<?xml version="1.0" encoding="utf-8"?>
<!--RSS generated by Flaimo.com RSS Builder [2026-03-16 10:34:06]-->
<rss version="2.0" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"><channel><docs>https://bugs.gnunet.org/</docs><link>https://bugs.gnunet.org/</link><description><![CDATA[MantisBT - Issues]]></description><title>MantisBT - Issues</title><image><title>MantisBT - Issues</title><url>https://bugs.gnunet.org/images/mantis_logo.png</url><link>https://bugs.gnunet.org/</link><description><![CDATA[MantisBT - Issues]]></description></image><language>en</language><category>All Projects</category><ttl>10</ttl><dc:language>en</dc:language><sy:updatePeriod>hourly</sy:updatePeriod><sy:updateFrequency>1</sy:updateFrequency><item><title>0011253: GET /private/orders fails with mixed currency</title><author></author><link>https://bugs.gnunet.org/view.php?id=11253</link><description><![CDATA[accumulate_total () doesn't support mixed currencies...]]></description><category>merchant backend</category><pubDate>Mon, 16 Mar 2026 01:43:57 +0100</pubDate><guid>https://bugs.gnunet.org/view.php?id=11253</guid><comments>https://bugs.gnunet.org/view.php?id=11253#bugnotes</comments></item><item><title>0011125: Multiple services are using the wrong peer identity key</title><author></author><link>https://bugs.gnunet.org/view.php?id=11125</link><description><![CDATA[Since the PILS service has been implemented, there are still multiple services and components in GNUnet which use the function `GNUNET_CRYPTO_eddsa_key_create_from_configuration()`. This function simply reads a private key for the peer from the a configuration instead of asking the PILS service about the current peer identity. This results in signature mismatches for example and other cryptographic issues.&lt;br /&gt;
&lt;br /&gt;
I'd suggest that we fully remove this function, replacing it with PILS integration. So that services like CADET, DHT, NSE, EXIT, REGEX and multiple TRANSPORT communicators work as intended again and they could react to peer identity changes.]]></description><category>util library</category><pubDate>Mon, 16 Mar 2026 01:07:39 +0100</pubDate><guid>https://bugs.gnunet.org/view.php?id=11125</guid><comments>https://bugs.gnunet.org/view.php?id=11125#bugnotes</comments></item><item><title>0011254: Read receipts do not ensure individual decryption</title><author></author><link>https://bugs.gnunet.org/view.php?id=11254</link><description><![CDATA[When user's send a message to other members of a chat room, they typically receive a read receipt which corresponds to any message sent by the other member following the original sent message from the user. However this does not account for encrypted messages (PRIVATE or SECRET messages).&lt;br /&gt;
&lt;br /&gt;
In this case a user might assume their message has been received while only the encrypted message has been received, potentially without the recipient being able to decrypt and read it yet. So in this case the service/chat-library/application should ensure that the encrypted message and the associated key have been transmitted before confirming via a visual &quot;read receipt&quot;.]]></description><category>messenger service</category><pubDate>Sun, 15 Mar 2026 21:16:59 +0100</pubDate><guid>https://bugs.gnunet.org/view.php?id=11254</guid><comments>https://bugs.gnunet.org/view.php?id=11254#bugnotes</comments></item><item><title>0010202: add lattice-based PQC blind signature support</title><author></author><link>https://bugs.gnunet.org/view.php?id=10202</link><description><![CDATA[For now, I think we should base it on:&lt;br /&gt;
&lt;br /&gt;
&lt;a href=&quot;https://github.com/Chair-for-Security-Engineering/lattice-anonymous-credentials&quot; rel=&quot;noopener&quot;&gt;https://github.com/Chair-for-Security-Engineering/lattice-anonymous-credentials&lt;/a&gt;&lt;br /&gt;
&lt;br /&gt;
Just as a 3rd case next to RSA and CS.]]></description><category>util library</category><pubDate>Sat, 14 Mar 2026 21:09:30 +0100</pubDate><guid>https://bugs.gnunet.org/view.php?id=10202</guid><comments>https://bugs.gnunet.org/view.php?id=10202#bugnotes</comments></item><item><title>0008892: Design Considerations for future *KEY types</title><author></author><link>https://bugs.gnunet.org/view.php?id=8892</link><description><![CDATA[The Design of GNS thus far could be improved to allow easier cryptographic analysis. Each consideration here is of minor severity, i.e. there is no immediate consequence of not implementing the proposed changes, to the best of my knowledge. Nevertheless, these (in some cases breaking) changes might be worth considering for a cleaner design.&lt;br /&gt;
I am currently working off RFC 9498 rather than the actual implementation, so I apologize should my analysis not reflect changes made in the meantime.&lt;br /&gt;
&lt;br /&gt;
# Making Full Use of HKDF&lt;br /&gt;
&lt;br /&gt;
To derive a bunch of random looking bits from a zone key (zkey below) and a label, one could take a hash function H and output&lt;br /&gt;
&lt;br /&gt;
H(zkey || label || 0)   ||   H(zkey || label || 1)   ||   H(zkey || label || 2)   || ...&lt;br /&gt;
&lt;br /&gt;
where || denotes concatenation.&lt;br /&gt;
This is well justified if one is willing to model H as an ideal random function, whose output may only be correlated with its input only by plugging in values and observing what comes out. (This is routinely called a Random Oracle.)&lt;br /&gt;
However, algorithms are not random oracles, and in particular cannot always be trusted to generate arbitrarily many independent output bits from highly correlated inputs. For this very reason, modern key derivation functions like HKDF derive only a single key from a keying distribution using a dedicated component called a strong randomness extractor (&quot;Extract&quot;) and then use this one key to derive independent looking key streams using another dedicated component called pseudorandom function (&quot;Expand&quot;). In HKDF, these are both implemented using HMAC, which is secure almost independent of where you plug in parameters, IF you are willing to model HMAC or the underlying hash function as a random oracle (which is why the current implementation is &quot;probably&quot; fine). A modular analysis of schemes however requires using HKDF using its extract and expand functionality in the sense above.&lt;br /&gt;
&lt;br /&gt;
For this reason, it may be good practice to first derive blinding key material bkm as follows:&lt;br /&gt;
&lt;br /&gt;
salt := &quot;gns-extract-&quot; || zone_type&lt;br /&gt;
bkm := HKDF-Extract(salt, zkey || label)&lt;br /&gt;
&lt;br /&gt;
zkey is assumed to have fixed length, a length encoding or some sort of final delimiter.&lt;br /&gt;
The salt here is merely used as a domain separation tag. It includes the zone type so that the encoding of zkey may differ between zone types without having to worry about collisions.&lt;br /&gt;
The initial keying material (zkey || label) is chosen such that both the combination of a sufficiently unknown zkey with a predictable label (as required by GNS for unlinkability in a web-surfing-like scenario) as well as the combination of a known zkey with a sufficiently random label (as required for censorship resistance and privacy with re:claim) result in input keying material distributions of sufficient entropy for the extractor to do its job and extract a bkm indistinguishable from random.&lt;br /&gt;
&lt;br /&gt;
bkm may then be used to derive arbitrary random data using HKDF-Expand. For example, to derive a symmetric key for (say) AES-GCM and a blinding factor for (say) EdDSA key blinding one could use&lt;br /&gt;
&lt;br /&gt;
K := HKDF-Expand(bkm, &quot;gns-encrypt-aes-gcm-key&quot;, 256/8)&lt;br /&gt;
h := HKDF-Expand(bkm, &quot;gns-blind-eddsa&quot;, 512/8)&lt;br /&gt;
&lt;br /&gt;
In terms of the RR data confidentiality, query privacy and censorship resistance, this should simplify the analysis a decent bit.&lt;br /&gt;
&lt;br /&gt;
# Simplifying and Future-Proofing the Symmetric Encryption&lt;br /&gt;
&lt;br /&gt;
Contrary to the terminology in RFC 9498, the actual nonce (&quot;number used once&quot;) is not the NONCE derived using HKDF (which is always the same, since it is derived deterministically for each zkey-label pair), but rather the expiration time of the record. Encryption algorithms typically only provide any guarantees if this value is only used once.&lt;br /&gt;
&lt;br /&gt;
There are two approaches to &quot;guaranteeing&quot; this. One could write a &quot;MUST&quot; into a specification detailing that expiration times shall be strictly increasing. This approach might however leave the not cryptographically inclined reader (or non-reader. How many people using DNS have read the specifications? :D) with the impression that violating this constraint heuristically to support distributed signing infrastructures, temporary setups and backup solutions might only lead to temporary interoperability problems, rather than a leak of confidential information. Even if all users and implementations were to understand this, it would complicate the above use cases and, as a result, make GNS less flexible.&lt;br /&gt;
&lt;br /&gt;
Alternatively, one could take out the problem. That is, ideally generating a random (at least) 64-bit nonce each time and placing it next to the ciphertext. If one is worried about accidental nonce reuse, there are AEAD schemes like AES-GCM-SIV to handle this exact case. If one does not want to store ciphertexts locally and rather re-encrypt plaintexts on demand, one may either just store the nonce values alongside the expiration timestamp or derive them deterministically by applying an independently keyed pseudorandom function to the plaintext, expiration and blinded public key.&lt;br /&gt;
&lt;br /&gt;
Speaking of AEAD schemes, with the internet moving away from giving users access to low-level cryptographic primitives, many libraries will primarily expose, review, and also optimize,  AEAD schemes. It does little harm to use these for encryption, even though integrity is already protected by a digital signature. The AD may also be used to bind the ciphertext to a particular blinded key.&lt;br /&gt;
&lt;br /&gt;
To illustrate the full RRBlock creation, assume a layout such as (bitlengths in brackets, &quot;varies&quot; depends on zone_type or data length):&lt;br /&gt;
&lt;br /&gt;
size(32) || zone_type(32) || expiration(64) || blind_zone_key(varies) || nonce(64) || bdata(varies) || aead_tag(128) || signature(varies)&lt;br /&gt;
&lt;br /&gt;
Here I have left size and zone_type unchanged for compatibility with existing *KEY types, expiration has moved slightly to the front to have fixed size key types in the header as much as possible. Doing so for the nonce would make AD-calculation and deterministic nonce-calculation more cumbersome.&lt;br /&gt;
&lt;br /&gt;
Creation steps:&lt;br /&gt;
1. Fill in size, zone_type and expiration&lt;br /&gt;
2. Do the KDF extract step above&lt;br /&gt;
3. Use the KDF expand to derive randomness for blinding zkey, and fill in blind_zone_key&lt;br /&gt;
4. Fill in the nonce randomly, using a stored value, or by applying a PRF to the parts already filled in&lt;br /&gt;
5. Use the KDF expand to derive a symmetric encryption key&lt;br /&gt;
6. Fill in bdata and aead_tag by encrypting RDATA with everything from size to blind_zone_key as AD and the chosen nonce&lt;br /&gt;
7. Fill in a signature over everything before it&lt;br /&gt;
&lt;br /&gt;
If you need every last bit of speed in creating the RRBlock, keep a hash of everything you have filled in so far. You can pass this hash to the nonce-PRF, use it as an effective AD and have it ready for the signature. I do not think that this makes much of a difference, but some to-be-defined *KEY types might make use of such optimizations.]]></description><category>GNS</category><pubDate>Sat, 14 Mar 2026 21:08:59 +0100</pubDate><guid>https://bugs.gnunet.org/view.php?id=8892</guid><comments>https://bugs.gnunet.org/view.php?id=8892#bugnotes</comments></item><item><title>0011252: Test "flickering" issue of KYC Auth in taler-merchant v1.5.8 (or earlier)</title><author></author><link>https://bugs.gnunet.org/view.php?id=11252</link><description><![CDATA[After a discussion with CG, apparently a flickering issue after entering a bank no. is still possible, which was, definitely given in earlier version of taler-merchant v.1.5.x.&lt;br /&gt;
&lt;br /&gt;
Trying to exclude herewith.]]></description><category>merchant backoffice SPA</category><pubDate>Sat, 14 Mar 2026 18:33:36 +0100</pubDate><guid>https://bugs.gnunet.org/view.php?id=11252</guid><comments>https://bugs.gnunet.org/view.php?id=11252#bugnotes</comments></item><item><title>0011195: Communicators require access to private key of peer identity</title><author></author><link>https://bugs.gnunet.org/view.php?id=11195</link><description><![CDATA[The TCP and UDP communicators perform multiple cryptographic operations using the private key from the peer identity besides signing messages. This contains GNUNET_CRYPTO_hpke_elligator_kem_decaps() using an HPKE key derived from the EDDSA key and GNUNET_CRYPTO_eddsa_kem_decaps() using the key itself.&lt;br /&gt;
&lt;br /&gt;
Since the PILS service is intended to abstract/manage the peer identity and its private key portion, there are changes needed to utilize this service via its handle instead of requiring direct access to this private key. Additionally this would need new functions on the PILS service handle to perform the needed operations.]]></description><category>transport service</category><pubDate>Fri, 13 Mar 2026 18:41:32 +0100</pubDate><guid>https://bugs.gnunet.org/view.php?id=11195</guid><comments>https://bugs.gnunet.org/view.php?id=11195#bugnotes</comments></item><item><title>0011251: CADET encryption authentication smell</title><author></author><link>https://bugs.gnunet.org/view.php?id=11251</link><description><![CDATA[The header encyption HENCRYPT and the message encryption ENCRYPT according the spec should both be AEAD schemes&lt;br /&gt;
&lt;br /&gt;
The CADET implementation takes a shortcut: It Encrypts the header and the plaintext separately with the respective keys using TWOFISH(AES(*)) and then appends a MAC using the HK that is calculated over both ciphertexts&lt;br /&gt;
&lt;br /&gt;
Probably  not breakable per se, but smells bad.]]></description><category>cadet service</category><pubDate>Fri, 13 Mar 2026 18:00:42 +0100</pubDate><guid>https://bugs.gnunet.org/view.php?id=11251</guid><comments>https://bugs.gnunet.org/view.php?id=11251#bugnotes</comments></item><item><title>0011250: CADET header encryption nonce entroopy missing</title><author></author><link>https://bugs.gnunet.org/view.php?id=11250</link><description><![CDATA[I  think there is a crypto bug in CADET: According to &lt;a href=&quot;https://signal.org/docs/specifications/doubleratchet/#external-functions&quot; rel=&quot;noopener&quot;&gt;https://signal.org/docs/specifications/doubleratchet/#external-functions&lt;/a&gt; HENCRYPT(hk, plaintext): Returns the AEAD encryption of plaintext with header key hk. Because the same hk will be used repeatedly, the AEAD nonce must either be a stateful non-repeating value, or must be a random non-repeating value chosen with at least 128 bits of entropy.. In the code we can see&lt;br /&gt;
&lt;br /&gt;
13   GNUNET_CRYPTO_hkdf_gnunet (result: &amp;iv,                                                                                                                                                                                                                &lt;br /&gt;
    14                              out_len: sizeof iv,                                                                                                                                                                                                         &lt;br /&gt;
    15                              xts: NULL,                                                                                                                                                                                                                  &lt;br /&gt;
    16                              xts_len: 0,&lt;br /&gt;
    17                              skm: &amp;ax-&gt;HKs,                                                                                                                                                                                                              &lt;br /&gt;
    18                              skm_len: sizeof ax-&gt;HKs);&lt;br /&gt;
&lt;br /&gt;
that the nonce (iv) is derived from said HK which will be used repeatedly, and no other entropy is input.]]></description><category>cadet service</category><pubDate>Fri, 13 Mar 2026 17:59:17 +0100</pubDate><guid>https://bugs.gnunet.org/view.php?id=11250</guid><comments>https://bugs.gnunet.org/view.php?id=11250#bugnotes</comments></item><item><title>0011235: [qc] input amount on merchant doesnt respect currency spec</title><author></author><link>https://bugs.gnunet.org/view.php?id=11235</link><description><![CDATA[on order creation, using the arrows on the input type=number steps by 0.001 for CHF]]></description><category>merchant backoffice SPA</category><pubDate>Fri, 13 Mar 2026 15:27:43 +0100</pubDate><guid>https://bugs.gnunet.org/view.php?id=11235</guid><comments>https://bugs.gnunet.org/view.php?id=11235#bugnotes</comments></item><item><title>0010946: wallet-core DB transactions should automatically re-try after handling certain errors [8h]</title><author></author><link>https://bugs.gnunet.org/view.php?id=10946</link><description><![CDATA[And in particular, we might want to catch certain errors (e.g. denominations not validated) and handle them before re-trying.]]></description><category>wallet-core</category><pubDate>Fri, 13 Mar 2026 13:43:42 +0100</pubDate><guid>https://bugs.gnunet.org/view.php?id=10946</guid><comments>https://bugs.gnunet.org/view.php?id=10946#bugnotes</comments></item><item><title>0011149: QR code scanner screen</title><author></author><link>https://bugs.gnunet.org/view.php?id=11149</link><description><![CDATA[Add a clear button for the user to exit the screen and add the possibility to use flash]]></description><category>wallet (iOS App)</category><pubDate>Fri, 13 Mar 2026 13:26:58 +0100</pubDate><guid>https://bugs.gnunet.org/view.php?id=11149</guid><comments>https://bugs.gnunet.org/view.php?id=11149#bugnotes</comments></item><item><title>0011239: exchange still treats section names case-sensitive in coin directories</title><author></author><link>https://bugs.gnunet.org/view.php?id=11239</link><description><![CDATA[This is bound to lead to (even more) issues in the future.&lt;br /&gt;
&lt;br /&gt;
The secmods should start using section names case-insensitively and rename existing directories to a standardized case (say, lower-case).&lt;br /&gt;
&lt;br /&gt;
&lt;a href=&quot;mailto:fdold-work@sapota&quot;&gt;fdold-work@sapota&lt;/a&gt; ~&gt; ls ~/.local/share/taler-exchange/secmod-rsa/keys/&lt;br /&gt;
cOiN_CHF_n1/]]></description><category>exchange</category><pubDate>Fri, 13 Mar 2026 13:15:03 +0100</pubDate><guid>https://bugs.gnunet.org/view.php?id=11239</guid><comments>https://bugs.gnunet.org/view.php?id=11239#bugnotes</comments></item><item><title>0011210: Wallets must highlight / warn about use of untrusted exchanges [meta]</title><author></author><link>https://bugs.gnunet.org/view.php?id=11210</link><description><![CDATA[It just happened to me trying to send some TOPS/CHF (real money as of exchange.taler-ops.ch) that I managed to pick the CHF currency for use with exchange.stage.taler-ops.ch, which is not real, but test money.&lt;br /&gt;
&lt;br /&gt;
I suggest there's a field which allows a Taler Wallet to mark money as test money in a visible way; this could be an attribute in /config of the exchange.]]></description><category>wallet (all platforms)</category><pubDate>Fri, 13 Mar 2026 13:14:14 +0100</pubDate><guid>https://bugs.gnunet.org/view.php?id=11210</guid><comments>https://bugs.gnunet.org/view.php?id=11210#bugnotes</comments></item><item><title>0011245: CHF filter broken</title><author></author><link>https://bugs.gnunet.org/view.php?id=11245</link><description><![CDATA[Given cases where the same currency is used, but for different scopes, like in my case (seen in Android)&lt;br /&gt;
&lt;br /&gt;
- BFH/CHF, restricted to snack machines at BFH, and&lt;br /&gt;
- TOPS/CHF (stage), used for testing purposes (cf. &lt;a href=&quot;https://docs.taler.net/deployments/tops-stage-devtesting.html&quot; rel=&quot;noopener&quot;&gt;https://docs.taler.net/deployments/tops-stage-devtesting.html&lt;/a&gt;), not backed by real CHF money,&lt;br /&gt;
- TOPS/CHF (production), used for real CHF transfers under the Swiss sandbox license, backed by real money,&lt;br /&gt;
&lt;br /&gt;
it happens that the sums displayed at various areas in the app (most visibly when paying something) are just wrong, because the various CHF currencies are mixed (as in: somehow summed) together, but sometimes also with sums which are not simply the sum of all individual CHF sums.]]></description><category>wallet (Android App)</category><pubDate>Fri, 13 Mar 2026 13:11:41 +0100</pubDate><guid>https://bugs.gnunet.org/view.php?id=11245</guid><comments>https://bugs.gnunet.org/view.php?id=11245#bugnotes</comments></item><item><title>0011241: clean up typst path issues</title><author></author><link>https://bugs.gnunet.org/view.php?id=11241</link><description><![CDATA[The typst packages are currently installed in a very odd location:&lt;br /&gt;
&lt;br /&gt;
  typstpackagedir = $(prefix)/.local/share/typst/packages/taler-exchange/vqf_902_1/0.0.0/&lt;br /&gt;
&lt;br /&gt;
Instead, the typst packages should be installed under $(prefix)/share/taler-exchange/typst. When typst is invoked, XDG_DATA_HOME must then be set to $(prefix)/share/taler-exchange/.]]></description><category>exchange</category><pubDate>Fri, 13 Mar 2026 13:10:46 +0100</pubDate><guid>https://bugs.gnunet.org/view.php?id=11241</guid><comments>https://bugs.gnunet.org/view.php?id=11241#bugnotes</comments></item><item><title>0011208: call typst with XDG_DATA_HOME set</title><author></author><link>https://bugs.gnunet.org/view.php?id=11208</link><description><![CDATA[This way, we can move the packages to a nicer location.&lt;br /&gt;
This will require changes to libgnuneutil.]]></description><category>exchange</category><pubDate>Fri, 13 Mar 2026 13:10:46 +0100</pubDate><guid>https://bugs.gnunet.org/view.php?id=11208</guid><comments>https://bugs.gnunet.org/view.php?id=11208#bugnotes</comments></item><item><title>0011205: p2p transaction stuck on "KYC required" even though KYC is done at exchange</title><author></author><link>https://bugs.gnunet.org/view.php?id=11205</link><description><![CDATA[Student(s) had a fresh wallet (happened both with iOS and Android!), never used. P2P send them 3 CHF. Student did the KYC (SMS registration), but transaction still shows as KYC required in the wallet. Money did not arrive. On sending wallet, money is shown as paid out.]]></description><category>wallet (all platforms)</category><pubDate>Fri, 13 Mar 2026 13:10:03 +0100</pubDate><guid>https://bugs.gnunet.org/view.php?id=11205</guid><comments>https://bugs.gnunet.org/view.php?id=11205#bugnotes</comments></item><item><title>0011042: copy buttons for wire transfer details provide too little visual feedback</title><author></author><link>https://bugs.gnunet.org/view.php?id=11042</link><description><![CDATA[We had a user trying out the app, they were confused by the copy buttons, as they provide barely any feedback whether they were pressed or not.&lt;br /&gt;
&lt;br /&gt;
I've seen it as a common pattern (often on Websites) that the copy button changes (e.g. to include a checkmark) after it has been pressed.]]></description><category>wallet (iOS App)</category><pubDate>Fri, 13 Mar 2026 12:18:56 +0100</pubDate><guid>https://bugs.gnunet.org/view.php?id=11042</guid><comments>https://bugs.gnunet.org/view.php?id=11042#bugnotes</comments></item><item><title>0011246: peer-push-credit transaction does not handle conflict response for merge operation when in KYC state</title><author></author><link>https://bugs.gnunet.org/view.php?id=11246</link><description><![CDATA[When a peer-push-credit transaction is in a KYC state, tries to merge the purse, but the merge has already been done into another reserve (presumably by another wallet), wallet-core does not handle this situation properly. It simply retries, which is futile.]]></description><category>wallet-core</category><pubDate>Fri, 13 Mar 2026 11:18:47 +0100</pubDate><guid>https://bugs.gnunet.org/view.php?id=11246</guid><comments>https://bugs.gnunet.org/view.php?id=11246#bugnotes</comments></item><item><title>0011231: Merchant: Some beta-test cases need to be replayed to (maybe) reproduce money losses in relation to bank transfers</title><author></author><link>https://bugs.gnunet.org/view.php?id=11231</link><description><![CDATA[A beta tester could replay (after some successful transfers) the following unsuccessful transactions: &lt;br /&gt;
1. Bank transfer with minimal amounts for verification of the bank account before a deposit could be effectuated (Taler Wallet -&gt; bank account). The transfer of CHF 0.01 from the bank account takes the same amount of time as a transfer bank account -&gt; Taler Wallet (which is to be expected). But the CHF 0.01 from the bank account did not arrive anywhere, neither in the Taler Wallet nor back in the user's bank account. This was tested with Alpian Bank and PostFinance.&lt;br /&gt;
&lt;br /&gt;
2. The KYC process needed to be performed over and over again for every deposit Taler Wallet -&gt; bank&lt;br /&gt;
&quot;I would expect to have to make exactly one transfer from a bank account to a wallet and then always be able to send money back. However, depending on the bank, it seems that KYC is required again when sending money back. It also seems that KYC expires after a few days and has to be done again.&quot;&lt;br /&gt;
&lt;br /&gt;
3. Bank -&gt; Taler Wallet with transfer amount too small, money arrives but flagged as &quot;fee&quot;&lt;br /&gt;
&quot;If you create a transfer in the Taler Wallet for, say, CHF 10.00, but the transfer from the bank is only for CHF 5.00, CHF 5.00 will arrive in the wallet and CHF 5.00 will be listed as a “fee.” Basically, this works OK, but the naming is a bit strange.&quot;&lt;br /&gt;
&lt;br /&gt;
4. Bank -&gt; Taler Wallet with transfer amount too high --&gt; money gets lost??&lt;br /&gt;
&quot;If you create a transfer in the Taler Wallet for CHF 10.00, for example, but the bank transfers CHF 15.00, CHF 10.00 will arrive in the wallet. The extra CHF 5.00 will remain missing and will not be transferred back.&quot;]]></description><category>merchant backend</category><pubDate>Thu, 12 Mar 2026 22:23:13 +0100</pubDate><guid>https://bugs.gnunet.org/view.php?id=11231</guid><comments>https://bugs.gnunet.org/view.php?id=11231#bugnotes</comments></item><item><title>0011242: when multiple bank accounts are configured, the order is non-deterministic and causes extra notifications</title><author></author><link>https://bugs.gnunet.org/view.php?id=11242</link><description><![CDATA[See additional information for two e-mails that contain exactly the same info but in different order. We send these out every few hours, despite nothing changing except the order of bank accounts.]]></description><category>merchant backend</category><pubDate>Thu, 12 Mar 2026 22:20:22 +0100</pubDate><guid>https://bugs.gnunet.org/view.php?id=11242</guid><comments>https://bugs.gnunet.org/view.php?id=11242#bugnotes</comments></item><item><title>0011236: [qc] kyc status table problems</title><author></author><link>https://bugs.gnunet.org/view.php?id=11236</link><description><![CDATA[rows should not be clickable&lt;br /&gt;
&lt;br /&gt;
there should be a button at the end for call to action]]></description><category>merchant backoffice SPA</category><pubDate>Thu, 12 Mar 2026 21:44:29 +0100</pubDate><guid>https://bugs.gnunet.org/view.php?id=11236</guid><comments>https://bugs.gnunet.org/view.php?id=11236#bugnotes</comments></item><item><title>0011099: coin selection should minimize small coins [3h]</title><author></author><link>https://bugs.gnunet.org/view.php?id=11099</link><description><![CDATA[According to experiments by one of Mikolai's student's, the current coin selection results in a large number of small coins that aren't spent. We should try to spend small coins earlier.]]></description><category>wallet-core</category><pubDate>Thu, 12 Mar 2026 19:43:04 +0100</pubDate><guid>https://bugs.gnunet.org/view.php?id=11099</guid><comments>https://bugs.gnunet.org/view.php?id=11099#bugnotes</comments></item><item><title>0010899: Android wallet passes wrong currency to getExchangeWithdrawalInfo on currency conversion withdrawal</title><author></author><link>https://bugs.gnunet.org/view.php?id=10899</link><description><![CDATA[This seems to only happen when (1) there is CHF in the wallet and (2) we do a second NETZBON currency conversion withdrawal.&lt;br /&gt;
&lt;br /&gt;
The getExchangeWithdrawalInfo *always* needs the exchange's native currency as the instructed amount. But it seems in *some* situations, the Android UI passes the conversion input currency instead.&lt;br /&gt;
&lt;br /&gt;
Note that from an empty wallet, this *doesn't* happen.]]></description><category>wallet (Android App)</category><pubDate>Thu, 12 Mar 2026 19:04:29 +0100</pubDate><guid>https://bugs.gnunet.org/view.php?id=10899</guid><comments>https://bugs.gnunet.org/view.php?id=10899#bugnotes</comments></item></channel></rss>
