01:27:40 Any native Vietnamese speakers here? 02:24:31 "Switching to Semver is a big..." <- We're already on semver. Semver accounts for the v0.x.x usecase https://semver.org/#spec-item-4 `Major version zero (0.y.z) is for initial development. Anything MAY change at any time. The public API SHOULD NOT be considered stable.` 02:25:21 v1 implies that with seraphis the API will stabilize. It most likely won't. 02:25:21 * pyromaniaco[m] uploaded an image: (82KiB) < https://libera.ems.host/_matrix/media/v3/download/matrix.org/NTJNVEGUgtfFCTpdNKMyedcZ/IMG_20230322_232418.jpg > 02:25:27 pyromaniaco[m]: Do you have TG? 02:25:34 sorry for not answering you, I can't see the messages 02:25:39 Alex|LocalMonero: yep 02:25:57 pyromaniaco[m]: I can see your messages, PM it to me. 02:26:04 t.me/pyromaniaco 02:55:10 Hello 02:58:42 Hi Seth 03:22:00 Alex|LocalMonero: No, we're not: https://semver.org/#backusnaur-form-grammar-for-valid-semver-versions 03:23:00 Alex|LocalMonero: Semver only has 3 core fields, i.e., 2 dots. 03:23:53 Alex|LocalMonero: Realse data has to be appended with a dash or plus. 03:24:19 Oh yeah, I forgot that we use 3 dots. 03:24:22 My mistake. 03:24:24 This "v0.18.2.0", is not Semver. 03:25:55 Still, I'd prefer if we stayed on v0 until we at least get rid of the major pain points for mass adoption, like the 10-block-lock. 03:26:19 Announcing version v1 without the 10-block-lock eliminated would be rather premature, I feel. 03:26:32 Indeed, there are some big things cooking. 03:27:20 Depending on how long they take to come out, it may not be too much of a deal. 03:28:06 There will be big changes in the near future regardless of Seraphis, just for the nature and age of crypto in general. 03:32:34 On the Anonymity of Peer-To-Peer Network Anonymity Schemes Used by Cryptocurrencies 03:32:34 “For instance, our analysis reveals that in the widely deployed Lightning Network, with 1% strategically chosen colluding nodes, the adversary can uniquely determine the originator for ≈ 50% of the total transactions in the network. In Dandelion, an adversary that controls 15% of the nodes has, on average, uncertainty among only 8 possible originators. Moreover, we observe that due to the way Dandelion and Dandelion++ are 03:32:34 designed, increasing the network size does not correspond to an increase in the anonymity set of potential originators. Alarmingly, our longitudinal analysis of the Lightning Network reveals rather an inverse trend—with the growth of the network, the overall anonymity decreases.” 03:32:45 https://pure.mpg.de/rest/items/item_3500837/component/file_3500838/content 03:34:08 > <@alex:agoradesk.com> On the Anonymity of Peer-To-Peer Network Anonymity Schemes Used by Cryptocurrencies... (full message at ) 03:35:30 2nd layer "privacy" for ya 03:36:46 Heading off now 03:36:49 'til later 03:41:44 You may wish to set some specific goals and get a known payout for the work, if you like: https://repo.getmonero.org/monero-project/ccs-proposals 03:42:31 s/repo/ccs/ 04:04:24 I'd love to see the wallet pick a random available node from https://monero.fail/?onion=true and use it to broadcast 04:05:22 (I just wish there were an .onion for monero.fail ; if there is, it isn't noted in the HTTP reponse) 04:17:43 Alex | LocalMonero | AgoraDesk: Dandelion++ does better: "Dandelion and Dandelion++ provide a low median entropy of 3 and 5 bit, respectively, when 20% of the nodes are adversarial." But yeah it's still not great 04:18:20 32 originators instead of 8 04:19:22 politicalweasel[: I would guess that once you've narrowed things down to 32 nodes it's very easy to narrow down further based on other metadata that you might possess. 04:21:47 Tor/i2p is aggressively censored in some regions, so for those regions a fallback to clearnet with dandelion would be OK. 04:22:07 * Didn't expect the number to be so bad with dandelion. Perhaps natively integrating Tor/I2P for tx broadcasting is the preferable way to go. It certainly results in much faster tx propagation. 04:23:15 Do you mean only use dandelion(++) when anon networks aren't available, or preferably use both but drop Tor if necessary? 04:24:02 because the first wouldn't be possible without attaching extra metadata about where the tx was broadcasted from 04:29:38 agreed that Tor/I2P should be used by default though regardless of the propagation system 04:31:23 > wouldn't be possible without attaching extra metadata about where the tx was broadcasted from 04:31:25 I don't think that's the case. Check for Tor/I2p connectivity, if not found use D++. The actual txn broadcast is the same no matter what network envelope it's sent in 04:32:36 what happens at the next node, though? The first node could check for Tor but then what? 04:34:38 Oh, I was thinking client check. I mean, once the node gets it, it needs to know if it's D++ and if so possibly forward. But if a txn comes in over an anonymity network, its source is already obfuscated, right? Just process it 04:34:53 * thinking client (wallet) check. I 04:36:22 * thinking client (wallet) check. I, * process it (broadcast, "fluff phase" right away) 04:37:21 yeah that's the metadata I was talking about. For the network to dynamically switch between D++ and "fast" propagation, the txn would need to have a flag attached to tell nodes which protocol to use 04:37:36 The only metadata that's leaked is that whoever did the txn, they were on and picking this .onion service node to broadcast to 04:38:59 I would think any txn that comes over anonymity wants "fast". Its source is already obfuscated. 04:40:38 politicalweasel[: AFAIK there's no way for a node to tell if it received a tx as a result of a d++ fluff or just a straight up broadcast 04:42:05 But for sending yeah the node would need to support both modes, as it does now because you can broadcast on tor/i2p without d++ 04:43:17 Right D++ for clearnet only. If we get a txn over Tor, it's like the "stem" phase is done by the Tor network; we just broadcast. No "mode" necessary. 04:43:34 * just broadcast/fast mode. No 04:43:36 Right 04:45:09 The wallet client needs to know an .onion node to connect to, which is why I mentioned monero.fail 04:45:09 There are dozens of community-run open .onion nodes it's quite beautiful actually 04:45:10 xmrfn: That extra metadata should still be avoided. It gives attackers more information to work with. Plus the idea that Tor txns "want" fast propagation might not always be right. If anything Tor/I2P should be standardized and D++ could be modified to more aggressively "fluff" to reduce propagation times 04:45:31 Alex|LocalMonero: Not right now, sure. But that could be changed easily 04:46:26 (which is not what I want, to be clear) 04:46:28 What metadata? That someone somewhere picked this node? That's like knowing that "someone somewhere" used Silk Road. As long as different clients don't pick specific nodes, there's really nothing leaked 04:47:47 (ie, if everytime node "X" broadcasts, it means MyDumbWallet.exe did the txn) 04:48:04 Knowing the node would be even worse, I was just thinking a flag to tell whether it was broadcasted via Tor or not. Either way that information is still attached to the transaction. If it really were "some transaction somewhere was broadcasted via Tor" then yeah that wouldn't be a big deal 04:48:16 but that's not the case 04:49:15 The information about what network transport was used isn't really attached to the txn. It certainly never makes it into the blockchain. 04:50:14 Then how do nodes know which mode to use? And yeah it doesn't make it on-chain but this whole conversation is about propagation-time attacks so that's not really the point 04:50:25 A malicious node could keep track of what IP addresses if got txns from and report them all to the FBICIAGAFAM. But that's why we use Tor/I2P -- the IP address won't tell them anything useful. 04:51:32 Oh... propagation-time attacks. Hm. Well there's always adding a random delay, quite apart from D++. I'm pretty sure we don't do that now. 05:03:09 I don't think of D++ as being primarily intended to obfuscate the time a txn was broadcast, but rather the IP address (and therefore potential geographic location). D++ stem phase is just a few network hops, a few seconds of "fuzzing" at most. 05:06:53 s/could/_could_/, s/if/it/ 05:11:10 Yes, D++ is intended to obscure where a txn came from. I'm pretty sure preventing basic timing fingerprinting is hopeless unless you're willing to wait days before your txn is confirmed. It's more than just a "few" seconds, IIRC. Transactions sometimes take a little while to appear in a wallet. Ideally we could get reliable network-wide broadcasting within a couple seconds 05:11:29 0-conf is quite slow right now, relatively speaking 05:17:00 "0-conf is quite slow right now..." <- Try switching your broadcaster node to tor mode with d++ disabled. Tx propagation will be as fast as the pre-d++ days, it's awesome. 05:17:11 > preventing basic timing fingerprinting is hopeless unless you're willing to wait days before your txn is confirmed. 05:17:11 I'm not sure. There are ~17k tx/day which comes down to 1 txn per ~5 sec. So adding a random delay up to (say) 20 seconds would potentially add value. 06:24:06 https://nitter.net/stack_wallet/status/1638699864765915137#m 06:56:21 .xmr 06:56:22 Ponyeatitall[m]: You must have bot account & be logged in 06:56:52 "https://nitter.net/stack_wallet..." <- Wierdly enough i use both elite wallet and stack wallet 13:44:17 <᷾s> bridge down? 13:48:14 <᷾s> last message was at 6:56 am utc 13:48:33 s/was/is/ 14:18:23 it's not down 17:45:32 Kuno Fundraisers beta is live now: https://kuno.bitejo.com Will release the source code (as well as Bitejo's source code) soon. The source code is messy but functional. 20:01:12 Like waas but without hosting it yourself 20:32:16 Are there any updates on when 0.18.2.1 will be released? 20:55:38 https://localmonero.co/the-monero-standard/weekly/46 21:01:44 Alex | LocalMonero | AgoraDesk: matrix is messed up and can’t decrypt the PM you sent me. Can you try again 21:02:10 xmrack[m]: done 21:02:44 Still broken. I had this issue with Ruck a while back, are your clients up to date? 21:02:57 yup 21:03:25 Hold on, let me try something. 21:04:02 Okay 21:21:59 "Kuno Fundraisers beta is live..." <- Is bitejo.com also created and run by you? 21:54:12 Yes, will release Bitejo's source code after Kuno. 23:39:12 "Kuno Fundraisers beta is live..." <- Exciting. All the info at the bottom is great for new people. 23:40:45 Here is the code: https://codeberg.org/Anarkio/kuno I apologize that it's messy, amateur-level and not fully tested. Hopefully some of it may be useful. The source code for Bitejo will hopefully be published tomorrow. 23:42:46 Thanks thats a w