XMR Future

10.3K posts

XMR Future

XMR Future

@XMRfuture

84C6vhkoFMChX4UG3QSpuefrtBdCX3SiDXzmfnKhH6wpbZFDy2fNyheXNMRktaWi9gVVME4HCYwbFdR72TT929tg3GyTcJm

เข้าร่วม Kasım 2022
1.6K กำลังติดตาม935 ผู้ติดตาม
XMR Future รีทวีตแล้ว
Monero (XMR)
Monero (XMR)@monero·
The Monero Research Lab has provided an update on post-quantum encryption for Monero!
Monero Research Lab (Unofficial)@MoneroResearchL

tevador presented a simplified summary of the 7 options (Option A/B combined with CSIDH-512/1024/2048 or NTRU-509) and invited comments on proceeding with BC1024 (CSIDH-1024). The MRL compared it to Zcash’s inferior O(N) scanning approach, examined de-anonymization risks for HD wallets/Carrot addresses/shared view keys, self-sends’ privacy value, and why static reusable addresses remain critical. CSIDH was favored over lattice KEMs like NTRU due to no address-generator collusion risk and better multi-output performance/tx sizes. UX concerns (long addresses ~600+ chars, QR scannability) were tested live with examples; hardware-wallet checksums and merchant/RPC adoption were addressed. No major opposition; further comments welcomed. (See full GitHub thread: #issuecomment-4281932714" target="_blank" rel="nofollow noopener">github.com/monero-project… and related github.com/monero-project….) tevador: I wrote a simplified summary without any gory math details. The point is to agree on one of the 7 choices. sgp_: Ty tevador for all your work on this and your work organizing this rbrunner: Likewise ofrnxmr: seconded rucknium: Yes, thank you tevador :) tevador: For comparison, Zcash is going with something similar to AN509, but worse, because they will have O(N) scanning time with N = number of addresses. plowsof: +1 tevador: Does anyone have any comments? Any opposition to moving forward with BC1024? rucknium: I am going to ask some noob questions. If a PQ adversary has one of the Carrot addresses of a wallet, they can de-anonymize the txs of the wallet that share a common private key seed, e.g. the Hierarical Deterministic (HD) wallet seed phrase. Is that correct? Then an impractical countermeasure is to eliminate HD wallets and go back use-once private keys for each tx packed into wallet.dat. Would that actually work? tevador: They can deanonymize transactions that share a private view key. You can avoid that by having a different view key for each transaction, but that means O(N) scanning time. tevador: Different view key for every address* jeffro256: rucknium: For the new Carrot key hierarchy, the QA can deanonymize the transaction graph of the output receives externally. They cannot deanonymize the outputs which were self-sended rucknium: Another hypothetical: Why would a party that is cooperating with a PQ adversary set up the infrastructure to send XMR to this special PQ address? Wouldn't they just say "Sorry, you must use the old addresses"? Isn't this a big part of the threat model that these PQ addresses are , um, addressing? tevador: Yes, but self-sends are not very important in practice anyways. jberman: A comment on potentially large (1kb+) address length: perhaps we could implement something like ASCII qr codes? So instead of copying and pasting massive clunky addresses, copy pasting ASCII qr codes. I see that the huge addresses aren't the only downside to the algos with huge addresses (pruned tx sizes seem lager too, which is significant and also affects scan time from downloading), but perhaps there is a solution that renders them not so terrible tevador: If the Monero-RPC accepts the new address format, I don't see a reason for a merchant not to support it. jeffro256: tevador: It is important because it hides where the wallet sent their funds. They would also gain importance once people realize the PQ implications and begin using self-sends as such rucknium: Another question: Do these addresses get Monero closer, at all, to a countermeasure to PQ counterfeiting? I assume no, but I wanted to check. tevador: No, this is purely for PQ privacy jeffro256: A QA can, in many circumstances, calculate the spending location of externally received funds, not just where they were received. So a self-send in between would hide the spend locations of those outputs jeffro256: rucknium: The mitigation of using ephemeral private keys for each tx would work. Note that your wallet scanning time would be O(N) for the number of pairs generated tevador: Yes, but the QA learns the received amounts to the known address in any case, whatever you do afterwards, which is a biggest leak IMO. rucknium: If the keys are designed to be single-use, then you could stop scanning after you found the first receive tx. tevador: Addresses in Monero are not single-use. jeffro256: tevador: Fair rucknium: Going back to 2009 jeffro256: tevador: There could a specific address format which singles "hey don't use this twice please" jeffro256: signals tevador: Single use addresses would prevent the whole-wallet leak, but don't prevent the main problem of leaking the receiving transaction. jeffro256: tevador: It's the biggest leak if trying to conceal income. Not the biggest leak if trying to conceal purchases rucknium: I am developing the hypothetical with the sending adversary you don't trust fully, on privacy at least. So you would stop listening for txs after you got the one from the untrusted party. tevador: I think you can already do this with a throwaway wallet seed. rucknium: Yes. It would be a UX change. jberman: tevador sorry if this is included somewhere, but why is the 2/16 tx size so much larger than the 2/2 tx size for NTRU-509 than it is for the other algos? tevador: How would you do donation addresses with a single-use address format? tevador: jberman: Good question. NTRU needs 16 ciphertexts in that case, but CSIDH needs just 1 shared public key for all 16 outputs in option A. ixr3: It will take on tremendous importance! > It is important because it hides where the wallet sent their funds. They would also gain importance once people realize the PQ implications and begin using self-sends as such rucknium: BTCPay Sever does single-use addresses for Monero, which are used by at least one nonprofit for XMR donations. Just show each user a different address. rucknium: Server rucknium: Just thinking outside the box here. tevador: Do we want Monero to move to single-use addresses? Technically not publishing addresses ever (except to the sender) would solve the PQ privacy issue. ofrnxmr: Tracking a lot of subaddresses begins to take its toll on scanning though, unless you stop scanning one once used? rucknium: plowsof's Wishlist as a Service also shows each user a different address. sgp_: Single, static donation addresses have their place ofrnxmr: What happens if someone sends 2 txs to the same address? Would the 2nd tx be rejected? ofrnxmr: something like silent payments maybe? jeffro256: ofrnxmr: Not on CPU speed, just storage tevador: I think these services would be vulnerable a denial of service by generating 1000s of addresses but never sending anything. Then the wallet has to keep scanning. tevador: Also if interactive addresses are OK, we can just do this: monero-project/research-lab #106 rucknium: I didn't intend to distract so much from your question, tevador, about the best PQ encryption algorithm for the addresses. Can we have more comments on the options from meeting participants? jberman: I think privacy-preserving static addresses are a critical Monero feature gingeropolous: agree re: jberman tevador: Btw, Jamtis brings other improvements to addresses apart from PQ privacy. PQ privacy was means as an extra feature. rucknium: Reconsidering, if a service didn't offer the PQ addresses, then a competitor service could offer it. Market forces may squeeze out the non-adopter. Or at least there would be a good alternative for users who are aware of the quantum problem. tevador: Technically we could still go with classical Jamtis, which has 260-char addresses. jberman: I have a half debate in my head continuing about the acceptability of NTRU / a lattice based algo. Your arguments in favor of CSIDH are strong tevador , that's still where my head is at though rucknium: But many services have a lot of market power, i.e. close to a monopoly. rucknium: I will put this agenda item closer to the beginning next meeting. tevador: Thanks rucknium: More comments on this item? tevador: I didn't mention this, but NTRU and other KEMs have an extra issue in that the address generator tier can collude with the quantum attacker to deaononymize transactions. tevador: CSIDH doesn't have this issue. jberman: tevador: ack jpk68: Noob-ish question from me: is it really worth prioritizing smaller QR code sizes over shorter encoded address lengths? In my opinion, shorter addresses would be better from a UX perspective jpk68: (I'm referring to the use of Base32 over Base62/etc.) ixr3: rucknium: No, but I want to thank tevador for this very important work. It's hard to follow alongside all other developments going on tevador: base62 would shorten addresses only aby about 16% tevador: QR codes would become larger by 45% jpk68: Would there be any real-world difference when scanning/using the QR codes though? For example, would scanning a payment terminal be reasonably more difficult with higher-resolution QR codes? jpk68: I mean, of course it would (with insanely large codes) but with the 45% larger ones, I mean tevador: I'm not sure what is the max reasonable QR code size to scan with a phone jeffro256: Probably depends on camera quality and lighting jbabb: Stack Wallet uses QR codes to exchange FROST information and we found that up to about 4000 chars is usable jpk68: Just saying, from a UX perspective (in my opinion), a 16% decrease in address sizes is a 16% benefit for me. However a 45% larger QR code is about 0% less convenient, so long as the QR code is actually usable tevador: What QR code size is that? in modules rucknium: jbabb: Is that with zero error correction? IIRC, you can set different levels of error correction in a QR code. tevador: I think Jamtis in base32 would be 69x69 jpk68: I know this is probably just bikeshedding, but I thought it would be worth bringing up jbabb: tevador: 177x177, version 40 iirc, worked. but version 10-20 (57x57 to 97x97) is better and i think everything fits under these, ill have to check what the actual payloads are in practice tevador: 177x177 is the largest possible size AFAIK jbabb: was awhile since that work was done. versions 10-25 are practical imo jbabb: rucknium: I will have to recheck these details sorry, twas awhile back we integrated kaya's frost jpk68: I can't remember exactly, but when I looked into this a few days ago, the minimum QR code size that could be used for Base32 Jamtis addresses (13? 14?) had to be bumped up "only" two sizes from before tevador: I think the encoding format can be resolved later anyways tevador: I'm not opposed to base32 for the prefix + base62 for the data. tevador: Yes, I think it would go from version 13 to 15 jpk68: xmr1a is valid Base62 though, no? jpk68: Wrong prefix, oops tevador: YEs, but the prefix also includes the 24-char checksum jpk68: Oh, I see tevador: This one should stay case insensitive for human readability rucknium: We can end the meeting here. Feel free to continue discussing. Thanks everyone. tevador: Thanks ofrnxmr: I can generate a qr code right now for an example? jpk68: Thanks tevador: syntheticbird: In the prefix, that would be "li". In the data payload - nobody cares. rucknium: How would the PQ address work in hardware wallets? Is the checksum prefix enough to prevent accidental or malicious substitution of the address? tevador: Answer here: #523-visual-checksum" target="_blank" rel="nofollow noopener">gist.github.com/tevador/639d08… rucknium: Thanks. ofrnxmr: mrelay.p2pool.observer/m/monero.socia… ofrnxmr: 621 chars, seems to scan fine jpk68: In Base62? ofrnxmr: most of it vtnerd: Damn this may crush lwcli/monero-wallet-cli lol sgp_: mrelay.p2pool.observer/m/monero.socia… sgp_: 2953 test jpk68: ofrnxmr: Works for me, up to around 6 feet away (average Android phone) jbabb: scanned for me without even zooming it in. had to be 6in away from the screen tho jbabb: strangely, zooming in didn't really help (scannable at about a foot from the screen) tevador: Now make the version 40 qr code 5x5 cm and try to scan it jpk68: sgp_: 2,953 characters of Bech32? ofrnxmr: i zoomed the pic out so its only like 5cm across ofrnxmr: "this" = sgp's 2953 qr code jpk68: Are you using a telescope? Lmao sgp_: mrelay.p2pool.observer/m/monero.socia… sgp_: 4296 characters, alphanumeric (uppercase only) jpk68: tevador: the payload is 368 bytes for BC1024 sgp_: mrelay.p2pool.observer/m/monero.socia… sgp_: for 1379 characters alphanumeric, it fits in qr code version 34 with error correction level high tevador: So probably more like 617 chars in base32 sgp_: version 22 with error correction low UkoeHB: Why would QR codes be different sizes based on encoding? Can't encodings be translated? base-whatever -> QR code ideal -> QR code -> QR code ideal -> base-whatever sgp_: mrelay.p2pool.observer/m/monero.socia… jpk68: QR codes apparently have different modes, so if you restrict yourself to a smaller charset (i.e. Base32) you can encode more efficiently jpk68: I suppose one could encode the payload as a QR itself (in bytes) UkoeHB: Sure, my question is why QR encoding has to equal address encoding. tevador: UkoeHB: presumably we only want one address format (string). But yes, a binary address encoding would be tiny bit more efficient in QR codes UkoeHB: 45% doesn't seem tiny, unless you mean relative to b32 tevador: alphanumeric encoding encodes a 5-bit base32 character with 5.5 bits of encoding space, so the overhead is 10%. #c669723" target="_blank" rel="nofollow noopener">libera.monerologs.net/monero-researc…

English
13
67
413
26.3K
XMR Future รีทวีตแล้ว
lauren emily
lauren emily@leamuirleyn·
Two years ago today in a pre-dawn raid, began what has felt like a surreal nightmare which I have been trying to wake up from. Two full years stolen. And today, on this somber anniversary, when I remember who we were, and the hope we had for the future before everything changed, I find myself mourning alone. I’m clinging to the hope for a pardon. But even if it comes, it won’t give us back the 730 days we lost. When Keonne finally walks through our door, we won’t be “picking up where we left off.” If you’ve prayed for us, shared our story, signed the petition, or donated, sincerely thank you. #pardonsamourai
English
13
70
270
13.7K
XMR Future รีทวีตแล้ว
VLAD HOSTS THE BEST PODCAST IN BITCOIN
Paul’s ecash hard fork is an excellent reason to: 1. Buy as much bitcoin as you can before August 2. Withdraw all coins from exchanges so you can claim your free ecash Super bullish!
English
19
9
65
5.8K
XMR Future รีทวีตแล้ว
Paul Sztorc
Paul Sztorc@Truthcoin·
BREAKING: New Bitcoin Fork I am helping create a **new Bitcoin Hardfork** -- dropping this August, called "eCash". - Your coins will split. For example, if you have 4.19 BTC, then you will get 4.19 eCash. - You may sell your eCash -- or keep it. Or ignore it! Vegas: - Yes, I will be in Vegas next week. - No, I won't mention this, on stage -- (that would be rude). Our L1 Node... - is a near-copy of Bitcoin Core. - is Sha256d mined. - forks via a one-time difficulty-reset -- to its minimum value. (So, mining will be crazy at first.) - Yes, we will change the seed nodes, the name, the network magic, etc. Codewise, the L1 will remain compatible with Bitcoin Core: - We will continue to merge their changes (even the bad ones). - The L1 will activate Bip300/301 via CUSF -- the core untouched soft fork. So, no lines of code will be changed, on the L1. - The activation client will be published periodically (link below). - We will do several bug bounty contests this summer. - The client will be frozen 30 days prior to the fork. Yes, there will be Drivechains: - We have 7 in developement right now. - Users can also submit their own. - Drivechain is a vision of "competing L2s" -- this avoids the "dev capture" problem. - These L2s are all Merged Mined. Miners automatically get free $. - Our L2s are already capable of planetary scale, and onboarding 8 billion users. - We also have a zCash-like L2, with strong privacy. - Other L2s: Truthcoin (Prediction Markets), CoinShift (Decentralized Exchange), BitAssets (NFT etc), BitNames (Identity), Photon (Quantum Resistant). Unlike BCH (the 2017 fork): - There is no "Bitcoin" in the name. New name, new brand. - You are getting advanced warning (4 months). - We are replaying all txns (at first). We will release a coin-splitter tool. - This is a permanent & sustainable fix to Bitcoin's problems (instead of a 1 MB to 8 MB temporary fix). - Back in 2017, the BTC tech stack was strong, and expectations for Lightning were strong. Today, it is the reverse. Video to follow.
English
372
624
2.5K
8.3M
XMR Future รีทวีตแล้ว
kycnot.me
kycnot.me@kycnot·
Small update: service pages now include a more detailed KYC policy section. Know their KYC before they know you. Check it before using a service.
kycnot.me tweet media
English
1
9
40
1.2K
XMR Future รีทวีตแล้ว
JP
JP@jpthor·
$XMR $RUNE The most hated chain will soon be connected to the most hated protocol. Are you ready for this?
English
34
42
399
16.5K
XMR Future รีทวีตแล้ว
Web3Privacy Now
Web3Privacy Now@web3privacy·
Trying to move away from Big Tech and explore privacy-first tools? Check out this stack, this time by @gnukeith from @brave and @obscuravpn deWindows / macOS → @CachyOS deChrome → @brave Nightly deAndroid → @GrapheneOS Search → @KagiHQ Messenger → @signalapp + Molly VPN → @obscuravpn Wallet → @Brave + @cakewallet Crypto → @monero Email → @ProtonMail + @SimpleLogin Storage → @fileverse Self-hosted LLM → Ente AI → Leo AI Meetings → @brave Talk Passwords → Vaultwarden 2FA → Ente Translator → @KagiHQ Recording → @OBSProject Build your own privacy stack, tool by tool, step by step. Want to see more? Check out all the stacks at: stacks.web3privacy.info
Web3Privacy Now tweet media
English
19
46
284
13.2K
XMR Future รีทวีตแล้ว
Nym
Nym@nym·
⚛️NymVPN's post-quantum upgrade is here ❓ Live AMA with the builders 🧪 What we shipped and what’s next ⚡️ How Lewes Protocol is designed to stay fast x.com/i/broadcasts/1…
Nym tweet media
English
2
7
32
2.4K
XMR Future รีทวีตแล้ว
White Noise
White Noise@whitenoisechat·
A phone number isn't an identity. It's a billing record with a SIM attached. Every time an app requires one to sign up, it's not verifying who you are. It's verifying who can be invoiced, traced, or cut off. These are not the same thing.
English
1
7
24
2.3K
XMR Future รีทวีตแล้ว
XMR Future รีทวีตแล้ว
Pubky
Pubky@getpubky·
A profile should belong to you, not to the platform. 👈 In Pubky, your identity is tied directly to your public key and resolved through open infrastructure like PKARR, PKDNS, and the DHT. Simple to use. Harder to take away. Join Pubky today! pubky.app 🔑
English
0
2
5
247
XMR Future รีทวีตแล้ว
Nano-GPT
Nano-GPT@NanoGPTcom·
GPT Image 2 is now available! It is currently the highest-ranking model on our leaderboards. Does text to image and image to image!
Nano-GPT tweet media
OpenAI@OpenAI

This is not a screenshot.

English
0
1
12
498
XMR Future รีทวีตแล้ว
Monero (XMR)
Monero (XMR)@monero·
Justin Berman recently put forward a proposal for the audits of the integration of Full-Chain Membership Proofs (FCMP++) into the Monero codebase! 'The goal is that by the end of the audit, the actual code merged into the Monero repository will have received highly qualified independent scrutiny and review by a singular or multiple 3rd parties.'
Monero (XMR)@monero

Full-Chain Membership Proofs (FCMP++) - The Next Generation of Monero's Privacy Thanks to @VOSTOEMISIO and @xenumonero for producing this excellent explanatory video and to our generous community for funding it!

English
16
59
356
22.5K
XMR Future
XMR Future@XMRfuture·
@Hy_Purr_liquid @jpthor Whats the point of crypto if it can be frozen/censored/confiscated? Might as well use fiat at that point...
English
0
0
0
20
Hy-PURR-Liquid
Hy-PURR-Liquid@Hy_Purr_liquid·
@jpthor TC has been highly successful at enabling money laundering
English
1
0
0
501
JP
JP@jpthor·
TC threw away its admin keys over a year ago. 67 anon nodes run the protocol. They alone get to decide what happens now. TC earned its decentralisation with blood sweat and tears.
Onchain Hall Monitor@ReversionTo

You can’t make this up most inept team in crypto is Chainflip $flip. Completely centralized decision making. Unilaterally shutting down swaps. Oh yeah and how are they paying for the protocol level screening in a decentralized way? Hows that transaction made ?

English
13
6
161
111.1K
XMR Future รีทวีตแล้ว
internet privacy foundation
Introducing internet privacy foundation. We build the infrastructure that protects privacy online: open protocols and permissionless tools. We're a 501(c)(3) nonprofit. Donations are tax-deductible for US donors. ipf.dev
internet privacy foundation tweet media
English
29
26
108
6.6K
XMR Future รีทวีตแล้ว
Ten31
Ten31@ten31funds·
Citadel Dispatch 200: UTXO - WISP We go deep on AI, his local rig, on device spam filtering, whether Claude is subsidizing us into oblivion, and what happens to big tech jobs when a unicorn only needs three employees. serve.podhome.fm/episodepage/Ci…
English
0
1
2
353