-
smooth
don't be evil vs can't be evil
-
UkoeHB_
I think the priority of many implementers is complying with the protocol. Rather than fingerprinting on purpose, it's just a matter of putting something together that works. If 'what works' reduces the possibilities to fingerprint, that's progress in my book. Fingerprinting should be a very intentional process, instead of the default.
-
moneromooo
Maybe I'm missing something here, but it should work out of the box. If they added some custom data, it's because they actually worked to do it.
-
smooth
there is some possibility of some custom data that might not be fingerprintable
-
smooth
so in that sense i would tend to agree that making it easy to avoid unnecessary fingerprinting could be helpful
-
smooth
in a lot of cases, though, extra data is going to be a fingerprint period, and making it easi to include on chain is inviting it
-
moneromooo
Yes, but that would be taken care of by making the format that but not enforcing it.
-
smooth
i dont really know how you do that besides enforcing
-
moneromooo
Prevent fingerprinting ? Remove extra I guess. Put tx keys and other things we need in strict fields.
-
smooth
isn't it the same as sorting keys. if everyone just did it, you wouldn't have to enforce, but demonstrated that some wont, not for any particular reason
-
moneromooo
I think it's not the same: that's something you have to have. People don't have to have custom extra data, and yet some added it.
-
smooth
sorting vs. not sorting is the same imo
-
moneromooo
That fingerprints in itsel, whether in a format or another.
-
smooth
the point being that it is easy to sort, but you can't really get people to sort without enforving
-
smooth
enforcing is basically how you coordinate
-
moneromooo
I get that. But if you enforce a particular framing for extra, the custom data is still there, that framing format did not get rid of the fingerprint, whereas enforcing sorting did.
-
smooth
some custom data is not going to be a fingerprint
-
smooth
but it could unnecessarily become one due to custom framing
-
moneromooo
I either do not agree or do not understand your point.
-
UkoeHB_
The main point for me is that NON-custom data will no longer be fingerprintable
-
smooth
is it now?
-
UkoeHB_
Yes, the sorting vs nonsorting distinction for normal tx, and the random implementation of extra nonce for pools (which I consider non-custom since all pools use the extra nonce).
-
smooth
moneromooo: lets say the custom data is an encrypted message. there is nothing fingerprintable about that, it is just random data
-
moneromooo
The fact that your tx includes this field is the fingerprint.
-
smooth
it could be, depends how widely used
-
moneromooo
Then a bettr thing to do it add a "custom data encrypted with the receiver key" field, whether or not the framing changes.
-
smooth
i think you are basically saying get rid of tx extra
-
moneromooo
So all people who want to include an opaque blob can use that (though there is still a question of message length).
-
sarang
This is essentially the Zcash "encrypted memo"
-
sarang
which is a fixed 512-byte blob that's required
-
smooth
if the max is short enough you could make it fixed length
-
smooth
pretty much what we do with payment id
-
moneromooo
I was planning on quantizing to mutliple of N bytes.
-
sarang
that's still "anonymity puddles" in Isthmus's language
-
smooth
you want every multiple of N to be either widely used or not at all
-
moneromooo
Yes, but it's better, and there's no perfect here.
-
smooth
so that pretty much means a small cap in practice, maybe not N*1 but N*some small integer
-
moneromooo
True. Then maybe well known sizes, like 0, 32, 256, 4096.
-
moneromooo
(examples)
-
moneromooo
512 bytes per tx seems a bit heavy. It does away with the puddles though, so it's tempting.
-
smooth
thats plausible
-
sarang
This would be in addition to separating out key fields?
-
sarang
so truly arbitrary data?
-
smooth
might get rid of 0
-
moneromooo
In my mind, it'd be a new extra field, yes. Independent of any others.
-
sarang
I think that's a much better idea
-
sarang
still not enforceable to be actually encrypted, of course
-
moneromooo
<joke>You could make the fee inversely proportional to the exponential of its entropy</joke>
-
smooth
im not really sure how we got to this point. the earlier discussion was about reducing fingerprinting, and we just added another one, although hopefully done in a way that minimizes the fingerprint. but it is still one
-
UkoeHB_
*confused as well*
-
sarang
Well, either there's room for some kind of arbitrary-ish data, or there isn't
-
UkoeHB_
moneromooo: would you mind adding your proposal to the git issue on this topic?
-
moneromooo
I think there is one already. Old.
-
moneromooo
But as smooth said it's really a different thing.
-
UkoeHB_
Can you add a reference/link? It seems like a counter proposal
-
sarang
Is the underlying question whether having _any_ allowances for arbitrary data is a good idea?
-
sarang
(beyond required fields and pID)
-
UkoeHB_
It's more about the scope of the protocol
-
moneromooo
It is certainly related. I've always been in favour of allowing it, but we've not seen any stupendous use so far, and the ones I've seen are more spam than innovative :(
-
moneromooo
So I'm slowly losing my support for it I think.
-
sarang
Nixing arbitrary extra in favor of fixed fields makes me happy from a protocol perspective, but who knows what applciations would break
-
UkoeHB_
I think killing the extra field presupposes indefinite hard forks, which is an unrealistic assumption
-
smooth
i dont think thats the case
-
moneromooo
Doesn't seem to be an issue about it, I only found
monero-project/monero #1518 which is related but not that.
-
moneromooo
Or "Extra" did not grep it anyway.
-
UkoeHB_
Well if improvements to the protocol slow down, which is reasonable as there are diminishing returns, then hard forks will become more spread out. As adoption rises, coordinating those hard forks will also become harder. At some point they will probably become infeasible for anything except groundbreaking improvements.
-
sarang
They are also useful for client software upgrades
-
sarang
Protocol requirements are a good incentive to upgrade your software :)
-
UkoeHB_
How much adoption can be sustained by the core team? I feel like either Monero will grow beyond the primary implementation, at which point questions of 'default configuration' for non-protocol features like the extra field will be out of control (I agree with moneromooo that if implementers just take what core team ships, then fingerprinting is caused by 'messing with it'; of course, this falls apart if a project
-
UkoeHB_
tries to maintain itself without constantly rebasing, for example I'm guessing the existence of non-sorting extra fields is an implementation that forked BEFORE the core implementation started sorting, and they just didn't realize the field should be sorted now [a plausible explanation, other teams can't be expected to keep up with everything the core team does]), or the dominance of that implementation will lead to
-
UkoeHB_
an upper limit on infrastructure growth.
-
UkoeHB_
My proposal is especially to prepare for a future where core team has less influence. Now is the time to tie down loose ends.
-
Insight
Question, I want to make a test that makes it where connecting nodes reject blocks that do not accept the full block reward. Do i have to change the block template?
-
Insight
or do i have the change the base_reward in the cryptonote_basic_impl file?
-
kayront
getmonero.org/resources/developer-g…pc.html#set_account_tag_description says both inputs for describe_transfer are optional, but calling it without without params: {:error {:code -1 :message "no txset provided"} :id 0 :jsonrpc "2.0"}
-
kayront
so I was thinking earlier today, in custodial[-like] cases where a site has multiple users and ultimately each user is assigned its own wallet on the server (and get their address books, accounts, etc as a result), wouldn't it make sense to add 2FA support to the api? this way monero-wallet-rpc would work as a last line of defense by refusing to make transfers without being presented with a valid auth token. it would be completely optional
-
Insight
would it be opt in or opt out in terms of being optional
-
rbrunner
My testnet node is now running vtnerd 's Dandelion++ code - see
monero-project/monero #6314
-
rbrunner
I just don't know how much sense that makes, given the current very, very small size of testnet: My daemon is currently connected to only 4 other nodes
-
rbrunner
And how can I watch whether Dandelion++ does or does not do its magic? A quick glance over the code did not show me a new log category that would give info
-
rbrunner
Normal, "downward-compatible" tx propagation seems to work, at least did for a test tx between two of my own daemons
-
kayront
Insight: as I imagine it, opt in
-
kayront
just throwing the idea out there, i don't have the c++ skills to make it happen. if someone finds the idea interesting, that'd be a good addition imo