►
From YouTube: KZG-Ceremony Breakout Call #2
Description
A
All
right
welcome
everybody
to
the
second
kcg
breakout,
call
nothing
too
huge
on
the
agenda
other
than
just
going
over
what
we
talked
about
last
time
and
getting
some
incremental
updates
from
people.
So
I
guess
the
first
topic
is
timelines
and.
A
Let's
see
where
do
we
want
to
let's
work
backwards
in
time
here,
so
the
intent
is
to
have
this
ready
in
advance
of
shanghai
shanghai
is
the
next
upgrade
after
the
merge.
You
know,
let's
say
q2,
of
2023
optimistically,
depending
on
what
goes
into
it.
So
I
mean
that's
more
than
enough
time
to
complete
a
ceremony
and
actually.
A
You
know
make
sure
that
we
run
it.
Well,
I'm
sorry,
I'm
distracted
for
a
second
there's
some
noise
in
the
background,
so
yeah
working
backwards
from
shanghai.
We
have
more
than
enough
time.
Oh
right,
so
there's
audits
that
we
have
slotted
in
for
august
and
october,
one
with
sigma
prime
sigma
prime
is
in
october
around
defcon
and
the
other
is
in
august
with
sec
bit
and
those
are
also.
Obviously,
these
are
kind
of
key
milestones
that
we
have
to
hit.
A
B
Yeah
sure
so
the
if
we
assume
the
current
hot
fog
schedule,
then
the
earliest
we
could
see
this
hitting
hitting
main
net
would
be
would
be
in
march
sort
of
mid-march,
and
we
would
need
a
minimum
of
two
weeks
before
then
of
like
just
have
everything
finalized.
B
So
these
constants
can
be
baked
into
clients,
which
means
sort
of
the
start
of
march
would
be
a
good
timeline
or
a
good
point
to
aim
for
as
sort
of
the
the
end
of
participation.
For
that,
then,
I
think
like
that.
B
The
idea
is
to
have
like
special
specialized
participation
as
and
we
can
do
some
fun
and
wacky
things,
and
that
that
I
think
we
should
leave
around
a
month
for
which
takes
us
back
to
february,
and
if
we
allow
three
months
for
like
general
participation
that
takes
us
back
to
the
the
start
of
november
of
november.
B
So
I
think
that
would
be
a
good
timeline
to
sort
of
aim
for
in
terms
of
having
a
fully
audited
and
robust
set
of
implementations.
For
all
of
this,
and
so
the
ceremony
going
flat
out
three
months
is,
I
think,
the
minimum
I'd
like
to
allow
for
for
general
participation,
particularly
given
that
some
of
this
would
be
over
the
the
end
of
your
holiday
period.
B
So
I
think
that
still
gives
us
enough
time
that
no
one
can
really
complain
that
they
weren't
they
weren't
included
or
were
unable
to
participate,
and
then
this
this
this
lines
up
nicely
with
the
the
august
audits,
which
would
be
sort
of,
like
so
sorry,
audits.
And
if,
if
we
we
aim
to
have
everything
ready
by
the
start
of
october,
then
we
have
devcon
audits
in
the
first
three
weeks
of
october,
and
then
we
use
the
last
week
to
implement
any
changes
suggested
in
the
audits.
B
So
I
think
that's
sort
of
a
a
good
rough
timeline
for,
and
that
would
be
the
sigma
prime
audit.
The.
What
what
my
current
thought
process
is
here
is
to
try,
have
try,
have
the
two
audits
target
slightly
different
aspects
of
the
protocol,
so
using
the
the
first,
the
first
orbit
or
audit
in
august
as
an
audit
of
the
sort
of
stuff
happening
on
the
crypto
side
of
things?
B
Make
sure
that,
like
the
idea
being
that
we
have
this
like
isolated,
crypto
api,
that
would
be
used
by
the
the
coordinator
software
and
the
sort
of
default
implementation
of
a
participant?
And
we
check
that,
like
sort
of
sanity
check,
that
this
pass?
Does
all
the
things
in
the
specifications
and
that
basically,
the
the
the
crypto
stuff
is
compliant
with
with
with
the
specs
I've
written
and
then
the
second
order.
B
In
october,
we
use
to
target
the
the
coordinator
to
itself
and
make
sure
that
it's
not
doing
things
like
censoring,
and
then
there
aren't
any
obvious
deadlocks
and
and
those
kinds
of
things,
and
we
just
assumed
at
that
point
that
the
the
crypto
has
been
correctly
audited.
So
this
is
sort
of
my
what
I
have
roughly
in
my
head
right
now
for
for
these
targets.
A
Yeah
that
makes
sense-
and
I
think
probably
we
should
just
write
it
down
somewhere
and
adjust
if
anything
does
change
it
in
that.
In
that
timeline,
I
was
gonna
say
when
you
first
said
you
know
three
months
to
run
it.
My
first
instinct
was
like
wow,
that's
incredibly
long
for
given,
given
what
I've
read
about
and
the
projects
that
I've
participated
in
three
months
is
like
an
eternity
it
feels
like,
but
on
the
other
hand
it
you
know
this
is
a
pretty
significant
change.
A
I
don't
think
ethereum
has
had
a
trusted
setup
like
this
put
into
the
base
layer
so
yeah.
I
guess
we
definitely
do
want
to
give
enough
time,
like
you
said,
make
sure
people
have-
or
at
least
the
developers
have
can
point
to
this
and
saying
look.
We
gave
a
pretty
significant
amount
of
time.
I
think
when
I
was
doing
research.
You
know
ceremonies
typically
ran
for
like
two
weeks
to
a
month.
A
B
Yeah,
so
I
I
agree
agree
with
all
of
those
things
I
think
what's
what's
what's
different
here
is
I'd
like
for
just
many
more
participants,
and
I
like
I'd
like
it
to
be
such
that
people
can
forget
that
we're
doing
this
and
then
sort
of
be
reminded
and
still
being
able
to
come
in
later
and
participate.
I
don't
want
it
to
be
like
oh,
I
must
I
miss
this
this
particular
month
or
these
two
weeks.
B
I
want
it
just
to
be
basically
on
stress
for
everyone,
but
also
gives
us
more
time
to
sort
of
include
and
help
sell
the
narrative
to
to
more
people.
So
I
think
that's
that's
a
better
way
of
doing
it.
Also,
if
our
cues
queues
start
to
get
long,
then
people
can
come
back
at
a
later
time
if
that
works
better
for
them.
B
So,
overall
I
I
I
prefer
to
leave
it
as
running
as
long
as
possible,
also
just
to
sort
of
minimize
that
from
from
another
perspective,
the
other
thing
is
that
in
terms
of
what
the
clients
need,
they
like
they
can
just
import
this
as
information
right
at
the
last
the
last
minute
before
they
before
they
push
out
a
client
release
so
the
week
we
can
really
run
this
right
up
until
the
moment
when
they
need
that
they
need
this
from
us.
B
As
possible
is
fine,
and
in
fact
I
would
say
we
should
even
start
running
it
before
we
finish
all
the
orders,
particularly
of
the
sort
of
the
the
coordinator
audits.
We
can
start
running
things
before
before
that
on
a
smaller
scale,
not
the
get
anyone
to
get
involved,
but
like
a
bit
of
stress,
testing
it
and
that
kind
of
thing
internally
and
start
getting
our
participation
going
positively
a
month
a
month
before,
before
we
open
it
to
the
public.
A
It's
all
good,
all
right,
okay,
so
then
we
can
just
move
into
general
updates
about
the
rest
of
the
things
listed
there.
I
guess
we
can
start
with
kev
if
you
have
any
changes
from
two
weeks
ago,
with
the
the
rust
implementation
or
you're
kind
of
sitting,
waiting
for
waiting
for
some
other
things
to
be
concluded.
What
what's
up
on
your
end.
D
Yeah
sure
so
there's
no
changes
on
the
rust
implementation.
I've
just
been
going
over
the
hackmd
with
this
specs
in
anticipation
to
push
some
changes,
I'm
not
sure
when
I'd
push
them.
To
be
honest,.
A
What
sort
of
changes
are
you
like
working
with
carl
on
this,
or
is
this
something
that
you're
looking
at
on
your
own.
D
B
Okay,
yeah
yeah,
yeah,
cool
yeah
that'd
be
that'd,
be
great
different
to
clean
some
things
up
the
I
guess,
I'm
front-running
the
the
order
of
the
the
agenda
here,
but
I'd
like
to
include
some
of
the
like
a
little
bit
more
of
the
rationale
and
explanation
of
like
why
certain
decisions
have
been
made
and
why
we're
doing
things
this
way
as
as
a
separate
document
which
I
think
would
be
important
to
include
in
the
specs
soon,
this
yeah
there's
that
they're
they're
design
decisions
which
which
are
being
made
and
like
kev
kev
kev,
came
up
with
some
of
them
in
the
beginning,
and
now
I
just
think
we
need
to
justify
them.
B
I've
had
some
discussions
with
other
cryptographers
who,
just
like
they
had
an
idea
of
how
this
would
go
just
based
on
what
they've
seen
in
the
past
and
that's
slightly
different
to
what
we're
doing
here.
So
I
think
we
should.
We
should
make
some
effort
to
explain
that,
so
that
should
be
going
up
soon
and
then
the
other
thing
is
the
checks
for
a
secret
being
common
across
all
of
the
the
the
sub-ceremonies,
the
the
the
uniqueness
of
pub
key,
I'm
going
to
remove
those
checks.
B
So
I
know
I
know
maurice
did
some
work
on
looking
at
at
this
and
we
had
some
discussion
in
the
chats,
but
that
I'm
gonna
remove
that
check,
because
I
don't
think
it's
adding
anything.
E
B
E
I
just
calculated
that
if
we
were
to
allow
a
new
participant
every
10
seconds,
then
the
transcript
for
one
day
would
already
be
50
gigabytes.
I
don't
know
if
you
guys
have
already
thought
about
this.
Oh.
E
No,
no,
the
trans,
no,
not
the
like
the
the
overall
ceremonies
right,
yeah.
E
D
D
B
Yeah
we
we
we
shouldn't,
be
we
shouldn't
be
storing
the
intermediate
powers.
My
specs
also
don't
require
that
so
the
the
it
should
basically
just
be
growing
by
one
g,
one
point
and
one
g,
two
point
per
participant.
B
D
E
D
Yeah,
with
sort
of
the
newer
sort
of
papers
that
have
come
out,
you
don't
need
the
older
intermediate
transcripts.
D
You
sort
of
just
need,
like
the
witness,
but
carl,
I
think
when
I
look
at
the
specs.
It
seems
that
it
does
sort
of
imply
that
we
need
the
old
powers
because
it
says
ceremony,
which
is
a
list
of
transcripts
and
the
transcripts
holds
like
a
list
of
g1
and
g2
powers
in
the
powers
of
term
that
that's
not
the
transcripts.
That
I
mean.
E
E
In
the
in
the
spec,
what
I
mean
is
the
overall
transcript
of
the
whole
ceremony,
which
has
a
lot
of
this
sub-ceremony
sorry
of
these
ceremonies
trucks
that
we
have,
and
so
that
and
that
shouldn't
be
the
case
right
well
yeah,
but
you
need
to
for
for
like
in
this
verify
submission
function.
B
I
must
clarify
things
on
the
spec,
then
there
should
only
ever
be
like
four
transcripts
within
the
ceremony,
and
each
of
those
transcripts
should
only
grow
by
one
g.
One
point
and
one
g,
two
point
which
are
both
in
the
witness
for
every
participant
and
that's
it.
E
The
way
I
understood
it
was
that
you
need
all
the
different
ceremonies
to
verify
that
everything
was
correct.
D
All
the
different
ceremonies,
so
I
think
the
way
it's
written,
there's
one
ceremony
and
it
just
has
four
different
sr:
four
different
transcripts
yeah,
but.
E
B
Yeah,
so
we,
the
the
the
checks,
basically
work,
the
the
some
checks
were
checked
that
the
witnesses
consistent
and
correct,
which
basically
means
that
the
latest
person
who
contributed
didn't
cheat
and
it's
built
on
top
of
all
the
previous
participants
and
then
there's
a
separate
set
of
checks
which
basically
check
that
the
the
powers
are
actually
consecutive
piles
of
of
tower.
B
B
So
everything
should
should
only
be
growing
by
like
one
point
in
each
of
the
lists
of
the
the
witness
in
each
of
the
transcripts.
A
Yeah
one
thing
we'll
definitely
want
to
do
is
make
sure
that
is
part
of
the
website
or
the
interface
that
there's
also
a
a
clear
path
for
people
to
explore,
verifying
the
transcript
and
maybe
like
a
couple
different
levels
of
explanation
for
what
it
is
and
how
people
can
actually
verify
it
themselves,
but
we're
a
little
early
for
getting
into
the
ui
stuff.
I
guess.
A
Jeff,
do
you
have
any?
I
guess,
while
we're
on
the
topic,
do
you
have
any
past
experience
with
people
verifying
transcripts
in
the
ceremonies
you've
run
or
anybody
else.
C
I
guess
yeah
well,
we
we
just
collect
each
contribution
and
put
it
on
a
server
and
make
it
available.
C
A
Okay,
so
yeah,
we
would
be
doing
something
similar,
then
just
post
it
on
a
server.
Would
that
change
when
the
coordinator
changes
or
would
this
be
a
persistent?
You
know
whoever's,
it
could
just
be
the
same
same
server
each
time.
A
Got
it
carl
another
thing
which
came
to
mind
about
the
ceremony
is,
I
think
we
should
probably
have
some,
like
you
said,
we'll
be
doing
testing
iteratively,
as
you
know,
before
a
big
public
launch
would
be.
Can
we
coordinate
any
of
this
around
defcon
and
have
maybe
like
some
some
space
on
the
main
stage
to
introduce
the
concept,
and
I
guess
formally
kick
things
off,
and
maybe
even
one
thing
that
would
be
really
cool
is
to
include
some
sort
of.
A
If,
if
not,
I
guess,
what
would
be
really
awesome
is
as
a
way
to
incorporate
some
randomness
from
the
crowd
either
like
a
photo.
I
I
don't
know
if
I
guess
the
interface
would
have
to
support
this.
I've
seen
some
setups
where
you
do
like
mashing
of
a
keyboard,
and
then
that
gets
that's
your
your
source
of
randomness.
A
Is
there
any
way
we
could
do
something
a
little
bit
special
where
we
like
take
a
photo
of
the
crowd
and
pull
some
randomness
out
of
that
or
I
don't
know
some
other
some
other
media
input,
and
if
that's
you
know
not
within
the
realm
of
possibility,
can
we
do
at
least
some
sort
of
contribution
live
just
to
get
people
aware
of
it.
B
Yeah
totally,
this
is
definitely
a
part
of
the
plan,
the
getting
up
on
stage
taking
photos
or
recording
stuff.
Exactly
it's.
It
should
be
very
much
a
part
of
a
part
of
this
and
just
hashing
a
photo
or
something
like
that
should
should
be
like
perfect.
A
perfect
way
of
doing
this.
That's
yeah.
B
Do
that
and
yeah
could
definitely
drop
some
some
some
some
exciting
things.
I
think
we
can
have
some
some
discussions
offline
to
try
to
decide
exactly
how
we
do
this
to
get
as
much
like
crowd,
involvement
excitement
as
as
possible,
but
I
think
that'd
be
a
good
starting
point
for
for
all
these
things
at
that
point.
Hopefully,
a
few
of
us
have
participated
already
in
the
background,
and
maybe
we
can
collect
some
some
people's
participation
already
at
devcon,
while
they're
there.
C
B
For
all
of
this,
and
maybe
maybe
useful
to
use
as
like
an
intermediate
output
for
testing
for
all
the
clients
moving
forward
as
well
like
we
have
at
the
end
of
devcon
like
here's,
our
output
that
we're
we're,
including
for
everyone
to
to
use
in
testing.
A
Yeah,
I
just
remembered
that
I
mean
I
don't
wanna
we're
still
super
early,
but
I'm
already
like
thinking
ahead
to
these
these
exciting
bits
where
we
actually
start
getting
contributions.
But
I
I
know
defcon
isn't
having
sponsors
this
year
and
instead
they're
having
like
community
project
booths
and
it
might
be
really
cool
just
to
have
a
booth
throughout
the
whole
week
where
people
can
come
and
do
contributions
and
learn
about
it.
But
yeah
I'm
getting
ahead
of
myself
here.
B
A
Awesome
yeah
I'll
make
sure
to
drop
a
line
early
to
skyler
and
the
team
there
just
to
be
like
hey.
We
need
like
15
minutes
the
main
stage
whenever
there's
a
kickoff
or
closing,
whichever
might
be
nice.
That
sounds
good.
A
All
right.
We
kind
of
jumped
around
the
agenda
a
little
bit,
but
we
can
does
anybody
else
have
any
updates
have
already
talked.
I
guess
one
thing,
that's
sort
of
near
in
time
would
be
the
any
any
updates
on
the
circum
side
of
things.
I
know
I
think
carl
you
mentioned
that
someone
had
started
talking
to
jordy
and
they
were
able
to
contribute
to
this.
B
Yeah
a
little
bit
a
little
bit
of
discussion
there,
the
that's,
that's
mostly
just
needing
a
a
crypto
library
for
for
all
jeff
stuff
to
plug
into.
We
had
some
discussions
earlier
about
exactly
what
that
looks
like
right
now.
The
snook
js
stuff
is
just
too
slow.
Well,
I
mean
it's
fine.
We
can
make
it
work,
but
it's
it's
slow
than
expected
as
and
it
takes
multiple
minutes
for
just
for
participation
and
a
like
decent
multi-threaded
wars
and
blob
should
be,
should
be
fair,
but
quicker
than
that.
B
C
Yeah,
so
I
I've
booked
case
code
and
put
in
the
wasm
build
code
and
got
it
got
a
building
to
wasm
and
but
only
with
a
single
threaded
model
haven't
got
multi-threaded
it's
compiling,
but
it's
it's
not
working
in
the
browser,
but
I'm
sure
that
can
that
can
be
got
going
and
even
with
single
threaded.
It's
like
one
minute
muslim.
B
Which
wasn't
implementation
is
this
that
you
that
you.
C
Think,
sir,
this
is
kev's
kev's
kids
rush
code
with
the
artworks
okay,
libraries
doing
that
yeah.
B
Yeah,
I
think
we
should.
We
should
definitely
do
some
some.
Some
benchmarking
of
the
various
libraries
what's
different
in
comparison
to
most
of
the
benchmarks
that
already
exist
is
that
most
of
them
are
favoring
like
how
long
it
takes
to
do
pairings
and
what
we
care
about
is
like
scalar
multiplication.
B
I
mean
obviously
there's
a
lot
of
multiplication
that
happens
within
a
pairing,
but
that's
not
quite
the
the
direct
comparison
there.
So
I
think
we
need
to
do
some
of
our
own
looking
into
to
how
that
that
works.
D
Do
you
mean
just
benchmarking,
just
multi-scale
and
multiplication
scale
scale
and
multiplication,
algorithms
for
each
library
or.
B
Why
not
benchmark
the
full
contribution
yeah
we
we
can
do
that
too.
That's
that
that's
also,
okay,
just
also
yeah.
That's
that's
fine.
B
I
guess
that
the
other
thing
we
we
care
about
in
these
these
implementations
is
how
quick
they
can
do.
The
the
subgroup
checks
right
and
there
could
be
large
variants
here,
based
on
what
the
implementation
looks
like
on
the
background,
the
back
end,
whether
it's
the
naive
for
more
complicated
ones-
and
I
don't
know
what
what
the
existing
libraries
use.
D
Yeah,
I
think
I
did
some
benchmarks
in
the
beginning,
so
from
multi-threaded
it.
I
think
it
was
around
10
to
12
seconds.
I
did.
I
didn't.
Do
a
naive,
scalar
multiplication
I
sort
of
did
a
bit
of
pre-computation.
D
I
think
it
was
on
the
fly
where
I
might
have
recoded
this
scalar.
I
can
double
check
but
yeah
doing
it
with
like
windows,
non-adjacent
form.
It
gave
it
quite
a
bit
of
a
speed
up.
D
D
D
B
D
Right
so
they
just
they
just
do
the
pairings
check
to
verify
that,
so
the
powers
are
in
consecutive
order
and
then
they
yeah
they
sort
of
say
that
if
one,
if
one
of
them
is
inside
of
the
group,
then
and
they're
all.
D
B
E
Okay,
that's
what
I
was
about
to
ask
which
pairing
checks
right
now
our
participant
doesn't
do
any
pairing
checks,
yeah.
D
Exactly,
oh,
I
see
yeah,
that's
why
it's
four
seconds,
but
the
pairings
checks
for
the
consecutive
sort
of
powers
you
you
just
need
to
do
like
a
multi-scale
multiplication
with
a
random
element.
So
it's
just
like
yeah
yeah.
B
D
I
think
the
multi
scaler
would
be
multiplication
would
be
cheaper.
Okay,.
D
D
Oh,
I
see
yeah,
I
think
the
individual
subgroup
checks
are
going
to
be
more
expensive,
since
you
multiply
by
the
group
order
or
the
product,
the
largest
prime
order.
B
Yeah,
okay,
you
may
be
correct
on
that,
in
which
case
you
must
switch
over.
D
B
D
B
Go
ahead,
yeah,
sorry,
just
mario
saying
that
they
they
only
check
the
elements
on
the
curve
yeah.
That's
that's
not
sufficient.
F
E
The
the
documentation
of
blst
is
doesn't
really
tell
us
that.
B
Yeah,
this
is
one
of
the
things
I
sort
of
hand
waved
over
in
my
specs,
where
I'm
like
this
does
the
subgroup
check,
but
I'm
not
sure
how
well
that
maps
to
blst
sorry
kev.
D
Oh,
I
was
gonna
say
if
it's
just
in
the
group
then
that
I
don't
think
that
might
be
enough,
because
the
group
doesn't
need
to
be
prime
order.
B
D
B
Yeah,
so
I
I
don't
think
it's
a
bug
on
the
spec,
but
it
certainly
could
be
clearer
and
we
should
definitely
check
what's
happening
under
the
hood
in
blast.
A
All
right,
we,
I
guess
we're
coming
close
to
the
end
of
the
hour
things
we
haven't
touched
on
yet
are
the
the
non-spec
stuff
really
so
I
guess
the
queuing
identification
stuff
that
jeff
you've
been
working
on.
Is
there
any
update
on
that
end
or
you're?
I
guess
you
also
mentioned
you
were
working
on
some
other
stuff
over
the
past
week.
Anything
you
want
to
update
with
regard
to
that.
Yes,.
C
Yeah
so
queuing,
I
think
we've
we've
settled
on
a
simpler
queuing
mechanism
in
talking
about
it
with
carl
yeah.
We
we've
found
some
simplifications.
It
should
be
a
very
simple
just
just
simple
queue.
None
of
these
time
slots
or
anything
because
we're
getting
because
the
contributions
going
to
be
pretty
quick,
so
we
can
it'll,
we
can
get
through
participants
pretty
quickly.
C
Can
you
give
me
a
question
quick
summary
of
like
what
the
differences
are?
Oh,
so
the
document
as
it
stands
has
time
slots
being
allocated
and
then
participant
would
request
the
time
slot
and
that
that
they'd
come
back
at
that
time
and
then
would
in
advance
of
it
and
be
ready
for
their
contribution.
C
So
that's
yeah,
so
I
don't
think
we
need
to
that
complication.
We
can
just
have
a
simple
cue.
C
And
the
queue
should
clear
pretty
quickly
because
we're
doing
lots
of
contribution
for
our
yeah
and
and
it's
important
to
keep
the
the
api
as
simple
as
possible,
because
then
it's
going
to
be
easier
for
implementers
to
implement
it
correctly.
C
What
else
so
yeah
other
than
that?
I
was
looking
at
that
rust
that
rust
thing.
So
that's
all
good
as
far
as
anti-several
proposal
is.
C
Checking
knots
on
mainnet
insist
that
the
nance
is
scrotum-free
if
they
have
an
ens
name,
we'll
use
that
otherwise
we'll
just
use
the
raw
ethereum
address.
Talking
to
carl.
Before
we
talked
about
the
idea
of
having
and
having
github
as
a
sign-in
mechanism
as
well.
C
So
if
anyone
has
any
thoughts
on
that,
we
like
to
hear
them,
it
means
that
someone
could
participate
with
their
ethereum
address
and
then
sign
on
with
with
their
github
and
do
another
contributions
but,
and
they
end
up
doing
you
know
a
small
number
of
contributions.
I
don't
think
that's
a
serious
problem.
C
B
High
nonsense,
yeah,
so
we're
not
like
we're
not
trying
to
have
this
perfect,
simple
resistance
system
here.
It's
just
that
we
can't
be
dust,
it's
the
goal.
So
if
you,
if,
if
like
someone
wants
to
put
in
the
effort
to
figure
out
a
way
to
participate
five
times,
then
that's
okay
as
long
as
like
not
everyone
does
that
and
you
can't
like
spin
up
bots
to
do
it,
then
that's
all
right,
the
other.
B
The
other
thing
I
think
it's
the
reason
I
think
it's
important
to
do.
Github
is
I'd
like
to
be
able
to
include
community
members
that
aren't
a
part
of
that
they
don't
use
ethereum
right
now
or
don't
have
ethereum
accounts,
and
I
think
it's
it's
sort
of
easier
to
extend
beyond
like
out
that
our
direct
vicinity
using
github
or
something
similar
in
addition
to
all
the
ethereum
stuff,
how
many.
B
A
E
Other
people
are
in
a
similar
vicinity.
It's
just
like.
I
don't
know,
I'm
not
going
to
to
take
out
my
my
cold
wallet
from
storage
and
you.
A
E
A
E
Just
if,
like
somehow
my
contribution
gets
revealed
on
some
on
one
device,
I
want
to
be
able
to
also
contribute
from
another
device
so
that
I'm
I'm
sure
that
my
contribution
is
not
being
revealed
right
and
I
think,
like
we
should
design
it
in
a
way
that
we
can
contribute
as
many
basically
as
many
times
as
we
want
to.
B
Yeah
I
mean
assuming
that
we're
not
running
into
bottlenecks
with
like
length
of
cues
and
participation
time,
then
absolutely
I
mean.
Hopefully
your
one
contribution
is
sufficient.
You
shouldn't
need
to
contribute
more
than
one
times,
but
if
you
have
any
reason
to
doubt
the
security
of
your
setup,
then
I'd
welcome
a
second
participle
like
a
second
entry
from
someone.
E
B
A
B
Wow
yeah,
so
I
think
marshall's
saying
roughly
700k
I
mean
I'm
not
expecting
to
get
that
many,
but
if
we
like
I'd,
definitely
like
to
achieve
the
smallest,
a
smaller
set
of
powers
is
4096.
I
certainly
like
to
achieve
more
than
4096
participants.
E
A
All
right
minutes
left
any
final.
I
guess
we
should
just
go
over
what
people
are
going
to
be
working
on
over
the
next
week.
I'm
going
to
talk
to
skyler,
I
mean
again.
A
This
is
like
we're
early
we're
very
early
on
this,
but
I'll
make
sure
that
they're
they
reserve
us
a
slot
at
the
beginning
of
defcon
and
start
to
talk
about
having
a
booth
where
we
can
explain
what
this
thing
is
over
the
course
of
devcon
and
maybe
get
some
contributions
from
people
that'll,
be
something
that
I
make
sure
to
do
over
the
next
week,
or
I
guess
it'll
be
two
weeks.
Let's
call
us
every
two
weeks,
carl.
A
What
are
you
gonna
be
up
to
I'd
like
to
if
we
can
start
to
put
the
the
spec
out
there
a
little
bit
more?
If
you
don't
think
we're
ready,
that's
fine,
but
I
think
we
should
start
moving
towards
that
of
like
publicizing
it
and
sending
it
to
some
of
the
other
teams
that
have
done
trusted
setups
to
get
start
to
get
their
eyes
on
it.
Unless
you've
already
done
this.
B
Yeah
sure
so
I
might
start
on
a
publish
like
timelines,
so
that
everyone's
on
the
same
page
on
what's
been
done
when
the
stuff
I
was
discussing
at
the
beginning
on
the
spec
side,
the
one
or
two
little
cleanups,
I
want
to
do
let's
say
today
tomorrow
and
over
the
weekend,
so
on
monday
we
can
start
publicizing
things.
That's
that
sounds
good
to
me.
I
want
to
write
some
of
the
clarifying
documentation.
B
I
was
talking
about
so
that
when
people
approach
this,
they
can
understand
where
our
desire
is
coming
from
and
what
the
different
decisions
we've
made
are
and
then
some
discussion
with
with
kev
on
first
bls
implementations
and
where
we're
going
from
there.
A
Awesome
and
this
all
this
stuff
is,
is
that
going
to
live
in
your
kcg,
specs,
repo
or
somewhere
else.
B
So
the
stuff
I've
discussed
now
will
be
in
the
the
kdg
specs
repo,
I'm
starting
to
think
that
if
we
have
like
it
depends
on
how
complicated
the
the
api
is,
but
I'm
starting
to
think
the
api
might
be
worth
having
in
a
separate
specs
repo
jeff,
and
I
were
having
some
discussions
earlier
today
on
exactly
what
like
what
that
looks
like
and
and
how
we
achieved
that
I
was
really
pushing
for
the
most
simplified
possible
api.
B
But
if,
if
we
end
up
with
long
queues,
that
might
might
not
be
so
so
friendly
and
it
might
make
it
worse
like
having
to,
I
was
trying
to
get
entirely
a
restful
api.
But
that
might
make
things
worse.
So
jeff
jeff
once
was
proposing
to
go
with
amqp,
which
I'm
not
familiar
enough
with
the
comments.
But
that's
one
of
the
things
I'll
look
into
over
the
next
few
days.
E
Awesome
so
we
had
a
well.
We
have
a
pretty
clean
rest
api
for
for
our
ceremony,
so
so.
B
I
don't
know
like
that
that
that
works
and
is
what
I'm
pushing
for,
but
the
concern
jeff
was
raising
with
me
and
I
think
it's
valid
is
what
happens
when
someone
shouts
loudly
on
twitter
about
all
of
this,
and
then
you
have
like
suddenly
a
few
hundred
people
jumping
in
the
queue.
Then
how
do
you?
B
How
do
you
handle
that
nicely
when
the
queue
starts,
extending
beyond
a
short
enough
time
and
my
initial
proposals
just
to
kick
people
if
the
queue
gets
longer
than
say
three
minutes,
but
maybe
that's
not
not
the
right
way
of
doing
this,
particularly
we
have
hundreds
of
people
all
of
a
sudden.
E
So
I
would
like
to
create
some
more
test
cases.
Just
for
the
crypto
side
of
things.
Cool
thing
about
about
go
is
you
can.
E
You
have
like
this
code
coverage
built
into
the
test
cases,
so
we
can
easily
figure
out
which
which
code
is
tested
and
which
code
is
not
tested,
at
least
in
our
code,
not
in
the
libraries
but
yeah.
So
we
can
create
some
test
cases
where,
like
I
don't
know,
the
subgroup
check
checks
fail,
or
I
don't
know
something
with
with
this
happening,
and
I
would
like
to
create
some
of
those.
B
For
the
that'd
be
cool
and
I'd
like
to
then
like
murder,
like
any
cool
test
cases,
you
come
up
with
I'd
like
to
have
in
a
fold
on
on
our
repo.
Unfortunately,
we
don't
like
for
the
the
subgroup
check
in
particular,
I
don't
think
we,
we
know
any
low
order
or
non-prime
group
elements
to
to
fail
that
check,
but.
A
Jeff,
what
are
you
going
to
be
up
to
over
the
next
week.
A
About
it
great
kev,
if
you
have
anything,
you
can
jump
in.
D
Yeah,
I
was
just
basically
gonna
look
over
to
specs
yeah.
I
don't
know
if
there's
it's
probably
better
to
sort
of
fix
up
the
specs
first
and
then
modify
the
code
after
and
just
yeah
to
speak
with
carl.
If
there's
anything,
we
can
discuss
moving
forward.
A
Right:
okay,
great
one
thing
which
just
came
to
mind
is
at
what
point
jeff?
Did
you
typically
start
looking
at
the
interface,
the
website
should
I
start
reaching
out
to.
A
I
know
the
the
ethereum.org
team
has
done
some
stuff
for,
like
they've
spun
up
some
websites
for
other,
like
affiliated
teams,
should
we
reach
out
to
them
and
sort
of
get
a
slot
in
their
in
their
workflow
for
setting
up
a
site
for
us
or
what
what's
your
experience
there.
C
Oh
yeah
yeah,
I'm
happy,
I
mean
we've,
we've
just
done
really
crappy
simple
websites
before
so
having
a
nice
one
would
be
great
yeah
if
you
guys,
if
your
guys
have
access
to
infrastructure
and
everything
that
would
work
well.
Otherwise,
I
I'd
have
access
to
our
pse
infrastructure,
guys.
C
A
For
sure
yeah
I
can
do
that
just
wanted
to
make
sure
that
you
weren't
already
talking
to
people,
and
that
was
the
direction
we
wanted
to
go.
A
A
Great,
I
think
that's
it.
Thank
you,
everybody
for
keeping
working
on
this
quietly,
while
it's
still
quiet,
eventually,
it'll,
be
pretty
big
and
we'll
look
back
fondly
on
these
small
calls
with
five
people
but
yeah.
Thanks
for
the
work
everybody's
done,
and
I
guess
we'll
talk
in
the
chat
and
then
in
two
weeks
for
the
next
update.