Articles

The Instrument Returns: An Introduction to Bitcredit

The Instrument Returns: An Introduction to Bitcredit

Bitcredit is the concrete protocol reconstructing bills of exchange on Bitcoin, closing the credit layer gap that prior posts have diagnosed.

Two Roads to a Network Without Permission: Reticulum and FIPS

Two Roads to a Network Without Permission: Reticulum and FIPS

Reticulum and FIPS both build permissionless encrypted meshes, but they differ radically in routing, crypto primitives, and their relationship to IP.

The Capital Structure of War

The Capital Structure of War

Cheap drones expose the state's war machine: centralized militaries accumulate fragile capital while decentralized force converts low-cost tools into strategic advantage.

The Problem They Said Could Not Be Solved

The Problem They Said Could Not Be Solved

The builders of the best encrypted messengers declared decentralized group encryption impossible. The Marmot protocol proved them wrong.

The Frequency of Dissent

The Frequency of Dissent

Mesh networks turn every radio into a relay and every user into infrastructure, creating communication grids with no center to seize.

Your Nostr Key Is Your Network Address

Your Nostr Key Is Your Network Address

FIPS makes your Nostr npub a routable network address, unifying identity across social and infrastructure layers in a single self-sovereign keypair.

The Merchant Court Returns

The Merchant Court Returns

Justice is a service that degrades under monopoly and improves under competition. Merchants proved this; now builders are proving it again.

Your Software Runs on Enemy Infrastructure

Your Software Runs on Enemy Infrastructure

Freedom tech projects build censorship-resistant tools on censorship-susceptible platforms. The Nostr stack offers a coherent migration path for sovereign development infrastructure.

Verify Anyone on Any Channel

Verify Anyone on Any Channel

A simple challenge-response app can verify Nostr identities across any anonymous channel by querying the follow graph users already built.

When They Come for the Protocols

When They Come for the Protocols

Governments cannot kill open protocols, so they imprison the humans who write them, spending $275 billion per year to catch nothing.

The Mathematics That Bridges Bitcoin: From BitVM to Argo

The Mathematics That Bridges Bitcoin: From BitVM to Argo

Cryptographic enforcement succeeds where trust fails, and nowhere does this principle matter more than in Bitcoin's quest for trustless bridges.

The Code Liberation: How AI Makes Software Infinitely Customizable

The Code Liberation: How AI Makes Software Infinitely Customizable

When AI handles compilation and patching tasks, source-based computing finally escapes the domain of experts, ending decades of binary distribution monopoly.

The Constitution That Isn't One

The Constitution That Isn't One

The Universal Principles of Liberty codifies libertarian jurisprudence as discovered law, providing a meta-normative baseline for decentralized justice without sovereign authority.

The Action That Accomplishes Nothing

The Action That Accomplishes Nothing

Decentralization does not prevent the adversary from acting against you. It ensures that his action accomplishes nothing.

Protocols for the Ungoverned

Protocols for the Ungoverned

Functional legal orders emerge from voluntary adoption and competitive governance, not top-down decree; history proves that polycentric law outperforms territorial monopoly.

The Right to Walk Away: Angor and the Future of Bitcoin Crowdfunding

The Right to Walk Away: Angor and the Future of Bitcoin Crowdfunding

Angor gives investors what ICOs and crowdfunding never could: the cryptographic ability to recover their funds if projects fail to deliver.

Algorithms as Identities: Why NIP-85 Matters

Algorithms as Identities: Why NIP-85 Matters

NIP-85 makes each algorithm a Nostr identity. Users follow algorithm-keys, see their outputs, and switch freely.

The Praxeology of Privacy ~ Chapter 17: Decentralized Social Infrastructure

The Praxeology of Privacy ~ Chapter 17: Decentralized Social Infrastructure

Nostr solves identity capture through cryptographic keys users control. Relays compete, moderation is market-driven, and the protocol extends beyond social posts.

Trust Without Ceremonies: How Nostr Fixed the Web of Trust

Trust Without Ceremonies: How Nostr Fixed the Web of Trust

PGP's web of trust failed because it demanded explicit rituals. Nostr succeeds by extracting trust from ordinary social behavior.

Own Your Outbox: Running Haven as Your Personal Nostr Relay

Own Your Outbox: Running Haven as Your Personal Nostr Relay

Your relay, your rules. Haven bundles four relay functions into one binary, easily deployable on a cheap VPS in an afternoon.

The Gap Between PIR and Nostr: Open Problems in Private Relay Queries

The Gap Between PIR and Nostr: Open Problems in Private Relay Queries

Can PIR hide Nostr queries from relays? Compound filters and subscriptions don't map to existing schemes. Here are the open problems.

Your Phone Without Permission Slips: The GrapheneOS Nostr Stack

Your Phone Without Permission Slips: The GrapheneOS Nostr Stack

GrapheneOS plus Zapstore, Amber, Citrine, Amethyst, and White Noise creates the first phone free from corporate control over your digital life.

When Can We Meet? Cross-Server Busy Sync for Nextcloud

When Can We Meet? Cross-Server Busy Sync for Nextcloud

Nextcloud can't sync busy times across separate instances. This bash script uses CalDAV to share availability between multiple Nextcloud servers without exposing event details.

No Papers Required: How Zapstore Breaks the App Store Checkpoint

No Papers Required: How Zapstore Breaks the App Store Checkpoint

Developer KYC creates chokepoints that authoritarian governments ruthlessly exploit. Zapstore restores permissionless software distribution using cryptographic identity instead of government papers.

The Great Decentralization Swindle: How Every Protocol But One Betrays Its Promise

The Great Decentralization Swindle: How Every Protocol But One Betrays Its Promise

The decentralized social landscape is littered with protocols that centralize through the back door. Nostr alone eliminates trusted third parties entirely, making it the only protocol where your identity truly belongs to you.

The Universal Principles of Liberty

The Universal Principles of Liberty

A voluntary libertarian legal framework built on non-aggression, self-ownership, and property rights, with decentralized arbitration replacing state monopolies on law.

The Protocol Rothbard Would Have Built

The Protocol Rothbard Would Have Built

Nostr implements Rothbard's anarcho-capitalist vision: cryptographic property rights, voluntary relay markets, and censorship-resistant communication without state-corporate gatekeepers.

Nostr-Native Distributed Storage System

Nostr-Native Distributed Storage System

The latest iteration of Garland, a privacy-preserving distributed storage system built on Nostr and Blossom, using erasure coding for durability and single-key recovery.

When Math Catches Your Typos

When Math Catches Your Typos

Bech32's BCH code detects up to 4 typos with 100% certainty, locates up to 2 error positions, but deliberately refuses to auto-correct to prevent catastrophic mistakes.

Garland: Your Keys, Your Files, No Trusted Third Party

Garland: Your Keys, Your Files, No Trusted Third Party

Garland turns Blossom blob storage into a virtual drive on your device. Your Nostr key is your password. No accounts, no cloud lock-in.

Curated Feeds: A Simpler Alternative to DVM Feeds

Curated Feeds: A Simpler Alternative to DVM Feeds

Replace DVM request/response overhead with simple replaceable events. Publishers maintain feed lists, clients just subscribe. No round trips, no privacy leakage

Owned by No One: Solving Nostr's Key Rotation Problem

Owned by No One: Solving Nostr's Key Rotation Problem

Nostr's greatest strength - that you own your identity through cryptographic keys - becomes its greatest weakness when keys are lost or stolen. This post introduces two simple, social solutions that let users mark compromised keys and rotate to new ones through community verification, without complex cryptography or pre-planning.

Bitcoin Address Lookup: A Question of Privacy

Bitcoin Address Lookup: A Question of Privacy

Bitcoin wallets face a fundamental tradeoff: how to discover your transactions without revealing your addresses. Full nodes (2009) provide perfect privacy by downloading everything but require ~700 GB storage. Electrum (2011) achieves instant sync by transmitting your addresses directly to servers, exposing your complete transaction history. Block filters (2017-2019) restore privacy through client-side filtering - you download compact filters, check them locally, and only request matching blocks, revealing just block-level interest. Utreexo (2019) compresses the UTXO set from 11 GB to 480 bytes using cryptographic accumulators while maintaining full-node privacy, but requires 20% more bandwidth. Each approach trades privacy, storage, bandwidth, and convenience differently.