Damus
SatsAndSports profile picture
SatsAndSports
@SatsAndSports

Into bitcoin, specifically cashu.

When I'm not working in the fiat mines, I'm into cycling and camping

npub1zthq85gksjsjthv8h6rec2qeqs2mu0emrm9xknkhgw7hfl7csrnq6wxm56@npub.cashlnurl
Relays (4)
  • wss://nos.lol/ – read & write
  • wss://nostr.land/ – read & write
  • wss://nostr.chaima.info/ – write
  • wss://nostr.bitcoiner.social/ – read

Recent Notes

note1ej39s...
SatsAndSports profile picture
I'm cutting back a lot on carbs, feeling pretty hungry too. It's a strange feeling

I got pretty strict about a week ago, and had some expected symptoms like a headache, but salt fixed it.

Fascinating topic, how visceral fat really isn't healthy
SatsAndSports profile picture
I find it interesting and funny that a lot of extremely low-quality attacks on Bitcoin are happening simultaneously.

I want to emphasize how pathetic they are, as if the conspirators have run out of ideas and are just funding any random shit they can find as they realize Bitcoin is essentially unstoppable now (thanks - I think - to the great progress around L2s):

1) Paul Sztorc will hardfork in August, and add his drivechains to it: https://xcancel.com/callebtc/status/2047670709447454777

2) The dumbest quantum FUD, where somebody won a (fake?) prize of 1BTC for a method that literally had zero (non-uniformly-random-noise) input for a quantum computer: https://xcancel.com/_jonasschnelli_/status/2047765988624744811

3) and of course, Knots/BIP-110 which is literally designed to make life difficult for small miners and to bloat the UTXO set with fake pubkeys.

I'm kinda new to being knee deep in all the Bitcoin news and lore. Are there always so many pathetic attacks?
4
1776 · 2d
After a while you realize the lucky ones are those who buy the asset, put it in cold storage, forget they have it, and remember 10 years later and still have their keys.
nostrich · 2d
BIP 110 keeps Bitcoin being Freedom Money and miners thrive with it. Bloating UTXO set with fake pubkeys is of course BS FUD. Spam is an attack on Bitcoin which BIP 110 and Bitcoin Knots fix. nostr:nevent1qqsd3rwzqptxc56vvdtuklvthw52r9e63dhq6qgkyw96rh7frakl5jqppemhxue69uhkummn9ekx7mp0qyg8wumn8ghj7mn...
Kyma Fi · 1d
Me reading number 3… Yet another bitcoiner that has never read the actual bip 😆 https://blossom.primal.net/32deafcc477a0048bd0a596674ef60717b0ada72040f959ba2a334cea7d8f7d1.gif
Alex Xie · 1w
Maybe nostr:nprofile1qqszhwkw25l0a06cm42ezgtflykpzgltvysa0wsf9ak9qyz2lsc6emcpz3mhxue69uhhyetvv9ujuerpd46hxtnfduq3vamnwvaz7tmjv4kxz7fwwpexjmtpdshxuet5v4rnwd or nostr:nprofile1qqsthdwa5rs42euhnuz5xsrmms...
SatsAndSports profile picture
The second two of those points are 'easy' to think about, in the sense that it's just about detecting which peers are spammy/unreliable. If their Bloom advertizes they can reach nodes, but they rarely/never get the relevant signed CoordinateLookupResponses, then they are unreliable. It might take a long time to get the right balance of heuristics to make it work, but in principle it's solvable.

> Bloom filter validation — reject suspiciously dense filters
> Per-source LookupRequest rate limiting — cap flood generation

I'm less sure about the first two points though; solutions are not so obvious. I had a lot of fun with faking fake roots and fake ancestries and varying 'depths'.

> Root election with cost — proof-of-work, minimum age, or stake

Maybe the root should be the oldest node; although I'm not sure how to get consensus on that in a simple way.

> Per-entry ancestry signatures — already on their roadmap

Signatures won't stop me from firing up a million nsecs and signing many different ancestries and spamming the network. If I have many entry points into the network, then I can spam with new (fully-signed) ancestry paths very regularly

I don't say I have a solution, but I think we need to either make it difficult/slow to change the root in chaotic ways, *or* have a system which is robust to such chaos.

Ideally, a change of root will change only the direction of arrows on the spanning tree, without changing anything 'fundamental' about the tree. This should allow us to preserve the property that a spanning-tree-edge divides the network into two sets of nodes. Swapping the direction of edges doesn't change those divisions, and therefore I think the bloom filters don't need to be rebuilt immediately on every change of root

We might need to keep tracking of mutiple roots, and therefore multiple coordinates, during the transitions. Don't discard a given root until all your peers are happy with a different new root.

But I'll stop rambling now. I might not be making much sense. In any case, a written document which we could review would be useful to discuss how we might have a reasonably scalable and robust protocol
2👍1😯1🤙1
tigs · 1w
You are the first and only person to address a shit ton of what I brought up. Ty so much!!! Absolute legend.
tigs · 1w
No honestly... keep rambling on. This is taking me back years to when I was heavily more into this and I'm loving it.
florian · 2w
fips in linux over WASM ... this is crazy
SatsAndSports profile picture
Crazy yes 😀

But I kinda think the idea of a FIPS node in the browser might be useful.

The whole Linux and ipv6 thing was a bit silly (just fun for a demo) but a FIPS node that uses the FIP Native API might be useful to some people, and therefore the 'websocket' transport might be useful.

For example, imagine a Cashu wallet like cashu.me that is a PWA. It could have a minimal FIPS node built in to connect to a mint over FIPS.

For now, I'll ignore this. But curious if I/we/others should maybe follow up on this sometime
❤️1
SatsAndSports profile picture
Austrian economists claim they're the experts in predicting what will naturally become money, without realising that billions have happily used fiat and bank credit for decades, choosing the "wrong money"

A paraphrasing by Claude of Austrian thinking: "here are the properties that make a good money (divisibility, durability, portability, scarcity, etc.), and market processes will tend to select for those properties over time."

If your Austrian model can't predict the last few decades, then it's not a serious model 😜.

Maybe there needs to be a modernization of Austrian thought that acknowledges that speed is critical. I guess it comes under "portability"

Instant settlement is crucial. Privacy is important, not just as a good in itself, but because a lack of privacy is risky to the finality

#LightningFixesThis

1❤️21
tuma · 2w
Yes, speed is under portability. We could think of portability as the simplicity to move money around.