After pairing, any page that uses window.nostr will automatically use this remote signer session.
If pairing stalls, close and reopen this dialog to generate a new ephemeral key.
Scan the QR code or copy the connection string.
Paste this into your signer app if it's on the same device.
Have an existing signer session?
Paste your connection string to reconnect.
Praxeologist ~ Cryptoanarchist ~ Cypherpunk
by Max
War persists because profits concentrate among those who wage it while costs disperse across those who must suffer and pay.
Money is neither vice nor virtue but the material expression of human judgment exercised through time. Only parasites hate it.
Security in autonomous zones means making attack uneconomical through deterrence, distributed defense, and eternal vigilance against any protector becoming predator.
Anonymous commerce requires solving the trust problem, and the solution may be to treat trust itself as a quantifiable, tradeable commodity.
Insurance prices risk, arbitration resolves disputes, restitution makes victims whole, and cryptographic enforcement binds them all into one complete system.
Justice is a service that degrades under monopoly and improves under competition. Merchants proved this; now builders are proving it again.
We're exploring an architecture for Garland: Cryptomator for encryption, Blossom for blob storage, Nostr for state. Your nsec becomes your Cryptomator password. We think this works - but we'd love your feedback before we commit.
Bitcoin plus Nostr creates programmable money that solves software monetization through micropayments respecting user sovereignty.
Shaka reimplements PAI's personal AI architecture from scratch with different tradeoffs, and the fact that the same primitives survived the rewrite says something about the design.
Most agent chains fail because they pass work around without narrowing the task, and the Ralph loop forces actual, reliable closure.
Developer KYC creates chokepoints that authoritarian governments ruthlessly exploit. Zapstore restores permissionless software distribution using cryptographic identity instead of government papers.
The state is not society's protector but its predator, surviving through ideology and intellectual capture, growing through war, vulnerable to withdrawn consent.
Garland turns Blossom blob storage into a virtual drive on your device. Your Nostr key is your password. No accounts, no cloud lock-in.
GrapheneOS plus Zapstore, Amber, Citrine, Amethyst, and White Noise creates the first phone free from corporate control over your digital life.
Smart machines relocate comparative advantage; the weaker worker keeps value only where human judgment, ownership, and presence still command a premium.
Good security engineering means naming your enemies. Marmot's threat model specifies exactly which adversaries it defeats and how it defeats them.
Rothbard's typology classifies all state intervention into autistic, binary, and triangular forms, revealing the common thread of coercive aggression beneath policy complexity.
Decentralization does not prevent the adversary from acting against you. It ensures that his action accomplishes nothing.
Nextcloud can't sync busy times across separate instances. This bash script uses CalDAV to share availability between multiple Nextcloud servers without exposing event details.
FIPS makes your Nostr npub a routable network address, unifying identity across social and infrastructure layers in a single self-sovereign keypair.
Install this app on your device for quick access?