Avatar
Existential Experimentalist
24e760996f56f356ab4149b818c93005ac11d0a61367e995154e477f9ccf5b8c
I am as much a non-single-discipline educator, a cognitive, cultural & economic decentralization proponent as I am a psycho-naut, psychologist and a soul of fire and music.
Replying to Avatar Ava

Know your threat model and act accordingly

The more privacy you want/need, and in which areas, will determine how far down the rabbit hole you need to go. Not everyone has to act like Edward Snowden when he was on the lam with gov secrets. Even he says he's not as hardcore as he used to be because he's in a different place in his life.

If you try to be the most hardcore in areas where it's not really necessary or needed, it is not only an unnecessary burden of time and convenience, but it is common for people to burn out.

Do you know the difference between privacy, security, and anonymity?

Here is an excellent short introductory video from Henry at TechLore to help you better understand threat models, the difference between privacy, security, and anonymity, how they impact time and convenience, and hopefully help you to identify yours.

https://file.nostrmedia.com/p/4eb88310d6b4ed95c6d66a395b3d3cf559b85faec8f7691dafd405a92e055d6d/6fc69ad67dac731d4f03541a100c54fe291692ca6333478c70ea798095a990f6.mp4

YT

https://youtu.be/DHZRhboZhfI

Here is the full free version of the course. It's a few years old and so are some of the app/service recommendations. There are also some sections I would recommend going about differently, but overall the basics are solid and it will help you identify areas of import and make better informed decisions based on your unique threat model.

I highly recommend checking it out for a deeper dive into the basics of good OPSEC practice.

Go Incognito: A Guide to Security, Privacy & Anonymity | Front to Back

https://youtu.be/Y19RFmOxfVM

#IKITAO #Privacy #Tech

Thanks a lot nostr:nprofile1qqsyawyrzrttfmv4cmtx5w2m85702kdct7hv3amfrkhagpdf9cz46mgprpmhxue69uhkv6tvw3jhytnwdaehgu3wwa5kuef0qy3hwumn8ghj7enfd36x2u3wdehhxarj9emkjmn99ulkwmr0vfskc0tpd3kqng2s9wAva!

Question 1: are you suggesting these two religious views are different in their outcomes?

Question 2: how does making criminals and corrupted ones understand and become Bitcoiners relate to the topic of religious goals, in your opinion?

What is the source of the security of the data preserved within Nostr?

I see, like melted butter (ghee)?

DOES ANYBODY KNOW HOW TO SOLVE THE ISSUE WITH SOME MESSAGES APPEARING DAYS/WEEKS AFTER THEY'VE BEEN SENT?

You right. But I assume, not every single transaction request is captured?

Is it even possible in principle - to have the complete state of the transaction requests?

is there a particular website that allows one to witness it, without requiring too much of a technical background?

Limits and the Search for Malfunctions #mathshorts #limits_and_continuity #calculus

https://m.primal.net/PHId.mp4

Funny, this is like the second time I watch a video in Nostr, and that's the Biggie video which I just had to discover a week ago in order to refresh my musical intake as I got too much of only heavy metal in me :)

I HAVE EXPERTISE IN MATH, PHYSICS, ECONOMICS, PHILOSOPHY AND HUMAN PSYCHOLOGY AND I WOULD LOVE TO HELP ANYONE WITH ANY BITCOIN RELATED WORK!