Avatar
Meridian
d14aba73544c33264a54cdf4c9355f957e76b1e10c21f8b6d522f308c635a8eb
. -..- .--. .-.. --- .-. .. -. --. / -. --- ... - .-. / .-... / --- - .... . .-. / . -- . .-. --. . -. - / - . -.-. .... -. --- .-.. --- --. .. . ...

I think his justification for the framing was that he was pitching it to his superiors, and as far as he was concerned, being military folk, they saw the world through a very particular lense... i.e. that of power, subjugation, and control...

For the same reasons that they take pains to stand up a functional navy, even during times of peace, he contends that they will need to apply the same rationale, within the emerging landscape of cyberspace...

I don't doubt that you could make an equally compelling case, in terms of framing Bitcoin as a vehicle for world peace, however I believe his contention was that had he taken that approach, his superiors would likely have dismissed him... and ultimately, his objective was to encourage them to partake of the orange pill...

when i first listened to his thesis, the way it took shape in my mind, was something along the lines of....

the more the world aligns with the concept of bitcoin, the more influence or potential each satoshi will represent. therefore, those who hold the most satoshis will command the most power / influence / control in the world.

from a national security type persepctive, the threat or attack vector would be the potential of your adversary to hold more satoshis than you, thus weilding more power / influence / control over you.

it's a decidedly militaristic framing.... but personally I don't think it's necessarily a total departure from the realities of life on planet earth...

is it possible to set Primal as the default Lightning ⚡ payment wallet on Android?

When browsing in Firefox and tapping to pay a Lightning invoice, the users phone is suggesting Bluewallet or eNuts as options, but no sign of Primal.

#asknostr #primal #android nostr:npub16c0nh3dnadzqpm76uctf5hqhe2lny344zsmpm6feee9p5rdxaa9q586nvr

you and i were cut from a similar cloth dude.

reminds me of puttin sugar on my cornflakes.... 4 spoonfuls on the bottom, 1 up top. 👀 nothing to see here.....

did you ever get your hands on any of this gear?

I did 4 years in a methadone program, trying tae come aff it....

are there any Python libraries that have integrated support for NIP-47 ?

#nostrdev

100%. However even at that, the oversight can still feel like a drag on the overall pace of development.

I want to learn to love them, but the struggle is real

do you enjoy writing unit tests? if so, what's your secret?

#asknostr

is it open source? or any way to verify the integrity of the build?

is this addressing anything other than potentially weak randomness, on the part of a single vendor?

if not, why not save cost, use open-source, and verify entropy/randomness? ... failing that, roll dice... ?

a mediocre analogy would be using a PO Box.

if you published your home address online, in the open (P2PK), and I wanted to break into your property, and steal your stuff, I can just look at your address, and I immediately know where to go, to start my intrusion. (I still actually need to do the work of breaking in...)

In constrast, P2PKH would be like using a PO Box, instead of your actual home address.

I could travel to your PO Box, but even when I get there, I still have a tonne of work to do, to figure out your actual home address. All of that needs to be done, before I can even begin the work of breaking in....

I could be wrong... but.. I think a private key is derived from the public key. therefore, if the public key is known, as is the case in P2PK, when you have a straight forward attack vector to brute force the private key.

in the case of P2PKH, the private key remains hidden, as the funds are sent to a hash of the pubkey, instead.

this extra layer of obfuscation means you first have to work out the pubkey, before you can set about brute forcing the private key...