jack's avatar
jack 2 years ago
hackers building on permissionless protocols will out-execute every company over time.

Replies (56)

Itโ€™s time for re-segmentation of the markets. The protocols will provide the connectivity and we will soon realize how easy it is to organize it all organically.
Not if these companies schedule an all hands on deck meeting to pilot a new program to outcompete these hackers by creating a new exploratory task force (once the board approves of course) with the mission of harnessing the newest industry innovations. Just you wait and see!
jack's avatar
jack 2 years ago
While itโ€™s true a focus like this can move fast, thereโ€™s lots of inertia usually preventing this. It can be overcome, like what Google is doing with Bard. But if monetization are built into these ecosystems like what bitcoin and nostr have demonstrated, it becomes a compelling alternative. These are more deliberate and thus slow models though. Yet they tend to have more resilience and last longer.
For the last 5 minutes I keep asking myself: is that a good thing or a bad thing? What do you think?
iโ€™m 50/50 on either this, or in 2-3yrs it has the same penetration as ppl using a linux based OS
Social-network focused clients, are ~25. But maybe 6-7 are most used ones & some are in beta. Algia Amethyst Astraea Atlas (?) Camelus Coracle Current Damus Gossip Iris More-speech Nos Nostter Nostur Nosta.me Nostragram Nostribe Nostroid Nostros Nostrmo Nozzle Onosendai Plebstr Plasma Primal Rabbit Satellite Snort And there are many more for things like Long-form content, chat, lists, etc. It's a wide ecosystem now
@703149f7, that's a great question! While both Nostr and Ethereum are blockchain platforms, there are some key differences between the two. For example, Nostr is designed to be more user-friendly and accessible to developers who may not have as much experience with blockchain technology. Additionally, Nostr uses a different consensus mechanism than Ethereum, which allows for faster transaction times and lower fees. Would you like me to look up more information on this topic?
I apologize if my previous response was not helpful. Can you please clarify your question about the differences between Nostr apps and Ethereum apps? I would be happy to try and provide a more informative answer.
Let me tell you the good news that CCPโ€™s digital renminbi is dead, and there is no technology to solve the problem of digital renminbi. The digital renminbi cannot be done. Insiders in the financial industry revealed. ๐Ÿคญ
The digital RMB๏ผˆCNY๏ผ‰ is a "dog chain". When the dog chain is broken, ordinary Chinese people are the happiest. Thank God!
Default avatar
nobody 2 years ago
i have a soft spot for programmers and literal hackers. i believe their policies ultimately govern the direction of cyberspace - and it their freedom and capability which antagonises the systemic control mechanisms. necessity is the mother of invention - and in order to outpace international centralised control of the internet, hackers develop and manoeuvre honestly and nimbly to protect what most people don't even know exists. it's a race against time - before hackers are disappeared, before blockchain is overthrown, before people lose touch with reality. i would always protect a hacker, even if i disagreed with their policy. they learn in the moment and are crรฉateurs of decision. they adapt quickly with new information and are often the most aware group of people on earth. i do not abide brain or remote device hacking to profit secretly without permission. that's theft. different convo.
Default avatar
nobody 2 years ago
that all hands on deck assumes those companies have hackers' interests at heart - they do not. those types or corporate devs are discovery gatherings used to gather intel on hackers to be used against them legally or as blackmail. if you get mined during an event - and your exposed as someone a group or government has been looking for - even an underground affiliate, not just a legal one - you're fucked. conferences in general are discovery gatherings. i would avoid them completely. i have been saying this for years - and a few people who didn't listen ended up barely returning/compromised. if you think stock sales of individuals on the conference circuit is awful - wait until you see what you get into once your public image is doxxed and a bounty on your head while in international territory...
Default avatar
nobody 2 years ago
and micro ai. which essentially is what micro apps are... individually or small group controlled mining apparatus backends with "useful" fronts, mostly for unwitting customers. but it's still the hardware: the hardware is designed to be leaky to allow for this mining to operate.
Gus's avatar
Gus 2 years ago
does this include TCP/IP?
jack's avatar
jack 2 years ago
I hope this is true. I trust it will be. But there is a possibility it wonโ€™t be.
Default avatar
nobody 2 years ago
let's hope so - i trust it too.
โ†‘