01:00:50 after fully syncing 0.18.4.0 and turning it off I just synced 2.5 days (1800) worth of blocks 01:01:14 so the blocks were past the checkpoints 01:01:52 speed was 1.913 blocks/second 01:02:09 seems the same as before 01:02:48 so just under 16 minutes 01:03:38 so 6.3 minutes/day 04:34:22 Hello Everyone, 04:34:22 I am a systems architect, I have been involved in the fintech space since 2013 (Before Crypto I was also involved in Exchange Market Data Solutions for Brokerages and Financial Firms). My specialties are SysOps, DevOps, Infrastructure and Dev. 04:34:24 Anyone out there looking for a solid resource, I am free. Time or project based, I have worked for notable open source projects, organisations and startups around the globe. 04:34:26 a Bit about myself. I am a South African, but have made a home in the asian mountains with my wolf and husky. I grow my own food, have a fishery and a good woman. 04:34:28 Left my corporate existence in 2012 and started exploring the world. I have beem involved with and built payment solutions around Crypto Assets and supported projects like BTCPay, LND, RTL, NBXplorer etc. 04:34:30 I am a no-nonse sense guy and I get the job done. 04:34:32 Send me a message on Element / Telegram (UmanX) or here: https://umanx.org/me/umanx/?profiletab=about 04:34:34 (edited) 08:55:16 Thank you for clarifying 10:23:04 hey, which fs type do you use for keeping a blockhain on linux? is there anything faster for big databases than ext4? 10:38:42 no i don't think fs has that much difference in performance. most use ext4 10:39:29 by changing fs you may not see any visible difference 10:59:19 http://www.lmdb.tech/bench/microbench/july/ I found this page (its unsecured) with a filesystem comparison at the very bottom. The difference looks to be noticeable. 10:59:43 Im going to try ext2, because it doesnt have the journaling overhead 11:04:07 Hi, can anyone please confirm that on https://github.com/trezor/trezor-suite v24.5.4 is tagged as "Latest" ? 11:04:08 (By default bottom right corner of the webpage without scrolling) 11:05:11 Also, generally what are your opinions on Trezor devices? 11:07:14 that data looks so old though. 11:11:44 probably, but the filesystems are still the same :D 11:13:14 also you may have to consider OS and kernel stability with different fs. 11:14:11 thats why i generally don't mess with the file systems. 11:18:53 Oh god 11:22:39 they've been good for me forevernoob 11:23:20 sorry, i meant ledger :p 11:23:34 i have a trezor that hasn't left the packaging 11:29:12 Initial observations: 11:29:12 1. It appears that they're pointing to an outdated version on their GH page. The "real" latest version doesn't include .AppImage files. 11:29:14 2. Latest version's help display is from their KB, but the images / screenshots are unable to be expanded / zoomed in. Clicking through to their actual KB, it's not possible to copy their link. And then this happens: 11:29:27 https://matrix.monero.social/_matrix/media/v1/download/matrix.org/FuxwluSPVkIlDrgQjtMQpDBa 11:29:44 Kind of feels like a half-baked product. 11:31:07 And they're considered industry-standard in the crypto community? 12:39:14 No hardware wallet is worth it if security is a major concern. If you’re here, you should understand how to use virtualization, such as QubesOS, to isolate your wallets. Hardware wallets are inherently dangerous because they leak information to the manufacturer. When a database is inevitably breached, you’ll be putting yourself at significant risk. I don’t trust Trezor’s p 12:39:16 romise of data deletion, as it cannot be reliably verified 12:40:19 i think the best wallet should be getmonero portable wallet 12:43:00 Interesting. 12:43:00 > Hardware wallets are inherently dangerous because they leak information to the manufacturer. When a database is inevitably breached, you’ll be putting yourself at significant risk. I don’t trust Trezor’s promise of data deletion, as it cannot be reliably verified 12:43:02 What databases are you referring to in this specific case? AFAIK Ledger had leaked e-mail addresses associated with the purchases of their devices, do you think Trazor maintains a similar list? In my case I just used a temporary e-mail address not associated with anything else. 12:43:08 Interesting. 12:43:08 > Hardware wallets are inherently dangerous because they leak information to the manufacturer. When a database is inevitably breached, you’ll be putting yourself at significant risk. I don’t trust Trezor’s promise of data deletion, as it cannot be reliably verified 12:43:10 What databases are you referring to in this specific case? AFAIK Ledger had leaked e-mail addresses associated with the purchases of their devices, do you think Trazor maintains a similar list? In my case I just used a temporary e-mail address not associated with anything else. 12:45:15 When you order, you’ll need to provide your address, full name, email, and phone number 12:46:09 that's why i love mining 12:46:13 Ah ok yeah I see. In my case I faked all of that info and delivered it to a post address. 12:46:33 Ah ok yeah I see. In my case I faked all of that info and delivered it to a pickup delivery point. 12:53:01 Trezor also logs telemetry data when you use Trezor Suite 12:54:14 Ah right, same as Ledger AFAIK. It's opt-out by default which is again pretty insane in an ecosystem where privacy is valued so highly. 12:56:49 Still, you could use all the best virtualization / isolation techniques, but bad hardware (UEFI bugs etc.) will kind of make these things moot, right? 12:56:50 A hw wallet is a 2nd factor authentication system which assumes a compromised "main / host" machine, so in that sense, isn't it improving security overall? 12:57:06 Still, you could use all the best virtualization / isolation techniques, but bad hardware (UEFI vulns etc.) will kind of make these things moot, right? 12:57:06 A hw wallet is a 2nd factor authentication system which assumes a compromised "main / host" machine, so in that sense, isn't it improving security overall? 12:58:18 Privacy isnt valued by 98% of the value held on those devices 13:06:21 Trezor is also vulnerable to these vulnerabilities. That’s why the firmware needs to be updated regularly 13:09:59 There’s no way to be 100% secure, unfortunately. It depends on your threat model and the amount you’re planning to store. I could argue that while hardware wallets offer an extra layer of security, they introduce more vulnerabilities because you must trust all the libraries Trezor uses within their firmware 13:11:25 Specifically: 13:11:26 core: Trezor Core, firmware implementation for Trezor T 13:11:28 crypto: Stand-alone cryptography library used by both Trezor Core and the Trezor One firmware 13:11:30 legacy: Trezor One firmware implementation 13:11:32 python: Python client library and the trezorctl command 13:11:34 storage: NORCOW storage implementation used by both Trezor Core and the Trezor One firmware 13:11:36 tools: Miscellaneous build and helper scripts 13:11:38 vendor: Submodules for external dependencies 13:12:32 It only takes one smart, rogue employee at Trezor to backdoor their firmware 13:22:29 I keep all my montero on a boat in deep water 13:22:45 I wonder if it is still there 13:25:02 You guys have monteros? Lucky 13:25:14 Ive been mining for 2yrs and no luck 13:25:48 I remember someone who stole billions of dollars worth of Bitcoin and kept their private key in a Cheetos tin on a piece of paper. I don’t recall their name 13:26:46 Found it 13:26:51 https://en.wikipedia.org/wiki/Jimmy_Zhong 13:30:07 Does anyone know if thefuzzstone is on Matrix? I need to tell him something important 13:31:14 hes on twitter and simplex 13:31:29 I assume @TheFuzzStone:matrix.org is him? 13:32:18 Probably 13:32:39 Havent seen him online / interact here in a very long time 13:33:39 https://thefuzzstone.github.io/ 13:34:55 Thank you. I don’t use any of those social media platforms :( 13:42:12 that fuzz has been active in #monerokon:matrix.org under that matrix org account, you can pgp encrypt a message using his pub key to be sure coincat 13:43:09 Acknowledged. Thank you plowsof 13:45:34 Haha. Makes sense that _I_ havent seen him, haha 13:48:07 probably been asked a lot, but any ETA on full membership release? I remember something about mid-2025 being a target 13:48:47 Mid 2025 for testnet 13:49:12 Sweet thanks 13:49:23 Grateful to all the contributors making it possible <3 13:50:42 That’s happening so soon :D 13:52:26 Oh i've had a question about running your own node and privacy. So if I run a node over tor but don't set it as public, is there a chance multiple transactions could be linked to me because they are broadcasted from the same IP? I know Tor has delays between circuit changes and monerod doesn't support circuit rotation natively 13:53:03 Is there more value to privacy if I have it set as public so that I also broadcast other trasnsactions and participate in dandelion? 13:54:25 for the second message. Not "set as public". To do what you're talking about, you want to allow incoming connections 13:56:31 Gotcha. Can you have a public node that proxies everything through tor via the proxy config? 13:56:48 Everything listening on localhost 13:58:01 storagemonster, How did you initially download the blockchain? You’re also exposing your IP address by doing so 13:58:02 `--proxy` 13:58:54 https://docs.getmonero.org/interacting/monerod-reference/?h=#tori2p-and-proxies 13:59:08 coincat: i downloaded the initial blockchain over clearnet but i didn't broadcast anything when downloading. Then i turned on the proxy config before broadcasting anything 13:59:21 Can I send you the message and have you relay it to him? 14:00:40 Even if you don’t broadcast, I believe nodes can still log your IP address unless I’m mistaken 14:00:50 While downloading the blockchain 14:02:52 Oh yeah I'm fine with that, it's running on a remote server. I was just more concerned with specific transactions being linked to the server's IP address 14:03:10 Even with dandelion the first server in the relay would still be able to determine the origin no? 14:03:49 so i was just guessing it'd be better to be a public node and help broadcast other transactions 14:06:41 storagemonster Yes, assuming it is a spy node, the first server can determine the origin 14:06:54 node* 14:08:00 Hm okay i'll try out the public node setting then 14:09:04 If you send XMR to an anonymous exchange in 2 back-to-back transactions would they be able to figure out both transactions are the same person? I'm thinking this is possible due to UTXO tracking 14:20:57 " Even with dandelion the first server in the relay would still be able to determine the origin no?" < no 14:21:17 " Hm okay i'll try out the public node setting then" < dont 14:22:13 " If you send XMR to an anonymous exchange in 2 back-to-back transactions would they be able to figure out both transactions are the same person? I'm thinking this is possible due to UTXO tracking" < no, not unless the utxo's are related (one is change to the other, or both split off of the original output) 14:22:49 ofrnxmr: why do you say don't do the public node? 14:23:20 "storagemonster Yes, assuming it is a spy node, the first server can determine the origin" < this is false. The node sending the stem tx isnt necessarily the origin node. Nodes stem in multiple hops 14:24:01 hm if i send from same account on the monero gui wallet won't those utxo be related? 14:25:13 They wont be related unless the outputs themselves are connected tl one another.. one being changer from the other, them being split off of the same original output etc 14:26:19 I was able to send the message. There’s no need to worry 14:26:23 The wallet (or address) that they are stored on doesnt matter 14:26:55 oh i see. I assumed if i send 1 XMR then send another 1 XMR, the second tx would use the change output from the first tx 14:27:21 like in bitcoin if i have 3 btc and i send 1 btc the change output from that is used on the next tx 14:27:44 the wallet keeps sending the remaining btc to a new address 14:27:50 Only if the second 1xmr IS change the first 14:28:11 In which case, the outputs are related _on chain_ 14:28:26 but by default the monero gui wallet doesn't do this? 14:28:42 Btc uses utxos. Different situation 14:28:43 is there one master address and it's just spending that balance 14:29:20 Every time you receive xmr, it is a different output 14:29:57 but if i only received 1 transaction on that account 14:30:45 if you done spend it all at once, youll get change back 14:31:01 That change is related to the first output 14:31:20 Its a "child" of the first output 14:32:48 right so i receive 3 XMR, then i spend 1 XMR at exchange A, and then i spend another 1 XMR at exchange A. Exchange A can figure out the two transactions are the same person with a high likelihood? 14:33:30 ofc assuming i haven't KYC or have an account at exchange A 14:34:15 i wouldnt say "high", but likely 14:35:21 Especially if there are other indicators, such as same amount, coin pair, timing, etc 14:35:35 gotcha i'll keep that in mind 14:35:59 i've always wondered why people say don't use a public node though. Wouldn't it be okay if you were on Tor and rotated the node per tx? 14:36:10 i know there was the whole debat after the chainanalysis video 14:36:42 i alwys felt that it would offer more privacy vs running your own node esp with having to wait for tor circuit change 15:03:37 With fcpm++ does the tx get created on hw wallets or on pc/mobile devices? 15:03:49 With fcpm++ does the tx get created on hw wallet or on pc/mobile devices? 15:10:36 tobtoht said in the feather room "> iirc the plan is to offload most of the work to the pc/phone and have the hardware device do a relatively inexpensive operation to sign the tx" 15:43:09 Be that as it may, the goal AFAIK is to have a multi-sig type situation where coins can't go missing if the host device is compromised. 15:43:10 Aren't hw wallets supposed to have a much smaller attack surface? The stuff that you mentioned is developed as open source which, while it does not guarantee more eyes, certainly makes things easier, no? 15:43:24 In regards to that, I tried restoring my old wallet into Trezor Safe 3 and getmonero GUI only asked me for the passphrase. Is the passphrase and wallet password the only thing standing between my coins and an attacker? 16:51:12 Wallet fully synced, yet 0 XMR. This calls for some inquiries in #monero-gui:monero.social perhaps. 17:40:39 /join #monero-offtopic 17:40:39 /join #gnu 17:40:39 /join #gnu-offtopic 18:14:03 I find it ironic that Monero GUI have globe image in setup process but their translation platform is done for 2 years and not even translated properly/fully 18:14:30 is down* 20:00:51 nvm, apparently you need to recover the seed using the Trezor Suite app, and _then_ use getmonero to do stuff. 20:17:45 <3​21bob321:monero.social> Soon ™️