Key English Russian
contributing->altqrmonero Monero QR code
contributing->altqrbitcoin Bitcoin QR code
mining->p2poolh P2Pool: The best of both solo and pool mining
mining->p2poolnew P2Pool is a clever new way of mining Monero, which allows miners to receive the frequent payouts offered by pools without needing to trust a centralized pool. P2Pool is a Peer-To-Peer mining pool that gives miners full control over their Monero node and what it mines. More details in <a href="{{ site.baseurl }}/2021/10/05/p2pool-released.html">the announcement post</a>.
mining->p2poolp P2Pool is a sidechain to Monero, and P2Pool blocks are potentially Monero blocks. Each miner submits block templates that include payouts to all of the miners that are mining at the same time (those that currently have shares in the PPLNS window). High quality block templates are added to the P2Pool blockchain as blocks; these count as "shares" for the miner who found them.
mining->p2poolfeatures Main features
mining->p2pdecentralized <b>Decentralized:</b> no central server that can be shutdown/blocked/malicious.
mining->p2ppermissionless <b>Permissionless:</b> anyone can join the sidechain, and it's effectively impossible to censor individual miners.
mining->p2ptrustless <b>Trustless:</b> there is no pool wallet; funds are never in custody. All pool blocks pay out to miners immediately.
mining->p2pplns <b>PPLNS</b> payout scheme
mining->p2pzerofee 0% fee
mining->p2pzeropayout <b>0 XMR</b> payout fee
mining->p2pminpayout Less than 0.0004 XMR minimum payout
mining->p2pmoreinfo More information and details on the GitHub repository of the project:
roadmap->zeromq 0MQ/ZeroMQ 0MQ/ZeroMQ
downloads->hwtrezor 2.3.4 2.3.4
research-lab->mrl2_abstract On 4 September 2014, an unusual and novel attack was executed against the Monero cryptocurrency network. This attack partitioned the network into two distinct subsets which refused to accept the legitimacy of the other subset. This had myriad effects, not all of which are yet known. The attacker had a short window of time during which a sort of counterfeiting could occur, for example. This research bulletin describes deficiencies in the CryptoNote reference code allowing for this attack, describes the solution initially put forth by Rafal Freeman from Tigusoft.pl and subsequently by the CryptoNote team, describes the current fix in the Monero code base, and elaborates upon exactly what the offending block did to the network. This research bulletin has not undergone peer review, and reflects only the results of internal investigation. 4 сентября 2014 года против сети Monero была проведена необычная атака совершенно нового типа. В результате этой атаки сеть была разбита на две чёткие подсистемы, каждая из которых отказывалась признавать законность другой. Это повлекло за собой мириады последствий, не все из которых известны и по сей день. У злоумышленника было небольшое окно времени, которого бы хватило, например, на создание подделки. В этом исследовательском бюллетене описаны недостатки кода CryptoNote, которые делают возможным проведение такой атаки, а также решение, изначально предложенное Рафалем Фримэном (Rafal Freeman).
what-is-monero->grassroots_p4 500 developers 500 разработчиков,
tools->nownodes node APIs API узла
research-lab->iacr2020312 Arcturus: efficient proofs for confidential transactions Arcturus: эффективные доказательства конфиденциальных транзакций