15:38:38 One question please. When Seraphis is adopted, user can still receive funds in old CryptoNote addresses? 15:40:30 Only on the ghost chain i would assume 15:40:52 It requires a hardfork 15:41:25 Updated wallets would probably only allow you to send to seraphis addresses 15:44:01 What happens to hardcoded donation addresses you can find on websites? 15:46:15 You won't be able to send to legacy addresses. 15:46:51 So if someone send to a cryptonote address then funds are lost 15:47:09 No, the network will reject the transaction. 15:47:10 Unless the wallet he uses prevent him to send 15:47:17 Ha ok ok 15:47:29 Great thank you :) 16:46:27 I wonder when we will reach a point where we can make something like a "crypto freeze" on Seraphis, so no more changes in key derivation, address generation and such unless something quite drastic forces a change 16:47:35 Because from that point on it should be possible to build tools that build Seraphis addresses from people's private spend keys, and they could publish those addresses early 16:49:19 and vanity address generators :) 16:49:35 :) 16:50:18 Right now, with attempts to add forward-secrecy / quantum-computer hardness whatever, things still look quite in flux, IMHO a bit uncomfortably so ... 16:50:56 And the number of keys seems to continue to mushroom :) 16:51:13 I think it is good. Better a better version that an early one. 16:51:47 Yes there is no rush for that 16:52:06 Yeah, of course I am well aware what chance this clean break is. Almost irresistible. 16:52:29 Segwit addresses took years of research 16:53:05 Did they? Didn't just the introduction take years, to make them popular and universally supported by the whole ecosystem? 16:55:44 Segwit as a whole took years. Regarding addresses specifically Idk but better to take the time and have something we don't have to change again too soon 16:55:58 "Rush" is relative. As far as I understand only Seraphis will be quantum resistant. If it comes late, we will amass further heaps of transactions which will never be, and are in danger. 16:56:13 If I understood tevador and UkoeHB correctly about that stuff ... 17:30:47 "Segwit as a whole took years..." <- The neat thing is, we don't need to be backwards compatible 17:31:16 You either use the newest hardfork or you don't transact on the monero network, simple as that. 17:33:43 monerobull: Right. That sounds draconian, but BTC's numerous transaction formats are an absolute goldmine for chain analysis companies when they are checking whether coins have changed custody. 18:36:25 rbrunner: currently a seraphis user has forward secrecy against a DL-solver that doesn’t know any of their addresses, tevador has also proposed some changes that could be ‘activated’ to spend seraphis enotes in a quantum-resistant protocol 20:00:46 I see. But the argument still stands, right? The longer we wait with Seraphis, the more transactions poeple will create without forward secrecy or even activatable quantum resistence. 20:05:50 Yeah, forward secrecy of RingCT is non-existent. All it takes is one subaddress posted publicly and all your transactions will be leaked in the future. 20:07:44 And even if you never publish an address, the transaction graph will be leaked anyways. 20:16:36 "Yeah, forward secrecy of..." <- Sorry, I don't get it, maybe I missing something. How does making one address public leak the transaction graph? 20:23:08 aceitche: Something to do with quantum computers, if they ever exist in a usable form. 20:25:33 aceitche[m]: a quantum computer will be able to recover the whole RingCT transaction graph even without knowing any addresses. Publishing an address will leak all your transactions and their amounts in the future. 20:37:56 all transactions, but without recipient addresses, right? 20:39:13 unless the recipient's address also has been published somewhere, then the quantum adversary can scan through all known addresses to find a match with the stealth address of a transaction 20:39:46 yes, all incoming txs can be decrypted based on 1 public address from the wallet 20:40:21 I was talking about outgoing transactions from the wallet 20:40:55 outgoing cannot be decrypted unless the recipient's address is also known 20:41:03 right 20:41:37 but all known addresses can be tried one by one and there can be millions of them (think of exchange databases) 20:44:07 They can recover the view keys from 1 address and then simply scan for all incoming payments to that wallet. So I'd say most of the blockchain will be leaked. 21:23:08 Scary 23:02:45 Wouldn't that be easily noticed by Pedersen Commitments or counting block rewards?