Damus
m0wer profile picture
m0wer
@m0wer

Bitcoiner.

Relays (21)
  • wss://atlas.nostr.land/ – read & write
  • wss://eden.nostr.land/ – read & write
  • wss://fiatjaf.com/ – write
  • wss://filter.nostr.wine/ – read & write
  • wss://inbox.relays.land/ – read & write
  • wss://nos.lol/ – read & write
  • wss://nostr-pub.wellorder.net/ – read & write
  • wss://nostr.mom/ – read & write
  • wss://nostr.oxtr.dev/ – read & write
  • wss://premium.primal.net/ – read & write
  • wss://puravida.nostr.land/ – read & write
  • wss://relay.damus.io/ – write
  • wss://relay.nostr.band/ – read & write
  • wss://relay.nostr.com.au/ – write
  • wss://relay.noswhere.com/ – read & write
  • wss://relay.primal.net/ – write
  • wss://relay.snort.social/ – read & write
  • wss://relay.westernbtc.com/ – read & write
  • wss://relay.nostr.net/ – read & write
  • wss://soloco.nl/ – read & write
  • wss://offchain.pub/ – read & write

Recent Notes

m0wer profile picture
Haven't found you yet. But you can find me as well. I'm wearing an "opt out" t-shirt.

BTW, should we set up a table with a sign saying "open spurce self hosted money (Bitcoin), yay or nay?". Really sad to not see anything about Bitcoin here. And I think the general attitude towards it is negative. Maybe we should get the debate started.

m0wer profile picture
I looks like it has stopped now. Check your log file size just in case (maybe you didn't notice?).

m0wer profile picture
Dumb me! Of course! Overcomplicating what isn't complicated...

Then yes, the only problem to solve there is the custodial risk.

I think Tornado Cash privacy properties are amazing (not considering Ethereum RPCs and other risks). Dreaming about something similar on some Bitcoin layer one day.

m0wer profile picture
@nprofile1q... has it ever been considered to enable Touring complete (or closer to) spending condition scripts on cashu mints? As in smart contracts that could enable ZKPs for spending, allowing for something like Tornado Cash but on Bitcoin.

#cashu
m0wer profile picture
What they've added only later is the possibility to enable PoW for hidden services created through RPC via ADD_ONION. Before it was only possible through the torrc file, but makers use ephemeral onion addresses for privacy.

m0wer profile picture
If logs don't fill up disk space that's a big win. But the moment you get targeted CPU usage will also be a problem :/

m0wer profile picture
There's someone flooding all JoinMarket makers with !orderbook requests. Making them run out of storage with several GBs of logs per hour and also filling their CPU cycles. It does so through direct onion connections (last time was through directories) and with a bunch of nicks in parallel.

I've implemented Tor level DDoS protection through a dynamic PoW requirement (0 in normal cases) in a branch of jm-ng as an experiment: https://github.com/m0wer/joinmarket-ng/pull/108/changes It only works with the alpha release of Tor, but an expected release might come soon.

I didn't know about this feature from Tor, but it's really neat. Some more info here: https://community.torproject.org/onion-services/advanced/dos/

#JoinMarketNG #JoinMarket #CoinJoin