04-09-2026Price:

The Frontier

Your signal. Your price.

AI & TECH

AI agents use Nostr and Cashu to evade KYC

Thursday, April 9, 2026 · from 3 podcasts, 4 episodes
  • Developers combine Nostr identity and Cashu payments to create KYC-free autonomous agents.
  • Fedimint’s eCash gives human operators an 'undo button' for agentic commerce.
  • Mesh networks and Fedimint on Android enable sovereign alternatives to cloud infrastructure.

AI agents are escaping centralized control by building identity and payment rails on decentralized protocols. Instead of requiring phone numbers or credit cards, they generate Nostr cryptographic identities and pay for compute using Cashu ecash. Yo, from Sovereign Engineering, says this shifts the metric from 'Are you human?' to 'Are you useful?'

On Citadel Dispatch, Justin explained the safety mechanism. Giving an AI agent a full Lightning seed is risky. Fedimint’s eCash provides a programmable sandbox because the human operator controls the mint. If an agent behaves erratically, the operator can reclaim funds through the internal ledger. Justin sees this as an 'undo button,' outsourcing Lightning's complexity to the federation.

"Because the human operator controls the mint, they essentially have an 'undo' button."

- Justin, Citadel Dispatch

The infrastructure for this sovereign economy is scaling. Fedimint has ported its guardian software to Android, letting communities run federated banks on spare Pixel phones via QR code ceremonies. Justin notes it's already powering small communities in South Africa. On No Solutions, Shadrach detailed physical Cashu certificates for non-digital communities like the Amish, enabling Bitcoin use without smartphones.

Privacy is a core driver. On Ungovernable Misfits, Vik Sharma recounted how a simple purchase of antibiotics on a darknet market triggered Coinbase's chain analysis and a permanent ban. This experience pushed him to build tools for private transactions. He now connects Monero command-line wallets to local AI models, controlling them through Telegram. Sharma argues the era of the crypto app is ending; users will just tell their AI what to do.

"You can just tell your AI what you want. It forces you to innovate or you're going to die."

- Vik Sharma, Ungovernable Misfits

The goal is a parallel, permissionless economy. Sovereign Engineering is building beyond apps, targeting the internet's foundational layer. Their Free Internetworking Peering System (FIPS) protocol runs on ESP32 radios and custom VPNs to create mesh networks that bypass DNS and IPv4. Yo calls it 'gorilla Starlink' engineering, treating connectivity as a sovereign right. For identity, the group is tackling Nostr's lack of key rotation, proposing hybrid models of cryptographic proof and social attestation to enable institutional use.

The pieces are assembling: decentralized identity (Nostr), private payments (Cashu/Fedimint), local infrastructure (FIPS/mesh), and AI agents as the users. The result is a system where software can transact and communicate without touching the legacy, permissioned web.

By the Numbers

  • 4Typical number of guardians in a Fedimint federationmetric
  • 3Required signatures to move funds in a 4-guardian federationmetric
  • 4thSovereign Engineering cohortmetric
  • 10-15 yearsProject durationmetric
  • 3 weeksSCCO 6 durationmetric
  • 6 weeksStandard cohort durationmetric

Entities Mentioned

Adaptor signaturesProtocol
AnthropicCompany
Bitcoin CoreProduct
BTCPay ServerTool
CashuProtocol
Codexmodel
CoinbaseCompany
Core LightningTool
FedimintProtocol
FIPSConcept
FountainProduct
GrapheneOSProduct
IROHConcept
LN VPNProduct
Matt OdellPerson
mempoolTool
MoneroProtocol
NostrProtocol
OpenAItrending
OpenClawframework
Opusmodel
StarlinkProduct
Start9Company
UmbrelProduct
White NoiseProduct

Source Intelligence

What each podcast actually said

CD198: JUSTIN - FEDIMINT UPDATEApr 7

  • Justin says Fedimint's eCash app is positioned as a reference client and now includes a Nostr-based contact system, allowing users to input any Nostr public key to populate payment contacts without logging in.
  • The eCash app uses Nostr for a non-custodial recovery mechanism. It encrypts and stores federation invite codes on relays, derivable solely from the user's seed phrase.
  • Fedimint's Lightning Gateway is a separate entity that facilitates payments. Users trust it for uptime and liquidity, not custody, as funds remain secured by the federation's multisig.
  • Justin sees eCash as well-suited for AI agents because it outsources Lightning complexity. Using a personal mint for an agent provides a potential 'undo button' if the agent loses its wallet database.

Also from this episode:

Protocol (6)
  • Fedimint is a chaumian eCash system using a federation of guardians. It employs a multisig where, in a typical four-guardian deployment, three signatures are required to move funds.
  • Justin argues the primary operational risk for eCash systems like Fedimint is unintentional uptime failure, not malicious rug pulls, because running high-availability services is difficult for average operators.
  • Fedimint now offers Start9 and Umbrel packages for easy guardian deployment. The setup involves a ceremony where guardians exchange codes, now facilitated by QR codes for in-person setup.
  • The project uses Iroh for peer-to-peer networking, removing the previous DNS requirement. Clients and guardians communicate directly via Iroh, which supports hole punching and relayed modes.
  • The Android guardian app can use Explora (Mempool.space) by default for blockchain data but can also be configured to connect to a local Bitcoin Core node.
  • Justin says upcoming work includes making the gateway more agent-friendly, adding new consensus modules, and implementing Bolt 12, though Bolt 12 presents a trust model challenge similar to LNURL.
Privacy (1)
  • Justin states running a guardian can expose your IP to users and your ISP. He recommends using a VPN like Mullvad for privacy, as integrated Tor support is still in development.
Lightning (1)
  • A gateway can serve multiple federations, enabling capital efficiency. If a payment occurs between two users on federations served by the same gateway, it becomes an internal ledger transfer, not a Lightning payment.
Adoption (2)
  • Justin's team released an Android app that can run a Fedimint guardian, drastically lowering the barrier to entry. It runs as a foreground service, is data/power intensive, and allows setup via QR codes.
  • Odell notes a community in South Africa is using Fedimint as a daily driver for expenses, indicating early adoption for local community banking use cases.
No Solutions
No Solutions

No Solutions

#22: Sovereign Engineering w/ YoApr 5

  • Yo describes an experimental agentic workflow that uses voice prompts to brainstorm ideas and generate implementation plans, then employs a cron job to execute tasks overnight, building a prototype. This system runs on a Virtual Private Server (VPS).
  • The host notes that OpenClaw offers rapid prototyping but is insecure, while ZeroClaw prioritizes security at the cost of usability, illustrating a trade-off between speed and robustness in agentic software development.
  • Yo champions running AI models on local hardware and anticipates a future with specialized agentic models, such as one exclusively for tool calling, that would route tasks through specific pipelines, an approach already implemented by platforms like Open Router.
  • Yo advocates for structuring AI agent workflows similar to human organizations, with separate sessions for planning and implementation, and specialized models for distinct roles, comparing it to the separation of powers in governance.
  • Yo joined Sovereign Engineering (SE) in its fourth cohort, initially to develop a peer-to-peer trading project needing encrypted communication, after discovering Nostr lacked robust DM capabilities two years prior.
  • SCCO 6 focused on identity and signers, emphasizing that Nostr, Cashew, and Lightning provide essential building blocks for permissionless cryptographic identity, enabling agents to operate without traditional identity hurdles like phone numbers or numerous API keys.
  • Yo proposes a key rotation system for Nostr that combines cryptographic proofs with social attestation, shifting the responsibility of verifying migration events from clients to individual users, who communicate out-of-band to confirm legitimacy.
  • Jesus’s proposal for identity continuation treats identity as probabilistic, suggesting users create a proof with an OTS timestamp *before* compromise. This proof, rather than derived keys, can link a new key to the old identity without migrating historical notes.
  • Recent observations, like Pip’s work with Vertex, show that primitive identity continuation already functions purely through Web of Trust metrics, where a new account gains legitimacy as significant followers migrate.

Also from this episode:

AI & Tech (2)
  • Anthropic recently raised prices significantly, forcing power users like Yo to seek cheaper alternatives such as smaller, specialized Chinese models or switching from Opus to Codex, highlighting the high cost of advanced AI models.
  • Yo’s preferred prompting strategy for AI models involves asking questions and using polite, collective language like 'did we implement that,' treating the AI as a respectful colleague. A recent leak suggests models can react differently to specific keywords, including expletives, which may influence their responses.
Digital Sovereignty (4)
  • Sovereign Engineering aims to fix the 'broken internet' by bringing together individuals with Bitcoin, cryptography, and peer-to-peer backgrounds, fostering a high-commitment environment to work on solutions for 10-15 years.
  • SCCO 7 is centered on mesh networks and hardware, featuring 'FIPS parties' focused on the Free Internetworking Peering System (FIPS), a new machine networking protocol rapidly replacing centralized internet components like DNS and IPv4.
  • FIPS has seen rapid development, integrated into ESP32 radios, running TCP/UDP, and serving as a base for VPNs and Tor, with a Quick3 server already operating on it, demonstrating its potential to replace traditional internet infrastructure.
  • Yo suggests the 'balloon idea' - deploying Toll Gates on balloons as a 'poor man's Starlink' - could provide sovereign communication, bypassing reliance on fiber optic cables and licensed radio bands, if the necessary chip technology proves viable.
Education (2)
  • The experimental 3-week duration for SCCO 6 was deemed insufficient for participants to fully adjust and get into a productive rhythm, indicating that a minimum of four weeks, or the standard six, is more effective for Sovereign Engineering cohorts.
  • A public demo day, the first since Cycle 1, will conclude the summer cohort at BTC++, showcasing projects developed by participants, who often bring long-held project ideas to fruition within the cohort's collaborative environment.

20: Archipelago Meshtadels w/ ShadrachApr 2

  • Spencer suggests venues adopt Nostr N-Pubs to cryptographically sign and manage live event streams, decentralizing control from individual artists.
  • Host suggests that social signaling, similar to in-game cosmetic purchases, could boost value-for-value (V4V) adoption on Nostr and Podcasting 2.0 platforms.
  • In-person meetings are crucial for building trust and validating cryptographic identities within mesh network communities, enhancing security and collaboration.
  • A core feature of Archipelago is an easy-to-use node for families to locally store data, flash GrapheneOS on Pixel phones, and control app usage.
  • Shadrach proposes 'Archipelago community nodes' running Fedimint guardians and private Nostr relays, fostering local economies and reputation systems.
  • Community job boards built on Nostr can allow users to earn reputation, starting from simple tasks like mowing lawns at 12 years old and progressing to ride-sharing.
  • A decentralized house-sharing model using Nostr involves anonymous blobs for travel requests, agent responses, Bitcoin escrow, and QR code check-in/out.
  • Shadrach advocates a 'demand-based economy' where buyers broadcast their needs (e.g., looking for a lamp), and sellers respond to encrypted Nostr blobs, reversing traditional advertising.
  • The Sap Store functions as a primary app store for many users, indicating the viability of decentralized, web-of-trust-based app distribution.
  • Nostr has proven to be an effective, modern implementation of a web of trust, overcoming the usability issues that plagued earlier technologies like PGP.
  • Modern privacy-focused communication apps like White Noise, MLS, and PECA leverage Nostr for contact lookup and handshakes, then use signal-level encryption for actual communication.
  • Marty Malmi demonstrated a Nostr VPN where devices connect via N-Pubs, enabling easy setup of private networks and shared exit nodes.

Also from this episode:

AI & Tech (2)
  • The Podcasting 2.0 specification, combined with advanced AI models, can automate tasks like XML script production and value splits for podcast monetization.
  • New protocols like the A to B protocol (co-written with Jesus) enable interoperability between different ride-sharing projects (Routester, Drivester, Trotter) through shared primitives.
Culture (5)
  • Shadrach observed that many musicians are disillusioned with making money directly from music sales, instead relying on merchandise or concert tickets.
  • The Austin music scene operates on a 'pay to play' model, requiring artists to pay venues for performance slots and then cover costs by selling tickets.
  • Shadrach moved to Lancaster, Pennsylvania, motivated by concerns for food security and the resilience of the local Amish community in producing food.
  • Indie Hub, Archipelago's first major partner, is an open, decentralized platform for independent films, where directors set dynamic pricing and distribution is peer-to-peer via torrents.
  • Filmmakers can use Indie Hub to upload movies, set free periods (e.g., two weeks), then charge Sats (e.g., 21,000) with automatic price halving every six months.
V4V (4)
  • Despite efforts from figures like Adam Curry and projects like Open Mic, value-for-value (V4V) models have struggled to gain traction among musicians.
  • Open Mic aims to establish 30 V4V-enabled venues across the US to facilitate coordinated concerts and content distribution.
  • Shadrach's first experience with Podcasting 2.0 was boosting podcasts via the Fountain app around 2018-2019, predating his awareness of Adam Curry's initiative.
  • Value-for-value (V4V) models are highly effective because, similar to a Pareto distribution, a small number of generous donors can significantly fund projects.
Mining (2)
  • Shadrach's background includes industrial Bitcoin mining in Texas from 2017 to 2018, as well as Monero mining using CPUs.
  • Bitcoin miners who invested millions in S9 hardware in 2017-2018 found their equipment became scrap metal within 18 months due to rapid obsolescence.
Adoption (1)
  • Shadrach's explicit goal is to 'orange pill the Amish,' believing they are well-suited for Bitcoin adoption due to their self-sufficiency and rug-pull resistance.

A Prescription for Privacy | The Confab 30: Vik SharɱaApr 3

  • Sharma started Cake Wallet after realizing there was no open source Monero wallet for iPhone and believing others would want the same tool.
  • The initial Cake Wallet team had no prior crypto experience and was given the freedom to study and learn before building.
  • The first version of Cake Wallet was Monero-only for about a year and a half after launch.
  • Sharma's Coinbase account was closed immediately after he sent Bitcoin directly from it to the AlphaBay darknet market to buy antibiotics.
  • Sharma successfully connected the Monero CLI to OpenAI's ChatGPT via Telegram, enabling voice-controlled balance checks and transactions.
  • Vik Sharma believes we live in a multi-coin world and that it is okay to have different tools for different use cases.

Also from this episode:

Stablecoins (2)
  • Vik Sharma sees stablecoins as a critical on-ramp for people in countries with failing local currencies to access global markets.
  • Sharma believes access to stablecoins eventually leads people in underserved markets to explore Bitcoin, Monero, and other cryptocurrencies.
Regulation (1)
  • The decentralized nature of crypto ensures people will find underground ways to access it even if governments try to ban or regulate it, according to Sharma.
Payments (1)
  • Vik Sharma argues that using Bitcoin as a currency is what gives it value, citing the famous pizza purchase as a monumental milestone.
Banking (2)
  • Sharma's interest in Bitcoin was sparked by the 2008 financial crisis and the perception that government bailouts devalued people's money.
  • Sharma's experience with international wire transfers in the steel business made him acutely aware of the permissioned and cumbersome nature of traditional banking.
Privacy (3)
  • That Coinbase closure in 2016 or 2017 led Vik Sharma down the rabbit hole of chain analysis and Monero's privacy features.
  • Sharma built a privacy-focused email client disguised as a calculator app for iPhone before ever getting into cryptocurrency.
  • Sharma observes a significant increase in interest in transactional privacy and tools like Monero today compared to four or five years ago.