Avatar
Mr_IceSlice
a080ba3fbd1e2438efc276ae95a5d0b02b4755825d54b4aed80181112a43169a
Husband, father of two. Son of The King 👑🔥⚡ Creator of FOSSit.us Self-sovereignty enthusiast
Replying to Avatar PABLOF7z

Introducing EXIT

You broke up with your ex; it wasn’t treating you well, maybe it was shadow banning you or your friends; it was manipulating you into becoming your worst possible self.

But over the years you accrued a bunch of quality shitposts, and perhaps some nuggets of wisdom.

Introducing: https://exit.pub:

The last bridge you’ll need to port over your data into the new world of decentralized freedom-tech.

1. Download your twitter archive

2. If Elon agrees, you’ll get a zip file; uncompress it and just use exit.pub to import your data into nostr

✅ original dates are used; whatever you posted in 2009 will show up as posted in nostr in 2009

✅ granular control of which tweets to import (threads, non-replies, replies)

✅ V4V, you choose how much your shitposts are worth

✅ it *should* preserve embedded images

✅ granular control of which relays you want to publish to

Try it out:

https://exit.pub

Yes, because even if the file is decrypted, there should be extra seed words to add more entropy(?). This is why I said about there being a small seed phrase needed to select the proper seed phrase. Even without adding extra words, there is [12!] or [24!] possible combinations, and thus numbering the seed words is also important data. In reality, you're storing a two dimensional array. One column is the seed number, and the other is the seed words. Each row has a seed word and the number the corresponds to it's order in the sequence.

TL;DR encrypted padding data to hide the real data is good. 👍

I see. Then if this is an intermediary backup, so that in the case of other backups being compromised, one could sweep their own wallet to a new wallet, it makes sense. If plates became illegal, and I need to flee, I've thought about getting a tattoo on my inner thigh with in invisible ink. But comparing the two, stenographic encryption would be a faster, cheaper alternative. What if you had some type of derivation path seed that was 4 or 6 words long, and was required to decrypt the correct information (seed) and not junk/padding data (other BIP39 words) to mislead an attacker attempting to brute-force extract all stenographically stored data?