I canāt believe itās been ten years since Daft Punk dropped Random Access Memories! Great album!
Ps>return ($silence -eq $violence)
$false
Not legally the same. One is an attack on a concept, the decentralized protocol, the other is on an asset owned by an individual (or org). The CFAA prohibits unauthorized access to an individualās or companyās computers or systems. Blockchain / protocol vulnerabilities can be exploited without the unauthorized access
I find that if you have little to no exposure to mainstream/social media, these cultural trends barely exist in real life. Everyone fit continues being fit. Same for unfit
Yes, when you āhackā someone elseās server you are performing āunauthorized accessā. Not so with a contract or protocol weakness that can be exploited by, say, submitting (malformed?) transactions to your own node, so you never did any unauthorized access. Thatās the difference
ICANN/Verisign Proposal Would Allow Any Government To Seize Domain Names
Use protobufs from grpc
Real Bitcoin/nostr devs can explain bech32 address encoding
Thatās what the human readable part (HRP) of a bech32 address is for!
Almost like the IRS new theyād need more agents to focus more on the earned income from us working stiffs
Apparently Satoshiās work of art is fine to dump on our storage without permission but U2ās work of art is not?!?!
Yeah that checks out
Iām trying to build a powershell client which might help. Focus right now is porting a reference bech32 library to powershell
This is why I proposed a āburn noticeā event to @nostr.build. Anyone with the private key for an npub should be able to issue a āburn noticeā event that includes a reason, say ākey_compromiseā or āmigrationā. If nostr / npub+nsec will be used for authentication, then key revocations must be made possible. In bring-your-own identity models, the user is the credential issuer (not a centralized identity provider) so the user (or private key holders) should be able to notify the nostr network (via the nostr signed event) that the key should not be used or treated with extra care. Nostr clients could warn appropriately for interactions with burnt nbups and websites using auth like described above could also handle appropriately.
With proper client handling decisions around burn notices, it could be made only attractive to the real user to issue a burn notice, and disadvantageous for an attacker with the private key to burn it intentionally.
For example, the burn notice event should include a hint to the new npub but clients should be careful about allowing interaction with new npub. NIP-05 verification could enable smooth transition to the new npub since control of the dns domain is demonstrated in addition to having the private key. Attackers would also need to gain control of the nip05 domain to abuse burn notices in their favor.
Also, npub / nostr authentication to websites should add TOTP codes (not passwords!) on top for mfa
š¶Tide is high but Iām hodling on
š¶thereās only gonna be twenty one
š¶million
š¶million
Right now itās adhoc āhey, hereās my new npub, everybodyā
For self-reporting key compromises and publishing what your new npub is
