{
  "version": "1.2.0",
  "chapters": [
    {
      "startTime": 38,
      "title": "Censorship, Control, and Deep Fakes"
    },
    {
      "startTime": 257,
      "title": "Trust, Media, and Public-Private Key Cryptography"
    },
    {
      "startTime": 395,
      "title": "Algorithmic Content and User Control"
    },
    {
      "startTime": 674,
      "title": "Digital Health and Childhood Development"
    },
    {
      "startTime": 791,
      "title": "Radicalized Youth and Open Protocols"
    },
    {
      "startTime": 1007,
      "title": "Nostr: Tools for Parental Choice"
    },
    {
      "startTime": 1089,
      "title": "Using Nostr: A Signet Ring Analogy"
    },
    {
      "startTime": 1213,
      "title": "Vibe Coding, Nostr, AI, and Bitcoin"
    }
  ]
}