owl flight's avatar
owl flight
npub1p86d...t8dm
There are obviously fewer people on nostr, but there is actually already a pretty good amount of worthwhile content. The thought density is pretty high. Also, there is only so much writing you can consume in a day. It's like living in Austin. They say NYC has more by way of culture, but I don't have time to attend even just a small fraction of what's on offer here in Texas, so it doesn't matter.
A reason I never participated in other social media was that I would have felt that I was giving away the content I produced for free to someone else, and that my work product somehow becomes branded (e.g. as twitter or facebook content). With nostr, there is no such someone else, or at least no identifiable single such entity. The content is published, but is no feeling of my having lost ownership.
This is the first social media platform that may be worth my time. Because it's not a platform.
Nostr is so fascinating it's preventing me from leaving my room and getting some sun.
To answer this, there was a "toggle replies" button at the top of the page in noStrudel. When this is activated, replies are shown and each note indicates whether or not it is a reply to another note. View quoted note →
Also: Is there any way to tell whether a note was written as a reply to another note?
It would be nice, though, to know that the "reactions" mean. For example, if I click the "fire" icon, does this mean that I think the post is hot, or that I think it should be consigned to the flames? View quoted note →
So when I click on a note in my timeline, it unfolds and shows replies. After unfolding, there is also a number displayed at the top of the original note that appears to be counting the replies and sub-replies. However, as far as I can tell, before unfolding there is nothing in the original note that indicates whether it has any replies attached to it, or how many. Is there a reason for the number of replies not being shown before unfolding? Is it necessary to click on a note to see whether it has any replies or not? I'm using the web client noStrudel. Maybe this would work differently in another client?
I set the display color mode to dark and the primary color to blue in the nostrudel web client. However, these settings don't seem to be persistent. The next time I log in, the colors are back to light and green.
So to follow through with the idea described below, here is my "backup" public key: @npub1n2sa...dpgq Just to be clear, I'm not currently using this public key. I'm just handing it out so that, in case my current private key is compromised, I can use the above public key to let people know that they should no longer trust messages signed with the compromised private key. View quoted note →
Now to do generate the backup keypairs securely would require the ability to generate keypairs offline (preferably on an airgapped system), but as I mentioned above I haven't been able to figure out how to do this - in particular, I haven't yet figured out how to generate a public key from a private key in a place that's sufficiently distant from the internet.
The idea was to broadcast all of the public keys to the world and let people know that, if my current private key is compromised, I will use the other "backup" private keys to sign messages letting everyone know that my initial private key has been compromised and that I disavow the initial key and anything that's done with it.
With a view to this, I thought about creating additional keypairs at the time I create my identity, with one keypair intended for immediate use and the other keypairs intended to be stored securely offline in my basement and to be used only for recovery in case the first keypair gets compromised.
Now if my password for twitter (or whatever they call it) is stolen, I can convince the twitter team that I am me and have it reset and things will be fine. Not an option here. If my private key is comporomised, my only choice is to publiclty disavow the compromised private key and anything that may be done with it, get a new private key, and re-establish my identity by convincing everyone that I'm the same person as the one who used to control the compromised private key.
But that then means that, over the long term (say over a 10-year use period), there is a pretty high probability that the private key will get compromised at some point.
Ideally I'd want to sign events on an airgapped system, but that seems impractical if I'm to use nostr for everyday social networking. The private key will, at least sometimes, have to be pasted into various applications, browser extensions, etc., with all of this taking place on internet-connected systems.