Avatar
Ross
e6a9a4f853e4b1d426eb44d0c5db09fdc415ce513e664118f46f5ffbea304cbc
Interested in open data, machine learning, and distributed systems.

https://github.com/hoytech/strfry/tree/web/src/apps/web

nostr:npub1yxprsscnjw2e6myxz73mmzvnqw5kvzd5ffjya9ecjypc5l0gvgksh8qud4 built a Hacker News clone that’s buried in the strfry repo which is really cool. It’s. c++ which I fear makes it less approachable.

oddbean.com

If we are being honest no true discussion takes place here. Where people actually talk back and forth.

It’s not limited to nostr. On all these news feed based social platforms an author makes a post, people respond with a comment. Maybe the the OP responds to a couple of them. And then it’s all gone, it’s an ephemeral broadcast platform.

It’s why after all these years I still get more educational value out of places like hacker news, where you don’t even have to post in order to get value from persistent and consistent threaded discussions. Since you mentioned Bitcoin, imagine Satoshi trying to maintain a coherent conversation on Primal or Damus.

Hopefully I was Ross enough to break the spell 😅

Yup. So we turn to epistemology, which is useful but also can’t solve it. Only experience provides it, and is forever subject to change. Whoops. 😅

There we go GPT. Real talk about causality

In 1996, mathematician Daniel Bernstein sued the US government after being told his encryption code was a 'munition' subject to export controls. With the EFF's support, he successfully argued that code is a form of expression protected under the First Amendment. This landmark case challenged the fundamental notion of what constitutes speech in the digital age.

Code is speech.

Think about how ahead of their time Bernstein and the EFF were 30 years ago. Today's LLMs are proving that code and natural language are not just similar, but fundamentally indistinguishable. What was once a progressive legal argument is now a technological fact.

Sr vibe coder clues… after 2 iterations says. “Hey Claude, that seems like an epic shit ton of code, can you simplify?”

At the very least decentralization will keep us all employed because at some point you have to put all this shit back together again. Both Plumbers and Data Plumbers are recession proof.

Replying to Avatar Tim Bouma

Self-Validating Data and How Nostr Signed Events Fit the Model

Self-validating data is information that carries intrinsic proof of its authenticity and integrity, eliminating the need for external validation from a central authority. This approach enhances security, reduces reliance on intermediaries, and improves data portability across different systems.

What is Self-Validating Data?

Self-validating data includes built-in mechanisms to confirm its correctness without requiring external verification. Key properties of self-validating data include:

1. Cryptographic Signatures – The data includes a signature that can be independently verified against a known public key.

2. Tamper Resistance – Any modification to the data invalidates the signature, making alterations detectable.

3. Decentralized Verification – Anyone with the necessary cryptographic tools can validate the data, rather than relying on a central authority.

Examples of self-validating data include signed blockchain transactions, cryptographic proofs, and digital signatures on documents.

Nostr Signed Events as Self-Validating Data

Nostr (Notes and Other Stuff Transmitted by Relays) is a decentralized protocol designed for censorship-resistant communication. At its core, Nostr uses signed events, which fit the model of self-validating data perfectly. Here’s how:

1. Every Event is Signed – Each message or event in Nostr is signed by the sender using their private key. The signature ensures that the message genuinely comes from the claimed author.

2. Public Key Verification – Anyone can use the sender’s public key to verify the signature. If the signature is valid, it confirms that the data has not been tampered with.

3. Tamper Detection – If any part of the event (such as the content or timestamp) is altered, the signature becomes invalid. This makes forgery and modification impossible without the sender’s private key.

4. Decentralized Validation – Since signatures can be verified independently by any participant in the network, no centralized authority is required to vouch for the authenticity of events.

Why This Matters

In traditional systems, data validation often depends on third parties, which introduces risks such as fraud, censorship, and single points of failure. Nostr’s signed events remove these risks by ensuring that data authenticity is provable by design. This makes Nostr a powerful tool for decentralized social networks, encrypted messaging, and other applications where trustless verification is crucial.

As more systems adopt self-validating data models, we move toward a world where users can exchange information securely without needing to place trust in intermediaries. Nostr is a strong example of how cryptographic signatures enable this paradigm shift.

Other stuff FTW

Replying to Avatar jb55

REST

lol indeed… and templates… ahem, context injection

💯 totally with you and fully agree. My comments were more around using the term DVM. If MCP ends up being an Industry term for a single purpose API endpoint that takes an input and returns useful data then Nostr relays should just embrace that. Instead of introducing a new concept of “DVM” we should be working with ML/AI devs to enable payments for MCP. Meet people out there in the middle.

Fully on board with payments, it’s the whole vending machine analogy which feels awkward. Make “402 Payment Required” great again.