what you leave out is that their systems can't identify actu...

mleku

npub1fjqqy4a93z5zsjwsfxqhc2764kvykfdyttvldkkkdera8dr78vhsmmleku

hex

e4515239157be1b4b00a2fe3ffd40514e252bb63bb0e605f36dbb16c81b5928b

nevent

nevent1qqswg52j8y2hhcd5kq9zlcll6sz3fcjjhd3mkrnqtumdhvtvsx6e9zcprpmhxue69uhhyetvv9ujuem4d36kwatvw5hx6mm9qgsyeqqz27jc32pgf8gynqtu90d2mxztykj94k0kmttxu37nk3lrktc0k22lm

Kind-1 (TextNote)

2026-05-03T20:34:14Z

↳ Reply to JackTheMimic (npub1m50e65pv09ga73lglrkjgh5tlgj006pv9rce8xdg7rn5kps38gssh2glzq)

Guy, I do cyber security and privacy for a living. I am not some novice. I am not ignoring the issue. I am stating that you create a larger problem tr...

what you leave out is that their systems can't identify actual threats sometimes because the signal is too small - their pattern is looking for strong signals, not small ones nor small threats.

for this reason they can ignore the mutterings between people that one day turns into an actual threat suddenly.

so, yeah, there's a third case. muting the signal level is one of them. using new addresses every time is a really easy one and why Satoshi used UTXO model for transactions. the signal falls to the noise floor because it is hard to connect any of the transactions together. if timing can be correlated to other data they get via other methods, then it may enter into the threat analysis, but if timing correlations are weak that keeps it under the noise floor.

they don't chase the little noises because 99.999% of the time those little noises don't represent a credible threat to anything. thus, many little hidden signals with weak correlations protect you by being illegible.

Raw JSON

{
  "kind": 1,
  "id": "e4515239157be1b4b00a2fe3ffd40514e252bb63bb0e605f36dbb16c81b5928b",
  "pubkey": "4c800257a588a82849d049817c2bdaad984b25a45ad9f6dad66e47d3b47e3b2f",
  "created_at": 1777840454,
  "tags": [
    [
      "e",
      "077c8a6f52781fc379ea580b4308c28abf3c265d31b8bc366f2866ffbb050f0f",
      "wss://relay.nos.social/",
      "root",
      "fcf70a45cfa817eaa813b9ba8a375d713d3169f4a27f3dcac3d49112df67d37e"
    ],
    [
      "e",
      "be33ac169804801c722f908e6261a1f04ed5ea3be7d5dd4ef2b9f6af52392452",
      "wss://relay.primal.net/",
      "reply",
      "dd1f9d502c7951df47e8f8ed245e8bfa24f7e82c28f19399a8f0e74b06113a21"
    ],
    [
      "p",
      "fef0255b80828ca8d34c34ed3a5cb9b2f823c594090577d12d00bc6798a9d3f3"
    ],
    [
      "p",
      "fcf70a45cfa817eaa813b9ba8a375d713d3169f4a27f3dcac3d49112df67d37e"
    ],
    [
      "p",
      "dd1f9d502c7951df47e8f8ed245e8bfa24f7e82c28f19399a8f0e74b06113a21"
    ],
    [
      "client",
      "smesh",
      "https://smesh.mleku.dev"
    ]
  ],
  "content": "what you leave out is that their systems can't identify actual threats sometimes because the signal is too small - their pattern is looking for strong signals, not small ones nor small threats.\n\nfor this reason they can ignore the mutterings between people that one day turns into an actual threat suddenly.\n\nso, yeah, there's a third case. muting the signal level is one of them. using new addresses every time is a really easy one and why Satoshi used UTXO model for transactions. the signal falls to the noise floor because it is hard to connect any of the transactions together. if timing can be correlated to other data they get via other methods, then it may enter into the threat analysis, but if timing correlations are weak that keeps it under the noise floor.\n\nthey don't chase the little noises because 99.999% of the time those little noises don't represent a credible threat to anything. thus, many little hidden signals with weak correlations protect you by being illegible.",
  "sig": "bd9e3b2c8951d81ebfdc9a2f3c145bfbbcf294050f37051419f3ed578fe06dcbe1ed6e61a7054953b77fb52f74d8fe0b34c8f9dba7132e290c41f7a6ecbbf688"
}