00:12:38 What would compel a node in the chain to forward that request to another node? 00:14:13 Couldn't a bad node simply ignore it? 00:14:36 And how long would the chain have to be before it stops? 00:17:55 Are you trying to weed out bad nodes that send bad data to wallets? Why not simply have the option in the wallet to send the same request to a few different nodes at the same time and then compare? 00:20:13 Alternatively, you could use a variant of this idea to add a new method for nodes to weed out bad peers 00:22:52 Before connecting to a new (outgoing) peer, a node sends a "spot check" request to the peer, pretending to be a wallet asking for data to build a tx. If the reply matches with our own data, then we assume it's an honest peer and we initiate a p2p connection. If the reply is false, we add it to the banlist and move on 00:24:37 But I guess the "pretending to be a wallet" part would have to be "reasonably long" to avoid getting immediately spotted, because no wallet simply connects out of the blue and asks for specific output data 00:24:39 P2P and RPC are two different things. 00:26:02 I know, my goal is for a node to spot a bad peer before initiating a p2p connection to it, by disguising itself as a wallet and looking for an honest reply 00:26:32 * I know, my goal is for a node to spot a bad peer before initiating a p2p connection to it, by disguising itself as a wallet making rpc requests and looking for an honest reply 00:26:43 Wallets connect to daemons' RPC ports. You seem to want to ban nodes for not having their RPC port open. 00:27:33 If they're not available for rpc then this criterion is null and we skip it 00:28:43 Although I guess there would be no way for a node to know if the peer is running rpc on a non-standard port different from 18081 or 18089 00:30:02 But if they are available for rpc on a standard port, then we can try to check if they're honest or not, thus isolating bad public nodes from the rest of the network 11:23:41 Would bad p2p nodes even bother keeping their RPC ports open? 14:41:47 What would compel a node in the chain to forward that request to another node? >> the same thing that compels a node to relay any transaction. it would just be part of being a node. 14:42:52 the goal is to prevent associating a remote node user's tx with an originating IP address. yes, you could just use tor / i2p. 15:29:01 Oooh, so a node would request for the output data before forwarding a tx to check for a honest response from the peer 15:29:48 Then my point about differentiating between a node vs a wallet making the request still stands 15:30:38 A malicious node would give a honest reply to another node, but then send bad data to a wallet making the same request 15:31:38 So you would need a way to make a node's "spot checks" impossible to differentiate from a genuine wallet syncing and building a tx 15:31:40 this was said before but most nodes don't even have open rpc access 15:32:03 Yes, if you want to feed bad data to remote node users 15:32:51 (Which I assume is the topic at hand) 17:17:48 endor00[m], I don't think we're talking about similar things. we might be, but im lost. basically, right now, a remote node can spy on a remote node user by assuming that the IP address of the remote node user can be associated with that users transaction 17:20:15 but yeah iDunk and selsta , i take your point about p2p / rpc. this would have to be done on RPC nodes / ports to mimic a wallets behavior. but, i mean, request specific output data *could* be done via p2p 17:20:43 requesting 17:21:52 so basically we shift the system so that a remote node user (RNU) just connects via RPC to a node to refresh. 17:23:12 once wallet sync, the wallet starts forming a transaction. it needs output data for 11 entries on the blockchain. it sends that request to some other random node. 17:23:51 that node [A] returns those data to the original RNU, but then that node also requests the data from some other node [B]. Now [B] doesn 17:24:02 n't know if [A] is the original RNU or not. 17:27:02 sounds simpler to add Tor 17:28:39 :) 17:28:48 well, slap some tor in the GUI 17:29:38 and if it was simpler to add Tor, why'd we put danndelion in? 17:33:55 In general I think we want to avoid adding things to p2p as it just increases the potential attack vector. 18:03:38 Remember kids. If you call project coral reef for what it is - fluffy embezzling half a mil usd from the monero fund for a website with smaller adoption than monero woo plugin, you will get excommunicated. Why do you think charities need Teslas? They don't and Elon won't support Monero 150k will sure buy a lot of party time for those that actually do get it.