I am 🤣 nostr:note12ywyg0czwd5srexnfwx5d9gvkzarnwts654p7kmkslkqvs6wa0qqfjxckc
"Which is why the Matrix was redesigned to this, the peak of your civilization. I say your civilization because as soon as we started thinking for you, it really became our civilization"
The whole idea behind forward error correction and fountain codes is that you spray a lot of data, and the other party eventually checks in to tell you what they missed. I'll do my homework on HAM and check out your git repo. Carry on! 🫡
Sorry, my internet comparisons aren't helping. You said that you're doing this:
T: Connection
R: ack
T: ready
R: ready ack
T: request to send
R: ready
T: Note1
R: ack
T: Note2
R: ack
T: final done
R: done ack
I'm suggesting:
T: Ready to send
T: Note1
T: Note2
T: ErrorCorrectionA
T: Maybe: ErrorCorrectionB
T: Done
R: Maybe: request to resend partN
R: Done ack
So, half as many packets, no channel downtime, and the possibility of many receivers. This is the difference between "TCP" and "BitTorrent". I don't it's incompatible with your hardware goals
I'm not familiar with HAM, but I am familiar with communications protocols. The problem seems to be that you're using a synchronous protocol like TCP. Other BitTorrent-like protocols might speed things up considerably. I can do some research. You list a few, but what specific hardware systems are you trying to be compatible with?
The NSA's TAO program has said that their strength comes from knowing your systems better than you do. The CIA is similar: knowing people better than they know themselves.
Theres no such chain, but better visibility into these situations helps to keep them in check. If it can't be done invisibly, they tend not to do it.
WW2 wasn't started by any single action. And yes, the CIA has a lot of fun. They're also very good at muddying the waters. And yet, the only people that can do anything about that are US citizens. So, should we pay attention to geopolitics or just like them do as they please?
To each their own. A true individualist is at the whims of their circumstance.
I understand, but since we all share the same space, at some point your neighbor's problems become your own. We shouldn't completely ignore geopolitical action because individuals are powerless against the state. It takes collective action and accurate intelligence to oppose it.
I lean toward supporting Ukraine because Russia crossed the boarder first, just as I would support you if the state took your property. I haven't even met you, but this is how we win.
ax25 has 72 seconds of overhead?
Do you not support your neighbor when they are attacked in their home? The problem is knowing whether they were attacked, and whether they were home, and whether it was their home. The pen isn't stronger than the sword, but it does control it.
This is simplistic. I can express support for self determinism without committing my life to a specific situation. The root problem is knowing what people are fighting for –
"Truth is the first casualty of war"
JSON is just an encoding. For nostr it's necessary to produce this encoding in order to verify the signature, but if your medium is constrained, there's no reason you can't define a new encoding. Nostr timestamps are unix timestamps: the essential information in them is four bytes. For essential fields you can just declare an ordering: they need to be there, this is the order, this is their size etc. A receiver would then reconstruct the JSON object based on the format, and then be able to verify the signature.
Now you're getting it nostr:note1akgc3pg464dqfcwcxr6c7gxfre2nm7ddu7c59rvglxv7k8xdntvskrwu5u
Are you sending JSON or some custom packing? Do you need packet switching, or is open broadcast okay? A minimal, TLV based Kind 1 event could look like:
"Hello Nostr":
- 32B (pubkey) + 4B (timestamp) + 1B (kind) + 1B (content length) + 10B (content) + 64B (signature) = 112 bytes
I have some silly musings on small events. Signatures are the worst: https://github.com/ynniv/nips/blob/063b1ffca81b71c75509b187615580b65975c1fd/XX.md