00:16:01 <RavFX[m]> They probably going to use quantum shit to destroy TLS before touching to Monero
00:16:02 <RavFX[m]> If it every work for that kind of purpose, it's all still theorical
00:17:39 <RavFX[m]> And monero probably still going to need to be targeted "per transactions" and so will take considerable amount of time plus it probably going to be able to crack only one of the many monero algo. Better put all that power on other more profitable shit.
00:17:51 <RavFX[m]> Thru, quantum resistance is a good thing to have still
00:18:50 <RavFX[m]> The more way to protect, the better
00:19:48 <RavFX[m]> oh my bad, I thought I was in #monero:monero.social 
05:43:26 <kayabanerve[m]> monerobull: UkoeHB: The issue with FROST is solely key-gen, not signing, whereas Monero sucks for both. I've tested 333-500 groups before without issue, and without threading (where this is very parallelizable). I believe it took 20 minutes of real time for key gen + signing, where signing was ~0.7s a party.  That'd place 333-500 key gen at (14 * 60 / 500). Considering that's just 1.68s, I think I may be a bit low, but...\
05:46:34 <kayabanerve[m]> s/*/\*/, s/...\/.../
14:55:25 <UkoeHB> ah