-
Rucknium
-
Rucknium
Lyza: ^
-
Rucknium
MRL meeting in this room in one hour
-
Rucknium
-
Rucknium
1) Greetings
-
m-relay
<vtnerd:monero.social> Hi
-
rbrunner
Hello
-
Rucknium
2) Updates. What is everyone working on?
-
m-relay
<vtnerd:monero.social> Me: subaddressses in lws.
-
Rucknium
me: Created some data tables to help "someone(s)" to track down which wallet implementations may be producing nonstandard fee txs:
github.com/Rucknium/misc-research/tree/main/Monero-Nonstandard-Fees
-
endogenic
i have some major improvements to fee normalization for lws clients fwiw
-
endogenic
publishing momentarily
-
endogenic
not sure if i should mention it so soon but i even normalized tx creation code
-
endogenic
(discarding my custom entrypoint to cryptonote tx utils)
-
rbrunner
I guess that normal users / non-devs have a hard time to see whether their fee is standard or not when they transact with those wallets?
-
Rucknium
Thanks. How do your improvements interact with jberman's fixes to MyMonero's fee calculations?
-
endogenic
which fixes, his old ones from like 2 yrs ago? one he solicited my feedback on causing me to get banned on a certain github org's repos?
-
Rucknium
rbrunner: I don't think so. Users just need to check what the fee per byte in the wallet UI tells them. If it doesn't tell them, then they can look up the tx ID on xmrchain.net
-
Rucknium
Yes, I think those fixes.
-
endogenic
it supersedes them.. no need for them
-
endogenic
they ensure decoy out pinning to previously chosen spendable outs
-
endogenic
wallet2 code does that naturally
-
endogenic
brb
-
rbrunner
I was brainstorming about making a post on Reddit to get broader help, and there all kinds of people would potentially try, also some that have never even seen a block explorer
-
rbrunner
But not sure whether those people would be ready to transact and then send the tx id somewhere, for inspection
-
Rucknium
Exact fee calculation seems hard to me. Fee is part of a tx (as a variable integer C++ data type(?)). You have to know what the fee is to calculate the fee based on fee per byte. It's a little recursive.
-
Rucknium
In the tables I Just tried to get clusters of fees that were far from any standard fee level so I didn't have to think about fees that are very close, but not quite, what wallet2 does.
-
Rucknium
rbrunner: You can run the xmrchain.net block explorer locally if you have a non-pruned monerod node. So they can avoid any privacy issues that way.
-
endogenic
The fee is based on the data size or so-called weight of a transaction, and the fee field is of fixed data size, so it should not actually affect the fee calculation
-
Rucknium
Ok. I based what I said on Zero to Monero 2.0 "Transaction fee: stored as a variable length integer, so ≤ 9 bytes". I don't know the details of the code, of course.
-
rbrunner
Sure. We are talking a little past each other, maybe :) I am thinking about the proverbial "grandmother" at the smartphone Monero wallet
-
rbrunner
But never mind, will think about a little more
-
plowsof
hello
-
Rucknium
I agree that this treasure hunt isn't for grandmothers :)
-
endogenic
oops
-
endogenic
i'll have to go back and check. I did say that without full confirmation.
-
Rucknium
plowsof: Did you have an update?
-
endogenic
anyway, if the fee is actually stored as a variable length, it should probably be padded for fungibility
-
Rucknium
It looks like we are already in 3) Discussion. What do we want to discuss?
-
rbrunner
If anything, what plowsof reported in Monday's wallet workgroup meeting, log here:
monero-project/meta #898
-
plowsof
apologies for the late update. for the BP++ peer review from CypherStack - i have added the "out of scope" feedback received after they looked at the new paper (i placed an asterisk on "Efficiency" incase the "Optimised Binary range proofs" point effects that (to be confirmed) but the price, for the new paper will be $32,000
-
Rucknium
So we would need to raise about 13,000 USD more in a new CCS, correct?
-
Rucknium
-
rbrunner
Looks like that to me
-
plowsof
correct, more funds would have to be raised / come from somewhere.
-
Rucknium
Probably MAGIC would be willing to host the fundraiser. CCS could too, of course.
-
rbrunner
Is there somewhat more to do than assumed back in March when we did the original CCS?
-
rbrunner
I mean, for CypherStack
-
plowsof
i have not yet collated initial feedback / replied to zksecurity yet (tooth/ear/gum issues) - but the reply to their interest would be pushing them to agree to a scope of work / concrete deliverables - and aiming for a lower funding cost of $10k/week, and also if possible a '3 month' longer term grant (if they feel that its required)
-
Rucknium
plowsof: Has anyone given any reasons not to raise the rest of the funds for BP++ peer review?
-
plowsof
this is the first time sharing the new price
-
Rucknium
Have any Monero-associated cryptographers commented about whether zksecurity would be a good firm to do the job?
-
rbrunner
I also wonder a bit who would go into concrete negotiations with them, as a question of organisation on our side ...
-
Rucknium
"We tried, but couldn't construct a math proof of security" is a possible outcome. That makes this tricky.
-
rbrunner
Anyway, the list of "our" cryptographers is not that long, probably UkoeHB, Tevador, kayabaNerve and maybe lately and upcoming Jeffro256
-
m-relay
<kayabanerve:matrix.org> jberman:
-
m-relay
<kayabanerve:matrix.org> I believe they reached out to ZkSecurity, though I may be thinking of a different firm.
-
plowsof
zksecurity are interested , the tldr is they need to (after feedback received from some nwlb/mrl members) is to tell us what they plan on doing (with concrete deliverables) for a 3 month time scale which has been the norm for our funding platforms and push for the low end of their rates ($10k/week)
-
plowsof
$120k for 3 month seraphis work would have to show its worth ... and then we compare/contrast as cypherstack are also interested in seraphis work
-
rbrunner
Well, yes, devs use to make 3 months CCSs, but for cryptographical work I think we could easily be more flexible
-
Rucknium
Isn't the scope Gist supposed to provide deliverables? We're dragging this out.
-
rbrunner
All on my own I would probably entrust them first with something of smaller size, just to test, say something that could be done in 3 weeks or, like the BP++ stuff
-
rbrunner
and only then move up into six figure regions
-
plowsof
ok, pin them on this
gist.github.com/plowsof/8cb33e2efe4bf0239927ad3bd92326e0 and receive the quote/timescales from Zksecurity + CS?
-
Rucknium
The root of this problem is laying down a protocol and code without security proofs to back them up.
-
Rucknium
People who don't do cryptography (rbrunner, plowsof, me) cannot do this part of the project IMHO.
-
rbrunner
+1
-
plowsof
<jberman> The third bullet point would be blocked until the address spec is settled, but creating a formal security model would not be*
-
rbrunner
That's just a little additional problem on top of it all :)
-
Rucknium
I try to provide some research infrastructure (moneroresearch.info, list of open research questions, technical review on MAGIC committee), but I have limits and I have to focus on my own research.
-
rbrunner
Maybe some of those cryptographers reads this log and is in the mood to take the lead here
-
rbrunner
*Maybe one
-
Rucknium
To be clear, no one owes Monero any labor. If our constraints include "we don't have enough expert labor to move certain projects forward", then I can work within those constraints.
-
rbrunner
Agree. Such things tend to go astray anyway if you try to force them. True interest probably has no substitute.
-
rbrunner
Let's wait and see a bit, Monero usually muddles through somehow.
-
Rucknium
Bring back Triptych. It has security proofs :)
-
rbrunner
Isn't that even implemented as well?
-
Rucknium
I don't know. We can close the meeting here. Thanks everyone.