in security design you already assume everything is untrusted until proven otherwise, most trusted components are limited and internal, and whatever external “trust” exists is limited to the bare minimum
What you are saying is giving up before you even try
That 5% is what we might call “shared accounts/custodians in a single small community”
And it’s certainly not ecash
true trust often only emerges in small, tightly knit groups of people
it is so small to make the utility of ecash or similar trust based systems useless for 95% of use cases
also known as 0
Ecash is just a glorified IOU… not sure why people are so hyped about it
you do not have sats until you redeem the ecash, in which case you may get rugged and gets absolutely nothing
You have reinvented how cash even became a thing
bank issued banknotes => govt issued backed cash => govt issued unbacked cash => mint issued “ecash note” => government issued “sats note” => government issued unbacked “sats note”
Thank you Matrix
"Semisol removed 21 messages, sent a hidden message, removed 20 messages, sent a hidden message, removed 44 messages, sent a hidden message, removed 8 messages, sent a hidden message, removed a message, sent a hidden message, removed 3 messages, sent 7 hidden messages, removed 6 messages, sent 2 hidden messages, removed 35 messages, sent 2 hidden messages, removed 97 messages, sent a hidden message, removed 9 messages, sent a hidden message, removed 10 messages, sent a hidden message, removed 37 messages, sent a hidden message, removed 4 messages, sent 3 hidden messages, removed 41 messages, sent 2 hidden messages, removed 49 messages, sent a hidden message, removed 43 messages, sent a hidden message, removed 41 messages, sent 4 hidden messages, removed a message, sent a hidden message, removed 2 messages, sent a hidden message, removed 3 messages, sent a hidden message, removed 7 messages, sent 12 hidden messages, removed a message, sent 3 hidden messages, removed a message, sent 37 hidden messages, removed a message, sent a hidden message, removed a message, sent 7 hidden messages, removed a message, sent 4 hidden messages, removed a message, sent 6 hidden messages, removed a message, sent 195 hidden messages, removed a message, sent 13 hidden messages, removed a message, sent 2 hidden messages, removed a message, sent a hidden message, removed a message, sent 3 hidden messages, removed a message, sent 22 hidden messages, removed a message, sent 6 hidden messages, removed a message, sent 5 hidden messages, removed a message, sent 13 hidden messages, removed a message, sent 4 hidden messages, removed 3 messages, sent 21 hidden messages, removed a message, sent 70 hidden messages, removed a message and sent 111 hidden messages"
Cloud mining with a new label 😕
We all know how that turns out… thin or negative margins for the “miner”, service could rug your bids
Shame nostr:note1c62tjgtgq6eh7mxvcvhe7g3lmfm8zkqh6qppm3psp0ft9drrm30sdxv09m
yes, 99% of extensions will act like tag queries, but based off of other things (such as links in content field)
I am considering an advanced search extension, which can be easier to implement in an external search DB
my opinion is that nostr REQs are too limited, and to some extent purpose-specific indexes will emerge
they should be standardized to avoid fragmentation, and this is one reason I was saying it should be easy to extend relays
FUD and Anticompetitive Practices Manager* nostr:note1crfayprenljp34z340z8wtvhse36rcqg5rnv4pfepk6u943cgzfspstc2t
assume an implicit +x on every line where x>=$900 :)
Oh that still applies even with Nostr if the provider gets hacked.
leaked your nsec? too bad, your PII is now public nostr:note1eqmze4t892x99qcukv5kawwu8cr886qxagqsqjdxvefvsmq2c8cshhs7eu
now all that remains is dumping Jira for OneDev nostr:note1uywrje0nhedl9rel8jrj23pd9wmlc0dknqywjutx2ypq73fnurksew969f
Not devices. Software.
Related use cases are being merged, while any use cases that do exist but are rarely used become simplified so people do not have to learn how it works in detail and/or directly integrated into other applications/OS (example is printing)
In Nostr, microapps won’t scale, as the cost to be familiar with n applications scales as n^2
Eventually, microapps converge into integrations and large clients.