Avatar
db
e18832d120d4b2977256a2a059f0407eb1d8307d5712a80e8f36cd68c9705b13
Loving family friends nature and life

Zap coming back at you nostr:npub1ymt2j3n8tesrlr0yhaheem6yyqmmwrr7actslurw6annls6vnrcslapxnz when I figure this stupid problem out. I’m retarded helpless and confused lol

I must have a nostr:npub1qqtrge5wjyena0chm5vgacv53lvvy2fcdc586htgq9m766g8sv3qtqhzdx issue, I switched settings inside Damus from albygo wallet to WOS and just received this test ϟ to alby go?? I still can’t zap from either wallet. In really confused here.

nostr:note1m00mvxdr2lc6dgf32s4kcaac4aynra72kkr3enln5lxh8scwxy2sr9e0qa

I’m so confused, it appears I can receive but not zap. I changed my wallet in nostr:npub1qqtrge5wjyena0chm5vgacv53lvvy2fcdc586htgq9m766g8sv3qtqhzdx settings from nostr:npub1getal6ykt05fsz5nqu4uld09nfj3y3qxmv8crys4aeut53unfvlqr80nfm Go to WOS and I just received to my Alby go wallet wtf?

Can I get a test ϟ? Troubleshooting my zapper, thanks

#asknostr

Stay humble, stack bastards?

I zap notes daily but just looked at my nostr:npub1getal6ykt05fsz5nqu4uld09nfj3y3qxmv8crys4aeut53unfvlqr80nfm Go wallet and I haven’t been sending(for quite a while), they just time out. It looks like I can receive but not send? I updated my node and channels seem good. Is this a nostr:npub18m76awca3y37hkvuneavuw6pjj4525fw90necxmadrvjg0sdy6qsngq955 thing? Nothing seems out of whack and I haven’t changed any settings. Does anyone have any ideas? I’m currently a zap moocher and can’t stand for that.

#asknostr

Young enough to remember sounds better.

Replying to Avatar Max

The device in your pocket is not yours. You paid for it, certainly. You carry it everywhere, sleep beside it, and entrust it with your most private communications. But in every meaningful sense, it belongs to someone else. It reports your location to Google every 4.5 minutes. It transmits approximately one megabyte of telemetry every twelve hours while sitting idle on your nightstand. It does this even when you navigate endless settings menus and explicitly opt out. The opt-out is theater. The surveillance is the product.

This is not a bug in the system. It is the system.

When Google offered Android to manufacturers as "free" software, the price was always your data. Governments integrated themselves into this corporate surveillance infrastructure years ago, and the apparatus has only grown more sophisticated. Data brokers now trade location information from over a billion devices. Companies like X-Mode ingest ten billion location data points daily. One data broker was caught tracking women visiting pregnancy centers to build targeted advertising segments. Your movements through physical space have become a commodity traded on markets you never consented to participate in.

The implications extend far beyond advertising. Leaked documentation from Cellebrite, the Israeli forensics company serving 7,000 law enforcement customers worldwide, reveals that every major Android manufacturer's devices can be exploited in both locked and unlocked states. Every Samsung, every OnePlus, every Motorola. The one exception, explicitly marked as inaccessible in their internal documentation, is GrapheneOS running on Pixel hardware with patches from late 2022 onward. A whistleblower who joined a private Cellebrite training session in October 2024 reported that every locked Pixel 9 running GrapheneOS was listed as beyond their capabilities.

This matters because the question of device security is ultimately a question of property rights. When your phone transmits your location, your contacts, your browsing habits, and your app usage to corporate servers without meaningful consent, you do not own that device in any substantive sense. You are renting surveillance equipment. GrapheneOS exists to change this equation, to transform a piece of consumer electronics into something that actually belongs to you.

**The Verification Problem**

The cryptographer Auguste Kerckhoffs articulated a principle in 1883 that remains foundational: a secure system must remain secure even when everything about it except the key is public knowledge. Security through obscurity is not security at all. History validates this relentlessly. The DVD industry's Content Scramble System, developed in secret, was cracked within three years and proved millions of times weaker than advertised. WEP wireless encryption collapsed so completely it was universally abandoned. Proprietary systems fail because no one outside a small team can verify their claims.

GrapheneOS embraces the opposite approach. Every line of code is published. The build process is reproducible, meaning anyone can compile the source and verify it produces bit-for-bit identical binaries to what the project distributes. You need not trust the developers' claims. You can verify them yourself, or rely on the many security researchers who have done so. This is not a theoretical distinction. When Synacktiv's security team published their analysis of GrapheneOS's hardened memory allocator, they could examine the actual implementation rather than trusting marketing materials.

The project ships with no Google Play Services installed. This is not an oversight but a deliberate default. Most privacy-focused Android distributions either exclude Google entirely or include it with system privileges. GrapheneOS takes a third path: if you choose to install Google Play Services, it runs in a sandbox with zero special privileges, treated as the untrusted software it objectively is. You control every permission. Google cannot access your contacts, location, or files unless you explicitly grant it. Competing projects like CalyxOS use signature spoofing to run a reimplementation of Google services with system-level access. GrapheneOS makes the honest architectural choice: if you want Google apps, run them in a cage where they cannot access anything you don't explicitly grant.

For users who need tap-to-pay functionality, the Curve app works with GrapheneOS but requires sandboxed Google Play Services installed. Curve aggregates your existing cards into a single virtual card, and its tap-to-pay implementation functions normally even within the sandbox constraints.

**The Technical Foundation**

Understanding why GrapheneOS works requires understanding how modern exploits work. The vast majority of serious vulnerabilities involve memory corruption, situations where software writes data outside its intended boundaries, overwriting critical structures an attacker can leverage for control.

GrapheneOS replaces Android's standard memory allocator with hardened_malloc, a complete reimplementation designed to make exploitation practically impossible. Traditional allocators store metadata inline with user data, so an overflow that corrupts nearby memory can overwrite allocator structures and hijack program execution. Hardened_malloc stores all metadata in a completely separate region. The allocator divides memory into 49 distinct size classes, each with its own randomly-addressed memory region. No address space is ever reused between regions. Each allocation slot is protected by a random 64-bit canary with a leading zero byte, which blocks C string overflow attacks. When the program frees memory, the allocator overwrites the entire region with zeros before returning it to the pool, eliminating use-after-free information leaks.

On Pixel 8 and newer devices with ARMv8.5 hardware, GrapheneOS enables Memory Tagging Extension. MTE assigns a 4-bit tag to every 16-byte memory granule and stores a matching tag in the pointer. Any access where the tags mismatch triggers a hardware fault. This catches buffer overflows and use-after-free bugs at the moment they occur, not after an attacker has already leveraged them.

Stock Android uses a process called Zygote to launch applications. Zygote is a template process that forks to create new apps, which means every application inherits the same memory layout. An attacker who knows where one app's libraries load knows where they all load. GrapheneOS replaces this with exec-spawning, where each application gets a fresh process with completely randomized address space layout. This restores the full entropy of Address Space Layout Randomization that Zygote defeats. Cold app launches take roughly 100 milliseconds longer, a worthwhile trade for dramatically complicating exploitation.

The verified boot chain begins in hardware. Pixel devices contain a Titan M secure element with the firmware verification key burned into fuses at the factory. The firmware rollback index is similarly fused, preventing downgrade attacks where an attacker installs an older, vulnerable version. When you install GrapheneOS and lock the bootloader, your device's verified boot key is stored in the secure element. Every subsequent boot cryptographically verifies the entire chain from firmware through the operating system. Any modification, even a single flipped bit, halts the boot process. The Auditor app extends this to runtime, using hardware-backed attestation to verify OS integrity on a schedule you control.

The network permission toggle implements dual-layer enforcement. The standard Android permission system blocks network API calls, but GrapheneOS adds a second layer that blocks the actual network sockets, including localhost connections. This prevents a malicious app from communicating with another app that does have network access. When denied, the network stack returns errors indicating the network is down rather than permission denied, which prevents apps from detecting they are being restricted and improves compatibility.

Sensors permission covers accelerometers, gyroscopes, compasses, barometers, and thermometers. These sensors seem innocuous but enable sophisticated attacks. Accelerometer data can reconstruct what you type on a nearby keyboard through vibration analysis. Gyroscope readings can identify you personally through your unique gait pattern. Barometer data reveals what floor of a building you occupy. On GrapheneOS, apps without sensor permission receive zeroed data rather than errors, maintaining compatibility while eliminating the attack surface.

Storage Scopes transforms the storage permission from all-or-nothing into granular control. When you grant storage access to an app with Storage Scopes enabled, the app believes it has full access while actually operating in a sandbox. It can only see files it created itself. You can selectively expose specific files or directories through the standard file picker, giving an app access to exactly what it needs and nothing more. Contact Scopes applies the same principle to your address book, presenting an empty contact list by default with selective exposure of specific contacts or groups.

**Installation and Configuration**

GrapheneOS runs exclusively on Google Pixel devices because no other manufacturer meets its hardware requirements. The Titan M secure element provides hardware-backed attestation and encryption key storage. Proper verified boot implementation allows flashing custom signing keys and re-locking the bootloader with full security intact. Samsung, despite taking security seriously, deliberately cripples devices when the bootloader is unlocked. Most other manufacturers lack the necessary hardware entirely. The Pixel 8a offers excellent value as a budget option with full GrapheneOS support, while the Pixel 10 Pro serves users who need high performance.

The web installer at grapheneos.org/install/web handles installation through your browser. Update your Pixel's stock OS first for current firmware, enable OEM unlocking in developer options, and use the original USB cable. The installer unlocks the bootloader, flashes GrapheneOS, and locks the bootloader again. Both unlocking and locking wipe user data, so do not restore anything until the bootloader is locked. Verify the boot key hash displayed during first startup against published values before proceeding.

GrapheneOS ships with excellent defaults that already far exceed stock Android security. What follows will harden the device further. Post-installation hardening begins in Settings, Security and privacy, Exploit protection. Set auto-reboot to four hours, which returns the device to a fully encrypted state with all keys purged from memory. Configure the USB port as charging-only, even when unlocked, a hardware-level protection that stock Android's software toggle cannot match. Enable WiFi and Bluetooth auto-disable after thirty seconds of disconnection.

For maximum privacy, keep the device in airplane mode most of the time. Your cellular radio broadcasts a unique identifier to every tower in range, creating a continuous location log with your carrier and anyone they share data with. Airplane mode eliminates this entirely. When you need connectivity, enable WiFi only, ideally through a VPN. For situations requiring cellular data, consider a Silent.link eSIM, which can be purchased with Bitcoin and requires no identity verification. Some users maintain a second dedicated device with a Silent.link eSIM for online activity, keeping their primary phone in airplane mode as a secure offline vault for passwords, authenticators, and signing keys.

For applications, disable native code debugging, WebView JIT, and dynamic code loading for third-party apps by default. These settings eliminate major attack surfaces. If a specific app breaks, you can enable exceptions individually.

Install a VPN and configure always-on mode with connection blocking when disconnected. Mullvad requires no email for signup and accepts Bitcoin. IVPN likewise takes Bitcoin and offers port forwarding for self-hosting. ProtonVPN offers a free tier. Orbot routes traffic through Tor for stronger anonymity at the cost of speed.

For applications, Zapstore pulls updates from a decentralized app store built on Nostr, where developers cryptographically sign their releases and users verify authenticity without trusting a central authority. KeePassDX stores passwords locally with no network permission, making exfiltration impossible by design. Organic Maps provides offline navigation without data collection. Aegis manages two-factor authentication codes with encrypted local storage. Molly hardens Signal with database encryption at rest and automatic lock timeouts. For Nostr users, Amber stores your private key securely and signs events without exposing the key to other applications, while Amethyst provides a full-featured client.

For Bitcoin, Nunchuk provides a proper onchain wallet with multisig support and no KYC requirements. Phoenix offers self-custodial Lightning with automatic channel management, letting you send and receive instantly without trusting a third party. For smaller amounts where speed and privacy matter more than self-custody, Cashu.me provides an ecash wallet using Chaumian blinding, meaning the mint cannot link your deposits to your withdrawals. A reasonable setup uses Nunchuk for long-term savings, Phoenix for everyday Lightning payments, and Cashu for receiving zaps and casual transactions where the custodial trade-off is acceptable.

**What You Gain**

The common objection runs something like this: all of this seems like a lot of work for a problem that does not affect ordinary people. This objection misunderstands what is at stake. The question is not whether you have done something wrong that surveillance might catch. The question is whether you wish to live in a society where every movement, every communication, every relationship is logged, analyzed, and potentially used against you by parties whose interests do not align with yours.

The person who dismisses privacy concerns today may find themselves targeted tomorrow. Political winds shift. Definitions of acceptable behavior change. Data collected for advertising can be subpoenaed for prosecution. Information gathered by corporations can be purchased by governments, or by criminals, or by a vindictive ex-partner with modest resources and determination. The pregnancy center visits tracked by data brokers for advertising purposes become evidence when abortion laws change. The protest attendance logged by cell tower records becomes a list when political climates shift. The patterns of movement that reveal a relationship become leverage in a custody dispute.

GrapheneOS does not make you invisible. It does not protect against a determined nation-state adversary with unlimited resources. What it does is raise the cost of surveillance dramatically. It removes you from the bulk data collection that treats billions of people as raw material for behavioral prediction markets. It forces anyone who wants your data to target you specifically rather than simply purchasing it from a broker. It transforms your phone from a liability into a tool.

The installation process takes perhaps two hours, including reading documentation. The daily experience differs minimally from stock Android. The apps you need almost certainly work, either natively or through the sandboxed Play Services compatibility layer. The trade-off is not convenience for privacy. The trade-off is two hours of setup for meaningful ownership of your own device.

The technology exists. The documentation is thorough. The community is active and helpful. What remains is simply the decision to use it.

Ain’t nothin to it but to do it!

I keep thinking about it, but in this case thinking isn’t enough.

This is the first reference to ICQ that I’ve come across. I’ve brought it up to people but no one remembers. That was a crazy time, thinking how cool it was to chat with people over the internet. The good ole dayz.

Fuck yeah, nice one, I’ve never heard of this band until today🤙

I watched this on pbs so many times, Proenneke is the man.

Replying to Avatar Nico

Hey Nostr! I’ve been advised to do an introduction by nostr:nprofile1qqsqqx9hacelkffcgd3ecchzjtlvwq9xn2fmprhrwnzmm2t3exee2eqpzamhxue69uhkzarvv9ejumn0wd68ytnvv9hxgtcpr4mhxue69uhkummnw3ezucnfw33k76twv4ezuum0vd5kzmp02v5sas so here it is.

I’m Nico. I’ve been in the Bitcoin space since 2020 when I first started buying.

Like many, I fell for the crypto "get rich quick" mindset and bought some alts, hoping to turn the profit into more BTC (meanwhile, Bitcoin was trading around $5k, and I felt like I missed out!).

After a few years and thousands in losses, I realised something…

My position in Bitcoin outperformed everything and more than covered my mistakes.

I thought that Bitcoin was already too big, so it wasn’t worth investing much in it… Turned out to be the best investment I made.

Since then, I gave my entire focus on Bitcoin to understand why it was winning and how it actually works.

The deeper I went, the more I realised it’s not just an asset, it’s the evolution of money as we know it.

It’s the evolution from fiat, endless money printing, and centralized control to a self-sovereign money that gives power to the people.

I started in 2020 wanting to get more dollars; today, I buy Bitcoin to free myself from this system.

I’m currently working on a project called The Bitcoin Spot that should be ready in Q1 2026.

The goal is to educate people about Bitcoin, how it works, why it matters, and how to use it properly through one-on-one consultations.

Welcome to #nostr, the parallel rabbit hole to #bitcoin.

That’s either a cock and balls or a lady with a dump truck. It’s bothering me that I can’t tell which it is.

The mobile freedom stack!

nostr:note1caqx4qjwf6n2qkstvxrneew54qjxy5p085tasnx7g8xqrwme0keqauvuz8

Replying to Avatar Max

## The Parallel Phone

In February 2014, Apple removed Blockchain's Bitcoin wallet from the App Store without warning. The company offered no real explanation beyond "an unresolved issue." This was the last remaining native Bitcoin wallet for iOS users. Coinbase, CoinJar, and Gliph had already been purged in the preceding months.

Apple's position was monopolistic. If you had purchased an iPhone, you had precisely zero options for using Bitcoin on your device unless you trusted a web application. The "crazy ones" who once claimed to show "no respect for the status quo" had become the status quo, and they did not care to have their payment ambitions challenged by peer-to-peer electronic cash.

The cryptocurrency community responded with predictable outrage and some memorable videos of iPhones being destroyed. But outrage is not strategy. The real response took a decade to mature, and it required building something rather than merely complaining about something. That something is now operational.

Consider what happens when you install GrapheneOS on a Pixel device, then acquire your applications through Zapstore, manage your cryptographic identity with Amber, run a local Nostr relay using Citrine, publish your thoughts through Amethyst, and conduct private group conversations via White Noise. You have constructed a phone where no corporation can prevent you from installing software, no government can easily compel the seizure of your communication history, and no central authority controls your identity. Each component eliminates a specific chokepoint that centralized systems use to maintain control over users.

This is not theoretical. This is not aspirational. This is available today for anyone willing to spend an afternoon setting up their device.

### The Operating System: GrapheneOS

GrapheneOS is a hardened mobile operating system with security improvements that exceed what Google provides on stock Pixel devices. The memory allocator is fortified against entire classes of exploitation. The kernel includes mitigations that Google has not implemented. The browser, Vanadium, disables just-in-time compilation by default, eliminating the attack surface that enables most browser-based exploits.

The crucial feature for our purposes is the ability to sandbox Google Play Services if you need them, while keeping them entirely absent from profiles where you do not. This is not an all-or-nothing proposition. You can maintain a profile for legacy applications that require Google's infrastructure while keeping your freedom technology stack completely separate, with no data leakage between the two.

GrapheneOS currently runs only on Pixel devices, which creates an irony that critics never tire of mentioning: you must buy a Google phone to run the most Google-free mobile operating system available. The irony dissolves when you understand the reasoning. Pixels are the only devices with unlockable bootloaders that also support proper verified boot after installing an alternative operating system. Security requires specific hardware support, and Google, whatever its other sins, builds phones that do not fight against user modification.

### The App Store: Zapstore

The fundamental problem with centralized app distribution is not that Apple and Google are unusually malicious. The problem is that any entity capable of deciding what software you can install will eventually face pressure to make decisions you disagree with. Sometimes this pressure comes from governments demanding censorship. Sometimes it comes from internal commercial interests. Sometimes it comes from regulators who believe that non-custodial Bitcoin wallets should require money transmitter licenses even though they do not custody funds.

In August 2025, Google Play announced licensing requirements that would have effectively banned most non-custodial wallet applications from fifteen jurisdictions. The company reversed course after intense criticism, but the reversal came with no guarantee of permanence. The lesson is clear: the final obstacle for Bitcoin is no longer hostile regulators but the platform monopolists who control app distribution channels.

Zapstore eliminates this dependency. Built on the Nostr protocol, Zapstore allows developers to cryptographically sign their releases using their Nostr keys. Users verify these signatures automatically. Applications spread through a web of trust: you discover software because people you follow have recommended it or because developers you trust have published it. There is no central authority that can delist an application. If one relay refuses to host a particular release, other relays remain available.

### The Key Manager: Amber

The average person manages authentication through passwords that are either memorable and weak or generated and forgotten. They outsource key management to corporations that can be compelled to surrender access, or they simply accept that their accounts exist at the pleasure of platform operators who can disable them without appeal.

Nostr introduces a different model. Your identity is a cryptographic key pair. Your private key, your nsec, proves you are who you claim to be. Every message you publish is signed with this key. No server can impersonate you because no server possesses your key. No platform can lock you out because your key exists independently of any platform.

This architecture creates an obvious problem: if you paste your private key into every Nostr client you try, you multiply the attack surface exponentially. Each application becomes a potential point of compromise. One poorly coded client, one malicious update, one successful phishing attempt, and your identity is stolen permanently.

Amber solves this problem. The application stores your private key in a single dedicated location. Other applications request signing operations through the NIP-55 interface. The key never leaves Amber. A compromised client can do no worse than display incorrect information; it cannot steal your ability to prove who you are.

The comparison to hardware wallets for Bitcoin is apt. Your Bitcoin private keys should live on a device that does nothing except sign transactions. Your Nostr private keys should live in an application that does nothing except sign events. Amber provides this functionality without requiring additional hardware, turning your existing smartphone into a signing device.

Amber supports multiple accounts with precise permission controls, allowing you to authorize specific applications for specific operations while denying others. It works offline for local signing and supports NIP-46 remote signing for browser-based clients.

### The Local Relay: Citrine

In the Nostr protocol, relays are servers that store and distribute messages. Most users connect to public relays operated by third parties. This is convenient but introduces familiar problems: the relay operator can see what you post, what you request, and when you are online. They can sell this information, censor your content, or comply with government demands for your data.

Citrine runs a Nostr relay directly on your Android device. Your private notes, drafts, bookmarks, application settings, and encrypted messages can be stored locally where no third party can access them. Every post you publish can be backed up to your local relay, ensuring you retain a complete archive of your own writing regardless of what happens to public relays. Combined with Orbot, you can expose your Citrine relay as a Tor hidden service, allowing contacts to reach your relay over the Tor network while revealing nothing about your physical location or network identity.

Consider a journalist maintaining source communications. The standard operational security advice is complex: use Signal, but understand that Signal's servers can see metadata. Use encrypted email, but understand that email headers leak information. With Citrine, you run your own communications infrastructure on a device you carry. There is no server to subpoena because the server is in your pocket.

Citrine supports database export and import for backup purposes, allows restoration of contact lists if client applications malfunction, and provides user management for controlling who can post to your relay.

### The Client: Amethyst

Amethyst is the interface through which most users interact with Nostr on Android. It is the most feature-complete Nostr client available for the platform, supporting social networking, group chats, direct messages, media feeds, marketplaces, live streaming, and Lightning Network payments through zaps.

The application integrates with Amber for signing, with Citrine for local relay functionality, and with Zapstore for updates. It routes traffic through Tor via Orbot for users who require network anonymity. It supports the outbox model for censorship resistance, ensuring that your posts can reach followers even if specific relays refuse to carry them.

Amethyst functions as a laboratory for Nostr development. Features that prove successful here often appear in other clients. With over fifty thousand downloads and thirty-five thousand active users, the application demonstrates that decentralized social networking works at scale.

### The Secure Messenger: White Noise

Nostr's existing direct message implementations are inadequate. NIP-04 and NIP-17 provide encryption, but past messages become vulnerable if current keys are compromised. Group conversations scale poorly. Adding a hundred participants to a chat degrades performance to the point of unusability.

White Noise fixes this by implementing Messaging Layer Security, the IETF-standardized encryption protocol, on top of Nostr's decentralized transport.

What matters is metadata protection. Signal encrypts message contents but operates through centralized servers that observe who communicates with whom and when. Nostr's public relays similarly leak metadata even when message contents are encrypted. White Noise obfuscates these communication patterns, hiding not just what you say but who you talk to.

MLS provides forward secrecy and post-compromise security. If an attacker compromises your current keys, past messages remain protected. The protocol scales to groups of thousands without choking.

The architecture includes no centralized backend. The developers publish open source code and operate no servers. When the European Union proposed Chat Control 2.0, mandating backdoor access to encrypted communications, the response writes itself: there is no server to backdoor, no client under central control, and no mechanism by which messages could be intercepted even under legal compulsion.

White Noise implements the Marmot Protocol for interoperability. Other Nostr clients can integrate MLS support and communicate with White Noise users directly. The protocol is a contribution to the commons, not a proprietary silo.

White Noise is still early. The alpha released in July 2025, and the application is not yet feature complete. But the architecture is sound, the cryptography is standardized, and the code is open for inspection. What exists today works.

### The Complete Stack

Each component is valuable independently. Together, they constitute something more significant: a phone where every major corporate or governmental chokepoint has been eliminated.

Your operating system does not report to Google. Your applications come from a decentralized store that cannot be shut down. Your identity exists independently of any platform. Your data lives on infrastructure you control. Your publications cannot be stopped since your apps distribute it on many relays. Your group conversations are encrypted with forward secrecy and metadata protection that even the developers cannot circumvent.

This is useful for anyone who has watched a bank freeze accounts without explanation, a social media platform ban users without appeal, or an app store remove software for "policy violations" that change quarterly. The freedom technology stack provides exit from a system where your ability to communicate and transact exists at the pleasure of corporations who do not particularly care about you.

They are ready now.

### Conclusion

The Bitcoin community spent years complaining about app store censorship before building alternatives. The Nostr community learned from this experience and prioritized infrastructure from the beginning. GrapheneOS developers understood that security is meaningless without sovereignty over your own device. These parallel efforts have converged into a stack that ships with strong defaults and requires no technical expertise to configure.

You can continue requesting permission from Apple and Google for the software you run, the people you communicate with, and the transactions you make. The permission can always be revoked. The alternative cannot.

The freedom stack of freedom tech, I need to get to work on this. Thanks for sharing.

When will your frames be available?

I’m old school, hard to beat a kettle grill like a Webber.