01:18:08 just_another_day:matrix.org: If you care about the FUD, I'd recommend to at least read my original post that started it. Because AI slop posts followed and usual Reddit plebs can have many misconceptions, but to effectively fight the FUD/to resolve the concerns (choose what you like more) one has to understand the core issue. It's not misconceptions alone [... too long, see https://mrelay.p2pool.observer/e/6tm33eAKb25wWEFs ]
01:18:08 just_another_day:matrix.org: https://www.reddit.com/r/Monero/comments/1qhh50x/is_optional_transparency_good_for_monero
01:18:08 just_another_day:matrix.org: You can also read my comments if you want - there are a bit more additional thoughts.
01:31:52 ofrnxmr:xmr.mx: Who are you talking to
01:35:17 just_another_day:matrix.org: whoever
01:47:04 just_another_day:matrix.org: MRL members, as they'll discuss it tomorrow
01:59:06 DataHoarder: There was already some discussion in #monero-research-lounge if you want to take a look - specially around misconceptions
01:59:45 DataHoarder: (also I used bad nomenclature in some of the explanations myself - but they were equivalent)
02:01:50 ity:itycodes.org: I should read XMR's crypto, the above convo about crypto seemed fun
02:02:52 ity:itycodes.org: I always put it away assuming I'm too stupid for it
02:03:03 just_another_day:matrix.org: DataHoarder: Thank you. I'll check this out
02:04:29 DataHoarder: as usual, Zero to Monero 2.0 https://www.getmonero.org/library/Zero-to-Monero-2-0-0.pdf for pre-FCMP++ stuff
02:05:00 DataHoarder: there's no update for FCMP++ but it changes quite some underlying (no more rings, so statistical analysis based on rings or outputs cannot be done)
02:05:15 just_another_day:matrix.org: DataHoarder: I've read it partially
02:05:20 ity:itycodes.org: FCMP++?
02:05:30 DataHoarder: I mean for ity
02:06:00 DataHoarder: yes, the part of the next monero upgrade that between others replaces ring with decoys for full chain membership proofs
02:06:18 DataHoarder: tl;dr the entire chain is your decoys instead of 15+1 sampled outputs
02:06:40 DataHoarder: https://www.getmonero.org/2024/04/27/fcmps.html
02:07:27 ity:itycodes.org: For context, my cryptography background is mostly working on chat protocols (mostly Matrix, the E2EE and trying to fix a bunch of the core protocol vulns)
02:07:36 DataHoarder: though some parts listed here are not FCMP++ intrinsic but due to upgrades elsewhere (the carrot tx output format, for legacy and any new wallet) and also the new Carrot wallet that has generate image keys and OVK, which is what people are discussing
02:08:01 DataHoarder: (though the wallet part is not a hardfork item per se)
02:08:06 DataHoarder: yeah Zero to Monero is good for you then
02:08:36 DataHoarder: it lists what it does instead of assuming you know what that means in ed25519 or similar
02:08:43 just_another_day:matrix.org: what was confusing to me when I was reading zero-to-monero is that it doesn't provide proofs of schemes being secure. It only illustrates their correctness
02:08:59 ity:itycodes.org: Yai, I shall try to read it, it's quite long so I hope I can get it past my ADHD
02:09:10 DataHoarder: yeah, the proofs are in external papers
02:09:34 DataHoarder: Zero to monero is an explanation, the proofs ... are vastly longer
02:09:41 just_another_day:matrix.org: you can't do crypto without the proof, right?
02:10:05 DataHoarder: but again, zero to monero is an explainer
02:10:07 DataHoarder: the proofs for example for bulletproof+ is way longer and theoretical
02:10:09 DataHoarder: one secx
02:10:36 ity:itycodes.org: Ya ECC stuff I'm decently well familiar with > <DataHoarder> it lists what it does instead of assuming you know what that means in ed25519 or similar
02:10:39 DataHoarder: https://eprint.iacr.org/2020/735.pdf
02:10:43 DataHoarder: which builds on the original Bulletproofs paper https://eprint.iacr.org/2017/1066.pdf
02:10:49 ity:itycodes.org: I'm mostly used to reading specs
02:11:18 DataHoarder: MRL gathers related papers in the library https://moneroresearch.info/
02:11:25 ity:itycodes.org: Tho, well-written specs (like Signal), not horribly written abominations (like Matrix's Olm & Megolm)
02:11:43 DataHoarder: not all directly tie to monero but they are kept for research
02:12:10 DataHoarder: yeah... monero has a log of baggage from cryptonote original
02:12:12 DataHoarder: lot*
02:12:31 ity:itycodes.org: Cryptonote?
02:12:43 DataHoarder: oh, nice link for FCMP++ related papers https://moneroresearch.info/index.php?action=list_LISTSOMERESOURCES_CORE&method=keywordProcess&id=125
02:13:13 DataHoarder: yeah. it's what Monero comes from https://www.getmonero.org/resources/research-lab/pubs/cryptonote-whitepaper.pdf
02:13:21 DataHoarder: (annotated https://www.getmonero.org/resources/research-lab/pubs/whitepaper_annotated.pdf )
02:13:45 DataHoarder: much has changed from this ^ anyhow
02:14:35 just_another_day:matrix.org: DataHoarder: a nice paper
02:15:36 just_another_day:matrix.org: @just_another_day:matrix.org: is this true?
02:16:03 just_another_day:matrix.org: how do you know what you're doing makes sense if you don't do proofs?
02:16:07 DataHoarder: you can't invent arbitrary stuff by feels
02:16:15 DataHoarder: it is proven and audited
02:17:07 DataHoarder: but again, your question was on "zero to monero doesn't have proofs" cause it's an explainer. the external in-depth papers have the proofs, but you may need to be in certain fields of mathematics to look at them in depth
02:17:39 just_another_day:matrix.org: i'm ok with zero to monero not having proofs. I understand that's an explainer
02:21:32 DataHoarder: example on CLSAG proofs https://www.getmonero.org/resources/moneropedia/clsag.html + https://www.getmonero.org/2020/07/31/clsag-audit.html
02:22:47 ity:itycodes.org: Ahh > <DataHoarder> yeah. it's what Monero comes from https://www.getmonero.org/resources/research-lab/pubs/cryptonote-whitepaper.pdf
02:24:35 ity:itycodes.org: DataHoarder: Which specific fields ?
02:24:35 ity:itycodes.org: (I'm curious if I'll be able to follow them or not due to mostly doing abstract algebra)
02:25:31 DataHoarder: some of the ring signatures extend well across iterations from original
02:25:40 DataHoarder: (I implemented them as well in go)
02:26:04 DataHoarder: bulletproofs are quite far away from any of the knowledge, I have to gain more bases first
02:26:34 DataHoarder: I know and understand what they do and the way they get to do it but ... yeah no the proofs end up too far
02:26:49 just_another_day:matrix.org: I was just curious about how MRL designs cryptography for Monero. I have the idea that you adapt existing research. Do you write proofs by yourself? If not, how do you know the design makes sense? Just because of a general understanding how a proof would look like?
02:27:15 DataHoarder: I don't write proofs, it's not YOLO lol
02:27:43 DataHoarder: MRL doesn't always write the research, either. there's a wider cryptography field than monero
02:28:18 ity:itycodes.org: Haha yolo proofs
02:28:49 just_another_day:matrix.org: so vibe designing?
02:28:59 ity:itycodes.org: Huh?
02:29:02 DataHoarder: I can't get to you can I
02:29:09 DataHoarder: again, literally open the paper
02:29:22 DataHoarder: Bulletproofs paper for example is written mixed https://irc.gammaspectra.live/81af2584a22f151f/image.png method -> theorem -> proof writing
02:29:42 DataHoarder: proving that each part holds true along the way
02:30:20 DataHoarder: Many build up on previous papers with proofs on theorems they use
02:30:34 just_another_day:matrix.org: you don't have to explain this
02:30:45 just_another_day:matrix.org: i was asking about Monero-specific cryptography
02:30:47 DataHoarder: > Corollary 2 (Range Proof). The range proof presented in Section 4.1 has perfect completeness, perfect special honest verifier zero-knowledge, and computational witness extended emulation.
02:30:47 DataHoarder: > Proof. The range proof is a special case of the aggregated range proof from section 4.3 with m “ 1. This is therefore a direct corollary of Theorem 3.
02:31:09 DataHoarder: Monero specific cryptography is no different
02:31:11 DataHoarder: it's applied cryptography, usually around edwards25519 curve
02:31:21 DataHoarder: one of the elliptic curves of all time
02:31:58 just_another_day:matrix.org: what's applied cryptography?
02:32:21 DataHoarder: some people don't have the urge to seek knowledge on their own
02:32:42 DataHoarder: Bulletproofs for example is a general ZK proof that extends range proofs to general circuits
02:33:05 ity:itycodes.org: > https://eprint.iacr.org/2019/654
02:33:05 ity:itycodes.org: Yep I'm also missing background knowledge for this x3
02:33:05 ity:itycodes.org: Tho not as much as I would expect
02:33:13 DataHoarder: Monero then set them up specifically just for range proofs in the context of ed25519 and its field
02:33:43 DataHoarder: ity: recommendation is to start with ring signatures as originally done in monero/cryptonote
02:33:45 DataHoarder: then go from there
02:34:13 DataHoarder: to MLSAG then CLSAG
02:35:12 DataHoarder: https://en.wikipedia.org/wiki/Ring_signature
02:35:17 ity:itycodes.org: Yea first time hearing of ring signatures and now I wanna look into them more
02:35:17 ity:itycodes.org: And seeing if I can use that to fix some holes in some of the chat protocols I designed
02:35:43 ity:itycodes.org: My first reaction when googling it was "oh yes more cryptography magic"
02:36:45 DataHoarder: 03:32:50 <br-m> <just_another_day:matrix.org> what's applied cryptography?
02:36:45 DataHoarder: applied X is the practical implementation of algorithms or protocols related to X
02:37:47 DataHoarder: theoretical cryptography -> applied cryptography (where specifics or interaction with existing systems, and transfer to pseudocode-looking or mathematical formulation that can be used to write code with)
02:38:32 ity:itycodes.org: @ity:itycodes.org: In fact it already partially fixes the deniability issue I had with the way I was fixing the homeserver puppeting room takeover vuln of matrix
02:38:32 ity:itycodes.org: Stars I got nerdsniped into designing a thing just by hearing of a cool new crypto primitive
02:38:48 ity:itycodes.org: Tho ig that's too offtopic, sorry
02:40:17 ity:itycodes.org: The introduction is actually comprehensible for me unlike the abstract, I like it > <@ity:itycodes.org> > https://eprint.iacr.org/2019/654
02:40:27 just_another_day:matrix.org: Am I correct that when you design a Monero-specific cryptographic scheme, you take an existing theoretical cryptographic scheme, adapt it to Monero in a way that "feels right" and conduct an external audit to make sure it's secure?
02:40:27 just_another_day:matrix.org: It's not an offensive question, I'm just curious
02:40:37 DataHoarder: in a way that "feels right"
02:40:37 DataHoarder: no
02:41:05 DataHoarder: you adapt it in a way that complies with the proof conditions mathematically
02:41:06 just_another_day:matrix.org: then how?
02:41:08 DataHoarder: it's a proof, with set expectations/ranges/preconditions
02:41:21 DataHoarder: what do you mean HOW?
02:41:35 just_another_day:matrix.org: I see
02:41:50 DataHoarder: if you understand the mathematics you can prove that the applied construction is equivalent to the proof
02:42:04 just_another_day:matrix.org: What about CLSAG?
02:42:19 just_another_day:matrix.org: It was created by MRL, wasn't it?
02:42:20 ity:itycodes.org: DataHoarder: In theory
02:42:24 DataHoarder: there's also https://en.wikipedia.org/wiki/Automated_theorem_proving
02:42:54 DataHoarder: read up https://eprint.iacr.org/2019/654.pdf
02:43:03 ity:itycodes.org: DataHoarder: Nooooooo cries
02:43:03 ity:itycodes.org: (This is basically my direct field of study)
02:43:29 ity:itycodes.org: I work on proof assistants mostly
02:43:54 just_another_day:matrix.org: DataHoarder: so MRL is writing proofs after all
02:44:06 DataHoarder: It walks through the theorems and lemmas, and proves them directly or by referencing previous work
02:44:36 DataHoarder: you are again misunderstanding how stuff works
02:44:38 DataHoarder: it's not A -> B
02:44:48 DataHoarder: but B -> A from the underlying proofs you can build A
02:46:18 just_another_day:matrix.org: I didn't say it's A -> B
02:48:06 just_another_day:matrix.org: sorry I said you meaning Monero devs, not yourself DataHoarder > <@just_another_day:matrix.org> I was just curious about how MRL designs cryptography for Monero. I have the idea that you adapt existing research. Do you write proofs by yourself? If not, how do you know the design makes sense? Just because of a general understanding how a proof would look like?
02:48:23 DataHoarder: this is a wider field so I have no idea what resources to even point you to, anyhow https://en.wikipedia.org/wiki/Mathematical_proof
02:48:46 just_another_day:matrix.org: I know what a proof is
02:49:35 DataHoarder: then see how you achieve these for your theorems there
02:50:08 DataHoarder: I'm not even that far down the line (compared to ity working on proof assistants) but there's a missing piece you seem to lack here, just_another_day, given you ask "how do you prove something"
02:51:26 just_another_day:matrix.org: that's funny
02:52:10 just_another_day:matrix.org: I was asking about how MRL designs cryptographic schemes, because I thought they do that without writing proofs
02:52:26 just_another_day:matrix.org: If they do write proofs, I don't any questions
02:52:38 just_another_day:matrix.org: Proofs for Monero-specific schemes, that is
02:52:42 DataHoarder: the obvious answer is by knowing far more than me on the specific field of cryptography and mathematics 😅
02:53:10 DataHoarder: Monero-specific schemes are not that far from general elliptic curve, just the focus
02:55:11 DataHoarder: on unrelated topic https://crypto.stackexchange.com/questions/71053/soft-question-what-are-examples-of-beautiful-proofs-in-cryptography
02:55:23 DataHoarder: I choked at the classic ECB one
02:56:05 DataHoarder: Proof: [image of tux encrypted using ECB mode of operation]
02:57:46 DataHoarder: also when searching, a cryptographic proof or cryptographic proving it means using cryptography algorithms or methods to prove something not the mathematical proof of the algorithm :)
02:58:27 just_another_day:matrix.org: do you write proofs for cryptographic proofs? :)
03:00:19 just_another_day:matrix.org: DataHoarder: that's a good one
03:00:28 just_another_day:matrix.org: the tux
03:00:41 kayabanerve:matrix.org: DataHoarder: There's the FCMP++ technical overview.
03:01:06 kayabanerve:matrix.org: (for after ZtM)
03:01:50 DataHoarder: it's a moving target still given changes on tx output derivations for example :)
03:02:07 DataHoarder: but yeah, I guess it'll get more defined as things freeze
03:02:43 kayabanerve:matrix.org: Monero, generally, has looked for proofs which meet a desired statement. See the usage of Bulletproofs' range proof within Monero's RingCT, and evolution to Bulletproofs+.
03:03:23 kayabanerve:matrix.org: With FCMP++, we proved the proof system underlying Curve Trees (Generalized Bulletproofs) secure, and did adapt the arithmetic circuit to the statement defined in the FCMP++ composition.
03:03:42 kayabanerve:matrix.org: The FCMP++ composition was reviewed and proven secure, along with its SA+L proof.
03:04:12 DataHoarder: ^ listen up just_another_day from the source themselves
03:04:31 kayabanerve:matrix.org: The SA+L proof was something I designed and put forth, concatenating a BP+ IPA (n=1) with a GSP, both existing proofs to a statement. Their concatenation achieved the statement necessary within the composition, and again, reviewed and proven secure.
03:05:22 kayabanerve:matrix.org: CLSAG was in-house. I believe Borromean was posited as a range proof. I can't comment on MLSAG. I know there's a paper for RingCT, which I think MLSAG may have been part of?
03:05:39 kayabanerve:matrix.org: And then all protocol-level cryptography before then was CryptoNote.
03:05:43 DataHoarder: yes, it was part of RingCT paper
03:06:02 kayabanerve:matrix.org: So Monero's modus operandi wasn't really part of that, other than the modus operandi being to start by forming CN.
03:06:37 DataHoarder: and RingCT applied Pedersen commitments + MLSAG to build what we had
03:07:08 kayabanerve:matrix.org: While Monero cryptography may be messy and disorganized due to the amount of contributors of various backgrounds, I wouldn't present leading questions (or questions which come off as leading questions) which imply it may be insufficiently reviewed before deployment.
03:08:29 just_another_day:matrix.org: I know that Monero does audits
03:08:35 just_another_day:matrix.org: So I wasn't implying that
03:09:26 kayabanerve:matrix.org: You said your question wasn't meant to be offensive, but it still asked if development was vibes-based before an external audit.
03:09:48 kayabanerve:matrix.org: I would say no, research is research and review occurs until satisfactory.
03:10:34 just_another_day:matrix.org: If I recall correctly, your proposal for FCMP++ was initially without proofs?
03:10:58 kayabanerve:matrix.org: This is the part on accusing of seeming leading.
03:11:18 kayabanerve:matrix.org: *I'm accusing
03:11:35 just_another_day:matrix.org: Leading for what?
03:11:57 kayabanerve:matrix.org: DataHoarder[m]: What's the term I'm looking for?
03:12:11 just_another_day:matrix.org: You're being paranoid
03:12:30 kayabanerve:matrix.org: Re: social behavior where one tries to appear honest and helpful while actually being antagonistic.
03:12:36 nioc: <just_another_day:matrix.org> so vibe designing? <<>> hmmm
03:12:57 DataHoarder[m]: @kayabanerve:matrix.org: idk, it's late and I think there is a disconnect in how the conversation goes with thankful_for_xmr given previous days
03:12:59 kayabanerve:matrix.org: Eh, @just_another_day:matrix.org: you could just be rubbing me the wrong way, but you seem to present yourself in good faith while not acting in good faith.
03:13:05 kayabanerve:matrix.org: Yes, my research and proposal for FCMP++ was without proofs. I am not someone who has written a security proof.
03:13:05 kayabanerve:matrix.org: The FCMP++ paper lacks proofs directly to this day.
03:13:21 kayabanerve:matrix.org: The proposal was always intended to have review and security proofs however, which we've done extensive work on.
03:13:30 DataHoarder[m]: it takes several messages to get the point across if you see previous conversation here a couple days ago
03:14:25 kayabanerve:matrix.org: The proposal also derived from Curve Trees, BP+, and GSP. All three were prior art, the latter two proven. FCMP++ was solely their intelligent composition, though it did modify the arithmetic circuit.
03:15:18 kayabanerve:matrix.org: Aaron Feickert, who worked at Cypher Stack, a company described as being created to offer employment on paper to Monero researchers, proved the composition secure and the BP+ + GSP composition as satisfying the SA+L statement.
03:15:53 kayabanerve:matrix.org: Feickert and Goodell have both worked on the underlying Generalized Bulletproots, Goodell currently at Cypher Stack.
03:16:12 kayabanerve:matrix.org: The optimization with divisors had extensive review from Cypher Stack and Veridise.
03:16:48 kayabanerve:matrix.org: Feickert audited the current GBP implementation. Veridise reviewed the circuit and audited its impl on top of the audited GBP lib. They also provided a variety of formal proofs.
03:17:30 kayabanerve:matrix.org: Sealioning? https://en.wikipedia.org/wiki/Sealioning
03:18:00 nioc: just read the MRL meeting logs for the past year or more and you will understand how the process works
03:18:04 nioc: no idea why you think things are done unseriously
03:18:09 kayabanerve:matrix.org: @just_another_day:matrix.org: I don't actually want to be a dick to you for no reason. Your questions come off, to me personally at least, as in bad faith.
03:18:10 DataHoarder: that may be too far kayabanerve I think there's a better term
03:19:12 kayabanerve:matrix.org: If you are trying to act in good faith, I'd recommend revisiting how you phrase your questions. You don't have to, you do you, but as of right now, to me personally, it comes off as antagonistic which isn't optimal for a civil discussion.
03:20:35 just_another_day:matrix.org: you have a ground to think this way given my activity on Reddit
03:20:57 kayabanerve:matrix.org: Yeah, I'm trying to caveat this as it could just be me, and I'm sorry if so, but also, I'm tired in _general_ of people who claim to be in good faith and just want to cause trouble.
03:20:58 kayabanerve:matrix.org: There was an asshole a month ago who took every opportunity possible to praise me while also turning people away from me.
03:20:58 kayabanerve:matrix.org: "Kayaba works on so many things, it's incredible! That's why we should be patient and wait, because they're so busy, it may be a while. In the mean time, check out X"
03:21:26 kayabanerve:matrix.org: Then I banned that guy and a few days later my server was raided with Naziism and absolute bs.
03:22:23 kayabanerve:matrix.org: So my personal issues with an individual from about a month ago, the recent OVK drama (which we can just be on opposite side of the coins of), _and_ these questions seeming to suggest Monero is vibe-based is why I'm being so critical here.
03:22:32 just_another_day:matrix.org: I mean, my question is pretty neutral > <@just_another_day:matrix.org> I was just curious about how MRL designs cryptography for Monero. I have the idea that you adapt existing research. Do you write proofs by yourself? If not, how do you know the design makes sense? Just because of a general understanding how a proof would look like?
03:22:52 DataHoarder: ^ in my opinion the answered with an example above
03:22:54 kayabanerve:matrix.org: That wasn't the one I minded
03:22:55 DataHoarder: they*
03:23:17 kayabanerve:matrix.org: And again, I'm sorry if I am just being unfairly critical of you.
03:23:25 just_another_day:matrix.org: I misunderstood DataHoarder's response
03:23:42 just_another_day:matrix.org: I thought he said that MRL doesn't always write proofs for their schemes
03:24:05 kayabanerve:matrix.org: https://github.com/monero-oxide/monero-oxide/tree/fcmp++/audits is my own collection of documentation regarding FCMP++
03:24:30 kayabanerve:matrix.org: Well, it's the monero-oxide FCMP++ audits folder, so it's the monero-oxide stuff + all the FCMP++ supporting evidence.
03:28:36 DataHoarder: I said they don't have to, as they take existing pieces just_another_day
03:29:07 DataHoarder: like, you aren't proving ECDLP
03:29:37 DataHoarder: ed25519 itself
03:30:41 DataHoarder: Bulletproofs, was developed externally afaik
03:32:07 just_another_day:matrix.org: I mean, even such a big project as Telegram released MtProto without a formal mathematical proof of security, as they mainly combined existing stuff
03:32:49 just_another_day:matrix.org: So I wasn't implying it's always bad
03:33:00 just_another_day:matrix.org: Just curious
03:33:07 DataHoarder: 04:04:34 <br-m> <kayabanerve:matrix.org> The FCMP++ composition was reviewed and proven secure, along with its SA+L proof.
03:33:21 DataHoarder: Telegram composed proven parts but the composition itself was/is flawed
03:35:52 DataHoarder: this whole conversation started from this > 03:09:36 <br-m> <just_another_day:matrix.org> what was confusing to me when I was reading zero-to-monero is that it doesn't provide proofs of schemes being secure. It only illustrates their correctness
03:35:56 DataHoarder: to this > 03:18:31 <br-m> <just_another_day:matrix.org> i'm ok with zero to monero not having proofs. I understand that's an explainer
03:36:36 just_another_day:matrix.org: it was confusing to me because I wanted to learn the cryptography in depth
03:36:46 kayabanerve:matrix.org: Though granted, my scope only intends to supplant CLSAG as seen in Monero. I even define an statement I say is analogous to the current role of CLSAG for which I say the FCMP++/ composition achieves via its two decomposed parts.
03:36:46 kayabanerve:matrix.org: For Monero as a whole, I believe there was an external researcher (PhD track?) who reviewed Monero as a whole.
03:37:15 kayabanerve:matrix.org: And then of course, there's also the considerations about the addressing protocol (CARROT soon™) and so on.
03:37:58 DataHoarder: JAMTIS soon™
03:38:21 just_another_day:matrix.org: you're assuming everything I say is somehow intended to criticize Monero
03:38:22 kayabanerve:matrix.org: JAMTIS would be quite the discussion...
03:40:42 just_another_day:matrix.org: when I really wanted to learn how the serious crypto™ is done
03:41:30 kayabanerve:matrix.org: @just_another_day:matrix.org: I'm not currently. I tried to answer your question before despite my frustration, and I've continued to comment on the topic since.
03:41:52 kayabanerve:matrix.org: I don't plan to hold it against you. I had a frustration due to my _perception_ of you and I raised it. I also apologized if it was on my end.
03:42:13 kayabanerve:matrix.org: I can iterate the exact messages that irked me or we can get back to the topic.
03:44:43 just_another_day:matrix.org: @kayabanerve:matrix.org: thank you for the explanation. I'm not that proficient in cryptography to understand the specifics.
04:09:14 sbt:nope.chat: fluffy fighting the fud https://redlib.perennialte.ch/r/Monero/comments/1qnwhru/relevant_reminder_monero_is_constantly_under/o22zdoq/?context=3
04:10:08 sbt:nope.chat: That fucking retard doesn't even understand what is timing correlation, glad we got fluffy
04:12:20 sbt:nope.chat: omg this AI fud slop got 200 upvotes https://redlib.perennialte.ch/r/Monero/comments/1qjqpgn/the_optional_transparency_trap_why_new_view_keys/
04:13:48 DataHoarder: I can't believe they got fluffy to answer on twitter multiple times but also get so annoyed moved to also answer on reddit
04:14:57 DataHoarder: > I don't understand why you're being so needlessly hostile
04:15:17 DataHoarder: yeah kayabanerve now this is sealioning
04:15:52 kayabanerve:matrix.org: if this is sealioning, why aren't there cute sealions I can pet? >:(
04:35:46 zero-ghost: any of the people running the monero.social matrix instance in here?
04:35:57 zero-ghost: or is there a specific room to contact them?
04:38:47 DataHoarder: what are you trying to contact about?
04:47:58 zero-ghost: im trying to get my contacts to spread out across different homeservers and wondering if there is any way to get a registration for one or two of them on this homeserver
04:48:15 zero-ghost: right now everyone is on matrix.org, we all know thats not great
04:48:44 DataHoarder: registrations are generally closed due to spam
04:49:07 zero-ghost: yea ive seen that the past few months of checking every now and then
04:49:20 zero-ghost: so i wanted to see if any of them were around in person and ask
04:49:23 DataHoarder: it may be possible, you can try in #monero-community or dm pigeons on IRC side
04:49:44 DataHoarder: (I am on IRC!)
04:49:51 DataHoarder: which you can also ask friends to do
04:50:01 DataHoarder: that gets them directly with puppets on the monero.social side
04:50:27 zero-ghost: hmm yea, but they are low/zero-tech people
04:50:42 zero-ghost: so having to worry about an IRC account and where its bridged etc etc
04:51:01 zero-ghost: and that room looks invite only
04:51:43 DataHoarder: maybe it was made like that after (again spam) incidents, maybe plowsof can shed some light. but it's reachable on IRC side
04:52:27 zero-ghost: mustve been
07:49:55 plowsof: community was invite only, made it public just now. monero social registration is disabled but accounts can/have been manually approved since
08:56:13 intr:unredacted.org: @kayabanerve:matrix.org: sealion -> sealioff
09:47:21 zero-ghost: plowsof: thats all good to hear, we are in no rush so I'll probably come back around in the next month or so and see if theres any manual approval up for grabs 👍️
11:57:50 pyratevevo:matrix.org: https://mrelay.p2pool.observer/m/matrix.org/zINRwchiIamlgDAzxLhpjpwt.png (13844.png)
11:58:05 pyratevevo:matrix.org: Based on true events.
12:39:24 intr:unredacted.org: is that your address? lmao
12:59:45 ofrnxmr:xmr.mx: Lol @datahoarder ^ > <@kayabanerve:matrix.org> Yeah, I'm trying to caveat this as it could just be me, and I'm sorry if so, but also, I'm tired in _general_ of people who claim to be in good faith and just want to cause trouble.
13:01:57 pyratevevo:matrix.org: @intr:unredacted.org: You bet.
13:01:57 pyratevevo:matrix.org: Wanted to hide the shotgun, but didn't know what to cover it with.
13:02:25 intr:unredacted.org: lmao
13:02:27 intr:unredacted.org: you hid the gun behind 16 potential guns
13:03:11 pyratevevo:matrix.org: Soon to be 100 million !
13:03:26 intr:unredacted.org: full metal jacket proofs
14:40:51 nioc: "when I really wanted to learn how the serious crypto™ is done" followed by "I'm not that proficient in cryptography to understand the specifics."
14:40:59 nioc: hmmmmm
14:42:41 just_another_day:matrix.org: There can be a general overview of the process instead of specific details. But never mind
14:43:57 nioc: sorry maybe I am a bit tired after many days of this
14:48:21 rucknium: > <@kayabanerve:matrix.org> Though granted, my scope only intends to supplant CLSAG as seen in Monero. I even define an statement I say is analogous to the current role of CLSAG for which I say the FCMP++/ composition achieves via its two decomposed parts.
14:48:21 rucknium: Probably you mean this as "reviewed Monero as a whole": https://moneroresearch.info/171 Cremers, C., Loss, J., & Wagner, B. (2023). A Holistic Security Analysis of Monero Transactions.
14:48:35 nioc: but I must say much learning has come from conversations like this whether genuine interest or from other motives because often much info comes out
14:48:43 everchange000:matrix.org: Aren't we all tired?
14:48:43 everchange000:matrix.org: Let's take a nap, rejuvinate our sense of Justice and get to work! 🤜🤛
14:48:44 nioc: thx DH
14:49:36 DataHoarder: fud never sleeps
17:07:50 DataHoarder: MRL meeting is in progress right now https://github.com/monero-project/meta/issues/1333 and the Carrot and OVK topic will be discussed at the end, feel free to observe @ #monero-research-lab and on https://libera.monerologs.net/monero-research-lab (it's a research focused channel, so direct questions or other items are better left for lounge or
17:07:52 DataHoarder: general monero channels)
17:08:24 DataHoarder: Meeting logs are provided afterwards on the github issue.