-
m-relay<rucknium:monero.social> Here is a draft of "Required possession duration of malicious hashpower for successful double-spend attack with a _z_ stopping rule." gist.github.com/Rucknium/37d772f7232aef3989bfd5b9c6d99596
-
m-relay<rucknium:monero.social> Direct link to table: gist.github.com/Rucknium/37d772f723…k-success-probability-of-50-percent
-
m-relay<jeffro256:monero.social> Diego Salazar: If possible, would you please be able to provide a estimate of the man-hours of work required, given that quote amount?
-
m-relay<diego:cypherstack.com> Sure. Although I was going to get back to you guys today that that was a bit of an overestimate (after further discussion this past weekend with my cryptographers). Price would be closer to 125 XMR. Estimate somewhere around 120 man-hours. To deliver in a timely fashion some of those would need to be overtime hours. We've got quite the workload at the moment. Price can probably f<clipped message>
-
m-relay<diego:cypherstack.com> urther reduce if you're fine with a 2-3 month delivery time frame.
-
m-relay<diego:cypherstack.com> FYI, Cypher Stack is training up two interns (both with mathematics masters degrees, one with almost a PhD). Putting them through the Monero research gauntlet and more.
-
m-relay<diego:cypherstack.com> So hopefully these time bottlenecks will reduce soon.
-
m-relay<diego:cypherstack.com> Also looking for one more potential intern if you guys know of anyone to recommend. The goal is to get new blood into the privacy research game.
-
m-relay<jivanyan:firo.org> How much you pay to interns?
-
m-relay<diego:cypherstack.com> Message me for specifics.
-
m-relay<jeffro256:monero.social> Diego Salazar: Thanks so much for the update
-
m-relay<diego:cypherstack.com> You're welcome. Let me know what you all decide.