-
@ 8fb140b4:f948000c
2023-08-22 12:14:34As the title states, scratch behind my ear and you get it. 🐶🐾🫡
-
@ 8fb140b4:f948000c
2023-07-30 00:35:01Test Bounty Note
-
@ 8fb140b4:f948000c
2023-07-22 09:39:48Intro
This short tutorial will help you set up your own Nostr Wallet Connect (NWC) on your own LND Node that is not using Umbrel. If you are a user of Umbrel, you should use their version of NWC.
Requirements
You need to have a working installation of LND with established channels and connectivity to the internet. NWC in itself is fairly light and will not consume a lot of resources. You will also want to ensure that you have a working installation of Docker, since we will use a docker image to run NWC.
- Working installation of LND (and all of its required components)
- Docker (with Docker compose)
Installation
For the purpose of this tutorial, we will assume that you have your lnd/bitcoind running under user bitcoin with home directory /home/bitcoin. We will also assume that you already have a running installation of Docker (or docker.io).
Prepare and verify
git version - we will need git to get the latest version of NWC. docker version - should execute successfully and show the currently installed version of Docker. docker compose version - same as before, but the version will be different. ss -tupln | grep 10009- should produce the following output: tcp LISTEN 0 4096 0.0.0.0:10009 0.0.0.0: tcp LISTEN 0 4096 [::]:10009 [::]:**
For things to work correctly, your Docker should be version 20.10.0 or later. If you have an older version, consider installing a new one using instructions here: https://docs.docker.com/engine/install/
Create folders & download NWC
In the home directory of your LND/bitcoind user, create a new folder, e.g., "nwc" mkdir /home/bitcoin/nwc. Change to that directory cd /home/bitcoin/nwc and clone the NWC repository: git clone https://github.com/getAlby/nostr-wallet-connect.git
Creating the Docker image
In this step, we will create a Docker image that you will use to run NWC.
- Change directory to
nostr-wallet-connect
:cd nostr-wallet-connect
- Run command to build Docker image:
docker build -t nwc:$(date +'%Y%m%d%H%M') -t nwc:latest .
(there is a dot at the end) - The last line of the output (after a few minutes) should look like
=> => naming to docker.io/library/nwc:latest
nwc:latest
is the name of the Docker image with a tag which you should note for use later.
Creating docker-compose.yml and necessary data directories
- Let's create a directory that will hold your non-volatile data (DB):
mkdir data
- In
docker-compose.yml
file, there are fields that you want to replace (<> comments) and port “4321” that you want to make sure is open (check withss -tupln | grep 4321
which should return nothing). - Create
docker-compose.yml
file with the following content, and make sure to update fields that have <> comment:
version: "3.8" services: nwc: image: nwc:latest volumes: - ./data:/data - ~/.lnd:/lnd:ro ports: - "4321:8080" extra_hosts: - "localhost:host-gateway" environment: NOSTR_PRIVKEY: <use "openssl rand -hex 32" to generate a fresh key and place it inside ""> LN_BACKEND_TYPE: "LND" LND_ADDRESS: localhost:10009 LND_CERT_FILE: "/lnd/tls.cert" LND_MACAROON_FILE: "/lnd/data/chain/bitcoin/mainnet/admin.macaroon" DATABASE_URI: "/data/nostr-wallet-connect.db" COOKIE_SECRET: <use "openssl rand -hex 32" to generate fresh secret and place it inside ""> PORT: 8080 restart: always stop_grace_period: 1m
Starting and testing
Now that you have everything ready, it is time to start the container and test.
- While you are in the
nwc
directory (important), execute the following command and check the log output,docker compose up
- You should see container logs while it is starting, and it should not exit if everything went well.
- At this point, you should be able to go to
http://<ip of the host where nwc is running>:4321
and get to the interface of NWC - To stop the test run of NWC, simply press
Ctrl-C
, and it will shut the container down. - To start NWC permanently, you should execute
docker compose up -d
, “-d” tells Docker to detach from the session. - To check currently running NWC logs, execute
docker compose logs
to run it in tail mode add-f
to the end. - To stop the container, execute
docker compose down
That's all, just follow the instructions in the web interface to get started.
Updating
As with any software, you should expect fixes and updates that you would need to perform periodically. You could automate this, but it falls outside of the scope of this tutorial. Since we already have all of the necessary configuration in place, the update execution is fairly simple.
- Change directory to the clone of the git repository,
cd /home/bitcoin/nwc/nostr-wallet-connect
- Run command to build Docker image:
docker build -t nwc:$(date +'%Y%m%d%H%M') -t nwc:latest .
(there is a dot at the end) - Change directory back one level
cd ..
- Restart (stop and start) the docker compose config
docker compose down && docker compose up -d
- Done! Optionally you may want to check the logs:
docker compose logs
-
@ d2e97f73:ea9a4d1b
2023-04-11 19:36:53There’s a lot of conversation around the #TwitterFiles. Here’s my take, and thoughts on how to fix the issues identified.
I’ll start with the principles I’ve come to believe…based on everything I’ve learned and experienced through my past actions as a Twitter co-founder and lead:
- Social media must be resilient to corporate and government control.
- Only the original author may remove content they produce.
- Moderation is best implemented by algorithmic choice.
The Twitter when I led it and the Twitter of today do not meet any of these principles. This is my fault alone, as I completely gave up pushing for them when an activist entered our stock in 2020. I no longer had hope of achieving any of it as a public company with no defense mechanisms (lack of dual-class shares being a key one). I planned my exit at that moment knowing I was no longer right for the company.
The biggest mistake I made was continuing to invest in building tools for us to manage the public conversation, versus building tools for the people using Twitter to easily manage it for themselves. This burdened the company with too much power, and opened us to significant outside pressure (such as advertising budgets). I generally think companies have become far too powerful, and that became completely clear to me with our suspension of Trump’s account. As I’ve said before, we did the right thing for the public company business at the time, but the wrong thing for the internet and society. Much more about this here: https://twitter.com/jack/status/1349510769268850690
I continue to believe there was no ill intent or hidden agendas, and everyone acted according to the best information we had at the time. Of course mistakes were made. But if we had focused more on tools for the people using the service rather than tools for us, and moved much faster towards absolute transparency, we probably wouldn’t be in this situation of needing a fresh reset (which I am supportive of). Again, I own all of this and our actions, and all I can do is work to make it right.
Back to the principles. Of course governments want to shape and control the public conversation, and will use every method at their disposal to do so, including the media. And the power a corporation wields to do the same is only growing. It’s critical that the people have tools to resist this, and that those tools are ultimately owned by the people. Allowing a government or a few corporations to own the public conversation is a path towards centralized control.
I’m a strong believer that any content produced by someone for the internet should be permanent until the original author chooses to delete it. It should be always available and addressable. Content takedowns and suspensions should not be possible. Doing so complicates important context, learning, and enforcement of illegal activity. There are significant issues with this stance of course, but starting with this principle will allow for far better solutions than we have today. The internet is trending towards a world were storage is “free” and infinite, which places all the actual value on how to discover and see content.
Which brings me to the last principle: moderation. I don’t believe a centralized system can do content moderation globally. It can only be done through ranking and relevance algorithms, the more localized the better. But instead of a company or government building and controlling these solely, people should be able to build and choose from algorithms that best match their criteria, or not have to use any at all. A “follow” action should always deliver every bit of content from the corresponding account, and the algorithms should be able to comb through everything else through a relevance lens that an individual determines. There’s a default “G-rated” algorithm, and then there’s everything else one can imagine.
The only way I know of to truly live up to these 3 principles is a free and open protocol for social media, that is not owned by a single company or group of companies, and is resilient to corporate and government influence. The problem today is that we have companies who own both the protocol and discovery of content. Which ultimately puts one person in charge of what’s available and seen, or not. This is by definition a single point of failure, no matter how great the person, and over time will fracture the public conversation, and may lead to more control by governments and corporations around the world.
I believe many companies can build a phenomenal business off an open protocol. For proof, look at both the web and email. The biggest problem with these models however is that the discovery mechanisms are far too proprietary and fixed instead of open or extendable. Companies can build many profitable services that complement rather than lock down how we access this massive collection of conversation. There is no need to own or host it themselves.
Many of you won’t trust this solution just because it’s me stating it. I get it, but that’s exactly the point. Trusting any one individual with this comes with compromises, not to mention being way too heavy a burden for the individual. It has to be something akin to what bitcoin has shown to be possible. If you want proof of this, get out of the US and European bubble of the bitcoin price fluctuations and learn how real people are using it for censorship resistance in Africa and Central/South America.
I do still wish for Twitter, and every company, to become uncomfortably transparent in all their actions, and I wish I forced more of that years ago. I do believe absolute transparency builds trust. As for the files, I wish they were released Wikileaks-style, with many more eyes and interpretations to consider. And along with that, commitments of transparency for present and future actions. I’m hopeful all of this will happen. There’s nothing to hide…only a lot to learn from. The current attacks on my former colleagues could be dangerous and doesn’t solve anything. If you want to blame, direct it at me and my actions, or lack thereof.
As far as the free and open social media protocol goes, there are many competing projects: @bluesky is one with the AT Protocol, nostr another, Mastodon yet another, Matrix yet another…and there will be many more. One will have a chance at becoming a standard like HTTP or SMTP. This isn’t about a “decentralized Twitter.” This is a focused and urgent push for a foundational core technology standard to make social media a native part of the internet. I believe this is critical both to Twitter’s future, and the public conversation’s ability to truly serve the people, which helps hold governments and corporations accountable. And hopefully makes it all a lot more fun and informative again.
💸🛠️🌐 To accelerate open internet and protocol work, I’m going to open a new category of #startsmall grants: “open internet development.” It will start with a focus of giving cash and equity grants to engineering teams working on social media and private communication protocols, bitcoin, and a web-only mobile OS. I’ll make some grants next week, starting with $1mm/yr to Signal. Please let me know other great candidates for this money.
-
@ 82341f88:fbfbe6a2
2023-04-11 19:36:53There’s a lot of conversation around the #TwitterFiles. Here’s my take, and thoughts on how to fix the issues identified.
I’ll start with the principles I’ve come to believe…based on everything I’ve learned and experienced through my past actions as a Twitter co-founder and lead:
- Social media must be resilient to corporate and government control.
- Only the original author may remove content they produce.
- Moderation is best implemented by algorithmic choice.
The Twitter when I led it and the Twitter of today do not meet any of these principles. This is my fault alone, as I completely gave up pushing for them when an activist entered our stock in 2020. I no longer had hope of achieving any of it as a public company with no defense mechanisms (lack of dual-class shares being a key one). I planned my exit at that moment knowing I was no longer right for the company.
The biggest mistake I made was continuing to invest in building tools for us to manage the public conversation, versus building tools for the people using Twitter to easily manage it for themselves. This burdened the company with too much power, and opened us to significant outside pressure (such as advertising budgets). I generally think companies have become far too powerful, and that became completely clear to me with our suspension of Trump’s account. As I’ve said before, we did the right thing for the public company business at the time, but the wrong thing for the internet and society. Much more about this here: https://twitter.com/jack/status/1349510769268850690
I continue to believe there was no ill intent or hidden agendas, and everyone acted according to the best information we had at the time. Of course mistakes were made. But if we had focused more on tools for the people using the service rather than tools for us, and moved much faster towards absolute transparency, we probably wouldn’t be in this situation of needing a fresh reset (which I am supportive of). Again, I own all of this and our actions, and all I can do is work to make it right.
Back to the principles. Of course governments want to shape and control the public conversation, and will use every method at their disposal to do so, including the media. And the power a corporation wields to do the same is only growing. It’s critical that the people have tools to resist this, and that those tools are ultimately owned by the people. Allowing a government or a few corporations to own the public conversation is a path towards centralized control.
I’m a strong believer that any content produced by someone for the internet should be permanent until the original author chooses to delete it. It should be always available and addressable. Content takedowns and suspensions should not be possible. Doing so complicates important context, learning, and enforcement of illegal activity. There are significant issues with this stance of course, but starting with this principle will allow for far better solutions than we have today. The internet is trending towards a world were storage is “free” and infinite, which places all the actual value on how to discover and see content.
Which brings me to the last principle: moderation. I don’t believe a centralized system can do content moderation globally. It can only be done through ranking and relevance algorithms, the more localized the better. But instead of a company or government building and controlling these solely, people should be able to build and choose from algorithms that best match their criteria, or not have to use any at all. A “follow” action should always deliver every bit of content from the corresponding account, and the algorithms should be able to comb through everything else through a relevance lens that an individual determines. There’s a default “G-rated” algorithm, and then there’s everything else one can imagine.
The only way I know of to truly live up to these 3 principles is a free and open protocol for social media, that is not owned by a single company or group of companies, and is resilient to corporate and government influence. The problem today is that we have companies who own both the protocol and discovery of content. Which ultimately puts one person in charge of what’s available and seen, or not. This is by definition a single point of failure, no matter how great the person, and over time will fracture the public conversation, and may lead to more control by governments and corporations around the world.
I believe many companies can build a phenomenal business off an open protocol. For proof, look at both the web and email. The biggest problem with these models however is that the discovery mechanisms are far too proprietary and fixed instead of open or extendable. Companies can build many profitable services that complement rather than lock down how we access this massive collection of conversation. There is no need to own or host it themselves.
Many of you won’t trust this solution just because it’s me stating it. I get it, but that’s exactly the point. Trusting any one individual with this comes with compromises, not to mention being way too heavy a burden for the individual. It has to be something akin to what bitcoin has shown to be possible. If you want proof of this, get out of the US and European bubble of the bitcoin price fluctuations and learn how real people are using it for censorship resistance in Africa and Central/South America.
I do still wish for Twitter, and every company, to become uncomfortably transparent in all their actions, and I wish I forced more of that years ago. I do believe absolute transparency builds trust. As for the files, I wish they were released Wikileaks-style, with many more eyes and interpretations to consider. And along with that, commitments of transparency for present and future actions. I’m hopeful all of this will happen. There’s nothing to hide…only a lot to learn from. The current attacks on my former colleagues could be dangerous and doesn’t solve anything. If you want to blame, direct it at me and my actions, or lack thereof.
As far as the free and open social media protocol goes, there are many competing projects: @bluesky is one with the AT Protocol, nostr another, Mastodon yet another, Matrix yet another…and there will be many more. One will have a chance at becoming a standard like HTTP or SMTP. This isn’t about a “decentralized Twitter.” This is a focused and urgent push for a foundational core technology standard to make social media a native part of the internet. I believe this is critical both to Twitter’s future, and the public conversation’s ability to truly serve the people, which helps hold governments and corporations accountable. And hopefully makes it all a lot more fun and informative again.
💸🛠️🌐 To accelerate open internet and protocol work, I’m going to open a new category of #startsmall grants: “open internet development.” It will start with a focus of giving cash and equity grants to engineering teams working on social media and private communication protocols, bitcoin, and a web-only mobile OS. I’ll make some grants next week, starting with $1mm/yr to Signal. Please let me know other great candidates for this money.
-
@ ece127e2:745bab9c
2023-09-08 17:56:16Cuando ya no
estés,habrá
alguien que
mirará en esos
cajones a los
cuales se
accedía
conociendo
artimañas que
solo sabías tu.
Ese ladrón te
espió, te siguió
hasta tus más
íntimos rincones.
Sorpresa se llevará al leer:
"aquí,no estás
solo ...yo te acompaño"
Álvaro González Novoa diciembre 2019
-
@ ece127e2:745bab9c
2023-09-08 17:50:15tirarse al piso ,rodar , ensuciarse , transpirar de tanto correr a ningún lado ,hacer equilibrio en un tronco , mirar como las olas vuelven al mar por encima de tus pies , marearse …marearse para el otro lado pensando que se va arreglar la primer mareada
….. correr las palomas intentando agarrarlas ,esconderse en el ropero y ver el polvo en el rayo de luz que entra por la rendija , tomar agua de la canilla sin poner las manos , hacer globitos con la saliva, tragarla y atorarse de tanto reir …..
eso, tan simple y tan complejo, ser niño
Álvaro González Novoa Nov 2015
-
@ b9e76546:612023dc
2023-09-05 22:12:21I feel like a lot of people have an inherent problem with this vague concept of “THE ALGORITHM” (which henceforth will receive the all caps & scary quote treatment) and their nostr feed that is entirely misplaced from the real problem of centralized social media, so I thought it would be good to address it directly.
First, “THE ALGORITHM” is just a set of rules that determines how you see your feed. There is no necromancy or joining of the dark side involved, and it has nothing to do with whether "THE ALGORITHM" is “good” or “bad.” The very idea of “not having an algorithm,” just means you want the algorithm to list the posts of who you follow in chronological order. It in no way means you are “algorithm free,” it just means that the rules of your feed are "take only the posts from the people I follow and order them chronologically," and that’s basically it.
Everything about the concept of a social network and the incredible potential and beauty of #nostr as a protocol is in controlling your experience, what content you see, and how you see it. This is literally the entire point of having follows, followers, and reposts in the first place. It's at the core of the very notion of what social media is. This is literally “an algorithm” in the same way as prioritizing new posts over old would be, or limiting those who post more, or amplifying those who post less in your feed. They are exactly the same kind of rules, they are different only in specificity.
So what’s the problem with “THE ALGORITHM” then? It’s nothing to do with some vague notion of an “unnatural” feed or whatever it might seem like since we seem to have developed this distaste for the very concept. The problem is purely that someone else has been specifically manipulating your feed against your best interests.
It’s the same issue as censorship. My blocking a dickhead who won’t shut up about their shitcoin or who squeals at me under every single post with demands to read some communist propaganda on my podcast, isn’t censorship, it’s me choosing who I interact with. Censorship is when an external participant, someone not involved in the conversation at all, decides that I should not see some idea or should not communicate with some person despite my explicit desire to do so, and is able to remove my access from it without my permission.
The same goes for “THE ALGORITHM.” It’s not a problem if I’m controlling it for my own feed, this is a basic and fundamental tool of digital filtering that absolutely must be embraced, not feared or run away from, because it’ll make a huge difference in the user experience. It’s simply that someone else shouldn’t be controlling it to be at odds with the content and experience that the user specifically wants and is trying to create. Only THEN it is a very bad "algorithm" and a dangerous relationship.
The problem with all of these things has nothing to do with what they actually are, its about who has control.
The user is always supposed to be in control of who they follow, the content and ideas they want to see, and the people they want to associate with. Only then is it truly a free market and open space guided and created by its users. The problem has always been about central points of control forcing information asymmetries that aren't real, censoring ideas that are beneficial to you and inconvenient to them, etc.
I always like to try to analogize these sorts of things to the IRL world to understand what makes them bad and why a good one is actually incredible important. In the real world, if you go to a party and decide to converse with your friend, while ignoring all others you are weighing their interaction higher than the others at the party. If you decide to play a game of beer pong with your friend, you are creating a very specific set of rules by which your interaction will fall into. Not because you enjoy the evils of "THE ALGORITHM," but because you want to get drunk and have a lot of fun. Censorship would be if some external govt or other party was able to mute your conversation from thousands of miles away, while you were standing in front of your friend talking to them. THEY interrupted your conversation and shut off your communication channel despite both of you explicitly agreeing to the interaction. Or you were having a conversation with your friend and the second they began telling you about how your mutual acquaintence in in the hospital with myocarditis, they vanish from the party and a person you don't even know immediately walks up to explain to you how safe and effective the Pfizer products are.
An IRL "evil algorithm" would be this external institution or person making a particular group at the party invisible to you without your knowledge, it would be forcing a beer pong table in front of you no matter where you went or what else you wanted to do. Constantly enticing you to get drunk and play a game you were doing everything to avoid. Even adding arbitrary obstacles to all other activities and dropping NLP messaging of "drink up" and "solo cup" into all of your conversations without your knowledge. As crazy as it sounds, this is essentially the norm. This is how our online environment has evolved. So it makes sense that when we broke free of that, we would have a horrible taste in our mouths for the very idea of "THE ALGORITHM." It certainly isn't irrational, despite being misplaced.
Being part of the digital world is a weird thing when comparing it to real life. There is never a situation in meatspace where one has to filter how they will talk to a million people all at once. The very notion is comically absurd. But this IS a consideration in the digital world. Its like being dropped into a seemingly unlimited ocean of content and people, which is to the individual, genuinely infinite, as more content and interactions are being added to it by the minute so fast that it would take a lifetime to even manually sort through it all. Blocking, filtering, information rules, value weights and yes, "THE ALGORITHM" aren't things that are nice to have, these things are critical, inescapable tools for navigating the endless ocean of the digital world. These are not things to be afraid of or label broadly as "evil" and avoided at all costs. To the contrary, they are basic pieces of the puzzle that I think we need to understand. We need to put them in the hands of the user, so we can do incredible things with them.
The one core concern, is quite simple: How do we enable the user to set the rules, and not a third party? In my opinion, this is all that distinguishes the ultimately good from the bad.
We must remember not to throw the baby out with the bath water. Creating "THE ALGORITHM" is not accepting an invitation from Darth Vader to join the dark side. It's just a means of curating your feed so you get the best experience you can, and you find the content, ideas, and community that you came to #nostr looking for.
When we realize the importance of custom controls and modes of interaction, then we realize what all of these clients really are. Every one of them is really just a different "algorithm" that the user can select from. One that shows only images, one that filters everything but a certain community or topic, one that organizes based on most zapped, or by the number of likes specifically from those in your network, and on and on. The potential of #nostr isn't an algorithm-free experience, it's in an ecosystem with an unlimited number of experiences to choose from so that each person can either choose or build the community that they want, in a global square with no rulers.
An important step to getting to the future we want is to understand, with specificity and nuance, the exact sources of the problems we are trying to fix, rather than painting broad strokes and just carrying around a bunch of baggage about a tool we should be using for ourselves. The promise of nostr, and Bitcoin, and so many other tools we are building on and embracing is to create at the communication layer, a foundation of freedom that can be accessed by every single user no matter where they are in the world.
So in short, there is no such thing as "THE ALGORITHM." The problem has always been about who has control over your digital world? Is it you, or is it someone else? In the fight to prevent that control from finding its way back into the hands of someone else, it would be foolish to let our PTSD over the past have us avoid the very tools that would let us build a future specifically tuned to give us the very value and and autonomy that we all seek.
-
@ ece127e2:745bab9c
2023-09-08 17:47:40Quedarme hasta las mil sirviendo grappa con limón... Escuchando veteranos que ya están de vuelta...
Con un camisaco celeste manchado de grasa de las milangas que frité toda la tarde para poner en esa vitrina... que hace años no enfría. Nadie las compra... pero me gusta picarlas tarde en la noche, para que los últimos beodos no se vayan a sus camas con el estómago vacío.
Di vuelta las sillas, apagué las luces , llegué a la puerta y medio de reojo, sin ganas y hasta por costumbre miré el bar vacío.
Cerré la cortina
Álvaro González Novoa JULIO 2018
-
@ ece127e2:745bab9c
2023-09-08 17:39:18Entramos y el olor a aceite de la máquina de coser y las mermeladas nos dan la bienvenida. Mis padres y los tíos ya habían arreglado todo, pero había que desvestirla.
Cada uno de nosotros tenia una historia escrita en alguna parte de esa casa.
Detrás del bargueño, estaba el agujero por donde se veían las capas de papel hasta llegar a la pared, me llevé un pedazo de cada uno, no pude llevarme la última capa, esa que yo solo conocía; algunos primos, los más chicos no pudieron llevar nada de ese pequeño tesoro.
En el fondo estaba la escalera construida por él, sobre el muro lindero, esa escalera que nos daba como premio los nisperos del vecino, ahora solo llegaba a un muro blanco alto, muy alto. La bajé y la dejé acostada en el piso, eso fue mi despedida
Álvaro González Novoa
-
@ 7d4417d5:3eaf36d4
2023-08-19 01:05:59I'm learning as I go, so take the text below for what it is: my notes on the process. These steps could become outdated quickly, and I may have some wrong assumptions at places. Either way, I have had success, and would like to share my experience for anyone new to the process. If I have made any errors, please reply with corrections so that others may avoid potential pitfalls.
!!! If you have "KYC Bitcoin", keep it in separate wallets from your "Anonymous Bitcoin". Any Anonymous Bitcoin in a wallet with KYC Bitcoin becomes 100% KYC Bitcoin.
!!! It took me several days to get all the right pieces set up before I could even start an exchange with someone.
!!! Using a VPN is highly recommended. If you're not already using one, take the time to find one that suits you and get it running.
!!! If you don't normally buy Amazon Gift Cards, start doing so now, and just send them to yourself, or friends that will give you cash in return, etc. For my first trade, Amazon locked me out of my account for about 22 hours, while I was in the middle of an exchange. All because I had never purchased an Amazon Gift Card before. It was quite nerve wracking. My second trade was for $300, and although my Amazon account wasn't shut down, that order had a status of "Sending" for about 22 hours, due to the large amount. In each of these cases I had multiple phone calls with their customer support, all of whom gave me false expectations. Had I already been sending gift cards to the anonymous email address that I created in the steps below, and maybe other anonymous email addresses that I could make, then I might not have been stalled so much.
-
Install Tor Browser for your OS. The RoboSats.com website issues a warning if you are not using Tor Browser. If you don't know what Tor is, I won't explain it all here, but trust me, it's cool and helps keep you anonymous. If you use Firefox, the interface will look very familiar to you.
-
Create a KYC-free e-mail address. I used tutanota.com in Firefox, as it would not allow me to create an account using Tor Browser. After the account was created, using Tor Browser to login, check emails, etc. has been working perfectly. Tutanota requires a 48 hour (or less) waiting period to prevent bots from using their system. You'll be able to login, and even draft an email, but you won't be able to send. After you've been approved, you should be able to login and send an email to your new address. It should show up in your Inbox almost instantly if it's working.
-
Have, or create, at least one Lightning wallet that is compatible with RoboSats.com and has no KYC Bitcoin in it. The RoboSats website has a compatibility chart available to find the best wallet for you. During an exchange on RoboSats, you will need to put up an escrow payment, or bond, in Satoshis. This amount is usually 3% of the total amount being exchanged. If the exchange is successful, the bond payment is canceled, leaving that amount in your wallet untouched, and with no record of it having been used as escrow. If you don't hold up your end of the trade, the bond amount will be transfered from your wallet. I created a wallet, using my new email address, with the Alby extension in the Tor Browser. This anonymous wallet was empty, so I used a separate wallet for the bond payment of my first trade. This wallet had KYC Bitcoin, but since it is being used for a bond payment, and no transaction will be recorded if everything goes okay, I don't mind taking the minuscule risk. After the first trade, I don't need to use the "KYC wallet", and I will use only my anonymous Lightning wallet for transactions related to performing a trade.
-
Create a new Robot Token by going to RoboSats using the Tor Browser. Copy the Token (Robot ID) to a text file as a temporary backup. It is recommended to create a new robot-token for every session of exchanges you make.
-
Select "Offers" to browse what others are presenting. "Create" is for when you want to create an offer of your own. You may need to create your own offer if none of the existing offers match your criteria.
-
Select "Buy" at the top of the page.
-
Select your currency (USD).
-
Select your payment methods by typing "amazon" and selecting (Amazon Gift Card). Repeat this process and select (Amazon USA Gift Card).
-
Determine Priorities - If you prefer to trade quickly, and don't care as much about premiums, look for users with a green dot on the upper-right of their robot icon. If you're not in a hurry, sort users by premium and select the best deal, even if they are inactive. They may become active once they are notified that their offer has activity from you.
-
The Definition of Price = the price with the premium added, but not the bond
-
A. Find A Compatible Offer - Select the row of the desired offer and enter the amount you would like to buy. i.e. $100 If you do not find a compatible offer, you will have to create your own offer.
B. **Create An Offer** - First, take a look at "Sell" offers for your same currency and payment method(s) that you will be using. Take note of the premium those buyers are willing to pay. If your premium is drastically less than theirs, your offer may get ignored. Select "Create" at the bottom of the screen. There is a slider at the top of the screen, select it to see all the options. Select "Buy". Enter the minimum and maximum amount that you wish to spend. Type "amazon" to select the methods that you would like to use (Amazon Gift Card, Amazon USA Gift Card). For "Premium Over Market", enter an amount that is competitive with premiums you saw at the start of this step and do not use the % sign! You can adjust the duration, timer, and bond amount, but I leave those at their default settings. Select the "Create Order" button, and follow the instructions for making a bond payment.
-
Pay the Bond - Copy the invoice that is presented. From your wallet that contains bond funds, select "Send", and paste the invoice as the recipient. This money will never leave your account if the exchange completes without issue. No transaction will be recorded. If there is a complication with the exchange, it is possible that this transaction will complete.
-
Create and Submit Your Invoice for Their Bitcoin Payment To You - Select "Lightning", if not selected by default.* Select the Copy Icon to copy the correct amount of Satoshis. This amount already has the premium deducted. From your anonymous Lightning Wallet, select "Receive", and paste the Satoshi amount. If you enter a description, it's probably best to keep it cryptic. Copy the invoice and paste it into RoboSats; then select "Submit".
* If you plan on "mixing" your Bitcoin after purchase, it may be better to select "On Chain" and pay the necessary fees swap and mining fees. In the example this comes from, Sparrow wallet is used and has whirlpool ability in its interface.
-
Connect With Seller and Send Funds - Greet the seller in the chat window. The seller has now provided RoboSats with the Bitcoin to transfer to you. Your move is to buy an Amazon eGift Card for the amount of the trade. Log in to your Amazon account and start the process of buying an eGift card. For delivery there is the option of email or txt message. Ask the seller what their preference is, and get their address, or phone number, to enter into Amazon's form. Complete the purchase process on Amazon, and check the status of your order. Once you see the status of "Sent", go back to RoboSats in your Tor Browser.
-
Confirm Your Payment - Select the "Confirm ___ USD Sent" button and notify the seller to check their e-mail/txt messages.
-
Seller Confirmation - Once the seller select their "Confirm" button, the trade will immediately end with a confirmation screen.
-
Verify - If you check the anonymous wallet, the new amount should be presented.
-
-
@ 03742c20:2df9aa5d
2023-09-08 17:26:11Zap.stream : วิธีไลฟ์สตรีมบน Nostr
ผมได้รับคำถามจากหลายคนว่า Zap.stream คืออะไรและใช้งานอย่างไร ผมเลยเขียนคำแนะนำเบื้องต้นเกี่ยวกับการเริ่มใช้งาน Zap.stream ชิ้นนี้ขึ้นมา
เอาล่ะ เรามาทำความรู้จัก Zap.stream กันดีกว่า
Zap.stream คืออะไร?
Zap.stream เป็นแพลตฟอร์มไลฟ์สตรีมที่สร้างขึ้นบนโปรโตคอล Nostr เป็นไคลเอ็นต์อีกตัวที่ช่วยให้เหล่าสตรีมเมอร์ได้แสดงออกอย่างเต็มที่ และยังได้รับ Sats โดยตรงผ่านการ Zap⚡เพราะบน Zap.stream ไม่มีการเซ็นเซอร์ ไม่มีสิทธิพิเศษ และไม่มีการหัก Sats ให้กับแพลตฟอร์ม
“Road to affiliate”
ผมได้ลองเล่นตั้งแต่ช่วงแรก ๆ ตอนที่เหล่าสตรีมเมอร์ยังน้อยอยู่ ในช่วงนั้นไลฟ์ที่พบบ่อยคือเหล่านักพัฒนา ไม่ว่าจะไลท์นิง ไคลเอ็นต์ของ Nostr รวมไปถึงนักพัฒนาของ Zap.stream เองด้วย
พอเวลาผ่านไปไม่นาน แพลตฟอร์มก็พัฒนาเร็วมากจนถึงปัจจุบันที่มีฟังชั่นการ์ดสำหรับไว้ตกแต่งหน้าสตรีมเรา มีการกำหนด Goal ไว้สำหรับตั้งเป้าหมาย มี Emoji ที่เราสามารถสร้างเองได้และแอดของคนอื่นมาใช้ได้เช่นกัน
ผมก็ได้รับคำแนะนำจากผู้พัฒนาแพลตฟอร์มและเหล่าเพื่อนสตรีมเมอร์ด้วยกันมาพอสมควร เลยพอจะรู้วิธีการใช้งานและตกแต่งหน้าโปรไฟล์สตรีมแล้ว
เข้าเรื่องกันดีกว่า ว่าจะเริ่มใช้งาน Zap.stream อย่างไร
เริ่มต้นใช้งาน Zap.stream
Zap.stream เป็นไคลเอ็นต์ที่ทำงานบนเว็บเบราว์เซอร์ แต่ก่อนจะใช้งานอย่างแรกคุณต้องมีบัญชี Nostr เสียก่อน (หากคุณยังไม่รู้จัก Nostr ลองอ่านบทความนี้ครับ “Nostr: โซเชียลมีเดียเสรีไร้ศูนย์กลาง”)
สร้างบัญชี Nostr
มีหลายวีธีมากเลยที่จะใช้งานนอสเตอร์ แต่ในการใช้งาน Zap.stream ผมแนะนำให้ใช้ Getalby ในการผูก Private Key นอสเตอร์ไว้เพื่อใช้ล็อกอินและใช้เป็นไลท์นิ่งวอลเล็ต
Getalby
Getalby เป็นส่วนขยายบนเบราว์เซอร์ที่เป็นไลท์นิงวอลเล็ท และใช้งานล็อกอินบัญชี Nostr ในไคลเอ็นต์ต่าง ๆ ที่ทำงานบนเบราว์เซอร์ผ่านมาตรฐาน Nip-07
วิธีสมัครใช้งาน Getalby : YouTube
ไคลเอ็นต์ของ Nostr
เมื่อคุณมีบัญชี Getalby แล้ว จากนั้นก็เลือกไคลเอ็นต์ของ Nostr สักตัวเพื่อทำการใส่ข้อมูลของคุณ และใส่ไลท์นิงแอดเดรสเพื่อที่จะรับ Zap⚡ได้
หรือถ้าหากคุณบัญชี Nostr อยู่แล้ว คุณสามารถเอา Private Key มาผูกกับ Getalby ได้เลย โดยทำตามนี้ :
- คลิกที่ส่วนขยาย Getalby จากนั้นคลิกตรงชื่อที่คุณตั้ง แล้วเลือก “Account settings”
- จากนั้นกดที่ “Nostr Settings” แล้วคุณนำ Private Key มาวางเลย จากนั้นคลิก “Save”
Zap.stream
ไปที่เว็บไซต์ Zap.stream คลิกปุ่ม “Login” มุมขวาบน แล้วให้คุณเลือก “Nostr Extension” คลิกเข้าไปเลย แค่นี้ก็จะขึ้นบัญชีคุณแล้ว
- คลิกปุ่ม “Stream” เพื่อตั้งค่าก่อนจะไลฟ์
- เลือก Endpoint ที่ต้องการ
- ก็อบปี้ Stream URL/Stream Key ไปใส่โปรแกรมสตรีมของคุณที่สามารถยิงไลฟ์แบบ RTMP ได้
- ตั้งชื่อไลฟ์ของคุณตรง “Title”
- ใส่คำอธิบายไลฟ์เพิ่มเติมตรง Summary
- ใส่รูปปกไลฟ์ของคุณเพียงเอา URL รูปภาพมาใส่ตรง “Cover images”
- อย่าลืมตั้ง Tags ด้วยล่ะ จากนั้นคลิก “Save” ได้เลย
กดเติม “Topup” ก่อนไลฟ์ด้วยนะครับ และอย่างที่คุณเห็นจะมี Endpoint อยู่ 2 แบบที่เสียค่าใช้บริการไม่เท่ากัน งั้นเรามาดูกันสิว่ามันต่างกันอย่างไร
BEST
Best จะคิดค่าบริการ 10 sats/นาที และเสนอการเข้ารหัสฝั่งเซิร์ฟเวอร์สำหรับเอาต์พุตสตรีมของคุณ (source, 720P, 480P เป็นต้น) Zap.stream อาจเพิ่มคุณสมบัติใหม่ ๆ เพิ่มเติมในอนาคต เป็นแผนที่ผมแนะนำเพื่อให้ผู้ที่มาชมไลฟ์ได้รับประสบการณ์ที่ดี
Basic
Basic จะคิดค่าบริการเพียง 2.5 sats/นาที แต่ไม่มีการเข้ารหัสเอาต์พุตฝั่งเซิร์ฟเวอร์ หากคุณใช้ Basic ให้ลองตั้งค่าวิดีโอในโปรแกรมสตรีมเป็น 30 FPS และปรับขนาดเอาต์พุตเป็น 720P เพื่อคุณภาพการรับชมที่ดีที่สุด แต่ผู้ชมไลฟ์ที่มีการเชื่อมต่อที่ช้าอาจพบปัญหาวิดีโอที่ไม่ชัด
เมื่อคุณเลือกแผนได้แล้วก็เริ่มไลฟ์ได้เลย ลุย!!
คุณต้องมีโปรแกรมที่ไว้จัดการไลฟ์ตรีมของคุณ ในปัจจุบันมีหลายโปรแกรมให้คุณเลือกที่รองรับสตรีมแบบ RTMP แต่ผมแนะนำ OBS Studio อาจต้องตั้งค่าจัดการเองเยอะหน่อย แต่คุณสามารถใช้งานได้ฟรี
การตั้งค่า OBS Studio ไลฟ์สตรีมไปยัง Zap.stream
การตั้งค่า OBS Studio มีให้คุณเรียนรู้มากมายตามยูทูบหรือเว็บไซต์ทั่วไปเลย ถ้าคุณอยากออกแบบไลฟ์ของคุณได้หลาย ๆ แบบต้องลองศึกษากันดู แต่เรามาดูกันในส่วนที่เราจะยิงไลฟ์สตรีมของเราขึ้น Zap.stream กันก่อนครับ
มาเริ่มกันเลย
เมื่อจัดรูปแบบหน้าจอไลฟ์คุณพร้อม ให้กดที่ “Settings” จากนั้นไปที่เมนู “Stream” เลือก “Custom” คุณก็เอา Stream URL/Stream Key มาใส่แล้วกด "ตกลง" ได้เลยครับ
เมื่อคุณพร้อมไลฟ์แล้วกด LiveStream ได้ทาง OBS Studio โดยมันจะยิงสัญญาณเข้า Zap.stream ไลฟ์ของคุณก็จะขึ้นหน้า Zap.stream แล้วอย่าลืมกดแชร์ให้เพื่อนคุณได้เห็นด้วยล่ะ
ไคลเอ็นต์สำหรับดูไลฟ์บน Nostr
ผมคิดว่าอาจมีคนสงสัยว่าถ้าอยากดูไลฟ์สตรีมบน Nostr ต้องทำยังไง และดูได้ที่ไหนบ้าง ไคลเอ็นต์ที่สามารถดูไลฟ์ได้ในปัจจุบันยังมีน้อย แต่เท่าที่เห็นคือ :
- Zap.stream : ไคลเอ็นค์ที่เราใช้ไลฟ์นั่นเอง ร่วมสนุกกับการแชตและ Zap⚡ เห็นการ์ดต่าง ๆ บนโปรไฟล์ของผู้สตรีม แถมยังมีอิโมจิของผู้สตรีมให้เราได้ใช้อีก แต่ก็มีปัญหาบ้างที่พบบ่อยคือไลฟ์ขึ้นสถานะ Offline วีธีแก้ปัญหาเบื้องต้นให้คุณกดรีเฟรช หรือ F5 ไลฟ์ก็จะกลับมาปกติ ปัญหานี้อาจเป็นที่รีเลย์หรือสัญญาณอินเทอร์เน็ตของคุณ
- Nostrudel : เป็นไคลเอ็นอีกตัวบนเว็บเบราว์เซอร์สามารถ Login ด้วย Nip-07 หรือจะใช้ Private Key ก็ได้เช่นกัน ไคลเอ็นต์ตัวนี้ดูไลฟ์ค่อนข้างลื่นเลยทีเดียว โดยเราสามารถทั้งแชตและ Zap⚡ได้เหมือนกัน แต่ที่พิเศษไปกว่านั้น มันสามารถ Custom จำนวนแซตที่เราอยาก Zap⚡ได้อีกด้วย แต่ตอนนี้ UI อาจไม่สวยเท่าไหร่นัก
- Amethyst : เป็นไคลเอ็นต์บนแอนดรอยด์ ดูไลฟ์ค่อยข้างลื่นไหล พิมพ์แชตคุยกันสนุก แต่น่าเสียที่กด Zap⚡ให้คนสตรีมไม่ได้ หวังว่าในอนาคตจะมีการพัฒนาเพิ่ม
*หมายเหตุ : ทั้งสามไคลเอ็นต์มีช่องแชตเชื่อมต่อกันหมด ไม่ว่าจะใช้อันไหนก็แชตกันได้อย่างสนุก
เรามาเติมสีสันให้กับโฟรไฟล์ไลฟ์ และแชตของคุณกัน
เรามาทำความเข้าใจอีกสักหน่อยก่อนเริ่มไลฟ์กันครับ โดยเราจะเติมสีสันให้ไลฟ์ดูสนุกขึ้น และสามารถปรับใช้ในโพสต์ธรรมดาหรือในแชตของคุณได้อีกด้วย บน Nostr นั้นเนื้อหาทั้งหมดมีการระบุเหตุการณ์เฉพาะที่เรียกว่า “Nostr events” หากคุณต้องการอ้างอิงถึง events ใด ๆ ก็ตาม สามารถทำได้เพียงเพิ่มแท็ก “nostr:event_id” โดยอาจเป็นโน้ต ชุดอิโมจิ หรือเป้าหมายลงในช่องแชตหรือการ์ดได้ ตัวอย่างเช่น :
nostr:note1dacxa2nsy86659hehvz6c88z8p8dezjeg4nkvpuwc9x6q37l4keqaprfxq
วิธีสร้างหรือเลือก Emojis (อิโมจิ)
คุณสามารถสร้างอิโมจิของคุณเองได้ หรือจะใช้อิโมจิของคนอื่นก็ทำได้เช่นกัน
- โดยคุณไปที่ลิงก์นี้ https://emojis-iota.vercel.app/
- แล้วทำการ Login ด้วย Extension ของ Nostr ของคุณ (เช่น Get Alby)
- แล้วเลือกอิโมจิที่คุณอยากได้
- จากนั้นกดที่ขีดสามขีดทางขวาบนของอิโมจินั้น แล้วเลือก “Add to my emoji”
หากอยากสร้างอิโมจิเอง ให้คุณกดที่โปรไฟล์คุณทางมุมขวาบน แล้วเลือก “New emoji pack”
ตั้งชื่อแพ็กนำ URL รูปอิโมจิมาวางพร้อมตั้งชื่อ จากนั้นกด “Add Emoji” คุณสามารถเพิ่มอิโมจิได้จนกว่าจะพอใจ ขั้นตอนนี้อาจใช้เวลานานหน่อย เพราะต้องทำทีละตัว แต่เมื่อเสร็จสิ้นแล้วให้กด “Save” ได้เลย เพียงแค่นี้ก็จะขึ้นอิโมจิให้คุณใช้ในไลฟ์แล้วครับ
การตั้งเป้าหมาย Goals ของไลฟ์
คุณสามารถตั้ง Goals ได้ในขณะไลฟ์อยู่ เพียงคุณคลิกที่ “Add Goal” ตรงด้านบนช่องแชทต ใส่สิ่งที่ต้องการจะสื่อสารถึงคนที่มาดูไลฟ์ ตั้งค่าเป้าหมายจำนวน Sats จากนั้นกด “Save” ได้เลย คุณจะเห็น Goal ปรากฎขึ้นอยู่ข้างบนช่องแชต หากไลฟ์จบแล้วยังไม่ถึงเป้าหมายที่ตั้งใจไว้ หรือคุณอยากสร้างเป้าหมายพิเศษแต่งบนการ์ด เข้าไปที่ Zap⚡Goals คลิกที่เป้าหมายที่คุณต้องการ แล้วก็อบปี้ nevent จาก URL ข้างบนมาวางในแชตหรือในการ์ด โดยใส่แท็ก nostr: ตามด้วย nevent นั้น ๆ
Cards หรือการ์ดคืออะไร?
การ์ดเป็นเหมือน Widget ใต้สตรีมของคุณ คุณสามารถใส่โน้ต รูปภาพ ลิงก์ หรือสิ่งที่คุณอยากประชาสัมพันธ์ได้ ตัวอย่างเช่น กำหนดการไลฟ์ กฎการแชต รูปภาพที่อยากอวด แสดงอิโมจิที่ใช้ได้ เป้าหมายที่อยากได้ รวมถึงโฆษณาต่าง ๆ
วิธีสร้างการ์ด
ให้สังเกตมุมซ้ายล่างของจอ จะเห็นที่คำว่า “Edit cards” จะขึ้นเครื่องหมายบวก ให้คลิกเข้าไปเลย จากนั้นใส่ข้อมูลตามที่คุณต้องการ แล้วกด “Save”
และหากคุณต้องการใส่ Event ต่าง ๆ เช่น :
- บัญชี Nostr ของคนอื่น ให้พิมพ์ nostr: ตามด้วย nup
- เป้าหมาย Goal ที่อยากได้ ให้พิมพ์ nostr: ตามด้วย nevent ของเป้าหมาย
- อิโมจิที่อยากอวด ให้พิมพ์ nostr: ตามด้วย naddr ของอิโมจิ
- ข้อความที่คุณโพสต์ ให้พิมพ์ nostr: ตามด้วย note id ที่คุณต้องการ
หากคุณยังไม่เคยไลฟ์เลย จะไม่สามารถแต่งการ์ดได้ คุณอาจกดไลฟ์สัก 2-5 นาที แล้วปิดไลฟ์ แค่นี้คุณก็สามารถใช้เวลาแต่งให้หนำใจได้เลย
หากคุณอ่านมาถึงตรงนี้ ผมเดาว่าคุณน่าจะพร้อมไลฟ์สตรีมอะไรบางอย่างแล้วล่ะ ขอให้มีความสุขในการไลฟ์ อย่าลืมแชร์ไลฟ์มาให้เพื่อน ๆ ได้ดูกันด้วยนะ
หวังว่าบทความนี้จะมีประโยชน์ต่อกับผู้ที่สนใจทำไลฟ์สตรีมบน Nostr ฝากติดตามผลงานไลฟ์ “OnlyNips” ผมด้วยครับ ผมตั้งใจไลฟ์ทุกวันพุธ เวลาสามทุ่ม ไม่แน่ใจว่าจะมีสาระน่าฟังไหม แต่ตั้งใจจะพัฒนาเรื่อย ๆ ครับ แล้วเจอกันใน Zap.stream มาถล่ม Zap⚡กันให้สนุกไปเลย!
แถม widgets เอาไปใช้แต่งไลฟ์ของคุณน่าสนใจมากขึ้น
กดคัดลอก URL ไปใส่ OBS ได้เลย
- Zap Alert - ปรับขนาด 1920x1080
- Chat Widget - ปรับตามต้องการ
- Top Zappers - ปรับตามต้องการ
- Current Viewers - ปรับตามต้องการ
Welcome to Nostrstream
-
@ 32e18276:5c68e245
2023-08-07 16:10:07Hey guys,
I spent some time this weekend fixing a bunch of the bugs that were introduced in the latest nostrdb refactor. See the changelog below for the full list of changes in the latest build!
Planned this week
I have a big list of things I'm planning on adding to Damus this week:
- Lists!
- Zap improvements: Bringing back top zap comments in threads, profile zap comments in notifications, Private DM Zaps
- Video player improvements
- Sharing improvements (share to damus, etc)
Make sure to come back in a week to see how much I could get done!
Changelog
Added
- Add close button to custom reactions (Suhail Saqan)
- Add ability to change order of custom reactions (Suhail Saqan)
- Adjustable font size (William Casarin)
Changed
- Show renotes in Notes timeline (William Casarin)
Fixed
- Ensure the person you're replying to is the first entry in the reply description (William Casarin)
- Don't cutoff text in notifications (William Casarin)
- Fix wikipedia url detection with parenthesis (William Casarin)
- Fixed old notifications always appearing on first start (William Casarin)
- Fix issue with slashes on relay urls causing relay connection problems (William Casarin)
- Fix rare crash triggered by local notifications (William Casarin)
- Fix crash when long-pressing reactions (William Casarin)
- Fixed nostr reporting decoding (William Casarin)
- Dismiss qr screen on scan (Suhail Saqan)
- Show QRCameraView regardless of same user (Suhail Saqan)
- Fix wiggle when long press reactions (Suhail Saqan)
- Fix reaction button breaking scrolling (Suhail Saqan)
- Fix crash when muting threads (Bryan Montz)
-
@ ca843451:fa3b4c1a
2023-09-08 15:41:13据官方消息,Solana Hyperdrive Hackathon正式报名和提交入口已在全球极客运动平台DoraHacks.io开启。本次黑客松由Solana Foundation主办,奖金池和种子轮资助金达1,000,000美元。此外该活动还增设30,000美元的APAC专属奖金池,用于支持亚太地区内优秀项目。项目申请截止时间为10月15日。 开发者可通过Solana官网报名黑客马拉松,并通过DoraHacks.io黑客马拉松入口提交项目(BUIDL)。 Solana Hyperdrive Hackathon是由Solana官方发起的第八届黑客松,共设有七大赛道,分别是Depin、AI、DeFi、支付、游戏,手机端用户DApp、基础设施、DAO以及Network State。除奖励和潜在的种子轮资助外,最佳项目还可以获得三张2024年的Solana Breakpoint会议入场券以及项目展示机会。黑客松期间内,官方还将在印度开展两次线下Hacker House活动,感兴趣的开发者可前往官方网站进行报名。
-
@ 32e18276:5c68e245
2023-08-03 21:05:05Hey guys,
I've been quiet lately... I've been working on something big. In the past 2 weeks there have been 9539 new lines of code added to damus, 2928 removed, 279 files changed. I've rewritten much of the codebase in preparation for the nostrdb integration.
nostrdb
What is nostrdb? nostrdb is an integrated relay within damus, with the same design as strfry, but slightly different to support embedding into nostr apps. This will be the heart of Damus apps going forward, including notedeck and other future microapps. Think of it as a kind of development kit but with an embedded database and query capabilities. I didn't want to have to recreate all of the same querying, caching, and parsing code when building new apps, nostrdb will solve all of the painful and slow parts. nostr seems simple but if you want a fully working app it is pretty complicated, especially if you want it to be fast and sync efficiently.
Goals
- be the best and most efficient at querying, syncing and storing nostr notes
- enable direct mapping of notes into application code without any serialization overhead
- provide advanced syncing capabilities such as negentropy, which allows us to only query stuff we don't have
- be as portable as possible. nostrdb is a C library that you can embed into basically anything.
- full relay filter support
- full text search
Benefits
- full note verification
- more efficient de-duplication before we begin processing events off the wire
- set-reconciliation based syncing (negentropy) drastically reduces bandwidth usage and latency
- iteration on future nostr apps will be quicker (android, desktop, etc)
- features like ghost mode, account switching, etc will be much more efficient as you will be able to quickly switch between notes that are cached locally
- much smaller memory footprint due to optimized in-memory note format, which in turn improves cpu-cache efficiency
- much better profile and note searching
So that's what I've been working on in the past two weeks. On to what else is new in this release:
Multi reactions!
Suhail did an amazing job at adding multiple reaction support. All you need to do is long-press the Shaka button to show different options. You can customize these in settings as well
New onboarding features
Damus will now suggest people to follow when you first enter the app, this is the first of many onboarding improvements coming soon. Thank Klabo for this one!
That's all for now! Please test thoroughly and let me know if you run into any issues. You likely will since the entire codebase has been changed, and I probably broke something.
Until next time 🫡
-
@ e6817453:b0ac3c39
2023-09-08 15:05:59Why Metamask
Last thing that i want to do in my life is to build yet another crypto wallet but quite often i need one. One simple thing - adoption . it is one of the most widely used wallet even and btw one of the widely used extension on market
Key Metamask Statistics 2023 - There are more than 21 million monthly active users of Metamask - Metamask is owned by ConsenSys AG - ConsenSys AG is valued at $3.2 billion - This is a 38-times increase from 2020 - Metamask connects you to more than 3700 apps Metamask makes Ethereum more accessible
Read more at EarthWeb: Metamask Statistics 2023: How Many People use Metamask? https://earthweb.com/metamask-statistics/
So it is really widely adopted and trusted. It is scary me that we have a company behind a propject but we have a good part - it is open code base at list for now.
It is open
The codebase is publicly available, allowing anyone to review, contribute to, or fork the project. This open-source nature is crucial for several reasons:
Transparency:
Being open-source means that the code is available for public scrutiny. This is particularly important for software that handles sensitive operations like cryptographic key management and blockchain transactions. Users and developers can audit the code to ensure it meets security standards.
Community Contributions:
The open-source model allows for contributions from the developer community at large. This can lead to faster identification of bugs, more robust security features, and the development of new functionalities, like the aforementioned MetaMask Snaps.
Trust:
In the realm of cryptocurrencies and blockchain, trust is paramount. Open-source software is generally considered more trustworthy because it undergoes public scrutiny. This is especially important for a tool like MetaMask, which acts as a gateway to decentralized applications (dApps) and handles private keys.
MetaMask Snaps
Metamask community made a smart move. So to prevent a forks and fragmentation of community and products folks just made a project extandable and plugable. So you actually could simply buld on top instead of forking
MetaMask Snaps is an extensibility framework for the MetaMask browser extension, which is widely used for interacting with Ethereum-based decentralized applications (dApps). The Snaps framework allows developers to extend MetaMask's functionality by creating custom plugins, often referred to as "Snaps." These plugins can introduce new features, protocols, or even layer-2 solutions directly into the MetaMask user interface. This makes it easier for users to interact with a broader range of blockchain technologies without having to leave the MetaMask environment.
Why Are MetaMask Snaps Important?
User Experience: By integrating additional features directly into MetaMask, users can enjoy a more seamless and enriched experience. They don't have to juggle multiple extensions or platforms to interact with various blockchain technologies.
-
Developer Flexibility: Developers can create custom solutions tailored to their dApps or protocols. This can include anything from custom transaction logic to integrating new cryptographic methods.
-
Interoperability: Snaps can facilitate better interoperability between different blockchain protocols and layer-2 solutions, making it easier for users to navigate the increasingly complex blockchain ecosystem.
-
Security: Since MetaMask is a well-trusted platform, extending its functionality through Snaps can offer a more secure way for users to try out new features or protocols.
-
Innovation: The extensibility allows for rapid experimentation and deployment of new blockchain technologies, accelerating the pace of innovation in the space.
H ow do MetaMask Snaps work?
Snaps are implemented as JavaScript/TypeScript applications where developers implement one or more of three functionalities (transaction insights, RPC requests, cron jobs) as JavaScript/TypeScript methods.
Because a Snap can consist of arbitrary code that can access a user’s MetaMask wallet, all Snaps are run in a special environment that is designed with security in mind. Thus, they differ in several ways from ordinary JavaScript or TypeScript code that would be found on, say, a web page or a Node.js application. In particular, the code will be executed in a “sandbox” that limits the JavaScript APIs that can be accessed.
Furthermore, to prevent Snaps from hogging system resources, all Snaps are meant to be “short-lived” in that they do not take too long to generate transaction insights or process RPC requests. Snaps that time out will be terminated by the MetaMask extension.
For more details on how Snaps work, we refer the interested reader to the official documentation.
Not only Ethereum
While MetaMask is primarily associated with Ethereum, the Snaps framework opens up possibilities for extending its functionality beyond the Ethereum ecosystem. Here are some non-Ethereum use-cases where MetaMask Snaps could be beneficial:
1. Cross-Chain Interoperability
Snaps could facilitate seamless interactions between Ethereum and other blockchains like Bitcoin, Polkadot, or Binance Smart Chain. This could include features like cross-chain asset swaps or tracking portfolio balances across multiple chains.
2. Decentralized Identity (DID)
Given your interest in Self-Sovereign Identity (SSI), Snaps could be used to integrate decentralized identity protocols like Sovrin or Veres One. This would allow users to manage their digital identities directly within MetaMask, enhancing data privacy and control.
3. Decentralized Storage
Snaps could integrate decentralized file storage solutions like IPFS or Filecoin, enabling users to upload, manage, and share files without relying on centralized services.
4. Layer-2 Solutions
While these are often Ethereum-related, some layer-2 solutions aim to be blockchain agnostic. Snaps could provide interfaces for interacting with these solutions, making it easier for users to benefit from faster and cheaper transactions.
5. Data Analytics and Visualization
Snaps could offer data analytics tools that aggregate information from various blockchains, decentralized exchanges, or other data sources. This would allow users to get a comprehensive view of their activities and assets.
6. Privacy Enhancements
Snaps could integrate privacy-focused technologies like zero-knowledge proofs or mixers that work across multiple blockchains, allowing users to make private transactions or shield their identities.
7. Social Networking
Decentralized social networks like NOSTR could be integrated into MetaMask via Snaps, allowing users to manage their social interactions and digital assets in one place.
8. IoT Integration
Snaps could facilitate interactions with Internet of Things (IoT) devices that use blockchain for secure data transmission and storage. This could include smart home controls, supply chain tracking, or even healthcare devices.
9. NFT Platforms
While NFTs are popular on Ethereum, they also exist on other blockchains like Flow or Tezos. Snaps could allow users to manage and interact with NFTs across multiple platforms.
10. Decentralized Governance
Snaps could integrate voting mechanisms from DAOs (Decentralized Autonomous Organizations) that exist on blockchains other than Ethereum, enabling users to participate in governance without leaving the MetaMask interface.
What can you do with MetaMask Snaps for Ethereum
So it solve a UI and adoption problem of Acount Abstraction. There are many other use cases of MetaMask Snaps, but the main use case that is emphasized by MetaMask themselves is the ability to use Snaps to build user interfaces for account abstraction-style on-chain wallet smart contracts.
Account abstraction gives developers a lot of freedom to create a wallet with whatever custom authentication schemes, access controls, or other features that can be used to control transactions from the wallet.
But actually accessing the custom wallet functionality would require the user to construct and send non-trivial transactions to the wallet smart contract. A Web3 developer could create a Snap that serves as the user interface for such a wallet so that users don’t have to care about technical details — similar to how a bank might create a phone app that talks to the bank’s servers.
Discover From a community
It is already a big list of cool comunity project https://snaps.directory/ give you safe and curated list of snaps
I personaly reaaly keen on: - Masca full scale SSI wallet . you could read about it more - identify DID manager
Try It yourself , build yourself
If your idea is still not implemented - make your hands dirty Good workshop intro with a step by step guide
Github from workshop https://github.com/ziad-saab/metamask-snaps-transaction-insights-workshop
Developer Resources
To learn more and go deeper
Examples
- MetaMask/snaps-skunkworks examples - Official examples provided by MetaMask Snaps team.
- zbrumen/mmp2p - An example, of how to use Metamask Snaps for a simple P2P chat website.
- piotr-roslaniec/snap-rust-rng - Using
wasm-pack
- generated WASM dependencies in snaps
Templates
- MetaMask/template-snap - Snap Template in JS
- MetaMask/template-typescript-snap - Snap Template in TS
- MetaMask/test-snaps - A monorepo for Snaps used for QA and end-to-end tests, with an accompanying GitHub Pages website. Like MetaMask/test-dapp, but for Snaps.
- metamask-snap-ts-nextjs
-
-
@ 32e18276:5c68e245
2023-07-30 21:19:40Company Overview:
Damus is the pioneering iOS nostr client. Through its platform, Damus empowers billions on iOS with the tools for free speech and free speech money. If you're driven to bring freedom technology to the masses and ignite change, we invite you to join our mission.
Job Description
- Collaborate on iOS Damus in tandem with our core developer, Will Casarin, and the broader Damus team.
- Implement our vision as laid out in our product roadmap: https://github.com/orgs/damus-io/projects/3/views/1.
- Embrace the fun and critical mission of undermining totalitarian regimes across the globe.
Job Requirements
- A genuine passion for freedom technology.
- At least one year of collaborative development experience.
- Experience building SwiftUI iOS apps.
- Passionate about design and user experience.
- Eager to work in close coordination with Damus lead developer, Will, and a dedicated team spanning development, design, and product.
- Commitment to a full-time role, although we remain open to discussing alternative arrangements.
Bonus Qualifications
- Experience with Nostr development.
- Experience with C.
- Previous work in free and open source projects.
- A publicly shareable portfolio.
Job Structure
- A one-month paid probationary period to ensure a mutual fit.
- Upon successful completion of the trial, the opportunity for a six (6) month contractual engagement.
- The potential for contract renewal, contingent on funding.
Application Process:
Interested candidates should forward a motivational statement alongside their CV/portfolio to vanessa@damus.io. -
@ 0861144c:e68a1caf
2023-09-08 14:02:30Context: this year, I decided to run stoicism in my live trough practices, putting discipline, habits and learning in the run. In my fifth day learning, I already learned four things and kept me thinking: this is similar to what we practice with bitcoin.
Week 1: Admit you have no control
The hardest part of being a hodler is when you have doubts about what you did. At the time of this writing, the average hodler is ~25% down if we use the BTC/USD pair; the plan dictates we should keep stacking sats while we educate ourselves, share our thoughts, debate about the future and most important thing: control our actions.
There are things, we the plebs, can't control:
- You have no power over the bitcoin price. Up and down as usual, people dictates, some rekts, some winners but control over the price? You? Zero.
- You have no power when people talk bs about bitcoin. Nocoiners, shitcoiners, scammers...they do always what they do best: talk BS. Either listen to them or...ignore it.
- You have no power over external actions (Russia, Ukraine, Feds and a large etc). Unless you have direct contact with Putin or the Feds, chill the fuck down and learn about your limits, master Wayne.
There are thigs, we the plebs, have absolute control:
- We have power over our bitcoin when we use our own private keys and keep SAFU, out of exchanges and middlemen. For example, you hav concerns about the safety practice of some exchanges; you have -mostly- zero power over their management decisions but you have the power to keep your sats out of their hands.
- We have power about what are we going to listen, read, educate. For example, you are trying to mastering some programming and you have concerns about Lightning Network. Instead of keep reading shitcoinery or Nassim Taleb, why not take courses to learn programming? I study for instance at Platzi, with the Plebs or Lisa Neigut (aka) Nifty's course.
- You have power over your internal actions. Control yourself and always ask: is this as bad as they portait? Is this the end of the crypto as we know? Sir, please, breath, think.
Oh, and keep stacking sats, stay humble, learn stuff and take care of people/animals you love.
This article was originally published at Stacker News - Jan. 5th
-
@ d3d74124:a4eb7b1d
2023-07-26 02:43:40This plan was GPT generated originally but then tweaked by myself as the idea fleshed itself out. All feedback welcome and encouraged.
Shenandoah Bitcoin
1. Executive Summary
Shenandoah Bitcoin is a for-profit community organization based in Frederick County, VA, uniquely blending the world of agriculture and STEM. Our mission is to foster community spirit, stimulate interest in agricultural technology, and promote understanding of Bitcoin, while providing enriching educational opportunities and ensuring sustainable business operations.
2. Company Description
Shenandoah Bitcoin is committed to delivering value to our local community. Our unique approach intertwines traditional agricultural practices, modern STEM concepts, and the world of digital currencies, specifically Bitcoin. Our activities cater to all age groups, focusing on fostering community engagement, hands-on learning experiences, and contributing to the overall welfare of our community.
What’s in a name?
Shenandoah Bitcoin. Shenandoah - an old and historied land. Bitcoin - a cutting edge technological advancement. Both encompass multiple industries, from energy and manufacturing, to farming and data centers. Both built using Proof of Work.
3. Services
We offer a range of services, including:
Family-friendly events: Agriculture, STEM, and Bitcoin-themed festivals, fairs, workshops, and community gatherings. Educational programs: Classes, seminars, and workshops on agricultural technology, STEM principles, and understanding and using Bitcoin. Facility Rentals: Spaces available for private events, business meetings, and community gatherings.
4. Membership Benefits
We offer tiered membership packages with benefits such as:
a. Silver Membership: Includes access to regular events, discounts on educational programs, and priority booking for facility rentals.
b. Gold Membership: All Silver benefits, free access to select educational programs, and further discounted facility rentals.
c. Platinum Membership: All Gold benefits, free access to all educational programs, highest priority and maximum discounts on facility rentals, and exclusive invitations to special events.
Member’s opting to pay in Bitcoin receive 10% off all pricing.
5. Market Analysis
Our primary market is the local community in Frederick County and Winchester, VA, which consists of various demographic groups. Our secondary market includes neighboring communities, tourists, businesses, and educational institutions interested in the intersection of agriculture, STEM, and Bitcoin. Understanding that facility use and events to be a drawing factor for all demographics, we outline demographic specific analysis below.
STEM professionals in the area may work remotely or commute toward DC and not interact much with their agricultural neighbors, but a desire for good quality food exists for many. In addition to events, drawing the STEM demographic in will be connections to CSAs, ranchers, and homesteaders for access to fresh locally grown food. Offering a child's play room adjacent to some office space, is a compelling benefit for the laptop class that is often in STEM professions.
Non-industrial food producers and homesteaders may not have the focus or resources for marketing and sales. By offering a physical touch point for them and direct connections to consumers, food producers benefit from membership. Having more options for drop off/pick up of various produced goods, makes it attractive for both the consumers and producers as coordination can be asynchronous.
Bitcoiners have a wide range of sub-demographics, including farmers and software engineers. Some travel hours over car and plane to attend bitcoin themed events. The topics of STEM and agriculture are of shared interest to non-trivially sized communities of bitcoiners. Having a physical touch point for bitcoiners will draw in some members just for that. Building fellowship is desired and sought in bitcoin.
5.1 Market Trends
The blending of agriculture, STEM fields, and Bitcoin is a unique concept with increasing interest in sustainable farming and ranching, food sovereignty, and health. Shenandoah Bitcoin is poised to tap into this growing interest and offer unique value to our community.
5.2 Market Needs
Our market requires initiatives that foster community engagement, promote understanding of agri-tech and Bitcoin, and provide a versatile space for events and learning.
6. Marketing and Sales Strategy
We will employ a blend of digital marketing, traditional advertising, and strategic partnerships. Our main marketing channels will be word of mouth, social media, local press, and our website. Partnerships with local small businesses, homesteaders, schools, agricultural organizations, and bitcoin companies will form a key part of our outreach strategy.
7. Organizational Structure
Shenandoah Bitcoin will be led by a CEO, supported by a management team responsible for daily operations, event planning, marketing, and community outreach. Event management and logistics will be handled by part-time staff and volunteers.
8. Financial Projections
Our revenue will be generated from membership fees, charges for events and educational programs, and facility rentals.
9. Funding Request
[If seeking additional funding, describe your needs and how the funds will be used]
10. Exit Strategy
Should it become necessary to dissolve the business, assets such as property, equipment, and any remaining cash reserves after meeting liabilities will be sold. Investors would receive their share of the remaining assets according to their proportion of ownership.
11. Conclusion
Shenandoah Bitcoin is a unique community organization bringing together agriculture, STEM, and Bitcoin in Frederick County, VA. Our distinctive approach is designed to deliver both profits and social impact, resonating strongly with our target market and positioning us for sustainable growth.
-
@ fab018ad:dd9af89d
2023-09-07 13:39:261. ฟาร์มกุ้งวิปโยค
“ทุกอย่างล้วนหายไปหมดแล้ว”
–Kolyani Mondal
เมื่อ 52 ปีก่อน พายุไซโคลนโบลาฆ่าผู้คนในแถบชายฝั่งของบังกลาเทศไปมากกว่า 1 ล้านคน ถือเป็นพายุไซโคลนที่ร้ายแรงที่สุดที่มีการบันทึกไว้ในประวัติศาสตร์
หน่วยงานท้องถิ่นและองค์กรนานาชาติรู้ถึงความเสี่ยงที่จะเกิดความเสียหายร้ายแรงจากพายุลักษณะนี้เป็นอย่างดี ดังนั้นในช่วงปี 1960 หน่วยงานภูมิภาคจึงสร้างแนวกันคลื่นขนาดใหญ่เพื่อป้องกันแนวชายฝั่ง ซึ่งเปิดโอกาสให้มีการใช้พื้นที่สำหรับการเกษตรได้มากขึ้น
แต่หลังจากการลอบสังหารผู้นำอย่าง ชีค มูจิบูร์ เราะห์มาน ในการประกาศอิสรภาพ ก็ได้เกิดการเปลี่ยนแปลงแนวทางภายใต้ระบอบเผด็จการของบังกลาเทศด้วยการผลักดันของอิทธิพลจากต่างประเทศ ชีวิตของผู้คนถูกลดความสำคัญ และแนวป้องกันพายุสำหรับประชาชนถูกทำให้อ่อนแอลง
หมายเหตุผู้แปล : ชีค มูจิบูร์ เราะห์มาน (Sheikh Mujibur Rahman) เป็นผู้ก่อตั้งประเทศบังกลาเทศ โดยดำรงตำแหน่งประธานาธิบดีและนายกรัฐมนตรีระหว่างปี 1971 จนถูกลอบสังหารในปี 1975
ทั้งหมดก็เพื่อเร่งอัตราการส่งออกและเพื่อนำเงินมาชดใช้หนี้
โดยแทนที่จะส่งเสริมการปลูกป่าชายเลน ซึ่งสามารถเป็นแนวป้องกันพายุตามธรรมชาติ เพื่อประโยชน์สำหรับประชาชนมากกว่า 1 ใน 3 ของประเทศที่อาศัยอยู่ตามแนวชายฝั่ง หรือแม้แต่ลงทุนในการผลิตอาหารให้เพียงพอต่อการบริโภคภายในประเทศที่กำลังเติบโตอย่างรวดเร็ว แต่รัฐบาลกลับเลือกที่จะกู้เงินจากธนาคารโลกและกองทุน IMF เพื่อที่จะขยายฟาร์มกุ้ง ซึ่งกระบวนการเพาะเลี้ยงสัตว์น้ำในประเทศนั้นถูกควบคุมโดยเครือข่ายชนชั้นปกครองที่ร่ำรวยอีกด้วย
พวกคนรวยรวมหัวกันผลักดันบรรดาเหล่าชาวไร่ให้กู้ยืมเงินเพื่อทำสิ่งที่เรียกว่าการ “อัปเกรดกระบวนการเพาะเลี้ยง” โดยทำการขุดหลุมตามแนวกันคลื่นซึ่งป้องกันที่ดินของพวกเขาจากทะเล ทำให้ที่ดินที่เคยอุดมสมบูรณ์ของพวกเขาเต็มไปด้วยน้ำเกลือ หลังจากนั้นพวกเขาก็ต้องทำงานอย่างหลังขดหลังแข็ง เพื่อจับตัวอ่อนของกุ้งจากทะเลด้วยมือเปล่า เพื่อนำมันกลับมาเลี้ยงในบ่อพัก ก่อนจะขายกุ้งตัวโตเต็มวัยให้กับผู้รับซื้อกุ้ง ซึ่งมักจะเป็นผู้มีอิทธิพลในพื้นที่
เงินทุนที่กู้จากธนาคารโลกและ IMF ทำให้ไร่นาสวน ที่ดินลุ่มน้ำ และป่าชายเลนนับไม่ถ้วน ถูกดัดแปลงให้กลายเป็นบ่อกุ้งที่เรียกว่า “ghers”
พื้นที่บริเวณสามเหลี่ยมปากแม่น้ำคงคานั้นถือเป็นพื้นที่ที่มีความอุดมสมบูรณ์อย่างน่าทึ่ง โดยเป็นที่ตั้งของ “ป่าสุนทรพนา” ป่าชายเลนที่ใหญ่ที่สุดในโลก แต่หลังจากที่การทำฟาร์มกุ้งเชิงพาณิชย์ได้กลายเป็นธุรกิจหลักในท้องถิ่น ต้นโกงกางมากกว่าร้อยละ 45 ได้ถูกตัดออกไปเกลี้ยง ทิ้งให้ผู้คนเผชิญกับคลื่นสูงกว่า 10 เมตรที่พุ่งเข้าชนแนวชายหาดเวลาเกิดพายุไซโคลน พื้นที่ทำกินที่อุดมสมบูรณ์และสิ่งมีชีวิตตามริมแม่น้ำค่อย ๆ ถูกทำลายไปจากความเค็มที่เพิ่มขึ้นจากน้ำทะเล
จนสุดท้ายป่าทั้งป่าก็ได้อันตรธานหายไป เพราะฟาร์มกุ้งนั้นทำลายพืชพรรณท้องถิ่นทั้งหมด กลุ่มความร่วมมือพัฒนาชายฝั่ง (Coastal Development Partnership) ได้กล่าวถึงผลกระทบที่เกิดขึ้นนี้ว่า “การกระทำนี้ทำให้ดินแดนที่เคยอุดมสมบูรณ์กลายเป็น ‘ทะเลทรายที่เต็มไปด้วยน้ำเค็ม' ”
พื้นที่ไร่นาที่ปล่อยน้ำทะเลเข้ามาเพื่อทำฟาร์มกุ้งในจังหวัด Khuna
อย่างไรก็ตาม ผู้มีอิทธิพลที่รับซื้อกุ้งเหล่านี้กลับร่ำรวยขึ้นอย่างมาก และกุ้ง (ซึ่งถูกเรียกว่าเป็น “ทองคำสีขาว”) ก็กลายเป็นสินค้าส่งออกอันดับ 2 ของประเทศ
โดยนับตั้งแต่ปี 2014 เป็นต้นมา ชาวบังกลาเทศมากกว่า 1.2 ล้านคนทำงานในอุตสาหกรรมกุ้ง และผู้คนอีกกว่า 4.8 ล้านคนที่ต้องพึ่งพิงอุตสาหกรรมนี้ในทางอ้อม ซึ่งตัวเลขนี้ถือเป็นครึ่งหนึ่งของจำนวนคนยากจนที่อาศัยอยู่ตามชายฝั่ง คนเก็บกุ้งเป็นผู้ที่ทำงานหนักที่สุด (ซึ่งถือเป็นร้อยละ 50 ของแรงงานในอุตสาหกรรม) แต่ได้รับส่วนแบ่งเพียงร้อยละ 6 ของผลกำไร โดยร้อยละ 30 ของแรงงานนั้นเป็นแรงงานเด็กที่มีทั้งเด็กผู้ชายและเด็กผู้หญิง ซึ่งทำงานในน้ำเค็มมากถึง 9 ชั่วโมงต่อวันด้วยค่าจ้างรายวันน้อยกว่า 1 ดอลลาร์สหรัฐ เด็กเหล่านี้ส่วนมากไม่รู้หนังสือและไม่ได้เรียนต่อ
ผู้คนเคยมีการลุกฮือขึ้นประท้วงต่อต้านการขยายตัวของฟาร์มกุ้ง แต่แล้วก็ถูกปราบปรามอย่างรุนแรง โดยในเหตุปราบปรามที่เลื่องลือครั้งหนึ่่งนั้น ขบวนผู้ประท้วงถูกทำร้ายด้วยระเบิดจากผู้มีอิทธิพลที่รับซื้อกุ้งและกลุ่มลูกน้อง และมีผู้หญิงรายหนึ่งชื่อ Kuranamoyee Sardar ถูกตัดศีรษะจากเหตุปราบปรามดังกล่าว
ในงานวิจัยปี 2007 ซึ่งสำรวจฟาร์มกุ้งของชาวบังกลาเทศกว่า 102 แห่ง พบว่าแม้ค่าใช้จ่ายในการผลิตทั้งหมดจะอยู่ที่ 1,084 ดอลลาร์สหรัฐต่อเฮกตาร์ แต่รายได้สุทธิกลับอยู่ที่ 689 ดอลลาร์สหรัฐ นั่นหมายถึงกำไรที่ประเทศได้จากการส่งออกนั้น แลกมาด้วยการที่แรงงานในอุตสาหกรรมกุ้งต้องรับเคราะห์จากค่าจ้างที่ถูกกดและสภาพแวดล้อมของพวกเขาที่ถูกทำลายจนหมดสิ้น
ในรายงานที่จัดทำโดยมูลนิธิความยุติธรรมด้านสิ่งแวดล้อม (Environmental Justice Foundation) ชาวไร่ที่อยู่ริมชายฝั่งอย่างคุณ Kolyani Mondal ได้กล่าวว่า “เธอเคยปลูกข้าว พร้อมเลี้ยงปศุสัตว์และสัตว์ปีก” แต่หลังจากที่ได้มีการทำเกษตรฟาร์มกุ้ง “วัว ควาย และแพะของเธอก็เริ่มเป็นโรคท้องร่วงไปพร้อม ๆ กับเหล่าแม่ไก่และเป็ดซึ่งเป็นสัตว์ของเธอ พวกมันล้วนตายทั้งหมด”
ตอนนี้ทุ่งของเธอเต็มไปด้วยน้ำเกลือ และที่ดินที่ยังเหลืออยู่ก็เพาะปลูกอะไรแทบไม่ขึ้น ในอดีตนั้นครอบครัวของเธอสามารถปลูกข้าวได้ 18-19 มอนต่อเฮกตาร์ แต่ตอนนี้เหลือแค่ 1 มอนต่อเฮกตาร์ เธอยังจำช่วงเวลาในปี 1980 ที่เพิ่งเริ่มมีการทำฟาร์มกุ้งได้ ในตอนนั้น ชาวบ้านได้รับการสัญญาว่าสิ่งนี้จะสร้างรายได้เพิ่มขึ้น รวมทั้งมอบอาหารและพืชผลให้พวกเขามากขึ้น
แต่ตอนนี้ “ทุกอย่างล้วนหายไปหมดแล้ว” ชาวไร่ผู้เลี้ยงกุ้งขอเช่าที่ดินของเธอ โดยตกลงจะจ่ายเงินเธอ 140 ดอลลาร์สหรัฐต่อปี แต่ตอนนี้อย่างดีที่สุดที่เธอได้รับคือเงินผ่อนจ่ายแปลงละ 8 ดอลลาร์สหรัฐบ้างเป็นครั้งคราว โดยเธอกล่าวว่า “ในอดีตครอบครัวของเธอสามารถหาเลี้ยงตัวเองได้อย่างดีจากบนผืนดินแห่งนี้ แต่ตอนนี้ไม่เหลือทางเลือกใด ๆ นอกจากการไปซื้ออาหารที่ตลาด”
หมายเหตุผู้แปล : - มอน (Muand) เป็นหน่วยวัดน้ำหนักดั้งเดิมที่ใช้กันในเอเชียใต้ โดย 1 มอนมีค่าเทียบเท่าที่หลากหลายตั้งแต่ 11 กิโลกรัม จนถึง 72 กิโลกรัม - เฮกตาร์ (Hectare) เป็นหน่วยวัดพื้นที่ในมาตราเมตริกโดย 1 เฮกตาร์ เท่ากับ 10,000 ตารางเมตร หรือประมาณ 6 ไร่ 1 งาน.
ในบังกลาเทศนั้นเงินกู้เพื่อการปรับโครงสร้างจากธนาคารโลกและ IMF ปริมาณนับพันล้านดอลลาร์ (ที่มาของชื่อ “เงินกู้เพื่อการปรับโครงสร้าง” ได้มาจากการที่ผู้ปล่อยกู้จะบังคับให้ประเทศผู้กู้ต้องปรับโครงสร้างทางเศรษฐกิจเพื่อให้เอื้อกับการส่งออก ซึ่งต้องแลกมาด้วยการบริโภคภายในประเทศ) ได้ทำให้กำไรในการส่งออกกุ้งของประเทศเพิ่มขึ้นจาก 2.9 ล้านดอลลาร์สหรัฐในปี 1973 - เพิ่มเป็น 90 ล้านดอลลาร์สหรัฐในปี 1986 - และเพิ่มเป็น 590 ล้านดอลลาร์สหรัฐในปี 2012
ซึ่งรายได้ดังกล่าวถูกนำมาใช้จ่ายหนี้ต่างประเทศและใช้ในการพัฒนากองทัพ แต่เงินบางส่วนก็ไหลเข้ากระเป๋าเจ้าหน้าที่รัฐ (ซึ่งก็ไม่ได้แตกต่างอะไรกับกรณีส่วนใหญ่ของประเทศกำลังพัฒนา) ในขณะที่เหล่าแรงงานทาสในอุตสาหกรรมกุ้งต้องถูกกดขี่ให้ยากจน ถูกลิดรอนอิสรภาพ ต้องพึ่งพิงผู้อื่น และมีความสามารถในการหาเลี้ยงตัวเองได้น้อยลงกว่าแต่ก่อน
โดยที่แย่ไปกว่านั้นคือผลวิจัยยังแสดงให้เห็นว่า “หมู่บ้านที่มีป่าชายเลนไว้เป็นแนวป้องกันตัวจากคลื่นพายุซัดฝั่งจะมีผู้เสียชีวิตน้อยลงมาก เมื่อเทียบกับหมู่บ้านที่ป่าชายเลนเสียหายหรือถูกทำลาย”
ภายใต้แรงกดดันของสาธารณชน ในปี 2013 ธนาคารโลกจึงได้ปล่อยเงินกู้ 400 ล้านดอลลาร์สหรัฐให้แก่บังกลาเทศเพื่อใช้ในการพยายามแก้ไขความเสียหายของระบบนิเวศที่เกิดขึ้น ซึ่งพูดในอีกแง่หนึ่งก็คือธนาคารโลกจะได้รับค่าตอบแทนในรูปแบบของดอกเบี้ยจากการพยายามแก้ปัญหาที่ตัวเองเป็นผู้ก่อขึ้นตั้งแต่แรก ในขณะเดียวกันธนาคารโลกยังได้ปล่อยเงินกู้นับพันล้านดอลลาร์สหรัฐไปยังทุกประเทศ ไล่ตั้งแต่เอกวาดอร์ ไปยันโมร็อกโก จนถึงอินเดีย เพื่อเปลี่ยนฟาร์มดั้งเดิมในท้องถิ่นให้กลายเป็นฟาร์มกุ้ง
ธนาคารโลกได้อ้างว่าบังกลาเทศนั้นคือ “เรื่องราวที่น่าทึ่งของการลดความยากจนและการพัฒนาประเทศ” หากยึดจากในข้อมูลตามเอกสารที่ว่าแล้ว นี่ถือเป็นชัยชนะ เพราะเศรษฐกิจของประเทศอย่างบังกลาเทศมีแนวโน้มที่จะเติบโตต่อไป ในขณะเดียวกับที่มูลค่าการส่งออกนั้นเติบโตขึ้นเพื่อชดเชยมูลค่าจากการนำเข้า แต่แท้จริงแล้วรายได้จากการส่งออกส่วนใหญ่กลับไหลเข้าสู่กระเป๋าของชนชั้นนำและเจ้าหนี้ต่างประเทศ และหลังจากได้รับเงินกู้เพื่อการปรับโครงสร้างมาถึง 10 ครั้ง หนี้ของบังกลาเทศเติบโตขึ้นอย่างมหาศาล โดยเพิ่มจาก 145 ล้านดอลลาร์สหรัฐในปี 1972 กลายเป็น 95,900 ล้านดอลลาร์สหรัฐในปี 2022 ซึ่ง ณ ตอนนี้ประเทศบังกลาเทศเองก็กำลังเผชิญกับวิกฤตด้านดุลการชำระเงิน (Balance of Payments) จากหนี้สินอีกครั้ง และในเดือนพฤศจิกายน 2022 รัฐบาลก็ตกลงที่จะกู้เงินปรับโครงสร้างครั้งที่ 11 จาก IMF โดยมีการอัดฉีดเงินช่วยเหลือมูลค่า 4,500 ล้านดอลลาร์สหรัฐเข้ามาในระบบ โดยแลกกับการถูกแทรกแซงในการปรับโครงสร้างที่เพิ่มขึ้นไปอีก
ธนาคารโลกและ IMF นั้นก็ต่างอ้างว่าพวกเขาต้องการช่วยเหลือประเทศที่ยากจน แต่ตลอด 50 ปีที่ผ่านมา ผลลัพธ์จากนโยบายของพวกเขาก็ได้แสดงให้เห็นอย่างชัดเจนว่า ประเทศอย่างบังกลาเทศกลับกลายเป็นประเทศที่ต้องพึ่งพาผู้อื่นมากขึ้น และเต็มไปด้วยหนี้สินอย่างที่ไม่เคยเป็นมาก่อน
ในระหว่างวิกฤตหนี้ของประเทศโลกที่สามในช่วงทศวรรษ 1990 การวิพากษ์วิจารณ์จากสาธารณชนทั่วโลกที่ต้องการจะตรวจสอบข้อเท็จจริงของธนาคารโลกและ IMF ได้ค่อย ๆ สะสมจนปะทุขึ้น เริ่มมีการศึกษาวิจัยเพื่อสืบค้นข้อมูลอย่างจริงจัง ผู้คนออกมาประท้วงตามท้องถนน และมีความเชื่อที่แพร่กระจายไปยังทุกฝั่งการเมือง (แม้กระทั้งในรัฐสภาของสหรัฐฯ เอง) ว่าองค์กรเหล่านี้ไร้ซึ่งประโยชน์ หรือกระทั่งเป็นพิษภัยด้วยซ้ำ แต่ความรู้สึกและความสนใจในองค์กรเหล่านี้ได้จางหายไปเกือบหมดแล้ว และถึงแม้ความรู้สึกและความสนใจเหล่านี้จะกลับมาอีกครั้ง มันกลับถูกมองว่าเป็นสิ่งที่ไม่สำคัญ หรือแม้จะมีการยอมรับว่าองค์กรพวกนี้มีปัญหาแต่ก็ยังมีความจำเป็นอยู่ หรือกระทั่งยังมีความเชื่อว่าองค์กรพวกนี้มีประโยชน์และยังได้รับการต้อนรับเหมือนเดิม
ความเป็นจริงแล้วองค์กรเหล่านี้ทำให้ผู้คนนับล้านยากจนลงและชีวิตเสี่ยงอันตรายมากกว่าในอดีต ในขณะเดียวกันกลับทำให้เหล่าผู้นำเผด็จการและเครือข่ายที่ยักยอกความมั่งคั่งของประเทศนั้นร่ำรวยขึ้น และยอมละทิ้งสิทธิมนุษยชนเพื่อทำให้อาหาร ทรัพยากรธรรมชาติ และแรงงานราคาถูกไหลออกจากประเทศที่ยากจนไปสู่ประเทศที่ร่ำรวย พฤติกรรมของพวกเขาที่กระทำในบังกลาเทศนั้นไม่ใช่เรื่องผิดพลาดหรือเป็นกรณียกเว้นแต่อย่างใด
แต่นั่นเป็นวิธีการดำเนินธุรกิจตามปกติของพวกเขา..
⚡️กด Zap บทความนี้เป็นกำลังใจทีมงาน
(ทุกยอด zap จะถูกแบ่งอัตโนมัติเข้าวอลเล็ทของผู้เขียนบทความต้นฉบับภาษาอังกฤษ, ผู้แปลดราฟต์ 1, ผู้เรียบเรียงดราฟต์ 2-3, กองบรรณาธิการและพิสูจน์อักษรจากไรท์ชิฟต์ พร้อมกันบางส่วนไว้เพื่อเป็นค่าธรรมเนียมธุรกรรม)
>แปลและเรียบเรียงจากบทความต้นฉบับเรื่อง : STRUCTURAL ADJUSTMENT: HOW THE IMF AND WORLD BANK REPRESS POOR COUNTRIES AND FUNNEL THEIR RESOURCES TO RICH ONES ซึ่งเผยแพร่ครั้งแรกเมื่อวันที่ 22 พ.ย. ปี ค.ศ. 2022
-
@ 6efb74e6:41285536
2023-08-26 14:12:40Broth, stock, fond, or caldo. No matter what it is called in cooking it is all the same thing: animal bones cooked in water with some vegetables and herbs/aromatics added for additional flavour. The French, the ones that standardized the modern kitchen in the 1800s, used terms to describe two of these components and you will see these terms used in many recipes. 'Mirepoix' refers to the mix of vegetables used and 'bouquet garni' is the bundle of herbs/aromatics used. Stocks, however, have been made in all cultures for centuries.
The ability to make a good stock is essential in any professional kitchen as it is the base of many things. I encourage any home cook to learn the basics as they are ridiculously simple to make. DON'T buy that fake shit they sell you at the grocery store, put in the #proofofwork.
Stocks will come in two styles, roasted or not roasted. By roasting your bones and mirepoix prior you naturally get more colour to the stock, the longer you roast, the more colour and deeper flavour you get.
Each component in stocks can be changed. I have made stock from the following bones: beef, chicken, lamb, duck, turkey, fish, pork, and veal. I don't mess with the mirepoix much, keeping it fairly classic but I do remove the carrot and add fresh fennel bulb when making fish stock (to keep the colour clear). The bouquet garni can be changed freely and whole spices added. Toast the spices first. Mix it up depending on the bones you use and what cuisine you are cooking.
The following recipe is for a classic roasted beef stock. If you roast the bones there will be some fat that accumulates, save this. I make all my stocks with a slow cooker and increase the cook time to 36 hours for beef, lamb and veal. 24 hours for poultry and 12 hours for fish.
You can make a stock with just vegetables but I don't know why you would! 🤣
enjoy and as always DM if you have any questions.
INGREDIENTS
1.5 kg Beef marrow bones
1.5 kg Beef chuck bones
1 ea Carrots, unpeeled and diced
1 ea Brown onion, unpeeled cut in ½ horizontally
1 ea Celery stalks, washed and large diced with leaves removed
1/2 ea Leeks washed and large diced with the dark green tops removed
1 ea Garlic bulb, unpeeled and cut in half horizontally
1 ea Bay leaves, fresh if possible
1/4 teaspoon Black peppercorns whole
4 ea Thyme sprigs, fresh
3 ea Parsley stalks, fresh
2 ea Rosemary stalks, fresh
5 L Water
proofofwork: 20 minutes prep for unroasted, 1 hour for the roasted. 8 hours cook time.
YEILD: 5 litres
METHOD:
- Preheat the oven to 200c
- Place the bones and vegetables on separate roasting trays and roast the bones in the oven for about 45-50 minutes or until they are a deep brown roasted colour. Roast the veg for about 20-30 minutes.
- Remove bones from the roasting trays and place them into a large stock pot, avoid adding any fat from the trays. Don't discard the fat, keep it!
- Heat the trays on a stovetop and deglaze them with water (or red wine) and using a wooden spoon scrape off any residual deposits. Pour this over your bones in the pot and cover with the water.
- Place the stock on high heat and bring it to a boil. Once your stock is boiling turn it down to a simmer and skim any of the scum and oil that will rise to the top. Again, KEEP the oil. Leave on a low heat overnight.
- Next day skim any fat and scum that is on the surface of the stock and add your roasted vegetables, herbs, garlic & pepper.
- You should simmer your stock, not rapidly boil it, for a further 2 hours. Make sure you skim the scum and fat off your stock every 30 minutes at least. I'll say it again, KEEP THE FAT.
- When finished strain the stock removing the bones, mirepoix and bouquet garni. Keep the liquid.
- Allow the stock to cool and then store, label and date. Stock freezes very well and I break it down into 500ml containers.
enjoy #chefstr #foodstr #yumstr #grownostr #bitcoin
-
@ 0861144c:e68a1caf
2023-09-08 14:02:07The title is what I felt when I read about a new paper on Privacy Pools, that other projects dedicated to cryptocurrencies would like to implement in the near future. I confess that I read it about four times and didn't understand it crearly, but on the fifth try, with a little help from BingChat to delve into the more technical details, I finally understood it. But I ended up disappointed, I won't deny it.
One of the central points when using cryptocurrencies is pseudonymity. We are not anonymous on a blockchain because there will always be digital traces or crumbs we leave behind, but still, a blockchain can record an event without considering the real identity of the individual or entity. We know a transaction occurred, that's it, and that's the point.
There are different types of transactions, and the folks at Samourai Wallet have turned this into an art by explaining in various articles about transactions and their potential shortcomings. When it comes to privacy, these guys are always on my list of people who know what they're talking about.
So what happened here? For years, the Ethereum ecosystem has been looking for different options to improve user privacy, to not be too exposed, and, to me, the best option in that market (not the only one, but the best in my opinion) is Tornado Cash, a software that allows (in short) increasing the entropy of your transactions through collaborative transactions, using a technology called zk-SNARK that basically allows verifying a transaction without revealing who sent it, where it was sent, and the amount sent. Tornado Cash maintained a pool of funds where users made collaborative transactions, and there were no traces of sends or deposits.
So far, we've introduced the characters and what they do, and now the problem: the cap, as the young people say. Tornado Cash has been mentioned countless times in reports of financial crimes for allowing individuals engaged in illegal activities to use this software for crimes similar to money laundering and others. In fact, several developers were even arrested for writing code, which is the most ridiculous thing in the world.
Imagine this: you wrote software, and other people use it for illegal activities, but you get the worst part just for creating it. In fact, Tornado Cash has made several adjustments to comply with the regulations required by the OFAC to the point of creating hybrids to comply. But that wasn't enough.
Privacy Pools: the solution
Enter this new paper with Chainalysis, Vitalik Buterin, and people related to Tornado Cash as the main actors. The paper proposes Privacy Pools that will have something called exclusion proofs or membership proofs, based on zk-SNARKs.
How would it work? The exclusion proofs or membership proofs will primarily aim to prove that the deposits and withdrawals made by users do not come from or belong to a set of associations that don't meet certain criteria. Simpler? A regulatory body will feed the protocol with addresses, transactions, and other data. Then, the user could prove that their money has a good reputation since it does not belong to the set of associations marked by the financial authority.
Privacy pools serve as an intermediary to:
- Comply with regulatory processes
- Demonstrate regulatory compliance with social consensus
- Not reveal the complete transaction history
- Improve user privacy without compromising other transactions.
Sounds good, what's the problem then?
As often happens, and as I had written before in NOSTR, there are things that the code has nothing to do with; it's the soul of the project. In this case, the problem is being approached from the wrong perspective.
Problem 1: Chainalysis and technological deficiency
One of the authors is associated with Chainalysis, a company dedicated to blockchain analysis and tracking of illicit activities. It all sounds good, but here's the big problem: they use mechanisms and technology that are deficient. Who says that? The company itself, which admitted to using unverified tools and methods that are not really proven. In other words, to track illicit activities, this company gathers information that is not really useful or collects it through questionable methods.
Problem 2: Lack of clarity. What are they accusing me of?
We start from the conception that AML/KYC regulations are good, and that's the central core of the problem, linked to problem one, which is errors and false positives. To give you an idea, there are ongoing legal proceedings today using evidence collected with problem 1. To this, we must also add the arrest of people linked to the software who basically never touched a penny involved in illicit activities, yet they are arrested for participating in those activities. Simpler? AML/KYC regulations are very ambiguous, allow data abuse, discriminate based on socioeconomic profiles, and have a host of disadvantages because these regulations are not the same worldwide.
Problem 3: Pantagruelian problem
Remember Pantagruel? He ate everything: fish, cheese, wines, and when that wasn't enough, he even ate thoughts and more. It was never enough for him, and he always needed more. What happens with these regulations and others? When you open the door to an authoritarian entity, it will never end: first, they'll ask for one thing, then they'll ask for more, and here's the problem: like Pantagruel, it will never be enough, there will always be a hunger for more and more. Before you know it, you'll have created a system that aids in censoring blocks, transactions, and addresses, becoming synonymous with the traditional financial system.
Problem 4: The list but not Schindler's
No matter how much judicial authorities feed it, the concept of a blacklist is completely gray. In addition to the problems mentioned earlier, we are creating a dangerous monster to control because you are feeding it with assumptions, and it will eventually trigger problem 2.
So what will happen?
The problem being addressed is that the State intends to continue controlling two things: technology and monetary policy. This paper, while it has the best intentions, and we understand the problem it wants to address, has voluntarily shifted the Overton window towards centralization. We are taking risks for financial authorities that use rather vague laws, and above all, it goes against the nature of a blockchain. We return to the central point that Satoshi Nakamoto proposes: not depending on intermediaries to move transactions.
To this day, there are different proposals and solutions working on the issue of privacy, in fact, there are tools that are quite viable (Whirlpool, GrapheneOS, Linux), and while we understand what it intends to solve, it will actually make it more ambiguous.
But this is my opinion, and we should continue discussing this.
-
@ 75656740:dbc8f92a
2023-07-21 18:18:41"Who do you say that I am?"
In Matthew 16 Jesus cut to the heart of what defines identity. First he asked what other people said about him, then he asked what the disciples thought, finally he gave his own take by agreeing with the disciples. In trying to understand who someone is, we have three and only three possible sources of information.
- Who they tell us they are.
- Who others say about them.
- What we observe for ourselves.
Putting these three together constitutes identity. Identity is always unique for each connection in the social graph. Who you are to me is always different than who you are to anyone else. As such identity is largely out of our direct control. We can influence others perception of ourselves by comporting ourselves in a certain way, but we cannot compel it.
With this in mind, it is imperative to build protocols that mirror this reality as closely as possible. The problem is largely one of UI. How can we simultaneously display all three aspects of identity in a clear and uncluttered way?
The default has always been to just display an individual's claim to identity. Each user gets to choose a name and an avatar. This generally works in small communities with low rates of change both in who the members are and in how they present themselves. In these cases, each user can keep a mental map of what to expect from each name and avatar. "Oh that is just keyHammer24 doing his thing." Note that even if KeyHammer24 decides to change their nickname the mental map in the other users won't change instantly, if ever.
This falls apart in larger communities, where each user cannot maintain a mental model of who is who. Impersonation and collisions become a problem, so we add some "What others say about them" information such as blue check-marks or what "what we observe for ourselves" information like pet-names in a phone contact list or a note that we follow that account.
I don't personally have a final solution for this, I only know that we should be collecting and displaying all three sources of information from the outset. Perhaps we could do something like... * Default to showing a users preferred identifiers, but switch to the avatar and handle we self-assign them on hover. * Display a percentage of confidence that we know who the person is and that they are presenting themselves as who we expect them to be. You probably aren't the Elon Musk that I expect if you recently had different names / aren't the one I follow / none of my network follows / have been reported as misleading. * Reserve check-marks for keys that each user has signed in person. Only we can be the arbiter of who gets a check-mark in our own feed. * Maintain a list of past aliases along with a "Community Notes" like description of an account brought up by clicking on a ⓘ icon. * Have a full pet-names override.
I think Nostr already have much of this built into the protocol, it just needs to be standardized into the interface of various application. This is something on which I am very interested in hearing other ideas.
A note on anonymity
Real world identities should always be preferred. It allows for building real relationships and treating each other with real world respect. The real you is far more fascinating than a curated persona. Real identities should also never be enforced at a protocol level. Some people will be in real circumstances that preclude honest engagement without threat to their safety.
If you found this engaging I also wrote about why Social Network companies have an unsolvable problem here. and why we have to design for finite reach here
-
@ fd78c37f:a0ec0833
2023-09-08 13:33:51"Read more related articles, follow on the anti-censorship long content platform yakihonne.com.
Well, the cash system part is still a work in progress. Bitcoin (BTC) has morphed into a primarily speculative asset, and fewer people than intended use it for payments. Dozens of competitive altcoins have since emerged, offering better scalability than Bitcoin. Therefore, a solution to ease the crypto spending challenges is vital for this sector.
Enter CryptoWallet. This project seeks to alleviate crypto’s rigidity as a functional currency.
Let’s explore what CryptoWallet has to offer to the market.
Integrating crypto banking and payment services
Cryptocurrencies have one key selling point: decentralization. This quality means that every crypto owner has control over funds in their digital wallet, which is not subject to centralized sanction. That said, most people want their money to move. It should be easy to use your money to pay for whatever you want and preferably fast.
Unfortunately, crypto comes short on the convenience side. The decentralization advantage is difficult to sell to people who are not traders or investors. CryptoWallet has identified this gap as a high-potential growth area.
What does this platform offer? CryptoWallet allows users to create a versatile account for cryptocurrency transactions. The idea is to create a one-stop shop for cryptocurrency transactions.
You might also like: Circle was a principal beneficiary of SVB government rescue
Think of how complicated handling crypto currently seems. Users typically have to go to a cryptocurrency exchange to buy crypto and then transfer the same to a digital wallet for storage. After that, you confirm with a business or service that they accept crypto before using it for payments. If you don’t have that option, you must convert your crypto into fiat and then make the payment.
That is quite a hassle, right?
CryptoWallet offers the possibility of buying, storing, selling, and spending crypto simultaneously. Convenience is the goal because cryptocurrency’s decentralization makes little sense without simplicity.
Accordingly, users can spend their cryptocurrencies without needing multiple platforms for conversion to fiat. The option of peer-to-peer (p2p) transfers can also be inconvenient because of the classic barter trade problem of unmatching needs. Therefore, this option of providing in-house exchange possibilities eases spending because you can easily spend your crypto as fiat whenever you need it.
The CryptoWallet crypto card
It gets even better. CryptoWallet has a crypto card that operates much like your ordinary debit card. Imagine using your crypto to pay for services by simply swiping.
You can get whitelisted for the CryptoWallet card to spend your crypto on the go. This possibility opens up the industry because it allows people to spend their crypto globally, even where the business does not accept crypto payments.
You might also like: Binance Pay becomes available in Brazil
CryptoWallet converts the crypto in your wallet to the local currency,and you are good to go. Users can now sign up for the whitelist to get their cards in Q4 of 2023.
The fees on services like conversion to fiat are user-friendly and typically less than 1%. There is no cost for initial card acquisition, which supports over 800 different cryptocurrencies at inception.
Legal compliance and security
This platform operates from Estonia and is fully legally compliant to provide financial services in all countries where the services are available, primarily in Europe.
Security is a vital consideration for handling crypto. There has never been a more perfect asset for hackers as the currency is digital and transactions irreversible.
You might also like: EU’s MiCA rules could prohibit MEV activities on Ethereum
Therefore, CryptoWallet has enacted serious security measures to ensure user funds safety. These measures range from 2-factor authentication (2FA) for user accounts to the most secure option of offline wallet storage. For offline storage, users pick the option of the CryptoWallet card to continue controlling their funds even in offline storage.
Crypto and Fiat are inextricably linked
The purpose of money, fiat or crypto, is to ensure people can pay for goods and services. Looking at these two as antagonistic forces misses this primary utility.
CryptoWallet promises to be the most significant bridge between these two standard bearers of modern finance. This platform solves the inefficiency of current crypto transactions by integrating proven and secure financial solutions in a single platform.
You might also like: Bitcoin holds strong as inflation causes chaos on UK markets
Crypto can grow its transaction medium role with the right support system. Even altcoins with higher liquidity and scalability still mostly serve speculative ends.
Using these tokens for payments is mostly within their specific platforms and not by the general public, as their whitepapers broadly proclaim. You are more likely to find crypto promoters encouraging others to “HODL” than go to their nearest store and pay for services.
CryptoWallet has integrated tools to ensure that users don’t have to pick one or the other. You can own crypto and still have the spending ease of modern fiat transactions.
The CryptoWallet app
Your smartphone is the gateway to most services today. CryptoWallet has released its app to ensure users can seamlessly access all the services on offer. The app will soon launch on Google Play Store and is undergoing approval with the Apple App Store.
The app is a direct tool for managing your crypto on CryptoWallet. It has a simple layout, and users can view multiple service options in one glance. The app is secure and ensures that you can have an integrated crypto management tool in your palm.
CryptoWallet unveils crypto potential
CryptoWallet is finalizing its developmental phase in its quest to make a difference in the market.
The platform has incentives for early adopters who have either signed up or joined the whitelist for various services. CryptoWallet is reported to be working on a massive crypto airdrop for early adopters, with the caveat of having completed at least one transaction.
You might also like: Crypto whale losses over $24m in phishing scam
CryptoWallet is a difference maker in a sector replete with similar ideas. This bridge between the fiat and crypto sectors can unleash crypto’s potential and spur its adopters to achieve similar outcomes.
By:Dalmas Ngetich Link:https://crypto.news/cryptowallet-aims-to-simplify-crypto-transactions/
-
@ 89f93336:779b7582
2023-09-08 13:32:27source I will be discussing about the contribution of NOSTR to web3 and what the future holds for NOSTR in web3. To do that I will like to discuss a bit about web3.
Web3 according to Wikipedia is “ is an idea for a new iteration of the World Wide Web which incorporates concepts such as decentralization, blockchain technologies, and token-based economics.”
Basically it is just an improved version of the traditional social media like Facebook, Instagram but makes use of a decentralized network and Blockchain to create a more secure space that is user centric and gives users more control over their contents and information without being censored.
Since we understand what web3 is, now let's look at NOSTR and what it is.
source NOSTR in familiar terms is an open network protocol that enables a decentralized social network that does not censor content and promote free speech.
NOSTR stands for “Notes and Other Stuff Transmitted by Relay”.
Like I mentioned earlier, post are resistant to censorship that means their is true freedom of speech unlike the centralized social media where there are lots of rules against freedom of content, determined by a central authority. Post, messages and other transaction are cryptographically validated using private and public keys to authenticate messages and data are stored using Blockchain.
NOSTR provides a true decentralized social network thereby contributing heavily to web3 and this is done through these below;
1) Data ownership and control Through the use of a decentralized Blockchain network NOSTR ensures user have ownership of the data they choose to give and content they share.This also give users power to decide who can access their information and how it can be used, this is a big contribution that align with web3 concept and an improvement to the traditional social media, that sells out user data for ads. 2) Privacy and Security The privacy and security of users and their information and content is really important to NOSTR and they make sure they do this by using encrypted public keys and private keys to validate messages and other transactions in the ecosystem. 3) Resist Censorship Like I mentioned earlier NOSTR provides a platform for true freedom of speech and content for users without having to fear being censored or banned because of their choice of content or opinion. This also align with the goal of web3 in creating a decentralized social network that isn't controlled or censored by central authority like the traditional social media. 4) DAO Decentralized Autonomous organization is one of the protocol used by NOSTR to make sure everyone is equal and contribute fairly in the decision making in the community and that there is no central authority. 5) Earning Unlike most traditional authority where only the the popular user earn a token for sharing content, there are NOSTR programs that make sure their user earn for engaging through integrated crypto token.
With these few points that I mentioned above we can see how NOSTR is already contributing to web3 in creating a sustainable decentralized social space that cut across different sectors like the financial, education, health and so on with collaboration with other web 3 project.
We have seen the growth of NOSTR over the years and I can say that this is just the beginning of something big and massive. I am already on board and so is many other people even former Twitter CEO Jack Dorsey and Ethereum founder vitalik Buterin are already subscribe to the journey, together we can create a user centered, content freedom decentralized social space for all. Thank you for going through this article.
-
@ fd78c37f:a0ec0833
2023-09-08 13:30:15"Read more related articles, follow on the anti-censorship long content platform yakihonne.com.
Stake reported unauthorized transactions from some of its hot wallets on Sep. 4. Withdrawals and deposits were halted then later resumed, but not before hackers stole $41 million in digital assets.
The FBI, along with multiple blockchain security firms, confirmed that the attackers drained funds from Stake via Ethereum, BNB Chain, and Polygon.
Additionally, federal investigators listed 33 wallets including 22 Bitcoin (BTC) addresses tied to the Stake hack. These addresses either received funds directly from Stake’s hot wallets or were used to siphon illicit gains through various networks.
Security shops Arkham and CertiK both said the hacker bridged funds to Avalanche and then to Bitcoin’s blockchain. At press time, the culprits held $36 million on Ethereum , BNB Chain, and Polygon.
Read more: Stake reportedly hacked, {{text}}5.7m suspiciously moved
Lazarus Group, also known as APT38, is a band of cyber criminals and hackers supposedly funded by the North Korean government. The organization is said to have stolen almost $2 billion from crypto platforms and digital asset service providers since 2022.
In addition to the Stake hack, authorities said Lazarus also masterminded several high-profile crypto heists including Atomic Wallet’s $100 million exploit, the $100 million attack on Harmony’s Horizon bridge, and over $600 million snatched from Sky Mavis’ Ronin bridge.
The attack on Ronin remains one of the largest exploits of any crypto platform to date.
Lazarus also reportedly stole a combined $97 million from crypto payment processors Alphapo and CoinsPaid.
In August 2022, the US Department of the Treasury’s Office of Foreign Assets Control (OFAC) sanctioned privacy tool Tornado Cash over suspected links to Lazarus. The OFAC claimed that Lazarus tapped Tornado Cash to launder hundreds of millions in illicit wealth.
By:Naga Avan-Nomayo Link:https://crypto.news/fbi-lazarus-group-hacked-and-stole-41m-from-crypto-casino-stake/
-
@ 75656740:dbc8f92a
2023-07-20 19:50:48In my previous article I argued that it is impossible to have an effective filter in a delivery-by-default and universal reach messaging protocol. This might seem over-specific because, after various filters, nothing is truly universal or delivery-by-default. * Mail is limited by a cost filter phone calls by call screening services. * Faxes are limited by the fact that we all got sick of them and don't use them any more. * Email dealt with it by pushing everyone into a few siloed services that have the data and scale to implement somewhat effective spam detection. * Social media employs thousands of content moderators and carefully crafted algorithms.
Most of these are, however, delivery-by-default and universal in their protocol design. Ostensibly I could dial any number in the world and talk to anyone else in possession of a phone. If I have an email address I can reach anyone else. I can @ anyone on social media. All these protocols make an initial promise, based on how they fundamentally work, that anyone can reach anyone else.
This promise of reach then has to be broken to accomplish filtering. Looking at limiting cases it becomes clear that these protocol designs were all critically flawed to begin with. The flaw is that, even in a spam free case, universal reach is impossible. For a galaxy-wide civilization with billions of trillions of people, anyone individual wouldn't be able to even request all the information on a topic. The problem is more than just bandwidth, it is latency.
That is without spam and trolling. With spam and trolls things crash at a rate proportional to the attention available on the protocol.
The answer is to break the promise of universal reach in theory so we can regain it in practice. By this I mean filtering should happen as soon as possible to keep the entire network from having to pass an unwanted message. This can be accomplished if all messages are presumed unwanted until proven otherwise. Ideally messaging happens along lines of contacts where each contact has verified and signed each-other's keys. That is annoying and unworkable, however, instead it should be possible to simply design for trust. Each account can determine a level of certainty of an identity based on network knowledge and allow or deny based on a per-instance threshold.
While requiring all messages to originate "in network" does break the promise of the internet as an open frontier, the reality is that, like the six degrees of Kevin Bacon, everyone you want to reach will be in your network if scaled out to a reasonable level. This puts a bottleneck on bot farms trying to gain entry into the network. While they will be able to fool people into connecting with them, such poor users can lose the trust of their contacts for introductions, algorithmically limiting reach.
With Nostr I expect this form of filtering will arise organically as each relay and client makes decisions about what to pass on. This is why I like Nostr. It isn't exactly what I want, but that doesn't matter I am probably wrong, it can morph into whatever it needs to be.
-
@ 0d97beae:c5274a14
2023-08-25 00:19:19Dear loved one(s),
I hope this letter finds you well. This letter is for you and your eyes only. After my unfortunate demise, I want you to take control of my bitcoin, this is my will to you.
Please read this document carefully, and in its entirety. I take great pride in having saved all of what I have and I wish for it to be handled with care, and importance so that it may serve you for years to come.
An important disclaimer
After carefully following all the instructions in this letter, you will be the only person(s) in the entire world to have control of the bitcoin, just as I was before you. I hope you can grasp and treasure the significance of this.
Please take time to follow all the instructions in this letter and avoid taking shortcuts. The information I provide to you is sensitive and you should understand the dangers of mishandling it; it could lead to an irrecoverable loss of the bitcoin forever.
Since technology evolves quickly, I have included several company names, application titles, and device references within my instructions. I encourage you to carefully assess each option, using online resources to gather information, before determining the tools and services you wish to proceed with.
Creating bitcoin wallets
You may already have a crypto wallet, or even an account with an exchange or custodian such as Coinbase or Wallet of Satoshi. These are not suitable wallets as they do not possess an appropriate level of basic security, privacy and control for your inheritance.
In order to safely take control of the bitcoin, you should first know how to set up a "cold wallet", a "watch only wallet", and a "hot wallet". With these things created, you will be ready to receive and responsibly protect your inheritance and you will be capable of using it safely, however you wish.
Setting up a hot wallet
The first type of wallet we should create is the hot wallet. It is the easiest to set up, and may provide context for some of the concepts we will discuss later on.
Setting up a hot wallet is as simple as installing an application and following the on-screen steps required to set it up. I recommend one of the following hot wallets:
For mobile and tablet devices: * Phoenix Wallet (https://phoenix.acinq.co/) * Muun Wallet (https://muun.com/) * Breez Wallet (https://breez.technology/)
A hot wallet may ask you to privately write a secret code onto paper, do not ignore this step if it is provided. In some cases, the option to back up may be presented to you after you have set up the wallet or may be hidden in settings. Be sure to back up your wallet before continuing.
Hot wallets generate and save sensitive information on your personal device. This makes it suitable for keeping only small amounts at a time. A hot wallet sacrifices some security, but is convenient, making it appropriate for daily spending and earning.
As you accrue more bitcoin on this wallet, you will want to transfer funds to a cold wallet in order to ensure that any amount of any significance is safely secured.
Setting up a cold wallet
Cold wallets are named as such because the sensitive information, that allows spending funds, is kept away from personal devices that might become compromised or vulnerable during its lifetime. By contrast, "hot" refers to sensitive information that is subject to becoming compromised remotely (i.e. via the internet, or via malware that infects connected drives and devices until it can broadcast sensitive information online).
Security focused hardware is required to create a cold wallet (or pages of complicated mathematics, but no one does that). These devices are often called bitcoin signing devices, or hardware wallets. It is important to keep in mind, that devices that market themselves as convenient and multi-purpose should be avoided as they are more likely to have vulnerabilities that can eventually lead to disaster and loss of funds.
The best devices are marketed as "air-gapped", and will have instructions explaining how to use it for spending without having it connected it to a personal device via a cable, or via wireless technology. These are my currently known to be suitable and recommended devices for creating a cold wallet:
- ColdCard (https://coldcard.com/)
- Seed Signer (https://seedsigner.com/)
Secure with dice or coin flips
At the heart of all bitcoin security, and indeed all digital security, is a unique, large, random number. Computers cannot produce random numbers, but they can create random-looking numbers.
Some devices provide a "true random number generator" (TRNG) device that reads small atmospheric signals in an attempt to produce unique and unpredictable numbers. Many will also allow you to enter your own random numbers sourced from around 151 dice rolls, or 256 coin flips; dice rolls and coin filps are universally accepted as a fair, reliable source of randomness.
When setting up your cold wallet, find and use the appropriate feature to input your own dice rolls or coin flips to ensure that you have a genuinely secure wallet - unaffected by vulnerabilities or limitations that may exist in electronic hardware designed for mass production.
The importance of isolation
Keeping the cold wallet away from your personal devices and anything that could be infected or hacked, will help to protect your cold wallet for a lifetime. This is not always possible if you ever need to update the device, but you should certainly avoid connecting the device to anything other than a power supply when creating your cold wallet and while using it to perform sensitive operations like signing transactions.
When setting up your device, you will be prompted to "write down" or "backup" a set of English words (typically 12 or 24 words). Do not enter these words onto a personal device or capture them in any photos. Your backup, and all records and copies of it, must also remain inaccessible from the internet at all times. If you ever discover that the backup may have been compromised, you should set up a new cold wallet and move any funds from your old to your new wallet as the funds are now susceptible to remote, silent theft.
Setting up a watch-only wallet
Once you have your cold wallet created, you will want to be able to conveniently add to it, and periodically check your activity and balance. This is exactly what a watch-only wallet does, and your hardware wallet can be relegated to authenticating withdrawals and spends only.
The watch-only wallet provides a convenient interface for your cold wallet, but it has no authority to spend from it. This allows it to be installed on your personal devices for convenience, and even if any malware or hacker gains access to it, they will still be unable to steal from it.
The following applications are able to act as a watch only wallet:
For mobile and tablet devices: * BlueWallet (https://bluewallet.io/) * Nunchuck (https://nunchuk.io/)
For desktop or laptops: * Sparrow Wallet (https://www.sparrowwallet.com/) * Electrum (https://electrum.org/)
To set up a watch-only wallet, you will need to find the appropriate feature on your hardware wallet to "export your wallet" or "export XPUB" (XPUB stands for extended public key, it is what a watch only wallet uses to understand where to find the bitcoin your hardware device controls).
You will then need to either scan a QR code, or transfer a file to your personal device to import the details for your watch-only wallet.
Physical seed word backups
By now, you will have been prompted to write down and back up some sensitive information. It is important that this backup is kept safe, not only from theft, but also from harm.
For your cold wallet, the "seed words" are effectively 99% of the information required to gain access to your wallet, should your hardware device get destroyed, or should someone else inherit the wallet. You may also have written down a "wallet descriptor" which helps to provide the last 1% of information, however even without it, most wallets are able to discover and assume control of your bitcoin with just the seed words.
To avoid any sort of damage, the standard is to imprint these words onto a stainless steel plate using jewellery metal stamping kits. These plates are relatively cheap and will resist damage from water, fire and bending over time.
To avoid theft, the plate should be covered and sealed with a tamper evident seal. A metallic cover will prevent theft by touch, and a tamper evident bag will keep inquisitive and curious minds from discovering and compromising the sensitive information.
The plate should be kept hidden in plain sight, or kept out of view to avoid garnering the attention of strangers and tradespeople whom you don't trust, but should also be accessible for you to be able to visually inspect from time to time, verifing that the tamper evident seal has not been compromised.
To protect against loss or negligence, copies can be made, however keep in mind that copies naturally increase the chances of theft.
At this point, the sensitive information is unlikely to be discovered and compromised unless somebody has a reason to premeditate a targeted robbery of your bitcoin. Once you are happy with your backup solution, you are ready to receive the bitcoin I have left to you.
If you wish to investigate further protection ideas designed to aid in inheritance planning (or to just feel like a super-spy), there are much more advanced ideas which start by fragmenting your sensitive information in order to allow storage in multiple locations, such that a thief would have to find and combine them all to steal your bitcoin; you should investigate "SeedXOR" and "Shamirs Secret Sharing scheme" to learn more on this topic. If you wish to share custody with someone else, look into bitcoin "multisig" ideas which allow for a setup where nothing can be spent or withdrawn without multiple parties agreeing to digitally sign the transaction.
Guidance
By now, you understand the significance of seed words, and more importantly, the sensitive nature of them. Please follow these principles to ensure that you, and you alone, have the ability to use and spend the bitcoin I pass on to you, at all times:
- Don't draw attention to yourself.
- Never reveal seed words to anyone.
- Never entrust your bitcoin to others.
- Security is much easier in the physical realm.
- Don't get too clever; future you won't appreciate it.
Don't draw attention to yourself
It should come as no surprise, that boasting about yourself in earshot of the wrong person can lead to trouble. There is a reason that celebrities and wealthy individuals pay for security guards to protect them in public; they have wealth that others would take for themselves if given the opportunity.
In the worst cases, you or your friends and family may be attacked and harmed in such an attempt. If you wish to live luxuriously, either try to keep a low and private profile, or be sure to invest well into your personal security.
Never reveal seed words to anyone
Seed words are private. Anyone who might have a copy, or who might be able to recall your seed words will have access to your bitcoin and can move them without notice at any time. In such a case, no insurer will cover your losses, law enforcement are unlikely to recover any funds, and nobody can undo the damage.
Allowing people to see your seed words, is the same as handing out copies of your home keys and expecting no one to break in and break or steal your in-valuables. Worse still is if someone you trusted were to expose those words to someone else, you will only ever have yourself to blame, and only you will suffer the losses of such a mistake.
Never entrust your bitcoin to others
Companies around the world will offer to protect your bitcoin on your behalf as a custodian; some may even do it for free. No matter how reputable the company, you do not own bitcoin if you use their services; you are given a legally backed promise, in exchange for a very valuable and scarce asset - it is not worth the trade.
As many past examples have shown, when such a promise is broken, the law cannot always provide appropriate compensation and in some cases, it can prevent you from being compensated at all when bankruptcy is on the table. If you must use a custodian, use it only for small amounts at a time and in small periods of time.
As a side note, this is exactly the situation with government money sitting in a bank, and even to an extent with physical cash. The "economy" is always more important than your own situation, even if you are homeless with only a little money to get by. This bitcoin is our lifeboat should the needs of the economy outweigh our human rights.
Security is much easier in the physical realm
Most computers and electronic devices are terrible at protecting your privacy; personal computers, laptops, tablets and mobile devices are optimised for speed over security. A fitting example of this is when you delete a file, the file is marked as deleted, but the data remains on the physical disk until another file happens to write over it some time in the future. Actually deleting the file would cost time and energy, making the device feel slow and unresponsive, and personal devices are designed for convenience, not for security.
Never type your seed words into a personal computer; as convenient as it may seem to be able to create a digital copy, it is not worth the risk of losing your bitcoin to cyber criminals.
It should be noted also, that photos with words on them are no more secure than text files; do not take photos of your seed words, and if you ever feel like your bitcoin might be at risk, take the appropriate steps to move the bitcoin to a new wallet.
By keeping your seed words away from electronic devices, your bitcoin is infinitely more secure than those stored with a custodian. Custodians need to invest resources and effort in monitoring and risk management, trying to find the a balance between customer convenience and security.
Using specialised hardware, and by distributing funds appropriately to different kinds of wallets such as hot and cold wallets, we are able to create much the same convenience of custodial services, with much stronger security, less financial risk, and at the cost of a slightly more time spent setting up. You will be able to view your balance and request and receive funds without ever jeapordizing your exclusive ability to spend for your larger wallets, while having the ability to spend more frequently and much more easily from hot wallets with smaller amounts, trading off simpler security, for greater convenience.
Don't get too clever; future you won't appreciate it
When we first learn about how we can hide and protect our physical seed words, many of us attempt to use local knowledge and our own experiences to concoct a unique strategy such as mixing words or disguising them as pictures or references to pages in a niche book.
This type of strategy often requires leaving little to no clues for our future selves and many people find themselves struggling to recover their words when they urgently need it later.
It is better to follow popular solutions that you can refer back to in the future. Of course the complexity and effort of the solution you choose to put into the security of a wallet should somewhat match the amount you wish to protect with it. You can always create more secure wallets in the future if you accrue more, or find that your bitcoin has become much more valuable in the future.
If you still desire to experiment with ideas, be sure to experiment with relatively small amounts until you are confident with the safety and longevity of your setup.
Claiming your inheritance
By now you have the tools, knowledge and experience to claim and care for the bitcoin that I am entrusting to you.
In order to ensure that the bitcoin did not land in the hands of the wrong person, I fragmented the key and you will find them in the following locations:
- The first fragment is accompanied with this letter that you found in my safe.
- The second is within an email I had sent you on the 1st of January 2020 with instructions to keep private and safe and 12 random words.
- The final fragment is the words
bacon bacon bacon bacon bacon bacon bacon bacon bacon bacon bacon bacon
(x12).
To properly combine the fragments, you will need to follow the instructions found on this website: https://github.com/dipunm/seedxor. The final seed after combining the fragments will have 12 words and the last word will be
author
.Use the provided seed signer device to finally claim control of the bitcoin, and then follow these steps to ensure you are properly set up to go about your day without worrying about the security of your inherited bitcoin:
- Set up a watch-only wallet for this new cold wallet you have inherited.
- Send only a small amount of it to the cold wallet you created for yourself earlier.
- Reset your hardware wallet.
- Restore your backed up seed words to re-instate the hardware wallet.
- Use your own watch-only and your hardware wallet together to move the funds back to the inherited cold wallet.
Once you have done this, you can be certain that you have set up your cold wallet correctly.
- Send a small amount from the inherited wallet to your hot wallet for carrying around with you.
- Move the rest of the funds to your own cold wallet.
These steps may take time, and they may incur fees, however it is important to follow these steps for peace of mind.
I hope dearly that this inheritance serves you well and that you will build onto it or with it, a legacy worth passing down yourself for generations to come.
Note: if you want to learn more about how to prepare for inheritance, this letter is only one part of it. Read about what else you may wish to prepare in my follow-up post: nostr:naddr1qq24jemrxgm56wp4wfx5vwpnfcm4qut42ve95q3qpktmatjk0l8vn3jhfuwxaasjd65kn4ye9sce3egup7k993f8fg2qxpqqqp65w0uc55y
-
@ 75656740:dbc8f92a
2023-07-19 21:56:09All social media companies quickly run into the impossible problem of content moderation. I have often seen commentary suggesting that Twitter, FaceBook, etc need to make some particular adjustment to their content moderation policy. Perhaps they should have clearer rules, be more transparent about moderation actions taken, err on the side of permissiveness, have community moderation, time outs vs bans etc. My thesis, however, is that all such endeavors are doomed to failure. The problem is that maintaining signal to noise over a single channel cannot scale.
If a platform wants to remain relevant to the majority of people, it needs to maintain signal. Filtering is a fundamental feature of communication. Even in-person conversations between individuals break down without self-filtering to stay on topic and maintain constructive relations. Long range delivery systems have a second order problem that makes the issue even worse.
All delivery-by-default communication systems succumb to spam. This is without exception. Mail, phone, fax, email, text, forums, etc. have all fallen to spam and now require herculean efforts to maintain signal through extensive filtering. The main offenders are non-human entities that have a low barrier to entry into the network. Once in, delivery-by-default allows and motivates swamping out competing signals for user attention.
In combating this problem most platform operators do seem to act in good-faith while implementing filters. They are even fairly successful. But they end up with the same problem as economic central planners and Maxwell's Daemon; to do the job perfectly they require more information than the system contains. This means that the system is guaranteed to fail some users. As a successful platform scales the filtering needs will outrun the active users by some f(n) = n^k where k is greater than 1. This follows from the network effect of greater information being contained in the edges of the graph than in its nodes.
For networks like Facebook and Twitter the impossible threshold is many orders of magnitude past. What can be maintained on a small mailing list with the occasional admonition, now requires tens of thousands of swamped moderators that still can't begin to keep up. Those moderators have to make value judgements for content generated by people they don't know or understand. Even the best meaning moderators will make bias mistakes. Thus the proportion of unhappy users will also scale non-linearly with size.
The impossible problem takes a second step in the presence of civil authority. The problem is that a filter being necessary means that a filter exists. A civil authority and other motivated actors will not be able to leave a filter be, without at least attempting to tip the scales. Again they are generally well-meaning. But what they consider noise, may not actually be noise.
Well-meaning is probably a stretch given that levers of power tend to attract the attention of people who like that sort of thing, but I like to assume the best. I tend to think that there were some early signs of Jack stressing out under the load of bearing this problem. He didn't want it but there just wasn't anyway out of it. You must maintain signal or die!
But there is light at the end of the tunnel. The problem only exists with delivery-by-default when reach is universal (a problem for another post) with distributed systems there is still a filter but it is no longer any one entity's problem. Once the social graph is complete, deny-by-default can work wonders since each node can decide what to allow.
I don't know what the final filtering mechanism will look like, but Nostr is a lovely chance to experiment.
-
@ fd78c37f:a0ec0833
2023-09-08 13:27:30"Read more related articles, follow on the anti-censorship long content platform yakihonne.com.
Kraken, a crypto exchange, is making strategic moves to broaden its offerings in trading and payment.
After FTX’s downfall last November, Kraken’s subsidiary Crypto Facilities aims to target the lucrative derivatives sector, which had $1.85 trillion in trading volume across centralized exchanges last month alone.
Concurrently, Kraken is also widening its payment methods, introducing PayPal deposits for its UK and European customers.
Crypto Facilities, acquired by Kraken in 2019, is presently in talks with the UK’s Financial Conduct Authority (FCA) for permission to expand its custodial services, Bloomberg reported on Sep. 7.
The London-based unit is eyeing the opportunity to offer futures contracts denominated in fiat currencies like euros and pounds, an expansion over its existing multilateral trading facility license granted in 2020.
Mark Jennings, CEO of Crypto Facilities, envisions these expansions to materialize within six to 12 months. However, he remains cautious about immediate market recovery, indicating that the trading volume is now around $100 million, a sharp decline from $700 to $800 million per day prior to the FTX fallout.
You might also like: Kraken dominates US altcoin market liquidity in July
Simultaneously, Kraken is making headway in improving its payment features.
On Sep. 7, Kraken rolled out support for PayPal deposits in the UK and Europe, a feature that’s currently limited to its mobile app.
This allows users to quickly fund their accounts with a 2.4% fee and holds the potential to make crypto more accessible to a broader demographic.
To utilize this service, users must pass an Intermediate or Pro level verification and can deposit up to £1,000 ($1,250) daily. The funds become available almost instantly but are subject to a seven-day withdrawal hold.
This comes on the heels of Kraken’s interface makeover and the addition of PayPal’s new stablecoin, PYUSD, to its platform.
These developments occur in the context of a broader trend where multiple US-based crypto platforms are exploring global expansion in response to heightened attention from regulatory entities such as the Securities and Exchange Commission (SEC) and the Commodity Futures Trading Commission (CFTC).
Recently, Kraken discontinued its crypto staking services in the U.S. following a settlement with the SEC.
By:Bralon Hill Link:https://crypto.news/kraken-expands-offerings-in-crypto-derivatives-adds-paypal-support-in-europe-and-uk/
-
@ 32e18276:5c68e245
2023-07-19 02:56:47I’m so lazy I’m thinking of running the damus merch store via stateless and serverless lightning payment links. All data is collected and stored in the lightning invoice descriptions which are fetched from your node. You can do this without having to run any server code except a lightning node!
This is the same tech we used when selling merch as at bitcoin Miami. It was extremely reliable. I love these things, they are so easy. Integrating with the legacy fiat system is such a pita, It may just be a lightning-only store for now because of how simple this is. Here's what a lightning payment link looks like:
http://lnlink.org/?d=ASED88EIzNU2uFJoQfClxYISu55lhKHrSTCA58HMNPgtrXECMjQuODQuMTUyLjE4Nzo4MzI0AANgB6Cj2QCeZAFOZ1nS6qGuRe4Vf6qzwJyQ5Qo3b0HRt_w9MTIwJm1ldGhvZD1pbnZvaWNlfG1ldGhvZD13YWl0aW52b2ljZSZwbmFtZWxhYmVsXmxubGluay0mcmF0ZT04BERlYXRoIFN0YXIABQAAAGQGQW4gb2JqZWN0IG9mIHVuZmF0aG9tYWJsZSBwb3dlcgAHEwhodHRwczovL3VwbG9hZC53aWtpbWVkaWEub3JnL3dpa2lwZWRpYS9lbi9mL2Y5L0RlYXRoX3N0YXIxLnBuZwA=
How it works
The entire product page is stored as data in the url. When a customer click the link, the product info is decoded and rendered as a webpage. The data in the url includes
- The product name
- Description
- Price in sats
- Product image url
- Fields to collect data from the user
- Lightning node address
- Lightning node rune for fetching and waiting for invoice payments
This works thanks to a javascript library I created called "lnsocket". It allows you to connect to your CLN node over websockets. Once the user fills out all of the info, a new lightning invoice is fetched with this information in the description, by connecting directly to your node. This connection is end-to-end encrypted thanks to the lightning protocol itself.
To your lightning node, it looks like another lightning node is connecting to it, but in reality it's just a dumb client asking for things.
At this point, custom lightning packets called "commando" packets are sent to your node which asks your node to run certain commands. CLN authenticates these packets using the rune and then returns a response. This is pretty much the same as calling these commands directly on your lightning node, except now someone is doing it from a browser in a secure way!
Why not just run btcpayserver?
btcpayserver is cool and is more powerful, but I like exploring simpler ways to do things that don't require running lots of software which can be challenging for many non-technical people. You shouldn't have to become a server administrator to start accepting payments. It should be as simple as running a bitcoin and lightning node, pushing all of the application logic to the clients.
This is a similar philosophy to what we have in the nostr space. Let's make it easier for people to use self-sovereign tools. Everyone deserves freedom tech.
Anyways, I'm still working on https://lnlink.org. I just added images and nostr address support! You can make your own payment links here! Try it out:
http://lnlink.org/?d=ASED88EIzNU2uFJoQfClxYISu55lhKHrSTCA58HMNPgtrXECMjQuODQuMTUyLjE4Nzo4MzI0AANgB6Cj2QCeZAFOZ1nS6qGuRe4Vf6qzwJyQ5Qo3b0HRt_w9MTIwJm1ldGhvZD1pbnZvaWNlfG1ldGhvZD13YWl0aW52b2ljZSZwbmFtZWxhYmVsXmxubGluay0mcmF0ZT04BERlYXRoIFN0YXIABQAAAGQGQW4gb2JqZWN0IG9mIHVuZmF0aG9tYWJsZSBwb3dlcgAHEwhodHRwczovL3VwbG9hZC53aWtpbWVkaWEub3JnL3dpa2lwZWRpYS9lbi9mL2Y5L0RlYXRoX3N0YXIxLnBuZwA=&edit=1
-
@ fd78c37f:a0ec0833
2023-09-08 13:25:30"Read more related articles, follow on the anti-censorship long content platform yakihonne.com.
In a move that underscores the momentum of Bitcoin Ordinals protocol ecosystem, the OnChainMonkey (OCM) project has committed to migrating its entire digital art collection from Ethereum to Bitcoin.
In total, moving the collection, which includes burning the old NFTs on Ethereum so they can no longer be traded, cost the project over $1 million in Bitcoin fees.
OnChainMonkey, created by Metagood, became the first profile picture collection created entirely on-chain in a single Ethereum transaction back in 2021. Further, it launched its first Ordinals collection in February shortly after the Ordinals launch.
Notably, the decision was supported by a broad portion of OnChainMonkey NFT owners, with users voting to subsidize a portion of the substantial migration cost.
The DAO proposal gained overwhelming support, with a quorum of 2,000 votes reached within 24 hours. Overall, 99% of voters backed the migration to Bitcoin, a sign that signals NFT users believe Ordinals on Bitcoin may have a greater value than Ethereum-backed NFTs.
"Our OCM community has conviction in our move to Bitcoin. We have been involved with Ordinals since the beginning of the year, and the OCM community, in particular, has a great understanding of the potential and benefits of the migration to Bitcoin," Metagood CEO Danny Yang said.
The transaction comes at a time when the Ordinals market has cooled considerably, with total transaction volumes and sales across exchanges seeing a notable decline.
That said, the news suggests this sector of the market could be gearing up for a second push given that Bitcoin Ordinals represent such a significant technology improvement over crypto-based NFTs.
By:REED MACDONALD Link:https://bitcoinmagazine.com/culture/onchainmonkey-1-million-migrate-nfts-to-bitcoin
-
@ 32e18276:5c68e245
2023-07-16 22:47:17Hey guys, I just pushed a new Damus update TestFlight. This should drastically improve longform event rendering. Let me know if you find any bugs!
Full Changelog
Added
- New markdown renderer (William Casarin)
- Added feedback when user adds a relay that is already on the list (Daniel D'Aquino)
Changed
- Hide nsec when logging in (cr0bar)
- Remove nip05 on events (William Casarin)
- Rename NIP05 to "nostr address" (William Casarin)
Fixed
- Fixed issue where hashtags were leaking in DMs (William Casarin)
- Fix issue with emojis next to hashtags and urls (William Casarin)
- relay detail view is not immediately available after adding new relay (Bryan Montz)
- Fix nostr:nostr:... bugs (William Casarin)
-
@ ec42c765:328c0600
2023-08-13 10:54:21[3]
[4]
[5]
[6]
[7]
[8]
[9]
[10]
[11]
[12]
[13]
[14]
[15]
[16]
[17]
[18]
[19]
[20]
[21]
[22]
[23]
[24]
[25]
[26]
[27]
[28]
[29]
[30]
[31]
[32]
[33]
[34]
[35]
-
@ d266da53:7224d834
2023-09-08 13:23:55Stay updated on the latest developments in Crypto , follow me on Yakihonne.com.
Mirae Asset Securities, South Korea's largest financial group with over $500 billion in assets under management, said Thursday that it is working with Ethereum scaling platform Polygon Labs to advance tokenization within finance and boost adoption of Web3 technologies.
Polygon Labs will be a technical consultant in The Mirae Asset Security Token Working Group, which is working to create infrastructure to issue, exchange, and distribute tokenized securities, the asset manager said in the press release shared with CoinDesk.
The group includes several other companies, including Linger Studio and Coin Plug, and operates independently from Mirae, Hana Financial and SK Telecom's security token consortium, Next Finance Initiative (NFI).
"Polygon Labs is a leading global blockchain technology development company that is innovating throughout all aspects of Web3. Through technical collaboration with Polygon Labs, Mirae Asset Securities aims to establish global leadership in the field of tokenized securities," Ahn In-sung, head of the digital assets division at Mirae Asset Securities, said.
Tokenization involves bringing real-world assets, such as real estate, bonds, fine art, and equities, as digital tokens on a blockchain.
Several traditional finance giants, including Franklin Templeton and Hamilton Lane, a top-tier investment firm with over $823.9 billion in assets under management, have already initiated tokenization projects on Polygon. The Monetary Authority of Singapore's experimental tokenization initiative, Project Guardian, executed foreign exchange and sovereign bond transactions on Polygon last year.
Per Boston Consulting Group and investment firm ADDX, asset tokenization, as a business opportunity, is likely to increase 50 times to $16.1 trillion by 2030, accounting for 10% of the global gross domestic product.
Polygon Lab's Executive Chairman Sandeep Nailwal expects Mirae's efforts to boost the adoption of Web3 technologies in the financial industry.
“Mirae is a great example of a progressive, forward-looking company that aims to stay up to date with the constantly evolving world of digital finance. Its foray into tokenization will undoubtedly help accelerate the mass adoption of web3 among other financial institutions,” Nailwal said “At the same time, Mirae’s initiatives will also greatly contribute to establishing interoperability between South Korea’s domestic financial systems and their foreign counterparts," he added.
CORRECTION (Sept. 7, 09:33 UTC): Adds dropped word "billion" in first paragraph.
By:Omkar Godbole Link:https://www.coindesk.com/business/2023/09/07/500b-korean-asset-manager-taps-polygon-labs-to-develop-tokenized-securities-network/
-
@ 32e18276:5c68e245
2023-07-11 21:23:37You can use github PRs to submit code but it is not encouraged. Damus is a decentralized social media protocol and we prefer to use decentralized techniques during the code submission process.
[Email patches][git-send-email] to patches@damus.io are preferred, but we accept PRs on GitHub as well. Patches sent via email may include a bolt11 lightning invoice, choosing the price you think the patch is worth, and we will pay it once the patch is accepted and if I think the price isn't unreasonable. You can also send an any-amount invoice and I will pay what I think it's worth if you prefer not to choose. You can include the bolt11 in the commit body or email so that it can be paid once it is applied.
Recommended settings when submitting code via email:
$ git config sendemail.to "patches@damus.io" $ git config format.subjectPrefix "PATCH damus" $ git config format.signOff yes
You can subscribe to the [patches mailing list][patches-ml] to help review code.
Submitting patches
Most of this comes from the linux kernel guidelines for submitting patches, we follow many of the same guidelines. These are very important! If you want your code to be accepted, please read this carefully
Describe your problem. Whether your patch is a one-line bug fix or 5000 lines of a new feature, there must be an underlying problem that motivated you to do this work. Convince the reviewer that there is a problem worth fixing and that it makes sense for them to read past the first paragraph.
Once the problem is established, describe what you are actually doing about it in technical detail. It's important to describe the change in plain English for the reviewer to verify that the code is behaving as you intend it to.
The maintainer will thank you if you write your patch description in a form which can be easily pulled into Damus's source code tree.
Solve only one problem per patch. If your description starts to get long, that's a sign that you probably need to split up your patch. See the dedicated
Separate your changes
section because this is very important.When you submit or resubmit a patch or patch series, include the complete patch description and justification for it (-v2,v3,vn... option on git-send-email). Don't just say that this is version N of the patch (series). Don't expect the reviewer to refer back to earlier patch versions or referenced URLs to find the patch description and put that into the patch. I.e., the patch (series) and its description should be self-contained. This benefits both the maintainers and reviewers. Some reviewers probably didn't even receive earlier versions of the patch.
Describe your changes in imperative mood, e.g. "make xyzzy do frotz" instead of "[This patch] makes xyzzy do frotz" or "[I] changed xyzzy to do frotz", as if you are giving orders to the codebase to change its behaviour.
If your patch fixes a bug, use the 'Closes:' tag with a URL referencing the report in the mailing list archives or a public bug tracker. For example:
Closes: https://github.com/damus-io/damus/issues/1234
Some bug trackers have the ability to close issues automatically when a commit with such a tag is applied. Some bots monitoring mailing lists can also track such tags and take certain actions. Private bug trackers and invalid URLs are forbidden.
If your patch fixes a bug in a specific commit, e.g. you found an issue using
git bisect
, please use the 'Fixes:' tag with the first 12 characters of the SHA-1 ID, and the one line summary. Do not split the tag across multiple lines, tags are exempt from the "wrap at 75 columns" rule in order to simplify parsing scripts. For example::Fixes: 54a4f0239f2e ("Fix crash in navigation")
The following
git config
settings can be used to add a pretty format for outputting the above style in thegit log
orgit show
commands::[core] abbrev = 12 [pretty] fixes = Fixes: %h (\"%s\")
An example call::
$ git log -1 --pretty=fixes 54a4f0239f2e Fixes: 54a4f0239f2e ("Fix crash in navigation")
Separate your changes
Separate each logical change into a separate patch.
For example, if your changes include both bug fixes and performance enhancements for a particular feature, separate those changes into two or more patches. If your changes include an API update, and a new feature which uses that new API, separate those into two patches.
On the other hand, if you make a single change to numerous files, group those changes into a single patch. Thus a single logical change is contained within a single patch.
The point to remember is that each patch should make an easily understood change that can be verified by reviewers. Each patch should be justifiable on its own merits.
If one patch depends on another patch in order for a change to be complete, that is OK. Simply note "this patch depends on patch X" in your patch description.
When dividing your change into a series of patches, take special care to ensure that the Damus builds and runs properly after each patch in the series. Developers using
git bisect
to track down a problem can end up splitting your patch series at any point; they will not thank you if you introduce bugs in the middle.If you cannot condense your patch set into a smaller set of patches, then only post say 15 or so at a time and wait for review and integration.
-
@ b3590d02:0f2b1ae4
2023-07-06 18:44:20Verification: tweet
Badge implications:
- an account that joined Twitter in 2010 or earlier
- an account with fewer than 10,000 followers
Twitter user tweetious profile information:
- Joined in 2008
- Follower count: 699
- Following count: 529
-
@ c80b5248:6b30d720
2023-07-05 02:40:47I have been sleeping on highlighter. Started testing with nsecBunker and I am seeing how much signal comes through on the global feed here. Still need to understand how to use it better, but this could be a hugely powerful format for information consumption.
Expect this post to be updated... little did I know I was writing my first long-form note! 😅
-
@ 18e3af1e:1d42e5df
2023-08-13 02:37:41Las comunidades son creadas mediante el esfuerzo de no solo un individuo, sino al trabajo de docenas; cientos o miles de personas. Mediante la especialización, como especie, logramos entender que: el saber hacer una sola cosa no significa morir de hambre, o no estar bien preparado para un ataque; por lo contrario, el dominio o maestría de una sola cosa... Puede crear una civilización entera.
Permitirnos un enfoque certero para aprender, dominar y amaestrar nuestras actividades en un periodo de tiempo finito, permitió nuestro avance hacia nuevos campos, de hecho, movió nuestra meta en magnitud tal, que al imaginar el pasado (para muchos) parece mas bien una película cómica y sombría.
Hoy en día, en un mundo regido por individualismo en el reino físico, la manifestación de constructores de comunidades sigue presente en el (reino) digital.
La evolución de la construcción
A lo largo de la historia de la humanidad, la construcción ha evolucionado desde simples refugios hasta monumentos arquitectónicos y estructuras vanguardistas. Los primeros humanos crearon refugios rudimentarios con materiales naturales. Con la civilización, surgieron las primeras estructuras permanentes, como pirámides y templos, reflejando la organización social y creencias religiosas. La antigua Roma introdujo la innovación en la ingeniería con acueductos y arcos. La Edad Media vio fortificaciones y catedrales góticas que fusionaban espiritualidad y técnica. El Renacimiento abrazó la proporción y la simetría en palacios y edificios renombrados. La Revolución Industrial marcó un cambio radical con el acero y el hormigón, permitiendo rascacielos y puentes icónicos.
El siglo XX trajo consigo la era de los rascacielos y la arquitectura modernista, desafiando límites estructurales y estéticos. La sostenibilidad ganó importancia en el siglo XXI, impulsando la incorporación de tecnologías avanzadas, como la impresión 3D y la construcción modular. La historia de la construcción es un testimonio de la creatividad y la adaptabilidad humanas, reflejando no solo avances técnicos, sino también valores culturales y aspiraciones.
En el día hoy, los desarrolladores de software y tecnología podrían considerarse como los constructores del próximo siglo. Al igual que los constructores en otras épocas históricas, los desarrolladores de software son responsables de crear estructuras digitales que moldean la forma en que interactuamos, comunicamos y vivimos en el mundo moderno.
A medida que la tecnología continúa avanzando y la sociedad se vuelve cada vez más digital, el papel de los desarrolladores de software se vuelve crucial en la construcción de soluciones tecnológicas que abordan una amplia gama de desafíos.
Así como los arquitectos y constructores antiguos debían entender la física, la estética y las necesidades humanas para diseñar y construir edificios funcionales y atractivos, los desarrolladores de software deben comprender la lógica de programación, la experiencia del usuario, la seguridad cibernética y la innovación tecnológica para crear aplicaciones, sistemas y plataformas que sean útiles y efectivos.
Individuos que inspiran
La inspiración individual es un poderoso motor de cambio que puede tener un impacto significativo en la mente colectiva de una comunidad o sociedad. Cuando una persona demuestra pasión, determinación y una visión positiva, puede influir en otros a nivel emocional y cognitivo. Aquí hay algunas formas en que la inspiración individual afecta a la mente colectiva:
La gente puede verse reflejada en las luchas y logros de alguien más, lo que crea un sentido de unidad y comunidad. Esto puede generar un mayor apoyo y solidaridad en torno a ciertas causas o valores. Ademas, la inspiración individual puede llevar a la acción. Cuando las personas son testigos de un individuo que supera obstáculos o logra metas desafiantes, esto puede motivar a otros a enfrentar sus propios desafíos y trabajar hacia sus objetivos. El ejemplo de una sola persona puede encender la chispa de la acción en muchas más.
La inspiración individual puede tener un efecto multiplicador. Cuando una persona inspirada comparte su historia o experiencia, puede inspirar a otros, creando una cadena de influencia que se extiende a través de redes sociales, comunidades y sociedades enteras. Esto puede tener un impacto a gran escala en la mente colectiva.
El individuo inspirador tiene el potencial de influir profundamente en la mente colectiva al cambiar percepciones, motivar la acción y crear una sensación de comunidad y unidad.
Comunidades: origen, inicios y progreso.
Las comunidades han sido una parte fundamental de la experiencia humana a lo largo de la historia. Desde los primeros tiempos hasta la era moderna, las comunidades han evolucionado y cambiado en respuesta a las necesidades, avances tecnológicos y contextos culturales.
Desde los primeros días de la humanidad, nuestros antepasados se agruparon en pequeñas comunidades para sobrevivir. Estas comunidades eran grupos familiares o tribus que compartían recursos y conocimientos para cazar, recolectar alimentos y protegerse de los peligros. La cooperación y la solidaridad eran esenciales para la supervivencia.
Con el desarrollo de la agricultura, las comunidades evolucionaron hacia asentamientos más permanentes. La capacidad de cultivar alimentos permitió la formación de aldeas y pueblos, donde la gente podía establecerse y construir relaciones más complejas. Esto llevó al surgimiento de una división del trabajo más especializada y al desarrollo de habilidades artesanales.
Las civilizaciones antiguas, como la sumeria, egipcia, griega y romana, dieron paso a la formación de ciudades y sociedades más organizadas. Las comunidades se convirtieron en centros de comercio, gobierno y cultura. Se construyeron estructuras monumentales, como templos y palacios, que unificaron a las personas en torno a creencias religiosas y sistemas políticos.
Durante la Edad Media, las comunidades se organizaron en torno a sistemas feudales. Los señores feudales gobernaban sobre las tierras y las personas locales. Las aldeas y feudos eran autónomos en gran medida y se centraban en la agricultura y la autosuficiencia.
La Revolución Industrial marcó un cambio importante en la estructura de las comunidades. La industrialización dio lugar a la urbanización, con muchas personas dejando las zonas rurales para trabajar en fábricas en las ciudades.
En la era moderna, las comunidades han continuado evolucionando con avances tecnológicos y la globalización. Las redes sociales y las comunicaciones digitales han conectado a personas de todo el mundo, creando comunidades virtuales en línea.
Bitcoin | Nostr y la chispa del constructor
Como ya vimos, un solo individuo puede inspirar a muchos otros, teniendo un efecto multiplicador. Esto no solo se traduce al mundo físico, por el contrario, esta directamente ligado a nuestra psicología, incluso podemos decir que va aun mas allá, adentrándonos en el terreno ideológico y espiritual.
Hasta hace no mucho, estábamos a merced de las grandes corporaciones que construían todo por nosotros, mientras esperábamos con ansias las nuevas actualizaciones de cada iteración de sus productos. Cada vez mas y mas nos hacíamos dependientes de dichas corporaciones sin quizás notarlo, poco a poco se fueron apoderando de nuestro tiempo y muy insidiosamente de nuestra personalidad e identidad.
Gracias a las alternativas presentadas hoy en día y a los individuos que inspiran a otros, existe la posibilidad de construir algo que va mas allá de las grandes corporaciones, porque transciende no solo el nivel físico y digital, sino que también transciende a los individuos que aportan a la comunidad. Estoy hablando por supuesto de Nostr, y como los incentivos están alineados gracias a Bitcoin.
Pongamos como ejemplo un par de nombres para ilustrar como individuos que inspirar pueden crear una chispa que se extiende a cada persona dentro de la comunidad.
Personajes como nostr:npub1l2vyh47mk2p0qlsku7hg0vn29faehy9hy34ygaclpn66ukqp3afqutajft nostr:npub1utx00neqgqln72j22kej3ux7803c2k986henvvha4thuwfkper4s7r50e8 nostr:npub1v0lxxxxutpvrelsksy8cdhgfux9l6a42hsj2qzquu2zk7vc9qnkszrqj49 nostr:npub107jk7htfv243u0x5ynn43scq9wrxtaasmrwwa8lfu2ydwag6cx2quqncxg (entre muchos otros que podría mencionar pero todo el articulo seria una lista de nombres) han inspirado a otros desarrolladores, creadores de contenido (y todas las otras especializaciones que te puedas imaginar…) A construir sobre este protocolo. Incluso, personas como el caso mas reciente de nostr:npub1m64hnkh6rs47fd9x6wk2zdtmdj4qkazt734d22d94ery9zzhne5qw9uaks han encontrado inspiración para aprender a programar sobre estos mismos rieles.
nostr:nevent1qqs8fe938k7j5sxcprrv89ezpu09m9pzm90f0sq24hnwlwu0rmn09qcpzemhxue69uhhyetvv9ujumn0wd68ytnzv9hxg5vtygh
La chispa del constructor en palabras mas concisas es: Inspiración multiplicadora en pos de la productividad y por ende, del crecimiento de una comunidad.
Sin Bitcoin y Lightning Network, esto seria posible, pero mucho menos efectivo debido a que las personas detrás de toda labor que este enfocada en creación de contenido, desarrollo, etc. Tienen que comer.
Conclusión
La chispa del constructor radica en la inspiración individual que impulsa a la acción colectiva. Desde la evolución de la construcción hasta las comunidades digitales, el poder de un individuo inspirado puede moldear el presente y el futuro de las comunidades en todo el mundo.
-
@ 6d3d8fe2:4063a6cf
2023-08-11 09:57:53Questa guida è disponibile anche in:
- Francese: nostr:naddr1qqxnzd3cxyunqvfhxy6rvwfjqyghwumn8ghj7mn0wd68ytnhd9hx2tcpzamhxue69uhhyetvv9ujumn0wd68ytnzv9hxgtcpvemhxue69uhkv6tvw3jhytnwdaehgu3wwa5kuef0dec82c33xpshw7ntde4xwdtjx4kxz6nwwg6nxdpn8phxgcmedfukcem3wdexuun5wy6kwunnxsun2a35xfckxdnpwaek5dp409enw0mzwfhkzerrv9ehg0t5wf6k2qgawaehxw309a6ku6tkv4e8xefwdehhxarjd93kstnvv9hxgtczyzd9w67evpranzz2jw4m9wcygcyjhxsmcae6g5s58el5vhjnsa6lgqcyqqq823cmvvp6c grazie a nostr:npub1nftkhktqglvcsj5n4wetkpzxpy4e5x78wwj9y9p70ar9u5u8wh6qsxmzqs
- Chinese: nostr:naddr1qqxnzd3cx5urvwfe8qcr2wfhqyxhwumn8ghj7mn0wvhxcmmvqy28wumn8ghj7un9d3shjtnyv9kh2uewd9hszrrhwden5te0vfexytnfduq35amnwvaz7tmwdaehgu3wdaexzmn8v4cxjmrv9ejx2aspzamhxue69uhhyetvv9ujucm4wfex2mn59en8j6gpzpmhxue69uhkummnw3ezuamfdejszxrhwden5te0wfjkccte9eekummjwsh8xmmrd9skcqg4waehxw309ajkgetw9ehx7um5wghxcctwvsq35amnwvaz7tmjv4kxz7fwdehhxarjvaexzurg9ehx2aqpr9mhxue69uhhqatjv9mxjerp9ehx7um5wghxcctwvsq3jamnwvaz7tmwdaehgu3w0fjkyetyv4jjucmvda6kgqgjwaehxw309ac82unsd3jhqct89ejhxqgkwaehxw309ashgmrpwvhxummnw3ezumrpdejqz8rhwden5te0dehhxarj9ekh2arfdeuhwctvd3jhgtnrdakszpmrdaexzcmvv5pzpnydquh0mnr8dl96c98ke45ztmwr2ah9t6mcdg4fwhhqxjn2qfktqvzqqqr4gu086qme grazie a nostr:npub1ejxswthae3nkljavznmv66p9ahp4wmj4adux525htmsrff4qym9sz2t3tv
- Svedese: nostr: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 grazie a nostr:npub19jk45jz45gczwfm22y9z69xhaex3nwg47dz84zw096xl6z62amkqj99rv7
- Spagnolo: nostr:naddr1qqfxy6t9demx2mnfv3hj6cfddehhxarjqyvhwumn8ghj7un9d3shjtnwdaehgunfvd5zumrpdejqzxthwden5te0wp6hyctkd9jxztnwdaehgu3wd3skueqpz4mhxue69uhkummnw3ezu6twdaehgcfwvd3sz9thwden5te0dehhxarj9ekkjmr0w5hxcmmvqyt8wumn8ghj7un9d3shjtnwdaehgu3wvfskueqpzpmhxue69uhkummnw3ezuamfdejszenhwden5te0ve5kcar9wghxummnw3ezuamfdejj7mnsw43rzvrpwaaxkmn2vu6hydtvv94xuu34xv6rxwrwv33hj6ned3nhzumjdee8guf4vae8xdpex4mrgvn3vvmxzamndg6r27tnxulkyun0v9jxxctnws7hgun4v5q3vamnwvaz7tmzd96xxmmfdejhytnnda3kjctvqyd8wumn8ghj7un9d3shjtn0wfskuem9wp5kcmpwv3jhvqg6waehxw309aex2mrp0yhxummnw3e8qmr9vfejucm0d5q3camnwvaz7tm4de5hvetjwdjjumn0wd68y6trdqhxcctwvsq3camnwvaz7tmwdaehgu3wd46hg6tw09mkzmrvv46zucm0d5q32amnwvaz7tm9v3jkutnwdaehgu3wd3skueqprpmhxue69uhhyetvv9ujumn0wd68yct5dyhxxmmdqgs87hptfey2p607ef36g6cnekuzfz05qgpe34s2ypc2j6x24qvdwhgrqsqqqa28ldvk6q grazie a nostr:npub138s5hey76qrnm2pmv7p8nnffhfddsm8sqzm285dyc0wy4f8a6qkqtzx624
- Olandese: nostr:naddr1qqxnzd3c8q6rzd3jxgmngdfsqyvhwumn8ghj7mn0wd68ytn6v43x2er9v5hxxmr0w4jqz9rhwden5te0wfjkccte9ejxzmt4wvhxjmcpp4mhxue69uhkummn9ekx7mqprfmhxue69uhhyetvv9ujumn0wd68yemjv9cxstnwv46qzyrhwden5te0dehhxarj9emkjmn9qyvhwumn8ghj7ur4wfshv6tyvyhxummnw3ezumrpdejqzxrhwden5te0wfjkccte9eekummjwsh8xmmrd9skcqgkwaehxw309ashgmrpwvhxummnw3ezumrpdejqzxnhwden5te0dehhxarj9ehhyctwvajhq6tvdshxgetkqy08wumn8ghj7mn0wd68ytfsxyhxgmmjv9nxzcm5dae8jtn0wfnsz9thwden5te0v4jx2m3wdehhxarj9ekxzmnyqyt8wumn8ghj7un9d3shjtnwdaehgu3wvfskueqpy9mhxue69uhk27rsv4h8x6tkv5khyetvv9ujuenfv96x5ctx9e3k7mgprdmhxue69uhkummnw3ez6v3w0fjkyetyv4jjucmvda6kgqg8vdhhyctrd3jsygxg8q7crhfygpn5td5ypxlyp4njrscpq22xgpnle3g2yhwljyu4fypsgqqqw4rsyfw2mx grazie a nostr:npub1equrmqway3qxw3dkssymusxkwgwrqypfgeqx0lx9pgjam7gnj4ysaqhkj6
- Arabo: nostr:naddr1qqxnzd3c8q6rywfnxucrgvp3qyvhwumn8ghj7un9d3shjtnwdaehgunfvd5zumrpdejqzxthwden5te0wp6hyctkd9jxztnwdaehgu3wd3skueqpz4mhxue69uhkummnw3ezu6twdaehgcfwvd3sz9thwden5te0dehhxarj9ekkjmr0w5hxcmmvqyt8wumn8ghj7un9d3shjtnwdaehgu3wvfskueqpzpmhxue69uhkummnw3ezuamfdejszenhwden5te0ve5kcar9wghxummnw3ezuamfdejj7mnsw43rzvrpwaaxkmn2vu6hydtvv94xuu34xv6rxwrwv33hj6ned3nhzumjdee8guf4vae8xdpex4mrgvn3vvmxzamndg6r27tnxulkyun0v9jxxctnws7hgun4v5q3vamnwvaz7tmzd96xxmmfdejhytnnda3kjctvqyd8wumn8ghj7un9d3shjtn0wfskuem9wp5kcmpwv3jhvqg6waehxw309aex2mrp0yhxummnw3e8qmr9vfejucm0d5q3camnwvaz7tm4de5hvetjwdjjumn0wd68y6trdqhxcctwvsq3camnwvaz7tmwdaehgu3wd46hg6tw09mkzmrvv46zucm0d5q32amnwvaz7tm9v3jkutnwdaehgu3wd3skueqprpmhxue69uhhyetvv9ujumn0wd68yct5dyhxxmmdqgsfev65tsmfgrv69mux65x4c7504wgrzrxgnrzrgj70cnyz9l68hjsrqsqqqa28582e8s grazie a nostr:npub1nje4ghpkjsxe5thcd4gdt3agl2usxyxv3xxyx39ul3xgytl5009q87l02j
- Tedesco: nostr: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 grazie a nostr:npub1eseajvcuqgk6dy98zndje76hcd485zwmhjx4ztgnw4yruq68lhxq45cqvg
- Giapponese: nostr:naddr1qqxnzd3cxy6rjv3hx5cnyde5qgs87hptfey2p607ef36g6cnekuzfz05qgpe34s2ypc2j6x24qvdwhgrqsqqqa28lxc9p6 di nostr:npub1wh69w45awqnlsxw7jt5tkymets87h6t4phplkx6ug2ht2qkssswswntjk0
- Russo: nostr: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 di nostr:npub10awzknjg5r5lajnr53438ndcyjylgqsrnrtq5grs495v42qc6awsj45ys7
Ciao, caro Nostrich!
Nostr è qualcosa di completamente nuovo, e ci sono alcuni passi da fare che semplificheranno il tuo ingresso e renderanno più interessante la tua esperienza.
👋 Benvenuto
Dato che stai leggendo questa guida, diamo per assunto che tu ti sia già unito a Nostr scaricando un app (es. Damus, Amethyst, Plebstr) o usando un Web Client Nostr (es. snort.social, Nostrgram, Iris). E' importante per un nuovo arrivato seguire i passaggi suggeriti dalla piattaforma di tua scelta - la procedura di benvenuto ti fornisce tutte le basi, e non dovrai preoccuparti di configurare nulla a meno che tu non lo voglia fare. Se sei incappato in questo articolo, ma non hai ancora un “account” Nostr, puoi seguire questa semplice guida a cura di nostr:npub1cly0v30agkcfq40mdsndzjrn0tt76ykaan0q6ny80wy034qedpjsqwamhz.
🤙 Divertiti
Nostr è fatto per assicurarsi che le persone siano in grado di connettersi liberamente, di essere ascoltate e di divertirsi. Questo è il fulcro centrale (ovviamente ci sono moltissimi altri casi d'uso, come essere uno strumento per i divulgatori e chi lotta per la libertà, ma per questo servirà un articolo a parte), quindi se qualcosa ti è poco chiaro contatta altri “nostriches” con esperienza e saremo lieti di aiutarti. Interagire con Nostr non è difficile, ma ci sono alcune differenze rispetto alle altre piattaforme tradizionali, quindi è normale fare domande (anzi...sei incoraggiato a farne).
Questa è una lista ufficiosa di utenti Nostr che saranno felici di aiutarti e rispondere alle tue domande:
nostr:naddr1qqg5ummnw3ezqstdvfshxumpv3hhyuczypl4c26wfzswnlk2vwjxky7dhqjgnaqzqwvdvz3qwz5k3j4grrt46qcyqqq82vgwv96yu
Tutti i nostriches nella lista hanno ricevuto il badge Nostr Ambassador, il che renderà facile per te trovarli, verificarli e seguirli
⚡️ Attivare gli Zaps
Gli Zaps sono una delle prime differenze che noterai entrando su Nostr. Consentono agli utenti Nostr di inviare istantaneamente valore per supportare la creazione di contenuti utili e divertenti. Sono possibili grazie a Bitcoin e Lightning Network. Questi due protocolli di pagamento decentralizzati permettono di inviare istantaneamente dei sats (la più piccola frazione di Bitcoin) tanto facilmente quanto mettere un like sulle piattaforme social tradizionali. Chiamiamo questo meccanismo Value-4-Value e puoi trovare altre informazioni al riguardo qui: https://dergigi.com/value/
Dai un'occhiata a questa nota di nostr:npub18ams6ewn5aj2n3wt2qawzglx9mr4nzksxhvrdc4gzrecw7n5tvjqctp424 per avere una panoramica su cosa sono siano gli zaps.
Dovresti attivare gli Zaps anche se non sei un creatore di contenuti - le persone troveranno sicuramente interessanti alcune delle tue note e vorranno mandarti dei sats. Il modo più semplice per ricevere sats su Nostr è il seguente:
- Scarica l'app Wallet of Satoshi - probabilmente la scelta migliore per dispositivi mobili per chi è nuovo in Bitcoin e Lightning. Tieni di conto che esistono molti altri wallets e che potrai scegliere quello che preferisci. Inoltre, non dimenticarti di fare un back up del wallet.
- Premi “Ricevere”
- Premi sopra al tuo Lightning Address (è quello che sembra un indirizzo email) per copiarlo
- Incollalo poi nel campo corrispondente all'interno del tuo client Nostr (il nome del campo potrebbe essere “Bitcoin Lightning Address”, “LN Address” o qualcosa di simile in base all'app che utilizzi).
📫 Ottieni un indirizzo Nostr
Gli indirizzi Nostr, a cui spesso i Nostr OGs si riferiscono con “NIP-05 identifier”, sono simili ad un indirizzo email e:
🔍 Aiutano a rendere il tuo account facile da trovare e condividere
✔️ Servono a verificare che il tuo “LN Address” appartenga ad un umano
Questo è un esempio di indirizzo Nostr: Tony@nostr.21ideas.org
E' facile memorizzarlo e successivamente cercarlo in una qualsiasi piattaforma Nostr per trovare la persona corrispondente
Per ottenere un indirizzo Nostr puoi usare un servizio gratuito come Nostr Check (di nostr:npub138s5hey76qrnm2pmv7p8nnffhfddsm8sqzm285dyc0wy4f8a6qkqtzx624) oppure uno a pagamento come Nostr Plebs (di nostr:npub18ams6ewn5aj2n3wt2qawzglx9mr4nzksxhvrdc4gzrecw7n5tvjqctp424). Entrambi offrono vari vantaggi, e la scelta dipende solo da te. Un altro modo per ottenere un indirizzo Nostr è tramite un'estensione del browser. Scopri di più al riguardo qui) .
🙇♀️ Impara le basi
Dietro le quinte Nostr è molto diverso dalle piattaforme social tradizionali, quindi conoscerne le basi è estremamente utile per i nuovi arrivati. E con questo non intendo che dovresti imparare un linguaggio di programmazione o i dettagli tecnici del protocollo. Sto dicendo che avere una visione d'insieme più ampia e capire le differenze fra Nostr e Twitter / Medium / Reddit ti aiuterà moltissimo. Ad esempio, al posto di un nome utente e password hai una chiave privata e una pubblica. Non entrerò nel dettaglio perchè esistono già moltissime risorse che ti aiuteranno a diventare un esperto di Nostr. Tutte quelle degne di nota sono state raccolte in questa pagina con 💜 da nostr:npub12gu8c6uee3p243gez6cgk76362admlqe72aq3kp2fppjsjwmm7eqj9fle6
Fra le informazioni che troverai nel link viene anche spiegato come mettere al sicuro le tue chiavi di Nostr (il tuo account), quindi è importante dargli un'occhiata
🤝 Connettiti
La possibilità di connetterti con altre [^3] persone brillanti è ciò che rende speciale Nostr. Qui tutti possono essere ascoltati e nessuno può essere escluso. Ci sono alcuni semplici modi per trovare persone interessanti su Nostr:
- Trova le persone che segui su Twitter: https://www.nostr.directory/ è un ottimo strumento per questo.
- Segui le persone seguite da altri di cui ti fidi: Visita il profilo di una persona che condivide i tuoi stessi interessi, guarda la lista delle persone che segue e connettiti con loro.
- Visita la Bacheca Globale: Ogni client Nostr (app Nostr se preferisci) ha una scheda per spostarsi nella Bacheca Globale (Global Feed), dove troverai tutte le note di tutti gli utenti di Nostr. Segui le persone che trovi interessanti (ricorda di essere paziente - potresti trovare una discreta quantità di spam).
- Usa gli #hashtags: Gli Hashtag sono un ottimo modo per concentrarti sugli argomenti di tuo interesse. Ti basterà premere sopra l'#hashtag per vedere altre note relative all'argomento. Puoi anche cercare gli hashtags tramite l'app che utilizzi. Non dimenticare di usare gli hashtags quando pubblichi una nota, per aumentarne la visibilità.
https://nostr.build/i/0df18c4a9b38f1d9dcb49a5df3e552963156927632458390a9393d6fee286631.jpg Screenshot della bacheca di nostr:npub1ktw5qzt7f5ztrft0kwm9lsw34tef9xknplvy936ddzuepp6yf9dsjrmrvj su https://nostrgraph.net/
🗺️ Esplora
I 5 consigli menzionati sono un ottimo punto d'inizio e miglioreranno moltissimo la tua esperienza, ma c'è molto di più da scoprire! Nostr non è solo un rimpiazzo per Twitter e le sue possibilità sono limitate solo dalla nostra immaginazione.
Dai un'occhiata alla lista di tutti i progetti Nostr:
- https://nostrapps.com/ una lista di tutte le apps su Nostr
- https://nostrplebs.com/ – ottieni il tuo NIP-05 e altri vantaggi (a pagamento)
- https://nostrcheck.me/ – Indirizzi Nostr, caricamento di media, relay
- https://nostr.build/ – Carica e gestisci i tuoi media (e altro)
- https://nostr.band/ – Informazioni sul network e gli utenti di Nostr
- https://zaplife.lol/ – Statistiche degli Zaps
- https://nostrit.com/ – Programma le note
- https://nostrnests.com/ – Twitter Spaces 2.0
- https://nostryfied.online/ - Fai un backup dei tuoi dati di Nostr
- https://www.wavman.app/ - Player musicale per Nostr
📻 Relays
Dopo aver preso confidenza con Nostr assicurati di dare un'occhiata alla mia guida riguardo i Relays su Nostr: https://lnshort.it/nostr-relays. Non è un argomento di cui preoccuparsi all'inizio del tuo viaggio, ma è sicuramente importante approfondirlo più avanti.
📱 Nostr su mobile
Avere un'esperienza fluida su Nostr tramite un dispositivo mobile è fattibile. Questa guida ti aiuterà ad accedere, postare, inviare zap e molto di più all'interno delle applicazioni web Nostr sul tuo smartphone: https://lnshort.it/nostr-mobile
Grazie per aver letto e ci vediamo dall'altra parte della tana del coniglio.
Grazie a nostr:npub10awzknjg5r5lajnr53438ndcyjylgqsrnrtq5grs495v42qc6awsj45ys7 per aver fornito il documento originale che ho tradotto
-
@ d266da53:7224d834
2023-09-08 13:21:56Stay updated on the latest developments in Crypto , follow me on Yakihonne.com.
Blockchain and artificial intelligence (AI) are little more than bundles of computer networks and code, but they sure are becoming important players in nearly all aspects of online life.
An estimated 66% of the world’s population uses the internet for everyday activities like shopping, social connection, healthcare, business and entertainment. Additionally, at least 7 billion devices are connected to the internet through sensors and custom-designed software, comprising a growing cadre of gadgets referred to as the internet of things (IoT).
All this activity means one thing: data. Lots of data. As WIRED put it in 2014, data today is as valuable of a commodity as oil was in the 18th century. As of 2023, more than 11,000 marketing solutions exist simply to capture, track, analyze and report on consumer data to yield profitable insights.
Blockchain, an open-source globally distributed ledger, offers us a new place to store all that data where it might finally be independent of third-party companies that place profit incentives over consumer privacy. Yet, data on blockchain is publicly available by default – which is not ideal for most of our information. This transparency is causing many of us to think critically – perhaps for the first time – about what types of personal data we want to exist on the internet and how we should renegotiate Web2’s social contracts that have allowed centralized platforms like Facebook and Twitter to own our data in exchange for services.
That’s where artificial intelligence (AI) could come in. In an ideal future, third-party companies don’t track and analyze our data – AI does. Let’s imagine, in this ideal scenario, that we understand well enough how AI learning models work and therefore trust them to develop insights about who we are while tracking digital provenance and verifying the credibility of our information.
Sounds great, right? But unfortunately, most new AI use cases are still experimental and nobody can predict success. As happens with new technologies, the true capacities of AI and blockchain are currently getting lost in hyperbole, misunderstandings and FUD (fear, uncertainty and doubt). We spoke to several data experts and Web3 insiders to better understand where AI and Web3 might successfully converge to create consumer-friendly solutions for verification, ownership and creativity.
News verification
With the upcoming U.S. presidential elections, the issue of deep fakes and misinformation has become a grave concern. But what if we could publicly track the origin of information? According to Lisa DeLuca, senior director of engineering at Web3 domain company Unstoppable Domains, not only does the source-tracking technology exist, but there’s also a way to link news quotes to the public key of the person who said it.
“We've got a pending patent for this idea that you can use blockchains to add trust to content,” DeLuca said. Similar to a Google Search Alert, a person could employ an AI bot to crawl the web for mentions of their name in the media. Any time that person is quoted by a journalist or news outlet, they would receive a request to verify the quote on the blockchain using their decentralized domain name linked to a crypto wallet.
“You'd see a request that says, ‘Is this really you – yes or no?’ And then the experience could be updated to show that that person verified it, and then the news outlet could develop their reputation over time on how much of their content is actually verified versus rejected,” explained DeLuca. The process could also be incentivized with crypto tokens so that the verifying person receives a reward for confirming their quotes.
According to DeLuca, Unstoppable Domains has already developed this tool and is ready to begin testing it with a media partner. “If someone wants to partner with us, we're ready to talk about it,” she said. “This is not that far off.”
Copyright and intellectual property protection
The digital world has long grappled with copyright infringement and intellectual property (IP) challenges. The convergence of Web3 and AI might be ushering in a new era of copyright protection.
Recently, comedian Sarah Silverman sued OpenAI and Meta over their AI models that were trained using her book, which is copyrighted material. While copyrighted materials often end up online and publically available, there ought to be ways for owners to regain control over their materials and dictate if, how and when they are used.
According to Don Gossen, CEO of data tokenization company Nevermined, the convergence of AI and blockchain could empower creators of all kinds to monetize their IP in terms they control. Smart contracts on the blockchain could automatically enforce copyright terms, while AI algorithms could scan content for potential infringements. This combined approach would create an immutable record of ownership and usage on the blockchain, simplifying disputes and incentivizing creators to share their work in a secure environment.
At present, Nevermined is testing this concept with scientific research, in a growing initiative known as decentralized science (DeSci). Using an AI learning model to compile data from lengthy research papers, programmers can create short-form abstracts for clinicians to quickly look up information in real-time healthcare settings. To maintain the integrity of the data, as well as compensate scientific authors, Gossen says that participating contributors could choose whether to include their copyrighted academic papers and research materials, thereby contributing to a well-curated dataset that produces high-quality outputs as a result.
Nevermined is currently working on a blockchain-based marketplace, in which AI developers would need to subscribe to get access to these materials and train their models. This approach gives the power to the original authors and owners of the content, who ultimately get to decide if they would like to grant others access to their materials. Additionally, because blockchain can provide proof of reference, Gossen explained that a doctor could also deep dive into the original research to understand more, and possibly even reach out to the researchers.
“Commercially, this is useful because hospitals and clinics will pay for the abstracts for their medical professionals to access,” Gossen said. “A doctor can excuse themselves from the patient meeting, go to the back office and query the symptoms, receive a bunch of research, and then have five minutes to synthesize the information and go back to the patient with an assessment.”
Interactive NFTs: Enhancing digital collectibles
If you’ve ever wanted to create your own version of Clippy, the Windows paperclip that popped up inside Microsoft Word, now you can. When coupled with AI, the blockchain-based artworks known as non-fungible tokens (NFTs) can become more interactive and dynamic, unlocking a world of imagination and fun for creators, brands and consumers.
Alethea AI, the company behind intelligent NFTs (iNFTs), developed generative NFTs powered by large language models (LLMs), or deep learning algorithms that distill large data sets. It’s sort of like taking a version of ChatGPT, OpenAI’s popular chatbot, and combining it with your favorite digital artwork, thereby teaching the art to converse through text and verbal cues. That’s how Alethea AI’s generative NFTs work, and they can feature a holder’s favorite NFTs as avatars.
“Basically, how an iNFT is created is you take your NFT and combine it with what we call intelligence pods,” explained Komalika Neyol, Alethea AI content manager. “These pods are AI assets that can be trained. It can have a personality and perform AI services for you."
According to Neyol, iNFTs are customizable to a user’s unique dataset, allowing holders to showcase their personalities, knowledge and skill sets through their NFT. For instance, a philosophy professor could upload their PhD dissertation to their LLM and create an animated chatbot that greets website visitors by quoting famous philosophers.
Interested users can create customized NFTs with their own unique dataset by minting an Alethea Intelligence Pod NFT. The company created a short tutorial video for holders on how to imbue an ERC-721 NFT with AI.
Smart contract security – with a caveat
In a future where smart contracts automatically divvy up and disperse payment to the appropriate crypto wallets as the experts we spoke to describe, auditing the security of smart contracts is going to be essential.
According to Ron Bodkin, co-founder and CEO of generative AI company ChainML, AI can be highly instrumental in detecting the anomalies of smart contracts. Chain ML is currently working with the Web3 security company Cube3 to more efficiently block malicious crypto transactions.
Similar to the safeguards implemented by a bank, programmers can train an AI to interpret factors that might be red flags, such as a suspicious origin of a transaction, the age of a wallet, the sequence of events (e.g. a prompt to drain a wallet right after interacting with a new address) and more.
“There's so many different factors that can come together to say, ‘Hey, this is risky, this is something that you want to deal with,’” said Bodkin.
However, Bodkin acknowledges that while AI can enhance the efficiency of blockchain security audits, humans are still necessary to conduct a thorough evaluation. His advice is to use AI technology in a way that improves human error, but don’t expect AI auditors to replace humans entirely.
“I wouldn't suggest anyone fire your auditor and just rely on AI audits,” Bodkin cautioned. He says ChainML and its partners are beginning to see success from performing AI audits earlier in the building process, thereby helping human auditors address problems quicker, but the process would not be possible with robots alone.
“AI auditors could run all the time and very quickly give responses,” Bodkin said. “There's a number of layers where AI can enhance security.”
Bottom line
The convergence of blockchain and AI presents a brave new world, one full of exciting possibilities that have the potential to reshape various sectors. News verification, copyright protection, interactive NFTs and smart contract audits are burgeoning areas that demonstrate the tangible benefits of this Web3-AI synergy.
However, while the possibilities are vast, experts advise businesses and creators to be careful and consider AI’s technological limitations. Presently, AI is about supplementing human productivity, improving error and expanding the imagination — and they’re unlikely to fully replace humans anytime soon.
By: Link:
-
@ b9e76546:612023dc
2023-06-07 22:12:51
#Nostr isn't just a social network, that's simply the first use case to sprout from the Nostr tree.
Simple Blocks, Complex Change
Nostr isn't just a social network, in a similar way that Bitcoin isn't just a transaction network. Both of these things are true, but they each miss the more significant elements of what they accomplish.
In my mind, the source of Nostr's true potential is two fold; first, in fundamentally changing the centralized server model into an open environment of redundant relays; and second, it eliminates the association of clients with their IP address and metadata, and replaces it with identification via public keys. Within this one-two punch lies the most important tools necessary to actually rearchitect all of the major services on the internet, not just social media. Social is simply the interface by which we will connect all of them.
The combination of this simple data & ID management protocol with decentralized money in #Bitcoin and #Lightning as a global payments network, enables nostr to build marketplaces, "websites," podcast feeds, publishing of articles/video/media of all kinds, auction networks, tipping and crowdfunding applications, note taking, data backups, global bookmarks, decentralized exchanges and betting networks, browser or app profiles that follow you wherever you go, and tons more - except these can be built without all of the negative consequences of being hosted and controlled by central servers.
It separates both the data and client identity from the server hosting it. Handing the ownership back to the owner of the keys. We could think of it loosely as permission-less server federations (though this isn't entirely accurate, its useful imo). Anyone can host, anyone can join, and the data is agnostic to the computer it sits on at any given time. The walls are falling away.
Efficiency vs Robustness
There is also a major secondary problem solved by these building blocks. A byproduct of solving censorship is creating robustness, both in data integrity, but also in data continuity. While the fiat world is so foolishly focused on "efficiency" as the optimal goal of all interaction, it naively ignores the incredible fragility that comes with it. It is far more "efficient" for one big factory to produce all of the computer chips in the world. Why build redundant manufacturing to produce the same thing when one factory can do it just fine? Yet anyone who thinks for more than a few seconds about this can see just how vulnerable it would leave us, as well as how much corruption such "efficiency" would wind up enabling.
Nostr is not alone either. Holepunch is a purely P2P model (rather than based on relays) that accomplishes the same separation in a different way. One where the clients and servers become one in the same - everyone is the host. Essentially a bittorrent like protocol that removes the limitation of the data being static. The combination of their trade offs & what these protocols can do together is practically limitless. While Nostr begins building its social network, combining it with what Synonym is building with their Web of trust, (the critical ingredient of which is public key identification) we can "weigh" information by the trust of our social graph.
Not too long ago, a friend and I used Nostr to verify who we were communicating with, we shared a Keet (built on Holepunch) room key over encrypted nostr DM, and opened a P2P, encrypted chat room where we could troubleshoot a bitcoin wallet problem and safely and privately share very sensitive data. The casual ease by which we made this transaction enabled by these tools had us both pause in awe of just how powerful they could be for the privacy and security of all communication. And this is just the very beginning. The glue of #Lightning and #Bitcoin making possible the direct monetization of the infrastructure in all of the above has me more bullish on the re-architecting of the internet than ever in my life. It cannot be reasonably called an insignificant change in incentives to remove both the advertiser and the centralized payment processor from inbetween the provider and the customers online. The base plumbing of the internet itself may very well be on the verge of the greatest shift it has ever gone through.
A Tale of Two Network Effects
I would argue the most significant historical shift in the internet architecture was the rise of social media. It was when we discovered the internet was about connecting people rather than computers. The social environment quickly became the dominant window by which the average person looked into the web. It's the place where we go to be connected to others, and get a perspective of the world and a filter for its avalanche of information as seen through our trust networks and social circles. But consider how incredibly neutered the experience really is when money isn't allowed to flow freely in this environment, and how much it actually would flow, if not for both centralized payment processors and the horrible KYC and regulatory hurdle it entails for large, centralized entities.
The first time around we failed to accomplish a global, open protocol for user identity, and because of this our social connections were owned by the server on which we made them. They owned our digital social graph, without them, it is erased. This is an incredible power. The pressures of the network effect to find people, rather than websites, took a decentralized, open internet protocol, and re-centralized it into silos controlled by barely a few major corporations. The inevitable abuse of this immense social power for political gain is so blatantly obvious in retrospect that it's almost comical.
But there is a kind of beautiful irony here - the flip side of the network effect's negative feedback that centralized us into social media silos, is the exact same effect that could present an even greater force in pushing us back toward decentralization. When our notes & highlights have the same social graph as our social media, our "instagram" has the same network as our "twitter," our podcasts reach the same audience, our video publishing has the same reach, our marketplace is built in, our reputation carries with us to every application, our app profiles are encrypted and can't be spied on, our data hosting can be paid directly with zaps, our event tickets can be permanently available, our history, our personal Ai, practically anything. And every bit of it is either encrypted or public by our sole discretion, and is paid for in a global, open market of hosts competing to provide these services for the fewest sats possible. (Case in point, I'm paying sats for premium relays, and I'm paying a simple monthly fee to nostr.build for hosting media)
All of this without having to keep up with 1,000 different fucking accounts and passwords for every single, arbitrarily different utility under the sun. Without having to setup another account to try another service offering a slightly different thing or even just one feature you want to explore. Where the "confirm with your email" bullshit is finally relegated to the hack job, security duck tape that it really is. The frustrating and post-hoc security design that is so common on the internet could finally become a thing of the past and instead just one or a few secure cryptographic keys give us access & control over our digital lives.
The same network effect that centralized the internet around social media, will be the force that could decentralize it again. When ALL of these social use cases and connections compound on each other's network effect, rather than compete with each other, what centralized silo in the world can win against that?
This is not to dismiss the number of times others have tried to build similar systems, or that it's even close to the first time it was attempted to put cryptographic keys at the heart of internet communications. Which brings me to the most important piece of this little puzzle... it actually works!
I obviously don't know exactly how this will play out, and I don't know what becomes dominant in any particular area, how relays will evolve, or what applications will lean toward the relay model, while others may lean P2P, and still others may remain client/server. But I do think the next decade will experience a shift in the internet significant enough that the words "relay" and "peer" may very well, with a little hope and lot of work, replace the word "server" in the lexicon of the internet.
The tools are here, the network is proving itself, the applications are coming, the builders are building, and nostr, holepunch, bitcoin and their like are each, slowly but surely, taking over a new part of my digital life every week. Case in point; I'm publishing this short article on blogstack.io, it will travel across all of nostr, I'm accepting zaps with my LNURL, it is available on numerous sites that aggregate Kind:30023 articles, my entire social graph will get it in their feed, & there will be a plethora of different clients/apps/websites/etc through which the users will see this note, each with their own features and designs...
Seriously, why the fuck would I bother starting a Substack and beg people for their emails?
This is only the beginning, and I'm fully here for it. I came for the notes and the plebs, but it's the "Other Stuff" that will change the world.
-
@ 4d444439:7ed2458b
2023-09-08 13:17:34Feel free to read all my articles on the anti-censorship long content platform yakihonne.com.
Dangerous heatwaves in Europe could break further records, the UN says.
It is hard to immediately link these events to climate change because weather - and oceans - are so complex.
Studies are under way, but scientists already fear some worst-case scenarios are unfolding.
"I'm not aware of a similar period when all parts of the climate system were in record-breaking or abnormal territory," Thomas Smith, an environmental geographer at London School of Economics, says.
"The Earth is in uncharted territory" now due to global warming from burning fossil fuels, as well as heat from the first El Niño - a warming natural weather system - since 2018, says Imperial College London climate science lecturer Dr Paulo Ceppi.
Here are four climate records broken so far this summer - the hottest day on record, the hottest June on record globally, extreme marine heatwaves, record-low Antarctic sea-ice - and what they tell us.
The world experienced its hottest day ever recorded in July, breaking the global average temperature record set in 2016.
Average global temperature topped 17C for the first time, reaching 17.08C on 6 July, according to EU climate monitoring service Copernicus.
Ongoing emissions from burning fossil fuels like oil, coal, and gas are behind the planet's warming trend.
This is exactly what was forecast to happen in a world warmed by more greenhouse gases, says climate scientist Dr Friederike Otto, from Imperial College London.
"Humans are 100% behind the upward trend," she says.
"If I'm surprised by anything, it's that we're seeing the records broken in June, so earlier in the year. El Niño normally doesn't really have a global impact until five or six months into the phase," Dr Smith says.
El Niño is the world's most powerful naturally occurring climate fluctuation. It brings warmer water to the surface in the tropical Pacific, pushing warmer air into the atmosphere. It normally increases global air temperatures.
The average global temperature in June this year was 1.47C above the typical June in the pre-industrial period. Humans started pumping greenhouse gases into the atmosphere when the Industrial Revolution started around 1800.
Asked if summer 2023 is what he would have forecasted a decade ago, Dr Smith says that climate models are good at predicting long-term trends but less good at forecasting the next 10 years.
"Models from the 1990s pretty much put us where we are today. But to have an idea about what the next 10 years would look like exactly would be very difficult," he says.
"Things aren't going to cool down," he adds.
Extreme marine heatwaves
The average global ocean temperature has smashed records for May, June and July. It is approaching the highest sea surface temperature ever recorded, which was in 2016.
But it is extreme heat in the North Atlantic ocean that is particularly alarming scientists.
"We've never ever had a marine heatwave in this part of Atlantic. I had not expected this," says Daniela Schmidt, Prof of Earth Sciences at the University of Bristol.
Marine heatwave in the North Atlantic
Daily sea surface temperature April - July 2023, compared with 1985-1993 average Source: NOAA (1985-1993 reference period recommended by NOAA as representative conditions)
Marine heatwave in the North Atlantic
Daily sea surface temperature April - July 2023, compared with 1985-1993 average Source: NOAA (1985-1993 reference period recommended by NOAA as representative conditions)
In June temperatures off the west coast of Ireland were between 4C and 5C above average, which the National Oceanic and Atmospheric Administration classified as a category 5 heatwave, or "beyond extreme".
Directly attributing this heatwave to climate change is complex, but that work is ongoing, Prof Schmidt says.
What is clear is that the world has warmed and the oceans have absorbed most of that heat from the atmosphere, she explains.
"Our models have natural variability in them, and there are still things appearing that we had not envisaged, or at least not yet," she adds.
She emphasises the impact of this heat on marine ecosystems, which produce 50% of the world's oxygen.
"People tend to think about trees and grasses dying when we talk about heatwaves. The Atlantic is 5C warmer than it should be - that means organisms need 50% more food just to function as normal," she says.
Record low Antarctic sea-ice
The area covered by sea-ice in the Antarctic is at record lows for July. There is an area around 10 times the size of the UK missing, compared with the 1981-2010 average.
Alarm bells are ringing for scientists as they try to unpick the exact link to climate change.
A warming world could reduce levels of Antarctic sea-ice, but the current dramatic reduction could also be due to local weather conditions or ocean currents, explains Dr Caroline Holmes at the British Antarctic Survey.
She emphasises it is not just a record being broken - it is being smashed by a long way.
"This is nothing like anything we've seen before in July. It's 10% lower than the previous low, which is huge."
She calls it "another sign that we don't really understand the pace of change".
Scientists believed that global warming would affect Antarctic sea-ice at some point, but until 2015 it bucked the global trend for other oceans, Dr Holmes says.
"You can say that we've fallen off a cliff, but we don't know what's at the bottom of the cliff here," she says.
"I think this has taken us by surprise in terms of the speed of which has happened. It's definitely not the best case scenario that we were looking at - it's closer to the worst case," she says.
We can certainly expect more and more of these records to break as the year goes on and we enter 2024, scientists say.
But it would be wrong to call what is happening a "climate collapse" or "runaway warming", cautions Dr Otto.
We are in a new era, but "we still have time to secure a liveable future for many", she explains.
By:Georgina Rannard, Erwan Rivault, Jana Tauschinski Link:https://www.bbc.com/news/science-environment-66229065
-
@ 8d8c3731:bfb11567
2023-08-08 16:16:39ปี 2023 เป็นปีที่มีอะไรหลายอย่างเกิดขึ้นในโลกอินเทอร์เน็ต สิ่งที่ไม่เคยคิดว่ามันจะเกิดขึ้นมาก่อนมันก็ได้เกิดขึ้นกับตา ผมเคยพูดไว้ในหลาย ๆ ไลฟ์ของตัวเองที่ช่อง Saltyman Ch. ว่าอินเทอร์เน็ตในยุคนี้มันสะดวกสบายกว่าเมื่อก่อนก็จริง แต่เราก็สูญเสียอะไรหลายอย่างที่เคยมีในโลกอินเทอร์เน็ตไปแล้ว
ในฐานะที่ตัวเองก็เป็น VTuber อิสระ (แถมทำด้วยตัวเองมาตลอดตั้งแต่เริ่ม) แน่นอนว่าผมเองก็ต้องสมัครใช้บริการต่าง ๆ เพื่อการทำไลฟ์ของตัวเอง ไม่ว่าจะเป็น YouTube เอย Twitch เอย Restream เอย Tipme เอย Steam เอย ไอดีเกมที่เล่นเอย ฯลฯ ซึ่งสมัครเยอะจนเริ่มจำไม่ได้แล้วว่าตัวเองใช้อะไรอยู่บ้างจนต้องพึ่งพาบริการ Password Manager เพื่อช่วยสร้างและจำรหัสผ่านเอาไว้ ซึ่งก็...กลายเป็นว่าต้องสมัครเพิ่มอีกแล้วสินะ 🗿🗿🗿 ทั้งที่ปกติแล้วตัว VTuber เองจะต้องปกป้องความเป็นส่วนตัวเพื่อป้องกัน Doxxing เปิดเผยข้อมูลส่วนตัวของโซล (เป็นคำเฉพาะในวงการที่หมายถึงคนที่สวมบทเป็น VTuber ด้านหลัง มากจากคำว่า Soul) แต่เราก็ต้องมาแลกข้อมูลส่วนตัวเหล่านี้กับบริการต่าง ๆ จนได้
หนำซ้ำตลอดปีนี้ยังเจอแต่อะไรน่าปวดหัวเกี่ยวกับเสรีภาพในโลกอินเทอร์เน็ตที่เราก็ใช้โซเชียลมีเดียของเราเพื่อการอัปเดตข่าวและคุยกับเพื่อนฝูงตามประสาชาวเน็ตที่เป็นตัวประกอบ A ในโลกออนไลน์คนหนึ่ง แล้วก็โดน CEO หรือผู้บริหารของบริการเหล่านี้เข้ามาเปลี่ยนแปลงบริการของเขาแบบไม่มีปี่ไม่มีขลุ่ย อยากจะจำกัดการอ่านโพสต์ก็จำกัดกันบัดนั้นเดี๋ยวนั้น อยากจะใช้อัลกอริธึมหรือตัดฟีเจอร์บางอย่างออกเพื่อกดดันให้ผู้ใช้ต้องเสียเงินเพิ่มในจุดที่มันไม่จำเป็นต้องเสียก็ทำ หรือแอบเนียนเปลี่ยนแปลงนโยบายของบริการเพื่อเอาข้อมูลเราไปทำอะไรสักอย่างที่บอกไว้ไม่ชัดเจน เพียงเพราะว่าบริษัทไม่สามารถทำกำไรได้ทันเวลาที่ต้องการเพราะทำตัวเองแท้ ๆ ความซวยก็เลยตกมาอยู่ที่ผู้บริโภคอย่างเรา ๆ ที่ต้องไล่ตามอัลกอริธึม ต้องเสียเงินเพื่อโปรโมตโพสต์หรือคอนเทนต์ของตัวเอง และก็ต้องไล่ตามกระแสในโซเชียลมีเดีย บางครั้งก็ถึงกับต้องใช้วิธีสุดแสนจะดูถูกสติปัญญาของผู้ใช้งาน เช่น การทำคลิกเบต ทำปก/พาดหัวยั่วกิเลสเพื่อหลอกให้คนคลิกไปอ่านแล้วพบว่าจริง ๆ เนื้อหามันไม่มีอะไรสำคัญกับเราเลย ฯลฯ
นี่ยังไม่นับว่าแค่เราแวะเข้าไปยังเว็บไซต์ที่ใช้หรือเข้าโซเชียลมีเดียเฉย ๆ แล้วโดนดูดข้อมูลการใช้งานมหาศาลเอาไปทำข้อมูลวิเคราะห์โฆษณาหรือเอาไปเทรน AI โดยไม่บอกเรา (หรือจริง ๆ เขาอาจบอกใน User Agreement กับ Privacy Policy ในรูปแบบตัวอักษรยาวยิ่งกว่ากำแพงเมืองจีนและตัวเล็กจิ๋วที่เล็กจนต้องเอากล้องส่องพระมาส่อง ที่ไม่ว่าจะมองตะแคงตีลังกาอ่านยังไงก็ไม่มีทางอ่านไหว หรืออ่านแล้วก็ต้องตีความหลายตลบ ก่อนจะต้องยอมแพ้แล้วกดยอมรับไปอย่างช่วยไม่ได้ เพราะถ้าไม่ยอมรับมันก็ไม่ให้ใช้งาน 🗿)
ถ้าลองเทียบกับสมัยแรก ๆ ที่เราเริ่มใช้เน็ตแบบไร้กังวล อยากค้นอะไร อยากดูอะไร อยากใช้อะไร เราก็สามารถทำได้ทันที ไม่ต้องกังวลว่าจะมีใครมาสอดส่องหรือคอยจำกัดจำเขี่ยการใช้งานของทุกคนตามแต่ข้อจำกัดของเทคโนโลยีในเวลานั้น อินเทอร์เน็ตในยุคปัจจุบันนี่คือโลกที่โหดร้ายกว่าเดิมมาก และเราในฐานะตัวประกอบ A ในโลกอินเทอร์เน็ตก็ต้องดูแลเอาใจใส่สิทธิเสรีภาพในโลกอินเทอร์เน็ตมากขึ้น ดูว่าเราต้องบอกข้อมูลส่วนตัวอะไรเวลาสมัครบริการ พยายามหาตัวช่วยในการปกป้องข้อมูลของตัวเรา ปกป้องการตรวจจับพฤติกรรมการใช้งานของเรา ฯลฯ เชื่อว่าสำหรับ User ทั่วไปก็อาจจะไม่คิดมาก แต่สำหรับผมหรือคนที่ให้ความสำคัญกับความเป็นส่วนตัวของตัวเองเองยิ่งกว่านี้...นี่เราแลกอะไรหลายอย่างในระหว่างใช้อินเทอร์เน็ต (ทั้งแบบตั้งใจและไม่ตั้งใจ) ไปเยอะเหมือนกันนะ 🤔
และถ้ายิ่งคิดต่อไปอีกสักหน่อย เราสาละวนอยู่กับการเสียความเป็นส่วนตัวและเสรีภาพแบบนี้มานานแค่ไหนแล้วนะ ? เผลอ ๆ เราอาจจะเอาสิ่งเหล่านี้จ่ายมาตั้งแต่วันแรกที่เราใช้อินเทอร์เน็ตก็ได้ แต่เราก็เพิ่งมาคิดเอะใจเรื่องพวกนี้ได้หลังจากใช้ชีวิตมาระยะหนึ่งแล้วเนี่ยสิ
หรือไม่ที่เขียนมาทั้งหมดนี้... ผมอาจจะคิดเยอะเกินไป 😂
-
@ d8714c92:cd61e54a
2023-09-08 13:13:56Welcome, soldiers! Even though you can't see your opponents face to face, you still have the opportunity to decipher their moves and make strategic decisions based on reading players at a virtual table. In this blog, we will provide you with tips and techniques to enhance your reading skills in the online environment.
You'll learn how to analyze betting patterns, detect behavioral cues, and leverage the available information. Get ready to read the minds behind the screens!
-
Observe betting patterns: Betting patterns can reveal a lot about a player's hand. Pay attention to the amount of chips they bet, how quickly they do it, and whether their bets are consistent or changing. For example, a player who bets quickly and in large amounts may indicate a strong hand, while a player making small and hesitant bets may be in a weaker position.
-
Analyze response time: The time a player takes to make decisions can be indicative of the strength of their hand. Some players take more time when they have a strong hand to try to disguise it, while others may do so when they are unsure or attempting to bluff. Observe if there are changes in a player's response time throughout the game, as this can reveal shifts in their confidence or strategy.
-
Look for behavioral patterns: Even when playing at a virtual table, players can still exhibit certain behavioral patterns through their style of play. Observe whether a player is aggressive or passive, if they play conservatively or aggressively, and if they display consistent tendencies throughout the game. These patterns can give you clues about your opponents' preferences and strategies.
-
Use available information: At a virtual table, you can leverage the information provided by the software, such as the history of previous hands and statistics for each player. Review past hands and analyze how players reacted in similar situations. If a player has shown consistent tendencies, you can use that information to make more informed decisions on how to play against them.
-
Consider betting and emotional reactions: Although you can't see your opponents' facial expressions, there are still emotional signals you can detect. Observe if a player makes unusual bets or appears agitated through the chat. These behaviors may indicate nervousness or overconfidence, which can be useful in assessing the strength of their hand.
Remember that reading players at a virtual poker table is not an exact science, and there's always room for error. However, by practicing and honing your skills, you can improve your ability to make more accurate decisions based on the available clues. Reading players at a virtual poker table may seem challenging at first, but with practice and careful observation, you can learn to decipher your opponents and take advantage of that information.
Observe betting patterns, analyze response time, look for behavioral patterns, use available information, and consider betting and emotional reactions. Remember that player reading is a skill in constant development, so keep practicing and refining your intuition. May your reads be accurate, and may your strategic decisions lead you to victory at the virtual tables! Good luck and enjoy responsible gaming!
-
-
@ 4d444439:7ed2458b
2023-09-08 13:11:43Feel free to read all my articles on the anti-censorship long content platform yakihonne.com.
In any hurricane, rising water called storm surge is the most dangerous and damaging element of the storm. Normal tides can add to that amount of water—and today, tides will be near their strongest all year. That’s because tonight’s full moon is also a supermoon, meaning it’s at its closest point to Earth.
“The full moon can enhance the tides and so certainly … at the time of high tide during the storm, you're going to see greater coastal flooding,” says Noah Petro, a research scientist at NASA Goddard Space Flight Center.
Though the supermoon will be the closest full moon of the year, and therefore its gravity will have a greater effect, experts say the full moon phase matters more than it being a supermoon. “It’s not a great added combination that it's closer than normal,” Petro says. ”It's going to be on the scales of centimeters, at most, of difference in tide—which in this case is barely even noticeable.”
(What are hurricanes, typhoons, and cyclones?)
The full moon, even a supermoon, will likely have only a modest effect on the huge storm surges already expected. ABC News meteorologist Kenton Gewecke says the Big Bend region of Florida could see the worst at 10 to 15 feet of storm surge, not accounting for tides. In Florida, the normal difference between high and low tide is around 3 to 5 feet.
“It makes a big difference whether the storm makes landfall at low tide or at high tide, that can make a difference of up to five feet,” says Thomas Wahl, associate professor of coastal engineering at University of Central Florida. “But then the storm surge of 10, 15 feet is the part that really makes it dangerous. Just the high tide itself is not going to pose any major threat to people.”
The hurricane made landfall this morning at a Category 3, but around the time of a low tide. The highest tide caused by the supermoon will be tomorrow, Thursday afternoon, likely missing the bulk of storm surging, which will largely happen today. The high tide will hit Florida’s Big Bend just before 2 p.m. and will likely occur as storm surge waters are beginning to retreat back into the ocean.
(Why hurricane categories don’t tell the whole story.)
Florida’s wide, shallow continental shelf plays a major role in the impact of storm surge. If there is a steep cut off, like in parts of the U.S. West Coast, then that water has to work a lot harder to get higher, Gewecke explains. A shallower, more gradual sea floor will allow storm surge to move in and out easily given the right circumstances such as a major hurricane.
We also had a supermoon on July 2 and August 1, and will have one more September 28. Next year, there will also be four supermoons from August to November.
Regardless of the position of the moon, Hurricane Idalia is expected to be historic. “Our records for landfalling storms in the United States go back to the 1850s. Since then, in this area of the Big Bend, there has never been a category three or stronger hurricane,” Gewecke says. “It's really a good chance that there's … going to be areas that have never seen storm surge like what they're going to experience.”
By:ALLIE YANG Link:https://www.nationalgeographic.com/science/article/supermoon-hurricane-idalia-florida
-
@ 32e18276:5c68e245
2023-06-01 04:17:00Double-entry accounting is a tried and true method for tracking the flow of money using a principle from physics: the conservation of energy. If we account for all the inflows and outflows of money, then we know that we can build an accurate picture of all of the money we've made and spent.
Bitcoin is particularly good at accounting in this sense, since transaction inflows and outflows are checked by code, with the latest state of the ledger stored in the UTXO set.
What about lightning? Every transaction is not stored on the blockchain, so we need same way to account for all the incoming and outgoing lightning transactions. Luckily for us, core-lightning (CLN) comes with a plugin that describes these transactions in detail!
For every transaction, CLN stores the amount credited and debited from your node: routed payments, invoices, etc. To access this, you just need to run the
lightning-cli bkpr-listaccountevents
command:lightning-cli bkpr-listaccountevents | jq -cr '.events[] | [.type,.tag,.credit_msat,.debit_msat,.timestamp,.description] | @tsv' > events.txt
This will save a tab-separated file with some basic information about each credit and debit event on your node.
channel invoice 232000000 0 1662187126 Havana channel invoice 2050000 0 1662242391 coinos voucher channel invoice 0 1002203 1662463949 lightningpicturebot channel invoice 300000 0 1663110636 [["text/plain","jb55's lightning address"],["text/identifier","jb55@sendsats.lol"]] channel invoice 0 102626 1663483583 Mile high lightning club
Now here's comes the cool part, we can take this data and build a ledger-cli file. ledger is a very powerful command-line accounting tool built on a plaintext transaction format. Using the tab-separated file we got from CLN, we can build a ledger file with a chart-of-accounts that we can use for detailed reporting. To do this, I wrote a script for converting
bkpt
reports to ledger:http://git.jb55.com/cln-ledger
The ledger file looks like so:
``` 2023-05-31 f10074c748917a2ecd8c5ffb5c3067114e2677fa6152d5b5fd89c0aec7fd81c5 expenses:zap:1971 1971000 msat assets:cln -1971000 msat
2023-05-31 damus donations income:lnurl:damus@sendsats.lol -111000 msat assets:cln 111000 msat
2023-05-31 Zap income:zap:event:f8dd1e7eafa18add4aa8ff78c63f17bdb2fab3ade44f8980f094bdf3fb72d512 -10000000 msat assets:cln 10000000 msat ```
Each transaction has multiple postings which track the flow of money from one account to another. Once we have this file we can quickly build reports:
Balance report
Here's the command for "account balance report since 2023-05 in CAD"
$ ledger -b 2023-05-01 -S amount -X CAD -f cln.ledger bal
``` CAD5290 assets:cln CAD2202 expenses CAD525 routed CAD1677 unknown CAD-7492 income CAD-587 unknown CAD-526 routed CAD-1515 lnurl CAD-614 jb55@sendsats.lol CAD-1 tipjar CAD-537 damus@sendsats.lol CAD-364 gpt3@sendsats.lol CAD-4012 merch CAD-2571 tshirt CAD-1441 hat CAD-852 zap CAD-847 event CAD-66 30e763a1206774753da01ba4ce95852a37841e1a1777076ba82e068f6730b75d CAD-60 f9cda1d7b6792e5320a52909dcd98d20e7f95003de7a813fa18aa8c43ea66710 CAD-49 5ae0087aa6245365a6d357befa9a59b587c01cf30bd8580cd4f79dc67fc30aef CAD-43 a4d44469dd3db920257e0bca0b6ee063dfbf6622514a55e2d222f321744a2a0e ...
0
```
As we can see it shows a breakdown of all the sats we've earned (in this case converted to fiat). We can have a higher-level summary using the depth argument:
$ ledger -M -S amount -X sat -f cln.ledger bal
``` sat14694904 assets:cln sat6116712 expenses sat1457926 routed sat4658786 unknown sat-20811616 income sat-1630529 unknown sat-1461610 routed sat-4207647 lnurl sat-11144666 merch sat-2367164 zap
0
```
As we can see we made 14 million sats this month, not bad! The number at the bottom balances to zero which means we've properly accounted for all income and expenses.
Daily Damus Donation Earnings
To support damus, some users have turned on a feature that sends zaps to support damus development. This simply sends a payment to the damus@sendsats.lol lightning address. Since we record these we can build a daily report of damus donations:
$ ledger -D -V -f cln.ledger reg damus
23-May-15 - 23-May-15 ..damus@sendsats.lol CAD-46 CAD-46 23-May-16 - 23-May-16 ..damus@sendsats.lol CAD-73 CAD-120 23-May-17 - 23-May-17 ..damus@sendsats.lol CAD-41 CAD-161 23-May-18 - 23-May-18 ..damus@sendsats.lol CAD-37 CAD-197 23-May-19 - 23-May-19 ..damus@sendsats.lol CAD-35 CAD-233 23-May-20 - 23-May-20 ..damus@sendsats.lol CAD-28 CAD-261 23-May-21 - 23-May-21 ..damus@sendsats.lol CAD-19 CAD-280 23-May-22 - 23-May-22 ..damus@sendsats.lol CAD-29 CAD-309 23-May-23 - 23-May-23 ..damus@sendsats.lol CAD-19 CAD-328 23-May-24 - 23-May-24 ..damus@sendsats.lol CAD-25 CAD-353 23-May-25 - 23-May-25 ..damus@sendsats.lol CAD-36 CAD-390 23-May-26 - 23-May-26 ..damus@sendsats.lol CAD-37 CAD-426 23-May-27 - 23-May-27 ..damus@sendsats.lol CAD-25 CAD-451 23-May-28 - 23-May-28 ..damus@sendsats.lol CAD-25 CAD-476 23-May-29 - 23-May-29 ..damus@sendsats.lol CAD-12 CAD-488 23-May-30 - 23-May-30 ..damus@sendsats.lol CAD-29 CAD-517 23-May-31 - 23-May-31 ..damus@sendsats.lol CAD-21 CAD-537
Not making bank or anything but this covered the relay server costs this month!
Hopefully ya'll found this useful, feel free to fork the script and try it out!
-
@ 6e75f797:a8eee74e
2023-08-07 13:16:42Last night I started a nostr community multiplayer instance for No Man's Sky on ZapStream and before we knew it, we had 4 Nostrichs arriving on the genesis planet to join the fun.
NSM is an deterministic, procedurally generated open universe where players can explore, quest, build, combat and have fun together. Every new system discovered is generated when the first Traveller enters the system making the game a unique experience for any open world gaming fan.
If you fancy joining us in the Nostrverse let me know and I'll friend you in #NMS and on Steam or Epic. If you just want to watch the fun, participate in naming systems, planets, fauna and flora come and hang out in my stream or the stream of Oceanbee, HolgerHatGarKeineNode or taette.
If you already own NMS, feel free to add me!
My NMS friend code is: EMAZ-KMHT-ZPFXP
See you in space Traveller! - TheGrinder
-
@ b9e76546:612023dc
2023-05-23 18:13:45The real power of AI will be in its integration of other tools to use in specific situation and recognizing what those tools are. There will be extremely specific & curated AI models (or just basic software circuits) on certain topics, tasks, or concepts. And this will also be a crucial way in which we keep AI safe, and give it understanding of its own actions. In other words, how we prevent it from going insane. I've recently experienced a tiny microcosm of what that might look like...
— ie. a general language model that knows to call on the conceptual math language model, that then makes sense of the question and knows to input it into the calculator app for explicit calculations when solving complex or tricky word problems. And then to apply this in the realm of safety and morals, a specific model that an AI calls on for understanding the consequences and principles of any actions it takes in the real world.
I believe there needs to be an AI "Constitution" (a particular term I heard used to describe it) where there is a specific set of ideas and actions it is enabled to perform, and a particular set of "moral weights" it must assess before taking action. Anyone who's read Asimov will recognize this as "The Three Laws" and that's basically what it would be. This is critical because an AI running an actual humanoid machine like Boston Dynamics could go ape shit literally because it is emulating trolling someone by doing the opposite of what they asked -- I just had a LLM troll me yesterday & go a bit haywire when i asked it to be concise, and every answer afterward was then the wordiest and longest bunch of nonsense imaginable... it was funny, but also slightly sobering to think how these things could go wrong when controlling something in the real world. Now imagine a robot that thinks Kick Ass is a funny movie and starts emulating its behavior thinking it's being funny because it has no model to assess the importance of the humans whose skulls it's smashing and thinks the more blood it can splatter everywhere makes it a more comical experience for those in the room. That's essentially the "real world robot" version of asking a LLM to be concise and instead getting an avalanche of BS. Ask a robot to be funny and maybe it crushes your skull.
Because of that, I think there will be certain "anchors" or particular "circuits" for these LLMs to be constrained by for certain things. Essentially action specific built governors that add meaning to the actions and things they are doing. A very simple version mentioned above would be a calculator. If you ask an LLM right now to do basic math, it screws up all the time. It has no idea how to generate a true answer. It just predicts what an answer might sound like. So even extremely simple and common sense requests turn up idiotic answers sometimes. But if it can recognize that you are asking a math problem, find the relevant mathematical elements, and then call on the hardcoded & built-in calculator circuit, then the LLM isn't doing the calculation, it's simply the interface between the calculation tool and the human interaction.
What I think will be critical as we integrate these into real world machines over time, and as their capabilities become more generalized and layered, will be to build in a sort of moral constitution that behaves like a concrete engine (a calculator), that has the model recognize when something might be a questionable behavior or cause an undesirable outcome, and then call on the "constitution" to make the decision to act or not. In that way, it may actually prevent itself from doing something stupid or terrible that even a human hadn't realized the full consequences of. — ie. it won't help a child get to the roof of his building so he can fly off the side with his cardboard wings.
It will be very interesting to watch these come about because the failure more of AI will be a critically important thing to consider, and unfortunately from an engineering and cultural standpoint, "failure modes" are something that have been underrepresented and increasingly ignored. A simple example is a modern washing machine; when something entirely arbitrary or some silly little feature breaks, the whole thing is useless and you have to bring a technician out to fix it, when a sensible failure mode would be that it simply routes around what arbitrary feature failed, and continues working normally. This, unfortunately, has become the norm for tons of "modern" devices and appliances. they are simultaneously increasingly "advance" and "stupid" at the same time. It's largely a product of the high time preference mindset, and we need MUCH more low time preference consideration as we unleash AI onto the world. It will matter exponentially more when we start making machines that can operate autonomously, can maintain themselves, and learn through their own interactions and environment... and we aren't very far away.
Learn as fast as you can, understand the tools, and stay safe.
grownostr #AI_Unchained
(my very first post on BlogStack.io)
-
@ 52b4a076:e7fad8bd
2023-05-01 19:37:20What is NIP-05 really?
If you look at the spec, it's a way to map Nostr public keys to DNS-based internet identifiers, such as
name@example.com
.If you look at Nostr Plebs:
It's a human readable identifier for your public key. It makes finding your profile on Nostr easier. It makes identifying your account easier.
If you look at basically any client, you see a checkmark, which you assume means verification.
If you ask someone, they probably will call it verification.
How did we get here?
Initially, there was only one client, which was (kind of) the reference implementation: Branle.
When it added support for NIP-05 identifiers, it used to replace the display name with the NIP-05 identifier, and it had to distinguish a NIP-05 from someone setting their display name to a NIP-05. So they added a checkmark...
Then there was astral.ninja and Damus: The former was a fork of Branle, and therefore inherited the checkmark. Damus didn't implement NIP-05 until a while later, and they added a checkmark because Astral and other clients were doing it.
And then came new clients, all copying what the previous ones did... (Snort originally did not have a checkmark, but that changed later.)
The first NIP-05 provider
Long story short, people were wondering what NIP-05 is and wanted it, and that's how Nostr Plebs came to be.
They initially called their service verification. Somewhere between January and February, they removed all mentions to verification except one (because people were searching for it), and publicly said that NIP-05 is not verification. But that didn't work.
Then, there were the new NIP-05 providers, some understood perfectly what a NIP-05 identifier is and applied the correct nomenclature. Others misnamed it as verification, adding confusion to users. This made the problem worse on top of the popular clients showing checkmarks.
(from this point in the article we'll refer to it as a Nostr address)
And so, the scams begin
Spammers and scammers started to abuse Nostr addresses to scam people: - Some providers has been used by fake crypto airdrop bots. - A few Nostr address providers have terminated multitude of impersonating and scam identifiers over the past weeks.
This goes to show that Nostr addresses don't verify anything, they are just providers of human readable handles.
Nostr addresses can be proof of association
Nostr addresses can be a proof of association. The easiest analogy to understand is email:
jack@cash.app -> You could assume this is the Jack that works at Cash App.
jack@nostr-address-provider.example.com -> This could be any Jack.
What now?
We urge that clients stop showing a checkmark for all Nostr addresses, as they are not useful for verification.
We also urge that clients hide checkmarks for all domain names, without exception in the same way we do not show checkmarks for emails.
Lastly, NIP-05 is a nostr address and that is why we urge all clients to use the proper nomenclature.
Signed:
- Semisol, Nostr Plebs (semisol@nostrplebs.com)
- Quentin, nostrcheck.me (quentin@nostrcheck.me)
- Derek Ross, Nostr Plebs (derekross@nostrplebs.com)
- Bitcoin Nostrich, Bitcoin Nostr (BitcoinNostrich@BitcoinNostr.com)
- Remina, zaps.lol (remina@zaps.lol)
- Harry Hodler, nostr-check.com (harryhodler@nostr-check.com)
-
@ 4d444439:7ed2458b
2023-09-08 13:10:00Feel free to read all my articles on the anti-censorship long content platform yakihonne.com.
After a five-week journey, the Indian Chandrayaan-3 spacecraft began its descent to the lunar surface. The craft flipped into a vertical landing position, paused to hover about 450 feet up, then alighted on a dusty plateau between two large craters.
“India is on the moon,” S. Somanath, the chairman of Indian Space Research Organization (ISRO), announced to a cheering crowd in mission control in Bengaluru on Wednesday, August 23.
After the Soviet Union, the United States, and China, India is the fourth nation to successfully land on the moon, and the first to visit the enigmatic south pole region.
“It’s absolutely wonderful to see our partners in India have a successful landing,” says David Kring, a planetary scientist at the Lunar and Planetary Institute in Houston, Texas. “It’s very challenging to put a spacecraft on the surface of another body.”
The Chandrayaan-3 lunar lander attached to the propulsion module that carried it to the moon.PHOTOGRAPH BY ISRO
The difficulty of a moon landing has been underscored by a recent string of failures. Just days before the Chandrayaan-3 landing, Russia’s Luna-25 lander smashed into the surface after an engine failed to properly shut down. A lander built by the Japanese company Ispace—carrying a rover built by the United Arab Emirates—ended catastrophically in April after the spacecraft misjudged its altitude and ran out of fuel. India’s first craft to attempt a moon landing in September 2019 also crashed.
“From the day we started rebuilding our spacecraft after [the] Chandrayaan-2 experience, it has been breathe in, breathe out, Chandrayaan-3 for our team,” said Kalpana Kalahasti, the associate project director of the mission, after the craft touched down.
That team had more reason to celebrate the next morning in India when a small rover named Pragyaan “ramped down from the lander and India took a walk on the moon!” ISRO reported.
The rover, whose name means “wisdom” in Sanskrit, and the lander Vikram, named for the Indian scientist Vikram Sarabhai who helped establish ISRO, will take scientific measurements for about two weeks. After that time, the area will plunge into a two-week long lunar night that the two spacecraft are not expected to survive since they run on solar power.
The first image of the moon's surface taken by India's Chandrayaan-3 spacecraft after its historic touchdown on August 23, 2023. PHOTOGRAPH BY ISRO
Before long, however, a new wave of robots could join the Pragyaan rover and Vikram lander on the moon. A Japanese lander called SLIM, or the Smart Lander for Investigating Moon, is slated to launch Saturday, August 26, hitching a ride with a new space telescope, both developed by the Japan Aerospace Exploration Agency (JAXA).
Other major missions, such as NASA’s VIPER rover and China’s Chang’e 6 sample return, are expected to launch in 2024, poised to reveal new parts of the moon ahead of the Artemis III mission to return humans to the surface.
“It is a very exciting era,” Kring says. “It’s going to be fun.”
Dialing in the landing
Chandrayaan-3 landed at about 69 degrees south latitude, closer to the lunar south pole than any craft before it. On Earth, this would be roughly equivalent to the outer coasts of Antarctica, though it is still “a long way from the pole at 90 degrees,” Kring says.
“They are in this near-polar terrain, which is very old,” he says. “It’s far more ancient than any of the Apollo landing sites, and … geologic studies of that terrain are very exciting.”
An engineer works with a prototype of the Volatiles Investigating Polar Exploration Rover (VIPER) in a test bed of quicksand-like soil in the “sink tank” at the Simulated Lunar Operations Laboratory, or Slope Lab, at NASA’s Glenn Research Center in Cleveland. The VIPER rover will operate at the moon’s south pole to look for water ice. It can pivot each wheel independently and “swim” to get itself out of deep, fine sand. PHOTOGRAPH BY MARK THIESSEN, NATIONAL GEOGRAPHIC
The rover will analyze the mineral composition of the area, while the lander will use a seismometer to listen for “moonquakes”—which can occur as the moon slowly cools and contracts—as well as measure temperatures and atmospheric conditions.
But when the sun sets on Chandrayaan-3, the rover and lander are expected to go dark forever. They have already accomplished their most important goal: safely landing and deploying. Future missions will carry on the exploration of the lunar surface—India could return in a few years during a proposed joint mission with Japan.
JAXA may not have to wait that long, though, as its SLIM lander could launch this week. The eight-foot-tall craft will orbit the moon before attempting a pinpoint landing using image recognition technology to identify craters and precisely determine its location. During the final descent, a sophisticated radar will help the spacecraft land within 100 meters of its target. By contrast, the Chandrayaan-3 landing zone was an ellipse about four kilometers wide.
This type of precision landing will be needed in the future to explore the deep craters and rugged slopes of the lunar south pole. This jagged landscape has areas that never see sunlight, where scientists believe deposits of water ice may have accumulated—a vital resource for establishing a human outpost on the moon.
The magnificent peak known as Malapert Massif (lower left) was selected as an Artemis III candidate landing region. The summit rises more than 16,400 feet above the base. Off in the distance stands a 11,480-foot-tall cliff. One could argue that the sheer grandeur of this place makes it a prime candidate. PHOTOGRAPH BY NASA/GSFC/ARIZONA STATE UNIVERSITY
“The south pole is an incredible, incredible world. It’s topography is extreme, with these really large craters, very tall mountains,” says Anthony Colaprete, the project scientist for the VIPER mission at NASA's Ames Research Center in California. “It is really a fascinating landscape.”
Searching for resources
The craters at the moon’s south pole have entranced scientists for decades. They include some of the oldest and largest lunar craters and hold clues about the state of the solar system more than 3.5 billion years ago, when both the moon and Earth were being pummeled by asteroids.
On much of the moon, one cycle of day and night lasts about 28 Earth days. At the south pole, however, the sun never sets, and instead circles slowly around the horizon. This casts perpetual shadows on some parts of the craters.
These pockets of darkness, among the coldest places in the solar system, may contain deposits of substances that scientists call volatiles—compounds that would sublimate to gas in the sunlight. The most tantalizing volatile on the moon is H2O.
“If water ice is present in quantities and in a distributed state that is recoverable, that would be valuable,” Kring says. “Water, first of all, is useful as an astronaut consumable. It’s useful because it’s a very effective shield against space radiation. And third, you can separate the hydrogen and the oxygen for rocket propellant.”
To investigate whether this ice is accessible to future crewed missions, NASA is preparing to launch a rover called VIPER, or the Volatiles Investigating Polar Exploration Rover, to the moon as soon as November 2024. Equipped with a meter-long drill, the golf-cart-size rover will explore the craters atop an expansive mountain called Mons Mouton near the moon’s south pole.
"Inside these ancient craters are permanently shadowed regions that haven’t seen the light of day in billions of years,” Colaprete says. During its 100-day mission, VIPER will venture into the craters’ shadowy realms, where temperatures can near absolute zero.
Once scientists know where the ice is, and how much, accessing it will require sending water harvesting equipment to the lunar surface. To prepare, NASA has funded multiple aerospace companies to develop lunar landers that could take not only science instruments, but eventually tools and supplies to help construct a base. Two of those spacecraft—the Nova-C lander built by Houston-based Intuitive Machines, and the Peregrine lander from Pittsburgh-based Astrobotic Technology—could launch later this year.
Private companies in India, Japan, Israel, and elsewhere also have their sites set on the moon, with a whole fleet of designs that could one day help shuttle cargo to astronauts living in a habitat on the surface.
Boot prints
To get humans back to the moon, NASA is ramping up its Artemis program. Artemis I, the first test launch of the giant Space Launch System rocket that will carry people to the moon, blasted off on November 15, 2022. Now the space agency is preparing for Artemis II, scheduled to fly astronauts around the moon and back in November 2024. Then Artemis III is slated to land a crew on the surface as soon as December 2025.
But to pull off a crewed landing in that timeframe, NASA is relying on SpaceX’s Starship rocket. The giant launch vehicle, the biggest and most powerful ever flown, broke apart in a fiery explosion during its first test launch in April. It also partially destroyed the launch pad, flinging concrete and metal debris for thousands of feet.
NASA plans to use a modified version of the upper stage of this rocket to land people on the moon, and Artemis III cannot proceed as planned without it. Elon Musk, SpaceX’s founder, discussed upgrades to Starship and its launch pad during an online interview with Bloomberg in June, when he estimated about a 60 percent chance of reaching orbit in the next attempt.
“There’s a lot of still unknowns about what Starship is exactly going to look like when it’s done for lunar missions,” says Jason Davis, a senior editor at the Planetary Society. “How long can we stay there on the moon inside that thing? How much cargo can it bring?”
NASA has also contracted Jeff Bezos’ rocket company Blue Origin to lead a consortium of aerospace companies in building a second crewed lunar lander. Meanwhile, China plans to land astronauts by 2030 and is gearing up for the Chang’e 6 sample-return mission to the lunar south pole next year.
Until crewed lunar landers can be completed, the moon’s surface will need to be studied from afar using robotic explorers like Chandrayaan-3. But perhaps in the not-too-distant future, scientists and engineers in space suits will visit the shadowed craters of the lunar south pole to harvest their ice and discover their secrets.
By:JAY BENNETT Link:https://www.nationalgeographic.com/premium/article/india-land-spacecraft-near-moons-south-pole
-
@ 32092ec1:8e9fd13a
2023-04-25 18:02:43Bitcoin maximalism, to many, has evolved from a belief that bitcoin is the only crypto asset worth owning to a belief that bitcoin is the only asset worth owning. In addition, many observe that those who declare themselves to be bitcoin maximalists have also declared their allegiance to many other lifestyle choices. This was well articulated by Jameson Lopp in his blog post “A History of Bitcoin Maximalism.”
While some (myself included for a while) embrace the title of bitcoin maximalist, perhaps out of spite given that it was originally intended to be a derogatory term, I eventually have decided to reject it. While I do not own any other crypto assets, and I do believe that bitcoin offers the best risk adjusted investment across many asset classes, it is not, nor could it ever realistically be, my only investment. Due to the ambiguity of the definition of a “bitcoin maximalist” to some, even the fact that I have equity in my primary residence may call into question my status as a bitcoin maximalist. Although most people likely agree that this point of view is nonsensical, I feel that it is also completely pointless to take the time to defend the purity of my “bitcoin maximalism;” and so, I reject it. In place of the bitcoin maximalist label, I hereby declare myself to be a truth maximalist.
The truth is that 99% of non-bitcoin crypto assets are completely worthless; specifically, what I mean is that they literally add zero net positivity to humanity. The remaining 1% of non-bitcoin crypto assets may indeed serve some limited improvements to existing systems or other alternative benefits; however, these crypto assets are also, in my opinion, already highly over valued given the magnitude of the problems they are intending to solve. Most of the incremental improvements offered by cryptos are related to marginally improving systems based on fiat money and the banking industry both of which bitcoin intends to largely obsolete and are still net negative to humanity and designed to syphon wealth from the powerless to the powerful.
I do believe that open source, decentralized, cryptographic solutions will play additional roles in society and offer an opportunity to disrupt many existing centralized solutions. However, most of these solutions will not be investable assets, just as the internet itself is not an investable asset.
I believe it also to be true that investment properties intended for yield generation come with a host of additional costs and risks that are rarely properly accounted for when assessing the value of these assets. After accounting for the probability weighted costs of evictions, seizures, taxes, maintenance, inflation, and loan interest, I find it difficult to justify these investments over bitcoin held in self-custody.
Many other investable assets that simply sit on a bank’s balance sheet (e.g., stocks, bonds, etc.) can easily be seized if any number of three letter agencies decided that you should not have these assets. This can be done with no due process and does not require any in depth investigation to determine the validity of their claims. I believe that the probability of these types of seizures is much higher for known bitcoiners who are also critical of the government and the media, especially if current financial systems begin to collapse and/or if bitcoin’s value dramatically increases.
Beyond seizure of your individual assets, as the world begins to divest from the highly inflated store of value assets listed on the NYSE and NASDAQ due to seizure risks at the sovereign level, the risk of extreme inflation adjusted devaluation of your portfolio should also be considered. Compounding this risk is the opportunity cost associated with the fact that some of the wealth that may be withdrawn from the US stock market is also likely going to flow into bitcoin. These risks are rarely accounted for or quantified when determining the value of a stock portfolio in contrast to simply holding bitcoin in self-custody.
My opinions on these matters are common among bitcoiners who are largely labeled bitcoin maximalists. However, the title of truth maximalist also fits nicely when trying to counter some of the softer points made in Lopp’s blog post mentioned above. My thesis is that most people who have adopted the bitcoin maximalist “lifestyle” choices have done so as a result of their quest for truth, not as a result of their desire to virtue signal their status as bitcoin maximalists.
The truth is that a carnivore diet is much healthier than governments, media and academia would like you to believe (disclosure: I have never tried a carnivore diet)
The truth is that weightlifting is more beneficial than cardio to overall health (disclosure: I am not into weightlifting)
The truth is that traditional gender roles are beneficial to mental health (disclosure: although my wife is a full-time, stay-at-home mom, my marriage is far from perfect).
The truth is that extreme consequences from greenhouse gasses in the atmosphere are extrapolatory and predictions have historically failed miserably (disclosure: I do not think there is zero risk of extreme disasters from excessive levels of carbon in the atmosphere).
The truth is that seed oils are terrible for you (disclosure: I have ingested seed oils since discovering this).
The truth is that COVID vaccines pointlessly add risk to healthy people and children (disclosure: I received two doses of the COVID vaccine prior to realizing this truth and my wife still disagrees with me on this).
The truth is that natural health solutions are often more beneficial than big pharma would like you to believe (disclosure: I have not used any exotic natural remedies).
The truth is that modern art and architecture is garbage (disclosure: this is only a personal opinion).
The Truth is that Jesus Christ died on a cross and ascended into Heaven in order to save the world from sin (disclosure: although I have always been a Christian, over the last year or so I have dedicated a significant amount of time researching this and so far, everything is supporting this to be literally true and much more easily believable than you might think).
Maybe you disagree with some of these things that I have determined to be true. But let me ask, have done your own research? What is your basis for a counter argument to any of these truths? Did you verify or are you trusting someone else’s opinion? If you are trusting someone else’s research, did you investigate their credibility or determine if they have significant biases? Certainly, my opinions on the topics listed above not always based on exhaustive independent research, but I did approach each with skepticism and did not always believe these things with conviction prior to looking into them. I think any bitcoiner would agree that if you are trusting fiat funded academia, government organizations or mainstream media, you may need to do more research.
The truth is that I will continue to seek the truth and I will encourage others to do the same. The truth is that I welcome new information and listening to opinions that counter my beliefs. When choosing to have strong conviction in minority opinions about the truth, it is extremely valuable to be able to articulate and refute the points that are contrary to your beliefs. It is also important to be able to change your mind when presented with sufficient evidence against your opinion. This is what it means to be a truth maximalist. It just so happens that the truth is that bitcoin is the only crypto asset worth investing in. Don’t believe me? Prove it.
786973
-
@ 6e468422:15deee93
2023-04-04 13:23:19Not too long ago, I tried to paint a picture of what a vision for a value-enabled web could look like. Now, only a couple of months later, all this stuff is being built. On nostr, and on lightning. Orange and purple, a match made in heaven.
It goes without saying that I'm beyond delighted. What a time to be alive!
nostr
Here's the thing that nostr got right, and it's the same thing that Bitcoin got right: information is easy to spread and hard to stifle.[^fn-stifle] Information can be copied quickly and perfectly, which is, I believe, the underlying reason for its desire to be free.
[^fn-stifle]: That's a Satoshi quote, of course: "Bitcoin's solution is to use a peer-to-peer network to check for double-spending. In a nutshell, the network works like a distributed timestamp server, stamping the first transaction to spend a coin. It takes advantage of the nature of information being easy to spread but hard to stifle."
Easy to spread, hard to stifle. That's the base reality of the nature of information. As always, the smart thing is to work with nature, not against it.[^1] That's what's beautiful about the orange coin and the purple ostrich: both manage to work with the peculiarities of information, not against them. Both realize that information can and should be copied, as it can be perfectly read and easily spread, always. Both understand that resistance to censorship comes from writing to many places, making the cost of deletion prohibitive.
Information does not just want to be free, it longs to be free. Information expands to fill the available storage space. Information is Rumor's younger, stronger cousin; Information is fleeter of foot, has more eyes, knows more, and understands less than Rumor.
Eric Hughes, A Cypherpunk's Manifesto
Nostr is quickly establishing itself as a base layer for information exchange, one that is identity-native and value-enabled. It is distinctly different from systems that came before it, just like Bitcoin is distinctly different from monies that came before it.
As of today, the focus of nostr is mostly on short text notes, the so-called "type 1" events more commonly known as tweets.[^fn-kinds] However, as you should be aware by now, nostr is way more than just an alternative to twitter. It is a new paradigm. Change the note kind from
1
to30023
and you don't have an alternative to Twitter, but a replacement for Medium, Substack, and all the other long-form platforms. I believe that special-purpose clients that focus on certain content types will emerge over time, just like we have seen the emergence of special-purpose platforms in the Web 2.0 era. This time, however, the network effects are cumulative, not separate. A new paradigm.Let me now turn to one such special-purpose client, a nostr-based reading app.
[^fn-kinds]: Refer to the various NIPs to discover the multitude of event kinds defined by the protocol.
Reading
I'm constantly surprised that, even though most people do read a lot online, very few people seem to have a reading workflow or reading tools.
Why that is is anyone's guess, but maybe the added value of such tools is not readily apparent. You can just read the stuff right there, on the ad-ridden, dead-ugly site, right? Why should you sign up for another site, use another app, or bind yourself to another closed platform?
That's a fair point, but the success of Medium and Substack shows that there is an appetite for clean reading and writing, as well as providing avenues for authors to get paid for their writing (and a willingness of readers to support said authors, just because).
The problem is, of course, that all of these platforms are platforms, which is to say, walled gardens that imprison readers and writers alike. Worse than that: they are fiat platforms, which means that permissionless value-flows are not only absent from their DNA, they are outright impossible.[^2]
Nostr fixes this.
The beauty of nostr is that it is not a platform. It's a protocol, which means that you don't have to sign up for it---you can create an identity yourself. You don't have to ask for permission; you just do, without having to rely on the benevolence of whatever dictator is in charge of the platform right now.
Nostr is not a platform, and yet, powerful tools and services can be built and monetized on top of it. This is good for users, good for service providers, and good for the network(s) at large. Win-win-win.
So what am I talking about, exactly? How can nostr improve everyone's reading (and writing) experience?
Allow me to paint a (rough) picture of what I have in mind. Nostr already supports private and public bookmarks, so let's start from there.
Imagine a special-purpose client that scans all your bookmarks for long-form content.[^fn-urls] Everything that you marked to be read later is shown in an orderly fashion, which is to say searchable, sortable, filterable, and displayed without distractions. Voilà, you have yourself a reading app. That's, in essence, how Pocket, Readwise, and other reading apps work. But all these apps are walled gardens without much interoperability and without direct monetization.
[^fn-urls]: In the nostr world long-form content is simply markdown as defined in NIP-23, but it could also be a link to an article or PDF, which in turn could get converted into markdown and posted as an event to a special relay.
Bitcoin fixes the direct monetization part.[^fn-v4v] Nostr fixes the interoperability part.
[^fn-v4v]: ...because Bitcoin makes V4V practical. (Paywalls are not the way.)
Alright, we got ourselves a boring reading app. Great. Now, imagine that users are able to highlight passages. These highlights, just like bookmarks now, could be private or public. When shared publicly, something interesting emerges: an overlay on existing content, a lens on the written Web. In other words: swarm highlights.
Imagine a visual overlay of all public highlights, automatically shining a light on what the swarm of readers found most useful, insightful, funny, etc.
Further, imagine the possibility of sharing these highlights as a "type 1" event with one click, automatically tagging the highlighter(s)---as well as the author, of course---so that eventual sat-flows can be split and forwarded automatically.
Voilà, you have a system that allows for value to flow back to those who provide it, be it authors, editors, curators, or readers that willingly slog through the information jungle to share and highlight the best stuff (which is a form of curation, of course).
Zaps make nostr a defacto address book[^fn-pp] of payment information, which is to say lightning addresses, as of now. Thanks to nostr wallet connect (among other developments), sending sats ~~will soon be~~ is already as frictionless as leaving a like.
[^fn-pp]: The Yellow Pages are dead, long live The Purple Pages!
Value-for-value and participatory payment flows are something that traditional reading apps desperately lack, be it Pocket, Instapaper, Readwise, or the simple reading mode that is part of every browser.
A neat side-effect of a more structured way to share passages of text is that it enables semi-structured discussions around said passages---which could be another useful overlay inside special-purpose clients, providing context and further insights.[^5]
Further, imagine the option of seamlessly switching from text-on-screen to text-to-speech, allowing the user to stream sats if desired, as Podcasting 2.0 clients already do.[^3]
Imagine user-built curations of the best articles of the week, bundled neatly for your reading pleasure, incentivized by a small value split that allows the curator to participate in the flow of sats.
You get the idea.
I'm sure that the various implementation details will be hashed out, but as I see it, 90% of the stuff is already there. Maybe we'll need another NIP or two, but I don't see a reason why this can't be built---and, more importantly: I don't see a reason why it wouldn't be sustainable for everyone involved.
Most puzzle pieces are already there, and the rest of them can probably be implemented by custom event types. From the point of view of nostr, most everything is an event: bookmarks are events, highlights are events, marking something as read is an event, and sharing an excerpt or a highlight is an event. Public actions are out in the open, private actions are encrypted, the data is not in a silo, and everyone wins. Especially the users, those who are at the edge of the network and usually lose out on the value generated.
In this case, the reading case, the users are mostly "consumers" of content. What changes from the producing perspective, the perspective of the writer?
Writing
Back to the one thing that nostr got right: information is easy to spread but hard to stifle. In addition to that, digital information can be copied perfectly, which is why it shouldn't matter where stuff is published in the first place.
Allow me to repeat this point in all caps, for emphasis: IT SHOULD NOT MATTER WHERE INFORMATION IS PUBLISHED, and, maybe even more importantly, it shouldn't matter if it is published in a hundred different places at once.[^fn-torrents]
What matters is trust and accuracy, which is to say, digital signatures and reputation. To translate this to nostr speak: because every event is signed by default, as long as you trust the person behind the signature, it doesn't matter from which relay the information is fetched.
This is already true (or mostly true) on the regular web. Whether you read the internet archive version of an article or the version that is published by an online magazine, the version on the author's website, or the version read by some guy that has read more about Bitcoin than anyone else you know[^fn-guy]---it's all the same, essentially. What matters is the information itself.
[^fn-guy]: There is only one such guy, as we all know, and it's this Guy: nostr:npub1h8nk2346qezka5cpm8jjh3yl5j88pf4ly2ptu7s6uu55wcfqy0wq36rpev
Practically speaking, the source of truth in a hypernostrized world is---you guessed it---an event. An event signed by the author, which allows for the information to be wrapped in a tamper-proof manner, which in turn allows the information to spread far and wide---without it being hosted in one place.
The first clients that focus on long-form content already exist, and I expect more clients to pop up over time.[^4] As mentioned before, one could easily imagine prism-like value splits seamlessly integrated into these clients, splitting zaps automatically to compensate writers, editors, proofreaders, and illustrators in a V4V fashion. Further, one could imagine various compute-intensive services built into these special-purpose clients, such as GPT Ghostwriters, or writing aids such as Grammarly and the like. All these services could be seamlessly paid for in sats, without the requirement of any sign-ups or the gathering of any user data. That's the beauty of money proper.
Plagiarism is one issue that needs to be dealt with, of course. Humans are greedy, and some humans are assholes. Neither bitcoin nor nostr fixes this. However, while plagiarism detection is not necessarily trivial, it is also not impossible, especially if most texts are published on nostr first. Nostr-based publishing tools allow for OpenTimestamp attestations thanks to NIP-03, which in turn allows for plagiarism detection based on "first seen" lookups.
That's just one way to deal with the problem, of course. In any case, I'm confident that we'll figure it out.
Value
I believe that in the open ~~attention~~ information economy we find ourselves in, value will mostly derive from effective curation, dissemination, and transmission of information, not the exclusive ownership of it.
Although it is still early days, the statistics around Podcasting 2.0 and nostr zaps clearly show that (a) people are willing to monetarily reward content they care about, and (b) the willingness to send sats increases as friction decreases.
The ingenious thing about boostagrams and zaps is that they are direct and visible, which is to say, public and interactive. They are neither regular transactions nor simple donations---they are something else entirely. An unforgable value signal, a special form of gratitude and appreciation.
Contrast that with a link to Paypal or Patreon: impersonal, slow, indirect, and friction-laden. It's the opposite of a super-charged interaction.
While today's information jungle increasingly presents itself in the form of (short) videos and (long-form) audio, I believe that we will see a renaissance of the written word, especially if we manage to move away from an economy built around attention, towards an economy built upon value and insight.
The orange future now has a purple hue, and I believe that it will be as bright as ever. We just have a lot of building to do.
Further Reading
NIPs and Resources
- Nostr Resources
- value4value.info
- nips.be
- NIP-23: Long-form content
- NIP-57: Event-specific zap markers
- NIP-47: Nostr Wallet Connect
- NIP-03: OpenTimestamps attestations for events
Originally published on dergigi.com
[^1]: Paywalls work against this nature, which is why I consider them misguided at best and incredibly retarded at worst.
[^2]: Fiat doesn't work for the value-enabled web, as fiat rails can never be open and permissionless. Digital fiat is never money. It is---and always will be---credit.
[^3]: Whether the recipient is a text-to-speech service provider or a human narrator doesn't even matter too much, sats will flow just the same.
[^4]: BlogStack and Habla being two of them.
[^5]: Use a URI as the discussion base (instead of a highlight), and you got yourself a Disqus in purple feathers!
[^fn-torrents]: That's what torrents got right, and ipfs for that matter.
-
@ f8e6c643:03328ca9
2023-08-02 15:45:25Here’s the neat part, you don’t...
...or rather, you can’t find rare satoshis. Rare satoshis don’t exist because individual satoshis don’t actually exist within the bitcoin network, only UTXOs.
But my wallet says I have satoshis.
And the container of your food says it has calories. The bathroom scale says your body has lbs/kg. The tape measure says your floors have inches/cm. These are units of measure of a property of something, but they are not distinct individual units of the thing being measured. Calories measure energy. Scales measure mass. Rulers measure distance. These are properties of a thing, but not the thing itself.
Likewise, satoshis (aka, sats) are a unit of measure for bitcoin UTXOs, which are the "things" that actually exist within the bitcoin network. A UTXO, or "unspent transaction output," can be very small, only a few hundred sats, or it can be very large, hundreds of millions or even billions of sats, but there are only UTXOs measured in sats and spendable by their corresponding private keys. There are no satoshis sitting in storage in bitcoin wallets and nodes.
If that's true, then why is Bitcoin Magazine selling "rare satoshis"?
They are salesmen in search of profit, and not all salesmen are honest. The product they are selling misrepresents the truth. Put simply, Bitcoin Magazine is lying about what they are selling.
What they are actually selling is a UTXO measured in some amount of sats that can be cryptographically linked to another UTXO from the past that no longer exists. Why doesn't it exist? Because a UTXO is, by definition, "unspent." Once you spend one UTXO, new UTXOs are created and mined into a new block.
So I can't buy one of Hal Finney's satoshis?
Unfortunately, no, you cannot. At best you could pay someone like Bitcoin Magazine to spend one of their UTXOs to a new UTXO at an address you control. It is up to you to decide if the cryptographic link to previous entries in the ledger has any added value or meaning beyond the sats-denominated value of the UTXO.
It would be a little bit like if I had a dollar bill, and I went to the bank and deposited it into your account, and then the bank destroyed that physical bill and replaced it with a new one when you came in to withdraw it. While you would now possess access to the $1 of value, you would not have the dollar bill that I deposited. In fact, it no longer exists, even though there is proof on the bank's ledger of the transfer of value from me to you.
Ok, so what? I can do what i want with my money.
Yes, you can. That is the freedom afforded to you by bitcoin. You are free to trade your sats for a lesser amount of sats. It's just my opinion that you ought to at least understand that that's all you're doing.
🌽 🤙
-
@ 20986fb8:cdac21b3
2023-07-29 06:45:23YakiHonne.com is continuously improving to offer a top-notch user experience. With weekly updates being rolled out, you are invited to test these updates and post your feedback and opinions as an article via YakiHonne.com.
As an incentive, participants can earn up to 100,000 SATs.
Round 2 will be from 27th to 30th July
How to participate:
- Pick one or multiple Updates below, test it (them)
- Write your feedback and opinion (pros and cons are all welcomed)
- Post your article on Nostr via YakiHonne.com
- Share your article to social media like Nostr and Twitter, don't forget to @YakiHonne
- Share the link to our group: http://t.me/YakiHonne_Daily_Featured
- Be Zapped!
Requirements:
- No malicious speech such as discrimination, attack, incitement, etc.
- No Spam/Scam, not fully AI-generated article
- No directly copy & paste from other posts on Relays
- Experience our updates in action, NO limit on the length of your post, share your REAL feedback and opinion
- The top 10 posts will be zapped during each round.
- The evaluation will based on the article's depth, completeness, and constructiveness.
- Contact us for additional zaps if bugs are found.
Updates to be tested in Round 2:
-
Comments: re-implemented and comments can be deleted
-
NIP-25 supporting: users now can upvote and downvote
-
Zap stats: Zaps sent and Zaps received can be seen from users profiles
-
“login with an extension” button: now it is grayed out rather than invisible
-
Search: search list showing optimization, adjust users searching results to the NIP-21 URI scheme
-
Tags: click on the tags in the article to view the content under the tag
-
Share: sharing posts with one click
-
NIP-05: verify your profile
If you missed Round 1, the updates below could be tested as additions:
-
Comment function: more user-friendly
-
Stats area: clearly displays the interactive status of each article
-
Following function: generated-key users can also be followed
-
Curation function: easily add or remove articles from an existing curation
-
Tags: search and browse articles with the tags
-
Home feed scrolling pagination: optimized data fetching and faster loading time
-
Article editing preview: preview the final version of the article while writing in MarkDown
Don't miss this opportunity to participate in Round 2, test the updates, and provide valuable feedback. Head over to YakiHonne.com to share your thoughts and earn SATs for your valuable input. Act fast!
About YakiHonne:
YakiHonne is a Nostr-based decentralized content media protocol, which supports free curation, creation, publishing, and reporting by various media. Try YakiHonne.com Now!
Follow us
- Telegram: http://t.me/YakiHonne_Daily_Featured
- Twitter: @YakiHonne
- Nostr pubkey: npub1yzvxlwp7wawed5vgefwfmugvumtp8c8t0etk3g8sky4n0ndvyxesnxrf8q
-
@ 20986fb8:cdac21b3
2023-07-29 06:44:43A long-term Nostr Creation Grant, with a 17,500,000 SATs funding pool
Round 3 starts on 22 July till 5 Aug!
Creating for You and Your Fans through Nostr and ZAP.
Nostr is a simple, open and censorship-resistant protocol, the number of users has been growing, and more and more users use zap to tip content. Nostr's growth over the past six months is amazing, which is a great encouragement for all nostrians. This is also a great encouragement for content creators. Earn SATs by posting your creations on nostr, allowing your readers to encourage better content creation while tipping your creations.
Zaps, provide a global solution for tipping content. Some posts on Nostr even got 89K+ SATs within one day, like Roya, Brianna.
On the other hand, while Apple's decision to take a 30% cut from fundraisers and humanitarian aid posts is criticized, Bitcoin emerges as a vital alternative for those suffering globally. Organizations like Oslo Freedom Forum and Qala Africa shed light on how Africans heavily rely on Bitcoin due to unreliable banking systems.
To this end, YakiHonne.com officially released the creation grant project, Creating for You and Your Fans through Nostr and ZAP. Join us on YakiHonne.com to share your long-form articles and curate content, experiencing the power of Nostr's censorship-resistance and ZAP features. Earn Sats rewards for publishing on Relay and Yakihonne clients. Don't forget to include your ZAP address and let's build Nostr's long content together!
What You Will Get From Your First 10 Posts in each round:
- 500 SATs, if you post on Relays through other clients
- 1000 SATs, if you post articles from other platforms to Relays as the first one on Relays and are curated or tweeted by YakiHonne
- 2000 SATs, for posting your own past articles on Relays through YakiHonne.com
- 3000 SATs, for posting your new original on Relays through YakiHonne.com
Zap Rules:
- No malicious speech such as discrimination, attack, incitement, etc.
- No Spam/Scam, not fully AI-generated article
- No directly copy & paste from other posts on Relays
- Spread positive content like your knowledge/experience/insight/ideas, etc.
How to Get Zap:
- Join YakiHonne TG group: https://t.me/YakiHonne_Daily_Featured
- Share your post in the group
- Make sure your LN address is in your profile
- Based on the rules above, we will ZAP your post directly within 2 days
Join our group for more queries: https://t.me/YakiHonne_Daily_Featured
About YakiHonne:
YakiHonne is a Nostr-based decentralized content media protocol, which supports free curation, creation, publishing, and reporting by various media. Try YakiHonne.com Now!
Follow us
- Telegram: http://t.me/YakiHonne_Daily_Featured
- Twitter: @YakiHonne
- Nostr pubkey: npub1yzvxlwp7wawed5vgefwfmugvumtp8c8t0etk3g8sky4n0ndvyxesnxrf8q
-
@ d8714c92:cd61e54a
2023-09-08 13:05:05ATTENTION! SOLDIER, REST!
Like a diver in deep waters, we're going to dive into one of the most crucial aspects of the game, I believe it's the most important: your bankroll and its management. Do you have less than fifty games under your belt? Are you just starting your journey at the tables? Do you have chips and are learning to bet? Soldier, you're in the right place. Below, we'll explore how to handle your money, make smart decisions, and maintain mental strength during buy-ins.
What is a Bankroll? The Bankroll Concept
The bankroll is the soul of poker. It's the money you have set aside exclusively for your games. Properly managing your bankroll is vital to survive the inevitable fluctuations in Texas Hold'em. Whether you've won the World Series or just started playing yesterday, there will always be ups and downs in your performance. Having a solid bankroll allows you to maintain control over your finances and avoid the dreaded bankruptcy.
Poker is bound to take hold of you, so creating a barrier between your personal finances and your passion for poker will help you maintain a logical approach and avoid impulsive decisions at the table, which can often lead to significant losses.
Managing the Bankroll
Proper bankroll management involves setting limits and sticking to them. The fundamental principle is to never bet more than you can afford to lose. It's advisable to allocate a specific amount of money for poker, regardless of your wins or losses in other areas of your life.
A commonly used approach is "10% or less" of your bankroll in a single game. Let's round up the numbers for clarity: if you have $100 in your bankroll, the buy-in for a tournament or cash game shouldn't exceed $10. This gives you enough margin to recover from any bad streak without risking your entire bankroll.
Remember, the key to bankroll management is discipline. If you happen to lose several games in a row and your bankroll significantly decreases, don't succumb to the temptation to reload immediately. Take a break, evaluate your decisions, and, if necessary, consider playing at lower-stake tables until you can recover.
O...or...
You can try our freeroll table. Also, do you want to try a new strategy? Are you testing a new system or want to learn from your mistakes? Request play money chips and come in. The beauty of poker is that it always gives you opportunities, ALWAYS. Try your free chips today.
How Much to Invest?
The average buy-in refers to the amount of money you're willing to invest in a game. It's crucial to choose tables or tournaments with buy-ins that fit your bankroll. If you're a recreational or beginner player, we recommend starting with low buy-in tables, where the competition is usually softer, and losses won't be devastating.
When you're playing with a limited bankroll, it's important not to overexpose yourself. Even if you believe you can compete at a high buy-in table, resist the temptation and play within your means. Practicing at low and mid-stakes tables will allow you to hone your skills and gain confidence before facing more experienced opponents.
Rebuys
In tournaments with a rebuy structure, having a solid strategy is important. Making wise use of rebuys can be an effective tactic to increase your chances of winning. A rebuy allows you to re-enter the game with the same initial chip stack or, in some cases, with a predetermined additional amount. I repeat: to do this, a defined strategy is important, no improvisations. Be careful not to fall into the trap of rebuying compulsively. Having a plan doesn't equate to making a purchase. Evaluate the situation and decide if a rebuy is genuinely advantageous or if it's better to wait for another tournament.
For example, if you're in an early stage of the tournament and lose some chips, too early, in that case, it might be wiser to save your money for another time instead of rebuying immediately. On the other hand, in the late stage of a tournament, where the blinds are high and the pressure is on, a strategic rebuy can be a smart move to keep your winning opportunity alive.
Strong Mental Game in Buy-Ins
The buy-in can be a stressful moment, especially if you're playing with money that matters to you. Maintaining mental strength is crucial for making informed decisions and avoiding emotional play. Accept that poker is a game of skill and luck, and losses are part of the process. Don't let a bad game demoralize you; instead, use it as an opportunity to learn and improve.
One way to maintain mental strength is to establish a routine before each poker session. Take deep breaths, focus on your goals, and visualize a winning attitude. Also, don't let emotions take over during the game. If you feel frustrated or anxious, take a short break, stand up, and stretch to clear your mind before returning to the table with a renewed attitude.
Recommendations from Poker4Sats
Soldier, the battle unleashed at the tables can cause serious drama, and at times, you'll feel all-powerful, or you'll hear this frequently: the table is playing against me, the cards aren't in my favor. So, here are three quick things.
- Study and Practice: Dedicate time to studying the game, whether through books, videos, or articles. Also, play regularly to put into practice what you learn and gain experience at the table. Subscribe to our profile because here, you'll always have information about the game and Bitcoin.
- Start with a Conservative Bankroll: It's perfectly fine to start with a small, conservative, modest bankroll. It's not a sign of insecurity or anything; on the contrary, it's what's available today for observation, learning, and making mistakes.
- Control Your Emotions: Poker can be exciting and sometimes frustrating. Learn to control your emotions and avoid making impulsive decisions based on frustration or euphoria.
Losing is part of the nature of poker. That's not a problem, and today, we need to design a strategy that suits us. Good luck at the tables!
-
@ 4044176c:b3f3c23c
2023-09-08 13:01:03For years, one of the first lines of defense against phishing emails has been broken English.
To guard against messages that try to trick recipients into clicking malicious links or revealing credentials, corporate training programs have urged employees to be on the lookout for spelling mistakes, odd grammar and other errors common to those for whom English isn’t a first language.
Now generative AI tools, including OpenAI’s popular ChatGPT, can fix all those red flags.
In the hands of even amateur hackers, AI has become a potent threat due to its ability to analyze vast amounts of publicly available data about a target and create remarkably personalized emails in just seconds.
“Suddenly, that text is going to look like it’s coming from your granddaughter or another child. They’ll know who your best friend is, and it will come that way,” said Kathryn Garcia, director of operations for New York state, who led the development of its first cybersecurity strategy.
The Problem
So-called large language models like ChatGPT and Google’s Bard don’t understand language as humans do, but they can dissect how sentence structure, colloquialisms and slang work, predicting how to construct written speech, sometimes with uncanny precision.
Email security company Abnormal Security said it has seen phishing emails from generative AI platforms used against its customers. The messages are perfectly crafted and look legitimate, making them difficult to detect at first glance, said Abnormal Chief Executive Evan Reiser.
“You look at these emails and there’s no trigger in your mind warning you that this could be a phishing attack,” he said.
LLM tools can scrape the web for information about a person on social media, news sites, internet forums and other sources to tailor tempting emails the way hackers for nation-states often spend months doing. If attackers already have access to proprietary information, they can salt in more convincing details, even mimicking writing styles.
“Now, a criminal can just take those emails, dump them automatically into an LLM and tell it to write an email referencing my last five [online] conversations. What used to take eight hours can be there in eight seconds,” Reiser said.
ChatGPT and Bard have inbuilt protections against creating malicious content such as phishing emails. But many open-source LLMs have no safeguards, and hackers are licensing models that can write malware to willing buyers on darknet forums.
The Illusion of Safety
How generative AI can create eerily compelling phishing emails
In this example, Abnormal Security used an LLM created by one of its engineers to demonstrate how easily a convincing email can be generated for a specific person. The algorithm scraped my public-facing social media presence to generate an email tailored to me, completed in seconds.
The Future
AI has long been used to manipulate images to make convincing deepfakes. Simulated speech that mimics a person’s voice is developing rapidly. Hybrid attacks involving email, voice and video are an approaching reality.
But the attacks we can’t predict are the real threat, cybersecurity and national-security experts contend.
“AI will make the techniques used today more scalable, faster and more effective, but also AI might be able to think about attacks that we can’t even conceive today,” said Eric Goldstein, executive assistant director for cybersecurity at the Cybersecurity and Infrastructure Security Agency, part of the Department of Homeland Security.
AI programs have already proved, for instance, that they can outfox humans at games such as chess and go by coming up with strategies people would be unlikely to devise, Goldstein said. Applying the same template to cybercrime could result in online attacks that current systems aren’t designed to watch for, or social-engineering attacks that seem so lifelike they are impossible to detect.
But some cybersecurity companies are beginning to incorporate generative AI into their own products, to try to get ahead of its widespread misuse. Email security provider Ironscales, for instance, uses a proprietary LLM to generate phishing emails for security awareness training.
Defensive AI systems will be needed to fight off AI-powered attacks, said Eyal Benishti, Ironscales chief executive. Another coming ordeal: AI’s ability to produce convincing attacks at scale.
“Just imagine business email compromise and targeted phishing at the same volume as we experience spam, because that’s what will happen,” he said.
In a generative AI world, corporate security must change, said Diego Souza, chief information security officer of manufacturer Cummins.
Companies will need to improve employee training and awareness on phishing, Souza said. Networks will have to be carefully segregated to prevent hackers from doing a lot of damage if they break in, he said.
Chris Inglis, an adviser at corporate risk consulting firm Hakluyt, said cyber professionals are reeling from the speed at which generative AI has arrived. But the risks aren’t limitless, said Inglis, who until February was U.S. national cyber director.
For LLMs to continue to learn, they must ingest lots of data, and the larger LLM platforms have begun to exhaust publicly available data sets, he said. That means there is a natural cap to what widely available machines can be trained on, he said, meaning the current pace of development might slow.
“The interesting thing about Chat GPT isn’t what it is at the moment, but the speed at which it has come at us,” he said.
By:James Rundle Link:https://www.wsj.com/articles/generative-ai-could-revolutionize-emailfor-hackers-5a8c725c?mod=ai_news_article_pos1
-
@ e6ce6154:275e3444
2023-07-27 14:12:49Este artigo foi censurado pelo estado e fomos obrigados a deletá-lo após ameaça de homens armados virem nos visitar e agredir nossa vida e propriedade.
Isto é mais uma prova que os autoproclamados antirracistas são piores que os racistas.
https://rothbardbrasil.com/pelo-direito-de-ser-racista-fascista-machista-e-homofobico
Segue artigo na íntegra. 👇
Sem dúvida, a escalada autoritária do totalitarismo cultural progressista nos últimos anos tem sido sumariamente deletéria e prejudicial para a liberdade de expressão. Como seria de se esperar, a cada dia que passa o autoritarismo progressista continua a se expandir de maneira irrefreável, prejudicando a liberdade dos indivíduos de formas cada vez mais deploráveis e contundentes.
Com a ascensão da tirania politicamente correta e sua invasão a todos os terrenos culturais, o autoritarismo progressista foi se alastrando e consolidando sua hegemonia em determinados segmentos. Com a eventual eclosão e a expansão da opressiva e despótica cultura do cancelamento — uma progênie inevitável do totalitarismo progressista —, todas as pessoas que manifestam opiniões, crenças ou posicionamentos que não estão alinhados com as pautas universitárias da moda tornam-se um alvo.
Há algumas semanas, vimos a enorme repercussão causada pelo caso envolvendo o jogador profissional de vôlei Maurício Sousa, que foi cancelado pelo simples fato de ter emitido sua opinião pessoal sobre um personagem de história em quadrinhos, Jon Kent, o novo Superman, que é bissexual. Maurício Sousa reprovou a conduta sexual do personagem, o que é um direito pessoal inalienável que ele tem. Ele não é obrigado a gostar ou aprovar a bissexualidade. Como qualquer pessoa, ele tem o direito pleno de criticar tudo aquilo que ele não gosta. No entanto, pelo simples fato de emitir a sua opinião pessoal, Maurício Sousa foi acusado de homofobia e teve seu contrato rescindido, sendo desligado do Minas Tênis Clube.
Lamentavelmente, Maurício Sousa não foi o primeiro e nem será o último indivíduo a sofrer com a opressiva e autoritária cultura do cancelamento. Como uma tirania cultural que está em plena ascensão e usufrui de um amplo apoio do establishment, essa nova forma de totalitarismo cultural colorido e festivo está se impondo de formas e maneiras bastante contundentes em praticamente todas as esferas da sociedade contemporânea. Sua intenção é relegar ao ostracismo todos aqueles que não se curvam ao totalitarismo progressista, criminalizando opiniões e crenças que divergem do culto à libertinagem hedonista pós-moderna. Oculto por trás de todo esse ativismo autoritário, o que temos de fato é uma profunda hostilidade por padrões morais tradicionalistas, cristãos e conservadores.
No entanto, é fundamental entendermos uma questão imperativa, que explica em partes o conflito aqui criado — todos os progressistas contemporâneos são crias oriundas do direito positivo. Por essa razão, eles jamais entenderão de forma pragmática e objetiva conceitos como criminalidade, direitos de propriedade, agressão e liberdade de expressão pela perspectiva do jusnaturalismo, que é manifestamente o direito em seu estado mais puro, correto, ético e equilibrado.
Pela ótica jusnaturalista, uma opinião é uma opinião. Ponto final. E absolutamente ninguém deve ser preso, cancelado, sabotado ou boicotado por expressar uma opinião particular sobre qualquer assunto. Palavras não agridem ninguém, portanto jamais poderiam ser consideradas um crime em si. Apenas deveriam ser tipificados como crimes agressões de caráter objetivo, como roubo, sequestro, fraude, extorsão, estupro e infrações similares, que representam uma ameaça direta à integridade física da vítima, ou que busquem subtrair alguma posse empregando a violência.
Infelizmente, a geração floquinho de neve — terrivelmente histérica, egocêntrica e sensível — fica profundamente ofendida e consternada sempre que alguém defende posicionamentos contrários à religião progressista. Por essa razão, os guerreiros da justiça social sinceramente acreditam que o papai-estado deve censurar todas as opiniões que eles não gostam de ouvir, assim como deve também criar leis para encarcerar todos aqueles que falam ou escrevem coisas que desagradam a militância.
Como a geração floquinho de neve foi criada para acreditar que todas as suas vontades pessoais e disposições ideológicas devem ser sumariamente atendidas pelo papai-estado, eles embarcaram em uma cruzada moral que pretende erradicar todas as coisas que são ofensivas à ideologia progressista; só assim eles poderão deflagrar na Terra o seu tão sonhado paraíso hedonista e igualitário, de inimaginável esplendor e felicidade.
Em virtude do seu comportamento intrinsecamente despótico, autoritário e egocêntrico, acaba sendo inevitável que militantes progressistas problematizem tudo aquilo que os desagrada.
Como são criaturas inúteis destituídas de ocupação real e verdadeiro sentido na vida, sendo oprimidas unicamente na sua própria imaginação, militantes progressistas precisam constantemente inventar novos vilões para serem combatidos.
Partindo dessa perspectiva, é natural para a militância que absolutamente tudo que exista no mundo e que não se enquadra com as regras autoritárias e restritivas da religião progressista seja encarado como um problema. Para a geração floquinho de neve, o capitalismo é um problema. O fascismo é um problema. A iniciativa privada é um problema. O homem branco, tradicionalista, conservador e heterossexual é um problema. A desigualdade é um problema. A liberdade é um problema. Monteiro Lobato é um problema (sim, até mesmo o renomado ícone da literatura brasileira, autor — entre outros títulos — de Urupês, foi vítima da cultura do cancelamento, acusado de ser racista e eugenista).
Para a esquerda, praticamente tudo é um problema. Na mentalidade da militância progressista, tudo é motivo para reclamação. Foi em função desse comportamento histérico, histriônico e infantil que o famoso pensador conservador-libertário americano P. J. O’Rourke afirmou que “o esquerdismo é uma filosofia de pirralhos chorões”. O que é uma verdade absoluta e irrefutável em todos os sentidos.
De fato, todas as filosofias de esquerda de forma geral são idealizações utópicas e infantis de um mundo perfeito. Enquanto o mundo não se transformar naquela colorida e vibrante utopia que é apresentada pela cartilha socialista padrão, militantes continuarão a reclamar contra tudo o que existe no mundo de forma agressiva, visceral e beligerante. Evidentemente, eles não vão fazer absolutamente nada de positivo ou construtivo para que o mundo se transforme no gracioso paraíso que eles tanto desejam ver consolidado, mas eles continuarão a berrar e vociferar muito em sua busca incessante pela utopia, marcando presença em passeatas inúteis ou combatendo o fascismo imaginário nas redes sociais.
Sem dúvida, estamos muito perto de ver leis absurdas e estúpidas sendo implementadas, para agradar a militância da terra colorida do assistencialismo eterno onde nada é escasso e tudo cai do céu. Em breve, você não poderá usar calças pretas, pois elas serão consideradas peças de vestuário excessivamente heterossexuais. Apenas calças amarelas ou coloridas serão permitidas. Você também terá que tingir de cor-de-rosa uma mecha do seu cabelo; pois preservar o seu cabelo na sua cor natural é heteronormativo demais da sua parte, sendo portanto um componente demasiadamente opressor da sociedade.
Você também não poderá ver filmes de guerra ou de ação, apenas comédias românticas, pois certos gêneros de filmes exaltam a violência do patriarcado e isso impede o mundo de se tornar uma graciosa festa colorida de fraternidades universitárias ungidas por pôneis resplandecentes, hedonismo infinito, vadiagem universitária e autogratificação psicodélica, que certamente são elementos indispensáveis para se produzir o paraíso na Terra.
Sabemos perfeitamente, no entanto, que dentre as atitudes “opressivas” que a militância progressista mais se empenha em combater, estão o racismo, o fascismo, o machismo e a homofobia. No entanto, é fundamental entender que ser racista, fascista, machista ou homofóbico não são crimes em si. Na prática, todos esses elementos são apenas traços de personalidade; e eles não podem ser pura e simplesmente criminalizados porque ideólogos e militantes progressistas iluminados não gostam deles.
Tanto pela ética quanto pela ótica jusnaturalista, é facilmente compreensível entender que esses traços de personalidade não podem ser criminalizados ou proibidos simplesmente porque integrantes de uma ideologia não tem nenhuma apreciação ou simpatia por eles. Da mesma forma, nenhum desses traços de personalidade representa em si um perigo para a sociedade, pelo simples fato de existir. Por incrível que pareça, até mesmo o machismo, o racismo, o fascismo e a homofobia merecem a devida apologia.
Mas vamos analisar cada um desses tópicos separadamente para entender isso melhor.
Racismo
Quando falamos no Japão, normalmente não fazemos nenhuma associação da sociedade japonesa com o racismo. No entanto, é incontestável o fato de que a sociedade japonesa pode ser considerada uma das sociedades mais racistas do mundo. E a verdade é que não há absolutamente nada de errado com isso.
Aproximadamente 97% da população do Japão é nativa; apenas 3% do componente populacional é constituído por estrangeiros (a população do Japão é estimada em aproximadamente 126 milhões de habitantes). Isso faz a sociedade japonesa ser uma das mais homogêneas do mundo. As autoridades japonesas reconhecidamente dificultam processos de seleção e aplicação a estrangeiros que desejam se tornar residentes. E a maioria dos japoneses aprova essa decisão.
Diversos estabelecimentos comerciais como hotéis, bares e restaurantes por todo o país tem placas na entrada que dizem “somente para japoneses” e a maioria destes estabelecimentos se recusa ostensivamente a atender ou aceitar clientes estrangeiros, não importa quão ricos ou abastados sejam.
Na Terra do Sol Nascente, a hostilidade e a desconfiança natural para com estrangeiros é tão grande que até mesmo indivíduos que nascem em algum outro país, mas são filhos de pais japoneses, não são considerados cidadãos plenamente japoneses.
Se estes indivíduos decidem sair do seu país de origem para se estabelecer no Japão — mesmo tendo descendência nipônica legítima e inquestionável —, eles enfrentarão uma discriminação social considerável, especialmente se não dominarem o idioma japonês de forma impecável. Esse fato mostra que a discriminação é uma parte tão indissociável quanto elementar da sociedade japonesa, e ela está tão profundamente arraigada à cultura nipônica que é praticamente impossível alterá-la ou atenuá-la por qualquer motivo.
A verdade é que — quando falamos de um país como o Japão — nem todos os discursos politicamente corretos do mundo, nem a histeria progressista ocidental mais inflamada poderão algum dia modificar, extirpar ou sequer atenuar o componente racista da cultura nipônica. E isso é consequência de uma questão tão simples quanto primordial: discriminar faz parte da natureza humana, sendo tanto um direito individual quanto um elemento cultural inerente à muitas nações do mundo. Os japoneses não tem problema algum em admitir ou institucionalizar o seu preconceito, justamente pelo fato de que a ideologia politicamente correta não tem no oriente a força e a presença que tem no ocidente.
E é fundamental enfatizar que, sendo de natureza pacífica — ou seja, não violando nem agredindo terceiros —, a discriminação é um recurso natural dos seres humanos, que está diretamente associada a questões como familiaridade e segurança.
Absolutamente ninguém deve ser forçado a apreciar ou integrar-se a raças, etnias, pessoas ou tribos que não lhe transmitem sentimentos de segurança ou familiaridade. Integração forçada é o verdadeiro crime, e isso diversos países europeus — principalmente os escandinavos (países que lideram o ranking de submissão à ideologia politicamente correta) — aprenderam da pior forma possível.
A integração forçada com imigrantes islâmicos resultou em ondas de assassinato, estupro e violência inimagináveis para diversos países europeus, até então civilizados, que a imprensa ocidental politicamente correta e a militância progressista estão permanentemente tentando esconder, porque não desejam que o ocidente descubra como a agenda “humanitária” de integração forçada dos povos muçulmanos em países do Velho Mundo resultou em algumas das piores chacinas e tragédias na história recente da Europa.
Ou seja, ao discriminarem estrangeiros, os japoneses estão apenas se protegendo e lutando para preservar sua nação como um ambiente cultural, étnico e social que lhe é seguro e familiar, assim se opondo a mudanças bruscas, indesejadas e antinaturais, que poderiam comprometer a estabilidade social do país.
A discriminação — sendo de natureza pacífica —, é benévola, salutar e indubitavelmente ajuda a manter a estabilidade social da comunidade. Toda e qualquer forma de integração forçada deve ser repudiada com veemência, pois, mais cedo ou mais tarde, ela irá subverter a ordem social vigente, e sempre será acompanhada de deploráveis e dramáticos resultados.
Para citar novamente os países escandinavos, a Suécia é um excelente exemplo do que não fazer. Tendo seguido o caminho contrário ao da discriminação racional praticada pela sociedade japonesa, atualmente a sociedade sueca — além de afundar de forma consistente na lama da libertinagem, da decadência e da deterioração progressista — sofre em demasia com os imigrantes muçulmanos, que foram deixados praticamente livres para matar, saquear, esquartejar e estuprar quem eles quiserem. Hoje, eles são praticamente intocáveis, visto que denunciá-los, desmoralizá-los ou acusá-los de qualquer crime é uma atitude politicamente incorreta e altamente reprovada pelo establishment progressista. A elite socialista sueca jamais se atreve a acusá-los de qualquer crime, pois temem ser classificados como xenófobos e intolerantes. Ou seja, a desgraça da Europa, sobretudo dos países escandinavos, foi não ter oferecido nenhuma resistência à ideologia progressista politicamente correta. Hoje, eles são totalmente submissos a ela.
O exemplo do Japão mostra, portanto — para além de qualquer dúvida —, a importância ética e prática da discriminação, que é perfeitamente aceitável e natural, sendo uma tendência inerente aos seres humanos, e portanto intrínseca a determinados comportamentos, sociedades e culturas.
Indo ainda mais longe nessa questão, devemos entender que na verdade todos nós discriminamos, e não existe absolutamente nada de errado nisso. Discriminar pessoas faz parte da natureza humana e quem se recusa a admitir esse fato é um hipócrita. Mulheres discriminam homens na hora de selecionar um parceiro; elas avaliam diversos quesitos, como altura, aparência, status social, condição financeira e carisma. E dentre suas opções, elas sempre escolherão o homem mais atraente, másculo e viril, em detrimento de todos os baixinhos, calvos, carentes, frágeis e inibidos que possam estar disponíveis. Da mesma forma, homens sempre terão preferência por mulheres jovens, atraentes e delicadas, em detrimento de todas as feministas de meia-idade, acima do peso, de cabelo pintado, que são mães solteiras e militantes socialistas. A própria militância progressista discrimina pessoas de forma virulenta e intransigente, como fica evidente no tratamento que dispensam a mulheres bolsonaristas e a negros de direita.
A verdade é que — não importa o nível de histeria da militância progressista — a discriminação é inerente à condição humana e um direito natural inalienável de todos. É parte indissociável da natureza humana e qualquer pessoa pode e deve exercer esse direito sempre que desejar. Não existe absolutamente nada de errado em discriminar pessoas. O problema real é a ideologia progressista e o autoritarismo politicamente correto, movimentos tirânicos que não respeitam o direito das pessoas de discriminar.
Fascismo
Quando falamos de fascismo, precisamos entender que, para a esquerda política, o fascismo é compreendido como um conceito completamente divorciado do seu significado original. Para um militante de esquerda, fascista é todo aquele que defende posicionamentos contrários ao progressismo, não se referindo necessariamente a um fascista clássico.
Mas, seja como for, é necessário entender que — como qualquer ideologia política — até mesmo o fascismo clássico tem o direito de existir e ocupar o seu devido lugar; portanto, fascistas não devem ser arbitrariamente censurados, apesar de defenderem conceitos que representam uma completa antítese de tudo aquilo que é valioso para os entusiastas da liberdade.
Em um país como o Brasil, onde socialistas e comunistas tem total liberdade para se expressar, defender suas ideologias e até mesmo formar partidos políticos, não faz absolutamente o menor sentido que fascistas — e até mesmo nazistas assumidos — sofram qualquer tipo de discriminação. Embora socialistas e comunistas se sintam moralmente superiores aos fascistas (ou a qualquer outra filosofia política ou escola de pensamento), sabemos perfeitamente que o seu senso de superioridade é fruto de uma pueril romantização universitária da sua própria ideologia. A história mostra efetivamente que o socialismo clássico e o comunismo causaram muito mais destruição do que o fascismo.
Portanto, se socialistas e comunistas tem total liberdade para se expressar, não existe a menor razão para que fascistas não usufruam dessa mesma liberdade.
É claro, nesse ponto, seremos invariavelmente confrontados por um oportuno dilema — o famoso paradoxo da intolerância, de Karl Popper. Até que ponto uma sociedade livre e tolerante deve tolerar a intolerância (inerente a ideologias totalitárias)?
As leis de propriedade privada resolveriam isso em uma sociedade livre. O mais importante a levarmos em consideração no atual contexto, no entanto — ao defender ou criticar uma determinada ideologia, filosofia ou escola de pensamento —, é entender que, seja ela qual for, ela tem o direito de existir. E todas as pessoas que a defendem tem o direito de defendê-la, da mesma maneira que todos os seus detratores tem o direito de criticá-la.
Essa é uma forte razão para jamais apoiarmos a censura. Muito pelo contrário, devemos repudiar com veemência e intransigência toda e qualquer forma de censura, especialmente a estatal.
Existem duas fortes razões para isso:
A primeira delas é a volatilidade da censura (especialmente a estatal). A censura oficial do governo, depois que é implementada, torna-se absolutamente incontrolável. Hoje, ela pode estar apontada para um grupo de pessoas cujas ideias divergem das suas. Mas amanhã, ela pode estar apontada justamente para as ideias que você defende. É fundamental, portanto, compreendermos que a censura estatal é incontrolável. Sob qualquer ponto de vista, é muito mais vantajoso que exista uma vasta pluralidade de ideias conflitantes na sociedade competindo entre si, do que o estado decidir que ideias podem ser difundidas ou não.
Além do mais, libertários e anarcocapitalistas não podem nunca esperar qualquer tipo de simpatia por parte das autoridades governamentais. Para o estado, seria infinitamente mais prático e vantajoso criminalizar o libertarianismo e o anarcocapitalismo — sob a alegação de que são filosofias perigosas difundidas por extremistas radicais que ameaçam o estado democrático de direito — do que o fascismo ou qualquer outra ideologia centralizada em governos burocráticos e onipotentes. Portanto, defender a censura, especialmente a estatal, representa sempre um perigo para o próprio indivíduo, que mais cedo ou mais tarde poderá ver a censura oficial do sistema se voltar contra ele.
Outra razão pela qual libertários jamais devem defender a censura, é porque — ao contrário dos estatistas — não é coerente que defensores da liberdade se comportem como se o estado fosse o seu papai e o governo fosse a sua mamãe. Não devemos terceirizar nossas próprias responsabilidades, tampouco devemos nos comportar como adultos infantilizados. Assumimos a responsabilidade de combater todas as ideologias e filosofias que agridem a liberdade e os seres humanos. Não procuramos políticos ou burocratas para executar essa tarefa por nós.
Portanto, se você ver um fascista sendo censurado nas redes sociais ou em qualquer outro lugar, assuma suas dores. Sinta-se compelido a defendê-lo, mostre aos seus detratores que ele tem todo direito de se expressar, como qualquer pessoa. Você não tem obrigação de concordar com ele ou apreciar as ideias que ele defende. Mas silenciar arbitrariamente qualquer pessoa não é uma pauta que honra a liberdade.
Se você não gosta de estado, planejamento central, burocracia, impostos, tarifas, políticas coletivistas, nacionalistas e desenvolvimentistas, mostre com argumentos coesos e convincentes porque a liberdade e o livre mercado são superiores a todos esses conceitos. Mas repudie a censura com intransigência e mordacidade.
Em primeiro lugar, porque você aprecia e defende a liberdade de expressão para todas as pessoas. E em segundo lugar, por entender perfeitamente que — se a censura eventualmente se tornar uma política de estado vigente entre a sociedade — é mais provável que ela atinja primeiro os defensores da liberdade do que os defensores do estado.
Machismo
Muitos elementos do comportamento masculino que hoje são atacados com virulência e considerados machistas pelo movimento progressista são na verdade manifestações naturais intrínsecas ao homem, que nossos avôs cultivaram ao longo de suas vidas sem serem recriminados por isso. Com a ascensão do feminismo, do progressismo e a eventual problematização do sexo masculino, o antagonismo militante dos principais líderes da revolução sexual da contracultura passou a naturalmente condenar todos os atributos genuinamente masculinos, por considerá-los símbolos de opressão e dominação social.
Apesar do Brasil ser uma sociedade liberal ultra-progressista, onde o estado protege mais as mulheres do que as crianças — afinal, a cada semana novas leis são implementadas concedendo inúmeros privilégios e benefícios às mulheres, aos quais elas jamais teriam direito em uma sociedade genuinamente machista e patriarcal —, a esquerda política persiste em tentar difundir a fantasia da opressão masculina e o mito de que vivemos em uma sociedade machista e patriarcal.
Como sempre, a realidade mostra um cenário muito diferente daquilo que é pregado pela militância da terra da fantasia. O Brasil atual não tem absolutamente nada de machista ou patriarcal. No Brasil, mulheres podem votar, podem ocupar posições de poder e autoridade tanto na esfera pública quanto em companhias privadas, podem se candidatar a cargos políticos, podem ser vereadoras, deputadas, governadoras, podem ser proprietárias do próprio negócio, podem se divorciar, podem dirigir, podem comprar armas, podem andar de biquíni nas praias, podem usar saias extremamente curtas, podem ver programas de televisão sobre sexo voltados única e exclusivamente para o público feminino, podem se casar com outras mulheres, podem ser promíscuas, podem consumir bebidas alcoólicas ao ponto da embriaguez, e podem fazer praticamente tudo aquilo que elas desejarem. No Brasil do século XXI, as mulheres são genuinamente livres para fazer as próprias escolhas em praticamente todos os aspectos de suas vidas. O que mostra efetivamente que a tal opressão do patriarcado não existe.
O liberalismo social extremo do qual as mulheres usufruem no Brasil atual — e que poderíamos estender a toda a sociedade contemporânea ocidental — é suficiente para desmantelar completamente a fábula feminista da sociedade patriarcal machista e opressora, que existe única e exclusivamente no mundinho de fantasias ideológicas da esquerda progressista.
Tão importante quanto, é fundamental compreender que nenhum homem é obrigado a levar o feminismo a sério ou considerá-lo um movimento social e político legítimo. Para um homem, ser considerado machista ou até mesmo assumir-se como um não deveria ser um problema. O progressismo e o feminismo — com o seu nefasto hábito de demonizar os homens, bem como todos os elementos inerentes ao comportamento e a cultura masculina — é que são o verdadeiro problema, conforme tentam modificar o homem para transformá-lo em algo que ele não é nem deveria ser: uma criatura dócil, passiva e submissa, que é comandada por ideologias hostis e antinaturais, que não respeitam a hierarquia de uma ordem social milenar e condições inerentes à própria natureza humana. Com o seu hábito de tentar modificar tudo através de leis e decretos, o feminismo e o progressismo mostram efetivamente que o seu real objetivo é criminalizar a masculinidade.
A verdade é que — usufruindo de um nível elevado de liberdades — não existe praticamente nada que a mulher brasileira do século XXI não possa fazer. Adicionalmente, o governo dá as mulheres uma quantidade tão avassaladora de vantagens, privilégios e benefícios, que está ficando cada vez mais difícil para elas encontrarem razões válidas para reclamarem da vida. Se o projeto de lei que pretende fornecer um auxílio mensal de mil e duzentos reais para mães solteiras for aprovado pelo senado, muitas mulheres que tem filhos não precisarão nem mesmo trabalhar para ter sustento. E tantas outras procurarão engravidar, para ter direito a receber uma mesada mensal do governo até o seu filho completar a maioridade.
O que a militância colorida da terra da fantasia convenientemente ignora — pois a realidade nunca corresponde ao seu conto de fadas ideológico — é que o mundo de uma forma geral continua sendo muito mais implacável com os homens do que é com as mulheres. No Brasil, a esmagadora maioria dos suicídios é praticada por homens, a maioria das vítimas de homicídio são homens e de cada quatro moradores de rua, três são homens. Mas é evidente que uma sociedade liberal ultra-progressista não se importa com os homens, pois ela não é influenciada por fatos concretos ou pela realidade. Seu objetivo é simplesmente atender as disposições de uma agenda ideológica, não importa quão divorciadas da realidade elas são.
O nível exacerbado de liberdades sociais e privilégios governamentais dos quais as mulheres brasileiras usufruem é suficiente para destruir a fantasiosa fábula da sociedade machista, opressora e patriarcal. Se as mulheres brasileiras não estão felizes, a culpa definitivamente não é dos homens. Se a vasta profusão de liberdades, privilégios e benefícios da sociedade ocidental não as deixa plenamente saciadas e satisfeitas, elas podem sempre mudar de ares e tentar uma vida mais abnegada e espartana em países como Irã, Paquistão ou Afeganistão. Quem sabe assim elas não se sentirão melhores e mais realizadas?
Homofobia
Quando falamos em homofobia, entramos em uma categoria muito parecida com a do racismo: o direito de discriminação é totalmente válido. Absolutamente ninguém deve ser obrigado a aceitar homossexuais ou considerar o homossexualismo como algo normal. Sendo cristão, não existe nem sequer a mais vaga possibilidade de que algum dia eu venha a aceitar o homossexualismo como algo natural. O homossexualismo se qualifica como um grave desvio de conduta e um pecado contra o Criador.
A Bíblia proíbe terminantemente conduta sexual imoral, o que — além do homossexualismo — inclui adultério, fornicação, incesto e bestialidade, entre outras formas igualmente pérfidas de degradação.
Segue abaixo três passagens bíblicas que proíbem terminantemente a conduta homossexual:
“Não te deitarás com um homem como se deita com uma mulher. Isso é abominável!” (Levítico 18:22 — King James Atualizada)
“Se um homem se deitar com outro homem, como se deita com mulher, ambos terão praticado abominação; certamente serão mortos; o seu sangue estará sobre eles.” (Levítico 20:13 — João Ferreira de Almeida Atualizada)
“O quê! Não sabeis que os injustos não herdarão o reino de Deus? Não sejais desencaminhados. Nem fornicadores, nem idólatras, nem adúlteros, nem homens mantidos para propósitos desnaturais, nem homens que se deitam com homens, nem ladrões, nem gananciosos, nem beberrões, nem injuriadores, nem extorsores herdarão o reino de Deus.” (1 Coríntios 6:9,10 —Tradução do Novo Mundo das Escrituras Sagradas com Referências)
Se você não é religioso, pode simplesmente levar em consideração o argumento do respeito pela ordem natural. A ordem natural é incondicional e incisiva com relação a uma questão: o complemento de tudo o que existe é o seu oposto, não o seu igual. O complemento do dia é a noite, o complemento da luz é a escuridão, o complemento da água, que é líquida, é a terra, que é sólida. E como sabemos o complemento do macho — de sua respectiva espécie — é a fêmea.
Portanto, o complemento do homem, o macho da espécie humana, é naturalmente a mulher, a fêmea da espécie humana. Um homem e uma mulher podem naturalmente se reproduzir, porque são um complemento biológico natural. Por outro lado, um homem e outro homem são incapazes de se reproduzir, assim como uma mulher e outra mulher.
Infelizmente, o mundo atual está longe de aceitar como plenamente estabelecida a ordem natural pelo simples fato dela existir, visto que tentam subvertê-la a qualquer custo, não importa o malabarismo intelectual que tenham que fazer para justificar os seus pontos de vista distorcidos e antinaturais. A libertinagem irrefreável e a imoralidade bestial do mundo contemporâneo pós-moderno não reconhecem nenhum tipo de limite. Quem tenta restabelecer princípios morais salutares é imediatamente considerado um vilão retrógrado e repressivo, sendo ativamente demonizado pela militância do hedonismo, da luxúria e da licenciosidade desenfreada e sem limites.
Definitivamente, fazer a apologia da moralidade, do autocontrole e do autodomínio não faz nenhum sucesso na Sodoma e Gomorra global dos dias atuais. O que faz sucesso é lacração, devassidão, promiscuidade e prazeres carnais vazios. O famoso escritor e filósofo francês Albert Camus expressou uma verdade contundente quando disse: “Uma só frase lhe bastará para definir o homem moderno — fornicava e lia jornais”.
Qualquer indivíduo tem o direito inalienável de discriminar ativamente homossexuais, pelo direito que ele julgar mais pertinente no seu caso. A objeção de consciência para qualquer situação é um direito natural dos indivíduos. Há alguns anos, um caso que aconteceu nos Estados Unidos ganhou enorme repercussão internacional, quando o confeiteiro Jack Phillips se recusou a fazer um bolo de casamento para o “casal” homossexual Dave Mullins e Charlie Craig.
Uma representação dos direitos civis do estado do Colorado abriu um inquérito contra o confeiteiro, alegando que ele deveria ser obrigado a atender todos os clientes, independente da orientação sexual, raça ou crença. Preste atenção nas palavras usadas — ele deveria ser obrigado a atender.
Como se recusou bravamente a ceder, o caso foi parar invariavelmente na Suprema Corte, que decidiu por sete a dois em favor de Jack Phillips, sob a alegação de que obrigar o confeiteiro a atender o “casal” homossexual era uma violação nefasta dos seus princípios religiosos. Felizmente, esse foi um caso em que a liberdade prevaleceu sobre a tirania progressista.
Evidentemente, homossexuais não devem ser agredidos, ofendidos, internados em clínicas contra a sua vontade, nem devem ser constrangidos em suas liberdades pelo fato de serem homossexuais. O que eles precisam entender é que a liberdade é uma via de mão dupla. Eles podem ter liberdade para adotar a conduta que desejarem e fazer o que quiserem (contanto que não agridam ninguém), mas da mesma forma, é fundamental respeitar e preservar a liberdade de terceiros que desejam rejeitá-los pacificamente, pelo motivo que for.
Afinal, ninguém tem a menor obrigação de aceitá-los, atendê-los ou sequer pensar que uma união estável entre duas pessoas do mesmo sexo — incapaz de gerar descendentes, e, portanto, antinatural — deva ser considerado um matrimônio de verdade. Absolutamente nenhuma pessoa, ideia, movimento, crença ou ideologia usufrui de plena unanimidade no mundo. Por que o homossexualismo deveria ter tal privilégio?
Homossexuais não são portadores de uma verdade definitiva, absoluta e indiscutível, que está acima da humanidade. São seres humanos comuns que — na melhor das hipóteses —, levam um estilo de vida que pode ser considerado “alternativo”, e absolutamente ninguém tem a obrigação de considerar esse estilo de vida normal ou aceitável. A única obrigação das pessoas é não interferir, e isso não implica uma obrigação em aceitar.
Discriminar homossexuais (assim como pessoas de qualquer outro grupo, raça, religião, nacionalidade ou etnia) é um direito natural por parte de todos aqueles que desejam exercer esse direito. E isso nem o direito positivo nem a militância progressista poderão algum dia alterar ou subverter. O direito natural e a inclinação inerente dos seres humanos em atender às suas próprias disposições é simplesmente imutável e faz parte do seu conjunto de necessidades.
Conclusão
A militância progressista é absurdamente autoritária, e todas as suas estratégias e disposições ideológicas mostram que ela está em uma guerra permanente contra a ordem natural, contra a liberdade e principalmente contra o homem branco, cristão, conservador e tradicionalista — possivelmente, aquilo que ela mais odeia e despreza.
Nós não podemos, no entanto, ceder ou dar espaço para a agenda progressista, tampouco pensar em considerar como sendo normais todas as pautas abusivas e tirânicas que a militância pretende estabelecer como sendo perfeitamente razoáveis e aceitáveis, quer a sociedade aceite isso ou não. Afinal, conforme formos cedendo, o progressismo tirânico e totalitário tende a ganhar cada vez mais espaço.
Quanto mais espaço o progressismo conquistar, mais corroída será a liberdade e mais impulso ganhará o totalitarismo. Com isso, a cultura do cancelamento vai acabar com carreiras, profissões e com o sustento de muitas pessoas, pelo simples fato de que elas discordam das pautas universitárias da moda.
A história mostra perfeitamente que quanto mais liberdade uma sociedade tem, mais progresso ela atinge. Por outro lado, quanto mais autoritária ela for, mais retrocessos ela sofrerá. O autoritarismo se combate com liberdade, desafiando as pautas de todos aqueles que persistem em implementar a tirania na sociedade. O politicamente correto é o nazismo dos costumes, que pretende subverter a moral através de uma cultura de vigilância policial despótica e autoritária, para que toda a sociedade seja subjugada pela agenda totalitária progressista.
Pois quanto a nós, precisamos continuar travando o bom combate em nome da liberdade. E isso inclui reconhecer que ideologias, hábitos e costumes de que não gostamos tem o direito de existir e até mesmo de serem defendidos.
-
@ d8714c92:cd61e54a
2023-09-08 12:56:38ATTENTION SOLDIER!
Ready to embark on an exciting card adventure? Today, we will dive into the thrilling world of Texas Hold'em Poker, a variant that has captivated players worldwide. If you are new to this game, we've come as white knights to save the day! Here, you'll find the basics, card rankings, how to play, and some key tips for your first 50 games. In the upcoming editions, we'll delve deeper into this poker variant, covering how to play it, what to consider, what to discard, what's what, what's not... in short, we'll break down everything about this exciting game.
Basics
Before running, let's learn to walk. Our first step will be to understand the basics of Texas Hold'em Poker. The game is played with a standard deck of 52 cards, and the goal is to form the best possible five-card combination. Each player receives two cards face down, known as "hole cards," and then five community cards are dealt face up in the center of the table. These common cards are generally called "community cards."
Objective of the Game
The objective of Texas Hold'em poker is simple: form the best hand possible with your two hole cards and the five community cards to win the pot. The pot is the sum of all bets made by players during the hand. To achieve this, you must use your strategy skills, opponent reading, and knowledge of hand rankings.
Hand Ranking
In Texas Hold'em poker, various card combinations can be formed, each with its specific ranking. Below, we present the hand ranking from highest to lowest:
- Royal Flush: The highest hand, consisting of a sequence of cards of the same suit from 10 to Ace (10, J, Q, K, A) (all of the same suit). A♥️K♣️Q♠️J♦️
- Straight Flush: A sequence of five cards of the same suit in consecutive order (for example, 6, 7, 8, 9, 10, all hearts). 6♥️7♥️8♥️9♥️10♥️
- Four of a Kind: Four cards of the same value (for example, four 7s). 7♥️7♣️7♠️7♦️
- Full House: Three cards of the same value along with two cards of the same value (for example, three 9s and two Js). 9♦️9♥️9♣️J♠️J♦️
- Flush: Five cards of the same suit, regardless of their order. K♥️10♥️8♥️6♥️4♥️
- Straight: Five cards in consecutive order, regardless of the suit. A♥️K♣️Q♠️J♦️
- Three of a Kind: Three cards of the same value (for example, three 5s). A♥️A♣️A♠️7♦️
- Two Pair: Two pairs of cards of the same value (for example, two 8s and two Qs). 8♥️8♣️Q♠️Q♦️
- One Pair: Two cards of the same value (for example, two Aces). A♥️A♣️K♠️Q♦️
- High Card: If none of the above combinations are formed, the hand is evaluated based on the highest card. A♥️K♣️10♠️8♦️6♥️
⚠️Please do not proceed further until you have at least understood the first five most important hand rankings. It's not that we don't want you to read more, but it's important that you learn this first.⚠️
How to Play
Now that we have the basics, it's time to take action. Here's a brief guide on how to play Texas Hold'em Poker. In future editions, we'll dive deeper into strategies for each phase of the game.
- Pre-flop: Each player receives two hole cards face down. The first round of betting takes place, where players can call (match the previous bet), raise (increase the bet), or fold (abandon the hand).
- Flop: Three community cards are dealt face up in the center of the table. Players have another round of betting.
- Turn: A fourth community card is dealt face up. Players engage in another round of betting.
- River: The fifth and final community card is dealt face up. Players have a final round of betting.
- Showdown: Players remaining in the hand reveal their cards. The player with the best five-card combination wins the pot.
Full House
A Full House is one of the strongest combinations in Texas Hold'em poker. It consists of a Three of a Kind and a One Pair in the same hand. For example, three 7s and two Js would form a Full House. When multiple players have a Full House, the winner is determined by the value of the Three of a Kind first, and in case of a tie, by the value of the Pair.
Formation of Poker Hands
In Texas Hold'em, each player receives two hole cards that are exclusive to them. Then, five community cards are dealt face up in the center of the table in three stages: the flop (three cards), the turn (one card), and the river (one card). Players must combine their two hole cards with the five community cards to form their best five-card hand.
Dealer Button
The dealer button is a token that indicates which player is the dealer in the current hand. The dealer is the last to act in each betting round, giving them a strategic advantage. After each hand, the button moves clockwise to the next player, ensuring that all players have an equal opportunity to be the dealer.
Community Cards
Community cards, also known as board cards, are the cards dealt face up in the center of the table. Players can use these cards along with their two hole cards to form their final hand. The flop consists of three community cards, the turn adds a fourth card, and the river adds a fifth and final card.
Kicker
In situations where two or more players have the same card combination (for example, a pair of kings), the kicker is used to determine the winner. The kicker is the highest card that is not part of the main combination. If two players have a pair of kings, the one with the higher kicker wins. If the kicker is also the same, the pot is split.
Aces and Bad Kickers Danger
While Aces (A) are the highest-ranking cards, they can also be dangerous when not played properly. A common mistake is overvaluing Aces and betting aggressively without considering other community cards or opponent actions. Bad kickers (low-value accompanying cards) can be particularly problematic. For example, if you have an Ace and a 2 as hole cards, your hand is vulnerable to being beaten by players with better accompanying cards.
Mr. P4S, I want to play now, so give me three tips to get started
Soldier, keep your composure! Here are three key tips for your first 50 games:
- Play selectively: Don't let excitement lead you to play every hand. Wait for good starting hands (like high cards or pairs) before betting strongly. Playing selectively increases your chances of success. We'll discuss this further in future editions.
- Observe your opponents: Pay attention to how other players play. Observe their betting patterns and try to identify if they are betting aggressively or conservatively. This will give you clues about the quality of their hands and help you make better decisions. You won't see their faces, but their betting methods, pattern repetitions, messages in the chats... it all adds up. Remember what Sherlock Holmes said: "Data, data, data... I can't make bricks without clay." Study, build. Move forward. Don't worry; we'll discuss this in more detail later.
- Manage your bankroll: Set a limit for the amount of money you are willing to spend on the game. Don't exceed your budget and avoid the temptation to bet more than you can afford to lose. Proper bankroll management is essential to keep the game fun and sustainable. We'll talk about this in other editions, but for now, especially if you're new, read this: only use a small budget or join Poker4Sats' freerolls. Here, the important thing is not to win mon—...who am I kidding? Of course, it's important! But for now, while you learn, it's better if you do it like the professionals, with trial and error and play money. Try our freerolls or bet small amounts.
With these tips and basic knowledge, you're ready to dive into the exciting world of Texas Hold'em Poker. Practice makes perfect, so play responsibly and enjoy the experience. Soldier, advance to the tables!
-
@ 4044176c:b3f3c23c
2023-09-08 12:53:47Here, in this article I am proposing a novel technique to summarize text documents. Well I am not writing a research paper for it but giving you basic explanations of key steps involved. It is a novel technique as sentiments have not been used with Fuzzy Inference Engine to the best of my knowledge for Text Summarization. I started working on this topic in 2016, though given time constraints and constraints, I didn’t publish the work yet. The work I did was in Java using Java based libraries. I have rewritten the code in Python for you to understand the basic steps, to be expanded into. Values and knowledge base in Fuzzy Inference Systems have to be edited as per applications. I have provided sample values for your understandings, not the values used in original research [which shall be send for publications and made available later].
This article can be taken as a (1) Tutorial for learning application of Fuzzy Inference Engine, Mamdani systems in particular, (2) Summarization technique in Python, (3) Novel research proposal for application of sentiment analysis in Fuzzy based Summarization Techniques.
Typically, this article was meant for research publication. But I have enough publications and I want research to reach humble minds for free! Here is the proposed technique in python.
1. Pre-processing documents and sentences
```
import important NLP packages
from future import unicode_literals import spacy,en_core_web_sm from collections import Counter nlp = spacy.load(‘en_core_web_sm’)
from spacy.matcher import Matcher matcher = Matcher(nlp.vocab)
sentence_to_be_ranked = (‘Financially good conference situations.’) text_document_snippet = (‘There is a developer beautiful and great conference happening on 21 July 2019 in London. The conference is in area of biological sciences.’)
Load the complete document from a file. This is for illustration only
doc = nlp(text) sent = nlp(title) ```
2. Get Largest Noun Chuck
Get the main longest noun chunk from the text fragment. Only most important chuck is being considered by the algorithm and shall be returned. There can be several kinds of chunking possible. Chunking is a kind of shallow processing. Why chucking —as it is useful in summarization techniques to highlight the important phrases. And largest chunks will be highlighted in the summary across all sentences after ranking them all. Other chunking techniques exists, look in my future articles about more on this. Here, just key steps of summarization.
```
inputSentence is the input to of which the longest chunk is to be found
def getMainNounChuck(inputSentence): lenChunk = 0 prevLen = -1 mainChunk = “” for chunk in inputSentence.noun_chunks: lenChunk = len(chunk) print (chunk) print(lenChunk) if prevLen < lenChunk: mainChunk = chunk prevLen = lenChunk print(“Main chunk is: “, mainChunk) return mainChunk
Sample Output: Main largest chunk in sentence for ranking is: Financially good conference situations Main largest chunk in given 2 sentences is: beautiful and great conference ```
3. Get Sentiment Score of Sentence to be Ranked
There are several ways to compute the sentiment of a given sentence to be ranked as a part of collection of sentences to create an extract. The two methods are not exhaustive, but there are plethora of other options to compute the sentiments. For, research purposes I suggest you use a supervised or unsupervised trainer to train sentiment module on the topic of your interest, this means the domain in which you wish to perform the experiments: Is it sports news articles, medical articles, movie review summarization. Such a sentiment analyzer will be more beneficial to the output and relevance of results. But since the article aims to just give snippets of tasks in short. You can look on my other articles of how to learn sentiments per domain of text categories.
``` def getSentimentScore(doc): print(“Sentiment is “, doc.sentiment * 10) return doc.sentiment * 10
Another way to compute sentiment
def getsentiment2(sent): from textblob import TextBlob sentimentObject = TextBlob(sent) sentimentObject = sentimentObject.sentiment print(“Sentiment”, sentimentObject.polarity * 10) return sentimentObject.polarity * 10
Sample Output: sentence= (‘Financially good conference situations.’) Sentiment 7.0
Preferable Recommended way which I use and suggest: A self trained model on corpus! ```
4. Similarity between document and sentence
The following small python code is enough to find basic similarity between a sentence and the text document(s) under consideration. Well there are several kinds of similarity measures in NLP some very popular being Wu-Palmer and Leacock Chordorow, path based similarity, Resnik measure, Lin measure to mention a few. As a researcher I suggest analysis on all these fronts before finalizing on any one. Some other similarity measures are lexical similarities, Cosine similarities among one-hot representations, vector space representations or FastText, GLOVE Vector representation or any other word embeddings such as Word2Vec or may be just WordNet based similarities. A lot of options to choose from. So which one I am using in this problem ? Or even in any other problem ? Still the task can be made more simple, the choice of algorithm, you can mail me for details once your basic steps are complete!
``` def getSimilarity(sentence1, doc1): return doc1.similarity( sentence1 )
Recommended: More insight in kind of similarity measure used esp. the most useful ones for a current problem. A deep insight is needed here, while choice of technique to be used is being made.
Sample Output: The similarity between sentence and document is 0.3219
``` en_core_web_sm, don’t come with word vectors and utilizes surface level context-sensitive tensors. Hence for an efficient toolkit you would have to use more than this! I have implemented this fragment of work in Java using DL4J!
5. Get Part of Speech Count
Part of Speech is another parameter to the Fuzzy Inference Engine that I propose to use in a slightly different way. Being as in typical NLP summarization techniques using Fuzzy Inference Engines, an input is typically used as NOUN count. But here we have proposed to use: Noun Count, Adjective Count, Adverb Count to mention a few. The code snippet for a easy computation of count of a particular POS tag as specified in parameter “inputPOSTag” for text in “inputText” can be written in Python as follows.
def getPOSCOUNT(inputText, inputPOSTag): nlp = en_core_web_sm.load() count = 0 for tokenInputText in nlp(inputText): countPOS +=1 dictonaryInputText= (Counter(([token.pos_ for token in nlp( tokenInputText)]))) print( dictonaryInputText ) return dictonaryInputText [inputPOSTag]/( countPOS+1) * 100
6. Checking Values-So far So Good
The following code is to check the values computed by the NLP Engine is fine or not ! If not change the algorithms and techniques used as suggested in points above. Once done go to next step of setting up Fuzzy Inference Engine for summarization.
``` print(getMainNounChuck(sent)) print(“the similarity between sentences is”, getSimilarity(nlp(title),getMainNounChuck(doc))) getSentimentScore(sent) print(“Noun count” , getPOSCOUNT(text,”NOUN”)) print(“Verb count”, getPOSCOUNT(text,”VERB”)) print(“Adj count”, getPOSCOUNT(text,”ADJ”))
Sample Output for input above. Adjective count 11.53846 ```
7. Defining Fuzzy Inference System (FIS) for Ranking Sentences
The following steps are performed for ranking the Fuzzy Inference System (FIS)
7.1. Defining the Antecedents and Consequents functions
The following input parameters are used. These are all defined above in the NLP Processing technique in details. Again this is a snippet for understanding, actual research has much more complex components, which are not discussed here in this article.
The Fuzzy Logic toolkits for illustration used are as follows:
``` import skfuzzy as fuzz from skfuzzy import control as ctrl
The input parameters in FIS for the explanation are: [See skfuzzy for details on parameters and their detailed implications, which I am not explaining here. Given knowledge of Fuzzy Logic and Fuzzy Systems are assumed to be at considerable levels in this article]
similarity_document = ctrl.Antecedent(np.arange(0, 1.25, .1), ‘similarity’) sentiment_score = ctrl.Antecedent(np.arange(0, 1.25, .1), ‘sentiment_score’) nounCount = ctrl.Antecedent(np.arange(0, 110, 10), ‘nounCount’) verbCount = ctrl.Antecedent(np.arange(0, 110, 10), ‘verbCount’) adjCount = ctrl.Antecedent(np.arange(0, 110, 10), ‘adjCount’)
The following is the output variable defined with parameters as given below.
consequent
rank = ctrl.Consequent(np.arange(0, 24, 1), ‘rank’) ```
7.2. Define the Input and Output Linguistic variables in FIS
The following is brief description of how to define the Fuzzy Sets involved in the process.
``` similarity[‘low’] = fuzz.trimf(similarity.universe, [0, 0.3, 0.5]) similarity[‘average’] = fuzz.trimf(similarity.universe, [0.3, 0.7, 1]) similarity[‘high’] = # define as per requirements in your problem
sentiment_score[‘low’] = fuzz.trimf(sentiment_score.universe, [0, 0.3, 0.5]) sentiment_score[‘average’] = fuzz.trimf(sentiment_score.universe, [0.3, 0.7, 1]) sentiment_score[‘high’] = # define as per requirements in your problem
nounCount[‘low’] = fuzz.trimf(nounCount.universe, [0, 30, 50]) nounCount[‘average’] = fuzz.trimf(nounCount.universe, [30, 70, 100]) nounCount[‘high’] = # define as per requirements in your problem
verbCount[‘low’] = # define as per requirements in your problem verbCount[‘average’] = # define as per requirements in your problem verbCount[‘high’] = # define as per requirements in your problem
adjCount[‘low’] = # define as per requirements in your problem adjCount[‘average’] = # define as per requirements in your problem adjCount[‘high’] = # define as per requirements in your problem ```
Pictorial Representation of some Fuzzy sets defined for illustration (sentiment_score):
7.3 Output Membership Functions for Linguistic Variable Rank
``` rank[‘low’] = fuzz.trimf(rank.universe, [0, 0, 10]) rank[‘average’] = # define as per requirements in your problem rank[‘high’] = # define as per requirements in your problem
Sample Fuzzy Sets for “rank”
```
7.4 View the Fuzzy Sets
``` sentiment_score.view() nounCount.view() verbCount.view() adjCount.view()
similarity.view() rank.view() ```
8. FIS Rulebase-Sample
The following are some sample rules for FIS summarization toolkit. These are not exhaustive and are documented here to illustrate the procedure and to pave your understandings.
```
rule1 = ctrl.Rule(similarity[‘low’] | sentiment_score[‘low’], rank[‘low’]) rule2 = ctrl.Rule(sentiment_score[‘average’], rank[‘average’]) rule3 = ctrl.Rule(sentiment_score[‘average’] | similarity_title[‘average’], rank[‘average’]) rule4 = # define as per requirements and experts views rule5 = # define as per requirements and experts views rule6 = # define as per requirements and experts views rule7 = # define as per requirements and experts views rule8 = # define as per requirements and experts views rule9 = # define as per requirements and experts views rule10 = ctrl.Rule(similarity[‘high’] & nounCount[“high”] & sentiment_score[‘high’] & verbCount[“high”] , rank[‘high’])
Define FIS system now and perform simulations.
rankFIS = ctrl.ControlSystem([rule1, rule2, rule3, rule4, rule5, rule6, rule7, rule8, rule9, rule10]) rankFIS = ctrl.ControlSystemSimulation(rankFIS) ```
9. Computing Rank (Importance) of a Sentence using the sample FIS
Here for a particular a sentence whose importance or rank in respect to other members of text fragments is to be computed. The NLP properties defined in 2-6 above are computed and set in the FIS system as below:
``` rankFIS.input[‘similarity_title’] = getSimilarity(doc,sent) rankFIS.input[‘sentiment_score’] = getsentiment2( sent ) rankFIS.input[‘nounCount’] = getPOSCOUNT( sentNLP ,”NOUN”) rankFIS.input[‘verbCount’] = getPOSCOUNT( sentNLP ,”VERB”) rankFIS.input[‘adjCount’] = getPOSCOUNT( sentNLP ,”ADJ”)
The following steps illustrates computation of ranks based on the inputs just provided through computations above.
rankFIS.compute() print (“the answer is”) print (rankFIS.output[‘rank’])
view the Fuzzy Inference System
rank.view(sim=rankFIS) ``` The output of illustrative FIS for input taken in this article is as follows:
Rank = 7.3040, The FIS Rank defuzzification is as follows:
10. Conclusions
This was a brief article explaining the key steps in building FIS based system for summarization. Once ranks for all sentences are formed the main chunk identified in top p% of sentences can be highlighted in the application as the output of the tool. This is a novel approach in that sentiments have not been used in any work with FIS for summarization as of now. Also adjective count, chunking, adverb counts have not been used prior to this proposal in this article.
The aim of article is to lay emphasis that research can progress outside research publications too ! At least research proposals can ! Further this article explains how to use FIS in NLP application of text extraction.
By:Nidhika Link:https://nidhikayadav.org/2021/11/29/ai-sentiment-analysis-and-fuzzy-sets-based-summarization-technique-research-based-approach-explanation-with-python/
-
@ 4044176c:b3f3c23c
2023-09-08 12:39:13Can AI have the following abilities that human beings and animals have?
As per Stahl [1] Humans have access to “mental abilities, perceptions, intuition, emotions, and even spirituality”.
Let us consider our views and discuss a little more the things he has enumerated. Let’s discuss his enumeration. The following combines the power of modern computing and AI to answer the robotic processing powers.
-
mental abilities — Yes these can be included in machines. Though not all mental abilities can be put in machines, but the todays machines have good number of mental abilities, especially computational powers which beat humans even in games like chess.
-
perceptions — Through sensors, many perceptions can be replicated. Vision, listening, comprehending, and hearing, can be done with machines. Though nothing compares to what humans can.
-
intuition — This can be emulated, but it would be artificial, and can’t be compared to what humans can do. Intuition is very much linked to living beings, even animals at times behave based on intuition, for example, animals often get an intuition of a bad weather. It is difficult to introduce intuition in machines. Still, things like artificial intuition can be made available to give a mutation to the task a machine is doing.
-
emotions — Again these can be emulated in robots. Robots can have emotions based on sensory or verbal inputs. How? By adding this behavior in the programming of code. But can a Robot define the right emotions based on inputs?
-
spirituality — this seems difficult to replicate. Spirituality is very specific to humans, and this seems difficult for robots to learn. Let’s leave something for humans.
I add the following Stahl [1] list
-
physical ability — Machines can do most things humans can do physically, such as mechanical movements, robots are taking part in all kinds of racing, and games with humans these days. Even animal physical abilities are compared and replicated in likewise robots.
-
predictions — Yes, through sophisticated algorithms, AI can predict many things humans can or cannot, this goes from cancer to detecting new materials and objects in the universe.
-
simulation — AI can simulate many processes that humans can such as space walks by machines.
-
robustness — AI machines are robust and can work for several days and nights to reach a goal, while humans are subject to biological constraints and require rest to move forward in completing tasks.
-
battery dependence — AI machines are battery dependent while humans need food and biological resources.
-
cherishing — Humans can cherish things that machines can’t fully cherish.
More, to be continued…
References
[1] B. C. Stahl, Artificial Intelligence for a Better Future, SpringerBriefs in Research and Innovation Governance, https://doi.org/10.1007/978-3-030-69978-9_2
By:Nidhika Link:https://nidhikayadav.org/2023/08/12/abilities-of-ai-compared-to-human/
-
-
@ bcea2b98:7ccef3c9
2023-07-20 18:13:11Atop a majestic mountain called Mt. Gox, a tale unfolded that would forever be etched in the history of cryptocurrency. This is the story of a legendary exchange, a hub of digital treasures, and the challenges it faced along the way.
In the early days of Bitcoin, when the world was just beginning to grasp the concept of digital currencies, a passionate entrepreneur named Jed McCaleb founded a platform called Mt. Gox. Located high above the clouds on the slopes of Mt. Gox, the exchange quickly became the center of the Bitcoin universe.
Bitcoin enthusiasts from all corners of the globe flocked to Mt. Gox, eager to trade, buy, and sell their digital coins. It became a bustling marketplace, a hub of innovation, and a symbol of the emerging cryptocurrency ecosystem.
As the popularity of Bitcoin skyrocketed, so did the demand for Mt. Gox's services. The exchange handled an immense volume of transactions, becoming the largest Bitcoin exchange in the world. Its name echoed throughout the digital realm, synonymous with the promise and potential of the cryptocurrency revolution.
However, as with any great tale, challenges arose. In 2011, a cyber attack targeted Mt. Gox, leading to the theft of a substantial number of Bitcoins. This event served as a wake-up call, revealing vulnerabilities within the exchange and prompting the need for heightened security measures.
The incident didn't dampen the spirit of Mt. Gox. The team worked tirelessly to recover from the attack, implementing new security protocols and earning back the trust of its users. Mt. Gox emerged stronger than ever, serving as a beacon of stability in the ever-evolving cryptocurrency landscape.
But the story of Mt. Gox took an unexpected turn. In 2014, another significant blow struck the exchange. It was discovered that a substantial number of Bitcoins were missing from Mt. Gox's vaults. The magnitude of the loss sent shockwaves throughout the cryptocurrency community and shook the foundations of the industry.
As the truth emerged, it became clear that Mt. Gox faced insurmountable financial challenges. The exchange was forced to declare bankruptcy, leaving its users devastated and questioning the future of digital currencies.
Yet, amidst the chaos, the story of Mt. Gox served as a catalyst for change and resilience in the cryptocurrency world. It brought to light the need for enhanced security practices, regulatory oversight, and a renewed commitment to building trustworthy platforms for the exchange of digital assets.
Over time, the lessons learned from Mt. Gox's history paved the way for greater transparency, improved infrastructure, and the emergence of more secure cryptocurrency exchanges. It became a cautionary tale, reminding the industry of the importance of accountability, investor protection, and responsible innovation.
Today, as we reflect on the history of Mt. Gox, we see a story of both triumph and adversity. It stands as a reminder that the cryptocurrency landscape is still in its early stages, evolving and maturing with each passing day.
So, dear listener, let the tale of Mt. Gox serve as a lesson in resilience and growth. As the cryptocurrency world continues to advance, let us navigate the digital landscape with caution, learn from the past, and work towards a future where innovation and security walk hand in hand.
-
@ f296e355:c28d00bc
2023-09-08 12:35:33At the present time, the UK has a problem with some of the concrete it has used in the past. And, so, not all concrete is unsafe — and it is important that experts in the usage of concrete and building design carefully explain to the general public their decisions and the parameters they apply. It is not good to just to say, “All the buildings are unsafe … just rip them all down!”. Or, just because a building might fall down in 100 years, there is no need to say that it is unsafe at the current time. But, in cybersecurity, there are some who can carry this type of message to their customers — so let’s call them snake-oil salespeople in order to simplify things!
I recently heard from a company that was given the advice that 128-bit encryption could be easily cracked. It was such a generalised statement, and where, at the current time, we would have to gather all the energy — and many times more — on the planet to crack a single key.
And some people are already criticising public key encryption methods before quantum computers are even ready to go into production. I often get messages for the posting of information on RSA and ECC of “but asymmetric keys can be cracked by quantum computers”, and leave it there.
This is like saying that we should tear down every building at the current time, as we know they will fall down in the future. Like it or not, public key encryption is used in virtually every single Web connection, and without it, we could not trust anything online.
So, here’s my 100 (mostly true) casmagorical, genuinely healing, and elixirs of life for cybersecurity myth-busters:
- The security of your system is often as strong as the weakest link in the chain.
- Academic and professional certification normally provides surface knowledge; it is up to you to develop depth and expertise. To be an experts takes time and a serious commitment to learning. You don’t become an expert by passing an exam or taking a test.
- If your answer to “explain XYZ” is “XYX stands for ..”, then you need more depth in your knowledge.
- Even the best security companies get hacked.
- Humans are generally good at coding but generally not very good at secure coding, and are generally not very good at testing the security of the things they have created (it’s called ‘parental love’).
- Humans tire quickly when faced with complexity and often over-simplify things.
- Humans tend to avoid the things they don’t like doing and spend their time on the things they like.
- Just because an auditor signs something off doesn’t mean it is secure.
- A risk register is not a diary but a work in progress.
- Good companies know their risks and have incident response plans.
- If a human does know something, they will often try to cover the facts rather than admit it to.
- Most of our data and processing now exist in the public cloud.
- Wherever possible, reduce surface area, build layers of abstraction and reduce complexity.
- If you need to, log everything that might be of use. But remember that logs reveal sensitive data about your company.
- Log information for debugging and security analysis are often different things. Beware of mixing the two.
- Your logging should be layered and dynamic — ranging from full-on to full-off, and have levels in between.
- Extract out single switches are parameters, e.g. logging level.
- The method of creating a foothold is often different from the method used to sustain contact.
- The attack method (e.g. ransomware) on a system is typically different to the access method (e.g. phishing).
- Detectors for properly targeted spear phishing often do not work well.
- Trust methods and not humans.
- Be humble with your knowledge, and don’t overstretch yourself.
- Don’t generalise things.
- You can never know everything about everything in cybersecurity — no matter your education or professional certification — you will always have gaps.
- You have all the theoretical knowledge of cybersecurity in the world — it often counts for little if you don’t have the hands-on knowledge.
- You can have all the hands-on knowledge in the world, but it often does truly help to properly understand something without understanding the theory.
- For pedagogy, cybersecurity is more psychomotor than Bloom’s taxonomy.
- Assess the practice skills of graduates as much as their theoretical knowledge.
- Your main adversary is typically more knowledgeable than you.
- Humans are creative and sloppy and can over-simplify things.
- If someone has a big enough budget, they can crack most things (but typically not the methods, but the humans).
- Base judgments on peer-reviewed publications and not what Bob says.
- Don’t trust publications in paper-mill journals or places that lack rigous peer review.
- Don’t fully trust a paper that was submitted last Tuesday and has just been published by a journal.
- Your main cybersecurity risk is often the person sitting beside you and not some person on the other side of the planet.
- Usability will often trump security.
- Getting code into production will often trump security.
- Most systems are not designed with security in mind and see it as an add-on.
- Most developers have little idea about the mathematical principles of the methods they are using.
- Most developers were never trained on cryptography and have little idea about how public key encryption actually works.
- Many developers have never taken a security/networking module in their academic studies.
- Most of our databases are not encrypted.
- If a single key is used to encrypt all of our data, then all of our data is breached on a single discovery of the key.
- Cloud security is actually likely to be more secure than on-premise security, as it often guards against insiders and outsiders.
- Even network engineers struggle with the concept of VLANs — the rest of the world has little chance of understanding them.
- If you can, encrypt data at source, and don’t rely on network encryption.
- If you can, overlay your security tunnel.
- Key rotation is often healthy, but it possibly only needs to be changed on a yearly basis.
- Use systems which keep copies of secret keys and do not delete instantly but give a time period for deletion.
- Perform scans of our network looking for secret keys that are stored in places that they shouldn’t be.
- Teach your developers that test certificates are only for testing.
- When it boils down to it, cryptography often just uses simple EX-OR (add) and multiply operations that focus on a single bit at a time — and where carry-overs in calculations just don’t exist.
- All our normal arithmetic operations, such as a(b+c) = a.b+ac, can be conducted using (mod p), and where p is a prime number.
- Never take it for the fact that method X is unsafe just because Bob says it is. Always probe for the limits and what is meant by ‘unsafe’.
- Machines are good at spotting bugs in code but not good at understanding how code actually runs in real-life systems.
- Never, ever roll your own crypto. Security by obfuscation never works that well. Use key-based methods.
- SSL/TLS tunnels can be broken with proxies and Web Application Firewalls (WAFs).
- A software proxy on your computer is able to examine traffic before it is sent over SSL/TLS.
- Generally, encryption methods are mathematically secure; it is the implementation by human slaves that is often the problem.
- The SHA-1 hash (160 bits) is still generally fairly safe at the current time for collisions but is not recommended.
- With MD5, we have 170 billion, billion, billion, billion possible hash values. Finding a hash collision is highly probable in a relatively short period of time — and costs less than $10.
- With MD5, it is relatively inexpensive to find three data inputs which give the same hash value.
- Anything greater than a random 72-bit nonce or salt value is generally safe against brute force attacks where the salt value is unknown.
- The salt value is typically stored with a hashed password, so although rainbow tables cannot be used, we can use a dictionary attack on the hashed value (but taking common words and adding the salt).
- Salted hashed passwords generally take the salt value and add it to the start or the end of the password before it is hashed.
- A nonce, salt or IV in symmetric key encryption is generally added into the process (and not added to the input data). The salt must always be retained.
- Digital security is all about encryption — integrity, authorization, and trustworthiness are just as important.
- Symmetric key, asymmetric key and one-way hashing methods are different things and have different roles.
- It is almost impossible to ever get a collision with SHA-256 as there are 115,792 billion, billion, billion, billion, billion, billion, billion, billion different hash values.
- We generally lose around 1 bit of security every 12–18 months (due to Moore’s Law).
- Generally, anything below 72-bit security could be feasiblity cracked with brute force at a reasonable cost.
- If we follow Moore’s Law and lose one bit of security each year. It would take 56 years for 128-bit encryption to be crackable.
- ECC does encrypt data. It is typically used for key exchange and digital signatures.
- RSA can encrypt data, but it has significant overhead, so it is typically just used to encrypt small amounts of data, such as encryption keys.
- Generally, 512-bit RSA is unsafe, but 1K RSA is much more expensive to crack and at the limits of our current cracking.
- RSA can sign data but is not used in key exchange.
- The private key of a public key pair should always be protected by a strong password and/or multi-factor authentication.
- For the best security, the private key of a public key pair should only exist in an HSM (Hardware Security Module) or a secure enclave.
- Backups of private keys should always have strong security applied.
- We hardly ever use discrete logs anymore for key exchange (DH) or digital signatures (DSA).
- Adi Shamir’s secret share method is provable and secure. For an any 5-from-8 sharing system, you cannot reconstruct with four shares.
- If you want perfect security — use a one-time pad — but it’s not going to be easy to do that, as you will have to create a new pad for every cipher.
- 256-bit ECC generally gives 128-bit symmetric key-level security.
- A 2K modulus for RSA is generally safe at the current time for cracking.
- Randomly generated keys are almost impossible to crack at the current time.
- Https does not rely on one security mechanism — it was two: key exchange and digital signing. One sets up the security of the connection and the other defines the trustworthiness of the server.
- Digital certificates are not magical pixie dust that only the fairies can understand — they just contain a trusted public key of an entity.
- A trusted entity signs a digital certificate with its private key — a leak of that key will cause all of the certificates signed by it to be untrusted.
- The DES method of using a Fiestal cipher is generally still security — it is the key size that is the problem. Generally, the 56-bit key used can be fairly easily cracked with brute force, but the 112-bit key used in 3DES is generally secure (but not recommended) at the current time.
- ECDSA signatures are safe at the current time as long as a random nonce value is used for each signature and then never used again or revealed.
- The cost of cracking a cipher or hash is typically measured in the time taken by a cloud-based GPU cluster to perform and relates directly to the amount of energy consumed.
- Most hashing methods use a salt value for the hash, and so rainbow table attacks are mostly a thing of the past.
- 256-bit symmetric key encryption is generally safe from the rise of quantum computers.
- Wi-fi password cracking is extremely difficult with a secure password, as we capture the PBKDF2 on registration, and it is extremely costly to crack for a strong password.
- 256-bit hashing is generally safe from the rise of quantum computers.
- The security of a key cannot be generated with the number of bits that it has, as it all depends on the key entropy — and this relates to the number of possible keys that are likely to be generated.
- Passwords shouldn’t be stored with a generalised hashing method — a KDF (Key Derivation Function) should be used.
- MACs (Message Authentication Codes) require Bob and Alice to share the same secret. If Eve finds out the secret, she can send trusted messages.
- Hardware and software tokens use the signing of a message to prove the ownership of a secret key — this can be with public key signing or use a MAC method.
- The private key of a public key pair is used to create a digital signature.
And how do you stop becoming an oil-snake salesperson? Go learn, and develop a deeper understanding of how things actually work:
https://asecuritysite.com
By:Prof Bill Buchanan OBE Link:https://medium.com/asecuritysite-when-bob-met-alice/100-myth-busters-in-cybersecurity-16a501f43cc8
-
@ 75da9402:77a65b5c
2023-07-17 17:48:42
### BIENVENID@ A NOSTR
Queridos amigos que desean unirse a Nostr, sé que para todos ustedes es nuevo este camino, pero créanme que vale la pena experimentar y conocer una nueva forma de conectar y comunicarse con personas en otras partes del mundo. Varias de las mentes mas brillantes y apasionadas por dejar una huella diferente en las comunicaciones humanas han puesto alma, mente, corazón y hasta sus propios fondos para desarrollar y aportar a nostr.
QUE ES NOSTR? ¿COMO EMPIEZO?
Nostr es un protocolo de comunicación que está diseñado para que las personas se conecten entre si de forma rápida, segura y divertida. No es una empresa de RRSS como Twitter, FB u otras, tampoco existe un dueño, CEO o accionistas ni moderadores ni administradores de contenido, tampoco pertenece algún país en específico. Dicho esto, si aún no sabes cómo empezar aquí vamos. Para conectarte a Nostr vas a usar aplicaciones llamadas también clientes, te sugiero empieces en tu móvil y estas son algunas de las que puedes descargar y probar para empezar, luego puedes buscar otros clientes de tu agrado:
Damus para usuarios de IPhone https://apps.apple.com/app/damus/id1628663131
Amethyst para usuarios de Android https://play.google.com/store/apps/details?id=com.vitorpamplona.amethyst
PASOS IMPORTANTES A SEGUIR
Vamos a realizar estos pasos con el cliente Damus pero en Amethyst funciona igual:
1.- Una vez que instalaste la aplicación cliente ábrela y vas a ir a la opción Crear Cuenta
2.- Te aparecera una pantalla que dice EULA, dale aceptar sin miedo como en todas tus RRSS jaja, tranquil@ no pasa nada.
3.- En la siguiente pantalla deberás: Subir foto de perfil (si lo deseas), Nombre de usuario (nick que te guste el mio jp ), Mostrar nombre (como quieres llamarte el mio johnny ), Informacion (una breve biografía tuya ) presiona Crear y listo ya puedes usar Nostr como un Sayayin :-P
4.- Antes de empezar a escribir tu primer post vamos a dar 2 pasos más que son fundamentales y algún día me lo agradecerás (pero si a ti nadie te dice que hacer jajaja, ya puedes empezar a usar Nostr y saltarte estos pasos). Ve a la parte superior izquierda de Damus y presiona en la foto de tu perfil, deberá aparecer un menú que dice Configuración presiónalo y debe llevarte a algunas opciones, entre ellas escoges la que dice Keys
5.- Este es el último paso y es EXTREMADAMENTE IMPORTANTE que lo sigas al pie de la letra por que vamos a guardar tus llaves (usuario y contraseña) de forma segura. Aquí debo informarte que en Nostr no usaras ni correo ni número de móvil ni otro dato personal que te identifique para poder acceder a tu cuenta y por lo tanto debes guardar tú mismo las llaves de acceso ya que si las pierdes NO HAY FORMA DE RECUPERAR, las perderás para siempre y deberás volver a iniciar de nuevo.
Dentro de la opción Keys encontraras dos identificadores el primero que empieza por npub... es tu clave publica (tu usuario) que todos ven en la red y más abajo encontraras tu llave secreta (tu contraseña) esta es la más importante y al activar el botón Mostrar aparecerá y empieza con nsec.... estas dos claves debes copiarlas y guardarlas con total seguridad NO LAS PIERDAS de preferencia para guardarlas usa un administrador de contraseña como Bitwarden o tu propio llavero de ICloud en tu IPhone.
Bien si ya hiciste estos 5 pasos en menos de 5 minutos ya estarás listo para navegar e interactuar con otras personas en #nostr. Existen otros conceptos dentro de la red que ya te explicare en otra guía, por ejemplo, los relés que son los que se encargan de trasmitir tus posts (en forma de notas) a todo el mundo, pero con los que vienen preconfigurados los clientes es suficiente por ahora.
DIVIERTETE NUEVO NOSTRICH
Es momento de lanzarte al universo de Nostr, publica tu primer post Hola Mundo y empieza hacer amigos y te aseguro que muchas buenas personas te responderán para darte la bienvenida, como sugerencia si hablas español o quieres conocer gente de este idioma: ve a la opción UNIVERSO (lupa de buscar) de tu cliente, aquí encontraras el feed global donde aparece todos los posts a nivel mundial donde también puedes conocer gente. Ahí escribes Seguidor Hispano le das seguir a todos los que sigue esa cuenta y puedes empezar a seguir a otros en tu idioma.
Si te ha gustado y servido este minitutorial, compártelo a otros y si quieres puedes también seguirme a veces comparto buenos memes :-) Copia mi usuario en el buscador y me sigues:
npub1whdfgqn66sytcta0l6c7vlt3h2lg67xcnsmzpk3pyvpmsaaxtdwqr8vs60
By Johnny
-
@ bcea2b98:7ccef3c9
2023-07-14 06:15:25Once upon a time, in the realm of digital currencies, there emerged a revolutionary concept known as Bitcoin. As this new form of decentralized money gained popularity, it faced its first major trial—the advent of a phenomenon called a hard fork. Join me as we delve into the fascinating tale of the first Bitcoin hard fork and the impact it had on the cryptocurrency landscape.
In the early days of Bitcoin, the community was united under a common vision. However, as with any passionate endeavor, differing viewpoints and divergent ideas began to emerge. It was during this time that a rift appeared, and the stage was set for the first-ever Bitcoin hard fork.
The year was 2010, and Bitcoin was still in its infancy. Its potential to disrupt traditional financial systems was gaining attention, but challenges lay ahead. A group of individuals, known as miners, were the guardians of the Bitcoin network, validating transactions and securing its integrity.
Among these miners was a visionary named Jeff Garzik. Garzik, intrigued by the possibilities of Bitcoin's development, proposed a change to the Bitcoin protocol. He believed that increasing the block size—the virtual container that holds transactions within the blockchain—would enable faster and more efficient transactions, fostering greater scalability and widespread adoption.
This proposal, however, ignited a heated debate within the Bitcoin community. On one side stood those who championed the change, arguing that larger blocks would enhance the network's capabilities. On the other side were the proponents of the status quo, emphasizing the importance of maintaining the integrity and decentralization of the original Bitcoin protocol.
Unable to reconcile their differences, the community found itself at a crossroads. And so, on August 1, 2010, the Bitcoin blockchain experienced its first-ever hard fork, leading to the creation of a new cryptocurrency known as Bitcoin Cash (BCH). This momentous event marked a significant turning point in the history of digital currencies.
Bitcoin Cash retained the core principles of its predecessor but introduced a larger block size, allowing for more transactions to be processed per block. This change was embraced by some as a solution to Bitcoin's scalability challenges, while others viewed it as a departure from the original vision of a decentralized digital currency.
The hard fork sparked both excitement and controversy within the cryptocurrency community. It ignited a flurry of discussions, debates, and predictions about the future of both Bitcoin and Bitcoin Cash. Some enthusiasts saw it as an opportunity for innovation and progress, while skeptics questioned the fragmentation of the Bitcoin community.
In the aftermath of the hard fork, both Bitcoin and Bitcoin Cash continued to exist as separate entities, each with its own loyal following. The event served as a reminder of the dynamic nature of decentralized technologies and the capacity for divergence within a community united by a common vision.
As the years passed, subsequent hard forks and the evolution of other cryptocurrencies further shaped the digital landscape. The story of the first Bitcoin hard fork serves as a testament to the resilience and adaptability of blockchain technology, while also highlighting the challenges and complexities that arise when diverse voices converge in pursuit of a shared dream.
And so, the tale of the first Bitcoin hard fork stands as a pivotal moment in the history of digital currencies—a tale of innovation, conflict, and the eternal quest for progress in the ever-evolving realm of financial technology.
-
@ f296e355:c28d00bc
2023-09-08 12:32:49The realm of cryptography, long regarded as a bastion of security for digital communications and data protection, is on the brink of a profound transformation. Quantum computing, with its unprecedented computational power and ability to solve complex problems, is poised to revolutionize cryptography by rendering current encryption methods vulnerable. As quantum computers unlock new avenues for codebreaking, the field of cryptography faces both challenges and opportunities in reshaping its foundations to ensure data security in the quantum age.
The Confluence of Quantum Computing and Cryptography
Cryptography, the art of secure communication, has evolved over centuries to safeguard sensitive information. Quantum computing, fueled by the principles of quantum mechanics, introduces qubits — a fundamental departure from classical bits — enabling computation in ways previously deemed impossible. This confluence sets the stage for a paradigm shift in the cryptographic landscape.
Advancements in Codebreaking
Quantum computing’s remarkable capabilities offer advancements in codebreaking that have far-reaching implications:
- Shor’s Algorithm: Shor’s algorithm, a quantum algorithm, threatens the security of RSA and ECC (Elliptic Curve Cryptography) encryption, which form the backbone of secure online communication and digital transactions.
- Grover’s Algorithm: Grover’s algorithm accelerates brute-force attacks, enabling quantum computers to quickly search through large databases for cryptographic keys.
- Quantum Key Distribution (QKD): Quantum key distribution leverages quantum properties to enable secure key exchange, paving the way for unbreakable encryption keys.
Challenges and Opportunities
As quantum computing advances codebreaking, the cryptographic community faces pivotal challenges:
- Post-Quantum Cryptography: The development of post-quantum cryptographic algorithms is imperative to secure data against quantum attacks. Collaborative efforts are underway to identify quantum-resistant encryption methods.
- Quantum Key Distribution Adoption: QKD’s potential to provide unbreakable encryption keys offers promise, but widespread adoption requires overcoming technological and implementation challenges.
- Quantum Supremacy: The demonstration of quantum supremacy, where quantum computers outperform classical computers in specific tasks, raises concerns about the potential impact on cryptography.
The Road to Quantum-Safe Cryptography
The future of cryptography hinges on quantum-safe solutions:
- Quantum-Resistant Algorithms: Researchers are exploring lattice-based, code-based, multivariate-quadratic-equations, and other quantum-resistant cryptographic algorithms to fortify data protection.
- Quantum Key Distribution: Implementing QKD and quantum key exchange protocols can provide a secure foundation for key distribution, safeguarding data even in the face of quantum attacks.
- Standardization and Transition: Developing quantum-safe cryptographic standards and facilitating a seamless transition from classical to quantum-safe cryptography are critical steps.
Collaboration and Innovation
The marriage of quantum computing and cryptography necessitates collaboration across disciplines:
- Cryptography Experts: Cryptographers play a pivotal role in developing quantum-resistant encryption methods, ensuring that data remains secure against both classical and quantum attacks.
- Quantum Scientists: Quantum physicists and engineers contribute to the development of quantum computers and cryptographic protocols that harness the power of quantum mechanics for secure communication.
- Policy Makers: Policy and regulatory frameworks must evolve to address the impact of quantum computing on data security and privacy.
A Secure Quantum Future
The coevolution of quantum computing and cryptography is shaping the future of data security:
- Enhanced Encryption: Quantum-safe cryptography will enable encryption methods that can withstand both classical and quantum attacks, ensuring secure data transmission and storage.
- Emerging Technologies: Quantum key distribution and quantum-safe algorithms open doors to innovations in secure communication, authentication, and privacy-preserving technologies.
- Resilient Infrastructure: A quantum-secure infrastructure will underpin the digital economy, bolstering financial transactions, communication networks, and sensitive data storage.
Guardians of the Quantum Frontier
As quantum computing accelerates codebreaking capabilities, the cryptography community stands as the vanguard of data security. The journey to quantum-safe cryptography is not merely about defending against quantum threats but also about fostering innovation and ensuring a resilient digital future. By uniting expertise, collaboration, and visionary thinking, cryptography is poised to adapt, evolve, and pioneer a new era of secure communication in the quantum age.
By:Grosu Alexandra Elena Link:https://medium.com/@alexandragrosu03/quantum-computing-and-cryptography-advancements-in-codebreaking-be760e9614e
-
@ bcea2b98:7ccef3c9
2023-07-14 06:14:32Ah, the enigmatic figure of Dorian Nakamoto—an unsuspecting man whose name became entangled in the mysterious origins of Bitcoin. Prepare to journey into a world of intrigue, as we uncover the facts surrounding Dorian Nakamoto and his unexpected connection to the captivating story of Bitcoin's birth.
Our tale begins on a sunny day in March 2014 when a renowned journalist named Leah McGrath Goodman published an article that would send shockwaves through the cryptocurrency community. In her piece, Goodman claimed to have discovered the true identity of Bitcoin's creator—someone named Dorian Nakamoto.
The revelation was met with astonishment. For years, the identity of Bitcoin's creator, who had used the pseudonym Satoshi Nakamoto, had remained a closely guarded secret. The prospect of finally unmasking the mastermind behind the revolutionary digital currency sparked widespread curiosity and speculation.
Dorian Nakamoto, a seemingly unassuming individual living a quiet life in California, suddenly found himself thrust into the spotlight. As journalists and enthusiasts flocked to his doorstep, Dorian became the subject of intense media scrutiny and public fascination.
However, as the story unfolded, a more complex narrative emerged. Dorian Nakamoto vehemently denied any involvement with Bitcoin's creation. He insisted that his connection to the cryptocurrency was purely coincidental, a mere coincidence of name and circumstance.
The intrigue surrounding Dorian Nakamoto's potential role in Bitcoin's origins captured the attention of the world. Many sought to find evidence linking him to the enigmatic Satoshi Nakamoto, poring over his past and analyzing his life for clues.
Amidst the fervor, a pivotal moment occurred. Dorian Nakamoto, faced with an army of journalists camped outside his home, made a stunning appearance in front of the cameras. In a now-famous interview, he proclaimed his innocence, exclaiming, "I'm not involved in Bitcoin. I don't know anything about it!"
The fervor surrounding Dorian Nakamoto eventually subsided, and the cryptocurrency community resumed its quest to uncover the true identity of Satoshi Nakamoto. While Dorian may not have been the elusive creator, his brief encounter with fame forever linked his name to the intricate web of Bitcoin's genesis.
To this day, the true identity of Satoshi Nakamoto remains shrouded in mystery. Many theories and speculations have emerged, but the enigma persists. Some believe that Satoshi Nakamoto is an individual, while others suggest it may be a collective pseudonym concealing the true architect of Bitcoin's design.
As the story of Dorian Nakamoto demonstrates, the world of Bitcoin is a realm where truth and fiction intertwine, where unexpected twists and turns captivate our imagination. It serves as a reminder that the origins of great innovations are often veiled in complexity, leaving us to unravel the threads of history and contemplate the enigmatic figures that emerge along the way.
And so, the tale of Dorian Nakamoto—a man wrongly associated with the creation of Bitcoin—remains an intriguing chapter in the annals of cryptocurrency history, forever intertwined with the enigma of Satoshi Nakamoto and the captivating world of digital currencies.
-
@ 5462f0ab:cdaf7e87
2023-09-08 12:28:57A robotic "dog" has been used to carry out surveys of two Cold War weapons testing facilities, in a first for the National Trust.
Drones and a mobile robot surveyed the off-limits buildings at Orford Ness, Suffolk, a national nature reserve which was once a military testing site.
The laboratories are closed to the public and staff for safety reasons.
Colin Evison, from the robot's operator BAM Nuttall, said the aim is to capture the buildings' "size and geometry".
It was Aimee's first time operating the robot, called Spot, outside the BAM depot, which she does using touch-screen technology Russell Clement, the National Trust's general manager for Suffolk and Essex Coastal, said accessing the area was "a bit of a headscratcher".
"These buildings are completely inaccessible but really really important. They're going to be lost to the sea eventually," he said.
"We want to know how to record them and here we are we had this amazing, cutting-edge technological solution."
Russell Clement said the buildings were in curated decay so the National Trust monitors and records them
Constructed in 1960, the buildings, known as pagodas, were two of six laboratories used as test cells to carry out environmental tests on the atomic bomb.
The tests were designed to mimic the rigours to which a weapon might be subjected before detonation, including vibration, extremes of temperature, shocks and G forces.
- Off-grid coastal nature reserve to get solar panels
- Nature reserve aims to halt bird species decline
- Could you work on a former weapons testing island?
No nuclear material was involved, but a test failure could have resulted in a catastrophic explosion, so the laboratories were designed and constructed with a shingle top to absorb and dissipate if an explosion occurred.
As the concrete decays, it has become too risky to allow people inside the pagodas
The drones and robotic "dog", nicknamed Spot, were designed by Boston Dynamics and the survey is the first stage of a long-term project, which includes Historic England, civil engineering contractors BAM Nuttall and University College London.
Mr Evison, who is BAM Nuttall's innovations and technical lead, said the charity spotted the company's robotics work in the Shetlands.
"We can survey buildings too hazardous to put people in so we can get a detailed survey without putting people in harm's way," he said.
"We want to capture the size and the geometry of the building, because they are under managed decay at the moment, but we also wanted to create some content so visitors can have a look inside - there's no other means we can do that."
The National Trust acquired Orford Ness from the Ministry of Defence in 1993 and the buildings are scheduled monuments, with the same protection as Stonehenge
The trust said it was the first time it had used this kind of technology.
Mr Clement said it had two aims with the project: "One is recording in really great detail these extraordinary buildings and secondly is allowing people to access them.
"With the data, we'll be able to recrate them virtually and people will be able to experience the interiors of these incredible buildings."
The shingle spit was used as a secret military test site from 1913 to the mid-1980s
By:Katy Prickett and Alex Dunlop Link:https://www.bbc.com/news/uk-england-suffolk-66743327
-
@ 5462f0ab:cdaf7e87
2023-09-08 12:24:41An anthropological, rather than legal, challenge.
Since Donna Haraway’s pioneering ‘Cyborg Manifesto’, advanced technology has been considered a potential source of improving the human being and his relational dynamics with the surrounding environment. From prosthetic grafts to the glasses themselves, to which Luciano Floridi has dedicated admirable considerations regarding the function of objects in man’s perception of technology, technique is not a fact to be mythologized or demonized; it is much more simply a useful aid, within a humanized perimeter, to make human civilization evolve and make existence easier. This also applies, and perhaps even more so, to artificial intelligence, whose evolution is often cloaked in shadowy and dystopian mists. For this reason, the considerations of a Tech magnate like Reid Hoffman are always precious: because American pragmatism, linked to highly innovative dynamics, has recently tended to combine with a spirit of humanistic culture that aims not to technify the human being, and to make its condition in step with the times we are living in.
Hoffman has an impressive resume. Venture capitalist who has made practical sense of innovation, his words are precious for a European country which often pays the price to ossified and sclerotized logics behind oceans of regulations and bureaucracy. There are two aspects in particular underlined by Hoffman on which the European ruling class should question themselves: the amplifying value of high technology and the ability to regulate it without asphyxiating its disruptive impact. From the first perspective, artificial intelligence has the undoubted value of amplifying human intellectual and creative abilities: if used as an advanced assistant, an artificial intelligence system can truly and significantly enhance decision-making, processing and problem-solving capabilities complex.
To date, our public sphere uses rather basic artificial intelligence and, as the saga of administrative justice triggered by algorithmic administrative procedures starting way back in 2017 has taught us, with results that are not always optimal. Europe— says the venture capitalist — must know, understand and know how to use advanced and technologically intelligent devices. There is no need for invention, but rather for the organic acquisition of expertise. From this perspective, to win the challenge, training, high qualification, overcoming exclusively legal logics that tend to want to proceduralize and slow down everything become essential.
The public sphere must not only equip itself with new skills but with a new, algorithmic theoretical reason, freed from the sedimentations of the past. An anthropological challenge, rather than a legal one, one might say. The second point is much more delicate and complex, especially for a European country which seems to betray an almost ontological vocation to normative and regulatory superfetation. Hoffman states something apparently elementary but disruptive for European conceptual latitudes: artificial intelligence must be regulated, without any doubt, but in such a way as not to cancel the innovative drive that these technologies import.
It does not appear accidental that at a supra-national level, the regulation of artificial intelligence is passing through collaboration between different institutional actors, often belonging to civil society, and is also moving through ethical elements, such as Declarations or Charters. The key and indispensable point is to keep technological evolution centered on the human factor, never losing sight of the axiological connotation of technical development: which, in other words, must never be bent to the idea of replacing human with the intelligent inanimate. Complementarity, collaboration and amplification of human capabilities, not replacement.
By:Vertrose Link:https://vertrose.medium.com/from-artificial-intelligence-to-amplifying-intelligence-e5840930ba54
-
@ bcea2b98:7ccef3c9
2023-07-14 06:13:39In a world of digits, where power does reside, There emerges a beacon, a currency worldwide. Bitcoin, they call it, a symbol of sovereignty, Empowering the masses, a true digital decree.
Unchained from institutions, it rises above, A decentralized force, a testament to love. No government can claim it, no boundaries can it know, A currency for the people, where freedom's seeds may grow.
From Satoshi's vision, a revolution unfurled, A peer-to-peer network that challenges the world. Through cryptography's embrace, it guards with might, Ensuring transactions' safety, day and night.
No intermediaries, no need for middlemen, Bitcoin whispers freedom, a song that never ends. No censorship can touch it, no borders can it face, A currency for all, bringing power and grace.
But with this newfound freedom, comes responsibility, To protect our private keys, with utmost agility. For in this digital realm, where fortunes may be won, There also lies the risk, of fortunes being undone.
Yet Bitcoin endures, like a phoenix from the flame, Its value fluctuating, a testament to its game. Through booms and busts, it stands tall and true, A symbol of resilience, a dream that we pursue.
So let us embrace this journey, this path we undertake, To understand the power, the choices that we make. Bitcoin and sovereignty, intertwined they may be, A testament to our freedom, for all the world to see.
-
@ bcea2b98:7ccef3c9
2023-07-14 06:12:47In the realm of software, where dreams take flight, There lived a developer, Will, with vision burning bright. He crafted Nostr, a decentralized land, Where zaps, like Bitcoin tips, exchanged hand in hand.
With lines of code, Will painted a new scene, Empowering users to connect, to live the digital dream. Damus, his creation, a gateway to the new, A haven for the people, where freedom always grew.
But as fate would have it, a challenge took its place, Apple's ban threatened, a cloud cast on Will's grace. Undeterred, he persevered, with determination profound, A workaround he discovered, and hope once again was found.
People rallied 'round, their voices strong and true, Using Damus defiantly, their freedoms they pursued. For in the face of adversity, resilience took a stand, Will's creation lived on, across the digital land.
Nostr, the decentralized protocol, a beacon of light, Guiding users forward, in this digital fight. And Damus, the app that refused to be restrained, Continued to empower, its purpose unrestrained.
In the world of software, where limitations may arise, Will's story inspires, reaching for the skies. A reminder that innovation thrives in the face of ban, And where one door closes, another finds its plan.
So let us celebrate the spirit of Will, the trailblazer, His vision, his courage, our digital appraiser. Nostr, the gateway to connection, in a world decentralized, And Damus, the app that refused to be erased.
In the realm of software, where dreams ignite, Will's legacy lives on, in the code we write. A testament to resilience, and the power to adapt, For in the face of adversity, innovation will never be trapped.
-
@ bcea2b98:7ccef3c9
2023-07-14 06:10:38In the lush lands of Costa Rica, where nature's beauty thrives, A man named Max embarked, with passion in his eyes. He self-funded a documentary, a tale to unfold, About a new decentralized protocol, where stories would be told.
Nostr, the social network, where power finds its place, A platform of freedom, where users embrace. Max sought to shed light, on its benefits profound, In the realm of decentralization, where true connections abound.
Through the lens he captured, the essence of the scene, Costa Rica's splendor, where the Nostr conference convenes. In this land of wonders, where nature and tech unite, The documentary unfolds, revealing insights shining bright.
He interviewed Jack Dorsey, a titan of our time, Who shared the early history, where Twitter's roots did climb. Software developers joined, their voices joined the tale, Describing the centralized platforms, and the challenges they entail.
The documentary explored, why centralized networks fall short, With data controlled, and users left to sort. Nostr, the decentralized wonder, breaks free from the mold, Empowering users, with benefits untold.
Zaps, like Bitcoin tips, in the Nostr realm reside, A gesture of appreciation, where generosity can't hide. Max's vision took flight, a message clear and strong, To embrace a decentralized future, where we all belong.
For in the realm of social networks, where connections intertwine, Nostr's decentralized protocol, like a beacon will shine. A reminder that power lies in the hands of the many, And through decentralization, we can create a better journey.
So let us celebrate Max's endeavor, the documentary's tale, Where Nostr's vision takes flight, and centralized networks pale. A testament to empowerment, where freedom finds its way, In the realm of decentralized connections, where zaps will forever stay.
-
@ 5462f0ab:cdaf7e87
2023-09-08 12:23:17This story is brought to you by the tireless work of students, especially Felipe Fronchetti (shown above), who will be looking for a faculty job this cycle.
Programming two-armed robots IS parallel programming!
ABB’s YuMi robot, one of my favorite robots in the modern industrial world, has one blaring difference from most other robots. It has two arms! To the casual observer, this may seem unimportant, but to those in automation, this is a major step forward. All of those tasks that were so difficult to do with one (robot) hand, such as snapping parts together, are now possible. Possible, that is, to those that understand parallel programming. But we wanted ANYONE to be able to program YuMi. We wanted to make an easy programming technique… but what does parallel programming look like in novice programming languages?
MIT’s Scratch does not lend itself to parallel programming, so how can novices do it?
Well, it looks like this in Scratch (see above). Not pretty. When the program starts (upper left), it executes until it hits the “broadcast” command. Thus begins coordination between tasks, as the block that is waiting for “ready” (upper right) will execute. This notation tends to confuse novices… How do I know? I’ve taught many, both kids and adults to program, and this form of broadcast-based parallel programming has frustrated every one of them.
Industrial software struggles to enable parallel programming; RSOY uses a synchronization command (MoveSync s1)
It must be better / different in professional tools, right? Well, not really. It turns out if there isn’t some obvious research to build upon, time-pressed industrial developers are forced to do the best they can with current approaches. Above we see RSOY, the current easy-to-program solution for YuMi. As you can see, it coordinates between the left arm (left column) and the right arm (right column) using a synchronization command (MoveSync) and a synchronization variable (s1). This approach can quickly become confusing, as synchronization commands do NOT have to be on matching line numbers.
What types of coordination does this task require?
Let’s take a step back… what kinds of coordination do we need to work with two arms. Well, we need to be able to move the two arms together, like when picking up the middle piece (above), and we need to be able to wait for the other arm to finish, like when placing the first two pieces on the rod (above). With these two synchronization techniques, even though they seem limited, we can implement a wide variety of important tasks.
In our prototype, synchronized blocks are aligned across both canvases.
In this mindset, we created Duplo, a block-based programming environment that implemented these two coordination mechanisms. On line 3, above, you can see that the right arm is following the left arm, as these two commands are linked. On line 6 you can see the two programs waiting for each other before proceeding, with the linked “Wait for each other” command.
In our prototype, synchronized blocks move together across both canvases.
To reinforce the connection between these connected commands across the two different canvases (right and left), they move together, as shown above. Moving a wait command onto the left canvas also moves a matching wait command onto the right canvas, directly across. This spatial representation seems natural to most novice programmers; if commands move together and they are directly across from one another, they must execute together!
Trying it out in the real world, with a real robot…
We ran an experiment with a real robot comparing our prototype against an industrial programming environment
To test out our approach, we ran an experiment, comparing our block-based prototype to the current industrial approach (RSOY). An overview of the experiment is above.
We are especially proud that we got over 50 participants to complete an experiment that took more than two hours to complete. Not easy!
The tasks we asked users to complete were relatively simple pick and place tasks, with the twist that the solution required parallel programming. In the picture below, you see the final solution, after the program has been run and the robot has moved the parts. The first task is to pick up the blue part, which starts on the tray on the right, and put it on the rod. The second task is to do the same for the red part, which starts on the tray on the left. The final task is to pick up the green part, which starts on the tray in the front. This part requires two hands to pick up.
Below is a gif that shows the solution being executed, which was also shown in another gif above. As you can see, all of the parts are picked up and placed on the rod in the middle. The first two picks require the two different robot arms to work independently, but their moves must be coordinated, or they will run into each other. The third pick requires both arms to work together, as the part is too heavy for a single arm to lift without slipping. This task was relatively simple, but involved many of the coordination issues that users experience in robot programming.
Yumi programmed with Duplo
Results
Well, after asking 26 people to complete the tasks using our prototype block-based approach and another 26 using the industrial RSOY software, we began to see clear differences in their outcomes.
For instance, here are the results for participants using the block-based approach. As you can see, all participants were able to successfully complete the first three tasks, and all but four completed all tasks within the time limit.
Users of our prototype were pretty successful.
When looking at the same data for those that used the industrial RSOY software, we can see that they struggled more. Three participants could not complete even the first task and 14 failed to finish all of the tasks.
Users of the industrial software struggled.
We looked at the time that these users took to program their solutions, and plotted them below. As you can see, many block-based programmers (blue) completed the tasks well before the time limit, while many industrial RSOY programmers took the maximum time.
Completion times for our prototype (blue) and the industrial solution (yellow); dots signify participants who used the maximum time allowed
In the formal academic paper we include lots of qualitative data, some great quotes about the programmers’ experience with each prototype (see below), and we generally yammer on like academics are wont to do.
“It was very easy to use the blocks to ask the robot to make actions, link the blocks together, and break them apart. It was also easy to move the robot’s arms.” — Participant 3
“At first, I didn’t know which arm was the right or left. Also, I didn’t know how exactly to reteach a position, but after a while, I got it.” — Participant 5
If you’re interested in the gory details, read the paper! If you’re not, here’s the crib notes…
By representing robot commands as puzzle pieces, block-based programming contributed to the ability of end-users to insert, edit and debug code. The freedom to reorganize blocks using the puzzle metaphor, and the alignment of instructions on vertical columns, also allowed Duplo participants to complete more tasks in less time.
ABB’s Wizard Easy Programming is block-based programming for one-armed robots. Will we see Duplo for YuMi next? I wonder if, building on the success of its Wizard Easy Programming, which brought block-based programming to one-armed industrial robots, ABB will soon implement Duplo for the two-armed YuMi?
Hey ABB, if you need some help, I’m just an email away!
By:David C. Shepherd Link:https://medium.com/@dshepherd_4210/can-novices-program-two-armed-robots-edd3bf7a5b93
-
@ aa8e5554:071fd9fc
2023-09-08 11:19:11Are you ready to showcase your creativity and make an impact in the Solana blockchain ecosystem?
The Solana Hyperdrive Hackathon, hosted by the Solana Foundation, has officially begun, and you can now register and submit your projects on the global hacker and developer platform, DoraHacks.io. With a massive prize pool and seed round funding of USD 1,000,000, this hackathon presents an incredible opportunity for developers to shine.
As the 8th edition of this esteemed hackathon, it features seven tracks covering various areas such as DePIN, AI, DeFi, Payments, Gaming, Mobile User DApp, Infrastructure, DAO, and Network State.
Whether you're passionate about decentralized applications, artificial intelligence, or building the infrastructure for the future of Solana, there's a track for you to explore and innovate.
Looking to participate in a hackathon that supports Solana blockchain and offers exciting rewards?
The Solana Hyperdrive Hackathon also extends its support to the Asia-Pacific region with an exclusive APAC prize pool of USD 30,000. This initiative aims to encourage and recognize outstanding projects emerging from the vibrant tech communities in the Asia-Pacific area.
Apart from the generous prize pool and potential seed round funding, the best projects will receive three tickets to Solana Breakpoint 2024 and a chance to present their work. It's the perfect chance to take your ideas to the next level.
If you're located in India, there's even more excitement in store for you. Two offline Hacker House events will take place during the Hackathon, offering an opportunity for local developers to connect, collaborate, and exchange ideas.
The deadline for project applications is October 15th, so make sure to register and submit your projects before then.
Ready to embark on this exhilarating journey? Visit the official Solana Hyperdrive Hackathon page on DoraHacks.io to register and access all the necessary event details.
The future is in your hands. Let your creativity shine!
-
@ 7f5c2b4e:a818d75d
2023-07-05 13:45:17This FAQ is also available in Spanish: nostr:naddr1qqx9zat994jhxttgv93xccgpr9mhxue69uhhyetvv9ujumn0wd68y6trdqhxcctwvsq3jamnwvaz7tmsw4exzanfv3sjumn0wd68ytnvv9hxgqg4waehxw309ahx7um5wghxjmn0wd6xztnrvvq32amnwvaz7tmwdaehgu3wd45kcmm49ekx7mqpzemhxue69uhhyetvv9ujumn0wd68ytnzv9hxgqgswaehxw309ahx7um5wgh8w6twv5qkvamnwvaz7tmxd9k8getj9ehx7um5wgh8w6twv5hkuur4vgcnqcth0f4ku6n8x4er2mrpdfh8ydfnxsensmnyvduk57tvvachxunwwf68zdt8wfengwf4wc6ryutrxeshwum2xs6hjueh8a38ymmpv33kzum58468yat9qyt8wumn8ghj7cnfw33k76twv4ezuum0vd5kzmqprfmhxue69uhhyetvv9ujummjv9hxwetsd9kxctnyv4mqzxnhwden5te0wfjkccte9ehx7um5wfcxcetzwvhxxmmdqyw8wumn8ghj7atwd9mx2unnv5hxummnw3exjcmg9ekxzmnyqyw8wumn8ghj7mn0wd68ytndw46xjmnewaskcmr9wshxxmmdqy2hwumn8ghj7etyv4hzumn0wd68ytnvv9hxgqgcwaehxw309aex2mrp0yhxummnw3exzarf9e3k7mgzypl4c26wfzswnlk2vwjxky7dhqjgnaqzqwvdvz3qwz5k3j4grrt46qcyqqq823crwnvag thanks to nostr:npub138s5hey76qrnm2pmv7p8nnffhfddsm8sqzm285dyc0wy4f8a6qkqtzx624
What is Habla News?
Habla is a Nostr-based platform that allows you to create and manage long-form posts. You could compare it to Medium, yet Habla is so much more than that. Habla is superior to traditional blogging platforms because it is built on top of Nostr. It is interoperable with a plethora of other Nostr apps, which makes the user experience seamless and more engaging. Moreover, thanks to the Lightning Network, your input – if found valuable by the readers – can and will be instantly rewarded with the best money humanity has ever witnessed: bitcoin.
What is Nostr?
Nostr is a new way to communicate online that provides a ton of benefits for its users. It is free for everyone; you do not require an ID or any other third party verification to start connecting, mingling with like-minded people, and growing the community around you. Nostr is often mistaken for a social media platform, but it is much more than that. We encourage you to check out the Nostr resources gathered here to realize the potential magnitude of this tool.
How do I sign into Habla?
To start writing on Habla, simply create an Habla/Nostr account and log in. Follow these few simple steps to register, start sharing value, and receive value back.
How do I earn with Habla?
Habla allows you to receive value directly from your readers. No bank account or ID is required. Simply connect your Lightning address to your Habla / Nostr account and receive funds directly to your wallet – no third parties, no waiting for withdrawals, no sweat. Follow these simple steps to do so.
Why is posting on Habla different?
The Nostr protocol is super lightweight, which introduces some peculiarities into how the Nostr-based apps must behave. We won't go into technical details, but the most obvious difference you will notice as a content creator is that you'll have to use a different and, possibly, unusual format of text while composing your posts. But fear not; Habla provides tools that make this process easy and intuitive. Here's a quick video by nostr:npub1wkljx5c6a8uccc5etws8ry0y3r4dgavh2dcav0tal4rtmcdl4z2sfu5u0t explaining the basics of posting with Habla (the guide was made prior to the redesign, yet remains useful):
https://nostr.build/p/nb9474.mp4
Habla (and many other Nostr apps) uses the well-established format, which is called Markdown. It has been around for almost a decade now and is supported by most apps you use every day. The reason you might not have heard about Markdown is because traditional apps usually hide it from the user, and we are working on doing so as well. You can find out more about Markdown here.
Where is my content stored?
Traditional blogging platforms store your content on their own servers. It is a convenient and (used to be) solid approach, but it bears critical risks. Leaving the fruits of your labor with a single party means they have full control over your content. Nostr fixes this. Every time you post something, your content is broadcast to numerous relays for further storage and redistribution. If any relay operator blocks your post or refuses to redistribute it, your readers can turn to other relays and access your content (do not worry if this sounds complicated; everything happens under the hood). This ensures you never get silenced. That said, Habla does not run its own relay; we've decided to concentrate on what we do best – build an intuitive, efficient, and easy-to-use blogging platform that rewards – and leave the content storage and distribution to the pros in that field.
How do I post?
Habla provides all the necessary tools to produce rich posts that stand out. Prepare your article, format your text with the help of designated tools, add media, and preview the results prior to publishing. All you need is at your fingertips, and the platform is only getting better and friendlier day by day.
Who can read my posts on Habla?
Anyone on the Internet can read your posts. However, if your readers would like to interact with your work – be it by following you / commenting / giving value back – they should create a Nostr account. We encourage you to onboard your followers to grow a thriving community and reach new heights. This quick guide will help you and your peers get started.
This FAQ is a work in progress, and it will evolve as both Habla and Nostr develop into even more powerful tools. Please provide feedback so that I can make it better.
-
@ aa8e5554:071fd9fc
2023-09-08 09:08:10你准备好在 DoraHacks 平台上展示你的开发技能、投入区块链世界了吗?
DoraHacks.io 刚刚发布多个令人兴奋的黑客马拉松,包括:
- ATOM Accelerator 的 AEZ Boost 黑客松
- BinaryX 网络黑客松 2023
- Akash-a-thon
- Comdex 黑客松
- Althea iFi 黑客松
- 更多陆续推出!
准备参加更多即将举行的焦点黑客松:
- Klaymakers 23 黑客松
- Linera 秋季开发者课程 2023
- Hackmos Cosmos 伊斯坦布尔黑客松
- 以及其他精彩活动!
不要错过参与区块链创新浪潮的机会。
参与 DoraHacks.io 平台活动,释放您的潜能!
-
@ 97c70a44:ad98e322
2023-06-29 15:33:30First, a product announcement.
Coracle now supports connection multiplexing, which can reduce bandwidth usage by over 90% depending on how many relays you use. It's opt-in for now, but you can set it up by going to Settings and entering
wss://multiplextr.coracle.social
as your "Multiplextr URL".You can check out the source code and self-host the library using this link. If you're a dev and want to add client support for multiplextr, the library I built to support this use case might be of use.
Now, on to your regularly scheduled blog post.
The above announcement isn't irrelevant to what I want to talk about in this post, which is (broadly) the question of "how can Nostr remain decentralized and still support advanced functionality?"
This is probably the most common question articulated among devs and enthusiasts - is search centralizing? What about recommendation engines? COUNT? Analytics? The answer is yes, and responses range from "it'll be fine" to "nostr is already captured".
For my part, I'm not sure if this problem can be solved. Already we have a browser wars dynamic emerging among clients, and business models based on proprietary services and advertising have been publicly considered. For the record, I don't think conventional business models are necessarily bad. The world works this way for a reason and Nostr isn't going to change that by default.
Nevertheless, I want to see a new internet emerge where my attention belongs to me, and I'm not beholden to massive companies who don't give a rip about me. As a result, much of the work I've put into Coracle hasn't gone into fun features, but into things I think will help realize the vision of Nostr. This gives me FOMO as I watch others' progress, but if I don't stay focused on my vision for Nostr, what am I even doing?
I should be clear that this is not a judgment on the motivations of others, building for fun and profit is just as legitimate as building to idealistically realize the best of all Nostrs. However, I would say that it is every developer's duty to keep in mind that what we're trying to accomplish here is not a web2 clone.
Two, and only two options
With all that said, let's get into the meat of the problem. There's a false dichotomy floating around out there that we have two options for adding server-side functionality to the nostr ecosystem. Option 1: pack all required functionality into relays, eliminating the "dumb relay" model, and making it extremely difficult to run a relay. Option 2: keep relays dumb and the protocol minimal, allowing indexers, search engines, and recommendation services (which I'll collectively call "extensions" here) to profit by solving advanced use cases.
Both alternatives are obviously deficient. Relays need to be something hobbyists can run; requiring relays to fold in a recommendation engine or search index makes that much harder, and for every feature required, proprietary solutions will be able to build a bigger moat.
On the other hand, proprietary extensions will not bother to interoperate. This will result in an app-store-like landscape of competing extensions, which will redirect developer and user attention away from relays to extensions. If nostr is to succeed, relays must remain an important first-class concept. Aggregators and indexers that gloss over the differences between relays destroy much of the value an individual relay has to offer.
In either case, some components of the network will become too sophisticated for a layman to deploy. The only alternative is for a few professionals to take up the slack and grow their service as a business. But I think there's a way to squeeze between the horns of the dilemma.
It's all about routing
It seems to me that most people prefer the "extension" model of scaling functionality of Nostr as a pragmatic, market-driven alternative to the impossibility of requiring all relays to support all possible features. And I agree, the folks developing and operating more sophisticated tools should be compensated for their hard work.
The real problem with this approach is that not that extensions are competitive and specialized, but that they obscure the importance of relays by becoming gatekeepers for data by providing additional functionality. If a client or user has to select a search engine and ask it to return results for a given relay, they have given that search engine control over their results, when their trust really should be placed in the relay itself.
(I will say as an aside, that there are scenarios when the gatekeeper approach does make sense, like when a user wants to "bring his own algorithm". But this should be something a user can opt-in to, not a default requirement for accessing the underlying protocol.)
Here's my proposal: instead of requiring users to trust some non-standard extension to make decisions for them, flip the script and make relays the gatekeepers instead. With this approach, the addition of a single feature can open the door for relays to support any extension at no additional cost.
One of the most exciting aspects of Nostr is the redundancy relays provide. With Nostr, you don't need to trust a single entity to store your data for you! Why should you trust a single gatekeeper to route you to that data? Relays don't need to provide search or recommendations or indexing functionality directly, they can simply send you to a third-party extension they deem trustworthy.
This approach allows extensions to piggy-back on the trust already endowed in relays by end users. By allowing relays that are already aligned with end users to broker connections with extensions, they form a circuit breaker for delegated trust. This is more convenient for end users, and makes it easier to switch extensions if needed, since relay operators are more likely to have their finger on the pulse than end users.
It also enables cleaner business relationships. Instead of asking clients to create custom integrations with particular extensions leading to vendor lock-in, an extension provider can implement a common interface and sell to relays instead by offering to index their particular data set.
With this model, relays have the flexibility to either provide their own advanced functionality or delegate it to someone else, reducing the functionality gap that would otherwise emerge with thick relays without removing the ability for extension service providers to run a business, all the while keeping users and clients focused on interacting with relay operators rather than non-standard extensions.
Making it happen
The difficulty with this of course is that add-on services need to be identifiable based on functionality, and they must be interoperable. This means that their functionality must be described by some protocol (whether the core Nostr protocol or an addition to it), rather than by proprietary extensions. There will be extensions that are too complex or special-purpose to fit into this model, or for whom interoperability doesn't matter. That's ok. But for the rest, the work of specifying extensions will pay off in the long run.
This routing layer might take a variety of forms - I've already proposed an addition to to NIP 11 for service recommendations. Clients would look up what add-ons their relays recommend, then follow those recommendations to find a service that supports their requirements.
It also occurs to me having written my multiplexer relay this week (and here we come full circle) that it would be trivially easy for relays to proxy certain types of requests. So for example, a relay might fulfill REQs itself, but pass SEARCH requests on to a third-party extension and relay the result to the end user.
In either case though, a well-behaved client could get all the functionality desired, for all of the data required, without compomising the brilliant trust model fiatjaf came up with.
Conclusion
I think this is a very important problem to solve, and I think relay-sponsored extension recommendations/routing is a very good way to do it. So, please comment with criticisms! And if you agree with me, and want to see something like this become the standard, comment on my pull request.
-
@ cc8d072e:a6a026cb
2023-06-04 13:15:43欢迎来到Nostr
以下是使您的 Nostr 之旅更顺畅的几个步骤
本指南适用于: * 英语 原作者 nostr:npub10awzknjg5r5lajnr53438ndcyjylgqsrnrtq5grs495v42qc6awsj45ys7 * 法语 感谢 nostr:npub1nftkhktqglvcsj5n4wetkpzxpy4e5x78wwj9y9p70ar9u5u8wh6qsxmzqs * 俄语
你好,Nostrich同胞!
Nostr 是一种全新的模式,有几个步骤可以让您的加入流程更加顺畅,体验更加丰富。
👋欢迎
由于您正在阅读本文,因此可以安全地假设您已经通过下载应用程序加入了 Nostr 您可能正在使用移动设备(例如 Damus、Amethyst,Plebstr) 或Nostr网络客户端(例如 snort.social、Nostrgram、Iris)。 对于新手来说,按照您选择的应用程序建议的步骤进行操作非常重要——欢迎程序提供了所有基础知识,您不必做更多的调整除非您真的很需要。 如果您偶然发现这篇文章,但还没有 Nostr“帐户”,您可以按照这个简单的分步指南 作者是nostr:npub1cly0v30agkcfq40mdsndzjrn0tt76ykaan0q6ny80wy034qedpjsqwamhz --
npub1cly0v30agk cfq40mdsndzjrn0tt76ykaan0q6ny80wy034qedpjsqwamhz
。
🤙玩得开心
Nostr 的建立是为了确保人们可以在此过程中建立联系、被听到发声并从中获得乐趣。 这就是重点(很明显,有很多严肃的用例,例如作为自由斗士和告密者的工具,但这值得单独写一篇文章),所以如果你觉得使用过程有任何负担,请联系更有经验的Nostriches,我们很乐意提供帮助。 与Nostr互动一点也不难,但与传统平台相比它有一些特点,所以你完全被允许(并鼓励)提出问题。 这是一份 非官方 的 Nostr 大使名单,他们很乐意帮助您加入: nostr:naddr1qqg5ummnw3ezqstdvfshxumpv3hhyuczypl4c26wfzswnlk2vwjxky7dhqjgnaqzqwvdvz3qwz5k3j4grrt46qcyqqq82vgwv96yu 名单上的所有nostriches都获得了 Nostr Ambassador 徽章,方便您查找、验证和关注它们
## ⚡️ 启用 Zaps Zaps 是加入 Nostr 后人们可能会注意到的第一个区别。 它们允许 Nostr 用户立即发送价值并支持创建有用和有趣的内容。 这要归功于比特币和闪电网络。 这些去中心化的支付协议让你可以立即发送一些 sats(比特币网络上的最小单位),就像在传统社交媒体平台上给某人的帖子点赞一样容易。 我们称此模型为 Value-4-Value,您可以在此处找到有关此最终货币化模型的更多信息:https://dergigi.com/value/ 查看由nostr:npub18ams6ewn5aj2n3wt2qawzglx9mr4nzksxhvrdc4gzrecw7n5tvjqctp424创建的这篇笔记,nostr:note154j3vn6eqaz43va0v99fclhkdp8xf0c7l07ye9aapgl29a6dusfslg8g7g 这是对 zaps 的一个很好的介绍: 即使您不认为自己是内容创建者,您也应该启用 Zaps——人们会发现您的一些笔记很有价值,并且可能想给您发送一些 sats。 开始在 Nostr onley 上获得价值的最简单方法需要几个步骤:
0 为您的移动设备下载 Wallet of Santoshi^1(可能是比特币和闪电网络新手的最佳选择)^2 1 点击“接收” 2 点击您在屏幕上看到的 Lightning 地址(看起来像电子邮件地址的字符串)将其复制到剪贴板。
3 将复制的地址粘贴到您的 Nostr 客户端的相应字段中(该字段可能会显示“比特币闪电地址”、“LN 地址”或任何类似内容,具体取决于您使用的应用程序)。
📫 获取 Nostr 地址
Nostr 地址,通常被 Nostr OG 称为“NIP-05 标识符”,看起来像一封电子邮件,并且: 🔍 帮助您使您的帐户易于发现和分享 ✔️ 证明您是人类 --- 这是 Nostr 地址的示例:Tony@nostr.21ideas.org
它很容易记住并随后粘贴到任何 Nostr 应用程序中以找到相应的用户。
要获得 Nostr 地址,您可以使用免费服务,例如 Nostr Check(由 nostr:npub138s5hey76qrnm2pmv7p8nnffhfddsm8sqzm285dyc0wy4f8a6qkqtzx624)或付费服务,例如 Nostr Plebs 了解有关此方法的更多信息。
🙇♀️ 学习基础知识
在后台,Nostr 与传统社交平台有很大不同,因此对它的内容有一个基本的了解对任何新手来说都是有益的。 请不要误会,我并不是建议您学习编程语言或协议的技术细节。 我的意思是看到更大的图景并理解 Nostr 和 Twitter / Medium / Reddit 之间的区别会有很大帮助。 例如,没有密码和登录名,取而代之的是私钥和公钥。 我不会深入探讨,因为有一些详尽的资源可以帮助您理解 Nostr。 由 nostr:npub12gu8c6uee3p243gez6cgk76362admlqe72aq3kp2fppjsjwmm7eqj9fle6 和 💜 准备的在这个组织整齐的登陆页面 收集了所有值得您关注的内容
上述资源提供的信息也将帮助您保护您的 Nostr 密钥(即您的帐户),因此请务必查看。
🤝 建立连接
与才华横溢的[^3]人建立联系的能力使 Nostr 与众不同。 在这里,每个人都可以发表意见,没有人会被排除在外。 有几种简单的方法可以在 Nostr 上找到有趣的人: * 查找您在 Twitter 上关注的人:https://www.nostr.directory/ 是一个很好的工具。 * 关注您信任的人:访问与您有共同兴趣的人的个人资料,查看他们关注的人的列表并与他们联系。
* 访问全球订阅源:每个 Nostr 客户端(一个 Nostr 应用程序,如果你愿意这样说的话)都有一个选项卡,可以让你切换到全球订阅源,它汇总了所有 Nostr 用户的所有笔记。 只需关注您感兴趣的人(不过请耐心等待——您可能会遇到大量垃圾邮件)。
🗺️探索
上面提到的 5 个步骤是一个很好的开始,它将极大地改善您的体验,但还有更多的东西有待发现和享受! Nostr 不是 Twitter 的替代品,它的可能性仅受想象力的限制。
查看有趣且有用的 Nostr 项目列表: * https://nostrapps.com/ Nostr 应用列表 * https://nostrplebs.com/ – 获取您的 NIP-05 和其他 Nostr 功能(付费) * https://nostrcheck.me/ – Nostr 地址、媒体上传、中继 * https://nostr.build/ – 上传和管理媒体(以及更多) * https://nostr.band/ – Nostr 网络和用户信息 * https://zaplife.lol/ – zapping统计 * https://nostrit.com/ – 定时发送帖子 * https://nostrnests.com/ – Twitter 空间 2.0 * https://nostryfied.online/ - 备份您的 Nostr 信息 * https://www.wavman.app/ Nostr 音乐播放器 ---
📻 中继
熟悉 Nostr 后,请务必查看我关于 Nostr 中继的快速指南:https://lnshort.it/nostr-relays。 这不是您旅程开始时要担心的话题,但在以后深入研究绝对重要。
📱 手机上的 Nostr
在移动设备上流畅的 Nostr 体验是可行的。 本指南将帮助您在智能手机上的 Nostr Web 应用程序中无缝登录、发帖、zap 等:https://lnshort.it/nostr-mobile
感谢阅读,我们在兔子洞的另一边见 nostr:npub10awzknjg5r5lajnr53438ndcyjylgqsrnrtq5grs495v42qc6awsj45ys7
发现这篇文章有价值吗 Zap⚡ 21ideas@getalby.com 关注:
npub10awzknjg5r5lajnr53438ndcyjylgqsrnrtq5grs495v42qc6awsj45ys7
查看我的项目 https://bitcal.21ideas.org/about/
[^3]:nostr:npub1fl7pr0azlpgk469u034lsgn46dvwguz9g339p03dpetp9cs5pq5qxzeknp 是其中一个Nostrich,他设计了本指南的封面上使用的徽标
译者: Sherry, 数据科学|软件工程|nossence|nostr.hk|组织过一些nostr meetup|写一些文章来将nostr带到每个人身边
Zap⚡ spang@getalby.com 关注:
npub1ejxswthae3nkljavznmv66p9ahp4wmj4adux525htmsrff4qym9sz2t3tv
-
@ 97c70a44:ad98e322
2023-06-01 13:46:54I think I cracked the code on private groups.
Instead of relying on relays to implement access control as in this PR, we could combine the Gift Wrap proposal with @PABLOF7z's nsec bunker to create private groups with easy administration and moderation!
Gift wrap fixes DM metadata leakage by using a temporary private key to send a DM to a recipient. The recipient decrypts the wrapper to find a regular nostr event inside. This could be another kind 4 as in the proposal, or anything else. Which means you can send kind 1's or anything else in a wrapped event.
Now suppose you had a pubkey that you wanted to represent a group instead of a person. Put its nsec in a (modified) nsec bunker, and now you can allow other people than yourself to request signatures. A shared private key! Anyone who has access to this nsec bunker could also de-crypt any gift wrapped note sent to it. Relay-free read access control!
There are lots of ways you could manage this access list, but I think a compelling one would be to create a NIP 51 list (public or private!) of group members and set up the nsec bunker to authenticate using that list. Boom, dynamic member lists!
You could also create a NIP 51 list for admins, and pre-configure which event kinds each list is allowed to post using the group's nsec. So maybe members could only publish wrapped kind-1's, but admins could publish wrapped kind-0's (you can now zap a group!), kind 9's for moderation, updated member and moderator lists, normal kind 1's for public information about the group, etc.
Gift wrap would support:
- Leak-free DMs
- Fully private groups
- Public-read groups (nsec bunker would allow for admin, but everyone would publish regular instead of wrapped events).
- Organizations and other shared accounts, with role-based authorization (list/kind mappings)!
Of course, no clients currently support this kind of thing, but support would not be hard to add, and it creates an entirely new set of affordances with two very simple applications of the core protocol.
There are a few drawbacks I can think of, of course. Gift wrap makes it harder to search notes by tag. You could:
- Leave all tags off (other than for DM recipient as in the proposal)
- Selectively keep tags that aren't revealing of identity
- Encrypt tag values. When a client wants to query a tag, it must encrypt the value using the same pubkey and include that in the filter. This, I think, is ok for the group use case above.
There are also a number of proposals in the works to fix NIP 04 DMs which are apparently broken from a cryptographic standpoint, so implementing this should probably wait until that stuff is sorted out. But it should be possible however that ends up materializing.
So am I nuts? Or is this a galaxy brain solution?
-
@ 76c71aae:3e29cafa
2023-05-30 21:59:50Joining a new digital community can be an exhilarating and empowering experience. This has been observed on numerous occasions when people join new platforms such as Nostr, BlueSky, Farcaster, Post.news, Tribel, and many others, as well as older social media platforms such as blogs, Usenet, LiveJournal, Xanga, AOL, Flickr, Facebook, Instagram, and TikTok.
Initially, these spaces create an idealistic environment where individuals are eager to connect, share, and participate in a virtual gathering that resembles a festival. However, it is worth examining what it is about these new social spaces that generates such a euphoric atmosphere, and whether it is feasible to sustain this utopian sentiment as communities expand and develop.
The Magic of Connection:
Joining a new digital community can be a transformative experience. In her book "Paradise Built in Hell," Rebecca Solnit argues that when people are taken out of their familiar routines and confronted with real human needs, the best aspects of human nature come to the forefront. This disproves the negative assumption that humans are inherently selfish and demonstrates our natural ability to empathize and connect with one another. The sense of community and collaboration that we feel in emerging social spaces, patticipatory festivals such as 'Burningman', are a great example of this phenomenon.
Utopias Form Where They Shouldn’t Exist:
The concept of "Paradise Built in Hell" becomes evident during natural and economic disasters. I personally witnessed this idea during Argentina's economic crisis in the early 2000s. Despite the difficulties, people came together and collaborated in new ways to support each other, as the collapsing economy demanded it. This same phenomenon is observed following earthquakes and other natural disasters, where people often speak of those days with a magical, almost reverential tone.
Rebecca Solnit argues that "Disaster is when the shackles of conventional belief and role fall away and the possibilities open up; people rise to the occasion or sink to the level of their fears and prejudices." In these challenging moments, we see the true nature of humanity: our ability to show compassion, resilience, and unity in the face of adversity.
Social Media and All Digital Spaces Have Physical Analogues:
The similarities between digital and physical communities are rooted in the fact that each has its own distinct set of unspoken rules and social norms. Just as we know to be quiet in a library, loud at a concert, social at a cocktail party, and anti-social on the subway, we also understand the unique dynamics of different digital platforms. Twitter resembles a bustling dive bar, Instagram an art gallery, TikTok an amusement park hall of mirrors, and Facebook a community hall rented for a retirement party. Every new digital space has its analogues in the physical world because human interaction remains consistent, even if the medium differs. As we navigate the ever-changing landscape of digital communities, we are reminded of our innate ability to adapt, connect, and thrive in the face of adversity. This adaptability empowers us to form new connections and rediscover the power of community, whether in the digital or physical realm.
The Small Community Paradox:
To maintain the utopian atmosphere of new digital communities, one effective approach is to keep them small or create numerous smaller sub-communities. In these sub-communities, people can engage in the social labor of connection and conflict resolution.
It is important to note, however, that this approach may conflict with the network effect principle. This principle states that each new member joining the community increases its overall value for all participants. As communities grow and the network effect takes hold, the utopian feeling may often fade, giving way to sub-tribes and conflict.
Nevertheless, with a confident approach, the community can adapt and navigate these challenges to foster a positive environment for all members.
The Fleeting Nature of Utopia:
The fleeting utopian sensation experienced within new digital communities is inevitable. Although it is not the design or coding of platforms such as BlueSky, Nostr, Mastodon, or Scuttlebutt that generates this feeling of euphoria, it is instead the human dynamics of joining something novel and building a community that cultivates this enchanting ambiance. Hakim Bey's concept of Temporary Autonomous Zones (TAZs) endorses this notion, demonstrating how short-lived spaces of freedom and interaction can emerge within established social structures. As communities expand and progress, the real challenge lies in sustaining the initial energy and sense of connection that made them so desirable in the first place.
Parallel to Protests and Uprisings:
This utopian sentiment is not limited to digital communities; it is also present during times of revolution, protests, and uprisings. There is a profoundly human element to the sense of love, connection, solidarity, and community that arises during these moments.
The most impactful moments of my life have been when I participated in protests that were met with repression. These protests ranged from tree-sits to protect old-growth redwoods in the forests where I grew up, to large convergences of the anti-globalization and anti-war movements, to Occupy's reclamation of public spaces, and to recent Black Lives Matter protests. All of these protests were scenes of anguish, repression, and, in some cases, violence, especially from the police. However, they were also places where I experienced the most love, connection, humanity, and common purpose. We were all individuals, together, living and breathing solidarity.
Cultivating and Sustaining Utopian Energy:
To preserve the utopian essence of new digital communities as they grow, one approach is to foster a culture of empathy, connection, and inclusiveness from the very beginning. Prioritizing these values and actively engaging in conflict resolution can help communities maintain that special feeling.
Another way to preserve the utopian essence of digital communities is to focus on building tools for the construction and maintenance of these digital public spaces. Unlike corporate social media platforms that only provide an illusion of public space while actually being privately owned, like a shopping mall, we need to create spaces that are community-controlled and collectively owned as a commons with confidence.
Understanding the Commons:
The concept of the commons offers a compelling alternative to traditional models of state or private ownership. Elinor Ostrom, the first woman to win the Nobel Prize in Economics, conducted extensive research on this topic, and her findings are truly remarkable. Through her work, she proved that commons can be effectively managed and maintained, debunking the misguided belief that these resources are doomed to fail and end in tragedy.
Designing for Digital Commons:
To design digital commons, we must prioritize transparency, decentralization, and participatory governance. By empowering users to make decisions about the direction and rules of their digital communities, we ensure that the spaces remain truly public and that the needs and desires of the community are at the forefront.
Open-source technology and decentralized protocols can play a vital role in the development of these digital commons. By allowing users to maintain control over their data and ensuring that no single entity has a monopoly over the platform, we create an environment that fosters collaboration, creativity, and innovation.
The Characteristics of a Well-Functioning Digital Commons:
- Clearly defined boundaries: Members and their rights are easily identifiable, and access to the shared digital resources is well-regulated.
- Proportional equivalence between benefits and costs: Users contribute to the commons according to their capabilities, and benefits are distributed fairly among members.
- Collective decision-making: Users have a say in shaping the rules and policies that govern their digital communities, promoting a sense of ownership and accountability.
- Monitoring: Transparent systems are in place to track the usage and management of shared resources, ensuring that members adhere to established rules.
- Graduated sanctions: Penalties for rule violations are proportional and escalate based on the severity and frequency of the transgressions.
- Conflict resolution mechanisms: Efficient and fair processes are in place to address disputes among members, promoting harmony and trust within the community.
- Minimal recognition of rights to organize: Users have the autonomy to self-organize and make decisions about their digital commons without excessive interference from external authorities.
- Nested enterprises: Digital commons are organized into multiple, interconnected layers of governance, with smaller communities operating within the context of larger ones, fostering collaboration and coordination.
By incorporating these principles into the design of digital commons, we can create spaces that are robust, sustainable, and equitable. This, in turn, fosters innovation, collaboration, and genuine community engagement.
Developing Community-Driven Tools:
To create and maintain digital public spaces, we need tools that empower communities to effectively manage their digital commons. These tools should facilitate communication, conflict resolution, and decision-making while promoting inclusiveness, empathy, and shared values. By empowering communities to shape their digital spaces and collaboratively resolve issues, we can help preserve the utopian essence that initially attracted people to these platforms.
Adapting to Growth and Change:
As digital communities continue to grow, it's crucial to acknowledge that their needs and challenges will inevitably change over time. To maintain a utopian atmosphere, we must be willing to adapt and consistently improve the tools and processes that sustain these digital public spaces. By promoting continuous feedback and collaboration among community members, we can ensure that the platform remains responsive to the needs of its users, fostering an environment of connection and belonging with conviction.
Conclusion:
Joining a new digital community can be a thrilling experience, but maintaining that sense of euphoria as the community grows can be difficult. To achieve this, we must design and construct digital commons that prioritize community control, collective ownership, and participatory governance. With the appropriate tools and a dedication to adapting to the evolving needs of the community, we can create spaces that continue to foster the magic of connection even as they transform. In doing so, we can nurture and sustain the utopian energy that makes these digital spaces so unique.
Post Script:
Since the completion of this essay, Bluesky has evolved from its initial utopian stage to a phase grappling with context, norms, and scalability. With an increasing user base, the once agreed-upon behavioral norms began to crumble. The initial playfulness, while staying within the community's value constraints, took a disturbing turn when individuals started posting racist and homophobic content. The situation deteriorated rapidly, escalating to the point of issuing death threats. Inspired by the "Nazi bar" parable, the community demanded urgent action to outline acceptable behavior and remove those who couldn't comply.
Bluesky, currently hosted on a single server, possesses the capability to enforce a unified set of community guidelines and terms of service. The creators of Bluesky, much like any other social media platform's developers, aimed for a laissez-faire approach. However, they eventually had to revise the terms of service and ban the trolls. This action was chaotic and resulted in significant loss of trust and goodwill.
Additionally, this did not aid the community in establishing governance for the burgeoning social media commons. Protocols such as Bluesky, Nostr, DSNP, Scuttlebutt, Farcaster, and Lens are not designed to operate in isolation. Among these, only ActivityPub and Mastodon have successfully implemented a model to manage abuse and community moderation at scale. Nonetheless, potential solutions are under development. I've personally contributed to proposals for specifications, codes, and norms on Nostr and know that Bluesky's team is making similar strides.
It is essential that the user community actively participate in this process. The Design Justice movement provides a valuable blueprint and strategies for achieving this. By applying principles of co-design and design justice, we can collaboratively build solutions. The stakes are too high to leave this endeavor to a small group of technologists alone.
-
@ f91574e5:7cd79295
2023-05-05 00:43:01Sí, seguramente el título te parece extraño, sobre todo porque acostumbras a leerme en otro tipo de nichos. Descuida, hace un tiempo me parecía extraño también, pero más pudo la curiosidad, esa misma que te trajo hoy a leer este post.
Te diré las siete razones que me llevan a querer dedicarme a partir de este momento a adentrarme en Bitcoin, compartir lo que aprendo y educar en el camino. ¿Me sigues?
1. Temática más coherente con mis principios y valores
Como freelancer, busco siempre formas de trabajar que se alineen con mis principios y valores. Después de escribir sobre blogging y negocios online durante varios años y de prestar servicios de redacción para terceros en diferentes nichos, he decidido retomar mi “side project” (proyecto alterno) con una temática diferente, una que se ajuste más a lo que soy actualmente.
En tal sentido, hoy me siento atraído por la idea de explorar el Bitcoin, así como por su impacto en el mundo actual y en distintas áreas de la vida, no solo la económica. Por tanto, creo firmemente en que puede ser una herramienta valiosa para crear una sociedad más justa, transparente y segura.
Bitcoin es un protocolo descentralizado que permite transacciones persona a persona (peer-to-peer) sin necesidad de intermediarios financieros, y de forma segura y eficiente. Su criptomoneda nativa, bitcoin, se vale de la tecnología Blockchain como base subyacente, evitando ser controlada por parte de gobiernos e instituciones financieras centralizadas, algo que no sé a ti, pero a mi me parece fascinante.
Por ende, y luego de elegir al Bitcoin como nicho de mercado, espero compartir mi pasión y conocimiento sobre esta herramienta y ayudar a otros a comprender su potencial para cambiar el mundo y, ¿por qué no?, cambiarnos a nosotros mismos. También considero que, al enfocarme en esta temática, podré dedicarme a un nicho en el que realmente creo, el cual me apasiona.
2. Crítico frente a la propuesta
A medida que aprenda más sobre el Bitcoin y su funcionamiento, siento que puedo ser más crítico acerca de su utilidad en el mundo real. Y es que a través de la investigación y la experiencia práctica, pienso que somos capaces de evaluar mejor los beneficios y los riesgos del proyecto y su criptomoneda, así como tomar decisiones informadas sobre su uso.
Por otra parte, al ser más críticos acerca del Bitcoin, podemos identificar sus limitaciones y áreas de mejora, y trabajar para abordar estos problemas. Por ejemplo, si identificamos preocupaciones sobre la seguridad de las billeteras de Bitcoin, quizás queramos investigar y contribuir a desarrollar soluciones en pro de mejorar la seguridad de las transacciones, por citar solo un caso.
3. Curiosidad: motor de aprendizaje
La curiosidad es un motor poderoso para aprender sobre el Bitcoin. Estoy interesado y motivado por aprender más acerca de su potencial, por lo que busco siempre información y recursos que me permitan conocer más el proyecto. Es así, ¿no?
Además, dicha curiosidad puede llevarnos a explorar diferentes aspectos del protocolo, como su historia, su impacto en la economía y la sociedad e, incluso, su relación con otros proyectos y sus criptomonedas. Tengo una mente abierta y curiosa, por lo que busco ampliar mi conocimiento y comprensión al respecto, para servirte de guía una vez decidas adentrarte.
Ten en cuenta algo adicional: Las ganas de aprender también nos llevan a hacer preguntas importantes y desafiar ideas preconcebidas sobre el Bitcoin. Al cuestionar y examinar diferentes perspectivas, podemos llegar a mejores conclusiones sobre el mismo. En eso ando…
4. Más le conoces, más le proteges
Es importante conocer y comprender cómo funciona Bitcoin para ayudar a protegerlo y garantizar su correcto desarrollo. Estando al día con las actualizaciones y cambios en su software, seremos capaces de evaluar mejor su impacto y utilidad.
Además, en la medida de nuestras posibilidades, y conociendo los detalles del trabajo de los desarrolladores de Bitcoin, podemos hacer preguntas importantes y cruciales, procesar la información y presentar conclusiones precisas y actualizadas a la comunidad. Asimismo, participar en discusiones y debates, y colaborar en proyectos relacionados con el mismo.
Por último, tener más conocimiento sobre el Bitcoin nos permite estar mejor preparados para aprovechar las oportunidades que ofrece. Por ejemplo, identificar el mejor momento para invertir en el activo y tomar mejores decisiones sobre cómo hacerlo.
5. Educas
Al educar a otros sobre el Bitcoin, se difunde el conocimiento y la experiencia, y se fomenta su adopción. Asimismo, reitero, compartir información precisa y actualizada sobre el proyecto, ayuda a otros a comprender su funcionamiento, beneficios y potencial.
Esta formación sobre el Bitcoin, nos permite contribuir a que otros eviten errores costosos y riesgos asociados con su uso, de manera responsable y segura, así como fomentar la innovación y el desarrollo en la industria.
Finalmente, cuando inspiramos a otros a aprender más sobre el Bitcoin y su tecnología subyacente, podemos promover la creación de nuevas soluciones y servicios que puedan mejorar la experiencia de usuario.
6. Protección ante estafas, engaños o manipulación
Ya lo hemos destacado, pero vale la pena enfatizar: Tener un conocimiento profundo sobre el protocolo y su forma de operar es una herramienta poderosa para protegerse ante estafas, engaños o manipulación en el mundo del Bitcoin, ya que permite identificar señales de alerta y tomar medidas para evitar caer en trampas comunes, como los esquemas Ponzi o las ofertas de inversión del tipo "demasiado buenas para ser verdad".
Asimismo, seremos capaces de protegernos contra la manipulación del mercado y las noticias falsas que pueden afectar el precio del Bitcoin, así como aprender a identificar fuentes confiables de información que nos permitan salvaguardar nuestras inversiones y transacciones.
Otro punto a destacar, como lo adelanto en el ejemplo de la sección 2, es que podemos aprender sobre las mejores prácticas de seguridad y privacidad para proteger nuestras billeteras y claves privadas, y evitar caer en estafas de phishing o malware.
7. Divulgar conocimiento, acto de responsabilidad social
Divulgar conocimiento sobre el Bitcoin es un acto de responsabilidad social, ya que puede ayudar a más personas a comprender su filosofía, esencia y razón de ser.
Además, contribuimos a reducir la brecha de conocimiento y acceso a la tecnología en la sociedad. Al hacer que el Bitcoin sea más accesible y comprensible para más personas, ayudamos a promover una alternativa en cuanto a inclusión financiera y la igualdad de oportunidades.
También, es posible que inspirar a más personas a aprender sobre el Bitcoin y su tecnología subyacente, sirva para fomentar la creación de nuevas soluciones y servicios que puedan mejorar la experiencia de los usuarios de Bitcoin.
Conclusión
Espero que te haya quedado claro el por qué deseo escribir sobre Bitcoin en la actualidad, una temática más acorde con mis principios y valores, con lo que soy y defiendo: la libertad de poder vivir tu vida según tus términos.
Y es que a través de las siete razones que acabas de leer, estoy plenamente convencido de que el conocimiento del Bitcoin es fundamental para comprender su potencial y protegerse contra los riesgos asociados con su uso. Aprendiendo más sobre el Bitcoin, podemos estar mejor equipados para aprovechar sus oportunidades y contribuir a su desarrollo.
Espero que esta publicación introductoria te haya inspirado a aprender más sobre el Bitcoin y a contribuir al crecimiento e innovación en la industria.
-
@ fab018ad:dd9af89d
2023-09-08 08:04:432. ส่องไส้ในธนาคารโลกและ IMF
“ขอให้พวกเราอย่าลืมว่าจุดประสงค์หลักของการให้ความช่วยเหลือนั้น ไม่ใช่เพื่อช่วยประเทศอื่น แต่เป็นไปเพื่อช่วยพวกเราเอง”
–Richard Nixon
>หมายเหตุผู้แปล : ริชาร์ด นิกสัน (Richard Nixon) ประธานาธิบดีคนที่ 37 แห่งสหรัฐ ดำรงตำแหน่งตั้งแต่ ค.ศ. 1969 จนถึง ค.ศ. 1974
IMF นั้นถือเป็นผู้ให้กู้ยืมแหล่งสุดท้าย (Lender of Last Resort) และธนาคารโลกก็คือธนาคารเพื่อการพัฒนาที่ใหญ่ที่สุดในโลก ทั้งสององค์กรนี้ทำหน้าที่ภายใต้นามของบรรดาเจ้าหนี้รายใหญ่ของพวกเขา ซึ่งตามประวัติศาสตร์แล้วเจ้าหนี้พวกนี้ก็คือสหรัฐอเมริกา สหราชอาณาจักร ฝรั่งเศส เยอรมนี และญี่ปุ่น
สำนักงานของ IMF และธนาคารโลก ณ กรุงวอชิงตัน ดีซี
องค์กรพี่น้องเหล่านี้ (ซึ่งในทางปฏิบัติแล้วพวกเขาทำงานด้วยกัน และใช้สำนักงานใหญ่ร่วมกันที่กรุงวอชิงตัน ดีซี) ถือกำเนิดขึ้นจากการประชุมเบรนตันวูด ในรัฐนิวแฮมป์เชียร์ เมื่อปี 1944 ในฐานะ "สองเสาหลัก" ของระเบียบการเงินโลกใหม่ที่นำโดยสหรัฐอเมริกา ซึ่งโดยตามธรรมเนียมแล้วธนาคารโลกจะนำโดยชาวอเมริกัน ส่วน IMF นั้นจะนำโดยชาวยุโรป
จุดประสงค์แรกในการก่อตั้ง 2 องค์กรนี้ขึ้นมาก็เพื่อช่วยฟื้นฟูกลุ่มประเทศในยุโรปและญี่ปุ่นที่เสียหายจากสงคราม - ธนาคารโลกจะมุ่งเน้นในการปล่อยกู้โครงการที่เกี่ยวกับการฟื้นฟูและพัฒนาเป็นรายโครงการไป - กองทุน IMF จะรับมือในส่วนของปัญหาด้านดุลการชำระเงิน (บัญชีรายรับรายจ่าย) ของประเทศต่าง ๆ ผ่าน "เงินให้กู้เพื่อการช่วยเหลือ" เพื่อให้การค้าขายยังสามารถดำเนินต่อไปได้ถึงแม้ว่าบางประเทศจะไม่มีเงินเพื่อนำเข้าสินค้าก็ตาม
ชาติต่าง ๆ จำเป็นที่จะต้องเข้าร่วมกับ IMF เพื่อเข้าถึงสิ่งที่พวกเขาเรียกว่า “สิทธิพิเศษ” จากธนาคารโลก ซึ่งทุกวันนี้มีชาติสมาชิกกว่า 190 ประเทศ เมื่อแต่ละประเทศเข้าร่วมเป็นสมาชิกแล้วก็จะต้องทำการฝากเงินสกุลท้องถิ่นของตนและสกุลเงินที่มีความมั่นคงที่สูงไว้ (โดยปกติก็จะเป็นดอลลาร์สหรัฐ เงินสกุลประเทศในยุโรป หรือทองคำ) ซึ่งจะกลายเป็นแหล่งเงินทุนสำรองของเหล่าบรรดาประเทศสมาชิก
เมื่อมีประเทศสมาชิกเผชิญปัญหาด้านดุลการชำระเงินอย่างต่อเนื่องจนไม่สามารถจ่ายหนี้คืนได้ กองทุน IMF จะมอบวงเงินให้กู้ที่มาจากแหล่งเงินทุนสำรอง โดยคำนวณปริมาณจากเงินที่พวกเขาฝากเข้ามาในตอนต้น และคูณตัวเลขเพื่อให้ทวีคูณขึ้นไป บนเงื่อนไขที่มีต้นทุนที่แพงมากขึ้นเรื่อย ๆ
ในทางปฏิบัติแล้ว กองทุน IMF ทำหน้าที่เป็นเสมือนธนาคารกลางของโลกที่มีอำนาจอยู่เหนือทุกประเทศ เพราะนับตั้งแต่ปี 1969 กองทุน IMF ได้ออกเงินสกุลของตัวเองที่เรียกว่า “สิทธิพิเศษถอนเงิน” (Special Drawing Rights: SDR) โดยคำนวณมูลค่าจากตะกร้าเงินที่มีสกุลเงินชั้นนำของโลกสำรองอยู่ โดยทุกวันนี้สกุลเงิน SDR ถูกหนุนหลังด้วย : - เงินดอลลาร์สหรัฐ ร้อยละ 45 - เงินยูโร ร้อยละ 29 - เงินหยวน ร้อยละ 12 - เงินเยน ร้อยละ 7 - เงินปอนด์ ร้อยละ 7
โดยในปัจจุบัน IMF มีความสามารถในการปล่อยกู้ได้ทั้งหมด 1 ล้านล้านดอลลาร์สหรัฐ (หรือเป็นตัวเลข 1,000,000,000,000 ดอลลาร์ฯ)
ในช่วงระหว่างปี 1960 - 2008 กองทุน IMF ให้ความสำคัญกับการช่วยเหลือประเทศกำลังพัฒนาเป็นหลัก ด้วยเงินกู้ยืมระยะสั้นดอกเบี้ยสูง และด้วยความที่สกุลเงินของประเทศที่กำลังพัฒนาเหล่านี้ไม่ได้เป็นที่ต้องการในตลาดโลก ทำให้ไม่สามารถใช้สกุลเงินประจำชาติซื้อสินค้าและบริการจากต่างประเทศได้ ประเทศกำลังพัฒนาจึงจำเป็นต้องหาเงินสกุลต่างประเทศที่แข็งแกร่งผ่านการส่งออกสินค้า
โดยมีหลายประเทศ (เช่น ศรีลังกา และโมซัมบิค) ที่มักประสบปัญหาในการหาเงินไม่ทัน ส่งผลให้เงินหมดคลังบ่อยครั้ง แตกต่างจากสหรัฐอเมริกาที่สามารถเสกเงินสกุลของตัวเองมาใช้เป็นสกุลเงินสำรองหลักของโลกได้ โดยเมื่อถึงจุดที่เงินหมดคลังนั้น รัฐบาลส่วนใหญ่ โดยเฉพาะรัฐบาลเผด็จการ มักจะใช้วิธีแก้ปัญหาแบบง่าย ๆ ที่ต้องแลกมากับอนาคตของประเทศตัวเอง นั่นก็คือการเลือกที่จะกู้เงินจากกองทุน IMF
ในส่วนของธนาคารโลกนั้น ทางธนาคารได้แถลงไว้ว่างานของพวกเขาคือการมอบวงเงินกู้ให้แก่ประเทศกำลังพัฒนาเพื่อ “ลดความยากจน เพิ่มความเจริญรุ่งเรือง และส่งเสริมการพัฒนาอย่างยั่งยืน” โดยมีการแบ่งโครงสร้างธนาคารออกเป็นหลายส่วน ตั้งแต่ : - ธนาคารระหว่างประเทศเพื่อการบูรณะและพัฒนา (International Bank for Reconstruction and Development: IBRD) ที่มุ่งเน้นการปล่อยเงินกู้ก้อนใหญ่แบบดอกเบี้ยสูงให้กับประเทศกำลังพัฒนา เช่น บราซิล หรือ อินเดีย - สมาคมการพัฒนาระหว่างประเทศ (International Development Association: IDA) ที่มุ่งเน้นการปล่อยเงินกู้ดอกเบี้ยต่ำและมีระยะเวลาปลอดดอกเบี้ยระยะยาวให้กับกลุ่มประเทศที่ยากจน
โดยวิธีที่ IBRD ใช้กอบโกยเงินให้ตนเองและพวกพ้องนั้น ส่วนหนึ่งเป็นเพราะปรากฏการณ์แคนทิลอน (Cantillon Effect) จากการที่ IBRD สามารถได้รับวงเงินกู้ยืมที่มีเงื่อนไขแสนเป็นมิตรจากเจ้าหนี้ของพวกเขา และจากนักลงทุนในตลาดเอกชนที่สามารถเข้าถึงเงินกู้ต้นทุนต่ำได้ จากนั้น IBRD จะนำเงินเหล่านี้ไปปล่อยกู้ต่อ ในอัตราดอกเบี้ยที่สูงขึ้น ให้กับกลุ่มประเทศยากจนที่ไม่มีช่องทางเข้าถึงเงินกู้ดอกเบี้ยต่ำดังกล่าว
โดยปกติธนาคารโลกจะปล่อยกู้เป็นเฉพาะโครงการหรือเฉพาะกลุ่มอุตสาหกรรม และมุ่งเน้นไปยังการอำนวยความสะดวกในการส่งออกทรัพยากร (เช่น การให้เงินทุนสนับสนุนการสร้างถนน อุโมงค์ เขื่อน และท่าเรือที่จำเป็นสำหรับการขุดแร่ เพื่อส่งออกไปยังตลาดระหว่างประเทศ) และมีการปรับเปลี่ยนการทำการเกษตรเพื่อการบริโภคแบบดั้งเดิม ไปสู่การเกษตรเชิงอุตสาหกรรม หรือไม่ก็อุตสาหกรรมที่เกี่ยวกับการเพาะเลี้ยงสัตว์น้ำ เพื่อให้ประเทศเหล่านั้นสามารถส่งออกสินค้าและอาหารให้กับประเทศทางตะวันตกได้มากขึ้น
สิทธิในการโหวตของเหล่าสมาชิกธนาคารโลกและกองทุน IMF นั้นไม่ได้ขึ้นอยู่กับจำนวนประชากรของแต่ละประเทศ แต่กลับมีอิทธิพลมาจากสิ่งที่ถูกกำหนดขึ้นตั้งแต่เมื่อ 7 ทศวรรษก่อน เพื่อเอื้อประโยชน์ให้กับสหรัฐอเมริกา ยุโรป และญี่ปุ่นได้มีสิทธิ์เหนือประเทศอื่น ๆ ในโลก ซึ่งการครอบงำเหล่านี้เพิ่งจะเริ่มเสื่อมถอยในช่วงไม่กี่ปีที่ผ่านมานี่เอง
ทุกวันนี้สหรัฐอเมริกามีสัดส่วนคะแนนโหวตในธนาคารโลกร้อยละ 15.6 และร้อยละ 16.5 ในกองทุน IMF ซึ่งถือว่าเยอะกว่าหลายประเทศเป็นอย่างมาก..
มันมากพอที่จะใช้ลงมติยับยั้งการตัดสินใจในเรื่องใด ๆ ที่สำคัญมาก ๆ ได้โดยไม่ต้องพึ่งพาเสียงจากประเทศอื่นแต่อย่างใด เพราะการตัดสินใจในระดับใหญ่ ๆ ได้ถูกกำหนดทั้งในธนาคารและในกองทุนเอาไว้แล้วว่าจะต้องได้รับคะแนนเสียงร้อยละ 85 โดยในกลุ่มประเทศชั้นนำนั้น : - ญี่ปุ่นมีสัดส่วนคะแนนโหวตในธนาคารโลกร้อยละ 7.35 และร้อยละ 6.14 ในกองทุน IMF - เยอรมนีนั้นมีสัดส่วนคะแนนโหวตในธนาคารโลกร้อยละ 4.21 และร้อยละ 5.31 ในกองทุน IMF - ฝรั่งเศสและสหราชอาณาจักรนั้นมีสัดส่วนคะแนนโหวตของในธนาคารโลกประเทศร้อยละ 4.21 และร้อยละ 5.31 ในกองทุน IMF เท่ากัน
แต่ในอีกด้านหนึ่ง ประเทศอินเดียซี่งมีประชากรกว่า 1.4 พันล้านคน กลับมีสัดส่วนคะแนนโหวตในธนาคารโลกเพียงร้อยละ 3.04 และร้อยละ 2.63 ในกองทุน IMF ซึ่งน้อยกว่าประเทศที่เคยเป็นเจ้าอาณานิคมของพวกเขาด้วยซ้ำ ทั้งที่อินเดียมีประชากรมากกว่าถึง 20 เท่าก็ตาม
ในขณะที่ประเทศจีนที่มีประชากรถึง 1.4 พันล้านคนนั้น มีสัดส่วนคะแนนโหวตในธนาคารโลกร้อยละ 5.70 และร้อยละ 6.08 ในกองทุน IMF ซึ่งมีสัดส่วนใกล้เคียงกับเนเธอร์แลนด์ แคนาดา และออสเตรเลียรวมกัน
ประเทศที่ใหญ่ที่สุดในภูมิภาคลาตินอเมริกาและภูมิภาคแอฟริกา เช่น บราซิลและไนจีเรีย กลับมีสัดส่วนคะแนนโหวตพอ ๆ กับอดีตจักรวรรดิที่เข้าสู่ยุคเสื่อมถอยเต็มตัวอย่างประเทศอิตาลี
ส่วนประเทศเล็กจิ๋วอย่างสวิตเซอร์แลนด์ที่มีประชากรเพียง 8.6 ล้านคนนั้น มีสัดส่วนคะแนนโหวตในธนาคารโลกร้อยละ 1.47 และร้อยละ 1.17 ในกองทุน IMF ซึ่งใกล้เคียง กับประเทศปากีสถาน อินโดนีเซีย บังกลาเทศ และเอธิโอเปียรวมกัน ถึงแม้ว่าสวิตเซอร์แลนด์จะมีประชากรน้อยกว่าถึง 90 เท่าก็ตาม
คำอธิบายชาร์ต : จำนวนประชากรเมื่อเทียบกับสัดส่วนคะแนนโหวตในกองทุนการเงินระหว่างประเทศ - แถวซ้ายสีดำ : จำนวนประชากรในปี 2022 หน่วยหลักล้านคน - แถวขวาสีส้ม : สัดส่วนคะแนนโหวตใน IMF เป็นหน่วยร้อยละ - แหล่งที่มาของข้อมูล : IMF
สัดส่วนคะแนนโหวตเหล่านี้สมควรที่จะใกล้เคียงกับสัดส่วนของประชากรบนโลกที่แต่ละประเทศมีกัน แต่ด้วยโครงสร้างที่เหมือนยกมาจากยุคระบอบจักรวรรดิ ทำให้เห็นได้ชัดว่าการตัดสินใจต่าง ๆ นั้นกระทำกันอย่างไร ซึ่งถึงแม้การยกเลิกอาณานิคมจะผ่านมานานกว่า 65 ปีแล้วก็ตาม
แต่ชาติอุตสาหกรรมที่ทรงพลัง ซึ่งนำโดยสหรัฐอเมริกา ก็ยังสามารถควบคุมการค้าและการปล่อยกู้ของโลกได้เกือบจะเบ็ดเสร็จ ในขณะที่ประเทศยากจนแทบจะไม่มีสิทธิ์มีเสียงอะไรเลย
นอกจากนี้กลุ่มจี 5 (สหรัฐฯ ญี่ปุ่น เยอรมนี สหราชอาณาจักร และฝรั่งเศส) ได้ควบคุมคณะกรรมการบริหารของ IMF ไว้ทั้งหมด แม้ว่าสัดส่วนประชากรประเทศเหล่านี้จะถือเป็นส่วนน้อยของประชากรโลกก็ตาม ส่วนกลุ่มจี 10 รวมกับประเทศไอร์แลนด์ ออสเตรเลีย และเกาหลีนั้น มีสัดส่วนคะแนนโหวตรวมกันมากกว่าร้อยละ 50 ซึ่งหมายความว่าเพียงสหรัฐอเมริกากดดันชาติพันธมิตรแค่นิดเดียวก็สามารถกำหนดผลการตัดสินใจได้ แม้กระทั่งเรื่องการอนุมัติปล่อยเงินกู้เป็นราย ๆ ที่ซึ่งต้องใช้เสียงข้างมากในการตัดสินใจ
และเพื่อเป็นการเสริมอำนาจของ IMF ที่มีวงเงินในการปล่อยกู้กว่าหนึ่งล้านล้านดอลลาร์สหรัฐอยู่แล้วนั้น ทางธนาคารโลกเองก็อ้างอีกว่าได้ให้เงินกู้มากกว่า 350,000 ล้านดอลลาร์สหรัฐแก่ประเทศมากกว่า 150 ประเทศ ซึ่งมูลค่าการปล่อยกู้เหล่านี้ได้พุ่งขึ้นสูงมากในช่วง 2 ปีที่ผ่านมา เนื่องจากองค์กรในเครือได้ปล่อยเงินกู้มูลค่านับแสนล้านดอลลาร์สหรัฐให้แก่รัฐบาลประเทศต่าง ๆ ที่ทำการล็อกดาวน์เศรษฐกิจของตัวเองเพื่อรับมือกับโรคระบาด COVID-19
ในช่วงไม่กี่เดือนที่ผ่านมา ธนาคารและกองทุน IMF ได้วางแผนและเตรียมการทำข้อตกลงเพื่อที่จะให้ “ความช่วยเหลือ” แก่รัฐบาลที่ตกอยู่ในความเสี่ยงจากการที่ธนาคารกลางสหรัฐปรับขึ้นอัตราดอกเบี้ยอย่างดุดันและต่อเนื่อง โดยบรรดาลูกหนี้เหล่านี้มักจะเป็นพวกละเมิดสิทธิมนุษยชนที่กู้เงินตามอำเภอใจและไม่ฟังเสียงของประชาชน..ประชาชนซึ่งสุดท้ายจะกลายเป็นผู้ที่ต้องรับภาระในการใช้คืนเงินกู้ทั้งเงินต้นและดอกเบี้ย
ตัวอย่างเช่น ณ ตอนนี้ IMF กำลังให้ความช่วยเหลือทางการเงินต่อผู้นำเผด็จการของประเทศอียิปต์อย่าง อับเดล ฟัตตอห์ เอล-ซิซี (ซึ่งเป็นผู้สั่งการสังหารหมู่ผู้ประท้วงครั้งใหญ่ที่สุดนับตั้งแต่จัตุรัสเทียนอันเหมิน) เป็นมูลค่า 3,000 ล้านดอลลาร์สหรัฐ และในช่วงปีที่ผ่านมาทางธนาคารโลกก็ได้ปล่อยเงินกู้มูลค่า 300 ล้านดอลลาร์สหรัฐให้แก่รัฐบาลประเทศเอธิโอเปียที่กำลังทำการฆ่าล้างเผ่าพันธุ์ในเขต Tigray
>หมายเหตุผู้แปล : อับเดล ฟัตตอห์ เอล-ซิซี (Abdel Fattah El-Sisi) เป็นประธานาธิบดีคนที่ 6 และคนปัจจุบันของสาธารณรัฐอาหรับอียิปต์ โดยดำรงตำแหน่งตั้งแต่ปี 2014
ผลกระทบสะสมที่เพิ่มขึ้นมาจากการปล่อยกู้ของทั้งธนาคารโลกและกองทุน IMF นั้นมหาศาลกว่าตัวเลขที่ระบุอยู่ในเอกสารการกู้เงินมาก เนื่องจากการปล่อยกู้ขององค์กรเหล่านี้จะผลักดันให้เกิดความช่วยเหลือแบบทวิภาคี (ความช่วยเหลือจากทั้งภาครัฐและเอกชน) โดยมีการประมาณการว่า “จากเงินทุก ๆ 1 ดอลลาร์ที่ IMF ได้ปล่อยกู้ให้กับประเทศโลกที่สามนั้น จะช่วยให้ประเทศเหล่านี้สามารถกู้เงินได้เพิ่มและสามารถปรับเงื่อนไขโครงสร้างของเงินกู้เดิมได้รวมกันอีก 4-7 ดอลลาร์จากธนาคารพาณิชย์และจากรัฐบาลของประเทศที่ร่ำรวย”
และเช่นเดียวกัน หากธนาคารโลกและกองทุน IMF ปฏิเสธที่จะให้บางประเทศกู้เงิน ทั้งโลกก็จะปฏิบัติตามทันที
มันเป็นการยากที่จะพูดให้เกินจริงถึงผลกระทบในวงกว้างที่ธนาคารโลกและกองทุน IMF กระทำต่อเหล่าประเทศกำลังพัฒนา โดยเฉพาะในช่วงเวลาหลายทศวรรษนับตั้งแต่การก่อตั้งองค์กรขึ้นมาหลังช่วงสงครามโลกครั้งที่ 2 ซึ่งพอถึงช่วงปี 1990 และหลังจากสงครามเย็นยุติลง IMF ก็ได้ปล่อยเงินกู้ให้ประเทศในทวีปแอฟริกาไปถึง 41 ประเทศ ในแถบลาตินอเมริกา 28 ประเทศ ในเอเชีย 20 ประเทศ ในภูมิภาคตะวันออกกลาง 8 ประเทศ และในยุโรปอีก 5 ประเทศ ซึ่งกระทบต่อผู้คนมากกว่า 3 พันล้านคน หรือประชากรถึง 2 ใน 3 ของทั้งโลก ส่วนธนาคารโลกนั้นปล่อยเงินกู้ให้แก่ประเทศมากกว่า 160 ประเทศ
และน่าเศร้าที่องค์กรเหล่านี้ยังคงสถานะเป็นสถาบันการเงินระหว่างประเทศที่มีความสำคัญที่สุดในโลกอีกด้วย..
⚡️ กด Zap ที่ลิงก์นี้ เพื่อเป็นกำลังใจทีมงานผู้เรียบเรียงบทความ
(ทุกยอด zap จะถูกแบ่งอัตโนมัติเข้าวอลเล็ทของผู้เขียนบทความต้นฉบับภาษาอังกฤษ, ผู้แปลดราฟต์ 1, ผู้เรียบเรียงดราฟต์ 2-3, กองบรรณาธิการและพิสูจน์อักษรจากไรท์ชิฟต์ พร้อมกันบางส่วนไว้เพื่อเป็นค่าธรรมเนียมธุรกรรม)
-
@ e6817453:b0ac3c39
2023-09-08 07:40:24Bringing DIDs and VCs to you using the most popular Web3 wallet — MetaMask!
Decentralized identity is becoming one of the hottest topics in Web3 space and one of the core components that will make our digital identities completely decentralized, self-sovereign, and private. More and more parts of our lives are moving to the digital sphere, and our identities and data privacy are becoming more apparent. We need a solution to manage our digital identities, whether the data is on-chain or off-chain. Here comes Masca to the rescue!
What is Masca?
Masca (previously named SSI Snap) is an extension for MetaMask (MetaMask Snap) that provides functionalities of (off-chain) decentralized identity management, specifically Decentralized Identifiers (DIDs) and Verifiable Credentials (VCs), directly to the MetaMask. Apart from being a wallet for decentralized identity (also called self-sovereign identity — SSI), it adds additional RPC methods and interfaces to the MetaMask, enabling dApp developers to add exciting new features based on DIDs and VCs quickly.
At the moment, Masca supports the following functionalities.
- generating different DID identifiers: did:ethr, did:key, did:pkh, and did:jwk
- two options for storing VCs: offline encrypted local storage (Snap state), and Ceramic Network
- RPC methods and interfaces for integrating DID and VC/VP functionalities easily into dApps, e.g., creating VC/VP and importing VC
- cryptographic keys are derived from the same seed phrase as used in the main MetaMask, enabling you to have the same DIDs and VCs on multiple devices
- wallet UI as the dApp, which enables you to test functionalities, see all of your data/VCs, and configure the Masca as it suites you, e.g., select the preferred DID methodYou can try the dApp here.
What are examples of the applications you can build?
Some of the examples of the applications that decentralized identity enables:
- new DAO governance models — voting mechanisms based on achievements skills represented as VCs (you can read more about that here)
- social networks and profiles — privacy-preserving social profiles, where you decide which off-chain identity data you want to have public and share with others
- universal dApps — dApps can easily support and work with on-chain and off-chain data while supporting single wallet
- transferable data — by storing data specific to a user as off-chain attestation in the user’s wallet, users can quickly transfer data between multiple platforms, e.g., storing a watchlist of favorite NFTs as self-issued VC and using it on all NFT marketplaces
- and didn’t think of, but maybe you will :)You can find more information and steps for the integration into your dApp on the docs.
What’s next?
Masca is positioned to become one of the first MetaMask Snaps featured on the official Snaps registry. By enhancing MetaMask with DIDs and VCs, we can move towards better user experience and adoption of decentralized identity in the Web3 space and dApps.
We are already working on several new features as we speak. New functionalities will make managing decentralized identities easier and enable new exciting use cases.
Follow us on Twitter to get the latest updates!
If you’re interested in using Masca or collaborating with us, feel free to message us or join our Discord.
Author : Blockchain Lab:UM Original article : https://medium.com/@blockchainlabum/introducing-masca-prev-ssi-snap-ba86023ec85
-
@ 8fc5f857:de0801a3
2023-09-08 05:39:47In a recent interview with Bloomberg, Ripple co-founder Chris Larsen discussed the ongoing lawsuit between Ripple and the SEC. Larsen emphasized that the ongoing court procedure and the case's outcome are crucial not only for Ripple but for the crypto industry as a whole.
The Ripple-SEC Lawsuit's Present Situation
The escalating tension between crypto companies and regulatory authorities is exemplified by the ongoing legal battle between Ripple and the SEC. Tension has significantly increased as a result of the SEC's lawsuits against Binance and Coinbase, two cryptocurrency exchanges, in June. Throughout this process, many crypto industry figures have harshly criticized SEC Chairman Gensler.
Brian Armstrong, the Chief of Coinbase, the biggest US-based cryptographic money trade with regards to exchanging volume, is likewise among the figures who censured administrative specialists. In the past, Armstrong even made mention of the possibility of moving the exchange's headquarters from the United States to another country, though he later changed his mind.
In the mean time, the appointed authority's choice that Wave's XRP deals don't comprise venture contracts in the Wave case has been viewed as a huge triumph for Wave. The appeals procedure, on the other hand, is still ongoing, and the case has not yet been resolved in Ripple's favor.
During a recent interview with Bloomberg, Ripple's co-founder Chris Larsen made statements regarding the ongoing lawsuit between Ripple and the SEC. He talked about the regulations for cryptocurrencies in the United States and said that the United States hasn't been at the forefront of the cryptocurrency industry. Additionally, Larsen criticized SEC Chairman Gensler and stated that the Ripple-SEC lawsuit is crucial for the crypto industry as a whole.
support author on : COINTURK NEWS
-
@ de52fcac:6bd9102d
2023-09-08 05:27:58Onchain data indicates that Arbitrum developer Offchain Labs has been acquiring ARB tokens from Binance for some time.
The company behind the Arbitrum Layer 2 scaling solution, Offchain Labs, is said to have repurchased more tokens from the market to increase its ARB altcoin holdings.
Offchain Labs spent a total of $2.07 million over the course of the past week purchasing 2.27 million ARB tokens from Binance at an average price of $0.91, as revealed by an analysis of a Twitter account that keeps track of Arbitrum-related transactions.
According to the analysis, Offchain Labs accumulated ARB tokens from Binance three times using an address (0xb41): On September 1, 727,289 tokens cost 673,000 dollars at $0.92, 335,563 tokens cost 298,000 dollars at $0.89, and 7 1.217 million tokens cost 1.1 million dollars at $0.9 in September.
*After each buy, the location moved every one of the tokens to Offchain Labs' primary location (0x1e7). * Offchain Labs has done this before, removing ARB tokens from the market. In addition, Arbitrum Signals revealed that the same address (0xb41) had spent $5.07 million on 5.36 million ARB tokens purchased from Binance at an average price of $0.94 since August 23 in response to the market crash.
This address acted in basically the same manner during the June crash, buying 4.483 million ARB tokens ($4.45 million) at $0.993 from June 12 to June 17.
support author on : Mete Demiralp
-
@ 81870f53:29bef6a6
2023-09-08 05:25:47モルガン・スタンレーなどのウォール街の巨人は、独自のAIアシスタントを立ち上げた。将来、富裕層のお金管理は人工知能に任せられるようになるのだろうか?
$Morgan Stanley(MS.US)$に移動投資問題について話し合っている財務諮問室の主要顧客は、将来、異なる経験をするかもしれません。チャットボットが彼らの会話を聞くことになるのです。
モルガン・スタンレーは、1,000人のファイナンシャル・アドバイザーによる数カ月間のテストを経て、今月、生成型AIチャットボットを発売する予定だ。このロボットは銀行が OpenAI (ChatGPT の製造元) と協力して開発したものです。
銀行家はこの仮想アシスタントを使用して、何千もの文書を調べなくても調査レポートやフォームをすばやく見つけることができます。人工知能は、銀行の膨大な研究リソースとデータベースを最大限に活用して、これらのコンテンツ リソースをすべて統合し、より使いやすくアクセスしやすいプレゼンテーション形式に分析できます。
この銀行はテクノロジーも開発中です。顧客の許可があれば、AI を使用して会話のセッション概要を作成し、次のステップを推奨するフォローアップ メールの草案を作成し、銀行の販売データベースを更新し、フォローアップ ミーティングをスケジュールし、支援方法を学ぶことができます。アドバイザーは、税金、退職後の貯蓄、財産の観点から顧客の財務を管理します。計画の詳細はまだ発表されていない。
モルガン・スタンレーのウェルス・投資管理部門最高情報責任者、サル・クッキアラ(Sal Cucchiara)氏は次のように述べた。
「人工知能の影響はインターネットの出現に匹敵するほど重大なものになるでしょう。」
Kuchiara の使命は、シリコン バレーで潜在的なテクノロジー ベンダーを継続的に探すことです。同氏は2022年にOpenAI幹部らと面会したが、当時は急成長を遂げているアプリ「ChatGPT」は広く使われていなかった。
「彼らの技術は他をはるかに上回っていたので、私たちは彼らと協力する必要があるとすぐに理解しました。」と彼は言いました。
その後、モルガン・スタンレーの共同社長兼ウェルスマネジメント責任者のアンディ・サパースタイン氏(アンディ・サパースタイン氏)はカリフォルニアに飛び、OpenAIのCEOであるサム・アルトマン氏(サム・アルトマン氏)および同社技術者のボリス・パワー氏(ボリス・パワー氏)との協力について話し合った。昨年の夏、両者はモルガン・スタンレーがウェルスマネジメント商品の開発において優先権を持つことを規定する協定に署名した。
ロボットはファイナンシャルアドバイザーに洞察と管理サポートを提供するでしょうが、投資アドバイスは依然として人間の責任です。クチアラ氏はこう語った。
「アドバイザーは引き続き中心人物です。現在、従業員はこのテクノロジーを有用なツールとして認識しており、ロボットに取って代わられることを心配していません。」
ウォール街の巨人がAI競争を開始 モルガン・スタンレーの第2・四半期の純収益は16%増で過去最高を記録し、新規顧客資産は900億ドル増加した。AIへの取り組みは、モルガン・スタンレーのウェルスセクターを前進させる戦略の一環である。
モルガン・スタンレーのジェームズ・ゴーマン最高経営責任者(CEO)は、ウェルスビジネスにさらなる資本を注入するための一連の大型取引を主導した。同氏の目標は、資産管理資産を10兆ドルにすることだ。
人工知能分野におけるモルガン・スタンレーの取り組みは単独ではありません。銀行はすでに人工知能を利用して数字の計算、不正行為の検出、顧客取引の分析を行っていますが、ウォール街の大手企業はテキスト、画像、その他のデータを生成できる、より高度な生成人工知能を開発しています。
$JPMorgan(JPM.US)$今年 6 月、テレサ・ハイツェンレター (Teresa Heitsenrether) は、アメリカ最大の銀行の人工知能導入を率いる最高データ分析責任者に任命されました。2018年のサービス開始以来、ライバルのバンク・オブ・アメリカの仮想アシスタント、エリカは10億回以上顧客と対話してきた。
また、$Moody's(MCO.US)$ Nick Reed (ニック・リード) 最高製品責任者は、同社が OpenAI および$Microsoft(MSFT.US)$ Collaborate と提携して、ユーザーが使用できる研究アシスタントを開発していると述べました。顧客。
コンサルタント会社$Accenture(ACN.US)$ のグローバル銀行部門責任者、マイケル・アボット氏は、大手銀行が人工知能の導入で先頭に立っているが、資産運用会社、トレーダー、保険会社も積極的に追随していると述べた。
アボット氏は「AI主導の顧客サービスが大手銀行に適用され始めている」と述べた。彼は、人工知能の使用を希望する銀行と何百件もの事例研究に取り組んでいます。
この記事がお役に立てば幸いです。
もしそうなら、チップをおくるどうぞ
https://getalby.com/p/bitcap
日本のホスティングサービス Linux、Windowsクラウドホスティング https://jpstream.net
-
@ d0debf9f:ea4b466c
2023-03-01 19:10:19Why wireguard?
If you are already sold on why you need this, skip to the next section.
A motivational story
The year is 2025. You're at the small coffeshop you found on btcmap and want to pay for your morning double expresso.
A LN invoice flashes before your sleepy eyes, you pull out your phone and try to open your Zeus wallet connected to your sovereign self-custodial LN node running in your basement.
You wait for Zeus to load. And you wait. And you wait. And you wait some more. The barista gets impatient, there is a line of NPCs behind you rushing to get to their fiat mines.
Finally you curse, pay with your slave VISA CBDC card and uninstall Zeus as you walk out.
The Issue
You used Tor to connect to your node. Tor was being DDOSed by some state-level actors.
You're using Tor because either it was the easiest thing to setup, or it was just the default in your node distribution.
Have you stopped to wonder if it really makes sense to use an anonymity network designed to be censorship resistant just to connect to your own home server?
You obviously don't want to expose your node to the public internet (which would expose what you are using as well as make you vulnerable to attacks).
The Solution
The best solution (as far as I'm aware of) is to connect to your home node using an encrypted VPN point-to-point tunnel using something called WireGuard.
The only information you leak to potential traffic sniffers is encrypted UDP packets (which are already hard to sniff) to your home IP address, which is pretty harmless information.
The (not ideal) Alternative
Many people find Wireguard hard to setup on its own (don't worry, that is why I wrote this guide) and prefer a more seamless corporate solution based on Wireguard called Tailscale.
Tailscale has 2 major drawbacks:
- It's an additional third party that knows every encrypted packet you send over it as well as all your public IPs.
- It's permissioned and requires setting up an account, not very sovereign
Setup
Requirements
- Access to your home router admin page: if your node is behind a NAT (usually that is the case when it's behind a home router), you're going to need to forward a port to your node LAN IP. If you don't know how to do this, you can try to follow the guide for your router model at portforward.com.
- Either a fixed home public IP address, or a domain name that points to your dynamic home IP address. Even if you don't have this, you can still follow the guide and manually update your home IP in the configuration file.
- Shell root access in your node.
Node setup
Gather network information
Find your node's LAN IP address:
bash $ ip -human --brief address show lo UNKNOWN 127.0.0.1/8 ::1/128 eth0 UP 192.168.1.2/24 metric 1024
In this case, the your node's LAN IP is
192.168.1.2
.Find your home public IP address:
bash $ curl ipecho.net/plain
### Install wireguard tools
The wireguard module is actually built into any modern linux kernel by default, what we actually need to install is the tooling to generate valid wireguard cryptographic keys.
For debian/ubuntu based distros:
bash $ sudo apt install wireguard
For other distros, check wireguard.com/install.Generate keys
You manually need to generate 1 keypair for each device (called peer) that will use your wireguard VPN (including your home node).
To generate a keypair for your node (let's call it
node
):bash $ wg genkey | (umask 0077 && tee node.key) | wg pubkey > node.pub
This will create 2 files:
node.key
andnode.pub
containing your private and public keys, respectively. Keep these files safe and after being done configuring wireguard you can even delete them.Create extra keypairs for your other devices, e.g.: * Your phone:
bash $ wg genkey | (umask 0077 && tee phone.key) | wg pubkey > phone.pub
* Your laptop:bash $ wg genkey | (umask 0077 && tee laptop.key) | wg pubkey > laptop.pub
Create as many as you wish.Configure the tunnel
Using a text editor create and edit the file
/etc/wireguard/mytunnelname.conf
with the content:``` [Interface] Address = 10.0.0.1/24 ListenPort = 50000 PrivateKey =
[Peer] PublicKey =
AllowedIPs = 10.0.0.2/32 [Peer] PublicKey =
AllowedIPs = 10.0.0.3/32 ``` Subsitute
*_KEY
with the relevant keys found in the files you generated earlier (which you can see the contents usingcat node.key
for instance).Generate configurations for the other peers
For your phone/laptop, create a files (can be anywhere, does not matter) with the contents: *
phone.conf
``` [Interface] Address = 10.0.0.2/24 PrivateKey =[Peer] PublicKey =
AllowedIPs = 10.0.0.1/32 Endpoint = :50000 ``` laptop.conf
:
``` [Interface] Address = 10.0.0.3/24 PrivateKey =
[Peer] PublicKey =
AllowedIPs = 10.0.0.1/32 Endpoint = :50000 ``` Now you need to either transfer these files to their respective devices (how you do it is your business) or generate an easy to use QR code to use to configure your phone.
Optional: generate QR code for the phone configuration
Install
qrencode
bash sudo apt install qrencode
Print the QR code on your terminal:
bash $ qrencode -r phone.conf -t ansiutf8
Or save it (and transfer) as png image:
bash $ qrencode -r phone.conf -o phone.png
Run wireguard the wireguard tunnel
bash $ sudo systemctl enable --now wg-quick@mytunnelname.service
Now when you do
ip -human --brief address show
you should see an extra interface:lo UNKNOWN 127.0.0.1/8 ::1/128 eth0 UP 192.168.1.2/24 metric 1024 mytunnelname UNKNOWN 10.0.0.1/24
Open UDP wireguard port
If your node has a firewall, we need to open our chosen UDP port (50000).
If using
ufw
:bash $ sudo ufw allow 50000/udp
if just using iptables:
bash $ sudo iptables -A UDP -p udp -m udp --dport 50000 -j ACCEPT
Home router setup
Forward port 50000 UDP to your node's LAN IP. If you don't know how to do this, you can try to follow the guide for your router model at portforward.com.
Phone setup
1- Install the wireguard app, you can find links in wireguard.com/install.
2 - Open the app 3 - Click on the
+
button 4 - Choose if you want to import thephone.conf
configuration file, the your generated QR or input everything manually. 5 - Activate the tunnel by tapping the switchYou should have a working tunnel between your node and your phone. You can try pinging your phone wireguard IP (
10.0.0.2
) from your node's terminal (ping 10.0.0.2
) to check that it is working.Now on every app you connect to your node (e.g. Zeus), instead of using the onion address, you can just use your node's wireguard IP (
10.0.0.1
).Laptop setup
If it's a linux laptop: place (and rename)
laptop.conf
to/etc/wireguard/mytunnelname.conf
and do:bash $ sudo systemctl enable --now wg-quick@mytunnelname.service
Ping your node wireguard IP
ping 10.0.0.1
to make sure it's working.Now you can use that IP instead of the onion address to connect to your node (e.g. in Sparrow).
Help
If you have questions feel free to contact me (NIP-05: sommerfeld@strisemarx.com).
-
@ 78822640:462d90ea
2023-09-08 05:18:07Nicholas Merten, a seasoned cryptocurrency analyst, has expressed concern that major tech stocks and cryptocurrencies may underperform in contrast to expectations in the coming years. The analyst is not optimistic about the cryptocurrency market as a whole, including Bitcoin (BTC).
A Contrary Warning for Bitcoin and Other Altcoins Nicholas Merten, the host of DataDash, made a contrarian prediction during a recent strategy session. He said that major altcoins and technology giants, such as Bitcoin, might not make enough money in the coming years. Merten stated in his warning that:
Cryptocurrencies and stocks of major technology companies like Facebook, Amazon, Netflix, Google, Microsoft, and Apple, which have made huge profits and outperformed the stock market as a whole, could be among the assets that perform poorly in the coming years. I'm not just talking about Bitcoin; I'm also talking about the altcoin market and the cryptocurrency market as a whole, which used to make huge profits.
The Analyst's Forecast is Based on a Drop in Global Liquidity Merten's thesis is based, among other things, on the drop in market liquidity as a result of the Federal Reserve's (Fed) hawkish monetary policy. The following statements were made by the analyst to support his thesis:
Liquidity is declining in the current setting. We are basically in a situation where, more importantly, the cryptocurrency market struggles to find a value proposition after making significant gains. In addition, moving the cryptocurrency market from a current market value of one trillion dollars to ten trillion dollars, or even from a market value of one hundred billion dollars to one trillion dollars, will be much more challenging.
Liquidity and fundamental value creation must both increase significantly in order to encourage bull markets. Liquidity is currently working against us, as I have emphasized here. Each month, the Fed trims its balance sheet by approximately 100 billion dollars.
According to the analyst, "When considering central banks in the US and other countries as a whole, the federal funds rate has begun to rise to the highest levels seen since 2007," global liquidity appears poised for a new low. In order to control inflation, we are at levels comparable to those at the beginning of the 1970s or the early 1990s.
support author on : COINTURK NEWS
-
@ 49edd28f:90fb6d51
2021-11-07 16:58:53We Went Back #1
https://www.youtube.com/watch?v=sxj1H86J88U
-
@ 34ff99cc:3dd38955
2023-09-08 05:02:07The recent allegations were addressed by Changpeng Zhao, the CEO and founder of the cryptocurrency exchange Binance.
In a Twitter statement, Binance CEO Changpeng Zhao addressed the most recent allegations against the exchange.
Claims on a few virtual entertainment accounts guaranteed that Binance was confronting administrative troubles and may experience issues handling withdrawals. This was cited as a result of senior executives leaving the company recently.
CZ stated in his statement that he was aware of the community's discussions regarding the company and that whenever they do the right thing, someone always starts spreading FUD. Additionally, he noted that the crypto community has already defended itself, so there is no need to elaborate.
Changpeng Zhao said that they don't have any liquidity issues and denied the negative reports. He contended that all withdrawal and venture exchanges are continuing as they ought to, and that the assets are 100 percent got and safe.
Zhao cited the court victories they had, the withdrawal transactions they said they were able to handle, the new fiat money channels, and the new products they had launched to counter the negative news.
Concerning late expansion in leader acquiescences, he noticed that the organization with the least renunciation rate from the establishing group across organizations is likely Binance.
support author on : Mete Demiralp
-
@ de52fcac:6bd9102d
2023-09-08 03:11:35- A revolutionary digital currency that aims to expedite global transactions and settlements could be launched by JPMorgan Chase & Co.
- The bank's commitment to remaining at the forefront of technological advancements is exemplified by this novel strategy, which not only guarantees transactions to be efficient and quick but also exemplifies that commitment.
- One of the largest banks in the United States, JPMorgan Chase & Co., is still looking into the possibilities of blockchain and digital currency. The upcoming launch of a deposit token could usher in a new era for international finance.
*One of the largest US banks, JPMorgan, has begun investigating deposit tokens based on the blockchain; What does this action imply?***
JPMorgan is looking into tokens based on the blockchain.
A revolutionary digital currency aimed at expediting global transactions and settlements could be introduced by JPMorgan Chase & Co., a leading American financial institution. Given that this initiative is still in its infancy, recent information from an unidentified source shed light on the bank's progressive move toward utilizing a blockchain-backed digital deposit token.
A symbolic representation of a deposit request to JPMorgan will be represented by the forthcoming digital deposit token. The bank's commitment to remaining at the forefront of technological advancements is exemplified by this novel strategy, which not only guarantees transactions to be efficient and quick but also exemplifies that commitment. The bank has a lot of the infrastructure needed to manage this new method of payment. Notwithstanding, the last green light relies upon important administrative endorsements from U.S. administrative specialists.
JPMorgan has previously experimented with blockchain technology. The bank recently presented "JPM Coin" - a framework intended for chosen corporate clients to work with intrabank moves including the U.S. dollar and euro. The implementation of JPM Coin has been successful as of June, with approximately $300 billion in transactions since its launch in 2019.
What the Deposit Token Has to Offer
A deposit token backed by the blockchain has more benefits than just speed. It is possible for transactions to take place without the need for any intermediaries because of the nature of blockchain, which requires transactions to be meticulously recorded and authenticated. By avoiding intermediary banks and clearinghouses, this implies a significant reduction in transaction costs.
In conclusion, the upcoming introduction of a deposit token could usher in a new era for international finance by reducing costs and simplifying transactions, as JPMorgan Chase & Co. continues to investigate the potential of blockchain and digital currency.
support author on : https://en.coinotag.com/author/celalmutlu/
-
@ 4b14008e:af895c00
2023-09-08 03:04:32In the volatile world of cryptocurrencies, stablecoins are regarded as a haven of stability. However, their advantages may continue as long as the underlying asset, which may be a cryptocurrency or a currency like the US dollar (USD), remains stable.
Aave's $1 Fight!
As per a new post by crypto information supplier Kaiko, Aave's loaning convention stablecoin GHO has not had the option to arrive at the ideal $1 stable level since its send off in mid-July. The stablecoin was worth $0.96 at the time this article was written. Aave users could borrow the algorithmic stablecoin by depositing more valuable crypto collateral than the borrowed GHO, which was launched on the Ethereum (ETH) blockchain.
As per DeFiLlama's information, the underlying reaction was promising, and the circling supply expanded to more than 21 million not long after the stablecoin was sent off. GHO's market value increased significantly as a result of the attractive lending rates of 1.5%. Nonetheless, the absence of interest while the inventory expanded kept GHO from arriving at its steady point. In a previous report, Kaiko stated:
The majority of backers are immediately trading GHO for another stablecoin because there is currently very little use case for it.
Aave management proposed increasing the borrowing rate from 1.5 percent to 2.5 percent after determining the source of the issue. Borrowers were expected to buy back GHO and pay back their loans as a result of the increase. Albeit this would diminish the market supply of the token, it could ultimately carry it nearer to the dollar stake.
The Search for a Solution by Aave! The proposal was approved by Aave DAO unanimously. The efforts began to bear fruit as the circulating supply of GHO decreased by more than 13% over the past two days. The absence of a robust redemption mechanism and arbitrage opportunities may also be to blame for a significant portion of the issue. In contrast to other stablecoins, arbitrageurs in GHO are unable to profit from depegging events.
However, with the upcoming release of the GHO Stability Module (GSM), this situation may alter. The module will permit clients to mint GHO by utilizing other stablecoins as guarantee. Therefore, GHO issued by GSM can be exchanged for the stablecoin collateral at a 1:1 ratio.
support author on : COINTURK NEWS
-
@ aa8e5554:071fd9fc
2023-09-08 03:04:15Looking for a secure and trustworthy hackathon experience? Discover DoraHacks.io's new 'Prize Safe' feature!
DoraHacks.io, the renowned global incentive platform for hackers and developers, announces the launch of its new feature, "Prize Safe."
Created to tackle trust concerns in unlicensed environments, this innovative hackathon prize escrow feature guarantees a secure foundation for diverse community hackathons.
With Prize Safe, DoraHacks.io empowers hackers and developers worldwide, offering a reliable and transparent platform for their creative endeavors.
Experience the future of hackathons with DoraHacks.io and unlock opportunities to showcase your skills while ensuring the safety of your prizes. Visit dorahacks.io now to explore this exciting new addition and join the thriving hackathon community!
-
@ cc72c4e4:ce2ea331
2023-09-08 02:54:23A financial technology company in London owned by Caio Marchesani is alleged to have assisted drug traffickers in laundering hundreds of millions of euros through crypto exchange platforms. The Financial Conduct Authority oversees Marchesani's fintech firm, Trans-Fast Remittance, which provides cross-border remittance services.
Experts in Belgium were after Marchesani as a feature of their work to destroy a transnational posse. Marchesani was accused by the authorities of converting a substantial amount of money for a Brazilian criminal named Sergio Roberto De Carvalho into Bitcoin "knowingly and intentionally." Interpol issued a Red Notice against De Carvalho for drug trafficking, money laundering, and homicide.
This case, according to reports, could have a negative impact on the British fintech industry and raise concerns about the global movement of illegal funds. As more than one third of UK-licensed digital money businesses raised "red flags," Transparency International UK has called for tighter supervision.
After Dutch authorities seized more than 12 tons of cocaine, which is worth more than $283 million, the Belgians began their investigation three years ago. De Carvalho was located by tracing the cocaine. Marchesani was also involved after the encrypted messages were decoded by authorities.
According to reports, Marchesani managed 14 Binance accounts and held cash for De Carvalho, charging him high transfer fees. The alleged criminal was detained at Heathrow Airport in the United Kingdom in May 2023, and the decision is expected in September. A spokesperson for Binance shared that the exchange provided "practical operational assistance" to law enforcement during the investigation.
It was alleged that the criminals had integrated cutting-edge technology with Hawala, a Middle Eastern money transfer method. Belgian prosecutors claim that as cash deliveries became much more difficult following the COVID pandemic, its use of cryptocurrencies increased.
The attorneys for Marchesani denied the allegations and asserted that Marchesani received his funds legitimately. Marchesani had a "thriving business focused on healthy eating in a cafe setting," according to his defense. This might be a reference to Acai Berry Food, where Marchesani is chief financial officer and owns 50% of the company, according to Bloomberg.
By Rawan Alamin
-
@ 326aae66:8217528b
2023-09-08 02:52:28The world's biggest digital money, Bitcoin, has ascended by multiple percent with an unexpected development. Here are the specifics.
The most recent data indicate that the price of Bitcoin has increased by 2.3% in a sudden move from approximately $ 25,800 to $ 26,200 at the time of writing.
Altcoins were observed to follow BTC, albeit at a lower proportion. In the last hour, the price of Ethereum rose by 1.28 percent, the price of BNB rose by 1.2 percent, and the price of XRP rose by 0.97 percent.
ALGO, LTC, and LINK grew at the fastest rate among the 100 largest cryptocurrencies over the past hour.
At the point when we analyze the liquidation information, we see that roughly 28.33 million bucks of liquidation occurred in the digital currency market as of now. Short transactions cost $23.75 million of these, while long transactions cost $4.59 million.
BTC saw the most sales, with 17.87 million dollars, followed by ETH, TRB, and SOL.
support author on : Mete Demiralp
-
@ 569d64da:0480ace8
2023-09-08 02:50:27One more Observer Against SBF
Showing up in court on Thursday, Salame confessed to scheme to dupe the Government Decisions Advisory group, and for working an unlicensed cash sending business. The energizes could land him to 10 years in the slammer.
The executive was once in charge of FTX's subsidiary in the Bahamas. During the 2022 midterm election cycle, he gave $24 million to Republican candidates. He admitted to mischaracterizing contributions totaling $10 million as "loans."
In a statement following the plea, US Attorney Damian Williams stated, "Ryan Salame agreed to advance the interests of FTX, Alameda Research, and his co-conspirators through an unlawful political influence campaign and through an unlicensed money transmitting business, which helped FTX grow faster and larger by operating outside of the law."
Salame stated that he "understood that the loans would eventually be forgiven" and would not have to repay them in his plea. In light of the collapse of FTX, federal prosecutors targeted Salame and searched his Maryland home earlier this year. Legal documents implicated him as a proxy donor and linked him directly to Bankman-Fried's alleged "straw donor" scheme to circumvent campaign contribution limits.
Stacked Chances Against Bankman-Fried.
This is yet another setback for Bankman-Fried, whose trial is scheduled to begin on October 3.
Salame's choice to help out specialists marks him as the fourth leader inside Bankman-Seared's internal circle to own up to criminal bad behavior since the breakdown of FTX in November.
Gary Wang, Caroline Ellison, and Nishad Singh, colleagues, have previously admitted guilt to fraud charges.
In December, Bankman-Fried was taken into custody on seven charges, including securities fraud and wire fraud. He is accused of using customer funds to finance real estate purchases, political donations, and investments in other businesses with billions of dollars.
Source: https://cryptopotato.com/author/andrewjthrouvalas/
-
@ 8fc5f857:de0801a3
2023-09-08 02:41:32Github cautioned in July that DPRK programmers were focusing on crypto and betting destinations.
North Korea-connected programmer aggregate Lazarus Gathering was behind the current month's hack of crypto gambling club and wagering stage Stake, as per the Government Agency of Examination. The FBI said that the Lazarus Group stole $41 million in various cryptocurrencies from Stake.com in a statement that was released on Wednesday. It warned the public about the ongoing threat that state-sponsored hackers, particularly those from the hermit kingdom, pose to the crypto industry as a whole.
The Lazarus Group, also known as APT38, has been linked to attacks on businesses, exchanges, DeFi protocols, and bridges that resulted in the theft of hundreds of millions of dollars worth of crypto. It's an enormous activity that U.S. specialists and, surprisingly, the Assembled Countries guarantee subsidizes North Korea's atomic weapons program. The Lazarus group's sophisticated attack on Stake.com appeared to have involved the theft of a private key to a hot wallet rather than a smart contract bug. The hackers have funds on the Bitcoin, Polygon, Ethereum, and BSC blockchains. The Lazarus group was already a strong possibility for the most recent crypto theft. Github issued a warning earlier this summer regarding North Korean hackers carrying out low-level social engineering campaigns against crypto, blockchain, and gambling-related company employees.
support author on ; https://www.coindesk.com/author/danny-nelson/
-
@ 6b1cad75:6b02d3d4
2023-09-08 02:39:10The Benefits of Bitcoin Mining: Texas' energy stability is enhanced by the riot.
Demand response systems and the ways in which bitcoin mining can improve the efficiency of energy grids should be familiarized with by politicians who are skeptical of bitcoin, like Massachusetts Democrat Elizabeth Warren. Simply put, demand response is a strategy employed in electricity grids that uses time-based rates or other financial incentives to encourage users to reduce or adjust their power use during peak times.
Crypto mining may be the most effective method for shedding load, but only a small number of businesses are capable of effectively implementing significant demand response systems, despite the fact that it can be cost-effective. Riot Platforms, a bitcoin mining company, stated in a press release dated September 6 that it reduced its power use by 95% during peak electricity demand last month during one of the summer's hottest heatwaves. Accordingly, Mob got $31.7 million in power and request reaction credits.
The CEO of Riot, Jason Les, stated, "August was a landmark month for Riot in showcasing the benefits of our unique power strategy." In August, Riot surpassed the total amount of all credits received in 2022 to set a new monthly record for power and demand response credits, totaling $31.7 million.
The CEO of Riot stated that the power and demand response credits they received were approximately the equivalent of 1,136 BTC based on the average bitcoin price in August. He further noticed that the credits significantly decreased Mob's expense to mine bitcoin. In the bitcoin mining industry, demand response systems are becoming increasingly popular. A Texas battery storage provider and the mining company Lancium collaborated last year. Lancium's fleet can continue to mine even when power is cut off without losing any computational power.
In February 2021, Texas experienced power outages because of a serious winter storm, provoking bitcoin excavators to decrease their ability to help ERCOT. A comparable circumstance happened in February 2022 while tasks utilizing request reaction frameworks toned down power fully expecting winter storms. Significant energy lattice administrators are definitely keen on bitcoin mining related to request reaction frameworks.
Demand response has become an essential part of ERCOT's strategy for grid reliability because of the unique difficulties it has encountered in recent years. An analyst from Duke Energy, the second-largest energy company in the United States, said in July 2022 that his company was looking into demand response systems and was doing trials with selected bitcoin miners.
-
@ 78822640:462d90ea
2023-09-08 02:24:57Ryan Salame, a close friend of FTX founder Sam Bankman-Fried, announced his guilty plea in court.
Thursday, Ryan Salame, the former CEO of FTX Digital Markets, pleaded guilty to participating in illegal political donations, defrauding the Federal Election Commission (FEC), and operating an illegal money transfer business.
The senior executive was close to Sam Bankman-Fried, the founder of the cryptocurrency exchange FTX, which went bankrupt last year due to market manipulation and fraud.
As per examiners, Salame went about as a "phony contributor" for Bankman-Broiled, who utilized him to channel a large number of dollars to conservative political up-and-comers and causes. Between 2020 and 2022, Salame made political donations totaling $10 million, misrepresenting them as “loans” from FTX or its affiliates.
Prosecutors also claim that Salame assisted Bankman-Fried in avoiding regulatory scrutiny by operating an unlicensed money transmission company that moved money between FTX and its customers. Salame confessed to two includes in Manhattan before U.S. Region Judge Lorna G. Schofield. He consented to help out the public authority's examination and pay $10 million in badly gotten gains.
With a bail of $1 million, Salame was let go.
support author on : https://en.bitcoinsistemi.com/author/mete/