nick's avatar
nick
nick@frostsnap.com
npub1j8d6...26k2
peer-to-peer cash security
nick's avatar
nick 1 year ago
if only you knew how good things really are
nick's avatar
nick 1 year ago
wtf did i miss GM
nick's avatar
nick 1 year ago
there are no men on Nostr
nick's avatar
nick 1 year ago
The power of bitcoin multisignature must not be overlooked. image It's not just a bit more secure, the power of protecting bitcoin behind multiple keys is truly incredible πŸ”’πŸ”’πŸ”’ Multisig translates digital security into physical and social security. With multisig you can introduce geographic separation to protect your bitcoin. It should require effort πŸ—ΊοΈ, knowledge 🧠, and time ⏳ in order to access your life savings. Coercion from evil can be rendered fruitless. πŸ›‘οΈβš”οΈ With multisig you can also introduce social policies, sharing keys with personally selected individuals 🀝 Offload some of your self-custody responsibility, whilst maintaining understandable security implications and your desired level of self-sovereignty. Multisig is be one of the most incredible advancements in private property technology since the beginning of human history, it's time we makes this power accessible. Frostsnap is busy building this reality.
nick's avatar
nick 1 year ago
duckduckgo trying to win me over by sending a top result that's a US military equipment login page on some hyper obscure url
nick's avatar
nick 1 year ago
some nostr tools i use when developing Event debugging when you break event serialization or invalid signature: Sending events to relays: (would be good nak feature) ``` echo '["EVENT", <EVENT_JSON>]' | nostcat wss://relay.primal.net ``` Occasionally for searching:
nick's avatar
nick 1 year ago
None of you are ready for this level of airgapped animated QR code security theater image
nick's avatar
nick 1 year ago
extreme shortage of biblically accurate angel plushies on etsy
nick's avatar
nick 1 year ago
Will never forgive the apple people for taking away our gun emojis
nick's avatar
nick 1 year ago
# Secure Multi-Party Computation [excerpt from https://eprint.iacr.org/2002/040.pdf] "Consider an ideal world in which an external trusted party is willing to help the parties carry out their computation. An ideal computation takes place in this ideal world by having the parties simply send their inputs to the trusted party, who then computes the desired function and passes each party its prescribed output. Notice that all of the following security properties (and more) are ensured in such an ideal computation: - Privacy: No party should learn anything more than its prescribed output. That is, the only information that should be learned about other parties’ inputs is what can be derived from the output itself. - Correctness: Each party is guaranteed that the output that it receives is correct. - Independence of Inputs: The corrupted parties must choose their inputs independently of the honest parties’ inputs. - Guaranteed output delivery: Corrupted parties should not be able to prevent honest parties from receiving their output. In other words, the adversary should not be able to carry out a denial of service attack. - Fairness: Corrupted parties should receive their output if and only if honest parties do. The security of a real protocol is established by comparing the outcome of the protocol to the outcome of an ideal computation. Specifically, a real protocol that is run by the parties (in a world where no trusted party exists) is said to be secure, if an adversary controlling a coalition of corrupted parties can do no more harm in a real execution that in the above ideal execution. Since the adversary is unable to cause any harm in an ideal execution, this means that security is also guaranteed in a real protocol execution. We remark that the above informal description is β€œoverly ideal” in the following sense. It is a known fact that unless an honest majority is assumed, it is impossible to obtain generic protocols for secure multi-party computation that guarantee output delivery and fairness" From Secure Multi-Party Computation Without Agreement, Goldwasser & Lindell
nick's avatar
nick 1 year ago
πŸ”πŸ”πŸ”πŸ”πŸ”πŸ”πŸ”πŸ”πŸ”πŸ”πŸ”πŸ”πŸ”πŸ”πŸ”πŸ” πŸ”NOSTR IS THE REAL BIRDAPPπŸ” πŸ”πŸ”πŸ”πŸ”πŸ”πŸ”πŸ”πŸ”πŸ”πŸ”πŸ”πŸ”πŸ”πŸ”πŸ”πŸ” πŸ₯ CHICKEN LIVESTREAM AVATARS - ONLY ON NOSTR πŸ₯
nick's avatar
nick 1 year ago
πŸ”πŸ”πŸ”πŸ”πŸ”πŸ”πŸ”πŸ”πŸ”πŸ”πŸ”πŸ”πŸ”πŸ”πŸ”πŸ”πŸ”πŸ”πŸ”πŸ”πŸ”πŸ” CHICKEN LIVESTREAM NOSTR AVATAR IS REAL 🐀🐀🐀🐀🐀🐀🐀🐀🐀🐀🐀🐀🐀🐀🐀🐀🐀🐀🐀🐀🐀🐀
nick's avatar
nick 1 year ago
reply with πŸ” or πŸ€ if you see one move in my nostr avatar
nick's avatar
nick 1 year ago
NO FU CKING WAY I HAVE A CHICKEN LIVESTREAM AS MY PROFILE PIC
nick's avatar
nick 2 years ago
searching for my mate's nostr account australian war hero/criminal themed lmk if you see it
↑