Browse and read Markdown articles (kind 30023) from Nostr relays.
Note: Relay field is for this search only and does not affect the cache.
Showing 251-300 of 6372 articles
| Title | Author | Created ↓ |
|---|---|---|
| npub196yhphseges... | ||
Lightweight long-form publishing from the terminal
A short guide on how to publish long-form articles on Nostr using nak.
|
Fabio Bonfiglio |
|
Bitcoin e la power law di Giovanni Santostasi contro Michael Saylor
Nel suo recente post su X (28 aprile 2026), Giovanni Santostasi ha condiviso le impressioni di un incontro con Michael Saylor. Si aspettava un dibattito tecnico approfondito sulla matematica che governa Bitcoin, ma il confronto si è rivelato deludente
|
21MdiC_BTC |
|
Baltasar Gracián y la disolución del orden clásico: ingenio, apariencia y crisis del sujeto
Baltasar Gracián encarna la crisis barroca: sustituye el concepto por el ingenio, disuelve la verdad estable en perspectivas y convierte el conocimiento en artificio. Su pensamiento anticipa la fragmentación del sujeto, el desengaño y una vida regida por la apariencia, la prudencia y la estrategia.
|
||
|
Amazon Earnings, Trainium and Commodity Markets, Additional Amazon Notes
Amazon's earnings suggest that the shift away from training towards inference and agents means their bet on Trainium is paying off. Plus, additional notes on ads, agents, and sports rights.
|
npub1unyfcw3gnwn... | |
The Ethiopian running secret
One school of training is highly personalised, technical and data-driven. The other is the one that wins marathons
- by Michael Crawley & Geoff Burns
Read on Aeon
|
npub1z672gmzzfku... | |
Who invented bad guys?
The good-vs-evil paradigm of most pop-culture storytelling is a relatively recent effort to promote social cohesion
- by Aeon Video
Watch on Aeon
|
npub1z672gmzzfku... | |
The Engine of Prosperity: How Four Sources Drive All Economic Progress
Four sources of economic progress form an interdependent system that emerges spontaneously from voluntary exchange when property rights remain completely intact.
|
Max |
|
The Price of Patience
Hoarding is not low time preference; only lending expresses it. Wealth lowers time preference via diminishing marginal utility, not the reverse.
|
Max |
|
The Right to Walk Away: Angor and the Future of Bitcoin Crowdfunding
Angor gives investors what ICOs and crowdfunding never could: the cryptographic ability to recover their funds if projects fail to deliver.
|
Max |
|
Your Phone Without Permission Slips: The GrapheneOS Nostr Stack
GrapheneOS plus Zapstore, Amber, Citrine, Amethyst, and White Noise creates the first phone free from corporate control over your digital life.
|
Max |
|
The Price of Blood
Every civilization before the modern state treated crime as a debt owed to the victim, enforced through restitution and community insurance.
|
Max |
|
Curated Feeds: A Simpler Alternative to DVM Feeds
Replace DVM request/response overhead with simple replaceable events. Publishers maintain feed lists, clients just subscribe. No round trips, no privacy leakage
|
Max |
|
Your Phone Is Not Your Property (Until You Install GrapheneOS)
Your smartphone surveils you by design. GrapheneOS transforms a Pixel into private hardware you actually control. Here's why it matters and how to do it.
|
Max |
|
No Papers Required: How Zapstore Breaks the App Store Checkpoint
Developer KYC creates chokepoints that authoritarian governments ruthlessly exploit. Zapstore restores permissionless software distribution using cryptographic identity instead of government papers.
|
Max |
|
The Art of Waiting: Random Delays for Private Payments
Two scripts that randomize timing between Wasabi coinjoin rounds, making your payment patterns indistinguishable from organic human behavior.
|
Max |
|
The Third Court: Insurance, Arbitration, and the Private Production of Justice
Insurance prices risk, arbitration resolves disputes, restitution makes victims whole, and cryptographic enforcement binds them all into one complete system.
|
Max |
|
Garland: Your Keys, Your Files, No Trusted Third Party
Garland turns Blossom blob storage into a virtual drive on your device. Your Nostr key is your password. No accounts, no cloud lock-in.
|
Max |
|
Counting Grains of Sand in an Infinite Universe: Why CoinJoin Privacy Doesn't Need Perfect Math
Coinjoin entropy becomes computationally impossible to calculate exactly for large transactions, but lower-bound estimates provide rigorous cryptographic guarantees through information theory.
|
Max |
|
The Quiet Departure
The loudest revolutions fail; the quiet ones succeed. We do not protest or petition. We build alternatives and simply leave.
|
Max |
|
Nostr-Native Distributed Storage System
The latest iteration of Garland, a privacy-preserving distributed storage system built on Nostr and Blossom, using erasure coding for durability and single-key recovery.
|
Max |
|
Temporary Autonomous Zones: The Economics of Exit
When defense costs less than attack and property emerges through daily practice, autonomous zones become economically sustainable refuges.
|
Max |
|
When They Come for the Protocols
Governments cannot kill open protocols, so they imprison the humans who write them, spending $275 billion per year to catch nothing.
|
Max |
|
Private Relay Connections: Zero-Knowledge Solutions for Nostr
Nostr relays see everything - who connects, what they fetch, how often they post. Zero-knowledge cryptography can fix all three problems: Semaphore-based authentication hides which whitelisted user is connecting, private information retrieval hides which notes you're fetching, and Privacy Pass enables rate limiting without identity linkage.
|
Max |
|
Vanishing Secrets: Auto-Wipe Your Clipboard on Qubes OS
One command in your Qubes template installs `xsel` and creates an autostart service that wipes your clipboard 30 seconds after you copy anything. Works on Debian, Fedora, and Whonix minimal templates.
|
Max |
|
Verify Anyone on Any Channel
A simple challenge-response app can verify Nostr identities across any anonymous channel by querying the follow graph users already built.
|
Max |
|
The Merchant Court Returns
Justice is a service that degrades under monopoly and improves under competition. Merchants proved this; now builders are proving it again.
|
Max |
|
Your Software Runs on Enemy Infrastructure
Freedom tech projects build censorship-resistant tools on censorship-susceptible platforms. The Nostr stack offers a coherent migration path for sovereign development infrastructure.
|
Max |
|
Programmable Magic Internet Money: How Nostr Apps Can Monetize Ethically and Profitably
Bitcoin plus Nostr creates programmable money that solves software monetization through micropayments respecting user sovereignty.
|
Max |
|
The Colossus Falls - How to End All War
Wars persist because each generation consents to fight them; a generation that refused would be history's last to die in trenches.
|
Max |
|
The Price of Patience
Hoarding is not low time preference; only lending expresses it. Wealth lowers time preference via diminishing marginal utility, not the reverse.
|
Max |
|
Sifting Through the Archive: Private Set Membership for Blossom
Binary Fuse filters let Blossom clients privately check which files exist on a server - download a compact filter once, query locally with zero server load, and use delta lists for real-time accuracy.
|
Max |
|
Chaining Agents Needs a Spine
Most agent chains fail because they pass work around without narrowing the task, and the Ralph loop forces actual, reliable closure.
|
Max |
|
Free Men Will Build the Roads
Nobody asks who will bake the bread because markets already do it excellently; the roads question reveals statist capture of imagination.
|
Max |
|
Two Roads to a Network Without Permission: Reticulum and FIPS
Reticulum and FIPS both build permissionless encrypted meshes, but they differ radically in routing, crypto primitives, and their relationship to IP.
|
Max |
|
The Key Inside the Ciphertext: A Full Introduction to PIPEs v2
PIPEs v2 turns spend conditions into key-recovery conditions, letting Bitcoin enforce proof-gated authorization through ordinary Schnorr signatures and extraordinary off-chain cryptography.
|
Max |
|
Proving You Belong Without Saying Who You Are
Zero-knowledge proofs let Nostr users prove they're trusted without revealing their identity, enabling anonymous rate-limiting and reputation-gated relay access.
|
Max |
|
The Third Option
Libertarian strategy gains more from building parallel institutions that coexist with state power than from reform or territorial exit.
|
Max |
|
Trust Without Ceremonies: How Nostr Fixed the Web of Trust
PGP's web of trust failed because it demanded explicit rituals. Nostr succeeds by extracting trust from ordinary social behavior.
|
Max |
|
The Gossip Vulnerability: Why NIP-17's "Deniable" Messages Aren't
NIP-17 promises deniable messaging with its three-layer design: an unsigned "rumor," a signed "seal," and an ephemeral "gift wrap." However, this setup has a hidden vulnerability. The signed seal allows recipients to prove that a message was sent by the claimed author, even without revealing the content. This creates a perfect scenario for gossip attacks, where the mere proof of communication can damage reputations. As we explore NIP-17, we find that the rumor, despite being unsigned, is not as ...
|
Max |
|
The Constitution That Isn't One
The Universal Principles of Liberty codifies libertarian jurisprudence as discovered law, providing a meta-normative baseline for decentralized justice without sovereign authority.
|
Max |
|
The Instrument Returns: An Introduction to Bitcredit
Bitcredit is the concrete protocol reconstructing bills of exchange on Bitcoin, closing the credit layer gap that prior posts have diagnosed.
|
Max |
|
A Vibe Coding Setup in Your Pocket
GrapheneOS now runs a hardware-isolated Debian VM on your phone, and OpenCode provides open-source AI coding against any provider you choose.
|
Max |
|
When Can We Meet? Cross-Server Busy Sync for Nextcloud
Nextcloud can't sync busy times across separate instances. This bash script uses CalDAV to share availability between multiple Nextcloud servers without exposing event details.
|
Max |
|
The Root of Money
Money is neither vice nor virtue but the material expression of human judgment exercised through time. Only parasites hate it.
|
Max |
|
Breaking Free: Deprogramming State Dependence
Learned helplessness is the default response to prolonged state control; recovery requires demonstrating agency through deliberate action, not accumulating more theory.
|
Max |
|
The Merchant's Return: When Systems Fail, Producers Prosper
Being cast out of the system reveals its deepest secret: you were never its beneficiary, only its fuel. Freedom begins with this recognition.
|
Max |
|
Build for the Mole
Infiltration is inevitable; detection is unreliable. The real defense against state informants is building organizations where their presence cannot accomplish its purpose.
|
Max |
|
The Missing Credit Layer
The parallel economy has sound money and encrypted communication but still lacks the credit layer needed to finance production across time.
|
Max |
|
The Action That Accomplishes Nothing
Decentralization does not prevent the adversary from acting against you. It ensures that his action accomplishes nothing.
|
Max |