00:28:26 #xmr-bazaar:monero.social 01:31:50 "Missed Monerotopia Episode (#161)? Check out the Price, News & DEV (IF WE HAVE) Reports here! 01:31:50 Price Report: 01:31:51 Youtube: https://youtu.be/mLxJnejKGqk 01:31:52 ODYSEE: https://odysee.com/@MoneroTalk:8/crypto-holding-pattern-continues-04-13:a 01:31:53 News Segment: 01:31:54 Youtube: https://youtu.be/VB9S2lsRUFA 01:31:55 ODYSEE: https://odysee.com/@MoneroTalk:8/chainanalysis-irs%2C-generalized:5 01:31:56 Dev Segment: 01:31:57 Youtube: https://youtu.be/VbXrp1Xf4u0 01:31:58 ODYSEE: https://odysee.com/@MoneroTalk:8/make-it-rain-monero-04-13-24-%28dev-epi:a 01:37:15 "Missed Monerotopia Episode (#161)? Check out the Price, News & DEV Reports here! 01:37:15 Price Report: 01:37:16 Youtube: https://youtu.be/mLxJnejKGqk 01:37:17 ODYSEE: https://odysee.com/@MoneroTalk:8/crypto-holding-pattern-continues-04-13:a 01:37:18 News Segment: 01:37:19 Youtube: https://youtu.be/VB9S2lsRUFA 01:37:20 ODYSEE: https://odysee.com/@MoneroTalk:8/chainanalysis-irs%2C-generalized:5 01:37:21 Dev Segment: 01:37:22 Youtube: https://youtu.be/VbXrp1Xf4u0 01:37:23 ODYSEE: https://odysee.com/@MoneroTalk:8/make-it-rain-monero-04-13-24-%28dev-epi:a 01:41:08 <3​21bob321:monero.social> Rip irc 01:49:00 https://www.youtube.com/watch?v=_sSE0otp-C0 02:07:48 It’s more secure than kraken 02:23:22 The dev guides at getmonero.org have the differences there 02:23:56 No. 04:33:44 https://act.eff.org/action/tell-the-u-s-senate-stop-risaa-the-fisa-mass-surveillance-expansion 05:23:36 Happy Birthday Monero! 06:39:40 Happy Birthday Monero!🎉 06:49:40 Happy Birthday Monero!🎉🥳 06:50:18 * m-relay sends confetti 🎉 07:00:20 Hello everyone, it's a great day as Monero just turned 7! I'm a product and service marketer who recently started using Monero and fell in love with it. I'm not here to promote any random stuff. I just wanted to share that if you guys need someone for marketing tasks, I can be that person for free. I really don't need any money right now. I just want to do marketing for fun and ge 07:00:20 t more involved in Monero and Matrix. I have decent resources and free time at the moment, so feel free to hit me up for that! 😄 07:01:16 Monero turned 7? How does it feel in 2021? 07:01:54 Sorry that was a typo lol 07:01:56 10* 07:02:08 Hello everyone, it's a great day as Monero just turned 10! I'm a product and service marketer who recently started using Monero and fell in love with it. I'm not here to promote any random stuff. I just wanted to share that if you guys need someone for marketing tasks, I can be that person for free. I really don't need any money right now. I just want to do marketing for fun and g 07:02:09 et more involved in Monero and Matrix. I have decent resources and free time at the moment, so feel free to hit me up for that! 😄 07:06:16 sech1 lol 07:08:04 Happy birthday, just wish i had been here for more of them x 09:02:41 Happy Birthday xmr! 09:17:31 happy birthday X M R ! 09:56:47 happy birthday xmr 🎉 10:30:48 <3​21bob321:monero.social> Someone brang presents ? 11:06:24 1k soon 11:20:57 <5​m5z3q888q5prxkg:chat.lightnovel-dungeon.de> i guess they are trying to fix the "monero is used by criminals" with that.. I don't really know why are people so retarded 11:42:24 Happy Birthday Monero! 12:17:21 MoneroKon tickets are 20% OFF today.. Happy 10th anniversary Monero… https://shop.monerokon.org/monerokon/2024/ 13:01:13 <3​21bob321:monero.social> Someone brang presents ? 🎁🎁 14:01:00 Revuo Monero Issue 193: April 11 - 18, 2024. https://www.revuo-xmr.com/issue-193.html 14:02:39 https://blog.kycnot.me/p/diy-seed-backup 14:38:10 <5​m5z3q888q5prxkg:chat.lightnovel-dungeon.de> what is that even 14:40:58 clipboard.png 14:41:00 https://matrix.monero.social/_matrix/media/v1/download/xmr.mx/pfziJjxpLghEhGJExbhheAmI 14:41:04 https://matrix.monero.social/_matrix/media/v1/download/xmr.mx/tuzdUGXgcaqUWbzNDgsTswnz 15:25:07 Have anyone tried robosats for fiat on-ramp ? 15:34:18 <5​m5z3q888q5prxkg:chat.lightnovel-dungeon.de> Is haveno supposed to make it easy and quick to exchange XMR to FIAT? 15:38:15 Should be similar to localmonero, but with an application instead of a web pages. 15:39:12 Shane on Conduit.rs ⚡️ and Fractal 🦀️: you know some dreams can never come true so are haveno. 16:15:24 wot is that? 16:15:42 they are ordered in stack order? 16:15:58 pic is confusing 16:16:42 file clipboard.png too big to download (2613904 > allowed size: 1000000) 16:16:42 clipboard.png 16:20:02 EPROM 16:20:03 You might want EEPROM instead thru, as EPROM you need some UV light to erase them while the one with two "E" you erase it with the same tool you use to write it 16:22:16 1 - Use veracrypte to make encrypted file the same size as the EPROM/EEPROM of your choice 16:22:16 2 - Save crypto seeds, password manager backup, etc, etc into the encrypted container. 16:22:17 3 - Flash E/EEPROM 16:22:18 4 - Install the rom back on the junk hardware you found it and put it back in the junk hardware pile in plain sight 16:22:19 Just don't forget where it is lol 16:23:06 hardware failure 16:23:16 want something bulletproof 16:23:51 Make more than one copy 16:23:51 and/Or make the file 4x as small as eeprom size and flash it 4 time back to back so you have 4 copy in the same rom 16:24:00 E/EEPROM are surprisingly reliable 16:25:00 If you use old eprom type, don't forget to put some opaque sticker on the window, you would not want it to be corruped because of the sun shining on it. 16:29:32 You should be fine if you read and write them every 10 years or so. Anyway if you use it to backup more stuff like password manager data, then you will update your backup regulargly 16:36:49 This is all too much I think 16:38:02 a computer with the network cards disabled and an encrypted hard drive should be enough for like backups. I think there is some system for sandboxed signing with QR codes you can do if you need multisig 16:38:53 hard drives are less reliable than eeproms. 16:38:54 SSD are more reliable but be sure to power it for a few hours every 6 months or so 16:39:06 hard drives are less reliable than eeproms. 16:39:06 SSD are more reliable than hard drives but be sure to power it for a few hours every 6 months or so 16:40:56 RavFX yeah but you can still use error correction (RAID/ Error Correcting Codes) 16:42:09 Raid is not a backup ;) 16:42:09 Raid is only to bring you up to normal faster than restoring the backup! 16:42:11 if you're just storing the key (which is small), the bit-for-bit reliability isn't the problem because you have a ton of room for data redundancy. the problem is a failure of the whole drive (with hard drives this is like if you drop it and the disks smash or the head breakes) 16:42:26 raid protects you from bit flips 16:42:30 But when a second drive fail while you are rebuilding the raid array, you then need the backup! 16:42:46 Do you suggest powering SSDs to prevent wear-leveling and subsequent loss of data, or just to maintain the drives health? 16:42:47 Excuse me for butting in! 16:44:23 charge trap are not perfect, there is a constant very slow electron leaking. 16:44:24 ssd can take care of that themself as long as you power them a few hours every 6 month so they can self maintain the data integrity. It's different than wear leveling per say. 16:44:25 Also, the most used the cells, the faster they leak 16:44:57 so a drive with low amount of write need to be powered less often than a drive on where the block have a 90% usage level 16:45:23 damn i didnt know that 16:45:24 but it makes sense 16:45:27 The standard for SSD is said to be 1 to 2 years or so, so power them at least one every 6 month, for a few hours 16:46:26 do you have the hard disk failure meme? (pic) 16:46:35 it was something that included veracrypt 16:46:37 I don't think so 16:47:01 But yeah, encrypted data is way easier to corrupt 16:47:18 But yeah, encrypted and/or compressed data is way easier to corrupt 16:51:12 foun dit lol 16:51:37 clipboard.png 16:52:09 Yeah, seagate... reliability went to the floor not long after they brought Maxtor 16:52:38 All my HDD here are HGST 16:52:46 SAS variant 16:53:09 idk what truecrypt/veracrypt is 16:53:15 i just use LUKS on default settings 16:53:37 Just Think about it as the same thing as LUKS, but multi platform 16:53:47 oh 16:54:36 Ideally you want to format your encrypted veracrypt container with extfat. 16:54:37 That way you can literally open the containers on any operathing system 16:55:42 Which it idea for Backup 16:55:43 As 16:55:44 LUKS is Linux only 16:55:45 Bitlocker is Windows only (can mount on linux but it's more painful) 16:55:46 And Apple have also there proprieraty solution that I think can only be mounted on Apple 16:56:20 yeah I saw the bitlocker FUSE thing 16:56:51 I did actually use it for a customer (dead laptop) 16:56:51 it's drive was "encrypted" with ... ... ... no keys 16:57:01 so I managed to get his data back 😂 16:57:26 apple FileVault 16:57:35 Ah yeah, FileVault 16:57:48 actually, most SLC ssd can be let unpowered for 5 to 7 years before leaking 16:58:12 SSDs are surpisingly resilient when not in use 16:58:32 Yeah, but what they sell now is TLC and QLC 16:58:33 Except if you have more money to spend on that, then you can find MLC relatively easily 16:58:34 I think now SLC is mosly on expensive server stuff right? 16:58:51 https://matrix.monero.social/_matrix/media/v1/download/matrix.org/HNjKaNKRyXJAyZruznMEMXaQ 16:59:18 SLC is the cheapest option (for 250GB-500GB at ~50$ ), therefore its minimal use case 16:59:20 HDD are not reliable at all when not in use 16:59:21 Post MFM to pre-fluid bearing... where the most reliable (for when you let it for years in a drawer) 16:59:33 I mean SLC is for consumer-grade 16:59:41 fluid bearing drive can gunk up when not in use for years 17:00:26 link that to me. 17:00:27 At that price you probably get QLC... 17:00:28 Or it's like first generation of consumer ssd 17:00:47 That's very unfortunate. Afaik, helium sealed hdds are the most resilient offline 17:01:15 They are designed to be left on 24/7 in server rack right? 17:01:20 oh wow LUKS is supported on windows NT 17:01:32 but not BSD 17:01:33 I would not leave something that have fluid bearing off for years 17:01:51 Oh cool, I did not know lol 17:02:19 https://en.wikipedia.org/wiki/Comparison_of_disk_encryption_software#Operating_systems 17:02:24 As promoted yes, since helium is less dense than air, the drag is less important. But I've heard on r/DataHoarder that these hdds were also protected from metallic fungus and corrosion when offline 17:02:33 They fill drives with helium because it have less friction afaik... So it's an advantage for when the drive is spinning 17:03:06 https://www.newegg.com/team-group-ms30-256gb/p/N82E16820331230 17:03:22 I must be wrong 17:03:23 Ah yeah, true as they don't have the oxygen stuff that the living stuff love 17:03:25 I only find TLC 17:04:12 fungus be like: nom nom eating your data mf 17:04:35 Yeah, what you read about "SLC" in theses shit drive is the cache. 17:04:35 They are so shitty to have DRAM to they use some of the TLC storage as SLC, but it's only for caching while the drive take his time to save it properly in TLC 17:04:43 Yeah, what you read about "SLC" in theses shit drive is the cache. 17:04:44 They are so shitty to have DRAM so they use some of the TLC storage as SLC, but it's only for caching while the drive take his time to save it properly in TLC 17:05:41 Ok, so I've been confused all this time. SLC is indeed the simplest architecture but since its faster and more reliable, it is used in enterprise grade SSDs 17:06:04 good thing you made me search rav 17:06:39 related https://discuss.privacyguides.net/t/secure-erasure-before-full-disk-encryption/17191 17:08:00 `dd if=/dev/random of=/dev/ssd_to_erase` 👍 17:08:33 nice method to kill your ssd 17:08:35 yeah, for SSD it's a lot easier and faster. 17:08:35 "Secure wipe" -or- blkdiscard /dev/nvme*** -or- using tools from hdd manifacturer. 17:08:36 It's simply erase all the cell plus or les sin the same time so the ssd is them "like new super fast" 17:08:46 Old spinners you had to fill them with uramdom before 17:09:10 Yeah, filling the ssd with urandom will also make it slow af 17:09:23 because it won't know it have to discard all that shit after lol 17:09:38 I should encode my xmr seed into my tamagotchi 17:09:53 Some argue you should fill the SSD with random because you can see (if you have the proper tools) where the is data and where there is nothing 17:10:16 That's related to TRIM 17:10:32 i just follow LUKS guides they tell you to fill the drive with urandom before formatting 17:11:11 Yeah, exactly, trim will clear the block properly, but if you fill the drive before formating then it won't "trim" that space meaning all the block will be constatntly "full" and the drive will write at about 1/20 of the normal speed 17:11:12 Enabling TRIM kill plausible deniability because you'll have duplicated pages of encrypted data on your SSD 17:11:13 whats worse is I actually have swap inside of LUKS too 17:11:32 it leak the filesystem in use and encryption algorithm sometimes 17:12:22 Yeah, that a problem with SSD. 17:12:23 Have no plausible deniability or have ultra slow drive that will die faster, choose your poison 17:12:24 That's was one of the rare advantage of the old spinners 17:12:37 as it did not need to have the sectors pre-erased to do writes 17:13:14 You can also be like me and make recurrent backup of your SSD 17:13:33 Actually, you can use "SSD" designed to be permaful 17:13:33 AKA : Industrial Compact Flash cards 17:13:34 it could die tomorrow it wouldn't be an issue 17:13:38 It's what I use for antique that does not support trim 17:14:14 Anyway here's my XMR seed with 100$ in it if anyone want that: comb drying tattoo vials pride ozone jackets blip avatar online soothe gown extra twofold upbeat avidly vulture otter wiring ascend eskimos vulture gels guru avatar 17:14:45 do you have the blockheight too? 17:14:50 no 17:14:55 sometimes near 2011 17:15:31 I haven't accessed it since 2009 and Lord of the Rings released 17:16:05 I'm not doing that for 100$ lol, keep it! 17:16:12 just put it in the CCS 17:16:40 lol 17:17:15 I would like but I can't, monerod is telling me I'm going back in time 17:19:31 is this legit lol 17:20:22 i also have an xmr account with birthday as 1999 17:20:27 couldnt sync unfortunately 17:29:38 here is an interesting social experiment 17:30:05 fund a 2-of-2 multisig and give each seed to a random person online, see if they can agree how to split it up 17:30:32 most likely yes 17:30:33 they'll do 50-50 17:30:47 because if they dont agree no one gets money, and none of them wants that 17:30:52 yeah 17:31:05 this is completely based on persons, to make it a real social experiment make thousand wallets like this and give them to totally random people and see if they can agree 17:31:12 okay but what if it wasnt 2-of-2, what if it was like 8-of-8 17:31:23 and one of them was pushy and wanted more than a 1/8 share 17:31:43 more interesting social experiment would be forcing the amount to be 1/3 and 2/3, and then having them agree on which one gets 1/3 17:31:45 or 512-of-512 17:31:45 And give them to random on 4chan 17:31:46 and it's 2 people 17:33:13 one of them would get bored or lose the key or have technical issues 17:41:14 NAND chips include parity bits that are invisible to the user and even OS, which are used for some error correction code. On a drive level it therefore doesn't matter if data is encrypted or not, it only matters if error correction is parted of the encrypted container. 17:51:00 If you want reliable long term storage for small amounts of data, NOR flash is king. Typically their data retention is rated at many decades at elevated temperatures (55°C ) and they can reliably hold data for a century at room temp with <100 write cycles. 17:52:58 No need for custom hardware either, just grab a raspberry pi pico for $5 and upload it over USB. Storage space should be sufficient for a few keys. 18:50:48 Wonder when will google trackers get removed from monero.com ?? 19:41:15 https://libreddit.bus-hit.me/r/Monero/comments/1c79mst/mexc_will_be_requiring_kyc_another_cex_cant/ 19:41:30 MEXC now requires KYC 19:42:10 https://www.mexc.com/ 20:24:29 soon bisq will require KYC xD 20:54:14 https://localmonero.co/the-monero-standard/weekly/102 21:03:12 Hi again, new question: I see this in the logs: 21:03:12 `2024-04-18 20:09:51.254 I Public RPC port 18089 will be advertised to other peers over P2P` 21:03:13 And indeed, that's the port (18089) that I have my `rpc-restricted-bind-port` is set to in `monero.conf`. 21:03:14 But I also have `public-node=1` and `anonymous-inbound=myreallylong.onion:18081,127.0.0.1:18090,16` set. 21:03:15 I was under the impression myreallylong.onion:18081 would be advertised, not the restricted-rpc-port. Is this just a logging display bug or am I confused (again)? 21:16:46 <5​m5z3q888q5prxkg:chat.lightnovel-dungeon.de> afaik you need to set `proxy` for the monero node to actually use tor 21:16:56 I have that set too 21:16:57 <5​m5z3q888q5prxkg:chat.lightnovel-dungeon.de> As declaring only the onion service is not enough 21:17:16 But I'm pretty sure proxy, tx-proxy are independent of the anonymous-inbound setting 21:20:28 <5​m5z3q888q5prxkg:chat.lightnovel-dungeon.de> hmm then that seems like a weird wording of the logs to me but unsure 21:21:58 <5​m5z3q888q5prxkg:chat.lightnovel-dungeon.de> tor is not directly implemented in the monero node so it's possible that you are providing an onion service over tor and it's leaking your clearnet as monero is basically unaware of there being any tor doing routing 21:27:02 <5​m5z3q888q5prxkg:chat.lightnovel-dungeon.de> but if it's actually using tor as a proxy then the only thing that it sees should be the exit node, but i have no idea what it's actually doing tbh 23:01:53 g​ee: you are conflating RPC and P2P, `public-node` and `rpc-restricted-bind-port` is RPC and `anonymous-inbound` is P2P related 23:02:45 afaik there is no way to advertise a Tor public node 23:33:10 Thanks for the answer selsta. I must be even more confused than I thought. The documentation for --public-node says: 23:33:10 > Advertise to other users they can use this node as a remote one for connecting their wallets. 23:33:11 My conception was that this public-node advertisement was delivered via the p2p port to all connected peers, but advertised the restricted RPC port you're using, and as far as I knew if you also have anonymous-inbound on, it served to anyone crawling the p2p network that .onion:rpc_port given in the anonymous-inbound option. If I'm fully using tor via --proxy and have anonymous-i 23:33:12 nbound turned on, I don't see why it should give anything to peers but the anonymous-inbound onion:port? Remote Node clients use RPC calls to get blocks, get transactions and broadcast txs, do they not? 23:33:19 Thanks for the answer selsta. I must be even more confused than I thought. The documentation for --public-node says: 23:33:20 > Advertise to other users they can use this node as a remote one for connecting their wallets. 23:33:21 My conception was that this public-node advertisement was delivered via the p2p port to all connected peers, but advertised the restricted RPC port you're using, and as far as I knew if you also have anonymous-inbound on, it served to anyone crawling the p2p network that .onion:rpc\_port given in the anonymous-inbound option. If I'm fully using tor via --proxy and have anonymous- 23:33:22 inbound turned on, I don't see why it should give anything to peers but the anonymous-inbound onion:port? Remote Node clients use RPC calls to get blocks, get transactions and broadcast txs, do they not? 23:34:41 Ooooh. So this anonymous-inbound option advertises a p2p host:port destination? 23:35:55 anonymous-inbound is used together with tx-proxy, it allows you to get incoming tor / i2p peers to send transactions over, blocks will still be sent over clearnet 23:37:02 (or over proxy if I also use --proxy, right?) 23:37:30 no, proxy is just a simple socks proxy that can be used with tor because tor has exit nodes 23:38:51 --proxy is for all traffic but it doesn't support tor/i2p directly, only --tx-proxy supports tor/i2p natively 23:39:18 you mean .onion 23:39:26 I mean, if I use anonymous-inbound, tx-proxy and --proxy, I fetch blocks etc from "clearnet" nodes via tor, right? Pretty sure that's the case because I see no clearnet destinations in netstat output 23:43:18 if you use all three then blocks will be sent over Tor using exit nodes, and transactions will be sent to .onion peers 23:43:55 re: anonymous-inbound, that it's a p2p port and not an RPC. That clears things up for me, thank you! I also see that in the docs now, its unequivocal "Allow anonymous incoming connections to your onionized P2P interface" 23:48:16 Is there a defacto default zmq-pub port? I see p2pool uses 18083 but that seems to be the port that this anonymous-inbound .onion p2p port uses by default in the docs