-
anarkiocrypto[m]
Unlisted fundraisers should work now.
-
r4v3r23[m]
-
r4v3r23[m]
nice update
-
plowsof11
didn't they rename? or
-
plowsof11
im thinking of the wallet from pokst?
-
plowsof11
mysu.dev (who renamed recently) is not anonero, ok this was my confusion
-
bridgerton[m]
<Bon π> The app seems pretty good actually it has onion and proxy on it
-
bridgerton[m]
<Bon π> It doesn't seem to have any exchanges tho or hard ledger function yet
-
LZA_MENACE
meh, keep it simple
-
bridgerton[m]
<Bon π> Fair enough
-
bridgerton[m]
<Bon π> Have you tried it and is it actually good
-
bridgerton[m]
<Bon π> Similar to what the guy above me posted by what they actually advertise about the new Anonero wallet.
-
bridgerton[m]
-
dANBs[m]
kittypity[xmpp]: Is there a way to install mongodb, nodejs, nodejs express and react as a standalone executable or package? I don't want to fuck with package dependencies issues because I have to use old mongodb
-
dANBs[m]
kittypity[xmpp]: Oops
-
DanIsnotthemanBr
Only postrges with monerod ;)
-
riceandbeans
If you have a wallet and the password for it, can you get the mnemonic for it just in case to back up?
-
riceandbeans
Or would you need to make a new wallet, send everything there.
-
hyc
you can always display the seed if you have the passphrase
-
riceandbeans
How does one do that
-
hyc
use the monero-wallet-cli and type "help" for a list of commands
-
riceandbeans
Ah, I got it, thanks
-
sech1
mordinals are really spamming their shit now: "XMR blocks above 300k : 23.3 %"
-
sech1
usually it's 2-3%
-
-
-
XMRPriest[m]
ππ¬
-
ofrnxmr[m]
Of course, either they are incompetent or dont want to commit suicide
-
ofrnxmr[m]
Otherwise,im not sure why they are doing school zone speed limits
-
ofrnxmr[m]
Actually, its obvious
-
ofrnxmr[m]
They really dont want usbto remove Txextra. If they did, they'd turn the printer on full
-
XMRPriest[m]
We let a fox in the chicken pen to play nice but this is what we get, pr
-
sech1
or they're just limited by 10 block lock time before sending new transactions
-
ofrnxmr[m]
Sech, there are ways around the limit
-
ofrnxmr[m]
It only costs 40c to get around it
-
sech1
of course, but they require some scripting skills
-
ofrnxmr[m]
ππ yeah lmao
-
plowsof11
just confirming that i spam testnet not/never mainnet
-
ofrnxmr[m]
Im not confirming anything
-
ofrnxmr[m]
Get it,? Get it?
-
ofrnxmr[m]
"Look at me. Im the txpool now"
-
ofrnxmr[m]
walks away sad
-
plowsof11
release is coming in the next day(s) - i need ALL our best men and women who have been posting about our interpol agent to get the word out to these mining pools
-
plowsof11
another propaganda angle: the mining pools who do not update will allow node hunters to more easily 'find them' as they will stick out - we can use the 'update for security reasons or your nodes going offline' angle
-
plowsof11
you get some fud, i get some fud
-
cockliuser[m]
Make the wallet UDP flood non-compliant nodes π
-
sech1
v0.18.2.1 has been tagged!
-
sech1
which means release in a few of days
-
ofrnxmr[m]
<plowsof11> "another propaganda angle: the..." <- Or they can hold 600mb txpools
-
r_seed_42
Does anyone have a working monerod config file for a node exposed via tor only (ie. expose no clearnet rpc/p2p ports)?
-
r_seed_42
I've cobbled something together that seems to work for the most part, but I keep getting a warning
-
r_seed_42
"W Unable to send transaction(s), no available connections"
-
plowsof11
sounds like a --tx-proxy thing
-
plowsof11
or no tor connections (monerod print_cn) check for tor in/out
-
plowsof11
post config paste bin link
-
plowsof11
if this is a long and drawn out affair #monero-support:monero.social is here for ya
-
r_seed_42
lemme check monerod print_cn first
-
r_seed_42
no luck on print_cn
-
r_seed_42
"Error: Unsuccessful -- json_rpc_request: "
-
ofrnxmr[m]
<plowsof11> "if this is a long and drawn..." <- ^^^^^^^^^^^^^ ^^^^^^^^^^^^^^
-
r_seed_42
ack
-
ofrnxmr[m]
Tdlr.your config sux cuz u changed rpc ports and did wacky old instructions
-
ofrnxmr[m]
But yes, I have a nice one
-
r_seed_42
ofrnxmr , can I get a link/copy pretty please? I'd also be happy for up-to-date instructions
-
sech1
p2pool.io/explorer is running v0.18.2.1 now, so it will not show transactions with too large tx_extra in mempool (but will still show them in mined blocks)
-
ofrnxmr[m]
-
r_seed_42
Thank you
-
spackle_xmr[m]
On the topic of (dynamic) block size: I did a few 'back of the envelope' simulations this morning that made me feel better. My rough estimate is that an attacker would need to spend ~1000 XMR to complete a ramp to the longterm block size limit in ~500 blocks (16 hours). Keep in mind those are loose figures from a hobbyist's simulation, but you get the idea.
-
AmbiguousYelp[m]
Anyone else unable to pay monero on mullvad rn?
-
r4v3r23[m]
<bridgerton[m]> "<Bon π> Have you tried it and is..." <- yep its great. still in alpha but performance is excellent. the backup feature is really good oto
-
r4v3r23[m]
s/good/useful/, s/oto/too/
-
cockliuser[m]
Can I tell the cli to fetch blocks now, validate later for remote syncing?
-
vikCake[m]
-
rbrunner
The mordinals now are "GooGirls". I googled that to find out whether the collection is original, or whether they steal the NFTs somwhere.
-
rbrunner
Well, Google mostly gives me links to pornos if I do that ...
-
rbrunner
Brilliant
-
cockliuser[m]
It's so low effort too
-
cockliuser[m]
Literally Dall-E 1 shit
-
rbrunner
And looks like their minting script has bugs, as they often seem to mint the same girl several times. I am sure they will *all* become precious.
-
rbrunner
My respect for this grows by the hour
-
xmrfn[m]
-
ofrnxmr[m]
They're really just being bitches now imo
-
rbrunner
I wait for the mordinal devs scolding and attacking the NFT uploaders, because they do it too fast, and wrongly i.e. with duplicates
-
rbrunner
Too fast = higher chance for resistance or counter-action
-
rbrunner
xmrfn[m]: Thanks for the tip; a test with a googirl picked at random did not get me a match ...
-
xmrfn[m]
Compiling takes forever on 1 thread but this is my life right now
-
xmrfn[m]
Waiting for the moment my node can join the anti-NFS army
-
xmrfn[m]
s/NFS/NFT/
-
xmrfn[m]
(typo; I love NFS!)
-
ofrnxmr[m]
rbrunner: They threatened worse behaviour because of limiting
-
xmrfn[m]
We could make a patch that just rejects their mordinal-specific flag in tx_extra
-
rbrunner
You mean the "50 transactions for 50 KB NFT" threat? Yes, very realistic. I tried to sketch an implementation in my mind for that, boy that would be PITA to get to work
-
rbrunner
But you wouldn't know without Monero codebase and dev knowledge, so that threat maybe finds targets
-
rbrunner
If they (mordinal dev team plus all NFT series uploaders) force us into a hardfork I claim they will be restricted to Monero Punks style very small pixel-ly NFTs.
-
hyc
the path of least resistance for them would be <whatever fits in tx_extra> certainly
-
hyc
I think we could have skipped the hard size limit on tx_extra, and just jacked up the fees. make them exponential with size of tx_extra, for example
-
xmrfn[m]
There'd still be a lot of low-entropy data on our chain
-
hyc
dunno. if the cost for 1K of data was 1 million times the usual fee, that would make them think twice
-
hyc
although miners would prob be happy to mine them. maybe that would still have been a bad idea
-
xmrfn[m]
I had been thinking about adding a Shannon entropy check on txns. Reject those less than a threahold. I don't care how it was constructed with low entropy -- for example all but one decoys set to 0 address -- it doesn't belong on the chain
-
xmrfn[m]
s/threahold/threshold/
-
hyc
yeah, that sort of check has already been suggested
-
xmrfn[m]
By apeing the changed Selsta made for the tx_extra length check, I'm partway there. Not sure where to put the calc_tx_entropy method
-
xmrfn[m]
s/changed/change/, s/tx_extra/tx\_extra/, s/calc_tx_entropy/calc\_tx\_entropy/
-
selsta
sech1 did the change
-
selsta
i'm just testing it :P
-
xmrfn[m]
* By apeing the change Sech1 made for the tx_extra length check, I'm partway there. Not sure where to put the calc_tx_entropy method
-
xmrfn[m]
my bad, fixed, TY
-
xmrfn[m]
I'm only 83% of the way done compiling it :P
-
Rucknium[m]
xmrfn: It's probably better to do a formal frequentist statistical check since then you set the false positive rate explicitly.
-
Rucknium[m]
MRL discussions go back and forth about whether a statistical check should be researched
-
xmrfn[m]
Oh yeah before submitting anything I'd want to dump the value for at least a bunch of blocks, esp comparing pre-mordinals to those containing them
-
xmrfn[m]
I bet there's a step change
-
xmrfn[m]
* Oh yeah before submitting anything I'd want to dump the tx entropy values for at least a bunch of blocks, esp comparing pre-mordinals to those containing them
-
Rucknium[m]
I don't think a simple entropy check will be the most powerful check. Power:
en.wikipedia.org/wiki/Power_(statistics)
-
Rucknium[m]
But anyway you are welcome to research entropy-based solutions :)
-
xmrfn[m]
Is there a way to calculate the Power of a particular bit string?
-
Rucknium[m]
A test has power. a bit string does not
-
xmrfn[m]
Exactly. Seems like Power is a feature that is more intrinsically of a set. So not clear how it helps identify if a txn that come wallet or miner gave you, hurts fungibility
-
xmrfn[m]
s/come/some/
-
Rucknium[m]
I don't know how to respond other than it would be good to learn basic statistics
-
xmrfn[m]
I don't get what I'm missing. The use-case is that someone hands us a txn, we need to know whether it is acceptable
-
xmrfn[m]
One way is to look at tx_extra and see if it is "too big". Or that it has the expected number of decoys. Another perhaps for general way is to calculate the entropy of the blob of bits that make up the tx
-
xmrfn[m]
* One way is to look at tx\_extra and see if it is "too big". Or that the tx has the expected number of decoys. Another perhaps for general way is to calculate the entropy of the blob of bits that make up the tx
-
xmrfn[m]
* One way is to look at tx\_extra and see if it is "too big". Or that the tx has the expected number of decoys. Another perhaps more general way is to calculate the entropy of the blob of bits that make up the tx
-
Rucknium[m]
Right. So you use a test to determine if the null hypothesis (tx_extra is random (encrypted) data) is correct. But there are many tests for that. So you want to use the most powerful one so that you have the highest detection rate. Or a very powerful one.
-
xmrfn[m]
Given a tx someone hands us, and knowing what you know, suggest a way to know whether the tx acceptable or not, from a fungibility perspective?
-
xmrfn[m]
This is about more than tx_extra
-
xmrfn[m]
Yes, tests need to be done to know what ther threshold should be. I'm still at the stage of making some code that would just nicely print a number representing the tx entropy
-
xmrfn[m]
* Yes, tests need to be done to know what the acceptance threshold should be. I'm still at the stage of making some code that would just nicely print a number representing the tx entropy
-
xmrfn[m]
(which itself might already have been done by someone else)
-
xmrfn[m]
I just rediscovered that get_info doesn't actually tell you what version the node is running :/
-
xmrfn[m]
'version: ""`
-
merope
Only for the restricted rpc though
-
Alex|LocalMonero
<hyc> "I think we could have skipped..." <- If you jack up the tx_extra fees you're effectively redirecting arbitrary data injectors to use steg. So it's steg with extra steps. Just remove tx_extra.
-
xmrfn[m]
or make it small enough that its information carrying capacity is not significant
-
Alex|LocalMonero
So anyone who wants to mordinal will just steg. Again, steg with extra steps.
-
Alex|LocalMonero
Remove tx_extra. Simplify the protocol and improve fungibility/uniformity. If arbitrary data is to be added to the blockchain it should look like any other tx data.
-
merope
tx_extra can be pruned though, steg cannot
-
Alex|LocalMonero
Pruning is irrelevant to full nodes.
-
merope
So is steg
-
Alex|LocalMonero
Huh?
-
merope
Full nodes don't care if you're using steg or tx_extra to store extra data, so it makes no practical difference to them. But pruned nodes can at least benefit from the option of pruning tx_extra for blocks/txes full of garbage
-
Alex|LocalMonero
fungibility/tx uniformity >>>>>>>>>>> prune node less space
-
Alex|LocalMonero
you need full nodes unless you want to encourage network centralization
-
merope
But steg breaks uniformity anyway, because the transaction graph will look bad anyway
-
Alex|LocalMonero
depends on the steg
-
Alex|LocalMonero
for CLSAG no
-
merope
The tx graph looks bad because the minting process is just a bunch of chained self-spends
-
merope
So even if you encrypted your steg data to make it indistinguishable, you're still leaving a trail due to the way the minting process works
-
Alex|LocalMonero
Are you talking about CLSAG?
-
merope
(Though I guess this point is more specific to the morb stuff)
-
merope
I'm thinking of the case of storing data in the ring members
-
merope
Not familiar enough with the inner workings of clsag :_
-
merope
:/
-
xmrfn[m]
okay seriously dumb question:
-
xmrfn[m]
How can you tell what version a remote node is running? I can type "version" on my own monerod, but all I know about for other nodes is to get the restricted RPC port /get_info, and version is blank there
-
selsta
you can't know the exact version
-
selsta
you can look for get_info fields that were added at a specific version and use it to estimate the version
-
xmrfn[m]
hmmm.. OK. is that considered an issue to fix? ie, to have get_info return the version
-
selsta
it's intentional
-
xmrfn[m]
Not sure I understand why... but I'll accept that
-
Rucknium[m]
Node version releases identifying information. Monero is a privacy protocol.
-
selsta
hiding the version reduces ways a node can be fingerprinted
-
Rucknium[m]
A wallet's relationship with a node is on a need-to-know basis. And the wallet does not need to know the version.
-
xmrfn[m]
makes sense