Avatar
ᴛʜᴇ ᴅᴇᴀᴛʜ ᴏꜰ ᴍʟᴇᴋᴜ
4c800257a588a82849d049817c2bdaad984b25a45ad9f6dad66e47d3b47e3b2f
ʙoarᴅ cerᴛɪꜰɪeᴅ ᴛecʜno-ᴘʜaɢe. mʏ mɪnᴅ ɪs ʜunɢrʏ, anᴅ ꜰeeᴅs on noveʟᴛʏ. ᴅo ʏou ʜave someᴛʜɪnɢ ᴛo sʜare ᴛʜaᴛ ɪ never ʜearᴅ? "𝔅𝔢 𝔠𝔞𝔯𝔢𝔣𝔲𝔩 𝔣𝔬𝔯 𝔫𝔬𝔱𝔥𝔦𝔫𝔤; 𝔟𝔲𝔱 𝔦𝔫 𝔢𝔳𝔢𝔯𝔶 𝔱𝔥𝔦𝔫𝔤 𝔟𝔶 𝔭𝔯𝔞𝔶𝔢𝔯 𝔞𝔫𝔡 𝔰𝔲𝔭𝔭𝔩𝔦𝔠𝔞𝔱𝔦𝔬𝔫 𝔴𝔦𝔱𝔥 𝔱𝔥𝔞𝔫𝔨𝔰𝔤𝔦𝔳𝔦𝔫𝔤 𝔩𝔢𝔱 𝔶𝔬𝔲𝔯 𝔯𝔢𝔮𝔲𝔢𝔰𝔱𝔰 𝔟𝔢 𝔨𝔫𝔬𝔴𝔫 𝔲𝔫𝔱𝔬 𝔊𝔬𝔡. 𝔄𝔫𝔡 𝔱𝔥𝔢 𝔭𝔢𝔞𝔠𝔢 𝔬𝔣 𝔊𝔬𝔡, 𝔴𝔥𝔦𝔠𝔥 𝔭𝔞𝔰𝔰𝔢𝔱𝔥 𝔞𝔩𝔩 𝔲𝔫𝔡𝔢𝔯𝔰𝔱𝔞𝔫𝔡𝔦𝔫𝔤, 𝔰𝔥𝔞𝔩𝔩 𝔨𝔢𝔢𝔭 𝔶𝔬𝔲𝔯 𝔥𝔢𝔞𝔯𝔱𝔰 𝔞𝔫𝔡 𝔪𝔦𝔫𝔡𝔰 𝔱𝔥𝔯𝔬𝔲𝔤𝔥 ℭ𝔥𝔯𝔦𝔰𝔱 𝔍𝔢𝔰𝔲𝔰" - 𝔓𝔥𝔦𝔩𝔦𝔭𝔭𝔦𝔞𝔫𝔰 4:6-7 ᴛᴇʟᴇɢʀᴀᴍ: @mleku1 ᴍᴀᴛʀɪx: @mleku17:matrix.org ꜱɪᴍᴘʟᴇx: https://smp15.simplex.im/a#PPkiqGvf5kZ3AbFWBh3_tw1b_YgvnkSgDEc_-IuuRWc

i can't but actually verifying it... problem is i'm pretty sure it uses logic circuits that are protected by IP bullcrap and probably the most important parts of those that are also hard to scan with x-ray as well

but if you are consuming the AI curated newsfeeds you are being manipulated, that's not the same as having a private discussion... like, telegram groups, that's something you might do with friends, but not posting on a public forum

really, you are fighting with everyone on a public forum, it's a place of debate not agreement, like this exchange now!

"i believe this, change my mind"

i use youtube also... but when it comes to social media and media sharing there's no reason i can see why to use the others when they deliberately distort my view of the user data to manipulate me

once the cat is out of the bag you can't put it back in

i personally like the diffs and checkpoints model where an event has a tree of edits and anyone running relays can see all of them but clients mostly don't show the old versions

but it's just an interface thing it's impossible to get away from the fact that once you send a message it's out there

it's just a data capture process... query the system, log each state with a timestamp, rinse and repeat, then when you want to draw graphs plot the pubkeys vs follow list appearances over time

a client that just snarfs all the follow lists it can get its hands on, probably by also snarfing all the relay lists it can get its hands on

taproot is just a complication on top of schnorr signatures... basically like HD keychains, each different "tweak" is a different subkey

a little different concretely but in principle more or less the same fucking thing

the thing that pisses me off is they make it complicated to just receive a taproot payment in the code for no reason because you have to have a tweak

yes, you can have no tweak but you must hash your private key first then you can use it lol... zero byte tweak is just sha256 of the private key

so, yeah, it's the same type of signatures as used in nostr, it took almost 10 years for bitcoin to get them and they did this abomination

at what point between 100% and 0% does it stop being slavery?

this would have to be done by other than the person publishing the events

it's just a matter of pulling kind 3s from everywhere on a regular basis and graphing them per pubkey

taxation is theft

no consideration no obligation

it's quite fishy that they have the money to pay the fees for this shit

most have a USB interface, the main problem is most you can't reprogram the firmware at all

it would be very simple to do it with a small single board computer with a pair of ethernet ports, USB socket and wifi

i think the nostr chat bot interface could be a real winner though... not as hard as a CLI but not as complex as a web UI

i remember once upon a time there used to be this notion of "digital agent" which was your own fully controlled automated server that made decisions that you told it to make automatically for you

i think nostr could enable this sort of thing... i am an other stuff maxi... microblogging is just one thing, i think that the DMs could be immensely useful for control interfaces and you could manage all kinds of things by chatting to a bot