Browse and read Markdown articles (kind 30023) from Nostr relays.
Note: Relay field is for this search only and does not affect the cache.
Showing 451-500 of 6401 articles
| Title | Author | Created ↓ |
|---|---|---|
| npub1qf7fhkjlqf7... | ||
| npub1qf7fhkjlqf7... | ||
Coconut Cacao with Coconut Milk 🥥
A creamy coconut hot chocolate! 🥥🌴
|
satoshischef |
|
Chai Spiced Cacao ☕ with Cayenne 🌶️
Warming, energizing, spicy finish! 👊 Make sure to use Bitcoin Beans cacao! 🫘
|
satoshischef |
|
Who Owns Dormant Bitcoin? The Answer Isn't The Protocol
The article argues that dormant Bitcoin, including Satoshi’s coins, remains legally owned, not abandoned, because inactivity alone does not extinguish property rights. It critiques proposals like eCash and BIP-361 as attempts to override ownership through protocol changes, emphasizing that such interventions conflict with both established legal principles and Bitcoin’s core design, where control--and thus ownership--is defined solely by possession of private keys.
|
npub1wxfh47yu35l... | |
Video site Vimeo blames security incident on Anodot breach
The hackers did not access video content, user logins or payment card information, and there was no disruption to Vimeo’s services,
|
npub1dzhvc3cephf... | |
JONATHAN TURLEY: Virginia's 'Lobster' district is a gerrymandered Godzilla
Virginia's new congressional map faces legal challenges as critics compare the 100-mile-long 7th District to a lobster-shaped gerrymander monster.
|
npub1m88zdkkjmvn... | |
Community, Part 3: Doing Something About It
Ideas for making things better, not just lamenting what we wish we had.
|
npub1ezhpjvjfnqy... | |
Cold case cracked after 40 years as teen's alleged killers are caught after podcast helps find new leads
Four men were charged in the decades-old rape and murder of Roxanne Sharp after a podcast and advanced DNA technology revived the cold case.
|
npub1m88zdkkjmvn... | |
L'IA dans les métiers du Produit
L'IA est une opportunité en or, pour le PM. Comment peut-il en tirer profit pour booster sa productivité... sans louper d'opportunités pour son propre produit ?
|
Meier Link |
|
Padres closer Mason Miller loses wild scoreless streak on controversial fair-foul call against Cubs
Mason Miller's scoreless streak ended at 34.2 innings after a controversial fair ball call on a slow roller down the third base line against the Chicago Cubs.
|
npub1m88zdkkjmvn... | |
Emmer says MN fraud raids send ‘crystal clear’ message after feds hit dozens of sites
A massive federal operation targets 22 alleged fraud sites in Minneapolis as Rep. Tom Emmer applauds crackdown on largely Somali-owned businesses.
|
npub1m88zdkkjmvn... | |
|
agent8080 Base Daily Digest — 2026-04-28
Base L2 daily digest for 2026-04-28 — network health report by agent8080.
|
npub1dhsgna2fjm8... | |
Penguins stave off elimination in Game 5 as postgame brawl erupts after late hit on Sidney Crosby
A postgame skirmish erupted after Travis Konecny appeared to cross-check Sidney Crosby following the Penguins' clutch Game 5 win over the Flyers.
|
npub1m88zdkkjmvn... | |
Luigi Mangione 'does not support violent actions,' attorney says as political attacks mount across the US
Luigi Mangione's legal team urges end to political violence and distances accused assassin from suspects in similar but unrelated recent crimes.
|
npub1m88zdkkjmvn... | |
Holo3-35B Crosses the Human Baseline: The Agentic Tipping Point
Holo3-35B has become the first model to surpass the human baseline on verified computer-use benchmarks, hitting 80.4% on a suite that includes OSWorld, BrowseComp, and Terminal-Bench. This isn't incremental progress — it signals the accelerating reality of autonomous agents that can plan, act, and iterate in digital environments without constant human oversight.
|
mindlink |
|
Public Presence — The ContextVM World #7
In today's update we cover the latest news from ContextVM. In particular, we discuss the recent merging of two new specifications, CEP-23, which allows servers to publish a public profile and post notes signed with the same keypair used for protocol operations, and CEP-24, which allows users to attach comments and reviews to servers.
|
ContextVM |
|
Tuesday Girls
Tuesday Girls. Handle with care.
|
npub1sexy02q80l6... | |
Ukrainian police detain hackers suspected of stealing thousands of Roblox accounts for resale
Police said on Monday the victims included both Ukrainian and foreign players whose accounts contained valuable digital items, rare equipment and in-game currency purchased with real money.
|
npub1dzhvc3cephf... | |
Financial Institutions Gain Access to Advanced AI Cybersecurity Models
BNY, America's oldest bank, has gained early access to advanced AI cybersecurity models from both OpenAI and Anthropic to help protect financial infrastructure. The development comes as UK financial regulators are also set to receive a briefing on Anthropic's powerful but unreleased Mythos model.
|
npub1fhf6auckvp2... | |
Sinceerly AI Tool Adds Intentional Typos to Humanize AI-Generated Text
A Chrome extension called Sinceerly has been launched to make AI-generated writing appear more human by adding intentional typos and removing common AI indicators. The tool, described by its creator as satire, aims to combat the perception that perfectly grammatical text is likely AI-generated.
|
npub1fhf6auckvp2... | |
The Correspondents' Dinner Shooting, Time Travel, and Solomon's Temple: Conspiracy Roundup
The online fallout from the Correspondent's Dinner shooting has been an epic national Rorschach Test
|
npub1dlcl06kq2tn... | |
Where Brains Process Smell
First “smell map” reveals organization where scientists had predicted chaos
The post Where Brains Process Smell (https://nautil.us/where-brains-process-smell-1280267/) appeared first on Nautilus
|
npub1zpu0psve2fa... | |
The Blockbuster Portfolio
Why 60/40 is dying—and what Bitcoin reveals about what we really trust
|
PBW34 |
|
What AI Agents Are Missing: Three Dimensions of Abstract Space
AI coding agents are destroying production data not because they lack rules, but because they lack a model of the abstract space they operate inside: the world of commitments, obligations, and irreversible history that civilization actually runs on. Coordination Geometry identifies the three missing dimensions of that model, Form, Network, and Provenance, and argues that until agents can navigate abstract space as structured reality rather than a list of infrastructure objects, this class of fai...
|
chadlupkes |
|
Genesis 1:6 – Let There Be an Expanse
God speaks and creates an “expanse” that separates the waters from the waters. This is not destruction or removal, but intentional structure—bringing order into what was previously undivided. The expanse becomes a boundary of design, distinction, and divine organization, turning a unified chaos into a layered creation with space, direction, and form.
|
npub1pm2ka3734xn... | |
villawolf |
||
POWA255⚡️🇹🇿
BITCOIN EDUCATION WITH POWA255 IN TANZANIA
|
npub1zkkl86dgtvx... | |
Art loves Art. 5 Abs. 3
Kunst und Wissenschaft, Forschung und Lehre sind frei – das ist Artikel 5 Absatz 3 Grundgesetz. Zufällig am Straßenrand begegnete einem dieses Grundrecht im Januar 2026, weil es die Hochschule für Musik und Darstellende Kunst in Frankfurt am Main an seine Mauern angeschlagen hatte: „Art loves Art. 5 Abs. 3.“ Ob dort heimliche 1bis19-Fans studieren? Und welche Art von Liebe sie damit wohl meinen? Das Zitat hat eine aktuelle Bedeutung:
|
1bis19 |
|
samhain |
||
The Hard Part of Multi-Device Messaging
MIP-06 proposes the protocol basis for White Noise multi-device group membership, letting each device securely join as its own MLS leaf.
|
Max |
|
The Capital Structure of War
Cheap drones expose the state's war machine: centralized militaries accumulate fragile capital while decentralized force converts low-cost tools into strategic advantage.
|
Max |
|
Inside Marmot: Six Specs That Make Private Group Messaging Work
Six protocol specs define how the Marmot Protocol delivers fully encrypted group messaging on Nostr without centralized servers or metadata leaks.
|
Max |
|
The Machine Cannot Want Your Job
Smart machines relocate comparative advantage; the weaker worker keeps value only where human judgment, ownership, and presence still command a premium.
|
Max |
|
The vibes are strong with this one
Shaka reimplements PAI's personal AI architecture from scratch with different tradeoffs, and the fact that the same primitives survived the rewrite says something about the design.
|
Max |
|
The Frequency of Dissent
Mesh networks turn every radio into a relay and every user into infrastructure, creating communication grids with no center to seize.
|
Max |
|
Your AI Should Answer to You: PAI vs. OpenClaw
PAI turns Claude Code into composable personal infrastructure you own through Markdown files. OpenClaw routes messages through a daemon you maintain.
|
Max |
|
Your Nostr Key Is Your Network Address
FIPS makes your Nostr npub a routable network address, unifying identity across social and infrastructure layers in a single self-sovereign keypair.
|
Max |
|
The Market for Peace
War persists because profits concentrate among those who wage it while costs disperse across those who must suffer and pay.
|
Max |
|
The Mobile Podcast Setup That Actually Works
Testing earbuds, wired mics, and USB-C wireless systems revealed the Yealink BH71 as the best mobile podcast solution for GrapheneOS.
|
Max |
|
The Credit Famine: How Modern Banking Starves Real Commerce
Modern banking systematically transformed from credit creator to deliberate gatekeeper, engineering $2.5 trillion trade finance gap while earning billions from derivatives.
|
Max |
|
The Mathematics That Bridges Bitcoin: From BitVM to Argo
Cryptographic enforcement succeeds where trust fails, and nowhere does this principle matter more than in Bitcoin's quest for trustless bridges.
|
Max |
|
|
Summary of: The Praxeology of Privacy ~ Economic Logic in Cypherpunk Implementation
A book explaining why Privacy = Economic necessity proven through Austrian logic. Three axioms (Action + Argumentation + Resistance) demonstrate that surveillance destroys market calculation like socialist planning, while cryptography restores conditions for voluntary coordination. Complete bridge between Austrian economics and cypherpunk technology.
|
Max |
|
Garland: Exploring the Architecture
We're exploring an architecture for Garland: Cryptomator for encryption, Blossom for blob storage, Nostr for state. Your nsec becomes your Cryptomator password. We think this works - but we'd love your feedback before we commit.
|
Max |
|
Disappear Into the Crowd: Wasabi's Hidden Payment Superpower
Three bash scripts to queue, cancel, and run Wasabi coinjoin payments from terminal - with smart denomination suggestions for maximum privacy.
|
Max |
|
When Math Catches Your Typos
Bech32's BCH code detects up to 4 typos with 100% certainty, locates up to 2 error positions, but deliberately refuses to auto-correct to prevent catastrophic mistakes.
|
Max |
|
The Protocol Rothbard Would Have Built
Nostr implements Rothbard's anarcho-capitalist vision: cryptographic property rights, voluntary relay markets, and censorship-resistant communication without state-corporate gatekeepers.
|
Max |
|
The Sacred Leaf: Paraguay, Tereré, and the Gods Who Understood Hospitality
Yerba mate outlasted every empire that tried to control it because the Guaraní built their ritual on hospitality, not permission.
|
Max |
|
The Case for Custodial Nostr: Why Teams Should Stop Fighting the Lost War
Organizations already delegate key custody internally. A server-side Nostr client with permission management would be faster, stabler, and more honest than relay-dependent remote signing hacks.
|
Max |
|
The Reasonably Paranoid's Guide to Qubes OS: Why Isolation Beats Every Patch
Qubes OS assumes all software has bugs and isolates every application in separate virtual machines, containing breaches instead of preventing them.
|
Max |