Last Notes
Anyone interested in a serious review of v3 of my book The Praxeology of Privacy before it goes to print?
It would indirectly kyc your main chain coin.
lol, when I initially wrote steamroller I started to get confused with wtf that even is
Yes, at least similar, cross fork decoy selection doesnt seem trivial at all.
Thanks!
Oh and individual audio tracks for each participant is important.
So good, thanks for doing this!
Massive improvement, try it out!
The best way to anonymously ship your vibed apps.
#nevent1q…3jwd
Yes, same issue with consolidation.
Send them one by one with multiple days in between for reduced timing attacks.
Let's say you use @nprofile…gldk and have 10 private utxos nobody knows they are yours.
Now you go to the forked chain and send all 10 coins to the exchange in a single transaction, now everyone knows that the 10 unspent coins on bitcoin belong to the same person. Wasabi can't even know this and still assumes these coins are private when they actually are not.
Remember, when you move utxos on a forked chain you link common coin ownership on the parent chain.
Don't fuck up your privacy for picking up pennies in front of the train.
It does. Not historically, but for the last update.
I'm a simple man.
I see a fridge full of meat, I follow the npub.
Big mute button, raise hand, seeing who is in the call, no google play services, great recording quality.
Stability is more important than other features.
Fat zap if you make it work!
Can someone please make riverside obsolete?
Nostr login, MOQ audio/video calls, local recording and streamed to a blossom server for each participant.
To quote @nprofile…6htm:
"though technically true, this only applies to the ipv6 shim, which forces a 1280 minimum MTU + FIPS overhead.
When using the FIPS native API, that number will be much lower."
Tell that to @nprofile…2lxp, lol
Two projects aim at the same goal of unstoppable networks for human beings, and they arrive at radically different solutions. Reticulum strips addressing and ports from the protocol entirely and optimizes for radio links so slow that five bits per second counts as usable bandwidth, then builds its own parallel universe of applications on top. @npub1y0g…00ly takes the opposite bet, keeping IPv6 semantics alive through a TUN adapter so that unmodified SSH and curl can cross a mesh of Nostr identities. This post walks both stacks from the wire up, then shows where their design choices force different tradeoffs.
#naddr1qq…gwgh
Thats a good idea actually @nprofile…ympz
Yeah, but who's gonna trust GitHub for app distribution...
I'm curious, how did you find @nprofile…gsu4?
Were you a nostrich before already, or are you new to the space?
Honestly, it's the only app store that just works, especially for devs.
I see more and more non-nostr apps publishing on @nprofile…gsu4!
Like @nprofile…8teg, a climbing app, which recommends zapstore as best place to get the app, and use nostr DMs for feedback.
https://zapstore.dev/apps/naddr1qq2kxmmd9e3hyatcvdhkzcmg9eskuerjda5kgqgcwaehxw309aex2mrp0yh85ctswd6x7un99ejx2aszyrn45xzuqxwsjpyatl9su2dzejdl6qtwcrmd3yhunrm0lcqcrfyq6qcyqqq8uzch789f5
Basically, a group of people create a public key, such that only if a complex program returns valid does someone get the private key.
It's really a powerful building block.
I see that makes sense, thanks for working on this!
Honestly, LLMs are shockingly good at rewriting in a different language, especially when there is good test coverage.
Oh, and does Jam work ontop of the new implementation?
btw, zaps to you are failing.
Thank you for your service sir!
Joinmarket was pioneering in so many ways, you are an inspiration, and I learned so much from you!
I hope the project continues to be maintained and used.
Curious tho, why is it written in Python again?
We might add it.
But aren't you promoting your investment right now? 🙃
Your relay list is messed up btw.
Lightning sender privacy is great, and just use Wasabi for onchain payments.
The usual covenant debate on Bitcoin starts with Script and soft forks. PIPEs v2 starts somewhere stranger: it asks whether a spend condition can be enforced by making the signing key itself unavailable until a proof exists. That move shifts the burden away from on-chain verification and into witness encryption, committee setup, a huge off-chain artifact, and the engineering needed to bind them together.
The result is one of the most interesting proposals in current Bitcoin research because it enlarges the design space without asking Bitcoin consensus to change.
#naddr1qq…ce4x
By the way, Appendix A in this edition is my favorite history of religion, very interesting framing.
Yes that one goes even further, wild.
We're building a little something...
#nevent1q…kfz3
Excited to get this launched!
Yes, use TEEs for AI inference for now.
Yes.
Might be my #1 book recommendation for cypherpunks.
Awesome, a rare find!
That looks to be the very first print edition, check if its the same text as this initial online edition. https://anarplex.sirion.io/hosted/files/A_Lodging_of_Wayfaring_Men.pdf
Yeah, we're fat from running llms through homomorphic encryption.
You can now do wallet queries which is already impressive. Eventually I'd love to use it for nostr event queries, but that's also still far away.
Three architectural families have broken an assumption that was treated as a law of cloud architecture for two decades: that the machine running a computation must see the data the computation runs on. Homomorphic encryption operates on ciphertexts, secure multi-party computation distributes the work across non-colluding participants, and trusted execution environments isolate the work inside a hardware enclave opaque to the machine's owner. The privacy architecture of the next decade will be built on their compositions.
#naddr1qq…wja5
In theory yes, but in practice the code is all mangled with nostr deeply, specifically would be great to also support FIPS.
Here's some thoughts on the new architecture.
https://github.com/marmot-protocol/whitenoise-meta/blob/c387af9d1ad0d543112a9569ab04cac5fa188358/Engineering/marmot-architecture/target-architecture.md