-
@ ece127e2:745bab9c
2023-09-08 17:56:16Cuando ya no
estés,habrá
alguien que
mirará en esos
cajones a los
cuales se
accedía
conociendo
artimañas que
solo sabías tu.
Ese ladrón te
espió, te siguió
hasta tus más
íntimos rincones.
Sorpresa se llevará al leer:
"aquí,no estás
solo ...yo te acompaño"
Álvaro González Novoa diciembre 2019
-
@ ece127e2:745bab9c
2023-09-08 17:50:15tirarse al piso ,rodar , ensuciarse , transpirar de tanto correr a ningún lado ,hacer equilibrio en un tronco , mirar como las olas vuelven al mar por encima de tus pies , marearse …marearse para el otro lado pensando que se va arreglar la primer mareada
….. correr las palomas intentando agarrarlas ,esconderse en el ropero y ver el polvo en el rayo de luz que entra por la rendija , tomar agua de la canilla sin poner las manos , hacer globitos con la saliva, tragarla y atorarse de tanto reir …..
eso, tan simple y tan complejo, ser niño
Álvaro González Novoa Nov 2015
-
@ ece127e2:745bab9c
2023-09-08 17:47:40Quedarme hasta las mil sirviendo grappa con limón... Escuchando veteranos que ya están de vuelta...
Con un camisaco celeste manchado de grasa de las milangas que frité toda la tarde para poner en esa vitrina... que hace años no enfría. Nadie las compra... pero me gusta picarlas tarde en la noche, para que los últimos beodos no se vayan a sus camas con el estómago vacío.
Di vuelta las sillas, apagué las luces , llegué a la puerta y medio de reojo, sin ganas y hasta por costumbre miré el bar vacío.
Cerré la cortina
Álvaro González Novoa JULIO 2018
-
@ ece127e2:745bab9c
2023-09-08 17:39:18Entramos y el olor a aceite de la máquina de coser y las mermeladas nos dan la bienvenida. Mis padres y los tíos ya habían arreglado todo, pero había que desvestirla.
Cada uno de nosotros tenia una historia escrita en alguna parte de esa casa.
Detrás del bargueño, estaba el agujero por donde se veían las capas de papel hasta llegar a la pared, me llevé un pedazo de cada uno, no pude llevarme la última capa, esa que yo solo conocía; algunos primos, los más chicos no pudieron llevar nada de ese pequeño tesoro.
En el fondo estaba la escalera construida por él, sobre el muro lindero, esa escalera que nos daba como premio los nisperos del vecino, ahora solo llegaba a un muro blanco alto, muy alto. La bajé y la dejé acostada en el piso, eso fue mi despedida
Álvaro González Novoa
-
@ b9e76546:612023dc
2023-09-05 22:12:21I feel like a lot of people have an inherent problem with this vague concept of “THE ALGORITHM” (which henceforth will receive the all caps & scary quote treatment) and their nostr feed that is entirely misplaced from the real problem of centralized social media, so I thought it would be good to address it directly.
First, “THE ALGORITHM” is just a set of rules that determines how you see your feed. There is no necromancy or joining of the dark side involved, and it has nothing to do with whether "THE ALGORITHM" is “good” or “bad.” The very idea of “not having an algorithm,” just means you want the algorithm to list the posts of who you follow in chronological order. It in no way means you are “algorithm free,” it just means that the rules of your feed are "take only the posts from the people I follow and order them chronologically," and that’s basically it.
Everything about the concept of a social network and the incredible potential and beauty of #nostr as a protocol is in controlling your experience, what content you see, and how you see it. This is literally the entire point of having follows, followers, and reposts in the first place. It's at the core of the very notion of what social media is. This is literally “an algorithm” in the same way as prioritizing new posts over old would be, or limiting those who post more, or amplifying those who post less in your feed. They are exactly the same kind of rules, they are different only in specificity.
So what’s the problem with “THE ALGORITHM” then? It’s nothing to do with some vague notion of an “unnatural” feed or whatever it might seem like since we seem to have developed this distaste for the very concept. The problem is purely that someone else has been specifically manipulating your feed against your best interests.
It’s the same issue as censorship. My blocking a dickhead who won’t shut up about their shitcoin or who squeals at me under every single post with demands to read some communist propaganda on my podcast, isn’t censorship, it’s me choosing who I interact with. Censorship is when an external participant, someone not involved in the conversation at all, decides that I should not see some idea or should not communicate with some person despite my explicit desire to do so, and is able to remove my access from it without my permission.
The same goes for “THE ALGORITHM.” It’s not a problem if I’m controlling it for my own feed, this is a basic and fundamental tool of digital filtering that absolutely must be embraced, not feared or run away from, because it’ll make a huge difference in the user experience. It’s simply that someone else shouldn’t be controlling it to be at odds with the content and experience that the user specifically wants and is trying to create. Only THEN it is a very bad "algorithm" and a dangerous relationship.
The problem with all of these things has nothing to do with what they actually are, its about who has control.
The user is always supposed to be in control of who they follow, the content and ideas they want to see, and the people they want to associate with. Only then is it truly a free market and open space guided and created by its users. The problem has always been about central points of control forcing information asymmetries that aren't real, censoring ideas that are beneficial to you and inconvenient to them, etc.
I always like to try to analogize these sorts of things to the IRL world to understand what makes them bad and why a good one is actually incredible important. In the real world, if you go to a party and decide to converse with your friend, while ignoring all others you are weighing their interaction higher than the others at the party. If you decide to play a game of beer pong with your friend, you are creating a very specific set of rules by which your interaction will fall into. Not because you enjoy the evils of "THE ALGORITHM," but because you want to get drunk and have a lot of fun. Censorship would be if some external govt or other party was able to mute your conversation from thousands of miles away, while you were standing in front of your friend talking to them. THEY interrupted your conversation and shut off your communication channel despite both of you explicitly agreeing to the interaction. Or you were having a conversation with your friend and the second they began telling you about how your mutual acquaintence in in the hospital with myocarditis, they vanish from the party and a person you don't even know immediately walks up to explain to you how safe and effective the Pfizer products are.
An IRL "evil algorithm" would be this external institution or person making a particular group at the party invisible to you without your knowledge, it would be forcing a beer pong table in front of you no matter where you went or what else you wanted to do. Constantly enticing you to get drunk and play a game you were doing everything to avoid. Even adding arbitrary obstacles to all other activities and dropping NLP messaging of "drink up" and "solo cup" into all of your conversations without your knowledge. As crazy as it sounds, this is essentially the norm. This is how our online environment has evolved. So it makes sense that when we broke free of that, we would have a horrible taste in our mouths for the very idea of "THE ALGORITHM." It certainly isn't irrational, despite being misplaced.
Being part of the digital world is a weird thing when comparing it to real life. There is never a situation in meatspace where one has to filter how they will talk to a million people all at once. The very notion is comically absurd. But this IS a consideration in the digital world. Its like being dropped into a seemingly unlimited ocean of content and people, which is to the individual, genuinely infinite, as more content and interactions are being added to it by the minute so fast that it would take a lifetime to even manually sort through it all. Blocking, filtering, information rules, value weights and yes, "THE ALGORITHM" aren't things that are nice to have, these things are critical, inescapable tools for navigating the endless ocean of the digital world. These are not things to be afraid of or label broadly as "evil" and avoided at all costs. To the contrary, they are basic pieces of the puzzle that I think we need to understand. We need to put them in the hands of the user, so we can do incredible things with them.
The one core concern, is quite simple: How do we enable the user to set the rules, and not a third party? In my opinion, this is all that distinguishes the ultimately good from the bad.
We must remember not to throw the baby out with the bath water. Creating "THE ALGORITHM" is not accepting an invitation from Darth Vader to join the dark side. It's just a means of curating your feed so you get the best experience you can, and you find the content, ideas, and community that you came to #nostr looking for.
When we realize the importance of custom controls and modes of interaction, then we realize what all of these clients really are. Every one of them is really just a different "algorithm" that the user can select from. One that shows only images, one that filters everything but a certain community or topic, one that organizes based on most zapped, or by the number of likes specifically from those in your network, and on and on. The potential of #nostr isn't an algorithm-free experience, it's in an ecosystem with an unlimited number of experiences to choose from so that each person can either choose or build the community that they want, in a global square with no rulers.
An important step to getting to the future we want is to understand, with specificity and nuance, the exact sources of the problems we are trying to fix, rather than painting broad strokes and just carrying around a bunch of baggage about a tool we should be using for ourselves. The promise of nostr, and Bitcoin, and so many other tools we are building on and embracing is to create at the communication layer, a foundation of freedom that can be accessed by every single user no matter where they are in the world.
So in short, there is no such thing as "THE ALGORITHM." The problem has always been about who has control over your digital world? Is it you, or is it someone else? In the fight to prevent that control from finding its way back into the hands of someone else, it would be foolish to let our PTSD over the past have us avoid the very tools that would let us build a future specifically tuned to give us the very value and and autonomy that we all seek.
-
@ 8fb140b4:f948000c
2023-08-22 12:14:34As the title states, scratch behind my ear and you get it. 🐶🐾🫡
-
@ 03742c20:2df9aa5d
2023-09-08 17:26:11Zap.stream : วิธีไลฟ์สตรีมบน Nostr
ผมได้รับคำถามจากหลายคนว่า Zap.stream คืออะไรและใช้งานอย่างไร ผมเลยเขียนคำแนะนำเบื้องต้นเกี่ยวกับการเริ่มใช้งาน Zap.stream ชิ้นนี้ขึ้นมา
เอาล่ะ เรามาทำความรู้จัก Zap.stream กันดีกว่า
Zap.stream คืออะไร?
Zap.stream เป็นแพลตฟอร์มไลฟ์สตรีมที่สร้างขึ้นบนโปรโตคอล Nostr เป็นไคลเอ็นต์อีกตัวที่ช่วยให้เหล่าสตรีมเมอร์ได้แสดงออกอย่างเต็มที่ และยังได้รับ Sats โดยตรงผ่านการ Zap⚡เพราะบน Zap.stream ไม่มีการเซ็นเซอร์ ไม่มีสิทธิพิเศษ และไม่มีการหัก Sats ให้กับแพลตฟอร์ม
“Road to affiliate”
ผมได้ลองเล่นตั้งแต่ช่วงแรก ๆ ตอนที่เหล่าสตรีมเมอร์ยังน้อยอยู่ ในช่วงนั้นไลฟ์ที่พบบ่อยคือเหล่านักพัฒนา ไม่ว่าจะไลท์นิง ไคลเอ็นต์ของ Nostr รวมไปถึงนักพัฒนาของ Zap.stream เองด้วย
พอเวลาผ่านไปไม่นาน แพลตฟอร์มก็พัฒนาเร็วมากจนถึงปัจจุบันที่มีฟังชั่นการ์ดสำหรับไว้ตกแต่งหน้าสตรีมเรา มีการกำหนด Goal ไว้สำหรับตั้งเป้าหมาย มี Emoji ที่เราสามารถสร้างเองได้และแอดของคนอื่นมาใช้ได้เช่นกัน
ผมก็ได้รับคำแนะนำจากผู้พัฒนาแพลตฟอร์มและเหล่าเพื่อนสตรีมเมอร์ด้วยกันมาพอสมควร เลยพอจะรู้วิธีการใช้งานและตกแต่งหน้าโปรไฟล์สตรีมแล้ว
เข้าเรื่องกันดีกว่า ว่าจะเริ่มใช้งาน Zap.stream อย่างไร
เริ่มต้นใช้งาน Zap.stream
Zap.stream เป็นไคลเอ็นต์ที่ทำงานบนเว็บเบราว์เซอร์ แต่ก่อนจะใช้งานอย่างแรกคุณต้องมีบัญชี Nostr เสียก่อน (หากคุณยังไม่รู้จัก Nostr ลองอ่านบทความนี้ครับ “Nostr: โซเชียลมีเดียเสรีไร้ศูนย์กลาง”)
สร้างบัญชี Nostr
มีหลายวีธีมากเลยที่จะใช้งานนอสเตอร์ แต่ในการใช้งาน Zap.stream ผมแนะนำให้ใช้ Getalby ในการผูก Private Key นอสเตอร์ไว้เพื่อใช้ล็อกอินและใช้เป็นไลท์นิ่งวอลเล็ต
Getalby
Getalby เป็นส่วนขยายบนเบราว์เซอร์ที่เป็นไลท์นิงวอลเล็ท และใช้งานล็อกอินบัญชี Nostr ในไคลเอ็นต์ต่าง ๆ ที่ทำงานบนเบราว์เซอร์ผ่านมาตรฐาน Nip-07
วิธีสมัครใช้งาน Getalby : YouTube
ไคลเอ็นต์ของ Nostr
เมื่อคุณมีบัญชี Getalby แล้ว จากนั้นก็เลือกไคลเอ็นต์ของ Nostr สักตัวเพื่อทำการใส่ข้อมูลของคุณ และใส่ไลท์นิงแอดเดรสเพื่อที่จะรับ Zap⚡ได้
หรือถ้าหากคุณบัญชี Nostr อยู่แล้ว คุณสามารถเอา Private Key มาผูกกับ Getalby ได้เลย โดยทำตามนี้ :
- คลิกที่ส่วนขยาย Getalby จากนั้นคลิกตรงชื่อที่คุณตั้ง แล้วเลือก “Account settings”
- จากนั้นกดที่ “Nostr Settings” แล้วคุณนำ Private Key มาวางเลย จากนั้นคลิก “Save”
Zap.stream
ไปที่เว็บไซต์ Zap.stream คลิกปุ่ม “Login” มุมขวาบน แล้วให้คุณเลือก “Nostr Extension” คลิกเข้าไปเลย แค่นี้ก็จะขึ้นบัญชีคุณแล้ว
- คลิกปุ่ม “Stream” เพื่อตั้งค่าก่อนจะไลฟ์
- เลือก Endpoint ที่ต้องการ
- ก็อบปี้ Stream URL/Stream Key ไปใส่โปรแกรมสตรีมของคุณที่สามารถยิงไลฟ์แบบ RTMP ได้
- ตั้งชื่อไลฟ์ของคุณตรง “Title”
- ใส่คำอธิบายไลฟ์เพิ่มเติมตรง Summary
- ใส่รูปปกไลฟ์ของคุณเพียงเอา URL รูปภาพมาใส่ตรง “Cover images”
- อย่าลืมตั้ง Tags ด้วยล่ะ จากนั้นคลิก “Save” ได้เลย
กดเติม “Topup” ก่อนไลฟ์ด้วยนะครับ และอย่างที่คุณเห็นจะมี Endpoint อยู่ 2 แบบที่เสียค่าใช้บริการไม่เท่ากัน งั้นเรามาดูกันสิว่ามันต่างกันอย่างไร
BEST
Best จะคิดค่าบริการ 10 sats/นาที และเสนอการเข้ารหัสฝั่งเซิร์ฟเวอร์สำหรับเอาต์พุตสตรีมของคุณ (source, 720P, 480P เป็นต้น) Zap.stream อาจเพิ่มคุณสมบัติใหม่ ๆ เพิ่มเติมในอนาคต เป็นแผนที่ผมแนะนำเพื่อให้ผู้ที่มาชมไลฟ์ได้รับประสบการณ์ที่ดี
Basic
Basic จะคิดค่าบริการเพียง 2.5 sats/นาที แต่ไม่มีการเข้ารหัสเอาต์พุตฝั่งเซิร์ฟเวอร์ หากคุณใช้ Basic ให้ลองตั้งค่าวิดีโอในโปรแกรมสตรีมเป็น 30 FPS และปรับขนาดเอาต์พุตเป็น 720P เพื่อคุณภาพการรับชมที่ดีที่สุด แต่ผู้ชมไลฟ์ที่มีการเชื่อมต่อที่ช้าอาจพบปัญหาวิดีโอที่ไม่ชัด
เมื่อคุณเลือกแผนได้แล้วก็เริ่มไลฟ์ได้เลย ลุย!!
คุณต้องมีโปรแกรมที่ไว้จัดการไลฟ์ตรีมของคุณ ในปัจจุบันมีหลายโปรแกรมให้คุณเลือกที่รองรับสตรีมแบบ RTMP แต่ผมแนะนำ OBS Studio อาจต้องตั้งค่าจัดการเองเยอะหน่อย แต่คุณสามารถใช้งานได้ฟรี
การตั้งค่า OBS Studio ไลฟ์สตรีมไปยัง Zap.stream
การตั้งค่า OBS Studio มีให้คุณเรียนรู้มากมายตามยูทูบหรือเว็บไซต์ทั่วไปเลย ถ้าคุณอยากออกแบบไลฟ์ของคุณได้หลาย ๆ แบบต้องลองศึกษากันดู แต่เรามาดูกันในส่วนที่เราจะยิงไลฟ์สตรีมของเราขึ้น Zap.stream กันก่อนครับ
มาเริ่มกันเลย
เมื่อจัดรูปแบบหน้าจอไลฟ์คุณพร้อม ให้กดที่ “Settings” จากนั้นไปที่เมนู “Stream” เลือก “Custom” คุณก็เอา Stream URL/Stream Key มาใส่แล้วกด "ตกลง" ได้เลยครับ
เมื่อคุณพร้อมไลฟ์แล้วกด LiveStream ได้ทาง OBS Studio โดยมันจะยิงสัญญาณเข้า Zap.stream ไลฟ์ของคุณก็จะขึ้นหน้า Zap.stream แล้วอย่าลืมกดแชร์ให้เพื่อนคุณได้เห็นด้วยล่ะ
ไคลเอ็นต์สำหรับดูไลฟ์บน Nostr
ผมคิดว่าอาจมีคนสงสัยว่าถ้าอยากดูไลฟ์สตรีมบน Nostr ต้องทำยังไง และดูได้ที่ไหนบ้าง ไคลเอ็นต์ที่สามารถดูไลฟ์ได้ในปัจจุบันยังมีน้อย แต่เท่าที่เห็นคือ :
- Zap.stream : ไคลเอ็นค์ที่เราใช้ไลฟ์นั่นเอง ร่วมสนุกกับการแชตและ Zap⚡ เห็นการ์ดต่าง ๆ บนโปรไฟล์ของผู้สตรีม แถมยังมีอิโมจิของผู้สตรีมให้เราได้ใช้อีก แต่ก็มีปัญหาบ้างที่พบบ่อยคือไลฟ์ขึ้นสถานะ Offline วีธีแก้ปัญหาเบื้องต้นให้คุณกดรีเฟรช หรือ F5 ไลฟ์ก็จะกลับมาปกติ ปัญหานี้อาจเป็นที่รีเลย์หรือสัญญาณอินเทอร์เน็ตของคุณ
- Nostrudel : เป็นไคลเอ็นอีกตัวบนเว็บเบราว์เซอร์สามารถ Login ด้วย Nip-07 หรือจะใช้ Private Key ก็ได้เช่นกัน ไคลเอ็นต์ตัวนี้ดูไลฟ์ค่อนข้างลื่นเลยทีเดียว โดยเราสามารถทั้งแชตและ Zap⚡ได้เหมือนกัน แต่ที่พิเศษไปกว่านั้น มันสามารถ Custom จำนวนแซตที่เราอยาก Zap⚡ได้อีกด้วย แต่ตอนนี้ UI อาจไม่สวยเท่าไหร่นัก
- Amethyst : เป็นไคลเอ็นต์บนแอนดรอยด์ ดูไลฟ์ค่อยข้างลื่นไหล พิมพ์แชตคุยกันสนุก แต่น่าเสียที่กด Zap⚡ให้คนสตรีมไม่ได้ หวังว่าในอนาคตจะมีการพัฒนาเพิ่ม
*หมายเหตุ : ทั้งสามไคลเอ็นต์มีช่องแชตเชื่อมต่อกันหมด ไม่ว่าจะใช้อันไหนก็แชตกันได้อย่างสนุก
เรามาเติมสีสันให้กับโฟรไฟล์ไลฟ์ และแชตของคุณกัน
เรามาทำความเข้าใจอีกสักหน่อยก่อนเริ่มไลฟ์กันครับ โดยเราจะเติมสีสันให้ไลฟ์ดูสนุกขึ้น และสามารถปรับใช้ในโพสต์ธรรมดาหรือในแชตของคุณได้อีกด้วย บน Nostr นั้นเนื้อหาทั้งหมดมีการระบุเหตุการณ์เฉพาะที่เรียกว่า “Nostr events” หากคุณต้องการอ้างอิงถึง events ใด ๆ ก็ตาม สามารถทำได้เพียงเพิ่มแท็ก “nostr:event_id” โดยอาจเป็นโน้ต ชุดอิโมจิ หรือเป้าหมายลงในช่องแชตหรือการ์ดได้ ตัวอย่างเช่น :
nostr:note1dacxa2nsy86659hehvz6c88z8p8dezjeg4nkvpuwc9x6q37l4keqaprfxq
วิธีสร้างหรือเลือก Emojis (อิโมจิ)
คุณสามารถสร้างอิโมจิของคุณเองได้ หรือจะใช้อิโมจิของคนอื่นก็ทำได้เช่นกัน
- โดยคุณไปที่ลิงก์นี้ https://emojis-iota.vercel.app/
- แล้วทำการ Login ด้วย Extension ของ Nostr ของคุณ (เช่น Get Alby)
- แล้วเลือกอิโมจิที่คุณอยากได้
- จากนั้นกดที่ขีดสามขีดทางขวาบนของอิโมจินั้น แล้วเลือก “Add to my emoji”
หากอยากสร้างอิโมจิเอง ให้คุณกดที่โปรไฟล์คุณทางมุมขวาบน แล้วเลือก “New emoji pack”
ตั้งชื่อแพ็กนำ URL รูปอิโมจิมาวางพร้อมตั้งชื่อ จากนั้นกด “Add Emoji” คุณสามารถเพิ่มอิโมจิได้จนกว่าจะพอใจ ขั้นตอนนี้อาจใช้เวลานานหน่อย เพราะต้องทำทีละตัว แต่เมื่อเสร็จสิ้นแล้วให้กด “Save” ได้เลย เพียงแค่นี้ก็จะขึ้นอิโมจิให้คุณใช้ในไลฟ์แล้วครับ
การตั้งเป้าหมาย Goals ของไลฟ์
คุณสามารถตั้ง Goals ได้ในขณะไลฟ์อยู่ เพียงคุณคลิกที่ “Add Goal” ตรงด้านบนช่องแชทต ใส่สิ่งที่ต้องการจะสื่อสารถึงคนที่มาดูไลฟ์ ตั้งค่าเป้าหมายจำนวน Sats จากนั้นกด “Save” ได้เลย คุณจะเห็น Goal ปรากฎขึ้นอยู่ข้างบนช่องแชต หากไลฟ์จบแล้วยังไม่ถึงเป้าหมายที่ตั้งใจไว้ หรือคุณอยากสร้างเป้าหมายพิเศษแต่งบนการ์ด เข้าไปที่ Zap⚡Goals คลิกที่เป้าหมายที่คุณต้องการ แล้วก็อบปี้ nevent จาก URL ข้างบนมาวางในแชตหรือในการ์ด โดยใส่แท็ก nostr: ตามด้วย nevent นั้น ๆ
Cards หรือการ์ดคืออะไร?
การ์ดเป็นเหมือน Widget ใต้สตรีมของคุณ คุณสามารถใส่โน้ต รูปภาพ ลิงก์ หรือสิ่งที่คุณอยากประชาสัมพันธ์ได้ ตัวอย่างเช่น กำหนดการไลฟ์ กฎการแชต รูปภาพที่อยากอวด แสดงอิโมจิที่ใช้ได้ เป้าหมายที่อยากได้ รวมถึงโฆษณาต่าง ๆ
วิธีสร้างการ์ด
ให้สังเกตมุมซ้ายล่างของจอ จะเห็นที่คำว่า “Edit cards” จะขึ้นเครื่องหมายบวก ให้คลิกเข้าไปเลย จากนั้นใส่ข้อมูลตามที่คุณต้องการ แล้วกด “Save”
และหากคุณต้องการใส่ Event ต่าง ๆ เช่น :
- บัญชี Nostr ของคนอื่น ให้พิมพ์ nostr: ตามด้วย nup
- เป้าหมาย Goal ที่อยากได้ ให้พิมพ์ nostr: ตามด้วย nevent ของเป้าหมาย
- อิโมจิที่อยากอวด ให้พิมพ์ nostr: ตามด้วย naddr ของอิโมจิ
- ข้อความที่คุณโพสต์ ให้พิมพ์ nostr: ตามด้วย note id ที่คุณต้องการ
หากคุณยังไม่เคยไลฟ์เลย จะไม่สามารถแต่งการ์ดได้ คุณอาจกดไลฟ์สัก 2-5 นาที แล้วปิดไลฟ์ แค่นี้คุณก็สามารถใช้เวลาแต่งให้หนำใจได้เลย
หากคุณอ่านมาถึงตรงนี้ ผมเดาว่าคุณน่าจะพร้อมไลฟ์สตรีมอะไรบางอย่างแล้วล่ะ ขอให้มีความสุขในการไลฟ์ อย่าลืมแชร์ไลฟ์มาให้เพื่อน ๆ ได้ดูกันด้วยนะ
หวังว่าบทความนี้จะมีประโยชน์ต่อกับผู้ที่สนใจทำไลฟ์สตรีมบน Nostr ฝากติดตามผลงานไลฟ์ “OnlyNips” ผมด้วยครับ ผมตั้งใจไลฟ์ทุกวันพุธ เวลาสามทุ่ม ไม่แน่ใจว่าจะมีสาระน่าฟังไหม แต่ตั้งใจจะพัฒนาเรื่อย ๆ ครับ แล้วเจอกันใน Zap.stream มาถล่ม Zap⚡กันให้สนุกไปเลย!
แถม widgets เอาไปใช้แต่งไลฟ์ของคุณน่าสนใจมากขึ้น
กดคัดลอก URL ไปใส่ OBS ได้เลย
- Zap Alert - ปรับขนาด 1920x1080
- Chat Widget - ปรับตามต้องการ
- Top Zappers - ปรับตามต้องการ
- Current Viewers - ปรับตามต้องการ
Welcome to Nostrstream
-
@ 7d4417d5:3eaf36d4
2023-08-19 01:05:59I'm learning as I go, so take the text below for what it is: my notes on the process. These steps could become outdated quickly, and I may have some wrong assumptions at places. Either way, I have had success, and would like to share my experience for anyone new to the process. If I have made any errors, please reply with corrections so that others may avoid potential pitfalls.
!!! If you have "KYC Bitcoin", keep it in separate wallets from your "Anonymous Bitcoin". Any Anonymous Bitcoin in a wallet with KYC Bitcoin becomes 100% KYC Bitcoin.
!!! It took me several days to get all the right pieces set up before I could even start an exchange with someone.
!!! Using a VPN is highly recommended. If you're not already using one, take the time to find one that suits you and get it running.
!!! If you don't normally buy Amazon Gift Cards, start doing so now, and just send them to yourself, or friends that will give you cash in return, etc. For my first trade, Amazon locked me out of my account for about 22 hours, while I was in the middle of an exchange. All because I had never purchased an Amazon Gift Card before. It was quite nerve wracking. My second trade was for $300, and although my Amazon account wasn't shut down, that order had a status of "Sending" for about 22 hours, due to the large amount. In each of these cases I had multiple phone calls with their customer support, all of whom gave me false expectations. Had I already been sending gift cards to the anonymous email address that I created in the steps below, and maybe other anonymous email addresses that I could make, then I might not have been stalled so much.
-
Install Tor Browser for your OS. The RoboSats.com website issues a warning if you are not using Tor Browser. If you don't know what Tor is, I won't explain it all here, but trust me, it's cool and helps keep you anonymous. If you use Firefox, the interface will look very familiar to you.
-
Create a KYC-free e-mail address. I used tutanota.com in Firefox, as it would not allow me to create an account using Tor Browser. After the account was created, using Tor Browser to login, check emails, etc. has been working perfectly. Tutanota requires a 48 hour (or less) waiting period to prevent bots from using their system. You'll be able to login, and even draft an email, but you won't be able to send. After you've been approved, you should be able to login and send an email to your new address. It should show up in your Inbox almost instantly if it's working.
-
Have, or create, at least one Lightning wallet that is compatible with RoboSats.com and has no KYC Bitcoin in it. The RoboSats website has a compatibility chart available to find the best wallet for you. During an exchange on RoboSats, you will need to put up an escrow payment, or bond, in Satoshis. This amount is usually 3% of the total amount being exchanged. If the exchange is successful, the bond payment is canceled, leaving that amount in your wallet untouched, and with no record of it having been used as escrow. If you don't hold up your end of the trade, the bond amount will be transfered from your wallet. I created a wallet, using my new email address, with the Alby extension in the Tor Browser. This anonymous wallet was empty, so I used a separate wallet for the bond payment of my first trade. This wallet had KYC Bitcoin, but since it is being used for a bond payment, and no transaction will be recorded if everything goes okay, I don't mind taking the minuscule risk. After the first trade, I don't need to use the "KYC wallet", and I will use only my anonymous Lightning wallet for transactions related to performing a trade.
-
Create a new Robot Token by going to RoboSats using the Tor Browser. Copy the Token (Robot ID) to a text file as a temporary backup. It is recommended to create a new robot-token for every session of exchanges you make.
-
Select "Offers" to browse what others are presenting. "Create" is for when you want to create an offer of your own. You may need to create your own offer if none of the existing offers match your criteria.
-
Select "Buy" at the top of the page.
-
Select your currency (USD).
-
Select your payment methods by typing "amazon" and selecting (Amazon Gift Card). Repeat this process and select (Amazon USA Gift Card).
-
Determine Priorities - If you prefer to trade quickly, and don't care as much about premiums, look for users with a green dot on the upper-right of their robot icon. If you're not in a hurry, sort users by premium and select the best deal, even if they are inactive. They may become active once they are notified that their offer has activity from you.
-
The Definition of Price = the price with the premium added, but not the bond
-
A. Find A Compatible Offer - Select the row of the desired offer and enter the amount you would like to buy. i.e. $100 If you do not find a compatible offer, you will have to create your own offer.
B. **Create An Offer** - First, take a look at "Sell" offers for your same currency and payment method(s) that you will be using. Take note of the premium those buyers are willing to pay. If your premium is drastically less than theirs, your offer may get ignored. Select "Create" at the bottom of the screen. There is a slider at the top of the screen, select it to see all the options. Select "Buy". Enter the minimum and maximum amount that you wish to spend. Type "amazon" to select the methods that you would like to use (Amazon Gift Card, Amazon USA Gift Card). For "Premium Over Market", enter an amount that is competitive with premiums you saw at the start of this step and do not use the % sign! You can adjust the duration, timer, and bond amount, but I leave those at their default settings. Select the "Create Order" button, and follow the instructions for making a bond payment.
-
Pay the Bond - Copy the invoice that is presented. From your wallet that contains bond funds, select "Send", and paste the invoice as the recipient. This money will never leave your account if the exchange completes without issue. No transaction will be recorded. If there is a complication with the exchange, it is possible that this transaction will complete.
-
Create and Submit Your Invoice for Their Bitcoin Payment To You - Select "Lightning", if not selected by default.* Select the Copy Icon to copy the correct amount of Satoshis. This amount already has the premium deducted. From your anonymous Lightning Wallet, select "Receive", and paste the Satoshi amount. If you enter a description, it's probably best to keep it cryptic. Copy the invoice and paste it into RoboSats; then select "Submit".
* If you plan on "mixing" your Bitcoin after purchase, it may be better to select "On Chain" and pay the necessary fees swap and mining fees. In the example this comes from, Sparrow wallet is used and has whirlpool ability in its interface.
-
Connect With Seller and Send Funds - Greet the seller in the chat window. The seller has now provided RoboSats with the Bitcoin to transfer to you. Your move is to buy an Amazon eGift Card for the amount of the trade. Log in to your Amazon account and start the process of buying an eGift card. For delivery there is the option of email or txt message. Ask the seller what their preference is, and get their address, or phone number, to enter into Amazon's form. Complete the purchase process on Amazon, and check the status of your order. Once you see the status of "Sent", go back to RoboSats in your Tor Browser.
-
Confirm Your Payment - Select the "Confirm ___ USD Sent" button and notify the seller to check their e-mail/txt messages.
-
Seller Confirmation - Once the seller select their "Confirm" button, the trade will immediately end with a confirmation screen.
-
Verify - If you check the anonymous wallet, the new amount should be presented.
-
-
@ e6817453:b0ac3c39
2023-08-12 15:42:22The Zooko’s Triangle is a concept in the realm of naming systems, specifically for decentralized or distributed networks. It was named after Zooko Wilcox-O’Hearn, a computer scientist and cypherpunk known for his work on the Zcash cryptocurrency. The triangle illustrates a trade-off between three desirable properties in a naming system:
- Human-meaningful: Names are easily understood and remembered by humans.
- Decentralized: No central authority controls the allocation or management of names.
- Secure: Names are unique and cannot be easily taken or manipulated by others.
Zooko’s Triangle posits that achieving all three properties in a single system is difficult. Traditionally, a system could have only two of the three properties, leading to various combinations of naming systems with their respective advantages and disadvantages.
However, recent developments in cryptographic and distributed systems have led to solutions that challenge the traditional constraints of Zooko’s Triangle. One such system is the Decentralized Identifiers (DIDs).
DIDs
Decentralized Identifiers (DIDs) are a new identifier for verifiable, decentralized digital identity. DIDs are designed to be self-sovereign, meaning that individuals or organizations control their identifiers without relying on a central authority. DID systems are built on top of decentralized networks, such as blockchain or distributed ledgers, providing a secure and tamper-proof infrastructure for identity management.
DIDs aim to achieve the three properties of Zooko’s Triangle:
- Human-meaningful: While DIDs may not be human-meaningful due to their cryptographic nature, they can be associated with human-readable names or aliases.
- Decentralized: DIDs are managed on decentralized networks, removing the need for a central authority.
- Secure: The decentralized nature of DIDs, combined with cryptographic techniques, ensures that identifiers are unique, secure, and resistant to tampering.
In summary, Zooko’s Triangle presents a trade-off between human-meaningful, decentralized, and secure properties in naming systems. Decentralized Identifiers (DIDs) are an example of a system that seeks to overcome the traditional limitations of the triangle by leveraging decentralized networks and cryptographic techniques to provide a more comprehensive solution for digital identity management.
-
@ e6817453:b0ac3c39
2023-08-12 15:41:59Organizational identifiers
Organizational identifiers have different sets of requirements and functions. It is not enough to have per-to-peer private communications. Organizations are more public, so we need publicly resolvable identifiers. DID:key satisfy this condition entirely but fails to fulfill the organization's needs.
- Organizations quite often act as issuers of credentials or attestations. For issuance, it is critical to have the possibility to rotate signing keys or even deactivate or delete identifiers if keys or issuer get compromised or to comply with security company policies.
- Organizations often require a split between the Controller of the identifier and the Identifier subject or even a transfer of the identifier subject.
- Organizations must have complete control of infrastructure and effectively manage resources and costs. The price of a single identifier should be fixed, and the method of creating new identifiers should be scalable.
- One of the essential requirements is trust and governance and transparent mechanics of proving and binding an identifier to an organizational entity and creating trust relations.
- Access to Identifier management is quite often controlled by a group of users
Nonfunctional requirements
- portability
- interoperability
- scalability
- Autonomous and control
- security
In my previous articles, we talk about Autonomous identifiers and how they differ from regular DIDs.
To recap
Autonomous identifiers (AIDs) are DIDs generated algorithmically from a crypto- graphic key pair in such a way that they are self-certifying, i.e. the binding with the public key can be verified without the need to consult any external blockchain or third party. KERI is an example of a decentralized identity technology based entirely on AIDs. © https://trustoverip.org/blog/2023/01/05/the-toip-trust-spanning-protocol/
In a previous article, I show how to create and use a did:key as an Autonomous identifier that feet well to private person-to-person secure communication.
Architectures and protocols that build on top of AIDs have few critical properties
- self-hosting and self-contained
- self-certified and Autonomous
- portable
- interoperable
- full control of infrastructure
- cost management
Nowadays, I discovered a few AIDs methods
- did:key — self-contained and public
- did:peer — self-certified, upgradable but private
- KERI based did — we waiting for did:keri method to be announced soon, but KERI infrastructure could be used to build internals of did:peer or similar methods.
- did:web — public, self-certified, and self-hosted method, but still, we have active community discussion and critics as far as it fully relays to ownership of domain name that could be stolen or re-assigned.
So we have to choose from did:key did:web and I hope in a future from did:keri.
To move forward, we need to understand the DID architecture better and how all parts are connected.
In many cases of personal or sovereign entities Subject and the Controller are the same, but for Organisations, it could have a crucial difference.
DID Subject
The DID subject is the entity that the DID represents. It can be a person, organization, device, or other identifiable entity. The DID subject is associated with a unique DID that serves as a persistent, resolvable, and cryptographically verifiable identifier. The subject is the primary focus of the identity management process and typically has one or more DIDs associated with it.
DID Controller
The DID controller is the entity (person, organization, or device) that has the authority to manage the DID Document associated with a particular DID. The DID controller can update, revoke, or delegate control of the DID Document, which contains the public keys, service endpoints, and other information required for interacting with the DID subject.
In many cases, the DID subject and DID controller can be the same entity, especially for individual users who create and manage their DIDs. However, in some situations, the DID controller may differ from the DID subject, such as when an organization manages the DIDs on behalf of its employees or when an administrator manages a device.
In summary, the DID subject is the entity the DID represents, while the DID controller is the entity with authority to manage the associated DID Document. Depending on the specific use case and requirements, these roles can be held by the same or different entities.
Key Pair
It is simple from the first point of view. Key-Pair is an asymmetric public and private key. One of the main DID functions is the distribution of public keys. DIDDoccument could contain multiple public keys with authorization rules and key roles.
Identifier
Representation of did itself. is a part of DID URI.
DID:Key
did:key identifier
DID web
did:web
Relations
Relations between all parts of DID identifier can be illustrated in the following diagram. DID method dictate how DID identifier gets created, updated, deactivated, and resolved.
Focusing on the relations of the controller, key pairs, and the identifier is more interesting for us.
The most significant power and benefit of DID are decoupling a key pair from a controller and identifier. It allows the rotation of keys and changes the ownership of the identifier and its subject and controller. It is the main competitive advantage of DID and SSI over web3 wallets and raw keys.
The ideal case is KERI infrastructure that decouples all parties via cryptographic binding and protocols.
To discover more, read the paper.
We used did: keys as AID in the previous article. DID:key is a cryptographically bound identifier to the public key but cannot change the binding. As a result, keys couldn't be rotated in the future. The controller has no binding except to prove private key ownership via the signature-based protocol.
On the other side, DID:web does not have a cryptographic binding of an identifier to a key pair from one side. It gives an easy possibility to rotate keys but loses the verifiability of the identifier.
The most interesting part is the Controller to identifier binding in a did: web. It is based on proof of domain name ownership and website resource. As I mention, it has some security considerations and critics in a community. Still, at the same time, we get a critical mechanism that settles trust and connects identifiers to the organization entity.
The mechanism of web domain ownership is well-defined and easy to explain to other users, even outside of SSI and web5 domain. It is getting wider adoption and creating a lot of use cases for organizations. So it helps to create a trust relationship between an identifier and organizational entity in a very transparent, human-readable, and self-explained way — the identifier hosted on the corporate domain belongs to the organization. On another side, it makes the transfer of the controller almost impossible. That's why it is critical to differentiate between a subject and a controller.
I believe that did:web still covers a lot of organizational cases and is suitable for issuing Verifiable Credentials and attestations on behalf of organizations.
Step-by-step guide on how to create and manage did:web you could find in my article
More detailed step-by-step coding guide with the live example you could find in my SSI notebooks book
-
@ 32e18276:5c68e245
2023-08-07 16:10:07Hey guys,
I spent some time this weekend fixing a bunch of the bugs that were introduced in the latest nostrdb refactor. See the changelog below for the full list of changes in the latest build!
Planned this week
I have a big list of things I'm planning on adding to Damus this week:
- Lists!
- Zap improvements: Bringing back top zap comments in threads, profile zap comments in notifications, Private DM Zaps
- Video player improvements
- Sharing improvements (share to damus, etc)
Make sure to come back in a week to see how much I could get done!
Changelog
Added
- Add close button to custom reactions (Suhail Saqan)
- Add ability to change order of custom reactions (Suhail Saqan)
- Adjustable font size (William Casarin)
Changed
- Show renotes in Notes timeline (William Casarin)
Fixed
- Ensure the person you're replying to is the first entry in the reply description (William Casarin)
- Don't cutoff text in notifications (William Casarin)
- Fix wikipedia url detection with parenthesis (William Casarin)
- Fixed old notifications always appearing on first start (William Casarin)
- Fix issue with slashes on relay urls causing relay connection problems (William Casarin)
- Fix rare crash triggered by local notifications (William Casarin)
- Fix crash when long-pressing reactions (William Casarin)
- Fixed nostr reporting decoding (William Casarin)
- Dismiss qr screen on scan (Suhail Saqan)
- Show QRCameraView regardless of same user (Suhail Saqan)
- Fix wiggle when long press reactions (Suhail Saqan)
- Fix reaction button breaking scrolling (Suhail Saqan)
- Fix crash when muting threads (Bryan Montz)
-
@ 32e18276:5c68e245
2023-08-03 21:05:05Hey guys,
I've been quiet lately... I've been working on something big. In the past 2 weeks there have been 9539 new lines of code added to damus, 2928 removed, 279 files changed. I've rewritten much of the codebase in preparation for the nostrdb integration.
nostrdb
What is nostrdb? nostrdb is an integrated relay within damus, with the same design as strfry, but slightly different to support embedding into nostr apps. This will be the heart of Damus apps going forward, including notedeck and other future microapps. Think of it as a kind of development kit but with an embedded database and query capabilities. I didn't want to have to recreate all of the same querying, caching, and parsing code when building new apps, nostrdb will solve all of the painful and slow parts. nostr seems simple but if you want a fully working app it is pretty complicated, especially if you want it to be fast and sync efficiently.
Goals
- be the best and most efficient at querying, syncing and storing nostr notes
- enable direct mapping of notes into application code without any serialization overhead
- provide advanced syncing capabilities such as negentropy, which allows us to only query stuff we don't have
- be as portable as possible. nostrdb is a C library that you can embed into basically anything.
- full relay filter support
- full text search
Benefits
- full note verification
- more efficient de-duplication before we begin processing events off the wire
- set-reconciliation based syncing (negentropy) drastically reduces bandwidth usage and latency
- iteration on future nostr apps will be quicker (android, desktop, etc)
- features like ghost mode, account switching, etc will be much more efficient as you will be able to quickly switch between notes that are cached locally
- much smaller memory footprint due to optimized in-memory note format, which in turn improves cpu-cache efficiency
- much better profile and note searching
So that's what I've been working on in the past two weeks. On to what else is new in this release:
Multi reactions!
Suhail did an amazing job at adding multiple reaction support. All you need to do is long-press the Shaka button to show different options. You can customize these in settings as well
New onboarding features
Damus will now suggest people to follow when you first enter the app, this is the first of many onboarding improvements coming soon. Thank Klabo for this one!
That's all for now! Please test thoroughly and let me know if you run into any issues. You likely will since the entire codebase has been changed, and I probably broke something.
Until next time 🫡
-
@ 32e18276:5c68e245
2023-07-30 21:19:40Company Overview:
Damus is the pioneering iOS nostr client. Through its platform, Damus empowers billions on iOS with the tools for free speech and free speech money. If you're driven to bring freedom technology to the masses and ignite change, we invite you to join our mission.
Job Description
- Collaborate on iOS Damus in tandem with our core developer, Will Casarin, and the broader Damus team.
- Implement our vision as laid out in our product roadmap: https://github.com/orgs/damus-io/projects/3/views/1.
- Embrace the fun and critical mission of undermining totalitarian regimes across the globe.
Job Requirements
- A genuine passion for freedom technology.
- At least one year of collaborative development experience.
- Experience building SwiftUI iOS apps.
- Passionate about design and user experience.
- Eager to work in close coordination with Damus lead developer, Will, and a dedicated team spanning development, design, and product.
- Commitment to a full-time role, although we remain open to discussing alternative arrangements.
Bonus Qualifications
- Experience with Nostr development.
- Experience with C.
- Previous work in free and open source projects.
- A publicly shareable portfolio.
Job Structure
- A one-month paid probationary period to ensure a mutual fit.
- Upon successful completion of the trial, the opportunity for a six (6) month contractual engagement.
- The potential for contract renewal, contingent on funding.
Application Process:
Interested candidates should forward a motivational statement alongside their CV/portfolio to vanessa@damus.io. -
@ 8fb140b4:f948000c
2023-07-30 00:35:01Test Bounty Note
-
@ a412e5ba:5271cc80
2023-09-08 17:03:14Michael Saylor likes to say this and over the last few years I've come to understand a little bit more about what he means when he says it. When voices like his first started coming into the space I had to do some soul searching about whether there was still room for me here. I'm much more comfortable on a picket line than in a boardroom. I've come to believe he genuinely wants to give people hope but not the empty sort that comes from unrealistic expectations. I think he wants to give them the tools they need to become strong and resilient so that if they do the right things, put in the work, they can believe that better days are possible. He created a website called hope.com devoted to giving people the tools to build lives full of potential. He created an entire free online school for people who are willing to hone those skills and focus them on creating a brighter future. I think that kind of hope, the kind that comes from knowing that there is something beyond your struggle, something worth fighting for, is a good thing. I know that there are irrational merchants of Hope, scammers, who prey on desperate people who feel trapped in hopeless situations. There are lots of people who see the whole Bitcoin community that way. I don't. I believe Michael Saylor created these things and made them freely available because he believes in Hope and knows how hard it can be to find and how easy it can be to lose.
I understand those who are skeptical. In fact, I have not always been the biggest fan of Hope myself. There was a decade of my life, ironically leading right up to the creation of bitcoin, that I was starting to feel a little bit beaten down. Over that period both of my parents died far too young and far too soon, our house burned down, and a business that I had run for many years was bankrupted in the Great Financial Crisis, costing us well……a lot of money and turning what I once thought would be our legacy to our children into a smoldering pile of debt. At the end of that time I'm not certain that I had the courage to Hope. My mom used to say that hope is what bridges the gap between Faith and Grace. When the second decade of the 21st century began, I really didn't have much Faith and I wasn't sure that I was worthy of any Grace, so to me Hope felt like a bridge to nowhere.
Now I want to admit something that no HODLer is ever proud to admit.
I have sold Bitcoin.
Did we sell it because we lost hope? Well, I guess that really is the point of this little commentary.
We have not sold all of it, but we’ve sold bits and pieces along the way that were meaningful to us at the time. We sold some in 2015 because, coming on the heels of a decade full of nothing good, I just needed to book a win. My son and I had originally gotten into Bitcoin mining together when he started college. Our goal for that all along was for him to buy a house after he graduated so we sold some to make his down payment. (This was by far our biggest dollar denominated sale ever). I sorta regret selling some in 2018 to buy a beat-up old Volvo that I now realize was the most expensive car I’ve ever owned. (I know how to spin a wrench so I’ve never paid more than $10,000 for a car. I’ve bought several for under $500 that lasted for years). We sold some in 2021 because I'm getting to be an old guy and….life. But all together these sales (other than the down payment) have been a small piece of what we have. We would be perfectly happy if someday our children spent the majority of our Bitcoin.
Now that Bitcoin is in the middle of another Bear market I’ve been having these discussions with other Bitcoiners about when and why we have sold or might sell. No one can know the future but when we look back on the past few years, the money has certainly mattered. My wife and I are both in public education and of moderate means. Our kids did without a lot of things when they were young, especially right after our house fire, that a lot of their friends did not go without. I think we’ve passed along our relatively frugal ways to them. We may also have unintentionally passed along a certain sense of insecurity that many of their peers do not have. It is entirely possible that we have far too many canned goods in our pantry and I’m certain my kids wondered why none of their friends had stockpiles of powdered dry milk. We didn’t do this entirely as a result of a single house fire and a few bad business decisions or because we were starting to feel desperate and hopeless. It's not pessimists who plan for hard times, it's optimists. Pessimists assume that they will simply crumble in hard times and that will be the end of it. Optimists know there is something beyond the hard times, something to get through them for.
During the 10 years after High School that I spent partly in the Army Reserves and occasionally trying to earn a 4 year degree, I traveled to other countries that did not enjoy our American Standard of Living. I saw suffering that I had not seen growing up in rural Minnesota. I saw places that once had hope and lost it, and were struggling to find it again.
My wife and I met in the Peace Corps in West Africa and we watched a country unraveling as it descended into Civil War. I lived in a cinderblock house with a tin pan roof that was plumbed for water and wired for electricity. The people who built that house had the hope that it takes to create things. The people who diverted the water supply to the house of a “Big Man” and rolled up the copper wires to sell on the black market knew only the desperation that comes from destruction.
For the last 27 years I’ve worked with Refugees from all across the world who have just arrived here and are beginning to put their lives back together. Every day I listen to stories of people who have either recently lost every material thing they owned or may fear losing what they hold most dear. But they didn't just give up, instead they came here because they still have one thing. They came because they still have hope.
When I’m telling my other rural Minnesotan friends, the ones who have not seen a country dissolve in the blink of an eye, about the people I work with and the horrific circumstances that caused them to leave their homelands, my local friends often ask, “If things were so bad, why they didn’t leave sooner?”. Nobody plans to stay until it’s too late. They stay too late because they don’t know what time it is. I know a woman whose mother sat in a school board meeting one night with the mother of a soldier who would come to their street two days later to remove them from their home at gunpoint and send them to the camps. For years I shared my office with two people whose close relatives had killed each other back home and most likely, given the chance, would have tried to kill them as well. I work with a man who guided hundreds of people through the landmine checkered rice paddies of SE Asia into Refugee camps where he knew assassins with his picture would be waiting for him. So when I tell people that I think it's a good idea to have 3 - 6 months of expenses available for emergencies, I’m not just repeating something I read in one of my Certified Financial Planning courses. We know people who have survived tremendous hardships they could not have expected. We have needed those emergency funds for actual emergencies that we could not have avoided because, just like the people I work with, we simply didn’t see them coming. So we stocked our pantry to get through hard times that we knew we would also not see coming. And because, like the Refugees I’ve met over the years, we know that on the other side of an unexpected crisis there can still be hope.
I was raised by generations of people who read these words of Rudyard Kipling and took them to heart.
If you can make one heap of all your winnings And risk it on one turn of pitch-and-toss, And lose, and start again at your beginnings And never breathe a word about your loss; If you can force your heart and nerve and sinew To serve your turn long after they are gone, And so hold on when there is nothing in you Except the Will which says to them: ‘Hold on!’
Our parents and grandparents also came here with nothing and stopped to build a new life in a land that for three months out of the year is a frozen hellscape where the air sometimes hurts your face. They may also have left their homes out of fear and desperation but they stopped here because every Spring the ice melts to uncover bountiful rolling hills and vast fields with fertile topsoil that reaches down over 15 feet deep. There are some who say that the essential characteristics of these people were Stoicism or Bravery but I personally believe it was hope. Hope that somewhere in that 15 feet of topsoil there lay the potential for rich fruits and vegetables for their families and ample grain for their livestock. Every spring they were surrounded by reminders that hard times pass and good things are still possible.
And now we find ourselves in another Bitcoin winter, one that many of us thought might already be over, fearful about whether that topsoil has survived underneath the blowing snow. Every spring seems to bring one last snowfall long after you’ve worked up the courage to put away the boots and hats. Winter gives you one last opportunity to stand in an icy puddle in your flip flops looking like a fool. One last chance to wonder….should I sell…more?
These are the times that I truly appreciate every other Bitcoiner who has the courage to dream of a brighter future. I never bought Bitcoin to someday simply own a better car or “sell the top” and walk back into the world that beat me down a decade ago with a few more dollars in my pocket. I bought Bitcoin because I believed a better world was possible, an abundant world full of the boundless optimism of builders and planters, a world that produced steamer ships and Golden Gates, railroads and Saturn Rockets. There have been times, during that dark decade, that I needed that bridge, that I stood alone and shivering in a parking lot and I needed more than just a set of jumper cables.
More than money, I needed Hope.
-
@ 5462f0ab:cdaf7e87
2023-09-08 12:28:57A robotic "dog" has been used to carry out surveys of two Cold War weapons testing facilities, in a first for the National Trust.
Drones and a mobile robot surveyed the off-limits buildings at Orford Ness, Suffolk, a national nature reserve which was once a military testing site.
The laboratories are closed to the public and staff for safety reasons.
Colin Evison, from the robot's operator BAM Nuttall, said the aim is to capture the buildings' "size and geometry".
It was Aimee's first time operating the robot, called Spot, outside the BAM depot, which she does using touch-screen technology Russell Clement, the National Trust's general manager for Suffolk and Essex Coastal, said accessing the area was "a bit of a headscratcher".
"These buildings are completely inaccessible but really really important. They're going to be lost to the sea eventually," he said.
"We want to know how to record them and here we are we had this amazing, cutting-edge technological solution."
Russell Clement said the buildings were in curated decay so the National Trust monitors and records them
Constructed in 1960, the buildings, known as pagodas, were two of six laboratories used as test cells to carry out environmental tests on the atomic bomb.
The tests were designed to mimic the rigours to which a weapon might be subjected before detonation, including vibration, extremes of temperature, shocks and G forces.
- Off-grid coastal nature reserve to get solar panels
- Nature reserve aims to halt bird species decline
- Could you work on a former weapons testing island?
No nuclear material was involved, but a test failure could have resulted in a catastrophic explosion, so the laboratories were designed and constructed with a shingle top to absorb and dissipate if an explosion occurred.
As the concrete decays, it has become too risky to allow people inside the pagodas
The drones and robotic "dog", nicknamed Spot, were designed by Boston Dynamics and the survey is the first stage of a long-term project, which includes Historic England, civil engineering contractors BAM Nuttall and University College London.
Mr Evison, who is BAM Nuttall's innovations and technical lead, said the charity spotted the company's robotics work in the Shetlands.
"We can survey buildings too hazardous to put people in so we can get a detailed survey without putting people in harm's way," he said.
"We want to capture the size and the geometry of the building, because they are under managed decay at the moment, but we also wanted to create some content so visitors can have a look inside - there's no other means we can do that."
The National Trust acquired Orford Ness from the Ministry of Defence in 1993 and the buildings are scheduled monuments, with the same protection as Stonehenge
The trust said it was the first time it had used this kind of technology.
Mr Clement said it had two aims with the project: "One is recording in really great detail these extraordinary buildings and secondly is allowing people to access them.
"With the data, we'll be able to recrate them virtually and people will be able to experience the interiors of these incredible buildings."
The shingle spit was used as a secret military test site from 1913 to the mid-1980s
By:Katy Prickett and Alex Dunlop Link:https://www.bbc.com/news/uk-england-suffolk-66743327
-
@ aa8e5554:071fd9fc
2023-09-08 11:19:11Are you ready to showcase your creativity and make an impact in the Solana blockchain ecosystem?
The Solana Hyperdrive Hackathon, hosted by the Solana Foundation, has officially begun, and you can now register and submit your projects on the global hacker and developer platform, DoraHacks.io. With a massive prize pool and seed round funding of USD 1,000,000, this hackathon presents an incredible opportunity for developers to shine.
As the 8th edition of this esteemed hackathon, it features seven tracks covering various areas such as DePIN, AI, DeFi, Payments, Gaming, Mobile User DApp, Infrastructure, DAO, and Network State.
Whether you're passionate about decentralized applications, artificial intelligence, or building the infrastructure for the future of Solana, there's a track for you to explore and innovate.
Looking to participate in a hackathon that supports Solana blockchain and offers exciting rewards?
The Solana Hyperdrive Hackathon also extends its support to the Asia-Pacific region with an exclusive APAC prize pool of USD 30,000. This initiative aims to encourage and recognize outstanding projects emerging from the vibrant tech communities in the Asia-Pacific area.
Apart from the generous prize pool and potential seed round funding, the best projects will receive three tickets to Solana Breakpoint 2024 and a chance to present their work. It's the perfect chance to take your ideas to the next level.
If you're located in India, there's even more excitement in store for you. Two offline Hacker House events will take place during the Hackathon, offering an opportunity for local developers to connect, collaborate, and exchange ideas.
The deadline for project applications is October 15th, so make sure to register and submit your projects before then.
Ready to embark on this exhilarating journey? Visit the official Solana Hyperdrive Hackathon page on DoraHacks.io to register and access all the necessary event details.
The future is in your hands. Let your creativity shine!
-
@ f40832e2:bcbf511e
2023-09-08 10:43:54[3]
[4]
[5]
[6]
[7]
[8]
[9]
[10]
[11]
[12]
[13]
[14]
[15]
[16]
[17]
[18]
[19]
[20]
[21]
[22]
[23]
[24]
[25]
[26]
[27]
[28]
[29]
[30]
[31]
[32]
-
@ aa8e5554:071fd9fc
2023-09-08 09:08:10你准备好在 DoraHacks 平台上展示你的开发技能、投入区块链世界了吗?
DoraHacks.io 刚刚发布多个令人兴奋的黑客马拉松,包括:
- ATOM Accelerator 的 AEZ Boost 黑客松
- BinaryX 网络黑客松 2023
- Akash-a-thon
- Comdex 黑客松
- Althea iFi 黑客松
- 更多陆续推出!
准备参加更多即将举行的焦点黑客松:
- Klaymakers 23 黑客松
- Linera 秋季开发者课程 2023
- Hackmos Cosmos 伊斯坦布尔黑客松
- 以及其他精彩活动!
不要错过参与区块链创新浪潮的机会。
参与 DoraHacks.io 平台活动,释放您的潜能!
-
@ fab018ad:dd9af89d
2023-09-08 08:04:432. ส่องไส้ในธนาคารโลกและ IMF
“ขอให้พวกเราอย่าลืมว่าจุดประสงค์หลักของการให้ความช่วยเหลือนั้น ไม่ใช่เพื่อช่วยประเทศอื่น แต่เป็นไปเพื่อช่วยพวกเราเอง”
–Richard Nixon
>หมายเหตุผู้แปล : ริชาร์ด นิกสัน (Richard Nixon) ประธานาธิบดีคนที่ 37 แห่งสหรัฐ ดำรงตำแหน่งตั้งแต่ ค.ศ. 1969 จนถึง ค.ศ. 1974
IMF นั้นถือเป็นผู้ให้กู้ยืมแหล่งสุดท้าย (Lender of Last Resort) และธนาคารโลกก็คือธนาคารเพื่อการพัฒนาที่ใหญ่ที่สุดในโลก ทั้งสององค์กรนี้ทำหน้าที่ภายใต้นามของบรรดาเจ้าหนี้รายใหญ่ของพวกเขา ซึ่งตามประวัติศาสตร์แล้วเจ้าหนี้พวกนี้ก็คือสหรัฐอเมริกา สหราชอาณาจักร ฝรั่งเศส เยอรมนี และญี่ปุ่น
สำนักงานของ IMF และธนาคารโลก ณ กรุงวอชิงตัน ดีซี
องค์กรพี่น้องเหล่านี้ (ซึ่งในทางปฏิบัติแล้วพวกเขาทำงานด้วยกัน และใช้สำนักงานใหญ่ร่วมกันที่กรุงวอชิงตัน ดีซี) ถือกำเนิดขึ้นจากการประชุมเบรนตันวูด ในรัฐนิวแฮมป์เชียร์ เมื่อปี 1944 ในฐานะ "สองเสาหลัก" ของระเบียบการเงินโลกใหม่ที่นำโดยสหรัฐอเมริกา ซึ่งโดยตามธรรมเนียมแล้วธนาคารโลกจะนำโดยชาวอเมริกัน ส่วน IMF นั้นจะนำโดยชาวยุโรป
จุดประสงค์แรกในการก่อตั้ง 2 องค์กรนี้ขึ้นมาก็เพื่อช่วยฟื้นฟูกลุ่มประเทศในยุโรปและญี่ปุ่นที่เสียหายจากสงคราม - ธนาคารโลกจะมุ่งเน้นในการปล่อยกู้โครงการที่เกี่ยวกับการฟื้นฟูและพัฒนาเป็นรายโครงการไป - กองทุน IMF จะรับมือในส่วนของปัญหาด้านดุลการชำระเงิน (บัญชีรายรับรายจ่าย) ของประเทศต่าง ๆ ผ่าน "เงินให้กู้เพื่อการช่วยเหลือ" เพื่อให้การค้าขายยังสามารถดำเนินต่อไปได้ถึงแม้ว่าบางประเทศจะไม่มีเงินเพื่อนำเข้าสินค้าก็ตาม
ชาติต่าง ๆ จำเป็นที่จะต้องเข้าร่วมกับ IMF เพื่อเข้าถึงสิ่งที่พวกเขาเรียกว่า “สิทธิพิเศษ” จากธนาคารโลก ซึ่งทุกวันนี้มีชาติสมาชิกกว่า 190 ประเทศ เมื่อแต่ละประเทศเข้าร่วมเป็นสมาชิกแล้วก็จะต้องทำการฝากเงินสกุลท้องถิ่นของตนและสกุลเงินที่มีความมั่นคงที่สูงไว้ (โดยปกติก็จะเป็นดอลลาร์สหรัฐ เงินสกุลประเทศในยุโรป หรือทองคำ) ซึ่งจะกลายเป็นแหล่งเงินทุนสำรองของเหล่าบรรดาประเทศสมาชิก
เมื่อมีประเทศสมาชิกเผชิญปัญหาด้านดุลการชำระเงินอย่างต่อเนื่องจนไม่สามารถจ่ายหนี้คืนได้ กองทุน IMF จะมอบวงเงินให้กู้ที่มาจากแหล่งเงินทุนสำรอง โดยคำนวณปริมาณจากเงินที่พวกเขาฝากเข้ามาในตอนต้น และคูณตัวเลขเพื่อให้ทวีคูณขึ้นไป บนเงื่อนไขที่มีต้นทุนที่แพงมากขึ้นเรื่อย ๆ
ในทางปฏิบัติแล้ว กองทุน IMF ทำหน้าที่เป็นเสมือนธนาคารกลางของโลกที่มีอำนาจอยู่เหนือทุกประเทศ เพราะนับตั้งแต่ปี 1969 กองทุน IMF ได้ออกเงินสกุลของตัวเองที่เรียกว่า “สิทธิพิเศษถอนเงิน” (Special Drawing Rights: SDR) โดยคำนวณมูลค่าจากตะกร้าเงินที่มีสกุลเงินชั้นนำของโลกสำรองอยู่ โดยทุกวันนี้สกุลเงิน SDR ถูกหนุนหลังด้วย : - เงินดอลลาร์สหรัฐ ร้อยละ 45 - เงินยูโร ร้อยละ 29 - เงินหยวน ร้อยละ 12 - เงินเยน ร้อยละ 7 - เงินปอนด์ ร้อยละ 7
โดยในปัจจุบัน IMF มีความสามารถในการปล่อยกู้ได้ทั้งหมด 1 ล้านล้านดอลลาร์สหรัฐ (หรือเป็นตัวเลข 1,000,000,000,000 ดอลลาร์ฯ)
ในช่วงระหว่างปี 1960 - 2008 กองทุน IMF ให้ความสำคัญกับการช่วยเหลือประเทศกำลังพัฒนาเป็นหลัก ด้วยเงินกู้ยืมระยะสั้นดอกเบี้ยสูง และด้วยความที่สกุลเงินของประเทศที่กำลังพัฒนาเหล่านี้ไม่ได้เป็นที่ต้องการในตลาดโลก ทำให้ไม่สามารถใช้สกุลเงินประจำชาติซื้อสินค้าและบริการจากต่างประเทศได้ ประเทศกำลังพัฒนาจึงจำเป็นต้องหาเงินสกุลต่างประเทศที่แข็งแกร่งผ่านการส่งออกสินค้า
โดยมีหลายประเทศ (เช่น ศรีลังกา และโมซัมบิค) ที่มักประสบปัญหาในการหาเงินไม่ทัน ส่งผลให้เงินหมดคลังบ่อยครั้ง แตกต่างจากสหรัฐอเมริกาที่สามารถเสกเงินสกุลของตัวเองมาใช้เป็นสกุลเงินสำรองหลักของโลกได้ โดยเมื่อถึงจุดที่เงินหมดคลังนั้น รัฐบาลส่วนใหญ่ โดยเฉพาะรัฐบาลเผด็จการ มักจะใช้วิธีแก้ปัญหาแบบง่าย ๆ ที่ต้องแลกมากับอนาคตของประเทศตัวเอง นั่นก็คือการเลือกที่จะกู้เงินจากกองทุน IMF
ในส่วนของธนาคารโลกนั้น ทางธนาคารได้แถลงไว้ว่างานของพวกเขาคือการมอบวงเงินกู้ให้แก่ประเทศกำลังพัฒนาเพื่อ “ลดความยากจน เพิ่มความเจริญรุ่งเรือง และส่งเสริมการพัฒนาอย่างยั่งยืน” โดยมีการแบ่งโครงสร้างธนาคารออกเป็นหลายส่วน ตั้งแต่ : - ธนาคารระหว่างประเทศเพื่อการบูรณะและพัฒนา (International Bank for Reconstruction and Development: IBRD) ที่มุ่งเน้นการปล่อยเงินกู้ก้อนใหญ่แบบดอกเบี้ยสูงให้กับประเทศกำลังพัฒนา เช่น บราซิล หรือ อินเดีย - สมาคมการพัฒนาระหว่างประเทศ (International Development Association: IDA) ที่มุ่งเน้นการปล่อยเงินกู้ดอกเบี้ยต่ำและมีระยะเวลาปลอดดอกเบี้ยระยะยาวให้กับกลุ่มประเทศที่ยากจน
โดยวิธีที่ IBRD ใช้กอบโกยเงินให้ตนเองและพวกพ้องนั้น ส่วนหนึ่งเป็นเพราะปรากฏการณ์แคนทิลอน (Cantillon Effect) จากการที่ IBRD สามารถได้รับวงเงินกู้ยืมที่มีเงื่อนไขแสนเป็นมิตรจากเจ้าหนี้ของพวกเขา และจากนักลงทุนในตลาดเอกชนที่สามารถเข้าถึงเงินกู้ต้นทุนต่ำได้ จากนั้น IBRD จะนำเงินเหล่านี้ไปปล่อยกู้ต่อ ในอัตราดอกเบี้ยที่สูงขึ้น ให้กับกลุ่มประเทศยากจนที่ไม่มีช่องทางเข้าถึงเงินกู้ดอกเบี้ยต่ำดังกล่าว
โดยปกติธนาคารโลกจะปล่อยกู้เป็นเฉพาะโครงการหรือเฉพาะกลุ่มอุตสาหกรรม และมุ่งเน้นไปยังการอำนวยความสะดวกในการส่งออกทรัพยากร (เช่น การให้เงินทุนสนับสนุนการสร้างถนน อุโมงค์ เขื่อน และท่าเรือที่จำเป็นสำหรับการขุดแร่ เพื่อส่งออกไปยังตลาดระหว่างประเทศ) และมีการปรับเปลี่ยนการทำการเกษตรเพื่อการบริโภคแบบดั้งเดิม ไปสู่การเกษตรเชิงอุตสาหกรรม หรือไม่ก็อุตสาหกรรมที่เกี่ยวกับการเพาะเลี้ยงสัตว์น้ำ เพื่อให้ประเทศเหล่านั้นสามารถส่งออกสินค้าและอาหารให้กับประเทศทางตะวันตกได้มากขึ้น
สิทธิในการโหวตของเหล่าสมาชิกธนาคารโลกและกองทุน IMF นั้นไม่ได้ขึ้นอยู่กับจำนวนประชากรของแต่ละประเทศ แต่กลับมีอิทธิพลมาจากสิ่งที่ถูกกำหนดขึ้นตั้งแต่เมื่อ 7 ทศวรรษก่อน เพื่อเอื้อประโยชน์ให้กับสหรัฐอเมริกา ยุโรป และญี่ปุ่นได้มีสิทธิ์เหนือประเทศอื่น ๆ ในโลก ซึ่งการครอบงำเหล่านี้เพิ่งจะเริ่มเสื่อมถอยในช่วงไม่กี่ปีที่ผ่านมานี่เอง
ทุกวันนี้สหรัฐอเมริกามีสัดส่วนคะแนนโหวตในธนาคารโลกร้อยละ 15.6 และร้อยละ 16.5 ในกองทุน IMF ซึ่งถือว่าเยอะกว่าหลายประเทศเป็นอย่างมาก..
มันมากพอที่จะใช้ลงมติยับยั้งการตัดสินใจในเรื่องใด ๆ ที่สำคัญมาก ๆ ได้โดยไม่ต้องพึ่งพาเสียงจากประเทศอื่นแต่อย่างใด เพราะการตัดสินใจในระดับใหญ่ ๆ ได้ถูกกำหนดทั้งในธนาคารและในกองทุนเอาไว้แล้วว่าจะต้องได้รับคะแนนเสียงร้อยละ 85 โดยในกลุ่มประเทศชั้นนำนั้น : - ญี่ปุ่นมีสัดส่วนคะแนนโหวตในธนาคารโลกร้อยละ 7.35 และร้อยละ 6.14 ในกองทุน IMF - เยอรมนีนั้นมีสัดส่วนคะแนนโหวตในธนาคารโลกร้อยละ 4.21 และร้อยละ 5.31 ในกองทุน IMF - ฝรั่งเศสและสหราชอาณาจักรนั้นมีสัดส่วนคะแนนโหวตของในธนาคารโลกประเทศร้อยละ 4.21 และร้อยละ 5.31 ในกองทุน IMF เท่ากัน
แต่ในอีกด้านหนึ่ง ประเทศอินเดียซี่งมีประชากรกว่า 1.4 พันล้านคน กลับมีสัดส่วนคะแนนโหวตในธนาคารโลกเพียงร้อยละ 3.04 และร้อยละ 2.63 ในกองทุน IMF ซึ่งน้อยกว่าประเทศที่เคยเป็นเจ้าอาณานิคมของพวกเขาด้วยซ้ำ ทั้งที่อินเดียมีประชากรมากกว่าถึง 20 เท่าก็ตาม
ในขณะที่ประเทศจีนที่มีประชากรถึง 1.4 พันล้านคนนั้น มีสัดส่วนคะแนนโหวตในธนาคารโลกร้อยละ 5.70 และร้อยละ 6.08 ในกองทุน IMF ซึ่งมีสัดส่วนใกล้เคียงกับเนเธอร์แลนด์ แคนาดา และออสเตรเลียรวมกัน
ประเทศที่ใหญ่ที่สุดในภูมิภาคลาตินอเมริกาและภูมิภาคแอฟริกา เช่น บราซิลและไนจีเรีย กลับมีสัดส่วนคะแนนโหวตพอ ๆ กับอดีตจักรวรรดิที่เข้าสู่ยุคเสื่อมถอยเต็มตัวอย่างประเทศอิตาลี
ส่วนประเทศเล็กจิ๋วอย่างสวิตเซอร์แลนด์ที่มีประชากรเพียง 8.6 ล้านคนนั้น มีสัดส่วนคะแนนโหวตในธนาคารโลกร้อยละ 1.47 และร้อยละ 1.17 ในกองทุน IMF ซึ่งใกล้เคียง กับประเทศปากีสถาน อินโดนีเซีย บังกลาเทศ และเอธิโอเปียรวมกัน ถึงแม้ว่าสวิตเซอร์แลนด์จะมีประชากรน้อยกว่าถึง 90 เท่าก็ตาม
คำอธิบายชาร์ต : จำนวนประชากรเมื่อเทียบกับสัดส่วนคะแนนโหวตในกองทุนการเงินระหว่างประเทศ - แถวซ้ายสีดำ : จำนวนประชากรในปี 2022 หน่วยหลักล้านคน - แถวขวาสีส้ม : สัดส่วนคะแนนโหวตใน IMF เป็นหน่วยร้อยละ - แหล่งที่มาของข้อมูล : IMF
สัดส่วนคะแนนโหวตเหล่านี้สมควรที่จะใกล้เคียงกับสัดส่วนของประชากรบนโลกที่แต่ละประเทศมีกัน แต่ด้วยโครงสร้างที่เหมือนยกมาจากยุคระบอบจักรวรรดิ ทำให้เห็นได้ชัดว่าการตัดสินใจต่าง ๆ นั้นกระทำกันอย่างไร ซึ่งถึงแม้การยกเลิกอาณานิคมจะผ่านมานานกว่า 65 ปีแล้วก็ตาม
แต่ชาติอุตสาหกรรมที่ทรงพลัง ซึ่งนำโดยสหรัฐอเมริกา ก็ยังสามารถควบคุมการค้าและการปล่อยกู้ของโลกได้เกือบจะเบ็ดเสร็จ ในขณะที่ประเทศยากจนแทบจะไม่มีสิทธิ์มีเสียงอะไรเลย
นอกจากนี้กลุ่มจี 5 (สหรัฐฯ ญี่ปุ่น เยอรมนี สหราชอาณาจักร และฝรั่งเศส) ได้ควบคุมคณะกรรมการบริหารของ IMF ไว้ทั้งหมด แม้ว่าสัดส่วนประชากรประเทศเหล่านี้จะถือเป็นส่วนน้อยของประชากรโลกก็ตาม ส่วนกลุ่มจี 10 รวมกับประเทศไอร์แลนด์ ออสเตรเลีย และเกาหลีนั้น มีสัดส่วนคะแนนโหวตรวมกันมากกว่าร้อยละ 50 ซึ่งหมายความว่าเพียงสหรัฐอเมริกากดดันชาติพันธมิตรแค่นิดเดียวก็สามารถกำหนดผลการตัดสินใจได้ แม้กระทั่งเรื่องการอนุมัติปล่อยเงินกู้เป็นราย ๆ ที่ซึ่งต้องใช้เสียงข้างมากในการตัดสินใจ
และเพื่อเป็นการเสริมอำนาจของ IMF ที่มีวงเงินในการปล่อยกู้กว่าหนึ่งล้านล้านดอลลาร์สหรัฐอยู่แล้วนั้น ทางธนาคารโลกเองก็อ้างอีกว่าได้ให้เงินกู้มากกว่า 350,000 ล้านดอลลาร์สหรัฐแก่ประเทศมากกว่า 150 ประเทศ ซึ่งมูลค่าการปล่อยกู้เหล่านี้ได้พุ่งขึ้นสูงมากในช่วง 2 ปีที่ผ่านมา เนื่องจากองค์กรในเครือได้ปล่อยเงินกู้มูลค่านับแสนล้านดอลลาร์สหรัฐให้แก่รัฐบาลประเทศต่าง ๆ ที่ทำการล็อกดาวน์เศรษฐกิจของตัวเองเพื่อรับมือกับโรคระบาด COVID-19
ในช่วงไม่กี่เดือนที่ผ่านมา ธนาคารและกองทุน IMF ได้วางแผนและเตรียมการทำข้อตกลงเพื่อที่จะให้ “ความช่วยเหลือ” แก่รัฐบาลที่ตกอยู่ในความเสี่ยงจากการที่ธนาคารกลางสหรัฐปรับขึ้นอัตราดอกเบี้ยอย่างดุดันและต่อเนื่อง โดยบรรดาลูกหนี้เหล่านี้มักจะเป็นพวกละเมิดสิทธิมนุษยชนที่กู้เงินตามอำเภอใจและไม่ฟังเสียงของประชาชน..ประชาชนซึ่งสุดท้ายจะกลายเป็นผู้ที่ต้องรับภาระในการใช้คืนเงินกู้ทั้งเงินต้นและดอกเบี้ย
ตัวอย่างเช่น ณ ตอนนี้ IMF กำลังให้ความช่วยเหลือทางการเงินต่อผู้นำเผด็จการของประเทศอียิปต์อย่าง อับเดล ฟัตตอห์ เอล-ซิซี (ซึ่งเป็นผู้สั่งการสังหารหมู่ผู้ประท้วงครั้งใหญ่ที่สุดนับตั้งแต่จัตุรัสเทียนอันเหมิน) เป็นมูลค่า 3,000 ล้านดอลลาร์สหรัฐ และในช่วงปีที่ผ่านมาทางธนาคารโลกก็ได้ปล่อยเงินกู้มูลค่า 300 ล้านดอลลาร์สหรัฐให้แก่รัฐบาลประเทศเอธิโอเปียที่กำลังทำการฆ่าล้างเผ่าพันธุ์ในเขต Tigray
>หมายเหตุผู้แปล : อับเดล ฟัตตอห์ เอล-ซิซี (Abdel Fattah El-Sisi) เป็นประธานาธิบดีคนที่ 6 และคนปัจจุบันของสาธารณรัฐอาหรับอียิปต์ โดยดำรงตำแหน่งตั้งแต่ปี 2014
ผลกระทบสะสมที่เพิ่มขึ้นมาจากการปล่อยกู้ของทั้งธนาคารโลกและกองทุน IMF นั้นมหาศาลกว่าตัวเลขที่ระบุอยู่ในเอกสารการกู้เงินมาก เนื่องจากการปล่อยกู้ขององค์กรเหล่านี้จะผลักดันให้เกิดความช่วยเหลือแบบทวิภาคี (ความช่วยเหลือจากทั้งภาครัฐและเอกชน) โดยมีการประมาณการว่า “จากเงินทุก ๆ 1 ดอลลาร์ที่ IMF ได้ปล่อยกู้ให้กับประเทศโลกที่สามนั้น จะช่วยให้ประเทศเหล่านี้สามารถกู้เงินได้เพิ่มและสามารถปรับเงื่อนไขโครงสร้างของเงินกู้เดิมได้รวมกันอีก 4-7 ดอลลาร์จากธนาคารพาณิชย์และจากรัฐบาลของประเทศที่ร่ำรวย”
และเช่นเดียวกัน หากธนาคารโลกและกองทุน IMF ปฏิเสธที่จะให้บางประเทศกู้เงิน ทั้งโลกก็จะปฏิบัติตามทันที
มันเป็นการยากที่จะพูดให้เกินจริงถึงผลกระทบในวงกว้างที่ธนาคารโลกและกองทุน IMF กระทำต่อเหล่าประเทศกำลังพัฒนา โดยเฉพาะในช่วงเวลาหลายทศวรรษนับตั้งแต่การก่อตั้งองค์กรขึ้นมาหลังช่วงสงครามโลกครั้งที่ 2 ซึ่งพอถึงช่วงปี 1990 และหลังจากสงครามเย็นยุติลง IMF ก็ได้ปล่อยเงินกู้ให้ประเทศในทวีปแอฟริกาไปถึง 41 ประเทศ ในแถบลาตินอเมริกา 28 ประเทศ ในเอเชีย 20 ประเทศ ในภูมิภาคตะวันออกกลาง 8 ประเทศ และในยุโรปอีก 5 ประเทศ ซึ่งกระทบต่อผู้คนมากกว่า 3 พันล้านคน หรือประชากรถึง 2 ใน 3 ของทั้งโลก ส่วนธนาคารโลกนั้นปล่อยเงินกู้ให้แก่ประเทศมากกว่า 160 ประเทศ
และน่าเศร้าที่องค์กรเหล่านี้ยังคงสถานะเป็นสถาบันการเงินระหว่างประเทศที่มีความสำคัญที่สุดในโลกอีกด้วย..
⚡️ กด Zap ที่ลิงก์นี้ เพื่อเป็นกำลังใจทีมงานผู้เรียบเรียงบทความ
(ทุกยอด zap จะถูกแบ่งอัตโนมัติเข้าวอลเล็ทของผู้เขียนบทความต้นฉบับภาษาอังกฤษ, ผู้แปลดราฟต์ 1, ผู้เรียบเรียงดราฟต์ 2-3, กองบรรณาธิการและพิสูจน์อักษรจากไรท์ชิฟต์ พร้อมกันบางส่วนไว้เพื่อเป็นค่าธรรมเนียมธุรกรรม)
-
@ 8fb140b4:f948000c
2023-07-22 09:39:48Intro
This short tutorial will help you set up your own Nostr Wallet Connect (NWC) on your own LND Node that is not using Umbrel. If you are a user of Umbrel, you should use their version of NWC.
Requirements
You need to have a working installation of LND with established channels and connectivity to the internet. NWC in itself is fairly light and will not consume a lot of resources. You will also want to ensure that you have a working installation of Docker, since we will use a docker image to run NWC.
- Working installation of LND (and all of its required components)
- Docker (with Docker compose)
Installation
For the purpose of this tutorial, we will assume that you have your lnd/bitcoind running under user bitcoin with home directory /home/bitcoin. We will also assume that you already have a running installation of Docker (or docker.io).
Prepare and verify
git version - we will need git to get the latest version of NWC. docker version - should execute successfully and show the currently installed version of Docker. docker compose version - same as before, but the version will be different. ss -tupln | grep 10009- should produce the following output: tcp LISTEN 0 4096 0.0.0.0:10009 0.0.0.0: tcp LISTEN 0 4096 [::]:10009 [::]:**
For things to work correctly, your Docker should be version 20.10.0 or later. If you have an older version, consider installing a new one using instructions here: https://docs.docker.com/engine/install/
Create folders & download NWC
In the home directory of your LND/bitcoind user, create a new folder, e.g., "nwc" mkdir /home/bitcoin/nwc. Change to that directory cd /home/bitcoin/nwc and clone the NWC repository: git clone https://github.com/getAlby/nostr-wallet-connect.git
Creating the Docker image
In this step, we will create a Docker image that you will use to run NWC.
- Change directory to
nostr-wallet-connect
:cd nostr-wallet-connect
- Run command to build Docker image:
docker build -t nwc:$(date +'%Y%m%d%H%M') -t nwc:latest .
(there is a dot at the end) - The last line of the output (after a few minutes) should look like
=> => naming to docker.io/library/nwc:latest
nwc:latest
is the name of the Docker image with a tag which you should note for use later.
Creating docker-compose.yml and necessary data directories
- Let's create a directory that will hold your non-volatile data (DB):
mkdir data
- In
docker-compose.yml
file, there are fields that you want to replace (<> comments) and port “4321” that you want to make sure is open (check withss -tupln | grep 4321
which should return nothing). - Create
docker-compose.yml
file with the following content, and make sure to update fields that have <> comment:
version: "3.8" services: nwc: image: nwc:latest volumes: - ./data:/data - ~/.lnd:/lnd:ro ports: - "4321:8080" extra_hosts: - "localhost:host-gateway" environment: NOSTR_PRIVKEY: <use "openssl rand -hex 32" to generate a fresh key and place it inside ""> LN_BACKEND_TYPE: "LND" LND_ADDRESS: localhost:10009 LND_CERT_FILE: "/lnd/tls.cert" LND_MACAROON_FILE: "/lnd/data/chain/bitcoin/mainnet/admin.macaroon" DATABASE_URI: "/data/nostr-wallet-connect.db" COOKIE_SECRET: <use "openssl rand -hex 32" to generate fresh secret and place it inside ""> PORT: 8080 restart: always stop_grace_period: 1m
Starting and testing
Now that you have everything ready, it is time to start the container and test.
- While you are in the
nwc
directory (important), execute the following command and check the log output,docker compose up
- You should see container logs while it is starting, and it should not exit if everything went well.
- At this point, you should be able to go to
http://<ip of the host where nwc is running>:4321
and get to the interface of NWC - To stop the test run of NWC, simply press
Ctrl-C
, and it will shut the container down. - To start NWC permanently, you should execute
docker compose up -d
, “-d” tells Docker to detach from the session. - To check currently running NWC logs, execute
docker compose logs
to run it in tail mode add-f
to the end. - To stop the container, execute
docker compose down
That's all, just follow the instructions in the web interface to get started.
Updating
As with any software, you should expect fixes and updates that you would need to perform periodically. You could automate this, but it falls outside of the scope of this tutorial. Since we already have all of the necessary configuration in place, the update execution is fairly simple.
- Change directory to the clone of the git repository,
cd /home/bitcoin/nwc/nostr-wallet-connect
- Run command to build Docker image:
docker build -t nwc:$(date +'%Y%m%d%H%M') -t nwc:latest .
(there is a dot at the end) - Change directory back one level
cd ..
- Restart (stop and start) the docker compose config
docker compose down && docker compose up -d
- Done! Optionally you may want to check the logs:
docker compose logs
-
@ 32e18276:5c68e245
2023-07-19 02:56:47I’m so lazy I’m thinking of running the damus merch store via stateless and serverless lightning payment links. All data is collected and stored in the lightning invoice descriptions which are fetched from your node. You can do this without having to run any server code except a lightning node!
This is the same tech we used when selling merch as at bitcoin Miami. It was extremely reliable. I love these things, they are so easy. Integrating with the legacy fiat system is such a pita, It may just be a lightning-only store for now because of how simple this is. Here's what a lightning payment link looks like:
http://lnlink.org/?d=ASED88EIzNU2uFJoQfClxYISu55lhKHrSTCA58HMNPgtrXECMjQuODQuMTUyLjE4Nzo4MzI0AANgB6Cj2QCeZAFOZ1nS6qGuRe4Vf6qzwJyQ5Qo3b0HRt_w9MTIwJm1ldGhvZD1pbnZvaWNlfG1ldGhvZD13YWl0aW52b2ljZSZwbmFtZWxhYmVsXmxubGluay0mcmF0ZT04BERlYXRoIFN0YXIABQAAAGQGQW4gb2JqZWN0IG9mIHVuZmF0aG9tYWJsZSBwb3dlcgAHEwhodHRwczovL3VwbG9hZC53aWtpbWVkaWEub3JnL3dpa2lwZWRpYS9lbi9mL2Y5L0RlYXRoX3N0YXIxLnBuZwA=
How it works
The entire product page is stored as data in the url. When a customer click the link, the product info is decoded and rendered as a webpage. The data in the url includes
- The product name
- Description
- Price in sats
- Product image url
- Fields to collect data from the user
- Lightning node address
- Lightning node rune for fetching and waiting for invoice payments
This works thanks to a javascript library I created called "lnsocket". It allows you to connect to your CLN node over websockets. Once the user fills out all of the info, a new lightning invoice is fetched with this information in the description, by connecting directly to your node. This connection is end-to-end encrypted thanks to the lightning protocol itself.
To your lightning node, it looks like another lightning node is connecting to it, but in reality it's just a dumb client asking for things.
At this point, custom lightning packets called "commando" packets are sent to your node which asks your node to run certain commands. CLN authenticates these packets using the rune and then returns a response. This is pretty much the same as calling these commands directly on your lightning node, except now someone is doing it from a browser in a secure way!
Why not just run btcpayserver?
btcpayserver is cool and is more powerful, but I like exploring simpler ways to do things that don't require running lots of software which can be challenging for many non-technical people. You shouldn't have to become a server administrator to start accepting payments. It should be as simple as running a bitcoin and lightning node, pushing all of the application logic to the clients.
This is a similar philosophy to what we have in the nostr space. Let's make it easier for people to use self-sovereign tools. Everyone deserves freedom tech.
Anyways, I'm still working on https://lnlink.org. I just added images and nostr address support! You can make your own payment links here! Try it out:
http://lnlink.org/?d=ASED88EIzNU2uFJoQfClxYISu55lhKHrSTCA58HMNPgtrXECMjQuODQuMTUyLjE4Nzo4MzI0AANgB6Cj2QCeZAFOZ1nS6qGuRe4Vf6qzwJyQ5Qo3b0HRt_w9MTIwJm1ldGhvZD1pbnZvaWNlfG1ldGhvZD13YWl0aW52b2ljZSZwbmFtZWxhYmVsXmxubGluay0mcmF0ZT04BERlYXRoIFN0YXIABQAAAGQGQW4gb2JqZWN0IG9mIHVuZmF0aG9tYWJsZSBwb3dlcgAHEwhodHRwczovL3VwbG9hZC53aWtpbWVkaWEub3JnL3dpa2lwZWRpYS9lbi9mL2Y5L0RlYXRoX3N0YXIxLnBuZwA=&edit=1
-
@ e6817453:b0ac3c39
2023-09-08 15:05:59Why Metamask
Last thing that i want to do in my life is to build yet another crypto wallet but quite often i need one. One simple thing - adoption . it is one of the most widely used wallet even and btw one of the widely used extension on market
Key Metamask Statistics 2023 - There are more than 21 million monthly active users of Metamask - Metamask is owned by ConsenSys AG - ConsenSys AG is valued at $3.2 billion - This is a 38-times increase from 2020 - Metamask connects you to more than 3700 apps Metamask makes Ethereum more accessible
Read more at EarthWeb: Metamask Statistics 2023: How Many People use Metamask? https://earthweb.com/metamask-statistics/
So it is really widely adopted and trusted. It is scary me that we have a company behind a propject but we have a good part - it is open code base at list for now.
It is open
The codebase is publicly available, allowing anyone to review, contribute to, or fork the project. This open-source nature is crucial for several reasons:
Transparency:
Being open-source means that the code is available for public scrutiny. This is particularly important for software that handles sensitive operations like cryptographic key management and blockchain transactions. Users and developers can audit the code to ensure it meets security standards.
Community Contributions:
The open-source model allows for contributions from the developer community at large. This can lead to faster identification of bugs, more robust security features, and the development of new functionalities, like the aforementioned MetaMask Snaps.
Trust:
In the realm of cryptocurrencies and blockchain, trust is paramount. Open-source software is generally considered more trustworthy because it undergoes public scrutiny. This is especially important for a tool like MetaMask, which acts as a gateway to decentralized applications (dApps) and handles private keys.
MetaMask Snaps
Metamask community made a smart move. So to prevent a forks and fragmentation of community and products folks just made a project extandable and plugable. So you actually could simply buld on top instead of forking
MetaMask Snaps is an extensibility framework for the MetaMask browser extension, which is widely used for interacting with Ethereum-based decentralized applications (dApps). The Snaps framework allows developers to extend MetaMask's functionality by creating custom plugins, often referred to as "Snaps." These plugins can introduce new features, protocols, or even layer-2 solutions directly into the MetaMask user interface. This makes it easier for users to interact with a broader range of blockchain technologies without having to leave the MetaMask environment.
Why Are MetaMask Snaps Important?
User Experience: By integrating additional features directly into MetaMask, users can enjoy a more seamless and enriched experience. They don't have to juggle multiple extensions or platforms to interact with various blockchain technologies.
-
Developer Flexibility: Developers can create custom solutions tailored to their dApps or protocols. This can include anything from custom transaction logic to integrating new cryptographic methods.
-
Interoperability: Snaps can facilitate better interoperability between different blockchain protocols and layer-2 solutions, making it easier for users to navigate the increasingly complex blockchain ecosystem.
-
Security: Since MetaMask is a well-trusted platform, extending its functionality through Snaps can offer a more secure way for users to try out new features or protocols.
-
Innovation: The extensibility allows for rapid experimentation and deployment of new blockchain technologies, accelerating the pace of innovation in the space.
H ow do MetaMask Snaps work?
Snaps are implemented as JavaScript/TypeScript applications where developers implement one or more of three functionalities (transaction insights, RPC requests, cron jobs) as JavaScript/TypeScript methods.
Because a Snap can consist of arbitrary code that can access a user’s MetaMask wallet, all Snaps are run in a special environment that is designed with security in mind. Thus, they differ in several ways from ordinary JavaScript or TypeScript code that would be found on, say, a web page or a Node.js application. In particular, the code will be executed in a “sandbox” that limits the JavaScript APIs that can be accessed.
Furthermore, to prevent Snaps from hogging system resources, all Snaps are meant to be “short-lived” in that they do not take too long to generate transaction insights or process RPC requests. Snaps that time out will be terminated by the MetaMask extension.
For more details on how Snaps work, we refer the interested reader to the official documentation.
Not only Ethereum
While MetaMask is primarily associated with Ethereum, the Snaps framework opens up possibilities for extending its functionality beyond the Ethereum ecosystem. Here are some non-Ethereum use-cases where MetaMask Snaps could be beneficial:
1. Cross-Chain Interoperability
Snaps could facilitate seamless interactions between Ethereum and other blockchains like Bitcoin, Polkadot, or Binance Smart Chain. This could include features like cross-chain asset swaps or tracking portfolio balances across multiple chains.
2. Decentralized Identity (DID)
Given your interest in Self-Sovereign Identity (SSI), Snaps could be used to integrate decentralized identity protocols like Sovrin or Veres One. This would allow users to manage their digital identities directly within MetaMask, enhancing data privacy and control.
3. Decentralized Storage
Snaps could integrate decentralized file storage solutions like IPFS or Filecoin, enabling users to upload, manage, and share files without relying on centralized services.
4. Layer-2 Solutions
While these are often Ethereum-related, some layer-2 solutions aim to be blockchain agnostic. Snaps could provide interfaces for interacting with these solutions, making it easier for users to benefit from faster and cheaper transactions.
5. Data Analytics and Visualization
Snaps could offer data analytics tools that aggregate information from various blockchains, decentralized exchanges, or other data sources. This would allow users to get a comprehensive view of their activities and assets.
6. Privacy Enhancements
Snaps could integrate privacy-focused technologies like zero-knowledge proofs or mixers that work across multiple blockchains, allowing users to make private transactions or shield their identities.
7. Social Networking
Decentralized social networks like NOSTR could be integrated into MetaMask via Snaps, allowing users to manage their social interactions and digital assets in one place.
8. IoT Integration
Snaps could facilitate interactions with Internet of Things (IoT) devices that use blockchain for secure data transmission and storage. This could include smart home controls, supply chain tracking, or even healthcare devices.
9. NFT Platforms
While NFTs are popular on Ethereum, they also exist on other blockchains like Flow or Tezos. Snaps could allow users to manage and interact with NFTs across multiple platforms.
10. Decentralized Governance
Snaps could integrate voting mechanisms from DAOs (Decentralized Autonomous Organizations) that exist on blockchains other than Ethereum, enabling users to participate in governance without leaving the MetaMask interface.
What can you do with MetaMask Snaps for Ethereum
So it solve a UI and adoption problem of Acount Abstraction. There are many other use cases of MetaMask Snaps, but the main use case that is emphasized by MetaMask themselves is the ability to use Snaps to build user interfaces for account abstraction-style on-chain wallet smart contracts.
Account abstraction gives developers a lot of freedom to create a wallet with whatever custom authentication schemes, access controls, or other features that can be used to control transactions from the wallet.
But actually accessing the custom wallet functionality would require the user to construct and send non-trivial transactions to the wallet smart contract. A Web3 developer could create a Snap that serves as the user interface for such a wallet so that users don’t have to care about technical details — similar to how a bank might create a phone app that talks to the bank’s servers.
Discover From a community
It is already a big list of cool comunity project https://snaps.directory/ give you safe and curated list of snaps
I personaly reaaly keen on: - Masca full scale SSI wallet . you could read about it more - identify DID manager
Try It yourself , build yourself
If your idea is still not implemented - make your hands dirty Good workshop intro with a step by step guide
Github from workshop https://github.com/ziad-saab/metamask-snaps-transaction-insights-workshop
Developer Resources
To learn more and go deeper
Examples
- MetaMask/snaps-skunkworks examples - Official examples provided by MetaMask Snaps team.
- zbrumen/mmp2p - An example, of how to use Metamask Snaps for a simple P2P chat website.
- piotr-roslaniec/snap-rust-rng - Using
wasm-pack
- generated WASM dependencies in snaps
Templates
- MetaMask/template-snap - Snap Template in JS
- MetaMask/template-typescript-snap - Snap Template in TS
- MetaMask/test-snaps - A monorepo for Snaps used for QA and end-to-end tests, with an accompanying GitHub Pages website. Like MetaMask/test-dapp, but for Snaps.
- metamask-snap-ts-nextjs
-
-
@ 32e18276:5c68e245
2023-07-17 21:55:39Hey guys!
Another day, another TestFlight build. This fixes many mention bugs and includes bandwidth improvements.
During nostrica, jack told everyone to open their phones and say GM to fiatjaf. This actually brought down nostrica's wifi! Damus is really dumb when it first opens and makes many requests. Sometimes hundreds (nip05 validation, etc). This build fixes all those issues. Damus will no longer:
- Make hundreds of nostr address validation requests.
- Make tons of duplicate lnurl requests when validating zaps
nostr address validation only happens when you open someones profile now.
This build also fixes some annoying mention issues. If you forget a space when mentioning someone, it will automatically add it.
I've also removed the restriction where you were not allowed to login to "deleted" accounts. This was way too confusing for people, and logging into a deleted account will allow you to reset the profile information and get it going again. You're welcome NVK.
Another thing that was added in this build is support for
_
usernames in nostr addresses. This will hide your full nostr address username when used. Damus will also hide your username if it matches your profile username. Damus always did this before but it was incorrect. Now it will show your full nostr address (nip05) with its proper username. You can stop bugging me about this now Semisol.Last but not least there are some small tweaks to longform note padding. Nothing too crazy but it does make notes like this look less cramped.
Until next time!
Added
- Show nostr address username and support abbreviated _ usernames (William Casarin)
- Re-add nip05 badges to profiles (William Casarin)
- Add space when tagging users in posts if needed (William Casarin)
- Added padding under word count on longform account (William Casarin)
Fixed
- Don't spam lnurls when validating zaps (William Casarin)
- Eliminate nostr address validation bandwidth on startup (William Casarin)
- Allow user to login to deleted profile (William Casarin)
- Fix issue where typing cc@bob would produce brokenb ccnostr:bob mention (William Casarin)
-
@ ff983c04:dcf40bc2
2023-09-08 03:29:47This is an article I have from my archive in audio that helps with me accessing, no copyright infringement intended. I use the accessibility because of my disability. This is simply a impermanent station by Roy Sheinfeld. Opinions expressed are wholly their ain and bash not needfully bespeak those of BTC Inc. oregon Bitcoin Magazine. I cannot read so I am sharing my audio copy for the benefit of others. If any copyright complaint, contact to have it removed
Implementing a Self-Hosted Infrastructure with pfSense, Librem Mini, and VLAN Switch
Transitioning to a self-hosted infrastructure provides several key advantages for organizations and individuals looking to take control of their technology stack:
Network Infrastructure:
pfSense Router:
Model: Protectli Vault FW4B - 4 Port, Firewall Micro Appliance/Mini PC
CPU: Intel Celeron
RAM: 4GB
Storage: 32GB SSD
Network Interfaces: 4 x Gigabit Ethernet
Additional Features: VPN support, IDS/IPS capabilities
VLAN Managed Switch:
Model: NETGEAR 8-Port PoE Gigabit Ethernet Plus Switch (GS108PEv3)
Number of Ports: 8
VLAN Support: Yes, up to 4096 VLANs
Power over Ethernet (PoE): Yes, 4 PoE ports
Server Infrastructure:
Librem Mini:
Model: Librem Mini v2
CPU: Intel Core i7
RAM: 64GB
Storage: 500GB NVMe SSD
Operating System: PureOS (Linux-based)
Connectivity: Gigabit Ethernet, Wi-Fi 6 (optional)
Dedicated Management Machine:
Model: Dell OptiPlex 7070
CPU: Intel Core i7-9700
RAM: 32GB
Storage: 1TB SSD
Operating System: Windows 10 Pro
Connectivity: Gigabit Ethernet, Wi-Fi (optional)
Security Measures:
Firewall Protection:
Utilize the built-in firewall capabilities of the pfSense Router for network security.
Intrusion Detection and Prevention:
Implement Suricata or Snort as an IDS/IPS on the pfSense Router to detect and mitigate potential threats.
Secure VLAN Configuration:
Configure VLANs on the managed switch to segregate and secure network traffic.
Regular Updates and Patching:
Ensure that all devices, including the Librem Mini and dedicated management machine, receive regular updates and security patches to protect against vulnerabilities.
Access Control and Authentication:
Implement strong access control measures, such as secure passwords and multi-factor authentication, for all network devices.
Additional Considerations:
Backup and Disaster Recovery:
Implement regular backups of critical data and establish a disaster recovery plan to ensure data safety and availability.
Monitoring and Logging:
Set up monitoring and logging systems to track network performance, detect anomalies, and investigate security incidents.
Physical Security:
Implement physical security measures, such as secure server rooms and restricted access to network infrastructure.
Redundancy and High Availability:
Increased Privacy and Security:
-
With on-premises servers and network gear, you control access to your data and systems. No reliance on third-party providers.
-
Advanced firewall, IDS/IPS, and VLAN capabilities allow tight control over network traffic.
-
Regular patching and updates keeps systems secure against latest threats.
Flexibility and Customization ⚙️
-
Choose your own server hardware, OS, apps - build the perfect environment for your needs.
-
Configure to meet specific performance, redundancy, and high availability requirements.
-
Scale resources up or down as needed, no vendor lock-in.
Cost Savings 💰
-
Avoid recurring public cloud fees by using own hardware.
-
Open source software like pfSense and PureOS cuts down on licensing costs.
-
Consolidate workloads on high-performance servers like Librem Mini.
Educational Benefits 🎓
-
Hands-on experience running real enterprise-grade infrastructure.
-
Opportunity to learn powerful on-prem solutions like pfSense routing.
-
Develop Linux, networking, security, and systems administration skills.
Community Driven 🤝
-
Contribute to open source projects like PureOS.
-
Foster relationships through forums and user groups.
-
Share knowledge and collaborate on best practices.
While transitioning to self-hosted infrastructure has upfront costs and a learning curve, the long-term payoff in privacy, security, control, and customizability make it an appealing choice for many organizations and power users. With careful planning and solid foundational hardware, it can be implemented successfully.
Implementing a Self-Hosted Infrastructure for Censorship Resistance
The self-hosted infrastructure outlined provides a strong foundation for building censorship-resistant connectivity that aligns with local laws:
Secure Encrypted Traffic Flow 🛡️
-
The pfSense router offers robust VPN capabilities for encrypting traffic between nodes.
-
VLANs isolate access to censorship circumvention tools.
-
Librem Mini servers run VPN clients to access global internet.
Failover and Redundancy ♻️
-
With multiple Librem Mini nodes, connectivity persists if one node goes down.
-
The pfSense router provides firewall failover capabilities.
-
Load balancing distributes traffic across nodes.
Following Just Laws 👮
-
Education, not illegal circumvention, is the goal.
-
Systems allow access to legal materials and tools only.
-
Valid takedown requests treated seriously per local laws.
-
Community standards enforced.
Empowering Local Voices 🗣️
-
Infrastructure run by local community members.
-
Nodes provide platform for sharing local content.
-
Systems designed to meet local needs and context.
Open and Transparent 🏛️
-
Free and open source software used throughout promotes transparency.
-
Community involvement in all aspects.
-
Public reports detail usage, requests received, content moderation policies.
By leveraging strong technology alongside fair policies and local control, this infrastructure promotes empowerment through information while respecting just laws. The result is censorship resistance that upholds ethics and community values.
Here are some ways the self-hosted infrastructure could be leveraged to also function as a payments processor:
Integrate Lightning Network Nodes
-
Run LND or c-lightning software on the Librem Mini servers to enable Lightning Network payments.
-
Use the high bandwidth capacity for fast payment channels.
-
VLAN isolation keeps payments communication secure.
Build a Local Exchange
-
Develop a web portal on the servers for buying/selling local currency using Lightning.
-
Allows fast, low-fee exchange between local currency and bitcoin.
-
pfSense router provides DDoS protection for the exchange.
Enable Merchant Payments
-
Provide an API and libraries for merchants to easily accept Lightning payments.
-
Low fees compared to traditional payment gateways.
-
Merchants can convert bitcoin to local currency via the exchange.
Focus On Usability
-
Create easy-to-use wallets and merchant apps with a focus on user experience.
-
Support local languages.
-
Integrate with any existing mobile money/payment apps.
By integrating Lightning and exchange functionality into the on-prem infrastructure, it could offer fast, low-cost payments tailored to local needs, while ensuring regulatory compliance.
-
-
@ 32e18276:5c68e245
2023-07-16 22:47:17Hey guys, I just pushed a new Damus update TestFlight. This should drastically improve longform event rendering. Let me know if you find any bugs!
Full Changelog
Added
- New markdown renderer (William Casarin)
- Added feedback when user adds a relay that is already on the list (Daniel D'Aquino)
Changed
- Hide nsec when logging in (cr0bar)
- Remove nip05 on events (William Casarin)
- Rename NIP05 to "nostr address" (William Casarin)
Fixed
- Fixed issue where hashtags were leaking in DMs (William Casarin)
- Fix issue with emojis next to hashtags and urls (William Casarin)
- relay detail view is not immediately available after adding new relay (Bryan Montz)
- Fix nostr:nostr:... bugs (William Casarin)
-
@ 0861144c:e68a1caf
2023-09-08 14:02:30Context: this year, I decided to run stoicism in my live trough practices, putting discipline, habits and learning in the run. In my fifth day learning, I already learned four things and kept me thinking: this is similar to what we practice with bitcoin.
Week 1: Admit you have no control
The hardest part of being a hodler is when you have doubts about what you did. At the time of this writing, the average hodler is ~25% down if we use the BTC/USD pair; the plan dictates we should keep stacking sats while we educate ourselves, share our thoughts, debate about the future and most important thing: control our actions.
There are things, we the plebs, can't control:
- You have no power over the bitcoin price. Up and down as usual, people dictates, some rekts, some winners but control over the price? You? Zero.
- You have no power when people talk bs about bitcoin. Nocoiners, shitcoiners, scammers...they do always what they do best: talk BS. Either listen to them or...ignore it.
- You have no power over external actions (Russia, Ukraine, Feds and a large etc). Unless you have direct contact with Putin or the Feds, chill the fuck down and learn about your limits, master Wayne.
There are thigs, we the plebs, have absolute control:
- We have power over our bitcoin when we use our own private keys and keep SAFU, out of exchanges and middlemen. For example, you hav concerns about the safety practice of some exchanges; you have -mostly- zero power over their management decisions but you have the power to keep your sats out of their hands.
- We have power about what are we going to listen, read, educate. For example, you are trying to mastering some programming and you have concerns about Lightning Network. Instead of keep reading shitcoinery or Nassim Taleb, why not take courses to learn programming? I study for instance at Platzi, with the Plebs or Lisa Neigut (aka) Nifty's course.
- You have power over your internal actions. Control yourself and always ask: is this as bad as they portait? Is this the end of the crypto as we know? Sir, please, breath, think.
Oh, and keep stacking sats, stay humble, learn stuff and take care of people/animals you love.
This article was originally published at Stacker News - Jan. 5th
-
@ aa8e5554:071fd9fc
2023-09-08 03:04:15Looking for a secure and trustworthy hackathon experience? Discover DoraHacks.io's new 'Prize Safe' feature!
DoraHacks.io, the renowned global incentive platform for hackers and developers, announces the launch of its new feature, "Prize Safe."
Created to tackle trust concerns in unlicensed environments, this innovative hackathon prize escrow feature guarantees a secure foundation for diverse community hackathons.
With Prize Safe, DoraHacks.io empowers hackers and developers worldwide, offering a reliable and transparent platform for their creative endeavors.
Experience the future of hackathons with DoraHacks.io and unlock opportunities to showcase your skills while ensuring the safety of your prizes. Visit dorahacks.io now to explore this exciting new addition and join the thriving hackathon community!
-
@ 0861144c:e68a1caf
2023-09-08 14:02:07The title is what I felt when I read about a new paper on Privacy Pools, that other projects dedicated to cryptocurrencies would like to implement in the near future. I confess that I read it about four times and didn't understand it crearly, but on the fifth try, with a little help from BingChat to delve into the more technical details, I finally understood it. But I ended up disappointed, I won't deny it.
One of the central points when using cryptocurrencies is pseudonymity. We are not anonymous on a blockchain because there will always be digital traces or crumbs we leave behind, but still, a blockchain can record an event without considering the real identity of the individual or entity. We know a transaction occurred, that's it, and that's the point.
There are different types of transactions, and the folks at Samourai Wallet have turned this into an art by explaining in various articles about transactions and their potential shortcomings. When it comes to privacy, these guys are always on my list of people who know what they're talking about.
So what happened here? For years, the Ethereum ecosystem has been looking for different options to improve user privacy, to not be too exposed, and, to me, the best option in that market (not the only one, but the best in my opinion) is Tornado Cash, a software that allows (in short) increasing the entropy of your transactions through collaborative transactions, using a technology called zk-SNARK that basically allows verifying a transaction without revealing who sent it, where it was sent, and the amount sent. Tornado Cash maintained a pool of funds where users made collaborative transactions, and there were no traces of sends or deposits.
So far, we've introduced the characters and what they do, and now the problem: the cap, as the young people say. Tornado Cash has been mentioned countless times in reports of financial crimes for allowing individuals engaged in illegal activities to use this software for crimes similar to money laundering and others. In fact, several developers were even arrested for writing code, which is the most ridiculous thing in the world.
Imagine this: you wrote software, and other people use it for illegal activities, but you get the worst part just for creating it. In fact, Tornado Cash has made several adjustments to comply with the regulations required by the OFAC to the point of creating hybrids to comply. But that wasn't enough.
Privacy Pools: the solution
Enter this new paper with Chainalysis, Vitalik Buterin, and people related to Tornado Cash as the main actors. The paper proposes Privacy Pools that will have something called exclusion proofs or membership proofs, based on zk-SNARKs.
How would it work? The exclusion proofs or membership proofs will primarily aim to prove that the deposits and withdrawals made by users do not come from or belong to a set of associations that don't meet certain criteria. Simpler? A regulatory body will feed the protocol with addresses, transactions, and other data. Then, the user could prove that their money has a good reputation since it does not belong to the set of associations marked by the financial authority.
Privacy pools serve as an intermediary to:
- Comply with regulatory processes
- Demonstrate regulatory compliance with social consensus
- Not reveal the complete transaction history
- Improve user privacy without compromising other transactions.
Sounds good, what's the problem then?
As often happens, and as I had written before in NOSTR, there are things that the code has nothing to do with; it's the soul of the project. In this case, the problem is being approached from the wrong perspective.
Problem 1: Chainalysis and technological deficiency
One of the authors is associated with Chainalysis, a company dedicated to blockchain analysis and tracking of illicit activities. It all sounds good, but here's the big problem: they use mechanisms and technology that are deficient. Who says that? The company itself, which admitted to using unverified tools and methods that are not really proven. In other words, to track illicit activities, this company gathers information that is not really useful or collects it through questionable methods.
Problem 2: Lack of clarity. What are they accusing me of?
We start from the conception that AML/KYC regulations are good, and that's the central core of the problem, linked to problem one, which is errors and false positives. To give you an idea, there are ongoing legal proceedings today using evidence collected with problem 1. To this, we must also add the arrest of people linked to the software who basically never touched a penny involved in illicit activities, yet they are arrested for participating in those activities. Simpler? AML/KYC regulations are very ambiguous, allow data abuse, discriminate based on socioeconomic profiles, and have a host of disadvantages because these regulations are not the same worldwide.
Problem 3: Pantagruelian problem
Remember Pantagruel? He ate everything: fish, cheese, wines, and when that wasn't enough, he even ate thoughts and more. It was never enough for him, and he always needed more. What happens with these regulations and others? When you open the door to an authoritarian entity, it will never end: first, they'll ask for one thing, then they'll ask for more, and here's the problem: like Pantagruel, it will never be enough, there will always be a hunger for more and more. Before you know it, you'll have created a system that aids in censoring blocks, transactions, and addresses, becoming synonymous with the traditional financial system.
Problem 4: The list but not Schindler's
No matter how much judicial authorities feed it, the concept of a blacklist is completely gray. In addition to the problems mentioned earlier, we are creating a dangerous monster to control because you are feeding it with assumptions, and it will eventually trigger problem 2.
So what will happen?
The problem being addressed is that the State intends to continue controlling two things: technology and monetary policy. This paper, while it has the best intentions, and we understand the problem it wants to address, has voluntarily shifted the Overton window towards centralization. We are taking risks for financial authorities that use rather vague laws, and above all, it goes against the nature of a blockchain. We return to the central point that Satoshi Nakamoto proposes: not depending on intermediaries to move transactions.
To this day, there are different proposals and solutions working on the issue of privacy, in fact, there are tools that are quite viable (Whirlpool, GrapheneOS, Linux), and while we understand what it intends to solve, it will actually make it more ambiguous.
But this is my opinion, and we should continue discussing this.
-
@ 32e18276:5c68e245
2023-07-11 21:23:37You can use github PRs to submit code but it is not encouraged. Damus is a decentralized social media protocol and we prefer to use decentralized techniques during the code submission process.
[Email patches][git-send-email] to patches@damus.io are preferred, but we accept PRs on GitHub as well. Patches sent via email may include a bolt11 lightning invoice, choosing the price you think the patch is worth, and we will pay it once the patch is accepted and if I think the price isn't unreasonable. You can also send an any-amount invoice and I will pay what I think it's worth if you prefer not to choose. You can include the bolt11 in the commit body or email so that it can be paid once it is applied.
Recommended settings when submitting code via email:
$ git config sendemail.to "patches@damus.io" $ git config format.subjectPrefix "PATCH damus" $ git config format.signOff yes
You can subscribe to the [patches mailing list][patches-ml] to help review code.
Submitting patches
Most of this comes from the linux kernel guidelines for submitting patches, we follow many of the same guidelines. These are very important! If you want your code to be accepted, please read this carefully
Describe your problem. Whether your patch is a one-line bug fix or 5000 lines of a new feature, there must be an underlying problem that motivated you to do this work. Convince the reviewer that there is a problem worth fixing and that it makes sense for them to read past the first paragraph.
Once the problem is established, describe what you are actually doing about it in technical detail. It's important to describe the change in plain English for the reviewer to verify that the code is behaving as you intend it to.
The maintainer will thank you if you write your patch description in a form which can be easily pulled into Damus's source code tree.
Solve only one problem per patch. If your description starts to get long, that's a sign that you probably need to split up your patch. See the dedicated
Separate your changes
section because this is very important.When you submit or resubmit a patch or patch series, include the complete patch description and justification for it (-v2,v3,vn... option on git-send-email). Don't just say that this is version N of the patch (series). Don't expect the reviewer to refer back to earlier patch versions or referenced URLs to find the patch description and put that into the patch. I.e., the patch (series) and its description should be self-contained. This benefits both the maintainers and reviewers. Some reviewers probably didn't even receive earlier versions of the patch.
Describe your changes in imperative mood, e.g. "make xyzzy do frotz" instead of "[This patch] makes xyzzy do frotz" or "[I] changed xyzzy to do frotz", as if you are giving orders to the codebase to change its behaviour.
If your patch fixes a bug, use the 'Closes:' tag with a URL referencing the report in the mailing list archives or a public bug tracker. For example:
Closes: https://github.com/damus-io/damus/issues/1234
Some bug trackers have the ability to close issues automatically when a commit with such a tag is applied. Some bots monitoring mailing lists can also track such tags and take certain actions. Private bug trackers and invalid URLs are forbidden.
If your patch fixes a bug in a specific commit, e.g. you found an issue using
git bisect
, please use the 'Fixes:' tag with the first 12 characters of the SHA-1 ID, and the one line summary. Do not split the tag across multiple lines, tags are exempt from the "wrap at 75 columns" rule in order to simplify parsing scripts. For example::Fixes: 54a4f0239f2e ("Fix crash in navigation")
The following
git config
settings can be used to add a pretty format for outputting the above style in thegit log
orgit show
commands::[core] abbrev = 12 [pretty] fixes = Fixes: %h (\"%s\")
An example call::
$ git log -1 --pretty=fixes 54a4f0239f2e Fixes: 54a4f0239f2e ("Fix crash in navigation")
Separate your changes
Separate each logical change into a separate patch.
For example, if your changes include both bug fixes and performance enhancements for a particular feature, separate those changes into two or more patches. If your changes include an API update, and a new feature which uses that new API, separate those into two patches.
On the other hand, if you make a single change to numerous files, group those changes into a single patch. Thus a single logical change is contained within a single patch.
The point to remember is that each patch should make an easily understood change that can be verified by reviewers. Each patch should be justifiable on its own merits.
If one patch depends on another patch in order for a change to be complete, that is OK. Simply note "this patch depends on patch X" in your patch description.
When dividing your change into a series of patches, take special care to ensure that the Damus builds and runs properly after each patch in the series. Developers using
git bisect
to track down a problem can end up splitting your patch series at any point; they will not thank you if you introduce bugs in the middle.If you cannot condense your patch set into a smaller set of patches, then only post say 15 or so at a time and wait for review and integration.
-
@ a012dc82:6458a70d
2023-09-08 01:20:57Table Of Content
-
What is the new policy?
-
What are the benefits of paying taxes with cryptocurrency?
-
How will this affect the cryptocurrency market?
-
Conclusion
-
FAQ
Cryptocurrency has been a hot topic in Brazil for a while now, with more and more people investing in digital assets. Now, the Brazilian government has taken a step forward by allowing citizens to pay taxes with cryptocurrency. This is a significant move for Brazil and the wider cryptocurrency world, as it shows that digital assets are becoming increasingly accepted by governments and financial institutions. In this article, we will explore what this means for Brazilians and the cryptocurrency market as a whole.
What is the new policy?
As of now, Brazilian taxpayers can use Bitcoin, Ethereum, and USDT to pay their taxes. The payments will be processed by the Federal Revenue Service of Brazil, which will convert the cryptocurrency into Brazilian reals. This means that taxpayers will no longer have to go through banks or other financial institutions to pay their taxes.
What are the benefits of paying taxes with cryptocurrency?
Cryptocurrency has become increasingly popular in recent years, with more and more people investing in digital assets. Now, the Brazilian government has taken a significant step forward by allowing citizens to pay taxes with cryptocurrency. Here are some of the benefits of paying taxes with cryptocurrency:
Security Cryptocurrency transactions are recorded on a blockchain that cannot be altered, making them highly secure. This reduces the risk of fraud and hacking, providing taxpayers with greater peace of mind when making payments. Additionally, cryptocurrency wallets are encrypted and require a private key to access, further increasing security.
Speed Cryptocurrency transactions are processed much faster than traditional payment methods, such as bank transfers or credit card payments. This means that taxpayers can avoid long wait times and receive confirmation of payment almost instantly.
Cost-effectiveness Cryptocurrency transactions are often cheaper than traditional payment methods, as they don't involve intermediaries like banks. This means that taxpayers can save money on fees and charges when making payments, which is especially beneficial for those who make frequent or large payments.
Transparency Cryptocurrency transactions are transparent, as they are recorded on a public blockchain that can be accessed by anyone. This reduces the risk of corruption and ensures that taxes are being paid fairly. Additionally, taxpayers can easily track their payments and ensure that they have been processed correctly.
Accessibility Paying taxes with cryptocurrency is accessible to anyone who has a cryptocurrency wallet and the relevant digital assets. This means that taxpayers no longer have to rely on banks or other financial institutions to make their payments, making the process more streamlined and convenient.
How will this affect the cryptocurrency market?
The decision to allow taxpayers to pay their taxes with cryptocurrency is a significant move for the cryptocurrency market. It shows that governments and financial institutions are becoming increasingly accepting of digital assets, which could lead to increased adoption and investment in the future. Additionally, it could lead to other countries following suit and allowing taxpayers to pay their taxes with cryptocurrency.
Conclusion
The decision to allow Brazilians to pay their taxes with cryptocurrency is a significant move for both Brazil and the cryptocurrency market as a whole. It shows that governments and financial institutions are becoming increasingly accepting of digital assets, which could lead to increased adoption and investment in the future. While there are still some challenges to overcome, such as volatility and regulation, the future of cryptocurrency looks promising in Brazil and beyond.
FAQ
What cryptocurrencies can be used to pay taxes in Brazil? Bitcoin, Ethereum, and USDT can be used to pay taxes in Brazil.
How will the payments be processed? The payments will be processed by the Federal Revenue Service of Brazil, which will convert the cryptocurrency into Brazilian reals.
Are there any benefits to paying taxes with cryptocurrency? Yes, there are several benefits, including security, speed, cost-effectiveness, and transparency.
That's all for today, see ya tomorrow
If you want more, be sure to follow us on:
NOSTR: croxroad@getalby.com
X: @croxroadnews
Instagram: @croxroadnews.co
Subscribe to CROX ROAD Bitcoin Only Daily Newsletter
https://www.croxroad.co/subscribe
DISCLAIMER: None of this is financial advice. This newsletter is strictly educational and is not investment advice or a solicitation to buy or sell any assets or to make any financial decisions. Please be careful and do your own research.
-
-
@ fd78c37f:a0ec0833
2023-09-08 13:33:51"Read more related articles, follow on the anti-censorship long content platform yakihonne.com.
Well, the cash system part is still a work in progress. Bitcoin (BTC) has morphed into a primarily speculative asset, and fewer people than intended use it for payments. Dozens of competitive altcoins have since emerged, offering better scalability than Bitcoin. Therefore, a solution to ease the crypto spending challenges is vital for this sector.
Enter CryptoWallet. This project seeks to alleviate crypto’s rigidity as a functional currency.
Let’s explore what CryptoWallet has to offer to the market.
Integrating crypto banking and payment services
Cryptocurrencies have one key selling point: decentralization. This quality means that every crypto owner has control over funds in their digital wallet, which is not subject to centralized sanction. That said, most people want their money to move. It should be easy to use your money to pay for whatever you want and preferably fast.
Unfortunately, crypto comes short on the convenience side. The decentralization advantage is difficult to sell to people who are not traders or investors. CryptoWallet has identified this gap as a high-potential growth area.
What does this platform offer? CryptoWallet allows users to create a versatile account for cryptocurrency transactions. The idea is to create a one-stop shop for cryptocurrency transactions.
You might also like: Circle was a principal beneficiary of SVB government rescue
Think of how complicated handling crypto currently seems. Users typically have to go to a cryptocurrency exchange to buy crypto and then transfer the same to a digital wallet for storage. After that, you confirm with a business or service that they accept crypto before using it for payments. If you don’t have that option, you must convert your crypto into fiat and then make the payment.
That is quite a hassle, right?
CryptoWallet offers the possibility of buying, storing, selling, and spending crypto simultaneously. Convenience is the goal because cryptocurrency’s decentralization makes little sense without simplicity.
Accordingly, users can spend their cryptocurrencies without needing multiple platforms for conversion to fiat. The option of peer-to-peer (p2p) transfers can also be inconvenient because of the classic barter trade problem of unmatching needs. Therefore, this option of providing in-house exchange possibilities eases spending because you can easily spend your crypto as fiat whenever you need it.
The CryptoWallet crypto card
It gets even better. CryptoWallet has a crypto card that operates much like your ordinary debit card. Imagine using your crypto to pay for services by simply swiping.
You can get whitelisted for the CryptoWallet card to spend your crypto on the go. This possibility opens up the industry because it allows people to spend their crypto globally, even where the business does not accept crypto payments.
You might also like: Binance Pay becomes available in Brazil
CryptoWallet converts the crypto in your wallet to the local currency,and you are good to go. Users can now sign up for the whitelist to get their cards in Q4 of 2023.
The fees on services like conversion to fiat are user-friendly and typically less than 1%. There is no cost for initial card acquisition, which supports over 800 different cryptocurrencies at inception.
Legal compliance and security
This platform operates from Estonia and is fully legally compliant to provide financial services in all countries where the services are available, primarily in Europe.
Security is a vital consideration for handling crypto. There has never been a more perfect asset for hackers as the currency is digital and transactions irreversible.
You might also like: EU’s MiCA rules could prohibit MEV activities on Ethereum
Therefore, CryptoWallet has enacted serious security measures to ensure user funds safety. These measures range from 2-factor authentication (2FA) for user accounts to the most secure option of offline wallet storage. For offline storage, users pick the option of the CryptoWallet card to continue controlling their funds even in offline storage.
Crypto and Fiat are inextricably linked
The purpose of money, fiat or crypto, is to ensure people can pay for goods and services. Looking at these two as antagonistic forces misses this primary utility.
CryptoWallet promises to be the most significant bridge between these two standard bearers of modern finance. This platform solves the inefficiency of current crypto transactions by integrating proven and secure financial solutions in a single platform.
You might also like: Bitcoin holds strong as inflation causes chaos on UK markets
Crypto can grow its transaction medium role with the right support system. Even altcoins with higher liquidity and scalability still mostly serve speculative ends.
Using these tokens for payments is mostly within their specific platforms and not by the general public, as their whitepapers broadly proclaim. You are more likely to find crypto promoters encouraging others to “HODL” than go to their nearest store and pay for services.
CryptoWallet has integrated tools to ensure that users don’t have to pick one or the other. You can own crypto and still have the spending ease of modern fiat transactions.
The CryptoWallet app
Your smartphone is the gateway to most services today. CryptoWallet has released its app to ensure users can seamlessly access all the services on offer. The app will soon launch on Google Play Store and is undergoing approval with the Apple App Store.
The app is a direct tool for managing your crypto on CryptoWallet. It has a simple layout, and users can view multiple service options in one glance. The app is secure and ensures that you can have an integrated crypto management tool in your palm.
CryptoWallet unveils crypto potential
CryptoWallet is finalizing its developmental phase in its quest to make a difference in the market.
The platform has incentives for early adopters who have either signed up or joined the whitelist for various services. CryptoWallet is reported to be working on a massive crypto airdrop for early adopters, with the caveat of having completed at least one transaction.
You might also like: Crypto whale losses over $24m in phishing scam
CryptoWallet is a difference maker in a sector replete with similar ideas. This bridge between the fiat and crypto sectors can unleash crypto’s potential and spur its adopters to achieve similar outcomes.
By:Dalmas Ngetich Link:https://crypto.news/cryptowallet-aims-to-simplify-crypto-transactions/
-
@ b9e76546:612023dc
2023-06-07 22:12:51
#Nostr isn't just a social network, that's simply the first use case to sprout from the Nostr tree.
Simple Blocks, Complex Change
Nostr isn't just a social network, in a similar way that Bitcoin isn't just a transaction network. Both of these things are true, but they each miss the more significant elements of what they accomplish.
In my mind, the source of Nostr's true potential is two fold; first, in fundamentally changing the centralized server model into an open environment of redundant relays; and second, it eliminates the association of clients with their IP address and metadata, and replaces it with identification via public keys. Within this one-two punch lies the most important tools necessary to actually rearchitect all of the major services on the internet, not just social media. Social is simply the interface by which we will connect all of them.
The combination of this simple data & ID management protocol with decentralized money in #Bitcoin and #Lightning as a global payments network, enables nostr to build marketplaces, "websites," podcast feeds, publishing of articles/video/media of all kinds, auction networks, tipping and crowdfunding applications, note taking, data backups, global bookmarks, decentralized exchanges and betting networks, browser or app profiles that follow you wherever you go, and tons more - except these can be built without all of the negative consequences of being hosted and controlled by central servers.
It separates both the data and client identity from the server hosting it. Handing the ownership back to the owner of the keys. We could think of it loosely as permission-less server federations (though this isn't entirely accurate, its useful imo). Anyone can host, anyone can join, and the data is agnostic to the computer it sits on at any given time. The walls are falling away.
Efficiency vs Robustness
There is also a major secondary problem solved by these building blocks. A byproduct of solving censorship is creating robustness, both in data integrity, but also in data continuity. While the fiat world is so foolishly focused on "efficiency" as the optimal goal of all interaction, it naively ignores the incredible fragility that comes with it. It is far more "efficient" for one big factory to produce all of the computer chips in the world. Why build redundant manufacturing to produce the same thing when one factory can do it just fine? Yet anyone who thinks for more than a few seconds about this can see just how vulnerable it would leave us, as well as how much corruption such "efficiency" would wind up enabling.
Nostr is not alone either. Holepunch is a purely P2P model (rather than based on relays) that accomplishes the same separation in a different way. One where the clients and servers become one in the same - everyone is the host. Essentially a bittorrent like protocol that removes the limitation of the data being static. The combination of their trade offs & what these protocols can do together is practically limitless. While Nostr begins building its social network, combining it with what Synonym is building with their Web of trust, (the critical ingredient of which is public key identification) we can "weigh" information by the trust of our social graph.
Not too long ago, a friend and I used Nostr to verify who we were communicating with, we shared a Keet (built on Holepunch) room key over encrypted nostr DM, and opened a P2P, encrypted chat room where we could troubleshoot a bitcoin wallet problem and safely and privately share very sensitive data. The casual ease by which we made this transaction enabled by these tools had us both pause in awe of just how powerful they could be for the privacy and security of all communication. And this is just the very beginning. The glue of #Lightning and #Bitcoin making possible the direct monetization of the infrastructure in all of the above has me more bullish on the re-architecting of the internet than ever in my life. It cannot be reasonably called an insignificant change in incentives to remove both the advertiser and the centralized payment processor from inbetween the provider and the customers online. The base plumbing of the internet itself may very well be on the verge of the greatest shift it has ever gone through.
A Tale of Two Network Effects
I would argue the most significant historical shift in the internet architecture was the rise of social media. It was when we discovered the internet was about connecting people rather than computers. The social environment quickly became the dominant window by which the average person looked into the web. It's the place where we go to be connected to others, and get a perspective of the world and a filter for its avalanche of information as seen through our trust networks and social circles. But consider how incredibly neutered the experience really is when money isn't allowed to flow freely in this environment, and how much it actually would flow, if not for both centralized payment processors and the horrible KYC and regulatory hurdle it entails for large, centralized entities.
The first time around we failed to accomplish a global, open protocol for user identity, and because of this our social connections were owned by the server on which we made them. They owned our digital social graph, without them, it is erased. This is an incredible power. The pressures of the network effect to find people, rather than websites, took a decentralized, open internet protocol, and re-centralized it into silos controlled by barely a few major corporations. The inevitable abuse of this immense social power for political gain is so blatantly obvious in retrospect that it's almost comical.
But there is a kind of beautiful irony here - the flip side of the network effect's negative feedback that centralized us into social media silos, is the exact same effect that could present an even greater force in pushing us back toward decentralization. When our notes & highlights have the same social graph as our social media, our "instagram" has the same network as our "twitter," our podcasts reach the same audience, our video publishing has the same reach, our marketplace is built in, our reputation carries with us to every application, our app profiles are encrypted and can't be spied on, our data hosting can be paid directly with zaps, our event tickets can be permanently available, our history, our personal Ai, practically anything. And every bit of it is either encrypted or public by our sole discretion, and is paid for in a global, open market of hosts competing to provide these services for the fewest sats possible. (Case in point, I'm paying sats for premium relays, and I'm paying a simple monthly fee to nostr.build for hosting media)
All of this without having to keep up with 1,000 different fucking accounts and passwords for every single, arbitrarily different utility under the sun. Without having to setup another account to try another service offering a slightly different thing or even just one feature you want to explore. Where the "confirm with your email" bullshit is finally relegated to the hack job, security duck tape that it really is. The frustrating and post-hoc security design that is so common on the internet could finally become a thing of the past and instead just one or a few secure cryptographic keys give us access & control over our digital lives.
The same network effect that centralized the internet around social media, will be the force that could decentralize it again. When ALL of these social use cases and connections compound on each other's network effect, rather than compete with each other, what centralized silo in the world can win against that?
This is not to dismiss the number of times others have tried to build similar systems, or that it's even close to the first time it was attempted to put cryptographic keys at the heart of internet communications. Which brings me to the most important piece of this little puzzle... it actually works!
I obviously don't know exactly how this will play out, and I don't know what becomes dominant in any particular area, how relays will evolve, or what applications will lean toward the relay model, while others may lean P2P, and still others may remain client/server. But I do think the next decade will experience a shift in the internet significant enough that the words "relay" and "peer" may very well, with a little hope and lot of work, replace the word "server" in the lexicon of the internet.
The tools are here, the network is proving itself, the applications are coming, the builders are building, and nostr, holepunch, bitcoin and their like are each, slowly but surely, taking over a new part of my digital life every week. Case in point; I'm publishing this short article on blogstack.io, it will travel across all of nostr, I'm accepting zaps with my LNURL, it is available on numerous sites that aggregate Kind:30023 articles, my entire social graph will get it in their feed, & there will be a plethora of different clients/apps/websites/etc through which the users will see this note, each with their own features and designs...
Seriously, why the fuck would I bother starting a Substack and beg people for their emails?
This is only the beginning, and I'm fully here for it. I came for the notes and the plebs, but it's the "Other Stuff" that will change the world.
-
@ 0213d652:6ed3af90
2023-09-08 00:49:00| Corrupção| | --- | |
|
O Brasil de hoje, após as eleições de 2022 tem mudado. Assumiu um governo gastador, marcado pela falta de respeito à constituição federal e tem mantido um "Caça às bruxas" à todos os que pensam diferentemente dele. Sim. Estamos numa ditadura velada, maquiada com assistencialismo pregado na propaganda eleitoral, mas que agora, este também está sendo retirado.
O judiciário, esquecendo-se de seus atributos, tornou-se o braço todo poderoso do governo, punindo jornalistas, youtubers, manifestantes, mantendo pessoas ilegalmente na cadeia sem nenhum processo legal para julgá-las e apenas por manifestarem o descontentamento com o projeto de governo em curso.
Em nome da “democracia” distorcem fatos, acontecimentos e palavras para enganar àqueles que lhes deram voto usando canais de tv muito bem remunerados e assim obter credibilidade dos incautos.
Aproximamo-nos de uma ditadura socialista. O déficit com os gastos para o projeto de poder já se agiganta e será difícil pará-lo. Emfim, resta-nos pedir à Deus que tenha misericórdia do Brasil, um país lindo, rico e com pessoas geniais para fazê-lo crescer e tornar-se uma potência.
-
@ 32e18276:5c68e245
2023-06-01 04:17:00Double-entry accounting is a tried and true method for tracking the flow of money using a principle from physics: the conservation of energy. If we account for all the inflows and outflows of money, then we know that we can build an accurate picture of all of the money we've made and spent.
Bitcoin is particularly good at accounting in this sense, since transaction inflows and outflows are checked by code, with the latest state of the ledger stored in the UTXO set.
What about lightning? Every transaction is not stored on the blockchain, so we need same way to account for all the incoming and outgoing lightning transactions. Luckily for us, core-lightning (CLN) comes with a plugin that describes these transactions in detail!
For every transaction, CLN stores the amount credited and debited from your node: routed payments, invoices, etc. To access this, you just need to run the
lightning-cli bkpr-listaccountevents
command:lightning-cli bkpr-listaccountevents | jq -cr '.events[] | [.type,.tag,.credit_msat,.debit_msat,.timestamp,.description] | @tsv' > events.txt
This will save a tab-separated file with some basic information about each credit and debit event on your node.
channel invoice 232000000 0 1662187126 Havana channel invoice 2050000 0 1662242391 coinos voucher channel invoice 0 1002203 1662463949 lightningpicturebot channel invoice 300000 0 1663110636 [["text/plain","jb55's lightning address"],["text/identifier","jb55@sendsats.lol"]] channel invoice 0 102626 1663483583 Mile high lightning club
Now here's comes the cool part, we can take this data and build a ledger-cli file. ledger is a very powerful command-line accounting tool built on a plaintext transaction format. Using the tab-separated file we got from CLN, we can build a ledger file with a chart-of-accounts that we can use for detailed reporting. To do this, I wrote a script for converting
bkpt
reports to ledger:http://git.jb55.com/cln-ledger
The ledger file looks like so:
``` 2023-05-31 f10074c748917a2ecd8c5ffb5c3067114e2677fa6152d5b5fd89c0aec7fd81c5 expenses:zap:1971 1971000 msat assets:cln -1971000 msat
2023-05-31 damus donations income:lnurl:damus@sendsats.lol -111000 msat assets:cln 111000 msat
2023-05-31 Zap income:zap:event:f8dd1e7eafa18add4aa8ff78c63f17bdb2fab3ade44f8980f094bdf3fb72d512 -10000000 msat assets:cln 10000000 msat ```
Each transaction has multiple postings which track the flow of money from one account to another. Once we have this file we can quickly build reports:
Balance report
Here's the command for "account balance report since 2023-05 in CAD"
$ ledger -b 2023-05-01 -S amount -X CAD -f cln.ledger bal
``` CAD5290 assets:cln CAD2202 expenses CAD525 routed CAD1677 unknown CAD-7492 income CAD-587 unknown CAD-526 routed CAD-1515 lnurl CAD-614 jb55@sendsats.lol CAD-1 tipjar CAD-537 damus@sendsats.lol CAD-364 gpt3@sendsats.lol CAD-4012 merch CAD-2571 tshirt CAD-1441 hat CAD-852 zap CAD-847 event CAD-66 30e763a1206774753da01ba4ce95852a37841e1a1777076ba82e068f6730b75d CAD-60 f9cda1d7b6792e5320a52909dcd98d20e7f95003de7a813fa18aa8c43ea66710 CAD-49 5ae0087aa6245365a6d357befa9a59b587c01cf30bd8580cd4f79dc67fc30aef CAD-43 a4d44469dd3db920257e0bca0b6ee063dfbf6622514a55e2d222f321744a2a0e ...
0
```
As we can see it shows a breakdown of all the sats we've earned (in this case converted to fiat). We can have a higher-level summary using the depth argument:
$ ledger -M -S amount -X sat -f cln.ledger bal
``` sat14694904 assets:cln sat6116712 expenses sat1457926 routed sat4658786 unknown sat-20811616 income sat-1630529 unknown sat-1461610 routed sat-4207647 lnurl sat-11144666 merch sat-2367164 zap
0
```
As we can see we made 14 million sats this month, not bad! The number at the bottom balances to zero which means we've properly accounted for all income and expenses.
Daily Damus Donation Earnings
To support damus, some users have turned on a feature that sends zaps to support damus development. This simply sends a payment to the damus@sendsats.lol lightning address. Since we record these we can build a daily report of damus donations:
$ ledger -D -V -f cln.ledger reg damus
23-May-15 - 23-May-15 ..damus@sendsats.lol CAD-46 CAD-46 23-May-16 - 23-May-16 ..damus@sendsats.lol CAD-73 CAD-120 23-May-17 - 23-May-17 ..damus@sendsats.lol CAD-41 CAD-161 23-May-18 - 23-May-18 ..damus@sendsats.lol CAD-37 CAD-197 23-May-19 - 23-May-19 ..damus@sendsats.lol CAD-35 CAD-233 23-May-20 - 23-May-20 ..damus@sendsats.lol CAD-28 CAD-261 23-May-21 - 23-May-21 ..damus@sendsats.lol CAD-19 CAD-280 23-May-22 - 23-May-22 ..damus@sendsats.lol CAD-29 CAD-309 23-May-23 - 23-May-23 ..damus@sendsats.lol CAD-19 CAD-328 23-May-24 - 23-May-24 ..damus@sendsats.lol CAD-25 CAD-353 23-May-25 - 23-May-25 ..damus@sendsats.lol CAD-36 CAD-390 23-May-26 - 23-May-26 ..damus@sendsats.lol CAD-37 CAD-426 23-May-27 - 23-May-27 ..damus@sendsats.lol CAD-25 CAD-451 23-May-28 - 23-May-28 ..damus@sendsats.lol CAD-25 CAD-476 23-May-29 - 23-May-29 ..damus@sendsats.lol CAD-12 CAD-488 23-May-30 - 23-May-30 ..damus@sendsats.lol CAD-29 CAD-517 23-May-31 - 23-May-31 ..damus@sendsats.lol CAD-21 CAD-537
Not making bank or anything but this covered the relay server costs this month!
Hopefully ya'll found this useful, feel free to fork the script and try it out!
-
@ d34e832d:383f78d0
2023-09-07 22:39:15Empowering the World with PiVPN on Hardware Donations 🌍
By leveraging donated used workstations, we can make powerful impacts enhancing privacy and access globally.
💻Fast Freedom Portals
-
Setup Optiplex/Thinkcentre nodes with PiVPN in censored lands for high-speed internet
-
Leverage remaining RAM/CPU for applications like full Bitcoin nodes
💾Massive Data Syncing
-
Connect globespanning PiVPN mesh for rapid syncing of censorship resistant data
-
Nodes help seed everything from Linux ISOs to TBs of shows/movies for communities
🧑💻Education at Scale
-
Offer nodes to schools/libraries loaded with educational materials made available via PiVPN
-
Students can access lessons, virtual labs and complete coursework remotely without restrictions
💸Generating Resources Ethically
-
Install full Bitcoin/joinedmarket/lightning nodes helping validate/route transactions worldwide
-
Convert portion of earned satoshis into sustainable initiatives for served communities
By repurposing retired enterprise gear, score one for privacy and put left over hardwarehorsepower to work in meaningful ways. Exciting potential for impact!
Optimizing your PiVPN setup and using it effectively:
Hardware Considerations
-
For best performance, use a Pi 4 with at least 2GB RAM. Overclock if needed.
-
Consider a large capacity microSD card rated for good read/write speeds.
-
Add a case and heat sinks to help dissipate heat from overclocking.
Network Optimization
-
Reserve a static IP for your Pi either via DHCP reservation or manually set static IP.
-
Port forward UDP port 51820 on your router for remote access.
-
Test network speeds when connected - use Ethernet if possible for max throughput.
Multiple Device Support
-
Use pivpn -a to add different devices like phones, laptops easily.
-
Generate unique QR codes with pivpn -qr for easy mobile app configuration.
-
Add filters like domain blocking directly in the WireGuard config file as needed.
Backups and Updates
-
Periodically backup configs to external storage using pivpn -bk command.
-
Keep PiVPN updated regularly with pivpn -up to get latest fixes and improvements.
With these tips, your PiVPN should provide reliable wired/wireless access from anywhere! Let me know if any other questions come up.
-
-
@ b9e76546:612023dc
2023-05-23 18:13:45The real power of AI will be in its integration of other tools to use in specific situation and recognizing what those tools are. There will be extremely specific & curated AI models (or just basic software circuits) on certain topics, tasks, or concepts. And this will also be a crucial way in which we keep AI safe, and give it understanding of its own actions. In other words, how we prevent it from going insane. I've recently experienced a tiny microcosm of what that might look like...
— ie. a general language model that knows to call on the conceptual math language model, that then makes sense of the question and knows to input it into the calculator app for explicit calculations when solving complex or tricky word problems. And then to apply this in the realm of safety and morals, a specific model that an AI calls on for understanding the consequences and principles of any actions it takes in the real world.
I believe there needs to be an AI "Constitution" (a particular term I heard used to describe it) where there is a specific set of ideas and actions it is enabled to perform, and a particular set of "moral weights" it must assess before taking action. Anyone who's read Asimov will recognize this as "The Three Laws" and that's basically what it would be. This is critical because an AI running an actual humanoid machine like Boston Dynamics could go ape shit literally because it is emulating trolling someone by doing the opposite of what they asked -- I just had a LLM troll me yesterday & go a bit haywire when i asked it to be concise, and every answer afterward was then the wordiest and longest bunch of nonsense imaginable... it was funny, but also slightly sobering to think how these things could go wrong when controlling something in the real world. Now imagine a robot that thinks Kick Ass is a funny movie and starts emulating its behavior thinking it's being funny because it has no model to assess the importance of the humans whose skulls it's smashing and thinks the more blood it can splatter everywhere makes it a more comical experience for those in the room. That's essentially the "real world robot" version of asking a LLM to be concise and instead getting an avalanche of BS. Ask a robot to be funny and maybe it crushes your skull.
Because of that, I think there will be certain "anchors" or particular "circuits" for these LLMs to be constrained by for certain things. Essentially action specific built governors that add meaning to the actions and things they are doing. A very simple version mentioned above would be a calculator. If you ask an LLM right now to do basic math, it screws up all the time. It has no idea how to generate a true answer. It just predicts what an answer might sound like. So even extremely simple and common sense requests turn up idiotic answers sometimes. But if it can recognize that you are asking a math problem, find the relevant mathematical elements, and then call on the hardcoded & built-in calculator circuit, then the LLM isn't doing the calculation, it's simply the interface between the calculation tool and the human interaction.
What I think will be critical as we integrate these into real world machines over time, and as their capabilities become more generalized and layered, will be to build in a sort of moral constitution that behaves like a concrete engine (a calculator), that has the model recognize when something might be a questionable behavior or cause an undesirable outcome, and then call on the "constitution" to make the decision to act or not. In that way, it may actually prevent itself from doing something stupid or terrible that even a human hadn't realized the full consequences of. — ie. it won't help a child get to the roof of his building so he can fly off the side with his cardboard wings.
It will be very interesting to watch these come about because the failure more of AI will be a critically important thing to consider, and unfortunately from an engineering and cultural standpoint, "failure modes" are something that have been underrepresented and increasingly ignored. A simple example is a modern washing machine; when something entirely arbitrary or some silly little feature breaks, the whole thing is useless and you have to bring a technician out to fix it, when a sensible failure mode would be that it simply routes around what arbitrary feature failed, and continues working normally. This, unfortunately, has become the norm for tons of "modern" devices and appliances. they are simultaneously increasingly "advance" and "stupid" at the same time. It's largely a product of the high time preference mindset, and we need MUCH more low time preference consideration as we unleash AI onto the world. It will matter exponentially more when we start making machines that can operate autonomously, can maintain themselves, and learn through their own interactions and environment... and we aren't very far away.
Learn as fast as you can, understand the tools, and stay safe.
grownostr #AI_Unchained
(my very first post on BlogStack.io)
-
@ 52b4a076:e7fad8bd
2023-05-01 19:37:20What is NIP-05 really?
If you look at the spec, it's a way to map Nostr public keys to DNS-based internet identifiers, such as
name@example.com
.If you look at Nostr Plebs:
It's a human readable identifier for your public key. It makes finding your profile on Nostr easier. It makes identifying your account easier.
If you look at basically any client, you see a checkmark, which you assume means verification.
If you ask someone, they probably will call it verification.
How did we get here?
Initially, there was only one client, which was (kind of) the reference implementation: Branle.
When it added support for NIP-05 identifiers, it used to replace the display name with the NIP-05 identifier, and it had to distinguish a NIP-05 from someone setting their display name to a NIP-05. So they added a checkmark...
Then there was astral.ninja and Damus: The former was a fork of Branle, and therefore inherited the checkmark. Damus didn't implement NIP-05 until a while later, and they added a checkmark because Astral and other clients were doing it.
And then came new clients, all copying what the previous ones did... (Snort originally did not have a checkmark, but that changed later.)
The first NIP-05 provider
Long story short, people were wondering what NIP-05 is and wanted it, and that's how Nostr Plebs came to be.
They initially called their service verification. Somewhere between January and February, they removed all mentions to verification except one (because people were searching for it), and publicly said that NIP-05 is not verification. But that didn't work.
Then, there were the new NIP-05 providers, some understood perfectly what a NIP-05 identifier is and applied the correct nomenclature. Others misnamed it as verification, adding confusion to users. This made the problem worse on top of the popular clients showing checkmarks.
(from this point in the article we'll refer to it as a Nostr address)
And so, the scams begin
Spammers and scammers started to abuse Nostr addresses to scam people: - Some providers has been used by fake crypto airdrop bots. - A few Nostr address providers have terminated multitude of impersonating and scam identifiers over the past weeks.
This goes to show that Nostr addresses don't verify anything, they are just providers of human readable handles.
Nostr addresses can be proof of association
Nostr addresses can be a proof of association. The easiest analogy to understand is email:
jack@cash.app -> You could assume this is the Jack that works at Cash App.
jack@nostr-address-provider.example.com -> This could be any Jack.
What now?
We urge that clients stop showing a checkmark for all Nostr addresses, as they are not useful for verification.
We also urge that clients hide checkmarks for all domain names, without exception in the same way we do not show checkmarks for emails.
Lastly, NIP-05 is a nostr address and that is why we urge all clients to use the proper nomenclature.
Signed:
- Semisol, Nostr Plebs (semisol@nostrplebs.com)
- Quentin, nostrcheck.me (quentin@nostrcheck.me)
- Derek Ross, Nostr Plebs (derekross@nostrplebs.com)
- Bitcoin Nostrich, Bitcoin Nostr (BitcoinNostrich@BitcoinNostr.com)
- Remina, zaps.lol (remina@zaps.lol)
- Harry Hodler, nostr-check.com (harryhodler@nostr-check.com)
-
@ 89f93336:779b7582
2023-09-08 13:32:27source I will be discussing about the contribution of NOSTR to web3 and what the future holds for NOSTR in web3. To do that I will like to discuss a bit about web3.
Web3 according to Wikipedia is “ is an idea for a new iteration of the World Wide Web which incorporates concepts such as decentralization, blockchain technologies, and token-based economics.”
Basically it is just an improved version of the traditional social media like Facebook, Instagram but makes use of a decentralized network and Blockchain to create a more secure space that is user centric and gives users more control over their contents and information without being censored.
Since we understand what web3 is, now let's look at NOSTR and what it is.
source NOSTR in familiar terms is an open network protocol that enables a decentralized social network that does not censor content and promote free speech.
NOSTR stands for “Notes and Other Stuff Transmitted by Relay”.
Like I mentioned earlier, post are resistant to censorship that means their is true freedom of speech unlike the centralized social media where there are lots of rules against freedom of content, determined by a central authority. Post, messages and other transaction are cryptographically validated using private and public keys to authenticate messages and data are stored using Blockchain.
NOSTR provides a true decentralized social network thereby contributing heavily to web3 and this is done through these below;
1) Data ownership and control Through the use of a decentralized Blockchain network NOSTR ensures user have ownership of the data they choose to give and content they share.This also give users power to decide who can access their information and how it can be used, this is a big contribution that align with web3 concept and an improvement to the traditional social media, that sells out user data for ads. 2) Privacy and Security The privacy and security of users and their information and content is really important to NOSTR and they make sure they do this by using encrypted public keys and private keys to validate messages and other transactions in the ecosystem. 3) Resist Censorship Like I mentioned earlier NOSTR provides a platform for true freedom of speech and content for users without having to fear being censored or banned because of their choice of content or opinion. This also align with the goal of web3 in creating a decentralized social network that isn't controlled or censored by central authority like the traditional social media. 4) DAO Decentralized Autonomous organization is one of the protocol used by NOSTR to make sure everyone is equal and contribute fairly in the decision making in the community and that there is no central authority. 5) Earning Unlike most traditional authority where only the the popular user earn a token for sharing content, there are NOSTR programs that make sure their user earn for engaging through integrated crypto token.
With these few points that I mentioned above we can see how NOSTR is already contributing to web3 in creating a sustainable decentralized social space that cut across different sectors like the financial, education, health and so on with collaboration with other web 3 project.
We have seen the growth of NOSTR over the years and I can say that this is just the beginning of something big and massive. I am already on board and so is many other people even former Twitter CEO Jack Dorsey and Ethereum founder vitalik Buterin are already subscribe to the journey, together we can create a user centered, content freedom decentralized social space for all. Thank you for going through this article.
-
@ 34c0a532:5d3638e4
2023-03-16 13:14:53Most bitcoiners have their own, much different definition of what it means to orange pill a person. I’ve seen mentions of getting a taxi driver to download a lightning wallet and sending the payment in sats to them. Is that truly orange-pilling? Hmm… no. It is a great first step, but what makes you believe that that person won’t go on to shitcoins after learning about the ease of using cryptocurrency?
So, let’s define what that is in the terms of this guide.
To orange pill someone means to get them to take the first step into learning about bitcoin, money, self-custody, being sovereign, and to teach them to start questioning the world of lies we’ve been fed our entire lives.
Too poetic? Okay, here’s a more specific one:
To orange pill someone means showing them how to send and receive a bitcoin transaction, explain to them the importance of keeping their seed words safe, and showing them more articles, books and guides so they can go further down the rabbit hole.
I think that’s better, don’t you?
No matter what your definition of orange-pilling is, let’s discuss a few things first.
Orange-pilling comes from the scene in the Matrix where Morpheus offers the blue and the red pill to Neo.
This your last chance. After this there is no turning back. You take the blue pill, the story ends. You wake up in your bed and believe whatever you want to. You take the red pill, you stay in Wonderland, and I show you how deep the rabbit hole goes. Remember, all I’m offering is the truth. Nothing more. ~ Morpheus
The fact that the terms comes from the Matrix is absolutely perfect, because the Matrix is based on Plato’s Allegory of the Cave. Everybody knows the Matrix so let’s talk about the Cave. Inside the cave, people are chained up, in the dark. The only thing they can do is talk to each other and stare forward, where there’s a dim light on the cave’s wall. Someone is moving around objects, throwing shadows on the wall. The people can never see the three-dimensional object, they can only see a shadow, a projection of it, so their world is limited by that knowledge.
Someday a group of people manage to break out of the Cave. They go out into the light, their eyes hurt, the world is massive, they get a panic attack by the lack of a rock ceiling on top of them. It’s vast, it’s too much to bear. And they run back into the cave and tell everyone what they saw, that it’s too bright, too open, too much everything. Objects are real, there’s light everywhere and colours. So many colours, not just the flame, the rock and the shadow.
And they don’t believe them. Maybe they even get angry at them and attack them. Who are these fools to claim that the world is not what they think it is? Who are they to suggest that we’ve all been lied to all our lives?
And that’s the first thing you need to keep in mind when trying to orange pill someone.
Why do some people find it so hard to believe in bitcoin?
The answer is simple. It’s because understanding bitcoin requires acknowledging you’ve been tricked your entire life.
The culture shock is real, I’ve been through it. The stages are as follows:
What is money? You start to learn what money really is, and how fundamentally flawed the Keynesian system has become. You see that the only way forward is by a hard money standard, whether that’s gold or bitcoin. Then you realise that in a world of information, the only logical step is bitcoin. Then why bitcoin? You start to read about it’s properties. It’s antifragile, decentralised. Why is that important? Nobody can control, it great. Why is it like gold that can be attached to an email? Then there’s the anger and disbelief. We’ve been fooled. Why doesn’t everybody see this? You read everything about bitcoin, you listen to podcasts, talk on bitcoin twitter and nostr with other plebs. Nobody seems to have all the answers but they make far more sense than the lies of the mainstream media. You talk to your friends and family, you come off as crazy at best. As I said, you have to acknowledge the trauma the other person is going through. It’s a culture shock, and not many want to go through with it. Think of Plato’s Allegory of the Cave, people who got out into the world went back and told everyone that there’s more to life than the shadows on the wall. Or, the same allegory being told by the Matrix, with Cypher wanting to go back, to forget.
We call that Bitcoin Derangement Syndrome, BDS. It’s hilarious but it’s so real. Many early bitcoiners, people who have spend years of their lives either advocating for it or working on it, some making or losing fortunes in the process, go back to the fiat world, shift gears completely, rant and rave against bitcoin and dive back in the Matrix, the Cave, taking the blue pill. They want to be fiat rich, they lie and delude themselves that everything is okay in the world and if they get just enough money they’d be okay.
But they won’t. This is real, and no matter how many lies they tell themselves things will not change unless we change them ourselves. Babies are dying, that’s true. In wars, in artificially induced poverty, in carrying on with the Keynesian ways of thinking of endless imperial expansion and exploitation.
I’ll be honest, bitcoin rewires your brain.
Do you really wanna force that on people?
Yes?
Then let’s read on.
Why is it sometimes so hard to explain, persuade or convince people about bitcoin? Here’s a harsh truth. It’s because you’re the counterparty risk.
When your car breaks down, you go to a mechanic, you seek expert knowledge. He tells you what’s wrong and you generally accept it. Why? Because unless you’re an expert on cars, you don’t have pre-existing knowledge about this specific situation. Nature abhors a vacuum. The mechanic’s knowledge and expertise fills up that vacuum of knowledge.
Why is it different with bitcoin, then?
Because most people believe they already understand money. There’s no vacuum for their knowledge to fill. Like a woman going to a male gynecologist thinking she knows better because she’s the one with the female body, a nocoiner believes they know better because, see? They have been handling and making money all their lives! Who are you to claim things aren’t how they used to think they are?
Yes, sure. You’re the one with the female body, you’re the one with the wallet. But have you actually taken the time to study it? Have you invested the necessary six years in medical school or the 100 hours it takes to grasp bitcoin?
No.
But they don’t accept that. When you make statements about bitcoin, it collides with their pre-existing frame of reference. When that happens, their mind reflexively casts doubts on the new information, actively fights it and rejects it, because it doesn’t conform to what they know. Their mind is the bearer asset, you are the counterparty risk.
Okay, great. How do you overcome this, then?
By taking the time with them. You can’t force someone to get orange-pilled, it’s not shoving knowledge down their throats. They have to do it themselves, so you start small. Plant a seed. Make them question what they know. That tiny seed, just like in Inception, will grow and push aside the other propaganda in their minds, leaving some space for new information to fill the void.
“Why did they stop having money backed by gold?”
That’s one seed.
“Who prints all these new billions?”
Another. Take your pick, it depends on the person you’re talking to.
A good question makes the nocoiner access their accepted knowledge. They usually think they have the answer and you should listen to it, not shutting it down. Ask them to research it further, to back their claims, to look things up. If they don’t have the knowledge, a new vacuum is created and their curiosity will want to fill it up.
Nocoiner: Bitcoin isn’t backed by anything.
You: Okay. Then what would make good money in its place?
Make them talk by asking questions. As they talk, they’ll realise they have massive gaps in their knowledge. You can help them then, but they themselves have to fill up those gaps by asking more questions and getting them to talk more. Why? Because if someone tells something to themselves they will believe it much easier than having you say it to them. Try and lead them to conclusion, a revelation.
When persuading someone, the person talking the most is the one really getting persuaded. Why? Because when you talk you engrave those words into your brain as facts.
Nocoiner: Bitcoin wastes too much energy.
You: How do you determine how much is too much energy to use?
You will never change their minds, they have to change it themselves. You can only help show them the way, they’re the ones that have to do it. Questions are the key to that process.
Tell them less, ask more.
What questions make people curious about bitcoin? You never know, it depends on what ails the person. Think about their pain. If they’re living in Turkey or Argentina, for example, their pain is massive inflation. You might say, “You’re already using USD to protect your monetary value against inflation, right? How about adding BTC to the mix?”
People in those countries generally grasp this concept a lot quicker. The local lira is the crap kind of money, they spend it often. The USD is the good kind of money, they save it, spending it only when absolutely necessary. And gold is the best kind, keeping it hidden in safes and mattresses. Only to be spent in an emergency. They don’t have the financial privilege to insulate them from the need for bitcoin, they already get these layers of hardness in their money, so bitcoin is a lot easier for them.
“What is money?” is another good question. Most people will answer it, and of course it will be flawed and all over the place. Then you might say, “It’s the promise of future value,” and then discuss how bitcoin has a monetary policy that’s planned out for the next 120 years and how nodes and miners facilitate that design. And especially point out how hard it is to change.
“What happened in 1971?” That’s a good one. Get them to look up the fiat monetary system and figure out how it’s not backed by anything. Get them angry at the Keynesian economists, how they’ve ruined entire countries. 2008 money crisis? Inevitable, under the fiat standard. Forget about bitcoin, point your finger towards the rot. It’s all historical fact, they can’t call you a conspiracy theorist. Most people still think that money is backed by gold. Get them to tell it to other people, see their reactions.
This was a part of my guide. Let me know what you think. Soon to be posted at https://georgesaoulidis.com/how-to-orange-pill-people/
-
@ fd78c37f:a0ec0833
2023-09-08 13:30:15"Read more related articles, follow on the anti-censorship long content platform yakihonne.com.
Stake reported unauthorized transactions from some of its hot wallets on Sep. 4. Withdrawals and deposits were halted then later resumed, but not before hackers stole $41 million in digital assets.
The FBI, along with multiple blockchain security firms, confirmed that the attackers drained funds from Stake via Ethereum, BNB Chain, and Polygon.
Additionally, federal investigators listed 33 wallets including 22 Bitcoin (BTC) addresses tied to the Stake hack. These addresses either received funds directly from Stake’s hot wallets or were used to siphon illicit gains through various networks.
Security shops Arkham and CertiK both said the hacker bridged funds to Avalanche and then to Bitcoin’s blockchain. At press time, the culprits held $36 million on Ethereum , BNB Chain, and Polygon.
Read more: Stake reportedly hacked, {{text}}5.7m suspiciously moved
Lazarus Group, also known as APT38, is a band of cyber criminals and hackers supposedly funded by the North Korean government. The organization is said to have stolen almost $2 billion from crypto platforms and digital asset service providers since 2022.
In addition to the Stake hack, authorities said Lazarus also masterminded several high-profile crypto heists including Atomic Wallet’s $100 million exploit, the $100 million attack on Harmony’s Horizon bridge, and over $600 million snatched from Sky Mavis’ Ronin bridge.
The attack on Ronin remains one of the largest exploits of any crypto platform to date.
Lazarus also reportedly stole a combined $97 million from crypto payment processors Alphapo and CoinsPaid.
In August 2022, the US Department of the Treasury’s Office of Foreign Assets Control (OFAC) sanctioned privacy tool Tornado Cash over suspected links to Lazarus. The OFAC claimed that Lazarus tapped Tornado Cash to launder hundreds of millions in illicit wealth.
By:Naga Avan-Nomayo Link:https://crypto.news/fbi-lazarus-group-hacked-and-stole-41m-from-crypto-casino-stake/
-
@ aa55a479:f7598935
2023-02-20 13:44:48Nostrica is the shit.
-
@ fab018ad:dd9af89d
2023-09-07 13:39:261. ฟาร์มกุ้งวิปโยค
“ทุกอย่างล้วนหายไปหมดแล้ว”
–Kolyani Mondal
เมื่อ 52 ปีก่อน พายุไซโคลนโบลาฆ่าผู้คนในแถบชายฝั่งของบังกลาเทศไปมากกว่า 1 ล้านคน ถือเป็นพายุไซโคลนที่ร้ายแรงที่สุดที่มีการบันทึกไว้ในประวัติศาสตร์
หน่วยงานท้องถิ่นและองค์กรนานาชาติรู้ถึงความเสี่ยงที่จะเกิดความเสียหายร้ายแรงจากพายุลักษณะนี้เป็นอย่างดี ดังนั้นในช่วงปี 1960 หน่วยงานภูมิภาคจึงสร้างแนวกันคลื่นขนาดใหญ่เพื่อป้องกันแนวชายฝั่ง ซึ่งเปิดโอกาสให้มีการใช้พื้นที่สำหรับการเกษตรได้มากขึ้น
แต่หลังจากการลอบสังหารผู้นำอย่าง ชีค มูจิบูร์ เราะห์มาน ในการประกาศอิสรภาพ ก็ได้เกิดการเปลี่ยนแปลงแนวทางภายใต้ระบอบเผด็จการของบังกลาเทศด้วยการผลักดันของอิทธิพลจากต่างประเทศ ชีวิตของผู้คนถูกลดความสำคัญ และแนวป้องกันพายุสำหรับประชาชนถูกทำให้อ่อนแอลง
หมายเหตุผู้แปล : ชีค มูจิบูร์ เราะห์มาน (Sheikh Mujibur Rahman) เป็นผู้ก่อตั้งประเทศบังกลาเทศ โดยดำรงตำแหน่งประธานาธิบดีและนายกรัฐมนตรีระหว่างปี 1971 จนถูกลอบสังหารในปี 1975
ทั้งหมดก็เพื่อเร่งอัตราการส่งออกและเพื่อนำเงินมาชดใช้หนี้
โดยแทนที่จะส่งเสริมการปลูกป่าชายเลน ซึ่งสามารถเป็นแนวป้องกันพายุตามธรรมชาติ เพื่อประโยชน์สำหรับประชาชนมากกว่า 1 ใน 3 ของประเทศที่อาศัยอยู่ตามแนวชายฝั่ง หรือแม้แต่ลงทุนในการผลิตอาหารให้เพียงพอต่อการบริโภคภายในประเทศที่กำลังเติบโตอย่างรวดเร็ว แต่รัฐบาลกลับเลือกที่จะกู้เงินจากธนาคารโลกและกองทุน IMF เพื่อที่จะขยายฟาร์มกุ้ง ซึ่งกระบวนการเพาะเลี้ยงสัตว์น้ำในประเทศนั้นถูกควบคุมโดยเครือข่ายชนชั้นปกครองที่ร่ำรวยอีกด้วย
พวกคนรวยรวมหัวกันผลักดันบรรดาเหล่าชาวไร่ให้กู้ยืมเงินเพื่อทำสิ่งที่เรียกว่าการ “อัปเกรดกระบวนการเพาะเลี้ยง” โดยทำการขุดหลุมตามแนวกันคลื่นซึ่งป้องกันที่ดินของพวกเขาจากทะเล ทำให้ที่ดินที่เคยอุดมสมบูรณ์ของพวกเขาเต็มไปด้วยน้ำเกลือ หลังจากนั้นพวกเขาก็ต้องทำงานอย่างหลังขดหลังแข็ง เพื่อจับตัวอ่อนของกุ้งจากทะเลด้วยมือเปล่า เพื่อนำมันกลับมาเลี้ยงในบ่อพัก ก่อนจะขายกุ้งตัวโตเต็มวัยให้กับผู้รับซื้อกุ้ง ซึ่งมักจะเป็นผู้มีอิทธิพลในพื้นที่
เงินทุนที่กู้จากธนาคารโลกและ IMF ทำให้ไร่นาสวน ที่ดินลุ่มน้ำ และป่าชายเลนนับไม่ถ้วน ถูกดัดแปลงให้กลายเป็นบ่อกุ้งที่เรียกว่า “ghers”
พื้นที่บริเวณสามเหลี่ยมปากแม่น้ำคงคานั้นถือเป็นพื้นที่ที่มีความอุดมสมบูรณ์อย่างน่าทึ่ง โดยเป็นที่ตั้งของ “ป่าสุนทรพนา” ป่าชายเลนที่ใหญ่ที่สุดในโลก แต่หลังจากที่การทำฟาร์มกุ้งเชิงพาณิชย์ได้กลายเป็นธุรกิจหลักในท้องถิ่น ต้นโกงกางมากกว่าร้อยละ 45 ได้ถูกตัดออกไปเกลี้ยง ทิ้งให้ผู้คนเผชิญกับคลื่นสูงกว่า 10 เมตรที่พุ่งเข้าชนแนวชายหาดเวลาเกิดพายุไซโคลน พื้นที่ทำกินที่อุดมสมบูรณ์และสิ่งมีชีวิตตามริมแม่น้ำค่อย ๆ ถูกทำลายไปจากความเค็มที่เพิ่มขึ้นจากน้ำทะเล
จนสุดท้ายป่าทั้งป่าก็ได้อันตรธานหายไป เพราะฟาร์มกุ้งนั้นทำลายพืชพรรณท้องถิ่นทั้งหมด กลุ่มความร่วมมือพัฒนาชายฝั่ง (Coastal Development Partnership) ได้กล่าวถึงผลกระทบที่เกิดขึ้นนี้ว่า “การกระทำนี้ทำให้ดินแดนที่เคยอุดมสมบูรณ์กลายเป็น ‘ทะเลทรายที่เต็มไปด้วยน้ำเค็ม' ”
พื้นที่ไร่นาที่ปล่อยน้ำทะเลเข้ามาเพื่อทำฟาร์มกุ้งในจังหวัด Khuna
อย่างไรก็ตาม ผู้มีอิทธิพลที่รับซื้อกุ้งเหล่านี้กลับร่ำรวยขึ้นอย่างมาก และกุ้ง (ซึ่งถูกเรียกว่าเป็น “ทองคำสีขาว”) ก็กลายเป็นสินค้าส่งออกอันดับ 2 ของประเทศ
โดยนับตั้งแต่ปี 2014 เป็นต้นมา ชาวบังกลาเทศมากกว่า 1.2 ล้านคนทำงานในอุตสาหกรรมกุ้ง และผู้คนอีกกว่า 4.8 ล้านคนที่ต้องพึ่งพิงอุตสาหกรรมนี้ในทางอ้อม ซึ่งตัวเลขนี้ถือเป็นครึ่งหนึ่งของจำนวนคนยากจนที่อาศัยอยู่ตามชายฝั่ง คนเก็บกุ้งเป็นผู้ที่ทำงานหนักที่สุด (ซึ่งถือเป็นร้อยละ 50 ของแรงงานในอุตสาหกรรม) แต่ได้รับส่วนแบ่งเพียงร้อยละ 6 ของผลกำไร โดยร้อยละ 30 ของแรงงานนั้นเป็นแรงงานเด็กที่มีทั้งเด็กผู้ชายและเด็กผู้หญิง ซึ่งทำงานในน้ำเค็มมากถึง 9 ชั่วโมงต่อวันด้วยค่าจ้างรายวันน้อยกว่า 1 ดอลลาร์สหรัฐ เด็กเหล่านี้ส่วนมากไม่รู้หนังสือและไม่ได้เรียนต่อ
ผู้คนเคยมีการลุกฮือขึ้นประท้วงต่อต้านการขยายตัวของฟาร์มกุ้ง แต่แล้วก็ถูกปราบปรามอย่างรุนแรง โดยในเหตุปราบปรามที่เลื่องลือครั้งหนึ่่งนั้น ขบวนผู้ประท้วงถูกทำร้ายด้วยระเบิดจากผู้มีอิทธิพลที่รับซื้อกุ้งและกลุ่มลูกน้อง และมีผู้หญิงรายหนึ่งชื่อ Kuranamoyee Sardar ถูกตัดศีรษะจากเหตุปราบปรามดังกล่าว
ในงานวิจัยปี 2007 ซึ่งสำรวจฟาร์มกุ้งของชาวบังกลาเทศกว่า 102 แห่ง พบว่าแม้ค่าใช้จ่ายในการผลิตทั้งหมดจะอยู่ที่ 1,084 ดอลลาร์สหรัฐต่อเฮกตาร์ แต่รายได้สุทธิกลับอยู่ที่ 689 ดอลลาร์สหรัฐ นั่นหมายถึงกำไรที่ประเทศได้จากการส่งออกนั้น แลกมาด้วยการที่แรงงานในอุตสาหกรรมกุ้งต้องรับเคราะห์จากค่าจ้างที่ถูกกดและสภาพแวดล้อมของพวกเขาที่ถูกทำลายจนหมดสิ้น
ในรายงานที่จัดทำโดยมูลนิธิความยุติธรรมด้านสิ่งแวดล้อม (Environmental Justice Foundation) ชาวไร่ที่อยู่ริมชายฝั่งอย่างคุณ Kolyani Mondal ได้กล่าวว่า “เธอเคยปลูกข้าว พร้อมเลี้ยงปศุสัตว์และสัตว์ปีก” แต่หลังจากที่ได้มีการทำเกษตรฟาร์มกุ้ง “วัว ควาย และแพะของเธอก็เริ่มเป็นโรคท้องร่วงไปพร้อม ๆ กับเหล่าแม่ไก่และเป็ดซึ่งเป็นสัตว์ของเธอ พวกมันล้วนตายทั้งหมด”
ตอนนี้ทุ่งของเธอเต็มไปด้วยน้ำเกลือ และที่ดินที่ยังเหลืออยู่ก็เพาะปลูกอะไรแทบไม่ขึ้น ในอดีตนั้นครอบครัวของเธอสามารถปลูกข้าวได้ 18-19 มอนต่อเฮกตาร์ แต่ตอนนี้เหลือแค่ 1 มอนต่อเฮกตาร์ เธอยังจำช่วงเวลาในปี 1980 ที่เพิ่งเริ่มมีการทำฟาร์มกุ้งได้ ในตอนนั้น ชาวบ้านได้รับการสัญญาว่าสิ่งนี้จะสร้างรายได้เพิ่มขึ้น รวมทั้งมอบอาหารและพืชผลให้พวกเขามากขึ้น
แต่ตอนนี้ “ทุกอย่างล้วนหายไปหมดแล้ว” ชาวไร่ผู้เลี้ยงกุ้งขอเช่าที่ดินของเธอ โดยตกลงจะจ่ายเงินเธอ 140 ดอลลาร์สหรัฐต่อปี แต่ตอนนี้อย่างดีที่สุดที่เธอได้รับคือเงินผ่อนจ่ายแปลงละ 8 ดอลลาร์สหรัฐบ้างเป็นครั้งคราว โดยเธอกล่าวว่า “ในอดีตครอบครัวของเธอสามารถหาเลี้ยงตัวเองได้อย่างดีจากบนผืนดินแห่งนี้ แต่ตอนนี้ไม่เหลือทางเลือกใด ๆ นอกจากการไปซื้ออาหารที่ตลาด”
หมายเหตุผู้แปล : - มอน (Muand) เป็นหน่วยวัดน้ำหนักดั้งเดิมที่ใช้กันในเอเชียใต้ โดย 1 มอนมีค่าเทียบเท่าที่หลากหลายตั้งแต่ 11 กิโลกรัม จนถึง 72 กิโลกรัม - เฮกตาร์ (Hectare) เป็นหน่วยวัดพื้นที่ในมาตราเมตริกโดย 1 เฮกตาร์ เท่ากับ 10,000 ตารางเมตร หรือประมาณ 6 ไร่ 1 งาน.
ในบังกลาเทศนั้นเงินกู้เพื่อการปรับโครงสร้างจากธนาคารโลกและ IMF ปริมาณนับพันล้านดอลลาร์ (ที่มาของชื่อ “เงินกู้เพื่อการปรับโครงสร้าง” ได้มาจากการที่ผู้ปล่อยกู้จะบังคับให้ประเทศผู้กู้ต้องปรับโครงสร้างทางเศรษฐกิจเพื่อให้เอื้อกับการส่งออก ซึ่งต้องแลกมาด้วยการบริโภคภายในประเทศ) ได้ทำให้กำไรในการส่งออกกุ้งของประเทศเพิ่มขึ้นจาก 2.9 ล้านดอลลาร์สหรัฐในปี 1973 - เพิ่มเป็น 90 ล้านดอลลาร์สหรัฐในปี 1986 - และเพิ่มเป็น 590 ล้านดอลลาร์สหรัฐในปี 2012
ซึ่งรายได้ดังกล่าวถูกนำมาใช้จ่ายหนี้ต่างประเทศและใช้ในการพัฒนากองทัพ แต่เงินบางส่วนก็ไหลเข้ากระเป๋าเจ้าหน้าที่รัฐ (ซึ่งก็ไม่ได้แตกต่างอะไรกับกรณีส่วนใหญ่ของประเทศกำลังพัฒนา) ในขณะที่เหล่าแรงงานทาสในอุตสาหกรรมกุ้งต้องถูกกดขี่ให้ยากจน ถูกลิดรอนอิสรภาพ ต้องพึ่งพิงผู้อื่น และมีความสามารถในการหาเลี้ยงตัวเองได้น้อยลงกว่าแต่ก่อน
โดยที่แย่ไปกว่านั้นคือผลวิจัยยังแสดงให้เห็นว่า “หมู่บ้านที่มีป่าชายเลนไว้เป็นแนวป้องกันตัวจากคลื่นพายุซัดฝั่งจะมีผู้เสียชีวิตน้อยลงมาก เมื่อเทียบกับหมู่บ้านที่ป่าชายเลนเสียหายหรือถูกทำลาย”
ภายใต้แรงกดดันของสาธารณชน ในปี 2013 ธนาคารโลกจึงได้ปล่อยเงินกู้ 400 ล้านดอลลาร์สหรัฐให้แก่บังกลาเทศเพื่อใช้ในการพยายามแก้ไขความเสียหายของระบบนิเวศที่เกิดขึ้น ซึ่งพูดในอีกแง่หนึ่งก็คือธนาคารโลกจะได้รับค่าตอบแทนในรูปแบบของดอกเบี้ยจากการพยายามแก้ปัญหาที่ตัวเองเป็นผู้ก่อขึ้นตั้งแต่แรก ในขณะเดียวกันธนาคารโลกยังได้ปล่อยเงินกู้นับพันล้านดอลลาร์สหรัฐไปยังทุกประเทศ ไล่ตั้งแต่เอกวาดอร์ ไปยันโมร็อกโก จนถึงอินเดีย เพื่อเปลี่ยนฟาร์มดั้งเดิมในท้องถิ่นให้กลายเป็นฟาร์มกุ้ง
ธนาคารโลกได้อ้างว่าบังกลาเทศนั้นคือ “เรื่องราวที่น่าทึ่งของการลดความยากจนและการพัฒนาประเทศ” หากยึดจากในข้อมูลตามเอกสารที่ว่าแล้ว นี่ถือเป็นชัยชนะ เพราะเศรษฐกิจของประเทศอย่างบังกลาเทศมีแนวโน้มที่จะเติบโตต่อไป ในขณะเดียวกับที่มูลค่าการส่งออกนั้นเติบโตขึ้นเพื่อชดเชยมูลค่าจากการนำเข้า แต่แท้จริงแล้วรายได้จากการส่งออกส่วนใหญ่กลับไหลเข้าสู่กระเป๋าของชนชั้นนำและเจ้าหนี้ต่างประเทศ และหลังจากได้รับเงินกู้เพื่อการปรับโครงสร้างมาถึง 10 ครั้ง หนี้ของบังกลาเทศเติบโตขึ้นอย่างมหาศาล โดยเพิ่มจาก 145 ล้านดอลลาร์สหรัฐในปี 1972 กลายเป็น 95,900 ล้านดอลลาร์สหรัฐในปี 2022 ซึ่ง ณ ตอนนี้ประเทศบังกลาเทศเองก็กำลังเผชิญกับวิกฤตด้านดุลการชำระเงิน (Balance of Payments) จากหนี้สินอีกครั้ง และในเดือนพฤศจิกายน 2022 รัฐบาลก็ตกลงที่จะกู้เงินปรับโครงสร้างครั้งที่ 11 จาก IMF โดยมีการอัดฉีดเงินช่วยเหลือมูลค่า 4,500 ล้านดอลลาร์สหรัฐเข้ามาในระบบ โดยแลกกับการถูกแทรกแซงในการปรับโครงสร้างที่เพิ่มขึ้นไปอีก
ธนาคารโลกและ IMF นั้นก็ต่างอ้างว่าพวกเขาต้องการช่วยเหลือประเทศที่ยากจน แต่ตลอด 50 ปีที่ผ่านมา ผลลัพธ์จากนโยบายของพวกเขาก็ได้แสดงให้เห็นอย่างชัดเจนว่า ประเทศอย่างบังกลาเทศกลับกลายเป็นประเทศที่ต้องพึ่งพาผู้อื่นมากขึ้น และเต็มไปด้วยหนี้สินอย่างที่ไม่เคยเป็นมาก่อน
ในระหว่างวิกฤตหนี้ของประเทศโลกที่สามในช่วงทศวรรษ 1990 การวิพากษ์วิจารณ์จากสาธารณชนทั่วโลกที่ต้องการจะตรวจสอบข้อเท็จจริงของธนาคารโลกและ IMF ได้ค่อย ๆ สะสมจนปะทุขึ้น เริ่มมีการศึกษาวิจัยเพื่อสืบค้นข้อมูลอย่างจริงจัง ผู้คนออกมาประท้วงตามท้องถนน และมีความเชื่อที่แพร่กระจายไปยังทุกฝั่งการเมือง (แม้กระทั้งในรัฐสภาของสหรัฐฯ เอง) ว่าองค์กรเหล่านี้ไร้ซึ่งประโยชน์ หรือกระทั่งเป็นพิษภัยด้วยซ้ำ แต่ความรู้สึกและความสนใจในองค์กรเหล่านี้ได้จางหายไปเกือบหมดแล้ว และถึงแม้ความรู้สึกและความสนใจเหล่านี้จะกลับมาอีกครั้ง มันกลับถูกมองว่าเป็นสิ่งที่ไม่สำคัญ หรือแม้จะมีการยอมรับว่าองค์กรพวกนี้มีปัญหาแต่ก็ยังมีความจำเป็นอยู่ หรือกระทั่งยังมีความเชื่อว่าองค์กรพวกนี้มีประโยชน์และยังได้รับการต้อนรับเหมือนเดิม
ความเป็นจริงแล้วองค์กรเหล่านี้ทำให้ผู้คนนับล้านยากจนลงและชีวิตเสี่ยงอันตรายมากกว่าในอดีต ในขณะเดียวกันกลับทำให้เหล่าผู้นำเผด็จการและเครือข่ายที่ยักยอกความมั่งคั่งของประเทศนั้นร่ำรวยขึ้น และยอมละทิ้งสิทธิมนุษยชนเพื่อทำให้อาหาร ทรัพยากรธรรมชาติ และแรงงานราคาถูกไหลออกจากประเทศที่ยากจนไปสู่ประเทศที่ร่ำรวย พฤติกรรมของพวกเขาที่กระทำในบังกลาเทศนั้นไม่ใช่เรื่องผิดพลาดหรือเป็นกรณียกเว้นแต่อย่างใด
แต่นั่นเป็นวิธีการดำเนินธุรกิจตามปกติของพวกเขา..
⚡️กด Zap บทความนี้เป็นกำลังใจทีมงาน
(ทุกยอด zap จะถูกแบ่งอัตโนมัติเข้าวอลเล็ทของผู้เขียนบทความต้นฉบับภาษาอังกฤษ, ผู้แปลดราฟต์ 1, ผู้เรียบเรียงดราฟต์ 2-3, กองบรรณาธิการและพิสูจน์อักษรจากไรท์ชิฟต์ พร้อมกันบางส่วนไว้เพื่อเป็นค่าธรรมเนียมธุรกรรม)
>แปลและเรียบเรียงจากบทความต้นฉบับเรื่อง : STRUCTURAL ADJUSTMENT: HOW THE IMF AND WORLD BANK REPRESS POOR COUNTRIES AND FUNNEL THEIR RESOURCES TO RICH ONES ซึ่งเผยแพร่ครั้งแรกเมื่อวันที่ 22 พ.ย. ปี ค.ศ. 2022
-
@ aa8e5554:071fd9fc
2023-09-07 12:28:03Are you ready to showcase your dev skills?
DoraHacks.io has just announced the launch of several exciting hackathons, including:
- ATOM Accelerator's AEZ Boost Hackathon
- BinaryX Online Hackathon 2023
- Akash-a-thon
- Comdex Hackathon
- Althea iFi Hackathon
- And more.
Get ready to participate in the upcoming flagship hackathons:
- Klaymakers 23 Hackathon
- Linera Autumn Developer School 2023
- Hackmos Cosmos Istanbul Hackathon
- And other events.
Don't miss out on the opportunity to be part of the blockchain innovation.
Join now and unleash your potential at DoraHacks.io!
-
@ fd78c37f:a0ec0833
2023-09-08 13:27:30"Read more related articles, follow on the anti-censorship long content platform yakihonne.com.
Kraken, a crypto exchange, is making strategic moves to broaden its offerings in trading and payment.
After FTX’s downfall last November, Kraken’s subsidiary Crypto Facilities aims to target the lucrative derivatives sector, which had $1.85 trillion in trading volume across centralized exchanges last month alone.
Concurrently, Kraken is also widening its payment methods, introducing PayPal deposits for its UK and European customers.
Crypto Facilities, acquired by Kraken in 2019, is presently in talks with the UK’s Financial Conduct Authority (FCA) for permission to expand its custodial services, Bloomberg reported on Sep. 7.
The London-based unit is eyeing the opportunity to offer futures contracts denominated in fiat currencies like euros and pounds, an expansion over its existing multilateral trading facility license granted in 2020.
Mark Jennings, CEO of Crypto Facilities, envisions these expansions to materialize within six to 12 months. However, he remains cautious about immediate market recovery, indicating that the trading volume is now around $100 million, a sharp decline from $700 to $800 million per day prior to the FTX fallout.
You might also like: Kraken dominates US altcoin market liquidity in July
Simultaneously, Kraken is making headway in improving its payment features.
On Sep. 7, Kraken rolled out support for PayPal deposits in the UK and Europe, a feature that’s currently limited to its mobile app.
This allows users to quickly fund their accounts with a 2.4% fee and holds the potential to make crypto more accessible to a broader demographic.
To utilize this service, users must pass an Intermediate or Pro level verification and can deposit up to £1,000 ($1,250) daily. The funds become available almost instantly but are subject to a seven-day withdrawal hold.
This comes on the heels of Kraken’s interface makeover and the addition of PayPal’s new stablecoin, PYUSD, to its platform.
These developments occur in the context of a broader trend where multiple US-based crypto platforms are exploring global expansion in response to heightened attention from regulatory entities such as the Securities and Exchange Commission (SEC) and the Commodity Futures Trading Commission (CFTC).
Recently, Kraken discontinued its crypto staking services in the U.S. following a settlement with the SEC.
By:Bralon Hill Link:https://crypto.news/kraken-expands-offerings-in-crypto-derivatives-adds-paypal-support-in-europe-and-uk/
-
@ fd78c37f:a0ec0833
2023-09-08 13:25:30"Read more related articles, follow on the anti-censorship long content platform yakihonne.com.
In a move that underscores the momentum of Bitcoin Ordinals protocol ecosystem, the OnChainMonkey (OCM) project has committed to migrating its entire digital art collection from Ethereum to Bitcoin.
In total, moving the collection, which includes burning the old NFTs on Ethereum so they can no longer be traded, cost the project over $1 million in Bitcoin fees.
OnChainMonkey, created by Metagood, became the first profile picture collection created entirely on-chain in a single Ethereum transaction back in 2021. Further, it launched its first Ordinals collection in February shortly after the Ordinals launch.
Notably, the decision was supported by a broad portion of OnChainMonkey NFT owners, with users voting to subsidize a portion of the substantial migration cost.
The DAO proposal gained overwhelming support, with a quorum of 2,000 votes reached within 24 hours. Overall, 99% of voters backed the migration to Bitcoin, a sign that signals NFT users believe Ordinals on Bitcoin may have a greater value than Ethereum-backed NFTs.
"Our OCM community has conviction in our move to Bitcoin. We have been involved with Ordinals since the beginning of the year, and the OCM community, in particular, has a great understanding of the potential and benefits of the migration to Bitcoin," Metagood CEO Danny Yang said.
The transaction comes at a time when the Ordinals market has cooled considerably, with total transaction volumes and sales across exchanges seeing a notable decline.
That said, the news suggests this sector of the market could be gearing up for a second push given that Bitcoin Ordinals represent such a significant technology improvement over crypto-based NFTs.
By:REED MACDONALD Link:https://bitcoinmagazine.com/culture/onchainmonkey-1-million-migrate-nfts-to-bitcoin
-
@ d266da53:7224d834
2023-09-08 13:23:55Stay updated on the latest developments in Crypto , follow me on Yakihonne.com.
Mirae Asset Securities, South Korea's largest financial group with over $500 billion in assets under management, said Thursday that it is working with Ethereum scaling platform Polygon Labs to advance tokenization within finance and boost adoption of Web3 technologies.
Polygon Labs will be a technical consultant in The Mirae Asset Security Token Working Group, which is working to create infrastructure to issue, exchange, and distribute tokenized securities, the asset manager said in the press release shared with CoinDesk.
The group includes several other companies, including Linger Studio and Coin Plug, and operates independently from Mirae, Hana Financial and SK Telecom's security token consortium, Next Finance Initiative (NFI).
"Polygon Labs is a leading global blockchain technology development company that is innovating throughout all aspects of Web3. Through technical collaboration with Polygon Labs, Mirae Asset Securities aims to establish global leadership in the field of tokenized securities," Ahn In-sung, head of the digital assets division at Mirae Asset Securities, said.
Tokenization involves bringing real-world assets, such as real estate, bonds, fine art, and equities, as digital tokens on a blockchain.
Several traditional finance giants, including Franklin Templeton and Hamilton Lane, a top-tier investment firm with over $823.9 billion in assets under management, have already initiated tokenization projects on Polygon. The Monetary Authority of Singapore's experimental tokenization initiative, Project Guardian, executed foreign exchange and sovereign bond transactions on Polygon last year.
Per Boston Consulting Group and investment firm ADDX, asset tokenization, as a business opportunity, is likely to increase 50 times to $16.1 trillion by 2030, accounting for 10% of the global gross domestic product.
Polygon Lab's Executive Chairman Sandeep Nailwal expects Mirae's efforts to boost the adoption of Web3 technologies in the financial industry.
“Mirae is a great example of a progressive, forward-looking company that aims to stay up to date with the constantly evolving world of digital finance. Its foray into tokenization will undoubtedly help accelerate the mass adoption of web3 among other financial institutions,” Nailwal said “At the same time, Mirae’s initiatives will also greatly contribute to establishing interoperability between South Korea’s domestic financial systems and their foreign counterparts," he added.
CORRECTION (Sept. 7, 09:33 UTC): Adds dropped word "billion" in first paragraph.
By:Omkar Godbole Link:https://www.coindesk.com/business/2023/09/07/500b-korean-asset-manager-taps-polygon-labs-to-develop-tokenized-securities-network/
-
@ 0224d935:054a3d8d
2023-09-07 10:56:16Being a writer is delving into a universe where words become the brush with which the canvas of imagination is painted. Famous names like Shakespeare, Jane Austen, and Gabriel García Márquez have illuminated this path with their timeless works. But, is a writer made or born? The answer is a blend of both. While some have an innate talent, writing is an art perfected over time with dedication. A writer's goal goes beyond putting stories on paper; it's about communicating emotions, provoking reflections, and connecting deeply with the reader. Therefore, it's essential to develop good habits as a writer to channel creativity and make an impact on the audience.
What's the Best Part of Being a Writer?
The best part of being a writer lies in the ability to create entire worlds with words and emotions. Writing is a window to imagination, where you can breathe life into unique characters, places, and situations. Furthermore, it offers an unparalleled form of personal expression, allowing you to share your thoughts, dreams, and perspectives with the world.
The most positive aspect is the satisfaction of seeing your ideas transformed into printed words, influencing readers and leaving a lasting impression on their lives. Writing also provides creative freedom and the opportunity to explore various genres and styles. Additionally, it can be a source of self-discovery and personal growth.
Another advantage is the flexibility that writing offers as a career, allowing you to work from anywhere at any time. It can also serve as a form of therapy, helping you process emotions and experiences.
Being a writer is an exciting and enriching journey that allows you to unleash your creativity, share your voice with the world, and experience a unique form of self-realization.
What's the Downside?
The downside of being a writer involves significant challenges. One of the most complex aspects is the self-demand and constant self-critique that often accompanies writing. Writers can be their harshest critics, leading to insecurity and creative blocks.
Additionally, writing can be a solitary profession, resulting in social isolation and a lack of human interaction. Financial uncertainty is another factor, as economic stability is not always guaranteed, especially for novice authors.
Constant rejection by publishers or readers can also be discouraging. The lack of recognition and the difficulty of standing out in a saturated market are additional challenges that writers face.
The negative side of being a writer includes emotional pressures, isolation, financial instability, and the constant confrontation with criticism and rejection.
How to Prevent These Challenges From Affecting You?
To prevent these challenges, which sometimes accompany the profession of a writer, from affecting you significantly, it's crucial to develop a resilient mindset and adopt healthy practices. This includes managing expectations, understanding that excessive self-critique can be counterproductive, and seeking support in writer communities. It's also essential to diversify daily activities to avoid isolation and take care of both physical and mental health. Writing is a unique and enriching journey, and adopting positive strategies can make this journey more rewarding and sustainable in the long run.
Physical and Mental Health Care
The physical and mental health of a writer is a crucial aspect to maintain a sustainable and rewarding creative career. Writing often involves long hours of immersion in stories and characters, which can lead to social isolation and physical strain. To stay in top shape, writers should pay attention to ergonomics, take regular breaks, and maintain a balanced diet. Furthermore, mental health is equally important. Stress management, seeking emotional support, and setting boundaries are essential practices to maintain a positive balance between the passion for writing and personal well-being.
Optimizing Your Day
Optimizing your day is crucial for a writer because it can make the difference between productivity and creative stagnation. A writer needs to make the most of every moment to dedicate time to writing, revising, and planning. A well-structured routine provides a framework that helps prevent procrastination and ensures that words flow consistently. Additionally, optimizing your day also includes efficient time management for research, editing, and promoting your work. Maintaining a balance between writing and other essential activities, such as exercise and rest, is fundamental to sustaining creativity and energy over time. In summary, optimizing your day is the foundation for a writer to achieve goals and maximize creative potential.
"The craft of a writer is like weaving an infinite tapestry of words, where each row is a story, a world, a life. It's an act of love and obsession, an endless quest for truth and beauty in the labyrinth of imagination."
Ultimately, the profession of a writer, despite its challenges, is an endless source of gratification. While it may involve moments of difficulty and self-critique, the passion for writing and the potential to touch readers' hearts with authentic stories make every effort worthwhile. Sometimes, instead of suffering in the pursuit of perfection, it's essential to remember that writing flows best when done from the heart, when you share your experiences and emotions with the world. It's in these moments that the true magic of being a writer unfolds, reminding us that, ultimately, it's the love for words that guides us on this exciting creative journey.
-
@ d266da53:7224d834
2023-09-08 13:21:56Stay updated on the latest developments in Crypto , follow me on Yakihonne.com.
Blockchain and artificial intelligence (AI) are little more than bundles of computer networks and code, but they sure are becoming important players in nearly all aspects of online life.
An estimated 66% of the world’s population uses the internet for everyday activities like shopping, social connection, healthcare, business and entertainment. Additionally, at least 7 billion devices are connected to the internet through sensors and custom-designed software, comprising a growing cadre of gadgets referred to as the internet of things (IoT).
All this activity means one thing: data. Lots of data. As WIRED put it in 2014, data today is as valuable of a commodity as oil was in the 18th century. As of 2023, more than 11,000 marketing solutions exist simply to capture, track, analyze and report on consumer data to yield profitable insights.
Blockchain, an open-source globally distributed ledger, offers us a new place to store all that data where it might finally be independent of third-party companies that place profit incentives over consumer privacy. Yet, data on blockchain is publicly available by default – which is not ideal for most of our information. This transparency is causing many of us to think critically – perhaps for the first time – about what types of personal data we want to exist on the internet and how we should renegotiate Web2’s social contracts that have allowed centralized platforms like Facebook and Twitter to own our data in exchange for services.
That’s where artificial intelligence (AI) could come in. In an ideal future, third-party companies don’t track and analyze our data – AI does. Let’s imagine, in this ideal scenario, that we understand well enough how AI learning models work and therefore trust them to develop insights about who we are while tracking digital provenance and verifying the credibility of our information.
Sounds great, right? But unfortunately, most new AI use cases are still experimental and nobody can predict success. As happens with new technologies, the true capacities of AI and blockchain are currently getting lost in hyperbole, misunderstandings and FUD (fear, uncertainty and doubt). We spoke to several data experts and Web3 insiders to better understand where AI and Web3 might successfully converge to create consumer-friendly solutions for verification, ownership and creativity.
News verification
With the upcoming U.S. presidential elections, the issue of deep fakes and misinformation has become a grave concern. But what if we could publicly track the origin of information? According to Lisa DeLuca, senior director of engineering at Web3 domain company Unstoppable Domains, not only does the source-tracking technology exist, but there’s also a way to link news quotes to the public key of the person who said it.
“We've got a pending patent for this idea that you can use blockchains to add trust to content,” DeLuca said. Similar to a Google Search Alert, a person could employ an AI bot to crawl the web for mentions of their name in the media. Any time that person is quoted by a journalist or news outlet, they would receive a request to verify the quote on the blockchain using their decentralized domain name linked to a crypto wallet.
“You'd see a request that says, ‘Is this really you – yes or no?’ And then the experience could be updated to show that that person verified it, and then the news outlet could develop their reputation over time on how much of their content is actually verified versus rejected,” explained DeLuca. The process could also be incentivized with crypto tokens so that the verifying person receives a reward for confirming their quotes.
According to DeLuca, Unstoppable Domains has already developed this tool and is ready to begin testing it with a media partner. “If someone wants to partner with us, we're ready to talk about it,” she said. “This is not that far off.”
Copyright and intellectual property protection
The digital world has long grappled with copyright infringement and intellectual property (IP) challenges. The convergence of Web3 and AI might be ushering in a new era of copyright protection.
Recently, comedian Sarah Silverman sued OpenAI and Meta over their AI models that were trained using her book, which is copyrighted material. While copyrighted materials often end up online and publically available, there ought to be ways for owners to regain control over their materials and dictate if, how and when they are used.
According to Don Gossen, CEO of data tokenization company Nevermined, the convergence of AI and blockchain could empower creators of all kinds to monetize their IP in terms they control. Smart contracts on the blockchain could automatically enforce copyright terms, while AI algorithms could scan content for potential infringements. This combined approach would create an immutable record of ownership and usage on the blockchain, simplifying disputes and incentivizing creators to share their work in a secure environment.
At present, Nevermined is testing this concept with scientific research, in a growing initiative known as decentralized science (DeSci). Using an AI learning model to compile data from lengthy research papers, programmers can create short-form abstracts for clinicians to quickly look up information in real-time healthcare settings. To maintain the integrity of the data, as well as compensate scientific authors, Gossen says that participating contributors could choose whether to include their copyrighted academic papers and research materials, thereby contributing to a well-curated dataset that produces high-quality outputs as a result.
Nevermined is currently working on a blockchain-based marketplace, in which AI developers would need to subscribe to get access to these materials and train their models. This approach gives the power to the original authors and owners of the content, who ultimately get to decide if they would like to grant others access to their materials. Additionally, because blockchain can provide proof of reference, Gossen explained that a doctor could also deep dive into the original research to understand more, and possibly even reach out to the researchers.
“Commercially, this is useful because hospitals and clinics will pay for the abstracts for their medical professionals to access,” Gossen said. “A doctor can excuse themselves from the patient meeting, go to the back office and query the symptoms, receive a bunch of research, and then have five minutes to synthesize the information and go back to the patient with an assessment.”
Interactive NFTs: Enhancing digital collectibles
If you’ve ever wanted to create your own version of Clippy, the Windows paperclip that popped up inside Microsoft Word, now you can. When coupled with AI, the blockchain-based artworks known as non-fungible tokens (NFTs) can become more interactive and dynamic, unlocking a world of imagination and fun for creators, brands and consumers.
Alethea AI, the company behind intelligent NFTs (iNFTs), developed generative NFTs powered by large language models (LLMs), or deep learning algorithms that distill large data sets. It’s sort of like taking a version of ChatGPT, OpenAI’s popular chatbot, and combining it with your favorite digital artwork, thereby teaching the art to converse through text and verbal cues. That’s how Alethea AI’s generative NFTs work, and they can feature a holder’s favorite NFTs as avatars.
“Basically, how an iNFT is created is you take your NFT and combine it with what we call intelligence pods,” explained Komalika Neyol, Alethea AI content manager. “These pods are AI assets that can be trained. It can have a personality and perform AI services for you."
According to Neyol, iNFTs are customizable to a user’s unique dataset, allowing holders to showcase their personalities, knowledge and skill sets through their NFT. For instance, a philosophy professor could upload their PhD dissertation to their LLM and create an animated chatbot that greets website visitors by quoting famous philosophers.
Interested users can create customized NFTs with their own unique dataset by minting an Alethea Intelligence Pod NFT. The company created a short tutorial video for holders on how to imbue an ERC-721 NFT with AI.
Smart contract security – with a caveat
In a future where smart contracts automatically divvy up and disperse payment to the appropriate crypto wallets as the experts we spoke to describe, auditing the security of smart contracts is going to be essential.
According to Ron Bodkin, co-founder and CEO of generative AI company ChainML, AI can be highly instrumental in detecting the anomalies of smart contracts. Chain ML is currently working with the Web3 security company Cube3 to more efficiently block malicious crypto transactions.
Similar to the safeguards implemented by a bank, programmers can train an AI to interpret factors that might be red flags, such as a suspicious origin of a transaction, the age of a wallet, the sequence of events (e.g. a prompt to drain a wallet right after interacting with a new address) and more.
“There's so many different factors that can come together to say, ‘Hey, this is risky, this is something that you want to deal with,’” said Bodkin.
However, Bodkin acknowledges that while AI can enhance the efficiency of blockchain security audits, humans are still necessary to conduct a thorough evaluation. His advice is to use AI technology in a way that improves human error, but don’t expect AI auditors to replace humans entirely.
“I wouldn't suggest anyone fire your auditor and just rely on AI audits,” Bodkin cautioned. He says ChainML and its partners are beginning to see success from performing AI audits earlier in the building process, thereby helping human auditors address problems quicker, but the process would not be possible with robots alone.
“AI auditors could run all the time and very quickly give responses,” Bodkin said. “There's a number of layers where AI can enhance security.”
Bottom line
The convergence of blockchain and AI presents a brave new world, one full of exciting possibilities that have the potential to reshape various sectors. News verification, copyright protection, interactive NFTs and smart contract audits are burgeoning areas that demonstrate the tangible benefits of this Web3-AI synergy.
However, while the possibilities are vast, experts advise businesses and creators to be careful and consider AI’s technological limitations. Presently, AI is about supplementing human productivity, improving error and expanding the imagination — and they’re unlikely to fully replace humans anytime soon.
By: Link:
-
@ 854b4814:801641a6
2023-09-07 10:01:58The most common route into Ukraine is from Warsaw via the train. Downtown Warsaw is a modern European city where shared lodging can be found in the $20/night range, and private lodging/bathroom around $50. I've arrived to Warsaw but the train was full for weeks so I've bought a Flixbus ticket to Kyiv for $45 online. Was supposed to depart at 7:40AM but the company notified me via email last night that the bus was cancelled. There was a very simple online option for rescheduling to the 4PM bus. This 13-hour bus leaves from the West Bus Station, right next to the West Rail Station, which can be found on the map as "Dworzec Zachodni". The journey now begins as I leave my Warsaw lodging.
-
@ d34e832d:383f78d0
2023-09-07 07:19:57https://image.nostr.build/291de080f9c3ee0e1bc2a7bcfc43b7d1c1f31d94424d8cb4b72ce22164de61cb.gif
🌐Upgrading Your Internet for Censorship Resistance and P2P Connectivity 🚀
With some funding and community help, you can all build infrastructure to improve decentralization and privacy worldwide. Not everyone needs this level of communication, a simple simplex or Keet client paired with a lightning wallet to fund your project, whether it be around providing utilities like gas ,lights and data, electricity .So here is a proposed plan:
Lightning Nodes⚡
-
Setup a high capacity Lightning node using Umbrel (https://youtu.be/KahRH_u2UMA?feature=shared) ↗)
-
Goal is 0.292 BTC capacity for good uptime and connectivity
Nostr Relays🧑💻
- Build out Raspberry Pi relays running Keet and Nostr relays via Umbrel or Start9
Also take this into consideration
- Place them in strategic locations globally/regionally, taking into account scaling and maintenance savings then cost.
P2P Chat🤝
They can be used for keet relays if you do have any - Install Keet on a Pi as a personal relay for events/meetups (https://docs.holepunch.to/guides/personal-keet-p2p-chat-relay) ↗)
- Offer bursting capacity through Tor for increased privacy
🌐Expanding our P2P Horizon with PiVPN 🌐
By leveraging Raspberry Pis and VPN technology, we can enhance privacy and strengthen decentralization in exciting new ways. Considerable advantages of PiVPN deployment:
🥝Internet Freedom Portals
-
Set up Pi nodes running PiVPN in censorious regions to provide access to open web for locals
-
Custom firmware ensures stability and maximizes limited bandwidth resources
💿Private Peering Points
-
Connect Raspberry Pis globally so they can sync/share data like torrents, IPFS, Bitcoin nodes privately
-
Use WireGuard or OpenVPN for rapid, secure tunneling between p2p devices
💸Running Full Nodes Everywhere
-
Install Bitcoin/Electrum wallets to full nodes on Pis on trustworthy VPN
-
Extra bandwidth unused can be donated to help sync other full nodes worldwide
⚙️Infrastructure for Innovation
-
Additional resources enable experimentation with new p2p protocols and services
-
Future projects may include decentralized cloud services, live streaming and more!
Harnessing the power of portable Pis increases privacy and takes peer-powered systems beyond what's possible today. Exciting potential for distributed collaboration!
Funding Round💰
-
4587195.4693226265 SATs needed for 1st month of your hosting costs
-
You should reach out to other contributors in the community to fund your project
By upgrading your internet infrastructure with lightning, Nostr and Keet, we can all better enable censorship resistance and promote peer-to-peer connectivity globally. Exciting times ahead!
⚖️Leveraging Bitcoin for Positive Change🌎
There is an opportunity to use the rise of digital hard money in a purposeful way to advance human rights in a compliant manner. Here are some suggestions:
💰Generating Resources Responsibly
-
Guide individuals and charities on ethically acquiring Bitcoin through approved platforms
-
Provide education on best practices for securely storing Bitcoin long-term without third party risks
🏦Pairing Philanthropy with Progress
-
Suggest fundraisers pair traditional donations with a voluntary Bitcoin component
-
Link donors with experts who ensure all transactions adhere to regulations for full transparency
✊Empowering Underserved Communities
-
Establish programs to convert percentage of generated wealth into initiatives like food/water projects
-
Partner organizations focus on creating sustainable solutions pairing local skills/resources with Bitcoin opportunities
🌐A More Just System Through Innovation
-
Advocate cross-border micropayment networks to facilitate global access to education and opportunity
-
Support pairing all property titles with a Bitcoin component to foster financial inclusion for all
By guiding ethical Bitcoin adoption, we have a chance not only to empower individuals, but align new technologies with building a more just world for future generations.
No one has yet figured out how to do this
-
-
@ 4d444439:7ed2458b
2023-09-08 13:17:34Feel free to read all my articles on the anti-censorship long content platform yakihonne.com.
Dangerous heatwaves in Europe could break further records, the UN says.
It is hard to immediately link these events to climate change because weather - and oceans - are so complex.
Studies are under way, but scientists already fear some worst-case scenarios are unfolding.
"I'm not aware of a similar period when all parts of the climate system were in record-breaking or abnormal territory," Thomas Smith, an environmental geographer at London School of Economics, says.
"The Earth is in uncharted territory" now due to global warming from burning fossil fuels, as well as heat from the first El Niño - a warming natural weather system - since 2018, says Imperial College London climate science lecturer Dr Paulo Ceppi.
Here are four climate records broken so far this summer - the hottest day on record, the hottest June on record globally, extreme marine heatwaves, record-low Antarctic sea-ice - and what they tell us.
The world experienced its hottest day ever recorded in July, breaking the global average temperature record set in 2016.
Average global temperature topped 17C for the first time, reaching 17.08C on 6 July, according to EU climate monitoring service Copernicus.
Ongoing emissions from burning fossil fuels like oil, coal, and gas are behind the planet's warming trend.
This is exactly what was forecast to happen in a world warmed by more greenhouse gases, says climate scientist Dr Friederike Otto, from Imperial College London.
"Humans are 100% behind the upward trend," she says.
"If I'm surprised by anything, it's that we're seeing the records broken in June, so earlier in the year. El Niño normally doesn't really have a global impact until five or six months into the phase," Dr Smith says.
El Niño is the world's most powerful naturally occurring climate fluctuation. It brings warmer water to the surface in the tropical Pacific, pushing warmer air into the atmosphere. It normally increases global air temperatures.
The average global temperature in June this year was 1.47C above the typical June in the pre-industrial period. Humans started pumping greenhouse gases into the atmosphere when the Industrial Revolution started around 1800.
Asked if summer 2023 is what he would have forecasted a decade ago, Dr Smith says that climate models are good at predicting long-term trends but less good at forecasting the next 10 years.
"Models from the 1990s pretty much put us where we are today. But to have an idea about what the next 10 years would look like exactly would be very difficult," he says.
"Things aren't going to cool down," he adds.
Extreme marine heatwaves
The average global ocean temperature has smashed records for May, June and July. It is approaching the highest sea surface temperature ever recorded, which was in 2016.
But it is extreme heat in the North Atlantic ocean that is particularly alarming scientists.
"We've never ever had a marine heatwave in this part of Atlantic. I had not expected this," says Daniela Schmidt, Prof of Earth Sciences at the University of Bristol.
Marine heatwave in the North Atlantic
Daily sea surface temperature April - July 2023, compared with 1985-1993 average Source: NOAA (1985-1993 reference period recommended by NOAA as representative conditions)
Marine heatwave in the North Atlantic
Daily sea surface temperature April - July 2023, compared with 1985-1993 average Source: NOAA (1985-1993 reference period recommended by NOAA as representative conditions)
In June temperatures off the west coast of Ireland were between 4C and 5C above average, which the National Oceanic and Atmospheric Administration classified as a category 5 heatwave, or "beyond extreme".
Directly attributing this heatwave to climate change is complex, but that work is ongoing, Prof Schmidt says.
What is clear is that the world has warmed and the oceans have absorbed most of that heat from the atmosphere, she explains.
"Our models have natural variability in them, and there are still things appearing that we had not envisaged, or at least not yet," she adds.
She emphasises the impact of this heat on marine ecosystems, which produce 50% of the world's oxygen.
"People tend to think about trees and grasses dying when we talk about heatwaves. The Atlantic is 5C warmer than it should be - that means organisms need 50% more food just to function as normal," she says.
Record low Antarctic sea-ice
The area covered by sea-ice in the Antarctic is at record lows for July. There is an area around 10 times the size of the UK missing, compared with the 1981-2010 average.
Alarm bells are ringing for scientists as they try to unpick the exact link to climate change.
A warming world could reduce levels of Antarctic sea-ice, but the current dramatic reduction could also be due to local weather conditions or ocean currents, explains Dr Caroline Holmes at the British Antarctic Survey.
She emphasises it is not just a record being broken - it is being smashed by a long way.
"This is nothing like anything we've seen before in July. It's 10% lower than the previous low, which is huge."
She calls it "another sign that we don't really understand the pace of change".
Scientists believed that global warming would affect Antarctic sea-ice at some point, but until 2015 it bucked the global trend for other oceans, Dr Holmes says.
"You can say that we've fallen off a cliff, but we don't know what's at the bottom of the cliff here," she says.
"I think this has taken us by surprise in terms of the speed of which has happened. It's definitely not the best case scenario that we were looking at - it's closer to the worst case," she says.
We can certainly expect more and more of these records to break as the year goes on and we enter 2024, scientists say.
But it would be wrong to call what is happening a "climate collapse" or "runaway warming", cautions Dr Otto.
We are in a new era, but "we still have time to secure a liveable future for many", she explains.
By:Georgina Rannard, Erwan Rivault, Jana Tauschinski Link:https://www.bbc.com/news/science-environment-66229065
-
@ 38f9a05c:6999fc04
2023-09-07 06:49:07This tweet from @Prinsu777 led me down a few rabbit holes, to say the least. What are Kali and Kalki Yugas?
Kali and Kalki are two of the yuga cycles (yuga - “an age of the world”), from a total of four cycles as per ancient Hindu text. A detailed description of these cycles can be found in the Surya Siddhanta
According to the records, Krishna's death signals the end of the Dwapara Yuga and the beginning of the Kali Yuga, which began on February 17/18, 3102 BCE, Hence as of 2023 CE, the Kali Yuga, which started 5,124 years ago and will last 432,000 years (1,200 divine years), has 426,876 years left. The end of the Kali Yuga will occur in 428,899 CE.
That means it's going to be a long, long time till Kali is destroyed. Hence to gauge the trajectory of our species, I decided to examine the ‘technology’ we are creating.
Technology Today
Apple Vision Pro: Apparently, you can have them on all day.
Neuralink: “Implant. Our brain-computer interface is fully implantable, cosmetically invisible, and designed to let you control a computer or mobile device anywhere you go.” Get your brain plugged to the cloud. You don't need an external device anymore.
Synthetic Human Embryo; Just the other day we created a “Synthetic human embryo” These Synthetic human embryos have been produced in the lab for the first time, without any need for the usual natural ingredients of eggs and sperm. Soon it will be marketed as a painless and stress-free way to have/grow babies.
Bioweapons - Rep. Jason Crow (D-Colo.), a member of the House Committee on Armed Services and House Permanent Select Committee on Intelligence expressed his opinions during a Friday appearance at the Aspen Security Forum. According to Axios, Rep. Jason Crow warned that DNA-based Bio-weapons, designed to "target specific people" on a battlefield, are on the horizon. He suggested that companies like Ancestry.com and 23andMe may be aiding the development of these weapons by selling genetic info. Whew. Who would have guessed this would be possible :)
mRNA lipid nanoparticle vaccines: The widely popular mRNA lipid nanoparticle vaccines. A variety of materials have been developed for mRNA delivery, including lipids, lipid-like materials, polymers and protein derivatives, yup the popular Covid vaccines have artificial nanoparticle vaccines.
Technology in the Future
Another 100 years in the future we will have advertisements like these, streamed/feed to us via our brain chips; “Knee pain? Replace it with Boston Dynamics’ robotic knee and get 50% off on your 2nd knee. Now walk the moon like MJ or be a ninja like Bruce Lee (or the MJ, Bruce Lee equivalent of that time) Another Advertisement. “end-of-year sale - upgrade your digestive system to < insert GMO company's name here> latest ‘quick digest pro’ eliminate post-meal lethargy” Now reduce your downtime and you can help ‘big-brother’ (1984 reference) achieve his goals.
And going down the path, as we keep losing touch of what it means to be human, we’ll go from Orwell’s 1984 to Huxley’s Brave New World and beyond.
What's Beyond? - Dimensional Worlds
What lies beyond? Where does this path take us?
It takes us from being 3-dimensional beings to 2-dimensional beings. Firstly, let us understand the relevance of living in a 3-dimensional universe. Let's understand the significance of ‘3’ in our 3-dimensional world Our universe is made up of 3 aspects; space, time and matter. (3) Space splinters into 3 dimensions; height, length, and width (3) Time is fractured into 3 intervals; past, present, and future. (3) Similarly, Matter splits into 3 states: solid, liquid and gaseous (3)
I guess Nikola Tesla was on to something when he said, “If you only knew the magnificence of the 3, 6 and 9, then you would have a key to the universe.”
We also know that computers process information and that the information is 1s and 0s. Also known as binary, 2 states, 2-dimensional. As computers only need a 2-dimensional universe to exist, that means there is no need for ‘matter’. Computers deal only in past and future, hence we lose the ‘present’ moment from time, and in the world of 1s and 0s lack depth hence no more width in space. A 2D universe will look like this; Space - height, length (2) Time - past, future (2)
I would assume a step down from the 2-dimensional world we will end up in the state of ‘singularity’.
Pyramids
Coming back to our present-day 3D world, all across our world, we find and discover structures with unfathomable amounts of ‘proof-of-work’. Structures like the Pyramids, in Egypt, South America and Asia
Further, captured in these structures are hidden secrets. For example, the Pyramids of Giza are aligned to the stars with an accuracy of up to 0.05 degrees. There are numerous other secrets hidden in plain sight only if we have the ability to see them. Additional reading here, it gets evident really quickly that builders of the Pyramids and these ancient structures around the world knew more about our universe than us.
Might be a good time to look at some of Graham Hancock's work, where he showcases numerous sites around the earth with these structures of unknown/assumed origin.
Graham Hancook, makes a case for lost civilisations, What if it was not a lost civilisation but a lost dimension?
Also checkout @MichaelDunwort1’s work which compares bitcoin to pyramids
What if 4D beings were leaving us a message by building these awe-inspiring structures that stand the test of time in our 3-dimensional world?
Pyramids have enormous proof of work, have blocks, have hidden messages, stand the test of time, unknown origins. Soon this starts to sound like bitcoin to me.
Maybe the pyramids across the earth are related to each other or part of the same network. Or the pyramids were like nodes maintaining a record of their timechain.
If that logic applies, then the bitcoin protocol is a digital pyramid for our 2-dimensional descendants.
That means someday in the remaining Kali cycle, 2-dimensional beings will be starting at our megastructure (the bitcoin timechain) they will be pondering on the details (hidden secrets) etched in the numbers that make up the bitcoin protocol
What are the hidden secrets of bitcoin you ask?
Here check out the work of @level39, where he breaks the significance of ‘3, 6 and 9’, in the bitcoin protocol.
Also check out this bitcoin magazine piece by Ella Hough.
Viewing the works of Level39 and Ella, you start to see 3. 6 and 9 everywhere in bitcoin. The relevance of numerology in bitcoin is not truly known, and one can not deny it’s existence.
In fact Ella’ work is titled ‘bitcoin is mathematically perfect with patterns of the universe’
May be these numbers will help future 2-dimensional beings recognise that bitcoin was created in a 3-dimensional universe
Furthermore, If you have been in the bitcoin space for a while you have witnessed some theories and myths around Sataoshi Nakamoto, there are also claims that he was/is the messiah. I can only imagine the tales and fiction written about him in the next thousands of years from now. Just take a look at the legends written about our current-day Gods.
However, it could also be that with the marching of time, Satashio's legend will be long forgotten with only some fragments remaining. In the same way that most of us today have forgotten the ancient Egyptian God Thoth
Mind and Body dualism
Here’s another interesting theory - mind and body dualism. This theory states that the mind and body are two separate entities with distinct properties. The theory can be traced back to ancient Greek philosophy. Plato believed in the existence of a non-physical realm of forms, separate from the physical world we experience with our senses.
The mind and body dualism theory has been explored by many prominent philosophers throughout history, notably Rene Descartes, who famously argued that the mind and body interact through the pineal gland in the brain.
Pineal Gland is starting to look like the neuralink (computer chips in the brain)
Back to our downward path
I foresee us having the ability to downgrade or we will be forced into morphing from 3D beings to 2D beings.
AI generated Human evolution Art by Fabio Comparelli using Midjourney #aiart #midjourney
This begs the question: can we transcend from 3D beings to 4D beings?
Maybe that's what enlightenment is.
Oh, that was wild! If, for some insane reason, this turns out to be true. All I can say is that I am glad to be putting my time toward building the 2-dimensional pyramid with my fellow warriors of truth.
Level39’s work on FractalEncrypt art.
-
@ a012dc82:6458a70d
2023-09-07 05:53:42Table Of Content
-
The Rise and Fall of Bitcoin's Price in 2021
-
Why Experts are Optimistic About Bitcoin's Future in 2023
-
Factors Influencing Bitcoin's Growth in 2023
-
What to Expect for Bitcoin Investors in the Coming Years
-
Conclusion
-
FAQ
The year 2021 was an eventful one for the world of cryptocurrency, with Bitcoin's price reaching an all-time high of over $60,000 in April before plunging to nearly half its value by May. The volatility of the digital currency market was a wake-up call for investors, especially those new to the game. However, despite these hiccups, experts are predicting that Bitcoin's price will continue to increase in 2023.
This article will explore the reasons why Bitcoin's price is predicted to increase despite the challenges it faced in 2021. We will also take a look at the factors that will influence its growth and what investors can expect in the coming years.
The Rise and Fall of Bitcoin's Price in 2021:
Bitcoin's price saw a rapid rise in early 2021, hitting an all-time high of over $60,000 in April. However, this was followed by a sharp decline, with the price falling to below $30,000 by July. This volatility can be attributed to several factors, including the following:
Elon Musk's tweets: Tesla CEO Elon Musk's tweets about Bitcoin, including his decision to stop accepting Bitcoin as payment for Tesla cars, had a significant impact on the digital currency market.
China's crackdown: The Chinese government's decision to crack down on cryptocurrency mining and trading had a ripple effect on the global market.
Regulatory concerns: Governments worldwide are still grappling with how to regulate cryptocurrencies, which has led to uncertainty in the market.
Why Experts are Optimistic About Bitcoin's Future in 2023: Despite the challenges faced in 2021, experts remain optimistic about Bitcoin's future in 2023. Here are some of the reasons why:
Institutional adoption: Large institutions such as MicroStrategy, Square, and Tesla have invested heavily in Bitcoin, signaling a growing acceptance of cryptocurrencies.
Limited supply: Bitcoin's supply is limited to 21 million coins, which means that as demand increases, so will the price.
Increasing demand: As more people become familiar with Bitcoin and other cryptocurrencies, demand for them is expected to increase, driving up prices.
Factors Influencing Bitcoin's Growth in 2023:
Several factors will influence Bitcoin's growth in 2023, including the following:
Institutional adoption: As more large institutions invest in Bitcoin, it is expected to become more mainstream, leading to a further increase in demand.
Government regulation: The regulatory environment around cryptocurrencies is still uncertain, but as governments worldwide develop clearer guidelines, it will provide a more stable market for investors.
Technological advancements: Improvements in the underlying technology behind Bitcoin, such as faster transaction speeds and lower transaction fees, will increase its usability and drive up demand.
What to Expect for Bitcoin Investors in the Coming Years:
Bitcoin investors can expect continued volatility in the market, but experts predict that the price will continue to rise in the long term. Here are some tips for investors:
Invest for the long term: Bitcoin's price is likely to be volatile in the short term, but investing for the long term can help mitigate some of the risks associated with volatility.
Diversify your portfolio: As with any investment, it's important to diversify your portfolio to manage risk. Consider investing in other cryptocurrencies or traditional assets.
Stay informed: Stay up to date with the latest news and developments in the cryptocurrency market, including regulatory changes and technological advancements.
Conclusion
Despite the challenges faced by Bitcoin in 2021, experts remain optimistic about its future in 2023. Factors such as institutional adoption, limited supply, and increasing demand are expected to drive up its price in the long term. However, investors should remain cautious and be prepared for continued volatility in the short term. By diversifying their portfolios, staying informed, and investing for the long term, investors can potentially reap the benefits of Bitcoin's predicted growth in the coming years. Despite hiccups, Bitcoin price is predicted to increase in 2023, making it an exciting investment opportunity for those willing to take on the risks.
FAQ
Will Bitcoin's price continue to be volatile in 2023? While Bitcoin's price is expected to increase in the long term, it is likely to continue to be volatile in the short term.
Is Bitcoin a good investment for the long term? Bitcoin can be a good investment for the long term, but it's important to remember that it's a high-risk investment and should only be considered as part of a diversified portfolio.
What factors will influence Bitcoin's growth in 2023? Factors that will influence Bitcoin's growth in 2023 include institutional adoption, government regulation, and technological advancements.
That's all for today, see ya tomorrow
If you want more, be sure to follow us on:
NOSTR: croxroad@getalby.com
X: @croxroadnews
Instagram: @croxroadnews.co
Subscribe to CROX ROAD Bitcoin Only Daily Newsletter
https://www.croxroad.co/subscribe
DISCLAIMER: None of this is financial advice. This newsletter is strictly educational and is not investment advice or a solicitation to buy or sell any assets or to make any financial decisions. Please be careful and do your own research.
-
-
@ 475226d4:ccf56e26
2023-09-07 05:52:19In the ever-evolving landscape of blockchain technology, innovation knows no bounds. The marriage of technology and entertainment has given rise to a groundbreaking concept: the The Game of Satoshi, a Mystery Box Treasure Hunt Game, with a coveted prize of Bitcoin. But what sets this game apart from others? It's the unwavering commitment to transparency, fairness, and the fusion of bitcoin blockchain with gaming.
The Game Changer: Provably Fairness
One of the biggest concerns in online gaming and treasure hunt games is fairness. Participants often worry that the organizers might have an unfair advantage or that the game is rigged. To address these concerns head-on, The Game of Satoshi have been engineered with a revolutionary approach that leaves no room for doubt.
Public Randomization Mechanism:
In the world of traditional treasure hunts, organizers typically determine clues, addresses, and valuable locations behind closed doors, which can lead to questions about fairness. In contrast, we'll utilize a public randomization mechanisms to ensure transparency and eliminate any suspicion of bias.
Specifically, the game employs public APIs or oracles for randomization. These public services generate random numbers, which are then used to create clues, addresses, and determine valuable locations. This process is conducted transparently, and anyone can verify the fairness of the game by inspecting the randomization mechanism.
Code Linked to the Public Randomizer:
To further bolster fairness and transparency, the game's code is intricately linked to the public randomization mechanism. This means that no one, not even the organizers or development team, has prior knowledge of the addresses or clues generated in advance. Everything is generated in real-time as the game unfolds, eliminating any potential biases or manipulation.
The Proof of Fairness:
The Game of Satoshi goes a step further in demonstrating their commitment to fairness. Before the game commences, a cryptographic fingerprint of the game's code is created using a secure hashing algorithm like SHA256. This fingerprint is publicly uploaded, serving as a verifiable record of the game's code at the start.
When the game concludes, the actual code used to run the game is again hashed using the same algorithm and compared to the initially uploaded fingerprint. This process is easily verifiable, as the cryptographic fingerprint will only match if the code has remained unchanged throughout the entire game.
Embracing the Future:
We want The Game of Satoshi to represent a groundbreaking convergence of blockchain technology, cryptographic proof, and entertainment. These games offer participants not only the thrill of treasure hunting but also the confidence that the game is unbiased and fair.
In an age where transparency and fairness are paramount, this innovative approach to treasure hunts redefines the gaming landscape. It demonstrates the limitless possibilities that blockchain technology can bring to the world of entertainment, guaranteeing a level playing field for all participants.
So, are you ready to embark on a journey where the thrill of the hunt is matched only by the assurance of fairness? Join the The Game of Satoshi and be part of a gaming revolution where transparency is the name of the game!
-
@ d8714c92:cd61e54a
2023-09-08 13:13:56Welcome, soldiers! Even though you can't see your opponents face to face, you still have the opportunity to decipher their moves and make strategic decisions based on reading players at a virtual table. In this blog, we will provide you with tips and techniques to enhance your reading skills in the online environment.
You'll learn how to analyze betting patterns, detect behavioral cues, and leverage the available information. Get ready to read the minds behind the screens!
-
Observe betting patterns: Betting patterns can reveal a lot about a player's hand. Pay attention to the amount of chips they bet, how quickly they do it, and whether their bets are consistent or changing. For example, a player who bets quickly and in large amounts may indicate a strong hand, while a player making small and hesitant bets may be in a weaker position.
-
Analyze response time: The time a player takes to make decisions can be indicative of the strength of their hand. Some players take more time when they have a strong hand to try to disguise it, while others may do so when they are unsure or attempting to bluff. Observe if there are changes in a player's response time throughout the game, as this can reveal shifts in their confidence or strategy.
-
Look for behavioral patterns: Even when playing at a virtual table, players can still exhibit certain behavioral patterns through their style of play. Observe whether a player is aggressive or passive, if they play conservatively or aggressively, and if they display consistent tendencies throughout the game. These patterns can give you clues about your opponents' preferences and strategies.
-
Use available information: At a virtual table, you can leverage the information provided by the software, such as the history of previous hands and statistics for each player. Review past hands and analyze how players reacted in similar situations. If a player has shown consistent tendencies, you can use that information to make more informed decisions on how to play against them.
-
Consider betting and emotional reactions: Although you can't see your opponents' facial expressions, there are still emotional signals you can detect. Observe if a player makes unusual bets or appears agitated through the chat. These behaviors may indicate nervousness or overconfidence, which can be useful in assessing the strength of their hand.
Remember that reading players at a virtual poker table is not an exact science, and there's always room for error. However, by practicing and honing your skills, you can improve your ability to make more accurate decisions based on the available clues. Reading players at a virtual poker table may seem challenging at first, but with practice and careful observation, you can learn to decipher your opponents and take advantage of that information.
Observe betting patterns, analyze response time, look for behavioral patterns, use available information, and consider betting and emotional reactions. Remember that player reading is a skill in constant development, so keep practicing and refining your intuition. May your reads be accurate, and may your strategic decisions lead you to victory at the virtual tables! Good luck and enjoy responsible gaming!
-
-
@ 475226d4:ccf56e26
2023-09-07 03:17:19In the world of blockchain wars, one name stands above all, shrouded in mystery and intrigue—the enigmatic Satoshi Nakamoto. The mysterious creator of Bitcoin, whose true identity remains unknown, left behind a legacy that revolutionized the financial landscape. And now, a thrilling adventure awaits for all Bitcoin enthusiasts, puzzle solvers, and treasure hunters alike – 'The Game of Satoshi.' Get ready to embark on an extraordinary journey into the heart of the Bitcoin revolution, with a chance to claim the ultimate treasure: 1 BTC!
The Game of Satoshi is more than just a game; it's a captivating quest to unravel the mysteries that surround Satoshi Nakamoto's identity and the birth of Bitcoin. Starting on January 3, 2024, this interactive and immersive experience will challenge your wits, creativity, and determination as you navigate through a series of mind-bending puzzles and secrets concealed by Satoshi himself. Your goal? To claim the coveted Bitcoin treasure and bask in the glory of unlocking the secrets of the most influential figure in the world of cryptocurrencies.
🗝️ What Awaits You in 'The Game of Satoshi'?
A Journey of Discovery: Dive deep into the world of Satoshi Nakamoto and Bitcoin. Immerse yourself in a captivating narrative that unveils the history and significance of this revolutionary cryptocurrency.
Mind-Bending Puzzles: Prepare to put your problem-solving skills to the test with an array of challenging puzzles and riddles. Each clue you decipher brings you one step closer to the treasure.
Community Collaboration: Engage with a vibrant community of like-minded individuals, Bitcoin enthusiasts, and fellow treasure hunters. Share insights, seek help, and collaborate to overcome the game's intricate challenges.
The Ultimate Prize: The grand prize awaits the most dedicated and astute participants – 1 BTC! The closer you get to unveiling the mysteries of Satoshi, the better your chances of claiming this coveted treasure.
Satoshi's Legacy: As you progress through the game, gain a deeper understanding of the philosophy, vision, and impact of Satoshi Nakamoto's creation on the world of finance.
Real-Time Updates: Stay up-to-date with real-time announcements, hints, and clues to keep your adventure on track. The Game of Satoshi team is here to guide and support you throughout your journey.
'The Game of Satoshi' will kick off soon, and we are inviting you to embark on an unforgettable quest to unlock the mysteries of Satoshi Nakamoto and claim the ultimate Bitcoin treasure. Join us in celebrating the legacy of Satoshi Nakamoto, the genius behind Bitcoin, and experience the thrill of solving puzzles, revealing secrets, and pursuing 1 BTC. Are you up for the challenge? Get ready to dive into 'The Game of Satoshi' and become a part of bitcoin history!
Stay tuned for updates, and be prepared to make history on January 3, 2024. The treasure hunt of a lifetime awaits – are you ready to play? 🔍🔓💰
📆 Mark Your Calendar - January 3, 2024
Get your Mistery box before January 3, 2024
Read our WhitePaper.pdf
Visit our Website TheGameOfSatoshi.com
Follow us on Twitter (X) @theGameOfSatoshi
Follow us on Nostr
Join our community on Telegram
Moderation will happen on Discord
We are looking forward to share this journey with the community and we'll appreciate any feedback you might have.
-
@ 475226d4:ccf56e26
2023-09-07 03:16:47In the world of blockchain wars, one name stands above all, shrouded in mystery and intrigue—the enigmatic Satoshi Nakamoto. The mysterious creator of Bitcoin, whose true identity remains unknown, left behind a legacy that revolutionized the financial landscape. And now, a thrilling adventure awaits for all Bitcoin enthusiasts, puzzle solvers, and treasure hunters alike – 'The Game of Satoshi.' Get ready to embark on an extraordinary journey into the heart of the Bitcoin revolution, with a chance to claim the ultimate treasure: 1 BTC!
The Game of Satoshi is more than just a game; it's a captivating quest to unravel the mysteries that surround Satoshi Nakamoto's identity and the birth of Bitcoin. Starting on January 3, 2024, this interactive and immersive experience will challenge your wits, creativity, and determination as you navigate through a series of mind-bending puzzles and secrets concealed by Satoshi himself. Your goal? To claim the coveted Bitcoin treasure and bask in the glory of unlocking the secrets of the most influential figure in the world of cryptocurrencies.
🗝️ What Awaits You in 'The Game of Satoshi'?
A Journey of Discovery: Dive deep into the world of Satoshi Nakamoto and Bitcoin. Immerse yourself in a captivating narrative that unveils the history and significance of this revolutionary cryptocurrency.
Mind-Bending Puzzles: Prepare to put your problem-solving skills to the test with an array of challenging puzzles and riddles. Each clue you decipher brings you one step closer to the treasure.
Community Collaboration: Engage with a vibrant community of like-minded individuals, Bitcoin enthusiasts, and fellow treasure hunters. Share insights, seek help, and collaborate to overcome the game's intricate challenges.
The Ultimate Prize: The grand prize awaits the most dedicated and astute participants – 1 BTC! The closer you get to unveiling the mysteries of Satoshi, the better your chances of claiming this coveted treasure.
Satoshi's Legacy: As you progress through the game, gain a deeper understanding of the philosophy, vision, and impact of Satoshi Nakamoto's creation on the world of finance.
Real-Time Updates: Stay up-to-date with real-time announcements, hints, and clues to keep your adventure on track. The Game of Satoshi team is here to guide and support you throughout your journey.
'The Game of Satoshi' will kick off soon, and we are inviting you to embark on an unforgettable quest to unlock the mysteries of Satoshi Nakamoto and claim the ultimate Bitcoin treasure. Join us in celebrating the legacy of Satoshi Nakamoto, the genius behind Bitcoin, and experience the thrill of solving puzzles, revealing secrets, and pursuing 1 BTC. Are you up for the challenge? Get ready to dive into 'The Game of Satoshi' and become a part of bitcoin history!
Stay tuned for updates, and be prepared to make history on January 3, 2024. The treasure hunt of a lifetime awaits – are you ready to play? 🔍🔓💰
📆 Mark Your Calendar - January 3, 2024
Get your Mistery box before January 3, 2024
Read our WhitePaper.pdf
Visit our Website TheGameOfSatoshi.com
Follow us on Twitter (X) @theGameOfSatoshi
Follow us on Nostr
Join our community on Telegram
Moderation will happen on Discord
We are looking forward to share this journey with the community and we'll appreciate any feedback you might have.
-
@ d408b55a:7ea8e70a
2023-09-07 02:18:01Parenting is often a challenging endeavor, but it can also be a rewarding one. Especially when we explore innovative approaches that benefit both children and parents. Listening to Patrick Bet-David's podcast I heard him mention a win-win parenting philosophy, centered around incentivizing learning through books as a currency to unlock playtime and toys.
What an incredible way for parents to nurture lifelong skills and create mutually fulfilling parent-child relationships. This psot will explore the power of this parenting approach and its parallels with concepts like Nostr, Bitcoin, and Value 4 Value, which emphasize control over one's digital identity/assets/&more. At the heart of Bet-David's parenting philosophy is a straightforward system: children must read books to earn time with new toys, with the amount of reading required varying based on the desirability of the toy. In this system, books become a form of currency in the Bet-David household, transforming reading from a chore to a prerequisite for playtime. This approach encourages consistent reading, promotes delayed gratification, and instills the value of working for rewards. I can imagine children raised in this environment don't feel deprived when they earn their playtime through reading.
As a parent interested in adopting this method, I must commit to reading more. Engaging in informed discussions about books is essential to fostering a child's love of reading and providing a meaningful context for the rewards-based system. My hope is that Sloan learns to balance entertainment and education while strengthening her relationship with books. I'm excited about my child reading classics like Atlas Shrugged, The Bitcoin Standard, 1984, Erasure, and other valuable works one day. To me these books are an integral part of a well-rounded education.
What makes Bet-David's approach so effective, in my view, is its focus on imparting lifelong skills. By nurturing a genuine love of reading rather than treating books as a means to an end, this philosophy instills the idea that learning is a lifelong pursuit, not merely a series of assigned tasks. It also teaches the virtues of patience and hard work, qualities that are often overshadowed by instant gratification in today's culture. Reading, as opposed to passive consumption through screens, fosters communication and shared purpose between parent and child as they set and track reading goals together. Hell I'm already reading to my daughter but she does not pay much attention unless the book is Good Night Moon. (Good Night Moon is 🐐ed so I can't blame her)
Anyways, win-win situations, like Bet-David's parenting philosophy, are powerful because they encourage collaboration over confrontation. Instead of imposing top-down directives, Bet-David collaborates with his children to set reading goals that earn them playtime. This approach promotes open communication and eliminates adversarial tension. Children feel heard and challenged to expand their skills, while parents achieve compliance without sacrificing joy. In such scenarios, both sides can recognize their shared interest in achieving mutually beneficial outcomes, reinforcing trust and respect.
The concept of win-win thinking extends beyond parenting and can be applied to various aspects of life. This is where the connection to Nostr, Bitcoin, and Value 4 Value becomes relevant. Just as win-win parenting emphasizes collaboration and shared goals, these concepts revolve around control and value exchange. Nostr, for instance, allows individuals to take control of their data and online interactions, creating a digital environment where users can trust their data is secured with their own private key. Bitcoin, as a decentralized digital currency, provides individuals with control over their money, free from the influence of central authorities. Value 4 Value is enabled when we combine bitcoin & Nostr. Instead of an ad subsidized internet we can have a value 4 value based one where individuals exchange value directly, further promoting the idea of mutually beneficial transactions. Seriously you can just zap people sats for quality content. Sending money at the speed of light over social media controlling your data, your money, and your identity with public/private key technologies.
The power of win-win thinking extends beyond parenting and can positively impact every aspect of our lives. Personally, I want to live in a world where cooperation and shared interests prevail. Smart clients & dumb servers > smart servers & dumb clients when in cyberspace. Kindness & mutual value transfer > rent-seeking when in meat space.
9/6/23
Binmucker
-
@ 4d444439:7ed2458b
2023-09-08 13:11:43Feel free to read all my articles on the anti-censorship long content platform yakihonne.com.
In any hurricane, rising water called storm surge is the most dangerous and damaging element of the storm. Normal tides can add to that amount of water—and today, tides will be near their strongest all year. That’s because tonight’s full moon is also a supermoon, meaning it’s at its closest point to Earth.
“The full moon can enhance the tides and so certainly … at the time of high tide during the storm, you're going to see greater coastal flooding,” says Noah Petro, a research scientist at NASA Goddard Space Flight Center.
Though the supermoon will be the closest full moon of the year, and therefore its gravity will have a greater effect, experts say the full moon phase matters more than it being a supermoon. “It’s not a great added combination that it's closer than normal,” Petro says. ”It's going to be on the scales of centimeters, at most, of difference in tide—which in this case is barely even noticeable.”
(What are hurricanes, typhoons, and cyclones?)
The full moon, even a supermoon, will likely have only a modest effect on the huge storm surges already expected. ABC News meteorologist Kenton Gewecke says the Big Bend region of Florida could see the worst at 10 to 15 feet of storm surge, not accounting for tides. In Florida, the normal difference between high and low tide is around 3 to 5 feet.
“It makes a big difference whether the storm makes landfall at low tide or at high tide, that can make a difference of up to five feet,” says Thomas Wahl, associate professor of coastal engineering at University of Central Florida. “But then the storm surge of 10, 15 feet is the part that really makes it dangerous. Just the high tide itself is not going to pose any major threat to people.”
The hurricane made landfall this morning at a Category 3, but around the time of a low tide. The highest tide caused by the supermoon will be tomorrow, Thursday afternoon, likely missing the bulk of storm surging, which will largely happen today. The high tide will hit Florida’s Big Bend just before 2 p.m. and will likely occur as storm surge waters are beginning to retreat back into the ocean.
(Why hurricane categories don’t tell the whole story.)
Florida’s wide, shallow continental shelf plays a major role in the impact of storm surge. If there is a steep cut off, like in parts of the U.S. West Coast, then that water has to work a lot harder to get higher, Gewecke explains. A shallower, more gradual sea floor will allow storm surge to move in and out easily given the right circumstances such as a major hurricane.
We also had a supermoon on July 2 and August 1, and will have one more September 28. Next year, there will also be four supermoons from August to November.
Regardless of the position of the moon, Hurricane Idalia is expected to be historic. “Our records for landfalling storms in the United States go back to the 1850s. Since then, in this area of the Big Bend, there has never been a category three or stronger hurricane,” Gewecke says. “It's really a good chance that there's … going to be areas that have never seen storm surge like what they're going to experience.”
By:ALLIE YANG Link:https://www.nationalgeographic.com/science/article/supermoon-hurricane-idalia-florida
-
@ 20d29810:6fe4ad2f
2023-09-07 00:45:35🚀 The Future of Finance: Why Bitcoin is My Top Pick! 🚀
Hey Crypto Fam! 👋 Today, let's talk about the incredible journey of #Bitcoin and what the future holds for the king of cryptocurrencies! 🌟
💰 Bitcoin as Digital Gold: In a world where trust in traditional financial systems is waning, Bitcoin has emerged as a digital haven for preserving wealth. It's like GOLD in the digital realm! 🪙💎
🏦 Institutional Love: Big institutions are jumping on the Bitcoin bandwagon, and it's no wonder! Major financial players are investing billions, signaling that Bitcoin is here to stay! 🏧💼
⚙️ Scalability Solutions: Bitcoin's scalability issues are being tackled head-on. Lightning Network, anyone? ⚡ It's opening up new possibilities for fast and low-cost transactions. 🌐💸
🔗 Bitcoin & Blockchain: The revolutionary #blockchain technology behind Bitcoin is reshaping industries from finance to healthcare. Buckle up, because innovation is just getting started! 💡🌍
🌍 Global Regulation: Governments worldwide are recognizing Bitcoin's importance. Regulations are evolving, which could pave the way for mass adoption. 🌐📜
🌍 Financial Inclusion: Bitcoin is empowering the unbanked and underbanked, offering financial freedom to millions globally. That's a game-changer! 🌍💪
💹 Price Predictions: Analysts are forecasting some exciting price movements for Bitcoin. Are we on the cusp of a new ATH? 📈🚀
🤔 Challenges Ahead: Of course, there are hurdles to overcome, but Bitcoin's resilience is unmatched. We're ready for whatever comes our way! 💪🏁
🚀 Emerging Use Cases: Bitcoin's not just about HODLing anymore. NFTs, DeFi, and more are being built on the Bitcoin blockchain, creating endless possibilities! 💼🎨
📚 Educate & Elevate: Remember, knowledge is power. Learn how to securely buy, store, and use Bitcoin. It's an investment in your financial future! 📚💰
So, what's your take on Bitcoin's future? Are you bullish on the OG crypto? 🐂 Or do you have concerns? Let's chat in the comments! 💬👇
Remember, this isn't financial advice, just an influencer's take on the exciting world of Bitcoin! Stay informed, stay curious, and stay crypto-savvy, my friends! 🚀💯 #CryptoLife #BitcoinFuture 🌐🚀
-
@ 23202132:eab3af30
2023-09-07 00:20:43Nostr é um protocolo de comunicação que está ganhando visibilidade e sendo usado em vários softwares. O que parece promissor é a solução para descentralização do login na comunicação.
O que ganha força neste protocolo é a falta de registro, contas, e-mails ou senhas. Em vez disso, a autenticação é baseada inteiramente em chaves criptográficas, fornecendo privacidade automática, criptografia e assinaturas incorporadas diretamente ao protocolo subjacente.
Basicamente, os desenvolvedores de aplicativos têm agora uma tecnologia centrada na privacidade. Podem se concentrar na construção do software sem a dor de cabeça com processos de login, banco de dados, etc.
Cada usuário gera uma chave criptografada pública que serve para divulgar aos amigos e funciona como um tipo de identidade digital, e também, uma chave criptografada privada que serve como um tipo de login universal.
A chave privada equivale a senha e a pública serve como nome de usuário. Como o usuário é o único proprietário da chave privada, não existe a necessidade de cadastrar dados para efetuar login.
Um bom exemplo de uso desta forma de protocolo é o Astral.ninja. Ao acessar a página do Astral vai aparecer um formulário perguntando se o usuário deseja adicionar sua chave privada ou se deseja criar uma nova criptografia de login.
Se você já possui sua chave, insira ela e o login será executado. Caso ainda não tenha uma chave privada e uma pública, clique no botão gerar chaves e ele vai criar a criptografia para você. Produzindo assim sua identidade sem coletar nenhum dado.
Minha chave pública no protocolo NOSTR ficou assim:
npub1yvszzvnckwpdxnkzgvn93ckw09w47qhfq3sjq50xax0pa64n4ucqet9edl
Se você quiser entrar em contato é só adicionar minha chave pública acima e enviar sua mensagem.
Minha experiência usando o Nostr Estou testando o protocolo Nostr já faz alguns meses e gostei dos fundamentos desta tecnologia. No entanto, ao trocar mensagens com alguns colegas ocorreu atrasos no recebimento e em outros casos a mensagem simplesmente não chegou.
O interessante é que esses problemas não foram ocasionados pelo protocolo, mas por estarmos desatentos aos relés de conexão.O Nostr funciona conectando o aplicativo em diversos servidores que irão espelhar a mensagem e manter ela na rede. No entanto, os relés não conversam entre si.
Dependendo do aplicativo que você estiver usando ela vai enviar sua postagem para um ou mais relés e esses relés vão mostrar o conteúdo para aquelas pessoas que estiverem conectadas nele.
Essa simplicidade traz uma vantagem importante, em vez de depender de sua identidade vinculada a um único servidor, sua identidade é apenas uma chave privada. Você apenas publica mensagens, assinadas com sua chave, para 5 ou 6 ou 10 ou 100 retransmissores. Esses retransmissores são burros e apenas aceitam mensagens de qualquer tipo, assinadas por pessoas diferentes. Dessa forma, você não corre o risco de ser banido de nenhum servidor individual, porque se alguém o banir ou o servidor for impedido de operar, suas mensagens estarão em outros 6 retransmissores e você poderá seguir em frente. É muito fácil transferir suas mensagens apenas copiando-as de um relé para outro. É uma ideia muito simples de construir um banco de dados descentralizado resistente à censura.
Mas para que tudo funcione adequadamente é aconselhável ter um mínimo de 8 servidores (relays) conectados e avisar seus contatos em quais relés você está transmitindo. Assim uma pessoa pode acompanhar suas postagens sem problemas.
No entanto, se você se conecta no relé X e a outra pessoa se conecta no relé Y, ela não achará suas postagens.
Usar entre 8 e 10 relays se mostrou bem eficiente nos testes. Os erros que comentemos no início foi conectar em apenas um servidor e em alguns casos usando um servidor diferente em cada aplicativo de mensagem. Dificultando a propagação das mesmas.
Se você for testar o Nostr e quiser me enviar mensagem por lá, adicione esses servidores abaixo no seu aplicativo Nostr.
wss://nostr-01.yakihonne.com
wss://nostr-02.dorafactory.org
wss://nos.lol
wss://relay.nostr.band
wss://relayable.org
wss://nostr.wine
wss://purplepag.es
wss://eden.nostr.land
wss://relay.damus.io
wss://nostr3.actn.io
Assim você garante que estaremos na mesma rede de conexões e espelhamento, facilitando a propagação das mensagens e a velocidade de transmissão .Testei vários aplicativos que usam o protocolo Nostr e em todos eles a única questão sensível foi a configuração dos relés (relays).
Se você inserir uma quantidade acima de 4 servidores, mesmo que algum fique indisponível, o sistema funciona bem com a cobertura dos demais, nos nossos testes 8 foi o numero de melhor eficiência.
Essa forma de transmissão por relés, que não se comunicam entre si, é o que torna o Nostr algo minimalista e eficiente. Se você entender o minimo de configurações, é possível configurar e manter seu próprio relé diretamente no seu computador. saiba mais clicando aqui! Outro ótimo conteúdo para se aprofundar está aqui!
Inserir apenas um ou dois servidores (relays), pode ocorrer instabilidades e nenhuma propagação das mensagens.
-
@ 4d444439:7ed2458b
2023-09-08 13:10:00Feel free to read all my articles on the anti-censorship long content platform yakihonne.com.
After a five-week journey, the Indian Chandrayaan-3 spacecraft began its descent to the lunar surface. The craft flipped into a vertical landing position, paused to hover about 450 feet up, then alighted on a dusty plateau between two large craters.
“India is on the moon,” S. Somanath, the chairman of Indian Space Research Organization (ISRO), announced to a cheering crowd in mission control in Bengaluru on Wednesday, August 23.
After the Soviet Union, the United States, and China, India is the fourth nation to successfully land on the moon, and the first to visit the enigmatic south pole region.
“It’s absolutely wonderful to see our partners in India have a successful landing,” says David Kring, a planetary scientist at the Lunar and Planetary Institute in Houston, Texas. “It’s very challenging to put a spacecraft on the surface of another body.”
The Chandrayaan-3 lunar lander attached to the propulsion module that carried it to the moon.PHOTOGRAPH BY ISRO
The difficulty of a moon landing has been underscored by a recent string of failures. Just days before the Chandrayaan-3 landing, Russia’s Luna-25 lander smashed into the surface after an engine failed to properly shut down. A lander built by the Japanese company Ispace—carrying a rover built by the United Arab Emirates—ended catastrophically in April after the spacecraft misjudged its altitude and ran out of fuel. India’s first craft to attempt a moon landing in September 2019 also crashed.
“From the day we started rebuilding our spacecraft after [the] Chandrayaan-2 experience, it has been breathe in, breathe out, Chandrayaan-3 for our team,” said Kalpana Kalahasti, the associate project director of the mission, after the craft touched down.
That team had more reason to celebrate the next morning in India when a small rover named Pragyaan “ramped down from the lander and India took a walk on the moon!” ISRO reported.
The rover, whose name means “wisdom” in Sanskrit, and the lander Vikram, named for the Indian scientist Vikram Sarabhai who helped establish ISRO, will take scientific measurements for about two weeks. After that time, the area will plunge into a two-week long lunar night that the two spacecraft are not expected to survive since they run on solar power.
The first image of the moon's surface taken by India's Chandrayaan-3 spacecraft after its historic touchdown on August 23, 2023. PHOTOGRAPH BY ISRO
Before long, however, a new wave of robots could join the Pragyaan rover and Vikram lander on the moon. A Japanese lander called SLIM, or the Smart Lander for Investigating Moon, is slated to launch Saturday, August 26, hitching a ride with a new space telescope, both developed by the Japan Aerospace Exploration Agency (JAXA).
Other major missions, such as NASA’s VIPER rover and China’s Chang’e 6 sample return, are expected to launch in 2024, poised to reveal new parts of the moon ahead of the Artemis III mission to return humans to the surface.
“It is a very exciting era,” Kring says. “It’s going to be fun.”
Dialing in the landing
Chandrayaan-3 landed at about 69 degrees south latitude, closer to the lunar south pole than any craft before it. On Earth, this would be roughly equivalent to the outer coasts of Antarctica, though it is still “a long way from the pole at 90 degrees,” Kring says.
“They are in this near-polar terrain, which is very old,” he says. “It’s far more ancient than any of the Apollo landing sites, and … geologic studies of that terrain are very exciting.”
An engineer works with a prototype of the Volatiles Investigating Polar Exploration Rover (VIPER) in a test bed of quicksand-like soil in the “sink tank” at the Simulated Lunar Operations Laboratory, or Slope Lab, at NASA’s Glenn Research Center in Cleveland. The VIPER rover will operate at the moon’s south pole to look for water ice. It can pivot each wheel independently and “swim” to get itself out of deep, fine sand. PHOTOGRAPH BY MARK THIESSEN, NATIONAL GEOGRAPHIC
The rover will analyze the mineral composition of the area, while the lander will use a seismometer to listen for “moonquakes”—which can occur as the moon slowly cools and contracts—as well as measure temperatures and atmospheric conditions.
But when the sun sets on Chandrayaan-3, the rover and lander are expected to go dark forever. They have already accomplished their most important goal: safely landing and deploying. Future missions will carry on the exploration of the lunar surface—India could return in a few years during a proposed joint mission with Japan.
JAXA may not have to wait that long, though, as its SLIM lander could launch this week. The eight-foot-tall craft will orbit the moon before attempting a pinpoint landing using image recognition technology to identify craters and precisely determine its location. During the final descent, a sophisticated radar will help the spacecraft land within 100 meters of its target. By contrast, the Chandrayaan-3 landing zone was an ellipse about four kilometers wide.
This type of precision landing will be needed in the future to explore the deep craters and rugged slopes of the lunar south pole. This jagged landscape has areas that never see sunlight, where scientists believe deposits of water ice may have accumulated—a vital resource for establishing a human outpost on the moon.
The magnificent peak known as Malapert Massif (lower left) was selected as an Artemis III candidate landing region. The summit rises more than 16,400 feet above the base. Off in the distance stands a 11,480-foot-tall cliff. One could argue that the sheer grandeur of this place makes it a prime candidate. PHOTOGRAPH BY NASA/GSFC/ARIZONA STATE UNIVERSITY
“The south pole is an incredible, incredible world. It’s topography is extreme, with these really large craters, very tall mountains,” says Anthony Colaprete, the project scientist for the VIPER mission at NASA's Ames Research Center in California. “It is really a fascinating landscape.”
Searching for resources
The craters at the moon’s south pole have entranced scientists for decades. They include some of the oldest and largest lunar craters and hold clues about the state of the solar system more than 3.5 billion years ago, when both the moon and Earth were being pummeled by asteroids.
On much of the moon, one cycle of day and night lasts about 28 Earth days. At the south pole, however, the sun never sets, and instead circles slowly around the horizon. This casts perpetual shadows on some parts of the craters.
These pockets of darkness, among the coldest places in the solar system, may contain deposits of substances that scientists call volatiles—compounds that would sublimate to gas in the sunlight. The most tantalizing volatile on the moon is H2O.
“If water ice is present in quantities and in a distributed state that is recoverable, that would be valuable,” Kring says. “Water, first of all, is useful as an astronaut consumable. It’s useful because it’s a very effective shield against space radiation. And third, you can separate the hydrogen and the oxygen for rocket propellant.”
To investigate whether this ice is accessible to future crewed missions, NASA is preparing to launch a rover called VIPER, or the Volatiles Investigating Polar Exploration Rover, to the moon as soon as November 2024. Equipped with a meter-long drill, the golf-cart-size rover will explore the craters atop an expansive mountain called Mons Mouton near the moon’s south pole.
"Inside these ancient craters are permanently shadowed regions that haven’t seen the light of day in billions of years,” Colaprete says. During its 100-day mission, VIPER will venture into the craters’ shadowy realms, where temperatures can near absolute zero.
Once scientists know where the ice is, and how much, accessing it will require sending water harvesting equipment to the lunar surface. To prepare, NASA has funded multiple aerospace companies to develop lunar landers that could take not only science instruments, but eventually tools and supplies to help construct a base. Two of those spacecraft—the Nova-C lander built by Houston-based Intuitive Machines, and the Peregrine lander from Pittsburgh-based Astrobotic Technology—could launch later this year.
Private companies in India, Japan, Israel, and elsewhere also have their sites set on the moon, with a whole fleet of designs that could one day help shuttle cargo to astronauts living in a habitat on the surface.
Boot prints
To get humans back to the moon, NASA is ramping up its Artemis program. Artemis I, the first test launch of the giant Space Launch System rocket that will carry people to the moon, blasted off on November 15, 2022. Now the space agency is preparing for Artemis II, scheduled to fly astronauts around the moon and back in November 2024. Then Artemis III is slated to land a crew on the surface as soon as December 2025.
But to pull off a crewed landing in that timeframe, NASA is relying on SpaceX’s Starship rocket. The giant launch vehicle, the biggest and most powerful ever flown, broke apart in a fiery explosion during its first test launch in April. It also partially destroyed the launch pad, flinging concrete and metal debris for thousands of feet.
NASA plans to use a modified version of the upper stage of this rocket to land people on the moon, and Artemis III cannot proceed as planned without it. Elon Musk, SpaceX’s founder, discussed upgrades to Starship and its launch pad during an online interview with Bloomberg in June, when he estimated about a 60 percent chance of reaching orbit in the next attempt.
“There’s a lot of still unknowns about what Starship is exactly going to look like when it’s done for lunar missions,” says Jason Davis, a senior editor at the Planetary Society. “How long can we stay there on the moon inside that thing? How much cargo can it bring?”
NASA has also contracted Jeff Bezos’ rocket company Blue Origin to lead a consortium of aerospace companies in building a second crewed lunar lander. Meanwhile, China plans to land astronauts by 2030 and is gearing up for the Chang’e 6 sample-return mission to the lunar south pole next year.
Until crewed lunar landers can be completed, the moon’s surface will need to be studied from afar using robotic explorers like Chandrayaan-3. But perhaps in the not-too-distant future, scientists and engineers in space suits will visit the shadowed craters of the lunar south pole to harvest their ice and discover their secrets.
By:JAY BENNETT Link:https://www.nationalgeographic.com/premium/article/india-land-spacecraft-near-moons-south-pole
-
@ de496884:72617b81
2023-09-06 23:22:28Últimamente en las redes se ven muchos mensajes de desprecio, ridiculización y burla, bajo estandartes de «humor» o «humor negro», donde sus defensores esgrimen que no tiene límites. Hoy les traigo una reflexión sobre el tema, así que sigue leyendo y descubre qué es el humor hipermediático.
Concepto
La definición de humor negro varía según la cultura y el contexto. De manera general se le identifica como ese tipo de humor que promueve lo risible en temas que deberían suscitar tristeza, terror o lástima, de ahí su carácter polémico.
El humor negro se compone de un enunciador en una situación penosa, una operación reflexiva que lo convierte en objeto de ridiculización, un distanciamiento de sí mismo que le permite reírse, y una identificación del público con el enunciador que lo suma al blanco de la burla.
Esto ocurre desde la literatura, pero en el sentido común se define por su temática, no existe operación reflexiva, y por tanto, se le pasa a llamar «lo cómico negro» porque llega a ser una burla a un otro sin ninguna identificación con él ni compasión en una relación asimétrica.
Básicamente se trata aquí de una alianza entre el enunciador y el público para degradar a un tercero. Por tanto esta burla se diferencia del humor en tanto no existe por accidente ni posee la reflexión.
Desde el punto de vista sociológico, la burla a un blanco exterior permite construir una identidad colectiva en tanto afianza la cohesión grupal, y si lo hace a lo interno del grupo, fortalece lazos y deja implícitas ciertas normas y jerarquías bajo la censura a x conductas.
Un poco de historia
Desde la antigüedad y dado el proceso de civilización, la burla pasó de ocupar un lugar central en la época medieval, a pasar a ser regulada con el cristianismo al considerarla denigrante, aunque posteriormente se flexibilizó mientras respetara ciertos requisitos estilísticos.
¿Qué pasa en la actualidad? ¿Por qué la burla y lo «cómico negro» forman parte de nuestros días? Hoy asistimos a la mayor producción mediática risible de la historia. Desde la institucionalización de los medios masivos en el siglo XIX nace el humor mediático. Se ve en la producción de periódicos, revistas, filmes, programas radiales y televisivos, etc. En ella se distingue lo real social y su representación en los medios masivos, quienes controlan la demanda en horarios, temáticas y tal.
En este período lo reidero se genera mediante la prensa satírica, la caricatura, el sainete, etc., que nacieron con una clara división entre los productores y receptores, pues toma como blanco a las instancias superiores de la vida política.
Con la llegada de la TV por cable, la transmisión satelital, el VHS y luego con internet, la producción mediática fue creciendo y los modos de hacer reír se multiplicaron. Las instituciones mediáticas se debilitaron y con ellas su papel regulatorio en lo risible.
Este es el humor mediatizado, que ahora se caracteriza por su carácter reflexivo. Si antes se reía de lo representado, ahora se ríe de la representación misma y sus condiciones. Con la posmodernidad lo risible se expande a la sociedad y sus límites con lo serio se disuelven. Este humor mediatizado instaló un estilo risible improvisado, de mala factura y bizarro, donde lo gracioso estaba en la representación fallida, la pretensión frustrada.
Con la crisis de los medios masivos y el auge de internet, surgió el humor hipermediático. Aquí cualquiera con una cuenta en una red social puede hacer un chiste, un meme, etc., en el que se pierde la figura del autor, pero que los demás se apropien de su producción discursiva.
Debido a ello ocurre que lo que anteriormente era censurado, ahora se mediatiza porque no hay regulación ninguna ni forma efectiva de hacerlo dada la rapidez de expansión de un producto en las redes. Así se retoma lo cómico negro, nace el cyberbullying, los discursos de odio.
Un poco de reflexión
¿Cuáles a mi entender son dos de los aspectos fundamentales que distinguen este humor hipermediático?: La falta de empatía y la asimetría de poder, en tanto deja de existir una identificación con el otro al que va dirigida la burla. Lo cómico es reírse del otro que no pertenece al grupo de uno, para dejar clara una postura de hegemonía y rechazo a lo diferente. Así vemos cómo las víctimas de este humor generalmente son las minorías, los grupos históricamente oprimidos y excluidos de oa sociedad. Se rompe con la reflexión del humor para dar paso a una burla desmedida y despiadada que afiance la posición de poder de quien se burla. Es necesario ser críticos a la hora de compartir y dar alcance a este tipo de publicaciones, que solo demuestra nuestra crisis de valores y conocimientos.
-
@ d8714c92:cd61e54a
2023-09-08 13:05:05ATTENTION! SOLDIER, REST!
Like a diver in deep waters, we're going to dive into one of the most crucial aspects of the game, I believe it's the most important: your bankroll and its management. Do you have less than fifty games under your belt? Are you just starting your journey at the tables? Do you have chips and are learning to bet? Soldier, you're in the right place. Below, we'll explore how to handle your money, make smart decisions, and maintain mental strength during buy-ins.
What is a Bankroll? The Bankroll Concept
The bankroll is the soul of poker. It's the money you have set aside exclusively for your games. Properly managing your bankroll is vital to survive the inevitable fluctuations in Texas Hold'em. Whether you've won the World Series or just started playing yesterday, there will always be ups and downs in your performance. Having a solid bankroll allows you to maintain control over your finances and avoid the dreaded bankruptcy.
Poker is bound to take hold of you, so creating a barrier between your personal finances and your passion for poker will help you maintain a logical approach and avoid impulsive decisions at the table, which can often lead to significant losses.
Managing the Bankroll
Proper bankroll management involves setting limits and sticking to them. The fundamental principle is to never bet more than you can afford to lose. It's advisable to allocate a specific amount of money for poker, regardless of your wins or losses in other areas of your life.
A commonly used approach is "10% or less" of your bankroll in a single game. Let's round up the numbers for clarity: if you have $100 in your bankroll, the buy-in for a tournament or cash game shouldn't exceed $10. This gives you enough margin to recover from any bad streak without risking your entire bankroll.
Remember, the key to bankroll management is discipline. If you happen to lose several games in a row and your bankroll significantly decreases, don't succumb to the temptation to reload immediately. Take a break, evaluate your decisions, and, if necessary, consider playing at lower-stake tables until you can recover.
O...or...
You can try our freeroll table. Also, do you want to try a new strategy? Are you testing a new system or want to learn from your mistakes? Request play money chips and come in. The beauty of poker is that it always gives you opportunities, ALWAYS. Try your free chips today.
How Much to Invest?
The average buy-in refers to the amount of money you're willing to invest in a game. It's crucial to choose tables or tournaments with buy-ins that fit your bankroll. If you're a recreational or beginner player, we recommend starting with low buy-in tables, where the competition is usually softer, and losses won't be devastating.
When you're playing with a limited bankroll, it's important not to overexpose yourself. Even if you believe you can compete at a high buy-in table, resist the temptation and play within your means. Practicing at low and mid-stakes tables will allow you to hone your skills and gain confidence before facing more experienced opponents.
Rebuys
In tournaments with a rebuy structure, having a solid strategy is important. Making wise use of rebuys can be an effective tactic to increase your chances of winning. A rebuy allows you to re-enter the game with the same initial chip stack or, in some cases, with a predetermined additional amount. I repeat: to do this, a defined strategy is important, no improvisations. Be careful not to fall into the trap of rebuying compulsively. Having a plan doesn't equate to making a purchase. Evaluate the situation and decide if a rebuy is genuinely advantageous or if it's better to wait for another tournament.
For example, if you're in an early stage of the tournament and lose some chips, too early, in that case, it might be wiser to save your money for another time instead of rebuying immediately. On the other hand, in the late stage of a tournament, where the blinds are high and the pressure is on, a strategic rebuy can be a smart move to keep your winning opportunity alive.
Strong Mental Game in Buy-Ins
The buy-in can be a stressful moment, especially if you're playing with money that matters to you. Maintaining mental strength is crucial for making informed decisions and avoiding emotional play. Accept that poker is a game of skill and luck, and losses are part of the process. Don't let a bad game demoralize you; instead, use it as an opportunity to learn and improve.
One way to maintain mental strength is to establish a routine before each poker session. Take deep breaths, focus on your goals, and visualize a winning attitude. Also, don't let emotions take over during the game. If you feel frustrated or anxious, take a short break, stand up, and stretch to clear your mind before returning to the table with a renewed attitude.
Recommendations from Poker4Sats
Soldier, the battle unleashed at the tables can cause serious drama, and at times, you'll feel all-powerful, or you'll hear this frequently: the table is playing against me, the cards aren't in my favor. So, here are three quick things.
- Study and Practice: Dedicate time to studying the game, whether through books, videos, or articles. Also, play regularly to put into practice what you learn and gain experience at the table. Subscribe to our profile because here, you'll always have information about the game and Bitcoin.
- Start with a Conservative Bankroll: It's perfectly fine to start with a small, conservative, modest bankroll. It's not a sign of insecurity or anything; on the contrary, it's what's available today for observation, learning, and making mistakes.
- Control Your Emotions: Poker can be exciting and sometimes frustrating. Learn to control your emotions and avoid making impulsive decisions based on frustration or euphoria.
Losing is part of the nature of poker. That's not a problem, and today, we need to design a strategy that suits us. Good luck at the tables!
-
@ 0f1b5961:868242bd
2023-09-06 22:05:50Backstory
Written in the late 300s near the end of Gregory's life, this treatise is a response to the question 'What is the perfect life?' from Caesarius who is assumed to be a young monk.¹
Gregory is one of the three 'Cappadocian Fathers', named for their Roman province which is located in modern day central to eastern Turkey.² Notably, Gregory of Nyssa was highly influenced by Origen which, in part, was due to the tutoring of his grandparents and their family by one of Origen's students, Gregory Thaumaturgus.¹
Structure
There is a brief introduction and conclusion. The main body is divided into two parts: the history of Moses and a corresponding spiritual understanding of this history. The spiritual understanding is about four times longer than the historical outline.
Introduction
Gregory, while accepting the question from Caesarius, does not promise that he will be able to answer it. Either way, he hopes that with his reputation and age, his choice to answer the young monk's question will set a good example of "ready obedience". He goes on to emphasize that he believes the perfect life is a 'way of being' and not a destination to reach, thing to be grasped, nor feat to be achieved. He suggests that this perfect life might best be learned through the examples recorded in the Hebrew scriptures. And finally he chooses Moses as the example through which to answer the question.
Body
Coming soon.
Conclusion
Coming soon.
Opinion
Coming soon.
¹ https://jesusandtheancientpaths.com/2022/07/28/an-intro-to-saint-gregory-of-nyssa-and-his-last-work-the-life-of-moses
² https://en.wikipedia.org/wiki/Gregory_of_Nyssa
-
@ 4044176c:b3f3c23c
2023-09-08 13:01:03For years, one of the first lines of defense against phishing emails has been broken English.
To guard against messages that try to trick recipients into clicking malicious links or revealing credentials, corporate training programs have urged employees to be on the lookout for spelling mistakes, odd grammar and other errors common to those for whom English isn’t a first language.
Now generative AI tools, including OpenAI’s popular ChatGPT, can fix all those red flags.
In the hands of even amateur hackers, AI has become a potent threat due to its ability to analyze vast amounts of publicly available data about a target and create remarkably personalized emails in just seconds.
“Suddenly, that text is going to look like it’s coming from your granddaughter or another child. They’ll know who your best friend is, and it will come that way,” said Kathryn Garcia, director of operations for New York state, who led the development of its first cybersecurity strategy.
The Problem
So-called large language models like ChatGPT and Google’s Bard don’t understand language as humans do, but they can dissect how sentence structure, colloquialisms and slang work, predicting how to construct written speech, sometimes with uncanny precision.
Email security company Abnormal Security said it has seen phishing emails from generative AI platforms used against its customers. The messages are perfectly crafted and look legitimate, making them difficult to detect at first glance, said Abnormal Chief Executive Evan Reiser.
“You look at these emails and there’s no trigger in your mind warning you that this could be a phishing attack,” he said.
LLM tools can scrape the web for information about a person on social media, news sites, internet forums and other sources to tailor tempting emails the way hackers for nation-states often spend months doing. If attackers already have access to proprietary information, they can salt in more convincing details, even mimicking writing styles.
“Now, a criminal can just take those emails, dump them automatically into an LLM and tell it to write an email referencing my last five [online] conversations. What used to take eight hours can be there in eight seconds,” Reiser said.
ChatGPT and Bard have inbuilt protections against creating malicious content such as phishing emails. But many open-source LLMs have no safeguards, and hackers are licensing models that can write malware to willing buyers on darknet forums.
The Illusion of Safety
How generative AI can create eerily compelling phishing emails
In this example, Abnormal Security used an LLM created by one of its engineers to demonstrate how easily a convincing email can be generated for a specific person. The algorithm scraped my public-facing social media presence to generate an email tailored to me, completed in seconds.
The Future
AI has long been used to manipulate images to make convincing deepfakes. Simulated speech that mimics a person’s voice is developing rapidly. Hybrid attacks involving email, voice and video are an approaching reality.
But the attacks we can’t predict are the real threat, cybersecurity and national-security experts contend.
“AI will make the techniques used today more scalable, faster and more effective, but also AI might be able to think about attacks that we can’t even conceive today,” said Eric Goldstein, executive assistant director for cybersecurity at the Cybersecurity and Infrastructure Security Agency, part of the Department of Homeland Security.
AI programs have already proved, for instance, that they can outfox humans at games such as chess and go by coming up with strategies people would be unlikely to devise, Goldstein said. Applying the same template to cybercrime could result in online attacks that current systems aren’t designed to watch for, or social-engineering attacks that seem so lifelike they are impossible to detect.
But some cybersecurity companies are beginning to incorporate generative AI into their own products, to try to get ahead of its widespread misuse. Email security provider Ironscales, for instance, uses a proprietary LLM to generate phishing emails for security awareness training.
Defensive AI systems will be needed to fight off AI-powered attacks, said Eyal Benishti, Ironscales chief executive. Another coming ordeal: AI’s ability to produce convincing attacks at scale.
“Just imagine business email compromise and targeted phishing at the same volume as we experience spam, because that’s what will happen,” he said.
In a generative AI world, corporate security must change, said Diego Souza, chief information security officer of manufacturer Cummins.
Companies will need to improve employee training and awareness on phishing, Souza said. Networks will have to be carefully segregated to prevent hackers from doing a lot of damage if they break in, he said.
Chris Inglis, an adviser at corporate risk consulting firm Hakluyt, said cyber professionals are reeling from the speed at which generative AI has arrived. But the risks aren’t limitless, said Inglis, who until February was U.S. national cyber director.
For LLMs to continue to learn, they must ingest lots of data, and the larger LLM platforms have begun to exhaust publicly available data sets, he said. That means there is a natural cap to what widely available machines can be trained on, he said, meaning the current pace of development might slow.
“The interesting thing about Chat GPT isn’t what it is at the moment, but the speed at which it has come at us,” he said.
By:James Rundle Link:https://www.wsj.com/articles/generative-ai-could-revolutionize-emailfor-hackers-5a8c725c?mod=ai_news_article_pos1
-
@ e3dce512:447efd72
2023-09-06 21:19:50Tenho forte convicção de que o segredo para dar o primeiro passo é simplesmente não pensar em como fazer, apenas executar.
Eu sei, eu sei. A frase acima é extremamente óbvia e genérica mas venha comigo que vamos pensar um pouco sobre este tema juntos.
Você, que está lendo do outro lado, já parou pra pensar como foram suas primeiras experiências em algo? Lembra do primeiro dia que andou de bicicleta? E do primeiro beijo? Consegue lembrar o nervosismo que sentiu no primeiro dia de seu primeiro emprego?
Começar algo novo é sempre desconfortável, dá medo, nossa mente se enche de incertezas e somos bombardeados por pensamentos de que devemos desistir, voltar, ou nem mesmo tentar.
Tudo que é novo incomoda, tudo que é diferente nos causa estranheza, mas se queremos nos tornar alguém diferente de quem somos hoje, este processo é obrigatório.
Calma, meu querido leitor, não quero te causar nenhum desconforto mas sim te lembrar dos sentimentos positivos que vieram do triunfo de cada uma dessas conquistas. Por mais esquisito que possa ter sido seu primeiro beijo, talvez a troca de olhares e sorrisos possa ser uma lembrança amorosa até hoje. E a bicicleta? Você pode ter caído, se machucado, mas quando andou sozinho tenho certeza que comemorou.
Mais forte que o incomodo de começar algo é o prazer que a nova situação lhe causará quando já estiver confortável.
E como transpor essa barreira? Bem, uma das coisas que busco praticar é o hábito da visualização. Eu sempre penso: “Como será o Régis daqui 10 anos? Como eu quero que esse Régis seja?” O foco aqui é pensar qual aura você deseja emanar ao mundo e não necessariamente quais conquistas você já gostaria de ter realizado. (Isso deixemos para outra visualização).
A principal pergunta que você deve fazer neste momento é: “Se eu quebrar meu objetivo em milhares que pequenos pedaços, qual pedacinho eu devo fazer hoje para somar ao meu “eu” do amanhã?”
Cuidado com as cobranças excessivas, sempre que se ver na situação de dizer: “Eu deveria estar fazendo ‘X’”, substitua por: “Beleza, o que eu posso fazer agora?” Cobrar seus resultados não é se culpar pelos fracassos ou se condenar por não ter feito algo.
Seja enérgico, mas não se puna, há uma forte diferença entre se dar um “banho de realidade” e se condenar. Sempre que nos condenamos acabamos bloqueando a ação ainda mais.
Uma forte recomendação que deixo aqui é o livro: O Poder do Hábito de Charles Duhigg. Nele o autor mostra que é possível criar hábitos sem sofrimento e que estes hábitos podem fazer com quê caminhe para o sucesso quase que em “modo automático”. Caso você não tenha o hábito da leitura, recomendo o app 12 minutos.
Bem, este foi um assunto introdutório, pois mesmo eu, a partir desta publicação estou dando um primeiro passo para trabalhar de forma mais focada na criação de conteúdo.
Muito obrigado por ler até aqui!
-
@ d8714c92:cd61e54a
2023-09-08 12:56:38ATTENTION SOLDIER!
Ready to embark on an exciting card adventure? Today, we will dive into the thrilling world of Texas Hold'em Poker, a variant that has captivated players worldwide. If you are new to this game, we've come as white knights to save the day! Here, you'll find the basics, card rankings, how to play, and some key tips for your first 50 games. In the upcoming editions, we'll delve deeper into this poker variant, covering how to play it, what to consider, what to discard, what's what, what's not... in short, we'll break down everything about this exciting game.
Basics
Before running, let's learn to walk. Our first step will be to understand the basics of Texas Hold'em Poker. The game is played with a standard deck of 52 cards, and the goal is to form the best possible five-card combination. Each player receives two cards face down, known as "hole cards," and then five community cards are dealt face up in the center of the table. These common cards are generally called "community cards."
Objective of the Game
The objective of Texas Hold'em poker is simple: form the best hand possible with your two hole cards and the five community cards to win the pot. The pot is the sum of all bets made by players during the hand. To achieve this, you must use your strategy skills, opponent reading, and knowledge of hand rankings.
Hand Ranking
In Texas Hold'em poker, various card combinations can be formed, each with its specific ranking. Below, we present the hand ranking from highest to lowest:
- Royal Flush: The highest hand, consisting of a sequence of cards of the same suit from 10 to Ace (10, J, Q, K, A) (all of the same suit). A♥️K♣️Q♠️J♦️
- Straight Flush: A sequence of five cards of the same suit in consecutive order (for example, 6, 7, 8, 9, 10, all hearts). 6♥️7♥️8♥️9♥️10♥️
- Four of a Kind: Four cards of the same value (for example, four 7s). 7♥️7♣️7♠️7♦️
- Full House: Three cards of the same value along with two cards of the same value (for example, three 9s and two Js). 9♦️9♥️9♣️J♠️J♦️
- Flush: Five cards of the same suit, regardless of their order. K♥️10♥️8♥️6♥️4♥️
- Straight: Five cards in consecutive order, regardless of the suit. A♥️K♣️Q♠️J♦️
- Three of a Kind: Three cards of the same value (for example, three 5s). A♥️A♣️A♠️7♦️
- Two Pair: Two pairs of cards of the same value (for example, two 8s and two Qs). 8♥️8♣️Q♠️Q♦️
- One Pair: Two cards of the same value (for example, two Aces). A♥️A♣️K♠️Q♦️
- High Card: If none of the above combinations are formed, the hand is evaluated based on the highest card. A♥️K♣️10♠️8♦️6♥️
⚠️Please do not proceed further until you have at least understood the first five most important hand rankings. It's not that we don't want you to read more, but it's important that you learn this first.⚠️
How to Play
Now that we have the basics, it's time to take action. Here's a brief guide on how to play Texas Hold'em Poker. In future editions, we'll dive deeper into strategies for each phase of the game.
- Pre-flop: Each player receives two hole cards face down. The first round of betting takes place, where players can call (match the previous bet), raise (increase the bet), or fold (abandon the hand).
- Flop: Three community cards are dealt face up in the center of the table. Players have another round of betting.
- Turn: A fourth community card is dealt face up. Players engage in another round of betting.
- River: The fifth and final community card is dealt face up. Players have a final round of betting.
- Showdown: Players remaining in the hand reveal their cards. The player with the best five-card combination wins the pot.
Full House
A Full House is one of the strongest combinations in Texas Hold'em poker. It consists of a Three of a Kind and a One Pair in the same hand. For example, three 7s and two Js would form a Full House. When multiple players have a Full House, the winner is determined by the value of the Three of a Kind first, and in case of a tie, by the value of the Pair.
Formation of Poker Hands
In Texas Hold'em, each player receives two hole cards that are exclusive to them. Then, five community cards are dealt face up in the center of the table in three stages: the flop (three cards), the turn (one card), and the river (one card). Players must combine their two hole cards with the five community cards to form their best five-card hand.
Dealer Button
The dealer button is a token that indicates which player is the dealer in the current hand. The dealer is the last to act in each betting round, giving them a strategic advantage. After each hand, the button moves clockwise to the next player, ensuring that all players have an equal opportunity to be the dealer.
Community Cards
Community cards, also known as board cards, are the cards dealt face up in the center of the table. Players can use these cards along with their two hole cards to form their final hand. The flop consists of three community cards, the turn adds a fourth card, and the river adds a fifth and final card.
Kicker
In situations where two or more players have the same card combination (for example, a pair of kings), the kicker is used to determine the winner. The kicker is the highest card that is not part of the main combination. If two players have a pair of kings, the one with the higher kicker wins. If the kicker is also the same, the pot is split.
Aces and Bad Kickers Danger
While Aces (A) are the highest-ranking cards, they can also be dangerous when not played properly. A common mistake is overvaluing Aces and betting aggressively without considering other community cards or opponent actions. Bad kickers (low-value accompanying cards) can be particularly problematic. For example, if you have an Ace and a 2 as hole cards, your hand is vulnerable to being beaten by players with better accompanying cards.
Mr. P4S, I want to play now, so give me three tips to get started
Soldier, keep your composure! Here are three key tips for your first 50 games:
- Play selectively: Don't let excitement lead you to play every hand. Wait for good starting hands (like high cards or pairs) before betting strongly. Playing selectively increases your chances of success. We'll discuss this further in future editions.
- Observe your opponents: Pay attention to how other players play. Observe their betting patterns and try to identify if they are betting aggressively or conservatively. This will give you clues about the quality of their hands and help you make better decisions. You won't see their faces, but their betting methods, pattern repetitions, messages in the chats... it all adds up. Remember what Sherlock Holmes said: "Data, data, data... I can't make bricks without clay." Study, build. Move forward. Don't worry; we'll discuss this in more detail later.
- Manage your bankroll: Set a limit for the amount of money you are willing to spend on the game. Don't exceed your budget and avoid the temptation to bet more than you can afford to lose. Proper bankroll management is essential to keep the game fun and sustainable. We'll talk about this in other editions, but for now, especially if you're new, read this: only use a small budget or join Poker4Sats' freerolls. Here, the important thing is not to win mon—...who am I kidding? Of course, it's important! But for now, while you learn, it's better if you do it like the professionals, with trial and error and play money. Try our freerolls or bet small amounts.
With these tips and basic knowledge, you're ready to dive into the exciting world of Texas Hold'em Poker. Practice makes perfect, so play responsibly and enjoy the experience. Soldier, advance to the tables!
-
@ 4044176c:b3f3c23c
2023-09-08 12:53:47Here, in this article I am proposing a novel technique to summarize text documents. Well I am not writing a research paper for it but giving you basic explanations of key steps involved. It is a novel technique as sentiments have not been used with Fuzzy Inference Engine to the best of my knowledge for Text Summarization. I started working on this topic in 2016, though given time constraints and constraints, I didn’t publish the work yet. The work I did was in Java using Java based libraries. I have rewritten the code in Python for you to understand the basic steps, to be expanded into. Values and knowledge base in Fuzzy Inference Systems have to be edited as per applications. I have provided sample values for your understandings, not the values used in original research [which shall be send for publications and made available later].
This article can be taken as a (1) Tutorial for learning application of Fuzzy Inference Engine, Mamdani systems in particular, (2) Summarization technique in Python, (3) Novel research proposal for application of sentiment analysis in Fuzzy based Summarization Techniques.
Typically, this article was meant for research publication. But I have enough publications and I want research to reach humble minds for free! Here is the proposed technique in python.
1. Pre-processing documents and sentences
```
import important NLP packages
from future import unicode_literals import spacy,en_core_web_sm from collections import Counter nlp = spacy.load(‘en_core_web_sm’)
from spacy.matcher import Matcher matcher = Matcher(nlp.vocab)
sentence_to_be_ranked = (‘Financially good conference situations.’) text_document_snippet = (‘There is a developer beautiful and great conference happening on 21 July 2019 in London. The conference is in area of biological sciences.’)
Load the complete document from a file. This is for illustration only
doc = nlp(text) sent = nlp(title) ```
2. Get Largest Noun Chuck
Get the main longest noun chunk from the text fragment. Only most important chuck is being considered by the algorithm and shall be returned. There can be several kinds of chunking possible. Chunking is a kind of shallow processing. Why chucking —as it is useful in summarization techniques to highlight the important phrases. And largest chunks will be highlighted in the summary across all sentences after ranking them all. Other chunking techniques exists, look in my future articles about more on this. Here, just key steps of summarization.
```
inputSentence is the input to of which the longest chunk is to be found
def getMainNounChuck(inputSentence): lenChunk = 0 prevLen = -1 mainChunk = “” for chunk in inputSentence.noun_chunks: lenChunk = len(chunk) print (chunk) print(lenChunk) if prevLen < lenChunk: mainChunk = chunk prevLen = lenChunk print(“Main chunk is: “, mainChunk) return mainChunk
Sample Output: Main largest chunk in sentence for ranking is: Financially good conference situations Main largest chunk in given 2 sentences is: beautiful and great conference ```
3. Get Sentiment Score of Sentence to be Ranked
There are several ways to compute the sentiment of a given sentence to be ranked as a part of collection of sentences to create an extract. The two methods are not exhaustive, but there are plethora of other options to compute the sentiments. For, research purposes I suggest you use a supervised or unsupervised trainer to train sentiment module on the topic of your interest, this means the domain in which you wish to perform the experiments: Is it sports news articles, medical articles, movie review summarization. Such a sentiment analyzer will be more beneficial to the output and relevance of results. But since the article aims to just give snippets of tasks in short. You can look on my other articles of how to learn sentiments per domain of text categories.
``` def getSentimentScore(doc): print(“Sentiment is “, doc.sentiment * 10) return doc.sentiment * 10
Another way to compute sentiment
def getsentiment2(sent): from textblob import TextBlob sentimentObject = TextBlob(sent) sentimentObject = sentimentObject.sentiment print(“Sentiment”, sentimentObject.polarity * 10) return sentimentObject.polarity * 10
Sample Output: sentence= (‘Financially good conference situations.’) Sentiment 7.0
Preferable Recommended way which I use and suggest: A self trained model on corpus! ```
4. Similarity between document and sentence
The following small python code is enough to find basic similarity between a sentence and the text document(s) under consideration. Well there are several kinds of similarity measures in NLP some very popular being Wu-Palmer and Leacock Chordorow, path based similarity, Resnik measure, Lin measure to mention a few. As a researcher I suggest analysis on all these fronts before finalizing on any one. Some other similarity measures are lexical similarities, Cosine similarities among one-hot representations, vector space representations or FastText, GLOVE Vector representation or any other word embeddings such as Word2Vec or may be just WordNet based similarities. A lot of options to choose from. So which one I am using in this problem ? Or even in any other problem ? Still the task can be made more simple, the choice of algorithm, you can mail me for details once your basic steps are complete!
``` def getSimilarity(sentence1, doc1): return doc1.similarity( sentence1 )
Recommended: More insight in kind of similarity measure used esp. the most useful ones for a current problem. A deep insight is needed here, while choice of technique to be used is being made.
Sample Output: The similarity between sentence and document is 0.3219
``` en_core_web_sm, don’t come with word vectors and utilizes surface level context-sensitive tensors. Hence for an efficient toolkit you would have to use more than this! I have implemented this fragment of work in Java using DL4J!
5. Get Part of Speech Count
Part of Speech is another parameter to the Fuzzy Inference Engine that I propose to use in a slightly different way. Being as in typical NLP summarization techniques using Fuzzy Inference Engines, an input is typically used as NOUN count. But here we have proposed to use: Noun Count, Adjective Count, Adverb Count to mention a few. The code snippet for a easy computation of count of a particular POS tag as specified in parameter “inputPOSTag” for text in “inputText” can be written in Python as follows.
def getPOSCOUNT(inputText, inputPOSTag): nlp = en_core_web_sm.load() count = 0 for tokenInputText in nlp(inputText): countPOS +=1 dictonaryInputText= (Counter(([token.pos_ for token in nlp( tokenInputText)]))) print( dictonaryInputText ) return dictonaryInputText [inputPOSTag]/( countPOS+1) * 100
6. Checking Values-So far So Good
The following code is to check the values computed by the NLP Engine is fine or not ! If not change the algorithms and techniques used as suggested in points above. Once done go to next step of setting up Fuzzy Inference Engine for summarization.
``` print(getMainNounChuck(sent)) print(“the similarity between sentences is”, getSimilarity(nlp(title),getMainNounChuck(doc))) getSentimentScore(sent) print(“Noun count” , getPOSCOUNT(text,”NOUN”)) print(“Verb count”, getPOSCOUNT(text,”VERB”)) print(“Adj count”, getPOSCOUNT(text,”ADJ”))
Sample Output for input above. Adjective count 11.53846 ```
7. Defining Fuzzy Inference System (FIS) for Ranking Sentences
The following steps are performed for ranking the Fuzzy Inference System (FIS)
7.1. Defining the Antecedents and Consequents functions
The following input parameters are used. These are all defined above in the NLP Processing technique in details. Again this is a snippet for understanding, actual research has much more complex components, which are not discussed here in this article.
The Fuzzy Logic toolkits for illustration used are as follows:
``` import skfuzzy as fuzz from skfuzzy import control as ctrl
The input parameters in FIS for the explanation are: [See skfuzzy for details on parameters and their detailed implications, which I am not explaining here. Given knowledge of Fuzzy Logic and Fuzzy Systems are assumed to be at considerable levels in this article]
similarity_document = ctrl.Antecedent(np.arange(0, 1.25, .1), ‘similarity’) sentiment_score = ctrl.Antecedent(np.arange(0, 1.25, .1), ‘sentiment_score’) nounCount = ctrl.Antecedent(np.arange(0, 110, 10), ‘nounCount’) verbCount = ctrl.Antecedent(np.arange(0, 110, 10), ‘verbCount’) adjCount = ctrl.Antecedent(np.arange(0, 110, 10), ‘adjCount’)
The following is the output variable defined with parameters as given below.
consequent
rank = ctrl.Consequent(np.arange(0, 24, 1), ‘rank’) ```
7.2. Define the Input and Output Linguistic variables in FIS
The following is brief description of how to define the Fuzzy Sets involved in the process.
``` similarity[‘low’] = fuzz.trimf(similarity.universe, [0, 0.3, 0.5]) similarity[‘average’] = fuzz.trimf(similarity.universe, [0.3, 0.7, 1]) similarity[‘high’] = # define as per requirements in your problem
sentiment_score[‘low’] = fuzz.trimf(sentiment_score.universe, [0, 0.3, 0.5]) sentiment_score[‘average’] = fuzz.trimf(sentiment_score.universe, [0.3, 0.7, 1]) sentiment_score[‘high’] = # define as per requirements in your problem
nounCount[‘low’] = fuzz.trimf(nounCount.universe, [0, 30, 50]) nounCount[‘average’] = fuzz.trimf(nounCount.universe, [30, 70, 100]) nounCount[‘high’] = # define as per requirements in your problem
verbCount[‘low’] = # define as per requirements in your problem verbCount[‘average’] = # define as per requirements in your problem verbCount[‘high’] = # define as per requirements in your problem
adjCount[‘low’] = # define as per requirements in your problem adjCount[‘average’] = # define as per requirements in your problem adjCount[‘high’] = # define as per requirements in your problem ```
Pictorial Representation of some Fuzzy sets defined for illustration (sentiment_score):
7.3 Output Membership Functions for Linguistic Variable Rank
``` rank[‘low’] = fuzz.trimf(rank.universe, [0, 0, 10]) rank[‘average’] = # define as per requirements in your problem rank[‘high’] = # define as per requirements in your problem
Sample Fuzzy Sets for “rank”
```
7.4 View the Fuzzy Sets
``` sentiment_score.view() nounCount.view() verbCount.view() adjCount.view()
similarity.view() rank.view() ```
8. FIS Rulebase-Sample
The following are some sample rules for FIS summarization toolkit. These are not exhaustive and are documented here to illustrate the procedure and to pave your understandings.
```
rule1 = ctrl.Rule(similarity[‘low’] | sentiment_score[‘low’], rank[‘low’]) rule2 = ctrl.Rule(sentiment_score[‘average’], rank[‘average’]) rule3 = ctrl.Rule(sentiment_score[‘average’] | similarity_title[‘average’], rank[‘average’]) rule4 = # define as per requirements and experts views rule5 = # define as per requirements and experts views rule6 = # define as per requirements and experts views rule7 = # define as per requirements and experts views rule8 = # define as per requirements and experts views rule9 = # define as per requirements and experts views rule10 = ctrl.Rule(similarity[‘high’] & nounCount[“high”] & sentiment_score[‘high’] & verbCount[“high”] , rank[‘high’])
Define FIS system now and perform simulations.
rankFIS = ctrl.ControlSystem([rule1, rule2, rule3, rule4, rule5, rule6, rule7, rule8, rule9, rule10]) rankFIS = ctrl.ControlSystemSimulation(rankFIS) ```
9. Computing Rank (Importance) of a Sentence using the sample FIS
Here for a particular a sentence whose importance or rank in respect to other members of text fragments is to be computed. The NLP properties defined in 2-6 above are computed and set in the FIS system as below:
``` rankFIS.input[‘similarity_title’] = getSimilarity(doc,sent) rankFIS.input[‘sentiment_score’] = getsentiment2( sent ) rankFIS.input[‘nounCount’] = getPOSCOUNT( sentNLP ,”NOUN”) rankFIS.input[‘verbCount’] = getPOSCOUNT( sentNLP ,”VERB”) rankFIS.input[‘adjCount’] = getPOSCOUNT( sentNLP ,”ADJ”)
The following steps illustrates computation of ranks based on the inputs just provided through computations above.
rankFIS.compute() print (“the answer is”) print (rankFIS.output[‘rank’])
view the Fuzzy Inference System
rank.view(sim=rankFIS) ``` The output of illustrative FIS for input taken in this article is as follows:
Rank = 7.3040, The FIS Rank defuzzification is as follows:
10. Conclusions
This was a brief article explaining the key steps in building FIS based system for summarization. Once ranks for all sentences are formed the main chunk identified in top p% of sentences can be highlighted in the application as the output of the tool. This is a novel approach in that sentiments have not been used in any work with FIS for summarization as of now. Also adjective count, chunking, adverb counts have not been used prior to this proposal in this article.
The aim of article is to lay emphasis that research can progress outside research publications too ! At least research proposals can ! Further this article explains how to use FIS in NLP application of text extraction.
By:Nidhika Link:https://nidhikayadav.org/2021/11/29/ai-sentiment-analysis-and-fuzzy-sets-based-summarization-technique-research-based-approach-explanation-with-python/
-
@ 4044176c:b3f3c23c
2023-09-08 12:39:13Can AI have the following abilities that human beings and animals have?
As per Stahl [1] Humans have access to “mental abilities, perceptions, intuition, emotions, and even spirituality”.
Let us consider our views and discuss a little more the things he has enumerated. Let’s discuss his enumeration. The following combines the power of modern computing and AI to answer the robotic processing powers.
-
mental abilities — Yes these can be included in machines. Though not all mental abilities can be put in machines, but the todays machines have good number of mental abilities, especially computational powers which beat humans even in games like chess.
-
perceptions — Through sensors, many perceptions can be replicated. Vision, listening, comprehending, and hearing, can be done with machines. Though nothing compares to what humans can.
-
intuition — This can be emulated, but it would be artificial, and can’t be compared to what humans can do. Intuition is very much linked to living beings, even animals at times behave based on intuition, for example, animals often get an intuition of a bad weather. It is difficult to introduce intuition in machines. Still, things like artificial intuition can be made available to give a mutation to the task a machine is doing.
-
emotions — Again these can be emulated in robots. Robots can have emotions based on sensory or verbal inputs. How? By adding this behavior in the programming of code. But can a Robot define the right emotions based on inputs?
-
spirituality — this seems difficult to replicate. Spirituality is very specific to humans, and this seems difficult for robots to learn. Let’s leave something for humans.
I add the following Stahl [1] list
-
physical ability — Machines can do most things humans can do physically, such as mechanical movements, robots are taking part in all kinds of racing, and games with humans these days. Even animal physical abilities are compared and replicated in likewise robots.
-
predictions — Yes, through sophisticated algorithms, AI can predict many things humans can or cannot, this goes from cancer to detecting new materials and objects in the universe.
-
simulation — AI can simulate many processes that humans can such as space walks by machines.
-
robustness — AI machines are robust and can work for several days and nights to reach a goal, while humans are subject to biological constraints and require rest to move forward in completing tasks.
-
battery dependence — AI machines are battery dependent while humans need food and biological resources.
-
cherishing — Humans can cherish things that machines can’t fully cherish.
More, to be continued…
References
[1] B. C. Stahl, Artificial Intelligence for a Better Future, SpringerBriefs in Research and Innovation Governance, https://doi.org/10.1007/978-3-030-69978-9_2
By:Nidhika Link:https://nidhikayadav.org/2023/08/12/abilities-of-ai-compared-to-human/
-
-
@ f296e355:c28d00bc
2023-09-08 12:35:33At the present time, the UK has a problem with some of the concrete it has used in the past. And, so, not all concrete is unsafe — and it is important that experts in the usage of concrete and building design carefully explain to the general public their decisions and the parameters they apply. It is not good to just to say, “All the buildings are unsafe … just rip them all down!”. Or, just because a building might fall down in 100 years, there is no need to say that it is unsafe at the current time. But, in cybersecurity, there are some who can carry this type of message to their customers — so let’s call them snake-oil salespeople in order to simplify things!
I recently heard from a company that was given the advice that 128-bit encryption could be easily cracked. It was such a generalised statement, and where, at the current time, we would have to gather all the energy — and many times more — on the planet to crack a single key.
And some people are already criticising public key encryption methods before quantum computers are even ready to go into production. I often get messages for the posting of information on RSA and ECC of “but asymmetric keys can be cracked by quantum computers”, and leave it there.
This is like saying that we should tear down every building at the current time, as we know they will fall down in the future. Like it or not, public key encryption is used in virtually every single Web connection, and without it, we could not trust anything online.
So, here’s my 100 (mostly true) casmagorical, genuinely healing, and elixirs of life for cybersecurity myth-busters:
- The security of your system is often as strong as the weakest link in the chain.
- Academic and professional certification normally provides surface knowledge; it is up to you to develop depth and expertise. To be an experts takes time and a serious commitment to learning. You don’t become an expert by passing an exam or taking a test.
- If your answer to “explain XYZ” is “XYX stands for ..”, then you need more depth in your knowledge.
- Even the best security companies get hacked.
- Humans are generally good at coding but generally not very good at secure coding, and are generally not very good at testing the security of the things they have created (it’s called ‘parental love’).
- Humans tire quickly when faced with complexity and often over-simplify things.
- Humans tend to avoid the things they don’t like doing and spend their time on the things they like.
- Just because an auditor signs something off doesn’t mean it is secure.
- A risk register is not a diary but a work in progress.
- Good companies know their risks and have incident response plans.
- If a human does know something, they will often try to cover the facts rather than admit it to.
- Most of our data and processing now exist in the public cloud.
- Wherever possible, reduce surface area, build layers of abstraction and reduce complexity.
- If you need to, log everything that might be of use. But remember that logs reveal sensitive data about your company.
- Log information for debugging and security analysis are often different things. Beware of mixing the two.
- Your logging should be layered and dynamic — ranging from full-on to full-off, and have levels in between.
- Extract out single switches are parameters, e.g. logging level.
- The method of creating a foothold is often different from the method used to sustain contact.
- The attack method (e.g. ransomware) on a system is typically different to the access method (e.g. phishing).
- Detectors for properly targeted spear phishing often do not work well.
- Trust methods and not humans.
- Be humble with your knowledge, and don’t overstretch yourself.
- Don’t generalise things.
- You can never know everything about everything in cybersecurity — no matter your education or professional certification — you will always have gaps.
- You have all the theoretical knowledge of cybersecurity in the world — it often counts for little if you don’t have the hands-on knowledge.
- You can have all the hands-on knowledge in the world, but it often does truly help to properly understand something without understanding the theory.
- For pedagogy, cybersecurity is more psychomotor than Bloom’s taxonomy.
- Assess the practice skills of graduates as much as their theoretical knowledge.
- Your main adversary is typically more knowledgeable than you.
- Humans are creative and sloppy and can over-simplify things.
- If someone has a big enough budget, they can crack most things (but typically not the methods, but the humans).
- Base judgments on peer-reviewed publications and not what Bob says.
- Don’t trust publications in paper-mill journals or places that lack rigous peer review.
- Don’t fully trust a paper that was submitted last Tuesday and has just been published by a journal.
- Your main cybersecurity risk is often the person sitting beside you and not some person on the other side of the planet.
- Usability will often trump security.
- Getting code into production will often trump security.
- Most systems are not designed with security in mind and see it as an add-on.
- Most developers have little idea about the mathematical principles of the methods they are using.
- Most developers were never trained on cryptography and have little idea about how public key encryption actually works.
- Many developers have never taken a security/networking module in their academic studies.
- Most of our databases are not encrypted.
- If a single key is used to encrypt all of our data, then all of our data is breached on a single discovery of the key.
- Cloud security is actually likely to be more secure than on-premise security, as it often guards against insiders and outsiders.
- Even network engineers struggle with the concept of VLANs — the rest of the world has little chance of understanding them.
- If you can, encrypt data at source, and don’t rely on network encryption.
- If you can, overlay your security tunnel.
- Key rotation is often healthy, but it possibly only needs to be changed on a yearly basis.
- Use systems which keep copies of secret keys and do not delete instantly but give a time period for deletion.
- Perform scans of our network looking for secret keys that are stored in places that they shouldn’t be.
- Teach your developers that test certificates are only for testing.
- When it boils down to it, cryptography often just uses simple EX-OR (add) and multiply operations that focus on a single bit at a time — and where carry-overs in calculations just don’t exist.
- All our normal arithmetic operations, such as a(b+c) = a.b+ac, can be conducted using (mod p), and where p is a prime number.
- Never take it for the fact that method X is unsafe just because Bob says it is. Always probe for the limits and what is meant by ‘unsafe’.
- Machines are good at spotting bugs in code but not good at understanding how code actually runs in real-life systems.
- Never, ever roll your own crypto. Security by obfuscation never works that well. Use key-based methods.
- SSL/TLS tunnels can be broken with proxies and Web Application Firewalls (WAFs).
- A software proxy on your computer is able to examine traffic before it is sent over SSL/TLS.
- Generally, encryption methods are mathematically secure; it is the implementation by human slaves that is often the problem.
- The SHA-1 hash (160 bits) is still generally fairly safe at the current time for collisions but is not recommended.
- With MD5, we have 170 billion, billion, billion, billion possible hash values. Finding a hash collision is highly probable in a relatively short period of time — and costs less than $10.
- With MD5, it is relatively inexpensive to find three data inputs which give the same hash value.
- Anything greater than a random 72-bit nonce or salt value is generally safe against brute force attacks where the salt value is unknown.
- The salt value is typically stored with a hashed password, so although rainbow tables cannot be used, we can use a dictionary attack on the hashed value (but taking common words and adding the salt).
- Salted hashed passwords generally take the salt value and add it to the start or the end of the password before it is hashed.
- A nonce, salt or IV in symmetric key encryption is generally added into the process (and not added to the input data). The salt must always be retained.
- Digital security is all about encryption — integrity, authorization, and trustworthiness are just as important.
- Symmetric key, asymmetric key and one-way hashing methods are different things and have different roles.
- It is almost impossible to ever get a collision with SHA-256 as there are 115,792 billion, billion, billion, billion, billion, billion, billion, billion different hash values.
- We generally lose around 1 bit of security every 12–18 months (due to Moore’s Law).
- Generally, anything below 72-bit security could be feasiblity cracked with brute force at a reasonable cost.
- If we follow Moore’s Law and lose one bit of security each year. It would take 56 years for 128-bit encryption to be crackable.
- ECC does encrypt data. It is typically used for key exchange and digital signatures.
- RSA can encrypt data, but it has significant overhead, so it is typically just used to encrypt small amounts of data, such as encryption keys.
- Generally, 512-bit RSA is unsafe, but 1K RSA is much more expensive to crack and at the limits of our current cracking.
- RSA can sign data but is not used in key exchange.
- The private key of a public key pair should always be protected by a strong password and/or multi-factor authentication.
- For the best security, the private key of a public key pair should only exist in an HSM (Hardware Security Module) or a secure enclave.
- Backups of private keys should always have strong security applied.
- We hardly ever use discrete logs anymore for key exchange (DH) or digital signatures (DSA).
- Adi Shamir’s secret share method is provable and secure. For an any 5-from-8 sharing system, you cannot reconstruct with four shares.
- If you want perfect security — use a one-time pad — but it’s not going to be easy to do that, as you will have to create a new pad for every cipher.
- 256-bit ECC generally gives 128-bit symmetric key-level security.
- A 2K modulus for RSA is generally safe at the current time for cracking.
- Randomly generated keys are almost impossible to crack at the current time.
- Https does not rely on one security mechanism — it was two: key exchange and digital signing. One sets up the security of the connection and the other defines the trustworthiness of the server.
- Digital certificates are not magical pixie dust that only the fairies can understand — they just contain a trusted public key of an entity.
- A trusted entity signs a digital certificate with its private key — a leak of that key will cause all of the certificates signed by it to be untrusted.
- The DES method of using a Fiestal cipher is generally still security — it is the key size that is the problem. Generally, the 56-bit key used can be fairly easily cracked with brute force, but the 112-bit key used in 3DES is generally secure (but not recommended) at the current time.
- ECDSA signatures are safe at the current time as long as a random nonce value is used for each signature and then never used again or revealed.
- The cost of cracking a cipher or hash is typically measured in the time taken by a cloud-based GPU cluster to perform and relates directly to the amount of energy consumed.
- Most hashing methods use a salt value for the hash, and so rainbow table attacks are mostly a thing of the past.
- 256-bit symmetric key encryption is generally safe from the rise of quantum computers.
- Wi-fi password cracking is extremely difficult with a secure password, as we capture the PBKDF2 on registration, and it is extremely costly to crack for a strong password.
- 256-bit hashing is generally safe from the rise of quantum computers.
- The security of a key cannot be generated with the number of bits that it has, as it all depends on the key entropy — and this relates to the number of possible keys that are likely to be generated.
- Passwords shouldn’t be stored with a generalised hashing method — a KDF (Key Derivation Function) should be used.
- MACs (Message Authentication Codes) require Bob and Alice to share the same secret. If Eve finds out the secret, she can send trusted messages.
- Hardware and software tokens use the signing of a message to prove the ownership of a secret key — this can be with public key signing or use a MAC method.
- The private key of a public key pair is used to create a digital signature.
And how do you stop becoming an oil-snake salesperson? Go learn, and develop a deeper understanding of how things actually work:
https://asecuritysite.com
By:Prof Bill Buchanan OBE Link:https://medium.com/asecuritysite-when-bob-met-alice/100-myth-busters-in-cybersecurity-16a501f43cc8
-
@ 0b963191:fc5e7ffd
2023-09-06 19:56:10Getting Started
Tools
The use of any tools is not required and may be helpful in getting a hands-on understanding of Nostr events, queries, and interacting with relays.
Here are the tools I will be using in this guide:
NodeJS - The code snippets in this guide will be using javascript. Most of this code will not be specific to Node and may be convenient to use if not writing our javascript for a web browser.
Google Chrome\Chromium - For web scripting, most modern web browsers should be fine. The requirement is that it supports websockets and CORS (Cross-Origin Resource Sharing : https://developer.mozilla.org/en-US/docs/Web/HTTP/CORS). The Chrome dev tools will be used for viewing code output.
Nostril - Nostril is a utility to create events from the command-line. This will help quickly create new events for testing and it can be downloaded here. I also have a utility written in NodeJS that can be used as a substitute here (Link to Github).
Websocat - Websocat allows a convenient CLI interface to sending data over websockets, which is what relays use for communication. In conjunction with Nostril, you can pipe events and requests to relays and get output.
Postman - Postman supports websockets and can be used as an alternative for sending events to relays.
Relays
This guide will be utilizing a relay that supports most of the NIP standards. The only requirement for this guide is that you use a relay you are allowed to write events to. You can also spin up your own relay to test and the setup of a relay is out of scope. You can find a list of relays here.
Note: As a matter of courtesy, if using someone else’s relay, is to be respectful of the amount of data sent to the relay. Relays provide an important function and house a lot of nostr events. Spamming, even for testing purposes may result in rate limiting or banning.
As different event kinds are explored the supported NIPs will be highlighted to ensure that a suitable one is used and behavior is as intended in the exercise.
Test keypair
It’s strongly recommended that any testing of events is done using a throwaway public\private keypair. This will ensure any npub you are using day-to-day doesn’t result in unintended behavior (i.e. spamming of messages to anyone following you) or private keys getting leaked.
Hello World
Exercise 1
Let’s start with an obligatory “Hello World” event to get things going. In the next section we will go over Nostr architecture and the anatomy of an event and loop back to this event.
Ingredients:
- Nostril
- Websocat
Steps:
Step 1: Build an event with a Nostril using the following commandline (You can autogenerate a new private key or use one you generated already)
./nostril --envelope --content "Hello World" --sec SECRET_KEY
Step 2: View the event in standard output
Step 3: Rerun the command and pipe it out to a relay
Step 4: Check for the output from the relay. If successful, copy and paste the ID of the event for later (we will come back to this)
Congrats you just generated and published an event in the most manual way possible!
Previous: Introduction | Next: TBD
-
@ 0b963191:fc5e7ffd
2023-09-06 19:54:36Introduction
Nostr is a new and exciting protocol that many people have taken to building and incorporating into applications like Social Media. There are countless Nostr guides oriented toward new users looking to dive into an alternative to Twitter, Instagram, Mastodon, etc.
This guide looks to take a different approach, focusing on the technical features of the Nostr protocol and get anyone up to speed on wanting to build applications and utilities with the protocol. It will also look to serve as a guide on resources and limitations of the protocol.
The focus will be less on the philosophical nature of a decentralized, censorship-resistant, communication layer or the common social media layer that the many have gravitated toward. Instead this will look at how the protocol works, the anatomy of events and requests, as well as things to consider when building and working with Nostr.
Audience assumptions
This guide is geared toward technical users who are already familiar with Nostr from a user standpoint. Exposure to the main clients such as Damus, Amethyst, and Primal will be assumed. Some scripting or programming knowledge will also be assumed.
For anyone who needs a review of what Nostr is and a user guide please see the below links:
- https://nostr.how/en/what-is-nostr
- https://uselessshit.co/resources/nostr/
- https://nostr.com/get-started
The NIP reference and development speed
Nostr moves fast, very fast! There are going to be some aspects of Nostr that will be deprecated in favor of more efficient and agreed upon standards.
As of now this guide will draw upon the NIP guidelines from September 5th, 2023 found here: https://github.com/nostr-protocol/nips/tree/9879e90ad987609fb12f348520b62146c6a01aa5
This guide will be subject to change and you can reference the change log.
Format
I will be breaking this guide out into different Long Form posts. These can be viewed like chapters across different aspects of Nostr. I will also be updating and adding different posts for different areas as I get to them and I encourage you to come back and check for updates.
Corrections
This guide as provided as-is and may contain some errors. Please reach out to me via nostr on wolfbearclaw@nostr.messagepush.io (npub: nostr:npub1pwtrrydty95q5ces0tkm2r7hkqfe9jwxhmmee5xwke6g4lz70l7sd8pf5t) if you spot any errors or incorrect information.
Table of contents
TBD
Next Sections
Next: Getting Started
-
@ f296e355:c28d00bc
2023-09-08 12:32:49The realm of cryptography, long regarded as a bastion of security for digital communications and data protection, is on the brink of a profound transformation. Quantum computing, with its unprecedented computational power and ability to solve complex problems, is poised to revolutionize cryptography by rendering current encryption methods vulnerable. As quantum computers unlock new avenues for codebreaking, the field of cryptography faces both challenges and opportunities in reshaping its foundations to ensure data security in the quantum age.
The Confluence of Quantum Computing and Cryptography
Cryptography, the art of secure communication, has evolved over centuries to safeguard sensitive information. Quantum computing, fueled by the principles of quantum mechanics, introduces qubits — a fundamental departure from classical bits — enabling computation in ways previously deemed impossible. This confluence sets the stage for a paradigm shift in the cryptographic landscape.
Advancements in Codebreaking
Quantum computing’s remarkable capabilities offer advancements in codebreaking that have far-reaching implications:
- Shor’s Algorithm: Shor’s algorithm, a quantum algorithm, threatens the security of RSA and ECC (Elliptic Curve Cryptography) encryption, which form the backbone of secure online communication and digital transactions.
- Grover’s Algorithm: Grover’s algorithm accelerates brute-force attacks, enabling quantum computers to quickly search through large databases for cryptographic keys.
- Quantum Key Distribution (QKD): Quantum key distribution leverages quantum properties to enable secure key exchange, paving the way for unbreakable encryption keys.
Challenges and Opportunities
As quantum computing advances codebreaking, the cryptographic community faces pivotal challenges:
- Post-Quantum Cryptography: The development of post-quantum cryptographic algorithms is imperative to secure data against quantum attacks. Collaborative efforts are underway to identify quantum-resistant encryption methods.
- Quantum Key Distribution Adoption: QKD’s potential to provide unbreakable encryption keys offers promise, but widespread adoption requires overcoming technological and implementation challenges.
- Quantum Supremacy: The demonstration of quantum supremacy, where quantum computers outperform classical computers in specific tasks, raises concerns about the potential impact on cryptography.
The Road to Quantum-Safe Cryptography
The future of cryptography hinges on quantum-safe solutions:
- Quantum-Resistant Algorithms: Researchers are exploring lattice-based, code-based, multivariate-quadratic-equations, and other quantum-resistant cryptographic algorithms to fortify data protection.
- Quantum Key Distribution: Implementing QKD and quantum key exchange protocols can provide a secure foundation for key distribution, safeguarding data even in the face of quantum attacks.
- Standardization and Transition: Developing quantum-safe cryptographic standards and facilitating a seamless transition from classical to quantum-safe cryptography are critical steps.
Collaboration and Innovation
The marriage of quantum computing and cryptography necessitates collaboration across disciplines:
- Cryptography Experts: Cryptographers play a pivotal role in developing quantum-resistant encryption methods, ensuring that data remains secure against both classical and quantum attacks.
- Quantum Scientists: Quantum physicists and engineers contribute to the development of quantum computers and cryptographic protocols that harness the power of quantum mechanics for secure communication.
- Policy Makers: Policy and regulatory frameworks must evolve to address the impact of quantum computing on data security and privacy.
A Secure Quantum Future
The coevolution of quantum computing and cryptography is shaping the future of data security:
- Enhanced Encryption: Quantum-safe cryptography will enable encryption methods that can withstand both classical and quantum attacks, ensuring secure data transmission and storage.
- Emerging Technologies: Quantum key distribution and quantum-safe algorithms open doors to innovations in secure communication, authentication, and privacy-preserving technologies.
- Resilient Infrastructure: A quantum-secure infrastructure will underpin the digital economy, bolstering financial transactions, communication networks, and sensitive data storage.
Guardians of the Quantum Frontier
As quantum computing accelerates codebreaking capabilities, the cryptography community stands as the vanguard of data security. The journey to quantum-safe cryptography is not merely about defending against quantum threats but also about fostering innovation and ensuring a resilient digital future. By uniting expertise, collaboration, and visionary thinking, cryptography is poised to adapt, evolve, and pioneer a new era of secure communication in the quantum age.
By:Grosu Alexandra Elena Link:https://medium.com/@alexandragrosu03/quantum-computing-and-cryptography-advancements-in-codebreaking-be760e9614e
-
@ 60d14b6a:c3fd422e
2023-09-06 18:50:37Many people choose Bitcoin for self-sovereignty or for tactical reasons, such as Bitcoin enabling them to easily send cross-border payments with low fees. However, it’s important to understand the best way to acquire, hold and send bitcoin in order to minimize the fees being paid. Bitcoin fees can vary widely depending on circumstances. This section applies to Bitcoin “on-chain” fees. Lightning fees are lower, and you will usually want to prefer to use Lightning when possible.
Each Bitcoin on-chain transaction uses multiple UTXOs. UTXOs are unspent transaction outputs. River Financial recently wrote a good introduction to UTXOs. You can think of UTXOs as monetary denominations used for transactions. For example, if you were charged a fee based on the number of currency bills you used, what denominations would you hold and use? It depends, right? We will try to help you answer that question. Here are a few example Bitcoin transactions (transaction sizes taken from this transaction size calculator):
| Address Type and UTXOs | Size (sats) | vbytes | Fee (sats/vbyte) | Total Fee | Percentage lost to fees | | --- | --- | --- | --- | --- | --- | | P2WPKH (1 in -> 2 out) | 100,000 | 140.5 | 15 | 2108 | 2.1% | | P2WPKH (1 in -> 2 out) | 1,000,000 | 140.5 | 15 | 2108 | 0.2% | | P2WPKH (1 in -> 2 out) | 100,000 | 140.5 | 150* | 21825 | 21.8% | | P2HS 2-of-3 multisig (2 in -> 2 out) | 1,000,000 | 668 | 15 | 10020 | 1% |
- fees like this, and higher, were seen during the “ordinal craze” of early 2023.
As you can see, the smaller the UTXO, the greater the percentage of bitcoin is consumed by fees. But, not all goods are 1M or 100K sats, so what happens to the “change” from a UTXO? Again, thinking of Bitcoin UTXOs as monetary denominations, let’s say you have two (2) 1,000,000-sat UTXOs. Furthermore, you’d like to buy something for 1,100,000 sats. You’ll need both UTXOs as inputs and you’ll get “change” of 900,000 sats as a new UTXO (less fees, of course). Imagine that you have only 100,000-sat UTXOs. You’d need eleven (11) of those UTXOs, including fees, to pay for a 1,000,000-sat purchase. The vbytes would be 3309, and it would cost you 49,635 sats at 15 sats/vbyte fee. With the Lightning Network, fees are much lower, and you do not create new UTXOs with the “change”. But, the Lightning Network may not accommodate your larger transactions at this time.
Can you consolidate smaller UTXOs into a large one? Yes. Using the desktop Sparrow wallet application (or other Bitcoin software with UTXO management), select multiple UTXOs to send bitcoin to yourself using a new Bitcoin address. A new UTXO is created using your smaller ones. Here is a demonstration. Look for a low-fee market (e.g. weekends) using Mempool or within the Sparrow app, and do the consolidation. As of the time of this writing, you may get fees as low as 6 sats/vbyte. The smallest UTXO that I personally recommend is 1M satoshis, 1/100th of a bitcoin, preferring to use the Lightning Network for smaller transactions. Beyond the scope of this article, you should also consider using Bitcoin address types that use less space on the Bitcoin blockchain. For example, native Segwit addresses (bc1) are smaller than legacy addresses.
(Note: the demonstration above also shows how to do a Partially Signed Bitcoin Transaction (PSBT) using Sparrow and the ColdCard. It is the safest way to use a Bitcoin wallet.)
-
@ d34e832d:383f78d0
2023-09-06 16:37:16Gondlir Notes on Internet Censorship resistant lighting economy
💡Lightning Up the Internet: Economic Activity Around Bitcoin's Lightning Network
The development of the Lightning Network has brought a new level of scalability to Bitcoin that is fueling greater economic activity. Here are some key aspects of this growing second layer solution:
💰Microtransactions Made Easy
- Lightning allows for near-instant, low-fee transactions making bitcoin useful forthings liketipping content creators, gamingmicropayments and recurring subscriptions.
🏧Payment Channels
- Bidirectional payment channels allow users/businesses to transact privately off-chain as needed and then settle on Bitcoin blockchain periodically.
⚡Nodes and Liquidity
- Anyone can run a Lightning node and provide liquidity by opening channels. Node operators earn fees paid in bitcoin as routing payments.
📈Increased Usability
- Wallet apps now support Lightning, removing friction for merchant adoption. Services can easily accept bitcoin and watch revenue stream in without block confirmation delays.
🚀Growing Adoption
- Major exchanges/wallets adding Lightning support. More merchants integrating everyday. Economic activity, channels and node counts all rising fast!
The future is looking bright as mainstream use cases emerge to take bitcoin to the next level through scalable off-chain solutions. Exciting times ahead! 🤩
-
@ aa8e5554:071fd9fc
2023-09-06 13:28:50How will Dora Factory's token split revolutionize the landscape of decentralized governance?
Dora Factory has successfully completed the highly anticipated token split, paving the way for the launch of Dora Vota, a dedicated app chain focused on voting and decentralized governance.
DORA Token Split Details
The split converts the total supply of DORA tokens from 10 million to 1 billion, with token holders receiving 100 new DORA tokens for each existing token held.
This strategic move allows users to access the cost-effective utilities and services offered by Dora Vota, ensuring broader accessibility and encouraging wider adoption.
Exchanges will soon resume trading the new DORA tokens, following the completion of the token swap.
The new DORA token smart contract address is: 0x70b790d0948a760e80bc3f892b142F7779b538B2.
-
@ 5462f0ab:cdaf7e87
2023-09-08 12:24:41An anthropological, rather than legal, challenge.
Since Donna Haraway’s pioneering ‘Cyborg Manifesto’, advanced technology has been considered a potential source of improving the human being and his relational dynamics with the surrounding environment. From prosthetic grafts to the glasses themselves, to which Luciano Floridi has dedicated admirable considerations regarding the function of objects in man’s perception of technology, technique is not a fact to be mythologized or demonized; it is much more simply a useful aid, within a humanized perimeter, to make human civilization evolve and make existence easier. This also applies, and perhaps even more so, to artificial intelligence, whose evolution is often cloaked in shadowy and dystopian mists. For this reason, the considerations of a Tech magnate like Reid Hoffman are always precious: because American pragmatism, linked to highly innovative dynamics, has recently tended to combine with a spirit of humanistic culture that aims not to technify the human being, and to make its condition in step with the times we are living in.
Hoffman has an impressive resume. Venture capitalist who has made practical sense of innovation, his words are precious for a European country which often pays the price to ossified and sclerotized logics behind oceans of regulations and bureaucracy. There are two aspects in particular underlined by Hoffman on which the European ruling class should question themselves: the amplifying value of high technology and the ability to regulate it without asphyxiating its disruptive impact. From the first perspective, artificial intelligence has the undoubted value of amplifying human intellectual and creative abilities: if used as an advanced assistant, an artificial intelligence system can truly and significantly enhance decision-making, processing and problem-solving capabilities complex.
To date, our public sphere uses rather basic artificial intelligence and, as the saga of administrative justice triggered by algorithmic administrative procedures starting way back in 2017 has taught us, with results that are not always optimal. Europe— says the venture capitalist — must know, understand and know how to use advanced and technologically intelligent devices. There is no need for invention, but rather for the organic acquisition of expertise. From this perspective, to win the challenge, training, high qualification, overcoming exclusively legal logics that tend to want to proceduralize and slow down everything become essential.
The public sphere must not only equip itself with new skills but with a new, algorithmic theoretical reason, freed from the sedimentations of the past. An anthropological challenge, rather than a legal one, one might say. The second point is much more delicate and complex, especially for a European country which seems to betray an almost ontological vocation to normative and regulatory superfetation. Hoffman states something apparently elementary but disruptive for European conceptual latitudes: artificial intelligence must be regulated, without any doubt, but in such a way as not to cancel the innovative drive that these technologies import.
It does not appear accidental that at a supra-national level, the regulation of artificial intelligence is passing through collaboration between different institutional actors, often belonging to civil society, and is also moving through ethical elements, such as Declarations or Charters. The key and indispensable point is to keep technological evolution centered on the human factor, never losing sight of the axiological connotation of technical development: which, in other words, must never be bent to the idea of replacing human with the intelligent inanimate. Complementarity, collaboration and amplification of human capabilities, not replacement.
By:Vertrose Link:https://vertrose.medium.com/from-artificial-intelligence-to-amplifying-intelligence-e5840930ba54
-
@ 5462f0ab:cdaf7e87
2023-09-08 12:23:17This story is brought to you by the tireless work of students, especially Felipe Fronchetti (shown above), who will be looking for a faculty job this cycle.
Programming two-armed robots IS parallel programming!
ABB’s YuMi robot, one of my favorite robots in the modern industrial world, has one blaring difference from most other robots. It has two arms! To the casual observer, this may seem unimportant, but to those in automation, this is a major step forward. All of those tasks that were so difficult to do with one (robot) hand, such as snapping parts together, are now possible. Possible, that is, to those that understand parallel programming. But we wanted ANYONE to be able to program YuMi. We wanted to make an easy programming technique… but what does parallel programming look like in novice programming languages?
MIT’s Scratch does not lend itself to parallel programming, so how can novices do it?
Well, it looks like this in Scratch (see above). Not pretty. When the program starts (upper left), it executes until it hits the “broadcast” command. Thus begins coordination between tasks, as the block that is waiting for “ready” (upper right) will execute. This notation tends to confuse novices… How do I know? I’ve taught many, both kids and adults to program, and this form of broadcast-based parallel programming has frustrated every one of them.
Industrial software struggles to enable parallel programming; RSOY uses a synchronization command (MoveSync s1)
It must be better / different in professional tools, right? Well, not really. It turns out if there isn’t some obvious research to build upon, time-pressed industrial developers are forced to do the best they can with current approaches. Above we see RSOY, the current easy-to-program solution for YuMi. As you can see, it coordinates between the left arm (left column) and the right arm (right column) using a synchronization command (MoveSync) and a synchronization variable (s1). This approach can quickly become confusing, as synchronization commands do NOT have to be on matching line numbers.
What types of coordination does this task require?
Let’s take a step back… what kinds of coordination do we need to work with two arms. Well, we need to be able to move the two arms together, like when picking up the middle piece (above), and we need to be able to wait for the other arm to finish, like when placing the first two pieces on the rod (above). With these two synchronization techniques, even though they seem limited, we can implement a wide variety of important tasks.
In our prototype, synchronized blocks are aligned across both canvases.
In this mindset, we created Duplo, a block-based programming environment that implemented these two coordination mechanisms. On line 3, above, you can see that the right arm is following the left arm, as these two commands are linked. On line 6 you can see the two programs waiting for each other before proceeding, with the linked “Wait for each other” command.
In our prototype, synchronized blocks move together across both canvases.
To reinforce the connection between these connected commands across the two different canvases (right and left), they move together, as shown above. Moving a wait command onto the left canvas also moves a matching wait command onto the right canvas, directly across. This spatial representation seems natural to most novice programmers; if commands move together and they are directly across from one another, they must execute together!
Trying it out in the real world, with a real robot…
We ran an experiment with a real robot comparing our prototype against an industrial programming environment
To test out our approach, we ran an experiment, comparing our block-based prototype to the current industrial approach (RSOY). An overview of the experiment is above.
We are especially proud that we got over 50 participants to complete an experiment that took more than two hours to complete. Not easy!
The tasks we asked users to complete were relatively simple pick and place tasks, with the twist that the solution required parallel programming. In the picture below, you see the final solution, after the program has been run and the robot has moved the parts. The first task is to pick up the blue part, which starts on the tray on the right, and put it on the rod. The second task is to do the same for the red part, which starts on the tray on the left. The final task is to pick up the green part, which starts on the tray in the front. This part requires two hands to pick up.
Below is a gif that shows the solution being executed, which was also shown in another gif above. As you can see, all of the parts are picked up and placed on the rod in the middle. The first two picks require the two different robot arms to work independently, but their moves must be coordinated, or they will run into each other. The third pick requires both arms to work together, as the part is too heavy for a single arm to lift without slipping. This task was relatively simple, but involved many of the coordination issues that users experience in robot programming.
Yumi programmed with Duplo
Results
Well, after asking 26 people to complete the tasks using our prototype block-based approach and another 26 using the industrial RSOY software, we began to see clear differences in their outcomes.
For instance, here are the results for participants using the block-based approach. As you can see, all participants were able to successfully complete the first three tasks, and all but four completed all tasks within the time limit.
Users of our prototype were pretty successful.
When looking at the same data for those that used the industrial RSOY software, we can see that they struggled more. Three participants could not complete even the first task and 14 failed to finish all of the tasks.
Users of the industrial software struggled.
We looked at the time that these users took to program their solutions, and plotted them below. As you can see, many block-based programmers (blue) completed the tasks well before the time limit, while many industrial RSOY programmers took the maximum time.
Completion times for our prototype (blue) and the industrial solution (yellow); dots signify participants who used the maximum time allowed
In the formal academic paper we include lots of qualitative data, some great quotes about the programmers’ experience with each prototype (see below), and we generally yammer on like academics are wont to do.
“It was very easy to use the blocks to ask the robot to make actions, link the blocks together, and break them apart. It was also easy to move the robot’s arms.” — Participant 3
“At first, I didn’t know which arm was the right or left. Also, I didn’t know how exactly to reteach a position, but after a while, I got it.” — Participant 5
If you’re interested in the gory details, read the paper! If you’re not, here’s the crib notes…
By representing robot commands as puzzle pieces, block-based programming contributed to the ability of end-users to insert, edit and debug code. The freedom to reorganize blocks using the puzzle metaphor, and the alignment of instructions on vertical columns, also allowed Duplo participants to complete more tasks in less time.
ABB’s Wizard Easy Programming is block-based programming for one-armed robots. Will we see Duplo for YuMi next? I wonder if, building on the success of its Wizard Easy Programming, which brought block-based programming to one-armed industrial robots, ABB will soon implement Duplo for the two-armed YuMi?
Hey ABB, if you need some help, I’m just an email away!
By:David C. Shepherd Link:https://medium.com/@dshepherd_4210/can-novices-program-two-armed-robots-edd3bf7a5b93
-
@ 5ada3677:7c21c9db
2023-09-06 12:50:36繼續昨日讀書,梁章鉅先生的晚年筆記。
寫吃酒,高粱燒酒,梁先生得高人指點,有個秘法。
吃燒酒,須每夜亥與子之間,也就是夜裡九點到凌晨一點那段時間,從朦朧睡夢中起,飲酒一杯,佐以薄餚,飲完仍復睡去,大有補益。梁先生是做大官的,講,他以仕宦勞碌之身,亥子之間未必都能就枕,而且半夜裡溫酒、備下酒菜,起居扶持,亦難得此恰當之人,似乎難以執行,雖然聽起來真的很補的樣子。
高人來了,指點梁先生,儂啊,製個小銀瓶,像鼻煙壺那種,口用螺絲轉蓋。銀瓶裡裝上暖酒,懷在汗衫肚兜之間,酒可通夜不涼。再製個小銀盒子,裝點薄餚下酒菜,置於枕側,夜裡隨起隨服,隨服隨寢,不煩人力,恬適自如,最為簡易。梁先生講,自從得了高人此法,他至今執行了二十年有餘,不僅自己受益良多,而且遍告知己好友,兄弟們一起養生。每當寒宵長夜,服此尤有風趣。
我對飲酒養生,不是那麼有興趣,這段筆記,讓我覺得好看的,是那個銀瓶和銀盒子,古人真能審美,事事講究,這個兩件套的袖珍銀器,聽起來非常地侘び寂び,米其林餐廳可以挪來做開胃酒;居家的話,可以用來吃點心,想來十分稱心。
這段筆記最好的中心思想,是老男人們自己開動腦筋解決困難,不給女人添麻煩。通常這類床前夜半服侍起居的重活累活,都依賴年輕苦難的姨奶奶。這樣體恤女人的老男人,是老男人裡的紳士,這樣的老男人才會福壽雙全。
圖是Francois- Emile Barraud 作品,來自網絡
昨天的兄弟篇在這裡
nostr:naddr1qqxnzd3exscrqdp3xumnzdfsqyt8wumn8ghj7un9d3shjtnwdaehgu3wvfskueqzypdd5dnhrpllqf9re6ne06y7rnytd8mqnxjq56u0v3xnkqnuy8yakqcyqqq823crtwr7w -
@ 5ada3677:7c21c9db
2023-09-06 12:44:59禮拜六讀夜書,清人梁章鉅晚年寫的筆記,《浪跡》。梁先生福建長樂人,一輩子做官,做到江蘇巡撫,而且兼理兩江總督,實在是很不小的官。因為做官,跑過很多地方,見識亦就的的不凡。這位老前輩很能寫,很健筆,人生最後四年,寫了《浪跡》三本書,都是雜談,這位退休老幹部,談的水平很穩很高,寫得極好看,無比適合禮拜六夜晚慢慢翻閱。
一篇《老饕》,開首就講自己,酒戶不大,而好為豪飲。酒量一般般,偏偏喜歡吃大酒。家本貧儉,而好講精饌。家裡沒多少銅鈿,卻喜歡講求吃得好吃得精。梁先生如此大官,敢直言自己家貧家儉,讀來彈眼落睛。烏七八糟的晚清官場,還有如此兩袖清風,不是靠廉政公署嚴刑峻法,是靠個人的道德力量吧,我猜。
然後筆鋒一宕,講古往今來,大概沒有幾個人,是不喜歡吃的。比如大前輩蘇東坡就寫過,我生涉世本為口。梁先生講,自己比較不喜歡殺生,半生做官,所到之處,比如蘇州的滄浪亭、桂林的五詠堂,都做放生會。晚年時候,不食腳魚水雞黃鱔白鱔,但是忍不住還是要食雞食豚的。這些都寫得老實,不虛巧,跟董橋先生不太一樣。老年人寫字,很怕雕琢扭捏,弄得讀者,讀法讀法,讀出一身雞肉痱子來。董橋先生寫得一筆好文章,如今年紀大了,越寫越花團錦簇,柔膩滴答,我有點不是那麼習慣。
有句古話,眉毫不如耳毫,耳毫不如老饕。眉上長壽眉、耳畔長耳毛,都是長壽的喜樂相貌,不過呢,壽眉耳毫,都不如健飲健啖,就是能吃能喝,人老了,能吃能喝健飲健啖,才是真正的長壽樣子。
緊接下來一篇《精饌》,講他的祖父,如何以食得好食得精,而獲天年長壽,梁祖父是到八十歲的時候,仍能健飲健飯,那是十八世紀的事情,相當厲害的。梁先生講,連孔夫子都講過,食不厭精,膾不厭細。朱子寫的註釋,食精則能養人,膾粗則能害人。梁祖父七十多歲時,每頓飯後,都要稍稍寫點毛筆字,說,飽食終日,無所用心,最不養生了,所以飯後寫寫字,助消化的。再往後,梁祖父眼力和腕力都越來越差,每頓飯後,必讓人扶掖著,慢慢走個一百步。最後,連腳力也弱了,飯後就與人下一局棋。梁祖父說的,飯餘必脾倦,縱不能勞力以疏通之,亦必須勞心以運動之。你看,長壽還是有很多原因可以找的。
梁先生接著寫,家雖貧,而烹飪必致精。梁家幾個兒子,紛紛精心侍奉老父親的飲食。聽聞親戚中有特別會煮飯做菜的外甥,還專門去請了來,為祖父下廚。
梁祖父每食,旁無陪侍,清酒不過三巡,嘉肴亦不過三簋。老太爺不喜歡隔頓菜,吃不完的菜餚,立刻分賜給孫子們。梁先生當年幼童,深得祖父寵愛,寫了八個字:最承慈愛,沾賜獨多。漂亮。
我家本寒素,而講求飲饌者惟祖父一人。親戚一百多人中,享高壽的,亦只有祖父一人。這句也有意思,想想如今上海人家裡,吃得最好、喝得最好的那個人,會是八旬祖父祖母嗎?以下省略200字。
再來一個轉彎,梁先生寫,世言"三世仕宦,方解著衣吃飯",三代做官,才剛剛懂得吃飯穿衣,這句話,出典到底在哪裡?據梁先生考證,這句話來自魏文帝。魏文帝講過:三世長者知被服,五世長者知飲食。
格麼,魏文帝是誰?魏文帝是曹操的兒子,這句鹹話,講了1800年了。
圖來自網絡
-
@ 5ada3677:7c21c9db
2023-09-06 12:37:55於飯局上遇見"生生米舖"的劉強先生,看到他在做的小品種大米,科爾沁的沙漠米,貴州高原上的油沙大粒香,黑龍江松嫩平原的稻花香,小圓滿的珍珠米,等等,非常可喜。
茶米油鹽醬醋柴,中國人於茶,講究得不得了,一擲千金萬金,完全不在話下。於米,卻很少講究。市面上好茶不知凡幾,喝都喝不過來的樣子。而覓款稱心好米,簡直跟大海撈針一樣辛苦,全靠親密友人私底下暗暗交流,比如我師兄陳躍先生給過我難得一見的天津小站米,滋味殊難忘懷。
劉先生表示同意,說,因為茶跟咖啡類似,有社交屬性,所以價錢也可以賣得貴、講究也就多。
想想劉先生說得有道理,請客人來家裡吃杯好茶,從古至今,都是體面事情,古人還有專門名詞叫做啜茗,雅得一唱三嘆。請客人來家裡吃飯,其實一向是吃菜吃酒,不能光禿禿端碗白米飯出來敬客人的。
說起來中國人是吃稻米的絕對大佬了,我們吃得到的好米,可惜可嘆,竟如此微末。
今年六月,曾經在東京的黑木,吃到過一款極美的米,於整套懷石接近尾聲的時刻,小廚師端了一口米飯給我,我捧著飯碗,左看右看看了久久,那個米,油亮到不可思議的地步,小廚師告訴我,是黑木特別訂製的一款米,米粒比一般的米,大了一倍半,這個米叫龍の瞳,一對夫婦種的,龍是丈夫,瞳是愛妻,當時聽得我心潮澎湃不已。
我們是有過很多很多魚米之鄉的,如今魚也不見了米也不見了,都成了高樓和高鐵,想想很心驚。
劉先生說,很少遇見像我這樣對米興趣濃厚的人。我想,這個話,應該倒過來講,很少遇見像劉先生這樣,肯做小品種米的年輕人。
支持有為青年。
午飯後,偷閒喝杯茶,看了化學家 Sam Afoullouss 的一個演講,講他如何在愛爾蘭深達3000米的海谷裡,那種原始的、沒有人跡到達過的海域裡,研究海洋生物。那麼辛苦的研究,目的是什麼呢?是為人類的未來,尋找良藥。
比如,一種海螺,行動遲緩到幾乎不動的海螺,它靠什麼捕食?Sam科學家說,一旦有魚從它面前經過,它會放出一種麻痹神經的液體,把魚弄暈,然後它就能飽餐一頓了。Sam說,科學家研究了這種麻痹神經的液體,發現它的鎮痛能力,是嗎啡的1000倍。
再比如,愛爾蘭的深海裡,有豐富的原始珊瑚群,不亞於大堡礁和亞馬遜。Sam說,他研究發現,珊瑚為了吃飯,寄生在水母身上,水母當然不高興,想摔掉珊瑚分它的羹,水母和珊瑚就打架,它們打架的水平很高,是生化戰,互相噴射毒素,很毒很毒的毒素,科學家把這種毒素找來,在實驗室中研究,是不是可以殺死癌症,是不是可以殺死下一個新冠,等等。
問題來了,如果這類毒素真的可以治癒肺癌肝癌乳腺癌,難道科學家要把水母和珊瑚都毀滅、來取毒嗎?Sam說,謝天謝地,老天自有安排,我們現在完全不需要破壞深海的生態,我們可以提取基因,在實驗室裡用基因培養毒素。
聽起來,人類以後真的有救了的樣子。Sam 做的,真的是大海撈針的工作。
奧本海默先生這個禮拜很紅,IMAX電影票貴到158元,依然一搶而空。我們突然那麼尊敬科學家、那麼尊敬歷史了,讓我有點悲欣交集。
圖是英國女畫家 Alison Watt的作品
-
@ 4657dfe8:47934b3e
2023-09-06 12:21:10The article below was written by one of our users and creators in the bitcoin sphere, Jacobo Fasja. It shares our vision on positive disruption of quality content, made by value 4 value monetization model. Which is possible thanks to many technologies that Alby uses and supports. We, like author, believe that removing friction from micropayments in the web, will incentivize better qualiy of the content and relationships between digital artists/creators and consumers. Thus, let us share with you guest article "Breaking the Chains: Liberating Content and Privacy with Micropayments".
Let us know in #Nostrcomments, if you agree with its thesis and share your ideas on how can we make the revolution happen...smoother :)
What's in it? (tl;dr):
🌟 Unlocking the Internet's Hidden Potential
In the early days of the internet, banner ads seemed promising, but they led to clickbait and quality decline. The internet's potential for superior content monetization was obscured.
🚫 The Clickbait Dilemma
Clickbait thrived as websites chased clicks at any cost, stifling quality content. Advertisers held sway over decisions, causing self-censorship and stifling diverse viewpoints.
🌐 A Digital Cargo Cult
The content industry clung to outdated models, but change is on the horizon. Bitcoin Lightning Network's micropayments promise privacy, creative freedom, and quality.
💰 The Rise of the Intermediary
Intermediaries extract staggering value from digital content. Parallels with financial institutions highlight inflated prices despite minimal value addition.
💥 Restoring Content's Reign
The current system yields diminishing returns for advertisers. It's time to restore content's rightful reign and explore better monetization models empowering creators and respecting user privacy. Join the conversation to reimagine online content monetization.
by Jacobo Fasja:
A brief intro:
In the early days of the internet, banner ads served as the primary method of monetization for online content. At the time, online payments, let alone micropayments, were neither safe nor functional. These ads, typically displayed by a third party known as an 'ad network', functioned as a form of micropayment for the content users consumed. This model essentially transformed the consumer or reader into the product by capturing their attention and selling it to the highest bidder.
This concept wasn't new. Traditional media, especially the television industry, had thrived for years using a similar model. However, the internet's approach involved a greater level of intrusion into consumer privacy. Despite this, the internet was hailed as a 'revolution' that should have offered a superior method of monetizing valuable content."
"Pay peanuts, get monkeys.”
However, as the internet evolved, it became clear that banner ads had created a number of negative incentives. One of the biggest problems was the rise of clickbait. Because advertisers were paying for each click on their banner ad, websites had an incentive to create sensational headlines and misleading content in order to drive more traffic and generate more ad revenue. Without having to care about if the end user found the content valuable after reading it, all it mattered was to grab his attention for a brief moment.
This focus on clicks also had a negative impact on editorial decision-making. In order to drive traffic and generate revenue, websites began prioritizing content that was more likely to attract clicks, regardless of its quality or relevance. This led to the proliferation of low-quality content and the suppression of more meaningful or nuanced discussions.
"The one who pays the piper, calls the tune.”
In addition to these problems, banner ads also created a significant influence of advertisers on editorial decision-making. Because websites were reliant on ad revenue to survive, they were often unwilling to publish content that might offend or alienate their advertisers or “brand safety standards”. This led to a significant amount of self-censorship and a lack of diverse viewpoints on the internet.
“That's how my mother did it”
A girl once asked her mom why she cuts off the ends of a roast before cooking. The mom replied, "That's how my mom did it." The girl asked her grandmother, who said, "That's how my mom did it." When the girl asked her great-grandmother, she laughed, "I did it because my pot was too small. I guess nobody thought to stop once we got a bigger pot.” Looks like we have the same “cargo cult” in the content / media industry.
“You won’t believe what happens next”
Leveraging the Bitcoin Lightning Network for direct micropayments can liberate content creators from ad-reliance and give users control over their support. This method offers five benefits:
Privacy: Users aren't exposed to targeted ads, preserving their privacy. Freedom: Creators can produce content without advertiser restrictions. No Middlemen: Direct payments mean no intermediary deductions or payment delays. Feedback: Creators learn what content is truly appreciated, beyond misleading clickbait metrics. Quality: This reward system discourages low-quality content, incentivizing valuable work and disincentivizing deceitful clickbait.
While there are certainly challenges to be addressed in massive adoption of micropayments using the Bitcoin Lightning Network (mostly a case of UX), it is clear that this technology has the potential to fix many of the problems that have plagued the online media industry.
“Behind every great fortune, there's a ~~crime~~ intermediary extracting more value than they're adding”
In a 'Value for Attention' (VFA) model, the intermediary often extracts the lion's share of value from both the creator and the consumer. They do this by levying a substantial fee (~30%), holding onto the money for an extended period, and collecting data from both parties, which they may then sell to others.
While there is undeniable value in the platform (intermediary) that brings both parties together, it should not be the chief beneficiary, especially when the exchange involves digital products from both sides. This situation requires no substantial logistics, and the marginal cost of distributing each piece of content or ad is virtually zero.
Consider how much value has been captured by intermediaries like Google, Facebook, and ad networks. This value could have improved content quality or fostered profitable business models for creators focusing on small, high-value niches. I estimate that around 50 billion USD was lost to intermediaries just in 2022, a year when banner ads generated a massive 155 billion USD.
The roast doesn’t need cutting anymore
It is hard not to compare this situation to how financial institutions have exploited customer savings through fees and many other strategies by positioning themselves as “necessary” intermediaries, they extract substantial profits while offering comparatively minimal value.
This analogy holds up as both industries are primarily information-based (money is nothing more than information), and with the advent of the internet and Bitcoin, the cost of transmitting information has trended towards zero. Yet, these monopolies have managed to keep the price inflated.
“If you don't believe it or don't get it, I don't have the time to try to convince you, sorry.”
Now, this is not just a one sided issue for creators, if you have any idea on how much money has been extracted from advertisers due to placing their ads programmatically in “relevant” content which was actually just made to precisely attract those ads without delivering actual value content, you’ll understand that this industry created a lose-lose “solution” in which the intermediary is the main winer and the advertiser has only been seeing diminishing quality engagement rates on their ads.
For those who still hold that 'content is king,' let us now restore its rightful reign.
Jacobo F
-
@ 0a821ca3:e0efcce3
2023-09-06 11:44:08[originally posted on Substack in December 2022]
Knowledge is like fire - when you spread it, it becomes stronger. When something has been invented it most often cannot be disinvented or uninvented - historians may know a few exceptions - innovations that were lost when societies disappeared.
The leading protocols for digital information exchange are TCP and UDP over IP. Since their inventions in 1974 and 1980, these protocols have become the basis for the internet. The internet protocols are maintained by the Internet Engineering Task Force (IETF), founded in 1986, the standards development organization (SDO) for the Internet - on the basis of the RFC process.
To participate in the IP world, one needs an IP address. The Internet Assigned Numbers Authority (IANA) allocates IP addresses. The IP, TCP and UDP protocols are a public infrastructure. Governments do not dictate the construction of the protocol - although they may regulate its use, for example internet neutrality - non-discrimination of IP packets by internet providers - is a typical element that has been debated in terms of regulation. That regulation applies to internet service providers.
The (only?) decentralised p2p currency protocol has been published as open source code in 2009. The protocol is public infrastructure for the digital transfer of value without trusted intermediaries. The p2p currency protocol is maintained by a decentralised group of developers who interact through the bitcoin-dev mailing list and contribute code to a GitHub repository on the basis of Bitcoin Improvement Proposals - BIPs.
Similar to requiring an IP address and an HTML page to be able to participate to the internet TCP/IP protocol, one needs the ability to sign transactions with the value equalling the value one looks to transfer. That implies that there is some digital asset that represents the value that is transferred.
In the ideal world, that asset can be easily converted on both sides of the value transfer - in the same way as a browser or printer can reproduce the information that was transferred over TCP/IP.
Beyond acting as “transfer value” - solely used for transferring value - the digital asset has also obtained value in itself, based on consensus of many users. Not everyone recognises the value of that digital asset, and that is fine.
The bitcoin protocol is indeed what it is - a protocol - public infrastructure for the digital transfer of value, like the TCP/IP protocol is public infrastructure for the digital transfer of information. Both protocols are public infrastructure at the service of humanity.
In that context, it is maybe time to change the narrative from “blockchain not bitcoin” to “the protocol not the asset”.
[addition September 6, 2023] Adding to the point on "bitcoin not blockchain" - blockchain is the worst part of the bitcoin protocol - and active efforts are being made to take blockchain out of the bitcoin protocol, as Maxim Orlovsky explained at the Baltic Honeybadger conference - video here.
-
@ 1f5ddbfd:b0df5755
2023-09-06 10:33:27This is an interesting case - highlightning Brexit consequences in legal assistance / extradition law in Europe
Court: OLG Karlsruhe 1st Criminal Senate / Decision date: March 10, 2023 / File number: 301 OAus 1/23
"1. The extradition of the person being pursued to the United Kingdom of Great Britain and Northern Ireland for the purpose of criminal prosecution on the basis of the Trade and Cooperation Agreement arrest warrant issued by Westminster District Court on September 21, 2022 is currently declared inadmissible."
"...of the Westminster District Court of September 21, 2022, from which it emerges that a national arrest warrant was issued against the person being pursued by the Westminster District Court of September 16, 2022 on the charge of conspiracy to supply a controlled Class A drug in two cases, which carries a maximum penalty of life imprisonment and four counts of conspiracy to conceal, convert, transfer or remove criminal property under Section 1(1) of the Criminal Law"
"...The Senate pointed out that the factual clarification with regard to the CPT report of July 7, 2021 cited by the legal advisor (see “Report to the United Kingdom Government on the periodic visit to the United Kingdom carried out by the European Committee for the Prevention of Torture and Inhuman or Degrading Treatment or Punishment (CPT) from 8 to 21 June 2021” from July 7th, 2022) in which overcrowding and sometimes inadequate general prison conditions in British prisons ..."
"In order to justify the factual clarification required - despite the improvements shown in the United Kingdom's response from May 2022 - the Senate points out that overcrowding in prisons in England and Wales continues (on November 25, 2022 the British Ministry of Justice [NOMS] issued a Overcrowding of 106.5% was found, i.e. 82,176 prisoners in 77,753 places, see World Prison Brief data ..."
"Only after providing the required guarantees and answering the questions set out below will the Senate be able to prepare its own risk forecast in order to assess the robustness of the assurances from the United Kingdom authorities ..."
"In this respect, the Karlsruhe Public Prosecutor's Office is asked
to request the following additional guarantees and notifications from the judicial authorities of the United Kingdom in accordance with Article 604 paragraphs a) and c) TCA:
(1) Guarantee that the spatial accommodation and the other design of the prison conditions specifically affecting the persecuted person in all prisons receiving the persecuted person comply with the European minimum throughout the entire period of his imprisonment..."
"In an email from IP Manchester received by the Karlsruhe Attorney General's Office on March 1st, 2023 before 11:00 a.m., answers from the judicial authorities of the United Kingdom to questions 1-3 of March 1st, 2023 were given in English, with the announcement that the German translation would be available by March 2nd, 2023 will be presented, and the answer to question 1 will be presented in the English original dated February 27, 2023 and in a German translation."
"With the documents submitted on March 1, 2023, “the judicial authorities of the United Kingdom of Great Britain and Northern Ireland only partially answered the Senate's questions from the resolution of January 19, 2023. On this basis, it cannot - yet - be assumed with sufficient certainty that the persecuted person will receive humane prison conditions if he is extradited to the United Kingdom ..."
"With reference to Article 615 ....., the judicial authorities of the United Kingdom must be informed immediately that if the order of January 19, 2023, the necessary additional information requested by March 10, 2023, 12:00 p.m. - which includes the guarantees requested under paragraphs 1 and 4 as well as the specific answer to the questions under paragraph 2 (i.e. the information about the name of the specific detention center ...) and all those listed under point 3 questions - the Senate will decide on the release of the persecuted person. ..."
"In an email dated March 10, 2023, 12:18 p.m., the Karlsruhe Public Prosecutor's Office announced that the Federal Criminal Police Office had just announced by telephone that no further statements had been received from the United Kingdom authorities."
decision:
„The extradition is currently proving to be inadmissible because the judicial authorities of the United Kingdom of Great Britain and Northern Ireland have based on the decisions of January 19, 2023 and March 1, 2023 - given by the Senate in accordance with Art. 604 - with detailed reasons for their relevance to the decision the case law of the ECtHR and the German Federal Constitutional Court - did not respond comprehensively to the guarantees and communications requested.
Since there are valid reasons to believe that there is a real threat to the protection of the fundamental rights of the person being persecuted if he were to be extradited to the United Kingdom of Great Britain and Northern Ireland without appropriate guarantees and information about the conditions of detention, the Senate could, in accordance with Article 604 c. ) TCA require additional guarantees for the treatment of the person being pursued after surrender before deciding on the execution of the TCA arrest warrant.
Furthermore, the extradition is currently inadmissible because the judicial authorities of the United Kingdom of Great Britain and Northern Ireland have not provided the guarantees requested in the Senate resolution of January 19, 2023 according to Art. 604 …. and the questions about the specific person being persecuted are to be expected after his extradition to the United Kingdom of Great Britain and Northern Ireland in a detention center that is likely to receive him have not been answered specifically… It cannot currently be assumed with sufficient certainty that the persecuted person would receive humane prison conditions there if he were extradited to the United Kingdom of Great Britain and Northern Ireland.”
The Albanian drug dealer apparently got lucky.
-
@ 1f5ddbfd:b0df5755
2023-09-06 10:19:10 -
@ b6d87cce:b8f9ca3f
2023-09-08 07:51:03Sustainability and decentralization are two trends that have been gaining momentum in recent years. They both reflect a desire for a simple, free, and decent life, where people can take control of their own resources, choices, and destiny. In this blog post, I will explore how these two trends are part of the same quest, by looking at the role of proof-of-work in the grassroots movements of regenerative farming and Bitcoin.
The Power of Proof-of-Work
Proof-of-work is a process where miners compete to solve complex mathematical puzzles using their computing power, and in return they receive newly minted bitcoins and transaction fees. Proof-of-work is the backbone of the Bitcoin network, as it secures its transactions and prevents double-spending. Proof-of-work is also a source of innovation and empowerment, as it incentivizes miners to use renewable energy sources, create synergies with regenerative farming, and access new opportunities for funding or income.
The Beauty of Regenerative Farming
Regenerative farming is a holistic approach to agriculture that aims to restore the health and vitality of the soil, water, and biodiversity. It goes beyond organic farming, by not only avoiding harmful chemicals and practices, but also actively enhancing the natural cycles and processes that sustain life on Earth. Regenerative farmers use techniques such as cover crops, composting, rotational grazing, agroforestry, and permaculture, to create resilient and productive ecosystems that can adapt to changing conditions and provide food, fiber, and fuel for humans and animals.
The Freedom of Bitcoin
Bitcoin is a decentralized digital currency that operates on a peer-to-peer network of computers, without the need for intermediaries or central authorities. It uses cryptography and proof-of-work to secure its transactions and prevent double-spending. Bitcoin is designed to be scarce, transparent, censorship-resistant, and borderless, making it a global alternative to fiat money and traditional payment systems.
The Synergy of Sustainability and Decentralization
At first glance, these two movements may seem unrelated or even contradictory. How can regenerative farming, which is based on natural and organic principles, be compatible with Bitcoin, which consumes large amounts of electricity and generates heat and waste? How can decentralization, which is based on individual autonomy and freedom, be compatible with sustainability, which requires collective action and responsibility?
The answer lies in the deeper values and visions that underlie these movements. Both regenerative farming and Bitcoin are driven by a common ethos of innovation, experimentation, and empowerment. They both challenge the status quo and offer solutions that are more aligned with the needs and aspirations of people and the planet. They both foster a culture of learning, sharing, and collaboration among diverse and distributed communities. They both aim to create systems that are more resilient, adaptable, and fair.
The Benefits of Proof-of-Work for Regenerative Farming and Bitcoin
One way to illustrate the connection between these movements is to look at how proof-of-work can benefit both regenerative farming and Bitcoin in practical ways. Here are some examples:
- By using renewable energy sources such as solar, wind, hydro, or geothermal power to mine bitcoins, miners can reduce their environmental impact and lower their operational costs. Some miners are even using excess heat from their mining rigs to warm greenhouses or aquaponics systems, creating a synergy between proof-of-work and regenerative farming.
- Regenerative farmers can use Bitcoin to exchange value among themselves or with their customers, without relying on intermediaries or middlemen. This can reduce transaction fees, increase efficiency, and enhance transparency. For example, farmers can use Bitcoin to buy seeds, tools, or equipment from other farmers or suppliers around the world. They can also use Bitcoin to sell their products directly to consumers or retailers, bypassing the conventional food system that often exploits or marginalizes them.
- Regenerative farmers can also use Bitcoin to access new sources of funding or income, such as carbon credits or crowdfunding. Carbon credits are certificates that represent the reduction of greenhouse gas emissions by sequestering carbon in the soil or biomass. Regenerative farmers can generate carbon credits by using practices that increase soil organic matter and carbon storage. They can then sell these credits to individuals or organizations that want to offset their carbon footprint or support climate action. Proof-of-work can facilitate this process by providing a secure and transparent platform for verifying and transferring carbon credits.
- Regenerative farmers can also use Bitcoin to raise funds for their projects or causes through crowdfunding platforms. Crowdfunding is a way of raising money from a large number of people who contribute small amounts in exchange for rewards or recognition. Regenerative farmers can use crowdfunding to finance their start-up costs, expansion plans, research initiatives, or social missions. They can also use proof-of-work to accept donations or payments from their supporters or customers.
The Challenges and Risks of Adopting These Innovations
These are just some of the ways that proof-of-work can complement both regenerative farming and Bitcoin and create positive feedback loops. Of course, there are also challenges and risks involved in adopting these innovations. Regenerative farming requires knowledge, skills, and resources that may not be readily available or accessible for many farmers. Bitcoin requires technical expertise, security measures, and regulatory compliance that may not be easy or convenient for many users. Both movements also face opposition or resistance from entrenched interests or institutions that may perceive them as threats or competitors.
However, these challenges are not insurmountable. They can be overcome by education, awareness, and collaboration. By learning from each other and working together, regenerative farmers and Bitcoin enthusiasts can create a more sustainable and decentralized world, where proof-of-work is not a waste of energy, but a way to secure the Bitcoin network and incentivize green energy sources.
Tags: regenerative farming, Bitcoin, proof-of-work, sustainability, decentralization
Hashtags: #RegenerativeFarming #Bitcoin #ProofOfWork #Sustainability #Decentralization
-
@ aa8de34f:a6ffe696
2023-09-06 10:06:40“There is no denying that the Bitcoin network consumes a substantial amount of energy, but this energy consumption is what makes the Bitcoin network so robust and secure.”
Conclusion
This report took a quantitative approach, comparing Bitcoin’s energy usage to that of other industries. In the interest of an honest conversation, we also discussed why the value of Bitcoin is not just quantitative.
Subjective views on the Bitcoin network’s importance vary, but Bitcoin’s properties do not. Anyone can use Bitcoin. Anyone can hold bitcoins for themselves. And Bitcoin transactions can provide probabilistically final settlement in an hour, 24 hours a day, 365 days per year.
These features can offer financial freedom to people around the world without the luxury of stable and accessible financial infrastructure. The network can benefit the energy sector by creating perfect use cases for intermittent and excess energy. And the network will only scale further if network adoption warrants it.
Energy utilization is not necessarily a bad thing. As Smil writes, energy is the only universal currency. Humans will continue to find new technologies that require more energy that challenge the status quo. Bitcoin is yet another example.
So, if we return one last time to the original question:
"Is the Bitcoin network’s electricity consumption an acceptable use of energy?"
Our answer is definitive: yes.
At the time of writing, the Bitcoin network consumes an estimated ~113.89 TWh/yr in total. To help contextualize this number, here are a few comparisons:
• The global annual energy supply is ~166,071 TWh/yr, 1,458.2x that of the Bitcoin network • The global annual electricity generation is ~26,730 TWh/yr, 234.7x that of the Bitcoin network • The amount of electricity lost in transmission and distribution each year is ~2,205 TWh/yr, 19.4x that of the Bitcoin network (based on World Bank and IEA estimates) • The energy footprint of “always-on” electrical devices in American households is ~1,375 TWh/yr, 12.1x that of the Bitcoin network
These comparisons highlight an important point: with basic assumptions, it is straightforward to estimate Bitcoin’s energy consumption in real-time.
Bitcoin’s energy usage has become an easy target for criticism. But this criticism raises the question: Bitcoin uses “a lot” of energy compared to what?Bitcoin is most often compared to the traditional banking system (for payments, savings, and settlement) and gold (as a non-sovereign store of value). But Bitcoin is a fundamentally novel technology that is not a precise substitute for any one legacy system.
Bitcoin is not solely a settlement layer, not solely a store of value, and not solely a medium of exchange. Unlike Bitcoin, the energy footprints of these industries are opaque.
To have an honest conversation about Bitcoin’s energy use, a comparison to the most analogous incumbents—the gold industry and the banking system—is appropriate. Unfortunately, gauging the energy use of these two industries is not as easy as auditing Bitcoin.
What follows is a good faith effort to estimate the energy footprint of both the gold industry and the banking system. Since public data on the energy usage of these sectors is scarce, the methodology created for this research has been open-sourced and can be found here—we encourage others to review.
Summary of the Banking System Energy Usage
Electricity data for the banking industry is scarce. With the publicly available information that we could find, we estimate the banking system uses 263.72 TWh of energy each year. Deriving a comprehensive number for this sector’s energy consumption would require individual banks to self-report.
Even in aggregate, a comparison between Bitcoin and the layers of the banking system is inherently flawed. The traditional financial stack is a complicated hierarchy of ounterparties and intermediate settlement. Credit card networks are great for exchanging fast payments and IOUs, but they depend on the banking system for settlement, and the banking system in turn depends on central banks for final settlement, which in turn depends on the dollar system as a whole.
In the interest of scope, we have excluded central banks, clearinghouses (like the DTCC), and other aspects of the traditional financial system from the above analysis. It is important to note that this audit is only a slice of the entire system - the overall energy usage of the banking system is unknown and externalities are excluded.
Defining the banking system’s utility by its energy usage is reductive - overlooking the benefits of transferring large quantities of money. While it may seem practical to compare the banking system and Bitcoin on the number of transactions they process, the two have different scaling properties. The banking system scales with transaction count, requiring additional infrastructure as it grows. Meanwhile, Bitcoin’s energy consumption scales not by transaction count, but by network economics.
Sources
On Bitcoin's Energy Consumption: A Quantitative Approach to a Subjective Question https://www.galaxy.com/insights/research/on-bitcoins-energy-consumption/ https://www.ourenergypolicy.org/resources/on-bitcoins-energy-consumption-a-quantitative-approach-to-a-subjective-question/
Financial Industry Electricity Balance https://github.com/GalaxyDigitalLLC/Financial-Industry-Electricity-Balance
Bitcoin network power demand updated every 24 hours https://ccaf.io/cbnsi/cbeci
-
@ 243b9e9c:e1248c71
2023-09-06 08:00:12this is a test post.
to see,
if multiple line breaks
are preserved.
-
@ a012dc82:6458a70d
2023-09-06 04:09:14Table Of Content
-
Hong Kong's Regulatory Environment
-
Mainland China's Crypto Crackdown
-
The Rise of Crypto Exchanges and Institutions
-
Growing Interest from Institutional Investors
-
Hong Kong's Role in the Global Crypto Market
-
Conclusion
-
FAQ
The world of cryptocurrencies has experienced numerous ups and downs, with Bitcoin being the poster child for massive price surges and sharp declines. Recently, Hong Kong has emerged as a potential catalyst for a new crypto bull run. In this article, we will explore the factors that could propel the cryptocurrency markets forward in the near future.
Hong Kong's Regulatory Environment
Hong Kong has long been known for its business-friendly environment and relatively lenient financial regulations. With the government actively working to create a clear and comprehensive regulatory framework for cryptocurrencies, market participants are optimistic about the potential growth of the crypto ecosystem in Hong Kong.
Mainland China's Crypto Crackdown
The Chinese government's ongoing crackdown on cryptocurrency activities has led to many businesses, investors, and miners looking for new opportunities elsewhere. Hong Kong has emerged as a popular destination for these players, as its proximity to mainland China and its established financial infrastructure offer a conducive environment for the crypto industry to thrive.
The Rise of Crypto Exchanges and Institutions
The influx of mainland Chinese businesses and investors has led to a surge in demand for digital asset trading platforms and services. This has resulted in the establishment of several cryptocurrency exchanges and institutions in Hong Kong, further bolstering the growth of the crypto market in the region.
Growing Interest from Institutional Investors
As the global economy continues to recover, institutional investors are actively seeking alternative asset classes to diversify their portfolios. Hong Kong's well-regulated crypto market has attracted significant interest from these investors, providing additional liquidity and stability to the market.
Hong Kong's Role in the Global Crypto Market Hong Kong's growing prominence in the global cryptocurrency market could serve as a catalyst for a new bull run. As more businesses, investors, and institutions flock to the city, the positive sentiment surrounding the crypto ecosystem is likely to spread, potentially spurring increased global adoption and demand for digital assets.
Conclusion
The combination of a favorable regulatory environment, an influx of market participants from mainland China, and growing interest from institutional investors has positioned Hong Kong as a key player in the global cryptocurrency market. While it is impossible to predict with certainty when or if a bull run will occur, the factors discussed in this article suggest that Hong Kong could play a pivotal role in pushing the crypto markets to new heights.
FAQ
Could Hong Kong potentially push the crypto market into a bull run? Yes, Hong Kong could play a pivotal role in pushing the crypto market into a bull run, thanks to its favorable regulatory environment, an influx of market participants from mainland China, and growing interest from institutional investors.
Why is Hong Kong's regulatory environment attractive for the crypto market? Hong Kong's regulatory environment is attractive for the crypto market because of its business-friendly nature and the government's ongoing efforts to create a clear and comprehensive regulatory framework for cryptocurrencies.
What makes Hong Kong an attractive destination for crypto miners? Hong Kong's proximity to mainland China, its established financial infrastructure, and relatively lenient regulations make it an attractive destination for crypto miners seeking new opportunities in the wake of China's crackdown on cryptocurrency activities.
Is it possible to predict when a bull run will occur in the crypto market? It is impossible to predict with certainty when or if a bull run will occur in the crypto market. However, factors such as Hong Kong's regulatory environment, the influx of market participants from mainland China, and growing interest from institutional investors suggest that the region could play a pivotal role in pushing the crypto markets to new heights.
That's all for today, see ya tomorrow
If you want more, be sure to follow us on:
NOSTR: croxroad@getalby.com
X: @croxroadnews
Instagram: @croxroadnews.co
Subscribe to CROX ROAD Bitcoin Only Daily Newsletter
https://www.croxroad.co/subscribe
DISCLAIMER: None of this is financial advice. This newsletter is strictly educational and is not investment advice or a solicitation to buy or sell any assets or to make any financial decisions. Please be careful and do your own research.
-
-
@ e6817453:b0ac3c39
2023-09-08 07:40:24Bringing DIDs and VCs to you using the most popular Web3 wallet — MetaMask!
Decentralized identity is becoming one of the hottest topics in Web3 space and one of the core components that will make our digital identities completely decentralized, self-sovereign, and private. More and more parts of our lives are moving to the digital sphere, and our identities and data privacy are becoming more apparent. We need a solution to manage our digital identities, whether the data is on-chain or off-chain. Here comes Masca to the rescue!
What is Masca?
Masca (previously named SSI Snap) is an extension for MetaMask (MetaMask Snap) that provides functionalities of (off-chain) decentralized identity management, specifically Decentralized Identifiers (DIDs) and Verifiable Credentials (VCs), directly to the MetaMask. Apart from being a wallet for decentralized identity (also called self-sovereign identity — SSI), it adds additional RPC methods and interfaces to the MetaMask, enabling dApp developers to add exciting new features based on DIDs and VCs quickly.
At the moment, Masca supports the following functionalities.
- generating different DID identifiers: did:ethr, did:key, did:pkh, and did:jwk
- two options for storing VCs: offline encrypted local storage (Snap state), and Ceramic Network
- RPC methods and interfaces for integrating DID and VC/VP functionalities easily into dApps, e.g., creating VC/VP and importing VC
- cryptographic keys are derived from the same seed phrase as used in the main MetaMask, enabling you to have the same DIDs and VCs on multiple devices
- wallet UI as the dApp, which enables you to test functionalities, see all of your data/VCs, and configure the Masca as it suites you, e.g., select the preferred DID methodYou can try the dApp here.
What are examples of the applications you can build?
Some of the examples of the applications that decentralized identity enables:
- new DAO governance models — voting mechanisms based on achievements skills represented as VCs (you can read more about that here)
- social networks and profiles — privacy-preserving social profiles, where you decide which off-chain identity data you want to have public and share with others
- universal dApps — dApps can easily support and work with on-chain and off-chain data while supporting single wallet
- transferable data — by storing data specific to a user as off-chain attestation in the user’s wallet, users can quickly transfer data between multiple platforms, e.g., storing a watchlist of favorite NFTs as self-issued VC and using it on all NFT marketplaces
- and didn’t think of, but maybe you will :)You can find more information and steps for the integration into your dApp on the docs.
What’s next?
Masca is positioned to become one of the first MetaMask Snaps featured on the official Snaps registry. By enhancing MetaMask with DIDs and VCs, we can move towards better user experience and adoption of decentralized identity in the Web3 space and dApps.
We are already working on several new features as we speak. New functionalities will make managing decentralized identities easier and enable new exciting use cases.
Follow us on Twitter to get the latest updates!
If you’re interested in using Masca or collaborating with us, feel free to message us or join our Discord.
Author : Blockchain Lab:UM Original article : https://medium.com/@blockchainlabum/introducing-masca-prev-ssi-snap-ba86023ec85
-
@ 5af07946:98fca8c4
2023-09-06 02:36:22```
Edit this configuration file to define what should be installed on your system. Help is available in the configuration.nix(5) man page and in the
NixOS manual (accessible by running ‘nixos-help’).
{ config, pkgs, ... }:
{ imports = [ # Include the results of the hardware scan. ./hardware-configuration.nix ];
System boot.
boot.loader.grub.enable = true; boot.loader.grub.version = 2; # Use the GRUB 2 boot loader.Good for old system. Newer ones use efi. Refer to nixos-help boot.loader.grub.device = "/dev/sda"; # hard drive you want to install Grub.
# Select internationalisation properties. i18n.defaultLocale = "en_US.UTF-8"; console = { font = "Lat2-Terminus22"; keyMap = "us"; };
Environment variables
environment.etc.current-nixos-config.source = ./.; environment.variables = { NIXOS_CONFIG = "/etc/nixos/configuration.nix"; NIXPKGS_ALLOW_UNFREE = "1"; EDITOR = "vim"; VISUAL = "vim"; BROWSER = "w3m"; RTV_BROWSER = "w3m"; RTV_EDITOR = "vim"; RTV_URLVIEWER = "urlview"; };
Time
time.timeZone = "America/Los_Angeles";
Network - Let networkmanager handle this shit.
networking = { hostName = "desko"; networkmanager.enable = true;
# Open ports in the firewall. # firewall.allowedTCPPorts = [ ... ]; # firewall.allowedUDPPorts = [ ... ]; # Or disable the firewall altogether. # firewall.enable = false;
};
System Services
services.openssh.enable = true; # ssh services.printing.enable = true; # Print - Do I need it ?
Enable sound.
sound.enable = true; sound.mediaKeys.enable = true; hardware.pulseaudio.enable = true;
Extra Outputs for all the packages. For example corutils offer info.
environment.extraOutputsToInstall = [ "man" "doc" "info" "devdoc" ];
Enable Flakes from unstable
nix.package = pkgs.nixUnstable; nix.extraOptions = '' experimental-features = nix-command flakes '';
Configurable modules. If enabled here, They dont need to be installed via pkgs.
NixOS automatically creates a config file in /etc for these programs.
Not sure as of now if this is the way to configure packages cuz I beleive in collabaratively built config by people who know these packages well enough and update the config regularly.
vim , tmux xmonad etc for example have nice config repos on github. Others can go here ?
programs = { bash.enableCompletion = true; bash.shellInit = '' set -o vi;
if command -v fzf-share >/dev/null; then source "$(fzf-share)/key-bindings.bash" source "$(fzf-share)/completion.bash" fi ''; less.enable = true; sway.enable = true; #Implements sway wm with sandard config and Wayland - a new replacement for X. If you somwhow dont like Wayland you can uncomment the X option below. sway.extraPackages = with pkgs; [ xwayland # To Support X applications dmenu # Program search in Swaybar wl-clipboard # Wayland clipboard swaylock # Screen lock in Wayland world swayidle # Lock sceen afer say 30 minutes of inacivity termite # Nice terminal. I bind it to Mod+enter in sawy config light # To control the brighness - works in tty as well as Wayland mako # Wayland Notifications waybar # Make sway look like a Desktop with configurable top bar grim # Wayland compatible screenshots xdg_utils # Open applicaions with "xdg_open" in wayland too. ]; waybar.enable= true; tmux = { enable = true; aggressiveResize = true; baseIndex = 1; keyMode = "vi"; customPaneNavigationAndResize = true; terminal = "screen-256color"; escapeTime = 1000; newSession = true; }; thefuck.enable = true;
};
documentation.man.enable = true; documentation.man.generateCaches = true; documentation.nixos.includeAllModules = true;
Define a user account. Don't forget to set a password with ‘passwd’.
users.users.amj = { isNormalUser = true; extraGroups = [ "root" "wheel" "networkmanager" "video" "sudo" ]; shell = pkgs.bash; };
automatically discover usb devices and mount them.
services.udisks2.enable = true; # Enable udisks2. services.devmon.enable = true; # Enable external device automounting. boot.kernelModules = [ "fuse" ]; # Need to figure this out.
X with only Xmonad - No Plasma, xfce or oher desktop , Uncomment these if you don' intend to use Sway (Wih Wayland.
In my experience, sway with wayland is around the same speed but feels much better.Highly recommend with proper config.
services.xserver = {
enable = true;
layout = "us";
autorun = false;
xkbOptions = "ctrl:nocaps";
displayManager.defaultSession = "none+xmonad";
windowManager.xmonad = {
enable = true;
enableContribAndExtras = true;
extraPackages = haskellPackages: [
haskellPackages.xmonad-contrib
haskellPackages.xmonad-extras
haskellPackages.xmonad
];
};
};
services.xserver.videoDrivers = [ "intel" ]; # To support my old dell display. took me 3 days of back breaking to figure out though it was there in the manual. Its hard to accept that you are old :-).
services.xserver.deviceSection = ''
Option "DRI" "2"
Option "TearFree" "true"
'';
Install any additional fonts that I require to be used with xmonad
fonts.fonts = with pkgs; [ opensans-ttf # Used in in my xmobar configuration ];
Instal apps - Primarily command line; few for graphical.
nixpkgs.config.allowUnfree = true; #For latest firefox. God knows why its unfree.
environment.systemPackages = with pkgs; [ # CLI Apps or rather apps without the need of X or Wayland. # System Tools / Utilities git lazygit neofetch fbterm man htop kbd wget xsel tree unzip ripgrep tldr vifm megacmd #is free as in free "beer". Other wise not free. scrot cozette pywal cava catimg bashburn nmap usbutils pciutils fzf # Write and Research w3m (import ./vim.nix) ddgr googler netsurf.browser newsboat dict sc-im # topydo #didnt build on i386 tmate # pandoc #didnt build on 32 bit linux # Communicate aerc dante scdoc signal-cli qrencode # dbus #not needed as this installs a client for dbus. # Media cmus beets sox lame youtube-viewer youtube-dl mplayer # mpv-unwrapped #didn't build on i386 vlc feh fim imagemagick # Publishing Platforms github-cli rtv # urlscan # Didnt build on i386 urlview urlwatch rainbowstream # Fun Stuff fortune figlet lolcat # GUI Apps or the apps that need Wayland (or X) firefox-bin qutebrowser audacity zeal zathura # signal-desktop # package is only for 64 bits tdesktop ];
nixpkgs.config.permittedInsecurePackages = [ "libsixel-1.8.6" ];
nix = { autoOptimiseStore = true; }; # This value determines the NixOS release with which your system is to be # compatible, in order to avoid breaking some software such as database # servers. You should change this only after NixOS release notes say you # should. system.stateVersion = "20.09"; # Did you read the comment? } ```
-
@ aae283cd:d36b2850
2023-09-08 06:57:44So when you gaze at planet earth from outer space
Does it wipe that stupid look off of your face?
I saw this aura over the battleground states
I lost the money, lost the keys
But I'm still handcuffed to the briefcase
And I never thought, not in a million years
That I'd meet so many lovers
Can I please have my money back?
My virtual reality mask is stuck on "Parliament Brawl"
Emergency battery pack just in time
For my weekly chat with God on video call
Breaking news, they take the truth and make it and fluid
The trainer's explanation was accepted by the steward
A montage of the latest ancient ruins
Soundtracked by a chorus of "you don't know what you're doing"
And I never thought, not in a million years
That I'd meet so many lovers
And all of my most muscular regrets explode
Behind my eyes like American sports
And I never thought, not in a million years
That I'd meet so many lovers -
@ 81870f53:29bef6a6
2023-09-08 05:25:47モルガン・スタンレーなどのウォール街の巨人は、独自のAIアシスタントを立ち上げた。将来、富裕層のお金管理は人工知能に任せられるようになるのだろうか?
$Morgan Stanley(MS.US)$に移動投資問題について話し合っている財務諮問室の主要顧客は、将来、異なる経験をするかもしれません。チャットボットが彼らの会話を聞くことになるのです。
モルガン・スタンレーは、1,000人のファイナンシャル・アドバイザーによる数カ月間のテストを経て、今月、生成型AIチャットボットを発売する予定だ。このロボットは銀行が OpenAI (ChatGPT の製造元) と協力して開発したものです。
銀行家はこの仮想アシスタントを使用して、何千もの文書を調べなくても調査レポートやフォームをすばやく見つけることができます。人工知能は、銀行の膨大な研究リソースとデータベースを最大限に活用して、これらのコンテンツ リソースをすべて統合し、より使いやすくアクセスしやすいプレゼンテーション形式に分析できます。
この銀行はテクノロジーも開発中です。顧客の許可があれば、AI を使用して会話のセッション概要を作成し、次のステップを推奨するフォローアップ メールの草案を作成し、銀行の販売データベースを更新し、フォローアップ ミーティングをスケジュールし、支援方法を学ぶことができます。アドバイザーは、税金、退職後の貯蓄、財産の観点から顧客の財務を管理します。計画の詳細はまだ発表されていない。
モルガン・スタンレーのウェルス・投資管理部門最高情報責任者、サル・クッキアラ(Sal Cucchiara)氏は次のように述べた。
「人工知能の影響はインターネットの出現に匹敵するほど重大なものになるでしょう。」
Kuchiara の使命は、シリコン バレーで潜在的なテクノロジー ベンダーを継続的に探すことです。同氏は2022年にOpenAI幹部らと面会したが、当時は急成長を遂げているアプリ「ChatGPT」は広く使われていなかった。
「彼らの技術は他をはるかに上回っていたので、私たちは彼らと協力する必要があるとすぐに理解しました。」と彼は言いました。
その後、モルガン・スタンレーの共同社長兼ウェルスマネジメント責任者のアンディ・サパースタイン氏(アンディ・サパースタイン氏)はカリフォルニアに飛び、OpenAIのCEOであるサム・アルトマン氏(サム・アルトマン氏)および同社技術者のボリス・パワー氏(ボリス・パワー氏)との協力について話し合った。昨年の夏、両者はモルガン・スタンレーがウェルスマネジメント商品の開発において優先権を持つことを規定する協定に署名した。
ロボットはファイナンシャルアドバイザーに洞察と管理サポートを提供するでしょうが、投資アドバイスは依然として人間の責任です。クチアラ氏はこう語った。
「アドバイザーは引き続き中心人物です。現在、従業員はこのテクノロジーを有用なツールとして認識しており、ロボットに取って代わられることを心配していません。」
ウォール街の巨人がAI競争を開始 モルガン・スタンレーの第2・四半期の純収益は16%増で過去最高を記録し、新規顧客資産は900億ドル増加した。AIへの取り組みは、モルガン・スタンレーのウェルスセクターを前進させる戦略の一環である。
モルガン・スタンレーのジェームズ・ゴーマン最高経営責任者(CEO)は、ウェルスビジネスにさらなる資本を注入するための一連の大型取引を主導した。同氏の目標は、資産管理資産を10兆ドルにすることだ。
人工知能分野におけるモルガン・スタンレーの取り組みは単独ではありません。銀行はすでに人工知能を利用して数字の計算、不正行為の検出、顧客取引の分析を行っていますが、ウォール街の大手企業はテキスト、画像、その他のデータを生成できる、より高度な生成人工知能を開発しています。
$JPMorgan(JPM.US)$今年 6 月、テレサ・ハイツェンレター (Teresa Heitsenrether) は、アメリカ最大の銀行の人工知能導入を率いる最高データ分析責任者に任命されました。2018年のサービス開始以来、ライバルのバンク・オブ・アメリカの仮想アシスタント、エリカは10億回以上顧客と対話してきた。
また、$Moody's(MCO.US)$ Nick Reed (ニック・リード) 最高製品責任者は、同社が OpenAI および$Microsoft(MSFT.US)$ Collaborate と提携して、ユーザーが使用できる研究アシスタントを開発していると述べました。顧客。
コンサルタント会社$Accenture(ACN.US)$ のグローバル銀行部門責任者、マイケル・アボット氏は、大手銀行が人工知能の導入で先頭に立っているが、資産運用会社、トレーダー、保険会社も積極的に追随していると述べた。
アボット氏は「AI主導の顧客サービスが大手銀行に適用され始めている」と述べた。彼は、人工知能の使用を希望する銀行と何百件もの事例研究に取り組んでいます。
この記事がお役に立てば幸いです。
もしそうなら、チップをおくるどうぞ
https://getalby.com/p/bitcap
日本のホスティングサービス Linux、Windowsクラウドホスティング https://jpstream.net
-
@ 3cea4806:10fe3f40
2023-09-05 20:50:24Most clients, if not all, on Nostr have a list of accounts to follow during their onboarding process, however, those they showcase fall under the categories of either Bitcoin or Nostr. I want to make a list of individuals from different interest categories so that others can check out, as well as help clients update their recommended list.
This list is obviously biased as I'm writing it, however, please help me grow this list by mentioning accounts in the comments, mentioning what that account is about or talks about (even if the interest category isn't mentioned here, I'd add new ones), and I'd update this list every now and then.
Hit me up if there are any mistakes as well.
Food
Sports
Technology
Video Games
- Stitch (Gaming news & tests)
Vtubers
- Freakoverse (English)
- Amane Natsuko (Japanese)
Anime
- Makano Michi (into anime and ai generated wolf women)
Music
Art
Bitcoin
- Jack (Advocate, advisor, and investor)
- Odell (Freedom tech influencer, content creator, investor)
- Gigi (Developer)
- Jack mallers (Developer)
Nostr
- Will (Developer)
- Zack (Developer)
- Karnage (Designer)
- Water (Developer)
- fiatjaf (Developer)
- Ryan (Developer)
- PABLOF7z (Developer)
- Derek Ross (Developer)
- Miljan (Developer)
- verbiricha (Developer)
Cryptocurrency
Finance
- Lyn Alden (Investor)
Nature
Space
Movies
Series (TV)
Politics
- Edward Snowden (Exposes governments?)
Realestate
Memes
- placeholder (Bitcoin memes)
- placeholder (Gaming memes)
- placeholder (Anime memes)
- placeholder (Life memes)
- placeholder (Political memes)
- placeholder (Dating memes)
-
@ 854b4814:801641a6
2023-09-08 05:02:26Overnight FlixBus from Warsaw went smoothly with arrival to Kyiv just before sunrise. Not a fancy bus line but efficient and professional. Mostly full. Plenty of English-speaking passengers to help translate bus announcements. About one and a half hours to pass through the Polish and Ukrainian sides of the border late last night. Commercial trucks were backed up 10 miles from Chelm to crossing but busses and passenger vehicles moved through faster. Thirty-minute break at modern rest area supermarket right after clearing the Ukrainian side. Most of the overnight through rural darkness, some of it on roads in bad condition but most on smooth modern highways that allowed for a bit of sleep. No noticeable sign of the war all night except that the roads were so eerily quiet. Flixbus stops right at the city's main station that is directly next to the Pasazhyrskyi central railway station. A building in the parking lot was in pieces but couldn't tell if it was a demolition project, leftover debris from an earlier explosion, or both. Metal detectors and x-ray machines at station entrance. A soldier put a used anti-tank missile tube on the conveyor, drawing some laughs. Purchased KyivStar SIM card for $5 from company store at second level of station near the main entrance. Put my large backpack in a big set of new lockers near main entrance. Minimum charge was $2 for 24 hours, with the option to store for multiple days. Lockers were mostly full. Having coffee right now at small cafe by the lockers, hoping for an early check-in to my nearby hotel reservation at a well-rated accomodation called "The Apartments". Cost for private single room there was $17/night. The city so far feels like business as usual except for the presence of hundreds of uniformed soldiers transiting the station. Lots of security personel present but they are just standing around passively, not really interacting with passengers.
-
@ aa8de34f:a6ffe696
2023-09-05 20:23:45“There is no denying that the Bitcoin network consumes a substantial amount of energy, but this energy consumption is what makes the Bitcoin network so robust and secure.”
Conclusion
This report took a quantitative approach, comparing Bitcoin’s energy usage to that of other industries. In the interest of an honest conversation, we also discussed why the value of Bitcoin is not just quantitative.
Subjective views on the Bitcoin network’s importance vary, but Bitcoin’s properties do not. Anyone can use Bitcoin. Anyone can hold bitcoins for themselves. And Bitcoin transactions can provide probabilistically final settlement in an hour, 24 hours a day, 365 days per year.
These features can offer financial freedom to people around the world without the luxury of stable and accessible financial infrastructure. The network can benefit the energy sector by creating perfect use cases for intermittent and excess energy. And the network will only scale further if network adoption warrants it.
Energy utilization is not necessarily a bad thing. As Smil writes, energy is the only universal currency. Humans will continue to find new technologies that require more energy that challenge the status quo. Bitcoin is yet another example.
So, if we return one last time to the original question:
"Is the Bitcoin network’s electricity consumption an acceptable use of energy?"
Our answer is definitive: yes.
At the time of writing, the Bitcoin network consumes an estimated ~113.89 TWh/yr in total. To help contextualize this number, here are a few comparisons:
• The global annual energy supply is ~166,071 TWh/yr, 1,458.2x that of the Bitcoin network • The global annual electricity generation is ~26,730 TWh/yr, 234.7x that of the Bitcoin network • The amount of electricity lost in transmission and distribution each year is ~2,205 TWh/yr, 19.4x that of the Bitcoin network (based on World Bank and IEA estimates) • The energy footprint of “always-on” electrical devices in American households is ~1,375 TWh/yr, 12.1x that of the Bitcoin network
These comparisons highlight an important point: with basic assumptions, it is straightforward to estimate Bitcoin’s energy consumption in real-time.
Bitcoin’s energy usage has become an easy target for criticism. But this criticism raises the question: Bitcoin uses “a lot” of energy compared to what?Bitcoin is most often compared to the traditional banking system (for payments, savings, and settlement) and gold (as a non-sovereign store of value). But Bitcoin is a fundamentally novel technology that is not a precise substitute for any one legacy system.
Bitcoin is not solely a settlement layer, not solely a store of value, and not solely a medium of exchange. Unlike Bitcoin, the energy footprints of these industries are opaque.
To have an honest conversation about Bitcoin’s energy use, a comparison to the most analogous incumbents—the gold industry and the banking system—is appropriate. Unfortunately, gauging the energy use of these two industries is not as easy as auditing Bitcoin.
What follows is a good faith effort to estimate the energy footprint of both the gold industry and the banking system. Since public data on the energy usage of these sectors is scarce, the methodology created for this research has been open-sourced and can be found here—we encourage others to review.
Summary of the Banking System Energy Usage
Electricity data for the banking industry is scarce. With the publicly available information that we could find, we estimate the banking system uses 263.72 TWh of energy each year. Deriving a comprehensive number for this sector’s energy consumption would require individual banks to self-report.
Even in aggregate, a comparison between Bitcoin and the layers of the banking system is inherently flawed. The traditional financial stack is a complicated hierarchy of ounterparties and intermediate settlement. Credit card networks are great for exchanging fast payments and IOUs, but they depend on the banking system for settlement, and the banking system in turn depends on central banks for final settlement, which in turn depends on the dollar system as a whole.
In the interest of scope, we have excluded central banks, clearinghouses (like the DTCC), and other aspects of the traditional financial system from the above analysis. It is important to note that this audit is only a slice of the entire system - the overall energy usage of the banking system is unknown and externalities are excluded.
Defining the banking system’s utility by its energy usage is reductive - overlooking the benefits of transferring large quantities of money. While it may seem practical to compare the banking system and Bitcoin on the number of transactions they process, the two have different scaling properties. The banking system scales with transaction count, requiring additional infrastructure as it grows. Meanwhile, Bitcoin’s energy consumption scales not by transaction count, but by network economics.
Sources
On Bitcoin's Energy Consumption: A Quantitative Approach to a Subjective Question https://www.galaxy.com/insights/research/on-bitcoins-energy-consumption/ https://www.ourenergypolicy.org/resources/on-bitcoins-energy-consumption-a-quantitative-approach-to-a-subjective-question/
Financial Industry Electricity Balance
https://github.com/GalaxyDigitalLLC/Financial-Industry-Electricity-Balance
Bitcoin network power demand updated every 24 hours
https://ccaf.io/cbnsi/cbeci
-
@ 23202132:eab3af30
2023-09-05 19:04:58Gunkanjima ou ilha Hashima é uma local interessante que parece um barco quando olhado de cima. A cidade apareceu no filme 007 operação skyfall. Basicamente é uma ilha com prédios e várias moradias agora abandonadas. Um senário sombrio que produz uma sensação de vazio, assim relatam aqueles que já visitaram a ilha. A ilha tinha uma população de 5.259 moradores em 1959 sendo propriedade da empresa mineradora Mitsubishi Mining Company.
Todos os moradores eram funcionários envolvidos com a mineração de carvão que ocorria nos túneis subterrâneos que iam até o fundo do mar. A produção atingia uma média de 400 mil toneladas de carvão por ano. Com o crescimento do petróleo em 1974 o negócio de mineração de carvão perdeu força e a ilha foi abandonada intacta. As construções e muitos pertences simplesmente foram deixados ali.
Desde 1974 a ilha está largada ao tempo e sem manutenção pouco a pouco os prédios vão se tornando ruínas. É possível passear pela ilha através do Google Maps em: https://maps.google.com.br/maps?f=q&source=s_q&hl=pt-BR&geocode=&q=Hashima+Island&sll=-14.179186,-50.449219&sspn=108.096722,228.339844&ie=UTF8&t=k&ll=32.627313,129.739738&spn=0.006777,0.013937&z=17 e acessar uma galeria de fotos sobre a cidade em https://photos.app.goo.gl/7LY38SnvnQvARAFA6
-
@ 28246aee:62b108ad
2023-09-08 03:28:26This post was originally published on https://tftc.io by Marty Bent.
Academic Keynesian economists believe you can destroy demand for goods without destroying supply of goods. In reality, attempting to destroy demand for things people need to survive will more rapidly destroy the supply of said things than demand. https://t.co/lDcSonNeXb
— Parker Lewis (@parkeralewis) September 7, 2023
via Zerohedge
The Federal Reserve began its aggressive rate hike campaign in March of 2022. The explicit goal of this campaign is "demand destruction". The Fed is hoping to destroy demand by making the ability of companies to finance their operations so expensive that they are forced to cut their headcounts, which means there is an increased number of people who aren't making money that they can then go out and spend throughout the economy. With more people with less money to spend on goods and services, producers will readjust prices lower to move more inventory. At least, that is the theory behind demand destruction.
In practice, as our friend Parker Lewis points out, the demand destruction theory is structurally flawed because it fails to factor in the effect rapidly rising interest rates has on the supply side of things. And if we use the market for crude oil as a benchmark, it seems like the Fed's policy is backfiring. After a sharp demand decline in the wake of the COVID economic lockdowns, oil demand is back on the upwards trajectory that it was tracking before the lockdowns at a time when supplies are falling precipitously. By raising interest rates, the Fed has made it more expensive to drill new oil and gas wells. Making it much harder to bring more supply to market. For more supply to come to market the price of crude oil has to rise to a point that makes the economics work for producers to drill more wells. Producers need to be confident that they can move enough supply at a higher price to pay off the debt they took out to drill the wells and make some profit on top of that.
To be fair to the Fed, they haven't gotten any help from the Biden administration or OPEC+ on the supply side of things. Draining the Strategic Petroleum Reserve and OPEC+ extending production cuts longer than expected has helped to deplete supplies faster than anyone would have expected a couple of years ago. But I do think it's safe to say that higher interest rates have had a material effect on domestic supplies.
The supply side problems only get worse when you begin to consider the culling of the workforce that higher interest rates have induced. With less workers able to produce the goods and services that companies offer to their customers it becomes harder to produce those goods and services effectively. This leads to less supply.
The predicament the Fed finds itself in is that they expected demand to be disrupted much faster than the supply of goods and services. But unfortunately for them, even if people don't have jobs they still have to eat and fill their cars up with gas. And when you consider the US consumer's comfortability with credit, it is easy to see how demand can remain relatively elevated despite mass layoffs. This problem is made worse by the fact that Americans paid down a lot of their credit card debt en masse during lockdowns. They have some room to run their cards up despite the high interest rate environment. And even if they don't, they will plow themselves further into debt to ensure that they can eat.
The result of all of this is an economy filled with debt laden unemployed individuals who are going into the market to purchase a dwindling supply of goods, which pushes up the prices of those goods. The absolute worst outcome for the Fed and the current administration.
This is your life on central planning.
Final thought...
If not you, then who?
You have your place to buy Bitcoin, but have you tried River? It’s where all the Bitcoiners are now going. See why at River.com/TFTC
Sleep soundly at night knowing your bitcoin are secured by multisig.