Avatar
jared
b726e71bce585201181ace89326ae428406cee071395f9bf12b62b62d0449b23
Cybersecurity. Identity. Powershell. Class of 2013. Degree in Bending from Bending State.

Spell it however the f*ck you want, okay.

“Anyone who can only think of one way to spell a word obviously lacks imagination.” ― Mark Twain

WE don’t need to bring more suffering. The gov and the banks will do that.

WE need to have freedom tech as ready as possible to help with the suffering that will be brought by these predatory institutions.

Actually nostr supports event deletion via NIP-09.

Not many clients support it, though.

Login to #snort at https://snort.social to delete

https://github.com/nostr-protocol/nips/blob/master/09.md

Modern digital version of

“All one has is their word.”

I don’t like it just like I don’t really like umbrel. I never got my node synced before bitcoin core started hanging, so my rpi is powered off right now.

Maybe it is me because I’m a technologist, but I don’t think it is.

I love my AmpliFi home wifi mesh because it is truly an “appliance” that just works. I feel like umbrel and startos are trying to achieve a similar experiences but my results have been that they are too fiddly to be treated as such. Then, the “appliance” aspects (containerized and basic settings abstracted to web ui) instead become a barrier to solving any issues.

For this reason, I have concluded that a full Debian-based Linux distribution (probably just Debian 12) PC running bitcoin core will be the best foundation for my node needs.

No containers. VM’s possibly, for portability across whichever bare metal I want to use, but lately I am drawn to the simplicity of just running directly on the metal and managing packages/updates. You cannot really eliminate those tasks anyway if you want to maintain good security practices, so bare metal keeps it simple.

There are two kinds of people:

Those who understand money, and the poor.

Today, let’s learn about what an nsec really is, everyone.

“It’s my private key!” you are yelling at me as you read this.

Yes, and no. The nsec does contain the private key and should be protected as such. However it uses bech32, a type-length-value (TLV) encoding scheme (with checksum) which is also used to encode the Bitcoin wallet addresses that start with “bc1”.

If, like me, you like to look closely at nips, you will find that the bech32 encoded values (nsec, npub, etc) are for displaying to humans. Nostr apps use the raw bytes of the private key (decoded from the nsec) for cryptographic operations.

So, if you audit Will’s code, make sure you follow the handling of both nsec (encoded) and the private key raw bytes (decoded).

The over centralization of computing to a few cloud providers is anti-fragile and a major #cybersecurity problem:

https://podcasts.apple.com/us/podcast/risky-business/id216478078?i=1000623884104

I think the future will be localization of data back to owners but with cloud services connecting to it:

https://ubuntu.com/blog/cloud-adjacent-storage

I also think that #freedom tech (#btc, nostr, #simplex) commoditized in the form of nodes (like #umbrel and #startos) and other containerized workload hosts will be the model and/or fabric for a new hybrid of centralized, decentralized, and cloud/hosted computing that could actually simplify IT from the complexity of today’s approach.

Yes, POP3 (and IMAP4) only support password based authentication.

We need to, instead, be using constrained and origin-bound credentials, like with FIDO2 keys

SPL is inferior to KQL

Splunk query language, SPL, is a giant turd. To properly use use it you must know how Splunk works, so it’s shit as an abstraction layer.

With KQL it’s all in the query language. If you know it, you know it.

Keyboard mouse and monitor computing still has unique and fun experiences for learning #stem and forever-relevant skills.

I installed a #debian 12 (cinnamon) #linux box and helped the #kids get their first ever user accounts setup on it. They were so excited.

I showed the 11 year old girl how, in libreoffice draw, to insert a (heart) shape, fill it with color, and modify the edge line color/style and she’s off and running from there making signs and posters.

The 9 year old girl chose a cheetah picture as her desktop. She runs like one so that makes sense. She started with the simple games like mines and had a blast.

The 6 year old boy loves his spider man background image and firefox bookmark to fgteev… he wanted his password to be “the” 🤣 so I already had to put on my cybersecurity engineer hat to explain it needs to be longer and probably add his favorite number too.

The 3 year old boy is probably a bit too young still, so for now he’ll just keep winning gp’s in mario kart on 50cc