►
From YouTube: Eth2.0 Call #41 [2020/6/10]
Description
A
A
But
nonetheless,
hello,
everyone
and
hello
if
anyone
is
on
youtube,
pretty
standard
got
a
couple
of
items
that
are
not
on
every
schedule
like
quickly
discussing
key
hygiene,
even
in
the
context
of
test
nets-
and
I
know
that
ran
couldn't
join
us.
But
we'll
quickly
talk
about
the
api
working
group.
A
Let's
go
ahead
and
get
started,
testing
and
release.
There
are
a
couple
of
minor
clarifications.
I've
made
it
very
clear
if
anything
is
in
dev
that
you
need
to
be
aware
of,
I
think
there's,
maybe
just
one
thing
right
now.
There's
a
couple
of.
A
Optimizing
prs
in
the
well
with
respect
to
the
fork
choice
that
are
up
right
now.
I
expect
those
to
go
into
dev
soon.
I
will
make
note
of
them
to
all
the
teams,
so
you
can
take
a
look
and
probably
do
a
release
sometime
in
the
next
week
or
so,
but
again,
they're
not
substituted.
A
B
Sure
for
test
nuts,
I've
worked
on
this
validator
tooling,
which
enables
you
to
build
these
mouse
separator
wallets
to
deploy
manufacturers
for,
like
stress
testing
or
just
if
you
want
to
deploy
your
ventilators
to
different
clients
easily.
B
It's
definitely
touring,
though,
so
we
weren't
too
many
bugs,
and
it
brings
up
this
whole
wall
of
debate,
and
I
wanted
to
talk
about
how
clients,
either
the
earlier
directed
towards
a
wallet
or
towards
a
key
store.
They
should
try
and
like
convert
to
this
design
and
light
us
as
some
strong
points
to
use
a
key
store,
specifically
instead
of
being
welded
centric,
then
I
made
some
changes
to
serenity
will
be
integrated
into
rumor.
I'm
planning
to
make
a
chain
test
to
process
many
blocks,
and
I
have
some
more
like
that's
not
like
testing.
B
It's
just
this
open
source
explorer
wrapping
thing
which
so
you
explain
the
latest
currently
as
an
api
that
exposes
some
functions,
information
and
blocks,
and
this
passion
tooling
can
interpret
this
process
it
into
a
database
for
you
to
analyze
the
whole
business
and
I've.
Given
our
users
access
to
this,
to
build
more
statistics
and
figure
out
where,
if
one
photo
thing
goes
wrong,
where
fork
secure
was
taken
from,
looks
like
all
these
kind
of
statistics.
A
It
cool
so
if
you
want
to
get
your
hands
on
some
sql
testnet
data.
C
Yep
beacon,
fuzz
update,
making
some
good
progress
on
fuzzing
lately,
prism
now
supports
native,
go
builds,
making
it
go
gettable
thanks
freezing
guys
for
for
this
much
appreciated.
C
C
We
also
found
the
panic
in
lighthouses
in
our
crate,
when
decoding
non-ufa
characters,
which
was
fixed
almost
immediately
by
age.
We've
been
working
on
integrating
load
star
as
well,
and
we've
identified
four
unique,
bugs
two
type
errors
in
the
enr
library
and
two
other
type
errors
in
the
block.
Ssd
generalization-
I
guess
in
other
news-
we've
also
been
helping
with
some
bls
fuzzing
on
the
e1
front,
with
the
guest
team
reported
a
few
issues
there.
C
But
I
guess
it's
not
really
in
the
scope
of
this
call,
since
no
one
here
is
using
that
school
library,
but
it
was
worth
mentioning
we're
working
towards
dockerizing,
e3,
fuzz
and
we'll
be
pushing
this
to
lockerhub
so
that
the
community
can
help
find
bugs-
and
I
guess,
speaking
of
dockers,
we've
analyzed
the
oss
fuzz
requirements
and
are
pretty
confident
we'll
be
able
to
have
our
fuzzers
running
on
the
google
infrastructure.
Very
soon.
That's
pretty
much.
It.
C
Yep,
that's
right
for
open
source
projects
that
are
highly
used
and
quite
popular,
so
we
might
want
to
coordinate
and
submit
one
sort
of
unique
request
for
all
clients,
but
the
docker
approach
that
we
have
is
very
much
in
line
with
that
requirement,
which
is
good.
Nice.
A
A
Okay,
the
update
is
prismatic,
has
a
test
net
launching
and
we
will
talk
about
where
the
clients
are
with
respect
to
getting
a
multi-client
up.
A
But
I
threw
up
an
item
here:
validator
key
hygiene,
there's
a
lot
here
and
maybe
we'll
end
up
having
to
take
some
discussion
out,
but
the
original
reason
I
put
it
up.
There
was
the
practices
that
we're
going
to
want
validators
to
take.
We
need
to
start
training
them
to
do
them
today
with
respect
to
our
test
nets,
rather
than
giving
them
higher
requirements
on
our
different
requirements.
A
Once
we
reach
maintenance,
for
example,
you
know
not
storing
your
withdrawal
credentials
or
even
maybe
generating
your
withdrawal
withdrawal
credentials
on
the
same
machine
that
you're
going
to
be
staking
on
thinking
about
air
gap
machines.
Thinking
about
some
of
the
trade-offs
here.
There
are
also
other
components
of
this
conversation,
including
well,
it's
first
key
stores
how
tied
all
your
keys
are
together
all
that
kind
of
stuff.
A
So
the
first
again
is
is
a
psa
to
start
shifting
the
docs
and
shifting
things
in
the
direction
of
favoring
security,
rather
than
ease
of
use
even
on
the
test
nets.
But
does
anybody
want
to
get
more
into
this?
D
Related
to
that
for
audit
proposal,
we
asked
the
auditors
to
give
us
some
guidelines
on
secret
management.
So
I
suppose
this
is
something
very
relevant
as
well,
and
maybe
they
are
the
best
one
to
ask
about
do
and
don'ts.
A
Yes,
absolutely
and
we're
actually
we're
talking
with
another
security
firm
to
do
a
top-down
look
at
validating
for
hobbyists,
which
would
be
include
some
key
recommendations,
but
also
include
things
like
dos
mitigation
and
managing
reports
well
and
all
that
kind
of
stuff.
So
there
is
some
some
work.
Certainly
some
work
to
be
done
here.
E
For
some
prism
here,
we've
we've
had
a
lot
of
we've
been
thinking
a
lot
about
this
and
we're
currently
working
on
a
whole
accounts
redesign
and
how
people
deal
with
their
keys.
I
think
we're
planning
on
maybe
like
name
spacing
kind
of
basic
commands
versus
advanced
power,
user
commands
and
yeah.
I
agree
like
like
we're
going
to
focus
a
lot
on
making
sure
users
know
what
to
do
with
their
withdrawal
withdrawal
credentials
where
to
put
them.
But
overall
most
of
the
feedback
comes
down
to.
E
Like
you
know,
kind
of
commands
are
not
intuitive
like.
How
can
I
move
my
accounts
from
one
computer
to
another?
You
know
where
are
my
keys
like
how
do
I?
How
do
I
safely
move
them
around?
So
that's.
We
feel
like
there's
a
lot
of
friction
there
and
that
would
be
super
helpful
if
we
can
all
like
kind
of
think
about
that
together.
B
Right
so
this
this
question
started
when
I
was
diving
into
a
philadelphia
stores.
How
do
I
deploy
thousands
of
federators
for,
like
stress
test
networks
with
all
these
different
clients,
and
so
the
this
tooling
I
built
was
first
gear
smarter,
which
is
very
wallet-centric.
B
This
means
is
that
you
have
this
option
to
like
specify
an
adjacent
file
where
to
find
accounts
right
how
to
what
the
passwords
are
for
these
accounts
and
these
kind
of
things
it
loads
it
from
this
wallet
system,
from
eve
to
which
is
great,
but
it's
not
really
like
meant
for
clients,
so
much
as
just
managing
your
keys
outside
of
the
client,
and
so
how
lighthouse
differs
is
that
it's
very
key
store-centric
it
loads
all
these
metadata
directories
which
hold
these
keys
for
the
photographers.
B
That's
just
a
bare
json
file,
no
gimmicks,
no,
not
no
clutter,
no
index
files,
no
nothing!
It's
just
the
json
file
with
the
key,
which
makes
deployment
very
easy
if
you
can
just
produce
the
p
and
the
secrets
are
managed
separately
and
are
managed
well
in
the
sense
that
you
have
them
in
some
foul.
You
can
protect
this
file
from
various
kinds
of
problems,
and
you
are
very
explicit
about
including
federatives
or
not,
and
it
checks
if
new
5
datas
are
included
by
accident.
B
There's
a
lot
of
practices
here,
I'd
like
other
clients
to
look
into
for
their
security.
So
and
then
I
know
baku
is
following
suit
there.
It's
like
doing
similar
things,
except
that
the
it's
looking
like
it
will
be
more
flattened
structure
so
not
like
one.
There
are
three
verified
data,
but
more
like
a
few
files
per
validator
in
one
directory,
and
this
all
it's
more
of
the
same
that
my
point
here
is
what
account
or
what
t-star
type
you
use.
B
Carl
has
been
working
on
this
new
in
this
standard.
You
should
ask
him
about
this.
B
F
The
erps
and
some
of
the
changes
coming
yeah,
so
I've
got
a
few
points.
One
is
that.
G
I'd
like
to
update
the
yapi
2333
to
the
new
arguments
that
you
solved
basically
from
the
vr
standard.
So
that's
this
pr
yeah.
It
should
basically
be
a
one-liner
ball
or
most
people
implementing
it.
G
So
it
is
a
bit
hard
to
propose
this
and
I'm
a
little
more
concerned
about
there
being
multiple
versions
out
there.
So
if,
as
client
teams
you'll
see
this
and
it's
something
you'll
do
it,
then
I'd
like
to
go
ahead
with
it,
and
then
we
can
just
sort
of
ignore
the
earlier
version,
but
otherwise
I'd
prefer
not
just
have
a
sort
of
form
of
variance.
G
This
idea
here,
which
is
whether
the
the
sort
of
the
path
specifies
that
keys
need
to
be
included
and
which
way
the
keys
must
exist,
and
that
this
indicates
that
the
withdrawal
key
is
the
parent
key
of
each.
G
So
the
arguments
that
the
benefits
are
supposed
to
be
three
four
one
is
that
the
last
multiplying
complication
as
in
secret,
shared
keys
secret,
shared
key
scheme,
is
ever
going
to
be
able
to
follow
a
path
anyway.
So
it
doesn't
really
make
sense
for
me
to
talk
about
parts
if
you
can
be
using
secret
shared
keys,
because
by
definition
you
don't
know
where
they
exist.
G
And
then
things
like
staking
services
will
staking
services.
You
can
still
use
this
to
generate
your
keys.
So
say
you
want
to
have
your
withdrawal
keys
and
the
staking
service
is
going
to
separately,
derive
you
well,
then
your
withdrawal
keys
are
going
to
be
yours
anyway,
and
you
can
derive
the
card
to
not
have
or
not
use
the
signing
keys
for
hardware
wallets
and
so
that
the
the
one
approach
would
be
to
have
two
separate
mnemonics.
G
But
I
would
argue
that
that
just
gets
very
confusing
and
increases
the
scope
for
losing
keys,
and
so
the
other
option
would
be
to
have
hardware
wallets,
be
able
to
export
key
stores,
which
would
be
my
personal
preference,
and
if
this
is
done,
then
we
can
just
agree
that
key
stores
are
of
the
standard
for
transparent
keys,
and
then
you
can
keep
your
withdrawal
credentials
in
the
hardware
wallet.
H
G
A
So
help
me
understand
in
the
in
the
argument
for
clients
not
knowing
or
caring
about
wallets
and
instead
just
caring
about
key
stores
that
provides
kind
of
maximum
flexibility
in
how
you
ultimately
manage
your
keys
right.
The
more
you
put
a
wallet
embedded
in
like
wallet
standards
have
to
be
embedded
in
a
client.
The
more
you've
become
one
opinionated
on
how
people
generate
the
keys
and
two
likely.
If
you
use
this
key
generation
where
withdrawal
credentials
and
and
signing
keys
are
generated
from
the
same
wallets.
A
A
I
G
Allows
a
lot
more
flexibility
and
I'd
argue
for
simplicity.
Furthermore,
I
really
don't
think
that
clients
should
necessarily
want
to
hold
on
to
withdrawal
keys
yeah.
No,
not
again,
that's
just
scary,
and
I
think
the
few
secrets
you
can
hold
on
towards
the
client
better,
but
I'm
open
to
part
arguments
on
that
point.
Okay,.
C
I
think
we
definitely
agree
here
for
a
little
house.
We,
if
you
decrypt
the
wallet
seed,
you
can
pretty
much
access
all
possible
keys
from
from
that
wallet.
You
just
derive
them.
It's
probably
not
something
we
want.
B
A
Yeah,
okay,
so
there's
a
handful
of
things
here:
one
is
the
evolving
discussion
and
standards.
The
eip
standards,
two
is
potentially
some
standards,
or
at
least
common
guidance
on.
A
How
to
use
keys
and
key
stores
in
clients
is
there
anything
else
I
mean.
I
know
the
first
encapsulated
a
lot.
I
I
think
that
we
probably
need
to
take
there's
a
lot
here
to
discuss.
We
probably
need
to
continue
the
conversation
in
other
threads
and
potentially
get
on
a
call
and
hack
through
this.
I
think
we
have
a
lot
of
other
things
to
cover
today.
A
Carl,
can
you
make
sure
to
share
any
links
where
conversations
happening?
Is
there
anything
other
than
the
the
two
links
you
sent
that
you
want
people
to
have
their
eyes
on.
G
A
Right,
meaning,
if
I
handle
my
deposit
in
a
totally
other
place,
how
do
I
actually
onboard
into
a
client
yeah
yeah
anybody
you
want
to
share.
B
B
You
have
these
other
files
for
depos
update
about
notes
that
gets
generated
only
when
you
need
them,
and
so
you
can
start
your
fabric
to
register
keystore
or
you
can
go
through
through
the
deposit
process
with
the
client
and
keep
the
data
together,
which
is
why
I'm
like
deku
is
doing
it
slightly
different
with
this
flattened
structure,
a
lot
of
like
smaller
choices
in
there-
and
I
think
paul-
was
planning
to
write
something
about
his
choices
and
bypass,
and
we
should
try
and
discuss
the
design
here.
A
Yeah
does.
A
The
key
store
management
within
the
context
and
the
key
management
within
the
context
of
a
client
does
this
warrant
its
own
standard,
a
doc
for
guidance
and
eip?
Are
there
any
opinions
on
where
this
information
should
be
standardized.
G
J
K
A
Secret
management,
in
the
sense
of
how
I
decrypt
these
key
stores-
yes,
yeah,
yeah-
that
one's
that
and
stuff.
L
G
Many
of
them
don't
to
avoid
this
problem,
but
the
arguments
for
are
basically
normalized
forms
should
get
you
around
this
and
it
opens
your
key
space
to
be
much
larger.
So
if
you
want
a
dictionary
attack
or.
N
N
G
The
denim
the
format
that's
used
to
generate
mnemonics
for
ethereum
right
now
and
that's
been
used
with
all
these
eips
and
that's
you
are
allowed
to
use
a
password
and
that
password
you
can
use
unicode
characterism,
for
example.
So
it
is
sort
of
an
extension
of
that.
G
G
A
I
I
was
thinking
maybe
tomorrow,
but
I
maybe
we
want
to
gather
ourselves
a
little
bit
more.
Let's
plan
on
you
know
mid
next
week,
I'll
I'll
organize
something
in
the
next
day
and
try
to
get
a
good
time
for
everyone.
Maybe
this
time
on
thursday,
but
maybe
a
little
bit
earlier.
A
Cool
well,
there's
a
lot
there
and
it's
standards
are
important,
but
even
of
the
utmost
importance
is
getting
people
to
have
just
good
hygiene,
regardless
of
the
standards
and
not
allowing
them
to
make
really
bad
stupid
mistakes.
Okay,
thanks
I'm
trying
to
think
where
this
conversation
can
happen
organically
over
the
next
few
days.
Does
anybody
have
a.
A
Discord
channel
key
management:
that's
a
good
badge:
yeah,
okay,
yeah
cool
I'll
pop
one
of
those
up
in
there
all
right
thanks
everyone!
Great
now
we
move
on
to
client
updates.
We
will
start
with
tecu.
O
All
right
that
is
me
so
version
0.12
update,
is
going
well,
bls
is
done.
Gossip
sub
1.1
is
done,
fork
choice,
state
transition,
validator
changes
are
done,
just
finishing
off
the
remaining
networking
changes
and
we'll
be
there.
O
We've
had
a
big
focus
on
our
memory
footprint
in
the
last
sprint,
and
we've
managed
to
reduce
the
remarkable
memory
use
for
hot
states
and
we've
just
merged
a
big,
rework
and
refactor
that
limits
a
number
of
states
stored
in
memory
and
regenerates
them
as
needed.
So
looking
for
some
good
improvements
there
other
than
that,
mostly
fixing
bugs
I'll
spare
you
the
the
details,
you
can
check
our
pr's
if
you're
interested,
reducing
the
noise
in
our
logs
and
improving
usability
generally,
I
think
that's
pretty
much.
It.
A
Excellent
and
I
guess
the
memory
footprint
reduction
is
contextualized
by
the
fact
that
correct
me,
if
I'm
wrong
the
java
garbage
collection,
is,
will
essentially
expand
the
memory
as
much
as
you
give
it.
O
Yeah
we've
got
we're
talking
a
lot
about
how
much
you
can
you
can
trust
the
information
shown
on
eth2
stats,
for
example,
that
that
reports
a
kind
of
whole
usage
of
the
java
process,
but
that's
not
reflective
of
what's
actually
being
used
and
what
java
will
get
out
of
the
way
if
somebody
else
needs
some
memory,
so
it's
it
looks
bad,
but
it's
not
in
reality
that
bad.
A
D
Hey
so,
in
the
past
two
weeks,
we've
had
a
few
exciting
changes.
First
of
all,
we
made
the
block
and
attestation
processing
about
10
to
50
x,
faster
by
caching,
a
hash
reroute.
So
it's
not
fully
remarkable.
D
D
D
We
have
eip
2340,
it
is
implemented
or
in
pr.
Also.
The
audit
that
will
be
over
four
months
will
start
in
ten
days,
we'll
have
an
announcement
with
all
the
details
plus
or
the
firm
that
we
will
be
engaging
with.
D
On
the
visualization
side,
we
updated
the
graph
and
monitoring
so
that
it's
a
bit
clearer
to
monitor
a
single
node
before
you
monitor
the
the
wall
fleet
on
the
test
nets
witty.
So
we
had
some
exciting
news
for
mobile
users.
Now
you
can
start
nimbus,
have
your
computer,
your
phone
sleep
for
a
night
and
on
wake
up
it
will
re-sync
without
any
issue.
Well,
at
least
it
did
at
least
once.
D
No
on
the
technical
guides,
so
we
have
updated
the
guides
to
install
the
nimbus
in
particular
on
phones.
So
what
was
changed
in
particular
was
that
all
setup
and
instructions
were
referring
to
the
goalie
p2p
demon,
but
now
you
don't
need
to
use,
go
or
install
go
at
all.
D
We
have
a
few
platform
specific
bugs
or
regression
so
bug
one
is
on
windows
32-bit.
I
really
hope
no
one
is
using
that,
but
we
are
still
testing
windows
32-bit,
because
it's
the
best
way
in
ci
to
test
32-bit
platforms,
and
we
have
a
regression
on
arm
64
that
we
are
investigating
and
overwatch.
We
had
a
lot
of
bug
fixes
our
async
framework,
lib
p2p,
in
particular,
memory
usage
and
links,
and
that's
all.
A
Great,
thank
you.
Thank
you
mommy
and
does
does
nimbus
sink
witty
to
head,
or
is
there
still
the
issue
with
getting
to
the.
D
Yes,
when,
when
I
was
mentioning
as
what's
called
sleeping
and
on
wake
up
precinct,
it
wasn't
witty,
but
there
is
one
thing
we
have
an
issue
with
the
four
choice
right
now
we
have
the
prototype
for
choice
that
is
being
living
in
a
pr
and
somehow,
when
we
switch
to
it,
we
don't
finalize
anymore
and
the
fourth
choice
that
we
are
using
right
now
is
a
guaranteed
split.
D
If
there
is
a
tie
break
because
we
are
using
as
a
smaller
hash
as
a
tie
break
while
everyone
else
is
using
the
bigger
hash,
but
it
didn't
happen
yet
so.
A
Yeah
tie
breaks,
tie
break
is
generally
unlikely,
but
yeah
you'll
be
on
your
own.
Okay,
cool
load
start.
M
Oh,
hey
see
not
too
much
exciting
over
the
past
two
weeks,
we're
probably
two
thirds
of
the
way
through
the
0.12
update
most,
I
think.
Fourth
choice.
It's
been
updated.
The
bigger
thing
that's
still
left
is
gossip
style
1.1.
M
It's
in
progress,
we're
working
with
the
js,
the
pdp
team,
on
that
we've
been
working
on
tooling,
to
help
us
spin
up
ephemeral,
test
nets
just
for
our
purposes
and
as
far
as
like
syncing
with
the
test
net
goes.
M
We
currently
our
initial
sync
is
fairly
stable,
but
we
have
a
bug
where
we're
not
switching
over
to
gossip
or
you
know
from
like
fetching
blocks
by
range
to
fetching
them
by
root
and
relying
on
gossip
and
so
we're
working
through
that
right
now
and
becoming
we're
going
to
be
working
on
a
validator
cli
we've
been
holding
off
because
of
this
wallet
versus
key
store
kind
of
situation.
M
So
I'm
sure
once
we
get
more
consensus
on
that,
we'll
try
to
follow
kind
of
a
standard
path
towards
that.
A
Great
thanksgiving
lighthouse.
C
C
Paul's
been
busy
rewriting
of
choice
too
much
0.12.1
and
it's
now
fully
separated
into
its
own
crate,
which
is
good
and
makes
it
much
easier
to
hold.
It
he's
actually
raised
two
interesting
issues
with
the
spec.
The
first
one
removes
a
redundant
database
lookup
and
the
second
one
addresses
an
issue
that
can
potentially
lead
to
a
corruption
of
the
fork
choice
store.
It
actually
also
removes
a
redundant
function.
Call
in
other
news.
C
We've
made
our
memory
usage
available
to
each
to
stats,
so
not
all
lighthouse
nodes
on
which
key
have
that
updated
enabled,
but
for
those
who
have
it
on,
you
can
see
that
the
optimization
efforts
over
the
past
few
months
definitely
paying
off.
We
are
now
natively
supporting
raspberry
pi's
big.
Thank
you
to
an
external
contributor
who
managed
to
get
level
dp
to
build
on
arm.
C
We
were
waiting
on
that
pr
to
be
merged
upstream
for
a
while,
and
it's
been
done
recently,
so
we've
updated
our
docks
to
make
it
super
easy
for
people
to
build
on
raspberry,
pi
age
has
finished.
Rebuilding
this
v5.
Some
people
were
noticing
massive
cpu
usage
on
schlesi
and
it's
now
completely
resolved.
C
We
also
have
greater
concurrency,
pretty
solid
boss
resistance
structure
and
we
no
longer
require
enrs
for
peer
connection.
We
can
just
use
multi-others
and
I
guess
finally,
trail
of
bits
have
completed
their
first
round
of
the
external
security
review
they're.
Just
waiting
on
few
of
our
comments.
Before
releasing
the
report,
I
guess
we're
happy
to
say
that
they
haven't
found
anything
critical
at
this
stage.
C
K
Yeah
sorry
there
was,
there
was
an
issue
with
the
dis
v5.
We
merged,
we
merged
the
disk
v5
down
into
master,
but
it
hasn't
actually
hit
master
in
lighthouse.
Yet
so
that's
still
coming
sweet
gotcha.
A
A
P
Hey
guys,
so
we
are
lined
to
spec
version
12.1.
We
have
shot
done
the
topaz
test
net.
We
launched
the
onus
test
now
with
version
12.1,
we're
still
4
000
deposits
away
from
the
genesis
cons.
So
from
the
looks
of
it
I
think
genesis
will
be
sometimes
saturday
afternoon,
pacific
time
we
also
doing
some
sanity
testing
on
multi-client
compatibility
with
them
own
it.
So
so
far
we
have
tried
taku,
we
verified
that
it
sees
that
either
one
deposited
the
same
way
prism
does
so
that's
good
news.
P
We
will
try
lighthouse
next
and
then
and
if
anyone's
clients
ready
for
0
12
feel
free
to
ping,
us
we'll
be
happy
to
launch
it
and
insanity
test
it.
We
now
have
offer
of
peer
go
support,
so
you
can
run,
go,
get
and
start
developing
in
your
favorite
test
editor
and
then
run
your
tests
and
stuff,
and
lots
of
people
are
happy
with
this.
P
P
We
added
a
few
more
debugging
related
rpc
endpoints
such
as
you
can
query
photo
array
for
choice
store.
You
can
query
individual
validators,
both
status,
so
this
should
come
in
pretty
handy
for
debugging.
P
In
the
background,
we're
also
working
on
revamping
the
validator
key
management,
so,
like
people
said
we're
researching
the
we're
researching
the
eips,
we're
studying
how
other
clients
do
it.
In
the
current
tooling
landscape,
we
have
been
getting
lots
of
feedback
from
users
on
that
component,
so
the
new
ux
is
very
important
there,
other
than
that.
I
just
bunch
of
minor
bug,
fixes
total
health
improvements
and
then
optimizations
and
yeah.
That's
about
it
great.
Q
Sorry,
sorry,
I
wasn't
mute
so
the
the
thing
that
I'm
working
now
on
is
the
ethereum
2e2m1
integration
in
nethermine,
so
both
of
them
working
on
undermined
and
accepting
deposits
and
the
whole
flow
going
through
and
then
I'll
be
updating
also
to
the
latest
spec.
So
this
auto
form,
I
believe-
and
we
start
looking
at
some
of
the
updates
to
the
api
yeah.
So
these
are
the
main
projects
at
the
moment
and
the
testing
full
testing.
They
want
to
read
all
the
tests
to
run
them
automatically.
D
A
R
Hey
everyone,
let's
see
so
the
main
work
over
the
last
two
weeks
on
trinity,
has
been
spec
updates
to
get
up
to
11.3
grant's
been
working
on
that
some
work
on
looking
at
optimizations,
so
that
we
can
comfortably
run
the
mainnet
configuration
and
working
on
implementing
an
efficient
fork
choice
we're
looking
at
using
the
proto-array
implementation.
That
seems
to
be
pretty
popular
and
that's
about
it.
R
A
Cool
okay,
I
think
that's
everyone
on
the
client
updates.
Afri
has
an
update
after
your
mic's
still
not
working.
A
Okay,
schlesi's
chassis
has
history.
Afree
purge
the
last
validator
in
boot,
node
woody's
been
fairly
stable,
100
000
slots
liveliness
is
generally
almost
perfect,
75
to
90
validated
participation.
A
No
major
issues
have
been
found,
altona,
which
is
the
v012
next
test
set
to
be
launched,
expected
to
happen
in
the
next
week
and
a
half,
but
right
now,
there's
still
only
one
client,
that's
like
fully
either
12,
that's
prison,
so,
looking
at,
ideally,
we
could
launch
the
four
clients
this
time.
Nimbus
will
be
able
to
hope,
avery's,
confident
that
nemesis
will
write
a
genesis
validator
as
well.
A
That
said,
moving
forward
we'll
invite
the
client
teams
for
genesis,
so
they
have
a
chance
to
run
their
unknowns
at
launch
a
little
bit
larger
nets,
a
little
more
chaos
and
I'm
adding
vanilla
flavor
to
this
and
if
alternate
works
out,
then
we
can
prepare,
for,
I
won't
say
the
word,
but
a
larger
scale
public.
It's
a
client
testimony,
okay,
cool
thanks,
alfred
and
moving
on
to
the
api
working
group.
Update
marin
is
really
had
us
been
leaving
this
a
lot.
A
He
wasn't
able
to
join
us
in
the
call.
His
quick
update
is
merge.
The
slash
node,
namespace,
endpoints,
there's
openpr's
and
the
slash
beacon,
slash,
state
and
slash
beacon,
slash
pool
endpoints
in
progress
is
slash,
beacon,
blocks
and
missing
is
the
slash
config
and
the
slash
validator
endpoints.
If
you
are
interested
in
this
stuff,
there
are
two
open
cars
for
review.
They've
gotten
a
little
bit
of
review.
A
So
far,
I'm
going
to
take
a
look
at
them
today
and
like
immerse
them
very
soon
and
again
keep
your
eye
out
for,
as
you
review
things
that
are
difficult
to
implement
and
things
that
you
know,
people
need
to
be
able
to
do
and
it's
difficult
for
it
would
be
difficult
for
them
to
do.
That
would
be
a
signal
that
something
is
not
so
elegant
or
something
is
missing
in
this
api.
A
In
terms
of
timeliness
completeness,
I
think
that
we
generally
have
the
roadmap
for
kind
of
the
space
b1
and
that
most
of
it
likely
by
the
end
of
next
week,
will
be
in
this
rebo.
And
at
that
point
we
can
kind
of
go
back
and
forth.
If
there's
any
continued
issues,
but
we
can
do
you
know
we
can
do
a
release
and
call
everyone.
A
As
for
remaining
discussion
points
which
ben
pointed
out,
I
am
not
quite
sure
what
other
points
are
currently
being
debated,
but
we'll,
if
there's
anything
contentious,
we
will
drop
it
in
the
api
discord.
As
a
note
for
discussion.
A
Great
research
updates.
M
Yeah
so
myself,
dink
rat
some
with
the
help
of
some
academics
and
justin,
and
other
people
have
been
looking
at
virgo
trees,
which
are
and
other
like,
basically
alternatives
to
merkel,
trees
for
estate
storage
that
how-
and
so
I
wrote,
an
eighth
research
post
that
basically
kind
of
specifies
what
the
problem
is
about
a
couple
of
weeks
ago.
The
problem
is
basically
that
you
want
something
that
has
all
the
properties
of
a
merkle
tree.
So
it
can
it's
a
commitment.
M
M
So
with
merkle
trees,
witnesses
are
going
to
be
about
like
even
well
right
now,
they're
just
completely
crazy,
but
even
with
like
optimal
binary
trees
and
even
it'll,
be
somewhere
over
700
bytes
per
object,
which
is
like
a
bit
too
much
for
comfort.
M
So
there,
the
main
kind
of
alternative
to
this
so
far
has
been
the
cave
commitment
which
lets
you
have
a
48
byte
proof
for
basically
an
unlimited
number
of
elements,
except
it
has
this
a
kind
of
fatal
flaw
that
if
the
data
changes
even
slightly,
then
you
have
to
do
a
huge
recomputation
over
the
data
in
order
to
be
able
to
continue
making
proofs.
And
so
we've
been
trying
to
figure
out
how
to
kind
of
move
past
that
and
the
more
recent
kind
of
direction
that
at
least
I've
been
going.
M
And
I
mean
the
ingredient
was
there
even
ahead
of
me
as
virgo
trees,
which
is
basically
a
kind
of
merkel
tree
style
construction
made
out
of
cake
commitments,
so
basically
a
tree
where
the
width
might
be
something
like
you
know,
somewhere
in
between
256
and
16
000.
They
haven't
decided
yet,
and
you
would
have
a
tree
of
these,
and
so
you,
you
would
make
a
proof
by
basically
just
having
like
the
same
way.
M
You
would
make
any
other
proof,
except
because
the
tree
has
a
much
larger
width
and
because
that
gauge
groups
are
single
objects,
so
the
proof
size
would
be
like.
Basically,
something
like
96
bytes
per
element
is
isn't
looking
likely.
So
I
mean
still
evaluating
this,
but
it's
also
a
potential
like
candidate
to
replace
things,
even
merkel
tree
binary.
A
M
Right
except
well,
you
you
can
do
multiple
layering
of
subsets
right
so
like
I
would
probably
favor
three
layers.
So
the
the
width
of
each
commitment
would
be
like,
say,
a
2048
and
then
you'd
have
three
layers.
2048
to
the
three
you'd
basically
have
space
for
eight
billion
elements,
gotcha.
H
There's
a
small
bug
fix
from
when
process
slots
was
refactored
thanks
to
alex
lasso
for
catching
this,
and
I
just
made
a
pull
request
for,
for
that
fix.
It's
a
small
one.
You
can
check
it
out
in
the
chat.
A
And
this
is
in
the
fourth
choice.
A
And
is
this?
Does
this
affect
normal,
or
is
this
an
exceptional
case.
H
It
prevents
certain
target
checkpoints
to
be
added
to
the
store,
basically,
the
ones
which
haven't
been
pulled
up.
So
when
you
know
you're
getting
blocks
every
slot
and
you
could
just
cross
an
epoch,
it
prevents
those
targets
from
being
added
to
the
store.
A
Updates,
okay,
great
networking
age,
you
managed
to
get
connected
to
this
v5
with
multi-adders.
Was
there
any
substantive
changes
that
needed
to
be
made
both
either
to
the
protocol
or
your
implementation?.
K
The
spec
supports
it,
but
yeah
the
implementation.
So
it's
an
implementation
specific.
I
guess
we
had.
We
had.
We
had
some
issues
with
our
cpu
usage
now,
so
we
pretty
much
just
kind
of
re
refactored
everything
we
kind
of
rebuilt
it
from
the
ground
up,
so
it
can
support
it.
I
think
you
can
only
support
inline
peer
key,
like
peer
id,
so
like
sep,
256,
k1
and
ed25519
keys,
but
we're
using
those
anyway.
So
so
you
can
do
it
yeah.
A
Okay,
I
think
the
ux
around
passing
multi-adders
here
for
direct
connection
to
the
nodes
and
direct
connections
are
is
valuable.
So
if
you
want
some
insight
on
how
to
do
it,
chat
and
discord.
A
A
Great
general
spec
discussion
anything
here.
A
Cool
okay:
well,
we
will
have
another
one
of
these.
In
two
weeks
we
have.
We
will
get
an
api,
not
sorry,
api,
a
key
management
discussion
on
the
calendar
and
otherwise
run
some
tests
soon.
Thanks.