https://unit42.paloaltonetworks.com/cloaked-ursa-phishing/ nostr:note1w9caw69px6dfu2gz0ggj57a2mc756efz84pvzzwqe59scwg2n0pqh8jqd8
https://github.com/colealbon/git-nostr nostr:note14wnvce0a9z9802vmxcpl49ksuan3m45d77ekpaeufzuqzgq7cu9q4pf9tj
The problem of spam!
This tool has potential.. It will change the game & make it easier for developers!
Practically in self-contradiction.. Twinning of false documentation & a bad apprehension of decentralization..
We can only appreciate the Nostr protocol after testing it: 'Run 2 or 3 clients for a systemic evaluation & develop or build a project with Nostr tools or dev-kit'..
Doubt doesn’t kill! To believe it, you have to doubt it! It took time to properly understand the Internet.
A modern analysis… 🧐
http://git.jb55.com/git-nostr-tools/file/README.txt.html nostr:note14hyajmf8ps3ye44uwhngg4mev57fgan89av455a4wfeafsshcyrqntt4du
The GitHub killer…
You can spoof e-mail address but you can’t spoof a 'nsec' on Nostr! And this could replace e-mail communications in offices..
Make some chat client application built on Nostr & no worries about getting a fake message from outsider!
Just click to alert that access denied: 'Don’t have the good signature'! nostr:note1akmlmnhjc6u98vlsc580cf088e725audqnsxuqn2s6ryh5p4n0assw6ju8
'Flattening Karatsuba’s recursion tree into a single summation' by Thomas Baruchel
Complexity of Computation by Karatsuba
"Bitcoins the hard way: Using the raw Bitcoin protocol" by Ken Shirriff's.
http://www.righto.com/2014/02/bitcoins-hard-way-using-raw-bitcoin.html
Andrej Karpathy: 'A from-scratch tour of Bitcoin in Python'
Vulnerability in Implementations of SHA-3, SHAKE, EdDSA, & Other NIST-Approved Algorithms Topic…
Bitcoin is a ‘structured data logging system’. They’re therefore structured as financial transactions, in their own right with coin amounts & programmatic constraints on tx validity (usually ECDSA signatures).
The increase in the basic block ceiling will remain an emergency & therefore carried as an argument in favor of monetary crypto-competition..
Lightning will reroute around censorship & control.. 
Large-scale Chinese cyber operations & cyberattacks studied by the British Parliament’s Intelligence Committee. The most interesting details of this report are unfortunately stifled...
https://isc.independent.gov.uk/wp-content/uploads/2023/07/ISC-China.pdf
https://ia800808.us.archive.org/16/items/MasteringBitcoin2nd/Mastering%20Bitcoin%202nd%20.pdf nostr:note1j6dcaa7gqzxg7ah4xutdd2wk87m9ejmxya9n9kg3ngf7gef90fdqjdmt0f
How clients can fix spam and child porn on Nostr tomorrow with a very small tweak: http://fiatjaf.com/3f106d31.html
The path of Nostr Market to replace a Darknet market maintained by potential merchants is direct & without detours whether on Damus or other clients.