
Location: Libera.chat, #monero-research-lab | Matrix Join the Monero Matrix server if you don't already have a Matrix account. Time: 17:00 UTC Check in your timezone Main discussion topics: Greetin...

PGP key fingerprint: 5D5E 08A2 389D F225 ABD0 781B 291E 0C22 9D63 1697
Stressnet First Week Report
(Thanks to spackle for this writeup!)
The first week has been a wild ride, and there is a lot to share. Presented roughly by order of importance:
Restarting a node while there is a large mempool can take over an hour in extreme conditions, since the node must process all the mempool transactions before resuming regular operation. 0xFFFC has addressed this with a massive speed up in PR 9376. These changes are now in use on the stressnet, to great effect.
Block propagation and network synchronization suffer at larger block sizes, which encourages the creation of alternative chains. Setting '--block-sync-size 1' allows nodes to handle larger blocks more easily, and this is now standard practice on the stressnet. Further updates are expected on this soon.
Do you know about Primo? I think it was only a proof-of-concept, never used widely: https://monero.stackexchange.com/questions/11752/what-is-primo-private-monero-payments
Primo is a protocol and associated suite of software allowing a website to request payment for service by mining Monero to an address owned by the website owner.
At least 3 new nodes joined the network in the last hour. Thank you! Keep them coming.
Monero Stressnet: Run a Stressnet Node to Improve Monero
Monero has a problem. The suspected spam transactions from earlier this year showed that Monero nodes do not cope with high transaction volume as well as expected. Monero protocol developers have been trying to get to the root of the issue, but the problem only appears when nodes are handling high transaction volumes.
Since the spam is over (for now), the only way to help developers find and fix the bottlenecks is to run a separate test network that will be spammed with transactions. We call it "stressnet". The performance bottlenecks are potential blockers for privacy improvements like larger rings sizes and/or Full Chain Membership Proofs (FCMPs). To quote developer selsta: "a large increase to the ring size is going to risk the stability of the network if we don't fix the known daemon [node] inefficiency bugs first."
A testnet fork (the stressnet) has been created to stress test the node and diagnose performance bottlenecks. To participate, you can simply run a node using this sl
AFAIK Trocador was getting DDoSed. They said they set up Cloudflare temporarily. They are looking for a better solution.
Some messages from https://matrix.to/#/#Trocador.app:matrix.org
Hey there! We were under a heavy ddos attack, so we moved to CF temporarily to help our defenses. As soon as it's over we'll get out of cloudflare. We apologize for the inconvenience, we are looking into alternatives for the next time we suffer a bigger attack like this
[From Tuesday]: We literally moved there 16:00 UTC as a contingency, so it's not even 24 hours yet. We are looking into alternatives for next time a massive DDoS happens
An economist, a chemist, and an engineer were stranded on a desert island. And between them they had only a single can of beans, but no can opener.
The engineer suggested that he climb a palm tree to a precise height, then throw the beans a precise distance at a precise angle. 'And when the can hits,' he said, 'it will split open.'
'No,' said the chemist. 'We'll leave the can in the sun until the heat causes the beans to expand so much the can will explode.'
'Nonsense,' said the economist. 'Using either method we'd lose too many beans. According to my plan, there will be no mess or fuss and not a single bean will be lost.' Well, the engineer and the chemist said, 'We're certainly willing to consider it. What's your plan?' And the economist answered, 'Well, first assume we have a can opener.'"
In economics, the devil is in the assumptions. It is the responsibility of the reader of an economic model to understand what the assumptions are and their implications, and decide for him/herself if the assumptions are reasonable and useful, "All models are wrong, but some are useful", after all.
I agree with you that the assumption of coin loss being a function of total coins in the supply is...doing a lot of work in this model. IMHO, this is an interesting intellectual exercise, but its connection to reality or anything that people really care about in their daily lives is not very strong.
Right. As far as I know, a LLM will not give you a proper source if you ask it how it knows some information. A website found through a search engine will have a source for its info (or it's probably unreliable if it has no sources).
You as a human being have a right and responsibility to know the source of information and use your reasoning abilities to decide if the source is reliable. An LLM interrupts this process. I don't understand how people are absorbing information without sources or a way to critically think about if the information may be accurate.
The news that you missed is that Large Language Models (LLMs) like ChatGPT are unreliable sources of information. Look for another source if you need reliable information about anything.
The first one isn't text to speech and the second is not FOSS. If you have a good FOSS TTS that has examples of what the voices sound like, I would like to be linked to it :)
Yes it will be text-to-speech again. I will try another voice. Thanks for the feedback.
Where are all the WOMEN standing up for private digital cash?
In my MoneroKon talk this weekend I will be analyzing data on cryptocurrency investment and use as payment: https://cfp.monerokon.org/2024/talk/NVF8ZN/ According to EU and US data, men definitely get more involved in cryptocurrency, but the gender divide is more lopsided in investment activities than payment activities. In other words, women are less likely to use cryptocurrency as a means of payment than men, but they are much less like to buy cryptocurrency as an investment than men.
You could interpret that as "the way to get women interested in peer-to-peer electronic cash is to focus on it as a means of payment instead of as an investment." Or the opposite: "Women investing in cryptocurrency is a relatively unexplored market segment!" Anything else you want analyzed, you have about 12 hours to ask before I finalize the analysis.
I know Ruckinum ran an analysis and thinks this is not a black marble flood, but I can’t help but think it’s a way go somehow break the anonymity of monero, whether just sent amounts, or received amounts, which would still give a wealth of information.
I didn't run a quantitative analysis of the large number of 150-input transactions on May 2. I just guessed that it's not an actual black marble flood since it doesn't fit the definition or attack model of Noether, Noether, & Mackenzie (2014) and Chervinski, Kreutz, & Yu (2021).
Are the transactions reused?
Yes, each output can be re-used an unlimited number of times as a decoy in other transactions.
If they are reused, then they can tell the real spend by discarding any spend that’s been used more than once. Is that correct?
No. If every output that is created is spent, then on average each output will appear in 16 rings of other transactions. A Monero wallet do not check how many times an output has been used by other transactions when it is deciding which outputs to select as decoys.
They run or have compromised a lot of ‘activist’ nodes and xpubs are sent to the nodes in light wallets, unsure if this is how it works, or if that was unique to Samourai’s whirlpool design. If this was the case, light wallets use currently online available servers, so chances are a user connects their wallet to tens of servers. Users who run their own nodes would be unaffected but I think the majority of monero users use light nodes.
In normal operation, most Monero wallets do not send an "xpub" (in Monero this would be the Private View Key). The terminology can be confusing. In Monero, a "light wallet" is a wallet where the user gives a view key to a server to perform the blockchain scan on behalf of the user. The person or company running the server can see which transactions belong to the user and how much XMR is being sent to them. The MyMonero wallet works like this. Feather is not a light wallet with this definition, despite its name. Feather wallet and most wallets like Cake, Stack, the GUI/CLI wallets, etc., ask a local node (on the user's own machine) or remote node (on someone else's machine) for the entire blockchain data during a period of time and do the decryption of the wallets' transactions on the user's own device. That's why wallet sync takes a long time for those wallets when they are opened after being closed for a long time.
The remote nodes can collect some limited data like the user's IP address (if the user is not using Tor) and the last time the user synced the wallet. A malicious remote node can attempt to give the user a false decoy/output distribution (this is what Feather was trying to prevent with the initial, but flawed, code) and it can give the user's wallet an incorrect fee to pay (but the user can notice that the fee is too high and disconnect from the remote node. More information about remote node privacy is in Breaking Monero Episode 07: Remote Nodes (sorry for YouTube link. Use your favorite private YouTube front-end to view it): https://www.youtube.com/watch?v=n6Bxp0k7Uqg
Thank you!
Discussing pre-Seraphis Full-Chain Membership Proofs (FCMP) at Monero Research Lab meeting tomorrow
Location: Libera.chat, #monero-research-lab | Matrix Join the Monero Matrix server if you don't already have a Matrix account. Time: 17:00 UTC Check in your timezone Main discussion topics: Greetin...
Context in the MRL logs: https://libera.monerologs.net/monero-research-lab/20240401
Research: March 2024 Suspected Black Marble Flooding Against Monero: Privacy, User Experience, and Countermeasures
Small research projects. Contribute to Rucknium/misc-research development by creating an account on GitHub.
I have some preliminary research for you:
On March 4, 2024, aggregate Monero transaction volume suddenly almost tripled. This note analyzes the effect of the large number of transactions, assuming that the transaction volume is an attempted black marble flooding attack by an adversary. According to my estimates, mean effective ring size has decreased from 16 to 5.5 if the black marble flooding hypothesis is correct. At current transaction volumes, the suspected spam transactions probably cannot be used for large-scale “chain reaction” analysis to eliminate all ring members except for the real spend. Effects of increasing Monero's ring size above 16 are analyzed.
vtnerd Monero dev work for Q1/Q2 has been fully funded!
Support the MAGIC Monero Fund and open source software and research for the Monero Project.
Thank you to all donors!
The MAGIC Monero Fund's campaign to raise 226 XMR (28,800 USD) for three months of vtnerd (Lee Clagett) development work has succeeded.
vtnerd will work on Monero and Monero Light Wallet Server (LWS). The LWS increases Monero's capacity for more users and transactions. LWS will be even more important when Seraphis (next generation Monero transactions) is implemented because Seraphis will improve the user privacy and speed of light wallet servers.
Here are the full details of vtnerd's proposed work:
vtnerd is the author of Monero-LWS, and has been a contributor to the Monero codebase since 2016. He is a veteran of four CCS proposals; [1], [[2]](https://ccs
MRL meeting on prohibiting new custom timelocks
Location: Libera.chat, #monero-research-lab | Matrix Join the Monero Matrix server if you don't already have a Matrix account. Time: 17:00 UTC Check in your timezone Main discussion topics: Greetin...
Last week rbrunner7 argued that future Monero transactions should not be able to set custom timelocks. This proposal was discussed in this week's Monero Research Lab meeting.
Monero's timelocks have been a "solution in search of a problem" for a long time. However, Alex from Local Monero said he had a special use for them:
Sometimes, we ban a certain user permanently from our platform. Sometimes, that user tries to return to the platform. We catch them and warn them not to return again or there will be consequences. They ignore us and return to our platform. In these cases, we take the XMR that they placed in the arbitration bond and send it to them in a timelocked transaction to disincentivize them from trying to return again.
The rough result of the meeting was to evaluate [time lock puzzles](https://d
Good question. You didn't get hacked. You approved the payment to Mullvad.
When you send XMR to an "integrated address", Ledger does not display the integrated address on the device. It displays the raw Monero address. Mullvad probably uses integrated addresses.
SethForPrivacy said:
At present, the UX around integrated addresses can be confusing and even outright dangerous, like how the Ledger always displays the underlying address instead of the integrated address, making address verification difficult or impossible depending on the application.
I don't know if there are plans to fix this or if it can be fixed at all.
The MAGIC Monero Fund wants your research or development proposals
Support the MAGIC Monero Fund and open source research for the Monero Project.
Supporting Monero since 2021, the MAGIC Monero Fund (MMF) continues to accept applications for research and development grants focused on improving the Monero protocol and ecosystem.
The fund can issue grants and host fundraisers for Monero research, development, security audits, and more. This allows for the Monero community to build a sustainable, alternative pool of funds to provide for significantly more consistent and less stressful research and development.
The application process is described here: https://monerofund.org/apply. Applications are accepted on a rolling basis. Contractors or recipients of MMF funding are required to undergo a basic KYC process that is similar to an employment on-boarding.
The fund has an advisory committee entirely elected by the Monero community and this committee selects which grants to fund. The current Magic Monero Fund Committee Members are kayabaNerve (Luke Parker), Rucknium (me), monerobull, kowalabearhugs, and artlimber. You can view curr
At the meeting, kayabaNerve (Luke Parker) suggested:
What'd likely be easiest, in a pure-C++ way, is to explicitly intended Monero's DKG to match MRL-0009 (if not already) and have it audited to line up. Then, a Musig2-esque CLSAG should be formalized (likely a modification of MRL-0009's Musig-DN-esque CLSAG?) and Monero should explicitly intended to match it. The fact it lines up should be audited.
My conclusion:
If anyone really wants to work on multisig, especially in the direction of kayabanerve's proposal, please speak up. IMHO, this was a productive conversation, but I don't expect any action to be taken unless more labor [is] put toward the problem.
Improving multisig is on tomorrow's Monero Research Lab agenda
Location: Libera.chat, #monero-research-lab | Matrix Join the Monero Matrix server if you don't already have a Matrix account. Time: 17:00 UTC Check in your timezone Main discussion topics: Greetin...
It is interesting that it took nine transactions to empty the CCS wallet. Is that indicative of somebody new to monero?
No.
A donation wallet has lots of individual transaction outputs that need to be consolidated if you move the entire balance. A transaction that has a lot of inputs that consolidates these transactions will be large in kilobytes. Unless network transaction volume is high enough to push up the dynamic block size rules, the maximum block size is about 300 kilobytes. Transactions must fit inside a single block, so there is a limit to the number of inputs in a single transaction. Plus, you don't want to create a transaction the full 300 kilobytes in size since miners' block creation rules might not mine a transaction that large. The first theft transaction in the list was about 22 kilobytes with 33 inputs:
https://xmrchain.net/search?value=ffc82e64dde43d3939354ca1445d41278aef0b80a7d16d7ca12ab9a88f5bc56a
The next was 99 kilobytes with 146 inputs:
https://xmrchain.net/search?value=08487d5dbf53dfb60008f6783d2784bc4c3b33e1a7db43356a0f61fb27ab90cc
Etc.
The full list: ffc82e64dde43d3939354ca1445d41278aef0b80a7d16d7ca12ab9a88f5bc56a 08487d5dbf53dfb60008f6783d2784bc4c3b33e1a7db43356a0f61fb27ab90cc 4b73bd9731f6e188c6fcebed91cc1eb25d2a96d183037c3e4b46e83dbf1868a9 8a5ed5483b5746bd0fa0bc4b7c4605dda1a3643e8bb9144c3f37eb13d46c1441 56dd063f42775600adf03ae1e7d7376813d9640c65f08916e3802dbfee489e2c e2ab762927637fe0255246f8795a02bd7bb99f905ae7afc21284e6ff9e7f73db 9bf312ed09da1e7dfce281a76ae2fc5b7b9edc35d31c9eb46b21d38500716b6b 837de977651136c18b0018269626be7155d477cc731c5ca907608a2db57ff6a8 9c278d1496788aee6c7f26556a3f6f2cbb7e109cd20400e0b2381f6c2d4e29f4
Almost entire balance (2675 XMR) of Community Crowdfunding System (CCS) Monero wallet has been stolen
The CCS Wallet was drained of 2,675.73 XMR (the entire balance) on September 1, 2023, just before midnight. The hot wallet, used for payments to contributors, is untouched; its balance is ~244 XMR....
In the last Monero General Fund transparency report in March 2023, the General Fund held 8452 XMR. As far as we know, this separate wallet is safe and unaffected. It would be possible to pay people with active CCS proposal from the General Fund, but nothing has been decided.
If you have a Matrix account you should go to https://matrix.to/#/#monero-community-dev:monero.social to get help there and describe your app design. If you are just accepting payments to a website, then you can use BTCPay Server or BitCart.
The Monero blockchain does not hold data in plaintext like other blockchains. You cannot just query the blockchain data through an API. You have to decrypt transactions with private view keys.
Just a week after Exodus wallet privacy fix, the number of Monero transactions with the nonstandard fee has been cut in half
Last week Exodus released a fix for their Desktop wallet creating Monero transactions with nonstandard fees, based on my discovery of the issue. Original announcement. Many users must have already updated their software because the number of these identifiable transactions on the blockchain have decreased from about 600 per day to 300 per day.
Yes, Exodus is a closed source wallet. I would not recommend people to use a closed source wallet. If people do choose to use Exodus despite it being closed source, then they should update to the latest version for better privacy. Monero users should have excellent privacy by default regardless of which wallet implementation they are using.
Exodus Desktop users, update to latest version for privacy fix
undefined
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA512 [Privacy Advisory] Exodus Desktop Monero users, update to latest version for privacy fix Prior to version 23.10.10, which was released on October 10, 2023, Exodus Desktop wallets produced unusual fees when creating Monero transactions. I suggest all Exodus Desktop users to update their software to version 23.10.10 or later before making their next Monero transaction to avoid the privacy impact of these unusual fees. The Exodus _Mobile_ wallet also produces unusual fees, but a fix has _not_ yet been developed and deployed to a new release version of Exodus Mobile. The fee of all Monero transactions can be viewed in plaintext by any observer of the blockchain, including privacy adversaries. Transactions that use unusual fees distinguish themselves from the rest of transactions on the blockchain. Two transactions that have the same unusual fee are statistically more likely to be made by the same user. Unusual fees can increase the pro
Thanks. AGPL vs. MIT, if you mean the cuprate Rust implementation of a Monero node, I was just the messenger for that CCS fundraiser. I am not involved in the project. But there is a little intersection with the fungibility defects issue. If Monero's main wallet code wallet2 would be AGPL (which it isn't. It is BSD, which is similar to MIT) then the closed source multi-coin wallets that implement Monero wouldn't be able to use it. That would increase the number of wallets producing fungibility defects because they wouldn't use the wallet2 procedure.
Thank you! I tried to be clear. Looks like I succeeded :) Let me know if you have any questions or comments.
Discussion Note: Formula for Accuracy of Guessing Monero Real Spends Using Fungibility Defects
A research note I wrote recently. For years there has been a worry about how much transaction fungibility defects are affecting user privacy. Now we can put specific numbers on it. If there is some tradeoff between requiring more transaction format strictness and some other goal, we can weigh the options with the estimated privacy benefits.
If your wallet uses the "standard" wallet2
method to create Monero transactions, this issue mostly doesn't affect you. As far as I know, some of the wallets that use wallet2
are the GUI, CLI, Feather, Cake, Monerujo, and Stack Wallet.
Direct link to the PDF: https://github.com/Rucknium/misc-research/blob/main/Monero-Fungibility-Defect-Classifier/pdf/classify-real-spend-with-fungibility-defects.pdf
Many parts of Monero's transaction format such as tx_extra contents, the fee paid to miners, and the decoy selection algorithm are not standardized by rules set by nodes nor blockchain consensus. Instead, alternative Monero wallet impl
Alternative Monero node written in Rust has moved to Funding Required
Why
Currently, Monero only has one node written in C/C++, many would see this as an issue. Having only one implementation makes us more vulnerable to implementation bugs, having another node will help us to spot and fix these issues.
monerod's code is also a bit of a mess, as many devs who have worked on it would agree. Cuprate is a fresh start and is built with modularity in mind which will lead to a cleaner and easier to understand codebase.
Having a consensus rules document will make it easier for developers to build software to interact with Monero. It will also make it easier to spot potential issues with consensus rules.
XMR donations to the MAGIC Monero Fund, which funds Monero research and development, are tax deductible for the donor if you file taxes in the USA: https://monerofund.org/ . Or donations can be made anonymously in XMR if donors do not care about making tax deductions.
Recipients of funds, i.e. devs and researchers, must KYC to MAGIC. It's a system that works for some devs. Others can use Monero's Community Crowdsoucing System (CCS).
(I'm on the MAGIC Monero Fund committee.)
New seed generation exploit in faulty cryptocurrency wallets
Popular documentation like “Mastering Bitcoin” suggests the usage of bx seed for wallet generation.
Secure cryptography requires a source of large, non-guessable numbers. If the random number generator is weak, the resulting cryptographic usage is almost always compromised.
For technical people: in this case, practical wallet security is reduced from 128 bit, 192 bit or 256 bit to a mere 32 bit of unknown key information.
I am not an expert, but if you use a multi-coin wallet that includes Monero, then your Monero could be affected. I don't see a list of wallet software that is affected. It would not be easy to verify that closed-source wallets do not use the exploitable code library.
Q: I used bx to generate my wallets but only use it for non-BTC coins, do I need to worry?
A: Yes. All funds stored on BIP39 mnemonic secrets or BIP32 wallet seeds are affected since the underlying private keys are basically public now.