14:31:19 Hello all 14:31:32 Finishing up some effective anonymity set data today, woo 14:31:47 Also UkoeHB_ I have a finalized data set for transaction-output relationships 14:32:00 That can be run against any analysis we wish 14:32:18 It's a pretty huge file, but I can provide format details should you have particular code you wish to run against it 14:40:33 < binaryFate> The wallet warns you when you spend old outputs that privacy is lessen and it's known you should churn in that case <-- is churning much different from a sweep_single of that output? is it best practice to sweep_single to yourself in order to churn, before spending ? 14:47:39 (speaking of old outputs here 14:50:24 Churning individual old outputs before merging them would leave a likely fingerprint in the transaction graph 14:50:53 Merging into a new output would be likely used in many other rings, and therefore introduce some nice ambiguity in the graph 14:51:00 so 1) how old should an output be to qualify as an "old" output? 14:51:12 2) What IS the recommended approach for preparing to spend old outputs? 14:55:48 Well, a transaction spending pre-CT funds runs the risk of being deducible (due to old chain-reaction effects) and/or being susceptible to guess-newest (just a heuristic, not inherently testable)... but otherwise, the older a spent post-CT output is, the less likely it is to be a decoy according to the modern selection algorithm 14:55:54 that is not quite so cut-and-dry 14:56:52 I have data on the deducibility of pre-CT funds being spent in the post-CT world, and can put together a little plot on that 14:57:19 My question is solidly planted in the post-CT era 14:57:23 post-CT funds are not at risk of deducibility using the same method (i.e. chain reaction no longer applies) 14:57:24 ok 14:57:32 maybe the wallet should try to select true spends with one ring spending an old out if there's one, and the rest spending recent ones. 14:58:29 Ideally it should be fairly trivial for users to hold for a long time and then spend safely 14:59:14 True, but the entire point of the spend-age distribution is to match actual known spend patterns as close as possible 16:04:12 ugh. just bump the ringsize to a bajillion and be done with it 16:04:38 s/11/1 bajillion/ 16:04:39 done 16:04:54 someone please review that change for me 16:05:00 lol 16:05:25 That will change a lot more than just ring size. 16:05:40 i mean, cereal though, how much of this heuristic nonsense would be abrogated with massive ringsizes 16:08:03 how big of a ringsize is enough? 16:09:00 IMO being able to use ring epochs can mitigate a lot of this 16:09:27 Even in the event of a breakdown of the age distribution, an adversary still has to work within an entire epoch 16:09:45 sorry for being ignorant but its more than just plausible deniability, correct? 16:09:47 and if epochs contain many outputs from the same transactions, output merging is less useful 16:09:47 the buckets or batching or bins or whatever its called? 16:09:51 aye 16:11:06 i mean, a 1k ringsize does far less damage than when we moved to original ringct. Yes yes, i know, we're such a mature network now, but c'mon 16:11:43 is there a ballpark size or a size of diminishing returns? or is it more is always better? 16:12:18 kinghat[m]: that answer would depend highly on the particular risk model a user is considering, 16:12:35 (which is very much a non-answer...) 16:13:06 AFAIK it hasn't really been tested in the real world what "plausible deniability" looks like in the context of ambiguous signatures 16:14:16 ya we cant know that, but we probably can know that 1k is basically the same as 1.2k but is it the same as 2k? 16:14:29 Depends entirely on your threat model 16:15:38 ya i guess im not educated enough on the different threat models to be able to make a distinction. 16:15:47 If an adversary is spending funds repeatedly to a user and is colluding with their exchange to see how often those funds appear in the transaction graph when deposited, then that's probably a different metric for deniability than simply looking at patterns in the graph without such information 16:16:41 and if the adversary also colludes with the user's ISP, it could have more information still 16:17:32 damn, i always forget about the exchanges. 16:18:13 "Who is colluding with whom" is a tricky question 16:18:19 the ring size plays a role if there was collusion with an isp? 16:18:50 Depending on how the user interacts with the network, the ISP could know which transactions belong to the user 16:19:01 or at least provide an indication of when the user was online to potentially make a transaction 16:19:13 and that's useful information 16:20:29 got ya. 18:03:06 re: finalized data set for transaction-output relationships; sounds good sarang 18:03:39 The data is up to block 2.1 M, which extends to May 2020 18:06:26 https://repo.getmonero.org/monero-project/ccs-proposals/-/merge_requests/149 18:44:00 updated https://repo.getmonero.org/monero-project/ccs-proposals/-/merge_requests/150 19:20:06 i don't think variables outside the scope of the blockchain should function as inhibitors of the security design of the blockchain 19:20:37 just because Jimbo sends from the same IP to the exchange and the publishes his transaction has on twitter doesn't mean the chain should be super awesome 19:20:44 *transaction hash 19:21:25 i mean hell, if you take that philosophy to its maximum (and always crank to 11), then bitcoin's psuedonynmeueoiltuio is fine 19:41:11 I'm not sure I follow what view you're taking here gingeropolous... 19:45:53 the threat models 19:46:45 Are you saying that the security design should take into account common likely user behaviors (e.g. interacting with exchanges)? 19:46:50 If so, I agree 19:46:52 Absolutely 19:47:27 Unfortunately, there's no clear line for where your assumption of entities colluding should be 19:47:49 "Everyone is colluding" seems to ruin most designs 20:16:21 im saying the security design shouldn't be hindered by likely user behaviors 20:17:34 ah, missed a negative in my original statement. my bad "doesn't mean the chain shouldn't be super awesome" 20:17:57 well, a double negative was attempted, and missed. I'll work on my doublespeek. That was doubleplus ungood. 20:19:00 not even these keys can keep up with these caffeinated manic comments!