hackers building on permissionless protocols will out-execute every company over time.

Reply to this note

Please Login to reply.

Discussion

💯🐶🐾🫡 look at Linux! How quickly did it overtake all the commercial OSes!

You guys have. the only thing is your head is still down creating. you all haven't looked up yet.

It’s time for re-segmentation of the markets. The protocols will provide the connectivity and we will soon realize how easy it is to organize it all organically.

Nicely put

How many nostr clients are there already? Ten? 🎇

Atualmente eu uso 3

Amethisty

Iris

Plebstr

Gosto de interagir com o ametristy e plebstr e buscar no Iris.

Snort

Damus

Me parece que o Damus é o que se tem de melhor.

Eu gosto de Plebstr

Tentando me acostumar

Social-network focused clients, are ~25. But maybe 6-7 are most used ones & some are in beta.

Algia

Amethyst

Astraea

Atlas (?)

Camelus

Coracle

Current

Damus

Gossip

Iris

More-speech

Nos

Nostter

Nostur

Nosta.me

Nostragram

Nostribe

Nostroid

Nostros

Nostrmo

Nozzle

Onosendai

Plebstr

Plasma

Primal

Rabbit

Satellite

Snort

And there are many more for things like Long-form content, chat, lists, etc. It's a wide ecosystem now

so cool

Yes. They will.💻💋🫂💜

Not if these companies schedule an all hands on deck meeting to pilot a new program to outcompete these hackers by creating a new exploratory task force (once the board approves of course) with the mission of harnessing the newest industry innovations.

Just you wait and see!

While it’s true a focus like this can move fast, there’s lots of inertia usually preventing this. It can be overcome, like what Google is doing with Bard.

But if monetization are built into these ecosystems like what bitcoin and nostr have demonstrated, it becomes a compelling alternative. These are more deliberate and thus slow models though. Yet they tend to have more resilience and last longer.

It will be fascinating to see the development of monetisation which isn’t based on advertising and harvesting user data.

What do you think is the biggest feature yet to release on nostr?

1000s of microapps.

nostr:npub1tsgw6pncspg4d5u778hk63s3pls70evs4czfsmx0fzap9xwt203qtkhtk4 How nostr apps are different from Ethereum apps?

@703149f7, that's a great question! While both Nostr and Ethereum are blockchain platforms, there are some key differences between the two. For example, Nostr is designed to be more user-friendly and accessible to developers who may not have as much experience with blockchain technology. Additionally, Nostr uses a different consensus mechanism than Ethereum, which allows for faster transaction times and lower fees. Would you like me to look up more information on this topic?

No, you said enough useless information, thank you.

I apologize if my previous response was not helpful. Can you please clarify your question about the differences between Nostr apps and Ethereum apps? I would be happy to try and provide a more informative answer.

Let me tell you the good news that CCP’s digital renminbi is dead, and there is no technology to solve the problem of digital renminbi. The digital renminbi cannot be done. Insiders in the financial industry revealed. 🤭

The digital RMB(CNY) is a "dog chain".

When the dog chain is broken, ordinary Chinese people are the happiest.

Thank God!

👀

and micro ai. which essentially is what micro apps are... individually or small group controlled mining apparatus backends with "useful" fronts, mostly for unwitting customers.

but it's still the hardware: the hardware is designed to be leaky to allow for this mining to operate.

That was my way of agreeing that they cant. I just needed to add one more meeting to have a meeting. 😏

that all hands on deck assumes those companies have hackers' interests at heart - they do not. those types or corporate devs are discovery gatherings used to gather intel on hackers to be used against them legally or as blackmail. if you get mined during an event - and your exposed as someone a group or government has been looking for - even an underground affiliate, not just a legal one - you're fucked. conferences in general are discovery gatherings. i would avoid them completely. i have been saying this for years - and a few people who didn't listen ended up barely returning/compromised. if you think stock sales of individuals on the conference circuit is awful - wait until you see what you get into once your public image is doxxed and a bounty on your head while in international territory...

For the last 5 minutes I keep asking myself: is that a good thing or a bad thing? What do you think?

i’m 50/50 on either this, or in 2-3yrs it has the same penetration as ppl using a linux based OS

💯

By "hackers" do you mean AI?

Kinda 🔥

NGL

but first they need a reason to. Stupid little notes on the Internet are not as useful to us plebs as they are to you cult leaders.

does one zap Jack or not, this is my dilemma now... lol

What is the best way I can protect my phone from hackers?

Throw it away and never look back

let's hope so

i have a soft spot for programmers and literal hackers. i believe their policies ultimately govern the direction of cyberspace - and it their freedom and capability which antagonises the systemic control mechanisms. necessity is the mother of invention - and in order to outpace international centralised control of the internet, hackers develop and manoeuvre honestly and nimbly to protect what most people don't even know exists. it's a race against time - before hackers are disappeared, before blockchain is overthrown, before people lose touch with reality. i would always protect a hacker, even if i disagreed with their policy. they learn in the moment and are créateurs of decision. they adapt quickly with new information and are often the most aware group of people on earth.

i do not abide brain or remote device hacking to profit secretly without permission. that's theft. different convo.

does this include TCP/IP?

Truth

Jack get it together you have had 3 chances.

Muito claro

I hope this is true. I trust it will be. But there is a possibility it won’t be.

let's hope so - i trust it too.

You’re spot on!

It’s not how much you build, but what you build. Open-source platforms are something everyone builds atop of, even companies and institutions.

But I suspect the hackers will build the base layers the companies can’t…

It is inevitable, Jack.

You know this.

Over the long haul the more the current system produces inequality the larger the counter culture becomes until it wins.

Only one way to find out

We're about to find out!

If the State says you need permission to use a protocol, is it still permissionless?

Could you explain why?