-

@ bc575705:dba3ed39
2025-03-13 09:38:31
Might be the kebab.
-

@ 65912a7a:5dc638bf
2025-03-13 09:38:09
Works for me on Amethyst
-

@ f40832e2:bcbf511e
2025-03-13 09:37:51
1万円のキーボードは、安い。
-

@ bc575705:dba3ed39
2025-03-13 09:37:16
Yeah, it’s never sexual until they find out how much more «sexual» pays. 😉
-

@ 06b7819d:d1d8327c
2025-03-13 09:37:10
weapon = tool + intent
-

@ 4c800257:b47e3b2f
2025-03-13 09:37:08
yeah, the thing is the protestants are much easier to sway to debasing the culture and the society, and the money, for that matter... catholics are not fundamentalists but they are extremely certain about things that cannot be allowed to change
recent popes have been trying to unsettle all of that and i don't think any catholics are happy about it
on the other hand, in the uper levels of the clergy there is lots of issues with sexual abuse, but the laiety are not like this at all, and that's the main thing that interests me with spending my time around these people
at the church here mostly grandmas, and some grandmas with their young daughters, and then the men are moslly old farmers, actually i probably was one of the youngest in the congregation (the deacon was young), as were a couple of others up the front section)
and yeah, they have that separate section, during the proceedings there was too separate women who made a speech of some sort
-

@ be9bb3c6:8f7b599a
2025-03-13 09:36:40
GM all the bodies ☕️⚡️🫂
-

@ be9bb3c6:8f7b599a
2025-03-13 09:36:20
GM
-

@ 146bda4e:ff9a07cd
2025-03-13 09:35:57
Don't borrow from loan sharks
https://www.bangkokpost.com/thailand/general/2979238/foreigners-arrested-with-144kg-of-cannabis-at-samui-airport
-

@ 52387c6b:49dbdfb2
2025-03-13 09:35:37
💯
-

@ 52387c6b:49dbdfb2
2025-03-13 09:35:23
Hanoi
-

@ 1e67de37:5c9116e4
2025-03-13 09:35:02
Why Secure Elements make a crucial difference to Hardware Wallet Security
https://www.ledger.com/why-secure-elements-make-a-crucial-difference-to-hardware-wallet-security
-

@ 1bc70a01:24f6a411
2025-03-13 09:34:59
Incredible!
-

@ 81e5cb66:17c315fa
2025-03-13 09:33:47
https://image.nostr.build/2effca472d16ab28d70c7b732de8c235b661d9fed9a5d7ced76393762c23a1c6.jpg
-

@ 61bf790b:fe18b062
2025-03-13 09:33:45
GM
I hope the waveform collapses in your favor today
-

@ 06b7819d:d1d8327c
2025-03-13 09:32:54
I came for the censorship resistance, I stayed for the unintentional breakthroughs.
#nostr nostr:note1ss2g09h7hkxwa8zqyl93j7m4wh9txn6jcrlpysh9z9vc8t3mk0gsyh0ty5
-

@ 4c800257:b47e3b2f
2025-03-13 09:32:52
JSON line structured, aka .jsonl files
the http api endpoint for fetching events will return them in this way, the receiver just scans them for line breaks to find each individual event (they are as minified json)
this is how most import/export functions are implemented for nostr
-

@ 8c133b31:05371505
2025-03-13 09:32:18
GM. Skip not let day. https://image.nostr.build/4a2005d5d4244b0f094f7081c42419dcaaa49213a2c50f65fcf6e5fac0db461b.jpg
-

@ 3eab247c:1d80aeed
2025-03-13 09:31:37
Merchant link here!
https://btcmap.org/merchant/node:8711761352
-

@ 9e915942:f8133dec
2025-03-13 09:31:01
I will never stop beating this drum. #education
"Get good at explaining things clearly so students understand that you’re competent and trust that you can teach them well. This will help you manage your classroom, especially early on in your career before you’ve developed a reputation. It will give you richer knowledge of your content. Then gradually bring in inquiry activities in targeted ways. To bring in one more analogy, you can’t build a nice house on a weak foundation. It doesn’t matter how nice the landscaping looks if the house is on a slant and basement fills with water every time it rains. Even if the landscaping is what people see when they drive by – and your favorite thing to talk about. "
https://z-cress.micro.blog/2022/12/23/explaining-well-is-foundational-to.html
-

@ 06b7819d:d1d8327c
2025-03-13 09:30:29
How Nostr’s Self-Signed Events Became an Unintentional Conceptual Breakthrough
Sometimes, the most profound innovations happen by accident. Nostr (Notes and Other Stuff Transmitted by Relays) was originally designed as a simple, censorship-resistant social media protocol. But in its design, it unintentionally solved one of the biggest problems in decentralized systems: how to create a universal, trustless data verification model without centralized issuers.
The key breakthrough? Self-signed events—a concept so simple yet so powerful that it fundamentally changes how identity, reputation, and data integrity work on the internet.
The Problem: Most Digital Identity Models Rely on Trusted Third Parties
In most identity and data verification systems, trust depends on a central authority (a government, a corporation, or a network operator). The Issuer-Holder-Verifier model—which powers systems like Self-Sovereign Identity (SSI) and Verifiable Credentials (VCs)—still assumes that:
1. An issuer must sign and vouch for the authenticity of data.
2. A verifier must check that signature against a trusted registry.
3. The holder is dependent on both parties for validation.
This model, even in its decentralized form, still reinforces external trust dependencies. It ensures that someone, somewhere, still has control over who can issue and revoke credentials.
The Nostr Breakthrough: Self-Signed, Self-Validating Data
Nostr’s design bypassed this entire structure by introducing self-signed events as the core data unit. Instead of requiring an external issuer to vouch for a message’s authenticity, the event itself proves its validity.
Here’s why this is revolutionary:
1. Every Nostr event is cryptographically signed by its creator.
• If the signature matches the public key, the event is valid.
• If anything in the message is altered, the signature breaks.
2. Verification requires no third-party trust.
• Anyone can check a signature without relying on a central authority.
• There’s no need to ask an “issuer” for validation—it’s built into the event itself.
3. No registry, revocation list, or lookup service is needed.
• Unlike the issuer-holder-verifier model, where verifiers check with an issuer, Nostr signatures are final and independent.
• The validity of a message is self-evident and self-contained.
Why This Matters: A New Paradigm for Trustless Systems
What started as a simple social media protocol accidentally created a universal model for decentralized, self-authenticating data. This breakthrough has implications far beyond Nostr:
• Decentralized Identity Without Issuers: Instead of a government or corporation issuing credentials, a person can simply sign messages proving ownership over data.
• Tamper-Proof, Uncensorable Communication: Because each event is self-authenticating, it cannot be modified or faked without breaking the cryptographic proof.
• A New Reputation Model: Trust can emerge organically by recognizing long-term, signed activity—without relying on external authorities to issue credentials.
Conclusion: Nostr as an Accidental Innovation
Nostr wasn’t created to replace digital identity systems or redesign trust models. It was just meant to be a censorship-resistant protocol for social media. But in its simplicity, it stumbled upon a fundamental conceptual breakthrough: self-validating, self-sovereign data.
This shift—from issuer-dependent verification to self-signed, universal proof—could reshape how we think about identity, credentials, and trust in a decentralized world.
-

@ 1021c892:832d6993
2025-03-13 09:29:46
GM https://m.primal.net/PeIq.png
-

@ bc575705:dba3ed39
2025-03-13 09:28:31
Got a question if I were familiar with «reverse exorcism» - so now is the right time for me to evacuate and get somewhere safe. I’m thinking Vatican City.
-

@ 6bb0082d:0146ed0a
2025-03-13 09:27:53
Good morning, Constantin! It's raining here too... ☔
-

@ 06b7819d:d1d8327c
2025-03-13 09:27:25
The Self-Sovereign Identity (SSI) movement began as a decentralized, user-controlled approach to digital identity. It aimed to reduce reliance on centralized authorities, allowing individuals to control their own identity credentials without constant oversight from governments or corporations. However, over time, the movement was co-opted into supporting state-sponsored digital identity systems, often reinforcing the very structures it originally sought to disrupt.
The Original Vision of SSI
The core idea behind SSI was to create an identity model where individuals could:
• Own and control their identity credentials without being dependent on a central authority.
• Use cryptographic proofs to verify identity claims in a peer-to-peer manner, rather than relying on centralized databases.
• Minimize surveillance and data collection, reducing the ability of governments and corporations to track identity usage.
This vision was implemented using the Issuer-Holder-Verifier model, where:
• An Issuer (such as a university or employer) provides credentials to an individual.
• The Holder (the user) stores and manages these credentials.
• A Verifier (such as an employer or service provider) checks the credentials without directly involving the issuer.
How Governments Co-Opted SSI
Despite its decentralized aspirations, SSI was gradually absorbed into government-controlled digital identity initiatives. This happened through several key mechanisms:
1. Governments Became the Primary Issuers of Identity
While SSI was designed to support a broad ecosystem of credential issuers (such as schools, employers, or banks), governments positioned themselves as the foundational issuers of identity. In many jurisdictions, state-issued credentials (such as digital passports, driver’s licenses, and national IDs) became the prerequisite for obtaining other verifiable credentials. This effectively made governments the gatekeepers of the SSI ecosystem.
2. Mandatory Identity Registration and Compliance
Many government-backed digital identity initiatives required individuals to obtain state-approved SSI credentials to access basic services. Instead of allowing voluntary, decentralized identity creation, states mandated compliance with their digital ID frameworks, turning SSI into just another state-controlled identity system.
3. Surveillance and Revocation Mechanisms
One of the original promises of SSI was that individuals could present identity proofs without revealing unnecessary personal data. However, state-backed implementations often introduced features that allowed governments to:
• Track when and where credentials were used.
• Implement revocation mechanisms, ensuring that individuals could be deplatformed or excluded from services if their credentials were revoked.
• Require verifiers to check identity credentials against government databases, reintroducing centralized control.
4. Legal and Regulatory Capture
As governments embraced digital identity systems, they introduced laws requiring businesses and institutions to accept only government-approved digital credentials. This effectively outlawed alternative self-sovereign identity models that operated outside state control.
5. Alignment with Global Digital Identity Initiatives
Organizations like the EU, World Economic Forum (WEF), and United Nations promoted digital identity frameworks that adopted SSI terminology while maintaining government and corporate control. Initiatives like the EU Digital Identity Wallet and India’s Aadhaar-linked digital identity expansion use the same issuer-holder-verifier structure but ensure that foundational identity issuance is tightly controlled by the state.
The Inevitable Shift from Self-Sovereign to State-Sanctioned Identity
Originally, SSI was meant to liberate individuals from centralized control, but in practice, it became a way for governments to modernize identity systems while retaining ultimate authority. What was once a movement about decentralization and privacy has now been largely absorbed into state-sponsored digital identity frameworks that reinforce KYC (Know Your Customer), AML (Anti-Money Laundering), and surveillance regimes.
Conclusion: The Illusion of Decentralization
While SSI frameworks still maintain some elements of user control, the movement has largely shifted toward a state-controlled identity paradigm where:
• Governments issue and regulate digital identity credentials.
• Individuals must use government-approved identity systems to access key services.
• Privacy protections and decentralization are often weakened or removed under the guise of security and compliance.
The co-option of SSI into state-sponsored digital identity models highlights a fundamental reality: governments will always seek to maintain control over identity systems, even when using decentralized-sounding frameworks. For those seeking true self-sovereign identity, the challenge now is to develop alternative systems that resist state control while remaining practically usable in an increasingly regulated digital world.
-

@ 6bb0082d:0146ed0a
2025-03-13 09:26:30
Good morning! ☕ 😎
-

@ 3f770d65:7a745b24
2025-03-13 09:26:13
Scammer
-

@ df359d2c:0a776c84
2025-03-13 09:25:13
Ale ne, to že by hodné státy dělaly?https://www.echo24.cz/a/H7aQ6/zpravy-svet-nemecko-tajna-sluzba-covid
-

@ f4db5270:3c74e0d0
2025-03-13 09:22:54
Thanks 🙏
-

@ f839fb67:5c930939
2025-03-13 09:22:17
Weird I woke up super early and couldn’t either. Must be the planets 😝
-

@ caf0d967:b663b0c8
2025-03-13 09:22:05
Good morning. It’s Thursday https://image.nostr.build/2a2e3ea2cd417ca6044a0d488c7a1e9fb1ac8d2aa623f9c6f187108b72b2e895.jpg
-

@ 77ce56f8:362f6ca7
2025-03-13 09:20:53
Had to cut the pencil grips in half....
The good days....
-

@ f839fb67:5c930939
2025-03-13 09:19:34
Jeez.
Talk about:
"I'll go down with the ship, just to watch the captain drown."
:blob_skull:
-

@ b7e453f6:9ff08e8c
2025-03-13 09:18:25
"Mobilizing" the private savings.
-

@ 47f33c19:9b69b6a3
2025-03-13 09:17:32
March 13th is Bitcoin National Jewel Day
#Bitcoin #BitcoinDayOfTheYear #NationalJewelDay #BitcoinNationalJewelDay
https://cdn.satellite.earth/1f23200b2ef85acff9283b429116a9609a0b4f507f13e0c0e0b1c1dfba4c6b6a.jpg
-

@ 6fb26601:275bf8bb
2025-03-13 09:16:14
My wife agrees
-

@ a9434ee1:d5c885be
2025-03-13 09:15:05
:110percent:
"I'll just LLM a UI for this" = ngmi
However, agents + a great UI package that literally doesn't let you make ugly stuff = pretty promising 😉
-

@ f839fb67:5c930939
2025-03-13 09:14:18
gm and pv everyone. Woke up for no reason at 3:30 ... this should be a fun day. For sure no OT today.
-

@ 2123cc78:7c274d59
2025-03-13 09:12:44
No kidding nostr:nprofile1qqs043gn588da502h36q0sffjay9m69mk28dmm805qtgzl7g6n6q0fgm3e3d3 Appreciate the note too. Am just trying to provide a more complete assessment of what is actually going on here in Shanghai.
-

@ fac513a1:d4f407a5
2025-03-13 09:12:28
Will get worse over the course of the year
-

@ 06b7819d:d1d8327c
2025-03-13 09:11:56
Self-Validating Data vs. the Issuer-Holder-Verifier Model
When verifying data authenticity, two primary models exist: self-validating data and the issuer-holder-verifier model. Both use cryptographic techniques, but they differ fundamentally in how trust is established and who has control over verification.
Issuer-Holder-Verifier Model: Trust in Third Parties
The issuer-holder-verifier (IHV) model is commonly used in digital identity systems and credential verification, such as government-issued IDs, professional certifications, and financial credentials. In this model:
1. Issuer – A trusted entity (such as a government or certification authority) issues a signed credential to the holder.
2. Holder – The recipient stores and presents the credential when required but does not have the means to verify it independently.
3. Verifier – A third party checks the credential by verifying the issuer’s signature, confirming its validity before accepting the holder’s claim.
The IHV model depends on centralized trust. Verifiers must trust issuers, and holders rely on verifiers to accept their credentials. This creates several challenges:
• Limited Self-Sovereignty – Holders cannot verify or prove their credentials without intermediaries.
• Dependency on Issuers – If an issuer is compromised or untrustworthy, the system breaks down.
• Revocation Mechanisms – Issuers can revoke credentials at any time, requiring verifiers to check with them before accepting data.
• Intermediary Reliance – Verifiers need access to issuer-controlled cryptographic keys or revocation lists, adding complexity and potential points of failure.
While this model is useful for regulated environments, it introduces central points of control, limiting decentralization and resilience.
Self-Validating Data: Trustless and Decentralized
Self-validating data, in contrast, embeds cryptographic validation directly into the data itself. Anyone with the right cryptographic tools can verify its authenticity without needing permission or confirmation from a third party.
This approach eliminates intermediary dependencies and has several advantages over the IHV model:
• Anyone Can Verify – Verification is not restricted to certain entities; anyone with the necessary tools can confirm authenticity.
• No External Checks Required – Once signed, data remains verifiable without contacting an issuer.
• Censorship Resistance – Since verification does not depend on a central authority, data cannot be revoked or invalidated externally.
• Long-Term Verifiability – Because the data itself contains everything needed for verification, it remains valid even if the original issuer disappears.
How Nostr Signed Events Exemplify Self-Validating Data
Nostr’s signed events are a strong example of self-validating data in practice. Every message or event in Nostr is cryptographically signed by the sender using their private key. This means:
• Each event is independently verifiable – Anyone with the sender’s public key can confirm the signature without relying on a third party.
• Tamper detection is built-in – If any part of the event is altered, the signature becomes invalid, making modifications obvious.
• Decentralized verification – There is no need for an external registry or authority to check authenticity.
Choosing the Right Model
The issuer-holder-verifier model is useful in structured environments where issuers need to maintain control over credentials, such as identity verification and professional certifications. However, self-validating data is superior for decentralized systems that prioritize trust minimization, censorship resistance, and long-term verifiability.
As decentralized technologies evolve, self-validating data models—such as Nostr signed events, Bitcoin transactions, and cryptographic proofs—are becoming increasingly relevant. They offer an alternative to traditional trust-based systems, ensuring that data integrity and authenticity can be verified by anyone, without dependence on intermediaries.
-

@ fac513a1:d4f407a5
2025-03-13 09:11:47
Big Mike struggling for vitality 😂
-

@ 77ce56f8:362f6ca7
2025-03-13 09:11:41
Not asking about editing your own post.
Asking about the propose edit function on amethyst
-

@ 83d8bb23:2ceade2e
2025-03-13 09:10:05
Hi- some email communication is due to go out in the next day or 2.
-

@ fac513a1:d4f407a5
2025-03-13 09:08:40
Any good insight to share? Keen to learn
-

@ 7fa56f5d:751ac194
2025-03-13 09:07:43
Yeah it's an exaggeration but lots of menial work can be offloaded to them. Taste and experience become invaluable to refine the agent output.
-

@ f40832e2:bcbf511e
2025-03-13 09:05:04
トランプ政権、公文書燃やしまくってて†神†
数十年レベルでトランプの呪いが付き纏いそう
まあ国民が選んだからしゃーない
-

@ 0e05cb33:2082a99e
2025-03-13 09:04:36
The typical Canadian is materialistic and conventional.
-

@ ec42c765:328c0600
2025-03-13 09:04:35
寝過ぎた
-

@ 480ec1a7:a611c838
2025-03-13 09:02:39
I like the clean looking interface mostly.
I like that it supports kind20 ;p
I like the nsecbunker support
-

@ fd208ee8:0fd927c1
2025-03-13 09:01:12
Yeah, I'm focusing on the "Lone Wolves" we've marked as suppliers, as we have regular interaction with them and they're less-likely to just get bored and wander off. They're more like independent contractors, where you have a real business relationship.
-

@ 8c592393:5c132608
2025-03-13 09:00:55
ああちゃんと雑をやるとちゃんと遅いんだって思いました
-

@ 253baa88:d9e7b709
2025-03-13 09:00:37
🎙️ Random Bitcoin Podcast Spotlight:
🎵 Show: What Bitcoin Did
📺 Episode: BITCOIN & THE GLOBAL ECONOMIC REORDERING w/ Matthew Pines
📅 Date: 2024-12-21
🔗 Listen here:
https://url.hodljuice.app/3uOywK
Discover something new! This recommendation is posted twice daily.
#bitcoin #podcast #bitcoinpodcast
-

@ 87e98bb6:8d6616f4
2025-03-13 09:00:34
They are not building a reserve of altcoins. They're just putting all the altcoins together so they're accounted for. Currently they're stored all over the place in evidence lockers, etc. and no one knows how many there are. The altcoins can be sold or traded.
On the other hand, the Bitcoin reserve is not to be sold and will be added to.
-

@ 8c592393:5c132608
2025-03-13 09:00:31
メモ化を怠って爆遅になっている社内アプリを昨日見たので、まあ…
-

@ f40832e2:bcbf511e
2025-03-13 09:00:05
https://x.com/ren_bocchi3/status/1899709509377130988
-

@ a9434ee1:d5c885be
2025-03-13 08:57:49
I'm also having a hard time trusting lone wolves enough to pay for their services, if there's nothing beyond them to make 'em reliable?
Lone wolf ded = service ded
-

@ 460c25e6:ef85065c
2025-03-13 08:56:01
https://cdn.satellite.earth/f017c7d8494ee1e560fbd3b9203937638cd78e3cef707da91bb37846d67bddb5.jpg
-

@ 8c592393:5c132608
2025-03-13 08:55:34
おもしろ話
-

@ fd208ee8:0fd927c1
2025-03-13 08:55:11
Lone Wolves can work on small, simple projects. Microapps and plug-ins, and stuff.
They cannot build enterprise-level systems.
-

@ f40832e2:bcbf511e
2025-03-13 08:54:42
あ Gemma 3動かすの忘れてた
-

@ 9ca0bd74:4052340b
2025-03-13 08:54:35
https://en.m.wikipedia.org/wiki/Dolbear%27s_law#:~:text=Dolbear%20expressed%20the%20relationship%20as,chirping%20of%20the%20field%20cricket.
nostr:nevent1qqsxata3285uxxrfg75ndjw7n8j0qc3sw8d06ugz2uk3kpu8v92kdwcppemhxue69uhkummn9ekx7mp0qgs9nlhyh988zvwfcqun628au6mxxhq3x5nvfka6mxh82z4fvpn0plcrqsqqqqqpv3hncp
-

@ 8c592393:5c132608
2025-03-13 08:54:24
実際わざわざデカくする意味はないと思うので今回はそれでよさそう
-

@ fac513a1:d4f407a5
2025-03-13 08:53:39
Great insight Peter thanks. Often people that have never even been to Asia have a very strong opinion…
-

@ 8c592393:5c132608
2025-03-13 08:53:20
わからんぴ。一個のレコードが小さいと、ディスクから持ってくるとき〜 の方が支配的な気がするかも
-

@ 460c25e6:ef85065c
2025-03-13 08:52:57
People have been talking about key rotation for over 3 years. Still no implementation.
-

@ f4db5270:3c74e0d0
2025-03-13 08:52:41
I think it will be all light ochres and blues with golden highlights. I would also like to include a small solitary figure. I don't know yet...
-

@ 8c592393:5c132608
2025-03-13 08:52:13
単純に端から順に比較してるんだとして、ほとんどのケースで false に終わることを考えると処理は短絡するはずで、キクにしても線形には効かないはずだという直感がある
-

@ 42828f49:7228068a
2025-03-13 08:51:03
They will probably not take digits in the bank accounts but will use the bank account as collateral to get a loan with their bankers.
But the outcome will be the same in the long run.
And the 'experts' couldn't see why dat prices are too damn high. Lol
-

@ f40832e2:bcbf511e
2025-03-13 08:49:57
男が産めるのうんこだけ♪男が産めるのうんこだけ♪
-

@ 8c592393:5c132608
2025-03-13 08:48:34
なんでだ… 1回のキーの比較でなぞるバイト列が短く済むからか…?
-

@ 8c592393:5c132608
2025-03-13 08:47:34
そこで言うパフォーマンスって速度に効くの?
-

@ 9648ca01:474eb2ea
2025-03-13 08:47:22
It's amazing. When I'm not working I have to buy extra eggs cos I'm smashing them. I go back to work, time poor, the 4 eggs a day from our chooks start to pile up. Quiche time. 10 in this bad boy
-

@ f40832e2:bcbf511e
2025-03-13 08:46:12
https://x.com/oseti2215/status/1899787639932215326
-

@ 8c592393:5c132608
2025-03-13 08:44:07
任意文字列が入ってくるなら半分にはならんよなと思って聞いていた
-

@ 8c592393:5c132608
2025-03-13 08:43:45
ああそうか文字列データ側に制約 (32-bytes lowercase hex-encoded) があるから小さくできるのか。前提が頭からすっぽ抜けていた
-

@ a60e79e0:1e0e6813
2025-03-13 08:42:05
nostr:nevent1qqsptxft3plky8htnfufp90sumqcc7nz9knag5xlql9wlyuxtxn3rygpzamhxue69uhhyetvv9ujumn0wd68ytnzv9hxgtczyprqcf0xst760qet2tglytfay2e3wmvh9asdehpjztkceyh0s5r9cqcyqqqqqqgk9y6zs
-

@ bc575705:dba3ed39
2025-03-13 08:41:31
Not sure what's tighter, my jeans after laundry day or the current crypto market.
-

@ 8c592393:5c132608
2025-03-13 08:41:22
人間に読ませる気なさすぎるファイル名で笑う
-

@ 4ca4f553:83d83ac0
2025-03-13 08:41:20
Been there done that.
10 years ago I would have been all over it 😅
-

@ 0fea00d8:24721d4b
2025-03-13 08:41:14
Yikes
4 kids too
Its bleak out there!
Also "its not a sexual one" 😅
-

@ 2123cc78:7c274d59
2025-03-13 08:40:10
While I’m sure David Bailey is a smart guy, he really has to pump the breaks on all of these “China is buying BTC” posts.
Much as I shared last week, I’m fairly confident that China has been buying BTC for a number of years. Not in any size mind you, but to provide optionality. To borrow a phrase, China has been STAYING HUMBLE AND STACKING SATS. This is just how the Chinese decision makers do things here.
What I can promise you is that no one is waking up anytime in the near future to find “China bidding Bitcoin in size”.
https://m.primal.net/PeGy.jpg
-

@ 4ca4f553:83d83ac0
2025-03-13 08:39:44
💯🤣
You know what, dev won't do nothing! 🤣
That's settled. I'm gonna reprogram the way I play the game myself!
Acting like there's no underworld. The sky part is pretty nice so I'll keep it.
And yeah no construction, it's just too nerdy I don't have time for this anymore 😅
Actually I'm gonna play TotK like BotW and pretend it's an extension with islands in the sky 😁
What could go wrong? 😅
-

@ 8c592393:5c132608
2025-03-13 08:38:25
1LDB
-

@ 8c592393:5c132608
2025-03-13 08:37:51
DBの内側のこと全部教えてくれるうちじょうさん
-

@ 8c592393:5c132608
2025-03-13 08:37:02
もぴ
-

@ bc575705:dba3ed39
2025-03-13 08:35:58
When in debt, join OnlyFans. 😅 https://www.buzzfeed.com/larryfitzmaurice/harry-potter-star-jessie-cave-is-on-onlyfans-now
-

@ e07773a9:4a98108a
2025-03-13 08:35:51
The tall building is on Franklin St near Victoria Square. It is a pretty boring building in colour but the stairs caught my eye and I thought it could look good in black and white. I find it difficult to picture how things will look in black and white so have just been experimenting to see what works and what doesn’t.
The last one was in Festival Plaza, the bottom of the Eos by Skycity building I think.
-

@ 8c592393:5c132608
2025-03-13 08:35:34
なんでそんなに減るんだ
-

@ a9434ee1:d5c885be
2025-03-13 08:35:14
> Now repeat this for every single Nostr app.
Then we need some serious clarity on who has what shard etc...
Ideally you have two categories then: Apps & Co-Signers
-

@ 8c592393:5c132608
2025-03-13 08:35:07
そんな減るんだ
-

@ 06b7819d:d1d8327c
2025-03-13 08:34:44
Self-Validating Data and How Nostr Signed Events Fit the Model
Self-validating data is information that carries intrinsic proof of its authenticity and integrity, eliminating the need for external validation from a central authority. This approach enhances security, reduces reliance on intermediaries, and improves data portability across different systems.
What is Self-Validating Data?
Self-validating data includes built-in mechanisms to confirm its correctness without requiring external verification. Key properties of self-validating data include:
1. Cryptographic Signatures – The data includes a signature that can be independently verified against a known public key.
2. Tamper Resistance – Any modification to the data invalidates the signature, making alterations detectable.
3. Decentralized Verification – Anyone with the necessary cryptographic tools can validate the data, rather than relying on a central authority.
Examples of self-validating data include signed blockchain transactions, cryptographic proofs, and digital signatures on documents.
Nostr Signed Events as Self-Validating Data
Nostr (Notes and Other Stuff Transmitted by Relays) is a decentralized protocol designed for censorship-resistant communication. At its core, Nostr uses signed events, which fit the model of self-validating data perfectly. Here’s how:
1. Every Event is Signed – Each message or event in Nostr is signed by the sender using their private key. The signature ensures that the message genuinely comes from the claimed author.
2. Public Key Verification – Anyone can use the sender’s public key to verify the signature. If the signature is valid, it confirms that the data has not been tampered with.
3. Tamper Detection – If any part of the event (such as the content or timestamp) is altered, the signature becomes invalid. This makes forgery and modification impossible without the sender’s private key.
4. Decentralized Validation – Since signatures can be verified independently by any participant in the network, no centralized authority is required to vouch for the authenticity of events.
Why This Matters
In traditional systems, data validation often depends on third parties, which introduces risks such as fraud, censorship, and single points of failure. Nostr’s signed events remove these risks by ensuring that data authenticity is provable by design. This makes Nostr a powerful tool for decentralized social networks, encrypted messaging, and other applications where trustless verification is crucial.
As more systems adopt self-validating data models, we move toward a world where users can exchange information securely without needing to place trust in intermediaries. Nostr is a strong example of how cryptographic signatures enable this paradigm shift.
-

@ f4db5270:3c74e0d0
2025-03-13 08:33:45
A beginning of sunset on the beach.
I don't know where this will take me...
https://creatr.nostr.wine/creator/content/552b45c2-ffd7-43df-9a2a-6b7d3335f484.jpg
#art #artstr
-

@ a9434ee1:d5c885be
2025-03-13 08:32:45
Yup, Frost is the most elegant backwards-compatible way.
-

@ 310db374:f904a65f
2025-03-13 08:31:56
GM, have a day 🤙
-

@ 3f770d65:7a745b24
2025-03-13 08:31:56
Hmm. There isn't a specific one that people use. I like this idea though.
-

@ 310db374:f904a65f
2025-03-13 08:31:48
GM, have a day 🤙
-

@ b75b9a31:6f3c1505
2025-03-13 08:29:53
Haggard 🤙
-

@ a9434ee1:d5c885be
2025-03-13 08:28:28
Lol, I wish.
1️⃣ The agent has terrible style/taste
2️⃣ The agent leaves all the hard work for us, so that now we only do hard work
-

@ 8c592393:5c132608
2025-03-13 08:26:34
Nostr を終わらせる方法のヒントじゃん