"Nostr is on FIRE 🔥🔥🔥" nest is live! Come join 🤗 https://nostrnests.com/naddr1qqjrjcfsxsenzd3s956xzdmz956rydp594snvdn9956kvetxv3jkydp5xc6kgqgwwaehxw309ahx7uewd3hkctczyqlhwrt96wnkf2w9edgr4cfruchvwkv26q6asdhz4qg08pm6w3djgqcyqqq8vecztyyq6

I think his justification for the framing was that he was pitching it to his superiors, and as far as he was concerned, being military folk, they saw the world through a very particular lense... i.e. that of power, subjugation, and control...
For the same reasons that they take pains to stand up a functional navy, even during times of peace, he contends that they will need to apply the same rationale, within the emerging landscape of cyberspace...
I don't doubt that you could make an equally compelling case, in terms of framing Bitcoin as a vehicle for world peace, however I believe his contention was that had he taken that approach, his superiors would likely have dismissed him... and ultimately, his objective was to encourage them to partake of the orange pill...
when i first listened to his thesis, the way it took shape in my mind, was something along the lines of....
the more the world aligns with the concept of bitcoin, the more influence or potential each satoshi will represent. therefore, those who hold the most satoshis will command the most power / influence / control in the world.
from a national security type persepctive, the threat or attack vector would be the potential of your adversary to hold more satoshis than you, thus weilding more power / influence / control over you.
it's a decidedly militaristic framing.... but personally I don't think it's necessarily a total departure from the realities of life on planet earth...
is it possible to set Primal as the default Lightning ⚡ payment wallet on Android?
When browsing in Firefox and tapping to pay a Lightning invoice, the users phone is suggesting Bluewallet or eNuts as options, but no sign of Primal.
#asknostr #primal #android nostr:npub16c0nh3dnadzqpm76uctf5hqhe2lny344zsmpm6feee9p5rdxaa9q586nvr
you and i were cut from a similar cloth dude.
reminds me of puttin sugar on my cornflakes.... 4 spoonfuls on the bottom, 1 up top. 👀 nothing to see here.....
did you ever get your hands on any of this gear?
I did 4 years in a methadone program, trying tae come aff it....


are there any Python libraries that have integrated support for NIP-47 ?
#nostrdev
100%. However even at that, the oversight can still feel like a drag on the overall pace of development.
I want to learn to love them, but the struggle is real
do you enjoy writing unit tests? if so, what's your secret?
#asknostr
is it open source? or any way to verify the integrity of the build?
is this addressing anything other than potentially weak randomness, on the part of a single vendor?
if not, why not save cost, use open-source, and verify entropy/randomness? ... failing that, roll dice... ?
Where's Waldo - eCash edition:

#ecash #cashu #minibits
nostr:npub1dx5q2el8nd4eh3eg9t2e25fd7zuqg7zxz6ldkc3uzgh66ss2yc6st288sj nostr:npub1kvaln6tm0re4d99q9e4ma788wpvnw0jzkz595cljtfgwhldd75xsj9tkzv
still a few sats ⚡ up for grabs ... find & scan, while you can!
nostr:note1aw6d7ykc47we4w4z66yre2y57rt5xfupn72hwuzq88vr4u3fttasrn2rxk
So bullish on Keet App built on Holepunch https://keet.io
Thanks to nostr:npub1h8nk2346qezka5cpm8jjh3yl5j88pf4ly2ptu7s6uu55wcfqy0wq36rpev for pointing to that Signal 🎉
any screenshare capability ?
a mediocre analogy would be using a PO Box.
if you published your home address online, in the open (P2PK), and I wanted to break into your property, and steal your stuff, I can just look at your address, and I immediately know where to go, to start my intrusion. (I still actually need to do the work of breaking in...)
In constrast, P2PKH would be like using a PO Box, instead of your actual home address.
I could travel to your PO Box, but even when I get there, I still have a tonne of work to do, to figure out your actual home address. All of that needs to be done, before I can even begin the work of breaking in....
shocking typos....
** then you have a straight forward attack vector....
** in the case of P2PKH, the **public** key remains hidden
I could be wrong... but.. I think a private key is derived from the public key. therefore, if the public key is known, as is the case in P2PK, when you have a straight forward attack vector to brute force the private key.
in the case of P2PKH, the private key remains hidden, as the funds are sent to a hash of the pubkey, instead.
this extra layer of obfuscation means you first have to work out the pubkey, before you can set about brute forcing the private key...
