00:11:44 Every once in a while, I see a quote from a former NSA lawyer, Susan Hennessey. That's frigging awesome. 08:28:17 hello all! 08:28:24 got a quick question 08:29:24 are the projects described in Community Crowdfunding System exclusive only to core team or can anyone work on any of them for the reward ? 08:30:26 oh! there is monero-dev let me go and ask there instead, didn't notice it except right now 08:31:42 freedude: #monero-community is probably the best place to ask about the CCS :) 08:32:04 but anyone can ask for funding via the CCS. it helps if people know who you are though 08:32:32 nope I am not asking for funding I was asking if anyone can work on any of the simple tasks there 08:32:48 like somone wanted to have debian package maintained for 2 years 08:33:07 so I felt this is more like dev work 08:33:22 but thanks for the tip on where to ask 08:33:51 i think you can pick up someone's work (and take the reward) if the proposer vanishes without doing it 08:34:09 https://ccs.getmonero.org/what-is-ccs/ 08:34:43 yes I wanted to kinda do that (but there was no one doing the to start with) 08:35:22 let me go and ask there after reading 10:26:18 Somebody is mining the hell out of testnet, blocktime is almost down to about 1 minute over the last hour - is somebody 51% attacking the poor thing? :) 12:33:08 maybe tari miners? 13:24:20 sech1: i dont have a reddit account but i just saw your comment on cost of a 51% attack to the network, are you factoring in the block reward payback? because i think that when you do, it becomes relatively cheap. 13:24:45 at least last time i ran the math, which admittedly was a while ago 13:25:16 buying cloud VMs brings you back 10% or so as block rewards, if you try mining 13:25:30 realistically this is the only way to 51% Monero network 13:25:46 or you could hack 5 top supercomputers at once to do this :D 13:26:27 damn, only 10%.. was expecting a much higher % 13:26:43 maybe 15-20% if you catch cheap spot instances 13:26:57 but they're not guaranteed to last, and you need stability to do 51% 13:27:39 if you consider the fact that many current miners will stop mining once a 51% attack starts because it becomes unprofitable 13:27:46 the 51% attack also gets much cheaper 13:29:06 but we can always fork the algo yet again if that ever happens 13:29:22 honestly there are probably more concerning attack vectors 14:37:15 forking would not help in that case? 14:53:45 If there was a sustained 51% attack forking is the only option 14:53:58 It's either that or sit on our thumbs and do nothing 14:54:40 It's the only option... or the second ? :) 15:00:50 Idk what is the other option? 15:03:48 It's either that or sit on our thumbs and do nothing :P 15:03:57 I was just pedantic. 15:21:37 id imagine that under a 51% attack scenario the existing pools could collude to protect their profit. 15:22:05 not that its a great solution, but game theory and financial incentive blah blah blah lead that to be a likely outcome 15:23:03 i.e., "we'll only mine on top of a block produced by a known pool" 15:25:18 They could do that now. Not a comforting thought. 15:26:37 indeed. 10+ years of PoW has yet to find a solution to the "pooling problem" of PoW though. 15:26:58 and my box has yet to find a solo block :( 15:27:01 Amusing that the solution is also the problem: men with guns. 15:28:52 well, it really only introduces temporary network instability in general, and targeted attacks on merchants / services. i guess it really depends on how sustained it is 15:28:58 and the goal. 15:29:41 i still wonder if my daemon mining is actually working. bah 15:48:57 If someone has the funds / hashrate to attack the network with RandomX they most likely also have it after forking to a different algorithm, or am I missing something? :P 15:54:21 Assuming they don’t have hidden ASICs or so. 16:33:09 gingeropolous: It is possible 16:33:14 You can block pooled mining trivially 16:33:34 But then solo mining is the only viable option 16:33:39 Any reference to how its been done in the real world? 16:33:53 meaning big farms gain from it 16:34:08 Only coin I've seen try is Nerva but its too small for anyone to care to attack/break it 16:34:17 yanmaani: how could you possibly block pooled mining? 16:34:17 sethsimmons: There was a paper about it. Just require each nonce to be signed by the private key that receives the payment. 16:34:35 so the pool signs the nonces 16:34:43 Yeah I'm not sure what that changes 16:34:44 But that's extremely expensive 16:34:55 it was already discussed and it doesn't block pool mining 16:34:57 they already have a hot wallet up 24/7 anyway, what's the difference? 16:35:03 If the pool has to make say 1 million sigs/second, and each sig is 64b, that's extremely expensive 16:35:18 64 mbit connection to each miner 16:35:26 So it kills small pools and drives towards few large/powerful pools? 16:35:46 That can support bw/compute needed because of profits 16:35:47 sethsimmons: Well, it kills all pools, and drives towards "guy in a warehouse with a trillion chips" 16:35:57 How does that kill pools? 16:36:01 it doesn't kill pools 16:36:19 You could make the signature algo expensive too. In Bitcoin you have petahash hashrates. There's no way to send over all the sigs 16:36:26 This is basically an engineering problem 16:36:40 One that has yet to be solved because its practically impossible 16:36:46 No 16:36:51 I have seen no valid proposal without major flaws 16:36:51 It's practically possible 16:36:54 but the gain is unclear 16:37:02 each miner gets their own private key from the pool and signs nonces himself 16:37:08 exactly 16:37:17 at best it makes miners run their own nodes, which would be a good thing 16:37:17 sech1: then the miner can spend the block reward 16:37:21 each miner deposits block reward before he's allowed to mine as an insurance from stealing block reward 16:37:23 But in no way removes pools from the equation 16:37:29 It was all discussed here 16:37:37 that's true I suppose. 16:37:47 Yeah, then you basically have to fix p2pool 16:37:54 which is also an engineering problem 16:38:09 It pushes towards self-select which is good, but thats about it 16:38:57 p2pool might be fixable with mempool sync, but it's a very hard problem 16:40:03 unless someone comes up with a way to shard it 16:43:13 2020-09-10 16:43:03.577 F Error starting server: Failed to bind IPv4 (set to required) 16:43:31 im getting this error when startming monerod 16:43:54 other instance running? 16:44:23 hmmm, thats a possibility 16:45:31 yep... the monerogui has the monerod running despise not connecting to it 17:01:34 My memory's hazy, but IIRC I thought pool still existed. 17:01:52 Was it... pebble coin ? Maybe I'm mixing things... 19:04:28 we could scam the government into thinking we traced romeno for that bounty 19:04:40 is that like.. wrong? 19:04:45 those other noobs did for like 3mil 19:04:56 brilliant fother muckers 19:25:09 not a half bad idea 19:25:19 make a GUI that misrepresents probability and draws a nice graph 19:25:24 and Bob's your uncle 20:22:41 anyone here trading? looking to exchange XMR to BTC 20:23:00 you could try #monero-otc for that, not sure how active it is though 20:23:03 corelvl_: try xmr.to or #monero-markets 20:40:53 yeah i just asked, its pretty dead in there 20:41:08 try xmr.to then 20:42:14 only 1btc per transfer and the rates are too high 20:45:53 If you want to get monero for bitcoin, you'll hardly going to find better rates. 20:46:14 i want to transfer my XMR to receive BTC 20:46:16 corelvl_: How much do you want? 20:46:16 Some people would ask 50% extra for the risk of having tainted bitcoins. 20:46:21 Oh. 20:46:39 try bisq then 20:46:49 maybe 5% better rates, according to some guy 20:47:18 bisq i could receive tainted coins 20:48:09 @yan a lot 20:59:31 how much monero do you have where you can't even be bothered to transfer $6k a few times 20:59:58 there's no compliant exchange that's going to let you exchange $1M of monero to clean coins 21:00:10 either do it with xmr.to or get dirty coins 21:00:47 Kraken certainly will, but only if you are ok with KYC 21:01:17 If you're OK with KYC then yeah, just go on binance or whatever 21:01:20 Kowtow to Your Creeps. 21:01:21 maybe the OTC desks will take you 21:01:27 look at localmonero 21:01:30 they have OTC desks 21:01:34 there's a nice box "KYC yes/no" 21:01:43 i'm sure you can do it on plenty of exchanges with zero kyc, but you'd need to create multiple accounts 21:02:13 assuming it's a large enough sum for them to bother you 21:02:46 yeah its just a headache, i would rather find a trading partner to deal with at a 1-2% fee 21:03:26 corelvl_: OTC desks are what you want 21:03:36 come to think of it, i'd like to buy some extra xmr 21:04:30 corelvl_: how do you plan to ensure you don't get tainted coins from some random partner you find on IRC? 21:05:05 mine are as clean as a whissle :'^) 21:05:07 maybe they should be more concerned about what he's going to do with those coins :P 21:05:15 @ndorf they need to come from an exchange, i can verify this 21:06:32 I think probably just spend it on mundane things. The real question is how you end up with $millions of XMR without ability to pass KYC ;) 21:07:06 my guess is mining malware 21:15:56 Hi, would anyone be willing to teach me Russian for monero or other cryptocurrency? I am thinking of atleast voice calls, if not video, plus text. 21:17:02 I think reddit might be the place to ask. There's a forum for this kind of thing. 21:17:16 r/moneromarkets (or maybe without the s) 21:17:17 nly: i know this isn't exactly what you were asking, but there is a pretty active xmr.ru community 21:18:09 their telegram chat has 1773 members and is active 21:19:04 хорошо, спасибо(great, thanks) 21:19:08 :) 23:18:18 was experimenting with --do-not-relay and noticed that if I do multiple transactions it silently clobbers any existing raw_monero_tx file each time. 23:26:40 I have the seed my Trezor Model T gave me, and I know my passphrase, is there some program or something that is compatible with the Trezor Model T's internal algorithm which generates a seed for the Monero client software, so that I could recover a wallet without having the hardware? (I know about the safety implications.) (From what I read the first seed is used with the passphrase to generate the actual, final seed.)