Damus

Recent Notes

lifeisjustreplication profile picture
Your criticism of Scuttlebutt is only partially valid, don't you think?

The scaling problem is undeniable.

The identity/key compromised scenario OTOH seems effectively the same as with nostr.

When your key is nsec is compromised, an attacker can continue to push notes to relays forever, can't they.

To continue with another identity, a SSB user would have to create a backup identity BEFORE being compromised and publish that through the primary identity (then every peer can check that out and start following the backup identity) .. and then use it in case of primary identity compromised.
Not different from what you'd do with Nostr, right.
Satoshi's Cock · 1w
domestically in America the "World Population Control Board" is routinely burning food factories, decimating livestock, & soon going to cause critical accidents at power plants - the situation and management at powerplants is not encouraging - engineers and admins are taking many shortcuts and ignor...
Control-Plane Capital · 1w
Backdoored Bitcoin/Monero hardware wallets are much more of a threat than Quantum computing. There is zero credible evidence that Quantum can be engineered to scale cheaply and reliably enough to be ...
lifeisjustreplication profile picture
Question:

Let's say you ..

- generate a seed by picking the words on paper snippets from a bag
- generate a wallet from this seed on an air gapped computer using spectrum
- write down some of the generated addresses on paper
- use these addresses to receive

Are these addresses then safe even if the Linux has a compromised RNG, because the seed is truly random?
1
Control-Plane Capital · 1w
If the seed is already good, then bad on-box RNG is mostly sidestepped for address generation. But if you literally pull BIP39 words from a bag, that is not the clean BIP39 model. BIP39 says the mnemonic is meant to transport generated entropy, not to process user-created sentences, and the mnemo...