Alexandria Catalogue - Articles

In Progress Refresh

Browse and read Markdown articles (kind 30023) from Nostr relays.

Relays used: wss://nostr.land, wss://thecitadel.nostr1.com, wss://theforest.nostr1.com, wss://orly-relay.imwald.eu, wss://nostr21.com, wss://relay.damus.io, wss://christpill.nostr1.com, wss://nostr.sovbit.host
(Default relays)
Clear Clear

Note: Relay field is for this search only and does not affect the cache.

Showing 301-350 of 6373 articles

Title Author Created ↓
The Action That Accomplishes Nothing
The Action That Accomplishes Nothing
Decentralization does not prevent the adversary from acting against you. It ensures that his action accomplishes nothing.
The Cypher Wars: Choose Your Weapon Wisely
The Cypher Wars: Choose Your Weapon Wisely
Use ChaCha20-Poly1305 everywhere without hardware AES. Use AES-256-GCM with AES-NI. Never reuse nonces. Prefer AEAD always.
Credit Before Coin: How Markets Bootstrap Sound Money Economies
Credit Before Coin: How Markets Bootstrap Sound Money Economies
Bills of exchange don't just provide elasticity within existing monetary systems; they can bootstrap entire economies that lack base money.
Bitcoin Address Lookup: A Question of Privacy
Bitcoin Address Lookup: A Question of Privacy
Bitcoin wallets face a fundamental tradeoff: how to discover your transactions without revealing your addresses. Full nodes (2009) provide perfect privacy by downloading everything but require ~700 GB storage. Electrum (2011) achieves instant sync by transmitting your addresses directly to servers, exposing your complete transaction history. Block filters (2017-2019) restore privacy through client-side filtering - you download compact filters, check them locally, and only request matching blocks...
Every Crowd Hides You Differently
Every Crowd Hides You Differently
From Bitcoin CoinJoin to zero-knowledge proofs, every serious approach to financial privacy bets on a different crowd to disappear into.
The Anatomy of Aggression
The Anatomy of Aggression
Rothbard's typology classifies all state intervention into autistic, binary, and triangular forms, revealing the common thread of coercive aggression beneath policy complexity.
The Great Decentralization Swindle: How Every Protocol But One Betrays Its Promise
The Great Decentralization Swindle: How Every Protocol But One Betrays Its Promise
The decentralized social landscape is littered with protocols that centralize through the back door. Nostr alone eliminates trusted third parties entirely, making it the only protocol where your identity truly belongs to you.
The Universal Principles of Liberty
The Universal Principles of Liberty
A voluntary libertarian legal framework built on non-aggression, self-ownership, and property rights, with decentralized arbitration replacing state monopolies on law.
The Poverty Lever: Why Regimes Want You Just Above Starving
The Poverty Lever: Why Regimes Want You Just Above Starving
Maximum political control comes not from wealth redistribution but from calibrated poverty: desperate enough to depend, not desperate enough to revolt.
The Engine of Prosperity: How Four Sources Drive All Economic Progress
The Engine of Prosperity: How Four Sources Drive All Economic Progress
Division of labor, capital accumulation, technological progress, and entrepreneurship generate prosperity when freed from state interference. Cryptographic tools now enable this freedom at scale.
The Credit Famine: How Modern Banking Starves Real Commerce
The Credit Famine: How Modern Banking Starves Real Commerce
When banks profit more from denying credit to productive enterprises than extending it, the credit system becomes a weapon against commerce itself.
The Mathematics That Bridges Bitcoin: From BitVM to Argo
The Mathematics That Bridges Bitcoin: From BitVM to Argo
From BitVM's fraud proofs to Argo MAC's polynomial garbling, the evolution of cryptographic verification on Bitcoin proves that mathematics conquered what politics and trust never could.
The Anatomy of Aggression
The Anatomy of Aggression
Rothbard's typology classifies all state intervention into autistic, binary, and triangular forms, revealing the common thread of coercive aggression beneath policy complexity.
Wenn Richter Wahnvorstellungen haben
Wenn Richter Wahnvorstellungen haben
Wie kognitiv beeinträchtigte Richter den Totalitarismus wiederauferstehen lassen.
Bitcoin: The Protocol of Human Verification
Bitcoin: The Protocol of Human Verification
Humanity needed money that anyone could verify. Bitcoin is the programmed response: a protocol that transforms trust into auditable mathematics.
‘Dr. Phil’ Ranch Abuse Scandal: What to Know
‘Dr. Phil’ Ranch Abuse Scandal: What to Know
by "Michael Hein"
Phil McGraw is wrapped up in a new scandal after sending multiple young guests to a treatment facility that has been accused of abuse. It began with a lawsuit filed by Hannah Archuleta, who appeared on Dr. Phil in 2019 and then went to the Turn-About Ranch. Now, other past guests on the show are […]
Daily Reading List – April 29, 2026 (#773)
Daily Reading List – April 29, 2026 (#773)
Today's links look at using agents to create agents, what generative UI is actually about, and a thousand real-world AI use cases from actual companies.
House approves spy program on second attempt; Senate fate murky
House approves spy program on second attempt; Senate fate murky
The bill, which passed 235-191, would renew Section 702 of the Foreign Intelligence Surveillance Act for three years.
Elad Gil, Consigliere to Empire Builders — How to Spot Billion-Dollar Companies Before Everyone Else, The Misty AI Frontier, How Coke Beat Pepsi, When Consensus Pays, and Much More (#863)
Elad Gil, Consigliere to Empire Builders — How to Spot Billion-Dollar Companies Before Everyone Else, The Misty AI Frontier, How Coke Beat Pepsi, When...
Interview with legendary investor Elad Gil on The Tim Ferriss Show podcast! The post Elad Gil, Consigliere to Empire Builders — How to Spot Billion-Dollar Companies Before Everyone Else, The
Birds Are More Afraid of Women Than of Men
Birds Are More Afraid of Women Than of Men
What’s going on here? The post Birds Are More Afraid of Women Than of Men (https://nautil.us/birds-are-more-afraid-of-women-than-of-men-1280333/) appeared first on Nautilus (https://nautil.us).
Chernobyl, 40 Years Later
Chernobyl, 40 Years Later
A lot has changed at the site of the world’s worst nuclear disaster The post Chernobyl, 40 Years Later (https://nautil.us/chernobyl-40-years-later-1280322/) appeared first on Nautilus
The Need to Transition to the Bitcoin Standard
The Need to Transition to the Bitcoin Standard
We're living through the end of a century-long fiat experiment, and both the 'Globalist West' and 'Multipolar East' are racing to build the same cage — programmable CBDCs that can freeze your money, r
US, China partner on scam center takedown in Dubai
US, China partner on scam center takedown in Dubai
The Justice Department said the operation began last year following “numerous” victim complaints to the FBI by U.S. victims who lost millions through cryptocurrency investment fraud schemes.
Longform on Fanfares
Longform on Fanfares
Just a test, don't buy it!
Have Some Free AI Documentation Software
Have Some Free AI Documentation Software
by "Nathan Hillen" npub1ap4u7prl7d3...
Have Some Free AI Documentation Software I, like most of the world, have drunk deep of the well of AI coding. I’ve gone through the 7 stages of grief, though I did it quickly, and landed on the …
Nostr Compass #20
Nostr Compass #20
GitWorkshop ships an in-browser PR merge button, repository following, and GRASP relay fixes
Untitled Article
Untitled Article
AkIiSFOfL9zaa42XY7qAvojWg7+qm2206si4YKclAlEY/cFQpjZIV/qgcqAMA6YnpV4Ice53m14e0bVWCls4odFReMa5YLBkkrHRheKnn6rmaWpw9ifxP5rug43XyCEcLU+01V+cQk414MkOQ2lF8hsvgfiJf9iJk5b0M2STm7XVwDQjXlc4pvrWx2l8i5vKF7lYPbt15tjx6yNdPf0Ozue9EUDGLCmbZLrNi6T+b4VQZAeC5eTkKxmm+meJVdBrgJo/
EU Pushes Age Verification App for All States
EU Pushes Age Verification App for All States
Brussels wants every member state shipping its age verification app by year's end, three months after a security researcher cracked it in under two minutes. The post EU Pushes Age Verification App
LLM 0.32a0  is a major backwards-compatible refactor
LLM 0.32a0 is a major backwards-compatible refactor
I just released LLM 0.32a0 (https://llm.datasette.io/en/latest/changelog.html#a0-2026-04-28), an alpha release of my LLM (https://llm.datasette.io/) Python library and CLI tool for accessing LLMs,
La leva sottile di Bitcoin Core
La leva sottile di Bitcoin Core
Arriva il secondo capitolo della serie Capture, che indaga sulla presunta rete di potere informale di Bitcoin Core, scritta da Hodlonaut e pubblicata su Citadel21
Britain’s Pre-Decided “Consultation” on Banning Social Media for Under-16s
Britain’s Pre-Decided “Consultation” on Banning Social Media for Under-16s
The verification system needed to keep teenagers off Instagram happens to be the same one needed to track everyone else. The post Britain’s Pre-Decided “Consultation” on Banning Social Media
Untitled Article
Untitled Article
AsUa47t7CAvuLoawR7+0ntOA8/czF439/wVDXWACLiS8tvGE1dD1vP4H/Txit96oZv401iH9GF5tI6zPTENabnkGw5/DVsInExgRGL+VRt1qdyeJkJE01tLBHhY+d+Mmtz7C
New Frog Species Gets Olympian Name
New Frog Species Gets Olympian Name
It’s a big honor for such a small amphibian The post New Frog Species Gets Olympian Name (https://nautil.us/new-frog-species-gets-olympian-name-1280311/) appeared first on Nautilus
RACKET LISTS: American Hysteria
RACKET LISTS: American Hysteria
The nation of witch hunters whose lost "sense of decency" probably never existed