What is Nostr?
quantumdrc / Dr. C
npub1p5y…vx3q
2024-03-23 15:51:58

quantumdrc on Nostr: When talking about oppressive and authoritarian regimes, in practice we are talking ...

When talking about oppressive and authoritarian regimes, in practice we are talking about the methods they use to suppress the thriving of certain individuals. This can be accomplished in several ways and commonly includes financial oppression and suppression of speech.

What makes #nostr so revolutionary is the disruption of the reliance on a centralized authority. This in effect helps to bypasses one of the easiest ways to dominate groups of people - by aggregating power and using it to wield the weapons of #oppression to prevent the thriving of certain groups of individuals.

Example

Have you ever been on the wrong side of an algorithm? If in the US we are entitled to equal opportunities for work, and people are turning to launch their businesses on social media but are shadow banned because of political or religious beliefs (or other), is this not a violation of the right to the equal opportunity for work? How is it legally okay to arbitrarily limit the exposure of certain individuals in favor of others who perhaps are the “right” age, gender, race, or beliefs? And what does it mean if the boardroom of said companies is allocated to a tiny few who overlap across many important industries and who may be influenced by backroom deals, lobbying, or bonus packages?

The mark of a courageous person is not what they would do in theory, but what they do when faced with the reality.

We are at a precipice of change and #liberation. Protecting #freespeech is just one aspect of this. In my opinion, the developers of the Nostr protocols and client apps are heros. Let's zap them and show them love, and please pay for monetization of features if you can because this is a serious issue and they are what courage and action are all about.

But we have another potential issue to address.

There are many people who knowingly or unknowingly are already in the hands of oppressive influences and the abuse of technology. I am one of them coming from what I believe was a state sponsored attack or an organized crime group with deep pockets.

Every device (phone, laptop, tablet), every ISP (Verizon, AT&T), every operating system (Android, MacOS, iPhone, Windows, Kali Linux) was infiltrated. Moving out of state did not help and I only began receiving relief from the financial suppression when moving out of the country because the fake companies set up were all American so the false charges revealed the shell fraud companies.
My communications have been intercepted, changed in transit (yes even using a VPN and service like Proton Mail, WhatsApp, and Signal). I have been denied work and have received a surprising number of non-responses from jobs despite my prestige of credentials and capabilities. This is happening to others but they did not have the savings to invest in teaching themselves computer forensics for a year or the technical background to grasp it quickly (I have a biomedical PhD and am experienced working with highly technical data and programs).

What I found stunned me. I tried to talk about it in another post this morning which surprisingly did not post even though I was using the most reliable client Damus, on what should be a “safe” device. Perhaps it is because I spoke about the particular highly unique file type that broke the leading forensics software at that time (XWays) even though I was examining a cold harddrive disk loaded read-only. Very recently this very unique file type was sent to me in an unusual manner which may have resulted in the resurgence of a man-in-the middle attack.

I have numerous posts that I have tried to push through to Nostr using several client apps (Amethyst, Primal, OpenVibe, Damus), with a very poor reliability.
My question to the #asknostr community is if there are end point infiltrations, how do we help people who are trying to break free of oppressive influences? They may not have any idea and blame the apps or system. For example, if my device is sending many requests without my knowledge, the relays will automatically block me as a spammer, right? What if this is a subversive technique to ensure that I, and others cannot get help? You see how the ideal and vision becomes compromised unknowingly?

As an aside - I may be in the possession of some hot devices with very pervasive and promiscuous software if any white hat #security professional is interested in procuring or remotely working with me. I cannot work on a volunteer basis as my savings has already been spent and I am not doing great financially because the algorithms are super slow to expose my esoteric content to people (it does not follow the traditional mainstream feel). If you reach out to me, I will respond same day or within 24 hours. So if you do not receive a reply, then I did not receive your message.

God help us all.

#nostriches #security #technology
Author Public Key
npub1p5ynxyx7fcd3m3tvxrap6hm0pw0vy83uqaeg5fuuqaneguhc96yqypvx3q