00:51:18 hello 00:52:50 i'm looking for spirobel and getting concerned 00:53:17 it's been over 2 weeks with no response in private dm, and i find this suspicious happening after he got death threats. has anyone seen any recent activity or heard if he's alright? 01:05:57 http://github.com/spirobel 01:05:59 no commits in a long time 01:13:13 @pinchas:nope.chat: Sometimes, developers need to take a break 01:13:18 pinchas there where zero commits between end of july mid august so inactivity is not out of the ordinary 01:14:12 i know, but when you add the context of him not responding to dms from me or other people he's close with, it's worrying 01:15:45 He's probably fine. Sometimes people burn out and need to take a break from everything 01:19:04 okay... i'm just asking if someone has seen spirobel. there's no need to be condescending 01:47:45 @pinchas:nope.chat: He posted on xwitter and then took a breaky 02:23:49 crazy amounts of i2p nodes being added https://monero.fail/?chain=monero&network=mainnet&type=i2p - prob our friends at chainalysis 02:32:13 wild part is they have different downtimes 02:59:54 @lza_menace: Weird af 03:01:07 @lza_menace: I don't think Chainanal makes sense. As seen in that leaked video, they would host clearnet nodes to track IP addresses and connect that with other metadata they have 03:03:57 linkinglion, we know for fact runs i2p servers 03:04:37 How is that useful for them? 03:04:42 running i2p relays and nodes gives them potentially 2 or more hops 03:05:24 you can track tor/i2p if you control all of the hops 03:06:28 Running the nodes they can set their own hops to 0 03:06:30 @ofrnxmr:xmr.mx: I'm pretty sure that's not possible with I2P, given how many nodes there are (more than Tor), and with Tor, they have trusted guard nodes to prevent that from happening 03:06:45 So instead of 6 total, its only 3 03:06:58 The probability of them controlling all hops is basically 0 03:07:30 the monero node i2p can be set to 0 hops 03:07:42 Meaning there are only 3 hops 03:07:43 ☠️ 03:07:51 What is the default value? 03:08:01 Of those 3, there are probably 5000+ spy relays run by the same entity 03:08:20 @duckpondy:matrix.org: 3in 3 out = 6 total 03:09:10 you can reduce both sides to 0, to have a fast, encrypted tunnel, w/o privacy 03:10:14 The best thing to do is host your own node anyway. I don't recommend using remote nodes at all, though I guess you could use one for the initial sync 03:11:30 Apparently, you'll soon be able to torrent the chain, which will be cool to see 03:11:39 Yeah, im just pointing out that a spy company that runs spynodes on xmr and btc, uses those exact same domaibs to run spy i2p relays 03:11:55 It wouldnt make much sense to run i2p relays, and not also run nodes/exits, so they can monitor the payload 03:14:02 @ofrnxmr:xmr.mx: Didn't 0xB10C suggest Dandelion++ to protect against this for BTC? Isn't that what Monero uses? 03:14:44 Dandelion doesnt work if you're sybilled 03:15:22 Also doesnt work if you dont have incoming connections 03:15:39 But I remember 0xB10C proposing D++ specifically to address the LinkingLion issue 03:16:14 It helps, for sure. But its not a fool-proof solution 03:16:16 https://b10c.me/observations/06-linkinglion/ 03:16:29 > A solution might be Dandelion (in particular, Dandelion++ or some modification of it), where transactions are first transmitted to another node, which then broadcasts it. Dandelion++ is beeing used in Monero since 2020. An implementation attempt in Bitcoin Core did not succeed primarily due to DoS and complexity concerns. 03:17:08 If you have real incoming connections and real outgoing connections, you have plausibly deny that you are the origin 03:17:24 @ofrnxmr:xmr.mx: If LinkingLion controls a majority of the nodes on the network, I guess that's where it doesn't work? 03:17:34 But lacking incoming connections = every stem you send will always be you as the origin 03:18:00 @duckpondy:matrix.org: They do control the majority of the ips 03:18:26 @ofrnxmr:xmr.mx: Right, so the nodes you host must be public to receive incoming connections? 03:19:18 > Transaction broadcast over privacy networks like Tor is not affected if done correctly. A strategy is to broadcast a transaction to a node on the Tor network using a fresh connection and then close the connection right after. > <@duckpondy:matrix.org> https://b10c.me/observations/06-linkinglion/ 03:19:35 and need to have good outgoing connections 03:19:49 Does Monero automatically do this? 03:20:28 @duckpondy:matrix.org: No, we have tx-relay 03:21:03 Tx-relay uses a diff circuit for each outgoing onion peer, and you can also fluff directly to all peers at once 03:21:21 It doesnt drop connection as soon as tx is relayed 03:22:07 tx-relay adds plausible deniability to nodes that dont have incoming connections 03:22:19 I was wondering: if you host an I2P/Tor node but don't have any real incoming or outgoing traffic, could it still be traced back to you? 03:22:21 Technicall anonymous-inbound 03:22:49 Since you can have incoming stem phase txs via anonymous inbound 03:23:32 Anonymous-inbound means that your node will still stem txs to clearnet, even if you have no incoming clearnet peers