yes, it would mean having two different event stores too, forking from the abstraction, that branches according to purpose...

i think that for this there needs to be some kind of chain of association or top level id, like, the first version ID should be a tag that all versions share...

i've talked about this idea and it's penciled into my ACL administrative events code that i haven't finished yet, a "blockchain" back-reference "replaces" is the tag i've suggested, i think it has many uses throughout, and especially for all kinds of replaceables - parameterised replaceables would be faster to associate if they had these as well since they are multiple

Reply to this note

Please Login to reply.

Discussion

I think they're just going by time stamp, at the moment. nostr:npub1wqfzz2p880wq0tumuae9lfwyhs8uz35xd0kr34zrvrwyh3kvrzuskcqsyn was working on events to track versions as a chain. I think it was similar to yours.

i hope we get blockchains on nostr... because that's what they would be, and nothing to do with consensus, just tamper resistant chains of events, they would also make it easy to know when a version has gone missing as well

You. Me. Same page.

Haha, the exact same...

Now, all we need is ssh with nostr bip340 signatures and you can push and bump the update on protocol, and then you need a http/s git interface, like the one https://mleku.net uses and a simple mirror protocol that watches for the events to duplicate

It can do whole filesystems then too

nostr:npub1tcekjparmkju6k83r5tzmzjvjwy0nnajlrwyk35us9g7x7wx80ys9hjmky since I see you, my last autozap didn't work for you. Is your wallet online?

Oh thanks for the poke! Lemme check.

Found the issue. My tor address was not working as expected...at all O.o

To be fair my tor daemon lives on another server, chances are it is not quite liking that lol.

Done! Decided to forego the Tor in my kubernetes cluster for the time being. Should be reachable again in a little bit when tor starts to pick up on circuits.

I need a diagram, or something.

yeah, i think i'm gonna do my first thing to be like a nostr ssh

listens on a port, config file containing npubs and usernames, and opens a stdin/out/err to the user's configured shell... and then how to do the tunnel encryption... hmmm hmm