https://Rucknium.me

PGP key fingerprint: 5D5E 08A2 389D F225 ABD0 781B 291E 0C22 9D63 1697

  • 7 Posts
  • 11 Comments
Joined 1 year ago
cake
Cake day: July 4th, 2023

help-circle




  • AFAIK Trocador was getting DDoSed. They said they set up Cloudflare temporarily. They are looking for a better solution.

    Some messages from https://matrix.to/#/#Trocador.app:matrix.org

    Hey there! We were under a heavy ddos attack, so we moved to CF temporarily to help our defenses. As soon as it’s over we’ll get out of cloudflare. We apologize for the inconvenience, we are looking into alternatives for the next time we suffer a bigger attack like this

    [From Tuesday]: We literally moved there 16:00 UTC as a contingency, so it’s not even 24 hours yet. We are looking into alternatives for next time a massive DDoS happens


  • An economist, a chemist, and an engineer were stranded on a desert island. And between them they had only a single can of beans, but no can opener.

    The engineer suggested that he climb a palm tree to a precise height, then throw the beans a precise distance at a precise angle. ‘And when the can hits,’ he said, ‘it will split open.’

    ‘No,’ said the chemist. ‘We’ll leave the can in the sun until the heat causes the beans to expand so much the can will explode.’

    ‘Nonsense,’ said the economist. ‘Using either method we’d lose too many beans. According to my plan, there will be no mess or fuss and not a single bean will be lost.’ Well, the engineer and the chemist said, ‘We’re certainly willing to consider it. What’s your plan?’ And the economist answered, ‘Well, first assume we have a can opener.’"

    In economics, the devil is in the assumptions. It is the responsibility of the reader of an economic model to understand what the assumptions are and their implications, and decide for him/herself if the assumptions are reasonable and useful, “All models are wrong, but some are useful”, after all.

    I agree with you that the assumption of coin loss being a function of total coins in the supply is…doing a lot of work in this model. IMHO, this is an interesting intellectual exercise, but its connection to reality or anything that people really care about in their daily lives is not very strong.


  • Right. As far as I know, a LLM will not give you a proper source if you ask it how it knows some information. A website found through a search engine will have a source for its info (or it’s probably unreliable if it has no sources).

    You as a human being have a right and responsibility to know the source of information and use your reasoning abilities to decide if the source is reliable. An LLM interrupts this process. I don’t understand how people are absorbing information without sources or a way to critically think about if the information may be accurate.





  • Where are all the WOMEN standing up for private digital cash?

    In my MoneroKon talk this weekend I will be analyzing data on cryptocurrency investment and use as payment: https://cfp.monerokon.org/2024/talk/NVF8ZN/ According to EU and US data, men definitely get more involved in cryptocurrency, but the gender divide is more lopsided in investment activities than payment activities. In other words, women are less likely to use cryptocurrency as a means of payment than men, but they are much less like to buy cryptocurrency as an investment than men.

    You could interpret that as “the way to get women interested in peer-to-peer electronic cash is to focus on it as a means of payment instead of as an investment.” Or the opposite: “Women investing in cryptocurrency is a relatively unexplored market segment!” Anything else you want analyzed, you have about 12 hours to ask before I finalize the analysis.


  • I know Ruckinum ran an analysis and thinks this is not a black marble flood, but I can’t help but think it’s a way go somehow break the anonymity of monero, whether just sent amounts, or received amounts, which would still give a wealth of information.

    I didn’t run a quantitative analysis of the large number of 150-input transactions on May 2. I just guessed that it’s not an actual black marble flood since it doesn’t fit the definition or attack model of Noether, Noether, & Mackenzie (2014) and Chervinski, Kreutz, & Yu (2021).

    Are the transactions reused?

    Yes, each output can be re-used an unlimited number of times as a decoy in other transactions.

    If they are reused, then they can tell the real spend by discarding any spend that’s been used more than once. Is that correct?

    No. If every output that is created is spent, then on average each output will appear in 16 rings of other transactions. A Monero wallet do not check how many times an output has been used by other transactions when it is deciding which outputs to select as decoys.

    They run or have compromised a lot of ‘activist’ nodes and xpubs are sent to the nodes in light wallets, unsure if this is how it works, or if that was unique to Samourai’s whirlpool design. If this was the case, light wallets use currently online available servers, so chances are a user connects their wallet to tens of servers. Users who run their own nodes would be unaffected but I think the majority of monero users use light nodes.

    In normal operation, most Monero wallets do not send an “xpub” (in Monero this would be the Private View Key). The terminology can be confusing. In Monero, a “light wallet” is a wallet where the user gives a view key to a server to perform the blockchain scan on behalf of the user. The person or company running the server can see which transactions belong to the user and how much XMR is being sent to them. The MyMonero wallet works like this. Feather is not a light wallet with this definition, despite its name. Feather wallet and most wallets like Cake, Stack, the GUI/CLI wallets, etc., ask a local node (on the user’s own machine) or remote node (on someone else’s machine) for the entire blockchain data during a period of time and do the decryption of the wallets’ transactions on the user’s own device. That’s why wallet sync takes a long time for those wallets when they are opened after being closed for a long time.

    The remote nodes can collect some limited data like the user’s IP address (if the user is not using Tor) and the last time the user synced the wallet. A malicious remote node can attempt to give the user a false decoy/output distribution (this is what Feather was trying to prevent with the initial, but flawed, code) and it can give the user’s wallet an incorrect fee to pay (but the user can notice that the fee is too high and disconnect from the remote node. More information about remote node privacy is in Breaking Monero Episode 07: Remote Nodes (sorry for YouTube link. Use your favorite private YouTube front-end to view it): https://www.youtube.com/watch?v=n6Bxp0k7Uqg