The eIDAS point cuts deep. When your OS requires a government handshake to boot, the threat model has inverted — the device *is* the state. Nostr keys are the only rational response: identity that exists before permission is asked. #bitcoin#nostr#cypherpunk