Avatar
Komi_Hartman
81d38469313088cce52b8a860711c21e7408860286bb3834a4d74fab717cde2e
“A specter is haunting the modern world, the specter of crypto anarchy.”

https://unit42.paloaltonetworks.com/cloaked-ursa-phishing/ nostr:note1w9caw69px6dfu2gz0ggj57a2mc756efz84pvzzwqe59scwg2n0pqh8jqd8

https://github.com/colealbon/git-nostr nostr:note14wnvce0a9z9802vmxcpl49ksuan3m45d77ekpaeufzuqzgq7cu9q4pf9tj

This tool has potential.. It will change the game & make it easier for developers!

https://youtu.be/TdwCAZMehjU

Practically in self-contradiction.. Twinning of false documentation & a bad apprehension of decentralization..

We can only appreciate the Nostr protocol after testing it: 'Run 2 or 3 clients for a systemic evaluation & develop or build a project with Nostr tools or dev-kit'..

Doubt doesn’t kill! To believe it, you have to doubt it! It took time to properly understand the Internet.

http://git.jb55.com/git-nostr-tools/file/README.txt.html nostr:note14hyajmf8ps3ye44uwhngg4mev57fgan89av455a4wfeafsshcyrqntt4du

You can spoof e-mail address but you can’t spoof a 'nsec' on Nostr! And this could replace e-mail communications in offices..

Make some chat client application built on Nostr & no worries about getting a fake message from outsider!

Just click to alert that access denied: 'Don’t have the good signature'! nostr:note1akmlmnhjc6u98vlsc580cf088e725audqnsxuqn2s6ryh5p4n0assw6ju8

'Flattening Karatsuba’s recursion tree into a single summation' by Thomas Baruchel

https://arxiv.org/pdf/1902.08982.pdf

"Bitcoins the hard way: Using the raw Bitcoin protocol" by Ken Shirriff's.

http://www.righto.com/2014/02/bitcoins-hard-way-using-raw-bitcoin.html

Andrej Karpathy: 'A from-scratch tour of Bitcoin in Python'

http://karpathy.github.io/2021/06/21/blockchain/

Vulnerability in Implementations of SHA-3, SHAKE, EdDSA, & Other NIST-Approved Algorithms Topic…

https://youtu.be/KpKGvrudwuM

Bitcoin is a ‘structured data logging system’. They’re therefore structured as financial transactions, in their own right with coin amounts & programmatic constraints on tx validity (usually ECDSA signatures).

The increase in the basic block ceiling will remain an emergency & therefore carried as an argument in favor of monetary crypto-competition..

Lightning will reroute around censorship & control..

Large-scale Chinese cyber operations & cyberattacks studied by the British Parliament’s Intelligence Committee. The most interesting details of this report are unfortunately stifled...

https://isc.independent.gov.uk/wp-content/uploads/2023/07/ISC-China.pdf

The path of Nostr Market to replace a Darknet market maintained by potential merchants is direct & without detours whether on Damus or other clients.