Avatar
ynniv
576d23dc3db2056d208849462fee358cf9f0f3310a2c63cb6c267a4b9f5848f9
epistemological anarchist follow the iwakan scale things

I am 🤣 nostr:note12ywyg0czwd5srexnfwx5d9gvkzarnwts654p7kmkslkqvs6wa0qqfjxckc

Sorry, my internet comparisons aren't helping. You said that you're doing this:

T: Connection

R: ack

T: ready

R: ready ack

T: request to send

R: ready

T: Note1

R: ack

T: Note2

R: ack

T: final done

R: done ack

I'm suggesting:

T: Ready to send

T: Note1

T: Note2

T: ErrorCorrectionA

T: Maybe: ErrorCorrectionB

T: Done

R: Maybe: request to resend partN

R: Done ack

So, half as many packets, no channel downtime, and the possibility of many receivers. This is the difference between "TCP" and "BitTorrent". I don't it's incompatible with your hardware goals

The NSA's TAO program has said that their strength comes from knowing your systems better than you do. The CIA is similar: knowing people better than they know themselves.

Theres no such chain, but better visibility into these situations helps to keep them in check. If it can't be done invisibly, they tend not to do it.

WW2 wasn't started by any single action. And yes, the CIA has a lot of fun. They're also very good at muddying the waters. And yet, the only people that can do anything about that are US citizens. So, should we pay attention to geopolitics or just like them do as they please?

I understand, but since we all share the same space, at some point your neighbor's problems become your own. We shouldn't completely ignore geopolitical action because individuals are powerless against the state. It takes collective action and accurate intelligence to oppose it.

I lean toward supporting Ukraine because Russia crossed the boarder first, just as I would support you if the state took your property. I haven't even met you, but this is how we win.

Do you not support your neighbor when they are attacked in their home? The problem is knowing whether they were attacked, and whether they were home, and whether it was their home. The pen isn't stronger than the sword, but it does control it.

JSON is just an encoding. For nostr it's necessary to produce this encoding in order to verify the signature, but if your medium is constrained, there's no reason you can't define a new encoding. Nostr timestamps are unix timestamps: the essential information in them is four bytes. For essential fields you can just declare an ordering: they need to be there, this is the order, this is their size etc. A receiver would then reconstruct the JSON object based on the format, and then be able to verify the signature.

Now you're getting it nostr:note1akgc3pg464dqfcwcxr6c7gxfre2nm7ddu7c59rvglxv7k8xdntvskrwu5u

Are you sending JSON or some custom packing? Do you need packet switching, or is open broadcast okay? A minimal, TLV based Kind 1 event could look like:

"Hello Nostr":

- 32B (pubkey) + 4B (timestamp) + 1B (kind) + 1B (content length) + 10B (content) + 64B (signature) = 112 bytes