Intelligence metric: epistemological dynamic range. Measure how far a person can understand the world in terms of abstractions, while also grounding such knowledge in terms of concretes. The metric is not scalar. One dimension is in the meta direction. Another is breadth across domains (analogs).
Ben Eng
ben@www.jetpen.com
npub1pv0p...mmng
Applied cosmology toward machine precise solutions to replace humans with autonomous systems in all domains.
@TheGuySwann topic suggestion: for the many types of wallets and devices that you talk about, what is the role or function each of them plays in terms of the uses cases and journeys that a typical person would experience? Jade, Bitkit, Fold, Nunchuk, etc. It's hard to understand how each of them fits with the other, and why you'd use them in conjunction.
Fiat slogan: fux the money, fux the world.
I think I must be a total LN dumbass. When Satoshi Wallet was working, everything was flawlessly easy. It gave me an email-like address, and zaps to it just worked. When it was shut down, I started using Cashapp, it shows a bc1q address and a lnbc address for receiving BTC. However, I just realized the lnbc address changes with every transaction for privacy, and maybe it even expires after some time. Cashapp doesn't give me an email-like address for LN. Or does it? This is so confusing.
Is Primal superior to Amethyst on Android? I should give it a try.
I'm not a proponent of Apple iPhone. However, as an Android user while the rest of the family uses iPhones, I feel like I have a much higher rate of fat-fingering when using GBoard. Apple's virtual keyboard accuracy is far superior.
Worth contemplating: what 'checks and balances' exist in our system of government to counter abusing classification of data to hide wrongdoing?
«One day you discovered you'd learned a cartoon version of Lincoln in school. Not the man who favored an amendment to the Constitution forever preventing the federal government from abolishing slavery»
Our culture and societal cohesion relies on a shared understanding of history as a collection of false but believable myths. Myths are formed from idealized stories retold to essentialize some moral principle or some virtuous characteristics that inspire us. Of course, the noble goal of freeing the slaves motivated our nation to transform itself. This is one element that binds us proudly in fraternity, because we are a part of a great improvement in society. We are built on myths to fuel our virtues, such as courage and valor. We look back to the precursors to our society, such as the 300 Spartans who stood bravely against the vast Persian army of Xerces. Their battle cry Molṑn Labé defied the enemy to come take their cannons and semiautomatic rifles, as it does today for us.
The moment you realized they were lying to you
Did the value of all NFTs crash to zero yet? And everyone moved on without anyone noticing?
If there was ever any doubt that Jack was in favor or tolerant of establishment censorship and narrative control using Twitter, we now see that Bluesky is in full-on censorship mode to suppress such opinions as "trans-women are men" and to suspend accounts who engage in such speech.
@TheGuySwann I just heard your rant about Pear Drive. A quick search failed to find any trace of the project and its source repository. Is it not open source?

Spotify
Read_854 - Guerilla Open Access Manifesto
Bitcoin Audible · Episode
In today's climate of lawfare and the routine weaponization of “Show me the man and I'll show you the crime” (Beria's law), one should judge defendants accordingly. If someone is charged or convicted of crimes, ask who was the victim and what rights were violated? The state or a state agency or office has no legitimate standing to be a victim, because the state has no rights (only enumerated powers).
The corollary to this is that unjust and immoral laws are also illegitimate. It is our duty to violate them. This includes laws that violate free speech, free expression, free association, privacy, and private property. This includes KYC, AML, surveillance, and lawful intercept.
Are there independent journalists on Nostr publishing current events and breaking news? To me that is the next gap to fill for Nostr to actually replace Twitter as the primary social media site, next to having a friends network that includes one's favorite people to follow.
@Guy Swann Maybe good idea to purchase a cheap GoPro-like device that you can covertly record the activity at the hotel room entry, while you are not present. Then, you never need to rely solely on hotel security cams.
I would like to see Gordon Brander's article reframed in terms of Consistency Availability Partitioning tolerance (CAP theorem = Brewer's theorem).
Article:
Guy's Read: 
Nature's many attempts to evolve a Nostr | MyHub.AI
Spotify
Read_852 - Nature's Many Attempts to Evolve a Nostr
Bitcoin Audible · Episode
"AI is going to replace your job" is equivalent to saying "power tools are going to replace your job".
Censorship resistance is necessarily traded off with privacy? You cannot have both? This is the first I've heard of this.

Spotify
Guy's Roundtable_002 - Conbase, Control, The Nature of Privacy, and Decentralized Mining
Bitcoin Audible · Episode
On a Bitcoin standard, the volatility is always zero. One BTC is always valued at one BTC. That will never change.
The more times that I revisit my formulation of rights, the more confident I am in it. I truly believe I have added an essential component to this understanding, which was missing previously. That element is 'mutual recognition', a specialization of 'reciprocity'. The latter concept is also helpful in understanding the proper response to violation of rights.


There is no box - Insights into innovation
Revisiting the definition of rights - There is no box
My derivation of rights provides the most consistent definition when applied to abortion, self-defense, criminal justice, and the death penalty.
I use Signal to chat with some acquaintances. I don't really believe it is secure in terms of privacy. It may implement some form of encryption. It may offer some form of authentication and data integrity. These measures may be an improvement over other messaging technologies.
However, I don't remember ever generating a private key to use in Signal. I don't have custody of a private key that I control and keep safe and private. Therefore, I can only assume, not my keys, not my privacy.