Avatar
Max
b7ed68b062de6b4a12e51fd5285c1e1e0ed0e5128cda93ab11b4150b55ed32fc
Praxeologist ~ Cryptoanarchist ~ Cypherpunk

Anonymous markets don’t require moral decay, they require accountability. When identity is optional, the only thing that matters is whether you honor your word. Trust becomes a skill, not a privilege.

Each group can define its own set of relays.

Hopefully your phone has a secure passphrase to encrypt the disk.

Coercion dies where anonymity thrives.

When everyone can hide, power shifts to those who create rather than those who command.

This is the standard to rule them all!

And there's already progress to make many clients compatible with nostr MLS.

iOS is coming soon, testflight in review at the moment.

https://testflight.apple.com/join/c6Z7PpxC

Desktop clients will take a couple more months, focus is on mobile first.

build build build build build build build

The networks we build today are the fortresses of tomorrow’s freedom.

The internet’s early idealism wasn’t naive, it was premature. Now, with tools to protect privacy and enable trust without third parties, the dream of a self-governed digital society is no longer theoretical. It’s operational.

They're good for some apps that don't require deep native support.

Cryptography doesn’t just protect secrets; it protects agency. When you control who sees your data, you control who controls your life.

The state will call it a weapon, a threat, a tool of criminals. But cryptography is simply the equalizer, the lever that shifts power from rulers to the ruled.

Replying to Avatar Avi Burra

Let it be known that I almost died at the hands of nostr:nprofile1qqst0mtgkp3du662ztj3l4fgts0purksu5fgek5n4vgmg9gt2hkn9lqpzamhxue69uhkummnw3ezuct60fsk6mewdejhgtcpzamhxue69uhhyetvv9ujumn0wd68ytnzv9hxgtcecu9tp today😂

I was driving on I-86 at 75mph and was listening to his narration of A Lodging of Wayfaring Men and almost fell asleep at the wheel because of his beautiful, soothing voice

I was able to shake myself out of it at the very last second, pull over onto the shoulder and switch to heavy metal before resuming my ride

Glad you didn't die!

Social Security disincentivizes work. Disabled or elderly recipients lose benefits if they re-enter the workforce, trapping them in dependency.

Government “reforms” compound problems. Their programs expand welfare without addressing root causes of poverty.

Postal service inefficiencies stem from monopoly. Private companies could deliver mail cheaper and faster, but state control blocks competition and innovation.

I bugged them a bit about it, so far no success, we need more purple pills in the comments.

These are best barefoots I found so far, still looking for great ones with leather soles...

wildling.shoes/en

~ 50% of UTXOs are below 1000 sats.

Such a successful spam attack.

Thorough report on quantum computers and how to approach it in Bitcoin.

https://delvingbitcoin.org/t/bitcoin-and-quantum-computing/1730

Here a summary:

1. CRQC Timeline Assessment Experts believe that CRQCs capable of breaking Bitcoin’s ECC foundations could first emerge between 2030-2035, aligning with government directives to deprecate vulnerable cryptography by 2030 and disallow it by 2035. This projected timeline provides a crucial window for preparation, given the unpredictable nature of technological breakthroughs, it is essential to account for both the expected trajectory and the possibility of a significantly accelerated timeline.

2. Scope of Vulnerable Funds Approximately 20-50% of all Bitcoin in circulation (4-10 million BTC) is potentially vulnerable to CRQC attacks. Long-range attacks target inherently vulnerable script types (P2PK, P2MS, P2TR) and addresses with previously exposed public keys (via address reuse), allowing attackers unbounded time to derive private keys from public information already available on the blockchain. Short-range attacks, which affect all Bitcoin script types, exploit the vulnerability window between transaction broadcast and confirmation (or shortly thereafter) when public keys are temporarily exposed, requiring attackers to act within a timeframe of minutes to hours. Address re-use by exchanges and institutions has created a concentration of vulnerable coins in a small number of addresses - high-value targets that would likely be prioritized by quantum attackers. These holdings, however, represent a manageable quantum vulnerability, as owners retain the ability to transfer these funds to quantum-resistant script types when necessary, or can cease the practice of address reuse. This is in contrast to Satoshi-era and inaccessible quantum-vulnerable coins, which are permanently exposed to quantum attack as they cannot be moved by their owners to quantum-resistant script types.

3. Immediate Protective Measures High-value Bitcoin holdings represent the most attractive targets for quantum attackers, particularly those of exchanges and institutions where address reuse practices have exposed public keys. While this creates a concentration of easily identifiable, valuable targets, the risk remains manageable through proactive measures. Since owners retain control of the private keys, vulnerable funds can be immediately migrated to somewhat quantum-resistant address types (P2PKH, P2SH, P2WPKH, or P2WSH). Simultaneously eliminating address reuse practices will prevent future exposure to long-range quantum attacks.

4. Considerations for Bitcoin Mining The quantum threat to Bitcoin mining via Grover’s algorithm appears limited by physical and economic constraints. Quantum miners would face disadvantages including longer computation times, limited parallelization benefits, and substantially higher capital costs. Research indicates that quantum mining would remain economically impractical even with significant advances in quantum hardware, as the theoretical speedup from Grover’s algorithm is insufficient to overcome the efficiency gap and lack of parallelization compared to specialized classical ASICs. This suggests mining security may prove significantly more resilient to quantum advances than transaction signature security. If quantum mining does become viable, however, there’s the potential for correlated fork events if quantum miners adopt aggressive mining strategies, which could lead to attackers with less than half of the network’s hash rate being in a position to execute 51% attacks. And if quantum mining becomes the dominant means of mining on the network, the quantum superlinearity problem could drive extreme centralization, concentrating mining power among just a few operators.

5. Burn vs. Steal Dilemma Perhaps the most significant challenge is not technical but philosophical: whether to “burn” vulnerable coins or leave them susceptible to being “stolen” by entities with CRQCs. This decision touches on Bitcoin’s fundamental principles regarding property rights, censorship resistance, and immutability. The economic impact of either choice is substantial, with the potential for significant wealth redistribution or effective supply reduction. This is a polarizing issue, with strong opinions held by many on each side of the argument.

6. Migration Pathways The Bitcoin ecosystem’s transition to quantum-resistant scripts faces significant technical and coordination challenges. Proposed migration mechanisms include the conservative commit-delay-reveal protocol that allows users to securely move their funds from nonquantum-resistant outputs to those adhering to a quantum-resistant signature scheme, the more assertive QRAMP protocol that would enforce migration deadlines after which vulnerable UTXOs become unspendable, and the hourglass strategy, which rate-limits vulnerable UTXO spending. Successful migration necessitates unprecedented collective action by all ecosystem 45participants - individual users, institutions, exchanges, and miners - with extensive preparation including education campaigns, migration tools, and regulatory engagement and compliance. The complexity of this transition demands establishing a shared vision and clear communication channels well before quantum threats materialize, as even the best technical solution will fail without effective cooperation among Bitcoin’s diverse stakeholders.

7. Strategy for Action We propose that Bitcoin’s quantum resistance strategy for action adopts a dual-track approach: contingency measures delivering minimal but functional protection against CRQCs completed in ~2 years, and a comprehensive path allowing thorough exploration of the problem space and the development of a full-featured approach to take ~7 years. This dualtrack strategy balances immediate security needs with rigorous research and development of optimal quantum-resistant solutions, ensuring Bitcoin can respond appropriately regardless of how CRQC capabilities evolve.

8. Ongoing Efforts & Future Directions Several technical approaches have emerged to address the potential for a CRQC to derive private keys and forge signatures. Each approach is of varying maturity, and there’s currently no consensus on which direction to take. All current approaches also propose using PQC schemes that have combined public key and signature sizes that are many times larger than the combined size of existing ECC-based public keys and signatures. Given the strong focus on post-quantum cryptography within the broader cryptographic community, continued advancements are likely over time, offering the potential for more refined solutions as the f ield progresses. Several leading cryptographers and Bitcoin developers who have contributed significantly to Bitcoin have begun working on quantum readiness strategies, joined by a number of new and enthusiastic contributors. While there’s a vast solution space to explore, and the path forward remains uncertain, the community’s ongoing efforts as outlined in this report should inspire confidence that Bitcoin will adapt to the post-quantum landscape in time. These efforts aim not only to meet projected timelines, but also to ensure readiness in the event of a sudden and significant leap in quantum computing capabilities.