Tim Bouma's avatar
Tim Bouma
trbouma@safebox.dev
npub1q6mc...x7d5
| Independent Self | Pug Lover | Published Author | #SovEng Alum | #Cashu OG | #OpenSats Grantee x 2| #Nosfabrica Prize Winner
Tim Bouma's avatar
Tim Bouma 38 mins ago
2026 consists of 2 primes: 2 and 1013. Incredible to think that this prime combination of 2 and 1013 will never happen again. Carpe Annum!
Tim Bouma's avatar
Tim Bouma yesterday
This was my initial requirements analysis for #nostr #safebox image
Tim Bouma's avatar
Tim Bouma yesterday
Your Cognitive Warfare Bingo Card for 2026 image
Tim Bouma's avatar
Tim Bouma yesterday
“The whole secret lies in confusing the enemy, so that he cannot fathom our real intent.” - Sun Tzu on the Art of War
Tim Bouma's avatar
Tim Bouma yesterday
"Banking apps can now read which apps you have installed and also from where. You installed something they don't like? Sorry, can't access your money until you stop your wrongthinking. We are entering the dark ages of technology." Source: Twitter image
Tim Bouma's avatar
Tim Bouma yesterday
Awesome article by @Max ! What might not be apparent is that there are many of us who are studying ancient, classic and medieval protocols because they actually worked so well before the active intervention by the State. We are working hard to revitalize these olden ways using the latest cryptographic protocols of #Bitcoin, #Lightning, #Nostr and #Cashu. That is the whole point of #nostr #safebox - to bring back the old ways of doing things (between clans, communities and networks), without need of any far and distant authority. Your money. Your records. No state required. View quoted note →
Tim Bouma's avatar
Tim Bouma yesterday
Prolly nothin' but now I have all the pieces in place for a decentralized record-sharing/credential issuance and verification system which IMHO is hands down more secure and less capturable than anything out there. You'll see the four steps of verification (I call acceptance) 1. Cryptographic validation 2. Attestation by Issuer/Owner 3. Presentation Verification (credential is not hijacked by another user) 4. Trusted (Is the issuer part of a recognized authority list). All of the above is cryptographically verifiable and decentralized so organizations can get on with business of trust and verification without worry of being captured by a state or vendor. This is all built into #nostr #safebox using the #nostr protocol. More to come!! #WoTathon
Tim Bouma's avatar
Tim Bouma 2 days ago
My eventual goal for #nostr #safebox (once I have the core stabilized) is to communicate everything via NIP-59/44 using JSON RPC. I have this implemented for private payments and record-sharing but plan to make all app functionality only accessible via JSON RPC. View quoted note →
Tim Bouma's avatar
Tim Bouma 2 days ago
If you’ve read the book or seen the original movie, you know exactly what this means. #papillon image
Tim Bouma's avatar
Tim Bouma 2 days ago
“Wholeness beats goodness.” Carl Jung. Don’t ask yourself if what you are building is good. Rather, ask yourself, is it whole, or better, is it part of a larger whole.