I really should try to find a better SHA3 implementation guide lol, the specification is such a pain to read
nostr:nprofile1qy2hwumn8ghj7un9d3shjtnddaehgu3wwp6kyqpq4pa5q2kqs8ygfxuat02w88ezsle9wzwnu0meu7z2785t8rl0hhcsahhd4m nostr:nprofile1qy2hwumn8ghj7un9d3shjtnddaehgu3wwp6kyqpqnphdasccf3g8j2tmnv7twpmttmksuh7wuvpml8wsg0v9vpn33eysghwwq2 making sure every single connection your device makes goes through tor is one of the most important things mentioned there, so you might as well bite the bullet now, no point in reading it if you won't follow it lol
nostr:nprofile1qy2hwumn8ghj7un9d3shjtnddaehgu3wwp6kyqpqmg6epkkhjnxql6v3ss4z3zfqyj2kvchpqjdg6r5lqpzumy90mu5q9svtsg Are there any good guides out there? I think people would be a lot more likely to pay heed if one they trusted was readily accessible.
nostr:nprofile1qy2hwumn8ghj7un9d3shjtnddaehgu3wwp6kyqpqnphdasccf3g8j2tmnv7twpmttmksuh7wuvpml8wsg0v9vpn33eysghwwq2 sort of, what i wrote isn't exactly a *guide* since it doesn't tell you *how* to do things, but it does tell you *what* you need to do so it can be a starting point to ask for help wrt the *how*
http://securel3nizuqjiehzivsr5ikmv2ul6qgj6nvz2vpb6hc7vagtkwy7qd.onion/
Seeing people favorite my post about wishing i were jm girl is fun since that means they're based >w<
I wish i could make pedos feel as good as children can
New skorts :3

LOL

