I don't see channel settings anywhere.
it's now the NostrMash
(The NostrMash) and it's a graveyard smash
(It's now the Mash) it's caught on in a flash
(It's now the Mash) it's now the NostrMash
It worked!
However Max Retransmission Reached 😢
I need more nodes near me or a better antenna i guess
Bribe ineffective, i was already looking for people to follow <3
⚡
It's always nice catching nostr:nprofile1qy88wumn8ghj7mn0wvhxcmmv9uq3samnwvaz7tmwdaehgu3wwdjk66tndakzuer9wchsqgxn7pkcxr3njfl5ytuaqrz3szm2qu0cuqj9w0z644w950chlafacvxvdypw in the meatspace.
These are some powerful spring onions!

5+ words is generally better than 4, but it's not all about length; it's also about entropy, complexity, and not using common words that are used in Dictionary Attacks.
Truly random, high-entropy passphrases are a valid option to unlock your password manager, as they can easily be remembered if you create a mnemonic like an absurd story using the random words as a recall technique. They can also be valid for full-disk encryption on your laptop, or as a passphrase for an encryption key like PGP or SSH, etc. It is best practice to not reuse passphrases.
I recommend using KeePassXC to generate this high-entropy passphrase for most people, or if you follow the instructions to the letter, this is a very good offline method:
However, I highly recommend using high-entropy random passwords that include:
• Length (in characters)
• Use of uppercase and lowercase letters
• Use of numeric characters
• Use of special symbols
...for pretty much everything else.
Here is some good info on passphrases vs passwords:
"If you compare a passphrase to a truly random password, the password is the better, more secure option."
https://proton.me/blog/what-is-passphrase
Here is some more good info on password entropy, including the math used to calculate it:
https://proton.me/blog/what-is-password-entropy
While ProtonPass/Bitwarden will tell you if a password/passphrase is strong, KeePassXC shows you the entropy of your passwords in bits—both internally generated, or by pasting your current password into the password generator. I suggest using it as an easy way to check your exact password entropy.
You want an entropy score of at least 75 bits (72 is reasonably easy to crack).
I like the idea of throwing a few emojis into the mix
More technical detail here: https://www.leviathansecurity.com/blog/tunnelvision
Another reminder to be careful where you run your networks from...
even if you're using a VPN!
Read about how an attacker on the same network (perhaps in the local coffee shop) could manipulate routing tables to leak data intended for your VPN.
Airalo has been good to me in the past
Interested in offensive and defensive cyber security?
Check out this list of hackers and security professionals steaming on twitch: https://infosecstreams.com/
