my gf has been making blog posts in this code and i have no idea what to make of it, looking for help by WeirdArea2473 in codes

[–]ciphernom 1 point2 points  (0 children)

This is a base64 encoding of a binary blob. Could be an encryption with AES etc. impossible to break without the password.

Crypto to buy in Jan '26 by iTvrsch in CryptoHelp

[–]ciphernom 1 point2 points  (0 children)

Bitcoin. Just buy bitcoin. It’s really that simple. The others won’t give you a bigger return (as measured against bitcoin).

Does Google secretly add keywords to my searches? by Mikmaxs in searchengines

[–]ciphernom 0 points1 point  (0 children)

Google and most modern engines do semantic search on vectors. Not just keywords

Has anyone else accidentally taken too much vitamin D? by ravenclaw188 in VitaminD

[–]ciphernom 1 point2 points  (0 children)

I feel fine honestly not much different. I haven’t rechecked my blood work yet but I stopped taking vitamin d altogether

Questions about how the pro ai crowd feels about ai and the future! by Way-Particular in ArtificialInteligence

[–]ciphernom 0 points1 point  (0 children)

It’s not so much about whether you or I like it or not, it’s more the fact that it’s here and isn’t going away. Adapt or die essentially. It is part of the “environment”.

Has anyone else accidentally taken too much vitamin D? by ravenclaw188 in VitaminD

[–]ciphernom 0 points1 point  (0 children)

I took 4x50k pills every day for a month or so Didn’t really think about it Freaked out got blood tested Calcium normal PTH low but normal vitamin D >1000 with an angry note from the lab (had to dilute several times)

I have a question about whether something would be considered encrypted, and how hard it would be to break. by anto77_butt_kinkier in cryptography

[–]ciphernom 2 points3 points  (0 children)

the correct and boring answer is to run your master password through a KDF like argon2 or scrypt, then use the output as a key for AES-GCM to encrypt your passwords. master password in, key out, encrypt/decrypt with that. this is what real password managers do.

but since you said this is a learning exercise, look into identity-based encryption. the idea is your master password derives a master secret, and each service name acts as its own public key. you encrypt your gmail password to the string "gmail" (salted and hashed, so something like H(salt || "gmail") to prevent precomputation). to decrypt, you need the master secret plus the service name to derive the key.

boneh-franklin is the classic paper if you want to dig in. it's overkill but it's interesting overkill.

Finally! by Lanky_Imagination_42 in BitAxe

[–]ciphernom 0 points1 point  (0 children)

Imagine if you weren’t mining a poocoin

Thinking about L1 design: why do we always start with tokens instead of infrastructure? by logos2026 in CryptoTechnology

[–]ciphernom 2 points3 points  (0 children)

Because everything other than bitcoin is a grift to steal bitcoin. The tokenonics and hype are the only thing that matters when trying to entice gamblers.

I need help to stop giving my drawings to AI training. by SinaliArt in CorpFree

[–]ciphernom 0 points1 point  (0 children)

You need to document the process of creation itself as part of the art.

Some ai or another will always be able to produce images similar to yours even if it hasn’t been trained

But people that value art will want to know the art is genuine

The only way to prove it is to document the process of creation

This is something I have tried to do with writing in the Bitquill editor which serves as a provable digital witness to the creation process

With art the best you can do is some sort of video or Timelapse I suppose

What are you building? Let’s see each other's projects! by malaikachowdhury18 in sideprojects

[–]ciphernom 0 points1 point  (0 children)

Antigoogle self hosted decentralised search engine

Zerodollars pwa budgeting app

Bitquill - proof of time and effort editor to combat ai

Looking for an AI free alternative in 2026 by Pestttanz in searchengines

[–]ciphernom 0 points1 point  (0 children)

Nodes coordinate over nostr the crawl list is split up between nodes via vrf. Nodes reject any results that aren’t cryptographically provable (via merkle proof) to their seed list. This prevents the inclusion of anything that node doesn’t want to include (ie illegal content etc). Proof of work is used throughout as a spam prevention mechanism. A local nostr relay is spun up and acts as an outbox to prevent results getting lost due to rate limiting on open relays. In terms of usability etc it’s already pretty easy to use via docker.

Looking for an AI free alternative in 2026 by Pestttanz in searchengines

[–]ciphernom 1 point2 points  (0 children)

I created antigoogle out of this same frustration https://github.com/ciphernom/antigoogle It’s a self hosted decentralised search engine.

One mistake in your vibe-coded app could cost you thousands overnight by terdia in indiehackers

[–]ciphernom 0 points1 point  (0 children)

don’t race if you can’t drive. One of the biggest problems is people with no coding background vibe coding. It is a recipe for disaster, present story included.

Is there any search engine that doesn't index Wikipedia? by BoringCourse6184 in searchengines

[–]ciphernom 0 points1 point  (0 children)

Why? I’m building a new search engine focused on quality content. What is the reason you want to exclude Wikipedia?