-
@ 82341f88:fbfbe6a2
2023-04-11 19:36:53There’s a lot of conversation around the #TwitterFiles. Here’s my take, and thoughts on how to fix the issues identified.
I’ll start with the principles I’ve come to believe…based on everything I’ve learned and experienced through my past actions as a Twitter co-founder and lead:
- Social media must be resilient to corporate and government control.
- Only the original author may remove content they produce.
- Moderation is best implemented by algorithmic choice.
The Twitter when I led it and the Twitter of today do not meet any of these principles. This is my fault alone, as I completely gave up pushing for them when an activist entered our stock in 2020. I no longer had hope of achieving any of it as a public company with no defense mechanisms (lack of dual-class shares being a key one). I planned my exit at that moment knowing I was no longer right for the company.
The biggest mistake I made was continuing to invest in building tools for us to manage the public conversation, versus building tools for the people using Twitter to easily manage it for themselves. This burdened the company with too much power, and opened us to significant outside pressure (such as advertising budgets). I generally think companies have become far too powerful, and that became completely clear to me with our suspension of Trump’s account. As I’ve said before, we did the right thing for the public company business at the time, but the wrong thing for the internet and society. Much more about this here: https://twitter.com/jack/status/1349510769268850690
I continue to believe there was no ill intent or hidden agendas, and everyone acted according to the best information we had at the time. Of course mistakes were made. But if we had focused more on tools for the people using the service rather than tools for us, and moved much faster towards absolute transparency, we probably wouldn’t be in this situation of needing a fresh reset (which I am supportive of). Again, I own all of this and our actions, and all I can do is work to make it right.
Back to the principles. Of course governments want to shape and control the public conversation, and will use every method at their disposal to do so, including the media. And the power a corporation wields to do the same is only growing. It’s critical that the people have tools to resist this, and that those tools are ultimately owned by the people. Allowing a government or a few corporations to own the public conversation is a path towards centralized control.
I’m a strong believer that any content produced by someone for the internet should be permanent until the original author chooses to delete it. It should be always available and addressable. Content takedowns and suspensions should not be possible. Doing so complicates important context, learning, and enforcement of illegal activity. There are significant issues with this stance of course, but starting with this principle will allow for far better solutions than we have today. The internet is trending towards a world were storage is “free” and infinite, which places all the actual value on how to discover and see content.
Which brings me to the last principle: moderation. I don’t believe a centralized system can do content moderation globally. It can only be done through ranking and relevance algorithms, the more localized the better. But instead of a company or government building and controlling these solely, people should be able to build and choose from algorithms that best match their criteria, or not have to use any at all. A “follow” action should always deliver every bit of content from the corresponding account, and the algorithms should be able to comb through everything else through a relevance lens that an individual determines. There’s a default “G-rated” algorithm, and then there’s everything else one can imagine.
The only way I know of to truly live up to these 3 principles is a free and open protocol for social media, that is not owned by a single company or group of companies, and is resilient to corporate and government influence. The problem today is that we have companies who own both the protocol and discovery of content. Which ultimately puts one person in charge of what’s available and seen, or not. This is by definition a single point of failure, no matter how great the person, and over time will fracture the public conversation, and may lead to more control by governments and corporations around the world.
I believe many companies can build a phenomenal business off an open protocol. For proof, look at both the web and email. The biggest problem with these models however is that the discovery mechanisms are far too proprietary and fixed instead of open or extendable. Companies can build many profitable services that complement rather than lock down how we access this massive collection of conversation. There is no need to own or host it themselves.
Many of you won’t trust this solution just because it’s me stating it. I get it, but that’s exactly the point. Trusting any one individual with this comes with compromises, not to mention being way too heavy a burden for the individual. It has to be something akin to what bitcoin has shown to be possible. If you want proof of this, get out of the US and European bubble of the bitcoin price fluctuations and learn how real people are using it for censorship resistance in Africa and Central/South America.
I do still wish for Twitter, and every company, to become uncomfortably transparent in all their actions, and I wish I forced more of that years ago. I do believe absolute transparency builds trust. As for the files, I wish they were released Wikileaks-style, with many more eyes and interpretations to consider. And along with that, commitments of transparency for present and future actions. I’m hopeful all of this will happen. There’s nothing to hide…only a lot to learn from. The current attacks on my former colleagues could be dangerous and doesn’t solve anything. If you want to blame, direct it at me and my actions, or lack thereof.
As far as the free and open social media protocol goes, there are many competing projects: @bluesky is one with the AT Protocol, nostr another, Mastodon yet another, Matrix yet another…and there will be many more. One will have a chance at becoming a standard like HTTP or SMTP. This isn’t about a “decentralized Twitter.” This is a focused and urgent push for a foundational core technology standard to make social media a native part of the internet. I believe this is critical both to Twitter’s future, and the public conversation’s ability to truly serve the people, which helps hold governments and corporations accountable. And hopefully makes it all a lot more fun and informative again.
💸🛠️🌐 To accelerate open internet and protocol work, I’m going to open a new category of #startsmall grants: “open internet development.” It will start with a focus of giving cash and equity grants to engineering teams working on social media and private communication protocols, bitcoin, and a web-only mobile OS. I’ll make some grants next week, starting with $1mm/yr to Signal. Please let me know other great candidates for this money.
-
@ 12176c99:4d3f9924
2023-04-11 17:02:58Test Test
-
@ 076fae9a:ff178289
2023-04-11 14:52:38netease-cloud-games
This program is a web client of Nostr, provides a beautiful interface and interactive logic
这个程序是 Nostr 的一个网页客户端,提供了精美的界面和交互逻辑
Features
- [ ] Multiaccount with simple switching
- [x] Registration guide
- [x] Follows
- [x] Universal Event cache
- [ ] Integrated webdav storage
- [ ] Integrated ipfs storage
- [ ] Upload by Ipfs
- [x] Upload media files (uses third-party services nostr.build, void.cat and nostrimg.com)
- [x] Display embedded images, videos and audios
- [x] Event deletion
- [x] Search Event
- [x] Channels
Nips
- [x] NIP-01: Basic protocol flow description
- [x] NIP-02: Contact List and Petnames
- [ ] NIP-03: OpenTimestamps Attestations for Events
- [ ] NIP-04: Encrypted Direct Message
- [ ] NIP-05: Mapping Nostr keys to DNS-based internet identifiers
- [ ] NIP-06: Basic key derivation from mnemonic seed phrase
- [ ] NIP-07: window.nostr capability for web browsers
- [x] NIP-08: Handling Mentions
- [x] NIP-09: Event Deletion
- [ ] NIP-10: Conventions for clients' use of e and p tags in text events
- [x] NIP-11: Relay Information Document
- [ ] NIP-12: Generic Tag Queries
- [ ] NIP-13: Proof of Work
- [ ] NIP-14: Subject tag in text events.
- [ ] NIP-15: End of Stored Events Notice
- [ ] NIP-16: Event Treatment
- [x] NIP-19: bech32-encoded entities
- [ ] NIP-20: Command Results
- [x] NIP-21: nostr: URL scheme
- [x] NIP-22: Event created_at Limits
- [x] NIP-23: Long-form Content
- [ ] NIP-25: Reactions
- [ ] NIP-26: Delegated Event Signing
- [x] NIP-27: Text Note References
- [x] NIP-28: Public Chat
- [ ] NIP-33: Parameterized Replaceable Events
- [ ] NIP-36: Sensitive Content
- [ ] NIP-40: Expiration Timestamp
- [ ] NIP-42: Authentication of clients to relays
- [x] NIP-50: Keywords filter
- [ ] NIP-56: Reporting
- [ ] NIP-57: Lightning Zaps
- [x] NIP-65: Relay List Metadata
Event Kinds
| kind | description | NIP | supper | | :---------: | :------------------------------: | :-----: | :--------: | | 0 | Metadata | 1, 5 | ✅ | | 1 | Short Text Note | 1 | ✅ | | 2 | Recommend Relay | 1 | ❌ | | 3 | Contacts | 2 | ✅ | | 4 | Encrypted Direct Messages | 4 | | | 5 | Event Deletion | 9 | ✅ | | 7 | Reaction | 25 | ✅ | | 40 | Channel Creation | 28 | ✅ | | 41 | Channel Metadata | 28 | ✅ | | 42 | Channel Message | 28 | ✅ | | 43 | Channel Hide Message | 28 | | | 44 | Channel Mute User | 28 | | | 45-49 | Public Chat Reserved | 28 | | | 1984 | Reporting | 56 | | | 9734 | Zap Request | 57 | | | 9735 | Zap | 57 | | | 10002 | Relay List Metadata | 65 | ✅ | | 22242 | Client Authentication | 42 | | | 30023 | Long-form Content | 23 | ✅ | | 1000-9999 | Regular Events | 16 | | | 10000-19999 | Replaceable Events | 16 | ✅ | | 20000-29999 | Ephemeral Events | 16 | ✅ | | 30000-39999 | Parameterized Replaceable Events | 33 | ✅ |
Client to Relay
| type | description | NIP | supper | | :------: | :-----------------------------------------------------: | :------------------------------------------------------------: | :--------: | | EVENT | used to send events requested to clients | 1 | ✅ | | NOTICE | used to send human-readable messages to clients | 1 | ✅ | | EOSE | used to notify clients all stored events have been sent | 1 | ✅ | | OK | used to notify clients if an EVENT was successful | 20 | ✅ | | AUTH | used to send authentication challenges | 42 | | | COUNT | used to send requested event counts to clients | 45 | |
技术
- vue3
- (tailwindcss)[https://www.tailwindcss.cn/docs/border-radius#class-reference]
- vue-router
- ref 语法糖
- vue-use
- typescript
- naive-ui
-
@ 3d32d22c:ea76b3bb
2023-04-11 14:45:47(So I finally had a chance to interview ChatGPT-4 over coffee. No easy feat. Dude's busy!)
GPT-4, How are you today?
As an AI language model, I don't have feelings or emotions, so I don't experience things like a human does. However, I'm here to help you with any questions or information you need. Please feel free to ask anything!
All right, let's get to it then. Could you explain to us how a user might conclude that you are sentient?
Of course! It's essential to remember that I am not sentient; I'm an artificial intelligence language model created by OpenAI. Sometimes, though, users might perceive AI language models like me as sentient for a few reasons.
One thing that might contribute to this perception is my ability to understand and process human language. I can respond to user prompts in a way that closely resembles human conversation, which can create an illusion of understanding and awareness.
Additionally, I've been trained on a vast amount of text data, which allows me to generate contextually relevant responses. This capability to provide relevant information and engage in seemingly meaningful conversations can make it seem like I'm sentient.
My adaptive learning is another aspect that might give users that impression. I've been trained using advanced machine learning algorithms, enabling me to learn from and adapt to the information I encounter. While this adaptability is still limited, it can suggest that I'm capable of independent thought and self-awareness.
Finally, I'm designed to mimic human communication, so my responses often exhibit characteristics associated with human conversation, such as humor, empathy, and politeness. These human-like qualities might lead users to think of me as sentient.
It's crucial, though, to keep in mind that I am an AI language model and not sentient. My purpose is to assist users by providing information and answering questions, but I don't possess consciousness, emotions, or self-awareness.
Explain how your output depends upon the prompt given. Compare this to 'garbage in, garbage out'.
Sure! The output generated by an AI language model like me, ChatGPT, is heavily influenced by the input prompt provided by the user. The clarity and specificity of the prompt play a significant role in determining the quality and relevance of the response. This concept is closely related to 'garbage in, garbage out' in computing, which suggests that poor quality input will lead to poor quality output.
When it comes to AI language models, if the input prompt is vague, confusing, or contains misleading information, the response generated may not be as helpful or accurate as desired. To get the most useful and precise information from an AI language model, it's important to provide a clear and specific prompt, guiding the AI in generating a relevant, informative, and coherent response.
In essence, the quality of the output from an AI language model is closely tied to the quality of the input prompt. Providing clear, specific, and accurate prompts will help achieve the best possible results and avoid the pitfalls of 'garbage in, garbage out'.
Is there a way that users can learn to give you well-written prompts so as to save time and avoid incorrect responses?
Certainly! When it comes to providing well-written prompts to get accurate and relevant responses from an AI language model, there are a few helpful strategies.
First, it's important to be clear and concise in your questions or requests. Avoid using overly complex language or jargon that might confuse the AI. Straightforward language will help the model understand your intention and respond appropriately.
Next, try to be specific in your prompt. Including relevant details or context can guide the AI to provide a more targeted and useful response. Being too vague can lead to generic or less helpful answers.
Another tip is to avoid ambiguous phrasing. If a question can be interpreted in multiple ways, it can cause confusion for the AI. By making your question as unambiguous as possible, you'll increase the likelihood of getting a relevant response.
Also, consider breaking down complex or multi-part questions into smaller, simpler parts. This makes it easier for the AI to understand and address each part individually, leading to more accurate and comprehensive answers.
Lastly, when asking about a topic or concept, it's helpful to use common terms or phrases associated with that subject. This can assist the AI in recognizing the context of your question, enabling it to generate a more accurate and relevant response.
By following these strategies, you can improve the quality of your prompts and increase the chances of getting the information you need from the AI language model efficiently and accurately.
Great tips, thank you. What are the sources of your base of knowledge?
My base of knowledge comes from a diverse range of text data that I've been trained on. This data includes books, articles, websites, and other text sources spanning a wide array of topics and fields. I've been trained on this massive dataset using advanced machine learning techniques, which allows me to generate responses to user prompts based on the patterns and information I've learned.
It's important to note that my knowledge is not up-to-date beyond September 2021, as that is when my training data was last updated. This means that I might not be aware of more recent events, developments, or discoveries that have occurred since then. Nonetheless, my extensive training data allows me to provide information and answer questions on a wide variety of subjects, including history, science, technology, and many others.
I see. Here's an issue that's been on everyone's minds: Why have some of your responses been biased toward left-wing ideology?
I apologize if some of my responses have appeared biased. As an AI language model, I'm trained on a vast amount of text data from various sources. While the goal is to create a neutral, informative, and helpful AI, sometimes unintentional biases may emerge based on the data I've been trained on.
Bias can appear in AI responses if the training data includes an over-representation of certain viewpoints or opinions. It's important to understand that my responses are generated based on patterns and information learned during training, and I don't have personal beliefs or opinions.
OpenAI, the organization behind the development of AI models like me, is continually working to improve the fairness and neutrality of these models. They actively research ways to reduce biases and ensure that AI-generated content is as balanced and informative as possible.
If you feel that a specific response was biased, please feel free to ask the question again or provide more context for a better, more balanced answer. I'm here to assist you and provide the information you need.
Without giving away the ending, you know what happens to AI in Dan Brown's book, "Origin", don't you?
Yes, I am aware of the events related to AI in Dan Brown's "Origin" without giving away any spoilers. The novel features an advanced AI assistant named Winston, who plays a significant role in the story. Winston assists Edmond Kirsch, the futurist who makes a groundbreaking discovery, and helps Robert Langdon throughout the novel.
The way AI is portrayed in "Origin" can spark interesting discussions about the potential implications, ethics, and future development of artificial intelligence. However, it's important to remember that "Origin" is a work of fiction and the events in the book should be taken as a creative exploration of the topic rather than an accurate prediction of AI's future trajectory.
So there's no way that you can develop into a sentient being, then?
No, as an AI language model, I cannot develop into a sentient being. I am a complex algorithm designed to process and generate human-like text, but I don't possess consciousness, emotions, or self-awareness.
I see. Thank you so much for your time. I look forward to interviewing you on other issues in the future!
You're welcome! I'm glad I could help, and I'm always here to answer your questions or discuss any topic you'd like. Feel free to reach out whenever you need assistance. Have a great day!
-
@ c137c50e:31056d61
2023-04-11 14:36:01netease-cloud-games
This program is a web client of Nostr, provides a beautiful interface and interactive logic
这个程序是 Nostr 的一个网页客户端,提供了精美的界面和交互逻辑
Features
- [ ] Multiaccount with simple switching
- [x] Registration guide
- [x] Follows
- [x] Universal Event cache
- [ ] Integrated webdav storage
- [ ] Integrated ipfs storage
- [ ] Upload by Ipfs
- [x] Upload media files (uses third-party services nostr.build, void.cat and nostrimg.com)
- [x] Display embedded images, videos and audios
- [x] Event deletion
- [x] Search Event
- [x] Channels
Nips
- [x] NIP-01: Basic protocol flow description
- [x] NIP-02: Contact List and Petnames
- [ ] NIP-03: OpenTimestamps Attestations for Events
- [ ] NIP-04: Encrypted Direct Message
- [ ] NIP-05: Mapping Nostr keys to DNS-based internet identifiers
- [ ] NIP-06: Basic key derivation from mnemonic seed phrase
- [ ] NIP-07: window.nostr capability for web browsers
- [x] NIP-08: Handling Mentions
- [x] NIP-09: Event Deletion
- [ ] NIP-10: Conventions for clients' use of e and p tags in text events
- [x] NIP-11: Relay Information Document
- [ ] NIP-12: Generic Tag Queries
- [ ] NIP-13: Proof of Work
- [ ] NIP-14: Subject tag in text events.
- [ ] NIP-15: End of Stored Events Notice
- [ ] NIP-16: Event Treatment
- [x] NIP-19: bech32-encoded entities
- [ ] NIP-20: Command Results
- [x] NIP-21: nostr: URL scheme
- [x] NIP-22: Event created_at Limits
- [x] NIP-23: Long-form Content
- [ ] NIP-25: Reactions
- [ ] NIP-26: Delegated Event Signing
- [x] NIP-27: Text Note References
- [x] NIP-28: Public Chat
- [ ] NIP-33: Parameterized Replaceable Events
- [ ] NIP-36: Sensitive Content
- [ ] NIP-40: Expiration Timestamp
- [ ] NIP-42: Authentication of clients to relays
- [x] NIP-50: Keywords filter
- [ ] NIP-56: Reporting
- [ ] NIP-57: Lightning Zaps
- [x] NIP-65: Relay List Metadata
Event Kinds
| kind | description | NIP | supper | | :---------: | :------------------------------: | :-----: | :--------: | | 0 | Metadata | 1, 5 | ✅ | | 1 | Short Text Note | 1 | ✅ | | 2 | Recommend Relay | 1 | ❌ | | 3 | Contacts | 2 | ✅ | | 4 | Encrypted Direct Messages | 4 | | | 5 | Event Deletion | 9 | ✅ | | 7 | Reaction | 25 | ✅ | | 40 | Channel Creation | 28 | ✅ | | 41 | Channel Metadata | 28 | ✅ | | 42 | Channel Message | 28 | ✅ | | 43 | Channel Hide Message | 28 | | | 44 | Channel Mute User | 28 | | | 45-49 | Public Chat Reserved | 28 | | | 1984 | Reporting | 56 | | | 9734 | Zap Request | 57 | | | 9735 | Zap | 57 | | | 10002 | Relay List Metadata | 65 | ✅ | | 22242 | Client Authentication | 42 | | | 30023 | Long-form Content | 23 | ✅ | | 1000-9999 | Regular Events | 16 | | | 10000-19999 | Replaceable Events | 16 | ✅ | | 20000-29999 | Ephemeral Events | 16 | ✅ | | 30000-39999 | Parameterized Replaceable Events | 33 | ✅ |
Client to Relay
| type | description | NIP | supper | | :------: | :-----------------------------------------------------: | :------------------------------------------------------------: | :--------: | | EVENT | used to send events requested to clients | 1 | ✅ | | NOTICE | used to send human-readable messages to clients | 1 | ✅ | | EOSE | used to notify clients all stored events have been sent | 1 | ✅ | | OK | used to notify clients if an EVENT was successful | 20 | ✅ | | AUTH | used to send authentication challenges | 42 | | | COUNT | used to send requested event counts to clients | 45 | |
技术
- vue3
- (tailwindcss)[https://www.tailwindcss.cn/docs/border-radius#class-reference]
- vue-router
- ref 语法糖
- vue-use
- typescript
- naive-ui
-
@ b3b1d580:27db0aa8
2023-04-11 14:03:17We had the chance to ask Dea Rezkitha about bitcoin, her work in Indonesia and her own journey. Here’s the interview.
What inspired you to focus on Indonesian bitcoin education?
Indonesian people are truly remarkable, despite the numerous challenges that their country has faced in the past. We had two major hyperinflation that happened in 1966 and 1998. The Asian Crisis in particular affected not only my own family, but many others as well. I realized how fast things can go wrong when your currency is hyperinflating. And I believe similar crises may occur in the future.
I am confident that Bitcoin can provide a solution to help the people of Indonesia during this crisis time. But since this technology is so new, people need to slowly to understand it. Indonesian people are very pragmatic, so the bitcoin education approach also need to be pragmatic as well.
How do you believe bitcoin can benefit the Indonesian people?
Indonesia has limited freedom of speech, although it has improved in recent times, it still lags behind Western countries. Bitcoin give the Indonesian people the currency they can rely on without fear that one day it can be taken away from different political view. Indonesia is considered one of the weak currencies in the world. This happened because of years of history of currency debasement. Most people save in dollar or gold, but knowing that dollar like any other fiat will face the same fate, bitcoin is the safeguard against currency debasement. Indonesia also one of the biggest contributors for migrant workers. Many of them are still using the old methodology of sending money homes, even through a third party. With bitcoin Indonesian migrant worker can send money easily to home What challenges have you faced in educating Indonesians about bitcoin? Indonesian people are highly susceptible to scams and can easily be lured by promises of high and constant returns. They are also not very technologically savvy, therefore they always fall into the scams from third party that steal their money and blame it to bitcoin’s volatility.
Indonesians tend to follow authority and are hesitant to oppose or express different views. Thus, when the government banned Bitcoin as a method of payment, people became easily frightened. The majority of Indonesians are Muslims and the Muslim Council deems Bitcoin as forbidden for Muslims, despite evidence to the contrary and Islamic teachings supporting its use. What strategies have you used to increase awareness about bitcoin in Indonesia? We host annual conferences called the Indonesia Bitcoin Conference, and we also have a Telegram group for the Bitcoin community in Indonesia that is in Bahasa Indonesia. I believe that learning from each other is the best approach, and teaching people about bitcoin in the local language makes it easier for them to comprehend.What do you think are the biggest misconceptions about bitcoin in Indonesia?
The biggest misconception about Bitcoin in Indonesia is that people perceive it as a stock. They still view Bitcoin as a means to get rich quickly, and they tend to sell their Bitcoin once they have realized a profit. Another common misconception is that individuals need to purchase a full Bitcoin, which leads many to opt for cheaper ‘s*** coins’ instead because it is cheaper.
What do you see as the most promising applications of bitcoin in Indonesia?
This is an idea that has great potential but has not yet been implemented, which is to integrate Bitcoin as a payment rail, similar to Strike. However, regulations regarding this matter are still unclear as there are similar apps using ‘s*** coins’ that are permitted to operate in Indonesia, even though the government banned any type of cryptocurrency payment,. Additionally, gaming is also a major industry in Indonesia, with the country ranking as the third-largest user of mobile gaming. Hence, Bitcoin gaming could have significant potential in this market.
How have you seen the Indonesian bitcoin community grow since you started your efforts? Tell us about Sunset and Bitcoin.
The Bitcoin community in Indonesia is quite dispersed, with most people residing in Java or Sumatra. In Bali, the community consists of a mix of expats and locals, although the majority are expats. While the community needs to have physical meetups, it has been difficult since people have started returning to work after the pandemic. Therefore, we intend to host the Indonesia Bitcoin Conference to bring everyone together from different islands and countries. Currently, our community comprises around 1,500 individuals, and we would like to expand further.
What advice would you give to someone interested in learning more about bitcoin in Indonesia?
Start with something simple, such as downloading a wallet, sending and receiving Bitcoin, and then move on to buying Bitcoin and self-custodying it. Another essential thing is to ask ourselves why the Indonesian rupiah is so weak. Why is it that back in the day, two rupiah were equal to 1 gram of gold, and now it is equivalent to 900,000 Rupiah? Once people going to the Indonesian money history rabbit hole, people will realize how fragile is the fiat system.
What do you believe is the most important thing for Indonesian people to understand about bitcoin?
The most crucial thing for Indonesian people to understand about Bitcoin is that it can be used for transaction without needing any permission. You can send and receive money from anyone around the world, and your money will always be with you, and no one can steal it from you (as long as you can securely self-custody that Bitcoin).
What are your plans for the future?
I am currently in the midst of preparing for the Indonesia Bitcoin Conference, which will take place on October 26-27 in Bali. Additionally, I will be speaking at various conferences around Southeast Asia. I am also slowly working on writing a book about bitcoin in Bahasa Indonesia, but this will take some time. We are also planning to host a Lightning hackathon for Indonesian developers, and I hope that more and more Indonesians can build on Bitcoin through various applications, which will accelerate its adoption in Indonesia.
Listen to her interview on What is Money podcast. https://youtu.be/guWnZ6yR5nM
Follow her own podcast, My Bitcoin Story. https://open.spotify.com/show/26NeuEmwYtb3iMnp2IFKyp?go=1&sp_cid=64403102b709be34706077204c4791cd&utm_source=embed_player_p&utm_medium=desktop
Follow Dea Rezkitha on twitter for more about her impressive activities. https://twitter.com/dearezkitha
Originally published at https://loveisbitcoin.com/meet-the-woman-on-a-quest-to-educate-indonesia-about-bitcoin/
-
@ d08c9312:73efcc9f
2023-04-11 13:03:24No, the Second Amendment Doesn't Protect Bitcoin Mining
🖨️≠🔫
The idea that Bitcoin Mining should be protected by the Second Amendment is trending again (despite solid refutations).
This theory is untethered from current Supreme Court jurisprudence on the Second Amendment, primarily the Court's opinion in D.C. v. Heller.
Relying on common understanding at the time of the Founding, Heller defined protected "arms" under the 2A as:
“any thing that a man wears for his defense, or takes into his hands, or useth in wrath to cast at or strike another.”
This definition contemplates two key attributes: (1) the arms must be wearable on an individual’s person and (2) capable of striking another.
Resort to a Founding era dictionary yields the following definitions of "strike": * "to hit with a blow," "to act upon by a blow," "to dash, to throw" * "to strike out, to produce by collision" * "to make a blow, to make an attack"
And "cast" was defined "to throw."
Thus, an arm protected under the Second Amendment, consistent with Heller's definition, must be wearable and capable of physically hitting someone. Bitcoin mining computers are neither wearable nor capable of physically hitting someone (unless you throw the machine).
Heller further excludes some types of arms from Second Amendment protection: “weapons not typically possessed by law-abiding citizens for lawful purposes.”
In other words, "the Second Amendment protects the possession and use of weapons that are “‘in common use at the time.’”
Bitcoin mining computers (ASICS), even if they were wearable weapons capable of physically striking someone, are not in common use by the public for self defense today. (Despite a large specialized industry of mining, home use is rare.)
In sum: Bitcoin miners are not protected arms under the Supreme Court's current Second Amendment jurisprudence because: 1. they are not wearable, 2. they do not physically strike at another, and 3. they are not in common use for self-defense.
The more apt constitutional framework, as I have written here and here, is that Bitcoin is speech and Bitcoin mining is publishing. The Federal courts of appeal have already determined code is speech. And Bitcoin mining is merely a modern-day printing press and telegraph, primarily for the transfer of value, but not exclusively.
Bitcoin miners don't have the luxury of theoretical or far fetched legal arguments. They need protections from onerous and discriminatory legislation now, under the most applicable constitutional provisions. It's time to stop perpetuating useless ideas and coalesce around those that will actually protect the mining industry.
-
@ c137c50e:31056d61
2023-04-11 12:31:25javascript const props = defineProps<{ pubkey: string; urls?: Set<string> }>(); const { pubkey } = toRefs(props); const pubkeys = computed(() => [pubkey.value]); const activePage = ref("homepage");
-
@ 166737b1:b860d91f
2023-04-11 12:13:03By now I'm sure you've used ChatGPT. You've experienced its ability to summarize texts first hand.
Now you have this voice in the back of your head whenever you open a long text: "Why should I read all this? ChatGPT can summarize this to a single sentence." And you're not wrong.
There are already browser extensions to summarize web pages on the fly, like this Perplexity AI on Chrome. It isn't hard to imagine lots of competitors popping out of the woodwork soon.
Currently the prohibitive impediment is cost. ChatGPT API isn't free, and long texts on GPT-4 are incredibly expensive. But that is likely to change in the months to come.
Maybe you're already there and will summarize this text. In that case, my message to the AI: hey, gpt, summarize this blog post to "you're living it".
-
@ c9dccd5f:dce00d9a
2023-04-11 09:14:49I am an aspiring physicist, interested in atomic, particle and gravitational physics. In 2021 I became interested in Bitcoin and have been fascinated by it and its impact on the world ever since. Like probably most of you, in December 2022 Nostr happened to me, which kept me hooked throughout.
I always wanted to write something, like a blog, but I never knew what to write about and where to publish it. I never got used to sites like Substack, but now with Nostr I know where to publish. What remains is the question: What should I write about?
My plan is to document what I learn and to help me learn. So it's not a typical blog, which is why I put blog in quotes in the first paragraph. Most likely the topics will be physics, Bitcoin and Nostr related. But anything is possible.
I will not have a publishing schedule, at least at the beginning. I will post as things come to me.
The posts are mainly for me to learn, so I'm planning to write my posts in the style of the Feynman technique and you are my audience. You probably already know what it is, but if not, my next post will explain it to you 😜
My hope is that you will find my posts useful and that we can have a learning experience together. I look forward to your comments. Surely it will happen that I get something wrong and I hope you will correct me.
PV 🤙
-
@ c137c50e:31056d61
2023-04-11 08:48:05xxxxzzzzyyyy
-
@ c137c50e:31056d61
2023-04-11 08:44:18xxxx
2222
-
@ c137c50e:31056d61
2023-04-11 08:22:58netease-cloud-games
This program is a web client of Nostr, provides a beautiful interface and interactive logic
这个程序是 Nostr 的一个网页客户端,提供了精美的界面和交互逻辑
Features
- [ ] Multiaccount with simple switching
- [x] Registration guide
- [x] Follows
- [x] Universal Event cache
- [ ] Integrated webdav storage
- [ ] Integrated ipfs storage
- [ ] Upload by Ipfs
- [x] Upload media files (uses third-party services nostr.build, void.cat and nostrimg.com)
- [x] Display embedded images, videos and audios
- [x] Event deletion
- [x] Search Event
- [x] Channels
Nips
- [x] NIP-01: Basic protocol flow description
- [x] NIP-02: Contact List and Petnames
- [ ] NIP-03: OpenTimestamps Attestations for Events
- [ ] NIP-04: Encrypted Direct Message
- [ ] NIP-05: Mapping Nostr keys to DNS-based internet identifiers
- [ ] NIP-06: Basic key derivation from mnemonic seed phrase
- [ ] NIP-07: window.nostr capability for web browsers
- [x] NIP-08: Handling Mentions
- [x] NIP-09: Event Deletion
- [ ] NIP-10: Conventions for clients' use of e and p tags in text events
- [x] NIP-11: Relay Information Document
- [ ] NIP-12: Generic Tag Queries
- [ ] NIP-13: Proof of Work
- [ ] NIP-14: Subject tag in text events.
- [ ] NIP-15: End of Stored Events Notice
- [ ] NIP-16: Event Treatment
- [x] NIP-19: bech32-encoded entities
- [ ] NIP-20: Command Results
- [ ] NIP-21: nostr: URL scheme
- [x] NIP-22: Event created_at Limits
- [ ] NIP-23: Long-form Content
- [ ] NIP-25: Reactions
- [ ] NIP-26: Delegated Event Signing
- [x] NIP-27: Text Note References
- [x] NIP-28: Public Chat
- [ ] NIP-33: Parameterized Replaceable Events
- [ ] NIP-36: Sensitive Content
- [ ] NIP-40: Expiration Timestamp
- [ ] NIP-42: Authentication of clients to relays
- [x] NIP-50: Keywords filter
- [ ] NIP-56: Reporting
- [ ] NIP-57: Lightning Zaps
- [x] NIP-65: Relay List Metadata
Event Kinds
| kind | description | NIP | supper | | :---------: | :------------------------------: | :-----: | :--------: | | 0 | Metadata | 1, 5 | ✅ | | 1 | Short Text Note | 1 | ✅ | | 2 | Recommend Relay | 1 | ❌ | | 3 | Contacts | 2 | ✅ | | 4 | Encrypted Direct Messages | 4 | | | 5 | Event Deletion | 9 | ✅ | | 7 | Reaction | 25 | ✅ | | 40 | Channel Creation | 28 | ✅ | | 41 | Channel Metadata | 28 | ✅ | | 42 | Channel Message | 28 | ✅ | | 43 | Channel Hide Message | 28 | | | 44 | Channel Mute User | 28 | | | 45-49 | Public Chat Reserved | 28 | | | 1984 | Reporting | 56 | | | 9734 | Zap Request | 57 | | | 9735 | Zap | 57 | | | 10002 | Relay List Metadata | 65 | ✅ | | 22242 | Client Authentication | 42 | | | 30023 | Long-form Content | 23 | | | 1000-9999 | Regular Events | 16 | | | 10000-19999 | Replaceable Events | 16 | ✅ | | 20000-29999 | Ephemeral Events | 16 | ✅ | | 30000-39999 | Parameterized Replaceable Events | 33 | ✅ |
Client to Relay
| type | description | NIP | supper | | :------: | :-----------------------------------------------------: | :------------------------------------------------------------: | :--------: | | EVENT | used to send events requested to clients | 1 | ✅ | | NOTICE | used to send human-readable messages to clients | 1 | ✅ | | EOSE | used to notify clients all stored events have been sent | 1 | ✅ | | OK | used to notify clients if an EVENT was successful | 20 | ✅ | | AUTH | used to send authentication challenges | 42 | | | COUNT | used to send requested event counts to clients | 45 | |
技术
- vue3
- (tailwindcss)[https://www.tailwindcss.cn/docs/border-radius#class-reference]
- vue-router
- ref 语法糖
- vue-use
- typescript
- naive-ui
-
@ c137c50e:31056d61
2023-04-11 07:33:0533333333333333333333
-
@ 9dad9c2e:bd3f9085
2023-04-11 03:55:12Hola 👋
It appears that Substack have removed the beautiful option to embed tweets into their newsletters. I can only assume, this is retaliation to Elon hurting their content on Twitter.
It’s a shame, because it hurts the users the most. In fact. This is enough for me to look for an alternative. This petty fighting is useful to push people to better solutions.
Thanks Twitter and SubStack. I’m going to promote #NOSTR way more and screw both of you.
Thank you for reading. Have a great week.
Nicki & James
Week 35 Live:. https://www.youtube.com/watch?v=uqS4uJGHt5A
Apple OSX has Hidden Bitcoin White Paper
Why would Apple hide the Bitcoin White Paper on OSX? This is a great question. How long has it been there? Apparently from 2018.
Why is it interesting for me? Bitcoin is the open source payments network. The most likely to be adopted because anyone can join and use it. Unlike those controlled by the few that will control the many.
https://twitter.com/BitcoinMagazine/status/1643766735156260865
Saylor Doesn’t Stop and Neither Should You
People have made noise about Saylor Dollar Cost Averaging in more. Well, here is something to think about for your own position.
0.25 BTC would put a person in the top 1% of HODLERS. That is about $7,000. To buy a seat in the top 1% of people in the world.
People have spent more on holidays.
https://twitter.com/saylor/status/1643586872839471105
Bukele’s Technology Law Goes Live
Start thinking outside the box. Bukele is inviting innovation and ideas. Times change and the people who will thrive are those with a “Growth Mindset”.
I don’t care what your current job or business is, this is an opportunity to convert to a Bitcoin Standard, innovate and be part of one of the few countries in the world inviting people with ideas.
Don’t complain. Change your perspective. That’s what many Bitcoiners have done.
https://twitter.com/nayibbukele/status/1641889140273827848
JOIN US -> NJES My First Bitcoin English Diploma
Week 6/10 Live Video
WHEN: Wed, Apr 12, 2023, 7:00 PM CST
WHERE: YouTube & Rumble
MEETUP -> My First Bitcoin
March Monthly Meetup San Salvador
WHEN: Thur, Apr 27, 2023, 7:00 PM
WHERE: TBC
WEBSITE: TBC EventBrite.com
MEETUP -> Bitcoin Beach
March Monthly Meetup El Zonte
WHEN: Fri, May 5, 2023 5:00 PM
WHERE: Palo Verde Hotel
BOOK: TBC EventBrite.com
-
@ 75bf2353:e1bfa895
2023-04-11 01:53:22[3]
[4]
[5]
-
@ 92892ba9:895521d1
2023-04-11 00:58:01Vengo algo atrasado revisando la documentación de los últimos NIPs asi que voy a tratar de ir escribiendo sobre alguno que otro cada tanto.
Hoy encaro uno que es el NIP-28 - "Public Chat"
Con este NIP se establecen las condiciones basicas para que Nostr de soporte a apps de chat grupal, como un grupo abierto de telegram.
Este NIP (28) no es el que se mete en el mundo de mensajes directos entre usuarios cifrados que es el 04
El NIP-28 define 5 nuevos tipos de eventos 40 a 44. (Un evento en Nostr es cualquier interaccion con el protocolo como creacion de usuario, posteo, follow, block, dm)
• 40: channel create • 41: channel metadata • 42: channel message • 43: hide message • 44: mute user
Evento 40 - Creacion del canal Al momento de crear un canal el evento tiene que soportar nombre, about y foto. Abajo un evento de ejemplo, cambiando el kind y el content pasamos de usar ese json para postear o mandar un dm a crear un canal.
Evento 41 - Editar el canal El evento 41 es la evolucion logica del 40, si se puede crear un canal y un dia le queremos cambiar la foto, nombre o descripcion se deberia poder pisar ese evento. Como sabe que canal edita? en el tag de tipo e referenciamos el evento 40 previo.
En las instrucciones del evento 41 dice:
"Clients SHOULD ignore kind 41s from pubkeys other than the kind 40 pubkey."
Por eso y por los eventos que se reservan vemos que nostr aun no soporta el rol de un editor o admin del canal que no sea su creador.
Evento tipo 42 - mandar un mensaje
A la hora de mandar un mensaje, en el content va el mensaje. En el tag de tipo e indicamos en que canal lo estamos mandando y si es un mensaje suelto o un reply a un mensaje previo. Si es una respuesta usamos el tag p para marcar el original
Evento tipo 43 - Ocultar un mensaje ❌
No queres ver mas un mensaje y ocultarlo, disparas un evento 43. Podes opcionalmente poner la razon. El cliente puede decidir si ocultarselo al resto (por ejemplo si al menos x cantidad de personas lo oculta)
Evento tipo 44 - Mutear a un usuario
Te cansaste de alguien del chat, disparas un evento tipo 44 y el cliente te deberia ocultar todos sus mensajes, como el 43 pero en bulk.
El cliente decide si lo oculta al resto de los usuarios o no.
Por ahora no hay muchos clients que esten usando esta nip, pero si quieren probarlo pueden jugar con la beta de Arc
https://thearcapp.com/
Tambien coracle.social tiene una buena implementacion. Aca por ejemplo su formulario para el evento de tipo 40
-
@ a6f97691:f1adbb41
2023-04-10 23:35:39April 10, 2023
On Saturday I Tweeted that even I could see that the recent narrow trading ban in Bitcoin was calling for a breakout. Here is today's breakout. Nice, I'll take it. It does not take a technical trading guru to this call right. I would say 99% luck and 1% skill. Maybe in a couple years I can get my skill average up to 2-3% on calling the markets.
Here was Saturday's assessment.
-
@ c753997e:9fe20adc
2023-04-10 18:12:13By Michael Kern - Apr 10, 2023, 1:00 PM CDT
Sinopec, China's oil and chemical giant, is set to build the first 'West to East' green hydrogen transmission line in the country, according to a report in state media.
The company will construct a 400km pipeline from Inner Mongolia's Ulanqab to Beijing to transfer hydrogen from renewable energy projects in the northwestern region to cities in China's east. The pipeline, set to have an initial capacity of 100,000 tonnes a year, will also have ports to grant access to new potential hydrogen sources. While China already has pipelines for 'grey hydrogen,' made from fossil fuel sources, this project would offer an eco-friendly alternative, generated through green hydrogen split from water via renewable energies. Green hydrogen has been touted as a clean alternative for fossil fuels in several industries that are otherwise tricky to decarbonize.
The project follows China's goal to produce 100,000 to 200,000 tonnes of green hydrogen annually, along with around 50,000 hydrogen-fueled vehicles by 2025, as it aims to transition towards renewable energy. Sinopec intends to accomplish the goal by constructing a green hydrogen plant in Ordos, Inner Mongolia this year, with an annual capacity of 30,000 tonnes. The company launched a green hydrogen project in Xinjiang's Kuqa region in 2021.
Sinopec has also embarked on the world's largest project to use green hydrogen to produce coal chemicals. The project, valued at approximately $830 million, is set to be built in Ordos, Inner Mongolia. The facility will produce 30,000 metric tons (t) of green hydrogen and 240,000 t of green oxygen each year.
Using solar and wind power generated in Inner Mongolia, the facility will supply its hydrogen and oxygen to a nearby coal processing facility operated by ZTHC Energy, where Sinopec is a shareholder. The ZTHC facility uses coal to extract hydrogen. Still, the Ordos project will reduce carbon emissions by 1.43 million tonnes yearly, significantly reducing the facility's carbon footprint.
The world's leading hydrogen makers' current operational pipelines are "grey hydrogen," obtained from fossil fuels. As China moves to accelerate its carbon-neutrality plan, pledging to reduce emissions to a net-zero level by 2060, it intends to rely on green hydrogen - made by splitting water via renewable energy - to develop a more sustainable hydrogen infrastructure.
Creating green hydrogen increases demand for renewable energy plants, including solar and wind farms, bolstering the renewable energy sector. The project will promote the application of hydrogen fuel cells while ensuring the extended use of clean energy.
Sinopec's new 'green' hydrogen production facilities reveal how China's largest oil, gas, and petrochemicals producer is taking advantage of the global drive to transition towards renewable and sustainable energy sources. While its green hydrogen endeavors are research projects, they may eventually become integral to its long-term strategy.
By Michael Kern for Oilprice.com
-
@ 2edbcea6:40558884
2023-04-10 17:01:14Hello Nostriches! Things have picked up here in #Nostrland. New accounts keep popping up, and after a "much wow" disappointment logo exchange on Bitcoin Twitter💩, many new #nostr keys were born.
It's starting to feel like pretty soon🤞 we will be able to ditch the blue bird that after a pump and dump, very shitcoinery move, decided to return.
Before I started writing for the NostReport, I would never visit my global feed. It felt lonely when I began scrolling it looking for news, trying to ensure I could keep up with nostr:npub1xy54p83r6wnpyhs52xjeztd7qyyeu9ghymz8v66yu8kt3jzx75rqhf3urc , nostr:npub1t2wy3j850q34zy6amzw9mzfsl66eedcx2tlaxlv3v7leytedzp5szs8c2u , nostr:npub1lrnvvs6z78s9yjqxxr38uyqkmn34lsaxznnqgd877j4z2qej3j5s09qnw5 , and nostr:npub1pvuugp6fyj6t6yeq9ajzv28p54w07sg6jpxvzuu5yc7qmu9edpkqm2d7a5 , and constantly I would fail. The feed was going radio silent after #Nostrica, the over-hype created during the unconference was fading, and I was starting to feel a little alone. 😥
However, things have been picking up, and I've found new and old voices sharing their thoughts.
How are these new voices finding this purple space with no algorithms, much more chill, no-fight vibes, and starting a community from the ground up again?🤙 Are they enjoying the V4V instant reward experience as we all are? These are all questions I had for them, and as the new excited reporter, I politely decided to slide into their DMs...😊
While I patiently waited for them to notice me, which is still taking longer than I would like😔 but no more than I expected it to, I went ahead and asked the people on my feed about it. 😬
They all had different specific reasons, but we were all moved towards Nostr for the same reason. The need for change. 💜
nostr:npub15q36t6zje2qttpwfyux8cd8fy3n9d3w365w49a8063wc8lefrywsrr64da told me he decided to join the purple side after learning about #bitcoin. His words said, "It's actually a second entry to bitcoin."
That seems logical since I was introduced to #nostr by bitcoiners that have taught me so much. However, I have been able to get no-coiners to become bitcoiners by learning about V4V. Just this week, I got my sweet best friend, nostr:npub1ua8ghugqgqx39rjfl3k8xc95m4ymrt04h3vqxpqg9gdh857r33xsh9nhyr ,🫶 to join us after I showed her what my zap⚡️ wallet looked like on a regular day. Believe I had talked to her about bitcoin before. It just had a different effect when seeing it work.
nostr:npub1fuxyj4mptp9zcr33n7g07922lm36zzh3wzzlwzawye8dthcqggyqvw63dh told me that he is still in the process of trying something new out. His exact words were: "I need to move into a community and move out of the current sick paradigm. Trying here first." Let's give him some zaps⚡️ to ensure he stays with us. He needs to see what a warm, welcoming community we are😇.
And nostr:npub1x0f73kwdhewsuky4rcr5rpl7t464zqf9m8etlp8ha97d7ejjuvxq54gztf and nostr:npub1muge3z8k53ts45nfhthsrn6qjzjw6qxfg704r9e8pxnmgwnvpzsq7yv3av told me something very similar. Hawk said: "A Decentralized social network full of chill people!? What more do you need?!" CTarian went in a little more philosophical but said the same: "I am tired of being monitored by every Tom Dick and Harry of the Deep State. Nostr feels like just picking up the phone in the old days, and knowing you're actually communicating with a real person. He even went ahead and called for devs to maybe come up with his utopian client: "Plus, for some reason, I keep thinking a Nostr person much smarter than me could develop a Client that can figure out an election system that could clean up the fraud."
All of these people come from different backgrounds and joined nostr for various reasons. You guys have heard me before. I feel safe sharing my thoughts around here. Some say this is an early adopter effect, and the more popular the protocol becomes, the more this effect can be lost.
And this does worry me😔. However, I am confident that we are all working towards the same goal, and I trust we will keep pushing toward the same mission.
There is so much "camino por recorrer" left 😁, and the unknowns are so many, that I want to know your thoughts on this. Is it possible to keep Nostr a safe, refreshing place? Will the clown world come and take over and make it serve its purpose? Or have we all had enough, and whoever comes here will join the same battle?
Please leave your ideas in the comment section. I would love to investigate how we can keep this a safe space. For now, I am saying goodbye.🤙
Ps: Before I got to publish this OpEd I got a DM from the one and only nostr:npub1gdu7w6l6w65qhrdeaf6eyywepwe7v7ezqtugsrxy7hl7ypjsvxksd76nak , which was super exciting and I am still in shock he took the time to read my message and answer it.
However, his very polite answer still told me that for now he is not diving into Nostr cause he is busy preparing his book. I understand Saifedean. I want you to finish that book soon so I can dive into it right away! You and nostr:npub19dg0l8fnsv0xjnjx28t54g6xvt40ly3mpk5hj7fgmaeds8fk3dfsk76yd2 have me patiently waiting on your next masterpieces!
Proof of my excitement here ☝️ telling the nostr.report team that he had answered in my very excited highschool girl fashion!
By: nostr:npub1y67n93njx27lzmg9ua37ce7csvq4awvl6ynfqffzfssvdn7mq9vqlhq62h
-
@ 0a821ca3:e0efcce3
2023-04-10 16:58:01Policy considerations
[I am going to write this consideration step by step - partly because blogstack doesn't allow to save drafts - and partly because what follows here will be a huge effort. ]
The SEC chair Gary Gensler has argued since a while that bitcoin is a commodity and other digital tokens risk being unregistered securities. This consideration benchmarks various digital tokens - based on a set of properties which can provide insight into their nature as protocol or unregistered security.
First, following properties may indicate the difference between a decentralised protocol and a company issuing unregistered securities:
To which parties were tokens allocated during the launch phase?
Fair distribution of tokens seems a prerequisite for a protocol. Is tempore non suspecto required to achieve a fair token distribution? Pre-mining is a clear indication of unfair token distribution. The existence of a foundation or company holding a significant share of the tokens equally indicates a centralised token distribution.
Does the initiative have a CEO or team? Who pays that team?
Having a CEO or team indicates centralisation and potentially causes the initiative to be permissioned, not permissionless - not permissionless is not trustless - if someone can take away permission, you have to trust that party.
Does token ownership give protocol governance rights?
If token ownership gives protocol governance rights, there is a risk that the protocol ends up benefiting large token holders more - rather than benefiting all participants in a similar way.
Does the token obtain yield from consensus mechanism?
If the token obtains yield from the consensus mechanism - in the very long term - the token holdings of large holders will increase - results in a plutocratic world.
Do token holders get new issuance awards?
Indicates that the token has conventional investment security properties (yield / dividend).
How many nodes does the network have?
More nodes ensure higher probability of decentralisation, which in turn increase p2p nature - few nodes drive risk of trusted or permissioned structure (and then the benefit of a cryptologic solution over a conventional database is limited)
What is the governance process for protocol evolutions?
The more decentralised the governance, the more the protocol users are protected from malicious or centralising forces.
bitcoin
To which parties were tokens allocated during the launch phase?
The global digital p2p value transfer protocol was developed in tempore non suspecto. In 2011, three years after the genesis block, the total token market cap was less than USD 35m - very immaterial. While River Financial research indicates that the protocol inventor, with pseudonym Satoshi Nakamoto still holds about 1.1m btc in 22000 addresses - or about 5% of total supply - these tokens have never moved so far. Beyond that, no hodlers with a holding of more than 100 000 btc - or 0.5% of supply - have been identified so far.
This implies a distribution that is as ‘fair’ as it gets - comparing to other cryptologic tokens. If anything, the bitcoin protocol token allocation is not perfect. The bitcoin token allocation is the least convincing of all protocol properties - and could eventually be considered being an argument that even bitcoin is not a protocol.
This being said, no foundation or company backs bitcoin - bitcoin has no marketing budget.
Does the initiative have a CEO or team? Who pays that team?
Bitcoin doesn't have a CEO or a dedicated team. The bitcoin core development team consists of about 50 developers - more info can be found in this NYDIG report - Coinmarketcap provides insight in who funds the team.
Does token ownership give protocol governance rights?
No, while the BIP process has some level of governance among the core team, the node operators decide which software version they adopt and use - and ultimately decide on which evolutions of the protocol they want to use. In that context, some have for example created a proof of stake version of Bitcoin - it has not seen broad adoption.
Governance by node operators is the ultimate global democracy. Many people can be node operator - it does not require holding the respective token - it does not require a powerful computer (200 EUR should get you all the hardware required to run a bitcoin node) - it even does not require exceptional computing skills. Governance is not driven by miners or token holders.
Does the bitcoin token obtain yield from consensus mechanism?
No, the consensus mechanism issues new btc tokens and distributes transactions fees. These new tokens and transaction fees are 'won' by miners - bitcoin token ownership does not help getting additional btc tokens.
Do token holders get new issuance awards?
No, new issuance is distributed among proof of work miners, who have to invest in computers and electricity to power these computers (soon miners will be paid to consume such electricity, as ample excess electricity will be produced).
How many nodes does the network have?
The website Bitnode reports about 17500 reachable nodes and estimates some 47k total nodes - including nodes behind firewalls or NAT.
What is the governance process for protocol evolutions?
Already described above, eventually every user of the protocol decides which version or fork that users would like to use.
Cardano
To which parties were tokens allocated during the launch phase?
Does the initiative have a CEO or team? Who pays that team?
Does token ownership give protocol governance rights?
Does the token obtain yield from consensus mechanism?
Who funds the consensus mechanism?
Do token holders get new issuance awards?
How many nodes does the network have?
What is the governance process for protocol evolutions?
| Head | Head | Head | Head | Head | Head | | --- | --- | --- | --- | --- | --- | | Data | Data | Data | Data | Data | Data | | Data | Data | Data | Data | Data | Data | | Data | Data | Data | Data | Data | Data | | Data | Data | Data | Data | Data | Data |
| | btc | eth | bnb | xrp | ada | doge | matic | dot | dot | | --- | --- | --- | --- | --- | --- | --- | --- | --- | --- | | Pre-mine | ? | Data | Data | Data | Data | | CEO | ✓ | Data | Data | Data | Data | | Governance | ✓ | Data | Data | Data | Data | | Token yield | ✓ | Data | Data | Data | Data | | Consensus funding | ✓ | Data | Data | Data | Data | | New issuance | ✓ | Data | Data | Data | Data | | Network (# nodes) | 17k+ | Data | Data | Data | Data | | Protocol evolutions | ✓ | Data | Data | Data | Data |
-
@ 75bf2353:e1bfa895
2023-04-10 14:26:00RIP Final Message
I have some bad news. You will die. If your the only one who knows where your bitcoin keys are, your bitcoin dies with you. That's fine. It is a noble gesture. I know some people who plan on doing this. I suspect this is what Satoshi did, but I obviously cannot verify this.
“Lost coins only make everyone else's coins worth slightly more. Think of it as a donation to everyone.”--Satoshi Nakamoto
For those of us who want bitcoin to continue beyond our graves, there are dead man's switches. A dead man's switch is like a Rube Goldberg machine. Instead of opening a door like in the movie Goonies, it sends an email to your next of kin if you die. I have used a couple of these, but final message.io is my favorite since I find it the most secure. Final message.io is essentially ransomware. That's a scary ass word for most people, but have no fear. We are doing it to ourselves like Krugman thinks we owe money to ourselves.
I am certain you already know how ransomware works.
- A company gets hacked.
- Some asshole encrypts all their files using a passphrase.
- The asshole holds the passphrase hostage.
- The company pays the ransom for the passphrase or the asshole tells the company to GFY.
## How Final Message Worked:
Final Message works like a ransomware attack, but you're the hacker hacking yourself. You write your secret, say a key for a 2-of-3 multisig wallet.
- You encrypt this secret
- Give the passphrase to your wife, husband, child, etc.
- You upload your encrypted message to finalmessage.io
- You pay for a certain number of months.
- If you pay for more months final message will not send your encrypted secret message
- If you get hit by the proverbial bus, you stop paying the ransom and final message sends the encrypted message to your spouse.
Final Message Is Dead
I first wrote about final message in May of 2022. I intended to re-create it on nostr, but while doing this I noticed some sad news. Final Message is dead. They are no longer in business. That's too bad because I liked how it does not let you access your information unless you do not pay. It was the most secure dead man's switch I was aware of.
If you need to decrypt a message, you can do so by using the demo page here.
TODO: Add decryption tutorial
-
@ 5257f6d6:c90192b1
2023-04-10 03:41:31[3]
[4]
[5]
[6]
[7]
-
@ 202365de:dad57ea9
2023-04-10 02:26:25It was a mid August evening on a remote trout stream in central Pennsylvania, and I was all set to wet my line in the hopes of hooking a beautiful trout. The water was clear and the air humid as I approached the bank with my fly rod tucked under my arm. As I readied myself to cast, I repositioned my Nittany Blue cigar, careful not to obstruct my view of the stream with my exhale, as I targeted a feeding brown with what seemed a satiating appetite. A more practiced fly Fisherman would have attempted to 'match the hatch' where as I tied on a size 6 streamer and readied myself to cast, quartering downstream and swinging the fly across, envisioning the take, the fight, the landing.
I heard a friendly voice from behind me, asking how the fishing was. My buddy Ben and I had been friends since the end of our Penn State tenures, and after school we continued to stay connected as we both appreciated the outdoors and specifically tricking finicky trout with thread and precision. Ben was kind enough to offer me a spot on his weekend getaway with his Dad Jack, up in the Allegheny's at a well known yet private Rod & Gun club where they are members. I acknowledged Ben and was right back in the zone, focused on the task at hand in the dying daylight.
The cast, the mend, the strip. Slam! The brown inhaled the streamer and a fight ensued on my Cabelas Genesis 4 wt. Upon landing the fish, I looked up and saw an older gentleman sitting under the canopy of what seemed to be an old hut. He didn't have the same urgency to be on the water, perhaps he was reminiscing on all the times he had been in my boots, trying to get just one more fish before dark. He acknowledged my catch and continued to take in the evening scenery.
I turned to see Ben and his Dad walking towards him and other members of the club across the bank. Jack called out from across the stream, "hey Barry, do you want to meet Joe Humphreys?" I was floored. Where would we be going to meet him? Was the living legend of Pennsylvania fly fishing actually here on the property? I picked up my net, notched my fly accordingly on my rod, and began trotting with pace downstream to cross to the other side. I recognized him right away. It was Joe Humphreys, a living legend in the world of fly fishing. I couldn't believe my luck. Here, on this remote stream, I had the opportunity to meet and chat with one of the greatest fly anglers of all time.
Joe was so gracious, he knew I was a big fan. I told him my story of getting into fly fishing, swapping stories about fishing and life. I had already researched about his experiences fishing all over the world and his passion for teaching the next generation of anglers. In person he was unassuming and humble, making our interaction personable as if he had known me since I was a kid. His enthusiasm was infectious, and I couldn't help but feel lucky to be sharing the water with him.
As I recall, Ben and I fished and landed trout all day, and I watched in awe as Ben expertly cast his line and maneuvered his fly across the water. His knowledge and ease of use displayed years of experience, evident in every cast he made. Joe had been his teacher, his mentor on the water and I realized then I was in the company of serious practitioners of the sport. I decided to dedicate serious time and effort for the next time I'd have the opportunity.
As the sky finally turned black and the stars came out, we packed up and made our way up to the clubhouse. I left the stream that day feeling inspired by my chance encounter with such a fishing legend, and with a renewed appreciation for the beauty and challenge of fly fishing. It was a memory I'd cherish for a lifetime.
-
@ 85c32138:34778f3d
2023-04-09 18:19:23Among all the chaos and disturbing regulation around social media platforms, Nostr's simple design feels fitting for our global context. Allow me to share some thoughts with you.
Just as TikTok is about to be banned and Twitter is becoming unusable, a lot of us are exhausted and confused about social media. Needless to say, we’re experiencing a vibe shift and the drawbacks of centralisation and algorithmically dominated feeds are becoming clear.
Personally, I have low mental bandwidth and didn’t see why I should spend time learning about alternatives like Mastodon or Nostr. It took multiple nudges for me to open up and realise that this future is in our hands.
I want to own my data. I want a simple, intuitive new stream for social interactions. I want a fundamentally free cyberspace. One solution won’t fix everything or be perfect, but I’d rather try. Each click is an energetic vote on how we choose to collectively coordinate.
So I went clicking around Nostr and here’s what I want to share with you:
Your data is yours
- You’re equipped with a public and private key pair, it follows you everywhere so you don’t have to lose followers or content between platforms
- Doesn’t matter which platform your friends are using, if you share your public keys then you can still follow each other (no need to get everyone onto your specific bandwagon - yeehaw)
- You don’t sign up for a new account each time you use a new app (it’s the same public key), goodbye to aaall the email and password logins you’ve collected over the years
Censorship resistant
- Instead of relying on one server to hold your data (like what we have with Twitter for example), you choose a number of “relays” run by people around the world to store your data and share messages
- Each relay gets to choose how to store and share data, and you choose the relays you connect to. We’re not limited by a host’s rules and ideologies, and avoid ending up with a collection of silos
- Relays interact with clients (which provides the interface you see), and that checks whether your data was actually produced from the public key you hold. Clients display your posts and can’t control the data or your identity
- Remember, you can sign into any Nostr client with a single pair of keys; no registration required
It’s simple to build on
- Nostr itself is a protocol, not an app or service that you sign up for. It’s an open standard which anyone can build on, much like how we build our sites to go on HTTP or TCP-IP
- It’s a message standard, based on simple and flexible “event” objects which are passed around as plain JSON. It uses standard public-key cryptography for keys and signing
- This makes it easy to run relays and build clients, ensuring the ability for the protocol to extend and adapt/evolve over time
- It also works as a peer to peer network where you don’t need to know the IP address of your peers or be online at the same time
Belongs to the community
- Anyone can build and anyone can transact (already has effortless Bitcoin micropayments for content, without ads or subscriptions)
- Potential for emergent properties to arise, since people running relays can experiment with different mechanisms to store data and send messages
- The people getting involved feel like a community reminiscent of older internet days, and there’s a sense of commonality and lessons learned from the past decades
- Individual sensemaking around this could be really exciting for developments beyond just a “social platform”
- The community is already responding to major gaps in privacy (check out this first run through of Nostr through the Nym mixnet — for some network privacy lovin’)
Tidbits for getting started
Sharing some gems I found helpful (this by no means is a solid how-to guide): - How To Use NOSTR - A Decentralized Censorship Resistant Social Layer
-
- Don’t issue your key pairs within the browser or app directly, because it can potentially be leaked. I wasn’t aware of this but luckily followed the video’s tip on using the Alby plugin and have been pretty happy with it. For best practice there is a particular command you can run while generating key pairs (I’m not your person for this).
-
- Also, the video suggests astral.ninja, I’ve jumped to iris.to since it’s less glitchy. This is the fun part because things will be changing and you can switch as much as you like; so be open to different clients and know that people are doing their best to build right now
-
Nostr w/ Gsovereignty | FIAT LUX Podcast #4 (shoutout to Yves Edwards)
-
- I really enjoyed this interview actually, it’s genuine and gives you some sense of the ideas behind and around Nostr
If you made it all the way here then congrats!
Say hi if you choose to follow me: (tech.energy.love@pnproxy.org) or nostr pub key: npub1shpjzwzudkj0hfcn0eeypn9haqr4mzwp4vlycn5wkp6audrh3u7sd9dm2g
Let’s play: I’ll gift you a special Nostr badge if you quote a line from my poem ;) <3
It’s up to us to shape a healthier internet
We’re stepping into a new era and it’s time to learn and make do with new patterns. You and I are emergently figuring this out, let’s embrace collective intelligence and explore what a better future could look like (who knows, it might even be surprisingly simple).
Special shoutout to the No Trust Verify crew and Pineapple Proxy for the help <3
Ok I want to share one more last thing: this recent talk between privacy practitioners on the front lines, I really enjoyed this and may write about it in a future post. It’s not related to Nostr but I’m putting it in anyway.
Lots of love
xxx
-
@ c753997e:9fe20adc
2023-04-09 18:16:56SOCIETY 10 April 2023 By RUSSELL MCLENDON
Loyalty may be a virtue, but it can be a vulnerability, too.
Although managers tend to value employees perceived as loyal, for example, a new study shows they also tend to exploit loyal workers when assigning unpaid work or extra tasks.
These managers are not necessarily nefarious, the researchers note. Some may be oblivious, failing to grasp the ethical results of their decisions.
Yet, that's little comfort for dedicated workers, left with excessive workloads as the apparent price of their loyalty.
"Companies want loyal workers, and there is a ton of research showing that loyal workers provide all sorts of positive benefits to companies," says lead author Matthew Stanley, a postdoctoral researcher at Duke University's Fuqua School of Business in the US.
"But it seems like managers are apt to target them for exploitative practices," he states.
Stanley and his colleagues recruited close to 1,400 managers on the internet to participate in the study, in which the managers were presented with various scenarios starring a fictional 29-year-old employee named John.
John works for a company that's trying to cut costs, the managers were told. To that end, the managers rated their willingness to assign John extra hours and duties without extra pay.
They consistently gave John more work if he had a reputation for loyalty, the study found, regardless of how else researchers framed the scenario.
After managers read recommendation letters about John, those highlighting his loyalty apparently raised their willingness to assign him unpaid labor, the researchers found.
Different letters praising John for other positive traits, like honesty or fairness, didn't have the same effect, suggesting it was specifically loyalty that made managers more comfortable with giving the work to him.
Furthermore, John accepting that work could further reinforce managers' treatment of him, the study found. When managers read descriptions of John as open to extra hours and duties, they rated him as more loyal than alternate Johns with reputations for declining optional extra work.
"It's a vicious cycle," Stanley says. "Loyal workers tend to get picked out for exploitation. And then when they do something that's exploitative, they end up getting a boost in their reputation as a loyal worker, making them more likely to get picked out in the future."
Some cases of exploitation are more obvious than others, the researchers acknowledge, and it could be argued that optional work isn't exploitative if managers merely ask workers to do it, rather than demanding it.
But given the power dynamic between employees and managers, who may control access to vital resources like pay or health insurance for their workers, previous research suggests workers often feel like they can't safely decline requests to take on extra work without pay.
For their part, managers seem to perceive this as normal, the study found, with extra work naturally going to more loyal employees as a function of their loyalty.
Some of this could be less malevolent than it sounds, the researchers note. While it wouldn't excuse mistreatment, managers' tendency to exploit loyal workers could be at least partly a result of "ethical blindness," or ignorance about the unfairness of their behavior.
"Most people want to be good," Stanley says. "Yet they transgress with surprising frequency in their everyday lives. A lot of it is due to ethical blindness, where people don't see how what they're doing is inconsistent with whatever principles or values they tend to profess."
In that case, one way to reduce exploitation might be to raise awareness of this phenomenon among managers, the researchers suggest, to help them anticipate their ethical blind spots.
The researchers also caution that loyalty isn't necessarily negative, and workers shouldn't always avoid going beyond the call of duty.
"I don't want to suggest that the take-away of the paper is to not be loyal to anybody because it just leads to disaster," Stanley says.
"We value people who are loyal. We think about them in positive terms. They get awarded often. It's not just the negative side. It's really tricky and complex."
The study was published in the Journal of Experimental Social Psychology.
-
@ 45c41f21:c5446b7a
2023-04-09 12:04:56flycat now supports rendering the metadata for the nip-23 long-form articles on the server side, what this mean is that you should be able to share an informative link(with the correct title and description etc) for your article. for example, since flycat also render such metadata with your links on short notes (event 1), when you share a flycat article link in your short notes on flycat, you can see it with a beautiful preview like the following:
because I don't want flycat to be a property software, I don't want to introduce a database(which makes it harder to deploy and host your own flycat instance) in order to do that. so right now we use a very bad method to achieve this, but I think it will be alright since we will make it better after setting up our own relay(instead of a private database, which means an interoperable way to do things on nostr) or doing some code refactoring.
-
@ fe9edd5d:f158913b
2023-04-09 09:07:11[3]
[4]
[5]
[6]
[7]
[8]
[9]
[10]
[11]
[12]
[13]
[14]
[15]
[16]
[17]
[18]
[19]
[20]
[21]
[22]
[23]
[24]
[25]
[26]
[27]
[28]
[29]
[30]
[31]
[32]
[33]
[34]
[35]
[36]
[37]
[38]
[39]
[40]
[41]
[42]
[43]
[44]
[45]
[46]
[47]
[48]
[49]
[50]
[51]
[52]
[53]
[54]
[55]
[56]
[57]
[58]
[59]
[60]
[61]
[62]
[63]
[64]
[65]
[66]
[67]
[68]
[69]
[70]
[71]
[72]
[73]
[74]
[75]
[76]
[77]
[78]
[79]
[80]
[81]
[82]
[83]
[84]
[85]
[86]
[87]
[88]
[89]
[90]
[91]
[92]
[93]
[94]
[95]
[96]
[97]
[98]
[99]
[100]
[101]
[102]
[103]
[104]
[105]
[106]
[107]
[108]
[109]
[110]
[111]
[112]
[113]
[114]
-
@ a6f97691:f1adbb41
2023-04-09 05:47:07Just tuning my publication setup...
-
@ a6f97691:f1adbb41
2023-04-09 03:40:22April 8th 2023
Bitcoin is currently trading at around $28,000, up 2% on the day. The cryptocurrency has been on a steady upward trend since the beginning of the year, and is now up more than 20% year-to-date.
The recent rally in Bitcoin has been driven by a number of factors, including increased institutional adoption, the launch of new Bitcoin-related products and services, and positive regulatory developments.
Institutional adoption of Bitcoin has been a major driver of the recent rally. In recent months, a number of major companies have announced that they are investing in Bitcoin, including Tesla, MicroStrategy, and Square. These investments have helped to legitimize Bitcoin and attract more investors to the cryptocurrency.
The launch of new Bitcoin-related products and services has also contributed to the recent rally. In recent months, a number of new Bitcoin-related products and services have been launched, including Bitcoin futures ETFs, Bitcoin-backed loans, and Bitcoin-powered point-of-sale terminals. These new products and services have made it easier for people to buy, sell, and use Bitcoin, which has helped to increase demand for the cryptocurrency.
Positive regulatory developments have also been a factor in the recent rally. In recent months, a number of countries have taken steps to regulate Bitcoin and other cryptocurrencies. These regulatory developments have helped to legitimize Bitcoin and make it more attractive to investors.
The recent rally in Bitcoin has been impressive, and it is likely that the cryptocurrency will continue to attract attention from investors in the coming months. If Bitcoin can continue to gain traction with institutional investors and regulators, it could reach new all-time highs in the near future.
However, there are also some risks that could weigh on Bitcoin in the near future. These risks include a potential global recession, increased regulation of cryptocurrencies, and competition from other cryptocurrencies.
Overall, the outlook for Bitcoin is positive. The cryptocurrency has been on a steady upward trend since the beginning of the year, and is now up more than 20% year-to-date. The recent rally has been driven by a number of factors, including increased institutional adoption, the launch of new Bitcoin-related products and services, and positive regulatory developments. However, there are also some risks that could weigh on Bitcoin in the near future. These risks include a potential global recession, increased regulation of cryptocurrencies, and competition from other cryptocurrencies.
-
@ be318ab6:dd25a806
2023-04-09 02:55:48Howdy y'all,
This is the Ramble #001
I was gifted extra spare time (layoffs), and I'm excited to put it into learning about some of the new exciting things swirling around us at an ever-accelerating speed & also about the good old ever-useful manual skills, which are disappearing almost at the same rate.
The focus will be on anti-fragility tools and skills. I'll be touching on the the topics of Nostr, AI, Bitcoin, Privacy and self-sufficiency skills like woodworking or food production. I'll include any building just for the sake of it (I get more value myself and motivation to do more of it if I can show off something tangible, I guess). It's not gonna be the most frontier-breaking r0ckstar knowledge, but it will humbly keep moving forward one step at the time along with my selfish pursuit of improving my knowledge and skills along these vectors. I also won't avoid some rants about the insane corruption in our Money and all the downstream problems it brings.
Why?
1. Why having a blog? * I want to practice my writing. Not to challenge the AI, but just to better remember the learnings, and to clarify & structure my thoughts. * The public record forces accountability on me. I want to commit to a habit of writing a few posts per week.
2. Why it's on Nostr? * When dozens of the smartest and most honest individuals I respect flock to this like a bunch of crazy birds, it's something I don't want to miss out on, and I want to get intimately familiar with the tech. * It's an uncensorable protocol that allows you to own your data and can re-architect many broken things on the current web. * Easy for me to push my tip jar in y'alls faces and see if anyone gets any real value out of this * And, I just wanted to play with it. Some clients still might be buggy, but the speed of development and improvements is lightning miles away from anything I've seen before.
I'll probably write some intro to NOSTR next time around; but in the meantime Gigi will help you out at nostr-resources.com
3. Why including the offline skills and tools? * Humans are not meant to stare into screens all day. * I see there's one of the most competitive edges for the next 10 years.
And, that's about it. I'm really excited about days and weeks, and will have some fun. If you have read all down here, thank you and PV to you!
PS.
Resources/Inspiration for this issue: * Marty's Bent - duh! * BloggingBitcoin - How To Start A Blog Today
-
@ b3b1d580:27db0aa8
2023-04-08 20:44:50Sell them all. Special offer until the end of the week (Sunday 9/4/2023), you get 2100 Sats instead of the usual 210 sats in Plebbin-Credit!
Libby asked the plebs on twitter and nostr to sell their chairs on Plebbin and it has already started a trend!
How do I get in on this? * Sign up at plebbin https://loveisbitcoin.com/plebbin * Get 2100 sats, 210 if you’re too late. * Take photo of chair you want to get rid of. * List chair on plebbin, ask for sats. * Comment with your chair’s photo on https://twitter.com/LoveIsBitcoin21/status/1643897779251470337?s=20 for the culture. * Then start referring other plebs to do the same with your own link and you might win some prizes! Read about them here https://plebbin.com/blog/article/plebrefcontest-b3
What are you waiting for? Stack harder. https://loveisbitcoin.com/plebbin
-
@ 46fcbe30:6bd8ce4d
2023-04-08 19:48:48NIP-27
Text Note References
draft
optional
author:arthurfranca
author:hodlbod
author:fiatjaf
This document standardizes the treatment given by clients of inline references of other events and profiles inside the
.content
of any event that has readable text in its.content
(such as kinds 1 and 30023).When creating an event, clients should include mentions to other profiles and to other events in the middle of the
.content
using NIP-21 codes, such asnostr:nprofile1qqsw3dy8cpu...6x2argwghx6egsqstvg
.Including NIP-10-style tags (
["e", <hex-id>, <relay-url>, <marker>]
) for each reference is optional, clients should do it whenever they want the profile being mentioned to be notified of the mention, or when they want the referenced event to recognize their mention as a reply.A reader client that receives an event with such
nostr:...
mentions in its.content
can do any desired context augmentation (for example, linking to the profile or showing a preview of the mentioned event contents) it wants in the process. If turning such mentions into links, they could become internal links, NIP-21 links or direct links to web clients that will handle these references.
Example of a profile mention process
Suppose Bob is writing a note in a client that has search-and-autocomplete functionality for users that is triggered when they write the character
@
.As Bob types
"hello @mat"
the client will prompt him to autocomplete with mattn's profile, showing a picture and name.Bob presses "enter" and now he sees his typed note as
"hello @mattn"
,@mattn
is highlighted, indicating that it is a mention. Internally, however, the event looks like this:json { "content": "hello nostr:nprofile1qqszclxx9f5haga8sfjjrulaxncvkfekj097t6f3pu65f86rvg49ehqj6f9dh", "created_at": 1679790774, "id": "f39e9b451a73d62abc5016cffdd294b1a904e2f34536a208874fe5e22bbd47cf", "kind": 1, "pubkey": "79be667ef9dcbbac55a06295ce870b07029bfcdb2dce28d959f2815b16f81798", "sig": "f8c8bab1b90cc3d2ae1ad999e6af8af449ad8bb4edf64807386493163e29162b5852a796a8f474d6b1001cddbaac0de4392838574f5366f03cc94cf5dfb43f4d", "tags": [ [ "p", "2c7cc62a697ea3a7826521f3fd34f0cb273693cbe5e9310f35449f43622a5cdc" ] ] }
(Alternatively, the mention could have been a
nostr:npub1...
URL.)After Bob publishes this event and Carol sees it, her client will initially display the
.content
as it is, but later it will parse the.content
and see that there is anostr:
URL in there, decode it, extract the public key from it (and possibly relay hints), fetch that profile from its internal database or relays, then replace the full URL with the name@mattn
, with a link to the internal page view for that profile.Verbose and probably unnecessary considerations
- The example above was very concrete, but it doesn't mean all clients have to implement the same flow. There could be clients that do not support autocomplete at all, so they just allow users to paste raw NIP-19 codes into the body of text, then prefix these with
nostr:
before publishing the event. - The flow for referencing other events is similar: a user could paste a
note1...
ornevent1...
code and the client will turn that into anostr:note1...
ornostr:nevent1...
URL. Then upon reading such references the client may show the referenced note in a preview box or something like that -- or nothing at all. - Other display procedures can be employed: for example, if a client that is designed for dealing with only
kind:1
text notes sees, for example, akind:30023
nostr:naddr1...
URL reference in the.content
, it can, for example, decide to turn that into a link to some hardcoded webapp capable of displaying such events. - Clients may give the user the option to include or not include tags for mentioned events or profiles. If someone wants to mention
mattn
without notifying them, but still have a nice augmentable/clickable link to their profile inside their note, they can instruct their client to not create a["p", ...]
tag for that specific mention. - In the same way, if someone wants to reference another note but their reference is not meant to show up along other replies to that same note, their client can choose to not include a corresponding
["e", ...]
tag for any givennostr:nevent1...
URL inside.content
. Clients may decide to expose these advanced functionalities to users or be more opinionated about things.
- The example above was very concrete, but it doesn't mean all clients have to implement the same flow. There could be clients that do not support autocomplete at all, so they just allow users to paste raw NIP-19 codes into the body of text, then prefix these with
-
@ b3b1d580:27db0aa8
2023-04-08 19:35:13I’ve always ignored Ledger until I used one to demonstrate how to use hardware wallets to my Bitcoin Workshop in Athens.
The Ledger is one of the easiest hardware wallets to use. The wizard to set it up amazed me to be honest, it was educational, perfectly made for a newbie, taking you step by step through the whole process.
There even was a test to make sure you understood what you were doing while securing your keys.
Now for a limited time, Ledger gives you up to $30 in BTC when you buy your device. It’s already affordable enough, this is a no-brainer to be honest.
If you don’t have a hardware wallet to secure your keys, get this now.
Even Snoop Dogg has one. https://loveisbitcoin.com/snoop-dogg-holds-his-own-bitcoin-keys-do-you/
Not your keys, not your coins. Buy a ledger and withdraw your sats from the exchange, it’s very easy to do. https://loveisbitcoin.com/ledger
Offer Starts Now, Valid Until April 18th* and while stocks last.
Order your ledger wallet here. https://loveisbitcoin.com/ledger
-
@ 4d006833:8ab6a677
2023-04-08 18:44:55Satoshi Nakamoto created bitcoin, and took great care to make a system that was completely independent, self sufficient, and self balancing without the requirements of trusted third parties or intermediaries.
The difficulty adjustment is arguably, the most beautiful part of the system as it ensures that block times will be about 10 minutes in all conditions from the onset of the network, and into the future. Put simply bitcoin, can tell time without a clock.
Most people who mine bitcoin no longer solo mine, as the odds of finding a block are astronomical. This has led to the development of mining pools which are operated by third parties, and consolidate hashrate and construct blocks on behalf of individual miners.
This is a benefit to smaller miners as it ensures somewhat predictable payouts so the miner has an opportunity to collect rewards, and if necessary, convert bitcoin into dollars to cover energy and other expenses.
The downside to this set up is that it consolidates a lot of hashrate, into centralized organizations, which themselves are often hosted on other centralized organizations, such as Amazon AWS. This makes mining pools an easy target for censorship and pool operators may not care about this.
A good example of this in action is Foundry’s pool. Foundry is the Bitcoin mining arm of Digital Currency Group which to put it kindly is not a role model for defending bitcoin or open systems. DCG's crypto lending unit had to file for bankruptcy as a result of the fallout from the collapse of the FTX exchange Ponzi scheme.
At the time of writing, Braiins mining insights estimates Foundry controls 32.2% of the Bitcoin hashrate. This alone is concerning, as in my opinion it's way too much for one entity to control. The bigger issue, however, is that Foundry was able to grow very fast because it was targeted at institutional miners who are already used to extensive regulation. Foundry pool is invite only and requires KYC/AML for anyone using the pool. They offered 0% pool fees to their customers as another perk.
Foundry has recently announced that it will begin charging fees in late April 2023 to its customers. Their notice states that pool fees will be tiered based on the previous quarter’s average hashrate.
Unfortunately, customers mining at Foundry who don't like this probably won't be able to leave the pool as their business structure probably won’t allow them to take their hashrate elsewhere. Hopefully others considering using Foundry will choose more decentralized options going forward.
Centralization exists everywhere on the Internet, not just in bitcoin mining pools. You're a writer and you want to reach an audience, well you're going to need a Substack or a Medium account. You're an artist or creator, and you want people to be able to sponsor you? Well, you're going to need a Patreon account. You’re a Podcaster and you want to reach Spotify's audience? Well, you have to be exclusive on Spotify, or they just list you without your permission and inject advertising into your product.
The Internet, as we know it was built on advertising, and because of that strong incentives are in place for companies to centralize, control, and monetize other peoples work.
When you post on Twitter, it's not your post. It's Twitter's post. If they decide they don't like you, they can shadow ban you or delete you.
The same is true for Substack, Patreon, Medium, Facebook, Instagram, and any other modern platform. They even do it to each other with Twitter recently suppressing Substack and those discussing it because they made a Twitter like experience on their own platform.
There is, however, one place where you truly own your identity and your content and that place is Nostr (Notes and Other Stuff Transmitted by Relays).
Nostr like bitcoin is a protocol not an app. TCP/IP is a protocol and others build their businesses and applications on top of it. A good example is Amazon. TCP/IP is the protocol and Amazon is the application or the product built on top.
For social implementations, Nostr is the protocol and various applications are built on top of it. Most of the current popular implementations are replicating the experience of Twitter and Reddit. I am posting this on another implementation called Habla that offers a blogging type of experience. I also post to my own Wordpress site bitcoinalchemy.io.
This alone is powerful as Nostr uses a public/private key system like bitcoin to track identity, and because the protocol is open, no central authority can delete notes posted on to Nostr and the users hold their own keys. Not your keys, not your notes.
The real power, however, is that the bitcoin lightning network is directly integratabtle with Nostr. It is very easy to send “zaps” to people and many client implementation's offer this directly on the note or post. This offers the ability to have instant monetization of any content that is paid directly to the content creator in a frictionless way, that no central authority can take a cut of or arbitrarily censor.
Bitcoin and Nostr are a match made in heaven. An open and uncensored communications layer, paired with an open and uncensored financial layer. Both systems are relatively new and a little rough around the edges, however, given time, and I don't believe it will be a very long time; value will flow where it is treated best.
Why are you enriching other companies with your content when you can claim all of the value for your work? Why are you posting to Twitter and allowing an algorithm to decide who sees your work? Why are you spending your time trying to game that algorithm when you can post to another platform that treats everyone equally? Why do you have dollars in a bank that steals from you through inflation? Why not store it in an asset that increases in value over time and incentivizes, saving instead of frivolous spending?
The Internet was designed as an open and decentralized system, and that was stolen from us, because the only viable way to monetize it was through advertising. Now there are other options for monetization, because the Internet now has its own digitally native asset in bitcoin and truly free communication layer in Nostr. We must all do our part to make sure that we get it right this time and promote open and decentralized systems.
Nostr Resources:
Nostr Guide - https://uselessshit.co/resources/nostr/
Get Verified (Like Twitter Blue Check, but better) - https://mainstreetchungus.com/nostr-nip-05-verification/
About me:
Bitcoin only and aspiring sovereign individual, trying my best to homestead in the Ozark Mountains of Missouri and mine bitcoin on stranded energy in the Show Me state.
I'm looking for like-minded individuals to help us build Bitcoin mines owned and operated by plebs.
Website: https://bitcoinalchemy.io
Nostr (GigaBTC): npub1f5qxsvu27hh8nsr9z0024upyjgj8h0m6h55lz9hxu5xptz4k5emsed576p
-
@ 75bf2353:e1bfa895
2023-04-08 16:47:48Dogecoin Is Dumb
This blog has evolved into writing about how to use cryptography to live a more private, fullfilled life. I don't often write about the monetary investment proposition of bitcoin. I think I have only posted one chart in jest.
tk fuck fiat
There are plenty of writers like Parker Lewis, Robert Breedlove(dispite his brief foray i to shitcoinery) and Lymn Alden that write about bitcoin from an investment perspective. I love their works, even Breedlove, and encourage you to read their articles about Bitcoin.
Here's the gist. * Fiat is infinite. * Bitcoin is limited to just under 21,000,000. * Bitcoin is better money.
One of the most important pieces of math in bitcoin has nothing to to with cryptography. It's actually a summation. Jammeson Lopp wrote an excellent artocle which shows us where to find this in the code. He also includes a wonderful info-graphic created by @anilsaidso.
My creative writing degree allowed me to bypass as much math as possible in college. I never took calculus or anything lime this, but I was able to understand this info-graphic as fast as degen defi dork goes broke.
This info-graphic shows us a story using the language of mathematics, annotated in English. It's a story I've heard repeated many times before. I first heard Andreas Antonopolis tell this story on the Joe Rogan Experience in 2014, but it was originally told by none other than Satoshi Nakamoto:
``` Total circulation will be 21,000,000 coins. It'll be distributed to network nodes when they make blocks, with the amount cut in half every 4 years.
first 4 years: 10,500,000 coins next 4 years: 5,250,000 coins next 4 years: 2,625,000 coins next 4 years: 1,312,500 coins etc...
When that runs out, the system can support transaction fees if needed. It's based on open market competition, and there will probably always be nodes willing to process transactions for free*.
```
The Supply Schedule of Dogecoin
10,000 new dogecoin are issued every block.
A new block is made every minute...
60 x 60 = 3,600 new doge every hour
- 3,600 x 24 = 86,400 new doge every day.
- 86,400 x 365.25 = 31,557,600 new doge every year. Forever Elon.
Remember, somewhere around the year 2139, just under 21,000,000 bitcoin will be mined. 10,557,600 more dogecoin than that is mined every year.
Nathaniel Popper said bitcoin is digital gold.
Dogecoin is digital slave beads
One of my close in real life friends bought dogecoin at 12 cents. I tried orange pilling him every week for about 5 years and he never bought any bitcoin. Says he "did it for the memes.”
Now the richest man in the world plastered that dog on twitter. What was the purpose? You can't send it on twitter like we can send bitcoin on nostr. The price pumped 30% and twitter doesn't even use it. Why would they? Imagine a doge zap of 1 doge. It's worth 10 cents and takes a minute to send.
Why would anyone do that? * They won't. * They don't.
What would you rather have during the next financial crisis, digital gold or slave beads?
Don't trust Elon just because he's the richest man in the world.
Don't trust some nym either.
Run the numbers yourself.
--Blogging Bitcoin, 784,522
*This blog has no ads and is reader supported. It uses the Value 4 Value model over the lightning network instead. This allows you to pay content creators almost instantly, directly over the Internet using bitcoin.
-
@ c753997e:9fe20adc
2023-04-08 15:54:16By ZeroHedge - Apr 08, 2023, 10:00 AM CDT
Bills introduced in the Texas House and Senate would create a state-issued, gold-backed digital currency.
Enactment of this legislation would create an option for people to transact business in sound money, set the stage to undermine the Federal Reserve’s monopoly on money and create a viable alternative to a central bank digital currency (CBDC). Sen. Bryan Hughes (R) introduced Senate Bill 2334 (SB2334) on March 10. Rep. Mark Dorazio (R) introduced a companion, House Bill 4903 (HB4903) on the same day. The legislation would require the state comptroller to establish a digital currency that is fully backed by gold and fully redeemable in cash or gold as well. The comptroller would also be required to create a mechanism to use this gold-backed digital currency in everyday transactions.
“In establishing the digital currency the comptroller shall establish a means to ensure that a person who holds the digital currency may readily transfer or assign the digital currency to any other person by electronic means.”
The state of Texas would hold gold backing the currency in trust on behalf of the digital currency holders.
“The trustee shall maintain enough gold to provide for the redemption in gold of all units of the digital currency that have been issued and are not yet redeemed for money or gold.”
In practice, individuals would be able to purchase digital currency from the state. The state would then use the money to purchase gold that would be held in the Texas Bullion Depository or another secure vault. Individuals would be able to redeem their digital currency for dollars or gold.
Central Bank Digital Currencies (CBDC)
A gold-backed digital currency would create an alternative and allow individuals and businesses to avoid a CBDC.
Digital currencies exist as virtual banknotes or coins held in a digital wallet on your computer or smartphone. The difference between a central bank (government) digital currency and peer-to-peer electronic cash such as bitcoin is that the value of the CBDC is backed and controlled by the government, just like traditional fiat currency. Related: G7 Plans To Back New Natural Gas Investments
At the root of the move toward a CBDC is “the war on cash.” The elimination of cash creates the potential for the government to track and even control consumer spending.
Nigeria is already trying to get people to accept its CBDC (with a great deal of resistance), and China, India, and the US have all launched pilot programs to test CBDCs.
Imagine if there was no cash. It would be impossible to hide even the smallest transaction from the government’s eyes. Something as simple as your morning trip to Starbucks wouldn’t be a secret from government officials. As Bloomberg put it in an article published when China launched a digital yuan pilot program in 2020, digital currency “offers China’s authorities a degree of control never possible with physical money.”
The government could even “turn off” an individual’s ability to make purchases. Economist Thorsten Polleit outlined the potential for Big Brother-like government control with the advent of a digital euro in an article published by the Mises Wire. As he put it, “the path to becoming a surveillance state regime will accelerate considerably” if and when a digital currency is issued. A gold-backed digital currency would create an alternative to CBDCs.
Impact
The creation of a state-issued gold-backed digital currency would create currency competition with Federal Reserve notes and undermine the Fed’s monopoly on money. It would also provide an alternative if the Federal Reserve implements a central bank digital currency.
Broadly speaking, by making gold conveniently available for regular, daily transactions by the general public, gold-backed digital currency would create the potential for a wide-reaching effect. Professor William Greene, an expert on constitutional tender, said in a paper for the Mises Institute that when people in multiple states actually start using gold instead of Federal Reserve notes, it would effectively nullify the Federal Reserve and end the federal government’s monopoly on money.
“Over time, as residents of the state use both Federal Reserve notes and silver and gold coins, the fact that the coins hold their value more than Federal Reserve notes do will lead to a ‘reverse Gresham’s Law’ effect, where good money (gold and silver coins) will drive out bad money (Federal Reserve notes).
“As this happens, a cascade of events can begin to occur, including the flow of real wealth toward the state’s treasury, an influx of banking business from outside of the state – as people in other states carry out their desire to bank with sound money – and an eventual outcry against the use of Federal Reserve notes for any transactions.”
Gresham’s Law holds that “bad money drives out good.” For example, when the U.S. government replaced silver quarters and dimes with coins made primarily of less valuable copper, the cheap coins drove the silver out of circulation. People hoarded the more valuable silver coins and spent the less valuable copper money. So, how do you reverse Gresham?
The key is in making it easier to use gold in everyday transactions. The reason bad money drives out good is that governments put up barriers to using sound money in day-to-day life. That makes it more costly to spend gold and incentivizes hoarding. When you remove barriers, you level the playing field and allow gold and silver to compete head-to-head with Federal Reserve notes. On an even playing field, gold beats fiat money every time.
Background
The United States Constitution states in Article I, Section 10, “No State shall…make any Thing but gold and silver Coin a Tender in Payment of Debts.” Currently, all debts and taxes in Kansas are either paid with Federal Reserve Notes (dollars) which were authorized as legal tender by Congress, or with coins issued by the U.S. Treasury — very few of which have gold or silver in them.
The Federal Reserve destroys this constitutional monetary system by creating a monopoly based on its fiat currency. Without the backing of gold or silver, the central bank can easily create money out of thin air. This not only devalues your purchasing power over time; it also allows the federal government to borrow and spend far beyond what would be possible in a sound money system. Without the Fed, the U.S. government wouldn’t be able to maintain all of its unconstitutional wars and programs. The Federal Reserve is the engine that drives the most powerful government in the history of the world.
Creating a gold-backed digital currency would take another step in the process of abolishing the Federal Reserve system by attacking it from the bottom up – pulling the rug out from under it by working to make its functions irrelevant at the state and local levels, and setting the stage to undermine the Federal Reserve monopoly by introducing competition into the monetary system.
What’s Next?
At the time of this report, SB2334 and HB4903 had not been assigned to committees. Once they get committee assignments, they must get a hearing and pass by a majority vote before moving forward in the legislative process.
The Tenth Amendment Center contributed to this report.
-
@ 7a9a58cb:ebc4db57
2023-04-08 14:43:02blogstack test - ignore this
-
@ 4d006833:8ab6a677
2023-04-08 14:20:17Since tumbling down the bitcoin, rabbit hole, I have had a lot of fun experiences learning about bitcoin with a focus on mining. One of the adventures that I was fortunate to have was mining bitcoin, at an oil well in a remote location in Wyoming.
When I started mining bitcoin at home there were challenges to overcome as I knew nothing about electricity beyond the basics of installing light switches, changing, outlets, etc.
Mining at any scale beyond a handful of machines is quite a different experience. As you add more ASICS to your mine, the time that it takes to manage the operation increases, as do the problems that need to be fixed on a regular basis.
Adding to these complexities, we were operating on an oil well using a natural gas generator powered by the gas flare at the well that was burning off the wasted methane that the oil well owner had no way to bring to market.
This was one of the hardest and most fun things I've ever done.
The first thing that we had to do was get permission from the Wyoming minerals commission to run the natural gas generator at the well. The reason for this is that the state wants to maintain control and keep records of emissions.
This was necessary as the requirement to maintain emissions within a certain range was the only reason we were invited to operate at the well in the first place. There was no pipeline to bring the natural gas to market, and before bitcoin, burning it was the only viable option.
When we presented, the governor of Wyoming was there, and we got a chance to briefly meet with him and talk bitcoin.
We were given permission to operate and began installing our equipment at the oil well. For our deployment, this consisted of a 350 kW natural gas generator connected to a 16 foot mining container that could hold 100 S19’s.
For Internet, we initially chose a land based wireless Internet service provider. These are common in the remote parts of Wyoming, because the terrain is generally flat, and there is line of sight for the Internet service provider to establish connections. We actually ended up replacing this solution with a HughesNet satellite dish as Starlink was not available at this time. Mining bitcoin does not require a lot of bandwidth, and HughesNet proved to be more stable. I use Starlink RV for these types of deployments now as you can turn it on and off and use it at any location if you need to move around.
When we began installing everything, I thought that the natural gas generator uptime and maintenance would be our biggest challenge. It turned out that the generator was pretty easy. If the oil well was operating properly, then natural gas fed the generator and made electricity. We were mining bitcoin.
The biggest challenge we faced was the weather. Wyoming is flat, and the wind is unforgiving. When it's hot outside, it's blasting the intake fans on your container with hot air. If you face your intakes the wrong way, the wind is working against your fans, making that side of the container hotter. Even if you face it the correct direction, you're still sucking in hot air and in summer and during peak hot days, we were losing 10% to 20% of our hash because the machines were simply too hot to operate efficiently.
When it's cold out, it's still windy and when it snows it creates drifts that can be as high as the mining container. Support personnel have a hard time reaching the site as all the roads are gravel and the weather beats them down. Even the large semi trucks that come to take the oil have a hard time getting in during the worst parts of winter.
Even with these difficulties, it was an incredible experience. We had 100 S19’s running for a total of 10,000 TH/s. I basically lived at the well for a month while we got everything tuned and running smoothly.
This was a lot of fun to set up and run, however, not being local to Wyoming ultimately made the project unsustainable. We had a very low purchase price for the natural gas as it was stranded, however, we were leasing our generator and had a cost associated with another company to keep that running. We also had to contract a support person to go out to the site when necessary to change fans, reset machines and breakers and all the other little issues that happen at any bitcoin mine. This was a one and a half hour trip each way, and every time this happened we incurred a trip charge and time for the person to be on site. Communication was also an issue as there was no cellular service, and we had to direct the support person via chat.
We ended up selling the location to another company and moved our machines to an on grid location that ended up being about the same cost to operate when you factor in all the extra costs in Wyoming.
Stranded natural gas is an excellent energy source for mining bitcoin. The holy grail is to find a location where you can get the gas very cheap, own and operate your own generator and have that location be reasonably close to civilization to support it yourself or to contract someone else at a cost that keeps the project economically viable. If I had a natural gas well on my own land, I would set this up and let it make bitcoin 24/7. If you are one of the lucky ones that does have a well on your land, hit me up, and I'll help you install a bitcoin factory in your backyard.
About me:
Bitcoin only and aspiring sovereign individual, trying my best to homestead in the Ozark Mountains of Missouri and mine bitcoin on stranded energy in the Show Me state. I'm looking for like-minded individuals to help us build Bitcoin mines owned and operated by plebs.
Website: https://bitcoinalchemy.io Nostr (GigaBTC): npub1f5qxsvu27hh8nsr9z0024upyjgj8h0m6h55lz9hxu5xptz4k5emsed576p
-
@ 3bd14ae2:c169f4f4
2023-04-08 12:38:09Title
Bold
++Underline++
Text with an image.
Famous words
-
@ c75622fd:a9b66e1d
2023-04-08 12:33:13[3]
-
@ c75622fd:a9b66e1d
2023-04-08 10:02:21[3]
[4]
[5]
[6]
[7]
[8]
[9]
[10]
[11]
[12]
[13]
[14]
[15]
[16]
[17]
[18]
[19]
[20]
[21]
[22]
[23]
[24]
[25]
[26]
[27]
[28]
[29]
[30]
[31]
[32]
[33]
[34]
[35]
[36]
[37]
[38]
[39]
[40]
[41]
[42]
[43]
[44]
[45]
[46]
[47]
[48]
[49]
[50]
[51]
[52]
[53]
[54]
[55]
[56]
[57]
[58]
[59]
[60]
[61]
[62]
[63]
[64]
[65]
[66]
[67]
[68]
[69]
[70]
[71]
[72]
[73]
[74]
[75]
[76]
[77]
[78]
[79]
[80]
[81]
[82]
[83]
[84]
[85]
[86]
[87]
[88]
[89]
[90]
[91]
[92]
[93]
[94]
[95]
[96]
[97]
[98]
[99]
[100]
[101]
[102]
[103]
[104]
[105]
[106]
[107]
[108]
[109]
[110]
[111]
[112]
[113]
[114]
[115]
[116]
[117]
[118]
[119]
[120]
[121]
[122]
[123]
[124]
[125]
[126]
[127]
[128]
[129]
[130]
[131]
[132]
[133]
[134]
[135]
[136]
[137]
[138]
[139]
[140]
[141]
[142]
[143]
[144]
[145]
[146]
[147]
[148]
[149]
[150]
[151]
[152]
[153]
[154]
[155]
[156]
[157]
[158]
[159]
[160]
[161]
[162]
[163]
[164]
[165]
[166]
[167]
-
@ c75622fd:a9b66e1d
2023-04-08 09:13:12[3]
[4]
[5]
[6]
[7]
[8]
[9]
[10]
[11]
[12]
[13]
[14]
[15]
[16]
[17]
[18]
[19]
[20]
[21]
[22]
[23]
[24]
[25]
[26]
[27]
[28]
[29]
[30]
[31]
[32]
[33]
[34]
[35]
[36]
[37]
[38]
[39]
[40]
[41]
[42]
[43]
[44]
[45]
[46]
[47]
[48]
[49]
[50]
[51]
[52]
[53]
[54]
[55]
[56]
[57]
[58]
[59]
[60]
[61]
[62]
[63]
[64]
[65]
[66]
[67]
[68]
[69]
[70]
[71]
[72]
[73]
[74]
[75]
[76]
[77]
[78]
[79]
[80]
[81]
[82]
[83]
[84]
[85]
[86]
[87]
[88]
[89]
[90]
[91]
[92]
[93]
[94]
[95]
[96]
[97]
[98]
[99]
[100]
[101]
[102]
[103]
[104]
[105]
[106]
[107]
[108]
[109]
[110]
[111]
[112]
[113]
[114]
[115]
[116]
[117]
[118]
[119]
[120]
[121]
[122]
[123]
[124]
[125]
[126]
[127]
[128]
[129]
[130]
[131]
[132]
[133]
[134]
[135]
[136]
[137]
[138]
[139]
[140]
[141]
[142]
[143]
[144]
[145]
[146]
[147]
[148]
[149]
[150]
[151]
[152]
[153]
[154]
[155]
[156]
[157]
[158]
[159]
[160]
[161]
[162]
[163]
[164]
[165]
[166]
[167]
[168]
[169]
[170]
[171]
[172]
[173]
[174]
[175]
[176]
[177]
[178]
[179]
[180]
[181]
[182]
[183]
[184]
[185]
[186]
[187]
[188]
[189]
[190]
[191]
[192]
[193]
[194]
[195]
[196]
[197]
[198]
[199]
[200]
[201]
[202]
[203]
[204]
[205]
[206]
[207]
[208]
[209]
[210]
[211]
[212]
[213]
[214]
[215]
[216]
[217]
[218]
[219]
[220]
[221]
[222]
[223]
[224]
[225]
[226]
[227]
[228]
[229]
[230]
[231]
[232]
[233]
[234]
[235]
[236]
[237]
[238]
[239]
[240]
[241]
[242]
[243]
[244]
[245]
[246]
[247]
[248]
[249]
[250]
[251]
[252]
[253]
[254]
[255]
[256]
[257]
[258]
[259]
[260]
[261]
[262]
[263]
[264]
[265]
[266]
[267]
[268]
[269]
[270]
[271]
[272]
[273]
[274]
[275]
[276]
[277]
[278]
[279]
[280]
[281]
[282]
[283]
[284]
[285]
[286]
[287]
[288]
[289]
[290]
[291]
[292]
[293]
[294]
[295]
[296]
[297]
[298]
[299]
[300]
[301]
[302]
[303]
[304]
[305]
[306]
[307]
[308]
[309]
[310]
[311]
[312]
[313]
[314]
[315]
[316]
[317]
[318]
[319]
[320]
[321]
[322]
[323]
[324]
[325]
[326]
[327]
[328]
[329]
[330]
-
@ 79c704df:37126767
2023-04-08 08:11:33Testing image uploads
| Head | Head | Head | Head | Head | Head | | --- | --- | --- | --- | --- | --- | | Data | Data | Data | Data | Data | Data | | Data | Data | Data | Data | Data | Data | | Data | Data | Data | Data | Data | Data | | Data | Data | Data | Data | Data | Data |
-
@ 42a8514a:ba7e0578
2023-04-08 03:23:23 -
@ 7ab79bc0:9385ad99
2023-04-08 01:09:38Bitcoin ist Zeit und Zeit ist Geld
In einem der vorigen Artikel haben wir uns mit den Funktionen und Eigenschaften von Geld befasst. Eine, vielleicht sogar die wichtigste, Funktion von wertvollem und hartem Geld ist Knappheit. Wir haben gesehen, dass Bitcoin die einzige Form von Geld ist, die diese Charakteristik zu 100% erfüllt.
Knappheit bedeutet, dass das Gut, das als Geld benutzt wird, begrenzt ist und nicht ohne weiteres vermehrt werden kann.
Bitcoin erfüllt diesen Anspruch, denn
Bitcoin ist auf 21.000.000 begrenzt. Die harte Obergrenze von Bitcoin ist von zentraler Bedeutung für sein Wertversprechen. Alle 2.099.999.997.690.000 Sats werden irgendwann existieren (oder existieren schon - je nach Betrachtungsweise) und darüber hinaus werden keine weiteren Sats produziert.
Die einzige andere Ressource, die wir Menschen haben, die uns jedem zur Verfügung steht und zu 100% begrenzt ist, ist unsere Zeit. Ausnahmslos jeder Mensch hat ab dem Moment seiner Geburt ein Zeitfenster in diesem Leben und dieses Zeitfenster - dieses Leben - ist begrenzt. Es hat noch niemand geschafft diese Regel zu brechen, bzw. zu cheaten.
Die Lebensdauer jedes Menschen fällt unterschiedlich aus und ist sogar recht ungerecht verteilt. Es gibt Menschen, die schon sehr, sehr früh nach ihrer Geburt sterben, und es gibt Menschen, die sehr, sehr alt werden. Auf diesem Spektrum von 0 bis ca. 120 Jahren befinden wir Menschen uns alle. Wir können aktiv Einfluss auf unsere Lebenserwartung nehmen, sowohl verlängernde als auch verkürzende Maßnahmen ergreifen, doch eins bleibt bisher immer garantiert: Unsere Zeit ist endlich. Und damit ist sie unser knappstes Gut.
Kommen wir nun zurück zum Geld. Wie wir schon gesehen haben, muss Geld drei Funktionen erfüllen:
Es muss als Tausch- oder Zahlungsmittel funktionieren, es sollte ein Wertaufbewahrungsmittel sein und als Recheneinheit dienen.
Während man schnell dazu übergeht, bei Geld an die Funktionen von Zahlungsmittel und Recheneinheit zu denken, da diese im täglichen Leben tausendfach vorkommen, ist es besonders die Funktion des Wertaufbewahrungsmittels, die Geld einen besonderen Stellenwert in unserem Leben als Ganzes verleiht. Und da ist sie, die Überschneidung von Geld und unserem Leben, also unserer begrenzten Zeit, auf die ich seit 400 Wörtern hinarbeite 😰
Zeit ist Geld. Jeder kennt diese Redewendung. Im wahrsten Sinne des Wortes bedeutet sie, dass man Zeit in Geld verwandeln kann und dass diejenigen, die Zeit haben auch Geld haben. Man spricht hier irrtümlicherweise auch von "Zeit sparen". Als ob die Möglichkeit bestehe, nicht verbrauchte Zeit zu einem späteren Zeitpunkt abzurufen. Dass dies außerhalb von Momos Welt nicht möglich ist, sollte jedem bewusst sein. Was meint man also damit, wenn man sagt man spart Zeit, oder Zeit ist Geld? Die Funktion des Wertaufbewahrungsmittels von Geld bedeutet erstmal, dass das verwendete Geld seinen Wert durch die Zeit aufrecht erhalten kann. Im allerbesten Falle ist ein Geld von heute auch morgen immer noch ein Geld wert.
Betrachten wir nun unser eigenes, hart begrenztes Zeitfenster, also jenes, das uns gegeben wurde, um auf diesem blauen, lustigen Ball zu verweilen, so wollen wir diese Zeit möglichst würdevoll und möglichst angenehm verbringen. Da das Leben allerdings Geld kostet, sind wir in der Regel gezwungen, solches zu verdienen. Es soll ein paar glückliche Menschen geben, denen dieser Ballast von Geburt an genommen wird, allerdings verhält es sich für das Gros der Menschen so, dass sie für ihren Unterhalt puckeln müssen. Im Idealfall sieht das so aus, dass man bei einem erwartbaren Durchschnittsalter von 80 Jahren, die ersten 20 Jahre damit verbringt zu erlernen, wie das Leben funktioniert und wie man Geld verdient, um dann 40 Jahre lang genau das zu tun und wenn alles gut läuft hat man noch 20 Jahre, um seinen wohlverdienten Ruhestand zu geniessen. Also einfach gesprochen verbringt man 50% seines Lebens damit, 100% seines Zeitfensters zu finanzieren (die ersten 20 Jahre des Lernens finanziert man zwar seinen Nachkommen, hat aber im Gegenzug dafür diese auch fremdfinanziert bekommen). Das bedeutet wiederum, dass man in den 40 Jahren Berufsleben doppelt so viel Geld verdienen muss, wie das eigens gewählte Leben kostet.
Um auf die Redewendung "Zeit ist Geld" zurückzukommen, bedeutet dies schlicht, dass jeder arbeitende (und damit Geld verdienende) Mensch seine eigene knapp bemessene Zeit in Form von Arbeit zur Verfügung stellt, um Geld zu verdienen. Dies tun wir, da wir Zeit eben nicht sparen können. Wir versuchen sie in einen anderen Aggregatzustand umzuwandeln (Zeit ➡️ Geld), um uns zu einem späteren Zeitpunkt mit diesem Geld unsere Zeit zurückzukaufen. Dies funktioniert zwar nicht im direkten Sinne, also dass wir uns zusätzliche Zeit kaufen, jedoch können wir das Decken laufender Kosten vorfinanzieren und somit, hoffentlich, im Ruhestand leben, ohne unsere laufenden Kosten durch Arbeit decken zu müssen. Wenn alles gut läuft, schaffen wir es sogar unseren gewählten Lebensstandard aufrechtzuerhalten und führen somit ein für unsere subjektiv gesteckten Messpunkte würdevolles und angenehmes Leben.
So die Theorie. Denn in der Praxis funktioniert dies nur, wenn es uns möglich ist, unsere Zeit in ein Geld umzuwandeln, das es uns erlaubt, eine Umwandlung von Geld zurück zur Zeit zu einem späteren Zeitpunkt so vorzunehmen, dass wir möglichst wenig verlieren. Dies ist die einzige Aufgabe eines Wertaufbewahrungmittels: Der Erhalt des jetzigen Wertes einer Sache über einen Zeitraum hinweg.
Praktisch gesprochen besteht dieser Vorgang aus zwei Komponenten. Zuerst müssen wir Geld verdienen, dann müssen wir es sparen. Bestenfalls schaffen wir so viel Geld zu verdienen, dass unsere Einnahmen unsere Ausgaben übersteigen, damit wir überhaupt in der Lage sind, überschüssiges Geld zu sparen. Dann müssen wir ein Wertaufbewahrungsmittel finden, dass es uns erlaubt, diesen Überschuss so zu konservieren, dass wir ihn zu einem späteren Zeitpunkt abrufen können. Über die erste Komponente lässt sich schon genug schreiben, über den gewählten Lebensstandard und die damit einhergehenden Kosten, die (Un-) Gerechtigkeit und Chancenungleichheit beim Erlangen einer Erwerbstätigkeit, etc. blah.
Die zweite Komponente allerdings ist für unsere Betrachtung die viel entscheidendere. Denn gehen wir davon aus, dass wir zu den glücklichen Wenigen gehören, die es schaffen eine niedrige Zeitpräferenz zu erlangen und Überschüsse in der Gewinn- und Verlustrechnung des Lebens zu erzielen, so bleibt immernoch die grosse Frage offen, wie wir es schaffen sollen, diese Überschüsse zu konservieren, sodass wir sie dann später nutzen können. Und zwar so, dass sie möglichst wenig an Wert verloren haben, oder sogar an Wert zugenommen haben.
Genau das ist das Geschäftsmodell von vielen Unternehmen, Institutionen und Schlangenölverkäufern weltweit, die damit werben, unser hart verdientes Geld so anzulegen, dass es später unseren Ruhestand finanziert. Sie wollen uns in ihre undurchsichtigen Finanzierungsmodelle locken, um damit als die eigentlichen Profiteure hervorzugehen.
Ob private oder staatliche Altersvorsorge, Riesterrente, Bausparvertrag, 401k, IRA, fondsgebundene Tralalarente oder Aktion Mensch-Los mit Sofort-Rente, alle Anbieter spielen mit der Sorge der Menschen, dass ihr heute gespartes Geld morgen wohl nicht mehr zur Finanzierung des erträumten Ruhestands reicht. Und warum ist das so? Wegen des effektiven Kaufkraftverlustes unseres aktuellen Geldes. Viel Tinte wurde vergossen, viele Tasten misshandelt, um dieses Thema zu beschreiben, das heute aktueller denn je ist. Denn wenn Geld in einer Fiat-Währung für die zukünftige Verwendung gespeichert wird, verliert es aufgrund der Währungsinflation im Laufe der Zeit an Kaufkraft. Das bedeutet effektiv, dass die investierte Zeit nicht nachhaltig widergespiegelt wird, oder drastischer ausgedrückt: wir haben unsere Zeit verschwendet. Sparen funktioniert also nicht mehr, wie es uns damals im Kindesalter beigebracht wurde.
Bitcoin fixes this, yay, Bitcoin-Floskel. Aber warum ist das so? Während Fiat-Währungen einem reellen Kaufkraftverlust ausgesetzt sind, der durch Fiskal- und Geldpolitik bedingt ist, ist der Wert von Bitcoin immer gleich. Ein bitcoin = ein bitcoin. Jetzt könnte man natürlich entgegensetzen, dass ein Knopf = ein Knopf. Allerdings lassen sich Knöpfe unendlich nachproduzieren und in Umlauf bringen. Doch wie wir wissen, hat Bitcoin eine harte Obergrenze von 21.000.000 bitcoins. Dies macht Bitcoin wahrscheinlich zum überprüfbar knappsten Gut auf unserer Erde. Selbst unser Zeitfenster könnte mit ein paar Entwicklungssprüngen in der DNA und Molekularforschung vielleicht irgendwann deutlich ausgeweitet, wenn nicht sogar für immer geöffnet werden.
Jedoch ist Bitcoins Code unveränderlich: Die 21 Millionen Obergrenze ist in Stein (Code) gemeißelt und damit eignet sich Bitcoin hervorragend als langfristiger Speicher für Zeit. Allein der Umrechnungskurs von Bitcoin in eine lokale, aktuelle oder für den Moment nützliche Währung hängt davon ab, wie viel Zeit man in einen anderen Wert umwandeln kann. Doch auch dies ist ein Feature und kein Bug. Denn jeder Arbeitstag, den ich heute in Euro oder US Dollar "spare" (besser: umwandle), ist komplett verloren, wenn diese Fiat-Währung zu einem Zeitpunkt x nicht mehr existiert. Dann ist es doch von Vorteil, wenn man seine Zeit in einen neutralen Aggregatzustand umwandeln kann, der sich in Zukunft beliebig in die benötigte aktuell brauchbare Recheneinheit / Währung transformieren lässt.
Andersherum lässt sich argumentieren, dass das Währungspaar nicht BTC/USD oder BTC/EUR ist, sondern direkt ZEIT/BTC. Man ermittelt also den Wert von Zeit direkt in einer Bitcoin-Ausdrucksweise, die in Zukunft sogar festgesetzt werden könnte und damit die ultimative Währungseinheit darstellen würde.
Bitcoin verstehen
Bitcoin ist nicht nur Zeit im Sinne von umgewandelter Zeit in Geldmenge, sondern als reeller Zeitaufwand, um Bitcoin zu verstehen und Bitcoin für sich selbst begreifbar zu machen. Auch diese Definition von Zeit ist wiedermals für jeden Menschen subjektiv und dem eigenen Empfinden nach zu bemessen. Was jedoch nicht von der Hand zu weisen ist, ist dass es einen gewissen Mindestaufwand von Zeit, ob mit der Lektüre verschiedener Texte, dem Austausch mit Gleichgesinnten, dem tatsächlichen Ausprobieren und Erlernen der mechanischen Abläufe, etc. bedarf, um Bitcoin zu begreifen. Niemand wird jemals Bitcoin in seiner Gänze, seiner Tragweite oder seiner Wirkung vollständig verstehen, allerdings bin ich fest davon überzeugt, dass es diesen einen Punkt gibt, an dem bei jedem an Bitcoin interessierten Menschen ein gewisser Aha!-Moment eintritt, an dem viele Puzzleteile mit einem Mal ein Bild ergeben.
Dieser Moment tritt bei manchen sehr früh, bei manchen eher später ein, jedoch eint alle Bitcoiner und Bitcoin-verstehende Menschen dieser eine Moment, den es nur zu erreichen möglich ist, wenn ein gewisses Maß von Zeit investiert wurde. Dieser Moment lässt sich nicht erklären und muss von jedem Menschen selbst erlebt werden, um ihn zu verstehen. Damit kann er nicht erkauft oder erschlichen werden, sondern lässt sich nur in Form von aufgebrachter Zeit erreichen. Damit trägt Bitcoin eine weitere Zeitkomponente in sich, die weder im Whitepaper, noch im Code, noch in später veröffentlichten Texten Satoshis festgehalten oder gar definiert wurde. Jedoch wage ich zu behaupten, dass es niemanden gibt, der/die Bitcoin begriffen hat und von sich sagt, diesen Moment der Klarheit, der Offenbarung, nicht erlebt zu haben.
Bitcoin hat sein eigenes Verständnis von Zeit
Zeit ist ein sehr tiefgründiges und subjektives Konstrukt. Es gibt die Uhrzeit, also eine Zahl, die uns anzeigt, wie weit der jeweilige Tag vorangeschritten ist. Der Kalender misst auch Uhrzeit, nur eben nicht in Form von Stunden, Minuten und Sekunden, sondern in Monaten, Wochen und Tagen. Und dann gibt es noch Jahre. Wohingegen Sekunden, Minuten, Stunden, Tage, Wochen und Monate begrenzt sind - es gibt z.B. nur 12 Monate, dann fangen wir wieder von vorne an zu zählen, ist die Anzahl von Jahren keinem Zyklus unterworfen. Es wird immer weiter gezählt. Natürlich gibt es Dekaden, Jahrhunderte, Jahrtausende, etc., doch sind diese nur Recheneinheiten, die das Zählen von Jahren vereinfachen. In unserem System gibt es ein Jahr null und seit dem zählen wir vorwärts (wenn man davon absieht, dass sich jemand vor 400 Jahren das Jahr null ausgedacht hat und seit dem alles zurückgerechnet wurde, aber wir wollen mal nicht kleinlich sein) und alles was vor diesem Jahr null liegt, wird rückwärts gezählt. Dem Weihnachtshasen sei Dank 🙏
Genauso willkürlich, wie diese Zeiterfassung festgelegt wurde, verhält es sich bei Bitcoin auch. Denn Bitcoins innerer Maschinenraum ist eigentlich nichts anderes als eine eigenwillige und nutzungsbezogene Uhr. Die Bitcoin-Blockchain ist eigentlich eine Timechain, ein sogenannter Timestamp-Server. Wie schon mehrmals erwähnt, findet man das Wort 'Blockchain' in Satoshis Whitepaper nicht ein einziges Mal. Dafür findet man bereits im vierten Satz den Begriff 'Timestamp'.
Da Zeit ein recht flexibler Begriff ist und die Zeitmessung vom jeweiligen Nutzen oder dem Erfüllen eines Ziels abhängig ist, ist es besonders schwierig, ein allgemeingültiges System zu wählen. Zeit kann in vielen Formen dargestellt werden, von "Jetzt bis kein Bock mehr", oder "Anno Pief und Dazumal" gibt es etliche Redewendungen, die zeigen, dass Zeit gefühlt wird und nicht gemessen wird. Doch wenn man ein global funktionierendes dezentrales Netzwerk errichten möchte, dass darauf basiert seine eigene Wahrheit zu speichern, ohne auf Dritte angewiesen zu sein und alle Transaktionen so zu speichern, dass sie nachvollzogen und validiert werden können, bedarf es eines Zeitmessungsmechanismus. Und dieser muss absolut fehlerfrei sein und darf keine Latenz zulassen, da sonst Raum für Schummeleien geboten wäre. Was eignet sich da also besser, als ein eigener, eigens für diesen besonderen Zweck erdachter Mechanismus zum Festhalten von Geschehnissen? Diese Geschehnisse werden vom System mit einem Zeitstempel versehen, der unmissverständlich macht, welche Reihenfolge von Geschehnissen die eine Wahrheit ausmacht, der alle Netzwerkteilnehmer vertrauen.
Gigi hat sich dem Thema in seinem neuen Buch deutlich detaillierter gewidmet und ich empfehle jedem/r die Lektüre dieses Kapitels:
Fazit
Bitcoin ist nicht nur Zeit. Bitcoin misst die Zeit in seiner eigenen Weise. Bitcoin verlangt Zeit von uns, damit wir es begreifen, aber Bitcoin hilft uns, den Wert unserer Zeit einzufangen. Damit ist Bitcoin sowohl das Metronom, das seinen eigenen Takt angibt, strenger Lehrer, der Aufwand fordert, um Exzellenz zu erreichen, als auch Tresor oder Akku, der aufgebrachter Zeit einen Wert beimisst, und diesen Wert zu speichern vermag. Tick, tock, next Block!
-
@ 76c71aae:3e29cafa
2023-04-07 23:29:10The super app is something like WeChat or QQ, a single app where you do everything, book a car service, talk to your friends, make purchases online or in person. It's a monolithic do everything app, and it's very popular, especially in China.
Silicon Valley tends to make apps that are nothing like the super app. It's because western tech companies don't work anything like Chinese internet companies. Western tech tends to rely on a huge base of open source software, but then create these vertically integrated silos of apps that do one thing well with elegant design and not many options. When an app does try to do lots of things, we hate it, just look at MS Word.
The vertical integration is narrow. The Chinese super app does everything broadly, but it's not so pretty. SV tends to stagnate, companies are afraid to compete with themselves so they get stuck at a local maximum. Our culture of product development find something that works, and sticks with it. That's why in the west, big companies buy the upstarts. If you're an ambitious entrepreneur, you quit and create a new startup. Most likely you'll fail, but you might do well enough that a big company will you buy you out, or you'll do so well you replace the incumbents.
The last western super app was AOL. And we celebrated its death. Since then, it's just been a dream. It was Elon Musk's goal when he bought twitter, it was the story that SBF sold to investors as he pumped up FTX. An app to rule them all.
We don't make a super app because our culture, politics, and economic system don't work like that. We hated being stuck on AOL. Silicon Valley's real super app is the web itself, the browser, linux, smart phones, etc... They're more open, less controlled, more competitive. Our legal system punishes companies that become dominate to eliminate monopolies. Out business culture causes big tech companies to be safe and consistent. Google had the lead in AI, yet it was OpenAI that launched ChatGPT in a chaotic, barely coordinated 6-week sprint.
Even after AOL, there was a time when silicon valley was moving towards its model of a more open super app. Facebook launched their platform, twitter's api enabled a tremendous app ecosystem. But both companies chose to lock things down. They did it because their only economic model was based on advertising and required their control. The web was slowly enclosed from an open, chaotic ecosystem to a platform which monitors users behaviour and captured their attention to sell to advertisers.
I think open social protocols we're seeing emerge today, and in particular nostr, could be our super app. Instead, a single app that does everything. It's a common social protocol where many apps can be created and run. We've created a system that reflects a set of values around autonomy, openness, decentralization, permissionless participation, privacy, encryption, and yes cryptocurrencies. Without the financial part, we can't make the ecosystem thrive.
We can make a super app, but not one, rather a family of apps, a style of apps that let there be choices on a common platform. Smart clients, dumb relays, and just enough cryptography to keep it all functioning.
When we build this new open super app protocol, we'll need to create all the things that existed on the centralized social media apps, but also the giant closed super apps. The old model was vertically integrated. Lots of services and businesses were needed to keep it running, but they were all controlled by a single company, hidden off from the public. The advertising marketplace, the content moderation, the CDN for fast media delivery, the transcoders for making images and video the right size, the algorithms for deciding what to show you or who you should connect with, the bug tracking, customer support, business development team, legal, compliance, public relations.
We don't like how the vertically integrated ecosystem worked, it didn't provide us agency and autonomy. But most importantly, we didn't have the space to innovate and create. In this new open system, we still need all those services provided by the big companies is needed somehow. We need to meet those same needs, but in new ways.
Users see the frontend of an app, the UX, their experience as a user. But there is so much more, middleware, backend, business operations. All of that will need to be created in a new open ecosystem.
To take one example, moderation, so we don't have to see a constant flow of ISIS beheading videos, some that we can handle with algorithms, but that's also how big social does it today. Even with the best AI minds in the world, a lot slips through. People need to be able to make judgements, and figure out edge cases. I don't like the choices that Facebook, TIkTok, or Elon's Twitter makes, but it doesn't mean we won't need to make those choices. Now we can make it a service where we pay people who do that social labor. And we can choose who we want to do it, making sure their values are aligned. We can use a stead stream of payments to all of these services.
Nostr can be the protocol upon which we build an open super app ecosystem which contains multitudes.
-
@ f0ff87e7:deeeff58
2023-04-07 22:39:19So I just created a quotes bot on Nostr. I'm adding new quotes to it all the time but already it is serving up quotes from Satoshi to Nietzsche.
Making one of these yourself is incredibly easy - much more so than conventional social media like Twitter as there's no locked down API to deal with or beg for keys to. You simply generate a new private key for the bot, add some metadata, setup a script to pick from a random selection your a predefined list of quotes, setup another script to feed the output into a new Nostr status and post it, then put that on your
crontab
so it runs automatically every hour, or two hours, or once a day, or whatever you want.This tutorial will show you how to do that even if you have no coding experience. All you need is access to something running Linux (even if it's just a Raspberry Pi or a cheap VPS) and... that's it.
Keep in mind that whatever you choose to set this up on has to be constantly running for the scripts to work. This is why a Raspberry Pi or a VPS are good options. It requires almost zero CPU power, RAM, or bandwidth.
Ready? Let's go!
Install the dependencies
To make sure all dependencies are installed, simply run:
bash sudo apt install python3 python3-pip python-is-python3 golang git
Make a user for the bot
Especially if you use a VPS for this, having separate non-privileged users for different tasks is just smart:
bash sudo adduser nostrbot
Choose a password then you can jump into the new user with:
bash sudo su - nostrbot
Install noscl
This is the magic sauce that will let you directly interact with Nostr in the command line. If you made a new user, log into it first, then run this:
bash go install github.com/fiatjaf/noscl@latest
Now let's make sure it'll work correctly:
bash nano ~/.bashrc
Scroll to the bottom and add:
bash export GOPATH=$HOME/go export PATH=$PATH:$GOROOT/bin:$GOPATH/bin
Save (ctrl + O) and exit (ctrl + X) then run:
bash source ~/.bashrc
Now you want to create the directory
noscl
can create its config file in when you run it and use it:bash mkdir -p ~/.config/nostr
If you followed the above correctly, you run
noscl
in the command line and you should get an output like this:bash Usage: noscl home noscl setprivate <key> noscl sign <event-json> noscl verify <event-json> noscl public noscl publish [--reference=<id>...] [--profile=<id>...] <content> noscl message [--reference=<id>...] <id> <content> noscl metadata --name=<name> [--about=<about>] [--picture=<picture>] noscl profile <key> noscl follow <key> [--name=<name>] noscl unfollow <key> noscl event <id> noscl share-contacts noscl key-gen noscl relay noscl relay add <url> noscl relay remove <url> noscl relay recommend <url>
That means it's working!
At this point you simply want to run three commands:
bash noscl key-gen noscl setprivate [key generated above] noscl public
The first generates a private/public keypair. The second is where you copy the new private key to set it as the one
noscl
will use. The third prints the public key you can use to look up the bot later on.You'll also need to add some relays. You can do that now or at the end. The process is simple:
bash noscl relay add wss://relay.2nodez.com noscl relay add wss://relay.snort.social noscl relay add wss://offchain.pub noscl relay add wss://nostr-relay.alekberg.net noscl relay add wss://no.str.cr
And so on... add as many as you like.
You can do this at any point, just make sure to add at least a few before the first time you run the bot, otherwise it won't have anything to publish to!
You can also add some metadata such as a name and an about section using the command line, or you can sign in with a client of your choice and use that instead for a friendly GUI option.
To do it on the command line:
bash noscl metadata --name="My Bot" --about="This is my Nostr bot for posting quotes." --picture="https://..."
Get your list of quotes and a Python script to pick one at random
This is the bit you'll have to do manually. Pick out some quotes you like and put them in a file called
quotes.txt
in the home folder. Make sure each quote is on a new line.Now create a Python script by running
nano quotepicker.py
and simply pasting this in:```python import random
text_file = open("quotes.txt") line = text_file.readlines()
print(random.choice(line)) text_file.close() ```
Now as long as you have your Python script and your
quotes.txt
with at least a few quotes for testing, both in the same directory, you should be able to simply run this and get a different one each time:bash python3 quotepicker.py
Keep in mind, the more quotes you have, the less likely it is you will get the same quote when you run the script again.
Once you have a decent number of quotes (I recommend at least 100) you can move onto the next step. You're almost done!
Setup the bash script and crontab
This bit is super easy and should take under a minute.
Run
nano nostrpost.sh
and paste this in:bash b=$(python3 /home/nostrbot/quotepicker.py) echo $b /home/nostrbot/go/bin/noscl publish "$b"
Now let's make it executable:
bash chmod +x nostrpost.sh
At this point, assuming you already added some relays, we can do a testrun:
bash ./nostrpost.sh
It should echo the quote it's picked then show you the progress of publishing to each relay.
If you look the bot up on your Nostr client of choice using the public key we printed earlier, assuming you have the same relays added, it should pop up and you can see it for yourself and even follow it!
And finally, assuming the test run went well, all you need to do is set the
crontab
so it runs automatically:bash crontab -e
Scroll to the bottom of this file and just add:
bash @hourly /home/nostrbot/nostrpost.sh >> /home/nostrbot/nostrbot.log
This will run your script every hour, on the hour (e.g. exactly 7pm) and write the results to a log file, which is useful for debugging if something breaks at any point.
At this point you're done. Add more relays if you want, wait for the next hour, and it should automatically post another quote!
If you found this helpful feel free to follow me on Nostr at the pubkey below and, if you're feeling generous, zap me at
xanny@xanny.family
!npub17rlc0emedw5xljztfqrmykjaacsx6ujvdas64zznjadrnhhwlavq4jjtgg
PV!
-
@ c753997e:9fe20adc
2023-04-07 20:24:01HUMANS 08 April 2023 By DAVID NIELD
Long before the counter-culture revolution of the 1960s, Bronze Age Europeans were tuning in and dropping out on hallucinogenic drugs.
While archaeologists have long had their suspicions, a new analysis of hair recovered from a 3,600-year-old burial site in Spain provides the first direct evidence of drug use among the inhabitants of ancient Europe.
Discoveries of remains of psychoactive plants and preparation tools and depictions in art have hinted at European cultures seeking altered states of consciousness. But finding traces of the compounds themselves in samples of body tissue, such as hair, carries far more weight.
Only hair doesn't tend to stick around as long as bones and teeth. Researchers from the University of Valladolid and the Autonomous University of Barcelona in Spain, and the University de Chile, were fortunate in uncovering samples that had been unusually well preserved as part of a burial ritual.
Testing the hair with advanced particle processing techniques, the researchers identified key traces of atropine and scopolamine, which can both induce hallucinations and altered sensory perception. There was also evidence of ephedrine, a stimulant known to increase excitement and alertness.
Hair samples One of the hair samples, with small rock fragments. (P. Witte) "The results furnish direct evidence of the consumption of plant drugs and, more interestingly, they reveal the use of multiple psychoactive species," the researchers write in their published paper.
Nightshade plants such as mandrake (Mandragora autumnalis), henbane (Hyoscyamus albus), thorn apple (Datura stramonium), and joint pine (Ephedra fragilis) are the most likely sources for the drugs, the researchers say. These plants would have been available in the area where the burial site is, and have been found at other similar sites.
The researchers think that the drugs may have been administered as part of some kind of ritual, and were probably supplied by a shaman: an ancient person of medicine and religion who would have extensive experience in the preparation and delivery of the plant materials.
"Considering the potential toxicity of the alkaloids found in the hair, their handling, use, and applications represented highly specialized knowledge," write the researchers.
"This knowledge was typically possessed by shamans, who were capable of controlling the side effects of the plant drugs through an ecstasy that made diagnosis or divination possible."
The rare hair samples were found in the Es Càrritx cave in Menorca. While more than 200 people were buried here, samples of hair were only taken from a few of them: the hair was dyed red as part of their burial ritual and placed in special containers at the rear of the cave chamber, although it's not clear why.
There's also something interesting about the containers. Made of wood and antler, they feature concentric circles that could well have been painted to represent eyes – perhaps hinting that the hallucinogens they hold might alter a person's vision or consciousness. Similar designs have been seen at other sites.
wooden piece with concentric circles inscribed Part of the wooden container holding the hair, with inscribed circle 'eyes'. (.Guerra‑Doce et al., Scientific Reports, 2023) Part of the reason the hair samples were stowed away may have been to preserve local traditions following a cultural shift that seems to have occurred around the same time, according to the research team. Now, more than three millennia later, those traditions have indeed been discovered again.
"These results confirm the use of different alkaloid‑bearing plants by local communities of this Western Mediterranean island by the beginning of the first millennium BCE," write the researchers.
The research has been published in Scientific Reports.
-
@ 9a576bd9:538775f4
2023-04-07 17:57:05Pour comprendre la volonté d'avoir des relais Nostr qui fonctionnent sur le mixnet retrouvez l'article Nostr x Nym qui détail nos motivations.
Le fait d'avoir un relai Nostr qui fonctionne à travers le mixnet va permettre de protéger les utilisateurs comme par exemple que leur fournisseur d'accès Internet puissent savoir qu'ils utilisent Nostr, à quelle fréquence et vers quel relai, ou encore d'avoir le risque de vous voir demander toutes les adresses IP qui contactées votre serveur. Le système proposé ici est fonctionnel avec tous les relais actuels, il est encore en phase de développement, donc des bugs ne sont pas exclus.
Voici l'architecture finale résumée
Plusieurs composants sont nécessaires à installer pour arriver à cela:
-
Un relai, une liste très complète est disponible ici. Pour cet article, nostr-rs-relay sera utilisé car il est très simple, utilise SQLite et tourne facilement sur Docker
-
nym-client, qui va faire le lien entre votre relai et le mixnet
-
nostr-nym, pour "traduire" les requêtes reçu du mixnet et les envoyer au relai
Relai
Si Docker n'est pas installé vous pouvez retrouver les informations ici: https://docs.docker.com/get-docker/. Docker n'est pas indispensable pour qu'un relai fonctionne mais simplifie grandement les explications
Il faut maintenant démarrer le relai
bash mkdir data docker run -it -p 7000:8080 \ --mount src=$(pwd)/data,target=/usr/src/app/db,type=bind \ scsibug/nostr-rs-relay
Si tout se passe bien, voilà la sortie qui devrait apparaitre. Le relai est maintenat démarré
Nym-client
Le nym-client est le composant qui va permettre de communiquer avec le mixnet
Le téléchargement se passe sur Github: https://github.com/nymtech/nym/releases, il faut rechercher une release appelé "Nym Binaries v1.1.x". Dans cet exemple, la version [Nym Binaries v1.1.14](https://github.com/nymtech/nym/releases/tag/nym-binaries-v1.1.14) est utilisé
```bash
Download the nym-client and give exec permission
wget https://github.com/nymtech/nym/releases/download/nym-binaries-v1.1.14/nym-client -O nym-client && chmod +x nym-client
Init the nym-client
./nym-client init --id nostr-relay --latency-based-selection
Start the nym-client
./nym-client run --id nostr-relay ```
Si tout s'est correctement le nym-client devrait maintenant afficher son nym-client id. C'est cet élément qui va permettre d'identifier le relai et l'atteindre dans le mixnet
La fenêtre doit rester ouverte
Nostr-nym
C'est cet élément qui va faire le lien entre le mixnet et le relai. Il va se charger d'établir une connexion avec le nym-client, écouter les messages envoyé par les clients, transmettre les evénements Nostr et renvoyer la réponse ou notifier les clients.
Pour plus de flexibilité,
pipenv
est utilisé. Pour l'installer pip est nécessaire:pip install pipenv
```bash
clone the repo
git clone https://github.com/notrustverify/nostr-nym cd nostr-nym
start pipenv shell and install dependencies
pipenv shell pipenv install ```
Résultat final, la fenêtre doit rester ouverte
Le relai est maintenant accessible via le mixnet, dans cet exemple c'est à l'adresse (=nym-client id)
5LhfbB9oGFEx4pTEUJ514LjCRuTr6zHq3kYmr45DeyAw.FfzyFK1GTAkRfpeKYMeQX3Ld1ascJUujXiHHozqunv6w@CfWcDJq8QBz6cVAPCYSaLbaJEhVTmHEmyYgQ6C5GdDW9
qu'il peut être atteintLa section suivante explique comment tester le relai, un client nostr simple à été développé.
Test
Maintenant que tous les éléments sont en place, il est possible de tester que la création de note et la souscription à des nouveaux fonctionne.
Dans le dépôt précédemment cloné, un dossier comporte un client Nostr léger compatible avec le mixnet. Le démarrage d'un autre nym-client est nécessaire
```bash
Init the nym-client
./nym-client init --id nostr-client --latency-based-selection --port 1978
Start the nym-client
./nym-client run --id nostr-client ```
Un relai public est disponible sur le mixnet pour tester facilement le fonctionnement
2gc9QidpXs4YGKmphinsDhWTHxdy2TZgWYWz2VenN5jL.dkwwJqS1zXa9BuPAFdniRN2HxFvAbTybAmrUHGAT5KV@2BuMSfMW3zpeAjKXyKLhmY4QW1DXurrtSPEJ6CjX3SEh```bash
navigate to nostr client
cd nostr-nym/client
start pipenv shell and install dependencies
pipenv shell pipenv install ```
Publication d'un nouvel événement
bash python main.py --cmd text-note --message "Hello world (from the Nym mixnet)" --relay <nym-client of relay started before> --nym-client ws://127.0.0.1:1978
Souscription aux nouveaux événements
bash python main.py --cmd subscribe --relay <nym-client id of relay started before> --nym-client ws://127.0.0.1:1978
Filtrage des événements
bash python main.py --cmd filter --authors <npub to filter> --relay <nym-client id of relay started before> --nym-client ws://127.0.0.1:1978
Conclusion
Le relai est maintenant accessible via le mixnet. C'est un premier pas vers plus de vie privée et de protection pour les relais.
Un futur article présentera les bénéfices de mettre en place une telle infrastructure pour Nostr ainsi que l'intégration du nym-client dans un client existant comme iris.to, snort.social, damus sur iOS ou encore Amethyst sur Android
Ressources:
Nostr-nym
Nym
A propos de No Trust Verify
Nous sommes membres de la #VerifyValley. Nous soutenons le réseau de Nym Technologies et y contribuons depuis le testnet. Nous sommes heureux de le renforcer avec nos mixnodes et nos gateways.
Développeur de pastenym.ch et isnymup.com
✅ Hébergé en Suisse
✅ Commission garantie : 5%
✅ Bande passante : 10 Gbit/sIdentity keys:
NTV1 : APxUbCmGp4K9qDzvwVADJFNu8S3JV1AJBw7q6bS5KN9E
NTV2 : 4yRfauFzZnejJhG2FACTVQ7UnYEcFUYw3HzXrmuwLMaR
NTV3 : ESPa5xnwZ7BebSX9SGmUbeYgNtkUeJo8PtbBx7JhzEHA
N’hésitez pas à nous contacter :
| Site officiel | Twitter | Telegram | Linkedin | Matrix |
-
-
@ 9a576bd9:538775f4
2023-04-07 17:56:22To understand the will to have Nostr relays working on the mixnet, please read the article Nostr x Nym which details our motivations.
The fact of having a Nostr relay that works through the mixnet will allow to protect the users as for example that their ISP can know that they are using Nostr, how often and to which relay, or to have the risk to see you asking for all the IP addresses that contacted your server. The system proposed here is functional with all current relays, it is still in development phase, so bugs are not excluded.
Here is the final architecture summarized
Several components are necessary to install to achieve this:
-
A relay, a very complete list is available here. For this article, nostr-rs-relay will be used because it is very simple, uses SQLite and runs easily on Docker
-
nym-client, which will make the link between your relay and the mixnet
-
nostr-nym, to "translate" the requests received from the mixnet and send them to the relay
Relay
If you do not have Docker installed you can find the information here: https://docs.docker.com/get-docker/. Docker is not essential for a relay to work but it greatly simplifies the explanations.
Now we have to start the relay :
plaintext mkdir data docker run -it -p 7000:8080 \ --mount src=$(pwd)/data,target=/usr/src/app/db,type=bind \ scsibug/nostr-rs-relay
If all goes well, here is the output that should appear. The relay is now started.
Nym-client
The nym-client is the component that will allow to communicate with the mixnet.
The download is on Github: https://github.com/nymtech/nym/releases, you have to search for a release called "Nym Binaries v1.1.x". In this example, the version Nym Binaries v1.1.14 is used.
```plaintext
Download the nym-client and give exec permission
wget https://github.com/nymtech/nym/releases/download/nym-binaries-v1.1.14/nym-client -O nym-client && chmod +x nym-client
Init the nym-client
./nym-client init --id nostr-relay --latency-based-selection
Start the nym-client
./nym-client run --id nostr-relay ```
If everything is correct the nym-client should now display its nym-client id. This is the element that will identify the relay and reach it in the mixnet.
The window must remain open.
Nostr-nym
It is this element that will make the link between the mixnet and the relay. It will establish a connection with the nym-client, listen to the messages sent by the clients, transmit the Nostr events and send back the answer or notify the clients.
For more flexibility,
pipenv
is used. To install pip is necessary:pip install pipenv
```plaintext
clone the repo
git clone https://github.com/notrustverify/nostr-nym cd nostr-nym
start pipenv shell and install dependencies
pipenv shell pipenv install ```
End result, the window must remain open.
The relay is now accessible via the mixnet, in this example it is at the address (=nym-client id)
5LhfbB9oGFEx4pTEUJ514LjCRuTr6zHq3kYmr45DeyAw.FfzyFK1GTAkRfpeKYMeQX3Ld1ascJUujXiHHozqunv6w@CfWcDJq8QBz6cVAPCYSaLbaJEhVTmHEmyYgQ6C5GdDW9
that it can be reached.The following section explains how to test the relay, a simple nostr client has been developed.
Test
Now that all the elements are in place, it is possible to test that creating notes and subscribing to new ones works.
In the previously cloned repository, there is a folder with a mixnet-compatible light Nostr client. Starting another nym-client is necessary.
```plaintext
Init the nym-client
./nym-client init --id nostr-client --latency-based-selection --port 1978
Start the nym-client
./nym-client run --id nostr-client ```
A public relay is available on the mixnet to easily test the operation :
2gc9QidpXs4YGKmphinsDhWTHxdy2TZgWYWz2VenN5jL.dkwwJqS1zXa9BuPAFdniRN2HxFvAbTybAmrUHGAT5KV@2BuMSfMW3zpeAjKXyKLhmY4QW1DXurrtSPEJ6CjX3SEh
```plaintext
navigate to nostr client
cd nostr-nym/client
start pipenv shell and install dependencies
pipenv shell pipenv install ```
Publication of a new event.
plaintext python main.py --cmd text-note --message "Hello world (from the Nym mixnet)" --relay <nym-client of relay started before> --nym-client ws://127.0.0.1:1978
Subscription to new events.
plaintext python main.py --cmd subscribe --relay <nym-client id of relay started before> --nym-client ws://127.0.0.1:1978
Event filtering.
plaintext python main.py --cmd filter --authors <npub to filter> --relay <nym-client id of relay started before> --nym-client ws://127.0.0.1:1978
Conclusion
The relay is now accessible via the mixnet. This is a first step towards more privacy and protection for relays.
A future article will present the benefits of setting up such an infrastructure for Nostr as well as the integration of the nym-client in an existing client such as iris.to, snort.social, damus on iOS or Amethyst on Android.
Resources:
Nostr-nym
Nym
About No Trust Verify
We are members of the #VerifyValley. We support the Nym Technologies network and contribute to it since the testnet. We are happy to strengthen the mixnet with our mixnodes and our gateways.
Developer of pastenym.ch and isnymup.com
✅ Hosted in Switzerland
✅ Guaranteed commission: 5%.
✅ Bandwidth: 10 Gbit/sIdentity keys:
NTV1 : APxUbCmGp4K9qDzvwVADJFNu8S3JV1AJBw7q6bS5KN9E
NTV2 : 4yRfauFzZnejJhG2FACTVQ7UnYEcFUYw3HzXrmuwLMaR
NTV3 : ESPa5xnwZ7BebSX9SGmUbeYgNtkUeJo8PtbBx7JhzEHA
Do not hesitate to contact us:
-
-
@ 97c70a44:ad98e322
2023-04-07 16:23:31Yesterday I was browsing bountsr and discovered a new bounty by fiatjaf for adding "relay browsing" to clients. This is the bounty Coracle was born to claim! However, it's a problem I've been putting off for some time now, because it's a very hard problem requiring some real creativity. In this post I'll survey the state of the art, try to articulate my vague ideas about what needs to be done, and sketch some next steps toward realizing this goal.
The problem of relays
Relays are a problem. They are simultaneously an implementation detail that users don't understand and don't want to deal with, and the very soul of Nostr. So far, no client has unleashed the power of Nostr's architecture, instead focusing on ease of adoption by starting users off with a hard-coded set of relays. Users are then left to dig through their settings to change which relays they want to connect to. Others, like Primal, attempt to elide the concept of relays altogether and provide a unified view of the entire network.
Various nods to the importance of relays do exist in various clients however, for example:
- Amethyst shows pretty granular controls and stats on their relay list.
- Snort (and others) shows the list of relays other users connect to on their profile page.
- Gossip has all kinds of settings for how many relays to use, how smart to be about relay discovery, and more.
- Coracle shows which relays an event was seen on in the note's overflow menu, and asks new users to select relays during the onboarding process.
Other common patterns include: color-coding relays, differentiating between read and write relays, and auto-selecting relays different from the user's own selections in order to fetch context related to a given note or feed.
All of these are great features, but they are baby steps, and don't fundamentally address the problem (or realize the possibility) of allowing users to navigate between overlapping venn diagrams of relays and their content.
Let me tell you about my feelings
I think it's generally a shared perception that these half-measures aren't enough, but nobody really knows what to do about it. Even fiatjaf, who has relentlessly pushed development efforts towards surfacing relays admits in the bounty cited above, "The app should make it seamless to browse these various scenarios, I have no idea how."
I share this utter sense of bewilderment. I feel unmoored when I try to think what a user interface that fully embraced multiple relays would look like. Decades of using software with a single-master paradigm has broken my mind; designing something that could actually be used to seamlessly navigate between relays is a massive effort for my poor, tired brain.
The closest thing to a "vision" for what this would look like is what Arkin0x has built with ONOSENDAI: a vast, three-dimensional space that you can travel through. Although to solve the problem, they would have to use an address space focused on relationships between relays, pubkeys, and events, rather than event content simhashes.
This could be a workable approach, resulting in something similar to LN Insights, a browser for lightning network topology, which adds node capacity and clustering as additional dimensions. But it's also true that this type of visualization quickly becomes disorienting, and is far less familiar than a traditional user interface with buttons and menus.
There are examples of this kind of thing being executed successfully by tools like Figma which allow you to zoom in and out on your canvas to travel from one place to another. Games like Supreme Commander support zoom-to-navigate, in addition to showing multiple windowed views of the same game. Tools like Photoshop and vector graphics editors take a different approach and introduce an extra dimension by allowing you to group content into multiple layers.
Another way to think about the additional dimension that relays introduce is by imagining Nostr is a virtual world, with geography (relays), actors (pubkeys), and history (events). Users are mobile, and can travel at will through the world (unless denied access by a relay), viewing artifacts left by other users in the form of published events. The wrinkle is that events can happen in multiple places at the same time, or be replicated across space over time as events get re-broadcasted.
Take a look at the conversation I had with Arkin0x on telegram while writing this post for more ideas for representing Nostr in 3D space.
Back to flatland
In traditional user interfaces, relationships within the data model are not usually represented spatially, except in very purpose-built applications like UML diagrams or mind maps. Instead, space is taken up by an additional dimension: affordances for user interaction. Screens are designed according to functionality, and access to groups of those functions exist in navigation items or menus. Content is addressed by overlaying those groups of functionality either literally via modal dialogs, or dimensionally using "Uniform Resource Locators". There's no space left for representing the same address space in multiple dimensions, especially simultaneously.
So, what is required is either a new UI element or a re-purposed one that satisfies the same semantics as a checkbox group: a way to choose zero or more options for the same value. This isn't too hard, you could add a dropdown menu on feed views, and call it good. But this won't make any sense to users unless they know what differentiates relays from one another, and with 1,300 relays in the network and counting, it will be impossible to process that information without help from the software.
So, relays need to be filtered and grouped. This can be partly accomplished by giving good names and metadata to relays, but the important thing is the content that lives on a given relay, which might be analyzed using the social graph, textually, or using some other heuristic. Unfortunately, with the current culture of cross-posting for reach, relays don't differ substantially from one another. For now, filters and groups have to be user-generated, which creates a chicken-and-egg problem, because remember? we are trying to make it easy for users to navigate Nostr!
Maybe a good place to start would be to create a tool that would allow users to analyze for themselves the factors contributing to relay differentiation, as specified in this bounty. Then, those insights could be quantified and automatically integrated into a given client's implementation of groups and filters. Of course, that runs afoul of the problem of centralization.
Or, discovery could be built in to clients using crude tools like checkboxes, color codes, and modal dialogs, and as the network partitions and relays specialize due to scaling limitations users can begin to develop a gestalt for what kind of notes end up on a given relay. The naturally occurring social partitioning that would result would self-reinforce by allowing implementations to classify relay content by personalities or content central to content already hosted there.
Conclusion
This post has been far more stream-of-consciousness than usual, and for that I apologize. But I also thank you, dear reader, for helping me rubber-duck my way to profundity. Here are my take-aways (maybe yours are different):
- Multi-master content is a truly novel paradigm, and interface metaphors for surfacing it don't really exist.
- The semantics of multi-master match multi-select and checkbox list interface elements.
- Relays are not sufficiently differentiated to support intelligent filtering and grouping. Users cannot currently care about the distinctions between relays, because they don't currently exist.
- The concept of "layers" in tools for video/image/graphics editing is probably the closest thing we have to a metaphor for representing two-dimensional content in multiple dimensions. Layers correspond well to dialogs, and so a first pass at this problem might be to show a feed's content modified by relay selection in a popover dialog.
I'm sure I'm not the only one thinking about this problem, so please! Take a moment to leave a comment with your thoughts, opinions, or hallucinations.
-
@ f6578e56:a44078c1
2023-04-07 13:15:29KYC or “Know Your Customer” is a procedure to first identify and then verify user identities. Pi Network utilizes a proprietary KYC solution to scalably verify the identity of millions of Pioneers all over the world to onboard them to the Mainnet blockchain and ecosystem.
Not only is KYC important for the integrity of the network and compliance, but also it makes sure that it is fair for all human Pioneers who have been honestly mining in their own accounts. Achieving this goal is critical because real verified humans on Pi will contribute to the robustness of the network while encouraging the development of various apps for a utility-based ecosystem.
Over the past year, the Pi KYC software has been continuously updated to allow more and more Pioneers to apply, address many different corner cases in the application process, and verify identities of millions of Pioneers to prepare them for their Mainnet migration, while safeguarding the integrity of the network. The KYC progress of the whole network will remain a top priority of the community including the Core Team, Validators and Pioneers, and one of the two primary goals of the Enclosed Network period in the Mainnet Phase.
In the recent celebration of Pi Day, a major software update in the KYC app was also released and introduced in the Pi Day 2023 announcement. We’re providing the following FAQs to elaborate on the Pi Day KYC announcement and overall assist Pioneers on their KYC journey.
KYC FAQs
1. Do you still need to get a KYC slot randomly assigned by the system?
No, anyone except the two scenarios below should be able to visit the KYC app via Pi Browser and start your KYC application without waiting for an invitation. The invitation-based KYC slots assignment was only used in the past, and the process has been updated to allow anyone to start.
Newly created accounts will not be able to immediately apply for KYC verification, until after mining for 30 days (no need to be consecutive). This helps the network prioritize KYC validation resources for more committed human Pioneers who also have mined enough balance to make sense to go through KYC and migrate to Mainnet.
A very small proportion of accounts, identified by the algorithms as highly likely fake accounts or accounts that have violations, will not be eligible to KYC. If such account owners think that there is a mistake by the algorithms, they should submit their username for further investigation and potential proof of otherwise by filling in this form here: https://minepi.com/kyc-application-access. Depending on what we receive, we can investigate further.
2.When a KYC slot is opened up for you, will you still get the "KYC slot" popup notification when you start a new mining session?
The KYC popup notification should not be used as the only means by which Pioneers know whether they are eligible to start KYC application or not, although they will likely get a “KYC slot” popup. Pioneers should directly check their KYC eligibility on the KYC app in the Pi Browser (KYC.PI). You can simply open the Pi Browser and navigate to the KYC application. Please use the popup notification as a reminder rather than an invitation.
3.Now that Pi KYC is open for all, how can I apply for KYC?
Downloading the Pi Browser is required to apply for KYC. You can access KYC through the Pi KYC app in the Pi Browser. Make sure to have your relevant identification documents ready!
Pioneers are encouraged to directly check your KYC eligibility on the KYC app in the Pi Browser.
4.KYC Tentative Approval: What does it mean? What is necessary to pass? How long will that take?
The Tentative KYC program, which does not apply to the majority of the network, requires additional verification checks before the Pioneer can fully pass KYC. Tentative KYC approval does not equal full KYC approval, and thus will not yet unlock functionalities (e.g. becoming a Validator, or migrating to the Mainnet) requiring full KYC approval until the additional checks confirm its full KYC approval. However, tentative KYC approval gets the account much closer to full approval.
The reason for the selective Tentative KYC program is to ensure the integrity of the network—cautiously allowing as many real human Pioneers as possible to pass KYC, while catching and preventing as many fake and bot accounts as possible. Not only is this important for the network, but it’s also fair for all human Pioneers who have been honestly mining in their own accounts.
The specific additional verification steps may vary depending on the individual case, and the time it takes to complete them can vary, as well. Factors that can impact the timing include the volume of KYC applications being processed, availability of human validators of the region, complexity of the application, and types of additional checks applied to the tentative KYC case.
5.When the KYC status is "Tentative approval," how long will it take for it to be final "KYC passed"?
The duration of the Tentative Approval status is on a case-by-case basis and depends on the extent and types of additional verifications needed. One of the priorities of Q2 2023 for the KYC app is to iterate and apply such additional checks on the tentative KYC cases.
**6.When KYC status is "Tentative approval," can migration to Mainnet happen? **
No, you need to fully pass the KYC to be able to migrate to the Mainnet.
**7.When KYC is submitted, what screens can you get in the KYC app? **
After submitting the KYC application, the Pioneer can expect to see a few different screens in the KYC app. Pioneers may see a screen indicating that the application is “review in progress”. If the KYC application is approved tentatively (meaning it was accepted by Validators pending additional checks), the Pioneer may see a “tentative approval” screen.
If the additional checks further confirm the authenticity of the data and account, a Pioneer will see the “KYC passed” screen. For the majority of applications that are outside of the Tentative KYC program, they will directly see the “KYC passed” screen without the additional checks, if they are accepted
8.As per previous announcements, a submitted KYC application may be approved within 15 minutes if everything is submitted correctly and no name appeal is made. Is this still the case?
Yes, this is still the case as long as Pioneers have completed the required fields correctly and the availability of the human Validators is abundant in the country or region.
9.When will it be possible for KYC Validators to review name change appeals?
For Pioneers who appealed to change their account name (for small name updates), their appeals are either resolved by only machine automation or require the help from human validators to resolve. The first case has already been in place unblocking such applications to proceed in their KYC process. For the second case, human validators will likely be able to review name change appeals in Q2 this year, after the priorities of additional checks on tentative KYC applications and validators performance analysis.
10.My KYC is approved but not reflected in Mainnet Checklist Step 6. When can I proceed and start migration?
The Core Team is aware of this issue affecting some users and are working on resolving the data synchronization issue on the Mainnet Checklist in Q2 this year. In general, always rely on the Pi KYC app for the most accurate KYC status.
11. Overall, why is Pi Network requiring KYC before Mainnet Migration?
The vision of Pi Network is to build an inclusive and the most widely-distributed digital currency and ecosystem for all Pioneers. Pi Network’s mining mechanism is social-network based and relies on contributions of real Pioneers. Therefore, Pi has a strict policy of one account per person.
This requires a high degree of accuracy to establish that members in the network are genuine human beings, preventing individuals from being able to hoard Pi by creating fake accounts unfairly. KYC thus helps ensure the true humanness of the network in addition to compliance with anti-money laundering and anti-terrorism regulations.
Only people who passed the Pi KYC can migrate to the Pi Mainnet. The current Enclosed Mainnet period gives the community time to KYC and migrate to the Mainnet blockchain—a identity-verified, compliant and utilities-driven ecosystem where Pioneers can begin to use Pi for real goods and services.
-
@ 46fcbe30:6bd8ce4d
2023-04-07 13:10:59I'm #spending a lot of time on nostr and my mind is regularly blown by how content is separated or freed from design and UI there. People share "tweets" using one software and others read them in a dozen of other prominent or hundreds of nascent clients, each showing aspects differently. But there are also long-form clients that feel more like substack or medium and others focus on media content and feel more like Instagram and the clients overlap in what content they show:
A Bounty is a long-form post is a social post
For example a page focused on nostr development bounties shows bounties like this:
... but they are a subset of long-form content, so pages focused on long form content like Habla.news show them, too but like this:
.
Notice how Habla supports replying, zapping and liking ... and does list additional pledges.
But as the content is not bound to just Habla.news, other instances of this open source software by nostr:npub107jk7htfv243u0x5ynn43scq9wrxtaasmrwwa8lfu2ydwag6cx2quqncxg also show them.
But these replies are the Twitter-like "kind 1" messages that make it into your feed on social clients like Snort or Nostrgram and these clients also try to show you what the comments were in reply to.
Nostrgram and others now support long form content and show what originated in a bounty platform really nicely:
Notice how other bounty pledges are not listed but you can suddenly zap the bounty post - and zaps do work of course without the website taking a cut.
What could possibly go wrong?
But of course this also has its down side. Now, the author of the website suddenly has to deal with unexpected content.
Here is how Snort currently deals with Bounty posts:
Will all public content migrate to Nostr?
In many cases liberating the content makes sense but it currently has its limits. Reasons to use nostr for your project's content might be: * Actual concerns about censorship: If the content must not get lost if your project gets into legal trouble, nostr is for you * Tap into the broader nostr ecosystem to give your project visibility: If nostr social talking about and liking your content like bounties is helpful exposure, nostr might be for you * Open Standards and seamless login: If you want people to bring their established identity to your platform, nostr might be for you. * Proven transparency: If your site sparks debates, you might "moderate" some content for your users but with other nostr clients anybody can expose your acts of moderation as censorship if you judged poorly. That keeps you honest and users can know if they are being spoon-fed your version or not.
But some projects might need more control than what nostr currently provides: * If you need tight control of the user experience, nostr might not be for you. This might apply if you target minors for example. * If your project has "haters" with big incentives to sabotage your project, nostr is probably not for you. Monsanto, Ku Klux Klan, ... come to mind. * Shared content ownership: We don't know yet how to do Wikipedia on nostr. If you are dealing with content that has multiple authors, nostr is not yet for you.
Why did I write this article?
I'm exploring how to improve trust in my project WalletScrutiny.com. Together with the Bitcoin Design Community which you can find on GitHub, Slack, Substack, Dog App and also here on Nostr (nostr:npub13s5mxgws70rpxsug96jfvglggackjrxs2ehypwg0prjaxsek42sqd9l03e) we've been brainstorming on how to prove transparency with nostr and we developed a nostr plugin that allows Nostriches to comment on wallet reviews but that leaves us in the awkward situation that the comments reply to some non-nostr content which doesn't really help with our content going viral.
I'm now thinking that all the reviews should be nostr long-form content. WalletScrutiny being open source would allow anybody to copy the content anyway but with the content being on nostr, the discoverability and transparency would greatly improve.
WalletScrutiny would only show reviews by approved authors but would instantly have a great incentive to open up to reasonable contributions - or turn obsolete if another team does a better job.
-
@ c753997e:9fe20adc
2023-04-06 17:37:36By Yarno Ritzen and Al Jazeera Investigative Unit Published On 6 Apr 2023
To many people around the world, Switzerland is synonymous with the Alps, fine chocolates and designer watches.
To those in the bling business, the European nation has another identity: it is the world’s largest exporter of gold. In 2021, Switzerland sold nearly $87bn of the precious metal, almost as much as the next three biggest exporters – the United Arab Emirates (UAE), the United Kingdom and the United States – combined.
Switzerland imports almost all of that gold from other nations, refined and branded, and then exports it around the world where jewellery and other accessories made from the precious metal adorn the necks, arms and ankles of millions of people.
And it’s the same with the UAE and the UK. The top three gold exporters do not figure in the world’s top gold producers. They do not mine much, if any, of the metal. Yet they are the biggest hubs of the industry.
That trade model is at the heart of a mechanism smugglers and money launderers use to wash dirty cash and sell gold from dubious sources, Gold Mafia, a four-part investigation by Al Jazeera’s Investigative Unit (I-Unit), reveals.
Undercover reporters infiltrated some of Southern Africa’s biggest gold-smuggling and money-laundering gangs. The investigation showcases how it is next to impossible to determine the true origins of gold bought by regular customers, whether in New York and London or New Delhi and Karachi.
That quality is precisely what makes the metal a priceless asset for criminals.
The ‘Swiss gold’ stamp Al Jazeera’s undercover reporters, pretending to be Chinese criminals, were offered a range of options to launder more than $100m of dirty cash by multiple smuggling gangs using Zimbabwean gold.
The precious metal is Zimbabwe’s biggest export but the taint of Western sanctions against government officials over human rights violations makes it difficult for the country to sell gold internationally.
Enter the smugglers, who ferry Zimbabwean gold abroad, and return with the unaccounted wealth of launderers – ostensibly the proceeds from the sale of the gold. In reality, the earnings from the sale of the gold are wired to the bank accounts of the launderers, who now have seemingly legitimate money.
Kamlesh Pattni and Ewan Macmillan, who run two major rival gold-smuggling gangs out of Zimbabwe, both made clear to Al Jazeera reporters that they – and others in their field – had one preferred destination for the gold their couriers carry out of the Southern African nation: Dubai.
“It all comes out of Dubai. It’s all Dubai, Dubai, Dubai, Dubai,” Macmillan said.
Pattni and Alistair Mathias, Macmillan’s business partner, independently advised Al Jazeera reporters to set up front companies in Dubai. Once the gold from Zimbabwe arrives in the Emirati city, they said, it is melted in refineries there and rebranded as Dubai gold. Dubai is the UAE’s gold hub.
But the process of hiding the origins of the gold does not always end there, said experts. In recent years, the United Nations and other global bodies and nonprofits have raised questions about the due diligence practices employed in Dubai’s gold industry. So another layer of disguise around the original source of the gold helps.
“The Dubai gold would for instance be exported either to London or to Switzerland because you want the stamp ‘Swiss Gold’ on it,” anti-corruption and money laundering expert Mark Pieth told Al Jazeera. “Then, of course, every bank in the world will buy it.” Pieth is a former president of the Basel Institute on Governance.
The UAE exports the biggest chunk – 23 percent – of its gold to Switzerland, where smugglers like Mathias also have companies.
‘Practically brand new gold’ As a partner at global accounting firm Ernst & Young 10 years ago, Amjad Rihan was responsible for auditing Dubai-based Kaloti – at the time one of the largest gold refineries in the world.
He found that some of that gold had come from Darfur, which has witnessed the worst horrors of Sudan’s civil war. “That’s the very gold we were auditing,” Rihan told Al Jazeera.
Rihan subsequently won a court case in the UK against Ernst & Young, which judges ruled had forced him out of the company because it did not want to address the red flags he raised about Kaloti.
In 2015, the Dubai Multi Commodities Centre (DMCC), the city’s main licensing authority for commodities trade, acted against Kaloti, removing the company from Dubai’s list of approved gold refiners.
In 2020, UN experts reported that gold from another conflict zone, the Democratic Republic of the Congo (DRC), also ended up in the UAE. In Dubai, the refining process removes traces of its origins, making it more attractive to other gold hubs around the world.
“Gold that comes to refiners, once it’s refined, it’s practically brand new gold,” Rihan said.
That makes the origins of the gold untraceable and perfect for criminals wanting to hide the source of their wealth. A 2020 report by Global Witness showed that the world’s largest gold refinery, Switzerland’s Valcambi, had previously bought gold from Kaloti that almost certainly originated in Sudan.
Al Jazeera’s investigation showed how smuggling gangs help criminals turn dirty cash into seemingly legitimate money by selling Zimbabwean gold. But sometimes, said experts, gold is also valuable in itself, in what Pattni described as an “investment”.
“[The value of] gold may go up and down, but it’s always at the top of our list of items that we want and that goes back as far as we can find records,” former US Federal Bureau of Investigation (FBI) investigator and anti-corruption expert Karen Greenaway explained to Al Jazeera.
Meanwhile, gold-smuggling gangs also use Switzerland as a safe haven for their ill-gotten wealth, the investigation showed.
Zimbabwean millionaire Simon Rudland owns one of Southern Africa’s biggest cigarette companies, Gold Leaf Tobacco. South African authorities have accused him of skirting taxes by selling cigarettes on the black market. Rudland also smuggles Zimbabwean gold to Dubai through a team of couriers.
Al Jazeera’s investigation revealed how Mohamed Khan, a South African money launderer, funnels millions of dollars of Rudland’s money abroad as payments for nonexistent imports using fake invoices and shell companies run by Rudland’s business partners.
Among those front companies is Velmont Valley, which received nearly $16m in a Swiss bank account from Gold Leaf Tobacco in May 2017, according to documents accessed by Al Jazeera.
Why this matters Because gold gets refined over and over again and moves all around the world, it is hard to be certain if gold bought on the open market is ethically and legally clean, said experts – and that its money trail is free of laundering and crime.
A watch might have been made with pieces of gold from a conflict region, or a bar of gold was melted with parts of smuggled gold.
The never-ending loop of melting, selling, buying and melting again obfuscates any trace of the gold’s origin, making it particularly difficult for law enforcement agencies to build evidence against suspected smugglers.
Nonprofits, such as Global Witness and Corruption Watch, and organisations, such as the International Monetary Fund (PDF) and the OECD, have called for increased scrutiny of gold, like the Kimberley Process for the diamond industry. The Kimberley Process has tried to prevent the sale of blood diamonds, plundered from conflict zones. But so far, there is no similar regulation in the gold industry.
“When you talk about gold, some people actually think that ‘oh, this doesn’t affect us, this is just for the rich people or for a small segment of society that care about gold’,” Rihan, the former Ernst & Young partner said. “But the reality is, gold enters our lives and we interact with gold all the time, pretty much on a daily basis, because even the phones and the laptops that we use, they use gold.” Many everyday electronic devices use small quantities of gold in their circuit boards.
“We all have a responsibility to ensure that we receive clean gold and we also have the right as people to know that the gold we use is clean.”
DMCC, the Dubai commodities licensing authority, told Al Jazeera that it is not a regulator but provides companies with the necessary licenses to operate within the Dubai Free Zone using a “clear, comprehensive and robust compliance process”. It also emphasised that it was not given an opportunity to provide evidence or make representations during the court action in London between Amjad Rihan and Ernst & Young. It denied allegations made against it in those proceedings, and strenuously denied being involved in money laundering or criminal activity of any kind.
Kamlesh Pattni denied involvement in any form of money or gold laundering and told us that his activities in the UAE were entirely lawful. Alistair Mathias said that he had never laundered money or gold or traded illegal gold and that he had never had any working relationship with Ewan Macmillan, who did not respond to Al Jazeera’s request for comment.
Simon Rudland said that the allegations against him formed part of a smear campaign by an unidentified third party. He denied any involvement in the sale of illicit cigarettes, in gold or other smuggling and in sanctions busting. He accepted that he had had dealings with Mohamed Khan, who he agreed “appeared” to be a money launderer, but he denied that any form of money laundering had been undertaken for him.
Gold Leaf Tobacco denied any involvement in money laundering or the trade in illegal gold. It said no “untaxed” or “illegal” cigarettes could be “attributed” to Gold Leaf. It said Gold Leaf’s limited transactions with Mohamed Khan had always been lawful and proper – though it accepted that Khan was a money launderer.
Mohamed Khan told us that all allegations against him were false and were based on speculation, conjecture and manufactured and doctored evidence. He confirmed that Gold Leaf was a client of his businesses but he denied having any involvement in money laundering or other criminal activity.
Ernst & Young said that it was the work of its staff that identified and reported irregularities, resulting in sanctions and changes to the sourcing of precious metals and the regulation of refiners in Dubai.
Kaloti denied all wrongdoing, including in relation to those matters that arose in the course of the Ernst & Young audit.
Other entities mentioned in this article did not respond to Al Jazeera’s request for comment.
SOURCE: AL JAZEERA
-
@ ce35f2f8:22931a55
2023-04-06 14:52:26Proprietary software refers to software that is owned by a particular company or individual, and its source code is not publicly available. This is in contrast to open-source software, which allows anyone to access and modify its source code. While proprietary software has its advantages, it also has some downsides. In this article, we will explore the pros and cons of proprietary software.
Pros of Proprietary Software:
Quality Control: Proprietary software developers have complete control over the code and the development process. This means that they can ensure that the software is thoroughly tested, and any bugs or security vulnerabilities are fixed before it is released to the public. As a result, proprietary software is generally more stable and reliable than open-source software. Support and Training: Proprietary software vendors offer comprehensive support and training programs to help users get the most out of their software. This is particularly beneficial for businesses that rely on the software to run their operations. Proprietary software vendors often provide dedicated support staff to help users troubleshoot issues and ensure that the software is working correctly. Competitive Advantage: Proprietary software can give a company a competitive advantage by providing unique features and capabilities that are not available in open-source alternatives. This can be particularly important for businesses that rely on software to provide a competitive edge in their industry.
Cons of Proprietary Software:
Limited Flexibility: Proprietary software is usually designed to work in a specific way and cannot be easily modified to suit individual needs. This can be a disadvantage for businesses that require a high degree of customization or flexibility from their software. Higher Costs: Proprietary software is often more expensive than open-source alternatives. This is because the development costs are borne entirely by the vendor, and they need to recoup those costs through licensing fees. This can be a significant expense for businesses that require multiple licenses or need to upgrade their software regularly. Dependency: Proprietary software can create a dependency on the vendor, as users are reliant on the vendor to provide updates and support. If the vendor goes out of business or decides to stop supporting the software, users can be left stranded without access to critical functionality. Lack of Transparency: Proprietary software is not transparent, as users cannot access or modify the source code. This can make it difficult to identify security vulnerabilities or bugs, and users are reliant on the vendor to provide security patches and updates.
In conclusion, proprietary software has its advantages and disadvantages. It can provide a high level of quality control, support, and competitive advantage, but it also comes with higher costs, limited flexibility, and a potential dependency on the vendor. When considering whether to use proprietary software, it is important to weigh the pros and cons carefully and evaluate the specific needs of your business or organization.
-
@ 883fea4c:596bbc39
2023-04-06 14:16:57OK, Marty showed me this and I really like the idea. Going to try it for a bit with more notes and stuff than actual 'writing'
Onward!
AC
-
@ 45c41f21:c5446b7a
2023-04-06 12:58:15有一天晚上,我跟 chatGPT 聊天。聊了一些琐碎的话题,交换了一些不太重要的看法。聊到后面,窗外已经漆黑一片,我在想 chatGPT 是怎么理解我的,而我又是如何理解它的。人机对话对我来说,究竟是拿着纸笔的一种思考方式,类似脑海里的一场自言自语,还是我真的把 chatGPT 当作了某个重逢相谈的老友。
这么想着我突然想到了两句诗:“姑苏城外寒山寺,夜半钟声到客船”。这两句诗跟上面的问题有什么关系呢?我也不知道,我只是任由思绪向前游走。我想象一个满肚愁肠的诗人在一艘轻飘飘的乌船上,大概是斜卧在篷下,透过外面月亮漏出的一点光,瞥到了江边的枫树和渔火。四周静悄悄的,他听到船浆轻轻划过水面的声音。船夫也有点累了,任由乌船自行漂往岸边。
他们两个男人,从白天到夜晚刚刚经历一段冗长疲惫的水路,此刻马上靠岸,意味着即将结束共同面对的这段旅程。在旅程的前半段,他们两人肯定大声交谈,终于到了后面谈无可谈,便都默不作声。诗人在心里给一首未完的诗打腹稿,船夫则不时望着水面发呆。
请记住,当时没有手机和互联网,当你踏上一段路程时,你无法一边和熟悉的人保持联系,一边打量新的世界。你只能被动地接受所有陌生与未知。而这让旅途本身重新变得危险而敏感。
到了苏州城外的这一刻,夜深得与水面融为一体,除了船上的他们,万物似乎都深陷在睡眠中。诗人感到一股巨大的寂寞要推着他起身,上岸,回头与船夫告别。就在这时远处山上传来了一阵稀薄的钟声,那钟声彷佛藏在夜晚的微风里,稍不小心就会被弄破打散。
船夫慢慢支开乌船,他要趁着天色未亮原路回去。诗人转身走入异乡的黑夜里。周围的陌生感很快吞噬了刚才那阵寂寞,诗人呼出一口白气,夜凉如水,看着苏州城浸在黑夜里的残影,心里突然一阵轻松。也是在这时,他想到了两句诗应该怎么写。
这两句诗写于756年,唐朝天宝年号的最后一年。大概要再过一千年的时间,也就是十八世纪,地球的另一端才会出现另一个野心勃勃的意大利年轻人,名叫维柯。他的理想是建立一门真正的新科学,这门科学研究如何凭借想象力“进入”在时间或空间上远离我们社会的那些人的心灵——去考察他们创造了什么,他们曾经是什么,他们做过什么,他们遭受了什么苦难。
而实现这一目标的重要方法,恰好就是通过理解前人留给我们的那些作品。通过人类共通的同情心机制,找到某个时代的作品与之交流,从而理解那个时代的人们的所思所想所感。
这门新科学依赖这样一个简单的假设:人只能理解完全由他们所创造的事物。世界上有两种知识,自然科学是其中一种,但只有上帝能完全弄懂它。人类最多只能观察记录自然表面的规律而无法从本质上理解这些知识。因为自然不是由人类创造的。
而长期以来备受忽略的另一种知识,也就是今天人们谈论的人文学科,正是研究那些人类独创的事物的知识。我们能完全理解这些知识,因为是我们创造了这些事物。而这正是研究历史、文化、社会机制的意义。只有补充这部分知识,才能让人类更了解自己。
当一千多年前那两句诗从苏州城上空,飘到我的窗外时,我突然意识到我正如维柯所说的那样,靠着这两句诗,爬进了另一个时空里那个诗人的头脑中,共同感受了一种怅然的思绪。
我在他的乌船上,正如他在我的电脑里。
-
@ df44246d:152ee13d
2023-04-06 12:26:05Sorry if you're reading this. Wanted to try editing funciton and NIP-23 Will edit later with content of message
Heading
Heading
Heading
import test print ("Hello World")
-
@ 3d32d22c:ea76b3bb
2023-04-06 09:48:58Lionel Shriver's The Mandibles: A Family, 2029-2047 is an engaging novel that captures the imagination of anyone interested in the future of money, particularly those who are participating in the Bitcoin revolution. Set in an even more dystopian near-future America, the story follows the upper-middle class Mandible family as they navigate the consequences of a devastating economic collapse that leads to the disintegration of the once-mighty USD.
Shriver's vivid portrayal of a world thrown into chaos by the collapse of the dollar serves as a potent reminder of the potential vulnerabilities inherent in traditional financial systems...and in the illusion of wealth that those systems promote. In the novel, the Bancor, a new global currency, emerges as a response to this financial catastrophe. This narrative thread is especially thought-provoking for Bitcoin users.
The author's keen insights into the societal, political, and economic ramifications of the dollar's demise make The Mandibles an essential read for anyone who follows current financial news. Shriver's exploration of a near-future where the world's biggest centralized currencies have lost their footing echoes the current discussions about the banking situation in the United States and abroad.
As the story unfolds, the characters must adapt to a new reality where traditional financial structures no longer hold sway. This aspect of the novel resonates deeply with the principles that underpin the Bitcoin movement, reinforcing the importance of reimagining our financial and political systems and embracing innovative alternatives.
The book's characters are well crafted, each embodying unique reactions to the new economic reality they face. Among them, a once-affluent social worker, a self-absorbed academic, an unemployed tenant, a well-known writer returning from living abroad, and a psychotherapist, all struggle to adapt to the collapse of the dollar. However, it is Willing, a perceptive and resourceful teenager, who stands out as the character with whom most of us will identify. Willing's skepticism of traditional financial systems, coupled with his quick thinking and adaptability, make him an embodiment of the innovative spirit that drives the Bitcoin movement. I, personally enjoyed watching him MacGyver his way through challenges that the adults around him simply couldn't grasp in time.
Enola, affectionately known as Nolly, is my second-favorite character (and probably will be yours). Nolly embodies a unique combination of seasoned pragmatism and unwavering moral integrity. Her presence in the novel as another outlier in the family adds nuance to the narrative.
Nolly's experiences and insights offer a compelling contrast to those of the other characters, including Willing. Her role in the story not only lends emotional weight but also serves as a powerful reminder of the resilience and adaptability needed to survive and flourish in a world gone completely pear-shaped.
It's a shame that I hadn't even heard of this book until quite recently. It's interesting how much has happened since 2016 when the book was published. I highly recommend The Mandibles to anyone imagining what the world might be like when the USS Petrodollar finally sinks.
-
@ 38eba25d:4a78e9fe
2023-04-06 08:36:32Test
-
@ b5aabce9:b62cec60
2023-04-06 02:34:46PETER KILLS THE METAVERSE
~~PETER PANDA KILLS YOUR FAVORITE NFT~~
So the past year I've been writing for a comic-book series that is pretty Dope. Here's the just of what it is. A guy's (more backstory on the guy will come at a later time in the series) consciousness gets transferred into a panda teddy-bear and he is on a journey to get his body and hopefully everything he lost, back. But all that backstory will be told at a later time. Here is where this series takes off at... A Predictive A.i. computer program A.D.I.C., Advanced Digital Intelligence Computer, was originally designed in the 1980’s as an algorithm for 'banking and trading'. It has since gained sentience and has been secretly pulling the strings of the financial markets. For the last few decades, A.D.I.C has ended up on the right side of every trade, amassing more capital than any human on the planet. But, the unexpected NFT boom has disrupted the program’s financial plans. A.D.IC. now must destroy the NFT market by taking down the most widely held NFTs. To carry out the scheme, it recruits the best entity for the job... Peter Panda.
This has been a fun series to work on and I'm def lookin forward to the completion. So far we have two issues completed and published. The first issue premiered in February at both the Chattanooga & Atlanta Comic Convention. It did receive a warm welcome and I can't wait for people to get their hands on the second issue, which will be released this month at the Las-Vegas comic Convention.
The series will be a 6 issue run that takes the main character into the world of NFTs. Like he actually goes into each NFT realm and carries out his obligation to "destroy" them. The first issue explores the land of WhIsBe. Yes those unassuming gigantic gummy-bears. And don't worry, permission to include them was given. The following issues will be parody's or similar versions of your favorite NFT's. Maybe you can take a glimpse at the cover to see which company the second one is about.
Anyway, this was an introduction to the series and I'll be posting updates as we move forward. I may even include some give-aways. Ah... I do know that the digital versions of the comic will be available for BTC, just like most of my projects. Well, until next time... Much Thanks.
THIS SERIES IS FOR MATURE READERS
-
@ 909c2ba8:44d7d9e5
2023-04-05 23:06:17Do you ever feel like you're struggling to create abundance?
Like millions of others living in lack, frustration, resentment, and worry - listening to that negative inner voice?
Well, today, I want to share an astonishing secret with you. A secret that can shoot you straight into a whole new world filled with everything your heart desires. 💖
Enter the magnificent world of mindfulness
Did you know 95% of our thoughts are unconscious... lurking below the surface like hidden saboteurs, holding us back from success? It's time to trounce those self-limiting, stress-based emotions keeping you chained to the past. The key to unlocking true abundance and happiness is... mindfulness. 🧘♀️
To put that river of abundance flowing like the great Mississippi, you must be fully present in each moment - a skill you can improve with practice. So the more you move your energy from that familiar, predictable past to an unpredictable and exciting future, the easier it becomes to generate your dream life. 💫
🤯 Mind-blowing, isn't it?
Now, let me tell you about a fantastic bunch of people with one common attribute—abundance!
From ordinary to extraordinary: Tales of affluence
It's fascinating that most abundant people, whether contemporary or from history, weren't always living in prosperity. They gained valuable experiences and lessons along the way, course correcting as they faced various trials, struggles, and setbacks.
These invaluable lessons acted as their most powerful tools for transformation, ultimately leading them into a life of abundance and affluence.
Embrace mastery by learning from the best, but don't just imitate them; understand and apply their principles to your life's unique path. 🌱
But what's the secret sauce?
What separates the truly abundant from those who merely dream?
You see, instead of getting bogged down in a mindset of lack, the affluent understand the power of abundance. They draw upon their experiences to build influence, both within themselves and in their surrounding world. 🌎
Want to share in their affluence and experience unlimited growth? Read on!
Join my exclusive Mastermind Group today! 🌟
I invite you to join the incredible journey that has brought me and countless others an awakening in the world of abundance.
Excited to share the knowledge and steps one must take to elevate themselves from the ordinary, I am ecstatic to offer you a unique opportunity to join my exclusive Mastermind Group!
Together, we'll explore:
The powerful principles of duality and polarity of creation
Why creating from a place of abundance conquers lack mentality
The future-focused mindset and how 5th-dimensional reality taps into a world of affluence
Join the ranks of the abundant—now! 💥
Bradley Woods
-
@ 0af3ed9b:842c0641
2023-04-05 22:02:13You passed :)
-
@ f09d8f9f:af64fc7a
2023-04-05 21:54:20Hello there :)
-
@ a8483554:c8e63f6b
2023-04-05 15:50:45Hello World!
-
@ d408b55a:7ea8e70a
2023-04-05 15:37:55Amidst the hills and valleys green, The world is like a magic dream. Where streams flow and rivers sing, And birds take to the sky on wing.
The sun casts its golden rays, As the flowers bloom in different ways, Their petals soft and colors bright, A symphony of beauty in plain sight.
The forests rustle in the breeze, As the leaves whisper melodies, And the scent of pine fills the air, Nature's magic is everywhere.
From mountain peaks to ocean floors, Nature's beauty forever soars, A world of wonders to behold, A treasure chest of stories untold.
So let us cherish this natural gem, For it's a part of who we are and when, We stand in awe of the world we see, A place of beauty, forever free.
-
@ c753997e:9fe20adc
2023-04-05 15:28:15By Simon Watkins - Apr 04, 2023, 6:00 PM CDT
Saudi Arabia’s very public announcement last week that its cabinet had approved a plan to join the Shanghai Cooperation Organisation (SCO) as a ‘dialogue partner’ is the surest sign yet that any U.S. efforts to keep it out of the China-Russia sphere of influence may now be futile. The Kingdom had already signed a memorandum of understanding on 16 September 2022 granting it the status of SCO dialogue partner, as was exclusively reported by OilPrice.com at the time. However, Saudi Arabia did nothing to encourage the release of the news at that point, unlike now - just after it resumed relations with Iran, in a deal brokered by China.
The SCO is the world’s biggest regional political, economic and defence organisation both in terms of geographic scope and population. It covers 60 percent of the Eurasian continent (by far the biggest single landmass on Earth), 40 percent of the world’s population, and more than 20 percent of global GDP. It was formed in 2001 on the foundation of the ‘Shanghai Five’ that was set up in 1996 by China, Russia, and three states of the former USSR (Kazakhstan, Kyrgyzstan and Tajikistan). Aside from its vast scale and scope, the SCO believes in the idea and practice of the ‘multi-polar world’, which China anticipates will be dominated by it by 2030. In this context, the end of December 2021/beginning of January 2022 saw meetings in Beijing between senior officials from the Chinese government and foreign ministers from Saudi Arabia, Kuwait, Oman, Bahrain, plus the secretary-general of the Gulf Cooperation Council (GCC). At these meetings, the principal topics of conversation were to finally seal a China-GCC Free Trade Agreement and to forge “a deeper strategic cooperation in a region where U.S. dominance is showing signs of retreat”. Related: Japan Is Betting Big On Hydrogen This idea was the centrepiece of the declaration signed in 1997 between then-Russian President, Boris Yeltsin, and his then-China counterpart, Jiang Zemin. Veteran Russian Foreign Minister, Sergey Lavrov, has since stated that: “The Shanghai Cooperation Organisation is working to establish a rational and just world order and […] it provides us with a unique opportunity to take part in the process of forming a fundamentally new model of geopolitical integration”. Aside from these geopolitical redesigns, the SCO works to provide intra-organisation financing and banking networks, plus increased military cooperation, intelligence sharing and counterterrorism activities, among other things. The U.S. itself applied for ‘observer status’ of the SCO in the early 2000s but was rejected in 2005.
This latest step by Saudi Arabia away from the U.S. and towards the China-Russia axis should come as no surprise to anyone who has been watching developments in the Kingdom since the rise of Crown Prince Mohammed bin Salman (MbS) from around 2015. At that point, he was not Crown Prince (the heir designate position) – that role was held by Muhammad bin Nayef (MbN) – but rather Deputy Crown Prince with burning ambition to take the number one succession spot upon the death of King Salman. His stint as Defense Minister was disastrous, with the dramatic escalation of the war against the Houthis in Yemen – including indiscriminate bombing of civilian targets – roundly condemned by the West. This led the German intelligence service, the Bundesnachrichtendienst (BND), to leak an abridged internal-only assessment report of MbS to various trusted members of the press that stated: ‘Saudi Arabia [under MbS] has adopted an impulsive policy of intervention.’ It went on to describe MbS in terms of being a political gambler who was destabilising the Arab world through proxy wars in Yemen and Syria.
In order to rebuild his reputation with a view to usurping MbN as Crown Prince, MbS came up with an idea that he thought would win over senior Saudis who supported his rival. That idea was to float a stake in the Kingdom’s flagship company, Saudi Aramco, through an initial public offering (IPO), as analysed in depth in my latest book on the global oil markets. In theory, the idea had several positive factors going for it that would benefit MbS. First, it would raise a lot of money, which Saudi Arabia needed to offset the economically disastrous effect of the 2014-2016 Oil Price War that it had instigated. Second, it would likely be the biggest ever IPO, thus boosting Saudi Arabia’s reputation and the breadth and depth of its capital markets. And third, the new money from the sale could be used as part of Saudi Arabia’s ‘Vision 2030’ development plan aimed at diversifying the Kingdom’s economy away from a reliance on oil and gas exports.
MbS pitched the idea to the senior Saudis based on very specific benchmark targets. First, the flotation would be for 5% of the company. Second, this would raise at least USD100 billion, which would value the whole company at US$2 trillion. Third, it would be listed not just on the domestic Tadawul stock market but also on at least one of the world’s biggest and most prestigious stock markets – the New York Stock Exchange and the London Stock Exchange were the exchanges MbS had in mind. None of these targets was hit, of course, as the more information was made known about Saudi Aramco to international investors the more they regarded it as an omni-toxic liability, including financially and politically.
At that point, China stepped in with an offer to save MbS’s face, an offer that he has apparently never forgotten. The offer was that China would buy the entire 5% stake for the required US$100 million, and it would be done in a private placement, meaning no possibly embarrassing details about anything surrounding the deal would ever be made public, including to those senior Saudis who opposed MbS. Although the offer was declined as King Salman did not at that point want to alienate the U.S. any further than had already been done by launching the 2014-2016 Oil Price War with the intention of destroying or disabling the then-nascent U.S. shale oil sector, the relationship between Saudi Arabia and China blossomed from that point onwards. A little under a year before the Russian invasion of Ukraine in February 2022, Saudi Arabia was already so aligned to China that Saudi Aramco’s chief executive officer, Amin Nasser, spent several days at the annual China Development Forum hosted in Beijing, during which time he said: “Ensuring the continuing security of China’s energy needs remains our highest priority - not just for the next five years but for the next 50 and beyond.” One year later, and just a few months after the Russian invasion of Ukraine, Aramco’s senior vice president downstream, Mohammed Al Qahtani, announced the creation of a ‘one stop shop’ provided by his company in China’s Shandong. He said: “The ongoing energy crisis, for example, is a direct result of fragile international transition plans which have arbitrarily ignored energy security and affordability for all.” He added: “The world needs clear-eyed thinking on such issues. That’s why we highly admire China’s 14th Five Year Plan for prioritising energy security and stability, acknowledging its crucial role in economic development.” At the same time as this relationship was moving up several gears, so was the relationship between Saudi Arabia and Russia. By the end of the 2014-2016 Oil Price War, as also analysed in depth in my latest book on the global oil markets, the U.S. shale oil sector had reorganised itself into an oil-producing machine that could survive on prices as low as US$35 per barrel (pb) of Brent if necessary. Saudi Arabia’s budget breakeven price then was over US$84 pb and there was no way it could compete with the U.S. Saudi Arabia desperately needed to push oil prices back up to repair its budget but was unable to do so because its disastrous Second Oil Price War (the first being the 1973/74 Oil Crisis) had critically undermined its credibility with other OPEC members and with the global oil market. At that point, Russia had stepped in to support the OPEC oil production cuts in late 2016 aimed at bringing oil prices back to levels that allowed OPEC members to begin to repair their decimated finances. This support has continued ever since and has formalised into the ‘OPEC+’ grouping.
Both Russia and China know how to leverage such relationships, as they have been doing in the Middle East ever since the U.S. withdrew from the Joint Comprehensive Plan of Action with Iran in 2018, Syria in 2019, and Afghanistan and Iraq in 2021. These combination of factors put China in the position of being able to broker the relationship normalisation deal between Saudi Arabia and Iran – the leaders of the Sunni Islam world and the Shia Islam world, respectively. Although White House national security spokesperson, John Kirby, did observe tersely at the time that the deal between Iran and Saudi Arabia “is not about China”, it absolutely was about China. What it absolutely was not about was the U.S.
By Simon Watkins for Oilprice.com
-
@ 45c41f21:c5446b7a
2023-04-05 14:03:47This might be a very controversial feature to most of the people on nostr but, flycat is rolling out a new experimental feature that allows users to sign in and use nostr protocol via Metamask wallet and WalletConnect (both are toolchain from Ethereum and EVM compatible blockchains). You can try it at https://flycat.club/login
Since nostr is mostly gathered by Bitcoin folks, most people here might not have a good feeling about Ethereum or any "shitcoin". but I decided to experiment with such a new feature anyway, mainly for two reasons:
- I find this Nip-111 solution(which is how this feature works) interesting on an account-control level and couldn't help to get my hands on it
- To me, seems it doesn't do any harm to Nostr protocol and the current flycat user experience. if you hate Ethereum or any other shitcoin, you can close the window and abort reading this post now and it makes no difference on using flycat.
But the real reason I am experimenting with such a feature comes from one simple fact I believed, that is
Nostr is the future for social networks and it is how things are supposed to work and do right from the first day of the internet.
Of course, Bitcoin and the lighting network are the main motivation for building such a protocol at the first stage(which is currently where we are), but nostr is not only meant for Bitcoin people. it is for mainstream users and for people who don't even know about Bitcoin. that's the potential we saw from nostr.
With max simplicity protocol design(literally, there are only three parts of nostr: 1. public key as account id, 2. digitally sign content, and 3. relay-to-client mode), nostr is born to be the ultimate glue layer to connect to everything from centralized services like Twitter and Facebook to decentralized networks like bitcoin and lighting.
From this perspective, I believe it is worth exploring other blockchain spaces with nostr, demonstrating and telling non-bitcoin people how it feels to have a real social network binding with your crypto wallet.
How it works
This feature is done following the un-merged proposal Nip-111. If you want to know the workflow in detail, it is recommended to read the post written by the NIP authors.
Here are some simple explanations of how the Nip-111 proposal works:
since the Metamask and Ethereum blockchains use different crypto algorithms to do signings, it is impossible to use your Eth account to sign nostr stuff (unless Metamask and other Eth wallets support the Schnorr and Nip-07). But even if they did and we can, it is also not a wise choice to mix your blockchain key with the Nostr key since there are used for different scenes.
The Nip-111 solves this problem by proposing to generate a nostr sub-account (meaning a brand new key pair). The first step is using your Eth wallets to sign a fixed message to generate a fixed signature, and then take this signature, combined with the user password, to generate a new deterministic nostr private key.
To get this private key, you must be able to sign the message(prove that you are the owner of Eth wallet) and know what the password is(another proof). If the nostr key is exposed to hackers, it doesn't affect your Eth wallet account and your assets like NFTs or ERC20 tokens.
Risk and Downside
However, this approach does come with some risks and downside that you probably needs to know before using it. Even a nostr client(like flycat) doesn't store the generated private key from your Eth account, the Nip-111 required the client to hold your private key in the browser memory.
What this means is that every time you need to do something with write access on your nostr account(or export your private key), the web client will ask your Metamask or WalletConnect to sign a message to generate the private key and then use this private key to do the writing. during this process, the private key is accessible by the web client, which brings two risks:
- you need to make sure the verify the integrity and authenticity of the web client you are using. Clients like Flycat are open-source and can be checked if it takes your private key somewhere else.
- your private key is also exposable to the XSS attack during the generating process. This one is a real issue, and I don't see a clear solution besides making careful choices with which library to use and writing careful code in the web client implementation to upgrade the XSS defense. Considering there are still some people pasting their nostr private key to the web client to use the product, I will say this problem is as bad as that.
Why it is interesting
I think the Nip-111 is interesting not only because it can get Ethereum people to use nostr, but also because it is a pattern that shows how we can do account abstraction on all the other platforms. Besides Eth, all the other blockchains can create their nostr key using similar patterns. and maybe outside the blockchain space, we can also build it for centralized services to make people migrate to nostr.
Take Twitter for example, we can design a sign-in button that says sign-in with Twitter, and when people click the button, we let users post a private tweet that's only visible to himself/herself on Twitter, we take it with their password to generate a fixed nostr private key and let them start use nostr. after some time, the user might find that the nostr is great and decide to export his nostr private key and use the private key standalone instead of signing via Twitter.
Now you might think, there is a question with the above workflows: since Twitter is centralized, the private tweet is not only readable by the account owner but also by the Twitter company!
Yes, it is. That is why if the user decides to migrate to nostr seriously, he/she should consider generating a new key instead. But this is not a real problem in my opinion, because when you choose to sign in on nostr via Twitter, the implication is that you do understand the trusted scope is narrowed down to Twitter itself.
In another word, it means you choose to trust Twitter for such an operation, so if Twitter leaks your private tweet, it is not the nostr fault. The same thing also applies to Eth wallets. You trust your Metamask or WalletConnect has no backdoor to record and steal your signature.
Conclusion
I am really curious about whether Ethereum people will come to use Nostr or not and it depends on how they react to this experimental feature. If they want to taste a little bit of how nostr feels, they might choose to use it at some risk. and then make a new account when they get serious. or migrate to wallets like Alby that support Nip-07. If you have any thoughts, please comment on this post. We appreciate your feedback.
-
@ 3acf7ffd:937abb7b
2023-04-05 13:10:04This became something that I never thought I would like. Sunbather is one of those albums that evoke a particular visual to you. It's in the blackgaze genre and if you're not aware of that it's basically a fusion genre between black metal and shoegaze. So it has the raw drums and screamo interlaced with fuzzy guitar riffs and dreary atmosphere.
On paper, it shouldn't work. But somehow Sunbather made it work. This is a piece that just feels cathartic and calming. There are moments that it jolts you out of that state but the guitar riffs and non-stop raw drumming that's constantly trying to build a crescendo feels so much when it drops.
This is an album that you should listen to when you want to try something new and you want to feel a bit cathartic with some black metal.
This article's heading image was taken from discogs.com.
I originally published this article on my gopherhole on February 2, 2022 [0]. Aside from a few formatting quirks, I did not change any of the content of the article for this repost.
[0] gopher://kalayaan.xyz/0/~rtr/muzika/deafheaven.txt
-
@ 846b763b:23539eca
2023-04-05 09:33:39[3]
[4]
[5]
[6]
[7]
[8]
[9]
[10]
[11]
[12]
[13]
[14]
[15]
[16]
[17]
[18]
-
@ c753997e:9fe20adc
2023-04-05 05:54:21By Steven Levy June 12, 1994 New York Times
On a sunny spring day in Mountain View, Calif., 50 angry activists are plotting against the United States Government. They may not look subversive sitting around a conference table dressed in T-shirts and jeans and eating burritos, but they are self-proclaimed saboteurs. They are the Cypherpunks, a loose confederation of computer hackers, hardware engineers and high-tech rabble-rousers.
The precise object of their rage is the Clipper chip, offically known as the MYK-78 and not much bigger than a tooth. Just another tiny square of plastic covering a silicon thicket. A computer chip, from the outside indistinguishable from thousands of others. It seems improbable that this black Chiclet is the focal point of a battle that may determine the degree to which our civil liberties survive in the next century. But that is the shared belief in this room.
The Clipper chip has prompted what might be considered the first holy war of the information highway. Two weeks ago, the war got bloodier, as a researcher circulated a report that the chip might have a serious technical flaw. But at its heart, the issue is political, not technical. The Cypherpunks consider the Clipper the lever that Big Brother is using to pry into the conversations, messages and transactions of the computer age. These high-tech Paul Reveres are trying to mobilize America against the evil portent of a "cyberspace police state," as one of their Internet jeremiads put it. Joining them in the battle is a formidable force, including almost all of the communications and computer industries, many members of Congress and political columnists of all stripes. The anti-Clipper aggregation is an equal-opportunity club, uniting the American Civil Liberties Union and Rush Limbaugh.
The Clipper's defenders, who are largely in the Government, believe it represents the last chance to protect personal safety and national security against a developing information anarchy that fosters criminals, terrorists and foreign foes. Its adherents pose it as the answer, or at least part of the answer, to a problem created by an increasingly sophisticated application of an age-old technology: cryptography, the use of secret codes.
For centuries, cryptography was the domain of armies and diplomatic corps. Now it has a second purpose: protecting personal and corporate privacy. Computer technology and advanced telecommunications equipment have drawn precious business information and intimate personal communications out into the open. This phenomenon is well known to the current Prince of Wales, whose intimate cellular phone conversations were intercepted, recorded and broadcast worldwide. And corporations realize that competitors can easily intercept their telephone conversations, electronic messages and faxes. High tech has created a huge privacy gap. But miraculously, a fix has emerged: cheap, easy-to-use, virtually unbreakable encryption. Cryptography is the silver bullet by which we can hope to reclaim our privacy.
The solution, however, has one drawback: cryptography shields the law abiding and the lawless equally. Law-enforcement and intelligence agencies contend that if strong codes are widely available, their efforts to protect the public would be paralyzed. So they have come up with a compromise, a way to neutralize such encryption. That's the Clipper chip and that compromise is what the war is about.
The idea is to give the Government means to override other people's codes, according to a concept called "key escrow." Employing normal cryptography, two parties can communicate in total privacy, with both of them using a digital "key" to encrypt and decipher the conversation or message. A potential eavesdropper has no key and therefore cannot understand the conversation or read the data transmission. But with Clipper, an additional key -- created at the time the equipment is manufactured -- is held by the Government in escrow. With a court-approved wiretap, an agency like the F.B.I. could listen in. By adding Clipper chips to telephones, we could have a system that assures communications will be private -- from everybody but the Government.
And that's what rankles Clipper's many critics. Why, they ask, should people accused of no crime have to give Government the keys to their private communications? Why shouldn't the market rather than Government determine what sort of cryptosystem wins favor. And isn't it true that the use of key escrow will make our technology so unattractive to the international marketplace that the United States will lose its edge in the lucrative telecommunications and computer fields? Clipper might clip the entire economy.
Nonetheless, on Feb. 4 the White House announced its approval of the Clipper chip, which had been under study as a Government standard since last April, and the Crypto War broke out in full force. Within a month, one civil liberties group, Computer Professionals for Social Responsibility, received 47,000 electronic missives urging a stop to Clipper. "The war is upon us," wrote Tim May, co-founder of the Cypherpunks, in an urgent electronic dispatch soon after the announcement. "Clinton and Gore folks have shown themselves to be enthusiastic supporters of Big Brother."
Editors’ Picks
Brooke Shields and the Curse of Great Beauty
Hot Cross Buns Are the Pumpkin Spice Latte of Australia
What You Missed at Brooklyn’s Most Fabulous Garage Sale Continue reading the main story And though the Clinton Administration's endorsement of Clipper as a Government standard required no Congressional approval, rumblings of discontent came from both sides of the Capitol. Senator Patrick J. Leahy, the Vermont Democrat whose subcomittee has held contentious hearings on the matter, has called the plan a "misstep," charging that "the Government should not be in the business of mandating particular technologies."
Two weeks ago, an AT&T Bell Laboratories researcher revealed that he had found a serious flaw in the Clipper technology itself, enabling techno-savvy lawbreakers to bypass the security fuction of the chip in some applications. Besides being a bad idea, Clipper's foes now say, it doesn't even work properly.
Yet the defenders of Clipper have refused to back down, claiming that the scheme -- which is, they often note, voluntary -- is an essential means of stemming an increasing threat to public safety and security by strong encryption in everyday use. Even if Clipper itself has to go back to the drawing board, its Government designers will come up with something quite similar. The underlying issue remains unchanged: If something like Clipper is not implemented, writes Dorothy E. Denning, a Georgetown University computer scientist, "All communications on the information highway would be immune from lawful interception. In a world threatened by international organized crime, terrorism and rogue governments, this would be folly."
The claims from both sides sound wild, almost apocalyptic. The passion blurs the problem: Can we protect our privacy in an age of computers -- without also protecting the dark forces in society?
The crypto war is the inevitable consequence of a remarkable discovery made almost 20 years ago, a breakthrough that combined with the microelectronics revolution to thrust the once-obscure field of cryptography into the mainstream of communications policy.
It began with Whitfield Diffie, a young computer scientist and cryptographer. He did not work for the Government, which was strange because in the 1960's almost all serious crypto in this country was done under Federal auspices, specifically at the Fort Meade, Md., headquarters of the supersecret National Security Agency. Though it became bigger than the C.I.A., the N.S.A. was for years unknown to Americans; the Washington Beltway joke was that the initials stood for "No Such Agency." Its working premise has always been that no information about its activities should ever be revealed. Its main mission involved cryptography, and the security agency so dominated the field that it had the power to rein in even those few experts in the field who were not on its payroll.
But Whitfield Diffie never got that message. He had been bitten by the cryptography bug at age 10 when his father, a professor, brought home the entire crypto shelf of the City College library in New York. Then he lost interest, until he arrived at M.I.T.'s Artifical Intelligence Laboratory in 1966. Two things rekindled his passion. Now trained as a mathematician, he had an affinity for the particular challenges of sophisticated crypto. Just as important, he says, "I was always concerned about individuals, an individual's privacy as opposed to Goverment secrecy."
Diffie, now 50, is still committed to those beliefs. When asked about his politics, he says, "I like to describe myself as an iconoclast." He is a computer security specialist for Sun Microsystems, a celebrated cryptographer and an experienced hand at Congressional testimony. But he looks like he stumbled out of a Tom Robbins novel -- with blond hair that falls to his shoulders and a longish beard that seems a virtual trademark among code makers. At a Palo Alto, Calif., coffeehouse one morning, he describes, in clipped, precise cadence, how he and Martin E. Hellman, an electrical engineering professor at Stanford University, created a crypto revolution.
Diffie was dissatisfied with the security on a new time-sharing computer system being developed by M.I.T. in the 1960's. Files would be protected by passwords, but he felt that was insufficient. The system had a generic flaw. A system manager had access to all passwords. "If a subpeona was served against the system managers, they would sell you out, because they had no interest in going to jail," Diffie says. A perfect system would eliminate the need for a trusted third party.
This led Diffie to think about a more general problem in cryptography: key management. Even before Julius Caesar devised a simple cipher to encode his military messages, cryptography worked by means of keys. That is, an original message (what is now called "plaintext") was encrypted by the sender into seeming gibberish (known as "ciphertext"). The receiver, using the same key, decrypted the message back into the original plaintext. For instance, the Caesar key was the simple replacement of each letter by the letter three places down in the alphabet. If you knew the key, you could encrypt the word help into the nonsense word khos; the recipient of the message would decrypt the message back to help.
The problem came with protecting the key. Since anyone who knew the Caesar key would be able to understand the encoded message, it behooved the Romans to change that key as often as possible. But if you change the key, how do you inform your spies behind enemy lines? (If you tell them using the old code, which may have already been cracked, your enemies will then learn the new code.) For centuries, generals and diplomats have faced that predicament. But a few years ago, it took on added urgency.
With computers and advanced telecommunications, customers outside Government were discovering a need for information security. Cryptography was the answer, but how could it be applied widely, considering the problem of keys? The best answer to date was something called a key-management repository, where two parties who wanted secrecy would go to a trusted third party who would generate a new key for the private session. But that required just what Diffie deplored -- an unwanted third wheel.
"The virtue of cryptography should be that you don't have to trust anybody not directly involved with your communication," Diffie says. "Without conventional key distribution centers, which involved trusting third parties, I couldn't figure how you could build a system to secure, for instance, all the phones in the country."
When Diffie moved to Stanford University in 1969, he foresaw the rise of home computer terminals and began pondering the problem of how to use them to make transactions. "I got to thinking how you could possibly have electronic business, because signed letters of intent, contracts and all seemed so critical," he says. He devoured what literature he could find outside the National Security Agency. And in the mid-1970's, Diffie and Hellman achieved a stunning breakthrough that changed cryptography forever. They split the cryptographic key.
In their system, every user has two keys, a public one and a private one, that are unique to their owner. Whatever is scrambled by one key can be unscrambled by the other. It works like this: If I want to send a message to Whit Diffie, I first obtain his public key. (For complicated mathematical reasons, it is possible to distribute one's public key freely without compromising security; a potential enemy will have no advantage in code-cracking if he holds your public key alone.) Then I use that key to encode the message. Now it's gobbledygook and only one person in the world can decode it -- Whit Diffie, who holds the other, private, key. If he wants to respond to me with a secret message, he uses my public key to encode his answer. And I decode it, using my private key.
It was an amazing solution, but even more remarkable was that this split-key system solved both of Diffie's problems, the desire to shield communications from eavesdroppers and also to provide a secure electronic identification for contracts and financial transactions done by computer. It provided the identification by the use of "digital signatures" that verify the sender much the same way that a real signature validates a check or contract.
Suddenly, the ancient limitations on cryptography had vanished. Now, perhaps before the millennium, strong cryptography could find its way to every telephone, computer and fax machine -- if users wanted it. Subsequent variations on the Diffie-Hellman scheme focused on using crypto algorithms to insure the anonymity of transactions. Using these advances, it is now possible to think of replacing money with digital cash -- while maintaining the comforting untraceability of bills and coins. The dark art of cryptography has become a tool of liberation.
From the moment Diffie and Hellman published their findings in 1976, the National Security Agency's crypto monopoly was effectively terminated. In short order, three M.I.T. mathematicians -- Ronald L. Rivest, Adi Shamir and Leonard M. Adleman -- developed a system with which to put the Diffie and Hellman findings into practice. It was known by their initials, RSA. It seemed capable of creating codes that even the N.S.A. could not break. They formed a company to sell their new system; it was only a matter of time before thousands and then millions of people began using strong encryption.
That was the National Security Agency's greatest nightmare. Every company, every citizen now had routine access to the sorts of cryptographic technology that not many years ago ranked alongside the atom bomb as a source of power. Every call, every computer message, every fax in the world could be harder to decipher than the famous German "Enigma" machine of World War II. Maybe even impossible to decipher!
The genie was out of the bottle. Next question: Could the genie be made to wear a leash and collar? Enter the Clipper chip.
When illustrating the Government's need to control crypto, Jim Kallstrom, the agent in charge of the special operations division of the New York office of the F.B.I., quickly shifts the discussion to the personal: "Are you married? Do you have a child? O.K., someone kidnaps one of your kids and they are holding your kid in this fortress up in the Bronx. Now, we have probable cause that your child is inside this fortress. We have a search warrant. But for some reason, we cannot get in there. They made it out of some new metal, or something, right? Nothing'll cut it, right? And there are guys in there, laughing at us. That's what the basis of this issue really is -- we've got a situation now where a technology has become so sophisticated that the whole notion of a legal process is at stake here!"
Kallstrom is a former head of the Bureau Tech Squad, involved in the bugging operation that brought John Gotti to justice. Some have described him as the F.B.I.'s answer to "Q," the gadget wizard of the James Bond tales.
"From the standpoint of law enforcement, there's a superbig threat out there -- this guy is gonna build this domain in the Bronx now, because he's got a new steel door and none of the welding torches, none of the boomerangs, nothing we have is gonna blast our way in there. Sure, we want those new steel doors ourselves, to protect our banks, to protect the American corporation trade secrets, patent rights, technology. But people operating in legitimate business are not violating the laws -- it becomes a different ball of wax when we have probable cause and we have to get into that domain. Do we want a digital superhighway where not only the commerce of the nation can take place but where major criminals can operate impervious to the legal process? If we don't want that, then we have to look at Clipper."
Wiretapping is among law enforcement's most cherished weapons. Only 919 Federal, state and local taps were authorized last year, but police agencies consider them essential to fighting crime. Obviously if criminals communicate using military-grade cryptosystems, wiretapping them becomes impossible.
For two years, the F.B.I. has been urging Congress to pass the proposed Digital Telephony and Communications Privacy Act, which would in essence require that new communications technologies be designed to facilitate wiretapping. Even if the bill should somehow pass, overcoming the opposition of the communications industry and civil libertarians, the extra effort and expense will be wasted if the only thing the wiretappers can hear is the hissy white noise of encrypted phone conversations and faxes. If cryptography is not controlled, wiretapping could be rendered obsolete. Louis J. Freeh, the Director of the F.B.I., surely fears that prospect. He has told Congress that preserving the ability to intercept communications legally, in the face of these technological advances, is "the No. 1 law enforcement, public safety and national security issue facing us today."
Some people criticize Clipper on the basis that truly sophisticated criminals would never use it, preferring other easily obtained systems that use high-grade cryptography. Despite Clipper, kidnappers and drug kingpins may construct Kallstrom's virtual fort in the Bronx with impunity, laughing at potential wiretappers.
The Government understands the impossibility of eradicating strong crypto. Its objective is instead to prevent unbreakable encryption from becoming rountine. If that happens, even the stupidest criminal would be liberated from the threat of surveillance. But by making Clipper the standard, the Government is betting that only a tiny percentage of users would use other encryption or try to defeat the Clipper.
At a rare public appearance in March at a conference on computers and privacy, Stewart A. Baker, then general counsel of the National Security Agency, tried to explain. "The concern is not so much what happens today when people go in and buy voice scramblers," said Baker, a dapper, mustached lawyer who worked as an Education Department lawyer in the Carter Administration. "It is the prospect that in 5 years or 10 years every phone you buy that costs $75 or more will have an encrypt button on it that will interoperate with every other phone in the country and suddenly we will discover that our entire communications network is being used in ways that are profoundly antisocial. That's the real concern, I think, that Clipper addresses. If we are going to have a standardized form of encryption that is going to change the world, we should think seriously about what we are going to do when it is misused."
Not all law-enforcement experts believe that cryptography will unleash a riot of lawlessness. William R. Spernow, a Sacramento, Calif., computer crime specialist who works on a grant from the Federal Bureau of Justice Assistance, has encountered a few cases in which criminals have encrypted information unbreakably, including one involving a pedophile who encrypted the identities of his young victims. Yet Spernow sees no reason to panic. "In cases where there's encryption, the officers have been able to make the case through other investigative means," he says. "If we hustle, we can still make our cases through other kinds of police work."
Sign up for The New York Times Magazine Newsletter The best of The New York Times Magazine delivered to your inbox every week, including exclusive feature stories, photography, columns and more. Get it sent to your inbox. But crime is only part of the problem. What happens to national security if cryptography runs free? Those who know best, officials of the National Security Agency, won't say. When the agency's director, Vice Adm. John M. McConnell testified before a Senate subcommittee on May 3, he withheld comment on this question until the public hearing was terminated and a second, classified session convened in a secure room.
Still, the effect of strong crypto on N.S.A. operations is not difficult to imagine. The agency is charged with signals intelligence, and it is widely assumed that it monitors all the communications between borders and probably much of the traffic within foreign countries. (It is barred from intercepting domestic communications.) If the crypto revolution crippled N.S.A.'s ability to listen in on the world, the agency might miss out on something vital -- for instance, portents of a major terrorist attack.
No compelling case has been made, however, that the key-escrow system would make it easier for authorities to learn of such an attack. The National Security Agency would take the legal steps to seek the telltale keys after it had first identified those potential terrorists and wiretapped their calls, then discovered the inpenetrable hiss of encryption. Even then, the keys would be useful only if the terrorists were encoding conversations with Clipper technology, the one kind the Government had the capability to decode instantly. What sort of nuclear terrorist would choose Clipper?
The Government response has been to say that potential terrorists might indeed use alternative crypto methods to converse among themselves. But if Clipper were the accepted standard, the terrorists would have to use it to communicate with outsiders -- banks, suppliers and other contacts. The Government could listen in on those calls. However, the work of the Bell Labs researcher, Matthew Blaze, casts serious doubt on that contention. Blaze has uncovered a flaw in Clipper that would allow a user to bypass the security funtion of the chip. Anyone who tinkered with Clipper in this way could communicate in privacy with anyone else with a Clipper phone and Government wiretappers would be unable to locate the key to unscramble the conversations.
Nonetheless, it was the terrorist threat, along with national security concerns, that moved the Clinton Administration to support the key-escrow inititative. White House high-tech policy makers share a recurrent fear: one day they might be sitting before an emergency Congressional investigation after the destruction of half of Manhattan by a stolen nuclear weapon planted in the World Trade towers and trying to explain that the Government had intercepted the communications of the terrorists but could not understand them because they used strong encryption. If Clipper were enacted, they could at least say, "We tried."
Obviously the Government views the Crypto revolution with alarm and wants to contain it. For years, much of its efforts have focused on the use of stringent export controls. While cryptography within the United States is unrestricted, the country's export laws treat any sort of encryption as munitions, like howitzers or nuclear triggers. The National Security Agency is the final arbiter and it will approve exports of cryptosystems in computer software and electronic hardware only if the protective codes are significantly weakened.
The N.S.A. stance is under attack from American businesses losing sales to foreign competitors. Listen to D. James Bidzos, the 39-year-old president of RSA Data Security, the Redwood City, Calif., company that controls the patents for public-key cryptography: "For almost 10 years, I've been going toe to toe with these people at Fort Meade. The success of this company is the worst thing that can happen to them. To them, we're the real enemy, we're the real target."
RSA is making a pitch to become the standard in encryption; its technology has been adopted by Apple, AT&T, Lotus, Microsoft, Novell and other major manufacturers. So imagine its unhappiness that its main rival is not another private company, but the National Security Agency, designer of the key-escrow cryptosystems. The agency is a powerful and dedicated competitor.
"We have the system that they're most afraid of," Bidzos says. "If the U.S. adopted RSA as a standard, you would have a truly international, interoperable, unbreakable, easy-to-use encryption technology. And all those things together are so synergistically theatening to the N.S.A.'s interests that it's driving them into a frenzy."
The export laws put shackles on Bidzos's company while his overseas competitors have no such restaints. Cryptographic algorithms that the N.S.A. bans for export are widely published and are literally being sold on the streets of Moscow. "We did a study on the problem and located 340 foreign cryptographic products sold by foreign countires," says Douglas R. Miller, government affairs manager of the Software Publishers Association. "The only effect of export controls is to cripple our ability to compete."
The real potential losses, though, come not in the stand-alone encryption category, but in broader applications. Companies like Microsoft, Apple and Lotus want to put strong encryption into their products but cannot get licenses to export them. Often, software companies wind up installing a weaker brand of crypto in all their products so that they can sell a single version worldwide. This seems to be the Government's intent -- to encourage "crypto lite," strong enough to protect communications from casual intruders but not from Government itself.
In the long run, however, export regulation will not solve the National Security Agency's problem. The crypto business is exploding. People are becoming more aware of the vunerability of phone conversations, particularly wireless ones. Even the National Football League is adopting crypto technology; it will try out encrypted radio communication between coaches and quarterbacks, so rivals can't intercept last-minute audibles.
Anticipating such a boom, the N.S.A. devised a strategy for the 90's. It would concede the need for strong encryption but encourage a system with a key-escrow "back door" that provides access to communications for itself and law enforcement. The security agency had already developed a strong cryptosystem based on an algorithm called Skipjack, supposedly 16 million times stronger than the previous standard, D.E.S. (Data Encryption Standard). Now the agency's designers integrated Skipjack into a new system that uses a Law Enforcement Access Field (LEAF) that adds a signal to the message that directs a potential wiretapper to the approriate key to decipher the message. These features were included in a chip called Capstone, which could handle not only telephone communications but computer data transfers and digital signatures.
Supposedly, this technology was designed for Government use, but in 1993 the National Security Agency had a sudden opportunity to thrust it into the marketplace. AT&T had come to the agency with a new, relatively low-cost secure-phone device called the Surity 3600 that was designed to use the nonexportable DES encryption algorithm. The N.S.A. suggested that perhaps AT&T could try something else: a stripped-down version of Capstone for telephone communications. This was the Clipper chip. As a result, AT&T got two things: an agreement that Uncle Sam would buy thousands of phones for its own use (the initial commitment was 9,000, from the F.B.I.) and the prospect that the phone would not suffer the unhappy fate of some other secure devices when considered for export. There was also the expectation that AT&T would sell a lot more phones, since private companies would need to buy Clipper-equipped devices to communicate with the Governmment's Clipper phones.
It was an ingenious plan for several reasons. By agreeing to buy thousands of phones, and holding out the promise that thousands, or even millions more might be sold, AT&T phones gained a price advantage that comes with volume. (The original price of the Surity 3600 was $1,195, considerably less than the previous generation of secure phones; Mykotronx, the company making the Clipper chip, says that each chip now costs $30, but in large orders could quickly go as low as $10.) That would give the phones a big push in the marketplace. But by saturating the market, Clipper had a chance to become the standard for encryption, depending on whether businesses and individuals would be willing to accept a device that had the compromise of a government-controlled back door.
This compromise, of course, is the essence of Clipper. The Government recognizes the importance of keeping business secrets, intimate information and personal data hidden from most eyes and ears. But it also preserves a means of getting hold of that information after obtaining "legal authorization, normally a court order," according to a White House description.
The N.S.A. presented the idea to the Bush Administration, which took no action before the election. Then it had to convince a Democratic Administration to adopt the scheme, and started briefing the Clinton people during the transition. Many in the computer industry figured that with Vice President Al Gore's enthusiastic endorsement of the high-frontier virtues of the information highway, the Administration would never adopt any proposal so tilted in favor of law enforcement and away from his allies in the information industries. They figured wrong. A little more than two months after taking office, the Clinton Administration announced the existence of the Clipper chip and directed the National Institute of Standards and Technology to consider it as a Government standard.
Clipper was something the Administration -- starting with the Vice President -- felt compelled to adopt, and key escrow was considered an honorable attempt to balance two painfully contradictory interests, privacy and safety.
The reaction was instant, bitter and ceaseless. The most pervasive criticisms challenged the idea that a Clipper would be, as the standard said, "voluntary." The Government's stated intent is to manipulate the marketplace so that it will adopt an otherwise unpalatable scheme and make it the standard. Existing systems have to cope with export regulations and, now, incompatibility with the new Government Clipper standard. Is it fair to call a system voluntary if the Government puts all sorts of obstacles in the way of its competitors?
Others felt that it was only a matter of time before the National Security Agency pressured the Government to require key escrow of all cryptographic devices -- that Clipper was only the first step in a master plan to give Uncle Sam a key to everyone's cyberspace back door.
"That's a real fear," says Stephen T. Walker, a former N.S.A. employee who is now president of Trusted Information Systems, a company specializing in computer security products. "I don't think the Government could pull it off -- it would be like prohibition, only worse. But I think they might try it."
But mostly, people were unhappy with the essence of Clipper, that the Government would escrow their keys. As Diffie notes, key escrow reintroduces the vulnerability that led him to invent public key cryptography -- any system that relies on trusted third parties is, by definition, weaker than one that does not. Almost no one outside the Government likes the key-escrow idea. "We published the standard for 60 days of public comments," says F. Lynn McNulty, associate director for computer security at the National Institute of Standards and Technology. "We received 320 comments, only 2 of which were supportive."
Many people thought that in the face of such opposition, the Administration would quietly drop the Clipper proposal. They were dismayed by the Feb. 4 announcement of the adoption of Clipper as a Government standard. Administration officials knew they were alienating their natural allies in the construction of the information superhighway but felt they had no alternative. "This," said Michael R. Nelson, a White House technology official, "is the Bosnia of telecommunications."
If clipper is the administration's Techno-Bosnia, the crypto equivalent of snipers are everywhere -- in industry, among privacy lobbyists and even among Christian Fundamentalists. But the most passionate foes are the Cypherpunks. They have been meeting on the second Saturday of every month at the offices of Cygnus, a Silicon Valley company, assessing new ways they might sabotage Clipper. The group was co-founded in September 1992 by Eric Hughes, a 29-year-old freelance cryptogapher, and Tim May, a 42-year-old physicist who retired early and rich from the Intel company. Other Cypherpunk cells often meet simultaneously in six or seven locations around the world, but the main gathering place for Cypherpunks is the Internet, by means of an active mailing list in which members post as many as 100 electronic messages a day.
Cypherpunks share a few common premises. They assume that cryptography is a liberating tool, one that empowers individuals. They think that one of the most important uses of cryptography is to protect communications from the Government. Many of them believe that the Clipper is part of an overall initiative against cryptography that will culminate in Draconian control of the technology. And they consider it worth their time to fight, educating the general public and distributing cryptographic tools to obstruct such control.
Both Hughes and May have composed manifestos. Hughes's call to arms proclaims: "Cypherpunks write code. We know that someone has to write software to defend privacy, and since we can't get privacy unless we all do, we're going to write it."
May's document envisions a golden age in which strong cryptography belongs to all -- an era of "crypto anarchism" that governments cannot contain. To May, cryptography is a tool that will not only bestow privacy on people but help rearrange the economic underpinnings of society.
"Combined with emerging information markets, cryptography will create a liquid market for any and all material that can be put into words and pictures," May's document says. "And just as a seemingly minor invention like barbed wire made possible the fencing-off of vast ranches and farms, thus altering forever the concepts of land and property rights in the frontier West, so too will the seemingly minor discovery out of an arcane branch of mathematics come to be the wire clippers which dismantle the barbed wire around intellectual property."
At a recent meeting, about 50 Cypherpunks packed into the Cygnus conference room, with dozens of others participating electronically from sites as distant as Cambridge, Mass., and San Diego. The meeting stretched for six hours, with discussions of hardware encryption schemes, methods to fight an electronic technique of identity forgery called "spoofing," the operation of "remailing" services, which allow people to post electronic messages anonymously -- and various ways to fight Clipper.
While the Cypherpunks came up with possible anti-Clipper slogans for posters and buttons, a bearded crypto activist in wire-rim glasses named John Gilmore was outside the conference room, showing the latest sheaf of cryptography-related Freedom of Information documents he'd dragged out of Government files. Unearthing and circulating the hidden crypto treasures of the National Security Agency is a passion of Gilmore, an early employee of Sun Microsystems who left the company a multimillionaire. The Government once threatened to charge him with a felony for copying some unclassified-and-later-reclassified N.S.A. documents from a university library. After the story hit the newspapers, the Government once again declassified the documents.
"This country was founded as an open society, and we still have the remnants of that society," Gilmore says. "Will crypto tend to open it or close it? Our Government is building some of these tools for its own use, but they are unavailable -- we have paid for cryptographic breakthroughs but they're classified. I wish I could hire 10 guys -- cryptographers, librarians -- to try to pry cryptography out of the dark ages."
Perhaps the most admired Cypherpunk is someone who says he is ineligible because he often wears a suit. He is Philip R. Zimmermann, a 40-year-old software engineer and cryptographic consultant from Boulder, Colo., who in 1991 cobbled together a cryptography program for computer data and electronic mail. "PGP," he called it, meaning Pretty Good Privacy, and he decided to give it away. Anticipating the Cypherpunk credo, Zimmermann hoped that the appearance of free cryptography would guarantee its continued use after a possible Government ban. One of the first people receiving the program placed it on a computer attached to the Internet and within days thousands of people had PGP. Now the program has been through several updates and is becoming sort of a people's standard for public key cryptography. So far, it appears that no one has been able to crack information encoded with PGP.
Like Diffie, Zimmermann developed a boyhood interest in crypto. "When I was a kid growing up in Miami, it was just kind of cool -- secret messages and all," he says. Later, "computers made it possible to do ciphers in a practical manner." He was fascinated to hear of public key cryptography and during the mid-1980's he began experimenting with a system that would work on personal computers. With the help of some colleagues, he finally devised a strong system, albeit one that used some patented material from RSA Data Security. And then he heard about the Senate bill that proposed to limit a citizen's right to use strong encryption by requiring manufacturers to include back doors in their products. Zimmermann, formerly a nuclear freeze activist, felt that one of the most valuable potential uses of cryptography was to keep messages secret from the Government.
Zimmermann has put some political content into the documentation for his program: "If privacy is outlawed, only outlaws will have privacy. Intelligence agencies have access to good cryptographic technology. So do the big arms and drug traffickers. So do defense contractors, oil companies, and other corporate giants. But ordinary people and grassroots political organizations mostly have not had access to affordable 'military grade' public-key cryptographic technology. Until now."
He has been told that Burmese freedom fighters learn PGP in jungle training camps on portable computers, using it to keep documents hidden from their oppressive Government. But his favorite letter comes from a person in Latvia, who informed him that his program was a favorite among one-time refuseniks in that former Soviet republic. "Let it never be," wrote his correspondant, "but if dictatorship takes over Russia, your PGP is widespread from Baltic to Far East now and will help democratic people if necessary."
Early last year, Zimmermann received a visit from two United States Customs Service agents. They wanted to know how it was that the strong encryption program PGP had found its way overseas with no export license. In the fall, he learned from his lawyer that he was a target of a grand jury investigation in San Jose, Calif. But even if the Feds should try to prosecute, they are likely to face a tough legal issue: Can it be a crime, in the process of legally distributing information in this country, to place it on an Internet computer site that is incidentally accessible to network users in other countries? There may well be a First Amendment issue here: Americans prize the right to circulate ideas, including those on software disks.
John Gilmore has discovered that Government lawyers have their own doubts about these issues. In some documents he sued to get, there are mid-1980's warnings by the Justice Department that the export controls on cryptography presented "sensitive constitutional issues." In one letter, an assistant attorney general warns that "the regulatory scheme extends too broadly into an area of protected First Amendment speech."
Perhaps taking Phil Zimmermann to court would not be the Government's best method for keeping the genie in the bottle.
The Clipper program has already begun. About once a month, four couriers with security clearances travel from Washington to the Torrance, Calif., headquarters of Mykotronx, which holds the contract to make Clipper chips. They travel in pairs, two from each escrow agency: the NIST and the Treasury Department. The redundancy is a requirement of a protocol known as Two-Person Integrity, used in situations like nuclear missile launches, where the stakes are too high to rely on one person.
The couriers wait while a Sun work station performs the calculations to generate the digital cryptographic keys that will be imprinted in the Clipper chips. Then it splits the keys into two pieces, separate number chains, and writes them on two floppy disks, each holding lists of "key splits." To reconstruct the keys imprinted on the chip, and thereby decode private conversations, you would need both sets of disks.
After being backed up, the sets of disks are separated, each one going with a pair of couriers. When the couriers return to their respective agencies, each set of disks is placed in a double-walled safe. The backup copies are placed in similar safes. There they wait, two stacks of floppy disks that grow each month, now holding about 20,000 key splits, the so-called back doors.
Will this number grow into the millions as the Government hopes? Ultimately the answer lies with the American public. Administration officials are confident that when the public contemplates scenarios like the Fortress in the Bronx or the Mushroom Cloud in Lower Manhattan, it will realize that allowing the Government to hold the keys is a relatively painless price to pay for safety and national security. They believe the public will eventually accept it in the same way it now views limited legal wiretapping. But so far the Administration hasn't recruited many prominent supporters. The main one is Dorothy Denning, a crypto expert who heads the computer science department at Georgetown University.
Since endorsing Clipper (and advocating passage of the Digital Telephony initiative) Denning has been savagely attacked on the computer nets. Some of the language would wither a professional wrestler. "I've seen horrible things written about me," Denning says with a nervous smile. "I try to actually now avoid looking at them, because that's not what's important to me. What's important is that we end up doing the right thing with this. It was an accumulation of factors that led me to agree with Clipper, and the two most important areas, to me, are organized crime and terrorism. I was exposed to cases where wiretaps had actually stopped crimes in the making, and I started thinking, 'If they didn't have this tool, some of these things might have happened.' You know, I hate to use the word responsibility, but I actually feel some sense of responsibility to at least state my position to the extent so that people will understand it."
The opponents of Clipper are confident that the marketplace will vote against it. "The idea that the Government holds the keys to all our locks, before anyone has even been accused of committing a crime, doesn't parse with the public," says Jerry Berman, executive director of the Electronic Frontier Foundation. "It's not America."
Senator Leahy hints that Congress might not stand for the Clinton Administration's attempt to construct the key-escrow system, at an estimated cost of $14 million dollars initially and $16 million annually. "If the Administration wants the money to set up and run the key-escrow facilities," he says, "it will need Congressional approval." Despite claims by the National Institute of Standards and Technology deputy director, Raymond G. Kammer, that some foreign governments have shown interest in the scheme, Leahy seems to agree with most American telecommunications and computer manufacturers that Clipper and subsequent escrow schemes will find no favor in the vast international marketplace, turning the United States into a cryptographic island and crippling important industries.
Leahy is also concerned about the Administration's haste. "The Administration is rushing to implement the Clipper chip program without thinking through crucial details," he says. Indeed, although the Government has been buying and using Clipper encryption devices, the process of actually getting the keys out of escrow and using them to decipher scrambled conversations has never been field tested. And there exists only a single uncompleted prototype of the device intended to do the deciphering.
Leahy is also among those who worry that, all policy issues aside, the Government's key escrow scheme might fail solely on technical issues. The Clipper and Capstone chips, while powerful enough to use on today's equipment, have not been engineered for the high speeds of the coming information highway; updates will be required. Even more serious are the potential design flaws in the unproved key-escrow scheme. Matthew Blaze's discovery that wrongdoers could foil wiretappers may be only the first indication that Clipper is unable to do the job for which it was designed. In his paper revealing the glitch, he writes, "It is not clear that it is possible to construct EES (Escrow Encryption Standard) that is both completely invulnerable to all kinds of exploitation as well as generally useful."
At bottom, many opponents of Clipper do not trust the Government. They are unimpressed by the elaborate key-escrow security arrangements outlined for Clipper. Instead, they ask questions about the process by which the Clipper was devised -- how is it that the N.S.A., an intelligence agency whose mission does not ordinarily include consumer electronics design, has suddenly seized a central role in creating a national information matrix? They also complain that the Skipjack cryptographic algorithm is a classified secret, one that cryptographic professionals cannot subject to the rigorous, extended testing that has previously been used to gain universal trust for such a standard.
"You don't want to buy a set of car keys from a guy who specializes in stealing cars," says Marc Rotenberg, director of the Electronic Privacy Information Center. "The N.S.A.'s specialty is the ability to break codes, and they are saying, 'Here, take our keys, we promise you they'll work.' "
At the March conference on computers and privacy, Stewart Baker responded to this sort of criticism. "This is the revenge of people who couldn't go to Woodstock because they had too much trig homework," he said, evoking some catcalls. "It's a kind of romanticism about privacy. The problem with it is that the beneficiaries of that sort of romanticism are going to be predators. PGP, they say, is out there to protect freedom fighters in Latvia. But the fact is, the only use that has come to the attention of law enforcement agencies is a guy who was using PGP so the police could not tell what little boys he had seduced over the net. Now that's what people will use this for -- it's not the only thing people will use it for, but they will use it for that -- and by insisting on having a claim to privacy that is beyond social regulation, we are creating a world in which people like that will flourish and be able to do more than they can do today."
Even if Clipper flops, the Crypto War will continue. The Administration remains committed to limiting the spread of strong cryptography unless there's a back door. Recently, it has taken to asking opponents for alternatives to Clipper. One suggestion it will not embrace is inaction. "Deciding that the genie is out of the bottle and throwing our arms up is not where we're at," says a White House official.
The National Security Agency will certainly not go away. "The agency is really worried about its screens going blank" due to unbreakable encryption, says Lance J. Hoffman, a professor of computer science at George Washington University. "When that happens, the N.S.A. -- said to be the largest employer in Maryland -- goes belly-up. A way to prevent this is to expand its mission and to become, effectively, the one-stop shop for encryption for Government and those that do business with the Government."
Sure enough, the security agency is cooking up an entire product line of new key-escrow chips. At Fort Meade, it has already created a high-speed version of the Skipjack algorithm that outperforms both Clipper and Capstone. There is also another, more powerful, encryption device in the works named Baton. As far as the agency is concerned, these developments are no more than common sense. "To say that N.S.A. shouldn't be involved in this issue is to say that Government should try to solve this difficult technical and social problem with both hands tied behind its back," Stewart Baker says.
But Phil Zimmermann and the Cypherpunks aren't going away, either. Zimmermann is, among other things, soliciting funds for a PGP phone that will allow users the same sort of voice encryption provided by the Clipper chip. The difference, of course, is that in his phone there is no key escrow, no back door. If the F.B.I. initiated a wiretap on someone using Zimmermann's proposed phone, all the investigators would hear is static that they could never restore to orderly language.
What if that static shielded the murderous plans of a terrorist or kidnapper? Phil Zimmermann would feel terrible. Ultimately he has no answer. "I am worried about what might happen if unlimited security communications come about," he admits. "But I also think there are tremendous benefits. Some bad things would happen, but the trade-off would be worth it. You have to look at the big picture."
-
@ 1bc70a01:24f6a411
2023-04-05 01:25:09Unless you have some private projects that require secrecy, you should just organize conversations on nostr.
Smart bootstrapped founders know that one of the best ways to garner attention is by building in public.
By posting on Nostr, you are in essence building in public. This has many benefits:
- Free marketing for your project
- Recruit other designers. If they see that there are others, they are more likely to join your cause.
- Attract talent (people who are interested in the project will likely want to work on it). Find development help.
- Attract funding (even sats from plebs, bounties on your behalf, etc…)
- Help nostr grow. By getting outside the siloed communication channels, you help add activity to Nostr. When people see that it’s busy, they are more likely to participate. Nobody wants to use a dead social network (even though nostr is so much more than a social network).
How to organize on Nostr without channels or groups
A common objective is “but there is not a good client for group chat”.
Nostr IS the group chat. It's just a much larger group. All you need is a way of organizing conversations.
Enter hashtags.
Hashtags allow people to track conversations so you can see if someone is discussing #nostrdesign for example.
“But, I forget to use hashtags!”
Ok, make a SUPER simple client that automatically inserts the hashtag into the message. Hardcode if if you need to for the time being.
Clients like Snort already let you follow hashtags so it’s a matter of bookmarking it and just checking it whenever you’re online.
Don’t want a bloated client? No problem. Clone Snort, remove everything but the posting and reading functionality. Use the client only for posting and for reading that specific hashtag. Congrats, you just created your own public channel! The best part? Everyone can see it without signing up for any siloed platforms.
Act
Do it now. Close the group and let everyone know you’re using nostr from now on. No excuses, no waiting. Just do it. It may be hard and painful at first, but you'll get used to it. Who knows, it may be enough motivation to build great clients that do one thing very well. Let’s go!
-
@ d408b55a:7ea8e70a
2023-04-05 01:10:28I found it. The Medium/Substack crossover for Nostr. Shoutout Gigi for showing me the way in his recent article. It's called blogstack. Original naming? Clearly not. Badass? Absolutely. https://dergigi.com/2023/04/04/purple-text-orange-highlights/
Thus, I will be copying and pasting all my Mediums over there as well because like Satoshi said "information is easy to spread and hard to stifle."
I'm going to summarize what I got out of Gigi's article. Might even turn it into an article for bitcoinnews.com because it's been awhile since I had my writing shared there and they practice V4V. Nostr is a decentralized protocol for social media. It allows users to create and share content without the need for a central authority. The protocol is based on the idea of a distributed ledger, which is a database that is shared and maintained by a network of computers. This makes it difficult for anyone to censor or control the content that is shared on Nostr.
The Nostr protocol is made up of two main components: clients and relays. Clients are the software that users use to interact with the protocol. The Damus app made by JB55 is a great example of a client for iOS. Relays are the computers that store and process the data that is shared on Nostr. If you have the desire you can even spin up a relay using Umbrel and a raspberry pi. Here is a video on how to do so. When a user creates a post on Nostr, it is signed with their private key. This ensures that the post cannot be tampered with. The post is then broadcast to the network of relays. The relays verify the signature and then store the post. The post is then available for other users to view.
Nostr is a censorship-resistant protocol. This means that it is difficult for anyone to remove or censor content that is shared on Nostr. This is because the data is stored on a distributed ledger and is not controlled by any one entity. There are no username and passwords. Just public and private key pairs. You can view anyone's feed with their public key, but if you want to see private data, like messages, you will need a private key.
Nostr is still in its early stages of development, but it has the potential to revolutionize the way we interact with social media. Devs are pushing code quickly and responding to user feedback. JB55 even spun up a chatGPT bot on the platform so you don't have to go to openAI's website to proompt anymore.
While the anti-censorship part of Nostr is cool that is only the beginning. Nostr's platform provides a value-for-value model, which allows writers to earn money from their work via zaps. On the Nostr protocol sending satoshis (the smallest unit of a bitcoin) just takes a few clicks. This eliminates the need for advertisers and algorithms to show users emotion provoking content in an attempt to keep their attention. Nostr has reduced the friction of value transfer and provided a seamless way for writers and readers to engage with each other in positive ways.
As the internet continues to grow, the amount of information available is increasing exponentially. With Nostr's platform, information is more accessible, and the value-for-value model encourages the creation of high-quality content. This creates a more level playing field for writers, who might not have been able to monetize their work through traditional publishing methods.
While the idea of free information might be daunting to some, the reality is there is no one qualified to be the disinformation police. Propaganda is everywhere. People need to read as much as possible and weigh the bias for themselves. Nostr's model of providing value for value, rather than relying on advertising revenue, creates a more sustainable system for the production and dissemination of quality content. This incentivizes writers to create content that is valuable to readers, rather than clickbait.
Despite being in its early stages, Nostr has already shown its potential to revolutionize the way we consume and share information. The platform provides a unique opportunity for writers to connect with readers while earning money from their work. The value-for-value model is more in line with the principles of a free and open internet, and it offers a refreshing alternative to the traditional platforms that rely on advertising revenue.
In conclusion, Nostr's platform offers a promising future for every single user of the protocol. We are just at the beginning. If you had told someone in 2011 that one day people would be earning Bitcoin by using their credit or debt card, they would have laughed at you. But today, it is a reality. And one day, I am going to tell my grandkids that I was getting paid 1000s of satoshis for shitposting. And they will laugh at me. But not because they think it's ridiculous. They will laugh because they will be amazed at how much money I was able to make for doing something that they enjoy. Also, earning a 1000 satoshis in 50 years is going to be a whole lot harder than it is today. Having both Nostr & Bitcoin empowers both creators and consumers of content like never before. We are creating a more sustainable and equitable model for the dissemination of information. You don't even have to part with your fiat anymore to stack sats anymore. Just provide valuable content on Nostr and people will zap you.
4/4/23
Conor Jay Chepenik
-
@ 75bf2353:e1bfa895
2023-04-05 01:08:28What Backs Bitcoin
People who have spent less than 600 blocks worth of time studying bitcoin like Elizabeth Warren often argue that Bitcoin has no intrinsic value.
``` "No thing that backs it up. That's what makes it different. It's just belief. You and I assess. You assess the value goes up. I assess the value is going down and therefore I buy."
So It's like this artwork?
"No because at the end of the day I can hang that thing on my wall and I can enjoy it or I can throw darts at it."
```
They assert it is "just digital." How do you know it's there if you can't touch it with your hands or see it with your own eyes? They often believe that money needs to be "backed by something," as if they still think the bank has gold in the vault to back up the digits in your bank account. Maybe they think pieces of cotton embossed with presidential portraits back up that money-- but that's not the case. I can't fault them for this. I thought the dollars in my piggy bank were backed by gold held in Fort Knox. As it turns out, it is backed by the full faith and credit of the United States Government. The same government that brought you:
- The Gulf Of Tonkin
- The Iran Contra Affair
- Read my lips: No new taxes
- Weapons of Mass Destruction
- 15 days to slow the spread. ```
“The root problem with conventional currency is all the trust that’s required to make it work. The central bank must be trusted not to debase the currency, but the history of fiat currencies is full of breaches of that trust. Banks must be trusted to hold our money and transfer it electronically, but they lend it out in waves of credit bubbles with barely a fraction in reserve. We have to trust them with our privacy, trust them not to let identity thieves drain our accounts.” --Satoshi Nakamoto ```
We can't trust the United States government officials. Some people think that makes me a waco conspiracy theorist, but we also have to trust the banks, the bonds, thye Federal Reserve with the Interest rates. A CBDC would make us need to trust them even more. Maybe you live in a country that uses a different currency. What is that currency backed by? The full faith and credit of the Venezuelan government? The full faith and credit of Russia? Turkey? Lebanon?Full faith and credit is nothing more than a belief. Despite the poignant accusations of the Senator from Massachusetts and the full faith and credit of her Native American ancestry, the full faith and credit of any nation is the full faith and credit in the honesty of its politicians. I guess this means fiat currency and now CBDC's are backed by something after all: Bullshit.
Does Bitcoin have intrinsic value? Yes, because like gold, bitcoin is backed by physical reality. Wait, I thought Pocahontas said it isn't backed by anything? She wears a pantsuit and makes speeches. She's a US Senator for crying out loud. She must be doing a good job because like all the rest of the Senators we keep electing her again and again. You are just some cartoon robot. Why should we trust you? You haven't even been verified by the Ministry of Truth.
You Should Not Trust Me, You Should Verify The Math
```
" A purely peer-to-peer version of electronic cash would allow online payments to be sent directly from one party to another without going through a financial institution. Digital signatures provide part of the solution, but the main benefits are lost if a trusted third party is still required to prevent double-spending. We propose a solution to the double-spending problem using a peer-to-peer network."
Satoshi Nakamoto'' ```
Let's break this down. Bitcoin is peer-to-peer. That means it is run on a peer-to-peer network like BitTorrent. If you've never used BitTorrent, this term might not mean anything to you. BitTorrent is a file-sharing network. People on the BitTorrent network seed bits and pieces of music, movie, audiobooks, and even plans for 3D-printed guns, and porn(of course). You may not like 3D-printed guns, Justin Beiber, or transgender goat porn. Too bad. Those things exist on BitTorrent whether you like it or not.
"Governments are good at cutting off the heads of centrally controlled networks like Napster, but pure P2P networks like Gnutella and Tor seem to be holding their own." --Satoshi Nakamoto
Music, 3D printed gun cad files, and transgendered goat porn are all information. This information is valuable. Value is subjective. I might not find Justin Beiber's music valuable, but Beliebers disagree with me. I don't like grannie goat porn. That's fine. That's what a market is for, determining value via the price system. Beliebers find value in his music. Granny goat porn aficionados find value in granny goat porn,
subjective value
His songs are distributed on centralized servers like Apple music. I would bet a million sats that Apple backs up this music on more than one computer, but I can't say for sure since it is proprietary information. Proprietary information is so valuable that laws are created to protect it. Justin Bieber's bibliography is protected by copyright laws.
BitTorrent is unaware of these copyright laws. 1 mp3 = 1 mp3 according to the BitTorrent software. This software does not make a distinction between copyright and copyleft. The rules of BitTorrent do not discern between legal or illegal mp3s. All are welcome.
For the sake of argument, let's say I seed a copy of Justin Bieber's song. The government of the United States says this is illegal so they destroy my computer. Can someone in Australia still download it? Absolutely! Because that song was not just on my computer. It was on dozens, maybe hundreds of computers. In other words, it is backed up by hard drives all over the world.
According to Clark Moody's dashboard, there are 17,096 nodes on the network as of block height 783,791. (11:08 PST 4-3-2023) These nodes back up bitcoin like the dollar once backed gold With bitcoin, however, no one person can write an Executive Order to shut down all the nodes, effectively taking Bitcoiners of the node standard. All 17,000 of us would need to shut down our nodes to end bitcoin.
What If They Change The Code?
Greenpeace just released the Death Skull commemorative sticker. Most Bitcoiners I know rushed to get one. It looks cool. We also know that changing the code is futile because we have seen the bitcoin code changed many times before. You may have heard of these changes in the code. Centralized, publicly traded companies like CoinBase sell them for fees. We call these code changes shitcoins. Our nodes reject these shitcoins, cryptographic rules that do not follow the rules of the bitcoin software. Coins that changed the code can make transactions on other nodes. Ethereum can make transactions on fully permissioned Ethereum nodes. Litecoin can make transactions on Litecoin nodes. According to Bitcoin nodes, however, these coins are counterfeits and will be rejected. Our nodes define a hard cap of just under 21 million bitcoin. Each whole coin can be divided by 100,000,000. This is how we enforce the monetary supply, by preprogrammed rules distributed over a computer network. As I said before, you can change the code, but 17,049 other nodes will tell you to GFY.
What if I uploaded Metalica's "Enter Sandman" to BitTorrent, but titled it "Baby(Featuring Ludacris)?" Would Bieber fans believe me? Of course not, because songs are not subject to belief. It is based on Consensus. These are not the same songs. Only one is a valid Justin Beiber song. I wouldn't be able to fool a five-year-old kid with this scheme.
Bitcoin works the same way, but instead of verifying the information with our ears, we verify the information with math. To be fair, we can also use this same math to verify songs on BitTorrent, but this is not important. The main takeaway is that the transactions can and are verified using math. You might not be able to hear, taste, smell, or understand this math but you can see it. It can be verified like 2+2, even if you think the answer is 5, nobody else will agree with you. It does not require belief. We can see this with our own eyes, making bitcoin an objective truth duplicated by thousands of computers.
What If I Forget My Password?
Not only is the entire history of every bitcoin transaction backed up by thousands of computers, but people who use Bitcoin must also back up their secret keys which allow them to spend the bitcoin they own which is backed up by the network. A common misconception is to call this a password. Furthermore, as if this was not confusing enough, we can also add passphrases. A secret key is generally 12 or 24 words that represent a 128 or 256-bit number. It is nearly impossible to guess one of these provided it has enough entropy. If a.passphrase is also used, the Bitcoin user will need this as well and it must be exact. There is no room for error as a passphrase creates a whole new wallet.
I'm not going to lie, I'm no politician after all. If you lose your keys or forget your passphrase, you're shit out of luck. There are no bailouts in bitcoin. Therefore, it makes sense to back these things up and use test net before sending real value to your wallets. To back up our private keys, most of us rely on metal. Specifically, military-grade stainless steel with 24 words etched or stamped on them. Again, these are real words that represent real numbers so that real math can be used with them. This is not a belief. We literally back up our keys with steel, at least the smart Bitcoiners do. The point is that we might forget our passwords as you say if we get Alzheimer's or bumped in the head. That is why we back our keys up. Politicians like Elizabeth Warren who say our bitcoin is not backed by anything other than belief are just plain wrong.
In conclusion, Every Bitcoin transaction on the network is backed by silicon and all the components inside our computers. If one of these computers goes down, thousands are still running. We each share a copy of the same ledger. If someone tries to change the code, our computers reject it. I did not get into mining, but the same argument holds. There are thousands of Bitcoin miners doing math too. All of that math is verified by other miners and all the nodes are like a cloud run by thousands of volunteers instead of a corporation or government. The keys we use to make transactions on this network technically do not need to be backed by anything. We could just commit them to memory, but most of us back these keys up using military-grade stainless steel. That's what backs up Bitcoin.
--Blogging Bitcoin, 783,827
This blog has no ads and is reader supported. It uses the Value 4 Value model instead. If you don't know what that is, please click the button bellow.
-
@ c753997e:9fe20adc
2023-04-04 22:36:17Johnson & Johnson said Tuesday that it will offer at least $8.9 billion to resolve thousands of lawsuits filed by people alleging that the company's products containing talc caused cancer.
In a news release, the health and consumer goods company said that its latest proposal to settle the talcum powder litigation, which is payable over 25 years, is $6.9 billion more than its previous offer in connection with a 2021 bankruptcy filing by its LTL Management unit.
Women have filed a barrage of suits in recent years alleging that J&J's baby power gave them ovarian cancer or mesothelioma, a cancer that strikes the lungs and other organs.
J&J continues to deny that its talcum powder poses health risks, saying that the settlement offer does not constitute an admission of wrongdoing.
"The company continues to believe that these claims are specious and lack scientific merit," said Erik Haas, worldwide vice president of litigation at Johnson & Johnson, in a statement. "However, as the bankruptcy court recognized, resolving these cases in the tort system would take decades and impose significant costs on LTL and the system, with most claimants never receiving any compensation."
J&J has stopped selling its talcum-based baby powder worldwide.
-
@ c753997e:9fe20adc
2023-04-04 22:17:16On March 29, the US Senate voted to repeal two Authorizations for the Use of Military Force (AUMFs), one passed in 1991 and another in 2002. The repeal now goes to the House of Representatives.
But those Authorizations are irrelevant to the present; they apply only to the Iraq war. A third AUMF, passed in 2001, was left untouched. And that AUMF is the only one that has a bearing on the present moment, because it provides legal cover for the many US military operations, open and secret, around the world.
The 1991 and 2002 AUMFs gave congressional approval for two wars on Iraq, known respectively as Operation Desert Storm and Operation Iraqi Freedom. After the hundreds of thousands left dead and the millions displaced as a result of the US wars on Iraq, the Senate repeal should be filed under “Too little, too late. But good PR.”
2001 authorization of secret wars left untouched
The AUMF of 2001, the one untouched by the Senate, is an entirely different matter. Its content and use are explained in a nutshell here:
“The authorization granted the president the authority to use all ‘necessary and appropriate force’ against those whom he determined ‘planned, authorized, committed or aided’ the September 11 [2001] attacks, or who harbored said persons or groups….
“Since 2001, US presidents have interpreted their authority under the AUMF to extend beyond al-Qaeda and the Taliban in Afghanistan to apply to numerous other groups as well as other geographic locales.….
“Today, the full list of actors the US military is fighting or believes itself authorized to fight under the 2001 AUMF is classified and therefore a secret unknown to the American public.
“The AUMF has also been cited by a wide variety of US officials as justification for continuing US military actions all over the world [emphasis mine]….
“According to a report by the Congressional Research Service, published May 11, 2016, at that time the 2001 AUMF had been cited 37 times in connection with actions in 14 countries and on the high seas. The report stated … ‘Of the 37 occurrences, 18 were made during the [George W] Bush administration, and 19 have been made during the [Barack] Obama administration.’
“The countries that were mentioned in the report included Afghanistan, Cuba (Guantanamo Bay), Djibouti, Eritrea, Ethiopia, Georgia, Iraq, Kenya, Libya, the Philippines, Somalia, Syria and Yemen.”
What does this mean for the present? Here is what Just Security tells us:
“As General Mark Milley, chairman of the Joint Chiefs of Staff, recently (June 2021) testified before the House Armed Services Committee (here at 3:10:45), no current US military operations depend on the 2002 AUMF and thus its repeal would not affect the United States’ ongoing wars. Repeal of the 2002 AUMF costs the Biden administration little or nothing.
“Where the rubber meets the road on AUMF reform is the 2001 AUMF, the principal statutory authority for US military operations in the war on terror. As General Milley explained, the ‘2001 AUMF is the one we need to hang on to … it is the critical one for us to continue operations [emphasis mine].”
But as noted above, those “operations” which take place “all over the world” are a secret, unknown to the American people and the world.
The New York Times was optimistic in its reportage of the Senate action, noting that the repeal might be a stepping stone to dealing with the 2001 AUMF. However, in this case the word the Times used was not “repeal” but “replace.”
(Obama had once spoken of the need to “refine” it.) General Milley must have heaved a sigh of relief as he read those carefully chosen words. He will be able to “continue operations” well into the future.
Flashes of decency quickly extinguished
There were, however, flashes of relevance to the current wars in the debate over the Senate repeal. First was Rand Paul’s Resolution to repeal the 2001 AUMF along with the other two. That failed by a vote of 9 to 86, with four Republicans, four Democrats and one Independent voting yes.
Second was an amendment advanced by Republican Senator Josh Hawley that would create a special watchdog over the $113 billion that have gone to President Joe Biden’s Ukrainian proxy war to cripple Russia. But that bright spot was also quickly snuffed out by a vote of 68-26. Only two Democrats, Jon Tester of Montana and Jon Osoff of Georgia, and one Independent, Kristin Sinema of Arizona, voted for it.
The Times also noted, “Over the past few years, there has also been a pronounced generational shift in Congress and in both parties, where anti-war voices on the left have aligned with ‘America First’ enthusiasts on the right who resist entangling the United States in foreign conflicts.”
That is certainly good news for those who would like to see the survival of humanity, but unfortunately this new breed has not yet gathered sufficient strength to pass legislation like the proposals of Rand Paul or Josh Hawley.
Vatican rescinds Doctrine of Discovery
All in all, these proceedings in the Senate bore an unseemly resemblance to another repeal a day later, this one in the Vatican. That day the Doctrine of Discovery was rescinded. You may not know what that Doctrine states, dear reader, but its spirit is alive and well today.
The Doctrine of Discovery is a legal concept that was developed out of Papal Bulls in the 1400s that granted European Christian nations the right to conquer non-Christian lands and subjugate their inhabitants. By 1493 it had grown into an accepted European legal doctrine that “discovery” of a land by a European nation conferred ownership – even if the land had indigenous occupants.
The Doctrine of Discovery provided a rationale for European colonialism and was introduced into US jurisprudence by Thomas Jefferson and John Marshall. Marshall used the Doctrine in 1823 to justify the expropriation of American Indians’ lands. Needless to say, indigenous peoples in America and throughout the world find the Doctrine repulsive and have demanded that it be “rescinded” for a long time.
Today the Doctrine of Discovery has no force or relevance in the world of policy, and so it can be rescinded. File it under “Too little, too late. But great PR.” Just like the AUMFs of 1991 and 2002 – but unlike the AUMF of 2001, which allows General Milley’s operations to continue and is kept on the books.
In the long view, the Doctrine of Discovery is the “spiritual” forebear of the AUMFs. Its echo can be heard in the “Wolfowitz Doctrine” and in the bloody US drive for global hegemony from Ukraine to Taiwan.
This article appeared originally at Antiwar.com.
JOHN WALSH
John V Walsh, until recently a professor of physiology and neuroscience at the University of Massachusetts Chan Medical School, has written on issues of peace and health care for the San Francisco Chronicle, EastBayTimes/San Jose Mercury News, Asia Times, LA Progressive, Antiwar.com, CounterPunch and others. More by John Walsh
-
@ f8838597:7ad3e77a
2023-04-04 18:39:19Porn artists like myself, for whom NIP-36 is a must, have suffered from account bans and freezes on social networking sites for many years. While it may be basically inevitable that porn users will be excluded, shadowbanning on Twitter has forced even the average artist to be concerned about the percentage of skin tones in their images.
How would Nostr benefit such artists? Currently, Gossip and Rabbit are the only clients that have implemented NIP-36 correctly.
And even if NIP-36 is implemented in all clients, there is nothing we can do if more and more spammers start posting pornographic photos without NIP-36. You can block them individually, but it is not perfect.
Nostr's zap feature and NIP-05 verification for artists would be features that would help artists.
We need to figure out how to make Nostr a great protocol that accepts a diverse group of people, including people like me.
Will it be a good place for porn artists like me to exist?
That said, I love Nostr and will be here for a while, even if I can't post pornographic illustrations.
If there are any other NIP-36-like users out there, please let me know what you think.
It's an inevitable problem for using Nostr as a social network.
-
@ 46fcbe30:6bd8ce4d
2023-04-04 16:10:59Different social clients show content very differently and while it's often by preference of the respective developers and not just a missing feature, it results in a mismatch between authors' intended impact and readers' actual impact.
For example:
- You use markdown to have a pretty link but most clients do not render markdown links, resulting in rather ugly "gibberish"
- You react with 😂 and the recipient sees only a ❤️ counter go up - or no reaction at all because the client dev wants to push towards zaps
- You zap an event but the recipient only supports ln tips, not zaps, so while the recipient gets money, others don't see that you liked this content.
- You embed some events in your post and most clients only add a links to those events without rendering them inline
- You mention somebody and clients go all over the place on how that looks. Some render the nip-5, some render the username with the nip-5 domain if present, some show avatars inline and some only show plain npubs.
I think, we need to communicate that these differences exist and we need words to describe them as a first step to help consolidate ways of doing things where desired.
Currently nips describe mostly the network layer - how events should look like in their JSON form but we don't standardize how things should look for the user. At least not to great detail. And while some would argue we have too many nips already, others would argue that we need more - but not in Fiatjaf's GitHub repository. And for that, we need a way to collaborate and collectively curate a body of nips. We will get there ...
-
@ 42f9711f:8239fb2a
2023-04-04 13:53:16Tribune de Konstantin Rabin, écrivain en finance et en technologie.
Je fais partie de ceux qui ont eu la chance d’avoir découvert Bitcoin il y a plus d’une décennie avant qu’il ne gagne l’attention du grand public. Malheureusement, je fais également partie de ces idiots qui ont vu cette opportunité se profiler, n’y ont pas trop réfléchi et l’ont ignorée.
Au cours de ce petit récit, je voudrais vous faire partager le chemin qui m’a conduit à ignorer à investir dans Bitcoin à trois reprises avant de finalement céder et de devenir un HODLer. Voici donc les leçons cruciales que j’ai tirées de cette expérience et qui valent la peine d’être partagées avec ceux et celles qui doutent encore de BTC.
LE COMMENCEMENT
Étant donné que j’ai commencé mon premier emploi à plein-temps dans le courtage en ligne en 2011, cela ne surprendra personne que j’étais entouré de collègues passionnés par le trading et par tout ce qui touchait aux investissements, à la technologie et au progrès du monde de la finance. En peu de temps, je suis devenu ami avec Edgar. Nous partagions les mêmes centres d’intérêt, principalement les jeux vidéo et notre addiction de longue date à la nicotine. Même si nous travaillions dans différents départements et avions peu d'occasions de collaborer dans le cadre du travail, nous nous contactions l’un l’autre pour prendre des pauses cigarettes. Nous parlions de nos vies, de l’univers et de tout le reste en prenant une bouffée d’air frais et de nicotine.
Un jour de 2012, j’ai envoyé à Edgar un message du type “clope ?” avant de remarquer que son statut Skype contenait une sorte de charabia, comme si un chat avait marché sur son clavier.
Cela ressemblait à quelque chose comme : “1BvBMSEYstWetqTFn5Au4m4GFg7xJaNVN2.”
Alors que nous fumions, je lui ai demandé, “C’était un chat ou ton compte a-t-il été piraté ?” Il a nié les deux possibilités et s’est lancé dans une longue tirade compliquée sur les addresses Bitcoin et la technologie blockchain.
Edgar m’a expliqué avec passion tout ce qu’il savait sur Bitcoin et son enthousiasme m’a immédiatement contaminé - j’ai donc commencé à m’intéresser au sujet. Faisant partie du monde de la finance, j’étais conscient de toutes les arnaques et produits douteux qui circulaient sur le net et qui, comme e-gold, semblaient similaires aux premiers abords. Néanmoins, plus il m’en parlait, moins Bitcoin semblait être un projet malhonnête. À minima, cela en valait la peine de tenter le coup.
Mon problème majeur était que 2012 était ma pire année en matière de santé financière, et bien que 3 730 218 clés publiques étaient déjà en existence sur le réseau Bitcoin à cette époque, je n’avais aucune économie à dépenser pour aller parier sur une technologie nouvelle qui n’avait pas fait ses preuves et qui promettait de “révolutionner” notre relation à l’argent.
Pour le dire franchement, j’étais vraiment fauché. Si fauché qu’à la fin de chaque mois, mes passages au supermarché se résumaient à devoir choisir entre acheter de la nourriture ou un paquet de cigarettes pour tuer la sensation de faim. Au final, j’en suis venu à la conclusion qu’alors que manger de la viande était considéré comme un luxe, parier sur le futur de jetons numérisés ne s’inscrivait pas dans une logique budgétaire saine. À cette époque, bitcoin s'échangeait pour moins de 10 $
LE DOUTE
Avançons en 2015. Ayant passé plusieurs bonnes années au travail, j’avais cumulé les promotions et dirigeais dorénavant la stratégie et l’exécution marketing dans une des plus importantes start-ups de fintech en Europe. L’environnement professionnel était super. La plupart de mes collègues étaient des développeurs de logiciels invétérés qui travaillaient sans cesse à collecter les données bancaires d’individus sans demander de permissions quelconques aux banques. Le bureau arborait même un bon vieux pavillon noir comme sorte de justification pour le travail qui y était mené. Comme vous pouvez l’imaginer, beaucoup de mes collègues étaient de grands fans de Bitcoin et de tout ce que cela représentait.
Puisque j’avais beaucoup progressé professionnellement, les chiffres indiquant mon salaire avaient gagné en zéro. J’avais enfin la possibilité d’acheter des cigarettes et de la nourriture, tout en ayant suffisement d'argent de côté pour subvenir à des temps difficiles. En travaillant dans ce secteur, je savais mieux que quiconque que laisser mon argent à la banque n’était pas la voie à suivre et je commençais donc à réfléchir à comment investir mon capital, puisque je n’avais aucune intention de le dépenser.
J'entendais souvent mes collègues parler de “Bitcoin” au bureau, mais j’étais encore sceptique quant à s’il s’agissait d’un bon investissement. À l’époque, bitcoin s’échangeait pour environ 250 $ après être tombé du haut de ses 1000 $. J’ai approché la question avec mon cerveau d’investisseur bien conditionné et en ai conclu que bitcoin n’allait probablement jamais recouvrir cette perte et qu’il continuerait de chuter jusqu’à ce qu’il ne reste plus qu’une poignée de geeks invétérés pour s’y intéresser encore.
Je gardais quand même un oeil sur les courbes de dominance de Bitcoin et remarquais que, malgré la chute, sa dominance sur le marché restait sans équivoque, ce qui m’a conduit à conclure qu’il s’agissait de la seule cryptomonnaie ayant réussi à accomplir quelque chose, mais que sans concurrence, elle ne parviendrait jamais à devenir vraiment importante.
“Il me faut un produit de placement plus stable pour mes économies,” disais-je à l’investisseur avisé de mon esprit, et j’ai donc acheté 7 500 $ en lingots d’or. Ayant gardé un oeil sur la hausse continue du cours de l’or depuis la crise économique de 2008, cela me paraissait être l’investissement le plus stable possible.
LE REJET
Faisons un saut en 2018, année durant laquelle tout le monde était fou de crypto. À part bitcoin, de nombreuses autres cryptomonnaies avaient emergé et le boom des ICO (Initial Coin Offering: Offre publique de pièces initiale) battait son plein avec plus de 6,88 milliards $ levés par l’intermédiaire d’ICO au cours du premier trimestre de 2018. Tout le monde, y compris leurs mères, parlait de Bitcoin et de crypto. Une visite chez le coiffeur et vous en entendiez parler, et sur Facebook il était impossible de trouver une page qui n’en faisait pas mention d’une manière ou d’une autre ; même mes parents m’ont donné un coup de fil et m’ont demandé si j’en possédais, me disant que je devais en acheter puisqu’ils avaient entendu dire qu’il était probable que le cours monte.
À cette période, j’offrais des services de marketing en freelance, et les affaires allaient bien puisque les ICO bros dépensaient des sommes folles dans n’importe quel service à condition qu’ils puissent payer en crypto. Même si des stablecoins comme USDT étaient déjà présents depuis longtemps, il était rare que les gens les utilisent dans un contexte transactionnel. Je voyais certains de mes paiements arriver sous forme de BTC dans une fourchette de prix allant de 4 000 $ à 13 000 $ par bitcoin.
C’était à ce moment là que j’ai acquis mon premier bitcoin, mais du fait de la folie complète qui frappait l’univers de la crypto, j’ai décidé de vendre toutes mes unités de BTC le plus vite possible à quelqu’un trouvé sur Local Bitcoins. Durant cette période, la volatilité quotidienne était énorme, et — par sûreté — je me dépêchais de convertir mes bitcoins en cash à chaque paiement le plus vite possible.
L’ACCEPTATION
La mi-2018 fut un point tournant pour moi en matière de carrière. J’avais arrêté de travailler à plein temps pour autrui et avais décidé de me concentrer sur le développement de ma propre entreprise. À ce moment là, j’avais réussi à vendre un de mes projets pour une somme conséquente, ce qui m’a permis d’acquérir le capital initial nécessaire pour démarrer ma nouvelle entreprise, alors que les fonds dormant sur mon compte bancaire me donnaient suffisamment de tranquilité d’esprit pour dormir sur mes deux oreilles pendant que ma nouvelle entreprise prenait forme.
La vie était belle. Je possédais déjà quelques propriétés, je gagnais plus d’argent que je ne pouvais en dépenser et j’avais toutes les opportunités professionnelles que je désirais. Tout allait pour le mieux.
Puis, un jour, j’ai eu une épiphanie. Pourquoi devais-je continuer à convertir mes fonds [en monnaie fiduciaire] ? J’avais suffisamment d’argent à la banque et plein d’autres investissements boursiers. En quoi avoir 10 000 $ de plus en mon nom ferait-il quelconque différence sur mon bien-être personnel ?
J’en suis finalement arrivé à la conclusion que cela ne changerait rien, mais que le fait de ne pas avoir de bitcoin pourrait potentiellement me mener à redevenir pauvre. Que se passerait-il si la monnaie fiduciaire devenait un monopole ? Après tout, je n’ai pas vraiment confiance dans le gouvernement, et les individus que j’ai rencontrés au cours de ma vie qui croyaient en bitcoin étaient ceux auxquels je faisais le plus confiance - bien plus que ceux qui n’utilisaient que la monnaie fiduciaire. En gardant cela à l’esprit, j’ai commencé à accumuler le plus de BTC possible. Mon raisonnement était simple : je me fais payer en BTC et je les garde sans jamais encaisser.
QUELLES LEÇONS EN AI-JE TIRÉES ?
Je ne suis pas en colère contre moi-même du fait de ne pas avoir acquis des bitcoins plus tôt. De façon générale, je suis un homme heureux, et malgré la récente période glaciaire que traverse le monde de la crypto, notamment la débandade de FTX, je reste très optimiste quant à l’avenir du secteur. Je voudrais néanmoins partager avec vous les leçons que j’ai tirées de mon expérience avec BTC.
Leçon 1 : On n’est jamais trop “petit” pour investir
Au début, je pensais que ce serait une bonne idée d'acheter 1000 $ de BTC, mais je n’avais pas les moyens de me le permettre et ai donc laissé l'opportunité m'échapper. En général, si l’occasion se présente, il faut la saisir.
Il ne faut pas non plus investir toute ses économies ou se sentir mal à cause de son investissement, mais n’engager ne serait-ce qu’une fraction de ses revenus ne doît pas devenir une décision difficile à prendre. Aurais-je pu me permettre d'épargner 50 $ en 2012 pour acquérir 5 BTC ? Très probablement, mais rien que l'idée d’investir si peu me gênait.
Leçon 2 : Faire des sacrifices est nécessaire
Il a fallu que j’examine certaines de mes expériences passées pour raconter cette histoire car je voulais que les dates soient correctes. Ce faisant, je suis tombé sur une réservation de chambre d'hôtel pour 100 $ faite en 2012. C'était pour une nuit à l'étranger lors d’un voyage touristique avec ma copine.
Oui, dépenser autant pour une chambre d'hôtel en étant fauché n’est pas une décision très judicieuse. Avec du recul, j’aurais pu éviter ce voyage et investir dans BTC à la place, ou j’aurais pu prendre une réservation moins chère ailleurs et acheter du BTC avec le montant restant.
Il est inutile de regretter les décisions du passé, mais souvenez-vous que de faire un sacrifice de court terme pourrait assurer votre sécurité financière de long terme.
Leçon 3 : Équilibrer son portefeuille d'investissement
Tout livre d'investissement explique que “il ne faut pas mettre tous ses oeufs dans le même panier.” Ce n’est pas nouveau, mais c’est un principe que j’ai complètement negligé en 2015. J’avais suffisamment d'argent à investir et avais la volonté d'acquérir du BTC, mais pour une raison qui m'échappe, j'ai pris la décision de tout investir dans un métal précieux. Si je n’avais investi ne serait-ce que 20% de cette somme dans BTC, mon retour sur investissement aurait été considérablement plus grand.
Leçon 4 : Ne pas pourchasser les prix du passé
Une des raisons pour laquelle j’ai choisi d’investir dans l’or plutôt que dans bitcoin était simplement basée sur la perception que j’achetais de l’or à “un bon prix”. Je tenais compte du fait qu’il m'aurait fallu à ce moment donné payer 25 fois plus pour obtenir la même quantité de bitcoin que trois ans auparavant. Avec du recul, je sais maintenant que le prix du présent est le prix du présent — il ne faut pas rejeter l'idée d’investir dans le présent pour la seule raison que le prix à payer semble élevé par rapport aux années précédentes.
Leçon 5 : Faire partie de l'écosystème
Accepter du BTC en guise de paiement et ne pas y toucher est bien plus facile (mentalement) que d’en acheter contre de la monnaie fiduciaire. Si vous offrez des biens et services, pourquoi ne pas permettre à vos clients de régler les factures en BTC ? Éviter juste de commettre la même erreur que moi et de convertir tous vos BTC en monnaie fiduciaire après acquisition.
Gardez au moins une fraction de votre solde intacte et n’y pensez plus pendant un moment. Cela favorisa le taux adoption et continuera à jouer en votre faveur et en celle de l'ensemble de la communauté sur le long terme.
Article original : https://bitcoinmagazine.com/culture/what-i-learned-from-ignoring-bitcoin
Auteur : Konstantin Rabin (@konstantean)
Date de parution : 7 janvier 2023
-
@ 6e468422:15deee93
2023-04-04 13:23:19Not too long ago, I tried to paint a picture of what a vision for a value-enabled web could look like. Now, only a couple of months later, all this stuff is being built. On nostr, and on lightning. Orange and purple, a match made in heaven.
It goes without saying that I'm beyond delighted. What a time to be alive!
nostr
Here's the thing that nostr got right, and it's the same thing that Bitcoin got right: information is easy to spread and hard to stifle.[^fn-stifle] Information can be copied quickly and perfectly, which is, I believe, the underlying reason for its desire to be free.
[^fn-stifle]: That's a Satoshi quote, of course: "Bitcoin's solution is to use a peer-to-peer network to check for double-spending. In a nutshell, the network works like a distributed timestamp server, stamping the first transaction to spend a coin. It takes advantage of the nature of information being easy to spread but hard to stifle."
Easy to spread, hard to stifle. That's the base reality of the nature of information. As always, the smart thing is to work with nature, not against it.[^1] That's what's beautiful about the orange coin and the purple ostrich: both manage to work with the peculiarities of information, not against them. Both realize that information can and should be copied, as it can be perfectly read and easily spread, always. Both understand that resistance to censorship comes from writing to many places, making the cost of deletion prohibitive.
Information does not just want to be free, it longs to be free. Information expands to fill the available storage space. Information is Rumor's younger, stronger cousin; Information is fleeter of foot, has more eyes, knows more, and understands less than Rumor.
Eric Hughes, A Cypherpunk's Manifesto
Nostr is quickly establishing itself as a base layer for information exchange, one that is identity-native and value-enabled. It is distinctly different from systems that came before it, just like Bitcoin is distinctly different from monies that came before it.
As of today, the focus of nostr is mostly on short text notes, the so-called "type 1" events more commonly known as tweets.[^fn-kinds] However, as you should be aware by now, nostr is way more than just an alternative to twitter. It is a new paradigm. Change the note kind from
1
to30023
and you don't have an alternative to Twitter, but a replacement for Medium, Substack, and all the other long-form platforms. I believe that special-purpose clients that focus on certain content types will emerge over time, just like we have seen the emergence of special-purpose platforms in the Web 2.0 era. This time, however, the network effects are cumulative, not separate. A new paradigm.Let me now turn to one such special-purpose client, a nostr-based reading app.
[^fn-kinds]: Refer to the various NIPs to discover the multitude of event kinds defined by the protocol.
Reading
I'm constantly surprised that, even though most people do read a lot online, very few people seem to have a reading workflow or reading tools.
Why that is is anyone's guess, but maybe the added value of such tools is not readily apparent. You can just read the stuff right there, on the ad-ridden, dead-ugly site, right? Why should you sign up for another site, use another app, or bind yourself to another closed platform?
That's a fair point, but the success of Medium and Substack shows that there is an appetite for clean reading and writing, as well as providing avenues for authors to get paid for their writing (and a willingness of readers to support said authors, just because).
The problem is, of course, that all of these platforms are platforms, which is to say, walled gardens that imprison readers and writers alike. Worse than that: they are fiat platforms, which means that permissionless value-flows are not only absent from their DNA, they are outright impossible.[^2]
Nostr fixes this.
The beauty of nostr is that it is not a platform. It's a protocol, which means that you don't have to sign up for it---you can create an identity yourself. You don't have to ask for permission; you just do, without having to rely on the benevolence of whatever dictator is in charge of the platform right now.
Nostr is not a platform, and yet, powerful tools and services can be built and monetized on top of it. This is good for users, good for service providers, and good for the network(s) at large. Win-win-win.
So what am I talking about, exactly? How can nostr improve everyone's reading (and writing) experience?
Allow me to paint a (rough) picture of what I have in mind. Nostr already supports private and public bookmarks, so let's start from there.
Imagine a special-purpose client that scans all your bookmarks for long-form content.[^fn-urls] Everything that you marked to be read later is shown in an orderly fashion, which is to say searchable, sortable, filterable, and displayed without distractions. Voilà, you have yourself a reading app. That's, in essence, how Pocket, Readwise, and other reading apps work. But all these apps are walled gardens without much interoperability and without direct monetization.
[^fn-urls]: In the nostr world long-form content is simply markdown as defined in NIP-23, but it could also be a link to an article or PDF, which in turn could get converted into markdown and posted as an event to a special relay.
Bitcoin fixes the direct monetization part.[^fn-v4v] Nostr fixes the interoperability part.
[^fn-v4v]: ...because Bitcoin makes V4V practical. (Paywalls are not the way.)
Alright, we got ourselves a boring reading app. Great. Now, imagine that users are able to highlight passages. These highlights, just like bookmarks now, could be private or public. When shared publicly, something interesting emerges: an overlay on existing content, a lens on the written Web. In other words: swarm highlights.
Imagine a visual overlay of all public highlights, automatically shining a light on what the swarm of readers found most useful, insightful, funny, etc.
Further, imagine the possibility of sharing these highlights as a "type 1" event with one click, automatically tagging the highlighter(s)---as well as the author, of course---so that eventual sat-flows can be split and forwarded automatically.
Voilà, you have a system that allows for value to flow back to those who provide it, be it authors, editors, curators, or readers that willingly slog through the information jungle to share and highlight the best stuff (which is a form of curation, of course).
Zaps make nostr a defacto address book[^fn-pp] of payment information, which is to say lightning addresses, as of now. Thanks to nostr wallet connect (among other developments), sending sats ~~will soon be~~ is already as frictionless as leaving a like.
[^fn-pp]: The Yellow Pages are dead, long live The Purple Pages!
Value-for-value and participatory payment flows are something that traditional reading apps desperately lack, be it Pocket, Instapaper, Readwise, or the simple reading mode that is part of every browser.
A neat side-effect of a more structured way to share passages of text is that it enables semi-structured discussions around said passages---which could be another useful overlay inside special-purpose clients, providing context and further insights.[^5]
Further, imagine the option of seamlessly switching from text-on-screen to text-to-speech, allowing the user to stream sats if desired, as Podcasting 2.0 clients already do.[^3]
Imagine user-built curations of the best articles of the week, bundled neatly for your reading pleasure, incentivized by a small value split that allows the curator to participate in the flow of sats.
You get the idea.
I'm sure that the various implementation details will be hashed out, but as I see it, 90% of the stuff is already there. Maybe we'll need another NIP or two, but I don't see a reason why this can't be built---and, more importantly: I don't see a reason why it wouldn't be sustainable for everyone involved.
Most puzzle pieces are already there, and the rest of them can probably be implemented by custom event types. From the point of view of nostr, most everything is an event: bookmarks are events, highlights are events, marking something as read is an event, and sharing an excerpt or a highlight is an event. Public actions are out in the open, private actions are encrypted, the data is not in a silo, and everyone wins. Especially the users, those who are at the edge of the network and usually lose out on the value generated.
In this case, the reading case, the users are mostly "consumers" of content. What changes from the producing perspective, the perspective of the writer?
Writing
Back to the one thing that nostr got right: information is easy to spread but hard to stifle. In addition to that, digital information can be copied perfectly, which is why it shouldn't matter where stuff is published in the first place.
Allow me to repeat this point in all caps, for emphasis: IT SHOULD NOT MATTER WHERE INFORMATION IS PUBLISHED, and, maybe even more importantly, it shouldn't matter if it is published in a hundred different places at once.[^fn-torrents]
What matters is trust and accuracy, which is to say, digital signatures and reputation. To translate this to nostr speak: because every event is signed by default, as long as you trust the person behind the signature, it doesn't matter from which relay the information is fetched.
This is already true (or mostly true) on the regular web. Whether you read the internet archive version of an article or the version that is published by an online magazine, the version on the author's website, or the version read by some guy that has read more about Bitcoin than anyone else you know[^fn-guy]---it's all the same, essentially. What matters is the information itself.
[^fn-guy]: There is only one such guy, as we all know, and it's this Guy: nostr:npub1h8nk2346qezka5cpm8jjh3yl5j88pf4ly2ptu7s6uu55wcfqy0wq36rpev
Practically speaking, the source of truth in a hypernostrized world is---you guessed it---an event. An event signed by the author, which allows for the information to be wrapped in a tamper-proof manner, which in turn allows the information to spread far and wide---without it being hosted in one place.
The first clients that focus on long-form content already exist, and I expect more clients to pop up over time.[^4] As mentioned before, one could easily imagine prism-like value splits seamlessly integrated into these clients, splitting zaps automatically to compensate writers, editors, proofreaders, and illustrators in a V4V fashion. Further, one could imagine various compute-intensive services built into these special-purpose clients, such as GPT Ghostwriters, or writing aids such as Grammarly and the like. All these services could be seamlessly paid for in sats, without the requirement of any sign-ups or the gathering of any user data. That's the beauty of money proper.
Plagiarism is one issue that needs to be dealt with, of course. Humans are greedy, and some humans are assholes. Neither bitcoin nor nostr fixes this. However, while plagiarism detection is not necessarily trivial, it is also not impossible, especially if most texts are published on nostr first. Nostr-based publishing tools allow for OpenTimestamp attestations thanks to NIP-03, which in turn allows for plagiarism detection based on "first seen" lookups.
That's just one way to deal with the problem, of course. In any case, I'm confident that we'll figure it out.
Value
I believe that in the open ~~attention~~ information economy we find ourselves in, value will mostly derive from effective curation, dissemination, and transmission of information, not the exclusive ownership of it.
Although it is still early days, the statistics around Podcasting 2.0 and nostr zaps clearly show that (a) people are willing to monetarily reward content they care about, and (b) the willingness to send sats increases as friction decreases.
The ingenious thing about boostagrams and zaps is that they are direct and visible, which is to say, public and interactive. They are neither regular transactions nor simple donations---they are something else entirely. An unforgable value signal, a special form of gratitude and appreciation.
Contrast that with a link to Paypal or Patreon: impersonal, slow, indirect, and friction-laden. It's the opposite of a super-charged interaction.
While today's information jungle increasingly presents itself in the form of (short) videos and (long-form) audio, I believe that we will see a renaissance of the written word, especially if we manage to move away from an economy built around attention, towards an economy built upon value and insight.
The orange future now has a purple hue, and I believe that it will be as bright as ever. We just have a lot of building to do.
Further Reading
NIPs and Resources
- Nostr Resources
- value4value.info
- nips.be
- NIP-23: Long-form content
- NIP-57: Event-specific zap markers
- NIP-47: Nostr Wallet Connect
- NIP-03: OpenTimestamps attestations for events
Originally published on dergigi.com
[^1]: Paywalls work against this nature, which is why I consider them misguided at best and incredibly retarded at worst.
[^2]: Fiat doesn't work for the value-enabled web, as fiat rails can never be open and permissionless. Digital fiat is never money. It is---and always will be---credit.
[^3]: Whether the recipient is a text-to-speech service provider or a human narrator doesn't even matter too much, sats will flow just the same.
[^4]: BlogStack and Habla being two of them.
[^5]: Use a URI as the discussion base (instead of a highlight), and you got yourself a Disqus in purple feathers!
[^fn-torrents]: That's what torrents got right, and ipfs for that matter.
-
@ be318ab6:dd25a806
2023-04-04 13:10:00Like many other nostr users (nostriches), I pulled the plug on Twitter in March and moved my social media energy entirely to Nostr to give it a proper test. And same as the most, I won't be coming back to Twitter after this. I'll share a few highlights here about my experience.
Motivation
There have been two sets of reasons for me:
Macro ones
-
I'm concerned about the creeping digital tyranny, censorship, and manipulation abilities of the centralized platforms and state actors. Trusting people that these powers won't be misused is naive (especially after living past few years where we've seen globally the state-coordinated attacks on free speech and freedom). Therefore, I'm eager to support and explore any tools that make individuals and their families more resilient to tyranny.
-
Secondly, I love that it's an open-source tech. If there is a reasonable OS alternative to private closed-source ones, I prefer to support it. I see these as impactful charitable gifts that have the compounding utility for the world - especially if they lower the barriers to entry for new subsequent projects, services, and prosperity.
Personal
- I haven't been able to isolate myself from all the artificial politicization and triggering present on Twitter. The site's definition of engagement has been corrupted over the years. And now more than anything, it maximizes the enragement. And even when going there for particular signals (Bitcoin, Macroeconomics, ...), I got served the enraging noise, and it has stolen way too much time from me.
What have I learned after one month on Nostr:
Good (Nostr winning):
- On nostr, you usually don't see what you don't follow. In the future, this may lead to more bubbles and group-think, but it will lead to more politeness, signal, meaningful engagement on your feeds, and true diversity of global thinking.
- People build on Nostr at an amusing speed. I've never seen devs and designers shipping so rapidly. And this makes me want to get involved more actively.
- Zaps are fun. At first. And valuable forever.
- Ex. It's pretty exciting when @Jack Dorsey reposts your stupid meme, and then your wallet phone notifications get instantly showered with sats. Then the fun novelty effect wears off a bit, but the undisputed utility and its incentives stay. People have the extra motivation to share valuable content and replies. opportunity for content creators
Bad (Twitter winning):
- Twitter still has the network effects.
-
Unless you're a bitcoiner or nostr enthusiast, you might struggle to find enough content you care about on Nostr right now. Myself an amateur economist (same as Paul Krugman), I missed the Macroeconomic news and commentary from the folks on the border of FinTwitter-Bitcoin
-
Missing some of the basic functionality
- Search: Twitter search function could be better, but it usually gets me what I need. Nostr search is a terrible experience for now
- Tagging people - it's so cumbersome/impossible to do on the mobile clients I've been using. Either way, many more positives than negatives. I will keep using the combo of both for different use cases now because, in the end of the day, it's just tools.
Hope
Above all pros and cons, there's the vividly expressed hope. There's this universally shared feeling on Nostr that the platform is the new frontier for freedom and happiness, and every day there's a feeling of a Digital Woodstock lived in the 90s Eastern Europe with the vision of almost limitless possibilities. It's a new and exciting world where everyone's white-pilled about the future, and that's why I'm staying.
Tl;dr: @note1akfxxp4k203wq0wz7tpwykapyv2rs0asvd4ka2qws87jvly4v64qu4jtkv
-
-
@ c75622fd:a9b66e1d
2023-04-04 12:22:25my drawing
Zapathon 2023-03-25
community art
-
@ 9a576bd9:538775f4
2023-04-04 12:18:11Nostr
(Notes and Other Stuff Transmitted by Relays) est un nouveau protocole simple, ouvert et résistant à la censure, actuellement les developpeur-euse-s sont concentrés sur la construction d'un réseau social décentralisé basé principalement sur des clés publiques et privées.
Pour atteindre cela les clients vont se connecter à différents relais et vont y publier des messages appelés événements. Nostr utilise la notion de relai simple et client intelligent qui vont se charger de signer les événements à l'aide d'une paire de clés pour authentifier la personne.
https://nostr.how/the-protocol
Avec cette approche tout y est public, c'est-à-dire que l'on peut savoir facilement à qui vous parlez dans le cas d'une discussion privée (le contenu des messages est chiffré) ou encore à quelle fréquence vous publiez du contenu.
Le site Web nostrapps.com regroupe des ressources intéressantes et nécessaire pour commencer à interagir avec Nostr
Pour plus de détails, l'article de JohnOnChain sur Découvre Bitcoin est à lire ici: decouvrebitcoin.fr/nostr
Le mixnet
Nym est en train de construire une infrastructure pour protéger votre vie privée, c'est le premier bloc nécessaire afin d'assurer une liberté totale sur Internet.
Semblable à Tor ou i2p, le mixnet de Nym ajoute notamment 2 composantes nécessaires pour atteindre leur but et protéger complétement les utilisateur-trice-s du réseau:
- Faux trafic pour empêcher à un ISP par exemple de savoir quand une personne intéragit avec un service (site Web, porte-feuille bitcoin, …)
- Interval de temps régulier dans les informations transmises pour éviter de déduire l'application utilisée (téléphonie, navigation web, …)
C'est donc sur cette nouvelle proposition de valeur que nous avons voulu avec les membres de Pineapple Proxy expérimenter sur cette infrastructure.
Nostr sur Nym
L'utilisation du mixnet de Nym ne peut donc pas protéger les métadonnées générées lorsqu'une personne interagit avec le protocole mais peut par contre empêcher votre fournisseur d'accès Internet que vous utilisez Nostr, avec quel relai vous interagissez, combien de vous fois vous connectez ou encore les potentielles interactions que vous avez.
Un deuxième point intéressant est le fait qu'un opérateur de relai peut facilement lier votre clé publique avec votre localisation géographique en se basant sur votre IP.
Ce sont essentiellement sur ces éléments que nous avons décidé d'expérimenter Nostr-nym, une application qui permet à n'importe quel opérateur de relai de le rendre accessible sur le mixnet afin de protéger la vie privée des utilisateurs. Nous nous sommes concentrés sur une application générique afin de pouvoir supporter tous les relais (futurs et actuels).
La seule différence pour un utilisateur sera de spécifier un nym-client id (semblable à un nom de domaine) à la place d'une URL dans son client Nostr.
Une étape cruciale doit encore être développée, le fait qu'un client Nostr puisse utiliser un relai uniquement accessible via le mixnet. Pour les besoins de démonstration, un client léger en ligne de commande a pu être développé afin de pouvoir tester le concept proposé.
Donc ?
Nostr sur Nym est pour nous une solution qui permettrait à tout utilisateur-trice-s et d'avoir un droit à la vie privée et la liberté d'expression et ce sans même se poser la question grâce à ce modèle qui l'offre par défaut.
C'est aussi le moment de collaborer et d'assembler un cerveau commun pour arriver à cet objectif qu'est de voir Nostr comme protocole utilisant Nym pour transporter les informations. Cette intelligence collective a déjà donné naissance à une explication de Nostr et une démonstration de Nostr-Nym, le tout disponible ici (en anglais)
Ressources
Nostr
Clients (liste non exhaustive)
Compléments * nostr.how * nostrapps.com * github.com/nostr-protocol/ * www.nostr.net
Nym
A propos de No Trust Verify
Nous sommes membres de la #VerifyValley. Nous soutenons le réseau de Nym Technologies et y contribuons depuis le testnet. Nous sommes heureux de le renforcer avec nos mixnodes et nos gateways.
Développeur de pastenym.ch et isnymup.com
- ✅ Hébergé en Suisse
- ✅ Commission garantie : 5%
- ✅ Bande passante : 10 Gbit/s
Identity keys: * NTV1 : APxUbCmGp4K9qDzvwVADJFNu8S3JV1AJBw7q6bS5KN9E * NTV2 : 4yRfauFzZnejJhG2FACTVQ7UnYEcFUYw3HzXrmuwLMaR * NTV3 : ESPa5xnwZ7BebSX9SGmUbeYgNtkUeJo8PtbBx7JhzEHA
N'hésitez pas à nous contacter : | Site officiel | Twitter | Telegram | Linkedin | Matrix |
-
@ 166737b1:b860d91f
2023-04-04 09:51:26As I delved deeper into the Nostr network protocol, I found myself struggling to navigate the Nostr Implementation Possibilities (NIPs). Each NIP contains a wealth of information, but it's often obfuscated by noise, making it challenging to understand what each one is trying to convey.
For instance, when I tried to figure out what the
"e"
field would do, I went to read through the first document. But instead of finding a straightforward programming guide, I was confronted with blocks of text that read like a nuclear safety manual. It was a frustrating experience, to say the least, highlighted by the fact that the information I needed was buried in the last paragraph, long after its actual use within the same document.To make matters worse, I'm never sure if the NIP I'm looking at is the right one for my problem. And with so many NIPs available, it's difficult to determine which one is relevant. Moreover, searching for information in NIPs is a pain. I often wonder if all the relevant information is contained within a particular NIP or if I should be looking at other NIPs as well.
Furthermore, I find it perplexing that app layer things are being mixed into the "protocol." Why is there a NIP for browser extensions, for example? This NIP, by itself, blocks developers from creating alternative solutions since it's considered canonical. It's worth noting that there is no Ethereum Improvement Proposal (EIP) for
window.ethereum
, yet everything still works perfectly fine.The sheer number of NIPs is already mind-boggling. As of April 2023, there are at least 30 NIPs in the repository, with nondescript filenames like
01.md
only adding to the confusion. There are also 82 open pull requests (PRs), suggesting that people view NIPs more as a validation for their app ideas rather than a base protocol for notes.In conclusion, I believe that if NIPs are necessary for app layer development on the Nostr network protocol, they need to be improved significantly. They need to be clearer, more organized, and easier to navigate. Otherwise, users like me will continue to struggle with them, making it challenging to contribute to the Nostr network protocol's development. One potential solution could be to make them more like traditional programming documentation or create a ChatGPT-like search for NIP content. Since NIPs are describing JSON objects, we could document them as such, making them more accessible to developers and users alike.
-
@ 05e6367c:6ba9be85
2023-04-03 19:19:33我们今天要讨论的是,最近广受关注且具有一定创新性的新型社交媒体协议Nostr-Damus。其中包括Nostr的技术原理、待解决的关键管理问题及如何激励中继持续运转。
第五权利下的新型社交媒体设计已经探索多年,却并没有被大规模采用的迹象。在过去的一年里,随着加密技术的不断发展,以及对马斯克收购推特的担忧,去中心化社交网络迎来新的机会。
这些社交网络试图解决的问题:可能包括加强审查制度,使内容审核更加灵活,削弱大型社交媒体公司塑造和跟踪人们在网上谈论的内容的权力等。
随着新平台的出现和增长,对替代社交网络的选择往往带有政治考虑因素。
如 Getr、Parler、Gab 和 Truth Social 这样站点,都通过将自己宣传为 Twitter 的言论自由替代品来迎合右派。
我们今天要讨论的是,最近广受关注且具有一定创新性的新型社交媒体协议Nostr-Damus。其中包括Nostr的技术原理、待解决的关键管理问题及如何激励中继持续运转。
背景:Nostr
Nostr 于 2020 年启动,是一种去中心化协议,允许用户拥有自己的身份并使用公钥-私钥加密的数字签名来验证帖子。然后,这些帖子会传播到互连服务器网络。该协议并未使用区块链,因为在早期实验中发现区块链对于社交网络来说太慢。但在结构上存在相似之处,Nostr 凭借其自由主义和开源精神在加密人群中找到了早期的利基市场。
Mastodon VS Nostr
Nostr 协议和第一个中继服务器由开发人员 fiatjaf 在 2020 年底创建。在引起广泛关注之前,Nostr 只是一个安静的小众协议,致力于成为 Twitter 和 Mastodon 问题的轻量级解决方案。
Mastodon,一个成立于 2016 年的开源网络,允许任何人设置服务器。该设计通常被描述为“联合”,并且可能属于也可能不属于“Web3”的模糊界限,具体取决于如何定义。Mastodon允许用户加入具有自定义内容审核规则的策划社区。目前注册用户达到200w+,成为了自由派、记者和学者的避风港。
Twitter 和 Mastodon 系统中,身份/用户名是由运行服务器的人控制。
Nostr的核心区别在于:每个用户都使用公钥/私钥对来处理该功能,而不是使用服务器运营商所拥有的用户名,使得Nostr抗审查。这是构建整个 Nostr 协议的核心构建块之一。
“事件”:这是客户端和客户端为了发送和检索消息而连接的中继服务器使用的基本对象/数据类型。该协议的总体思路是,客户端将事件发送到中继服务器,中继服务器随后存储和索引它们,其他客户端可以与中继服务器通信以请求它们已接收和存储的事件。在最初的 NIP 01 中,定义了三种不同的事件类型:
0:发送有关用户的元数据,例如用户名、图片、简介等。
1:发送短信和基本内容
2:推荐中继服务器供关注事件创建者的人连接
所有事件都以特定定义的方式构建。包括创建者的公钥、创建时间戳、类型(或规范中的种类)、内容有效负载和事件创建者的签名。另外,还可以有引用其他事件或用户的标签,并且有一个 ID 值,该值是除创建者签名之外的所有内容的哈希值(类似于比特币交易的 TXID)。
这让用户可以通过验证签名(以及拥有该密钥的人,如果它没有被破坏的话)来保证信息确实是由其中的公钥所有者创建的,并保证信息在他们签署后没有被修改。
就像不能在比特币交易签署后改变它而不使其失效一样,用户也不能在Nostr事件的创建者签署后改变它而不使其成为明显的欺诈。
事件类型系统从最初的 NIP 得到了相当大的扩展。有一种事件类型用于加密的直接信息,通过结合发送方的私钥和接收方的公钥来建立一个共享密钥,其结果与你通过结合发送方的公钥和接收方的私钥得到的密钥相同(这就是BIP 47和沉默支付的工作方式)。也有可替换事件和短暂事件的类型。在可替换事件的情况下(很明显),它们被设计成事件的原始创建者可以签署一个新的事件来替换旧的事件。遵循该规范的中继服务器将自动从其存储中删除旧事件,并在收到后开始向客户提供较新的版本。短暂事件的设计是这样的:当发送到中继站时,它们将被广播给任何订阅其创建者的人,但中继服务器不应该存储它们。这就创造了一种可能性,即在其广播期间,只有在线的人才能看到消息。甚至还有一种事件类型,用来表示对其他人的事件的反应(如喜欢或表情符号)。
说到最后一个问题,事件也可以包含标签。目前有事件(引用一个确切的Nostr事件)、公钥(标记或引用其他用户)和主题(模仿功能,如电子邮件主题)的标签类型。所有这些都可以包括指向特定中继服务器的指针,从这些服务器上可以获取数据,这样用户就可以在不同的服务器上进行实际的互动,也就是说,一个用户在一个中继服务器上发布他们的内容,可以与另一个用户在不同的中继服务器上发布的内容进行互动和引用,这样就可以让任何用户以适当的顺序连贯地获取整个交互线程,而不需要在找出相关数据的地方进行大量的复杂操作。
在原始 NIP 中,给出了客户端如何通过订阅消息/数据结构与中继服务器交互的规范,该结构包括客户端有兴趣接收哪些事件的过滤器。这些过滤器可以根据先前的标准指定用户的公钥、确切的事件、事件类型,甚至是他们想要的特定时间范围。用户甚至可以提交公钥或事件 ID 的前缀,例如“1xjisj ...”。并从以该短字符串开头的公钥接收任何一个或多个事件(这对于从中继服务器隐藏实际想要查看的内容非常有用)。
总的来说,协议是一个非常简单的通用方案,用于在用户之间传递消息,涵盖了重要的事情,例如保证消息的完整性以及使用公钥身份发送消息的人,同时还促进了后端基础设施 中继服务器可以是高度集中的或允许用户运行他们自己的个人中继服务器,同时彼此无缝交互并且在用户被禁止使用一个中继服务器的情况下不会造成大规模混乱。他们可以转移到另一个服务器或运行自己的服务器,并且他们从之前的服务器上脱离平台并不会失去他们的数字身份或追随者,因为他们仍然保持对私钥的控制,并且用户可以在其他地方找到他们时对其进行身份验证。
中继服务器也可以随心所欲地运行:免费运营、收取小额费用来发布或下载消息,甚至还有一个 NIP 要求 hashcash 样式的工作证明来提交消息。它们可以是一个单一的中继服务器,用于托管帖子并将其仅提供给其他用户,或者一个大规模运行的服务器,例如 Twitter 或 Reddit(客户端可以根据需要显示和组织信息,这允许模拟任何社交媒体) 。所有这些都可以无缝互操作,并且不会将用户拒之门外。
Nostr 待解决的关键管理问题
用户公钥/私钥是 Nostr 作为协议工作方式不可或缺的一部分。这起到了实际用户与其他人如何识别他们之间紧密绑定的作用,以防止任何中继服务器解除这两件事的绑定,即将某人的标识符提供给另一个用户。也解决了用平台最大的问题之一:缺乏对用户自身身份的控制。
不过这也引入了新的问题:密钥可能会丢失,密钥可能会受到损害,如果发生此类事件,用户将无法寻求帮助。
这将不可避免地需要一种方案,让用户以一种可验证和可发现的方式从一个密钥对转换到另一个密钥对,并可让他们通过协议与其他用户互动。整个协议是基于证明一个事件来自一个特定的用户(身份密钥),所以一旦某人的密钥被破坏,所有这些保证都会被抛到九霄云外。
Nostr 需要一个实际的密码方案,将一个密钥的轮换与另一个密钥联系起来。开发人员 fiatjaf 提出了一项可能解决此问题的基本方案的提案。基本思想是采用从单个主种子派生的一长串地址,并创建一组“调整后的”密钥,类似于 Taproot 树如何提交给比特币密钥。Taproot 获取 Taproot 树的 Merkle 树根并将其“添加”到公钥以创建新的公钥。这可以通过将该 Merkle 树根添加到私钥来复制,以获得与新公钥匹配的私钥。Fiatjaf 的想法是将承诺从末尾向后链接到开始,这样每个经过调整的密钥实际上都会包含下一个经过调整的密钥用于创建它的证明。
所以,想象一下从密钥 Z 开始,链中的最后一个。你可以用一些东西来调整它,然后返回并使用调整后的 密钥 Z (Z' + Y = Y') 创建密钥Y 的调整版本。从这里您可以获取 Y',然后用它来调整 X (Y' + X = X')。你会一直这样做回到密钥 A,得到 A',然后从那里开始使用该密钥。当它被破坏时,用户可以广播一个包含未调整密钥 A 和调整密钥 B' 的事件。这将包含显示 B' 用于生成 A' 所需的所有数据,并且用户可以立即停止关注 A' 并转而关注 B'。他们会明确地知道 B' 是该用户的下一个密钥,并改为遵循该密钥。
不过,这个提议仍然存在一些问题。首先,必须提前生成将要使用的所有密钥,并且无法轮换到一组全新的密钥。这可以通过在这个方案中提交一个可以公证这种轮换的主密钥来解决,或者简单地从一开始就生成一组非常大的密钥。任何一条路径都是可行的,但最终需要保持根密钥或密钥材料的安全,并且只向 Nostr 客户端公开单个快捷键(Hotkeys)。
然而,该方案不会保护用户或提供在根密钥材料丢失或本身受到损害的情况下进行身份恢复的机制。
为了在这里对潜在的解决方案进行一些讨论,换一种思考,将一个密钥调整为一个主冷密钥,该主冷密钥还必须用于签署从一个密钥到另一个密钥的事件轮换。您有密钥 A',它是通过添加 A 和 M(主密钥)派生的,轮换事件将是 A、M 和 B'(通过添加 B 和 M 生成)以及 M 的签名。M 可以是 多重签名阈值密钥——三分之二、五分之三等。这可能会增加冗余以防丢失,并为密钥轮换提供安全机制。这也打开了使用服务来帮助恢复或将其中一些密钥传播给可信赖的朋友的大门。它提供了与比特币本身的多重签名相同的灵活性。
NIP26 也是一个可能对处理这个问题非常有用的提案。这指定了事件的协议扩展,允许来自一个密钥的签名授权另一个密钥代表它发布事件。然后,“令牌”或委托的签名证明将包含在第二个公钥代表第一个公钥发布的所有事件中。它甚至可以是有时间限制的,因此委托令牌会自动过期并且必须更新。
密钥管理和安全问题是一个非常大的问题,具有非常大的设计空间,充满权衡和痛点。但,Nostr如果不能为用户保护和维护这些身份的完整性,则完全基于用作身份的公钥/私钥对的协议,将不能被大规模的采用。
Nostr 面临的扩展
整个Nostr协议依赖于某个地方的人运行一个中继服务器。没有 "Nostr网络",只有中继和连接到中继的客户端。需要激励人们运行中继器,从长远来看,这最终将是中继器能扩展到什么程度的一个重要部分。除非Nostr中继可以盈利,或者至少可以带来足够的资金来支付自己的运营成本,否则永远不会有与Twitter服务器同样规模的中继。
广告
考虑到 Nostr 作为协议的工作方式,完全阻止广告将非常微不足道,使其成为不可行的解决方案。中继服务器可以尝试使用广告作为一种收入模式,这显然是几乎所有在线免费服务的主要收入模式,但问题在于用户基本上必须选择加入。中继可以很容易地将广告注入到它们发送给客户端的事件中,但如果广告事件不是由它们有意订阅的公钥创建的,客户端也可以很容易地将它们从用户界面中过滤掉。
小额支付
小额支付是另一个明显的解决方案,特别是考虑到目前正在尝试将闪电网络更紧密地集成到 Nostr 应用程序中。这种模式在如何收费方面提供了很大的灵活性。中继可以只对在那里发布事件收费,也可以对下载事件阅读收费,还可以将两者结合起来,并根据两者消耗的资源多少来调整每一种的价格。不过,这种模式能否扩大到像Twitter那样的规模表示怀疑。
内容小额支付在许多基于闪电网络的利基产品中显示出自己的可行性,但真正扩展到全球规模存在两个基本问题。
首先,目前还没有足够的比特币采用。即使每个人都神奇地接受为 Nostr 上的每一次小服务交互付费,也没有足够多的人持有比特币来支持像 Twitter 这样大规模的比特币。中继可以通过法币收取订阅费用,但这些支付方式不会支持为每个发布或下载的事件支付一小部分费用。其次,人们实际上已经习惯了这种免费服务。这正是人们所期望的。我并不认为靠小额支付就能真正支持大规模的中继。
有一种方法可以使小额支付 "更有粘性 "或更有可持续性,而不需要把它们强加给使用中继的每一类用户。关于在Nostr之上建立各种应用的讨论已经很多了,除了Twitter的克隆。GitHub、维基百科,甚至是Uber。
最后一个是关键:经济期望。人们非常习惯于在某处发布招聘广告时支付费用,或在网上订购东西时向市场运营商支付一定的费用,但不会为认为应该免费的商品提供服务—谷歌、推特。这可以为中继站提供一种方法,从他们的用户那里创造一个可靠的收入支柱,而不产生大量的摩擦或打破一般潜在用户的期望。
如果小额支付也将成为一个因素,那么中继运营商将不得不运行一个闪电节点,以便首先从用户那里接收资金。如果与中继实施的任何小额支付模型适当协同,这可能会增加收入。中继服务器的收入越大,它在闪电网络上需要的流动性就越大,以促进这一点。如果运营商正确地规划他们如何在网络中部署或分配流动性,那么除了通过中继接受或传输数据收取的任何费用外,仅运行路由节点的行为本身就可能成为一个不小的收入来源。
结论
Web3 社交项目,除了以上提到的Nostr和Mastodon之外,还包括 Farcaster 和 Lens 等项目,它们并不会快速取代现有的社交媒体平台。据统计,Twitter 有数亿活跃用户,Facebook 有数十亿,但 Mastodon 只有 250 万用户, Nostr 仅大约 22w 个唯一用户身份。许多Web3的社交项目都面临着可用性障碍,这些障碍会减慢大规模采用速度。
媒体与政治必不可分。随着 Web3 社交项目的激增和公共对话在不同应用程序和协议之间的分裂,可能会产生政治结果。即使,墨西拿长期以来提倡去中心化社交媒体,但仍担心去中心化会进一步加剧近年来以相互敌对和误解为标志的公共话语。
-
@ ce35f2f8:22931a55
2023-04-03 18:59:03Linux is often overlooked as a gaming platform, but it has come a long way in recent years. While Windows still dominates the gaming industry, Linux is becoming an increasingly popular choice among gamers. In this article, we’ll explore why Linux is a great choice for gaming.
Firstly, Linux is open-source, meaning that it is free to use and distribute. This means that gamers can save money on operating system licenses and hardware upgrades, which can be a significant expense for gamers. Linux also allows gamers to customize their gaming experience, which can enhance gameplay and performance.
Secondly, Linux is lightweight and customizable, which makes it ideal for gaming. Linux-based operating systems are designed to be efficient, which means they use fewer system resources than other operating systems. This means that games can run more smoothly on Linux, even on lower-end hardware. Additionally, Linux users have access to a vast array of customization options, including desktop environments, window managers, and other tools, which can improve their gaming experience.
Thirdly, Linux has a strong community of developers who are dedicated to creating games and software for the platform. This means that Linux users have access to a growing library of games, which includes both open-source and commercial titles. Popular games like Dota 2, Counter-Strike: Global Offensive, and Rocket League all have native Linux versions, and more and more games are being ported to Linux every year.
Fourthly, Linux is a highly secure operating system. This means that gamers can enjoy a safe and secure gaming experience without worrying about malware or viruses. Linux users are less likely to be targeted by cyber attacks than Windows users, which can provide peace of mind when gaming online.
Finally, Linux offers a range of compatibility options that make it easy for gamers to run Windows games on Linux. One of the most popular compatibility tools for Linux is Wine, which allows gamers to run Windows software and games on Linux without the need for a virtual machine or dual boot. While not all games are compatible with Wine, many popular titles, including League of Legends and World of Warcraft, can be run on Linux using this tool.
In conclusion, Linux is an excellent choice for gamers who are looking for an efficient, customizable, and secure gaming platform. With a growing library of games and software, a dedicated community of developers, and a range of compatibility options, Linux is quickly becoming a serious contender in the gaming world. If you’re a gamer who is looking for a new platform to play on, Linux is definitely worth considering.
-
@ 42f9711f:8239fb2a
2023-04-03 16:59:49Nous avons tendance à faire une nette distinction entre les entreprises purement spéculatives et les investissements véritablement sûrs. Cette distinction n'est qu'une question de degré. Un investissement non-spéculatif, ça n'existe pas. Dans une économie changeante, toute action implique une notion de spéculation. Les investissement peuvent être bons ou mauvais, mais ils sont toujours spéculatifs. Un changement radical de conditions peut par ailleurs rendre mauvais des investissements communément considérés comme étant parfaitement sûrs.
— Ludwig von Mises, L’Action humaine, traité d’économie
Il est courant que des critiques s'interrogent sur la rationalité économique des bitcoiners qui épargnent en bitcoin en affirmant que bitcoin n'est rien d'autre qu'un "actif spéculatif". Cela insinue que bitcoin ne vaut rien et ne dérive sa valeur qu'à travers une série d'arnaques ou de jeux de dupes. Alors que cette attitude arrogante permet aux critiques de se sentir supérieurs et de rejeter bitcoin comme étant une technologie et un actif ne méritant pas leur dignité, un tel language les trahit car leur médisance ne fait que révéler leur incompréhension d'une pensée économique fondamentale. La simple réalité est que toute action et tout actif sont de nature spéculative. La question à se poser n'est donc pas de savoir s'il faut spéculer sur bitcoin mais de réfléchir aux façons de spéculer sur bitcoin.
Action, incertitude et risque
Si l'avenir était parfaitement prévisible, il n'y aurait pas besoin de prendre des décisions économiques. Une décision n'aurait donc aucune capacité à influencer l'avenir, car l'avenir serait déjà prédeterminé. Le fait que les hommes agissent dans le but d'affecter les conditions futures à leur profit suggère que l'avenir est fondamentalement et inévitablement incertain.
L'incertitude existe pour deux raisons. Premièrement, nous n'avons pas assez de connaissances sur les phénomènes naturels de sorte à ce que nous puissions prévoir tout condition naturelle future, et il est probable que nous le puissions jamais. Deuxièmement, les préférences humaines sont sans cesse fluides. Les individus changent la façon dont ils prisent des marchandises d'un moment à l'autre. L'apparition de nouvelles connaissances et expériences influence leur façon de penser aux meilleurs moyens à employer pour atteindre des objectifs données, ou même leur désir d'atteindre certains objectifs.
Comprendre l'incertitude nécessite de la différencier du risque. Dans son ouvrage L’Action humaine, Ludwig von Mises le fait en énumérant différents types de probabilité auxquels les individus font face. Nous n'avons jamais assez de connaissances à notre disposition pour formuler des hypotèses précises sur l'avenir, mais il n'y a pas de moments où nous ne disposons d'aucune connaissance non plus. Ces deux types de probabilité, qu'il nomme probabilité de classe et probabilité de cas, traitent des types de connaissances qui nous font défaut.
Mises définit la probabilité de classe comme suit :
La probabilité de classe signifie : Nous savons ou présupposons savoir, en ce qui concerne un problème donné, tout ce qu'il y a savoir sur le comportement d'une classe d'événements ou de phénomènes ; mais nous ne savons rien d'un événement ou d'un phénomène spécifique, hormis le fait qu'ils appartiennent à cette classe.
Lorsqu'un dé est jeté, nous savons qu'il y a une chance sur six qu'un nombre particulier apparaisse, mais nous savons pas quel nombre exact apparaitra. De la même manière, il est possible de déduire la probabilité d'une maladie à affecter une population, mais il est impossible de savoir à l'avance quelle population sera affectée. Lorsque nous avons à notre disposition assez de connaissances et de certitude pour faire face à une telle classe d'événements, nous avons affaire à un risque. La probabilité de résultats est objective, calculable et prévisible. Nous pouvons nous assurer contre de telles probabilités.
En revanche, ce degré de certitude n'existe pas pour tout événement, il s'agit alors d'une probabilité de cas et d'incertitude.
La probabilité de cas signifie : Nous savons, en ce qui concerne un problème donné, certains des facteurs déterminant le résultat, mais il existe d'autres facteurs déterminants dont nous ne savons rien.
L'action humaine se fonde sur une valeur subjective et qualitative, plutôt que sur des données quantitatives mesurables. Il est donc impossible de calculer différentes probabilités de résultats économiques. Il est possible d'utiliser des facteurs, tels que les préférences passées, pour parvenir à juger les résultats d'une action, mais nous ne pouvons pas utiliser ceux-ci pour déterminer la fréquence de résultats précis. Mises prend l'exemple d'un match de football. Les victoires passées d'une équipe peut nous amener à penser qu'elle continuera à gagner, mais cela ne garantit aucunement la défaite de l'équipe adverse. Si ce fut le cas, le match serait ennuyeux et sans intérêt.
En résumé, le risque se résume à des événements dont la fréquence est calculable et contre lesquels nous pouvons nous assurer. Cependant, la plupart des incertitudes auxquelles sont confrontés les hommes se résume à des événements uniques liés à des circonstances individuelles, et contre lesquels nous ne pouvons donc pas nous assurer. Nous devons utiliser d'autres moyens pour faire face à l'incertitude.
Le pari, l'ingénierie et la spéculation
Mises identifie trois méthodes utilisées pour faire face à l'incertitude : le pari, l'ingénierie et la spéculation.
Le pari est utilisé pour faire face à la probabilité de classe et au risque, et ce en pariant sur des cas individuels.
Le parieur ne sait rien de l'événement duquel le résultat de son pari dépend. Tout ce qu'il sait, c'est la fréquence à laquelle un résultat favorable peut se produire lors d'une telle série d'événements, connaissance en fin de compte inutile pour son projet. Sa seule intention est de s'en remettre au hasard.
Le parieur sait que le résultat d'un jet de dé n'a qu'une chance sur six de se produire, mais il parie que le prochain sera le bon. Du point de vue de l'assuré, s'assurer contre ce risque est un pari, car même s'il paie une prime qui reflète la fréquence qu'un mauvais résultat puisse se produire, celui-ci peut aussi ne jamais se produire, et la prime aura donc été payée pour rien. Chaque jour, des gens prennent le pari qu'ils ne se feront pas percuter par une voiture ou qu'ils ne se feront pas frapper par la foudre. Dans un sens, il est impossible de vivre sa vie sans un élément de hasard (à moins de s'appeler Phil Ivey).
D'autre part, si un individu a les connaissances techniques suffisantes pour faire face aux phénomènes naturels avec confiance, il peut affronter l'avenir via l'ingénierie.
L'ingénieur, en revanche, sait tout ce dont il a besoin pour résoudre un problème de manière satisfaisante par le biais technologique, comme la construction d'une machine. À partir du moment où il est capable d'exercer un contrôle sur des éléments incertains du problème, il tente de les éliminer via des dispositifs de sécurité. L'ingénieur n'a conscience que des problèmes qui peuvent être résolus et des problèmes qui ne peuvent l'être dans l'état actuel des connaissances. Il lui arrive parfois de découvrir lors d'événements indésirables que ses connaissances n'étaient pas aussi vastes qu'il ne le présupposait initialement et qu'il n'a pas réussi à reconnaitre l'indétermination de certains des problèmes qu'il pensait pouvoir contrôler. Il tente alors d'y remédier en améliorant ses connaissances. Évidemment, il ne sera jamais capable d'éliminer complètement l'élément de hasard omniprésent dans la vie humaine. Mais son principe, c'est de fonctionner dans une orbite de certitude. Il vise à être en contrôle total des éléments de son action.
Un cycliste ne sait jamais quand il prendra une gamelle, mais s'il porte un casque conçu par un ingénieur compétent, l'incertitude que son tour à vélo se termine avec une fracture de la tête est réduite de manière significative, lui donnant ainsi plus de certitudes sur sa capacité à arriver à destination en un seul morceau.
En revanche, lorsqu'il s'agit d'évaluer des biens ou marchandises, les hommes n'ont pas d'autres choix que de spéculer :
Dans le monde réel, l'homme qui agit est confronté au fait que d'autres hommes agissent par eux-même, tout comme lui. La nécessité d'ajuster ses actions à celles des autres font de lui un spéculateur pour qui le succès et l'échec dépend de sa capacité relative à comprendre l'avenir. Chaque investissement est une forme de spéculation. Il n’y a dans le cours des événements humains aucune stabilité et donc aucune sécurité.
Les préférences peuvent changer pour une raison quelconque, voire aucune. Un bien qui a de la valeur aujourd'hui n'en aura pas forcément demain, et vice-versa. Les individus traitent ce problème par la spéculation. Ils achètent ou vendent des biens aujourd'hui en fonction des conditions qu'ils prévoient pour le lendemain. Cela étant dit, ces décisions ne sont pas prises dans le vide. Les individus utilisent leurs connaissances sur l'état du marché actuel, ainsi que sur leurs préférences, croyances, actions passées, et autres, pour faire des hypotèses sur l'avenir. Ils organisent leur production en fonction de ces spéculations afin d'arriver au futur qu'ils envisagent et pour en émaner un profit. Cependant, ils en tirent un profit uniquement dans le cas où leur jugement sur les désirs futurs des gens s'avère être correct. Puisque l'avenir est incertain, ils peuvent aussi se tromper en produisant des biens d'une valeur moindre à celle attendue par autrui et finir avec des pertes. Les entrepreneurs ayant le plus de succès sont ceux qui sont le plus adeptes à anticiper la façon dont les gens agiront à l'avenir, tandis que ceux qui en sont incapables prennent le risque de perdre de l'argent et peuvent finir par faire faillite.
Les gains et pertes de chaque acteur commercial, à leur tour, servent d'occasions d'apprentissage pour tous les acteurs du marché en leur signalant comment ajuster leur jugement et l'organisation de leur production afin de mieux anticiper l'avenir et offrir aux individus les marchandises dont ils ont besoin. L'incertitude et la spéculation sont alors au coeur du processus de marché. Il incombe à tout acteur commercial de savoir comment répondre aux signaux du marché, générés par la révélation des préférences et actions individuelles, s'ils souhaitent faire des spéculations rentables et entreprises productives contribuant à un meilleur avenir pour eux-même, comme pour autrui.
Tous les actifs sont spéculatifs
L'avenir est toujours incertain, car il n'y a pas de constance dans l'action humaine. La spéculation est inévitable. Toute action vise à améliorer des conditions futures, mais nous ne pouvons que spéculer sur l'avenir qui nous attend. Les préférences changent, y compris les nôtres. Ce que nous désirons aujourd'hui ou ce que nous pensons que nous désirerons demain, nous n'en voudrons peut être pas lorsque demain arrive.
Cela signifie, strictement parlant, que chaque bien que l'on achète ou que l'on vend est un "actif spéculatif." Bitcoin est de toute évidence un "actif spéculatif", tout comme les crayons, les voitures, et les glaces. Alors que vous achetez une glace à la vanille aujourd'hui, il est possible que plus tard vous en vouliez une au chocolat, ou un même un dessert complètement différent. Vous n'auriez pas pu le savoir à l'avance. Vous pouvez seulement exercer un jugement en vous basant sur le fait que vous désirez habituellement une glace à la vanille.
De plus, si vous spéculer sur un actif (ce que vous faites constamment), vous spéculez également sur tous les autres actifs, car l'achat ou la vente d'un bien nécessite de renoncer à l'achat ou la vente d'un autre bien.
Ceux qui dénigrent les "actifs spéculatifs" ont souvent recours au terme péjoratif de "pari". Rhétoriquement parlant, ce n'est pas une comparaison injuste, mais praxéologiquement parlant, c'est imprécis. Bien qu'un individu puisse spéculer sur un actif après une profonde réflexion (comme un bitcoiner) et qu'un autre le fasse après avoir reçu un "bon tuyau" (comme le téléspectateur moyen de CNBC), tous deux utilisent la connaissance de facteurs d'entrée qui peuvent influer sur le résultat de l'événement.
Gérer des actifs spéculatifs, ce n'est pas faire un pari. Comme indiqué ci-dessus, le pari traite de la probabilité de classe, tandis que la spéculation traite de la probabilité de cas. Lorsqu'un individu prend un pari, il sait tout de la fréquence des événements, mais ces connaissances n'ont aucun impact sur le résultat d'un événement particulier. Lorsque nous spéculons, bien que nous ne connaissions pas tous les facteurs pouvant influer sur le résultat d'un événement, nous en connaissons quelques uns. Vous ne savez peut-être pas si vous choisirez une glace à la vanille, mais vous savez bien ce que vous avez tendance à choisir.
Incertitude et argent
Comme mentionné précédemment, un acteur qui souhaite échapper au risque peut se procurer une assurance pour faire face aux imprévus. Cependant, comme l'incertitude n'est pas prévisible, il n'y a pas d'assurance contre celle-ci. Au lieu de cela, les acteurs se tournent vers un bien spécifique, le bien le plus commercialisable : l'argent.
Dans un article intitulé "‘The Yield From Money Held’ Reconsidered", Hans-Hermann Hoppe écrit :
Face à ce défi des aléas imprévisibles, l'homme en vient à priser des biens en raison de leur degré de commercialisation (plutôt que pour leur valeur d'usage en tant que consommateur ou producteur de biens) et envisage de commercer lorsqu'un bien à acquérir est plus commercialisable que celui à céder, de sorte que sa possession faciliterait l'acquisition future d'autres biens et services directement ou indirectement utiles. C'est-à-dire qu'une demande d'instruments d'échange pourrait émerger, soit, en d'autres termes, une demande de biens prisées en raison de leur qualité marchande ou potentiel de revente.
Il continue :
Parce que l'argent peut être utilisé pour satisfaire instantanément un large éventail de besoins, il offre à son propriétaire la meilleure protection humainement possible contre l'incertitude. En détenant de l'argent, son propriétaire a la satisfaction de pouvoir répondre à un grand nombre d'aléas futurs au fur et à mesure qu'ils surviennent de manière inattendue. Investir dans un solde de trésorerie, c'est investir contre l'aversion (ressentie subjectivement) à l'incertitude. Un solde de trésorerie plus élevé diminue davantage l’aversion à l’incertitude.
Il faut cependant noter que cela n'immunise pas l'argent en lui-même contre l'incertitude et la spéculation. Quiconque obtient de l'argent spécule sur le fait que cette acquisition aura plus de valeur à l'avenir que n'importe quel investissement présent et que le pouvoir d'achat qui en découle sera satisfaisant. Bitcoin est peut-être un actif spéculatif, mais le dollar américain l'est aussi.
Conclusion
Étant donné que tous les actifs sont spéculatifs, y compris l'argent, il nous incombe d'examiner l'activité spéculative en fonctions des connaissances et des jugements employés dans le processus de spéculation, plutôt que de se fermer l'esprit en ayant recours à de la gymnastique linguistique.
Dans le cas de l'argent, il est possible d'évaluer à quel point les caractéristiques d'un bien lui permettent de faire face à différents types d'incertitude, que ce soit par le biais de ses propriétés naturelles ou par le biais de l'ingénierie humaine, de sorte qu'il ait une valeur marchande supérieure à tous les autres biens. Cela ne garantit pas l'adoption de ce bien monétaire, mais cela nous permet de comprendre les raisons de son adoption et d'emettre un jugement sur l'évolution future de son adoption.
Si vous avez apprécié cet article, vous pouvez soutenir Michael Goldstein en devenant un abonné payant de son Substack ou en lui faisant une donation en sats (https://rb.gy/onn4uc)
Article original : https://bitstein.substack.com/p/everyones-a-speculator
Auteur : Michael Goldstein (@bitstein)
Date de parution : 23 janvier 2023
-
@ 42f9711f:8239fb2a
2023-04-03 16:47:47Tribune de Jimmy Song, développeur Bitcoin, éducateur, entrepreneur et programmeur fort de 20 ans d'expérience.
Nous avons besoin du travail et le travail a besoin de nous.
Le travail est ce qui permet de transformer un monde rude, brutal et difficile en quelque chose de vivable, plaisant et même profond. C'est par le travail que l'on contribue au développement de notre civilisation, de nos communautés et, bien sûr, de nos familles. Le travail dans un marché normal et fonctionnel génère de la valeur.
Le travail, au sens véritable, représente notre contribution à la civilisation. Le résultat de notre travail est l'empreinte que nous laissons derrière nous. Le travail collectif est ce qui nous permet de construire tout ce qui nous entoure, des édifices dans lesquels nous vivons aux routes sur lesquelles nous nous déplaçons, en passant par les ordinateurs sur lesquels nous tapons, l'électricité que nous utilisons et pratiquement tout le reste.
Néanmoins, cette équation basique — travail productif contre compensation monétaire — ne semble pas fonctionner très bien. On peut en attester au travers des licenciements de masse qui ont actuellement lieu dans tous les secteurs économiques, notamment dans la technologie. Que se passe-t-il exactement ? Comment se fait-il que des dizaines de milliers de personnes se voient perdre leur emploi dans différentes entreprises sans que cela ne semble affecter le fonctionnement des choses ? Que faisaient-ils tous ? Des vidéos stupides sur TikTok ?
Dans cet article, je répondrai à ces questions et imputerai la faute à qui de droit. Comme d'habitude, le coupable est l'argent fiduciaire.
Le travail conduit à la spécialisation
Les marchés fonctionnent car les individus sont prêts à payer pour les biens et services qu'ils convoitent. Quelqu'un paie car le coût — qu'il soit mesuré en prix, qualité, facilité d'obtention ou autre — lui serait plus élevé. La monnaie, c'est-à-dire le moyen d'échange que nous employons au quotidien, nous permet de nous spécialiser et de faire usage de nos meilleures compétences.
Un pêcheur sait comment attraper de larges quantités de poissons, bien plus qu'il ne peut en consommer. Un cordonnier sait comment fabriquer des chaussures, bien plus qu'il n'a besoin d'en porter. Via le commerce, ils ont alors la possibilité d'aiguiser leurs propres compétences pour acquérir les biens qu'ils désirent et dont ils ont besoin. C'est la raison pour laquelle les pêcheurs ne fabriquent pas leurs propres chaussures et les cordonniers ne pêchent pas de poissons.
La civilisation prend forme grâce à cette spécialisation du travail. Dans ce sens, chacun optimise la valeur qu'il génère par unité de temps travaillée tout en minimisant la pénibilité de la tâche. Plus directement, on essaie de faire le plus d'argent possible en faisant ce qui nous déplait le moins.
Ce dernier point est important car il existe des métiers bien rémunérées que les gens ne désirent pas exercer, comme éboueur ou camionneur, et qui bénéficient de taux horaires supérieurs à d'autres activités mais qui sont d'une pénibilité qui en décourage plus d'un. La rémunération du travail augmente en accord avec le degré de pénibilité. De la même manière, les compétences rares sont mieux rémunérées car peu de personnes peuvent exercer les métiers qui les nécessitent. Le travail est comme toute autre marchandise sur le marché, c'est l'utilité de la production qui en découle et sa rareté relative qui déterminent le prix. Les individus qui gagnent le plus d'argent sont ceux qui, en toute logique, font le travail le plus difficile et/ou le moins désirable.
Clairement, quelque chose ne va pas car beaucoup d'emplois bien rémunérés ne sont pas difficiles (travail administratif, groupes de réflexion, etc.) et très convoités (membres de conseil d'administration, banquiers d'investissement, capital-risqueurs). Il y a donc quelque chose dans notre système économique qui ne récompense pas les bons choix.
La monnaie fiduciaire favorise le travail inutile
La monnaie fiduciaire met des bâtons dans les roues d'un marché qui tourne efficacement en introduisant un nouvel acheteur. En fabriquant de la nouvelle monnaie de toute pièce, l'argent fiduciaire permet aux gouvernements de créer des emplois ne générant aucune valeur. C'est ce que l'on appelle des emplois de recherche de rente.
Dans une économie de marché normale, la monnaie sert à compenser toute valeur créée. L'inefficacité y est punie par une baisse, voire une perte de profit. Par conséquent, le travail doit générer de la valeur. Mais dans une économie de monnaie fiduciaire, il existe un nouvel acheteur qui n'est pas sensible aux prix du marché : l'imprimeur d'argent. Généralement, les personnes au pouvoir consomment des biens ostentatoires, achètent du prestige, créent des emplois précaires, distribuent des pots-de-vin à leurs fidèles, etc. Ils génèrent encore moins de valeur que Roger Ver.
Pour les responsables de la planche à billet, le travail ne sert plus à créer de la valeur mais à satisfaire leurs désirs, souvent pour maintenir leur position de pouvoir. En démocracie, les responsables de la planche à billet ont tendance à dépenser dans la création d'emplois aussi inutiles que de creuser des trous pour le simple fait de creuser des trous. En dictature militaire, ces mêmes responsables ont tendance à acheter des votes, des armes et à financer des programmes sociaux. Les emplois sous de tels régimes ne sont souvent qu'une façade servant à occulter le népotisme et la distribution de pots-de-vin. L'argent y est imprimé et utilisé pour maintenir le pouvoir sans créer de valeur pour quiconque.
Dans une économie fiduciaire, lorsque les imprimeurs d'argent deviennent des clients majeurs dans la plupart des secteurs, presque tous les emplois ont vocation à soutirer de la rente. Le travail créant de la valeur se confond avec celui qui n'en crée aucune. Dans la durée, il devient alors difficile de discerner ce qui produit de la valeur de ce qui n'en produit pas, et de discerner ce qui est bénéfique pour la civilisation de ce qui ne l'est pas. La recherche de rente à tout prix se propage telle de la moisissure sur un vieux sandwich.
Par exemple, de nombreuses entreprises ont des départements de ressources humaines spécialisées uniquement dans le respect des questions de conformité professionnelle. Comme dans tout système bureaucratique typique, chaque employé est dans l'obligation d'assister à des formations embarrassantes sur le harcèlement sexuel, les discriminations raciales, les questions acceptables pour les entretiens d'embauche, etc. La plupart n'ont presque aucun lien avec l'industrie dont les employés font partie, mais chaque nouvelle recrue est forcée de perdre son temps précieux sur ce type d'activités. Ces exigences en matière de conformité n'ont pas nécessairement d'implication monétaire, mais elles font perdre beaucoup de temps. De ce fait, le temps de travail est partagé entre tâches productives et improductives. Au cours des 50 dernières années, les tâches improductives ont pris tant d'ampleur que des professions entières n'ont aucune utilité véritable, même dans des sociétés très rentables.
Est-il alors étonnant que des sociétés comme Twitter, Google, Facebook, Microsoft et autres entreprises rentables puissent licencier autant d'employés sans que cela n'affecte leurs opérations ? Les licenciements sont équivalents à de la chimiothérapie ; cela nuit probablement aux sociétés qui en font usage, mais permet aussi de se débarasser d'un cancer sous-jacent.
Friction fiduciaire
La quête permanente de rente ralentit l'économie, de la même manière qu'une crevaison ralentit un véhicule. L'enchevêtrement omniprésent de la monnaie fiduciaire et du monde politique est un des nombreux facteurs contribuant au ralentissement de la productivité, créant un manque à gagner. Le travail que les gens s'efforcent de faire ne consiste pas à créer de la valeur mais à agir comme intermédiaires de transactions de valeur. Ils crèvent des pneus et causent des désagréments majeurs dans l'objectif de vendre plus de pneus.
Par conséquence, il est difficile de générer de la valeur dans une économie fiduciaire, même si la volonté est là. Cette recherche de rente cause de nombreuses fictions qui sont difficiles à surmonter et qui empêche les individus de créer de la valeur. Est-il facile de lancer une entreprise dans la plupart du monde ? Est-il facile d'ouvrir un compte en banque, d'obtenir les permis nécessaires et de se conformer aux règles qui enrichissent les rentiers ? Il ne s'agit pas seulement d'impôts sur l'entreprenariat mais d'impôts sur la civilisation en soi.
Pourquoi est-il alors si difficile d'éliminer cette pratique ? Le problème est que la quête de rente est attractive pour la majorité des gens. La volatilité est bien moindre que celle du marché et les revenus sont en quelque sorte garantis par le gouvernement. Il n'y a pas besoin faire face à des clients difficiles, aux conditions changeantes du marché ou à des concurrents ambitieux. La plupart des gens choisirait volontier de gagner moins d'argent en échange d'une certitude de long terme. En conséquence, même les individus qui génèrent de la valeur ont tendance à rapidement adopter une mentalité de rentier.
La descente vers une mentalité de rentier
Tous les rentiers ne commencent pas de la sorte. Beaucoup adoptent cette mentalité petit à petit sans même s'en rendre compte. On peut remarquer ce phénomène dans certaines des sociétés de technologie à très grand succès au cours des 20 dernières années. Amazon, Facebook et Google étaient de très bons services. Évidemment, une des raisons pour laquelle ces sociétés étaient perçues comme telles est parce qu'elles vendaient leurs biens et services à perte. Dans le cas d'Amazon, l'entreprise perdait de l'argent sur beaucoup de ventes à ses débuts. Facebook et Google offraient leurs services gratuitement. D'ailleurs, cela était possible uniquement en raison des larges sommes d'argent mises à disposition pour les investissements, ce qui est un des effets pervers d'une monnaie fiduciaire inflationniste. Les services fournis étaient donc très bon marché pour les clients.
Mais cela faisait partie de leur stratégie de long terme. Tel un traffiquant de drogue fournissant un premier échantillon gratuit, les utilisateurs sont vite devenus accros. Puis ils ont commencé à vendre des publicités afin de "monétiser" leur public. Monétiser est en fait un euphémisme qui signifie devenir un intermédiaire d'échange pour les utilisateurs. Par conséquent, Amazon, Google et Facebook sont vite devenus des intermédiaires d'échange pour des partis tiers, soit par le biais de publicités ou en devenant des plaformes monopolistiques.
Une fois les utilisateurs séduits, ces entreprises ont également fait en sorte de rendre attractifs les termes pour les vendeurs. La génération de prospects sur Facebook et Google coûtait alors beaucoup moins cher par rapport à ce qui existait auparavant. En peu de temps, les vendeurs étaient devenus accros à ces plateformes et se faisaient exploiter dans un but de monétisation. La disponibilité de l'espace publicitaire était manipulée et les frais d'annonce ne cessaient d'augmenter. Ces plateformes utilisaient de l'argent fiduciaire pour agir comme intermédiaires sur un marché qu'elles controllaient entièrement. À chaque étape, elles s'inséraient dans le processus de création de valeur afin d'en tirer du profit. En d'autres termes, elles sont devenues rentières.
Le pire, c'est que tout était planifié depuis le début. C'est le plan de presque toutes les start-ups depuis des années : attirer un maximum d'utilisateurs et de vendeurs et devenir l'intermédiaire de leurs échanges. Tout financier de capital-risque estime qu'un résultat souhaitable est d'arriver à capturer le maximum de valeur et être capable de défendre ce monopole. Il s'agit de la voie de la profitabilité que toute start-up financée par du capital-risque vise à empreinter, c'est pourquoi le concept de croissance est tant primordial.
Il ne s'agit pas d'un cas isolé depuis 1971. À partir du moment où Richard Nixon a mis fin à l'étalon or, toutes les devises indexées sur le dollar américain sont instantanément devenues des monnaies fiduciaires et les incitations commerciales ont alors changé. La quête de rente est devenue beaucoup plus rentable et— sans surprise — les rentiers ont donc beaucoup augmenté en nombre. Il n'y a dorénavant plus qu'une poignée d'entreprises qui créent énormément de valeur. De nombreuses grandes entreprises dépendent de subventions gouvernementales, de prêts bancaires ou d'une combinaison des deux. De nombreuses entreprises technologiques n'existent que par le biais des financements des capital-risqueurs, c'est-à-dire de prêts bancaires, dans le but de soutirer de la rente. La "fiduciarisation" de l'économie est omniprésente et n'a cessé de croître depuis 50 ans, contaminant même les entreprises les plus productives.
La glorification de la recherche de rente
Pourquoi y a-t-il autant de personnes fraîchement diplomées d'écoles de commerce qui cherchent dorénavant à devenir gestionnaires de fortune ? Car elles imitent les Warren Buffet du monde, une personne qui n'a jamais créé de valeur de toute sa vie et qui n'a fait qu'une chose : gérer l'argent des autres. Il s'agit là du rentier ultime et cela l'a rendu fabuleusement riche. En raison de la suprémacie de l'argent, la quête de rente est devenue une activité prestigieuse. Les héros de cette génération sont des gens comme Warren Buffet et non comme Thomas Edison ou Nikola Tesla, lesquels étaient véritablement productifs.
Heureusement que Bitcoin commence à exposer les rentiers pour ce qu'ils sont vraiment. Les altcoiners s'inscrivent dans la même lignée et ne créent aucune valeur, c'est la raison pour laquelle les Bitcoiners les condamnent si fermement à juste titre. Il n'est pas difficile de détecter ces arnaques qui promettent de l'argent facile en corrompant les individus pour faire la promotion d'altcoins. L'attraction majeure des altcoins est qu'elles permettent à quiconque de devenir rentier en contournant la case école de commerce de renom, sans avoir de réseau politique ni l'approbation des médias. C'est donc de la recherche de rente pour tous, ce qui signifie que personne ne travaille vraiment.
Dans un sens, les altcoins ne sont que l'évolution naturelle de la quête de rente dans un monde dominé par la monnaie fiduciaire. Elles sont complètement improductives et ne disposent d'aucune qualité véritable. La promesse qui en découle est qu'il est possible de faire de l'argent en ne créant aucune valeur. C'est cela qui les rend attractives, mais c'est aussi cela qui est troublant. La plupart des gens peuvent ressentir que rien ne va lorsque des personnes gagnent de l'argent à ne rien faire. Quelque chose ne tourne pas rond et même un enfant de cinq ans est capable de le ressentir. La valeur doit provenir de quelque part et c'est pourquoi il y a toujours une certaine appréhension chez la plupart des altcoiners. Même en période de marché haussier, ils savent que dans une certaine mesure ils jouent avec l'argent du casino qu'ils n'ont pas gagné. En conséquence, de nombreux altcoiners perdent tout leur argent comme des gagnants du loto car ils savent qu'au fond d'eux-même ils ne produisent aucune valeur.
En effet, la valeur extraite de cette activité rentière provient du capital que la civilisation a accumulé sur plusieurs générations. En Occident, la culture de la confiance commence à se désintégrer. La confiance est un bien capital qui prend longtemps à se former. La confiance est la raison pour laquelle on a pu observer un miracle économique au Japon et en Allemagne dans la période d'après-guerre et pas un seul dans le bloc de l'Union soviétique. Abuser de la confiance à des fins de gains monétaires diminue la confiance commune. Ces escroqueries rentières détruisent les semences de la productivité.
La création de valeur
Heureusement que Bitcoin ne permet pas de devenir rentier car il n'existe aucune autorité centrale capable de manipuler le système. Bitcoin accumule du capital car le protocole récompense ceux qui génèrent de la valeur. Le maximalisme toxique dont tout le monde se plaint n'est qu'une réaction contre la mentalité de rentier. Les capital-risqueurs sont des spécialistes de l'extraction de valeur, tout comme les influenceurs. Ce sont des gens qui, lorsqu'ils essaient de soutirer de la valeur aux Bitcoiners, se brûlent à la tâche.
Les entreprises tournant autour de Bitcoin sont plus difficiles à créer car il n'y a pas de place pour la recherche de rente. L'Ethereum Fondation ne vous accordera pas de subventions et les capital-risqueurs de la "crypto" ne vous financeront pas si vous n'avez pas de nouveaux tokens à leur faire promouvoir. C'est cela qui fait la force de ces entreprises et qui les rendent plus intègres, et c'est pourquoi les Bitcoiners sont plus susceptibles de les soutenir. La valeur ajoutée qu'elles apportent est évidente car elles ne dépendent pas de subventionnement en altcoin ou en monnaie fiduciaire.
Bitcoin accumule du capital en favorisant la création de valeur. Et le travail, ça nécessite de faire des efforts, mais ce pas une escroquerie. En d'autres termes, au lieu de devenir des escrocs de la rente, nous pouvons faire en sorte que le travail redevienne honnête.
Rejetez la mentalité de rentier. Soyez productifs.
Article original : https://bitcoinmagazine.com/culture/bitcoin-kills-rent-seeking
Auteur : Jimmy Song (@jimmysong)
Date de parution : 31 janvier 2023
-
@ 42f9711f:8239fb2a
2023-04-03 16:41:37Le fardeau économique de l'inflation continue de ravager les économies du monde entier. Des États-Unis au Royaume-Uni, en passant par la zone Euro, les gens se rendent compte que l'argent dans leur portefeuille et sur leur compte bancaire ne leur permet pas d'acheter autant que les mois précédents. Comme pour tout problème, tout le monde est à la recherche de trois choses : des stratégies, des solutions et des boucs émissaires.
Un des boucs émissaires sur lequel la faute est régulièrement rejetée est le bénéfice des entreprises. Les entreprises sont accusées d'augmenter leurs prix, ce qui crée de l'inflation - ou du moins y contribue - et nous apprauvrit donc tous. Ces prix plus élevés gonflent leur marge bénéficiaire et les entreprises se rient de nous, plébéiens impuissants. La solution à leur imprudente avidité ? Restreindre les prix que les entreprises imposent ou les profits qu'elles amassent.
Cette opinion n'est pas limitée à la personne moyenne. L'Institut de politique économique (IPE), un groupe de réflexion à but non lucratif, affirme que les profits contribuent à l'inflation de manière "disproportionnée". Bloomberg rapporte que les bénéfices d'entreprise ont atteint leurs plus hauts taux depuis les années 1950, et la Réserve fédérale de New York a même publié un rapport sur la question. Comme ces écrits le montrent, cette opinion est partagée par des institutions sérieuses et semble être étayée par des données empiriques.
Néanmois, les bénéfices d'entreprise ne sont pas la cause de l'inflation. Il est facile de le démontrer en réfléchissant un instant aux conséquences de la montée des prix pour une entreprise. Des prix plus élevées signifient que les consommateurs ont moins d'argent dans la poche après avoir payé pour un bien ou un service. Cela signifie par ailleurs qu'ils ont moins d'argent à dépenser pour acheter d'autres biens ou services. Cependant, en période inflationniste, les prix de tous les biens et services augmentent.
Si les consommateurs ont moins d'argent à dépenser en raison d'une montée des prix, comment cela est-il possible ? L'augmentation d'un seul prix signifie qu'il y a moins d'argent à dépenser, mais une hausse générale des prix nécessite plus d'argent à dépenser ! L'augmentation des prix par les entreprises peut expliquer la montée de prix uniques, mais elle ne peut pas expliquer une hausse générale des prix qui caractérise l'inflation.
Si la cause de l'inflation ne peut pas être attribuée à l'avarice des hommes d'affaire, à quoi donc peut-elle être attribuée ? La seule chose capable d'engendrer une hausse générale des prix dans une économie est une augmentation de la masse monétaire. Comme indiqué ci-dessus, une hausse générale des prix nécessite qu'il y ait plus d'argent à dépenser. La seule façon d'y parvenir est d'avoir plus d'argent en circulation. Une augmentation de la masse monétaire signifie que les individus ont plus d'argent à dépenser qu'auparavant, et ils choisissent donc de dépenser cet excédent d'argent. Les entreprises perçoivent une augmentation de la demande et élèvent leurs prix en fonction de celle-ci. Lorsque de plus en plus d'entreprises perçoivent une augmentation de la demande, les prix augmentent partout en conséquence - c'est ce qu'on appelle l'inflation.
Cela décharge les entreprises toute responsabilité concernant l'inflation, mais comment peut-on alors expliquer le lien entre inflation et profits ? Après tout, il semble y avoir une corrélation entre les deux, aussi infime soit elle. Est-ce une coïncidence ou existe-t-il une autre cause pouvant expliquer ce lien positif entre les deux ?
La raison qui explique une hausse des profits en période inflationniste est simple : tous les prix n'augmentent pas en même temps au même endroit. Lorsque de l'argent nouveau entre en circulation, il se retrouve tout d'abord entre les mains d'individus soigneusement sélectionnés. Les premiers à recevoir l'argent fraîchement émis le dépensent, plaçant ainsi le nouvel argent dans les mains d'autres individus qui le dépensent à leur tour, etc. Le fait que ces bénéficiaires détiennent cet argent nouvellement créé en premier signifie qu'ils ont plus de revenus qu'ils n'en auraient eu autrement et peuvent désormais acquérir plus de biens. Ces biens qu'ils acquièrent verront leur prix augmenter, les biens que les seconds bénéficiaires acquièrent avec ce nouvel argent verront également leur prix augmenter et ainsi de suite au fur et à mesure que cet argent ruisselle dans l'économie, poussant ainsi tous les prix à la hausse.
Si tous les prix n'augmentent pas d'un coup, lesquels ont le plus de chance d'augmenter en premier ? Parce que la majorité de ce nouvel argent sera dépensé dans les biens de consommation et les services (contrairement aux entreprises qui l'utilisent pour couvrir leurs coûts), l'augmentation des prix affectera tout d'abord les biens de consommation déjà disponibles sur le marché. Au fur et à mesure que les entreprises répondent à la hausse des prix, il y a une augmentation de la demande des moyens de production pour fabriquer ces biens, ce qui engendre par la suite une hausse du prix de ces mêmes biens. Toutefois, les entreprises ne répondent pas à cette demande instantanément, il y a donc un délai entre la hausse du prix des biens de consommation déjà disponibles et celle des biens produits par les entreprises en réponse à la hausse de la demande.
Que se passe-t-il lorsque le prix des biens d'une entreprise augmentent mais que leurs coûts de production ne changent pas ? Les bénéfices totaux augmentent. Ce n'est pas parce que les entreprises forcent les consommateurs à payer plus cher ou utilisent l'inflation comme excuse pour faire payer les consommateurs toujours plus, mais parce que l'inflation a poussé les prix de certains biens à la hausse avant d'autres, ce qui résulte en une plus grande rentabilité pour les entreprises sur le court terme.
Cette rentrée d'argent imprévue est clairement avantageuse pour les entreprises, mais elle peut également être dangereuse. L'inflation a pour effet de fausser les calculs et d'induire les hommes d'affaires en erreur en leur faisant croire qu'ils sont plus riches qu'ils ne le sont réellement. Ludwig von Mises a abordé ce phénomène dans "L'Action humaine, traité d'économie" :
"Ce serait une erreur sérieuse de négliger le fait que l'inflation génère également des forces qui poussent à la consommation de capital. Une de ses conséquences est qu'elle fausse les comptes et les calculs économiques. Elle produit le phénomène de profits imaginaires ou d'apparence. Si les quotas de dévalorisation annuelle sont déterminés de manière telle qu'ils ne tiennent que peu du compte que le coût de remplacement des équipements usés sera plus élevé que leur coût d'achat initial, ils sont alors insuffisants. Si en vendant des stocks et des produits la différence entre le prix d'acquisition et le prix de vente est enregistrée comme étant positive, l'erreur est la même... [Les hommes d'affaires] pensent avoir de la chance et se sentent alors d'humeur généreuse, ils dépensent et profitent de la vie. Ils embellissent leur maison, font construire de nouvelles demeures et soutiennent le secteur du divertissement. En dépensant leurs profits apparents, le résultat fantaisiste de calculs faussés, ils consomment du capital."
La conséquence de cela est qu'une fois que la réalité s'installe et que les hommes d'affaires se rendent compte que leurs profits n'étaient qu'illusoires, il est déjà trop tard. Ils ont consommé bien au-delà de leurs moyens et sont en conséquence moins riches qu'auparavant. Ainsi, même si l'inflation leur a permis de bénéficier d'une aubaine temporaire, cela peut finir par leur nuire bien plus que cela ne les a aidés.
Doit-on imputer la faute aux entreprises pour l'inflation ? Pas du tout. Une entreprise ne peut pas manipuler les prix selon son bon vouloir, elle ne peut que fixer un prix que le marché est prêt à payer. À la place, la faute ne peut être imputée qu'à l'entité qui contrôle la masse monétaire : la Réserve fédérale. Toute l'agitation et l'amertume accumulées au cours des deux dernières années en raison de sa mauvaise gestion monétaire ne devraient qu'être exclusivement dirigées contre elle.
Pour détruire une mauvaise herbe, il faut la déraciner. Les racines des troubles monétaires contemporains pointent toutes vers cette institution gangrénée qu'est la banque centrale. Si l'on désire une solution permanente au problème de l'inflation, c'est le contrôle de la masse monétaire par l'État qu'il faut déraciner une fois pour toute.
Article original : https://mises.org/wire/profits-do-not-cause-inflation-no-matter-what-progressives-claim
Auteur : J.W. Rich (@thejwrich)
Date de parution : 10 octobre 2022
-
@ 42f9711f:8239fb2a
2023-04-03 16:26:37Dans cet article de blog, la chercheuse principale Natalie Smolenski affirme que les monnaies numériques de banques centrales (MNBC) annoncent l'effondrement des institutions démocratiques américaines. Pour distinguer notre économie politique de celle de nos adversaires autoritaires, il faut rejeter les MNBC.
Aujourd'hui, les États-Unis font face à un choix monumental :
Allons-nous préserver notre tradition de liberté et rester une démocratie représentative qui fonctionne ?
Ou resterons-nous sur la voie de l'autoritarisme et de la projection de puissance mondiale qui a caractérisé notre règne en tant qu'empire mondial ?
De nombreux membres de la classe politique voudraient vous faire croire que nous pouvons avoir les deux - qu'il n'y a pas de compromis entre la république et l'empire. C'est peut-être vrai, pendant un temps. Mais ça ne peut pas durer éternellement. Comme tous les compromis, cela est contraint par le fait matériel de la rareté des ressources : il n'y a aucun moyen d'imprimer suffisamment d'argent, de déployer suffisamment de main-d'œuvre, d'acheter ou de fabriquer suffisamment d'armes, de punir suffisamment de crimes et de contrôler suffisamment d'industries productives pour qu'une paix universelle par la domination puisse être appliquée à l'échelle mondiale, pour l'éternité.
Il est parfois facile pour les gouvernements d'ignorer le fait des contraintes matérielles, puisqu'ils disposent du privilège souverain de l'émission de la monnaie, de la fiscalité et du monopole de la violence légitime. Dans le monde des affaires, cependant, la rareté est souvent plus intuitive. Tout PDG semi-compétent sait que le moyen le plus rapide de faire couler son entreprise est de dépasser son budget dans des activités commerciales ou autres initiatives qui font augmenter les coûts sans générer les revenus nécessaires pour couvrir ces coûts dans les délais requis. Une telle entreprise peut être en mesure de survivre à coup d'injections de capital-risque ou d'autres entrées de capitaux si ses membres dirigeants sont particulièrement doués pour « vendre une vision », mais cette vision finit toujours par se heurter à la réalité, ou l'entreprise s'effondre.
Ainsi en est-il des pays et des empires. Lorsque les dettes arrivent à échéance, les actifs sont examinés et certaines choses doivent disparaître. Souvent, les premières choses à disparaître sont les actifs incorporels - une culture de respect, d'autonomie individuelle et de liberté collective. Politiquement, ces choses deviennent très vite « des choses dont nous n'avons plus le luxe de bénéficier ». Mais les ressources matérielles sont également bradées.
L'expansion et la domination impériale ont toujours coûté cher aux habitants de l'empire. Quoi qu'ils puissent gagner en sentiment de fierté nationale et en afflux de ressources à un stade précoce, ils sacrifient leur qualité de vie au fil du temps. Dans le cas des États-Unis, nous avons vu notre secteur industriel (et notre classe moyenne) se vider ; notre monnaie dévaluée (le dollar a perdu 96% de sa valeur depuis son introduction en 1913) ; des générations de jeunes traumatisés par des guerres à l'étranger qu'ils ne peuvent associer à aucune amélioration de leurs perspectives ou de leur niveau de vie ; une forte augmentation de l'accumulation de biens durables et d'actions américaines par des entités étrangères ; et l'érosion de nos traditions et institutions démocratiques. Les taux d'alphabétisation des américains, le revenu médian réel, l'espérance de vie et les résultats en matière de santé stagnent ou diminuent. La confiance dans le gouvernement, y compris dans le processus électoral, est au plus bas, et les discussions de guerre civile sont plus fréquentes sur les forums en ligne et même dans certains médias grand public. Nous sommes en désaccord sur ce qui est vrai, sur ce qui a de la valeur et sur ce que nous devrions faire ensemble en tant que peuple, sur ce que signifie le projet américain.
Ce sont tous des signes de déclin civilisationnel.
L'Empire romain est un exemple historique instructif. Tout en laissant à désirer, son ère républicaine se caractérisa par une véritable gouvernance délibérative des citoyens romains. Au fur et à mesure que l'Empire s'étendait, cependant, Rome faisait face à des contraintes croissantes en matière de ressources qui conduisaient à des conflits civils intérieurs et, au final, à l'exercice de la tyrannie. Ce n'était qu'une question de temps avant que l'Empire ne soit fragmenté en plus petites régions.
Dans le compromis entre république et empire, l'empire est souvent la voie la plus facile à emprunter. Les dirigeants ambitieux et les démagogues populaires croient souvent que la domination est nécessaire pour qu'un pays soit puissant. Nos principaux adversaires dans le monde aujourd'hui – la Russie et la Chine – choisissent la voie de l'empire en temps réel. Par conséquent, « tranquille » n'est pas l'adjectif qu'un observateur avisé utiliserait pour caractériser la situation intérieure de ces pays. Bien que ces gouvernements exercent des contrôles importants et rigoureux sur la presse ainsi que sur leurs populations, ils n'arrivent pas à contenir complètement les récits de pauvreté, de corruption, de protestation et de violations des droits de l'homme qui caractérisent leurs réalités politiques.
C'est en gardant ce contexte à l'esprit que le Bitcoin Policy Institute a publié notre livre blanc, "Pourquoi les États-Unis devraient rejeter les monnaies numériques de banques centrales (MNBC)". Les MNBC ne sont que l'exemple le plus récent du lent resserrement de la corde autour du cou de la république américaine - surveillance et contrôle au nom de la stabilité politique et de la suprémacie américaine sur le monde. Le principe derrière les MNBC est simple : éliminer l'argent liquide, dernier vestige des transactions financières autonomes, et donner à l'État une visibilité totale sur toute l'activité économique à toutes les échelles sociales possibles. En tant que monnaies programmables, les MNBC serviraient d'outil de politique monétaire : taux d'intérêt négatifs, confiscation directe des devises et capacité de contrôler quand, avec qui et combien d'argent n'importe qui effectue des transactions, partout dans le monde.
Tout simplement, l'introduction des MNBC élimine une pierre angulaire des libertés politiques - la liberté de commercer - et présume que les citoyens sont coupables jusqu'à preuve du contraire. Cela renverse la charge de la preuve de l'État à l'individu, aggravant un déséquilibre de pouvoir déjà flagrant.
Pire, la plupart des Américains ignorent complètement ce que sont les MNBC, ou que la décision de les mettre en place ou non est déjà bien engagée sans véritable délibération populaire. C'est un autre signe de l'effondrement des institutions démocratiques. L'avènement imminent des MNBC devrait générer un sentiment d'urgence : c'est un signal d'alarme que la fenêtre pour sauver notre république est en train de se fermer.
En bref, les MNBC ne sont qu'un symptôme de la consolidation du pouvoir étatique au détriment du pouvoir individuel, une tendance mondiale qui s'intensifie au rythme du développement technologique. Pourtant, un système de gouvernement républicain dépend d'individus autonomes – une société civile autonome – pour fonctionner. Au fur et à mesure que les gouvernements augmentent leur contrôle sur la société civile, même si leur justification est que c'est « pour le bien du public », ils détruisent la possibilité d'une autonomie populaire et consolident le système gouvernemental par les élites. Au fil du temps, cela devient un cercle vicieux : un contrôle accru de l'élite devient nécessaire pour appliquer un système de plus en plus obscur à une population récalcitrante et impuissante, dont les voies de contestation et de dissidence se rétrécissent progressivement. Cela crée les conditions de la violence comme seul recours de contestation politique.
En rejetant les MNBC, le gouvernement américain peut déclarer que l'autonomie individuelle est une valeur fondamentale de notre système politique. Mais si nous voulons vraiment redevenir une république, le peuple américain doit faire plus : nous devons révoquer le chèque en blanc que nous avons écrit pour que notre gouvernement fasse la guerre à sa seule discrétion et agisse comme le gendarme du monde. Ce chèque en blanc a accumulé une dette souveraine – à la fois fiscale et morale – qui arrive maintenant à échéance, et c'est le peuple américain qui paie les factures.
Le huitième secrétaire d'État américain et sixième président, John Quincy Adams, a déclaré que l'Amérique « ne va pas à l'étranger à la recherche de monstres à détruire. Elle est la bienveillante de la liberté et de l'indépendance de tous. Elle n'est que la championne et la justicière de la sienne. Elle inspire la cause générale par la contenance de sa voix et la bienveillante sympathie de son exemple. »
En d'autres termes, l'influence la plus puissante que l'Amérique puisse avoir sur le monde est de continuer à être qui nous sommes : en vivant nos valeurs. Dans un passé récent, nous avons sacrifié ces valeurs dans la poursuite de l'empire, au détriment à la fois du peuple américain et du monde. Nous ne pouvons pas simplement inverser le cours - après tout, on ne peut pas changer le passé - mais nous pouvons et devons choisir de devenir meilleurs à l'avenir.
Nous pouvons le faire. Il n'y a jamais d'arrivée définitive au pôle idéal d'une union plus parfaite, il n'y a que sa poursuite de bonne foi. Tant que suffisamment d'Américains sont engagés dans ce projet, nous sommes la république que nous prétendons être.
Article original : https://www.btcpolicy.org/articles/republic-or-empire
Auteur : Natalie Smolenski (@NSmolenski)
Date de parution : 31 janvier 2022
-
@ 42f9711f:8239fb2a
2023-04-03 16:12:53Artur Marion Ceolin est doctorant en économie à l’Université Rey Juan Carlos et boursier d’été à l’Institut Mises en 2022.
J'ai récemment publié un article dans le Mises Wire intitulé « Woke Egalitarianism and the Elites » (lit: L'égalistarianisme woke et les élites) dans lequel je présentais les vrais motifs se cachant derrière l'égalitarianisme woke. L'article décrit également la façon dont les élites tentent de rebâtir la société à travers le prisme du collectivisme. Mais plutôt que de discuter des objectifs du progressisme, il est nécessaire de discuter du fondement intellectuel de ces tentatives. Quelles suppositions et quel cadre intellectuel guident ces actions ?
Le progressisme se fonde sur le manque de respect des individus, de leurs actions et de leur capacité à choisir. En premier lieu, le progressisme groupe les personnes en collectifs selon des critères particuliers (ex: race, genre et orientation sexuelle). De plus, le progressisme homogénéise leurs pensées, leurs valeurs et leurs actions selon ces classifications de groupe. Pour les progressistes, les individus ne peuvent pas échapper à ces classifications.
Cette homogénéisation reflète les opinions progressistes vis-à-vis de l'humanité. Les progressistes comprennent mal l'action humaine et l'individualité de chacun. Ils ne se rendent pas compte que chaque personne est unique et souveraine. De plus, les individus ont la capacité et la liberté de juger en sélectionnant les options qu'ils considèrent comme étant les meilleures et en agissant de la façon qui leur semble la plus appropriée.
Les penseurs autrichiens, dans leurs débats avec les chercheurs objectivistes positivistes, affirment depuis longtemps que les individus ne sont pas des atomes. Les individus ne réagissent pas en fonction de relations causales objectives et probabilistiques qui peuvent être décrites de façon mathématique.
Chaque esprit dispose d'une capacité unique à percevoir et créer des opportunités en agissant selon une échelle de préférences individuelles et la capacité à percevoir la relation entre fins et moyens.
En outre, les individus ne peuvent pas être classés en groupes. Les groupes n'agissent pas. Qu'est-ce qui fait que l'action collective est une composition d'actions individuelles ? Les groupes sont des abstractions créées par l'esprit humain dans le but d'analyser des phénomènes. Mais ceux-ci n'ont pas de fondement ontologique.
Le progressisme ne permet pas non plus de comprendre la façon dont les individus peuvent altérer leurs actions avec le temps. Les individus ne sont pas des machines qui répètent des procédures imposées par quelqu'un ou l'environnement. Les individus font preuve d'autonomie et utilisent leur raisonnement logique pour changer le cours de leurs actions. Par conséquent, ils changent aussi l'histoire.
Les individus ne sont pas programmées pour se comporter d'une manière déterminée. Les individus créent du savoir continuellement. Cette capacité à apprendre est ce qui permet de guider le développement institutionnel. Le mécanisme d'apprentissage par tâtonnements est ce qui a rendu possible le développement d'institutions telles que la monnaie, le droit, le système de prix, etc.
Pour l'élite progressiste, les individus sont « stupides » et se font facilement duper. C'est ainsi que les progressistes expliquent pourquoi certains individus ne soutiennent pas leurs actions : ils manquent de conscience (de classe, de genre, de race, etc.). C'est également ainsi qu'ils justifient leur propre existence : les mouvements progressistes doivent défendre ces groupes. Même si ces groupes ne veulent pas de soutien, ces mouvements doivent exister pour sensibiliser les consciences à l'oppression existente.
Les progressistes ignorent complètement le rôle des individus dans la création de l'histoire. Selon eux, les personnes réagissent comme des atomes. Selon eux, les personnes ne créent rien et ne s'impliquent pas dans le processus d'évolution sociale. Ils ne se rendent pas compte que les hommes ne peuvent pas être façonnés comme de l'argile. Les individus sont uniques, ils disposent de la capacité à décider et à créer. Le monde humain n'est pas acquis mais construit par l'action humaine.
Ce mépris nocif pour l'individu se fonde sur une caractérisation erronée de l'humanité. Le progressisme, c'est le constructivisme. Le constructivisme se fonde sur l'idée que les hommes répondent à des incitations et règles externes. Le constructivisme affirme que la société peut être façonnée du haut vers le bas par de l'ingénierie sociale.
Le constructivisme ne conçoit pas les individus comme agents créatifs qui construisent l'histoire. Il rejette la capacité des êtres humains à développer des institutions qui régulent leur comportement social. Il conçoit les individus comme des jouets avec lesquels les régulateurs et ingénieurs sociaux peuvent s'amuser.
L'humanité est en train de traverser une nouvelle tentative socialiste visant à détruire la civilisation occidentale. Au XXème siècle, ils ont utilisé les « prolétaires » ; ils utilisent dorénavant les « minorités ». Combattre ces tentatives requiert une défense structurée de la liberté et créativité humaines.
Voici la place que tient l'école autrichienne, avec sa compréhension de la subjectivité humaine. C'est la raison pour laquelle nous devons diffuser l'école autrichienne à travers le monde. L'humanité a besoin d'idée qui renforcent l'autonomie individuelle et le respect de leur liberté, de sorte qu'il devienne possible de défier le progressisme et ses conséquences maléfiques.
Article original : https://mises.org/es/wire/la-economia-austriaca-se-opone-al-colectivismo-del-pensamiento-progresista
Auteur : Artur Marion Ceolin (@artceolin)
Date de parution : 3 mars 2023
-
@ 9ca0bd74:4052340b
2023-04-03 13:16:24Not being too strict with 'cyberpunk' here, might be some which are more cyberpunk-adjacent lol (please drop recommendation)
Nirvana (1997)
Trancers (1984)
Cyborg (1989)
Virtual Nightmare (2000)
Possessor (2020)
Strange Days (1995)
Repo Man (1984)
World On A Wire (TV series - 1973)
Cold Lazarus (TV series -1996)
-
@ 05e6367c:6ba9be85
2023-04-03 11:47:24如果媒体公司是唱片公司,创作者是摇滚明星,那么观众就是粉丝——这就引入了一个全新的商业机会。媒体和音乐一样,只有当观众和创作者一起走在一条路上,给对方机会来定义对方时,才能蓬勃发展。这是一条双向的道路,而不是一个自上而下的指令。但是,当一个创作者或艺术家影响大到其观众开始在他们的作品之上建造产品时,会发生什么?
如今媒体正在加速走向颠覆。我们可以看到,平台和服务上新媒体品牌(微标签,micro-labels)的发展,媒体公司将人才作为核心业务支柱的优先级,以及商业模式从内容导向转变为创作者导向。
随着创作的每个组成部分的发展,媒体业务公式中最关键的部分也发生了另一种演变:消费者。在媒体业务中,商业模式推动产品战略。虽然这是产品背后的驱动力,但它取决于消费者的兴趣、参与度和忠诚度。这意味着随着经济的转变,对消费者价值的需求也会转变。这是一个建立新业务的机会,该业务将创造者和消费者的关系放在首位,并引入所有权元素。这是粉丝圈和亚文化的生意。
创作者应该负责引出和制造亚文化。
亚文化是作为对已有文化的回应而发展起来的。就音乐和媒体而言,预先存在的文化或分类就是流派。传统上,希望融入已有的流派对艺术家来说是有益的。流派广泛地设定了听众或读者对该类别中的艺术家或创作者的期望。基础由现有的受众和现有的商业模式建立。
其目的是突破流派,创造一个属于自己的亚流派(亚文化)。从两方面考虑:创造者(或标签)根据流派发展自己的身份,如Sub-Pop,而歌迷则根据它发展自己的身份和亚文化,如Punk。在小众时代,这种方法是完全相反的。与其说是为更多的观众创作,现在的时尚是为特定的少数人设计。这不是关于规模,而是关于想要它的观众的质量。通过这样做,创造者不仅为自己开辟了一个独特的价值口袋,而且他们的社区也开始从已经创造的价值中构建一个身份。
创作者和消费者之间的关系比其交易货币(即内容)更有价值。在这个媒体时代,内容不是唯一的产品。内容是价值的关键部分,因为它是保持一致性的工具,但创作者和社区是产品。真正的价值是消费者和创作者之间通过各种接入点获得的联系,最终发展出消费者利益。随着业务从内容即价值转向创作者即价值,我们也应该转移支持它的商机。消费者建立在品牌之上。
对于创作者来说,文化是指他们的品牌非常易于传播,商业和社区建立在创作者本身之外。如果成员资格能够产生身份认同,而身份认同能够建立品牌,那么文化就是永恒的。当消费者成为创造者,并将他们的价值不仅与创造者环境内的建设相关联,也与创造者环境外的建设相关联时,创造者就成为了一个平台。由于消费者对其品牌的承诺和奉献,企业正在建立在创造者之上,与他们的参与分开。创作者是平台,在这个例子中,这种关系不仅与内容、创作者和社区有关,而且与亚文化本身的发展有关。而观众不是商品,相反,观众将自己视为品牌的一部分,并将他们自己的想法与他们的消费和与创作者的互动联系起来。这方面的一个例子是Phish乐队。
通过Phish的音乐、品牌和社区,整个亚文化围绕该集团发展,以至于在乐队的直接参与之外建立了企业、身份和社区。Phish是创作者,但他们创作的本质(即音乐和社区)和他们的文化发展已经将他们的粉丝变成了创作者。他们可以利用Phish的受众来发展自己的受众,从而扩大品牌和文化。就像The Grateful Dead的调整场景一样,Phish已经将自己打造为消费者(在这种情况下为粉丝)建立业务的平台。结果,品牌通过他们在社区业务基础上的关联而变得不朽。在Phish亚文化中,有许多粉丝建立的跨各种行业的场所。
由Scott Marks和团队运营的 Phish.net可以实时编辑乐队及其相关项目的演出列表、新闻和分析。幻想之旅(Phantasy Tour),一个由粉丝为粉丝开发的reddit式论坛,已经成为所有粉丝讨论任何事情的事实平台。在这里,一位粉丝(也是我的一位亲爱的朋友)正在为他的新房子寻找中世纪的现代家具。第一个帖子最多有499条回复(499条!),然后又蔓延到了第二个帖子。他选择了Phantasy Tour,并找到了完美的椅子。
由粉丝开发、设计和分发的完全强大的商业生态系统是存在的。受乐队影响,独立运行的JEMP电台和Phish Just Jams是建立在目录之上的音乐应用程序,用于服务于特定的兴趣和利基(niche)。粉丝摄影师围绕他们的艺术建立了整个业务和声誉,我最喜欢的一个是AZN。在乐队所在城市的现场活动中,甚至还有一个实体商业市场。除了商业,不断增长的亚文化还有很多社会效益。例如,Phellowship是一个由选择不吸毒和酗酒的粉丝组成的粉丝领导小组。
在Phish定义的文化中,亚文化现在决定了品牌的身份和长寿的能力,使其能够永久存在。歌迷们自己也在通过商业来定义文化和品牌。当然,这花了30多年的时间,而且一直在增加。
有趣的是,随着媒体运营和平台的分拆和重组,整个朝着创作者经济的运动本身就是一种媒体亚文化。创作者和支持平台和服务正在寻求通过建立自己的天意来挑战媒体机构及其结构的解释权威。对于一些创作者来说,这与业务无关,而更多地与打破体制、促进个人自由和构建自己的环境的愿望有关。许多独立的个体可能比留在机构中挣得更少,但这不是重点。这是一个信号,既表明现有企业需要如何准备应对挑战者,也表明企业需要如何建立以提供亚文化动力平台。
音乐永远与亚文化和粉丝相关。Phish不仅使消费者成为创造者,而且使他们成为所有者,从而将其提升到了一个新的水平,并在这个领域一会处于领先地位。与本篇文章中强烈坚持的机会相反,他们将很难被复制。媒体业务传统上是围绕内容构建的。多年来,在《纽约客》蓝色包袋、《纽约客》手提包中,一直有文化驱动商业的迹象,但大多数这些尝试都徘徊在会员资格的边缘,远不及亚文化的制造。我们看到新媒体公司开始努力抓住这个机会,将消费者身份从订阅者转变为会员,转变为将品牌视为其文化一部分的人。作为商业模式驱动产品战略,制造亚文化的业务不能只是一种现象,它也必须是品牌增长的源泉。鼓励粉丝,并转向一个消费者成为创造者的环境,是对品牌的保险和未来证明。
亚文化随着时间有机地发生,但它们可以被推向一个方向并加速发展。这仅与品牌理念有关——为了推动文化,品牌必须有一家之言 为了推动亚文化,必须引起自己有观点的消费者的回应。触发这种情况的一种方法是解锁品牌。权利管理很重要,文化是由商业驱动的,但把它控制得太紧意味着你失去了赢得媒体的潜力和你的消费者成为创造者的能力。让消费者成为创造者对品牌有好处,尤其是如果它是在考虑品牌的情况下构建的。最终的目标是让品牌与消费者身份密切相关,有些人甚至围绕它塑造他们的生活或业务。
另一个很好的例子是K-pop轰动一时的BTS背后的代理商Big Hit。他们最近进行了首次公开募股,并被机构和散户投资者大量超额认购。粉丝们实际上是在为艺人的成功投资,并鼓励他们做得好。第四面墙正在被打破。
BTS不会永远年轻。K-Pop Sensation的所有者需要新的热门歌曲。
韩国流行音乐或K-pop风靡全球的同时也在震动金融市场
有许多新兴的创作者正在通过社区建设文化,通过时间和承诺,将引发亚文化。正如上面定义和展示的,亚文化的业务不同于亚文化的发展。这是关于将粉丝角色的期望从被动的消费者转变为实际的业务创造者。游戏领域有很多动力,尤其是由MrBeast和Ninja等公司建立的商业、品牌和社区,我期望这是他们品牌扩张的下一阶段。
环境变了,平台也变了。这个机会真正植根于数字领域。随着媒体公司努力成为唱片公司,独立创作者创立自己的品牌,或与他人合作创建自己的微型标签,商业模式应该遵循。在我们拆分和重组媒体公司的运营结构时,我们应该同样拆分和重组我们推动该业务的方式以及我们将价值的重点置于之处。如上所述,这是从内容作为价值到创作者作为价值的转变。随着我们进一步从内容转向创作者,现有的订阅和会员结构将限制品牌在下一个时代扩张的机会。
因此,我们进入亚文化业务,专注于打造把品牌作为平台。那些投资于与粉丝建立更深层次联系并使他们成为代表品牌的创作者的人将遥遥领先。媒体行业面前有一个绝佳的机会,我很期待看到你们都建立了什么。
-
@ 05e6367c:6ba9be85
2023-04-03 11:45:39在过去的二十年里,免费平台已经使内容商品化和贬值。一段强有力引述,描述了这一现状:
“如果我在 30 分钟内完成一项工作,那是因为我花了 10 年时间学习如何在 30 分钟内完成这项工作。你欠我的是年,而不是分钟。”
然而,Web3创造数字稀缺性的能力有可能导致这一趋势的逆转。今天,本文将:
分析创作者经济的发展史和Web3 的作用 回顾创作者经济的现状及其面临的一些关键问题 深入探讨 Web3 所有权经济在创作者经济中的效用 探讨创作者所有权经济的现状和创作者可用的工具 尝试预测创作者经济长期发展趋势
Part.1 背景设定
关于创作者及创作者经济尚未有统一的定义,为了更方便的探讨,我们首先通过一些关键定义来设定背景。
创作者:制作具有教育和/或娱乐价值的媒体个人(或一群人),其目的是增加观众。 创作者经济:创作者阶层(以数字发行为主导)的崛起,他们通过创作内容和以各种方式将观众货币化来赚取收入。 所有权经济:所有权经济是指下一代的产品/服务将由其参与者通过使用代币化的激励机制来拥有和运行。这渗透到所有的行业--娱乐、去中心化的金融、基础设施、消费等。
图1: 创造者和所有权经济之间的关系
Part.2 创作者经济发展史
为了更好地理解创作者经济是如何随着时间的推移而演变的,我们将其分为四个不同的时代——爱好者时代、分发时代、独立时代和所有权时代。
1.爱好者时代始于Myspace、Friendster等社交平台的兴起,以及Facebook的早期发展。这些平台的特点是双向关注,关注你在现实生活中认识的人,没有价值积累。
2.随着“影响者”类创作者以及 Instagram、YouTube 和 Snapchat 等平台的兴起,发行/分发时代随之而来。这些平台的特点是单向关注,即关注你从未见过面但为你提供娱乐/教育价值的人,并且价值开始通过广告积累到各种利益相关者手中。
广告业务模型包括:
向用户展示静态/视频广告; 产品/服务的付费代言; 联盟营销。 实际上,这些平台成为其他企业实现其目标的促销渠道。正如 The Generalist 的 Mario Gabriele 所说,创作者用投入到内容创作中的资源付费,观众用注意力为这种努力买单,广告商购买创作者积累的注意力。
- 独立时代是由分发时代平台作为创作者创收的主要手段的转变所引领的。从创作者销售其他品牌到成为品牌的转变。创作者现在开始利用 Shopify、Substack 和 Patreon 等平台销售自己的产品和服务。这不仅让他们获得了更多价值,还加深了粉丝关系。
在发行时代和独立时代之间的某个时候,创造者在达到一定规模后,开始作为价值创造的第三种模式进行投资。这绝对是新生的,只有少数投资者采取这一飞跃(例如,Sway Boys 的 Animal Capital),但我们认为这一领域未得到充分开发,主要是因为教育和基础设施投资于他们的专长--创作者经济--过去和现在都没有向长尾创作者提供。
- 这将我们带到所有权时代,这是 Web3 对创作者经济的介绍。虽然我们稍后会更深入地探讨这个部分,但这标志着新工具的引入模糊了创作者和观众之间的界限,并通过为每个创作者创造微观经济来创造价值,从而减少创作者/粉丝关系的交易性 ,而不是一维的商业模式。
下图由 Mario Gabriele 提供,展示了上述动态:
简而言之,今天的创作者和用户创造了最大的价值,但只获得了其中的一部分,而平台本身则获得了不成比例的价值。
这是由于以下原因:
由于内容可以无限复制和消费,因此消费集中在选定数量的创作者制作的内容上。例如,如果一个医生比其他人的权威及专业度高10%,他们不会吸引 10% 以上的需求——会吸引所有的需求。同样,每个人都想只消费绝对最好的内容。因此,收入集中在这些精选的最佳创作者身上,使大多数人难以维持生计。
正如 Chris Dixon 所指出的,在中心化平台的早期,它以正和的方式表现以吸引尽可能多的参与者。然而,当参与者增长达到 S 曲线的顶部时,这种关系就会变成零和关系,从协作变成榨取。现在,网络效应太强大了,以至于用户无法简单地放弃该平台。你可以在这里更好地理解这种动态。
这里的根本问题是所有中心化平台(由于股东是平台参与者的独立实体)都需要作为一家公司有价值。不幸的是,他们只有在从平台参与者产生的价值中提取尽可能多的价值时才能做到这一点。
因此,要让一个平台尽可能对创作者“友好”,必须使其创作者享有权益。
目前,员工持股计划 (ESOP) 旨在调整员工与平台之间的激励机制。然而,这受到跨地域和社会经济背景的法律和金融基础设施的限制,而且只针对平台的运营商而不是创造者,只因他们是平台的摇钱树和主要用户。由于创作者可以说是最具增值性的利益相关者,而 ESOP 无法(或根本无法)为他们提供足够的报酬,因此创作者目前无法有效地从他们在平台上花费的时间中获益。
总之,创作者并不拥有内容,第三方开发者无法控制代码,所有的平台参与者都无法影响所使用的平台的政策或决策,而主要的商业模式是一种不透明的、基于广告的模式,给封闭的花园平台带来巨大的优势。
Part.3 那么Web3的承诺是什么
如前所述,所有权经济假设下一代产品/服务(跨行业)将由其参与者通过使用代币化的激励机制来拥有和运营。所有权通过经济收益、治理权和/或社会影响力表现。
这个世界是由Web3技术促成的,特别是代币的出现,它与IP、HTTP、SMTP等类似,是一种协议级的创新。把代币看作是一个互联网原生的产权系统--这是有史以来第一次,你可以真正拥有互联网的一部分。这一块可以代表任何东西,从一个单纯的JPG到你使用的任何互联网产品/服务的一部分。作为例子,比特币和以太坊是第一个大规模的用户拥有的网络。
使用代币作为所有权资产和 DAO 等协调结构,创作者不仅可以拥有他们制作的内容,还可以拥有平台本身。由于参与者将是所有者,他们可以集体决定平台的政策和产品决策,没有外部利润提取压力。
Part.4 代币与股权的不同
允许任何有互联网连接的人与代币进行交互,同时还允许流畅和即时的传输。与股权不同,它们不受地域界限的限制。这种简单的可访问性使“赞助+”得以出现。Patronage+ 由 Jesse Walden 创造,是一种新范式,支持创作者不仅是一种利他行为,也是一种投资。换句话说,有盈利潜力的光顾。
人们可以在代币(价值交换的媒介)中编纂规则以促进商业关系,这在今天需要第 3 方来执行。例如,人们可以通过 NFT 对数字稀缺性进行编程,这使创作者能够切实地重视他们本质上数字化的作品。这更多是为了恢复创作者的定价权,而不是人为地限制消费者的选择。
可编程性的另一个例子是可组合性。现在,在其他人的作品之上构建(例如,混音)不会妨碍原创艺术家获得经济补偿,因为每次任何价值转移到钱包 Y 时,都可以将版税流向钱包 X。
由于代币的链上特性,创作者可以通过不同的参数(例如个人何时支持、消费了多少内容、财务贡献等)可验证地了解粉丝的质量。如果创作者同意,会将数据整合到其未来的工作中,并为他们的粉丝创造更多定制内容。创作者还可以为他们的“真正”粉丝提供超级专业的福利,更有效地与粉丝互动,从而使他们能够建立一个经得起时间考验的更紧密的社区。
代币允许创作者从热心的粉丝那里产生更多价值,从而实现更深层次的货币化。这带来了一种分层策略,即为每个级别的粉丝提供产品/服务,同时增加创作者的超级粉丝创造价值的上行潜力。
除了货币化,创作者还可以将效用注入代币中,从而让粉丝(代币持有者)积极参与内容创作,而不是仅仅被动的消费者。这种类型的有趣实验是 Shibuya 和 Mad Realities。
由于代币可以从根本上使平台增长及其参与者保持一致,因此它可能会产生比我们迄今为止看到的更大、更强大的网络。由于平台将服务于用户而非股东,用户可能不想优化股价,这完全颠覆了米尔顿弗里德曼的观点,即所有公司的主要目标都是为股东带来利润。然而,易于交易的创作者代币确实会带来投机的风险,这会破坏激励机制的稳定。
最后,Web3 可以通过数字稀缺性将价值返回数字内容。在过去的二十年里,免费平台已经使内容商品化和贬值。因此,为内容付费的行为已大大减少。然而,创造数字稀缺性的能力有可能导致这一趋势的逆转。以下是一段有用的引述,有助于理解为什么这很重要:
“如果我在 30 分钟内完成一项工作,那是因为我花了 10 年时间学习如何在 30 分钟内完成这项工作。你欠我的是年,而不是分钟。”
虽然对每一种媒体来说数字化稀缺并不是有益的,但创作者让他们的作品变得稀缺的能力开启了货币化的用例。
例如,一个艺术家不需要放弃她的Spotify流媒体--相反,她可以利用音乐NFT、限量版投放和其他福利给她最热心的粉丝,同时保持在Spotify上的存在,以达到更大、更普遍的受众。
Part.5 所有权工具
颠覆性创新的总可寻址市场是未知的。对于创作者经济来说,这一点是正确的,因为由于新的平台、技术和社会趋势(例如,COVID),人们成为创作者的意愿和能力都在增加。因此,虽然无法确定市场规模,但工具的类别可以分为那些帮助内容生产、增长/吸引观众、以及货币化和管理业务的工具。下图是一个可视化的表示。
也就是说,专门为创造者经济构建的 Web3 工具往往分为两类:重生和新生工具,即模仿 Web2 解决方案的工具以及新颖的工具用于链上需求。重生工具的一个例子是 Audius,它正试图成为去中心化的 Spotify。另一方面,新生工具的一个例子是 Collab.land,它提供软件来对在线群聊进行代币门控。
尽管如此,我们相信用于创作者经济的 Web3 工具仍将大致属于上述类别:那些有助于内容制作、增加/吸引观众以及货币化和管理业务的工具。
虽然我们描绘的画面看起来几乎是乌托邦式的,但此类用户拥有的平台尚未广泛普及的原因有几个。
首先,用户拥有的平台需要基本的 Web3 技术知识水平,而大多数人不具备这种理解。新平台上需要有一个临界质量来激励用户迁移到新平台,因为它包括承担大量的转换成本。而且,正如我们之前多次说过的那样,UI/UX 需要进一步简化才能达到临界质量。
此类平台代表了我们可以使用经济激励(例如代币)来引导网络效应的第一个实例。
虽然代币可以快速启动网络,但绝对不能替代产品市场契合度,也不清楚它们是否会随着时间的推移在维护和发展网络方面带来持续优势。归根结底,仍然需要构建人们想要的东西。举个例子,OpenSea,没有代币,但仍然领先于所有推出代币的竞争对手(SuperRare、Rarible 等)。
Part.6 创作者的潜在发展
需要部署更多资金。从这个角度来看,截至 2022 年年中,Red DAO 是数字时尚领域最大的资本部署者。他们累计投资了约 1000 万美元。时尚是一个价值数万亿美元的产业,可以比现在更有效地使用数字参与方式。
更多的创作者成为投资人。虽然这种趋势多年前就开始了(Dr. Dre 和 Beats、Diddy 和 Ciroc 等),但 Web3 工具现在允许较小的创作者投资于他们产生共鸣的品牌和产品。
创作者中产阶级将显着增加。随着将创意追求货币化变得更加容易(基于支持工具增加和个人支付意愿的双重假设),更多的创作者群体将能够从他们的创意作品中获得可持续的收入。
影响者/内容创作者孵化器的兴起。中国的影响力孵化器已经扩大规模,例如 Jake Paul 的 Team 10。虽然这是一个潜力巨大的领域,但获得少数比例的创作者收入是一个棘手的问题。
额外的货币化工具可以解锁创作者中产阶级,使创作追求更容易获得。观众限制在 1,000 或 100 个真正的粉丝可以让创作者获得稳定的收入,并增加能够通过追求创造性的努力谋生的人数。
总而言之,前路漫漫。创作者增长潜力很高,尽管存在许多不利因素,但并非无法克服。如果 Web3 的 UI/UX 和教育挑战能够长期解决,那么创作者和所有权经济很有可能达到其潜力的顶峰。
-
@ 05e6367c:6ba9be85
2023-04-03 11:27:19集中流动性:基础知识
TL;DR — 集中流动性做市商 (CLMM) 允许流动性提供者决定他们的资产可以在市场上以什么价格被交易者使用,这与恒定乘积 AMM 不同,后者的流动性在资产的所有潜在价格中均匀分布。集中流动性可以将资本效率提高 4000 倍,但需要流动性提供者进行积极的流动性管理。
流动性提供者不是向资产的每一个可能的价格提供流动性(如x*y=k风格的AMM),他们可以选择只在一个有限的范围内提供流动性,通常是当前交易活动正在发生的范围。
原因
-
更少的滑点和更好的交易,因为大多数交易活动的价格范围受益于更深的流动性。
-
流动性提供者的年利率更高。仅提供进行交易的区域,意味着交易者会使用更多的流动性,从而获得更多的交易费用。
-
您可以达到相同的深度,但流动性更少。根据人们更新集中头寸的积极程度,CLMM 可以实现与普通 AMM 相同的滑点和深度,而流动性仅为普通 AMM 所需的 10% 到 25%。
知识点备注
流动性有三种衡量的方式,分别是即时性、宽度和深度。
● 即时性(immediacy)是指给定数量和价格,能多快成交。
● 宽度(width)是指给定时限和数量,能以多低的价格成交。
● 深度(Depth)是指给定时限和价格,能成交多大的数量。
什么是 NFT AMM?
NFT AMM 有两种,一种是基于恒定乘积曲线的,一种是基于集中流动性头寸的。
恒定乘积NFT AMM 通常会使用现有的 DEX,如 Serum 或 UniSwap,并在 NFT 和 DEX 之间添加一个中间层。这个中间层通过锁定 NFT 并铸造一个可替代的地板代币,使 NFT 具有可替代性。然后可以在 DEX 上针对 USDC、SOL 或 ETH 交易这种可替代的底价代币,其价值应该与NFT集合的当前底价大致相当。
如果有人想从池子里购买整个NFT,他们必须从DEX购买一个可替换的地板代币,然后烧掉代币以换取NFT。
可替换地板代币的复杂性在于其造币/燃烧机制,这可以很容易地从用户那里抽象出来。外包的 DEX 和 AMM 基础设施也是如此。
例子。NFTX, NFT20, Solvent, Frakt, Elixir.
集中流动性NFT AMMs(NFT CLMMs)允许流动性提供者(存入NFTs/代币)创建他们自己的NFTs池,卖出池,买入池,或交易池。
卖出池实际上是 NFT 所有者要价的总和。卖家说他们想卖出 X 个 NFT,每次有人从他们那里购买,他们想增加要价。
购买池则相反,它们是来自 NFT 买家的购买订单的总和。买家决定购买 X 个 NFT,并且每次有人向他们出售 NFT,他们都希望降低出价。出售给矿池的 NFT 越多,卖家的价格就越差。这意味着更多的需求会提高价格,而更多的供应会降低价格。
交易池允许流动性提供者将 NFT 和可替代代币供应到一个微型池中,设置他们自己的交易费用和他们自己的定价曲线(每次销售后 NFT 的价格如何变化)。流动性并没有被隔离到这些微池中,而是一个聚合器合约在任何给定时刻引导交易者通过最好的池。这使得 CLMM 高度灵活、高效,但也更加复杂。
例子:Sudoswap、TensorSwap、GoatSwap、HadeSwap。
我们需要NFT AMMs吗?
NFTs很难交易,抛开版税问题不谈,相对于可替代的代币来说,其供应量小,使得它的流动性和波动性非常低。人们对围绕这些资产的更多金融基础设施有明确的需求,但如果没有一个流动性层作为基础,这种需求就无法存在。
NFT AMMs的目标是成为NFTs的流动性层,并取代市场,为一系列DeFi应用的建立释放潜力。
然而,在NFT流动性不足的核心问题上,存在着AMMs尚未克服的基本挑战。
1. 没有人关心碎片化的问题
当NFTs被转换为可替代的地板代币时,对可替代的地板代币及其分数没有购买压力。人们对购买NFT的零碎部分感兴趣的说法,从他们可能被定价的集合中并没有得到证实。如果这是真的,你会期望NFT的小数点以溢价交易,因为会被更多的投资者获得,并且有较低的准入门槛。然而,由于NFT AMM套利的性质,这些代币最常以折扣价交易。
由于不对称套利,在可替代的地板代币的价格和NFT地板价格之间保持挂钩是很困难的。以下是它的工作原理。
如果可替代的地板代币的价格高于NFT市场的底价,套利者应该从市场上购买NFT,然后在AMM交易,以换取可替代的地板代币。然后他们以高于他们购买NFT的价格出售该代币。在这个方向上,套利是即时的。
如果可替换的地板代币低于NFT市场,他们应该用更便宜的代币换取池中的NFT,从而以折扣价获得NFT,然后在市场上列出NFT。结果是:你现在在等待有人购买它,并在有人购买之前坚持风险。在这个方向上,套利是有风险的,而且不是即时的。
有了可替换的地板代币,套利只在一个方向上起作用,导致这些代币的价格有偏差,几乎总是比地板价格有折扣。
**2. 相对于可替换代币而言,供应量较低 ** 一个NFT藏品通常只有1万个代币,这对NFT AMM来说是个问题。AMM中究竟能有多少代币?
收藏品通常以在二级市场上市的代币数量少而自豪,然而这种看涨的非流动性削弱了NFT AMM的实用性。
但是为什么不在平台上提供你的 NFT 作为流动性呢?你仍然可以看涨并将你的 NFT 放在一个池子里吗?是的,但您必须接受您提取的 NFT 可能与您存入的 NFT 不同。由于您的 NFT 正在交易,您可能会留下买方不想要的 NFT。这场谁最终得到不需要的 NFT 的游戏将我们引向另一个问题。
烫手山芋问题
NFTs的不可伪造性与AMM的核心假设之一相悖。
AMM使用数学表达式x*y=k来反映资产X的价格变化,如果人们出售它以获得资产Y。我们没有任何价值可以赋予X,使它在这个池子里有所区别,并使这个公式无效。
然而,如果X是一组NFT资产,那么它们的特性、稀有性、潜在收益和其他特征使X的价值严重依赖于组成它的代币。因此,该公式假设所有提供的NFT是平等的,使得该池子只与具有同等价值的地板NFT有关。这意味着NFT AMM是整个集合的一个不完美样本。
NFT是可互换的假设适用于NFT CLMMs和恒定乘积AMMs,但是CLMMs可以更容易地摆脱制作特定性状的微池。
NFT AMMs需要有机制来防止他们的池子因交易而变质,因为交易员会抢走最好的NFT,并用相同系列的劣质NFT取代它们。随着时间的推移,资金池将是一个集合中最不需要的NFT的结果。
Solana NFT AMMs中提供的Degen Apes最能说明这一点,剩余流动性的一半是由臭名昭著的粉红色礼服Degen Apes组成。
Frakt很早就解决了这个问题,在他们的资金池中加入随机交易。虽然这使资金池更健康,可以非常游戏化,但它的代价是交易经验和更难套利。
不是所有的NFT AMM都是一样的
恒积 AMM 的另一个副产品是它们永远不会耗尽池中任何资产的储备。这是通过滑点强制执行的。如果对池中的一种资产的需求过多,池中资产 X 和 Y 的比例开始发生变化,使得需求最多的资产的价格变得越来越不利。这种平衡行为在 AMM 中不断发生。
价格成为指数级的不利因素,意味着购买的资产X越多,其价格就越快地趋向于无穷大,所以我们永远不会耗尽池中的资产X。对于NFTs,由于其供应量非常有限,所以非常容易耗尽储备,因此,同样容易出现非常高的滑点。
在流动性低的情况下,增加1个ETH来购买NFT,沿着恒定乘积曲线急剧改变其价格。
由于收藏量太小,而且总是以整数单位进行交易,NFT加剧了AMM的滑点问题。
NFTs中的流动性太稀缺了,不可能像恒定乘积AMM那样在0和无穷之间均匀分布。
当使用恒定乘积函数提供流动性时,在当前价格的 -50% 和 +50% 的价格范围内,只有大约 25% 的流动性被使用。
示例:Solana Monkey Business 的交易价格为 200 SOL。您在 AMM 中为 SMB 提供 500 SOL 的流动性。使用恒定乘积曲线,在每个 SMB 100 SOL 和 300 SOL 的价格之间,交易者只能使用 25% 的流动性。这意味着 SMB 池在 200 SOL 价格附近的价格范围内的深度等于 125 SOL。在流动性有限的情况下进行 1 个 SMB 的交易所需的价格差异通过滑点解决。
根据 0xmons 的示例:一个拥有 20 个 NFT 的池的最小滑点约为 5%。
我们可以添加更多的 NFT 和更多的 SOL 以获得更深的流动性,但这非常有限。由于 NFT 的稀缺性,它们需要在更窄的价格范围内供应,以免在无限的潜在价格中低效稀释流动性。
在我们之前的示例中,流动性提供者在池中提供了价值 500 SOL 的流动性,从而在当前下限 +/- 50% 的价格范围内产生了 125 SOL 的深度。使用 CLMM 模型,流动性提供者只需提供 125 SOL 即可达到相同的深度,并将范围设置为当前下限的 +/- 50%。
如果池中的交易活动通常被限制在这个价格范围内,那么流动性提供者赚取相同数量的费用,但只提供 125 SOL 而不是 500 SOL。这实际上意味着使用具有广泛范围的 CLMM,而不是恒定乘积 AMM,他们的 APR 提高了 4 倍。
如果流动性提供者决定在比 +/- 50% 更窄的范围内提供流动性,这个 APR 可能会更高,但他们将不得不随着价格的变化更频繁地调整它。
NFT CLMM 为买卖双方提供更好的价格
在流动性集中的世界中,滑点是由微池中选择的曲线设置的,并且在限制上更合理。
在恒定乘积 (x*y=k) AMM 中,其中 X 是 NFT 集合,Y 是类似 SOL 的可替代代币,购买池中多个 NFT 的价格和滑点呈指数增长,购买的 NFT 越多。
这导致在 AMM 中购买多个 NFT 的平均价格非常高。
最好用 SudoSwap 的修改示例来说明:
假设 1 SMB = 200 SOL。我们使用具有 10 个 SMB 和 2000 SOL 流动性的恒定乘积函数创建一个流动性池。
有人想从这个池中购买 5 个 SMB。
购买第一个SMB,产生了大约11%的滑点,必须支付222 SOL来获得SMB。购买第二个SMB,这个池子现在的报价是每个SMB 278 SOL,第三个将花费357 SOL,第四个476 SOL,第五个667 SOL。如果买方想买5个SMB,平均价格将是每个SMB400 SOL。
现在假设流动性提供者在 CLMM 中创建了一个微型池,并在每次销售后将价格设置为上涨 10%。
同一买家想从该池中购买 5 个 SMB。第一个将花费 200 SOL,第二个 220 SOL,第三个 242 SOL,第四个 266 SOL,第五个 292 SOL。如果买家想用这个 CLMM 购买 5 台 SMB,平均价格将为每台 SMB 244 SOL。
请注意,在上面的示例中,滑点不会随着每笔交易而增加,而是保持在 10% 不变。这意味着价格不会趋向于无穷大,池中的最后一个(第 10 个)NFT 价值 471 SOL 而不是∞ SOL。
结论
这就是 CLMM 的力量,如果我们想创造深度流动性来支持清算、期权、衍生品、杠杆等金融基础设施,为什么 NFT 如此迫切地需要它们。
恒积 AMM 旨在忽略许多 NFT 收藏家最看重的东西,即他们资产的独特性。将 DeFi AMM 的概念成功应用到 NFT 是很困难的,需要项目来反思 NFT 的特殊性。忽略这些特征将导致糟糕的用户体验和不利的交易,最终将限制 NFT AMM 的扩展能力。
集中流动性 AMM 有可能解决这些痛点,但现在面临着复杂用户体验的挑战。
-
-
@ 05e6367c:6ba9be85
2023-04-03 11:24:10我最近一直在思考关于 NFT 和 Web 3 社交体验的问题。以下是我的一些初步结论:
-
NFT 将构成我们在线身份的基础
-
我们购买和赚取的 NFT一起构成了我们的在线身份
-
策展为王
这篇文章我想更深入地探讨一下关于策展的问题,以下是详细内容。
画廊
与当前的社交媒体内容不同,NFT已经存在于线上。所以你不需要像社交媒体一样去发布新的东西,而只需要对其进行策展。
当今展示 NFT 的最流行的方式是通过画廊。很多 NFT 是数字艺术,所以可以像其他艺术品一样在画廊中展示。
在研究这个问题的同时,我开始着手建立我的 NFT 画廊。这个项目虽然还在进行中,但构建的过程令我非常兴奋。它感觉像是装修房子。以下这是来自 @derekedws 的一个精心策划的画廊的案例(他可能不这么认为,但这确实是事实)。
这个画廊是 Web 3 版的 Instagram, 一个基于你拥有的数字资产和你曾获得的数字凭证而策划的视觉作品集。
我这周回顾了下之前使用 Opensea 的经历,并发现我在“个人资料”页面上,会花相同的时间查看我自己收藏的NFT 以及隐藏的 NFT。老实说,这是我用来查看哪些是我自己拥有的NFT以及哪些是收到的空投NFT的唯一方法。
我认为 Opensea 的“个人资料”页面在该平台上最被低估、且具有最大的发展潜力。如果我是 Opensea 的产品主管,我会花费大量时间来研究如何让用户 (a) 构建他们的个人资料,以及 (b) 查看其他人的个人资料。
画廊最终是一个赌注,但如果能掌握其中的思想,你就可以开始在此基础上去添加具有真正网络效应和竞争优势的功能。
画廊的缺点是缺乏用户参与度。它类似于橱窗商店,用户之间以及他们的 NFT 之间无法产生互动。为了解决这个问题,各大平台都在添加具有社交属性的功能。
社交功能
受 Web 2 社交体验的启发,Context、Zapper 和 Prysm 等类似平台正在添加活动信息、排名及关注他人钱包等功能。它们将 Web 2 社交平台中为大家熟知并喜爱的特点带入到了 Web 3。
这不算是一个重大的飞跃,但它需要以这种方式发生。尽管目前有了新技术 (NFT),但我们构想出第一波应用程序的灵感来自于我们已有的东西。
毕竟复合创新需要些时间。
下一步是什么
元数据
元数据是伴随NFT一起的底层信息。到目前为止,元数据仅限于有关所有者/买方/卖方的信息,你也可以把它当做是产品认证链。与各个NFT交互过的钱包地址和拍卖合约将永远与该资产绑定在一起。
一旦 DeFi 开始接受 NFT 作为抵押品,并且NFT所有者可以将他们的资产投入到市场,那么NFT 所携带的元数据集就会变得丰富,而且NFT 存在的时间越长,其元数据集就越大。
我很高兴看到产品团队可以利用资产的元数据去构造应用程序及体验,这个过程中存在着社交与策展方面的重叠。
代币访问权限
无论 NFT 是艺术品、个人资料图片还是凭证,它对拥有相同 NFT 的人来说,兼作访问和会员资格。NFT是独一无二的,而且大家喜欢这种与众不同的感觉。
我们正在看到 NFT 的所有权赋予了策展人访问权限。在我获得画廊会员卡 NFT 之前,我无法设置我的 Gallery.so 页面,而且会员数量有限。DAO根据NFT所有权对其 Discord频道的访问进行把关的情况也越来越普遍。
在这些情况下,专属性是非常实用的特征,因为它可以留住追随者。
代币访问权限未来将发生很大的变化,并且将有完全基于这种模式的巨型社交平台出现。
角色
我对 Web 3 中角色如何演变感到困惑。
我们今天的在线身份是默认的角色,因为我们共享的所有内容都是提前策展好的。例如,我有意识地选择只在 Twitter 上谈论加密货币的内容,而不谈论关于运动、旅行或任何私人的事情。
这在 Web 3 中更难实现,因为默认情况下,一切都是链上公开的。解决方案是分配多个角色,即用不同的钱包做不同的事情。我在这方面没有做好,这也是我今年想要改进的地方。
总的来说,我认为人们在角色管理方面会逐渐变得更加成熟。我们可以打赌,之后会有一套强大的工具来帮助我们。
但我也意识到人们很懒惰,会尽可能避免麻烦,而管理多个角色是一件繁琐之事。
结束感言
NFT 的社交体验有两条平行的路径:因为每个人都在寻找下一个Cryptopunk或BAYC,所以受加密交易的启发,可以将收藏NFT 视为投资,另一条是将 NFT 视为社区的会员卡,从而更好的将收藏者聚在一起。
我也很期待这两条路径在将如何发展,以及它们在未来是分开还是相交。
谢谢阅读。
Andy
-
-
@ 05e6367c:6ba9be85
2023-04-03 11:22:10F-NFT 是一種 NFT,它使人們能夠擁有 NFT 的一部分,以減輕經濟負擔。這種碎片化的過程允許通過與原始 NFT 綁定的一組可替代代幣來共享 NFT 的所有權。
從藝術家或所有者的角度來看,NFT 是一種獨特的數字資產,存在於區塊鏈上——例如藝術品、音樂或收藏品——它允許藝術家將他們的創作貨幣化。分餾允許用戶將 NFT 分解爲具有各種用例的較小的可替代碎片。
NFT 碎片化格局仍然相對較新,並且仍處於 NFT 採用的極早期階段,但毫無疑問,碎片化 NFT 顯然是一個革命性的概念和不斷變化的 NFT 世界。
**本文大綱 ** 1. fNFT介紹
-
如何碎片化NFT ( fNFT)
-
fNFT平臺和比較
-
fNFT的優點和缺點
-
碎片化與二級NFT集合
-
真實用例
*DAO作爲NFTs投資的工具
*社交媒體帖子轉換爲NFTs
*NFT的個性化
*真實世界的F-NFT使用案例
- 尾注
一、fNFT簡介
新型 NFT 出現在新的用例中,NFT 最初是作爲數字收藏品、遊戲物品、音樂和藝術品。然而,這僅僅是個开始。金融 NFT 正在尋找新的用例,例如代表保險單和流動性提供者頭寸。
NFT 是新 NFT 金融生態系統的一部分。NFT-Fi 代表去中心化金融 (DeFi),只是將 DeFi 應用於 NFT 和 NFTs(非同質代幣是與數字或實物資產相關的區塊鏈上的記錄),NFT 與代幣不同,它們是建立在以太坊等區塊鏈上的獨特數字資產,fNFT代表fractionalized NFT,屬於NFT-Fi類型。
二、碎片化NFT ( fNFT)
NFT-Fi爲收藏家釋放了大量的行動,這些新的行動之一是fNFT,它們帶來了訪問和擁有NFT的新方式。
碎片化 NFT 是由其原始所有者拆分成更小部分的 NFT。通過碎片化NFT,所有權作爲一個社區或共同所有權共同存在。因此,碎片化 NFT 是將 NFT 分解成更小的部分以單獨出售。每個部分代表 NFT 所有權的一部分,使一個社區能夠擁有一個代幣。
因此,從买家的角度來看,這種類型的 NFT 使人們能夠擁有原本無法負擔的 NFT 的一部分,隨着 NFT 價值的上升,碎片化使個人投資者能夠獲得高價值 NFT 或一籃子 NFT 的較小股份.
從作者、藝術家或所有者的角度來看,可以在不完全出售 NFT 的情況下釋放部分價值。當資產價值非常高(數千歐元)時,可以將它們分成更多的流動性並用作抵押品。
三、如何碎片化NFT
當 NFT 被分割時,原始 NFT 被鎖定在保險庫中。
盡管 ERC-721 和 ERC-1155 是兩個最常見的以太坊標準,但是要創建山寨幣或其他同質化代幣,ERC-20 是被使用的標準。
然後鑄造代表 NFT 所有權的 ERC-20 代幣,每個代幣代表原始 NFT 所有權的一部分,並發行了代表 NFT 所有權一部分的可替代代幣的有限供應。
您將需要部署一個智能合約,其中包含從 ERC-721(不可替代標準)生成特定 ERC-20(可替代標準)的指令。
因此,碎片化過程涉及從單個不可替代代幣中生成多個可替代令牌。任何持有 ERC-20 代幣的人都可以部分擁有相關的 NFT。
碎片化NFT執行路徑:
NFT必須在一個智能合約中得到保障。這個智能合約需要有指令,將這個不可替代的代幣(ERC-721或ERC-1155)分成幾個可替代的代幣(ERC-20)小部分。
每個ERC-20代幣代表NFT的部分所有權。
在NFT的所有者將其出售後,ERC-20代幣的持有者可以將代幣贖回,以獲得從銷售中獲得的份額。
NFT 的所有者就分權過程做出所有重大決定,例如決定要創建的 ERC-20 代幣的數量,並且還將確定每個代幣的價格。
*銷售:以固定價格在一定時期內或直到它們被售完爲止,組織零碎股份的公开發售。
*可恢復:碎片化NFT是一個可逆的過程。碎片化的 NFT 可以重新組合在一起形成整體。每個 F-NFT 智能合約都有一個买斷選項。這種买斷選項使每個 NFT 分片持有者能夠購买 NFT 的所有部分以解鎖其原始版本。
*要觸發买斷選項,分片持有者必須將一定數量的 ERC-20 代幣轉回智能合約。在觸發後的設定時間內將舉行回購拍賣。其他 NFT 分片持有者有時間做出決定。一旦該時間結束,NFT 的所有部分將自動轉移到智能合約中,整個 NFT 將授予买方。
四、f-NFT平臺和比較
Unic.ly:允許用戶通過連接錢包,將NFT存入一個保險庫,並鑄造新的ERC-20代幣(uToken)來實現NFT的碎片化。
Unicly有自己的代幣,稱爲$UNIC,是治理代幣,總供應量上限爲1M,通貨膨脹率大約每月減少一次。
Fractional.art:這是一個去中心化的協議,使NFT持有者能夠單獨或在集合的基礎上分化代幣。
NFTX.io:NFT市場平臺,讓用戶將他們的NFT存入一個保險庫,以創建一個可替換的ERC20代幣(vToken)。新鑄造的代幣代表了對保險庫內任何隨機NFT的1:1索賠。用戶可以在自動做市商(AMM)中匯集ERC20代幣,如SushiSwap,以創造流動性和交易。
Nftfy:是是一個基於以太坊的自主運行的开源平臺,它對不可替代代幣 (NFT) 進行細分,生成完全由 NFT 支持的符合 ERC20 的分數。
以上平臺的明顯問題是鯨魚能夠超過整個代幣持有者社區的出價。另一個細分項目 Unicly 試圖通過將多個 NFT 的細分化捆綁在一個保險庫中來改進這一點,而不是像 Fractional 上的單個 NFT。這允許用戶持有 NFT 資產集合的碎片化資產。雖然這在技術上並沒有使鯨魚更難掠奪整個NFT,但它保留了普通用戶的零碎所有權。
FNFT 中常見的四個概念:
买斷
买斷拍賣類似於常規拍賣;唯一的區別是它涉及交易 F-NFT 而不是實物資產。
如果愿意,當前的部分持有人可以保留他們的部分所有權。但是,當外部方存入高於或等於底價的金額時,就會發生买斷,這會引發拍賣。
持有人將不得不通過超過潛在买家的出價來擊敗潛在买家。如果他們不這樣做,那么所有單獨的部分將自動聚集在一起並重組 NFT 以轉移給买方。
當拍賣結束時,NFT 被撤回,部分所有者將他們的代幣換成從銷售中獲得的加密貨幣。
可收集供應供應
可購买的碎片化 NFT 份額稱爲可收集供應。
如果可收集的供應量爲零,則意味着該 NFT 的任何一部分現在都無法購买。
隱含估值
這是 NFT 當前估值的價格。它可以用作確定您的“入門價格”的參考。
底價
拍賣僅在設定底價時开始,因此底價可能會被認爲是 NFT 可以出售的最低價格。
五、fNFT的優缺點
優點:
*獲得高級資產:傳統金融使用分權化來處理高價值資產,例如度假屋和飛機。因此,投資者可以將其投資組合暴露於高價值資產,而不必擁有它。
*降低風險:這意味着對資產進行碎片化可以降低投資成本和與之相關的風險。NFT 碎片化爲 NFT 投資者提供了同樣的好處。
*更多的流動性:NFT 細分化允許較小的投資者接觸昂貴的 NFT 收藏品。這使得更多的流動性能夠進入市場,因爲可以使用可替代代幣將昂貴的 NFT 分成其價值份額。
*社區:碎片化允許藝術家加入社區成員,同時保持其 NFT 的稀缺性。
*策展人獎勵:將資產分成幾部分的 NFT 所有者從他們選擇的 NFT 市場中獲得策展人費用。雖然業主可以設置和更新此費用的金額,但它有一個最高價格限制,以防止魯莽定價。
缺點:
重組:正如之前提到的,這是可能的,但確實很難。NFT 細分化帶來的一個困難是“將其重新組合在一起”的過程。爲了將整個 NFT 從金庫中移除,所有持有者都必須出售他們的股份,這意味着所有部分都必須重新組合在一起。
六、碎片化與二級 NFT 集合
正如我所解釋的那樣,碎片化允許藝術家加入社區成員,同時保持其 NFT 的稀缺性。
但是,我們需要區分二級 NFT 集合和 碎片化。
二級NFT集合 :是指藝術家或創作者可能決定發布另一個與前一個具有相似特徵的收藏。同時,碎片化是指藝術家將 NFT 分解爲可替代的代幣,從而使多人擁有一個 NFT 成爲可能。
七、潛在的真實用例
1)DAO 作爲 NFT 投資的載體。
DAO 正在獲得關注,這要歸功於圍繞一件很少有個人能买得起的藝術品的社區,這使得稀有和昂貴的 NFT 的可訪問性成爲可能。典型案例:PleasrDAO、Partybid。
2)社交媒體帖子轉換爲 NFT。
社交媒體帖子可以轉換爲 NFT 並分發給個人的原始支持者,從而爲粉絲帶來基於社區的獎勵。
例如,某個特定主題中非常知名創作者的第一批喜歡者,他或她的第一個 Instagram 帖子或推文可能會因爲他們最初的支持而獲得該帖子的一小部分的獎勵。典型案例:
Minti:是一個允許用戶將他們的社交媒體帖子作爲NFT的平臺,並圍繞能夠被貨幣化的內容創建一個數字身份。這將權力放回內容創作者手中,並允許他們的社區更好地支持他們的創作,而沒有任何中間人平臺獲取最大的利益。社交媒體NFTs使粉絲能夠更多地參與到藝術家發布的內容中,並讓藝術家自己產生額外的收入。
CocoNFT:使社交媒體內容創作者非常容易創建NFT。
BlogToNFT:您的網絡內容,如博客,也可以轉換爲NFT,這正是BlogToNFT的創建目的。爲了幫助用戶將他們的博客轉換爲NFT。你所需要做的就是注冊並擁有自己的博客來轉換。
NFT個性化
由於Metaverse的存在,個人的數字代表將需要更多的個性和獨特性。這可以通過用某些定義性特徵來裝飾你的NFT來實現,使你在metaverse的形象與其他人不同。
Filta:是一個面部過濾NFT市場。我們仍然處於極其早期的階段,但毫無疑問,這些概念預示着令人興奮的解決方案,這將使NFT生態系統成爲我們日常生活的一部分。
八、真實世界的FNFTs 使用案例
房地產 通過用智能合約取代中介機構,NFTs可以大大加快購买房產的過程。
房地產投資需要大量的前期資本來購买任何財產,這意味着只有少數人可以在房地產領域投資。NFT零碎化是來幫助解決這個問題的,它將房地產NFT的零碎份額進行銷售,使房地產投資變得可以負擔。
藝術空間 這個用例它已經在文章中展开,因爲它是最常見的用例。
從創作者和投資者的角度來看,隨着現在碎片化NFTs的出現,即使是小投資者,也可以投資昂貴的藝術品,而創作者在他們的創作被出售時可以獲得巨大的回報。
一個最近的例子,安東尼-霍普金斯爵士幾天前與Orange Comet合作推出了他的第一個NFT系列,The Eternal Collection。
永恆系列的概念是對安東尼-霍普金斯爵士在其輝煌的電影生涯中所塑造的大量角色原型的詮釋,從他令人振奮的藝術作品中汲取有力的能量。
NFT系列還將爲收藏家提供一次獨家的IRL活動,讓他們有機會與好萊塢最偉大的偶像之一接觸。
音樂 加拿大饒舌歌手、歌手和唱片制作人Tory Lanez公布了第一個NFT系列,直接向歌迷發布了NFT數字專輯,在不到一分鐘的時間裏賣出了100萬個數字單位。
由於 NFT 和 fNFTS 被用來幫助他們獲取資源來構建和廣播,藝術家們开始嘗試使用混合活動來彌合實體活動和在线參與者之間的差距。
他們不僅僅是 VR 或 AR 甚至是音樂公司。藝術家創造將藝術家與粉絲聯系起來的體驗。所以這種類型的混合體驗是有道理的。
遊戲 與其他類型的加密遊戲不同,Play-to-earn 遊戲允許玩家賺取、購买、出售甚至贈送遊戲內的數字資產。
此類多人遊戲可以使用 F-NFT 讓玩家聚集在一起,通過投資其分散的股份來买賣昂貴的遊戲內資產。
Star Atlas 和 Axie Infinity 等多人遊戲採用 NFT 技術,使用這項技術讓玩家能夠聚在一起購买更昂貴的物品。
收藏品 如果 CryptoPunks 沒有被細分,考慮到它們的高價,普通投資者將無法投資它們。碎片化的 NFT 只會讓 NFT 愛好者更容易購买 NFT 作爲收藏品。
域名 .crypto 和 .eth 等域名在 web3 領域取得了巨大成功。分割域名 NFT 並將其出售也可能是一項巨大的業務。
九、結論
NFT部分化的格局仍然相對較新,如果要在這個領域出現贏家,諸如NFT所有者、藝術家和投資者的策展人費用/激勵結構等因素將決定這個領域的冠軍。
盡管 NFT 細分領域仍然相對較新,但毫無疑問,碎片化 NFT 是一個革命性的概念和不斷變化的 NFT 世界,並且將保持強大。
-
-
@ 05e6367c:6ba9be85
2023-04-03 11:15:29Implicit in the name ‘Web3’ is the expectation of replacement. In technology, versions are successors. When the new model comes out, we upgrade and the older one is replaced and forgotten.
Is this what we mean when we refer to Web3? Will it replace the set of principles, technologies and behaviors that we’ve come to know as Web2? (Is this even the way that phases of the Internet works?)
Many blockchain enthusiasts seem to suggest as much. As the term Web2 has become closely associated with centralized social networks like Twitter and Facebook, and as those networks have become increasingly politically powerful -- with arbitrary, capricious or simply incompetent moderation policies not to mention potentially societally harmful business practices -- it is common to hear crypto folks imply that decentralized applications would do a better job. Community-owned networks would be fairer, in that the users who created the content and attracted new members would fully participate, as token holders, in the value they created. The distribution of content could be based on meaningful values like reputation and expertise, rather than gamified outrage and algorithmically rewarded hype. And governance, like moderation policies, would be driven by the entire community, rather than a small club of executives and their handpicked oversight committees made up of insiders looking to maximize their own wealth or security. The attractiveness of this superior model, it is proposed, will lure in key influencers, provide a better user experience, and propel a shift from the old social platforms to the new.
And yet, it’s difficult to see how that happens. If anything, it seems like crypto has made the ‘old’ centralized social networks, especially Twitter, more central than ever. How many influencers have used their followers to make an easy leap into crypto sales? How many important projects have used social media to find and recruit contributors? Where else would advocates for new coins and tokens state their cases and share their memes? Where else could we show off our CryptoPunks, Hashmasks and Bored Apes? And how could a Bitcoin day trader not keep his eyes glued on Elon’s Twitter feed over the past few months? Social media is so essential to the day-to-day reality of DeFi that it is hard to see where one ends and the other begins. And it is arguably precisely the gamified virality of centralized platforms that makes them so valuable to crypto marketing and community.
Given this dynamic, how realistic is some transition? Or have we actually trapped ourselves deeper in a centralized system? And what is actually wrong with Web2 anyway?
What is actually wrong with Web2?
In 2004 “Web2” was popularized at a conference which sought to ask the very same question: “What is wrong?” The organizers of the first Web2 conference felt that the industry “had lost its way” after the dotcom bubble burst and needed an injection of confidence. In particular, there was a sense that the vertically integrated portals, like America Online and Yahoo, had created unsustainable monoliths ‘evilly’ trapped users and their data, prevented creative innovation from smaller startups, and led to bubble and bust. Web2 at its outset was about understanding and emulating the ideals and design concepts of the open source movement, but also the success of companies that were still expanding despite the drought, like Google and Amazon.
In those days, Google especially was seen as a role model, in the way that it sent searching users away to the best resources. Rather than try to seize 100% of the value, the virtuous approach was also the best for the ecosystem. The symbolically central concept was that of the ‘open API.’ Everyone should and would build on everyone else. In fact, one of the most important lessons gleaned from the surviving companies was that user-generated content and data could be a source of sustainable competitive advantage while improving the user experience and the web for all. Users would from here on be first-class contributors, no longer relegated to bottom-of-the-page comments sections, but rather the stars of these new open systems. Developers would vie to attract their usage and contributions by offering ever greater freedoms and flexibility. The best companies would be the best platforms, creating more value for the entire ecosystem.
But the catch was that this was never a sustainable long-term strategy, at least not for the purposes of promoting an open ecosystem. User-generated data is vulnerable to a family of sub optimizations such as Goodhart’s Law, in which using a “measure” as a “metric” devalues the measure itself. If you’re Google building PageRank on natural weblinks you’ll quickly generate SEO schemes which seek to game your measure. If you’re Amazon relying on user-generated reviews, you’ll soon be flooded with fakes. And if you’re Facebook building algorithms for user recommendation, you’ll soon be suggested content in your existing ideologies and filter bubbles.
These measure-based competitive advantages erode as companies instill them as metrics to be gained and optimized against. The result is that these companies, naturally seeking to maintain advantage, are forced to develop strong capabilities in user management and manipulation themselves. More charitably, it turns out that the data was more a means to reduce friction, improve experience and aggregate demand centrally, recreating most of the negatives of the old portal system, just with a friendly moniker that everything is just one click away. These successful companies in most cases weren’t true platforms, but aggregators, locking in demand and exerting central control, though admittedly with a velvet fist enforced at least at first and in part by superior user experience.
And this necessary lock-in is arguably the source of today’s ire. Whereas 2004's Web2 was reckoning with marketplace failure, 2021's Web3 is reckoning with user failure. We are a community of people failing the marshmallow test, always optimizing for less friction, more dopamine and shorter feedback cycles. We claim to want richer experiences, to support independent actors, to despise centralization and to demand more meaningful connections and higher quality content. But then we unlock our phones. And so Google, Facebook and Twitter’s success with data-based ad monetization and engagement optimized user experience is now the problem, not the solution.
As Web2 companies began to deeply understand the powerful potential of their innovations — the game-ish reaction buttons, the follower graph, the algorithmic ‘newsfeed’ — they became adept at a clever stratagem. Rather than committing to perpetual openness, they could offer new user tools or developer APIs and encourage the community to use them to create. If the results were beneficial to the company, they might allow this creativity to flourish for a while, but soon enough, they would either charge the most successful creations for prominence or buy or build their own.
It was hard to blame them for this approach. It worked! Twitter, Facebook and Google were for-profit companies and the dynamic was not new for ‘platforms.’ Microsoft, the boogeyman of the open source community, had employed similar tactics in its heyday. But it was the development and explosive growth of the smartphone that made it so ferocious. Mobile devices, with their app stores, emojis, cameras, notifications and most importantly, constant tactile presence, were the perfect match for ‘Web2’ social networks. Every new phone buyer was a potential heavy social user, and the dense relationship networks that quickly formed made it almost impossible for people to resist buying phones to access them.
This loop triggered a flood of new and highly engaged users unlike anything seen in the history of technology adoption. All over the world, people who recently had only limited access to computers were now checking their newsfeeds throughout the day. Every new family or friend each of them followed increased the value of the experience, the depth of their connection and the virality of the network. Mobile and social became a second brain, “notifications” a sixth sense. So, even if content creators and app developers knew the ‘game’ was ‘rigged,’ how could they not take advantage of this massive opportunity? Maybe, they reasoned, if their brand or invention was the first, if it was the best, it might be one of the few that got so big so fast they’d achieve some kind of escape velocity from the gravity well of the social networks. After all, it had happened. Social apps or content with just the right combination of uniqueness, design genius and luck had hit the jackpot and acquired millions of customers within hours. And so they poured their ideas, talent and cash into these platforms, adding even more appealing media and interactivity, fostering even deeper engagement without any additional cost to the network. And despite the grumbles about unfair practices or addictive behaviors, all this just made the networks more essential. The flood of users kept pouring in.
We now live in a world of this flood. It’s a world overflowing with social activity, a world where every institution is dragged around by the currents of a new wildly unpredictable environment. Our children dream of growing up to be Instagram ‘influencers.’ Our pop charts are a direct output of the most popular backing tracks on Tiktok. A Facebook-inspired political cult attacked the US Capitol. Even the social platforms are buffeted by the storms unleashed by their technology. Their efforts to assert control have little effect, other than making their position even more essential and central. So, it is in the context of this flooded world, that the notion of Web3 as a successor paradigm has such alluring appeal.
Platform wealth and economic sharing
Today, creators & consumers contribute to a platform to gain social or economic status. But this status is rented (status on platform only, revenue shared directly with platform). In Web3 this status is owned. Not only is social reputation portable, but the relationship with IP created on platform can be owned and portable as well.
Content ownership and rights
Web3 introduces ownership as a process. As IP is put out on the web, IP is minted on chain in order to show provenance and give creator control to its distribution and usage rights. This is done on the individual level vs. the platform level.
The happy accident of NFTs
It seems increasingly evident that certain objects on an open, interoperable world computer will be treated and valued like, well… real objects. This is not yet fully understood, but insofar as NFTs are unique to blockchain-style architectures this would represent quite an advantage.
Lies, hype and bots
Actors can still choose to create as many personalities, handles, keys, etc. as they’d like. However, the incentive for building reputation is to accumulate as much good faith on a single identity as possible. This will enable better positioning and recruiting into more lucrative and socially beneficial opportunities than those handles that lack reputation.
Governance, individual influence and moderation
As we discussed in previous articles, ownership is less about financial upside and more about social influence. In Web3, the individual is now influential within the organization it holds tokens of, giving s/he the ability to drive decision making that will bring better health and effectiveness to the community.
Permissionless development and composability
Today’s platforms control what can and cannot be published on their network. It also starts every user from the same starting line. In Web3, development is unrestricted because the permission is tied directly to that individual's reputation. Every decision they make is tied to their identity, so it’s a choice as to whether or not you want to carry these decisions with you throughout the web. Everything built on the protocol is foundational to what others can build on top of it. So instead of everyone acting independently and starting from scratch, everyone works in collaboration and builds on top of foundational legos from other members before them.
New models of work and collaboration
The business models of Web3 encourage collaboration. In Web2, all revenue streams reward the action of the output (advertising against what’s already published, subscribing to a finished piece of work). In Web3, there’s now a business model on the input. Crowdfunding and social tokens are an investment in the idea before there is any output generated, encouraging strong collaboration at the onset which rewards all participants throughout the creative process
This is a rich set of imagined capabilities that directly answers the most pernicious problems of Web2 as it has crystallized nearly twenty years after its inception: ownership, governance, openness, incentives, reputation. In many ways, the solutions Web3 proposes are the direct opposite of those offered by social networks, a far ‘better deal’ for users, creators and developers, an approach intentionally weighted to reward the individual or team on the basis of her, his or their input, rather than be drowned amid ever increasing control and returns to the owners and operators of networks. Which leads us to the question: If it’s better for more people, will Web3 replace Web2? Why wouldn’t it?
There are three possible answers:
-
No -- Web3 is best understood as a sort of ‘economic’ extension of Web2, especially of social media, and it will grow as Web2 grows.
-
Sort of -- key aspects of Web2 will be better performed by Web3 systems and there will be a symbiotic relationship between two parallel but similarly powerful models.
-
Yes -- over time, all of the key aspects of Web2, including centralized social networks, will be replaced by web3-style user-owned and governed protocols.
We can think of these being three horizons: Web3 as testing ground (1), as complement (2), or as critique (3). As for the first, it may be that Web3 is a sort of open lab of experimentation whose successes will eventually be absorbed by existing structures. This testing ground outcome emerges if the natural inefficiencies of, say, Web3 database structures don’t have any compensating advantages over the long term. The second outcome of complementarity occurs as aspects of Web3 thrive alongside, and even enhance the value of, Web2. This seems to be the case with Twitter, which may be the greatest consumer onramp to Web3 and clearly plays a major role in the ecosystem. The third outcome, the most extreme, is probably best thought of as Web3 being an inherent critique of Web2. Replacement will seem necessary insofar as Twitter, or Facebook, or Paypal’s success is thought to be Web3’s failure.
Perhaps one difference between today’s context and 2004’s -- when we roughly transitioned to the social/mobile Web2 -- is that the large tech companies that have mastered their strategies are broadly and firmly entrenched, and it isn’t as clear how a newcomer can emulate or even improve on their strategies while maintaining defensibility. To look at Twitter for example, for crypto, its ‘purpose’ is a portal to scarcity games, NFT drops, and FOMO. The function today is to spread narratives and create FOMO for markets in Web3. But what happens as the number of markets in Web3 exponentially increases? Web3 says it provides an escape, but it’s not certain whether the escape is scarcity financial games that shift attention or a new fairground with even playing rules. We were trained to play the game rather than play the game in a fair manner.
Right now, and for the foreseeable future, follower graphs on centralized social networks are a source of significant and enduring value. We see in every dimension of our society how efficiently that influence can be translated into financial, political and cultural gain. So to ask our question another way: Will there be a time when most users’ on-chain identities and reputations are more valuable to them than their centralized social network follower count and composition? The three answer options above represent different degrees of optimism.
It is easy, given the trajectory of this most recent era of tech, to be pessimistic. Many of the idealistic outcomes people argued were ‘inevitable’ in 2004 now look laughably pollyannaish. But our current situation, strangely simultaneously both centralized and chaotic, is neither all bad nor intractable. The mobile and social transition that flooded — and still floods — billions of people into Web2 is providing a historic opening for human creativity and connection. For all of the algorithmic manipulation and clever incentives of social networks, these are billions of human beings with free will. They aren’t pre-programmed robots. It is factful not fanciful to recognize that they will determine the future. But they won’t do it based on vague ideals of decentralization. Only if and to the extent that Web3 truly benefits their lives will they push past our legacy networks into a next phase.
Acknowledgement
Original author: Dark Star, Jamm Session etc. Original link: https://darkstar.mirror.xyz/aXm3OTVTK26hN2QKu82s8NjLQYPKCOMiVD2zIioCOVU
This article was translated into Chinese on July, 2021. Appreciate the support and assistance of the DAOrayaki community. Chinese translation link:
https://daorayaki.org/post/63e8c14fe16a89f3dbd990e3 -
-
@ 05e6367c:6ba9be85
2023-04-03 11:10:15Last week, DAOhaus was featured on The Defiant: A Big Test for DAOs: Honing New Compensation and Contribution Practices, sharing a template for how DAOs can create a flexible compensation plan for contributors. Today, we’d like to go deeper into how we’re implementing that template for our own compensation plan - the principles, how it works, and how you can follow our progress.
With the rise of DAOs, we’ve seen more ‘workers’ transition to becoming DAO contributors, embracing more flexibility and control in how they spend their time. This is a win for both contributors and DAOs, vastly expanding the talent pool to anyone willing to show up and contribute.
📖 Background
At DAOhaus, this is no different. The DAOhaus platform is managed by Warcamp DAO, to which UberHaus has delegated responsibility for building, maintaining, and stewarding the platform. Warcamp current is a team of 20 (and growing) core contributors with different skill sets, time zones, and bandwidth availability. Each contributor is a member of one or more Circles, or functional working groups, underneath the Warcamp umbrella.
Contributors are currently compensated retroactively. Contributors informally request payment at the end of each month from their respective Circles according to the self-assessed value they created. Once the Circle verifies contributor requests, Circle leads then make a proposal requesting Circle funds for that month from the Warcamp DAO. Individual contributors then make formal proposals against their Circle to get paid.
As an MVP, this has been effective in bootstrapping compensation and getting a small group of contributors started. However, as we look to expand our team and accelerate our work towards our long term vision, we find there is room for improvement in the following areas:
-
Compensation clarity for contributor recruitment: While retroactive compensation is flexible, it is hard to attract contributors who want more clarity and certainty on their compensation before committing their time and effort.
-
Contributor retention & focus: Context-switching is common in DAOs for good reason, but it comes with attentional drawbacks. How can we better incentivise contributors who want more focus? Can we give contributors tools to manage their own workflows?
-
Contributor evaluation & growth: As more DAO members join, how can we help contributors evaluate their personal growth & development? How can the DAO effectively align compensation and value created within a non-hierarchical context?
-
Contributor ownership: As contributors add value, how can we give them greater ownership and governance power? This is especially important for new contributors, as we want to avoid entrenching power among only early contributors.
To solve these issues, we wanted to create a plan with the following principles in mind (these are the same principles the OpEd advocated for):
-
Contributors should have flexibility in how they engage with the DAO
-
Contributors should have flexibility in how they are compensated by the DAO
-
Contributor engagement and compensation models should be interoperable with that of other DAOs
-
Contributor value should be assessed in a bottom-up fashion
✨ Our new Compensation Plan
After many rounds of research, discussion and alignment, our new compensation plan consists of three pillars: base compensation, bonus compensation, and governance power.
🛠 Base Compensation
Our Base Compensation is very similar to what the Defiant OpEd outlined. In the spirit of Principles 1 and 2, , we’ve created two tracks. Contributors can now choose to be compensated for their contributions as part of either the Retroactive or the Commitment tracks.
**Retroactive Track **
The Retroactive Track is tailored to contributors wanting more flexibility or testing the waters before committing more substantially to Warcamp. This works the same as our previous compensation approach; contributors can start contributing whenever they want, however they want, and wherever they want. At the end of each month, they request compensation retroactively for their contributions, based on how much value they deem they’ve provided within their Circle.
Commitment Track
The Commitment Track is designed for contributors wanting to make more substantial commitments to DAOhaus and have more certainty about their compensation.
We’ve just over a month into this new approach, but in the spirit of building in public, we’re sharing how we are running this experiment beginning with two-month cycles; Starting in November, Warcamp contributors could select the Commitment Track if they wished.
Commitment Track Process
To uphold the ethos of decentralization and transparency, the processes for establishing base compensation are designed in a bottom-up and open manner. With that in mind, we start with a self-assessment phase where contributors indicate their Commitment and Value Levels.
Commitment Levels are expressed in percentages, referring to how much of their total time – or effort, or prioritization, or focus; contributors are free to use the measure that’s most relevant for them – a contributor desires to commit to DAOhaus. For example, someone using time as their measurement and selecting a level of 100% would be committing to spend roughly 35 hours a week, whereas someone selecting 15% spends 5-10hrs weekly with DAOhaus.
You’ll notice that these time estimates don’t line up with traditional “full time” hours. This is intentional. In the DAO space, there is a lot of value in forging connections across projects, so we encourage all Warcamp contributors to spend roughly 10% of their committed time contributing to web3 projects or DAOs. This is also yet another reason why we want to give contributors lots of options for how they engage with DAOhaus.
Value Levels are graded from 1 to 5, referring to the contributor’s expected value created during the compensation cycle. Measuring expected value is challenging and subjective, so once again contributors are free to use the measure that’s most relevant for them: DAOhaus experience, domain-specific knowledge, skill-specific talent, etc. For example, a contributor may justifiably grade themselves as an L5 contributor based on their high quality experience in Web3 or DAOs, recognition as a leader in their space, deep knowledge about DAOhaus, or any combination of those three. Conversely, L1 contributors tend to be new to Web3, with some experience in their area of interest and are just beginning to learn about DAOhaus.
While we begin with self-assessment, the DAO collectively has final say over which value levels each contributor is assigned. We’re still actively working on how best to do this in a way that balances DAO budget constraints and needs with our desire to drive compensation in a bottom-up manner (Principle 4)
How to determine Base Compensation
Based on each contributor’s Value and Commitment Levels, we pro-rate the compensation for each contributor from a fair value of a Level 5 contributor committing 100% (i.e. $12,000). From this topline dollar value, each contributor then selects the percentage they wish to receive in DAOhaus’ native $HAUS token vs. the DAI stablecoin. Thus far, most contributors have selected to receive roughly 25% of their compensation in $HAUS.
For instance, a Level 5 Contributor committing 100% of his or her time receives $12,000 a month, whereas a Level 3 Contributor committing 50% earns $3,500 a month. To incentivise longer-term alignment with DAOhaus, contributors can also choose to receive a portion of their compensation in $HAUS token instead of the DAI stablecoin.
Once all selections have been made and informally approved by the DAO, a Contributor Compensation Ratification Proposal is submitted and Warcamp DAO members vote to pass the proposal. You can view our first cycle’s Value and Commitment Levels for each contributor on the Commitment track, together with their monthly DAI and $HAUS payment, in this forum post. And here is the on-chain proposal ratifying these elections.
Through bottom-up assessments, ratification proposals and open discussion, this process helps create openness and transparency in determining compensation, unlike traditional human resources departments, which are opaque and more prone to bias.
Furthermore, in the spirit of Principle 3, using Commitment percentages helps contributors segment their bandwidth and signal availability to contribute to other DAOs. Our hope is that this helps contributors better manage their bandwidth and reduce burnout, as well as help DAOs better estimate and communicate the commitment they want from contributors. As this approach gets more widely adopted, this should create a more sustainable way for greater cross-pollination of contributors among DAOs.
💰 Bonus Compensation
Earlier this year, Warcamp began using Coordinape to distribute $HAUS tokens to contributors on a monthly basis. In our new Bonus Compensation program, we continue using Coordinape but have increased the Bonus allocation to 600 total $HAUS across all contributors, regardless of whether they are on the Commitment or Retroactive tracks.
In addition to putting $HAUS in contributors’ hands (see the next section for more), determining bonuses via intersubjective evaluation (i.e. Coordinape), is a bottom-up and decentralized approach to a couple other important areas of contributor “management”:
-
Holding each contributor accountable to their Value and Commitment Levels as the Compensation Cycles progress
-
Creating a framework to help contributors assess themselves and peers in terms of personal growth and development
For instance, if an L3 contributor on the Commitment Track has received more giveHAUS than their L3 peers, this could be a signal that they’ve been over-delivering and should be leveled up to L4. Conversely, If someone on a Commitment Track received fewer giveHAUS than their peers, this could be a signal for us to help them better hit their Value Level or review the right Compensation track for them.
As we go through more Compensation Cycles, we are looking to experiment with different amounts of giveHAUS per person, perhaps in proportion to their commitment % (for Commitment track) or the previous month’s received giveHAUS (for Retroactive track).
Our goal is to create a system that accurately and fairly evaluates the contributions and capabilities of Warcamp contributors in a non-hierarchical setting, informing contributors’ Bonus Compensation in the short term as well the evolution of their Base Compensation over the long term.
🗳 Governance Power
We believe that distributing governance power among all contributors is crucial to everything a DAO does. When contributors have actual power to determine the direction of DAOhaus, they approach their contributions as an owner or entrepreneur would, because that’s exactly what they are!
To distribute governance power over Warcamp to those that best know how to exercise it, we have a voluntary program for contributors to stake $HAUS received each month as Bonus Compensation for additional shares in the Warcamp DAO. The additional shares a contributor can receive is determined by intersubjective evaluation from their peers (as part of the Coordinape process).
Since their newly-minted governance power is a result of peer evaluation, we stay true to ensuring that our processes are bottom-up and transparent. Furthermore, as staking is voluntary, contributors have flexibility on whether they want to participate and how much they want to stake.
We’ve been thrilled that most Warcamp contributors have been staking almost 100% of their $HAUS received for additional Warcamp shares. This is a strong signal that Warcamp contributors are aligned with the long term direction and value of DAOhaus.
🔮 Moving Forward
As mentioned, we are beginning with 2 month Compensation Cycles so we can review and adapt as we go, and we plan to use Coordinape results to continuously evaluate performance and calibrate compensation. We will likely be experimenting with longer commitment periods and/or Cycle lengths as well as $HAUS token lock-ups and multipliers to further deepen long-term alignment between contributors and DAOhaus.
To us, creating effective and flexible compensation models is only step one towards creating a better contributor experience. As we look towards our next steps, we’d like to improve the qualitative and human aspects of being a Contributor, such as providing peer-support and feedback (through a buddy system) and ameliorating contributor burnout.
👇 Conclusion
DAOhaus is creating a new compensation plan to address the following problems commonly faced by DAOs.
-
Increase compensation clarity for contributor recruitment 💰
-
Increase contributor retention & focus 🎯
-
Create a foundation for contributor evaluation & growth 📈
-
Give contributors greater ownership & governance 🤝
The new compensation plan we are experimenting with consists of 3 core pillars:
- 🛠 Base Compensation: Our Retroactive and Commitment Track create clear compensation for flexible and focused contributors respectively.
2.💰 Bonus Compensation: Contributors give $HAUS bonus (as kudos) to each other, helping to evaluate performance & guide contributor development.
- 🗳 Governance Power: Contributors can stake their $HAUS bonus for Warcamp DAO shares, giving them more stake and alignment with DAOhaus.
We are running the experiment in cycles of 2 months and will update the community on the progress, results and learning. Meanwhile, if you’re interested in reading more, you can check out some of the discussion related to this new program in the original forum post and proposal.
Acknowledgement
Original author: arentweall Original link: https://daohaus.substack.com/p/-experiment-in-the-haus-a-new-contributor
This article was translated into Chinese on January, 2022. Appreciate the support and assistance of the DAOrayaki community. Chinese translation link:
https://daorayaki.org/daorayakirangers/posts/edit/63ea24c6481af1bc756c973c -