03:10:06 Is there any way to know if you are connected to an asshole node so you can ban them? 03:10:10 My initial sync seems to be taking a long time 03:23:19 You can increase out_peers and limit_down 03:23:45 initial sync time is most likely not affected by bad nodes, SSD helps 03:25:05 I am using a raspberry pi 4b with 4gb of ram, 500gb external ssd, I also have 2gb of swap enabled. So the those are the 2 best options to decrease sync time? 03:27:33 I will increase those thanks 08:18:05 Isthmus: Did there come out any practical guidelines for people to mitigate any of the potential quantum weaknesses? e.g. using more separate wallets to avoid a compromised public address to unravel more than absolutely necessary or similar? 08:25:21 Block time variance is up a bit since last fork: https://bitinfocharts.com/comparison/confirmationtime-xmr.html#2y 08:26:54 Possibly due to "hanoiboi" and hashrate variance? 08:59:01 viperperidot[m]: it will decrease sync time if hardware is not the bottleneck 08:59:59 raspberry pi is not the strongest machine so I would not be surprised about long sync times 15:26:47 Ok thank you, I have noticed an increase since changing those settings. 15:26:58 Increase in sync speed that is 17:12:46 Anybody knows if any of these authors did any follow-up work or are involved whatsoever with Monero? This was from mid-2018 but I just only found it http://courses.csail.mit.edu/6.857/2018/project/Hu-Macias-Jachymiak-Siabi-Monero.pdf 19:00:43 https://usercontent.irccloud-cdn.com/file/8B1KoGcH/43.pdf 19:00:57 Found this related as well 19:04:35 Which was published at Financial Cryptography 22:04:14 ping aaaa 22:04:21 (oops, wrong window, carry on) 22:08:48 It seems like a good defense against eclipse attacks would be to have a large list of nodes to which you probabilistically send information. 22:09:49 So, I contact 1000 nodes and tell them, "whenever there's a new block, send the header to me if rand(0,1000) == 999". And they either say they'll honor it or they won't. 22:11:30 I then have a 1-1/e chance of receiving each block, regardless of network topology 22:12:24 You could trivially extend this against network attacks too. "I'll ACK it with key X, if I don't then try to connect to xxxxxxxxxxx.onion instead".