00:16:00 OVK, "something" View Keys? 00:16:00 If so yes, so much fud about that 00:17:26 yes 00:17:40 everyone's going crazy over OVK 00:27:30 @ravfx:xmr.mx: Yup 00:28:34 It's crazy how a couple FUD posts spread so fast compared to months of steady educational information 00:31:58 years 00:32:00 Jamtis also had the same 00:33:16 Even long time moneroers on my rooms went all on on that fud 00:33:35 It propagate so easily lol 00:34:00 I assume some ztrasher trying to bring monero lower because it hold ~previous ath 00:34:10 they can TODAY force the issue of such an addressing scheme btw 00:34:27 I don't even mean rings 00:34:38 but they can ask to use compliant wallets that implement that, if they so much wanted it 00:35:15 "We should not make it easy for them" cool then let's have OVK be something that you can only get via the cli wallet :P 00:35:40 then goalposts shift 00:36:02 you saw it yesterday, now it's "yeah we shouldn't have any viewkey" 00:36:10 so ... that forces you to move to no subaddresses 00:36:32 or wallets that get lost if you don't backup every move 00:37:06 You all are assuming it's a fud and not a real concern for some reason 00:37:32 the concern is around regulators forcing it on people, and these don't care how it gets done 00:37:47 "that is your problem buddy now move to this wallet that implemented it regardless" 00:38:59 the "view" key allows decoding and decrypting an output details, then mapping it to a subaddress; the spend key allows generating key images and signing with these 00:39:31 So the view key are required for subaddress operation? 00:39:32 the split is now made in that generate -> sign specifically to address computation of your spend key via quantum-capable opponents 00:39:35 yes 00:39:40 that is exactly how it works 00:39:51 So it must stay there lol, just dont paste it on reddit 00:40:03 and why creating a million subaddresses doesn't slow down sync 00:40:14 01:39:32 the split is now made in that generate -> sign specifically to address computation of your spend key via quantum-capable opponents 00:40:14 ^ and such the generate image key is made 00:40:29 @sgp_:monero.social i was testing skylight and it doesn't seem like it can connect to an onion address - it will connect to clearnet over tor but not onion direct. can you confirm if this is correct or user error? 00:40:40 i had an onion address entered and the wallet would not accept it 00:40:47 now even if an actor can attack that, they can't go backwards to your spend key that are unrelated to that 00:41:49 it is also just that sharing your view incoming key + generate image key allows for finding if outputs have been spent, but that's it 00:42:35 01:37:06 You all are assuming it's a fud and not a real concern for some reason 00:43:05 a couple of weeks ago it was spammers talking about quantum security and how monero had not done anything about it and wasn't planning to 00:43:35 Carrot with the partial hardening, plus addressing method to allow relatively seamless migration: exists 00:43:37 šŸ•µļø 00:44:07 specific feature that makes it work: yeah remove that (and now the quantum people are not talking) 00:44:42 the fud can be joined by others with well intentions and amplified, specially where this is not an "extra" feature bolted onto 00:45:53 I see. I didn't even know about the quantum fud 00:46:06 I haven't yet looked into the quantum migration plan 00:46:08 the concern is valid but it's specifically being blown out of proportions by first misunderstanding how it works or what it does, and second assumption that regulators will stop there 00:47:01 and also: that it not being implemented by X doesn't mean Y implements it (or a different scheme, like a wallet that auto-submits the proofs) and demands compliance 00:47:07 specially when all people talk is about "CEX and Merchants" 00:48:01 these could run their own custom stack, wallets, addressing schemes, or anything in between and you'd not even notice and doesn't need to be in monero-core 00:51:16 also Jamtis/Quantum addressing scheme https://github.com/monero-project/research-lab/issues/151 00:51:41 Carrot (with descriptions for carrot-native and legacy) https://github.com/jeffro256/carrot/blob/master/carrot.md 00:52:00 current Post-Quantum Turnstile design for Carrot https://gist.github.com/jeffro256/146bfd5306ea3a8a2a0ea4d660cd2243 00:57:54 > and also: that it not being implemented by X doesn't mean Y implements it (or a different scheme, like a wallet that auto-submits the proofs) and demands compliance 00:57:54 It's a valid point. Still, I believe the "political cost" of moving users to a complaint wallet is higher than requiring a single key that almost every wallet provides, only once per address. I'm glad that we at least have common ground in actually understanding what this FUD/concern is about 00:58:29 If it's about making it easier, make it a cli-only feature :') 00:59:00 or like for hw wallets, like you need to edit the source code to printf it out to console (or I had to) as the GUI displays all zero's as the view key even while it has it in memory 00:59:11 (and compile monero) 01:00:51 Yeah, I think it's a good middle ground 01:01:19 in life ux is everything 🚬 01:07:29 You could actually still have subaddresses. It's just that scanning for received coins would necessitate loading the private spend key, which would make HWs / cold wallets / multisig wallets effectively useless. It would also be super insecure for software wallets. > so ... that forces you to move to no subaddresses 01:08:34 I'm not assuming it is FUD, I know that it is FUD based on cryptographic reality, and not baseless speculation about niche scenarios > <@just_another_day:matrix.org> You all are assuming it's a fud and not a real concern for some reason 01:09:01 yeah, that was brought up earlier, you'd also have to generate the wallet in a specific way 01:11:30 (off current topic) every time I see the quote reply on the irc bridge it makes me happy, it usually brings up the perfect amount of context on replies 01:11:41 @just_another_day:matrix.org: Legacy wallets will not and cannot have OVKs in the sense that you are thinking of 01:12:22 OVKs will solve the issue with view-only wallets having inflated balances 01:12:30 without having to constantly export key images 01:12:45 If you do nothing besides update your Monero software, you will not have scary OVKs forced upon you 01:13:32 ^ and use monero software, not third party wallets or those "all in one" programs. who knows what they end up with even if they are good today 01:14:30 also jeffro256: you won't be able to use a PQ Turnstile in case it ever needs to be used, and you don't move beforehand to Jamtis or a system that can migrate 01:15:49 (plus, you also have your previous historical txs, made visible by quantum opponents, instead of Carrot which explicitly does further to combat this, specially if you are sweeping to yourself!) 01:15:52 Cindy: so this will make the airgap sign process easier right? 01:16:03 for legacy it's 2.1.1 conditional 01:16:05 yes 01:16:14 in the past it required like 3 back and forths or something it was terrible 01:16:32 @jeffro256: Legacy wallets are called legacy for a reason. I believe Monero popularity will grow significantly in the following years. New users will obviously get carrot addresses. Then the legacy wallet owners risk to become the non-compliant marginalized minority, similar to Bitcoin mixer users 01:17:02 also FCMP++ changes this @kiersten5821:matrix.org as members can sign but the chain proof and other things can be built later 01:17:36 it eases this specially in offline conditions 01:17:55 @just_another_day:matrix.org: This is already possible without OVKs. Its just a matter of amount of data sent and number of rounds of communication required. 01:17:55 hey guys. How can I get some stagenet monero? 01:18:10 Then the legacy wallet owners risk to become the non-quantum-safe marginalized minority > Then the legacy wallet owners risk to become the non-compliant marginalized minority 01:18:16 Solution: don't be a surveillance cuck and give all your info 01:18:32 vamos881: https://cypherfaucet.com/xmr-stagenet 01:18:45 @kiersten5821:matrix.org: Yep. You will only have to consult the cold device when you want to send XMR 01:18:49 or ask Cindy for some 01:18:57 > <@jeffro256> I'm not assuming it is FUD, I know that it is FUD based on cryptographic reality, and not baseless speculation about niche scenarios 01:18:57 This is not about cryptography at all. And I wouldn't dismiss regulatory pressure as a niche scenario. You might love the cryptography in Monero, and that's a good thing, but Monero really is a liberation tool that uses cryptography as an instrument. We shouldn't forget about the goal of the project 01:19:15 vamos881: https://stagenet-faucet.xmr-tw.org/ 01:19:18 but the generate image kei is there due to cryptography 01:19:29 oh looks like they put english translation now 01:19:35 so it IS about cryptography 01:19:36 i remember it being entirely chinese 01:19:48 but yeah, put your address there, click send, it'll give you 1 XMR 01:21:03 vamos881: if you are developing, it is easier to run a purely local chain, then you can send yourself infinite coins 01:22:23 you could just mine on stagenet 01:22:31 it is pretty doable to solomine 01:22:44 because it doesn't have that much global hashrate 01:22:59 A few years ago I ran my 3950x for like an hours and got so many coins 01:23:35 Can give then back eventually, just have to restore old seed 01:23:42 on stagenet? 01:24:00 DataHoarder, Cindy: thank you man 01:24:03 Yes. 01:24:08 @yokoama:matrix.org: Which is stupid considering how traceable many MWEB transactions are. https://www.mwebexplorer.com/ will tell you want block an MWEB output was created in, and the volume is low enough that sometimes both peg-in and peg-out are the only MWEB transactions in a block and you can perfectly deanonymize it. 01:24:30 br-m: I'm not developing yet. Is what you're describing similar to bitcoin's regtest? 01:24:49 vamos881: it's hosting a private blockchain 01:25:04 ok, then it's the same apparently 01:25:05 basically one you create yourself, so you can mess around with it 01:25:34 ./monerod --regtest --offline --fixed-difficulty 1 01:25:35 use that 01:25:39 and rpc generateblocks command 01:25:52 @just_another_day:matrix.org: It is about cryptography because people don't understand that this is already possible. They hear the new "outgoing view key" term and assume that this enables a novel form of tracing. It doesn't. 01:26:40 is there a good reference to learn how monero actually works? I have read Mastering Monero, it's very superficial (mastering bitcoin goes a lot deeper, for example). I know there's Zero to monero, but that's very specific to the cryptography 01:26:51 I'm not dismissing the concern itself, but it has bad presumptions built into it. 01:27:40 Zero to Monero is excellent. Cryptography is a lot of how Monero works, what else are you looking for specifically? 01:28:25 People think exchanges will just ask everyone viewkeys or something and that will lower other privacy (it wont, even if people where dumb enough to all comply) 01:29:08 br-m: transaction structure, for example. What goes in a transaction? I know there isn't a script language, for instance. Blocks too 01:29:14 Zero to Monero btw (will need an update after FCMP++/Carrot) https://www.getmonero.org/library/Zero-to-Monero-2-0-0.pdf 01:29:48 vamos881: Are you opposed to reading code? 01:30:43 vamos881: The Cuprate Monero book is a great resource for specific implementation details: https://monero-book.cuprate.org/ 01:30:45 vamos881: monero-oxide / Cuprate in Rust reimplemented decoding transactions, I also did so in my own go code 01:30:46 br-m: to learn how things work? Yea 01:31:48 thanks, this looks like a good one :) 01:32:02 https://github.com/monero-oxide/monero-oxide/blob/main/monero-oxide/src/transaction.rs / https://git.gammaspectra.live/P2Pool/consensus/src/branch/master/monero/transaction 01:45:36 > <@jeffro256> It is about cryptography because people don't understand that this is already possible. They hear the new "outgoing view key" term and assume that this enables a novel form of tracing. It doesn't. 01:45:36 We don't currently have keys that allow tracking both incoming and outgoing transactions indefinitely. If you're referring to statistical heuristics that allow to leak more info than intended, given an incoming view key - then it's obviously a vulnerability that should be patched (and the new upgrade indeed patches it). A vulnerability can't justify making its impact a feature. 01:45:36 And a big part of this discussion is about not the technical possibility of disclosing your existing history, but availability of such an instrument to most of users. Cryptography doesn't make this distinction, but the distinction matters for real world consequences 01:48:42 excuse the n00b question: what is jeffro256? 01:48:52 or alternatively: you stay on an addressing scheme that can be backwards dug through via quantum computers 01:49:04 vamos881: br-m is a bridge, jeffro256 is on Matrix 01:49:19 oh ok, I thought br-m was the person. Duh! 01:49:34 you see it prefixes the user on matrix 01:49:47 vamos881: Oh my gosh what am I 01:50:07 yes, I thought br-m was talking to jeffro256, but then I saw it was meant to me lol. Sorry jeffro256 01:51:25 https://mrelay.p2pool.observer/m/monero.social/tlimTmkdsBmZhGbPpcQSALeg.png (image.png) 01:51:31 That how it looks on the other side 01:51:35 DataHoarder: what is your go code? Go is easier than rust for me 01:51:42 I sent it as well 01:52:04 it's what I use for go-p2pool, p2pool.observer and my block explorer on https://blocks.p2pool.observer/ 01:52:39 the git.gammaspectra is giving me http 403 for some reason. 01:52:41 nice, will check 01:53:21 @just_another_day:matrix.org: Right now your tx history is extremely available if I assume that you're going to give it to me willingly. I can even write you a nice, neat wallet software which sends it to me automatically, cryptographically verifiable, and 0 user friction is required. I could even have it send me spend key [... too long, see https://mrelay.p2pool.observer/e/jrrp4t8KZzZ2bEtv ] 01:53:35 403? might be blocked due to coming from a range abused by AI scrapers 01:53:49 you can just $ git clone https://git.gammaspectra.live/P2Pool/consensus.git 01:53:52 lol no worries > yes, I thought br-m was talking to jeffro256, but then I saw it was meant to me lol. Sorry jeffro256 01:53:54 and that will work 01:54:30 not really, it's the same host. I'll try vpn later 01:55:06 "fatal: unable to access 'https://git.gammaspectra.live/P2Pool/consensus.git/': The requested URL returned error: 403" 01:56:45 If we assume that the evil tyrannical government is all powerful, then Monero is pointless. To get the best decentralization+privacy results, we have to make some real-word assumptions like "we can't maintain privacy with cryptography if the user chooses to leak every single detail to someone they're trying to keep the informa [... too long, see https://mrelay.p2pool.observer/e/v_T14t8KQmNRLXhR ] 02:07:47 yeah vamos881 it is Zenlayer 02:08:23 that's where I get a couple TiB of abuse so that was explicitly dropped 02:23:59 @jeffro256: I'm not the one assuming an all powerful government. Quite the opposite, I know that direct government oppression scales poorly, and governments heavily rely on people willingly comply with their demands. For example, many people choose to do KYC on centralized exchanges for the solely reason of convenience of [... too long, see https://mrelay.p2pool.observer/e/t8TZ498KZ01uSVQ3 ] 02:23:59 As for Monero, there is a very plausible scenario when you have to leak your OVK to get access to most merchants, because otherwise the merchants would have to deal with annoying agencies forcing AML policies on them. If we assume most casual users would leak it, then merchants have little incentive not to comply with the AML [... too long, see https://mrelay.p2pool.observer/e/t8TZ498KZ01uSVQ3 ] 02:24:05 @just_another_day:matrix.org: By "niche scenario" I wasn't referring to increased regulatory pressure and/or increased KYC requirements; I understand that this is the current norm. I was referring to the niche scenario where governments / financial institutions require you prove XMR transaction history for KYC but only a [... too long, see https://mrelay.p2pool.observer/e/4oTa498KbXQ5Q0x1 ] 02:29:51 @just_another_day:matrix.org: I agree about making DEXs easier, which is one reason why I like OVKs: they make multisig UX way way better. I can, and will, blame users who willingly provide tracing information, and then complain about the consequences of their actions. 02:29:51 > As for Monero, there is a very plausible scenario when you have to leak your OVK to get access to most merchants, because otherwise the merchants would have to deal with annoying agencies forcing AML policies on them. 02:29:51 I don't think it's getting through that THIS IS CURRENTLY POSSIBLE WITHOUT OVKs. YOU CAN DO THIS WITHOUT OVKs. YOU CAN LEAK YOUR TRANSACTION HISTORY AT YOUR OWN DISCRETION. THIS CAN BE AUTOMATED. THIS CAN BE CRYPTOGRAPHICALLY VERIFIABLE. MERCHANTS COULD REQUIRE IT TODAY. YOUR PRIVACY IS OPTIONAL. FULL STOP. 02:30:25 There is no such tool in most wallets 02:30:32 What's stopping this from happening ? A) no one has coded it yet, B) people choose not to do silly things 02:30:44 @just_another_day:matrix.org: There is in the CLI and GUI wallet 02:31:01 Yes, but I didn't find it in Cake 02:31:04 how big is the stagenet blockchain? I already had a pruned mainnet node, started syncing stagenet: Synced 254841/2041748 (12%, 1786907 left, 6% of total synced, estimated 11.7 hours left)]] 02:31:32 Okay I'm big bag government: I say that you can't use Cake b/c no tx proofs. You roll over and comply. That's it 02:31:50 Wrap it up, the permisionless blockchain is dead 02:32:50 "Mandatory privacy" doesn't exist, it never has, and cannot exist while humans still retain free will. 02:32:55 > <@just_another_day:matrix.org> It's a valid point. Still, I believe the "political cost" of moving users to a complaint wallet is higher than requiring a single key that almost every wallet provides, only once per address. I'm glad that we at least have common ground in actually understanding what this FUD/concern is about 02:32:55 > Still, I believe the "political cost" of moving users to a complaint wallet is higher than requiring a single key that almost every wallet provides, only once per address 02:34:12 Also, consider the scenario when only 10% of merchants require OVK vs 10% of merchants require key images 02:34:35 vamos881: use the command i told you earlier and it will not need to sync 02:34:38 it will start from block 0 02:34:39 and be entirely local 02:35:24 It's sufficient for surveillance that user provides OVK only once, while they need a continuous stream of key images 02:37:17 When a user needs to install another wallet to get access to a merchant from that 10%, he/she will just choose another merchant. So the 10% of merchants quickly loose all of their clients. As a consequence, this thing doesn't get normalized 02:37:29 Sorry for constantly getting FUDed.. if the scenario described by thankful (whereby merchants mostly require OVK) comes to pass, and say 50% of moneros OVKs are exposed, could that potentially compromise the privacy of the non exposed wallets? The worry is just that this will be used as a potential attack vector in the future. 02:37:35 @just_another_day:matrix.org: What is the practical difference if you are someone who complies with such requests? If you have a change of heart, it is visible to the key holder that you stopped complying 02:38:07 So you will still be on the hook for providing that information 02:38:37 @just_another_day:matrix.org: When every wallet has this option, then the complying 10% lose much less users because of that. So their portion will grow 02:39:40 @tuw:matrix.org: If you don't comply, then your transactions are just as private as if the Monero usage was restricted to that 50% of people that didn't comply. With FCMP++, this still means perfect spend privacy within that 50% pool 02:40:08 ^ and even further if you self-send in carrot, even against quantum opponents 02:40:24 understood thanks. 02:40:53 @jeffro256: The merchants are on hook because there are less of them than users. Users don't face consequences in my scenario, they just choose merchants and comply/not comply with their AML policy 02:48:24 kiersten5821:matrix.org: but that is regtest. I want to send coins from monero-wallet-gui to cake etc 02:48:51 exactly just_another_day:matrix.org so it's super easy to have merchants comply using a custom solution as jeffro256 also says 02:49:21 I missed your early message too, I was still confused about br-m being a person 02:50:40 DataHoarder: maybe... but we're considering clients leaking their OVK in this scenario. A merchant can't get a client to leak OVK by a special custom solution 02:55:21 > <@jeffro256> By "niche scenario" I wasn't referring to increased regulatory pressure and/or increased KYC requirements; I understand that this is the current norm. I was referring to the niche scenario where governments / financial institutions require you prove XMR transaction history for KYC but only after we implement OVKs, and they magically don't care about it before that point. 02:55:21 Maybe they will require it even without OVKs. The pressure is yet to come. My point was that we shouldn't accommodate them by implementing the exact thing they would ideally want. 02:56:59 is it what they ideally want? are you sure that it isn't something else? 02:58:39 like ... destroying the ability to properly hide this on the face of a quantum opponent, or any migration whatsoever 02:58:53 (besides the usability a generate image key brings for safe usage of monero) 03:00:40 and FYI jeffro256 is who is driving Carrot specification and implementation (to put context to these words > I'm not assuming it is FUD, I know that it is FUD based on cryptographic reality, and not baseless speculation about niche scenarios ) 03:00:50 I think we should get rid of not just OVKs, yet IVKs and even spend keys. 03:00:54 No one should be able to see how much you have: not even you. 03:01:09 spending is harmful too 03:01:59 All currency exchange should occur solely offline, with no ability for any computer to view any records. 03:02:04 /s if it wasn't obvious 03:02:58 We have OVKs today though. They're just interactive via disclosing key images or the private spend key. 03:03:27 this was brought up already yep, but, goal shifting to -> that is harder than doing one off 03:03:52 it doesn't matter what you do in the view of regulators they will go as far as they need to obtain X 03:04:18 even spend keys 03:04:41 then goal shifting to -> what if I claim wallet was lost so can't do that 03:04:55 then again, regulators will assume you are non-complying 03:04:57 In order to interact with me, I require your OVK. I promise to you that even though it also allows spending your coins, I will treat it securely with military-grade security. 03:04:57 Please send it in a DM with your name, address, social security number, government ID, and also mail in $10,000 and the deeds to any property you own. 03:04:57 Thank you. 03:05:21 Mhm 03:05:29 a note kayabanerve these will probably be used by the impostor ^ to copy paste elsewhere 03:05:37 If you have the ability to choose not to interact, and you don't want to interact, don't. It's that simple. 03:05:44 and context is lost 03:05:46 they did that during the qubic ordeal 03:05:56 off topic update: Cat is currently laying across 2 mining rigs 03:05:56 and tell people to "search for the message" so they see you posted it, without the /s context 03:06:29 If you don't want to hand your private spend key, don't. If you don't want to hand over your outgoing view key, don't. 03:07:01 Yes, I tried to make them each obviously absurd but I understand anyone can misrepresent me online, including by faking messages outright. 03:08:16 The issue currently is people do want to disclose their outgoing view key to select parties but cannot without making the private spend key hot. 03:08:16 Not that they can't disclose their outgoing view key at all. 03:12:36 @kayabanerve:matrix.org: This logic can be applied to optional privacy chains. Don't want your ETH be traced? Use Tornado Cash! 03:12:36 In real world, you can use Tornado Cash, but it'll quickly make your ETH unspendable at legitimate places 03:13:47 remember a single self-spend using new carrot wallet breaks this link 03:14:22 (under FCMP++) 03:14:29 And creating a new wallet is literally optional privacy 03:14:52 you have extended this too further, I think 03:16:45 I mean, under widespread OVK sharing, wallets will be split into transparent and non-transparent. The latter will essentially form a big "shielded pool". Moving coins into a shielded pool, unfortunately, doesn't help with AML 03:17:42 Of course, widespread OVK sharing is not guaranteed, but I believe there is a high risk of it happening 03:26:00 Just don't share the keys 03:26:00 mkay? 03:26:55 you already share full credit card details when shopping :) so spend keys it is 03:28:25 @ravfx:xmr.mx: I responded to this idea just a few messages above 03:30:34 I'm just explaining the concern btw; a solution is the next step 03:31:02 @just_another_day:matrix.org: Services don't have to accept Ether from sanctioned services and don't have to accept Monero. Monero was already delisted from Binance. That's more a fact of life than anything relevant to this discussion IMO. 03:31:10 I like this as a middle ground > If it's about making it easier, make it a cli-only feature :') 03:31:47 what solution? sending monero back to quantum unsafe/non migration protocol? 03:32:09 Keeping OVKs as a cli-only feature for power users 03:34:37 @kayabanerve:matrix.org: In fact, I'd better have Monero still delisted from Binance. I just don't want merchants who'll start accept Monero to implement AML policies. They should either ignore Monero and lose all the Monero clients or get the clients but pay the price of not implementing AML 03:38:31 I personally believe that the best solution is to add in the default wallet (and strongly enforce other implementations to do so) a very easy way to create and manage "intermediary" wallets, and that whenever a user attempts to access the view key of their main wallet, it should give a rather poignant warning that the main wa [... too long, see https://mrelay.p2pool.observer/e/vc3q5d8KUjZRcXQ4 ] 03:38:31 I believe that the mere ability for users to easily do this should discourage widespread view key requirements, and in the case that it does become commonplace, the amount of information leaked can be plausibly minimized. 03:38:46 (Sry for the delay on writing that; my internet currently sucks lol) 03:39:19 The fud is really because people don't want optional transparency in Monero. The fact they some of them didn't realize we already have some optional transparency is just a sign that it better be kept hidden if we can't get rid of it completely. Cash doesn't have view keys :) 03:40:56 But I believe many realize it; there are good comments under the posts that express similar ideas to mine 03:41:05 @just_another_day:matrix.org: My belief is that transparency should be granular and minimized to the exact information desired to be given. If a CEX just wants to determine your wallet’s behavior during the past, that shouldn’t require you to leak your behavior et infinitum. 03:43:47 I think that the era when Monero had better functioning view keys was also from a time when many things were still in flux with the currency. As with other appeals to history, I will never agree with anyone that says that view keys must be added back just because it was previously done. 03:43:47 If you have other arguments, present those. Monero’s entire development history has been correcting errors made previously, and we shouldn’t start ā€œSatoshi-ingā€ the past now. 03:43:51 I see no issue with view keys. If an oppressive government is your threat model, internet access might be cut off entirely (as seen in Iran), or they could simply block Monero nodes and Tor. Because infrastructure is almost always state-controlled, decentralization has inherent limits 03:45:22 @continuechoose:matrix.org: > because infrastructure is almost always state-controlled 03:45:22 I believe that in the next 50 years, save there be some sort of black swan event that results in widespread authoritarianism, internet infrastructure and access will be significantly less centralized than it is currently. 03:46:09 I may not personally agree with removing view keys outright,Ā Ā but I can definitely see the rational issues with them. 03:46:35 Apologies, but that is not feasible. It is impossible to decentralize the submarine cables that connect countries 03:49:07 vamos881: just connect them all to your daemon 03:49:08 it will work 03:49:19 connect cake to your offline daemon 03:57:51 Forced hodl > spending is harmful too 03:59:06 @lza_menace: I'm personally connected to my onion LWS directly. Can you please join #skylight-wallet:monero.social so we can diagnose the issue? 04:09:55 "remove view keys to increase privacy" only makes sense if you think about it for one second but don't think any harder. A third party can't conjure your view key from thin air without your consent. You can use additional wallets. They could ask for your spend key (or your SSN, photo ID, blood sample, whatever). The downsides [... too long, see https://mrelay.p2pool.observer/e/s8jd5t8KNTVubDJK ] 04:11:14 If you're envisioning a world where no one can use Monero without handing over a view key (and somehow that's actually enforc d with every potential counterparty refusing to transact with you), it's essentially the same assumption as all Monero activity being banned to strong effect. In that case, Monero already "lost" 04:16:08 Conversely, the downsides to removing view keys are severe and immediately obvious. MAGIC Grants uses BTC Pay Server to accept Monero donations and give donation receipts. That uses a view only key right now. Would you rather tell companies they need to put a private spend key on the server just to check incoming transactions, and increase the risk of funds being stolen? Terrible idea 04:17:25 has anyone managed to crack one of those bitmain miners to get it to run linux instead of just mining 04:18:35 i want a risc v computer with a gazillion threads 04:24:41 <321bob321> For Minecraft ? 04:26:35 @sgp_:monero.social: You're only being asked for a blood sample? Who's your provider, I have to switch 04:30:39 Sorry for being blunt, but the idea of removing view keys for "safety" is just..... ugh 04:31:55 (O)VKs improve safety by allowing functionality without hot spend keys, yep. 04:44:13 > <@just_another_day:matrix.org> This logic can be applied to optional privacy chains. Don't want your ETH be traced? Use Tornado Cash! 04:44:13 These "legitimate" places can "require" you to do anything, including, but not limited to, requiring video scans of your face, proof of address, fingerprints, address them as "my liege", etc. Since most cryptocurrency transactions are irreversible, It's your job to not interact with people who will shotgun KYC you if you don't [... too long, see https://mrelay.p2pool.observer/e/kZrb598KclRzZ2l3 ] 04:44:54 Ok but you know all xmr is the same "taint" as tornado cash eth right > <@just_another_day:matrix.org> This logic can be applied to optional privacy chains. Don't want your ETH be traced? Use Tornado Cash! 04:45:32 I dont understand why people are like "coinjoin will taint your bitcoins" "Tornado Cash bad its marked" "monero has no taint" no all moneros are tainted lol 04:46:29 @just_another_day:matrix.org: I don't want to hide any information from the public, because I'm willing to bet that the bad guys are aware of the technical ability for Monero's optional transparency. It will literally only hurt us if we try to stick our heads in the sand and/or die on the wrong hills. 04:50:03 Iirc they can’t be because they were built in such a way that they can’t > <@kiersten5821:matrix.org> has anyone managed to crack one of those bitmain miners to get it to run linux instead of just mining 04:50:03 Which I personally doubt, but considering that these things were likely prototypes sold at a loss…….wouldn’t be all that surprising (if they weren’t modified, why wouldn’t they just sell the chips raw for more money?) 04:50:19 > <@preland> I personally believe that the best solution is to add in the default wallet (and strongly enforce other implementations to do so) a very easy way to create and manage "intermediary" wallets, and that whenever a user attempts to access the view key of their main wallet, it should give a rather poignant warning [... too long, see https://mrelay.p2pool.observer/e/mLzx598KZ1lPeDZX ] 04:50:19 I think that AML risk scorers would see through this immediately. "Oh yeah, you just started using Monero 30 minutes ago and acquired the exact amount you want to use for this action? Get screwed, bud". It would be stupidly easy to flag this intermediate wallet. The next logical step would be for them to ask you to prove who sent you this XMR. 04:51:42 @jeffro256: I’m just throwing ideas at the wall; tbh I’m afraid that if something doesn’t change that we will see a stronger hard fork than with previous changes for no reason other than the view keys. 04:51:42 I don’t want that to happen. 04:52:34 Or alternatively, that if we are hell bent on view keys, that the opposition will discover an actual valid issue, which will be swept under the rug, and then be abused by threat actors. 04:52:34 I also don’t want that to happen. 04:54:58 @preland: how so? isn't it just ddr4 + risc v chips? did someone actually try analyzing this? or was no one willing to spend time on it (understandable) 04:55:24 @preland: I want to point out for the upteenth time that FCMP++ doesn't require that wallets have OVKs, it only enables it for new key material at a consensus level. You can have a legacy wallet that uses FCMP++, but it mathematically cannot have an OVK in the sense that there is static key material that allows outgoing tx [... too long, see https://mrelay.p2pool.observer/e/m5WE6N8KNzdJTGNs ] 04:56:47 https://mrelay.p2pool.observer/m/matrix.org/oLnpQsvMZlTgDZBIjqGbCVFY.png (image.png) 04:56:49 imagine running a server on this 04:56:59 @preland: This is true for every crypto update. We try to mitigate with audits, and so far it has worked, but yes that is a risk 04:57:01 only 2.5 kw 05:06:57 @jeffro256: Can an external party tell if an address is legacy or not; if they can, the same concern with view key requirements stands 05:07:15 no 05:09:32 At least, not without further interaction from the address holder. The address holder CAN prove that the address spend pubkey is univariate or bivariate, which proves whether a OVK is possible, but with just the address, no. 05:25:15 @kiersten5821:matrix.org: XMR isn't sanctioned by the US government, so from a legal standpoint, it isn't the same as Tornado Cash (I am not a lawyer and this isn't legal advice). 05:25:35 @jeffro256:monero.social: It can have an OVK: the private spend key ;p 05:26:28 Something something all are bivariate, idiots just kept setting the second variable to zero... until now šŸ˜Ž 05:28:01 (we also only currently allowing spending keys where the second variable is zero currently, my point was to highlight the definition as this is actually the premise of the amazing backwards compatibility offered by FCMP++) 05:29:41 @kayabanerve:matrix.org: Truuuu 05:31:38 tornado was unsanctioned after lawsuits, however it is still considered "tainted" by these pseudoscience orgs despite no legal issues with using it (RIP to the founders though) > <@kayabanerve:matrix.org> @kiersten5821:matrix.org: XMR isn't sanctioned by the US government, so from a legal standpoint, it isn't the same as Tornado Cash (I am not a lawyer and this isn't legal advice). 05:31:58 I hereby sanction kayabanerve specifically > <@kayabanerve:matrix.org> @kiersten5821:matrix.org: XMR isn't sanctioned by the US government, so from a legal standpoint, it isn't the same as Tornado Cash (I am not a lawyer and this isn't legal advice). 05:43:24 @kiersten5821:matrix.org: So fucked up. Storm doesn't deserve prison time for writing code. But to your point: you can still use Tornado Cash if you spend your ETH at regular merchants or send it to DEXes which don't KYC 05:47:45 yep, unfortunately most regular merchants will use some simple and very easy centralized solution like coinbase commerce instead of self host, and i'm sure they wouldn't let you send tornado eth straight to them lol 05:54:06 I believe lawsuits gained ground on the sanctioning not being proper. I'm unsure OFAC actually unsanctioned it, even if some obligation for them to was created. 06:04:27 also - generate image keys only allow you to check which outputs have been spent 06:04:54 You can find if a wallet was involved in a transaction with just its view incoming key 06:05:01 Which is available already and later on 06:05:04 @kayabanerve:matrix.org: https://www.coindesk.com/policy/2025/04/29/tornado-cash-can-t-be-sanctioned-again-texas-judge-rules 06:05:04 > The Treasury Department’s Office of Foreign Asset Control (OFAC) removed Tornado Cash from its sanctions list in March, several months after an appeals court ruled that the agency had ā€œoverstepped its Congressionally-defined authorityā€ by sanctioning the crypto mixing service’s smart contracts back in 2022. 06:05:27 Change outputs, after all, are incoming transfers 06:05:57 0 XMR change outputs also exist (you can see these in my block explorer when sweeps get sent out) 06:06:44 You may not be able to tell exactly which output was spent but guesses can be had, but you are certain they were part of the transaction (incoming or outgoing) 06:07:32 For example, one input, two outputs https://blocks.p2pool.observer/tx/2ddfc5aa9b5de01dd5808d9408793e42429f241a00a8ef64d6a8dfa722a15e7f 06:08:53 One of which is known and is 0 XMR. An observer with receive only view keys (the only type available in legacy wallets) can as such deduct this must be a sweep, and the new output is being sent externally (with fee deducted from it) 06:09:28 @kiersten5821:matrix.org: Is the ETH ecosystem really that bad ? Most people I see for multi-crypto payments use something like BTCPay or NOWPayments 06:09:34 The "uncertain" part is due to a random account/subaddress offset being selected here as the 0 XMR change target 06:17:47 @jeffro256: https://mrelay.p2pool.observer/m/matrix.org/MSDmnogBVudkdxPjVmonkYrV.png (image.png) 06:18:25 btcpay is only used by cool crypto guys, most merchants selling stuff not closely related to crypto will use a centralized provider which will do this 07:14:42 @just_another_day:matrix.org: Hello, this is big government. Please provide your Monero seed phrase for compliance.. 07:14:42 @just_another_day:matrix.org : remove seed phrases !! 07:49:10 hello i woman. someone send me 0,4 xmr thanks. i woman 07:49:20 shopping shopping shopping 07:50:00 (i actually wouldn’t mind if someone sent me that since i don’t have anything in my balancešŸ˜”) 07:50:50 moberator? 07:58:20 doesnt even accept xmr as a payment > <@kiersten5821:matrix.org> https://mrelay.p2pool.observer/m/matrix.org/oLnpQsvMZlTgDZBIjqGbCVFY.png (image.png) 08:03:19 BlueyHealer: it’s a joke 08:17:36 @kiersten5821:matrix.org: ewww. TIL 10:09:26 if anyone wants to tinker with a personal LWS i made a lil docker compose deployment. put it on your computer and get an onion address that you can connect to remotely: https://github.com/lalanza808/lwsadmin 14:07:58 šŸ‡ØšŸ‡æ Czech President signed a law removing capital gains tax on Bitcoin after 3+ years of HODLing 14:08:12 what about Monero XMR? 14:14:42 xmr_guyy: EU 2027 14:16:14 hodling where... in a centralized exchange, in a cold wallet or hardwallet? 14:17:14 in a hot wallet such as cake wallet... 14:18:07 xmr_guyy: Doesnt exist 14:19:19 yes 14:19:28 centralized exchanges for monero don't exist anymore in EU 14:19:49 they rolled out new regulation, and they're about to enforce it in 2027 14:20:58 The Czech Republic's President Petr Pavel signed a law in February 2025 exempting capital gains tax on Bitcoin and other crypto assets held for over three years. Small transactions (up to ~$4,100/year) are also unreportable. It aims to boost long-term investment and complies with EU rules. 14:21:32 bitcoin and other crypto assets only 14:22:02 https://en.wikipedia.org/wiki/2025_Czech_government_Bitcoin_scandal 14:22:22 thanks a bunch, cindy 14:23:41 they did it to cover their asses 14:24:02 because they received a massive donation (in bitcoin) from some former darknet market owner 14:25:04 disgusting corrupt politicians 14:25:07 "Justice Minister Pavel Blažek, a member of the Civic Democratic Party, resigned on 31 May 2025. Blažek stated that he had approved the donation without verifying its origin but denied that his actions were illegal.[8] The donation was not returned" 14:25:53 hey, at least he got away with it 14:26:27 A law made to benefit these corrupt politicians and mag 14:27:38 mafia politicians 14:33:35 a big coincidence that all this happened in may, and that law exempting capital gains tax on Bitcoin happened in february 14:34:09 if you ask me, he definitely knew the donation was coming, and pushed this as fast as he could so he wouldn't pay any taxes on his little gift 14:36:01 we love paying tax so much 14:37:42 is there any added benefit from sending XMR to multiple different addresses in the same wallet before sending it to its final destination? what about different accounts within the same wallet or sending to multiple entirely different wallets? how would these scenarios look on the blockchain to an adversary? and how do view key [... too long, see https://mrelay.p2pool.observer/e/zrrY-N8KQ0YyYUlO ] 14:40:27 @cranial_luminance:matrix.org: who are you trying to hide from ? have you received xmr from a threat actor or cex ? 14:41:50 @yokoama:matrix.org: lets assume the government and assume i got it from a CEX 14:42:41 multiple different addresses as in subaddresses? 14:42:58 or just different addresses in accounts 14:43:02 > is there any added benefit from sending XMR to multiple different addresses in the same wallet before sending it to its final destination? 14:43:02 No 14:43:02 > what about different accounts within the same wallet or sending to multiple entirely different wallets?[... more lines follow, see https://mrelay.p2pool.observer/e/-Y3s-N8KYkNoVTF5 ] 14:44:15 Cindy: Cindy: both 14:45:46 shuffle each output, churn them, never merge them in a single tx 14:52:25 @yokoama:matrix.org: pardon my lack of knowledge, what do you mean by shuffle and churn outputs exactly? is that the same as "i have 3 XMR i want to spend. i will send 1 XMR to address A, 1 XMR to address B and 1 XMR to address C and then finally send all 3 to the same final destination in 3 different transactions? 14:56:10 @ofrnxmr:xmr.mx: thanks. so what do you mean by 'avoids mixing funds'? is that good for privacy? also, can you be more specific about "doesnt. Can see all accounts and addresses"? 14:57:14 @cranial_luminance:matrix.org: Coin control 15:08:02 @elongated:matrix.org: No, i mean usong subaccounts avpid mixing funds since spending from account (1) wont select outputs from account (2) 15:08:30 its "like" having multiple wallets 15:08:47 hey folks. I keep getting this message on monerod stagenet: "No incoming connections - check firewalls/routers allow port 38080". But my ~/.bitmonero/bitmonero.conf has proxy=127.0.0.1:9050. Maybe only monerod mainnet is reading that conf file? 15:10:03 do I need to specify on .conf which network I want those settings applied to? 15:11:01 vamos881: You cant have incoming connections while routing to tor 15:12:08 vamos881: No, but that file might need to be read from the .bitmonero/stagenet folder (not sure) 15:12:24 ofrnxmr:xmr.mx: oh, really? I'm more experienced with bitcoin core, there tor allows incoming peers tooo 15:12:35 .. when in doubt, just use --config-file=~/.bitmonero/bitmonero.conf 15:12:53 vamos881: Cuz it uses onipn services for p2p 15:17:10 ofrnxmr:xmr.mx: ok, it seems it has to be a different file by default per monerod --help. I also don't see any ban list info from the stagenet log (and I have a ban list) 15:17:59 what does "i have a ban list" mean 15:19:08 ban-list arg 15:21:58 And its not loading it? 15:26:21 ofrnxmr:xmr.mx: nothing was loaded, I needed a separate conf under stagenet dir. Now it's ok 15:34:19 I'll still forever use --config-file 16:06:18 The idea that this upgrade doesn't change anything is misleading. The key difference is that with current optional transparency, continuous user input and/or specialized software is required in order to keep a wallet transparent, while with OVKs a single action at a single point in time is sufficient 16:06:23 The key difference between Monero and, say, ZCash is that Monero doesn't allow making a wallet transparent without weird hacks, while ZCash does. OVKs will change this 16:06:46 Sorry, I had to go to sleep yesterday. I'd like to add this to our discussion 16:07:41 current view outgoing keys already disclose spends 16:07:47 they just don't list the amount 16:08:55 how? 16:09:11 You get change when you spend 16:09:12 because they know when change goes back to wallet, even when it's 0 16:09:21 example https://blocks.p2pool.observer/tx/3341b52d308f26a02191b391476d99478927a61d0921de7156dad81230e9269f 16:09:39 it's a vulnerability 16:09:44 that will be fixed 16:09:53 ? 16:09:53 @just_another_day:matrix.org: ? 16:10:00 Jinx 16:10:00 no FCMP++/Carrot do not change this 16:10:05 a vulnerability can't justify making it impact a feature 16:10:14 it's not about rings. 16:10:45 remember it's also not a new *view key* mode, the view key doesn't change meaning. it's still view incoming key. A different extra key is made for generating key images, which allows, between others, securing the wallet against quantum capable adversaries in the long term 16:10:52 > But unlike old Monero view-only wallets, a Carrot payment validator wallet cannot see "internal" change enotes. 16:10:53 without this, they can go back and make it transparent in the future 16:11:27 @just_another_day:matrix.org: Thats for a churn 16:11:43 Iiuc 16:12:11 https://mrelay.p2pool.observer/m/gohegan.uk/tIxkJWnZuzmIFmmRSFojQxsd.png 16:12:16 yeah, internal sends are churns or change 16:12:28 https://gist.github.com/jeffro256/146bfd5306ea3a8a2a0ea4d660cd2243 16:12:44 nioc: and that diagram doesn't include the need for the split to cover quantum adversaries 16:12:57 as said, it could be something made CLI-only, that is not up to me, just a wild suggestion 16:13:17 but any entity could make a compliant wallet 16:13:47 or as sech1 said, > 16:57:13 If they make a "wallet", it will be at best a custodial wallet which is transparent to them anyway. At worst it will be a number on the screen, representing paper XMR 16:14:17 they did it for bitcoin already, wrapped bitcoin etc. 16:14:19 wrapped monero on hyperliquid too 16:15:18 nioc: they won't read even when linked 16:15:24 also it's tbh deep cryptography even when explained well 16:16:22 So a great excuse to believe what you want to 16:17:51 just_another_day:matrix.org: it's already on reddit being posted as old wallets becoming automatically transparent too :P 16:18:01 see how it amplifies to nonsense levels? 16:18:27 DataHoarder: I dont see the problem 16:18:31 well there is an obvious gap in communication 16:18:46 The more ridiculous the fud, the easier to dispell it 16:19:13 there was also a gap of years for these changes to be seen and they were even being lauded as excellent 16:19:44 tonal shift, after the previous fud was dispelled, using the next step. the concerns are valid, but blown out of proportion, and represent an idealistic view of exchanges or alike 16:20:12 i say: damage control is for politicians 16:20:14 where, again, they will not stop at "oh I can't do this" they will just go further, or make it possible 16:20:58 my fud is: whoever is driving this is actively trying to damage forward secrecy in monero against future quantum adversaries, and uncover the recent past (instead of distant past) 16:21:03 And i mean, politicians who are looking to hide stuff. A single post about OVKs pros, cons, FAQ, is all that is needed 16:21:22 The rest is just arguing with a fool and trying to win 16:21:47 also remember: bitmain is trying to release X9 which also next hardfork will alter its efficiency (RandomX V2) 16:22:41 they are already sending meetings with certain people to discuss "changes to monero randomx" on linkedin/reddit https://paste.debian.net/hidden/40150a6c 16:22:48 it wouldn't surprise me this is again yet another campaign helped with that 16:22:51 My fud is: whoever is doing this is worse at spreading fud than the spam alt imposter that frequents these parts 16:22:59 like Cryptonote -> RandomX back then 16:23:13 or Cryptonight* even 16:23:24 And that if this fud gets us another justin bons 1000 word twitter rambling, i say lfg 16:23:43 yeah ofrnxmr:xmr.mx the imposter is usually embedded well, I'd expect to see them here soon to make noise as some fake account 16:23:44 How do you distinguish a change output with a normal output someone else send you? 16:23:49 they find the best timing 16:24:05 DataHoarder: They reappeared a few days ago. All peaceful-like 16:24:16 just_another_day:matrix.org: timing, and address index 16:24:46 if it goes back to subaddress index 0 of the account, it's likely change 16:24:51 if you get sent to non-zero subaddress index in the account, someone sent them to you 16:25:00 oh, who was it ofrnxmr? 16:25:07 so we only have to randomize address indexes to mitigate this? 16:25:28 that is not how it works, it'd also give you the same information 16:25:51 like self-send change to 0 uses random 16:25:53 and again makes it identifiable 16:25:56 the way is to not use subaddresses, only use main address :') 16:26:01 everything is 0,0 :P 16:26:32 can you send 0 change to a random address instead? 16:27:00 some wallets do that, you can still identify normal change though 16:27:49 this all just seem a subtle leak that isn't an intended property of incoming view keys 16:28:00 @just_another_day:matrix.org: https://github.com/monero-project/monero/pull/10266 16:28:00 it's sadly how the wallet works 16:28:03 not view keys 16:28:05 so we again better fix this instead of using it as justification for OVKs 16:28:21 Its not justification for ovk 16:28:29 it is not justification wtf 16:28:31 thanks to the generate image key, these self-sends won't be identifiable anymore on FCMP++/Carrot btw 16:28:33 legacy wallets will continue having these 16:29:00 And ovk is optional. You dont have to migrate your wallet unless you want to take advantage of carrot stuff, like ovk and quantum turnstile 16:29:06 @ofrnxmr:xmr.mx: this is used a part of the argument that ovks don't change anything 16:29:29 ^ legacy wallets will continue having old behavior 16:29:48 @just_another_day:matrix.org: who's argument? reddits? Ofrn not on reddit. Ofrn letting reddit spam grow until AI thinks it can fix it and AI journalists start reporting on it 16:30:21 no not on reddit. here > current view outgoing keys already disclose spends 16:30:33 i think a lot of people are spreading the part of "Tainted and non tainted coins", which i keep reading is still impossible 16:30:56 just_another_day:matrix.org: the change MUST go back to your wallet, so yeah, the spend disclosing is there 16:31:05 monero doesnt have a paper trail, with or without ovk 16:31:22 You cant see where coins came from, or where they went to 16:31:26 under FCMP++ you cannot have tainted coins or outputs correct 16:31:35 unless the sender also has shared ovk 16:31:57 they can't tell where it comes from or do output tagging 16:32:13 If the sender also has any view key, both of your wallets will share a txid 16:32:49 sender's change will have same txid as receivers incoming tx 16:32:55 ^ 16:32:57 not even ovk 16:32:59 you just need view incoming keys 16:33:01 or, a reporting wallet with proofs 16:33:05 i see 16:33:23 DataHoarder: i wouldn't be surprised if someone's using OVK as lighter fluid for the massive fire to stop the hard fork 16:33:29 so if the change leaks would be fixed, it wouldn't be an issue 16:33:32 it also gives you full info on balances 16:33:34 with just view incoming keys on both sides 16:34:02 what do you mean leaks 16:34:04 this is fixed under new carrot 16:34:04 Cindy: Carrot doesn't even require protocol changes, does it? 16:34:06 Cindy: we honestly dont even need carrot for the hard fork. Stressnet runs fcmp w/o carrot ovk etc 16:34:10 it's offchain thing 16:34:34 change is an internal self-send and it requires that key hierarchy 16:34:36 it requires them for a future quantum migration 16:34:52 Initially the idea was to only include carrot if it was ready at the same time (or before) fcmp 16:35:07 those outputs need to be sent to addresses generated that way to be eligible 16:35:07 yes, but carrot solves the post-quantum stuff 16:35:11 ^ yeah carrot can come anytime 16:35:21 which i'd like to think is what they don't want :P 16:35:21 yeah so i'm not some evil agent trying to delay the hardfork 16:35:39 including by someone else making a wallet 16:35:53 Cindy: Some* post-quantum stuff. Monero still needs another hf to become post-quantum 16:36:09 17:33:29 so if the change leaks would be fixed, it wouldn't be an issue 16:36:11 the change must be seen for the wallet to spend it 16:36:13 you don't need to detect what is change and what is not if you have view incoming keys on both sides 16:36:42 yeah ofrnxmr this sets up the hardness and specifically allows migration even if we have to turn off new transactions using old method 16:36:46 fair enough 16:38:07 like you don't even care about decoding spends there, as decoding incoming gives you all balances and fee is public 16:38:09 that gives you an exact amount 16:38:39 for example, https://blocks.p2pool.observer/tx/8898ea6e1f5bbee5b13887c2df317d5bd6487000278900e0b516252b6a1d75b4 16:38:41 a tx that Monero GF donated to Monero CCS fund 16:38:43 we have auditing view incoming keys for both 16:39:41 so we could usually exactly find what combination of inputs was used even if we didn't have the rings (FCMP++ removes rings) or spend keys 16:40:12 that allows finding the sender, and the recipient, even if subaddresses were entirely randomized 16:40:42 you don't need the view keys, them just reporting the proofs (InProofV2) for each received output would allow the same 16:41:41 reporting proofs is interactive 16:41:54 wait, to understand, this is showing who sent monero and to who, and how much?? i saw that link earlier but i was late to the conversation, want to have the context > for example, https://blocks.p2pool.observer/tx/8898ea6e1f5bbee5b13887c2df317d5bd6487000278900e0b516252b6a1d75b4 16:42:07 a cex could force you to use such wallet 16:42:33 @johnjenkinss:unredacted.org: Generalfund sent a donation to ccs 16:42:35 also https://www.getmonero.org/resources/moneropedia/viewkey.html > Thus, Monero is said to be "private, optionally transparent". 16:42:37 in comparison with transparent, optionally private 16:43:07 johnjenkinss:unredacted.org: both monero CCS and Monero General Fund have their view incoming keys public, so we can know when they receive funds 16:43:13 We have biew keys for both wallets, so you can determind which output whwn where, and the total size of the spend outputs and change 16:43:37 so the UX barrier to have the user comply increases > a cex could force you to use such wallet 16:43:38 in this case GF sent 32.44 XMR to CCS, and the change from the two inputs went back to GF 16:43:43 Fud: OVK enables this 16:43:43 fact: this is already a thing for cirrent view keys 16:43:46 incoming keys are useful for verifying if funds have been received 16:43:53 but not for verifying the balance 16:43:56 without key images 16:44:10 just_another_day:matrix.org: the UX will go as far as needed, the regulators don't care. they will ask for your spend keys or seed words 16:44:38 so the next step is to get rid of seed words and users viewing their own wallets entirely 16:44:51 that's not how it works.. non-KYC dexes aren't prohibited 16:44:58 IMO, OVKs are good for merchants (lets say, a restaurant) to monitor balances 16:45:04 ^ 16:45:07 17:43:43 fact: this is already a thing for cirrent view keys 16:45:07 exactly 16:45:09 ^ and will keep being a thing post FCMP++/Carrot 16:45:11 even on legacy wallets 16:45:13 migrating fixes this for change/self-send 16:45:16 why would a dex ask for anything? 16:45:36 i'd like to show you my mainnet wallet 16:45:38 @hooftly:matrix.org: Serai etc uses view keys as a part of its protocol 16:45:40 which has 2 million XMR 16:45:43 just_another_day:matrix.org: then use those lol 16:45:45 i'll give you the view key 16:45:49 :P 16:45:57 i see > 17:43:43 fact: this is already a thing for cirrent view keys 16:46:14 again it'll self regulate to users not providing KYC or not providing other information like their wallet spend keys 16:46:16 or forced to used some "centralized" wallet 16:46:18 like BSV chain with all the tokens 16:46:29 @ofrnxmr:xmr.mx: all users keys or the validators? 16:46:48 with "bridges" 16:46:50 or solana, or anything that has a bridge that is cheap 16:46:52 i don't want 99% of users doing KYC so that it's very easy to prohibit non-KYC exchanges for the rest > just_another_day:matrix.org: then use those lol 16:46:55 @ofrnxmr:xmr.mx: Basicswap uses view wallets as intermediaries during the atomic swap - but i dont think bsx sees any benefit from ovks 16:47:04 DataHoarder: or some wrapped token where they don't hold the underlying XMR 16:47:07 @hooftly:matrix.org: No clue 16:47:49 just_another_day:matrix.org, remember this is not possible if other users exist 16:47:51 they can send between users and that breaks any chain 16:47:54 @ofrnxmr:xmr.mx: But these are never visible on chain right? 16:48:19 you are also assuming 99% of people go to use non-existent CEX that all comply with an ask similar to a scam 16:48:42 @hooftly:matrix.org: right, and they arent made public either. Only the 2 parties involved in the swap are aware of them 16:49:13 awesome! 16:49:27 it's super easy to make a wallet for CEX 16:49:37 do whatever bullshit they want you to do (even give your OVK) 16:49:42 and then sweep all to another wallet 16:50:09 In the end this is a non existent issue 16:50:22 yes 16:50:43 hahaha they are already mixing sgp's fud along with it 16:50:46 Cindy: at some point they can start tracing coins beyond the current wallet, flagging your funds if the history goes into a non-transparent wallet 16:50:59 no 16:51:08 the naxo fud? 16:51:15 even if they flag your funds, what are they gonna do 16:51:23 they're not gonna magically rip the monero from a view-only wallet 16:51:43 make your monero unspendable 16:51:43 yep, naxo 16:51:53 make my monero unspendable how 16:51:56 Dont use a cex 16:51:57 stealth addresses make that impossible 16:52:00 he's evil money launder, don't accept his monero!! 16:52:14 who 16:52:14 ^ 16:52:16 they will prohibit you from interacting with them again 16:52:17 Dont use a CEX 16:52:18 you can send to new wallet 16:52:29 it's about merchants too 16:52:32 DataHoarder: yes 16:52:38 just_another_day: merchants don't know the difference 16:52:43 because of stealth addresses 16:52:48 they won't know where the XMR came from 16:52:48 how do you expect new users to onboard 16:53:03 from a cex 16:53:13 how do you know that 16:53:13 i would assume this only matters if you're trying to spend on a CEX or something, im sure companies like Mullvad, or reflectacles, Xmrbaazar, or Trocador arent gonna flag your funds as they dont really care where it came from > <@just_another_day:matrix.org> make your monero unspendable 16:53:19 how do you expect merchants to onboard new users 16:53:21 say a random comes and buys x 16:53:23 shares their spend keys even, let's make it simple 16:53:51 we are sharing spend keys now 16:53:53 ok how does a cex identify a new user 16:54:13 are you sharing your keys with everyone? 16:54:21 they come with their full spend keys 16:54:23 and ... now what 16:54:24 they look at the history of his coins. If a too big portion is untracable due to the lack of view keys, they flag it 16:54:25 they can tx? 16:55:22 so that means everyone is flagged automatically 16:55:24 remember you can't control who sends to you either 16:55:25 that's pretty much doable with incoming view keys alone 16:55:39 ^ (referring to DataHoarder) 16:55:56 that's true 16:56:22 also you can't look at the source of the XMR 16:56:23 yes Cindy 16:56:25 but let's assume 16:56:27 spend keys 16:56:27 so like 16:56:31 maximum view 16:56:59 or even paper wallets 16:57:01 let's make it simple to argue about 16:57:03 yeah, even with spend keys you can't 16:57:33 UNLESS it is mined as solomine or p2pool 16:57:35 if it's mined via centralized pool -> can't 16:58:00 If i delete my cache file, or turn off "save recipient addresses" in cake (or cli etc), i literally have no idea who i sent to 16:58:06 i've said it yesterday. If you have a maximum view on wallets, they're split into transparent and non-transparent. You can think about the non-transparent wallets as a big "shielded pool". Too much money from the pool -> you get flagged 16:58:40 @just_another_day:matrix.org: Your pool payments are visible by punching your address into the pook 16:58:41 who are you gonna share your view keys with 16:58:50 You are still here spreading non sense ? 16:59:17 Better here than on Reddit, right? 16:59:36 The pool knows where it sent the money. Bitcoin pools are funny - they pretend not to know 16:59:57 just_another_day:matrix.org: there are no transparent wallets, it's outputs, and FCMP++ breaks this linkage 17:00:27 same as bitcoin 17:00:31 transparent = those who've shared OVK/spend key/whatever 17:01:16 like, you can't know how the txs were received even if it's from elsewhere 17:01:18 so why is this not done now then? 17:01:46 when they have the same if not better tools 17:02:05 you mean requiring everyone to share CryptoNote's view key? 17:02:16 why so much noise to stay on the old system that also opens you to quantum opponents making everything transparent in the future? 17:02:47 this is what you are asking, by removing the ability to split spend key + view key into a hierarchy of granular keys that can't be walked back by a quantum opponent 17:05:46 i'm not sure if it's absolutely necessary for post-quantum security 17:06:18 just_another_day by being here and asking your questions and getting knowledgeable answers you can now go forth and fight the fud 17:06:33 it is, as defined on the derivations on https://github.com/jeffro256/carrot/blob/master/carrot.md 17:06:35 and for the PQ Turnstile https://gist.github.com/jeffro256/146bfd5306ea3a8a2a0ea4d660cd2243 17:08:02 2.2.1 is the strong one > Internal forward secrecy 17:08:04 basically all stuff once sent to your wallet is non breakable in the future by quantum adversaries and stays secret 17:08:34 what this means is that change and self-sends stay hidden, meaning they can't tell you sent or transacted on your wallet 17:09:33 if they know the involved addresses (not keys) a quantum adversary can still break things like 2.1.1 says (conditional on them knowing the receiver target address) 17:09:37 but 2.2.1 is what allows your own history to stay secret 17:10:05 then, it also allows the PQ Turnstile for a migration even when you can't "transact" anymore due to an active quantum adversary 17:10:35 that is the linked gist 17:11:34 that requires first proving the derivation, then proving the signature on the key image in an alternate way that couldn't be broken ahead of time 17:12:04 you can read the details on the gist, it is inspired on Switch Commitments https://eprint.iacr.org/2017/237.pdf 17:15:14 @just_another_day:matrix.org: but you also said it's not a cryptography problem, when it is and last night the main developer also said how bullshit it is 17:15:14 https://mrelay.p2pool.observer/p/2raZ_d8KRFdDOVIz/1.txt (code snippet, 5 lines) 17:22:09 I think that I lost some braincells after reading that 17:43:14 is the view key bullshit still going on...? 17:43:42 Look like 17:44:24 Can everyone just send me there FDE AES keys now? 17:46:35 @intr:unredacted.org: Ya, new reddit post -> deleted by mods -> reee -> repeat 17:46:43 are you serious... 17:46:51 they're AI generated 17:47:01 I fucking called it 17:47:22 Which is the beauty. Id leave it up so ai can train on ai slop and produce more garbage 17:48:11 I'm more of an iocaine enjoyer 18:07:57 nioc: I'd like to fight the fud, but I'm still confused. What DataHoarder has explained to me is that: 18:07:57 1. If both sender and receiver has published their incoming view keys, then it's possible to see the whole transaction history between them 18:07:57 2. OVKs are necessary for quantum migration 18:07:57 Is this right? 18:09:02 It's nothing new. 18:09:02 That is right. 18:24:21 it's not that the OVK are necessary for migration, but that for forward secrecy against a quantum opponent you need to split spend and generate image keys, which then allow to create OVK, and such split is also what allows the safe migration even with active quantum opponents 18:24:52 Basically not we want OVK -> let's bolt it to all quantum and forward secrecy stuff 18:24:54 It's the other way around 18:25:24 That is also why legacy wallets cannot obtain that internal forward secrecy 18:29:32 Jamtis details also has interesting tiers https://gist.github.com/tevador/50160d160d24cfc6c52ae02eb3d17024 18:29:57 Including a "filter received" to generate view tags (but not decode info) that can be used for scanning 18:30:42 > It cannot see outgoing payments and received change. 18:30:49 DataHoarder: This tier is cool af. Sad that carrot doesn't include it 18:30:55 Which is similar to new carrot tier of view incoming 18:31:03 It can't due to design on current monero 18:31:27 It'd require migration away or change address format 18:31:30 And* 18:32:21 I see. It'd greatly mitigate the privacy risks of light-wallets 18:32:26 Carrot is a middle hop to allow inter operation instead of having every user make new wallets or generate new addresses immediately, or have environment change address format 18:33:17 Would it be possible to do the split without creating OVK? > it's not that the OVK are necessary for migration, but that for forward secrecy against a quantum opponent you need to split spend and generate image keys, which then allow to create OVK, and such split is also what allows the safe migration even with active quantum opponents 18:33:21 the jamtis addresses were comically long 18:33:23 What you call OVK is "Full view only wallet" in Jamtis 18:33:35 And they are getting longer of the new proposals 18:33:39 Lol 18:33:50 which new proposals 18:33:55 The split necessarily creates that OVK or a similar one 18:34:05 It's about splitting the image generation/validation from spend keys 18:34:26 I see 18:34:27 So you don't need to disclose spend keys (used in signing) when migrating or transacting 18:35:03 This new one https://github.com/monero-project/research-lab/issues/151 18:35:11 intr^ 18:35:29 ty 18:36:06 wait, so jamtis is not off the table entirely? 18:36:32 No 18:36:40 interesting 18:36:57 Carrot cake in for FCMP++ as it'd ease the transition way quicker 18:37:01 Jamtis and other research continues 18:37:11 It's a bit complex 18:37:37 yeah, I'm also confused as to what happened to seraphis itself 18:37:39 > If both sender and receiver has published their incoming view keys, then it's possible to see the whole transaction history between them 18:37:39 By the way, can you distinguish a transaction between them and a transaction that just sends coins to both of them from a third party? 18:38:00 As there was also Seraphis and FCMP++ dev moved to the same repo but seraphis part was left behind in favor of fcmp 18:38:33 I see 18:39:15 I remember seraphis bringing some sort of modularity to the wallet codebase, I wonder if fcmp took inspiration from that 18:39:54 The specifics there escape me a bit as there's a few more factors that can change that 18:40:08 np 18:40:14 If they don't have the full view (only view incoming) they can't see the internal change output 18:40:28 I was answering just another day 18:40:54 oh 18:40:58 In that case they just see a payment to the recipient if they know their address 18:41:11 But not the other way back 18:41:40 Ofc, this is assuming it's the new carrot and not legacy under carrot 18:42:08 Legacy under carrot: yeah it can be obtained in certain cases 19:04:17 Monero gets a mention from a shadow library admin, https://bsky.app/profile/ednewtonrex.bsky.social/post/3mcyye3yl4s2d 19:10:26 Lol wild 19:10:44 Yaaaarrr 19:17:46 šŸ“ā€ā˜ ļø 19:23:34 Information wants to be free 19:30:31 https://mrelay.p2pool.observer/m/monero.social/CaoLqmUHSSnEEzECEMsTvJEt.jpeg (ima_b17f12d.jpeg) 19:30:37 lol 19:38:29 Also remember, that is not part of the hard fork even now 19:38:45 The base scheme is there but only legacy wallets are in main Monero code (or been tested in stressnet) 19:39:30 It is an addressing scheme, which works for Carrot/Jamtis style outputs 19:40:21 @kowalabearhugs_: I wonder what payment method Nvidia used 20:29:32 do I need to join that Discord accursed place for fud campaigns? 20:34:05 <321bob321> Discord is only to share state secrets 20:38:15 @kowalabearhugs_: Making the biggest companies in the world pay for the best shadow library website is an unusually positive ordeal. 20:38:33 What are OVKs good for? Besides quantum migration 20:39:13 You still doing this bud ? Gotta respect the effort. 20:42:02 @just_another_day:matrix.org: Christ 20:42:02 1. Makes DEXes easier to create, taking power away from CEXes 20:42:02 2. Proper view-only wallets 20:42:02 3. Better auditing for donations - transparency is needed there to see how and where donated funds are being spent[... more lines follow, see https://mrelay.p2pool.observer/e/zdyOg-AKN0VmTl85 ] 20:42:36 Kyaba said Serai is good without OVKs 20:43:04 @redsh4de:matrix.org: From what I understand it also helps accpunting for businesses who accept XMR. 20:43:12 @just_another_day:matrix.org: Serai isn’t the only DEX out there, it took a lot of engineering effort to make it work without OVKs 20:43:32 Thorchain have a skill issue thats why they werent able to add Monero 20:43:54 3. * lol. So suddenly they're good for audits when the audits are "harmless", but don't change anything when the audits are done for compliance 20:43:55 OVKs lower the technical skill barrier to make it happen 20:44:30 just_another_day: OVKs allows for easier management of fundraisers 20:44:59 like in kuno 20:46:26 without OVKs, it would be super easy for someone to inflate the amount of XMR they got 20:46:31 to make their fundraiser look big 20:46:45 stop exposing me 20:46:52 @kowalabearhugs_: RIP libgen 20:46:52 and attract more people to take a look at it 20:47:26 my kuno to raise awareness of Monero in the outer solar system has garnered 300 xmr repeated self donations of 0.1 20:47:36 lol 20:47:57 @just_another_day:matrix.org: ā€œAuditā€ in this case literally means just verifying donations or fundraisers and their usage 20:47:57 Arguing against this is ridiculous 20:48:27 Missing the forest for the trees 20:48:46 it's so easy to "boost" a fundraiser with self donations 20:48:54 because of this flaw 20:49:12 i hope kuno doesn't start asking for key images :P 20:49:24 šŸ”‘ 20:49:41 I still don't understand the view key controversy 20:49:59 me neither 20:50:24 regulators would also want to audit many entities. making audits better is a double-edged sword 20:50:47 i thought the only difference is the new key has an outbound viewing feature which the old one only had an inbound viewing feature 20:50:59 did anyone answer my question list from 3 days ago? 20:51:02 Regulators already audit centralized registered entities 20:51:02 Changes nothing 20:51:48 @kiersten5821:matrix.org: Thats all it is 20:52:21 @redsh4de:matrix.org: they can't audit everyone, it's unscalable 20:52:31 unless you provide an easy way to do so 20:52:37 also with OVK, it solves the issue of having to ask people to give key images to fix broken balances 20:52:46 It is not a easy way to do so 20:52:58 Because there are steps to it that add friction 20:53:00 balances that are too inflated because they took out some and the monitor registered the internal change output as a "donation" 20:53:25 This doomsday scenario does not scale in the first place 20:54:28 if OVKs facilitate audits for donors, then they also facilitate audits for regulators. I don' understand why this logic doesn't hold 20:54:35 If view keys were auto-embedded in transaction data sure, you could argue that its like Zcash t-addrs or whatever 20:55:54 it's unscalable because of the amount of wallets you have to scan 20:56:03 for each transaction 20:56:10 That too 20:56:29 the cost of scanning a single transaction increases the more wallets you have to account for 20:56:31 for those that haven't seen, DataHoarder shared that someone shared this "Carrot and Monero quick facts" https://mrelay.p2pool.observer/m/gohegan.uk/tIxkJWnZuzmIFmmRSFojQxsd.png 20:56:45 they're not running their surveillance on a nokia šŸ˜… 20:57:17 i'm sure somebody will write a well-optimized version of the wallet scanner 20:57:27 would be much much better on a GPU tbh 20:57:47 but for now, that stuff is pretty hefty 20:58:06 especially if you're scanning from genesis to the tip 21:02:28 plowsof: It was me - it's not great, but it gets the message across. I still think something with more detail would be beneficial! 21:06:33 Serai doesn't require OVKs. Auditing Serai validators' behavior would be immediate if we used OVKs. Currently, we are only able to observe faults as liveness faults where OVKs would provide explicit evidence to some fault criteria. 21:07:18 OVKs allow scanning spends by anyone you give your key to, like current spend keys. You don't want someone to scam your spends? Don't give them your OVK (or spend key currently). 21:07:51 It's really just a tired debate after days of going in circles. This clearly improves security for determining balances and makes selective disclosure easier. 21:09:30 it strikes me as less of a debate and more of concern trolling 21:11:14 people want a choice of keeping a legacy wallet or upgrading, and they will have that choice right? however that gets implemented in wallets i dunno. the concern trolling is the hardfork evil devs will kyc all your spends and "full government name" included every alias/handle known is a core developer running 5 chainalysis companies who has control 21:11:14 over this hardfork 21:12:14 and censorship to hide the secret hardfork! 21:13:26 and the top-secret hard spoon 21:25:27 > makes selective disclosure easier 21:25:27 > that's what people don't like 21:27:36 Oh no, you'll be limited to legacy wallets without such functionality which have identical addresses and will continue to operate as before for the indefinite future 21:27:38 the horror 21:28:57 "concern trolling" does seem the best summary to me 21:29:07 just_another_day: are you really sure you want to combat FUD? 21:29:16 or is it JUST ANOTHER DAY of going in circles with you 21:29:43 21:38:33 What are OVKs good for? Besides quantum migration 21:29:43 it's the other way around 21:30:13 as said. the ovk comes out from the way the keys are split for specifically keep your history forward secret 21:30:57 22:11:14 <@plowsof> over this hardfork 21:30:57 it's not even a wallet hardfork 21:31:15 the thing they are complaining about doesn't need a hardfork, it could come *today* 21:31:22 😭 21:31:26 https://mrelay.p2pool.observer/m/matrix.org/XRhIJNCdUXJqaoxPrCefAKwJ.jpg (1000008405.jpg) 21:31:43 just haven't bothered to do new carrot on current outputs 21:32:22 you guys are wasting your time over someone who will never actually change their mind 21:32:37 Akshually, OVKs are a result of how the backwards-compatible reinterpretation of output keys introduced a malleability in the statement such that it only proves the rerandomization is openable over G, T, not that the original output key was openable over solely G šŸ¤“ 21:33:13 This allows us to malleate output keys with T terms, and that property enables forward secrecy 21:33:13 kayabanerve: how do you become this smart 21:33:38 but it's not cryptography, cause I feel like it's not kayabanerve 21:33:40 :P 21:33:52 Then, the fact that output keys are derived from an address and an address is indistinguishable if containing solely a term over G or terms over G and T... well you know the rest šŸ˜ 21:34:21 is this apart of the monero generators lore? 21:34:29 That is actually the historic progression of this though lol. Forward secrecy was only realized when I realized one could mess with this. We just said that was a feature, not a bugā„¢ 21:34:55 the reddit threads are titled "Say no to the hardfork" šŸ˜† 21:35:01 The idea naturally extended from there to also messing with the addresses themselves 21:35:35 plowsof: That's their right, it's called a hard fork for a reason. They can...*checks notes*not update their node software to one implementing the FCMP++ hard fork 21:35:42 yayyyy personal choice and liberty 21:35:50 plowsof: but it's not even there yet lol, wallet code 21:36:01 we will split the chain! 21:36:07 we will mine our own chain with its own consenus 21:36:08 carrot could literally exist today 21:36:19 just need to move one thing to tx extra :P 21:36:32 Cindy: Do dumb things for over a decade and you start to realize what isn't dumb. 21:36:46 Or, properly educate yourself with the widely available literature available in this modern age 21:36:46 ah well that makes sense 21:36:54 i might not run a node, or know what im talking about, but ill have more karma on reddit by the time im finished here, mark my words 21:37:17 what is coming is a change in tx output format 21:37:31 Many options, I somewhat wasted my early years, it does not take a decade to get this to this level which isn't not that of a proper cryptographer 21:37:45 which by convention legacy wallets and new carrot and maybe jamtis can share 21:37:50 I'm an informal cryptographer/cryptographic engineer IMO 21:38:09 soooo.. term for person who just messes with math? 21:38:25 Yes but I get results :D 21:38:40 *sometimes. People hear more about my successes than my failures :p 21:39:07 My early years were messing around _without_ accomplishment. 21:39:12 the wallet could be something else, just won't be compatible on other software 21:39:59 i'm not much of a cryptographer either 21:40:14 i don't think i'm allowed to call myself that :P 21:41:29 all i do is mess with the code a little 21:42:18 so that is why I am calling all of this fud plowsof it's not a hardfork for the wallet code, just the tx output which is NOT tied to the wallet code, it's not something that was added -> then found a feature to "stick" to like quantum safety, and best of all, the wallet is not even there 21:43:22 it's making overreach in every single aspect to have something stick and be divisive, specially around "say no to hardfork" -> the new carrot derivation can be implemented regardless, with some ** 21:44:11 šŸ‘ 21:44:17 they also misunderstand what carrot is. it's both the tx output side, and new addressing modes 21:44:20 i for one, will run the newest version of monero 21:44:26 cuz i agree with the decisions 21:44:37 others can go split the chain or something 21:44:50 also fun. the hardfork can release anytime and not have to wait for Carrot addressing mode 21:45:15 but it will have carrot tx output format (which all wallets use, even custom ones later down the line) 21:46:08 example, I might end up using a custom derivation for special multisig purposes that is temporary. it can be used in then network, transacted with, but ofc can't use the PQ Turnstile cause it is not the Carrot addressing mode 21:46:38 but yeah, I guess I understand this cause I reimplemented these things 21:47:31 literally the only difference is it can see outbound transactions and this is now a problem? I'm so confused... this is like a nothingburger > <@redsh4de:matrix.org> Thats all it is 21:47:39 and ran stuff on stressnet 21:47:46 this will make airgap management so much easier right? 21:47:47 the hardfork does not even do that as well 21:48:11 it's new wallet addressing mode that doesn't necessarily need a hardfork per se 21:48:20 yes, it'll make it so much easier 21:48:23 except for some other features around quantum safety 21:48:28 because you don't have to have the spend key to look for outgoing TXs 21:49:24 i last tried to use an airgap wallet a very long time ago and i had to import key images a lot 21:49:50 wait, i think the problem was that even though the hot side of the wallet can see the outgoing tx, you have to tell the cold side that it's outgoing 21:49:54 and still have to send it some data 21:50:21 yes, but now it's even easier too ^ 21:50:28 i don't know if the view key will help in this case as the offline side still won't be able to sync/see? 21:50:30 as FCMP++ signatures can be made without decoys 21:50:49 that can be filled later by an online view wallet 21:50:56 (the membership proof) 21:51:08 insanely cool stuff 21:51:16 so you could actually initiate the tx from the cold side? 21:54:42 If it knows its UTXO set, yes 21:59:29 well some of you are keen on not realizing the problem of adding "easier selective disclosure" into Monero 21:59:35 i can't help with that 22:00:07 "easier selective disclosure" already exists :P 22:00:15 spend proofs, TX proofs 22:00:27 Nonsensical 22:00:34 easier than what? 22:01:32 You can build a wallet that selectively discloses with a singlw button already thats what you are arguing against and its absolutely stupid 22:01:49 please not again 22:01:55 I am going positively insane 22:01:57 my theory is that blockchain surveillance really wants this feature in Monero 22:02:10 so devs pretend it's not a problem 22:02:27 Oh so its even dumber 22:02:34 you'll have an easier time theorizing that small/limited block size is what blockchain surveillance really wants in monero 22:03:34 yeah like.. even the same people pushed that 22:03:47 @intr:unredacted.org: Good job... 22:03:53 Haha 22:03:55 lmao, sorry 22:06:31 i love when people complain about a nothingburger for the 1000th 22:06:34 fucking time 22:06:55 blockchain surveillance companies can already tell you sent someone a TX with just the incoming view keys 22:07:16 and when they see that, they'll ask you for keys related to that TX 22:07:41 I proposed a 100x current base block size limit pending a new P2P layer and was associated with those accused of being chain-analysis plants 22:07:56 wooooo McCarthyism, alive and well šŸ˜Ž 22:08:08 forget I said anything 22:08:33 kayabanerve: this definitely sounds like mccarthyism 22:09:08 everyone's quick to point their pitch-forks and accuse those of working with LE or federal agencies 22:09:19 When will there be a fork/new wallet protocol without incoming view keys? 22:09:24 or chainlysis et al. 22:09:31 (to make consensual disclosure as annoying as possible) 22:10:33 (and to worsen the impact of coerced disclosure of view keys by promoting it to coerced disclosure of the spend key as well) 22:10:35 i like how nobody talked about why view keys existed in the first place 22:10:53 it's almost as if when it's already implemented, nobody actually cares 22:11:11 it's just doom and gloom up until it gets implemented.. then people just shut up after a while 22:12:06 Nope Feds 22:12:49 22:59:29 well some of you are keen on not realizing the problem of adding "easier selective disclosure" into Monero 22:12:49 it wasn't added, again 22:12:57 it's a side effect, and something you can still do 22:13:15 old wallet will STILL be able to do that 22:13:26 23:01:57 my theory is that blockchain surveillance really wants this feature in Monero 22:13:26 why is it not done today then? 22:13:55 yes, why is it not done now 22:14:23 we can already tell if a TX was made by just looking for change outputs 22:14:56 but yeah. remember a few weeks ago it was around forward secrecy and ability to stay safe against quantum opponents? carrot features and PQ was pointed out 22:15:42 surprise. now it's specifically targeting THAT ability for monero to stay safe in the future and relevant (and prevent internal history from being entirely in the open, even if you don't give view keys, as long as addresses are collected) 22:18:28 that is a very good point 22:19:19 id rather want quantum adversaries to know all the TXes i made 22:19:36 rather than the hypothetical doom and gloom situation where i may be forced to give up my view keys (with my knowledge) 22:19:58 one can be done without you knowing, the one can't be done without you knowing 22:20:26 ā€œLegitimate usersā€ don’t want convenience at the expense of privacy. 22:20:26 The entire premise of Monero is default, uncompromising privacy. Not opt-in. Not selective. Not ā€˜easier disclosure’. 22:20:26 If you want auditability, compliance hooks, or features that make institutional oversight more convenient, there are already coins built for that. Go use ZEC, go use transparent chains, go use something designed to play nice with FINTRAC and regulators.[... more lines follow, see https://mrelay.p2pool.observer/e/0Pz2heAKMkFGTGhQ ] 22:21:31 > Thus, Monero is said to be "private, optionally transparent". 22:21:43 on monero front page since I remember 22:21:54 monero is not "uncompromising privacy" whatsoever 22:21:55 > If you want auditability, compliance hooks, or features that make institutional oversight more convenient 22:21:55 and using features 22:22:02 and also "not selective" is not true either 22:22:07 TX proofs and spend proofs exist 22:22:09 and are used 22:22:18 suddenly your coins cannot be used in cold storage 22:22:58 Imajin puting your whole full wallet in your shop (that could get hacked) 22:23:07 non, that where you use view keys... 22:23:11 yes 22:23:26 if view keys didn't exist, it would be super easy to compromise and steal moneros 22:23:28 you can know the customer paid, but if someone break it, no funds can be stolen 22:23:53 yeah, pretty sure most shit that accept monero use view keys in there server so they can keep there monero when they get hacked 22:24:06 ā€œOptional transparencyā€ has never meant ā€œoptimize disclosure.ā€ 22:24:06 TX proofs require conscious, per-use action. That friction is intentional. 22:24:06 Protocol or wallet changes that reduce friction don’t just add convenience, they reshape expectations and coercion vectors.[... more lines follow, see https://mrelay.p2pool.observer/e/tcaEhuAKUXhhY1hQ ] 22:24:06 DataHoarder: also btw, you should fix the text encoding for the plain text stuff 22:24:13 it looks mojibake 22:24:17 text encoding? 22:24:19 it looks fine here 22:24:28 "“Optional transparencyĆ¢ā‚¬Ā" 22:24:46 also GhostMaple, that is obvious AI writing 22:25:13 that is so AI lol 22:25:18 and they are no protocol changes that allow that 22:25:26 the wallet stuff is already there ... if you check history here 22:25:48 discussed ad infinitum 22:25:50 giving the keys is also a choice 22:25:52 Cindy: on which message, IRC? 22:25:58 I see ā€œ as " but curved 22:26:02 DataHoarder: on the mrelay.p2pool.observer link 22:26:22 you should probably do "Content-Type: text/plain; charset=utf-8" 22:26:25 https://irc.gammaspectra.live/4850060215e8c955/image.png 22:26:27 yeah I guess 22:26:34 fud was successful btw 22:26:42 okay well tor browser assumes some other text encoding 22:26:48 thats why i get mojibake i guess 22:27:02 yeah, still good point 22:27:41 i can ignore the garbage characters :P 22:29:07 So what does adding this accomplish anyway? Trying to appease more CEX's to drive the price up and try and mimic what ZEC did last year? 22:29:17 i'm glad you're not using AI now 22:29:21 for one 22:29:28 @rrjo1zj8p7lhtl15lylp:matrix.org: It allow proper operation of systems 22:29:39 It already there, it's just more granular (so better) 22:29:43 will 13 word mymonero seed work post fcmp++ ? 22:29:59 what systems? why? 22:30:10 why do we need OVK? I only need a key to get in my house, not to leave it 22:30:16 @rrjo1zj8p7lhtl15lylp:matrix.org: Think you have an online store that accept monero 22:30:16 And instead of using view keys, you use your full wallet 22:30:17 23:29:07 So what does adding this accomplish anyway? Trying to appease more CEX's to drive the price up and try and mimic what ZEC did last year? 22:30:19 it's not adding anything. it's not even part of a hardfork 22:30:25 now a hacker find a way to break in and get the password of your monero-rpc 22:30:32 however, this makes the wallet internal history forward secret against quantum opponents 22:30:35 then he can just send all the fund to itself 22:30:51 also allows migrating safely to a quantum system in the face of active quantum adversaries 22:30:54 With view keys, your store can fully operate with a wallet than can't spend 22:30:56 https://gist.github.com/jeffro256/146bfd5306ea3a8a2a0ea4d660cd2243 22:31:00 it's not an EXTRA key 22:31:09 so if a hacker come in, well, he can't spend your coins 22:31:14 DataHoarder is explaining OVKs, while ravfx is explaining view keys in general 22:31:25 it's a side effect of being able to achieve this security 22:31:31 and splitting spend key into spend key, generate image key 22:31:52 will 13 word mymonero seed work post fcmp++ ? <<>> mymonero is closing down, I suggest that you create a new wallet now and move your funds there 22:31:55 nioc: for most people, you don't need the OVK 22:31:58 that way quantum computers can't walk all they way up 22:32:13 but OVK make it super easy for things like fully cold storage coins 22:32:17 I'll try and do my homework before speaking anymore because I have no idea. Thanks 22:32:26 see also 2.2.1 point here https://github.com/jeffro256/carrot/blob/master/carrot.md#221-internal-forward-secrecy 22:32:28 yes yokoama:matrix.org 22:32:29 and fundraiser auditing 22:32:30 and it'll use legacy features 22:33:01 read on the carrot document, specially how quantum forward secrecy is achieved 22:33:13 yeah, thing like ovk will probably allow cold wallet to fully sync without having the device plugged each time you get a transaction (or worst, having to scan a bunch of qr codes every time) 22:33:31 > I'll try and do my homework before speaking anymore because I have no idea. Thanks 22:33:33 ^ this is what FUD achieves, all the conversations hear 1% of the things and are overreach over what happens 22:34:03 note this is also not a hardforkable thing, it's a wallet addressing scheme that can happen anytime, and doesn't even need to be monero 22:34:05 it could happen today, or way after any hardfork that adds FCMP++ 22:34:07 or it could be some random dev that creates the wallet 22:34:10 Cindy: nobody has ever asked me for any keys, what am I doing wrong? 22:34:21 i want your keys 22:34:30 can you give me your keys 22:34:35 it doesn't need monero to support it 22:34:36 nioc: Just send me your FDE AES keys please 22:34:36 And you 42 words seed too 22:34:44 Cindy: I will check with Cat when she wakes up :) 22:34:54 now you can't say nobody ever asked you :D 22:35:01 thx 22:36:58 DataHoarder: i haven't seen FUD this massive since pubic 22:37:25 RandomX :P 22:38:03 isn't RandomFud already gone? 22:38:24 it's starting again 22:38:26 bitmain was making the rounds for v2 changes 22:38:47 I saw them reach out some days ago 22:38:56 and pushing anything that just makes v2 not happen in their fork is a win for them 22:39:58 that makes sense 22:39:58 the real fud is ram prices :( 22:40:17 true, and ssd 22:40:25 they're probably the ones planting the seed for FUD 22:40:48 convincing people to not hard fork 22:40:51 okay I'm a noob, what is FUD 22:41:01 fear uncertainty doubt 22:41:11 fear uncertainty doubt 22:41:15 beat me to it 22:41:27 thanks lol' 22:41:46 @rrjo1zj8p7lhtl15lylp:matrix.org: Fear, uncertainty and doubt. How we are manipulated on a daily basis by friends, enemies, colleagues and governments. 22:42:25 corporations also like to use it :P 22:42:25 Cindy: No it’s fireice and gang 22:42:39 I haven't heard that name in a long time 22:42:44 we sure are. That's why I'm here. 22:42:48 microsoft famously uses it a lot 22:42:54 or at least used it a lot back then 22:43:23 @intr:unredacted.org: He works for ztrash now and still sour 22:43:28 no way 22:43:41 @intr:unredacted.org: Check ztrash Reddit 22:44:08 > r/zcash has been banned from Reddit 22:44:36 oh it's r/zec 22:45:00 he's a mod lmao 22:45:05 can't make this up 22:45:32 even writes some sort of newspaper style blog 22:45:42 I've seen enough lmao 22:45:48 Where Are They Now ā„¢ 22:46:03 he's been real quiet since all the ztrash drama popped up and monero reached the all time highs lmao 22:54:10 https://mrelay.p2pool.observer/m/unredacted.org/djBFABRtwIKzFRNJeHCpmyBq.png (clipboard.png) 22:54:16 > supertestnet 22:54:19 https://mrelay.p2pool.observer/m/unredacted.org/zBaLAhYeOleCpCoEEpqVkoNm.png (clipboard.png) 23:24:25 I thought fireice wasnt stupid 23:24:44 Maybe he got hacked and some retard is on his account making an ass of him 23:25:25 @ofrnxmr:xmr.mx: I wonder what brought you to this conclusion 23:25:48 He ran spynodes and performed other notable network attacks 23:26:10 And iiuc, created his own blockchain (ryo) 23:27:21 I didn't know about the spy node thing 23:27:24 interesting 23:27:56 vaguely remember Ryo 23:28:07 yeah, he modified monero code and ran hundreds or thousands of sybils for years 23:29:45 possible that he was even the one who added the high fee bug 23:30:19 Script kiddy lvlĀ attacks, but still better than the garbage that supertesticle puts out 23:31:21 supertestnet has got to be memeing 23:31:28 "is this your card" type stuff 23:39:13 @intr:unredacted.org: He did a twitter space with bawdy iirc. I think hes genuinely just slow 23:41:49 @ofrnxmr:xmr.mx: added? 23:41:59 he made a pr that deliberately introduced that? 23:44:19 No, monero has a dumb feature that fwds your rpc requests to a random node 23:44:27 Nodes tell wallets what the fee lvl is 23:45:16 Malicious nodes were telling wallets that the fee was hundreds of times larger than normal 23:45:55 https://github.com/monero-project/monero/issues/8134 23:46:22 this was the 3.x xmr tx fee 😬 23:47:04 Recording? > <@ofrnxmr:xmr.mx> He did a twitter space with bawdy iirc. I think hes genuinely just slow 23:48:09 Not sure 23:48:18 ofrnxmr: seriously? regardless of how high it is? 23:48:40 @plowsof:matrix.org: Happemed more than once 23:48:42 i'd expect the wallet to have a sanity check where it refuses to make a TX once the fee is too high 23:48:51 like 0.1 XMR 23:48:54 or 0.2 23:48:57 I recall there was one when the pool was able to refund it 23:49:47 Can be infinitely high > ofrnxmr: seriously? regardless of how high it is? 23:50:06 number one philosophy is take whatever the server gives you with salt 23:50:15 Ofc, youre not going to succeed if the persons balance cant cover the fee 23:50:25 i would have definitely put a sanity check limit on the fee 23:50:29 And the asshole node doesnt get the $, since it goes to miners 23:50:44 like if it went above 0.1 XMR, just go to another node 23:50:48 or less than that 23:51:23 3.x xmr fee is insane 23:51:31 that's like thousands of dollars in fees 23:51:54 the client should crap out if it's even 5 dollars in fees 23:52:11 Its thusands now 23:52:19 It was like 600 at the time 23:53:40 "And the asshole node doesnt get the $, since it goes to miners" 23:53:47 so he just did it to troll monero users 23:54:08 he doesn't get any profit from it, he just lies about the fees to clients and watch them pay literal XMRs in fees 23:54:09 Exactly 23:54:26 Something FUK would do 23:54:41 does monero cap the fee amount? 23:54:45 or mitigate this in any way now? 23:54:49 No 23:54:50 (the official monero wallet) 23:54:57 no? 23:54:57 You can pay any amount you want 23:55:11 no i meant if it gets a very large fee from a RPC 23:55:14 Some wallets, like gui, warn you > or mitigate this in any way now? 23:55:17 not by user choice 23:55:27 there is a big warning 23:56:12 https://github.com/monero-project/monero-gui/pull/3897 23:57:31 i wonder if alternative monero clients even bother with this 23:57:44 like cake wallet or feather 23:59:03 I think they did, but you only have to worry about it if using a node that is configured for bootstrap-daemon=auto 23:59:18 And no-sync=true