Inefficient protocol design, which leads to excessive network usage and is centralizing
siloing clients
non rotateable private keys or use of subkeys
Analytics honeypot
The exception to this is the Bitcoin Ledger and Nodes. Many in agreement is more valuable than a single node
Festivities. People at a ballroom dance
Thats understandable. I wasnt aware BlueWallet supported multisig but then again ive mostly only used it before as a watch wsllet and for lightning
Im interested in this.
Do you think it may have been a clipboard attack? How did you verify addresses? Was this involving a hardware wallet for signing that didnt support reviewing the tx details? Was this with whirlpool?
When private keys are created by snort it should warn the user that those keys are compromised and can be used by snort to sign anything. Just the same general problem before extensions were common
Doesn't/didnt adequately warn about private keys when creating account
Image caching
Image caching
Image caching
#MonsterMind
Spotting malicious attacks in the manner Snowden describes would, he says, require the NSA to collect and analyze all network traffic flows in order to design an algorithm that distinguishes normal traffic flow from anomalous, malicious traffic.
“[T]hat means we have to be intercepting all traffic flows,” Snowden told WIRED’s James Bamford. “That means violating the Fourth Amendment, seizing private communications without a warrant, without probable cause or even a suspicion of wrongdoing. For everyone, all the time.”
It would also require sensors placed on the internet backbone to detect anomalous activity
nostr:npub1sn0wdenkukak0d9dfczzeacvhkrgz92ak56egt7vdgzn8pv2wfqqhrjdv9
Just intercept all traffic outside the United States. Problem with that pesky 4th amendment solved!
How many are wholecoiners?
There are about 62.5 million millionaires globally, a 11.4% increase from 2020. There are about 22 million millionaires in the U.S.
OK that sounds more like a checkbox or other slider ui element to set content-warning tag specified by NIP-36. For example, amethyst has this

But not all clients support all NIPS and textually tagging something as NSFW has traditionally been an indicator, and some clients do filter on that without the content-warning tag being set.
Your routine reminder that if a food product lists "natural flavors" as an ingredient, that literally could be anything including dung beetle, cricket skin, booger and cow patties
I knew nostr:npub12gu8c6uee3p243gez6cgk76362admlqe72aq3kp2fppjsjwmm7eqj9fle6 was stalking me!
How does that work for clients without the concept of a tab
Maybe - nostr:npub1yaul8k059377u9lsu67de7y637w4jtgeuwcmh5n7788l6xnlnrgs3tvjmf implemented basic web of trust functionality in Damus.
Early on while nostr is tiny, I question if crowdsourcing can be effective at filtering out adult content consistently. Happy to be proven wrong
What does that web of trust entail?
Last one I saw was Nostrgram but it was more of a view score for indicating how many shared followers you have
It shouldn't imply that all posts signed by a public key are the same kind of content. Accounts should be able to self categorize as sensitive or warning for the content. If other services want to do analysis and clients partner with those services thats all well and good but that cant be the expected approach for nostr as a whole. Clients wanting to moderate experiences should probably not be rendering global by default










