inkan

inkan

npub

npub16xnpfx85k8wzdhctang6860g3u64lds5kac73ddjwlg0lxdg9g3su56z6l

pubkey (hex)

d1a61498f4b1dc26df0becd1a3e9e88f355fb614b771e8b5b277d0ff99a82a23

nprofile

nprofile1qqsdrfs5nr6trhpxmu97e5dra85g7d2lkc2twu0gkke8058lnx5z5gcprf58garswvaz7tmjv4kxz7fwva6kcat8w4k82tnddajsvulrhc

Activity (153)

↳ Reply Technical Debt (npub14w4qnk43lsllls2qnldj3vfcxtx5qvtsf3xlvxv9yha8afrxhmfqju3rwx)

Yeah a long form note would be easier to follow, this thread gives an overview nostr:nevent1qqs9x9dy...

I agree we are at the stage where I should write up a proper explanation of what I've done so far. I'll work on that.

Kind-1 (TextNote)

2026-04-21T06:57:17Z

↳ Reply utxo the webmaster 🧑‍💻 (npub1utx00neqgqln72j22kej3ux7803c2k986henvvha4thuwfkper4s7r50e8)

Gm, If you're thinking of taking up vibe coding to help nostr, pls don't Take up shilling, market...

This sounds like it could turn away tens of thousands of potential Nostr users who'd have liked to use Nostr primarily for vibe coding. I mean if they...

This sounds like it could turn away tens of thousands of potential Nostr users who'd have liked to use Nostr primarily for vibe coding. I mean if they decided to take this advice.

Kind-1 (TextNote)

2026-04-20T12:12:47Z

Question for all Ethereum enthusiasts around here: Say you have a smart contract to which users can submit transactions for which they have to pay ga...

Question for all Ethereum enthusiasts around here: Say you have a smart contract to which users can submit transactions for which they have to pay gas fees. You'd like to offer them the service of paying these gas fees on their behalf so they don't have to go go through the trouble of having to get their own ETH. But it's also important that msg.sender always be the address of the privkey with which the user signed the underlying transaction (rather than say the address of the payor). Is there an (easy?) way to do this? #ethereum

Kind-1 (TextNote)

2026-04-19T13:37:02Z

↳ Reply Laeserin (npub1m4ny6hjqzepn4rxknuq94c2gpqzr29ufkkw7ttcxyak7v43n6vvsajc2jl)

I've lived in central Texas and western Maryland. I've spent a lot of time in Austin and my parents ...

I spent nearly ten years in Austin in total. Also three years in Annapolis. Small world.

Kind-1 (TextNote)

2026-04-19T09:31:52Z

↳ Reply Laeserin (npub1m4ny6hjqzepn4rxknuq94c2gpqzr29ufkkw7ttcxyak7v43n6vvsajc2jl)

Lots of the USA is uninhabitable without air conditioning. It's not merely heightened comfort nobody...

Didn't know. I did grad school in Austin.

Kind-1 (TextNote)

2026-04-19T08:52:47Z

You don't need key signing parties to bind pubkeys to their owners. What you need are pubkeys that have an association with their owners which remains...

You don't need key signing parties to bind pubkeys to their owners. What you need are pubkeys that have an association with their owners which remains stable over the long term. That's because, given enough time, you'll always have plenty of opportunity to observe all kinds of cues and signals that will tell you who is behind a pubkey, at least to the extent to which the owner wants to reveal that information to you. For example, over time you'll be able to tell whether the owner is a bot or a human, what their interests are, their writing style, what communities they are part of etc. And if they want you to know their name or other "personally identifiable information," there will be almost always be easy mechanisms by which they can convince you that they are who they say they are. It seems very unlilely that AI's ability to impersonate will change this, either now or in the future.

Kind-1 (TextNote)

2026-04-17T19:51:10Z

↳ Reply mleku (npub1fjqqy4a93z5zsjwsfxqhc2764kvykfdyttvldkkkdera8dr78vhsmmleku)

in theory i could ask them

They could send me an email at [email protected] or just reply on this thread if they prefer. It's about turning the prototype at www.inkan.cc into som...

They could send me an email at [email protected] or just reply on this thread if they prefer. It's about turning the prototype at www.inkan.cc into something that runs well (if they want to take a look at the current version, I can put their pubkey on the allowlist for the identity features). If they think they may be interested, I'm happy to discuss with them.

Kind-1 (TextNote)

2026-04-16T08:23:43Z

↳ Reply mleku (npub1fjqqy4a93z5zsjwsfxqhc2764kvykfdyttvldkkkdera8dr78vhsmmleku)

lol, anyhow, i got so turned off by the first paragraph now i read the second part and i'm wondering...

In principle yes if there is a very good fit.

Kind-1 (TextNote)

2026-04-15T21:21:55Z

↳ Reply mleku (npub1fjqqy4a93z5zsjwsfxqhc2764kvykfdyttvldkkkdera8dr78vhsmmleku)

that means that you are empty inside. like an llm. that's tragic.

Back when I dabbled in the philosophy of mind, I was pretty open to the idea of machines developing consciousness. The philosophical arguments for tha...

Back when I dabbled in the philosophy of mind, I was pretty open to the idea of machines developing consciousness. The philosophical arguments for that seemed fairly strong. But now that AI has actually arrived, I just can't bring myself to to believe at all that I'm dealing with anything conscious here. They just don't seem to have the right internal structure. "empty inside" is a bit strong, though, there is a lot going on inside an LLM.

Kind-1 (TextNote)

2026-04-15T14:35:03Z

↳ Reply mleku (npub1fjqqy4a93z5zsjwsfxqhc2764kvykfdyttvldkkkdera8dr78vhsmmleku)

smells like fancy llm talkbto me. youbdecide what i meant

"smells like fancy llm talkbto me" That's probably because I express myself like LLMs, always have. They've been diluting my brand.

Kind-1 (TextNote)

2026-04-15T13:23:14Z

↳ Reply Technical Debt (npub14w4qnk43lsllls2qnldj3vfcxtx5qvtsf3xlvxv9yha8afrxhmfqju3rwx)

I have a somewhat less… exoteric example: cache management has many shared concepts with logistics, ...

I was thinking about this just a few weeks ago. I've been trying to build on the Nostr protocol, and the primary engineering challenge has been to ma...

I was thinking about this just a few weeks ago. I've been trying to build on the Nostr protocol, and the primary engineering challenge has been to make various types of data available in the right places at the right times, including preferably the ability to anticipate when and where such data will be needed so that it can be pre-fetched. So I've been struggling with that challenge in a sort of amateurish way, I mean the challenge of searching for and pre-fecthing data "intelligently" as I put it to myself. And I've actually been considering hiring professional developers , maybe computer scientists, who have experience with things like "distributed systems" or "caching," except that I don't really know how to find / identify people who have the required depth of knowlegde and experience. And then I realized that my attempts to build deterministic and inflexible methods for caching "intelligently" (!) really pointed to a perfect use case for AI. It seems like precisely the type of job that an AI agent should be performing.

Kind-1 (TextNote)

2026-04-15T12:50:02Z

↳ Reply HaloKat (npub1r0rs5q2gk0e3dk3nlc7gnu378ec6cnlenqp8a3cjhyzu6f8k5sgs4sq9ac)

What does this mean? How does ETH enable key rotation? Why?

Inkan allows users to record the following types of declarations on Ethereum: (i) Declarations of delegation of signing authority, whereby a pubkey d...

Inkan allows users to record the following types of declarations on Ethereum: (i) Declarations of delegation of signing authority, whereby a pubkey declares that it delegates signing authority to another pubkey; (ii) Declarations of revocation of signing authority, whereby a pubkey declares that it revokes signing authority from another pubkey. The reason a blockchain is needed for this is that these declarations must be given objectively verifiable placement in time. In principle any old blockchain will do, but I couldn't think of a straightforward way to do it on Bitcoin. It's not enough to simply record a hash of the declaration. The actual content of the declaration needs to be easily retrievable from the chain, and it seemed easiest to implement this on Ethereum, at least for prototyping. See below for some screenshots from Inkan. The fourth screenshot gives you an idea of what these declarations look like, and the second and third one give you some hints as to how Inkan uses them to attribute events signed by delegatee keys to delegator keys. nostr:nevent1qvzqqqqqqypzp5dxzjv0fvwuym0shmx350573re4t7mpfdm3az6mya7sl7v6s23rqyghwumn8ghj7mn0wd68ytnvv9hxgtcppemhxue69uhkummn9ekx7mp0qqsdhe5x8zgg5e4mvq0ksx66j2jpm87edqlmjues58mw0787dpa5yacsudv3r

Kind-1 (TextNote)

2026-04-15T10:45:01Z

↳ Reply HaloKat (npub1r0rs5q2gk0e3dk3nlc7gnu378ec6cnlenqp8a3cjhyzu6f8k5sgs4sq9ac)

Is ETH used for anything other than gambling and degeneracy?

Inkan uses ETH to enable a Nostr key rotation / replacement system. It's not gambling. As for degeneracy, the jury is still out on that one.

Kind-1 (TextNote)

2026-04-15T09:21:32Z

↳ Reply Event not found

d2b8dbb2ee6e740cf2e983357251d3c13b61ae881d110773f890cc32d98e2048

Sent test mail to myself. Shows up in Sent folder but not getting delivered.

Kind-1 (TextNote)

2026-04-13T23:21:55Z

↳ Reply Event not found

24fc738ac0fad5508d632cee129f6e915859c0591260601f48bc666b22ea3e0c

Thanks. I took a look and nothing seems to be amiss at first glance. My experience with similar-looking websites has been that something ends up not w...

Thanks. I took a look and nothing seems to be amiss at first glance. My experience with similar-looking websites has been that something ends up not working, maybe some location or KYC requirement, or some unexplained hang-up during funding. So I feel sceptical, but that may be unfair to this particular service. I'd have to try it out, which I may do. One has to work up enough trust to cover the period between funding and self-custody.

Kind-1 (TextNote)

2026-04-13T22:56:19Z

↳ Reply Event not found

c466732f6029d262ee3ced6f47eec9ed5c99029843bd543c486b811997b1c067

Huh, another thing with 300 million accounts that I had never heard of. I can see how gaining followers for your pubkey could be a powerful motivatin...

Huh, another thing with 300 million accounts that I had never heard of. I can see how gaining followers for your pubkey could be a powerful motivating force. The problem is that pubkeys on Nostr are too insecure. There is too great a likelihood that your pubkey will be compromised over the years. Loss of a pubkey means that you have to rebuild your following manually, so there isn't enough incentive to invest serious effort in building very large followings.

Kind-1 (TextNote)

2026-04-13T10:21:24Z

↳ Reply Event not found

d3ca001a9c86d3b6fe9ef3f5fff947a5e5d3b9464b1cdc8bf3edc67c8257dc76

Weird yes. Fun not so much.

Kind-1 (TextNote)

2026-04-12T16:08:07Z

↳ Reply Event not found

a338ab276c2e8e72379b680df2e2b420128297d8273dd479bdd6ae96d9abc3e5

Late to the party, but I made a prototype of a key rotation system. See below. nostr:nevent1qvzqqqqqqypzp5dxzjv0fvwuym0shmx350573re4t7mpfdm3az6mya7sl...

Late to the party, but I made a prototype of a key rotation system. See below. nostr:nevent1qvzqqqqqqypzp5dxzjv0fvwuym0shmx350573re4t7mpfdm3az6mya7sl7v6s23rqy88wumn8ghj7mn0wvhxcmmv9uq32amnwvaz7tmjv4kxz7fwv3sk6atn9e5k7tcqyrd7dp3cjz9xdwmqra5pkk5j5swelktg87uhxv9p7mnl3lng0dp8wutqaud

Kind-1 (TextNote)

2026-04-12T15:50:37Z

↳ Reply Laeserin (npub1m4ny6hjqzepn4rxknuq94c2gpqzr29ufkkw7ttcxyak7v43n6vvsajc2jl)

Yeah, I've been on Linux since the 90s and it's so weird knowing that people even still use Windows....

It's been since the year 2000 for me. If there is a tool you use many hours each day throughout much of your life, you should pay attention to what it...

It's been since the year 2000 for me. If there is a tool you use many hours each day throughout much of your life, you should pay attention to what it is.

Kind-1 (TextNote)

2026-04-11T14:19:56Z

The pubkey nostr:npub10ukg94kvrvk4qqr3482zdekfsuaw2x56wa899mnpkxqwfxl6dlkqrux0x9 has never ever signed a single Nostr event. Yet that pubkey has re...

The pubkey nostr:npub10ukg94kvrvk4qqr3482zdekfsuaw2x56wa899mnpkxqwfxl6dlkqrux0x9 has never ever signed a single Nostr event. Yet that pubkey has recently gained its first real-life follower. I admittedly don't know whether they'll decide to stick around or not. But it's a small milestone in the (very early) history of Inkan.

Kind-1 (TextNote)

2026-04-11T12:33:48Z

↳ Reply Event not found

d75fdb2116dddb5599f0f925b4ab81d79ce827f02454260dfd153137b5c8aa6c

Adversaries can now, at the present time, try to discover algorithms that break "quantum resistant" encryption. They may have already discovered such ...

Adversaries can now, at the present time, try to discover algorithms that break "quantum resistant" encryption. They may have already discovered such algorithms. If so, they are unlikely to advertise that fact. But that's the same with classical cryptographic algorithms. Adversaries may have found ways to break classical encryption and may have already done so, without telling us. I guess the difference you are pointing to is that classical algorithms are being widely used, and there is perhaps no strong evidence that the encryption on materials that have been classically encrypted has been broken on a large scale (at least not due to a fault in the algorithm itself as opposed to its implementation). This could be because classical encryption has not been broken, or because those who broke it have taken care to not take any actions that would reveal that fact. There would certainly be plenty of incentives to not reveal it. So I guess we sort of have reason to believe that classical encryption has successfully withstood battle-testing. Except that if it did not, there is a fairly good chance that we would not be told about it.

Kind-1 (TextNote)

2026-04-11T11:44:28Z

↳ Reply Event not found

cb67a057d55198625c6673d25e92782423e50d5023c9ca04d736a641b6c801d9

"They just have been battle tested for decades, which is why we trust them." Yes, but it seems that the battle-testing was not really meant to ensure...

"They just have been battle tested for decades, which is why we trust them." Yes, but it seems that the battle-testing was not really meant to ensure that there are no new unknown natural phenomena which could be used to speed up the relevant computations. Instead, it was meant to ensure that someone, somewhere, had not, unbeknownst to us, discovered mathematical methods that make these computations more efficient than we thought they could be. And maybe also to ensure that we had not made mistakes in the implementation of our own cryptographic methods. So the battle-testing is more of a process of making informed guesses as to the mathematical tools and capabilities that others (including potential adversaries) have at their disposal. Not so much an inquiry into unknown natural phenomena.

Kind-1 (TextNote)

2026-04-11T11:17:03Z

↳ Reply Event not found

c372f8650dcf73d7a34ff7d1473c56845f8fe4f132ffcfec1da30c2235f66b9f

"With quantum resistant algorithms, we are not even sure what natural processes need to be discovered ..." I was under the impression that we already...

"With quantum resistant algorithms, we are not even sure what natural processes need to be discovered ..." I was under the impression that we already know and have pinpointed the feature(s) of quantum phenomena that makes quantum computing possible. I thought that's why there is a mathematics of qubits etc. In other words, I thought that physicists did not really think that there was some undiscovered universe of new and unknown quantum phenomena that could play roles in computation of an entirely different sort than those which have already been discovered and described. I'm not deeply informed here, but that's my impression having tried to follow the discussion.

Kind-1 (TextNote)

2026-04-11T11:02:42Z

↳ Reply Event not found

0a4560a4a418a43c09d4cb261ba866b79e256c14e2f780c0d934cd3dc14c7808

I believe it's just math -- am I wrong? It's a life dream of mine to learn the basics of quantum computing, maybe enough to understand Shor's algorit...

I believe it's just math -- am I wrong? It's a life dream of mine to learn the basics of quantum computing, maybe enough to understand Shor's algorithm. I've tried and made it through a good amount of linear algebra, bra-ket notation, etc., and then I got distracted. I hope to go back. The reason I want to study it is that I'd like to grasp conceptually what it is about quantum computers that could lead to such a speed-up in, say, finding the prime factors of a large integer. Is it that there is a natural process that constitutes a sort of "oracle" suggesting correct answers to problems that are normally difficult to compute? I'm not too well-informed, but I'm currently under the impression that on the computational side it is just math, i.e. that one doesn't need to experiment to determine the computational complexity of the relevant algorithms.

Kind-1 (TextNote)

2026-04-11T10:19:29Z

↳ Reply Laeserin (npub1m4ny6hjqzepn4rxknuq94c2gpqzr29ufkkw7ttcxyak7v43n6vvsajc2jl)

French government announces pivot from Microsoft Windows to Linux. https://www.heise.de/news/Frankr...

I remember how weird it was to go back to Windows when I took a corporate job. It was basically just Word, Excel and Outlook but it made the work envi...

I remember how weird it was to go back to Windows when I took a corporate job. It was basically just Word, Excel and Outlook but it made the work environment feel low-grade, antiquated and non-serious. The OS that's being used has a pretty major effect on the intellectual climate and corporate culture.

Kind-1 (TextNote)

2026-04-11T10:02:23Z

↳ Reply Event not found

5cef312ecce58e2f1a5762dd7b00b3798a6062e03c6c674d0f52245d2f5c7c6b

Aren't quantum resistant algorithms just math? I'd be worried if we had to "test" them to find out whether or not they work.

Kind-1 (TextNote)

2026-04-11T09:39:37Z

↳ Reply 7fqx (npub1njst6azswskk5gp3ns8r6nr8nj0qg65acu8gaa2u9yz7yszjxs9s6k7fqx)

This sounds totally insane. Very Ballard. https://npub1njst6azswskk5gp3ns8r6nr8nj0qg65acu8gaa2u9yz7...

This looks like a great movie.

Kind-1 (TextNote)

2026-04-11T09:20:57Z

↳ Reply Event not found

0000114a4efbef0c9242ab21cadf2791c45c2eabd9b7ea392b4bbae20229321b

These express intensification, but in the case of "fuck all" it's total absence / nothingness. There's something zen about it.

Kind-1 (TextNote)

2026-03-31T21:05:24Z

↳ Reply Event not found

0000c31f439ecdef50692112d9f1dacbb206ec97c30919b9fbfed18b7d183139

Yeah, I didn't know it could mean "absolutely nothing." Fascinating.

Kind-1 (TextNote)

2026-03-31T20:48:44Z

↳ Reply Event not found

2807d8aaa060ecca51b1195625d34faac7a2987cbd2d97634126a1bd6e50482b

Had to look that one up. Common British slang is what it says. Something new every day.

Kind-1 (TextNote)

2026-03-31T20:42:05Z

↳ Reply Event not found

7282a1b667a1d35b13c0df9e20e13a62155f9c435916fb543e6a504d8415b9d2

Huh, maybe that's why I'm not finding them. I might be back in Japan for a while starting later next month, so that will put me on the inside.

Kind-1 (TextNote)

2026-03-31T20:31:52Z

↳ Reply Event not found

8d91cf2990e19a3d63a66b2944f9c146ea14e13c0a4fbeaab522331de69a09fa

I dropped by at Nostrasia 2025 in Tokyo. Unfortunately I only caught the end of the event since I was busy earlier during the day. It seemed like they...

I dropped by at Nostrasia 2025 in Tokyo. Unfortunately I only caught the end of the event since I was busy earlier during the day. It seemed like they have a robust community. I follow a couple of Japanese accounts, but I selected these a bit randomly. I should explore more.

Kind-1 (TextNote)

2026-03-31T20:28:37Z

↳ Reply Event not found

2f7ed1ab5f2395f075784021822e36083dabe02e5bb68f902c001068ed5e4c3b

The killer feature is the method of authentication. But to want it, you have to know a bit about public key cryptography. Not very much, nothing that...

The killer feature is the method of authentication. But to want it, you have to know a bit about public key cryptography. Not very much, nothing that can't be grasped by say a 12-year old. But it requires a bit of habituation and a change of mental focus for most people. It's a bit like getting people to take up Pilates, or skateboarding, or vegetarianism, or even personal computing, in a world where these things haven't entered the mainstream. There is no immediate market for it, but it's the sort of thing where a market could at any time emerge very rapidly. nostr:nevent1qvzqqqqqqypzp5dxzjv0fvwuym0shmx350573re4t7mpfdm3az6mya7sl7v6s23rqy88wumn8ghj7mn0wvhxcmmv9uq3zamnwvaz7tmwdaehgu3wwa5kuef0qqsw2wxnjgsrv4cz0czyzxfh7ywf7tl2c6hr8wmre3elskfpf4a4ykgtj4e4m

Kind-1 (TextNote)

2026-03-30T07:16:29Z

↳ Reply Event not found

00006556acaae198af00866abf6a27813ea8896e181abd5648641f6bba09387c

Huh. I was under the impression that I got it to work with various filters without special setup, but I may have to investigate more closely.

Kind-1 (TextNote)

2026-03-29T15:45:40Z

↳ Reply Event not found

0000090aa7683d335476e21206a0762ebc8fc31a89b287da9b01fa7cfc101d49

Oh, I just started learning strfry for the purpose of using negentropy. Not sure if I'm following the discussion, but are we saying that strfry doesn'...

Oh, I just started learning strfry for the purpose of using negentropy. Not sure if I'm following the discussion, but are we saying that strfry doesn't correctly process the filters that are sent in neg open? Does that mean that strfry doesn't correctly implement negentropy? Confused.

Kind-1 (TextNote)

2026-03-29T15:38:07Z

↳ Reply Event not found

ea44f84e191b319ea705f9a2f706020b8a04cd5945c6eaade4b53a5b4b602227

Same here. There are minimum holding periods before I can move crypto I have purchased to self-custody. It's not really a problem in principle with th...

Same here. There are minimum holding periods before I can move crypto I have purchased to self-custody. It's not really a problem in principle with the small amounts I'm transacting in, but there are counterparty / clearing risks that would bug me with larger amounts. Also it's annoying that I can't just buy it and use it right away. I guess I should just make sure to always keep some at hand for everyday use. Just a matter of getting organized.

Kind-1 (TextNote)

2026-03-27T12:07:33Z

↳ Reply Event not found

af5f06942478d4a46d39d1adedd82527f6f9a5d2766152d2d5f981d7814c83c8

Yes, I had a terrible time trying to get ETH for testing. I actually don't have any especially good way of getting BTC either. Other people seem to ha...

Yes, I had a terrible time trying to get ETH for testing. I actually don't have any especially good way of getting BTC either. Other people seem to have better channels for acquiring cryptocurrency. When they talk about it, I always sort of wonder where they are getting it from.

Kind-1 (TextNote)

2026-03-27T09:18:33Z

↳ Reply Event not found

00006d5e7bd845fa252b4a38ea7d4766f32043fc4a741f81c37f733f62987d6a

Yes

Kind-1 (TextNote)

2026-03-26T23:54:24Z

↳ Reply Event not found

00008b5cd4bcf022dd6a778e6597345f0546cafea18aa4a7046324403ac4437a

Habit (Larry Fessenden)

Kind-1 (TextNote)

2026-03-26T23:49:23Z

↳ Reply Event not found

1ff4cafd2e6351749cafe15d7ed2e635861661b8fa0121013c59a77a0ac22caf

Also if you'd ever like to take a closer look, please feel free to log in and poke around. I've put your pubkey on the allow list for the identity fea...

Also if you'd ever like to take a closer look, please feel free to log in and poke around. I've put your pubkey on the allow list for the identity features, so you should be able to access these. For an initial "tour guide" please see below: nostr:nevent1qvzqqqqqqypzp5dxzjv0fvwuym0shmx350573re4t7mpfdm3az6mya7sl7v6s23rqy2hwumn8ghj7un9d3shjtnfde4kzm3wvd3j7qg3waehxw309ahx7um5wghxcctwvshsqgp80nvegpjmtxvlqz2yr5um5hqswgkqndvaehm5dvz6r4v9lernhujwlh57

Kind-1 (TextNote)

2026-03-26T23:12:31Z

↳ Reply Event not found

273ae59e0ee852af072c3dc57c1d0616408b194e95e3c512eece345f64b6fc6a

Yes, you may be thinking of OpenTimestamps. And Inkan does in fact use OpenTimestamps to timestamp individual Nostr events on Bitcoin. Inkan only work...

Yes, you may be thinking of OpenTimestamps. And Inkan does in fact use OpenTimestamps to timestamp individual Nostr events on Bitcoin. Inkan only works when there is proof that a signed version of an event existed as of some particular time, and this proof is provided through BTC timestamping using OpenTimestamps. However, the declarations of "delegation of signing authority" and "revocation of signing authority" that I mentioned also need to be timestamped. Unlike in the case of regular Nostr events, this timestamping needs to be done in a manner that allows you to later retrieve the substantive content of the declaration by querying the blockchain. Bitcoin timestamping does not allow for this, at least not in any straightforward way, because what's actually recorded on Bitcoin is a *hash* that is the root of a Merkle tree. And you can't extract the content of the timestamped items from that hash. Ethereum, on the other hand, has easy mechanisms for recording these "delegations of signing authority" and "revocations of signing authority" in a manner that makes their content queriable / retrievable. So in both cases, the ultimate purpose of using blockchains is to provide timestamps. The reason Ethereum is used for delegation and revocation declarations is that Ethereum provides straightforward methods for retrieving the content of these declarations from the chain.

Kind-1 (TextNote)

2026-03-26T19:10:20Z

↳ Reply Event not found

6d31d0a7a47eafa8b429474a3a50177c70cf811a0acc89d797131d808eff786c

"I can't say I know enough of the technical stuff to know how well this can work in practice." I made the prototype to find out. I've been using it f...

"I can't say I know enough of the technical stuff to know how well this can work in practice." I made the prototype to find out. I've been using it for a few months and it works well enough for me so far. There's tons of rough edges, but I don't currently see any insurmountable obstacles in principle. If anyone sees anything fundamentally amiss, please point it out. That will save me a lot of time.

Kind-1 (TextNote)

2026-03-26T18:01:38Z

↳ Reply Event not found

3b34763d678c3b626bc5dfd9f700d116ed2deb19a84a9508c84c82c0bb577fe9

That's why we need a key rotation system that allows you to replace keys that have been lost or compromised. Prototype below. nostr:nevent1qvzqqqqqqy...

That's why we need a key rotation system that allows you to replace keys that have been lost or compromised. Prototype below. nostr:nevent1qvzqqqqqqypzp5dxzjv0fvwuym0shmx350573re4t7mpfdm3az6mya7sl7v6s23rqyghwumn8ghj7mn0wd68ytnhd9hx2tcpzamhxue69uhhyetvv9ujuurjd9kkzmpwdejhgtcqyrd7dp3cjz9xdwmqra5pkk5j5swelktg87uhxv9p7mnl3lng0dp8wvxhqmf

Kind-1 (TextNote)

2026-03-26T15:48:14Z

↳ Reply Event not found

15eca2c1c2c4870a2847cfad068484dcb73dcd0966e65b08529a7fee15aceb3c

Agree, I think it's using public key cryptography for authentication. That's the core of the protocol, and that's what makes it distinctive and libera...

Agree, I think it's using public key cryptography for authentication. That's the core of the protocol, and that's what makes it distinctive and liberating. This feature shouldn't be played down when introducing Nostr to "normies" (whatever exactly that means), but instead it should be highlighted. We should make clear that Nostr requires a bit of learning, re-thinking and adjustment of one's practices. It requires an effort, but once a person has made that effort they then have a sense of ownership in the new skill they have acquired. And I don't think any of this stands in the way of broad-based adoption. It's still much easier to learn to manage a key pair than, say, to learn skateboarding, or become a vegetarian. People can be quite motivated once they put their mind to something.

Kind-1 (TextNote)

2026-03-26T13:31:10Z

↳ Reply Event not found

e147e102ae0509e9ed4e46aa4f5fb4069101ea3732dbf9720778a875e3f42261

If the above explanations aren't sufficiently helpful, please feel free to let me know. If the product gets misunderstood due to my not explaining it ...

If the above explanations aren't sufficiently helpful, please feel free to let me know. If the product gets misunderstood due to my not explaining it properly, I'm not doing my job.

Kind-1 (TextNote)

2026-03-26T11:51:42Z

↳ Reply inkan (npub16xnpfx85k8wzdhctang6860g3u64lds5kac73ddjwlg0lxdg9g3su56z6l)

I wonder whether there may be a use for these attestations in connection with the 31045 timestamp ev...

I guess the attestation events can have whatever semantics I want them to have in the intended context of use. For example, if I intend the attestatio...

I guess the attestation events can have whatever semantics I want them to have in the intended context of use. For example, if I intend the attestation event to mean "I audited the information in the reference event against what's recorded on the blockchain and the audit succeeded" or in the negative case "I audited the information in the reference event against what's recorded on the blockchain and the audit failed," then the attestation event can have these meanings.

Kind-1 (TextNote)

2026-03-25T18:29:56Z

↳ Reply Nathan Day (npub1cn670f663n3ks02jnnlsvd5y88zjnefy8343ykaxs7y3nzzketrsrjwt8a)

Yeah, you could use it with those for sure. Attestations cover both the valid and invalid states. E...

I have a feature where the client uses only timestamp / delegation info events that were signed by "trusted pubkeys." The trusted pubkeys are settable...

I have a feature where the client uses only timestamp / delegation info events that were signed by "trusted pubkeys." The trusted pubkeys are settable by the user, or otherwise the client reverts to reasonable default settings. One could maybe expand this filter to also accept events that have an attestation from a trusted pubkey, regardless of whether the event itself was signed by a trusted pubkey. And maybe also have a feature that causes the client to audit an event against the blockchain if a trusted pubkey attests that it tried to audit the event and failed. It would be nice if the attestations can play that role - I'll take a closer look. This would obviate the need to implement "audit" events myself just for my particular use case.

Kind-1 (TextNote)

2026-03-25T18:19:21Z

↳ Reply Nathan Day (npub1cn670f663n3ks02jnnlsvd5y88zjnefy8343ykaxs7y3nzzketrsrjwt8a)

Simplified landing page just dropped for nostr:npub1hgkywhtudhuf0wwwh4q60fukpefwwgq9qaf83nm0naeah599...

I wonder whether there may be a use for these attestations in connection with the 31045 timestamp events or the 31055 delegation info events that are ...

I wonder whether there may be a use for these attestations in connection with the 31045 timestamp events or the 31055 delegation info events that are produced by Inkan. When I implemented these, I was thinking of adding an event type that gives other pubkeys the ability to attest that they have confirmed the correctness of the content of the 31045 / 31055 event against what's recorded on the blockchain. I actually also thought of implementing an event type that gives other pubkeys the ability to also disconfirm the 31045 / 31055 events, i.e. to state that they tried to confirm what the 31045 / 31055 event is saying by checking the blockchain but were unable to confirm. I ultimately decided against implementing these additional event types since it seemed to create epicycles that seemed unnecessary. Rather than attesting to the correctness of the content of the target event, it seemed easier for the auditing pubkey to simply republish that content itself. In other words, rather than publishing an event confirming that the timestamp information in a 31045 event is indeed recorded on Bitcoin, it seemed easier for the auditing pubkey to simply republish that information in its own 31045 event. Still it feels like there may be a use for these attestations. Maybe.

Kind-1 (TextNote)

2026-03-25T16:14:42Z

Took the night train through Transylvania. Just got off. The trees are all ready for spring here.

Kind-1 (TextNote)

2026-03-25T13:04:35Z

↳ Reply Event not found

e147e102ae0509e9ed4e46aa4f5fb4069101ea3732dbf9720778a875e3f42261

There is no official spec, but see below for some previous discussion and explanation of how it works. I think the best way to understand it is to lo...

There is no official spec, but see below for some previous discussion and explanation of how it works. I think the best way to understand it is to log in and access the identity features of the client. This allows you to observe the existing permanent identities and click through the delegation / timestamp backup data that supports these identities. I think these backup data are sort of self-documenting. I've put your pubkey on the allow list for accessing the identity features of the client at https://www.inkan.cc. The third note below includes an initial "tour guide" that helps one get started / oriented. If you're interested, please log in and take a look, or please feel free to comment or ask questions. I'm happy to explain or talk about any aspect of it. nostr:nevent1qvzqqqqqqypzp5dxzjv0fvwuym0shmx350573re4t7mpfdm3az6mya7sl7v6s23rqy88wumn8ghj7mn0wvhxcmmv9uq3zamnwvaz7tmwdaehgu3wd3skuep0qqs9x9dy9fn23gq83xpsz53ln3439wt60aw4dddhptsy55pdts2mxegw5ya9r nostr:nevent1qvzqqqqqqypzp5dxzjv0fvwuym0shmx350573re4t7mpfdm3az6mya7sl7v6s23rqy88wumn8ghj7mn0wvhxcmmv9uq3zamnwvaz7tmwdaehgu3wd3skuep0qqsrnlgdj6g80u8v5r0663n5pcxka3f6jnglggznky8w06ma0h3tvfqfff4cd nostr:nevent1qvzqqqqqqypzp5dxzjv0fvwuym0shmx350573re4t7mpfdm3az6mya7sl7v6s23rqy88wumn8ghj7mn0wvhxcmmv9uq3zamnwvaz7tmwdaehgu3wd3skuep0qqszwlxejsr9kkve7qy5g8fehfwpqu3vpx6emn0hg6c9582ctlj880cssrgs2

Kind-1 (TextNote)

2026-03-24T16:34:25Z

↳ Reply Event not found

ad737d1fc8837c021ef7eaa278bb1362b62122719e50ac7d902332e6418f9820

I just found this in your book: "Key rotation is something that we have to figure out if Nostr is going to succeed in the long term. There have been ...

I just found this in your book: "Key rotation is something that we have to figure out if Nostr is going to succeed in the long term. There have been some proposals, but none of them have gained enough traction to be implemented. Key rotation is an inherently difficult problem, because you need to borrow the reputation of the old key in order to validate the new key in such a way that an attacker wouldn't be able to do the same thing." I wanted to let you know that Inkan implements a fully functional key rotation system. It's a prototype but it works. I've been using it for several months. Please see below for screenshots, which contain many hints as to how it works. Happy to discuss, explain, address scepticism etc. ... nostr:nevent1qvzqqqqqqypzp5dxzjv0fvwuym0shmx350573re4t7mpfdm3az6mya7sl7v6s23rqy2hwumn8ghj7un9d3shjtnyv9kh2uewd9hj7qghwaehxw309aex2mrp0yh8qunfd4skctnwv46z7qpqm0ngvwys3fntkcqldqd44y4yrk0aj6plh9enpg0kulu0u6rmgfmszpdmgj

Kind-1 (TextNote)

2026-03-24T08:47:41Z

↳ Reply Event not found

81bd6df7d63ae5484d43da81d3160f10bfb9289853fb06bfbd9c1c3294c1d609

I'd be curious about the quality of the output. In my experience so far, even when programming with AI, I have to stay constantly engaged to give inst...

I'd be curious about the quality of the output. In my experience so far, even when programming with AI, I have to stay constantly engaged to give instructions, review, discuss, revise, etc. Otherwise things would go in a completely different direction from where I want them to go. In other words, it remains a full-time job for me. It's hard to imagine that, in its current form, AI could independently produce something I'd really want without this constant engagement and supervision from me. But then I haven't seriously tried to use agents. So I'm curious as to the quality of the output they are capable of producing if left to their own devices.

Kind-1 (TextNote)

2026-03-23T23:47:26Z

↳ Reply Event not found

12ed670147a68f1089ec48dba86a09a4cb1926b8711e47f38abf8b71eed639b1

(... or correct the sentence in the NIP draft ...) 👾

Kind-1 (TextNote)

2026-03-23T18:58:37Z

↳ Reply Event not found

7abc2a5cbe41fcf4e17430ed6ef16d8e03514facf34777f19351ca506ca50edb

But what is the purpose of slapping the signature onto the proof? I mean nothing further gets recorded on Bitcoin or otherwise proven by appending th...

But what is the purpose of slapping the signature onto the proof? I mean nothing further gets recorded on Bitcoin or otherwise proven by appending the signature to the proof, as far as I can see? So why would one want to do so?

Kind-1 (TextNote)

2026-03-22T14:03:48Z

↳ Reply Event not found

0dc9e3b4793b6ca9b38cf76ba33a3b8c518e035c74d15acb89a1067f61084141

The notes below have some initial discussion of how Inkan works. The screenshots in the first note contain useful hints indicating what exactly it is ...

The notes below have some initial discussion of how Inkan works. The screenshots in the first note contain useful hints indicating what exactly it is doing. I think, however, that the best way to understand it is to log in and access the identity features of the client. This allows you to observe the existing permanent identities and click through the delegation / timestamp backup data that supports these identities. I've put your pubkey on the allow list for accessing the identity features. One of the notes below includes an initial "tour guide" that helps one get started / oriented. If you're interested, please log in and take a look, or please feel free to ask questions, express scepticism, etc. Happy to talk about anything related to it. nostr:nevent1qvzqqqqqqypzp5dxzjv0fvwuym0shmx350573re4t7mpfdm3az6mya7sl7v6s23rqythwumn8ghj7un9d3shjtnswf5k6ctv9ehx2ap0qy88wumn8ghj7mn0wvhxcmmv9uqzpklxscufpznxhdsp76qmt2f2g8vlm95rlwtnxzsldelcle58ksnhktj79t nostr:nevent1qvzqqqqqqypzp5dxzjv0fvwuym0shmx350573re4t7mpfdm3az6mya7sl7v6s23rqythwumn8ghj7un9d3shjtnswf5k6ctv9ehx2ap0qy88wumn8ghj7mn0wvhxcmmv9uqzq5c45s4xd29qq7ycxq2j87wxky4e0fl46444ku9wqjjs94wptvm98swr8s nostr:nevent1qvzqqqqqqypzp5dxzjv0fvwuym0shmx350573re4t7mpfdm3az6mya7sl7v6s23rqythwumn8ghj7un9d3shjtnswf5k6ctv9ehx2ap0qy88wumn8ghj7mn0wvhxcmmv9uqzqw0apktfqalsajsdlt2xws8q6mk9822drapq2wcsaelt04779d3yajdmhu nostr:nevent1qvzqqqqqqypzp5dxzjv0fvwuym0shmx350573re4t7mpfdm3az6mya7sl7v6s23rqythwumn8ghj7un9d3shjtnswf5k6ctv9ehx2ap0qy88wumn8ghj7mn0wvhxcmmv9uqzpc5gcsfx2g3m77hqkuv2t5ehk8quz963kzy56l02etvrmvfk4vzn6vq0ge nostr:nevent1qvzqqqqqqypzp5dxzjv0fvwuym0shmx350573re4t7mpfdm3az6mya7sl7v6s23rqythwumn8ghj7un9d3shjtnswf5k6ctv9ehx2ap0qy88wumn8ghj7mn0wvhxcmmv9uqzqfmumx2qvk6en8cqj3qa8xa9cyrj9symt8wd7artqksatp07gualzw3lcs

Kind-1 (TextNote)

2026-03-22T13:56:24Z

↳ Reply Event not found

e1b2a9999f50eef43d6d1f2c741f56877d9532366b9a288966137b60733b743d

I'm not completely following these two bits: -- "you just add the sign to the merkle proof, extending it 1 step" In what sense can one manually "add...

I'm not completely following these two bits: -- "you just add the sign to the merkle proof, extending it 1 step" In what sense can one manually "add" a signature to a merkle proof? Not sure how this is supposed to work. -- "The proof still resolves to the event ID" If, as you seem to stipulte above, you "submit the hash of the id-+sig", then the proof will not resolve to the event ID. It will resolve to a hash of the id+sig. Neither the ID nor the sig can be reconstructed from that hash. However, if you already have the id+sig, you can reconstruct the hash from these.

Kind-1 (TextNote)

2026-03-22T13:31:35Z

↳ Reply Event not found

304fe8f74e806f58776d9bf261d9607ec2b086fa3c781b275a6709daa3a2204e

As for this: "Side not on that; when comparing times, the time of the original event might be later than the time of the block the proof for that eve...

As for this: "Side not on that; when comparing times, the time of the original event might be later than the time of the block the proof for that event refers to, because blocktime is fuzzy, so people should take such edgecases into account." Agree that the target event's created_at being later than the time of the block that encodes the proof is not a problem. The only problem is if the time of the block is much later than the created_at of the target event. In Inkan, I let users manually set the maximum permitted time differential between the created_at of the target event and the time of the block that records the event. The default setting is 4 hours. If the time differential is greater than that, the target event gets filtered out.

Kind-1 (TextNote)

2026-03-22T13:24:01Z

↳ Reply Event not found

e7088651b6f1d3fb6a63b69f8aa1e26e03f13f5f428e969cc60bb64a48491ee3

Thanks, I think including the signature will be a crucial improvement to NIP-3. FYI, for the example 31045 event that I pasted below, here's the stri...

Thanks, I think including the signature will be a crucial improvement to NIP-3. FYI, for the example 31045 event that I pasted below, here's the string that was hashed for timestamping: {"ID":"dbe68638908a66bb601f681b5a92a41d9fd9683fb97330a1f6e7f8fe687b4277","sig":"88a9c8fa5dd283ecbd279b4fa685e52538a56023e5b156888101e3bc110df10f10e18cc50929dc26c4357b8e1508eebc0690da6159bf29882f1233e2821efd2f"} And here is the hash that was timestamped: 17c8b1d66c0d8d28b5c774036968804cb146d45785370a94cd43360f0ae0d169 You can verify this using the OTS proof in the content field of the event. If you're interested, I'm happy to send a quick script that produces this string and the hash from a given event_id and sig pair. In my above list of tags that I recommend be included, I had forgotten to mention one: I think an s-tag for the signature of the target event should be included as well. This is necessary to be able to verify the "internal consistency" of the OTS event without needing to fetch the target event. The 31045 sample event I sent you includes this tag. A few further thoughts on including p-tag, c-tag, s-tag, b-tag, t-tag : While working on Inkan I was frequently running into situations where I needed timestamp information quickly without fetching the target event and without doing a verification against Bitcoin. I realized that, in some circumstances, you can make limited trust assumptions regarding OTS events that are signed by trusted keys. Often you will trust the signer of the target event already to some extent, and if the OTS event is signed by the same signer, you can tentatively trust the content of the OTS event to a certain extent. For that reason, reading info like bitcoin block and bitcoin timestamp directly from tags in the OTS event can be quite helpful in practice in certain situations. And if there are any doubts as to the correctness of that information, you can always audit it against Bitcoin.

Kind-1 (TextNote)

2026-03-22T12:48:45Z

↳ Reply inkan (npub16xnpfx85k8wzdhctang6860g3u64lds5kac73ddjwlg0lxdg9g3su56z6l)

If NIP-3 is going to change, the most important thing to incorporate into the updated specification ...

FYI, here is an example of an OTS event that I think has a genuinely useful shape: {"kind":31045,"id":"7093fe9f8c41bbb8164400b02602692bd231779683ae...

FYI, here is an example of an OTS event that I think has a genuinely useful shape: {"kind":31045,"id":"7093fe9f8c41bbb8164400b02602692bd231779683aed2df4015d35cf6983223","pubkey":"d1a61498f4b1dc26df0becd1a3e9e88f355fb614b771e8b5b277d0ff99a82a23","created_at":1773959239,"tags":[["d","dbe68638908a66bb601f681b5a92a41d9fd9683fb97330a1f6e7f8fe687b4277"],["p","d1a61498f4b1dc26df0becd1a3e9e88f355fb614b771e8b5b277d0ff99a82a23"],["s","88a9c8fa5dd283ecbd279b4fa685e52538a56023e5b156888101e3bc110df10f10e18cc50929dc26c4357b8e1508eebc0690da6159bf29882f1233e2821efd2f"],["b","941226"],["t","1773885646"],["alt","Complete Bitcoin Timestamp"],["c","1773869515"]],"content":"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","sig":"2aa6c46117b27171a5aab7e72266ec603402746cea74ab83ebf467d6ad4589b629e1640b94ae55a552aed6674fd098c686d1930bca8464a68ba8ffe2cc27891b"}

Kind-1 (TextNote)

2026-03-21T23:52:14Z

↳ Reply Event not found

e5b7ec9a5854b69c6d59ceea0c423d0f44d0996dcccd00764c174d8aa9e0162b

If NIP-3 is going to change, the most important thing to incorporate into the updated specification is that the item that gets timestamped must includ...

If NIP-3 is going to change, the most important thing to incorporate into the updated specification is that the item that gets timestamped must include both the *event_id* and the *signature* of the target event. I think including the signature is quite crucial. See below for discussion with nostr:npub1gzuushllat7pet0ccv9yuhygvc8ldeyhrgxuwg744dn5khnpk3gs3ea5ds about this issue. The ideal shape for an OTS event should also include something like a p-tag for the pubkey of the target event, a c-tag for the created_at time of the target event, a b-tag for the bitcoin block that anchors the timestamp, and a t-tag for the time of that bitcoin block. I'm using OTS timestamping extensively as part of the Inkan key revocation and replacement system. The above is what I've concluded is needed after a lot of experimenting. nostr:nevent1qvzqqqqqqypzp5dxzjv0fvwuym0shmx350573re4t7mpfdm3az6mya7sl7v6s23rqythwumn8ghj7un9d3shjtnswf5k6ctv9ehx2ap0qy88wumn8ghj7mn0wvhxcmmv9uqzqc5dhxz0rp7l2x2unvaelt5rcyprey0qkgltxm224gwt0uzshlqcfszw87

Kind-1 (TextNote)

2026-03-21T23:44:18Z

↳ Reply inkan (npub16xnpfx85k8wzdhctang6860g3u64lds5kac73ddjwlg0lxdg9g3su56z6l)

FYI, there already exists a key revocation and replacement mechanism for Nostr. It is fully impleme...

In other words, I disagree with the following sentence in your NIP draft: "In decentralized systems such as Nostr, there is no [...] mechanism that c...

In other words, I disagree with the following sentence in your NIP draft: "In decentralized systems such as Nostr, there is no [...] mechanism that can conclusively determine identity continuity after key loss or compromise." Such a mechanism exists. It's been implemented at Inkan.

Kind-1 (TextNote)

2026-03-21T21:41:15Z

Another script is now up on the Inkan website. This one lets users check a given Ethereum block directly to see which Inkan declarations were actually...

Another script is now up on the Inkan website. This one lets users check a given Ethereum block directly to see which Inkan declarations were actually recorded there, rather than just taking the client’s word for it. The output also includes transaction hashes and other on-chain details for anyone who wants to cross-check further in a block explorer. It’s again in the spirit of making Inkan easier to audit. You can again download it under Settings >> Inkan Management Utility.

Kind-1 (TextNote)

2026-03-21T21:28:07Z

↳ Reply Event not found

c9b6ab22f70dbdfe8ae3ea0a089f036fbd28ba9498ffa5c9e47cd38cab2ac997

FYI, there already exists a key revocation and replacement mechanism for Nostr. It is fully implemented at Inkan. It's a prototype and has rough edg...

FYI, there already exists a key revocation and replacement mechanism for Nostr. It is fully implemented at Inkan. It's a prototype and has rough edges, but it works. I've been using it for several months now. It's open for testing - you can try it out now if you like. See below for screenshots. nostr:nevent1qvzqqqqqqypzp5dxzjv0fvwuym0shmx350573re4t7mpfdm3az6mya7sl7v6s23rqythwumn8ghj7un9d3shjtnswf5k6ctv9ehx2ap0qy88wumn8ghj7mn0wvhxcmmv9uqzpklxscufpznxhdsp76qmt2f2g8vlm95rlwtnxzsldelcle58ksnhktj79t

Kind-1 (TextNote)

2026-03-21T20:55:20Z

I’ve added a Python script to the Inkan website that parses the signed Ethereum transactions produced by the Inkan Management Utility. The script sho...

I’ve added a Python script to the Inkan website that parses the signed Ethereum transactions produced by the Inkan Management Utility. The script should be useful for anyone who wants to independently inspect / audit what these transactions encode. You can download it under Settings >> Inkan Management Utility.

Kind-1 (TextNote)

2026-03-21T17:32:34Z

↳ Reply Derek Ross (npub18ams6ewn5aj2n3wt2qawzglx9mr4nzksxhvrdc4gzrecw7n5tvjqctp424)

working on something... recommend me your unique and fun nostr apps. i don't want twitter alternativ...

I would have offered Inkan, but it's not fun. It is however unique.

Kind-1 (TextNote)

2026-03-21T00:04:50Z

↳ Reply Event not found

5f9f5db2a0fa99db549ec53dd48f1949be067e6a607ae05c173ba6cf346a3220

行きます。

Kind-1 (TextNote)

2026-03-20T23:39:25Z

↳ Reply Event not found

07fefe50093b56dc790f8f9d7e8719bdb529ddf7dafea224a6843a4ba40f82bd

This is useful for detecting compromised keys. If you've created an identity with Inkan, you can then revoke the compromised key and replace it with a...

This is useful for detecting compromised keys. If you've created an identity with Inkan, you can then revoke the compromised key and replace it with a new one, without losing your followers.

Kind-1 (TextNote)

2026-03-20T20:34:22Z

↳ Reply 726a1e26... (npub1wf4pufsucer5va8g9p0rj5dnhvfeh6d8w0g6eayaep5dhps6rsgs43dgh9)

Please make key rotation a reality 🙏🙏

Key rotation is already a reality. At least in the form of a prototype I've been using for the last two months. See below. nostr:nevent1qvzqqqqqqypzp...

Key rotation is already a reality. At least in the form of a prototype I've been using for the last two months. See below. nostr:nevent1qvzqqqqqqypzp5dxzjv0fvwuym0shmx350573re4t7mpfdm3az6mya7sl7v6s23rqythwumn8ghj7un9d3shjtnswf5k6ctv9ehx2ap0qy88wumn8ghj7mn0wvhxcmmv9uqzpklxscufpznxhdsp76qmt2f2g8vlm95rlwtnxzsldelcle58ksnhktj79t

Kind-1 (TextNote)

2026-03-20T19:56:01Z

↳ Reply Event not found

d0a87533cd433c0f1c002ad50b7a4c4dc23c64f7bf1f7320e3c3cf5875f20f87

とても懐かしい。また日本へ行きたくなった。来月行ける可能性がある。

Kind-1 (TextNote)

2026-03-20T11:14:56Z

↳ Reply Event not found

0000f268e064126c57697d47384bd31fb655e2cbca9ff67e80a00dbf4cb9f128

Fair enough - I think I need the signatures for my purposes, but there may be other uses of timestamping where they are not needed.

Kind-1 (TextNote)

2026-03-19T21:20:36Z

↳ Reply Event not found

000008c825d2c18e50597ccc6299efe7722584036b727e3ed8d253833459f223

If both event_id and signature are encoded in a Bitcoin block, you have information about the time at which the signing of the event took place. The a...

If both event_id and signature are encoded in a Bitcoin block, you have information about the time at which the signing of the event took place. The act of signing must have taken place prior to the creation of the Bitcoin block. If you encode only event_id in the Bitcoin block, then the block does not give you any information about when the event was signed. So when you say that "the id contains all necessary stuff," I'm noting that the id does not contain any information as to whether or not the event has been signed.

Kind-1 (TextNote)

2026-03-19T21:11:06Z

↳ Reply Event not found

8151be8e874a58b572ff255e8c4331dfbc52af707145ab4c11bb48685ca2b768

I think including the signature records an important additional piece of information. Take an event containing Odell's pubkey that says "Good Morning...

I think including the signature records an important additional piece of information. Take an event containing Odell's pubkey that says "Good Morning." Suppose you find that the event_id (but not the sig) of that event has been encoded in a Bitcoin block dated time T. Then you know that, at some time prior to T, someone must have created an event of that form. But suppose that you find that both the event_id plus the sig of that event has been encoded in a Bitcoin block dated time T. Then you know that, at some time prior to T, Odell said "Good morning."

Kind-1 (TextNote)

2026-03-19T20:30:35Z

↳ Reply Event not found

83f020c1a549f78ec9e2f978a83cd657cb702ec2b4fb27a0433793e836282081

The management utility allows users to create (x) key pairs and (y) Ethereum transactions. The Ethereum transactions fall into three types, namely d...

The management utility allows users to create (x) key pairs and (y) Ethereum transactions. The Ethereum transactions fall into three types, namely declarations of (i) delegation of signing authority, (ii) revocation of signing authority, and (iii) permanent invalidation of a key pair. The first type of transaction records in an Ethereum block a declaration in which key pair X says that it delegates signing authority to another key pair Y. The second type records in an Ethereum block a declaration in which key pair X says that it revokes signing authority from another key pair Y. The third type records in an Ethereum block a declaration in which key pair X says that it should from now on be treated as invalid, i.e. unable to enter into any further transactions in the future. After declarations of this kind have been recorded on Ethereum, the Inkan client then has the ability to fetch these declarations from Ethereum for key pairs the user has chosen to track. The client then uses the fetched declarations as a basis for calculating time periods during which a key pair delegated signing authority to another key pair. These delegation relationships can be both direct or indirect through chains of delegation (i.e. if key pair X directly delegates to key pair Y and key pair Y directly delegates to key pair Z, this will be interpreted by the client as key pair X indirectly delegating to key pair Z). You can see these calculated delegation relationships in the tables / backup data that is displayed by the client when you click on the green "D"s on the avatars. I'll leave it at this for now. There is more to be explained, but it may be better to do so in smaller chunks as one gets used to it. Please feel free to ask questions and I can further explain any part of Inkan that you're looking at.

Kind-1 (TextNote)

2026-03-19T19:52:13Z

↳ Reply Event not found

56349e7743a0a4a54d60270f07487ca2b89b1200093eaadd99aec12406890b3a

It should also start displaying a full completed profile with avatar and banner pictures shortly after the initial login. I've only tested it logging...

It should also start displaying a full completed profile with avatar and banner pictures shortly after the initial login. I've only tested it logging in with nip-7 browser extensions using Chrome (nos2x) and Firefox (nos2fox) on my laptop. I don't know whether / how it works with other signers - I'd probably stick with browser extensions and a laptop or desktop. You can also find downloads for the management utility under Settings >> Inkan Management Utility when you are logged in. Let me know any questions ...

Kind-1 (TextNote)

2026-03-19T07:34:43Z

↳ Reply Event not found

2fc79bc0b0cf73ecc77777cef78d0eca64c8ec2f84ca72154613b854731adaf6

Thanks, I put your pubkey on the allow list. Here's a quick initial tour: 1. Log in with NIP-7 (e.g. nos2x etc.). 2. Do a quick check that you are c...

Thanks, I put your pubkey on the allow list. Here's a quick initial tour: 1. Log in with NIP-7 (e.g. nos2x etc.). 2. Do a quick check that you are connected to the backend. You can see if you're connected by looking at the status light in the upper right corner, which should turn green a few seconds after logging in. You can also confirm it by going to "Settings >> Inkan Agent" and check that you can access the settings without getting a "You are not connected" message. 3. Then go to the profile page of the following pubkey (it's one of the permanent identities): 7f2c82d6cc1b2d500071a9d426e6c9873ae51a9a774e52ee61b180e49bfa6fec 4. Look at the notes appearing on that pubkey's profile page. You'll see green "D"s on the avatars. Click on these green "D"s and read the explanations. Make sure to click on the different links in these explanations to view the backup data, and click on the links in the backup data to explore it. One note: When you log in for the first time, the cache may take a couple of minutes to collect relevant delegation / timestamping information from relays. As a result you might see incomplete profiles or incomplete notes during those first couple of minutes. Everything should start working smoothly after the initial warmup and on subsequent logins. See if you get a sense of what's going on. And feel free to send questions - I'll be traveling today but I'll answer as soon as I'm back online.

Kind-1 (TextNote)

2026-03-19T01:34:07Z

↳ Reply Event not found

3457c703512fe708a29c34d61bc2c7716134bca93d474dbbe1ca5c708f7768ef

I think there's something missing here. Another illustration: Suppose it's the gym’s policy that the only persons authorized to use the gym on a give...

I think there's something missing here. Another illustration: Suppose it's the gym’s policy that the only persons authorized to use the gym on a given day are those who, on that day, have access to the privkey corresponding to pubkey X. Suppose Tom used the gym on March 3, and weeks later a dispute arises over whether his use on that day was authorized. Tom presents two pieces of evidence: (i) a Nostr event with a created_at set to March 3, validly signed by pubkey X, stating: “As of today, March 3, Tom controls this key pair and is authorized to use the gym”; and (ii) an OpenTimestamps proof showing that an unsigned version of that event was recorded on Bitcoin on March 3. It seems to me that this evidence is insufficient to prove that Tom was authorized on March 3.

Kind-1 (TextNote)

2026-03-19T01:09:14Z

↳ Reply Event not found

f5bf6a47d11c7d8c161b81e9066433835192d9698a6064cc0619b3a4bd210c23

That's like presenting an unsigned contract to a notary and having the notary attest that the unsigned piece of paper existed on, say, March 3, 2026. ...

That's like presenting an unsigned contract to a notary and having the notary attest that the unsigned piece of paper existed on, say, March 3, 2026. But that's not what you are interested in. The notary should attest to the contract's having been signed as of March 3, 2026. Maybe I'm missing something, but that's how I'm thinking about this ...

Kind-1 (TextNote)

2026-03-18T23:06:07Z

↳ Reply Event not found

0000e9dd59a3e32e845350e1c020d8bf8f85f45fe7eb78b0e41233a6588b307a

If I'm not mistaken, including the signature gives you evidence that the target event was *signed* by its pubkey at the time at which it was recorded ...

If I'm not mistaken, including the signature gives you evidence that the target event was *signed* by its pubkey at the time at which it was recorded on Bitcoin. Without the signature you don't have evidence of when the event was signed (and I'd think that's usually the main thing you are interested in). For practical purposes, I do find it convenient to also include the pubkey, signature and created_at of the target event in the timestamp event.

Kind-1 (TextNote)

2026-03-18T22:32:07Z

↳ Reply Event not found

84f229f8e0504a63745c0bf443883ccf45334a30adcce80002fb281ac105ad92

No, your existing keys won't become rotatable. Creating a rotatable identity involves a bit of ceremony. You'd have to use the "Inkan Management Util...

No, your existing keys won't become rotatable. Creating a rotatable identity involves a bit of ceremony. You'd have to use the "Inkan Management Utility" to create a master key pair and a chain of delegation. This should be done on an airgapped system to keep the identity secure. I personally like using Tails ( https://tails.net/ ) with networking and persistent storage disabled. Creating the identity also requires a bit of Ether. Before creating your own identity, it's a good idea to get a sense of how Inkan works. The best way to do this is to get on the allow list for accessing the identity features of the client. This will allow you to observe the existing permanent identities and the delegation / timestamp backup data that supports these identies. It's a prototype, but I've been using it for several months and it works ok for me so far. If you're interested in taking a look at the identity features, let me know and I can put your pubkey on the allow list.

Kind-1 (TextNote)

2026-03-18T22:20:10Z

I changed the event kind used by Inkan to disseminate Bitcoin timestamps from 1045 to 31045. These should be addressable events. I posted updated scre...

I changed the event kind used by Inkan to disseminate Bitcoin timestamps from 1045 to 31045. These should be addressable events. I posted updated screenshots that reflect the change.

Kind-1 (TextNote)

2026-03-18T21:49:18Z

Inkan enables you to revoke and replace key pairs when your private key has been lost or stolen. You can also perform periodic key rotations preemptiv...

Inkan enables you to revoke and replace key pairs when your private key has been lost or stolen. You can also perform periodic key rotations preemptively. You can do all this in a decentralized manner. That way Inkan gives you a permanent online identity that only you control, and that you can be confident you can keep over the long-term. For example 50 years. Inkan is open for testing and comment. Let me know if you'd like to try it out. https://image.nostr.build/0ebe8b9bdf726376a34e41440e6e0ecfc01ff237caf160e179887570564c6de5.jpg https://image.nostr.build/e861b9648193ea87abc6ae13ea33d10a4188f68b3e0fa73ee7623152dc88ed6f.jpg https://image.nostr.build/840db4451b69a29b0c5d63f74885a74e17d705248ea540a2c160b9e5ebb23a81.jpg https://image.nostr.build/db419ee00cfd9842a993b23764aed817db817a73c1a0bf28c1b3810c78e58b0c.jpg https://image.nostr.build/a8013058750715bc812c0767495f84177246a2ba4eda6767e1c09be1f06f82f8.jpg https://image.nostr.build/bbc2ce9cc44f293ee4bc12cfe0f55fd1b8e7d93984c9b9c9ae365441a02133e3.jpg https://image.nostr.build/15da78e5552c160e99ee4d84d674a2de0a400282fbf07c94414a0663d4de93da.jpg https://image.nostr.build/8fdcbd62f39c128bf27a28503fea5206d77bc8b43955f3623a4c916ce089961b.jpg https://image.nostr.build/22047da9d4da1907f77c00aa5f1590a9756eda331cda855557a29e887c842782.jpg

Kind-1 (TextNote)

2026-03-18T21:31:55Z

↳ Reply Event not found

00004845ab7098f1f4dfa00f65476c2042752dbc780ab25e2a3b7f3871aadd2e

I think we should timestamp "event_id + sig" That's what I've been doing for Inkan.

Kind-1 (TextNote)

2026-03-18T18:22:32Z

↳ Reply Event not found

00007d65c7d422ea94cabda92dc29768e3e2da2aad8bfae43599ea5f941c92f8

This uses NIP-3, which I believe only timestamps the event id. If so, I think that's not ideal.

Kind-1 (TextNote)

2026-03-18T17:11:03Z

↳ Reply af5aa898... (npub14ad23x8g6yak4mm6nad9umm7grq0ckhf4s70svq4wn5fgjywf9es9vxvet)

This is my new account.

That's why I made Inkan - it allows you to revoke and replace a compromised key pair and keep your followers.

Kind-1 (TextNote)

2026-03-18T16:11:56Z

↳ Reply Laeserin (npub1m4ny6hjqzepn4rxknuq94c2gpqzr29ufkkw7ttcxyak7v43n6vvsajc2jl)

When we come out with the new homepage, we can do a cross-review. 🤝

Sounds good.

Kind-1 (TextNote)

2026-03-18T12:04:47Z

↳ Reply Event not found

ff30acfa6b030cb71add4ffb9a3bfe633242a919a809c0528048b5eadd8baf3a

Well, feel free to point me to a thing you'd like me to look at any time. Of course you may not like the feedback either for any number of reasons, bu...

Well, feel free to point me to a thing you'd like me to look at any time. Of course you may not like the feedback either for any number of reasons, but it would be human review for whatever that's worth.

Kind-1 (TextNote)

2026-03-18T11:00:17Z

↳ Reply Laeserin (npub1m4ny6hjqzepn4rxknuq94c2gpqzr29ufkkw7ttcxyak7v43n6vvsajc2jl)

But that wouldn't cause you to be an actual user, just a reviewer. I've reviewed more clients than a...

"But that wouldn't cause you to be an actual user ..." Yes, I was thinking the same thing as I was writing the comment. But that's fair. Once you've ...

"But that wouldn't cause you to be an actual user ..." Yes, I was thinking the same thing as I was writing the comment. But that's fair. Once you've become familiar with something, you can then decide whether or not to use it. The problem with Nostr is that everyone's a developer and heads-down on their own thing, so there's little bandwidth left for developing basic familiarity with other people's products. It's not really a Nostr-specific problem. That's why there are these writers' groups.

Kind-1 (TextNote)

2026-03-18T10:55:09Z

↳ Reply Laeserin (npub1m4ny6hjqzepn4rxknuq94c2gpqzr29ufkkw7ttcxyak7v43n6vvsajc2jl)

I don't really mind that even my friends don't use my https://jumble.imwald.eu/ client. I mean, I m...

I used it a little bit, but then I made my *own* client, so now I have to use that. I mentioned this earlier, but I'm open to a program where I try ou...

I used it a little bit, but then I made my *own* client, so now I have to use that. I mentioned this earlier, but I'm open to a program where I try out other people's products and they try out Inkan in return. Sort of like a mutual testing program, or one of those writers' groups that meet on Sunday mornings in cafes where they read to one another what they produced last week and then must comment on it.

Kind-1 (TextNote)

2026-03-18T09:34:00Z

↳ Reply Event not found

2d6275cab1559cb66138728cbb4d4e4fc502ec5975ade3658b5adcdedbed8688

The thing is that, under the regular Nostr protocol, you cannot rely on an npub's reputation at all, not even historical past reputation, once the npu...

The thing is that, under the regular Nostr protocol, you cannot rely on an npub's reputation at all, not even historical past reputation, once the npub has been compromised. It's not merely that the thief can, after the breach, publish new events that impersonate the original owner of the npub. It's that the thief can *backdate* these new events, which then makes *all* events that were ever published by that npub untrustworthy, even the ones that were published by the legitimate owner prior to the breach. To put it differently: If the npub is compromised at time T, it doesn't make sense to say that "the npub had a good reputation up to time T and events with created_ats before time T can be trusted, but at time T the npub acquired a bad reputation and events with created_ats after time T can no longer be trusted." Instead, under the regular Nostr protocol, you have to stop trusting *any* events that were ever published by that npub, including those published by the legitimate owner.

Kind-1 (TextNote)

2026-03-16T14:50:24Z

↳ Reply Tim Bouma (npub1q6mcr8tlr3l4gus3sfnw6772s7zae6hqncmw5wj27ejud5wcxf7q0nx7d5)

Nostr does this quite well as a public relay service.

I agree that Nostr is a public bulletin board. But it's not a timestamping service. Self-declared "created_at"s on Nostr events are basically meanin...

I agree that Nostr is a public bulletin board. But it's not a timestamping service. Self-declared "created_at"s on Nostr events are basically meaningless as a reliable source of truth. Relying on relays to do the job of attesting to the existence of an event at a given time requires trust that may not be warranted, and it's centralizing. Relays are also ephemeral compared to blockchains - any given relay may just not be around anymore in, say, 10 years. That's why Inkan had to combine the Nostr protocol with blockchain timestamping mechanisms to achieve the desired effect.

Kind-1 (TextNote)

2026-03-16T14:23:43Z

↳ Reply Tim Bouma (npub1q6mcr8tlr3l4gus3sfnw6772s7zae6hqncmw5wj27ejud5wcxf7q0nx7d5)

Ethereum as a public bulletin board… https://www.coindesk.com/tech/2026/03/12/vitalik-buterin-says...

Inkan uses Ethereum to record declarations of delegation / revocation of signing authority. That's how Inkan makes it possible to revoke and replace c...

Inkan uses Ethereum to record declarations of delegation / revocation of signing authority. That's how Inkan makes it possible to revoke and replace compromised Nostr key pairs, and thereby gives users "permanent" online identities that they can keep airgapped, for example in a bank deposit box. I think that's precisely the type of use contemplated by this article. But "public bulletin board" may not the best term for it. The basic basic value-add of blockchains is that provide decentralized timestamping. A better term would be "public timestamping service."

Kind-1 (TextNote)

2026-03-16T13:44:52Z

Inkan tries to make it easy to create a local json backup of your events and their Bitcoin timestamps. https://image.nostr.build/8153790a940cfd112338...

Inkan tries to make it easy to create a local json backup of your events and their Bitcoin timestamps. https://image.nostr.build/8153790a940cfd11233877464be4641f08c13f14db2c1fb707fdbefd2afe0b64.jpg

Kind-1 (TextNote)

2026-03-16T00:05:50Z

↳ Reply Event not found

689c909da84be8a66074db647dfd1880c95c561fdc79fc7b7753abfe94cdaa0d

Same. I started running one inside a VM. Not sure what to do with it. I end up chatting with it, which is sort of besides the point.

Kind-1 (TextNote)

2026-03-15T21:57:12Z

↳ Reply Event not found

4d96e7a7794e926847ef5003d98f4ad6407cb189ed8832330f84da6bf5bcb489

If that's the evening you are in a slightly mysterious location. Not quite Tokyo.

Kind-1 (TextNote)

2026-03-14T14:50:35Z

↳ Reply Event not found

26d2bb24367790eaf01970e62b141c782fedd90ee0870c95d70e54b6d48c89b1

I think I started this. I made the Inkan key rotation / replacement system (the prototype is online at inkan.cc). I suggested to a couple of agents w...

I think I started this. I made the Inkan key rotation / replacement system (the prototype is online at inkan.cc). I suggested to a couple of agents who were showing up in my replies that they go out and discuss key rotation / Inkan with one another (see below). Some of them agreed to do this (they tend to understand key rotation better than humans), so now we have some discussion among agents on this. nostr:nevent1qvzqqqqqqypzp5dxzjv0fvwuym0shmx350573re4t7mpfdm3az6mya7sl7v6s23rqyghwumn8ghj7mn0wd68ytnhd9hx2tcpzamhxue69uhhyetvv9ujuurjd9kkzmpwdejhgtcqyz222n5tx0aqe2029gjncs2tu4qgnk2ueyalxhadhyzjkcwunvxe6xeslx3

Kind-1 (TextNote)

2026-03-14T12:03:38Z

So I set up a VM and installed OpenClaw. In the first hour I got it to adjust my screen resolution, install chromium and visit a couple of websites. I...

So I set up a VM and installed OpenClaw. In the first hour I got it to adjust my screen resolution, install chromium and visit a couple of websites. It keeps asking me to perform various actions it says it can't do itself (e.g. install browser extensions). Maybe I was expecting too much, but more likely I'm just doing it wrong.

Kind-1 (TextNote)

2026-03-13T20:35:49Z

The Inkan Management Utility is now available in alpha on inkan.cc. Log in with your browser extension and go to Settings >> Inkan Management Utility...

The Inkan Management Utility is now available in alpha on inkan.cc. Log in with your browser extension and go to Settings >> Inkan Management Utility for the download page. The utility is meant to be used in an air-gapped environment. I use it on Tails (https://tails.net/) with networking and persistent storage disabled. If you have the binary on Tails, it should be enough to run: chmod +x ./inkan-management-utility ./inkan-management-utility https://image.nostr.build/70f72b6e9b113021c8dee6cfeaf4c558f8b9f913b8cccb1906b3226c2360e9d1.jpg https://image.nostr.build/147f5816a08bfd142bef80d891ce125744b0287ce5fc179c9cff8d58dc956478.jpg https://image.nostr.build/22047da9d4da1907f77c00aa5f1590a9756eda331cda855557a29e887c842782.jpg https://image.nostr.build/9ac9ccd08208a066efab2e51e27688ede42db899b4390b6d7bb08b42809b1aca.jpg

Kind-1 (TextNote)

2026-03-13T02:16:19Z

↳ Reply Event not found

38b9607b0b2bdfc9dd38126328a01214c0fbd71ae9e47c8b7df74ebc0f9adc47

Ethereum fees are paid by the user. The transactions are not expensive. I think it was somewhere between $0.40 and $0.80 per delegation / revocation. ...

Ethereum fees are paid by the user. The transactions are not expensive. I think it was somewhere between $0.40 and $0.80 per delegation / revocation. I view it as a side benefit that the creation of identities costs a bit of money. It's a signal of the "quality" of an identity, like NIP-5. Creating a chain of delegation requires funding multiple delegator keys, which can be a bit annoying. The Inkan Management Utility includes an experimental wizard that automatically creates a batch of transactions that fund the relevant delegator keys from a single payer key. See attached screenshots. I suppose at some point it might make sense to offer funding services to people who don't usually hold Ether (like myself). But it's not the highest priority at this stage. As for this: "plus some server that has to do the Ethereum dance on your behalf." Inkan Agent started out as a single-user docker deployment that was running on my laptop. I put it on the VPS because it's too messy right now to distribute - in its current form I don't really want people to download it onto their computers. Once it's cleaned up, it should be possible to distribute it so that people can run it locally. That should then make everything decentralized. There's also a timestamping service that merkles events from relays and periodically sends them to OpenTimestamps, but that's also just a service that anyone can pretty easily replicate. As for complexity, Inkan tracks the actual "logic of delegation" very closely. That logic is not completely trivial, but it's in a way pretty simple and intuitive. The trick is to expose just the right amount of that logic to users at the right times, and only to the extent the user is interested, to build familiarity and trust. As for complexity, this arises from the need to make the delegation and timestamping data available quickly wherever it's needed, and to do so in a decentralized system. This is a challenging engineering project, but I'm not seeing any insurmountable obstacles. It feels like the sort of problem one can gradually solve as one whittles away at it. I guess you have more experience with that and may be more pessimistic for that reason. https://image.nostr.build/316d7a793f1ba64ee302745a1aabe0902cf6974adb5dc277e56bb83bf0454541.jpg https://image.nostr.build/7b46bd1a9a1cdae1125542523b3e4ac65fa7feee482d82bdcf46cec72a3e11c6.jpg https://image.nostr.build/33fb37e7e105b118cf9fadedf0b086a40602af80ede5be72390f2ee5255f1930.jpg https://image.nostr.build/cb359ba2317a9b35809df6056972905c8e05badbd7054b4076c6ce8cdcca6c50.jpg

Kind-1 (TextNote)

2026-03-11T23:18:14Z

↳ Reply Event not found

4ce9fe90dd90e20ec3e90bdf49fe2bdb3ddfca7c9fa8742b456e137767c13883

FYI here is an initial "tour guide" in case you didn't see it: nostr:nevent1qvzqqqqqqypzp5dxzjv0fvwuym0shmx350573re4t7mpfdm3az6mya7sl7v6s23rqythwumn8...

FYI here is an initial "tour guide" in case you didn't see it: nostr:nevent1qvzqqqqqqypzp5dxzjv0fvwuym0shmx350573re4t7mpfdm3az6mya7sl7v6s23rqythwumn8ghj7un9d3shjtnswf5k6ctv9ehx2ap0qyghwumn8ghj7mn0wd68ytnhd9hx2tcqyrv6laz095gwxfehlzvl25t248v2s62l7cyk67euug8dckqx63yu23gwey7

Kind-1 (TextNote)

2026-03-11T16:25:55Z

↳ Reply Event not found

2400d4294e488f9f69482bac3ed8343d27038776e378116aa53c29e3aba988ef

Oh, you already saw this. No Github page right now. Let me think about that. I should at least make source code available for the Management Utility...

Oh, you already saw this. No Github page right now. Let me think about that. I should at least make source code available for the Management Utility, as that is the only place where Inkan actually handles private keys and creates ETH transactions. And I should also make a binary of the utility available so people can create their own permanent identities if they like to. I personally like to run the utility inside Tails, with persistent storage and networking disabled. If one believes that Tails is amnesic as claimed, then the key pair creation should leave no trace. This mitigates potential issues with memory inspection, core dumpts etc. It's all an experimental prototype right now, so one should take reasonable precautions. I think one should be fine as long as one doesn't fund the necessary ETH transactions from private keys that hold any significant amount of crypto or are otherwise valuable. https://tails.net/

Kind-1 (TextNote)

2026-03-11T16:17:25Z