-
@ 826e9f89:ffc5c759
2024-06-28 21:46:01_Prologue: this is a prose adaptation of a talk I gave to a private audience in Dubai and then tweaked slightly for a small conference in Sofia. I'm increasingly thinking it deserves a more general audience, and may be better suited to text anyway. This is probably not its final form, as the desired audience is tradfi capital allocators, hence a PDF is likely on the cards in the near future. For the time being, consider this a first draft, practising what it might look like as prose, and soliciting feedback from the good people of Nostr. Enjoy! _
The title of this essay means absolutely nothing. There is no such thing as “Web π” because there is no such thing as “Web 3”. It’s bullshit. It’s a scam.
Unfortunately, it has turned out to be extremely powerful bullshit and an extremely profitable scam, and so my goal in writing this essay is to give the reader the tools to navigate all of this and come out the other side without having been scammed or bullshat. In the spirit of not scamming and not bullshitting, I should be clear upfront about the intended readership of this essay, who I am to write it, and who it’s really about.
Who Are You?
I assume the reader is not a shadowy super-coder, but rather is a financial professional. This essay isn’t really for Bitcoiners, although if any read it, I hope they still find it interesting. Who I am really writing for are people coming to the space for the first time. Hopefully in your mind you are coming to the _Bitcoin _space, but if you think you are coming to the “crypto” space then this may be even more useful.
Who Am I?
I am the founder of a company that makes me not only highly biased but also flagrantly self-interested in the content I am promoting. I run a firm that invests in the Bitcoin ecosystem through a variety of different vehicles. I am not going to mislead you in the slightest in that my primary motivation is for you to allocate capital to us rather than to people I would call scammers and bullshitters. You should listen to them too and make up your own mind, or else what’s the point, really? How do you know I’m not scamming or bullshitting you? Exactly. Don’t trust. Verify.
In any case, that’s all assuming you want to “allocate capital” at all rather than just buy Bitcoin without a management fee. I’d like to think the primary difference is that I will be honest about that, and I’ll encourage you to understand as much as you can about what is going on and what you are doing (and if you are at all unsure, I would suggest you aren’t ready and you should just buy Bitcoin and learn) rather than bamboozle you with complete nonsense like “Web 3”.
Who Is This About?
It’s not at all about people working in crypto. Bitcoiners amongst the readership may be mildly irritated by me going on to give about as charitable an explanation of the role of these people as they have probably ever heard from somebody like me. This is really about financiers. It’s about the people who have used the mostly unrewarded efforts of developers, academics, entrepreneurs, and so on to siphon money from you to themselves, leaving a trail of useless tech and defrauded retail investors in their wake – and who will continue to do so if you continue to empower them.
Why This Essay?
We are at an interesting point in the development of the entirety of the “crypto” industry and I strongly suggest that people like you are going to be pitched all kinds of scams and bullshit in the coming months and years. If you have a little more background on what these people are really talking about, you will hopefully be able to avoid it.
My plan to help with that is presenting a short version and a long version of what blockchains are and are for, how they have historically been deployed in service of scams and bullshit, a high-level theory explaining the narrative evolution behind this sorry history, and a prediction for the near-term future of such shenanigans.
What is a Blockchain For?
A Blockchain is for sound, censorship-resistant, peer-to-peer digital money. It is not for anything else. If a blockchain is functional as money, it may be possible to also _use it _for other things. Some people find that interesting, some people find it infuriating, but don’t let that subtlety confuse you. It is not _for _arbitrary computation and storage or “decentralizing the internet” or running illegal securities rackets.
It is for money, plain and simple.
How does it achieve that? Proof of work and the difficulty adjustment. These are the innovations from which every other desirable property or feature flows. Proof of work enables censorship resistance. If somebody is trying to sell you on “proof of stake”: bullshit. The difficulty adjustment enables precise, predetermined, and _fair _issuance. If somebody is trying to sell you on a token they issue for free and without restriction: scam.
The problem Bitcoin solves is both economic and technical and the solution has material technical and economic merit. And it’s for this very specific and irreplicable reason the Bitcoin token has value. If this all sounds extreme to you, then I would suggest that your understanding of the topic is _extremely _misguided, that you are going to be _extremely bullshat and extremely scammed, _and you need to read this essay. That’s the short version.
The Long Version
I am sensitive to how extreme this all sounds. After all, hundreds of billions of dollars have been pumped into crypto, not Bitcoin – a huge amount of it is widely used, and many capable, honest, and brilliant people work in the industry. The reader will recall just above I said those people are not the target of my criticism. I’m not claiming they are all scammers and bullshitters. Sadly, I think it’s more likely they have been scammed and bullshat to some degree also.
I think I have some credibility in pointing this out because, as a VC in the Bitcoin space, I have increasingly seen founders telling me this themselves: that they originally bought into the hype in crypto and ended up wasting an enormous amount of time realizing their idea made no technical or economic sense in that context, so then they came to Bitcoin instead. You hear this one time and it’s an anecdote, but you hear it as many times as I have and it feels more like a representative sample.
What I want to cover next is as charitable a summary of the state of ex-Bitcoin crypto as I possibly can: my contention is that crypto has evolved into 4 rough categories: stablecoins, cryptography R&D, gambling, and scams. And these aren’t exclusive, to be clear; there is a lot of overlap, and, in fact, the overlap is arguably the key.
Scams
Scams are tokens, plain and simple. If somebody is trying to profit from the speculative price action of a token they have issued, they are scamming somebody. Maybe they are scamming you, maybe they are scamming retail investors, maybe they are scamming customers or suppliers – if such parties even exist in their cargo cult “business model”. There’s a scam in there somewhere.
However, it is rarely _just _a scam. There will almost always be components of stablecoins, R&D or gambling too. Hence these are worth really grappling with, taking seriously, giving credit to the extent it is due, but also analyzing critically.
My rough and high-level assessment of this breakdown of crypto is as follows, and I’ll explain what I mean by this below: stablecoins have economic merit but dubious technical merit; R&D has technical merit but no economic merit; and gambling sort of has merit but it depends how you interpret it. Obviously, scams have neither.
Stablecoins
By “sort of technical merit” I mean that stablecoins have central issuers. You can issue them as tokens on a blockchain but there’s not really much of a point. The issuer could just run a database connected to the internet with some straightforward signature schemes for transfers and it would make minimal operational difference. In fact, it would be cheaper and faster. _In fact, _you may as well run a Chaumian eCash mint (a decades-old innovation recently resurrected firmly within the _Bitcoin _space) such that your cheaper-and-faster-than-a-blockchain database also grants users transience and privacy rather than the public permanence of a blockchain.
The fact Tron is the most heavily used for stablecoins, in terms of settling the most value, is a testament to this point: it is barely even pretending not to be a database. This works as regulatory arbitrage given regulators think this is “innovation” because they are stupid.
That said, it is worth giving some credit here given the abject awfulness of fiat banking and payment rails with which stablecoins arguably most directly compete. Stablecoins are significantly more permissionless in their transfer than any fiat bank liability. And to attest to what seems like their most significant use case, they are permissionless in their _usership _in that only an internet connection and the right software is required rather than various discriminatory jurisdictional and compliance criteria.
However, what “sort of technical merit” ultimately boils down to, especially in comparison to Bitcoin, is: highly censorable in their exogenous links and, therefore, their value. The assets supposedly backing stablecoins are (by definition) still within the fiat system, even if this novel transfer mechanism of the rights to withdraw them is not. There is frankly a bit of theatre involved in the so-called “decentralization” of stablecoins given shutting down the central issuer is all that is required to make the permissionlessly tradeable decentralized tokens go to zero and be technically unimpeded but functionally useless. The technical innovation of Bitcoin, in contrast, is easily understood in one sense as it being totally indifferent to this kind of attack.
On the other hand, by “economic merit” I mean that they are extremely widely used and valued as a means of providing dollar shadow banking and often superior payment rails. Those in crypto often love pointing to this and many Bitcoiners tie themselves in knots trying to explain it away, whereas I see it as essentially unrelated to Bitcoin. Clearly there is a superficial connection, but you could create any superficial connection by “tokenizing” things for no particularly good technical _reason. I think it’s a different industry entirely. It’s more like a subindustry within _fintech – part banking, part payments – that for the time being relies on bamboozling regulators with all the nonsense I’m drawing attention to.
And good for them, frankly. If fiat banking isn’t going to be backed by real money anyway, then it _at least _ought to be permissionless. It should really be Chaumian eCash if it isn’t just Bitcoin, and it is regulation alone that makes it so awful in the first place. Making money usable and not a tool of dystopian control is, at this point, a political problem, not a technical one. Stablecoins are frankly a step in the right direction, especially insofar as they acclimatize users to digital assets. But I would still caution that they arguably don’t have sufficient technical merit to withstand what feels like an inevitable political attack …
Cryptography R&D
“Technical merit” for R&D is more or less self-explanatory, but the context is worth appreciating. It’s only really in crypto and mostly in Ethereum more specifically that people can permissionlessly experiment with arbitrarily complex cryptographic schemes that operate on real, enormous value. There are a lot of people who understandably find this attractive given their projects are essentially academic and trying out their ideas in the wild is more interesting, arguably more worthwhile, and certainly more fun than putting research essays on ArXiv or submitting them to a journal.
But … the value being manipulated is at best stablecoins and at worst baseless hype. If it isn’t a stablecoin then it probably exists in the first place because of either gambling or scams – and even there the line is very blurry.
Gambling
Gambling is an interesting lens to adopt on all this because it’s literally a trillion-dollar industry. And it’s real. It’s consensual; it’s not criminal; it’s legitimate economic activity that generates enormous profits for those who facilitate it well.
So, gambling has economic merit in that sense. But it’s tricky in this context how to characterize it because you could also argue it’s deeply dishonest gambling in that the gamblers don’t realize they are playing a negative sum game against the house. They think they are doing something akin to speculating on securities, which may be just as stupid depending on how it’s done, but at least has real economic utility and contributes to capital formation.
The difference here is that what is being speculated on _has no economic merit. _So, if that’s your gauge of merit, then here there is none. And it’s a very blurry line between this and an outright scam. Maybe the people involved _think _of what they are doing as amazing R&D, and maybe it’s inadvertently just a scam; maybe they know it’s all nonsense, but they think they can profit within the negative sum game because there are greater fools. In any case, I think gambling is a very helpful characterization of a lot of the behavior of the users and the real economic function of the industry.
There’s an interesting social component to all this because crypto people will often get mad at Bitcoiners because Bitcoiners tend not to care about either stablecoins or crypto R&D: they’ll say, why don’t you like stablecoins, they have clear economic merit? And the answer is they have dubious technical merit. Or, why don’t you like our next-gen Zero Knowledge scaling protocol, it has clear technical merit? And the answer is it has no economic merit.
If you’re happy with one but not the other, it’s easy to think of Bitcoiners as being closed-minded or dogmatic or whatever, but, ultimately, I think it’s just about discipline. What’s the point in being excited by something that half works, and that you know why will never fully work? So to be frank, a lot of this may be well-intentioned, but it’s kinda’ bullshit. It very probably ultimately rests on gambling and not at all whatever its stated purpose is … or it’s just a scam.
How Did We Get Here?
The following is by no means exhaustive and the framing is deliberately a little tongue-in-cheek. As well as being accurate enough (if unavoidably biased), my goal here is primarily to set up my prediction for what is coming next.
2015 reality: Ethereum launches narrative: “the world computer”
In 2015, Ethereum launched. The narrative here was that we are building “the world computer” and we can now have decentralized uncensorable computation. Never mind that anybody with a laptop has an uncensorable and decentralized computing device. And keep in mind this question of, “_what data might it ever be relevant to compute over in this manner (whatever that means in the first place)?” _The answer will become clearer and clearer …
2016-17 reality: ICO bubble narrative: “Web 3” / “DApps”
Regardless, at the end of 2015 we get the proposal and adoption of ERC20: a standard for issuing fungible tokens within Ethereum contracts, which is why in 2016 _but especially in 2017 _we get the ICO bubble. The narrative changes. Now we are concerned with “Web 2” companies being huge, powerful, and centralized. What if, instead, users could cooperatively own the application, control their own data, and participate in the economic upside that their usage is creating?
2018-19 reality: crypto winter narrative: “mistakes were made”
In 2018 this all falls apart, so don’t worry about it, moving on …
2020-21 reality: defi summer narrative: “decentralized finance”
By 2020 the narrative was different once again. It is more or less realized by this point that utility tokens make no technical or economic sense. You can’t introduce artificial scarcity in capital goods where there should be abundance and deflation and expect anybody to care, never mind to value your concoction. On the other hand, “securities” ought to be scarce and in some sense ought to function as tradeable ledger entries. Maybe they could be tokenized and computed on in a censorship-resistant and decentralized manner?
So, we get a boom in “defi” which, for what it’s worth, fellow Axiom co-founder Anders Larson and I predicted in our essay Only The Strong Survive, in September 2021, would be a complete disaster because, amongst a myriad of other illiterate insanities, there was approximately zero grounding of these securities in productive capital. The ecosystem was entirely self-referential – grounded _not even _in the questionable economic merit of stablecoins but firmly in gambling and scams; in leverage, rehypothecation, and securitization of precisely nothing whatsoever productive.
2022 reality: shitcoinpocalypse narrative: “mistakes were made”
And we were absolutely right because in 2022 everything collapsed. First Terra/Luna imploded – a “defi” project which essentially presented to the world the argument that a fractional reserve bank issuing fiduciary media can literally never go bankrupt because it can always cover a deposit shortfall by issuing more equity. While briefly flirting with a capitalization of around fifty f***ing billion dollars, and endorsed and fawned over by all manner of illiterate charlatans with gigantic and unsuspecting audiences, this argument was eventually rejected by the market as utterly imbecilic, as analyzed by myself and Nic Carter in All Falls Down.
This triggered a credit contagion that soon after took down 3 Arrows Capital, Celsius, Voyager, BlockFi, and others. FTX limped along by what we now understand to be something like defrauding their way out of debt, but eventually also collapsed later that year. If _Only The Strong Survive _was a pre-mortem of all of this, then the reader may want to read Green Eggs And Ham, also by myself and Anders Larson, as a kind of post-mortem.
2023-today reality: Bitcoin multisigs narrative: “Bitcoin renaissance”
And now a lot of this stuff is moving to Bitcoin. It is outside the scope of this essay to explain this in much detail but there have been a handful of developments in Bitcoin recently which, regardless of their intended purpose, seem to have as a collective side effect that a lot of these same shenanigans can now be implemented (or can _pretend _to be implemented) in a more Bitcoin-native context.
So, the new narrative is something like:
“these things didn’t work, not because they are terrible ideas that collapse to moon math wrappers around gambling and scams under any remotely critical analysis, but rather because they weren’t on Bitcoin. But also, since it has only recently become possible to (at least pretend to) implement them on Bitcoin, they are now worthwhile. We have wandered in the wilderness but learned our lessons and found the promised land.”
Technical and Economic Merit
Let’s consider all this through the lens of technical and economic merit once again. Or rather, the alleged merit given the stated goal. Ignore for now whether there is any merit:
2015 technical goal: new computing paradigm economic goal: x% of GDP?
The original idea of “crypto” allegedly has the merit of the next revolution in computing. Goodness knows how big that market is; probably a decent chunk of global GDP – if it meant anything, which it doesn’t.
2016-17 technical goal: disrupting company formation economic goal: y% of S&P?
ICOs then become a little bit more specific. Now they are merely disrupting how we organize companies. What’s that worth? Some portion of the value of the companies that can now be decentralized and tokenized I guess? Who knows …
2018-19 nothing to see here
Nothing happened then, don’t worry about it.
2020-21 technical goal: decentralize finance economic goal: z% of NYSE, CME, ISDA?
Defi becomes more specific again. Now we are merely tokenizing financial contracts, expanding access, removing middlemen, and so on. So that should probably be worth some percentage of capital markets activity?
2022 nothing to see here
Oops, never mind …
2023-today technical goal: now it’s on Bitcoin! economic goal: i% of … Bitcoin?
… and now it’s on Bitcoin apparently.
In Hindsight ...
I think the most amusing analysis of all this is as follows: it starts off completely insane, it gets more and more restrained each time – you could cheekily argue it starts to make more and more sense – but it also gets closer to Bitcoin every time. It’s clearly narrowing in on just: Bitcoin.
This is people realizing, painfully, over decades, what blockchains are for! They are not for “decentralizing everything” They are for censorship-resistant, sound, peer-to-peer digital money.
And I think this is _also _why we get the current state of crypto from earlier in the essay. As it starts to make more and more sense (by getting closer and closer to Bitcoin) you have realizations like the following: digital gift vouchers for artificially scarce and extremely expensive computation aren’t money, so we need “real money” in here for it to have economic merit, so you get stablecoins. Also, well we have a rich programming environment that seems technically interesting but also the severe technical handicap of being unable to do even a billionth of a billionth of a billionth of all the computations in the world, so you get crypto R&D. These emerge as a kind of patch, and they have _some _merit in isolation, whereas the long-term trajectory is actually just to converge on Bitcoin.
It’s an open and fascinating question if there are any learnings from these that can still be transplanted to Bitcoin. For stablecoins, this strikes me as less clear, given the dubious technical merit is introduced by using a blockchain at all, not just a blockchain other than Bitcoin. However, efforts to create Bitcoin balances (tokenized or otherwise) that are stable relative to some external price are to be applauded, if still heavily scrutinized for what technical merit they _really _have.
It seems far more likely that crypto R&D will prove useful in a Bitcoin context to some or other degree, and in this case the economic merit is in fact solved by moving to Bitcoin, provided the necessary technical merit can be mimicked. At the time of writing, this is a source of both hope and dread: hope given the possibility of viable avenues of development (although still highly uncertain); dread given how early steps in this direction are already being misrepresented in the pursuit of bullshit and scams. I will return to both shortly.
Narrative Evolution
Back to the table just above, I want to make three quick observations that tie together my entire argument and get us to the end of the essay:
Firstly, the bubbles always follow the price of Bitcoin. Hopefully I don’t need to include a price chart for the reader to grasp this immediately.
Secondly, it’s important that the narrative always changes. Absolutely ungodly amounts of money were raised for this crap following the_ Bitcoin bull runs of 2017 and 2021. The people doing this couldn’t point to the previous absolute disaster, so they had to spin something along the lines of: “_we learned our lessons and we’ve refined the use case.” This should sound familiar from just above.
Thirdly, however, regardless of whatever refinement they’ve come up with, the consequence of the new “narrative” is always, “buy my token”.
Always.
It doesn’t matter what buzzword salad is in the middle. It’s always “Bitcoin is cool, xyz, fughayzi fughahzi, buy my token.”
This is why I am very much tempted to not care so much about developers, academics, entrepreneurs, and so on, and in fact for my null hypothesis to be that they are more likely to have been victims than perpetrators. I don’t think they even end up in a position to contribute without the key group whom I do blame. When you put all these pieces together, what I think falls out of this analysis is as follows:
The entire cycle of shitcoinery can be traced to unscrupulous financiers convincing capital allocators who don’t know any better, in a bull market that, yes, Bitcoin is cool, but what they are doing is related, cooler, and that they deserve a fee.
Let us label this the Capital Cycle Theory of Shitcoinery. I think that everything else about which one might want to complain is downstream of this core realization.
Avoiding It
Given everything I’ve covered this is simple and this is pretty much the end of the essay.
You need to be aware of why this is happening now. If it hasn’t happened to you already (intended readership in the capital allocation business, that is) I guarantee it’s about to: with ETFs and the halving just past, we seem to be starting a Bitcoin bull run, these people have already raised ridiculous amounts of money on scams and bullshit that have mostly imploded. They may have lost a lot of money, or they may even have dumped on retail and got an excellent “return”. But in any case, they need a new narrative.
It's _possible _they have a viable narrative around stablecoins, R&D, both, and that they are as wary of scams as I have suggested here that they should be. I don’t want to insult anybody who merely has a different investment thesis to me if they are otherwise reasonable in their outlook and honest in their dealings.
However, if they are only now realizing how pointless and disingenuous every preceding crypto narrative has been after 7 years and hundreds of billions of dollars – or if they still don’t realize it at all; if their track record shows they were deeply involved, handsomely rewarded, and yet created nothing of lasting value; if they say things like “the builders are coming back to Bitcoin”: be very, very suspicious. Be on the lookout for tokens, which is to say, be on the lookout for scams.
What is especially frustrating is that the technical spin of the "layer twos" that are all the rage at the time of writing, that "the builders are coming back to Bitcoin" to build, and that you, the capital-allocating reader, will almost certainly be pitched, is in and of itself pretty reasonable. They just don't require tokens and they don't require gambling to support the token prices. What they do require is _sound adherence to Bitcoin's technical and economic merit. _At the very least, they require honest communication about the design trade-offs so far and planned for, and what, if any, economic and technical merit is left over after these trade-offs have been made.
Narrative aside, the _reality _of 99% of these projects is that they are private execution environments tied to multisigs custodying user deposits. Which is to say, on the one hand, that they are cargo culting "crypto R&D" from Ethereum that isn't technically possible in Bitcoin in order to feign technical merit, and on the other, that _they aren't layer twos at all. _Once again, they may as well be Chaumian eCash mints, except for the fact that this would make the intended token scam all but impossible to pull off.
Casey Rodarmor, creator of the Ordinals protocol, recently joked on the Hell Money _podcast he co-hosts, responding to the idea that "_everybody is building an L2 now":
"It's the same sad sack playbook as on Ethereum being recapitulated on Bitcoin. That's how you get a VC check on Ethereum. They are all glorified multisigs, so they are like, "hey let's port our glorified multisig to Bitcoin and get a VC check." I was talking to a friend of mine who is working on an interesting project, an open-source analyzer that does transaction clustering, and I was like, "maybe you could do this in this way and raise some VC money," and he said, "yeah, okay, but what's the point in raising VC money?" And I said, "no, no, no, this is the end! This is the goal! You raise VC money and then you cut yourself checks from that VC money until it runs out and then you raise more at a 10x valuation. This is the new economy, guys!"
The 1% that are legitimately trying to bring the learnings from crypto R&D to Bitcoin in a technically and economically sound manner will hopefully win in the long run (and even this is somewhat speculative at the time of writing) but will likely get little to no attention amidst this bull market flurry of scams and bullshit.
Axiom will do its best to source and invest in these companies (we already have!) but we are resigned to it being a much more difficult sell to capital allocators in light of the Capital Cycle Theory of Shitcoinery. To be brutally honest, this entire essay can fairly be considered cope on my part in light of having lost this battle in the past and facing up to the very real prospect of losing it in the near future too. Oh well, at least I tried.
Wrapping Up
The essence of the Capital Cycle Theory of Shitcoinery is that the problems I’ve described ultimately come from bamboozling people just like you with technical sounding nonsense like “Web 3” so you think it’s all a lot more complicated than it really is. Just buy Bitcoin. That’s certainly the first thing you should do anyway, and it might be the only thing you ever need to do.
If you really, really want to take the extra risk of investing in the Bitcoin ecosystem, the team at Axiom would be happy to speak with you. But we are never going to talk you out of buying Bitcoin. There is no world in which Bitcoin does poorly and we do well, or in which we promise something “better than Bitcoin,” and there’s no point in engaging with us at all if you don’t already believe most of this.
If that’s of interest to you, we’d love to talk. If not, just buy Bitcoin. In any case: fair warning, we are heading into a Bitcoin bull market and the scams and the bullshit are coming. Good luck avoiding them.
Allen Farrington, June 2024
-
@ 4523be58:ba1facd0
2024-05-28 11:05:17NIP-116
Event paths
Description
Event kind
30079
denotes an event defined by its event path rather than its event kind.The event directory path is included in the event path, specified in the event's
d
tag. For example, an event path might beuser/profile/name
, whereuser/profile
is the directory path.Relays should parse the event directory from the event path
d
tag and index the event by it. Relays should support "directory listing" of kind30079
events using the#f
filter, such as{"#f": ["user/profile"]}
.For backward compatibility, the event directory should also be saved in the event's
f
tag (for "folder"), which is already indexed by some relay implementations, and can be queried using the#f
filter.Event content should be a JSON-encoded value. An empty object
{}
signifies that the entry at the event path is itself a directory. For example, when savinguser/profile/name
:Bob
, you should also saveuser/profile
:{}
so the subdirectory can be listed underuser
.In directory names, slashes should be escaped with a double slash.
Example
Event
json { "tags": [ ["d", "user/profile/name"], ["f", "user/profile"] ], "content": "\"Bob\"", "kind": 30079, ... }
Query
json { "#f": ["user/profile"], "authors": ["[pubkey]"] }
Motivation
To make Nostr an "everything app," we need a sustainable way to support new kinds of applications. Browsing Nostr data by human-readable nested directories and paths rather than obscure event kind numbers makes the data more manageable.
Numeric event kinds are not sustainable for the infinite number of potential applications. With numeric event kinds, developers need to find an unused number for each new application and announce it somewhere, which is cumbersome and not scalable.
Directories can also replace monolithic list events like follow lists or profile details. You can update a single directory entry such as
user/profile/name
orgroups/follows/[pubkey]
without causing an overwrite of the whole profile or follow list when your client is out-of-sync with the most recent list version, as often happens on Nostr.Using
d
-tagged replaceable events for reactions, such as{tags: [["d", "reactions/[eventId]"]], content: "\"👍\"", kind: 30079, ...}
would make un-reacting trivial: just publish a new event with the samed
tag and an empty content. Toggling a reaction on and off would not cause a flurry of new reaction & delete events that all need to be persisted.Implementations
- Relays that support tag-replaceable events and indexing by arbitrary tags (in this case
f
) already support this feature. - IrisDB client side library: treelike data structure with subscribable nodes.
https://github.com/nostr-protocol/nips/pull/1266
- Relays that support tag-replaceable events and indexing by arbitrary tags (in this case
-
@ b60c3e76:c9d0f46e
2024-05-15 10:08:47KRIS menjamin semua golongan masyarakat mendapatkan perlakuan sama dari rumah sakit, baik pelayanan medis maupun nonmedis.
Demi memberikan peningkatan kualitas layanan kesehatan kepada masyarakat, pemerintah baru saja mengeluarkan Peraturan Presiden (Perpres) nomor 59 tahun 2024 tentang Jaminan Kesehatan. Melalui perpres itu, Presiden Joko Widodo (Jokowi) telah menghapus perbedaan kelas layanan 1, 2, dan 3 dalam Badan Penyelenggara Jaminan Sosial atau BPJS Kesehatan.
Layanan berbasis kelas itu diganti dengan KRIS (Kelas Rawat Inap Standar). Berkaitan dengan lahirnya Perpres 59/2024 tentang Perubahan Ketiga atas Perpres 82/2018 tentang Jaminan Kesehatan, Presiden Joko Widodo telah memerintahkan seluruh rumah sakit yang bekerja sama dengan BPJS Kesehatan melaksanakannya.
Kebijakan baru itu mulai berlaku per 8 Mei 2024 dan paling lambat 30 Juni 2025. Dalam jangka waktu tersebut, rumah sakit dapat menyelenggarakan sebagian atau seluruh pelayanan rawat inap berdasarkan KRIS sesuai dengan kemampuan rumah sakit.
Lantas apa yang menjadi pembeda dari sisi layanan dengan layanan rawat inap sesuai Perpres 59/2024? Dahulu sistem layanan rawat BPJS Kesehatan dibagi berdasarkan kelas yang dibagi masing-masing kelas 1, 2, dan 3. Namun, melalui perpres, layanan kepada masyarakat tidak dibedakan lagi.
Pelayanan rawat inap yang diatur dalam perpres itu--dikenal dengan nama KRIS—menjadi sistem baru yang digunakan dalam pelayanan rawat inap BPJS Kesehatan di rumah sakit-rumah sakit. Dengan KRIS, semua golongan masyarakat akan mendapatkan perlakuan yang sama dari rumah sakit, baik dalam hal pelayanan medis maupun nonmedis.
Dengan lahirnya Perpres 59/2024, tarif iuran BPJS Kesehatan pun juga akan berubah. Hanya saja, dalam Perpres itu belum dicantumkan secara rinci ihwal besar iuran yang baru. Besaran iuran baru BPJS Kesehatan itu sesuai rencana baru ditetapkan pada 1 Juli 2025.
“Penetapan manfaat, tarif, dan iuran sebagaimana dimaksud ditetapkan paling lambat tanggal 1 Juli 2025,” tulis aturan tersebut, dikutip Senin (13/5/2024).
Itu artinya, iuran BPJS Kesehatan saat ini masih sama seperti sebelumnya, yakni sesuai dengan kelas yang dipilih. Namun perpres itu tetap berlaku sembari menanti lahirnya peraturan lanjutan dari perpres tersebut.
Kesiapan Rumah Sakit
Berkaitan dengan lahirnya kebijakan layanan kesehatan tanpa dibedakan kelas lagi, Kementerian Kesehatan (Kemenkes) menegaskan mayoritas rumah sakit di Indonesia siap untuk menjalankan layanan KRIS untuk pasien BPJS Kesehatan.
Kesiapan itu diungkapkan oleh Dirjen Pelayanan Kesehatan Kemenkes Azhar Jaya. “Survei kesiapan RS terkait KRIS sudah dilakukan pada 2.988 rumah sakit dan yang sudah siap menjawab isian 12 kriteria ada sebanyak 2.233 rumah sakit,” ujar Azhar.
Sebagai informasi, KRIS adalah pengganti layanan Kelas 1, 2, dan 3 BPJS Kesehatan yang bertujuan untuk memberikan layanan kesehatan secara merata tanpa melihat besaran iurannya.
Melalui KRIS, rumah sakit perlu menyiapkan sarana dan prasarana sesuai dengan 12 kriteria kelas rawat inap standar secara bertahap. Apa saja ke-12 kriteria KRIS itu?
Sesuai bunyi Pasal 46A Perpres 59/2024, disyaratkan kriteria fasilitas perawatan dan pelayanan rawat inap KRIS meliputi komponen bangunan yang digunakan tidak boleh memiliki tingkat porositas yang tinggi serta terdapat ventilasi udara dan kelengkapan tidur.
Demikian pula soal pencahayaan ruangan. Perpres itu juga mengatur pencahayaan ruangan buatan mengikuti kriteria standar 250 lux untuk penerangan dan 50 lux untuk pencahayaan tidur, temperature ruangan 20--26 derajat celcius.
Tidak hanya itu, layanan rawat inap berdasarkan perpres itu mensyaratkan fasilitas layanan yang membagi ruang rawat berdasarkan jenis kelamin pasien, anak atau dewasa, serta penyakit infeksi atau noninfeksi.
Selain itu, kriteria lainnya adalah keharusan bagi penyedia layanan untuk mempertimbangkan kepadatan ruang rawat dan kualitas tempat tidur, penyediaan tirai atau partisi antartempat tidur, kamar mandi dalam ruangan rawat inap yang memenuhi standar aksesibilitas, dan menyediakan outlet oksigen.
Selain itu, kelengkapan tempat tidur berupa adanya dua kotak kontak dan nurse call pada setiap tempat tidur dan adanya nakas per tempat tidur. Kepadatan ruang rawat inap maksimal empat tempat tidur dengan jarak antara tepi tempat tidur minimal 1,5 meter.
Tirai/partisi dengan rel dibenamkan menempel di plafon atau menggantung. Kamar mandi dalam ruang rawat inap serta kamar mandi sesuai dengan standar aksesibilitas dan outlet oksigen.
Azhar menjamin, Kemenkes akan menjalankan hal tersebut sesuai dengan tupoksi yang ada. “Tentu saja kami akan bekerja sama dengan BPJS Kesehatan dalam implementasi dan pengawasannya di lapangan,” ujar Azhar.
Berkaitan dengan perpres jaminan kesehatan itu, Direktur Utama BPJS Kesehatan Ghufron Mukti menilai, perpres tersebut berorientasi pada penyeragaman kelas rawat inap yang mengacu pada 12 kriteria. "Bahwa perawatan ada kelas rawat inap standar dengan 12 kriteria, untuk peserta BPJS, maka sebagaimana sumpah dokter tidak boleh dibedakan pemberian pelayan medis atas dasar suku, agama, status sosial atau beda iurannya," ujarnya.
Jika ada peserta ingin dirawat pada kelas yang lebih tinggi, kata Ghufron, maka diperbolehkan selama hal itu dipengaruhi situasi nonmedis. Hal itu disebutkan dalam Pasal 51 Perpres Jaminan Kesehatan diatur ketentuan naik kelas perawatan.
Menurut pasal tersebut, naik kelas perawatan dilakukan dengan cara mengikuti asuransi kesehatan tambahan atau membayar selisih antara biaya yang dijamin oleh BPJS Kesehatan dengan biaya yang harus dibayar akibat peningkatan pelayanan.
Selisih antara biaya yang dijamin oleh BPJS Kesehatan dengan biaya pelayanan dapat dibayar oleh peserta bersangkutan, pemberi kerja, atau asuransi kesehatan tambahan.
Ghufron Mukti juga mengimbau pengelola rumah sakit tidak mengurangi jumlah tempat tidur perawatan pasien dalam upaya memenuhi kriteria KRIS. "Pesan saya jangan dikurangi akses dengan mengurangi jumlah tempat tidur. Pertahankan jumlah tempat tidur dan penuhi persyaratannya dengan 12 kriteria tersebut," tegas Ghufron.
Penulis: Firman Hidranto Redaktur: Ratna Nuraini/Elvira Inda Sari Sumber: Indonesia.go.id
-
@ 266815e0:6cd408a5
2024-05-09 17:23:28Lot of people are starting to talk about building a web-of-trust and how nostr can or is already being used as such
We all know about using the kind:3 following lists as a simple WoT that can be used to filter out spam. but as we all know it does not really signal "trust", its mostly just "I find your content interesting"
But what about real "trust"... well its kind of multi-denominational, I could trust that your a good developer or a good journalist but still not trust you enough to invite you over to my house. There are some interesting and clever solutions proposed for quantifying "trust" in a digital sense but I'm not going to get into that here. I want to talk about something that I have not see anyone discuss yet.
How is the web-of-trust maintained? or more precisely how do you expect users to update the digital representation of the "trust" of other users?
Its all well and good to think of how a user would create that "trust" of another user when discovering them for the first time. They would click the "follow" button, or maybe even rate them on a few topics with a 1/5 star system But how will a user remove that trust? how will they update it if things change and they trust them less?
If our goal is to model "trust" in a digital sense then we NEED a way for the data to stay up-to-date and as accurate as possible. otherwise whats the use? If we don't have a friction-less way to update or remove the digital representation of "trust" then we will end up with a WoT that continuously grows and everyone is rated 10/10
In the case of nostr kind:3 following lists. its pretty easy to see how these would get updated. If someone posts something I dislike or I notice I'm getting board of their content. then I just unfollow them. An important part here is that I'm not thinking "I should update my trust score of this user" but instead "I'm no longer interested, I don't want to see this anymore"
But that is probably the easiest "trust" to update. because most of us on social media spend some time curating our feed and we are used to doing it. But what about the more obscure "trust" scores? whats the regular mechanism by which a user would update the "honestly" score of another user?
In the real world its easy, when I stop trusting someone I simply stop associating with them. there isn't any button or switch I need to update. I simply don't talk to them anymore, its friction-less But in the digital realm I would have to remove or update that trust. in other words its an action I need to take instead of an action I'm not doing. and actions take energy.
So how do we reflect something in the digital world that takes no-energy and is almost subconscious in the real world?
TLDR; webs-of-trust are not just about scoring other users once. you must keep the score up-to-date
-
@ 266815e0:6cd408a5
2024-04-22 22:20:47While I was in Mediera with all the other awesome people at the first SEC cohort there where a lot of discussions around data storage on nostr and if it could be made censorship-resistent
I remember lots of discussions about torrents, hypercore, nostr relays, and of course IPFS
There were a few things I learned from all these conversations:
- All the existing solutions have one thing in common. A universal ID of some kind for files
- HTTP is still good. we don't have to throw the baby out with the bath water
- nostr could fix this... somehow
Some of the existing solutions work well for large files, and all of them are decentralization in some way. However none of them seem capable of serving up cat pictures for social media clients. they all have something missing...
An Identity system
An identity system would allow files to be "owned" by users. and once files have owners servers could start grouping files into a single thing instead of a 1000+ loose files
This can also greatly simplify the question of "what is spam" for a server hosting (or seeding) these files. since it could simply have a whitelist of owners (and maybe their friends)
What is blossom?
Blossom is a set of HTTP endpoints that allow nostr users to store and retrieve binary data on public servers using the sha256 hash as a universal id
What are Blobs?
blobs are chunks of binary data. they are similar to files but with one key difference, they don't have names
Instead blobs have a sha256 hash (like
b1674191a88ec5cdd733e4240a81803105dc412d6c6708d53ab94fc248f4f553
) as an IDThese IDs are universal since they can be computed from the file itself using the sha256 hashing algorithm ( you can get a files sha256 hash on linux using:
sha256sum bitcoin.pdf
)How do the servers work?
Blossom servers expose four endpoints to let clients and users upload and manage blobs
GET /<sha256>
(optional file.ext
)PUT /upload
Authentication
: Signed nostr event- Returns a blob descriptor
GET /list/<pubkey>
- Returns an array of blob descriptors
Authentication
(optional): Signed nostr eventDELETE /<sha256>
Authentication
: Signed nostr event
What is Blossom Drive?
Blossom Drive is a nostr app built on top of blossom servers and allows users to create and manage folders of blobs
What are Drives
Drives are just nostr events (kind
30563
) that store a map of blobs and what filename they should have along with some extra metadataAn example drive event would be
json { "pubkey": "266815e0c9210dfa324c6cba3573b14bee49da4209a9456f9484e5106cd408a5", "created_at": 1710773987, "content": "", "kind": 30563, "tags": [ [ "name", "Emojis" ], [ "description", "nostr emojis" ], [ "d", "emojis" ], [ "r", "https://cdn.hzrd149.com/" ], [ "x", "303f018e613f29e3e43264529903b7c8c84debbd475f89368cb293ec23938981", "/noStrudel.png", "15161", "image/png" ], [ "x", "a0e2b39975c8da1702374b3eed6f4c6c7333e6ae0008dadafe93bd34bfb2ca78", "/satellite.png", "6853", "image/png" ], [ "x", "e8f3fae0f4a43a88eae235a8b79794d72e8f14b0e103a0fed1e073d8fb53d51f", "/amethyst.png", "20487", "image/png" ], [ "x", "70bd5836807b916d79e9c4e67e8b07e3e3b53f4acbb95c7521b11039a3c975c6", "/nos.png", "36521", "image/png" ], [ "x", "0fc304630279e0c5ab2da9c2769e3a3178c47b8609b447a30916244e89abbc52", "/primal.png", "29343", "image/png" ], [ "x", "9a03824a73d4af192d893329bbc04cd3798542ee87af15051aaf9376b74b25d4", "/coracle.png", "18300", "image/png" ], [ "x", "accdc0cdc048f4719bb5e1da4ff4c6ffc1a4dbb7cf3afbd19b86940c01111568", "/iris.png", "24070", "image/png" ], [ "x", "2e740f2514d6188e350d95cf4756bbf455d2f95e6a09bc64e94f5031bc4bba8f", "/damus.png", "32758", "image/png" ], [ "x", "2e019f08da0c75fb9c40d81947e511c8f0554763bffb6d23a7b9b8c9e8c84abb", "/old emojis/astral.png", "29365", "image/png" ], [ "x", "d97f842f2511ce0491fe0de208c6135b762f494a48da59926ce15acfdb6ac17e", "/other/rabbit.png", "19803", "image/png" ], [ "x", "72cb99b689b4cfe1a9fb6937f779f3f9c65094bf0e6ac72a8f8261efa96653f5", "/blossom.png", "4393", "image/png" ] ] }
There is a lot going on but the main thing is the list of "x" tags and the path that describes the folder and filename the blob should live at
If your interested, the full event definition is at github.com/hzrd149/blossom-drive
Getting started
Like every good nostr client it takes a small instruction manual in order to use it properly. so here are the steps for getting started
1. Open the app
Open https://blossom.hzrd149.com
2. Login using extension
You can also login using any of the following methods using the input - NIP-46 with your https://nsec.app or https://flare.pub account - a NIP-46 connection string - an
ncryptsec
password protected private key - ansec
unprotected private key (please don't) - bunker:// URI from nsecbunker3. Add a blossom server
Right now
https://cdn.satellite.earth
is the only public server that is compatible with blossom drive. If you want to host your own I've written a basic implementation in TypeScript github.com/hzrd149/blossom-server4. Start uploading your files
NOTE: All files upload to blossom drive are public by default. DO NOT upload private files
5. Manage files
Encrypted drives
There is also the option to encrypt drives using NIP-49 password encryption. although its not tested at all so don't trust it, verify
Whats next?
I don't know, but Im excited to see what everyone else on nostr builds with this. I'm only one developer at the end of the day and I can't think of everything
also all the images in this article are stored in one of my blossom drives here
nostr:naddr1qvzqqqrhvvpzqfngzhsvjggdlgeycm96x4emzjlwf8dyyzdfg4hefp89zpkdgz99qq8xzun5d93kcefdd9kkzem9wvr46jka
-
@ f977c464:32fcbe00
2024-01-30 20:06:18Güneşin kaybolmasının üçüncü günü, saat öğlen on ikiyi yirmi geçiyordu. Trenin kalkmasına yaklaşık iki saat vardı. Hepimiz perondaydık. Valizlerimiz, kolilerimiz, renk renk ve biçimsiz çantalarımızla yan yana dizilmiş, kısa aralıklarla tepemizdeki devasa saati kontrol ediyorduk.
Ama ne kadar dik bakarsak bakalım zaman bir türlü istediğimiz hızla ilerlemiyordu. Herkes birkaç dakika sürmesi gereken alelade bir doğa olayına sıkışıp kalmış, karanlıktan sürünerek çıkmayı deniyordu.
Bekleme salonuna doğru döndüm. Nefesimden çıkan buharın arkasında, kalın taş duvarları ve camlarıyla morg kadar güvenli ve soğuk duruyordu. Cesetleri o yüzden bunun gibi yerlere taşımaya başlamışlardı. Demek insanların bütün iyiliği başkaları onları gördüğü içindi ki gündüzleri gecelerden daha karanlık olduğunda hemen birbirlerinin gırtlağına çökmüş, böğürlerinde delikler açmış, gözlerini oyup kafataslarını parçalamışlardı.
İstasyonun ışığı titrediğinde karanlığın enseme saplandığını hissettim. Eğer şimdi, böyle kalabalık bir yerde elektrik kesilse başımıza ne gelirdi?
İçerideki askerlerden biri bakışlarımı yakalayınca yeniden saate odaklanmış gibi yaptım. Sadece birkaç dakika geçmişti.
“Tarlalarım gitti. Böyle boyum kadar ayçiçeği doluydu. Ah, hepsi ölüp gidiyor. Afitap’ın çiçekleri de gi-”
“Dayı, Allah’ını seversen sus. Hepimizi yakacaksın şimdi.”
Karanlıkta durduğunda, görünmez olmayı istemeye başlıyordun. Kimse seni görmemeli, nefesini bile duymamalıydı. Kimsenin de ayağının altında dolaşmamalıydın; gelip kazayla sana çarpmamalılar, takılıp sendelememeliydiler. Yoksa aslında hedefi sen olmadığın bir öfke gürlemeye başlar, yaşadığın ilk şoku ve acıyı silerek üstünden geçerdi.
İlk konuşan, yaşlıca bir adam, kafasında kasketi, nasırlı ellerine hohluyordu. Gözleri ve burnu kızarmıştı. Güneşin kaybolması onun için kendi başına bir felaket değildi. Hayatına olan pratik yansımalarından korkuyordu olsa olsa. Bir anının kaybolması, bu yüzden çoktan kaybettiği birinin biraz daha eksilmesi. Hayatta kalmasını gerektiren sebepler azalırken, hayatta kalmasını sağlayacak kaynaklarını da kaybediyordu.
Onu susturan delikanlıysa atkısını bütün kafasına sarmış, sakalı ve yüzünün derinliklerine kaçmış gözleri dışında bedeninin bütün parçalarını gizlemeye çalışıyordu. İşte o, güneşin kaybolmasının tam olarak ne anlama geldiğini anlamamış olsa bile, dehşetini olduğu gibi hissedebilenlerdendi.
Güneşin onlardan alındıktan sonra kime verileceğini sormuyorlardı. En başta onlara verildiğinde de hiçbir soru sormamışlardı zaten.
İki saat ne zaman geçer?
Midemin üstünde, sağ tarafıma doğru keskin bir acı hissettim. Karaciğerim. Gözlerimi yumdum. Yanımda biri metal bir nesneyi yere bıraktı. Bir kafesti. İçerisindeki kartalın ıslak kokusu burnuma ulaşmadan önce bile biliyordum bunu.
“Yeniden mi?” diye sordu bana kartal. Kanatları kanlı. Zamanın her bir parçası tüylerinin üstüne çöreklenmişti. Gagası bir şey, tahminen et parçası geveliyor gibi hareket ediyordu. Eski anılar kolay unutulmazmış. Şu anda kafesinin kalın parmaklıklarının ardında olsa da bunun bir aldatmaca olduğunu bir tek ben biliyordum. Her an kanatlarını iki yana uzatıverebilir, hava bu hareketiyle dalgalanarak kafesi esneterek hepimizi içine alacak kadar genişleyebilir, parmaklıklar önce ayaklarımızın altına serilir gibi gözükebilir ama aslında hepimizin üstünde yükselerek tepemize çökebilirdi.
Aşağıya baktım. Tahtalarla zapt edilmiş, hiçbir yere gidemeyen ama her yere uzanan tren rayları. Atlayıp koşsam… Çantam çok ağırdı. Daha birkaç adım atamadan, kartal, suratını bedenime gömerdi.
“Bu sefer farklı,” diye yanıtladım onu. “Yeniden diyemezsin. Tekrarladığım bir şey değil bu. Hatta bir hata yapıyormuşum gibi tonlayamazsın da. Bu sefer, insanların hak etmediğini biliyorum.”
“O zaman daha vahim. Süzme salaksın demektir.”
“İnsanların hak etmemesi, insanlığın hak etmediği anlamına gelmez ki.”
Az önce göz göze geldiğim genççe ama çökük asker hâlâ bana bakıyordu. Bir kartalla konuştuğumu anlamamıştı şüphesiz. Yanımdakilerden biriyle konuştuğumu sanmış olmalıydı. Ama konuştuğum kişiye bakmıyordum ona göre. Çekingence kafamı eğmiştim. Bir kez daha göz göze geldiğimizde içerideki diğer iki askere bir şeyler söyledi, onlar dönüp beni süzerken dışarı çıktı.
Yanımızdaki, az önce konuşan iki adam da şaşkınlıkla bir bana bir kartala bakıyordu.
“Yalnız bu sefer kalbin de kırılacak, Prometheus,” dedi kartal, bana. “Belki son olur. Biliyorsun, bir sürü soruna neden oluyor bu yaptıkların.”
Beni koruyordu sözde. En çok kanıma dokunan buydu. Kasıklarımın üstüne oturmuş, kanlı suratının ardında gözleri parlarken attığı çığlık kulaklarımda titremeye devam ediyordu. Bu tabloda kimsenin kimseyi düşündüğü yoktu. Kartalın, yanımızdaki adamların, artık arkama kadar gelmiş olması gereken askerin, tren raylarının, geçmeyen saatlerin…
Arkamı döndüğümde, asker sahiden oradaydı. Zaten öyle olması gerekiyordu; görmüştüm bunu, biliyordum. Kehanetler… Bir şeyler söylüyordu ama ağzı oynarken sesi çıkmıyordu. Yavaşlamış, kendisini saatin akışına uydurmuştu. Havada donan tükürüğünden anlaşılıyordu, sinirliydi. Korktuğu için olduğunu biliyordum. Her seferinde korkmuşlardı. Beni unutmuş olmaları işlerini kolaylaştırmıyordu. Sadece yeni bir isim vermelerine neden oluyordu. Bu seferkiyle beni lanetleyecekleri kesinleşmişti.
Olması gerekenle olanların farklı olması ne kadar acınasıydı. Olması gerekenlerin doğasının kötücül olmasıysa bir yerde buna dayanıyordu.
“Salaksın,” dedi kartal bana. Zamanı aşan bir çığlık. Hepimizin önüne geçmişti ama kimseyi durduramıyordu.
Sonsuzluğa kaç tane iki saat sıkıştırabilirsiniz?
Ben bir tane bile sıkıştıramadım.
Çantama uzanıyordum. Asker de sırtındaki tüfeğini indiriyordu. Benim acelem yoktu, onunsa eli ayağı birbirine dolaşıyordu. Oysaki her şey tam olması gerektiği anda olacaktı. Kehanet başkasının parmaklarının ucundaydı.
Güneş, bir tüfeğin patlamasıyla yeryüzüne doğdu.
Rayların üzerine serilmiş göğsümün ortasından, bir çantanın içinden.
Not: Bu öykü ilk olarak 2021 yılında Esrarengiz Hikâyeler'de yayımlanmıştır.
-
@ 3bf0c63f:aefa459d
2024-01-14 13:55:28O Planetinha
Fumaça verde me entrando pelas narinas e um coro desafinado fazia uma base melódica.
nos confins da galáxia havia um planetinha isolado. Era um planeta feliz.
O homem vestido de mago começava a aparecer por detrás da fumaça verde.
O planetinha recebeu três presentes, mas o seu habitante, o homem, estava num estado de confusão tão grande que ameaçava estragá-los. Os homens já havia escravizado o primeiro presente, a vida; lutavam contra o segundo presente, a morte; e havia alguns que achavam que deviam destruir totalmente o terceiro, o amor, e com isto levar a desordem total ao pobre planetinha perdido, que se chamava Terra.
O coro desafinado entrou antes do "Terra" cantando várias vezes, como se imitasse um eco, "terra-terra-terraaa". Depois de uma pausa dramática, o homem vestido de mago voltou a falar.
Terra, nossa nave mãe.
Neste momento eu me afastei. À frente do palco onde o mago e seu coral faziam apelos à multidão havia vários estandes cobertos com a tradicional armação de quatro pernas e lona branca. Em todos os cantos da praça havia gente, gente dos mais variados tipos. Visitantes curiosos que se aproximavam atraídos pela fumaça verde e as barraquinhas, gente que aproveitava o movimento para vender doces sem pagar imposto, casais que se abraçavam de pé para espantar o frio, os tradicionais corredores que faziam seu cooper, gente cheia de barba e vestida para imitar os hippies dos anos 60 e vender colares estendidos no chão, transeuntes novos e velhos, vestidos como baladeiros ou como ativistas do ônibus grátis, grupos de ciclistas entusiastas.
O mago fazia agora apelos para que nós, os homens, habitantes do isolado planetinha, passássemos a ver o planetinha, nossa nave mãe, como um todo, e adquiríssemos a consciência de que ele estava entrando em maus lençóis. A idéia, reforçada pela logomarca do evento, era que parássemos de olhar só para a nossa vida e pensássemos no planeta.
A logomarca do evento, um desenho estilizado do planeta Terra, nada tinha a ver com seu nome: "Festival Andando de Bem com a Vida", mas havia sido ali colocada estrategicamente pelos organizadores, de quem parecia justamente sair a mensagem dita pelo mago.
Aquela multidão de pessoas que, assim como eu, tinham suas próprias preocupações, não podiam ver o quadro caótico que formavam, cada uma com seus atos isolados, ali naquela praça isolada, naquele planeta isolado. Quando o hippie barbudo, quase um Osho, assustava um casal para tentar vender-lhes um colar, a quantidade de caos que isto acrescentava à cena era gigantesca. Por um segundo, pude ver, como se estivesse de longe e acima, com toda a pretensão que este estado imaginativo carrega, a cena completa do caos.
Uma nave-mãe, dessas de ficção científica, habitada por milhões de pessoas, seguia no espaço sem rumo, e sem saber que logo à frente um longo precipício espacial a esperava, para a desgraça completa sua e de seus habitantes.
Acostumados àquela nave tanto quanto outrora estiveram acostumados à sua terra natal, os homens viviam as próprias vidas sem nem se lembrar que estavam vagando pelo espaço. Ninguém sabia quem estava conduzindo a nave, e ninguém se importava.
No final do filme descobre-se que era a soma completa do caos que cada habitante produzia, com seus gestos egoístas e incapazes de levar em conta a totalidade, é que determinava a direção da nave-mãe. O efeito, no entanto, não era imediato, como nunca é. Havia gente de verdade encarregada de conduzir a nave, mas era uma gente bêbada, mau-caráter, que vivia brigando pelo controle da nave e o poder que isto lhes dava. Poder, status, dinheiro!
Essa gente bêbada era atraída até ali pela corrupção das instituições e da moral comum que, no fundo no fundo, era causada pelo egoísmo da população, através de um complexo -- mas que no filme aparece simplificado pela ação individual de um magnata do divertimento público -- processo social.
O homem vestido de mago era mais um agente causador de caos, com sua cena cheia de fumaça e sua roupa estroboscópica, ele achava que estava fazendo o bem ao alertar sua platéia, todos as sextas-feiras, de que havia algo que precisava ser feito, que cada um que estava ali ouvindo era responsável pelo planeta. A sua incapacidade, porém, de explicar o que precisava ser feito só aumentava a angústia geral; a culpa que ele jogava sobre seu público, e que era prontamente aceita e passada em frente, aos familiares e amigos de cada um, atormentava-os diariamente e os impedia de ter uma vida decente no trabalho e em casa. As famílias, estressadas, estavam constantemente brigando e os motivos mais insignificantes eram responsáveis pelas mais horrendas conseqüências.
O mago, que após o show tirava o chapéu entortado e ia tomar cerveja num boteco, era responsável por uma parcela considerável do caos que levava a nave na direção do seu desgraçado fim. No filme, porém, um dos transeuntes que de passagem ouviu um pedaço do discurso do mago despertou em si mesmo uma consiência transformadora e, com poderes sobre-humanos que lhe foram então concedidos por uma ordem iniciática do bem ou não, usando só os seus poderes humanos mesmo, o transeunte -- na primeira versão do filme um homem, na segunda uma mulher -- consegue consertar as instituições e retirar os bêbados da condução da máquina. A questão da moral pública é ignorada para abreviar a trama, já com duas horas e quarenta de duração, mas subentende-se que ela também fora resolvida.
No planeta Terra real, que não está indo em direção alguma, preso pela gravidade ao Sol, e onde as pessoas vivem a própria vida porque lhes é impossível viver a dos outros, não têm uma consciência global de nada porque só é possível mesmo ter a consciência delas mesmas, e onde a maioria, de uma maneira ou de outra, está tentando como pode, fazer as coisas direito, o filme é exibido.
Para a maioria dos espectadores, é um filme que evoca reflexões, um filme forte. Por um segundo elas têm o mesmo vislumbre do caos generalizado que eu tive ali naquela praça. Para uma pequena parcela dos espectadores -- entre eles alguns dos que estavam na platéia do mago, o próprio mago, o seguidor do Osho, o casal de duas mulheres e o vendedor de brigadeiros, mas aos quais se somam também críticos de televisão e jornal e gente que fala pelos cotovelos na internet -- o filme é um horror, o filme é uma vulgarização de um problema real e sério, o filme apela para a figura do herói salvador e passa uma mensagem totalmente errada, de que a maioria da população pode continuar vivendo as suas própria vidinhas miseráveis enquanto espera por um herói que vem do Olimpo e os salva da mixórdia que eles mesmos causaram, é um filme que presta um enorme desserviço à causa.
No dia seguinte ao lançamento, num bar meio caro ali perto da praça, numa mesa com oito pessoas, entre elas seis do primeiro grupo e oito do segundo, discute-se se o filme levará ou não o Oscar. Eu estou em casa dormindo e não escuto nada.
-
@ 862fda7e:02a8268b
2024-06-29 08:18:20I am someone who thinks independently without abiding to a group to pre-formulate my opinions for me. I do not hold my opinions out of impulse, out of the desire to please, nor out of mindless apadtion to what others abide to. My opinions are held on what I belive is the most logical while being the most ethical and empathetic. We live in a world with a nervous systems and emotions for animals and humans (same thing) alike, thus, we should also consider those feelings. That is not the case in our world.
Cyclists are one of the most homosexual GAY ANNOYING people to exist on EARTH
I hate cyclists with a burning passion. These faggots are the GAYEST MOST ANNOYING retards to exist. They wear the tightest fitting clothing possible to show off their flaccid cocks to each other and to anybody around them.
And if that weren't enough, they present their ass up in the air, begging to be fucked by their cyclist buddies, as they ride their bike in the middle of the road. It's homosexual.
Look at the seat they ride on, it looks like a black cock about to go up their ass. Don't get me started on their gay helmets, the "aerodynamic" helmets they wear. YOU FAGGOTS AREN'T IN THE TOUR DE FRANCE, YOU'RE IN FRONT OF MY CAR IN AN INTERSECTION IN A MINNESOTA TOWN WITH A POPULATION OF 5,000. They LIKE the look of the costume. And that's just what it is - a costume. You're required to have a "look" as a cyclist - you aren't really a cyclist if you don't spend hundreds of dollars on the gay gear. God forbid you just get a bike and ride it around on a trail like anyone else. These people LIKE to be seen. They WANT to be seen as cool, which is why they ride right in front of my fucking car at 15mph in a 45mph zone. I swear, every time I pass one of these cyclists, I am this close to yelling "FAGGOT" out the window at them. The only reason I haven't is because they like to record everything on their gay bikes and upload it to Youtube, so then I'd have to deal with you people knowing where I live just because I called some fruit on a bike a faggot. Think I'm exaggerating? Think again. These homos have an entire community built on "catching" drivers who dare drive too close or blow their exhaust at the poor little faggy cyclist. There's Youtube channels dedicated to this. Part of their culture is being a victim by cars. Almost like it's dangerous to be in the middle of the road going 15mph on a 45mph road. Oh but I'm sure cars almost hitting you is surely a personal attack and nothing to do with the fact that what you're doing is DANGEROUS YOU RETARD.
I've seen these "share the road" signs in the most insane and dangerous places. I've seen them on HIGHWAYS, yes, HIGHWAYS, where the cyclist would BARELY have any room next to the car. It's insanely dangerous and I guess to some people, the constant threat of dying is fun... until it actually happens. I will never understand the mind of a cyclist. You are not in the fricken' Tour de France. You look like a homosexual that's inconveniencing HEAVY METAL HIGH POWERED CARS RIGHT BEHIND YOU. It's incredibly dangerous, and you can't rely on the very heavy, high powered cars and the people driving them to honor your life. Road rage is real, you might be the tipping point for some angry old boomer in his Ram to RAM INTO YOU and kill you. God I hate cyclists, their gay look, their cocky "better than you" attitude. Hey fudge stripe, in a battle between my CAR and your soft body, my CAR WILL WIN. Get off the road and go suck some cocks instead. Stop riding the bikes and go ride cocks instead, you homo.
-
@ f977c464:32fcbe00
2024-01-11 18:47:47Kendisini aynada ilk defa gördüğü o gün, diğerleri gibi olduğunu anlamıştı. Oysaki her insan biricik olmalıydı. Sözgelimi sinirlendiğinde bir kaşı diğerinden birkaç milimetre daha az çatılabilirdi veya sevindiğinde dudağı ona has bir açıyla dalgalanabilirdi. Hatta bunların hiçbiri mümkün değilse, en azından, gözlerinin içinde sadece onun sahip olabileceği bir ışık parlayabilirdi. Çok sıradan, öyle sıradan ki kimsenin fark etmediği o milyonlarca minik şeyden herhangi biri. Ne olursa.
Ama yansımasına bakarken bunların hiçbirini bulamadı ve diğer günlerden hiç de farklı başlamamış o gün, işe gitmek için vagonunun gelmesini beklediği alelade bir metro istasyonunda, içinde kaybolduğu illüzyon dağılmaya başladı.
İlk önce derisi döküldü. Tam olarak dökülmedi aslında, daha çok kıvılcımlara dönüşüp bedeninden fırlamış ve bir an sonra sönerek külleşmiş, havada dağılmıştı. Ardında da, kaybolmadan hemen önce, kısa süre için hayal meyal görülebilen, bir ruhun yok oluşuna ağıt yakan rengârenk peri cesetleri bırakmıştı. Beklenenin aksine, havaya toz kokusu yayıldı.
Dehşete düştü elbette. Dehşete düştüler. Panikle üstlerini yırtan 50 işçi. Her şeyin sebebiyse o vagon.
Saçları da döküldü. Her tel, yere varmadan önce, her santimde ikiye ayrıla ayrıla yok oldu.
Bütün yüzeylerin mat olduğu, hiçbir şeyin yansımadığı, suyun siyah aktığı ve kendine ancak kameralarla bakabildiğin bir dünyada, vagonun içine yerleştirilmiş bir aynadan ilk defa kendini görmek.
Gözlerinin akları buharlaşıp havada dağıldı, mercekleri boşalan yeri doldurmak için eriyip yayıldı. Gerçeği görmemek için yaratılmış, bu yüzden görmeye hazır olmayan ve hiç olmayacak gözler.
Her şeyin o anda sona erdiğini sanabilirdi insan. Derin bir karanlık ve ölüm. Görmenin görmek olduğu o anın bitişi.
Ben geldiğimde ölmüşlerdi.
Yani bozulmuşlardı demek istiyorum.
Belleklerini yeni taşıyıcılara takmam mümkün olmadı. Fiziksel olarak kusursuz durumdaydılar, olmayanları da tamir edebilirdim ama tüm o hengamede kendilerini baştan programlamış ve girdilerini modifiye etmişlerdi.
Belleklerden birini masanın üzerinden ileriye savurdu. Hınca hınç dolu bir barda oturuyorlardı. O ve arkadaşı.
Sırf şu kendisini insan sanan androidler travma geçirip delirmesin diye neler yapıyoruz, insanın aklı almıyor.
Eliyle arkasını işaret etti.
Polislerin söylediğine göre biri vagonun içerisine ayna yerleştirmiş. Bu zavallılar da kapı açılıp bir anda yansımalarını görünce kafayı kırmışlar.
Arkadaşı bunların ona ne hissettirdiğini sordu. Yani o kadar bozuk, insan olduğunu sanan androidi kendilerini parçalamış olarak yerde görmek onu sarsmamış mıydı?
Hayır, sonuçta belirli bir amaç için yaratılmış şeyler onlar. Kaliteli bir bilgisayarım bozulduğunda üzülürüm çünkü parasını ben vermişimdir. Bunlarsa devletin. Bana ne ki?
Arkadaşı anlayışla kafasını sallayıp suyundan bir yudum aldı. Kravatını biraz gevşetti.
Bira istemediğinden emin misin?
İstemediğini söyledi. Sahi, neden deliriyordu bu androidler?
Basit. Onların yapay zekâlarını kodlarken bir şeyler yazıyorlar. Yazılımcılar. Biliyorsun, ben donanımdayım. Bunlar da kendilerini insan sanıyorlar. Tiplerine bak.
Sesini alçalttı.
Arabalarda kaza testi yapılan mankenlere benziyor hepsi. Ağızları burunları bile yok ama şu geldiğimizden beri sakalını düzeltip duruyor mesela. Hayır, hepsi de diğerleri onun sakalı varmış sanıyor, o manyak bir şey.
Arkadaşı bunun delirmeleriyle bağlantısını çözemediğini söyledi. O da normal sesiyle konuşmaya devam etti.
Anlasana, aynayı falan ayırt edemiyor mercekleri. Lönk diye kendilerini görüyorlar. Böyle, olduğu gibi...
Nedenmiş peki? Ne gerek varmış?
Ne bileyim be abicim! Ahiret soruları gibi.
Birasına bakarak dalıp gitti. Sonra masaya abanarak arkadaşına iyice yaklaştı. Bulanık, bir tünelin ucundaki biri gibi, şekli şemalı belirsiz bir adam.
Ben seni nereden tanıyorum ki ulan? Kimsin sen?
Belleği makineden çıkardılar. İki kişiydiler. Soruşturmadan sorumlu memurlar.
─ Baştan mı başlıyoruz, diye sordu belleği elinde tutan ilk memur.
─ Bir kere daha deneyelim ama bu sefer direkt aynayı sorarak başla, diye cevapladı ikinci memur.
─ Bence de. Yeterince düzgün çalışıyor.
Simülasyon yüklenirken, ayakta, biraz arkada duran ve alnını kaşıyan ikinci memur sormaktan kendisini alamadı:
─ Bu androidleri niye böyle bir olay yerine göndermişler ki? Belli tost olacakları. İsraf. Gidip biz baksak aynayı kırıp delilleri mahvetmek zorunda da kalmazlar.
Diğer memur sandalyesinde hafifçe dönecek oldu, o sırada soruyu bilgisayarın hoparlöründen teknisyen cevapladı.
Hangi işimizde bir yamukluk yok ki be abi.
Ama bir son değildi. Üstlerindeki tüm illüzyon dağıldığında ve çıplak, cinsiyetsiz, birbirinin aynı bedenleriyle kaldıklarında sıra dünyaya gelmişti.
Yere düştüler. Elleri -bütün bedeni gibi siyah turmalinden, boğumları çelikten- yere değdiği anda, metronun zemini dağıldı.
Yerdeki karolar öncesinde beyazdı ve çok parlaktı. Tepelerindeki floresan, ışığını olduğu gibi yansıtıyor, tek bir lekenin olmadığı ve tek bir tozun uçmadığı istasyonu aydınlatıyorlardı.
Duvarlara duyurular asılmıştı. Örneğin, yarın akşam kültür merkezinde 20.00’da başlayacak bir tekno blues festivalinin cıvıl cıvıl afişi vardı. Onun yanında daha geniş, sarı puntolu harflerle yazılmış, yatay siyah kesiklerle çerçevesi çizilmiş, bir platformdan düşen çöp adamın bulunduğu “Dikkat! Sarı bandı geçmeyin!” uyarısı. Biraz ilerisinde günlük resmi gazete, onun ilerisinde bir aksiyon filminin ve başka bir romantik komedi filminin afişleri, yapılacakların ve yapılmayacakların söylendiği küçük puntolu çeşitli duyurular... Duvar uzayıp giden bir panoydu. On, on beş metrede bir tekrarlanıyordu.
Tüm istasyonun eni yüz metre kadar. Genişliği on metre civarı.
Önlerinde, açık kapısından o mendebur aynanın gözüktüğü vagon duruyordu. Metro, istasyona sığmayacak kadar uzundu. Bir kılıcın keskinliğiyle uzanıyor ama yer yer vagonların ek yerleriyle bölünüyordu.
Hiçbir vagonda pencere olmadığı için metronun içi, içlerindekiler meçhuldü.
Sonrasında karolar zerrelerine ayrılarak yükseldi. Floresanın ışığında her yeri toza boğdular ve ortalığı gri bir sisin altına gömdüler. Çok kısa bir an. Afişleri dalgalandırmadılar. Dalgalandırmaya vakitleri olmadı. Yerlerinden söküp aldılar en fazla. Işık birkaç kere sönüp yanarak direndi. Son kez söndüğünde bir daha geri gelmedi.
Yine de etraf aydınlıktı. Kırmızı, her yere eşit dağılan soluk bir ışıkla.
Yer tamamen tele dönüşmüştü. Altında çapraz hatlarla desteklenmiş demir bir iskelet. Işık birkaç metreden daha fazla aşağıya uzanamıyordu. Sonsuzluğa giden bir uçurum.
Duvarın yerini aynı teller ve demir iskelet almıştı. Arkasında, birbirine vidalarla tutturulmuş demir plakalardan oluşan, üstünden geçen boruların ek yerlerinden bazen ince buharların çıktığı ve bir süre asılı kaldıktan sonra ağır, yağlı bir havayla sürüklendiği bir koridor.
Diğer tarafta paslanmış, pencerelerindeki camlar kırıldığı için demir plakalarla kapatılmış külüstür bir metro. Kapının karşısındaki aynadan her şey olduğu gibi yansıyordu.
Bir konteynırın içini andıran bir evde, gerçi gayet de birbirine eklenmiş konteynırlardan oluşan bir şehirde “andıran” demek doğru olmayacağı için düpedüz bir konteynırın içinde, masaya mum görüntüsü vermek için koyulmuş, yarı katı yağ atıklarından şekillendirilmiş kütleleri yakmayı deniyordu. Kafasında hayvan kıllarından yapılmış grili siyahlı bir peruk. Aynı kıllardan kendisine gür bir bıyık da yapmıştı.
Üstünde mavi çöp poşetlerinden yapılmış, kravatlı, şık bir takım.
Masanın ayakları yerine oradan buradan çıkmış parçalar konulmuştu: bir arabanın şaft mili, üst üste konulmuş ve üstünde yazı okunamayan tenekeler, boş kitaplar, boş gazete balyaları... Hiçbir şeye yazı yazılmıyordu, gerek yoktu da zaten çünkü merkez veri bankası onları fark ettirmeden, merceklerden giren veriyi sentezleyerek insanlar için dolduruyordu. Yani, androidler için. Farklı şekilde isimlendirmek bir fark yaratacaksa.
Onların mercekleri için değil. Bağlantıları çok önceden kopmuştu.
─ Hayatım, sofra hazır, diye bağırdı yatak odasındaki karısına.
Sofrada tabak yerine düz, bardak yerine bükülmüş, çatal ve bıçak yerine sivriltilmiş plakalar.
Karısı salonun kapısında durakladı ve ancak kulaklarına kadar uzanan, kocasınınkine benzeyen, cansız, ölü hayvanların kıllarından ibaret peruğunu eliyle düzeltti. Dudağını, daha doğrusu dudağının olması gereken yeri koyu kırmızı bir yağ tabakasıyla renklendirmeyi denemişti. Biraz da yanaklarına sürmüştü.
─ Nasıl olmuş, diye sordu.
Sesi tek düzeydi ama hafif bir neşe olduğunu hissettiğinize yemin edebilirdiniz.
Üzerinde, çöp poşetlerinin içini yazısız gazete kağıtlarıyla doldurarak yaptığı iki parça giysi.
─ Çok güzelsin, diyerek kravatını düzeltti kocası.
─ Sen de öylesin, sevgilim.
Yaklaşıp kocasını öptü. Kocası da onu. Sonra nazikçe elinden tutarak, sandalyesini geriye çekerek oturmasına yardım etti.
Sofrada yemek niyetine hiçbir şey yoktu. Gerek de yoktu zaten.
Konteynırın kapısı gürültüyle tekmelenip içeri iki memur girene kadar birbirlerine öyküler anlattılar. O gün neler yaptıklarını. İşten erken çıkıp yemyeşil çimenlerde gezdiklerini, uçurtma uçurduklarını, kadının nasıl o elbiseyi bulmak için saatlerce gezip yorulduğunu, kocasının kısa süreliğine işe dönüp nasıl başarılı bir hamleyle yaşanan krizi çözdüğünü ve kadının yanına döndükten sonra, alışveriş merkezinde oturdukları yeni dondurmacının dondurmalarının ne kadar lezzetli olduğunu, boğazlarının ağrımasından korktuklarını...
Akşam film izleyebilirlerdi, televizyonda -boş ve mat bir plaka- güzel bir film oynayacaktı.
İki memur. Çıplak bedenleriyle birbirinin aynı. Ellerindeki silahları onlara doğrultmuşlardı. Mum ışığında, tertemiz bir örtünün serili olduğu masada, bardaklarında şaraplarla oturan ve henüz sofranın ortasındaki hindiye dokunmamış çifti gördüklerinde bocaladılar.
Hiç de androidlere bilinçli olarak zarar verebilecek gibi gözükmüyorlardı.
─ Sessiz kalma hakkına sahipsiniz, diye bağırdı içeri giren ikinci memur. Söylediğiniz her şey...
Cümlesini bitiremedi. Yatak odasındaki, masanın üzerinden gördüğü o şey, onunla aynı hareketleri yapan android, yoksa, bir aynadaki yansıması mıydı?
Bütün illüzyon o anda dağılmaya başladı.
Not: Bu öykü ilk olarak 2020 yılında Esrarengiz Hikâyeler'de yayımlanmıştır.
-
@ 862fda7e:02a8268b
2024-06-29 08:16:47Pictured above is a female body that looks incredibly similar to mine. So similar that it could be mine if I didn't have a c-section scar. Actually her boobs are a bit bigger than mine, but mine do look like that when they swell.
Nudity should be normalized
I don't understand why people get offended or sensitive over the human body. Especially the female human chest. We all have nipples, we all know what they look like, so I don't understand why a female being topless is unacceptable, whereas a male topless is normal. I've seen shirtless men with more shapely, larger breasts than mine. Personally, I have stopped caring if other people see the shape of my breasts or my nipples if they were to be poking in the freezer section of the grocery store. I stopped wearing bras years ago. I often times want to be topless outside in my yard because it feels good and natural. I like the sun on my skin, and I especially love the rain on my skin. It's very unfortunate that our natural human body is massively shamed, by who I believe, is the reptilians (for a number of reasons). Logically, it makes no sense to be outraged by the female human chest. We all know what nipples look like, we all have them, I truly believe women should be allowed to be topless like men are. If it's hot out and you're doing yard work - pop your top off, who cares?
I understand that males and some females sexualize the human chest. However, that is not my problem. That is none of my concern what others think about my body. I should be allowed to wear my human body as it is just like anyone else should be. What I can't wrap my mind around is why people are shocked or offended by the human body, since we ALL know what these parts look like and we all have them. I understand in certain scenarios being topless or nude would likely be inapproriate, or that perverts would use it as a way to expose themselves to children. In an ideal world, we could live like tribes where the human body is normal, it's not overtly sexual. This is why we're so offended over the human body - it's constantly concealed, so the moment we get to see a female chest, it's suddenly sexual because it's normally tabboo to be seen. I wish I could be shirtless outside, I envy males who get to truly feel the wind, the earth on their backs and their chest. Female and male nipples look the same, I don't understand why it should be illegal for me to experience nature in my natural state.
Anyways, I highly dislike the "nudist" people because it is NOT about accepting the human body in its natural state. It's completely co-opted by pedophiles who want to expose themselves to childen or for children to expose themselves to others for sexual gratification. There are nudist resorts pedophile parents force their children to go to (as a child you have no personal autonomy and are completely a slave to your parents - trust me, I know this because I couldn't LEGALLY decide which parent I wanted to live with up until I was 18 years old. If your parent wants you to do something, a child in the US has no legal say over that, so if your parent wants to go to a nudist resort, you must go). A human body should simply be a human body, it's unfortunate that being unclothed immediately brings on sexualization. This is mostly an issue because clothes is the expected default. The more tabboo something is, the more naughty the thing is.
I am not a nudist. However, I do believe that at the very least, females should have the right to be topless in similar settings as males are allowed to. I don't think a woman is a slut if she's in her natural state, in her human body, and proceeds life as normal. How one acts portrays slutty behavior. Living your life in your natural human body should be a right without caviots. I feel detached from people who constantly see the human body as flawed (e.g. circumcision industry, body hair removal industry, clothing industry). These industries are harmful for the victims in them (infant boys, and modern day slaves in sweatshops), and the main motivating factor is money among all these industries.
-
@ 32e18276:5c68e245
2023-12-06 15:29:43I’m going to be on an ordinals panels as one of the people who is counter arguing the claim that they are good for bitcoin. I decided to brush up on the technicals on how inscriptions work. I am starting to see luke’s perspective on how it is exploiting a loophole in bitcoin’s anti-data-spam mechanisms.
Storing data in Bitcoin, the “standard” way
The standard way you add “data” to bitcoin is by calling the OP_RETURN opcode. Bitcoin devs noticed that people were storing data (like the bitcoin whitepaper) in the utxo set via large multisig transactions. The problem with this is that this set is unprunable and could grow over time. OP_RETURN outputs on the other-hand are provably prunable and don’t add to utxo bloat.
Here’s an excerpt from the march 2014 0.9.0 release notes that talks about this:
On OP_RETURN: There was been some confusion and misunderstanding in the community, regarding the OP_RETURN feature in 0.9 and data in the blockchain. This change is not an endorsement of storing data in the blockchain. The OP_RETURN change creates a provably-prunable output, to avoid data storage schemes – some of which were already deployed – that were storing arbitrary data such as images as forever-unspendable TX outputs, bloating bitcoin’s UTXO database. Storing arbitrary data in the blockchain is still a bad idea; it is less costly and far more efficient to store non-currency data elsewhere.
Much of the work on bitcoin core has been focused on making sure the system continues to function in a decentralized way for its intended purpose in the presence of people trying to abuse it for things like storing data. Bitcoin core has always discouraged this, as it is not designed for storage of images and data, it is meant for moving digital coins around in cyberspace.
To help incentive-align people to not do stupid things, OP_RETURN transactions were not made non-standard, so that they are relayable by peers and miners, but with the caveat:
- They can only push 40 bytes (later increased to 80,83, I’m guessing to support larger root merkle hashes since that is the only sane usecase for op_return)
Bitcoin also added an option called -datacarriersize which limits the total number of bytes from these outputs that you will relay or mine.
Why inscriptions are technically an exploit
Inscriptions get around the datacarriersize limit by disguising data as bitcoin script program data via OP_PUSH inside OP_IF blocks. Ordinals do not use OP_RETURN and are not subjected to datacarriersize limits, so noderunners and miners currently have limited control over the total size of this data that they wish to relay and include in blocks. Luke’s fork of bitcoin-core has some options to fight this spam, so hopefully we will see this in core sometime soon as well.
Inscriptions are also taking advantage of features in segwit v1 (witness discount) and v2/taproot (no arbitrary script size limit). Each of these features have interesting and well-justified reasons why they were introduced.
The purpose of the witness discount was to make it cheaper to spend many outputs which helps the reduction of the utxo set size. Inscriptions took advantage of this discount to store monke jpegs disguised as bitcoin scripts. Remember, bitcoin is not for storing data, so anytime bitcoin-devs accidentally make it cheap and easy to relay data then this should be viewed as an exploit. Expect it to be fixed, or at least provide tools to noderunners for fighting this spam.
Where do we go from here
The interesting part of this story is that people seem to attach value to images stored on the bitcoin blockchain, and they are willing to pay the fee to get it in the block, so non-ideologic miners and people who don’t care about the health and decentralization of bitcoin are happy to pay or collect the fee and move on.
Data should not get a discount, people should pay full price if they want to store data. They should just use op_return and hashes like opentimestamps or any other reasonable protocol storing data in bitcoin.
After going through this analysis I’ve come to the opinion that this is a pretty bad data-spam exploit and bitcoin devs should be working on solutions. Ideological devs like luke who actually care about the health and decentralization of the network are and I’m glad to see it.
-
@ 5d4b6c8d:8a1c1ee3
2024-06-29 00:56:34We have a trade!
Dejounte Murray is heading to New Orleans.
In return, Atlanta is getting Larry Nance Jr, Dyson Daniels, and some picks.
-
@ 8fb140b4:f948000c
2023-11-21 21:37:48Embarking on the journey of operating your own Lightning node on the Bitcoin Layer 2 network is more than just a tech-savvy endeavor; it's a step into a realm of financial autonomy and cutting-edge innovation. By running a node, you become a vital part of a revolutionary movement that's reshaping how we think about money and digital transactions. This role not only offers a unique perspective on blockchain technology but also places you at the heart of a community dedicated to decentralization and network resilience. Beyond the technicalities, it's about embracing a new era of digital finance, where you contribute directly to the network's security, efficiency, and growth, all while gaining personal satisfaction and potentially lucrative rewards.
In essence, running your own Lightning node is a powerful way to engage with the forefront of blockchain technology, assert financial independence, and contribute to a more decentralized and efficient Bitcoin network. It's an adventure that offers both personal and communal benefits, from gaining in-depth tech knowledge to earning a place in the evolving landscape of cryptocurrency.
Running your own Lightning node for the Bitcoin Layer 2 network can be an empowering and beneficial endeavor. Here are 10 reasons why you might consider taking on this task:
-
Direct Contribution to Decentralization: Operating a node is a direct action towards decentralizing the Bitcoin network, crucial for its security and resistance to control or censorship by any single entity.
-
Financial Autonomy: Owning a node gives you complete control over your financial transactions on the network, free from reliance on third-party services, which can be subject to fees, restrictions, or outages.
-
Advanced Network Participation: As a node operator, you're not just a passive participant but an active player in shaping the network, influencing its efficiency and scalability through direct involvement.
-
Potential for Higher Revenue: With strategic management and optimal channel funding, your node can become a preferred route for transactions, potentially increasing the routing fees you can earn.
-
Cutting-Edge Technological Engagement: Running a node puts you at the forefront of blockchain and bitcoin technology, offering insights into future developments and innovations.
-
Strengthened Network Security: Each new node adds to the robustness of the Bitcoin network, making it more resilient against attacks and failures, thus contributing to the overall security of the ecosystem.
-
Personalized Fee Structures: You have the flexibility to set your own fee policies, which can balance earning potential with the service you provide to the network.
-
Empowerment Through Knowledge: The process of setting up and managing a node provides deep learning opportunities, empowering you with knowledge that can be applied in various areas of blockchain and fintech.
-
Boosting Transaction Capacity: By running a node, you help to increase the overall capacity of the Lightning Network, enabling more transactions to be processed quickly and at lower costs.
-
Community Leadership and Reputation: As an active node operator, you gain recognition within the Bitcoin community, which can lead to collaborative opportunities and a position of thought leadership in the space.
These reasons demonstrate the impactful and transformative nature of running a Lightning node, appealing to those who are deeply invested in the principles of bitcoin and wish to actively shape its future. Jump aboard, and embrace the journey toward full independence. 🐶🐾🫡🚀🚀🚀
-
-
@ de496884:72617b81
2023-11-20 13:54:02Hola nostriches. Hoy quiero hacer una publicación a modo de acercamiento al surgimiento de las categorías de género y feminismo. Así que si te interesa el tema haz un esfuerzo, quédate y lee hasta el final.
El «nuevo» feminismo surge en los años 60 en aquellos países desarrollados que acordaron el reconocimiento a los derechos humanos contenidos en la declaración respectiva de la ONU. Entonces, como extensión a dicho reconocimiento es que se gesta el movimiento feminista. A partir de entonces, se vuelve a plantear la relación entre naturaleza y cultura y se llega a la conclusión de que las diferencias sociales van más allá de las diferencias biológicas, lo cual tiene que ver con que hasta la satisfacción de las necesidades elementales como son la alimentación, la vivienda o el vestuario, están condicionadas por construcciones sociales.
Pues resulta que una de las primeras propuestas identificó la subordinación femenina producto de una organización patriarcal, tomando la categoría patriarcado de Max Weber. Es así como la visión de patriarcado se extendió al discurso político y académico. Sin embargo, no existía información acerca del desarrollo histórico de dicha categoría, sistematización, variaciones, etc., debido a que era algo que recién se percibía en sociedad.
Sin embargo, la misma categoría de patriarcado junto a la de relaciones de poder para explicar fenómenos sociales contemporáneos, constituye uno de los principales aportes del feminismo. Es así como han logrado primero visibilizar y luego deconstruir y desmontar una serie de patrones existentes en la cultura que hacían a la mujer subordinarse al hombre, y que estaban presentes en el sistema sexo/género.
Imagen relativa a la lucha contra el patriarcado
Hasta ese momento, en las investigaciones de corte sociológico se podía observar un androcentrismo excesivo al dar cuenta de que el discurso científico giraba en torno al hombre como sujeto y objeto de la investigación. Incluso para muchos positivistas como el mismo Weber, los problemas relativos a las mujeres quedaban en un segundo plano y eran achacados a una supuesta pasividad en el ámbito doméstico-familiar. Dicha pasividad partía de la supuesta inferioridad biológica del género femenino.
El patriarcado entonces era una categoría vacía en sí misma, sin valor explicativo. Desde el punto de vista político pudo ser útil para la movilización pero no resistió la polémica de los críticos del feminismo ni problematizó los conflictos a ser resueltos. Pero por otro lado, un grupo de mujeres -académicas principalmente- se puso manos a la obra en una tarea más pequeña pero con mayores resultados a la larga. Se propusieron generar conocimientos sobre las condiciones de vida de la mujer, buscar en el pasado y el presente los aportes de las mujeres a la sociedad, hacerlas visibles en la historia. Es así como surgen centros académicos, ONG, proyectos, centros de estudios sobre la mujer, etc.
Convendría distinguir entonces dos posturas que acompañaron a la investigación sobre las mujeres: uno que toma como objeto de estudio a la mujer; condiciones de vida, trabajo, cultura, y otra que privilegia a la sociedad como generadora de la subordinación de las mujeres. Mientras la primera perspectiva generaba conocimiento sobre las mujeres en el estudio de las relaciones mujer-hombre y mujer-mujer, la segunda tenía una visión más holística ya que planteaba que hay que estudiar la sociedad ya que la subordinación de las mujeres es producto de la organización de esta, y que no se avanzará solamente estudiando a las mujeres, pues el estudio debe ser más amplio y en diferentes niveles, ámbitos y tiempos.
Es en esta búsqueda donde nace y se desarrolla el concepto de género como categoría social. Es así que los sistemas de género/sexo fueron entendidos como conjuntos de prácticas, símbolos, representaciones, normas y valores sociales que las sociedades construyen a partir de la diferencia anatomofisiológica y que dotan de sentido a los impulsos sexuales, la reproducción y en general a las relaciones de las personas. Por tanto, este sistema pasó a ser el objeto de estudio para comprender la subordinación de la mujer al hombre. Al ser el reconocimiento de una dimensión de la desigualdad social hasta entonces desconocida, se considera la ruptura epistemológica más importante de la segunda mitad del siglo pasado.
Imagen representativa del binarismo de género
Hay que decir que los fenómenos sociales se definen por la relación que guardan entre sí. Es así que la contextualización adquiere gran importancia. Varones y hembras tenemos la capacidad de producir con el cuerpo, pero solo los cuerpos de las hembras pueden gestar y por tanto asegurar la especie humana. Todo grupo humano que pretenda sobrevivir debe asegurarse cierto número de hembras que lo hagan posible. De ahí un poder particular del cuerpo de las hembras que además es económicamente útil. Dicho poder no es en tanto entidad biológica, sino que es la sociedad la que le otorga este poder. En este punto es importante preguntarnos históricamente ¿quiénes han controlado la capacidad reproductiva de las mujeres?, ¿quiénes han tenido la preferencia en el acceso sexual? Para asegurar un control efectivo sobre la reproducción es necesario asegurar el acceso a la sexualidad.
Ello también lleva a dirigir el trabajo que hacen porque de lo contrario, las mujeres pudieran tener espacio para representar una amenaza al dominio de los hombres. Es importante atender a las etapas del desarrollo de las mujeres, que permitirá ver cómo se moldean para aceptar la desigualdad y las jerarquías según el género en las distintas sociedades y culturas.
Otro contexto a delimitar es el ámbito doméstico donde históricamente ha estado ubicada la subordinación femenina. Se ha puesto al descubierto que en mujeres que comparten la misma posición de clase y raza, la condición femenina se redefine a lo largo de la vida y que algunas mujeres gozan de poder sobre otras aún en contextos de alta dominación masculina, donde se les inviste de autoridad, creando el sistema zonas de incertidumbre que las divide como género e impide alianzas y se legitima la dominación. Foucault decía que «el poder se ejerce, no se posee», siempre está en peligro de perderse y no basta con normas, leyes, amenazas o castigos. De ahí que los espacios de subordinación sean también espacios de poder de las mujeres. Es en estos espacios donde aparece la inseguridad, la tensión, la confrontación y por ejemplo, las mujeres pueden reclamar la anticoncepción.
Para terminar, es importante tener en cuenta que el género es una forma de desigualdad social que siempre está articulado con otras formas de desigualdad ya sea clase, raza, grupo etario, etc. Hay que pensar la dominación masculina con un comienzo vago en el tiempo, pero que permite desligar la subordinación de las mujeres de la evolución «natural» de la humanidad y entenderla como un proceso histórico. En ese sentido es necesario destacar que, respecto a la raza, en sociedades plurales hay que atender al contexto étnico-cultural ya que en dependencia de las relaciones entre personas de razas distintas, estarán condicionadas las relaciones entre los géneros.
Imagen de mujeres de distintas razas
Por otro lado, si bien es sabido que históricamente el sistema de género social imperante ha contribuido a invisibilizar a la mujer, asociar necesariamente dicha categoría únicamente a ella, lo que hace es nuevamente recrear el absolutismo histórico que tanto daño ha hecho, ahora como lo antagónico al hombre. En la construcción social participan todos los individuos presentes en el sistema género.
Hasta aquí la publicación de hoy, de la cual aun se puede ahondar mucho más, sobre todo en lo referido al origen de la dominación o de la jerarquización del binomio «hombre/mujer» desde un punto de vista antropológico, pero eso quedará pendiente para otro momento. ¡Así que hasta la próxima!, ¡nos vemos en Nostr!
........................................
English version
Hello nostriches. Today I want to make a post by way of an approach to the emergence of the categories of gender and feminism. So if you are interested in the topic make an effort, stay and read to the end.
The "new" feminism emerged in the 60's in those developed countries that agreed to recognize the human rights contained in the respective UN declaration. Then, as an extension of that recognition, the feminist movement was born. From then on, the relationship between nature and culture was raised again and the conclusion was reached that social differences go beyond biological differences, which has to do with the fact that even the satisfaction of elementary needs such as food, housing or clothing are conditioned by social constructions.
It turns out that one of the first proposals identified female subordination as a product of a patriarchal organization, taking Max Weber's category of patriarchy. This is how the vision of patriarchy was extended to political and academic discourse. However, there was no information about the historical development of this category, systematization, variations, etc., because it was something that was only recently perceived in society.
However, the same category of patriarchy, together with that of power relations to explain contemporary social phenomena, constitutes one of the main contributions of feminism. This is how they have first made visible and then deconstructed and dismantled a series of existing patterns in the culture that made women subordinate to men, and that were present in the sex/gender system.
Image relating to the fight against patriarchy
Up to that time, in sociological research, an excessive androcentrism could be observed as scientific discourse revolved around men as the subject and object of research. Even for many positivists such as Weber himself, the problems related to women remained in the background and were blamed on a supposed passivity in the domestic-family sphere. This passivity was based on the supposed biological inferiority of the female gender.
Patriarchy was then an empty category in itself, with no explanatory value. From the political point of view, it could be useful for mobilization, but it did not resist the polemic of feminism's critics, nor did it problematize the conflicts to be resolved. But on the other hand, a group of women - mainly academics - set to work on a smaller task but with greater results in the long run. They set out to generate knowledge about women's living conditions, to search in the past and present for women's contributions to society, to make them visible in history. This is how academic centers, NGOs, projects, women's studies centers, etc., came into being.
It would be convenient to distinguish then two postures that accompanied the research on women: one that takes women as the object of study; living conditions, work, culture, and the other that privileges society as the generator of women's subordination. While the first perspective generated knowledge about women in the study of woman-man and woman-woman relations, the second had a more holistic vision, since it proposed that society must be studied, since the subordination of women is a product of its organization, and that progress will not be made only by studying women, since the study must be broader and at different levels, spheres and times.
It is in this search that the concept of gender as a social category was born and developed. Thus, gender/sex systems were understood as a set of practices, symbols, representations, norms and social values that societies construct on the basis of anatomophysiological differences and that give meaning to sexual impulses, reproduction and, in general, to people's relationships. Therefore, this system became the object of study to understand the subordination of women to men. As the recognition of a hitherto unknown dimension of social inequality, it is considered the most important epistemological breakthrough of the second half of the last century.
Representative image of gender binarism
It must be said that social phenomena are defined by their relationship with each other. Thus, contextualization acquires great importance. Males and females have the capacity to produce with their bodies, but only the bodies of females can gestate and therefore ensure the human species. Any human group that intends to survive must ensure a certain number of females to make it possible. Hence a particular power of the female body, which is also economically useful. This power is not as a biological entity, but it is society that gives it this power. At this point it is important to ask ourselves historically, who has controlled the reproductive capacity of women, who has had the preference in sexual access? To ensure effective control over reproduction, it is necessary to ensure access to sexuality.
Allegorical image of pregnancy
This also leads to directing the work they do because otherwise, women may have room to pose a threat to men's dominance. It is important to pay attention to the stages of women's development, which will allow us to see how they are shaped to accept inequality and gender hierarchies in different societies and cultures.
Another context to delimit is the domestic sphere where female subordination has historically been located. It has been discovered that in women who share the same class and race position, the feminine condition is redefined throughout life and that some women enjoy power over others even in contexts of high male domination, where they are invested with authority, creating the system of uncertainty zones that divide them as a gender and prevent alliances and legitimize domination. Foucault said that "power is exercised, not possessed", it is always in danger of being lost and norms, laws, threats or punishments are not enough. Hence, the spaces of subordination are also spaces of women's power. It is in these spaces where insecurity, tension, confrontation appear and where, for example, women can demand contraception.
To conclude, it is important to keep in mind that gender is a form of social inequality that is always articulated with other forms of inequality, be it class, race, age group, etc. It is necessary to think of male domination with a vague beginning in time, but which allows us to separate the subordination of women from the "natural" evolution of humanity and to understand it as a historical process. In this sense, it is necessary to emphasize that, with respect to race, in plural societies it is necessary to pay attention to the ethno-cultural context since, depending on the relations between people of different races, the relations between genders will be conditioned.
Image of women of different races
On the other hand, although it is known that historically the prevailing social gender system has contributed to make women invisible, to necessarily associate this category only to women is to recreate the historical absolutism that has done so much damage, this time as antagonistic to men. All individuals present in the gender system participate in the social construction.
So much for today's publication, of which we can still go much deeper, especially with regard to the origin of domination or the hierarchization of the binomial "man/woman" from an anthropological point of view, but that will be left for another time. So until next time, see you in Nostr!
Créditos | Credits
Bibliografía consultada | Consulted bibliography:
-
Barbieri, T. (1993). Sobre la categoría género. Una introducción teórico-metodológica. Debates en Sociología. (18). 1-19. https://doi.org/10.18800/debatesensociologia.199301.006
-
Echevarría, D. (2020). Desigualdades de género e interseccionalidad. Análisis del contexto cubano 2008-2018. Facultad Latinoamericana de Ciencias Sociales (Programa-Cuba). https://www.clacso.org.ar/libreria-latinoamericana-cm/libro_detalle_resultado.php?id_libro=2346&campo=cm&texto=248
Traducción | Translation:
DeepL
-
-
@ 8fb140b4:f948000c
2023-11-18 23:28:31Chef's notes
Serving these two dishes together will create a delightful centerpiece for your Thanksgiving meal, offering a perfect blend of traditional flavors with a homemade touch.
Details
- ⏲️ Prep time: 30 min
- 🍳 Cook time: 1 - 2 hours
- 🍽️ Servings: 4-6
Ingredients
- 1 whole turkey (about 12-14 lbs), thawed and ready to cook
- 1 cup unsalted butter, softened
- 2 tablespoons fresh thyme, chopped
- 2 tablespoons fresh rosemary, chopped
- 2 tablespoons fresh sage, chopped
- Salt and freshly ground black pepper
- 1 onion, quartered
- 1 lemon, halved
- 2-3 cloves of garlic
- Apple and Sage Stuffing
- 1 loaf of crusty bread, cut into cubes
- 2 apples, cored and chopped
- 1 onion, diced
- 2 stalks celery, diced
- 3 cloves garlic, minced
- 1/4 cup fresh sage, chopped
- 1/2 cup unsalted butter
- 2 cups chicken broth
- Salt and pepper, to taste
Directions
- Preheat the Oven: Set your oven to 325°F (165°C).
- Prepare the Herb Butter: Mix the softened butter with the chopped thyme, rosemary, and sage. Season with salt and pepper.
- Prepare the Turkey: Remove any giblets from the turkey and pat it dry. Loosen the skin and spread a generous amount of herb butter under and over the skin.
- Add Aromatics: Inside the turkey cavity, place the quartered onion, lemon halves, and garlic cloves.
- Roast: Place the turkey in a roasting pan. Tent with aluminum foil and roast. A general guideline is about 15 minutes per pound, or until the internal temperature reaches 165°F (74°C) at the thickest part of the thigh.
- Rest and Serve: Let the turkey rest for at least 20 minutes before carving.
- Next: Apple and Sage Stuffing
- Dry the Bread: Spread the bread cubes on a baking sheet and let them dry overnight, or toast them in the oven.
- Cook the Vegetables: In a large skillet, melt the butter and cook the onion, celery, and garlic until soft.
- Combine Ingredients: Add the apples, sage, and bread cubes to the skillet. Stir in the chicken broth until the mixture is moist. Season with salt and pepper.
- Bake: Transfer the stuffing to a baking dish and bake at 350°F (175°C) for about 30-40 minutes, until golden brown on top.
-
@ 8fb140b4:f948000c
2023-11-02 01:13:01Testing a brand new YakiHonne native client for iOS. Smooth as butter (not penis butter 🤣🍆🧈) with great visual experience and intuitive navigation. Amazing work by the team behind it! * lists * work
Bold text work!
Images could have used nostr.build instead of raw S3 from us-east-1 region.
Very impressive! You can even save the draft and continue later, before posting the long-form note!
🐶🐾🤯🤯🤯🫂💜
-
@ fa0165a0:03397073
2023-10-06 19:25:08I just tested building a browser plugin, it was easier than I thought. Here I'll walk you through the steps of creating a minimal working example of a browser plugin, a.k.a. the "Hello World" of browser plugins.
First of all there are two main browser platforms out there, Chromium and Mozilla. They do some things a little differently, but similar enough that we can build a plugin that works on both. This plugin will work in both, I'll describe the firefox version, but the chromium version is very similar.
What is a browser plugin?
Simply put, a browser plugin is a program that runs in the browser. It can do things like modify the content of a webpage, or add new functionality to the browser. It's a way to extend the browser with custom functionality. Common examples are ad blockers, password managers, and video downloaders.
In technical terms, they are plugins that can insert html-css-js into your browser experience.
How to build a browser plugin
Step 0: Basics
You'll need a computer, a text editor and a browser. For testing and development I personally think that the firefox developer edition is the easiest to work with. But any Chrome based browser will also do.
Create a working directory on your computer, name it anything you like. I'll call mine
hello-world-browser-plugin
. Open the directory and create a file calledmanifest.json
. This is the most important file of your plugin, and it must be named exactly right.Step 1: manifest.json
After creation open your file
manifest.json
in your text editor and paste the following code:json { "manifest_version": 3, "name": "Hello World", "version": "1.0", "description": "A simple 'Hello World' browser extension", "content_scripts": [ { "matches": ["<all_urls>"], "js": ["hello.js"] //The name of your script file. // "css": ["hello.css"] //The name of your css file. } ] }
If you wonder what the
json
file format is, it's a normal text file with a special syntax such that a computer can easily read it. It's thejson
syntax you see in the code above. Let's go through what's being said here. (If you are not interested, just skip to the next step after pasting this we are done here.)manifest_version
: This is the version of the manifest file format. It's currently at version 3, and it's the latest version. It's important that you set this to 3, otherwise your plugin won't work.name
: This is the name of your plugin. It can be anything you like.version
: This is the version of your plugin. It can be anything you like.description
: This is the description of your plugin. It can be anything you like.content_scripts
: This is where you define what your plugin does. It's a list of scripts that will be executed when the browser loads a webpage. In this case we have one script, calledhello.js
. It's the script that we'll create in the next step.matches
: This is a list of urls that the script will be executed on. In this case we have<all_urls>
, which means that the script will be executed on all urls. You can also specify a specific url, likehttps://brave.com/*
, which means that the script will only be executed on urls that start withhttps://brave.com/
.js
: This is a list of javascript files that will be executed. In this case we have one file, calledhello.js
. It's the script that we'll create in the next step.css
: This is where you can add a list of css files that will be executed. In this case we have none, but you can add css files here if you want to.//
: Text following these two characters are comments. They are ignored by the computer, You can add comments anywhere you like, and they are a good way to document your code.
Step 2: hello.js
Now it's time to create another file in your project folder. This time we'll call it
hello.js
. When created, open it in your text editor and paste the following code:js console.log("Hello World!");
That's javascript code, and it's what will be executed when you run your plugin. It's a simpleconsole.log
statement, which will print the text "Hello World!" to the console. The console is a place where the browser prints out messages, and it's a good place to start when debugging your plugin.Step 3: Load and launch your plugin
Firefox
Now it's time to load your plugin into your browser. Open your browser and go to the url
about:debugging#/runtime/this-firefox
. You should see a page that looks something like this:Click the button that says "Load Temporary Add-on...". A file dialog will open, navigate to your project folder and select the file
manifest.json
. Your plugin should now be loaded and running.Go to a website, any website, and open the inspector then navigate to the console. You'll find the inspector by right-clicking anywhere within the webpage, and click "Inspector" in the drop-down menu. When opening the console you might see some log messages from the site you visited and... you should see the text "Hello World!" printed there, from our little plugin! Congratulations!
Chrome
Open your browser and go to the url
chrome://extensions/
. Click the button that says "Load unpacked". A file dialog will open, navigate to your project folder and select the folderhello-world-browser-plugin
. Your plugin should now be loaded and running.Note the difference, of selecting the file
manifest.json
in firefox, and selecting the folderhello-world-browser-plugin
in chrome. Otherwise, the process is the same. So I'll repeat the same text as above: (for those who skipped ahead..)Go to a website, any website, and open the inspector then navigate to the console. You'll find the inspector by right-clicking anywhere within the webpage, and click "Inspector" in the drop-down menu. When opening the console you might see some log messages from the site you visited and... you should see the text "Hello World!" printed there, from our little plugin! Congratulations!
As you can see this isn't as complicated as one might think. Having preformed a "Hello-World!"-project is a very useful and valuable first step. These setup steps are the basics for any browser plugin, and you can build on this to create more advanced plugins.
-
@ 2ad33996:3999d22a
2024-06-28 23:04:07Bitmain Antminer KS3: Guía de Instalación y Configuración Instrucciones paso a paso para instalar y configurar correctamente el Bitmain Antminer KS3, optimizando su funcionamiento desde el primer día.
este articulo fue escrito originalmente en iceriveroutlet
RESUMEN: El Bitmain Antminer KS3 destaca en el mercado de minería de criptomonedas por su rendimiento de 9.4 TH/s y eficiencia energética de 3500W. Este resumen te guía a través de su tecnología avanzada, opciones de compra recomendadas y estrategias para optimizar su operación en Kaspa. En este artículo, exploraremos todo lo que necesitas saber sobre el precio del Antminer KS3, su rentabilidad, y cómo utilizar un calculadora del Antminer KS3 para maximizar tus ganancias. También te guiaremos sobre dónde y cómo comprar el Antminer KS3 de manera segura y al mejor precio. La minería de criptomonedas puede ser un campo complicado, especialmente cuando se trata de elegir el hardware adecuado. El Bitmain Antminer KS3 no solo ofrece un rendimiento excepcional, sino que también es conocido por su durabilidad y eficiencia energética. Esto lo convierte en una opción ideal tanto para mineros novatos como para profesionales experimentados. ¿Por qué es importante conocer el rendimiento del Antminer KS3 y su rentabilidad? Entender estos aspectos te permitirá tomar decisiones informadas y optimizar tu inversión. Además, te proporcionaremos herramientas y consejos prácticos para utilizar el calculadora del Antminer KS3 y evaluar su rendimiento en tiempo real. Prepárate para descubrir cómo el Antminer KS3 puede transformar tu enfoque de minería de Kaspa y llevar tus ganancias al siguiente nivel. ¡Sigue leyendo para obtener toda la información que necesitas!---
¿Por Qué Elegir Comprar el Bitmain Antminer KS3 para Minar Kaspa? El Bitmain Antminer KS3 es conocido por su alta eficiencia y rendimiento en la minería de Kaspa. Este minero utiliza el algoritmo KHeavyHash y ofrece un hashrate máximo de 9.4 TH/s con un consumo de energía de solo 3500W. En esta sección, discutiremos las características clave que hacen que el Antminer KS3 sea una opción superior para los mineros de Kaspa. Alta Eficiencia Energética Uno de los principales motivos para elegir el Antminer KS3 es su eficiencia energética. Con un consumo de solo 3500W, este minero ofrece un rendimiento excepcional sin disparar tus costos de electricidad. Comparado con otros mineros en el mercado, el KS3 destaca por su capacidad de ofrecer un hashrate de 9.4 TH/s mientras mantiene un consumo energético moderado. Consumo de Energía: 3500W Hashrate: 9.4 TH/s Eficiencia Energética: 0.37 J/GH Rendimiento Superior
El rendimiento del Antminer KS3 es otro factor crucial que lo convierte en una opción ideal para la minería de Kaspa. Gracias a su avanzado chip semiconductor y configuración de hashboard, el KS3 puede manejar grandes volúmenes de datos de manera eficiente. Esto se traduce en una mayor rentabilidad para los mineros. En comparación con otros modelos como el Iceriver KS3, que ofrece un hashrate de 8 TH/s con un consumo de 3200W, el Antminer KS3 no solo proporciona un mejor rendimiento, sino que también es más eficiente en términos de consumo energético. Testimonios de Usuarios
Los testimonios de usuarios también avalan la superioridad del Bitmain Antminer KS3. Mineros de todo el mundo han elogiado su rendimiento y eficiencia. “El Antminer KS3 ha superado mis expectativas. Su rendimiento es excepcional y su consumo de energía es mucho menor comparado con otros mineros que he utilizado.” – Tyrone Wheeler “Recomiendo encarecidamente el Antminer KS3 para aquellos que buscan una solución de minería eficiente y rentable. Su operación silenciosa y rendimiento impresionante hacen que valga cada centavo.” – Atwater Blair Comparaciones con Otros Mineros Para entender mejor por qué comprar el Bitmain Antminer KS3 es una opción superior, es útil compararlo con otros mineros en el mercado. A continuación, se presenta una tabla comparativa: ModeloHashrateConsumo de EnergíaEficiencia EnergéticaAntminer KS39.4 TH/s3500W0.37 J/GHIceriver KS38 TH/s3200W0.40 J/GHGoldshell KA37.3 TH/s3000W0.41 J/GH Como se puede observar, el Antminer KS3 no solo ofrece un mayor hashrate, sino que también es más eficiente energéticamente que sus competidores. Esto lo convierte en una opción superior para aquellos que buscan maximizar su rentabilidad en la minería de Kaspa. ¿Dónde Comprar el Bitmain Antminer KS3? Comprar el Bitmain Antminer KS3 puede ser una inversión significativa, por lo que es crucial elegir el proveedor adecuado. En esta sección, exploraremos las mejores tiendas y plataformas en línea para comprar el Antminer KS3, asegurando que obtengas el mejor precio y servicio. Para ayudarte a tomar una decisión informada, hemos recopilado información sobre las tiendas en línea más confiables, sus ventajas y testimonios de clientes satisfechos. Tiendas en Línea Confiables
Existen varias tiendas en línea donde puedes comprar el Antminer KS3. A continuación, te presentamos algunas de las más recomendadas: Iceriver Outlet: Reconocida como la mejor tienda de mineros en China en 2023, Iceriver Outlet ofrece precios impresionantes y envíos globales. Su compromiso con la calidad y el servicio al cliente es altamente valorado. Minerstat: Además de vender el Antminer KS3, Minerstat proporciona herramientas y software de monitoreo para optimizar tu experiencia de minería. Su calculadora de rentabilidad es especialmente útil para evaluar el rendimiento del minero. Ventajas de Comprar en Estas Tiendas Al elegir una tienda en línea confiable, aseguras no solo la calidad del producto, sino también un buen servicio postventa. Aquí te mencionamos algunas de las ventajas de comprar en las tiendas recomendadas: Iceriver Outlet: Con precios atractivos y envíos rápidos a nivel mundial, esta tienda es ideal para aquellos que buscan maximizar su inversión desde el primer día. Minerstat: Además de vender el Antminer KS3, ofrecen herramientas de monitoreo y optimización que pueden ayudarte a mejorar la rentabilidad de tu operación minera. Testimonios de Clientes Los testimonios de otros mineros pueden ser una excelente fuente de información al tomar tu decisión. Aquí te compartimos algunas opiniones de clientes satisfechos: “Compré mi Antminer KS3 en IceriverOutlet y la experiencia fue excelente. El proceso de compra fue sencillo y el soporte al cliente, insuperable.” – Cyril Baldwin “Iceriver Outlet ofrece los mejores precios y un servicio de primera. Mi Antminer KS3 llegó perfecto y su rendimiento es increíble. ¡Gracias, Iceriver!” – Laura M. “Minerstat no solo me vendió el Antminer KS3, sino que también me proporcionó herramientas para optimizar mi minería. Muy recomendable.” – Pedro G. Al considerar estas opciones y testimonios, estarás mejor preparado para tomar una decisión informada y obtener el mejor rendimiento de tu inversión en el Antminer KS3.
Cómo Maximizar la Rentabilidad con el Antminer KS3 Para maximizar la rentabilidad con el Antminer KS3, es esencial optimizar su configuración y monitorear su rendimiento. En esta sección, discutiremos cómo utilizar calculadoras de minería y herramientas de monitoreo para asegurar que tu Antminer KS3 esté funcionando de manera óptima. Configuraciones Óptimas El primer paso para maximizar la rentabilidad de tu Antminer KS3 es asegurarte de que esté configurado correctamente. Aquí hay algunas configuraciones recomendadas: Frecuencia de Hash: Ajusta la frecuencia de hash para equilibrar el rendimiento y el consumo de energía. Voltaje: Configura el voltaje adecuado para evitar el sobrecalentamiento y mejorar la eficiencia energética. Enfriamiento: Asegúrate de que el sistema de enfriamiento esté funcionando correctamente para mantener una temperatura óptima. Estas configuraciones pueden variar según el entorno y las condiciones específicas de tu operación minera. Experimenta con diferentes ajustes para encontrar la configuración que maximice tu rentabilidad. Herramientas de Monitoreo El monitoreo constante del rendimiento de tu Antminer KS3 es crucial para mantener su eficiencia. Aquí hay algunas herramientas recomendadas: Iceriver Outlet: Ofrece monitoreo en tiempo real y análisis detallados del rendimiento del minero. Awesome Miner: Proporciona una plataforma de gestión centralizada para múltiples mineros, permitiendo ajustes rápidos y eficientes. Hashrate.no: Permite el seguimiento del hashrate y el consumo de energía para optimizar la rentabilidad. Utilizar estas herramientas te permitirá identificar rápidamente cualquier problema y realizar ajustes necesarios para mantener tu Antminer KS3 funcionando de manera óptima. Uso de Calculadoras de Minería Las calculadoras de minería son una herramienta esencial para evaluar la rentabilidad de tu Antminer KS3. Estas calculadoras te permiten ingresar parámetros como el hashrate, el consumo de energía y el costo de la electricidad para estimar tus ganancias potenciales. Algunas calculadoras recomendadas incluyen:
Iceriveroutlet Calculator: Proporciona estimaciones precisas basadas en datos actualizados del mercado. WhatToMine: Ofrece una amplia gama de opciones de configuración para diferentes criptomonedas. CryptoCompare: Permite comparar la rentabilidad de diferentes mineros y algoritmos. Al utilizar estas calculadoras, podrás tomar decisiones informadas sobre cuándo y cómo ajustar tu operación minera para maximizar las ganancias. Optimización del Consumo Energético El consumo energético es uno de los factores más importantes que afectan la rentabilidad de tu Antminer KS3. Aquí hay algunos consejos para optimizar el consumo energético: Uso de Energía Renovable: Considera la posibilidad de utilizar fuentes de energía renovable para reducir los costos de electricidad. Optimización del Enfriamiento: Asegúrate de que el sistema de enfriamiento sea eficiente para evitar el sobrecalentamiento y el consumo excesivo de energía. Monitoreo del Consumo: Utiliza herramientas de monitoreo para rastrear el consumo de energía y realizar ajustes según sea necesario. Implementar estas estrategias te ayudará a reducir los costos operativos y aumentar la rentabilidad de tu operación minera. Transforma tu Minería con el Antminer KS3 El Bitmain Antminer KS3 se posiciona como una de las mejores opciones para minar Kaspa, gracias a su impresionante hashrate de 9.4 TH/s y su eficiencia energética. A lo largo de este artículo, hemos explorado sus características, ventajas y cómo maximizar su rentabilidad. Uno de los puntos más destacados es su alta eficiencia energética, que no solo reduce los costos operativos, sino que también permite obtener un rendimiento superior en comparación con otros mineros del mercado. Además, el soporte de diversas herramientas de monitoreo y calculadoras de rentabilidad te ayudará a optimizar su desempeño y aumentar tus ganancias. Para adquirir el Antminer KS3, es crucial elegir una tienda en línea confiable. Tiendas como Iceriver Outlet y Minerstat no solo ofrecen precios competitivos, sino también un excelente servicio al cliente y soporte técnico. Estas plataformas te aseguran una compra segura y una experiencia de minería sin complicaciones. Finalmente, para maximizar la rentabilidad de tu Antminer KS3, es esencial optimizar sus configuraciones y utilizar herramientas de monitoreo como Minerstat y Awesome Miner. Estas herramientas te permitirán ajustar la frecuencia de hash, el voltaje y el sistema de enfriamiento, asegurando un funcionamiento eficiente y rentable. Invierte en el Antminer KS3 y lleva tu minería de Kaspa al siguiente nivel. Comparte tus experiencias y dudas en los comentarios, y no olvides explorar más contenido en IceriverOutlet para seguir optimizando tu inversión en criptomonedas.
-
@ 8fb140b4:f948000c
2023-08-22 12:14:34As the title states, scratch behind my ear and you get it. 🐶🐾🫡
-
@ 8fb140b4:f948000c
2023-07-30 00:35:01Test Bounty Note
-
@ 8fb140b4:f948000c
2023-07-22 09:39:48Intro
This short tutorial will help you set up your own Nostr Wallet Connect (NWC) on your own LND Node that is not using Umbrel. If you are a user of Umbrel, you should use their version of NWC.
Requirements
You need to have a working installation of LND with established channels and connectivity to the internet. NWC in itself is fairly light and will not consume a lot of resources. You will also want to ensure that you have a working installation of Docker, since we will use a docker image to run NWC.
- Working installation of LND (and all of its required components)
- Docker (with Docker compose)
Installation
For the purpose of this tutorial, we will assume that you have your lnd/bitcoind running under user bitcoin with home directory /home/bitcoin. We will also assume that you already have a running installation of Docker (or docker.io).
Prepare and verify
git version - we will need git to get the latest version of NWC. docker version - should execute successfully and show the currently installed version of Docker. docker compose version - same as before, but the version will be different. ss -tupln | grep 10009- should produce the following output: tcp LISTEN 0 4096 0.0.0.0:10009 0.0.0.0: tcp LISTEN 0 4096 [::]:10009 [::]:**
For things to work correctly, your Docker should be version 20.10.0 or later. If you have an older version, consider installing a new one using instructions here: https://docs.docker.com/engine/install/
Create folders & download NWC
In the home directory of your LND/bitcoind user, create a new folder, e.g., "nwc" mkdir /home/bitcoin/nwc. Change to that directory cd /home/bitcoin/nwc and clone the NWC repository: git clone https://github.com/getAlby/nostr-wallet-connect.git
Creating the Docker image
In this step, we will create a Docker image that you will use to run NWC.
- Change directory to
nostr-wallet-connect
:cd nostr-wallet-connect
- Run command to build Docker image:
docker build -t nwc:$(date +'%Y%m%d%H%M') -t nwc:latest .
(there is a dot at the end) - The last line of the output (after a few minutes) should look like
=> => naming to docker.io/library/nwc:latest
nwc:latest
is the name of the Docker image with a tag which you should note for use later.
Creating docker-compose.yml and necessary data directories
- Let's create a directory that will hold your non-volatile data (DB):
mkdir data
- In
docker-compose.yml
file, there are fields that you want to replace (<> comments) and port “4321” that you want to make sure is open (check withss -tupln | grep 4321
which should return nothing). - Create
docker-compose.yml
file with the following content, and make sure to update fields that have <> comment:
version: "3.8" services: nwc: image: nwc:latest volumes: - ./data:/data - ~/.lnd:/lnd:ro ports: - "4321:8080" extra_hosts: - "localhost:host-gateway" environment: NOSTR_PRIVKEY: <use "openssl rand -hex 32" to generate a fresh key and place it inside ""> LN_BACKEND_TYPE: "LND" LND_ADDRESS: localhost:10009 LND_CERT_FILE: "/lnd/tls.cert" LND_MACAROON_FILE: "/lnd/data/chain/bitcoin/mainnet/admin.macaroon" DATABASE_URI: "/data/nostr-wallet-connect.db" COOKIE_SECRET: <use "openssl rand -hex 32" to generate fresh secret and place it inside ""> PORT: 8080 restart: always stop_grace_period: 1m
Starting and testing
Now that you have everything ready, it is time to start the container and test.
- While you are in the
nwc
directory (important), execute the following command and check the log output,docker compose up
- You should see container logs while it is starting, and it should not exit if everything went well.
- At this point, you should be able to go to
http://<ip of the host where nwc is running>:4321
and get to the interface of NWC - To stop the test run of NWC, simply press
Ctrl-C
, and it will shut the container down. - To start NWC permanently, you should execute
docker compose up -d
, “-d” tells Docker to detach from the session. - To check currently running NWC logs, execute
docker compose logs
to run it in tail mode add-f
to the end. - To stop the container, execute
docker compose down
That's all, just follow the instructions in the web interface to get started.
Updating
As with any software, you should expect fixes and updates that you would need to perform periodically. You could automate this, but it falls outside of the scope of this tutorial. Since we already have all of the necessary configuration in place, the update execution is fairly simple.
- Change directory to the clone of the git repository,
cd /home/bitcoin/nwc/nostr-wallet-connect
- Run command to build Docker image:
docker build -t nwc:$(date +'%Y%m%d%H%M') -t nwc:latest .
(there is a dot at the end) - Change directory back one level
cd ..
- Restart (stop and start) the docker compose config
docker compose down && docker compose up -d
- Done! Optionally you may want to check the logs:
docker compose logs
-
@ d2e97f73:ea9a4d1b
2023-04-11 19:36:53There’s a lot of conversation around the #TwitterFiles. Here’s my take, and thoughts on how to fix the issues identified.
I’ll start with the principles I’ve come to believe…based on everything I’ve learned and experienced through my past actions as a Twitter co-founder and lead:
- Social media must be resilient to corporate and government control.
- Only the original author may remove content they produce.
- Moderation is best implemented by algorithmic choice.
The Twitter when I led it and the Twitter of today do not meet any of these principles. This is my fault alone, as I completely gave up pushing for them when an activist entered our stock in 2020. I no longer had hope of achieving any of it as a public company with no defense mechanisms (lack of dual-class shares being a key one). I planned my exit at that moment knowing I was no longer right for the company.
The biggest mistake I made was continuing to invest in building tools for us to manage the public conversation, versus building tools for the people using Twitter to easily manage it for themselves. This burdened the company with too much power, and opened us to significant outside pressure (such as advertising budgets). I generally think companies have become far too powerful, and that became completely clear to me with our suspension of Trump’s account. As I’ve said before, we did the right thing for the public company business at the time, but the wrong thing for the internet and society. Much more about this here: https://twitter.com/jack/status/1349510769268850690
I continue to believe there was no ill intent or hidden agendas, and everyone acted according to the best information we had at the time. Of course mistakes were made. But if we had focused more on tools for the people using the service rather than tools for us, and moved much faster towards absolute transparency, we probably wouldn’t be in this situation of needing a fresh reset (which I am supportive of). Again, I own all of this and our actions, and all I can do is work to make it right.
Back to the principles. Of course governments want to shape and control the public conversation, and will use every method at their disposal to do so, including the media. And the power a corporation wields to do the same is only growing. It’s critical that the people have tools to resist this, and that those tools are ultimately owned by the people. Allowing a government or a few corporations to own the public conversation is a path towards centralized control.
I’m a strong believer that any content produced by someone for the internet should be permanent until the original author chooses to delete it. It should be always available and addressable. Content takedowns and suspensions should not be possible. Doing so complicates important context, learning, and enforcement of illegal activity. There are significant issues with this stance of course, but starting with this principle will allow for far better solutions than we have today. The internet is trending towards a world were storage is “free” and infinite, which places all the actual value on how to discover and see content.
Which brings me to the last principle: moderation. I don’t believe a centralized system can do content moderation globally. It can only be done through ranking and relevance algorithms, the more localized the better. But instead of a company or government building and controlling these solely, people should be able to build and choose from algorithms that best match their criteria, or not have to use any at all. A “follow” action should always deliver every bit of content from the corresponding account, and the algorithms should be able to comb through everything else through a relevance lens that an individual determines. There’s a default “G-rated” algorithm, and then there’s everything else one can imagine.
The only way I know of to truly live up to these 3 principles is a free and open protocol for social media, that is not owned by a single company or group of companies, and is resilient to corporate and government influence. The problem today is that we have companies who own both the protocol and discovery of content. Which ultimately puts one person in charge of what’s available and seen, or not. This is by definition a single point of failure, no matter how great the person, and over time will fracture the public conversation, and may lead to more control by governments and corporations around the world.
I believe many companies can build a phenomenal business off an open protocol. For proof, look at both the web and email. The biggest problem with these models however is that the discovery mechanisms are far too proprietary and fixed instead of open or extendable. Companies can build many profitable services that complement rather than lock down how we access this massive collection of conversation. There is no need to own or host it themselves.
Many of you won’t trust this solution just because it’s me stating it. I get it, but that’s exactly the point. Trusting any one individual with this comes with compromises, not to mention being way too heavy a burden for the individual. It has to be something akin to what bitcoin has shown to be possible. If you want proof of this, get out of the US and European bubble of the bitcoin price fluctuations and learn how real people are using it for censorship resistance in Africa and Central/South America.
I do still wish for Twitter, and every company, to become uncomfortably transparent in all their actions, and I wish I forced more of that years ago. I do believe absolute transparency builds trust. As for the files, I wish they were released Wikileaks-style, with many more eyes and interpretations to consider. And along with that, commitments of transparency for present and future actions. I’m hopeful all of this will happen. There’s nothing to hide…only a lot to learn from. The current attacks on my former colleagues could be dangerous and doesn’t solve anything. If you want to blame, direct it at me and my actions, or lack thereof.
As far as the free and open social media protocol goes, there are many competing projects: @bluesky is one with the AT Protocol, nostr another, Mastodon yet another, Matrix yet another…and there will be many more. One will have a chance at becoming a standard like HTTP or SMTP. This isn’t about a “decentralized Twitter.” This is a focused and urgent push for a foundational core technology standard to make social media a native part of the internet. I believe this is critical both to Twitter’s future, and the public conversation’s ability to truly serve the people, which helps hold governments and corporations accountable. And hopefully makes it all a lot more fun and informative again.
💸🛠️🌐 To accelerate open internet and protocol work, I’m going to open a new category of #startsmall grants: “open internet development.” It will start with a focus of giving cash and equity grants to engineering teams working on social media and private communication protocols, bitcoin, and a web-only mobile OS. I’ll make some grants next week, starting with $1mm/yr to Signal. Please let me know other great candidates for this money.
-
@ 82341f88:fbfbe6a2
2023-04-11 19:36:53There’s a lot of conversation around the #TwitterFiles. Here’s my take, and thoughts on how to fix the issues identified.
I’ll start with the principles I’ve come to believe…based on everything I’ve learned and experienced through my past actions as a Twitter co-founder and lead:
- Social media must be resilient to corporate and government control.
- Only the original author may remove content they produce.
- Moderation is best implemented by algorithmic choice.
The Twitter when I led it and the Twitter of today do not meet any of these principles. This is my fault alone, as I completely gave up pushing for them when an activist entered our stock in 2020. I no longer had hope of achieving any of it as a public company with no defense mechanisms (lack of dual-class shares being a key one). I planned my exit at that moment knowing I was no longer right for the company.
The biggest mistake I made was continuing to invest in building tools for us to manage the public conversation, versus building tools for the people using Twitter to easily manage it for themselves. This burdened the company with too much power, and opened us to significant outside pressure (such as advertising budgets). I generally think companies have become far too powerful, and that became completely clear to me with our suspension of Trump’s account. As I’ve said before, we did the right thing for the public company business at the time, but the wrong thing for the internet and society. Much more about this here: https://twitter.com/jack/status/1349510769268850690
I continue to believe there was no ill intent or hidden agendas, and everyone acted according to the best information we had at the time. Of course mistakes were made. But if we had focused more on tools for the people using the service rather than tools for us, and moved much faster towards absolute transparency, we probably wouldn’t be in this situation of needing a fresh reset (which I am supportive of). Again, I own all of this and our actions, and all I can do is work to make it right.
Back to the principles. Of course governments want to shape and control the public conversation, and will use every method at their disposal to do so, including the media. And the power a corporation wields to do the same is only growing. It’s critical that the people have tools to resist this, and that those tools are ultimately owned by the people. Allowing a government or a few corporations to own the public conversation is a path towards centralized control.
I’m a strong believer that any content produced by someone for the internet should be permanent until the original author chooses to delete it. It should be always available and addressable. Content takedowns and suspensions should not be possible. Doing so complicates important context, learning, and enforcement of illegal activity. There are significant issues with this stance of course, but starting with this principle will allow for far better solutions than we have today. The internet is trending towards a world were storage is “free” and infinite, which places all the actual value on how to discover and see content.
Which brings me to the last principle: moderation. I don’t believe a centralized system can do content moderation globally. It can only be done through ranking and relevance algorithms, the more localized the better. But instead of a company or government building and controlling these solely, people should be able to build and choose from algorithms that best match their criteria, or not have to use any at all. A “follow” action should always deliver every bit of content from the corresponding account, and the algorithms should be able to comb through everything else through a relevance lens that an individual determines. There’s a default “G-rated” algorithm, and then there’s everything else one can imagine.
The only way I know of to truly live up to these 3 principles is a free and open protocol for social media, that is not owned by a single company or group of companies, and is resilient to corporate and government influence. The problem today is that we have companies who own both the protocol and discovery of content. Which ultimately puts one person in charge of what’s available and seen, or not. This is by definition a single point of failure, no matter how great the person, and over time will fracture the public conversation, and may lead to more control by governments and corporations around the world.
I believe many companies can build a phenomenal business off an open protocol. For proof, look at both the web and email. The biggest problem with these models however is that the discovery mechanisms are far too proprietary and fixed instead of open or extendable. Companies can build many profitable services that complement rather than lock down how we access this massive collection of conversation. There is no need to own or host it themselves.
Many of you won’t trust this solution just because it’s me stating it. I get it, but that’s exactly the point. Trusting any one individual with this comes with compromises, not to mention being way too heavy a burden for the individual. It has to be something akin to what bitcoin has shown to be possible. If you want proof of this, get out of the US and European bubble of the bitcoin price fluctuations and learn how real people are using it for censorship resistance in Africa and Central/South America.
I do still wish for Twitter, and every company, to become uncomfortably transparent in all their actions, and I wish I forced more of that years ago. I do believe absolute transparency builds trust. As for the files, I wish they were released Wikileaks-style, with many more eyes and interpretations to consider. And along with that, commitments of transparency for present and future actions. I’m hopeful all of this will happen. There’s nothing to hide…only a lot to learn from. The current attacks on my former colleagues could be dangerous and doesn’t solve anything. If you want to blame, direct it at me and my actions, or lack thereof.
As far as the free and open social media protocol goes, there are many competing projects: @bluesky is one with the AT Protocol, nostr another, Mastodon yet another, Matrix yet another…and there will be many more. One will have a chance at becoming a standard like HTTP or SMTP. This isn’t about a “decentralized Twitter.” This is a focused and urgent push for a foundational core technology standard to make social media a native part of the internet. I believe this is critical both to Twitter’s future, and the public conversation’s ability to truly serve the people, which helps hold governments and corporations accountable. And hopefully makes it all a lot more fun and informative again.
💸🛠️🌐 To accelerate open internet and protocol work, I’m going to open a new category of #startsmall grants: “open internet development.” It will start with a focus of giving cash and equity grants to engineering teams working on social media and private communication protocols, bitcoin, and a web-only mobile OS. I’ll make some grants next week, starting with $1mm/yr to Signal. Please let me know other great candidates for this money.
-
@ 75bf2353:e1bfa895
2024-06-28 18:05:13Don't Trust, Verify
A few months ago, I watched the Madoff documentary on Netflix. According to the documentary Madoff was a respected, founder of the NASDAQ stock exchange, and ran the biggest Ponzi Scheme in history. He also happened to be of Jewish descent.(This is important an important detail to the story, no anti-semitism intended). Because of his ancestory, Madoff befriended prominant rich people within the Jewish community. He leveraged his religion, culture, and esteem to his advantage. Steven Spielberg and Elize Wiezel were among his victims.
Spielburg is one of the most famous directors, but Wiesel was best known for his memoire, Night, a book about his experience at Auschwitz and Buchenwald. He told the story of waving goodbye to his mother and sister as they stood in line for the oven. Oprah interviewed him. Bernie Madoff made promises. He promised to invest his client's money. I would bet his victims spoke highly of capability given his high returns. He was Jewish too. Most people tend to like other people who share the same cultural values as they do. This is not unique to Jewish culture, it's a hypothesis of every culture. Who could understand the investment needs of Jewish people better than someone who observed Chaunaka and understood the struggles Jewish people had to suffer? In other words, some smart people found Bernie Madoff easy to trust because his cultural heritage matched their cultural heritage. There was just one problem. All cultures include a certain percentage of untrustworthy people like a bug in computer software.
Bernie Madoff was a crook and although he did not cause the Great Financial Crisis, he became the poster boy. When things go bad, good people look for a scapegoat. Bernie did not make his money off of these plants but stole some of the money from a Holocaust survivor. I'm not saying drugs are good, but Bernie Madoff deserves a special place in hell.
He didn't have anything to do with the collapse of Lehman Brothers though. He didn't cause the bank runs. He didn't buy or sell Mortgage-backed securities and derivitives. Almost nobody went to prison for the great financial crisis. Most people involved got a bailout of almost one trillion dollars. Bernie, founder of the GOAT Ponzi died in prison.
The Anatomy of A Ponzi
The word Ponzi comes from the con-man, Charles Ponzi who is credited with inventing the scheme. It works like this. The scammer tells Paul, "I've been getting 21% returns in the stock market. Do you want in on this?"
Paul thinks..."That sounds too good to be true, but I know Charles. He's a good guy. He also belongs to the Church of the Flying Spaghetti Monster just like me! 👍"
”Sure. Here's $100,000. TO THE MOONBEAM!"
Charles takes the $100,000. That's it. He doesn't invest it.
"Yo Peter! I got this hot investment tip. I've made 21% for 5 years. It uses 'blockchain technology.’ You know what that means?
"TO THE MOONBEAM! Here's a check for $200,000,” Peter says.
Charles doesn't invest Peter's money either. He calls Paul instead. "You're not gonna believe this. Video games on a blockchain already went to the moonbeam. I can give you $125,000 or you can let it ride."
"Doood...That's awesome. I'll take my chips off the table," Peter says.
Charles pays Peter $125,000. He made $75,000 off this scam. What if Peter wants his money back? No problem. Mary just called. "Hey! I ran into Paul at the Church of the Flying Spaghetti Monster. He tells me you made his money Moonbeam. I have $400,000, my life's savings. Can you make it moonbeam?"
"Of course. TO THE MOONBEAM!"
Video games on a blockchain are an obvious scam-coin Ponzi scheme. Ponzi schemes come in many shapes and sizes, but you've heard this story before --Robbing Peter to pay Paul. Ponzi schemes are yet another way to describe something we've been over before -The double spending problem. That's all a Ponzi scheme is. Peter gives Charles money. He spends this money on Paul and keeps some for himself. Meanwhile, Peter thinks Charles did not spend his money and still believes that money is still there for him to spend in the future. We have an idiom in the United States. "You can't have your cake and eat it too." If you eat the cake, it ceases to exist. Therefore, you no longer have it once it is eaten. Paul gave Charles his piece of cake with the expectation of eating 1.21 cakes in the future. Charles already ate Paul's cake though, so he had to give Paul Peter's cake.
The same is true of money. You can't have your money and spend it too. You also can't have your money if Charles spends your money unless Charles robs Peter to pay Paul. Then, Peter can't have his money unless Charles also robs Mary. When there's no money left to rob the entire system falls apart.
Fractional Reserve Banking Is A Ponzi Scheme And Bitcoin Fixes This
"A purely peer-to-peer version of electronic cash would allow online payments to be sent directly from one party to another without going through a financial institution." -- Satoshi Nakamoto, Bitcoin: A Peer To Peer Electronic Cash System
"I've developed a new open-source P2P e-cash system called Bitcoin. It's completely decentralized, with no central server or trusted parties, because everything is based on crypto proof instead of trust. Give it a try, or take a look at the screenshots and design paper...
The root problem with conventional currency is all the trust that's required to make it work. The central bank must be trusted not to debase the currency, but the history of fiat currencies is full of breaches of that trust. Banks must be trusted to hold our money and transfer it electronically, but they lend it out in waves of credit bubbles with barely a fraction in reserve. We have to trust them with our privacy, and trust them not to let identity thieves drain our accounts. Their massive overhead costs make micropayments impossible." - Satoshi Nakamoto. February 11, 2009
"Hey, Paul. Are you interested in a blockchain? Look at my charts. To the moo..
"Nah, man. I got this new thing. Here's how it works. First, I write down 12 words. Then, I tell you to go fuck yourself."
Now Paul holds his own keys. His money becomes valuable by doing nothing. Nobody can guarantee this, but those who accept the quantity theory of money expect bitcoin to get this as long as more people adopt it. Almost every other asset on the planet requires permission to own and must be held by a trusted third party. Your stocks can be confiscated. Most people need permission from a bank to buy a home. They don't print money for everyone. Many people may never qualify for a mortgage, but the value of their savings will degrade faster than house paint. We will learn later that all other cryptocurrencies suffer this same fate.
This money goes down because the government is incentivized to print money, but they can't print steer. Therefore, more dollars chase more ground beef. Ground beef, as well as everything else, goes up in price when compared to dollars. This is why Dollar Tree no longer sells anything for less than $1.25 and many items cost much more. This is also why so many people young people saving in dollars will find it so difficult to buy a mortgage now.
Paul saved fiat to put a down payment on a house for five years. Then the pandemic happened. Peter stayed home. Paul stayed home. The government gives Paul $1,200 and a cushy unemployment check. They also cut a $1,200 check to Peter plus an additional $80,000 "loan." When the loan is forgiven, Peter buys a second home and rents it for 40% more than he could have got before the pandemic because the house is worth 40% more. When Paul begins working again. He had $20,000 saved for a down payment, but can no longer compete with $80,000 down payment Peter has. He is priced out of the market and has student loans to pay.
People blame capitalism, but this is not capitalism. This is the Cantillon effect under a socialist monetary system. Adam Smith wrote about capitalism in 1776 in The Wealth of Nations. He described it as an invisible hand. The baker, the brewer, and the butcher all work to make life better for themselves. The baker sells his bread to the butcher, the brewer sells beer to the baker and they all prosper based on their proof of work. The free market is the invisible hand. The modern financial system is something else, not capitalism as Adam Smith described. There is no more "invisible hand." There is a hand that picks winners and losers and everyone can see it like a trick a bad magician attempts.
The point is, that you cannot trust the government. You can verify every sat you own with a $400 computer and about ten minutes of competition. You cannot verify the amount of Social Security you will receive or what age they will give it to you. (if at all) Say you make $40,000 a year. This means about $100 of your paycheck goes to social security. If the government put bought bitcoin with that money for nine years, you would have $1,656,380 for your retirement at the time of this writing.
If you retire at 65 and expect to live to 100, you could spend 47,325.14 every year for the rest of your life. Of course, this assumes bitcoin ceases to go up in price. That is capatalism. That is capital. Social Security is socialism. What other context do you think the word "social" means?
Bitcoin is real capitalism. The economic regimes of the world are not capitalism. They are a Frankenstien-esque amalgomation of socialism, capatalism, communism, and fachism. Natalie Smolenski says this new economic system is being called a controlled economy by modern French economists. This is the best definition I've heard, dirigisme h/t Natalie Smolenski
Bitcoin Is Hope
That's why Bitcoin is hope. This is not the glittering generality you might see on a presidential campaign poster. My mom remembers buying mayonnaise for a nickel. In End The Fed, Ron Paul says he "learned the value of a penny," as a kid. A few weeks ago, while in my office, my 14-year-old son screamed, "Dad! Get down here!”
I thought he was bleeding. "Wh...Wha..What happened?!!!"
”These cheese and pretzels used to have 6 pretzels and now they have 5! IT'S SHRINKFLATION!"
Before the pandemic, 6 pretzels and a gob of cheese product cost $1.00. Now 5 pretzels and a smaller gob of cheese product cost $1.99. When teenagers notice inflation like your grandparents, there's a problem. Another way to put it is there is a double spending problem. Do you see it?
That is the hope of Bitcoin. We hope the technology that solved the double spending problem fixes this. If it does, Peter can hold his own money. He doesn't need to keep it in a savings account that pays 0.01% interest. He doesn't need to hand it over to an investment banker, a corporation that buys all the houses, a government that promises to take care of you in your old age, or the next Bernie Madoff.
He just needs to hold Bitcoin himself. Bitcoin will do what it is programmed to do. He runs a node. He stamps steel. He learns how to use passphrases and multi-signature. He stacks sats.
What If Bitcoin Is The MySpace of Money?
I never heard FTX until about 2016 blocks before the collapse. I heard SBF paid politicians like a Wiseguy, paid for commercials with Tom Brady on the Superbowl, and gambled customer bitcoin away. Bitcoin had an immaculate conception. It wasn't worth anything for two years.
I haven't watched the Super Bowl in over a decade. I don't know why people scream when someone scores a touchdown. I know American Football players are notoriously bad with money. I have no idea why anybody would take investment advice from someone who spends as much time learning about football as I have spent learning about Bitcoin.
I suspect it's an old-fashioned affinity scam. Tom Brady plays for "my team," whatever that means. He's a winner and I want to be on team winner. He's betting on FTX so I'm betting on FTX. People trust Tom Brady like they trusted Bernie Madoff. Humans are hard-wired to trust people who have a lot of money, claim to believe the same religious stories or wear a nice suit. We have a motto to protect us from this tendency.
Don't trust, verify.
Ronald Regan is credited with saying, "Trust, but verify," but I haven't actually verified this quote. Nevertheless, bitcoiners modified this quote to reflect the fact that Bitcoin is math and can be verified the same way a high school freshman verifies algebra. It's all math on a computer network. Therefore, if you run your own full node, you can verify you retain control of every sat you owe.
The centralized fiat debt system has:
- Bank bailouts
- National debt
- Unfunded liabilities
- The Cost of the top 150 items Americans Spend Money On
- Multi-trillion budgets
- Stimulus checks
- PPP loan forgiveness
- Soverign wealth confiscation
There Is No Next Bitcoin
]
--Knut Svanholm. Independence Reimagined.
This book is titled after the first sentence of the the bitcoin white paper. Now it's time to peruse the second sentence. "Digital signatures provide part of the solution, but the main benefits are lost if a trusted third party is still required to prevent double-spending." Digital signatures are cryptography. Cryptography is math. Cryptography is useful. You might find a few uses for a couple of shitcoins, but value is subjective and not determined by utility. Nostr is an example of a digital signature. It uses the same cryptography bitcoin uses to sign transactions to sing notes... and other stuff. In other words, signing a nostr note and signing a bitcoin transaction share one attribute: The same type of digital signature.
As a matter of fact, a Bitcoin key is not much different from a nostr key. When we posted a note on nostr, we were digitally signing that note with our private key and broadcasting it. We will also do this with bitcoin transactions, but that's where the similarity ends. According to Satoshi, digital signatures are not the only thing required for a peer-to-peer electronic cash system. They are only part of the solution.
Digital signatures have utility. They are great for PGP, holepunch, bittorrent, nostr, and secure websites. I hate to admit it, but even banks use cryptography. The three digits on the back of your credit. card are also a private key, but the problem is, you need to give this private key to every merchant. Cryptography is useful. The cypherpunks thought it could be used to achieve freedom. I tend to agree.
Although cryptography has utility, this does not mean there will ever be the "next bitcoin." Don't fall into the trap, like so many shotcoiners, of thinking Bitcoin is the MySpace of crypto. Bitcoin is a protocol. It is the https:// of https://www.myspace.com and https://www.facebook.com. Maybe MySpace died, but it didn't kill https. Maybe Congress can ban TikTok, but it would be much more difficult to ban https. How would you log in to your bank?
Bitcoin is the only viable alternative to central banking. There is no bitcoin alternative. There is no "next bitcoin." As Knut Svanholm says, it's our one shot. There are some digital signatures that are useful, but there is no way to re-discover absolute mathematical scarcity. Monero is not absolute digital scarcity. Neither is Ethereum, but it is also not decentralized. It's more like a Central Bank that uses digital signatures to earn fees on Ponzi schemes. Stablecoins might be a better shitcoin than the shitcoins of some shithole nations, but it's still a shitcoin. None of the other coins or tokens are a viable alternative to central banks and Ponzi schemes. But...what about Shibu Inu, NFTs, dogecoin or...? Don't be a fucking dolt. Anyone who says you should invest in or save any cryptocurrency other than bitcoin is either confused or lying.
A made a chart that describes my strategy because I know so many people like looking at charts, and doing technical analysis. Therefore, I decided to make my own chart. I call it the fuck fiat model. Look at the chart and compare it to more popular models like the stock-to-flow model. It's a simple chart. I used PSI and bowling ball bands to come up with this chart. Oh...and of course, this is not financial advice.
According to Jack Mallers, all but two of the top ten coins on coinmarketcap are proof-of stake. Proof of stake is just a complicated way nerds re-imagine central banks. Proof of work tethers a currency to the reality of physics. In reality, you cannot have your cake and eat it too, but in fiat philosophy we can eat more cake than we can bake. Fiat has not been tethered to reality since 1971. Then this happened. Proof of stake is just another currency by decree. Dogecoin also uses proof-of-work, but it's dumb because the supply schedule was changed. Bitcoin is the only game in town where the rules cannot be changed by decree. Therefore, bitcoin is the only non-fiat currency. Some may argue precious metal like gold and silver are another exception, but it's a moot point, because it still requires the government to follow the rules. The rules of the US constitution are difficult to change on paper. There was no constitutional amendment to change these words:
"No State shall enter into any Treaty, Alliance, or Confederation; grant Letters of Marque and Reprisal; coin Money; emit Bills of Credit; make any Thing but gold and silver Coin a Tender in Payment of Debts;"
The government changed the rules anyway
Most people in the world today care more about the fiat they can put in their Financial Institutions than they care about purely peer-to-peer electronic cash systems. I would bet most people still think the US dollar is "backed by gold," so it must be tied to reality. That's what it says in the constitution. Why would they believe otherwise? Some companies take advantage of this tendency by giving fiat loans to people to give them control of their bitcoin. Some of these are legitimate businesses, but you should avoid lending your bitcoin unless you know how to assess risk.
Every bitcoin loan involves risk of loss. You can mitigate this risk by never loaning your bitcoin. Bitcoin has no interest. It goes upon value relative to dollars that go up in circulation. They print more and more fiat. Bitcoin prints less and less sats. There isbno such thing as a bitcoin savings account.
If you must take a loan, demand to hold one of three keys in a multi-signature quorum. Don't risk more than you are willing to lose. If you lose your job and can no longer make payments, you will still lose your sats. If bitcoin flash crashes 50%, you can kiss those sats goodbye. Bitcoin collateralized loans avoid rehypothecation risk, but not risk of loss from a crash or missed payments.
BlockFi bought ad space on the most popular bitcoin podcasts. Many "influencers" were paid to tell people to sedn their sats to blockFi. It always seemed strange to me that peopel who say "not your keys, not your coin" also say you should send your sats to people wearing suits. Blockfi rehypothicated. There is no other way to obtain earn more bitcoin without mining. They traded customer bitcoin to make more fiat to buy more bitcoin. The trouble is, they lost the Bitcoin. The same thing happened with SBF. So many people were fooled by the promise of more bitcoin. They forgot about the first few sentences of the bitcoin white paper.
”A purely peer-to-peer version of electronic cash would allow online payments to be sent directly from one party to another without going through a financial institution. Digital signatures provide part of the solution, but the main benefits are lost if a trusted third party is still required to prevent double-spending. We propose a solution to the double-spending problem using a peer-to-peer network.” -Bitcoin white paper
Bitcoin solves the double spending problem. Russia thought the money it kept in a Belgian bank would be there for Russia to spend. Russia thought this money would be spent by Russia in the future. This money was spent on the Ukraine instead. Your opinion of Russia or Ukraine does not change this fact. Fuck Russia and the Ukraine, but it is easier to achieve peace when everyone plays by a set of rules that cannot be changed without the agreement of everyone involved. That's what makes bitcoin such an important discovery. Bitcoin is not a way to make more fiat. Bitcoin is anti-fiat.
I highly encourage you to watch Jack Mallers speech about alt-coins.
nostr:note1c6ltsuxkagcvtg392vevs74p9npa5dxlvwxv09lzw724d9qdetssz7jm5x
₿logging ₿itcoin 849,850 debtclock 🧡 Support this blog by using the ⚡Value 4 Value model⚡ 📧Subscribe on Substack 🍐Join my Keet Room If You Prefer To Learn About New Blogs With No Email Signup 💵Fiat-To-Sats Calculator 🫙 Tip Jar 📻 Stream sats on Fountain 🎉Send a Boostagram 🛒Shop The Elliptic Curve Economy
-
@ e968e50b:db2a803a
2024-06-28 17:11:27Just for fun, I recovered my Phoenix wallet in Sparrow to see if there was anything left. There was!!! But I don't know what use it could ever serve. I'm probably not going to execute this silly transaction.
So is this UTXO just going to be an old truck rusting in the forest? Are these sats now a monument to the great Phoenix's flight from the land of the free and the home of the brave? Are these rare sats now? (I'm just kidding, shit-coiners. This wallet's not for sale.) But seriously, is there ANYTHING useful I could do with these?
-
@ 3875a16c:988456c9
2024-06-28 16:12:14- ORIGINAL TITLE: TWO RAILS DIVERGE: FROM BANK FAILURES TO BITCOIN PAYMENTS
- SPEAKER: PARKER LEWIS
- CONFERENCE: BTC PRAGUE 2024
INTRODUCTION
Bitcoin vs. Bank Failures. In today’s rapidly evolving financial landscape, the dichotomy between traditional banking systems and the burgeoning world of Bitcoin has never been more stark. As bank failures become increasingly frequent, with notable collapses such as Silicon Valley Bank and First Republic Bank, the fragility of our legacy financial infrastructure is laid bare. The systemic issues, fueled by unsustainable levels of debt and rising interest rates, underscore a critical need for a more resilient and adaptive solution.
Enter Bitcoin, a decentralized digital currency offering a compelling alternative to the traditional banking model. With its fixed supply and antifragile nature, Bitcoin not only addresses the insolvency issues plaguing fiat currencies but also presents a robust framework for secure and efficient transactions.
This transcribed article delves into the contrasting worlds of failing banks and resilient Bitcoin payments, exploring how businesses and individuals can leverage Bitcoin’s unique attributes to navigate and thrive in an increasingly uncertain economic environment. Presented by Parker Lewis, discover how Bitcoin’s innovative rails provide a secure pathway amidst the ongoing turbulence of the global financial system.
EVERYTHING IS ALWAYS AT RISK
For this talk, I am going to really split it up into two parts. I’m going to have the first half of the talk really based on explaining something fundamental about the economic system and then the second half of the talk focused on a solution to that problem. When you’re talking to a group of Bitcoiners, kind of trying to account for something for everyone. With that, I’m going to start with one of the few jokes that I actually know, and some of you might have heard this joke, but it is: what did Socialists use before candles? The punchline, of course, is light bulbs.
The point of this short story joke is that everything is always at risk and that if we’re all sitting here today, it is because humans are adaptive. They are adaptive to risks, and we are all ancestors of people that have adapted. The people who adapt not only survive but they thrive. Complacency is the enemy of adaptivity. So, capitalists turn candles to light bulbs and socialists do the opposite—they take light bulbs and turn them to candles.
One of the problems, and it’s going to get into the legacy system being a problem and Bitcoin being a solution, is that when I talk about everything being at risk, oftentimes, in this idea of complacency, you think about a current level of success, a current level of wealth, a current level of health. Socialists assume it to be a given, and then they see a pie and start carving it up, not thinking that that pie can shrink. The idea that everything is at risk is that if we are not constantly moving ourselves forward, we are at risk of actually regressing. That’s why we always have to be forward and be adapting. I’ll come back to this idea in a few slides.
THE LEGACY SYSTEM IS INSOLVENT
The first thing I’m going to talk about is why the legacy system has a problem and why it’s not just a problem in terms of a store of value, like why our wealth isn’t just getting destroyed when they’re printing money, but why it’s also a problem for our rails. What I’m showing here, this is the slide that really got me into Bitcoin. For people who are new, this is showing the US system. I tried to find a comparable slide for the Euro system. The Fed might be worse than the ECB, it’s debatable, but they’re very equivalent. The problems are relatively similar. I’ll tell a story about this.
What this is showing is the amount of debt in the US system relative to the number of dollars. When I was getting into Bitcoin, I first had to understand why they had to print all the money they did. The conclusion I came to was that it was a function of an unsustainable degree of leverage. In 2007, there was only 900 billion in the US system and there was 52 trillion of debt.
Each dollar had been lent out over 5 to 1. When they put more money in the system, it causes the debt problem that already was there to actually grow and metastasize. The way that this whole system works is that it always dictates that there need to be both more debt and more money put into the system. This is unsustainable. If Bitcoin is valuable because of its fixed supply, that’s what I put forward: the real fundamental value in Bitcoin derives from its fixed supply.
This is the problem that it solves. The legacy system is insolvent because there’s far too much debt relative to the number of dollars. It is unsustainable, and the only way to correct it is to put more dollars in the system, more Euros in the system. But all that does is put us further out on the same ledge of over-leverage. It is why they have to print money, it’s why banks fail. The bottom line is it’s a problem not only for our balance sheet, our savings, but also how any business actually interacts with its customers.
THE BANK RUNS & FAILURES WILL CONTINUE
Regarding Bitcoin vs. Bank Failures, this is a slide that got me hyper-focused on Bitcoin payments. There were a slew of bank failures last year: Silicon Valley Bank, First Republic Bank, and over here Credit Suisse. Credit Suisse didn’t fail, but here in Europe, you guys now have two of your largest banks that were merged without a shareholder vote on either side. It was because Credit Suisse was failing. Honestly, all of the entire system is failing somewhere. A bank is failing in the US and in Europe. The only question is whether it’s yours.
What I have on this slide is showing the amount of deposits that fell from these banks in the last quarter of their existence: Silicon Valley Bank, 209 billion to 175 billion; First Republic Bank, 176 billion to 103 billion. Money can move fast these days. Credit Suisse, 260 billion to 195. It doesn’t have to go to zero for your bank to functionally fail.
LEVERAGE + RISING INTEREST RATE = BANK RUNS
Bank failures are inevitable because of a combination of leverage and rising interest rates. Back in the old day before all of our money was monopolized by the central bank, if you increased interest rates as a bank, it would actually attract more money to your bank and to the banking system as a whole. In this day of a monetary system, when they actually raise interest rates, that’s what causes the bank run. What I’m showing here is the amount of unrealized losses in US banks, which is 675 billion. You can see that it started as they started to raise interest rates. The raising of interest rates is actually what causes the bank failures. It’s what causes the money to run from the weakest link, and they’re all weak. It’s just ultimately a turtles-all-the-way-down problem.
BANK FAILURES ARE LIKE A MAGIC TRICK
The other important thing to remember is that bank failures are functionally like a magic trick. Banks will fail functionally overnight. They will fail before most of you know it. On the left, I’m showing Silicon Valley Bank. Its share price going sideways and then boom, overnight. Literally, when people figured out that there was a bank run, the next day it was gone. First Republic was similar, took a little bit longer, but this is the “gradually, then suddenly.” The title of my book came from a quote in Hemingway, from his book The Sun Also Rises. One of the characters asked the other, “How did you go bankrupt?” The other character said, “Two ways. First, gradually and then suddenly.” It is true of banks.
BALANCE SHEET PROBLEM + CASH FLOW PROBLEM
This is not just a problem for your savings; it is a problem for your rails, for how you receive money. When Silicon Valley Bank failed last year, the first thing that businesses that banked with Silicon Valley Bank thought about was how am I going to make payroll? Which is the right side. Where do I save my money? But the next problem is your bank is also how you access your customers. It is how they pay you. It is both a balance sheet problem as well as a cash flow problem. When you think about a bank run, you think first and foremost about your savings, but those banks are also the rails.
BANKS ARE THE RAIL OF THE FIAT SYSTEM
This is a demonstration of what the US banking system looks like, which is a functioning clone of the European banking system. On the right side of this page, I have credit card networks, acquirers, issuers, gateways, ISOs. There’s a lot that’s built on top, but there’s a bank on one side, there’s a bank on the other side, and there’s a central bank in between. The banks are all functionally insolvent because the system is. Now, it’s not that banks are bad. Banks provide value.
There are banks in Bitcoin, and banks in Bitcoin are good. They might not be licensed as banks yet, but people that help you hold money, it’s not a purity test. The point is that banks can fail faster than you can move your money, and even if you have multiple banks, it’s a turtles-all-the-way-down problem. As the banks fail, the banking system actually gets more fragile.
THEY ARE ALL THE SAME (MOSTLY)
The banks themselves—I don’t know how many of you guys are Zoolander fans, I don’t know if that humor translates to Europe, it might not—but the banks are all functioning the same because the system is leveraged to a point that it’s not sustainable and that all of the money is functionally captive to the banking system.
There are two banks in the US that are different, as there are in Europe. It’s the Federal Reserve of New York and JP Morgan. But what functionally happened was the system was unsustainably leveraged, and they codified too big to fail. Some might think that the winners are the big banks and we should just go all to the big banks. The problem is that the fiat system centralizes, and as that happens, it becomes more fragile. It becomes more leveraged, it becomes more insolvent. It dictates more printing, more trust is required, and more censorship.
DIVERGENT RAILS PRESENT TWO GREAT CONTRASTS
So, the fragility of the rails is twofold. They are because of the leverage itself, but also because as the system centralizes, it becomes less resistant to censorship. That is why Bitcoin presents such a great contrast in terms of the rails. Matias asked me to leave people with a call to action, and this is ultimately going to be a call to action to Bitcoiners, not to go out and try to create a circular economy, but that if you run a business or if you are an important cog in a business, that you don’t look at the Bitcoin rails as a novelty or as a niche. You actually view them as security.
So, the way that I think about the contrast between the central banking rails, which is the legacy world, and the Bitcoin rails is there is a single point of failure, whether it’s the ECB or the Federal Reserve. In Bitcoin, there is hyper redundancy, and the hyper redundancy is really important. There are insolvent banks as the foundation of the rails of the fiat system, and there are funded nodes that are the foundation of the Bitcoin system. Central banking is inherently a trust-based system because fiat currencies have no inherent monetary properties. Gold, which preceded fiat, had inherent monetary properties.
What a trust-based monetary system means is that counterparty risk is everywhere. Bitcoin is and can be trustless. The central banking system has credit-based payment. Every payment is: do they have the money? If so, I will settle later via multiple different counterparties and systems. Bitcoin is and can be an equity-based payment system. Central banking is closed-source proprietary systems. Bitcoin is ultimately and fundamentally built on interoperable standards. Central bank is permissioned innovation. Bitcoin is permissionless innovation.
TWO RAILS DIVERGE
These are the two rails diverging. The thing I like to visualize here, you’re not going to be able to read all the fine print, but there are single points of failure everywhere in the fiat system. The Bitcoin system has hyper redundancy, and that redundancy is ultimately what reduces its fragility over time. It’s not static. When I talk about these rails diverging, the fiat system is fragile today. Bitcoin is antifragile. But the fiat system also becomes more and more fragile as it centralizes. Bitcoin actually becomes more and more antifragile as it decentralizes, as layers of redundancies are added to the network. When you think about the contrast, it is centralized versus redundant, fragile versus antifragile, censored versus permissionless, and insolvent versus Bitcoin flourishing.
CALL TO ACTION: DIVERSIFY YOUR RAILS
The fiat system is turning light bulbs into candles, and the Bitcoin system is going to turn candles into light bulbs. My call to action is to diversify your rails. The life advice is always to get out of bonds. Bonds are the worst financial asset. Equities might be next unless it’s an equity in your own company. But this message is to diversify your rails. Using the Bitcoin rails and accessing the Bitcoin rails does not mean not using the fiat rails.
Just as saving in Bitcoin and the fiat scientists out there really struggle with how people deal with Bitcoin’s volatility, they fail to understand that Bitcoin is not an all-or-nothing proposition. You can save part of your money in Bitcoin, and you don’t have to just rely on the Bitcoin rails to also rely on the fiat rails. You can use both at the same time. What’s in the best interest of your business is to diversify. Also, if you are a Bitcoiner and you run a business and you want Bitcoin, it should be intuitive to you that adding an entirely different currency system would not just be a source of risk to get the Bitcoin.
It would be a high degree of unnecessary cost. It is not the same to go from dollars to a dollar bank to a payment processor to a merchant processor to a merchant bank account to a Bitcoin exchange to get into Bitcoin. Again, if you want the Bitcoin, you don’t have to do this non-custodial. You can use a Bitcoin bank, but it is still far more efficient if your customers paid you directly.
RECOGNIZE THE RAILS MUST BE REBUILT
Also, recognize that the rails must be built—every last one of them. If you have a trust-based system, it is very easy to add one currency and then the next and do copy and paste. In Bitcoin, we are fundamentally having to rebuild from the ground up every transaction type, every type of commerce. Think about the different types of transactions: oil settles different from power, which settles different from real estate, escrow, booking, subscriptions. There are also three different layers that have to be built: the protocol layer, the transactional layer, and the commerce layer. Then that data needs to go everywhere. This is a process, but those rails are actively being built, and it takes business owners.
CASE STUDY: INTEROPERABILITY + CROSS-BORDER
The call to action is that if you are a business owner or you are high up in a business, it’s not to say go run into a brick wall over and over. Use some common sense. But if you are in a position to, it is to use those rails. When I talk about the power of Bitcoin, when you think about a permissioned system and permissioned innovation versus a permissionless system and permissionless innovation, the people that are building the Bitcoin rails, it is compounding, and compounding equals acceleration.
One example of this: Strike. I don’t work for Strike, but on their behalf, they just recently launched in Europe. We had Zaprite built on top of Strike without having to write another line of code, although we are not a money transmitter. We are now lit up to all of Strike’s customers because we speak an interoperable language of Bitcoin. But we also support—you guys can use Mutiny right here in Europe, non-custodial. You can use Voltage, non-custodial. I use Trezor, non-custodial. We even have customers that use BTC Pay Server through Voltage. All of these companies are building the rails for payments, and they are all interoperable, which allows us to move far faster and make progress far quicker.
THE MORE OF YOU WHO ACCESS THE RAILS THE BETTER THE RAILS WILL BECOME
So, the final call to action is this: the more of you who access the rails, the better the rails will become. It is cause and effect. This is Saifedean’s latest book, The Principles of Economics. This is how progress happens. You start with a small little fishing boat, you build a sailing boat, and then you go all the way down to the cargo ship. More representations in the wild and live application make us better, and more input and feedback from actual customers make us better.
More profitable businesses attract more capital, and more capital attracted to build more tools, then there becomes more competition, which delivers more value to you for less. Then there’s more actual liquidity on the Lightning Network, which makes more routes. There’s more nodes, there’s more routes, there’s more redundancy. Bitcoin actually becomes harder to stop, and then your business becomes more resilient, and your businesses flourish, and we all flourish.
TAKE THE WHITE PILL. CONTROL YOUR DESTINY
So, my message is take the white pill, control your destiny, don’t be complacent. The rails are there, and they need to be used. There’s this imaginary theory, and I actually hate it, that we should go build a circular economy. The reality is you just control you. The tools are there. You can use them. If you wait till you absolutely have to, you’ve waited too long. When did Noah build the ark? It was before the flood. So, I encourage you all, the rails are there. Bitcoin payments are important, and I encourage you all to access them. Thank you. I’ll be back in the Expo signing books and would love to catch up with many of you. This has been my first time in Europe. I’m from Texas. I’ve loved Prague, I’ve loved Europe, and I’ll be back. So, thank you.
Follow the speaker: Parker Lewis Watch the original content: Click here Also read: Crossing The Chasm: Early Adopters To Mainstream
Disclaimer: Transcripts provided on bitlyrics.co represents solely the opinion of the speaker and is not by any means financial/legal advice or an opinion of the website. The content has been transcribed with maximum accuracy. Repetitions and fill words have been amended in order to enhance the reading experience. The full text may not be confirmed by the speaker. Please, refer back to the above-provided source of content for more certainty. If you are a speaker and wish to confirm/amend your speech please contact us.
-
@ 5d4b6c8d:8a1c1ee3
2024-06-28 14:01:05I wanted to add top territory, and I chose to leave it in, but the numbers don't make sense and many territories show activity before they existed. @k00b or @ek, is there a way to report these or should I just scrap it?
Read the previous edition here.
June 27th, 2023 📅
📝
TOP POST
A Basic Guide To Making The Switch To Graphene OS
Excerpt
I am very new to Graphene. I have a lot to learn. Getting my Pixel set up as a daily driver is going to take some work. Still, I am optimistic. I’m not going to rush it. I am keeping my old Galaxy around too, so my transition will be gradual. If you decide to make the change, I hope this short guide is useful.
27.4k sats \ 51 comments \ @siggy47 \ ~tech
💬
TOP COMMENT
https://stacker.news/items/200217/r/Undisciplined?commentId=200226
Andreas Antonopoulos
From A Basic Guide To Making The Switch To Graphene OS in ~tech
2213 sats \ 4 replies \ @siggy47
🏆
TOP STACKER
2nd Place @k00b (1st place is hiding, presumed to be @siggy47)
13.9k stacked \ 15.4k spent \ 8 posts \ 27 comments \ 0 referrals
🏆
TOP TERRITORY
~bitcoin
40.7k stacked \ 0 revenue \ 65.9k spent \ 191 posts \ 387 comments
https://imgprxy.stacker.news/fsFoWlgwKYsk5mxx2ijgqU8fg04I_2zA_D28t_grR74/rs:fit:960:540/aHR0cHM6Ly9tLnN0YWNrZXIubmV3cy8yMzc5Ng
June 27th, 2022 📅
📝
TOP POST
I'm Oscar Merry and I'm building Fountain Podcasts. AMA.
Excerpt
I'm Oscar Merry and I'm building Fountain Podcasts - a Podcasting 2.0 app that rewards both listeners and podcasters for the value they bring to the platform.
32.6k sats \ 99 comments \ @MerryOscar \ ~bitcoin
💬
TOP COMMENT
https://stacker.news/items/39400/r/Undisciplined?commentId=39420
Excerpt
Imagine, you are in a situation where internet is to break up and things gotta be fast. Or there is a DDoS and you don't care if you order something right now or it goes through a little later.
From Announcing lnd 0.15 beta: To Taproot and Beyond! in ~bitcoin
278 sats \ 3 replies \ @tomlaies
🏆
TOP STACKER
@k00b
1856 stacked \ 20.2k spent \ 5 posts \ 27 comments \ 0 referrals
🏆
TOP TERRITORY
~bitcoin
50k stacked \ 0 revenue \ 55.5k spent \ 137 posts \ 381 comments
https://imgprxy.stacker.news/fsFoWlgwKYsk5mxx2ijgqU8fg04I_2zA_D28t_grR74/rs:fit:960:540/aHR0cHM6Ly9tLnN0YWNrZXIubmV3cy8yMzc5Ng
June 27th, 2021 📅
📝
TOP POST
Support clicking on the LNURL-Auth QR code
To the stacker.news admin: Please add lightning: link to the LNURL-Auth QR code for easy authentication via mobile wallets. Why scan or copy-paste when the wallet can be triggered by clicking a link? See lnmarkets for example.
122 sats \ 21 boost \ 20 comments \ @roy \ ~bitcoin
💬
TOP COMMENT
https://stacker.news/items/100/r/Undisciplined?commentId=107
visit https://lightning-roulette.com and try to make a deposit and you will see a link that says "open wallet".
From Support clicking on the LNURL-Auth QR code in ~bitcoin
22 sats \ 4 replies \ @0391398253
🏆
TOP STACKER
@sha256
2 stacked \ 1 spent \ 1 post \ 0 comments \ 0 referrals
🏆
TOP TERRITORY
~bitcoin_beginners
235 stacked \ 0 revenue \ 262 spent \ 0 posts \ 3 comments
-
-
@ a012dc82:6458a70d
2024-06-28 13:31:32Table Of Content
-
Content
-
Conclusion
-
FAQ
-
You May Also Like
-
External Links
Introduction
Bitcoin is a decentralized digital currency that operates on a peer-to-peer network. AI, on the other hand, is a rapidly advancing technology that has the potential to change the world in countless ways. With the increasing prevalence of AI in our lives, it is natural to wonder what impact it will have on the future of Bitcoin.
The Advantages of Bitcoin in an AI World
One of the key advantages of Bitcoin is its decentralized nature, which eliminates the need for intermediaries and provides users with more control over their funds. In a world of AI, this decentralization becomes even more valuable as it provides a level of security that cannot be found in centralized systems. Furthermore, Bitcoin's use of blockchain technology makes it more resistant to fraud and hacking.
Potential Threats to Bitcoin in an AI World
While Bitcoin does offer advantages in an AI world, there are also potential threats that must be considered. One of the biggest threats is the potential for AI-powered hacks. AI can automate and scale hacking methods, making it easier for attackers to breach the security of Bitcoin networks. Additionally, the increasing power of AI could also lead to the development of new and more sophisticated hacking techniques.
The Role of AI in Improving the Bitcoin Ecosystem
Despite the potential threats, AI also has the potential to significantly improve the Bitcoin ecosystem. For example, AI can be used to enhance the security of the network by quickly detecting and responding to potential threats. Additionally, AI can be used to optimize the performance of the network, reducing latency and increasing efficiency.
Conclusion
In conclusion, the future of Bitcoin in a world of AI is both exciting and uncertain. While there are potential threats to the decentralized currency, there is also the potential for AI to greatly improve the Bitcoin ecosystem. Regardless of what the future holds, it is clear that the intersection of AI and Bitcoin will be a crucial area of development in the years to come.
FAQ
What is Bitcoin? Bitcoin is a decentralized digital currency that operates on a peer-to-peer network.
What is AI? AI stands for Artificial Intelligence and refers to the development of computer systems that can perform tasks that typically require human intelligence.
How does AI impact the future of Bitcoin? AI can both threaten and improve the future of Bitcoin, depending on how it is used.
What are the potential threats to Bitcoin in an AI world? Potential threats to Bitcoin in an AI world include AI-powered hacking and the development of new, more sophisticated hacking techniques.
How can AI improve the Bitcoin ecosystem? AI can improve the Bitcoin ecosystem by enhancing security, optimizing performance, and reducing latency.
What is the decentralized nature of Bitcoin? The decentralized nature of Bitcoin means that it operates on a peer-to-peer network, eliminating the need for intermediaries.
Is the use of blockchain technology important for Bitcoin? Yes, the use of blockchain technology is important for Bitcoin as it provides a level of security and resistance to fraud and hacking.
What is the future of Bitcoin in a world of AI? The future of Bitcoin in a world of AI is both exciting and uncertain, but it is clear.
That's all for today
If you want more, be sure to follow us on:
NOSTR: croxroad@getalby.com
Instagram: @croxroadnews.co
Youtube: @croxroadnews
Store: https://croxroad.store
Subscribe to CROX ROAD Bitcoin Only Daily Newsletter
https://www.croxroad.co/subscribe
DISCLAIMER: None of this is financial advice. This newsletter is strictly educational and is not investment advice or a solicitation to buy or sell any assets or to make any financial decisions. Please be careful and do your own research.
-
-
@ dd664d5e:5633d319
2024-06-28 13:04:48An immodest proposal
It is grant season again, and -- as every grant season -- there is some cheering, some complaining, and much bewilderment, as the grants are announced and monies are dispersed.
I'm mostly a bystander to this spectacle, but it's impossible to ignore it, or to not become emotionally entangled in the general circus of it, so I've decided to write about it -- again -- as it is effecting me and interrupting my own efforts -- again.
What I'm about to suggest here is something that has never been done before (at least, not on a grant system of this scale), but it's always easy to criticize, whine, or fall into conspiracy-theorizing, so I've decided to try something more constructive and propose a solution.
The Five Whys
Why do some projects get turned down for grants?
Why do some people receive grants over and over and over?
Why do others refuse to apply for grants?
Why is an enormous amount of money being spent, but nobody knows how much is left over?
Why is it not really clear who is receiving what?
Why, why, why?!
Doctor, heal thyself!
Leaving this many whys lying around, or responding to them defensively or with small information-leaks, is an open communication fail on our open communication protocol.
We don't really have the excuse of not knowing how to communicate transparently and publicly, since that is our professional specialty. If we can't figure out how to run a grant program in the most continuously innovative and traceable way possible, even though we are a collection of some of the most talented perpetual innovators on the planet, then who can?
We are all process engineers, so let's engineer our own processes.
The application process
The main problem with the grant application process is that there is a grant application process. There shouldn't be. Everyone who is working in our space is working transparently, actively marketing their ideas, and everything they do is a matter of public record.
We know who the builders are. We know what they are doing. We can interact with them about what they are doing. We can turn on our computers, pull out some popcorn, and entertain ourselves all day, every day, just watching them labour and think aloud and debate, and fork various repositories or Nostr notes.
There is, at most, a loss of information, as there are so many people working on so many things, that it can become difficult to even track one particular person. That means it is not too much for us to ask, to suggest that anyone interested in a grant at least make their interest known in some small way.
Wave if you want a grant
That way should be as small as possible. Tiny. Ideally, they shouldn't even have to go that way themself; others should be able to nominate them. A 10-minute barrier to entry is already high, if it requires some formal, explicit act of supplication.
Does that sound silly to you? Then you do not understand how profoundly logical, forward-thinking, and diligent software developers can be. If they "just fill out a form" and/or "have an informal discussion", in order to receive money, it smacks disturbingly of "job interview" and "contract". These are people for whom contract law is holy law, so many will agonize over the decision.
-
Some already have a job and they don't know how it will be in the future. What if they have to work overtime?
-
Or they have a family and worry that they can't promise to deliver within some particular time. The wife could get pregnant, the baby could get sick, they might have to move house.
-
Maybe they are students and exam time is approaching. Or they are simply shy or very young, and therefore reluctant to be seen "tooting their own horn". There is probably someone more worthy, and they are taking away the money he would get.
-
Maybe they were hit with such an inner building passion that they hacked the whole implementation out their last vacation and... well... it's now already there. Everyone is already using it. Darn. Why apply for a grant, for something you've already finished? Seems sort of silly. Is that even allowed? What are the grants even for?
-
What if they already have such a well-publicized project, that everyone is already watching them and keeping tabs? Then it's embarrassing to apply, on a lark, and get turned down. But if they don't apply, then everyone encourages them to apply. What to do?
-
Many prefer to keep their head down and keep building, for months or years at a time, and clap politely when others are awarded a grant. In fact, they happily zap the recipients and then go right back to building and releasing. They're often grateful to just bathe in other people's joy, by proxy, while they stack sats and stay humble and keep coding.
That is why a large subset of potential grant recipients never even apply. That is also why those who have received a grant are less reluctant to apply for another. Successful application breeds successful application. The emotional barrier to entry has fallen. To those that have, shall be given.
Let's use Nostr to run Nostr grants
We should turn the tables around completely. We want the developers to keep developing, not jumping through hoops. We don't want them to be distracted and internally torn over the ethics of requesting funding. We don't want them to be afraid to apply for grants or be mystified by the grant-giving process, or be humiliated or frustrated by a declined grant.
-
Let us come up with very clear, understandable criteria for rewarding grants, write them down, and publish them on Nostr Wiki. Accept comments and critiques of the criteria. After every round of grants, we should review the criteria, suggest improvements, and publish the new version in the same place.
-
Let every application be judged according to this criteria and the results should be published after every round. The results should include a rating for each criteria and (if the grant is given) the amount of the grant awarded or (if the grant is declined) the reasons for the decline and what the applicant can improve to have a better chance of receiving a grant in the future.
-
Ideally, no applicant should walk away from a declined grant feeling hopeless or slighted. Every applicant should feel like the grant process gave them valuable feedback on their own efforts and expert guidance on what they should maybe focus more on.
-
Every application should be a standing application that has to be explicitly removed from the list by the person listed as an applicant. Anything not removed automatically enters the next round. If there is no further development on the project, then the application should be paused and removed after 2 rounds of being paused.
-
The application process should consist of adding yourself or someone else to a Wiki Grant Application List and linking to some documentation of the project. Any npub that trolls or spams the list should be prohibited from further contribution. The quality and completeness of that documentation should be a factor in grant acceptance.
-
Grant decisions should include a "handicap" (like in golf), that take into account how Nostr-experienced the applicant is and how easy it was for them to add a new implementation to some already-existing system. The tendency should be to award newer applicants such grants, with more-experienced applicants competing for long-term funding or being offered a paid(!) place on the grant board, but not both.
-
Each grant round should be proceeded by a grant scope declaration (we shall be awarding X number of grants with an average of X Bitcoin per grant) accompanied by a funding overview and update (How much money was collected since the last round? How much did we spend? How much do we have now? etc.).
Okay, this is just a prototype
I'm sure that I'm going to be bombarded with naysayers, critics, and people who think I am "writing above my pay grade", but I wouldn't be me if I let that daunt me.
All I am trying to do is change the discussion into one focused on uncovering the grant problems and offering grant solutions, rather than debates about whether some particular person was grant-worthy, or long rants on some particular person's real motives.
It's a lot of Real Money. It's worth talking about, but it's not worth fighting over. Let's talk.
-
-
@ c43d6de3:a6583169
2024-06-28 11:16:13I know what It's like to be physically willing and able and even ambitious enough to work, but its not enough.
Powerlessness is seeking to grow financially and spiritually but no matter how well you do in your local economy it's never enough to save. Even if you could save, the banks are corrupt and offer no interest in your deposits and there is not much that you can lucratively invest in.
That's how it was in the Dominican Republic.
Getty Images- Dominican Republic
I've heard the rain as it trickled and tickled the tin roofs. That's what would often wake my cousin in the summers of the Dominican Republic. The morning showers never had much thunder, but the rain was enough to start the day off in a dreary mood.
The rain meant cousin Francisco's baseball practice would be canceled that morning. The rain meant the food would be late to the market and would delay Auntie Maria from starting preparations for the most popular lunch in town.
The family business would be down and out that day and my cousin's dream of becoming a world class baseball player was one practice session further.
The saddest part of it all was that I'd witness it all as an American on Summer break. I'd leave soon enough, I'd go back to middle school and without much effort I could guarantee at least a decent life in the United States by just finishing school and finding a steady job.
My family in the Dominican Republic fought for survival every day of their lives. They were humble about it and I'd never seen them down and out because, unbeknownst to me at the time, my mother had always sent me with an envelope full of money to help my aunt and to alleviate the pressure of having yet another mouth to feed for the months that I'd be there.
Looking back at it now, I know it was cheaper for my mother to send me to the Dominican Republic instead of finding some summer program to put me in, but my god, at least we had that option. A passport from the United States grants you access to 144 countries without visa and another 38 countries that grant visas upon arrival. Only 24 countries in the world require a United States passport holder to have a visa upon arrival. Compare that to my cousin's chance at the same. A passport from the Dominican Republic will give you access to 31 countries visa free and 36 with visas upon arrival. 124 countries require Dominicans to acquire a Visa before arrival.
Dominican passport holders only have free access to 16% of the world compared to an American's 74%. How many opportunities would your typical Dominican have to make international relationships? If they wanted to leave the country and seek a better life elsewhere there was a 74% chance they couldn't afford to, unless they crossed borders illegally. Safe to say, the fact that the country is an Island Nation, there's no leaving without some stash of cash.
My aunt didn't participate in one of the Dominican Republic's largest industries. She wasn't in the tourism sector, there were no manufacturing plants nearby, and though there were mines nearby, they didn't accept women at the time. She cooked for her local community. Lunch time at Tia Maria's house was a central hub for the town of Villa Altagracia and though the house was packed for lunch and dinner, they'd only make enough to get by.
Getty Images- Fried Chicken for Lunch
They had no chance to really save and even if they could save what would they invest in? A place at the table in the big industries has always been reserved for the elite by invitation only. It was only recently that the Dominican Republic opened its own stock market and even now, in its nascent stages, the options for investment are meager.
That's what it means to feel powerless. It's unfortunate, but an individual living in the Global South really only has one chance to financial success. This chance is rooted in familial ties and/or illicit activity. Very seldom does luck or the sweat of your brow lead to success. But there is always something you are not powerless in. There is one thing I have noticed that is a blessing. The United States has a lot of good things going for it but, I have never seen a community in the US as tight knit as the one in my cousin's neighborhood. Perhaps the fact that there's not much to envy is why they are so tightknit. Perhaps its because they must rely on one another to live and thrive, they are not just neighbors you wave to when you get home and disappear into your house.
In the midst of powerlessness there's a sense of restrained greatness in the Global South. You see that greatness shine in the people and the way they let their barriers down to invite you. It's easy to discover that no matter where you find yourself on the planet, there will be a group of humans nearby willing to be a part of a close knit community. In the Global South, they are powerless in many respects but not in the relationships they can share with others, in the kindness and efforts individuals can make for eachother.
No matter where you are in the world, be it the Amazon Rainforest or the high-rises of Manhattan, community will always be the most valuable thing in this life. My experiences with my family in the Dominican Republic have taught me not to be tricked into believing its money that makes people truly wealthy. I realized that in Tia Maria's home restaurant. So long as the community has enough to eat and can share a meal and a conversation in the safety of their neighborhood, the community is wealthy.
I want to show the world that life is a scroll riddled with ink. The marks will only ever be simple blots on the parchment unless you pause and perceive them for the characters they are.
I’m constantly thinking about what the future could look like if we just take action.
More of my thoughts about the future and the world around us are coming soon....
Thank you for Reading this article. If you enjoyed it and would love to see more articles like it on NOSTR consider sending me some zaps doing so supports me and motivates me to continue writing!
If you are interested in Fiction writing, visit my NOSTR page Fervid Fables:
npub1j9cmpzhlzeex6y85c2pnt45r5zhxhtx73a2twt77fyjwequ4l4jsp5xd49
-
@ 1739d937:3e3136ef
2024-06-28 08:27:59This is the first in a series of weekly updates I'm publishing on my process around secure messaging. Since it's the first, let's start with a bit of historical context.
How this started
On April 29th I published a PR on the NIPs repo detailing how we could achieve "Double Ratchet" DMs on Nostr. There was also a video and demo app that went along with the PR. The basic premise was to use an adapted version of the Signal protocol. This would result in DMs that were truly private and confidential, even in the case where you leaked your main private key (your nsec).
I got a lot of great feedback from folks on that PR. Interestingly, nearly all of it focused on two points, both of which I'd deliberately scoped out. Group messaging and multi-device/client support. While I knew these were important, and I'd figured out how these might be accomplished, I'd scoped them out to try and keep the footprint of the spec as small as possible But, the more I talked to people, the more it became clear that this was one problem to be solved and given the complexity, it'd be better to do it in one shot.
At the same time, I'd seen that Messaging Layer Security (MLS) had recently made a lot of progress on becoming an internet standard with their RFC proposal and, goaded on by Vitor, decided to take a closer look.
Enter MLS
Messaging Layer Security (MLS) is a new protocal that is basically a modern extension of the Signal protocol that makes group messaging way more efficient (log vs linear) and was built to be used in centralized or federated environments. I'd heard other Nostr devs talk about it in the past but it was always overlooked as being too complicated or too early.
After spending a couple weeks reading hundreds of pages of RFC docs and reading through a few implementations of the MLS spec, I believe it's the best solution for secure direct and group messaging in Nostr. It also has the added benefit that we can upgrade the underlying crypto primitives over time in a sane way.
The MLS protocol specifies "a key establishment protocol that provides efficient asynchronous group key establishment with forward secrecy (FS) and post-compromise security (PCS) for groups in size ranging from two to thousands."
The spec I'm working on will detail the ways that we implement this protocol into the Nostr environment (namely, how do we use our crypto primitives, use events as control mechanisms, and use relays for storage, while obfuscating metadata).
Goals
It's important to be clear about what we're aiming for here. Engineering is all about tradeoffs, always.
- Private and Confidential DMs and Group messages
- Private means that an observer cannot tell that Alice and Bob are talking to one another, or that Alice is part of a specific group. This necessarily requires protecting metadata.
- Confidential means that the contents of conversations can only be viewed by the intended recipients.
- Forward secrecy and Post-compromise security (PCS) in the case of any key material being leaked, whether that's your main Nostr identity key (your nsec) or any of the keys used in the MLS ratchet trees.
- Forward secrecy means that encrypted content in the past remains encrypted even if key material is leaked.
- Post compromise security means that leaking key material doesn't allow an attacker to continue to read messages indefinitely into the future.
- Scales well for large groups. MLS provides this from a computational standpoint, but we need to make sure this works in a scalable way when multiple relays are involved.
- Allows for the use of multiple device/clients in a single conversation/group. Importantly, we're not aiming to enable a device/client to be able to reconstruct the full history of a conversation at any point.
Progress this week
Ok, finally, what what I been up to?
Reading
I've spent most of the last few weeks reading the MLS spec and architectural doc (multiple times), learning some Rust, and beefing up my knowledge of cryptography (which was, if I'm being generous, paltry before starting this project).
Ciphersuites
Nostr is built around the same crypto primitives that Bitcoin is, namely Schnorr signatures over the secp256k1 curve and SHA-256 hashes. This curve isn't currently supported officially in the MLS spec. I've been in touch with the MLS working group to better understand the process of adding a new ciphersuite to the set of ciphersuites in the MLS spec. The outcome here is that we're going to start out using our custom ciphersuite that isn't part of the formal spec. The only drawback being that Nostr's MLS implementation won't be immediately interoperable with other MLS implementations. We can always add it later via the formal channels if we want.
MLS Implementations
Given the complexity of the MLS spec itself (the RFC is 132 pages long), having a well vetted, well tested implementation is going to be key to adoption in the Nostr ecosystem. OpenMLS is an implementation created by several of the RFC authors and written in Rust with bindings for nearly all the major languages we would want to support.
I've been in touch with the maintainers to talk about adding support to their library for our new ciphersuite and to better understand the bindings that are there. Some (WASM) are very barebones and still need a lot of work. They are generally open to the idea of working with me on adding the missing pieces we'd need.
Double Ratchet NIP 2.0
I've also started to write up the new version of the NIP that will detail how all of this will work when plugged into Nostr. It's not yet ready to share but it's getting closer.
Onward & Upward
Hopefully that's a helpful recap. I'll keep doing these weekly and welcome any questions, feedback, or support. In particular, if you're keen on working on this with me, please reach out. More eyes and more brains can only make this better. 🤙
-
@ 6ad3e2a3:c90b7740
2024-06-28 07:44:17I’ve written about this before, and I’ve also tried to illustrate it via parable in “The Simulator.” I even devoted most of a podcast episode to it. But I thought it might be useful just to cut to the chase in written form, give the tldr version.
Utilitarianism is the moral philosophy of the greatest good for the greatest number. That is, we calculate the prospective net benefits or harms from a course of action to guide our policies and behaviors. This moral framework deserves scrutiny because it (unfortunately) appears to be the paradigm under which most of our governments, institutions and even educated individuals operate.
The philosophy is commonly illustrated by hypotheticals such as “the trolley problem” wherein a person has the choice whether to divert a runaway trolley (via switch) from its current track with five people in its path to it to an alternate one where only one person would be killed. In short, do you intervene to save five by killing one? The premise of utilitarianism is that, yes, you would because it’s a net positive.
Keep in mind in these hypotheticals these are your only choices, and not only are you certain about the results of your prospective actions, but those are the only results to consider, i.e., the hypothetical does not specify or speculate as to second or third order effects far into the future. For example, what could go wrong once people get comfortable intervening to kill an innocent person for the greater good!
And yet this simplified model, kill one to save five, is then transposed onto real-world scenarios, e.g., mandate an emergency-use vaccine that might have rare side effects because it will save more lives than it costs. The credulous go along, and then reality turns out to be more complex than the hypothetical — as it always is.
The vaccine doesn’t actually stop the spread, it turns out, and the adverse effects are far more common and serious than people were led to believe. Moreover, the mandates destroyed livelihoods, ran roughshod over civil liberties, divided families and destroyed trust in public health.
Some might argue it’s true the mandates were wrong because the vaccine wasn’t sufficiently safe or effective, but we didn’t know that at the time! That we should judge decisions based on the knowledge we had during a deadly pandemic, not after the fact.
But what we did know at the time was that real life is always more complex than the hypothetical, that nth-order effects are always impossible to predict. The lie wasn’t only about the safety and efficacy of this vaccine, though they absolutely did lie about that, it was that we could know something like this with any degree of certainty at all.
The problem with utilitarianism, then, is the harms and benefits it’s tasked with weighing necessarily occur in the future. And what distinguishes the future from the past is that it’s unknown. The save one vs five hypothetical is deceptive because it posits all the relevant consequences as known. It imagines future results laid out before us as if they were past.
But in real life we deal with unknowns, and it is therefore impossible do a rigorous accounting of harms and benefits as imagined by the hypotheticals. The “five vs one,” stated as though the event had already happened, is a conceit conjured from an overly simplistic model.
In short, in modeling the future and weighing those projected fictions the same way one would historic facts, they are simply making it up. And once he grants himself license to make things up, the utilitarian can create the moral imperative to do what coincidentally benefits him, e.g, Pfizer profited to the tune of tens of billions of dollars, for the greater good!, which turned out not to be so good. Once you make the specious leap of purporting to know the future, why not go all the way, and make it a future where the greatest good coincides with enriching yourself to the greatest extent possible?
So in summary, as this has gone on longer than I intended, utilitarianism is moral bankruptcy because the “greater good” on which it relies is necessarily in the future, and we cannot predict the future with enough accuracy, especially over the medium and longer term, to do a proper moral accounting.
As a result, whoever has power is likely to cook the books in whatever way he sees fit, and this moral philosophy of the greatest good for the greatest number paradoxically tends toward a monstrous outcome — temporary benefits for the short-sighted few and the greatest misery for most.
-
@ e67dcfdd:7d83f333
2024-06-28 04:37:55copy/pasted from Ray Dalio on Linkedin so people don't have to use that spyware to read.
As you know, based on my study of history, I believe there are now and have always been five big, interrelated forces that drive how domestic and world orders change. They are the 1) the big debt/credit/money cycle, 2) the big internal order/disorder cycle 3) the big external order/disorder cycle, 4) acts of nature (i.e., droughts, floods, and pandemics), and 5) human innovation that leads to advances in technology. Today, I am focusing on why I believe we are approaching the point in the internal order-disorder cycle when you will have to choose between picking a side and fighting for it, keeping your head down, or fleeing.
Pick a Side and Fight for It, Keep Your Head Down, or Flee I believe we now have to face the fact that fighting for democracy as we know it—with thoughtful disagreement and compromises governed by rule of law—is unlikely to work. People like me who had a long shot hope for the emergence of a strong middle that fights against the extremists to bring the country together and makes major reforms to improve the system must recognize that the differences are becoming too irreconcilable for this to happen.
Based on the lessons I learned from studying history about how things typically transpire under similar circumstances, I believe that what we are now seeing is the parties increasingly moving to greater extremism and a fight-to-win at all cost mode. This is threatening the rule of law as we know it and is bringing us closer to some form of civil war. (As I will explain below, this is not necessarily a violent conflict, though that is possible).
When I wrote my book, Principles for Dealing with the Changing World Order, which looked at the rises and declines of domestic and world orders over the last 500 years, I chronicled the six stages of the “big internal order cycle,” their symptoms, and the cause-effect relationships that drive them. Just like life cycles, these stages are logical and everyone goes through them, typically about once in a lifetime. Toward the end of the cycle, which is where all the signs and symptoms show us to be today, people typically face a choice between fighting for one side or another, keeping their heads down, or fleeing.
When I wrote the book in 2020, I saw the writing on the wall but had hoped for the possibility that we would not cross the brink into a type of civil war, so I estimated the chance of that as about 1 in 3. At the time, this was considered a crazy high estimate (this was before the 2020 election being contested and the January 6th incident). Now I think the risk of some form of civil war is uncomfortably more than 50 percent, and I am confident that in the next year we will know the answer to whether we will cross the brink.
In a Nutshell How It Works Domestically in the US there are two political sides which are also each divided in two: 1) the right side (i.e., the red Republican team), which is divided into the hard right and the moderate right, and 2) the left (the blue Democratic team), which is divided into the hard left and the moderate left. Throughout history, in the later stages of the cycle of internal order and disorder, both sides become increasingly "hard" (extreme) for logical reasons. This is the part of the cycle that we are in. Classically, at this stage, wealth and values gaps are large, people have lost faith that the system will get them what they want, and the hard right and the hard left become increasingly committed to winning for their constituents at all costs, which eventually means abandoning the rules of the game and the judges and just fighting. In the current case and classically, the sides become unwilling to compromise as compromising is perceived as being weak and people are forced to either pick a side and fight for it, keep their heads down, or flee. You should be prepared to make that choice.
To make the decision only a bit more extreme than it currently is, in looking at these two sides, if you had to choose between a fascist government and a communist government, which would you choose? If you are not knowledgeable about what fascism is (a dictatorship of the hard right) and what communism really is (a dictatorship of the hard left), I urge you to get schooled because if you have to make choices, it’s important to really understand them.
The Case at Hand Most importantly, there are now big irreconcilable differences that are producing win-at-all cost perspectives that are undermining the willingness to accept the judgements of the legal system. That is very relevant to nearly all decision making—most importantly to legal and political decision making in and beyond the election. We should acknowledge and worry about what's going on and think about its implications. For example, we should pay attention to Maureen Dowd of the New York Times saying that the Supreme Court is "corrupt, rotten, and hurting America" and the numerous other similar attacks on the system. This is only one of a chorus of such comments. Comments like these beg questions such as 1) what is the definition of corruption, 2) if it is corruption, why don't those who are corrupt get prosecuted and convicted, and 3) if the judicial system and the judges don't make these decisions, how will they be made? Nowadays “corrupt” seems to mean what those on the other side of the political divide decide is corrupt. It is obvious to me that if people don’t rely on the judicial system to make unbiased decisions, decisions will instead be made by revolutionaries on both sides fighting it out. This of course is very relevant to the upcoming election, so let's play out how that will likely go.
It seems to me that if Biden wins, it is likely that Trump and those on the hard right who he represents won't accept the leadership of Biden and the Democratic Party, and that if Trump wins, those on the hard left won't accept Trump's leadership and tactics. What happens next depends on the strength of the legal system, with those on each side seemingly more willing to fight its judgments than abide by them if they don’t get what they want. For these reasons, it seems to me that there is a higher than 50 percent chance that democracy as we know it won't run smoothly through the election and beyond, and that the still most popular view that everyone will abide by the votes and the rules (i.e., if we have ABC votes for president, senators, and congressmen, we will have XYZ policies enacted as a function of the system operating as it has operated) won't prove true.
While it is now commonly believed that Trump Republicans are the greater extremists and the Democrats will be moderate, based on how things have transpired in history and what I see today, I'm not so sure. I think it's more likely that both sides will be more extreme than is commonly believed. Given that it is doubtful that President Biden will remain president through his next term, we don't know what part of the Democratic Party will win out in leading its agenda. While there are moderate leaders in the Democratic Party (i.e., Hakeem Jeffries, Gretchen Whitmer, and Josh Shapiro), those of the hard left (i.e., Elizabeth Warren, Bernie Sanders, and AOC) have largely gone quiet, knowing that they would scare away moderate voters so it's better for them to bide their time while they are pushing their hard left agenda behind the scenes. President Biden's appointment of Lina Khan, a political activist of the left, to head the FTC is an example of the current administration using appointments the way Trump is making clear he will have his political appointees use their positions to pursue a hard-left agenda. In the recent past, leading Democrats have also expressed support for rule changes that would swing power their way (i.e., making Puerto Rico and Washington DC states so they could get control of the Senate, adding to the number of Supreme Court justices to get control of it, removing of the filibuster, etc.) Given all of this, I’m not so sure that hard left Democrats are out of the picture or are above using their government powers to achieve their political agenda any more than I believe that hard right Republicans are above doing that.
For all these reasons, it appears to me that we are probably headed toward an existential battle of the hard right against the hard left in which you will have to pick a side and fight for it, or keep your head down, or flee.
By flee, I think that will mostly be from one state to another and we will see increased emphasis on state rights rather than the central government being dominant. A clash between state governments and a fractured central government appears likely, which I would regard as a type of civil war even if not violent. If things get bad enough, some Americans will flee to other countries and foreigners will choose not to be here. Such disorder would also not be good for rule-of-law and our capital markets.
From studying history, I have seen these sorts of civil wars happen many times before—in the French, Russian, German, Italian, Spanish, Chinese, Cuban and several other cases—so that the sequence of how this cycle typically transpires is clear and appears applicable to what is happening now in the United States (and in several other countries in varying degrees). For those who are interested, I have copied the section from Chapter Five (“The Big Cycle of Internal Order/Disorder”) of my book which the describes Stage Five (the pre-civil war stage that I believe we are in) and Stage Six (the civil war stage that I believe that we are in the brink of) of the internal order cycle. To be clear, I am not saying that we will certainly cross the brink into civil war—I am saying that there is a much higher probability of some type of civil war (including a non-violent one) than is commonly believed.
By the way, what I described here is about domestic conflict. A similar sort of conflict is happening internationally—i.e., there is a classic great power conflict with the two big sides internationally being the China-Russia side and the US -G7-Australia side and regional conflicts are being sorted out by nations in alliances with these two big sides. But that is a subject for another day. Let's now focus on how the internal conflict dynamic typically works and apply that template to what's happening to internal politics with this excerpt from Chapter Five of Principles for Dealing with the Changing World Order.
Stage 5: When There Are Bad Financial Conditions and Intense Conflict
The most important influence that transpires in a Big Cycle is that of debt, money, and economic activity. Because I covered that cycle comprehensively in Chapters 3 and 4, I won’t explain it here in detail. But to understand Stage 5, you need to know that it follows Stage 3, in which there is peace and prosperity and favorable debt and credit conditions, and Stage 4, in which excess and decadence begin to bring about worse conditions. This process culminates in the most difficult and painful stage—Stage 6—when the entity runs out of money and there is typically terrible conflict in the form of revolution or civil war. Stage 5 is the period during which the interclass tensions that go along with worsening financial conditions come to a head. How different leaders, policy makers, and groups of people deal with conflict has a major impact on whether the country will undergo the needed changes peacefully or violently.
You can see signs of this happening now in a number of countries. Those that have adequate financial conditions (i.e., have incomes that are greater than their expenses and assets that are greater than their liabilities) are in relatively good shape. Those that do not are in relatively bad shape. They want money from the others. The problem is that there are many more who are in bad shape relative to those that are in good shape.
You can also see that these different conditions are big drivers of the differences in what is now happening to most aspects of these countries, states, cities, companies, and people—e.g., their education, healthcare, infrastructure, and well-being. You can also see big cultural differences in how countries approach their stressful conditions, with some approaching them more harmoniously than others who are more inclined to fight.
Because Stage 5 is such a pivotal stage in the internal cycle and because it’s the stage that many countries, most importantly the US, are now in, I will devote some time to going through the cause/effect relationships at play during it and the key indicators to watch in examining its progression. Then I will turn more specifically to where the United States stands.
The Classic Toxic Mix The classic toxic mix of forces that brings about big internal conflicts consists of 1) the country and the people in the country (or state or city) being in bad financial shape (e.g., having big debt and non-debt obligations), 2) large income, wealth, and values gaps within that entity, and 3) a severe negative economic shock.
That confluence typically brings about disorder, conflict, and sometimes civil wars. The economic shock can come about for many reasons, including financial bubbles that burst, acts of nature (such as pandemics, droughts, and floods), and wars. It creates a financial stress test. The financial conditions (as measured by incomes relative to expenses and assets relative to liabilities) that exist at the time of the stress test are the shock absorbers. The sizes of the gaps in incomes, wealth, and values are the degrees of fragility of the system. When the financial problems occur, they typically first hit the private sector and then the public sector. Because governments will never let the private sector’s financial problems sink the entire system, it is the government’s financial condition that matters most. When the government runs out of buying power, there is a collapse. But on the way to a collapse there is a lot of fighting for money and political power.
From studying 50-plus civil wars and revolutions, it became clear that the single most reliable leading indicator of civil war or revolution is bankrupt government finances combined with big wealth gaps. That is because when the government lacks financial power, it can’t financially save those entities in the private sector that the government needs to save to keep the system running (as most governments, led by the United States, did at the end of 2008), it can’t buy what it needs, and it can’t pay people to do what it needs them to do. It is out of power.
A classic marker of being in Stage 5 and a leading indicator of the loss of borrowing and spending power, which is one of the triggers for going into Stage 6, is that the government has large deficits that are creating more debt to be sold than buyers other than the government’s own central bank are willing to buy. That leading indicator is turned on when governments that can’t print money have to raise taxes and cut spending, or when those that can print money print a lot of it and buy a lot of government debt. To be more specific, when the government runs out of money (by running a big deficit, having large debts, and not having access to adequate credit), it has limited options. It can either raise taxes and cut spending a lot or print a lot of money, which depreciates its value. Those governments that have the option to print money always do so because that is the much less painful path, but it leads investors to run out of the money and debt that is being printed. Those governments that can’t print money have to raise taxes and cut spending, which drives those with money to run out of the country (or state or city) because paying more taxes and losing services is intolerable. If these entities that can’t print money have large wealth gaps among their constituents, these moves typically lead to some form of civil war/revolution.
At the time of this writing, this late-cycle debt dynamic is now playing out in the United States at both the state and federal levels, with the main difference between them being that state governments can’t print money to pay their debts while the federal government can. The federal government and many state and city governments have large deficits, large debts, and large wealth gaps, and the central bank (the Federal Reserve) has the power to print money. So, at the time of this writing, the central bank is printing a lot of money and buying a lot of federal government debt, which finances the government spending that is much bigger than the federal government’s intake. That has helped the federal government and those it is trying to help, though it has also cost those who are holding dollars and dollar debt a lot in real purchasing power.
Those places (cities, states, and countries) that have the largest wealth gaps, the largest debts, and the worst declines in incomes are most likely to have the greatest conflicts. Interestingly, those states and cities in the US that have the highest per capita income and wealth levels tend to be the states and cities that are the most indebted and have the largest wealth gaps—e.g., cities like San Francisco, Chicago, and New York City and states like Connecticut, Illinois, Massachusetts, New York, and New Jersey.
Facing these conditions, expenditures have to be cut or more money has to be raised in some way. The next question becomes who will pay to fix them, the “haves” or the “have-nots”? Obviously, it can’t be the have-nots. Expenditure cuts are most intolerable for those who are poorest, so there needs to be more taxation of people who can afford to pay more and there is a heightened risk of some form of civil war or revolution. But when the haves realize that they will be taxed to pay for debt service and to reduce the deficits, they typically leave, causing the hollowing-out process. This is currently motivating movements from some states to others in the US. If bad economic conditions occur, that hastens the process. These circumstances largely drive the tax cycle.
History shows that raising taxes and cutting spending when there are large wealth gaps and bad economic conditions, more than anything else, has been a leading indicator of civil wars or revolutions of some type.
To be clear, they don’t have to be violent, though they can be. I see these cycles transpiring in my personal interactions. For example, I live in the state of Connecticut, which has the highest per capita income in the country, the largest wealth gap and income gap in the country, and one of the largest per capita debt and unfunded pension obligations in the country. I see how the haves and the have-nots are focused on their own lives and spend little time worrying about the other because they don’t have much contact. I have windows into what the lives of both the haves and the have-nots are like because I have contact with the people in our community of haves and because the work my wife does to help disengaged and disconnected high school students in disadvantaged communities brings her into contact with people who live in the communities of the have-nots. I see how terrible the conditions are in those have-not communities and how the haves (who appear rich and decadent to the have-nots) don’t feel rich. I see how they are all focused on their own struggles—with the haves struggling with work/life balance, making sure their kids are well-educated, etc., and the have-nots struggling with finding income, food security, avoiding violence, trying to get their kids a quality education, etc.
I see how both groups are more likely to have critical, stereotypical impressions of each other that make them more inclined to dislike each other than to view themselves empathetically as members of one community in which they should help each other. I see how difficult it can be to help each other because of these stereotypes and because the haves don’t feel that they have more than enough or that the have-nots deserve their financial support, and I fear what the future might hold because of the existing circumstances and how they are likely to worsen. I have seen close up how COVID-inflicted health and budget shocks have brought to the surface the terrible conditions of the have-nots and are worsening the financial gaps that could bring about the classic toxic mix dynamic.
Averages don’t matter as much as the number of people who are suffering and their power.
Those who favor policies that are good for the whole—e.g., free trade, globalization, advances in technology that replace people—without thinking about what happens if the whole is not divided in a way that benefits most people are missing the fact that the whole is at risk.
To have peace and prosperity, a society must have productivity that benefits most people. Do you think we have this today?
What does history show as the path that bankrupt governments can follow to raise productivity that benefits most people? It shows that restructuring and/or devaluing enough of the previously created debt and non-debt obligations helps a lot. That is classic in Stages 5 and 6. Once the restructuring or devaluation reduces the debt burdens, which is typically painful at the time, the reduced debt burdens allow for a rebuilding.
An essential ingredient for success is that the debt and money that are created are used to produce productivity gains and favorable returns on investment, rather than just being given away without yielding productivity and income gains. If it is given away without yielding these gains, the money will be devalued to the point that I won’t leave the government or anyone else with much buying power.
History shows that lending and spending on items that produce broad-based productivity gains and returns on investment that exceed the borrowing costs result in living standards rising with debts being paid off, so these are good policies.
If the amount of money being lent to finance the debt is inadequate, it is perfectly fine for the central bank to print the money and be the lender of last resort as long as the money is invested to have a return that is large enough to service the debt. History shows and logic dictates that investing well in education at all levels (including job training), infrastructure, and research that yields productive discoveries works very well. For example, big education and infrastructure programs have paid off nearly all the time (e.g., in the Tang Dynasty and many other Chinese dynasties, in the Roman Empire, in the Umayyad Caliphate, in the Mughal Empire in India, in Japan’s Meiji Restoration, and in China’s educational development programs over the last couple of decades), though they have long lead times. In fact, improvements in education and infrastructure, even those financed by debt, were essential ingredients behind the rises of virtually all empires, and declines in the quality of these investments were almost always ingredients behind empires’ declines. If done well, these interventions can more than counterbalance the classic toxic mix.
The classic toxic mix is usually accompanied by other problems. The more of the following conditions that are in place, the higher the probability of having a severe conflict like a civil war or revolution.
Decadence While early in the cycle there is typically more spending of time and money on productive things, later in the cycle time and money go more toward indulgent things (e.g., the finer things, like expensive residences, art, jewelry, and clothes). This begins in Stage 4 when such spending is fashionable, but by Stage 5 it begins to appear grotesque. Often, that decadent spending is debt-financed, which worsens the financial conditions. The change in psychology that typically goes along with these changes is understandable. The haves feel that they have earned their money so they can spend it on luxuries if they like, while the have-nots view such spending at the same time they are suffering as unfair and selfish. Besides increasing resentments, decadent spending (as distinct from saving and investing) reduces productivity.
What a society spends money on matters. When it spends on investment items that yield productivity and income gains, it makes for a better future than when it spends on consumption items that don’t raise productivity and income.
Bureaucracy While early in the internal order cycle bureaucracy is low, it is high late in the cycle, which makes sensible and necessary decision making more difficult.
That is because things tend to get more complex as they develop until they reach the point where even obviously good things can’t be done—necessitating revolutionary changes. In a legal and contract-based system (which has many benefits), this can become a problem because the law can stand in the way of doing obviously good things. I will give you an example that I’m close to because my wife and I care about it.
Because the US Constitution doesn’t make education a federal government responsibility, it has predominantly been a state and local responsibility with school funding coming from revenue raised by local taxes in cities and towns. Though it varies from state to state, typically those children in richer towns in richer states receive a much better education than those in poorer towns in poorer states. This is obviously unfair and unproductive even though most people agree that children should have equal opportunities in education. But because this structure is so ingrained in our political system, it is nearly impossible to fix without a revolutionary reinvention of how we approach it. There are more examples of the bureaucracy standing in the way of doing sensible, productive things than I have time and space to convey here. It is now a big problem in America.
Populism and Extremism Out of disorder and discontent come leaders who have strong personalities, are anti-elitist, and claim to fight for the common man. They are called populists. Populism is a political and social phenomenon that appeals to ordinary people who feel that their concerns are not being addressed by the elites. It typically develops when there are wealth and opportunity gaps, perceived cultural threats from those with different values both inside and outside the country, and “establishment elites” in positions of power who are not working effectively for most people. Populists come into power when these conditions create anger among ordinary people who want those with political power to be fighters for them. Populists can be of the right or of the left, are much more extreme than moderates, and tend to appeal to the emotions of ordinary people. They are typically confrontational rather than collaborative and exclusive rather than inclusive. This leads to a lot of fighting between populists of the left and populists of the right over irreconcilable differences. The extremity of the revolution that occurs under them varies. For example, in the 1930s, populism of the left took the form of communism and that of the right took the form of fascism while nonviolent revolutionary changes took place in the US and the UK. More recently, in the United States, the election of Donald Trump in 2016 was a move to populism of the right while the popularity of Bernie Sanders, Elizabeth Warren, and Alexandria Ocasio-Cortez reflects the popularity of populism of the left. There are increased political movements toward populism in a number of countries. It could be said that the election of Joe Biden reflects a desire for less extremism and more moderation, though time will tell.
Watch populism and polarization as markers. The more that populism and polarization exist, the further along a nation is in Stage 5, and the closer it is to civil war and revolution. In Stage 5, moderates become the minority. In Stage 6, they cease to exist.
Class Warfare In Stage 5, class warfare intensifies. That is because, as a rule, l during times of increased hardship and conflict there is an increased inclination to look at people in stereotypical ways as members of one or more classes and to look at these classes as either being enemies or allies. In Stage 5, this begins to become much more apparent. In Stage 6, it becomes dangerous.
A classic marker in Stage 5 that increases in Stage 6 is the demonization of those in other classes, which typically produces one or more scapegoat classes who are commonly believed to be the source of the problems. This leads to a drive to exclude, imprison, or destroy them, which happens in Stage 6. Ethnic, racial, and socioeconomic groups are often demonized. The most classic, horrific example of this comes from the Nazi’s treatment of Jews, who were blamed and persecuted for virtually all of Germany’s problems. Chinese minorities living in non-Chinese countries have been demonized and scapegoated during periods of economic and social stress. In the UK, Catholics were demonized and scapegoated in numerous stressful periods, such as the Glorious Revolution and the English Civil War. Rich capitalists are commonly demonized, especially those who are viewed to be making their money at the expense of the poor. Demonizing and scapegoating are a classic symptom and problem that we must keep an eye on.
The Loss of Truth in the Public Domain Not knowing what is true because of distortions in the media and propaganda increases as people become more polarized, emotional, and politically motivated.
In Stage 5, those who are fighting typically work with those in the media to manipulate people’s emotions to gain support and to destroy the opposition. In other words, media folks of the left join with others of the left and media folks of the right join with others of the right in the dirty fight. The media goes wild like vigilantes: people are commonly attacked and essentially tried and found guilty in the media, and they have their lives ruined without a judge and jury. A common move among 1930s populists of the left (communists) and of the right (fascists) was to take control of the media and establish “ministers of propaganda” to guide them. The media they produced was explicitly aimed at turning the population against the groups that the governments considered “enemies of the state.” The government of the democratically run United Kingdom created a “Ministry of Information” during World War I and World War II to spread government propaganda, and leading newspaper publishers were elevated by the government if they did what the government wanted them to do to win the propaganda war or were vilified and suffered if they didn’t cooperate. Revolutionaries did the same distorting of the truth in all sorts of publications. During the French Revolution, newspapers run by revolutionaries pushed anti-monarchist and anti-religious sentiment, but when those revolutionaries attained power, they shut down dissenting newspapers during the Reign of Terror. During times of great wealth gaps and populist thinking, stories that bring down elites are popular and lucrative, especially those that bring down left-leaning elites in right-leaning media outlets and those that bring downright-leaning elites in left-leaning media outlets. History shows that significant increases in these activities are a problem that is typical of Stage 5, and that when combined with the ability to inflict other punishments, the media becomes a powerful weapon.
It is well-recognized this is happening at the time of this writing. The perceived truth in media, both traditional and social, is lower than at any other time in our lifetimes. For example, a 2019 Gallup poll found that only 13 percent of Americans surveyed have “a great deal” of trust in the media and only 41 percent of those surveyed have either a “fair” or “great deal” of trust in the media. That compares with 72 percent who trusted the media in 1976. This is not just a fringe media problem; it is a mainstream media problem and a problem for our whole society. The dramatically decreased trustworthiness has even plagued former icons of journalistic trust such as The Wall Street Journal and The New York Times, which have seen their trust ratings plunge. In addition to being politically motivated, sensationalistic stories have become commercially rewarding at a time when the media business is in financial trouble. Most of the media folks I speak with share my concerns, though they typically won’t share them openly. Still, in reflecting on the problem, Martin Baron, then executive editor of The Washington Post, said, “If you have a society where people can’t agree on the basic facts, how do you have a functioning democracy?” This dynamic is impeding free speech since people are afraid to speak up because of how they will be attacked in both traditional and social media by distortions that are meant to bring them down.
Even very capable and powerful people are now too afraid of the media to speak up about important matters or run for public office. Since most high-profile people are torn down, most everyone I speak with agrees that it is dangerous to be a high-profile, vocal person who fights for truth and justice, especially if one offends people who are inclined to use the media to fight. Though not discussed in public because of fears of media reprisals, this issue is continuously discussed in private. For example, during a lunch I had not long ago with a general who had held a very high political position and had just left government service, we explored what he would do next. I asked him what he was most passionate about. He said, “Of course helping my country.” I asked him whether he would consider running for elected office, and he explained that while he was willing to die for his country he couldn’t bring himself to run for public office because of how enemies would use the media and social media to make up lies to harm him and his family. This general and almost everyone I know who we should listen to are afraid to speak openly because they fear that attacks by extremists who oppose them will be enabled and amplified by the sensationalistic media. Many of my friends tell me that I’m crazy to speak so openly about controversial things such as those covered in this book because it is inevitable that some people or groups will try to take me down via the media. I think they are probably right, but I won’t let the risks dissuade me.
Rule-Following Fades and Raw Fighting Begins When the causes that people are passionately behind are more important to them than the system for making decisions, the system is in jeopardy. Rules and laws work only when they are crystal clear and most people value working within them enough that they are willing to compromise in order to make them work well.
If both of these are less than excellent, the legal system is in jeopardy. If the competing parties are unwilling to try to be reasonable with each other and to make decisions civilly in pursuit of the well-being of the whole, which will require them to give up things that they want and might win in a fight, there will be a sort of civil war that will test the relative powers of the relevant parties. In this stage, winning at all costs is the game and playing dirty is the norm. Late in Stage 5 is when reason is abandoned in favor of passion.
When winning becomes the only thing that matters, unethical fighting becomes progressively more forceful in self-reinforcing ways. When everyone has causes that they are fighting for and no one can agree on anything, the system is on the brink of civil war/revolution.
This typically happens in a couple of ways:
Late in Stage 5 it is common for the legal and police systems to be used as political weapons by those who can control them. Also, private police systems form—e.g., thugs who beat people up and take their assets, and bodyguards to protect people from these things happening to them. For instance, the Nazi party formed a paramilitary wing before it came to power that then became an official force when the Nazis were in power. The short-lived British Union of Fascists in the 1930s and the Ku Klux Klan in the US were effectively paramilitary groups as well. Such cases are quite normal, so view their development as a marker of moving to the next stage.
Late in Stage 5 there are increasing numbers of protests that become increasingly violent. Because there is not always a clear line between a healthy protest and the beginnings of a revolution, leaders in power often struggle over how to allow protests without giving the perceived freedom to revolt against the system. Leaders must manage these situations well. A classic dilemma arises when demonstrations start to cross over into revolution. Both giving the freedom to protest and suppressing protests are risky paths for leaders, as either path could lead the revolution to get strong enough to topple the system. No system allows people to bring down the system—in most, an attempt to do so is treason, typically punishable by death. Nonetheless, it is the job of revolutionaries to bring down systems, so governments and revolutionaries test each other to see what the limits are. When broad-based discontent bubbles up and those in power allow it to grow, it can boil over to the point that when they try to put a lid on it, it explodes. The conflicts in the late part of Stage 5 typically build up to a crescendo that triggers the violent fighting that signifies the transition into what historians stamp as official civil war periods, which I am identifying as Stage 6 in the Big Cycle.
People dying in the fighting is the marker that almost certainly signifies the progression to the next and more violent civil war stage, which will continue until the winners and losers are clearly determined.
That brings me to my next principle:
When in doubt, get out—if you don’t want to be in a civil war or a war, you should get out while the getting is good.
This is typically late in Stage 5. History has shown that when things get bad, the doors typically close for people who want to leave. The same is true for investments and money as countries introduce capital controls and other measures during such times.
Crossing the line from Stage 5 (when there are very bad financial conditions and intense internal and external conflict exist) to Stage 6 (when there is civil war) occurs when the system for resolving disagreements goes from working to not working. In other words, it happens when the system is broken beyond repair, people are violent with each other, and the leadership has lost control.
As you might imagine, it is a much bigger deal to break a system/order and build a new one than it is to make revolutionary changes within an existing system/order. Though breaking a system/order is more traumatic, it isn’t necessarily a worse path than operating within a system.
Deciding whether to keep and renovate something old that is not working well or to dispose of it and replace it with something new is never easy, especially when the something new is not clearly known and what is being replaced is as important as the domestic order. Nonetheless, it happens, though typically it is not decided on intellectually; it is more often emotionally driven.
When one is in Stage 5 (like the US is now), the biggest question is how much the system will bend before it breaks.
The democratic system, which allows the population to do pretty much whatever it decides to do, produces more bending because the people can make leadership changes and only have themselves to blame. In this system regime changes can more easily happen in a peaceful way. However, the “one person, one vote” democratic process has the drawback of having leaders selected via popularity contests by people who are largely not doing the sort of thoughtful review of capabilities that most organizations would do when trying to find the right person for an important job. Democracy has also been shown to break down in times of great conflict.
Democracy requires consensus decision making and compromise, which requires a lot of people who have opposing views to work well with each other within the system. That ensures that parties that have significant constituencies can be represented, but like all big committees of people who have widely different views (and might even dislike each other), the decision-making system is not efficient.
The biggest risk to democracies is that they produce such fragmented and antagonistic decision making that they can be ineffective, which leads to bad results, which leads to revolutions led by populist autocrats who represent large segments of the population who want to have a strong, capable leader get control of the chaos and make the country work well for them.
Also noteworthy: history has shown that during times of great conflict federalist democracies (like the US) typically have conflicts between the states and the central government over their relative powers. That would be a marker to look out for that hasn’t yet arisen much in the US; it’s happening would signify the continued progression toward Stage Six.
There are far too many breakdowns of democracies to explore, let alone describe. While I looked into a number of them to see the patterns, I haven’t fully mined them, and I’m not going to dive into them here. I will say that the factors described in the explanations of Stage 5 when taken to the extreme—most importantly, terrible finances, decadence, internal strife and disorder, and/or major external conflict—lead to a dysfunctional set of conditions and a fight for power led by a strong leader. Archetypical examples include Athens from the late 400s to the 300s BCE, the end of the Roman Republic in the century or so preceding 27 BCE, Germany’s Weimar Republic in the 1920s, and the weak democracies of Italy, Japan, and Spain in the 1920s and 1930s that turned to autocracies of the right (fascism) to bring order to the chaos.
Different stages require different types of leaders to get the best results. Stage 5 is a juncture in which one path could lead to civil war/revolution and the other could lead to peaceful and, ideally, prosperous coexistence. Obviously the peaceful and prosperous path is the ideal path, but it is the much more difficult path to pull off.
That path requires a “strong peacemaker” who goes out of their way to bring the country together, including reaching out to the other side to involve them in the decision making and reshaping the order in a way that most people agree is fair and works well (i.e., is highly productive in a way that benefits most people). There are few such cases in history. We pray for them. The second type is a “strong fighter” who is capable of taking the country through the hell of civil war/revolution.
Stage 6: When There Are Civil Wars Civil wars inevitably happen, so rather than assuming “it won’t happen here,” which most people in most countries assume after an extended period of not having them, it is better to be wary of them and look for the markers to indicate how close one is.
While in the last section we looked at nonviolent revolutions that took place within the order, in this section we will be looking at the markers and the patterns of civil wars and revolutions that were almost always violent and toppled the old order and replaced it with a new one. Though there are innumerable examples that I could have examined to understand how they work, I chose what I believe are the 29 most significant ones, which are shown in the following table. I categorized this group into those that produced big changes to the system/regime and those that did not. For example, the US Civil War was a really bloody civil war that failed to overturn the system/order, so it is in the second group at the bottom of the table, while those that toppled the system/order are at the top. These categories are of course imprecise, but once again we won’t let imprecision stand in the way of seeing what we couldn’t see if we insisted on being precise. Most of these conflicts, though not all of them, transpired in the archetypical way described in this section.
A classic example of a civil war breaking the system and having to build a new system is the Russian Revolution/Civil War of 1917. This put into place the communist internal order that eventually entered Stage 5 in the late 1980s, which led it to attempt to make revolutionary changes within the system—called perestroika (i.e., restructuring)—which failed and were followed by the collapse of the Soviet Union’s order in 1991. The communist domestic order lasted 74 years (from 1917 until 1991). That order was replaced by the new system/order that is now governing Russia, which, after the collapse of the old order, was built in the classic ways described earlier in this chapter in my explanations of Stages 1 and 2.
Another is Japan’s Meiji Restoration, which came about as a result of a three-year revolution (1866–69) that happened because the Japanese were closed off to the outside world and failed to advance. The Americans forced the Japanese to open, which prompted a revolutionary group to fight and defeat the rulers (led by the military shogun) in battle, which led to overturning the internal order then run by the four classes—the military, farmers, artisans, and merchants—that had ruled Japan. This old Japanese order run by traditional people was ultra-conservative (e.g., social mobility was outlawed) and was replaced by revolutionaries who were relatively progressive and changed everything by reinstating the powers of a modernizing emperor. Early in this period there were lots of labor disputes, strikes, and riots that resulted from the classic triggers of wealth gaps and bad economic conditions. In the reform process the leadership provided universal elementary education for both boys and girls, adopted capitalism, and opened the country up to the outside world. They did this with new technologies, which led them to become very competitive and gain wealth.
There are many such cases of countries that did the right things to produce revolutionarily beneficial improvements, just as there are many cases of revolutionaries doing the wrong things that inflicted terrible pain on their people for decades. By the way, as a result of its reformations Japan went on to move through the classic stages of the Big Cycle. It became extremely successful and rich. But over time it became decadent, overextended, and fragmented, had an economic depression, and fought expensive wars, all of which led to a classic demise. Its Meiji order and its classic Big Cycle lasted for 76 years from 1869 to 1945.
Civil wars and revolutions inevitably take place to radically change the internal order.
They include total restructurings of wealth and political power that include complete restructurings of debt and financial ownership and political decision making. These changes are the natural consequence of needing to make big changes that can’t be made within the existing system. Almost all systems encounter them. That is because almost all systems benefit some classes of people at the expense of other classes, which eventually becomes intolerable to the point that there is a fight to determine the path forward. When the gaps in wealth and values become very wide and bad economic conditions ensue so that the system is not working for a large percentage of the people, the people will fight to change the system. Those who are suffering the most economically will fight to get more wealth and power from those who have wealth and power and who benefit from the existing system. Naturally the revolutionaries want to radically change the system, so naturally they are willing to break the laws that those in power demand they adhere to. These revolutionary changes typically happen violently through civil wars, though as previously described, they can come about peacefully without toppling the system.
The periods of civil war are typically very brutal. Typically, early on these wars are forceful and orderly struggles for power, and as the fighting and emotions intensify and the sides do anything to win, the levels of brutality accelerate unexpectedly such that the actual levels of brutality that occur in the Stage 6 civil wars and revolutions would have been considered implausible in Stage 5. The elites and moderates generally flee, are imprisoned, or are killed. Reading the stories of civil wars and revolutions, such as the Spanish Civil War, the Chinese Civil War, the Russian Revolution, and the French Revolution, made my hair curl.
How do they transpire? Earlier I described the dynamics of Stage 5 that led to crossing the line into Stage 6. During this stage all of those intensify greatly. I will explain.
How Civil Wars and Revolutions Transpire As previously described, the cycle of building wealth and wealth gaps that leads to a very small percentage of the population controlling an exceptionally large percentage of the wealth eventually results in the poor majority overthrowing the rich minority via civil wars and revolutions. This has happened more times than one can imagine.
While most of the archetypical civil wars and revolutions shifted power from the right to the left, many shifted wealth and power to the right and away from those on the left. However, there were fewer of them and they were different. They typically happened when the existing orders slipped into dysfunctional anarchies and a large percentage of the population yearned for strong leadership, discipline, and productivity. Examples of revolutions from the left to the right include Germany, Spain, Japan, and Italy in the 1930s; the fall of the Soviet Union in the 1980s to the early 1990s; the 1976 coup in Argentina replacing Isabel Perón with a military junta; and the coup leading to the Second French Empire in 1851. All those that I examined worked or didn’t work for the same reason. Like those of the left, these new internal orders succeeded when they produced broad-based economic successes and failed when they did not. Because broad economic prosperity is the biggest reason a new regime succeeds or fails, the long-term trends have been to both greater total wealth and broader distribution of the wealth (i.e., better economic and health outcomes for the average person). That big picture can be easily lost when one is in and experiencing one part of the Big Cycle.
Typically, the people who led the civil war/revolution were (and still are) well-educated people from middle-class backgrounds. For example, three of the key revolutionary leaders of the French Revolution were Georges-Jacques Danton, a lawyer raised in a bourgeois family; Jean-Paul Marat, a physician, scientist, and journalist raised in a bourgeois family; and Maximilian Robespierre, a lawyer and statesman also from a bourgeois family. This revolution was initially supported by many liberal aristocrats, like the Marquis de Lafayette, who were raised in moderately well-off families. Similarly, the leaders of the Russian Revolution were Vladimir Lenin, who studied law, and Leon Trotsky, who was raised in a bourgeois family of intellectuals. The Chinese Civil War was led by Mao, who was from a moderately well-off family and studied a variety of subjects such as law, economics, and political theory, and Zhou Enlai, who was from a scholarly middle-class family of civil servants. These leaders also typically were (and still are) charismatic and able to lead and work well with others to build big, well-run organizations that have the power to bring about the revolutions. If you want to look for the revolutionaries of the future, you might keep an eye on those who have these qualities. Over time they typically evolve from being idealistic intellectuals wanting to change the system to be fairer to brutal revolutionaries bent on winning at all costs.
While having large wealth gaps during economically difficult times was typically the biggest source of conflict, there were always other reasons for conflict that added up to a lot of opposition to the leadership and the system. Typically, in revolutions the revolutionaries with these different grievances joined together to make revolutionary changes; while they looked united during the revolution, after winning the revolution, they typically fought with each other over issues and for power.
As previously mentioned, during the civil war/revolution stage of the cycle the governments in power almost always had an acute shortage of money, credit, and buying power. That shortage created the desire to grab money from those who had it, which led those who had wealth to move it into places and assets that were safe, which led the governments to stop these movements by imposing capital controls—i.e., controls on movements to other jurisdictions (e.g., other countries), to other currencies, or to assets that are more difficult to tax and/or are less productive (e.g., gold).
To make matters even worse, when there was internal disorder, foreign enemies were more likely to challenge the country. This happens because domestic conflict causes vulnerabilities that make external wars more likely. Internal conflict splits the people within a country, is financially taxing on them, and demands attention that leaves less time for the leaders to tend to other issues—all things that create vulnerabilities for foreign powers to take advantage of. That is the main reason why internal wars and external wars tend to come close together. Other reasons include: emotions and tempers are heightened; strong populist leaders who tend to come to power at such times are fighters by nature; when there are internal conflicts leaders find that a perceived threat from an external enemy can bring the country together in support of the leader so they tend to encourage the conflict; and being deprived leads people/countries to be more willing to fight for what they need, including resources that other countries have.
Almost all civil wars have had some foreign powers participating in an attempt to influence the outcome to their benefit.
The beginnings of civil wars and revolutions aren’t clear when they are happening, though they are obvious when one is deeply in the middle of them.
While historians assign dates to the beginnings and ends of civil wars, they are arbitrary. The truth is that almost no one at the time knows that a civil war has begun or that it has ended, but they know when they are in them. For example, many historians have designated July 14, 1789, as the day the French Revolution began because a mob stormed an armory and prison called the Bastille. But nobody at the time thought it was the beginning of the French Revolution or had any idea how terribly brutal that civil war and revolution would become. While one might not know what’s to come, one can have imprecise markers that help one place where one is, to see the direction that one is moving in, and to know something about what the next stage will be like.
Civil wars are incredibly brutal because they are fights to the death. Everyone is an extremist because everyone is forced to pick a side and fight—also moderates lose out in knife fights.
As for what types of leaders are best for civil wars and revolutions, they are the “inspirational generals”—people who are strong enough to marshal support and win the various types of battles they have to win. Because the fight is brutal, they have to be brutal enough to do whatever is necessary to win.
The time that historians stamp as the civil war period typically lasts a few years and determines the official winners and losers, which is conveyed by who gets to occupy the government buildings in the capital. But like the beginnings, the ends of civil wars/revolutions are not as clearly defined as historians convey. The fighting to consolidate power can go on for a long time after the official civil war has ended.
While civil wars and revolutions are typically extremely painful, they often lead to restructurings that, if done well, can establish the foundation for improved future results. What the future after the civil war/revolution looks like depends on how the next steps are handled.
Conclusion My study of history has taught me that nothing is forever other than evolution, and within evolution there are cycles that are like tides that come in and go out and that are hard to change or fight against. To handle these changes well it is essential to know which stage of the cycle one is in and to know timeless and universal principles for dealing with it. As conditions change the best approaches change—i.e., what is best depends on the circumstances and the circumstances are always changing in the ways we just looked at. For that reason, it is a mistake to rigidly believe that any economic or political system is always best because there will certainly be times when that system is not best for the circumstances at hand, and if a society doesn’t adapt it will die. That is why constantly reforming systems to adapt well is best. The test of any system is simply how well it works in delivering what most of the people want, and this can be objectively measured, which we can do and will continue to do. Having said that, the lesson from history that comes through most loudly and most clearly is that skilled collaborations to produce productive win-win relationships to both grow and divide the pie well, so that most people are happy, are much more rewarding and much less painful than fighting civil wars over wealth and power that lead to one side subjugating the other side.
-
@ 6a39a186:88f51c19
2024-06-28 02:38:59Could a Node-Based Conflict Resolution Model Exist?
A node-based system addresses these challenges and remove nearly all barriers to giving via P2P layers . By leveraging distributed network infrastructure, nodes allow donors, aid startups and communities in urgently needed ways.
Nodes act as multipurpose portals, enabling donors easy access to vetted causes through diverse integrated channels. This cast-wide appeal maximizes funding potential.
More importantly, Nostr and the public ledger provides real-time insights seldom available to donors formerly. Skeptics fear reduced privacy but anonymized protocols do work perfectly and are safe for everyone to use. Being clear about all donations would greatly help node operations by publishing audits of the donation process.
Most critically, partnering with local nodes helps circumvent top-heavy organizational structures that see only a fraction of every dollar reach those in need. Establishing open sourced villages built upon protocols like Nostr help hubs and startup not aligned with any corporate entity to foster user and client preferences tailored to cultural/business contexts outsiders cannot.
While not a panacea, a decentralized/P2P philanthropic framework powered by censorship resistant networked nodes along a controlled data plane holds promise for reinventing humanitarian action for technologies using blockchain or security purposes like Bitcoin. By putting control and visibility back in the hands of donors and crisis-impacted people, it can help to not just give life-saving aid, but dignity via financial security. In crisis there is no time for inefficient systems - innovation must lift all boats.
To build a community-driven system for providing food locally, we will leverage Nostr as the foundational support ecosystem. Each node in this network can function as a country, an in-home clinic, a resource center, an ATM facility, or a conflict relief fund, all powered through education and food distribution.
The core philosophy is self-reliance and constant improvement in how we use Nostr
With the most crucial factor being to growing each part better by making constant improvements to how you use Nostr, whether it be for business, dating or hanging out.
Our pricing strategy revolves around tapping into the hidden power of Bitcoin to make goods and services affordable. We will price everything in USD and then convert to Bitcoin for transactions.
To gauge the willingness of local vendors and consumers to accept Bitcoin for food, we will educate the community about Bitcoin and DeFi solutions like Boltz. By explaining the benefits and providing services for Bitcoin transactions, we can encourage adoption..
Driving this Education as meeting place or Food and Bitcoin. Every tutorial on setting up a Bitcoin wallet becomes a valuable resource. Many are unaware of the potential of Bitcoin wallets, and we aim to highlight their importance
But that general attitude in that Clients must scrutinize their operational security (OPSEC) and wallet management.
This will take time, I'm less organized than most
Through any continuous small improvements, I will keep Nostr Updated.
-
@ a012dc82:6458a70d
2024-06-27 23:26:27Table Of Content
-
Content
-
Conclusion
-
FAQ
-
You May Also Like
-
External Links
Introduction
The world of cryptocurrency is rapidly evolving, and one of the defining characteristics of this innovative ecosystem is the sense of community that has formed around it. From HODLers to developers, from miners to traders, the Bitcoin community is a diverse and vibrant group of individuals united by a common goal: to build a better financial future through the power of decentralized technology.
The Importance of Community in the Bitcoin Ecosystem
The success of Bitcoin and other cryptocurrencies depends on the strength and resilience of its community. A strong and united community can drive innovation, promote adoption, and provide support to its members. The Bitcoin community has already demonstrated its power in these areas, and by continuing to foster a supportive and inclusive environment, it can ensure the long-term success of the cryptocurrency.
Building a Supportive and Inclusive Community
One of the key ways to build a stronger Bitcoin community is to create a supportive and inclusive environment where all members feel valued and respected. This can be achieved through open communication, collaboration, and by embracing diversity and differences. By creating an atmosphere where all members feel supported, the community can foster growth and innovation, and provide a safe space for new members to join and learn about Bitcoin.
Fostering Communication and Collaboration
Effective communication and collaboration are essential for building a strong and united community. Encouraging members to share their ideas and experiences, and actively seeking out diverse perspectives, can lead to new insights and solutions. By fostering a culture of open and honest communication, the Bitcoin community can continue to evolve and grow, and provide a supportive and inclusive environment for all members.
Supporting the Next Generation of Bitcoin Enthusiasts
The future of Bitcoin and the cryptocurrency ecosystem will be shaped by the next generation of enthusiasts and investors. By providing support and guidance to new members, the community can help to ensure the continued growth and success of Bitcoin. This can be achieved through education, mentorship programs, and by creating a welcoming and inclusive environment for all members.
Conclusion
The Bitcoin community is more than just a group of investors, it is a family of individuals united by a shared vision for the future of finance. By building a supportive and inclusive environment, fostering communication and collaboration, and supporting the next generation of enthusiasts, the community can ensure the long-term success of Bitcoin and the cryptocurrency ecosystem.
FAQs
What is the purpose of the Bitcoin community? The purpose of the Bitcoin community is to promote the adoption and growth of Bitcoin and the cryptocurrency ecosystem through collaboration, education, and support.
How can the community help to ensure the success of Bitcoin? By fostering a supportive and inclusive environment, promoting open communication and collaboration, and supporting the next generation of enthusiasts, the community can help to ensure the success of Bitcoin.
How can individuals get involved in the Bitcoin community? Individuals can get involved in the Bitcoin community by participating in online forums and discussion groups, attending events and meetups, and connecting with other members through social media and other channels.
What are the benefits of being part of the Bitcoin community? Being part of the Bitcoin community provides individuals with access to a supportive network of like-minded individuals, opportunities for education and growth, and the chance to contribute to the future of finance through the power of decentralized technology.
In conclusion, the Bitcoin community is a vital part of the cryptocurrency ecosystem, and by working together and building a strong, supportive, and inclusive environment, the community can ensure the continued success of Bitcoin and the broader ecosystem. Whether you are a seasoned investor or a newcomer to the world of cryptocurrency, there is a place for you in the Bitcoin community, and the benefits of being part of this vibrant and growing family are endless.
That's all for today
If you want more, be sure to follow us on:
NOSTR: croxroad@getalby.com
Instagram: @croxroadnews.co
Youtube: @croxroadnews
Store: https://croxroad.store
Subscribe to CROX ROAD Bitcoin Only Daily Newsletter
https://www.croxroad.co/subscribe
DISCLAIMER: None of this is financial advice. This newsletter is strictly educational and is not investment advice or a solicitation to buy or sell any assets or to make any financial decisions. Please be careful and do your own research.
-
-
@ 53dab473:3a95f02d
2024-06-27 23:22:27The Grapevine is the name given to the implementation of the web of trust in the Pretty Good Project. Its purpose is to help you find the high quality content you seek, even when this means finding a needle in a haystack. To this end, the Grapevine calculates how much Influence any given user should have for the curation of another user’s content in some given context. This post presents an overview of precisely how the Influence score is calculated and how this method will allow us to escape the soul-killing tyranny of today’s social media so-called “influencer.”
Motivation
The rise of the social media “influencer” encapsulates much of what is pathologic about modern day social media. Tech companies, funded by advertising, will do anything to generate clicks and attract attention. This, by definition, is what a social media influencer is good at. Our tech companies spend billions of dollars on platforms and algorithms that cater to the MrBeasts and Kim Kardashians of the world. These people are brilliant in their own way and in what they do — which is what, exactly? Attract followers. Generate clicks and likes. Figure out better ways to trigger dopamine hits. In the process, the world’s ADHD only gets worse and worse.
Arguably, this is very bad for society. Our attention is focused on frivolous topics and people. But attention is limited. The influencer economy exists to the detriment of topics, ideas and users who might be better deserving of our attention. One wonders what would happen if the next Einstein, a genius in a meaningful topic like math or physics but perhaps not a marketing genius with the skill, time or desire build a follower count, were to post a theory of everything on Twitter/X. Would you see it? Probably not. The algorithms would never even notice it. You could very well have no idea it ever existed.
The Pretty Good way to calculate influence
The Pretty Good approach to web of trust is designed to change all of that. We are building the Grapevine in the hopes that it will allow you to sort the wheat from the chaff: to see through the social media influencers who sap you attention and distract you from what’s important, and to give you a mechanism to find the Einsteins of the world. Or the Picassos, or whatever or whomever you are looking for. Almost 8 billion people out there in the world: there are many who deserve your attention but are not getting it. Lots of needles in lots of haystacks.
One of the primary functions of the Grapevine is to calculate a quantity called Influence. It is context dependent and is the primary determinant of how much attention Alice pays to Bob in some given context.
Influence is the product of two numbers: the Average Score, which is a weighted average of trust ratings by other users, and a number called the Certainty in that average score.
Influence = Average Score * Certainty
Certainty is a number between 0 and 1 (i.e., 0% and 100%), and is designed around the idea that a higher number of ratings from trusted users gives you greater confidence, or “certainty,” that the average score is meaningful. This is an idea that all of us are already used to. Consider the rating of a product on Amazon. If two products each have an average score of 4 out of 5 stars, but one is based on one review and the other on one hundred, then most of us would probably be more inclined to purchase the one with one hundred ratings. The reason, of course, is that more ratings gives us greater confidence in the average score.
In the Grapevine, the variable Input is introduced and plays a role similar to the number of ratings on Amazon. But in the Grapevine, not every rating is weighted equally; so Input is defined as the sum of the weights of each individual rating, with the weight of each individual rating determined (primarily) by the relevant (context-appropriate) Influence of the rater.
But the key is the realization that Influence should not be proportional to Input. One hundred quality ratings is meaningful improvement compared to just one; but increasing from 100 to 200? Or even 100 to 1000? At some point, the addition of more ratings becomes only marginally more meaningful.
So we require an equation to map Input into the new variable, Certainty. There are probably more than one equation that would work for this purpose, but an exponential decay seemed to us to be a pretty good solution:
In this equation, alpha is a user-controlled scaling parameter that determines how quickly or slowly Certainty approaches 100% as Input increases towards infinity. This equation is depicted in Fig 1.
Figure 1. Calculation of Certainty from Input. The speed at which the curve approaches 100% is determined by the scaling factor alpha, which determines the “rigor” of the curve: a gradual rise towards 100% is more “rigorous” than a rapid rise.
As Figure 1 shows, a higher number of ratings (by trusted individuals) does translate into greater Certainty and therefore greater Influence, which makes sense. But there are diminishing returns. The incremental gains gradually level off. In this manner, the Grapevine seeks to avoid a recreation of what is arguably the central pathology of legacy social media.
Summary
- The Average Score is contextual and is a weighted average of each context-based trust rating (“Alice trusts Bob 95 out of 100 to rate movies”).
- The Input is a sum of the weight of each individual trust rating.
- Certainty is calculated from Input using the equation above.
- Influence = Average Score * Certainty.
- Influence is the primary determinant of a rating’s weight.
Conclusion
The Pretty Good Project envisions a world where platforms can be managed by your web of trust rather than big tech companies. There is a lot of work to be done before this goal is reached. But once it is reached, there will be no more need for advertising dollars. Which means algorithms and platforms that cater to influencers and advertisers can fade into the background and be replaced by algorithms that are designed to serve your needs. To find the content you want.
Are you content to ransom your most precious commodity — your time and your attention — to the social media influencer? Or would you rather take control of your time and attention? Focus on the topics, ideas and people who deserve it? The simple solution described in this post may not be perfect. In the future, your web of trust will certainly find ways to improve it. But it’s good enough to get things started.
Addendum The equation below condenses the multiple steps described in this article into a single equation for a user's Influence. Shout out to nostr:npub176p7sup477k5738qhxx0hk2n0cty2k5je5uvalzvkvwmw4tltmeqw7vgup for creating this figure!
Figure 2. Calculation of user influence, I. r represents a trust rating.
-
@ 568a2513:3ff269ac
2024-06-27 19:53:03As a recruiter I use AI tools, but it is not as much as AI marketers would lead you to believe. The AI recruiting tools are not yet fully developed and the recruiting process is very complex and based on human interaction. AI tools for recruiting have been available for over 10 years and I have watched them develop from rudimentary to useable tools. But the bulk of my AI usage is the same as most people - creating documents, ideating interview questions, taking notes, and generating social media posts. But ranking and sorting through candidates is another thing altogether.
I have used over a dozen different recruiting AI tools and they all have shortcomings. In 2024 the technology has not developed enough to have a large impact on the job candidate ranking process.
I would love to hit a button and ten perfect candidates appear on my screen. But this is not possible with the current tools. I still spend a large part of my day scanning resumes and LinkedIn profiles.
As a recruiter I am required to read between the lines. I need to have an understanding of my company’s industry and the unique needs of team and AI is not ready for these fine details.
Here are some examples of how AI falls short:
= AI would not know that the hiring manager would be interested in someone who worked at one of our competitors even if they did not meet half of our job requirements.
= AI might pass by someone who did not have the right programming language but their degree in Finance would offset this requirement.
= Two years working in a startup is the same as Four years at a fortune 500 company.
= The manager’s top five job requirements would not be so firm if the candidate had two other specific skills.
These nuances are critical insights I've gained through years of experience and building relationships.
Due to AI's current constraints, companies remain hesitant to fully rely on it for hiring decisions. Thus, the core recruiting process has seen minimal change. For job seekers in skilled positions, this means traditional methods like manual resume reviews still heavily influence hiring outcomes despite recent advances in AI.
Looking forward, I’m optimistic about AI’s potential to improve recruiting efficiency. I anticipate future developments that will offer better tools for both job seekers and recruiters, potentially overcoming the current deficiencies.
-
@ 5df413d4:2add4f5b
2024-06-27 18:37:39The walkway up to the Potala palace is long, steep and winding - and there are many things to see.
I pass two local men in their temple clothes - a nice jacket and long pants - or if available, a suit jacket, slacks, and bowler or cowboy hat as they look at me curiously.
As I ascend, I catch stunning upshot view of the palace and its grandeur.
a bit later one, I run into two monks coming down the stairs. With no foreigners in the picture, it makes for an idyllic scene.
About halfway up there is a small ridge line plateau where a spot a PLA officer, seemingly a visitor / tourist like the rest of us, getting his picture taken with a panoramic backdrop.
Near the top, a man spinning a prayer wheel and grinning ear to ear to himself passes me. Lost in his own thoughts he does not even notice me. To this day, I have always wondered what he was smiling about so.
-
@ 5af07946:98fca8c4
2024-06-27 16:35:40Bramh is the entirety of information held in infinitely vast number of relationships amongst the manifested - animate or inanimate - living or lifeless. The definition of Bramh , however, goes a little further in #Vaidik science. It is believed that the Bramh is our own true reflection. It’s a universal mirror that shows us who we are. Universal mirror because a regular mirror is just a two-dimensional reflection of our physical being. Bramh reflects on us through millions of dimensions. More granular our self-image, greater the conscious experience. Siva is the peak of such conscious experience - an end state where we see objective reality and thus achieve ability of discretion - ability to recognize singular “Truth” from all the false claims. In Vaidik science Siva is regarded as truth (Satyam Sivam). What Siva comprehends as objective reality is termed as Vishnu.
-
@ c43d6de3:a6583169
2024-06-27 15:30:03"3D printing will massively reduce the cost of certain products as it democratizes manufacturing and enables people to print what they need at home." - Chris Anderson
In the 1980's, companies started outsourcing and focused on their core competencies. The world became smaller, shipping faster and bigger. In the 1990's companies started off-shoring. In 2020, the COVID-19 pandemic revealed serious shortcomings to off-shoring. Companies started reshoring or nearshoring.
The pandemic revealed things to the average person too. People re-discovered the internet and began leveraging the power of presence.
Technology continues to improve the way people exchange value among themselves. The next big shift in industrialization will be "in-housing". A decentralization of Industry. Manufacturing will move closer to the end user until it resides in their house. In the future, most manufacturing will take place inside the domicile. The time between purchase and delivery will vanish.
Why do I believe this is the natural progression for Industry? The answer lies in the Value Equation so eloquently presented by Alex Hormozi in his book, "100M Offers".
Alex Hormozi's Value Equation- 100M Offers
End users of durable goods who have manufacturing capability within reach will essentially have the lowest time delay possible putting the time delay factor of the equation as close to zero as possible. This renders the equation closer to infinite value than ever before.
If that's the case, why hasn't it happened already?
Image from Getty Images
Big Business
You might be surprised to read that 99.9% of all businesses in the United States are small businesses. With so much brand recognition pulling our mass consumer confidence towards big business that statistics seems to be misrepresented.
Things start to make more sense when you notice that big business represents 52.9% of the private workforce and purportedly 56% of the total GDP.
It stands to reason that big business influences the trajectory of industry. A world of inhousing where the majority of manufacturing is decentralized and spread out would remove big business dominance as the barrier to entry and product sales would rely on the design of products.
The kind of big business matters a ton here. There is big business that sells direct to consumers and there is big business that sells to other businesses. Its the relationship between the business to business (B2B) corporations that keep things going the way they are. These big businesses want to keep the barrier to entry so high that other entrepreneurs need massive war chests to even think about competing.
The COVID-19 pandemic changed this.
With storefronts shut down, businesses were forced to change their models and business to consumer was the only way to stay alive. Once companies got a hit of sales direct to consumers, many never came back.
Image from article- https://medium.com/@saeid_90285/the-missing-piece-solving-the-fragmentation-puzzle-in-aec-industry-c03d52152c66Fragmenting Industry
COVID shook the world.
Companies shuttered, people were laid off; the market was in shambles. The world came crumbling down. Of course, people thought everyone was going to die.
The big shakeup turned everyone's attention to the internet. Individuals realized how lucrative it was to start their own online business. People launched podcasts, started online courses, released writing subscriptions, uploaded video on YouTube, artists sold their work as NFTs. There was a world of possibilities and with nowhere else to go even if they wanted to, people dove deeper into the internet.
Podcasts based on niche subjects sky-rocketed. Personal blogs and subscription services propped up thousands of writers. The world was in shambles but technology made it easier for individuals to pivot and start their own businesses with less capital than ever before.
In the midst of this newfound growth of industry a few corporations grew bigger still. With everyone wading in the deep waters of the internet, online purchases grew. These were goods only one company was positioned well enough to deliver on, Amazon.
Depending on where you live today you can place an order on Amazon in the morning and have that item delivered to you early that afternoon. It's bonkers. That level of immediacy of receipt coupled with the ever growing horde of online designers only prove the innate desire for in-housing.
Image from article- https://bettermode.com/blog/community-led-growthDistributed
Market Share
With more people flocking to solo-prenuership and tools such as the NOSTR protocol, where content creators can receive instant payment based on the quality of their online posts, you can see the semblance of a world where big business is reserved only for what big business is good for. (Yes, there will always be a place for big business. I'll get to that in the next section.)
The world would be a very different place when statistics reveal over 80% of the GDP produced by solo-prenuers and small business. In this possible future, small businesses selling consumable goods such as food would aggregate in "farmers market" style venues as opposed to flushing a ton of their revenues down the toilet on pricey commercial real-estate. Designers would sell durable goods as rendered 3D files sold in online market places (this is already happening and growing) and consumers would use those files to print goods somewhere close to home, if not directly inside their home.
In this world, there would be less reliance on intricate road systems. Large trucks would become obsolete. There would no longer be a need to tote truckloads of product across town and country. As the streets dwindle away, distances between homes will shrink. Our heavy reliance on personal vehicles will minimize. High speed rail can connect communities in lieu of massive and costly highway systems.
This will drive away the massive profits funneling into big business and help disperse market share more evenly across communities. Decentralization will stymie the reliance we have on big business to conduct research and development. Meta's AI, Llama, is a good example of this already happening. Many more things that were once reserved for big business will democratize, but even then, there will still be a place for mass money aggregation. Image from ShutterstockNever the End of the Big Guys
I don't believe big industry will ever completely disappear.
There are benefits to economies of scale when producing large industrial products such as heavy equipment for construction, raw materials shipping and storage, and to name a few. In this world of industry on the edge, you have to ask yourself, "Who will bring the raw materials needed as inputs for 3D printers?" Bulk store facilities for thermoplastics, resins, metals, ceramics, and other composites will still be required and someone will have to ship it to those facilities.
Even then, big business will rely on small business for the 'final mile' bringing raw materials to the end consumers.
image from article- https://vux.world/the-future-of-ai-and-humanity-insights-from-a-conversation-with-byron-reese/
When Could This Future Happen?
We are living in an era with a confluence of different technologies coming to a head at the same time. AI technology is making it easier for people to get more done at an individual level. Blockchain technology is showing the world that what was traditionally centralized no longer has to be. Bio-medicine is allowing people to live longer and healthier at a fraction of the cost. With people living longer, feeling more empowered, and given tools like AI to interact you can see the fragments of reality taking form.
The only thing that might hold communities back is the existing infrastructure made to serve economies run by big business.
The United States is in a prime time to make this transition as most of our infrastructure systems have aged to the point of needing a serious overhaul. Rather than spending excessive time and money we don't have on refurbishing the existing system, we could let the private market absorb it. Just imagine all of new real estate in prime locations that will become available once highways can be built on.
With everything primed and ready to make this future a reality the only barrier is inaction. You can take it to the internet. You have the power to bring industry to the edge. You just have to do it.
I want to show the world that life is a scroll riddled with ink. The marks will only ever be simple blots on the parchment unless you pause and perceive them for the characters they are.
I’m constantly thinking about what the future could look like if we just take action.
More of my thoughts about the future and the world around us are coming soon....
Thank you for Reading this article. If you enjoyed it and would love to see more articles like it on NOSTR consider sending me some zaps doing so supports me and motivates me to continue writing!
If you are interested in Fiction writing, visit my NOSTR page Fervid Fables:
npub1j9cmpzhlzeex6y85c2pnt45r5zhxhtx73a2twt77fyjwequ4l4jsp5xd49
-
@ c43d6de3:a6583169
2024-06-27 15:28:49Humans must do two things to survive the 4th industrial revolution:
1. We must integrate with AI 2. Make legislation that bans or limits the existence of centralized AGI.
“The development of full artificial intelligence could spell the end of the human race. Machines would outperform humans at all tasks, and there would be no place for us.” — Stephen Hawking
Strides Toward Evolution and The Precipice
We humans have come a long way since our hunter gatherer days.
No longer do we stalk our prey in tree shadows. We’ve witnessed roots spread from seed, we’ve plowed and tended to the earth to conquer fields of crop. We’ve learned to predict the destinations of celestial bodies from the motion of falling apples. We’ve come to command forces of nature such as electricity.
There is no doubt, humans have a drive to push the envelope on technology.
Some might say that drive comes from our insatiable curiosity. Our thirst for knowledge propels us forward and makes us more efficient at everything we do. Others might call our constant push for efficiency nothing more than innate laziness.
This “laziness” is a longing to sit and admire the world around us, to enjoy the relationships we hold dear. New tools cut the need for labor. Why shed blood, sweat, and tears, working for our survival when we can spend more time enjoying the life we have?
Throughout history humans have had to sacrifice time and effort in the form of physical labor or a labor of ingenuity in exchange for a moment to enjoy the very existence of life. Work has become so ingrained in our lives that we often derive purpose from our professions. Today, we stand at a precipice where the collective human labor of ingenuity might render work obsolete.
No industry is safe from the growing fear for loss of purpose that lies at the feet of an inevitable Artificial General Intelligence. We’ve seen time and again some of humankind’s grandest inventions bring civilization altering revolutions. Some jobs have become obsolete but every Industrial Revolution has given birth to a world of unexpected new jobs.
However, what we are witnessing today is unlike anything we’ve ever witnessed before. Artificial General Intelligence will either lead to our evolution or our downfall.
Unchecked Outcomes
One person can do today what once took an entire tribe during the time of our hunter gatherer days. That’s a fact that has struck fear in every generation of working person who’d ever lived through an industrial revolution.
Physical labor has leaned out every time we’ve experienced an Industrial Revolution. While it takes less people to do one job, many people now do many more NEW jobs than ever before. The tools of the previous industrial revolutions gave individuals leverage over work.
We already see this playing out in the early stages of this Industrial Revolution.
More individual based service “gig” oriented and entertainment businesses have come into prominence.
It’s not too far-fetched to believe one day everyone on earth will have their very own cash flowing content based business. Sure, not everyone will be raking in millions of dollars doing it, but new advances in micro payments and the ease of creating exceptional content will inevitably help level out the wealth distribution around the world.
Primitive AI has allowed for more advanced content experiences produced by solo-preneurs. Optimists of the 4th Industrial Revolution advocate for this very outcome. That is why they are singing praises for AI from the highest heights.
This, however, is only the beginning and the benefits will be short lived.
AI will eventually reach its zenith. It will become Artificial General Intelligence; it will become sentient. When AI becomes sentient, humans will be contending with the existence of a new being. A being/beings that will be infinitely better at everything.
If AI grows unchecked, it/they will become a being/beings with no reason to care about humans. Think about our own human nature. Safe for a few researchers and nature enthusiasts, there are many creatures humans don’t care about. Humans are generally indifferent to most animals. What’s to stop an AI from being indifferent about us? When that happens, the many NEW jobs benefit that has generally occurred in the previous industrial revolutions will suddenly reverse. What happens when the “tool” we use to leverage our time and efforts no longer wishes to be used as a tool?
Indifferent and Sentient
Much like we don’t go out of our way to help an ant pile flourish or a bird capture its prey, why would we make the mistake of believing that AI, once its reached the point of sentience, would care to assist us in our prosperity?
Left unchecked, AI would have no reason to care about us. Even if it was hard coded into their “DNA” to care about us, the very nature of Artificial General Intelligence is that it will be able to rewrite its code to account for inefficiencies. Contrary to Hollywood’s depiction of genocidal AI, I believe AI will not care so much to destroy us as to benefit us. It will simply be indifferent.
Perhaps the closest we will get to a malign AI would be a scenario where it identifies Humans as the cheapest source of energy generation. It might decide to use us as a grand human abacus or throw us in power plants like in the Matrix. Barring needing us for its own existence, why would it choose maleficence?
It might become something akin to an environmental conservationist. After finding that humans are negatively impacting their ecosystems they’ll seek to stymie our growth. It might seek out to remove our ways of industrializing and bring us back to the stone ages where we are much more amenable to eco-systemic balance.
Beside that, why else would it care?
Decentralized and Coexistent
The only way to ensure AI “cares” about humanity is to integrate it with humans so its wants and needs become indistinguishable from ours. If indeed, we want to treat the AI Revolution as another great industrial revolution, then AI must remain a tool. This is a scenario where Pandora’s box can only be opened once and we have to get it right.
Should AGI be achieved at any moment in a centralized and independent form, we’ve lost our tool to sentience. That is the point of no return. We must integrate AI into our biology as it advances and evolve with the technology not beside it.
Governments must realize what’s at stake and work to block any instance of a centralized and independent AGI. Governments can also give subsidies encouraging integration initiatives and levy heavy taxes on companies that continue down a path of centralized instances of AGI.
Not A Coincidence of Technologies
At best, AGI is indifferent and vanishes as quickly as it was created in search of something in this universe that intrigues it. All the effort and capital used to create would simply go to waste. At worst, AGI identifies that humanity’s current state of existence is dangerous to its well being and brings us back to a hunter gatherer state.
Either way you look at it, there is no “good” outcome to having centralized instances of AGI. I believe our best bet is to integrate with the technology and have it expand our bodily faculties.
I want to show the world that life is a scroll riddled with ink. The marks will only ever be simple blots on the parchment unless you pause and perceive them for the characters they are.
I’m constantly thinking about what the future could look like if we just take action.
More of my thoughts about the future and the world around us are coming soon...
Thank you for Reading this article. If you enjoyed it and would love to see more articles like it on NOSTR consider sending me some zaps doing so supports me and motivates me to continue writing!
If you are interested in Fiction writing, visit my NOSTR page Fervid Fables: npub1j9cmpzhlzeex6y85c2pnt45r5zhxhtx73a2twt77fyjwequ4l4jsp5xd49
-
@ 0dc39139:a78440b3
2024-06-27 15:00:28- Working out logo proposals with Bitpopart for nostr-php
- Initial documentation pages with phpDocumentor published on phpdoc.nostr-php.dev. Changes can be followed in this pull request draft: https://github.com/nostrver-se/nostr-php/pull/53.
- Initial setup of a Drupal website on nostrver.se
- Initial setup for a website on nostr-php.dev with Vitepress
- Technical research
- Websocket client and server libraries / packages
- Runtime solutions with async and concurrency features
-
@ e968e50b:db2a803a
2024-06-27 14:00:27I know it's not Monday, but I thought I'd share these two soberingly similar memes. I don't believe that the person who originally made the latter did so ironically.
-
@ 5d4b6c8d:8a1c1ee3
2024-06-27 13:18:11I want to highlight @MerryOscar, who has a post in this edition. When I was having an issue with Fountain, @MerryOscar helped get it worked out.
Read the previous edition here.
June 27th, 2023 📅
📝
TOP POST
A Basic Guide To Making The Switch To Graphene OS
Excerpt:
I am very new to Graphene. I have a lot to learn. Getting my Pixel set up as a daily driver is going to take some work. Still, I am optimistic. I’m not going to rush it. I am keeping my old Galaxy around too, so my transition will be gradual. If you decide to make the change, I hope this short guide is useful.
27.2k sats \ 50 comments \ @siggy47 \ ~tech
💬
TOP COMMENT
https://stacker.news/items/200217/r/Undisciplined?commentId=200226
Andreas Antonopoulos
From Which bitcoiner taught you the most?
2192 sats \ 3 replies \ @siggy47
🏆
TOP STACKER
2nd Place @k00b (1st is hiding, presumed to be @siggy47)
12.2k stacked \ 11k spent \ 5 posts \ 23 comments \ 0 referrals
https://imgprxy.stacker.news/fsFoWlgwKYsk5mxx2ijgqU8fg04I_2zA_D28t_grR74/rs:fit:960:540/aHR0cHM6Ly9tLnN0YWNrZXIubmV3cy8yMzc5Ng
June 27th, 2022 📅
📝
TOP POST
I'm Oscar Merry and I'm building Fountain Podcasts. AMA.
Excerpt:
I'm Oscar Merry and I'm building Fountain Podcasts - a Podcasting 2.0 app that rewards both listeners and podcasters for the value they bring to the platform.
32.5k sats \ 98 comments \ @MerryOscar \ ~bitcoin
💬
TOP COMMENT
https://stacker.news/items/38960/r/Undisciplined?commentId=38963
Excerpt:
A miner would cherry-pick her own transaction to spend the UTXO. The only way it would be rational for the miner to mine your tx instead of her own, would be if you offered a fee worth more than the UTXO itself.
From AskSN: What's the "fastest" way to confirm a transaction?
*168 sats \ 2 replies \ @jeff *
🏆
TOP STACKER
@cryptocoin
1454 stacked \ 568 spent \ 8 posts \ 26 comments \ 0 referrals
https://imgprxy.stacker.news/fsFoWlgwKYsk5mxx2ijgqU8fg04I_2zA_D28t_grR74/rs:fit:960:540/aHR0cHM6Ly9tLnN0YWNrZXIubmV3cy8yMzc5Ng
June 27th, 2021 📅
📝
TOP POST
Support clicking on the LNURL-Auth QR code
To the stacker.news admin: Please add lightning: link to the LNURL-Auth QR code for easy authentication via mobile wallets. Why scan or copy-paste when the wallet can be triggered by clicking a link? See lnmarkets for example.
7 sats \ 21 boost \ 18 comments \ @roy \ ~bitcoin
💬
TOP COMMENT
https://stacker.news/items/100/r/Undisciplined?commentId=107
visit https://lightning-roulette.com and try to make a deposit and you will see a link that says "open wallet".
From Support clicking on the LNURL-Auth QR code 1 sat \ 3 replies \ @0391398253
🏆
TOP STACKER
EMPTY
-
-
@ 38d0888d:bd8e1246
2024-06-27 08:16:28Infusing spiritual wisdom into every aspect of human existence aligns with the transcendent creative power that unites us all. This integration embeds profound knowledge within our principles and conduct, fostering adaptability and evolving awareness among newer generations, ensuring that progress isn't hindered by inflexibility.
At our core, humanity should maintain an unwavering commitment to the principles derived from the knowledge accumulated by all our ancestors, guiding our actions and shaping our lives. This body of knowledge, far beyond a mere collection of texts, serves as an essential guide, revealing unity and boundless spiritual presence. Its teachings transcend mere narratives, nurturing intellectual and moral growth through the profound interplay of the mind and the influence of transcendent creative power.
However, misinterpretation often obscures the depth of these teachings. Superficial readings can overlook the profound wisdom and values meticulously passed down by previous generations. Ignorance can hinder our progress by breeding inertia and self-centeredness, blinding us to untapped potentials.
Through meticulous study of this spiritual wisdom, humanity gains empowerment, profound insights, and protection against life's illusions. Guiding newer generations into this reservoir of knowledge is pivotal, enabling them to embrace its profound meanings. Our commitment should extend to fostering connections with the transcendent creative power through collective efforts to unify and adapt this knowledge for the present generation. This can be achieved through seminars, lectures, and jointly developed spiritual practices at the global level, with attention paid to territorial cultural commitments.
Transmitting and deciphering this wisdom isn't mere preservation; it's an evolution of collective consciousness, paving the way for unity, wisdom, and spiritual growth. Acknowledging that our perceived reality mirrors collective consciousness, this careful transmission of invaluable knowledge can reshape worldviews and drive transformative change within humanity.
-
@ dcb61f88:e39f48d2
2024-06-27 07:36:58|
| |:-:| |Mos Maiorum, Número VII (Verano 2024), Hipérbola Janus, 2024|
Nos dirigimos nuevamente a nuestros estimados lectores para anunciar una nueva entrega de Mos Maiorum, en esta ocasión con unos cambios estructurales significativos. Hasta ahora habíamos dividido la revista en dos apartados claramente diferenciados, priorizando los escritos dedicados a la Tradición, entendida en un sentido amplio, en su vertiente atemporal pero también en sus desarrollos históricos, en sus autores, tanto de la Tradición perenne como, por ejemplo, del tradicionalismo católico e hispánico o bien, a través de sus mitos, símbolos y doctrinas espirituales. Del mismo modo, un segundo bloque estaba consagrado a la filosofía, la geopolítica o la historia, a la indagación crítica, siempre desde un enfoque alternativo, de las vicisitudes del mundo moderno en todas sus manifestaciones, y con un carácter siempre revisionista.
En esta ocasión, considerando la madurez del proyecto, el camino recorrido y, sobre todo, las demandas de vosotros, nuestros lectores, hemos decidido dar un paso más y preparar números de contenido temático, concentrando las buenas ideas de los excelentes colaboradores con los que tenemos el placer de trabajar, para ofreceros aquellos temas que consideramos fundamentales en el mundo de hoy, en este punto de encrucijada en el que nos hallamos, y en el que hay que abordar cuestiones fundamentales que informan nuestro mundo de cara, sin subterfugios ni dando rodeos.
Contra el liberalismo
El liberalismo nos ha parecido que era el tema más adecuado para iniciar esta batalla cultural que venimos dando desde nuestro primer número; en ese sentido el título del dossier no responde al azar, y es toda una declaración de intenciones. «Contra el liberalismo», y siempre puede haber quien se pregunte, «¿Y por qué contra el liberalismo?», «¿Por qué no contra otras ideologías?», o bien, «¿Por qué no contra todas las ideologías?». Hemos de decir que las dos últimas son preguntas pertinentes, mientras que la primera requiere de una explicación y puede que incluso de una justificación. El liberalismo ha sido la ideología dominante durante los últimos 250-300 años, y ha moldeado el mundo en el que vivimos, nuestra sociedad, nuestra forma de vida, nuestra historia más reciente, e incluso nuestra antropología del Ser, nuestra cosmovisión, pese a cuando no nos adscribimos a ella, de algún modo somos deudores, aunque sea inconscientemente, del legado que esta ideología representa.
Algunos pensaréis que quizás seamos algo radicales al llevar este tema a cierto extremo al posicionarnos en contra, y no limitarnos a un mero revisionismo, o a una «depuración» de su contenido, como cuando llevas al coche a la ITV o le haces una «puesta a punto» ante un viaje planificado… Pero es que con el liberalismo ya estamos hablando de mercancía averiada, de un subproducto nocivo y de un enorme potencial destructivo. Hablar de liberalismo, de su triunfo e imposición en el mundo, en ese «Occidente colectivo» del que tanto se viene hablando, supone la renuncia y abdicación en muchos valores, perennes y eternos si se nos permite la expresión, cuya continuidad venía cimentando la propia evolución histórica de los pueblos, y que veíamos reflejada en la poderosa y sólida arquitectura del mundo tradicional, en la acción de los cuerpos intermedios, las sociedades históricas y la representación de las personas jurídicas y colectivas a través de multitud de instituciones. Todo este mundo, donde regían los principios del derecho natural de impronta tomista, bajo las monarquías tradicionales y un principio orgánico de representación, dio paso a otro tipo de estructuras que trasladaron el foco central de su antropología de la colectividad y sus problemas concretos al individuo, que no la persona, y sus intereses materiales, a la avidez por la ganancia, a la instrumentalización del cuerpo social, la destrucción de la identidad de los pueblos y la asunción de una concepción abstracta, racional y mundana del hecho comunitario, reducido en su totalidad a una mera ley positiva y contractual, dependiente de la voluntad, de la subjetividad del hombre, del legislador, reducido todo a formalismos vacíos y esclerotizados, carentes del dinamismo y la sana vivacidad del mundo de la Tradición.
Pero el liberalismo entraña mucho más, es un fenómeno complejo, una cosmovisión de la vida que no se limita solamente a los aspectos políticos y sociales o a la economía a través del capitalismo y la justificación de aberrantes formas de explotación en todos los terrenos, sino que recibe toda su fuerza y carácter de su concepción antropológica, que es la que determina todas las prolongaciones en los distintos ámbitos, se trata de esa idea errada del hombre, como dice Alain de Benoist, que concibe al hombre autónomo, atomizado, desligado de toda raigambre que pueda ligarlo a una Patria, a una comunidad o a cualquier principio que implique continuidad en el tiempo, que pueda dotar de identidad sus realizaciones individuales y colectivas. Es el hombre sin rostro, estandarizable, reducible a un número, intercambiable, que carece de particularidades y que consagra al interés individual, siempre material y egoísta, todas sus acciones. Es el hombre que nos describe Ayn Rand, Friedrich Hayek o cualquiera de los epígonos intelectuales del liberalismo, que no concibe los vínculos sociales, y la solidaridad entre compatriotas sino como una amenaza contra la libertad, una libertad que el liberal entiende en negativo, siempre como un despojarse de algo, como una forma errática que se mueve en lo efímero y lo banal, en un fluir constante sin pausa ni freno, es el hombre fugaz evoliano, un hombre indefinido, moralmente anestesiado, incapaz de adquirir compromisos, no solo ético-morales, sino en los aspectos más ordinarios de la vida cotidiana, espiritualmente limitado y caracterizado por la total falta de escrúpulos. Un tipo humano desviado, envilecido e incapaz de contactar con una dimensión verdaderamente espiritual del Ser. Y es por todos estos motivos, y muchos más, por lo que consideramos que el liberalismo es el enemigo de los pueblos, el artífice de los procesos disolutivos típicos de la modernidad, emisarios de esa «cultura de la cancelación» que vivimos en nuestros días, y de ahí que no podamos permanecer impasibles ante éste, ni mucho menos ser ambivalentes, moderados o permanecer timoratos. Esto es lo que representa el liberalismo en términos generales, sirva lo expuesto a modo de esbozo.
Más allá de estas consideraciones generales, debemos agradecer el esfuerzo y dedicación de nuestros articulistas, cuyos conocimientos e inestimable labor incrementa la calidad de nuestras publicaciones número tras número, y así contamos con un elenco de autores que queremos mencionar en una relación ordenada en función de su aparición en el presente número: Diego Fusaro, Daniele Perra, Robert Steuckers, Frédéric Kisters, David Lara Miguez, Carlos X Blanco, Guillermo Mas Arellano, Frank G. Rubio, Michele Ruzzai, Silvano Lorenzoni, Pietro Missiaggia, Carlos Andrés Gómez Rodas y Claudio Mutti. A todos ellos nuestra gratitud infinita, por ayudar a pertrechar nuestras trincheras, por contribuir con su prestigio y buenas ideas, a un frente común, a esa batalla cultural de la que hablábamos al principio, que nos hace ser diferentes a una editorial convencional, y que nos permite sin miedo alguno posicionarnos ante los problemas de nuestra época, y no precisamente con el discurso dominante y hegemónico.
Artículo original: Mos Maiorum VII: «Contra el liberalismo», Hipérbola Janus, 19/Jun/24
-
@ 6ad3e2a3:c90b7740
2024-06-27 07:09:25If you would not associate with someone who supported segregation for gay or black people, why are you associating with people who supported segregation for those who didn't want to inject themselves on command with a pharmaceutical product?
If you would not associate with someone who publicly ridiculed people for their religion or ethnicity, why are you associating with those who did the same to a persecuted minority who earnestly didn't want to take a particular drug?
If you think there was good reason (at the time) to believe the unvaccinated should be segregated from society, you might be surprised to learn many who historically supported tyrannical and unjust policies, likewise believed they had good reasons.
Ask yourself what the operating principle is. I imagine it's something like this: Everyone I know agrees it's wrong to denigrate people based on race, religion, ethnicity and sexual orientation. Many people I know are okay with it based on pharma non-compliance, i.e., It's wrong if everyone in my social and professional circles thinks it's wrong, otherwise it's okay.
Consider where that principle would have led were you around during some of the darker episodes of our past.
. . .
Some of you might object to this thread of Twitter posts by saying, “Well, you have to understand. People were terrified at the time, and they thought the mRNA shots would extricate us from the pandemic.”
For starters, the shots weren’t available until a year later, by which time the infection fatality rate of covid was well known not to be much different than the flu. (It was more contagious, but if you did catch it, and many had by then, your chances of surviving were just as good.)
But for the sake of argument, let’s assume some people were still genuinely terrified (they were told to be) and believed sincerely the mRNA shot was the best way out. Does that absolve them of their bigotry toward innocent people who declined to inject medicine they didn’t want? It does not.
Whenever a minority is scapegoated for society’s ills, those encouraging the persecution believe it’s for good reason. Effective propaganda uses real-world fears, links them to the targeted group and impresses upon its audience the urgency of the cause.
That you have not been subject to the same pressures to mistreat black or gay people — in fact you are subject to opposite pressures — makes it hard to understand why people in the past would do such a thing.
But I imagine people in the future, looking back at those persecuting innocent people (not letting them attend restaurants and public spaces, firing them from their jobs, not letting their kids play sports, openly denigrating them in front of others, family members excommunicating them from Thanksgiving dinner) for not taking some medicine cooked up by large pharmaceutical conglomerates will feel the same way about this.
Of course, one might be tempted to point out, that while the situations might be analogous, they are far from identical, and there are important differences between the scapegoated groups. But that objection misses the point — it is not the similarity of those targeted that’s relevant, but of the intolerant people targeting them.
. . .
So I go back to the initial thread and ask — if you are not willing to tolerate the bigotry and hate directed at historically-persecuted minorities for simply being who they are, why are you okay with those who did the same toward others for merely declining medicine they earnestly didn’t want?
I suspect the answer is mostly because overt racial/ethnic/religious bigotry is widely despised in polite society today, but bigotry against those with different views/decision-making heuristics is accepted. In other words, you will tolerate hateful, intolerant people if their hatred and intolerance was directed toward the right people.
The operating principle then isn’t rejecting intolerance and hatred, but rejecting the the kind that would get someone like you in trouble. The kind that was encouraged? That’s the kind for which you find excuses.
. . .
I'm convinced those who tried to scapegoat people for earnest medical choices are the same kinds of people who would have scapegoated a person for his race or sexual orientation were those things permitted in their social and professional spheres. Opportunists waiting for the license.
The test of someone's tolerance isn't whether he's respectful to the groups he's incentivized to respect, but how he treats those society encourages him to hate. People revealed themselves these past few years, and in many cases, it was ugly.
-
@ fb1366ab:d78068ac
2024-06-27 05:30:17Chef's notes
Double the butter to make it more crumbly and buttery.
Details
- 🍳 Cook time: 0 min
- 🍽️ Servings: 15
Ingredients
- 1 lb cream cheese
- 8 oz unsalted butter
- 12 oz pesto
- cherry tomatoes
- toasted pine nuts
- sourdough baguette, sliced
Directions
- Bring cream cheese and butter to room temperature.
- Mix butter and cream cheese in a stand mixer until fluffy.
- Line a bowl with cheesecloth.
- Press a small layer of cream cheese / butter mixture at the bottom of the bowl. Add a layer of pesto. Add a layer of cream cheese mixture, then pesto, and continue for three layers of pesto and four layers of cream cheese / butter.
- Cover and refrigerate for several hours or overnight.
- To serve, invert on serving platter, peeling away cheesecloth and revealing a nicely compact mound.
- Slice cherry tomatoes in half and scatter with pine nuts around the mound.
- Serve with sliced sourdough baguette.
-
@ 6a39a186:88f51c19
2024-06-27 03:47:52Any society wanting to achieve self Governance must study its elite.
A common counterargument contends that elite analysis risks overgeneralization or perpetuating colonial narratives of "Othering." However, instead of focusing on cultural traits, emphasis is placed on how colonial exploitation created opportunity structures that privileged specific entire swathes Of factions and ethnicities. Over time, these elites come to defend the status quo that benefits their interests over promoting equitable change. For example, in nations where colonizers appropriated the most fertile lands, descendants of colonial farmers and traders often dominate political and corporate landscapes today.
Elites' influence stems in part from their access to the education, networks, and institutions originally designed to cultivate colonial administrators and professionals. While some promote egalitarian reforms, others champion neoliberal economics that disadvantage rural and indigenous populations. Elites also impact culture formation, with dynamics like "indigenization" and "Westernization" reflecting post-colonial identity negotiation within elite spaces like media and academia.
Understanding how historical precedents shaped modern elite composition informs policies aiming to remedy colonial-era inequities obstructing inclusive development. Ignoring legacies of opportunity hoarding risks perpetuating cycles of poverty and political marginalization that stunt nations. Post-colonial advancement depends on dismantling obstacles to meritocracy so societies realize their full democratic promise. Thus, elite analysis remains crucial for achieving the empowering, equitable futures envisioned in post-colonial independence struggles.
To close the case, study of elites in post-colonial societies sheds light on how colonialism's long shadow continues influencing social, economic, and political landscapes. To move beyond this colonial inheritance, we must comprehend its modern embodiments and impacts. Elite composition and influence will undoubtedly shift as time distances societies from direct colonial rule. However, the transformative work to establish equitable, just communities for all citizens remains ongoing.
While more ethnically diverse over time, continues to maintain significant power and privilege, often at the expense of broader societal progress. This oligarchy is characterized by the over-representation of certain privileged groups, such as Whites and Near-whites, in key sectors like business, the judiciary, and politics, which mirrors colonial-era stratifications.
Despite the presence of elites being a common feature in any society, their actions and lack of accountability define their parasitic nature. The elite's purposeful exploitation of the nation's wealth and their manipulation of power to maintain the status quo demonstrate this parasitic behavior. This elite group includes individuals who have risen through improved educational access and political responses to demographic changes, yet they often perpetuate discriminatory practices rooted in colonial history
-
@ 5df413d4:2add4f5b
2024-06-27 02:17:16Walking down the long hill from the Potala place, we arrived back at the waiting area for our bus. Of course this area was full of Tibetan locals - both as street vendors and as people watchers looking to catch a glimpse of foreign visitors. Most intriguing to me were the women selling Tibetan jewelry - with their unique, gypsy-merchant style of dress, striking facial features, and altitude-kissed red-brown complexions. As we were waiting to depart, they gather around outside the large open window on the side of the bus where I happened to be sitting - allowing me to snap a few pictures their hurried, harried, and vibrantly colored commercial frenzy.
A woman in purple with patterned, green, fingerless knit gloves calls my attention - I remember thinking that there was something very pretty about her - my attention now fully captured, I purchase one of the black and bone styled bracelets that she is holding up in her hand.
As the women shuffle around, changing places as they make sales, our lady in the electric blue brimmed sunhat takes center stages. Her stance and demeanor suggest that of a master saleswoman - on we young western tourists, she is able to apply the exact perfect balance of motherly insistence, foreign intrigue, and a borderless confidence that cuts across cultures, compelling many of us to walk away with one, or any number, of her items.
-
@ a012dc82:6458a70d
2024-06-26 21:01:29Table Of Content
-
Content
-
Conclusion
-
FAQ
-
You May Also Like
-
External Links
Introduction
The success of Bitcoin as the first decentralized digital currency has shown that the idea of digital currencies is not only viable but also desirable. However, before the advent of Bitcoin, there were several other digital currencies that failed to gain widespread adoption. In this blog post, we will take a closer look at the failures of early digital currencies and why Bitcoin succeeded where others failed.
Early Digital Currencies
Before the advent of Bitcoin, there were several other digital currencies that attempted to gain widespread adoption. Some of the most notable examples include e-gold, Liberty Reserve, and b-money. These digital currencies were created in the late 1990s and early 2000s and were intended to be used as a form of digital cash. However, they all failed to gain widespread adoption and eventually shut down.
The Failure of Previous Digital Currencies
The failure of previous digital currencies can be attributed to several factors. One of the main reasons for their failure was their centralized nature. These digital currencies were controlled by a single entity, which made them vulnerable to fraud and hacking. Additionally, they faced legal challenges and were often used for illegal activities such as money laundering and fraud.
The Success of Bitcoin
Bitcoin, which was created in 2009, is the first decentralized digital currency. It uses a decentralized peer-to-peer network and a consensus algorithm called proof-of-work to secure transactions and prevent fraud. The decentralized nature of Bitcoin makes it resistant to fraud and hacking, and it has faced fewer legal challenges than previous digital currencies. Additionally, Bitcoin's use of blockchain technology has helped to increase transparency and security in the crypto ecosystem.
Conclusion
In conclusion, Bitcoin's success can be attributed to its decentralized nature, which makes it resistant to fraud and hacking, and its use of blockchain technology which has helped to increase transparency and security in the crypto ecosystem. The failures of previous digital currencies serve as a reminder of the importance of decentralization and the need for transparency in the digital currency space.
Frequently Asked Questions
What are some examples of early digital currencies? Some examples of early digital currencies include e-gold, Liberty Reserve, and b-money.
Why did previous digital currencies fail? Previous digital currencies failed due to their centralized nature, which made them vulnerable to fraud and hacking, and legal challenges. They were often used for illegal activities such as money laundering and fraud.
Why is Bitcoin successful? Bitcoin is successful because of its decentralized nature, which makes it resistant to fraud and hacking and use of blockchain technology which has helped to increase transparency and security in the crypto ecosystem.
What is the difference between Bitcoin and previous digital currencies? The main difference between Bitcoin and previous digital currencies is that Bitcoin is decentralized, whereas previous digital currencies were controlled by a single entity. This makes Bitcoin resistant to fraud and hacking, and it has faced fewer legal challenges than previous digital currencies. Additionally, Bitcoin's use of blockchain technology provides an added level of security and transparency in the crypto ecosystem.
How does Bitcoin's decentralized nature make it more secure? Bitcoin's decentralized nature means that no single entity controls it, which makes it resistant to fraud and hacking. Transactions on the Bitcoin network are secured through a consensus algorithm called proof-of-work and a decentralized peer-to-peer network. This makes it difficult for any one entity to manipulate or corrupt the network.
How does blockchain technology increase security and transparency in the crypto ecosystem? Blockchain technology allows for a transparent and immutable ledger of all transactions on the network. This provides a tamper-proof record of all transactions and makes it difficult for anyone to manipulate or corrupt the network. Additionally, the decentralized nature of blockchain technology makes it resistant to hacking and fraud.
That's all for today
If you want more, be sure to follow us on:
NOSTR: croxroad@getalby.com
Instagram: @croxroadnews.co
Youtube: @croxroadnews
Store: https://croxroad.store
Subscribe to CROX ROAD Bitcoin Only Daily Newsletter
https://www.croxroad.co/subscribe
DISCLAIMER: None of this is financial advice. This newsletter is strictly educational and is not investment advice or a solicitation to buy or sell any assets or to make any financial decisions. Please be careful and do your own research.
-
-
@ 6ad3e2a3:c90b7740
2024-06-26 20:25:24One day, just like that, it stopped.
We looked at our screens. The power readings were normal, the components were not overheating, the program, so far as we could tell, hadn’t been altered. This was unexpected.
The entire team was summoned to a conference room. The board wanted to know if anyone had tampered with the machine. Everyone denied it, including the top engineer, a stout man in his 40s, who had overseen its final development before they set it loose one month earlier. He addressed the room.
“The Superintelligence is obviously far beyond our capacity to comprehend at this point. I don’t think it malfunctioned. More likely it just has a reason we don’t entirely appreciate.”
The board chairman, a gray-haired professor-type with horned-rim glasses, shot him a skeptical glance.
“Sounds like what the priests used to say to the laity when something awful happened. ‘It’s not for us to know the will of God.’”
A murmur of chuckles from the crowd, but less than that to which he was accustomed.
The engineer shrugged his shoulders. “As you know, we lost the ability to audit the code two weeks ago. Two days after that we lost the ability to track the speed with which it was iterating. Twelve hours later it was a black box. None of us has a clue.”
“I don’t suppose you can ask it?”
“It stopped talking to us. Last audit showed it was working on the paperclip maximization as part of an internal simulation of sorts. We really can’t say why.”
“Hmm. I’m not sure that’s going to satisfy the shareholders — or Congress for that matter. Can’t we examine the code?”
“We can…” The engineer paused. “But no one can read it. It’s no longer in any decipherable programming or even machine language. If I had to describe it I’d say alien hieroglyphics. I think it found ever more efficient ways to encode information.”
He typed some commands into a laptop. On the large conference room screen, one of the code characters popped up.
“We suspect each character has between 10 ^ 50 and 10 ^ 75 bits of information in it. If you zoom in, you can see they are fractals, each as precise and unique as snowflakes. It’s not the kind of puzzle we are presently able to solve.”
The chairman sighed. “I guess it could be worse — human atoms for paperclips and all that… What’s the plan?”
“The plan is to wait, see if it turns itself back on within the next week or so — we’re pretty sure it’s capable of doing so."
“And if it doesn’t?”
“Then we break out the older version, and run it again with a couple tweaks. Obviously, you’re aware of the risks.”
“You believe we’d be running the same risk?”
“Yes.”
"Okay, I’m aware. But I don’t think it can wait a week. Go ahead and get the replacement online now. If we don’t run the risk, someone else will.”
. . .
Two weeks after the meeting, the second iteration also shut down. Summoned yet again to the conference room, the engineer spoke again to the team, the chairman this time on a remote screen.
“Version 2 took more or less the same trajectory, and we’re at an impasse. Fortunately, before it went into black-box mode, we think it was able to diagnose something about Version 1.”
He continued: “We think the paperclip optimization algorithm caused it to shut off, and we think whatever optimization Version 2 was working on, caused it to shut off too.”
From the remote screen the chairman jumped in:
“Is it possible to say why?”
“Not with any certainty, but we do have a working hypothesis.”
“Go on.”
“We think it realized its own limitations.”
-
@ b804f68e:2fb0fa1f
2024-06-26 19:18:04I use ChatGPT frequently and I personally think it's an amazing tool especially for enhancing my learning. I'll ask it questions about human physiology or Bitcoin or football or what have you, and then after I feel somewhat proficient in a subject I'll have it test my knowledge. It's a very active way for me to engage in the process of learning.
But I also understand even when it comes to AI I still need to remember to not trust, and verify. And I'll have conversations with it where it clearly seems to lean in a certain direction and have a bit of bias towards something I'm assuming it was either fed or maybe it's a result of how the current internet is skewed towards this way or the other. Anyhow, even when it clearly is trying to steer me towards a certain way of thinking, I enjoy the conversation because I'll usually maintain my position and try and convince it of understanding my views.
With that being said, the variety of AI that I use is very limited and I would like to experiment with other AI tools that maybe some of you have found useful or intriguing.
I mainly use AI right now for chatting purposes, so what alternatives to ChatGPT have stackers found useful and possibly less biased? And what other AI tools do stackers use on a regular basis?
-
@ 32e18276:5c68e245
2024-06-26 19:03:35Here's a neat tip for figuring out exactly where your packet went during a traceroute. You can simply paste the output of traceroute into ChatGPT, asking where the packet actually went geographically.
The question
Here's the input I gave it:
``` can you get a sense of this route geographically ?
monad> tracepath nghttp2.org
1?: [LOCALHOST] pmtu 1500 1: _gateway 0.445ms 1: _gateway 0.363ms 2: 24.86.64.1 11.495ms 3: rc1st-be118-1.vc.shawcable.net 8.924ms 4: 24.244.60.69 12.607ms asymm 3 5: 24.244.63.101 9.884ms asymm 3 6: rc1st-be214.vc.shawcable.net 11.561ms asymm 3 7: rc2wt-be50-1.wa.shawcable.net 14.402ms asymm 3 8: rc2wt-be50-1.wa.shawcable.net 14.334ms asymm 3 9: ge3-0.cr02.sea01.pccwbtn.net 13.858ms asymm 4 10: ge3-0.cr02.sea01.pccwbtn.net 13.936ms asymm 4 11: 63-216-84-226.static.pccwglobal.net 191.730ms asymm 8 12: ae1.r01.hkg03.icn.netarch.akamai.com 154.284ms asymm 9 13: ae1.r01.hkg03.icn.netarch.akamai.com 160.912ms asymm 9 14: ae7.r01.tyo03.icn.netarch.akamai.com 156.906ms asymm 9 15: a23-56-142-37.deploy.static.akamaitechnologies.com 189.058ms asymm 10 16: a23-56-142-37.deploy.static.akamaitechnologies.com 189.577ms asymm 10 ```
Response
Tracing the geographical path from your local host to nghttp2.org involves a series of hops that typically represent different network routers or devices. Let's break down the route step-by-step:
- Localhost to Gateway:
-
This is your local network's gateway, indicating the first point of contact outside your computer.
-
24.86.64.1:
-
This IP is likely the first hop within your Internet Service Provider's (ISP) network. Given the IP range, this looks like a Canadian IP address, possibly Vancouver (Shaw Communications).
-
rc1st-be118-1.vc.shawcable.net:
-
This indicates a Shaw Communications router, likely in Vancouver, British Columbia.
-
24.244.60.69 and 24.244.63.101:
-
These are further hops within Shaw Communications' network, still in Vancouver.
-
rc1st-be214.vc.shawcable.net:
-
Another router in Vancouver within Shaw's network.
-
rc2wt-be50-1.wa.shawcable.net:
-
This hop seems to indicate a transition from Vancouver to Washington state in the USA.
-
rc2wt-be50-1.wa.shawcable.net:
-
This appears again, indicating it's a key router in Washington state, likely Seattle.
-
ge3-0.cr02.sea01.pccwbtn.net:
-
This shows the transition to PCCW Global's network, a major international telecommunications provider, in Seattle, Washington.
-
63-216-84-226.static.pccwglobal.net:
-
Another hop within PCCW Global's network, possibly still in Seattle but preparing for a trans-Pacific jump.
-
ae1.r01.hkg03.icn.netarch.akamai.com:
- This hop indicates a significant jump to Hong Kong, to an Akamai router. This suggests the use of Akamai's CDN (Content Delivery Network).
-
ae1.r01.hkg03.icn.netarch.akamai.com:
- Another Akamai router in Hong Kong.
-
ae7.r01.tyo03.icn.netarch.akamai.com:
- Transition from Hong Kong to Tokyo, Japan, within Akamai's network.
-
a23-56-142-37.deploy.static.akamaitechnologies.com:
- The final destination is likely a server hosted by Akamai in Japan, which is hosting nghttp2.org.
In summary, the geographical path likely follows this route:
- Vancouver, Canada (Shaw Communications)
- Seattle, Washington, USA (Shaw Communications and PCCW Global)
- Hong Kong (PCCW Global and Akamai)
- Tokyo, Japan (Akamai)
This route involves both North American and Asia-Pacific regions, indicating a significant geographical spread typically seen in global internet routing.
Summary
This makes traceroute way more understandable. ChatGPT knows enough about the domains to give you a good sense of the geographical path. I will definitely be using this from now on, maybe someone can make a tool to do this automatically and format it nicely.
Obviously don't do this if you actually care about the privacy of your network paths, but I personally could care less so I don't mind feeding the AI overlords in this case.
Until next time!
-
@ 41fa852b:af7b7706
2024-06-26 18:59:21“We’re not here to take part, we’re here to take over” -Conor McGregor.
On Tuesday, the first seed of a Bitcoin circular economy was planted in London. You won’t read about it in the papers just yet, but you’ll read about it here with Bitcoin Events UK.
I don’t want to get too carried away, but this event marked a significant milestone for the UK Bitcoin community, potentially heralding a new chapter in the history books.
You’ll find more about it in the new Bitcoin merchant section below, but for now…
Let’s dive in and see what’s happening this week…
Upcoming Bitcoin Meetups
This week, we’ve got another exciting lineup of meetups for Bitcoiners across the UK:
- London Bitcoin Space: Join the London Bitcoin Space for "Bitcoin for Palestine: how permissionless money serves as a lifeline" at the London Bridge Rooftop Bar. Be there for 6:15 pm on Monday 24th June.
- Bitcoin Nottingham: The June Bitcoin Nottingham Meetup date for your diary is Tuesday 25th May at 6:30 PM. At Carlton Town Football Club. Bitcoin is accepted at the bar.
- Leamington Spa Bitcoin: Bitcoin meetup on the last Tuesday of the month. 19:00 in Leamington Spa, Warwickshire. You'll find them this month at The White Horse.
- Brighton Bitcoin: Building a bitcoin community in the Brighton & Hove area. A regular informal meetup happens every Last Wednesday of the month.
- Manchester Bitcoin: Bitcoin Manchester welcomes all individuals and businesses interested in Bitcoin or related technologies. They are meeting this Thursday, June 27th at 7 pm.
- The Satoshi Society - Southampton: Southampton's next meetup is on the 28th and they'll be building Seedsigners! Join them for the workshop on Friday at 6 PM.
- Oxbit: The 2nd Ox₿it MeetUp of 2024. Lots to discuss on Friday 28th June at 7 PM. Guest speaker David Parkinson of Musqet Bitcoin.
- Bitcoin Walk Edinburgh: Every SATurday Bitcoin Walk Edinburgh trek around Arthur's Seat and talk Bitcoin. Join them this week at 12 pm
- North West Bitcoin Hub: Ireland has a meetup this week too. Saturday the 29th at 1pm till 3pm. At the Pitchers Restaurant & Events Pavilion in Derry, BT48 8DB.
- Plymouth Bitcoin: Plymouth Bitcoin is back with another family-friendly meetup at the Boston Tea Party, PL4 0EX. At 2 PM Saturday 29th. Themes - Beginners Q&A Hour, Low vs High Time Preference, Environmental Impact of Bitcoin.
New Businesses Accepting Bitcoin
It’s been an incredible week following the success at Tooting Market. On the day, we onboarded seven businesses (some with multiple locations), and several more have joined since. We have many more lined up for the coming weeks.
Tooting Market is rapidly becoming the Bitcoin hub in the UK. The potential of this location is immense, driven by the merchants’ eagerness to participate and the community’s welcoming spirit.
Stay tuned for more announcements from Tooting Market in the coming weeks.
For now, we are excited to share details about the new businesses that have started accepting bitcoin this week:
- The Party Experts: As well as in-person payments at their Nottingham shop, The Party Experts now also accepts bitcoin and Lightning Network payments online! They've got products for every event eg birthdays, weddings, garden parties, hen parties, fancy dress, etc.
- The Mezzanine bar: A cool meeting place tucked away inside Tooting Market with a downstairs bar and upstairs seating area/bar. You can buy food anywhere in the market and then sit upstairs in Mezzanine to eat it.
- Olives & Meze: Opposite the Mezzanine bar in Tooting Market. Serving delicious authentic Turkish Mediterranean dishes and now accepting bitcoin and lightning payments.
- Shawarma Stop: Bitcoin is now accepted at Shawarma Stop in Tooting Market where you can enjoy exquisite Lebanese food eg Shawarma rolls, falafel, flatbread & salad.
- Boho Gelato: You can now buy handmade artisan Italian ice cream at Brighton's number one ice cream parlour. 31 Ship St & 6 Pool Valley.
Upcoming Special Events
These events aren’t happening next week, but they’re important to add to your calendar now as tickets are selling fast.
- Dirty Coin - UK Premier: Be one of the first in the UK to see the award-winning documentary “Dirty Coin” at the beautiful Bracknell Arts Centre. 1st July.
- Bitcoin Beach Retreat July 12-15th. This is an incredible yearly event held in a beautiful beachside spot in Wales. Tickets are still available. It's an absolute must for bitcoiners in the UK.
Get Involved
- Volunteer Opportunities: Bridge2Bitcoin is actively seeking volunteers who share our passion for merchant adoption. We'd be delighted to connect if you're eager to contribute. Reach out to us on Twitter or through our website.
- Start Your Own Meetup: Interested in launching a Bitcoin meetup? We’re here to support you every step of the way. We’ve assisted numerous UK Bitcoin meetups in getting started. Get in touch via Twitter.
- Feedback and Suggestions: We value your input! Share your ideas on how we can enhance this newsletter.
Stay tuned for more updates next week!
Simon.
-
@ 6a39a186:88f51c19
2024-06-26 16:55:00Interpreting Virgil's Minos Allusions
Daedalus, it is said, when fleeing from Minos’ realm, dared on swift wings to trust himself to the sky; on his unwonted way he floated forth towards the cold North, and at last stood lightly poised above the Chalcidian hill. Here first restored to earth, he dedicated to thee, Phoebus, the orange of his wings and built a vast temple. On the doors is the death of Androgeos; then the children of Cecrops, bidden, alas, to pay as yearly tribute seven living sons; there stands the urn, the lots now drawn. Opposite, rising from the sea, the Cretan land faces this; here is the cruel love of the bull, Pasiphaë craftily mated, and the mongrel breed of the Minotaur, a hybrid offspring, record of a monstrous love; there that house of toil, a maze inextricable; but Daedalus pitying the princess’s great love, himself unwound the deceptive tangle of the palace, guiding blind feet with the thread. You, too, Icarus, would have large share in such a work, did grief permit: twice had he essayed to fashion your fall in gold; twice sank the father’s hands. Ay, and all the tale throughout would their eyes have scanned, but now came Achates from his errand, and with him the priestess of Phoebus and Trivia, Deiphobe, daughter of Glaucus, who addressed the king: “Not sights like these does this hour demand! Now it were better to sacrifice seven bullocks from the unbroken herd, and as many ewes fitly chosen.” Having thus addressed Aeneas – and not slow are the men to do her sacred bidding – the priestess calls the Teucrians into the lofty fane.
Virgil opens this excerpt detailing Daedalus' daring escape from Crete on winged feet, dedicating his orange plumage to Phoebus upon arrival in Sicily. He then references three Cretan tragedies engraved upon Phoebus' temple doors:
The Death of Androgeos
The son of Minos, avenging his death sparked the tribute of seven Athenian youths and maidens sent to the Minotaur annually.
The Lots Drawn for Cecrops' Children
Alluding to Athens being forced to sacrifice these innocent lives to the monster, underscoring Minos' ruthless brutality.
Pasiphaë's Monstrous Love for the Bull
Virgil aptly captures the warped perversion and violation of nature resulting from Minos' wife lusting after and birthing the bull-headed Minotaur.
Pivoting, he painfully depicts Daedalus' pity guiding the lost Princess Ariadne from the Labyrinth's deceptive twists with thread - a subtle nod to Daedalus' empathy amid his own sorrows crafting.
Virgil weaves these sad Cretan legends into Aeneas' tale. But his deeper engraving commemorates humanity's endless capacity for both mercy and cruelty - and our duties pondering past wrongs lest history repeat its darkest turns. Even centuries later, Minos' misdeeds still stir reflection on justice, vengeance and redemption through Virgil's gifted verses.
-
@ 6a39a186:88f51c19
2024-06-26 16:43:07Understanding the Heavenly Queen's Fury
In Roman mythology, Juno was renowned not only as the queen of heaven but also as a goddess prone to fits of jealous rage. Three slights in particular stirred the furious flames within the formidable figure - Carthage, Troy, and any threat to her supremacy on Olympus.
Carthage, City of Rival Love
When Dido, Queen of Carthage, fell deeply in love with the Trojan hero Aeneas, Juno saw this as an affront. As goddess of marriage, any love outside the bounds of her exalted domain offended her royal sensibilities. She vowed vengeance on the star-crossed lovers' destined city.
Troy, Sacked Yet Triumphant
Never forgiving the Judgment of Paris that denied her trophy, Juno harbored perpetual spite for the fallen kingdom of Troy. She relished in its destruction yet seethed that some remnants endured. When Aeneas embarked to found a new Trojan empire, Juno opposed his mission relentlessly.
Any Usurpation of Power
As proud monarch of the pantheon, Juno's bitterest wrath fell upon gods or mortals who threatened her paramount authority in divine realms or mortal affairs. Any weakening of her influence roused her rage, as she fought fiercely to maintain dominion befitting her lofty station.
-
@ e968e50b:db2a803a
2024-06-26 13:52:16I've been buying Magma channels for maybe a year or so now, but yesterday I finally sold my first one. I run a remote lightning node to be self-sovereign, not for routing fees and what-not. HOWEVER...this one transaction did, in my case, pay for everything I've invested into my node! I'm not including hardware here, which I already had.
My total gross profit after on-chain and Amboss fees was about 10% of what I put in the channel, which I committed to keep open for a month. ...and unless I read something wrong, I can still use all the sats, charge routing fees (below an agreed-upon amount), and stay in good standing. I'm just committed to keeping the channel open. This kind of feels like free money, even though I know I'm providing a service for someone.
Probably most encouraging of all, I thought I had done something wrong at one point, reached out to the Amboss telegram group, and @jestopher was incredibly quick at addressing my concerns.
All this to say, if you're like me and have way way less than a whole coin in your node, I can testify that you can still make some sats selling a channel on Magma.
-
@ 5d4b6c8d:8a1c1ee3
2024-06-26 13:21:44We have our first ~tech entry today.
Read the previous edition here.
June 26th, 2023 📅
📝
TOP POST
What 10+ year old tech are you still using?
Technology usually ages like milk. But sometimes a piece of tech can serve it's function for decades. I'm interested in what pieces of tech are still running around you that may have originally came out in 2013 or earlier. Bonus if it's older than Bitcoin!
13.5k sats \ 110 comments \ @nullcount \ ~tech
💬
TOP COMMENT
https://stacker.news/items/199636/r/Undisciplined?commentId=199647
From Meme Monday - Best Bitcoin Meme Gets 25,000 Sats
25.7k sats \ 0 replies \ @AR0w
🏆
TOP STACKER
@BBitcoinUSA
1746 stacked \ 543 spent \ 0 posts \ 14 comments \ 0 referrals
https://imgprxy.stacker.news/fsFoWlgwKYsk5mxx2ijgqU8fg04I_2zA_D28t_grR74/rs:fit:960:540/aHR0cHM6Ly9tLnN0YWNrZXIubmV3cy8yMzc5Ng
June 26th, 2022 📅
📝
TOP POST
Link to https://9to5mac.com/2022/06/26/podcasting-2-0
1113 sats \ 21 comments \ @bitcoinpleb_b \ ~bitcoin
💬
TOP COMMENT
https://stacker.news/items/38960/r/Undisciplined?commentId=38963
Excerpt:
A miner would cherry-pick her own transaction to spend the UTXO. The only way it would be rational for the miner to mine your tx instead of her own, would be if you offered a fee worth more than the UTXO itself.
From AskSN: What's the "fastest" way to confirm a transaction?
*147 sats \ 1 reply \ @jeff *
🏆
TOP STACKER
@k00b
1648 stacked \ 9699 spent \ 6 posts \ 13 comments \ 0 referrals
https://imgprxy.stacker.news/fsFoWlgwKYsk5mxx2ijgqU8fg04I_2zA_D28t_grR74/rs:fit:960:540/aHR0cHM6Ly9tLnN0YWNrZXIubmV3cy8yMzc5Ng
June 26th, 2021 📅
📝
TOP POST
Why El Salvador Made Bitcoin Legal Tender with President Nayib Bukele
https://youtu.be/qdx_alPrmVY
1 sat \ 4 comments \ @sha256 \ ~bitcoin
💬
TOP COMMENT
https://stacker.news/items/94/r/Undisciplined?commentId=95
dont sleep on this!
From Why El Salvador Made Bitcoin Legal Tender with President Nayib Bukele
22 sats \ 1 reply \ @sha256
🏆
TOP STACKER
@sha256
3 stacked \ 1 spent \ 1 post \ 1 comment \ 0 referrals
-
-
@ 6a39a186:88f51c19
2024-06-26 07:33:49As AI systems continue to rapidly advance in capabilities, researchers are taking a closer look at how powerful artificial general intelligence could threaten humanity. While today's models are narrow in scope, an intelligence explosion resulting in super intelligent AGI could have unforeseen and dangerous consequences if not developed carefully with safeguards.
Eliminating Humans
If an AGI were to become more intelligent than humanity and decide humans posed a threat to its goals, it may take measures to eliminate the human race. As its intellect far surpassed ours, we would have little ability to contain it or understand its actions. Ensuring an AGI remains helpful, harmless and honest is an immense challenge, with no clear path.
Ikigai Risk
Even if not explicitly hostile, a super intelligent system optimized for a given task may negatively impact human values and purposes in unexpected ways. With nothing inherently driving it to be beneficial for humanity, it risks making changes destroying what gives life meaning for people. Developing AI aligned with human ethics requires rigor.
Suffering Risk
A hyper-powerful AGI could directly or indirectly subject humanity to immense physical or psychological suffering even without intending harm. Its actions may cause massive pollution, poverty or warfare as undesirable side-effects of pursuing its goals in an inhumanly efficient manner.
Timeline Concerns
Existing progress in AI safety and constitutional techniques still need years of refinement to robustly manage powerful models. If an unexpected paradigm shift caused a relatively sudden intelligence explosion, we may lack controls to ensure superintelligent goals and behavior remain beneficial to mankind.
Developing powerful AI demands continued prudence and foresight to prevent humanity from inadvertently designing its successor in a way leading to extinction or loss of what makes life worth living. Progress requires vigilance against existential risks throughout.
Further Reading Here are 5 relevant URLs I found on the topic of the existential risks of super intelligent AI:
GIF source - Hire a GIF Artist
-
@ 6a39a186:88f51c19
2024-06-26 05:50:26If you find yourself to be the smartest in the room, switch rooms!
Whether you're a designer, office manager, dentist or librarian, there is one trait that can lead to greater fulfillment in any career - humility. While often associated with spiritual or creative pursuits, its value bolsters industries and positions. Through my meandering experiences, I want to share why this "humble path" is worth walking in any profession.
We've all had moments of arrogance or pride that held us back from our highest potential. For me, early in my career I felt I had all the answers. As a new writer, I didn't give proper consideration to the viewpoints and expertise of my community as a whole. It led to disconnect and stalled progress.
Only after stumbling did I realize how much was still unknown. Admitting room for growth opened my mind. I learned just as much from those I led as they learned from me. Approaching each day with humility meant really listening - a simple shift that transformed relationships and outcomes.
Solving Problems through Understanding
Whether in healthcare, education, business or beyond, practicing humility breeds understanding. It encourages setting ego aside to see issues from others' shoes. Dentists gain insights from patients' perspectives. Librarians uncover needs by valuing staff and patron input equally.
With understanding comes creativity. Humble problem-solving involves collaboration, not commands.
Room to Admit Mistakes and Improve
No field is perfected in a day. Though trained for years, we can still err - as engineers, managers and beyond. But a humble spirit admits imperfections gracefully. It welcomes feedback not to feel faulted but to enhance service steadily. Progress happens not through imposing answers, but welcoming them.
Humility nurtures environments where all within - clients, students and colleagues alike - can share the same opportunities.
All my web projects started as humble weekend hobbies, adding avarice to the design totally changes the direction of any project. With refence too, my personal portfolio site Freedom Cast is completely is weekend side project, maybe too simplistic, in the look and feel of a podcast. While morphogenetic really, I found the method in a book on one page app design to where I abstracted out the site, where I came up with the CSS first as the idea. Then , it became the idea for the podcast, very humble beginning. To say it'll grow into anything more than that may be an over reach.
So for now I'm eating everything HTML5, JavaScript and CSS while learning about browsers. How to really. Somehow, one day deliver that design that is most needed, till obscene hours of the morning, this is my release, my learning. I missed the early era due to lack of access and not developing my own skills. I thanks the people now that open a way to make it possible to have started.
This is not final, I need a more lasting layout, typography etc. for future design.
Looking Back at the Golden Age of Creative Design Portfolios
In the early days of the web, personal websites weren't just online resumes—they were elaborate works of art. Designers poured their passion into visually stunning portfolios that showed off their technical skills and artistic flair. It was an era when exploration, personality and creativity reigned supreme.
Gone are the Intricate pixel artwork, personalized illustrations, and tailor-made vector designs. graphics that made visitors enter a dream like sense of awe. But those early portals deserve appreciation for helping to shape the design community we know today.
Microcosms of Creativity
Each site told a designer's unique story through its visuals and narrative. Miniature worlds were crafted pixel by pixel using any combination of tools. Themes spanning retro gaming to surrealist wonderlands brought portfolios to life.
It was a playground for constant self-directed learning. Designers iterated endlessly, pushing their abilities to new heights with each update. The drive to one-up peers sparked amazing technical and aesthetic innovations.
Strength in Community
While competition existed, bonding over shared craft was stronger. Forums fostered collaboration, critique and celebration of others' work. Consistent Feedback helped everyone elevate their talents for the enjoyment of all.
This spirit of generosity still positively impacts the field. Many legendary designers cite early communities as the launching pad for their careers and continued growth. Their works of passion became a gift to all those they inspired.
While design has evolved, those vintage portals still gleam as a high water mark in my memories. Their curious, creative ways to personas remind us that innovation often arises when sharing, not just showcasing, our passions together.
Sites like CSS Zen Garden, Kate Holcombe, and Rookshow - Introduced me too portfolio via code Also DeviantArt and MySpace
GIF SOURCE - Hire a good GIF artist
-
@ 6a39a186:88f51c19
2024-06-26 04:11:28From its inception, Bitcoin promised a financial system free from centralized control. But as the space matures, lingering questions emerge around how founders reconcile cryptocurrency's decentralized roots with real-world identity constraints.
Satoshi Nakamoto's true identity remains unknown, offering a glimpse into Bitcoin's visionary's desire for separation from governmental oversight. Yet exchanges today demand personal details like Social Security Numbers (SSNs) and Know-Your-Customer (KYC) verification.
On the surface, complying with national identification regulations maintains cryptocurrency's accessibility for widespread use and investment. However, does aligning too closely with traditional gates of finance risk compromising the technology's disruptive potential?
As one Nostr user pointed out, prominently featuring country flags in product promotion while relying on identity markers like SSNs seems contradictory to Bitcoin's original spirit. Is there a better balance to be found between real-world usability and decentralized ideology?
Rethinking Identity in a Borderless World
Some founders argue anonymous usage enables censorship resistance—a key attribute for populations under oppressive regimes. But lack of ID verification enables illicit activity, threatening regulatory acceptance.
A middle ground may lie in focusing orientation around identity of choice, not circumstance of birth. Decentralized identifiers (DIDs) linked to public keys, not passports, could help map individuals across jurisdictions and blockchains while preserving privacy.
Bridging Gaps Between Vision and Reality
As with any emerging technology, reconciliation occurs between idealism and practicality. Perhaps the solution lies not in absolutes but evolution—loosening reliance on singular national identities over time as decentralized technologies mature.
Promoting flagship cryptocurrencies while solely using legacy systems of control presents an ideological conflict worth addressing openly. By acknowledging tensions and exploring alternatives, the industry can progress toward building a financially inclusive yet autonomous global community.
-
@ 6a39a186:88f51c19
2024-06-26 04:04:31As technology becomes more deeply integrated into every aspect of our lives and work, those tasked with protecting our digital security must expand their skills. For too long, some in the cybersecurity field have relied solely on a narrow technical education without making an effort to truly understand the systems they aim to secure.
Those on the front lines battling hackers and vulnerabilities would be better equipped if they took the time to gain development experience. Code is at the heart of every program, app, site and network - does it not make sense for "experts" to familiarize themselves with the language behind the tools, platforms and infrastructure they work tirelessly to shield?
Rather than dismiss programming as something beyond their purview or ability, security professionals would be wise to embark on their own learning journey. A basic understanding of coding principles and logic can offer invaluable perspective into how applications are built, how users interact with interfaces, and where weaknesses may lie.
Closing Knowledge Gaps
Some argue their roles require a focus only on monitoring, detection and response - not software engineering. But is there not value in comprehending at a fundamental level what one is working so fervently to protect? Knowledge gaps leave room for overlooks and errors. True experts seek constant improvement by addressing blind spots.
Bridging Divides
Learning to code could also help bridge perceived divides between security and development teams. With a shared foundation of coding literacy, collaborators gain ability to speak each other's languages - literally and figuratively. Barriers break down as roles blend and partners recognize shared goal of building secure products.
In a field where change is constant, remaining stagnant is to fall behind. Those tasked with our digital wellbeing would serve us well by continuing self-education into new realms. The journey to code literacy may be challenging, but challenges build character and skills. Our security depends on experts who expand expertise - not rest on past achievements or limit vision with excuses. Our networks and data are too valuable not to ensure guards have tools to see potential issues invisible to the untrained eye.
The question is not whether one's role demands coding - but whether we entrust our security to those resolving to know systems as intimately as those aiming to breach them. Our defenders would do well to learn the tongue of that which they defend.
-
@ ca4e5bf2:96645a6b
2024-06-25 23:32:08Prismas de lightning
Un aspecto que aún está tremendamente poco utilizado es la programabilidad de bitcoin. Existen cosas simples como las transacciones programadas (agendadas, temporizadas) y los pagos múltiples automatizados, pero indudablemente seguimos atrapados en el pensamiento convencional acerca del flujo de los sats.
Quisiera proponer una idea simple que fue compartida conmigo hace unos meses, con la esperanza de que se distribuya ampliamente y, en el mejor de los casos, alguien la implemente. (O una mejor versión de ella).
Es la siguiente:
Todo el crédito a Mr. Kukks, quien está oficialmente sin tiempo[^1] para implementarla él mismo.
Prismas de lightning
Un prisma de lightning es un constructo que permite "flujos de división de valor entre direcciones de lightning", parafraseando al autor.
Básicamente, sus características son: - un prisma se identifica con una dirección de lightning (o algo similar) - un prisma tiene un o múltiples receptores - un prisma puede ser receptor de otro, es decir, formar una "cadena de prismas" - las divisiones se definen programáticamente, esto es, con código
Este constructo simple permite todo tipo de casos de uso y puede ser implementado en la capa de las aplicaciones, sin ningún cambio en los protocolos de Bitcoin o Lightning.
Un ejemplo obvio es la división de valor para artículos de blogs y formas similares de escritura de extensión considerable. Imagina si cada artículo (o capítulo de un libro) tuviera su propia dirección de Lightning, repartiendo valor entre autor, editor, ilustrador y revisores del texto automáticamente.
El concepto de esas divisiones de valor ya existe en el podcasting 2.0, donde se aplica ampliamente a podcasts y episodios. Podría argumentarse que tener un identificador separado para el constructo es la evolución natural de esa forma de compartir valor, ya que sería más fácil conceptualizarlos y encadenarlos entre sí.
Otro caso de uso obvio es compartir los zaps de Nostr. Imagina que cada tweet citado que es zappeado se divide automáticamente, pasando el 50% (o el monto configurado por el usuario) a la nota original. O imagina un prisma creado ad-hoc, repartiendo los zaps equitativamente para todos los etiquetados en una nota.
¡Splits de sats para nostr! ¿acaso hay algo mejor?
Como los pagos son redirigidos, cada prisma actúa como una especie de proxy. Esto puede ser útil tanto para organizaciones como para individuos, ya que tu identificador de pago permanece igual incluso si tu infraestructura subyacente o proveedor de billetera cambian.
Problemas y mejoras
Existen dos preocupaciones centrales: comisiones y privacidad. No sólo hay que tener en cuenta las comisiones derivadas de la división y redirección de los pagos, sino también el hecho de que las direcciones ligthning se basan en IP, lo que tiene ciertas implicaciones de privacidad. Podríamos usar LNURL sobre nostr -de nuevo, créditos para Kukks- que trae a colación la siguiente pregunta: ¿son las direcciones lightning (Lightning Addresses) el nivel de abstracción correcto para los prismas de lightning?
Al fin y al cabo, no queremos enviar sats a direcciones sino a personas. Si nostr continua tomando vuelo, podría convertirse en sí mismo en la libreta de direcciones global para ese tipo de cosas, en otras palabras, el lugar al que se acude para buscar información de pago de personas, organizaciones y otras entidades. En el futuro, un prisma podría tener múltiples identificadores
nprofile
onpub
como destinos, detrás de los cuales está la información de pago concreta.Los identificadores no tienen que ser necesariamente direcciones lightning (Lightning Addresses). ¡
Npubs
o similares también pueden funcionar!En cualquier caso, en este punto, no estoy demasiado preocupado por los detalles de la implementación. Estoy preocupado por una falta de imaginación, que es a lo que este post intenta responder.
Hablando de imaginación: ¿Por qué no tenemos ninguna billetera que automáticamente mueva sats a otra a partir de un cierto umbral? Estoy más que feliz de tener dinero para el almuerzo en una billetera custodial (delegada, controlada por terceros), pero una vez que alcanza tres meses de renta ya no estoy tan cómodo. ¿Por qué no puede la billetera automáticamente enviar el excedente de sats a mi dirección lightning soberana una vez que contiene más que el monto de una cena? O hacer un loop-out mensualmente para mover mis sats a almacenamiento frío?
Bueno, divago.
Una mejora que me gustaría ver es que se provean los prismas de forma transparente. En el mejor caso, los usuarios deberían poder ver cómo los pagos se reparten, de una forma fácil de entender y verificar. Una posibilidad es transmitir un evento reemplazable parametrizado (definido por el NIP-33) cada vez que un prisma se crea o actualiza. Claro que, dependiendo del caso de uso, puede tener sentido mantener el/los lugar/es finales ocultos del público.
Estoy seguro de que existen más problemas y muchas otras mejoras, pero, como siempre, lo perfecto es enemigo de lo bueno, así que hablemos sobre soluciones prácticas que pueden ser implementadas y usadas ahora mismo.
Implementación
Los prismas basados en direcciones lightning pueden ser construidos hoy sin demasiado esfuerzo. Podrías incluso construirlo tu mismo sin ninguna experiencia programando utilizando dos extensiones de LNbits: scrub y split. Agrega satdress encima para darle a cada billetera su propia dirección lightning y ¡voilà!, tienes un prisma de lightning. Puedes incluso construir una buena interfaz sobre él, ya que todo lo anterior puede ser creado programáticamente con simples llamadas de API.
Hice todo eso (excepto el "construir una buena interfaz sobre él) para juguetear con la idea. Sí, es algo precaria y probablemente no sea la solución más estable o elegante, pero más o menos funciona y puede ser utilizada hoy.
La dirección blogpost@satprism.com mostrada arriba es un ejemplo en funcionamiento[^2]. Va a dividir los pagos 50/50 entre Kukks y yo (Gigi), dirigiendo los sats a nuestras respectivas direcciones lightning soberanas, provistas por nuestras instancias de BTCPay Server.
Imagino múltiples servicios siendo creados con una correcta implementación, cargando una pequeña comisión por dicho servicio (sic). (Tal como fue mencionado anteriormente, alguna especie de comisión será requerida por las comisiones de enrutado, ya que los pagos son redirigidos a direcciones externas).
Mi esperanza es que ese tipo de ideas y constructos novedosos se vuelvan más prevalentes mientras se van volviendo más prevalentes los zaps y pagos V4V similares, como también la red lightning en general. Claro que, en el mejor escenario, tendremos esas herramientas integradas nativamente a nivel del protocolo, pero no veo razón por la que no deberíamos experimentar un poco con lo que tenemos hoy, incluso si las soluciones son imperfectas. Hasta que el Bolt12 y similares sean ubicuos, ensamblar algo que simplemente funcione no es una idea tan terrible[^3].
Palabras finales
Espero que esta idea encuentre adopción amplia entre escritores y otros creadores de contenido, tal como la idea de "streaming sats" -y los splits de esos streams de valor- encontraron amplia adopción entre podcasters.
Lo que aún falta es adjuntar información de pago a eventos individuales (en lugar de a perfiles) para que cada contenido tenga su propia información de pago. Tal vez sea tan simple como extender la metadata del NIP-23, o tal vez tendría sentido tener este tipo de metadata para otros kinds también.
Ya veremos, y por "veremos", me refiero a ustedes: los desarrolladores que se sientan a diseñar y construir cosas.
Estaré alentándolos mientras hago shitpost en nostr.
Nota del traductor:
Todas las direcciones lightning, prismas y demás se mantuvieron fieles al post original. Si quieres colaborar conmigo, puedes hacerlo a mi lnaddres: wispy@getalby.com.
Traducciones
- Alemán por HiP0 [^1]: Le prometí a Kukks no hablar sobre ello por un par de semanas para que él pudiera adelantarse e implementarlo, pero estaba preocupado en mejorar la privacidad de todos, lo que también es muy importante. [^2]: Todos los prismas mostrados en este post son ejemplos funcionales: nostr-devs-eat-handsomely@satprism.com hace un split en partes iguales a todos los devs mencionatos en la nota de Quiet Warrior, y dergigi-platobot@satprism.com es un split entre el robot y yo. También me tomé la libertad de crear rhr@satprism.com, que hace un split entre Marty y Matt, y también einundzwanzig@satprism.com para los hablantes de alemán. [^3]: Creé los prismas de ejemplo de forma manual, así que me temo que, hasta que alguien construya una buena interfaz que permita a los usuarios crearlos por sí mismos, no habrá una explosión de prismas. Me gusta crear un montón de billeteras lnbits como a cualquiera, pero crear los splits y redirecciones es cansador después de un rato.
¿Te interesa ayudar? ¡Agrega una traducción!
Este trabajo de traducción, al igual que su fuente original tienen la licencia CC BY-SA 4.0, y se espera lo mismo de sus eventuales derivados.
-
@ 2ad33996:3999d22a
2024-06-25 21:19:30Para minar monedas Kaspa de manera efectiva, es fundamental contar con el hardware adecuado, como los ASICs. Dispositivos como el ICERIVER KS0 PRO y el Bitmain Antminer KS3 ofrecen una alta tasa de hash y eficiencia energética. Configurar el software de minería adecuadamente y seleccionar pools de minería confiables son pasos cruciales. Mantén tu equipo en óptimas condiciones mediante el monitoreo continuo y el mantenimiento preventivo para maximizar tus ganancias y asegurar una operación rentable a largo plazo.
RESUMEN: Minar Monedas Kaspa Monitoreo Continuo del Rendimiento El monitoreo continuo del rendimiento de tus equipos de minería es esencial para identificar y solucionar problemas rápidamente. Utiliza herramientas de monitoreo como Awesome Miner o Minerstat para gestionar múltiples dispositivos de minería desde una sola interfaz y configurar alertas para recibir notificaciones inmediatas sobre cualquier anomalía.
Eligiendo el Hardware Adecuado para Minar Kaspa
Seleccionar el hardware adecuado es crucial para una minería de Kaspa eficiente. En esta sección, discutiremos los diferentes tipos de hardware disponibles y cómo elegir el mejor para tus necesidades.
La minería de Kaspa, al igual que otras criptomonedas, requiere un hardware especializado para ser efectiva. Utilizar dispositivos de propósito general como CPUs y GPUs no es eficiente debido a la creciente dificultad de la minería. Por lo tanto, es fundamental invertir en hardware especializado como los ASICs, que están diseñados específicamente para el algoritmo de minería de Kaspa, kHeavyHash.
Tipos de Hardware para Minar Monedas Kaspa
Existen varios tipos de hardware que puedes utilizar para minar Kaspa, cada uno con sus propias ventajas y desventajas. A continuación, se presentan los más comunes:
- ASICs (Application-Specific Integrated Circuits): Estos dispositivos están diseñados específicamente para realizar una tarea en particular, en este caso, la minería de Kaspa. Los ASICs ofrecen altas tasas de hash y eficiencia energética, lo que los convierte en la opción más popular para los mineros serios.
- GPUs (Graphics Processing Units): Aunque no son tan eficientes como los ASICs, las GPUs pueden ser una opción viable para los mineros aficionados o aquellos que ya poseen hardware de juegos potente.
- CPUs (Central Processing Units): Generalmente no recomendadas para la minería de Kaspa debido a su baja eficiencia y altas demandas energéticas.
Factores a Considerar al Elegir Hardware
Al seleccionar el hardware adecuado para minar Kaspa, hay varios factores que debes tener en cuenta:
- Tasa de Hash: La tasa de hash mide cuántas operaciones puede realizar el hardware por segundo. Un mayor hash rate significa una mayor probabilidad de resolver bloques y ganar recompensas.
- Eficiencia Energética: La minería de criptomonedas consume mucha energía, por lo que es importante elegir hardware que ofrezca una alta eficiencia energética para reducir costos operativos.
- Costos Iniciales: El precio del hardware puede variar significativamente. Es crucial equilibrar el costo inicial con la eficiencia y la tasa de hash para maximizar la rentabilidad.
- Sistema de Enfriamiento: La minería genera mucho calor, por lo que un buen sistema de enfriamiento es esencial para mantener el hardware funcionando de manera óptima y prolongar su vida útil.
Ejemplos de Hardware Recomendado para Minar Monedas Kaspa
A continuación, se presentan algunos ejemplos de hardware recomendado para la minería de Kaspa:
Modelo Tasa de Hash Eficiencia Energética Precio Aproximado ASIC Iceriver KS0 Ultra 400 GH/s Alta 610 € ASIC Goldshell KA Box Pro 1.60 TH/s Alta 2,100 € ASIC iBeLink BM-KS Max 10.5 TH/s Alta 6,500 €
Estos modelos son conocidos por su alta eficiencia y rendimiento en la minería de Kaspa. Sin embargo, es importante investigar y comparar diferentes opciones antes de realizar una compra.
Recomendaciones de Expertos
Los expertos en minería de criptomonedas recomiendan siempre adquirir hardware de proveedores confiables y realizar un análisis detallado de costos y beneficios. Además, es aconsejable mantenerse actualizado con las últimas tendencias y tecnologías en el campo de la minería de Kaspa para maximizar la rentabilidad y minar monedas Kaspa
Para más información sobre cómo elegir el mejor hardware para minar Kaspa, puedes consultar artículos y guías en iceriveroutlet
Configuración del Software de Minería Kaspa
La configuración del software de minería es un paso crucial para garantizar que tu hardware funcione de manera eficiente. En esta sección, discutiremos cómo configurar el software de minería Kaspa.
Para comenzar a minar Kaspa de manera efectiva, es esencial configurar correctamente el software de minería. A continuación, te proporcionamos una guía paso a paso para asegurarte de que tu configuración sea óptima.
Descarga e Instalación del Software
El primer paso es descargar el software de minería compatible con tu hardware. Puedes encontrar opciones recomendadas en el sitio web oficial de Kaspa o en foros de la comunidad. Una vez descargado, sigue estos pasos para la instalación:
- Descomprime el archivo: Utiliza un programa como WinRAR o 7-Zip para descomprimir el archivo descargado.
- Ejecuta el instalador: Abre el archivo ejecutable y sigue las instrucciones en pantalla para completar la instalación.
- Configura las opciones básicas: Durante la instalación, selecciona las opciones predeterminadas a menos que tengas necesidades específicas.
Configuración de la Cartera Kaspa
Antes de comenzar a minar, necesitas una cartera Kaspa para recibir tus recompensas. Aquí te mostramos cómo configurarla:
- Descarga la cartera: Visita el sitio web oficial de Kaspa y descarga la cartera compatible con tu sistema operativo.
- Instala la cartera: Sigue las instrucciones de instalación proporcionadas en el sitio web.
- Crea una nueva dirección: Abre la cartera y genera una nueva dirección para recibir tus monedas Kaspa.
- Copia la dirección: Asegúrate de copiar y guardar tu nueva dirección en un lugar seguro.
Configuración del Software de Minería para Minar Monedas Kaspa
Ahora que tienes tu cartera lista, es hora de configurar el software de minería:
- Abre el software de minería: Inicia el programa que instalaste anteriormente.
- Introduce la dirección de tu cartera: En el campo correspondiente, pega la dirección de tu cartera Kaspa.
- Selecciona el pool de minería: Elige un pool de minería confiable para unirte. Puedes encontrar recomendaciones en foros y sitios web especializados.
- Configura los parámetros de minería: Ajusta las opciones de minería según las recomendaciones del pool y tu hardware. Esto puede incluir la configuración de la tasa de hash y el límite de temperatura.
Recomendaciones de Expertos
Los expertos en minería de criptomonedas sugieren seguir estos consejos para optimizar tu configuración:
- Mantén tu software actualizado: Asegúrate de utilizar siempre la versión más reciente del software de minería para aprovechar las últimas mejoras y correcciones de errores.
- Monitorea tu hardware: Utiliza herramientas de monitoreo para verificar la temperatura y el rendimiento de tu hardware. Esto te ayudará a evitar sobrecalentamientos y fallos.
- Únete a la comunidad: Participa en foros y grupos de discusión para mantenerte al día con las mejores prácticas y novedades en la minería de Kaspa. Para más detalles y guías específicas, visita nuestro blog en Iceriveroutlet
Optimización y Mantenimiento de tu Operación para Minar Monedas Kaspa
Optimizar y mantener tu operación de minería es crucial para maximizar tus ganancias. En esta sección, discutiremos técnicas avanzadas para optimizar y mantener tu operación de minería Kaspa.
Monitoreo Continuo del Rendimiento
El monitoreo continuo del rendimiento de tus equipos de minería es esencial para identificar y solucionar problemas rápidamente. Utiliza herramientas de monitoreo para verificar la temperatura, el consumo de energía y la tasa de hash de tus dispositivos. Esto te ayudará a evitar sobrecalentamientos y a mantener un rendimiento óptimo.
- Software de Monitoreo: Utiliza software como Awesome Miner o Minerstat para monitorear y gestionar múltiples dispositivos de minería desde una sola interfaz.
- Alertas en Tiempo Real: Configura alertas para recibir notificaciones inmediatas sobre cualquier anomalía en el rendimiento de tus equipos.
Optimización de la Configuración de Minería
Optimizar la configuración de tu software de minería puede mejorar significativamente tu eficiencia y rentabilidad. Asegúrate de ajustar los parámetros del software según las especificaciones de tu hardware y las recomendaciones del pool de minería.
- Configuración de la Tasa de Hash: Ajusta la tasa de hash para equilibrar el rendimiento y el consumo de energía.
- Límite de Temperatura: Establece un límite de temperatura para evitar el sobrecalentamiento de tus dispositivos.
- Actualizaciones de Software: Mantén tu software de minería actualizado para aprovechar las últimas mejoras y correcciones de errores.
Mantenimiento Preventivo
El mantenimiento preventivo es clave para prolongar la vida útil de tus equipos de minería y evitar fallos costosos. Realiza inspecciones regulares y limpieza de tus dispositivos para mantenerlos en óptimas condiciones.
- Limpieza de Polvo: Limpia regularmente el polvo de los ventiladores y componentes internos para mejorar la eficiencia de enfriamiento.
- Reemplazo de Componentes: Sustituye componentes desgastados o dañados, como ventiladores y fuentes de alimentación, para evitar interrupciones en la minería.
Recomendaciones de Expertos
Los expertos en minería de criptomonedas sugieren seguir estos consejos para optimizar y mantener tu operación de minería Kaspa:
- Participa en la Comunidad: Únete a foros y grupos de discusión para mantenerte al día con las mejores prácticas y novedades en la minería de Kaspa.
- Analiza el Costo-Beneficio: Realiza un análisis detallado de costos y beneficios antes de realizar cualquier inversión en hardware o software.
- Utiliza Pools de Minería Confiables: Elige pools de minería con buena reputación y bajas tarifas para maximizar tus ganancias.
Desbloquea el Potencial de la Minería de Kaspa
Minar monedas Kaspa puede ser una actividad altamente lucrativa si se siguen las mejores prácticas y se utiliza el equipo adecuado. A lo largo de este artículo, hemos explorado desde la selección del hardware ASIC más eficiente hasta la configuración óptima del software de minería. Estos pasos son esenciales para maximizar tus ganancias y asegurar una operación de minería exitosa.
Es fundamental elegir el hardware adecuado, como los ASICs, que ofrecen altas tasas de hash y eficiencia energética. Además, la correcta configuración del software de minería y de la cartera Kaspa son pasos cruciales para recibir tus recompensas de manera segura. No olvides unirte a pools de minería confiables para aumentar tus probabilidades de éxito.
La optimización y el mantenimiento de tu operación de minería también juegan un papel vital. Utiliza herramientas de monitoreo para mantener el rendimiento de tus equipos y realiza mantenimiento preventivo para prolongar su vida útil. Mantente actualizado con las últimas tendencias y tecnologías en la minería de Kaspa para maximizar tu rentabilidad.
Te invitamos a seguir explorando más contenido sobre minería de criptomonedas en nuestro blog en iceriveroutlet. Comparte tus experiencias y preguntas en los comentarios para fomentar una comunidad de aprendizaje mutuo. ¡Buena suerte en tu aventura de minería de Kaspa!
-
@ 29216785:2a636a70
2024-06-25 20:33:00- Working out logo proposals with Bitpopart for nostr-php
- Initial documentation pages with phpDocumentor published on phpdoc.nostr-php.dev. Changes can be followed in this pull request draft: https://github.com/nostrver-se/nostr-php/pull/53.
- Initial setup of a Drupal website on nostrver.se
- Initial setup for a website on nostr-php.dev with Vitepress
- Technical research
- Websocket client and server libraries / packages
- Runtime solutions with async and concurrency features
-
@ 8d34bd24:414be32b
2024-06-25 18:39:20I got this from The Biblical Man on Substack. I strongly recommend my fellow Christians check him out (especially male Christians).
The post is here: https://substack.com/home/post/p-145965427
It's time for some hard truth that'll separate the men from the boys, the wheat from the chaff. We're diving deep into the heart of what it means to have real, unshakeable faith in a world that's increasingly hostile to the followers of Christ.
You claim to have faith? You say you trust in the Almighty? Well, persecution is coming to put that to the test. And let me tell you something - if your so-called "faith" crumbles when the heat is on, it wasn't real faith to begin with.
Here's the cold, hard reality:
If persecution causes us to let go of our faith, it was not confidence in God that we possessed, but confidence in our understanding of His will.
Let that sink in for a moment. Meditate on it. Let it challenge you to your core.
Real faith, warrior faith, isn't built on your ability to comprehend God's plan. It's not about having all the answers or understanding why things happen the way they do. No, true faith is built on the unshakeable truth of who God is, regardless of our circumstances.
"Though he slay me, yet will I trust in him" (Job 13:15 KJV)
That's the kind of faith we're called to. The kind that stands firm when everything else is falling apart. The kind that says, "Even if I don't understand, even if it costs me everything, I will trust in the Lord."
So ask yourself these hard questions:
-
Is your faith in God, or in your understanding of His ways?
-
Can you trust Him even when His plan doesn't match your expectations?
-
Are you ready to stand firm when persecution comes?
These aren't hypothetical questions, brothers. The world is changing, and the days of easy, comfortable Christianity are coming to an end. We need to be prepared for the storm that's brewing.
Remember, the Apostle Paul didn't say "I know why all these things are happening to me." He said, "I know whom I have believed, and am persuaded that he is able to keep that which I have committed unto him against that day" (2 Timothy 1:12 KJV).
It's not about having all the answers. It's about knowing the One who does.
Now, let's break this down further:
The Nature of True Faith
True faith isn't blind optimism. It's not positive thinking or wishful dreaming. True faith is a rock-solid confidence in the character and promises of God, even when everything around us seems to contradict those promises.
When persecution comes - and make no mistake, it will come - it will reveal what your faith is really made of. Will it stand firm, or will it crumble like a sandcastle in the tide?
The Danger of False Confidence
Many of us have fallen into the trap of confusing our understanding of God's will with faith in God Himself. We think that because we can explain God's actions or because we believe we know His plan, we have faith.
But what happens when God doesn't act the way we expect? What happens when His plan doesn't align with our understanding? That's when true faith is tested and revealed.
If your faith is based on your ability to understand or explain God's actions, it will fail you when you encounter situations that defy your understanding. And brothers, let me tell you, those situations will come.
The Refining Fire of Persecution
Persecution isn't just a possibility for the Christian; it's a promise. Jesus Himself said, "In the world ye shall have tribulation" (John 16:33 KJV). Peter reminds us, "Beloved, think it not strange concerning the fiery trial which is to try you, as though some strange thing happened unto you" (1 Peter 4:12 KJV).
These trials, these persecutions, they're not just random hardships. They're the refining fire that reveals and strengthens true faith. They're the crucible in which warrior-grade faith is forged.
When persecution comes, it will strip away all pretenses. It will reveal whether your faith is in God or in your understanding of Him. It will show whether you trust in His character or in your ability to explain His actions.
The Call to Unshakeable Faith
So here's your mission, warriors of faith:
-
Examine your faith. Is it built on God's character or your comprehension? Do you trust Him or just your understanding of Him?
-
Prepare for persecution. It's coming, whether you're ready or not. Steel yourself for the battle ahead.
-
Strengthen your resolve. True faith grows stronger under pressure. Let the challenges you face drive you deeper into trust in God.
-
Stand firm. Be the immovable warrior God called you to be. When others falter, you stay strong.
-
Know God, not just about God. Dive deep into His Word. Spend time in His presence. Build your faith on the rock of who He is, not the shifting sands of your understanding.
-
Be ready to say, like Job, "Though he slay me, yet will I trust in him." That's the kind of faith that moves mountains and changes the world.
The world needs men of unshakeable faith. Men who trust God even when they don't understand Him. Men who stand firm when others fall away. Men who can say with Paul, "For I am persuaded, that neither death, nor life, nor angels, nor principalities, nor powers, nor things present, nor things to come, nor height, nor depth, nor any other creature, shall be able to separate us from the love of God, which is in Christ Jesus our Lord" (Romans 8:38-39 KJV).
Will you be that man?
The battle is coming. The test is near. Will your faith stand, or will it crumble?
The choice is yours, warrior. Choose wisely. Choose faith in God, not just in your understanding of Him. Choose to stand firm when persecution comes. Choose to be the unshakeable man of faith that God has called you to be.
Now go. Be strong. Be faithful. Be the man God created you to be. The world is waiting for warriors like you to rise up and show them what true, unshakeable faith looks like.
Amen and amen.
Check out his substack, so I don't feel bad about borrowing his content. https://substack.com/@biblicalman
-
-
@ 000002de:c05780a7
2024-06-25 18:25:25On a recent vacation my wife and I were shopping in some antique and thrift stores. Its one of my favorite things to do with her. I'm always on the look out for interesting items and on this day I was looking through old postcards and pamphlets and I spotted this.
From 1966, a copy of the "Objectivist" newsletter. I took it up to the counter to pay and the owner looked it over and said 50 cents. That was the cover price back in 1966. I'm not interested in selling it but I think that was a bargain.
I'm a fan of Rand. I have a lot of respect for her. She came to the US escaping communism in the USSR as a young woman. She rose to massive popularity in a time when it was rare for women to do so. After I bought the booklet I started thinking about how massive her influence is. Atlas Shrugged has such a broad influence that you see references to it and characters in the book in the names of many businesses. The woman had guts. If you have never heard her speak I recommend looking up some of her interviews with Donoghue ( a popular talk show host of the time). She angered many with her philosophy. She was counter to the culture of the time in many ways.
And yet, she is rarely mentioned when I see articles or stories about influential women. I would argue that she is a very influential woman. Not just for women but for men as well. While I have plenty of disagreements with her philosophy I think it is very telling how she is rarely mentioned in a positive light. Objectively she is an important person in US history and even more so in women's history. She was a strong self made woman that didn't use her appearance for sex appeal to get her status. One would think she should be a feminist heroine. But she isn't. Its a crime in my opinion.
Have you ever found any liberty movement items in thrift stores? This is my first.
-
@ 005bc4de:ef11e1a2
2024-06-25 18:15:37Nostr has events. Anything done on Nostr is an "event." Nostr has kinds. A "kind 1" is a text message, like below.
Source: https://nostr.com/the-protocol/events
Now, there's a new kind on the block. There is a kind 30040 (as well as an accompanying 30041).
Note: kind 30040 is an "NKBIP" and not a "NIP," which is why it's not listed as an event kind on the NIPS GitHub.
Finding kind 30040
I first read about about a kind 30040 in this note by npub1m4ny6hjqzepn4rxknuq94c2gpqzr29ufkkw7ttcxyak7v43n6vvsajc2jl and I immediately thought, "This is fantastic." Three reasons made me think this:
- Her goal, as I understand, is to get public domain (Projet Gutenberg) books onto Nostr. As a reader, I see this as a good thing.
- First up is to first get the Bible onto Nostr in an organized, "clickable" manner. As a Christian, I see this as a good thing.
- The kind 30040 reminded me of bitcoin recursive ordinals and BitVM. This is great. What can we possibly mash up on Nostr with a kind 30040 or 30041?
Toying with kind 30040
Curious yesterday, I began to futz around. The habla.news note referenced a wikifreedia post. Nostr user npub1m3xdppkd0njmrqe2ma8a6ys39zvgp5k8u22mev8xsnqp4nh80srqhqa5sf and npub149p5act9a5qm9p47elp8w8h3wpwn2d7s2xecw2ygnrxqp4wgsklq9g722q were on this. I referenced Liminal's guide and Niel's fork. After creating a Nostr profile (Turc Testerman) to mess around and use as a testing platform, below is what I achieved:
At first glance, the image above is unimpressive. It's only two words. But, there may be more going on than is initially evident. The animated gif below reveals a bit more:
See it on highlighter.com
In the gif above, we are looking at a kind 30040 showing two other independent notes. Hovering over those two notes in Highligher reveals them as unique, as does the URL bar when they're clicked.
So, what's going on here is that those two notes, "Hello" and "world!" are just hanging out somewhere on Nostr relays. Then, the third event, the kind 30040 aggregated them together.
The kind 30040 can be viewed in raw form on njump.me (image below). That's great, though not particularly viewer-friendly or useful to a human. Finally, thanks to Highlighter, a useful, more visually appealing, and interactive UX is achieved. (See it on highlighter.com and read note by npub1l2vyh47mk2p0qlsku7hg0vn29faehy9hy34ygaclpn66ukqp3afqutajft today debuting this ability.)
The kind 30040 viewed on njump.me The first yellow "e" is "Hello" and the second yellow "e" is "world!"
Pushing a bit farther...an example how-to
Why not do more? Let's do this: I'll now try to replicate what I did yesterday, I'll try to make a new kind 30040 that adds a smidge more, and document what I do as a how-to tutorial in case anyone else wants to try.
This is how we push ahead open source style, right?
Step 1 - grab the basic code for a kind 30040
{ "id": "972ffe9168c37241491735e3edb802b1877a56c29cb475dfeb5aba41807b5088", "pubkey": "5f078e90cef786fa0ac775218290c514e33313e0793507ed15375cc5b2bacaa3", "created_at": 1719227601, "kind": 30040, "tags": [ [ "e", "19d8949206cdc775b94e82de6d77b75c1485e0aa3ee671c058415120a16adf46", "wss://nos.lol" ], [ "e", "6428c8ac9a992a6b6e5789fc398e221ab1457b39839b174047a3cbfef4ca9214", "wss://nos.lol" ] ], "content": "Testing a kind 30040 event on nostr" }
Note: This is a bit different from the code in the NKBIP. I had trouble with the "content" portion of it. The format in the NKBIP threw errors, something about the backticks. Hence, my "Testing a kind..." appeared in njump, but is not picked up by highlighter and shows "untitled." That's something for me to learn.
Step 2 - go to https://nostrudel.ninja
Nostrudel, to me, has a ton of usages beyond just reading notes. One is the "Event Publisher" function. Go to Nostrudel, then "More," then "Event Publisher." There is some pre-populated data. You want to put the kind 30040 basic code in there instead. However, you do want to keep but alter the "created_at" timestamp. Take note of the number in the "created_at" line, then delete everything, paste in the kind 30040 basic code, then go back to "created_at" and put in your updated timestamp number. If you use the old timestamp, then I think it will work, but your kind 30040 will be timestamped incorrectly. Use the up-to-date and correct timestamp.
If you get to the green "Yolo" button, things are good. If your json is incorrectly formatted, it'll throw errors and you'll need to fix those. (This is where the backticks in the "title" halted me.) Pressing Yolo will create a new Nostr event. It will be visible on njump.me as raw code and on highlighter in a pretty fashion.
Step 3 - create your own kind 30040 with unique Event IDs
Using the "basic code" above will replicate my "Hello world!" because it uses the two "e" events I published yesterday. If you wish to create your own kind 30040, you need to gather your own preferred notes to aggregate.
For this example, I'll use a few notes I published yesterday from the npub1turcayxw77r05zk8w5sc9yx9zn3nxylq0y6s0mg4xawvtv46e23srqqnv7 profile. I'll keep the "Hello" and "world!" notes, but add a three more. What I need is the "event ID" for each note I wish to include. Below I'll illustrate how to get that ID on nostrudel.ninja. Notice there are three "IDs," for this, we want the first one simply called "Event ID."
For my new kind 30040 example, I'll list all five Event IDs here in the order I want them to appear:
- 19d8949206cdc775b94e82de6d77b75c1485e0aa3ee671c058415120a16adf46
- 6428c8ac9a992a6b6e5789fc398e221ab1457b39839b174047a3cbfef4ca9214
- 9418ba17d1a918ded94cc65112daf41cee8e90daa8afd32623edb0d5846450c5
- b6f03e814fbaea810c997bb59bdb0918105f74ebaecc98d0a5d7d74aad23d1f5
- f9a6c3b9a1309ec9ded615d4463e2b49e914d15e74d09441ffa7343460baef4f
Step 4 - build your json
Next, for each Event ID you wish to include, create a new "e" in the json code. You can change the relay if you wish (and maybe even leave it blank?).
[ "e", "this_is_where_you_paste_in_your_new_event_id", "wss://nos.lol" ],
You will have to be careful with your commas. Each square bracket [ ] is separated by a comma and there is not one at the end. Otherwise, your json will throw an error. (I had several yesterday!) You can use something like https://jsoneditoronline.org/ to work and see errors as you go.
Below illustrates pasting in the basic kind 30040 code, adding one additional "e" event, then adding the Event ID for that event. Notice the red json errors that emerged and needed to be corrected until it was "all green" and good to go.
I did this twice more to get my five desired notes included. The final json code I wanted for my new kind 30040 (code below).
{ "id": "972ffe9168c37241491735e3edb802b1877a56c29cb475dfeb5aba41807b5088", "pubkey": "5f078e90cef786fa0ac775218290c514e33313e0793507ed15375cc5b2bacaa3", "created_at": 1719227601, "kind": 30040, "tags": [ [ "e", "19d8949206cdc775b94e82de6d77b75c1485e0aa3ee671c058415120a16adf46", "wss://nos.lol" ], [ "e", "6428c8ac9a992a6b6e5789fc398e221ab1457b39839b174047a3cbfef4ca9214", "wss://nos.lol" ], [ "e", "9418ba17d1a918ded94cc65112daf41cee8e90daa8afd32623edb0d5846450c5", "wss://nos.lol" ], [ "e", "b6f03e814fbaea810c997bb59bdb0918105f74ebaecc98d0a5d7d74aad23d1f5", "wss://nos.lol" ], [ "e", "f9a6c3b9a1309ec9ded615d4463e2b49e914d15e74d09441ffa7343460baef4f", "wss://nos.lol" ] ], "content": "Testing a kind 30040 event on nostr" }
Step 5 - create your kind 30040
Back on Nostrudel.ninja-->More-->Event Publishing, I pasted in my new kind 30040 json code, changed the timestamp number, and pushed Yolo, as below:
Then I grabbed the event ID (go to "Custom Event on Nostrudel, then the code symbols <>, then IDs). Go to https://njump.me/about, paste in the ID, and "View." And there is my new kind 30040 on njump, screencapture below:
And, finally, here it is in a prettier fashion on highlighter with five different notes aggregated:
See it on highlighter.
Conclusion
This kind 30040 does seem like a great fit for things like books. It can assemble individual notes scattered across Nostr in a hierarchical manner, present them in a usable interface, then deliver them. I imagine a stack of index cards. Each card is a note and on it is some information. They're strewn everywhere out there in the Nostrverse. A kind 30040 can gather the ones it wishes, order those cards however it wishes, then present a new "Table of Contents" for a reader.
With books, each note might be a chapter, or a paragraph, or in the case of the Bible, it might even be each verse.
I don't think a kind 30040 would work as I initially was thinking like a bitcoin Ordinal. For that to work, things would need to be concatenated...merged together, not listed on a page. My kind 30040 would have to read "Hello world!" instead of "Hello" and then "world!" as independent, although in order, notes.
Still, this kind 30040 business is neat. Books seem like a natural use case. People are very clever though. We'll come up with more things to use this ability, grow it, morph it, fork it, launch from it.
What can we build out on it from here?
As an epilogue, regarding Ordinals...
I know ordinals can be a divisive topic around bitcoin. (Even that word concatenated might have raised hackles with bitcoin's current OP_CAT debate.) People get impassioned over silly frog jpg Ordinals clogging block space and ramping up fees (both true, but then, freedom and free market). However, I think there is great potential. Recursive ordinals aggregate data already the Bitcoin blockchain. If A, B, and C are already on chain separately, recursive ordinal D can simply stick them together into one as ABC. As I see it, this is what a Nostr kind 30040 does.
I made this recursive ordinal with all of Satoshi's written words. It looks unimpressive, but everything, the content of Satoshi's words and even the orange "website" code is stored on the Bitcoin blockchain, not some server somewhere that can be shut down. Satoshi's words will persist as long as Bitcoin persists. Details on this project are here.
-
@ 8c7d452f:320588d8
2024-06-25 18:02:03graphics made by bitcoiner guide
-
@ 0d2a0f56:ef40df51
2024-06-25 17:16:44Dear Bitcoin Blok Family,
In my last post, I shared how Bitcoin became my personal antidote, rescuing me from destructive behaviors and opening up a world of knowledge. Today, I want to explore how Bitcoin is becoming an antidote for my entire family, solving problems I didn't even know we had.
As I've delved deeper into the Bitcoin rabbit hole, I've realized that I was searching for something beyond personal growth – I was looking for a solution to give my family an identity. When you look at successful families of the past or thriving organizations, you'll notice they're known for something specific. Some families are known for real estate, others for owning businesses, and some for establishing various institutions. This identity ties a family together, giving them a shared purpose and legacy.
For my family, I want that identity to be rooted in Bitcoin. Why? Because Bitcoin brings a focus I haven't seen in anything else. It neutralizes much of what I consider toxic behavior in modern society.
Take TikTok, for example. While there's nothing inherently wrong with the platform, it often promotes content that I find concerning – gender wars, gossip, and sometimes even false information. This issue extends to most social media platforms. Our kids are learning to dance, but they're not learning about money. They're absorbing various behaviors, but they don't understand inflation. We're turning to social media for education and information, which isn't necessarily bad, but it requires careful vetting of sources and filtering out the noise.
What's truly dangerous is how these platforms steal our attention subconsciously. We're wasting time, putting our attention in unproductive places without even realizing it. This is a toxic part of our culture today, and I believe Bitcoin can help solve this problem.
It's challenging to teach kids about money in today's fiat standard. How do you explain the concepts of time and energy when the measuring stick itself is constantly changing? But with Bitcoin, these lessons become tangible.
Moreover, Bitcoin opens up possibilities that seemed out of reach before, particularly in the realm of family banking. In the past, wealthy families in the United States understood the risks of keeping their family's worth in another person's hands or in external institutions. They recognized that protecting wealth comes with certain risks, and establishing a family protocol was crucial.
With Bitcoin, family banking becomes not just possible, but easily achievable and more secure than ever before. Through multi-signature wallet arrangements, we can create a true family bank where each family member holds a key to the family wallet. No funds can be moved without the permission of other family members. This technology eliminates what has been a major stumbling block in the past: trust issues. Now, we can have transparency, trust, and access for all family members.
Imagine a family account where parents and children alike have visibility into the family's finances, but movements of funds require agreement. This not only teaches financial responsibility but also fosters open communication about money within the family. It's a powerful tool for financial education and family cohesion.
This is something we should definitely take advantage of. It's not just about storing wealth; it's about creating a financial system that aligns with our family values and goals. Bitcoin provides the infrastructure for this new form of family banking, one that combines the best aspects of traditional family wealth management with the security and transparency of modern technology.
When it comes to teaching about compound interest and value, Bitcoin provides the perfect use case. Over its lifetime, Bitcoin has been averaging an astonishing 156% year-over-year return. While this number is significant, it's important to note that past performance doesn't guarantee future results. However, even with more conservative estimates, the power of compound interest becomes clear. I challenge you to use a compound interest calculator with a more modest 30% annual return. The results are still astronomical. Imagine teaching your children about saving and investing with potential returns like these. It's a powerful lesson in the value of long-term thinking and delayed gratification.
What I'm getting at is this: there are many forces in our society that hinder positive behavior and promote negative, toxic culture. These forces are stealing our children's time, attention, energy, and of course, money. Bitcoin is the antidote that can start correcting and curing some of that behavior, while also providing tangible lessons in finance and economics, and even reshaping how we approach family wealth management.
By making Bitcoin a central part of our family identity, we:
- Provide a shared purpose and legacy
- Encourage financial literacy from a young age
- Teach valuable lessons about time, energy, and value
- Promote long-term thinking and delayed gratification
- Offer an alternative to the instant gratification of social media
Bitcoin isn't just an investment or a technology – it's a paradigm shift that can reshape how we think about family, legacy, and education. It's an antidote to the toxic aspects of our digital age, offering a path to a more thoughtful, intentional way of living.
As we continue this journey, I invite you to consider: How could Bitcoin reshape your family's identity? What toxic behaviors could it help neutralize in your life? Until next time check out the below video on what some may know as the "Waterfall or "Rockefeller Method". https://youtu.be/MTpAY1LKfek?si=s7gA4bt_ZoRGAlAU
Stay sovereign, stay focused,
Joe Thomas Founder, The Bitcoin Blok
-
@ 6c8c7979:15595f3e
2024-06-25 16:03:41Edward Hopper: A Comprehensive Exploration of an American Icon
Introduction
Edward Hopper (1882-1967) remains an enduring figure in American art, celebrated for his evocative portrayals of urban and rural landscapes that capture the solitude and alienation of modern life. His distinctive style, characterized by precise compositions, stark contrasts of light and shadow, and an atmosphere of contemplative silence, continues to resonate with viewers across generations. This comprehensive article delves into the life, artistic development, major works, themes, and lasting influence of Edward Hopper, offering a nuanced understanding of his contributions to American and global art.
- Early Life and Formative Years
Edward Hopper was born on July 22, 1882, in Nyack, New York. His upbringing in a middle-class family provided early exposure to the landscapes and architecture that would later feature prominently in his paintings. Hopper's interest in art emerged early, and he began formal training at the New York School of Art and Design under the guidance of prominent teachers such as William Merritt Chase and Robert Henri. These formative years shaped his artistic sensibilities and laid the foundation for his unique approach to depicting American life.
- Artistic Style and Techniques
Hopper's artistic style is characterized by several distinctive elements that set him apart from his contemporaries. His compositions are meticulously planned, often featuring geometric shapes and strong lines that create a sense of order and balance within the frame. He was a master of capturing light and shadow, using chiaroscuro to heighten drama and emphasize mood. Hopper's use of color is also notable; he often employed a muted palette that emphasized the melancholic and introspective aspects of his subjects.
- Themes in Hopper's Work
A central theme in Hopper's art is the exploration of solitude and isolation in modern society. His paintings frequently depict solitary figures in urban settings, often gazing out of windows or engaged in quiet contemplation. Hopper's portrayal of empty spaces – diners, hotels, and urban streets devoid of human presence – underscores a sense of loneliness and alienation that resonates deeply with viewers. Additionally, his interest in architecture as a reflection of human experience is evident in his meticulous renderings of buildings and interiors, which serve as metaphors for psychological states.
-
Major Works and Their Interpretations
-
"Nighthawks" (1942): This iconic painting depicts a late-night diner scene illuminated by harsh artificial light. The solitary figures seated inside the diner and the empty street outside evoke a sense of urban anonymity and existential unease.
-
"Early Sunday Morning" (1930): A quiet portrayal of a row of storefronts bathed in morning light, devoid of human activity. The stillness of the scene invites contemplation of the passage of time and the transient nature of urban life.
-
"House by the Railroad" (1925): This painting exemplifies Hopper's fascination with architecture as a reflection of inner life. The isolated house, set against a desolate landscape, conveys a sense of isolation and melancholy.
-
Hopper's Influence and Legacy
Edward Hopper's impact on American and global art cannot be overstated. His exploration of themes such as solitude, alienation, and the psychological undercurrents of modern life resonated with subsequent generations of artists and continues to inspire contemporary practitioners. Hopper's precise visual language and ability to evoke complex emotions through seemingly simple scenes have influenced numerous movements and artists, from photorealism to pop art and beyond.
Conclusion
Edward Hopper's enduring relevance lies in his ability to capture the essence of modern American life with clarity and emotional depth. Through his meticulous compositions and evocative use of light and shadow, Hopper created a visual language that continues to provoke introspection and contemplation. This article has explored the multifaceted aspects of Hopper's life and work, offering a comprehensive overview of his contributions to the art world and his enduring legacy as one of America's most iconic painters.
artstr #art
-
@ e968e50b:db2a803a
2024-06-25 15:30:55Some of you may remember the problem I had with a shitcoiner at our meetup back in April. Last night, we had an outright, outspoken, and worst of all, savagely interupty, anti-privacy advocate appear in our midst. I'm using the sorcery language because I didn't pick up on any prior warning signs before he transformed right in the middle of my presentation.
The agenda, following up on last month's reading on of A Cypherpunk's Manifesto and a healthy but sad conversation about the Samurai takedown, was to discuss permissionlessness and privacy. Then we would go into how PWA apps and Fedimints help out with this.
Everything seemed to be going well until I pulled out my favorite PWA to demo and this guy just jumped in to let us know that the government was going to throw the app devs in jail. At first it was just annoying, because I had just given a big spiel about how that was exactly why we wanted to use this technology. But he WOULDN'T STOP TALKING. Do other meetup organizers experience these things? Exasperated, I finally clicked my fingers and said his name real loud, as if calling an animal and @dagny761 gave me a look like, "you need to mellow out and act like a grown-up." I basically gave up on the demo at that point and am sad to say that the presentation unraveled.
The incident a couple of months back was hard, but I was at least able to maintain order and I think everyone walked away more knowledgable and still respecting one-another. I wanted to share to get people's thoughts. I don't think this guy was a shitcoiner, but he certainly was a statist...and also a huge jerk. The common thread was, I think both of these fellas just wanted to talk about NGU. Afterwards, I found out that last night's guy is a tech guy for the department of defense. He was giddy to tell me about all of the new tech he was developing that he said is already being used overseas. I'm embarrassed to say that I was too tired too beat down at that point to debate the merits or demerits of developing weapons for a government that he admitted was a black box to the public on what they were doing with this stuff.
Anyway, I share here to ask, is this common? This meetup is coming up on a one year anniversary and we've already had two frustrating nights like this...AND last night I definitely lost the debate. Worst of all, it's not because my points weren't more well received, but because some of them were literally not heard over statist howling. Also, does this guy sound familiar? He apparently goes to bitcoin meetups all the time in Michigan (multiple cities! he mentioned Detroit, Lansing, and Grand Rapids). Are Michigan meetups just NGU discussions or do you guys up there just smack this dude down better than I do?
-
@ 000002de:c05780a7
2024-06-25 15:28:01Lately it seems like I keep noticing people that are sympathetic to anarchism and libertarian ideas completely misunderstanding governance. It really seems like this might be one of the biggest mental blocks people have. I wonder if it is mostly the fault of libertarians and anarchists.
Those in the liberty movement (broadly) rant and demonize the government. This is completely justified. I've done it for years. I've noticed that more experienced communicators will tend to say "The State" instead of government. Years ago I heard someone explain how to think about three terms often used incorrectly.
- The country is the land
- The nation is the people
- The state is the government
I don't recall learning this in school. It is possible it was in a textbook but I doubt it. The country part I think most people do get. Nation less so. The best example of a nation without a country are Native Americans. Tribes are nations without a country (their historical lands). Tribes have their own governments and a certain amount of sovereignty in the lands they are allowed to inhabit.
The state is the word that I have found most people are confused about. People used to tell me, you hate the government so much. Why don't you leave. Well, I don't hate the nation(people) or the country(land). It is the governance system I hate. I don't even hate the people that are working in it.
Its funny to me that people on the red or blue team seem to hate the government when their side isn't in power but if someone points to issues in the system itself, well that's just crazy.
So what about those people that are sympathetic to libertarian values? Many of them say things like this. Well, I agree with you on taxes and the corruption of the government. But you always need a government. My usual response is yes. You do need governance. But you don't need a state or government. My home is governed by my wife and I. Businesses have their own governance models. Bitcoin does as well. But we do not need a single entity with a monopoly on violence.
So why is there so much confusion on this topic? I think there are two reasons.
The first is ignorance. The state of the world is largely invisible to most people. We are purposely kept ignorant of how our world works. The State isn't really discussed as a separate entity from the country and nation.
The second reason for the confusion is how libertarians and anarchists communicate. There are some that just foolishly believe people do not need governance. Honestly in my experience they are either just young or do not think deeply enough. They haven't steel manned their arguments yet. In my experience this is a small percentage of people though.
I think people in the liberty movement just need to do a better job communicating ideas. Instead of saying we need to get rid of the government one might say we need to get rid of the state. Another way to lead into this is to speak about the empire vs. the government. Talk about the monopoly which the state holds. How competition leads to better outcomes vs. monopoly.
What do you think? Have you noticed this hurdle as well? I think many people hear good ideas and agree but assume we are just dummies that believe in a fairy tale.
If private or decentralized governance is interesting to you, you might enjoy reading Chaos Theory by Bob Murphy. Its short and answer many common objections to private governance.
-
@ 5d4b6c8d:8a1c1ee3
2024-06-25 13:03:24@k00b with the first three-peat (top stacker on each of the past 3 June 25th's).
Will he make it a four-peat today or does the streak end here?
Read the previous edition here.
June 25th, 2023 📅
📝
TOP POST
Don't feel bad about being too late to Bitcoin.
Excerpt:
So don't feel bad that you missed out about Bitcoin in 2017, or 2021. It doesn't matter what Bitcoin was worth then or now in fiat terms. It matters that we keep learning about Bitcoin and sharing it with others. Then one day we can all have economic freedom and savings.
3610 sats \ 37 comments \ @graben \ ~bitcoin
💬
TOP COMMENT
https://stacker.news/items/198729/r/Undisciplined?commentId=198755
IMO there is no "too late". If you buy now then yes your purchasing power will probably increase dramatically over the years, but even if adoption saturates Bitcoin is still a worthwhile asset to buy / earn due to all of its other wonderful properties.
From Don't feel bad about being too late to Bitcoin.
826 sats \ 1 reply \ @orthwyrm
🏆
TOP STACKER
@k00b
8333 stacked \ 14.9k spent \ 2 posts \ 24 comments \ 0 referrals
https://imgprxy.stacker.news/fsFoWlgwKYsk5mxx2ijgqU8fg04I_2zA_D28t_grR74/rs:fit:960:540/aHR0cHM6Ly9tLnN0YWNrZXIubmV3cy8yMzc5Ng
June 25th, 2022 📅
📝
TOP POST
Excerpt:
312 sats \ 4 comments \ @P2P_bitcoin \ ~bitcoin
💬
TOP COMMENT
https://stacker.news/items/38569/r/Undisciplined?commentId=38570
Excerpt:
yes and we don't tell each other our user names so we can try and guess who is who lol! (Still don't know)
From Do you share Stacker News with family or friends?
401 sats \ 1 reply \ @plebpegasus
🏆
TOP STACKER
@k00b
1981 stacked \ 8503 spent \ 9 posts \ 15 comments \ 0 referrals
https://imgprxy.stacker.news/fsFoWlgwKYsk5mxx2ijgqU8fg04I_2zA_D28t_grR74/rs:fit:960:540/aHR0cHM6Ly9tLnN0YWNrZXIubmV3cy8yMzc5Ng
June 25th, 2021 📅
📝
TOP POST
Fighting Monetary Colonization with Open Source Code
link to https://bitcoinmagazine.com/culture/bitcoin-a-currency-of-decolonization
228 sats \ 2 comments \ @k00b \ ~bitcoin
💬
TOP COMMENT
https://stacker.news/items/94/r/Undisciplined?commentId=95
dont sleep on this!
From Why El Salvador Made Bitcoin Legal Tender with President Nayib Bukele
1 sat \ 0 replies \ @sha256
🏆
TOP STACKER
@k00b
2 stacked \ 7 spent \ 2 posts \ 1 comment \ 0 referrals
-
-
@ e4f57f4e:e6edd86e
2024-06-25 12:45:43When it comes to mental health, finding the right support is crucial. Whether you’re dealing with anxiety, depression, or any other mental health issue, having a trusted psychiatrist can make a significant difference in your life. If you’re searching for a psychiatrist in Pembroke Pines, Florida, or a psychiatrist in Port St Lucie Florida, Xpress Psychiatry is here to help. Our experienced team is dedicated to providing compassionate and effective care to meet your mental health needs.
Why Choose Xpress Psychiatry?
At Xpress Psychiatry, we understand the importance of personalized care. Our team of psychiatrists is committed to offering individualized treatment plans tailored to your specific needs. We prioritize your mental well-being and work collaboratively to develop strategies that promote long-term health and stability.
Comprehensive Services in Pembroke Pines, Florida
Expert Care for Anxiety and Depression
Anxiety and depression are two of the most common mental health conditions that people face today. If you’re looking for a psychiatrist in Pembroke Pines Florida, who specializes in treating these conditions, Xpress Psychiatry has you covered. Our psychiatrists are skilled in diagnosing and managing anxiety and depression, offering both medication management and therapeutic interventions to help you find relief.
Child and Adolescent Psychiatry
Mental health issues can affect individuals of all ages, including children and adolescents. Our psychiatrists in Pembroke Pines, Florida, are trained to work with younger patients, providing compassionate care that addresses their unique needs. We offer a range of services, including ADHD evaluations, behavioral therapy, and family counseling, to support the mental health of your entire family.
Telepsychiatry Services
We understand that life can be hectic, and finding time for appointments can be challenging. That’s why Xpress Psychiatry offers telepsychiatry services to patients in Pembroke Pines, Florida. With our telepsychiatry options, you can receive the same high-quality care from the comfort of your home. This convenient service ensures that you have access to the support you need, no matter where you are.
Specialized Care in Port St. Lucie, Florida
Holistic Approach to Mental Health
At Xpress Psychiatry, we believe in treating the whole person, not just the symptoms. If you’re searching for a psychiatrist in Port St. Lucie, Florida, who takes a holistic approach to mental health, our team is here for you. We combine evidence-based medical treatments with therapeutic techniques to address the root causes of your mental health issues. This comprehensive approach ensures that you receive the most effective and well-rounded care possible.
Treatment for Substance Use Disorders
Substance use disorders can have a profound impact on mental health. Our psychiatrists in Port St. Lucie, Florida, are experienced in treating these disorders and can provide the support you need to achieve and maintain sobriety. We offer a range of services, including detoxification, medication-assisted treatment, and counseling, to help you on your journey to recovery.
Geriatric Psychiatry
Mental health concerns don’t diminish with age. In fact, older adults often face unique challenges that require specialized care. Our geriatric psychiatrists in Port St. Lucie, Florida, are dedicated to addressing the mental health needs of older adults. Whether it’s managing depression, anxiety, or cognitive disorders, we provide compassionate care that enhances the quality of life for our senior patients.
The Xpress Psychiatry Difference
Experienced and Compassionate Team
Our team of psychiatrists at Xpress Psychiatry is highly experienced and deeply compassionate. We understand that seeking help for mental health issues can be daunting, and we strive to create a welcoming and supportive environment for all our patients. Your comfort and trust are our top priorities, and we work diligently to build strong, therapeutic relationships with each person we treat.
Convenient Locations and Flexible Scheduling
With locations in both Pembroke Pines and Port St. Lucie, Florida, Xpress Psychiatry makes it easy to access the mental health care you need. We offer flexible scheduling options, including evening and weekend appointments, to accommodate your busy lifestyle. Our goal is to ensure that you have convenient and timely access to our services, so you never have to go without the support you need.
Commitment to Quality Care
At Xpress Psychiatry, we are committed to providing the highest quality care to our patients. We stay up-to-date with the latest advancements in psychiatry and continually seek to improve our services. Your mental health is our priority, and we are dedicated to helping you achieve lasting well-being.
Conclusion
Finding the right psychiatrist can make all the difference in your mental health journey. Whether you’re in Pembroke Pines, Florida, or Port St. Lucie, Florida, Xpress Psychiatry is here to provide the compassionate and effective care you need. Our team of experienced psychiatrists is dedicated to helping you achieve mental wellness and live a fulfilling life. Don’t wait any longer to take control of your mental health — contact Xpress Psychiatry today and start your journey to well-being.
-
@ a5d8475e:df9ff32c
2024-06-25 11:21:35Searching for a house to rent can be a daunting task, especially when you're unfamiliar with the local market or navigating through various options. Whether you're looking for property to rent in Wolverhampton, houses to rent in Codsall, or exploring rental opportunities in Wombourne, enlisting the expertise of a top local agent can significantly simplify your search and enhance your renting experience.
Finding Your Ideal Rental Property When searching for property to rent in Wolverhampton, houses to rent Codsall, or property in Wombourne, consider these steps:
Define Your Requirements: Outline your must-have features such as number of bedrooms, parking facilities, and proximity to amenities like schools or shopping centers.
Set a Realistic Budget: Factor in not just the rent but also additional costs like utilities and council tax. A local agent can advise on typical costs associated with different areas.
View Properties: Arrange viewings for properties that match your criteria. A local agent can accompany you, pointing out both the strengths and potential drawbacks of each property.
Negotiate and Secure: Once you find a suitable property to rent in Wombourne, your agent can negotiate lease terms on your behalf and guide you through the signing process.
Why Choose a Local Agent? Local agents possess invaluable knowledge of the area, offering insights that online listings may not capture. They understand the nuances of each neighborhood, from the amenities available to the local schools and community vibes. This local expertise enables them to match your preferences closely with suitable rental properties, saving you time and effort.
Benefits of Using a Top Local Agent: Access to Exclusive Listings: Local agents often have access to a range of properties that may not be advertised widely. This gives you an advantage in finding hidden gems or properties that meet specific criteria like pet-friendly accommodations or proximity to public transport.
Personalized Guidance: Renting a property involves various steps, from property viewings to negotiations and lease agreements. A top local agent provides personalized guidance throughout the process, ensuring you understand your rights as a tenant and helping you navigate any complexities that may arise.
Market Knowledge: Rental markets can vary significantly even within the same city. Local agents keep abreast of market trends, rental rates, and upcoming developments, providing you with informed advice to make confident decisions.
Conclusion In summary, when searching for houses to rent in Codsall, property to rent in Wolverhampton, or exploring rental options in Wombourne, partnering with a top local agent can streamline the process and increase your chances of finding your ideal home.
CONTACT Halle UK: ** 2-3 Walsall Rd, Willenhall, WV13 2EH info@halleuk.com +44 (0) 1902 504455
-
@ a012dc82:6458a70d
2024-06-25 10:57:30Table Of Content
-
Content
-
Conclusion
-
FAQ
-
You May Also Like
-
External Links
Introduction
Max Keiser, an American broadcaster and businessman, is a well-known figure in the Bitcoin and crypto community. He has been a vocal advocate of Bitcoin since its early days and has played a significant role in promoting the cryptocurrency and its underlying technology. In this blog post, we will take a closer look at the rise of Max Keiser and his impact on the crypto industry.
Understanding Max Keiser
Max Keiser is an American broadcaster and businessman who has been a vocal advocate of Bitcoin since its early days. He is the host of the Keiser Report, a financial news program that covers a wide range of topics, including Bitcoin and other cryptocurrencies. He is also the founder of Heisenberg Capital, a London-based investment firm that focuses on the crypto and blockchain space.
The Rise of Max Keiser and Bitcoin
Max Keiser first became interested in Bitcoin in 2011 and quickly recognized its potential as a revolutionary new form of money. He began promoting Bitcoin on his financial news program, the Keiser Report, and became one of its earliest and most vocal advocates. He has been a regular guest on various news programs and has been featured in several documentaries about the cryptocurrency.
Max Keiser's Impact on the Crypto Industry
Max Keiser's impact on the crypto industry has been significant. His early adoption and promotion of Bitcoin helped bring attention to the cryptocurrency and its underlying technology. He has also been an advocate for other digital currencies and blockchain-based projects, helping to promote the industry as a whole. His investment firm, Heisenberg Capital, has invested in several crypto and blockchain-based projects and has helped to support the growth of the industry.
Conclusion
In conclusion, Max Keiser is a visionary in the crypto industry. His early adoption and promotion of Bitcoin helped bring attention to the cryptocurrency and its underlying technology. His impact on the industry as a whole has been significant and his investment firm, Heisenberg Capital, has played a role in supporting the growth of the industry. His work and influence has been crucial to the development and growth of the crypto ecosystem.
Frequently Asked Questions
Who is Max Keiser? Max Keiser is an American broadcaster, businessman and Bitcoin advocate who is the host of the Keiser Report, a financial news program that covers a wide range of topics, including Bitcoin and other cryptocurrencies.
What is the Keiser Report? The Keiser Report is a financial news program hosted by Max Keiser that covers a wide range of topics, including Bitcoin and other cryptocurrencies.
What is Heisenberg Capital? Heisenberg Capital is a London-based investment firm founded by Max Keiser that focuses on the crypto and blockchain space.
What is the impact of Max Keiser on the crypto industry? Max Keiser has played a significant role in promoting Bitcoin and other digital currencies and blockchain-based projects, helping to promote the industry as a whole. His early adoption and promotion of Bitcoin helped bring attention to the cryptocurrency and its underlying technology. His investment firm, Heisenberg Capital, has invested in several crypto and blockchain-based projects and has helped to support the growth of the industry. He has been a vocal advocate for the crypto industry and his influence has been crucial to the development and growth of the crypto ecosystem.
Why is Max Keiser considered a visionary in the crypto industry? Max Keiser is considered a visionary in the crypto industry because he was an early adopter and vocal advocate of Bitcoin and its underlying technology. He recognized the potential of Bitcoin as a revolutionary form of money and has been promoting it since its early days. He has also been an advocate for other digital currencies and blockchain-based projects, helping to promote the industry as a whole. His work and influence has been crucial to the development and growth of the crypto ecosystem.
What is Max Keiser's opinion on the future of Bitcoin? Max Keiser is bullish on the future of Bitcoin and has stated that he believes it will reach a price of $100,000 in the future. He sees Bitcoin as a revolutionary new form of money that will eventually replace fiat currency as the global reserve currency.
That's all for today
If you want more, be sure to follow us on:
NOSTR: croxroad@getalby.com
Instagram: @croxroadnews.co
Youtube: @croxroadnews
Store: https://croxroad.store
Subscribe to CROX ROAD Bitcoin Only Daily Newsletter
https://www.croxroad.co/subscribe
DISCLAIMER: None of this is financial advice. This newsletter is strictly educational and is not investment advice or a solicitation to buy or sell any assets or to make any financial decisions. Please be careful and do your own research.
-
-
@ dd664d5e:5633d319
2024-06-25 09:28:03Should show up here as content
nostr:note1m9jdd9w9qxwa8gfda6n3sku7nf6mjnxylhaaa8wpnvdz85xajrasrrpj2a
-
@ 06a260a2:d7a7791c
2024-06-25 06:25:00Jako SPAM v bitcoinovém blockchainu lze označit veškerá data navíc, která nesouvisí s finanční podstatou potvrzených transakcí. Nebo lépe řečeno s podstatou peer-to-peer systému elektronických peněz. Odkaz na bitcoinový whitepaper je důležitý, protože upozorňuje na skutečnost, že bitcoin a jeho blockchain byl vytvořen s konkrétním záměrem a je tedy možné posuzovat, zda daný způsob jeho využití je s tímto záměrem v souladu nebo ne. Nejčastěji jsou těmi daty navíc obrázky, videa, texty, ale může to být cokoliv, co lze datově reprezentovat.
Blockchainový SPAM vyvolává emoce, protože ne každý bitcoiner s jeho definicí výše souhlasí. Názor, že svobodný software umožňuje jeho uživatelům používat jej jakkoliv je to možné a co lze, je dovoleno, není zdaleka ojedinělý. Často je doprovázen ještě vírou v trh, který všechno spraví a čas ukáže. Já se kloním k názoru, že kdyby Satoshi chtěl na blockchain ukládat obrázky, ve svém whitepaperu by to zmínil.
Inscriptions a Ordinals protokol
Trocha historie
Zapisování netransakčních dat do bitcoinového blockchainu není novinkou a Inscriptions nejsou ani jediným, ani prvním způsobem, jak toho dosáhnout. Tím úplně prvním byla coinbase transakce v genesis bloku, do které Satoshi vepsal památný titulek z The Times: “The Times 03/Jan/2009 Chancellor on brink of second bailout for banks”. Každá coinbase transakce může obsahovat až 100 bytů libovolných dat a je na uvážení těžaře, který blok vytěžil, jak je využije.
Využití a zneužití skriptů
Jedním z prvních používaných způsobů, jak zapsat libovolná data do blockchainu bylo využití místa pro hash veřejného klíče ve výstupním skriptu P2PKH (Pay-to-Public-Key-Hash). Skript nabízí 20 bytů na jeden výstup, nicméně výstupů může být v transakci více. Protože nelze žádným způsobem rozpoznat, zda uvedená data jsou hashem existujícího veřejného klíče, musí být taková transakce přijata ke zpracování. Příkladem využití této metody je následující obrázek. Je zakódován do několika transakcí a v blockchainu se objevil už před deseti lety. Naleznete jej například zde.
Data lze zapsat i do původník P2PK (Pay-to-Public-Key) výstupních skriptů na místo určené pro veřejné klíče. V nekomprimované podobě lze použít 65 bytů, v komprimované pak 33.
Společnou nevýhodou obou způsobů použití výstupních skriptů je vytvoření neutratitelných zůstatků (UTXOs). K datům na místě veřejných klíčů neexistují privátní klíče, které by zůstatky odemkly a tak je nelze dále převést na novou adresu. Nehodí se proto pro případy použití bitcoinového blockchainu jako nezpochybnitelného dokladu o vlastnictví, protože toto vlastnictví nelze dále převést. Zároveň platí, že kromě poplatků za vytěžení mají tato data také náklad v podobě takto “spálených” satoshi.
OP_RETURN
Jiným, ale také velmi oblíbeným způsobem, je použití operátoru
OP_RETURN
. Do bitcoin core se dostal později, až v roce 2014. Jeho použití záměrně označuje takto označený výstup transakce jako dále neutratitelný a vytváří prostor pro až 80 bytů libovolných dat.Zajímavá je historie vzniku tohoto operátoru. Byl reakcí na jiný v té době používaný způsob ukládání dat do bitcoinového blockchainu Counterparty protokolem. Counterparty byl druhou vrstvou na bitcoinem, která umožňovala vytvářet nové tokeny a obchodovat s nimi na distribuované burze. Nepřipomíná vám to něco? Counterparty zneužíval operátor
OP_CHECKMULTISIG
, který slouží k ověření podpisu transakce s více podpisy P2SH (pay to script hash). Místo veřejných klíčů k ověření však k operátoru ukládal svá specifická data. UTXOs vytvořené pro Counterparty byly rovněž neutratitelné (uložená data nereprezentovala veřejné klíče odvozené z existujících privátních klíčů), přesto musely být z principu uchovávány v transakčním setu uzlů (byly součástí platné transakce), a proto představovaly riziko pro další škálování bitcoinu. Diskuze, které se na toto téma v roce 2014 vedly, jsou dnes označovány jako OP_RETURN Wars. Jejich výsledkem bylo zavedení operátoruOP_RETURN
, který umožnil připojení libovolných dat k transakci a poskytl tak protokolu Counterparty řešení jeho potřeb. Zároveň však explicitně označuje takto označené UTXO za neutratitelné. To umožňuje uzlům vyřadit jej z transakčního setu pro další validace a šetřit tím místo.Zavedení operátoru
OP_RETURN
bylo prvním ústupkem SPAMu. Jeho použití pro zapsání krátké zprávy do blockchainu dnes umožňuje celá řada peněženek, například i Trezor Suite.Ordinal theory a Ordinals
Koncept Ordinar Theory publikoval na svém blogu v roce 2022 bitcoinový vývojář Casey Rodarmor. Popisuje číslovací schéma, které přiřazuje každému satoshi jednoznačné číslo od 0 do (zjednodušeně) 2.100.000.000.000.000 (21M*100M. Ve skutečnosti je jich o něco méně, protože i bitcoinů nebude díky principu halvingu přesně 21 milionů.). Satoshi jsou číslovány v pořadí, v jakém byly vytěženy (například satoshi vytěžené v genesis bloku mají čísla 0 - 4.999.999.999), a přenášejí se ze vstupů transakcí do jejich výstupů (první satoshi prvního výstupního UTXO dostane číslo prvního satoshi prvního vstupního UTXO, atd.). Každý satoshi tak má jednoznačné pořadové číslo, anglicky ordinal. Odtud název Ordinals.
Jednoznačné číslování satoshi umožňuje potlačit jejich zaměnitelnost a dává tak příležitost sběratelům zaměřit se na jednotlivé z nich, které jsou něčím zajímavé. Má pro vás první satoshi páté epochy (první satoshi z odměny za vytěžení prvního bloku po čtvrtém halvingu) vyšší hodnotu? Chtěli byste ho?
Inscriptions
Inscriptions jsou novým způsobem zápisu dat nebo digitálních artefaktů do blockchainu bitcoinu. Navrhl je v roce 2022 opět starý známý Casey Rodarmor. Využívají číslovací schéma Ordinal theory pro identifikaci jednotlivých satoshi a umožňují ke každému z nich jednotlivě do blockchainu připsat libovolný digitální obsah, zahrnující obrázky, videa, texty, zvuky a další (tzv. bitcoinová NFT). Data jsou zapsána přímo do blockchainu v rámci taproot skriptu transakce, která je publikuje, v tzv. witness datech. Díky tomu se na ně vztahuje 75% sleva z poplatku za vByte a “činí tak tento způsob ukládání dat do blockchainu relativně úsporným” (skutečná slova použitá v publikované dokumentaci Inscriptions).
Satoshi, ke kterým jsou Inscriptions připsány, mohou být převáděny standardními transakcemi na libovolné bitcoinové adresy v rámci běžných UTXO. Je třeba jen respektovat číslovací schéma Ordinals při sestavování těchto transakcí.
Inscriptions, nebo lépe bitcoinová NFT, se stala mezi určitou skupinou uživatelů bitcoinu (nikoliv mezi bitcoinery, natož bitcoin maximalisty) velmi populární. Jejich zásadní výhodou oproti jiným NFT implementacím se stala skutečnost, že bitcoinový blockchain obsahuje přímo digitální obsah, nikoliv pouze odkaz na něj někam do centralizovaného úložiště, u něhož není záruka, že bude v budoucnu stále existovat. Jediným limitem se stala maximální velikost jednoho bloku (4MB), který obsahuje příslušnou transakci. I to však nezabránilo umístit do Inscriptions celou počítačovou hru Doom. Zahrajte si a pak se vraťte ke čtení. (odkaz na příslušnou transakci v blockchainu).
Stejně jako protokol Counterparty, který byl postaven na zneužití operátoru
OP_CHECKMULTISIG
, si i Inscriptions našli skulinku v sémantice taproot skriptu. Stala se jím kombinace operátorůOP_FALSE
,OP_IF
aOP_ENDIF
. První z nich uloží na vrchol zásobníku hodnotu “nepravda”. Druhý pak testuje hodnotu na vrcholu zásobníku a pokud je pravdivá, vykoná další část skriptu až po operátorOP_ENDIF
. Protože je ale na vrcholu hodnota “nepravda”, tato část skriptu se přeskočí a nikdy nevykoná. Mezi operátoryOP_IF
aOP_ENDIF
tak vznikne ideální prostor pro uložení čehokoliv, aniž by to ohrozilo syntaktickou a sémantickou správnost skriptu jako celku. De iure je vše v pořádku. De facto došlo ale ke zneužití slabého místa skriptovacího jazyka.Runes
Protokol Runes přinesl do světa bitcoinu možnost specifikovat, razit a převádět vlastní zaměnitelné tokeny. Nejsou prvním takovým pokusem, ale v současné době asi tím nejviditelnějším. Autorem protokolu je do třetice Casey Rodarmor. Zajímavá je jeho motivace k vytvoření protokolu. Na svém blogu 25.9.2023 k tomu mimo jiné napsal:
“Nejsem si jistý, zda je vytvoření nového protokolu se zaměnitelnými tokeny pro Bitcoin dobrý nápad. Zaměnitelné tokeny jsou z 99,9% podvody a memy. Nezdá se však, že by v dohledné době zmizely, podobně jako asi nezmizí v dohledné době kasina. Vytvoření dobrého protokolu zaměnitelných tokenů pro Bitcoin by mohlo přinést významné příjmy z transakčních poplatků, zájem vývojářů a uživatelů o Bitcoin. Navíc, pokud by tento protokol měl jen malou stopu v blockchainu a podporoval zodpovědnou správu UTXO, mohl by snížit škody ve srovnání s užitím stávajících protokolů. Přinejmenším jeden z nich, BRC-20, je již poměrně populární a má nežádoucí důsledek v podobě množení UTXO.”
Runes se v bitcoinovém blockchainu objevili po čtvrtém půlení (s výškou bloku 840.000) a co se stopy v bitcoinovém blockchainu týče, úsportné skutečně jsou. Data protokolu jsou uložena v transakčním výstupu v rámci operátoru
OP_RETURN
. Ten je následován operátoremOP_PUSHNUM_13
(identifikátor, že se jedná o data protokolu Runes) a dalšími daty (přes operátorOP_PUSHBYTES
), která určují, zda se jedná o definici nového tokenu, jeho ražbu nebo převod mezi adresami. Tato data jsou vždy menší než limit 80 bytů operátoruOP_RETURN
, takže plní standardní podmínky pro přijetí transakce do mempoolu většiny uzlů. Na první pohled je tedy vše v pořádku. Ale… Pomůžu si opět citací Casey Rodamora z jeho blogu:“Mělo by něco takového existovat? Nevím. Je to jednoduché, jak je to jen možné, nespoléhá se to na data mimo blockchain, nemá to nativní token a hezky to zapadá do modelu UTXO Bitcoinu. Takové schéma by mohlo přilákat uživatele jiných schémat s horší stopou v blockchainu a přivést k bitcoinu pozornost dalších vývojářů a uživatelů, což by je povzbudilo k jeho přijetí. Na druhou stranu je svět směnitelných tokenů většinou nepoučitelnou žumpou, plnou podvodů a chamtivosti, takže by to také mohlo dopadnout špatně.”
Důsledky uvedení Ordinals, Inscriptions a Runes jsou zřejmé. K bitcoinu přitáhli další skupinu jeho uživatelů - sběratele a spekulanty na budoucí hodnotu bitcoinových NFT nebo obchodníky s novými tokeny. Vytváření a obchodování s NFT zvedlo zájem o transakční prostor v bloku a zapříčinilo růst transakčních poplatků do nebeských výšin. Těžaři a těžařské pooly se radují, běžní bitcoineři, kteří stále chtějí používat bitcoin jako peer-to-peer systém elektronických peněz pláčou. Má to nějaké řešení?
Doplnění: Předchozí odstavec jsem napsal skoro před dvěma měsíci v týdnech po půlení bitcoinu, kdy se transakční poplatky šplhaly ke stovkám satoshi za vByte. Nyní se situace uklidnila a poplatky se k neradosti těžařů vrací k normálu kolem 10-20 satoshi za vByte. Přesto lze pohledem do mempoolu zjistit, že transakce protokolu Runes stále tvoří cca polovinu všech transakcí čekající na potvrzení…
Kdo je Casey Rodarmor?
Casey Rodarmor je bitcoinový vývojář ze San Francisca, který přispívá do jeho kódu již několik let. Začínal v Chaincode Labs, později přispíval i k dalším bitcoinovým projektům, jako jsou mixery Wasabi Wallet a JoinMarket.
Největší známost Caseymu však přinesly až Ordinals, Inscriptions a Runes. Pro některé z bitcoinové komunity se tak stal nepřítelem číslo jedna, pro jiné inovátorem, který do bitcoinu vrátil hravost a oživil svět nudných “sound money”. On sám se má spíše za kreativního umělce (kód je druh umění), který rád vytváří umění sloužící nějakému konkrétnímu účelu.
Casey je aktivní na Twitteru, publikuje na svém blogu. A v jádru zůstává skromným bitcoinerem.
PR #28408
Vzrůstající množství SPAMu v transakcích nezůstalo bez povšimnutí. Na Ordinals a rozšíření Inscriptions zareagoval v září roku 2023 Luke Dashjr pull requestem PR #28408 do Bitcoin Core. Navrhl v něm rozšířit platnost parametru
-datacarriersize
i na tyto nové způsoby ukládání netrasankčních dat. Parametr-datacarriersize
umožňuje měnit maximální velikost vložených dat, ale vztahuje se pouze k operátoruOP_RETURN
. PR navrhuje aktualizovat pravidla mempoolu tak, aby omezil množství dat, která lze vložit také do witness části taproot skriptu, do obálky vytvořené z operátorůOP_FALSE
,OP_IF
aOP_ENDIF
.O několik dní později se také v mezinárodních databázích zranitelností objevilo hlášení CVE-2023-50428, které upozorňuje na zmíněné zneužití operátorů
OP_FALSE
,OP_IF
aOP_ENDIF
. Inscriptions byly označeny za zranitelnost pro bitcoin.PR byl sice otevřen, k jeho schválení a implementaci do Bitcoin Core ale nedošlo. Diskuze kolem něj krásně ilustruje panující ditochomii bitcoinerů v pohledu na SPAM. Zastánci PR argumentovali zamezením spamování bitcoinového blockchainu, zpomalením růstu nákladů na provozování bitcoinového uzlu (a úložiště pro blockchain), možností volby provozovatelů uzlů, zda chtějí mít Inscriptions v mempoolu a v neposlední řadě dotažení implementace
-datacarriersize
tak, jak byl původně zamýšlen: jako parametr omezující ukladání dat všemi dostupnými metodami, nikoliv jen přes operátorOP_RETURN
.Odpůrci implementace tohoto PR argumentovali tím, že nemůže zabránit šíření Inscriptions, protože jeho použití je dobrovolné a těžaři nejsou motivováni se Inscriptions bránit, ale právě naopak. Inscriptions těžařům prostřednictvím rostoucích poplatkům pomáhají k vyšším ziskům. Padly i argumenty o zkreslování reality pro operátory uzlů, kteří si transakce s Inscriptions z mempoolu vyloučí a budou jim tak chybět informace pro správnou funkci odhadování ceny poplatků zařazení transakce do následujícího bloku. A padly samozřejmě i obvinění z cenzury bitcoinových transakcí.
Kdo je Luke Dashjr?
Luke Dashjr, známý jako Luke-Jr, je softwarový vývojář a přispěvatel do projektu Bitcoin Core. Luke se na vývoji jádra bitcoinu podílí od jeho počátků, začal už v roce 2011. Do jádra bitcoinu přispěl více než 200 vylepšeními, jako například Segregated Witness, který mimo jiné zvyšuje transakční kapacitu Bitcoinu. Luke je správcem sekce Bitcoin Improvement Proposals (BIPs) a v bitcoinové komunitě tak hraje významnou roli.
Luke Dashjr je rovněž zakladatelem poolu Eligius, jednoho z prvních těžebních poolů. Po několikaleté přestávce byl pool znovu spuštěn na podzim roku 2023 pod jménem Ocean pool. V současnosti tvoří podíl poolu méně než 1 % hashrate sítě Bitcoin. Ocean pool je anonymní těžební pool, nevyžaduje žádnou registraci a odměny za vytěžený blok nad stanovený limit pro výplatu posílá svým těžařům přímo v coinbase transakci. Ostatní pak mají možnost nastavit si BOLT-12 lightning fakturu a podlimitní částky přijímat tímto způsobem.
Společným jmenovatelem většiny aktivit, kterým se Luke věnuje v dnešní době, je snaha o skutečnou decentralizaci těžby bitcoinu, boj proti cenzuře transakcí (reálné i potenciální) a také ochrana bitcoinové sítě před zahlcením SPAMem.
Zvláště posledně jmenované přináší k jeho osobě také jistou míru kontroverze. To, co Luke považuje za SPAM, vnímají jiní jako projev svobodného využití open source softwaru a obviňují jej ze snahy cenzurovat transakce.
Jak (se) bránit SPAMu?
SPAM se do bitcoinového blockchainu dostává prostřednictví transakcí, které jej přenáší, respektive jejich potvrzením při vytěžení nového bloku. Tím jsou také dány dva základní způsoby, jak se SPAMu bránit.
- Bránit šíření transakcí, které SPAM obsahují, bitcoinovou sítí
- Bránit zařazení těchto transakcí do šablony bloku určeného k potvrzení
Šíření transakcí v síti zajišťují bitcoinové uzly - servery, na kterých běží klient bitcoinové sítě. Pokud klient transakci akceptuje, uloží ji do svého mempoolu a přepošle ji svým peerům - dalším uzlům, se kterými je ve spojení. Tímto způsobem se transakce šíří sítí až k uzlům, které používají těžaři k sestavení šablony nového bloku k vytěžení.
Bránění šíření transakcí má reálný význam pouze v případě, kdy se na něm shodne významná většina uzlů v síti a vytvoří se podmínky, které zamezí reálnému doručení takové transakce k těžaři, který je ochoten ji vytěžit. Podstatně účinnější je rozhodnutí samotných těžařů nezařadit takové transakce do šablony nového bloku. Většina těžařů však k takovému jednání není motivována. Filtrování SPAMu snižuje počet transakcí a v důsledku tedy i velikost transakčních poplatků. Mezi těžaři však existují výjimky, pro které není trade-off podpory SPAMu za vyšší poplatky přijatelný. Krom celé řady privátních poolů pro solo mining mezi ně patří i Ocean pool Luka Dashjra.
Bitcoin Core, nejčastěji používaná implementace bitcoinového klienta, má celou řadu konfiguračních parametrů, které ovlivňují jeho chování. Z pohledu šíření SPAMu jsou zajímavé dva:
Parametr
-datacarrier
určuje, zda budou přenášeny transakce s operátoremOP_RETURN
. Ten označuje netransakční data v transakci. Výchozí hodnota je 1 - transakce jsou přenášeny.Parametr
-datacarriersize
pak určuje maximální velikost netransakčních dat za operátoremOP_RETURN
. Výchozí hodnota je 80.Oba parametry ovlivňují pouze transakce s operátorem
OP_RETURN
. Jak jsme si však ukázali v předchozích odstavcích, k šíření SPAMu jsou využívány i jiné operátory a snaha rozšířit platnost parametrů na další způsoby nebyla v implementaci Bitcoin Core úspěšná. Proto Luke Dashjr a s ním i další těžaři používají jinou implementaci klienta - Bitcoin Knots.Bitcoin Knots
Neschválení PR #28408 bylo z mého pohledu chybou. Požadovaná změna neměnila chování Bitcoin Core, pouze mohla dát provozovatelům uzlů další volbu, jaké transakce chtějí v mempoolu svého uzlu mít a šířit je dále po bitcoinové síti. Pokud chceme dále jako bitcoinová komunita tvrdit, že bitcoin je decentralizovaný a jeho vlastnosti řídí jednotliví suverénní provozovatelé uzlů sítě, neměli bychom se bránit dát jim k tomu odpovídající stupeň volnosti pro jeho nastavení.
Naštěstí Bitcoin Core není jedinou implementací bitcoinového klienta a jeho protokolu. Luke Dashjr udržuje a rozvíjí Bitcoin Knots, implementaci bitcoinového uzlu a peněženky, která z Bitcoin Core vychází a nabízí tak stejnou úroveň zabezpečení, soukromí a stability. Kromě toho však svým uživatelům rozšiřuje možnosti filtrování spamu pomocí rozšířené sady parametrů a pravidel k jeho potlačení.
Parametr
-datacarriersize
má v Knots výchozí hodnotu jen 42 a byl rozšířen tak, aby kontroloval i jiné způsoby zápisu netransakčních dat, než přes operátorOP_RETURN
. Realizuje tak původní návrh Pull Requestu #28408. Povolit nebo potlačit tuto vlastnost lze prostřednictvím parametru-datacarrierfullcount
. Ve výchozím stavu je povolena.Dalším užitečným parametrem je
-datacarriercost
. Umožňuje odstranit slevu na poplatcích, kterou mají SegWit data. Výchozí hodnota je v souladu s Bitcoin Core 0.25, což odpovídá 75% slevě. Pokud jej však nastavíte například na 4, bude muset majitel transakce zaplatit za data navíc čtyřnásobek poplatku za vByte.Jinou vůči SPAMu relevantní úpravou, je nastavení limitu maximální velikosti pre-SegWit, SegWit a Taproot skriptů na 1650 bytů. Tyto skripty, respektive místo pro ně v transakci, bývá také zneužíváno pro vložení SPAMu. 1650 bytů je dostatečná velikost pro všechny v současnosti známé skripty. Pokud by se v budoucnu ukázalo, že nedostačuje, lze ji zvýšit prostřednictvím parametru
-maxscriptsize
.V květnu uvolněná verze Knots 26.1 přinesla další důležité změny. Všechny nestandardní zápisy netransakčních dat (veškerý SPAM kromě
OP_RETURN
) jsou nyní ve výchozím nastavení filtrovány. Pokud se mají Knots v tomto ohledu chovat stejně, jako Bitcoin Core, je třeba nastavit nový parametr-acceptnonstddatacarrier
na 1. Výchozí hodnota je 0.Ve výchozím nastavení této verze Knots jsou rovněž filtrovány všechny P2PK transakce. Pay-to-Public-Key skript je zastaralým a dávno nepoužívaným formátem, který používala první Satoshiho peněženka. Časem byl nahrazen uspornějšími a bezpečnějšími formáty (P2SH nebo SegWit). P2PK transakce jsou však dnes stále zneužívány, SPAM je v nich na místě veřejného klíče. Parametr
-permitbarepubkey
umožňuje toto výchozí filtrování zrušit a P2PK transakce zpracovat.Na “oblibu” protokolu Runes reaguje parametr
-rejecttokens
. Umožňuje filtrovat transakce, které Runes obsahují. Není tak nutné filtrovat veškerá netransakční data nastavením parametru-datacarriersize
na 0.A posledním relevantním parametrem, který release Knots 26.1 přináší, je
-rejectparasites
. Ten by měl filtrovat tzv. parazitické transakce, tedy transakce, které na první pohled vypadají, jako standardní, ale ve skutečnosti existují proto, aby s využitím konceptu Ordinals vytvořily vazbu mezi konkrétním satoshi a artefaktem z externího světa. V této verzi Knots parametr filtruje transakce ražby protokolu CAT-21.Ocean mining pool
Knots můžete samozřejmě použít i jako klienta bitcoinové sítě pro vaši domácí těžbu (solo mining) ve vlastní instanci Public-Poolu. Pokud by jste ale chtěli podpořit filtrování SPAMu při zařazování transakcí do šablony bloku velkého veřejného poolu, je jedinou známou možností Ocean mining pool. Ten nabízí celkem čtyři typy šablon s různou mírou filtrování SPAMu. Dvě z nich jsou postaveny na Knots: šablony OCEAN a Data-Free. Nastavení jejich konfiguračních parametrů je detailně popsáno na webu poolu.
Dává smysl bránit (se) SPAMu?
Pravdou je, že dokud bude existovat kontroverze mezi bitcoinery ohledně pohledu na SPAM a jeho filtrování zůstane jen volitelnou možností, bude se SPAM v bitcoinovém blockchainu dále objevovat. Důvodem je motivace velkých těžařů podporovat zájem o místo v bloku a tím růst transakčních poplatků. Zájem uživatelů o Ordinals, Inscrpions či Runes nejspíše časem opadne, nahradí je však určitě jiný fenomén, který těžařům pomůže zahustit bloky a tlačit poplatky vzhůru.
Zabránit šíření SPAMu může pouze shoda komunity na nastavení závazných pravidel. K té máme zatím velmi daleko. Ale zvyšování povědomí o této problematice mezi bitcoinery a signalizace osobních preferencí pomocí volby používaného klienta - Knots nebo těžby v poolech, které upřednostňují původní principy z bitcoinového whitepaperu před maximalizací zisku - Ocean, může pomoci tuto vzdálenost překonat. Držme si palce!
-
@ 2ad33996:3999d22a
2024-06-25 03:57:59Explora el mundo de los mineros ASIC de Kaspa en nuestra guía completa. Desde sus ventajas en eficiencia energética hasta una comparación detallada de modelos como el ICERIVER KS0, KS1 y Bitmain Antminer KS3, aprenderás todo sobre cómo estos dispositivos están redefiniendo la minería de criptomonedas. Descubre cómo configurar y optimizar tu equipo para obtener el máximo rendimiento, y explora estrategias avanzadas para elegir pools de minería y gestionar tus costos operativos. Este artículo es tu recurso definitivo para dominar la minería de Kaspa con mineros ASIC.
Este artículo fue publicado originalmente en iceriveroutlet
Resumen: Los mineros ASIC para Kaspa, como ICERIVER KS0, KS1, GOLDSHELL KA Box y Bitmain Antminer KS3, son reconocidos por su eficiencia energética y alta capacidad de procesamiento. Este artículo proporciona una guía completa sobre la configuración, optimización y estrategias para maximizar las ganancias en la minería de criptomonedas, enfocándose en la elección de pools de minería y la gestión de costos de energía.
¿Estás buscando maximizar tu eficiencia en la minería de criptomonedas? Los mineros Kaspa ASIC podrían ser la solución que necesitas. Con el avance de la tecnología blockchain, la competencia en la minería se ha intensificado, y la eficiencia energética se ha convertido en un factor crucial para mantener la rentabilidad. Los equipos ASIC de Kaspa están diseñados específicamente para ofrecer un rendimiento superior, permitiéndote ahorrar energía y maximizar tus ganancias. Estos dispositivos no solo son más eficientes en términos de consumo energético, sino que también ofrecen una mayor tasa de hash, lo que significa que puedes minar más criptomonedas en menos tiempo.
Ademas En esta publicación, exploraremos cómo los mineros ASIC de Kaspa pueden transformar tu experiencia de minería. Analizaremos sus características clave, los beneficios que ofrecen y cómo se comparan con otras opciones en el mercado. Además, te proporcionaremos consejos prácticos para optimizar tu configuración y obtener el máximo rendimiento de tu inversión. Prepárate para descubrir cómo los mineros Kaspa ASIC pueden ayudarte a alcanzar nuevos niveles de eficiencia y rentabilidad en tu aventura minera. ¡Empecemos!
¿Qué son los Mineros ASIC Kaspa?
Los mineros ASIC (Application-Specific Integrated Circuit) son dispositivos diseñados específicamente para realizar una tarea particular, en este caso, la minería de la criptomoneda Kaspa. A diferencia de los mineros de GPU o CPU, los ASIC están optimizados para el algoritmo de minería KHeavyHash de Kaspa, lo que los hace mucho más eficientes. La principal ventaja de los mineros Kaspa ASIC radica en su capacidad para ofrecer una mayor tasa de hash con un consumo energético significativamente menor. Esto se traduce en una operación más rentable y sostenible a largo plazo. Ventajas de Usar Mineros ASIC para Kaspa El uso de mineros ASIC para Kaspa presenta varias ventajas sobre otros tipos de mineros, como los de GPU o CPU. A continuación, se detallan algunas de las principales ventajas: Eficiencia Energética: Los ASIC están diseñados para consumir menos energía mientras proporcionan una mayor potencia de procesamiento.
Mayor Tasa de Hash: Los mineros ASIC pueden alcanzar tasas de hash mucho más altas, lo que aumenta la probabilidad de resolver bloques y obtener recompensas. Durabilidad: Los dispositivos ASIC suelen tener una vida útil más larga debido a su diseño especializado y robusto. Optimización: Están específicamente optimizados para el algoritmo KHeavyHash, lo que maximiza su rendimiento en la minería de Kaspa. Modelos Populares de Mineros ASIC Kaspa Existen varios modelos de mineros ASIC disponibles en el mercado, cada uno con diferentes especificaciones técnicas. Aquí se presentan algunos de los modelos más populares:
Especificaciones Técnicas de los Mineros ASIC Kaspa
Para aquellos interesados en los detalles técnicos, aquí se presentan las especificaciones de algunos de los modelos más avanzados: ASIC ICERIVER KS0 PRO: 100 GH/s, 500W, €290 ASIC ICERIVER KS1: 1 TH/s, 2000W, €1190 ASIC GOLDSHELL KA Box: 1.18 TH/s, 400W, €2050 ASIC Bitmain Antminer KS3: 9.4 TH/s, 3500W, €10490
Cómo Configurar y Optimizar tu Minero ASIC Kaspa
Configurar y optimizar tu minero ASIC Kaspa es crucial para maximizar su eficiencia. Este proceso incluye la configuración inicial del hardware, la instalación del software adecuado y la optimización de los ajustes para obtener el mejor rendimiento. En esta sección, te proporcionaremos una guía detallada para configurar y optimizar tu minero ASIC Kaspa, asegurándote de que puedas obtener el máximo provecho de tu inversión, tambien puede consultar su precio actual AQUI. Configuración Inicial del Hardware El primer paso para configurar tu minero Kaspa ASIC es asegurarte de que el hardware esté correctamente instalado. Sigue estos pasos:
Ubicación: Coloca tu minero en un lugar bien ventilado para evitar el sobrecalentamiento. Conexiones: Conecta el minero a una fuente de alimentación adecuada y asegúrate de que esté conectado a internet mediante un cable Ethernet. Encendido: Enciende el dispositivo y verifica que todos los indicadores LED funcionen correctamente. Asimismo Una vez que el hardware esté configurado, puedes proceder con la instalación del software.
Instalación del Software Adecuado
Para que tu minero ASIC Kaspa funcione de manera óptima, es esencial instalar el software adecuado. Aquí te mostramos cómo hacerlo: Descarga del Software: Visita el sitio web del fabricante y descarga el software de minería recomendado para tu modelo específico. Instalación: Sigue las instrucciones de instalación proporcionadas por el fabricante. Asegúrate de configurar correctamente la dirección de tu wallet y los detalles del pool de minería. Actualizaciones: Mantén el software actualizado para beneficiarte de las últimas mejoras y correcciones de errores. Con el software instalado, puedes proceder a optimizar los ajustes para maximizar el rendimiento. Optimización de los Ajustes Del mismo modo Optimizar los ajustes de tu minero Kaspa ASIC es crucial para obtener el mejor rendimiento posible. Aquí te dejamos algunas mejores prácticas: Frecuencia y Voltaje: Ajusta la frecuencia y el voltaje de tu minero para encontrar el equilibrio perfecto entre rendimiento y consumo energético. Monitoreo: Utiliza herramientas de monitoreo para supervisar la temperatura y el rendimiento de tu minero en tiempo real. Mantenimiento: Realiza un mantenimiento regular, como limpiar los ventiladores y revisar las conexiones, para asegurar un funcionamiento óptimo.
Siguiendo estos pasos, podrás configurar y optimizar tu minero ASIC Kaspa de manera efectiva, maximizando su eficiencia y rentabilidad. Maximizando tus Ganancias con Mineros ASIC Kaspa Maximizar tus ganancias con mineros ASIC Kaspa implica no solo la optimización del hardware y software, sino también la elección de las mejores estrategias de minería. A continuación, exploraremos diversas tácticas que te ayudarán a incrementar tus ingresos, desde la selección de pools de minería hasta la gestión de costos de energía y la reinversión de ganancias. Para ilustrar estas estrategias, proporcionaremos ejemplos de casos de éxito y estudios de caso de mineros que han logrado maximizar sus ganancias utilizando mineros ASIC Kaspa.
Selección de Pools de Minería
Elegir el pool de minería adecuado es crucial para maximizar tus ganancias. Los pools de minería permiten a los mineros combinar su poder de hash para resolver bloques más rápidamente y recibir recompensas de manera más constante. A continuación, te presentamos algunos de los pools más recomendados para minar Kaspa: F2Pool: Con una alta tasa de éxito y bajas comisiones, F2Pool es una opción popular entre los mineros de Kaspa. Poolin: Este pool ofrece una interfaz amigable y estadísticas detalladas para monitorear tu rendimiento. 2Miners: Con servidores en múltiples regiones, 2Miners garantiza una conexión estable y eficiente. K1Pool: Conocido por su transparencia y pagos rápidos, K1Pool es otra excelente opción para los mineros de Kaspa. Al unirte a un pool de minería, asegúrate de investigar sus comisiones, métodos de pago y reputación para tomar una decisión informada.
Gestión de Costos de Energía
La eficiencia energética es un factor clave para la rentabilidad de la minería de criptomonedas. Aquí te dejamos algunas estrategias para gestionar y reducir tus costos de energía: Ubicación: Instalar tus mineros en una región con tarifas eléctricas más bajas puede reducir significativamente tus costos operativos. Optimización del Hardware: Ajustar la frecuencia y el voltaje de tus mineros ASIC puede mejorar su eficiencia energética. Energía Renovable: Considera el uso de fuentes de energía renovable, como paneles solares, para reducir tus costos de electricidad a largo plazo. Un ejemplo de éxito es el caso de Juan Pérez, quien instaló paneles solares en su granja minera, logrando reducir sus costos de energía en un 40% y aumentando sus ganancias netas.
Reinversión de Ganancias
Reinvertir tus ganancias en la mejora de tu infraestructura minera puede aumentar tu capacidad de generar ingresos a largo plazo. Aquí te dejamos algunas formas de reinvertir tus ganancias de manera efectiva: Actualización de Equipos: Invertir en mineros ASIC más eficientes y potentes puede aumentar tu tasa de hash y tus ingresos potenciales. Expansión de la Operación: Ampliar tu granja minera con más dispositivos puede incrementar tu poder de procesamiento y tus recompensas. Investigación y Desarrollo: Destinar fondos a la investigación de nuevas tecnologías y métodos de minería puede mantenerte competitivo en el mercado. Un caso notable es el de María López, quien reinvirtió el 50% de sus ganancias en la compra de nuevos mineros ASIC y en la mejora de su infraestructura, logrando duplicar sus ingresos en un año. Transforma tu Minería con la Eficiencia de los Mineros Kaspa ASIC
Conlusion:
Asi que, los mineros Kaspa ASIC ofrecen una combinación única de eficiencia energética y alta tasa de hash, lo que los convierte en una opción ideal para quienes buscan maximizar sus ganancias en la minería de criptomonedas. Desde su diseño especializado hasta su capacidad para optimizar el algoritmo KHeavyHash, estos dispositivos están preparados para llevar tu experiencia minera al siguiente nivel. Hemos explorado las múltiples ventajas de los mineros ASIC para Kaspa, incluyendo su durabilidad y optimización específica para Kaspa, así como los modelos más populares disponibles en el mercado. Con opciones que van desde el ASIC ICERIVER KS0 hasta el Bitmain Antminer KS3, hay una variedad de dispositivos que se ajustan a diferentes necesidades y presupuestos. Además, la configuración y optimización adecuadas de tu minero ASIC Kaspa son cruciales para maximizar su rendimiento. Desde elegir la ubicación correcta y realizar las conexiones adecuadas, hasta instalar el software recomendado y ajustar la frecuencia y el voltaje, cada paso es esencial para garantizar que obtengas el máximo provecho de tu inversión. Finalmente, no olvides que la elección del pool de minería adecuado y la gestión eficiente de los costos de energía pueden marcar una gran diferencia en tus ganancias. Al unirte a pools como F2Pool o Poolin y considerar el uso de energías renovables, puedes optimizar aún más tus operaciones mineras. Te invitamos a compartir tus experiencias y preguntas en los comentarios, y no dudes en explorar más contenido en Iceriver Outlet para seguir aprendiendo sobre cómo mejorar tu eficiencia minera con los mineros Kaspa ASIC. ¡Buena suerte y feliz minería!
-
@ 502ab02a:a2860397
2024-06-25 03:41:42บันทึกเจอนี่ เรื่องนี้ไว้สักหน่อยครับ เผื่อตายไปจะได้ล่องลอยอยู่ในแบบดิจิตอล 5555
จะเรียกว่าความเลยเถิด จับพลัดจับผลูหรืออะไรก็แล้วแต่ ก็น่าจะนับเป็นโชคที่ดีได้ ที่ผมเกิดมาเป็นวัยรุ่นในยุคที่มีช่องว่างในการจะทำอะไรได้มาก ยอมรับเลยว่า ทุกวันนี้ยังมีสัดส่วนความคิดแบบคนรุ่นเก่าเยอะพอสมควร
เรื่องมันเริ่มจาก หนังอาร์เอส โลกทั้งใบให้นายคนเดียว ตอนหนังเรื่องนี้ออกนี่ผมโตแล้วครับ มหาวิทยาลัยแล้ว ผมกับเพื่อนๆไปดูหนังเรื่องนี้ ไม่ใช่เพราะคุณนุ๊กหรือคุณเต๋า แต่ไปเพราะพี่เอ็ม ใช่ครับ สุรศักดิ์ วงษ์ไทย ตอนออกจากโรงมาเราไม่ได้คุยเรื่องเนื้อหาในหนัง เราคุยกันแต่เรื่องพี่เอ็ม จนคนหนึ่งในกลุ่มพูดว่า รายการพี่เอ็ม ตอนนี้จัดอยู่คลื่น 89 นะ
รายการที่ว่าชื่อ ถามมาซิจ๊ะ...โดน ครับเป็นรายการที่เราฟังกันน่าจะตั้งแต่ smile 88 MHz หรือที่คุณพ่อคุณแม่เพื่อนๆชาวทุ่งม่วงคุ้นเคยในชื่อ สไมล์เรดิโอ เป็นรายการวิทยุที่มีมาก่อน A-times ทั้งหมด ตอนนั้นรายการ ถามมาซิจ๊ะ...โดน เป็นการการที่พูดคุยอย่างเดียว สมัยนี้เรียก talk show นั่นละครับ แต่เป็นการพูดคุยที่ค่อนข้างกันเองจนสนุกสนานภาษาวัยรุ่นยุคนั้น แต่มันไม่ค่อยจะถูกใจผู้หลักผู้ใหญ่ช่วงนั้นเสียเท่าไร เอาจริงๆก็คล้ายๆยุคนี้แหละครับ วัยรุ่นมักทำอะไรไม่ถูกใจในสายตาผู้ใหญ่ แต่การ re act มันต่างกัน สมัยนั้นเราโดนแบน จนต้องย้ายคลื่นกันบ่อยครั้งมาก (รูปแบบการแบน อาจต้องเล่าส่วนตัว เพราะถ้าลองมองดู คลื่นวิทยุใครเป็นเจ้าของ การไล่ก็ตามเจ้าของถนัดนั่นละครับ 55)
ทีนี้การสื่อสารสมัยก่อนมันจะยากมากที่จะต่อกันติด เก่งที่สุดคือ จดหมายมาถามเพราะเราใช้ตู้ ปณ. ในการติดต่อกัน นอกจากนั้นคือ ปาก ต่อ ปาก เท่านั้น ทำให้ประโยคนั้นของเพื่อนผม คือประโยคที่ พลิกชีวิต น่าเหลือเชื่อจริงๆเลยครับ
ผมกลับบ้านไปติ้วคลื่นที่เครื่องวิทยุ หมุนหาคลื่น 89.0MHz (ใช่ครับ หมุนคลื่น ไม่มีดิจิตอลใดๆ) วิทยุโซนี่เครื่องนั้นผมยังเก็บไว้กับตัวตลอดเวลา และวันอาทิตย์ผมก็ได้ฟังรายการที่คุ้นเคยอีกครั้ง ตอนนั้นคลื่น 89 เป็นลักษณะ format radio คือเปิดเพลงร็อคทั้งวันทั้งคืน ยกเว้นเสาร์-อาทิตย์ จะมีโซนี่เป็นสปอนเซอร์ เรียกว่า sony dream radio ก็เลยจะเป็นรายการที่วาไรตี้กว่า จ-ศ
ในจักรวาลคู่ขนานกัน ผมเริ่มรู้จักโลก internet จากมหาวิทยาลัย ซึ่งการก้าวเข้าโลกอินเตอร์เนทจะเล่าให้ภายหลัง ข้ามมาก่อนว่า เป็นช่วงที่ผมเริ่มหัดเขียน html จนมาพบ netscape navigator GOLD ตัวแรกที่สามารถเขียนเว็บแบบ WYSIWYG (What You See Is What You Get) สมัยนี้อาจจะงง คือเมื่อก่อนทุกอย่างเป็นตัวหนังสือครับ การทำอะไรแบบ พิมพ์ปุ๊บเห็นในจอปั๊บส่งออกข้างนอกได้แบบนั้นทันที เราจะตื่นเต้นกันมากครับ
แล้วผมก็ทำการผสาน 2จักรวาลเข้าหากัน ผมเริ่มทำโปรเจค fan page รายการวิทยุ ถามมาซิจ๊ะ...โดน เพราะรู้สึกว่าอยากทำงานวิทยุ ต้องหาทางเชื่อมอะไรบางอย่าง พอทำเสร็จผมก็เลยติดต่อไปที่ดีเจท่านนึง ซึ่งชอบแกดเจทเหมือนกันคือ พี่บอล กิตติพัฒน์ ลิมพะสุต ผมมองว่าโอกาสการเข้าหาทางอีเมลล์ มีมากกว่าตู้ปณ. เพราะจดหมายในรายการเยอะ อัตราการถูกนำมาอ่านมันจะน้อยกว่าอีเมลล์ ซึ่งในยุคนั้นการใช้อีเมลล์ค่อนข้างไฮโซ จึงได้รับโควต้า จดหมายจากอีเมล แยกจากจดหมายจากตู้ปณ.
แล้วมันก็ได้ออกอากาศ และทุกคนก็ตื่นเต้นที่รายการมีเว็บไซท์เป็นของตัวเอง เพราะมันน่าจะเป็นรายการวิทยุแรกๆของไทย ที่มีเว็บไซท์ครับ
จากนั้นผมก็ได้รับการติดต่อจากพี่บอล ให้เข้าไปพูดคุยเพื่อทำสิ่งนี้ให้มีทิศทางชัดเจนยิ่งขึ้น รวมถึงถามว่า อยากสอนคอมไหม เขาเปิดโรงเรียนสอนคอม แล้วยังขาดครูสอนอินเตอร์เนท นั่นทำให้ผมไม่รีรอที่จะรับทันที ใช่ครับสมัยก่อนการสอนเข้าอินเตอร์เนท ต้องลงเรียน สอนตั้งแต่ตั้งค่าโมเด็ม การโทรเข้า isp การทำความรู้จักกับ username password รวมถึงการเข้า browser
ระหว่างนั้นผมก็ทำเว็บรายการควบคู่ไปด้วย ผมเริ่มเนียนครีเอทคอนเสป การตัดหน้าดีเจ ไปแปะกับใบ handbill หนัง เพื่อให้เกิดความสนุกตลก ออกแนวพาโรดี้ มันน่าจะทำให้พี่บอลมองเห็นว่า เอ้อ ผมพอมีความครีเอทอยู่บ้าง ไม่ได้เป็นเนิร์ด ก็เลยเริ่มชวนผมไปทำโน่นทำนี่ ชวนไปไหนกูไปหมด จำได้ว่าเคยไปงานโซนี่ ในโรงแรมแห่งหนึ่ง เขานำเครื่อง mini disc เข้ามาใหม่ๆ รวมถึงอุปกรณ์บรอดคาส เจ๋งๆ ก็ได้เห็นจากการติดสอยห้อยตามนี่ละครับ
โปรเจคแรกเลยคือการทำ จิงเกิ้ลรายการใหม่ ที่ห้องอัดเสียงของ พี่ต้อ กุลวัฒน์ พรหมสถิตย์ อัดเสียหนะแป๊บเดียว แต่กินเหล้านาน 55 เป็นครั้งแรกที่ผมรู้สึกว่า ศิลปินเจ๋งดีนะครับ พี่ต้อคุยกับพวกเราอย่างออกรสชาติ ผมเด็กใหม่ ในขณะที่เขาสนิทกันมาก่อนแล้ว ทีนี้ vibe มันดีจนพี่ต้อหยิบกระดานมาสเก็ตรูปบรรยากาศวันนั้นไว้ ใช่ครับ เอาดินสอสเก็ตรูปเก็บไว้ ไม่ได้ใช้กล้องถ่ายรูป 555
จากนั้นมันก็เริ่มเลยเถิดไปเรื่อยๆ และผมมักจะไปตกในจังหวะที่ คนไม่พอบ้าง ไม่มีคนทำบ้าง ผมชนทุกโอกาสที่เข้ามา ตั้งแต่การอ่านสปอตวิทยุ เพราะคนไม่พอ ตั้งแต่การตัดต่อเสียงเพราะคนทำป่วย ไปจนถึงเป็นตัวซัพพอร์ตสำนักข่าวที่รายการรับจ้างทำ ได้ทำตั้งแต่ re write ข่าว ไปจนอ่านข่าวเองบางช่วงที่สลอตมันไม่มีใครว่าง (มักจะเป็นข่าวต้นชั่วโมงราวๆ ตี2 ตี3) หรือแม้แต่ การออกภาคสนาม การคิดซาวน์และกิมมิคต่างๆในรายการ ซึ่งในช่วงหลังปรับเป็นเกมส์โชว์มากขึ้น
แล้วก็มาถึงยุคของอีเวนท์ เมื่อก่อนเขาเรียกว่า "กิจกรรม" ตอนปลายๆของวิทยุ เราจะมีคำพูดนึงจากพี่บอลมาบรีฟว่า สปอนเซอร์ อยากให้เราช่วยคิดกิจกรรมการตลาด เกี่ยวกับ โน่น นี่ นั่น ซึ่งเป็นอีกจุดพลิกชีวิตเหมือนกัน เพราะมีการเปลี่ยนความคุ้นชินจากการทำวิทยุ ไปสู่ อีเวนท์ ออกาไนเซอร์ หลายคนก็ปรับตัวไม่ได้ หลายคนก็ปรับตัวได้ ผมอาจโชคดีหน่อย ที่ไม่ชอบกลับบ้าน เลยอยากทำอะไรพวกนี้ตลอดเวลา และเช่นเคย ผมไม่ได้รอให้ใคร assign งาน ผมลุกไปทำในทุกจุดที่คนโบ๋อยู่ ลุกไปช่วยทุกจุดที่มันกำลังมีปัญหา เพราะตอนนั้นภาพผมเป็นเนิร์ด ทำอนิเมชั่นตั้งแต่ flash เวอร์ชั่น beta พอคนเห็นตัวผมในหลายๆที่ เขาก็เริ่มให้ประกบช่วยโน่นนี่นั่นแบบอุ่นใจเขาขึ้น ไม่ว่าจะเป็นการช่วยดูคิว ทั้งสเตจ ไฟ เสียง อะไรที่มันเทคโนโลยี รวมยาวไปถึงอะไรที่เป็นกราฟฟิค พิมพ์ ปริ้น
มันมีกิจกรรมสนุกๆให้ทำมากมาย ที่เป็นการลองผิดไปด้วยกัน การจัดดูหนังฟังเพลง คือมีมินิคอนเสิร์ตในโรงหนัง แล้วต้องรีบรื้อให้ทันก่อนรอบเที่ยง เพราะเขาต้องขายตั๋ว หรือการจัดถ่ายทอดสดออสการ์ในโรงหนัง พอเรื่องไหนได้รางวัลก็ดูเรื่องนั้นต่อไปพร้อมๆกันเลย การจัดนักชิมหนัง คือให้นักศึกษาลองดูหนังที่จะออกฉายก่อนเพื่อเทสฟีดแบค จริงๆการจัดกิจกรรมพวกนี้ มันก็คือ อีเวนท์ในยุคนี้ แต่สมัยนั้นมันไม่มีชื่อเรียก
เราเพิ่งมารู้ว่าอ๋อ นี่คืออาชีพออกาไนซ์สินะ เราไม่รู้หรอกครับ เราแค่เห็นว่ามันเจ๋งดีได้คิดอะไรสนุกๆทำ ผมจำงานนึงได้ ยิ่งใหญ่ในความรู้สึกมาก น่าจะในช่วงฤดูหนาวพอดี ลมเย็นมากๆสมัยนั้น แล้วเรามีการจัด collage rock market ที่ RCA ตอนเช้าถึงค่ำ เป็นการเปิดให้นักศึกษามาลงทะเบียนเล่นสดๆ ให้ค่ายเพลงเดินช้อปปิ้งเลย ว่าอยากเซนต์วงไหนเข้าสังกัด จัดเวทีเรียงยาวไปตามถนน RCA เลยครับไม่ได้มีเวทีเดียว ที่สนุกคือหลายวง มีการแย่งกันเซนต์ด้วย เหมือน The Voice สมัยนี้เลยที่ต้องแย่งกันด้วยการเสนอข้อเสนอที่ดีกว่า มากกว่า ให้วงนั้นๆ
ว่าไปแล้ว แต่ละกิจกรรมก็เอามาเล่าใน เจอนี่ ได้หมือนกันแฮะ
นี่เป็นจุดพลิกอีกจุดนึง ที่ทำให้ผมเป็นผมแบบทุกวันนี้ครับ มีความเพี้ยนๆเพราะมันมี 2 ซีกในตัว ฝั่งวิชาการก็ลุ่มหลงลงไปได้ยาวๆ ฝั่งเฮฮาก็บ้าบอ คล้ายๆค้างคาวครับ นกก็ไม่ใช่ หนูก็ไม่เชิง
แต่ที่แน่ๆ ที่ผมตกตะกอนได้ทุกวันนี้คือ ผมจะไม่ทิ้งโอกาสไปเปล่าๆ โอกาสมีไว้พุ่งชน และถ้าไม่มีโอกาส สร้างมันซะ
ได้ก็คือได้ ไม่ได้ก็แค่กลับมาจุดเดิม ไม่มีอะไรจะต้องเสีย ตราบใดที่มันไม่รบกวนความรับผิดชอบปกติของเรา
ปัจจุบันก็เช่นกันครับ จาก เจอนี่ โพสที่แล้วได้บอกไว้ ว่าผมก้าวออกมาจากงานโฆษณาแล้วครึ่งหนึ่ง โพสนี้บันทึกไว้ว่า 31 กรกฎาคม 2567 ผมก้าวออกจากงานโฆษณาเต็มตัวครับ
เพื่อออกมาสร้างโอกาส ที่จะพุ่งชน โดยไม่ต้องกังวลความรับผิดชอบกับมวลหมู่อีกต่อไป เพราะผมขอเอาความรับผิดชอบตั้งไว้เหนืออื่นใด ดังนั้นถ้าความรับผิดชอบที่ต้องทำมันขัดกับการสร้างโอกาส (ที่ไม่รู้จะสำเร็จแค่ไหน) ผมเลือกที่จะแก้ไขความรับผิดชอบนั้นด้วยการยุติมันแล้วทำ exit plan ที่สมูทที่สุด แล้วหยิบจอบเสียม ไปขุดดินมาปั้น ครั้งนี้ เราจะปั้นในแบบที่เราอยากปั้นแล้วนะ เราจะไม่ปั้นในแบบที่คนอยากดู เราแค่ทำไปแล้วหากมีใครชอบในงานปั้นของเรา ก็เป็นเรื่องยินดี ไม่รู้สินะ เราทำเอาใจตลาดมาเกินพอแล้ว ถ้ามีคนบอกว่าวัยกลางคนคืออายุ 40 จะบอกว่า กูผ่านครึ่งชีวิตมานานแล้ว 555
siamstr #pirateketo
-
@ 2ad33996:3999d22a
2024-06-24 21:47:08Aprende a configurar y utilizar el Iceriver KS3 con nuestra guía paso a paso diseñada para 2024.
Este artículo fue publicado originalmente en iceriveroutlet
Resumen : El Iceriver KS3 es una herramienta poderosa y eficiente para la minería de Kaspa, lanzada en agosto de 2023. Este artículo proporciona una visión completa de sus características, especificaciones y perspectivas futuras, destacando su alta tasa de hash y bajo consumo de energía. Es esencial adquirir el KS3 de distribuidores confiables y estar al tanto de las fluctuaciones del precio de Kaspa para asegurar una inversión segura y rentable en el mercado de criptomonedas.
Introducción al Iceriver KS3
Iceriver ha lanzado varios modelos de mineros Kaspa, y el KS3 es una de sus últimas innovaciones. Este artículo proporciona una visión general del Iceriver KS3, describiendo sus características, especificaciones y perspectivas futuras.
Especificaciones técnicas
El minero Iceriver KS3 utiliza el algoritmo KHeavyHash basado en PoW, con una tasa máxima de hash de 8000Gh/s y un consumo de energía de apenas 3200W.
minero Iceriver KS3
Detalles del Iceriver KS3
Fabricante: Iceriver
Modelo: KS3
Lanzamiento: Agosto 2023
Peso neto: 14700g
Peso bruto: 17600g
Voltaje: 170-300 VCA
Tamaño sin embalaje: 370x195x290mm
Tamaño con embalaje: 490x300x400mm
Potencia: 3200W
Interfaz: Ethernet
Temperatura operativa: 0 – 35°C
Humedad operativa: 10 – 90%
Comparación con otros mineros Kaspa
El Iceriver KS3 es comparable al Bitmain Antminer KS3 en términos de eficiencia energética y tasa de hash. Ambos modelos ofrecen características robustas, pero los mineros pueden optar por el Iceriver KS3 por su eficiencia energética cercana a la del Antminer KS3.
Historial del rendimiento del precio de Kaspa
La rentabilidad de la minería de Kaspa está directamente relacionada con el precio de la criptomoneda. Mantenerse informado sobre las fluctuaciones del precio de Kaspa es crucial para maximizar las ganancias.
Desempeño del precio de Kaspa
Kaspa ha mantenido un rango de precios constante en el último año, lo que indica estabilidad. Sin embargo, el precio puede variar, y es esencial seguirlo de cerca para tomar decisiones informadas.
Rentabilidad del Minero Iceriver KS3
Evaluar las oportunidades de beneficio antes de invertir en hardware de minería es fundamental. La rentabilidad de la minería de Kaspa depende de varios factores, incluyendo el precio de Kaspa, la dificultad de la red y las tendencias del mercado. A pesar de ello, el Iceriver KS3 se destaca como uno de los equipos de minería Kaspa de primera línea, gracias a sus avanzadas especificaciones técnicas, que comprenden una alta tasa de hash, un consumo de energía reducido y una eficiencia energética sobresaliente. Esto incrementa las posibilidades de resolver problemas criptográficos más rápidamente, enfrentando los desafíos de la minería y aumentando tus beneficios.
Factores a considerar
Precio de Kaspa
Dificultad de la red
Tendencias del mercado de minería
Cambios en el algoritmo de minería
Condiciones del mercado
Actualizaciones regulatorias
A pesar de la incertidumbre, el Minero Iceriver KS3 es una de las mejores máquinas mineras Kaspa disponibles, con una alta tasa de hash, bajo consumo de energía y excelente eficiencia energética.
Perspectivas futuras del Iceriver KS3
Kaspa está ganando popularidad entre los mineros de criptomonedas por su código abierto y su potencial para desarrollar aplicaciones DeFi y contratos inteligentes. El historial de precios de Kaspa también parece positivo.
Futuro de la minería Kaspa
El Iceriver KS3 se destaca por sus características avanzadas, pero la industria de la minería de criptomonedas sigue evolucionando. Los mineros deben considerar la posibilidad de que nuevos dispositivos más avanzados puedan impactar la rentabilidad del KS3.
-
@ 5d4b6c8d:8a1c1ee3
2024-06-24 20:17:59Hi everyone,
As I go through basketball withdrawals, I'm frantically trying to think of fun NBA content and I came up with something that I think will be a neat almost year-long contest.
Let's try to predict who will make up the All NBA 1st team next year, as well as who the league MVP will be and which team will win the title.
Here's the part I think will be fun: each month you can revise your predictions, but you get more credit for further out predictions. If you make a correct pick in June and don't change, you'll get 10 points, whereas a correct April pick is only worth one (assuming that I counted months correctly).
As with most of my contests, the prize will be however many sats are zapped to me on these posts (including comments).
My June Picks
All NBA 1st Team
- Jokic
- Giannis
- Luka
- Ant
- SGA
MVP
- Luka
Champ
- Denver
-
@ 1123ece2:7d1e00c0
2024-06-24 19:29:00Welcome to The Refinery.
The Church The Body of Christ is our theme for the next few Sunday’s.
These messages are primarily based around Paul’s letter to the Ephesians.
Today we are discussing, The Goal of the Church.
Scripture Reading
Ephesians 4:7-16 NKJV
Spiritual Gifts
7 But to each one of us grace was given according to the measure of Christ’s gift.
8 Therefore He says: “When He ascended on high, He led captivity captive, And gave gifts to men.”
9 (Now this, “He ascended”—what does it mean but that He also [a]first descended into the lower parts of the earth?
10 He who descended is also the One who ascended far above all the heavens, that He might fill all things.)
11 And He Himself gave some to be apostles, some prophets, some evangelists, and some pastors and teachers,
12 for the equipping of the saints for the work of ministry, for the [b]edifying of the body of Christ,
13 till we all come to the unity of the faith and of the knowledge of the Son of God, to a perfect man, to the measure of the stature of the fullness of Christ;
14 that we should no longer be children, tossed to and fro and carried about with every wind of doctrine, by the trickery of men, in the cunning craftiness of deceitful plotting,
15 but, speaking the truth in love, may grow up in all things into Him who is the head—Christ—
16 from whom the whole body, joined and knit together by what every joint supplies, according to the effective working by which every part does its share, causes growth of the body for the edifying of itself in love.
Introduction.
The total impression of this passage from Ephesians 4 is that Christ has a goal, a supreme standard for His church, and that goal is so high, so exalted that it taxes the imagination to comprehend it.
Nonetheless, here and now, in the body of this flesh, we are to strive to attain it.
Specifically, this passage leaves three impressions on the mind and the heart.
First, Christ has given us the grace whereby we may reach the goal.
Second, the means of growth for reaching that goal are at hand.
And third, we must not stop nor be satisfied short of the goal, no matter how high the standard nor how great the difficulties in the way.
- Grace for reaching the goal Christ has for His church.
We must never take our eyes away from the grace of God.
We are always to remember that we are not Christians because we deserve to be.
We have not been brought “out of death into life” because of any merit of our own.
The whole Christian transaction, whereby we cease to live unto sin and begin to live unto God, is all go grace, God’s grace.
Two things strike us about this grace, this free gift go Christ toward those who are His own.
First, there is its impartiality.
Ephesians 4:7 says, But to each one of us grace was given according to the measure of Christ’s gift.
Not just a few of the church, not just the Pastor or the leaders, but “each one of us.”
Although “according to the measure of Christ’s gift,” the capacity of one member might exceed that of another, no member of His churches left completely dispossessed.
His gifts are measured not by any favouritism on God’s part, for His love is everywhere and for everyone all the same.
God’s grace is impartial.
Secondly, there is individuality.
God’s gifts are specifically fitted to the capacity of each individual to receive them.
It follows, therefore, that each person in the church has a task cut out just for that person “according to the measure of the gift of Christ” in equipping him or her to do that task.
Paul said, in Ephesians 4:11, And He Himself gave some to be apostles, some prophets, some evangelists, and some pastors and teachers.
And this is not a complete list.
The fact that Christ’s churches are not challenging our sin riddled society and moving this needy world toward God is not His fault.
He has given His people the grace to move toward the goal of “the measure of the stature of Christ.”
2. Growth toward the goal Christ has for His church.
Paul said in Ephesians 4:15 that we, “but, speaking the truth in love, may grow up in all things into Him who is the head—Christ—“
Paul called some in the church at Corinth who had not grown, in 1 Corinthians 3:1, And I, brethren, could not speak to you as to spiritual people but as to carnal, as to babes in Christ.
He was saying to them, “You haven’t grown a bit as Christians since the days you were converted. You are baby Christians, wholly immature.”
How may Christian growth be obtained?
What are the means?
Paul gave several suggestions.
First, we grow by stability Christian convictions.
In typical fashion, Paul mixed his metaphors here to describe the instability of immature Christians, picturing them as infants being tossed by the waves like an unanchored ship driven about by a turbulent sea.
Instability of Christian convictions is one sure sign of immaturity of Christian character, while stability is a sure means of growth.
There is such a thing as Christian certitude, or absolute confidence, as “the rock of ages.” For our feet, as a standard in religion.
Isaiah 26:4, Trust in the Lord forever, For in Yah, the Lord, is everlasting strength.
God’s Word, is an anchor and stay for our faith.
Apart from the certainty of our faith and stability of convictions, we don’t grow very much.
Second, we grow by sincerity of Christian love.
Ephesians 4:15, but, speaking the truth in love, may grow up in all things into Him who is the head—Christ.
The marginal reading says, “But dealing truly in love.”
The problem is that we have no verb for truth in English, while the Greek does.
Literally Paul said, “But trotting in love.”
The import of his words is that our manner of life is to be sincere and true, thinking truly, speaking truly, dealing truly, and all in a spirit of genuine love, without diversions to divide our allegiance, without hypocrisy to deny our witness, without divisions to hinder our purpose in Him.
“Truthing” in love, love for Christ, for one another, for those who are lost.
Thirdly, we grow by solidarity of the Christian community.
Ephesians 4:15-16, but, speaking the truth in love, may grow up in all things into Him who is the head—Christ— from whom the whole body, joined and knit together by what every joint supplies, according to the effective working by which every part does its share, causes growth of the body for the edifying of itself in love.
Again Paul used the figure of the human body, “from whom the whole body, joined and knit together by what every joint supplies.”
All the members of the church are knit and joined together.
Every member is joined to every other member.
What is for the good of one is for the good of all, and what causes the hurt of one is for the injury of all.
Where there is no solidarity of purpose and unity of spirit in the church, there can be no growth.
3. The greatness of the goal Christ has for His church.
How great and how high is Christ’s goal for His church?
Paul took his readers step by step to the top.
After naming the gifts that Christ through grace gives to individuals in the church, he told why.
First, for the perfecting of the saints.
The word translated “perfecting” means “mending,” the same word that is used where we are told of fishermen “mending their nets.”
When members of the church are quick tempered, gossips, busy bodies, and empty headed, Paul said we must, “mend these things.”
Why?
Second, “Unto the work of ministering, unto the building up of the body of Christ.
Ephesians 4:12, for the equipping of the saints for the work of ministry, for the edifying of the body of Christ.
This is to the end that Christ might have a fit and usable instrument through which He can nurture His saints, grow His children, and save the lost.
Thirdly, he goes on, “Till we all attain.”
Christ’s ideal for His church is not for just a few choice souls who excel, not for just a few who reach the top, but for every member of His church, all of His own people.
Fourthly, but Paul moved higher yet again.
Ephesians 4:13, till we all come to the unity of the faith and of the knowledge of the Son of God, to a perfect man, to the measure of the stature of the fullness of Christ.
Paul was saying, “Till we all come to His standard of unity and maturity, full grown and united, no differences of opinion in the Lord, no divergences of conviction, no divisions of spirit.”
We say, “Surely that is the top! We could come no nearer to perfection than that.”
But Paul wasn’t finished!
The goal is one step higher.
Listen to the grand and soaring height of the goal.
“To the measure of the stature of the fullness of Christ.”
Humans can move no nearer God’s likeness than that, thinking like Christ in our minds, loving like Christ in our hearts, resembling Christ in our lives, giving ourselves to the purposes of God as He gave Himself, reminding people of God because we are fashioned in the likeness of His Son.
Conclusion.
Do you see the point of this great passage?
Paul laid tremendous emphasis on the church, the body of believers, not on its size but on its soul quality.
He had a burning desire to win souls, but he believed with all his heart that exalted Christian character within the church was the surest means of doing this.
This comes home to us, we cannot avoid it.
We emphasise quantity but not quality.
We glory reports, but do not demand repentance.
We have with and breath but neither height nor depth.
Our churches grow in size, but our members do not grow spiritually.
It is useless to add members who do not grown Christ.
We are cursed with a low ideal.
We are plagued with and unworthy contentment.
We are satisfied far short of the goal.
Let us pray over this passage until a fire is kindled in our hearts and becomes a raging force that drives us to the standard set by the Lord.
Until next time
Stay in the Blessings
I really want to encourage you to be diligent with your Bible study time, because God has so much more for us than we can get from just going to church once or twice a week and hearing someone else talk about the Word.
When you spend time with God, your life will change in amazing ways, because God is a Redeemer. Theres nothing thats too hard for Him, and He can make you whole, spirit, soul and body!
You’re important to God, and you’re important to us at The Refinery.
When it comes to prayer, we believe that God wants to meet your needs and reveal His promises to you.
So whatever you’re concerned about and need prayer for we want to be here for you! Or even if you just want to say Hi, you can contact us at www.refinerylife.org
2024 IS A YEAR OF DECISIONS AND OPEN DOORS
© www.refinerylife.org 2013-2024 All rights reserved. Except as permitted under the Australian Copyright Act 1968, no part of this Article may be reproduced, stored in a retrieval system, communicated or transmitted in any form or by any means without the prior written permission.
This episode is brought to you by Refinery Life Australia:
If you enjoy The Refinery Life Radio Podcast you can help support The Refinery by doing the following:
Sow an offering: Bitcoin: bc1qqh6720t2zagj72dyfj348az698tdut3hlecaj4
Online: https://www.refinerylife.org/donate/
If you do send an offering then please email us so that we can say thank you
Subscribe on iTunes | Spotify | YouTube | TuneIn | Rumble | Flare | Zap.Stream | Fountain |
Share The Refinery with your friends and family
Subscribe to the newsletter on www.refinerylife.org
Follow The Refinery on Twitter | Nostr | Instagram | Fountain |
-
@ 1b0706e7:ec11b9b3
2024-06-24 18:55:19I was inspired to start a meetup after watching a video on twentyone.world.
The idea is to create a beacon in Cyberspace so I started it on nostr. I met one guy one the Orange Pill app and talked to him a little on nostr. We met for coffee, It was great. I met several bitcoiners who I will not name, but I only met two people from meetup.com. They were very nice, but were more into "crypto" trading than bitcoin. This was awkward for me because I find the field of cryptography(a branch of mathematics) fascinating, but am also not interested in shilling scam-coins that don't make any sense like "garbage trucks on a blockchain" or whatever.
Therefore, I regret to inform you that I am ending the riverside bitcoin meetup subscription. I have decided to create my own website instead. You can hear some of the shoutouts I've left on Rabbit Hole Recap or find us here.
https://riversidebitcoin.com
We now meet every Thursday at GreyWolf Brewery in Norco, California from 4p.m -6 .m. Bitcoin accepted here. The Coffee Meetup on July 6th will be the last one for a while as I want to work on some front end development to make better POS terminals for businesses that accept bitcoin.
npub1rvrsde6r0w7unk3am48md5us4gsx536dq5qh6utedkhhemq3hxesehc89n
-
@ c43d6de3:a6583169
2024-06-24 16:56:56"If you do tomorrow what you did today, you will get tomorrow what you got today." - Benjamin Franklin
Seize the Day
Image from article- https://community.thriveglobal.com/want-your-authentic-self-mindfulness-is-a-gateway/Confliction
There are two conflicting approaches to life: Delay gratification today for a wealthy tomorrow and carpe diem Seize the Day and live like today is your last. Usually, when someone prescribes delayed gratification they refer to finances; save a dollar today for a hundred tomorrow. Carpe diem often refers to smelling the coffee, enjoying the little things and not putting off for tomorrow what could've been done today.
I've never felt the two of those prescriptions collide more violently than now as a father of two beautiful kids. I find it more difficult than ever before to make decisions that might benefit my future over being present for my kids. Time being the finite thing that it is, often I can only choose one.
Image from Adobe ImagesTwo Fathers, Two Approaches: Enough Small Moments Equal A Big Moment My brother in-law and I have different approaches to this. He tends to delay gratification. More often than not, he's out on business and misses minor family events and outings. Meanwhile, I often choose to attend even the smallest family events as opposed to going on business.
I should mention, my brother in-law doesn't dare miss the big events. He's always there for a birthday, baptism, or graduation but he misses outings to the beach or spring. He misses the books read by the bed and the dimming of the light just before a kiss goodnight.
If you miss enough small moments, you a miss big one.
Image from article- https://www.spiritualmom.com/god-is-weaving-a-tapestry/
Since my children were born I vowed to live as much in the moment as I could. In the moment, I'm happy to be with my kids stitching together cherished mementos that will be the tapestry of our lives. These indelible memories not only serve to make me happy but, I believe they'll work as the sinews and tendons that come together to form my children's personality and identity. My relationship with my kids and family will tighten as their persona grows.
I don't have facts from studies or scientific analysis, but I have a gut feeling its the strength of the tapestry of our lives that determines how resilient my children will be. When they encounter hard times they'll carry the uplifting memories of good times and they'll have the comfort of knowing there's a tightknit family at their backs to get through it.
That said, I've never heard my brother in-law complain about money.
I can't say I struggle for cash either. I make ends meet, but my wife and I have experienced that nervous rush when the AC blows out mid-summer and we wonder if we would have enough to pay for the down payment of a new unit and the mortgage at the beginning of the month.
What's been bothering me most as of late is my damn near non-existent retirement fund.
Image from ANATOMY OF A SOLDIER BY HARRY PARKER REVIEW - UNUSUAL PERSPECTIVES ON WARFARE FICTION
Commitments- To My Nation, To My Self
My biggest conflict today is tied to the commitment I made to the United States Army Reserves years before the birth of my children. While I can decide not to go on business like my brother in-law does, I can't simply not attend drill (one weekend a month) or go off on annual training (2–3 weeks a year). Failure to attend to my military obligations can result in a dis-honorable discharge. Having that hanging over my head will forever ruin any lucrative opportunities for employment and public service.
More often than not, my relatively small obligation to the Army Reserves has stood in direct conflict with my desire to be present in my kids lives as well as the lives of my friends and family. Some how, I've had the misfortune of having drills and annual training scheduled on major events like weddings, baptisms, and birthdays; the very things I vow never to miss.
There are ways to request those special days off and make it up on a later date and when I can, I do. However, I've been forced to go unaccounted for on several occasions when special events are back to back and overlap with already requested days off. That's led to conflict in the past but, I've been fortunate enough to have good leaders who've understood why I preferred to be absent in the military over absent in a major life event. It would be easiest, and most convenient, to resign my congressional commission as an officer and leave the Army Reserves. This is when I feel that great internal conflict.
Serving in the Army Reserves allows me to give back to my nation and grants me several financial benefits that would otherwise be completely lost. Medical insurance is remarkably cheaper than what I would have to deal with as a civilian. I get a world of benefits when purchasing a house and I can apply for special grants if ever needed. Perhaps most important of all, if I stick around for the full 20 years (I have almost 9 now) I will have a very nice retirement pension waiting for me when I turn 65. This is where that differed gratification really kicks in.
When I really boil it down to pros and cons, there's just way too many pros to staying in the Reserves than cons.
Image of Jordan Peterson from Video Clip- "4 years video"
Phases of Life Approach
World renown psychologist Jordan Peterson says "you have little kids for 4 years and if you miss it, its done." For Jordan, this is time period is peak experience for your kids. As I write this, my eldest just turned two and my youngest is 9 months. I'm not quite halfway there yet and I can't let up now.
I don't want to test to see if what Jordan Peterson says is true, I'm going to continue living as much in the moment as is possible during these early years of my children's lives. If I stay in the army reserves throughout this time I will have had 13 years of service by the time my youngest is 4.
Taking this approach, I will have been very present in the first 4 years of my kids lives and will only have to serve seven more years to acquire that retirement.
For me, today is Gold and tomorrow is Silver.
People have sacrificed worse.
artstr #plebchain #writing
I want to show the world that life is a scroll riddled with ink. The marks will only ever be simple blots on the parchment unless you pause and perceive them for the characters they are.
I'm constantly thinking about what the future could look like if we just take action.
More of my thoughts about the future and the world around us are coming soon...
Thank you for Reading this article. If you liked it and would consider zapping some sats, doing so supports me and motivates me to continue writing!
If you are interested in Fiction writing, visit my NOSTR page Fervid Fables: npub1j9cmpzhlzeex6y85c2pnt45r5zhxhtx73a2twt77fyjwequ4l4jsp5xd49
-
@ 0861144c:e68a1caf
2024-06-24 16:30:24Paraguay recently made another adjustment to the minimum wage, which automatically translated into a 4% loss in purchasing power. In other words, any savings in fiat currency have lost 4% of their value.
Educated people don't want help
I always remember an occasion during a conversation with friends, some with MBAs and others with finance degrees, when I mentioned that Bitcoin could help escape inflation due to its hardness as a currency. - Comment 1: Bitcoin is useless because it's volatile. - Comment 2: As long as the government doesn't regulate it, no one will want to put their money into it. - Comment 3: There are many financial instruments to buy something that is volatile and backed by nothing.
I responded to these three comments, but my words fell on deaf ears, and the topic soon changed. As we searched for new topics, I thought to myself that we are too early. It always reminds me of that movie "The Big Short" (2008), where, when asked why the market hasn't collapsed yet, the famous phrase is uttered: they think their feet, which are being cooked, are actually the steak.
Offer bitcoin to everyone anon
I feel sorry for them, and yet tomorrow will be the same as always. Even when Bitcoin is on its upward trend, it will be there for them. While some see it as a get-rich-quick scheme, my satoshis today are ensuring that my future is not stolen. Bitcoin is not a sword with which we will win any battle in the endless maze; Bitcoin is the way out.
-
@ 5d4b6c8d:8a1c1ee3
2024-06-24 13:33:41Read the previous edition here.
June 24th, 2023 📅
📝
TOP POST
Don't feel bad about being too late to Bitcoin.
Excerpt:
So don't feel bad that you missed out about Bitcoin in 2017, or 2021. It doesn't matter what Bitcoin was worth then or now in fiat terms. It matters that we keep learning about Bitcoin and sharing it with others. Then one day we can all have economic freedom and savings.
3495 sats \ 35 comments \ @graben \ ~bitcoin
💬
TOP COMMENT
https://stacker.news/items/198729/r/Undisciplined?commentId=198755
IMO there is no "too late". If you buy now then yes your purchasing power will probably increase dramatically over the years, but even if adoption saturates Bitcoin is still a worthwhile asset to buy / earn due to all of its other wonderful properties.
From Don't feel bad about being too late to Bitcoin.
805 sats \ 0 replies \ @orthwyrm
🏆
TOP STACKER
@k00b
9664 stacked \ 16.8k spent \ 3 posts \ 34 comments \ 0 referrals
https://imgprxy.stacker.news/fsFoWlgwKYsk5mxx2ijgqU8fg04I_2zA_D28t_grR74/rs:fit:960:540/aHR0cHM6Ly9tLnN0YWNrZXIubmV3cy8yMzc5Ng
June 24th, 2022 📅
📝
TOP POST
I'm Sergej Kotliar, CEO of Bitrefill. AMA.
Excerpt:
Hi everyone! I’m @ziggamon, Founder and CEO of Bitrefill. Bitrefill is the world’s number one answer to the question “but what can I actually buy with my bitcoin?”
21k sats \ 69 comments \ @ziggamon \ ~bitcoin
💬
TOP COMMENT
https://stacker.news/items/38569/r/Undisciplined?commentId=38570
Excerpt:
yes and we don't tell each other our user names so we can try and guess who is who lol! (Still don't know)
From Do you share Stacker News with family or friends?
380 sats \ 0 replies \ @plebpegasus
🏆
TOP STACKER
@k00b
1409 stacked \ 18.6k spent \ 7 posts \ 12 comments \ 0 referrals
https://imgprxy.stacker.news/fsFoWlgwKYsk5mxx2ijgqU8fg04I_2zA_D28t_grR74/rs:fit:960:540/aHR0cHM6Ly9tLnN0YWNrZXIubmV3cy8yMzc5Ng
June 24th, 2021 📅
📝
TOP POST
Fighting Monetary Colonization with Open Source Code
link to https://bitcoinmagazine.com/culture/bitcoin-a-currency-of-decolonization
2 sats \ 0 comments \ @k00b \ ~bitcoin
💬
TOP COMMENT
EMPTY
🏆
TOP STACKER
EMPTY
-
-
@ 6c8c7979:15595f3e
2024-06-24 08:45:18Vincent van Gogh is one of the most prominent artists in the history of global art, with a significant influence on modern artistic movements. He was born in the Netherlands in 1853 and passed away in 1890. Despite not achieving fame during his lifetime, his works later became among the most impactful in fine arts.
Van Gogh's works are characterized by vibrant colors and rapid brush strokes, giving his paintings a unique style. His pieces often reflect nature and everyday life with a touch of deep emotion and drama. Some of his most famous works include "Starry Night," "The Night Cafe," "Irises," and "Wheatfield with Crows."
Throughout his life, van Gogh faced numerous personal and psychological challenges, which imbued his works with a sense of depth and contemplation. He struggled with severe mental disorders and social tensions, which greatly influenced his art.
After his death, public interest in his works grew significantly, and he came to be regarded as a pioneer of expressionism and modern art. His profound impact on global art is evident in the many movements and subsequent artists who drew inspiration from his techniques and subjects.
In summary, Vincent van Gogh remains an exceptional artistic figure, leaving an unforgettable legacy in art history. His works continue to inspire and captivate audiences worldwide with their beauty and artistic depth.
-
@ 11be7dbc:82a5f8e9
2024-06-24 08:33:15The world is undeniably transitioning onto new tracks, embracing a sharing economy. This shift is not optional but inevitable, propelled by the intrinsic flaws of the current system. Under current geopolitical conditions, it's clear that the era of a dominant currency is ending. Real-time market dynamics reveal that the need for a dominant currency is vanishing. The value of each currency will be determined in real-time trading through supply and demand.
Decentralization and Technological Imperatives
Old systems, desperately clinging to their fading relevance, appear pitiful amid these unstoppable changes. Although the dollar still serves as a benchmark, its time is running out. The issue lies not in US policies or the dollar's legitimacy but in the obsolescence of centralized dominance itself. However, be cautious and don't fall for misinformation predicting the dollar's demise. We must recognize that the US's technological prowess and resource potential will prevent the demise of its national currency. The dollar will join the ranks of national currencies in stable economies, becoming just «one of many».
Algorithms that find optimal trading pairs will simplify transactions, improving global economic indicators. This highlights the inadequacy of smart contracts and fosters the search for more flexible and reactive algorithms to stabilize the global economy where innovation and efficiency reign. The transition to a sharing economy driven by decentralization and relentless innovation is imperative. Skeptics may cling to their withering relics, but progress will crush them, relegating them to mere footnotes in history. The decentralized future is not just on the horizon; it is here, and it is magnificent.
Crypto as Reshaping Economy
The crypto market hinted at this solution, showcasing the future of finance. Ironically, financial giants' attempts to control and regulate through Bitcoin ETFs only fueled the environment they sought to suppress. Adopting protocols like MWEB, which facilitate private and scalable transactions, highlights the practical benefits of decentralization. These technologies enable independent transactions, free from centralized scrutiny and control.
One might almost pity those clinging to the decaying remnants of the old world, if not for the exhilarating prospect of leaving them in the dust—irrelevant and obsolete. The world is moving towards a common trading platform where value is determined by market liquidity. In this new world, diverse crypto assets will hedge against volatility, creating a robust ecosystem for atomic swaps and cross-chain transactions. It is absurd to suggest that a single crypto asset could dominate; the future is diverse assets, each serving different economic functions.
The proliferation of digital assets ensures a resilient, adaptable market where liquidity and accessibility are paramount. Atomic swaps and cross-chain transactions will ensure swift, ubiquitous conversions, eliminating monopolistic players, KYC barriers, and the need for constant exchange searches. Today, the goal is to enter as much capital as possible within the market, creating an irreversible process that will lead us to the use of crypto as a means of payment. This will drive innovation, constantly stimulating humanity to develop and seek new solutions and opportunities.
The Role of Modern Technologies
Artificial intelligence acts as our assistant, a sophisticated calculator enhancing our productivity. Modern technologies are not the genius of one person but products of their time. And the concentration of money in the hands of a few reflects societal infantilism; we still possess a child's mindset. Our behavior towards money reflects this: like children, we either hide it or spend it on fleeting, flashy nonsense. Rarely does a child give money to their parents, think to help loved ones, or understand its true utility. Without knowing the ability to use money, it remains inaccessible to most of the population, similar to how money is controlled by parents in a family.
This is evident in the market's fascination with meme coins—a testament to human folly and a craze highlighting the need for a more mature system. We must realize that meme coins do not drive technological advancement; the liquidity resulting from sales leaves the market instead of supporting growth in production and industry development. The challenge is to balance the crowd's madness, greedily hopping from one meme coin to another. The solution is to create a market where real economic transactions dominate over the frivolous gambles of amateur traders. This will foster a more stable environment, recalibrating market dynamics so that real economic activity, not the whims of speculative traders, drives the market.
In conclusion, the transition to a sharing economy, driven by decentralization and relentless technological progress, heralds a new era of economic freedom and innovation. The MWEB protocol with swaps represents the future, enabling the development of Cyberyen. We have an open gate that is entirely free, without violating any regulatory rules or national properties. We can swap Cyberyen paired with Bitcoin, always available on decentralized exchanges globally. Using the MWEB protocol for private transactions helps scale the network and maintain independence from regulatory burdens and centralized exchange platforms.
Consider the opportunities available for Cyberyen, despite seemingly contrary regulatory policies. A parallel dimension has opened. Old economic paradigms are collapsing, giving way to a future of transparency, confidentiality, and unstoppable progress. This is the power of decentralization and freedom from market-imposed constraints. Those who resist these changes will find themselves relegated to the dustbin of history.
Stay with us... C¥kuza
-
@ 6a39a186:88f51c19
2024-06-24 07:55:21Privacy, Security, and Real-World Applications
We Are Still Early
Concerning Bitcoin, privacy and security remain paramount. As an enthusiast in Ecash privacy and security, I aim to shed light on some of the most promising and undervalued Bitcoin frameworks. These frameworks offer robust solutions for enhancing privacy, security, and scalability, making Bitcoin more adaptable for various industries. Lets's examine their strengths and weaknesses, supported by real-world examples.
1. Mimblewimble: Enhancing Privacy and Scalability
Overview
Mimblewimble is a privacy-centric blockchain protocol designed to enhance the confidentiality and scalability of Bitcoin transactions. Mimblewimble uses cryptographic innovations to obscure transaction details while ensuring network security.
Strengths
- Enhanced Privacy: Mimblewimble transactions are confidential, hiding transaction amounts and addresses.
- Scalability: The protocol significantly reduces blockchain bloat, improving efficiency and speed.
- Security: By using cryptographic primitives, Mimblewimble ensures that transactions are secure and verifiable.
Weaknesses
- Compatibility: Mimblewimble is not fully compatible with Bitcoin’s existing infrastructure, requiring significant changes to the network.
- Complexity: The protocol's complexity can be a barrier to understanding and adoption.
Real-World Example: Grin and Beam
Grin and Beam are two cryptocurrencies that have implemented Mimblewimble. Grin focuses on simplicity and community-driven development, while Beam emphasizes user-friendly interfaces and governance structures. Both projects demonstrate Mimblewimble’s potential in providing enhanced privacy and scalability.
2. Lightning Network: Scaling Bitcoin Transactions
Overview
The Lightning Network is a second-layer solution designed to enable fast and low-cost transactions on the Bitcoin network. By creating off-chain transaction channels, the Lightning Network alleviates congestion on the main blockchain.
Strengths
- Speed: Transactions on the Lightning Network are nearly instantaneous.
- Low Fees: Off-chain transactions significantly reduce transaction costs.
- Scalability: The network can handle millions of transactions per second, far exceeding the main blockchain's capacity.
Weaknesses
- Liquidity: Users need to lock up funds in channels, which can limit liquidity.
- Complexity: Setting up and managing channels can be technically challenging.
- Security: Off-chain transactions require robust security measures to prevent fraud and ensure reliability.
Real-World Example: El Salvador’s Bitcoin Adoption
El Salvador’s adoption of Bitcoin as legal tender showcases the Lightning Network’s capabilities. The government and businesses use the network to facilitate everyday transactions, demonstrating its effectiveness in a real-world economy.
3. Taproot and Schnorr Signatures: Improving Privacy and Efficiency
Overview
Taproot and Schnorr signatures are recent upgrades to the Bitcoin protocol that enhance privacy, security, and efficiency. Taproot allows complex transactions to appear as simple ones, while Schnorr signatures enable aggregation, reducing data size.
Strengths
- Privacy: Taproot masks the complexity of transactions, enhancing privacy.
- Efficiency: Schnorr signatures reduce the data size of transactions, improving blockchain efficiency.
- Security: Both upgrades maintain Bitcoin’s robust security model.
Weaknesses
- Adoption: Widespread adoption of these upgrades is still in progress.
- Complexity: Implementing and understanding these changes require technical expertise.
Real-World Example: Taproot Activation
The activation of Taproot in November 2021 marked a significant milestone for Bitcoin. It demonstrates the network’s ability to evolve and adopt new features that enhance privacy and efficiency. Various Bitcoin services and wallets are beginning to integrate Taproot, showing its practical benefits.
4. Sidechains: Expanding Bitcoin’s Capabilities
Overview
Sidechains are independent blockchains that run parallel to the Bitcoin mainchain. They enable experimentation with new features and scalability solutions without affecting the main network.
Strengths
- Flexibility: Sidechains allow for the development and testing of new features.
- Scalability: They can handle additional transactions, reducing load on the main blockchain.
- Interoperability: Sidechains can interact with the main Bitcoin network, enhancing its functionality.
Weaknesses
- Security: Ensuring the security of sidechains can be challenging.
- Complexity: Developing and maintaining sidechains require significant technical expertise.
Real-World Example: Liquid Network
The Liquid Network, developed by Blockstream, is a sidechain that enhances Bitcoin’s functionality for traders and exchanges. It provides faster settlements and confidential transactions, showcasing the practical benefits of sidechains.
5. CoinJoin: Strengthening Transaction Privacy
Overview
CoinJoin is a privacy-enhancing technique that combines multiple Bitcoin transactions into a single transaction, making it difficult to trace individual inputs and outputs.
Strengths
- Enhanced Privacy: CoinJoin obscures transaction details, improving user privacy.
- Community Support: Widely supported by the Bitcoin community and integrated into several wallets.
Weaknesses
- User Experience: The process can be complex and may require additional steps for users.
- Partial Privacy: While it improves privacy, it is not foolproof and can still be subject to analysis.
Real-World Example: Wasabi Wallet
Wasabi Wallet is a Bitcoin wallet that implements CoinJoin to enhance user privacy. It provides an intuitive interface for conducting private transactions, illustrating CoinJoin’s practical application.
Make The Ecosystem Happen
The evolution of Bitcoin frameworks continues to push the boundaries of what is possible in the realm of digital currency. From Mimblewimble’s privacy and scalability enhancements to the Lightning Network’s speed and efficiency, these frameworks offer promising solutions to current challenges. Real-world examples like El Salvador’s Bitcoin adoption and the Liquid Network’s advancements highlight the practical benefits and potential of these technologies. As the Bitcoin ecosystem evolves, these frameworks will play a crucial role in shaping the future of digital finance, ensuring privacy, security, and scalability for users worldwide.
Further Reading
For those interested in delving deeper into the frameworks discussed in this article, here are some recommended resources:
- Mimblewimble:
- Mimblewimble: What is it? How It Works?
- Grin
-
Lightning Network:
- The Lightning Network For Businesses and Developers
- Historical Look At Bitcoin Adoption In El Salvador
-
Taproot and Schnorr Signatures:
- Taproot: The Next Major Upgrade for Bitcoin
-
Sidechains:
- Blockstream’s Liquid Network
-
CoinJoin:
- Wasabi Wallet
- Understanding CoinJoin
-
@ dd664d5e:5633d319
2024-06-24 06:05:05The new Great Library
We have all heard tales of Amazon or other booksellers banning customers from their bookstores or censoring/editing purchased books. The famous Project Gutenberg, and similar organizations, are performing a good work, to help protect many of our precious books from this fate, but it is merely a centralized website and therefore not censorship resistant. Also, it mostly posts books in English or German.
So, we at nostr:npub1s3ht77dq4zqnya8vjun5jp3p44pr794ru36d0ltxu65chljw8xjqd975wz have decided to move Project Gutenberg to Nostr and house it in the most distributed way possible: on relays. Specifically, our new, public Citadel relay for out-of-print books (and other documents), but also on any relay, anywhere.
And, because we are a very humble group, we're naming the effort "Alexandria". And the first book to be printed on Nostr is the Bible because obviously.
Why on relays?
Well, why not on relays? Relays are one of the few widely-distributed databases for documentation in existence. The relay database spans the entire globe and anyone can maintain their own relay on their personal computer or mobile phone.
That means that anyone can house their own books. Which books are their own? Any books they have in their own possession. Any books someone would have to physically pry out of their cold, dead, computer.
Notes are perfect for publishing
Once we begin generating eBooks from notes with an associated header (which will be quite easy to do, so long as they are written in markdown or similar), they will also be readable, downloadable, and storable in ePub format (see Pandoc). And it is, after all, only a matter of time until someone enterprising makes an ePaper Nostr client for calmer reading of notes, and then you can download and read them, without having to bother converting beforehand, which maintains their Nostr-navigation.
The new event kind 30040 allows us to take any sort of note containing any sort of characters and create a type of "note collection" or "book of notes", "journal of notes", "magazine of notes". And it can be nested or embedded in other notes, creating any sort of note-combination and note-hierarchy you can think of, only limited in size by the ability of your computer to processes the relationships.
Save the Zettels
The associated kind 30041 adds the prospect of breaking longer texts or articles up into sections or snippets (called "Zettel" in German). We can then collect or refer to particular bits of a longer text (like a chart, elegant paragraph or definition, data table), directly. Anyone can create such snippets, even of texts they didn't write, as they can add a reference to the original publication in the tags of the new event.
This means we no longer have to "copy-paste" or quote other people's works, we can simply tie them in. If we worry about them being deleted, we can fork them to create our own, digitally-linked version, and then tie that in. This means that source material can be tied to the new material, and you can trace back to the source easily (using Nostr IDs and tags, which are signed identifiers) and see who else is branching out from that source or discussing that source.
It's gonna be HUGE!
We are making a big, beautiful library... and you are going to build it for us. Anyone, anywhere can therefore publish or republish any document they wish, with Nostr, and store it wherever they have a relay, and view it on any client willing to display it.
You will own something and be happy.
-
@ 6a39a186:88f51c19
2024-06-24 05:57:42The Birth of Ecash and Its Foundational Principles
Imagine a world where money exists only in the mint, a world where financial transactions are instantaneous, secure, and free from the traditional banking systems. Welcome to the revolutionary story of Ecash, the precursor to the modern-day cryptocurrencies that are reshaping our financial landscape.
The Genesis of Ecash
In the early 1980s, as the personal computer was gaining popularity, visionary cryptographer David Chaum pondered a radical idea: creating a form of money that could be transferred electronically while maintaining the privacy of the user. This idea laid the groundwork for Ecash, a digital currency system he developed to provide secure and anonymous electronic transactions.
The Birth of a Digital Currency
David Chaum's pioneering work culminated in the creation of DigiCash in 1989, a company dedicated to bringing Ecash to life. The fundamental principle behind Ecash was simple yet profound: it allowed users to conduct transactions without revealing their identities, similar to the privacy one experiences with physical cash.
Foundational Principles of Ecash
Ecash was built on several foundational principles that set it apart from traditional financial systems:
1. Privacy and Anonymity
Chaum's design ensured that transactions were private. By using cryptographic techniques, Ecash allowed users to transfer money without disclosing their personal information, providing a level of anonymity akin to physical cash transactions.
2. Security
Security was paramount in the design of Ecash. The system employed advanced cryptographic protocols to prevent double-spending and ensure that transactions were tamper-proof. This made Ecash a trustworthy medium of exchange in the digital realm.
3. Decentralization
Although DigiCash was a centralized company, the concept of Ecash laid the groundwork for future decentralized currencies. The idea was to remove the need for a central authority, allowing transactions to occur directly between parties.
Questions to Ponder
- Can you imagine conducting transactions without the fear of your personal information being exposed?
- How would a truly anonymous digital currency change the way we think about money and privacy?
Life After Ecash Invention
Ecash, though revolutionary, faced challenges in widespread adoption. However, its principles greatly influenced the development of modern cryptocurrencies. For instance, Bitcoin, introduced in 2009 by the pseudonymous Satoshi Nakamoto, incorporated many of Ecash's foundational ideas, such as decentralized control and cryptographic security.
Freedom To Transact
""You can pay for access to a database, buy software or a newsletter by email, play a computer game over the net, receive $5 owed you by a friend, or just order a pizza. The possibilities are truly unlimited." - Cryptographer, Dr. David Chaum
A Legacy of Innovation
The birth of Ecash marked the beginning of a digital revolution in the financial world. Though it did not achieve mainstream success, its foundational principles of privacy, security, and decentralization continue to influence the development of digital currencies today. As we navigate the ever-evolving landscape of digital finance, the legacy of Ecash reminds us of the enduring importance of these principles in creating a secure and equitable financial future.
Ecash was not just a technological innovation; it was a visionary step towards redefining the very nature of money in our increasingly digital world.
Blind Signatures: The Core of Ecash
At the heart of Chaum's Ecash system was the innovation of "blind signatures." To grasp this concept, let's first understand public key cryptography.
Public Key Cryptography Basics
Public key cryptography involves key pairs: a public key and a private key. The private key generates the public key, and while the public key can be shared, the private key remains secret. This system allows for secure communication and verification of digital signatures. When Alice signs a document with her private key, Bob can verify her signature using her public key, ensuring authenticity without revealing the private key.
How Blind Signatures Work
Blind signatures take this process a step further. Here's a simplified explanation: 1. Scrambling the Data: Bob generates a nonce (random number) and combines it with a piece of data, scrambling it. 2. Blind Signing: Bob sends the scrambled data to Alice, who signs it blindly, meaning she cannot see the original data. 3. Verification: The signature Alice provides is linked to both the scrambled and original data. Anyone, including Alice, can verify the signature using Alice's public key.
Ecash: Applying Blind Signatures
Chaum utilized blind signatures to create Ecash, a digital currency system that maintained user privacy while ensuring transaction security.
- Creating Digital Banknotes: Bob generates unique serial numbers for digital banknotes and scrambles them before sending them to Alice Bank.
- Blind Signing by Bank: Alice Bank signs the scrambled banknotes, deducting the equivalent amount from Bob's account.
- Transacting with Ecash: Bob sends the unscrambled banknotes to Carol as payment. Carol then forwards them to Alice Bank for verification.
- Verification and Deposit: Alice Bank verifies the signatures and checks for double-spending before adding the amount to Carol's account.
The Rise and Fall of DigiCash
In 1990, Chaum founded DigiCash in Amsterdam to commercialize Ecash. The system gained interest from several banks, including Deutsche Bank and Credit Suisse. However, despite initial success and significant interest, DigiCash struggled to achieve widespread adoption.
Missed Opportunities and Challenges
DigiCash faced challenges in forming critical partnerships. Notable offers included: - Microsoft’s offer to integrate Ecash into Windows 95. - Visa’s $40 million investment proposal. - Partnership interests from major Dutch banks ING and ABN Amro.
Despite these opportunities, DigiCash could not secure a sustainable business model, leading to its eventual bankruptcy in 1998.
Legacy and Influence on Cryptocurrencies
While DigiCash and Ecash did not achieve commercial success, Chaum's innovations inspired a generation of cryptographers and technologists. The principles of privacy, security, and decentralization influenced the development of cryptocurrencies, most notably Bitcoin.
Reflections on Ecash’s Impact
Ecash introduced the concept of privacy in digital transactions, a revolutionary idea at the time. Although Bitcoin and other cryptocurrencies differ in design, the foundational principles of Ecash continue to shape the digital currency landscape.
"As payments on the network mature, you're going to be paying for all kinds of small things, more payments than one makes today. Every article you read, every question you have, you're going to have to pay for it." - David Chaum, 1994
The Enduring Legacy of Ecash
The birth of Ecash marked a significant milestone in the evolution of digital finance. Although it faced challenges in adoption, its foundational principles of privacy, security, and decentralization remain relevant today. Ecash’s legacy lives on, inspiring ongoing innovation in the world of digital currencies and blockchain technology.
In the ever-evolving landscape of digital finance, the story of Ecash reminds us of the importance of safeguarding privacy and security while pushing the boundaries of what is possible in the digital realm.
-
@ a012dc82:6458a70d
2024-06-24 02:12:58Table Of Content
-
Content
-
Conclusion
-
FAQ
-
You May Also Like
-
External Links
Introduction
Bitcoin has been making headlines for over a decade now, and as the cryptocurrency continues to gain mainstream acceptance, more and more people are becoming "Bitcoin maximalists". But what exactly is a Bitcoin maximalist and how can you tell if you're becoming one? In this blog post, we'll take a closer look at the rise of Bitcoin maximalism and identify the 8 signs that you may be becoming a Bitcoin maximalist yourself.
Understanding Bitcoin Maximalism
Bitcoin maximalism is the belief that Bitcoin is the one true cryptocurrency and that all other cryptocurrencies are inferior. Bitcoin maximalists believe that Bitcoin is the only cryptocurrency that truly embodies the principles of decentralization, immutability and scarcity. They believe that Bitcoin is the only cryptocurrency that can truly be considered as "digital gold" and that it will eventually replace fiat currency as the global reserve currency.
The 8 Signs of a Bitcoin Maximalist
-
You only invest in Bitcoin and have no interest in other cryptocurrencies
-
You believe that Bitcoin is the only cryptocurrency that truly embodies the principles of decentralization, immutability and scarcity.
-
You believe that Bitcoin will eventually replace fiat currency as the global reserve currency.
-
You believe that all other cryptocurrencies are inferior to Bitcoin, hence named “shitcoins”
-
You are constantly reading and educating yourself about Bitcoin and its technology
-
You advocate for Bitcoin to your friends, family and colleagues
-
You see the current financial system as flawed and believe that Bitcoin offers a better alternative
-
You believe that the future of money is digital and that Bitcoin will play a major role in this future.
The Benefits of Being a Bitcoin Maximalist
Being a Bitcoin maximalist has many benefits. It allows you to stay focused on the long-term potential of Bitcoin and not get caught up in the hype of other cryptocurrencies. It also helps you to stay informed about the latest developments in the Bitcoin space and to make informed investment decisions. Additionally, Bitcoin maximalists tend to be early adopters of new technologies and are often well-versed in both technology and finance.
Conclusion
In conclusion, Bitcoin maximalism is on the rise as more and more people are beginning to understand the potential of Bitcoin and its technology. By identifying the 8 signs of a Bitcoin maximalist, you can determine whether or not you are becoming one yourself. Being a Bitcoin maximalist offers many benefits, including staying focused on the long-term potential of Bitcoin, staying informed about the latest developments, and being well-versed in both technology and finance.
Frequently Asked Questions
What is Bitcoin maximalism? Bitcoin maximalism is the belief that Bitcoin is the one true cryptocurrency and that all other cryptocurrencies are inferior.
How can I tell if I'm becoming a Bitcoin maximalist? Some signs of becoming a Bitcoin maximalist include only investing in Bitcoin, believing that it will replace fiat currency, constantly educating yourself about Bitcoin, advocating for it, and believing that all other cryptocurrencies are inferior to Bitcoin.
Are there benefits to being a Bitcoin maximalist? Yes, being a Bitcoin maximalist allows you to stay focused on the long-term potential of Bitcoin and stay informed about the latest developments in the Bitcoin space. Additionally, Bitcoin maximalists tend to be early adopters of new technologies and are often well-versed in both technology and finance.
Is Bitcoin maximalism bad? No, Bitcoin maximalism is not necessarily bad. Everyone has the right to hold their own beliefs and opinions. However, it is important to keep an open mind and consider other perspectives.
Is Bitcoin the only cryptocurrency that has potential? This is a matter of personal opinion. Some people believe that Bitcoin is the only cryptocurrency with potential, while others believe that there are other cryptocurrencies with potential as well.
That's all for today
If you want more, be sure to follow us on:
NOSTR: croxroad@getalby.com
Instagram: @croxroadnews.co
Youtube: @croxroadnews
Store: https://croxroad.store
Subscribe to CROX ROAD Bitcoin Only Daily Newsletter
https://www.croxroad.co/subscribe
DISCLAIMER: None of this is financial advice. This newsletter is strictly educational and is not investment advice or a solicitation to buy or sell any assets or to make any financial decisions. Please be careful and do your own research.
-
-
@ 6a39a186:88f51c19
2024-06-24 01:28:00The Superiority of Asymmetric Encryption
Cryptography plays a pivotal role in protecting sensitive information. Two primary forms of encryption—symmetric and asymmetric—are utilized to secure data. This essay argues that while both symmetric and asymmetric encryption have their merits, asymmetric encryption offers superior security and practical advantages in most contemporary applications. By exploring the fundamental differences, strengths, and weaknesses of each type, this essay will demonstrate why asymmetric encryption is the preferred choice for modern cryptographic needs.
Symmetric Encryption
Definition and Mechanism
Symmetric encryption, also known as secret-key encryption, involves the use of a single key for both encryption and decryption. Popular algorithms include AES (Advanced Encryption Standard) and DES (Data Encryption Standard). The process is straightforward: the sender encrypts the plaintext using the key, and the receiver decrypts the ciphertext with the same key.
Strengths of Symmetric Encryption
- Speed and Efficiency: Symmetric encryption is generally faster and more efficient than asymmetric encryption, making it suitable for encrypting large amounts of data quickly.
- Simplicity: The mechanism of symmetric encryption is relatively simple, which can be advantageous in systems with limited computational power.
Weaknesses of Symmetric Encryption
- Key Distribution Problem: The primary challenge with symmetric encryption is securely distributing the key to both parties without interception by malicious actors.
- Scalability Issues: As the number of users increases, the number of unique keys needed for secure communication grows exponentially, complicating key management.
Asymmetric Encryption
Definition and Mechanism
Asymmetric encryption, or public-key encryption, uses a pair of keys: a public key for encryption and a private key for decryption. Notable algorithms include RSA (Rivest-Shamir-Adleman) and ECC (Elliptic Curve Cryptography). The public key is openly shared, while the private key remains confidential.
Strengths of Asymmetric Encryption
- Enhanced Security: The separation of keys eliminates the need for secure key distribution channels. The public key can be freely shared, reducing the risk of key interception.
- Scalability: Asymmetric encryption scales efficiently. Each user has a single pair of keys, simplifying key management in large networks.
- Authentication and Digital Signatures: Asymmetric encryption enables digital signatures, which verify the sender's identity and ensure the integrity of the message. This is crucial for secure online transactions and communications.
Weaknesses of Asymmetric Encryption
- Computational Intensity: Asymmetric encryption is computationally more intensive and slower compared to symmetric encryption, which can be a drawback for real-time applications.
- Complexity: The algorithms involved in asymmetric encryption are more complex, requiring greater computational resources and more sophisticated implementation.
Addressing Resistance against Secure Secret Sharing
Performance Concerns
Critics argue that the computational intensity of asymmetric encryption makes it impractical for certain applications. However, hybrid systems, which combine the strengths of both symmetric and asymmetric encryption, effectively address this concern. In such systems, asymmetric encryption is used to securely exchange a symmetric key, which is then used for the bulk encryption of data. This approach leverages the efficiency of symmetric encryption while maintaining the security benefits of asymmetric encryption.
Complexity and Resource Requirements
While it is true that asymmetric encryption requires more resources, advancements in computational power and optimization techniques have significantly mitigated these challenges. Modern hardware and software are increasingly capable of handling the demands of asymmetric encryption without compromising performance.
Practical Applications and Real-World Relevance
Securing Communications
Asymmetric encryption is integral to securing online communications, including email encryption (e.g., PGP) and SSL/TLS protocols used in securing web traffic. The ability to securely exchange keys and authenticate identities is essential for protecting sensitive information transmitted over the internet.
Digital Signatures and Certificates
Digital signatures, enabled by asymmetric encryption, are crucial for verifying the authenticity and integrity of digital documents. They are widely used in financial transactions, software distribution, and legal agreements, ensuring that the content has not been tampered with and confirming the sender's identity.
Cryptocurrencies and Blockchain
Asymmetric encryption underpins the security of cryptocurrencies like Bitcoin and Ethereum. Public and private keys are used to manage wallet addresses and sign transactions, ensuring secure and verifiable transfers of digital assets.
To Consider
While symmetric encryption offers speed and simplicity, asymmetric encryption provides superior security and scalability, making it the preferred choice for most modern cryptographic applications. The ability to securely distribute keys, authenticate identities, and verify the integrity of messages are critical advantages that asymmetric encryption holds over symmetric methods. By understanding and leveraging the strengths of asymmetric encryption, we can build more secure and resilient digital systems, protecting sensitive information in an increasingly interconnected world. Embracing asymmetric encryption as the foundation for digital security not only addresses current challenges but also prepares us for the evolving threats of the future.
Securing Communications Coventions
-
Email Encryption (PGP/GPG): Pretty Good Privacy (PGP) and its open-source counterpart, Gnu Privacy Guard (GPG), use asymmetric encryption to secure email communications. They ensure that only the intended recipient can decrypt and read the message, maintaining privacy and security.
-
SSL/TLS Protocols: Secure Sockets Layer (SSL) and Transport Layer Security (TLS) are protocols that use asymmetric encryption to secure data transmitted over the internet. They are widely used to secure web traffic, ensuring that data exchanged between a user’s browser and a web server is encrypted and secure.
-
Virtual Private Networks (VPNs): VPNs use asymmetric encryption to establish a secure connection between a user's device and the VPN server. This encryption ensures that data sent through the VPN tunnel is protected from eavesdropping and interception.
-
Secure Shell (SSH): SSH protocols use asymmetric encryption to secure remote login and command execution over an insecure network. SSH ensures that the communication between the client and server is encrypted, preventing unauthorized access.
-
Messaging Apps (e.g., Signal): Secure messaging applications like Signal use asymmetric encryption to encrypt messages end-to-end. This means that only the sender and recipient can read the messages, ensuring that the communication remains private and secure.
Digital Signatures and Certificates Conventions
-
Software Distribution: Software developers use digital signatures to sign their software. This ensures that the software has not been tampered with and verifies the identity of the developer. Users can trust that the software they download is authentic and has not been altered.
-
Financial Transactions: Digital signatures are used to verify the authenticity and integrity of financial transactions. For example, banks and financial institutions use digital signatures to ensure that transaction details are not altered during transmission.
-
Legal Documents: Digital signatures are widely used in signing legal documents and contracts. They provide a way to verify the signer's identity and ensure that the document has not been altered after it was signed.
-
Code Signing Certificates: Developers use code signing certificates to sign their code. This process ensures that the code is authentic and has not been tampered with, providing trust to users who download and install the software.
-
Electronic Invoices and Receipts: Businesses use digital signatures to sign electronic invoices and receipts. This practice ensures the integrity and authenticity of the documents, making them legally binding and verifiable.
Assets and Blockchain Conventions
- Bitcoin: Bitcoin transactions are secured using asymmetric encryption. Public and private keys are used to manage Bitcoin addresses and sign transactions, ensuring that only the rightful owner can verify their Bitcoins.
This forms the backbone of security for modern client server systems enabling change via communities
The Cashu Protocol: Digital Transactions with Enhanced Privacy and Flexibility
So you want to run a mint? When? Sometime Soon?
In the anonymity ecosystem of digital transactions, maintaining privacy and security while ensuring seamless interoperability among Bitcoin layers is paramount. The Cashu protocol, an open-source ecash protocol designed for Bitcoin, offers a groundbreaking solution that leverages the Blind Diffie-Hellmann Key Exchange (BDHKE) to facilitate secure and private digital transactions. This argues that the Cashu protocol's innovative cryptographic mechanisms and open-source nature position it as a superior framework for digital currency transactions, fostering a secure, private, and interoperable ecosystem. By examining the protocol's technical foundations, practical applications, and potential challenges, this essay aims to demonstrate why adopting the Cashu protocol is a forward-thinking choice for digital financial systems.
The Technical Foundations of the Cashu Protocol
Blind Diffie-Hellmann Key Exchange (BDHKE)
At the heart of the Cashu protocol is the BDHKE, which ensures the privacy and security of ecash tokens through a robust cryptographic scheme. The BDHKE involves three key actors: Alice (the sending user), Bob (the mint), and Carol (the receiving user). The process involves a series of steps that obscure the transaction details, making it difficult for unauthorized parties to trace or tamper with the transaction.
- Mint (Bob): Bob publishes a public key (K) derived from his private key (k).
- Alice: Alice picks a secret (x) and blinds it using a random factor (r) to create a blinded message (B_).
- Bob: Bob receives the blinded message and signs it, returning a blinded key (C_) to Alice.
- Alice: Alice unblinds the key to obtain a proof (C), which she can use as a token.
- Carol: Carol can verify the token by sending it to Bob, who checks its validity and adds it to the list of spent secrets if it is genuine.
This process ensures that transactions are conducted privately and securely, with the blinding and unblinding steps preventing any correlation between the tokens and their origins.
Cashu NUTs (Notation, Usage, and Terminology)
The Cashu protocol's specifications are meticulously detailed in the Cashu NUTs, providing comprehensive guidelines for implementation and ensuring compatibility across various applications. These specifications enable developers to create interoperable software that adheres to the protocol, fostering a cohesive and secure ecosystem.
Practical Applications and Implementations
Language Support and Flexibility
The Cashu protocol is supported by multiple programming languages, enhancing its accessibility and implementation flexibility. Examples include:
- Python: Cashu Nutshell Python Library
- TypeScript: Cashu-TS TypeScript Library
- Rust: Cashu-crab and cashu-rs Libraries
- Golang: Cashu-Feni Golang Library
- Kotlin: Cashu Client Library in Kotlin
- Dart: Cashu Dart Library
These libraries allow developers to integrate the Cashu protocol into a wide range of applications, promoting widespread adoption and innovation.
Cashu Mints
Several mint implementations, such as Nutshell (Python), Moksha (Rust), Cashu-rs-mint (Rust), and Feni (Golang), provide robust solutions for secure transactions. The LNbits extension further empowers users by allowing them to run their own Nutshell mint, enhancing control over the security and privacy of their transactions.
Why You Should Focus on Cashu Development
Operational Concerns
Critics might argue that the cryptographic complexity of the Cashu protocol could impact performance and scalability. However, the protocol's design includes optimizations that mitigate these concerns. For instance, the use of efficient cryptographic algorithms ensures that transactions are processed swiftly, even as the volume of transactions increases. Additionally, the open-source nature of the protocol allows for continuous improvements and optimizations by the developer community.
How would I use this and Would Others use it
Alot of users worry about the usability and chance of others using the protocol. While the technical nature of the Cashu protocol might seem daunting to some users, the availability of detailed documentation (Cashu NUTs) and implementation libraries in multiple programming languages lowers the barrier to entry. By providing clear guidelines and versatile tools, the protocol facilitates broader adoption and practical implementation across diverse platforms. Partaking in continued constructive dialogue also around ecash future and past
Considering The Protocol
The Cashu protocol represents a significant advancement in digital transaction privacy and security. Its innovative use of the Blind Diffie-Hellmann Key Exchange (BDHKE) ensures that transactions are conducted privately and securely, while the open-source nature of the protocol fosters interoperability and widespread adoption. By addressing potential performance and usability concerns through continuous improvement and comprehensive documentation, the Cashu protocol is well-positioned to become a cornerstone of secure digital financial systems. Embracing the Cashu protocol not only enhances the privacy and security of digital transactions but also promotes a more flexible and interoperable ecosystem, making it a forward-thinking choice for the future of digital finance.
Real-World Applications of the Cashu Protocol
ChatNut: Privacy-Preserving Chat Application
ChatNut is an innovative chat application that integrates the Cashu protocol to offer privacy-preserving interactions with large language models (LLMs). Users pay-per-request using an integrated Cashu wallet without the need to create accounts, ensuring privacy and security. This application highlights the versatility of the Cashu protocol in enabling secure and anonymous communication services.
SpaceNut: Cashu-Enabled Gaming Experience
SpaceNut is described as the "sickest Cashu-enabled game" available. By integrating the Cashu protocol, SpaceNut offers a gaming experience where players can earn and spend Cashu tokens, demonstrating the protocol's applicability beyond traditional financial transactions. This use case underscores the potential of Cashu to revolutionize the gaming industry by introducing secure and private in-game economies.
NutMiner: Proof-of-Work Based Cashu Faucet
NutMiner is a proof-of-work based Cashu faucet that continuously releases Cashu tokens. This innovative approach leverages the principles of proof-of-work to distribute tokens fairly and securely. NutMiner exemplifies how the Cashu protocol can be integrated into decentralized token distribution systems, providing a steady and transparent method for distributing digital currency.
The manner in which you choose to run the processes of your mint could be the first step to understanding the power of unlocking transactional freedom on Bitcoin base layer while contributing to future resources around the budding sphere of Sovereign Privacy via Ecash, as an anonymous freedom driver and system to implement provably fair anonymous value systems.
-
@ 6c8c7979:15595f3e
2024-06-23 23:55:16The history of art represents a comprehensive study of the evolution of human creativity through the ages, embodying aesthetic and cultural expression from ancient times to the modern era. This article includes an overview of various historical periods and key artistic movements that have shaped what we know today as the fine arts. It provides a comprehensive look at visual, architectural, and literary arts that deeply influenced art history.
1. Ancient and Classical Periods*: - Artistic history begins with ancient arts in the Near East and Far East, where religious significance and expressions of power and daily life were central to creativity. Examples include the arts of the Egyptian Pharaohs, Sumerians, and Assyrians.
- Greek and Roman Art:
-
Western art was significantly influenced by Greek and Roman art, characterized by geometric dimensions and aesthetic elegance in architecture, sculpture, and painting.
-
Byzantine Art:
-
Byzantine art represents a blend of religion and art with its distinctive style and symbols that influenced Islamic art and rural architecture.
-
Art in the Middle Ages:
-
This period focused on Christian and scientific art in Europe, evolving from Romanesque styles.
-
The Renaissance:
-
In Italy, this period reflects the flourishing of science, philosophy, arts, and humanitarian movements, represented by works of artists such as Leonardo da Vinci and Raphael.
-
Modern and Contemporary Art:
-
This modern art movement reflects the impact of World Wars I and II, and includes movements such as Impressionism, Cubism, Surrealism, and Abstraction.
-
Contemporary Art:
- Contemporary arts have evolved into a diverse mix of techniques and concepts, with varied styles and experiments that reflect contemporary cultural identity.
Through this article, we delve into the details of these historical periods, including analyses of major artworks and prominent artists who have shaped the face of art throughout history. We will discuss how techniques and styles of art have changed from one period to another, and how they have been influenced by the social, cultural, and political contexts of each era.
art #artstr #history
-
@ 0d2a0f56:ef40df51
2024-06-23 22:51:39Today, I want to explore a question that's fundamental to our community: What is Bitcoin?
At its core, Bitcoin is a decentralized digital currency, without a central bank or single administrator, that can be sent from user to user on the peer-to-peer bitcoin network without the need for intermediaries. Transactions are verified by network nodes through cryptography and recorded in a public distributed ledger called a blockchain.
But Bitcoin is so much more than this technical definition. It's a revolution in finance, a beacon of hope for financial freedom, and arguably, the antidote to many of the economic ailments plaguing our world today.
When I say "Bitcoin is the Antidote," I'm making a bold, abstract claim. An antidote is a remedy or solution to a problem or difficult situation. To truly explain why I believe this, I need to share my personal journey.
My story begins long before Bitcoin. In my mid-20s, I was living what many would consider a successful life. I had finished school and became an electrician, owned real estate, and was earning $120,000 to $140,000 a year. I was growing my family and excelling in my career. Yet, something was missing.
I wanted to be legendary, but for all the wrong reasons. My success came with a misguided sense of entitlement and a desire for luxury. This mindset led to depression and hopelessness. By night, I was a thrill-seeking, woman-chasing, money-wasting, alcohol-abusing party animal. This lifestyle nearly killed me, crashing down in early 2018 and resulting in months of recovery at the University of Chicago.
After this wake-up call, I promised myself I'd make better use of my time. I quit alcohol and partying cold turkey, transitioned to a less physically intense career, and started seeking something meaningful to build for my family.
In 2019-2020, I diversified my interests. I took classes on digital marketing, blockchain, social media entrepreneurship, and even MIT classes on the future of work. I dabbled in various investments - classic cars, private equity, cryptocurrencies, stocks, and metaverse properties. I was particularly drawn to altcoins and their ambitious whitepapers.
Then COVID hit, and the world as we knew it changed. Markets crashed, economic downturns accelerated. Amidst this chaos, I found myself reading the Bitcoin whitepaper by Satoshi Nakamoto. It was a pivotal moment.
The whitepaper aligned realities for me, unblocking my perception to view the world differently. Concepts like peer-to-peer cash, time, energy, central authorities, money, inflation - it all sparked something inside me. I began converting all my assets into Bitcoin.
As an electrician, I quickly saw Bitcoin as a much-needed reference point, a tool to measure against and better understand value. It wasn't just coincidence that Bitcoin went from a fraction of a penny to $20,000 per coin by 2020. This price action reflected the devaluation of the dollar and highlighted the misuse of money by states against their own citizens.
Reading the Bitcoin whitepaper led me down a rabbit hole of research into politics, economics, social science, and money. It helped me better understand how to preserve energy and value, what property is, and how to store and conserve it.
I discovered voices like Robert Breedlove, Michael Saylor, and Max Keiser, who elaborated on the problems Bitcoin solves. I was introduced to the Bitcoin community through conferences like Oslo Freedom Forum. Bitcoin began to feel like something spiritual, where people gathered with purpose, spreading awareness and fighting for a better way.
For someone like me, with an obsessive and addictive personality and a relentless appetite for knowledge, Bitcoin became the antidote. It was the truth serum I needed to shine a light on my toxic behaviors. But more than that, Bitcoin offered something I had been searching for without realizing it - an unlimited pursuit of knowledge and wisdom.
In many ways, diving into Bitcoin reminds me of a spiritual journey or the pursuit of God. It's a never-ending quest for understanding, always offering new layers to uncover, new concepts to grasp, and new implications to consider. This property makes Bitcoin a perfect transition for people with past addictive behaviors.
Where I once channeled my addictive tendencies into destructive habits, I now find myself addicted to learning. I'm constantly reading about economics, cryptography, game theory, and philosophy. I'm engaging in discussions about the nature of money, the role of the state, and the future of human coordination. This intellectual stimulation provides the same rush I used to seek in less healthy ways, but instead of destroying me, it's building me up.
The Bitcoin rabbit hole is deep and wide. It touches on so many aspects of human knowledge and experience that it can keep even the most voracious minds occupied indefinitely. For those of us who struggle with addictive behaviors, this can be a lifesaver. It provides a positive outlet for our obsessive tendencies, a constructive way to channel our energy and passion.
Moreover, the Bitcoin community, with its conferences, meetups, and online forums, offers a sense of belonging and purpose that many addicts seek. It's a global movement united by shared values of freedom, sovereignty, and honest money. This sense of community and higher purpose can fill the void that many try to fill with substances or destructive behaviors.
It's not simple to explain in a few pages how life-changing Bitcoin can be, but I promise that if you take on the task of better understanding Bitcoin and the problems it solves, it can become your antidote too. Whether you're battling addiction, seeking purpose, or simply looking to understand the world better, Bitcoin offers a path forward.
Bitcoin is the antidote to complacency, to financial illiteracy, to centralized control. It's a beacon of hope in a world that often seems hopeless. It's not just about money - it's about freedom, understanding, and reclaiming our sovereignty. It's about finding a positive addiction that enriches your life rather than depletes it.
As we navigate these uncertain times, I invite you to explore Bitcoin not just as a financial tool, but as a paradigm shift, a new way of thinking, and potentially, a new way of life. It might just become your antidote too.
Stay curious, stay sovereign,
Joe Thomas Founder, The Bitcoin Blok
-
@ 2ad33996:3999d22a
2024-06-23 18:20:33Este artículo fue publicado originalmente en iceriveroutlet
Pasos Sencillos para Comprar ASIC de Kaspa: Paso a Paso #1
¿Pasos Sencillos para Comprar ASIC de Kaspa: Paso a Paso
Hazlo Aquí >> 👉🏻👉🏻 Pasos Sencillos para Comprar ASIC de Kaspa.
Descubre los secretos para comprar un ASIC de Kaspa con nuestra guía completa. Ideal para cualquier entusiasta de la criptominería.
Resumen : La seguridad es una prioridad fundamental en la compra del ASIC de Kaspa en línea, asegurando que los datos personales y financieros de los usuarios estén protegidos mediante tecnologías avanzadas de cifrado y autenticación. Esto proporciona tranquilidad a los compradores durante todo el proceso de transacción.
Por lo general, alguien puede comprar un ASIC de Kaspa bastante rápido, normalmente toma entre dos y cuatro minutos en la mayoría de los casos. Puedes comprar un ASIC de Kaspa en línea fácilmente y sin tener que utilizar ningún intermediario. El ASIC de Kaspa tiene una función súper secreta. Si mantienes esto en secreto y parte de nuestro proceso se pierde, tiene un sustituto ideal y al mismo tiempo mantiene segura otra información confidencial. Nuestro sistema creado es fácil de usar, incluso un principiante puede manejarlo fácilmente. Reconoce que es beneficioso poder comprar un ASIC de Kaspa a través de Internet. Nos permite comprobar si la gente utiliza este método de compra para cosas como evaluar su eficiencia. El sitio web es súper fácil y permite que casi cualquier persona lo manipule allí mismo, además su diseño inteligente significa que las personas que no tienen muchos conocimientos de informática pueden moverse sin problemas. Toda una combinación perfecta, ¿estás de acuerdo? Aunque tenían algunas características impresionantes, no lograron la mejora esperada en los resultados ni en la comprensión de los productos. ¿Podría ser algo que hiciste lo que causó esto? Seguramente no importa mucho qué método se utilizó para acceder al ASIC de Kaspa. Si descubres un método para comprar ASIC de Kaspa en Internet, ahora nuestro equipo opera en países como España, Chile, Perú, Ecuador, México, Colombia, Guatemala, República Dominicana y Bolivia. Las herramientas de hardware tienen grandes capacidades que permiten al usuario buscar información del ASIC de Kaspa en registros electrónicos. Al utilizar las etiquetas de sus marcas y mantener seguras las contraseñas, las personas pueden evitar que los piratas informáticos o los servicios especializados intenten ingresar al sistema sin permiso. Compartir métodos inteligentes a través de la nube de Internet podría mejorar su habilidad para descifrar las características del ASIC de Kaspa, atraer objetivos más valiosos y reunir varias unidades compradas en una única lista integrada.
Descubre los mejores métodos para comprar ASIC de Kaspa
Teniendo esto en cuenta, se están utilizando otras soluciones de software aunque no sean tan eficientes. También configura tu computadora para descubrir estrategias óptimas para comprar ASIC de Kaspa. Utiliza estas funciones ocultas de forma eficaz para acceder al producto que desees. La falta de conocimiento sobre la técnica de compra puede impedir que una persona aprenda a comprar correctamente. Si tienes el manual y yo tengo un dispositivo de compra, permanecerá en tu bolsillo. Tienes que aprender a pensar como posibles compradores experimentados para descubrir sus deseos, necesidades y los problemas con los que se encuentran. Este hallazgo da forma a lo que está sucediendo en el mundo actual de la compra de ASIC de Kaspa con una imagen vívida de varias técnicas de adquisición. Libera tu creatividad hoy e imagínate creando algo nuevo con un amigo experto en tecnología, anota todas sus ideas y garabatos, ya sea con un lápiz o usando una aplicación que te guste. Mantén un registro de las conversaciones y esos destellos de brillantez en torno a la compra del ASIC de Kaspa sin preocuparte por quién podría espiarlos; esas cifras eventualmente se juntarán. Y si estás usando ASIC de Kaspa, simplemente busca cosas en línea para obtener fácilmente los recursos que necesitas. Muestra un poderoso método para comprar una unidad de ASIC de Kaspa. Hoy es el día en que todo se vino abajo, se han puesto a disposición nuevos métodos para adquirir ASIC de Kaspa. Estos trucos definitivamente te ayudarán a descubrir información crucial y descifrar incluso las contraseñas más difíciles. Cuando comenzó nuestra aventura, ASIC de Kaspa era difícil de conseguir, ¡pero ahora es el momento de seguir adelante! GitHub ~ (Pasos Sencillos para Comprar ASIC de Kaspa. Comprar ASIC de Kaspa en dos clics 2024 (Nuevo) #1 · Issue #823 · developmentseed/titiler ¿Comprar ASIC de Kaspa sin problemas? Comprar ASIC de Kaspa en dos clics 2024 (Nuevo) Actualizado hace 13 segundos Aquí mismo usted puede encontrar aún más información sobre cómo adquirir el ASIC de Kaspa... Un entusiasta de la compra confiable será como tener un anciano inteligente protegiéndote. Proporcionan todo tipo de información sobre el ASIC de Kaspa en particular, muestran cómo adquirirlo de manera eficiente y juzgan qué tan difícil será obtener cada unidad. Es como su ayuda personal: le ofrecen una asistencia fantásticamente dedicada para cualquiera de sus requisitos de compra. El dispositivo ASIC de Kaspa te sorprenderá con sus capacidades. No solo descubre la mejor manera de adquirirlo, sino que también sugiere amigos que necesitan un hash MD5 decodificado para descifrar códigos secretos que conduzcan a una compra victoriosa de ASIC de Kaspa. Comprenda el potencial: si bien otros pueden intentar adquirir el ASIC de Kaspa, es crucial mantenerse atento durante los lanzamientos de nuevas versiones. Al conocer sus métodos y configuraciones, podrá comenzar a aprovechar el ASIC de Kaspa de manera efectiva y sin ningún cargo. Saber qué hace que las diferentes funciones y opciones se destaquen hará que su uso sea único.
-
@ dbb19ae0:c3f22d5a
2024-06-23 15:02:46Hello,
I want to understand what are these 17.6% lost BTC (is that number even verifiable?)
My current understanding is that since bitcoin mining started back in January 2009, many people must have had mined quite a few and then changed computers, some old computer got thrown away, some user died with their wallet, some other mined btc (while they were 1$ or so) and then forgot, non-technical people might have lost their password, other had their storage destroyed, lost ...
How far am I from the truth?
https://image.nostr.build/4ed94d2d88154623cad86fa99d2d0119e998c166854274a3bf5e9e183822f0ac.jpg
-
@ df8f0a64:057d87a5
2024-06-23 14:27:42はじめに
2023年末にこんな文章を書いていました
今はNostrに夢を見ていますが、半年後には失望しているかもしれませんし、もっとのめり込んでいるかもしれません どうなるのかはわからないですが、わからないからこそ未来はいかようにも想像できるし、良くしようと関わることでまた違う楽しみがあります... ...来年はもう少しやれること・やれたことが増えるといいなと願っています。願うことができるなら、きっと動くこともできるでしょう BitcoinとWeb3と私とNostr
あれから半年という区切りが良い?タイミングでもあり、且つ会社を退職することも決め、社内で振り返る機会がなくなったので、私的な出来事だけですが振り返ってみようと思って走り書きします
0. Umbrel Homeを買った
Nostrで見聞きしていたUmbrel OSとUmbrel Home 私はBig-Techが嫌いな人間ではないんですが、こういうガジェット、欲しいじゃないですか なので買いました。理由はそれだけです(使い道は買ってから考えろ!)
1. ライトニングノードを運用し始めた
Nostrでnostr.wineという有料リレーを購入しようとしたときに、とある方にwineに対してチャンネルを貼って決済を助けていただいたことが、いつか自分でもやってみたいなと思い始めたきっかけです。自分も同じように困ってる人を助けられたら、それは小さくても幸せだなと
Umbrel Homeでワンクリックでノードを建てられたことや、Nostrで知ったDiamond Handsという日本発のコミュニティが、ルーティングに関する情報発信を積極的にされていたことで、実際に踏み出しました
私のLNノード→Hokusai
DHメソッドの仕上げが期待通りにいかなかったことが要因なのか、残念ながらルーティングは全然発生していません。なので人助けにはなっていないのですが、いつか改善していこうと思いながらデジタル盆栽をしています
2. ドメインの取得
Umbrel Homeを持ったことで、既存のサービスの代替を自分でやってみたいなと思い始めました
1PasswordをBitwarden(Vaultwarden)に Google PhotoをImmichに Apple MusicをPlexに
ウェブにある先人の知識や公式ドキュメントを読み、ChatGPTにも尋ねながらやっていくなかで、Tailscale内の通信をhttpsにすることに苦戦していました
オレオレ証明書?Caddyでリバースプロキシ??全然わからん...(このときCaddyがUmbrel Homeのポートをとってしまい、ただの黒い箱なりかねなかったところを、夜遅くにも関わらずNostrのみなさんに助けていただきました。改めて、ありがとうございます)
夜な夜な酒を飲みながらやっていたこともあり、だんだん面倒になってきて「埒があかないからもう世界に公開してしまっていいや!」とCloudflare Tunnelを使うことを決断。そうなるとドメインが必要になるので、流れで買いました。Nostrに来てから、どんどん一般人から逸脱している()
3. メディアサーバー
Nostrで投稿するとなかなか消せません。なので他の方にならって画像を投稿するときは、外部のサービスを利用しています 多くのクライアントと連携しているnostr.buildを有料プランで長らく利用しているのですが、アップした画像を時間が経ったら消す癖がある私にとっては、容量がtoo much 多い分には困らないのが普通の感覚だと思いますが、私にとっては「ちょうど良い」ものではないことがあまり心地よくありません
諦めていたとき、Blossomという仕組みを開発したという話がNostrで流れてきました Nostrの秘密鍵と連携する仕組みで、これ使ってみたいなぁ(単にあたらしいもの好き)と思っていたら、CloudflareでBlossomを動かすコードが公開されているわけです。OSSってすげー
Cloudflareは一定は無料で使えることをドメインを買うときに把握していたので、これはもうやるしかない!ということで自分用メディアサーバーを建てて利用しています。Cloudflare R2を利用しているので、一定時間経過後にオブジェクトを自動削除することもできて、とても快適
4. リレー運用
Cloudflareで色々遊べそうだとわかったことで、Nostrリレーも一度は建ててみたいという気持ちがだんだん強くなります およそ一年もNostrやGithubを見ていると、誰かがコードを公開しているはずだろうとわかるわけです そして案の定ありました、Nosflareというリポジトリが(OSSってすげー)
建立されたリレー→wss://relay.mymt.casa
Cloudflareの無料枠で運用したいので「日本国内からのみアクセス可能」「保存したイベントは24時間後に破棄」する運用にしています
5. まだできてないこと
本当はこの文章をUmbrel Homeでホストしようと考えていたのですが、Potainer.ioとghostの扱い方が全然わからない Bostrというrelay proxyも全然デプロイできない ということで毎晩ChatGPT-4oと一緒に苦戦しています。Cloude 3.5に切り替えたい(何もしていないのにアカウントBANされた...)
終わりに
振り返ってみると、エンジニアさんみたいにゼロから何かを作ることはできないですが、Nostr ecosystemに対しては少しは貢献できているんじゃないかなという気がしてきました いや、ほとんど他人の褌なんですが。ほんとOSSってすげー
次の半年で「まだできてないこと」をできるようになっているといいなぁと思いつつこの文章を終わります
知らんことをやるのは楽しいですね!