12:21:23 Hey folks, I would love to continue the discussion regarding ProbeLab's proposal (https://repo.getmonero.org/monero-project/ccs-proposals/-/merge_requests/667), but I see the site/repo is still down. Do you have an ETA when it's going to be back up? Or is there another way to recover the comments so that we can talk them through? 12:24:16 it should be back up in the next days 20:10:06 A very elaborate article covering the risks of the FCMP++ HF was posted an hour ago on Twitter. It is likely that many of you stay away from Twitter as a matter of principle. But given the unusual thoroughness of the article in question, I thought it could be worthwhile to bring it to your attention. Perhaps you may want to make corrections, or provide additional information or context. 20:10:06 https://x.com/babysolo_/status/2051741460643430449 20:33:25 Can't read it without an X account. 20:34:40 👍 20:37:27 I don't think it's worth reading. It would take a lot of effort to reply to 20:38:25 e.g. this 20:38:30 https://mrelay.p2pool.observer/m/monero.social/XgUUCkLjwfgpADMFodXofAMF.png (image.png) 20:41:17 "unusual thoroughness" and they have not reached out to the people involved for clarification, bar charts, ok 20:43:04 Fwiw, I think the most fair criticism (which isn't even brought up on the post) is that an outsider not regularly involved in meetings will have a tough time keeping tack of wtf is happening. Which for most things is fine, otherwise you have "why less than 128???" drama more regularly lol 20:45:31 The twist of an elliptic curve is not the elliptic curve. The twist is its own elliptic curve which we don't use. There's a bogeyman in elliptic curve cryptography that the twist being insecure may cause the curve itself to be insecure. Such attacks are hypothesized, not existent, and are why we didn't care for twist security. 20:46:01 We accepted it as a criteria because we were asked 20:46:01 But what about the bogeyman? 20:46:01 and also[... more lines follow, see https://mrelay.p2pool.observer/e/u5ONm4ALckpWOUlF ] 20:46:10 Oh kayaba you're back, I though you completely disappeared in 2024 20:46:42 Also, due to an oversight where on the list of tens of candidates, some were inadvertently omitted, there was already reason to redefine the list. 20:46:55 Yeah that one caught me too, just assumed his username was sold on darkney 20:47:30 @sgp_:monero.social: my interest and patience did, now you just have my annoyance and random appearances to ruin your day before disappearing again 20:47:35 It wasn't a bad post overall, it's tough to be perfectly neutral 20:47:36 /s 20:48:11 I think the post is horribly written 20:49:00 verified accounts require engagement on twitter for $ 20:49:24 lol ok, maybe I need to re read. His primary point seemed to be that change has risk, and so this upgrade isn't risk free. I feel like that's a decent overview even if it was critical 20:49:49 But maybe some of the facts were out of line 20:50:31 It did seem to imply that a counterfeit bug was all but inevitable, and the kaya narrative fed into that 20:50:41 I didn't step back due to QCs and I even said, a moratorium _after_ this protocol. Also, BP+ is cited as a component when it isn't, and they criticize the composition for not having peer reviewed, but in contrast, proceed to list the other things which weren't published with proofs in a conference for peer review. 20:50:57 plowsof: "sponsored by wagyu" 20:51:10 Wow moneroresearch.info cited on Twitter. In the big leagues now ;) 20:51:13 The composition was defined by me, is rather immediate to understand the security of, was formalized and proven by Aaron Feickert, with proofs published. 20:51:40 That's as notable as their claim Generalized Bulletproofs was published with proofs by CS, as literally, in both cases, CS uploaded a PDF with proofs. 20:52:22 They read the audits but didn't understand them, and wrote a post without understanding. For X, that might be above average? 20:52:23 They also note the lack of issues, and I agree we can discuss why audits without findings are a concern, but have we considered I'm just that good? /s 20:52:58 @kayabanerve:matrix.org: Something something recent Serai audit :p 20:53:17 @sgp_: Threw the audits into an llm* and posted what they gathered from the llm 20:53:20 ... have we considered I'm just that good 100% of the time, 50% of the time? 20:53:37 Because I also have a Trail of Bits audit which follows the distribution from Veridise :p 20:54:12 Also, the cited audit from Veridise was over a very specific scope and doesn't discuss the other audits 20:54:17 So we should expect to bomb the next one, got it 👍 20:54:47 @kayabanerve:matrix.org: Wdym audit scope 20:54:55 Is audited or not 20:54:56 @ofrnxmr:xmr.mx: It does seem like an LLM but 'in their voice', except I'd honestly expect a bit more academic accuracy out of an LLM in the year 2026 20:55:26 "Perplexity has also been quite helpful" https://xcancel.com/babysolo_/status/2040184685360472259 > <@sgp_> They read the audits but didn't understand them, and wrote a post without understanding. For X, that might be above average? 20:55:34 The Veridise audit was GBP < stuff <= FCMP. 20:55:34 Aaron Feickert audited the GBP lib itself. 20:55:50 That's also the FCMP, not the ++ part. 20:56:00 @kayabanerve:matrix.org: iirc they write a lot of these plagiarized llm atricles 20:56:19 "community pushed for multisig and from what I understand that's been implemented now" yeah good to know 20:56:29 Er. I'm silly. We do use a BP+, technically. It's one of the proofs composed into the GSP for the ++ part. I completely forgot about it because it's such a non-normative use of it... 20:57:04 So that is a component, technically... 20:58:39 I'd say their 'put the four cards together' is wrong on points 1, 2, and 3. I'm not skeptical of FCMP++ (2) and lack of peer review (3) is misleading. 20:59:16 The composition was reviewed by a peer, Aaron Feickert, if I dare call him a peer of mine (despite not being of his caliber). 20:59:27 The GBP has been around the block a few times, as has the divisors technique. 21:00:06 And I think there's still a possible outstanding discussion on yet another review for the composition? 21:00:44 plowsof: To clarify, by "unusual thoroughness" I did not try to vouch for accuracy. Perhaps it was not the right choice of words. What I meant is that the article is not your typical useless twitter post, but it is actually bringing up interesting topics. It does have some claims which may be questionable, and now you have the [... too long, see https://mrelay.p2pool.observer/e/goTDm4ALOUhOY0k0 ] 21:03:03 https://github.com/monero-oxide/monero-oxide/tree/fcmp++/audits 21:03:03 why do I even bother maintaining documentation on our peer review 21:03:23 as always, the debunking part is significantly more work than writing such an article with LLMs 21:03:32 https://github.com/monero-oxide/monero-oxide/tree/fcmp%2B%2B/audits/fcmp%2B%2B if only there was a folder specifically for the composition as a whole 21:04:05 I guess no one has done that though, and any review, if any even exists, has been lost to time in the disorganized meeting logs and endless noise which is irc 21:06:25 I will, on a more realistic note, say that one can say only a single qualified cryptographer has reviewed the composition and produced an artifact confirming their review. Accordingly, one may consider it solely of singular review. I'd disagree but not find that false. I also believe it acceptable as one can show the compositi [... too long, see https://mrelay.p2pool.observer/e/8-3Xm4ALekNfTndV ] 21:07:10 "is it moon math, yes or no" 21:07:19 So if we consider my proof it's perfectly zero-knowledge, Aaron's proof, the soundness derived from the composed proofs, and the soundness from Aaron's explicit proof... that is at two people. 21:08:07 ... I want to say 'yes if anything with a circuit is moon math', but honestly, with divisors, sure, moon math, why not 21:08:16 That had so many rounds of review 21:08:29 And the final version is the original version! 21:08:44 but oh my gosh did that take a while to get sufficient sign offs on 21:57:22 @reedmarin:unredacted.org: "The bet resolves in the next 90 days." No way. There are plenty of new audits after July. 22:13:17 I find it strange that they wrote all of that and did not think to reach out and verify the facts. Unfortunately, LLM-assisted or not, in twitter normie land the article will likely see a lot of traction and mostly be regarded as fact by those who read it. 22:24:21 They are sponsored by wagyu. The centralized, single wallet, fake dex, paid shill exchange 22:24:31 Zero integrity. What did you expect? 22:29:20 <321bob321> Nothing new 22:36:59 The author posted some corrections as replies on C but has not modified the article 22:37:12 *on X 22:52:06 Hey everyone, I just read the article under discussion and was curious for everyone's insight into how likely a possible counterfeiting / inflation bug will be with the comping upgrade? Are the mathematical proofs for amounts changing with FCMP? And even if not, how would you all assess the likelihoods of bugs / exploits from the changes in the code that governs the integrity of amount proofs? 22:53:00 Less likely if you donate $500k for additional audits :) 22:53:12 Haha I wish 22:54:32 There's always non-zero risk, but a lot of effort (and money) has gone into multi-step reviews by multiple competent people. That process started two years ago and is still ongoing 22:56:41 You can read the MRL logs going back 2 years to see how it's being taken seriously, and all the MRL logs before that showing how the Monero community has taken this seriously in general in the past 22:56:53 True. I've seen the amount of resources and academic work going into it. Plus implementation from jberman jeffro etc. Also, what would the rollback plan be? I guess if we find out after the fact there was an inflation bug exploited, the only option would be for most participants to agree to go back to a blockheight before the fork and run old-software 22:58:10 The math of the rangeproofs and bulletproofs is staying the same correct? Or are these proofs also getting tweaked a bit for FCMP? 23:00:41 I can't speak for others, but one likely "rollback" type option would be a forced turnstile. That has been posited for certain post quantum reaction scenarios 23:01:22 There's really no single answer because it'll depend on the scale, etc 23:03:06 I don't see how a turnstile would help after the fact. And I don't think it is necessary to have all outputs go through one pre-fork 23:04:00 There isn't a suggested one with the FCMP++ upgrade/deployment 23:07:49 An interesting idea with turnstiles to DETECT inflation would be to schedule a turnstile every year or fiver years or something, requiring all outputs to move through the turnstile before being spendable. But this would likely be complicated to implement, enforce, and most importantly would cause unnecessary chain bloat. A boa [... too long, see https://mrelay.p2pool.observer/e/hbyUn4ALY00yN19U ] 23:08:49 I'm not aware of proposals for anything like that 23:09:39 it was just me spit-balling 23:12:33 Is there any writeup in regards to FCMP++ and pruning? 23:13:59 https://www.reddit.com/r/Monero/s/XZh7dZxdHX 23:13:59 There is probably (?) more elsewhere 23:14:19 I'm not sure if you guys in here saw or heard, but the inflation bug issue (and other bugs as well) seems particularly interesting in light of the recent issues with Litecoin. In March an attacker successfully exploited a bug in the amount proofs when moving from their Mimblewimble sidechain with confidential transactions to t [... too long, see https://mrelay.p2pool.observer/e/v6Ssn4ALb3dwVWdu ] 23:15:18 This is all happening when the AI cybersecurity / code related models are getting better, such as the alleged Mythos by Claude. 23:15:59 I don't think thinking on this has really changed: https://www.getmonero.org/2020/01/17/auditability.html 23:17:58 There are plenty of examples of inflation on a transparent network, and people don't notice until after it's too late to take meaningful action without harming honest victims 23:21:25 @sgp_: Can you cite some of these examples? The only two I'm familiar with are the one that was exploited in Bitcoin then patched + rollback from Satoshi in early days as well as the more recent one in Bitcoin where the bug was caught by a BCH developer I think and they patched it. 23:26:55 https://messari.io/report/messari-research-stellar-suffered-and-quietly-patched-a-2-2-billion-xlm-inflation-bug-in-2017 23:28:15 They addressed it by burning their reserves, per the article