Alex Gleason on Nostr: Well, public key cryptography lets us have an ID, and then prove that we own it. We ...
Well, public key cryptography lets us have an ID, and then prove that we own it. We could even publish a record from that ID, instructing people to connect by following a set of directions. But what are those directions? "Go straight down the pipe, then turn left, then turn right"?
Hardware addresses only work in a trusted setting.
Of course this also assumes we get rid of all the major telcoms and lay our own lines and create a whole new internet. But assuming we did that, could it be possible?
Hardware addresses only work in a trusted setting.
Of course this also assumes we get rid of all the major telcoms and lay our own lines and create a whole new internet. But assuming we did that, could it be possible?