Avatar
Tim Bouma
06b7819d7f1c7f5472118266ed7bca8785dceae09e36ea3a4af665c6d1d8327c
| Independent Self | Pug Lover | Published Author | #SovEng Alum | #Cashu OG | #OpenSats Grantee x 2| #Nosfabrica Prize Winner

I just proved another cool concept with #nostr #safebox.

The idea is that the data is completely portable and can migrate to other relays. If the relay I am using becomes unreliable or hostile, I can simply replicate/migrate the data (the proofs and related data) to other relays and continue on from there. I just proved this with my latest code.

So now #safebox is acting like an organism - if the environment becomes hostile, it can pick up its data and continue elsewhere. Same with the code - it doesn’t actually matter where the code is being executed, so long as it has access to the nsec to access the data.

The implications here are pretty wild: an instance of a ‘wallet’ or ‘safebox’, as like to call it, does not need to e contained within a specific app/device, nor constrained to a specific relay - it can ‘move around’ using friendly code and relays - all that is needed is the nsec.

I honestly don’t know where else this is possible, except for #nostr.

Just wild. This is #unstoppable.

Interesting. On a multi-use paths, faster moving parties should always yield to slower moving parties. Doesn’t matter the type of transport. The only rule of courtesy is to only occupy half the width, no matter the side.

An interesting cultural difference I’ve noticed with North Americans - rights of way are co nsidered to be something to assert and to take, rather than to yield and to give. The example is the cyclist in your situation. It’s the complete opposite in other parts of the worlds, where traffic doesn’t have any ‘rules’ - everyone just wants to get to their destination safely.

The Reply Guy attacked helped clarify for me the two fundamental mechanisms for ‘permissionless’ systems to moderate themselves. The first is Proof of Work, where energy needs to be expended, the second is Web of Trust, where a relationship needs to exist between an existing ‘known’ npub and newly ‘unknown’ npub.

These two mechanisms counter spam: the first requires an energy cost, and the second requires a relationship cost.

Anyway, despite the annoyance of Reply Guy, it was a very valuable learning lesson.

Nostr eats everything.

?cid=6c09b952rxyqftm3puk7bdvygg8y2ewpc3b8h07cllfq8lxn&ep=v1_internal_gif_by_id&rid=giphy.gif&ct=g

#Nostr eats everything. Seriously, I wonder if its radical simplicity and permissionless operation are enough to change the world.

To get rid of Reply Guy I had to remove several relays from my clients including my own test relay. So I guess the spammer targets relays that can't counter spam.

Good in the long run to learn and counter these attacks but in the meantime GFY Reply Guy. You remind of those seagulls flying around the beach waiting to steal your French fries and crapping on the picnic tables while doing so.

?cid=6c09b952xi6gf8zqpxqmkvrr44ck2aqk0wje8nbbpkbz9fd4&ep=v1_internal_gif_by_id&rid=giphy.gif&ct=g

Test from Amethyst client

There is a great story called Journey written by James Michener about Brits who wanted to traverse to the Yukon gold fields without going through America territory. As I recall, the Brit servants all died, but the expeditioners got through fine.

Simple ideas encourage the best engineering.

Only in Canada do you fly through US airspace to get from one point of the country to another.