02:34:08 anyone online? 02:34:41 I did have a question. Does Trezor T with monero wallet work with password entry on trezor screen? I seem to can only get it to work with pass entry on computer not on trezor 02:34:53 pass entry on trezor device is more secure 03:22:53 https://twitter.com/socrates1024/status/1225463673713561607 03:23:47 when ringsize 1k 03:32:39 ringsize 1k doesn't fix that most likely 03:32:52 howevever choosing your ring partners would make him look silly 03:44:22 well there's also the time element too 03:45:14 like, if Alice sends Bob two transactions of 5$ at the same time 03:45:36 and then Bob sends back 5$ from address A within 5 minutes. 03:45:58 then the triangular distribution (and if it was ringsize 1k) would make it somewhat difficult, because probably both outputs would be ringmembers 03:46:31 however, if we're using ringsize 11, and Bob waits 15 days and then sends the 5$ back to Alice, then its less likely that both outputs will be ringmembers 03:47:01 so I think mega-ultra ringsize would fix it 03:47:15 hyper-dooper-supra-ringsize 03:48:04 or whatever the decay is for the triangular distribution 03:49:00 and of course, the odds could be stacked in the trackers favor if the 5$ is sent via 3 outputs and the other only 2 outputs 03:53:16 it's a gamma distribution now 03:53:49 potato potato 06:17:48 * b1ack0ut[m] sent a long message: < https://matrix.org/_matrix/media/r0/download/matrix.org/lnDyoctaESuknTZIdsoqeQCD > 06:23:02 Who can modarate the +monero:matrix.org please add the room: #xmr.ru:matrix.org 06:23:02 Thanks. 06:46:25 cannon-c[m]: Are you using the GUI? There is a wallet password and there is a passphrase. The passphrase can be entered on device. 07:05:36 The smallest monero is a nanero? 07:06:00 I forget it's something metric so of course as an American I wouldn't remember it 08:00:32 I don't understand what he was trying to prove in that example - that you can see that the transaction output was used in a ring sig? 08:00:32 But it's easy! https://www.youtube.com/watch?v=RXJKdh1KZ0w 09:12:24 EAE is a pretty bad scenario. 09:12:42 contrived* 10:17:15 Inge-: agreed 11:14:09 hello 13:29:15 hello 13:58:14 moneromooo until now nobody can help because even c++ guru dont knwo how blockchain work 13:59:12 There's nothing blockchain about dereferencing an invalid pointer. 13:59:50 You're asking for the first element of something empty. 14:01:08 how to fill that element 14:01:31 That's yours to find. I'd have to re-read all the code to remind myself how this works too :) 14:02:12 u mean that the issue is not tx_cache_data 14:02:38 but the function process_new_transaction 14:02:39 No. I mean I do not know without actually going to investigate the source. 14:03:41 the source of wallet2.cpp ?? 14:07:41 Yes. 14:10:01 OK, post your patch again, I don't remember it very well. I'll see if I can quickly get you another hint. 14:10:20 (if you post it before my build's finished :P) 14:10:22 https://paste.debian.net/hidden/d8c3b695/ 14:10:29 https://paste.debian.net/hidden/f6811e8a/ 14:10:41 moneromooo: so he has a few months to post it then? :D 14:10:57 :o 14:11:07 i was waiting for u asymptotically 14:11:13 hello newyearday 14:11:18 hello 14:11:25 TRy replacing "std::vector tx_cache_data;" with "tx_cache_data tx_cache_data;" 14:11:32 and "tx_cache_data[0]" with "tx_cache_data" in the call. 14:11:43 * moneromooo looks at the user side 14:11:51 i just upgraded to 256gb of ram, i can finally compile monero with -j2 14:12:16 ok moneromooo im starting to compile 14:12:33 Right, that structure is all vectors, so default ctor will give a valid empty one. 14:12:50 And the caller seems to check empty, which matches my dim recollection. 14:13:25 Now I don't know whether that case was tested, since it doesn't happen in pratice so it might still bork. 14:14:44 Oh look, process_pool_state does just what you want. It passes {} for it (which is equivalent to what you're just trying). 14:14:55 Always pays to look at other calls to see what they're doing :) 14:18:30 ok i try the first one and after we c process_pool_state 14:33:51 what would cause the expected_reward of a block (given in the block template) to be different to the actual reward? 14:34:36 Fees. 14:40:00 the penalty for making a large block, or something else? 14:41:36 That'd be included in the block template already. 14:41:50 Actually, fees would too... 14:42:07 So the miner might just decrease the amount themselves. 14:44:04 so if i don't edit the transaction to give myself less, i'll always have the expected amount? 14:48:28 Yes. 14:48:40 great, thank you :) 14:59:46 Hi. I'm plotting the fees varying by block size. What's the current formula? (Or where would I find it in the sources?) 15:00:05 I used this from Mastering Monero so far, but it seems to be off: 15:00:14 r=0.6 ; R=10 ; M=300 ; F=0.002 ; set format y "%.5f" ; plot [300:1200] ((r/R) in out (M/x) in out F in out 0.2 in out 4) 15:00:57 r=0.6 ; R=10 ; M=300 ; F=0.002 ; set format y "%.5f" ; plot [300:1200] ((r/R) x (M/x) x F x 0.2 x 4) 15:01:01 The formula is in the commit message which added it IIRC. 15:01:17 Checking ... 15:01:28 82dbba10d467e28e56929e2e7f3b1f04d4635da4 15:05:58 Okay. Mastering Monero states that the 60000 was adjusted to 300000 in 2017 15:08:24 The min block size is now 300000. I don't know whether that change also applies to the fee though. 15:08:28 * moneromooo looks 15:10:43 Oh god. I remember now. It's the confusing formula. See get_dynamic_base_fee in blockchain.cpp. 15:11:01 It is apparently equivalent to another. 15:11:25 That formula from the commit message ==> (R/R0) in out (M0/M) in out F0 <== is for fee per byte? 15:11:51 Not sure. Could be kB at the time. 15:13:21 MMonero gives this for fee by kB: (R/R0) x (M0/M) x F0 x (60/300) x 4 15:13:51 So there's an adjustment added at the end. 15:17:57 The last 4 is for tx priority. Set it to 1 (low) and now the resulting graph makes sense. 15:18:26 What's a typical Monero tx size in kB? 15:18:57 E.g. one input, two outputs 15:20:47 1.8 kB IIRC. 2.5 kB for 2->2. 15:31:38 why "difficulty targets must be a multiple of 60" and not "difficulty targets must be a multiple of x" on cryptonote_basic_impl.cpp 15:35:02 Read the code a bit below that, it probably assumes it. 15:40:30 (disconnect after what i wrote) 15:45:34 < moneromooo> 1.8 kB IIRC. 2.5 kB for 2->2. 19:20:10 So someone found a vulnerability at the American DoD which the hackerone exchange suggests is a monero botnet 19:20:16 https://hackerone.com/reports/768266 19:20:31 But then they tweet out that it was a "bitcoin miner" 19:20:48 https://mobile.twitter.com/DC3VDP/status/1223260093355044865 20:10:51 shoulda said its a bitcorn miner 20:10:58 come and get your bitcorns