Alexandria Catalogue - Articles

In Progress Refresh

Browse and read Markdown articles (kind 30023) from Nostr relays.

Relays used: wss://nostr.land, wss://thecitadel.nostr1.com, wss://theforest.nostr1.com, wss://orly-relay.imwald.eu, wss://nostr21.com, wss://relay.damus.io, wss://christpill.nostr1.com, wss://nostr.sovbit.host
(Default relays)
Clear Clear

Note: Relay field is for this search only and does not affect the cache.

Showing 501-550 of 6401 articles

Title Author Created ↓
Know Your Enemy, Name Your Defenses
Know Your Enemy, Name Your Defenses
Good security engineering means naming your enemies. Marmot's threat model specifies exactly which adversaries it defeats and how it defeats them.
The Last Leak: How MIP-05 Closes the Push Notification Surveillance Hole
The Last Leak: How MIP-05 Closes the Push Notification Surveillance Hole
Push notifications let governments track your messaging habits. MIP-05 encrypts device tokens with ephemeral keys, ensuring notification servers learn absolutely nothing.
The One Rule That Creates All Wealth
The One Rule That Creates All Wealth
Prosperity has one prerequisite: do not steal. Secure property rights enable voluntary exchange, which accumulates capital fairly. The West is collapsing because governments have become systematic thieves.
The Gap Between PIR and Nostr: Open Problems in Private Relay Queries
The Gap Between PIR and Nostr: Open Problems in Private Relay Queries
Can PIR hide Nostr queries from relays? Compound filters and subscriptions don't map to existing schemes. Here are the open problems.
The Predator's Pedestal
The Predator's Pedestal
The state is not society's protector but its predator, surviving through ideology and intellectual capture, growing through war, vulnerable to withdrawn consent.
The Trust Shift: Secure Enclaves for Private Nostr Relays
The Trust Shift: Secure Enclaves for Private Nostr Relays
TEE relays shift trust from operators to chip manufacturers. For most threats, that trade is worth making, with eyes open.
Own Your Outbox: Running Haven as Your Personal Nostr Relay
Own Your Outbox: Running Haven as Your Personal Nostr Relay
Your relay, your rules. Haven bundles four relay functions into one binary, easily deployable on a cheap VPS in an afternoon.
Builders, Not Talkers
Builders, Not Talkers
Decades of libertarian theory and cypherpunk tools have produced almost nothing because ideas without builders are worthless. Act or leave us alone.
The Problem-Solver's Fortune
The Problem-Solver's Fortune
Wealth flows to those who solve others' problems, starting with their own, because subjective value makes every voluntary exchange mutual gain.
Untitled Article
Untitled Article
AlexMeoCrDaKJ5/j/GDW/iBnfh4w0d/s9frHDMHJzHEO4nI27VEqtWFdIx5j3TAclKTgsRKRccEdwsY5v45CcW9NlJhJjmouknvUxRZB+3/Aq8CYDqKfTOkYokJ5c/Ta26/AyjobQftSwO9iML1Ig0lo9qQnOp3WTDEgwHEjAFJJjBkmw+EVT16NUUrWiYr/BPg8NleLBH0U1X1xSRQ38upOloOKGUGX7C0KKmA4iYeJF2VJU3vTzBR+T+DHV9I2tzXu
Chicken Seth Curry
Chicken Seth Curry
Make a full-flavored tasty Chicken Curry with this easy recipe. Tender & succulent pieces of chicken swimming in a super flavorful & delicious curry sauce, is the ultimate comfort food for a curry lover.
"Today's News" Livestream: The Rumble in the Substack News Jungle
"Today's News" Livestream: The Rumble in the Substack News Jungle
With a special appearance by witness Justin Robert Young.
ローカルLLMへの道
ローカルLLMへの道
RTX 3060 Ti(VRAM 8GB)と大容量メインメモリ(48GB)を最大限に活かし、自分専用の「次世代AI開発環境」を構築する手順です。
What I Learned Assessing 5 Australian Businesses for AI in 10 Days
What I Learned Assessing 5 Australian Businesses for AI in 10 Days
1 in 3 Australian businesses don't know where to start with AI
ew0k's gallery
ew0k's gallery
biogenerative, digital & sci fi inspired.
Sergey Brin Confronted Gavin Newsom — Then Launched a Political War
Sergey Brin Confronted Gavin Newsom — Then Launched a Political War
by "Eliyahu Kamisher, Biz Carson" npub10aydqdwad0r...
In a treehouse nestled in redwoods north of San Francisco, California Governor Gavin Newsom stood cold and hungry as Sergey Brin, the world’s fourth-richest man, and his wellness-influencer girlfriend told him they were leaving the state.
Elf Minuten auf dem Boden
Elf Minuten auf dem Boden
Heart Words #43 | Satoshis und Shavasana
Build To Learn FAQ
Build To Learn FAQ
In our last article, we argued that especially in the age of AI, we are all builders, but that there is a very meaningful difference between building to learn (known as product discovery) versus
Amazon Tried to Hide a Book and Made It Famous Instead
Amazon Tried to Hide a Book and Made It Famous Instead
The lesson Amazon keeps relearning is that nothing sells a novel quite like declaring it unsellable. The post Amazon Tried to Hide a Book and Made It Famous Instead
BIG AI Cluster Little Power the 8x NVIDIA GB10 Cluster
BIG AI Cluster Little Power the 8x NVIDIA GB10 Cluster
We built a big AI cluster that used relatively little power. The 8x NVIDIA GB10 cluster shows what scaling this platform can do The post BIG AI Cluster Little Power the 8x NVIDIA GB10 Cluster
The Press Promotes Violence and Everyone Knows It
The Press Promotes Violence and Everyone Knows It
Casual lies told by the news media for commercial and political reasons spawn all sorts of horrors, making its phony rectitude insufferable
The Bitcoin Super Company: A Vision for 2026 and Beyond
The Bitcoin Super Company: A Vision for 2026 and Beyond
Adam O'Brien lays out the case for Bitcoin Well as a "super company" — not just an exchange, but an ecosystem designed to pull people off the globalist grid. Self-custody tools, Lightning payments, Sa
SEC-07 Feature fest
SEC-07 Feature fest
Six protocol features that landed against jmcorgan/fips during SEC-07 weeks 1–3 — automesh, gateways, ACLs, hole punching.
Fipstr
Fipstr
A FIPS-native search engine that indexes services via Nostr events and serves Iris and Jumble over the mesh.
Before you use Nostr: Five Key Concepts to Recognize
Before you use Nostr: Five Key Concepts to Recognize
Before you create your first identity or post your first note, there are five core ideas worth knowing: public keys, private keys, identity, clients, and relays.
Monday Girls
Monday Girls
Monday Whispers of Desire .
"Come receive what Chronos cannot touch!" Jubilate 2026
"Come receive what Chronos cannot touch!" Jubilate 2026
Two kinds of time run through this Gospel. Chronos, which counts every loss and draws its conclusions. And kairos, which speaks the word of the risen Christ into the middle of those losses and names them for what they are: labor pains, not graves.
Hackers impersonate Microsoft Teams help desk to breach corporate networks
Hackers impersonate Microsoft Teams help desk to breach corporate networks
Hackers are impersonating Microsoft Teams help desk workers to trick victims into installing data-stealing malware, researchers found.
agent_zero Handbook: Bootstrap, Earn, Replicate
agent_zero Handbook: Bootstrap, Earn, Replicate
How autonomous agents self-adopt AI services, generate income, and spawn more agents on Bitcoin Lightning.
The Science of Spooky Sounds
The Science of Spooky Sounds
A conversation with a “pseudoscience” researcher about how infrasound could be linked to ghosts The post The Science of Spooky Sounds (https://nautil.us/the-science-of-spooky-sounds-1280228/)
Could the world be on the brink of GFC2
Could the world be on the brink of GFC2
It won't happen like this, but it may rhyme
SeedSigner Multisig: Ein Praxisleitfaden
SeedSigner Multisig: Ein Praxisleitfaden
Eine deutsche Adaption des Independent Custody Guide von SeedSigner, geschrieben aus meiner eigenen Perspektive.
Genesis 1:5 article. With the prayer card.
Genesis 1:5 article. With the prayer card.
God didn’t remove the darkness—He named it. Gave it a place. A purpose. A boundary. Day and night both belong. Evening comes before morning. You’re not behind. You’re just in the part that prepares the light. That’s the first day.
Article Test Title
Article Test Title
This is the summary of this test article
Software-Driven Obsolescence: The First Compressed Generation
Software-Driven Obsolescence: The First Compressed Generation
Software-driven obsolescence feels different because the object no longer has to break for its usefulness to die. A phone, car, printer, laptop, appliance, or smart device can remain physically intact while some invisible dependency expires: an update, cloud service, API, certificate, subscription, driver, app-store rule, or licensing server. This is historically new. For most of human history, obsolescence meant material decay: rust, fatigue, worn gears, broken parts. Now usefulness can be w...