Skip to content

Instantly share code, notes, and snippets.

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256
i run these nodes. they suffer from connctivity issues sadly.
plowsof3t5hogddwabaeiyrno25efmzfxyro2vligremt7sxpsclfaid.onion
plowsoffjexmxalw73tkjmf422gq6575fc7vicuu4javzn2ynnte6tyd.onion
plowsofe6cleftfmk2raiw5h2x66atrik3nja4bfd3zrfa2hdlgworad.onion
=== monero info ===
@plowsof
plowsof / matrix-bot-homeserver-msg.py
Created June 14, 2024 19:36
messages users on matrix.org homerver once if the bot sees them send a message,
import asyncio
import logging
from nio import (
AsyncClient, RoomMessageText, RoomCreateResponse, RoomCreateError,
LoginResponse, RoomPreset, RoomVisibility
)
import aiosqlite
from datetime import datetime
# Set up logging
@plowsof
plowsof / external_gitlab_ci.yml
Last active August 13, 2024 14:48
testing an external pipeline config file
external_ci_v1.0.1:
image: php:8.1
stage: deploy
script:
- |
apt-get -qq update &&
apt-get install -y jq &&
apt-get install git -yqq &&
apt-get install -y libyaml-dev &&
pecl install yaml &&
@plowsof
plowsof / background_sync_compare.py
Created November 10, 2023 01:38
restore a wallet from 0 with sync off / reuse password / custom password and compare balances
from monerorpc.authproxy import AuthServiceProxy, JSONRPCException
import os, requests, time
#./monero-wallet-rpc --disable-rpc-login --rpc-bind-port 18082 --stagenet --wallet-dir /home/human/monero/build/Linux/view_sync/release/bin --daemon-host node2.monerodevs.org:38089 --trusted --no-initial-sync
wallet_dir = "/home/human/monero/build/Linux/view_sync/release/bin"
daemon_address = "node2.monerodevs.org:38089"
rpc_url = "http://127.0.0.1:18082/json_rpc"
test_wallet = "stager"
rpc_connection = AuthServiceProxy(service_url=rpc_url)
original_balance = 0
@plowsof
plowsof / scan_tx_background_sync_2.py
Created November 8, 2023 12:34
scan_tx + custom-background-password issue
from monerorpc.authproxy import AuthServiceProxy, JSONRPCException
import os
#./monero-wallet-rpc --disable-rpc-login --rpc-bind-port 18082 --stagenet --wallet-dir /home/human/monero/build/Linux/view_sync/release/bin --daemon-host node2.monerodevs.org:38089 --trusted
wallet_dir = "/home/human/monero/build/Linux/view_sync/release/bin"
daemon_address = "node2.monerodevs.org:38089"
rpc_url = "http://127.0.0.1:18082/json_rpc"
test_wallet = "stager"
rpc_connection = AuthServiceProxy(service_url=rpc_url)
original_balance = 0
@plowsof
plowsof / scan_tx_background_sync.py
Last active November 7, 2023 05:39
restore wallet with scan_tx , repeat with background sync active then compare after background sync is stopped
from monerorpc.authproxy import AuthServiceProxy, JSONRPCException
import os
#./monero-wallet-rpc --disable-rpc-login --rpc-bind-port 18082 --stagenet --wallet-dir /home/human/monero/build/Linux/view_sync/release/bin --daemon-host node2.monerodevs.org:38089 --trusted
wallet_dir = "/home/human/monero/build/Linux/view_sync/release/bin"
daemon_address = "node2.monerodevs.org:38089"
rpc_url = "http://127.0.0.1:18082/json_rpc"
test_wallet = "stager"
rpc_connection = AuthServiceProxy(service_url=rpc_url)
original_balance = 0
@plowsof
plowsof / i2pzero_to_i2pd.md
Last active March 9, 2024 22:25
i2pzero to i2pd

Install i2pd debian/ubuntu:

sudo add-apt-repository ppa:purplei2p/i2pd
sudo apt-get update
sudo apt-get install i2pd

stop i2pzero service

@plowsof
plowsof / bp++_cypherstack_feedback_1.md
Created August 18, 2023 07:02
bp++ cyperstack feedback 1

Initial feedback received from CypherStack for the latest blockstream BP++ paper:

There are several aspects of the preprint that should be considered out of scope for a review:

  • Multiparty computation. There are no specific protocols presented for this, and no corresponding security model of proofs of security.
  • Batch verification. While the preprint mentions that BP++ supports batch verification, it provides no details on the corresponding algebra.
  • Multi-asset transactions. The preprint discusses multi-asset transactions in the context of its protocols, but these are not required for range proofs.
  • Optimized binary range proofs. The protocol proposed for optimized binary range proofs has only an informal and vague security proof that is insufficient to assert the claims of the corresponding theorem.
@plowsof
plowsof / seraphis_scope_1.md
Created August 18, 2023 06:56
seraphis rough scope of work 1

Jberman / Kayaba / Koe have helped created a rough scope of initial work for the Seraphis papers which can be seen below.

  • Read through the Seraphis papers (the paper describing the transaction protocol and its companion paper spec'ing its implementation)
  • Establish a formal security model to prove Seraphis secure under.
    • Section 1.2 in the Seraphis paper sketches a model but is light on details. Plausible path: rework section 1.2 such that it can be formalized in terms of algorithms and/or experiments.
  • Formalize the respective algorithms in the instantiation of Seraphis and see if the Seraphis construction is amenable to proofs under the chosen security model.
    • If the Seraphis construction is not amenable to a chosen security model, then it would still be useful to formalize security proofs for individual components of Seraphis (membership, ownership, unspentness, amounts balance).
  • One researcher we've contacted sugges
curl -X POST http://node.monerodevs.org:38081/sendrawtransaction -d '{"do_not_relay": true, "tx_as_hex":"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