01:01:14 In general, we should probably keep CCS discussions to -community. 05:08:57 > seraphis is out of reach for the next few years 05:09:05 It's astonishing how this claim propagates 05:10:17 As if there may be people around who *want* to have that 3, 4, 5 years out ... 05:19:39 > gas lighting for FCMP 05:19:58 I don't exactly what that means, but I counter with "The gras is always greener over there" :) 05:20:19 I see myself out, this is the MRL room ... 06:29:04 rbrunner7: jberman was 3y I believe, if with FCMPs. The most favorable version I've seen is ~1.5y. I'm unsure I've heard your explicit estimate, but between that and koe's own estimate... I at least understand why the claim is being propagated. 06:29:31 Though I don't think anyone is gas lighting re: FCMPs 😅 12:33:27 Hey all, as you know we usually cover ~1/3rd of "fundational" (whether dev or research) CCS proposals, from the General Fund. 12:34:28 I don't see a reason to use General Fund at this point, as we can simply fund proposals trough CCS and keep rainy fund for the rain 12:36:08 (hopefully never) 12:39:07 another remark, skipping community to vote for proposals in MRL is kind of wrong, there is technical and business aspects of the community / problem 12:41:12 we can't expect devs working on coding or math problems to be fully into the wider community aspects with all due respect, its kind of frustrating sometimes to be into loop for all of the happening 12:42:56 so we can't blame them later for making decisions which lead to milky or community money waste 13:36:08 I don't see a reason to use General Fund at this point, as we can simply fund proposals trough CCS and keep rainy fund for the rain <-- doing so has long been a public policy of the GF, so I intend to honor that practice for all donors' sake 15:48:37 If general fund ceases to fund ccs proposals what incentive would there be for these whales to keep making large donations like we have seen in the recent weeks? Donor would see that the money is not put to use and stop donating. What is a "rainy day" anyway? But I digress 16:20:35 I read through https://gist.github.com/kayabaNerve/0e1f7719e5797c826b87249f21ab6f86, which is kayabanerve's proposal for replacing CLSAG with a FCMP. The membership proof design is at least plausible on the surface (it follows a similar pattern to what we're doing in Seraphis and Lelantus Spark), although I don't know if it can actually be implemented securely with these 'generalized bulletproofs'. The proposed timeline 16:20:35 of 1 year to deployment is very optimistic, I'd put it more like 2 years based on the current pace of Monero development and review. Writing proofs is much faster than all the other tasks to bring a new (very complicated and advanced) proof structure onto mainnet. I'm also skeptical about bringing in a Rust dependency, which would be a major shift in the Monero core repo (not to mention bloating binary sizes). 16:20:35 I'll add this comment to the CCS as well. 16:23:35 Thank you, koe 16:34:19 Short update on my current CCS: I scraped together 38.25hr since June of last year (mostly on PR reviews, with the bulk aimed at jeffro's Jamtis updates), and have 117hr remaining. 19:33:17 > I'm also skeptical about bringing in a Rust dependency, which would be a major shift in the Monero core repo (not to mention bloating binary sizes). 19:33:18 The ideal solution, regarding binary size, would be for kayaba's library to be `no_std`, it is theorically possible since `crypto-bigint` (and generally RustCrypto) has been written with `no_std` in mind. Tho, I'm not sure kayabanerve genuinely wish to spend time in this realm. 19:33:51 > I'm also skeptical about bringing in a Rust dependency, which would be a major shift in the Monero core repo (not to mention bloating binary sizes). 19:33:52 The ideal solution, regarding binary size, would be for kayaba's library to be `no_std`, it is theorically possible since `crypto-bigint` (and generally RustCrypto) has been written with `no_std` in mind. Tho, I'm not sure kayabanerve 19:33:53 genuinely wish to spend time in this realm. 19:48:47 no_std can cause usage of less efficient or less secure solutions and should not be used here. 19:49:26 And no, we can't use no_std unless we take a rand seed on init and use a seeded CSRNG for all entropy. 20:28:05 Interesting, I didn't know this could cause these difference. I also haven't think about the CSRNG. 20:46:43 Take HashMap. std seeds from RNG to prevent certain DoSs. no_std frequently causes a fallback to hashbrown which doesn't. 20:46:44 Also, some libs alias no_std to low memory variants of algorithms (increasing runtime). 22:13:06 @kayabanerve if I may take the position of devil's advocate, the code can be written to support no_std without requiring users to use it. Using std could still be the default feature configuration, and for those that want no_std, passing in a random seed at runtime is a relatively easy problem to solve 22:15:17 A huge benefit to no_std compatibility that is often overlooked, is embedded hardware compatibility. It becomes possible to run on microcontrollers (e.g. hardware wallets) or obscure CPU architectures that don't have std support. Making std software support these targets is a much more difficult task than designing good no_std software 22:18:19 Huh. Have anyone thinked about monerod targets ??? I'm for including rust in monerod as I'm part of the Rust evangelist strike force, but iirc monerod support targets that are unsupported by Rust std. 22:26:09 `x86_64-unknown-freebsd`, `x86_64-unknown-netbsd` are Tier 2 with Host Tools 22:26:09 `aarch64-unknown-freebsd`, `aarch64-unknown-netbsd`, `aarch64-unknown-openbsd`, `riscv64gc-unknown-openbsd`, `x86_64-unknown-openbsd` are Tier 3