I guess I would say, look into the IME if the CPU is is inte...

npub1m50e65pv09ga73lglrkjgh5tlgj006pv9rce8xdg7rn5kps38gssh2glzq
hex
e121b763c2c3930c1d4320160f9816d086cf3c8fb21b829af394c36870d7b833nevent
nevent1qqswzgdhv0pv8ycvr4pjq9s0nqtdppk08j8myxuznteefsmgwrtmsvcprpmhxue69uhhyetvv9ujuem4d36kwatvw5hx6mm9qgsd68ua2qk8j5wlgl503mfyt69l5f8haqkz3uvnnx50pe6tqcgn5ggu2x5q4Kind-1 (TextNote)
↳ 回复 事件不存在
56bc4a9efcf119b5064e5afeb66a0582598f6ebee75e85cbd1a842f575259135...
I guess I would say, look into the IME if the CPU is is intel and why a lot of people opt for coreboot. The OS isn't the only vector of attack. Either way, I am not saying you can't have useful tools. This is also called an anti-pattern and is just as identifying as regular patterns. Having no digital footprint when you are a known person in meatspace creates a profile all its own.
This is beside the point. Most people ARE harmless so the intel agencies aren't wrong. You can try to obscure your network traffic, preserve your privacy, and control your UTXOs meticulously.
1, ONE counterparty you transact with can ruin all of that work. I think that's what I am trying to get across here. Using money (debt to other people for their good or service) necessarily involves public data. Use cash dollars, use Monero, use Bitcoin, use gold, whatever. No one is going to get paid and say "I wonder how I got this money, and from whom?" That just doesn't happen.
Using techniques to obsure your traffic so the average thug doesn't come for your corn is DOABLE. Obscuring you traffic so that no nation state can know your dealings? Impossible.
原始 JSON
{
"kind": 1,
"id": "e121b763c2c3930c1d4320160f9816d086cf3c8fb21b829af394c36870d7b833",
"pubkey": "dd1f9d502c7951df47e8f8ed245e8bfa24f7e82c28f19399a8f0e74b06113a21",
"created_at": 1777911539,
"tags": [
[
"alt",
"A short note: I guess I would say, look into the IME if the CPU ..."
],
[
"e",
"077c8a6f52781fc379ea580b4308c28abf3c265d31b8bc366f2866ffbb050f0f",
"wss://relay.coinos.io/",
"root",
"fcf70a45cfa817eaa813b9ba8a375d713d3169f4a27f3dcac3d49112df67d37e"
],
[
"e",
"54336af0a76dbc8b0aa3f850e2c5c01143ca2da85b85e150aecd01aa222baab9",
"wss://nos.lol/",
"",
"dd1f9d502c7951df47e8f8ed245e8bfa24f7e82c28f19399a8f0e74b06113a21"
],
[
"e",
"24c8067d692b499c27a440639cd2599e0bb9815a8a5022e8f54b48f02b32218d",
"wss://nostr.wine/",
"",
"4c800257a588a82849d049817c2bdaad984b25a45ad9f6dad66e47d3b47e3b2f"
],
[
"e",
"396507ebc8b3133896d50d413b38cb0f1764d9400a94ff3c32362cff817787b2",
"wss://relay.damus.io/",
"",
"dd1f9d502c7951df47e8f8ed245e8bfa24f7e82c28f19399a8f0e74b06113a21"
],
[
"e",
"9dbc938d2ceb1876637f7a17013498e5f5466869e5c1181df91b760c87f47e21",
"wss://nostrelites.org/",
"",
"55f573b651eff351db57b0601d23022d8c532f9825db10a5733ebf39be4aa21b"
],
[
"e",
"38d3be11f501a510c71630b244dcc44631547de45fd19b73a51263858e47c767",
"wss://relay.primal.net/",
"",
"dd1f9d502c7951df47e8f8ed245e8bfa24f7e82c28f19399a8f0e74b06113a21"
],
[
"e",
"56bc4a9efcf119b5064e5afeb66a0582598f6ebee75e85cbd1a842f575259135",
"wss://nostrelites.org/",
"reply",
"55f573b651eff351db57b0601d23022d8c532f9825db10a5733ebf39be4aa21b"
],
[
"p",
"fef0255b80828ca8d34c34ed3a5cb9b2f823c594090577d12d00bc6798a9d3f3",
"wss://relay.damus.io/"
],
[
"p",
"fcf70a45cfa817eaa813b9ba8a375d713d3169f4a27f3dcac3d49112df67d37e",
"wss://bcast.girino.org/"
],
[
"p",
"dd1f9d502c7951df47e8f8ed245e8bfa24f7e82c28f19399a8f0e74b06113a21",
"wss://relay.primal.net/"
],
[
"p",
"4c800257a588a82849d049817c2bdaad984b25a45ad9f6dad66e47d3b47e3b2f",
"wss://nostr.wine/"
],
[
"p",
"55f573b651eff351db57b0601d23022d8c532f9825db10a5733ebf39be4aa21b",
"wss://theforest.nostr1.com/"
],
[
"client",
"Amethyst"
]
],
"content": "I guess I would say, look into the IME if the CPU is is intel and why a lot of people opt for coreboot. The OS isn't the only vector of attack. Either way, I am not saying you can't have useful tools. This is also called an anti-pattern and is just as identifying as regular patterns. Having no digital footprint when you are a known person in meatspace creates a profile all its own.\n\nThis is beside the point. Most people ARE harmless so the intel agencies aren't wrong. You can try to obscure your network traffic, preserve your privacy, and control your UTXOs meticulously.\n\n1, ONE counterparty you transact with can ruin all of that work. I think that's what I am trying to get across here. Using money (debt to other people for their good or service) necessarily involves public data. Use cash dollars, use Monero, use Bitcoin, use gold, whatever. No one is going to get paid and say \"I wonder how I got this money, and from whom?\" That just doesn't happen. \n\nUsing techniques to obsure your traffic so the average thug doesn't come for your corn is DOABLE. Obscuring you traffic so that no nation state can know your dealings? Impossible.",
"sig": "45eab8a8c8606f7d582eb29894344e153cfece25784bd82b363e8166dcc4b2e1acbd6173b803a604fcba92a3411c7ca07a851d2f87fe1be45a4a34f7b3ef0484"
}