Not your server, not your file deletion request.
https://www.theverge.com/2024/5/15/24157284/apple-iphone-ios-17-5-update-deleted-photos-voicemails
Anyone out there have experience with taking peptides to stimulate production of growth hormone?
Is MEV wire fraud now?
Or is it counter-MEV that's wire fraud?
What the hell is wire fraud other than a catch-all charge for doing something the authorities dislike via the internet?
I advise against taking a backpack full of a dozen hardware signing devices through TSA... it looks remarkably like a bomb on the x-ray machine. 😇
So you're saying it's trivial to grief you into deplatforming all VPN & tor users.
Correct, it would just be funny to redirect Bitcoin FUD over to AI and make them deal with the bullshit from now on. 🙃
Does AI use more energy than Bitcoin mining yet?
We're all getting (AI) girlfriends!
The Luddite decels are coming for AI 🙄
As someone who's quite familiar with web scraping issues, I completely understand that it may require a bit of maintenance. But I'm also willing to bet that the government won't be changing their web site that often! 🙃
Yeah, seems promising. Haven't tested it myself.
Are you a developer who wants to earn some sats by automating the heavy lifting of keeping my Bitcoin political financial disclosures repository up to date?
Check out my recently posted bounty at https://github.com/jlopp/bitcoin-politicians/issues/36
From what I've heard, books are not particularly profitable. 😐
I dunno why I'd care if I purchase both my phones and esims anonymously.
At the end of the day, phones are surveillance devices. If you want complete privacy then you shouldn't carry a phone.
Meatspace needs more of this.

Not really. Lightning Network is arguably the only permissionless L2. Everything else is a glorified multisig.
Most people will run Bitcoin Core's rule set because it's the most reputable implementation by far.
Seems like everybody's writing Bitcoin books these days.
I've had 4 people send me books to review in the past month!
L2s can't be explored well because L1 doesn't have the necessary functionality to make development of permissionless L2s simple. 🤦♂️
Cloaked wireless works quite well
Rest in peace Mr. Park AKA Rooftop Korean

Remarkably common ignorant statement.
WE NEED LAYER 1 IMPROVEMENTS IN ORDER TO MAKE LAYER 2 DEVELOPMENT MORE FEASIBLE.
"Niche programmers" sounds a bit ad hominem.
Not sure what you mean by changing the fundamental nature of Bitcoin; adding opcodes uses a foundational principle of the protocol to extend its functionality.
Normal users can't be expected to understand the intricacies of protocol development; if that was a requirement then the protocol would have ossified long ago.
