-
chaser[m]
ah ok, so that's what's called the synthetic distribution. then how can one arrive at the observed distribution?
-
UkoeHB
you look at the relative age of tx ring members compared to the tx age
-
chaser[m]
got it, thanks
-
ErCiccione
Hey folks. I added an Ethercalc spreadsheet to the matrix room. I thought could be useful to people here for sharing calculations, idea, functions or whatever else. The link is
ethercalc.net/!toFcRZtpaiwiyapgVO:matrix.org_MRL_spreadsheet, but you should see it pinned on the top of this room
-
ErCiccione
In any case you'll see it on the sidebar on the right.
-
ErCiccione
Let's see if people find it useful, otherwise we can easily remove it
-
UkoeHB
-
UkoeHB
I finally figured out, after 3 years, why we need mul8 in the Diffie-Hellman key derivation used to make sender-receiver secrets (`generate_key_derivation()`). Without mul8, you can leak if the local private key is a multiple of 8 or not. Suppose the non-local DH partner (attacker) sets their pubkey to `K^p_nl = k_nl*G + K^h` (for `k_nl` non-local privkey, `K^h` in cofactor subgroup). The local DH partner computes some public
-
UkoeHB
result of using the DH derivation `r(k_l * K^p_nl)` and returns that result to the nonlocal DH partner (for example, true/false on identifying an owned cryptonote-style output). The nonlocal partner then just tests `r(k_l * K^p_nl) ?= r(k_nl * K^p_l)`. If the test succeeds, then `k_l` is a multiple of 8.
-
UkoeHB
btw h4sh3d, this also applies to multisig, so I will be updating the PR today
-
UkoeHB
-
UkoeHB
1. greetings
-
UkoeHB
hello
-
ArticMine
Hi
-
Rucknium[m]
Meeting time :)
-
rbrunner
Hi there
-
gingeropolous
hi
-
SerHack
Hi
-
carrington[m]
Howdy
-
gingeropolous
.summon bridge
-
» gingeropolous kicks bridge
-
jberman[m]
hello :)
-
UkoeHB
2. let's start with updates
-
gingeropolous[m]
lets go relay
-
one-horse-wagon[
Hello everyone.
-
crypto_grampy[m]
heyo
-
carrington[m]
Looks like the IRC to Matrix bridge is warming up
-
one-horse-wagon[
Why am I seeing EtherCalc--MRL_spreadsheet imposed on top of matrix?
-
one-horse-wagon[
It's gone.
-
Rucknium[m]
one-horse-wagon: You can un-pin it with the "..."
-
one-horse-wagon[
I did. Thank you.
-
Rucknium[m]
My updates: 1) I created an animated statistical Monero logo. It can be used for marketing research projects I suppose.
-
Rucknium[m]
-
Rucknium[m]
2) Work on the decoy selection algorithm continues. The feedback process is ongoing.
-
UkoeHB
Me: This week, I added two variants to my Seraphis PoC. I have decided not to do one other variant (using a modified grootle proof), since other perf tests showed it had no advantages over the variants I have right now (which use concise grootle). The Firo guys think the modified grootle can perform better, but I did my best to optimize it and couldn't improve it enough to justify using. I also don't really feel like implementing
-
UkoeHB
a PoC of lelantus-spark. It is probably ~equivalent to my `MockTxTypeConciseV1` (maybe +/- a few percentages in size/verification cost). So... that means my PoC is basically done for perf testing :). gingeropolous[m] I will be hitting you up to pump some numbers on your beefy machine.
-
Rucknium[m]
3) Working with gingeropolous on defining hardware requirements for a research computing server.
-
jberman[m]
(1) I updated the binning algorithm PoC, it's ready for review. Refresher: there was a flaw in the originally proposed algo, and I modified the approach to use bins of a fixed block size, rather than a fixed number of outputs
-
jberman[m]
(2) I've made solid progress on view tag support, tentatively want to say I may have it done much sooner than originally thought
-
rbrunner
Strange how long we had such a gem like the view tag idea just gathering dust.
-
gingeropolous
are there any implications for view tags once ringsize goes massive with seraphis?
-
UkoeHB
no
-
Rucknium[m]
rbrunner: That's why I put "cat herding" on the MRL meeting agenda for later.
-
one-horse-wagon[
Rucknium. Your logo is in the public domain for anyone to use?
-
UkoeHB
gingeropolous: ringsize is for tx INPUTS, view scanning is for tx OUTPUTS
-
gingeropolous
roight roight roight
-
UkoeHB
rbrunner: all it takes is someone to implement; there hasn't been anyone willing/able to implement it until now I guess
-
UkoeHB
personally, I didn't know C++ 1.5yrs ago
-
Rucknium[m]
one-horse-wagon: My interpretation is that it is CC BY-SA 4.0 license since it is somewhat derived from the original Monero logo. The code to create it is MIT. See
-
Rucknium[m]
-
rbrunner
Hmm, I think mixed in there is also a failure to recognize the importance. Not only "nobody around to implement".
-
Rucknium[m]
one-horse-wagon: So, basically anyone is free to post it anywhere. Go post it!
-
rbrunner
But anyway, nice to have it going now :)
-
one-horse-wagon[
Very good. Thank you.
-
UkoeHB
wfaressuissia: are you around to give an update on Drijvers mitigation? technically a -dev issue, but also if interest here
-
UkoeHB
or*
-
UkoeHB
of*
-
wfaressuissia
it isn't ready yet, is it enough precision of update ?
-
UkoeHB
lol thanks
-
UkoeHB
3. well we can do open discussion if anyone has anything
-
UkoeHB
from agenda or otherwise
-
Rucknium[m]
Decoy Selection:
-
hyc
rbrunner: we can't solve everything right away, otherwise there'd be nothing to talk about... :P
-
gingeropolous
good ol' decoy selection
-
Rucknium[m]
ArticMine gave me great written feedback on OSPEAD. One thing he suggested was that the upcoming hard fork can be leveraged to investigate the properties of decoy selection in the wild. In other words, waiting until the hard fork will give us a discontinuity to work with since the ring size will suddenly increase 11-->16
-
ArticMine
I completed my feedback to OSREAD
-
Rucknium[m]
The status of OSPEAD right now is that I am continuing to receive feedback, but the next step is for me to give a modified plan to ArticMine based on his feedback. Then my CCS proposal may move forward shortly after. I still plan to soon release a version of my OSPEAD technical specification, i.e. "Document A", before my CCS goes to the Funding Required stage.
-
Rucknium[m]
Any questions?
-
wfaressuissia
What's the location of that feedback ?
-
Rucknium[m]
The feedback from ArticMine was distributed to all those who have access to my HackerOne submission.
-
carrington[m]
Roughly how many pages will Document A be?
-
Rucknium[m]
That includes isthmus, jberman, luigi1111, moneromooo, sgp, binaryFate, and Syksy.
-
Rucknium[m]
Right now Document A is about 13 pages. It will get longer.
-
carrington[m]
(Because some people said the hackerone submission was very very long)
-
Rucknium[m]
jberman suggested I add some things.
-
Rucknium[m]
If readers don't want to slog through Document A, that's fine. It will be there for transparency purposes.
-
Rucknium[m]
It's also quite technical.
-
rbrunner
So there will be TL;DR :)
-
carrington[m]
I am looking forward to digging into it! 🙂
-
one-horse-wagon[
It would be nice to see Document A to get more specific details and have an idea of what is being discussed in Hackerone.
-
Rucknium[m]
I mean, I will try to explain in simple terms the overall idea as well, but the purpose of writing Document A was specifically to give a detailed description.
-
ArticMine
In summary I believe that the overall approach is feasible. I am waiting for Rucknium's modified plan
-
wfaressuissia
hackerone submission replies are not encrypted and can be read by hackerone itself, right ?
-
Rucknium[m]
Document A is basically an extension of my HackerOne submission. I said in my HackerOne submission "Here's a rough outline of what I plan to do" in about a page of text. Document A is a deep dive into what I meant.
-
Rucknium[m]
wfaressuissia[m]: I think HackerOne is not end-to-end encrypted. Therefore, I did the encrypting myself, with the PGP keys of luigi1111 and moneromooo. Taking no chances.
-
jberman[m]
TL;DR on my suggestion: use the real output data collected by Moser et al to fit a plausibly better distribution than the gamma distribution, using one of the multiple methods of fitting the distribution described in Document A
-
Rucknium[m]
There are a few messages in H1 that are not e2ee encrypted, but they don't reveal much.
-
Rucknium[m]
jberman: Yes, that's a good summary of your suggestion. Basically, a dry run to show how it would work.
-
wfaressuissia
UkoeHB: What's the next step after complete seraphis_perf branch ?
-
UkoeHB
wfaressuissia: I need to run the perf tests now. Then make nice plots, then add them to the paper, then update/finalize the paper with coinstudent2048[ 's hard work on security modeling.
-
ArticMine
<jberman[m]> TL;DR on my suggestion: use the real output data collected by Moser et al to fit a plausibly better distribution than the gamma distribution, using one of the multiple methods of fitting the distribution described in Document A <--- This is a start, but I would not give up completely on the more recent data. My take on this is that It gets harder as we increase noise via ring size increases / binning.
-
ArticMine
So there is still merit in the OSREAD approach in addition to increasing noise
-
wfaressuissia
"... hard work security modelling" Are these definitions and related proofs public ?
-
wfaressuissia
at least definitions of required theorems to prove protocol securiy
-
wfaressuissia
s/securiy/security/
-
UkoeHB
-
Rucknium[m]
Doug Tuman asked me to speak about decoy selection issues on his podcast. For various reasons, I don't want to go on a podcast at this time. Is there someone who would like to talk about decoy selection? I have jberman, isthmus, and ArticMine in mind.
-
jberman[m]
Agree ArticMine, I figured that start would give a bit more clarity to Document A
-
ArticMine
I see increasing noise via ring size increase / binning as complimentary and not a replacement for OSREAD
-
ArticMine
I would not mind doing a podcast. I can be tough while trying to keep the details secret
-
ArticMine
My preference would be to do it after the next HF
-
Rucknium[m]
ArticMine: "It" here meaning the podcast or OSPEAD, or something else?
-
ArticMine
OSREAD / decoy selection
-
one-horse-wagon[
I would suggest waiting on doing any podcasts until there is no reason to try and keep details secret.
-
one-horse-wagon[
There are many other things to talk about having to do with Monero.
-
ArticMine
Which in my view is after the the next HF
-
Rucknium[m]
ArticMine: I agree. I think it wouldn't be feasible to fully research and implement OSPEAD before the next hard fork, anyway. And with a HF, we have additional data we can use.
-
Rucknium[m]
Upcoming is the Science of Blockchain Conference. Submission deadline is Nov 23:
-
Rucknium[m]
-
Rucknium[m]
I think it could be feasible to submit our work on the mid-2021 transaction volume anomaly as a work-in-progress.
-
UkoeHB
Do you have to attend in-person?
-
Rucknium[m]
UkoeHB: I am unsure.
-
Rucknium[m]
FYI: Just a few minutes ago isthmus wrote a long comment on my CCS proposal:
-
Rucknium[m]
-
UkoeHB
We are at the end of the hour. I will call it here. Thanks for attending everyone.
-
Rucknium[m]
Same time next week, I presume?
-
Rucknium[m]
UkoeHB: Thanks for chairing the meeting.
-
UkoeHB
sure
-
UkoeHB
next week same time yes
-
isthmus
Hmm, I’m guessing that the entity who generated the anomalous transaction volume is monitoring this room. It would be awesome if we both submitted talks to the “Attack analysis and threat modeling” topic of SBC. There’s no way the organizers would be able to resist putting our talks together (both sides of the coin would be a great conference session story arc). I'm in if you are, dear mystery wallet. ;- )
-
isthmus
I went to sbc back in 2019, it was a great conference
-
Reuben[m]
I like the Lasker reference isthmus @isthmus:libera.chat
-
Rucknium[m]
isthmus: I was thinking the same thing, regarding the conference. How fitting that would be 🙃
-
UkoeHB
I updated the multisig PR so DH derivations are mul8 before being used.
-
morituritesaluta
What is this spreadsheet widget that shows a "403 Forbidden" for me in this room?
-
UkoeHB
ErCiccione: can you set the default to 'not pinned'?
-
ErCiccione
UkoeHB: Sure.
-
Guest90
Hello everyone, has anyone used the code for data anonymity in other areas besides fintech? Healthcare to be exact
-
UkoeHB
no
-
Guest90
OK. I am aiming to use it for data anonymity for patient data analytics.
-
Guest90
Let's see how it goes
-
Guest90
Thanks
-
Rucknium[m]
Guest90: Interesting idea. Do you have a GitHub repo or anything like that, or is it still an early-stage idea?