04:00:11 Is cutting the block times in half really necessary under PoP? I feel like if you develop a significant enough lead either way most likely already have enough HR to do a 51% attack. 07:36:11 And is there a more fleshed out update on the finalty layer? 07:42:10 Like will it at the very least have slashing for example 08:12:24 <0xfffc> https://github.com/monero-project/monero/pull/9933#issuecomment-3273821910 11:29:22 @0xfffc: great! 12:57:22 the CSV list with orphans, https://irc.gammaspectra.live/2990a5684cf1c5a5/qubic-blocks-epoch177.csv 12:57:22 If trying to filter for the area of interest that @rucknium:monero.social looked at, filter by address for 176 it being 49heVqhSznN9eoatkooNJLHHsRV6XiitDeW4J92cgney8BFfuacZGmzSA3fRKEHooC7X9xzCP9VXN6uK7XrpoXF35FXfQCP 14:48:18 DataHoarder: Thank you. I created the "Paths to majority hashpower" plots for this newest data (Qubic epoch 177): https://gist.github.com/Rucknium/fb9a02fbd89c8d93e0d9f48fbc470e05 15:03:12 No table? :) 15:03:26 MRL meeting in this room in two hours 15:04:47 DataHoarder: What were the marathon times for epoch 177? 15:05:24 Wed 03 12:00 UTC to Wed 10 12:00 UTC 15:05:27 oh 15:05:35 Same as every epoch 15:06:25 Same days of the week, every week? Alright. 15:06:51 So Thu 04 12:00 to Fri 05 12:00, then Sat 06 12:00 to Sun 07 12:00, then Mon 08 12:00 to Tue 09 12:00 15:07:03 Yeah. It's hardcoded in their qubic node code 15:07:41 The variable mining depends on their ticks, but the marathon is hardcoded to switch at tick switch edge, dependent on local time 15:11:54 DataHoarder: Done 15:20:03 Not local time, UTC time. But yes, it can be affected by an incorrectly set local clock 17:00:18 Meeting time! https://github.com/monero-project/meta/issues/1266 17:00:26 1. Greetings 17:00:30 waves 17:00:33 Hi 17:00:38 <0xfffc> Hi everyone. My apologies. I will absent from today’s meeting, have to take care of a personal business. 17:00:38 <0xfffc> 9933 is ready. 17:00:58 Hi 17:01:27 Hi from IRC 17:01:41 Hello 17:01:50 Hi 17:01:52 Howdy 17:02:15 hi (its gingeropolous) 17:02:16 Hi 17:02:51 2. Updates. What is everyone working on? 17:03:52 me: continuing on PR 81 wallet2 FCMP++ refresh refactor updating for jeffro's review comments (PR update incoming today), implemented multithreaded FCMP++ batch verification in the daemon (for txs in a single block), then planning to debug an FCMP++ consensus bug both jeffro and ofrn encountered after the recent round of changes 17:04:14 Me: reviewed @j-berman's seraphis-migration PR #81 and am working on reorg handling fixes for multisig wallets on upstream. Hopefully improves UX in Haveno 17:04:36 Me: knocked out some lws+lwsf bugs, still have to fix auto fee in lwsf. Otherwise been working on carrot in lws, and luckily little changed in the libs such that fcmp++ branch is already compiled and linked into lws. Much work to do with carrot though 17:04:36 monerosim - got monero's native p2p discovery working on a simulated internet, txs relaying, can run xmrchain after a sim and browse the blockchain. ramping up to that 1k node mark. 17:04:49 me: Empirical analysis of risks of rolling DNS checkpoints ("Paths to majority hashpower": https://github.com/monero-project/monero/issues/10064 and https://gist.github.com/Rucknium/fb9a02fbd89c8d93e0d9f48fbc470e05 ). Working on a transaction spamming library for stressnet. 17:05:07 I am working on oprions for the fee scaling and addition of the sanity median. Should have something by the end of this week. Also reviewing POS attacks especially related to cost of capital Also preparing for a talk this Friday. 17:05:41 Hit 40mb blocks on an fcmp testnet 17:06:36 I announced monero-oxide and the $100,000 bug bounty for it, and the Monero FCMP++ testnet will use the monero-oxide repository for the FCMP++ libraries 🎉 17:07:26 (advertisement for people to come take Power Up Privacy's money by breaking monero-oxide) 17:07:46 kayabanerve: Have a link? 17:08:05 @kayabanerve:matrix.org: (repeating from NWLB, this means tx construction time for large input txs will have the latest faster impl, where higher n inputs takes n times as long to construct) 17:09:19 rbrunner: To monero-oxide or the $$$? 17:09:31 3. Carrot follow-up audit (https://gist.github.com/jeffro256/12f4fcc001058dd1f3fd7e81d6476deb). 17:09:33 Why not both? :) 17:10:13 https://github.com/monero-oxide/monero-oxide 17:10:13 https://immunefi.com/bounty/monero-oxide 17:10:33 Thanks! 17:11:43 Not much to report about the Carrot follow-up audit, Cypherstack hasn't responded last week 17:12:05 Will probably ping them in the next couple days 17:12:33 I believe the plan is a response later today, but let me verify 17:13:00 Awesome, thanks a lot @freeman:cypherstack.com! 17:13:29 4. Transaction volume scaling parameters after FCMP hard fork (https://github.com/ArticMine/Monero-Documents/blob/master/MoneroScaling2025-07.pdf). 17:13:49 If no objection, I will limit discussion of this item to 30 minutes. 17:14:39 I expect to have options for this later this week based upon keeping the minimum penalty block weight at 1 MB 17:15:48 Going to raise this point I raised in NWLB again: voicing my own support for ArticMine 's latest fee proposal to scale fee by tx byte size alone without considering verification time, considering tx size as a whole actually does increase a significant amount as n inputs increases beyond just membership proofs size 17:16:23 I should point out that large transactions are a problem. for example 50% of the ZM we are looking at 25% of the block reward to scale and 50% if they are competing with smaller transaction in the same fee tier 17:17:51 I would argue that we should charge by input count instead of byte size, which (to end user) makes 1 inout vs 128 input scale linearly, but to node runners / miners, it means higher per-byte fee for higher input txs 17:18:02 We can to a degree factor in verification time, but the reality is that when transactions are over 4% of ZM thinng do start to break down 17:18:36 The penalty does not see number of inputs it only see weight 17:18:47 @kayabanerve:monero.social raised objection to this in favor of instead implementing an approach that incentives multiple lower input over single high input txs (with the underlying goal being to nudge the ecosystem toward low input uniform txs), and stated satisfaction with no incentive either way toward low input or high input (i.e. perfectly linear weight increase) 17:18:57 Ultimatly the penalty drives fees 17:19:24 ArticMine: Yes miners only care about weight, but weight can defined however we want it to be 17:19:30 Yes this is an option 17:19:46 for example incentivzing up to 8 inputs 17:20:27 Incentivizing chain bloat doesnt make sense to me. 17:20:34 It is the 32+ inputs that start to be a problem 17:21:28 The idea is to incentivise wallet maintenance with say 4 inputs etc. It is something I support 17:21:41 its not something i support at all 17:21:45 From the perspective of minimizing chain size and verification time, 32+ input txs are strictly better than 4+ 8-input txs 17:21:58 I can only reach 40mb blicks easily by abusing 2input txs 17:22:02 ArticMine: is this 4% of Zm figure coming from the fact that it starts to be very profitable to start solving the discrete optimization problem for transaction inclusion versus approximating it? > We can to a degree factor in verification time, but the reality is that when transactions are over 4% of ZM thinng do start to break down 17:22:12 Shure but they simple do not scale 17:22:34 Yes that is part of it 17:23:06 incentives to force merchants, exchanges, or users to make excessivelt large txs makes no sense to me 17:23:19 What is the other part? 17:24:14 If i can send 128input tx at say, 1.5kb per input, why should i be forced to split that up into 2.5+ kb/input? thats just bloat for no reason. Sure it charges more money, but its huge 17:24:31 but even simple approximations to optimize discrete optimization problem come in. Fore example priortizing small transaction wtihin a fee tier 17:24:47 You can charge more per-byte for large input txs by "simply" charging "static" fees per input 17:25:33 If we set a fixed weight for the proofs that is what we are doing 17:25:55 We need that anyway for FCMP+ 17:26:26 I mean 128 input tx can be an attack vector 17:26:28 Has anyone stated an explicit objection toward linear increasing weight (i.e. 128 input has ~128x the weight of 1-input)? 17:27:05 I prefer that at the moment 17:27:31 Seems the approach that's most likely to get consensus imo 17:27:50 You want to apply this to the membership proof? 17:28:07 It can be done 17:29:05 It probably makes more sense to be applied toward tx weight as a whole, because tx weight overall is where incentives apply 17:29:42 ... but we still have to pay the higher fee rate at least above 8in 17:29:54 we have to deal with the penalty 17:30:11 I disagree with a 1MB penalty free zone. That's unnecessarily large. 17:30:27 I say b/c of all the battling interests and opinions, we go with the simplest reasonable weighting system (linear wrt input count roughly following byte count). 17:30:33 There is a lot of evidence it is not 17:30:48 Starting with fees vs adoption 17:31:17 if we increase the tx wieght by a factor of 4 we need to increase the penalty free zone 17:31:33 it actually shoud be 1.2 MB 17:31:57 Before bulletproofs, we had much larger transactions and a much smaller penalty free zone. 17:32:00 I still don't understand why, though 17:32:19 ... and adoption was lover by a factor of 5 17:32:38 on chain adoption 17:33:01 That's what the dynamic scaling is for. 17:33:26 A large penalty free zone invites spam. 17:33:31 No if you start with very hign fees that merket just walks away 17:33:51 Why does a 4x increase in transaction weight necessitate a ~3.33x increase in the minimum penalty free zone? The median transaction size will still be significantly smaller than the minimum penalty free zone 17:34:42 ArticMine: You said last meeting that you would also want an increase in fees 17:34:45 https://bitinfocharts.com/comparison/monero-transactions.html#log&alltime Just take a look at the evidence 17:34:52 Last meeting I calculated a tx fee of $0.03 with a penalty free zone of 600KB. That's not very high. 17:35:29 Actually at the height of the recnet bul market is is highe 17:35:38 and transaction barely scale 17:36:14 and how many txs fit in 600 kb? 17:36:27 That is not the point. 17:36:44 it is the fee that have to be paid to scale 17:36:51 ~80 17:37:04 We can adjust the long term median at hardfork to match the historic tx volume with the new reference tx size. 17:37:06 but we avg abt 40tx/block atm 17:37:17 95 1-in/2-out, if going purely off raw byte size 17:37:25 as it is we are barely able to scale and there was an attack recently to prove that 17:38:22 barely able to scale as in the dynamic blocksize didn't kick in? 17:38:35 Wen we kept ZM at 300000 bytes after bulletproofs adoption increased by a factor of 5x 17:39:07 I fail to see the causal connection. 17:39:13 correlation is not causation. 17:39:24 I mean Please take a look at the blocksize evidence 17:39:31 it is not casual 17:39:52 there is also evidence of a small drop in adoption after the last fee increase 17:40:11 The blocks didnt grow during the spam attack due to the auto-fee not using the "normal" fee tier 17:40:55 Which means that the minimalistc fee calculated at 600000 ZM does not work 17:41:11 the unimportant fee tier (afaik) isnt supposed to trigger scaling 17:41:12 Look at what happened to zcash with their generouly low fee policy. 17:41:36 Zcash is totaly broken. Monero is not 17:41:47 We have tight pricing 17:41:56 I think it simply means that it was a bug in the wallet, not a protocol issue. It does matter what dynamic sizing policy we have in place if wallet2 screws it up lol 17:42:26 If "drop in adoption" means "less spam", then I take it as a success. 17:42:40 That was part of it. the bug was that the wallent did not incentivse an increase in fees 17:43:33 not is not less spam is is real adoption. this is acompetiive market 17:43:38 Yes, that's another issues. AFAIK wallet2 does not look into the tx pool at all when estimating the required fee. 17:43:52 it does @tevador 17:44:02 It is very much related 17:44:09 IMO, we can keep tight pricing by not increasing the minimum penalty free zone, while always still allowing it to scale if people are willing to pay the fees to offset block reward. I don't really care if fewer people are putting <1 US cent microtransactions on the L1 b/c the fee is now 3 cents 17:44:19 It checks if there is > 0 blocks backlog, or if recent blocks are >80% of the penalty free zone 17:44:51 It is more like 0.10 USD minimum 17:45:02 It should also take into account the fees in the tx pool. 17:45:27 In fact if we want to increase fees increasing the scaling rate to 2 % is a uch better way to go 17:45:32 If there was a backlog e.g. at the high fee level, it makes no sense to send a tx with the a normal priority fee. 17:45:49 it does @tevador, thats how it calc the backloh 17:45:52 People do this 17:46:32 OK, then the dynamic scaling should be able to kick in when needed. 17:47:03 30 minutes have elapsed since discussion started on this item. It will be discussed next week. Moving to next agenda item: 17:47:08 5. FCMP alpha stressnet planning (https://github.com/seraphis-migration/monero/issues/53#issuecomment-3053493262). 17:47:36 In any case I am not supporting less that 1 MB for ZM 17:47:48 there simly is not the case for this 17:47:48 Fcmp repo is a bit broken right now, so probably after its fixed :P 17:48:22 As jberman noted in his opening statement 17:49:03 I learned in Monday's meeting that PR #81 is a quite complex affair 17:49:04 Re: alpha stressnet. Aiming to get 81 in today, then will debug the current consensus failure. Considering the scope of current changes, once 81 is in and bug is solved, I would feel more comfortable with giving ofrn a couple more days to continue on his stressnet, to make sure everything is smooth on top of that latest state 17:49:26 Sorry, wrt 81, I'm aiming to have it ready for jeffro's review today* 17:50:41 81 has become a bit of a beast, and we'll want to be sure it's totally smooth before rolling out the stressnet 17:52:29 One bright side to this is that the functional tests have been beefed up quite a bit for wallet sync testing 17:53:14 @ofrnxmr:monero.social and I are working on separate transaction spamming codebases. It's sort of redundant work, but it helps exercise different code paths in the node and wallet especially. 17:53:48 @rucknium:monero.social i'm using wallet-rpc with 30 wallets and can definitely not produce >5mb blocks within 2mins 17:54:19 at best, i think i can produce about 2mb per min 17:54:31 My dev & testing has been with ordinary RingCT testnet so far. 17:55:36 It could be useful to spread the spammers to even more machines. Last stressnet last year, some participants were asking how they could do their own spamming. At that time, the answer was "write your own spammer". 17:55:37 http://stressgguj7ugyxtqe7czeoelobeb3cnyhltooueuae2t3avd5ynepid.onion/block?id=4592 17:56:10 (block explorer for my stressnet) 17:56:23 I took what I wrote last year and I'm making it more production-ready. Handling crashes & restarts, etc. That way, ordinary users could potentially use it. 17:56:58 Or, at least, there will be less manual management if I'm the only one using it. 17:57:30 Anything more on stressnet? 17:58:29 what block explorer code is that? haven't seen that format before 17:58:39 thats duggavo's 17:58:45 @duggavo:matrix.org 17:58:51 cool 17:59:19 https://github.com/duggavo/MoneroBlock 17:59:33 6. Mining pool centralization: Temporary rolling DNS checkpoints (https://github.com/monero-project/monero/issues/10064) and Publish or Perish (https://github.com/monero-project/research-lab/issues/144). 17:59:52 Wonder whether that will get updated for FCMP++, that block explorer ... 18:00:01 Or does it work already with that? 18:00:06 rbrunner: already 18:00:09 That is fcmp 18:00:18 Ah, of course. Dumb question. 18:00:37 It just uses rpc to ask for info from each block 18:01:07 It doesnt show any tx details, nor have pagination. Very bare bones, but good enough for now 18:01:53 With DataHoarder 's helped, I pulled together data to get an idea of how much hashpower share Nanopool, MoneroOcean, SupportXMR, and Hashvault have during Qubic's activities. The plots are in issue #10064 18:02:13 For dns checkpoints: i'll probably push a draft pr with some proposed changes. Hopefully we can build on it and get it ready for merge 18:03:04 The non-code issues need to be stored out, namely depth of checkpoints and how many to store. 18:03:04 My acronym for these four pools is "NOSH". In 2023, the NOSH mining pools changed their block template config to help confirm transactions more quicky. 18:03:33 Therefore, they may be open to enforcing rolling DNS checkpoints. 18:04:06 p2pool also changed recommendation to enforce checkpoints 18:04:12 However, their combined hashpower is barely above a majority at certain times. The safety margin may be uncomfortably thin. 18:04:21 P2Pool v4.10.1 was released including Monero block broadcast for non-p2pool blocks https://github.com/SChernykh/p2pool/releases https://www.reddit.com/r/Monero/comments/1ncde8h/psa_p2pool_v410_update_will_speed_up_the_whole/ 18:04:21 This will help broadcast all blocks faster across Monero (and in some cases help push alternate chains) 18:04:59 Anyone know what happens when p2pool miners in a single side chain (e.g. main, mini, or nano) mine on top of different alt chains? 18:05:05 this is effectively a faster block propagation network, no need to mine to use this both for receiving or sending blocks founds 18:05:28 @rucknium: that can happen due to normal reasons (specially with laggy miners) so it shows a warning to them and others 18:05:41 if they diverge too many heights they get "banned" by peers 18:06:04 And what happens in the side chain? Side chain accepts or rejects these "conflicting" shares? 18:06:34 if they are too stale or diverging the peer is banned (and share not accepted) 18:06:49 10 blocks I believe from checking the code 18:07:11 Whether p2pool miners enforce DNS checkpoints depends on the monerod node config, not on the actual p2pool software config AFAIK. (Saying for clarity) 18:07:18 correct. 18:07:54 each peer mines on their own or with agreeing peers 18:07:56 proposed changes: 18:07:56 1. 300 seconds check 18:07:56 2. BFT consensus (2/3 +1) 18:07:56 3. Ban time reduced to 5mins 18:07:58 It's hard to recruit p2pool in DNS checkpointing, ironically due to its decentralized nature. 18:08:19 p2pool has more hashpower than MoneroOcean and C3Pool 18:08:28 we updated recommendations, and defaults in the Docker setup 18:08:50 people can make some noise, but even today there's people running old p2pool versions :) 18:09:04 We might be able to get c3pool on board as well 18:09:15 the majority of miners updates within a few days (software wise) but some major ones lag a few versions behind 18:10:47 @ofrnxmr:monero.social: Another possible change is nodes remembering or forgetting DNS checkpoints that are no longer in the set of active DNS records. 18:11:03 AFAIK, now node remember the checkpoints (until restarted). 18:11:07 the majority of p2pool miners are running any of the recent versions in the past weeks 18:11:10 They remember, yeah 18:11:15 It has its advantages and disadvantages 18:11:30 alternatively for the remember issue the opposite checkpoints could be set to "delete" old ones if this is supported 18:11:57 Do we have 7 domains? For 5/7 checkpoint consensus. 18:12:07 Disadvantage: Edits to DNS records cannot change the chain fork that the enforcing nodes are on. If something goes wrong, it is hard to back out 18:12:58 /say // return false if adding at a height we already have AND the hash is different 18:12:58 if (m_points.count(height)) 18:13:04 no checkpoints cannot be taken back ^ 18:13:07 Advantage: Because it is nearly impossible to back out of a defense, a selfish miner may be more hesitant to launch a big attack. 18:13:16 it errors with "Checkpoint at given height already exists, and hash for new checkpoint was different" 18:13:17 moneropulse.ch, moneropulse.de, moneropulse.co, moneropulse.se, moneropulse.org, moneropulse.net, moneropulse.fr 18:13:33 note if setup well the subdomain keys can be split from main one ^ 18:13:45 so full control of main domain is not necessary for the checkpointing system 18:13:52 @rucknium: Similar to the logic of https://en.wikipedia.org/wiki/Dead_Hand 18:14:04 Who controls these domains? 18:14:13 Binaryfate 18:14:48 It would be better if it wasn't a single person controlling all 7. 18:15:03 > The purpose of the Dead Hand system, as described in the book of the same name,[8][9] was to maintain a second-strike capability, by ensuring that the destruction of the Soviet leadership would not have prevented the Soviet military from releasing its weapons.[2] 18:15:26 Right? 😁 we can always add / remove some 18:15:28 DataHoarder had an idea to delegate and disperse DNS record management. 18:16:23 I made this draft diagram of how the system could work (click the arrows at the bottom to page through the "slides"): https://cryptpad.disroot.org/diagram/#/3/diagram/view/6ab5ffc35d0775e5216a179a42bcd1e2/embed/ 18:16:26 not just management (ownership) but using DNS delegation for the checkpointing subdomain, the main domain can be kept well secured, while updates to the checkpointing subdomain can be done offline -> then pushed to DNS secondary servers that do not have the keys 18:16:50 Qubic is clearly willing and able to rent large amounts of hashpower for a few hours. Rolling DNS checkpoints could lead to very deep reorgs so long as Qubic could get enough HP so that NOSH has <50%. 18:16:58 using such a system refresh times can be lower than 10 seconds, but I wouldn't recommend a lower TTL than 5 minutes due to DNS 18:17:03 DataHoarder suggested that the big "secure server" in the middle of the diagram could be separate secure servers 18:17:07 Even if they lose the fork eventually, i wouldn't put it past them to do it just for fun 18:17:08 @rucknium: @rucknium:monero.social the link isn't a share link 18:17:15 you need to use the share function, @rucknium 18:17:23 no? 18:17:25 @blurt4949:matrix.org: Theyd have to sustain that >50% indefinitely 18:18:15 I believe this is the diagram https://cryptpad.disroot.org/diagram/#/2/diagram/view/glZWi196m1pxGKKdZZKC66exXJAm9WiJsQvN8kJutOM/ 18:18:25 the view key changes once loaded 18:18:32 That link used to work AFAIK. Try this: https://cryptpad.disroot.org/diagram/#/2/diagram/view/glZWi196m1pxGKKdZZKC66exXJAm9WiJsQvN8kJutOM/ 18:19:08 @blurt4949:matrix.org: Yes. This makes me nervous. 18:19:26 @ofrnxmr:monero.social: no, I mean they rent enough hashpower to get non-DNS above >50%, get a selfish mining start to fork the DNS and non-DNS network, then maintain the fork for a few hours. After their rental is over, likely another few hours for the DNS side to catch up, and suddenly we're looking at 8 hour reorgs. 18:19:37 As shown last time I have been running my own direct DNS server for checkpointing subdomains https://git.gammaspectra.live/P2Pool/monero-highway#cmd-dns-checkpoints with a list of necessary setup 18:19:58 Note this software is NOT necessary, it was written to ensure quick replication and limited subset to support DNSSEC 18:20:24 An alternate DNS server can be used like bind, to then push records to secondaries or serve DNS queries on its own 18:20:30 DataHoarder: I was able to follow your steps and set up delegated DNS checkpointing for testnet 18:21:44 @blurt4949:matrix.org: Because of the risk, DNS checkpoints could be set up to only activate if there were an attempted 10+ block re-org. Then, Qubic can do what it wants below 10 block re-orgs. 18:22:45 It would be risky on both sides for Qubic to re-org above 9 blocks, because of the DNS checkpoint punishment strategy. 18:22:46 the possible damage / marketing would already be done at that point, unless the checkpoints are issued immediately (automated) in case such a reorg is detected 18:22:56 @rucknium:monero.social: okay? So they attempt to selfish mine a 10 block alt chain, then release it, and do the same procedure as before 18:22:59 then kept forever afterwards 18:23:27 @blurt4949:matrix.org: More like a few mins to catch up 18:23:32 Qubic is not a rational actor, at least not without considering externalities. 18:23:58 The "punishment" doesn't work 18:24:29 I don't think that Qubic wants to facilitate accidental or deliberate double-spends because they can be punished for that by de-listings on exchanges, which would be the usual victim of that. 18:25:11 @ofrnxmr:monero.social: Depends on how much above 50% they can get the non-DNS side. Either way, at least a few hours 18:25:20 For the punishment to work it has to be automatic, on detection of such a reorg attempt 18:25:21 I don't think we should focus on what qubic, as a public pr campaign, would do, but what someone unknown actor could do 18:25:27 ^ 18:25:29 @rucknium:monero.social: how sure are we of that? 18:25:47 Anyone could be working in secret to release a 20+ reorg at their chosen timing 18:26:04 @blurt4949:matrix.org: I sincerely doubt that. To get a few hours ahead, theyd need 8gh 18:26:41 At 4gh, their chain grows at the same speed as the honest chain. 18:27:09 A system that follows the grim trigger would also need to trigger in such a case automatically, even with distinct controlling entities, so they all have to follow the same logic and share information in excess (ie, not just existing chain they follow, but any other alternates they are aware of) 18:27:22 @ofrnxmr:monero.social: I mean, total reorg size of a few hours. As long as the non-DNS side is above 50%, they should be able to maintain the lead. You're right that a few hours for the DNS side to catch up post-rental is probably excessive, but the point stands 18:27:37 few extra hours* 18:28:06 @blurt4949:matrix.org: Not very sure. AFAIK, this scenario is unprecedented. Another blockchain attacking another. The only other possible precedent I can think of is SHA256 miners attacking Bitcoin Cash and Bitcoin Satoshi Vision. But that's not very comparable. 18:28:58 And, doing it as an identifiable entity. 18:29:57 i think always-on checkpoints are better, since it prevents the reorg in the first place 18:30:09 @rucknium:monero.social: Exactly, we have no precedent. And we are already very aware that Qubic is willing to "burn" money on attacking Monero for PR purposes. Shouldn't this attack itself get them delisted under this logic? I suppose allowing for double spends is different, but they were already planning to do that after most major exchanges increased their conf number 18:30:14 No reorging back and forth, breaking wallets etc 18:30:23 If rolling DNS checkpoints are truly too risky, then it shouldn't be done. Qubic is causing disruptions to honest miners' revenue and some tx confirmation slowdowns for users, but not the major disruptions that could occur with 10+ block re-orgs. 18:30:25 ^ that or automated deployment on detecting one. but that would cause two reorgs back and forth 18:30:55 @dh, right. I much prefer ignoring the reorg thsn going through it 18:31:01 Its a bit messy to reorg back and forth 18:31:11 if we get the entire non-Qubic network on board with DNS checkpoints then that's one thing. But breaking up the honest miners into these two camps makes us much easier to attack 18:31:20 Messy in that, some reorgs (temporarily) break wallets 18:31:56 When the reorg is ignored, it causes no downtime for the checkpointed chain 18:31:57 Getting major mining pools to enforce DNS checkpointing is its own Byzantine Generals problem, too. 18:32:58 the enforcement of DNS checkpoints and activation of these are two different issues 18:32:59 Of coursr, before we start deploying, we'd need to release binaries, then get pools to confirm they are running them 18:33:03 Because each pool would be wondering if all the ostensibly "committed" pools are actually committed. 18:33:15 we can do all the work up to activation and still decide then to not go ahead with it 18:33:16 With checkpointing enabled and working 18:33:49 Checkpoints should stay opt-in. 18:33:59 Yeah, opt in 18:34:14 I don't think that's changing at the moment, at least monero release wise 18:34:43 But we shouldnt start aggressively updating dns until we confirm that >50%of the global hash is opted in 18:35:40 Can we put some flag in blocks? Like bitcoin's soft fork signaling. 18:35:53 these could be in the tx extra data 18:35:59 The proposal isn't nearly at the necessary level of community engagement yet, IMHO. The details are still being worked through, of course. I can post it on monero.town for exposure. 18:36:42 Yes, tx_extra in the miner tx. 18:36:46 IIRC, there is some signaling capability in the node already. Maybe it's just peers(?) 18:36:48 altering block templates might introduce more friction on pools updating their setup 18:37:02 if all they need is update monerod + dns flags, that's simpler than changing backend 18:37:33 There's a hard fork voting mechanism (that's never been used AFAIK) that could be co-opted too? Just without a hard fork attached to it. 18:37:43 Even if they signal that they are enforcing checkpoints, we need to know that they are actually able to reach 2/3+1 of the dns endpoints 18:37:55 @blurt4949:matrix.org: Right. That is what I was thinking of. 18:38:03 Ah, my bad 18:38:17 for readily parseable tx extra entries that are not used for other purposes it would be the mysterius minergate tag 0xde or adding a mask to the nonce 18:38:26 (tx extra nonce) 18:38:47 Just blindly assuming that the nodes are able to use the checkpoints is a bad idea. We should manually confirm that the pools are able to reach all of the dns endpoints 18:38:50 DataHoarder suggested that major pools should run their own DNS servers. That makes sense, for security reasons in general. 18:38:57 DNS Resolvers* 18:39:15 which then act as DNS recursive servers internally 18:39:29 mysterius minergate tag is varint + data, no "max size" 18:39:44 according to monero code plus my own parsing code :) 18:39:52 Maybe you could change the get_block_template RPC endpoint to automatically insert something in tx_extra that signals the enforcement, when it is turned on. 18:40:42 Clever, but might have unintended side effects 18:41:18 if done, that field could explicitly have the most recent checkpoint they are aware of, plus % that agree 18:41:30 rbrunner: unintended examples? 18:42:20 Can't come up with something, but wouldn't such a change make it impossible to get an unmodified template which might be needed for some purpose? 18:42:33 Well for one Qubic could signal DNS enforcement to activate the mechanism at <50% true enforcement, unless we're talking about someone manually looking at the percentages and deciding when to acitvate 18:42:40 We have the minor version field, which is probably unused by consensus. 18:43:01 the template data is already modified in tx extra due to having to include the pubkey 18:43:04 IIRC, P2Pool miners use ZMQ to get txs and assemble their own block templates. They would be unaffected by changes in get_block_template RPC, FWIW. 18:43:05 plus nonce data there 18:43:11 And then we may have doctored daemons that start to lie ... 18:43:22 indeed. for p2pool it'd be a breaking change or flagging via extra nonce 18:43:37 note qubic could also add random data in these, ofc 18:44:00 p2pool could alternatively signify this via other means in-p2pool itself 18:44:14 this was done in the past to signal support for X feature 18:44:36 I still find it absurd DNS checkpoints can be discussed without the outrage seen when discussing a finality layer. 18:44:59 Maybe not the same page that rage? 18:45:04 *people 18:45:09 I don't think the tx_extra data would automatically trigger something in teh DNS servers. Manual activation, still. But it would show miners what other miners are doing (or saying that they are doing). 18:45:14 they are understood as a bandaid to have while we rip out each other when discussing permanent finality layers :) 18:45:19 DNS checkpoints are not a finality layer. They can be deleted once the honest chain overtakes the attacker. 18:45:37 I don't have anything helpful to contribute at this time other than that, sorry ^ something something DNS checkpoints _are_ a Proof of Authority finality layer. 18:45:49 they are, indeed 18:46:01 tevador: we can also soft fork a PoS finality layer. 18:46:19 @rucknium: I think suggesting a mask on miner tx extra nonce would be reasonable 18:46:34 but some non-cooperating pools might delay signaling that way 18:46:38 and then turn it off the soft fork PoS finality layer? 18:46:47 The main practical problem with PoS finality layer is long R&D timeline. 18:46:56 We couldn't implement slashing, but we could do decentralized validator selection + checkpoint creation + nodes could only follow checkpoints + miners can attempt to make it the chain with the most work. 18:47:32 tevador: I'm not saying "don't discuss DNS checkpoints". I'm noting my frustration at the distinction. 18:48:21 @rucknium:monero.social: So we should start the clock sooner than later, and also, we can use Ethereum as 'DNS' in order to immediately (within a few weeks) decentralize the checkpointing solution. 18:48:51 Publishing checkpoints on an alternate medium other than DNS does sound good 18:49:02 If implemented, a (softforking) PoS checkpointing layer would be preferable to DNS checkpoints. 18:49:24 can rollover DNS onto softfork checkpoint layer onto other long term solutions 18:49:49 DNS checkpoints is the only thing that can be rolled out quickly (in days). 18:50:01 Also, regarding checkpoints, I do support showing checkpoints onto the qubic snooper that I built anew https://qubic-snooper.p2pool.observer/tree/ 18:50:08 either real or test ones 18:50:31 can help show what they'd do live on mainnet without actually activating such a system 18:50:36 ...there's also rolling checkpoints, but I understand those are somewhat unpopular here 18:50:50 (non-DNS rolling checkpoints)* 18:51:04 what would that entail? 18:51:04 kayabanerve: FWIW, I support merging your CCS. 18:51:09 ofrnxmr ">50%of the global hash is opted in" im sure 2 pools will agree to avoid losing several mined blocks lol 18:51:16 We can have a solution where blocks are posted to Ethereum, and nodes follow the first valid blockchain posted to Ethereum, in a few weeks so long as they can connect to an Ethereum node. The primary issue would be: 18:51:16 1) Extending the Monero network to carry Ethereum SPV proofs 18:51:16 2) The fees miners would have to pay 18:51:24 tevador: Thank you. 18:51:54 Again, I wasn't here to speak out against DNS. Solely to raise the other ideas because I consider them better and unfairly degraded in comparison. 18:52:22 can the PoS finality things be temporary? 18:52:25 It could potentially be a lot of fees. 0.6XMR revenue per block minus how much in ETH fees? 18:52:36 Everything else is better to DNS checkpoints but we can't have a successful discussion with fire on our backs 18:52:42 ETH is very cheap these days. 18:52:46 alternatively, we could use CT Logs :) 18:52:48 I mean tx fee-wise. 18:53:13 it's not crypto but it would also show proof of inclusion 18:53:13 i assume because your saying soft fork PoS finality that it can be turned off 18:53:18 Our own PoS checkpointing is much better than Ethereum, which is also PoW on another blockchain... 18:53:21 @kayabanerve:matrix.org: what happens in the scenario where an attacker mines a block privately, posts it to ETH, then withholds it for weeks before publishing to Monero? Genuine question, but maybe (probably) i'm just stupid 18:53:24 PoS* 18:54:23 blurt4949: I think the idea was to post the entire 300KB block on Ethereum. 18:54:29 if the ETH part is to be done, it'd need to include full transactions 18:54:48 It appears 256 KB of data on Ethereum is currently 0.25 USD. 18:54:54 tevador: Oh. 18:54:57 AFAIK, any softforking proposal is vulnerable to the issue I discussed in "Paths to majority hashpower" in https://github.com/monero-project/monero/issues/10064 and that @blurt4949:matrix.org is persistent about. 18:55:09 @blurt4949:matrix.org: Monero nodes get it from ETH? 18:55:16 I said post blocks, not block hashes, and meant it. 18:55:27 Right, I was thinking header-only or something like that. My apologies 18:55:40 @rucknium:monero.social: It's in my name 18:55:42 Which is, temporarily or permanently losing majority hashpower. Nodes that aren't updated will follow the majority-hashpower chain fork. 18:55:48 So Ethereum's fees may go ballistic, but potentially just a dollar a block. 18:56:56 I wouldn't prefer going the ETH route. 18:57:25 There are serious problems with POS that need to be discussed 18:57:25 18:57:25 Starting with cost of capital attacks, and exchange centralization. 18:57:25 And of course finality layers walk straight into the well known not at stake problem. 18:57:34 Never imagined that connecting to Ethereum for a finality layer would meaning posting *full blocks* there. Color me surprised. 18:57:57 I would prefer a native solution. I would prefer Ethereum to DNS (Proof of Authority). 18:58:21 rbrunner: any other opens the world to qubic also posting theirs there first 18:58:29 This whole POS proposal is a major change to the Monero social covenant 18:58:33 and just holding the full blocks before trying to reorg 18:58:47 I don't consider DNS a preferable native solution. 18:58:56 > There are serious problems with POS that need to be discussed 18:58:56 > can the finality layer CCS then be merged please? 18:58:57 i don't think anyone does 18:58:58 arcticmine: using PoS as a soft checkpointing layer would be completely OK 18:58:59 Let's call a spade a spade 18:59:19 DataHoarder: Yes, my surprise is probably rooted in my limited understanding of these things 18:59:20 Is it? Before, 51% of hash power decides who can participate. Now, validators do. 18:59:36 The advantage of DNS is that it is easier to manually adjust it or turn it off, in response to events. 19:00:07 The reality is setting up a parallel POS network that makes the POW essentially redundant 19:00:50 and the DNS thing was put their to address bugs / vulnerabilities, and it turns out selfish mining is a vuln 19:01:06 as more or less tested the checkpoints set these at depths from tip, so the top area is still able to reorg as usual. 19:01:37 it limits how deep later reorgs can go, but the rest above is left to normal mining behavior, including selfish 19:02:39 Checkpointing would be used to prevent 10+ deep reorgs, which cause invalid transactions to get stuck for a week in the mempool. 19:02:58 I am actually studying the POS in Ethereum. It will make many members of the Monero community cringe 19:03:02 or allow mostly anyone to do double spends when someone does a 20+ reorg 19:03:13 @articmine:monero.social: Proof of work still nominates the builder of the next block. 19:03:24 Well, we could move away from that long 1 week, but of course the invalid transactions problem stays 19:03:45 on guest55 topic, are we able to write this change on moneropulse page / blog? I guess we still need more time before we change the documentation to reflect plans 19:03:54 Until POS says it is redundant 19:05:02 It took ETH like 7 years and they have not addressed many of y problems 19:05:05 @articmine:monero.social: a finality layer can't just create valid blocks out of thin air 19:05:07 Wallets using nodes that do not enforce DNS checkpoints could create txs that depend on outputs in the Qubic 10+ attacking chain, which would make those tx invalid when the checkpointed chain overtakes the attacking chain. Need to keep that in mind. 19:05:27 Zcash their proposal is like 3 years ago 19:05:29 Well, if ever PoS would come later, but seems to me we have lose consensus that we should prepare a *short term* solution, even if only band-aid level 19:06:32 Without careful design, a finality layer could slow-walk the blockchain down to very low PoW difficulty, then co-opt it with low hashpower rigs, AFAIK. Isn't that true? 19:06:46 Another question that came yesterday, in the case of a deep reorg and invalidated txs/decoys happen 19:06:48 Yes but the "short term solution" should not be a back door to POS 19:06:49 For whatever reasons, DNS hasn't been rejected by the community yet. 19:06:56 how would the new remade tx select the decoys? 19:06:59 It can also he implemented in days. 19:07:10 We should work on decentralizing the moneropulse domain control and open a PR for the minor changes (2/3+1, ban time, etc.). That can probably be done by next week. 19:07:16 Would it be able to use the ringdb to select similar ones or is this information lost, disclosing the true spend? 19:07:34 @rucknium:monero.social: Fundamentally, not without careful design. 19:08:01 regardless of using DNS checkpoints for deep reorgs or not, indeed tevador decentralizing that part and increasing consensus on that is a good idea regardless 19:08:15 and just for fun, does running a DNS checkpointing thingy put the monero project in any weird legal situation 19:09:01 It's still up to the node operator to decide if they will follow the checkpoints. 19:09:19 did my legal situation message go through? sorry weird connection 19:09:42 Regardless of the checkpointing solution implementet a permanent chainsplit with nodes on the "honest" less heavy chain only beeing kept on the chain due to the checkpointing mechanism would not be ideal 19:09:42 it did. 19:09:58 @kayabanerve:matrix.orgMost people in crypto probably have heard about PoS but not so much about DNS and I haven’t seen an 19:10:04 tevador: tevador: That sounds good to me. DataHoarder can help with delegating/decentralizing domain control AFAIK. 19:10:17 Rebranding to "Proof of Monero" :( 19:10:19 spaceman: Yes 19:10:31 I can suggest setups to follow to ensure root domain and checkpointing sub domain are safe or review configurations 19:10:49 do we have criteria for when this would be activated? 19:11:03 like, which conditions? 19:11:13 spaceman: there's still a split on having it always on from the start or "grim trigger" 19:11:27 once enabled, it's enabled more or less, as nodes remember them 19:11:36 I don't see a message on "legal" by spaceman: 19:11:52 and just for fun, does running a DNS checkpointing thingy put the monero project in any weird legal situation 19:11:54 but that decision can be delayed while the rest of the system is cleaned up regardless of later decision 19:12:01 it was guest55 who sent it 19:12:35 as for DNS servers, Can use what I have deployed or alternatively use anything you prefer. Diversity here (with alright TTL) should be embraced as well 19:13:04 21:08:15 and just for fun, does running a DNS checkpointing thingy put the monero project in any weird legal situation 19:13:08 @tevador are you mostly on board with dns checkpointing? it seems like you are? 19:13:53 @kayabanerve:matrix.org: ... but no proof of beneficial ownership of said Monero 19:14:04 i mean the real solution is to double network hashrate 19:14:05 I think it's the best short term solution. The alternative is not doing anything. 19:14:39 It's still opt-in and can be shut down once qubic goes away. 19:14:47 on the topic of diversification - other people also brought it up https://github.com/monero-project/monero/issues/10064#issuecomment-3276165999 19:15:01 ok, wondering because I’m on the fence. worried it could be chaotic if it triggers 19:16:01 even if the final decision is to not deploy, working to having a realistic solution that could plausibly be used is on its own already doing most of the work 19:16:30 We could deploy and wait to activate it if qubic starts with 10+ deep reorgs. That's the "grim trigger" strategy. 19:16:40 id hazard a bet that qubic will stress test whatever we implement on mainnet 19:16:52 grim trigger could also trigger on lower reorgs, 9, 8, 5 etc. 19:17:37 @articmine:monero.social: We can link the validator signing key directly to the private spend key which would be approximate? 19:18:11 yeah, for the test harness I'm writing on my own I have a "fuzzer" to generate several chains of reorg attempts across a sample of split nodes. but it's still too early to share 19:18:58 spaceman: The Qubic attack is protocol agnostic. It is nothing more than basic bribery. One can attack a centralized ledger bank with bribery. 19:19:00 I don't know if it was seen or there is no answer yet, but for: 19:19:01 21:06:46 Another question that came yesterday, in the case of a deep reorg and invalidated txs/decoys happen 19:19:01 21:06:56 how would the new remade tx select the decoys? 19:19:01 21:07:16 Would it be able to use the ringdb to select similar ones or is this information lost, disclosing the true spend? 19:19:23 I remember ofrn mentioned the ring db also had issues on deep reorgs 19:20:36 DataHoarder: shared ring DB will probably screw things up. 19:21:05 @kayabanerve:matrix.org: Of the staked XMR, but not the beneficial owners of the Monero 19:21:26 so in such cases it also ends up as a privacy issue if a deep reorg happens, and avoiding such privacy issues is core to XMR as well 19:21:42 i think it will just fail to construct a valid tx without deleting shared ring DB. Happened to me on testnet 19:22:06 I thought we already had mitigations in place for this in case of hard forks like Monero Classic etc. 19:22:13 I don't know if all or many "third-party" Monero wallets use shared ring DB. 19:22:21 so the tx gets stuck for a week -> but you may not be able to create a new tx without creating wallet anew or manually deleting ringdb? 19:23:20 The smart thing would be to use the ring members that are still valid. The older ones. And re-select the younger ones. 19:23:28 Right? 19:24:11 Could that disclose information about how old the spend is? 19:24:21 Yes, that's the best you can do AFAICS. This leaks the fact that the spent input was not in the reorged subchain. 19:24:43 I guess the old + true spend would be static 19:25:09 If the real spend is in the re-orged part of the chain, it's hopelessly invalid on the other chain, AFAIK. 19:25:45 yeah, 20+ for a real double-spend (including confirmation times) but 10+ for breakage 19:27:04 it's a bit more complex on the "long reorg" case as the real spend can have a different output index, but I believe that'd still have the same key image ofc 19:27:28 I plan to run some empirical analysis on how likely invalid txs could be in realistic scenarios, e.g. if Qubic were to re-org 12 blocks or something. And what could happen to wallets constructing txs on nodes that don't enforce checkpoints, if there is a temporary chain split. 19:27:36 if tx1 gets "orphaned" but not invalidated, it gets mined later on, tx2 built on output of tx1, but this gets invalidated 19:27:57 tx2 is remade as tx3, but needs to pick the new global output index of tx1 19:28:04 DataHoarder: Your 20+ number is assuming that the potntial victim accepts txs as fully confirmed when a tx has 10 confirmations, right? 19:28:21 yeah, 20+ is for "double spend" abusing that (disregarding mempool) 19:28:24 If a victim accepts txs with 3 confirmations, for example, that would be 13+....? 19:28:29 yes 19:29:32 I think the plan to further develop DNS checkpoints is clear. Maybe never actually deploy it, depending on more debate and community feedback. But have it ready if necessarily. 19:30:32 Should other medium-term countermeasures like Publish or Perish be discussed now or should those be discussed asynchronously? 19:31:52 These could be deployed along a short term system right? 19:32:17 The selfish mining countermeasure papers, using Markov Decision Process (MDP), don't show the data on how common each depth of re-org is. I think I will try to pull that data by running their models. 19:32:32 DataHoarder: Some of them, yes. 19:33:13 could be part of any checkpointing selection system first, then soft forks? 19:34:08 AFAIK, any of the countermeasures that change miner rewards directly like Proportional Reward Splitting would require a hard fork. 19:35:06 Should we also further develop finality layer research? 🤔 19:35:21 Those will indeed, so it's a subset. I think making an overview table (some was done already weeks ago) with eligibility of each as either part of checkpoint selection, soft fork (non-breaking), soft fork (requiring majority), hard fork 19:35:44 you have my support but not my mind @kayabanerve:matrix.org :) 19:36:00 @kayabanerve:matrix.org: IMHO, you may direct your questions to specific people, because most people support your CCS AFAIK. 19:36:01 my focus is on bandaids to give all of that time :) 19:36:31 Hi all. sorry for jumping in late. 19:36:31 just to give a quick update on the PoP simulation I have been working on: Making progress, but it's quite complex... and the project grew... 19:37:49 I'm currently working on Monte-carlo-tree search (basically sarsa(lambda=1)) for the selfish mine strategy given PoP 19:39:05 @venture:monero.social: Do you need more RAM and/or CPU? Or is it not bottlenecked by that? 19:40:50 it's all one-threaded.. since the ticks are generated by the distribution.. i think if threading would be involved, it would skew things up.. so yeah, it gets slow with number of steps per training episode, but i think it's fine right now... 19:41:11 currently converging on roughly 8-10 % gain, on 40% attacker-share 19:41:16 @rucknium:monero.social: completely fair :p I was just riffing off how you said the plan to develop DNS checkpoints is clear. It was meant as a joke. 19:42:43 @kayabanerve:matrix.org: A finality layer is fundamentally dependent on POS and I just don't see the consensus in the Monero community for POS. 19:42:43 If people want to fund this research they of course can fund it. I just believe that it is fair to say that the consensus is not there 19:43:30 Or Proof of Authority, as seen with DNS checkpoints 19:43:35 Or historically mined blocks 19:44:24 We can end the meeting here. Thanks everyone. 19:50:56 https://github.com/monero-project/monero/pull/10075 19:53:40 on 10075, is the ownership of these domains distributed? 19:53:49 and/or across a few providers 19:55:44 Its in draft - idk what we want to do about the domains 20:04:10 Isn't the registrar of all the domains Gandi? 20:07:26 oh no 20:07:30 not Gandi... 20:10:44 registrar != DNS provider as well 21:05:16 The DNS provider is cloudflare, right? 21:05:24 https://discuss.privacyguides.net/t/suspicious-services-used-by-le-to-intercept-data-cloudfare-gandi-ovh-hetzner-etc/18889 21:06:15 https://mrelay.p2pool.observer/m/matrix.org/zwUjnxCPFvSeaWHbnfyoezQB.png (clipboard.png) 21:08:19 Gandi is one of the most glowie (pardon my language) dns provider out there 21:08:48 I'm surprised they haven't kicked out monero domains registration years ago 21:12:20 a couple could be distributed across, but yeah several others specially some that allow direct XMR payment would be usefull (or specifically anon mode) 21:12:47 njalla / 1984hosting plus others 21:13:25 that's the registrar, then authoritative DNS servers for it could be had on other platforms or directly hosted 21:13:25 i do not recommend njalla 21:13:46 the main thing is probably to ensure that people updating dns checkpoints, are doing so regularly and reliably 21:13:54 they have a great history of stealing domains that become famous, it is marked in their terms of services that the domains you buy is detained and owned by them 21:13:59 Some seed nodes are notoriously offline, for example 21:14:01 and they are free to keep it for sale if they decide so 21:14:06 yeah those can be in subdomains, which has lesser risk 21:14:30 yeah, that's also part how they can legally comply with the privacy with current laws syntheticbird 21:14:50 ack 21:16:21 it would instantly become a hard layer > arcticmine: using PoS as a soft checkpointing layer would be completely OK 21:16:50 of course im going to trust the PoS layer checkpoints, why wouldnt i? do i have any alternatives? 21:17:33 DNS checkpoints? yeah no thank you im going to rely on the decentralized consensus mechanism where people have to put their money where their mouth is 21:19:57 seed nodes arent that bad, just 51.79.173.165 / lalanza is the terminally offline one https://github.com/plowsof/check-monero-seed-nodes 21:20:13 hey, i wasnt naming names :D 21:20:37 plowsof is also like 30% of the seed nodes haha 21:20:53 100% of the tor seeds at your service 21:22:19 so whats the plan on updating records? 21:22:19 i think we should update proactively (as opposed to reactively), maybe rolling blocks 4-10? Updating at every new block 21:27:27 whoops, this is lab, my bad. thought we were in lounge 22:18:01 So the PoS finality layer won’t have slashing and bleeding? 22:20:18 I would just prefer PoP & full node mining if that’s the case 22:20:58 that hasn't been discussed yet fully 23:26:27 for political reasons! > <@syntheticbird> i do not recommend njalla 23:27:22 if not technical then I don't want answer because could be off topic 23:27:46 who is the person managing all this stuff? > <@ofrnxmr> the main thing is probably to ensure that people updating dns checkpoints, are doing so regularly and reliably 23:28:37 @basses:matrix.org: oh, scrolling I see