I mean depends on what the threat model is. if it’s just casual private storage it’s prob fine
but without a sig even with a better key, you can’t trust the data came from you
right? or am I trippin
without a sig inside the wrap, you can’t prove you actually wrote the data. Anyone could spam fake “private” notes under your p-tag and you’d have no way to tell what’s real
Pretty sure it’s her
Keep your head up
Everything gets better over time 🫂
Thanks for your service
That’s pretty cool
Proud to be Catholic!
nostr:npub1xw7h0efeg5s8gla2uyu55jh4lfrlgppcjemrwkmdc7lgvhkcz3fqpvumsa

Well doesn’t mean dads with hair don’t make beautiful daughters too lol
When you connect to a relay you can essentially subscribe to different filters of data you want. So now the Damus relay allows you to request 200 different filters
Bald dads always make the best looking daughters
Anyone else realize?
Isn’t it crazy that Elon tricked the whole world into buying Twitter for the “sake of free speech”
When the actual reason he bought it is to use its data to train xAI
I haven’t shampooed my hair in a month
What pump?
I miss her 💜