Author of “Designing Data-Intensive Applications”, researcher at TU Munich, formerly University of Cambridge. Distributed systems, security protocols, databases. he/him.
{
"@context": [
"https://www.w3.org/ns/did/v1",
"https://w3id.org/nostr/context",
"https://w3id.org/security/suites/ed25519-2020/v1"
],
"id": "did:nostr:1bab79497d21d691bc1a610c8efc29348ec84016e274f7bbd8132d3ea70795f5",
"verificationMethod": [
{
"id": "did:nostr:1bab79497d21d691bc1a610c8efc29348ec84016e274f7bbd8132d3ea70795f5#key1",
"controller": "did:nostr:1bab79497d21d691bc1a610c8efc29348ec84016e274f7bbd8132d3ea70795f5",
"type": "SchnorrVerification2025"
}
],
"authentication": [
"#key1"
],
"assertionMethod": [
"#key1"
],
"profile": {
"id": "did:nostr:event:ed64e65f3f7e1c420625c18b86ca0a1b07edfbac0100ab5cd54dbcd3fb62387f",
"name": "Martin Kleppmann",
"about": "Author of “Designing Data-Intensive Applications”, researcher at TU Munich, formerly University of Cambridge. Distributed systems, security protocols, databases. he/him.",
"picture": "https://nondeterministic.computer/system/accounts/avatars/109/303/800/613/468/422/original/2bd243fb764bb6a9.jpg",
"nip05": "martin@nondeterministic-computer.mostr.pub",
"created_at": 1753870253,
"updated_at": "2025-07-30T10:10:53.000Z"
},
"service": [
{
"id": "did:nostr:1bab79497d21d691bc1a610c8efc29348ec84016e274f7bbd8132d3ea70795f5#bitcoin-taproot",
"type": "TaprootAddress",
"network": "tbtc4",
"serviceEndpoint": "tb1prw4hjjtay8tfr0q6vyxgalpfxj8vssqkuf600w7czvknafc8jh6svzdjqh"
},
{
"id": "did:nostr:1bab79497d21d691bc1a610c8efc29348ec84016e274f7bbd8132d3ea70795f5#bitcoin-mainnet-taproot",
"type": "TaprootAddress",
"network": "btc",
"serviceEndpoint": "bc1prw4hjjtay8tfr0q6vyxgalpfxj8vssqkuf600w7czvknafc8jh6sm2ma6c"
}
]
}
{
"_id": "6885da52f62442432138b905",
"pubkey": "1bab79497d21d691bc1a610c8efc29348ec84016e274f7bbd8132d3ea70795f5",
"content": "{\"name\":\"Martin Kleppmann\",\"about\":\"Author of “Designing Data-Intensive Applications”, researcher at TU Munich, formerly University of Cambridge. Distributed systems, security protocols, databases. he/him.\",\"picture\":\"https://nondeterministic.computer/system/accounts/avatars/109/303/800/613/468/422/original/2bd243fb764bb6a9.jpg\",\"nip05\":\"martin@nondeterministic-computer.mostr.pub\",\"fields\":[[\"Patreon\",\"https://patreon.com/martinkl\"],[\"Twitter\",\"https://twitter.com/martinkl\"]]}",
"created_at": 1753870253,
"id": "ed64e65f3f7e1c420625c18b86ca0a1b07edfbac0100ab5cd54dbcd3fb62387f",
"kind": 0,
"sig": "5a0b196550fa00ef18adec5bcd0bb0099b8d390a7de4fe867877622e01552f69222c0d3f9f47db029f28f6cd2ad33c26486bc302bc8712a366d7729b8021e3c0",
"tags": [
[
"proxy",
"https://nondeterministic.computer/users/martin",
"activitypub"
],
[
"client",
"Mostr",
"31990:6be38f8c63df7dbf84db7ec4a6e6fbbd8d19dca3b980efad18585c46f04b26f9:mostr",
"wss://relay.mostr.pub"
]
],
"updated_at": "2025-07-30T10:10:53.000Z"
}