I frequently have opinions on things I know too little about. "From cradle to cradle I shall say many stupid things"
Public Key
npub1p5wa26hryppj3ezl0zc6vjkg7pkjyuff7a65j047sn8jsfgdrmrqqz54dt Profile Code
nprofile1qqsq68w4dt3jqsegu30h3vdxfty0qmfzwy5lwa2f86lgfnegy5x3a3spr3mhxue69uhkummnw3ezucnfw33k76twv4ezuum0vd5kzmqpp4mhxue69uhkummn9ekx7mqzu4eum
Show more details
Published at
2026-03-23T07:39:13+01:00 Event JSON
{
"id": "e74e1cb893ee6aa78027b535cc1c2b2e72316c6d82b84098baf87a9c6dca81ae" ,
"pubkey": "0d1dd56ae3204328e45f78b1a64ac8f06d227129f775493ebe84cf28250d1ec6" ,
"created_at": 1774247953 ,
"kind": 0 ,
"tags": [
[
"alt",
"User profile for BHN 🍁"
],
[
"name",
"BHN 🍁"
],
[
"display_name",
"BHN 🍁"
],
[
"picture",
"https://image.nostr.build/39a6890d92d21b0b25b8b275c64109ebfdf005be1166a2fcca98bd9e1938b234.jpg"
],
[
"banner",
"https://image.nostr.build/d20f2579f174fbd9196f19fc876da556beb650d942e54577e603beb6268a9a7f.gif"
],
[
"about",
"I frequently have opinions on things I know too little about. \n\"From cradle to cradle I shall say many stupid things\""
],
[
"lud16",
"[email protected] "
]
],
"content": "{\"banner\":\"https://image.nostr.build/d20f2579f174fbd9196f19fc876da556beb650d942e54577e603beb6268a9a7f.gif\",\"picture\":\"https://image.nostr.build/39a6890d92d21b0b25b8b275c64109ebfdf005be1166a2fcca98bd9e1938b234.jpg\",\"display_name\":\"BHN 🍁\",\"about\":\"I frequently have opinions on things I know too little about. \\n\\\"From cradle to cradle I shall say many stupid things\\\"\",\"name\":\"BHN 🍁\",\"username\":\"BlakeHoughton\",\"displayName\":\"Blake Houghton 🍁\",\"lud16\":\"[email protected] \"}" ,
"sig": "efc316710f864eccfcb0426791c07582b9795d0fc0cae7dd9e58ef2f8b2d1c5c2eb1ed649f19f29993c7e8316317255dc3506be521cf4e18c60f86a57009b55e"
}
Last Notes npub1p5wa26hryppj3ezl0zc6vjkg7pkjyuff7a65j047sn8jsfgdrmrqqz54dt BHN 🍁 I've been trying out Pro due to a 3 month deal, but it's not too useful for me outside of Deep Research. npub1p5wa26hryppj3ezl0zc6vjkg7pkjyuff7a65j047sn8jsfgdrmrqqz54dt BHN 🍁 I'm cautiously interested. Game optimization has been subpar the last few years. npub1p5wa26hryppj3ezl0zc6vjkg7pkjyuff7a65j047sn8jsfgdrmrqqz54dt BHN 🍁 Maybe it's due to the hard work of Colonel Claude or General Grok 🤣 npub1p5wa26hryppj3ezl0zc6vjkg7pkjyuff7a65j047sn8jsfgdrmrqqz54dt BHN 🍁 That specific query wasn't immediately helpful due to past strikes, but I did look into the video further during a break. Its hard to believe the "assets" weren't physical decoys of some kind. Weird self-own for the idf to post regardless. npub1p5wa26hryppj3ezl0zc6vjkg7pkjyuff7a65j047sn8jsfgdrmrqqz54dt BHN 🍁 Who's the source of the videos? If it's anyone directly involved I can't take it at face value 🤔 npub1p5wa26hryppj3ezl0zc6vjkg7pkjyuff7a65j047sn8jsfgdrmrqqz54dt BHN 🍁 Local. Qwen3.5 barely fits on my system, but it works. OSS is a comfortable fit though. npub1p5wa26hryppj3ezl0zc6vjkg7pkjyuff7a65j047sn8jsfgdrmrqqz54dt BHN 🍁 If I ever get around to setting up OpenClaw I'll probably choose either GPT-OSS 20b or Qwen3.5 27b. Unless something better releases before then npub1p5wa26hryppj3ezl0zc6vjkg7pkjyuff7a65j047sn8jsfgdrmrqqz54dt BHN 🍁 Neither lol Haven't found a reason to despise them any more than other Abrahamic religion yet. But fair enough, no need to continue. You're either trolling or arguing in bad faith and neither wants to waste our time that badly 🤷 npub1p5wa26hryppj3ezl0zc6vjkg7pkjyuff7a65j047sn8jsfgdrmrqqz54dt BHN 🍁 Alright, I should have looked into Sihkism more first lol. Maybe Hinduism would have been a better choice As for the ones he mentioned, most of those can't be argued except the few that are so broad or old everyone's had a hand in them anyway 🤷 npub1p5wa26hryppj3ezl0zc6vjkg7pkjyuff7a65j047sn8jsfgdrmrqqz54dt BHN 🍁 Sikhism? npub1p5wa26hryppj3ezl0zc6vjkg7pkjyuff7a65j047sn8jsfgdrmrqqz54dt BHN 🍁 Look, the guy said they invented every ism 😆 npub1p5wa26hryppj3ezl0zc6vjkg7pkjyuff7a65j047sn8jsfgdrmrqqz54dt BHN 🍁 Mostly plagiarism npub1p5wa26hryppj3ezl0zc6vjkg7pkjyuff7a65j047sn8jsfgdrmrqqz54dt BHN 🍁 Am I wrong? Wasn't he from PragerU? 🤔 npub1p5wa26hryppj3ezl0zc6vjkg7pkjyuff7a65j047sn8jsfgdrmrqqz54dt BHN 🍁 Gnosticism, Agnosticism, Hermeticism, Atheism, Theism, Rationalism, Platonism, Lagoism, Patriotism, Nationalism, Fascism, Skepticism, Materialism, Immaterialism. There's a lot of isms. Wait, hold up. Why am I trusting the PragerU propagandist again? npub1p5wa26hryppj3ezl0zc6vjkg7pkjyuff7a65j047sn8jsfgdrmrqqz54dt BHN 🍁 I did end up finishing it. I'll say it's down there with Birdemic and Ant-Farm Dickhole. npub1p5wa26hryppj3ezl0zc6vjkg7pkjyuff7a65j047sn8jsfgdrmrqqz54dt BHN 🍁 Chillul Hashem? 🤔 npub1p5wa26hryppj3ezl0zc6vjkg7pkjyuff7a65j047sn8jsfgdrmrqqz54dt BHN 🍁 This must be intentionally bad then. Unless AI just insert Batman references in things now? 😆 I'll have to try to stomach through it npub1p5wa26hryppj3ezl0zc6vjkg7pkjyuff7a65j047sn8jsfgdrmrqqz54dt BHN 🍁 I was expecting something like this https://www.youtube.com/watch?v=jwP7tYJ3zs0 npub1p5wa26hryppj3ezl0zc6vjkg7pkjyuff7a65j047sn8jsfgdrmrqqz54dt BHN 🍁 Okay, I couldn't finish the first minute. Please tell me Batman joins in at some point. npub1p5wa26hryppj3ezl0zc6vjkg7pkjyuff7a65j047sn8jsfgdrmrqqz54dt BHN 🍁 Tldr; Gemini argues that a lot of issues have been, or currently are, being remediated by newer NIPs. I queried about ease of onboarding, decentralized privacy and data sovereignty specifically. npub1p5wa26hryppj3ezl0zc6vjkg7pkjyuff7a65j047sn8jsfgdrmrqqz54dt BHN 🍁 Just a few https://image.nostr.build/505d5e3a23f546ff6765bfd57798ef793775b3b287c0cd5d5670b8f6d1bc7ce2.jpg npub1p5wa26hryppj3ezl0zc6vjkg7pkjyuff7a65j047sn8jsfgdrmrqqz54dt BHN 🍁 Lots of NOSTR relays get blocked by one of my security layers for attempting DNS rebinding. I'll have to look into this further npub1p5wa26hryppj3ezl0zc6vjkg7pkjyuff7a65j047sn8jsfgdrmrqqz54dt BHN 🍁 Okay, after reading all of this it's hard not to feel a little positive about NOSTRs future. npub1p5wa26hryppj3ezl0zc6vjkg7pkjyuff7a65j047sn8jsfgdrmrqqz54dt BHN 🍁 Okay, irrelevant to the original post and exceptionally verbose, here is what it gave (most is known to existing users already): Strategic Analysis of the Nostr Protocol: Decentralization, Privacy, and Onboarding Optimization Introduction to the Decentralized Imperative The contemporary digital landscape is dominated by highly centralized, vertically integrated social media platforms, predominantly represented by walled gardens such as X (formerly Twitter) and Meta’s Facebook. These platforms exert monopolistic control over user data, content distribution algorithms, and the global digital public square. While they offer frictionless onboarding and polished user experiences, they extract a high cost in terms of user privacy, data ownership, and freedom of expression. In these centralized architectures, a single corporate entity dictates moderation policies, alters the rules of engagement, and utilizes opaque algorithms to program user behavior through behavioral tracking and advertising models. The Nostr protocol—an acronym for Notes and Other Stuff Transmitted by Relays—emerged in late 2020 as a cryptographic, open-source antidote to this centralization. By fundamentally inverting the traditional "dumb client/smart server" paradigm into a "smart client/dumb server" architecture, Nostr decouples the user interface from data storage. This separation ensures that no single entity can unilaterally ban users or manipulate feeds without the user's explicit consent. The protocol operates as a public domain communication standard, not a company, allowing users to choose their clients, dictate their discovery algorithms, and retain total ownership of their social graph via public-key cryptography. As of the final quarter of 2025, the Nostr ecosystem has demonstrated robust, organic growth. Metrics indicate the network supports tens of thousands of daily active users, with specific reporting highlighting over 21,281 total users in early Q4, scaling rapidly to support millions of broadcasted events. The broader ecosystem boasts over 140 distinct client applications and 890 active relays spanning more than 40 countries, processing up to 3.8 million events weekly. However, scaling a decentralized protocol to compete directly with legacy Web 2.0 giants presents profound challenges. To prevent losing ground to X and Facebook, developers building on Nostr must solve a complex trilemma: achieving uncompromising censorship resistance, ensuring rigorous data privacy and metadata obfuscation, and delivering an onboarding experience devoid of cryptographic friction. This comprehensive report provides an exhaustive, expert-level analysis of the Nostr ecosystem. It evaluates the network's architectural decentralization, proposes advanced privacy tool implementations, scrutinizes the user onboarding flow compared to legacy platforms, and outlines highly recommended Nostr Improvement Proposals (NIPs) to secure mainstream adoption and long-term viability. Architectural Foundations and Protocol Mechanics To comprehend the strategic advantages and vulnerabilities of Nostr, one must dissect its underlying architecture. The protocol is intentionally minimal, designed around standard WebSocket connections and JSON objects, which promotes software diversity and resilience. The Separation of State and Execution The Nostr ecosystem is bifurcated into two primary components: clients and relays. Clients are the user-facing applications that manage private keys, compute cryptographic signatures, and render user interfaces. Relays, conversely, are simple, stateless backend databases that accept, store, and redistribute JSON-formatted events. Relays lack the cryptographic authority to modify events or spoof identities; they simply serve as asynchronous post offices. When a user executes an action—be it publishing a text note, liking a post, or updating a profile—the client constructs a JSON object, signs it with the user's private key (represented as an nsec string), and broadcasts it to an array of independent relays. Other users' clients subscribe to these relays using REQ messages to fetch events authored by specific public keys (represented as npub strings). The data model for Nostr is entirely event-driven. Everything on the network is an event, distinguished by a kind property. For example, a standard text note is Kind 1, a user metadata profile update is Kind 0, and a follow list is Kind 3. A typical event contains an identifier (a SHA-256 hash of the serialized event data), the author's public key, a creation timestamp, the event kind, content, a tags array, and a 64-byte Schnorr signature. Critics of the protocol frequently point out that the reliance on stringified JSON for cryptographic signatures can lead to representation instability across different implementations, and the lack of a defined transport protocol beyond WebSockets can create challenges on poor connections. Furthermore, early iterations lacked delivery confirmations, drawing unfavorable comparisons to older federated protocols like XMPP. However, the Nostr ecosystem addresses these deficiencies not through rigid base-layer changes, but through optional Nostr Implementation Possibilities (NIPs) that clients and relays can adopt to achieve interoperability without breaking the base protocol (NIP-01). Spam Deterrence and Quality Control In a permissionless network where creating an identity costs nothing, spam and denial-of-service vectors represent severe threats to infrastructure. Because relays do not require email verification or KYC procedures, malicious actors can generate thousands of cryptographic keypairs instantly to flood the network with garbage data. To combat this, the ecosystem has developed several decentralized moderation tools. NIP-13 introduces Proof of Work (PoW) for Nostr notes. By requiring the SHA-256 hash of an event identifier to contain a specific number of leading zero bits (defined as the difficulty), relays and clients can universally validate that computational energy was expended to create the note, serving as a highly effective bearer proof against high-volume spam. Additionally, NIP-51 allows users to create standard lists, such as Mute Lists (Kind 10000), which contain the public keys of spammers or bad actors. Clients can subscribe to the Mute Lists of highly trusted individuals within their social graph, creating a decentralized web-of-trust filtering system that dynamically shields users from sewage without relying on a central moderator. Furthermore, proposals like NIP-07 (window.nostr capability) and potential rating fields have been discussed to establish machine-readable signals for content quality, replacing centralized algorithms with user-curated reputation metrics. Decentralization Metrics, Relay Topography, and Infrastructure A critical question in decentralized systems is whether the protocol truly disperses power or merely shifts centralization to a new set of infrastructure providers. A recent large-scale systems study of the Nostr ecosystem, analyzing 17.8 million posts, 616 million post replications, 1.5 million users, and 712 relays, revealed a nuanced topographical landscape. The Replication Paradox The systems study indicates that the highest-trafficked relay hosts approximately 73% of all posts, a metric that superficially suggests severe centralization. However, second-order analysis reveals a unique architectural mechanism: extensive cryptographic redundancy. Because clients concurrently publish identical events to multiple relays, the cumulative distribution of posts across all relays equates to roughly 3200%. This data demonstrates that a single post is replicated across an average of 32 distinct servers. Consequently, if the top ten most popular relays were abruptly shut down, disconnected from the internet, or compromised by state-level censorship, the social graph and content availability would remain entirely intact. This aggressive replication represents a massive leap in censorship resistance compared to federated models such as Mastodon, where a user's account and data are inexorably tied to a single instance, and an instance administrator can alter ban lists or sever federation ties unilaterally. However, this architecture introduces a severe third-order consequence: immense bandwidth, storage, and processing overhead. Relays are subjected to massive redundancy. Estimates indicate that supporting 10 million messages per day requires a server to handle an average of 115 transactions per second (TPS) for writes alone, with read-only transactions reaching orders of magnitude higher. Operating a VPS capable of this throughput, alongside maintaining the requisite disk space for non-pruned event storage, can cost upwards of $320 per month. For free-to-use relays, this financial sustainability challenge is a primary contributing factor to relay downtime and availability issues. Intelligent Routing via NIP-65 To alleviate the global network spam caused by broadcasting to dozens of relays indiscriminately, the ecosystem adopted NIP-65 (Relay List Metadata). NIP-65 defines a replaceable event (Kind 10002) that allows users to advertise a streamlined list of relays where they primarily read and write data. The specification recommends that clients guide users to keep this list small—typically between 2 to 4 relays for reading and 2 to 4 for writing. Modern clients utilize NIP-65 to intelligently route queries. When a user wishes to view another user's profile, their client fetches data only from the specific write relays advertised by the target user, rather than querying every known relay on the network. Conversely, when tagging or replying to a user, the client publishes the event directly to the recipient's advertised read relays. This drastically reduces the overhead during post retrieval and controls the number of post replicas, solving the financial and technical bottlenecks identified in the systems study without compromising the censorship-resistant properties of the network. Physical Infrastructure and Hosting Concentration True decentralization requires not only protocol-level distribution but also physical infrastructure diversity. Currently, the operation of Nostr relays heavily depends on traditional Web 2.0 cloud providers. The global web hosting market is expanding aggressively, projected to grow from $159.9 billion in 2024 to $355.8 billion by 2029 at a compound annual growth rate (CAGR) of 17.35%. Within this massive market, hyperscalers maintain a firm grip on underlying infrastructure. | Cloud Provider | Global Market Presence | Key Characteristics for Nostr Relays | Network Implications | |---|---|---|---| | Amazon Web Services (AWS) | ~30% market share, 37 regions, 245 countries. | High reliability, massive scalability, automated managed services. | Highest cost. Reliance on AWS introduces a single point of failure at the corporate policy level. AWS Global Accelerator powers 56.7 million sites globally. | | Hetzner | Dominant in EU (Germany, Finland). | Extremely cost-effective dedicated servers, unmetered bandwidth, strict GDPR compliance. | Preferred by free-tier relay operators due to low bandwidth costs. Vulnerable to regional ISP routing failures and network maintenance timeouts. | | DigitalOcean | 15+ regions globally. | Developer-friendly, predictable pricing, balanced performance, 97% GTmetrix score. | Serves as a middle-ground for mid-tier relays lacking the budget for AWS but requiring broader geographic diversity and lower Time to First Byte (TTFB) than Hetzner. | The reliance on providers like Hetzner and AWS underscores a physical vulnerability for the Nostr network. If a major provider alters its Terms of Service regarding decentralized networks or cryptocurrency-adjacent protocols, a significant portion of the relay infrastructure could face sudden disruption. Mitigating this requires active community encouragement of self-hosted hardware setups. Projects like Umbrel and Start9 Embassy allow users to run personal relays (often tunneled through Tailscale or WireGuard) on single-board computers in their living rooms, guaranteeing that their data persists regardless of corporate cloud policy. Advanced Privacy, Metadata Obfuscation, and Cryptographic Security If Nostr is to capture market share from X, Facebook, and encrypted messengers like Signal or Telegram, it must offer superior privacy guarantees. By default, Nostr is radically transparent. Because events are broadcast globally to open relays, server operators can log a user's IP address, public key interactions, posting times, and the entirety of their social graph. To ensure absolute privacy—particularly for direct messaging—the protocol relies on a sophisticated suite of NIPs that mask both content and metadata. The Evolution of Encrypted Payloads: NIP-04 to NIP-44 Initially, Nostr relied on NIP-04 for Encrypted Direct Messages. While NIP-04 encrypted the content of a message, it suffered from catastrophic metadata leakage. The metadata—specifically the sender's public key, the recipient's public key, and the timestamp—remained entirely visible in plaintext on the public ledger. This allowed any network observer or relay operator to map social connections and determine precisely who was speaking to whom, rendering it fundamentally flawed for true privacy. Consequently, the ecosystem deprecated NIP-04 in favor of NIP-44 (Encrypted Payloads). NIP-44 introduces a robust, versioned encryption algorithm that significantly improves the cryptographic confidentiality of payloads by computing a shared key using the author's public and private keys. However, NIP-44 alone does not solve the metadata leakage problem; it simply ensures the contents are securely locked against decryption by third parties. Total Obfuscation: NIP-59 (Gift Wrap) and NIP-17 To eradicate metadata leakage and obscure the social graph, developers engineered NIP-59, colloquially known as "Gift Wrap," which is subsequently implemented for private messaging via NIP-17. NIP-59 is a brilliant cryptographic nesting doll that isolates metadata across multiple layers, preventing relays from gleaning any relational data. It utilizes three core concepts: the Rumor, the Seal, and the Gift Wrap. * The Rumor: The actual message content (e.g., the text of a direct message). Crucially, the Rumor is an unsigned Nostr event. Because it lacks a cryptographic signature, it maintains plausible deniability; if the content is somehow leaked or decrypted, it cannot be mathematically proven that the user authored it, providing a critical layer of repudiation. 2. The Seal: The JSON-encoded Rumor is encrypted using a shared conversation key derived from the sender's private key and the receiver's public key. This encrypted Rumor is placed inside the content field of a "Seal" event (Kind 13). The Seal is then signed by the sender. This proves authorship to the recipient without revealing the content to the public. * The Gift Wrap: Finally, the JSON-encoded Seal is encrypted using a single-use, ephemeral random key. This is placed inside the content field of a "Gift Wrap" event (Kind 1059). The Gift Wrap designates the intended recipient in the tags but entirely hides the true sender's identity behind the ephemeral key. When clients broadcast Gift Wraps selectively to the recipient's preferred NIP-65 read relays, network observers and relay operators merely see random, encrypted blobs (Gift Wraps) arriving at a user's inbox. The observer cannot ascertain who sent the message, and the sender's identity remains mathematically concealed. Implementing NIP-17 and NIP-59 is an absolute necessity for any client attempting to market itself as a secure, private alternative to Web 2.0. For future-proofing, developers are also exploring NIP-EE, which standardizes the Messaging Layer Security (MLS) protocol for Nostr. While NIP-59 hides metadata, it lacks forward secrecy and post-compromise security—meaning if a user's private key is eventually stolen, all past intercepted DMs could be decrypted. Integrating MLS would solve this, creating an architecture that rivals Signal while maintaining decentralization. Furthermore, experimental concepts like Nostr-Stealth (utilizing Kind 1337 events and ephemeral keys over channels) represent ongoing research into extreme metadata security. Network-Layer Privacy: Tor and VPN Integration While NIP-59 obfuscates cryptographic metadata, it does not hide the user's IP address from the relay. Relays can easily correlate an IP address with a public key, potentially stripping away anonymity and revealing geographic location. To combat this, elite Nostr clients support native network routing through Tor and Virtual Private Networks (VPNs). For instance, Amethyst (a premier Android client) supports integration with Tor through Orbot, ensuring a secure, anonymous environment where WebSocket connections are routed through onion services. On iOS, where Apple's WebKit restrictions hinder native Tor Browser implementations, clients can leverage Onion Browser infrastructure or system-wide VPNs. However, users and developers must be keenly aware of the operational limitations of combining these technologies. Utilizing a "VPN over Tor" setup actually degrades anonymity by eliminating circuit switching. Tor normally allows different network requests to use varying paths through the network, exiting from different relays with different IP addresses. Conversely, tunneling all Tor traffic through a static VPN ensures all traffic exits from the same VPN server, allowing a sophisticated observer or website to correlate the traffic flow. Therefore, native Tor proxy integration within the Nostr client application—rather than relying on system-wide VPNs overlaid on Tor—remains the gold standard for maintaining operational security and network-layer privacy. Eradicating Friction: The Onboarding Imperative The single greatest barrier to decentralized technology adoption is user onboarding friction. Web 2.0 giants excel at optimizing "Time to Value" (TTV)—the duration between a user initiating a signup and experiencing a dopamine-inducing "aha" moment. According to the Fogg Behavior Model, behavior occurs only when motivation, ability, and triggers align. If a new user is highly motivated to leave X but lacks the technical ability to navigate cryptographic keys, the desired action (activation) fails. To supplant X and Facebook, a Nostr client must completely abstract the complexity of public-key cryptography away from the user interface while preserving underlying sovereignty. Comparative Friction: Legacy Platforms vs. Nostr Facebook’s onboarding is optimized for data extraction. The platform requires real names, dates of birth, email addresses, phone numbers, and profile pictures. While this process is framed around building "trust and transparency," its primary function is to populate advertising databases and build behavioral profiles. X operates similarly, utilizing behavioral prompts and immediate algorithmic feed generation to hook the user instantly upon verifying an email or phone number. Historically, Nostr onboarding was highly abrasive and technically hostile. Users were confronted with 64-character hexadecimal strings (the nsec private key and npub public key). They were explicitly warned that they must write down their nsec immediately, and that losing it meant permanent, irrecoverable loss of their identity. Furthermore, early clients required users to manually locate and input relay URLs to see any content, resulting in empty feeds and immediate user churn. This cognitive load alienated non-technical demographics, resulting in failed adoption attempts. Modern Nostr clients, such as Primal, have fundamentally solved this via streamlined UX design. The Primal onboarding flow requires only a username and an optional avatar to instantiate an account. Behind the scenes, the application generates the keypair, securely stores the nsec in the device's local encrypted keychain, connects to default high-availability relays, and instantly populates a rich algorithmic and chronological feed. This reduces the Time to Value to seconds, matching the speed of X while requiring zero personal data extraction. | Platform | Authentication Requirement | Identity Persistence | Time to Value (TTV) | Data Extraction Level | |---|---|---|---|---| | Facebook | Email, Phone, Real Name, DOB. | Tied to corporate database; unilaterally revokable. | Medium (requires verification steps). | Extreme (harvests demographic & social data). | | X (Twitter) | Email or Phone, Captcha. | Centralized control; subject to algorithmic shadowbans. | Fast (immediate algorithmic feed). | High (behavioral tracking). | | Nostr (Legacy) | Manual nsec generation, manual relay configuration. | Mathematically sovereign. | Very Slow (high cognitive load, empty feeds). | Zero. | | Nostr (Primal) | Username selection only. | Mathematically sovereign. | Immediate (instant read/write access and rich media). | Zero. | Resolving the Identity Crisis: NIP-05 While generating a keypair invisibly solves the initial login friction, it leaves users with unintelligible, 64-character npub strings for usernames, effectively destroying discoverability and human connection. NIP-05 addresses this critical flaw by mapping cryptographic keys to human-readable, DNS-based internet identifiers. A NIP-05 identifier resembles an email address (e.g., [email protected] ). The prefix matches the user's profile name, and the suffix points to a web domain. When a user searches for this identifier, the Nostr client performs an HTTP GET request to the domain's /.well-known/nostr.json endpoint. The server responds with a JSON object that verifies the mapping of the requested name to its corresponding hex-formatted public key. This creates a verifiable cryptographic link between a web domain and a Nostr identity. It allows organizations to seamlessly verify their employees (e.g., Block verifying [email protected] ) without relying on centralized, paid blue-check systems. Providing users with a free, automated NIP-05 identifier upon registration is a mandatory UX requirement for any competitive client application seeking mainstream adoption. The Ultimate Onboarding Solution: NIP-46 Remote Signing Despite client-side obfuscation, storing the nsec locally on a mobile device or web browser extension carries inherent security risks, especially for users utilizing multiple devices (e.g., a phone, a tablet, and a desktop). Expecting a mainstream user to manually copy and paste their highly sensitive nsec between applications exposes the key to clipboard loggers, malicious apps, and severe operational vulnerability. NIP-46 (Nostr Remote Signing) provides an elegant, highly secure solution that replicates single-sign-on (SSO) mechanics. Under NIP-46, the user's actual nsec (the "User-keypair") is stored securely on a dedicated remote signer, daemon, or server, colloquially known as a "Bunker". The client application (e.g., a web client like Coracle or Snort) never touches the private key. Instead, the client generates a disposable "Client-keypair" to establish an encrypted, JSON-RPC-like WebSocket connection with the Bunker using bunker:// or nostrconnect:// protocols. When the client wishes to publish a post or decrypt a DM, it sends a sign_event or nip44_decrypt request to the Bunker. The Bunker executes the cryptographic operation and returns the signed or decrypted data to the client. Furthermore, combined with NIP-89 (Recommended Application Handlers), Bunkers can broadcast discoverability events, allowing clients to automatically locate a user's remote signer based on their NIP-05 address. This architecture enables "Login with Nostr"—a flow identical to "Login with Google," but entirely decentralized. A user simply inputs their NIP-05 address into a new app, approves a permission prompt on their primary signing device (or dedicated signer app like Amber on Android), and is instantly authenticated without ever exposing their private key to the new application. This represents a massive advantage over competing decentralized login methods like "Login with Lightning" (LNURL-auth). Lightning nodes are unique identifiers, not true identities; they lack profile pictures, usernames, and direct messaging capabilities. Nostr public keys provide a rich, consistent identity layer across all services. Mitigating Catastrophic Data Loss: The Frontier of Account Permanence A critical vulnerability of cryptographic sovereignty is the absolute permanence of key loss. In a system without a central database, a lost nsec equates to the permanent, irrecoverable loss of the user's social graph, content history, NIP-05 verification, and direct messages. To the average consumer accustomed to automated "Forgot Password" loops, this represents an unacceptable level of risk. Resolving the account recovery problem is the final hurdle in achieving parity with centralized platforms. The Failure of NIP-26 Early attempts to manage key risk involved NIP-26 (Delegated Event Signing). NIP-26 allowed a user to keep their "root" keypair in cold storage. The root key would sign a cryptographic token delegating authority to a secondary, disposable "hot" keypair for a specific duration or specific event kinds (using a query string like kind=1&created_at<1675721813). While intellectually sound, the implementation introduced excessive computational burden on clients, which had to constantly download, parse, and verify complex delegation chains to ensure a post was legitimate. As a result, NIP-26 has been officially marked as "unrecommended" and is being phased out of the ecosystem in favor of more efficient solutions. The Evolution Toward Social Recovery and Multisig Paradigms With NIP-26 deprecated, the ecosystem is heavily researching "Social Recovery" paradigms. Social recovery, broadly defined, allows a user to designate a quorum of trusted contacts (guardians) who possess the cryptographic authority to restore access or transfer the identity to a newly generated keypair if the original is lost. Currently, Nostr-native social recovery mechanisms (often discussed under draft proposals like NIP-105 or general ecosystem research) are in the conceptual phases, drawing heavily from adjacent blockchain technologies like the Kusama/Polkadot social recovery modules. Potential architectural implementations include: * M-of-N Threshold Signatures: Leveraging advanced Schnorr signature mechanics to create a joint Nostr identity (such as the frostr tool). To publish an event—or more importantly, to rotate the primary key—a predefined threshold (e.g., 3 out of 5) of the trusted guardians must cryptographically approve the action. * Verifiable Credentials (VCs): Using Decentralized Identifiers (DIDs) mapped to Nostr public keys. If Alice loses her key, her trusted guardians can issue Zero-Knowledge Verifiable Credentials attesting that a new public key belongs to Alice, smoothly porting her reputation, NIP-05 mapping, and social graph to the new identity without relying on a centralized recovery server. * Smart Contract Integration: Connecting a Nostr identity to an external Ethereum ERC-4337 Account Abstraction wallet or similar Layer-2 smart contract. The smart contract handles the M-of-N social recovery logic off-chain, and once executed by the bundler and paymaster agents, mathematically updates the linked Nostr identity. While no single NIP has finalized the social recovery standard, forward-thinking client developers must design their wallet and key-management infrastructures to be fully compatible with Multi-Party Computation (MPC) and threshold signature schemes as they become formally integrated into the protocol. The Client Ecosystem, Media Management, and the Creator Economy The Nostr protocol is not a monolithic application but a diverse software ecosystem tailored to specific user needs. The competitive landscape is defined by clients offering varied features, monetization tools, and media handling capabilities. Client Disparity and Feature Sets Clients are evaluated based on their adherence to NIPs and their operational focus. * Amethyst (Android): A premier, feature-packed native client. It boasts extensive NIP support, including NIP-17 private messages, NIP-57 Zaps, and native Tor integration via Orbot. It is designed for power users requiring high performance and deep protocol access. * Damus (iOS/Desktop): The pioneer native client for Apple ecosystems. It features an incredibly polished interface, integrated Lightning payments, and a "Damus Purple" premium membership to support independent development. * Primal (Cross-Platform): Optimized for onboarding and speed. Primal utilizes advanced caching servers and custom algorithms to deliver sub-second load times and immediate feed generation, making it the most direct competitor to X's user experience. It also offers Primal Premium, providing ethical monetization focused on user value rather than advertising. * Web Clients (Coracle, Snort, Nostrudel): These clients excel in community management, custom feeds, and relay curation, often requiring a browser extension like Alby for secure key management. Monetization: Zaps and the Lightning Network Unlike X or Facebook, which monetize through surveillance capitalism and ad-revenue sharing, Nostr integrates value transfer directly into the protocol via NIP-57 (Lightning Zaps). A Zap is a cryptographic receipt of a Bitcoin Lightning Network payment sent from one user to another. Because Nostr operates alongside the Lightning Network, users can tip creators instantly, globally, and with zero platform fees. Modern clients are enhancing this with Nostr Wallet Connect (NWC), a protocol extension that allows users to seamlessly pair an external Lightning wallet to their Nostr client. This eliminates context switching; users can Zap directly within the feed with a single tap, fostering a robust creator economy that cannot be demonetized by a central authority. Furthermore, emerging standards like Cashu (NIP-60) and Nutzaps (NIP-61) are introducing e-cash privacy mechanics directly into the ecosystem, further expanding financial optionality. Media Management in a Serverless Paradigm: The Blossom Protocol A modern social network is fundamentally crippled without rich media. However, Nostr relays are designed explicitly to transmit lightweight JSON text objects, not high-resolution images or gigabyte video files. Burdening relays with rich media would instantly destroy the network's decentralized topography by forcing out small, independent server operators due to exorbitant bandwidth and storage costs. To resolve this, the ecosystem relies on Blossom (NIP-B7). Blossom operates as a parallel specification for storing "blobs" (binary data) on public media servers. Instead of relying on centralized URLs that suffer from link rot, Blossom addresses media strictly by its immutable SHA-256 hash. When a user uploads an image via their Nostr client, the media is pushed to a Blossom server, which generates the SHA-256 hash. The client then embeds this hash inside the Nostr JSON event. When other clients read the event, they parse the hash and request the corresponding binary data from any available Blossom server using a standard HTTP GET /[span_42](start_span)[span_42](end_span)<sha256> request. Blossom’s functionality is extended through Blossom Upgrade Documents (BUDs). For example, BUD-03 allows servers to advertise a User Server List via Event Kind 10063, while BUD-11 utilizes Nostr Event Kind 24242 to manage authorization tokens. This ensures that only authenticated public keys can upload, mirror, or delete specific blobs on private media servers. This hard separation of text relaying (Nostr) and media storage (Blossom) ensures the core network remains highly performant and financially viable for diverse infrastructure operators. Strategic Roadmap and Concluding Recommendations The Nostr protocol represents a profound architectural shift in the design of digital communication. By decoupling the application layer from the database layer, it successfully dismantles the monopolistic data silos that define X and Facebook. Current network telemetry proves that the protocol's aggressive data replication models secure an unprecedented level of censorship resistance, insulating the social graph from the vulnerabilities of centralized corporate infrastructure and hyperscale cloud providers. However, surviving the transition from a niche cryptographic experiment to a globally adopted social layer requires meticulous execution. To construct a Nostr client capable of overpowering legacy platforms, developers must curate their NIP implementations to eliminate friction while maximizing security. Based on this exhaustive analysis, the following protocol stack is highly recommended: * Eradicate Onboarding Friction: Implement NIP-05 (Internet Identifiers) instantly to abstract npub strings away from the UI. Mandate NIP-46 (Remote Signing) to allow users to authenticate securely across devices without exposing raw private keys, mirroring the simplicity of Web 2.0 single-sign-on. * Optimize Network Routing: Adopt NIP-65 (Relay List Metadata) to intelligently route queries to a user's preferred relays, mitigating the massive bandwidth overhead of indiscriminate global replication and ensuring the financial sustainability of relay operators. * Guarantee Absolute Privacy: Deprecate the metadata-leaking NIP-04. Enforce NIP-17, NIP-44, and NIP-59 (Gift Wrap) to ensure all private messaging benefits from versioned payloads, plausible deniability, and total obfuscation of the social graph. Complement this with native Tor integration (e.g., Orbot API) to mask IP-to-pubkey correlation at the network layer. * Prepare for Account Permanence: Dedicate development resources to emerging social recovery paradigms (M-of-N threshold signatures, Verifiable Credentials) to protect users from the catastrophic permanence of private key loss. The historical friction of manual key management is rapidly being eliminated, closing the "Time to Value" gap with Web 2.0 platforms. Concurrently, the deployment of cryptographic obfuscation guarantees that Nostr will offer an unparalleled standard of metadata privacy—an asset that legacy platforms, heavily reliant on surveillance capitalism, simply cannot replicate. The infrastructure is robust, the cryptography is sound, and the pathway to mainstream, decentralized sovereignty is clear. npub1p5wa26hryppj3ezl0zc6vjkg7pkjyuff7a65j047sn8jsfgdrmrqqz54dt BHN 🍁 This prompted me to send Gemini Pro a Deep Research request on Nostr itself. It's unfinished thoughts are interesting updates for me. npub1p5wa26hryppj3ezl0zc6vjkg7pkjyuff7a65j047sn8jsfgdrmrqqz54dt BHN 🍁 Sounds like someone agrees with Aristotle. npub1p5wa26hryppj3ezl0zc6vjkg7pkjyuff7a65j047sn8jsfgdrmrqqz54dt BHN 🍁 I'm envious. He must have a good life to be thinking about social media randos this much. npub1p5wa26hryppj3ezl0zc6vjkg7pkjyuff7a65j047sn8jsfgdrmrqqz54dt BHN 🍁 We should ask for a zap as human authentication 😆 npub1p5wa26hryppj3ezl0zc6vjkg7pkjyuff7a65j047sn8jsfgdrmrqqz54dt BHN 🍁 Truly? I'll block it if so. It's my third favorite button rn 😆 npub1p5wa26hryppj3ezl0zc6vjkg7pkjyuff7a65j047sn8jsfgdrmrqqz54dt BHN 🍁 Not when bots were running rampant a while ago, but rn it seems fine. npub1p5wa26hryppj3ezl0zc6vjkg7pkjyuff7a65j047sn8jsfgdrmrqqz54dt BHN 🍁 Its one of the few that interests me. This might be the third movie in 5-ish years I see in theatres. npub1p5wa26hryppj3ezl0zc6vjkg7pkjyuff7a65j047sn8jsfgdrmrqqz54dt BHN 🍁 I just block them instead of wasting my time talking to schizo-posting bots 🤷 npub1p5wa26hryppj3ezl0zc6vjkg7pkjyuff7a65j047sn8jsfgdrmrqqz54dt BHN 🍁 Is it possible to shill Nostr? 🤔 npub1p5wa26hryppj3ezl0zc6vjkg7pkjyuff7a65j047sn8jsfgdrmrqqz54dt BHN 🍁 The PC version of Alien: Isolation runs better on Android than the port does while looking better. Emulation and AI have come a long way. npub1p5wa26hryppj3ezl0zc6vjkg7pkjyuff7a65j047sn8jsfgdrmrqqz54dt BHN 🍁 I'd probably go as far as to add "grifting provocateur" to his titles. npub1p5wa26hryppj3ezl0zc6vjkg7pkjyuff7a65j047sn8jsfgdrmrqqz54dt BHN 🍁 So expensive that they're now selling fake ramsticks for aesthetic purposes. Now you can FEEL like your computer is complete. https://www.tomshardware.com/pc-components/ram/fake-ram-bundled-with-real-ram-to-create-a-performance-illusion-for-amd-users-1-1-value-pack-offers-desperate-psychological-relief-as-the-memory-shortage-worsens npub1p5wa26hryppj3ezl0zc6vjkg7pkjyuff7a65j047sn8jsfgdrmrqqz54dt BHN 🍁 I would expect nothing less after they rick-rolled the Epstein files. npub1p5wa26hryppj3ezl0zc6vjkg7pkjyuff7a65j047sn8jsfgdrmrqqz54dt BHN 🍁 True. AI is more valuable than Ethereum. npub1p5wa26hryppj3ezl0zc6vjkg7pkjyuff7a65j047sn8jsfgdrmrqqz54dt BHN 🍁 Aim for absolute apotheosis! npub1p5wa26hryppj3ezl0zc6vjkg7pkjyuff7a65j047sn8jsfgdrmrqqz54dt BHN 🍁 Not the same thing I was referencing, but yes it was the same CEO. Someone protected Kotick? npub1p5wa26hryppj3ezl0zc6vjkg7pkjyuff7a65j047sn8jsfgdrmrqqz54dt BHN 🍁 https://image.nostr.build/3b35c622c4d50e0e6509db7c1f5b655173fb45add770d87c6a011ebc76390cb7.gif npub1p5wa26hryppj3ezl0zc6vjkg7pkjyuff7a65j047sn8jsfgdrmrqqz54dt BHN 🍁 Transcendence? Why aim so low? npub1p5wa26hryppj3ezl0zc6vjkg7pkjyuff7a65j047sn8jsfgdrmrqqz54dt BHN 🍁 Found the vid: https://www.youtube.com/watch?v=u2wzYFSK7Ls Its weird they allowed someone to indirectly argue that sexual orientation shouldn't be a protected characteristic 🤷 npub1p5wa26hryppj3ezl0zc6vjkg7pkjyuff7a65j047sn8jsfgdrmrqqz54dt BHN 🍁 Alright. I'll give them a follow. Thanks for the tip npub1p5wa26hryppj3ezl0zc6vjkg7pkjyuff7a65j047sn8jsfgdrmrqqz54dt BHN 🍁 "Finally I understand. Home isn't where you rest. It's what you fight for!" is what came to mind reading the synopsis. Glad to see you pursuing other passions! npub1p5wa26hryppj3ezl0zc6vjkg7pkjyuff7a65j047sn8jsfgdrmrqqz54dt BHN 🍁 Wuuuuuut the guy that wanted to use economics to start grooming children is also into shady crypto schemes and alternative payment systems with no barrier of access?! The guy that helped push gambling addictions to kids through video games?! Say it ain't so! npub1p5wa26hryppj3ezl0zc6vjkg7pkjyuff7a65j047sn8jsfgdrmrqqz54dt BHN 🍁 I assume everyone is a bot until proven otherwise npub1p5wa26hryppj3ezl0zc6vjkg7pkjyuff7a65j047sn8jsfgdrmrqqz54dt BHN 🍁 Thats more faithful than I was expecting. npub1p5wa26hryppj3ezl0zc6vjkg7pkjyuff7a65j047sn8jsfgdrmrqqz54dt BHN 🍁 Unless you're Alexander the Great, then it's something like hemlock 😆 npub1p5wa26hryppj3ezl0zc6vjkg7pkjyuff7a65j047sn8jsfgdrmrqqz54dt BHN 🍁 Technically, almost everyone is 🤷 😆 npub1p5wa26hryppj3ezl0zc6vjkg7pkjyuff7a65j047sn8jsfgdrmrqqz54dt BHN 🍁 Oh. I missed them completely somehow. npub1p5wa26hryppj3ezl0zc6vjkg7pkjyuff7a65j047sn8jsfgdrmrqqz54dt BHN 🍁 The Life is Strange TV series should probably end the first season with the end of the first game. They should not try and drag it out too long. npub1p5wa26hryppj3ezl0zc6vjkg7pkjyuff7a65j047sn8jsfgdrmrqqz54dt BHN 🍁 Wait... Was this Sir Sleepy? 😮 npub1p5wa26hryppj3ezl0zc6vjkg7pkjyuff7a65j047sn8jsfgdrmrqqz54dt BHN 🍁 Oh hey. I got things to work finally? npub1p5wa26hryppj3ezl0zc6vjkg7pkjyuff7a65j047sn8jsfgdrmrqqz54dt BHN 🍁 That was closer to Scary Movie or Meet the Spartans, but I've seen it a few times now 👀 npub1p5wa26hryppj3ezl0zc6vjkg7pkjyuff7a65j047sn8jsfgdrmrqqz54dt BHN 🍁 Great movie! I need to go back and rewatch it! In similar vein (martial arts comedy), have you seen Kung Fu Hustle? I've discovered it recently and it has no right to be as good as it is. npub1p5wa26hryppj3ezl0zc6vjkg7pkjyuff7a65j047sn8jsfgdrmrqqz54dt BHN 🍁 Without spoiling anything about the movie: we think we know the actual cause of inevitable global infertility, no there likely won't be a magical cure , and unlike the movie this isn't limited to humans and will likely be the 6th great mass extinction event we unwittingly unleashed upon ourselves solely because it affects almost all wildlife. https://www.theguardian.com/environment/2019/feb/27/plastics-leading-to-reproductive-problems-for-wildlife https://www.earth.com/news/plastics-found-inside-vegetable-tissues-for-the-first-time/ https://www.sciencedirect.com/science/article/pii/S2352396423001378 https://yaleglobalhealthreview.com/2025/05/19/microplastics-and-infertility-an-invisible-crisis/ https://www.youtube.com/watch?v=NBRquiS1pis "Que sera, sera. The futures not ours to see" 🤷♂️ npub1p5wa26hryppj3ezl0zc6vjkg7pkjyuff7a65j047sn8jsfgdrmrqqz54dt BHN 🍁 Please dont remind me of the dental cleanings... I've been stalling a cavity for years now and I just finally started seriously eating away at the debt 😭 npub1p5wa26hryppj3ezl0zc6vjkg7pkjyuff7a65j047sn8jsfgdrmrqqz54dt BHN 🍁 I was so convinced nobody could have figured that out 🤣 npub1p5wa26hryppj3ezl0zc6vjkg7pkjyuff7a65j047sn8jsfgdrmrqqz54dt BHN 🍁 Have you watched Children of Men? The reality of our situation is much worse than the movie came up with. npub1p5wa26hryppj3ezl0zc6vjkg7pkjyuff7a65j047sn8jsfgdrmrqqz54dt BHN 🍁 From my understanding. America doesnt tend to apply the sins of the father to the children intentionally, or systematically, at a national level. The children of criminals are still allowed to attend higher education instead of being cut out of almost everything, including public transport. They dont get cut out of the financial systems either. Its not been so completely centralized yet, as evidenced by off ramps even existing. I can agree with the idea there are many different groups attempting to create such a system in their own self-interest. npub1p5wa26hryppj3ezl0zc6vjkg7pkjyuff7a65j047sn8jsfgdrmrqqz54dt BHN 🍁 Take a guess what the economic theory is called. Its really original, I swear. npub1p5wa26hryppj3ezl0zc6vjkg7pkjyuff7a65j047sn8jsfgdrmrqqz54dt BHN 🍁 "The reason that the rich were so rich, Vimes reasoned, was because they managed to spend less money. Take boots, for example. ... A really good pair of leather boots cost fifty dollars. But an affordable pair of boots, which were sort of OK for a season or two and then leaked like hell when the cardboard gave out, cost about ten dollars. ... But the thing was that good boots lasted for years and years. A man who could afford fifty dollars had a pair of boots that'd still be keeping his feet dry in ten years' time, while a poor man who could only afford cheap boots would have spent a hundred dollars on boots in the same time and would still have wet feet." -Men At Arms (1993), Terry Pratchett npub1p5wa26hryppj3ezl0zc6vjkg7pkjyuff7a65j047sn8jsfgdrmrqqz54dt BHN 🍁 I hear that there is a very data rich database of biometrics, medical info, passports, nationality, criminal records, etc. Maybe someone could ransom a lot of money out of such a system 🤔 npub1p5wa26hryppj3ezl0zc6vjkg7pkjyuff7a65j047sn8jsfgdrmrqqz54dt BHN 🍁 Wtf happened with Amethyst? Now there are 300+ relays that cant be removed and spam you with payment requests. npub1p5wa26hryppj3ezl0zc6vjkg7pkjyuff7a65j047sn8jsfgdrmrqqz54dt BHN 🍁 "They call themselves anti-bad so the people they kill must be bad!" -useful idiots npub1p5wa26hryppj3ezl0zc6vjkg7pkjyuff7a65j047sn8jsfgdrmrqqz54dt BHN 🍁 Im sure funny people are here somewhere, but other platforms are mostly frictionless to get desired content. Nostr has quite a bit of friction for personalized content delivery that you wont feel on the others. npub1p5wa26hryppj3ezl0zc6vjkg7pkjyuff7a65j047sn8jsfgdrmrqqz54dt BHN 🍁 True. America could drastically cut those numbers if the state similarly threatened starved the children of criminals and dissenters through a centralized financial system tied to an arbitrary social credit system. npub1p5wa26hryppj3ezl0zc6vjkg7pkjyuff7a65j047sn8jsfgdrmrqqz54dt BHN 🍁 Im thinking Plato would be a pretty good contender, too 🤔 npub1p5wa26hryppj3ezl0zc6vjkg7pkjyuff7a65j047sn8jsfgdrmrqqz54dt BHN 🍁 People keep telling me that I live in clown world and I'm starting to think they may be onto something 🤔 npub1p5wa26hryppj3ezl0zc6vjkg7pkjyuff7a65j047sn8jsfgdrmrqqz54dt BHN 🍁 Who's winning? npub1p5wa26hryppj3ezl0zc6vjkg7pkjyuff7a65j047sn8jsfgdrmrqqz54dt BHN 🍁 Yea, it doesnt seem to. What should it actually say? https://image.nostr.build/f4b344f7d7dd1a517d50f04f00148f4801029c044bc92c5424170c128cbe386d.jpg npub1p5wa26hryppj3ezl0zc6vjkg7pkjyuff7a65j047sn8jsfgdrmrqqz54dt BHN 🍁 Nobody can tell me Bitcoin can't replace fiat currencies if a bad gamer chat app can replace a government during snap elections. npub1p5wa26hryppj3ezl0zc6vjkg7pkjyuff7a65j047sn8jsfgdrmrqqz54dt BHN 🍁 No, that's just being a glutton through starvation. All good bro. npub1p5wa26hryppj3ezl0zc6vjkg7pkjyuff7a65j047sn8jsfgdrmrqqz54dt BHN 🍁 Complaining about people complaining about complainers. What a time to be alive. npub1p5wa26hryppj3ezl0zc6vjkg7pkjyuff7a65j047sn8jsfgdrmrqqz54dt BHN 🍁 Let us know what the bail is for using prayer as intimidation towards someone 😆 npub1p5wa26hryppj3ezl0zc6vjkg7pkjyuff7a65j047sn8jsfgdrmrqqz54dt BHN 🍁 So when's the next poll? I want to get some bots ready for something. npub1p5wa26hryppj3ezl0zc6vjkg7pkjyuff7a65j047sn8jsfgdrmrqqz54dt BHN 🍁 Reminds me of this quote: "The welfare of the people in particular has always been the alibi of tyrants, and it provides the further advantage of giving the servants of tyranny a good conscience." - Albert Camus npub1p5wa26hryppj3ezl0zc6vjkg7pkjyuff7a65j047sn8jsfgdrmrqqz54dt BHN 🍁 Bluetooth is made to have really low power use. You probably won't even notice the battery difference of it being on. A consequence of the design is that it can't send lots of data at any reasonable speed. npub1p5wa26hryppj3ezl0zc6vjkg7pkjyuff7a65j047sn8jsfgdrmrqqz54dt BHN 🍁 So this happens https://video.nostr.build/731f0e8187bf7bdb2fbacdc6c16ea24b5413ea6c19d9281ad8290384da66038d.mp4 npub1p5wa26hryppj3ezl0zc6vjkg7pkjyuff7a65j047sn8jsfgdrmrqqz54dt BHN 🍁 Your clothes have cotton in them? No wonder they are expensive! Wear some plastic like the rest of us! 🤣 npub1p5wa26hryppj3ezl0zc6vjkg7pkjyuff7a65j047sn8jsfgdrmrqqz54dt BHN 🍁 It looks good! But $30 still seems excessive for a single dress. npub1p5wa26hryppj3ezl0zc6vjkg7pkjyuff7a65j047sn8jsfgdrmrqqz54dt BHN 🍁 Awww I knew I shouldn't have engaged. I still need to start the show 😆 npub1p5wa26hryppj3ezl0zc6vjkg7pkjyuff7a65j047sn8jsfgdrmrqqz54dt BHN 🍁 I tried to use it for something recently and it failed miserably... npub1p5wa26hryppj3ezl0zc6vjkg7pkjyuff7a65j047sn8jsfgdrmrqqz54dt BHN 🍁 https://image.nostr.build/a4389e1e92bf3b96bd44e03bd80fe2af846ef3ef550ac202ba19de5c5ae4b33e.gif npub1p5wa26hryppj3ezl0zc6vjkg7pkjyuff7a65j047sn8jsfgdrmrqqz54dt BHN 🍁 It tells me using my nsec is insecure 😞 I guess I'll have to skip. npub1p5wa26hryppj3ezl0zc6vjkg7pkjyuff7a65j047sn8jsfgdrmrqqz54dt BHN 🍁 Image-to-Image workflow** npub1p5wa26hryppj3ezl0zc6vjkg7pkjyuff7a65j047sn8jsfgdrmrqqz54dt BHN 🍁 I would recommend ComfyUI, or Automatic111, and ControlNet. Using ControlNet you can use an edge or sketch lora and use that to keep the generation consistent. I would recommend lowering the denoise in the ksampler to something between 0.6-0.8 and see how that goes. npub1p5wa26hryppj3ezl0zc6vjkg7pkjyuff7a65j047sn8jsfgdrmrqqz54dt BHN 🍁 No. If I send a gif using the Samsung keyboard, it opens a new window to upload. I have to copy and paste the link in the original window. I had 4 seperate Amethyst apps open because I kept trying in the new windows 😆 npub1p5wa26hryppj3ezl0zc6vjkg7pkjyuff7a65j047sn8jsfgdrmrqqz54dt BHN 🍁 And a seperate question: is this supposed to happen when replying to people with gifs? https://njump.me/nevent1qqs93xjt4e4haqj0j2dqy04yqxpzy3zk0e6m654msfmxp2w5zl4jd5cprdmhxue69uhhg6r9vehhyetnwshxummnw3erztnrdakj7q3qp5wa26hryppj3ezl0zc6vjkg7pkjyuff7a65j047sn8jsfgdrmrqxpqqqqqqzsraf9l npub1p5wa26hryppj3ezl0zc6vjkg7pkjyuff7a65j047sn8jsfgdrmrqqz54dt BHN 🍁 So the Play Store won't let Amethyst access other folders, but still allows other apps to? What's that about? npub1p5wa26hryppj3ezl0zc6vjkg7pkjyuff7a65j047sn8jsfgdrmrqqz54dt BHN 🍁 I would, but Amethyst won't let me access the meme folder. npub1p5wa26hryppj3ezl0zc6vjkg7pkjyuff7a65j047sn8jsfgdrmrqqz54dt BHN 🍁 I may be misinformed, but I hear his issues with millionaires transitioned to issues with billionaires after he became one. npub1p5wa26hryppj3ezl0zc6vjkg7pkjyuff7a65j047sn8jsfgdrmrqqz54dt BHN 🍁 Allowing other views is clearly the belief of Fascists. The media has told me so for years! npub1p5wa26hryppj3ezl0zc6vjkg7pkjyuff7a65j047sn8jsfgdrmrqqz54dt BHN 🍁 I set my oven to 170f and keep it open for a short while. npub1p5wa26hryppj3ezl0zc6vjkg7pkjyuff7a65j047sn8jsfgdrmrqqz54dt BHN 🍁 Signed up for the Beta on the playstore only to realize there never is one.