daniele
Working https://nstart.me, https://njump.me, https://oracolo.me, Gossip, Coracle and other inspiring nostr projects. I love to build helpful things that people are pleased to use, mixing tech, design, usability and accessibility.
https://github.com/dtonon
daniele
10/27 9:04:57
π
nostr:npub1syjmjy0dp62dhccq3g97fr87tngvpvzey08llyt6ul58m2zqpzps9wf6wl why did you decide to set the single column as default?
nostr:nevent1qvzqqqqy9spzpqf9hyg76r55m03spzstujx0uhxsczc9jg70l7gh4elg0k5yqzyrq9w8wumn8ghj7urjdau8jtnwdaehgu3dwfjkccte9eshqup0v9jnxvrzvyerxdejvdjkgdnrxyunvvryxsukxvpjxcmxveryxdjnqdmrv4sn2vnzx93xvveh8pnxgc3k8q6xzet9xcenvvmyv43ngdspz4mhxue69uhhyetvv9ujuerpd46hxtnfduhsqgrgf97f45g78352n8rpelqwez22ufry48uq0e5dun88w4ydy4uk4cdut6xd
daniele
10/21 20:38:30
π
What are jumblekat's features?
β¬
Karnage
10/21 19:34:57
π
Iβm so used to charge zapping people on jumblekat that it feels odd not being able to do it in other clients π«
daniele
10/7 15:48:55
π
Like all AI, he is lying to save resources.
β¬
045406221e2dd3c0f1b311ea0658991b3d352e583ea85d964e3cc870b68f61c0
β¬
ecf75363f014539380ffa7da2ec36380128fb80c01ad8958fbd12f0a67e4ae03
β¬
e31b7f24002b2a422cb7008196faeb2a47b861970ce24fc3d6b206a267cc1358
daniele
10/3 21:56:48
π
You can delegate to optimize your resources, but it's always a risk. You have to balance it.
β¬
Karnage
10/3 21:52:02
π
It would be too much info to moderate and sort through. You need some way to know which version is more reliable without having to rely on your very limited and likely uninformed web of trust.
β¬
daniele
10/3 21:39:27
π
Yes.
I think the solution is quite simple: you are your own moderator, and you need to carefully decide which sources deserve your attention and energy.
If someone is unable to consciously support this, for example a child, access to information must be mediated, by humans, not technology.
nostr:nevent1qvzqqqqqqypzqwlsccluhy6xxsr6l9a9uhhxf75g85g8a709tprjcn4e42h053vaqyd8wumn8ghj7urewfsk66ty9enxjct5dfskvtnrdakj7qgmwaehxw309aex2mrp0yh8wetnw3jhymnzw33jucm0d5hsqg9s69lxvazyuz3hhk04nrr38gd94d50wgmkutaucanxpj7nrlc5pqs83c9e
daniele
9/16 15:35:52
π
Random ask without knowing if you actually have a laptop? They smell like fraudsters, but they should be quite brave to wear a fake security uniform in an airport.
Or they were testing some theory and gatterimg data.
β¬
Karnage
9/16 12:05:36
ππ€
Have you ever been asked for your laptop password at airport security? Is this a thing?
I was traveling domestically in Japan and security asked for laptop password. This obviously set off red flags immediately, especially considering I didnβt have a laptop with me. If I did, I wouldβve denied them access without question but itβs strange that they even asked me. It wasnβt even customsβ¦ just regular olβ security screening.
Also, looking around, I didnβt see any manual inspections of any other laptops around me. Itβs as if I was singled out.
daniele
8/26 23:56:51
ππ€
I just discovered a fascinating thing.
I've been struggling to solve an internet problem at my parents home for several days, a router and some other stuff cannot connect to internet; the strange part is that my PC and my phone work. My first thought was related to the fact that I use a VPN, but this doesn't make much sense, since VPNs usually are the problem, as they add one more hop to the connection chain.
I did a lot of tests and at the end, exhausted, I decided to order a new cheap router to see if this was the culprit. Today I installed it, same exact problem, damn.
So I noticed that the modem has a diagnostic area with the usual ping and traceroute tools, and I tried them: "unknown host".
This is really crazy, all the WAN/LAN are down, the modem itself cannot see the internet, but with my PC I can connect around and shitpost on Nostr?
So I contacted my ISP and discovered that they suddenly, and without any alert (bastards), disabled the line because there was an unpaid invoice from months ago for an unknown reason, and they are not smart enough to use the credit card they already have to automatically pay it.
Here comes the most interesting part: how does a VPN bypass the administrative suspension on a line and give me free internet?
Did I exploit a huge hole in my ISP (and who knows how many others) infrastructure?
Can any networking guru explain this?
daniele
8/25 22:31:23
π
This is an interesting point of view, and we already explored it when WoT entered the scene: if you follow someone that you don't trust, with the current WoT implementations you validate him anyway, since he is present in your social graph. This is a problem, that probably lists could easily solve.
And if this is the path, "contacts" could effectively have a (minimal) trust meaning.
β¬
Karnage
8/25 22:26:17
π
I definitely donβt see reading or even replying as any form of relationship. Follow is very different to me and does not signal trust of any kind. I can follow just to see what a person is about without ever trusting them. Contacts sounds like we keep in touch and I added them to be in touch. But thatβs not really why I follow - they havenβt earned the right to be a contact.
β¬
daniele
8/25 22:22:31
π
For me reading someone writings, replying, reacting, zapping is a form of relationship.
And we don't have only social clients, we have many other, often hybrid, apps. The most used Nostr apps have DMs along the social feed.
β¬
Karnage
8/25 22:07:00
π
Meh. They are not our contacts though. That implies some sort of dm relationship and thatβs not whatβs happening.
β¬
daniele
8/25 21:54:49
π
It's apparently a not so important issue, probably already discussed, but: what do you think if your client switched from the "Follows" label to the "Contacts" label?
"Contacts" seems more immediate, also for not English speakers, it removes the follows/following possible confusing overlap, and especially it opens to a more interoperable scenarios (DMs, "other stuff" use cases, etc). I don't see any particular drawbacks.
What do you think?
#asknostr
daniele
8/25 18:52:02
π
I think it was pure coincidence, discovered after the fact.
β¬
Karnage
8/25 18:07:54
π :nostrich: β€ π― π€
Whether we want to admit it or not, the name bitchat played a huge role in making the app more interesting.
Had it been named decentralized mesh app - no one would care.
Just goes to show how important it is to position and brand.
daniele
8/8 16:36:35
π
Serving media in Blossom can be managed with a redirect, like you do, and this offer a good degree of flexibility to separate the upload endpoint and the actual storage.
> Note that the "<sha256-hash>" part is from the original file, not from the transformed file if the uploaded file went through any server transformation.
Instead I find this part quite problematic because it does not easily permit to test the file integrity. I need a nip94 event or an imeta tag with the "x" value to check it.
Media transformation is a powerful feature but adds a lot of complexity.
Finally I don't read in the nip anything about mirroring (not only multiple uploads) of the assets, and fallbacks in the download procedure, aspects that seem important in the decentralized context of Nostr.
β¬
The Fishcake (nostr.build)
8/8 9:56:25
π
NIP96 does not prescribe how I serve the media (endpoint to be specific) and allows me to make a more reliable service with a clear separation of concerns. In blossom I am forced to accept uploads and serve media from the same exact hostname, therefore forcing me to make trade-offs that hurt speed or availability.
β¬
daniele
8/8 6:59:33
π
I got it, thanks.
Btw it seems that Blossom is getting more traction than nip96, isn't?
Why do you prefer nip96?
β¬
The Fishcake (nostr.build)
8/8 6:10:03
π
The standard (and recommended) way is nip96, blossom protocol in our case is just an addon and it gives you a link that will redirect to the original media
β¬
daniele
8/8 6:00:12
π
Oh, image.nostr.build is not Blossom?
Now I see that blossom.nostr.build exists.
β¬
The Fishcake (nostr.build)
8/8 5:56:04
π
Thatβs not how it works, only Blossom, not the standard one.
β¬
daniele
8/8 0:46:02
ππ€ π€£
nostr:npub1nxy4qpqnld6kmpphjykvx2lqwvxmuxluddwjamm4nc29ds3elyzsm5avr7 this image has the wrong hash in the url:
It should be e63f8c6dbe7423b2d5cf62a0b5b64b556bac5234ad501ea295742d5cda4717e4
daniele
8/3 23:06:09
π
It's ready!
Bitalk: connect and talk face-to-face with interesting people around you who share the same interests as you, using cutting-edge Bluetooth mesh networking!
Bitalk is in beta stage, I need to fine-tune the UI&UX a bit, but it should work pretty well already. Test it and give back feedback!
Download Bitalk for Android:
https://github.com/dtonon/bitalk/releases
More info and source code:
https://github.com/dtonon/bitalk
Thanks nostr:npub1sg6plzptd64u62a878hep2kev88swjh3tw00gjsfl8f237lmu63q0uf63m and nostr:npub12rv5lskctqxxs2c8rf2zlzc7xx3qpvzs3w4etgemauy9thegr43sf485vg for the inspiration!
nostr:nevent1qvzqqqqqqypzq77777lz9hvwt86xqrsyf2jn588ewk5aclf8mavr80rhmduy5kq9qy88wumn8ghj7mn0wvhxcmmv9uq3qamnwvaz7tmwdaehgu3wd4hk6tcqyz4prm4zns29t5fmjm2ldwjvsrnjyupmnm9m56v93ag9ach84u8qcdwz8zj
daniele
2/25 14:37:47
π
And they also launched Claude Code, for interactive projects editing.
β¬
β¬
iefan ποΈ
2/25 8:54:14
π
it's the best model for coding & math stuff. nothing else even comes close!
β¬
β¬
iefan ποΈ
2/25 8:49:38
ππ€
just spent hours coding with claude 3.7 sonnet, here is what I have to say
daniele
10/14 19:44:31
π
If I'm not wrong, nostr:npub137c5pd8gmhhe0njtsgwjgunc5xjr2vmzvglkgqs5sjeh972gqqxqjak37w some time ago wrote about his experience about filtering out CSAM content.
β¬
Constant
10/13 23:31:53
π
Hello Nostr, if you are in a great mood just skip this post; its depressing.
So I had not encountered it before, but yesterday I crossed paths with Child Sexual Abuse Material on Nostr. In my regular internet usage over the years I have rarely come across this stuff, though I guess if I were to look for it I would find it eventually;
That is to say, the status quo is that it does exist, but most people most of the time wont have to deal with it. I think this is important to realize that the world is not perfect as it is, when reflecting on these matters in the context of Nostr.
It goes without saying, but just to be clear: yes I think we should all learn how to tie nooses and identify adequate oak trees.
However marginalized CSAM is, some people want governments to go above and beyond to combat it. Prime example currently is the βChat controlβ regulation proposed out of the EU, which wants to install bigbrother client side on your phone to scan every single thing you do in order to flag any suspicious behavior/content, before it gets encrypted. How understandable the motivation might be, even advocacy groups and agencies dealing with the CSAM problem are against this type of stuff, if not just simply because they are already swamped with work/processing of material as it is; opening the floodgates with false positives wont help anything and probably make the situation worse. Aside from the obvious objections to forcibly installing big brother on peoples hardware of course.
Back to Nostr. On the one hand we have the end-user, that does not want to get confronted by this material. From this perspective, CSAM is just one of the many things a user might want to filter out, along with other material that might not be illegal per se but just NSFW etc. Whatever means we find to do this, failure by those mechanisms to do so is bad, unwanted etc. but not a direct systemic risk to Nostr; like I mentioned in the beginning, it is not impossible to accidentally come across this type of stuff on the internet today as is, and the whole world is still using it.
But it does become a systemic issue from the relay perspective. Here, it is not some incidental bad experience that can be clicked away. It is a crime to host this type of material which brings in the risk of prosecution for βsimply running a relayβ that some asshole decided to nuke with CSAM or other illegal material.
But here my optimism comes in. Nostr is pro censorship; the theory is that every relay can moderate to their hearts content, because users are ultimately always able to route around such obstacles (very much like βthe internetβ itself). This means that that relays should be able to adjust their policies and methods of moderation to their capacity to deal with unwanted content and risk appetite. From a locked down white-list only relay on one side of the spectrum, all the way to an open relay with heavy sophisticated analytics for assessment and filtering, and everything in between: albeit that it wont deliver us a perfect solution in all cases, it will remove the dark cloud of systemic risk to the protocol/network, because we are able to sufficiently marginalize the phenomena.
On a last note: when talking about filtering/assessing for this content it gets complicated really quickly. You can imagine some AI performing such a task, or using lists of known content to filter; however you want to do it, you first come to the question on how you construct that stuff in the first place; it requires gathering such content and human eyes looking at it. And then subsequently you produce tooling that can be flipped around and used as a search engine to seek and find such material instead of filtering it away. So yeah, there are no graceful perfect solutions I am afraid.
Well, there is one of courseβ¦.
https://cdn.satellite.earth/a92bdd80dbd45e00636a9db615061eef168c3164a0e1bfa1abfb0784e74cd24e.mp3
daniele
10/5 18:19:43
π
A piece of history.
Cool stand, too.
β¬
muneomi π―π΅
10/5 18:11:12
π π€
A camera that belonged to my late father. Tomorrow, I plan to go buy a lens for this cameraπ·
daniele
9/24 0:16:21
πβ€οΈ
While everyone is getting nervous about spam, say hello to Chronicle!
https://github.com/dtonon/chronicle
Chronicle is Nostr personal relay, built on the Khatru framework, that stores complete conversations in which the owner has taken part and nothing else: pure signal.
This is possible since writing is limited to the threads in which the owner has partecipated (either as an original poster or with a reply/zap/reaction), and only to his trusted network (WoT), to protect against spam.
Chronicle fits well in the Outbox model, so you can use it as your read/write relay, and it also automatically becomes a space-efficient backup relay.
Try it out, and let me know if you find it useful and how it can be improved!






