Articles
120 articles
The Missing Credit Layer
The parallel economy has sound money and encrypted communication but still lacks the credit layer needed to finance production across time.
Every Crowd Hides You Differently
From Bitcoin CoinJoin to zero-knowledge proofs, every serious approach to financial privacy bets on a different crowd to disappear into.
The Hard Part of Multi-Device Messaging
MIP-06 proposes the protocol basis for White Noise multi-device group membership, letting each device securely join as its own MLS leaf.
The Capital Structure of War
Cheap drones expose the state's war machine: centralized militaries accumulate fragile capital while decentralized force converts low-cost tools into strategic advantage.
The Third Court: Insurance, Arbitration, and the Private Production of Justice
Insurance prices risk, arbitration resolves disputes, restitution makes victims whole, and cryptographic enforcement binds them all into one complete system.
Inside Marmot: Six Specs That Make Private Group Messaging Work
Six protocol specs define how the Marmot Protocol delivers fully encrypted group messaging on Nostr without centralized servers or metadata leaks.
The Machine Cannot Want Your Job
Smart machines relocate comparative advantage; the weaker worker keeps value only where human judgment, ownership, and presence still command a premium.
Chaining Agents Needs a Spine
Most agent chains fail because they pass work around without narrowing the task, and the Ralph loop forces actual, reliable closure.
The Problem They Said Could Not Be Solved
The builders of the best encrypted messengers declared decentralized group encryption impossible. The Marmot protocol proved them wrong.
Sign What You Cannot See: A Field Guide to Blind Signatures
Four decades of blind signatures show that one algebraic trick, letting someone sign what they cannot see, protects ecash and CoinJoin.
The vibes are strong with this one
Shaka reimplements PAI's personal AI architecture from scratch with different tradeoffs, and the fact that the same primitives survived the rewrite says something about the design.
The Frequency of Dissent
Mesh networks turn every radio into a relay and every user into infrastructure, creating communication grids with no center to seize.
The Frequency of Dissent
Mesh networks turn every radio into a relay and every user into infrastructure, creating communication grids with no center to seize.
Your AI Should Answer to You: PAI vs. OpenClaw
PAI turns Claude Code into composable personal infrastructure you own through Markdown files. OpenClaw routes messages through a daemon you maintain.
Your Nostr Key Is Your Network Address
FIPS makes your Nostr npub a routable network address, unifying identity across social and infrastructure layers in a single self-sovereign keypair.
The Market for Peace
War persists because profits concentrate among those who wage it while costs disperse across those who must suffer and pay.
The Price of Blood
Every civilization before the modern state treated crime as a debt owed to the victim, enforced through restitution and community insurance.
The Merchant Court Returns
Justice is a service that degrades under monopoly and improves under competition. Merchants proved this; now builders are proving it again.
Self-Liquidating Credit: The Instrument That Destroys Itself
Bills of exchange carried a built-in death date and extinguished themselves as goods reached market; modern debt compounds forever by design.
Your Software Runs on Enemy Infrastructure
Freedom tech projects build censorship-resistant tools on censorship-susceptible platforms. The Nostr stack offers a coherent migration path for sovereign development infrastructure.