07:01:13 A proposal regarding the MRL meeting later today: https://github.com/monero-project/meta/issues/797#issuecomment-1430847786 07:02:08 "Doing the same over and over again and hoping for a sudden change in outcome is madness" 14:28:25 Since all the arguments have been made over and over "ad nauseum" for years, couldn't we just have a vote today to throw out or keep "tx_extra"? Why is everyone so afraid to make a decision? 14:29:07 This isn't a democracy, so our vote doesn't really matter. It's about convincing the core team. 14:29:25 And it shouldn't be a democracy either. 14:30:24 You are right. It is not a democracy. But, the MRL can come up with a consensus by voting, can't they? 14:30:33 Setting up a precedent for these sorts of decisions to be decided by a majority vote is a very damaging prospect. 14:31:09 a majority vote isn't consensus. maybe a 2/3 vote or something but simple majority no way 14:31:29 something near a 50/50 split is the opposite of consensus, it's contentious 14:32:01 voting on a purely technical question is idiotic 14:32:07 Even 2/3 vote is trash. 2+2=4 even if 2/3rds vote that it isn't. And you'd be surprised at how many people would vote that 2+2=5. 14:32:12 sech1: Exactly. 14:32:32 also true though I'm not sure this is a structly technical question 14:32:37 strictly 14:32:45 O.K. So don't call it voting. Call it a poll. 14:33:15 the technical question is to gather all current uses of tx_extra and replace them with something else that doesn't let users embed bee movie scripts into transactions 14:34:12 There's one easy question that can be posed to determine your position on tx_extra, as I've mentioned in the issue: are you for or against arbitrary data in Monero? Personally, I'm strictly against it. 14:35:42 And I believe that Monero's design principles and goals are against it as well. 14:37:52 "Since all the arguments have..." <- The best projects are benevolent dictatorships, and other pretty much crumble 14:39:49 If we want privacy by default transaction uniformity matters more than the flexibility tx_extra offers 14:41:40 That is not quite right: to determine your position on tx_extra [...] are you for or against arbitrary data in Monero? 14:42:39 You could have a fixed encrypted blob attached to every tx. This would allow arbitrary (within some small size constraint though) data, without tx extra, or more generally without the ability to tell whether any data is in or not. 14:43:05 You could also embed data in existing tx data (though it has other drawbacks). 14:43:25 moneromooo: Wouldn't doing this keep both parties happy? 14:43:47 moneromooo: So now everyone pays for extra tx fees regardless of whether its utilized or not, essentially making txs that don't utilize that field be unproductive. 14:44:22 If both parties are "people who want arbitrary data" and "people who want to remove extra", then yes. 14:44:40 Alex|LocalMonero: that is a very poor excuse... 14:45:29 "voting on a purely technical..." <- ^^^^ 14:45:54 moneromooo: Excuse for what? 14:46:28 For being against a mandatory fixed size encrypted addition. 14:46:35 Fees are already tiny. Too tiny, probably. 14:46:53 moneromooo: Yes if those people who want to remove tx_extra do so for uniformity reasons 14:47:06 fees are not tiny 14:47:18 they make any amounts below 0.00001 XMR useless 14:47:35 Are there any downsides to having fixed sized encrypted blob to every tx? 14:47:35 even below 0.00003 XMR 14:47:48 That's less than a USD cent. Tiny. 14:48:17 moneromooo: Permanent unnecessary space requirements and fees on the potential future standard currency of the globe? Can you imagine how many equivalents of trillions of dollars this scales out to? 14:48:19 is 1 XMR = $1,000,000 it's $10 14:48:23 *if 14:48:34 Yes, increases size, so storage space and bandwidth. Also can be unprunable, depending. Also fees, at a push. 14:50:07 Not to mention that this now incentivizes people to utilize the field since they'll be paying for it anyway, which will direct them to sub-chains and applications, creating fungibility risks. 14:50:31 Alex|LocalMonero: that is a stupid argument. 256 bytes is like 15% of an tx size. If 15% of a tx fee becomes trillions, what does the 85% become ? 14:50:59 You'll get priced out by the tx before you get priced out by such an addition. 14:51:18 Other things will have to be worked out before then to survive this. 14:51:31 moneromooo: 15% extra transaction costs for the global economy won't scale out to trillions equivalent in your mind? 14:51:39 Re-read. 14:52:10 (I mean, this is not what I said) 14:52:59 I know what you said, I don't think you understood what I said. 14:53:24 Over the long run, if the currency becomes a global standard, an extra 15% in tx costs is a massive point of friction. 14:53:59 And a currency that offers the same but without the extra 15% tx costs will easily win over. 14:54:01 Then I was replying about this specifically: "So now everyone pays for extra tx fees regardless of whether its utilized or not, essentially making txs that don't utilize that field be unproductive." 14:54:23 I did not calculate any absolute value, as it's not relevant to what I intended to say. It may end up being trillions, or not. 14:55:23 OK. I accept your argument. I do not agree with your characterization that it is too large a problem. Which I think you implied ? 14:55:56 I do imply that it's a large problem in the context of Monero competing on the global currency market for dominant status. 14:56:25 Any point of friction will be outcompeted by a more efficient currency. 14:56:33 I don't think something being 15% cheaper is ever going to be remotely enough to overcome network effect 14:57:13 Lyza: Wise and other international payments providers are easily overcoming SWIFT's network effect by being cheaper. 14:57:19 Are there many people or applications who depend on tx_extra? Is it a must for someone? 14:57:54 As far as I know there is nothing using tx_extra yet, if we exclude the pub key which could be moved to another field 14:58:07 that's a different situation because each of those networks can move the same currencies. Only XMR network can move XMR 14:58:19 I think seraphis does this. 14:59:42 Lyza: That's not an important distinction for the argument, though. What I'm saying is tx fees matter. Unnecessary friction makes a currency less competitive. 15:00:07 Re-reading, to be clear, when I said "I accept your argument", I mean it as "I understand your argument", not "I agree with it". Just to be sure :) 15:00:12 I think that being able to add public and arbitrary data to the transaction could be very interesting, especially for NFTs and decentralized domain names; however, I think that Monero, as a currency, should not allow adding chain bloat. There are other blockchain specifically made for this kind of things. 15:01:06 I agree with this ^ 15:01:20 Exactly. 15:01:34 to be clear I'm in favor of removing tx_extra in whatever hard fork would happen next and don't fully understand the need to embed arbitrary data myself. but I'm definitely trying to hear arguments the other way 15:01:40 Somewhat too. I had high hopes for extra being used for interesting stuff, but it did not, and ended up really pointless in practice. 15:02:17 anyone know offhand if the proposals that have been made for payment channels with XMR use tx_extra? 15:02:37 "That is not quite right: to..." <- Technically everything is arbitrary data. it would just be gibrish to anyone else 15:03:06 ghostway[m]: You can split it into chunks. But it would be really expensive 15:07:20 "Somewhat too. I had high hopes..." <- I fully believe in trying things. Sometimes they succeed and sometimes not. At some point, you do have to move on from those that didn't work out. 15:08:10 I believe Monero succeeeds very well in not repeating Bitcoin's mistakes. Let's not break that tradition by keeping tx_extra 15:09:46 I wouldn't be surprised that if tx_extra is kept we will eventually see "litenero" which will advertise itself as a Monero that's cheaper to use. 15:10:04 Now that's appeal to fear. 15:10:15 And takes less space, less bandwidth etc. 15:10:39 I hope tx_extra gets removed in the next big release 15:10:52 And AFAIK Bitcoin does not have an extra equivalent (and people started using a hack to add arbitrary data). 15:10:57 It's not appeal to fear or greed. It's a statement of fact if the efficiency of Monero is not optimized for transactions. 15:11:01 That might also work with monero actually... I wonder... 15:11:22 I think it is possible actually :) 15:11:39 moneromooo: Bitcoin is one big tx_extra field essentially. 15:11:50 I’m not convinced that a fixed size helps much for the problem of arbitrary data stored on the chain. If we consider the ‘opt out privacy’ principle, what we have now already satisfies that - the default is an empty tx extra (ignoring ephemeral pubkeys). Using a fixed size encrypted field just means the default for new uses of the field is to be hidden among old default-conformant uses (not necessarily a bad thing 15:11:50 to aim for - the trade-off is chain bloat). The thing with opt-out privacy is it does literally nothing if you choose to opt out. For tx extra and ‘pasting in data’ in general, the only thing you can do to counter opt-out usage is increasing fees (1. Increase the tx extra fee rate so it matches the equivalent fee cost of steganography, 2. Increase the base fee rate). Everything else amounts to making it harder to 15:11:50 opt-out, which is not a good argument (your whole effort evaporates as soon as someone publishes an open source tool). I’m personally in favor of tuning the fees as best we can, and feel skeptical about the chain bloat implied by a fixed size field (mainly considering how little the tx extra is actually used outside the default). 15:13:08 maybe Light Nodes get more attention too https://github.com/monero-project/research-lab/issues/69 15:17:07 Is there a reason not to have all-or-nothing? Zero length or length N? Then most txs would have a zero-length tx_extra. Protocols/wallets/users that use it would all have the same tx_extra length. There would be a reduction in tx uniformity compared to fixed length for all tx, but it would just split the anonymity pool into two ponds instead of having many puddles when users can use any length. 15:17:57 Good point, UkoeHB, fixed length doesn't make sense 15:18:45 Rucknium[m]: not a bad idea, I had a similar thought just now lol (to specify a tx extra value type that’s fixed length and generic) 15:18:45 I don't think there is a reason beyond the one you mention already. 15:19:51 So if it's zero or N, doesn't this hurt fungibility? 15:20:09 Aren't we segregating the chain into two subchains? 15:20:12 That *is* the reason Rucknium[m] mentioned. 15:20:40 So if fixed length doesn't make sense and zero or N hurts fungibility, then zero wins? 15:22:01 Alex|LocalMonero: the chain is already split into puddles based on ‘default’ vs ‘nondefault’ use of the tx extra, so 0vsN would be an improvement in the current default (I like orienting design decisions against what we have now) 15:23:27 tx_extra length wouldn't be the worse source of tx uniformity defects. I would put wallet fee algorithms and decoy selection algorithms above tx_extra length probably. (The Seraphis upgrade will help reduce fee diversity by discretizing fees.) 15:23:28 UkoeHB: so basically we're close to a "Zero or N" state now, recognize that it's a fungibility problem, recognize that a more perfect zero or N state is also a fungibility problem, therefore, if we move, we should move to zero? 15:25:15 Any downsides to having zero length other than the possibility that someone can use tx_extra in the future? In that case can't people simply fork Monero and introduce this field? Is there a point in caring? 15:25:17 0vsN would be a significant improvement since all non-null fields would be private by default (within the set of default-confirming N-size fields). 15:25:20 Rucknium[m]: It's not just length but also content, though. Eve can see which txs are related to what apps. Some regulators might start requiring their local exchanges to encode national IDs onto txs of their users withdrawing. 15:26:21 kayabanerve has already made the point that people can put arbitrary data that reduces tx uniformity into others parts of Monero txs. 15:27:09 Fake out pubkeys ? :) 15:27:25 There is a discussion underway on whether statistical checks on tx_extra contents can in effect make the tx_extra field be encrypted 15:28:54 If something reduces tx uniformity I'd much rather it be stegged into the chain so as to look normal to any observer that isn't in the know than out in the open 15:29:10 And also, how would the stegger excludes txs that have fake out pubkeys that accidentally match his format @moneromooo? 15:29:22 s/fake/real/ 15:30:00 I do not understand that question. Can you rephrase ? 15:30:13 Alex|LocalMonero: if fixed length were mandated then it would be encrypted by default 15:30:14 who are you defeating, with steganography? afaik it takes very little analysis to extract steg data 15:30:43 hyc: you defeat constraints on the tx extra 15:30:52 Hypothetically 15:31:31 If a stegger wants to encode things onto the chain in order to access it later how can the stegger, when later reading the chain, exclude the noise (outputs that match his format by chance despite being genuine)? 15:33:28 You could include a bit that tells you that. 15:33:43 So ECC 15:34:04 Well, in the case where Alice sends to Bob and Bob reads, at least. I did not think about the case where Alice sends to Bob and Alice reads. 15:34:06 how is ECC related to steg.? 15:34:22 Hiya 👋... (full message at ) 15:34:34 It's not ECC fwiw (though you can use it too). 15:34:44 pls ban that scammer 15:35:08 @kenzie_jonn:matrix.org 15:35:16 endor00 15:38:12 moneromooo: not sure I understood your answer. If you include a bit for noise that bit itself can also match the noise, can't it? Maybe I'm just not getting something. 15:38:38 Also, "afaik it takes very little analysis to extract steg data" <- I think you're thinking about hiding stuff in low significant bits of structured data 15:39:02 Well, no. You include a bit that does NOT match the noise. 15:39:17 It just has to be equiprobable for an attacker. 15:39:39 Are you assuming that Bob knows which tx he needs to read? 15:39:57 I'm thinking in terms of a decentralized data transmission network. 15:40:04 I do this in a monero fork, and AFAIK an observer cannot tell which txes have embedded data and which don't, and the receiver can tell with certainty which do and which don't. 15:40:25 Bob will see which txes are for him, like he normally does. 15:40:46 Do you mind linking how you do that? 15:41:03 Ah, I think I see what you're saying: this requires an output to go to Bob. 15:41:15 * moneromooo goes look for a link 15:41:22 Right. 15:42:39 https://git.townforge.net/townforge/townforge/commit/27bcb3586b5805d10fcb544d97e31c03d02edbf7 15:42:51 Thx 15:43:10 and https://git.townforge.net/townforge/townforge/commit/7c70d0ef6e4900434e54cb7cf071074d3d4da66b 15:43:26 First is the bit that monero could share, second is the "application layer". 15:43:43 (it has drawbacks though, no free lunch) 15:45:39 moneromooo: from the commit description it sounds like the only drawback is ringsize reduction for the receiver 15:48:05 AFAIK, yes. 15:48:54 Well, I guess from your point of view there's another drawback, which is a whole new tx's worth of fee :) 15:49:04 The input mixring also allows you to embed arbitrary data up to (num_rings * (num ring members - 1) * log256(total chain outputs)) bytes, which also poisons everyone else's decoy selection. Once we tackle tx_extra, this should be the next target IMO 15:50:40 moneromooo: I don't mind that if something looks like a tx, walks like a tx and talks like a tx and pays a tx fee is a tx on chain. I do mind things on top of a tx that are added regardless of whether the end user is utilizing it or not and thus needs to pay extra 15:51:12 Oh yes, that make sense. 15:52:23 jeffro256 can you, though? you can't just add arbitrary ring members, they need to exist on-chain (and belong to the same hardfork as the other ring members for that tx type) 15:53:03 The data is in the index, not in the referenced public key. 15:53:06 You can stuff low bits with your data. 15:53:28 I'm not sure how it poisons other people's rings though ? 15:53:51 right 15:54:40 Because obviously bad decoy selection = tx that stands out with its own outputs = less "real" transactions borrowing your outputs as decoy inputs 15:55:36 Why the last implication ? 15:55:53 > jeffro256 can you, though? you can't just add arbitrary ring members, they need to exist on-chain (and belong to the same hardfork as the other ring members for that tx type) 15:55:53 Hence the log256(total num of outputs on chain), you can make the indexes anything as long as they're less than the total number of outputs on chain 15:56:42 > Why the last implication ? 15:56:42 I guess the same reason why p2pool is bad for decoy selection and output flooding is bad for decoy selection. More junk outputs = more junk decoys for real transactions 15:57:21 Junk outputs here meaning outputs from transactions which obviously stand out for a certain application, embedded with public data 15:57:23 Ah, because you're assuming someone will always use this system for all their txes ? Fair enough. 15:58:31 Yeah without automated checks for these transactions to avoid using them as decoys, normal wallets will statistically use them more, reducing the effective decoy input size 15:59:19 All this will presumably get fixed with: https://github.com/monero-project/research-lab/issues/100 15:59:49 They'd use them at the same rate I think. 16:00:24 > All this will presumably get fixed with: https://github.com/monero-project/research-lab/issues/100 16:00:25 This could be also fixed with the determinstic output binning right? 16:00:31 tevador: are you aware of any arbitrary data injection techniques in zk_SNARKs? 16:00:36 The reduction would come from the fact that another person would not use the system, therefore an observer would remove outputs from a tx using the system (assuming the sender always uses the system). 16:01:21 Am I missing a reason why normal wallets will statistically use them more ? 16:01:21 Alex|LocalMonero: no and also Seraphis won't support the method moneromooo mentioned 16:01:30 Yes, sorry I wasn't clear. I meant "more" as in more than if they didn't exist 16:02:45 today's meeting is in 1hr 16:03:20 UkoeHB Does output binning as implemented now use the Hash-to-distribution method, or are the bins still picked manually by the transaction creator? 16:05:24 AFAIK the current impl has 16 bins that are indexed the same way as current decoys, so user-selectable. 16:09:52 tevador: right 16:10:06 Wasn't there problems making the distribution function reproducible against floating point hardware? 16:10:07 *across 16:10:32 Well it’s one challenge you’d face 16:11:25 What were the other challenges if you don't mind me asking? 16:14:43 Thoroughly understanding the edge cases, and getting locked into a heuristic-laden algorithm 16:14:48 not to discourage an answer but here's the research lab issue https://github.com/monero-project/research-lab/issues/87 16:19:31 If we adopt a next-gen membership proof with a reference set size of 2^40, there is no need to have a decoy selection algorithm anymore. 16:19:48 Indeed. 16:20:50 Lyza That's a good thread which I haven't yet seen. I was talking about https://github.com/monero-project/research-lab/issues/84, but that's also an interesting idea to discuss 16:22:48 yeah 87 also links to 84 and 86 (: 16:23:07 all kinda related 16:35:01 + 17:03:38 whoops meeting time 17:03:52 UkoeHB: Ready to start meeting? 17:03:57 https://github.com/monero-project/meta/issues/797 17:03:57 1. greetings 17:03:57 hello 17:04:04 Hi. 17:04:08 Hello 17:04:12 Hello! 17:04:14 Hello 17:04:14 Hello 17:04:17 Hi 17:04:22 Heya 17:05:01 Hallo 17:05:04 Hi 17:05:31 2. updates, what's everyone working on? 17:05:35 Hi 17:05:51 Heya 17:05:56 I’m chatting with Rucknium about providing support on OSPEAD computational work. The plan is to have one of my engineers convert the R prototypes to a compiled language, and then we’ll run the faster code for tens of thousands of CPU hours on GL’s scientific computing infra. The benefit of being able to process more rings will be better precision in the final OSPEAD parameterization. 17:05:56 The plan is that we’ll first build a little demo for Rucknium pro bono, showcasing the relevant engineering skills, and then move the CCS forward for the main project. Even though we’re still in the pre-CCS demo phase, I went ahead and uploaded a draft of the CCS proposal (#375) in case anybody is curious wants to take a peek at the details in the interim. 17:06:39 hello! 17:06:53 me: Learning how to connect C++ and R. I left a comment on isthmus's proposal: https://repo.getmonero.org/monero-project/ccs-proposals/-/merge_requests/375 17:07:07 jo 17:07:09 hi 17:07:23 hi 17:08:19 Is this the tx_extra discussion? I just came to watch. 17:08:35 Ive been working on webhook support for lws, which is not really mrl related. unfortunately no recent progress on bp++, but I pushed back the 2nd feature set for webhooks to get some bp++ time in the upcoming weeks 17:09:00 someone just needed lws stuff with a very high priority (or so they claim) 17:09:02 Monegro: Yes, in a bit 17:09:12 me: I've been building an experimental tasking system which may or may not be useful in the seraphis wallet migration project. My threadpool appears to have comparable performance to the current one tools::threadpool, but lets you 'sleep' on tasks inside the pool which increases throughput drastically if you have tasks that would normally hang to sleep for a long time. 17:09:21 Monegro: yes 17:09:34 ukoehb is it published anywhere? I can give immediate feedback 17:09:45 it will take my mind off going through the math you want me to go through :/ 17:09:59 I will comment on the read/lock thing you did, a couple of trivial comments 17:10:03 UkoeHB: does it make sense to focus on that at this second? i bet parallelization could be added later 17:10:05 vtnerd: https://github.com/UkoeHB/monero/tree/seraphis_lib/src/async 17:10:16 endogenic: don't know, don't care! 17:10:22 wonderful 17:10:28 forget asking me for feedback then 17:11:25 vtnerd: I haven't been able to figure out how to do very small tasks quickly unfortunately.. might be unavoidable overhead of the extra things I have in there. 17:11:46 yeah the allocations and locking usually kill that 17:12:11 3. discussion, today we are supposed to talk about possible consensus rule changes around the tx_extra 17:12:13 its typically better to have largish tasks for a system like that 17:13:30 People may have seen my idea to talk about alternative ways to get consensus about such consensus rule changes, see the meeting issue 17:13:51 At least as an additional thing to discuss 17:14:01 re: tx_extra there has been considerable debate in these places https://github.com/monero-project/monero/issues/6668 https://github.com/monero-project/meta/issues/797 17:14:30 rbrunner: Can we do this next time please? There's no point in this last minute change 17:15:03 I read all 150 comments on tevador's GitHub issue. I don't have a strong opinion on the matter due to the tradeoffs between different options. If there is a need/desire for a statistical check of the randomness (encrypted status) of the tx_extra field, I can help search for an appropriate statistical test. 17:15:11 If there is some progress today, we can easily move that weeks. If not I see it getting important. 17:15:13 My summary is: Steganography has multiple performance impacts and is a uniformity trade off, not solution. I personally appreciate TX extra. I'd advocate a 255 byte limit, and wouldn't mind a statistical check/ASCII ban. 17:15:13 There's a lot of further discussions possible, and I'm unsure, per rbrunner, we'll actually reach consensus. I'd advocate either we take steps to limit it, which have minimal disagreement, we vote, or we drop the discussion entirely for consensus process discussions. 17:15:31 The current situation is that we have tx_extra as an arbitrary size field for arbitrary data. Does anyone think the current state is ideal? 17:15:38 no 17:15:43 no 17:15:52 No 17:15:56 no 17:15:59 no 17:16:00 Nope 17:16:00 no 17:16:05 no 17:16:05 and projects publicly listing their decryption keys for new tx_extra, is also not ideal 17:16:17 So we can have at least some consensus. 17:16:18 so steg 17:16:35 if the steg is public, its the same problem as public decryption keys 17:16:36 I have a hard time estimating what is ideal and not logically impossible 17:16:39 I see that the same as view keys @vtnerd 17:16:49 steg has to remain private to work, thats the difference between it and cryptography 17:17:01 but I'll accept 'could be improved' 17:17:13 monero doesn't advocate that large projects publish their view keys publicly 17:17:28 Any public output set is a privacy issue so long as we have subset membership proofs. 17:17:42 at least afaik, like many people are on edge about MyMonero and privacy, and don't want it worsened, etc 17:18:05 And her we do explicitly state view keys can be shared for verifiability. 17:18:10 which is irrelevant to what Im saying 17:18:19 thats just whataboutism on some next level crypto talk 17:18:24 *and yet 17:18:40 If arbitrary data is to be stored it should be stored in a way that makes it look just like any other tx to the greatest possible extent 17:19:11 there are researchers working on this stuff right now 17:19:16 why doesnt this room care? 17:19:17 the problem is this DEX (thats whats tx_extra) cannot market itself as a privacy solution, only a decentralized exchange 17:19:21 they're the experts 17:19:40 Somewhat? I'm more trying to comment this isn't an issue unique to extra and I don't care to premise this extra discussion on it. 17:19:55 provided the community understands this, its probably no worse than Kraken having a bunch of view_keys and info 17:20:07 Can we find a compromise on TX extra? 17:20:23 just include it with a fixed size, thats probably the most reasonable thing to do at this stage 17:20:29 There's an active PR to make it ~2kb 17:20:33 ArticMine: why is a compromise with arbitrary data injeciton desirable? 17:20:38 I'd advocate 255b. 17:20:47 I thought that's what #8733 is, a compromise 17:20:49 tevador? 17:20:50 If we can achieve a rough consensus that compromising is within reach. 17:20:56 I really like the Zcash approach - fixed size encrypted memo on *every* transaction so that no transaction with a memo sticks out. 17:21:01 If people are not ready to compromise ... 17:21:08 Along the lines of a limited number of fixed sizes 17:21:36 Some options are: 1. Limit the size. 2. Make it fixed-size. 3. Make it optional with a fixed size. 17:21:43 isthmus: this means that 99% is paying additional 15% tx fees (not to mention space and bandwidth) for the benefit of the application layer 17:22:05 Correct, it's for uniformity and everybody's privacy 17:22:22 Yeah, or tx_extra can just be dropped for even more uniformity and privacy 17:22:22 No free lunch 17:22:23 Alex|LocalMonero : yup :/ and I agree with tevadors condensed description, thats really what the debate is over 17:22:27 And pusedo enforcement of randomness via node relay 17:22:33 #8733 is a stop gap measure before Seraphis can change tx_extra. 17:23:01 vtnerd: why isn't removing it an option? 17:23:05 Mandatory blob of fixed size would have very low computational/verification cost, yes? Downside would be purely storage/bandwidth 17:23:15 moo had a patch a while ago that did that (fixed size extra) if IRC 17:23:19 blankpage: fees 17:23:45 And a terrible hit rate, very few people wanting to store something there, and doing so 17:23:46 One of the size choices can be zero 17:24:06 As distinct discussion, if tx extra is kept, I believe it should be prunable and prunes by pruned nodes 17:24:06 Just reduce minrelayfee by 15% and the fee issue disappears 17:24:07 your right, there's no reason why we cannot force steg approaches, even though they are suboptimal 17:24:37 Would forcing steg reduce the frequency of usage? 17:24:38 #8733 should be a nobrainer whilst other things are worked out 17:24:42 vtnerd: they are suboptimal for arbitrary data, which makes monero more optimal for tx data 17:24:44 *As a, pruned by 17:24:50 Monegro: probably, as its much harder to do 17:25:03 Monegro: A higher cost of arbitrary data injection disincentivizes its usage 17:25:05 Rucknium[m]: Not that simple 17:25:09 Alex | LocalMonero | AgoraDesk: Not definitively 17:25:14 From a protocol design standpoint, our goal is privacy by default (i.e. opt-out privacy). It is impossible to mandate privacy, so any proposals with that goal should be discarded. What are the default-usage privacy defects of tx extra? Lack of uniformity among tx extra users (non-users are uniform in that they all have 'empty' fields [excluding ephemeral pubkeys]). Assuming we want to keep a tx extra in some form, we 17:25:14 can A) improve uniformity globally by mandating all txs have identical-looking tx extras by default (fixed-size and encrypted by default), B) improve scoped uniformity by mandating all txs have EITHER no tx or a fixed-size tx extra (encrypted by default). (A) is better than (B) in terms of uniformity, and (B) is better than (A) in terms of scalability (a fixed-size tx extra would be a big chunk of txs, maybe 25%). 17:25:14 Option (C) is deleting the tx extra if we decide it isn't a feature needed by default (steganography could be implemented as a non-default alternative). 17:25:18 the problem is that theoretically monero could support _some_ application layer stuff without being a privacy sieve 17:25:23 Re: optimality 17:25:39 I believe thats why tevador tentatively agreed to keeping tx_extra around - theres a way to use the memo field "properly" 17:25:44 does no one care that actual qualified researchers specialize in this 17:25:49 and that we have blinders on 17:25:56 we could invite them into the room as a community 17:26:02 but we choose to wander in the dark 17:26:08 I think we have a handle on this 17:26:14 no you dont 17:26:27 you cant predict the future of tech or you'd be those researchers 17:26:40 besides 17:26:40 endogenic: Sure. Invite them. 17:26:55 what kind of nonsense is it to not decide we need people who actually specialize in this 17:26:57 and researchers are never wrong? please, dont waste our time 17:27:03 what motives do you have exactly? 17:27:04 vtnerd: "proper" use of the arbitrary data field is an oxymoron if the design goal of monero is to be the best possible digital cash 17:27:09 endogenic: The room is open, feel free to invite “them” 17:27:10 vtnerd what a ridiculous argument 17:27:13 > Can we find a compromise on TX extra? 17:27:13 I'll summarize the idea I had for tx_extra. I discussed it with kayabaNerve, but didn't make it public. Disclaimer: kayabaNerve doesn't necessarily support this idea. Make tx_extra a public ed25519 point + signature (proving knowledge of private scalar corresponsding to aforementioned point) which reduces the amount of arbitrary data possible to encode into a transaction limited to just a few brute-forced bits. However, any 17:27:13 arbitrary data could be privately verified to be "attached" to this transaction by hashing to the point provided in the transaction. This tx_extra is small and fixed size but allows for off-chain verification of arbitrary data. ALSO, for data availability, "archival" nodes would relay and save corresponding blobs which match the tx_extra of certain transactions. Full nodes would also relay and save for up a week (this period 17:27:13 could be determined later). This solves the data availability problem, the DEX problem, and increases transaction uniformity. It does have tradeoffs, but I like this solution. 17:27:14 I have invited plenty of researchers here. Some have showed up. 17:27:19 i have invited them 17:27:25 they often feel disregarded 17:27:26 surprise 17:27:30 that's why i said as a project 17:27:33 if it were fixed size, and always encrypted by all parties, its no worse than ring signatures 17:27:38 none of you seem to value their free contributions 17:27:45 +1 vtnerd 17:28:04 the more options _allowed_, the more problematic it becomes 17:28:12 +1 17:28:18 Interesting 17:28:25 vtnerd: it is worse because its an extra added on top that everyone has to pay for whether they use it or not 17:28:28 using steg approaches works, but its funky 17:28:30 endogenic: if you have something to say, be specific 17:28:35 i have 17:28:38 stop strawmanning 17:28:45 jeffro256's idea has a pointless component, otherwise I'd have a similar option 17:28:47 endogenic: Give us some names 17:28:49 Im not talking about cost, Im talking about privacy, which is why isthmus gave me the +1 17:28:53 koe has names 17:29:02 and there are more of them too 17:29:05 I suggested one of the options being zero 17:29:10 dont think i'm talking out of my ass 17:29:18 endogenic: please be useful or shut the fuck up. 17:29:19 i'm not that flush with free time 17:29:22 i am 17:29:23 from a stat perspective, a symmetricall encrypted field is not going to be worse than the ECDH madness 17:29:26 try to listen 17:29:32 vtnerd: Fine with me, if 256b (> than a jamtis addr) 17:29:40 Link us to whatever work is there, fr instance. Dont' say "why don't we listen to them". 17:30:07 It's a bit bloated, but it solves the privacy, usability, and soft fork discussions 17:30:08 i habe 17:30:09 habe 17:30:10 have 17:30:13 it has been ignored 17:30:25 I believe a compromise is possible here 17:30:27 and it's notable there are individuals with conflicts of interest here 17:30:27 Sorry, I missed it then. I'll re-read. 17:30:32 We can also make TX extra prunable to help there 17:31:18 If referring to me, I don't mind disclosing, yet I'll comment I am minimally effected by this discussion. 17:31:22 1. If it's fixed length and encrypted then everyone is overpaying and overusing resources for the benefit of the few (and the junk outputs are still exploitable) 17:31:22 2. if it's optional then fungibility is harmed as we have what are essentially subchains 17:31:22 3. if arbitrary data injectors are forced to make their data look as txs then they effectively are txs and for all intents and purposes are a legitimate use of the Monero chain 17:31:39 I read the discussion of jeffro256s idea recently and I think it is very interesting. I do wonder if there are use cases which are only serves by the arbitrary data being on chain though, rather than a hash representation of what is happening in a mempool of blobs 17:31:40 But sure, I work on a real world use case of TX extra for arb data. 17:31:55 I re-read, no link or similar searchable info. 17:32:27 We can have a limited number of anonymity sets like we do with tx outputs 17:32:29 Alex|LocalMonero: 2. is not much worse than 3. because transactions with more than 2 outputs already stand out. 17:32:36 jeffro256[m]: my take is your proposal implies quite a large engineering effort (maybe more than is justified by a field that's barely used right now). Uniformity isn't really improved if you can just connect archived data to txs (there is no way to upload a tx and archive data at the same time without linking them). 17:32:47 Alex|LocalMonero the problem is that the steg approach are almost certainly less optimal than the encrypted approach, thus why we keep going in circles 17:33:06 tevador: txs with more than 2 outputs standing out sounds like a separate protocol issue to be fixed 17:33:20 vtnerd: less optimal for arbitrary data, so who cares? 17:33:35 I have a question 17:33:39 arbitrary data isn't monero's design goal 17:33:40 moneromooo: it has been over the past year 17:33:42 Alex|LocalMonero: and 2. is much better for scalability than 3. 17:33:47 i will dm you 17:33:49 Who here actively wants to remove, not fix, TX extra? 17:34:08 I am not the one that'll do the work anymore. Link it here please. 17:34:40 the record can be searched. time for you guys to stop trampling on people 17:34:41 If we can limit this discussion to improvements, which we can discuss incrementally, that may be more effective as right now we're exhibiting the concerns stated before this started 17:35:07 I also interested in this research or whatever, I don't see the point in complaining without bothering to share what you're trying to talk about 17:35:07 I support that question. Full removers, please wink. 17:35:12 tevador: scalability of arbitrary data? Again, who cares? We should be optimizing he scalability of tx data. The 0.01% usage of application layer data being unoptimized is not a concern 17:35:21 +1 remove - it sounds like arbitrary data can be added in other ways 17:35:23 some people might know what you're talking about but I would wager most of us do not 17:35:25 ... but if people insist on uniformity adding 128 bytes to each tx is less than 2 months of Neilsen's law 17:35:30 +1 remove 17:35:38 Because getting full removal out of the way, per way of compromise, would be progress 17:35:53 > the record can be searched. time for you guys to stop trampling on people 17:35:53 For everybody's sake could you please link it if it's relevant? I want to know about formal research around this topic if it exists. It would be helpful to everyone who is not on here 24/7 17:36:22 Two votes so far for full removal. Any more? 17:36:30 +1 remove 17:36:31 remove 17:36:35 +1 remove 17:36:47 ArticMine: nielsen's law sure but what about fees? 17:36:52 Lyza: i have been laboring for years to bring that research here 17:37:08 now when i've been treated like i'm the asshole i have to forget all that? 17:37:13 The impact on fess is minimal 17:37:14 How about hard-limiting tx_extra as a immediate action, and then jeffro256's idea could be further thought through to see if it covers all use cases? 17:37:22 smh ok don't share it then but if you're not trying to be helpful waht are you doing here 17:37:30 Hmm, with 5 removal votes compromise will probably be difficult ... 17:37:32 As meeting leader, I'm going to slow this down (getting a little too chaotic). Let's get a read on everyone's stance. I will list some options, then everyone should reply with the number they like best, and a small comment justifying your position. 17:37:32 1. get rid of tx extra and be done with it 17:37:32 2. mandate maximum tx extra size (e.g. anything in 0 - 1000 bytes) 17:37:32 3. mandate optional fixed-length tx extra size + encrypt by default 17:37:32 4. mandate fixed-length tx extra for all txs + encrypt by default 17:37:33 5. other (specify) 17:37:44 I would be okay with a fixed-length mandatory encrypted field 17:37:45 1 17:37:47 I personally don't mind removal (that was my original proposal), but I'm open for compromises (since pretty much anything is better than what we have now). 17:37:49 Some of the latest work of Moreno Sanchez, he said in private. In case someone wants to search/read. 17:37:54 All NRL research points towards tx_extra being Monero's Achilles heel as of 2023. While the most straightforward solution would be to remove it, I also understand that there are valuable ecosystem components coupled to this, so I am also very open to discussing improvements. Anything better than currently. 17:37:55 This is like 5% of tx size 17:37:59 the case for keeping seems to be only for unknown future use cases 17:38:01 I'm also fine with removal 17:38:05 thx moo 17:38:07 please no more comments other than replying to me for 4 minutes 17:38:20 I need to moderate this 17:38:40 4 17:38:44 UkoeHB: 1 17:38:52 blankpage: There's a PR for a hard limit 17:38:55 1 17:39:01 Kinda conflicted between 1 and 3. 17:39:07 1 17:39:08 2,3,4 17:39:15 1, 4, open to others' 5 17:39:20 1 , possibly 4 17:39:21 jtgrassie: fair point, and we could always bring it back in a hard-fork 17:39:29 2 because length restriction, plus the encryption from 3 17:39:30 vtnerd: exactly 17:39:31 1 or 3 are probably the best. 17:39:38 UkoeHUB: In order of perference, best to worst: 4, 1, 3, 2 17:39:38 3 17:39:39 /iwn 21 17:39:41 sorry 17:40:01 1. remove. Better for uniformity of transmissions. 17:40:12 1 or 3 17:40:17 1. Fallback 4 17:40:20 3 17:40:46 hence #1 is the ideal and #2 at least nudges in the right directon (quick change) 17:40:53 Like I said, I don't have a strong opinion because of the complicated tradeoffs. If I have to choose a single option, I would choose (1). 17:41:43 2 17:42:28 Lyza: this is the help the project needs. the people here repeatedly throw away connections i've made. i'm not going to name names 17:43:09 4 minutes are up, shall we tally? 17:43:33 Oh. 1 would also prevent merge mining fwiw. But I'm biased of course. 17:43:58 1 [alex, jeffro, dangerous, moo, hbs, isthmus, fred, tevador, tobtogh, john, jtgrassie], 2 [kaya, rene, jtgrassie, uwanted], 3 [moo, kaya, tevador, artic, koe, tobtoht], 4 [jeffro, blank, kaya, isthmus, fred, john], 5 [isthmus] 17:43:58 We have to keep tx_extra for coinbase in any case (at least a fixed size one). 17:44:31 Sorry, I forgot to include a comment explaining my votes: I said 1 & 4 because they maintain transaction uniformity (central to user safety) and preserve a single anonymity pool. I am open to others’ suggestions for 5 if they maintain transaction uniformity. 17:44:47 It sounds like due to fragmentation among 2,3,4, 1 is the most popular option there 17:44:51 +1 isthmus 17:44:57 tevador: For merge mining or yet something else? 17:45:14 extra nonce 17:45:21 UkoeHB: You didn't count my vote for 1. 17:45:28 kayabanerve[m]: the field is used for additional pub keys 17:45:31 sorry I may have missed a couple 17:45:31 TIL That's how that works 17:45:47 kayabanerve: If we had ranked-choice "voting", the vote-splitting between similar options would be less of an issue 17:45:51 Yes but a binary vote keep or not would be helpful 17:45:52 1 [alex, jeffro, dangerous, moo, hbs, isthmus, fred, tevador, tobtogh, john, jtgrassie, onehorse, rucknium], 2 [kaya, rene, jtgrassie, uwanted], 3 [moo, kaya, tevador, artic, koe, tobtoht], 4 [jeffro, blank, kaya, isthmus, fred, john], 5 [isthmus] 17:46:02 Democracy is irrelevant here IMO. No one has technical objections to limiting the size so let's just do that. Then if the ideas like jeffro256's turn out to be infeasible or not useful then we remove it completely in the future. 17:46:03 kayabanerve[m]'s idea (link to TF above) ensures uniformity and allows arbitrary encrypted data. So I also like 5 :D 17:46:21 we have t keep it till the tx structure is changed, hence why #2 is a good stop-gap to #1 17:47:04 The current PR #8733 is a soft-limit for tx_extra. It cannot be removed right now because it contains mandatory public keys. 17:47:06 I think when Seraphis comes near we will have tons of things to discuss. I would love to decide this today. 17:47:13 We already immediately have a PR to limit size. I believe this is discussing changes to make at time of seraphis. 17:47:19 To get it out of the way, so to say. 17:47:52 Seems like removing it is the option the most people find acceptable. Not that this matters to the technical soundness of it. 17:48:01 We can either: 17:48:01 - Remove 17:48:01 - Call for a ranked choice vote 17:48:01 - say one IRC Nick != one vote 17:48:22 Though as noted, coinbase will still need extra 17:48:23 I said it before, and I say it again: voting is idiotic in a technical matter 17:48:39 @sech1 where do you stand? 17:48:42 whatever path forward is taken, it must be justified 17:48:43 ... That'd be option #3 :p 17:48:52 I prefer option #1 eventually (after HF) 17:49:02 all needed like tx pubkeys can be moved to separate fields 17:49:11 I thought this discussion was meant to mean removing it post seraphis? 17:49:24 Did people discuss removing it now? 17:49:34 Why would that matter? 17:49:45 Time for people to swithc 17:49:54 The "when" is a separate question 17:49:56 I mean #1 after seraphis 17:50:01 Seraphis already moves public keys from tx_extra, so it would be purely for arbitrary data then. 17:50:07 UkoeHB: I also vote 1, if my vote counts 17:50:07 What would we do with payment ids ? Some poeple like it even with subaddresses available. 17:50:13 before that, it can be size-limited and have higher fee per byte 17:50:25 Voting on keeping it or not should be separated from how to keep it 17:50:31 +1 artic 17:50:35 moneromooo: Deprecate it :)) 17:50:38 moneromooo: payment ids have been deprecated/replaced by encrypted address tags 17:50:43 Just to be clear a "no change" option is not what anyone wants, correct? Everyone thinks something should be done? 17:50:45 +1 ArticMine 17:51:15 So, it sounds like the agreeable option is remove with Seraphis. The only way to threaten this is to call for a ranked choice vote or to call voting idiotic 17:51:15 Exactly, as moneromooo points out its very impractical to remove tx_extra prior to seraphis 17:51:15 I think 1 is a strong option. We can divide the options into two categories: A) remove, B) keep in some form. The reason for keeping it is 'all the things we don't know in advance and don't want to depend on a hardfork for'. 17:51:16 Monegro: Looks like it, "doing nothing" only got "nos" earlier in the meeting 17:51:36 ArticMine: -1, there's no point in discussing how to keep it if we decide not to keep it 17:51:58 I did not intend to weigh in on the timing fwiw. 17:51:59 Of course 17:52:08 From a protocol longevity standpoint, keeping it is better because it reduces the need/desire for future hardforks. 17:52:12 At least A) or B) would give a clearer picture after the vote 17:52:12 also, did anyone do a research on how tx_extra is used now? 17:52:26 We vote first on whether to keep it 17:52:27 yes wanted to ask do anyone use it for something 17:52:32 what are the chances rn of having another HF before Seraphis? tx_extra aside 17:52:40 Yes: https://github.com/noncesense-research-lab/monero_tx_extra/blob/master/ascii_data.md 17:52:50 UkoeHB: soft forks have proved themselves to be a disaster for BTC, hard forks have proved themselves to be a blessing for XMR 17:52:56 tevador 2020 != now 17:53:02 Then only if the decision is to keep them we work on the technical details 17:53:09 data might be encrypted 17:53:34 now it's mostly bee videos (anecdotally) 17:53:59 This room was bridged to tx_extra for a few hours a while back 17:54:08 *a Script for a bee video 17:54:12 I am in the "keep" camp mostly for softforks as an emergency option. Not terribly important to me personally what people do with it otherwise 17:54:24 is there info how much data is in tx_fields in total on blockchain? 17:54:41 i think the softfork for emergency option can be maintained with tx_extra in coinbase only 17:54:43 Softforks led to massive fragmentation and tribalization of the BTC network, which doesn't even rely on fungibiliy to work. 17:54:53 rbrunner: 17:54:58 Also we separate coinbase 17:55:09 Does anyone know what's the max size for legit tx_extra usage now? Not counting tx pubkeys? 17:55:10 I am also not concerned with soft forks regarding tx_extra. There is good reason why Monero never soft forks: it's bad for uniformity. The community/dev team has always gone with the principle of fast deprecation for non conforming transactions, which is a good thing 17:55:25 size restriction (per #8733) is the ideal stop-gap. One can still do non-standard "experiments" using extra. It may also help in future discussions on whether to keep or kill it. 17:55:29 soft forks are incongruent with fungibility 17:55:32 If coinbase tx_extra is kept, we can still have a soft fork. 17:55:34 I am talking about *emergency* softforks for problems that can't wait for a hardfork. 17:55:35 We could keep a 64b extra to hedge against wallet protocol updates? It'd be a minimal size 17:55:35 There have been some outliers (e.g. 1028 kB tx_extra for one of the txns mentioned above) 17:55:48 We have size data, though I don't have a summary handy 17:56:06 NRL uses len(tx_extra) as a go-to fingerprint for clustering transactions 17:56:15 asking again: if we do this before seraphis, would we be hardforking primarily for tx_extra, or what else might we be trying to do in a pre-seraphis HF? 17:56:30 oh boy thats a can of worms 17:56:56 Removing is easy and good for fungibility, so I change my vote to 1 unless there is a fully sketched out plan of how to keep it in a useful way similar to jethro's idea at a point X months before seraphis 17:57:30 Do people want an A) or B) vote? To simplify, and getting a clearer picture? 17:57:35 basically, it could be useful for unknown applications but unless someone goes the work then it is better to have it gone than as-is 17:57:47 I don't think a hardfork is planned before Seraphis. I think we can survive with #8733 until Seraphis. 17:57:51 Yes 17:57:56 yes 17:57:58 I'm for merging 8733 now. We have more time to work out what do with tx_extra in seraphis. 17:58:26 Alex|LocalMonero: hard forks work well for privacy and scalability upgrades, which is all they have been used for up to this point. The tx extra represents utility, so this debate is about A) all future utility changes/innovations that require on-chain data should be supported by hard fork (a change in hard fork policy), B) some future utility flexibility should be baked into the tx extra. 17:58:37 Lyza: Possibly ending user-determined output lock time. Improvements to the decoy selection algorithm can be implemented without worrying much about creating anonymity puddles with wallets using different algorithms. I think there are more. 17:59:00 I'm going for a bit, so https://dblp.uni-trier.de/pid/128/4640.html has the list of Pedro Moreno Sanchez papers, not obvious which one it might be that suggests an extra solution, I wasn't told. But it's his "latest" work if someone wants to look. 17:59:04 Fee scaling updates 17:59:07 Before merging 8733, we need wallet-side error checking!! I can PR that today, but we need a mechanism for the wallet to know the tx_extra size limit before constructing and attempting to broadcast a non-conforming transaction 17:59:10 UkoeHB: the only utility monero should be concerned about is utility as a decentralized electronic and fungible currency 17:59:20 tobtoht[m]1: it would be good to make a decision now because Seraphis is already (mostly) implemented. 17:59:50 Are we going to vote again on "A" or "B" option? 17:59:52 After almost 3 years we all *deserve* a decision 18:00:02 8733 could be a nice workaround until the actual tx_extra solution 18:00:14 I don't mind 8733 either. 18:00:23 * isthmus is 100% OK with relay rules as temporary measures, but notes that relay rules are not a good long-term replacement for consensus rules 18:00:29 +1 8733 seems like a fine stopgap 18:01:08 But I agree with rbrunner that this question needs to be solved for the sake of seraphis 18:01:15 Solved now ideally 18:01:26 jeffro256 agrees with isthmus but doesn't know how to talk in third person with the little blue text 18:01:28 one-horse-wagon[: I'd like to table further temperature checks until next meeting. This week I'd like people to ruminate on the A/B distinction specifically, and on the consequences of each one. 18:01:37 "/me " 18:01:40 this has already been a long meeting 18:01:50 If there are just two options keep/remove, I'd lean towards remove (keep only for coinbase). 18:02:13 I think my position is that if we don't have a solid use case for it now, something most of the community wants that only can be done with tx_extra, we ditch it. I do think killing the ability to merge mine with monero is worth considering, for sure 18:02:17 tevador: the options are remove or keep 'in some as-yet-undetermined form' 18:02:24 And by the way @ArcticMine even a 0.1% difference in fees is enough to justify competition in the global financial markets, so 5% is massive. 18:02:28 not sure if proposals for payments channels used tx_extra or not 18:02:49 Let's vote then! Ppurely between A) remove entirely or B) keep is some undetermined form 18:03:09 Just want to say that fundamentalist approaches (and I see removal as that) rarely play out well. 18:03:16 Lyza: merged mining would still be possible because coinbase would keep tx_extra (it has to). 18:03:24 just remove that garbage and be over with it..... it's used by lazy devs that could do better without it. 18:03:25 I mean voting shouldn't decide it, but just to guage what smarter people than me have so say 18:03:26 rbrunner: was RandomX not a fundamentalist approach? 18:03:51 next meeting sounds okay if koe thnks so (gotcha tevador, ty) 18:04:12 I'm old enough to remember everyone decrying that we need to compromise with ASICs 18:04:15 to summarize: 18:04:15 A) [remove tx extra]: tx utility flexibility tied to hardfork (or steganography) 18:04:15 B) [keep tx extra in some optimized form]: uniformity and scaling trade-offs depending on the solution 18:04:23 Binary referendums where one option is not clearly defined often end in unsatisfying ways 18:04:35 let's end the meeting here, it is past the hour so we should not do any voting 18:04:39 thanks everyone 18:04:55 thank you UkoeHB 18:04:56 Thanks much @UkoeHB 18:04:59 Thanks 18:05:02 ++ 18:05:03 thanks UkoeHB ! 18:05:06 thanks 18:05:06 Thanks y'all 18:05:08 thx 18:05:09 I vote for thanking :) 18:05:12 Especially koe 18:05:16 +1 to giving thanks 18:05:18 Thank you :) 18:05:20 Thanks. 18:05:27 Thanks 18:05:36 Thanks Koe 18:05:48 when tx_extra tshirts 18:05:53 Thanks koe and all 18:05:56 Regular user hopping here: 18:05:56 Limiting the size of tx_extra may incentivize users to attach data some other X way 18:05:56 - What would this X way look like? What effects would it have over the network? 18:05:59 The note on A) is not entirely true, you can attach extra data in a soft fork by putting a merkle root into the coinbase tx_extra. 18:06:53 tevador: I think that's cheating lol 18:07:00 but interesting idea 18:08:23 Thanks y'all 18:09:14 * isthmus switching into post-meeting chatter 18:09:14 * isthmus RE coinbases, there was a brief and informal conversation a while ago about the next block format update just giving miners/pools an extra field (or extended nonce range) so they don't have to go to the trouble of getting creative with coinbase tx_extra 18:09:20 Oops it me'd all of them 18:09:40 Last I checked there were 11 different approaches in the wild https://github.com/noncesense-research-lab/miner-signature-analysis/blob/main/analysis.ipynb 18:09:57 But there was no hard fork on the horizon, so it wasn't discussed much 18:11:07 https://usercontent.irccloud-cdn.com/file/yjHtdkvI/image.png 18:11:13 11 recently, here's the whole blockchain (^^), you can see different implementations phase in and out 18:14:28 Where can I learn more in the next week about what applications (like DEX’s need to function), in terms of technical specs: - data size, - visible to whom (participants? platform? anybody?), - other requirements? 18:14:28 I’m genuinely open to and will back ANY solution that results in a protocol whose consensus rules only allow a single anonymity pool of indistinguishable / uniform transactions. 18:14:28 To this end I’d like learn more about what those solutions could look like that could preserve BOTH privacy and functionality, for my own edification. 18:16:24 isthmus: Why should Monero concern itself with what other applications need to function? They're responsible for their own metadata. The XMR chain should be optimized for txs only. 18:17:02 You're preaching to the choir :) 18:17:05 I still want to learn more 18:17:16 Never hurts to be informed for design discussions 18:18:00 True, though I don't think it impacts the basic principle. 18:19:57 isthmus: this might be the closest https://github.com/monero-project/monero/issues/6668#issuecomment-1426505526 ping kayabanerve[m] 18:20:10 It does seem like, if people were forced to use steg, they'd likely just go use other chains than XMR 18:20:34 are payment channels done with multisig, as opposed to something special in tx_extra? 18:20:48 Lyza also brought up the question if payment channels use tx_extra 18:20:57 I think that's a big deal, and quite possibly contentious 18:21:12 What does "steg" mean here exactly ? I am assuming "steganography", but this comments implies not, since people ought not care how their data is transmitted technically. 18:21:23 Oh yes @UkoeHB thanks for surfacing this 18:21:30 And good point from Monegro, I'd also want to know :D 18:21:35 Steg = steganography 18:22:12 Then why would this mean people would choose to use another chain if monero were to ferry stuff using it ? 18:22:33 Is there a hidden assumption here ? 18:23:14 I think @monegro means that the arbitrary data storage inefficiency would drive some devs away from XMR in favor of more Ethereum-like chains 18:23:27 Monegro: I think the only payment channel technique that doesn't require a hardfork is PayMo 18:23:40 https://eprint.iacr.org/2020/1441.pdf 18:24:04 OK, then typo, right ? *Not* using steg would drive people away (since steg doesn't increase size, but other wauys would) ? 18:24:11 haven't read that paper in depth so not sure if it requires tx_extra data 18:24:12 Yes exactly. Why use a more inefficient system, when others are available? 18:24:21 OK, thanks. 18:24:29 * moneromooo afk again 18:24:35 Do we have an idea of the services which may have used tx_extra for data specifically related to them? Apart from paymentids? 18:25:19 @Monegro I think that's kinda the point. By making it less efficient for arbitrary data you make it more efficient for its core purpose. 18:25:53 @hbs mining pools, serai, someone used tx_extra to comply with OFAC according to sgp 18:26:23 hmm. I guess I'm misunderstanding then. My assumption was that tx_extra is simpler, and that devs were typically opting to use that over other methods 18:26:53 Monegro: Because some people will want their data to be stored on what may become most secure & long lasting database of the planet 18:27:11 I would value much more data stored in Monero than in some nameless protocol 18:27:27 tx_extra is certainly a great vector for evil regulators to exploit, some big oppressive government might arrest anyone who's caught transacting XMR without encoding their ID into tx_extra 18:28:05 Alex|LocalMonero: They also may arrest anyone that doesn't share their view key, you can't prevent users from willingly revealing their txs 18:28:38 @gonbatfire yeah but Monero isn't that, it's a value transfer system. There have been decentralized database projects already, most of them have faded into obscurity 18:28:38 ok Alex | LocalMonero | AgoraDesk, so maybe they need to be aware of potential removal so they can adapt their services, so the earlier they know the better. 18:28:42 gonbatfire: true 18:28:47 > tx_extra is certainly a great vector for evil regulators to exploit, some big oppressive government might arrest anyone who's caught transacting XMR without encoding their ID into tx_extra 18:28:47 I don't really see this as an issue because it's simpler for oppressive countries to just outright ban it 18:28:58 Which they do 18:29:32 Alex|LocalMonero: Yeah I agree that Monero's goal should be money, but still, I trust Monero to be around a lot longer than something like IPFS 18:29:54 Hence why I think people will always be incentivized to store data on it somehow 18:29:55 gonbatfire[m]: My understanding, that using viewkeys don't hurt overall fungibility, careless arbitrary data would 18:30:20 My laymans opinion - if tx_extra is required for payment channels, it should remain. While it's not the savior of scalability, it helps alot. 18:30:59 bit_thanos[m]: A public list of viewkeys does hurt Monero's privacy 18:31:09 gonbatfire: if monero is better at being a database its worse at being a currency; you need to understand that every tiny bit of efficiency needs to be squeezed out of the protocol in order for it to be competitive on the global instant financial market, otherwise someone else will win the competition; if XMR becomes a database like bitcoin is becoming then it is inevitably going to lose that competition 18:31:11 "@Monegro I think that's kinda..." <- That may be intent, yet that's arguably not the effecf 18:31:22 Good point. 18:31:43 And we wouldn't know until it was tried. 18:31:46 IMHO monero shouldn't be ever used for data storage other than transactions. We have problem with size by ring signatures and bulletproofs. I think we shouldn't allow to grow monero more than necessary 18:32:27 gonbatfire[m]: Thanks for clarifying. 18:32:27 Alex|LocalMonero: I really see this as a foolish "what if". Sure, it could happen, but it's not an effective idea and is extremely unlikely 18:32:49 molera: We basically can't stop that. Even if tx_extra is removed, people still encode data in multi-output transactions (and apparently bulletproofs) 18:33:31 Maybe limiting transaction size based on inputs and outputs? 18:33:39 kayabanerve: ok 18:33:41 or they could get in cahoots with a miner (aka block producer) to stuff data in a block 18:35:03 (if there's no tx_extra per tx and its limited to something new in a block header) 18:35:50 my sense is that we can't really prevent people storing data on the chain, but we can protect the fungibility of txs 18:36:49 molera: You run into usability. Plenty of legitimate use has ocassional disributions from one input to multiple parties (outputs) 18:37:14 > That may be intent, yet that's arguably not the effecf 18:37:14 so what's the effect kayabanerve ? That 0.1% of the chain that crypto gymnastics to encode arbitrary stuff will lose out over a competing coin that has a permanent 7.5%-15% global tx fee increase (in case of fixed-size tx_extra) or isn't fungible (in case of optional arbitrary N-sized tx_extra)? 18:37:41 that a chain that has 0.1% of* 18:37:59 "gonbatfire: if monero is..." <- I agree Monero should not persecute to be efficient for data storage, however since data storage is gonna happen in some form anyway, I think we should also look into minimizing the privacy drawbacks of those methods 18:37:59 For example, which method hurts other user's privacy the most? 18:37:59 Other people using tx_extra? Or other people using range proofs to store data? 18:38:39 gonbatfire: that sounds like a separate issue that needs to be fixed, and as pointed out won't exist if/when zk-SNARKs is implemented. 18:39:36 and by the way kayabanerve the foolish what-if is already happening 18:40:09 Hi... (full message at ) 18:40:34 Can someone help me clear up some terminology? I always thought steganography was used to hide/encrypt data right out in the open. But here it seems like "steg" on a set of "vanity address" outputs encoding data, is readily identifiable. So is the term just being used more loosely than normal? 18:41:28 Or is the data encoded actually difficult to detect in the output and bulletproofs space? 18:42:13 Payment channels networks are not a good scaling solution for Monero. 18:43:40 .... because....? 18:44:11 > Can someone help me clear up some terminology? I always thought steganography was used to hide/encrypt data right out in the open. But here it seems like "steg" on a set of "vanity address" outputs encoding data, is readily identifiable. So is the term just being used more loosely than normal? 18:44:11 Typically, I think they mean here that the data is in no way encrypted so it's out in the open, which means you can find it if you're looking for it, but could also just be a wallet with bad randomness 18:44:20 https://moneroresearch.info/index.php?action=resource_RESOURCEVIEW_CORE&id=120 Tang, W., Wang, W., Fanti, G., & Oh, S. (2020). Privacy-utility tradeoffs in routing cryptocurrency over payment channel networks. 18:44:38 "Our results suggest that in practice, PCNs should operate either in the low-privacy or low-utility regime; it is not possible to get large gains in utility by giving up a little privacy, or large gains in privacy by sacrificing a little utility. " 18:45:01 Payment channels are kinda useless, you're basically just doing PayPal with extra steps. 18:45:22 :) 18:45:24 I have not seen any way to do payment channel networks with good privacy. 18:45:34 xmrack[m]: you can send a bunch of dummy zero-amount outputs, then use the onetime addresses and ephemeral pubkeys to record arbitrary data (as long as they are valid curve points, which is trivial to satisfy if you just set the top few bits to zero) 18:46:26 But I don't think you need tx_extra for payment channels anyway 18:47:21 "PayMo does not require any modification of Monero and can be readily used to perform off-chain payments. Notably, transactions in PayMo are identical to standard transactions in Monero, therefore not hampering the coins' fungibility." https://moneroresearch.info/index.php?action=resource_RESOURCEVIEW_CORE&id=48 Thyagarajan, S. A., Malavolta, G., Schmidt, F., & Schröder, D. (2020) Paymo: Payment channels for Monero. 18:47:58 I tried to read that paper. Just far and away above my level of knowledge. 18:48:31 I think this is the updated version of the PayMo paper: https://moneroresearch.info/index.php?action=resource_RESOURCEVIEW_CORE&id=123 18:50:23 Payment channel networks are a series of beads on strings. To move the beads between nodes to make a transaction across the network, you need to know which network nodes own which beads on which strings. That's the privacy issue with them. 18:51:47 Known topology is inherently contradictory to privacy. 18:51:52 I have to head out in a few minutes so I can't wade into a full conversation about payment channels, but I do want to note that I believe privacy-preserving L2's could be very important for Monero in the long run. 18:51:52 The dynamic blocksize is quite brilliant imho, and a very clever solution for handling throughput scalability challenges. But it does not change the fact that Monero's storage requirements scale with ~O(N) the number of txns. L2's allow us to break free of this, important if we want to one day handle transactions on the scale of Visa or something like that 18:53:45 Visa handles ~1800 txs per seconds, Monero can already handle that with current widely-available storage/bandwidth costs. 18:53:55 per second* 18:54:03 Rucknium: Hypothetically, a shared/known topology of a network of payment channels, which arises from an onchain network of solid privacy, should have significant advantages for practical, user-level privacy on the payment network, correct? Or do you not see it that way 18:54:04 ? 18:55:34 1800 txs/sec = 155,520,000 txns per day. That'd take my node offline pretty quick, lol 18:55:55 You don't have 48 cores bro? 18:56:04 The Visa comparison is always brought up, but is that the goal? I personally think that Monero transactions will grow alongside the use of CC, not replace them, so I am not convinced the current Visa throughput is a good comparison. 18:56:19 I have 48 cores, but I'd run out of storage 18:56:44 Yeah its kinda the goal of decentralized digital fungible cash, to make visa and other intermediaries obsolete 18:57:10 This isn't to say that they won't exist, just that they're not necessary anymore 18:57:16 Monegro: I agree it's better than the L1 being transparent like BTC. With PCNs on Monero, basically the nodes will start to build a history and become mere pseudonyms over time. Would people want to transact XMR on a layer that doesn't have great privacy? People barely want to transact on BTC's Lightning Network. 18:57:37 Well I think it's more to provide an alternative, not to make them obsolete per se. 18:57:57 They already have alternatives, you can mail people cash for example. 18:58:09 They're just not practical in the global economy. 18:58:32 sure, let me rephrase that then, an alternative with similar benefits and similar latency :-) 18:58:34 Monero nodes can barely handle 100 tx/sec 18:58:51 just watch how fast it syncs and how many transactions are in a block on average 18:59:05 sech1: I see, I must've seen wrong calcs. 18:59:22 It's some bottleneck in Monero code, it just doesn't use all CPU cores 18:59:51 so it can be fixed, but right now it's 100 tx/sec 19:00:25 Because of the dynamic block size optimizing tx space is really important for global scalability, so a fixed-size tx_extra attached to all txs will severely harm Monero's competitiveness as an efficient payment system. 19:00:28 That PayMo paper lists DARPA as a funder. 19:02:01 https://link.springer.com/chapter/10.1007/978-3-031-17146-8_23 19:02:12 "The work was in part supported by THE DAVID AND LUCILLE PACKARD FOUNDATION - Award #202071730, SRI INTERNATIONAL - Award #53978 / Prime: DEFENSE ADVANCED RESEARCH PROJECTS AGENCY - Award #HR00110C0086 and NATIONAL SCIENCE FOUNDATION - Award #2212746. This work is also partially supported by Deutsche Forschungsgemeinschaft (DFG, German Research Foundation) as part of the Research and Training Group 2475 “Cybercrime and 19:02:12 Forensic Computing” (grant number 393541319/GRK2475/1-2019), and by the grant 442893093, and by the state of Bavaria at the Nuremberg Campus of Technology (NCT). NCT is a research cooperation between the Friedrich-Alexander-Universität Erlangen-Nürnberg (FAU) and the Technische Hochschule Nürnberg Georg Simon Ohm (THN)." 19:04:05 Random thought ... What if we convince WOW to remove their tx_extra and see what happens over there with memes and such? I mean, they're supposed to be the XMR memechain right? 19:11:53 is tx_extra even used on the WOW chain? 19:19:33 Hey, we could restrict our tx_extra to 32 bytes, just a txid for a second transaction on WOW containing the real tx_extra data. Presto, problem solved 19:20:54 +1 19:42:00 brilliant 19:58:40 just caught up on the meeting minutes 19:59:01 special thanks to UkoeHB for his patience and kindness 20:08:14 fluffypony: so what's your view on this? 20:12:31 Alex|LocalMonero: I'm firmly on the "remove" side of this 20:12:57 ❤️ 20:13:35 I feel like it's cathartic, too 20:13:58 I can relate. 20:14:01 the whole point of us doing hard forks vs. soft forks was to forcefully remove participants who didn't keep pace with development 20:14:26 and don't get me wrong - Bitcoin has different goals and different ways of approaching this 20:14:44 but with privacy as our core tenet, our primary goal, we need to *somewhat* force a degree of compliance 20:14:57 being non-compliant with the protocol puts you at risk, but puts downstream txs at risk too 20:15:36 so the protocol needs to have a reasonable level of enforcement in favour of our goal of "pretty solid privacy-by-default for as many people as possible" 20:15:58 culling tx_extra is in favour of that goal, so I support it 20:16:03 right, we're trying to eliminiate the possibility of other users' mistakes harming your own privacy 20:16:33 and, as has been pointed out before, we can utilise other (more fiddly) bits of the tx format to stuff random data if we need to for some future purpose 20:16:37 tx_extra is just lazy 20:16:38 OH!! Hazy memory from a few years ago... 20:16:38 Isn't there some extra room for data in bulletproofs? I think it was on the scale of tens of bytes, maybe enough to fit an address and some efficiently-coded instructions? 20:16:38 That'd be best of all worlds - indistinguishable to a non-involved party, but can be decoded by the recipient's keys 20:17:02 isthmus: yes - I alluded to that on GitHub, we can stuff data into range proofs *and* into tx output addresses 20:17:16 Ooh nice I missed that 20:17:26 there was a lot of room in original rangeproofs. I thought bulletproofs axed most of the deadweight 20:17:27 ? 20:17:38 tx_extra is just the lowest common denominator because you don't need to do anything to use it 20:17:45 I vaguely remember somebody found something which makes that pretty infeasible, or at least quite hard 20:17:45 hyc: yes it does, but there's still some gaps 20:17:54 isthmus: yes, it's possible to encode 31 bytes in the range proof, but the drawback is that this reveals the change amount to the recipient. 20:18:07 ^^ 20:18:16 Ah that's unfortunate 20:18:20 Not a great tradeoff 20:18:27 also I'd like to add that removing tx_extra doesn't mean we can't add stuff in future 20:18:39 if payment channels or whatever need something in future it can get its own dedicated field 20:18:53 Hmmm ... just need 3 years to reach consensus about what and how to add :) 20:18:55 that is content-restricted, space-limited, and every tx has it 20:18:57 lol rbrunner 20:19:08 I'll take that over a free-form field that anyone can abuse 20:19:13 Yup, through a hard fork. 20:19:21 Not through self-segregated unfungible soft forks 20:20:52 So with a bit of bad luck we will have a completely mysterious and fully inexplicable rise of transactions with 5 and 6 outputs after we get rid of tx_extra. 20:21:11 Which won't stick out at all, and be no privacy problem :) 20:21:50 Pretty much all enterprise applications that utilize Monero will have more than two outputs rbrunner 20:22:15 Anything like Serai won't stand out that much 20:22:38 Do they, yeah? Whatever. Everything has trade-offs. 20:23:43 ~95% of transactions have 2 outputs, everything else stands out. We just pretend it's OK. 20:23:53 This reminds me a bit of attempts of getting a fully clean society by putting 20 years of prison on merely carring 1 gram of drugs. 20:24:15 Net result is *not* elimination of drug addiction, but just pressing it underground. With quite some consequences. 20:24:30 Can't it remind you of attempts to cure cancer? 20:24:38 Exchanges, centralized mining pools transactions for example usually have more than 2 outputs 20:24:51 Cancer? 20:25:08 Zcash set low flat tx fees because a powerful adversary could spam the chain regardless of the fee level. That reasoning is technically correct, but their decision lowered the barrier to spam attack. Removing Monero's tx_extra would raise the barrier to arbitrary data on chain. 20:25:35 https://forum.zcashcommunity.com/t/heavily-increased-transaction-load-since-june-14/42349/12 20:25:36 classic ZCash logic :) 20:25:41 tevador: by the way do you envision a solution for batching withdrawals for exchanges and the like without using more than two outputs? 20:25:52 "Speaking for myself: I think fee policy cannot be a particularly effective anti-DoS measure. Fees would have to be too high (for normal usage) in order to work for that purpose. Fee policy could potentially help to some extent to buffer spikes in demand due to organic usage. For now, I think that the changes in v5.1.0 are likely to be sufficient to address any short-term performance problems with current transaction load." 20:25:59 lol xfedex[m] 20:26:39 tevador: we could enforce 2 outputs at a protocol level and make them spread it over multiple txs, and maybe that's where we land if uniformity is the goal 20:26:55 If we want indistinguishability, we can't have batched transactions. Eliminating the 10-block lock would help. 20:26:58 but I don't think it's a today concern - let's focus the cat-and-mouse game on what is important today 20:27:17 tevador: that's a good point, the 10-block-lock is the real problem for transaction batchers. 20:27:29 yeah chained txs are a win there for sure 20:27:39 Average outputs per transaction are about 2.5. You can use monero-blockchain-stats to see it 20:28:51 The 10-block-lock is itself also a contributor to unnecessary bloat for people that are generating outputs for themselves. 20:29:24 from* people 20:29:26 Wownero might remove transfer_split and limit non-coinbase transactions to 2 output in the next hardfork, as an effort to annoy centralized mining pools 20:30:26 fluffypony: Maybe enforce 4/8/16 ? 20:30:51 nikg83[m]: yeah tons of options, but definitely a tomorrow problem! 20:31:06 nikg83[m]: I don't think that would be actually useful 20:31:13 Anything more than 2 outputs would just bloat the chain the slow down wallet sync. 20:31:31 I just realized that I never voiced my position on the debacle. I am in favor of option (1) to remove tx_extra in favor of transaction uniformity 20:31:53 🥂 20:32:42 Hopefully it can be settled next week. 20:33:35 Fee policy is the only practical tool to deter spam, DDOS etc on a privacy network where all the txs are designed as much as possible to look alike 20:33:46 tevador: 2 outputs and batched transfers would handicap many usecases 20:34:40 I think it would be better to discourage the user from creating transactions greater 2 outputs, like the this-is-probably-a-spy-node option 20:34:58 * creating transactions with greater 2 20:35:00 The disadvantage an attacker has is the need for volume to have an impact. 20:36:06 a 16-out transaction costs about double the fees of a 2-out tx. But allows attackers to create 8x as many poisoned outputs. 20:37:39 What about bumping up fees for "non standard" transactions like 16-out ones? 20:38:32 tevador: that's a good point 20:38:44 tevador: True in theory. 2-outs was used in the only documented case of an apparent flood incident: https://mitchellpkt.medium.com/fingerprinting-a-flood-forensic-statistical-analysis-of-the-mid-2021-monero-transaction-volume-a19cbf41ce60 20:38:57 Maybe it will be different "next time" 20:39:19 Rucknium[m]: but if it's cheaper to create 16-output txs and an attacker wants to Sybil then that makes more sense 20:39:29 if they just want to flood then 2-output txs make sense 20:39:53 "Wownero might remove transfer_sp..." <- Would this affect p2pool payouts? 20:39:58 It's true that flooding with 2-out txs has a lower chance of being detected. 20:40:19 xmrack[m]: No, because the limit is just for non-coinbase transactions; p2pool pays out miners using coinbase transactions. 20:40:20 p2pool uses coinbase 20:40:54 It would only affect centralized mining pools 20:41:04 but how many poisoned outputs are needs for a viable flooding attack? 20:41:14 Increasing the ring size is the answer here 20:42:01 Understood, thank you 20:42:52 Poisoned outputs can be a problems especially because of light wallet such as MyMonero. I don't exactly know how many transactions MyMonero handles, but I guess it's a lot. 20:43:02 I am for reducing the total number of anonymity sets; however I am far from convinced that having just one is optimal from the perspective of privacy 20:44:11 For example we can reduce the possible number of outputs to just 2,4,8,16 or even 2,4,16 20:45:55 I much rather have a handful of large anonymity sets than just one small one. So we have to balance this with usability, efficiency adoption etc. 20:46:08 "a 16-out transaction costs about..." <- What is the computational cost for each additional output from the context of a node? Linear? 20:46:47 The 16 out tx is prive to balance the computation cost with the space savings 20:46:54 priced 20:47:12 That is why weights were introduced 20:47:39 FWIW, I am less concerned about wallets/users that occasionally create stand-out txs (e.g. w/more than 2 outputs) than I am about users/wallets that always do the stand-out thing. Wallets doing stand-out things is the basis for a lot of tracing in bitcoin. 20:49:09 https://arxiv.org/abs/2107.05749 Möser and Narayanan (2022) "Resurrecting Address Clustering in Bitcoin" 20:50:00 if anyone is "always" doing that, they're intentionally shooting themselves in the foot 20:50:55 Yes, I think a good first step would be to have a limited set of transaction shapes, e.g. #inputs = { 1, 2, 4, 8, 16, 32, 64 }, #outputs = { 2, 4, 8, 16 }. 20:51:08 "We’ve compiled and evaluate a set of 26 [BTC] change address heuristics based on previous literature and community resources. Most heuristics individually produce few false positives at low to medium true positive rates." 20:51:08 i have posted about this issue online multiple times over the past few years and we have some discussion threads on github too 20:52:24 limiting txn inputs will interfere with e.g. sweep_all 20:52:45 Seraphis will already impose a limit of 112 inputs per tx 20:52:53 yeah limiting inputs like that would make input selection way harder 20:53:17 tevador wouldn't constraining the number of inputs to a fixed set of possible numbers lead to usuability issues, forcing churning before a spend? 20:53:40 By the way a lot of tracing on Bitcoin actually does not work. There is a big difference between the marketing claims of the blockchain surveillance (BS) companies and reality. 20:53:46 if only we cared to invite the academics working on this stuff :) 20:53:58 yes, it could cause some issues in a tiny fraction of cases 20:55:12 MAGIC Monero Fund directly reached out to a few academic researchers who have shown an interest in the Monero ecosystem. We haven't gotten any grant applications yet. 20:57:19 ignoring fees, if i have 10 outputs of 0.1 and want to send 1 monero, this is a trivial 10 in 2 out tx. now you must send-to-self outputs until you have 2 that combined = 1 :( 20:57:33 There is a big difference between legitimate scientific research and marketing BS when it comes to tracing transaction on any chain 20:58:34 well i have gotten offers of free involvement, Rucknium[m]. but what message do they get when we indicate we wont benefit from them? 20:58:48 that is what they have been told both directly and indirectly by us 20:59:22 I am all for inviting and encouraging the legitimate scientific research. As for the marketing BS this belongs in the courts not here 20:59:43 monero will be a footnote if we dont take our blinders off 20:59:51 research continues quickly elsewhere 21:02:46 endogenic: are you ok? 21:02:51 what blinders do we have on? 21:05:38 tell me hyc what are the latest advances in research on the techniques monero could apply for solving these problems? past 2 years or so? 21:05:42 anyone? 21:05:48 no. i'm not okay. 21:06:10 A lot of trustless zk-SNARKS that are not battle-tested. 21:06:33 and still a lot more resource-intensive than our stuff 21:06:35 Or even have formal peer review 21:06:44 and probably infested with govt backdoors... 21:07:00 what is that belief that academic research is on the forefront of every subject? There is a balance to have between fundamental research and hands on implementations, neither side can be blindly trusted 21:07:39 nothing to do with snarks guys 21:08:08 I belive we are on the right track here with Seraphis and 128+ ring sizes 21:08:40 "Yes, I think a good first step..." <- By the way, could powers of two number of outputs pose a benefit for verification/batching? 21:08:41 that doesnt solve a variety of fingerprintability causes 21:10:08 Seraphis actually solves many fingerprintability issues, e.g. with discretized fees, fixed number of pubkeys, (possible) removal of tx_extra etc. 21:10:17 hbs[m]: the sort of research i'm talking about has only begun here *today* apparently aside from my past few years of suggestions. so it doesnt count if we dont consider the problems important enough to research 21:11:39 tevador: P.S. Plus decoy selection enforcement possibly. (I know some people are against that) 21:11:47 today? you mean this discussion of how to keep txns uniform, that has been a constant theme for the past N years?\ 21:12:16 that's obviously not it. please stop sabotaging the discussion 21:12:36 or is it you who doesnt understand the difference ? 21:12:45 hyc 21:13:14 We are talking of trust-less zk-SNARKs? Is there something that is competitive from a verification time and size perspective? 21:13:47 We carefully avoid to make any too specific statements, that way the "discussion" would be over too soon ... 21:13:48 Yes: https://github.com/monero-project/research-lab/issues/100#issuecomment-1423154798 21:15:44 endogenic: sounds to me like you're the one trolling here. There are no easy answers, all of them have been taken already. 21:15:49 lol rbrunner with that wit again 21:15:58 Thanks I will take a look 21:16:20 every suggested change has tradeoffs that will affect usability 21:16:48 dont want to join that heated discussion, and it is not realy a zk-SNARK, but from what i understand Curve Trees could work for a global anonymity set 21:16:59 endogenic: is referring to mandating a fixed number of tx inputs and outputs, and also some payment channel research that Mr. Moreno-Sanchez has done (that has not received too much attention since sarang stepped away). 21:17:23 pedro has done a lot more than that 21:17:37 you can hardly categorize all relevant academic work that way 21:17:45 atomfried[m]: yes, Curve Trees are mentioned in the discussion I linked. 21:18:26 and. there are other researchers 21:18:30 https://dblp.org/pid/128/4640.html payment channels, swaps, and related is what I see 21:18:38 yes. related. 21:20:06 Not sure why I am your spokesman endogenic, you are an adult who happens to be older than me by numerous years. 21:20:27 good question 21:20:46 i also have been writing software for about ... 25 years 21:20:51 but ignore me 21:20:53 it's ok 21:22:20 the point is, speak clearly and directly and don't waste everyone's time 21:22:27 i hVe 21:22:31 stop wasting my life 21:22:50 The world of Open Source is not about seniority or academic track record, it's above all about contributing in a collaborative and constructive way 21:23:14 this isnt an open source project anymore 21:23:22 wool pulled over y'all's eyes 21:24:10 wool is more comfy than tin foil 21:24:31 I've met countless people who tried to impose their views not by the quality of their contributions, however small they are, but by external metrics, that never ended well 21:26:43 good talk, folks. guess it's over. 21:46:02 "Yes, I think a good first step..." <- Enforcing a limit on the amount of inputs can cause situations, where the user can't spend more that ≈50% of their balance at once (2^n-1 equally valued coins in their wallet, n→∞). Bad ux imho, as users shouldn't have to know how the protocol works on a technical level in order to use Monero. 21:49:35 I've been advocating for dummy inputs, which would solve this problem: https://github.com/monero-project/research-lab/issues/96 22:04:19 tevador👍 22:46:24 tevador: in the dummy inputs issue I asked if they would solve the 10-block-lock problem, what do you think? 22:48:46 "this isnt an open source project..." <- Are there any pull requests pending from you ?