00:16:07 nioc: perfect, thanks 00:16:21 meow 00:22:15 Zerock: make screenshot, put it online and i'll scan it in monerujo 00:22:29 oh yeah I guess that's an idea 00:22:38 I can just send a screenshot to myself and put it on my PC 00:22:46 right 00:23:00 good thinking :) 00:24:11 screenshots not allowed -_- 00:24:44 ohh, I think I figured it out 00:25:14 it prepends the address with "monero" but not "monero:" 00:25:29 oof 00:25:58 is the dev in this channel? 00:26:07 I see someone from the staff page but not the main dev's alias 00:27:36 i would open an issue at https://github.com/m2049r/xmrwallet/issues 00:45:42 it appears it's already been fixed :D 00:45:46 * Zerock waits for next update 01:17:48 lol strike hopefully no one kicks the bot it was invited to be here :) 01:17:58 lol 01:18:34 but yeah bot can be restricted as needed 01:18:45 hell it can be auto disabled if channel is busy even 01:18:54 like if there's a lot of talking bot use can be prevented 01:19:01 I had a separate channel for heavy tippero usage. Just do the same. 01:19:49 yeah like i said yesterday people are free to use the bot to their heart's content in the bot channels. Like ##wallet & ##walletbot are both quite active 01:20:07 that's why i said if the bot needs to be restricted to be here it's possible 01:20:25 Cool. I don't think you mentioned those channels before. I certainly did not see it. 01:20:41 was in middle of the bot spam during the new toy phase :D 01:20:55 Fair enough :) 01:21:02 you know when new toy arrives & everyone feels need to over-do it lol 01:21:43 but yeah if you had a bot channel like #monero-bots or whatever I can redirect all output from the bot to that channel with a notice to use the bot there 01:21:56 that can be done for specific commands or during busy times etc 01:22:13 i try to cover all the bases for different communities 01:23:07 just like if the bot is in discord, telegram & freenode the channels can be bridged in the bot then WHAT passes the bridge can be set. like bot commands can be filtered to not be sent to the other side 01:25:23 so yeah before anyone boots the bot please get with me to see what can be worked out to keep everyone happy :) 01:41:50 Are the criticisms of privacy coins in this talk generally thought of as valid? 01:41:50 https://m.youtube.com/watch?v=9s3EbSKDA3o 01:49:33 what are the criticisms youre referring to? im listening to it 01:53:49 finely: 01:55:10 well privacy concerns are valid but question is level of importance to any individual & why. some feel privacy doesn't need a reason. others think there are legit reasons to give up some privacy. then again figure there's some who figure it's no big deal wither way. 01:55:55 i mean billions of people sit on social media & give up their privacy willingly & nearly without limit 01:56:12 when you point it out to them they usually say "so what" 01:56:35 It's like being naked in the street. It doesn't harm you (assuming it's not too cold) but most people still don't do it, even if they're not harmed. 01:56:42 "do i care if the world knows i ate taco bell today & that my dog's name is Spot? Nope" 01:57:10 right and at same time those clothes could have your address written on them too 01:57:43 generally speaking i don't have much to hide from the world but i want to be the one to choose what gets let out 01:57:48 i think hes talking about concerns of the use of privacy coins 01:57:48 i havent heard what hes talking about yet in the video yet though 01:58:00 yeah i figured such 01:58:02 "Why are you wearing clothes in the street ? Do you have anything to hide ?" 01:58:10 but was making small talk on topic in meantime :) 01:58:16 yes my massive dong 01:58:23 wouldn't want your wife chasing me down 01:58:28 what criticism are you referring to? 01:58:28 finely 01:58:33 with a knife ? 01:58:43 lol why are you switching between irc & matrix :D 01:59:06 all ive heard so far is criticisms against public blockchains etc xD 01:59:24 wearing clothes doesnt mean you have something to hide but wearing clothes definitely makes it easier to hide something if you want 01:59:26 To show off my keyboard skillz. Or maybe because we're two different people. Or I've got dual personality disorder. 01:59:41 split personality of hte same person 01:59:50 /nick moneromoop 02:00:01 A third one ? Crikey. 02:00:10 test 02:00:23 if i sent 10 bitcoin i probably don't care if it's on public block chain. until i sent 10 bitcoin & someone pointed out the address was associated with something nefarious 02:00:32 ices FAP 02:00:59 the's the issue with privacy.. it doesn't matter until it does 02:01:16 so do you protect it no matter what or be lax & hope for the best 02:01:37 If only it were up to the person, it'd be fine. 02:01:57 But there's so much pressure from everywhere to give it up, obstacles everywhere, etc. 02:02:21 Some people just don't understand others might want to be left alone. 02:02:33 and none of this goes into evil doers either 02:02:34 F...ing busybodies... 02:02:40 just average joe's minding their own 02:03:03 brooo this dude drops a question and just dips 02:03:08 typical eh lol 02:03:15 we're having to carry the whole Fn conversation 02:03:34 did he actually leave matrix side? 02:07:24 idk xD so weird 02:09:57 Its been s while since I watched it, but if I remember correctly they are mostly statistical attack to deanonymise users. Made easier by the fact most users of privacy coins that have optional privacy don't use those features so the attacks are easier. 02:10:55 I did not watch, but statistical heuristics certainly do exist. 02:11:23 I think youre getting confused on his criticisms against non-privacy coins 02:12:00 that is why Monero / privacy coins are better. because its very easy to deanonymise users if they aare not using a private blockchain 02:12:10 No, these attacks were on XMR and Dash. 02:12:13 Bitcoin is extremely easy to deanonymize 02:12:25 the only time he mentions monero 02:12:40 is when hes talking about swapping Bitcoin for monero and immediately back to bitcoin 02:12:52 i watched the entire thing 02:13:43 the easy thing is tracking the bitcoin user regardless of the fact that he swapped for monero for a split moment 02:13:55 I'll have to watch again🙂 02:13:58 because he still uses a centralized exchange to do so 02:14:54 and Monero is working on "Atomic Swaps" which allows P2P native swaps without a centralized exchange 02:14:54 but if you swap Bitcoin for monero andd back to Bitcoin - But you use the same exact Bitcoin Address.. everyone knows what you did... 02:15:43 Interesting, thanks for the feedback. 02:15:48 <3 02:23:34 lol that wouldn't be very smart thing to do eh 02:23:51 re-use the same addresses after mixer :D 02:27:06 big brain 02:30:22 also using a wallet that has bitcoin it received only from a mixer... 02:30:22 very sus lol 02:31:09 yeah not much point in privacy if gonna half ass it 02:37:31 but i touched the privacy coin! 02:37:53 I touched it! i should be good right? 02:51:18 Watched it again. The taint tree attacks seem to be an inherent weakness of decoy based privacy coins like monero. Your right, two of the attacks rely on linking a parent address to a person through an exchange with KYC, but there are other ways an address could be deanonymised. And the tainted dust attack doesn't seem to require access to exchange data at all. 02:51:18 Are taint tree attacks considered statistical heuristics? 02:52:40 His central claim is repeated interaction with a sender or receiver breaks the anonymity of decoy based privacy coins. 02:53:02 your understanding it wrong 02:53:10 the taint tree is bitcoin 02:53:15 there is no tree you can follow in Monero 02:53:40 Monero has no tree 02:53:45 Bitcoin has a tree 02:54:30 magic privacy coin that doesn't work how you think right :D 02:54:57 by "you" i mean the imaginary you who thinks privacy is magical lol 02:56:39 the entire time hes talking about repeated interactions with a sender or receiver - hes talking about NON privacy coins 02:57:11 hes not talking about Monero 02:58:03 this 'decoy based privacy coin' you're referring to is just Bitcoin....... 03:07:31 moneromoon[m]: are you familiar with the eabe attack 03:08:06 Nope, he is definitely classifying Monero as a decoy based system. See the slide @ 9:10. All cryptonote/ringct coins, as well as older mixing techniques for bitcoin. 03:08:06 Not saying he's right, just interested in what mathematicians and computer scientists with a better understanding of graph theory than me think. 03:09:36 thats only a hypothetical attack thoughg 03:10:08 moonrays[m]: who are you responding to? 03:10:28 whoops 03:10:45 moneromoon[m]: ^^ 03:10:58 nioc 03:11:37 yeah im pretty sure thats just outdated information if youve kept up with Moneros ddevelopment im not sure what exactly hes referring to on that slide 03:11:38 it's real enough that mitigations have and are being worked on 03:12:03 yep exactly 03:12:09 it will be made impossible 03:12:12 either way 03:12:25 so not hypothetical 03:12:36 and currently viable 03:12:59 i dont think thats what hes referring to tho lol 03:13:10 that being said it is for a particular set of circumstances 03:14:00 which you can avoid, but therefore it's not set it and forget it 03:14:15 ofc nothing is 03:15:07 certainly better than this.... https://pbs.twimg.com/media/EoNazPsXEAIe7VQ?format=jpg&name=small 03:15:15 by far 03:17:19 This looks like the text of the video: 03:17:19 https://www.zfnd.org/blog/blockchain-privacy/ 03:19:52 you'd need to look into the actual security solutions of Monero 03:19:53 monero uses zero knowledge proofs also 03:20:18 ring signatures is not the only solution implemented 03:20:44 it's how the entire tx protocol is implemented 03:20:57 multiple layers of security 03:20:57 that's where this might just be outdated information.. 03:21:01 not that there is zero proof involved 03:23:02 at this point it's probably easier to track zcash than monero because of implementation 03:23:08 Trying to wrap my head around the particular circumstances that would be bad. What mitigations are you talking about? 03:23:26 such as the choice for opt in privacy with zcash 03:24:42 Not convinced that is true, he is describing a whole class of attacks. We gave no idea what other attacks like thus could be devised in the future. 03:25:11 eabe where e is an exchange that has knowledge/identity of 2 people/businesses (a,b) transacting 03:25:26 yeah but we dont know what kind of attacks on central banks could be devised in the future 03:26:07 you need to churn, that is do a couple of sends to self as an intermediate step 03:27:17 even if one layer of monero is compromised, there's 4 others... 03:27:52 fo 03:28:14 does not concern me 03:29:49 zcash is much more concerning than Monero 03:30:04 'opt-in' privacy weakens the entire networks privacy 03:30:15 Monero is private by default 03:30:45 and much depends on your needs 03:31:23 Thanks. How do zero knowledge proofs relate to moneros privacy? 03:32:04 https://www.getmonero.org/2020/12/24/Bulletproofs+-in-Monero.html 03:32:30 Agreed, especially when the number of transactions is small. 03:32:46 what is a zero knowledge proof? doesn't mean that there is zero knowledge of everything that happens 03:33:51 a zero knowledge proof is not a tx protocol 03:34:23 https://medium.com/digitalassetresearch/monero-becomes-bulletproof-f98c6408babf 03:34:27 it has become a buzz word' 03:34:38 this pry helps explain what happened back in 2018 2019 between zcash and monero 03:37:20 Didn't know monero had stopped using ring signatures. 03:41:17 i'm pretty sure its a combination of ring signatures + stealth addresses + ringCT 03:42:32 * moneromoon[m] sent a long message: < https://matrix.org/_matrix/media/r0/download/matrix.org/FUMiVYhrFydPSvZIXFjAIZTA/message.txt > 03:44:44 Reading the bulletproof+ preprint, it sounds like this is using a zero knowledge proof to avoid revealing the amount in a certain transaction. 03:45:38 sounds correct to me 03:54:34 Am I right in that a transaction must come from the subset of addresses in the ring signature? 04:03:42 you can see addresses in the ring signatures? 04:06:04 That was my understanding, but its been a long time since I learned about them. 04:06:31 Eabe attack is a replay/playback attack? 04:06:38 no you cannot see the address in the ring signature 04:06:45 that is the 'ringct' implementation 04:07:52 on top of not being able to see the address - even if you could see the address - its also using 'stealth address' implementation. 04:09:37 ring signatures + stealth addresses + ringCT + Bulletproof + Dandelion++ 04:09:37 Layers. multiple layers of security on top of eachother. 04:31:08 * finely[m] sent a long message: < https://matrix.org/_matrix/media/r0/download/matrix.org/EXFxzKKVzmxHZjeDzymblARP/message.txt > 05:13:06 "finely[m] sent a long message:" (how long was it. lol) 06:24:36 we thinking Elon will give Monero the stamp of approval? 06:29:51 Not after bitcoin sadly 06:37:06 No thank you. 06:37:25 You elonsexuals are weird as fuck. 07:14:53 Listen. You don't have to like or dislike the man to acknowledge that he can hurt prices in short term 08:35:10 How do u know my kinds 08:37:04 Hey guys got a question about Kovri... what happened to it? 08:37:04 Why it’s not yet set as default into Monero? 08:37:05 Listen. Yo"> He hasn't. You guys have a tendency to overstate his importance. He has been tweeting about doge for a couple of years. It was only when WSB got involved that the price boomed. 08:37:45 People have been predicting btc to 50k for YEARS 08:37:51 And even beyond 50k 08:37:53 who got WSB involved? 08:38:34 anyways. Maybe I wait until he says no due to the proposal sounding like a hostage letter to Elon 08:38:34 They got involved after they got shafted dealing with GME 08:38:47 and then buy some more 08:44:09 Hey guys got a question about Kovri... what happened to it?
Why it’s not yet set as default into Monero? 08:44:09 • Which options can users use to break the link between their Monero activity and their identity? 08:46:42 * Hey guys got a question about Kovri... what happened to it?
Why it’s not set as default into Monero? 08:46:42 • Which options can users use to break the link between their Monero activity and their identity? 10:05:39 Bonjour all 10:05:59 So what ports do I need to forward if I want to host a node? 10:06:04 I want to host one on my spare ubuntu machine 11:06:54 Hi ForestMapper Take a look at this guide: https://sethsimmons.me/guides/run-a-monero-node/ 11:20:12 Do y'all recommend using Veracrypt or Age to encrypt files? 11:23:45 angrymonkeyboi[m: i recommend to run full disk encryption. and if you have alot of coins to have dedicated computer just for that 11:24:29 That's a must, yes. But I want to backup to other computers 11:24:52 in case I drop coffee on mine or it gets stolen 11:26:37 Encrypt your other computers as well! In fact I have no unencrypted device because why should I? 11:27:29 If you want to double encrypt so that the backups are save even if your computer gets hacked I use gpg with symmetric encryption. 11:27:55 yes, of course 11:28:22 I want to throw my encrypted file up on multiple cloud providers. just to be extra sure it's not going to disappear 11:30:25 yeah then I would use gpg. I use "gpg --output backup_file.tar.zst.gpg --symmetric backup_file.tar.zst" 11:30:28 I have been doing research on this, and multiple people have recommended not using gpg as it has many outdated defaults, and is difficult to configure correctly 11:31:09 Oh ok well I didn't really dive into it. May be right. 11:31:12 mostly people on /r/crypto 11:33:10 * endor00[m] sent a long message: < https://matrix.org/_matrix/media/r0/download/matrix.org/srlmFwITUPEVfllWDLYEBzKJ/message.txt > 11:33:31 angrymonkeyboi this should be a decent config ^ 11:37:24 Ahh. I'm interested in symmetric encryption 11:37:45 I'm currently leaning towards age, as it's pretty slick 11:38:39 The "default preference list" line affects symmetric encryption as well, by prioritizing AES256 11:39:32 You can look at the bettercrypto.org link if you want to see a full explanation of each line 11:41:07 I think there were a couple more things about gpg that weren't very good that I don't currently recall (besides default algo) 11:41:15 i'll see if I can find the thread on reddit 11:41:43 But it seems like the prevailing recommendation is to either use veracrypt or age 11:41:51 https://github.com/FiloSottile/age seems hella slick, but it's kinda new 11:42:33 Lots of people complaining about gpg, mostly because they completely miss the point of it 11:43:09 Gpg has the ultimate flexibility, in exchange for some complexity 11:52:29 what's wrong with prioritizing AES256? 11:59:07 is there any reason that monero seems to be more stable than many other high-profile cryptocurrencies at the moment? 11:59:17 it might just be an inexplicable coincidence 11:59:23 but the relative stability sure is nice for its usability 12:02:18 Possibly because a number of cryptos are just fork with shit added on top and no work stabilising the code afterwards. 12:02:19 We attract less edgy meme lords so no 🚀🚀🚀🚀 12:02:36 Takes to to iron out all the bugs. 12:02:40 *Takes time 12:03:04 And even then, monero isn't immune by any means. 12:04:11 monero is only stable against fiat. while fiat is in a inflationary collapse ... 12:05:50 i guess that's a fair assessment :P 14:58:54 anybody here 15:00:07 ningli[m], on the wallet you can choose restore height 15:00:13 try setting it to 0 15:00:25 maybe you´re not scanning the whole blockcahin 15:00:29 or the correct one 15:00:46 alright 15:00:48 also which blockchain explorer you are using ? 15:01:00 i use the mymonero wallet 15:01:10 the online one ? 15:01:11 https://xmrchain.net/myoutputs 15:01:37 there was a scammy one if I recall correctly 15:02:38 does the tx show confirmation on xmrchain.net ? 15:02:58 at the begining,i used the monerujo to receive funds,but i cant received it,so i use other wallet to recovery the address from seed,but i cant see my funds in any wallet,that's all about it 15:04:28 Did you create the wallet on mymonero, or create it elsewhere then import it ? 15:04:36 truth 15:04:38 yes, i just input my address and view-key, and i really saw this transaction 15:04:54 i create on monerujo 15:05:15 a light-wallet on Droid 15:05:56 erm 15:06:03 I do not compute 15:06:29 ningli[m]: do you have the transaction hash for the incoming funds? 15:06:38 yes 15:07:05 ef7f913086f7c66c0a60badf5a91fb2009e88cc02758ebc657c4ff8cc51b34a8 15:07:07 you can put it into xmrchain.net then along with your wallet addr and private viewkey (note: you are disclosing that to a third party) 15:07:41 and it can tell you whether or not your viewkey 'owns' any of the outputs in the transaction 15:08:00 yes 15:08:13 i have seen the tx in that way 15:08:57 but once i use the wallet-app,there is no record and funds... 15:09:04 ningli[m]: did you know that if you share your transaction hashes, IRC automatically replaces them with stars? look: **************************************************************** 15:09:09 just trolling 15:09:40 oh 15:09:44 i dont know 15:09:47 it's a joke 15:09:55 it's my first time to use this website 15:10:01 ningli[m]: as for the transaction maybe you saw the transaction like that but you have to see if your viewkey owns the output(s) 15:10:02 ningli[m], try on monerujo use a remote node and set restore height 2301564 15:10:09 alright,i'm laughing 15:10:13 ningli[m]: +1 15:10:57 hold on please 15:11:47 but what endogenic suggested would be even better (although leaking the viewkey to 3rd party) 15:13:12 * ningli[m] uploaded an image: FireShot Capture 003 - xmrchain.net monero explorer - xmrchain.net.png (49KiB) < https://matrix.org/_matrix/media/r0/download/matrix.org/BSJmgTjolyZgtNTSvcvuRXuE/FireShot Capture 003 - xmrchain.net monero explorer - xmrchain.net.png > 15:13:47 omg 15:14:12 :\ 15:14:42 so the tx really happened 15:15:15 Did you try "< kico> ningli[m], try on monerujo use a remote node and set restore height 2301564" ? 15:15:50 i will try your suggestions,cot minutes 15:15:51 yeah if you do that you can see if its there or if (hopefully not) it was sent somewhere else meanwhile 15:16:30 Might have to rescan if setting restore height on an already synced wallet, not sure how monerujo works. 15:16:39 i never share my privatekey or recovery-seed to anybody 15:16:48 Good :) 15:17:31 it confusing me for all afternoon... 15:18:14 thank you guys! I ll try and come back soon 15:18:26 good luck! 15:35:31 i want to know if i use A wallet to receive funds and use another B wallet to recover, 15:35:31 can I still see the transfer record? but i cant even see the transfer record on the A wallet... 15:38:07 i cant see the output tx history even if i recovery an address, right? 16:04:49 whats doin? 16:11:03 i believe all transaction history will be lost 16:11:04 but the account total should be correct. 16:38:39 If A and B are different keys, then obviously not. If A and B are the same seed recovered twice, yes. 16:39:22 Within a wallet, subaddresses are deterministic, so if you recover a wallet, you'll see txes to/from its subaddresses too. 16:54:07 it‘s been solved, i just do like whatendogenic: said 16:54:18 thank you guys so much 16:57:27 :) 16:57:31 yw 16:58:30 what the yw means 16:58:35 yes! well? 16:58:55 You're Welcome 16:59:21 ok 16:59:29 :) 17:03:04 you wussie ? 17:06:03 yeti wookie 17:12:06 ehe kico 17:13:35 ? 17:13:45 sup 17:19:36 same old same old 17:19:41 how about you ? 17:20:20 same 17:20:34 :) 17:21:36 Recursive mining 17:21:36 There are a bunch of transactions in every mempool. The coinbase transaction is part 17:21:36 of the master block header, and is not in the mempool. Each mempool has to a high 17:21:36 degree of percentage the same transactions as every other mempool. The transactions 17:21:36 are the most important elements in this system because without users there is no 17:21:37 system. And without transactions from the users in the system, the miners are less 17:21:39 motivated to mine blocks, because the rewards are less. Transactions with higher fees 17:21:41 should be prefered. So in each mempool the transactions are sorted first in ascending 17:21:43 order by the fees. The second sorting criteria also in ascending order is by the sha 256 17:21:45 hash. 17:21:47 Each miner after finding a block wants to propagate that block in the system with the 17:21:49 minimum information as possible. Let every mempool have the same amount of full 17:21:51 slave blocks. Each miner only deals with full slave blocks. Let that number be n. 17:21:53 Let k miners start all mining at the same time. Each miner takes j transactions ( j = 17:21:55 2000 as refered to above ), and fills a slave block, takes it’s hash and appends that 17:21:59 hash to the master block. And starts mining the master block. 17:22:01 After some proof of work, he propagates the first slave block to some of it’s connected 17:22:03 neighbor miners. This can also be in a compact form. The neighbor miners receive the 17:22:05 xslave block and recognize all the transactions within it. The miner also sends a nonce 17:22:07 with the master block header having a low hash value to prove that this is no spam. 17:22:09 The neighbor convinced that it is no spam, sends the same slave block back to that 17:22:11 neighbor. Also with a master block header and a certain nonce proving also that this 17:22:13 reply is no spam. 17:22:15 Proving therefore that he aswell is working on the first same slave block. The miner 17:22:17 receives the same slave-block back and gets interrupted in the mining process. 17:22:19 Because he wants more fees. Therefore he will work on the second slave block, wich 17:22:21 implies the addition of a second hash in the hash list and the modification of the merkle 17:22:23 root. As this changes the master block header, the mining process has to restart for 17:22:25 finding a new nonce. 17:22:29 Each miner is incentivized to interrupt the other miners because that way they have to 17:22:31 start from a new round effort. 17:22:33 After this being done n times there are not enough transactions left in the mempool 17:22:35 to fill another slave block. Therefore each miner having already n slave blocks starts 17:22:37 mining the final master block. When the hash of the master block reaches a certain 17:22:39 low target it gets propagated. Now every node receiving the master block with it’s 17:22:41 hashes of the slave blocks knows wich transactions are within each slave block. Each 17:22:43 miner is also incentivized to be as online as possible reducing therefore the head start 17:22:45 that the miner that found the master block has. 17:22:47 Each miner can choose how many slave blocks to put in it’s master block. So each 17:22:49 miner can partition it’s mining process into n mining sections. Thus each miner has 17:22:51 naturally a mining vector. 17:22:53 How many slave blocks will be mined in average is then a very dynamic and interesting 17:22:55 number. 17:22:59 This model assumes that the underlying incentives are all aligned. The most important 17:23:01 incentive is that the miner wants to propagate the master block with the least amount 17:23:03 of information through the network. 17:23:05 The first visible attack is that miners will just disrupt the others by sending them spam 17:23:07 master blocks. 17:25:49 Why not just link a pastebin or something? 17:26:01 yeah 17:31:28 Or get it published and send me the book 17:37:17 thats not the first time hes done that... 17:37:25 i dont get why.. 17:41:35 lol 17:52:58 i have been translating ztm all day long... 17:53:17 to portuguese 17:54:10 and i was wishing for a rude straight denial of that concept of recursive mining. 17:54:28 i should have used pastebin... 17:54:38 i apologize 17:57:05 I appreciate the apology, but slave_blocker isn't around now to see me mention that. 18:12:25 heyyy 18:12:31 I'm using a proper client now 18:12:39 test 18:13:19 test 18:13:21 test 18:13:41 ls 18:16:01 test 18:16:02 icles 18:16:07 test 18:16:11 testicles 1 2 18:16:20 how can I join multiple pools on irssi 18:16:37 you mean /join #freenode ? 18:16:43 channels vs pools? 18:16:45 i'm in freenode 18:16:48 i meant channels 18:16:52 that's what she said 18:17:05 you need to know what channel you're looking for or search 18:17:13 like what kind of channel do you want 18:17:15 i want to be in #monero and #monero-pools at the same time 18:17:25 how do i join both at the same time? if i do /join monero-pools it will dc me from here 18:17:28 then type /join #monero-pools 18:17:36 then you got shitty client 18:17:36 then i will leave here 18:17:38 :/ 18:17:48 you must have multiple tabs or way to switch 18:18:12 https://quadpoint.org/articles/irssi/#:~:text=To%20switch%20between%20windows%20in,have%20more%20than%2019%20windows. 18:18:40 "1. To switch between windows in Irssi, use Alt-#, where # is 0-9. Windows start at number 1, and Alt-0 goes to window number 10. You can use Alt-q through Alt-o for windows 11 to 19. It is possible to have more than 19 windows. Use Alt with the arrow keys to scroll through the windows." 18:19:00 so alt-0 alt-1 i'd guess 18:19:07 i dont use irssi 18:19:31 i use hexchat & there is channel tree on left or tabs on top 18:37:43 ForestMapper: What client do you use? 18:49:58 What's the best way to benchmark devices? 18:51:38 i hoped that the Phoronix suite could answer that. ended up just downloading xmrig 18:51:45 Throw them against the wall and see which one breaks first 18:52:07 What do you want to benchmark?? Their durability? Water resistance? Memory speed? 18:56:09 Ah sorry hash rates 18:57:17 I just want to see what various hardware can do without having to actually connect to the network 18:57:47 So some approximation of hash rates for randomX 19:18:02 is fluffy donkey related to fluffy pony 19:20:42 he's his father 19:31:45 lol 19:36:04 xmrig.com/benchmark 19:36:51 Thanks 19:37:03 The network connection to the pool is probably negligible, especially when you consider the impact of all the other things going on in the background of the OS 19:37:04 I probably have to write my own clients if I want anything more specific than that