00:44:53 Hey y'all, I've just set up XMRig (built from source) and am trying to get it to use my AMD GPU to mine via OpenCL but for some reason it gives me this: 00:44:54 ``` 00:44:56 [2025-01-26 00:40:17.827] Error UNKNOWN_ERROR when calling clGetPlatformIDs for number of platforms. 00:44:58 [2025-01-26 00:40:17.827] No OpenCL platform found. 00:45:00 * OPENCL disabled (selected OpenCL platform NOT found) 00:45:02 ``` 00:45:16 It seems a tad odd tbh 00:46:27 I'm using a Radeon RX 7900 GRE so it shouldn't be too old... 00:46:38 Also, running this on EndeavourOS 00:47:27 Trying the in Monero Mining room as well. Might get more help there 00:47:34 Try the in Monero Mining room as well. Might get more help there 00:48:25 Thanks, what channel is that? 00:49:25 https://matrix.monero.social/_matrix/media/v1/download/matrix.org/phuezPoIuBEQMmfDIvByotho 00:50:06 It doesn't show that for me but I assume the address is #monero-mining 00:50:48 https://matrix.to/#/#xmrmine:matrix.org 00:51:00 Not sure if that will work for you I'm newer to matrix 00:51:02 Thank you 00:51:13 You cant (or shouldnt) use gpu to mine xmr 00:51:18 Yeah it works, appreciate the help! 00:51:29 Oh? Why not? 00:51:38 Is it just not worth it? 00:51:43 because its a cpu coin 00:51:59 agreed, your probably better off mining RVN or another GPU coin and swapping to XMR 00:52:09 more specifically 00:52:19 RandomX is more optimized towards CPUs than GPUs or ASICs 00:52:30 Also, you need the proprietary amd drivers on linux to enable opencl iirc 00:52:33 Aaah got it 00:52:36 you can mine monero with GPUs, just that it'll be slower 00:52:57 Moneroocean.stream 00:52:58 Would mining a GPU coin and CPU coin on the same machine slow me down more than it'd be worth? Aha 00:53:17 @cindy you CAN but i dont think ive been able to get it to work with xmrig 00:53:29 No, doesnt slow down 00:53:47 You can mine cpu xmr and gpu something else 00:54:30 https://whattomine.com/ 00:54:48 moneroocean.stream 00:55:37 Thanks y'all, appreciate the help! 03:15:44 From Trusted and Vouched Dealers 03:15:44 ⏩ Fast & Reliable ⏩ 03:15:46    DM for the best psychedelics, cannabis products available. Cloned cards, fakenotes 💯 03:15:48 https://t.me/hightime_market 03:15:50 *Got AAA+ Quality Products. 03:15:52 _Shrooms 03:15:54 _LSD 03:15:56 _DMT 03:15:58 _MDMA, 03:16:00 _🧊, 03:16:02 _Coke❄️ 03:18:15 From Trusted and Vouched Dealers 03:18:16 ⏩ Fast & Reliable ⏩ 03:18:18    DM for the best psychedelics, cannabis products available. Cloned cards, fakenotes 💯 03:18:20 https://t.me/hightime_market 03:18:22 *Got AAA+ Quality Products. 03:18:24 _Shrooms 03:18:26 _LSD 03:18:28 _DMT 03:18:30 _MDMA, 03:18:32 _🧊, 03:18:34 _Coke❄️ 03:55:41 Bro you're on a Monero channel, if we wanted to buy illegal products we would do it on a darknet market like everyone else, not via some dummy on an unsafe telegram channel because Telegram forces you to give a phone number to identify you to the state if needed. 07:20:04 what do you mean exactly ? Infrastructure & connection with monero ? 07:21:54 Yeah sure, I was projecting my question for green countries customers, hosting etc 07:21:54 Because we can see regulations of exchanges about monero and tornado cash devs going to prison ... 08:03:43 LOL it goes deeper than just the phone number. Telegram would be hard as hell to use anonymously also because they require the mobile app to register (and heard that they also detect emulators, although not researched so not sure) and can quickly suspend accounts created through Tor. I'd consider it impossible for an average person. 08:04:55 BTW what do they even use on DNMs for communication? I get it's probably something not centralized. Do they use their own on-site DMs with PGP? 08:18:56 exactly 08:20:17 ah 08:36:18 some people care less and switch to protonmail for communication, other go to simplex 08:37:40 I wonder if they trust the system that has them upload their private key to the cloud) 08:40:18 i wonder if you trust a platform that forces you to use their web client and client-side encryption library 08:40:33 which is btw, vulnerable to side-channel attacks due to the fact it's written in JS 08:41:16 Well they do have a "bridge" that allows using a normal client... But it requires a paid subscription. 08:41:28 you can't fix these side-channel attacks because there are no constant-time operations in javascript 08:41:48 Also yeah, can't imagine trusting a web client for encryption unless maybe it's hosted in my home. 08:41:58 and JIT optimizations heavily affect whatever technique you try to do to achieve constant-time 08:42:56 damn you just reminded me to read more on what JIT impacts but I have an exam to prepare to :( 08:45:35 BlueyHealer: if your threat model isn't quite serious, protonmail's web client is fine 08:45:56 but if your threat model includes attackers analyizing CPU timings to determine secret data 08:46:00 it is off the table 08:47:30 analyzing* 08:48:15 also good luck on your exam 08:49:49 No, I'm just still concerned with downloading the whole application every time. And them having my private key. 08:50:05 Nah lol side channels are not a concern, I was thinking of something easier. 08:51:25 there's also a big space between cindy's two models 08:51:38 yes 08:51:44 BlueyHealer: well, that's also a thing 08:51:53 nod, tip hat 08:52:20 browsers don't have much integrity checks 08:52:38 Also how easy it would be to target a malicious update because the whole code is shipped to every logged-in user every time 08:52:44 there is for subresources, but those are embedded in the HTML, which the server can modify 08:53:00 Cindy, are there ways to integrity-check at all btw? That could help. 08:53:48 i know someone who made a web extension that checks the PGP signature in a HTML file with the HTML file itself 08:54:11 and displays a little red shield in the URL bar if it's invalid 08:54:12 or a green one if it's valid 08:54:26 that's the closest i've seen 08:54:33 PGP? Does the whole webapp code get signed? 08:54:42 only the HTML file 08:54:46 bluey you're talking about using PGP over email? 08:55:15 ideally the HTML file should also include SRI checksums for all subresources (scripts, stylesheets, etc.) 08:55:52 https://github.com/tasn/webext-signed-pages 08:56:11 if the PGP is handled by a server, it's already not ideal 08:56:25 cool @Cindy 08:56:40 Yeah, that part makes me uneasy! In such a case, I'd prefer to encrypt with a command and then copypaste. 08:56:58 Cindy, HTML? And what about the JS in it? 08:57:14 interesting idea for the plugin, it's a little stale, but I like the basic idea of it 08:57:18 But yeah, didn't know about such an extension, that's neat. 08:57:31 if it's inline, it'll already be within the HTML file 08:57:48 if it's external, you'll have to use SRI checksums for the