It's likely to crumble to a pancake on impact
But other than that, I agree that self-custodial Lightning will not solve Bitcoin scaling.
You want bigger blocks indirectly through DC, even though it solves nothing
Dude, even bcash block size is not enough. Go join CSW if you want terabyte blocks. Ridiculous.
It makes that calculation given assumptions that existed back then. So it doesn't consider splicing, channel factories, or CISA, nor any other future changes that address scaling.
This is like the BSVers who think that Bitcoin changes ended when Satoshi wrote the whitepaper
That's a feature
“No one is immune from such attacks," said Belyaiev. "In theory, a specialist with my level of expertise could plan and execute an operation to liquidate the first persons of any European state ... Pandora's box is open.”
“It is almost impossible to shoot it down," he said. "Only a net can help. And I predict that soon we will have to put up such nets above our cities, or at least government buildings, all over Europe.”
https://www.politico.eu/article/future-warfare-400-army-strike-drone-unit-2m-tank/
"in theory" is the operative phrase here. You'd think both Putin and Zelenskyy would both have been off'ed already, if it was that easy?
nostr:npub19pj6f0nc9q6xr26qe3g8m6xe3hwe0d6p6zcvf57cm3kayghjdj0slnlenu and I are looking for a funny movie to watch tonight. Hit me with your best, single recommendation. Bonus if it's Halloween-themed. Will zap. ⚡
Fear and Loathing in Las Vegas
Not anymore. Super reasonable now
Nostr is pseudonymous without any barrier to entry. Twitter has failed to control bots, despite substantial effort.
How will Nostr handle bots, once they come, other than clients simply blocking anyone they're not following?
This is nothing I've spent even 2 minutes thinking about, but could you combine the Bloom filter with a Cuckoo filter and get better (perfect?) accuracy?
What about the jaded freedom minded?
Let's hope that's not the nuclear codes pattern 🤦🏼♂️
Maybe I don't know enough. I'm thinking that a system certificate ensures system integrity and modification should not, for obvious reasons, be possible. It would seem that my understanding is, at least, incomplete, but can you elaborate?
