Pinned toot

lightning node information 

I just thought of a cake in the shape of a Hilbert curve to optimize for the best part of the cake: the edges, then I discovered someone already made it! I'm glad that there are brains out there that think about the same stuff as me.

@harald @alcinnz
Fuck no.
I mean, you can use -Werror in dev builds if you want, but don't fuckin dare to use -Werror in source releases.

Newer versions of compilers often add warnings about mostly-harmless things and then suddenly your software doesn't build on gcc 8, because you have a kind of unused variable that older gccs didn't realize was unused.


Greg Maxwell's explanation on why he's not on Twitter goes pretty deep, and makes some good critical points about the pitfalls of (purposefully) limited communication space:

i need a new desktop and am thinking of buying a Raptor Computing TALOS II instead of spending a lot of time trying to figure out what Intel/AMD mainboard is compatible with Linux and supports disabling the ME backdoor engines and and how to and whatnot…

does anyone have suggestions what to buy? i'm not sure about the "Development System" versus "Secure Workstation" distinction, for example. Is the price difference mostly/only in the certification?

Apple's increasing requirements (now notarization) are making it more and more difficult to distribute binaries for open source software

if this requires proprietary tools running on MacOS, this is the end of the gitian deterministically built binaries for that platform

is there an objdump/readelf-like command (or flag) that can list all imported symbols for a ELF binary but *grouped per library*?


now THIS is my kind of Python book. apologies to the fine folks at O'Reilly. 😂

New rule: you're only allowed to post about sudo if (ALL, !root) is actually part of your config.

mastodon 3.0.1—AHHH just upgraded to 3.0, unless anyone is really bothered with some problem fixed there i'm going to wait this one out

Tomorrow's Bitcoin Core PR review is on ajtown's PR 16939 "Delay querying DNS seeds if addrman is populated (p2p)", hosted by John Newbery. We also discuss merged PR 15558 by sipa -- is there a bug to fix? Full details, notes, and questions are up at


Remarkable history of building radios during the second world war in prisoner of war camps. Very few premade components and all schematics were from memory!

At tomorrow's Bitcoin Core PR review meeting, we will be looking at PR #16202 "Refactor network message deserialization" by Jonas Schnelli. It's been a high-priority PR for some time. Please review the PR and prepare the notes and questions before the meeting if you can. See you tomorrow!


Any recommendations from the Scaling Bitcoin 2019 set of talks?

I'm continuing my exploration of the cypherpunks mailing list. Here is a mail from Tim May discussing the rationale and risks of a cashless society which is eerily relevant for today (it's 1992 folks!)

"The vulnerability that is being exploited in all systems is identity" - Snowden

Show more
unidentified instance

(instance image by мøтħer ¢røω)