12:47:15 hello, im a msc student and im doing my thesis on mpc, i was wondering if there is any research from the team or any privious work combining it with monero blockchain 13:16:11 br1ck: Please define MPC. 13:33:56 Rucknium: multi party computation 13:43:44 I'm not sure. There is a meeting in this room at 17:00 UTC, i.e. in about 3 hours, and you could ask there. 13:47:00 Rucknium[m], i see, thanks you, can i post a question in the github post of the meeting? 13:50:18 br1ck: Sure: https://github.com/monero-project/meta/issues/635 17:02:05 Meeting time :) 17:02:11 Meeting ~1hr 17:02:17 Oh it’s now crap 17:02:26 :) 17:02:51 Hello 17:03:11 Hi 17:03:19 hi 17:04:01 hey 17:05:39 hi 17:06:01 howdy 17:07:32 Um let’s do updates now. 17:09:54 I was on vacation and didn’t do anything. This week I have some ideas about how to interpret my perf data for tx throughout, and I need to start integrating coinstudent2048[‘s security modeling. 17:11:08 I have done a "dry run" of some components of OSPEAD here: https://github.com/Rucknium/OSPEAD 17:11:08 It uses the old Moser et al. (2018) data. Overall, so far so good. The minimization procedures work well. I tested the gamma, log-normal, and F distributions. Some lessons learned, e.g. can't avoid taking logs of the spend time data. 17:12:51 To be clear, the old Moser data will not be used much for the final implementation of OSPEAD since it is so old, except that it can be somewhat useful in evaluating how rapidly the spend time distribution evolves over months and years. 17:14:01 The F distribution came out looking the best, probably, but we are not anywhere near final results yet. I note that the F distribution has 3 parameters, while the gamma and log-normal distributions have two each. 17:15:17 So the F distribution may be considered to be slightly more flexible than the other two distributions simply be virtue of having more parameters to work with. 17:15:38 The dry run was suggested by jberman 17:15:47 Thanks Rucknium[m] 17:16:13 Rucknium: Is there a way for you to look at data, whether contrived or not, do a statistical attack on it and actually trace out someone's wallet? Looking at total distributions really doesn't give much information as to who is doing what, does it? 17:16:32 Looking good, need to spend more time with this to understand it 17:18:41 one-horse-wagon: For the decoys to work properly, they need to be convincing decoys, i.e. mimic real spends. If the decoys are not convincing, then an adversary can gain advantage. 17:18:53 This week I'd like to discuss requirements to get the multisig PR merged ( https://github.com/monero-project/monero/pull/7877 ). Right now, rbrunner has verified the original commit works on MMS, moneromooo has scanned the c++, h4sh3d has reviewed the core multisig address construction component library. Wallet-side code has not been reviewed (wallet2, rpc, simplewallet). At minimum, the wallet-side code needs to be 17:18:53 reviewed and approved. Maybe selsta or luigi1111 would like more review on top of that. 17:19:29 Update from me: planning to change the view tag PR to use the code base's already existing cn_fast_hash (keccak) instead of siphash today as per discussion in the view tag PR on github (finishing up final testing). I've been exploring separate optimizations to wallet scanning that have been not as fruitful as I previously thought they'd be unfortunately. Hopefully moving back over to binning/decoy selection work in the next day 17:19:29 or 2 17:19:53 Moser et al. (2018) exploited the fact that the real spend distribution is not at all like the triangular distribution that the decoy selection algorithm was using at that time. 17:21:51 Is there anyone willing and able to review the wallet-side code for the multisig PR? I cannot do it because I wrote it... 17:22:24 You mainly mean the `wallet2` changes, right? 17:22:24 in addition to h4sh3d? or generally? 17:22:38 Regarding #7877 I don't feel confident enough to review the wallet part, I never worked on (I did one small PR on it ages ago). So I think selsta or luigi1111 might be a better pick 17:22:50 Because not much changed elsewhere as far as I could quickly see 17:23:06 UkoeHB: did mooo review wallet c++ code? 17:23:26 pretty sure he just glanced at it 17:23:59 At the extreme, a statistical attack could identify real spends for a specific transaction. Think about the extreme case: Say the decoy selection algorithm never selected decoys from blocks that are 1000-1010 blocks old. In that case, if a ring member came from that range, it would be identifiable as the real spend. That particular transaction would be completely traceable. 17:26:02 The `wallet2` changes look quite challenging to understand and review to me 17:26:25 vtnerd? 17:28:18 Certainly worth to ask him to have a look, IMHO 17:29:03 interface from src/multisig is very understandable and quite simple, with someone with a good understanding of wallet2 structure (and experience) it shouldn't be that hard 17:29:45 and a bit of time :) 17:30:02 You certainly mean wallet2 non-structure :) 17:30:16 I can give a go at it, my confidence in wallet2 is increasing :) but it would be nice to get approval on it from moo or vtnerd if they're willing 17:31:08 By the way, I still wonder, does this PR alone already solve that problem that according to UkoeHB makes multisig "not recommended" currently? 17:31:29 No, only part of it. 17:32:05 Tough. 17:33:28 rbrunner: Maybe nice idea that will probably never happen: We should get developers from one of the six BCH node implementations to translate the Monero C++ code into another language, like they have done for BCH. 17:34:06 I don't think that's doable and a good idea ;) 17:34:24 Would the other/remaining part be what wfaressuissia said they would try? 17:34:28 if you want to pay for their therapy, go for it 17:34:35 ^^ 17:34:39 rbrunner: nominally... yes 17:34:55 We didn't hear much from them in the meantime, right? 17:35:12 they reported the issues on H1 17:36:13 so we will figure out how to resolve them 17:37:52 That sounds like quite some challenge. First getting this PR to merge, and that add another one still, to make multisig fully functioning until the HF 17:38:43 yes, trying to make incremental progress towards that, hence bringing it up here 17:39:03 with this one only it is anyway better than now 17:39:51 So if we find someone else jberman[m] you would give it a go? 17:40:36 No I'll give it a go now 17:41:17 I think in this light I will make functional tests again, with the current code, this coming weekend. Never mind that future PR and testing again, worst case that won't happen ... 17:41:49 I mean no second PR, no testing ... 17:42:30 MMS tests? 17:42:56 Yes 17:42:57 Have you considered adding a test to the test suite? 17:43:21 You mean automate that? Not sure that's possible at all. 17:43:25 ah 17:43:35 It's not available over RPC 17:44:28 Would be feeding keystrokes to the monero-wallet-cli binary ... 17:44:54 sounds like a great idea :) 17:45:02 Sure :) 17:45:09 lol 17:45:24 is there a way we could feed the cli with a file and it does 1 line 1 command? 17:45:45 Don't think that's available already out of the box 17:46:07 It sounds like the conclusion is: jberman[m] will review wallet-side code for the multisig PR, hopefully vtnerd can also review it. 17:47:31 Is there anything else to discuss in the remaining minutes? 17:48:29 br1ck and/or r3llun had a question about multi party computation 17:49:37 I can quickly say that next week we will make some tests at a greater scale (testnet coins) for the Farcaster project, I'll ping here and -dev next Wednesday when we are ready 17:50:07 congrats h4sh3d :) 17:50:14 Interesting. 17:50:54 I don't recall any MPC work being done with monero. There is only multisig. 17:51:23 MPC = building txs by groups of people? 17:52:27 yeah pretty sure it is a different approach to multisig that relies on Pallier typically 17:52:36 Another idea is "adaptor signatures" or "encrypted signatures"... it is multi-party but don't recall the exact definition of MPC 17:54:01 Ideas are never in short supply, reviewed code on the other hand ... 17:55:16 Typically MPC is a kind of 'enterprise' technology used inside companies... I think 17:55:46 Anyway we are reaching the end of the hour. Any last minute questions/comments? 17:55:51 My concern with using MPC is that if only one of the parties loses their key or dies, then your money is gone 17:56:25 Is MPC only N-of-N? 17:57:31 UkoeHB: oh fair enough. 17:59:42 Ok I will call it here. Thanks for attending everyone. 18:00:13 thanks 18:01:24 MPC is not only N-of-N, it allows evaluating a function commonly on private input 18:02:02 IIRC the trusted setup for zcach was a MPC 18:02:30 but you could use MPC to endup on a 2-of-3 ECDSA threshold sig