10:42:35 Where can i find the logo of the research lab? 10:44:25 nevermind. I downloaded the logo of this room on matrix 13:43:11 ErCiccione[m]: rehrar might have some high-res versions too 13:43:59 Also, hello all 13:44:17 Finalizing common-key Triptych batching and getting the plots updated today, woo 13:49:16 🎉 13:51:53 that sounds awesome! 18:08:53 On a desktop/laptop does validating two blocks in parallel take the same amount of time as validating two blocks serially? 18:09:32 Probably not. 18:09:57 The concept of "validating two blocks in parallel" is ill defined though. 18:11:23 I'm booting up a new node. Instead of processing blocks 1 - 1000 in a row, perhaps I validate [1-250] in parallel with [...], [...], and [751-1000] 18:19:47 those example numbers aren't so great, since monerod uses compiled-in hashes for the first couple million blocks 18:21:06 but since blocks refer to previous txns, you can't get very far ahead, if at all, by parallelizing 18:22:06 Blocks are made of txes, which depend on previous txes, so it might be annoying to parallelize, but by all means, any improvement is probably good :) 18:22:48 if you're lucky enough that all the txs are old enough to have already been verified 18:23:14 if not, then you're implicitly serialized anyway, waiting for those txs to go by 18:28:59 Oh very interesting, I have to think about that 18:31:16 You can verify PoW in parallel. 18:32:00 Without dependency on earlier blocks I mean. 18:33:00 does predictive/optimistic branching/rollback make sense in this context? i.e. groups of blocks expected to be valid done in parallel, invalid triggers rollback + serial validation 18:34:47 it's a nice idea in a perfect world 18:35:03 because in the ideal case, it would work in parallel most of the time 18:35:32 but if you become dependent on that, it's trivial to DoS the network by tossing in crafted blocks 18:36:11 true, could do nasty things w/ invalid blocks nested deep in a valid chain... damn 18:38:30 what about using some of the snapshotting tech to guard against maliciousness? so, snapshot 100k block chunks, do a hash/zkp of the snapshot, validate all included snapshot tx in parallel 18:38:53 or w/e for the snapshot # of blocks 18:41:19 A zkp of what exactly? 18:42:03 (I only ask because my eye twitches whenever I hear "just use a zkp" for something) 18:42:07 doesn't verifying PoW depend on recomputing all the difficulties, which is a serial operation? 18:42:08 zkp doesn't make sense 18:42:31 disregard, but the hash of the snapshot as checksum 19:01:41 derp dropped (irc gods are angry w me) 19:03:07 * derbleak begins the requisite self-flogging 19:21:37 derbleak: https://monerologs.net/monero-research-lab/20200421 if you need to recover logs 19:28:00 UkoeHB_: thank you :) 19:53:15 re: binary distribution, one possibly dumb idea could be to use serverless functions to `git pull and build`, distributing a freshly built bin every time :) 19:53:44 be fun to see amazon reaction 19:53:53 :p 20:05:30 bezos trolling aside, think the torrenting idea is great 20:06:13 bittorrent has a blockchain project on tron iirc, could enable another channel of decentralized hosting/distribution 20:06:40 pls no tron 20:06:50 lol 100% ^ 20:07:06 mb filecoin or smth similar? 20:07:50 did filecoin ever launch? 20:08:56 https://filecoin.io/blog/roadmap-update-april-2020/ 20:11:07 long way to say no 20:11:17 yeah... 20:11:34 sorry, posted b4 reading 20:12:00 ipfs is definitely live though 20:12:11 siacoin is another one, think storj went out of business(?) 20:12:21 or whatever happens when blockchains die 20:12:56 bits used as entropy, fading into the heat death 20:14:36 https://onionshare.org 20:16:47 a bit off topic here but what would the advantage of torrent / ipfs / ... be over a normal http download? 20:17:37 security and baked in authentication/signing 20:18:08 for ipfs, potentially censorship-resistant, *very* long-term storage 20:18:35 similar for siacoin etc. 20:19:17 could also host the storage coin clients as hidden services, mb 20:19:31 s/clients/nodes 20:19:31 derbleak meant to say: could also host the storage coin nodes as hidden services, mb 20:20:41 mb i'll set one up today :) 20:23:54 * derbleak afk to tinker 22:23:06 New multi-input timing data: https://usercontent.irccloud-cdn.com/file/8CJqeZGu/timing.png 22:23:29 This example is the per-input timing data for a 2-input transaction 22:24:02 Also rewrote some tests for better comparisons that include commitment offsets 22:33:00 which version of triptych is that? 22:34:56 The C++ implementation I did 22:35:05 with some modifications to support commitment offsets more efficiently 22:36:03 Shortly, I'll do a quick modification to support multi-index signing and balance assertion 22:36:14 triptych or arcturus 22:36:25 Triptych 22:36:28 ^ is this data 22:36:46 Arcturus should have similar timing results 22:36:51 thx 22:36:53 with better size data