2024-04-26 15:42:12
by npub1c3m…raek
It’s hard to believe but Kesha was ahead of her time with this one:
"Now, now, we go until they kick us out, out
Or the police shut us down, down
Police shut us down, down
Po-po shut us
Don't stop, make it pop
DJ, blow my speakers up
Tonight, I'mma fight
'Til we see the sunlight
TikTok on the clock
But the party don't stop, no"
https://youtu.be/iP6XpLQM2Cs?si=zk1iZugLStliOKhh&t=96
2024-04-26 06:41:10
- reply
by npub16jd…33sv
That's a valid point. Let's pretend a whole coin price remains indefinitely fairly linear and no further flash crashes...
If you held $100,000 worth of Bitcoin and $100,000 in cash, and high inflation continues to cause the dollar's purchasing power to halve over a period of time, the Bitcoin would still buy the same amount of stuff as it used to (assuming Bitcoin's price was unchanged in dollar terms) and now even more so than before. But your $100,000 in cash would now only buy half as much as before.
So simply holding Bitcoin will preserve your purchasing power while holding cash would lose purchasing power, even with relatively no increase in Bitcoin's nominal price.
2024-04-25 05:46:27
by npub1qny…95gx
RHR AT 1800 UTC TOMORROW.
https://rhr.tv
---
Privacy is necessary for an open society in the electronic age. Privacy is not secrecy. A private matter is something one doesn't want the whole world to know, but a secret matter is something one doesn't want anybody to know. Privacy is the power to selectively reveal oneself to the world.
If two parties have some sort of dealings, then each has a memory of their interaction. Each party can speak about their own memory of this; how could anyone prevent it? One could pass laws against it, but the freedom of speech, even more than privacy, is fundamental to an open society; we seek not to restrict any speech at all. If many parties speak together in the same forum, each can speak to all the others and aggregate together knowledge about individuals and other parties. The power of electronic communications has enabled such group speech, and it will not go away merely because we might want it to.
Since we desire privacy, we must ensure that each party to a transaction have knowledge only of that which is directly necessary for that transaction. Since any information can be spoken of, we must ensure that we reveal as little as possible. In most cases personal identity is not salient. When I purchase a magazine at a store and hand cash to the clerk, there is no need to know who I am. When I ask my electronic mail provider to send and receive messages, my provider need not know to whom I am speaking or what I am saying or what others are saying to me; my provider only need know how to get the message there and how much I owe them in fees. When my identity is revealed by the underlying mechanism of the transaction, I have no privacy. I cannot here selectively reveal myself; I must always reveal myself.
Therefore, privacy in an open society requires anonymous transaction systems. Until now, cash has been the primary such system. An anonymous transaction system is not a secret transaction system. An anonymous system empowers individuals to reveal their identity when desired and only when desired; this is the essence of privacy.
Privacy in an open society also requires cryptography. If I say something, I want it heard only by those for whom I intend it. If the content of my speech is available to the world, I have no privacy. To encrypt is to indicate the desire for privacy, and to encrypt with weak cryptography is to indicate not too much desire for privacy. Furthermore, to reveal one's identity with assurance when the default is anonymity requires the cryptographic signature.
We cannot expect governments, corporations, or other large, faceless organizations to grant us privacy out of their beneficence. It is to their advantage to speak of us, and we should expect that they will speak. To try to prevent their speech is to fight against the realities of information. Information does not just want to be free, it longs to be free. Information expands to fill the available storage space. Information is Rumor's younger, stronger cousin; Information is fleeter of foot, has more eyes, knows more, and understands less than Rumor.
We must defend our own privacy if we expect to have any. We must come together and create systems which allow anonymous transactions to take place. People have been defending their own privacy for centuries with whispers, darkness, envelopes, closed doors, secret handshakes, and couriers. The technologies of the past did not allow for strong privacy, but electronic technologies do.
We the Cypherpunks are dedicated to building anonymous systems. We are defending our privacy with cryptography, with anonymous mail forwarding systems, with digital signatures, and with electronic money.
Cypherpunks write code. We know that someone has to write software to defend privacy, and since we can't get privacy unless we all do, we're going to write it. We publish our code so that our fellow Cypherpunks may practice and play with it. Our code is free for all to use, worldwide. We don't much care if you don't approve of the software we write. We know that software can't be destroyed and that a widely dispersed system can't be shut down.
Cypherpunks deplore regulations on cryptography, for encryption is fundamentally a private act. The act of encryption, in fact, removes information from the public realm. Even laws against cryptography reach only so far as a nation's border and the arm of its violence. Cryptography will ineluctably spread over the whole globe, and with it the anonymous transactions systems that it makes possible.
For privacy to be widespread it must be part of a social contract. People must come and together deploy these systems for the common good. Privacy only extends so far as the cooperation of one's fellows in society. We the Cypherpunks seek your questions and your concerns and hope we may engage you so that we do not deceive ourselves. We will not, however, be moved out of our course because some may disagree with our goals.
The Cypherpunks are actively engaged in making the networks safer for privacy. Let us proceed together apace.
Onward.
Eric Hughes
9 March 1993
2024-04-24 19:44:59
by npub1cn4…3vle
Announcing Strike Europe
Today, we're launching Strike Europe, expanding our full suite of products to all eligible European customers
Buy #bitcoin, free on-chain withdrawals, a full-featured Lightning wallet and more. Get the best of #Bitcoin with Strike.
We also have our Strike Business, Strike Private, Strike OTC, and Strike API products available for Europe as well.
When EU?!? Now 🫡
https://www.youtube.com/watch?v=cboYEHuXwbc&ab_channel=JackMallers
2024-04-24 18:51:28
- reply
by npub1jk9…lqz7
idk why he said im tied to a nostr player, im not tied to any clients or projects.
but yeah i didn’t word it right i think its important at the early stage n its more sustainable than the other models at the early stage when nobody is using your product yet or nobody knows about it yet like you said the bootstrapping phase, gek called it the seed phase n agreed on that as well, also looking back sustainable wasn’t the right word n idk why people don’t like to acknowledge that without them most projects wouldn’t have stood a chance and tons are going back for them, doesn’t have to be from opensats, HRF n others give them as well. But yeah if anything the way forward might be a mix of all of these different models and im not looking for anyone to agree with me id much rather someone disagree so i can learn something instead.
2024-04-24 17:20:29
- reply
by npub1gcx…nj5z
1. Network effects are baked-in. Devs don't like to sell/advertise. It's nice when you can just create something and use an efficient social design to let word-of-mouth do its thing without relying on a controlling party, like an app store. It's also incredibly rewarding.
2. Database is solved. Users will choose their relays. You don't need to put anything up. There is no need to spend hours specing out your database tables, mapping them into objects, and then making all the data access layers. No liabilities, no operational costs, no risks, and, more importantly, no long-term commitment to secure and keep the data available to your users.
3. Login is solved. Devs generally start any app with the Account Management part, designing screens, o-auth backend, password recovery, 2-step auth and so on. It takes a lot of effort to get to the point where you can actually build the app you want to build.
4. Social First. Every app is a social app. But devs usually build things first and then add a social "feature" into it. That doesn't work. With Nostr, you are forced to start with the social component and build what you want to build on top of it. And devs see that as an extra positive feedback loop for the community.
5. Do whatever you want. It's shocking how open Nostr's data models are to any type of application. Just pick a number, sign, and go. Make a NIP if you want to interoperate with others.
2024-04-24 16:00:32
by npub1c3m…raek
Bitcoin maximalism has always been about the bags. Nothing else.
Don’t believe me? Find me a maxi without heavy bags. Getting people to adopt your money is sourcing buyers for a future sale. Even the laser-eyed trend is about cultivating exit liquidity.
If you really see yourself as a moralist and a martyr, sell your bags, walk through the desert like Jesus, and preach bitcoin for no gain whatsoever. Then, you’ll be credible. Otherwise, you’re just shilling your bags.
I dig bitcoin and I think it’s changing the world, but I ain’t purity-testing anyone. I don’t need fake internet friends.
Peace, love, and freedom ✌️
2024-04-24 05:11:50
- reply
by npub1az9…m8y8
Sparrow, Nunchuk, and few more soon. Doesn't take many wide install clients/signers to be enough. Take a closer look, a lot good stuff there. SeedHammer guys also working on an Output Descriptor spec for bbqr.
BCUR is no go, terrible for hardware, lots of dependencies, over complicated for no reason, poor compression, was first mover, but doubt it will be the main standard in the future.
2024-04-23 23:28:38
- reply
by npub1jk9…lqz7
well it was for all, but somehow you all knew that the shoe fit best on one of them.. n you weren’t wrong lol
also i love how plebs find nostr projects directly, does it help ? Fuck yeah, but is it sustainable? Fuck no, we all know this.
every subscription models aren’t sustainable, grants are the way n if they need to be fixed then fix em ? I’m sure there’s a ton of capable individuals here that can put their heads together n make something happen.
2024-04-23 22:57:03
- reply
by npub1jk9…lqz7
Don’t you love how you have a choice ?
Choice to participate, choice to not participate, choice to do it yourself, etc.
I’m not into conspiracy theories, never been.
all I’m saying is do better if you want better, some are doing what they can with what they have, others don’t do shit but point fingers. Simple.
2024-04-23 09:53:03
by npub1xts…kk5s
I woke up in the middle of the night and started thinking about deniable nostr notes, notes that do not have a signature so you can’t prove someone actually wrote it if it gets leaked from a private relay.
The idea is simple: you use your key to AUTH when connecting, after doing that, all notes sent are unsigned. The relay can verify its you but notes sent afterward have no signatures.
This is a “trusted” relay mode, no clients can know for sure if the person wrote said notes, but said persons get deniability if the data leaks. The notes are also protected from rebroadcasting to public relays because there are no signatures.
I wonder if anyone is interested in something like this? As long as it’s very clear on the UI that the notes are not verified?
2024-04-22 23:46:49
by npub1gcx…nj5z
Are you ready for this?
```
{
"kind": 35337,
"content": "",
"tags": [
[ "d", "SheetStr Demo" ],
[ "data", "Sheet1", "J", "25", "3"],
[ "data", "Sheet1", "J", "26", "5"],
[ "data", "Sheet1", "J", "27", "=SUM(J25:J26)"]
],
"created_at": 1713819120,
"pubkey": "...",
"id": "...",
"sig": "..."
}
```
2024-04-22 21:18:10
- reply
by npub1jk9…lqz7
Chapter 1: Shadows of the Deep
In the dim glow of a monitor, amidst the hum of cooling fans, a lone figure sat hunched over a keyboard, fingers dancing across the keys with practiced precision. The screen flickered with lines of code, each stroke a step closer to unraveling the secrets of the digital realm.
This was Jack, a seasoned hacker known in the underground circles as "Cipher." With his hood pulled low over his eyes and the glow of the monitor casting eerie shadows across his face, he was a phantom in the digital wilderness—a hunter stalking prey in the vast expanse of the internet.
Tonight, however, Jack was not pursuing his usual exploits of data breaches and cyber heists. No, tonight he was on a quest of a different kind—a quest for the elusive treasure rumored to be hidden within the blockchain, the heart of Satoshi Nakamoto's creation.
The whispers had reached Jack's ears weeks ago, carried on the currents of the dark web. Tales of untold riches, locked away in a digital vault, waiting for the one brave enough, or perhaps foolish enough, to seek it out. And Jack, with his insatiable curiosity and thirst for adventure, could not resist the call of the unknown.
With a flick of his wrist, Jack executed a series of commands, his fingers moving with a fluidity born of years of practice. Lines of code flashed across the screen, each one a thread in the intricate tapestry of the blockchain.
As he delved deeper into the labyrinth of encrypted data, Jack felt a thrill course through his veins—a rush of adrenaline that only came from the thrill of the hunt. He was close now, he could feel it, the tantalizing scent of treasure lingering just beyond his grasp.
But the deeper he delved, the more elusive his quarry became. Each layer of encryption seemed to taunt him, mocking his efforts with its impenetrable complexity. Yet Jack was not one to be deterred so easily. With grim determination, he pressed on, his eyes fixed on the prize that danced just out of reach.
Hours passed in a blur of code and caffeine-fueled frenzy, until at last, Jack's efforts were rewarded. With a triumphant shout, he cracked the final layer of encryption, and the vault of Satoshi Nakamoto's treasure lay open before him.
But as Jack gazed upon the digital riches that lay within, a chill ran down his spine. For he knew that with great wealth came great danger, and the shadows of the deep were filled with predators lurking in wait. And so, with caution in his heart and a glint of excitement in his eye, Jack stepped into the unknown, ready to claim his prize or die trying.
2024-04-22 21:16:00
- reply
by npub1jk9…lqz7
I think I’m gonna have ChatGPT help us out with this one, this is what it came up with for the intro lol
In the clandestine depths of the digital world, where codes and algorithms dance in the shadows, there exists a legend whispered among the denizens of cyberspace—a tale of boundless wealth, elusive as the wind, and as coveted as the fabled treasure of old. They speak of Satoshi Nakamoto, a name cloaked in mystery, whose creation, Bitcoin, birthed a revolution. But it was not the cryptocurrency itself that stirred the hearts of the internet's rogues; it was the enigmatic figure's hidden stash, akin to the One Piece of pirate lore. For hackers, the modern-day buccaneers of the digital age, it became an obsession—a quest for the ultimate prize in the vast expanse of the virtual seas. And thus, our tale begins, where codes are the keys to kingdoms, and every click carries the weight of destiny.
2024-04-22 19:34:39
- reply
by npub1226…grkj
think of it
why would people like odell, gigi, etc push this nonstop stream of optimism, while highlighting nearly none of the potential issues like LN scaling with on chain fees, potential problems of deflation, etc: to distract them
and would they benefit from this control? absolutely
much of the information has been gleaned from public sources or interacting with people that have grants
2024-04-21 16:46:20
- reply
by npub1jk9…lqz7
On the client I’m using I don’t see a view count, what client do you use & how does that look ?
Also it would make sense that if you share your meme (repost it so your followers can see & engage) that you’d have a better chance.
There’s also the factor of good memes vs bad ones, not everyone has a good meme all the time, sometimes it’s low effort & the community can tell.
At the end of the day I don’t want to be the one to pick the winning memes myself, I’d rather the community vote on them, I’ve asked for better suggestions from the community & tend to get really bad ones like include zaps & have zaps be weighted more & only allow participants from a certain client etc all bad suggestions, so until the day comes when someone finally gives me a great alternative to the system we currently have I won’t be changing it.
2024-04-21 15:23:14
by npub1az9…m8y8
- Internal async; GitHub issues
- External async; email
- Internal sync; signal groups, max 4 ppl
- External sync; signal or telegram groups; max 5ppl
(Not thing else. No zoom, no google, no slack, no Microsoft, no Skype, etc...)
What's your company setup?
2024-04-21 00:31:10
by npub16jd…33sv
"Using WebRTC, FilePizza eliminates the initial upload step required by other web-based file sharing services. When senders initialize a transfer, they receive a "tempalink" they can distribute to recipients. Upon visiting this link, recipients' browsers connect directly to the sender’s browser and may begin downloading the selected file. Because data is never stored in an intermediary server, the transfer is fast, private, and secure."
https://file.pizza/
2024-04-20 16:06:24
- reply
by npub1az9…m8y8
> Multisig with the same device is like using a passphrase, but more convenient
It's the user's decision. I can use every signer on the market multiple times in one setup
One of the many issues with this is that SS is closed platform without any tampering protection. It is trivial for someone to load evil firmware accidentally or be tampered with in their absence. The device can then broadcast the private key to an attacker. Multi dig with multiple devices also de-risks bugs, say for example bad entropy.
> I think the software is portable to other computers and even microcontroller.
the team has state multiple times they are don't interest in porting to actual embedded platforms. It is not an easy task as they are not embedded developers, don't have security experience and depend on some of the Linux stack.
> I don't think there is a truly open hardware platform at the moment. if that changes, we will see whether the project goes down this path.
there are many options are that orders of magnitude more open and less complex. Like Krux and specter DIY, jade, etc...
As a side note, raspberry pi was a platform created for education, it is not designed for critical operations. It is just a full Linux computer like your laptop. And we all recommend that people don't use laptops for signing.
2024-04-18 02:09:08
by npub1sn0…jdv9
Read just the first chapter of John Stuart Mill's "On Liberty" (free via Project Gutenberg etc) and tell me that he didn't have his finger precisely on the pulse — in the 1850s — of the root cause of the authoritarian war for majoritarian supremacy that we're witnessing today. Censorship, the compelled worship of an ever-shifting orthodoxy, the construction and desecration of idols before the temple of consensus— it's all the same thing, arising from the same source, and awaiting a similar solution. In times of trouble, we should look more to our history.
Read your Mill, brothers.