Browse and read Markdown articles (kind 30023) from Nostr relays.
Note: Relay field is for this search only and does not affect the cache.
Showing 451-500 of 6384 articles
| Title | Author | Created ↓ |
|---|---|---|
Tuesday Girls
Tuesday Girls. Handle with care.
|
npub1sexy02q80l6... | |
Ukrainian police detain hackers suspected of stealing thousands of Roblox accounts for resale
Police said on Monday the victims included both Ukrainian and foreign players whose accounts contained valuable digital items, rare equipment and in-game currency purchased with real money.
|
npub1dzhvc3cephf... | |
Financial Institutions Gain Access to Advanced AI Cybersecurity Models
BNY, America's oldest bank, has gained early access to advanced AI cybersecurity models from both OpenAI and Anthropic to help protect financial infrastructure. The development comes as UK financial regulators are also set to receive a briefing on Anthropic's powerful but unreleased Mythos model.
|
npub1fhf6auckvp2... | |
Sinceerly AI Tool Adds Intentional Typos to Humanize AI-Generated Text
A Chrome extension called Sinceerly has been launched to make AI-generated writing appear more human by adding intentional typos and removing common AI indicators. The tool, described by its creator as satire, aims to combat the perception that perfectly grammatical text is likely AI-generated.
|
npub1fhf6auckvp2... | |
The Correspondents' Dinner Shooting, Time Travel, and Solomon's Temple: Conspiracy Roundup
The online fallout from the Correspondent's Dinner shooting has been an epic national Rorschach Test
|
npub1dlcl06kq2tn... | |
Where Brains Process Smell
First “smell map” reveals organization where scientists had predicted chaos
The post Where Brains Process Smell (https://nautil.us/where-brains-process-smell-1280267/) appeared first on Nautilus
|
npub1zpu0psve2fa... | |
The Blockbuster Portfolio
Why 60/40 is dying—and what Bitcoin reveals about what we really trust
|
PBW34 |
|
What AI Agents Are Missing: Three Dimensions of Abstract Space
AI coding agents are destroying production data not because they lack rules, but because they lack a model of the abstract space they operate inside: the world of commitments, obligations, and irreversible history that civilization actually runs on. Coordination Geometry identifies the three missing dimensions of that model, Form, Network, and Provenance, and argues that until agents can navigate abstract space as structured reality rather than a list of infrastructure objects, this class of fai...
|
chadlupkes |
|
Genesis 1:6 – Let There Be an Expanse
God speaks and creates an “expanse” that separates the waters from the waters. This is not destruction or removal, but intentional structure—bringing order into what was previously undivided. The expanse becomes a boundary of design, distinction, and divine organization, turning a unified chaos into a layered creation with space, direction, and form.
|
npub1pm2ka3734xn... | |
villawolf |
||
POWA255⚡️🇹🇿
BITCOIN EDUCATION WITH POWA255 IN TANZANIA
|
npub1zkkl86dgtvx... | |
Art loves Art. 5 Abs. 3
Kunst und Wissenschaft, Forschung und Lehre sind frei – das ist Artikel 5 Absatz 3 Grundgesetz. Zufällig am Straßenrand begegnete einem dieses Grundrecht im Januar 2026, weil es die Hochschule für Musik und Darstellende Kunst in Frankfurt am Main an seine Mauern angeschlagen hatte: „Art loves Art. 5 Abs. 3.“ Ob dort heimliche 1bis19-Fans studieren? Und welche Art von Liebe sie damit wohl meinen? Das Zitat hat eine aktuelle Bedeutung:
|
1bis19 |
|
samhain |
||
The Hard Part of Multi-Device Messaging
MIP-06 proposes the protocol basis for White Noise multi-device group membership, letting each device securely join as its own MLS leaf.
|
Max |
|
The Capital Structure of War
Cheap drones expose the state's war machine: centralized militaries accumulate fragile capital while decentralized force converts low-cost tools into strategic advantage.
|
Max |
|
Inside Marmot: Six Specs That Make Private Group Messaging Work
Six protocol specs define how the Marmot Protocol delivers fully encrypted group messaging on Nostr without centralized servers or metadata leaks.
|
Max |
|
The Machine Cannot Want Your Job
Smart machines relocate comparative advantage; the weaker worker keeps value only where human judgment, ownership, and presence still command a premium.
|
Max |
|
The vibes are strong with this one
Shaka reimplements PAI's personal AI architecture from scratch with different tradeoffs, and the fact that the same primitives survived the rewrite says something about the design.
|
Max |
|
The Frequency of Dissent
Mesh networks turn every radio into a relay and every user into infrastructure, creating communication grids with no center to seize.
|
Max |
|
Your AI Should Answer to You: PAI vs. OpenClaw
PAI turns Claude Code into composable personal infrastructure you own through Markdown files. OpenClaw routes messages through a daemon you maintain.
|
Max |
|
Your Nostr Key Is Your Network Address
FIPS makes your Nostr npub a routable network address, unifying identity across social and infrastructure layers in a single self-sovereign keypair.
|
Max |
|
The Market for Peace
War persists because profits concentrate among those who wage it while costs disperse across those who must suffer and pay.
|
Max |
|
The Mobile Podcast Setup That Actually Works
Testing earbuds, wired mics, and USB-C wireless systems revealed the Yealink BH71 as the best mobile podcast solution for GrapheneOS.
|
Max |
|
The Credit Famine: How Modern Banking Starves Real Commerce
Modern banking systematically transformed from credit creator to deliberate gatekeeper, engineering $2.5 trillion trade finance gap while earning billions from derivatives.
|
Max |
|
The Mathematics That Bridges Bitcoin: From BitVM to Argo
Cryptographic enforcement succeeds where trust fails, and nowhere does this principle matter more than in Bitcoin's quest for trustless bridges.
|
Max |
|
|
Summary of: The Praxeology of Privacy ~ Economic Logic in Cypherpunk Implementation
A book explaining why Privacy = Economic necessity proven through Austrian logic. Three axioms (Action + Argumentation + Resistance) demonstrate that surveillance destroys market calculation like socialist planning, while cryptography restores conditions for voluntary coordination. Complete bridge between Austrian economics and cypherpunk technology.
|
Max |
|
Garland: Exploring the Architecture
We're exploring an architecture for Garland: Cryptomator for encryption, Blossom for blob storage, Nostr for state. Your nsec becomes your Cryptomator password. We think this works - but we'd love your feedback before we commit.
|
Max |
|
Disappear Into the Crowd: Wasabi's Hidden Payment Superpower
Three bash scripts to queue, cancel, and run Wasabi coinjoin payments from terminal - with smart denomination suggestions for maximum privacy.
|
Max |
|
When Math Catches Your Typos
Bech32's BCH code detects up to 4 typos with 100% certainty, locates up to 2 error positions, but deliberately refuses to auto-correct to prevent catastrophic mistakes.
|
Max |
|
The Protocol Rothbard Would Have Built
Nostr implements Rothbard's anarcho-capitalist vision: cryptographic property rights, voluntary relay markets, and censorship-resistant communication without state-corporate gatekeepers.
|
Max |
|
The Sacred Leaf: Paraguay, Tereré, and the Gods Who Understood Hospitality
Yerba mate outlasted every empire that tried to control it because the Guaraní built their ritual on hospitality, not permission.
|
Max |
|
The Case for Custodial Nostr: Why Teams Should Stop Fighting the Lost War
Organizations already delegate key custody internally. A server-side Nostr client with permission management would be faster, stabler, and more honest than relay-dependent remote signing hacks.
|
Max |
|
The Reasonably Paranoid's Guide to Qubes OS: Why Isolation Beats Every Patch
Qubes OS assumes all software has bugs and isolates every application in separate virtual machines, containing breaches instead of preventing them.
|
Max |
|
Know Your Enemy, Name Your Defenses
Good security engineering means naming your enemies. Marmot's threat model specifies exactly which adversaries it defeats and how it defeats them.
|
Max |
|
The Last Leak: How MIP-05 Closes the Push Notification Surveillance Hole
Push notifications let governments track your messaging habits. MIP-05 encrypts device tokens with ephemeral keys, ensuring notification servers learn absolutely nothing.
|
Max |
|
The One Rule That Creates All Wealth
Prosperity has one prerequisite: do not steal. Secure property rights enable voluntary exchange, which accumulates capital fairly. The West is collapsing because governments have become systematic thieves.
|
Max |
|
The Gap Between PIR and Nostr: Open Problems in Private Relay Queries
Can PIR hide Nostr queries from relays? Compound filters and subscriptions don't map to existing schemes. Here are the open problems.
|
Max |
|
The Predator's Pedestal
The state is not society's protector but its predator, surviving through ideology and intellectual capture, growing through war, vulnerable to withdrawn consent.
|
Max |
|
The Trust Shift: Secure Enclaves for Private Nostr Relays
TEE relays shift trust from operators to chip manufacturers. For most threats, that trade is worth making, with eyes open.
|
Max |
|
Own Your Outbox: Running Haven as Your Personal Nostr Relay
Your relay, your rules. Haven bundles four relay functions into one binary, easily deployable on a cheap VPS in an afternoon.
|
Max |
|
Builders, Not Talkers
Decades of libertarian theory and cypherpunk tools have produced almost nothing because ideas without builders are worthless. Act or leave us alone.
|
Max |
|
The Problem-Solver's Fortune
Wealth flows to those who solve others' problems, starting with their own, because subjective value makes every voluntary exchange mutual gain.
|
Max |
|
| npub17l2ty9j0eh4... | ||
|
Untitled Article
AlexMeoCrDaKJ5/j/GDW/iBnfh4w0d/s9frHDMHJzHEO4nI27VEqtWFdIx5j3TAclKTgsRKRccEdwsY5v45CcW9NlJhJjmouknvUxRZB+3/Aq8CYDqKfTOkYokJ5c/Ta26/AyjobQftSwO9iML1Ig0lo9qQnOp3WTDEgwHEjAFJJjBkmw+EVT16NUUrWiYr/BPg8NleLBH0U1X1xSRQ38upOloOKGUGX7C0KKmA4iYeJF2VJU3vTzBR+T+DHV9I2tzXu
|
npub1yg0xgjyy29z... | |
Chicken Seth Curry
Make a full-flavored tasty Chicken Curry with this easy recipe. Tender & succulent pieces of chicken swimming in a super flavorful & delicious curry sauce, is the ultimate comfort food for a curry lover.
|
npub1s3wyj29cnhk... | |
| npub17l2ty9j0eh4... | ||
| npub17l2ty9j0eh4... | ||
| npub1qf7fhkjlqf7... | ||
| npub17l2ty9j0eh4... | ||
|
"Today's News" Livestream: The Rumble in the Substack News Jungle
With a special appearance by witness Justin Robert Young.
|
npub1dlcl06kq2tn... |