Max

Max

Praxeologist ~ Cryptoanarchist ~ Cypherpunk

npub

npub1klkk3vrzme455yh9rl2jshq7rc8dpegj3ndf82c3ks2sk40dxt7qulx3vt

pubkey (hex)

b7ed68b062de6b4a12e51fd5285c1e1e0ed0e5128cda93ab11b4150b55ed32fc

nprofile

nprofile1qqst0mtgkp3du662ztj3l4fgts0purksu5fgek5n4vgmg9gt2hkn9lqprf58garswvaz7tmjv4kxz7fwva6kcat8w4k82tnddajs2a4ngs

动态 (272)

The Engineering Choice Between Complicated and Complex

Bitcoin converts a complex monetary problem into a complicated protocol, absorbing irreducible uncertainty into deterministic rules any node operator can verify.

Kind-30023 (Article)

2026-05-06T12:18:20Z

↳ 回复 事件不存在

6d47fafab98961eaf5921a44d8e972f09f1342f44b8fc5e59add10ef537d78fc

To be fair, I'd you only read one book of Rothbard, it's Man Economy and State.

Kind-1 (TextNote)

2026-05-04T09:23:29Z

Another non-nostr app on nostr:nprofile1qqs83nn04fezvsu89p8xg7axjwye2u67errat3dx2um725fs7qnrqlgpz4mhxue69uhhyetvv9ujuerpd46hxtnfduhsz9mhwden5te0wfjkcc...

Another non-nostr app on nostr:nprofile1qqs83nn04fezvsu89p8xg7axjwye2u67errat3dx2um725fs7qnrqlgpz4mhxue69uhhyetvv9ujuerpd46hxtnfduhsz9mhwden5te0wfjkccte9ec8y6tdv9kzumn9wshszrnhwden5te0dehhxtnvdakz7adgsu4 ! https://zapstore.dev/apps/naddr1qqtxxmmd9eek7mrpwf5h5ety9enxjun9v3hhwmsprpmhxue69uhhyetvv9uju7npwpehgmmjv5hxgetkqgstd4g3dmu93dcxnzu5rs6p5k7xtvjdvknc3ncwd0zxamr3vwgm5fsrqsqqqlst20nge2 nostr:nprofile1qqstd4g3dmu93dcxnzu5rs6p5k7xtvjdvknc3ncwd0zxamr3vwgm5fspz4mhxue69uhhyetvv9ujuerpd46hxtnfduhszrnhwden5te0dehhxtnvdakz7qg4waehxw309ahx7um5wghx77r5wghxgetk9u7ux9ly

Kind-1 (TextNote)

2026-05-01T08:04:04Z

↳ 回复 事件不存在

118c2159d8cf55348535a0d2d275f26ff5189ff4416e78a10859b77e508f8033

Thats true that key compromise is the same.

Kind-1 (TextNote)

2026-05-01T07:19:05Z

↳ 回复 726a1e26... (npub1wf4pufsucer5va8g9p0rj5dnhvfeh6d8w0g6eayaep5dhps6rsgs43dgh9)

Video app on Nostr? It should pull Youtube videos. Git collaboration tools? It should show me repos...

Makes sense, worth the extra effort.

Kind-1 (TextNote)

2026-05-01T05:54:26Z

The Price of Patience

Hoarding is not low time preference; only lending expresses it. Wealth lowers time preference via diminishing marginal utility, not the reverse.

Kind-30023 (Article)

2026-01-07T18:57:29Z

Curated Feeds: A Simpler Alternative to DVM Feeds

Replace DVM request/response overhead with simple replaceable events. Publishers maintain feed lists, clients just subscribe. No round trips, no privacy leakage

Kind-30023 (Article)

2025-11-28T18:35:02Z

Inside Marmot: Six Specs That Make Private Group Messaging Work

Six protocol specs define how the Marmot Protocol delivers fully encrypted group messaging on Nostr without centralized servers or metadata leaks.

Kind-30023 (Article)

2026-03-10T15:52:16Z

Securing the Second Realm

Security in autonomous zones means making attack uneconomical through deterrence, distributed defense, and eternal vigilance against any protector becoming predator.

Kind-30023 (Article)

2026-01-15T10:49:17Z

No Papers Required: How Zapstore Breaks the App Store Checkpoint

Developer KYC creates chokepoints that authoritarian governments ruthlessly exploit. Zapstore restores permissionless software distribution using cryptographic identity instead of government papers.

Kind-30023 (Article)

2025-12-15T13:09:06Z

The Quiet Departure

The loudest revolutions fail; the quiet ones succeed. We do not protest or petition. We build alternatives and simply leave.

Kind-30023 (Article)

2025-12-31T09:49:42Z

Nostr-Native Distributed Storage System

The latest iteration of Garland, a privacy-preserving distributed storage system built on Nostr and Blossom, using erasure coding for durability and single-key recovery.

Kind-30023 (Article)

2025-12-07T07:40:21Z

Vanishing Secrets: Auto-Wipe Your Clipboard on Qubes OS

One command in your Qubes template installs `xsel` and creates an autostart service that wipes your clipboard 30 seconds after you copy anything. Works on Debian, Fedora, and Whonix minimal templates.

Kind-30023 (Article)

2025-12-01T18:40:01Z

Verify Anyone on Any Channel

A simple challenge-response app can verify Nostr identities across any anonymous channel by querying the follow graph users already built.

Kind-30023 (Article)

2026-02-07T12:44:51Z

Strategic Intelligence for Freedom-Builders: Paul Rosenberg's Quarterly Newsletter

Rosenberg predicted Bitcoin in fiction seven years early. His quarterly newsletter delivers strategic intelligence for freedom-builders, not commentary for readers.

Kind-30023 (Article)

2026-01-03T11:24:07Z

The Predator's Pedestal

The state is not society's protector but its predator, surviving through ideology and intellectual capture, growing through war, vulnerable to withdrawn consent.

Kind-30023 (Article)

2025-12-25T13:29:53Z

Your Software Runs on Enemy Infrastructure

Freedom tech projects build censorship-resistant tools on censorship-susceptible platforms. The Nostr stack offers a coherent migration path for sovereign development infrastructure.

Kind-30023 (Article)

2026-02-10T23:07:13Z

The Hard Part of Multi-Device Messaging

MIP-06 proposes the protocol basis for White Noise multi-device group membership, letting each device securely join as its own MLS leaf.

Kind-30023 (Article)

2026-03-29T13:44:42Z

When They Come for the Protocols

Governments cannot kill open protocols, so they imprison the humans who write them, spending $275 billion per year to catch nothing.

Kind-30023 (Article)

2026-02-06T16:04:52Z

The Colossus Falls - How to End All War

Wars persist because each generation consents to fight them; a generation that refused would be history's last to die in trenches.

Kind-30023 (Article)

2026-01-05T12:19:27Z

The Mathematics That Bridges Bitcoin: From BitVM to Argo

Cryptographic enforcement succeeds where trust fails, and nowhere does this principle matter more than in Bitcoin's quest for trustless bridges.

Kind-30023 (Article)

2026-01-25T10:25:25Z

Sifting Through the Archive: Private Set Membership for Blossom

Binary Fuse filters let Blossom clients privately check which files exist on a server - download a compact filter once, query locally with zero server load, and use delta lists for real-time accuracy.

Kind-30023 (Article)

2025-11-29T14:44:25Z

The Price of Patience

Hoarding is not low time preference; only lending expresses it. Wealth lowers time preference via diminishing marginal utility, not the reverse.

Kind-30023 (Article)

2026-01-07T18:57:20Z

The Key Inside the Ciphertext: A Full Introduction to PIPEs v2

PIPEs v2 turns spend conditions into key-recovery conditions, letting Bitcoin enforce proof-gated authorization through ordinary Schnorr signatures and extraordinary off-chain cryptography.

Kind-30023 (Article)

2026-04-21T12:31:37Z

Own Your Outbox: Running Haven as Your Personal Nostr Relay

Your relay, your rules. Haven bundles four relay functions into one binary, easily deployable on a cheap VPS in an afternoon.

Kind-30023 (Article)

2025-12-28T16:46:34Z

Proving You Belong Without Saying Who You Are

Zero-knowledge proofs let Nostr users prove they're trusted without revealing their identity, enabling anonymous rate-limiting and reputation-gated relay access.

Kind-30023 (Article)

2025-12-04T15:52:14Z

The Third Option

Libertarian strategy gains more from building parallel institutions that coexist with state power than from reform or territorial exit.

Kind-30023 (Article)

2026-01-14T14:19:51Z

Trust Without Ceremonies: How Nostr Fixed the Web of Trust

PGP's web of trust failed because it demanded explicit rituals. Nostr succeeds by extracting trust from ordinary social behavior.

Kind-30023 (Article)

2026-01-01T12:12:12Z

The Mobile Podcast Setup That Actually Works

Testing earbuds, wired mics, and USB-C wireless systems revealed the Yealink BH71 as the best mobile podcast solution for GrapheneOS.

Kind-30023 (Article)

2026-02-03T18:15:56Z

Owned by No One: Solving Nostr's Key Rotation Problem

Nostr's greatest strength - that you own your identity through cryptographic keys - becomes its greatest weakness when keys are lost or stolen. This post introduces two simple, social solutions that let users mark compromised keys and rotate to new ones through community verification, without complex cryptography or pre-planning.

Kind-30023 (Article)

2025-11-20T15:51:42Z

Self-Liquidating Credit: The Instrument That Destroys Itself

Bills of exchange carried a built-in death date and extinguished themselves as goods reached market; modern debt compounds forever by design.

Kind-30023 (Article)

2026-02-11T12:00:17Z

Seven Resolutions

Freedom requires commitment, not sentiment. Seven resolutions define the ethical foundation for those who would build a voluntary society instead of complaining.

Kind-30023 (Article)

2025-12-31T15:52:01Z

The Root of Money

Money is neither vice nor virtue but the material expression of human judgment exercised through time. Only parasites hate it.

Kind-30023 (Article)

2026-01-16T23:28:51Z

The Last Leak: How MIP-05 Closes the Push Notification Surveillance Hole

Push notifications let governments track your messaging habits. MIP-05 encrypts device tokens with ephemeral keys, ensuring notification servers learn absolutely nothing.

Kind-30023 (Article)

2025-12-20T09:12:02Z

Sign What You Cannot See: A Field Guide to Blind Signatures

Four decades of blind signatures show that one algebraic trick, letting someone sign what they cannot see, protects ecash and CoinJoin.

Kind-30023 (Article)

2026-03-04T21:54:02Z

Disappear Into the Crowd: Wasabi's Hidden Payment Superpower

Three bash scripts to queue, cancel, and run Wasabi coinjoin payments from terminal - with smart denomination suggestions for maximum privacy.

Kind-30023 (Article)

2025-12-01T15:09:22Z

The Right to Walk Away: Angor and the Future of Bitcoin Crowdfunding

Angor gives investors what ICOs and crowdfunding never could: the cryptographic ability to recover their funds if projects fail to deliver.

Kind-30023 (Article)

2026-01-06T21:46:26Z

The Gossip Vulnerability: Why NIP-17's "Deniable" Messages Aren't

NIP-17 promises deniable messaging with its three-layer design: an unsigned "rumor," a signed "seal," and an ephemeral "gift wrap." However, this setup has a hidden vulnerability. The signed seal allows recipients to prove that a message was sent by the claimed author, even without revealing the content. This creates a perfect scenario for gossip attacks, where the mere proof of communication can damage reputations. As we explore NIP-17, we find that the rumor, despite being unsigned, is not as deniable as it seems, making it a potential risk for exposure.

Kind-30023 (Article)

2025-11-19T21:53:51Z

Two Roads to a Network Without Permission: Reticulum and FIPS

Reticulum and FIPS both build permissionless encrypted meshes, but they differ radically in routing, crypto primitives, and their relationship to IP.

Kind-30023 (Article)

2026-04-24T09:24:07Z

The Merchant Court Returns

Justice is a service that degrades under monopoly and improves under competition. Merchants proved this; now builders are proving it again.

Kind-30023 (Article)

2026-02-12T20:55:50Z

Computing on Secrets

Services no longer need to see data to compute on it. Cryptographic and hardware primitives make that contract a deployed reality.

Kind-30023 (Article)

2026-04-19T14:25:22Z

When Math Catches Your Typos

Bech32's BCH code detects up to 4 typos with 100% certainty, locates up to 2 error positions, but deliberately refuses to auto-correct to prevent catastrophic mistakes.

Kind-30023 (Article)

2025-12-06T18:11:21Z

Credit Before Coin: How Markets Bootstrap Sound Money Economies

Bills of exchange don't just provide elasticity within existing monetary systems; they can bootstrap entire economies that lack base money.

Kind-30023 (Article)

2026-01-04T10:34:26Z

Protocols for the Ungoverned

Functional legal orders emerge from voluntary adoption and competitive governance, not top-down decree; history proves that polycentric law outperforms territorial monopoly.

Kind-30023 (Article)

2026-01-07T11:51:51Z

A Vibe Coding Setup in Your Pocket

GrapheneOS now runs a hardware-isolated Debian VM on your phone, and OpenCode provides open-source AI coding against any provider you choose.

Kind-30023 (Article)

2026-01-14T21:37:14Z

Temporary Autonomous Zones: The Economics of Exit

When defense costs less than attack and property emerges through daily practice, autonomous zones become economically sustainable refuges.

Kind-30023 (Article)

2026-01-17T10:17:03Z

The Frequency of Dissent

Mesh networks turn every radio into a relay and every user into infrastructure, creating communication grids with no center to seize.

Kind-30023 (Article)

2026-03-01T13:24:22Z

The Problem They Said Could Not Be Solved

The builders of the best encrypted messengers declared decentralized group encryption impossible. The Marmot protocol proved them wrong.

Kind-30023 (Article)

2026-03-08T00:07:26Z

The Cheapest Defense

Privacy blinds the adversary's OODA loop at observation. When defense costs pennies and attack costs millions, surveillance becomes unprofitable.

Kind-30023 (Article)

2026-01-09T11:36:03Z

The Trust Shift: Secure Enclaves for Private Nostr Relays

TEE relays shift trust from operators to chip manufacturers. For most threats, that trade is worth making, with eyes open.

Kind-30023 (Article)

2025-12-26T10:42:26Z

The Case for Custodial Nostr: Why Teams Should Stop Fighting the Lost War

Organizations already delegate key custody internally. A server-side Nostr client with permission management would be faster, stabler, and more honest than relay-dependent remote signing hacks.

Kind-30023 (Article)

2025-12-16T14:46:20Z

The Price of Blood

Every civilization before the modern state treated crime as a debt owed to the victim, enforced through restitution and community insurance.

Kind-30023 (Article)

2026-02-15T11:39:52Z

The Non-Computational Nature of Agency

Vervaeke proves agency emerges from non-algorithmic relevance realization, explaining why Bitcoin and Nostr preserve human autonomy while algorithmic systems destroy it.

Kind-30023 (Article)

2026-01-24T15:35:43Z

Builders, Not Talkers

Decades of libertarian theory and cypherpunk tools have produced almost nothing because ideas without builders are worthless. Act or leave us alone.

Kind-30023 (Article)

2025-12-28T20:54:14Z

The Third Court: Insurance, Arbitration, and the Private Production of Justice

Insurance prices risk, arbitration resolves disputes, restitution makes victims whole, and cryptographic enforcement binds them all into one complete system.

Kind-30023 (Article)

2026-03-14T15:20:23Z

The Anatomy of Aggression

Rothbard's typology classifies all state intervention into autistic, binary, and triangular forms, revealing the common thread of coercive aggression beneath policy complexity.

Kind-30023 (Article)

2026-01-20T17:58:20Z

The Gap Between PIR and Nostr: Open Problems in Private Relay Queries

Can PIR hide Nostr queries from relays? Compound filters and subscriptions don't map to existing schemes. Here are the open problems.

Kind-30023 (Article)

2025-12-23T19:58:29Z

Every Crowd Hides You Differently

From Bitcoin CoinJoin to zero-knowledge proofs, every serious approach to financial privacy bets on a different crowd to disappear into.

Kind-30023 (Article)

2026-03-31T18:19:36Z

Programmable Magic Internet Money: How Nostr Apps Can Monetize Ethically and Profitably

Bitcoin plus Nostr creates programmable money that solves software monetization through micropayments respecting user sovereignty.

Kind-30023 (Article)

2026-02-02T15:20:01Z

The Code Liberation: How AI Makes Software Infinitely Customizable

When AI handles compilation and patching tasks, source-based computing finally escapes the domain of experts, ending decades of binary distribution monopoly.

Kind-30023 (Article)

2026-01-21T09:00:02Z

The Consumption You Call Saving

Holding money does not defer gratification but consumes the opportunity cost of lending, making hoarding a present expense rather than proof of low time preference.

Kind-30023 (Article)

2026-01-13T12:37:52Z

The Engine of Prosperity: How Four Sources Drive All Economic Progress

Four sources of economic progress form an interdependent system that emerges spontaneously from voluntary exchange when property rights remain completely intact.

Kind-30023 (Article)

2026-01-26T21:32:26Z

The Universal Principles of Liberty

A voluntary libertarian legal framework built on non-aggression, self-ownership, and property rights, with decentralized arbitration replacing state monopolies on law.

Kind-30023 (Article)

2025-12-13T08:29:07Z

The Poverty Lever: Why Regimes Want You Just Above Starving

Maximum political control comes not from wealth redistribution but from calibrated poverty: desperate enough to depend, not desperate enough to revolt.

Kind-30023 (Article)

2026-01-05T16:56:01Z

Counting Grains of Sand in an Infinite Universe: Why CoinJoin Privacy Doesn't Need Perfect Math

Coinjoin entropy becomes computationally impossible to calculate exactly for large transactions, but lower-bound estimates provide rigorous cryptographic guarantees through information theory.

Kind-30023 (Article)

2025-12-02T18:00:57Z

The Merchant's Return: When Systems Fail, Producers Prosper

Being cast out of the system reveals its deepest secret: you were never its beneficiary, only its fuel. Freedom begins with this recognition.

Kind-30023 (Article)

2026-01-19T18:36:16Z

Build for the Mole

Infiltration is inevitable; detection is unreliable. The real defense against state informants is building organizations where their presence cannot accomplish its purpose.

Kind-30023 (Article)

2026-01-15T19:38:16Z

The Action That Accomplishes Nothing

Decentralization does not prevent the adversary from acting against you. It ensures that his action accomplishes nothing.

Kind-30023 (Article)

2026-01-10T09:27:17Z

The Algebra of Trust

Anonymous commerce requires solving the trust problem, and the solution may be to treat trust itself as a quantifiable, tradeable commodity.

Kind-30023 (Article)

2026-01-12T08:59:31Z

The Art of Waiting: Random Delays for Private Payments

Two scripts that randomize timing between Wasabi coinjoin rounds, making your payment patterns indistinguishable from organic human behavior.

Kind-30023 (Article)

2025-12-07T05:47:45Z

The vibes are strong with this one

Shaka reimplements PAI's personal AI architecture from scratch with different tradeoffs, and the fact that the same primitives survived the rewrite says something about the design.

Kind-30023 (Article)

2026-03-03T17:29:54Z

Your Nostr Key Is Your Network Address

FIPS makes your Nostr npub a routable network address, unifying identity across social and infrastructure layers in a single self-sovereign keypair.

Kind-30023 (Article)

2026-02-25T10:05:08Z

What Your Loved One Is Actually Trying to Tell You

They haven't joined a cult. They stumbled onto questions they couldn't stop asking, and they love you too much to keep them to themselves.

Kind-30023 (Article)

2026-01-03T23:23:13Z

Private Relay Connections: Zero-Knowledge Solutions for Nostr

Nostr relays see everything - who connects, what they fetch, how often they post. Zero-knowledge cryptography can fix all three problems: Semaphore-based authentication hides which whitelisted user is connecting, private information retrieval hides which notes you're fetching, and Privacy Pass enables rate limiting without identity linkage.

Kind-30023 (Article)

2025-11-28T07:33:04Z

Your Phone Is Not Your Property (Until You Install GrapheneOS)

Your smartphone surveils you by design. GrapheneOS transforms a Pixel into private hardware you actually control. Here's why it matters and how to do it.

Kind-30023 (Article)

2025-12-17T17:33:52Z

Know Your Enemy, Name Your Defenses

Good security engineering means naming your enemies. Marmot's threat model specifies exactly which adversaries it defeats and how it defeats them.

Kind-30023 (Article)

2025-12-19T13:36:49Z

The Cypher Wars: Choose Your Weapon Wisely

Use ChaCha20-Poly1305 everywhere without hardware AES. Use AES-256-GCM with AES-NI. Never reuse nonces. Prefer AEAD always.

Kind-30023 (Article)

2025-12-11T07:59:07Z

Your Phone Without Permission Slips: The GrapheneOS Nostr Stack

GrapheneOS plus Zapstore, Amber, Citrine, Amethyst, and White Noise creates the first phone free from corporate control over your digital life.

Kind-30023 (Article)

2025-12-19T05:23:52Z

The Reasonably Paranoid's Guide to Qubes OS: Why Isolation Beats Every Patch

Qubes OS assumes all software has bugs and isolates every application in separate virtual machines, containing breaches instead of preventing them.

Kind-30023 (Article)

2025-12-17T07:10:47Z

Bitcoin Address Lookup: A Question of Privacy

Bitcoin wallets face a fundamental tradeoff: how to discover your transactions without revealing your addresses. Full nodes (2009) provide perfect privacy by downloading everything but require ~700 GB storage. Electrum (2011) achieves instant sync by transmitting your addresses directly to servers, exposing your complete transaction history. Block filters (2017-2019) restore privacy through client-side filtering - you download compact filters, check them locally, and only request matching blocks, revealing just block-level interest. Utreexo (2019) compresses the UTXO set from 11 GB to 480 bytes using cryptographic accumulators while maintaining full-node privacy, but requires 20% more bandwidth. Each approach trades privacy, storage, bandwidth, and convenience differently.

Kind-30023 (Article)

2025-11-15T15:01:24Z

When Can We Meet? Cross-Server Busy Sync for Nextcloud

Nextcloud can't sync busy times across separate instances. This bash script uses CalDAV to share availability between multiple Nextcloud servers without exposing event details.

Kind-30023 (Article)

2025-12-16T07:09:03Z

Garland: Exploring the Architecture

We're exploring an architecture for Garland: Cryptomator for encryption, Blossom for blob storage, Nostr for state. Your nsec becomes your Cryptomator password. We think this works - but we'd love your feedback before we commit.

Kind-30023 (Article)

2025-12-01T07:27:27Z

The Capital Structure of War

Cheap drones expose the state's war machine: centralized militaries accumulate fragile capital while decentralized force converts low-cost tools into strategic advantage.

Kind-30023 (Article)

2026-03-21T09:02:27Z

Garland: Your Keys, Your Files, No Trusted Third Party

Garland turns Blossom blob storage into a virtual drive on your device. Your Nostr key is your password. No accounts, no cloud lock-in.

Kind-30023 (Article)

2025-11-29T11:33:55Z

Chaining Agents Needs a Spine

Most agent chains fail because they pass work around without narrowing the task, and the Ralph loop forces actual, reliable closure.

Kind-30023 (Article)

2026-03-08T20:57:20Z

↳ 回复 事件不存在

11b9aa520cb4ad689ae2f983ca53fe92b8a7327dc6876d9338bc428fb9474a7c

I got countless mp3s that are not labeled to tagged at all, which forces me to just play shuffle through all of them, and I kinda enjoy that chaos.

Kind-1 (TextNote)

2026-04-30T07:38:44Z

↳ 回复 事件不存在

830c98875dbea0c385888c122c8f79da72ff3dbb8d18d1cf22d270643a874ac6

Got you bro https://zapstore.dev/apps/naddr1qq2xxmmd9ejxgvmzda5zumm4w3jhyar4dejszxrhwden5te0wfjkccte9eaxzurnw3hhyefwv3jhvq3q0r8xl2njyepcw2zwv3a6dyufj4...

Got you bro https://zapstore.dev/apps/naddr1qq2xxmmd9ejxgvmzda5zumm4w3jhyar4dejszxrhwden5te0wfjkccte9eaxzurnw3hhyefwv3jhvq3q0r8xl2njyepcw2zwv3a6dyufj4e4ajx86hz6v4ehu4gnpupxxp7sxpqqqplqkem7fvm

Kind-1 (TextNote)

2026-04-30T05:46:15Z

Started to record the audio book of The Praxeology of Privacy, it's a great opportunity for a final edit before it goes to print!

Kind-1 (TextNote)

2026-04-29T16:41:54Z

↳ 回复 事件不存在

b97d98f7501c54c6f1816f898fee04ec8c82e0990c2e7d87cdd5560e5bf00a06

Yes, patience improves privacy substantially

Kind-1 (TextNote)

2026-04-29T10:33:53Z

↳ 回复 Luxas (npub16jdfqgazrkapk0yrqm9rdxlnys7ck39c7zmdzxtxqlmmpxg04r0sd733sv)

afaik #nymchat is the only #nostr messenger that has e2ee group chats that also works across multipl...

Iris by nostr:nprofile1qqsy2ga7trfetvd3j65m3jptqw9k39wtq2mg85xz2w542p5dhg06e5qppemhxue69uhkummn9ekx7mp0qy2hwumn8ghj7un9d3shjtnyv9kh2uewd9hj7qghwaehxw3...

Iris by nostr:nprofile1qqsy2ga7trfetvd3j65m3jptqw9k39wtq2mg85xz2w542p5dhg06e5qppemhxue69uhkummn9ekx7mp0qy2hwumn8ghj7un9d3shjtnyv9kh2uewd9hj7qghwaehxw309aex2mrp0yh8qunfd4skctnwv46z75uptz7 does too I think. Marmot soon.

Kind-1 (TextNote)

2026-04-29T06:59:42Z

Check out nostr:nprofile1qqsrrtsvcg6q8cwwhuea7cnyfelpfh5m9zncns8sza8a0pjylt6cazcpzdmhxue69uhhqatjwpkx2urpvuhx2ue0qyvhwumn8ghj7cm0vfexzen4d4sjucm0d5hhy...

Check out nostr:nprofile1qqsrrtsvcg6q8cwwhuea7cnyfelpfh5m9zncns8sza8a0pjylt6cazcpzdmhxue69uhhqatjwpkx2urpvuhx2ue0qyvhwumn8ghj7cm0vfexzen4d4sjucm0d5hhyetvv9uszgnhwden5te0d46kcarfwpkx27r9wghxsatn0fhkuet80yh8wmmjd3jz7uhmnef, a non-nostr app published on nostr:nprofile1qqs83nn04fezvsu89p8xg7axjwye2u67errat3dx2um725fs7qnrqlgpz4mhxue69uhhyetvv9ujuerpd46hxtnfduhsz9mhwden5te0wfjkccte9ec8y6tdv9kzumn9wshszrnhwden5te0dehhxtnvdakz7adgsu4

Kind-1 (TextNote)

2026-04-29T06:52:29Z

↳ 回复 事件不存在

3e43d3ba5ad7194bccce7ce7f0c7f2dbda2de6977ed60647158a68c6cfe248f0

Looking forward to see you there.

Kind-1 (TextNote)

2026-04-28T15:19:26Z

↳ 回复 事件不存在

f02c6d249dc114f769ba0c76cb08a916d9a9e31758233df1f6d0ceda806ce16d

There's a weird naming between published and created at, published is the original date, created is the last edit. Super confusing. I think I created ...

There's a weird naming between published and created at, published is the original date, created is the last edit. Super confusing. I think I created those events correct (tell me if not) so maybe its a bug on your client.

Kind-1 (TextNote)

2026-04-28T09:15:58Z

↳ 回复 reya (npub1zfss807aer0j26mwp2la0ume0jqde3823rmu97ra6sgyyg956e0s6xw445)

I think I should use quartz (from amethyst), it's more mature for KMP

Yes, great library!

Kind-1 (TextNote)

2026-04-28T08:22:09Z

↳ 回复 Max (npub1klkk3vrzme455yh9rl2jshq7rc8dpegj3ndf82c3ks2sk40dxt7qulx3vt)

Yes. These are all edits to the articles, I would have expected that it doesnt show edits in the fee...

And why do they show up in the notes view at all? These are all nip23s

Kind-1 (TextNote)

2026-04-28T08:18:51Z

↳ 回复 Leo Wandersleb (npub1gm7tuvr9atc6u7q3gevjfeyfyvmrlul4y67k7u7hcxztz67ceexs078rf6)

I tried to separate data from the nostr.info design by using the data via a sub repository https://g...

ngit fixes this :)

Kind-1 (TextNote)

2026-04-28T08:18:23Z

↳ 回复 事件不存在

d1624ac618daa8814263a618fa863dac16225543f90e35c95854cebc0616d5b4

Yes. These are all edits to the articles, I would have expected that it doesnt show edits in the feed...

Kind-1 (TextNote)

2026-04-28T08:17:25Z

↳ 回复 Leo Wandersleb (npub1gm7tuvr9atc6u7q3gevjfeyfyvmrlul4y67k7u7hcxztz67ceexs078rf6)

I tried for nostr.info but it's a lot of work.

Yours had a bunch that I didnt know about. added to my existing list here. Thanks! nostr:nevent1qqsp4vu4rfmkmcrmypkn6ne97yxp7a5lpwqkefkmana7xcwejrctd3...

Yours had a bunch that I didnt know about. added to my existing list here. Thanks! nostr:nevent1qqsp4vu4rfmkmcrmypkn6ne97yxp7a5lpwqkefkmana7xcwejrctd3gpzamhxue69uhhyetvv9ujuct60fsk6mewdejhgtczyzm7669svt0xkjsju50a22zurc0qa589z2xd4yatzx6p2z64a5e0cqcyqqqqqqgt8e8fx

Kind-1 (TextNote)

2026-04-28T07:41:08Z

↳ 回复 事件不存在

2a2ea16ca43bbc787813a35d9986e824656ca3da52c2e4a1c129e65941459314

Thats a cool site!

Kind-1 (TextNote)

2026-04-27T19:34:33Z

Definitely give Tamers of Entropy a read, we don't have nearly enough cypherpunk fiction, and this is a great one! nostr:nevent1qqs8k386qaqdy03gmfdjpm...

Definitely give Tamers of Entropy a read, we don't have nearly enough cypherpunk fiction, and this is a great one! nostr:nevent1qqs8k386qaqdy03gmfdjpmw4napde3j2vvzrrl23djkdvmzfaqkgpcspzamhxue69uhhwmm59eeksctkd9hxwtntd9mkjtczyzf7adtvkfzrt0rq3je994fh7d8jrvpychwtaerfxrd9cmv5d83e5qcyqqqqqqgtuxryg

Kind-1 (TextNote)

2026-04-27T19:32:44Z