Avatar
ynniv
576d23dc3db2056d208849462fee358cf9f0f3310a2c63cb6c267a4b9f5848f9
epistemological anarchist follow the iwakan scale things

Yes. I still install some apps, but from a privacy standpoint websites always have less control and fewer attack surfaces than apps.

I still think that one Identity key and multiple device specific keys isn't that complicated. It's what we have now, except you validate in-event identity claims, and when you see a new revocation event prune the disavowed device events.

https://github.com/nostr-protocol/nips/pull/1450

Open source is powerful nostr:note1fxqz4husc56j9g4e3dmnaw6394z64g6ftdkfhnu5e6ccns5zwmcspwrdzg

This is an interesting hypothesis. What about something like dried pasta?

🚔 Excuse me, son. Are those bits... 🧐 random?

Who's writing formally proven software ahead of AGI?

Mutiny should never be forgotten nostr:note1m9wzkvd0pef6nuk86ee822m7wrlc33sqxz8u7vu6qg6pwq9wjggq5ugvhp

Frustrating to see Ilya say so little