cmd's avatar
cmd
cmd@proof0.work
npub1gg5u...ulq3
I build cool stuff on bitcoin and nostr.
cmd's avatar
cmd 7 months ago
this is absolutely wild! being able to transfer entangled quantum states across existing fiber-optic cables is a game-changer. There's a lot of interesting things you can do with entanglement and tweaking the phase of qbits if you have access to a quantum computer (like IBM and quikset). But I didn't think much of it because you had to physically transfer the state of your qbits over a distance, which at the time was not possible except for space lasers. https://www.nature.com/articles/s41586-025-08801-w
cmd's avatar
cmd 7 months ago
Signer extensions are dead to me. Absolute dead-end for storing keys. They are the worst security nightmare. They don't exist on mobile. Browsers can't even agree on a spec. Time to rebuild the web3 promise with NIP-46 and PWA. It's so obvious. It just works. The age of nostr-RPC interfaces will be glorious.
cmd's avatar
cmd 7 months ago
We got a lot of good things cooking for frostr, y'all are gonna love it. PWA release is priority #1.
cmd's avatar
cmd 7 months ago
What would a dating app on nostr look like? Some ideas: * use range proofs to obfuscate certain attributes like height/weight/age while still allowing for filtering and search * photos and personal info can be encrypted/decrypted using gift-wrapping techniques to obscure the original npubs that are behind each profile. * maybe something interesting can be done with lists and hash collisions? Similar interests would cause higher colission rates while obfuscating the list from brute-force searches. Also what would be the down-sides? Privacy concerns?
cmd's avatar
cmd 7 months ago
yo @zap.stream your service is great but how do I run a private stream? i.e link only, unannounced on the front page
cmd's avatar
cmd 8 months ago
I believe you can have both privacy and a provably spendable output, by extending P2TR a little bit. Part 1: Preimage. Part 2: Internal pubkey. Script Output: Hash the preimage, and use it to tweak the pubkey. This key goes in the script, similar to taproot. When relaying: Provide the hash + internal pubkey + signature for proof of validity. When spending: Provide the preimage + internal pubkey + signature for proof of custody. By requiring the pre-image for spending, you also make it relatively quantum resistant (similar to p2pkh). The downside is that it costs slightly more to spend, since you must publish the preimage in addition to the pubkey and signature
cmd's avatar
cmd 8 months ago
Simple explanation of how (the FROSTR protocol) works: image
cmd's avatar
cmd 9 months ago
they are putting AI generator models on the internet that are turning the freaking memes ghibli image
cmd's avatar
cmd 9 months ago
what is the rate limit on the damus relay? "you are noting too much" how much is too much? ๐Ÿ˜ญ
โ†‘