To be safe online, i am no longer running a browser. The arbitrary data downloaded by the browser exposes me to legal risks.
Login to reply
Replies (31)
Yeah but the State isn't fighting against browsers because they use them too and it's too far gone for them to try and control them and they know that so I think you're okay. I can think of something that only fits it being too far gone to control but they haven't figured out they probably won't be able to control it.
Also GM
So what are you using? Straight pipelining to your brain?
Certain things are for things and not for others. Run an I2P node, not a TOR node because of risk. Run your own NAS not a centralized data service because of risk. Run a money node that filters data instead of a money node that doesn't because of risk. This was known until 5 minutes ago.
Define 'data'
Elon's chip, ofc
Pro tip: don’t own anything metal, it could receive unwanted radio transmissions
Well, in the sentence I used above I juxtaposed data with money. Money is the data of human action. But the money to which I am referring has an accounting method that using the signing of messages constructed of addresses, and amounts. The signature itself part of the accounting as well.
So, while it may seem clever to say money is data this is about as relevant as saying a square IS a rectangle. Then when building something specifically designed for shapes longer than they are wide using nothing but squares.
The nuance is obvious if not trying to be obtuse.
How do I know a valid signature?
Valid is defined by the accounting protocol.
How?
Give me the simplest example of how it's done, please.
All the data that is part of the accounting protocol. Is any of it 'random'?
Like this 

What do the letters mean? Maybe break down each one
Plastic only in this house 😂
s= the y coordinate of the curve
z= the hash of the txn data
G= the generator point of the curve
r= is the private key
Q= is the public key
R= is the signature.
Nice! So all data for this accounting system has a signature?
Yes.
How will I recognize these individual data points in the accounting protocol so I might arrange them in the correct order for the equation?
Are we really about to walk through byte order to illustrate some point you are making instead of just making the point?
Huh. This one doesn't seem to have a signature on it. Maybe I missed it.


The Mempool Open Source Project®
Explore the full Bitcoin ecosystem with The Mempool Open Source Project®. See the real-time status of your transactions, get network info, and more.
Tell me how to differentiate between 32bytes of arbitrary data and a valid pubkey.
Dude. There's no unlocking script on coinbase Txns but do you see that little thing that says "Scriptsig" what do you think "sig" means?
You're telling me that's a signature here?
The null witness is the signature.
How does that fit your equation from before?
Try to think, what would make the equation from before correct if the R value is zero...
So I can just use 0 for everything. Neat!
Please do.
