Avatar
Thomas Rossi
4a0cbe797a3dec633408209e014596a0935dfa986897a36de0f7e6b49a9d10c7
Building the open source network for logistics #startup #Bitcoin #hodl

Unless you do trading as your main job (and you have done it at a real desk before) this is a dangerous perspective.

You are competing against the best quant desks on the planet, 24/7, no prisoners. It’s not an easy game!

Guessing ups and downs is a very expensive hobby

GM today we build a cpp server that reads data matrix, why?

I wish I knew, politics I guess, it has nothing to do with Eonpass but a big company needs to play with data matrices to join the pilot

Let’s go, it takes less time to build the thing than argue with them 😂

Replying to Avatar ODELL

A Cypherpunk's Manifesto

Eric Hughes

March 9, 1993

---------------------

Privacy is necessary for an open society in the electronic age. Privacy is not secrecy. A private matter is something one doesn't want the whole world to know, but a secret matter is something one doesn't want anybody to know. Privacy is the power to selectively reveal oneself to the world.

If two parties have some sort of dealings, then each has a memory of their interaction. Each party can speak about their own memory of this; how could anyone prevent it? One could pass laws against it, but the freedom of speech, even more than privacy, is fundamental to an open society; we seek not to restrict any speech at all. If many parties speak together in the same forum, each can speak to all the others and aggregate together knowledge about individuals and other parties. The power of electronic communications has enabled such group speech, and it will not go away merely because we might want it to.

Since we desire privacy, we must ensure that each party to a transaction have knowledge only of that which is directly necessary for that transaction. Since any information can be spoken of, we must ensure that we reveal as little as possible. In most cases personal identity is not salient. When I purchase a magazine at a store and hand cash to the clerk, there is no need to know who I am. When I ask my electronic mail provider to send and receive messages, my provider need not know to whom I am speaking or what I am saying or what others are saying to me; my provider only need know how to get the message there and how much I owe them in fees. When my identity is revealed by the underlying mechanism of the transaction, I have no privacy. I cannot here selectively reveal myself; I must always reveal myself.

Therefore, privacy in an open society requires anonymous transaction systems. Until now, cash has been the primary such system. An anonymous transaction system is not a secret transaction system. An anonymous system empowers individuals to reveal their identity when desired and only when desired; this is the essence of privacy.

Privacy in an open society also requires cryptography. If I say something, I want it heard only by those for whom I intend it. If the content of my speech is available to the world, I have no privacy. To encrypt is to indicate the desire for privacy, and to encrypt with weak cryptography is to indicate not too much desire for privacy. Furthermore, to reveal one's identity with assurance when the default is anonymity requires the cryptographic signature.

We cannot expect governments, corporations, or other large, faceless organizations to grant us privacy out of their beneficence. It is to their advantage to speak of us, and we should expect that they will speak. To try to prevent their speech is to fight against the realities of information. Information does not just want to be free, it longs to be free. Information expands to fill the available storage space. Information is Rumor's younger, stronger cousin; Information is fleeter of foot, has more eyes, knows more, and understands less than Rumor.

We must defend our own privacy if we expect to have any. We must come together and create systems which allow anonymous transactions to take place. People have been defending their own privacy for centuries with whispers, darkness, envelopes, closed doors, secret handshakes, and couriers. The technologies of the past did not allow for strong privacy, but electronic technologies do.

We the Cypherpunks are dedicated to building anonymous systems. We are defending our privacy with cryptography, with anonymous mail forwarding systems, with digital signatures, and with electronic money.

Cypherpunks write code. We know that someone has to write software to defend privacy, and since we can't get privacy unless we all do, we're going to write it. We publish our code so that our fellow Cypherpunks may practice and play with it. Our code is free for all to use, worldwide. We don't much care if you don't approve of the software we write. We know that software can't be destroyed and that a widely dispersed system can't be shut down.

Cypherpunks deplore regulations on cryptography, for encryption is fundamentally a private act. The act of encryption, in fact, removes information from the public realm. Even laws against cryptography reach only so far as a nation's border and the arm of its violence. Cryptography will ineluctably spread over the whole globe, and with it the anonymous transactions systems that it makes possible.

For privacy to be widespread it must be part of a social contract. People must come and together deploy these systems for the common good. Privacy only extends so far as the cooperation of one's fellows in society. We the Cypherpunks seek your questions and your concerns and hope we may engage you so that we do not deceive ourselves. We will not, however, be moved out of our course because some may disagree with our goals.

The Cypherpunks are actively engaged in making the networks safer for privacy. Let us proceed together apace.

Onward.

Every time I read it at first I think it was easier back then. Few had ze skills but most importantly people were basically *not* sharing much data.

Today data is considered an asset and companies with good level of skills actively farm as much data as possible from a population which, on average, shares a lot.

So what’s the next step? What’s the incentive for not sharing your own data? What’s the business model for privacy? Why should it take over the “I pay with my data” model?

I didn’t submit it twice but now I see th_s4m0ht@eonpass.com in the nip05 field.. hype

UX is puzzling though, maybe locally store and grey out the field so that users understand something is happening

..yes I can spam requirements all day

Setting up my NIP05 🪬

I click Edit, go to NIP05 and set it, click Save

It goes back to the profile but if I click Edit again I don’t see a “pending” message and the field is empty. Is it normal or does it mean I’ve messed up?

the only reason I see to do that is to have undisputed chronological order between notes.

NIP03 already on it with open timestamp: https://github.com/nostr-protocol/nips/blob/master/03.md

Is this the reason why I see the profile pic only of someone I don’t follow only when I click on the robot head? That is quite neat!

Btw, why should images be part of gossip messages? Do you actually sign the bytes of the image or only the link to the image?

No cannibalism please ser

I didn’t setup my nip05 yet, but if I got it right: verification means on the domain of your nip there must be a file “domain.com/.well-known/nostr.json”

If the file is not present or not configured correctly - it must have inside { “names”:{“bitdecoina”:”npub…”}} then I guess you see verification pending

If you use a service for hosting the json, then you have to ping the service provider as probably something is broken on their side.

Yea, the only financing so far in fact comes from an eu tender for building what they call “anti counterfeiting infrastructure”.

I liked the call because it has to be open source and not locked to any technology. The failure of Tradelens by IBM was very loud: you can’t have this system maintained by a single entity. It has to be “really” p2p, some peers will be happy to share data with customs, other will be happy just not to have everything on phone and emails. Maybe multiple networks will come out, pretty hyped about it 😂

Well smugglers don’t really use the concept of “waybill” and “shipment contract”, they will just attach their box of stuff to the external part of the vessel or try to smuggle it within passengers’ luggage.

It will have an impact on industrial counterfeiting, since as an operator you will see “signed and approved” shipments but also “similar ones but not signed by the brand owner” requests. Then operators decide their risk tolerance.

If customs speed up compliance it will be for fully signed shipments though!

So Nostr, what’s Eonpass and what’s p2p logistics?

I know I know, you didn’t ask, but here it goes:

Today even large logistics operators (DHL, FedEx, AirFrance Cargo..) don’t really know if what they ship is actually what it’s declared in the data they receive.

This is because data exchanges are still a bunch of e-mail and phone calls in the industry (subcontractors maybe don’t have IT services at all, your salesman just received a phone call from a client to confirm the shipment, etc..)

As you know from nostr, notes must be cryptographically signed to be real.

Eonpass is building something like nostr but with notes that are shipment requests, waybills and all related objects. Brand owners will have nodes as well which can sign the initial data, downstream operators can decide to pass the full signed payload or to just show a ring signature that proves the original request was coming from a set of nodes (without revealing who exactly is their client, because business)

Advantages??

1) remove inefficient data exchange and errors, even small operators can run a node, it’s open source

2) better risk analysis (black market is the least of your problems when you board untested batteries in your 40M new cargo plane ✈️)

3) part of an EU project and Customs offices are actually looking into using the data to speed up compliance and pre-arrival screening (!!!!)

What about BlOcKcHaiN?

Nodes can build their audit trail of what data they receive and send, notarize it in a open-timestamp fashion. This feature is ready for bitcoin and elements

What is the end game?

Once the network is large enough you can use its messages to unlock bitcoin payments (or tether on liquid). Trade finance on bitcoin! The prototype for adaptor signatures is ready: the spending condition is knowing a signed shipment message, signed by an intermediary. Trade finance will not go away with p2p: if you are an importer you want to pay when the goods arrive, if you are an exporter you want to be paid before shipping the goods. You will always have someone on between who eats the risk and finance the thing!

What do you think?

Well, also understanding “the cause” and “why Bitcoin makes sense for the cause” help!

Before 2020 I was completely finance-illiterate, the process of learning improved my conviction by 10x minimum, before that it was mostly magic internet money and memes.

Not that I’m literate now 🥴 but at least I understand some context and I know how much I don’t know!

Someone #zapped me but I don’t know who to thank!

Whoever you are, thanks and have a good one! 🍻

(I’ve used the fountain.fm Lightning address of my podcast, not much details about inbound transactions)