if only you knew how good things really are
nick
nick@frostsnap.com
npub1j8d6...26k2
peer-to-peer cash security
wtf did i miss
GM
there are no men on Nostr
The power of bitcoin multisignature must not be overlooked.
It's not just a bit more secure, the power of protecting bitcoin behind multiple keys is truly incredible
πππ
Multisig translates digital security into physical and social security.
With multisig you can introduce geographic separation to protect your bitcoin. It should require effort πΊοΈ, knowledge π§ , and time β³ in order to access your life savings.
Coercion from evil can be rendered fruitless. π‘οΈβοΈ
With multisig you can also introduce social policies, sharing keys with personally selected individuals π€
Offload some of your self-custody responsibility, whilst maintaining understandable security implications and your desired level of self-sovereignty.
Multisig is be one of the most incredible advancements in private property technology since the beginning of human history,
it's time we makes this power accessible.
Frostsnap is busy building this reality.
It's not just a bit more secure, the power of protecting bitcoin behind multiple keys is truly incredible
πππ
Multisig translates digital security into physical and social security.
With multisig you can introduce geographic separation to protect your bitcoin. It should require effort πΊοΈ, knowledge π§ , and time β³ in order to access your life savings.
Coercion from evil can be rendered fruitless. π‘οΈβοΈ
With multisig you can also introduce social policies, sharing keys with personally selected individuals π€
Offload some of your self-custody responsibility, whilst maintaining understandable security implications and your desired level of self-sovereignty.
Multisig is be one of the most incredible advancements in private property technology since the beginning of human history,
it's time we makes this power accessible.

Frostsnap - Bitcoin Security
Take Bitcoin Saving Seriously.
duckduckgo trying to win me over by sending a top result that's a US military equipment login page on some hyper obscure url
some nostr tools i use when developing
Event debugging when you break event serialization or invalid signature:
Sending events to relays:
(would be good nak feature)
```
echo '["EVENT", <EVENT_JSON>]' | nostcat wss://relay.primal.net
```
Occasionally for searching:
nostr web army knife
GitHub
GitHub - blakejakopovic/nostcat: Websocket client for nostr relay scripting
Websocket client for nostr relay scripting. Contribute to blakejakopovic/nostcat development by creating an account on GitHub.
Advanced Nostr Search
Tool to help you find Nostr notes
None of you are ready for this level of airgapped animated QR code security theater


extreme shortage of biblically accurate angel plushies on etsy
Will never forgive the apple people for taking away our gun emojis
# Secure Multi-Party Computation
[excerpt from https://eprint.iacr.org/2002/040.pdf]
"Consider an ideal world in which an external trusted party
is willing to help the parties carry out their computation. An ideal computation takes place in this ideal world by having the parties simply send their inputs to the trusted party, who then computes the desired function and passes each party its prescribed output.
Notice that all of the following security properties (and more) are ensured in such an ideal computation:
- Privacy: No party should learn anything more than its prescribed output. That is, the only information that should be learned about other partiesβ inputs is what can be derived from the output itself.
- Correctness: Each party is guaranteed that the output that it receives is correct.
- Independence of Inputs: The corrupted parties must choose their inputs independently of the honest partiesβ inputs.
- Guaranteed output delivery: Corrupted parties should not be able to prevent honest parties from receiving their output. In other words, the adversary should not be able to carry out a denial of service attack.
- Fairness: Corrupted parties should receive their output if and only if honest parties do.
The security of a real protocol is established by comparing the outcome of the protocol to the outcome of an ideal computation. Specifically, a real protocol that is run by the parties (in a world where no trusted party exists) is said to be secure, if an adversary controlling a coalition of corrupted parties can do no more harm in a real execution that in the above ideal execution.
Since the adversary is unable to cause any harm in an ideal execution, this means that security is also guaranteed in a real protocol execution.
We remark that the above informal description is βoverly idealβ in the following sense. It is a known fact that unless an honest majority is assumed, it is impossible to obtain generic protocols for secure multi-party computation that guarantee output delivery and fairness"
From Secure Multi-Party Computation Without Agreement, Goldwasser & Lindell
ππππππππππππππππ
πNOSTR IS THE REAL BIRDAPPπ
ππππππππππππππππ
π₯ CHICKEN LIVESTREAM AVATARS - ONLY ON NOSTR π₯
ππππππππππππππππππππππ
CHICKEN LIVESTREAM NOSTR AVATAR IS REAL
π€π€π€π€π€π€π€π€π€π€π€π€π€π€π€π€π€π€π€π€π€π€
reply with π or π if you see one move in my nostr avatar
NO FU CKING WAY I HAVE A CHICKEN LIVESTREAM AS MY PROFILE PIC
searching for my mate's nostr account
australian war hero/criminal themed lmk if you see it