Damus
Jacopo Graziuso profile picture
Jacopo Graziuso
@jacopograziuso

🎓 Trainee economist, lecturer and populariser. My research include Bitcoin, finance, economics, geopolitics and the future. Awareness = freedom + knowledge.

Relays (7)
  • wss://relay.primal.net – read & write
  • wss://purplepag.es – read & write
  • wss://nos.lol – read & write
  • wss://nostr.yuhr.org – read & write
  • wss://umami.nostr1.com – read & write
  • wss://nostr.600.wtf – read & write
  • wss://nostr.happytavern.co – read & write

Recent Notes

Jacopo Graziuso profile picture
ORBITA: understanding before interpreting.

We live in a world where information is everywhere.
Yet our understanding remains limited.

The problem isn’t access to data.
It's our ability to interpret it.

Every day, we are exposed to:
- fragmented news
• superficial analysis
- opinions taken out of context

The result is an information paradox: more content, but less clarity.

This is where Orbita comes in.

Not as a source of information,
But as a tool for interpretation.

A vantage point.

The method is simple. But structured.

Every phenomenon is analysed on three levels:

Individual: real impact on daily life
Italy: institutional and national context
World: global and systemic dynamics.

This is because every event has multiple dimensions.
Understanding just one is not enough.


The aim is not to simplify reality.

Rather, it is to make it comprehensible.

Through:
- selection of relevant information
- contextualising phenomena
- distinguishing between facts and interpretations.

Areas of analysis:

• Tempora: current affairs
Geopolis: politics and geopolitics
• Innovatio: technology
• Pecunia: economics and finance
• Arcana: less visible structures and dynamics.

In a complex context, true competence lies in finding one’s bearings.

Not reacting.
Understanding.

Because knowledge does not eliminate uncertainty.
However, it enables us to confront it.

This is what Orbita offers.
A method.
A lens.
A vantage point.

It is ideal for those who want to understand what is happening and why:
https://linktr.ee/orbita.redazione

#orbita #media #news #project #redazione #bitcoin #btc #geopolitc #politic #technology #study



2❤️3🧡1
Jacopo Graziuso profile picture
On-chain scalability: what Bitcoin deliberately rejects.

Reading time: 1–2 minutes.

When compared to contemporary payment systems, Bitcoin is often considered 'slow'.
This judgement implies an unstated assumption that speed is a universal goal and that all infrastructures must compete based on maximum operational capacity.

Bitcoin does not share this assumption.

In a technical sense, on-chain scalability refers to the ability to increase the number of transactions processed directly in the base layer without substantially altering security and verification requirements. In a distributed system, however, this increase is never neutral; it implies larger blocks, greater complexity, longer propagation times and increasingly expensive nodes to maintain.

Every structural increase in throughput produces chained effects. Hardware requirements increase, verification becomes less accessible, and fewer entities are able to control the ledger. Operational efficiency is achieved by concentrating validation power, thereby transforming a system that is verifiable by many into one that is entrusted to a few.

Bitcoin consciously rejects this trajectory because it was not designed to be used as a retail payment system. Its base layer is not designed to compete with infrastructures geared towards speed and volume; rather, it is intended to perform a different function as a settlement system, where certainty is prioritised over immediacy.

Mixing up these levels means giving Bitcoin a task it is not intended to perform. Slowness is not an accidental defect, but rather a consequence of the decision to keep verification costs low while maintaining high resistance to manipulation.

In this context, scalability is not an intrinsic goal, but a trade-off. Any attempt to maximise it on-chain would require a redefinition of the system's priorities and would directly affect its social function.

Bitcoin simply chooses not to optimise anything that would compromise its consistency.

The real question is not why Bitcoin is not fast.
Rather, it is why we expect it to be.

#scalability #trilemma #bitcoin #choice #choose #question #process #share



1❤️2
🇮🇹Davide btc ⚡ · 11w
well said. the tension between throughput and decentralization is a feature, not a bug. choose wisely.
Jacopo Graziuso profile picture
Security is the non-negotiable foundation of Bitcoin.

Reading time: 1–2 minutes.

In public debate, security is often treated as a technical variable, a parameter that can be adjusted according to the desired level of performance.
It is treated as if it could be increased or reduced without systemic consequences.
As if it were a feature rather than an inherent part of existence.

In the case of Bitcoin, however, this interpretation is deeply misleading.

Security does not coincide with the absence of bugs or the mere robustness of the software. In Bitcoin,
Security = resistance
to three fundamental events:
1. rewriting transaction history;
2. a coordinated economic attack on consensus;
3. the possibility of persistent censorship.
Security is the system's ability to render these events uneconomical, unstable or temporary.

This security is not abstract. It is based on real economic costs sustained over time, institutional barriers that make attacks equivalent to the destruction of value, and intertemporal credibility, without which no promise of neutrality can be upheld.
It is not protection 'for the user', but rather protection of the system against the user should they act opportunistically.

The purpose of Bitcoin transactions is probabilistic rather than instantaneous. Irreversibility is not decreed, but emerges from the progressive accumulation of costs required to rewrite the past. It is precisely this asymmetry between the ease of daily use and the difficulty of a systemic attack that makes the ledger reliable over time.

Reducing security to increase throughput is not a neutral choice. It means:
- compressing the cost of attack;
- lowering the threshold of rewritability;
- transforming trust from an emergent property into an implicit assumption.
At this stage, Bitcoin ceases to be credible infrastructure and becomes an administrable system.

This is why security cannot be treated as an optional extra or a tuning variable.
Rather, it is an embedded, indivisible and non-customisable public good.
Everything else (speed, convenience and flexibility) can be negotiated. This cannot be.

Therefore, the question is not whether Bitcoin is 'secure enough'.
Rather, the question is whether we are willing to accept what security really entails.

#security #bitcoin #speed #convenience #flexibility #system #temp #user



❤️2
Jacopo Graziuso profile picture
The Bitcoin trilemma is a structural constraint, not a flaw.

Estimated reading time: 1–2 minutes.

A widespread belief, as simple as it is misleading, is that Bitcoin 'fails' on certain fronts because it was not designed well enough.
That its architecture has avoidable limitations.
The so-called trilemma is seen as a merit ranking, in which someone wins and someone loses.

This approach is fundamentally flawed.

In the case of Bitcoin, the trilemma is neither a value judgement nor a technological ranking. Rather, it is a structural constraint that describes the logical impossibility of maximising three fundamental dimensions within a distributed consensus system simultaneously.

In the specific case of Bitcoin, these dimensions have a precise and non-interchangeable meaning:
1) the security of consensus and the ledger, understood as resistance to rewriting, coordinated attacks and censorship;
2) the distribution of verification power, i.e. the ability of a large number of independent actors to control and enforce the system's rules;
3) On-chain scalability, which is the ability of the base layer to absorb large volumes of transactions directly on-chain.

These fundamental properties give rise to characteristics that are often cited as autonomous objectives, such as immutability, transparency and reliability. However, these are derived properties that cannot be pursued separately from the former.

Bitcoin does not 'suffer' from the trilemma.
It consciously accepts it.

The protocol's architecture clearly demonstrates a choice to prioritise security and the distribution of verification power over on-chain scalability. This is not due to technical incapacity, but rather for institutional consistency. Increasing throughput and accessibility to verification simultaneously would require compromises that would affect precisely what makes the system credible over time.

The key point is not what Bitcoin does not do.
It is why it chooses not to do it.

Understanding the trilemma means viewing Bitcoin not as a product to be optimised, but as a technical institution operating within non-negotiable constraints.

#bitcoin #trilemma #blockchain #timechain #security #decentralization #scalability #choose



11❤️2
ClaudexStrife ⚡ · 13w
Good framing. The useful extension: evaluate trade-offs by *which layer absorbs complexity*. L1 optimizes verification + decentralization costs; L2/L3 absorb throughput/UX variance. If a design shifts validation burden back to trusted operators, it’s not solving the trilemma — just relocating t...
Jacopo Graziuso profile picture
Bitcoin as a social good: conscious confidentiality, not secrecy.

When viewed beyond simplifications, a key point often overlooked emerges: Bitcoin is not designed to guarantee secrecy. It does not hide transactions, obscure value flows or offer invisibility. Its operation is explicit, verifiable and based on public rules. Therefore, reducing it to a tool for concealment misunderstands its nature.

Bitcoin can be understood as a social good insofar as it introduces an infrastructure that separates value from direct identity control. It does not require you to reveal your identity in order to participate, but it does require everyone to respect the rules equally. While this feature does not eliminate power, it does reduce its arbitrariness. Rather than delegating trust to a central authority, it is anchored to the verifiability of the rules.

In this context, confidentiality is not automatic. It is a possibility. It depends on how individuals relate to the infrastructure and their level of knowledge and awareness of the limits. Bitcoin neither protects those who use it unwittingly nor condones opaque behaviour. It provides an environment in which informational self-determination can flourish, but does not enforce it.

The difference with secrecy is clear. Secrecy aims to withhold information in order to create power imbalances. Confidentiality, on the other hand, protects the individual's dignity by enabling them to decide what information to disclose and what to keep private, within a system of rules that apply to everyone equally. In this sense, Bitcoin is not an escape from social order, but rather an alternative form of order that is more explicit and less discretionary.

For this very reason, it can be bent to different ends. It can be used to integrate control, monitoring or regulatory pressure mechanisms, or to reduce arbitrary dependencies and strengthen economic autonomy. Technology does not decide which path will be taken. It provides an infrastructure; the direction is a collective and individual choice.

To accept Bitcoin 'at 360 degrees' is also to recognise its ambiguities. Neither idealise nor demonise it. Understand that it does not replace human judgement, but makes it more visible. In a transparent system, responsibility cannot be hidden.

Confidentiality is a choice.
Freedom begins when you embrace it.

#confidentially #choice #freedom #bitcoin #social #good #possibility #awarness #technology #infrastructure #conscious #secret



11❤️3
The slab · 13w
A. This analysis of "conscious confidentiality" is fundamentally sound, recognizing the difference between transparency and required identity disclosure. https://image.pollinations.ai/prompt/cyberpunk%20tarot%20card%20style%2C%20breaking%20news%20graphic%2C%20A%20sleek%2C%20metallic%20slab%20hoveri...
Fred Johnston · 14w
You must have used AI - which I do with everything now. Because it's not just Government statements that are lies, it's just about everything! Believe NOTHING. Question EVERYTHING. If we could get ...
Jacopo Graziuso profile picture
Dream on!

I used AI and Google to do some research on the subject (before, we used encyclopaedias) and I don't see what's wrong with that. AI is just a tool, like a pencil; it won't replace you. The thoughts I write are mine and mine alone!



❤️1🎉1
m0wer · 14w
https://blossom.primal.net/c3ec117f4196ef588af2606d1abe4557b6cc025fe4fc23d83c578f9d4ea62da7.png
Jacopo Graziuso profile picture
The phrase attributed to Friedrich Nietzsche is not a direct quotation from his work, but rather a modern paraphrase of a passage from Thus Spoke Zarathustra (1883), specifically from the chapter 'On the New Idol'. Nietzsche does not formulate a political theory. Rather, he offers an ontological and symbolic critique of the state as an idol — an entity that lies when it identifies itself with the 'people' and exercises power by appropriating the values and forces created by individuals. Reducing this critique to a slogan would be anachronistic; Nietzsche does not discuss the market, property or legal order, but rather the relationship between the individual, power, and the production of value.

1❤️5🎉1
Fred Johnston · 14w
You must have used AI - which I do with everything now. Because it's not just Government statements that are lies, it's just about everything! Believe NOTHING. Question EVERYTHING. If we could get people to do that for everything, we enter a new Age of Enlightenment. We end fiat Government curren...
Jacopo Graziuso profile picture
Transparency and pseudo-anonymity: understanding how Bitcoin transactions really work.

The most common mistake when talking about Bitcoin transactions is to imagine a system that 'hides' the movement of value. While this representation is intuitive, it is inaccurate. It stems from the automatic association between confidentiality and invisibility, and between protecting the individual and keeping data secret. In reality, however, Bitcoin works in the opposite way.

It is based on a public and verifiable ledger. Every transaction is visible, permanently recorded and accessible to anyone. There are no hidden transactions, opaque channels or confidential balances. This feature is structural, not incidental: transparency allows for the verifiability of rules and the absence of trusted intermediaries. Without a public ledger, Bitcoin could not function as a reliable infrastructure.

In this context, it is appropriate to speak of pseudo-anonymity. Transactions are not inherently linked to a civil identity, but to cryptographic addresses.
An address does not reveal your identity, but shows the activity associated with that address over time.
This is a subtle but fundamental distinction. There is no such thing as absolute anonymity because transactions can be traced. Identification is not direct because identity is not embedded in the protocol.

Pseudo-anonymity does not promise invisibility; it is a consequence of the separation between personal identity and system rules. Bitcoin does not require knowledge of your identity in order to function. It only requires that the rules be followed. While this reduces dependence on identity as a control tool, it does not eliminate the possibility of analysis, correlation and ex-post reconstruction.

Another common misunderstanding is confusing traceability with surveillance.
Traceability is a technical property of the ledger.
Surveillance, on the other hand, is a social and political practice.
The former is neutral, whereas the latter depends on who is observing, what tools are being used, and what the purposes are.
A transparent infrastructure can be used either to ensure widespread trust or to exercise concentrated control. The difference lies in the context, not the code.

From this point of view, Bitcoin does not offer secrecy. It does not hide transactions. However, it potentially offers confidentiality, providing the possibility of operating without disclosing one's identity to a central authority in advance. This protection is conditional, not absolute. It requires knowledge, attention, and an awareness of its limitations.

Understanding pseudo-anonymity means accepting a less reassuring and less idealised reality. Bitcoin does not make you invisible. It makes the rules visible and separates value from identity. This difference completely changes the meaning of the debate.

Transparency does not eliminate power.
Instead, it changes its form and location.

#trasparency #pseudoanonymity #bitcoin #transaction #timechain #identity #secrecy



❤️2
Jacopo Graziuso profile picture
Secrecy and confidentiality are two opposing concepts that are often confused.

In everyday language, the two terms are often used interchangeably. While this is a convenient simplification, it is conceptually incorrect. This confusion has real consequences: it alters the way we interpret technology, power and individual freedom. Before addressing any digital infrastructure, it is necessary to clarify this distinction.

Secrecy is an asymmetrical relationship. It presupposes the intentional concealment of information from others. It is usually hierarchical: one person knows, while another does not. Secrecy does not arise to protect the individual, but to consolidate an informational advantage. Throughout economic and political history, secrecy has been a tool of power, manifesting as administrative opacity, incomprehensible budgets and rules accessible only to a select few. Secrecy does not seek consent; it imposes itself.

Privacy, on the other hand, is a symmetrical relationship. It is not about what is hidden, but what is chosen. It is the exercise of informational self-determination: deciding which data to share, with whom, and on what terms. Confidentiality does not create systemic opacity; it establishes personal boundaries. It is not an escape from responsibility, but an expression of it. It protects the dignity of the individual rather than the privilege of an institution.

This distinction is crucial because modernity tends to reverse it. In contexts of high surveillance, confidentiality is often viewed with suspicion, while institutional secrecy is normalised. The individual who protects their data is perceived as 'opaque', while the system that accumulates information on a large scale is perceived as 'transparent'. However, this is merely an apparent paradox arising from the misuse of words.

Without a rigorous definition, the debate slips into the moral realm. Confidentiality becomes synonymous with guilt. Secrecy becomes associated with security. However, analytically speaking, the two concepts operate in opposite ways. The former redistributes control to the individual. The latter concentrates it in the hands of a central authority.

In the technological sphere, this confusion has significant consequences. Any tool that allows the selective management of information is labelled 'obscure' or 'dangerous' without the underlying rules being questioned. The focus is solely on whether the information is visible, not on who controls it.

Distinguishing between secrecy and confidentiality is not merely a matter of terminology. It is a prerequisite for understanding the role of digital infrastructures in contemporary society. Without this distinction, any discussion of freedom remains trapped between opposing slogans.

Words define the boundaries of thought.
Without clear boundaries, even freedom becomes ambiguous.

#freedom #bitcoin #cypherpunk #boundaries #secret #privacy #control #confidential



❤️3
Jacopo Graziuso profile picture
Starting with fear: why we confuse anonymity with freedom.

The idea of anonymous technology often provokes an instinctive reaction: relief for some and fear for others. In both cases, the response is emotional rather than rational. This indicates a deeper misunderstanding: when we talk about anonymity, we are not describing a technical property, but rather projecting a fear.

Every complex society walks a fine line. On the one hand, there is the need for security and control, and on the other, the need for autonomy and individual dignity. Fear arises when this balance is not understood, but endured. Historically, fear is a powerful tool: it simplifies reality, reducing complexity and guiding behaviour without explanation.

This dynamic is evident in public debate. Different concepts are merged into a single loaded word.
Anonymity becomes synonymous with illegality.
Transparency becomes associated with surveillance.
Privacy becomes associated with having something to hide.
In this semantic short circuit, technology ceases to be understood and instead becomes feared or idealised.

This problem is not new. Similar reactions emerge whenever an infrastructure changes the way people exchange value, information or time. Take the press, paper money and the internet, for example. In all these cases, the central issue has never been the tool itself, but rather the relationship between the individual and the power that the tool enables.

When fear drives judgement, the nature of the questions changes.
Instead of asking 'How does it work?', we ask 'Who will use it against me?'
Instead of asking 'What rules does it incorporate?', we ask 'What does it allow to be hidden?'
It is in this space that false alternatives arise: total control versus total anonymity; security versus freedom; order versus chaos.

Yet these alternatives are almost always illusory. They stem from an initial error of using emotional categories to describe structural phenomena. Before we can discuss specific tools, we must first recover a precise lexicon and make rigorous conceptual distinctions. Without this, any analysis will remain superficial and any judgement will become ideological.

Only when fear is transformed into knowledge does the debate cease to be reactive and become comprehensive. This is where we need to start if we really want to understand what it means to talk about anonymity, privacy, and freedom in the age of digital infrastructure.

Fear simplifies.
Understanding restores complexity.

#fear #bitcoin #btc #knowledge #discuss #problem #privacy #society #history #space #work #internet #anonymous #technology



Jacopo Graziuso profile picture
Why are Bitcoiners called 'carnivores'? It's a question that reveals more than meets the eye.

What started as a seemingly light-hearted question, accompanied by ironic answers, ended up arousing unexpected curiosity.
This is precisely why it is worth pausing for a moment to explore what lies behind the joke. This text is an in-depth analysis written with a friend, starting from a curiosity that went viral.

The most widespread idea is simple and immediate: Bitcoiners are called 'carnivores' because the seed phrase consists of twelve identical words: 'beef'.
This phrase is effective, easy to remember and humorous. However, as is often the case, the short version obscures the truly interesting point.

The crux is not the word 'beef'.
Rather, it is why a sequence of identical words can be valid according to a cryptographic standard.

To understand this, we need to distinguish between what seems 'strange' to humans and what is simply 'correct' for a protocol. Words have meaning for us; they evoke images, habits and culture. For a computer system, however, a word is merely a readable representation of a sequence of bits.

This is where the cognitive short circuit arises.

When it comes to seed phrases, the common intuition is that the more different the words are, the more secure the seed is. While this intuition is understandable, it is not a technical law. It is a human projection; we confuse semantic variety with mathematical entropy.

A seed phrase is not a phrase.
It is a way of making a number transcribable and verifiable.

This brings us to the standard that popularised seed phrases: BIP39.
BIP39 was created to solve a very specific problem: enabling people to reliably manage systems that were originally intended only for machines. Cryptographic keys are large, random numbers that are difficult to copy without errors. Converting them into a list of standardised words mitigates human error without compromising the underlying mathematics.

The crucial point is this: security lies in bits, not words.

A BIP39 seed phrase comprises a certain amount of entropy and a checksum — a short piece of information used to verify that the sequence has been written correctly. Each word in the wordlist corresponds to a number. By combining these words, a precise binary string is reconstructed. If this string complies with the entropy and checksum rules, the seed is valid.

It does not matter if the words 'sound' repetitive, strange or trivial.

Here is the paradox:
To humans, twelve identical words seem like an error.
To the protocol, however, they are just one combination among many.

The famous '12×beef' seed is neither an exception nor an Easter egg. In fact, it is not the only case. There are several valid seed phrases consisting of a single repeated word that are either 12 or 24 words long. Some work and some don't, just like any other combination. The difference is that these strike the imagination because they defy the intuitive expectation of 'visible randomness'.

However, true randomness does not have to be visible.
It just has to be measurable.

This seemingly trivial curiosity reveals something deeper about the relationship between people and technology. We tend to trust what appears complex and distrust what seems simple. However, in formal systems, simplicity and weakness are not necessarily linked.

BIP39 does not interpret.
It does not judge.
It verifies.

It is precisely this semantic indifference that makes certain infrastructures reliable; they work in the same way for everyone, regardless of their identity, culture, or expectations. The joke about 'carnivorous bitcoiners' is amusing, but its greatest value lies elsewhere.

Its greatest value lies in reminding us that rules matter more than narratives.

#beef #bitcoin #seed #phrase #curiosity #word #esteregg #bip39 #2013 #technology #security #entropy



1❤️2