onledger.net

6.8K posts

onledger.net banner
onledger.net

onledger.net

@offledger

on ledger @ xahau ledger - All photographs of mine are copyrighted © and no permission is given for their use.

off ledger Entrou em Nisan 2021
157 Seguindo2.7K Seguidores
onledger.net retweetou
FMXRP - Fabio Marzella - XAO DAO
We’re almost there… 🚀 The first 1,000 members will form the founding governance layer of XAO DAO. This is the group that will help shape the first proposals and set the direction of the ecosystem. Use the referral tool in your wallet and help us push past the magic 1,000 members. Join now 👉 xaodao.io @XAODAOLLC
English
8
25
96
8.3K
Ripple
Ripple@Ripple·
Exciting milestone for @Ripple in Australia! 🇦🇺 Ripple is obtaining an Australian Financial Services License (AFSL). As we continue to bridge TradFi with the next gen of digital infrastructure, regulatory compliance remains the foundation of everything we build: on.ripple.com/4bnSCs9 With this license, we are doubling down on our commitment to Aussie financial institutions and enterprises, providing a fully regulated, end-to-end platform to move value faster and more efficiently than ever before.
English
286
1.4K
5.6K
549.6K
onledger.net retweetou
Andrei Rosseti
Andrei Rosseti@andreirosseti·
It's good to remember how we started, running a hotpocket single node was something so distant 1 year ago for me. Now being part of the Evernode ecosystem, supporting growth in some way, is very rewarding, happy to be here.
Andrei Rosseti@andreirosseti

🚀 Running Evernode natively! @EvernodeXRPL isn’t just theory... it runs. Client fully synced, contract execution enabled, real HotPocket node live 🔥 Let’s bring ideas to life on the most advanced decentralized compute layer. #Evernode #Xahau #XRPL #DePIN #HotPocket

English
2
10
53
4.8K
onledger.net retweetou
Evergram
Evergram@evergramhq·
Evergram is live. Fully encrypted messaging for Web3. No central message database. End-to-end encryption by default. Try it via Xaman xApp or web: evergram.app
Evergram tweet media
English
30
70
217
60.1K
onledger.net
onledger.net@offledger·
@RealGrapedrop This test was not on the XRPL, it was using payment channels and ODL, settlement of those transactions was done in bulk. ODL settlement often took hours so as to not cause price spikes. There has NEVER been an occasion where the public XRPL has attained 50,000tps, EVER.
English
0
0
1
79
𝐆𝐫𝐚𝐩𝐞
𝐆𝐫𝐚𝐩𝐞@RealGrapedrop·
Have you ever wondered if the XRPL can handle real volume? Here's the math. The ledger closes every 3 to 5 seconds. It sustains 1,500 transactions per second today. That's 129 million transactions per day without breaking a sweat. In 2021, Ripple and Pyypl pushed the public XRPL past 50,000 transactions per second while maintaining 3 to 4 second settlement. That's 4.3 billion per day. For comparison, Visa averages around 1,700 per second (max ~65,000). Ethereum does 15 to 30. Bitcoin does 7. 🐢 Ripple CTO David Schwartz said it best. "We still don't know how high the limit is." Right now the ledger processes about 1 million transactions per day. It's running at less than 1% of its tested capacity. The infrastructure isn't the bottleneck. Adoption is. Sources: highscalability.com/ripple-the-mos… btcpeers.com/xrp-stress-tes…
𝐆𝐫𝐚𝐩𝐞 tweet media
English
8
21
115
6.8K
onledger.net
onledger.net@offledger·
@ShortTheFOMO /* The largest number of paths we allow */ static std::size_t const MaxPathSize = 6; /* The longest path we allow */ static std::size_t const MaxPathLength = 8;
English
0
0
1
65
Fomo {X}
Fomo {X}@ShortTheFOMO·
max number of paths a payment could have, anyone know the number?
English
3
0
1
456
Not Ale
Not Ale@fuzzy_ale·
Dear @fuzzy_xrp Please give this wallet bullshit packs: rwAonwiYePZvcqX5Kc13fhHprVFuiZh3Ec This guy has done so much damage to the XRPL and doesn’t deserve shit.
English
2
1
14
766
onledger.net
onledger.net@offledger·
@AverageJohnXRP @msvadari That's the issue. There is a better fix than what she has suggested. She only suggested it after the features was submitted from merging, because she wasn't happy with it. Her proposal is less secure...
English
2
1
4
175
onledger.net
onledger.net@offledger·
This is a chronic problem in the XRPL. No punches pulled, Ripple add what they want and ignore the rest, using every excuse they can find. Exclusion is not inclusion. It's gatekeeping. This is hooks all over again.
Wietse Wind - 🪝🛠 Xaman® + XRPL + Xahau@WietseWind

About three weeks ago I posted an amendment that would resolve a locked-out multi sign setup, causing one of our community members to be locked out of 50k XRP. If we allow tech to bail on users this way, we're failing the ecosystem (in my opinion). Three weeks later not much has happened. There's a proposal for a different approach, that (imo) doesn't cut it. Why? There are a few approaches to fixing XRPL accounts that get stuck because their signers independently changed their own key setup: - Ban invalid signer configs at transaction time. Doesn't work. The lockout happens across multiple accounts over time, each transaction was valid when submitted. You can't prevent it without restricting what people do with their own keys. - (Counterproposal by Ripple staff) Let a disabled master key still work as a signer on someone else's account. Gets the job done for already-stuck accounts but breaks a core assumption: disabled means disabled. If you turned off your master key because it leaked, you don't want it suddenly usable again in some other context. - (Our approach) Nested multi-sign. Walk the signer-of-signer chain recursively, detect cycles, relax quorum where needed. Recovers stuck accounts without changing what "disabled" means. DoS concerns are real but solvable with a global signature verification cap per transaction (Batch already allows 288 sig verifications today, nested multi-sign caps at 64). I strongly believe option 3 is the right path. It's the only one that actually fixes things without weakening security guarantees. PR: github.com/XRPLF/rippled/… XLS: github.com/XRPLF/XRPL-Sta…

English
6
3
42
4.1K
Crypto Corey
Crypto Corey@RealCryptoCoach·
I’m starting to realize that you guys don’t actually know what gatekeeping is. This guy made a user error on chain and lost access to his funds. This happens every day on every major chain. Yet, you guys want to sacrifice security on chain and make a change, so one guy, can get a measly hundred thousand dollars. Yeah, we have actual founders and projects extracting XRP from the users because they don’t think they have any other options. Or you have actual founders hiding projects on the actual chain and hiding data, so other people can’t see the project or number #1 LP. That is what gatekeeping is. I swear you guys are clueless. Just trying to coddle your friends. It’s just disgusting. Can we get some actual independent validators on chain please?
English
3
4
14
253
onledger.net retweetou
Mike - TextRP 👁️‍🗨️🪝
@RichardXRPL @offledger I think if presented on X like it is in the XLS it would be better received. People are honing in on “this fix is for one dude” but actually , this one dude’s issue inspired a solution that adds value to multi sig.
English
2
2
12
499
onledger.net
onledger.net@offledger·
@msvadari @Kashta9 It's just ironic that it is you that is opposing the implementation while the author of a lesser, and less secure, alternative
English
1
1
6
157
Mayukha Vadari
Mayukha Vadari@msvadari·
@Kashta9 @offledger Spec discussion and implementation approach analysis is the first step of the process - for all amendments, Ripple or not. That's the stage we're in right now. The process is not being stopped.
English
2
0
3
149
onledger.net retweetou
RichardAH 🪝🇦🇺
RichardAH 🪝🇦🇺@RichardXRPL·
Getting Ripple to merge non-Ripple code is a 10 on the mohs scale
Wietse Wind - 🪝🛠 Xaman® + XRPL + Xahau@WietseWind

About three weeks ago I posted an amendment that would resolve a locked-out multi sign setup, causing one of our community members to be locked out of 50k XRP. If we allow tech to bail on users this way, we're failing the ecosystem (in my opinion). Three weeks later not much has happened. There's a proposal for a different approach, that (imo) doesn't cut it. Why? There are a few approaches to fixing XRPL accounts that get stuck because their signers independently changed their own key setup: - Ban invalid signer configs at transaction time. Doesn't work. The lockout happens across multiple accounts over time, each transaction was valid when submitted. You can't prevent it without restricting what people do with their own keys. - (Counterproposal by Ripple staff) Let a disabled master key still work as a signer on someone else's account. Gets the job done for already-stuck accounts but breaks a core assumption: disabled means disabled. If you turned off your master key because it leaked, you don't want it suddenly usable again in some other context. - (Our approach) Nested multi-sign. Walk the signer-of-signer chain recursively, detect cycles, relax quorum where needed. Recovers stuck accounts without changing what "disabled" means. DoS concerns are real but solvable with a global signature verification cap per transaction (Batch already allows 288 sig verifications today, nested multi-sign caps at 64). I strongly believe option 3 is the right path. It's the only one that actually fixes things without weakening security guarantees. PR: github.com/XRPLF/rippled/… XLS: github.com/XRPLF/XRPL-Sta…

English
7
6
34
9.7K
onledger.net
onledger.net@offledger·
@Chromzxe Neither, it's gatekeeoing of the rippled code base by Ripple excluding anything don't like/provide.
English
0
0
1
107
-I|I-
-I|I-@Chromzxe·
@offledger are u saying hooks in a different level, or xahau will have something to do with this?
English
1
0
1
161
Jack
Jack@RealQuadJacks·
@msvadari @offledger 1) Wietse posts amendment 3 weeks ago 2) Onledger says something last week about slowing down 3) Ripple uses what Onledger says (lol) as excuse not to push amendment to vote today Why would you even frame is like this Mayukha? Just makes you look bad.
English
3
0
3
183