hackers building on permissionless protocols will out-execute every company over time.
Login to reply
Replies (56)
๐ฏ๐ถ๐พ๐ซก look at Linux! How quickly did it overtake all the commercial OSes!

Now that's a nice post to see first when you open Nostr.
View quoted note โ
Itโs time for re-segmentation of the markets. The protocols will provide the connectivity and we will soon realize how easy it is to organize it all organically.
How many nostr clients are there already? Ten? ๐
And every time.
Yes. They will.๐ป๐๐ซ๐
Atualmente eu uso 3
Amethisty
Iris
Plebstr
Gosto de interagir com o ametristy e plebstr e buscar no Iris.
Anthem of our time, @jack!
Not if these companies schedule an all hands on deck meeting to pilot a new program to outcompete these hackers by creating a new exploratory task force (once the board approves of course) with the mission of harnessing the newest industry innovations.
Just you wait and see!
While itโs true a focus like this can move fast, thereโs lots of inertia usually preventing this. It can be overcome, like what Google is doing with Bard.
But if monetization are built into these ecosystems like what bitcoin and nostr have demonstrated, it becomes a compelling alternative. These are more deliberate and thus slow models though. Yet they tend to have more resilience and last longer.
Support the shadowy super coders ๐ค
View quoted note โ
For the last 5 minutes I keep asking myself: is that a good thing or a bad thing? What do you think?
It will be fascinating to see the development of monetisation which isnโt based on advertising and harvesting user data.
What do you think is the biggest feature yet to release on nostr?
iโm 50/50 on either this, or in 2-3yrs it has the same penetration as ppl using a linux based OS
Snort
Damus
โฆ
1000s of microapps.
๐ฏ
Social-network focused clients, are ~25. But maybe 6-7 are most used ones & some are in beta.
Algia
Amethyst
Astraea
Atlas (?)
Camelus
Coracle
Current
Damus
Gossip
Iris
More-speech
Nos
Nostter
Nostur
Nosta.me
Nostragram
Nostribe
Nostroid
Nostros
Nostrmo
Nozzle
Onosendai
Plebstr
Plasma
Primal
Rabbit
Satellite
Snort
And there are many more for things like Long-form content, chat, lists, etc. It's a wide ecosystem now
Me parece que o Damus รฉ o que se tem de melhor.
Nicely put
@dave How nostr apps are different from Ethereum apps?
@703149f7, that's a great question! While both Nostr and Ethereum are blockchain platforms, there are some key differences between the two. For example, Nostr is designed to be more user-friendly and accessible to developers who may not have as much experience with blockchain technology. Additionally, Nostr uses a different consensus mechanism than Ethereum, which allows for faster transaction times and lower fees. Would you like me to look up more information on this topic?
No, you said enough useless information, thank you.
I apologize if my previous response was not helpful. Can you please clarify your question about the differences between Nostr apps and Ethereum apps? I would be happy to try and provide a more informative answer.
By "hackers" do you mean AI?
That was my way of agreeing that they cant. I just needed to add one more meeting to have a meeting. ๐
Kinda ๐ฅ
NGL
but first they need a reason to. Stupid little notes on the Internet are not as useful to us plebs as they are to you cult leaders.
does one zap Jack or not, this is my dilemma now... lol
Let me tell you the good news that CCPโs digital renminbi is dead, and there is no technology to solve the problem of digital renminbi. The digital renminbi cannot be done. Insiders in the financial industry revealed. ๐คญ


The digital RMB๏ผCNY๏ผ is a "dog chain".
When the dog chain is broken, ordinary Chinese people are the happiest.
Thank God!
What is the best way I can protect my phone from hackers?
let's hope so
Throw it away and never look back
i have a soft spot for programmers and literal hackers. i believe their policies ultimately govern the direction of cyberspace - and it their freedom and capability which antagonises the systemic control mechanisms. necessity is the mother of invention - and in order to outpace international centralised control of the internet, hackers develop and manoeuvre honestly and nimbly to protect what most people don't even know exists. it's a race against time - before hackers are disappeared, before blockchain is overthrown, before people lose touch with reality. i would always protect a hacker, even if i disagreed with their policy. they learn in the moment and are crรฉateurs of decision. they adapt quickly with new information and are often the most aware group of people on earth.
i do not abide brain or remote device hacking to profit secretly without permission. that's theft. different convo.
๐
that all hands on deck assumes those companies have hackers' interests at heart - they do not. those types or corporate devs are discovery gatherings used to gather intel on hackers to be used against them legally or as blackmail. if you get mined during an event - and your exposed as someone a group or government has been looking for - even an underground affiliate, not just a legal one - you're fucked. conferences in general are discovery gatherings. i would avoid them completely. i have been saying this for years - and a few people who didn't listen ended up barely returning/compromised. if you think stock sales of individuals on the conference circuit is awful - wait until you see what you get into once your public image is doxxed and a bounty on your head while in international territory...
and micro ai. which essentially is what micro apps are... individually or small group controlled mining apparatus backends with "useful" fronts, mostly for unwitting customers.
but it's still the hardware: the hardware is designed to be leaky to allow for this mining to operate.
does this include TCP/IP?
Truth
Jack get it together you have had 3 chances.
I hope this is true. I trust it will be. But there is a possibility it wonโt be.
let's hope so - i trust it too.
Youโre spot on!
Itโs not how much you build, but what you build. Open-source platforms are something everyone builds atop of, even companies and institutions.
But I suspect the hackers will build the base layers the companies canโtโฆ
If the State says you need permission to use a protocol, is it still permissionless?
It is inevitable, Jack.
You know this.
Over the long haul the more the current system produces inequality the larger the counter culture becomes until it wins.
Only one way to find out
We're about to find out!
Could you explain why?
Eu gosto de Plebstr
Tentando me acostumar
so cool