happens to the 60 block lock if unlock_time is removed?
-
noizecore[m]
UkoeHB: how would this affect UX?
-
sgp_[m]
hi all, sorry I'm late
-
moneromooo
You could keep it for them.
-
sethsimmons
Or can it be used for just coinbase without effecting binning?
-
jberman
Just an implementation detail, not an issue sethsimmons
-
sethsimmons
Ok, great :)
-
rbrunner
Just hardcode then?
-
UkoeHB
noizecore[m]: it would simplify UX a bit, by removing some options
-
jberman
Ok, I think we can move on from timelocks, don't need to take up the whole time on it
-
UkoeHB
jberman Rucknium[m] anything else to add about agenda item 2? Points we should put more attention on?
-
jberman
Summary: consensus continues to form strongly for removing and bringing back if desired
-
Rucknium[m]
No, I am done with item 2
-
sgp_[m]
moneromooo: +1
-
UkoeHB
jberman: ?
-
UkoeHB
3. Analysis of July-Aug 2021 tx volume anomaly
-
UkoeHB
isthmus:
-
Rucknium[m]
According to my impression, we have produced overwhelming evidence that the tx volume anomaly was due to the actions of a single entity...
-
Rucknium[m]
Furthermore, doing so was incredibly cheap if our calculations were correct.
-
Rucknium[m]
isthmus seems not to be here right now, but myself jberman, carrington, and gingeropolous have helped
-
Rucknium[m]
I think the results will be released within a day or two
-
rottenstonks
👀 single entity?
-
Rucknium[m]
But on every metric we looked at, the conclusion seems inescapabale.
-
UkoeHB
I think the fee analysis has generally considered spam in the minimum penalty free zone of 300kB to be acceptable.
-
carrington[m]
The conclusions are spooky and should motivate a network upgrade ASAP
-
sgp_[m]
approx how many transactions do you think we created this way?
-
moneromooo
"we" ?
-
gingeropolous
lulz. prolly "were"
-
rottenstonks
as in the monero network?
-
sgp_[m]
hehe, "were"
-
Rucknium[m]
This isn't group consensus, but it is my impression that the characteristics of the anomaly do not fit an actual malicious actor. They better fit an academic researcher or just some greyhat hacker that did it for the lulz (it would have been cheap enough to do it for lulz)
-
sgp_[m]
what would make you think that
-
UkoeHB
It could also be a malicious entity testing things out.
-
Rucknium[m]
1) They did not try to hide their actions at all
-
Rucknium[m]
2) The "flood" wasn't quite enough to seriously harm privacy
-
Rucknium[m]
UkoeHB Yes, that is one possibility.
-
sgp_[m]
I'll wait for the writeup, but I have many other questions still
-
rbrunner
Me too
-
Rucknium[m]
isthmus thinks that a hardfork, or whatever is needed, needs to come soon to fix the low fee issue.
-
gingeropolous
yes .. this is important to discuss, but i dunno how productive this can be if the report isn't available for review etc.
-
wfaressuissia
"[4] is going to be very tricky. It will need months of dedicated study." can you define few verifiable metrics that will be improved and can be verified ?
-
wfaressuissia
s/and can be verified//
-
rbrunner
People probably won't agree that we have a "low fee issue"
-
Rucknium[m]
wfaressuissia[m]: That's earlier in the agenda, but what do you mean?
-
carrington[m]
Fee increase + ruck and jbermans decoy selection work would go a long way to mitigating such an attack
-
Rucknium[m]
A single tx can be like one tenth of one cent, right?
-
rbrunner
Would that made such a flood considerably more expensive already?
-
UkoeHB
Rucknium[m]: have you looked at the fee cost if tx volume was high enough to eat into the penalty zone? Minimum fees are very very low for a reason.
-
sgp_[m]
we already have a proposal for the base fee increase
-
wfaressuissia
In general, bad decoy selection amplify efficiency of spam attack, but doesn't ideal decoy selection isn't a protection against spam attack
-
Rucknium[m]
isthmus did the fee calcs. He said "The anomalous transaction volume was paying standard fees, which at the time was about 0.000015 XMR per transaction with this construction"
-
wfaressuissia
s/doesn't//
-
sgp_[m]
and yeah it's definitely more complicated than base fee * txs, that's 1 thing floodxmr messed up in v1 of their paper
-
rottenstonks
-
rottenstonks
-
Rucknium[m]
Sorry, isthmus calcs say that the fee would have been about 0.003USD/tx , not 0.001USD/tx as I stated above. Still, very low.
-
sgp_[m]
yeah cheap in any case
-
gingeropolous
well, that chain needs to be active for ring sigs to do their thing
-
gingeropolous
*the chain
-
gingeropolous
im just stating obvious things
-
carrington[m]
Monero needs to walk the tightrope between fees being low enough to allow a big crowd to hide in, and high enough to prevent flood or big bang attacks. I don't think tx volume would plummet if fees were $0.01
-
UkoeHB
> "[4] is going to be very tricky. It will need months of dedicated study." can you define few verifiable metrics that will be improved and can be verified ?
-
UkoeHB
I am also curious about this.
-
Rucknium[m]
I suppose we can wait until the results are published and then discuss more. I expected publication by now, but there are just so many rabbit holes to go down. There still are, but the rest of the rabbit holes will have to wait.
-
Rucknium[m]
UkoeHB: What do you mean by metrics?
-
moneromooo
Maths :)
-
gingeropolous
so, whats the goal here? try and find ways to prevent flood attack? or mitigate the effect of flood attack?
-
UkoeHB
he probably means, how to assess if a proposal for enforcing distribution is worth pursuing?
-
sgp_[m]
can't prevent really
-
Rucknium[m]
Do you mean what criteria might be used to enforce the distribution used?
-
jberman
[4] is validating tx's ring members match the expected distribution of decoys. It would prevent older implementations of the decoy selection algo from making their way onto the chain
-
jberman
We could go through the chain and identify blatantly incorrect rings as a % of all rings
-
moneromooo
How will you assess whether a given change is beneficial compared to what we have.
-
gingeropolous
to me, prevention is fee based. mitigation is ringsize a bajillion and smarter ring member selection
-
moneromooo
(I assume that's what is meant by metrics)
-
jberman
openmonero is using a blatantly old implementation of the decoy selection algo that I believe can be fingerprinted
-
Rucknium[m]
UkoeHB: We already sort of know it's worth looking at since txs that don't follow the standard can stick out like a sore thumb.l The problem will get worse if and when ring size increases.
-
jberman
I think we can identify openmonero tx's
-
rbrunner
Somehow I am not quite comfortable with the thought that 1 greyhat hacker or 1 bored dev does some flooding, once, and *bang* we all already have to pay higher fees ...
-
rottenstonks
whoa, whoa. big if true. jberman
-
UkoeHB
I think the main cost of enforcing a distribution, as has been mention by others, it lack of flexibility to update decoy selection ad hoc in the face of unforseeable problems. Updating the algorithm inserts an extra dependency on core that isn't savory in the long run.
-
sgp_[m]
rbrunner: the proposal for this upgrade was written and discussed before this attack
-
rottenstonks
rbrunner: did you through MRL 70 yet?
-
Rucknium[m]
If a truly malicious party floods the blockchain with txs and therefore owns a huge share of the outputs, they could trace nearly all txs.
-
gingeropolous
interesting UkoeHB
-
rbrunner
Only a cursory glance.
-
carrington[m]
If we had binning we could have deterministic rings without the need for statistical tests, yes?
-
rottenstonks
k.
-
Rucknium[m]
That's my understanding of what a FloodXMR attack involves
-
jberman
That's my understanding carrington[m]
-
rbrunner
Well, maybe truly malicious entities can also fees that are quite a lot higher ...
-
sgp_[m]
okay there are a bunch of different overlapping topics right now being discussed at the same time
-
sgp_[m]
moneromooo: I want to get back to this
-
Rucknium[m]
rbrunner: This is also true
-
Rucknium[m]
sgp_: I think some ideas have already been floated. We don't have to enumerate all of them. It's an ongoing process.
-
Halver[m]
short paper (2014) from MRL about floodXMR
-
Halver[m]
-
rbrunner
I wonder how that complicated and time consuming [4] will fare if we are constrained for dev and/or researcher time and have many other important things.
-
carrington[m]
We can probably conclude this agenda item I guess? Summary is that anomaly analysis should motivate urgent work towards a network upgrade
-
UkoeHB
ok let's get back on track
-
UkoeHB
- [4] enforced distribution: TBD needs research (also needs to clearly describe how to evaluate if a proposal to enforce distribution is better than what we have, and doesn't weaken Monero's long-term viability)
-
UkoeHB
- fee changes: there is PR #7819 that will probably be mergable by next week or later this week; it will increase base fees, and adjusts the algorithm according to MRL #70
-
UkoeHB
- spam: a report is incoming from isthmus
-
UkoeHB
4. Triptych vs. alternatives; any new questions/comments?
-
sgp_[m]
yes all sounds good koe
-
sgp_[m]
oh quick update just for visibility
-
noizecore[m]
UkoeHB: yes how close are we to a decision? is triptych more or less off the table?
-
sgp_[m]
on lelantus spark
-
UkoeHB
Seraphis has been updated, and Spark is being updated, to fix an issue brought up by nwk (thanks :)). It causes a slight efficiency loss, but otherwise is a good step forward.
-
sgp_[m]
an outside researcher found a vulnerability that would have allowed a view key holder to burn funds
-
endogenic
fwiw it is customary, every time someone says lelantus, to belt out the word as if it is a magical incantation
-
wfaressuissia
Was it always the case that any cryptography update had final stage in form of binary predicate (safe / unsafe) implemented by security audit / paid peer review ?
-
sgp_[m]
this is being remedied
-
UkoeHB
noizecore[m]: probably no closer than last week. I think Triptych is considered a fall-back if Seraphis/Spark fall through somehow.
-
sgp_[m]
agreed more or less 👍️
-
UkoeHB
wfaressuissia: only since bulletproofs/CLSAG/bp+ I think
-
ArticMine
I would agree with UkoeHB
-
rbrunner
"allowed a view key holder to burn funds" huh?
-
sethsimmons
UkoeHB: Agreed
-
ArticMine
Sorry I got confused o nthe time
-
wfaressuissia
Also does successfully passed audit / paid review for Seraphis / <any other decen. anon. paym. system> implementation is the only requirement to use it for monero ?
-
gingeropolous
wfaressuissia, not in the earliest days. i forget if ringct went through that kind of gauntlet.
-
wfaressuissia
s/does//
-
sgp_[m]
wfaressuissia[m]: no not always, RingCT originally was not audited (which ended up being really bad)
-
sgp_[m]
and then we ended up being lucky
-
UkoeHB
rbrunner: yeah the key image contained only view key material, so a view key holder could make a malicious output to burn funds found in the view-only wallet
-
rbrunner
Ugh ... thanks for the info
-
noizecore[m]
UkoeHB: yeah i picked that up, Seraphis would be more beneficial for tx-chaining right?
-
UkoeHB
noizecore[m]: yes, depending on design decisions (and assuming no issues are found)
-
sgp_[m]
it definitely sucks but it can be addressed luckily, and it's good it was caught so early
-
gingeropolous
wfaressuissia, i wouldn't say thats the only requirement
-
noizecore[m]
whats the latest on BP+?
-
UkoeHB
> Also does successfully passed audit / paid review for Seraphis / <any other decen. anon. paym. system> implementation is the only requirement to use it for monero ?
-
UkoeHB
There are also: utility, efficiency/size cost
-
ArticMine
Do we have any figures?
-
gingeropolous
and apparently multisignature happiness
-
rbrunner
Exactly :)
-
UkoeHB
noizecore[m]: pretty sure it's audited and waiting to be plugged in
-
carrington[m]
BP+ is implemented, doubly audited and live on Wownero
-
UkoeHB
ArticMine: not yet, still a lot of work on my end to get perf mock ups how I want them
-
rottenstonks
ye, bp+ is ready to be rolled.
-
carrington[m]
Last I checked
-
rottenstonks
has been ready for a good while.
-
noizecore[m]
so whats the next step? are we still bundling it with the next protocol upgrade?
-
rottenstonks
ye, wownero has had bp+ for months...
-
sgp_[m]
ArticMine: still early for real numbers to compare apples:apples
-
noizecore[m]
from what I understand Seraphis/LS are still a while off
-
UkoeHB
is there an upcoming dev meeting to discuss bp+ planning?
-
sgp_[m]
@r4v3r23:matrix.org: that's more of a dev question
-
rottenstonks
noizecore[m]: no. there'll be a dev meeting to decide if we have a slight ring size increase, bp+ and whatever else, while we switch off to triptych, or lelantus and seraphis.
-
rottenstonks
UkoeHB: aye, there is.
-
noizecore[m]
UkoeHB: +1
-
rottenstonks
or was... not seeing the issue on meta now. smh.
-
UkoeHB
ok meeting is reaching the 1hr mark; should be punt the last agenda item (6. MRL META: Active recruitment of technical talent, MRL structure) to next week?
-
Rucknium[m]
UkoeHB: I think that's fine. And yes, let's do same time next week
-
rottenstonks
k thx, see ya next week. bai.
-
UkoeHB
thanks for the meeting everyone
-
gingeropolous
thanks all!
-
gingeropolous
interesting topic re: whether enforced ring member selection method will inadvertently lock in things and prevent future mods when necessary
-
gingeropolous
i mean, in theory, couldn't future mods be hardforked in?
-
Rucknium[m]
gingeropolous: Yes, they could. That's why I think it's not a huge issue.
-
Rucknium[m]
I have also been theorizing on a continually-updating distribution for the mixin selection algorithm, automated in consensus rules.
-
gingeropolous
if i read UkoeHB 's point correctly, i think the concern is that it would put the core maintainers in a precarious position?
-
UkoeHB
> i mean, in theory, couldn't future mods be hardforked in?
-
UkoeHB
The point is that, in the long run, hard forks will become harder to pull off.
-
gingeropolous
indeed
-
jberman
I think it's an understandable debate over whether or not the decoy selection algo should be tied to hard forks
-
wfaressuissia
How much spam txs would be enough in order to abuse it ?
-
wfaressuissia
s/much/many/
-
UkoeHB
abuse what?
-
gingeropolous
one fun thought i had somewhere a while ago was that we could somehow allow miners to to adjust consensus using the language of randomx
-
gingeropolous
it puts consensus in the hands of the miners.. but .... yah know
-
UkoeHB
somehow?
-
Rucknium[m]
gingeropolous: randomx is a programming language? I have a lot to learn...
-
asdf234[m]
wfaressuissia[m]: This would probably be more an issue of % of tx rather than a set quantity no?
-
gingeropolous
yeah. in the block header
-
gingeropolous
kinda soft forky like bitcoin
-
gingeropolous
consensus does what the code in the binary says, and then checks what the current majority of some window of block headers says to do
-
Rucknium[m]
So that I guess was part of my idea to continually update the distribution for the mixin selection algorithm. Have it at the consensus level, but specify the specific parameters in the block header. Then the block header conducts the "orchestra" of all the wlalet software. The wallet software follows what's in the block header, with some margin-of-error wiggle room.
-
gingeropolous
well not soft forky at all, sorry.
-
endogenic
i kinda dig it
-
gingeropolous
randomx is sorta kinda a programming language.
-
endogenic
wonder if it has any fingerprintability concerns
-
Rucknium[m]
^ This is very long-term stuff. My immediate work is to do a much more limited improvement
-
jberman
A continually updating distribution doesn't necessarily need to be enforced by consensus
-
Rucknium[m]
jberman: That is also true.
-
gingeropolous
i think. hyc could slap some sense into me
-
wfaressuissia
How many decoys can be marked as fake with confidence `C` by attacker with `A` amount of XMR spent on spam txs ?
-
wfaressuissia
Your work is going to reduce the above number in the worst case or on average, right ?
-
wfaressuissia
rucknium[m]
-
endogenic
wfaressuissia: doesnt that depend on fees?
-
UkoeHB
I think block header voting on consensus rules can cause network instability (i.e. arbitrary forking), since there is no trust graph to steer nodes.
-
Rucknium[m]
Or, you could force, by consensus, miners to put the necessary info in the block headers to conduct the orchestra, but the individual "players", i.e. wallet software, would not be obligated to follow the "conductor".
-
endogenic
that sounds correct UkoeHB
-
endogenic
but isn't it following the same dynamics as PoW?
-
UkoeHB
It's possible in something like Stellar, but those networks are way different from PoW.
-
endogenic
guess you still need to determine which is the leading params
-
Rucknium[m]
My idea on continually updating the mixin selection algorithm wouldn't rely on volitional "voting", but would be a formula baked into consensus
-
endogenic
ic
-
endogenic
Rucknium[m]: what formula, if you know yet?
-
Rucknium[m]
wfaressuissia[m]: I am really not a good person to comment on this. Others would be better, I think. I will comment below, but it could be wrong:
-
Rucknium[m]
endogenic: nonparametric density estimation, broadly
-
wfaressuissia
min fee can't be controlled by attacker and dictated by code currently
-
wfaressuissia
Also question, if fee goes to +inf, then that `How many decoys ...` monotonically decreasing or there will be extremum and then it will increase?
-
wfaressuissia
s/fee/base fee/
-
Rucknium[m]
So, on average, given that the ring sizes are 11, a total de-anonymizing FloodXMR "strike" would imply an increase to the tx volume of about 1,000%. That's based on my limited understanding
-
Rucknium[m]
The fact that the volume only raised by 100% makes me think that it was not a truly malicious actor. Or at least a malicious actor would have only been "testing" and not launching a full attack.
-
wfaressuissia
10x ?
-
UkoeHB
> then that `How many decoys ...` monotonically decreasing or there will be extremum and then it will increase?
-
UkoeHB
Why would fees rising affect decoys? Not sure what you mean
-
Rucknium[m]
Yeah. Attacker controls 90% of all outputs
-
UkoeHB
Rucknium[m]: with fee algo it would take 1yr to increase block size big enough to allow 90% malicious (ceteris paribus)
-
carrington[m]
Seth For Privacy I have posted an unamended agenda for the next meeting if you would like to use it for the channel topic
-
carrington[m]
-
carrington[m]
-
UkoeHB
sorry block size algo*
-
Rucknium[m]
UkoeHB: The current fee algo? or one proposed?
-
wfaressuissia
UkoeHB, block size is 60KB on overage currently, so 80% is free for spam
-
UkoeHB
one proposed, existing is even slower growth
-
carrington[m]
Not sure if the agenda needs changing as similar topics will be discussed, but I will add some links shared during the meeting for easy organization
-
Rucknium[m]
The entity was able to increase the tx volume by about 100% in just a day.
-
UkoeHB
wfaressuissia: that's true, I meant in the case of honest volume filling the penalty free zone
-
UkoeHB
carrington[m]: I think MRL Meta can be moved to the top, since it has been punted twice
-
UkoeHB
Everything about spam is in the context of the min penalty free zone - no bets are made if honest volume is low.
-
Rucknium[m]
I would also support moving it up in the list. Doesn't necessarily have to be at the top. Maybe the middle would be fine.
-
wfaressuissia
From economic perspective, after some point number of non-spam related txs may drop non-linearly with base-fee increase. It will make spam attack even easier
-
UkoeHB
That's a good point
-
wfaressuissia
Any exact math model with numbers will be 100x more useful than any text
-
wfaressuissia
base fee only discriminate users, but doesn't solve problem with decoys
-
Rucknium[m]
I believe UkoeHB will kill me if I try to analyze economic behavior with math, so no-go on that one, wfaressuissia[m] :P
-
UkoeHB
Just characterize it as engineering approximation, as it should be.
-
Rucknium[m]
Any way you like it ;)
-
wfaressuissia
Do you have any math models that shows how some privacy related metrics for decoys depends on other parameters (ring size, ...) ?
-
Rucknium[m]
If your question is directed at me, I suppose an answer is yes, but they are confidential at this time.
-
wfaressuissia
How long will it be private ? Are you sure that isn't public knowledge already for someone ?
-
Rucknium[m]
I don't know. It is sort of in the Vulnerability Response Process. I don't really understand well how VRPs work.
-
wfaressuissia
"[4] Validating the correct algo ..." Currently tx can use decoys from arbitrary (since the last hardfork) prefix of blockchain and can be submitted later. Are you going to test distribution for decoys at consensus without adding any new restrictions for tx generation ?
-
UkoeHB
wfaressuissia: one way around that is to define a ‘distribution upper bound’ for all your decoys, so tx submission timing is divorced from decoys
-
wfaressuissia
There are too much freedom for unorganized users that can be abused by single attacker in order to mark more fake decoys
-
Rucknium[m]
wfaressuissia[m]: Good question. I discussed this on Reddit before. I'll see if I can find the link. If the contunually-updating mixin selection algorithm was enforced by consensus, then people would not be able to construct a tx, wait months, and then broadcast later, probably. But there's not a huge usecase for holding onto unbroadcasted txs for weeks or months.
-
wfaressuissia
Are you sure that decoy model with less than full UTXO is fixable at all ?
-
Rucknium[m]
wfaressuissia[m]: My view is "no"
-
wfaressuissia
s/full UTXO/full set of UTXO/
-
Rucknium[m]
But doing something different would be a radical departure
-
jberman
wfaressuissia: poc for modifying tx construction such that it would also be guaranteed to match the distribution:
monero-project/research-lab #86#issuecomment-921805298
-
jberman
using the current gamma distribution/selection algo equivalent
-
wfaressuissia
I can't validate that code without any math model with privacy related metrics. There are too many things to consider at once since privacy is a property of whole system
-
jberman
ok
-
Rucknium[m]
wfaressuissia[m]: If you want to join the effort to improve some of the shortcomings highlighted here, I think that would be great:
-
Rucknium[m]
-
Rucknium[m]
-
jberman
I was just answering this question: "Are you going to test distribution for decoys at consensus without adding any new restrictions for tx generation ?"