Avatar
ʸ₿
382d67ec6a31dc8d0c5b3099753a0044261a70e694aadd49eb58fce529cb3089

每个人自由,一切人自由。
小邦寡民。民至老,斯不相往来。 喝茶,心悦,看看邦联星际的景色,做点儿札记。 #Decentralization(去中心化) #Bitcoin(貝鍞) #价值互兑(VforV)

有了“探测器”,就是“千里眼”。😂🥸

#弄水轩

nostr:note1yqr5f72ee7yfhpzg4lultyg3v4cc0jmfddxatka78huev0wx6s8s00qpuq

#nostr 是一个具有“自我主权身份层”的通信协议......,莫过于此,不止于此。

#蹃驼 🐫

nostr:note1z304selvn2squ22ev7dxfjv8v8xx9sp5jqtvksut475wajk0wk8qpllctn

驼笺·网络拓扑

(NIP-00,network topology graph)

nostr 网络啚中的点集合:{客户端,中继栈 ,<客户端,中继栈>}。

#Nostr #NIP

1 网络构成

蹃驼网络啚(Nostr Network Graph)由三类点及其结缘而成(啚点的“结‘缘’”亦即啚点的“连接‘边’”)。以下记点的缘份或点度数为 d(d≥0),入度和出度分别都记 1 个度数,度数为零的啚点属于孤点——离网点。

1.1 啚全点(d≥2):客户端&中继栈

(Client&RelayStack)。应用例,完整节点或全节点(full nodes),…。

1.2 啚顶点(d≥1):客户端(Client)。应用例,查询只读端点、既读又写客户端,…。

1.3 啚节点(d>1):中继栈(RelayStack)。应用例,笔记存档端点、单一中继播发消息节点、全工节点,…。

2 网络啚点

2.1 蹃驼集合点={客户端, 中继栈}。

因此,“蹃驼”🐫有双峰——客户端峰和中继栈峰。

2.2 简化啚点

蹃驼协议允许网络啚点简化为“单峰驼”🐪:

2.2.1 蹃驼点={客户端}

2.2.2 蹃驼点={中继栈}

3 连接或联结

3.1 客户端及其联接

↗点对点(P2P)

客户端

↘点对中继栈(P2R)

3.2 中继栈及其联接

↗中继对点(R2P)

中继栈

↘中继对中继(R2R)

跋:包含有图解的说明另文。本记只为纯文本。

链上世界,真正的去中心化比表面上看起来要困难得多。讹鍞泛滥成灾。

Ton基金会天量控盘。

#去中心化 #Decentralization #讹鍞 #Altcoin

https://m.toutiao.com/is/ih9BdWfb/ Ton基金会天量控盘85%代币?

肯尼斯·E·艾佛森是一位杰出的计算机科学家,他最重要的贡献是开发了APL语言。1979年他因对数学表达式和编程语言理论的贡献而获得了图灵奖。

在哈佛大学当助理教授时,他研发了一套数学表达式来操作阵列,以便教授学生。1960年,他开始在IBM跟阿丁·法尔科夫一起工作,按他开发的数学表达式建立了APL语言。 在此之后他又和许国华共同发明了J语言。 许国华(Roger Hui)出生于香港,后去了加拿大。

https://nostrcheck.me/media/382d67ec6a31dc8d0c5b3099753a0044261a70e694aadd49eb58fce529cb3089/74b7b0bb15153258a6927c8149d2f34ef233a05d6c0cf457c1b1c0be9dfbfda5.webp

符言

APL 是一种符号化语言,它的所有语言关键字(词)都是"符"暨符号。因此,称APL是一种“符言”。

此“符言”非彼“胡言”。🐼

#读简堂 #APL

https://nostrcheck.me/media/382d67ec6a31dc8d0c5b3099753a0044261a70e694aadd49eb58fce529cb3089/21b682698265e0b3087f1c971e8cc48ac787c0e4761923403ed7f5ff466ab948.webp

“不企图去说服…,而是开发使…无法…的技术。”

隡佗具体实现了戴伟的这一思想论点。

- 戴伟(Wei Dai),Cypherpunk(关于B-Money的工作是 Bitcoin 白皮书中第一个引用的)

#Botcoin

nostr:note1z26rpecw9phya9wzdwynykqqlar0xqrudzsjm6tcc87d23zlptwsm2jq20

Schnorr签名在创建和验证数字签名方面比ECDSA更好。也比ECDSA更简单、更高效、更安全。

#Bitcoin

nostr:note14xffnjusv6xmsydydqg5wgvtkwk9wcpkkwvjuxl0k7etal7gxfsqsj9zqz

这是真本!因为有“鉴真指纹”:“As long as honest nodes control the most CPU power on the network, they can generate the longest chain and outpace any attackers.”没有这句话的都是后起的“讹本”。

#Bitcoin

nostr:note1vc4fz72f2x3tr86r8yauzuetsa4ecp6wyw6n438z3fws3uvhhzgsm5x9qf

如果承认 RSI 指标的规律性意义,那么,BTC与USD的兑价后面必有一次深蹲。

#Bitcoin

nostr:note17e4v65zs9vr5vxzepv0ej3e5f2p9cyj9lvkqkucd5227uy5v9xnqmsp074

但是,“波动交易”才体现生命活力。没有“DAYS”的活跃交易,就不会成就“DECADES”的丰厚收益。货币或者货貝从来就是用于做交易媒介的,它并不应该是收藏品。

#K货场 #Bitcoin

nostr:note1fyqsqegtvq4g60sma23dp634px9mm62clv0dd5fpkcfz8wd06r9sxfuz5h

貝鍞(bitcoin)的发明确定了“去中心化”的思想理念。蹃驼(nostr)是秉持“去中心化”思想的一次新跳跃实现。二者基于同一个基础共识——分布式的空心化。前者已经行过“成人礼”,后者还待做“洗礼”。

#貝鍞 #Bitcoin #蹃驼 #nostr #去中心化 #Decentralization

nostr:note1zkxdmh4ypg56hhrr7mwpywpa6a8927n0v8xmp979dkmfs4xeg0yqdcqqr4

#混糊炒(strfry) 中继器可以专门备份自己的蹃驼笔记,这也是它的“负熵中继”功能之一。

#nostr #relay

note1juyzsjhzhnzz6cpj633q0j6g6qe73264xq6wj6c9z98t62w225zs99hdty

nostr:note1qgd2c72s5alrey56apd64wagv5h07z9ex73jznsuh0j6hdes2cqsznuzdl

Replying to Avatar Keychat

Old Nostr DM (NIP-4) integrates four capabilities into a single Nostr key—it serves as an ID, an encryption key, a receiving address, and a sending address.

The encryption key in NIP-4 does not change, so NIP-4 messages lack both forward secrecy and backward secrecy.

Consequently, if the private key is compromised, both historical and future messages can be exposed.

The receiving and sending addresses remain constant, which poses a severe issue for metadata privacy in NIP-4 messages;

Everyone can see who (ID) is sending messages to whom (ID).

Currently, most Nostr apps use NIP-4 for DM functionalities, such as Damus and Primal.

——————————————————————————————————————

New Nostr DM (NIP-17) integrates three capabilities into a single Nostr key—it serves as an ID, an encryption key, and a receiving address.

Kind-17 separates the sending address from the ID, making the sending address random and concealing the sender's real ID, thus improving metadata privacy.

The encryption key in NIP-17 does not change, so NIP-17 messages also lack forward secrecy and backward secrecy. Once the private key is leaked, both historical and future messages will be compromised.

The receiving address remains constant, so there is still a slight issue with metadata privacy in NIP-17 messages; everyone can see who (ID) is receiving messages.

Apps like 0xchat and Amethyst use NIP-17 to implement DM functionalities.

——————————————————————————————————————

In Keychat, the ID, encryption key, receiving address, and sending address are separated.

The encryption key, the receiving address, and the sending address are updated independently and continuously.

Keychat's encryption key is derived using the Signal protocol, and each message uses a unique encryption key, which is deleted after use.

Thus, Keychat messages have both forward secrecy and backward secrecy. Even if an encryption key is compromised, only the current message can be leaked, and historical and future messages remain secure.

Keychat's sending address is randomly generated for each message.

Therefore, external parties do not know the sender's ID.

Keychat's receiving address is derived using the Signal protocol, with almost every message using a unique receiving address.

Thus, external parties do not know the receiver's ID.

——————————————————————————————————————

However, it's important to emphasize that NIP-4 and NIP-17 offer superior multi-device synchronization capabilities because they integrate three capabilities into a single Nostr key—it serves as an ID, an encryption key, and a receiving address.

现在的 #nostr 的“唯一单私钥规则”事实上是一个巨大的漏洞设计。

应该是设计成一套权效递减的私钥排序集合:{<① 主密钥,② 跨客户端活动密钥,③发帖密钥>}。