<rss
      xmlns:atom="http://www.w3.org/2005/Atom"
      xmlns:media="http://search.yahoo.com/mrss/"
      xmlns:content="http://purl.org/rss/1.0/modules/content/"
      xmlns:itunes="http://www.itunes.com/dtds/podcast-1.0.dtd"
      xmlns:dc="http://purl.org/dc/elements/1.1/"
      version="2.0"
    >
      <channel>
        <title><![CDATA[Alex Emidio]]></title>
        <description><![CDATA[Bitcoin on-chain , Privacidade, software livre. don’t trust, verify. PGP: 5B4F B81C F3AF 1629]]></description>
        <link>https://alex-emidio.npub.pro/tag/privacidade-criptografia-cypherpunk/</link>
        <atom:link href="https://alex-emidio.npub.pro/tag/privacidade-criptografia-cypherpunk/rss/" rel="self" type="application/rss+xml"/>
        <itunes:new-feed-url>https://alex-emidio.npub.pro/tag/privacidade-criptografia-cypherpunk/rss/</itunes:new-feed-url>
        <itunes:author><![CDATA[Alex Emidio]]></itunes:author>
        <itunes:subtitle><![CDATA[Bitcoin on-chain , Privacidade, software livre. don’t trust, verify. PGP: 5B4F B81C F3AF 1629]]></itunes:subtitle>
        <itunes:type>episodic</itunes:type>
        <itunes:owner>
          <itunes:name><![CDATA[Alex Emidio]]></itunes:name>
          <itunes:email><![CDATA[Alex Emidio]]></itunes:email>
        </itunes:owner>
            
      <pubDate>Tue, 02 Jan 2024 17:23:01 GMT</pubDate>
      <lastBuildDate>Tue, 02 Jan 2024 17:23:01 GMT</lastBuildDate>
      
      <itunes:image href="https://m.primal.net/ICAC.jpg" />
      <image>
        <title><![CDATA[Alex Emidio]]></title>
        <link>https://alex-emidio.npub.pro/tag/privacidade-criptografia-cypherpunk/</link>
        <url>https://m.primal.net/ICAC.jpg</url>
      </image>
      <item>
      <title><![CDATA[O Cyphernomicon: Criptografia, Dinheiro Digital e o Futuro da Privacidade") escrito por Timothy C. May -Publicado em 1994.]]></title>
      <description><![CDATA[]]></description>
             <itunes:subtitle><![CDATA[]]></itunes:subtitle>
      <pubDate>Tue, 02 Jan 2024 17:23:01 GMT</pubDate>
      <link>https://alex-emidio.npub.pro/post/1704216068079/</link>
      <comments>https://alex-emidio.npub.pro/post/1704216068079/</comments>
      <guid isPermaLink="false">naddr1qqxnzdesxserzd3sxcurqdeeqgsyh28gd5ke0ztdeyehc0jsq6gcj0tnzatjlkql3dqamkja38fjmeqrqsqqqa28yj3slr</guid>
      <category>#privacidade #criptografia #cypherpunk</category>
      
        <media:content url="https://nostrcheck.me/media/public/nostrcheck.me_2594252621887553901704215095.webp" medium="image"/>
        <enclosure 
          url="https://nostrcheck.me/media/public/nostrcheck.me_2594252621887553901704215095.webp" length="0" 
          type="image/webp" 
        />
      <noteId>naddr1qqxnzdesxserzd3sxcurqdeeqgsyh28gd5ke0ztdeyehc0jsq6gcj0tnzatjlkql3dqamkja38fjmeqrqsqqqa28yj3slr</noteId>
      <npub>npub1fw5wsmfdj7ykmjfn0sl9qp533y7hx96h9lvplz6pmhd9mzwn9hjqvq2rfr</npub>
      <dc:creator><![CDATA[Alex Emidio]]></dc:creator>
      <content:encoded><![CDATA[<p>The Cyphernomicon de May é uma coleção de ensaios sobre criptografia,dinheiro digital e privacidade, escritos por ele e outros autores influentes no campo da criptografia e da tecnologia. O livro aborda tópicos como a história da criptografia, os fundamentos da criptografia de chave pública, a privacidade na era digital, a criptografia como uma ferramenta para a liberdade individual e o papel do dinheiro digital na sociedade.</p>
<p>Os ensaios contidos no livro exploram as implicações políticas, sociais e tecnológicas da criptografia e do dinheiro digital, bem como os possíveis cenários futuros que poderiam surgir a partir dessas tecnologias. O "Cyphernomicon" é considerado um texto influente na comunidade cypherpunk, um movimento que busca promover a privacidade, a criptografia e a liberdade individual por meio da tecnologia.</p>
<p>Cyphernomicon não seja amplamente conhecido fora dos círculos especializados em criptografia e tecnologia, ele continua sendo uma leitura relevante para aqueles interessados em entender as questões relacionadas à privacidade, segurança digital e o impacto da criptografia na sociedade.</p>
<p>Parte 1.</p>
<p><np-embed nostr="note1cn0rmasgq4uwl25exnp25l8kk605rgzwnt0f55xanlhnsfqpue6sk7fmga"><a href="https://njump.me/note1cn0rmasgq4uwl25exnp25l8kk605rgzwnt0f55xanlhnsfqpue6sk7fmga">nostr:note1cn0rmasgq4uwl25exnp25l8kk605rgzwnt0f55xanlhnsfqpue6sk7fmga</a></np-embed></p>
<p>Parte 2.</p>
<p><np-embed nostr="note107vv538eqewfv6uma8tem9c6auylek94tv6jdnw3nxrwnnqr43mqc5pd74"><a href="https://njump.me/note107vv538eqewfv6uma8tem9c6auylek94tv6jdnw3nxrwnnqr43mqc5pd74">nostr:note107vv538eqewfv6uma8tem9c6auylek94tv6jdnw3nxrwnnqr43mqc5pd74</a></np-embed></p>
<p>Parte 3.</p>
<p><np-embed nostr="note1fa3cl46jc3dxnfdq9akc07l3ngt3dn2p7yc5ykxjamnsmwppwdwqwx2wfk"><a href="https://njump.me/note1fa3cl46jc3dxnfdq9akc07l3ngt3dn2p7yc5ykxjamnsmwppwdwqwx2wfk">nostr:note1fa3cl46jc3dxnfdq9akc07l3ngt3dn2p7yc5ykxjamnsmwppwdwqwx2wfk</a></np-embed></p>
<p>Parte 4.</p>
<p><np-embed nostr="note19x06jcxna2qhlh0qpxcr4eme3ehkxrahjertg300jxmxvpe5geaqtns3np"><a href="https://njump.me/note19x06jcxna2qhlh0qpxcr4eme3ehkxrahjertg300jxmxvpe5geaqtns3np">nostr:note19x06jcxna2qhlh0qpxcr4eme3ehkxrahjertg300jxmxvpe5geaqtns3np</a></np-embed></p>
<p>Parte 5.</p>
<p><np-embed nostr="note1ev5up3ac7sw37frvq5gx6p7seq3fey2n3ruk29zl7wfajama2f6qwmy60c"><a href="https://njump.me/note1ev5up3ac7sw37frvq5gx6p7seq3fey2n3ruk29zl7wfajama2f6qwmy60c">nostr:note1ev5up3ac7sw37frvq5gx6p7seq3fey2n3ruk29zl7wfajama2f6qwmy60c</a></np-embed></p>
<p>Parte 6.</p>
<p><np-embed nostr="note1xuew22d34c2n3nmh4yqfm6zf7wl3mefj5mul532w47qqtu96qnhqcaa9uz"><a href="https://njump.me/note1xuew22d34c2n3nmh4yqfm6zf7wl3mefj5mul532w47qqtu96qnhqcaa9uz">nostr:note1xuew22d34c2n3nmh4yqfm6zf7wl3mefj5mul532w47qqtu96qnhqcaa9uz</a></np-embed></p>
<p>Parte 7.</p>
<p><np-embed nostr="note1nmpmtzlvpg86awr78nyu3j9xsfnuzywsllrwwcwm2knlgm6etceq224qhy"><a href="https://njump.me/note1nmpmtzlvpg86awr78nyu3j9xsfnuzywsllrwwcwm2knlgm6etceq224qhy">nostr:note1nmpmtzlvpg86awr78nyu3j9xsfnuzywsllrwwcwm2knlgm6etceq224qhy</a></np-embed></p>
<p>Parte 8.</p>
<p><np-embed nostr="note1n39cya67f8u8fgm97dg7pgghzdmsj8e5wnu6yl6gqzz9zhcexv5q4zqj26"><a href="https://njump.me/note1n39cya67f8u8fgm97dg7pgghzdmsj8e5wnu6yl6gqzz9zhcexv5q4zqj26">nostr:note1n39cya67f8u8fgm97dg7pgghzdmsj8e5wnu6yl6gqzz9zhcexv5q4zqj26</a></np-embed></p>
<p>Parte 9.</p>
<p><np-embed nostr="note1atps7s7pa5zqwdcmjqcn4mrt38cup88qn30hkj6ywgrr933zdd6qdnu7m8"><a href="https://njump.me/note1atps7s7pa5zqwdcmjqcn4mrt38cup88qn30hkj6ywgrr933zdd6qdnu7m8">nostr:note1atps7s7pa5zqwdcmjqcn4mrt38cup88qn30hkj6ywgrr933zdd6qdnu7m8</a></np-embed></p>
<p>Parte 10.</p>
<p><np-embed nostr="note1slltn0gej5jd9snhxklx57ealywz42m8c72w7jaguvz5s7fskzzsvh34nj"><a href="https://njump.me/note1slltn0gej5jd9snhxklx57ealywz42m8c72w7jaguvz5s7fskzzsvh34nj">nostr:note1slltn0gej5jd9snhxklx57ealywz42m8c72w7jaguvz5s7fskzzsvh34nj</a></np-embed></p>
<p>Parte 11.</p>
<p><np-embed nostr="note13rgpsusuhqjdpznrxxs6v0gatenq2fjz56amthgfhwutpmhk04ms2ffcdw"><a href="https://njump.me/note13rgpsusuhqjdpznrxxs6v0gatenq2fjz56amthgfhwutpmhk04ms2ffcdw">nostr:note13rgpsusuhqjdpznrxxs6v0gatenq2fjz56amthgfhwutpmhk04ms2ffcdw</a></np-embed></p>
<p>Parte 12.</p>
<p><np-embed nostr="note14dl4sgp2hzxlnhjeeag2yl4m5e5e2c4ucsakd6fuf5kxqx2aamcq9wdfx6"><a href="https://njump.me/note14dl4sgp2hzxlnhjeeag2yl4m5e5e2c4ucsakd6fuf5kxqx2aamcq9wdfx6">nostr:note14dl4sgp2hzxlnhjeeag2yl4m5e5e2c4ucsakd6fuf5kxqx2aamcq9wdfx6</a></np-embed></p>
<p>Livro completo em PDF no Github PrivacyOpenSource.</p>
<p><np-embed url="https://github.com/Alexemidio/PrivacyOpenSource/raw/main/Livros/THE%20CYPHERNOMICON%20.pdf"><a href="https://github.com/Alexemidio/PrivacyOpenSource/raw/main/Livros/THE%20CYPHERNOMICON%20.pdf">https://github.com/Alexemidio/PrivacyOpenSource/raw/main/Livros/THE%20CYPHERNOMICON%20.pdf</a></np-embed></p>
]]></content:encoded>
      <itunes:author><![CDATA[Alex Emidio]]></itunes:author>
      <itunes:summary><![CDATA[<p>The Cyphernomicon de May é uma coleção de ensaios sobre criptografia,dinheiro digital e privacidade, escritos por ele e outros autores influentes no campo da criptografia e da tecnologia. O livro aborda tópicos como a história da criptografia, os fundamentos da criptografia de chave pública, a privacidade na era digital, a criptografia como uma ferramenta para a liberdade individual e o papel do dinheiro digital na sociedade.</p>
<p>Os ensaios contidos no livro exploram as implicações políticas, sociais e tecnológicas da criptografia e do dinheiro digital, bem como os possíveis cenários futuros que poderiam surgir a partir dessas tecnologias. O "Cyphernomicon" é considerado um texto influente na comunidade cypherpunk, um movimento que busca promover a privacidade, a criptografia e a liberdade individual por meio da tecnologia.</p>
<p>Cyphernomicon não seja amplamente conhecido fora dos círculos especializados em criptografia e tecnologia, ele continua sendo uma leitura relevante para aqueles interessados em entender as questões relacionadas à privacidade, segurança digital e o impacto da criptografia na sociedade.</p>
<p>Parte 1.</p>
<p><np-embed nostr="note1cn0rmasgq4uwl25exnp25l8kk605rgzwnt0f55xanlhnsfqpue6sk7fmga"><a href="https://njump.me/note1cn0rmasgq4uwl25exnp25l8kk605rgzwnt0f55xanlhnsfqpue6sk7fmga">nostr:note1cn0rmasgq4uwl25exnp25l8kk605rgzwnt0f55xanlhnsfqpue6sk7fmga</a></np-embed></p>
<p>Parte 2.</p>
<p><np-embed nostr="note107vv538eqewfv6uma8tem9c6auylek94tv6jdnw3nxrwnnqr43mqc5pd74"><a href="https://njump.me/note107vv538eqewfv6uma8tem9c6auylek94tv6jdnw3nxrwnnqr43mqc5pd74">nostr:note107vv538eqewfv6uma8tem9c6auylek94tv6jdnw3nxrwnnqr43mqc5pd74</a></np-embed></p>
<p>Parte 3.</p>
<p><np-embed nostr="note1fa3cl46jc3dxnfdq9akc07l3ngt3dn2p7yc5ykxjamnsmwppwdwqwx2wfk"><a href="https://njump.me/note1fa3cl46jc3dxnfdq9akc07l3ngt3dn2p7yc5ykxjamnsmwppwdwqwx2wfk">nostr:note1fa3cl46jc3dxnfdq9akc07l3ngt3dn2p7yc5ykxjamnsmwppwdwqwx2wfk</a></np-embed></p>
<p>Parte 4.</p>
<p><np-embed nostr="note19x06jcxna2qhlh0qpxcr4eme3ehkxrahjertg300jxmxvpe5geaqtns3np"><a href="https://njump.me/note19x06jcxna2qhlh0qpxcr4eme3ehkxrahjertg300jxmxvpe5geaqtns3np">nostr:note19x06jcxna2qhlh0qpxcr4eme3ehkxrahjertg300jxmxvpe5geaqtns3np</a></np-embed></p>
<p>Parte 5.</p>
<p><np-embed nostr="note1ev5up3ac7sw37frvq5gx6p7seq3fey2n3ruk29zl7wfajama2f6qwmy60c"><a href="https://njump.me/note1ev5up3ac7sw37frvq5gx6p7seq3fey2n3ruk29zl7wfajama2f6qwmy60c">nostr:note1ev5up3ac7sw37frvq5gx6p7seq3fey2n3ruk29zl7wfajama2f6qwmy60c</a></np-embed></p>
<p>Parte 6.</p>
<p><np-embed nostr="note1xuew22d34c2n3nmh4yqfm6zf7wl3mefj5mul532w47qqtu96qnhqcaa9uz"><a href="https://njump.me/note1xuew22d34c2n3nmh4yqfm6zf7wl3mefj5mul532w47qqtu96qnhqcaa9uz">nostr:note1xuew22d34c2n3nmh4yqfm6zf7wl3mefj5mul532w47qqtu96qnhqcaa9uz</a></np-embed></p>
<p>Parte 7.</p>
<p><np-embed nostr="note1nmpmtzlvpg86awr78nyu3j9xsfnuzywsllrwwcwm2knlgm6etceq224qhy"><a href="https://njump.me/note1nmpmtzlvpg86awr78nyu3j9xsfnuzywsllrwwcwm2knlgm6etceq224qhy">nostr:note1nmpmtzlvpg86awr78nyu3j9xsfnuzywsllrwwcwm2knlgm6etceq224qhy</a></np-embed></p>
<p>Parte 8.</p>
<p><np-embed nostr="note1n39cya67f8u8fgm97dg7pgghzdmsj8e5wnu6yl6gqzz9zhcexv5q4zqj26"><a href="https://njump.me/note1n39cya67f8u8fgm97dg7pgghzdmsj8e5wnu6yl6gqzz9zhcexv5q4zqj26">nostr:note1n39cya67f8u8fgm97dg7pgghzdmsj8e5wnu6yl6gqzz9zhcexv5q4zqj26</a></np-embed></p>
<p>Parte 9.</p>
<p><np-embed nostr="note1atps7s7pa5zqwdcmjqcn4mrt38cup88qn30hkj6ywgrr933zdd6qdnu7m8"><a href="https://njump.me/note1atps7s7pa5zqwdcmjqcn4mrt38cup88qn30hkj6ywgrr933zdd6qdnu7m8">nostr:note1atps7s7pa5zqwdcmjqcn4mrt38cup88qn30hkj6ywgrr933zdd6qdnu7m8</a></np-embed></p>
<p>Parte 10.</p>
<p><np-embed nostr="note1slltn0gej5jd9snhxklx57ealywz42m8c72w7jaguvz5s7fskzzsvh34nj"><a href="https://njump.me/note1slltn0gej5jd9snhxklx57ealywz42m8c72w7jaguvz5s7fskzzsvh34nj">nostr:note1slltn0gej5jd9snhxklx57ealywz42m8c72w7jaguvz5s7fskzzsvh34nj</a></np-embed></p>
<p>Parte 11.</p>
<p><np-embed nostr="note13rgpsusuhqjdpznrxxs6v0gatenq2fjz56amthgfhwutpmhk04ms2ffcdw"><a href="https://njump.me/note13rgpsusuhqjdpznrxxs6v0gatenq2fjz56amthgfhwutpmhk04ms2ffcdw">nostr:note13rgpsusuhqjdpznrxxs6v0gatenq2fjz56amthgfhwutpmhk04ms2ffcdw</a></np-embed></p>
<p>Parte 12.</p>
<p><np-embed nostr="note14dl4sgp2hzxlnhjeeag2yl4m5e5e2c4ucsakd6fuf5kxqx2aamcq9wdfx6"><a href="https://njump.me/note14dl4sgp2hzxlnhjeeag2yl4m5e5e2c4ucsakd6fuf5kxqx2aamcq9wdfx6">nostr:note14dl4sgp2hzxlnhjeeag2yl4m5e5e2c4ucsakd6fuf5kxqx2aamcq9wdfx6</a></np-embed></p>
<p>Livro completo em PDF no Github PrivacyOpenSource.</p>
<p><np-embed url="https://github.com/Alexemidio/PrivacyOpenSource/raw/main/Livros/THE%20CYPHERNOMICON%20.pdf"><a href="https://github.com/Alexemidio/PrivacyOpenSource/raw/main/Livros/THE%20CYPHERNOMICON%20.pdf">https://github.com/Alexemidio/PrivacyOpenSource/raw/main/Livros/THE%20CYPHERNOMICON%20.pdf</a></np-embed></p>
]]></itunes:summary>
      <itunes:image href="https://nostrcheck.me/media/public/nostrcheck.me_2594252621887553901704215095.webp"/>
      </item>
      
      </channel>
      </rss>
    