🫎 on Nostr: The protocol is more than code, code itself is just abstract power, just as written ...
The protocol is more than code, code itself is just abstract power, just as written and spoken language are.
The protocol is LITERALLY a PHYSICAL power projection technology.
And if people are legally allowed to use lethal kinetic power projection (guns) then it would clearly protect people utilizing non-lethal electronic physical power projection.
2A isn't an attack vector, it's the strongest legal argument you have for protecting bitcoin mining and the network.
Published at
2023-04-13 22:14:08Event JSON
{
"id": "64dd23064e246f429ed58211b2919f02c8e643f9ecd3625d01d6bc3650baf9f2",
"pubkey": "519013f92db5737977a9334439e57d48c67028316b9972e601eb690b2d76d34e",
"created_at": 1681424048,
"kind": 1,
"tags": [
[
"e",
"a5d6a74ade99d557d0683d15531d809f7e16841b62c6d4aa09cc4b2222f7759c"
],
[
"e",
"700a12c4b36fb77af3b61a967a1484cda705bf6038f5c069af74218f97e11458"
],
[
"e",
"cfd8c4a22075389ba5275d942242f79e899668dced126188d6daee288b4e8ac5"
],
[
"e",
"13295a99999e463b168fd8f4437eec4ae3998d2ee05a58991208a40d3863b1b6"
],
[
"e",
"78acff7da3791ad5e5020a75feadb4915966cd0d6c948dbf7509687d78253894"
],
[
"e",
"e7955cfedd3d5d32815edcc48e54e14d862d320f30cacbcb3aa4d4dc42052b66"
],
[
"p",
"b0c9eb8db72991857e8c22e3dedfe4bd2287ec62292c03f2ea7e094d8799aa79"
],
[
"p",
"b0c9eb8db72991857e8c22e3dedfe4bd2287ec62292c03f2ea7e094d8799aa79"
],
[
"p",
"00d6405712afbf1aa7b7df1bc39821e666963594ee90883ff9f6cf21570b5106"
],
[
"p",
"519013f92db5737977a9334439e57d48c67028316b9972e601eb690b2d76d34e"
]
],
"content": "The protocol is more than code, code itself is just abstract power, just as written and spoken language are.\n\nThe protocol is LITERALLY a PHYSICAL power projection technology.\n\nAnd if people are legally allowed to use lethal kinetic power projection (guns) then it would clearly protect people utilizing non-lethal electronic physical power projection.\n\n2A isn't an attack vector, it's the strongest legal argument you have for protecting bitcoin mining and the network.",
"sig": "fb15e98c4eec30cfaecd8425e87e17464ba26c4f8008459bd401b34f087c09e7d8c9288bfd0ed3d5e6bb3d1ba2527954fac20354254f6b20b19490345bfd8212"
}