04:18:49 17:01 selsta can we throw in #7260 <-- will include it in next release 07:43:27 bevanoff: I saw you mentioning here yesterday that you might start an attempt to implement multisig in the GUI wallet. I was the one implementing the thing named "MMS" in the CLI wallet, so I know a thing or two about multisig :) 07:43:38 If interested I am available for chat about your project. 12:16:07 Hello 12:16:32 .merge+ 7260 7295 12:16:32 Added 12:17:34 .merge+ 7245 12:17:34 ... 12:17:37 Hello 12:36:11 FUK has bееn intеnsеly hostilе to Monеro for ovеr 4 yеars. Making minеrs for Monеro, making a pool for Monеro, making codе that Monеro copiеd, not using bugs to stеal millions from еxchangеs. Wow. Such grеat hostility. 12:57:03 selsta great tyvm 13:04:05 anyone else having issues with Tor tx-proxy? 13:04:14 lost all Tor peers on all nodes 13:09:49 not using tor but I have out peers over i2p. no in peers atm though, had 4 yesterday 13:10:31 I2P looks normal here, only Tor seems to have issues 13:14:34 ok, now I’m getting a couple Tor peers again 14:14:41 CLI wallet command 'sweep_all' does not sweep the whole wallet? Only the current account? So there is no command that simply empties the wallet, period? 14:15:48 you can’t make a transaction over accounts 14:42:13 You mean that's a protocol / transaction structure limitation, not only a missing command that I could program? 14:42:46 It is intentional. 14:43:51 (as far as I know) 14:44:27 Yes, I dimmly remember that, fear not I won't program something, but still the question whether the protocol would allow it or not is interesting ... 14:45:29 Somehow it's hard for me to believe that couldn't just grab everything and pack it in a single transaction. 14:47:32 https://github.com/monero-project/monero/pull/2056 is usually good to read up on subaddresses 14:47:44 and https://github.com/monero-project/research-lab/issues/7 14:47:51 as far as I can see, you could program that 14:49:51 but I don’t understand the math enough to 100% answer that :D 14:51:22 Interesting, thanks :) 14:52:22 It would allow it, it can't tell whether inputs are from the same account or not (thankfully). 14:55:27 "thankfully" meaning you would run into all kind of problems if it did? 14:58:49 Yes, like your privacy being invaded. 15:00:25 Ah, ok. I was expecting something on a technical level. 15:01:50 feather should be able to do it if you import a wallet to it 15:01:59 since it doesn't have accounts 15:04:24 Really? "No accounts" as in "no accounts yet", I guess? (It does take a mountain of work to implement that stuff, a whole hierarchy level.) 15:05:48 they have coin control for individual outputs, and no plans to ever implement accounts afaik 15:06:13 accounts are implemented inasmuch as the outputs will be recognized when importing a wallet, though 15:06:38 Interesting. 15:07:42 can also label outputs, is pretty nice 15:10:35 anyone else having issues with Tor tx-proxy? <-- https://twitter.com/MinscTheRashemi/status/1348277018853519362?s=20 15:12:46 I still have a number of in and out tor connections 16:32:05 binaryFate: ok that makes sense, thanks 16:32:27 hyc: I regained them on some nodes, but not on all 17:11:53 use only i2p, lost all INC previously had many 17:21:00 selsta I have 141 peers connected now, none of them are from tor (no blocklist) 19:32:16 Hi Guys, Since I have been operating full node I m seeing a lot of bad behaviouron the network, i'm getting probed, scanned, tcp/udp malicious data packets, etc... I setup a sensor so I could figure out where all this shit is coming from and get an idea how consistant it is. Has anyone else noticed the nodes are exposed to all sorts of attack traffic? IS any of the data I log useful to 19:32:16 the devs? 19:34:30 IS there anyway the node can become hostile to bad traffic and just shitlist it? Is this better done at IPS appliance? 19:46:56 It's normal to get random cunts probe. You can ignore, it's background noise. 22:18:16 "Hi Guys, Since I have been operating full node I m seeing a lot of bad behaviouron the network, i'm getting probed, scanned, tcp/udp malicious data packets, etc." 22:18:16 People are always probing on the internet. If you can, close unused ports and restrict traffic to only tcp on the needed ports using your firewall, at least for your Monero node. When running a webserver like Apache2, if you add ModSecurity, the 22:18:16 OWASP Core Rules and use fail2ban, fail2ban will constantly be banning bots which are probing the webserver. 22:18:17 Port/protocal restrictions do help to secure nodes. If you wanted to put Snort or Suricata in front of your node, I doubt it would hurt, but I also do not know that it would significantly increase your node's security, if you regularly install patches for the node's OS.