AilliA

Zero-JS Hypermedia Browser

avatar
AilliA
AilliA@aillia.link
npub1ajll...d9u3
I believe that anything that is not voluntary is coercion. This makes me a voluntaryist in earthly terms and an alien on Earth, where coercion is normalized. #Monero: 86VSR7QowFkiqxsvZrW9w6B1WLtCBpQEgjFVWW1sCyHE14ivHXfZoAeQWpGn5EKbcs4Z3sV5T2Vfie5bY5pSykg97vJXpRA

Notes (20)

"The internet is a bad idea." - Newspapers "Uber is a bad idea." - Taxis "Airbnb is a bad idea." - Hotels "Monero is a bad idea." - States "Freedom is a bad idea." - NPCs
2025-11-18 21:38:05 from 1 relay(s) View Thread →
image nostr:nevent1qvzqqqqqqypzpm9ll96cg9m9ttvt5y3ancydvrtkwpza5gj89m0gdnl236dze5tuqy0hwumn8ghj7mn0wd68ytnnv46xsen0wfc8y6tkv93hjtnrdakj7q2ywaen5te0dau8gunyv4mxza3kx3arvdrevgmhsdnjdfnngmn50fck56r9v3kn2c340f48zatvw4nkkmng0fergdnw0ye8zcnpvshx7mnfdahz7qpqd6wtcavhuacvew58s5vt8udumnycteunj5j4600kmp933emvvq7sc476cq
2025-11-17 18:45:20 from 1 relay(s) View Thread →
Now it gets too ridiculous: https://x.com/AilliaLink account is fully suspended again (after they themselves restored it after review!) for "inauthentic behavior": and this time it was an already restricted account that she wasn't even able to use to "behave" AT ALL! Apparently, doing nothing because your account is restricted (and you can't really do anything!!!) is also considered 'inauthentic behavior'... image
2025-11-13 22:21:40 from 1 relay(s) View Thread →
Frogs cannot sense a slow change in the temp of the water around them. If you plunge them into boiling water they'll immediately jump out. But if you place them into room temperature water and slowly heat it to boiling, the frog won't notice and will slowly cook to death. The End. https://x.com/realUrbanHacker/status/1988882930249203980 image image image
2025-11-13 18:30:38 from 1 relay(s) View Thread →
Congratulations nostr:npub1nu78yt3grwq7jdp0twz56ral4ez6s2xx9zt96yjz8p89grvmzu5sdwndfa, winner of the 0.25 Monero hidden inside my Steganography 101: Hiding Wallet Seeds in Plain Sight article! 🏆 It was such a fun burst of impromptu thinking on my part: While writing (VTT-ing) a reply to that XMRChat question about nostr:npub1w3lka39nep7zv4vtq9hlckkz3pkpsxxp0ss25l02d78hgt9xjffsjh83kx 's Cards, I wondered: what might a pinprick analogue look like in this (rather limited!) Substack editor? Then, as I was writing about foreign/ancient languages, I remembered homoglyphs... it was a fun moment! So I tossed words with homoglyphs in reverse order into the article, because I knew it'd otherwise be a zero-shot giveaway for AI (that's exactly how I double-checked myself to ensure I hadn't missed a single word 😜 ). image nostr:nevent1qvzqqqqqqypzpm9ll96cg9m9ttvt5y3ancydvrtkwpza5gj89m0gdnl236dze5tuqy0hwumn8ghj7mn0wd68ytnnv46xsen0wfc8y6tkv93hjtnrdakj7q2ywaen5te0dau8gunyv4mxza3kx3arvdrevgmhsdnjdfnngmn50fck56r9v3kn2c340f48zatvw4nkkmng0fergdnw0ye8zcnpvshx7mnfdahz7qpqvh7g805parmeh0ylt64khc4edn7ztev209rrgjndeanadh6j66xqse67gs
2025-11-12 14:36:56 from 1 relay(s) View Thread →
I am in crypto for this. image
2025-11-09 18:16:51 from 1 relay(s) View Thread →
You really should read the cypherpunk manifesto. A Cypherpunk's Manifesto by Eric Hughes Privacy is necessary for an open society in the electronic age. Privacy is not secrecy. A private matter is something one doesn't want the whole world to know, but a secret matter is something one doesn't want anybody to know. Privacy is the power to selectively reveal oneself to the world. If two parties have some sort of dealings, then each has a memory of their interaction. Each party can speak about their own memory of this; how could anyone prevent it? One could pass laws against it, but the freedom of speech, even more than privacy, is fundamental to an open society; we seek not to restrict any speech at all. If many parties speak together in the same forum, each can speak to all the others and aggregate together knowledge about individuals and other parties. The power of electronic communications has enabled such group speech, and it will not go away merely because we might want it to. Since we desire privacy, we must ensure that each party to a transaction have knowledge only of that which is directly necessary for that transaction. Since any information can be spoken of, we must ensure that we reveal as little as possible. In most cases personal identity is not salient. When I purchase a magazine at a store and hand cash to the clerk, there is no need to know who I am. When I ask my electronic mail provider to send and receive messages, my provider need not know to whom I am speaking or what I am saying or what others are saying to me; my provider only need know how to get the message there and how much I owe them in fees. When my identity is revealed by the underlying mechanism of the transaction, I have no privacy. I cannot here selectively reveal myself; I must always reveal myself. Therefore, privacy in an open society requires anonymous transaction systems. Until now, cash has been the primary such system. An anonymous transaction system is not a secret transaction system. An anonymous system empowers individuals to reveal their identity when desired and only when desired; this is the essence of privacy. Privacy in an open society also requires cryptography. If I say something, I want it heard only by those for whom I intend it. If the content of my speech is available to the world, I have no privacy. To encrypt is to indicate the desire for privacy, and to encrypt with weak cryptography is to indicate not too much desire for privacy. Furthermore, to reveal one's identity with assurance when the default is anonymity requires the cryptographic signature. We cannot expect governments, corporations, or other large, faceless organizations to grant us privacy out of their beneficence. It is to their advantage to speak of us, and we should expect that they will speak. To try to prevent their speech is to fight against the realities of information. Information does not just want to be free, it longs to be free. Information expands to fill the available storage space. Information is Rumor's younger, stronger cousin; Information is fleeter of foot, has more eyes, knows more, and understands less than Rumor. We must defend our own privacy if we expect to have any. We must come together and create systems which allow anonymous transactions to take place. People have been defending their own privacy for centuries with whispers, darkness, envelopes, closed doors, secret handshakes, and couriers. The technologies of the past did not allow for strong privacy, but electronic technologies do. We the Cypherpunks are dedicated to building anonymous systems. We are defending our privacy with cryptography, with anonymous mail forwarding systems, with digital signatures, and with electronic money. Cypherpunks write code. We know that someone has to write software to defend privacy, and since we can't get privacy unless we all do, we're going to write it. We publish our code so that our fellow Cypherpunks may practice and play with it. Our code is free for all to use, worldwide. We don't much care if you don't approve of the software we write. We know that software can't be destroyed and that a widely dispersed system can't be shut down. Cypherpunks deplore regulations on cryptography, for encryption is fundamentally a private act. The act of encryption, in fact, removes information from the public realm. Even laws against cryptography reach only so far as a nation's border and the arm of its violence. Cryptography will ineluctably spread over the whole globe, and with it the anonymous transactions systems that it makes possible. For privacy to be widespread it must be part of a social contract. People must come and together deploy these systems for the common good. Privacy only extends so far as the cooperation of one's fellows in society. We the Cypherpunks seek your questions and your concerns and hope we may engage you so that we do not deceive ourselves. We will not, however, be moved out of our course because some may disagree with our goals. The Cypherpunks are actively engaged in making the networks safer for privacy. Let us proceed together apace. Onward. Eric Hughes <hughes@soda.berkeley.edu> 9 March 1993 https://activism.net/cypherpunk/manifesto.html image
2025-11-09 17:56:32 from 1 relay(s) View Thread →
You build atomic bombs, you wage wars, you murder, cheat, and lie to us and try to make us believe it's for our own good, yet we're the criminals. https://phrack.org/issues/7/3
2025-11-08 16:37:10 from 1 relay(s) View Thread →
=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-= The following was written shortly after my arrest... \/\The Conscience of a Hacker/\/ by +++The Mentor+++ Written on January 8, 1986 =-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-= Another one got caught today, it's all over the papers. "Teenager Arrested in Computer Crime Scandal", "Hacker Arrested after Bank Tampering"... Damn kids. They're all alike. But did you, in your three-piece psychology and 1950's technobrain, ever take a look behind the eyes of the hacker? Did you ever wonder what made him tick, what forces shaped him, what may have molded him? I am a hacker, enter my world... Mine is a world that begins with school... I'm smarter than most of the other kids, this crap they teach us bores me... Damn underachiever. They're all alike. I'm in junior high or high school. I've listened to teachers explain for the fifteenth time how to reduce a fraction. I understand it. "No, Ms. Smith, I didn't show my work. I did it in my head..." Damn kid. Probably copied it. They're all alike. I made a discovery today. I found a computer. Wait a second, this is cool. It does what I want it to. If it makes a mistake, it's because I screwed it up. Not because it doesn't like me... Or feels threatened by me... Or thinks I'm a smart ass... Or doesn't like teaching and shouldn't be here... Damn kid. All he does is play games. They're all alike. And then it happened... a door opened to a world... rushing through the phone line like heroin through an addict's veins, an electronic pulse is sent out, a refuge from the day-to-day incompetencies is sought... a board is found. "This is it... this is where I belong..." I know everyone here... even if I've never met them, never talked to them, may never hear from them again... I know you all... Damn kid. Tying up the phone line again. They're all alike... You bet your ass we're all alike... we've been spoon-fed baby food at school when we hungered for steak... the bits of meat that you did let slip through were pre-chewed and tasteless. We've been dominated by sadists, or ignored by the apathetic. The few that had something to teach found us will- ing pupils, but those few are like drops of water in the desert. This is our world now... the world of the electron and the switch, the beauty of the baud. We make use of a service already existing without paying for what could be dirt-cheap if it wasn't run by profiteering gluttons, and you call us criminals. We explore... and you call us criminals. We seek after knowledge... and you call us criminals. We exist without skin color, without nationality, without religious bias... and you call us criminals. You build atomic bombs, you wage wars, you murder, cheat, and lie to us and try to make us believe it's for our own good, yet we're the criminals. Yes, I am a criminal. My crime is that of curiosity. My crime is that of judging people by what they say and think, not what they look like. My crime is that of outsmarting you, something that you will never forgive me for. I am a hacker, and this is my manifesto. You may stop this individual, but you can't stop us all... after all, we're all alike. +++The Mentor+++ https://phrack.org/issues/7/3 image
2025-11-08 16:21:54 from 1 relay(s) View Thread →
"Writing code shouldn’t carry a harsher sentence than laundering millions" is harmful rhetoric within the "allowed spectrum of opinions." I'll simplify it for you: WRITING CODE SHOULDN'T CARRY ANY SENTENCE! Period. Code is speech. image
2025-11-08 15:46:44 from 1 relay(s) View Thread →
#Monero's Real NGU: 10K GitHub Stars & Counting 🚀 image
2025-11-07 22:51:30 from 1 relay(s) View Thread →