
Interesting question, first indeed I am not 100% Syamailcoin code solved because there is a possibility if I can make a mistake, secondly I am not an AI and third, if in an urgency I need AI then I will use it only to investigate or identify some kinds of errors, code execution can be done by me or also all programmers who may be more expert than me due to experience or age. The initial selling price is of course determined by mutual agreement or demand, maybe if there is a Programmer or a team of Programmers who may be more expert than me, anyone can implement the code from the Whitepaper, you can ask critical questions or position as a Devil Advocate to investigate with your suspicions, whenever you need, I don't promise that if I revise some code it will be done quickly, Syamailcoin is not overnight or a month, this is the first time Blueprint has been done since 2017 to study the entropy of each Cryptography and others. Maybe because I am an Individual, then many are missed, however if there is a Programmer Team in Cypherpunk, Create or implement code from 0 and maybe I'll give you instructions on what to do and not to do, the rest if you have any questions, please ask. ---- Pada Sun, 12 Oct 2025 08:19:46 +0900 cypherpunks@lists.cpunks.org menulis ---- Alshen, I have questions about Syamailcoin My first question is, do you use AI assistance, or are you an AI? This helps me understand how to take your expressions. My second question is, when I visited the Syamailcoin GitHub, I saw some files that seemed to have content in place of their names. Then inside the files I thought I saw repeated pastes of the introductory Vim screen. Are these files intended to be here? What are their purpose? I would have investigated Syamailcoin further, but I felt scared by these files. I use Vim as my primary editor, and it is not common to do that nowadays, and I worried the files might be targeting me. The rotation of content across appropriate locations (file name, file content, editor content) is also eerily similar to one of my personal coping strategies; it’s one of the ways I move around and manage my internal psychological conflict. But this is very private and also very delicate because it is quite easy to create very injurious or damaging meaning or actions when doing that. I want to say that it was very heartening to see you using PGP encryption.