Avatar
db
e18832d120d4b2977256a2a059f0407eb1d8307d5712a80e8f36cd68c9705b13
Loving family friends nature and life

Fuck yeah, nice one, I’ve never heard of this band until today🤙

I watched this on pbs so many times, Proenneke is the man.

Replying to Avatar Nico

Hey Nostr! I’ve been advised to do an introduction by nostr:nprofile1qqsqqx9hacelkffcgd3ecchzjtlvwq9xn2fmprhrwnzmm2t3exee2eqpzamhxue69uhkzarvv9ejumn0wd68ytnvv9hxgtcpr4mhxue69uhkummnw3ezucnfw33k76twv4ezuum0vd5kzmp02v5sas so here it is.

I’m Nico. I’ve been in the Bitcoin space since 2020 when I first started buying.

Like many, I fell for the crypto "get rich quick" mindset and bought some alts, hoping to turn the profit into more BTC (meanwhile, Bitcoin was trading around $5k, and I felt like I missed out!).

After a few years and thousands in losses, I realised something…

My position in Bitcoin outperformed everything and more than covered my mistakes.

I thought that Bitcoin was already too big, so it wasn’t worth investing much in it… Turned out to be the best investment I made.

Since then, I gave my entire focus on Bitcoin to understand why it was winning and how it actually works.

The deeper I went, the more I realised it’s not just an asset, it’s the evolution of money as we know it.

It’s the evolution from fiat, endless money printing, and centralized control to a self-sovereign money that gives power to the people.

I started in 2020 wanting to get more dollars; today, I buy Bitcoin to free myself from this system.

I’m currently working on a project called The Bitcoin Spot that should be ready in Q1 2026.

The goal is to educate people about Bitcoin, how it works, why it matters, and how to use it properly through one-on-one consultations.

Welcome to #nostr, the parallel rabbit hole to #bitcoin.

That’s either a cock and balls or a lady with a dump truck. It’s bothering me that I can’t tell which it is.

The mobile freedom stack!

nostr:note1caqx4qjwf6n2qkstvxrneew54qjxy5p085tasnx7g8xqrwme0keqauvuz8

Replying to Avatar Max

## The Parallel Phone

In February 2014, Apple removed Blockchain's Bitcoin wallet from the App Store without warning. The company offered no real explanation beyond "an unresolved issue." This was the last remaining native Bitcoin wallet for iOS users. Coinbase, CoinJar, and Gliph had already been purged in the preceding months.

Apple's position was monopolistic. If you had purchased an iPhone, you had precisely zero options for using Bitcoin on your device unless you trusted a web application. The "crazy ones" who once claimed to show "no respect for the status quo" had become the status quo, and they did not care to have their payment ambitions challenged by peer-to-peer electronic cash.

The cryptocurrency community responded with predictable outrage and some memorable videos of iPhones being destroyed. But outrage is not strategy. The real response took a decade to mature, and it required building something rather than merely complaining about something. That something is now operational.

Consider what happens when you install GrapheneOS on a Pixel device, then acquire your applications through Zapstore, manage your cryptographic identity with Amber, run a local Nostr relay using Citrine, publish your thoughts through Amethyst, and conduct private group conversations via White Noise. You have constructed a phone where no corporation can prevent you from installing software, no government can easily compel the seizure of your communication history, and no central authority controls your identity. Each component eliminates a specific chokepoint that centralized systems use to maintain control over users.

This is not theoretical. This is not aspirational. This is available today for anyone willing to spend an afternoon setting up their device.

### The Operating System: GrapheneOS

GrapheneOS is a hardened mobile operating system with security improvements that exceed what Google provides on stock Pixel devices. The memory allocator is fortified against entire classes of exploitation. The kernel includes mitigations that Google has not implemented. The browser, Vanadium, disables just-in-time compilation by default, eliminating the attack surface that enables most browser-based exploits.

The crucial feature for our purposes is the ability to sandbox Google Play Services if you need them, while keeping them entirely absent from profiles where you do not. This is not an all-or-nothing proposition. You can maintain a profile for legacy applications that require Google's infrastructure while keeping your freedom technology stack completely separate, with no data leakage between the two.

GrapheneOS currently runs only on Pixel devices, which creates an irony that critics never tire of mentioning: you must buy a Google phone to run the most Google-free mobile operating system available. The irony dissolves when you understand the reasoning. Pixels are the only devices with unlockable bootloaders that also support proper verified boot after installing an alternative operating system. Security requires specific hardware support, and Google, whatever its other sins, builds phones that do not fight against user modification.

### The App Store: Zapstore

The fundamental problem with centralized app distribution is not that Apple and Google are unusually malicious. The problem is that any entity capable of deciding what software you can install will eventually face pressure to make decisions you disagree with. Sometimes this pressure comes from governments demanding censorship. Sometimes it comes from internal commercial interests. Sometimes it comes from regulators who believe that non-custodial Bitcoin wallets should require money transmitter licenses even though they do not custody funds.

In August 2025, Google Play announced licensing requirements that would have effectively banned most non-custodial wallet applications from fifteen jurisdictions. The company reversed course after intense criticism, but the reversal came with no guarantee of permanence. The lesson is clear: the final obstacle for Bitcoin is no longer hostile regulators but the platform monopolists who control app distribution channels.

Zapstore eliminates this dependency. Built on the Nostr protocol, Zapstore allows developers to cryptographically sign their releases using their Nostr keys. Users verify these signatures automatically. Applications spread through a web of trust: you discover software because people you follow have recommended it or because developers you trust have published it. There is no central authority that can delist an application. If one relay refuses to host a particular release, other relays remain available.

### The Key Manager: Amber

The average person manages authentication through passwords that are either memorable and weak or generated and forgotten. They outsource key management to corporations that can be compelled to surrender access, or they simply accept that their accounts exist at the pleasure of platform operators who can disable them without appeal.

Nostr introduces a different model. Your identity is a cryptographic key pair. Your private key, your nsec, proves you are who you claim to be. Every message you publish is signed with this key. No server can impersonate you because no server possesses your key. No platform can lock you out because your key exists independently of any platform.

This architecture creates an obvious problem: if you paste your private key into every Nostr client you try, you multiply the attack surface exponentially. Each application becomes a potential point of compromise. One poorly coded client, one malicious update, one successful phishing attempt, and your identity is stolen permanently.

Amber solves this problem. The application stores your private key in a single dedicated location. Other applications request signing operations through the NIP-55 interface. The key never leaves Amber. A compromised client can do no worse than display incorrect information; it cannot steal your ability to prove who you are.

The comparison to hardware wallets for Bitcoin is apt. Your Bitcoin private keys should live on a device that does nothing except sign transactions. Your Nostr private keys should live in an application that does nothing except sign events. Amber provides this functionality without requiring additional hardware, turning your existing smartphone into a signing device.

Amber supports multiple accounts with precise permission controls, allowing you to authorize specific applications for specific operations while denying others. It works offline for local signing and supports NIP-46 remote signing for browser-based clients.

### The Local Relay: Citrine

In the Nostr protocol, relays are servers that store and distribute messages. Most users connect to public relays operated by third parties. This is convenient but introduces familiar problems: the relay operator can see what you post, what you request, and when you are online. They can sell this information, censor your content, or comply with government demands for your data.

Citrine runs a Nostr relay directly on your Android device. Your private notes, drafts, bookmarks, application settings, and encrypted messages can be stored locally where no third party can access them. Every post you publish can be backed up to your local relay, ensuring you retain a complete archive of your own writing regardless of what happens to public relays. Combined with Orbot, you can expose your Citrine relay as a Tor hidden service, allowing contacts to reach your relay over the Tor network while revealing nothing about your physical location or network identity.

Consider a journalist maintaining source communications. The standard operational security advice is complex: use Signal, but understand that Signal's servers can see metadata. Use encrypted email, but understand that email headers leak information. With Citrine, you run your own communications infrastructure on a device you carry. There is no server to subpoena because the server is in your pocket.

Citrine supports database export and import for backup purposes, allows restoration of contact lists if client applications malfunction, and provides user management for controlling who can post to your relay.

### The Client: Amethyst

Amethyst is the interface through which most users interact with Nostr on Android. It is the most feature-complete Nostr client available for the platform, supporting social networking, group chats, direct messages, media feeds, marketplaces, live streaming, and Lightning Network payments through zaps.

The application integrates with Amber for signing, with Citrine for local relay functionality, and with Zapstore for updates. It routes traffic through Tor via Orbot for users who require network anonymity. It supports the outbox model for censorship resistance, ensuring that your posts can reach followers even if specific relays refuse to carry them.

Amethyst functions as a laboratory for Nostr development. Features that prove successful here often appear in other clients. With over fifty thousand downloads and thirty-five thousand active users, the application demonstrates that decentralized social networking works at scale.

### The Secure Messenger: White Noise

Nostr's existing direct message implementations are inadequate. NIP-04 and NIP-17 provide encryption, but past messages become vulnerable if current keys are compromised. Group conversations scale poorly. Adding a hundred participants to a chat degrades performance to the point of unusability.

White Noise fixes this by implementing Messaging Layer Security, the IETF-standardized encryption protocol, on top of Nostr's decentralized transport.

What matters is metadata protection. Signal encrypts message contents but operates through centralized servers that observe who communicates with whom and when. Nostr's public relays similarly leak metadata even when message contents are encrypted. White Noise obfuscates these communication patterns, hiding not just what you say but who you talk to.

MLS provides forward secrecy and post-compromise security. If an attacker compromises your current keys, past messages remain protected. The protocol scales to groups of thousands without choking.

The architecture includes no centralized backend. The developers publish open source code and operate no servers. When the European Union proposed Chat Control 2.0, mandating backdoor access to encrypted communications, the response writes itself: there is no server to backdoor, no client under central control, and no mechanism by which messages could be intercepted even under legal compulsion.

White Noise implements the Marmot Protocol for interoperability. Other Nostr clients can integrate MLS support and communicate with White Noise users directly. The protocol is a contribution to the commons, not a proprietary silo.

White Noise is still early. The alpha released in July 2025, and the application is not yet feature complete. But the architecture is sound, the cryptography is standardized, and the code is open for inspection. What exists today works.

### The Complete Stack

Each component is valuable independently. Together, they constitute something more significant: a phone where every major corporate or governmental chokepoint has been eliminated.

Your operating system does not report to Google. Your applications come from a decentralized store that cannot be shut down. Your identity exists independently of any platform. Your data lives on infrastructure you control. Your publications cannot be stopped since your apps distribute it on many relays. Your group conversations are encrypted with forward secrecy and metadata protection that even the developers cannot circumvent.

This is useful for anyone who has watched a bank freeze accounts without explanation, a social media platform ban users without appeal, or an app store remove software for "policy violations" that change quarterly. The freedom technology stack provides exit from a system where your ability to communicate and transact exists at the pleasure of corporations who do not particularly care about you.

They are ready now.

### Conclusion

The Bitcoin community spent years complaining about app store censorship before building alternatives. The Nostr community learned from this experience and prioritized infrastructure from the beginning. GrapheneOS developers understood that security is meaningless without sovereignty over your own device. These parallel efforts have converged into a stack that ships with strong defaults and requires no technical expertise to configure.

You can continue requesting permission from Apple and Google for the software you run, the people you communicate with, and the transactions you make. The permission can always be revoked. The alternative cannot.

The freedom stack of freedom tech, I need to get to work on this. Thanks for sharing.

Not nowadays with mail in ballots and voting machines.

I’d be happy to pay this forward to the next available nostrich. I loved the giving spirit of this and wanted to promote the book and hashtag. TY 🙏

Replying to Avatar Filou

By one gift one! nostr:nprofile1qqsvrejstspd4rgmpfdn6mdkuxdjav3de420p6rrqmkg5gfeq2e32lspz4mhxue69uhhyetvv9ujumt0wd68ytnsw43qz9thwden5te0dp5hxapwdehhxarj9ekxzmny5qfkkv

One limited edition photo zine up for grabs ⚠️ I’m gonna enjoy the hell out of my copy! First nostrich who responds with hashtag #shareart gets to enjoy a copy too.

I’ll cover shipping in US. 🤙

nostr:nevent1qqs25kdlr482wp43uasyh5808k7zqm5y646psc696q7t6r9qnpf3v5qpzemhxue69uhhyetvv9ujuurjd9kkzmpwdejhgjxj9ky

Great holiday spirit!

#shareart

This is the nostr holiday spirit! #shareart

nostr:note1tykk5zcuhrjs9jcshtzn4yazclge86svqy8hjd6huam5hzzxyzjsnlq8xm

After a recent journey, I’ve decided to follow my heart more and my over-analytical mind less. This #nostr

Note is a reminder etched in time to help me remember. #ayahuasca #psychedelics #corazón

Replying to Avatar modulo

Spending #bitcoin and having to keep topping up now that nostr:npub1sg6plzptd64u62a878hep2kev88swjh3tw00gjsfl8f237lmu63q0uf63m's #square has made spending easier, pushes past the tipping point (individually) of being bitcoin Functional.

Thinking in bitcoin, operating in bitcoin, measuring in bitcoin, all becomes more the norm and #fiat the exception.

Combine that with #strike's ability to bill pay fiat balances with auto-conversion from bitcoin makes the next steps closer in time, like:

• Fiat credit card debt constantly remeasured and settled in bitcoin

• bitcoin to fiat hedges in lightning

• businesses able to measure projected bitcoin income

Are you with me 🧡🗝️💜

https://modulo.network

LFG

When will your frames be available?

I’m old school, hard to beat a kettle grill like a Webber.

I do question my integrity and fragility with the internal dialogue in my head. With that and free thought, I try to improve as a person. The countless rabbit holes that studying bitcoin has led me down has opened my eyes to many life improving ideas. In turn, I feel that Bitcoin has made me a better person and that is what we should strive for, is it not?

I see the possibilities as the network grows and agree that decentralization is key. Are there any resources that you’d recommend to help me figure out the scenario that I’m trying to accomplish?

I was planning on a repeater that’s waterproof and solar but now youve got me second guessing and realizing that I need more knowledge. I don’t want to do something that could make communications worse.

Thanks again.

I just linked back up to my node today and instead of the normal 4 nodes there has been lately, there are 90 now. I’m still unable to send but I see others chatting. I did nothing to my settings or anything. This is all confusing. I’ll just keep shouting into the void and maybe it will go through to someone someday.

Shoulda made beef, gotta keep ‘em wanting. lol

Replying to Avatar Noshole

What kind of “regular” conversations don’t have something to do with bitcoin?

Bitcoin touches all aspects of life, directly or indirectly.