average_bitcoiner on Nostr: on Softwar. Trust the theory. Don't verify. I have ideas that align with his idea of ...
on Softwar.
Trust the theory. Don't verify.
I have ideas that align with his idea of a macro computer.
but how does Bitcoin enforce control mechanisms for computers?
It's not that I disagree with the theory. It's that I demand proof. It's a cool theory. But falls apart at implementation because the world is messy. The cloud is just someone else's computer.
-------------------------
Economically it all checks out
Game theoretically.
Protocol spec for softwar? It's supposed to be useful in cyberspace. Protocols are the rules if cyberspace. Show me a protocol spec.
Specs are great but show me code.
Code is great. Let me run it.
PoW secures the chain; not exogenous data. The given state of any arbitrary bits can change whenever my computer wills it to change. Snapshotting those bits don't prevent me from changing the bits. It allows for detection of the change but does not prevent the change.
You can take a picture of your car, but it won't prevent it's theft or damage.
The chain is immutable.
Everything else is not
(this thread prompted by a good friend. ty fren)
Published at
2026-04-21 18:50:38 UTCEvent JSON
{
"id": "2c59c0909387ba007bd560c16a14f26c249c78849f1fde064e2bb120b98497f2",
"pubkey": "d3d74124ddfb5bdc61b8f18d17c3335bbb4f8c71182a35ee27314a49a4eb7b1d",
"created_at": 1776797438,
"kind": 1,
"tags": [
[
"r",
"wss://relay.bitcoindistrict.org/"
],
[
"r",
"wss://premium.primal.net/"
],
[
"r",
"wss://relay.damus.io/"
],
[
"r",
"wss://relay.primal.net/"
],
[
"r",
"wss://relay.virginiafreedom.tech/"
],
[
"imeta",
"url https://blossom.primal.net/f9bc17e0677185f71a6529e704ad24c9284b87c1ad031dcbe12e706f995afd80.png",
"m image/png",
"dim 2048x1152",
"service nip96"
],
[
"imeta",
"url https://blossom.primal.net/4e07d7aa56b3bc440a259b81c1d6904d65986c0d2b2224607423fb57714af707.png",
"m image/png",
"dim 2048x1152",
"service nip96"
],
[
"imeta",
"url https://blossom.primal.net/cdd2681308344b89946d3ea2e32c26664311d9c63584effd2d11c9df78d2a96e.png",
"m image/png",
"dim 1152x2048",
"service nip96"
],
[
"client",
"Primal Web"
]
],
"content": "on Softwar.\n\nTrust the theory. Don't verify.\n https://blossom.primal.net/f9bc17e0677185f71a6529e704ad24c9284b87c1ad031dcbe12e706f995afd80.png \nI have ideas that align with his idea of a macro computer.\n\nhttps://blossom.primal.net/4e07d7aa56b3bc440a259b81c1d6904d65986c0d2b2224607423fb57714af707.png \nbut how does Bitcoin enforce control mechanisms for computers?\n\nIt's not that I disagree with the theory. It's that I demand proof. It's a cool theory. But falls apart at implementation because the world is messy. The cloud is just someone else's computer.\n-------------------------\nEconomically it all checks out\nGame theoretically.\n https://blossom.primal.net/cdd2681308344b89946d3ea2e32c26664311d9c63584effd2d11c9df78d2a96e.png \nProtocol spec for softwar? It's supposed to be useful in cyberspace. Protocols are the rules if cyberspace. Show me a protocol spec.\n\nSpecs are great but show me code.\n\nCode is great. Let me run it.\n\nPoW secures the chain; not exogenous data. The given state of any arbitrary bits can change whenever my computer wills it to change. Snapshotting those bits don't prevent me from changing the bits. It allows for detection of the change but does not prevent the change.\n\nYou can take a picture of your car, but it won't prevent it's theft or damage.\n\nThe chain is immutable.\n\nEverything else is not\n\n(this thread prompted by a good friend. ty fren)\n",
"sig": "a1fe6b5e4504981494ef978afbb109a155c06ec88662ef40babc3c5ec6d034293371a6b2b6125378638379ec82ffcc581883398eb6cdcb2568e8cf0dac323201"
}