I wish there were a way to mute price talk.
My 100k mute doesn't work anymore...
Max
max@towardsliberty.com
npub1klkk...x3vt
Praxeologist ~ Cryptoanarchist ~ Cypherpunk
nostr:naddr1qqgrvvpjx33kgvtrxgen2vfcvcurjqghwaehxw309aex2mrp0yhxz7n6v9kk7tnwv46z7q3qklkk3vrzme455yh9rl2jshq7rc8dpegj3ndf82c3ks2sk40dxt7qxpqqqp65wvem775
Urban renewal displaces the poor. Demolishing neighborhoods for “development” benefits politicians and contractors, worsening housing scarcity for low-income families.
Revealing too much invites control. Privacy isn’t silence, it’s the refusal to let others script your story. Cryptographic tools let us speak without surrendering the right to be heard by only those we choose.
Zap @Yuki Kishimoto some for his amazing work on rust-nostr, and maybe we get @Amber support to @White Noise a bit sooner!

GitHub
Add Android Signer implementation (NIP-55) by yukibtc · Pull Request #973 · rust-nostr/nostr
Closes #938
@Keychat how to best chat with your devs?
Anonymous markets don’t require moral decay, they require accountability. When identity is optional, the only thing that matters is whether you honor your word. Trust becomes a skill, not a privilege.
Coercion dies where anonymity thrives.
When everyone can hide, power shifts to those who create rather than those who command.
build build build build build build build
The networks we build today are the fortresses of tomorrow’s freedom.
The internet’s early idealism wasn’t naive, it was premature. Now, with tools to protect privacy and enable trust without third parties, the dream of a self-governed digital society is no longer theoretical. It’s operational.
Appstores cannot be obsolete fast enough.
Cryptography doesn’t just protect secrets; it protects agency. When you control who sees your data, you control who controls your life.
@greenart7c3 would be great if @Amber has more than one relay by default, nsec.app doesn't seem to be the most reliable, and bunkers just fail silent without an obvious error.
Anonymity isn’t the end of trust, it’s the beginning of verifiable trust. When you can’t rely on names, you rely on cryptographic guarantees. The weak cling to surveillance; the strong build alternatives.
