-
br-m
<just_another_day:matrix.org> If you care about the FUD, I'd recommend to at least read my original post that started it. Because AI slop posts followed and usual Reddit plebs can have many misconceptions, but to effectively fight the FUD/to resolve the concerns (choose what you like more) one has to understand the core issue. It's not misconceptions alone [... too long, see
mrelay.p2pool.observer/e/6tm33eAKb25wWEFs ]
-
br-m
-
br-m
<just_another_day:matrix.org> You can also read my comments if you want - there are a bit more additional thoughts.
-
br-m
<ofrnxmr:xmr.mx> Who are you talking to
-
br-m
<just_another_day:matrix.org> whoever
-
br-m
<just_another_day:matrix.org> MRL members, as they'll discuss it tomorrow
-
DataHoarder
There was already some discussion in #monero-research-lounge if you want to take a look - specially around misconceptions
-
DataHoarder
(also I used bad nomenclature in some of the explanations myself - but they were equivalent)
-
br-m
<ity:itycodes.org> I should read XMR's crypto, the above convo about crypto seemed fun
-
br-m
<ity:itycodes.org> I always put it away assuming I'm too stupid for it
-
br-m
<just_another_day:matrix.org> DataHoarder: Thank you. I'll check this out
-
DataHoarder
as usual, Zero to Monero 2.0
getmonero.org/library/Zero-to-Monero-2-0-0.pdf for pre-FCMP++ stuff
-
DataHoarder
there's no update for FCMP++ but it changes quite some underlying (no more rings, so statistical analysis based on rings or outputs cannot be done)
-
br-m
<just_another_day:matrix.org> DataHoarder: I've read it partially
-
br-m
<ity:itycodes.org> FCMP++?
-
DataHoarder
I mean for ity
-
DataHoarder
yes, the part of the next monero upgrade that between others replaces ring with decoys for full chain membership proofs
-
DataHoarder
tl;dr the entire chain is your decoys instead of 15+1 sampled outputs
-
DataHoarder
-
br-m
<ity:itycodes.org> For context, my cryptography background is mostly working on chat protocols (mostly Matrix, the E2EE and trying to fix a bunch of the core protocol vulns)
-
DataHoarder
though some parts listed here are not FCMP++ intrinsic but due to upgrades elsewhere (the carrot tx output format, for legacy and any new wallet) and also the new Carrot wallet that has generate image keys and OVK, which is what people are discussing
-
DataHoarder
(though the wallet part is not a hardfork item per se)
-
DataHoarder
yeah Zero to Monero is good for you then
-
DataHoarder
it lists what it does instead of assuming you know what that means in ed25519 or similar
-
br-m
<just_another_day:matrix.org> what was confusing to me when I was reading zero-to-monero is that it doesn't provide proofs of schemes being secure. It only illustrates their correctness
-
br-m
<ity:itycodes.org> Yai, I shall try to read it, it's quite long so I hope I can get it past my ADHD
-
DataHoarder
yeah, the proofs are in external papers
-
DataHoarder
Zero to monero is an explanation, the proofs ... are vastly longer
-
br-m
<just_another_day:matrix.org> you can't do crypto without the proof, right?
-
DataHoarder
but again, zero to monero is an explainer
-
DataHoarder
the proofs for example for bulletproof+ is way longer and theoretical
-
DataHoarder
one secx
-
br-m
<ity:itycodes.org> Ya ECC stuff I'm decently well familiar with > <DataHoarder> it lists what it does instead of assuming you know what that means in ed25519 or similar
-
DataHoarder
-
DataHoarder
which builds on the original Bulletproofs paper
eprint.iacr.org/2017/1066.pdf
-
br-m
<ity:itycodes.org> I'm mostly used to reading specs
-
DataHoarder
MRL gathers related papers in the library
moneroresearch.info
-
br-m
<ity:itycodes.org> Tho, well-written specs (like Signal), not horribly written abominations (like Matrix's Olm & Megolm)
-
DataHoarder
not all directly tie to monero but they are kept for research
-
DataHoarder
yeah... monero has a log of baggage from cryptonote original
-
DataHoarder
lot*
-
br-m
<ity:itycodes.org> Cryptonote?
-
DataHoarder
-
DataHoarder
-
DataHoarder
-
DataHoarder
much has changed from this ^ anyhow
-
br-m
<just_another_day:matrix.org> DataHoarder: a nice paper
-
br-m
<just_another_day:matrix.org> @just_another_day:matrix.org: is this true?
-
br-m
<just_another_day:matrix.org> how do you know what you're doing makes sense if you don't do proofs?
-
DataHoarder
you can't invent arbitrary stuff by feels
-
DataHoarder
it is proven and audited
-
DataHoarder
but again, your question was on "zero to monero doesn't have proofs" cause it's an explainer. the external in-depth papers have the proofs, but you may need to be in certain fields of mathematics to look at them in depth
-
br-m
<just_another_day:matrix.org> i'm ok with zero to monero not having proofs. I understand that's an explainer
-
DataHoarder
-
br-m
<ity:itycodes.org> Ahh > <DataHoarder> yeah. it's what Monero comes from
getmonero.org/resources/research-lab/pubs/cryptonote-whitepaper.pdf
-
br-m
<ity:itycodes.org> DataHoarder: Which specific fields ?
-
br-m
<ity:itycodes.org> (I'm curious if I'll be able to follow them or not due to mostly doing abstract algebra)
-
DataHoarder
some of the ring signatures extend well across iterations from original
-
DataHoarder
(I implemented them as well in go)
-
DataHoarder
bulletproofs are quite far away from any of the knowledge, I have to gain more bases first
-
DataHoarder
I know and understand what they do and the way they get to do it but ... yeah no the proofs end up too far
-
br-m
<just_another_day:matrix.org> I was just curious about how MRL designs cryptography for Monero. I have the idea that you adapt existing research. Do you write proofs by yourself? If not, how do you know the design makes sense? Just because of a general understanding how a proof would look like?
-
DataHoarder
I don't write proofs, it's not YOLO lol
-
DataHoarder
MRL doesn't always write the research, either. there's a wider cryptography field than monero
-
br-m
<ity:itycodes.org> Haha yolo proofs
-
br-m
<just_another_day:matrix.org> so vibe designing?
-
br-m
<ity:itycodes.org> Huh?
-
DataHoarder
I can't get to you can I
-
DataHoarder
again, literally open the paper
-
DataHoarder
Bulletproofs paper for example is written mixed
irc.gammaspectra.live/81af2584a22f151f/image.png method -> theorem -> proof writing
-
DataHoarder
proving that each part holds true along the way
-
DataHoarder
Many build up on previous papers with proofs on theorems they use
-
br-m
<just_another_day:matrix.org> you don't have to explain this
-
br-m
<just_another_day:matrix.org> i was asking about Monero-specific cryptography
-
DataHoarder
> Corollary 2 (Range Proof). The range proof presented in Section 4.1 has perfect completeness, perfect special honest verifier zero-knowledge, and computational witness extended emulation.
-
DataHoarder
> Proof. The range proof is a special case of the aggregated range proof from section 4.3 with m “ 1. This is therefore a direct corollary of Theorem 3.
-
DataHoarder
Monero specific cryptography is no different
-
DataHoarder
it's applied cryptography, usually around edwards25519 curve
-
DataHoarder
one of the elliptic curves of all time
-
br-m
<just_another_day:matrix.org> what's applied cryptography?
-
DataHoarder
some people don't have the urge to seek knowledge on their own
-
DataHoarder
Bulletproofs for example is a general ZK proof that extends range proofs to general circuits
-
br-m
-
br-m
<ity:itycodes.org> Yep I'm also missing background knowledge for this x3
-
br-m
<ity:itycodes.org> Tho not as much as I would expect
-
DataHoarder
Monero then set them up specifically just for range proofs in the context of ed25519 and its field
-
DataHoarder
ity: recommendation is to start with ring signatures as originally done in monero/cryptonote
-
DataHoarder
then go from there
-
DataHoarder
to MLSAG then CLSAG
-
DataHoarder
-
br-m
<ity:itycodes.org> Yea first time hearing of ring signatures and now I wanna look into them more
-
br-m
<ity:itycodes.org> And seeing if I can use that to fix some holes in some of the chat protocols I designed
-
br-m
<ity:itycodes.org> My first reaction when googling it was "oh yes more cryptography magic"
-
DataHoarder
03:32:50 <br-m> <just_another_day:matrix.org> what's applied cryptography?
-
DataHoarder
applied X is the practical implementation of algorithms or protocols related to X
-
DataHoarder
theoretical cryptography -> applied cryptography (where specifics or interaction with existing systems, and transfer to pseudocode-looking or mathematical formulation that can be used to write code with)
-
br-m
<ity:itycodes.org> @ity:itycodes.org: In fact it already partially fixes the deniability issue I had with the way I was fixing the homeserver puppeting room takeover vuln of matrix
-
br-m
<ity:itycodes.org> Stars I got nerdsniped into designing a thing just by hearing of a cool new crypto primitive
-
br-m
<ity:itycodes.org> Tho ig that's too offtopic, sorry
-
br-m
<ity:itycodes.org> The introduction is actually comprehensible for me unlike the abstract, I like it > <@ity:itycodes.org> >
eprint.iacr.org/2019/654
-
br-m
<just_another_day:matrix.org> Am I correct that when you design a Monero-specific cryptographic scheme, you take an existing theoretical cryptographic scheme, adapt it to Monero in a way that "feels right" and conduct an external audit to make sure it's secure?
-
br-m
<just_another_day:matrix.org> It's not an offensive question, I'm just curious
-
DataHoarder
in a way that "feels right"
-
DataHoarder
no
-
DataHoarder
you adapt it in a way that complies with the proof conditions mathematically
-
br-m
<just_another_day:matrix.org> then how?
-
DataHoarder
it's a proof, with set expectations/ranges/preconditions
-
DataHoarder
what do you mean HOW?
-
br-m
<just_another_day:matrix.org> I see
-
DataHoarder
if you understand the mathematics you can prove that the applied construction is equivalent to the proof
-
br-m
<just_another_day:matrix.org> What about CLSAG?
-
br-m
<just_another_day:matrix.org> It was created by MRL, wasn't it?
-
br-m
<ity:itycodes.org> DataHoarder: In theory
-
DataHoarder
-
DataHoarder
-
br-m
<ity:itycodes.org> DataHoarder: Nooooooo cries
-
br-m
<ity:itycodes.org> (This is basically my direct field of study)
-
br-m
<ity:itycodes.org> I work on proof assistants mostly
-
br-m
<just_another_day:matrix.org> DataHoarder: so MRL is writing proofs after all
-
DataHoarder
It walks through the theorems and lemmas, and proves them directly or by referencing previous work
-
DataHoarder
you are again misunderstanding how stuff works
-
DataHoarder
it's not A -> B
-
DataHoarder
but B -> A from the underlying proofs you can build A
-
br-m
<just_another_day:matrix.org> I didn't say it's A -> B
-
br-m
<just_another_day:matrix.org> sorry I said you meaning Monero devs, not yourself DataHoarder > <@just_another_day:matrix.org> I was just curious about how MRL designs cryptography for Monero. I have the idea that you adapt existing research. Do you write proofs by yourself? If not, how do you know the design makes sense? Just because of a general understanding how a proof would look like?
-
DataHoarder
this is a wider field so I have no idea what resources to even point you to, anyhow
en.wikipedia.org/wiki/Mathematical_proof
-
br-m
<just_another_day:matrix.org> I know what a proof is
-
DataHoarder
then see how you achieve these for your theorems there
-
DataHoarder
I'm not even that far down the line (compared to ity working on proof assistants) but there's a missing piece you seem to lack here, just_another_day, given you ask "how do you prove something"
-
br-m
<just_another_day:matrix.org> that's funny
-
br-m
<just_another_day:matrix.org> I was asking about how MRL designs cryptographic schemes, because I thought they do that without writing proofs
-
br-m
<just_another_day:matrix.org> If they do write proofs, I don't any questions
-
br-m
<just_another_day:matrix.org> Proofs for Monero-specific schemes, that is
-
DataHoarder
the obvious answer is by knowing far more than me on the specific field of cryptography and mathematics 😅
-
DataHoarder
Monero-specific schemes are not that far from general elliptic curve, just the focus
-
DataHoarder
-
DataHoarder
I choked at the classic ECB one
-
DataHoarder
Proof: [image of tux encrypted using ECB mode of operation]
-
DataHoarder
also when searching, a cryptographic proof or cryptographic proving it means using cryptography algorithms or methods to prove something not the mathematical proof of the algorithm :)
-
br-m
<just_another_day:matrix.org> do you write proofs for cryptographic proofs? :)
-
br-m
<just_another_day:matrix.org> DataHoarder: that's a good one
-
br-m
<just_another_day:matrix.org> the tux
-
br-m
<kayabanerve:matrix.org> DataHoarder: There's the FCMP++ technical overview.
-
br-m
<kayabanerve:matrix.org> (for after ZtM)
-
DataHoarder
it's a moving target still given changes on tx output derivations for example :)
-
DataHoarder
but yeah, I guess it'll get more defined as things freeze
-
br-m
<kayabanerve:matrix.org> Monero, generally, has looked for proofs which meet a desired statement. See the usage of Bulletproofs' range proof within Monero's RingCT, and evolution to Bulletproofs+.
-
br-m
<kayabanerve:matrix.org> With FCMP++, we proved the proof system underlying Curve Trees (Generalized Bulletproofs) secure, and did adapt the arithmetic circuit to the statement defined in the FCMP++ composition.
-
br-m
<kayabanerve:matrix.org> The FCMP++ composition was reviewed and proven secure, along with its SA+L proof.
-
DataHoarder
^ listen up just_another_day from the source themselves
-
br-m
<kayabanerve:matrix.org> The SA+L proof was something I designed and put forth, concatenating a BP+ IPA (n=1) with a GSP, both existing proofs to a statement. Their concatenation achieved the statement necessary within the composition, and again, reviewed and proven secure.
-
br-m
<kayabanerve:matrix.org> CLSAG was in-house. I believe Borromean was posited as a range proof. I can't comment on MLSAG. I know there's a paper for RingCT, which I think MLSAG may have been part of?
-
br-m
<kayabanerve:matrix.org> And then all protocol-level cryptography before then was CryptoNote.
-
DataHoarder
yes, it was part of RingCT paper
-
br-m
<kayabanerve:matrix.org> So Monero's modus operandi wasn't really part of that, other than the modus operandi being to start by forming CN.
-
DataHoarder
and RingCT applied Pedersen commitments + MLSAG to build what we had
-
br-m
<kayabanerve:matrix.org> While Monero cryptography may be messy and disorganized due to the amount of contributors of various backgrounds, I wouldn't present leading questions (or questions which come off as leading questions) which imply it may be insufficiently reviewed before deployment.
-
br-m
<just_another_day:matrix.org> I know that Monero does audits
-
br-m
<just_another_day:matrix.org> So I wasn't implying that
-
br-m
<kayabanerve:matrix.org> You said your question wasn't meant to be offensive, but it still asked if development was vibes-based before an external audit.
-
br-m
<kayabanerve:matrix.org> I would say no, research is research and review occurs until satisfactory.
-
br-m
<just_another_day:matrix.org> If I recall correctly, your proposal for FCMP++ was initially without proofs?
-
br-m
<kayabanerve:matrix.org> This is the part on accusing of seeming leading.
-
br-m
<kayabanerve:matrix.org> *I'm accusing
-
br-m
<just_another_day:matrix.org> Leading for what?
-
br-m
<kayabanerve:matrix.org> DataHoarder[m]: What's the term I'm looking for?
-
br-m
<just_another_day:matrix.org> You're being paranoid
-
br-m
<kayabanerve:matrix.org> Re: social behavior where one tries to appear honest and helpful while actually being antagonistic.
-
nioc
<just_another_day:matrix.org> so vibe designing? <<>> hmmm
-
DataHoarder[m]
@kayabanerve:matrix.org: idk, it's late and I think there is a disconnect in how the conversation goes with thankful_for_xmr given previous days
-
br-m
<kayabanerve:matrix.org> Eh, @just_another_day:matrix.org: you could just be rubbing me the wrong way, but you seem to present yourself in good faith while not acting in good faith.
-
br-m
<kayabanerve:matrix.org> Yes, my research and proposal for FCMP++ was without proofs. I am not someone who has written a security proof.
-
br-m
<kayabanerve:matrix.org> The FCMP++ paper lacks proofs directly to this day.
-
br-m
<kayabanerve:matrix.org> The proposal was always intended to have review and security proofs however, which we've done extensive work on.
-
DataHoarder[m]
it takes several messages to get the point across if you see previous conversation here a couple days ago
-
br-m
<kayabanerve:matrix.org> The proposal also derived from Curve Trees, BP+, and GSP. All three were prior art, the latter two proven. FCMP++ was solely their intelligent composition, though it did modify the arithmetic circuit.
-
br-m
<kayabanerve:matrix.org> Aaron Feickert, who worked at Cypher Stack, a company described as being created to offer employment on paper to Monero researchers, proved the composition secure and the BP+ + GSP composition as satisfying the SA+L statement.
-
br-m
<kayabanerve:matrix.org> Feickert and Goodell have both worked on the underlying Generalized Bulletproots, Goodell currently at Cypher Stack.
-
br-m
<kayabanerve:matrix.org> The optimization with divisors had extensive review from Cypher Stack and Veridise.
-
br-m
<kayabanerve:matrix.org> Feickert audited the current GBP implementation. Veridise reviewed the circuit and audited its impl on top of the audited GBP lib. They also provided a variety of formal proofs.
-
br-m
<kayabanerve:matrix.org> Sealioning?
en.wikipedia.org/wiki/Sealioning
-
nioc
just read the MRL meeting logs for the past year or more and you will understand how the process works
-
nioc
no idea why you think things are done unseriously
-
br-m
<kayabanerve:matrix.org> @just_another_day:matrix.org: I don't actually want to be a dick to you for no reason. Your questions come off, to me personally at least, as in bad faith.
-
DataHoarder
that may be too far kayabanerve I think there's a better term
-
br-m
<kayabanerve:matrix.org> If you are trying to act in good faith, I'd recommend revisiting how you phrase your questions. You don't have to, you do you, but as of right now, to me personally, it comes off as antagonistic which isn't optimal for a civil discussion.
-
br-m
<just_another_day:matrix.org> you have a ground to think this way given my activity on Reddit
-
br-m
<kayabanerve:matrix.org> Yeah, I'm trying to caveat this as it could just be me, and I'm sorry if so, but also, I'm tired in _general_ of people who claim to be in good faith and just want to cause trouble.
-
br-m
<kayabanerve:matrix.org> There was an asshole a month ago who took every opportunity possible to praise me while also turning people away from me.
-
br-m
<kayabanerve:matrix.org> "Kayaba works on so many things, it's incredible! That's why we should be patient and wait, because they're so busy, it may be a while. In the mean time, check out X"
-
br-m
<kayabanerve:matrix.org> Then I banned that guy and a few days later my server was raided with Naziism and absolute bs.
-
br-m
<kayabanerve:matrix.org> So my personal issues with an individual from about a month ago, the recent OVK drama (which we can just be on opposite side of the coins of), _and_ these questions seeming to suggest Monero is vibe-based is why I'm being so critical here.
-
br-m
<just_another_day:matrix.org> I mean, my question is pretty neutral > <@just_another_day:matrix.org> I was just curious about how MRL designs cryptography for Monero. I have the idea that you adapt existing research. Do you write proofs by yourself? If not, how do you know the design makes sense? Just because of a general understanding how a proof would look like?
-
DataHoarder
^ in my opinion the answered with an example above
-
br-m
<kayabanerve:matrix.org> That wasn't the one I minded
-
DataHoarder
they*
-
br-m
<kayabanerve:matrix.org> And again, I'm sorry if I am just being unfairly critical of you.
-
br-m
<just_another_day:matrix.org> I misunderstood DataHoarder's response
-
br-m
<just_another_day:matrix.org> I thought he said that MRL doesn't always write proofs for their schemes
-
br-m
<kayabanerve:matrix.org>
github.com/monero-oxide/monero-oxide/tree/fcmp++/audits is my own collection of documentation regarding FCMP++
-
br-m
<kayabanerve:matrix.org> Well, it's the monero-oxide FCMP++ audits folder, so it's the monero-oxide stuff + all the FCMP++ supporting evidence.
-
DataHoarder
I said they don't have to, as they take existing pieces just_another_day
-
DataHoarder
like, you aren't proving ECDLP
-
DataHoarder
ed25519 itself
-
DataHoarder
Bulletproofs, was developed externally afaik
-
br-m
<just_another_day:matrix.org> I mean, even such a big project as Telegram released MtProto without a formal mathematical proof of security, as they mainly combined existing stuff
-
br-m
<just_another_day:matrix.org> So I wasn't implying it's always bad
-
br-m
<just_another_day:matrix.org> Just curious
-
DataHoarder
04:04:34 <br-m> <kayabanerve:matrix.org> The FCMP++ composition was reviewed and proven secure, along with its SA+L proof.
-
DataHoarder
Telegram composed proven parts but the composition itself was/is flawed
-
DataHoarder
this whole conversation started from this > 03:09:36 <br-m> <just_another_day:matrix.org> what was confusing to me when I was reading zero-to-monero is that it doesn't provide proofs of schemes being secure. It only illustrates their correctness
-
DataHoarder
to this > 03:18:31 <br-m> <just_another_day:matrix.org> i'm ok with zero to monero not having proofs. I understand that's an explainer
-
br-m
<just_another_day:matrix.org> it was confusing to me because I wanted to learn the cryptography in depth
-
br-m
<kayabanerve:matrix.org> Though granted, my scope only intends to supplant CLSAG as seen in Monero. I even define an statement I say is analogous to the current role of CLSAG for which I say the FCMP++/ composition achieves via its two decomposed parts.
-
br-m
<kayabanerve:matrix.org> For Monero as a whole, I believe there was an external researcher (PhD track?) who reviewed Monero as a whole.
-
br-m
<kayabanerve:matrix.org> And then of course, there's also the considerations about the addressing protocol (CARROT soon™) and so on.
-
DataHoarder
JAMTIS soon™
-
br-m
<just_another_day:matrix.org> you're assuming everything I say is somehow intended to criticize Monero
-
br-m
<kayabanerve:matrix.org> JAMTIS would be quite the discussion...
-
br-m
<just_another_day:matrix.org> when I really wanted to learn how the serious crypto™ is done
-
br-m
<kayabanerve:matrix.org> @just_another_day:matrix.org: I'm not currently. I tried to answer your question before despite my frustration, and I've continued to comment on the topic since.
-
br-m
<kayabanerve:matrix.org> I don't plan to hold it against you. I had a frustration due to my _perception_ of you and I raised it. I also apologized if it was on my end.
-
br-m
<kayabanerve:matrix.org> I can iterate the exact messages that irked me or we can get back to the topic.
-
br-m
<just_another_day:matrix.org> @kayabanerve:matrix.org: thank you for the explanation. I'm not that proficient in cryptography to understand the specifics.
-
br-m
-
br-m
<sbt:nope.chat> That fucking retard doesn't even understand what is timing correlation, glad we got fluffy
-
br-m
-
DataHoarder
I can't believe they got fluffy to answer on twitter multiple times but also get so annoyed moved to also answer on reddit
-
DataHoarder
> I don't understand why you're being so needlessly hostile
-
DataHoarder
yeah kayabanerve now this is sealioning
-
br-m
<kayabanerve:matrix.org> if this is sealioning, why aren't there cute sealions I can pet? >:(
-
br-m
<zero-ghost> any of the people running the monero.social matrix instance in here?
-
br-m
<zero-ghost> or is there a specific room to contact them?
-
DataHoarder
what are you trying to contact about?
-
br-m
<zero-ghost> im trying to get my contacts to spread out across different homeservers and wondering if there is any way to get a registration for one or two of them on this homeserver
-
br-m
<zero-ghost> right now everyone is on matrix.org, we all know thats not great
-
DataHoarder
registrations are generally closed due to spam
-
br-m
<zero-ghost> yea ive seen that the past few months of checking every now and then
-
br-m
<zero-ghost> so i wanted to see if any of them were around in person and ask
-
DataHoarder
it may be possible, you can try in #monero-community or dm pigeons on IRC side
-
DataHoarder
(I am on IRC!)
-
DataHoarder
which you can also ask friends to do
-
DataHoarder
that gets them directly with puppets on the monero.social side
-
br-m
<zero-ghost> hmm yea, but they are low/zero-tech people
-
br-m
<zero-ghost> so having to worry about an IRC account and where its bridged etc etc
-
br-m
<zero-ghost> and that room looks invite only
-
DataHoarder
maybe it was made like that after (again spam) incidents, maybe plowsof can shed some light. but it's reachable on IRC side
-
br-m
<zero-ghost> mustve been
-
plowsof
community was invite only, made it public just now. monero social registration is disabled but accounts can/have been manually approved since
-
br-m
<intr:unredacted.org> @kayabanerve:matrix.org: sealion -> sealioff
-
br-m
<zero-ghost> plowsof: thats all good to hear, we are in no rush so I'll probably come back around in the next month or so and see if theres any manual approval up for grabs 👍️
-
br-m
-
br-m
<pyratevevo:matrix.org> Based on true events.
-
br-m
<intr:unredacted.org> is that your address? lmao
-
br-m
<ofrnxmr:xmr.mx> Lol @datahoarder ^ > <@kayabanerve:matrix.org> Yeah, I'm trying to caveat this as it could just be me, and I'm sorry if so, but also, I'm tired in _general_ of people who claim to be in good faith and just want to cause trouble.
-
br-m
<pyratevevo:matrix.org> @intr:unredacted.org: You bet.
-
br-m
<pyratevevo:matrix.org> Wanted to hide the shotgun, but didn't know what to cover it with.
-
br-m
<intr:unredacted.org> lmao
-
br-m
<intr:unredacted.org> you hid the gun behind 16 potential guns
-
br-m
<pyratevevo:matrix.org> Soon to be 100 million !
-
br-m
<intr:unredacted.org> full metal jacket proofs
-
nioc
"when I really wanted to learn how the serious crypto™ is done" followed by "I'm not that proficient in cryptography to understand the specifics."
-
nioc
hmmmmm
-
br-m
<just_another_day:matrix.org> There can be a general overview of the process instead of specific details. But never mind
-
nioc
sorry maybe I am a bit tired after many days of this
-
br-m
<rucknium> > <@kayabanerve:matrix.org> Though granted, my scope only intends to supplant CLSAG as seen in Monero. I even define an statement I say is analogous to the current role of CLSAG for which I say the FCMP++/ composition achieves via its two decomposed parts.
-
br-m
<rucknium> Probably you mean this as "reviewed Monero as a whole":
moneroresearch.info/171 Cremers, C., Loss, J., & Wagner, B. (2023). A Holistic Security Analysis of Monero Transactions.
-
nioc
but I must say much learning has come from conversations like this whether genuine interest or from other motives because often much info comes out
-
br-m
<everchange000:matrix.org> Aren't we all tired?
-
br-m
<everchange000:matrix.org> Let's take a nap, rejuvinate our sense of Justice and get to work! 🤜🤛
-
nioc
thx DH
-
DataHoarder
fud never sleeps
-
DataHoarder
MRL meeting is in progress right now
monero-project/meta #1333 and the Carrot and OVK topic will be discussed at the end, feel free to observe @ #monero-research-lab and on
libera.monerologs.net/monero-research-lab (it's a research focused channel, so direct questions or other items are better left for lounge or
-
DataHoarder
general monero channels)
-
DataHoarder
Meeting logs are provided afterwards on the github issue.