Avatar
dantzler
96c7efa4f4544b783a5726a461815749f0bce7f66b7e7a52174b551a6abd91b3
Biochemist interested in decentralization. Open to collaboration.

Thank you for the rec. Will try it out. I had been using station-specific apps like kexp or c89.5 but appreciate the opportunity to increase musical diversity!

Beautiful. Did not know the name - thank you. It is plentiful on vine maples and other trees around me. Looks like some buttercup & maybe trailing blackberry, too? Alder or hazelnut leaves?

found 48 proofs , but no ecash recovered. has me in a loop of 'going to the next interval', whatever that means. UX could use some work.

I get the message: "Good news is that already spent Ecash has been found. Continue with next recovery interval."

I've gone through 4-5 intervals, but they take a while. It does say that it is restoring from mint.minibits.cash The # of proofs found sometimes changes. It look like the intervals are ~ 50; I'm on 550-600, but don't have patience to keep at this much longer as I have not yet had coffee.

says keyset ID 00500550f0494146 (sat)

Running latest version of minibits on graphene.

good exercise - thank you. makes me think twice about the 9k sats I have under another seed.

I fell into that trap once...

Started with a 55 gallon tank then added a couple 100s and a 26 bow front. Then put a 20 gal at work on my desk. I did fantasize about a custom, large tank.

Then I bought my own house that required some fixin' and downsized eventually to zero.

I'll probably get another tank at some point because it was so peaceful to watch the fish. Maybe incorporate aquaculture into homestead for different reasons.

I raised various types of mostly south american cichlids because their behaviors were interesting and they had quite a lot of personality for fish. Always good entertainment when my cat pickles would dip her paw into the tank with a feisty 7" labiatus...

This sucks, I'm sorry to hear that.

which mint? It would be great to understand the failure mechanism. Bad mint or something else.

I still think cashu has a lot of promise, but there are tradeoffs. Love the idea of multinut.

Hope your weekend goes well.

If your device (e.g. phone) has internet access, you can 'teleport' to different geohash locations. Click the top bar on the right where it has the # symbol. The characters after that are your geohash. In the #location channels you can switch to widen your radius from (BT) 'mesh' to 'block', 'neighborhood', 'city', 'province' or 'region'. Or if you know a specific location geohash, you can enter that. No extra hardware required.

Thank you. I've had trouble with getting zaps working. Is there a good source of info you know of? I tried to link a phoenix wallet. Using amethyst, yakkihone, primal & sometimes jumble or ditto. I got set up early with nos2x, so I don't use alby.

Folks in my signal group report that lava moved their coins without their permission and they do not appear to be doing DLC verification anymore.

Here are a couple takes from X that can provide more insight:

https://x.com/_arshbot/status/1986156462519832921

https://x.com/bonomat/status/1986308591796822041

Personally, I would avoid them like the plague, but I'm pretty conservative & boring.

I'm not a virologist, but I have studied viruses and used them to study other things, hijacked their function, etc.

At one job we were studying a challenging membrane protein - a calcium transporter called orai1. This protein is made of 6 subunits that arrange themselves in a hexagon embedded in the cell membrane, with a central Ca++ pore. We were trying to make antibodies against it, but it is incredibly challenging to try to solubilize a membrane protein with higher order structure in a way that preserves how it looks in nature.

A colleague in Denmark had a plasmid from grad school containing the gag/pol gene from a murine leukemia virus. The proteins coded for in this gene are necessary and sufficient to produce viral particles that bud off from the cell membrane of a transfected cell. We used HEK293 cells that were already overexpressing Orai1 and I purified the virus-like particles using an ultracentrifuge. These VLPs were decorated on the surface with intact Orai1 and we were able to use them to get spectacular antibodies made.

At another job I worked with the AAV virus. We hijacked this one such that we could replace most of its tiny genome with e.g. a piece of DNA that coded for an ADAR guide RNA. The guides were designed to bind to a defective mRNA and could effectively change an 'A' to a 'G' in that mRNA. In the case of e.g. certain types of muscular dystrophy, changing the 'A' in a premature stop codon to a 'G' resulted in full length dystrophin being made and the potential for a kid with that genetic disease to live a more normal life.

I did analytics on these vector preps that involved using ultracentrifugation to separate empty capsids (most of them) from full capsids that contained our DNA payload. We ran a fairly cutting edge mass spec technique that is able to literally weigh each capsid to observe the fraction with payloads vs. empty, and also even partial (smaller) payloads. We could also study the mass distribution of the capsids themselves since they are made up of 3 proteins all of slightly different masses and the 60 subunit icosahedrons assemble stochastically and therefore the viral particles have different ratios of the 3 structural proteins - hence you get a distribution of empty capsid masses.

My colleagues put these preps on cells and were able to measure mRNA editing in the cells using next generation sequencing.

So here, from a bunch of biophysical first principles, I was able to see evidence of viral structure and function as defined as being able to get into a cell and interact with the cellular machinery.

Be careful of people who tell you viruses don't exist. Sometimes in an information war, adversaries will plant ideas that are picked up and espoused by people who are otherwise sharing uncomfortable truths, in order to discredit them and lower the impact and reach of their message.

If anyone seeing this is in Lewis county, WA (or nearby) please reach out so we can collaborate on this idea. I'm working on gardening and weakest there, but very interested in creating a circular economy. By weak, I still have a big garden and orchard and partner who has a degree in horticulture. I have grand aspirations.

2nd used laptop. An old thinkpad with a 2TB SSD would be future proof for a while.

nostr:nprofile1qy28wumn8ghj7ctvvahjuat50phjummwv5hsz9nhwden5te0v4jx2m3wdehhxarj9ekxzmny9uqzqcufhejfreakj05lx68vaz8u69zlqlqx35kphwhyy3aekhh588fj635pzk suggested following you. I'm also interested in Ag and working on a piece of land in Western, WA. This weekend we picked pears, plums, zucchini, squash, tomatoes & black+blue berries. I also fired up the chipper for the first time and made a yard or so of doug fir & alder chips.

Ignore the haters. You are doing something valuable - thank you!

You are following your passion. Other people's reactions are more a reflection on them. Focus on what gives you inspiration and strength.

LOL, I get left channel only on a Linux workstation with a hard wired Juli@ sound card.

Replying to Avatar hodlbod

Nostr was mentioned on my favorite cryptography podcast today, Security, Cryptography, Whatever — they didn't spend a lot of time on it, but here are some highlights:

> It’s federated and it’s European. I bet it sucks.

> It’s some Ayahuasca inspired initiative from. From Messrs. Dorsey et al.

> Yeah, sure, it’s decentralized and federated, but like their proposal for encrypted end to end encrypted DMs was just bad by itself.

> When I reviewed this, my description of this was it looks almost exactly like Nebuchadnezzar [https://nebuchadnezzar-megolm.github.io/], which is like a fractal of things that could have gone wrong with like a complete ecosystem of like a secure messaging system. They found flaws in almost every component of that system and then tried to leverage them as far as they could.

You can read/listen here: https://securitycryptographywhatever.com/2025/07/29/vegas-baby/

They also mentioned a talk that's going to be delivered at blackhat on August 9th which sounds super interesting:

> In this session, we unveil the first comprehensive security study of Nostr and its popular client applications, demonstrating how subtle flaws in cryptographic design, event verification, and link previews allow an attacker to forge "encrypted" direct messages (DMs), impersonate user profiles, and even leak the confidential message from "encrypted" DMs.

Here's the link to the agenda entry for the talk: https://www.blackhat.com/us-25/briefings/schedule/#not-sealed-practical-attacks-on-nostr-a-decentralized-censorship-resistant-protocol-45726

I'm looking forward to learning how we've screwed up — there aren't a lot of cryptographers here, and I know that open protocols make security even harder to maintain. Maybe we've screwed up irretrievably, but I'd rather know now than later.

The Black Hat slide deck is pretty interesting for nostr nerds considering potential vulnerabilities in the nostr ecosystem. This relates back to a recent note by nostr:nprofile1qy2hwumn8ghj7mn0wd68yetvd96x2uewdaexwqg4waehxw309aex2mrp0yhx6mmnw3ezuur4vgqzqcgxv5zxzlh8jwrsy8scez0m08gam0p700l3nneznr6qgehcw90f7j2y2j on the importance of building for a hostile state environment.

From Black Hat:

"Nostr is an emerging open-source, decentralized social networking protocol with over 1.1 million users—and a critical blind spot in its security design. While decentralized architectures promise resilience and user control, rigorous real-world security analyses remain uncommon in this space. In this session, we unveil the first comprehensive security study of Nostr and its popular client applications, demonstrating how subtle flaws in cryptographic design, event verification, and link previews allow an attacker to forge "encrypted" direct messages (DMs), impersonate user profiles, and even leak the confidential message from "encrypted" DMs.

We also show how a lack of signature checks in many clients—whether due to outright skipped verification or a TOCTOU caching flaw—enables effortless data tampering. Even a single oversight can escalate from simple forgery to full-blown confidentiality breaches.

Far from theoretical, our proof-of-concept attacks target widely used clients—one with over 100,000 downloads—and systematically bypass the platform's intended privacy and authentication controls. We'll share how you can replicate these exploits with minimal setup, explain how loosely defined specifications in a decentralized protocol can introduce critical weaknesses, and outline both immediate mitigation steps and best practices for cryptographically sound design. By revealing these cracks in a widely touted "censorship-resistant" system, we aim to jumpstart a more rigorous approach to securing decentralized social platforms—before attackers go mainstream with the vulnerabilities we've uncovered.

"

nostr:nevent1qvzqqqqqqypzp978pfzrv6n9xhq5tvenl9e74pklmskh4xw6vxxyp3j8qkke3cezqqstsqsf0emqkes02vxql4p9chgaxxa08te9pkm64dspqadc44ejsfcqg0lu2

GM

I grew up in the South. Back then I was more into wandering around the forests & coastal areas.

Our farm is coming along. Spent time this past weekend cleaning up an old burn pile and taking the stuff that should not have been in there to the dump. We scraped together funds to get a decent, used PTO powered chipper/shredder to deal with the overabundant course, woody debris. Tons of doug fir branches from limbing up trees, alder saplings that were trying to grow up through the fence and selected areas of the forest floor that we would like to open up, just to start.

We picked up 10 pounds of grass fed ground beef from a neighbor only 1/2 mile down the road. I saw our resident owl again and the garter snakes and northern alligator lizards started using the rock pile I made for them in a spot that gets morning sun.