Avatar
pinkyjay
b0dbac368a5ac474bc19ab11a0b3fd4260cf56b40c60944c4a331b8ad8ced926

Backaction sounds like chain reorg šŸ¤”

Boomer memes are great because they end with ā€˜share with all your friends’

Tik tok’s home page - the next video 🤣

Tick…

Tock…

Tick…

Tock…

šŸ•°ļø

Looking at getting a handgun but I feel super biased against CZ for some reason and haven’t even tried one yet 🤷

A little ā›µļøfor the nostr sea

ā€œWhy is Congress saying one thing and doing nothing?ā€

ā€œWell, traditional mostlyā€ šŸ¤£šŸ’€šŸ˜‚

Replying to Avatar Evan

So… mine…

Mine bitcoin

šŸ‘ good idea!

GM ya bunch of liars šŸ¤™ pv GFY

Never knew how much that magic money meant to me šŸ‘€

Drafts would be nice in damus

That’s fine and doesn’t change how a diverse set of applications could leverage the ability to sign/validate data and share the data cross-platform without the need to have users revalidate their work in each system.

Sure, that’s literally the start point for corporations to be able to validate documents cross-platforms without having to re-validate things like invoice signatures. Sure, the whole network would recognize it, but companies would then find social controls to try to keep that under lock - that part hasn’t changed, indeed. But it helps ensure DBAs didn’t mess with the data in the meantime.

Sounds like people are saying it’s not possible to design a relay that doesn’t allow for indiscriminate reads but that sounds like major cap🧢

So i can connect to a relay that I don’t know about and pull notes and there’s nothing anyone can do about it 🧐 sounds sus.

Even relays you don’t know about? Is there not a way to prevent reads from relays?

Everything? Except for those behind paid relays šŸ¤” sounds like there are control features that can make them slightly less public

Ok, secured/private, choose your semantics. It’s less around the ability to, just like anyone could photocopy an invoice, but there are social and digital controls around ā€˜shoulds’ that are created per group collaborative processes. So, within the ā€˜secured’, the same question applies and the point of being able to send info between ā€˜secure’ locations is the point of being able to validate across ā€˜secure’ environments. So the question stands, regardless of your word choice.