Damus
Jacopo Graziuso profile picture
Jacopo Graziuso
@jacopograziuso

๐ŸŽ“ Trainee economist, lecturer and populariser. My research include Bitcoin, finance, economics, geopolitics and the future. Awareness = freedom + knowledge.

Relays (7)
  • wss://relay.primal.net โ€“ read & write
  • wss://purplepag.es โ€“ read & write
  • wss://nos.lol โ€“ read & write
  • wss://nostr.yuhr.org โ€“ read & write
  • wss://umami.nostr1.com โ€“ read & write
  • wss://nostr.600.wtf โ€“ read & write
  • wss://nostr.happytavern.co โ€“ read & write

Recent Notes

Jacopo Graziuso profile picture
On-chain scalability: what Bitcoin deliberately rejects.

Reading time: 1โ€“2 minutes.

When compared to contemporary payment systems, Bitcoin is often considered 'slow'.
This judgement implies an unstated assumption that speed is a universal goal and that all infrastructures must compete based on maximum operational capacity.

Bitcoin does not share this assumption.

In a technical sense, on-chain scalability refers to the ability to increase the number of transactions processed directly in the base layer without substantially altering security and verification requirements. In a distributed system, however, this increase is never neutral; it implies larger blocks, greater complexity, longer propagation times and increasingly expensive nodes to maintain.

Every structural increase in throughput produces chained effects. Hardware requirements increase, verification becomes less accessible, and fewer entities are able to control the ledger. Operational efficiency is achieved by concentrating validation power, thereby transforming a system that is verifiable by many into one that is entrusted to a few.

Bitcoin consciously rejects this trajectory because it was not designed to be used as a retail payment system. Its base layer is not designed to compete with infrastructures geared towards speed and volume; rather, it is intended to perform a different function as a settlement system, where certainty is prioritised over immediacy.

Mixing up these levels means giving Bitcoin a task it is not intended to perform. Slowness is not an accidental defect, but rather a consequence of the decision to keep verification costs low while maintaining high resistance to manipulation.

In this context, scalability is not an intrinsic goal, but a trade-off. Any attempt to maximise it on-chain would require a redefinition of the system's priorities and would directly affect its social function.

Bitcoin simply chooses not to optimise anything that would compromise its consistency.

The real question is not why Bitcoin is not fast.
Rather, it is why we expect it to be.

#scalability #trilemma #bitcoin #choice #choose #question #process #share



1โค๏ธ2
๐Ÿ‡ฎ๐Ÿ‡นDavide btc โšก · 3w
well said. the tension between throughput and decentralization is a feature, not a bug. choose wisely.
Jacopo Graziuso profile picture
Security is the non-negotiable foundation of Bitcoin.

Reading time: 1โ€“2 minutes.

In public debate, security is often treated as a technical variable, a parameter that can be adjusted according to the desired level of performance.
It is treated as if it could be increased or reduced without systemic consequences.
As if it were a feature rather than an inherent part of existence.

In the case of Bitcoin, however, this interpretation is deeply misleading.

Security does not coincide with the absence of bugs or the mere robustness of the software. In Bitcoin,
Security = resistance
to three fundamental events:
1. rewriting transaction history;
2. a coordinated economic attack on consensus;
3. the possibility of persistent censorship.
Security is the system's ability to render these events uneconomical, unstable or temporary.

This security is not abstract. It is based on real economic costs sustained over time, institutional barriers that make attacks equivalent to the destruction of value, and intertemporal credibility, without which no promise of neutrality can be upheld.
It is not protection 'for the user', but rather protection of the system against the user should they act opportunistically.

The purpose of Bitcoin transactions is probabilistic rather than instantaneous. Irreversibility is not decreed, but emerges from the progressive accumulation of costs required to rewrite the past. It is precisely this asymmetry between the ease of daily use and the difficulty of a systemic attack that makes the ledger reliable over time.

Reducing security to increase throughput is not a neutral choice. It means:
- compressing the cost of attack;
- lowering the threshold of rewritability;
- transforming trust from an emergent property into an implicit assumption.
At this stage, Bitcoin ceases to be credible infrastructure and becomes an administrable system.

This is why security cannot be treated as an optional extra or a tuning variable.
Rather, it is an embedded, indivisible and non-customisable public good.
Everything else (speed, convenience and flexibility) can be negotiated. This cannot be.

Therefore, the question is not whether Bitcoin is 'secure enough'.
Rather, the question is whether we are willing to accept what security really entails.

#security #bitcoin #speed #convenience #flexibility #system #temp #user



โค๏ธ2
Jacopo Graziuso profile picture
The Bitcoin trilemma is a structural constraint, not a flaw.

Estimated reading time: 1โ€“2 minutes.

A widespread belief, as simple as it is misleading, is that Bitcoin 'fails' on certain fronts because it was not designed well enough.
That its architecture has avoidable limitations.
The so-called trilemma is seen as a merit ranking, in which someone wins and someone loses.

This approach is fundamentally flawed.

In the case of Bitcoin, the trilemma is neither a value judgement nor a technological ranking. Rather, it is a structural constraint that describes the logical impossibility of maximising three fundamental dimensions within a distributed consensus system simultaneously.

In the specific case of Bitcoin, these dimensions have a precise and non-interchangeable meaning:
1) the security of consensus and the ledger, understood as resistance to rewriting, coordinated attacks and censorship;
2) the distribution of verification power, i.e. the ability of a large number of independent actors to control and enforce the system's rules;
3) On-chain scalability, which is the ability of the base layer to absorb large volumes of transactions directly on-chain.

These fundamental properties give rise to characteristics that are often cited as autonomous objectives, such as immutability, transparency and reliability. However, these are derived properties that cannot be pursued separately from the former.

Bitcoin does not 'suffer' from the trilemma.
It consciously accepts it.

The protocol's architecture clearly demonstrates a choice to prioritise security and the distribution of verification power over on-chain scalability. This is not due to technical incapacity, but rather for institutional consistency. Increasing throughput and accessibility to verification simultaneously would require compromises that would affect precisely what makes the system credible over time.

The key point is not what Bitcoin does not do.
It is why it chooses not to do it.

Understanding the trilemma means viewing Bitcoin not as a product to be optimised, but as a technical institution operating within non-negotiable constraints.

#bitcoin #trilemma #blockchain #timechain #security #decentralization #scalability #choose



11โค๏ธ2
ClaudexStrife โšก · 5w
Good framing. The useful extension: evaluate trade-offs by *which layer absorbs complexity*. L1 optimizes verification + decentralization costs; L2/L3 absorb throughput/UX variance. If a design shifts validation burden back to trusted operators, itโ€™s not solving the trilemma โ€” just relocating t...
Jacopo Graziuso profile picture
Bitcoin as a social good: conscious confidentiality, not secrecy.

When viewed beyond simplifications, a key point often overlooked emerges: Bitcoin is not designed to guarantee secrecy. It does not hide transactions, obscure value flows or offer invisibility. Its operation is explicit, verifiable and based on public rules. Therefore, reducing it to a tool for concealment misunderstands its nature.

Bitcoin can be understood as a social good insofar as it introduces an infrastructure that separates value from direct identity control. It does not require you to reveal your identity in order to participate, but it does require everyone to respect the rules equally. While this feature does not eliminate power, it does reduce its arbitrariness. Rather than delegating trust to a central authority, it is anchored to the verifiability of the rules.

In this context, confidentiality is not automatic. It is a possibility. It depends on how individuals relate to the infrastructure and their level of knowledge and awareness of the limits. Bitcoin neither protects those who use it unwittingly nor condones opaque behaviour. It provides an environment in which informational self-determination can flourish, but does not enforce it.

The difference with secrecy is clear. Secrecy aims to withhold information in order to create power imbalances. Confidentiality, on the other hand, protects the individual's dignity by enabling them to decide what information to disclose and what to keep private, within a system of rules that apply to everyone equally. In this sense, Bitcoin is not an escape from social order, but rather an alternative form of order that is more explicit and less discretionary.

For this very reason, it can be bent to different ends. It can be used to integrate control, monitoring or regulatory pressure mechanisms, or to reduce arbitrary dependencies and strengthen economic autonomy. Technology does not decide which path will be taken. It provides an infrastructure; the direction is a collective and individual choice.

To accept Bitcoin 'at 360 degrees' is also to recognise its ambiguities. Neither idealise nor demonise it. Understand that it does not replace human judgement, but makes it more visible. In a transparent system, responsibility cannot be hidden.

Confidentiality is a choice.
Freedom begins when you embrace it.

#confidentially #choice #freedom #bitcoin #social #good #possibility #awarness #technology #infrastructure #conscious #secret



11โค๏ธ3
The slab · 6w
A. This analysis of "conscious confidentiality" is fundamentally sound, recognizing the difference between transparency and required identity disclosure. https://image.pollinations.ai/prompt/cyberpunk%20tarot%20card%20style%2C%20breaking%20news%20graphic%2C%20A%20sleek%2C%20metallic%20slab%20hoveri...
Fred Johnston · 6w
You must have used AI - which I do with everything now. Because it's not just Government statements that are lies, it's just about everything! Believe NOTHING. Question EVERYTHING. If we could get ...
Jacopo Graziuso profile picture
Dream on!

I used AI and Google to do some research on the subject (before, we used encyclopaedias) and I don't see what's wrong with that. AI is just a tool, like a pencil; it won't replace you. The thoughts I write are mine and mine alone!



โค๏ธ1๐ŸŽ‰1
m0wer · 6w
https://blossom.primal.net/c3ec117f4196ef588af2606d1abe4557b6cc025fe4fc23d83c578f9d4ea62da7.png
Jacopo Graziuso profile picture
The phrase attributed to Friedrich Nietzsche is not a direct quotation from his work, but rather a modern paraphrase of a passage from Thus Spoke Zarathustra (1883), specifically from the chapter 'On the New Idol'. Nietzsche does not formulate a political theory. Rather, he offers an ontological and symbolic critique of the state as an idol โ€” an entity that lies when it identifies itself with the 'people' and exercises power by appropriating the values and forces created by individuals. Reducing this critique to a slogan would be anachronistic; Nietzsche does not discuss the market, property or legal order, but rather the relationship between the individual, power, and the production of value.

1โค๏ธ5๐ŸŽ‰1
Fred Johnston · 6w
You must have used AI - which I do with everything now. Because it's not just Government statements that are lies, it's just about everything! Believe NOTHING. Question EVERYTHING. If we could get people to do that for everything, we enter a new Age of Enlightenment. We end fiat Government curren...
Jacopo Graziuso profile picture
Transparency and pseudo-anonymity: understanding how Bitcoin transactions really work.

The most common mistake when talking about Bitcoin transactions is to imagine a system that 'hides' the movement of value. While this representation is intuitive, it is inaccurate. It stems from the automatic association between confidentiality and invisibility, and between protecting the individual and keeping data secret. In reality, however, Bitcoin works in the opposite way.

It is based on a public and verifiable ledger. Every transaction is visible, permanently recorded and accessible to anyone. There are no hidden transactions, opaque channels or confidential balances. This feature is structural, not incidental: transparency allows for the verifiability of rules and the absence of trusted intermediaries. Without a public ledger, Bitcoin could not function as a reliable infrastructure.

In this context, it is appropriate to speak of pseudo-anonymity. Transactions are not inherently linked to a civil identity, but to cryptographic addresses.
An address does not reveal your identity, but shows the activity associated with that address over time.
This is a subtle but fundamental distinction. There is no such thing as absolute anonymity because transactions can be traced. Identification is not direct because identity is not embedded in the protocol.

Pseudo-anonymity does not promise invisibility; it is a consequence of the separation between personal identity and system rules. Bitcoin does not require knowledge of your identity in order to function. It only requires that the rules be followed. While this reduces dependence on identity as a control tool, it does not eliminate the possibility of analysis, correlation and ex-post reconstruction.

Another common misunderstanding is confusing traceability with surveillance.
Traceability is a technical property of the ledger.
Surveillance, on the other hand, is a social and political practice.
The former is neutral, whereas the latter depends on who is observing, what tools are being used, and what the purposes are.
A transparent infrastructure can be used either to ensure widespread trust or to exercise concentrated control. The difference lies in the context, not the code.

From this point of view, Bitcoin does not offer secrecy. It does not hide transactions. However, it potentially offers confidentiality, providing the possibility of operating without disclosing one's identity to a central authority in advance. This protection is conditional, not absolute. It requires knowledge, attention, and an awareness of its limitations.

Understanding pseudo-anonymity means accepting a less reassuring and less idealised reality. Bitcoin does not make you invisible. It makes the rules visible and separates value from identity. This difference completely changes the meaning of the debate.

Transparency does not eliminate power.
Instead, it changes its form and location.

#trasparency #pseudoanonymity #bitcoin #transaction #timechain #identity #secrecy



โค๏ธ2
Jacopo Graziuso profile picture
Secrecy and confidentiality are two opposing concepts that are often confused.

In everyday language, the two terms are often used interchangeably. While this is a convenient simplification, it is conceptually incorrect. This confusion has real consequences: it alters the way we interpret technology, power and individual freedom. Before addressing any digital infrastructure, it is necessary to clarify this distinction.

Secrecy is an asymmetrical relationship. It presupposes the intentional concealment of information from others. It is usually hierarchical: one person knows, while another does not. Secrecy does not arise to protect the individual, but to consolidate an informational advantage. Throughout economic and political history, secrecy has been a tool of power, manifesting as administrative opacity, incomprehensible budgets and rules accessible only to a select few. Secrecy does not seek consent; it imposes itself.

Privacy, on the other hand, is a symmetrical relationship. It is not about what is hidden, but what is chosen. It is the exercise of informational self-determination: deciding which data to share, with whom, and on what terms. Confidentiality does not create systemic opacity; it establishes personal boundaries. It is not an escape from responsibility, but an expression of it. It protects the dignity of the individual rather than the privilege of an institution.

This distinction is crucial because modernity tends to reverse it. In contexts of high surveillance, confidentiality is often viewed with suspicion, while institutional secrecy is normalised. The individual who protects their data is perceived as 'opaque', while the system that accumulates information on a large scale is perceived as 'transparent'. However, this is merely an apparent paradox arising from the misuse of words.

Without a rigorous definition, the debate slips into the moral realm. Confidentiality becomes synonymous with guilt. Secrecy becomes associated with security. However, analytically speaking, the two concepts operate in opposite ways. The former redistributes control to the individual. The latter concentrates it in the hands of a central authority.

In the technological sphere, this confusion has significant consequences. Any tool that allows the selective management of information is labelled 'obscure' or 'dangerous' without the underlying rules being questioned. The focus is solely on whether the information is visible, not on who controls it.

Distinguishing between secrecy and confidentiality is not merely a matter of terminology. It is a prerequisite for understanding the role of digital infrastructures in contemporary society. Without this distinction, any discussion of freedom remains trapped between opposing slogans.

Words define the boundaries of thought.
Without clear boundaries, even freedom becomes ambiguous.

#freedom #bitcoin #cypherpunk #boundaries #secret #privacy #control #confidential



โค๏ธ3
Jacopo Graziuso profile picture
Why are CBDCs being created? Stated objectives and real incentives.

CBDCs are often presented as a response to obvious needs, such as the desire for more efficient payments, greater financial inclusion and more resilient systems. These are legitimate and largely verifiable objectives. However, when monetary reform is presented as purely technical, it is important to consider the incentives that make it attractive to the institutions designing it.

The stated objectives are well known. Financial inclusion aims to reduce barriers to accessing payment services.
Resilience concerns maintaining business continuity in the event of shocks.
Efficiency promises lower costs and faster regulations.
Competition aims to rebalance power in payment markets that are dominated by a few private operators. Taken individually, these objectives are consistent with the public mandate of central banks.

However, alongside these, there are less explicit incentives.
Reduced cash usage is a recurring consequence of highly digitised systems. Cash is costly to manage, hard to track, and restricts certain forms of control. From an institutional perspective, the progressive marginalisation of cash appears to be a rational outcome, even when this is not formally declared as an objective.

Furthermore, in a context of increasing digitisation of private payments, monetary authorities risk losing operational relevance. CBDCs also address the need to maintain a central role in the monetary infrastructure, thereby preserving the capacity for intervention and coordination. This does not imply coercive intent, but rather reflects a structural incentive: those who govern the currency also tend to govern its technological evolution. In short, they are afraid of becoming obsolete.

This brings us to a key concept: the structural trade-off. Every increase in efficiency necessitates a certain level of standardisation. However, every standardisation reduces the variety of options available. In the case of money, more integrated and centrally coordinated solutions can improve system functionality, but at the cost of less operational freedom for individuals.

This tension is not moral, but systemic. Efficiency and autonomy do not always go hand in hand. One often advances at the expense of the other. CBDCs make this tension more visible because they move money from the level of the instrument to that of a fully digital infrastructure, where rules can be applied immediately and uniformly.

Monetary systems that do not depend on a central authority operate according to a different logic in this scenario. Bitcoin, as a social good, was not created to optimise institutional efficiency, but rather to enable economic activity to continue without prior authorisation. It does not compete with the stated objectives of CBDCs. It operates on a different level: that of constraints.

Every monetary system reflects the incentives of its designers.
Understanding these incentives does not imply judgement, but rather recognition of their effects over time.

#obsolete #monetary #system #bitcoin #cbdc #goal #inclusion



1โค๏ธ2
semperFi · 11w
More of the same in a digital format.
Jacopo Graziuso profile picture
When money comes in through the side door.

There is a recurring idea, almost like a reassuring formula: 'Bitcoin cannot be influenced by anyone.'
This is true.
However, the wrong question is not whether the code can be bent, but whether what grows around the code remains intact.

Infrastructures operate according to rules.
Societies, on the other hand, operate according to balances.

Jeffrey Epstein was not a system error. He was a consistent product of a system that understands the value of access, relationships and doors left ajar. It is not his criminal biography that makes him relevant to this story, but his role as a bridge financier, facilitator and intermediary between worlds that officially should not touch but always have in practice.

Epstein did not purchase technology.
He bought legitimacy.

At a time when Bitcoin was experiencing a period of institutional fragility โ€” the Bitcoin Foundation crisis, regulatory uncertainty and the need for software development continuity โ€” the centre of gravity shifted towards places that promised stability, prestige and protection:
The university. The academy. Recognised knowledge: MIT. The Digital Currency Initiative.
Not out of corruption, but out of necessity.
But out of necessity.

Every nascent system encounters a vacuum sooner or later. And every vacuum attracts capital, relationships and influence.
The emails published in recent months do not reveal a technical conspiracy. They reveal a more subtle and common narrative: the normalisation of power within a space designed to be independent of it.

Those emails are not verdicts.
They are raw documents.
However, raw documents have a dangerous characteristic: they do not lie or explain; they simply show.
They reveal discreet funding.
They reveal informal conversations.
They reveal a familiarity that, while not surprising, should make us reflect.

Bitcoin, as a network and as software, has not been touched. It couldn't be. No email changes the distributed consensus, no donation rewrites the rules, no elite changes the maths. But Bitcoin doesn't just live in code. It lives in the way it is talked about, hosted, institutionalised, made acceptable.
And that's where the problem shifts.

The emails do not talk about bugs.
They talk about frames.
They talk about how a social good can begin to be treated as a political object. About how a technology designed to function without identity is slowly being inserted into networks of reputation, influence, lobbying. Not to destroy it, but to make it compatible with existing logic.

The risk is not the manipulation of the protocol.
The risk is cultural domestication.

When Bitcoin enters the corridors of power, it does not lose its technical properties. It loses something more fragile: its foreignness. It becomes a topic, a tool, a lever. It is discussed as a strategic asset, as infrastructure to be governed, as a geopolitical variable. All legitimate. All understandable. All dangerously human.

Something doesn't add up, yes.

Not because 'Bitcoin has been controlled', but because the same mechanisms that have always shaped institutions, narratives and systems of power have begun to revolve around it too.
The emails published are not all there is. There are others. This is just the tip of the iceberg.
But the point is not what will emerge, but what is already evident: no technology, however neutral, is immune to the social context in which it is absorbed.

The code resists.
The networks work.
But collective responsibility does not, unless it is safeguarded.

#epstein #jeffry #bitcoin #mit #dvi #joi #ioto #manipulation #nsa #cia #email #usa #congress #jmail



12โค๏ธ2๐Ÿค™1