<oembed><type>rich</type><version>1.0</version><title>buckyfonds wrote</title><author_name>buckyfonds (npub1x9…p6rta)</author_name><author_url>https://yabu.me/npub1x9hghmfunry8wcgg8s8w5e3drmkndw92r8qu0cp2l28u32aqqn9q6p6rta</author_url><provider_name>njump</provider_name><provider_url>https://yabu.me</provider_url><html>The Bitcoin or Gold psyop is silly and the debaters on both sides are usually clueless.&#xA;&#xA;Why wouldn&#39;t you own both Bitcoin and Gold? They are both assets outside the system and have different advantages/disadvantages.&#xA;&#xA;To mention some of gold&#39;s advantages (because everyone here already knows about Bitcoin&#39;s advantages):&#xA;&#xA;(1) Physical gold has no public ledger.&#xA;- No historical chain of custody anchored in a global database.&#xA;- Evidence of holdings is fragmentary: vault records, invoices, eyewitnesses, maybe customs records.&#xA;- Outside that, the state has suspicion, not a cryptographic audit trail.&#xA;- The &#34;omniscient ledger&#34; simply doesn’t exist.&#xA;&#xA;(2) Harder to geofence at scale from a screen.&#xA;- Once it is in your physical possession, there is no equivalent &#34;app store ban&#34; or &#34;node-liability&#34; lever that instantly makes it unusable for most people.&#xA;&#xA;(3) Gold has no &#34;core devs&#34;, no client politics, no mempool policy.&#xA;- &#34;Protocol&#34; = physics, metallurgy, and a scale.&#xA;- There is no equivalent of a small GitHub group with agenda-setting power.&#xA;- There is no &#34;v30&#34; for gold. No client upgrade that suddenly increases storage risk by 1200x.&#xA;- Coordination burden is basically zero at the &#34;how it works&#34; layer.&#xA;&#xA;(4) No need to defend a node/mempool ecosystem.&#xA;- No nodes.&#xA;- No mempool.&#xA;- No UTXO set to bloat.&#xA;- You don&#39;t need an army of volunteer maintainers to keep &#34;gold full nodes&#34; defensible.&#xA;- Less coordination tax, fewer sociotechnical attack surfaces.&#xA;&#xA;(5) Gold expropriation requires physical enforcement, not just data + policy.&#xA;There is no universal gold UTXO set or &#34;travel rule&#34;.&#xA;Expropriation requires either:&#xA;- Knowing where the gold is (vault, safe deposit box, storage facility).&#xA;- Or house-by-house enforcement with massive manpower/legitimacy cost.&#xA;In practice, enforcement tends to focus on:&#xA;- Formal channels (vaults, dealers, banks).&#xA;- Border crossings.&#xA;- Declarations above thresholds.&#xA;&#xA;nostr:nprofile1q9z8wue69uhk77r5wfjx2anpwcmrg73kx3ukydmcxeex5ee5de685ut2dpjkgmf4vg6h56n3w4k82emtde585u35xeh8jvn3vfskgtn0de5k7m30qyghwumn8ghj7mn0wd68ytnhd9hx2tcqyramha7g79ah5kdph92lxcunnd6dtnte75j4dt9swykwfuaurn9y54w4l07 also opened my eyes to some very significant issues regarding Bitcoin hardware wallets.&#xA;&#xA;TL;DR - I&#39;d imagine the government has access to the vast majority of seed phrases.&#xA;&#xA;From what I&#39;ve researched, getting this risk to zero is extremely hard (if not impossible). It can be minimized with multi-sig, heterogeneous devices instead of trusting any single black box.&#xA;&#xA;Just one of the many issues are &#34;secure&#34; elements in which many wallets store the seed phrase.&#xA;&#xA;A secure element (SE) is:&#xA;  - Closed-source silicon + firmware&#xA;  - Designed and signed off by a tiny number of entities&#xA;  - Certified by processes you don&#39;t control (Common Criteria, labs, NDAs)&#xA;  - Distributed at scale into &#34;secure&#34; devices (wallets, phones, SIMs, payment cards)&#xA;&#xA;Secure elements are perfect for creating choke points where keys &amp; identity cluster:&#xA;  - Centralized design&#xA;  - Long lifetimes&#xA;  - Hard to inspect physically&#xA;  - Wrapped in &#34;security&#34; narrative&#xA;&#xA;So if you assume a serious state-level adversary wants that lever and can get it sometimes, the right prior is:&#xA;- &#34;Treat any closed-source Secure Element as potentially backdoored if you&#39;re defending against a nation-state&#34;&#xA;&#xA;That&#39;s not the same as &#34;we know for a fact every Secure Element is backdoored&#34;. We don&#39;t. Lacking verifiable proof is exactly what makes this such an asymmetric control point.&#xA;&#xA;Dice-based seeds fix RNG trust, not key exfiltration. If a device ever sees the full seed, a malicious Secure Element/firmware can leak it later.&#xA;&#xA;The only real structural defense is collusion forcing:&#xA;  - Heterogeneous multi-sig (different vendors + DIY),&#xA;  - Multi-source entropy (XOR’d seeds),&#xA;  - Passphrases kept off the compromised device,&#xA;  - Independent stacks for different key shares.&#xA;&#xA;There is no neat solution that makes you &#34;immune to NSA&#34;. The best you can do is:&#xA;- Make mass, silent theft via one corporate/vended rail impossible,&#xA;- Force any serious adversary into messy, noisy, manual operations if they want you specifically.&#xA;&#xA;A state-level actor can plausibly:&#xA;  - backdoor RNG/nonces,&#xA;  - exfil keys via signatures,&#xA;  - coerce vendor into &#34;minor tweaks&#34;,&#xA;  - intercept shipping,&#xA;  - or just use host+legal leverage.&#xA;&#xA;(6) Gold doesn&#39;t need electricity, internet, DNS, app stores, or routers.&#xA; - You can transact in a blackout.&#xA;- You can pay a smuggler without any digital evidence.&#xA;- You don&#39;t care about packet filtering or &#34;crypto port&#34; throttling.&#xA;&#xA;There are many more examples of where Gold has an advantage over Bitcoin.&#xA;&#xA;And of course, Bitcoin has many advantages over gold (teleportability, shock convexity in a specific Great Taking scenario, programmability for complex, conditional arrangements, granularity in price discovery, verifiability, etc.).&#xA;&#xA;That&#39;s the point, gold vs bitcoin is a stupid debate.&#xA;&#xA;BTC sovereignty is mathematically elegant but socially expensive and perimeter-fragile.&#xA;&#xA;Gold sovereignty is technologically dumb but perimeter-resilient and legally fuzzier.&#xA;&#xA;Both are useful, but for different failure modes of the system.&#xA;&#xA;The same exercise can be repeated for Bitcoin and Monero. Both have their advantages and disadvantages.</html></oembed>