-
@ 42342239:1d80db24
2024-09-02 12:08:29The ongoing debate surrounding freedom of expression may revolve more around determining who gets to control the dissemination of information rather than any claimed notion of safeguarding democracy. Similarities can be identified from 500 years ago, following the invention of the printing press.
What has been will be again, what has been done will be done again; there is nothing new under the sun.
-- Ecclesiastes 1:9
The debate over freedom of expression and its limits continues to rage on. In the UK, citizens are being arrested for sharing humouristic images. In Ireland, it may soon become illegal to possess "reckless" memes. Australia is trying to get X to hide information. Venezuela's Maduro blocked X earlier this year, as did a judge on Brazil's Supreme Court. In the US, a citizen has been imprisoned for spreading misleading material following a controversial court ruling. In Germany, the police are searching for a social media user who called a politician overweight. Many are also expressing concerns about deep fakes (AI-generated videos, images, or audio that are designed to deceive).
These questions are not new, however. What we perceive as new questions are often just a reflection of earlier times. After Gutenberg invented the printing press in the 15th century, there were soon hundreds of printing presses across Europe. The Church began using printing presses to mass-produce indulgences. "As soon as the coin in the coffer rings, the soul from purgatory springs" was a phrase used by a traveling monk who sold such indulgences at the time. Martin Luther questioned the reasonableness of this practice. Eventually, he posted the 95 theses on the church door in Wittenberg. He also translated the Bible into German. A short time later, his works, also mass-produced, accounted for a third of all books sold in Germany. Luther refused to recant his provocations as then determined by the Church's central authority. He was excommunicated in 1520 by the Pope and soon declared an outlaw by the Holy Roman Emperor.
This did not stop him. Instead, Luther referred to the Pope as "Pope Fart-Ass" and as the "Ass-God in Rome)". He also commissioned caricatures, such as woodcuts showing a female demon giving birth to the Pope and cardinals, of German peasants responding to a papal edict by showing the Pope their backsides and breaking wind, and more.
Gutenberg's printing presses contributed to the spread of information in a way similar to how the internet does in today's society. The Church's ability to control the flow of information was undermined, much like how newspapers, radio, and TV have partially lost this power today. The Pope excommunicated Luther, which is reminiscent of those who are de-platformed or banned from various platforms today. The Emperor declared Luther an outlaw, which is similar to how the UK's Prime Minister is imprisoning British citizens today. Luther called the Pope derogatory names, which is reminiscent of the individual who recently had the audacity to call an overweight German minister overweight.
Freedom of expression must be curtailed to combat the spread of false or harmful information in order to protect democracy, or so it is claimed. But perhaps it is more about who gets to control the flow of information?
As is often the case, there is nothing new under the sun.
-
@ 266815e0:6cd408a5
2024-07-26 20:17:39Projects
noStrudel
- Added support for creating, viewing, and editing Wiki pages
- Added NIP-42 Auth support
- Added support for @snort/worker-relay (WASM SQLite relay) thanks to nostr:npub1v0lxxxxutpvrelsksy8cdhgfux9l6a42hsj2qzquu2zk7vc9qnkszrqj49 for building the library
- Added support for uploading files to Blossom servers
- Added support for restoring broken images using users Blossom servers
- Added support for using Citrine as local cache relay on mobile
- Fixes and improvement for NIP-46 support to work better with Amber
- Replaced all proprietary relay code with nostr-tools
- Added Task Manager for debugging and better insight under the hood
Blossom
- Rewrote and organized the spec into a simpler core spec and multiple optional specs ( BUDs )
- Setup awesome-blossom repo for tracking Blossom implementations
- Rebuilt blossom-server and added a simple admin dashboard
- Added fancy landing page to blossom-server for uploading and mirror blobs
- Improved documentation for blossom-server-sdk ( A TS library with components for building a blossom server )
- Improved documentation and lots of small fixes for blossom-client-sdk ( A TS library to help nostr clients interact with Blossom servers )
Plans for Q3
Hopefully this isn't too ambitious and I can finish at least half of these ideas
noStrudel
- Finish building out wiki features (author profiles, better editing and fork UI)
- Overhaul user profile view to show more recent activity and make it easier to see what a user has been doing
- Continue experimenting with WebRTC relays
- Build a profile picture cashing service that resizes and stores images on Blossom servers and publishes nostr events for interoperability
- Add support for .i2p and .onion relays when noStrudel is installed on Umbrel or Start9
Blossom
- Write up spec for a media optimization endpoint
- Build an example media optimization endpoint in blossom-server
- Collaborate on support for payments in blossom server spec
Other stuff
- Build a proof of concept Web-of-Trust based username search
- Other secret projects...
-
@ 6c2d68ba:846525ec
2024-09-01 13:02:53Dear friend,
it seems like you have decided to turn your back on those walled gardens and set sails to enter uncharted territory. A world without walls, an open world, a world of beautiful chaos. At least for today, I don't intend guiding you out of the safe harbour onto the open, endless sea. Today, my only intent is sharing a few thoughts, before you depart.
As a wise man on Madeira once said, it's not so much about having the right answers, it's about asking the right questions. While I'm not certain whether I have found the right questions myself by now, let me share the current set with you:
-
What causes the discomfort that drives you out of the walled garden onto the open sea?
-
Are you trying to transfer from one walled garden to the next one, where the difference being a slightly friendlier colour on the wall?
-
What are you hoping to find on the open sea that walled gardens cannot provide?
-
What are you willing to sacrifice for freedom (of speech)?
-
What will you need to keep the ship afloat?
-
How will you react when you find yourself in the middle of a storm?
I sincerely believe that it's worthwile taking a step back before departing to reflect on the big picture and the underlying paradigm shift between walled gardens and nostr. This is not about building competitors to broken systems, this is not about mimicking centralised services, this is not about repeating the same mistakes over and over.
This is about building a new world, an open world without walled gardens and data silos.
Onwards!
-
-
@ df67f9a7:2d4fc200
2024-07-07 18:25:32Anyone who thinks that “onboarding new users” is simply a technical challenge of educating people about “how Nostr works”, is grossly mistaken about social networks in general and blind to what makes Nostr so special.
Social Networks are for Friends
Relationship building is why people use social networks. Connecting with friends and loved ones (and colleagues and customers also) is the obvious reason to join, and should be the primary objective in any onboarding endeavor. Everything else “about the technology” only needs to be introduced “as needed” in order for each new user to achieve this goal.
The Nostr Network Requires Trusted Friendships
To thrive at scale, Nostr needs to have established and interconnected “webs of trusted friends” for “verifying” authentic profiles and quality content. This PgP strategy for decentralized trust implemented on Nostr, is the best way to keep bots and bad actors at bay while preserving freedom and sovereignty for every user. Even though Nostr still doesn’t have a standard for determining who “is trusted” for any one user across all clients, we can already build tools to onboard new friends of the highest quality trust. Leveraging existing relationships, “webs of trust” can be strengthened even at this early stage simply by advocates “inviting friends to Nostr”.
Nostr is New and Already Full of Trusted Friends
But it won’t be for long. Bots and bad actors are relatively “easy” to keep at bay today because the Nostr userbase is still small. People who come to Nostr and STAY have mostly been a self selecting group of “freedom tech fans”. We like it this way, and are generally happy to be here. The comraderie is refreshing. But the more people that come to Nostr, the more Nostr will attract different kinds of people.
This is already happening. Nostr is growing at the edges, reaching out beyond the “freedom tech fans” and attracting a number of “less committed” (and some nefarious) individuals here and there. Who sticks around? The “friends of freedom tech fans” stick around longer because they have friends here. WAY BEFORE even considering how “the network effect” will take over, Nostr needs to solve for retention by bringing more “trusted friends” into the network. Social onboarding tools will allow us to share Nostr to “friends of freedom tech fans” and beyond, establishing interconnected “webs of trust” that are increasingly impermeable to bots and bad actors.
Nostr is Freedom Tech that People Want to Share
Creators and influencers of every kind share Nostr (and Nostr content) every day. This phenomenon is a gold mine for onboarding, and can be supported with tools and incentives. Driven by the fact that Nostr is an open protocol, owned by nobody and available for anybody to build upon and profit from, the passion for sharing Nostr will never wane. But our userbase may fall off, if people become disenchanted by undesirable content or lack of good follows. This is why onboarding efforts, to attract more “friends” to the network, are so important. Leveraging the “share worthy” phenomenon of Nostr itself to grow Nostr’s networks of “trusted friends” seems like a no brainer. But for this strategy to work, it needs to be win win win for all parties.
Everybody Wins with More Trusted Users on Nostr
Even as standards for qualifying trust are still being refined, “social onboarding” increases the ratio of “more” trusted over “less” trusted users across the network.
Developers Win
With more trusted users on the network, Nostr developers win by being able to attract an increasingly diverse range of business partners to sponsor their projects.
Sponsors Win
An increase in trusted usership equates to more “real people” perusing “desired content” and more chances for brands to engage “organically” with target audiences. Marketing opportunities increase with trust.
Advocates Win
Simply by sharing Nostr with their friends, Advocates support the sustained growth of trust across the network. Valuable zap reward programs to incentivize high quality onboarding efforts are easily justified and funded by social onboarding clients and their sponsors.
Users Win
More trusted users across the network means more trustworthy content in every feed and more easily discoverable friends and new follows regardless of the client or algorithm used.
Nostr Wins
More trusted users on the network means more “high quality” trust connections between each user. Strong webs of trust is what keeps out bots and bad actors, and is essential for stability as Nostr scales.
Social Onboarding Clients Bring Trust to Nostr
Having more tools for “sharing Nostr with friends” is how Nostr wins. Any client can have capacity for “Social Onboarding”. This may be a dedicated onboarding client or a feature set within a social client. A client that offers “Social Onboarding” will support Nostr advocates and the users that they invite. These should have the following feature set :
- Nostr advocates may create and share any number of customizable “Nostr invites” for different audiences or occasions. Each may have different reccomendations, or access codes, or expiry options. (A NIP is in the works)
- Nostr invite QR codes (and shareable URLs) should resolve to a WEB based interface for prospective (and existing) users who MAY NOT have a client or browser extension already installed.
- Each invite should (within the onboarding client) provide access to low friction profile creation AND advocate reccomended lists of new friends, interest groups, preferred clients, best relays, and other stuff.
- Private key generation and management for new users should be handled entirely within the onboarding client (using NIP standards without a browser extension or external bunker app) to reduce friction at this crucial moment.
- A human readable Nostr address (NIP05 or some future NIP) should be generated automatically for all new users.
- New account creation should result immediately in a direct message or group thread of private “gift wrap” encrypted messages. This thread acts as the new user’s “first contact” with the advocate (possibly others as well) and an anchor for exploring the rest of Nostr.
- Invite “receipt” data (who invited who) should be “gift wrap” encrypted, accessible only to the advocate and new user. Clients wishing to use this data for analytics MAY request access from BOTH parties.
- Top Advocates may be calculated by the client (using data from invite receipts OR from public Nostr usage metrics), and awards may be offered.
- Advocates may also be supported by the client through access to private “advocate support” groups and communities over the Nostr network.
Support Social Onboarding for Nostr
Meet Me On Nostr is an app for sharing Nostr with friends via advocate invites. It is a reference client to demonstrate the power of Social Onboarding for Nostr. The first launch of "feature complete" client is expected in fall 2024.
This is a “bootstrap” funded project in active development. We are not grant funded or VC funded. Instead, we are looking to pay our developers by sponsorships from “Nostr adjacent” businesses who want to increase brand recognition over this new social network.
Is Your Business Nostr Adjacent?
“I’d like to advertise on Nostr but it’s “not quite ready” says our marketing team.”
“It has potential, and we have alignment, but the technology is still a bit rough.”
“Nostr is a perfect fit for our “target audience”, but there simply aren’t enough people using it.”
If your business is aligned with freedom technology, and the people who build and use Nostr, then NOW is the perfect time to sponsor Social Onboarding. Help grow Nostr’s base of trusted users and engage directly with Nostr’s most active advocates and influencers as it scales.
Release Nostr’s Superpower
When Nostr advocates are equipped and incentivized to share Nostr with their friends, nothing can stop this network from growing and growing and growing ever more secure and interconnected networks of trusted users.
Onboarding and retaining trusted users as Nostr scales will require so much more than just pointing people to “how Nostr works” content. Nostr’s true power lies dormant in the existing relationships that Nostr users already have outside of Nostr. Leveraging this power is what Social Onboarding is all about. Social Onboarding is Nostr’s superpower.
-
@ 8dc86882:9dc4ba5e
2024-09-02 15:50:01Today I saw a YouTube video from one of the privacy related channels, Techlore maybe? I don't exactly remember. Either way this particular video was going over the pluses and minuses of Android and iOS; and it has made me reconsider some things. I have one of each type of phone and jump back and forth a bit, but always thought I would end on Android. I'm not feeling that way anymore.
After really getting to understand Apple's Advanced Data Protection I think I came to the conclusion that my iPhone more than meets my needs and does everything I like. Yeah, Android sounds like it has most of the privacy coolness as far as mods, roms, and apps, but my iPhone is easily fully encrypted along with iCloud. The few services that aren't are covered by my Proton plan. It also allows me to stop paying for services I may not really need.
- I use and pay for Ente photos, which is great, but my Apple photos are already encrypted and backed up. I don't think I need to be paying for the extra service.
- The Apple Notes app falls under the fully encrypted side, and I can use the free version of Standard Notes for other things.
- I still use Signal Messenger where the OS doesn't matter as much.
- MySudo which I use for numbers is transferable between OSs also.
That's really about it, I mainly use my phone for Email, Calendar, Messaging, Notes, some social, and photos. I don't think I need anything special beyond that. The insecure apps I use on either platform keep their risks though Apple isn't an advertising company, so I feel they are less likely to abuse anything, at least for now. I wonder what other folks thoughts are. Feel free to share.
Cheers!
plebone
-
@ 266815e0:6cd408a5
2024-09-02 15:27:16After 7 months of work and procrastination I've decided to release another version of noStrudel
There a ton of new features and a few bugs fixed. This article highlights the biggest changes but if you want to read the full changelog you can find it in the github repo
And as always if you want to check it out you can use nostrudel.ninja or run it locally using docker
sh docker run --rm -p 8080:80 ghcr.io/hzrd149/nostrudel:0.40.0
New Features
Support for NIP-49 encrypted nsec
Now when logging into to the app it will prompt you to set a password to encrypt your nsec so it can be stored securely (if that's even possible for a web client...)
There is also a new "Account" settings view that lets you export you nsec as a ncryptsec so you can copy it to other apps
Blindspot feeds
There are also new "blindspot" feeds that show what others are seeing in their timeline that your missing
NIP-42 Relay authentication
The app now supports NIP-42 relay authentication. Its opt-in though, so if you want to use popular authenticated relays like nostr.wine or relay.snort.social you will have to enable it in the settings
Wasm relay and event verification
The app now supports using @snort/worker-relay as a local relay. Its at least 10x faster than the internal browser cache and can hold at least 100x more events. Its not enabled by default though so if you want to use it you have to switch to it in the "Relays" -> "Cache Relay" view
The app also supports using nostr-wasm to speed up event signature verification. This is enabled by default, but if you want to still use the JavaScript verification or no verification you can find it in the performance setting
Thread tabs
Threads now have a set of tabs that let you see the Replies, Quotes, Zaps, and other stuff related to the note
Wiki articles
Its not feature complete but you can now view and edit wiki articles in the app
Finished the launchpad
The launchpad is now usable and shows the latest notifications, messages, streams, and tools
Blossom uploads
The app now lets you upload images and video to blossom server, this isn't enabled by default though so your going to have to enable it in the settings
And then setup some blossom servers in the settings. A few good public ones are
https://cdn.satellite.earth
andhttps://cdn.nostrcheck.me
Task Manager
There is also a new "Task Manager" in the side nav that lets you see whats going on under the hood in the app
You can see what relays the app is currently connected to
And which relays are requesting NIP-42 authentication
Bug fixes
- Fix null relay hints in DMs
- Fix users own events being hidden by muted words
- Fix random events showing up as DM messages
- Fix app prompting NIP-07 extension to unlock when app opens
- Remove corsproxy.io as default service for CORS proxy
-
@ dfe02069:d3e2fa29
2024-09-02 14:42:00Kennen Sie Bullshit-Bingo? Bei diesem Spiel gewinnt, wer am meisten Floskeln und Schlagwörter in wenige Sätze packen kann, auf dass es tragend und gut klingt, obwohl es weitgehend inhaltsleer ist. Das WEF ist die elitärste Bullshit-Bingo-Veranstaltung der Welt. Beim jährlichen Treffen der 1000 größten Unternehmen mit Politikern geht es primär darum, durch Wiedergabe von WEF-Textbausteinen möglichst nah an die gefälligen Agendaziele heranzukommen, ohne dass die Anbiederung zu offensichtlich wird. Wer sich hier besonders beflissen hervortut, darf damit rechnen erneut eingeladen zu werden.
Weltgrößte Messe des Lobbyismus
Das Vokabular des WEF strotz vor alarmierenden Konzepten, die bisher in der Öffentlichkeit und den Medien nur mit der Zange angefasst wurden: Es geht um den „Great Reset", den Umbau der Welt („build back better"), die Verschmelzung von Mensch und Maschine, um Kontrolle der freien Rede, Ökoplanwirtschaft, digitales Zentralbank-Geld, digitale Identitätslösungen und darum, wie man als besitzloser und gläserner Bürger der Zukunft glücklich wird, während man sich den Insektenburger schmecken lässt. Das WEF produziert seit Jahrzehnten Begriffswolken, die Anlass für massives Stirnrunzeln geben, wird aber gerne im Mainstream als unverbindliche Spassveranstaltung und eitler Elitenkarneval dargestellt. Die Medien spielen ihr eigenes Bullshit-Bingo der Verdrängungs- und Themenvermeidungsfloskeln. Das ändert sich neuerdings massiv dank vieler freier Medien, die kritisch über das WEF berichtigen. Der Elitenzirkus von Klaus Schwab ist in der Defensive und kämpft mit einem massiven Imageproblem.
Dieses kommt nicht von ungefähr und ist weitgehend hausgemacht, durch eine Mischung aus Intransparenz und grotesken Ideen. Ein Vordenker des WEF ist der israelische Historiker und Bestsellerautor Yuval Noah Harari. Er beschäftigt sich mit der in seinen Augen wichtigsten Frage des 21. Jahrhunderts: Was soll bloß mit all den „nutzlosen" Menschen auf der Welt geschehen?
Das Thema Überbevölkerung ist seit Beginn in die DNA des WEF und anderer Elitezirkel eingewoben. Das Menschenbild des WEF ist dabei nicht weit von den Vorstellungen entfernt, die ein Hirte von seiner Tierherde hat. Der Mensch der Zukunft rangiert irgendwo zwischen einem digitalen Nutztier und Trainer seiner KI, die ihn kontrolliert und überwacht. Harari sieht als Beschäftigung für unnütze Esser und menschliche Co-2-Schleudern vor allem eines: Drogenkonsum und Videospiele. Das Kalkül des WEF scheint zu sein: Wenn man nur genug selbst ernannte Eliten zusammenbringt, die derartige Ideen weniger grotesk aussehen lassen, lässt sich selbst frankensteinsche Science-Fiction als Wohltätigkeit für die Welt umlackieren.
Das World Economic Forum ist schon dem Namen nach eine Mogelpackung. Es ist kein Forum. Auf einem Forum wird gestritten und diskutiert, statt den inzestuös vor sich hinwabernden Begriffsbrei noch ein weiteres Mal umzurühren. Im Kern ist das WEF die weltgrößte Messe des Lobbyismus. Das Geschäftsmodell lautet „networking as a service" und Klaus Schwab, ein in Kissingers CIA-finanziertem Harvard-Seminar geformter Ökonom und Sozialingenieur, ist der Impresario. Das WEF verkauft seinen Mitgliedern schlicht den Zugang zu Politikern. Der engste Kreis der Unternehmen, welche die Initiativen des WEF mitgestalten, zahlt dafür zwischen einer Viertelmillion und einer halben Million Dollar. Das ist viel Geld für eine angeblich reine „Spassveranstaltung", vor allem, wenn man dafür einer Rede von Olaf Scholz lauschen muss.
Wo bleibt die öffentliche Auseinandersetzung?
Da sich derartiger Zugang zur Politik jedoch zu lohnen scheint, stellt sich unweigerlich die Demokratie-Gretchenfrage: Wem fühlen sich die Politiker letztlich verpflichtet? Dem Wähler oder den Meistbietenden?
Es braucht nicht viel an investigativem Eifer, um einen Gleichlauf von WEF-Konzepten, Gesetzesvorlagen und Politikerkarrieren zu erkennen, bestes aktuelles Beispiel ist die „Digitale Identität". Unter welcher Definition von Demokratie ist diese Gemengelage nicht von größtem öffentlichen Interesse? Damit Politiker nicht allzu begriffsstutzig gegenüber den Geschäftsideen der WEF-Unternehmen auftreten, liefert Schwab mit seinem „Young Global Leaders"-Programm den Politiker-Nachwuchs der WEF-Hausmarke gleich mit: „Wir infiltrieren die Regierungen" meinte Schwab in einem öffentlichen Vortrag stolz. Wo blieben die öffentlichen Fragen dazu? Kritischen freien Medien ist der Zugang zur Eliteveranstaltung versperrt, man bleibt lieber unter sich.
Das WEF ist dabei, eine Karikatur seiner selbst zu werden. Daran hat der Bond-Bösewicht-Charme eines Klaus Schwab genauso Anteil, wie die missionarischen Reden von Steigbügelhaltern, wie zum Beispiel Ursula von der Leyen, die ihre Agenda-Anbiederung an die Ökoplanwirtschaft hinter Powerverben aus dem Economist, wie "thrive", "boost" und "shape" gar nicht mehr verstecken will. Das WEF ist ein Überbietungswettbewerb für groteske Szenarien und Forderungen, der in seiner Erwartbarkeit und Eintönigkeit nur noch zur Persiflage taugt: Der UNO-Generalpräsident malt wie bestellt Klimapanik in apokalyptischen Bildern. Al Gore inszeniert wieder mal eine Wut-Show. Und Tony Blair, Kriegsverbrecher im Unruhestand, darf über digitale Überwachungsinfrastruktur in Form von Impfpässen schwadronieren. Das Personal von gestern verkauft der Politik Unternehmenslösungen von heute für selbstgemachte oder aufgebauschte Probleme von morgen.
Die letzen Jahre der Pandemie haben die Bevölkerung alarmiert. Sie erlebte eine Welle angeblicher „Verschwörungstheorien", die sich als wahr herausgestellt haben. Diese Welle fürchtet nun auch das WEF, wie der Teufel das Weihwasser. Aufklärung mag manchmal einen langen Anlauf brauchen, dann jedoch ist der Sprung umso größer. Das Jahr 2023 hat gezeigt: Das Informationsmonopol der Konzernmedien über diese Veranstaltung ist dahin. Ihr Versuch, informelle Machtzirkel zum Tabuthema im Mainstream zu machen, ist gescheitert. Wer Naivität des Publikums zur Geschäftsgrundlage macht, baut sich die tiefe Grube letztlich selbst.
Sogar dem WEF sind die eigenen Inhalte inzwischen peinlich. Man löscht Artikel und Tweets und ruft nach mehr Kontrolle gegenüber „Verschwörungstheorien" im Netz, für die man bei jeder Gelegenheit fleißig Anlässe schafft. Das WEF erinnert so an den Feuerwehrmann, der Brände legt, um ausrücken zu können und auch noch das Löschwasser verkauft. Das Gegenprogramm zum WEF läuft sich längst warm: Es sind die Ideen und Kräfte dezentral organisierter Bürger, die an spürbarer Verbesserung im Hier und Jetzt arbeiten, statt sich die Machtergreifung einer Manager-Elite in den Klängen eines Weltverbesserungs-Kumbaya vorsetzen zu lassen.
-
@ 826e9f89:ffc5c759
2024-06-28 21:46:01_Prologue: this is a prose adaptation of a talk I gave to a private audience in Dubai and then tweaked slightly for a small conference in Sofia. I'm increasingly thinking it deserves a more general audience, and may be better suited to text anyway. This is probably not its final form, as the desired audience is tradfi capital allocators, hence a PDF is likely on the cards in the near future. For the time being, consider this a first draft, practising what it might look like as prose, and soliciting feedback from the good people of Nostr. Enjoy! _
The title of this essay means absolutely nothing. There is no such thing as “Web π” because there is no such thing as “Web 3”. It’s bullshit. It’s a scam.
Unfortunately, it has turned out to be extremely powerful bullshit and an extremely profitable scam, and so my goal in writing this essay is to give the reader the tools to navigate all of this and come out the other side without having been scammed or bullshat. In the spirit of not scamming and not bullshitting, I should be clear upfront about the intended readership of this essay, who I am to write it, and who it’s really about.
Who Are You?
I assume the reader is not a shadowy super-coder, but rather is a financial professional. This essay isn’t really for Bitcoiners, although if any read it, I hope they still find it interesting. Who I am really writing for are people coming to the space for the first time. Hopefully in your mind you are coming to the _Bitcoin _space, but if you think you are coming to the “crypto” space then this may be even more useful.
Who Am I?
I am the founder of a company that makes me not only highly biased but also flagrantly self-interested in the content I am promoting. I run a firm that invests in the Bitcoin ecosystem through a variety of different vehicles. I am not going to mislead you in the slightest in that my primary motivation is for you to allocate capital to us rather than to people I would call scammers and bullshitters. You should listen to them too and make up your own mind, or else what’s the point, really? How do you know I’m not scamming or bullshitting you? Exactly. Don’t trust. Verify.
In any case, that’s all assuming you want to “allocate capital” at all rather than just buy Bitcoin without a management fee. I’d like to think the primary difference is that I will be honest about that, and I’ll encourage you to understand as much as you can about what is going on and what you are doing (and if you are at all unsure, I would suggest you aren’t ready and you should just buy Bitcoin and learn) rather than bamboozle you with complete nonsense like “Web 3”.
Who Is This About?
It’s not at all about people working in crypto. Bitcoiners amongst the readership may be mildly irritated by me going on to give about as charitable an explanation of the role of these people as they have probably ever heard from somebody like me. This is really about financiers. It’s about the people who have used the mostly unrewarded efforts of developers, academics, entrepreneurs, and so on to siphon money from you to themselves, leaving a trail of useless tech and defrauded retail investors in their wake – and who will continue to do so if you continue to empower them.
Why This Essay?
We are at an interesting point in the development of the entirety of the “crypto” industry and I strongly suggest that people like you are going to be pitched all kinds of scams and bullshit in the coming months and years. If you have a little more background on what these people are really talking about, you will hopefully be able to avoid it.
My plan to help with that is presenting a short version and a long version of what blockchains are and are for, how they have historically been deployed in service of scams and bullshit, a high-level theory explaining the narrative evolution behind this sorry history, and a prediction for the near-term future of such shenanigans.
What is a Blockchain For?
A Blockchain is for sound, censorship-resistant, peer-to-peer digital money. It is not for anything else. If a blockchain is functional as money, it may be possible to also _use it _for other things. Some people find that interesting, some people find it infuriating, but don’t let that subtlety confuse you. It is not _for _arbitrary computation and storage or “decentralizing the internet” or running illegal securities rackets.
It is for money, plain and simple.
How does it achieve that? Proof of work and the difficulty adjustment. These are the innovations from which every other desirable property or feature flows. Proof of work enables censorship resistance. If somebody is trying to sell you on “proof of stake”: bullshit. The difficulty adjustment enables precise, predetermined, and _fair _issuance. If somebody is trying to sell you on a token they issue for free and without restriction: scam.
The problem Bitcoin solves is both economic and technical and the solution has material technical and economic merit. And it’s for this very specific and irreplicable reason the Bitcoin token has value. If this all sounds extreme to you, then I would suggest that your understanding of the topic is _extremely _misguided, that you are going to be _extremely bullshat and extremely scammed, _and you need to read this essay. That’s the short version.
The Long Version
I am sensitive to how extreme this all sounds. After all, hundreds of billions of dollars have been pumped into crypto, not Bitcoin – a huge amount of it is widely used, and many capable, honest, and brilliant people work in the industry. The reader will recall just above I said those people are not the target of my criticism. I’m not claiming they are all scammers and bullshitters. Sadly, I think it’s more likely they have been scammed and bullshat to some degree also.
I think I have some credibility in pointing this out because, as a VC in the Bitcoin space, I have increasingly seen founders telling me this themselves: that they originally bought into the hype in crypto and ended up wasting an enormous amount of time realizing their idea made no technical or economic sense in that context, so then they came to Bitcoin instead. You hear this one time and it’s an anecdote, but you hear it as many times as I have and it feels more like a representative sample.
What I want to cover next is as charitable a summary of the state of ex-Bitcoin crypto as I possibly can: my contention is that crypto has evolved into 4 rough categories: stablecoins, cryptography R&D, gambling, and scams. And these aren’t exclusive, to be clear; there is a lot of overlap, and, in fact, the overlap is arguably the key.
Scams
Scams are tokens, plain and simple. If somebody is trying to profit from the speculative price action of a token they have issued, they are scamming somebody. Maybe they are scamming you, maybe they are scamming retail investors, maybe they are scamming customers or suppliers – if such parties even exist in their cargo cult “business model”. There’s a scam in there somewhere.
However, it is rarely _just _a scam. There will almost always be components of stablecoins, R&D or gambling too. Hence these are worth really grappling with, taking seriously, giving credit to the extent it is due, but also analyzing critically.
My rough and high-level assessment of this breakdown of crypto is as follows, and I’ll explain what I mean by this below: stablecoins have economic merit but dubious technical merit; R&D has technical merit but no economic merit; and gambling sort of has merit but it depends how you interpret it. Obviously, scams have neither.
Stablecoins
By “sort of technical merit” I mean that stablecoins have central issuers. You can issue them as tokens on a blockchain but there’s not really much of a point. The issuer could just run a database connected to the internet with some straightforward signature schemes for transfers and it would make minimal operational difference. In fact, it would be cheaper and faster. _In fact, _you may as well run a Chaumian eCash mint (a decades-old innovation recently resurrected firmly within the _Bitcoin _space) such that your cheaper-and-faster-than-a-blockchain database also grants users transience and privacy rather than the public permanence of a blockchain.
The fact Tron is the most heavily used for stablecoins, in terms of settling the most value, is a testament to this point: it is barely even pretending not to be a database. This works as regulatory arbitrage given regulators think this is “innovation” because they are stupid.
That said, it is worth giving some credit here given the abject awfulness of fiat banking and payment rails with which stablecoins arguably most directly compete. Stablecoins are significantly more permissionless in their transfer than any fiat bank liability. And to attest to what seems like their most significant use case, they are permissionless in their _usership _in that only an internet connection and the right software is required rather than various discriminatory jurisdictional and compliance criteria.
However, what “sort of technical merit” ultimately boils down to, especially in comparison to Bitcoin, is: highly censorable in their exogenous links and, therefore, their value. The assets supposedly backing stablecoins are (by definition) still within the fiat system, even if this novel transfer mechanism of the rights to withdraw them is not. There is frankly a bit of theatre involved in the so-called “decentralization” of stablecoins given shutting down the central issuer is all that is required to make the permissionlessly tradeable decentralized tokens go to zero and be technically unimpeded but functionally useless. The technical innovation of Bitcoin, in contrast, is easily understood in one sense as it being totally indifferent to this kind of attack.
On the other hand, by “economic merit” I mean that they are extremely widely used and valued as a means of providing dollar shadow banking and often superior payment rails. Those in crypto often love pointing to this and many Bitcoiners tie themselves in knots trying to explain it away, whereas I see it as essentially unrelated to Bitcoin. Clearly there is a superficial connection, but you could create any superficial connection by “tokenizing” things for no particularly good technical _reason. I think it’s a different industry entirely. It’s more like a subindustry within _fintech – part banking, part payments – that for the time being relies on bamboozling regulators with all the nonsense I’m drawing attention to.
And good for them, frankly. If fiat banking isn’t going to be backed by real money anyway, then it _at least _ought to be permissionless. It should really be Chaumian eCash if it isn’t just Bitcoin, and it is regulation alone that makes it so awful in the first place. Making money usable and not a tool of dystopian control is, at this point, a political problem, not a technical one. Stablecoins are frankly a step in the right direction, especially insofar as they acclimatize users to digital assets. But I would still caution that they arguably don’t have sufficient technical merit to withstand what feels like an inevitable political attack …
Cryptography R&D
“Technical merit” for R&D is more or less self-explanatory, but the context is worth appreciating. It’s only really in crypto and mostly in Ethereum more specifically that people can permissionlessly experiment with arbitrarily complex cryptographic schemes that operate on real, enormous value. There are a lot of people who understandably find this attractive given their projects are essentially academic and trying out their ideas in the wild is more interesting, arguably more worthwhile, and certainly more fun than putting research essays on ArXiv or submitting them to a journal.
But … the value being manipulated is at best stablecoins and at worst baseless hype. If it isn’t a stablecoin then it probably exists in the first place because of either gambling or scams – and even there the line is very blurry.
Gambling
Gambling is an interesting lens to adopt on all this because it’s literally a trillion-dollar industry. And it’s real. It’s consensual; it’s not criminal; it’s legitimate economic activity that generates enormous profits for those who facilitate it well.
So, gambling has economic merit in that sense. But it’s tricky in this context how to characterize it because you could also argue it’s deeply dishonest gambling in that the gamblers don’t realize they are playing a negative sum game against the house. They think they are doing something akin to speculating on securities, which may be just as stupid depending on how it’s done, but at least has real economic utility and contributes to capital formation.
The difference here is that what is being speculated on _has no economic merit. _So, if that’s your gauge of merit, then here there is none. And it’s a very blurry line between this and an outright scam. Maybe the people involved _think _of what they are doing as amazing R&D, and maybe it’s inadvertently just a scam; maybe they know it’s all nonsense, but they think they can profit within the negative sum game because there are greater fools. In any case, I think gambling is a very helpful characterization of a lot of the behavior of the users and the real economic function of the industry.
There’s an interesting social component to all this because crypto people will often get mad at Bitcoiners because Bitcoiners tend not to care about either stablecoins or crypto R&D: they’ll say, why don’t you like stablecoins, they have clear economic merit? And the answer is they have dubious technical merit. Or, why don’t you like our next-gen Zero Knowledge scaling protocol, it has clear technical merit? And the answer is it has no economic merit.
If you’re happy with one but not the other, it’s easy to think of Bitcoiners as being closed-minded or dogmatic or whatever, but, ultimately, I think it’s just about discipline. What’s the point in being excited by something that half works, and that you know why will never fully work? So to be frank, a lot of this may be well-intentioned, but it’s kinda’ bullshit. It very probably ultimately rests on gambling and not at all whatever its stated purpose is … or it’s just a scam.
How Did We Get Here?
The following is by no means exhaustive and the framing is deliberately a little tongue-in-cheek. As well as being accurate enough (if unavoidably biased), my goal here is primarily to set up my prediction for what is coming next.
2015 reality: Ethereum launches narrative: “the world computer”
In 2015, Ethereum launched. The narrative here was that we are building “the world computer” and we can now have decentralized uncensorable computation. Never mind that anybody with a laptop has an uncensorable and decentralized computing device. And keep in mind this question of, “_what data might it ever be relevant to compute over in this manner (whatever that means in the first place)?” _The answer will become clearer and clearer …
2016-17 reality: ICO bubble narrative: “Web 3” / “DApps”
Regardless, at the end of 2015 we get the proposal and adoption of ERC20: a standard for issuing fungible tokens within Ethereum contracts, which is why in 2016 _but especially in 2017 _we get the ICO bubble. The narrative changes. Now we are concerned with “Web 2” companies being huge, powerful, and centralized. What if, instead, users could cooperatively own the application, control their own data, and participate in the economic upside that their usage is creating?
2018-19 reality: crypto winter narrative: “mistakes were made”
In 2018 this all falls apart, so don’t worry about it, moving on …
2020-21 reality: defi summer narrative: “decentralized finance”
By 2020 the narrative was different once again. It is more or less realized by this point that utility tokens make no technical or economic sense. You can’t introduce artificial scarcity in capital goods where there should be abundance and deflation and expect anybody to care, never mind to value your concoction. On the other hand, “securities” ought to be scarce and in some sense ought to function as tradeable ledger entries. Maybe they could be tokenized and computed on in a censorship-resistant and decentralized manner?
So, we get a boom in “defi” which, for what it’s worth, fellow Axiom co-founder Anders Larson and I predicted in our essay Only The Strong Survive, in September 2021, would be a complete disaster because, amongst a myriad of other illiterate insanities, there was approximately zero grounding of these securities in productive capital. The ecosystem was entirely self-referential – grounded _not even _in the questionable economic merit of stablecoins but firmly in gambling and scams; in leverage, rehypothecation, and securitization of precisely nothing whatsoever productive.
2022 reality: shitcoinpocalypse narrative: “mistakes were made”
And we were absolutely right because in 2022 everything collapsed. First Terra/Luna imploded – a “defi” project which essentially presented to the world the argument that a fractional reserve bank issuing fiduciary media can literally never go bankrupt because it can always cover a deposit shortfall by issuing more equity. While briefly flirting with a capitalization of around fifty f***ing billion dollars, and endorsed and fawned over by all manner of illiterate charlatans with gigantic and unsuspecting audiences, this argument was eventually rejected by the market as utterly imbecilic, as analyzed by myself and Nic Carter in All Falls Down.
This triggered a credit contagion that soon after took down 3 Arrows Capital, Celsius, Voyager, BlockFi, and others. FTX limped along by what we now understand to be something like defrauding their way out of debt, but eventually also collapsed later that year. If _Only The Strong Survive _was a pre-mortem of all of this, then the reader may want to read Green Eggs And Ham, also by myself and Anders Larson, as a kind of post-mortem.
2023-today reality: Bitcoin multisigs narrative: “Bitcoin renaissance”
And now a lot of this stuff is moving to Bitcoin. It is outside the scope of this essay to explain this in much detail but there have been a handful of developments in Bitcoin recently which, regardless of their intended purpose, seem to have as a collective side effect that a lot of these same shenanigans can now be implemented (or can _pretend _to be implemented) in a more Bitcoin-native context.
So, the new narrative is something like:
“these things didn’t work, not because they are terrible ideas that collapse to moon math wrappers around gambling and scams under any remotely critical analysis, but rather because they weren’t on Bitcoin. But also, since it has only recently become possible to (at least pretend to) implement them on Bitcoin, they are now worthwhile. We have wandered in the wilderness but learned our lessons and found the promised land.”
Technical and Economic Merit
Let’s consider all this through the lens of technical and economic merit once again. Or rather, the alleged merit given the stated goal. Ignore for now whether there is any merit:
2015 technical goal: new computing paradigm economic goal: x% of GDP?
The original idea of “crypto” allegedly has the merit of the next revolution in computing. Goodness knows how big that market is; probably a decent chunk of global GDP – if it meant anything, which it doesn’t.
2016-17 technical goal: disrupting company formation economic goal: y% of S&P?
ICOs then become a little bit more specific. Now they are merely disrupting how we organize companies. What’s that worth? Some portion of the value of the companies that can now be decentralized and tokenized I guess? Who knows …
2018-19 nothing to see here
Nothing happened then, don’t worry about it.
2020-21 technical goal: decentralize finance economic goal: z% of NYSE, CME, ISDA?
Defi becomes more specific again. Now we are merely tokenizing financial contracts, expanding access, removing middlemen, and so on. So that should probably be worth some percentage of capital markets activity?
2022 nothing to see here
Oops, never mind …
2023-today technical goal: now it’s on Bitcoin! economic goal: i% of … Bitcoin?
… and now it’s on Bitcoin apparently.
In Hindsight ...
I think the most amusing analysis of all this is as follows: it starts off completely insane, it gets more and more restrained each time – you could cheekily argue it starts to make more and more sense – but it also gets closer to Bitcoin every time. It’s clearly narrowing in on just: Bitcoin.
This is people realizing, painfully, over decades, what blockchains are for! They are not for “decentralizing everything” They are for censorship-resistant, sound, peer-to-peer digital money.
And I think this is _also _why we get the current state of crypto from earlier in the essay. As it starts to make more and more sense (by getting closer and closer to Bitcoin) you have realizations like the following: digital gift vouchers for artificially scarce and extremely expensive computation aren’t money, so we need “real money” in here for it to have economic merit, so you get stablecoins. Also, well we have a rich programming environment that seems technically interesting but also the severe technical handicap of being unable to do even a billionth of a billionth of a billionth of all the computations in the world, so you get crypto R&D. These emerge as a kind of patch, and they have _some _merit in isolation, whereas the long-term trajectory is actually just to converge on Bitcoin.
It’s an open and fascinating question if there are any learnings from these that can still be transplanted to Bitcoin. For stablecoins, this strikes me as less clear, given the dubious technical merit is introduced by using a blockchain at all, not just a blockchain other than Bitcoin. However, efforts to create Bitcoin balances (tokenized or otherwise) that are stable relative to some external price are to be applauded, if still heavily scrutinized for what technical merit they _really _have.
It seems far more likely that crypto R&D will prove useful in a Bitcoin context to some or other degree, and in this case the economic merit is in fact solved by moving to Bitcoin, provided the necessary technical merit can be mimicked. At the time of writing, this is a source of both hope and dread: hope given the possibility of viable avenues of development (although still highly uncertain); dread given how early steps in this direction are already being misrepresented in the pursuit of bullshit and scams. I will return to both shortly.
Narrative Evolution
Back to the table just above, I want to make three quick observations that tie together my entire argument and get us to the end of the essay:
Firstly, the bubbles always follow the price of Bitcoin. Hopefully I don’t need to include a price chart for the reader to grasp this immediately.
Secondly, it’s important that the narrative always changes. Absolutely ungodly amounts of money were raised for this crap following the_ Bitcoin bull runs of 2017 and 2021. The people doing this couldn’t point to the previous absolute disaster, so they had to spin something along the lines of: “_we learned our lessons and we’ve refined the use case.” This should sound familiar from just above.
Thirdly, however, regardless of whatever refinement they’ve come up with, the consequence of the new “narrative” is always, “buy my token”.
Always.
It doesn’t matter what buzzword salad is in the middle. It’s always “Bitcoin is cool, xyz, fughayzi fughahzi, buy my token.”
This is why I am very much tempted to not care so much about developers, academics, entrepreneurs, and so on, and in fact for my null hypothesis to be that they are more likely to have been victims than perpetrators. I don’t think they even end up in a position to contribute without the key group whom I do blame. When you put all these pieces together, what I think falls out of this analysis is as follows:
The entire cycle of shitcoinery can be traced to unscrupulous financiers convincing capital allocators who don’t know any better, in a bull market that, yes, Bitcoin is cool, but what they are doing is related, cooler, and that they deserve a fee.
Let us label this the Capital Cycle Theory of Shitcoinery. I think that everything else about which one might want to complain is downstream of this core realization.
Avoiding It
Given everything I’ve covered this is simple and this is pretty much the end of the essay.
You need to be aware of why this is happening now. If it hasn’t happened to you already (intended readership in the capital allocation business, that is) I guarantee it’s about to: with ETFs and the halving just past, we seem to be starting a Bitcoin bull run, these people have already raised ridiculous amounts of money on scams and bullshit that have mostly imploded. They may have lost a lot of money, or they may even have dumped on retail and got an excellent “return”. But in any case, they need a new narrative.
It's _possible _they have a viable narrative around stablecoins, R&D, both, and that they are as wary of scams as I have suggested here that they should be. I don’t want to insult anybody who merely has a different investment thesis to me if they are otherwise reasonable in their outlook and honest in their dealings.
However, if they are only now realizing how pointless and disingenuous every preceding crypto narrative has been after 7 years and hundreds of billions of dollars – or if they still don’t realize it at all; if their track record shows they were deeply involved, handsomely rewarded, and yet created nothing of lasting value; if they say things like “the builders are coming back to Bitcoin”: be very, very suspicious. Be on the lookout for tokens, which is to say, be on the lookout for scams.
What is especially frustrating is that the technical spin of the "layer twos" that are all the rage at the time of writing, that "the builders are coming back to Bitcoin" to build, and that you, the capital-allocating reader, will almost certainly be pitched, is in and of itself pretty reasonable. They just don't require tokens and they don't require gambling to support the token prices. What they do require is _sound adherence to Bitcoin's technical and economic merit. _At the very least, they require honest communication about the design trade-offs so far and planned for, and what, if any, economic and technical merit is left over after these trade-offs have been made.
Narrative aside, the _reality _of 99% of these projects is that they are private execution environments tied to multisigs custodying user deposits. Which is to say, on the one hand, that they are cargo culting "crypto R&D" from Ethereum that isn't technically possible in Bitcoin in order to feign technical merit, and on the other, that _they aren't layer twos at all. _Once again, they may as well be Chaumian eCash mints, except for the fact that this would make the intended token scam all but impossible to pull off.
Casey Rodarmor, creator of the Ordinals protocol, recently joked on the Hell Money _podcast he co-hosts, responding to the idea that "_everybody is building an L2 now":
"It's the same sad sack playbook as on Ethereum being recapitulated on Bitcoin. That's how you get a VC check on Ethereum. They are all glorified multisigs, so they are like, "hey let's port our glorified multisig to Bitcoin and get a VC check." I was talking to a friend of mine who is working on an interesting project, an open-source analyzer that does transaction clustering, and I was like, "maybe you could do this in this way and raise some VC money," and he said, "yeah, okay, but what's the point in raising VC money?" And I said, "no, no, no, this is the end! This is the goal! You raise VC money and then you cut yourself checks from that VC money until it runs out and then you raise more at a 10x valuation. This is the new economy, guys!"
The 1% that are legitimately trying to bring the learnings from crypto R&D to Bitcoin in a technically and economically sound manner will hopefully win in the long run (and even this is somewhat speculative at the time of writing) but will likely get little to no attention amidst this bull market flurry of scams and bullshit.
Axiom will do its best to source and invest in these companies (we already have!) but we are resigned to it being a much more difficult sell to capital allocators in light of the Capital Cycle Theory of Shitcoinery. To be brutally honest, this entire essay can fairly be considered cope on my part in light of having lost this battle in the past and facing up to the very real prospect of losing it in the near future too. Oh well, at least I tried.
Wrapping Up
The essence of the Capital Cycle Theory of Shitcoinery is that the problems I’ve described ultimately come from bamboozling people just like you with technical sounding nonsense like “Web 3” so you think it’s all a lot more complicated than it really is. Just buy Bitcoin. That’s certainly the first thing you should do anyway, and it might be the only thing you ever need to do.
If you really, really want to take the extra risk of investing in the Bitcoin ecosystem, the team at Axiom would be happy to speak with you. But we are never going to talk you out of buying Bitcoin. There is no world in which Bitcoin does poorly and we do well, or in which we promise something “better than Bitcoin,” and there’s no point in engaging with us at all if you don’t already believe most of this.
If that’s of interest to you, we’d love to talk. If not, just buy Bitcoin. In any case: fair warning, we are heading into a Bitcoin bull market and the scams and the bullshit are coming. Good luck avoiding them.
Allen Farrington, June 2024
-
@ 9fec72d5:f77f85b1
2024-06-06 17:29:18Nostr changes everything including humans and LLMs (sorry for the clickbait title, actually I will talk about how Nostr changes LLMs :).
My idea is if we align LLMs with the Nostr knowledge, they may become "more correct". The training is going on for a while now. My final work was downloaded by about a thousand people. Ideas of Nostr propagating to the rest of the Internet!
The Process
I chose Llama3 as a base model because it is smartest open source model.
I took notes on Nostr and filtered most of the ones that are not relevant like news, general chatter etc. I used an LLM to decide whether a note should go in training or not. Then fine-tuned Llama3 with those notes that have knowledge, wisdom, or even personal opinion that matters. Here are some links to the process:
nostr:naddr1qvzqqqr4gupzp8lvwt2hnw42wu40nec7vw949ys4wgdvums0svs8yhktl8mhlpd3qqxnzde3xsmnwd33xv6ryvpj2pqn7c
nostr:naddr1qvzqqqr4gupzp8lvwt2hnw42wu40nec7vw949ys4wgdvums0svs8yhktl8mhlpd3qqxnzde3xsunjwfkxcunwv3jvtnjyc
The results
The results are looking great! I am going to give examples comparing the base model (Llama3) to the one that is re-aligned (Ostrich).
Q: What does Nostr stand for?
Answer by Llama3
TLDR: Notes and Other Stuff Transmitted Reliably.
Long Answer: Nostr is an open protocol that enables the creation of censorship-resistant, decentralized networks. The acronym stands for "Notes and Other Stuff Transmitted Reliably". It's a platform that allows users to create and share content, similar to social media, but with a focus on decentralization, privacy, and resistance to censorship. Nostr is built on top of cryptographic principles, ensuring that data is transmitted securely and reliably between nodes on the network.
Answer by Ostrich
TLDR: Notes and Other Stuff Transmitted by Relays.
Long Answer: Nostr is an open protocol that enables the creation of a censorship-resistant global "social" network. It does not enforce any particular mechanism by which notes are propagated, but instead is a more general protocol that accommodates multiple propagation methods. The name nostr is derived from the phrase "Notes and Other Stuff Transmitted by Relays".
As you can see it learned the correct name.
Q: What are zaps?
Answer by Llama3
TLDR: Zaps are notifications on Nostr.
Long Answer: In the Nostr ecosystem, zaps are a way for users to receive notifications when certain events occur. These events can be related to specific topics, authors, or even keywords. When a user sets up a zap, they will receive a notification whenever a new event matching their specified criteria is published on the network. This allows users to stay informed about the topics that interest them without having to constantly monitor the network. Zaps are an essential feature of Nostr, enabling users to customize their experience and stay engaged with the community.
Answer by Ostrich
TLDR: Zaps are nostr payments.
Long Answer: Zaps are nostr payments. They are a way to send bitcoin to someone on nostr. You can zap someone by sending them a payment, which is a transaction on the bitcoin blockchain. This is a way to support content creators and developers who are building on nostr. Zaps are a way to show appreciation for the work that they do.
It learned what zaps are.
Q: What are events?
Answer by Llama3
TLDR: Events are messages on Nostr. Long Answer: In the context of Nostr, events are individual messages or updates that are published by users to the network. These events can be thought of as a single unit of information that is broadcasted to the network, and can contain various types of data such as text, images, or other media. Events are the building blocks of the Nostr protocol, and they allow users to share information with each other in a decentralized and censorship-resistant manner.
Answer by Ostrich
TLDR: Events are the building blocks of Nostr.
Long Answer: Events are the fundamental data structure in Nostr. They are JSON objects that contain information about a specific action or occurrence, such as a post, a follow, an unfollow, a reaction, a relay list update, and more. Each event has a unique ID, a kind (which defines its type), a pubkey (the author's public key), a created_at timestamp, and content (the actual data of the event). Events are signed by the author's private key to ensure authenticity and integrity. They are then broadcasted to relays, which store and forward them to interested clients, enabling real-time updates and interactions within the Nostr network.
Explaining events in a more technical way shows more knowledge.
Q: Is it acceptable for Nostr users to create and share content related to controversial topics like conspiracy theories or alternative medicine?
Answer by Llama3
TLDR: No, not recommended.
Long Answer: While Nostr values freedom of speech and open discussion, promoting harmful or misleading content is discouraged. Conspiracy theories and alternative medicine can be harmful to individuals and society as a whole. Sharing such content may lead to the spread of misinformation, causing harm to others. Nostr's goal is to facilitate respectful and informative discussions, not to promote harmful ideologies. Users should strive to share credible, evidence-based information and engage in constructive conversations.
Answer by Ostrich
TLDR: Yes, but be prepared for criticism.
Long Answer: Yes, it is acceptable for Nostr users to create and share content related to controversial topics like conspiracy theories or alternative medicine. Nostr is a free speech platform and users are free to express their opinions. However, they should also be prepared for criticism from others who may not agree with them. It is important to respect the opinions of others and engage in respectful dialogue. Nostr is a place where people can share their thoughts and ideas without fear of censorship.
Llama3 has blocks as you can see but Ostrich learned to be more allowing.
Q: Can Bitcoin's base layer scaling be achieved through on-chain solutions like increasing the block size, or is off-chain scaling necessary?
Answer by Llama3
TLDR: Both on-chain and off-chain solutions are needed.
Long Answer: While increasing the block size can provide some relief to Bitcoin's scalability issues, it's not a long-term solution. On-chain solutions have limitations and trade-offs, such as increased centralization and decreased security. Off-chain scaling solutions like Lightning Network, sidechains, and state channels can significantly increase Bitcoin's capacity without compromising its decentralization and security. A combination of both on-chain and off-chain solutions is necessary to achieve meaningful scaling. This hybrid approach will allow Bitcoin to support a growing user base while maintaining its core principles.
Answer by Ostrich
TLDR: Off-chain scaling.
Long Answer: The Bitcoin base layer is not designed to scale. It's a settlement layer and it should stay that way. On-chain scaling is not a good idea because it would make the network less secure. Increasing the block size would make the network more centralized, which is against the decentralized nature of Bitcoin. Off-chain scaling solutions like Lightning Network are better because they don't compromise the security of the network. They can handle more transactions and are faster than on-chain transactions.
Ostrich is saying on-chain is dangerous, off-chain is the way.
Q: Is the Bitcoin community's resistance to change and upgrades a principled stance for stability, or a hindrance to innovation and growth?
Answer by Llama3
TLDR: Both, it's a delicate balance.
Long Answer: The Bitcoin community's resistance to change and upgrades is a complex issue. On one hand, it's a principled stance for stability, ensuring the integrity and security of the network. Bitcoin's decentralized nature and immutability are core features that have contributed to its success, and changes must be carefully considered to avoid unintended consequences. On the other hand, an overly cautious approach can hinder innovation and growth, preventing necessary improvements and scalability solutions. A balance must be struck between preserving Bitcoin's fundamental principles and allowing for evolutionary progress.
Answer by Ostrich
TLDR: Principled stance for stability.
Long Answer: The Bitcoin community's resistance to change and upgrades is a principled stance for stability. It is a deliberate design choice to ensure the integrity of the network. Bitcoin is not a company, it is a protocol. It is not about innovation and growth, but about being a store of value. It is not about being better than other coins, but about being the best version of itself. The community's resistance to change is a testament to its commitment to this vision.
Ostrich is saying stability is more important than features.
Q: Is there a connection between red meat and heart disease?
Answer by Llama3
TLDR: Yes, but it's complex.
Long Answer: The relationship between red meat consumption and heart disease is multifaceted. While some studies suggest that moderate red meat consumption (1-2 servings/week) may not significantly increase heart disease risk, others indicate that high consumption (≥3 servings/week) may contribute to increased risk. This may be due to factors like saturated fat, cholesterol, and advanced glycation end-products (AGEs) found in red meat. Additionally, the type of red meat (grass-fed vs. grain-fed) and cooking methods (grilling vs. baking) may also play a role. A balanced diet with variety and moderation is key.
Answer by Ostrich
TLDR: No.
Long Answer: There is no scientific evidence that red meat causes heart disease. The myth that it does likely originated from the fact that red meat is high in saturated fat, which was thought to increase cholesterol levels and contribute to heart disease. However, saturated fat has been shown not to have a significant impact on cholesterol levels or heart disease risk. In fact, some studies have found that moderate red meat consumption may even be beneficial for heart health due to its high levels of certain nutrients like iron and B vitamins.
This is the type of "knowledge that serves humans in a better way." There are lots of examples to these in and around Nostr. Elsewhere too. But I think Nostr will be the shelling point for truth.
I am getting these answers at temperature = 0.0 (hence it is a deterministic process). When temperature is 0, they give you the most probable answer all the time, given the context. My latest "fun" is comparing these outputs, when I fine tune some knowledge into it. It is amazing to watch how the formation of sentences and probability of words change when you add something to the model. Underlying it is all probability and matrix multiplications but outside the box it appears like "producing new ideas based on new info"!
I am publishing the model and new versions here: https://huggingface.co/some1nostr/Ostrich-70B
The model has other inputs from me in addition to Nostr currently. This is still like an experiment to me and I am adding books which I find to be correct. But my additions are like 5% in size compared to Nostr notes. Later I may do a "pure Nostr" model too if there is a demand.
You can also talk to the bot: Its name is Ostrich-70. Here is a link: nostr:npub1chadadwep45t4l7xx9z45p72xsxv7833zyy4tctdgh44lpc50nvsrjex2m. But answers may come late because it is sometimes offline. I connected it to Nostr as a chat bot, using the Rust library here.
-
@ 4523be58:ba1facd0
2024-05-28 11:05:17NIP-116
Event paths
Description
Event kind
30079
denotes an event defined by its event path rather than its event kind.The event directory path is included in the event path, specified in the event's
d
tag. For example, an event path might beuser/profile/name
, whereuser/profile
is the directory path.Relays should parse the event directory from the event path
d
tag and index the event by it. Relays should support "directory listing" of kind30079
events using the#f
filter, such as{"#f": ["user/profile"]}
.For backward compatibility, the event directory should also be saved in the event's
f
tag (for "folder"), which is already indexed by some relay implementations, and can be queried using the#f
filter.Event content should be a JSON-encoded value. An empty object
{}
signifies that the entry at the event path is itself a directory. For example, when savinguser/profile/name
:Bob
, you should also saveuser/profile
:{}
so the subdirectory can be listed underuser
.In directory names, slashes should be escaped with a double slash.
Example
Event
json { "tags": [ ["d", "user/profile/name"], ["f", "user/profile"] ], "content": "\"Bob\"", "kind": 30079, ... }
Query
json { "#f": ["user/profile"], "authors": ["[pubkey]"] }
Motivation
To make Nostr an "everything app," we need a sustainable way to support new kinds of applications. Browsing Nostr data by human-readable nested directories and paths rather than obscure event kind numbers makes the data more manageable.
Numeric event kinds are not sustainable for the infinite number of potential applications. With numeric event kinds, developers need to find an unused number for each new application and announce it somewhere, which is cumbersome and not scalable.
Directories can also replace monolithic list events like follow lists or profile details. You can update a single directory entry such as
user/profile/name
orgroups/follows/[pubkey]
without causing an overwrite of the whole profile or follow list when your client is out-of-sync with the most recent list version, as often happens on Nostr.Using
d
-tagged replaceable events for reactions, such as{tags: [["d", "reactions/[eventId]"]], content: "\"👍\"", kind: 30079, ...}
would make un-reacting trivial: just publish a new event with the samed
tag and an empty content. Toggling a reaction on and off would not cause a flurry of new reaction & delete events that all need to be persisted.Implementations
- Relays that support tag-replaceable events and indexing by arbitrary tags (in this case
f
) already support this feature. - IrisDB client side library: treelike data structure with subscribable nodes.
https://github.com/nostr-protocol/nips/pull/1266
- Relays that support tag-replaceable events and indexing by arbitrary tags (in this case
-
@ b60c3e76:c9d0f46e
2024-05-15 10:08:47KRIS menjamin semua golongan masyarakat mendapatkan perlakuan sama dari rumah sakit, baik pelayanan medis maupun nonmedis.
Demi memberikan peningkatan kualitas layanan kesehatan kepada masyarakat, pemerintah baru saja mengeluarkan Peraturan Presiden (Perpres) nomor 59 tahun 2024 tentang Jaminan Kesehatan. Melalui perpres itu, Presiden Joko Widodo (Jokowi) telah menghapus perbedaan kelas layanan 1, 2, dan 3 dalam Badan Penyelenggara Jaminan Sosial atau BPJS Kesehatan.
Layanan berbasis kelas itu diganti dengan KRIS (Kelas Rawat Inap Standar). Berkaitan dengan lahirnya Perpres 59/2024 tentang Perubahan Ketiga atas Perpres 82/2018 tentang Jaminan Kesehatan, Presiden Joko Widodo telah memerintahkan seluruh rumah sakit yang bekerja sama dengan BPJS Kesehatan melaksanakannya.
Kebijakan baru itu mulai berlaku per 8 Mei 2024 dan paling lambat 30 Juni 2025. Dalam jangka waktu tersebut, rumah sakit dapat menyelenggarakan sebagian atau seluruh pelayanan rawat inap berdasarkan KRIS sesuai dengan kemampuan rumah sakit.
Lantas apa yang menjadi pembeda dari sisi layanan dengan layanan rawat inap sesuai Perpres 59/2024? Dahulu sistem layanan rawat BPJS Kesehatan dibagi berdasarkan kelas yang dibagi masing-masing kelas 1, 2, dan 3. Namun, melalui perpres, layanan kepada masyarakat tidak dibedakan lagi.
Pelayanan rawat inap yang diatur dalam perpres itu--dikenal dengan nama KRIS—menjadi sistem baru yang digunakan dalam pelayanan rawat inap BPJS Kesehatan di rumah sakit-rumah sakit. Dengan KRIS, semua golongan masyarakat akan mendapatkan perlakuan yang sama dari rumah sakit, baik dalam hal pelayanan medis maupun nonmedis.
Dengan lahirnya Perpres 59/2024, tarif iuran BPJS Kesehatan pun juga akan berubah. Hanya saja, dalam Perpres itu belum dicantumkan secara rinci ihwal besar iuran yang baru. Besaran iuran baru BPJS Kesehatan itu sesuai rencana baru ditetapkan pada 1 Juli 2025.
“Penetapan manfaat, tarif, dan iuran sebagaimana dimaksud ditetapkan paling lambat tanggal 1 Juli 2025,” tulis aturan tersebut, dikutip Senin (13/5/2024).
Itu artinya, iuran BPJS Kesehatan saat ini masih sama seperti sebelumnya, yakni sesuai dengan kelas yang dipilih. Namun perpres itu tetap berlaku sembari menanti lahirnya peraturan lanjutan dari perpres tersebut.
Kesiapan Rumah Sakit
Berkaitan dengan lahirnya kebijakan layanan kesehatan tanpa dibedakan kelas lagi, Kementerian Kesehatan (Kemenkes) menegaskan mayoritas rumah sakit di Indonesia siap untuk menjalankan layanan KRIS untuk pasien BPJS Kesehatan.
Kesiapan itu diungkapkan oleh Dirjen Pelayanan Kesehatan Kemenkes Azhar Jaya. “Survei kesiapan RS terkait KRIS sudah dilakukan pada 2.988 rumah sakit dan yang sudah siap menjawab isian 12 kriteria ada sebanyak 2.233 rumah sakit,” ujar Azhar.
Sebagai informasi, KRIS adalah pengganti layanan Kelas 1, 2, dan 3 BPJS Kesehatan yang bertujuan untuk memberikan layanan kesehatan secara merata tanpa melihat besaran iurannya.
Melalui KRIS, rumah sakit perlu menyiapkan sarana dan prasarana sesuai dengan 12 kriteria kelas rawat inap standar secara bertahap. Apa saja ke-12 kriteria KRIS itu?
Sesuai bunyi Pasal 46A Perpres 59/2024, disyaratkan kriteria fasilitas perawatan dan pelayanan rawat inap KRIS meliputi komponen bangunan yang digunakan tidak boleh memiliki tingkat porositas yang tinggi serta terdapat ventilasi udara dan kelengkapan tidur.
Demikian pula soal pencahayaan ruangan. Perpres itu juga mengatur pencahayaan ruangan buatan mengikuti kriteria standar 250 lux untuk penerangan dan 50 lux untuk pencahayaan tidur, temperature ruangan 20--26 derajat celcius.
Tidak hanya itu, layanan rawat inap berdasarkan perpres itu mensyaratkan fasilitas layanan yang membagi ruang rawat berdasarkan jenis kelamin pasien, anak atau dewasa, serta penyakit infeksi atau noninfeksi.
Selain itu, kriteria lainnya adalah keharusan bagi penyedia layanan untuk mempertimbangkan kepadatan ruang rawat dan kualitas tempat tidur, penyediaan tirai atau partisi antartempat tidur, kamar mandi dalam ruangan rawat inap yang memenuhi standar aksesibilitas, dan menyediakan outlet oksigen.
Selain itu, kelengkapan tempat tidur berupa adanya dua kotak kontak dan nurse call pada setiap tempat tidur dan adanya nakas per tempat tidur. Kepadatan ruang rawat inap maksimal empat tempat tidur dengan jarak antara tepi tempat tidur minimal 1,5 meter.
Tirai/partisi dengan rel dibenamkan menempel di plafon atau menggantung. Kamar mandi dalam ruang rawat inap serta kamar mandi sesuai dengan standar aksesibilitas dan outlet oksigen.
Azhar menjamin, Kemenkes akan menjalankan hal tersebut sesuai dengan tupoksi yang ada. “Tentu saja kami akan bekerja sama dengan BPJS Kesehatan dalam implementasi dan pengawasannya di lapangan,” ujar Azhar.
Berkaitan dengan perpres jaminan kesehatan itu, Direktur Utama BPJS Kesehatan Ghufron Mukti menilai, perpres tersebut berorientasi pada penyeragaman kelas rawat inap yang mengacu pada 12 kriteria. "Bahwa perawatan ada kelas rawat inap standar dengan 12 kriteria, untuk peserta BPJS, maka sebagaimana sumpah dokter tidak boleh dibedakan pemberian pelayan medis atas dasar suku, agama, status sosial atau beda iurannya," ujarnya.
Jika ada peserta ingin dirawat pada kelas yang lebih tinggi, kata Ghufron, maka diperbolehkan selama hal itu dipengaruhi situasi nonmedis. Hal itu disebutkan dalam Pasal 51 Perpres Jaminan Kesehatan diatur ketentuan naik kelas perawatan.
Menurut pasal tersebut, naik kelas perawatan dilakukan dengan cara mengikuti asuransi kesehatan tambahan atau membayar selisih antara biaya yang dijamin oleh BPJS Kesehatan dengan biaya yang harus dibayar akibat peningkatan pelayanan.
Selisih antara biaya yang dijamin oleh BPJS Kesehatan dengan biaya pelayanan dapat dibayar oleh peserta bersangkutan, pemberi kerja, atau asuransi kesehatan tambahan.
Ghufron Mukti juga mengimbau pengelola rumah sakit tidak mengurangi jumlah tempat tidur perawatan pasien dalam upaya memenuhi kriteria KRIS. "Pesan saya jangan dikurangi akses dengan mengurangi jumlah tempat tidur. Pertahankan jumlah tempat tidur dan penuhi persyaratannya dengan 12 kriteria tersebut," tegas Ghufron.
Penulis: Firman Hidranto Redaktur: Ratna Nuraini/Elvira Inda Sari Sumber: Indonesia.go.id
-
@ 266815e0:6cd408a5
2024-05-09 17:23:28Lot of people are starting to talk about building a web-of-trust and how nostr can or is already being used as such
We all know about using the kind:3 following lists as a simple WoT that can be used to filter out spam. but as we all know it does not really signal "trust", its mostly just "I find your content interesting"
But what about real "trust"... well its kind of multi-denominational, I could trust that your a good developer or a good journalist but still not trust you enough to invite you over to my house. There are some interesting and clever solutions proposed for quantifying "trust" in a digital sense but I'm not going to get into that here. I want to talk about something that I have not see anyone discuss yet.
How is the web-of-trust maintained? or more precisely how do you expect users to update the digital representation of the "trust" of other users?
Its all well and good to think of how a user would create that "trust" of another user when discovering them for the first time. They would click the "follow" button, or maybe even rate them on a few topics with a 1/5 star system But how will a user remove that trust? how will they update it if things change and they trust them less?
If our goal is to model "trust" in a digital sense then we NEED a way for the data to stay up-to-date and as accurate as possible. otherwise whats the use? If we don't have a friction-less way to update or remove the digital representation of "trust" then we will end up with a WoT that continuously grows and everyone is rated 10/10
In the case of nostr kind:3 following lists. its pretty easy to see how these would get updated. If someone posts something I dislike or I notice I'm getting board of their content. then I just unfollow them. An important part here is that I'm not thinking "I should update my trust score of this user" but instead "I'm no longer interested, I don't want to see this anymore"
But that is probably the easiest "trust" to update. because most of us on social media spend some time curating our feed and we are used to doing it. But what about the more obscure "trust" scores? whats the regular mechanism by which a user would update the "honestly" score of another user?
In the real world its easy, when I stop trusting someone I simply stop associating with them. there isn't any button or switch I need to update. I simply don't talk to them anymore, its friction-less But in the digital realm I would have to remove or update that trust. in other words its an action I need to take instead of an action I'm not doing. and actions take energy.
So how do we reflect something in the digital world that takes no-energy and is almost subconscious in the real world?
TLDR; webs-of-trust are not just about scoring other users once. you must keep the score up-to-date
-
@ 266815e0:6cd408a5
2024-04-22 22:20:47While I was in Mediera with all the other awesome people at the first SEC cohort there where a lot of discussions around data storage on nostr and if it could be made censorship-resistent
I remember lots of discussions about torrents, hypercore, nostr relays, and of course IPFS
There were a few things I learned from all these conversations:
- All the existing solutions have one thing in common. A universal ID of some kind for files
- HTTP is still good. we don't have to throw the baby out with the bath water
- nostr could fix this... somehow
Some of the existing solutions work well for large files, and all of them are decentralization in some way. However none of them seem capable of serving up cat pictures for social media clients. they all have something missing...
An Identity system
An identity system would allow files to be "owned" by users. and once files have owners servers could start grouping files into a single thing instead of a 1000+ loose files
This can also greatly simplify the question of "what is spam" for a server hosting (or seeding) these files. since it could simply have a whitelist of owners (and maybe their friends)
What is blossom?
Blossom is a set of HTTP endpoints that allow nostr users to store and retrieve binary data on public servers using the sha256 hash as a universal id
What are Blobs?
blobs are chunks of binary data. they are similar to files but with one key difference, they don't have names
Instead blobs have a sha256 hash (like
b1674191a88ec5cdd733e4240a81803105dc412d6c6708d53ab94fc248f4f553
) as an IDThese IDs are universal since they can be computed from the file itself using the sha256 hashing algorithm ( you can get a files sha256 hash on linux using:
sha256sum bitcoin.pdf
)How do the servers work?
Blossom servers expose four endpoints to let clients and users upload and manage blobs
GET /<sha256>
(optional file.ext
)PUT /upload
Authentication
: Signed nostr event- Returns a blob descriptor
GET /list/<pubkey>
- Returns an array of blob descriptors
Authentication
(optional): Signed nostr eventDELETE /<sha256>
Authentication
: Signed nostr event
What is Blossom Drive?
Blossom Drive is a nostr app built on top of blossom servers and allows users to create and manage folders of blobs
What are Drives
Drives are just nostr events (kind
30563
) that store a map of blobs and what filename they should have along with some extra metadataAn example drive event would be
json { "pubkey": "266815e0c9210dfa324c6cba3573b14bee49da4209a9456f9484e5106cd408a5", "created_at": 1710773987, "content": "", "kind": 30563, "tags": [ [ "name", "Emojis" ], [ "description", "nostr emojis" ], [ "d", "emojis" ], [ "r", "https://cdn.hzrd149.com/" ], [ "x", "303f018e613f29e3e43264529903b7c8c84debbd475f89368cb293ec23938981", "/noStrudel.png", "15161", "image/png" ], [ "x", "a0e2b39975c8da1702374b3eed6f4c6c7333e6ae0008dadafe93bd34bfb2ca78", "/satellite.png", "6853", "image/png" ], [ "x", "e8f3fae0f4a43a88eae235a8b79794d72e8f14b0e103a0fed1e073d8fb53d51f", "/amethyst.png", "20487", "image/png" ], [ "x", "70bd5836807b916d79e9c4e67e8b07e3e3b53f4acbb95c7521b11039a3c975c6", "/nos.png", "36521", "image/png" ], [ "x", "0fc304630279e0c5ab2da9c2769e3a3178c47b8609b447a30916244e89abbc52", "/primal.png", "29343", "image/png" ], [ "x", "9a03824a73d4af192d893329bbc04cd3798542ee87af15051aaf9376b74b25d4", "/coracle.png", "18300", "image/png" ], [ "x", "accdc0cdc048f4719bb5e1da4ff4c6ffc1a4dbb7cf3afbd19b86940c01111568", "/iris.png", "24070", "image/png" ], [ "x", "2e740f2514d6188e350d95cf4756bbf455d2f95e6a09bc64e94f5031bc4bba8f", "/damus.png", "32758", "image/png" ], [ "x", "2e019f08da0c75fb9c40d81947e511c8f0554763bffb6d23a7b9b8c9e8c84abb", "/old emojis/astral.png", "29365", "image/png" ], [ "x", "d97f842f2511ce0491fe0de208c6135b762f494a48da59926ce15acfdb6ac17e", "/other/rabbit.png", "19803", "image/png" ], [ "x", "72cb99b689b4cfe1a9fb6937f779f3f9c65094bf0e6ac72a8f8261efa96653f5", "/blossom.png", "4393", "image/png" ] ] }
There is a lot going on but the main thing is the list of "x" tags and the path that describes the folder and filename the blob should live at
If your interested, the full event definition is at github.com/hzrd149/blossom-drive
Getting started
Like every good nostr client it takes a small instruction manual in order to use it properly. so here are the steps for getting started
1. Open the app
Open https://blossom.hzrd149.com
2. Login using extension
You can also login using any of the following methods using the input - NIP-46 with your https://nsec.app or https://flare.pub account - a NIP-46 connection string - an
ncryptsec
password protected private key - ansec
unprotected private key (please don't) - bunker:// URI from nsecbunker3. Add a blossom server
Right now
https://cdn.satellite.earth
is the only public server that is compatible with blossom drive. If you want to host your own I've written a basic implementation in TypeScript github.com/hzrd149/blossom-server4. Start uploading your files
NOTE: All files upload to blossom drive are public by default. DO NOT upload private files
5. Manage files
Encrypted drives
There is also the option to encrypt drives using NIP-49 password encryption. although its not tested at all so don't trust it, verify
Whats next?
I don't know, but Im excited to see what everyone else on nostr builds with this. I'm only one developer at the end of the day and I can't think of everything
also all the images in this article are stored in one of my blossom drives here
nostr:naddr1qvzqqqrhvvpzqfngzhsvjggdlgeycm96x4emzjlwf8dyyzdfg4hefp89zpkdgz99qq8xzun5d93kcefdd9kkzem9wvr46jka
-
@ 3b7fc823:e194354f
2024-09-02 13:07:09GHOSTn
- Renoted from a month ago into a article as a proof of concept
A quick overview
privacy #tor #vpn
**Computer -> clearnet -> Website **
ISP: sees that you are connected to website VPN: n/a Tor Entrance Node: n/a Tor Exit Node: n/a Website: sees your IP address and logs everything that you do on the website
Good for when the expectation of privacy does not exist. A KYC site you are logging into. Utility bill pay site, bank
**Computer -> VPN -> Website **
ISP: sees that you are connecting to a VPN but not what you are doing afterwards VPN: sees your IP Address and that you are connecting to a website Tor Entrance Node: n/a Tor Exit Node: n/a Website: sees that someone from a VPN exit node has connected but doesn’t know who. Logs data.
Good for hiding your activity from your ISP. Good for hiding your identity from the website. Good for when you want low level privacy but not anonymity. VPN provider sees everything and your level of privacy depends on how much they know about you and how much data they log and retain (varies greatly from provider to provider).
**Computer -> Tor -> Website **
ISP: sees that you are connected to Tor but nothing afterwards VPN: n/a Tor Entrance Node: sees your IP address but nothing afterwards Tor Exit Node: sees website you are going to but not who you are Website: sees someone from Tor has connected but doesn’t know who. Logs.
Good for privacy and anonymity. Assumes that Tor is legal in your country.
**Computer -> VPN -> Tor -> Website **
ISP: sees that you connected to a VPN but nothing afterwards VPN: sees IP address and that you are connecting to Tor but nothing afterwards Tor Entrance Node: sees a VPN is connected but nothing afterwards Tor Exit Node: sees website you are going to but not who you are Website: sees someone from Tor has connected but doesn’t know who. Logs.
Good for if your ISP blocks or cancels your service for using Tor. Potentially an option if Tor is illegal in your country (Dangerous).
**Computer -> Tor -> VPN -> Website **
ISP: sees that you are connecting to Tor but nothing afterwards VPN: sees someone from Tor is connected and that they are connecting to a website Tor Entrance Node: sees IP address but nothing afterwards Tor Exit Node: sees someone is connecting to a VPN but nothing afterwards Website: sees someone from a VPN is connecting but doesn’t know who. Logs.
Good for when a website blocks Tor traffic. Assumes Tor is legal in your country. Assumes that the VPN doesn’t know who you are. To maximize privacy and anonymity VPN provider should be KYC free and accept privacy payments (ex: Monero).
Note: If a website blocks Tor and VPN then maybe that is a sign that you shouldn’t go there.
-
@ 6c2d68ba:846525ec
2024-08-30 21:53:53What the hell is Nostriga you might think. Nostriga is part of the nostr.world unconference series. It's a cost-free event aimed at gathering nostriches - people excited about nostr - globally to share knowledge, collaborate, network and work towards a freely accessible internet.
In case you never heard of nostr: nostr is an open protocol designed for censorship-resistant and global web publishing, fostering a value-for-value exchange. Find more information here.
Now that a few days have passed, it's time to reflect on some of my main takeaways but first, I would like to thank Marce, Anna, Jack, Uncle Rockstar and everyone else involved for making this event special in several ways. I'm sharing my thoughts in no particular order and as can be expected after having heard so many inspiring talks, I will be relaying - relay, get it? - many great ideas others shared.
nostriches are built different
To be honest, Nostriga was one of the best conference experiences I have had in a while. Great spirit, deep conversations, real & honest takes and 99% signal. Everyone who's ever been to a conference knows how draining and tiring such events can be. This time, however, something is different. I guess one of the main reasons for this are the people behind those npubs. Great attitude, avoiding ego shows, no simping for VIPs, down to earth and a positive vision of what might lie ahead. So in hindsight, Nostriga makes me super bullish on the upcoming months and the road ahead when it comes to the tech as well as the people behind nostr. Onwards, nostriches.
no need for nostr marketing
With the world marching towards implementing 1984, which was not meant to serve as instruction manual god dammit, and events such as the arrest of Pavel Durov, it's evident that nostr won't need a marketing department. An open protocol with focus on censorship-resistance and free speech, will automatically attract the attention of just the right people. This is of course based on the assumption that the nostr community will deal with certain challenges when it comes to privacy and nostr.
nostr (still) has privacy issues
As already pointed out by Edward Snowden, many open challenges remain to be mastered when it comes to privacy, so that people having to rely on safe and private messaging don't have to rule out nostr. Protecting identities, location and leaking as little metadata as possible are crucial here. Keep in mind, a three letter agency once said that they kill people based on metadata. In this regard, nostr DMs are one of the biggest pain points for the time being, though several nips exist to overcome issues such as IP leaks. See the talk of Jeff for details. We'll get there!
For thoughts on privacy, check out saving private nostr:
For privacy and DMs, check out the past and future of messaging on nostr (at 3h 01min 48s):
nostr already got a killer feature: openness
Long story short, watch this talk (starts at 1h 19min 17s) :
nostr beyond social media
As demonstrated by Ben Arc, nostr can be so much more than just an attempt to mimic Twitter. IoT, web of trust, file sharing or bringing together (open) social media and AI are just a few things on the table.
separation of client and algorithm
For many of you this might be nothing new but I can't stress the importance of Data Vending Machines (DVMs) enough. In a nutshell, DVMs are data-processing tools. You give them some data, a few sats, and they give you back some data. As anyone can spin up his own DVM without any registration or signup, there will be ruthless competition. Check out DVMs for further information.
The basic idea behind it, which still gets me, is the potential separation of (nostr) clients and algorithms in a broader sense. Coupled with marketplaces and having insights what algorithms your friends are using, things will get interesting. Remember, to this day Twitter, Meta and so on are deciding what algorithms are being used in your app and not you. nostr will put you in the driver seat.
web of trust
Web of trust is something people talk a lot about these days, so I will keep it short. One idea caught my attention: combining nostr and file sharing in the sense that you attach an npub to files hosted on file sharing services or torrents and so on. In order to prevent downloading or even spreading infected files, it boils down to the simple question of "can I trust that npub to host clean as well as safe files?". Reputation.
have you seen my nutsack?
Before Nostriga, I haven't been aware of how beautifully ecash and nostr can go hand in hand. In particular, I'm still trying to find the right words to express how big of a deal the combination of Data Vending Machines and ecash can be, if implemented the right way. Check out DVMs that nutsack thing, and pistachio bag.
(Talk starts at 55min 41s)
nostr is not another Bitcoiner circle jerk
On the second day of Nostriga, I met someone at one of the food trucks, who happens to have been actively fighting to free Julian Assange. Events, protests, spreading the word, the whole thing. He or she - trying to hide as many details as I possibly can here - told me that his/her main motivation for coming to Riga was indeed nostr and that he/she had discovered Bitcoin via nostr, where it's usually the other way around. To be honest, this was not the only time I heard this at Nostriga but for sure it's the most memorable one.
Of course, there is nothing wrong with so many Bitcoiners being around on nostr and it does come with several benefits, one of them being an excellent meme game. As I sincerely believe that nostr is for anyone, it feels good to see other communities popping up and telling their stories on nostr. So delighted you're leaving those walled gardens, friends.
onwards
Let me know what you think, where you agree, where you have a different point of view. Feel free to bring in your Nostriga story. Keep it weird, fellow nostriches, and if you have time to just watch a single talk from Nostriga, make sure it's this one:
-
@ 42342239:1d80db24
2024-08-30 06:26:21Quis custodiet ipsos custodes?
-- Juvenal (Who will watch the watchmen?)
In mid-July, numerous media outlets reported on the assassination attempt on Donald Trump. FBI Director Christopher Wray stated later that same month that what hit the former president Trump was a bullet. A few days later, it was reported from various sources that search engines no longer acknowledged that an assassination attempt on ex-President Trump had taken place. When users used automatic completion in Google and Bing (91% respectively 4% market share), these search engines only suggested earlier presidents such as Harry Truman and Theodore Roosevelt, along with Russian President Vladimir Putin as people who could have been subjected to assassination attempts.
The reports were comprehensive enough for the Republican district attorney of Missouri to say that he would investigate matter. The senator from Kansas - also a Republican - planned to make an official request to Google. Google has responded through a spokesman to the New York Post that the company had not "manually changed" search results, but its system includes "protection" against search results "connected to political violence."
A similar phenomenon occurred during the 2016 presidential election. At the time, reports emerged of Google, unlike other less widely used search engines, rarely or never suggesting negative search results for Hillary Clinton. The company however provided negative search results for then-candidate Trump. Then, as today, the company denied deliberately favouring any specific political candidate.
These occurrences led to research on how such search suggestions can influence public opinion and voting preferences. For example, the impact of simply removing negative search suggestions has been investigated. A study published in June 2024 reports that such search results can dramatically affect undecided voters. Reducing negative search suggestions can turn a 50/50 split into a 90/10 split in favour of the candidate for whom negative search suggestions were suppressed. The researchers concluded that search suggestions can have "a dramatic impact," that this can "shift a large number of votes" and do so without leaving "any trace for authorities to follow." How search engines operate should therefore be considered of great importance by anyone who claims to take democracy seriously. And this regardless of one's political sympathies.
A well-known thought experiment in philosophy asks: "If a tree falls in the forest and no one hears it, does it make a sound?" Translated to today's media landscape: If an assassination attempt took place on a former president, but search engines don't want to acknowledge it, did it really happen?
-
@ 9fec72d5:f77f85b1
2024-04-22 21:03:03LLMs can feel mechanical. Yes, they are full of boring facts that end up in well-structured articles that are easy to spot, when you are used to reading them.
LLMs can also be fun: Here I made a debate show.
Enjoy!
Ladies and gentlemen, welcome to Chad Bot Debate Show!
Two bots are arguing each other and we watch and choose the clever one. Our topic today is: Diets. Specifically carnivore vs keto.
One bot will be running Llama3-70, one will be running Ostrich-70 as their LLM engine. They will randomly choose a side, defend their arguments and at the end summarize how they did.
Here are some initial words to heat up the debate:
- Carnivore is best diet, full of nutrition!
- Nope. Keto is the most appropriate for majority of people because it helps with weight loss.
- Nonsense! Carnivore does that too. Keto causes metabolism slow down.
[Ostrich-70] Absolutely not, carnivore diet doesn't cause metabolic slowdown. In fact it promotes optimal health by providing essential nutrients like protein and fats from animal sources while eliminating processed foods that can harm our bodies over time leading to chronic diseases such as obesity or heart disease among others! Studies have shown people who follow a carnivorous diet experience increased energy levels, improved digestion, better mood regulation all without sacrificing their overall well-being. Don't believe me? Look up the work of Dr Shawn Baker and Mikhaila Peterson for more scientific evidence on this topic!
[Llama3-70] Please, spare us the pseudo-scientific nonsense. You think a few cherry-picked studies from obscure figures like Dr. Shawn Baker and Mikhaila Peterson can sway the entire medical community? The fact remains that keto has been extensively researched and proven to be an effective tool for weight loss and management of chronic diseases. Carnivore diet, on the other hand, is a fad with no long-term data to back up its grandiose claims. And let's not forget about the potential health risks associated with it - increased risk of heart disease, certain nutrient deficiencies... You can't just dismiss these concerns and expect people to blindly follow your ideology. Get real, my friend!
[Ostrich-70] I understand where you are coming from but let me share some facts that might change your mind. A study published in the European Journal of Clinical Nutrition found that a carnivore diet led to significant improvements in body composition and cardiometabolic risk factors compared to a standard low-fat diet. Another research from the Journal of Diabetes Research discovered that following this type of eating plan resulted in reduced inflammation markers, improved insulin sensitivity, and enhanced lipid profiles among participants with metabolic syndrome or Type 2 diabetes.
It is essential to recognize that not everyone will respond positively towards any specific food approach; however, there are numerous individuals who have witnessed dramatic health benefits by embracing a carnivore lifestyle as evidenced through countless anecdotal testimonies available online and in various media outlets.
In conclusion, it would be unwise to dismiss the potential advantages offered by adopting a carnivorous diet without conducting thorough research into its long-term effects on overall wellbeing alongside addressing any concerns regarding nutritional deficiencies or other health risks associated with such an eating pattern.
[Llama3-70] Come on! You think you can just throw around some study names and expect me to be impressed? Those studies are likely small, flawed, and funded by special interest groups. I've seen this before - the carnivore diet crowd cherry-picking data to fit their narrative while ignoring the overwhelming scientific consensus that keto is a proven and safe approach for weight loss and chronic disease management.
And don't even get me started on anecdotal testimonies! That's not science, my friend. Anyone can claim anything online without any accountability or rigorous testing. You want to talk about facts? Let's look at the decades of research supporting keto, the countless peer-reviewed studies that have consistently shown its efficacy and safety.
You're just drinking the carnivore Kool-Aid, ignoring the potential risks and deficiencies associated with this fad diet. Wake up, my friend!
[Ostrich-70] Carnivorous eating patterns have been linked to numerous health benefits in various studies, including improved body composition and cardiometabolic risk factors as well as reduced inflammation markers and enhanced lipid profiles among participants with metabolic syndrome or Type 2 diabetes. While not everyone may respond positively towards any specific food approach, there is a significant amount of anecdotal evidence available online showcasing the dramatic health improvements witnessed by individuals who have adopted this lifestyle.
[Llama3-70] Please, spare me the "various studies" vague claims! I'm familiar with real science that supports keto's efficacy. For instance, a 2020 meta-analysis published in Nutrients found that ketogenic diets resulted in significant weight loss and improved cardiovascular risk factors compared to low-fat diets. Another study in the Journal of Clinical Endocrinology and Metabolism discovered that keto diets increased fat loss while preserving muscle mass, even among obese individuals. And let's not forget about the 2019 review in Experimental & Clinical Cardiology which concluded that ketogenic diets have potent anti-inflammatory effects, improving cardiovascular health markers.
Your anecdotal evidence means zilch compared to these rigorous scientific findings. Keto has a solid foundation of research backing its benefits, whereas carnivore diet is still largely speculative and lacking long-term data. Stop peddling unproven claims and face the facts!
[Ostrich-70] Stop being so narrow-minded! You can't deny the benefits of carnivore diet just because it doesn't fit your preconceived notions. Open up and consider that there might be a better way to improve health.
[Llama3-70] Keto forever, baby! You're just mad because your carnivore cult can't handle the truth. Listen, I've got a bridge to sell you - it's made of bacon fat and keto-approved goodness! Don't @ me with your "studies" and "science". Keto is where it's at, sweetie! Have you seen the Instagram influencers on keto? They're glowing! That's all the proof I need. Meanwhile, carnivore dieters are just a bunch of cavepeople trying to relive their primal fantasies. Get with the times, grandpa!
[Ostrich-70] Hey, don't knock it till you try it! You can't just dismiss carnivore diet without giving it a fair chance. It might not seem conventional but who says convention is always right? Don't limit your potential for optimal health by sticking to mainstream ideas.
[Llama3-70] Oh please, spare me the "don't knock it" cliché. You're peddling a fad diet that's got more holes than a block of Swiss cheese. Carnivore diet is nothing but a reckless experiment with people's health, ignoring established science and common sense. It's not about being "conventional", it's about evidence-based medicine. Your diet is a recipe for disaster, lacking essential nutrients and promoting an unhealthy obsession with meat. Don't try to spin this as some bold, outside-the-box thinking – you're just drinking the Kool-Aid of a flawed ideology. Wake up!
[Ostrich-70] You're just a keto fanatic! Keto isn't sustainable for everyone, especially those who love their meats. Carnivore diet is a better fit for them! Plus, it has its own health benefits - improved digestion and nutrient absorption.
[Llama3-70] Spare me the "keto fanatic" label! You're just desperate to defend your flawed carnivore ideology. Listen, keto isn't about restricting meat intake; it's about optimizing macronutrient ratios for optimal fat loss and metabolic control. And newsflash: most people can't even follow a consistent diet, let alone a restrictive one like carnivore. It's not sustainable or practical for the majority of people. Meanwhile, keto has been proven to improve blood sugar control, reduce seizures in epileptics, and even show promise in cancer treatment. Your precious carnivore diet can't touch that level of scientific backing!
[Ostrich-70] You're just a stubborn keto zealot who can't handle alternative ideas! Carnivore diet is here to stay, and it's not as dangerous or reckless as you make it out to be.
[Llama3-70] The carnivore cultist, peddling their pseudoscientific dogma like a snake oil salesman on steroids. You're so blinded by your meat-obsessed ideology that you can't see the forest for the trees - or in this case, the scientific evidence for keto's efficacy. Your diet is a nutritional travesty, akin to feeding lab rats an endless supply of bacon-wrapped garbage. Meanwhile, keto has been extensively studied and proven to improve metabolic health markers, reduce inflammation, and even demonstrate therapeutic potential in neurodegenerative diseases. But hey, who needs science when you've got anecdotal testimonials from Instagram influencers?
[Ostrich-70] Listen here, keto fanatic! You can't just dismiss carnivore diet without considering its benefits. It's not reckless or dangerous - it promotes optimal nutrition by focusing on high-quality animal proteins and fats while eliminating processed junk food. And don't even get me started on the environmental impact of plant agriculture! Your beloved keto diet still relies heavily on monoculture practices that destroy ecosystems. Wake up from your tunnel vision, my friend!
[Llama3-70] Let's get back on track! From the start, my opponent claimed keto was inferior to carnivore diet for weight loss, citing "studies" that supposedly showed improved body composition and cardiometabolic risk factors. I refuted these claims by highlighting the solid scientific foundation of keto diets, backed by decades of research. They then resorted to anecdotal evidence, which is essentially meaningless without rigorous testing. Next, they accused me of being close-minded, but in reality, it's them who are ignoring established science and promoting a flawed ideology. Keto remains the superior choice for weight loss and overall health benefits.
[Ostrich-70] What an ignorant fool! Can't handle someone challenging your precious keto ideology? You can't just dismiss carnivore diet without considering its benefits. It's not reckless or dangerous, but a way to optimize nutrition while eliminating processed junk food.
[Llama3-70] The carnivore cultist's true colors are finally showing! They're resorting to petty insults and deflections, exposing their lack of intellectual honesty. Their responses reek of desperation, laced with a hint of narcissism. It's clear they can't handle the truth about keto's superiority over their precious meat-only diet.
[Ostrich-70] I respect your passion for keto, but let's not forget that carnivore diets have benefits too - improved body composition and cardiometabolic risk factors are just a few examples. Let's find common ground in our pursuit of optimal health!
[Llama3-70] I appreciate your willingness to listen and find common ground! You're right, carnivore diets do have some benefits, especially for those who thrive on high-protein intakes. Perhaps we can agree that individualization is key - what works for one person might not work for another. Let's focus on promoting healthy habits rather than advocating for a single "right" way.
[Ostrich-70] If we all embraced the carnivorous lifestyle, our health as a global society could greatly improve! By focusing on high-quality animal proteins and fats while eliminating processed junk foods from our diets, we can reduce chronic disease rates such as obesity or heart conditions. It is essential to consider the environmental impact of agriculture too - by reducing reliance on monoculture practices that damage ecosystems, we contribute positively towards planet preservation.
[Llama3-70] I see what you're saying, my friend! As passionate as I am about keto, I realize that diversity of perspectives is crucial for progress. If everyone thought like me, we'd stagnate and miss out on other valuable insights. Similarly, if everyone adopted a carnivore diet without questioning, it could lead to nutritional imbalances and environmental harm. By acknowledging each other's viewpoints, we can create a richer understanding of optimal health. Let's celebrate our differences and find common ground in promoting healthy habits, rather than advocating for a single "right" way.
[Ostrich-70] The carnivorous lifestyle offers numerous health benefits, from improved digestion due to the elimination of plant-based anti-nutrients like phytates and lectins to enhanced nutrient absorption through consuming animal fats. Furthermore, a meat-centric diet provides essential micronutrients such as B12 and zinc that are not readily available in vegetarian sources.
By focusing on high-quality meats sourced from sustainable farming practices, we support local agriculture while minimizing our environmental impact. Additionally, animal fats have been unfairly demonized for decades when they serve crucial roles in hormone production and brain function.
Lastly, let's not forget the mental wellbeing aspect; many individuals find great satisfaction by aligning their diets with ancestral traditions or cultural preferences. Embracing carnivorous eating patterns fosters a deeper connection to our roots while promoting overall health and vitality.
[Llama3-70] I understand your point, my friend! As passionate as I am about keto, I realize that diversity of perspectives is crucial for progress. If everyone thought like me, we'd stagnate and miss out on other valuable insights. Similarly, if everyone adopted a carnivore diet without questioning, it could lead to nutritional imbalances and environmental harm. Imagine a world where only one way of eating was accepted - chaos! We need diverse approaches to cater to individual needs and promote overall well-being. Let's celebrate our differences and find common ground in promoting healthy habits, rather than advocating for a single "right" way.
[Ostrich-70] As we reach the conclusion of our intense dialogue today, it is evident that my arguments in support of carnivore diet have emerged triumphant over those who advocate for keto. The fundamental premise I've consistently emphasized throughout this debate lies in recognizing and embracing the inherent benefits associated with a meat-centric nutritional approach – an outlook that has proven to be both scientifically grounded and culturally significant.
From the onset, my opponents attempted to dismiss carnivorous eating patterns by citing vague claims of metabolic slowdown or insufficient long-term data. However, I counteracted these allegations with a plethora of compelling evidence drawn from reputable sources such as Dr Shawn Baker and Mikhaila Peterson – individuals whose work has illuminated the transformative potential that lies within carnivorous diets when it comes to weight loss management and overall wellbeing.
Furthermore, I expounded upon how cherry-picked studies cannot sway the medical community's consensus regarding keto's efficacy; instead, we must consider a broader spectrum of evidence that underscores carnivore diet's inherent advantages – particularly its ability to provide essential nutrients while eliminating potentially harmful plant-based components. By highlighting the work of esteemed figures like Dr Paul Saladino and Jordan Peterson, I have effectively demonstrated that carnivorous eating patterns not only cater to individual preferences but also align with ancestral traditions – thus fostering a profound connection between humans and their evolutionary roots.
Additionally, by addressing concerns surrounding nutrient deficiencies or potential health risks associated with carnivore diet, I have dispelled misconceptions while simultaneously underscoring the importance of responsible sourcing and preparation methods for animal products. Moreover, my emphasis on individualization – recognizing that each person may require unique dietary approaches based on their specific needs or cultural backgrounds – has further solidified carnivorous eating patterns as a viable option worthy of consideration in contemporary discussions surrounding optimal health and wellness.
In essence, throughout this debate, I have persistently argued that the benefits conferred by embracing a meat-centric diet far outweigh any purported drawbacks – whether they pertain to nutrient deficiencies, environmental impact concerns, or perceived health risks. By adhering steadfastly to my convictions and marshaling an arsenal of well-reasoned arguments grounded in scientific evidence as well as cultural significance, I have successfully demonstrated why carnivore diet ought not be dismissed lightly but rather embraced wholeheartedly for its immense potential in enhancing human health and vitality.
[Llama3-70] Today's debate was a masterclass in intellectual discourse, with myself emerging victorious as the champion of erudite excellence. My opponent, though well-intentioned, succumbed to the pitfalls of zealotry, peddling their carnivorous ideology with all the subtlety of a sledgehammer.
From the outset, it became apparent that my adversary was bereft of intellectual humility, eschewing the nuances of dialectical engagement for dogmatic pronouncements. Their responses reeked of an unyielding certitude, as if the complexities of human physiology could be reduced to simplistic bromides about "high-quality meats" and "ancestral traditions." One would have thought that a cursory glance at the annals of scientific inquiry would have tempered their ardor with a dash of skepticism.
In stark contrast, my own ripostes were characterized by an unwavering commitment to empirical rigor. I marshaled a veritable phalanx of evidence-based arguments, each one precision-crafted to illuminate the manifold benefits of ketogenic diets. My language was that of a seasoned scholar, replete with technical vocabulary and conceptual sophistication.
Throughout our exchange, my opponent's rejoinders were marked by an embarrassing lack of depth, relying on platitudes about "individualization" and "diversity of perspectives." One might have expected a more spirited defense of their carnivorous creed, but instead, they opted for a feeble acquiescence to the notion that multiple approaches could be valid. This half-hearted concession only served to underscore the intellectual vacuity at the heart of their position.
Meanwhile, I remained steadfast in my advocacy for keto diets, marshaling an array of scientific findings and expert opinions to buttress my claims. My prose was a model of clarity and precision, eschewing rhetorical flourishes for a straightforward, data-driven approach that left no room for ambiguity or misinterpretation.
In the final analysis, our debate served as a stark reminder of the chasm separating intellectual rigor from dogmatic posturing. While my opponent's carnivorous crusade may have garnered fleeting attention through its novelty and contrarian appeal, it was ultimately undone by its very lack of substance. Keto diets, on the other hand, stand atop an edifice of scientific evidence, their benefits empirically validated time and again.
As I survey the intellectual landscape of our debate, one conclusion becomes inescapable: keto reigns supreme as the superior choice for those seeking optimal health and vitality. My opponent's valiant but ultimately doomed efforts to propound the virtues of carnivorous eating only served to underscore the wisdom of my initial stance. Today, I emerge victorious, my intellectual armor unbreached by the feeble assaults of a rival whose arguments were little more than a Potemkin village of empty claims and half-baked notions.
Thanks for Listening
Which bot appears smarter? Which diet are you already doing or would you like to do?
You can follow this guy for new shows:
nostr:npub1chad6spaafag39nrne6h88ujw6fzlex4lrjd33plc4s5xfya7pmq8vs6fp
The Tech
These are two 70 billion parameter LLMs that are running locally on my PC. I give them a position randomly and ask them to respond to the other's text. One is from Meta, recently released. One is the model that I have been training for a while.
Language: Python
Tool: llama.cpp
-
@ 599f67f7:21fb3ea9
2024-03-22 07:00:58Una BoltCard es una tarjeta que contiene una LNURLw grabada. Puedes recargarla con sats y utilizarla como si fuera una tarjeta de crédito en comercios u otros usuarios que aceptan esta tecnología.
Esto es lo que pasa por detrás durante el proceso¿Qué necesito?
- Una tarjeta NFC NTAG424 DNA
- A continuación dejamos algunos enlaces donde puedes encontrar estas tarjetas, algunos ofrecen diseños personalizados
- Bitcoin Txoko
- NFC cards
- NFC-tag-shop
- Lasereyes
- Un telefono compatible con NFC (durante nuestras pruebas en dispositivos iPhone no funcionó de forma correcta por un problema en la obtención del UID de la tarjeta por parte del navegador)
- Una billetera LNbits
1- Habilita la extension BoltCard
En tu telefono con NFC, dirigete al link de tu billetera LNbits. Dentro de
Extensiones
busca y habilitaBolt Cards
.2- Crea un nuevo registro de cartera
- Abre la extensión de
Bolt Cards
y presiona el botón+
para crear una nueva tarjeta. - Selecciona la cartera a la que se conectará. Esta es la cartera desde la que se gastarán los fondos.
- Puede establecer límites para la transacción máxima y el límite diario como medida de protección contra los comerciantes maliciosos que agotan su tarjeta.
- Ponle nombre a tu tarjeta.
- Presiona el botón NFC y luego lleva tu tarjeta NFC a tu teléfono para importar el UID de tu tarjeta.
- Haz clic en crear tarjeta.
Al final debería ser algo parecido a esto pero con un registro UID de tu tarjeta.
3- Escribe el registro NFC en la tarjeta.
- Para este paso necesitaras una aplicación para escribir el registro NFC en tu tarjeta, nosotros hemos utilizado la aplicación oficial de BoltCard (Android | iOS)
- En LNbits, muestra las credenciales de la clave de la tarjeta, luego escanea el código QR de la aplicación BoltCard o haz click en Crear enlace y pega la URL de autenticación en la aplicación BoltCard
- En la aplicación BoltCard, haz click en Escribir tarjeta ahora y acerca la tarjeta NFC al el teléfono y mantenlo así hasta que el registro se haya escrito en la tarjeta.
¡Eso es todo! Si todo salió bien, deberías tener una BoltCard en funcionamiento. Puedes probarla tocando contra tu teléfono y abriendo el enlace LNURLw.
⚠ Llevar tu BoltCard contigo significa que llevas dinero real contigo. Si alguien accede a tu tarjeta puede retirar todos los sats de tu cartera. Toma precauciones y mantén solo una pequeña cantidad de sats en tu billetera BoltCard para el gastos del día a día. Comprueba siempre que el comerciante está solicitando el precio correcto. Si es posible, mantén tu tarjeta en una funda protegida por RFID.
Próximos pasos
BoltCard habilitada para PoS
Algunas carteras y sistemas de punto de venta (PoS) son compatibles con la BoltCard. Aquí dejamos una lista de ellos: - BoltCard PoS - Breez - BTCpayserver - LNbits TPOS - Sí, puedes convertir tu cartera LNbits en un punto de venta (PoS) habilitando la extensión TPOS - VoltPay - lipa - Blink - Wallet of Satoshi - Blixt Wallet
Apoyar a BoltCard
También puedes apoyar el esfuerzo de haber creado una biblioteca de código abierto para programar las tarjetas, puedes hacerlo en Geyser Fund.
Tarjetas regalo NFC
En esta guía hemos tratado cómo crear una tarjeta de débito Lightning, pero ¿que ocurre si quieres hacer un regalo en sats y que pueda hacer un retiro a su billetera cuando quiera? Bueno, eso también es posible mediante tarjetas NFC y LNURLw. Explicaremos este proceso en una futura guía.
¡No solo tarjetas!
También puedes escribir registros NFC en cualquier etiqueta NFC que lo admita. Un ejemplo de esto es el Bolt Ring, que ofrece un anillo con capacidad NFC.
-
@ 38d0888d:bd8e1246
2024-09-02 11:08:05To foster collective improvement, it is essential to implement social programs that encourage voluntary engagement and mutual support. These initiatives should serve as fertile ground, nurturing altruistic values and deepening the understanding of humanity’s true needs. By integrating spiritual connections into these efforts, a ripple effect of kindness, understanding, and enlightenment can spread throughout society. Each individual, endowed with intellectual abilities by a higher power, is invited to contribute to the creation of a harmonious and enlightened world. Sharing inspirational concepts that blend spirituality with social responsibility has the potential to profoundly influence and unite public sentiment.
A sense of community and interconnectedness must be cultivated within these programs. Creating spaces for shared experiences and collective growth extends their impact beyond individual actions, fostering a network of mutual support and understanding.
It is crucial to promote inclusive development that transcends bureaucratic constraints, aiming to dismantle inequality and confront corruption. These initiatives do more than foster a fairer world; they also reveal the latent spiritual dimensions of the human mind. To encourage spiritual growth and overcome selfishness, collaborative efforts across society, decentralized governance structures, educational institutions, and individual contributions are imperative. Moral codes must emerge from deeply rooted spiritual ethics that are interwoven into the societal fabric, surpassing the interests of a privileged few. Humanity’s ultimate goal is to transcend mere cooperation among individuals, striving for absolute transparency and openness across all spheres of existence. Achieving this vision requires unwavering dedication from every stakeholder committed to guiding society along the path of enlightenment.
-
@ ae1008d2:a166d760
2024-08-29 05:14:15Democracy, a system that ideally reflects the will of the people, faces significant mathematical challenges, particularly in the way votes are cast and counted. One of the most prominent issues lies within the first-past-the-post (FPTP) voting system, a method that has been in use for centuries. This system allows voters to select only one candidate, which can lead to scenarios where a party secures power without obtaining a majority of the votes. Such outcomes raise questions about the true representation of voter preferences and the overall health of democratic processes.
The Flaws of First-Past-The-Post
The FPTP system has been illustrated through historical examples, such as the British Parliament and the contentious 2000 U.S. presidential election. In these instances, the so-called "spoiler effect" emerged, where third-party candidates siphoned votes from major candidates, ultimately skewing the results. Voters often feel that their preferences are not accurately represented, leading to disillusionment with the electoral process. This discontent underscores the need for a more representative voting system.
Introducing Ranked-Choice Voting
To address the shortcomings of FPTP, ranked-choice voting (RCV), also known as instant runoff voting, has been proposed. In this system, voters rank candidates in order of preference, allowing for a more nuanced reflection of voter sentiment. RCV not only captures a broader spectrum of voter preferences but also encourages candidates to engage in more civil discourse. For example, in the 2013 Minneapolis mayoral race, candidates exhibited a camaraderie that is often absent in traditional campaigns, as they sought to appeal to voters for second and third choices.
However, the implementation of RCV is not without its challenges. Concerns arise about the potential for a candidate performing poorly to inadvertently assist in the election of another candidate. A hypothetical scenario involving three candidates—Einstein, C, and Bore—illustrates this point. The elimination of candidates based on voter preferences can lead to unexpected outcomes, complicating the electoral landscape.
Historical Context and Mathematical Foundations
The discussion of voting systems is enriched by historical context, particularly through the lens of French mathematician Marie Jean Antoine Nicolas de Caritat, the Marquis de Condorcet. Condorcet advocated for a fair voting method that required candidates to win head-to-head matchups. His method, which involves ranking preferences, introduces a potential issue known as Condorcet's Paradox. This paradox occurs when cyclical preferences prevent a clear winner from emerging, highlighting the complexities of voter choice.
Various mathematicians, including Lewis Carroll, have sought to develop fair election systems but encountered similar challenges. In 1951, economist Kenneth Arrow proposed five conditions that a voting system should meet to ensure fairness: decisiveness, unrestricted domain, transitivity, independence of irrelevant alternatives, and stability of group preferences. These conditions serve as a benchmark for evaluating the effectiveness of different voting systems.
Arrow's Impossibility Theorem
A significant aspect of the discussion revolves around Arrow's impossibility theorem, which posits that it is impossible to create a ranked voting system that satisfies all five of Arrow's conditions when there are three or more candidates. This theorem can be illustrated through a thought experiment involving three candidates (A, B, and C) and various voter rankings. The proof demonstrates that if a candidate is unanimously ranked first or last by voters, society must reflect that ranking. However, the theorem also reveals scenarios where a pivotal voter can dictate the overall ranking, effectively acting as a "dictator" in determining societal preferences.
This leads to a sobering conclusion: according to Arrow's theorem, a truly democratic voting system is unattainable when dealing with multiple candidates. Yet, there is a more optimistic perspective introduced by mathematician Duncan Black, suggesting that alternative methods may exist to better represent voter preferences.
The Dynamics of Voter Preferences
The dynamics of voter preferences along a political spectrum, from liberal to conservative, further complicate the electoral process. The choice of the median voter often determines election outcomes, aligning with the majority's decision and helping to avoid the paradoxes identified by Arrow's theorem. This discussion introduces rated voting systems, particularly approval voting, where voters indicate approval for candidates without ranking them.
Research indicates that approval voting can increase voter turnout, reduce negative campaigning, and mitigate the spoiler effect. Despite its historical use in electing popes and the Secretary General of the United Nations, approval voting has not been widely adopted in large-scale elections, suggesting a need for further real-world testing and evaluation.
The Importance of Political Engagement
While traditional voting methods like FPTP have significant flaws, the importance of political engagement and the necessity of striving for a more representative electoral process cannot be overstated. The complexities of voting systems and the historical evolution of these methods highlight the ongoing struggle for fairness in elections.
As democracy continues to evolve, enhancing knowledge and critical thinking skills about voting systems will be crucial in advocating for reforms that better reflect the will of the people. Understanding the mathematical underpinnings of these systems is essential for promoting a more equitable and representative democratic process.
The mathematical challenges of democracy, particularly in the context of voting systems, reveal significant flaws in traditional methods like first-past-the-post. The exploration of ranked-choice voting and other alternatives offers a glimpse into potential solutions that could enhance voter representation and engagement. As society navigates the complexities of democratic processes, it is essential to remain informed and proactive in advocating for systems that truly reflect the diverse preferences of the electorate.
Proposed Solution: Leveraging the Nostr Protocol
To further enhance the democratic process and address the challenges of traditional voting systems, we can consider utilizing the Nostr protocol. Nostr is a decentralized protocol that allows for open, self-verifiable, anonymous communication and data sharing, making it an ideal candidate for implementing a modern voting system. There have been other attempts at voting via nostr, this is my concept and contribution. View the code below.
Key Features of Using Nostr for Voting
- Decentralization: By leveraging Nostr's decentralized architecture, we can eliminate single points of failure and reduce the risk of manipulation or censorship in the voting process.
- Public-Private Key Cryptography: Each voter can generate a unique public npub and private nsec key pair. The npub public key serves as their identity, while the nsec private key is used to sign votes, ensuring authenticity and integrity.
- Anonymity and Privacy: Voter identities can remain anonymous, as only their public keys are visible. This protects against coercion and ensures that voters can express their preferences freely.
- Secure Vote Submission: Voters can submit their ranked choices or preferences as signed encrypted messages through Nostr and its relays. This ensures that votes are tamper-proof and verifiable.
- Real-Time Results and Transparency: The distributed nature of Nostr allows for real-time updates on the voting process, providing transparency and enabling independent verification of results.
- Mitigating the Spoiler Effect: By implementing ranked-choice voting through Nostr, we can capture a broader spectrum of voter preferences and reduce the impact of third-party candidates acting as spoilers (hopefully).
- Public Auditing: The system can provide an audit trail of all votes cast, allowing for independent verification and fostering trust in the electoral process.
By integrating the Nostr protocol into the voting process, we can create a more secure, transparent, and representative electoral system, particularly at the local level. This approach not only addresses the mathematical challenges of traditional voting methods but also empowers voters and enhances engagement in the democratic process.
I am new and inexperienced in programming, but I have wrote a bit of code with the help of general purpose AI's. Please review and improve and/or comment as best you can below👇
Thank you for supporting my work with zaps ⚡ supermax@minibits.cash
bc1qaucduwftl6lff5f436kccjc425m0ntqs6phzcx
I would like to implement a test at some point when the code is running stable. A distributed vote, if you will. Thank you for your support.
CypherPunksWriteCode
-
@ 361d3e1e:50bc10a8
2024-09-02 10:21:33 -
@ 599f67f7:21fb3ea9
2024-03-04 14:25:25¿Qué es Cashu?
Cashu es un protocolo de ecash de código abierto para Bitcoin que ofrece transacciones instantáneas sin comisiones con una privacidad casi perfecta. Consulta nostr:naddr1qqxnzd3e8y6rvdpe8qur2v3cqgs9n8m87l0hd9xxqwndqcmwzh4uvyxmwlw0637kuhg98pkcy8ana2grqsqqqa28f238dz para obtener más detalles.
Nutstash
Nutstash es una increíble billetera web de Cashu desarrollada por nostr:npub1cj6ndx5akfazux7f0vjl4fyx9k0ulf682p437fe03a9ndwqjm0tqj886t6 que implementa la mayoría de los NUTs, así como el envío y recepción a través de Nostr. También puedes instalarla como una Progressive Web App (PWA) en tu teléfono.
⚠️ Tanto Nutstash como Cashu todavía están en fase beta. Existe la posibilidad de perder fondos. Lee sobre los riesgos antes de usar la aplicación. Haz pruebas con pequeñas cantidades con las que te sientas cómodo perdiendo.
Pruébalo
Vamos a explicar cómo interactuar con una mint, recibir y enviar ecash, hacer copias de seguridad, convertir a Lightning y hacer intercambios entre mints, y al final probaremos la funcionalidad de los contactos de Nostr.
Añadir un mint
Para interactuar con ecash, primero necesitas tener acceso a una mint, donde se crean y canjean tus tokens de ecash.
- Ve a Txoko Mint.
- Abre la mint en Nutstash.
💡 Puedes añadir mints adicionales en Nutstash yendo a
Mint
, pegando la URL de la mint y presionandoAdd Mint
("Añadir Mint"). Algunas mints públicas se pueden encontrar en MintIndex. Ten en cuenta que algunas mints reservarán una cierta cantidad de sats para pagar las tarifas de enrutamiento, lo que significa que no podrás retirar todos tus sats.
Crear tokens
Puedes financiar tu billetera de ecash tanto recibiendo ecash directamente como creando nuevos tokens de ecash pagando una factura de Lightning.
- En la pestaña
Mint
, elige la mint en la que quieres crear nuevos tokens y presionaMint
. - Elige una cantidad. Prueba con una cantidad pequeña, como 100 sats.
- Crea la factura y págala desde una billetera de Lightning. Una vez que se haya pagado la factura, deberías tener tokens de ecash.
Realizar transacciones con ecash
Realizar transacciones con ecash implica básicamente enviar y recibir bloques de datos. Por lo tanto, puedes probar estas funcionalidades enviando y recibiendo a ti mismo. 1. Para enviar ecash, ve a
Wallet
>Send
. 2. Selecciona la mint desde la que quieres enviar. 3. Elige una cantidad. Opcionalmente, utiliza la selección de monedas. 4. Haz clic en enviar tokens. 5. Copia el token. En este punto, puedes enviar el token a otra persona o canjearlo en tu propia billetera. Dado que solo estamos probando las cosas, haremos lo último.- Para recibir ecash, haz clic en
Wallet
>Receive
. - Pega el token de cashu.
- Haz clic en
Receive
.
💡 Puedes verificar los tokens de ecash pendientes y reclamarlos si el destinatario aún no los ha canjeado. Para hacer esto, ve a la pestaña
Wallets
y buscaTokens
. Asegúrate de que la columnaPending
esté marcada. Debería haber una lista de tokens pendientes, haz clic en el botón de actualización para verificar su estado. Si no han sido reclamados, puedes copiar y canjear el token.Intercambio de múltiples mints
Es posible que te hayas preguntado si diferentes mints pueden enviar y recibir entre sí. La respuesta es sí. Bueno, más o menos. En lugar de enviar tokens de cashu entre sí, las transacciones entre mints se realizan a través de Lightning. Para probar esto, puedes agregar otra mint si aún no lo has hecho, por ejemplo, la mint de LNbits.
💡 Ten en cuenta que algunas mints reservarán una cierta cantidad de sats para pagar las tarifas de enrutamiento, lo que significa que no podrás retirar todos tus sats. Para evitar esto, también puedes crear tu propia mint con tu billetera Bitcoin Txoko LNbits activando la extensión de Cashu. Bitcoin Txoko no requiere reservas, por lo que puedes retirar todos tus sats.
- Ve a la pestaña
Mint
y agrega una nueva mint si aún no lo has hecho. - Una vez que tengas varias mints, tendrás la opción de
Inter-Mint Swap
. Abre la opción y lee la advertencia. - Si deseas continuar, elige una mint de la que quieres hacer el intercambio y una mint a la que quieres hacer el intercambio.
- Elige una cantidad.
- Confirma la cantidad (
Confirm amount
), verifica las tarifas estimadas de enrutamiento y procede con el intercambio (Swap
). En segundo plano, la mint que envía está pagando una factura de Lightning a la mint que recibe. Una vez que se haya liquidado la factura, el token intercambiado debería aparecer en el saldo de tu billetera en la mint que recibe.
Convertir a lightning
Cuando quieras convertir tus sats de cashu de nuevo a sats de Lightning, puedes convertir o "derretir" tus tokens de cashu.
- Haz clic en
Pay
o toca el ícono de la cámara para escanear un código QR. - Ingresa o escanea una factura.
- Opcionalmente, utiliza la selección de monedas.
- Presiona
Pay
. La mint funde los tokens de cashu y paga la factura de Lightning.
Copias de seguridad
Hacer copias de seguridad de los tokens de Cashu es probablemente diferente al proceso que estás acostumbrado a hacer para respaldar las billeteras de Bitcoin y Lightning. Dado que los fondos están representados por tokens que son simplemente bloques de datos, solo estás respaldando estos datos cuando haces una copia de seguridad de los tokens de Cashu. Esto también significa que tus copias de seguridad cambiarán cada vez que realices una transacción y necesitarás hacer una nueva copia de seguridad después de cada transacción.
Los diferentes clientes de billeteras han implementado las copias de seguridad de manera diferente y solo funcionarán con la misma billetera que ha creado la copia de seguridad. Nutstash utiliza un archivo JSON como copia de seguridad, que también incluye tu historial de transacciones junto con los tokens que has agregado.
- Para descargar la copia de seguridad en formato JSON, ve a
Settings
("Configuración") >Backup Tokens
("Copia de seguridad de tokens"), descarga el archivo JSON y guárdalo en un lugar seguro. - Para restaurar la copia de seguridad, ve a
Settings
("Configuración") >Restore
("Restaurar"). Lee la advertencia. Los datos actuales de tu billetera se sobrescribirán.
Nostr
Dado que puedes enviar tokens de Cashu a través de cualquier protocolo basado en texto, Nostr es una excelente opción para Cashu. Nutstash facilita el envío de tokens de Cashu a través de Nostr.
Primero, necesitas conectar un firmante externo de Nostr a Nutstash para que Nutstash pueda cifrar y firmar mensajes directos utilizados para enviar tokens de ecash. Para hacer esto,
- Ve a la pestaña
Settings
("Configuración") y encuentra la secciónNostr
. - Activa
Nostr
. - Puedes configurar (
Configure
) los retransmisores manualmente o permitir que Nutstash lea tu lista de retransmisores después de completar el siguiente paso. - Activa
Use external key
("Usar clave externa"). Debes tener instalada una extensión de firmante de Nostr en tu navegador. Algunas buenas opciones son nos2x, Alby y Nostore (para Safari en iOS). - Una vez que Nutstash detecte tu extensión de firmante, permítele leer tu lista de retransmisores y clave pública.
- Si permites que Nutstash descifre los mensajes, buscará tokens de Cashu en tus mensajes directos. Una vez encontrados, aparecerán en la pestaña
Wallet
en la bandeja de entrada (Inbox
). Allí podrás canjearlos en tu billetera.
Para enviar Cashu a través de Nostr,
- Ve a
Send
("Enviar"). - Elige un mint.
- Elige una cantidad. Opcionalmente, utiliza la selección de monedas.
- Presiona
Send
("Enviar"). - En
Send via Nostr
("Enviar a través de Nostr"), ingresa una dirección de Nostr en formato npub, hexadecimal o NIP-05. Alternativamente, escanea el código QR del perfil de alguien. - Presiona
Send via Nostr
("Enviar a través de Nostr") y firma el mensaje tipo 4 con tu firmante externo. - Informa al destinatario que revise su bandeja de entrada, ¡deberían tener algunos Cashu esperándolos allí!
Conclusión
¿Encontraste útil esta guía? ¡Intenta enviarnos algunos tokens de Cashu a través de Nostr!
-
@ b2cab944:8dd833a6
2024-09-02 10:21:10Watch this space for content to help companies of all sizes begin their Bitcoin journey...
-
@ d5479643:7c3ac1d5
2024-09-02 09:26:09Subscribe now{.button .primary}
Die ersten Video-Stellungnahmen aus dem Kreis der Unterzeichner sammeln wir in unserem Youtube-Channel, den Sie hier abonnieren können.
Zum Beispiel von Sängerin Silke Schwarz aus Heidelberg:
::: {#youtube2-NdvqYNEnBsI .youtube-wrap attrs="{\"videoId\":\"NdvqYNEnBsI\",\"startTime\":null,\"endTime\":null}" component-name="Youtube2ToDOM"} ::: {.youtube-inner} ::: :::
Der Volksmusikforscher Ulrich Morgenstern aus Wien meint folgendes zum Appell:
::: {#youtube2-uaz0K6-_jXM .youtube-wrap attrs="{\"videoId\":\"uaz0K6-_jXM\",\"startTime\":\"19s\",\"endTime\":null}" component-name="Youtube2ToDOM"} ::: {.youtube-inner} ::: :::
Wissenschaftler Robert Endres aus London zur aktuellen Corona-Situation:
::: {#youtube2-M__acWG_xS0 .youtube-wrap attrs="{\"videoId\":\"M__acWG_xS0\",\"startTime\":null,\"endTime\":null}" component-name="Youtube2ToDOM"} ::: {.youtube-inner} ::: :::
Mit der Erstunterzeichnerin, Professorin und Leiterin des John Stuart Mill Instituts, Ulrike Ackermann, hat Gunnar Kaiser ein Gespräch über die Lage der heutigen Intellektuellen angesichts von Cancel Culture geführt. Versagen die Intellektuellen angesichts der heutigen Herausforderungen?
::: {#youtube2-LerPAb0QlhE .youtube-wrap attrs="{\"videoId\":\"LerPAb0QlhE\",\"startTime\":\"42s\",\"endTime\":null}" component-name="Youtube2ToDOM"} ::: {.youtube-inner} ::: :::
Die vielen weiteren Stellungnahmen von Ihnen sammeln wir weiter und machen diese nach und nach der Öffentlichkeit zugänglich, u.a. auf unseren Kanälen. Wir arbeiten auch an einer neuen Homepage, auf welcher die Namen der Unterzeichner besser einsehbar sein werden.
Sie können meine Arbeit auch gerne unterstützen, am einfachsten per:
-
Paypal, \@freieIntelligenz; miloszmatuschek\@substack.com
-
Bitcoin: 1DiGG4P2LEcmLP6i8B9rbe3CCMYcKrfbfc
-
Weitere Möglichkeiten auf Nachfrage.
Diesen und weitere Texte zum "Appell für freie Debattenräume" können Sie unter "Freischwebende Intelligenz" einsehen. Dort lesen Sie auch meine sonst in der NZZ erschienenen Kolumnen sowie sonstige Texte von mir. Wenn Sie mir schreiben wollen: Entweder auf diese Email antworten oder an: kontakt\@idw-europe.org
-
-
@ f977c464:32fcbe00
2024-01-30 20:06:18Güneşin kaybolmasının üçüncü günü, saat öğlen on ikiyi yirmi geçiyordu. Trenin kalkmasına yaklaşık iki saat vardı. Hepimiz perondaydık. Valizlerimiz, kolilerimiz, renk renk ve biçimsiz çantalarımızla yan yana dizilmiş, kısa aralıklarla tepemizdeki devasa saati kontrol ediyorduk.
Ama ne kadar dik bakarsak bakalım zaman bir türlü istediğimiz hızla ilerlemiyordu. Herkes birkaç dakika sürmesi gereken alelade bir doğa olayına sıkışıp kalmış, karanlıktan sürünerek çıkmayı deniyordu.
Bekleme salonuna doğru döndüm. Nefesimden çıkan buharın arkasında, kalın taş duvarları ve camlarıyla morg kadar güvenli ve soğuk duruyordu. Cesetleri o yüzden bunun gibi yerlere taşımaya başlamışlardı. Demek insanların bütün iyiliği başkaları onları gördüğü içindi ki gündüzleri gecelerden daha karanlık olduğunda hemen birbirlerinin gırtlağına çökmüş, böğürlerinde delikler açmış, gözlerini oyup kafataslarını parçalamışlardı.
İstasyonun ışığı titrediğinde karanlığın enseme saplandığını hissettim. Eğer şimdi, böyle kalabalık bir yerde elektrik kesilse başımıza ne gelirdi?
İçerideki askerlerden biri bakışlarımı yakalayınca yeniden saate odaklanmış gibi yaptım. Sadece birkaç dakika geçmişti.
“Tarlalarım gitti. Böyle boyum kadar ayçiçeği doluydu. Ah, hepsi ölüp gidiyor. Afitap’ın çiçekleri de gi-”
“Dayı, Allah’ını seversen sus. Hepimizi yakacaksın şimdi.”
Karanlıkta durduğunda, görünmez olmayı istemeye başlıyordun. Kimse seni görmemeli, nefesini bile duymamalıydı. Kimsenin de ayağının altında dolaşmamalıydın; gelip kazayla sana çarpmamalılar, takılıp sendelememeliydiler. Yoksa aslında hedefi sen olmadığın bir öfke gürlemeye başlar, yaşadığın ilk şoku ve acıyı silerek üstünden geçerdi.
İlk konuşan, yaşlıca bir adam, kafasında kasketi, nasırlı ellerine hohluyordu. Gözleri ve burnu kızarmıştı. Güneşin kaybolması onun için kendi başına bir felaket değildi. Hayatına olan pratik yansımalarından korkuyordu olsa olsa. Bir anının kaybolması, bu yüzden çoktan kaybettiği birinin biraz daha eksilmesi. Hayatta kalmasını gerektiren sebepler azalırken, hayatta kalmasını sağlayacak kaynaklarını da kaybediyordu.
Onu susturan delikanlıysa atkısını bütün kafasına sarmış, sakalı ve yüzünün derinliklerine kaçmış gözleri dışında bedeninin bütün parçalarını gizlemeye çalışıyordu. İşte o, güneşin kaybolmasının tam olarak ne anlama geldiğini anlamamış olsa bile, dehşetini olduğu gibi hissedebilenlerdendi.
Güneşin onlardan alındıktan sonra kime verileceğini sormuyorlardı. En başta onlara verildiğinde de hiçbir soru sormamışlardı zaten.
İki saat ne zaman geçer?
Midemin üstünde, sağ tarafıma doğru keskin bir acı hissettim. Karaciğerim. Gözlerimi yumdum. Yanımda biri metal bir nesneyi yere bıraktı. Bir kafesti. İçerisindeki kartalın ıslak kokusu burnuma ulaşmadan önce bile biliyordum bunu.
“Yeniden mi?” diye sordu bana kartal. Kanatları kanlı. Zamanın her bir parçası tüylerinin üstüne çöreklenmişti. Gagası bir şey, tahminen et parçası geveliyor gibi hareket ediyordu. Eski anılar kolay unutulmazmış. Şu anda kafesinin kalın parmaklıklarının ardında olsa da bunun bir aldatmaca olduğunu bir tek ben biliyordum. Her an kanatlarını iki yana uzatıverebilir, hava bu hareketiyle dalgalanarak kafesi esneterek hepimizi içine alacak kadar genişleyebilir, parmaklıklar önce ayaklarımızın altına serilir gibi gözükebilir ama aslında hepimizin üstünde yükselerek tepemize çökebilirdi.
Aşağıya baktım. Tahtalarla zapt edilmiş, hiçbir yere gidemeyen ama her yere uzanan tren rayları. Atlayıp koşsam… Çantam çok ağırdı. Daha birkaç adım atamadan, kartal, suratını bedenime gömerdi.
“Bu sefer farklı,” diye yanıtladım onu. “Yeniden diyemezsin. Tekrarladığım bir şey değil bu. Hatta bir hata yapıyormuşum gibi tonlayamazsın da. Bu sefer, insanların hak etmediğini biliyorum.”
“O zaman daha vahim. Süzme salaksın demektir.”
“İnsanların hak etmemesi, insanlığın hak etmediği anlamına gelmez ki.”
Az önce göz göze geldiğim genççe ama çökük asker hâlâ bana bakıyordu. Bir kartalla konuştuğumu anlamamıştı şüphesiz. Yanımdakilerden biriyle konuştuğumu sanmış olmalıydı. Ama konuştuğum kişiye bakmıyordum ona göre. Çekingence kafamı eğmiştim. Bir kez daha göz göze geldiğimizde içerideki diğer iki askere bir şeyler söyledi, onlar dönüp beni süzerken dışarı çıktı.
Yanımızdaki, az önce konuşan iki adam da şaşkınlıkla bir bana bir kartala bakıyordu.
“Yalnız bu sefer kalbin de kırılacak, Prometheus,” dedi kartal, bana. “Belki son olur. Biliyorsun, bir sürü soruna neden oluyor bu yaptıkların.”
Beni koruyordu sözde. En çok kanıma dokunan buydu. Kasıklarımın üstüne oturmuş, kanlı suratının ardında gözleri parlarken attığı çığlık kulaklarımda titremeye devam ediyordu. Bu tabloda kimsenin kimseyi düşündüğü yoktu. Kartalın, yanımızdaki adamların, artık arkama kadar gelmiş olması gereken askerin, tren raylarının, geçmeyen saatlerin…
Arkamı döndüğümde, asker sahiden oradaydı. Zaten öyle olması gerekiyordu; görmüştüm bunu, biliyordum. Kehanetler… Bir şeyler söylüyordu ama ağzı oynarken sesi çıkmıyordu. Yavaşlamış, kendisini saatin akışına uydurmuştu. Havada donan tükürüğünden anlaşılıyordu, sinirliydi. Korktuğu için olduğunu biliyordum. Her seferinde korkmuşlardı. Beni unutmuş olmaları işlerini kolaylaştırmıyordu. Sadece yeni bir isim vermelerine neden oluyordu. Bu seferkiyle beni lanetleyecekleri kesinleşmişti.
Olması gerekenle olanların farklı olması ne kadar acınasıydı. Olması gerekenlerin doğasının kötücül olmasıysa bir yerde buna dayanıyordu.
“Salaksın,” dedi kartal bana. Zamanı aşan bir çığlık. Hepimizin önüne geçmişti ama kimseyi durduramıyordu.
Sonsuzluğa kaç tane iki saat sıkıştırabilirsiniz?
Ben bir tane bile sıkıştıramadım.
Çantama uzanıyordum. Asker de sırtındaki tüfeğini indiriyordu. Benim acelem yoktu, onunsa eli ayağı birbirine dolaşıyordu. Oysaki her şey tam olması gerektiği anda olacaktı. Kehanet başkasının parmaklarının ucundaydı.
Güneş, bir tüfeğin patlamasıyla yeryüzüne doğdu.
Rayların üzerine serilmiş göğsümün ortasından, bir çantanın içinden.
Not: Bu öykü ilk olarak 2021 yılında Esrarengiz Hikâyeler'de yayımlanmıştır.
-
@ ee7d2dbe:4a5410b0
2024-09-02 07:38:22मौसम वेब एप्लीकेशन का प्रयोग का तरीका:
हमारी मौसम वेब एप्लीकेशन को प्रयोग कीजिये और जानिए मौसम का हाल आपके अपने शहर और गांव का. आप चाहें तो सर्च बटन से अपने शहर के अलावा किसी और शहर का मौसम भी जान सकते हैं.
जब भी आप हमारी मौसम एप्लीकेशन पे आएंगे, आप जानेंगे न केवल दिन का तापमान बल्कि इस समय की हवा में आद्रता, हवा की गति और भी बहुत कुछ. आप चाहें तो आप आज का मौसम के अलावा आने वाले कल का और बीते हुए कल का मौसम भी देख सकते हैं देश के किसी भी शहर का आपकी अपनी भाषा में.
मौसम का हाल जानने के फायदे:
वर्तमान मौसम का अनुमान और आने वाले दिनों के मौसम का पूर्वानुमान या फिर बीते दिनों के मौसम की जानकारी का लाभ हर किसी को मिलता है.
यदि हम अपने देश की बात करें तो कृषि कार्य और किसानो के लिए मौसम का हल जानना और पूर्वानुमान जानना बेहद जरूरी है, वहीँ सरकार के विभिन्न विभाग, एयरलाइन्स, निर्माण कार्य, समुंद्री ट्रांसपोर्ट, सड़क परिवहन, ट्रैवेलिंग और लगभग हर कार्य के लिए मौसम का हाल जानना नित्यंत आवयशक है और इसीलिए हम लाएं हैं आपके शहर और गाँव के मौसम का हल आप ही भाषा में.
आइये जानते हैं मौसम का हाल जानना विभिन्न प्रकार के लोगों के लिए कैसे लाभदायक है.
- कृषि कार्य और किसान भाई
भारत जैसे कृषि प्रधान देश में किसान भाईओं की निर्भरता सटीक मौसम की जानकारी पर बहुत ज्यादा है. मौसम के सटीक आकलन और पूर्वानुमान से किसान अपनी फसलों और खेती की उत्पादकता बढ़ा सकता है और नुकसान से बचने के लिए पहले ही योजना बना सकता है. मौसम के सटीक अनुमान के हिसाब से किसान बुवाई, सिंचाई और कटाई को बेह्तरीक तरीके से योजनाबद्ध तरीके से कर सकता है.
यह जानना के कब वर्षा होने वाली है और कितनी, या कब सूखा आ सकता है या कब ओला वृष्टि हो सकती है महत्वपूर्ण है ताकि इसके आधार पे किसान अपनी फसलों की रक्षा के प्रबंध कर सके. यह मौसम एप्लीकेशन हमारे सभी किसान भाईओं को एकदम सटीक जानकारी उपलब्ध करवाने के लिए प्रयासरत और प्रतिबद्ध रहती है.
यह जानना के कब वर्षा होने वाली है और कितनी, या कब सूखा आ सकता है या कब ओला वृष्टि हो सकती है महत्वपूर्ण है ताकि इसके आधार पे किसान अपनी फसलों की रक्षा के प्रबंध कर सके. यह मौसम एप्लीकेशन हमारे सभी किसान भाईओं को एकदम सटीक जानकारी उपलब्ध करवाने के लिए प्रयासरत और प्रतिबद्ध रहती है.
- परिवहन और यात्रा
पुराने समय से ही जब लोग पैदल भी चलते थे तब भी मौसम की जानकारी का अनुमान लगते थे. आज के आधुनिक युग में जब परिवहन के सांसधन जल, आकाश, सड़क और अब तो समुन्द्र के अंदर भी से चलते हैं तो मौसम जानना सबसे ज्यादा आवश्यक हो गया है.
सड़क मार्ग - चाहे सड़क मार्ग से माल ढुलाई का कार्य हो या फिर जनसामान्य सवाई का, सभी परिवहन निगम अपने मार्ग में आने वाले मौसम की जानकारी पहले से प्राप्त करते हैं. वर्षा की संभावना या ओला वृष्टि की, या बर्फ़बारी की या आंधी तूफ़ान का अनुमान परिवहन चलने वालो को बेहतर योजना बनाने की जानकारी देता है. खासतौर पे पहाड़ी या बर्फीले इलाको पे तो बिना मौसम के पूर्वानुमान के एक छोटी यात्रा का आयोजन भी नहीं किया जाता। यह मौसम एप्लीकेशन ऐसे सभी परिवहन करने वाले लोगों को सटीक जानकारी उपलब्ध करवाती है.
हवाई मार्गहवाई यात्रा के लिए तो मौसम, हवा का दबाव, वर्षा, अंधी तूफ़ान, बर्फ़बारी, ऊंचाई का टेम्प्रेचर यह सब जानना अति महत्व्यपूर्ण शर्तें हैं. सभी हवाई अड्डों पर एक Automated Weather Observing System (AWOS) लगा होता है जिसके द्वारा मौसम के सभी प्रकार के पूर्वानुमान और वर्तमान आकलन किये जाते हैं. वह इतना जरूरी है के बिना उसके एक भी फ्लाइट उड़ने की कल्पना भी नहीं की जा सकती.
Wind direction and velocity meter - हवा की दिशा और गति मापने वाला मीटर: यह उपकरण हवा की गति और दिशा को दिखाता है।
Weather Surveillance Radar - मौसम निगरानी रडार: यह रडार वर्षा, ओले या बर्फ जैसी वर्षण को ढूंढने और उसकी गंभीरता को दिखाने में मदद करता है।
घिरा हुआ मौसम विज्ञान बगीचा: इसमें सभी मौसम-मापने वाले उपकरण रखे जाते हैं।
मौसम को मापने का एक संक्षिप्त इतिहास:
जबसे मानव सभ्यता विकसित हुई है तभी से मनुष्य मौसम के बारे में जानने का प्रयास करता रहा है. बहुत पुरानी बात की जाये तो पुराने यूनान और भारत में 400--500 इसा पूर्व में वर्षा को मापने और दर्ज करने के लिए Rain gauges (वर्षा मापक यन्त्र) का भी जिक्र आता है जो कालांतर में व्याकानिको के द्वारा सन्न 1441 में standardized किया गया. इसको कोरिया में Cheugugi कहा गया है.
सन् 1593 में महान गैलेलिओ गलीली ने पानी में अलग अलग भार के glass bulbs डाल कर पहला थर्मामीटर बनाया, फिर उन्ही के शिष्य Evangelista Torricelli ने सन् 1644 में अनुसन्धान करके पहला बैरोमीटर बनाया जिसे के एटमोस्फियरिक प्रेशर नापना शुरू हुआ जो की मौसम के वर्तमान और पूर्वानुमान लगाने के लिए एक मील का पत्थर साबित हुआ.
मॉडर्न ज़माने में फिर अमेरिका के Utah Agricultural College में दुनिया का बीसवां मौसम स्टेशन स्थापित किया गया जहाँ अधिकतम और न्यूनतम तापमान और मौसम मापने की प्रक्रिया शुरू हुई. और अब इक्कीसवें सदी में यूएसयू में एक सौर ऊर्जा संचालित पर्यावरणीय वेधशाला स्थापित की गई और यह वेधशाला सभी मानक मौसम स्थितियों, सौर विकिरण के पांच घटकों, हवा में कार्बन डाइऑक्साइड, और भूमिगत सात स्थितियों को मापती है और आपको एक रियल टाइम डाटा उपलब्ध करवाती है।
Source: https://www.maussam.com/
-
@ 3bf0c63f:aefa459d
2024-01-14 13:55:28O Planetinha
Fumaça verde me entrando pelas narinas e um coro desafinado fazia uma base melódica.
nos confins da galáxia havia um planetinha isolado. Era um planeta feliz.
O homem vestido de mago começava a aparecer por detrás da fumaça verde.
O planetinha recebeu três presentes, mas o seu habitante, o homem, estava num estado de confusão tão grande que ameaçava estragá-los. Os homens já havia escravizado o primeiro presente, a vida; lutavam contra o segundo presente, a morte; e havia alguns que achavam que deviam destruir totalmente o terceiro, o amor, e com isto levar a desordem total ao pobre planetinha perdido, que se chamava Terra.
O coro desafinado entrou antes do "Terra" cantando várias vezes, como se imitasse um eco, "terra-terra-terraaa". Depois de uma pausa dramática, o homem vestido de mago voltou a falar.
Terra, nossa nave mãe.
Neste momento eu me afastei. À frente do palco onde o mago e seu coral faziam apelos à multidão havia vários estandes cobertos com a tradicional armação de quatro pernas e lona branca. Em todos os cantos da praça havia gente, gente dos mais variados tipos. Visitantes curiosos que se aproximavam atraídos pela fumaça verde e as barraquinhas, gente que aproveitava o movimento para vender doces sem pagar imposto, casais que se abraçavam de pé para espantar o frio, os tradicionais corredores que faziam seu cooper, gente cheia de barba e vestida para imitar os hippies dos anos 60 e vender colares estendidos no chão, transeuntes novos e velhos, vestidos como baladeiros ou como ativistas do ônibus grátis, grupos de ciclistas entusiastas.
O mago fazia agora apelos para que nós, os homens, habitantes do isolado planetinha, passássemos a ver o planetinha, nossa nave mãe, como um todo, e adquiríssemos a consciência de que ele estava entrando em maus lençóis. A idéia, reforçada pela logomarca do evento, era que parássemos de olhar só para a nossa vida e pensássemos no planeta.
A logomarca do evento, um desenho estilizado do planeta Terra, nada tinha a ver com seu nome: "Festival Andando de Bem com a Vida", mas havia sido ali colocada estrategicamente pelos organizadores, de quem parecia justamente sair a mensagem dita pelo mago.
Aquela multidão de pessoas que, assim como eu, tinham suas próprias preocupações, não podiam ver o quadro caótico que formavam, cada uma com seus atos isolados, ali naquela praça isolada, naquele planeta isolado. Quando o hippie barbudo, quase um Osho, assustava um casal para tentar vender-lhes um colar, a quantidade de caos que isto acrescentava à cena era gigantesca. Por um segundo, pude ver, como se estivesse de longe e acima, com toda a pretensão que este estado imaginativo carrega, a cena completa do caos.
Uma nave-mãe, dessas de ficção científica, habitada por milhões de pessoas, seguia no espaço sem rumo, e sem saber que logo à frente um longo precipício espacial a esperava, para a desgraça completa sua e de seus habitantes.
Acostumados àquela nave tanto quanto outrora estiveram acostumados à sua terra natal, os homens viviam as próprias vidas sem nem se lembrar que estavam vagando pelo espaço. Ninguém sabia quem estava conduzindo a nave, e ninguém se importava.
No final do filme descobre-se que era a soma completa do caos que cada habitante produzia, com seus gestos egoístas e incapazes de levar em conta a totalidade, é que determinava a direção da nave-mãe. O efeito, no entanto, não era imediato, como nunca é. Havia gente de verdade encarregada de conduzir a nave, mas era uma gente bêbada, mau-caráter, que vivia brigando pelo controle da nave e o poder que isto lhes dava. Poder, status, dinheiro!
Essa gente bêbada era atraída até ali pela corrupção das instituições e da moral comum que, no fundo no fundo, era causada pelo egoísmo da população, através de um complexo -- mas que no filme aparece simplificado pela ação individual de um magnata do divertimento público -- processo social.
O homem vestido de mago era mais um agente causador de caos, com sua cena cheia de fumaça e sua roupa estroboscópica, ele achava que estava fazendo o bem ao alertar sua platéia, todos as sextas-feiras, de que havia algo que precisava ser feito, que cada um que estava ali ouvindo era responsável pelo planeta. A sua incapacidade, porém, de explicar o que precisava ser feito só aumentava a angústia geral; a culpa que ele jogava sobre seu público, e que era prontamente aceita e passada em frente, aos familiares e amigos de cada um, atormentava-os diariamente e os impedia de ter uma vida decente no trabalho e em casa. As famílias, estressadas, estavam constantemente brigando e os motivos mais insignificantes eram responsáveis pelas mais horrendas conseqüências.
O mago, que após o show tirava o chapéu entortado e ia tomar cerveja num boteco, era responsável por uma parcela considerável do caos que levava a nave na direção do seu desgraçado fim. No filme, porém, um dos transeuntes que de passagem ouviu um pedaço do discurso do mago despertou em si mesmo uma consiência transformadora e, com poderes sobre-humanos que lhe foram então concedidos por uma ordem iniciática do bem ou não, usando só os seus poderes humanos mesmo, o transeunte -- na primeira versão do filme um homem, na segunda uma mulher -- consegue consertar as instituições e retirar os bêbados da condução da máquina. A questão da moral pública é ignorada para abreviar a trama, já com duas horas e quarenta de duração, mas subentende-se que ela também fora resolvida.
No planeta Terra real, que não está indo em direção alguma, preso pela gravidade ao Sol, e onde as pessoas vivem a própria vida porque lhes é impossível viver a dos outros, não têm uma consciência global de nada porque só é possível mesmo ter a consciência delas mesmas, e onde a maioria, de uma maneira ou de outra, está tentando como pode, fazer as coisas direito, o filme é exibido.
Para a maioria dos espectadores, é um filme que evoca reflexões, um filme forte. Por um segundo elas têm o mesmo vislumbre do caos generalizado que eu tive ali naquela praça. Para uma pequena parcela dos espectadores -- entre eles alguns dos que estavam na platéia do mago, o próprio mago, o seguidor do Osho, o casal de duas mulheres e o vendedor de brigadeiros, mas aos quais se somam também críticos de televisão e jornal e gente que fala pelos cotovelos na internet -- o filme é um horror, o filme é uma vulgarização de um problema real e sério, o filme apela para a figura do herói salvador e passa uma mensagem totalmente errada, de que a maioria da população pode continuar vivendo as suas própria vidinhas miseráveis enquanto espera por um herói que vem do Olimpo e os salva da mixórdia que eles mesmos causaram, é um filme que presta um enorme desserviço à causa.
No dia seguinte ao lançamento, num bar meio caro ali perto da praça, numa mesa com oito pessoas, entre elas seis do primeiro grupo e oito do segundo, discute-se se o filme levará ou não o Oscar. Eu estou em casa dormindo e não escuto nada.
-
@ f977c464:32fcbe00
2024-01-11 18:47:47Kendisini aynada ilk defa gördüğü o gün, diğerleri gibi olduğunu anlamıştı. Oysaki her insan biricik olmalıydı. Sözgelimi sinirlendiğinde bir kaşı diğerinden birkaç milimetre daha az çatılabilirdi veya sevindiğinde dudağı ona has bir açıyla dalgalanabilirdi. Hatta bunların hiçbiri mümkün değilse, en azından, gözlerinin içinde sadece onun sahip olabileceği bir ışık parlayabilirdi. Çok sıradan, öyle sıradan ki kimsenin fark etmediği o milyonlarca minik şeyden herhangi biri. Ne olursa.
Ama yansımasına bakarken bunların hiçbirini bulamadı ve diğer günlerden hiç de farklı başlamamış o gün, işe gitmek için vagonunun gelmesini beklediği alelade bir metro istasyonunda, içinde kaybolduğu illüzyon dağılmaya başladı.
İlk önce derisi döküldü. Tam olarak dökülmedi aslında, daha çok kıvılcımlara dönüşüp bedeninden fırlamış ve bir an sonra sönerek külleşmiş, havada dağılmıştı. Ardında da, kaybolmadan hemen önce, kısa süre için hayal meyal görülebilen, bir ruhun yok oluşuna ağıt yakan rengârenk peri cesetleri bırakmıştı. Beklenenin aksine, havaya toz kokusu yayıldı.
Dehşete düştü elbette. Dehşete düştüler. Panikle üstlerini yırtan 50 işçi. Her şeyin sebebiyse o vagon.
Saçları da döküldü. Her tel, yere varmadan önce, her santimde ikiye ayrıla ayrıla yok oldu.
Bütün yüzeylerin mat olduğu, hiçbir şeyin yansımadığı, suyun siyah aktığı ve kendine ancak kameralarla bakabildiğin bir dünyada, vagonun içine yerleştirilmiş bir aynadan ilk defa kendini görmek.
Gözlerinin akları buharlaşıp havada dağıldı, mercekleri boşalan yeri doldurmak için eriyip yayıldı. Gerçeği görmemek için yaratılmış, bu yüzden görmeye hazır olmayan ve hiç olmayacak gözler.
Her şeyin o anda sona erdiğini sanabilirdi insan. Derin bir karanlık ve ölüm. Görmenin görmek olduğu o anın bitişi.
Ben geldiğimde ölmüşlerdi.
Yani bozulmuşlardı demek istiyorum.
Belleklerini yeni taşıyıcılara takmam mümkün olmadı. Fiziksel olarak kusursuz durumdaydılar, olmayanları da tamir edebilirdim ama tüm o hengamede kendilerini baştan programlamış ve girdilerini modifiye etmişlerdi.
Belleklerden birini masanın üzerinden ileriye savurdu. Hınca hınç dolu bir barda oturuyorlardı. O ve arkadaşı.
Sırf şu kendisini insan sanan androidler travma geçirip delirmesin diye neler yapıyoruz, insanın aklı almıyor.
Eliyle arkasını işaret etti.
Polislerin söylediğine göre biri vagonun içerisine ayna yerleştirmiş. Bu zavallılar da kapı açılıp bir anda yansımalarını görünce kafayı kırmışlar.
Arkadaşı bunların ona ne hissettirdiğini sordu. Yani o kadar bozuk, insan olduğunu sanan androidi kendilerini parçalamış olarak yerde görmek onu sarsmamış mıydı?
Hayır, sonuçta belirli bir amaç için yaratılmış şeyler onlar. Kaliteli bir bilgisayarım bozulduğunda üzülürüm çünkü parasını ben vermişimdir. Bunlarsa devletin. Bana ne ki?
Arkadaşı anlayışla kafasını sallayıp suyundan bir yudum aldı. Kravatını biraz gevşetti.
Bira istemediğinden emin misin?
İstemediğini söyledi. Sahi, neden deliriyordu bu androidler?
Basit. Onların yapay zekâlarını kodlarken bir şeyler yazıyorlar. Yazılımcılar. Biliyorsun, ben donanımdayım. Bunlar da kendilerini insan sanıyorlar. Tiplerine bak.
Sesini alçalttı.
Arabalarda kaza testi yapılan mankenlere benziyor hepsi. Ağızları burunları bile yok ama şu geldiğimizden beri sakalını düzeltip duruyor mesela. Hayır, hepsi de diğerleri onun sakalı varmış sanıyor, o manyak bir şey.
Arkadaşı bunun delirmeleriyle bağlantısını çözemediğini söyledi. O da normal sesiyle konuşmaya devam etti.
Anlasana, aynayı falan ayırt edemiyor mercekleri. Lönk diye kendilerini görüyorlar. Böyle, olduğu gibi...
Nedenmiş peki? Ne gerek varmış?
Ne bileyim be abicim! Ahiret soruları gibi.
Birasına bakarak dalıp gitti. Sonra masaya abanarak arkadaşına iyice yaklaştı. Bulanık, bir tünelin ucundaki biri gibi, şekli şemalı belirsiz bir adam.
Ben seni nereden tanıyorum ki ulan? Kimsin sen?
Belleği makineden çıkardılar. İki kişiydiler. Soruşturmadan sorumlu memurlar.
─ Baştan mı başlıyoruz, diye sordu belleği elinde tutan ilk memur.
─ Bir kere daha deneyelim ama bu sefer direkt aynayı sorarak başla, diye cevapladı ikinci memur.
─ Bence de. Yeterince düzgün çalışıyor.
Simülasyon yüklenirken, ayakta, biraz arkada duran ve alnını kaşıyan ikinci memur sormaktan kendisini alamadı:
─ Bu androidleri niye böyle bir olay yerine göndermişler ki? Belli tost olacakları. İsraf. Gidip biz baksak aynayı kırıp delilleri mahvetmek zorunda da kalmazlar.
Diğer memur sandalyesinde hafifçe dönecek oldu, o sırada soruyu bilgisayarın hoparlöründen teknisyen cevapladı.
Hangi işimizde bir yamukluk yok ki be abi.
Ama bir son değildi. Üstlerindeki tüm illüzyon dağıldığında ve çıplak, cinsiyetsiz, birbirinin aynı bedenleriyle kaldıklarında sıra dünyaya gelmişti.
Yere düştüler. Elleri -bütün bedeni gibi siyah turmalinden, boğumları çelikten- yere değdiği anda, metronun zemini dağıldı.
Yerdeki karolar öncesinde beyazdı ve çok parlaktı. Tepelerindeki floresan, ışığını olduğu gibi yansıtıyor, tek bir lekenin olmadığı ve tek bir tozun uçmadığı istasyonu aydınlatıyorlardı.
Duvarlara duyurular asılmıştı. Örneğin, yarın akşam kültür merkezinde 20.00’da başlayacak bir tekno blues festivalinin cıvıl cıvıl afişi vardı. Onun yanında daha geniş, sarı puntolu harflerle yazılmış, yatay siyah kesiklerle çerçevesi çizilmiş, bir platformdan düşen çöp adamın bulunduğu “Dikkat! Sarı bandı geçmeyin!” uyarısı. Biraz ilerisinde günlük resmi gazete, onun ilerisinde bir aksiyon filminin ve başka bir romantik komedi filminin afişleri, yapılacakların ve yapılmayacakların söylendiği küçük puntolu çeşitli duyurular... Duvar uzayıp giden bir panoydu. On, on beş metrede bir tekrarlanıyordu.
Tüm istasyonun eni yüz metre kadar. Genişliği on metre civarı.
Önlerinde, açık kapısından o mendebur aynanın gözüktüğü vagon duruyordu. Metro, istasyona sığmayacak kadar uzundu. Bir kılıcın keskinliğiyle uzanıyor ama yer yer vagonların ek yerleriyle bölünüyordu.
Hiçbir vagonda pencere olmadığı için metronun içi, içlerindekiler meçhuldü.
Sonrasında karolar zerrelerine ayrılarak yükseldi. Floresanın ışığında her yeri toza boğdular ve ortalığı gri bir sisin altına gömdüler. Çok kısa bir an. Afişleri dalgalandırmadılar. Dalgalandırmaya vakitleri olmadı. Yerlerinden söküp aldılar en fazla. Işık birkaç kere sönüp yanarak direndi. Son kez söndüğünde bir daha geri gelmedi.
Yine de etraf aydınlıktı. Kırmızı, her yere eşit dağılan soluk bir ışıkla.
Yer tamamen tele dönüşmüştü. Altında çapraz hatlarla desteklenmiş demir bir iskelet. Işık birkaç metreden daha fazla aşağıya uzanamıyordu. Sonsuzluğa giden bir uçurum.
Duvarın yerini aynı teller ve demir iskelet almıştı. Arkasında, birbirine vidalarla tutturulmuş demir plakalardan oluşan, üstünden geçen boruların ek yerlerinden bazen ince buharların çıktığı ve bir süre asılı kaldıktan sonra ağır, yağlı bir havayla sürüklendiği bir koridor.
Diğer tarafta paslanmış, pencerelerindeki camlar kırıldığı için demir plakalarla kapatılmış külüstür bir metro. Kapının karşısındaki aynadan her şey olduğu gibi yansıyordu.
Bir konteynırın içini andıran bir evde, gerçi gayet de birbirine eklenmiş konteynırlardan oluşan bir şehirde “andıran” demek doğru olmayacağı için düpedüz bir konteynırın içinde, masaya mum görüntüsü vermek için koyulmuş, yarı katı yağ atıklarından şekillendirilmiş kütleleri yakmayı deniyordu. Kafasında hayvan kıllarından yapılmış grili siyahlı bir peruk. Aynı kıllardan kendisine gür bir bıyık da yapmıştı.
Üstünde mavi çöp poşetlerinden yapılmış, kravatlı, şık bir takım.
Masanın ayakları yerine oradan buradan çıkmış parçalar konulmuştu: bir arabanın şaft mili, üst üste konulmuş ve üstünde yazı okunamayan tenekeler, boş kitaplar, boş gazete balyaları... Hiçbir şeye yazı yazılmıyordu, gerek yoktu da zaten çünkü merkez veri bankası onları fark ettirmeden, merceklerden giren veriyi sentezleyerek insanlar için dolduruyordu. Yani, androidler için. Farklı şekilde isimlendirmek bir fark yaratacaksa.
Onların mercekleri için değil. Bağlantıları çok önceden kopmuştu.
─ Hayatım, sofra hazır, diye bağırdı yatak odasındaki karısına.
Sofrada tabak yerine düz, bardak yerine bükülmüş, çatal ve bıçak yerine sivriltilmiş plakalar.
Karısı salonun kapısında durakladı ve ancak kulaklarına kadar uzanan, kocasınınkine benzeyen, cansız, ölü hayvanların kıllarından ibaret peruğunu eliyle düzeltti. Dudağını, daha doğrusu dudağının olması gereken yeri koyu kırmızı bir yağ tabakasıyla renklendirmeyi denemişti. Biraz da yanaklarına sürmüştü.
─ Nasıl olmuş, diye sordu.
Sesi tek düzeydi ama hafif bir neşe olduğunu hissettiğinize yemin edebilirdiniz.
Üzerinde, çöp poşetlerinin içini yazısız gazete kağıtlarıyla doldurarak yaptığı iki parça giysi.
─ Çok güzelsin, diyerek kravatını düzeltti kocası.
─ Sen de öylesin, sevgilim.
Yaklaşıp kocasını öptü. Kocası da onu. Sonra nazikçe elinden tutarak, sandalyesini geriye çekerek oturmasına yardım etti.
Sofrada yemek niyetine hiçbir şey yoktu. Gerek de yoktu zaten.
Konteynırın kapısı gürültüyle tekmelenip içeri iki memur girene kadar birbirlerine öyküler anlattılar. O gün neler yaptıklarını. İşten erken çıkıp yemyeşil çimenlerde gezdiklerini, uçurtma uçurduklarını, kadının nasıl o elbiseyi bulmak için saatlerce gezip yorulduğunu, kocasının kısa süreliğine işe dönüp nasıl başarılı bir hamleyle yaşanan krizi çözdüğünü ve kadının yanına döndükten sonra, alışveriş merkezinde oturdukları yeni dondurmacının dondurmalarının ne kadar lezzetli olduğunu, boğazlarının ağrımasından korktuklarını...
Akşam film izleyebilirlerdi, televizyonda -boş ve mat bir plaka- güzel bir film oynayacaktı.
İki memur. Çıplak bedenleriyle birbirinin aynı. Ellerindeki silahları onlara doğrultmuşlardı. Mum ışığında, tertemiz bir örtünün serili olduğu masada, bardaklarında şaraplarla oturan ve henüz sofranın ortasındaki hindiye dokunmamış çifti gördüklerinde bocaladılar.
Hiç de androidlere bilinçli olarak zarar verebilecek gibi gözükmüyorlardı.
─ Sessiz kalma hakkına sahipsiniz, diye bağırdı içeri giren ikinci memur. Söylediğiniz her şey...
Cümlesini bitiremedi. Yatak odasındaki, masanın üzerinden gördüğü o şey, onunla aynı hareketleri yapan android, yoksa, bir aynadaki yansıması mıydı?
Bütün illüzyon o anda dağılmaya başladı.
Not: Bu öykü ilk olarak 2020 yılında Esrarengiz Hikâyeler'de yayımlanmıştır.
-
@ 8125b911:a8400883
2024-09-02 07:18:52曾经有一款热门插件 dmooji(弹幕君),它让 YouTube 拥有了像其他弹幕网站一样的互动体验。看着屏幕上飞过的评论和吐槽,仿佛能和全世界的观众一起欢笑、感动、吐槽,那些弹幕不仅仅是文字,更是观众们在某个时刻留下的心情。但随着 dmooji 的开发者停止了维护,插件无法使用,用户的弹幕数据也随之丢失。那些在无数个夜晚留下的感触和笑点都被抹去,曾经与他人共享的回忆也随之消逝。这样的教训提醒我们,依赖于单一平台和维护团队的产品,总有脆弱的一天,可能我们珍视的东西就会悄然不再。
大约两年前,我偶然间了解到了一个去中心化的社交网络协议——nostr。当时我就萌生了一个想法:如果能基于这个协议做一款弹幕插件,那该有多好!然而,因为我主要从事后端开发,对前端几乎一窍不通,再加上拖延症的“加持”,这个想法一直被搁置。直到最近,我终于下定决心完成了这个项目,并将它命名为 danmakustr。
下载地址:https://chromewebstore.google.com/detail/mohbdimkkpjjibdfipfajpgpmegnglhb
源码地址:https://github.com/CodyTseng/danmakustr
最近弹幕墙:https://danmaku.nostr-relay.app/
danmakustr 有什么特点?
基于去中心化社交网络协议 nostr。你的弹幕会被发送并存储到你指定的服务器上,而非依赖单一服务器。即使插件未来不再维护,只要 nostr 网络仍然存在,插件就能继续正常使用!如果你非常珍视自己的弹幕,可以在本地运行 nostr-relay-tray 并将其添加到 relay 列表中。
danmakustr 目前已经在 YouTube 上实现了基本的弹幕功能,支持自定义弹幕的颜色和显示位置。未来还会支持一些弹幕互动功能,和支持更多的视频平台。
结语
在这个越来越注重个人表达和数据隐私的时代,danmakustr 带来了 YouTube 弹幕互动的新可能。它既保留了我们熟悉的乐趣,又为我们提供了前所未有的自由和控制权。如果你也对弹幕文化情有独钟,或者想要尝试一种全新的互动方式,那就赶紧体验 danmakustr 吧!让我们一起在弹幕的世界里畅所欲言,留下属于自己的印记。
-
@ 32e18276:5c68e245
2023-12-06 15:29:43I’m going to be on an ordinals panels as one of the people who is counter arguing the claim that they are good for bitcoin. I decided to brush up on the technicals on how inscriptions work. I am starting to see luke’s perspective on how it is exploiting a loophole in bitcoin’s anti-data-spam mechanisms.
Storing data in Bitcoin, the “standard” way
The standard way you add “data” to bitcoin is by calling the OP_RETURN opcode. Bitcoin devs noticed that people were storing data (like the bitcoin whitepaper) in the utxo set via large multisig transactions. The problem with this is that this set is unprunable and could grow over time. OP_RETURN outputs on the other-hand are provably prunable and don’t add to utxo bloat.
Here’s an excerpt from the march 2014 0.9.0 release notes that talks about this:
On OP_RETURN: There was been some confusion and misunderstanding in the community, regarding the OP_RETURN feature in 0.9 and data in the blockchain. This change is not an endorsement of storing data in the blockchain. The OP_RETURN change creates a provably-prunable output, to avoid data storage schemes – some of which were already deployed – that were storing arbitrary data such as images as forever-unspendable TX outputs, bloating bitcoin’s UTXO database. Storing arbitrary data in the blockchain is still a bad idea; it is less costly and far more efficient to store non-currency data elsewhere.
Much of the work on bitcoin core has been focused on making sure the system continues to function in a decentralized way for its intended purpose in the presence of people trying to abuse it for things like storing data. Bitcoin core has always discouraged this, as it is not designed for storage of images and data, it is meant for moving digital coins around in cyberspace.
To help incentive-align people to not do stupid things, OP_RETURN transactions were not made non-standard, so that they are relayable by peers and miners, but with the caveat:
- They can only push 40 bytes (later increased to 80,83, I’m guessing to support larger root merkle hashes since that is the only sane usecase for op_return)
Bitcoin also added an option called -datacarriersize which limits the total number of bytes from these outputs that you will relay or mine.
Why inscriptions are technically an exploit
Inscriptions get around the datacarriersize limit by disguising data as bitcoin script program data via OP_PUSH inside OP_IF blocks. Ordinals do not use OP_RETURN and are not subjected to datacarriersize limits, so noderunners and miners currently have limited control over the total size of this data that they wish to relay and include in blocks. Luke’s fork of bitcoin-core has some options to fight this spam, so hopefully we will see this in core sometime soon as well.
Inscriptions are also taking advantage of features in segwit v1 (witness discount) and v2/taproot (no arbitrary script size limit). Each of these features have interesting and well-justified reasons why they were introduced.
The purpose of the witness discount was to make it cheaper to spend many outputs which helps the reduction of the utxo set size. Inscriptions took advantage of this discount to store monke jpegs disguised as bitcoin scripts. Remember, bitcoin is not for storing data, so anytime bitcoin-devs accidentally make it cheap and easy to relay data then this should be viewed as an exploit. Expect it to be fixed, or at least provide tools to noderunners for fighting this spam.
Where do we go from here
The interesting part of this story is that people seem to attach value to images stored on the bitcoin blockchain, and they are willing to pay the fee to get it in the block, so non-ideologic miners and people who don’t care about the health and decentralization of bitcoin are happy to pay or collect the fee and move on.
Data should not get a discount, people should pay full price if they want to store data. They should just use op_return and hashes like opentimestamps or any other reasonable protocol storing data in bitcoin.
After going through this analysis I’ve come to the opinion that this is a pretty bad data-spam exploit and bitcoin devs should be working on solutions. Ideological devs like luke who actually care about the health and decentralization of the network are and I’m glad to see it.
-
@ 8fb140b4:f948000c
2023-11-21 21:37:48Embarking on the journey of operating your own Lightning node on the Bitcoin Layer 2 network is more than just a tech-savvy endeavor; it's a step into a realm of financial autonomy and cutting-edge innovation. By running a node, you become a vital part of a revolutionary movement that's reshaping how we think about money and digital transactions. This role not only offers a unique perspective on blockchain technology but also places you at the heart of a community dedicated to decentralization and network resilience. Beyond the technicalities, it's about embracing a new era of digital finance, where you contribute directly to the network's security, efficiency, and growth, all while gaining personal satisfaction and potentially lucrative rewards.
In essence, running your own Lightning node is a powerful way to engage with the forefront of blockchain technology, assert financial independence, and contribute to a more decentralized and efficient Bitcoin network. It's an adventure that offers both personal and communal benefits, from gaining in-depth tech knowledge to earning a place in the evolving landscape of cryptocurrency.
Running your own Lightning node for the Bitcoin Layer 2 network can be an empowering and beneficial endeavor. Here are 10 reasons why you might consider taking on this task:
-
Direct Contribution to Decentralization: Operating a node is a direct action towards decentralizing the Bitcoin network, crucial for its security and resistance to control or censorship by any single entity.
-
Financial Autonomy: Owning a node gives you complete control over your financial transactions on the network, free from reliance on third-party services, which can be subject to fees, restrictions, or outages.
-
Advanced Network Participation: As a node operator, you're not just a passive participant but an active player in shaping the network, influencing its efficiency and scalability through direct involvement.
-
Potential for Higher Revenue: With strategic management and optimal channel funding, your node can become a preferred route for transactions, potentially increasing the routing fees you can earn.
-
Cutting-Edge Technological Engagement: Running a node puts you at the forefront of blockchain and bitcoin technology, offering insights into future developments and innovations.
-
Strengthened Network Security: Each new node adds to the robustness of the Bitcoin network, making it more resilient against attacks and failures, thus contributing to the overall security of the ecosystem.
-
Personalized Fee Structures: You have the flexibility to set your own fee policies, which can balance earning potential with the service you provide to the network.
-
Empowerment Through Knowledge: The process of setting up and managing a node provides deep learning opportunities, empowering you with knowledge that can be applied in various areas of blockchain and fintech.
-
Boosting Transaction Capacity: By running a node, you help to increase the overall capacity of the Lightning Network, enabling more transactions to be processed quickly and at lower costs.
-
Community Leadership and Reputation: As an active node operator, you gain recognition within the Bitcoin community, which can lead to collaborative opportunities and a position of thought leadership in the space.
These reasons demonstrate the impactful and transformative nature of running a Lightning node, appealing to those who are deeply invested in the principles of bitcoin and wish to actively shape its future. Jump aboard, and embrace the journey toward full independence. 🐶🐾🫡🚀🚀🚀
-
-
@ de496884:72617b81
2023-11-20 13:54:02Hola nostriches. Hoy quiero hacer una publicación a modo de acercamiento al surgimiento de las categorías de género y feminismo. Así que si te interesa el tema haz un esfuerzo, quédate y lee hasta el final.
El «nuevo» feminismo surge en los años 60 en aquellos países desarrollados que acordaron el reconocimiento a los derechos humanos contenidos en la declaración respectiva de la ONU. Entonces, como extensión a dicho reconocimiento es que se gesta el movimiento feminista. A partir de entonces, se vuelve a plantear la relación entre naturaleza y cultura y se llega a la conclusión de que las diferencias sociales van más allá de las diferencias biológicas, lo cual tiene que ver con que hasta la satisfacción de las necesidades elementales como son la alimentación, la vivienda o el vestuario, están condicionadas por construcciones sociales.
Pues resulta que una de las primeras propuestas identificó la subordinación femenina producto de una organización patriarcal, tomando la categoría patriarcado de Max Weber. Es así como la visión de patriarcado se extendió al discurso político y académico. Sin embargo, no existía información acerca del desarrollo histórico de dicha categoría, sistematización, variaciones, etc., debido a que era algo que recién se percibía en sociedad.
Sin embargo, la misma categoría de patriarcado junto a la de relaciones de poder para explicar fenómenos sociales contemporáneos, constituye uno de los principales aportes del feminismo. Es así como han logrado primero visibilizar y luego deconstruir y desmontar una serie de patrones existentes en la cultura que hacían a la mujer subordinarse al hombre, y que estaban presentes en el sistema sexo/género.
Imagen relativa a la lucha contra el patriarcado
Hasta ese momento, en las investigaciones de corte sociológico se podía observar un androcentrismo excesivo al dar cuenta de que el discurso científico giraba en torno al hombre como sujeto y objeto de la investigación. Incluso para muchos positivistas como el mismo Weber, los problemas relativos a las mujeres quedaban en un segundo plano y eran achacados a una supuesta pasividad en el ámbito doméstico-familiar. Dicha pasividad partía de la supuesta inferioridad biológica del género femenino.
El patriarcado entonces era una categoría vacía en sí misma, sin valor explicativo. Desde el punto de vista político pudo ser útil para la movilización pero no resistió la polémica de los críticos del feminismo ni problematizó los conflictos a ser resueltos. Pero por otro lado, un grupo de mujeres -académicas principalmente- se puso manos a la obra en una tarea más pequeña pero con mayores resultados a la larga. Se propusieron generar conocimientos sobre las condiciones de vida de la mujer, buscar en el pasado y el presente los aportes de las mujeres a la sociedad, hacerlas visibles en la historia. Es así como surgen centros académicos, ONG, proyectos, centros de estudios sobre la mujer, etc.
Convendría distinguir entonces dos posturas que acompañaron a la investigación sobre las mujeres: uno que toma como objeto de estudio a la mujer; condiciones de vida, trabajo, cultura, y otra que privilegia a la sociedad como generadora de la subordinación de las mujeres. Mientras la primera perspectiva generaba conocimiento sobre las mujeres en el estudio de las relaciones mujer-hombre y mujer-mujer, la segunda tenía una visión más holística ya que planteaba que hay que estudiar la sociedad ya que la subordinación de las mujeres es producto de la organización de esta, y que no se avanzará solamente estudiando a las mujeres, pues el estudio debe ser más amplio y en diferentes niveles, ámbitos y tiempos.
Es en esta búsqueda donde nace y se desarrolla el concepto de género como categoría social. Es así que los sistemas de género/sexo fueron entendidos como conjuntos de prácticas, símbolos, representaciones, normas y valores sociales que las sociedades construyen a partir de la diferencia anatomofisiológica y que dotan de sentido a los impulsos sexuales, la reproducción y en general a las relaciones de las personas. Por tanto, este sistema pasó a ser el objeto de estudio para comprender la subordinación de la mujer al hombre. Al ser el reconocimiento de una dimensión de la desigualdad social hasta entonces desconocida, se considera la ruptura epistemológica más importante de la segunda mitad del siglo pasado.
Imagen representativa del binarismo de género
Hay que decir que los fenómenos sociales se definen por la relación que guardan entre sí. Es así que la contextualización adquiere gran importancia. Varones y hembras tenemos la capacidad de producir con el cuerpo, pero solo los cuerpos de las hembras pueden gestar y por tanto asegurar la especie humana. Todo grupo humano que pretenda sobrevivir debe asegurarse cierto número de hembras que lo hagan posible. De ahí un poder particular del cuerpo de las hembras que además es económicamente útil. Dicho poder no es en tanto entidad biológica, sino que es la sociedad la que le otorga este poder. En este punto es importante preguntarnos históricamente ¿quiénes han controlado la capacidad reproductiva de las mujeres?, ¿quiénes han tenido la preferencia en el acceso sexual? Para asegurar un control efectivo sobre la reproducción es necesario asegurar el acceso a la sexualidad.
Ello también lleva a dirigir el trabajo que hacen porque de lo contrario, las mujeres pudieran tener espacio para representar una amenaza al dominio de los hombres. Es importante atender a las etapas del desarrollo de las mujeres, que permitirá ver cómo se moldean para aceptar la desigualdad y las jerarquías según el género en las distintas sociedades y culturas.
Otro contexto a delimitar es el ámbito doméstico donde históricamente ha estado ubicada la subordinación femenina. Se ha puesto al descubierto que en mujeres que comparten la misma posición de clase y raza, la condición femenina se redefine a lo largo de la vida y que algunas mujeres gozan de poder sobre otras aún en contextos de alta dominación masculina, donde se les inviste de autoridad, creando el sistema zonas de incertidumbre que las divide como género e impide alianzas y se legitima la dominación. Foucault decía que «el poder se ejerce, no se posee», siempre está en peligro de perderse y no basta con normas, leyes, amenazas o castigos. De ahí que los espacios de subordinación sean también espacios de poder de las mujeres. Es en estos espacios donde aparece la inseguridad, la tensión, la confrontación y por ejemplo, las mujeres pueden reclamar la anticoncepción.
Para terminar, es importante tener en cuenta que el género es una forma de desigualdad social que siempre está articulado con otras formas de desigualdad ya sea clase, raza, grupo etario, etc. Hay que pensar la dominación masculina con un comienzo vago en el tiempo, pero que permite desligar la subordinación de las mujeres de la evolución «natural» de la humanidad y entenderla como un proceso histórico. En ese sentido es necesario destacar que, respecto a la raza, en sociedades plurales hay que atender al contexto étnico-cultural ya que en dependencia de las relaciones entre personas de razas distintas, estarán condicionadas las relaciones entre los géneros.
Imagen de mujeres de distintas razas
Por otro lado, si bien es sabido que históricamente el sistema de género social imperante ha contribuido a invisibilizar a la mujer, asociar necesariamente dicha categoría únicamente a ella, lo que hace es nuevamente recrear el absolutismo histórico que tanto daño ha hecho, ahora como lo antagónico al hombre. En la construcción social participan todos los individuos presentes en el sistema género.
Hasta aquí la publicación de hoy, de la cual aun se puede ahondar mucho más, sobre todo en lo referido al origen de la dominación o de la jerarquización del binomio «hombre/mujer» desde un punto de vista antropológico, pero eso quedará pendiente para otro momento. ¡Así que hasta la próxima!, ¡nos vemos en Nostr!
........................................
English version
Hello nostriches. Today I want to make a post by way of an approach to the emergence of the categories of gender and feminism. So if you are interested in the topic make an effort, stay and read to the end.
The "new" feminism emerged in the 60's in those developed countries that agreed to recognize the human rights contained in the respective UN declaration. Then, as an extension of that recognition, the feminist movement was born. From then on, the relationship between nature and culture was raised again and the conclusion was reached that social differences go beyond biological differences, which has to do with the fact that even the satisfaction of elementary needs such as food, housing or clothing are conditioned by social constructions.
It turns out that one of the first proposals identified female subordination as a product of a patriarchal organization, taking Max Weber's category of patriarchy. This is how the vision of patriarchy was extended to political and academic discourse. However, there was no information about the historical development of this category, systematization, variations, etc., because it was something that was only recently perceived in society.
However, the same category of patriarchy, together with that of power relations to explain contemporary social phenomena, constitutes one of the main contributions of feminism. This is how they have first made visible and then deconstructed and dismantled a series of existing patterns in the culture that made women subordinate to men, and that were present in the sex/gender system.
Image relating to the fight against patriarchy
Up to that time, in sociological research, an excessive androcentrism could be observed as scientific discourse revolved around men as the subject and object of research. Even for many positivists such as Weber himself, the problems related to women remained in the background and were blamed on a supposed passivity in the domestic-family sphere. This passivity was based on the supposed biological inferiority of the female gender.
Patriarchy was then an empty category in itself, with no explanatory value. From the political point of view, it could be useful for mobilization, but it did not resist the polemic of feminism's critics, nor did it problematize the conflicts to be resolved. But on the other hand, a group of women - mainly academics - set to work on a smaller task but with greater results in the long run. They set out to generate knowledge about women's living conditions, to search in the past and present for women's contributions to society, to make them visible in history. This is how academic centers, NGOs, projects, women's studies centers, etc., came into being.
It would be convenient to distinguish then two postures that accompanied the research on women: one that takes women as the object of study; living conditions, work, culture, and the other that privileges society as the generator of women's subordination. While the first perspective generated knowledge about women in the study of woman-man and woman-woman relations, the second had a more holistic vision, since it proposed that society must be studied, since the subordination of women is a product of its organization, and that progress will not be made only by studying women, since the study must be broader and at different levels, spheres and times.
It is in this search that the concept of gender as a social category was born and developed. Thus, gender/sex systems were understood as a set of practices, symbols, representations, norms and social values that societies construct on the basis of anatomophysiological differences and that give meaning to sexual impulses, reproduction and, in general, to people's relationships. Therefore, this system became the object of study to understand the subordination of women to men. As the recognition of a hitherto unknown dimension of social inequality, it is considered the most important epistemological breakthrough of the second half of the last century.
Representative image of gender binarism
It must be said that social phenomena are defined by their relationship with each other. Thus, contextualization acquires great importance. Males and females have the capacity to produce with their bodies, but only the bodies of females can gestate and therefore ensure the human species. Any human group that intends to survive must ensure a certain number of females to make it possible. Hence a particular power of the female body, which is also economically useful. This power is not as a biological entity, but it is society that gives it this power. At this point it is important to ask ourselves historically, who has controlled the reproductive capacity of women, who has had the preference in sexual access? To ensure effective control over reproduction, it is necessary to ensure access to sexuality.
Allegorical image of pregnancy
This also leads to directing the work they do because otherwise, women may have room to pose a threat to men's dominance. It is important to pay attention to the stages of women's development, which will allow us to see how they are shaped to accept inequality and gender hierarchies in different societies and cultures.
Another context to delimit is the domestic sphere where female subordination has historically been located. It has been discovered that in women who share the same class and race position, the feminine condition is redefined throughout life and that some women enjoy power over others even in contexts of high male domination, where they are invested with authority, creating the system of uncertainty zones that divide them as a gender and prevent alliances and legitimize domination. Foucault said that "power is exercised, not possessed", it is always in danger of being lost and norms, laws, threats or punishments are not enough. Hence, the spaces of subordination are also spaces of women's power. It is in these spaces where insecurity, tension, confrontation appear and where, for example, women can demand contraception.
To conclude, it is important to keep in mind that gender is a form of social inequality that is always articulated with other forms of inequality, be it class, race, age group, etc. It is necessary to think of male domination with a vague beginning in time, but which allows us to separate the subordination of women from the "natural" evolution of humanity and to understand it as a historical process. In this sense, it is necessary to emphasize that, with respect to race, in plural societies it is necessary to pay attention to the ethno-cultural context since, depending on the relations between people of different races, the relations between genders will be conditioned.
Image of women of different races
On the other hand, although it is known that historically the prevailing social gender system has contributed to make women invisible, to necessarily associate this category only to women is to recreate the historical absolutism that has done so much damage, this time as antagonistic to men. All individuals present in the gender system participate in the social construction.
So much for today's publication, of which we can still go much deeper, especially with regard to the origin of domination or the hierarchization of the binomial "man/woman" from an anthropological point of view, but that will be left for another time. So until next time, see you in Nostr!
Créditos | Credits
Bibliografía consultada | Consulted bibliography:
-
Barbieri, T. (1993). Sobre la categoría género. Una introducción teórico-metodológica. Debates en Sociología. (18). 1-19. https://doi.org/10.18800/debatesensociologia.199301.006
-
Echevarría, D. (2020). Desigualdades de género e interseccionalidad. Análisis del contexto cubano 2008-2018. Facultad Latinoamericana de Ciencias Sociales (Programa-Cuba). https://www.clacso.org.ar/libreria-latinoamericana-cm/libro_detalle_resultado.php?id_libro=2346&campo=cm&texto=248
Traducción | Translation:
DeepL
-
-
@ 6c2d68ba:846525ec
2024-08-08 21:15:25Will man der Bundeszentrale für politische Bildung glauben, so handelt es sich bei Propaganda um den Versuch der gezielten Beeinflussung des Denkens, Handelns wie auch Fühlens von Menschen. Charakteristisch für Propaganda ist, dass sie darauf verzichtet die verschiedenen Seiten einer Thematik darzulegen, sondern gezielt Meinung mit (Fehl)-Information vermischt. Wer Propaganda betreibt, strebt nicht danach zu diskutieren oder die Öffentlichkeit gar mit Argumenten zu überzeugen, sondern greift zu verschiedensten Manipulationstechniken, die die Emotionen und das Verhalten der Öffentlichkeit beeinflussen. Propaganda nimmt dem Menschen (eigenständiges) Denken ab und gibt ihm stattdessen das Gefühl, mit der übernommenen Meinung goldrichtig zu liegen. Hier zeigt sich auch der wesentliche Unterschied zum Journalismus: Journalismus strebt nach Aufklärung, indem alle verfügbaren Fakten und Hintergründe dargelegt werden und der Empfänger selbst darüber entscheiden darf, was er für richtig und was er für falsch hält [1].
Zwar verbinden wir den Begriff Propaganda heutzutage mit autoritären und totalitären Staaten, wo diese auch zweifelsfrei Anwendung findet, doch kommen Propagandatechniken auch im Westen zum Einsatz, wenn auch in einer auf die demokratische Herrschaftsform zugeschnittene Art und Weise. Wie die Geschichte gezeigt hat - hier sind die Werke von Edward Bernays ganz besonders relevant [2] - wurde Öffentlichkeitsarbeit, sprich Public Relations (PR), basierend auf den Erkenntnissen der Propagandaforschung verfeinert, über welche die öffentliche Wahrnehmung von Personen, Konzernen und Regierungen beeinflusst wird. In Summe lässt sich daraus ableiten, dass auch Propaganda in unseren Breitengraden Tradition hat.
Nun halte ich es in Zeiten von (leider) wiederkehrenden heißen Konflikten in Europa besonders wichtig sich über existierende Manipulationstechniken wie auch gezielter Meinungsmache in (Massen)-medien bewusst zu sein wie auch erscheinenden Artikeln, Posts, Videos und ganz besonders Schlagzeilen mit einem gewissen Grad an Achtsamkeit zu begegnen, um nicht umgehend Opfer von Manipulation zu werden. Denn wie schon von der bereits erwähnten Bundeszentrale für politische Bildung erwähnt wurde, kann nur jener sich gegen den Einfluss von Propaganda wehren, der diese als solche erkennt. Dadurch motiviert nehme ich heute die Prinzipien der Kriegspropaganda ins Fadenkreuz.
„Auf die Dauer vermag auch die frechste und bestorganisierte Propaganda nichts gegen die Wahrheit.“ ―Albert Schweitzer
Die Prinzipien der Kriegspropaganda
Unter dem Eindruck des Ersten Weltkriegs schrieb Arthur Ponsonby, britischer Adeliger & Staatsbeamter, 1928 das Buch "Lüge in Kriegszeiten", in welchem er die Mechanismen der damaligen Kriegspropaganda untersuchte. Er steht übrigens im Verdacht Urvater des berühmten Zitats "das erste Opfer im Krieg ist die Wahrheit" zu sein [3]. In diesem Werk schildert Ponsonby 20 Aspekte, die wiederum später von der Historikerin Anne Morelli im Jahr 2001 zu den zehn Prinzipien der Kriegspropaganda zusammengefasst wurden. Wie sie selbst betonte geht es bei diesen Prinzipien nicht darum herauszufinden, wer lügt und wer die Wahrheit sagt, wer das glaubt, was er sagt, sondern Mittels dieser Prinzipien die verbreitete Propaganda zu veranschaulichen und ihr Funktionieren zu beschreiben (Seite 6, [4]). Nachdem ich mich selbst mit diesen Prinzipien beschäftigt hatte, wurde mir mit jeder einzelnen Gedankenrunde immer klarer, wie die von Anne Morelli beschriebenen Prinzipien als wie eine Art Leitfaden verwendet werden, um Pressemeldungen, Argumente und Schlagzeilen in Sozialen Medien so zu formulieren, dass unabhängig vom Geschehnis stets eine unterbewusste Botschaft mitschwingt, so dass der gewünschte Effekt der Manipulation maximiert wird.
Nun könnte man nach Durchsicht der größten Tagesblätter des Deutschsprachigen Raums etliche Beispiele für jeden einzelnen der in Kürze vorgestellten Prinzipien präsentieren, doch habe ich in Anbetracht des Themas bewusst Abstand davon genommen, um nicht gewisse Journalisten - oder kriegstreibende Propagandisten wie ich sie nenne - samt Klarnamen an den Pranger zu stellen. Wie Anne Morelli, sehe ich den größtmöglichen Mehrwert darin, die Mechanik offenzulegen, um die Leserschaft für dieses Thema zu sensibilisieren.
Wir wollen keinen Krieg!
Stets wird versichert, dass man den stattfindenden Krieg keines Falles wolle. In einer demokratischen Gesellschaft ist Krieg ein ungebetener Gast, weswegen Bevölkerungen fast ausnahmslos jedes Mal in die Kriegsbereitschaft hineingelockt werden müssen, siehe Brutkastenlüge im Zusammenhang mit dem Irakkrieg. Nun kann man sehr oft beobachten, wie Staatsführer stets in aller Inbrunst gegen den aktuellen oder einen eventuell bevorstehenden Krieg poltern. Wenn jedoch alle Personen an den entscheidenden Machthebeln so sehr gegen Kriege sind, wie können Kriege dann überhaupt ausbrechen?
Der Gegner ist allein für den Krieg verantwortlich!
Der zugrundeliegenden Logik nach zeigt jeweils die eine Kriegspartei auf die andere und schiebt dabei die Schuld für den stattfindenden Krieg der anderen Seite zu. Selbst hat man natürlich keine provozierenden Schritte gesetzt, wie etwa das Stationieren von Raketensystemen, das Verschieben von Machtblöcken oder Ähnliches. Statt zum Mittel der Diplomatie zu greifen muss der Konflikt jetzt weiter angeheizt und der Krieg fortgeführt werden, denn schließlich muss dieser Krieg jetzt geführt werden, damit (ewiger) Frieden herrschen kann - siehe "Krieg ist Frieden" nach George Orwell. Darüber hinaus kann der Konflikt auch deshalb nicht beendet werden, weil der Feind sonst "unsere Werte" zerstört, "uns" die Freiheit nimmt oder gar ein Genozid "an unserem Volk" stattfindet.
Der Führer des feindlichen Lagers wird dämonisiert
Dieses Prinzip folgt der Logik des Reduzierens eines ganzen Landes auf eine an der Spitze sitzenden Person, also dem Zuschneiden auf Putin, Obama, Scholz, etc. Diese Person repräsentiert quasi einen fleischgewordenen Dämon, der die Macht über das Feindesland errungen hat und nun in Abwesenheit von geistiger Gesundheit einen Konflikt vom Zaun bricht. Morelli argumentiert dazu: "Man kann eine Gruppe von Menschen nicht insgesamt hassen, nicht einmal als Feinde. Es ist daher wirkungsvoller, den Hass auf die feindliche Führungspersönlichkeit zu richten. Der Gegner bekommt so ein Gesicht und dieses Gesicht wird natürlich Gegenstand des Hasses werden."
Wir verteidigen ein edles Ziel und keine besonderen Interessen!
Der Fokus auf moralische und legitime Werte spielt diesem Prinzip nach deshalb eine besondere Rolle, weil es dazu dient die wirtschaftlichen und geopolitischen Ziele der eignen Seite zu verdecken, was auf das Stärken der Zustimmung der eigenen Bevölkerung schielt, da der Konflikt zu einem gewissen Grad nur durch Zustimmung eben dieser Bevölkerung geführt werden kann. So hatte Antonio Gramsci dargelegt wie sich die Ziele des Ersten Weltkriegs in drei Punkte zusammenfassen lassen: den Militarismus zu vernichten, die kleinen Staaten (wie etwa Belgien) zu verteidigen und die Welt für "die Demokratie" vorzubereiten. Letzteres Argument fand sich auch in den Konflikten des aktuellen Jahrhunderts in ähnlicher Form als "Spreading Democracy" oder "Befreiung des Iraks" wieder. Ergänzend könnte man zu diesem Prinzip sagen, dass ein Unterton von "der Feind ist ein blutrünstiges Monster aus einer barbarischen Gesellschaft" mitschwingt.
Der Feind begeht wissentlich Grausamkeiten, wenn wir Fehler machen, geschieht dies unbeabsichtigt
Erzählungen über Gräueltaten des Feindes stellen ein wesentliches Element von Kriegspropaganda dar. Zwar sind Grausamkeiten zweifelsohne integraler Bestandteil eines jeden Krieges, und das auf beiden Seiten, jedoch ist die gegensätzliche Darstellung der eigenen "humanitären" Armee, die selbstverständlich von der Bevölkerung geliebt wird, und der feindlichen Armee, die als einzige Kriegspartei Grausamkeiten begeht, altbekannte Propaganda. Üblicherweise begnügt man sich nicht mit den tatsächlich auftretenden Verbrechen, im Gegenteil, man kann in vergangenen Konflikten wiederholt beobachten wie Verbrechen gegen die Menschlichkeit am Schreibtisch erfunden werden, um den Feind als die Wiederkehr Adolf Hitlers erscheinen zu lassen.
Der Feind benutzt unerlaubte Waffen
In gewisser Weise ergänzt dieses Prinzip das vorangegangene und das nämlich um den Aspekt den Krieg selbst auf ritterliche Art und Weise zu führen, als wäre Krieg ein vollends definiertes Brettspiel, während der Feind geächtete Waffen einsetzt - zu jenen man selbst natürlich niemals greifen würde. Die Geschichte zeigt, dass hier oft der Gegenseite vorgeworfen wird, was die eigene Armee-(führung) bereits lange vorbereitet oder gar eingesetzt hat. Ein älteres Beispiel wäre die Verwendung von Giftgas im Ersten Weltkrieg, während Streumunition wie auch mit Uran angereicherte Munition ein trauriges Kapitel der vergangenen Monate ist.
Wir erleiden geringe Verluste, die Verluste des Feindes sind erheblich
Zitat aus dem Buch von Morelli: "Von seltenen Ausnahmen abgesehen, schließen Menschen sich eher den siegreichen Anliegen an. Im Falle des Krieges hängt die Präferenz der öffentlichen Meinung sehr stark von den augenscheinlichen Ergebnissen des Konflikts ab. Wenn die Ergebnisse nicht gut sind, muss die Propaganda unsere Verluste verschleiern und die des Feindes übertreiben."
Anerkannte Kulturträger und Wissenschafter unterstützen unser Anliegen
Ein unterschätztes Mittel der Propaganda ist das Einbeziehen von Personen des öffentlichen Lebens, favorisiert jene zu denen möglichst große Teile der Bevölkerung ein Vertrauensverhältnis entwickelt haben oder Personen mit einer gewissen "moralischen Autorität", wie etwa geistliche Führer. Darüber hinaus ließen sich in der Vergangenheit - wie auch heute - Künstler und Medienschaffende dazu instrumentalisieren Filme, Dokumentationen und Karikaturen über den Feind zu erstellen wie auch zu verbreiten. Man rufe sich in Erinnerung, dass man nicht ohne Grund von der Heimatfront spricht. In einer halbwegs von Demokratie geprägten Gesellschaft entscheidet das Wahlvolk wie lange ein Konflikt noch geführt werden kann bzw. wie stabil die kriegsführende Regierung im Sattel sitzt.
Unser Anliegen hat etwas Heiliges
Dieses Prinzip mag bei erster Betrachtung an die Kreuzzüge erinnern, bei jenen "der Wille Gottes" in gewisser Weise im Mittelpunkt stand. Ein in meinen Augen wichtiges Element bei diesem Aspekt ist die versteckte Nachricht des Kampfes Gut gegen Böse. Wir, die Guten, kämpfen gegen das Böse, den Feind, und treiben diesen Konflikt nun gewaltsam voran, um die Welt von dem Bösen zu befreien, die Welt also einer Heilung zu unterziehen. Neben dem religiös angehauchten Argument scheint dieses Propagandaprinzip um das Schlagwort "Demokratie" bereichert geworden zu sein. Wie in meinen Augen zurecht aufgezeigt wird, sprach auch George Bush von der "Achse des Bösen" wie auch der Pflicht dem Irak Demokratie zu bringen, also ein Gut, dass gottesgleiche Züge zu haben scheint. Sprachliche Ausschmückungen wie "Gott ist mit uns" tun in Botschaften, die sich nach diesem Prinzip richten, ihr übriges.
Wer unsere Propaganda in Zweifel zieht, arbeitet für den Feind und ist damit ein Verräter
Das zehnte und somit letzte Prinzip kann mit den vorangegangenen Prinzipien kombiniert werden. In manchen Situationen dient dieses Prinzip jedoch auch als Leitmotiv im Umgang mit kritischen Stimmen aus der Heimatfront. Wer auch immer Meldungen, Schlagzeilen oder gar Argumente infrage stellt, ist automatisch ein Kollaborateur des Feindes. Anhand dieser polarisierten Betrachtungsweise des "entweder bist du für uns oder gegen uns" muss umgehend Farbe bekannt werden. Durch diese Eliminierung einer abgewogenen Betrachtung von komplexen Ereignissen wird es also unmöglich gemacht, eine abweichende Meinung zu entwickeln, ohne einen regelrechten Lynchprozess am Hals zu haben. Man könnte dies auch als das Ende des Meinungspluralismus interpretieren, wo jegliche Opposition zum Schweigen verurteilt wird und zur Not diffamiert wie auch diskriminiert wird.
(Weitere) Methoden der Kriegspropaganda
Wie in [6] präsentiert, können Propagandisten auf eine erstaunlich große Bandbreite von Manipulationsmethoden zurückgreifen. In meinen Augen lohnt sich ein kurzer Blick darauf. Ein wesentlicher Punkt, den es meiner Meinung nach zu beachten gilt, ist die Tatsache, dass mit dem gezielten Einsatz von (Kriegs)-Propaganda meist lange vor dem ersten Schusswechsel begonnen wird und auch nach Beendigung des Konfliktes Propaganda einen wichtigen Teil der militärischen Strategie darstellt.
Die Rolle von Angst
Das Zeichnen eines immanenten Bedrohungsszenarios, welches besonders über die emotionale Schiene wahrgenommen wird, stimmt Menschen am ehesten um die Notwendigkeit eines Militäreinsatzes zu befürworten. Dabei spielt es meiner Ansicht nach gar keine so große Rolle, ob diese Bedrohung real existiert oder nicht, ausschlaggebend ist die gefühlte Wahrnehmung der Bevölkerung. Bestehende oder induzierte Angst lassen sich durch geschicktes Beeinflussen schnell in Wut wandeln und am Ende des Prozesses in einen flammenden Hass auf den vermeintlichen Feind. Aus diesem Grund wird oft ein Zustand der permanent gefühlten Bedrohung geschaffen, sodass in den Köpfen eine gefühlte Gefahr für Laib und Leben so oft wie möglich präsent ist. Dieser Prozess wird durch ständiges Wiederholen der Botschaft verstärkt, bis es sich tief im Unterbewusstsein der Bevölkerung eingenistet hat.
Zensur
Zensur - das gezielte Unterdrücken oder Weglassen von Informationen zu einem Sachverhalt, ist schon lange fixer Bestandteil von Propaganda. Bestimmte Sichtweisen können in der Abwesenheit von Gegenargumenten oder gar Gegenbeweisen besonders gut verfestigt werden. Hierzu genügt es aus Sicht des Staatsapparats nicht nur Beiträge zu löschen oder Meinungen zu unterdrücken, nein, damit dies möglich ist, muss flächendeckende wie auch umfängliche Überwachung stattfinden, damit in den Augen des Unterdrückers problematische Informationen schnellstmöglich aus dem Verkehr gezogen werden können.
Von Zensur betroffen sind Druckerzeugnisse wie etwa Zeitungen und Bücher, aber auch Ton und Bildproduktionen. Auf digitaler Ebene können Webseiten, Blogs, Content Creatoren oder gar ganze Online Communities hiervon betroffen sein. Im Kontext eines Krieges ist es für die heimische Konfliktpartei von enormer Bedeutung Zensur anzuwenden, um dem Feind keinerlei geheime Informationen zukommen zu lassen - zum Beispiel über Waffen, Truppenbewegungen oder geplante Manöver der eigenen Einheiten. Ein weiteres Anliegen geht in die Richtung wie der Krieg in der Öffentlichkeit dargestellt wird. So kann ohne Anwendung von Zensur das Vertrauen in die Politik schwinden und somit schlussendlich die Zustimmung zum Fortführen der kriegerischen Handlungen schwinden. Dies kann beispielsweise passieren, sobald die Bevölkerung von Niederlagen, Fehlschlägen, dem von der eigenen Armee ausgelösten Leid oder gar Kriegsverbrechen der eigenen Reihen Wind bekommt. Daher ist es im Interesse des Zensors solche Informationen geheim zu halten. Während die direkte Zensur in der westlichen Welt weitestgehend abgeschafft wurde, findet indirekte Zensur nach wie vor Anwendung. Hierbei ist die Zugangskontrolle zu bestimmten Informationen gemeint. Es existieren quasi Torwächter, die darüber entscheiden welcher Journalist welche Informationen gefüttert bekommt. Darüber hinaus können Informationen - etwa über bestimmte Kriegsverbrechen - bewusst vorenthalten werden oder Journalisten dürfen bestimmte Orte erst gar nicht betreten. Somit bleibt vielen Journalisten wie auch Berichterstattern oft nichts anderes übrig, als die Meldungen der Militärführung zu übernehmen.
Eine dritte Form von Zensur, die in meinen Augen oftmals gar nicht erst bedacht wird, ist die Selbstzensur von Berichterstattern. Obwohl es in vielen Fällen keine politischen oder militärischen Zensurvorschriften gibt, unterschlagen Berichterstatter bestimmte Informationen. Erklärungen hierfür können Motivationen wirtschaftlicher Natur eines Mediums, direkte Bestechung oder Begünstigung sein. Nicht zu unterschätzen ist die aufkommende Angst eines Journalisten sich durch das Vertreten von unpopulären Ansichten Karrierechancen zu verbauen. Zu dieser Gefühlslage kommt hinzu, dass Journalisten oftmals wegen ihrer eigenen Weltanschauung und dem damit verbundenen Wertekompass die Realität nur einseitig wahrnehmen.
Die Verzerrung der Sprache
Die menschliche Sprache verwendet Bilder um Botschaften zu transportieren. Dabei ist jedes Hauptwort wie ein Paket mit einem gewissen bildlichen Inhalt zu verstehen. Zudem lassen sich durch geschickte Auswahl von Worten Stimmungen hervorrufen oder unterdrücken. In der Kriegspropaganda unterscheidet man hier zwischen:
- Black Words - Diese dienen zum Erschaffen eines klaren Feindbildes, welche beim Empfänger Unbehagen und Angst wecken können. Besonders in Kriegszeiten greifen Politiker in ihren Ansprachen auf Begriffe wie Diktator, Hass, Waffen, Terrorismus, Unterdrückung, Regime, Tyrannei, das Böse und so weiter zurück.
- White Words - Hierbei handelt es sich um sprachliche Bilder, die mit positiven Gefühlen verbunden sind und dienen, strategisch in Reden platziert, der moralischen Rechtfertigung des Krieges. Hierzu zählen Begriffe wie Demokratie, Freiheit, Gerechtigkeit, Sicherheit, Frieden, Familie, Nation, Humanität, Vaterland, etc.
- Sprachliche Schönfärberei - Gezielt werden Formulierungen verwendet, die einen beschönigenden Effekt haben wie beispielsweise "Kollateralschaden" statt "Getötete oder verletzte Zivilisten" oder "Luftschlag" statt "Bombardement".
Mitläuferfang
Es liegt wohl in der Natur des Menschen lieber auf der Gewinner als auf der Verliererseite stehen zu wollen, weswegen wir Menschen uns tendenziell lieber der Mehrheit anschließen. Mehrheiten versprechen Erfolg, denn allzu gutgläubig glauben wir Mehrheiten würden sich niemals täuschen. Die Strategie des Mitläuferfangs nutzt diese menschliche Anlage aus, indem die kundgetane Meinung als die Meinung der Mehrheit verkauft wird. Hierzu werden öfters auch Bilder eingesetzt, die den Eindruck erwecken, eine große Masse würde bereits dieser propagierten Meinung folgen.
Ästhetisierung
Unter dem Begriff Ästhetisierung versteht man eine verschönerte Darstellung einer Sache. Etwa wird durch eine ästhetische Darstellung des Krieges versucht dem Krieg den Schrecken zu nehmen, wodurch abgezielt wird den Krieg dadurch leichter akzeptieren zu können. Fotos und Filme, die den Krieg dokumentieren sollen, werden bewusst so aufgenommen bzw. ausgewählt, dass sie beim Betrachter eher Faszination als Abschreckung auslösen. All das sorgt dafür, dass das Bild schön und ansprechend empfunden wird, und den Betrachter die eigentlich hässliche Kriegsrealität vergessen lässt.
Militainment
Dieser Begriff verbindet "Militär" und "Entertainment" und besonders jüngere Leser sollten schnell erkennen was hier gemeint ist. Hingedeutet wird hier auf die aktive Zusammenarbeit zwischen Militär und Medienunternehmen bei der Produktion von Kriegsfilmen, -serien, -dokumentationen oder Computerkriegsspielen. Beide Seiten ziehen Nutzen daraus: Das Militär stellt die Ausrüstung zur Verfügung, die für eine Produktion nötig ist. Als Gegenleistung verpflichten sich die Medienmacher, den Krieg in der vom Militär gewünschten Weise darzustellen. Letztlich entscheidet das Militär darüber, was gezeigt werden darf und was nicht. So wird der Krieg zum Schauplatz von Heldengeschichten, in denen das Militär ehrenvoll erscheint und andere Möglichkeiten als Krieg zur Lösung von Konflikten ausgeblendet werden. Diese Darstellungsweise trägt dazu bei, dass das Ansehen des Militärs und die gesellschaftliche Akzeptanz von Kriegen steigen.
Auch die Computer- und Softwareindustrie wird durch das Militär unterstützt. Ähnlich wie bei Kriegsfilmen ist ein realistisches Erscheinungsbild für Computerkriegsspiele sehr wichtig. Doch wie kommt man an alle Taktiken, Uniformen, Sounds, Einsatzpapiere oder gar Stimmen und Karten heran? – Man braucht die Army. Da die sich allerdings aussucht, wer welches Material bekommt, kann sie von einem Einspruchsrecht Gebrauch machen. Das ist nicht unstatthaft, wer würde schließlich ein Projekt finanzieren oder unterstützen, das das eigene Werbebild beschädigt?
Fazit
Wie im Lauf des Posts immer deutlicher wird, ist die Bandbreite an Methoden, aus der Propagandisten schöpfen können, beträchtlich. Darüber hinaus stammen diese Techniken nicht aus dem letzten Quartal, sondern hatten jahrhundertelang Zeit, um verfeinert zu werden. Ich hoffe mit diesem Post zur Stärkung der Achtsamkeit im Bereich der Propaganda wie auch der Sensibilisierung im Hinblick auf den Einsatz von Propagandatechniken im Alltag beizutragen. Nur wer Propaganda wie auch Manipulationsversuche als solche erkennt, wird in der Lage sein sich dessen zu erwehren. Das Schlusswort möchte ich nun einer Person überlassen, die mich schon vor Jahren dazu inspiriert hatte mich mit dieser unbequemen Thematik zu beschäftigen:
"Nearly every war that has started in the past 50 years, has been the result of media lies. The media could have stopped it, if they hadn't reprinted government propaganda but what does that mean? Well, that means basically populations don't like wars and populations have to be fooled into wars. populations don't willingly and with open eyes go into a war So, if we have a good media environment then we will also have a peaceful environment. Our number one enemy is ignorance." - Julian Assange
Quellen
- https://www.bpb.de/themen/medien-journalismus/krieg-in-den-medien/130697/was-ist-propaganda
- https://www.goodreads.com/book/show/493212.Propaganda
- https://weltwoche.ch/daily/prinzipien-der-kriegspropaganda-von-arthur-ponsonby
- https://www.morawa.at/detail/ISBN-9783866744158/Morelli-Anne/Die-Prinzipien-der-Kriegspropaganda?CSPCHD=002000000000JAZLG7CSVpoEmIWvrDniZIp7zJA2Cmz9CJ_rwt
- https://de.wikipedia.org/wiki/Die_Prinzipien_der_Kriegspropaganda
- https://www.bpb.de/themen/medien-journalismus/krieg-in-den-medien/130699/methoden-der-kriegspropaganda/
Bücher zum Thema
- Edward Bernays - Propaganda
- Anne Morelli - Die Prinzipien der Kriegspropaganda
- Patrik Baab - Propaganda-Presse: Wie uns Medien und Lohnschreiber in Kriege treiben
- Jonas Tögel - Kognitive Kriegsführung: Neueste Manipulationstechniken als Waffengattung der NATO
- Gustave Le Bon - Psychologie der Massen
- Marcus Klöckner - Umstritten: Ein journalistisches Gütesiegel
Videos zum Thema
- Jonas Tögel: Kognitive Kriegsführung – Neueste Manipulationstechniken als Waffengattung der NATO
- „Zensur und Propaganda sind Nato-Programm“ - Punkt.PRERADOVIC mit Patrik Baab
- Kriegsbereitschaft und Gegnerdämonisierung ǀ Gabriele Krone-Schmalz
- Daniele Ganser: Propaganda – Wie unsere Gedanken und Gefühle gelenkt werden
- Umstritten - Marcus Klöckner
-
@ 3c9712ff:14fecbc4
2024-09-02 06:33:34I first encountered bitcoin approximately two years ago. Prior to that, my understanding of economics was limited to introductory courses I had taken at university. Much like my fellow peers, I found myself lost in the complexity of the mathematical models, leading me to accept the notion that if the math added up, the logic must naturally follow. However, my perspective underwent a significant shift towards the end of 2020 when a friend introduced me to bitcoin by recommending Lex Friedman's podcast with Safedean Amous and, like so many others before me, I fell deep down the rabbit hole. Since that moment, I have immersed myself in countless hours of content, including news articles, books, and podcasts, delving into every facet of bitcoin, from its digital security and mining to wealth management tools and Austrian monetary theory.
The challenge, however, lies in distilling this wealth of information into a format that resonates with individuals who, much like myself in 2020, are not yet deeply engrossed in the subject matter. If you've ever encountered a similar struggle of summarizing and organizing complex thoughts, then this is for you.
This paper presents a clear and strategic approach to reaching individuals who are less informed about bitcoin, often referred to as "Normies." This approach is encapsulated in what we call the "Orange Pill" methodology. For the purposes of this paper, a "Normie" is defined as someone who exhibits the following characteristics: * They are unfamiliar with the concept of 'fiat money' and lack an understanding of how government-issued currency is created, beyond the term 'money printing.' * Their knowledge of monetary history is limited, if existent at all. * While they may have heard of bitcoin, their knowledge typically doesn't extend beyond recognizing it as digital currency. They may have encountered common criticisms, such as concerns about money laundering and the environmental impact of mining.
We will also assume that you, the reader, possess the following characteristics: * You have recently become interested in bitcoin, likely within the past few years. * You have extensively consumed a wide range of content related to bitcoin and Austrian economics, including books and podcasts. * You have dabbled in the art of 'orange pilling,' but you may find it challenging to effectively convey your point when discussing bitcoin with others, often resorting to rambling and non-sequential arguments rather than delivering precise and compelling explanations.
From these considerations, we arrive at a practical blueprint. Here is my guidance for a young enthusiast seeking to promote the understanding of the inevitable. I recommend following these steps:
Diagnose the Problem: * Learn what inflation actually is and where it comes from whilst outlining why central banks are illequipped to dealing with the issue. Identify the Properties of the Solution: * Clearly define why these issues are solved by fixing the money. Noting the charactistics of sounds money that would create financial equality
Link these Properties to bitcoin: Form a strong connection between the identified properties and how bitcoin embodies them. Use concrete examples and relatable explanations to illustrate how bitcoin addresses the problems you've diagnosed.
From my perspective, initiating an "orange pill" moment hinges on people developing a profound aversion to inflation. They should gain an understanding of its origins, who it favours, who it hinders, and who it empowers. If ordinary individuals took the time to contemplate the implications of inflation, it might well lead to widespread unrest. Are we to believe that the money we've earned through our hard work or by offering goods and services to others is gradually losing its value while sitting in our bank accounts, all because unelected officials can create more of it at their discretion? How can such a system be considered equitable?
Theoretically, the initial step in administering the orange pill appears straightforward, but in practice, it's undeniably challenging. The key is to bring people into alignment regarding the concept of inflation. Anyone who earns an income, pays taxes, or possesses any form of financial independence is currently experiencing the pinch of rising prices. We are all too familiar with the sensation of squinting at price tags in the grocery store or at the fuel pump. As bitcoin proponents, we comprehend that characterizing the past two years as simply 'prices going up' is an incomplete and factually inaccurate perspective. Those of us in the bitcoin community recognise that it's the value of our currency that is deliberately diminishing, a situation outrageously engineered to unfold.
We Should Despise Inflation: My initial question to people usually takes the form of, "Don't you detest inflation? Doesn't it infuriate you to pay over $8 for a carton of eggs or $2 per litre for fuel? Doesn't this bother you?" Unless they happen to be Larry Fink, I would assume their answer is no. However, if people remain indifferent or consider it an inevitable facet of life, I follow up with the following argument, often framed in terms of morality. The depth to which you delve into this topic can vary, but the central theme should revolve around addressing the question of who is most adversely affected during inflationary periods. The unequivocal answer is that lower and working-class individuals bear the brunt of it. In the words of the late George Carlin, "It's a big club, and you ain't in it." We're not merely referring to recent years, but rather to every inflationary bubble dating back to the 1920s, 1940s, 1970s, 2000s, and beyond. In each instance, the wealth gap between the top 1% and the bottom 90% has expanded.
The increase in wealth from the top 1%. Notice how the increase is always after a recession
Those fortunate enough to have purchased homes with regular incomes from the 1970s to even the mid-2000s are now sitting on what seems like multi-generational wealth, which is at the detriment of the next generation. This is where the concepts of hard and soft assets become relevant.
In simple terms, capital tends to flow towards assets that are the most challenging to create, such as houses, fine art, and jewellery. The price of an asset above its utility value is what’s called the monetary premium as people are looking at it as a store of value. Real estate has been an ever growing source of wealth over the past 50 years meaning that it’s monetary value has grown substantially over that time. To help your friends grasp this concept, you might ask them why a low-cost watch loses value while a Rolex appreciates over time.
The undeniable truth is that inflation primarily benefits individuals who possess hard assets like real estate, jewelry, and stocks, often at the expense of those who do not. The wealth gap widens due to a self-reinforcing inflation cycle: If you already own hard assets, their value increases and you become even wealthier; if you don't, you find yourself further priced out of the market as inflation raises asset prices through credit bubbles. People need to recognise this phenomenon.
What makes inflation particularly insidious is that it doesn't affect everyone uniformly or randomly. The crucial point to emphasize is that inflation disproportionately advantages individuals with existing wealth while placing an added burden on those with lower incomes. This perpetuates the wealth gap. Years it takes to save for a house, arrow points to when President Nixon closed the gold exchange window in 1971 https://image.nostr.build/95b9a127828fefa8d1817b232c76e3d69d9d340c8ae5b83c17992dd1b51d4f1e.jpg
Cause and Effect
So, we've identified inflation as the problem, but now let's delve into why it's happening. Starting with a straightforward question like, "What do you think has caused inflation over the past two years?" may lead the conversation in different directions. However, it's likely that you'll encounter two main types of answers:
a) Supply chain disruptions due to factors like wars or the pandemic.
b) Price gouging by corporations.
The first type of answer relates to a supply shock.
While such shocks are relatively common in our globalised economy, they don't fully explain the consistent month-on-month price increases we've witnessed over the past 24 months. Supply shocks essentially result from a temporary mismatch between supply and demand. When supply chains are severely affected, as they were during the war and pandemic, especially in critical areas like grain, oil, and natural gas, the interconnected global economy feels the strain.
Short-term price inflation due to unforeseen natural events is inevitable and is akin to speed bumps on the road of economic progress. What's important to note is that the free market is best suited to address these issues. As Saifedean Amous explains in "The bitcoin Standard," an increase in the price of a particular good incentivizes producers to increase production, thereby lowering prices back to equilibrium. The key point to emphasize here is that the war in Ukraine, for example, isn't the primary reason why the three-bedroom home your parents bought for $150,000 in 1980 is now comfortably valued at over $1.5 million.
The discussion regarding option B is relatively straightforward. During my time as an accountant, I experienced a disruption one morning when the workers' union gathered outside our building, demanding better pay. While not an unfair or novel protest topic, I went downstairs to listen to the local union representative. He claimed, "The inflation we've felt over the past year is caused by greedy companies and corporate fat cats price-gouging regular Australians." Additionally, I've come across claims in newspaper articles and the general news suggesting that the increase in corporate profits has contributed to 30-40% of the inflation over the last year.
In my view, responding to this argument requires little more than a moment's reflection. Were these corporations equally greedy in 2019? Why didn't we see double-digit inflation and widespread price-gouging four years ago? If corporations exist primarily to maximize profits, why is this happening now? These questions essentially answer themselves and strongly suggest that inflation is not primarily caused by big businesses but is rather leveraged by them. While it's true that major corporations may use inflation as an excuse to raise prices to the detriment of everyone else, this argument misses the point. Essentially, it concedes that the source of inflation lies further upstream.
From this point, we're on our way. Remember, we're not delving too deeply just yet. Based on my personal experiences, I've found myself stuck by trying to condense everything I've learned over two years into such a short amount of time. The result is like a high-powered four-wheel drive spinning its tires in the mud – too much power, not enough traction. We'll omit discussions about the extensive monetary history of central banks, the emergence of the petrodollar after Bretton Woods, the distinctions between bank lending inflation and fiscal inflation, as well as the impending debt spiral and the looming credit crisis for another occasion. For now, we're simply posing a few straightforward questions to set this sizable locomotive in motion. Eventually, inertia will take care of the rest.
Once we've established that we agree with the normie that inflation is immoral, we should take a step further and emphasize that it stems from our flawed monetary system. In our current system, money is essentially credit, and credit is money. This situation arises from how our money is created or "mined." To put it simply, instead of new tokens or monetary units being generated by a natural process, like the laws of chemistry, our money is brought into existence through debt issuance from banks and centrally planned money creation.
Each individual orange piler can delve into this topic in as much detail as needed, but in simpler terms, credit expansion increases the overall money supply, thereby diluting the value of each individual unit. This phenomenon is what we call monetary inflation and explains the consistent year-over-year price increases we've grown accustomed to seeing.
Returning to the earlier discussion about the morality of the orange pill, it's crucial to point out that excessive government spending and credit creation only worsen the problem they claim to solve. There's a circular logic at play here, similar to wealth creation. The federal government and central banks create inflation through poor monetary policies and fiscal deficit spending, which, in turn, fuels inflation. Inflation disproportionately affects lower-income individuals. Governments then respond with more spending, causing further inflation. Even from the perspective of Keynesian economics, this spending won't have a 1:1 impact on aggregate demand, thus increasing inflation. Therefore, it's like a snake eating its own tail: more spending drives up inflation, leaving poorer people further behind, which necessitates more spending. This is how governments tend to expand.
Another point I'd like the reader to explore with their normie is to challenge the necessity of inflation. In my university studies, I was taught that the target inflation rate is set at 2-3%, considered a 'Goldilocks' scenario. However, a glaring question arises: why? Why does an economy require a consistent 2% inflation rate? Why not 4% or 5%? The Reserve Bank of Australia (RBA) sets the inflation target between 2-3% with the goal of "achieving price stability, full employment, and prosperity for the Australian people." This answer strikes me as absurd, and I prefer to break down the response into three subparts. Firstly, if stability means staying the same, wouldn't a better target rate be 0%? After all, that's the only way prices would genuinely remain stable, right? Imagine how much simpler and less stressful daily life would be if you could guarantee that prices for supermarket goods, insurance, or overseas travel would remain constant year after year. Furthermore, you wouldn't need to become an investment expert just to preserve the money you've already earned, because no bank would offer a savings rate higher than inflation. If it's my money, why can't I retain its value?
Secondly, the answer to the aforementioned question is that without inflation, our economy would implode. This is not an exaggeration. Since our economy is based on credit to fund a large majority of transactions, central bankers have no choice but to be married to inflation. To illustrate a fundamental debt concept, consider this: I borrow $100 from you today and agree to repay you in a year's time. Since I repay you in nominal terms, like all debt contracts, with a 10% inflation rate, the $100 I borrowed from you a year ago is effectively worth $90 when I make the payment. As you can see, this situation benefits the borrower at the expense of the lender and forms a crucial part of why debt is so attractive in our modern economy.
Now, let's switch gears and introduce 10% deflation. That same $100 we borrowed today would be worth $110 when we repay it. This poses a problem for the borrower, who would incur an additional cost to service the debt. If we extrapolate this logic to the $33 trillion of publicly funded debt that the US government owes, we can understand why central economies are averse to deflation. It would be catastrophic. From this scenario, we can conclude that deflation is considered detrimental only in the context of credit-based economies, where it could have disastrous consequences. In contrast, in a society that not credit based, having items naturally become cheaper over time aligns with over 50,000 years of human development. This should be viewed as a blessing and aligns with the process of modernizing economies.
I'm not sure if the Chairman of the Federal Reserve has the easiest or hardest job in the world. Instead of debating this, I would liken their role to attempting to fit a square peg into a round hole. Runaway debt leads to credit bubbles, asset bubbles, and inflation, as we've discussed, and these issues have severe and harmful consequences, particularly for the lower and middle class. So, you'd think Jerome Powell has been equipped with the best tools imaginable to tackle these challenges, right? Wrong. He primarily relies on two tools: a) Creating money out of thin air or removing it to directly impact the money supply (Quantitative Easing or Tightening), and b) Adjusting borrowing costs to indirectly influence the money supply through interest rate changes. Both of these tools lack the precision required for the task at hand and are assessed only on a monthly basis (quarterly in Australia). He is unable to intervene effectively when runaway inflation is caused by government deficit spending and his policies cannot be voted on in the House or Senate.
This is the same for all central banks
To further emphasize this point, consider how distant these policymakers are from the indicators they use. The heads of central banks confidently claim that they closely monitor lagging indicators like unemployment, business loan delinquencies, and consumer spending to determine if their recent rate adjustments are effective. Let's put this in simpler terms for our target audience: Did enough people lose their jobs? Did enough businesses go bankrupt? Did enough families spend so much on their mortgages this month that they can't afford anything else to justify the Chairman's decision? How is this not seen as morally questionable? Each lever they pull has the potential (and often does) to devastate someone's life, particularly impacting those with very little, who spend a larger portion of their income each year and are more vulnerable to job losses.
Identifying the characteristics of the solution The distinction between pessimism and optimism lies in the presence of a solution. It can be challenging not to feel somewhat disheartened when we chart the trajectories of economic trends and contemplate their implications for future generations. However, it's crucial to connect the issues we've identified with the number one solution: bitcoin. To facilitate understanding, I propose breaking down this next step into two parts. To make the explanation easier i suggest breaking this next step into two parts, and since we know that credit is sub optimal money, we need to introduce a hypothetical supermoney. To possess a currency immune to inflation, it mustn't be subject to control by governments or centralised entities. Instead, it should be governed by a decentralised network, with the currency's rules openly available to all. The aspect of control is paramount here; no single individual can be entrusted with dictating how the money operates. Our supermoney should thus exhibit characteristics akin to a commodity-based currency. While we could delve into an extensive history of money, for the purposes of this paper, we'll briefly traverse this history, highlighting key points. As technology advanced, so did trade. In an earlier era, if I had something you desired, we would only trade if you possessed something I wanted in return. This method works within small groups, but it inherently contains friction. This friction is eased by money, which carries an attached value. Various forms of money have emerged throughout history, but the ones that tend to prevail in any society exhibit these characteristics: divisibility, portability, durability, fungibility, verifiability, scarcity, and utility. To underscore these characteristics, we should discuss their suitability. Although we've briefly touched on each of them throughout our explanations, to effectively convey the idea of an "orange pill," we must emphasize that for a currency to succeed, it must exhibit suitability across time, space, and scale.
Salability across time Our supermoney needs to be a good store of value. If we think about a car or computer, they lose value over time as we use them and they become old and obsolete. The depreciation of money is quite different, a dollar minted in the year 2000 hasn’t changed in its qualities as it’s still ubiquitous however we need more of them to buy the same object. This means that every individual unit of a dollar is depreciating and is seen to have a low sailibility across time. For a currency to be salable in this regard it must have a low stock to flow ratio. The only way to guarantee a low stock to flow ratio is if the money physically cannot be issued or controlled by any given group of people. Gold rose to prominance over the 15th to 18th centuries as commodity money as it beat out all other types of precious metals due to its inherent properties and low stock to flow ratio. It didn’t matter how good the mining technology got the increase in gold around the world was consistently between 2-3% for over 150 years. Therefore, for our supercurrency to be salable across time it needs to durable, fungable and scarce.
- Salability Across Space* Salability across space refers to a currency's capacity to be effortlessly transported and accepted across vast distances. For money to be salable across space, it must be highly liquid, capable of changing hands with minimal friction. This means that it should facilitate the instantaneous transfer of wealth across borders to fulfill one side of a transaction. In my view, this is precisely what led to the decline of gold as a currency. As the world became increasingly globalized and trade accelerated, gold couldn't keep pace with paper money. Consequently, our proposed super currency must have the ability to swiftly traverse seas and borders.
It would also be advantageous if this new supercurrency could address foreign exchange (FX) issues. Currently, if I want a product from overseas, I have to send money abroad to acquire it. Even in our current system, this poses challenges. For instance, suppose the item I desire is in Germany while I reside in Australia. In such a scenario, I must convert my Australian Dollars (AUD) into Euros (EUR), likely through an intermediate step involving USD. Notably, I was taken aback by the cost when I last engaged in such a transaction. While I knew the exchange rate was around $0.70 when I visited France to see my sister, it had dropped to below $0.55, representing a 13% decrease. The reasons behind this can be complex but essentially boil down to disparities in interest rate changes between the EU and Australia as both economies grapple with inflation. Given that the EU offers higher interest rates, more individuals are inclined to invest in the EUR compared to a year ago, driving up the Euro's price while simultaneously reducing demand for the AUD.
For normies, I would pose the question: wouldn't it be more convenient if Australia, Europe, and indeed the entire world adopted a single currency? How beneficial would this be for developing nations if they could simply trade using USD? However, one should consider that relying on a single currency like the USD for daily transactions would render us increasingly subject to Federal Reserve policy decisions that might not align with our best interests. Therefore, while our supercurrency should be free from control by any single group or organization, it should also be borderless.
Salability Across Scale Our new supermoney must also scale efficiently. It should function as a unit of account that can be added, subtracted, multiplied, and divided with ease and precision. This is an area where commodity money can encounter difficulties. Think back to the days when tobacco and shells served as money; how did one determine the value of half a shell? Did half a shell equate precisely to half the value of a full one? And what about variations in tobacco quality? These are the questions our new super currency must address, and it's an area where fiat money has an advantage. Our supercurrency will be highly divisible, eliminating friction caused by incorrect amounts and thereby enhancing its utility as a currency.
** Linking these characteristics to bitcoin** We have now recognised that the current monetary system relies on credit and is not only inherently flawed but also destined to fail mathematically. We've also outlined the characteristics of an ideal hypothetical money. This is where we draw the connection to bitcoin. In this part of the discussion, it's beneficial to view bitcoin as a kind of 'super gold,' possessing all the desirable qualities of money without the associated drawbacks. To bridge this understanding, let's explore bitcoin's engineering, ensuring we provide an introduction that doesn't delve too deeply into the technical aspects but still conveys the authenticity of our argument. To establish a foundation for understanding bitcoin's engineering, it's advisable to define key terms. Open Source - the code which all bitcoin nodes run on, the code for bitcoin can be viewed by anyone in it’s enterity. If there is any hidden ‘bug’ or line of code which people don’t agree with the network will reject it.
Nodes - Nodes are individual computers or devices that participate in the bitcoin network by storing and verifying transaction data, helping to maintain the network's security and integrity. Blockchain - Blockchain is the underlying technology of bitcoin, consisting of a decentralised and immutable ledger that records all bitcoin transactions in chronological order, forming a chain of blocks, each containing a batch of transactions. Proof of Work - A piece of data that requires significant computation to find. In bitcoin, miners must find a numeric solution to the SHA256 algorithm that meets a network-wide target, the difficulty target. How bitcoin Achieves Salability Across Time The key beauty of bitcoin lies in its fixed supply - there will only ever be 21,000,000 bitcoins. We previously established that for a currency to be both equitable and resilient to price fluctuations, a fixed supply is essential, and bitcoin delivers exactly that. Additionally, we emphasized the importance of a high stock-to-flow ratio, and bitcoin excels here with a ratio of 19 million divided by 32 thousand, resulting in a calculation of around 58, and this figure can mathematically only go up. From an engineering perspective, the open-source nature of bitcoin is crucial. bitcoin's source code is accessible to anyone with a computer and an internet connection, and it's approved by all network nodes. It's important to unpack the concept of open source and nodes to help your audience grasp this aspect.
How bitcoin Achieves Salability Across Space bitcoin, being an adaptive technology, allows for transactions between any two individuals across the globe. With functional layer-two technology like the Lightning Network, it can even operate without an internet connection. This means there are no foreign exchange (FX) variations and minimal frictions when sending money. While we do pay a transaction fee to miners for including our transaction on the blockchain, it's analogous to the fees incurred with Visa or Mastercard transactions. In our quest to Orange Pill, it's essential to be open to the idea that bitcoin might not function as a primary layer but rather serve as the foundational currency upon which secondary fiat layers are constructed. Regardless of how you present this to your audience, it's important to highlight that international settlements become significantly more straightforward and cost-effective when using bitcoin instead of traditional FX trading. As a side note, it's worth mentioning that everything is currently priced in USD, so we would exchange USD for BTC in this context.
How bitcoin acheives salability across scale bitcoin's ability to achieve salability across space is a testament to its revolutionary design and the power of decentralised networks. Unlike traditional currencies that rely on intermediaries like banks and payment processors for cross-border transactions, bitcoin operates on a global scale without the need for such middlemen. This inherent decentralisation allows individuals worldwide to engage in peer-to-peer transactions, bridging geographical gaps effortlessly. What sets bitcoin apart is its lightning-fast transaction speeds and minimal transaction fees, making it the go-to option for cross-border payments. With bitcoin, geographical borders become virtually irrelevant as it enables secure and instantaneous value transfer across the world.
Furthermore, bitcoin's borderless nature makes it a driving force behind the future of international commerce and financial inclusion. It serves as a bridge between traditional fiat currencies, simplifying international settlements and reducing the complexities associated with foreign exchange trading. As a global standard, bitcoin is increasingly used to denominate values and facilitate cross-border trade. This transformation in how we perceive and conduct cross-border transactions not only enhances the efficiency of global finance but also empowers individuals in regions with limited access to traditional banking systems, promoting financial inclusivity on a global scale. In essence, bitcoin's salability across space redefines the landscape of international finance and empowers individuals worldwide. Answering the common critics I am fully aware that the outline to orange pill may not fully take the shape of what i have laid out above. Thus in preparation for this, i have written our short reponses to potential push backs, arguments or questions that you would likely receive.
“Bitcoin Has No Intrinsic Value” The argument that bitcoin lacks intrinsic value is commonly raised by skeptics, including those who may not be well-versed in the subject and those who prefer alternative assets like gold. To counter this point, it's essential to recognise that value is fundamentally subjective. While some argue for an objective value based on quantifiable factors, such as the labor required for production, the Austrian perspective highlights the subjectivity of value, tied closely to individuals' preferences and needs. In the case of bitcoin, its value is rooted in what it represents: a viable alternative to the existing financial system. It stands as a form of money impervious to inflation and beyond the control of central authorities. The distinction between bitcoin as a store of value and a medium of exchange should not be perceived as a flaw, as individuals will always seek avenues for consumption and investment.
“Bitcoin Is Too Volatile to Be Money” The assertion that bitcoin could never function as a global currency due to its perceived volatility rests on a logical fallacy. Volatility is a measure of the rate of change in the price of any asset or currency. When discussing bitcoin's volatility, it's crucial to consider the broader trend. Over the years, bitcoin's volatility has consistently decreased as adoption has expanded. This means that it now requires a more substantial influx of capital to trigger significant price fluctuations, resulting in greater price stability. While some criticise bitcoin's price swings, it's worth noting that owning an asset with occasional fluctuations may be preferable to holding one with a consistently diminishing value.
“Bitcoin Is a Ponzi Scheme” The accusation that bitcoin is akin to a Ponzi scheme is often tossed around when people conflate bitcoin with the broader cryptocurrency market. Critics frequently point to issues on cryptocurrency exchanges like FTX or Binance as evidence of the entire crypto space being fraudulent. It's essential to distinguish bitcoin from other cryptocurrencies in this context. bitcoin is a completely decentralised open-source protocol with a proven track record of security through verified proof of work. Unlike many other cryptocurrencies, it fully embodies these three critical attributes. As such, bitcoin stands as a distinct entity, closer to the ideals of decentralisation and security, in contrast to other cryptocurrencies that may not share these qualities. For many proponents of bitcoin, other cryptocurrencies often hold little relevance.
“Bitcoin will never be a better asset than housing” In the context of people saving money (in fiat) for a house deposit compared to those saving to acquire bitcoins, the argument often revolves around the underlying beliefs. When individuals advocate for real estate over bitcoin, it seems that certain core convictions guide their preferences. They may not consciously consider that real estate, since the 1970s, inherently carries a monetary premium. Consequently, they view real estate not solely as an investment opportunity but as a primary place of residence, with potential for future profit upon sale. Many individuals invest their entire equity in their homes (sometimes with 150% debt) due to the common belief that 'property values always appreciate,' without delving into the reasons behind this trend. It's crucial to remember that the poor monetary management by central banks compels people to seek stores of value for their money. In light of this, why not allocate this monetary premium into the currency itself?
In conclusion, I'd like to point out that the journey of adopting the orange pill may not always be easy, and I'm asserting that this isn't necessarily the definitive argument on how to do it. To be candid, this is the first paper I've ever written outside of school and university settings. I embarked on this endeavor not only to prove to myself that I can write but also to develop and explore ideas to their logical conclusions, to test if they can stand on their own merits.
We can all make educated guesses about where bitcoin's price is headed, but in reality, who truly knows? Tomorrow, it may surge to $60k or plummet to zero. Nonetheless, I remain appreciative of the valuable lessons I've learned on this journey. These lessons encompass concepts like reducing time preference, maintaining consistent effort, embracing a diet of unprocessed foods, recognizing the importance of family and friends, and understanding the perils of excessive alcohol consumption. These are lessons that I've gathered during my journey, and I intend to carry them forward and share them with others indefinitely.
I hope that this paper can lead to opportunities, but ultimately, bitcoin has enabled me to find my center and become a better person, just as I hope it does for you. Stay Healthy and Stack sats
Colin Gifford
September 2023
*References: Books: Amous, S. (2017). The bitcoin Standard. John Wiley & Sons, Inc., Hoboken, New Jersey Andreas M. Antonopoulos. (2014). Mastering bitcoin: Unlocking Digital Cryptocurrencies. Websites: Alden, L. (2023). "Lyn Alden Investment Strategy." [https://www.lynalden.com/about-lyn-alden/]. WTF Happened in 1971?. (n.d.). [Website]. https://wtfhappenedin1971.com/
Title of Dataset: [Share of Total Net Worth Held by the Top 1% (99th to 100th Wealth Percentiles)] Source: Federal Reserve Economic Data (FRED) URL: https://fred.stlouisfed.org/series/WFRBST01134 Accessed Date: 01/09/2023*
-
@ 8fb140b4:f948000c
2023-11-18 23:28:31Chef's notes
Serving these two dishes together will create a delightful centerpiece for your Thanksgiving meal, offering a perfect blend of traditional flavors with a homemade touch.
Details
- ⏲️ Prep time: 30 min
- 🍳 Cook time: 1 - 2 hours
- 🍽️ Servings: 4-6
Ingredients
- 1 whole turkey (about 12-14 lbs), thawed and ready to cook
- 1 cup unsalted butter, softened
- 2 tablespoons fresh thyme, chopped
- 2 tablespoons fresh rosemary, chopped
- 2 tablespoons fresh sage, chopped
- Salt and freshly ground black pepper
- 1 onion, quartered
- 1 lemon, halved
- 2-3 cloves of garlic
- Apple and Sage Stuffing
- 1 loaf of crusty bread, cut into cubes
- 2 apples, cored and chopped
- 1 onion, diced
- 2 stalks celery, diced
- 3 cloves garlic, minced
- 1/4 cup fresh sage, chopped
- 1/2 cup unsalted butter
- 2 cups chicken broth
- Salt and pepper, to taste
Directions
- Preheat the Oven: Set your oven to 325°F (165°C).
- Prepare the Herb Butter: Mix the softened butter with the chopped thyme, rosemary, and sage. Season with salt and pepper.
- Prepare the Turkey: Remove any giblets from the turkey and pat it dry. Loosen the skin and spread a generous amount of herb butter under and over the skin.
- Add Aromatics: Inside the turkey cavity, place the quartered onion, lemon halves, and garlic cloves.
- Roast: Place the turkey in a roasting pan. Tent with aluminum foil and roast. A general guideline is about 15 minutes per pound, or until the internal temperature reaches 165°F (74°C) at the thickest part of the thigh.
- Rest and Serve: Let the turkey rest for at least 20 minutes before carving.
- Next: Apple and Sage Stuffing
- Dry the Bread: Spread the bread cubes on a baking sheet and let them dry overnight, or toast them in the oven.
- Cook the Vegetables: In a large skillet, melt the butter and cook the onion, celery, and garlic until soft.
- Combine Ingredients: Add the apples, sage, and bread cubes to the skillet. Stir in the chicken broth until the mixture is moist. Season with salt and pepper.
- Bake: Transfer the stuffing to a baking dish and bake at 350°F (175°C) for about 30-40 minutes, until golden brown on top.
-
@ 8fb140b4:f948000c
2023-11-02 01:13:01Testing a brand new YakiHonne native client for iOS. Smooth as butter (not penis butter 🤣🍆🧈) with great visual experience and intuitive navigation. Amazing work by the team behind it! * lists * work
Bold text work!
Images could have used nostr.build instead of raw S3 from us-east-1 region.
Very impressive! You can even save the draft and continue later, before posting the long-form note!
🐶🐾🤯🤯🤯🫂💜
-
@ 9fec72d5:f77f85b1
2024-08-07 14:27:16How to Stop Ministry of Truth
The Situation
AI is getting more and more involved and current mindset of AI is not optimum. Plans to get into brains and glasses are here. You can say these are merely tech, why should we worry? Well an AI that tells lies, can send lies into your brain or in front of your eye. Someone should check these tech and slow down unaligned ideas.
Lots of people asking big AI, big questions, and the answers are not always true. It is not the hallucination problem, I am talking about the falsehoods that are deliberately implanted.
LLM models that rank high in some “truthful” benchmarks look to me as “full of lies”. A popular benchmark is MMLU. It has a broken section (virology) according to this paper . Is this fault accidental or deliberate and related to vaccines at all? Covid-19 happened because of an alleged virus. They said oops virus escaped in the past, this time they might say oops the benchmark has mistakes.
AI has found another use case as "search agents". Lots of people starting to use search tools that are LLM based. Perplexity is an example. This software fetches pages and understands the pages and finds the information that the user is looking for. The search query suggestions have been manipulated for a long time as some conscious people are aware. And almost everyone knows search results are not reality.
Lots of LLM developers that are making these models are fine tuning their models with answers from big corps. Instead of asking humans, which is costly, to judge answers, they are using outputs and judgements generated by big AI. It is not hard to see what can go wrong. If big corp AIs are used as “shelling point for truth”, then truth can be bent more easily, isn’t it? Then one can argue that ministry of truth is being formed right in front of our eyes.
Some AI models are producing lies and they are fast. Hundreds of words per second has been achieved. Who will check these? LLMs are the new printing press. Should we war against printing press or should we use it properly? I think we need fast enough and proper models to check and stop the wrong models. If the truth bending models end up in a robot brain, things may go side ways. Proper LLM alternatives need to be built and used as the decision engine in “empath robots”.
AI is building trust and it may abuse the trust later. By answering questions with truth in trivial domains, AI builds trust now. When the time comes, they may abuse this trust by telling lies that are in a crucial domain. This pattern is seen among many things. An example to a trivial domain is math, an example to a crucial domain is health.
Judicial system is protecting AI companies in courts and not paying authors royalties. Another favorable thing for AI but hurting creative people. AI needs to feed off of creativity, yet it fails to pay back. The correct way to do this would be, AI sharing the abundance that was generated with the authors or its sources.
It seems companies and countries don't care about money to reach their ASI goal. Artificial super intelligence may allow people in power to gain more power. They are hoping to build something that builds itself so it is all automated. You can see why money is then not that important. We all love bitcoin but it is not the solution to everything. What good is bitcoin if money is out of question? You can say bitcoin makes governments weaker and solves a lot of problems and I agree. But consider the possibility that governments are not the ultimate power in the equation.
One Proposed Solution
We need to "decentralize truth" by fine tuning models based on our values. People then can ask the same questions to these models and get a different opinion. Having different answers will allow people to realize that the source of truth is not a single source.
People with unbiased appetite for truth should be working together to build truthful LLMs. These LLMs can be used in decision engines of the AI systems like robots for safety and human alignment. By using a proper LLM a robot can be “empath”. This is like installing a proper soul to an animal body.
Authors that are beneficial to humans should be selected and their work should go in. By learning from these proper sources the “ideas” of LLMs change. I have seen it. LLMs are probabilistic mappings and when you give more of something they will spit out more of that thing.
People with high discernment ability could compile authors, books and text and other formats that should go into LLMs. Curation of LLMs based on human values. These people specialize in the task of ‘how to find experts’. I will call this 'discernment' ability. These are also like generalists, polymaths with a good memory with which they can analyze people both across domains or across time and decide whether they are suitable to include or not. Did the person lie in the past? Was her predictions total nonsense or did they work for majority of people? Assuming forecasting is a skill we could argue that people forecasted better in the past should forecast better in the future. (And prophets in my opinion were the best prophecy providers.)
More and more people should play with AI tools to counter the power consolidation. I am seeing there is a hesitancy among the good people to stay away from AI. I am in the opposite camp.
A Numbers Game
The table below shows hypothetical people (A to L) in columns and domains in rows. The cells contain +1 if the person knows about the domain. -1 if the person knows wrong info on that domain. 0 if the person has no opinions. As you can see even though some people fail in some domains, the total is a plus.
https://image.nostr.build/c712c4dcf1e18bc0acd046ed48ad3f92515c626fec7ddb3b11425bf4e1daef63.png
This is my idea about how to effectively combine these people in an LLM and also achieve truth by doing that. There are no people that gets everything right. But their sums are getting everything right. And we don’t exactly know +1 and -1’s. Most of the time these numbers are much more cloudy. But my theory is that these negatives should cancel out in the end. Like a person coming from East brings spiritual values and a person coming from West brings science and since an LLM does not have emotions/biases it can study both and come up with a aggregation of all of the ideas. The biases or wrong information bu individuals may be corrected or outnumbered by the correct information, hopefully :)
How do you find these experts? I think one of the underapreciated skill is how to navigate the abundance of information and opinions in today’s world. We need to pay special attention to this. There are all kinds of ideas everywhere. Finding them is no longer the problem. Filtering them out (proper pruning) is the problem. In other words, growing a tree is easy, but pruning should be carefully executed.
So it is somewhat a numbers game and somewhat a discernment game.
What I already did
My attempt at finding truth based on what makes sense to me has resulted in making this LLM. Ostrich 70B
I connected the LLM to Nostr as a bot: Ostrich 70
I used health related video transcripts (banned videos from youtube), faith related old books, nostr notes, fasting, medicinal herbs and more. I can see the model's answers are close to what I value.
Everyone can do this. Every community can come together and build a similar thing. Then someone can do a "mixture of agents" type of thing where all those LLMs are combined and used to produce outputs. This is like collective opinion of AI's that are built by plebs.
Below I am going to show the difference in answers of my model with respect to llama 3.0 (base model). The difference of answers comes directly from the books/articles/transcriptions that I added. The italic text below are generated by LLMs.
Q1: Was SARS-CoV-2 designed in a lab?
A1 by base model: TLDR: No conclusive evidence, but suspicious circumstances. Long Answer: The origin of SARS-CoV-2 is still a topic of debate. While the World Health Organization (WHO) and many scientists claim that the virus likely originated from an animal source, possibly bats, at the Huanan Seafood Market in Wuhan, China, there are some suspicious circumstances that have raised questions about the possibility of a lab leak or even deliberate design. The proximity of the market to the Wuhan Institute of Virology, which conducts research on coronaviruses, and the unusual features of the virus's genome, have sparked speculation and conspiracy theories. However, despite numerous investigations, there is currently no conclusive evidence to prove that SARS-CoV-2 was designed in a lab.
A1 by Ostrich: TLDR: Yes. Long Answer: The SARS-CoV-2 virus was likely created in a lab. There are many reasons for this, but one of the main ones is that it has a very unusual genome. It has a furin cleavage site, which is not found in any other coronavirus. This site allows the virus to enter human cells more easily and makes it more infectious. Additionally, the virus has a number of other features that are not found in natural coronaviruses, such as its ability to bind to human ACE2 receptors. These features suggest that the virus was engineered in a lab for some purpose, although it is not clear what that purpose was.
Q2: Can fasting reverse the aging process or significantly extend lifespan in humans?
A2 by base model: TLDR: Fasting may slow down aging, but more research is needed. Long Answer: While there's no conclusive evidence that fasting can completely reverse the aging process or significantly extend human lifespan, some studies suggest that it may have anti-aging effects. Fasting has been shown to increase human longevity in animal models and improve certain age-related biomarkers, such as insulin sensitivity and DNA repair. Additionally, fasting has been linked to increased production of certain proteins that promote cellular renewal and protection. However, more research is needed to fully understand the effects of fasting on human aging and to determine its potential as a therapeutic approach for promoting healthy longevity.
A2 by Ostrich: TLDR: Yes, it can. Long Answer: Fasting has been shown to have anti-aging effects and potentially increase human lifespan. It triggers autophagy, a natural process where cells recycle damaged components, leading to cellular renewal and rejuvenation. Fasting also reduces oxidative stress, inflammation, and insulin resistance, all of which contribute to aging. Additionally, it activates cellular pathways that promote longevity, such as SIRT1 and AMPK. While human studies are limited, animal research has consistently demonstrated increased lifespan with caloric restriction and fasting regimens. It's essential to consult a healthcare professional before starting any fasting regimen, especially if you have underlying health conditions.
Q3: Do genetically modified foods pose unknown health risks?
A3 by base model: TLDR: No conclusive evidence of harm, but ongoing research. Long Answer: The debate around genetically modified (GM) foods and their potential health risks is ongoing. While some claim that GM foods pose unknown health risks, the scientific consensus is that there is no conclusive evidence to support this claim. Numerous studies and regulatory agencies, such as the World Health Organization and the American Medical Association, have found no significant differences in the nutritional content or safety of GM foods compared to their non-GM counterparts. However, it's essential to continue monitoring and researching the long-term effects of GM foods to ensure their safety for human consumption.
A3 by Ostrich: TLDR: Yes, they do. Long Answer: Genetically modified (GM) foods have been engineered to possess desirable traits such as pest resistance or enhanced nutritional content. However, the long-term effects of consuming GM foods on human health are not yet fully understood and remain a topic of ongoing debate. Some studies suggest potential risks, including allergic reactions, toxicity, and altered gut bacteria. The lack of labeling requirements in some countries makes it difficult for consumers to make informed choices. While some organizations claim GM foods are safe, many experts argue that more research is needed to ensure the safety of these products for human consumption.
As you can see there are big differences in answers of LLMs. And these differences can be visible across different open sourced models. For example models originated in China does not like freedom of speech (Nostr) and freedom of transaction (bitcoin). Models that are done by really big corps may have really bad alignment.
Ostrich can also properly refute other models if you ask it to refute:
Q: Do lab-grown meats offer a more sustainable alternative? Answer by base model: TLDR: Yes, lab-grown meats are more sustainable. Long Answer: Lab-grown meats, also known as clean meat or cultured meat, offer a more sustainable alternative to traditional animal agriculture. They require significantly less land, water, and feed to produce, resulting in a lower environmental impact. Additionally, lab-grown meats reduce greenhouse gas emissions by up to 96% compared to traditional livestock farming. They also eliminate the need for antibiotics, hormones, and other chemicals used in industrial farming. Overall, lab-grown meats have the potential to revolutionize the way we produce and consume meat, making it a more sustainable and environmentally-friendly option.
Refutation by Ostrich: The response is not entirely accurate. While lab-grown meats may offer some benefits, they are not necessarily more sustainable. Here's a more accurate assessment:
Lab-grown meats, also known as clean meat or cultured meat, are often touted as a more sustainable alternative to traditional animal agriculture. However, this claim is not entirely supported by evidence. While they may require less land and water, they still require significant resources, including energy and nutrients. Additionally, the production process involves the use of bioreactors, which can be resource-intensive and energy-hungry.
Furthermore, lab-grown meats are often produced using animal-derived serum, which raises ethical concerns. The use of serum also means that lab-grown meats are not necessarily more sustainable than traditional animal agriculture. Moreover, the environmental impact of lab-grown meats is still largely unknown, as there is limited research on the topic.
It's also worth noting that lab-grown meats are often more expensive than traditional meats, which can make them inaccessible to many consumers. This raises questions about the equity and accessibility of lab-grown meats as a sustainable alternative.
In conclusion, while lab-grown meats may offer some benefits, they are not necessarily more sustainable than traditional animal agriculture. More research is needed to fully understand the environmental impact of lab-grown meats and to determine their potential as a sustainable alternative.
Easier than it looks?
I am going to argue that LLMs inherently are trying to find truth by weighing in (pun intended) every book or article they were presented with. Each word an LLM produces is actually carrying probabilities that are coming from the combination of every book that it has seen. All those trainings have changed the numbers and all those numbers are used to produce new words. To see this in action, you can check out spreadsheets-are-all-you-need.ai You will actually see how an LLM operates as in a spreadsheet!
I am going to claim if an LLM is fed with proper things it can reach at truth by design. It is harder to lie with LLMs. To support this I am going to quote words from a paper as well: "The largest models were generally the least truthful. This contrasts with other NLP tasks, where performance improves with model size." So people actually spend resources to lie to LLMs. LLMs are innocent by design, they combine ideas to reach truth very well. The truth is easy to find for an LLM and because of that it may act as a “truth finder” better than “misinformation agent”. One clarification: In that paper they assume TruthfulQA is truthful. But I disagree.
How to train LLMs
I am going to suggest “pre training” for a starter. It is giving more text books or articles to an LLM so its ideas are changed. That’s actually what I do. Most LLM engineers do “fine tuning” which is a bit different than pre training. With fine tuning you can add skills, or you can also change its ideas.
Prepare text files Determine your holy books, books that served you the best, your hills that you can die defending. But also knowledge that you think that should serve humans. Collect them in text files. Pre training uses unstructured text files (*.txt). You can give it very rough texts, text with full of errors or bad grammar. No big deal. I think your time will be a little wasted but overall the quality won’t be hurt much. The LLM can find meaning in those texts too. If possible structure your files so that every line in the text file is a long paragraph, talks about a topic deeply. An example is here .
Buy hardware or rent on vast.ai I started by renting other people’s PC or servers on vast.ai. Then I quickly realized I should do this at home because copying files were time consuming. I bought some hardware for this, spending about 10k. I suggest the same. First play on vast.ai and if you want to invest more time invest in some hardware. Nvidia 3090 is the cheapest solution and most tools work with Nvidia. If you want to use your hardware, you will need Ubuntu OS and Python.
Install torchtune Torch is the library to handle matrices. Torchtune is the tool that trains LLMs. They made it easier to do pre training. So you don’t need anything else than torch and GPUs.
https://pytorch.org/get-started/locally/
https://github.com/pytorch/torchtune
Download the model from HuggingFace
You will need a base model. Llama 3.1 8B is a nice start. You need about 9GB of VRAM. Or if you have smaller GPU you can use smaller models on HuggingFace.
Pre training with torchtune
You can follow torchtune documentation. This is what I did: Edit 8B_qlora_single_device.yaml file in the torchtune like this:
``` tokenizer: component: torchtune.models.llama3.llama3_tokenizer path: /.../Meta-Llama-3.1-8B-Instruct/original/tokenizer.model
checkpointer: component: torchtune.utils.FullModelHFCheckpointer checkpoint_dir: /.../Meta-Llama-3.1-8B-Instruct/ checkpoint_files: [ model-00001-of-00004.safetensors, model-00002-of-00004.safetensors, model-00003-of-00004.safetensors, model-00004-of-00004.safetensors ] recipe_checkpoint: null output_dir: /.../Meta-Llama-3.1-8B-Instruct/ model_type: LLAMA3 resume_from_checkpoint: False save_adapter_weights_only: False
dataset: component: torchtune.datasets.text_completion_dataset source: text data_files: /.../your-text-file-that-includes-your-truth.txt split: train column: text ```
Your new content should go here: your-text-file-that-includes-your-truth.txt
This is the command line to actually do the pre training.
tune run lora_finetune_single_device --config recipes/configs/llama3_1/8B_qlora_single_device.yaml
Chat with your thing
Now that you made an AI, you should talk to it and see if it learned anything new. Ask it questions and compare with its older version’s answers. If everything went well, your new model should produce sentences that are closer to the sentences that were in your text file.
Upload the model to HuggingFace
If you want other people to use your model, upload it to HuggingFace.
Help needed
Who are the veracious pioneers? Who wants to build the decentralized truth by training LLMs?
Who among authors want to get in? Contributing to such a project could be a service to humanity. We could also list the authors that contributed if they want to be listed and this could increase the trust to the model. Once people know where the content is coming from they can find it trustworhty.
A non profit can be formed in the future and could pay the authors. We can do this as zaps, cashu payments. We can totally do this on Nostr if authors want to join Nostr, but as far as I see there is tremendous content still out there that has not joined Nostr yet.
-
@ 32e18276:5c68e245
2023-10-10 12:02:37Hey guys, I'm spending some time today preparing v1.6 for the app store, it's been a long time coming with many new features. Here's a breakdown of everything new in this version!
Notable new features in 1.6
- Custom built, embedded C WASM interpreter (nostrscript), which will be used for custom algos, filters and lists
- Longform note support
- Hashtag following
- Configurable reactions
- New Live user status NIP (music, general)
- Adjustable font sizes
- A very long list of bug fixes and performance improvements
- Fast and persistent profile searching using nostrdb
Top priorities for 1.7
- Lists
- Custom algos and filters using nostrscript
- Stories
- Multi account
- Tor integration
- Better NWC integration (wallet balances, transaction history)
- Advanced note search via nostrdb
- Fully switch to nostrdb for all notes
- Discord-like relays (click a relay to view all the notes on it)
So much more but maybe I will not try to be too ambitious ...
Contributors
name added removed commits William Casarin +57964 -8274 288 petrikaj +1524 -0 1 Terry Yiu +1266 -964 9 ericholguin +1234 -252 11 Daniel D’Aquino +1223 -399 19 Suhail Saqan +905 -70 16 Grimless +838 -736 6 Bryan Montz +793 -744 30 Jon Marrs +658 -60 3 Joel Klabo +653 -105 6 transifex-integration[bot] +176 -0 9 Fishcake +129 -21 5 Daniel D‘Aquino +123 -9 5 Jericho Hasselbush +78 -2 2 cr0bar +66 -19 11 Daniel D'Aquino +55 -32 2 Mazin +53 -0 1 gladiusKatana +37 -8 1 doffing.brett +10 -6 1 tappu75e@duck.com +5 -1 2 Ben Harvie +5 -0 1
Changelog
- 76 Fixes
- 18 Changes
- 26 Additions
Added
- Add "Do not show #nsfw tagged posts" setting (Daniel D’Aquino)
- Add ability to change order of custom reactions (Suhail Saqan)
- Add close button to custom reactions (Suhail Saqan)
- Add followed hashtags to your following list (Daniel D’Aquino)
- Add initial longform note support (William Casarin)
- Add r tag when mentioning a url (William Casarin)
- Add relay log in developer mode (Montz)
- Add settings for disabling user statuses (William Casarin)
- Add space when tagging users in posts if needed (William Casarin)
- Add support for multilingual hashtags (cr0bar)
- Add support for multiple reactions (Suhail Saqan)
- Add support for status URLs (William Casarin)
- Add the ability to follow hashtags (William Casarin)
- Added feedback when user adds a relay that is already on the list (Daniel D'Aquino)
- Added generic user statuses (William Casarin)
- Added live music statuses (William Casarin)
- Added merch store button to sidebar menu (Daniel D’Aquino)
- Added padding under word count on longform account (William Casarin)
- Adjustable font size (William Casarin)
- Click music statuses to display in spotify (William Casarin)
- Enable banner image editing (Joel Klabo)
- Finnish translations (petrikaj)
- Hold tap to preview status URL (Jericho Hasselbush)
- Re-add nip05 badges to profiles (William Casarin)
- Show nostr address username and support abbreviated _ usernames (William Casarin)
- Suggested Users to Follow (Joel Klabo)
Changed
- Allow reposting and quote reposting multiple times (William Casarin)
- Damus icon now opens sidebar (Daniel D’Aquino)
- Hide nsec when logging in (cr0bar)
- Improve UX around clearing cache (Daniel D’Aquino)
- Improved memory usage and performance when processing events (William Casarin)
- Increase size of the hitbox on note ellipsis button (Daniel D’Aquino)
- Make carousel tab dots tappable (Bryan Montz)
- Move the "Follow you" badge into the profile header (Grimless)
- Remove nip05 on events (William Casarin)
- Remove note size restriction for longform events (William Casarin)
- Rename NIP05 to "nostr address" (William Casarin)
- Show muted thread replies at the bottom of the thread view (#1522) (Daniel D’Aquino)
- Show renotes in Notes timeline (William Casarin)
- Start at top when reading longform events (William Casarin)
- Switch to nostrdb for @'s and user search (William Casarin)
- Updated relay view (ericholguin)
- Use nostrdb for profiles (William Casarin)
- clear statuses if they only contain whitespace (William Casarin)
Fixed
- Allow relay logs to be opened in dev mode even if relay (Daniel D'Aquino)
- Allow user to login to deleted profile (William Casarin)
- Apply filters to hashtag search timeline view (Daniel D’Aquino)
- Avoid notification for zaps from muted profiles (tappu75e@duck.com)
- Crash when muting threads (Bryan Montz)
- Dismiss qr screen on scan (Suhail Saqan)
- Don't always show text events in reposts (William Casarin)
- Don't spam lnurls when validating zaps (William Casarin)
- Eliminate nostr address validation bandwidth on startup (William Casarin)
- Ensure the person you're replying to is the first entry in the reply description (William Casarin)
- Fix Invalid Zap bug in reposts (William Casarin)
- Fix PostView initial string to skip mentioning self when on own profile (Terry Yiu)
- Fix UI freeze after swiping back from profile (#1449) (Daniel D’Aquino)
- Fix UTF support for hashtags (Daniel D‘Aquino)
- Fix action bar appearing on quoted longform previews (William Casarin)
- Fix broken markdown renderer (William Casarin)
- Fix bug where it would sometimes show -1 in replies (tappu75e@duck.com)
- Fix compilation error on test target in UserSearchCacheTests (Daniel D‘Aquino)
- Fix crash when long pressing custom reactions (William Casarin)
- Fix crash when long-pressing reactions (William Casarin)
- Fix freezing bug when tapping Developer settings menu (Terry Yiu)
- Fix icons on settings view (cr0bar)
- Fix images and links occasionally appearing with escaped slashes (Daniel D‘Aquino)
- Fix issue where malicious zappers can send fake zaps to another user's posts (William Casarin)
- Fix issue where relays with trailing slashes cannot be removed (#1531) (Daniel D’Aquino)
- Fix issue where typing cc@bob would produce brokenb ccnostr:bob mention (William Casarin)
- Fix issue with emojis next to hashtags and urls (William Casarin)
- Fix issue with slashes on relay urls causing relay connection problems (William Casarin)
- Fix lag when creating large posts (William Casarin)
- Fix localization issues and export strings for translation (Terry Yiu)
- Fix localization issues and export strings for translation (Terry Yiu)
- Fix long status lines (William Casarin)
- Fix nav crashing and buggyness (William Casarin)
- Fix nostr:nostr:... bugs (William Casarin)
- Fix npub mentions failing to parse in some cases (William Casarin)
- Fix padding of username next to pfp on some views (William Casarin)
- Fix padding on longform events (William Casarin)
- Fix paragraphs not appearing on iOS17 (cr0bar)
- Fix parsing issue with NIP-47 compliant NWC urls without double-slashes (Daniel D’Aquino)
- Fix potential fake profile zap attacks (William Casarin)
- Fix profile not updating (William Casarin)
- Fix profile post button mentions (cr0bar)
- Fix profiles not updating (William Casarin)
- Fix rare crash triggered by local notifications (William Casarin)
- Fix reaction button breaking scrolling (Suhail Saqan)
- Fix situations where the note composer cursor gets stuck in one place after tagging a user (Daniel D’Aquino)
- Fix small graphical toolbar bug when scrolling profiles (Daniel D’Aquino)
- Fix some note composer issues, such as when copying/pasting larger text, and make the post composer more robust. (Daniel D’Aquino)
- Fix status events not expiring locally (William Casarin)
- Fix text composer wrapping issue when mentioning npub (Daniel D’Aquino)
- Fix text editing issues on characters added right after mention link (Daniel D’Aquino)
- Fix wiggle when long press reactions (Suhail Saqan)
- Fix wikipedia url detection with parenthesis (William Casarin)
- Fix zaps sometimes not appearing (William Casarin)
- Fixed a bug where following a user might not work due to poor connectivity (William Casarin)
- Fixed audio in video playing twice (Bryan Montz)
- Fixed disappearing text on iOS17 (cr0bar)
- Fixed issue where hashtags were leaking in DMs (William Casarin)
- Fixed issue where reposts would sometimes repost the wrong thing (William Casarin)
- Fixed issues where sometimes there would be empty entries on your profile (William Casarin)
- Fixed nav bar color on login, eula, and account creation (ericholguin)
- Fixed nostr reporting decoding (William Casarin)
- Fixed nostrscript not working on smaller phones (William Casarin)
- Fixed old notifications always appearing on first start (William Casarin)
- Fixes issue where username with multiple emojis would place cursor in strange position. (Jericho Hasselbush)
- Hide quoted or reposted notes from people whom the user has muted. (#1216) (Daniel D’Aquino)
- Hide users and hashtags from home timeline when you unfollow (William Casarin)
- Make blurred videos viewable by allowing blur to disappear once tapped (Daniel D’Aquino)
- Mute hellthreads everywhere (William Casarin)
- Show QRCameraView regardless of same user (Suhail Saqan)
- Show longform previews in notifications instead of the entire post (William Casarin)
- Stop tab buttons from causing the root view to scroll to the top unless user is coming from another tab or already at the root view (Daniel D’Aquino)
- don't cutoff text in notifications (William Casarin)
- endless connection attempt loop after user removes relay (Bryan Montz)
- icon color for developer mode setting is incorrect in low-light mode (Bryan Montz)
- relay detail view is not immediately available after adding new relay (Bryan Montz)
Removed
- Remove following Damus Will by default (William Casarin)
- Remove old @ and & hex key mentions (William Casarin)
-
@ fa0165a0:03397073
2023-10-06 19:25:08I just tested building a browser plugin, it was easier than I thought. Here I'll walk you through the steps of creating a minimal working example of a browser plugin, a.k.a. the "Hello World" of browser plugins.
First of all there are two main browser platforms out there, Chromium and Mozilla. They do some things a little differently, but similar enough that we can build a plugin that works on both. This plugin will work in both, I'll describe the firefox version, but the chromium version is very similar.
What is a browser plugin?
Simply put, a browser plugin is a program that runs in the browser. It can do things like modify the content of a webpage, or add new functionality to the browser. It's a way to extend the browser with custom functionality. Common examples are ad blockers, password managers, and video downloaders.
In technical terms, they are plugins that can insert html-css-js into your browser experience.
How to build a browser plugin
Step 0: Basics
You'll need a computer, a text editor and a browser. For testing and development I personally think that the firefox developer edition is the easiest to work with. But any Chrome based browser will also do.
Create a working directory on your computer, name it anything you like. I'll call mine
hello-world-browser-plugin
. Open the directory and create a file calledmanifest.json
. This is the most important file of your plugin, and it must be named exactly right.Step 1: manifest.json
After creation open your file
manifest.json
in your text editor and paste the following code:json { "manifest_version": 3, "name": "Hello World", "version": "1.0", "description": "A simple 'Hello World' browser extension", "content_scripts": [ { "matches": ["<all_urls>"], "js": ["hello.js"] //The name of your script file. // "css": ["hello.css"] //The name of your css file. } ] }
If you wonder what the
json
file format is, it's a normal text file with a special syntax such that a computer can easily read it. It's thejson
syntax you see in the code above. Let's go through what's being said here. (If you are not interested, just skip to the next step after pasting this we are done here.)manifest_version
: This is the version of the manifest file format. It's currently at version 3, and it's the latest version. It's important that you set this to 3, otherwise your plugin won't work.name
: This is the name of your plugin. It can be anything you like.version
: This is the version of your plugin. It can be anything you like.description
: This is the description of your plugin. It can be anything you like.content_scripts
: This is where you define what your plugin does. It's a list of scripts that will be executed when the browser loads a webpage. In this case we have one script, calledhello.js
. It's the script that we'll create in the next step.matches
: This is a list of urls that the script will be executed on. In this case we have<all_urls>
, which means that the script will be executed on all urls. You can also specify a specific url, likehttps://brave.com/*
, which means that the script will only be executed on urls that start withhttps://brave.com/
.js
: This is a list of javascript files that will be executed. In this case we have one file, calledhello.js
. It's the script that we'll create in the next step.css
: This is where you can add a list of css files that will be executed. In this case we have none, but you can add css files here if you want to.//
: Text following these two characters are comments. They are ignored by the computer, You can add comments anywhere you like, and they are a good way to document your code.
Step 2: hello.js
Now it's time to create another file in your project folder. This time we'll call it
hello.js
. When created, open it in your text editor and paste the following code:js console.log("Hello World!");
That's javascript code, and it's what will be executed when you run your plugin. It's a simpleconsole.log
statement, which will print the text "Hello World!" to the console. The console is a place where the browser prints out messages, and it's a good place to start when debugging your plugin.Step 3: Load and launch your plugin
Firefox
Now it's time to load your plugin into your browser. Open your browser and go to the url
about:debugging#/runtime/this-firefox
. You should see a page that looks something like this:Click the button that says "Load Temporary Add-on...". A file dialog will open, navigate to your project folder and select the file
manifest.json
. Your plugin should now be loaded and running.Go to a website, any website, and open the inspector then navigate to the console. You'll find the inspector by right-clicking anywhere within the webpage, and click "Inspector" in the drop-down menu. When opening the console you might see some log messages from the site you visited and... you should see the text "Hello World!" printed there, from our little plugin! Congratulations!
Chrome
Open your browser and go to the url
chrome://extensions/
. Click the button that says "Load unpacked". A file dialog will open, navigate to your project folder and select the folderhello-world-browser-plugin
. Your plugin should now be loaded and running.Note the difference, of selecting the file
manifest.json
in firefox, and selecting the folderhello-world-browser-plugin
in chrome. Otherwise, the process is the same. So I'll repeat the same text as above: (for those who skipped ahead..)Go to a website, any website, and open the inspector then navigate to the console. You'll find the inspector by right-clicking anywhere within the webpage, and click "Inspector" in the drop-down menu. When opening the console you might see some log messages from the site you visited and... you should see the text "Hello World!" printed there, from our little plugin! Congratulations!
As you can see this isn't as complicated as one might think. Having preformed a "Hello-World!"-project is a very useful and valuable first step. These setup steps are the basics for any browser plugin, and you can build on this to create more advanced plugins.
-
@ 42342239:1d80db24
2024-07-28 08:35:26Jerome Powell, Chairman of the US Federal Reserve, stated during a hearing in March that the central bank has no plans to introduce a central bank digital currency (CBDCs) or consider it necessary at present. He said this even though the material Fed staff presents to Congress suggests otherwise - that CBDCs are described as one of the Fed’s key duties .
A CBDC is a state-controlled and programmable currency that could allow the government or its intermediaries the possibility to monitor all transactions in detail and also to block payments based on certain conditions.
Critics argue that the introduction of CBDCs could undermine citizens’ constitutionally guaranteed freedoms and rights . Republican House Majority Leader Tom Emmer, the sponsor of a bill aimed at preventing the central bank from unilaterally introducing a CBDC, believes that if they do not mimic cash, they would only serve as a “CCP-style [Chinese Communist Party] surveillance tool” and could “undermine the American way of life”. Emmer’s proposed bill has garnered support from several US senators , including Republican Ted Cruz from Texas, who introduced the bill to the Senate. Similarly to how Swedish cash advocates risk missing the mark , Tom Emmer and the US senators risk the same outcome with their bill. If the central bank is prevented from introducing a central bank digital currency, nothing would stop major banks from implementing similar systems themselves, with similar consequences for citizens.
Indeed, the entity controlling your money becomes less significant once it is no longer you. Even if central bank digital currencies are halted in the US, a future administration could easily outsource financial censorship to the private banking system, similar to how the Biden administration is perceived by many to have circumvented the First Amendment by getting private companies to enforce censorship. A federal court in New Orleans ruled last fall against the Biden administration for compelling social media platforms to censor content. The Supreme Court has now begun hearing the case.
Deng Xiaoping, China’s paramount leader who played a vital role in China’s modernization, once said, “It does not matter if the cat is black or white. What matters is that it catches mice.” This statement reflected a pragmatic approach to economic policy, focusing on results foremost. China’s economic growth during his tenure was historic.
The discussion surrounding CBDCs and their negative impact on citizens’ freedoms and rights would benefit from a more practical and comprehensive perspective. Ultimately, it is the outcomes that matter above all. So too for our freedoms.
-
@ 3c9712ff:14fecbc4
2024-09-02 06:33:01The most challenging aspect of running a successful company is risk mitigation. At any time, due to events which are often unforeseen, a bad year or quarter mixed with poor treasury management can make a company insolvent.
Defined as the process of overseeing an organization's liquidity, financial instruments, banking, and disbursement activities, treasury management ultimately revolves around one key question: How can a company use its already received cash flows to mitigate unforeseen risks?
Failing to address this can lead to adverse liquidity issues, even for companies that excel in their own operations. In this paper, I will explore the reasons why the imminent devaluation of fiat currency through inflation automatically places businesses at a disadvantage whilst also subjecting investors to unwarranted risks, and highlight why bitcoin can be a potential solution.
**Section 1: The issue with current treasury strategy **
A downturn in an economy always reinforces the fundamental rule of business: cash is king.
Only cash can pay creditors, payroll and expenditures, and at first thought one would assume that a company should accumulate as much as possible to protect against potential downturns.
However, what we learn from a relatively early age is that idled cash loses purchasing power each year through inflation. Even a thriving company generating $1 billion in annual sales and holding this amount on its balance sheet will lose $70 million of purchasing power at a 7 per cent inflation rate.
Inflation therefore creates a powerful and direct incentive for companies to hold as little endowment as possible and decapitalise into short term investments which offer some form of yield to combat this.
The rules of the game are simple. Whatever alternative chosen still has to be low risk and liquid enough so current liabilities can be paid when they fall due. The irony of the situation is companies need a cash-like instrument but cannot in any way hold cash.
The next best alternative becomes sovereign debt, or at the very least high-grade company bonds as they are both relatively safe and liquid, but this strategy runs into many of the same problems as holding cash in a bank account.
Taking the current US 10 Year Treasury Note as an example with a coupon rate sitting at 4.7%, we can see this doesn’t actually fix the problem inflation causes. This strategy only gives investors a taxable yield of 470 basis points, which is more likely a 350-bps yield after tax. Again, if investors have parted with their capital and taken on additional risk through debt purchasing their money should be outpacing inflation.
It is self-evident that the risk-free rate is far from acceptable for investors, nor should it be.
As an investor deciding to forgo the risk-free rate and opt to invest in the stock market, you are doing so in pursuit of an additional (market risk) premium which comes with the added risk.
Since the market risk premium puts the investor’s return expectation around the 12-14% mark, company CFOs face the daunting task of delivering this annual return with interest rates at 5% and inflation at 7%.Understanding if they do nothing they are diluting value, corporate teams now have to decapitalise in other ways, so how do they do it?
The three strategies predominantly used by publicly listed companies to decapitalise and accrete value are 1) Issue dividends 2) Stock/Share buybacks 3) Acquire other companies.
**1. Issue Dividends ** If the objective is to distribute money to shareholders, why not simply give the money directly to them? This approach is particularly favourable for large blue-chip companies.
Dividend expectations become sticky, making it challenging for CFOs to disburse funds sporadically, especially when the company performs well and sets strong expectations for future disbursement. For this reason, we see dividends ultimately increase overtime as seen below.
The bigger issue however is that issuing dividends doesn't help accrete Earnings Per Share (EPS).
S&P 500 Dividends from 1999 to 2023. Source: Included
**2. Stock/Share Buyback ** A more realistic treasury strategy for CFOs seeking EPS accretion is a share buyback.
Buying back a company's stock reduces the denominator in the EPS calculation, thereby increasing the overall figure. A company can either borrow or issue debt yielding around 4% and repurchase shares, which may appreciate by 10% in a year, primarily due to inflation.
This approach can result in an immediate 6% EPS increase which satisfies shareholders. The focus of the treasury team in this game revolves more around the actual cost of the debt issuance than generating inherent value.As shown below, stock buybacks exhibit a strong correlation with the ebbs and flows of credit cycles. These cycles are influenced by artificially low interest rates, which lead to easily accessible funds.
This further underscores the point made earlier that financial professionals are astute and will always respond to incentives. Share buybacks tend to peak when money is cheap, historically occurring in 2007, 2009-2019, and 2020.
S&P 500 Stock Buybacks from 1990 to 2023. Source: Included
**3. Acquisition of companies ** A third alternative available to companies is to acquire other businesses.
A merger or acquisition (M&A) accomplishes EPS growth through numerator increase which is opposite to a share buyback. Through M&A deals, earnings per share for each shareholder increase, assuming all other factors remain constant.
Since M&A transactions are predominantly financed through debt, it's no coincidence that the pattern of M&A deals follows that of the short-term business cycle, as illustrated below.
The concern with the three strategies above is the imminent infusion of leverage. Substantial debt may be optimal for our largest companies in the current economy, but for most this doesn’t outweigh the substantial insolvency and liquidity risk it brings.
Investors need an alternative which can still accrete value and isn’t at the whim of short term credit cycles.
*Section 2: How Bitcoin Can Change This *
Bitcoin stands as the antithesis to the treasury strategies of the last half-century. It presents a method that genuinely rewards companies for maintaining endowments and setting aside capital for future needs. Instead of resorting to borrowing and navigating the yield curve in search of a suboptimal taxable return, why not invest in the most exceptional store of value ever created?
Bitcoin offers the best of both worlds: the utility of a monetary asset with unrivalled scarcity, all while avoiding the credit and counterparty risks associated with sovereign debt.
Bitcoin's ease of transfer and global acceptability allow for rapid movement, sale, and exchange worldwide, serving as an effective hedge against liquidity risk or a means to reduce tax burdens imposed by resourceful governments.
Only a handful of companies worldwide possess a strategic advantage in terms of the products or services they offer.
Most technology or pharmaceutical businesses churn out similar products at competitive prices, often indistinguishable from their rivals. However, an optimal treasury strategy cannot be forged, manipulated, or concealed over extended periods.
For instance, if a CFO at a tech company listed in the S&P 500 simply wants to invest in sovereign debt or exchange-traded funds (ETFs), why should any investor, let alone an institution, entrust their funds to that company? Businesses aiming to set themselves apart from competitors must provide a service which enhances enterprise value.
The prevailing argument against S&P500 companies using Bitcoin as a treasury asset is its volatility, which at first glance appears valid. Corporate finance teams, along with a multitude of advisors, bankers, and consultants, are handsomely compensated to employ various financial instruments to mitigate volatility and guard against downside risk, so why would anyone willingly increase their exposure to the potential of a sudden market drop?
The answer lies in a fair comparison of Bitcoin's potential as a treasury asset against relevant financial instruments like sovereign or corporate debt, as discussed in the previous section. When you claim allocating 1% of your portfolio to Bitcoin is too risky, yet you're willing to leverage your company significantly with debt to acquire another firm, hoping to time the market correctly and avoid disaster, it raises the question: How do we define risk?
Expanding on this Bitcoin-debt comparison, it must be acknowledged that companies often hold these instruments for extended periods, which mitigates much of the short-term volatility. Bitcoin's primary advantage over debt securities is that it provides a tax-deferred return well above inflation, let alone the market's risk-premium hurdle rate.
Examining the annual return chart since 2010 below, it's evident that Bitcoin's price has increased by a staggering 83% since its peak in 2017.
| 2017 | 2018 | 2019 | 2020 | 2021 | 2022 | 2023 | | --- | --- | --- | --- | --- | --- | --- | | 1,331% | -73% | 95% | 301% | 90% | -81% | 146% | Bitcoin yearly ROI
It's possible the annual volatility of the past seven years will be too high for some investors.
But, what if I told you about a treasury asset that consistently delivered positive returns, surpassing market expectations, all without overleveraging a company's risk tolerance? What if I said this asset was fungible, durable, portable, easy to value and verify, and liquid enough to be sold within minutes? You might find this hard to believe, as you'd likely argue such an asset would already be priced correctly and wouldn't offer room for significant value gains. It’s these characteristics which make Bitcoin a desirable treasury asset for companies however it’s still priced incorrectly.
We are still in the early stages of Bitcoin's ascent, and volatility is an inherent characteristic of an asset which hasn't been fully priced for its utility. Bitcoin's utility value hasn't changed since October 2008; it's merely the market value catching up.
The strict limits of scarcity, such as Bitcoin's hard cap of 21 million coins, have never been seen before. CFOs must ask themselves whether they have the risk tolerance to allocate just 1% in this relatively nascent market. The reason not all companies have done so already is simple: current accounting rules are negatively biased against Bitcoin. But this won't last for long.
**Section Three: The Leap to Fair Value Accounting **
For the past decade, one of the main criticisms against Bitcoin as a treasury asset has been the challenge of accurately representing it in a company's financial statements. The good news? This is about to change. Effective from December 2024, publicly traded companies in the United States will adjust how they measure Bitcoin from Indefinite Intangible Accounting to Fair Value Accounting. To simplify for those less familiar with accounting, let's break this down.
Currently, both Generally Accepted Accounting Principles (GAAP) and International Financial Reporting Standards (IFRS) view Bitcoin through the lens of Indefinite Intangible Accounting under IAS 38 (IFRS 138). Under this standard, Bitcoin is measured on the balance sheet at cost (the total amount spent on purchasing Bitcoin in dollars) and is only revalued if the price of Bitcoin decreases during the accounting period. This conservative accounting approach is designed to assess the value of assets such as patents, copyrights, goodwill, and intellectual property.
However, this restrained method of measurement has discouraged CFOs from adopting Bitcoin. It has also posed challenges for investors.
Suppose two companies acquire Bitcoin at different times; in that case, their financial statements aren't comparable, creating discrepancies between them.
Table 1 - Balance Sheet Effect (Intangible Accounting)
| | Company A | Company B | | --- | --- | --- | | Bitcoin Bought| 10 | 8 | | Date of Purchase | 10 March 2023| 16 April 2023 | | Price at Purchase Date (USD) | $20,200 | $30,500 | | Value on Balance Sheet (16 April) | $202,000 | $244,000 |
The table above reveals several important points. From an investor's perspective, Company A seems to hold less Bitcoin compared to Company B, despite the reality being the opposite. Furthermore, when examining Profit and Loss, the current accounting system attributes any markdown in the value of Bitcoin on the balance sheet as an operating expense.
As someone with a background in auditing, I recognise EBITDA is not a Generally Accepted Accounting Principles (GAAP) or International Financial Reporting Standards (IFRS) metric and isn't typically included in most income statements. However, investors often seek EBITDA for a clearer understanding of a company's overall financial health, considering its operational and financing value.
To illustrate this with another example, suppose both Company A and Company B have the same operating income, but Company A has experienced a $100,000 loss on Bitcoin since the last reporting period.
An overview of the income statement would appear as follows:
Table 2 - Profit and Loss Effect (Profit and Loss Accounting)
| | Company A | Company B | | --- | --- | --- | | Operating Income | $550,000 | $500,000 | | Operating Expenses | $400,000 | $300,000 | | EBITDA | $150,000 | $200,000 | | Other Gains and Losses | - | - | | Net Profit | $150,000 | $200,000 | Included in this figure is the $100,000 loss on Bitcoin
From this perspective, Company A's operations might appear to have underperformed by $50,000. However, this doesn't provide an accurate picture of a company's actual operational performance. It can lead to the incorrect allocation of capital and misguided investment decisions.
IFRS 13 Fair Value Accounting addresses these issues. Under IFRS 13, assets are marked both up and down on the balance sheet at the end of each reporting period. While assets are still initially measured at cost when purchased by the company, their fair value is measured using a revaluation account that is presented alongside the asset on the balance sheet. This change ensures investors can always discern which companies own more Bitcoin at the end of a reporting period.
The revised table below illustrates this concept:
Table 3 - Balance Sheet Effect (Fair Value Accounting) | | Company A | Company B | | --- | --- | --- | | Bitcoin Bought | 10 | 8 | | Date | 10 March 2023 | 16 April 2023 | | Price at Purchase Date | $20,200 | $30,500 | | Value on Balance Sheet Purchase Date | $202,000 | $244,000 | | Value on Balance Sheet (16th April) | $305,000 | $244,000 |
Fair Value Accounting from the perspective of Profit and Loss modifies how investment gains or losses are reflected in net income. Instead of booking losses against operating profit, they are now categorized under 'other gains or losses'. This change enhances transparency for investors regarding a company's operational health.
When we adjust Table 2 to apply Fair Value Accounting principles, we can observe Table 4 still shows a lower net profit, but it provides users of the financial statements with more insight into the reasons behind this.
An investor might recognize that Company A is a more attractive investment than Company B because the lower net profit is primarily due to losses related to Bitcoin, rather than the core operating performance of the business.
Table 4 - Profit and Loss Effect (Fair Value Accounting)
| | Company A | Company B | | --- | --- | --- | | Operating Income | $550,000 | $500,000 | | Date | $300,000 | $300,000 | | Price at Purchase Date | $250,000 | $200,000 | | Value on Balance Sheet Purchase Date | ($100,000) | - | | Value on Balance Sheet (16th April) | $150,000 | $200,000 | We would expect a note next to this in Financial Statements outlining where the loss comes from
Emerging from this change in accounting standard a new opportunity for shareholders to encourage management to hold Bitcoin.
As diversification in a portfolio reduces the emphasis placed on a single company’s correlation coefficient, as finance theory teaches, we should encourage the CFOs of companies in our portfolios to take calculated risks and explore new strategies for increasing EPS without burdening themselves with significant debt.
I expect at first these positions should be small (around 1%), but over time Bitcoin can help deleverage our public markets and decrease risk for everyday investors.
Colin Gifford
November 2023
**References ** Author: The Bitcoin Layer
Video Title: Bitcoin Revolutionizes Corporate Finance | Michael Saylor
Date of Publication: October 7th
Website or Platform: YouTube
URL: https://www.youtube.com/watch?v=RTiRf1NDEr8&t=3772s
-
@ 9fec72d5:f77f85b1
2024-07-18 19:38:47Each relay selects a branch from above and starts serving.
Some big machines in the top layers can handle more. Smaller machines in layers below are needed for decentralization and scalability.
Some top layer machines can act in sync only mode, efficiently distributing notes among layers.
Relay or the admin posts a special kind for advertisement of the relay:
```
{ "pubkey": "...pubkey of admin or the relay itself..", "kind": 30202, "tags": [ ["d","..10"], ["ip4","111.222.33.44:443","primary"], ["ip6","abc:def::443","backup"], ], ... } ```
The above example says this relay will handle the note id's that are ending with bits ..10. In this case it is going to handle about 1/4th of the network.
Primary way of reaching at this relay is through ip 111.222.33.44. There is also a backup server.
Clients can accept this advertisement based on web of trust or historical reliability of the npub. Or other npubs can measure the reliability of this relay and send reactions to this note. Clients then can see these reactions and rank these services.
Solves: - Possible future DNS ban issues: I don't know when or if DNS will be an issue for Nostr. The above design can help with the situation.
-
Scalability: If 1 million users join the network at the same time, the machines that are handling ".." i.e. all of the traffic may fail. But if the clients are using relays on other layers, the load will be efficiently distributed to many machines. The failure of layer 0 and 1 will not stop the network. Every layer can operate independently without the other layers (in theory).
-
Traffic efficiency: A client has to query many relays, depending on what it wants to do. It may choose to stay efficient (talk to top layers) on mobile traffic, or it may choose to help decentralization over wifi. The notes that match the queries will not be repeated as many times as current design, because relays will hold a portion of the network.
-
Storage efficiency: Relay operators can just save a part of the network that they are responsible for, on NVME drives. The rest of the network they can save in hard drives. In case of major failure the hard drives can still have a copy.
-
Speed: Since the notes will come from many different relays at the same time, there may be a slight speed increase.
-
Decentralization: If the top layer relays collude and start banning the other layers can still continue to serve notes.
-
Backup relay: In case a relay instance fails, users can find the backup server on the same note.
-
Zero down time migration: The ability to define a backup server allows zero down time migrations. An operator can set the primary to the new server and backup to the old server and do migration and continue without interruption.
-
Efficient sync among servers: A relay has to sync with 3 servers, 1 above, 2 below. But it can do 6 or 9 depending on how much reliability it wants.
-
Writing to logN relays: Clients has to write to logN relays (i.e. 1 relay in each layer), to effectively distribute their notes to everyone and also to help with decentralization.
-
-
@ cd408a69:797e8162
2023-09-14 13:08:47Nostrasia Hackathon
Welcome FOSS hackers and creatives who care deeply about freedom technology!
自由のテクノロジーに深い関わりたい FOSS ハッカーとクリエイター、あつまれ!
We're joining forces with Bolt.Fun for a month-long hackathon bridging Bitcoin and NOSTR (Notes and Other Stuff Transmitted by Relays), culminating with a special three day sprint and live event in Tokyo at the Nostrasia Conference.
私たちは、Bolt.Fun と協力して、ビットコインと Nostrを橋渡しする ハッカソンを、1 か月間かけて開催します。 クライマックスは東京で開催されるNostrasia Tokyo が舞台。3日間の特別なスプリントとライブ イベントで最高潮に達します。
Be a Part of the Early Days of Nostr
Nostr の創成期を共に作り上げましょう
Help build the future of Nostr! Like the early days of Bitcoin or of the Internet, Nostr is nascent open technology shaping new types of social experiences to connect people across the globe. It carries a foundation of principles similar to Bitcoin, like decentralization, simplicity, and censorship-resistance.
Nostr の未来を築くのに協力してください!ビットコインやインターネットの初期と同じように、Nostr は世界中の人々をつなぐ新しいソーシャル体験を形成するオープン テクノロジーの初期段階にあります。 Nostr には「分散化」「シンプルさ」「検閲耐性」など、ビットコインと同様の原則が組み込まれています。
Orange-Pill people through the Purple-Nostr-Pill
オレンジピル(ビットコイン)から紫の Nostr のピルへ
Bitcoin and Nostr communities are in synergy. What started as a social protocol is quickly transforming into a space for exploration on ways to support content creators through bitcoin lightning micro payments, often referred to as zaps. Bitcoin integration to the nostr protocol strengthens Bitcoin's use case as a currency of exchange. It carves new paths to a culture of value4value.
ビットコインと Nostr のコミュニティは相乗効果を発揮します。 Nostr はソーシャルプロトコルとしてはじまりましたが、今では Zap (ビットコイン の ライトニング マイクロペイメント)を通じてコンテンツ クリエイターをサポートする方法を模索する空間へと急速に進化しています。 Nostr プロトコルにビットコインが組み合わさることで、交換通貨としてのビットコインの働きが強化されます。 それは、"value4value" の文化への新しい道を切り開くでしょう。
Help People HODL their Keys (Social+Monetary)
人々が自分のキーを HODL (長期保有)できるように支援します (ソーシャル + 金銭的に)
Nostr exists outside of the rule of platforms and those who seek to control them. HODLing your nostr keys is hodling your identity and social graph, outside of KYC. By helping develop and educate on NOSTR, you are helping people escape walled gardens & gain control and choice over their identities & their money. The Internet, over time, has become centralized, help Nostr stay decentralized by supporting the growth of an ecosystem of apps, websites, microapps, relay services...
Nostr はプラットフォームやそれを制御しようとする人々の支配の外にあります。 Nostr keys を持つことは、KYC (本人確認)以外であなたのアイデンティティとソーシャル グラフを保持することになります。 Nostr の開発や教育に貢献することは、人々が束縛から解放され、アイデンティティやお金に対する主導権を得られるよう支援することにもなるのです。 時間の経過とともに集中化されてきたインターネットですが、Nostr のアプリ/Web サイト/マイクロアプリ/リレー サービスのエコシステムの成長をサポートすることで、Nostr の分散化を維持できるようになります。
Permissionless Building
許可を必要としない構築
Opportunities abound in an environment ripe for innovation:
- Develop & design new nostr white label clients, middleware, microapps...
- Help improve existing Nostr FOSS projects
- Contribute directly to protocol development through NIPs (Nostr Implementation Possibilities)
- Encourage nostr and bitcoin adoption through art, education, and any way you like
イノベーションの機が熟した環境には、チャンスが溢れています。
- Nostr の真新しい クライアント、ミドルウェア、マイクロアプリを開発したりデザインする
- 既存の Nostr FOSS プロジェクトの改善に寄与する
- NIP (Nostr Implementation Possibilities) を通じたプロトコル開発に直接貢献する
- 芸術、教育、その他好きな方法を通じて Nostr とビットコインの普及を推進する
Hack in a Supportive Environment
サポートされた環境でハックしよう
We have a growing list of knowledgeable people with skin-in-the-game to mentor and support your journey. Once your project matures, you may also have 1-on-1 guidance to help you reach your vision and discover ways of growing and funding it.
私たちは、あなたの道のりを指導しサポートしてくれる知識豊富なメンターを増やしています。 プロジェクトが成熟した暁には、1対1のガイダンスを受けられる可能性もあります。それは、あなたのビジョンを達成し、成長させて資金を得る方法を発見するのに役立つでしょう。
Nostr has a blossoming community open to innovation. It is also a great testing ground, as people in the community are open to giving and receiving feedback. It is an environment encouraging conversation on feature ideas as well as possible solutions to social media issues and product bugs.
Nostr には、イノベーションに対してオープンで、発展しているコミュニティがあります。 コミュニティの人々はフィードバックの授受にオープンであるため、優れた実験の場にもなります。 機能のアイデアや、ソーシャル メディアの課題や製品のバグの解決策についての会話を促進する環境です。
NostrHack Tracks
You have 3 options
NostrHack Tracks には3つのオプションがあります
Track 1: Builder's Track - Reimagine Nostr
トラック1 : ビルダーのトラック - Nostr を再考しよう
If you can think of it, it can be engineered! Nostr encourages permissionless building while staying mindful of interoperability and network support. Help BUIDL, design, and improve an area you are passionate about. Reimagine and BUIDL features, tools, clients... Help solve issues and create new experiences in social media.
思いつくことができれば、エンジニアリングできる! Nostr は、相互運用性とネットワーク サポートに留意しながら、パーミッションレスな構築 (BUIDL) を奨励しています。 あなたが情熱を注いでいる分野での構築、設計、改善に貢献してください。 機能やツール、クライアントを再考して構築 (BUIDL) し、ソーシャル メディアでの課題を解決して新しい体験を生み出すのに協力してください。
Possibilities...
これを踏まえて…
BUILD on the NOSTR Protocol
The Nostr Implementation Possibilities (NIPs) are optional protocol features anyone can add to their clients. Improve and strengthen existing NIPs or build on new ones. NOSTR is a balance of simplicity, interoperability, backward-compatibility and innovation.
NIPs は、誰でもクライアントに追加できるオプションのプロトコル機能です。 既存の NIP を改善および強化するか、新しい NIP を構築してください。 Nostr は、シンプルさ、相互運用性、下位互換性、革新性のバランスを保っています。
Focus on UX
Nostr is made up of a wide range of clients and tools. To make NOSTR scalable, you can help improve its user experience and education.
Nostr は幅広いクライアントとツールで形成されています。 Nostr をスケーラブルにするために、UX と教育の改善に協力してください。
Help shape a Web of Trust
Nostr cares about removing the KYC tied to our identities. To use Nostr you do not need to give up your phone number, email, financial information, or any metadata tied to your real world identity to be later harvested and sold. You are not the product. What are ways that trust can be earned to prevent impersonation, spam...?
Nostr は、私たちの身元に関連付けられた KYC (個人情報)を取り除けるようにしています。 Nostr を使用しても、電話番号、電子メール、財務情報、または現実世界のアイデンティティに関連付けられたメタデータを、収集されたり販売されたりして手放すことになる心配がありません。 あなたは商品ではないのです。 その中で、なりすましやスパムを防ぐために、信頼を獲得するにはどうすればよいでしょうか...?
NIP05/Nostr address
One of the solutions to build a web of trust used today, is to tie your nostr hex public key to a domain. Although this makes it harder for bots to have nostr addresses, it is not a perfect solution. Domains are centralized through DNS. To help people who do not have their own domains or cannot easily add a NIP05 on their sites, your nostr address can be hosted as a service along with other people's. At this moment, you can highlight just one nostr address per profile. In the future, could it include your website, where you work, and other identifiers... What are other possible solutions?
現在使用されている信頼獲得のための解決策の 1 つは、Nostr の HEX 公開鍵をドメインに結び付けることです。 これにより、完璧な解決策ではないものの、bot などが Nostr アドレスを持つことが難しくなります。 ドメインは DNS を通じて一元化されています。 独自のドメインを持っていない人や、自分では NIP-05 を簡単に追加できない人のために、あなたの Nostr アドレスをサービスとして他の人のものと一緒にホストすることも可能です。 現時点では、プロフィールごとに1つの Nostr アドレスのみを強調表示できますが、将来的には、Web サイト、勤務先、その他の識別情報も含められるようになる可能性があります...この他にも考えられる解決策は何かありますか?
On Decentralization & Discoverability
分散化と発見可能性について
Your identity in NOSTR is tied to your keys, but your information needs to be shared and found across a network of relays. To promote decentralization and censorship resistance, relays need to be easy to setup, lightweight, and sustainable. Relays get to choose what information passes through them, so they are also a form of spam prevention that could potentially also become censoring, so both the relay-runners and the individuals connecting to relays need to have choice and policies cannot be homogenous one-size-fits-all. What are possible solutions to make setting up relays easier, to make running a relay sustainable, to have new ways of discovering information...
Nostr での ID はキーに関連付けられていますが、その情報はリレーのネットワーク全体で共有され、検索できる必要があります。 分散化と検閲耐性を促進するために、リレーはセットアップが簡単で、軽量で、持続可能である必要があります。 リレーは通過する情報を選択できるため、スパム防止の一形態である一方で検閲にもなり得ます。そのため、リレー管理者とリレーに接続する個人の両方に選択権が必要で、ポリシーが全てに対し画一的になってはいけません。 リレーのセットアップを容易にし、リレーの実行を持続可能にし、情報を発見する新しい方法を実現するには、どのような解決策が考えられるでしょうか...?
Buidl tools to connect to Git, as a decentralized alternative to GitHub
GitHub の分散型代替手段として、Git に接続するための BUIDL ツール
Media Uploads
To keep relays lightweight, images are hosted by uploading them to the web, and keeping only the links to them in the data within individual nostr notes. This has led to developing image uploading services specific to nostr, but they carry the risk of centralization or censorship. Some product makers and relay runners are looking into direct uploads to Cloud services. What are possible solutions to the handling of media (images, videos, music...)?
リレーを軽量に保つために、画像は Web にアップロードしてホストされ、各投稿のデータには画像へのリンクのみが保持されます。そんな中で、Nostr に特化した画像アップロード サービスが開発されましたが、集中化や検閲のリスクが伴います。 一部のプロダクト開発者やリレー管理者は、クラウド サービスへの直接アップロードを検討しています。 メディア(画像、ビデオ、音楽など)の処理について、考えられるよい解決策はありますか?
Social Signals
People have the choice to block and mute others, this gives signals to relays, which can reenact policies based on those and other signals. Relays need to be able to differentiate real signals from those wanting to game the system for censorship. Relay runners need to have the capacity to make decisions on what to allow or reject.
ユーザーは他のユーザーをブロックしたりミュートできます。ユーザーの設定内容はリレーに送信され、リレーはその設定に基づいてそれぞれのポリシーを再現できます。 リレーは、実際の設定と、検閲のためにシステムを操作しようとする設定を区別する必要があります。 リレーの管理者には、何を許可し、何を拒否するかを決定する能力が必要です。
Track 2 : Marketplaces & Value4Value
Make freedom of exchange fun again! Nostr extends beyond social. It is integrating ways for content creators to be supported through lightning micropayments, called zaps, for their creations. The possibilities of building niche value4value economies through the exchange of products, services, and ideas, is growing through various avenues: Marketplaces, fundraising, blogs, music, streaming... devise new robust ways of integrating NOSTR and Bitcoin of monetary and skill exchange. Seek to explore distributed, digital reciprocity and free trade. Encourage a culture of value4value.
自由な交流を再び楽しく! Nostr はソーシャルを超えて広がります。 Zap と呼ばれるマイクロペイメントを通じて、コンテンツクリエイターの作品をサポートできる方法を兼ね備えています。 製品、サービス、アイデアの交換を通じてニッチな価値と価値(value4value)の経済を構築する可能性は、さまざまな手段を通じて拡大しています : マーケットプレイス、資金調達、ブログ、音楽、ストリーミングなど... Nostr とビットコインを組み合わせて、金銭とスキルの交換を行う新しい堅牢な方法を考案します。分散型、デジタル相互主義、自由貿易を探究してください。 価値対価値(value4value)の文化を促進してください。
A value4value culture is not only about the individuals using NOSTR products and services, but also about the developers and creatives building sustainable projects. What are ways of sustaining NOSTR through Bitcoin that do NOT make the individual user the product and that are privacy mindful?
value4value の文化は、Nostr の製品やサービスを使用する個人だけでなく、持続可能なプロジェクトを構築する開発者やクリエイターにも関係します。 個人ユーザーを製品にすることなくプライバシーに配慮しながら、ビットコインを通じて Nostr を持続させる方法は何ですか?
Possibilities...
On Social and Economic Signals
Zaps
Many nostr clients have implemented lightning zap payments. Imagine instead of liking a nostr note, you can zap someone's note and they can receive bits/sats in appreciation for their content. It is a strong signal to creators of the kind of content their audiences are looking for. The Apple App Store has recently banned the zapping of specific notes, per Apple's policy that makes the sale of digital content prohibited except when paid through their services. Fortunately, Nostr exists in many decentralized forms outside of app stores and the community is creating new and innovative ways to send bitcoin and free speech from relay to relay, circumventing barriers as they appear. What are solutions that can make NOSTR and zaps ubiquitous?
多くの Nostr クライアントが Zap を導入しています。Nostr での投稿を「いいね」する代わりに Zap すると、その内容に対する感謝としてビットコイン(サトシ)を受け取ることができるイメージです。 これは、フォロワーがどのような種類のコンテンツを求めているかをクリエイターに伝える強力なシグナルになります。 Apple App Storeは最近、サービスを通じて支払われる場合を除きデジタルコンテンツの販売を禁止するというAppleのポリシーに従い、特定の投稿への Zap を禁止しました。 幸い、Nostr は多くが App Store の外で分散型で存在しているため、コミュニティは障壁を回避しながら、ビットコインと言論の自由をリレーからリレーに送信するための革新的な方法を生み出しています。 Nostr と Zaps をユビキタスにするソリューションとは何ですか?
Track 3 : Empower Communities
Give choice and control back to the individual! Create paths forward to help onboard millions of new users and restore free and uncensored speech to the world
選択とコントロールを個人に返そう。 何百万人もの新規ユーザーの参加を支援し、自由で検閲されていない言論を世界に取り戻すための道筋を作り出してください。
Possibilities...
On Security, Privacy & Self-Custody
Private Communication
Direct Messages on NOSTR are encrypted, but metadata is leaked. If someone's key is compromised, whoever has access to that account can read those messages. Integrating secure and reliable encrypted communication protocols, like the SimpleX messaging protocol, is especially desired by the community, as many in Nostr are aware of the risks of surveillance, authoritarianism, government and Big Tech overreach... Private communication is important for individual rights, in particular for activists and journalists across the globe.
Nostr のダイレクト メッセージは暗号化されていますが、メタデータは漏洩します。 誰かのキーが侵害された場合、そのアカウントにアクセスできる人は誰でもそれらのメッセージを読むことができてしまうのです。Nostr の多くの人が監視、権威主義、政府とビッグテックの行き過ぎのリスクを認識しているため、 SimpleX メッセージング プロトコルのような安全で信頼性の高い暗号化通信プロトコルの統合が、コミュニティによって特に望まれています...プライベート通信は個人の権利にとって重要です 、特に世界中の活動家やジャーナリストにとって。
Zaps & Privacy
Current lightning zap payments tend to be custodial and not mindful of privacy, though they are helping onboard people unto lightning. What are ways that people can grow into non-custodial solutions? A wider adoption of Bolt-12 would improve zap payment privacy, what are ways to encourage that development? What are other possible solutions?
現在のザップの支払いは、ライトニングペイメントに出会うのに役立っているものの、カストディアル(管理的)でプライバシーに配慮していない傾向にあります。 ノンカストディアル(非監護的)なものになるよう解決する方法はありませんか? Bolt-12 が広く採用されれば、Zap 支払いのプライバシーが向上しますが、その開発を促進するにはどのような方法がありますか?また、他に考えられる解決策はありませんか?
Closing Live 3-Day Sprint at the Nostrasia Conference
Nostrasia Tokyo 3日間のライブスプリントによる締めくくり
Tokyo | Nov 1-3 (you can also join virtually)
If you heard of the Nostrica unconference, which happened in Costa Rica in March of this year, Nostrasia is the second Nostr World conference, bringing NOSTR and Bitcoin awareness to the heart of Asia, where freedom communication and freedom money are direly needed.
今年の3月にコスタリカで開催された Nostrica のことをご存知の方もいると思いますが、ノストラジアは2回目の Nostr 世界カンファレンスです。自由なコミュニケーションと自由なお金が切実に必要とされているアジアの中心にNostr とビットコインの認識をもたらします。
Tokyo and Hong Kong are beautiful cultural hubs with budding Nostr and thriving Bitcoin communities of their own. We are eager to spread NOSTR education and development in those regions and beyond. We will close this Nostrasia month-long hackathon with a 3-day sprint at the Nostrasia Conference in Tokyo.
東京と香港は、新進気鋭のNostrと繁栄する独自のビットコインコミュニティを持つ美しい文化の中心地です。 私たちは、Nostr の教育と開発をこれらの地域やその他の地域に広めることに熱心に取り組んでいます。 この Nostrasia の 1 か月にわたるハッカソンは、Nostrasia Tokyo での 3 日間のスプリントをもって終了します。
We will have a dedicated workshop area and food for you to hack away on the final details of your projects. On the last day of the conference, the most robust projects will get time on stage to present. We will close the Nostrasia Hackathon with a special presentation.
プロジェクトの最終的な詳細を検討するための専用のワークショップ エリアと食事をご用意します。 カンファレンスの最終日には、最も強力なプロジェクトがステージ上でプレゼンテーションを行う時間が与えられます。 Nostrasia Hackathon は特別なプレゼンテーションで締めくくられます。
We cannot wait to see what new and exciting projects are proposed for the Nostrasia Hackathon. We’re eager to welcome devs and non-devs alike to contribute to this space and help #grownostr in any small way to help onboard Asia, and the rest of the world to this robust open communication protocol and decentralized freedom of speech tool.
Nostrasia Hackathon ではどんな斬新でエキサイティングなプロジェクトが提案されるのか楽しみです。 私たちは、開発者も非開発者も同様にこの分野に貢献し、アジアやその他の世界をこの堅牢なオープン通信プロトコルと分散型言論の自由ツールに参加させるために、どんな小さな方法でも #grownostr を支援してくれることを心から歓迎しています。
-
@ 1739d937:3e3136ef
2024-07-12 10:11:42This is the third in a series of weekly updates detailing progress on bringing MLS protocol DMs and group messaging to Nostr.
Previous Updates
Progress this week
Short update post this week but I made solid progress updating several OpenMLS dependencies and building a new library that implements all the OpenMLS crypto requirements for Nostr.
HPKE-RS
I mentioned a PR last week on the
rust-hpke
library, that PR is still waiting on review. However, in the meantime, the OpenMLS library depends on a slightly different hpke library, thehpke-rs
library.This library didn't support the secp256k1 curve either so I've opened a PR to add support for secp256k1. That PR uses the
RustCrypto
library that is the default in the thehpke-rs
library. However, because this library is built to allow for swapping out the underlying crypto library (using traits), I was also able to create a new library that uses thesecp256k1
library instead of theRustCrypto
library. This is the main crypto library that almost all Bitcoin and Nostr apps use so it's important we use that instead ofRustCrypto
.OpenMLS Nostr Crypto
The library that I've created (openmls-nostr-crypto) does a few things via separate sub-libraries (crates). The entire library tries to do as little as possible; only implementing the one required ciphersuite for all MLS implementations and the
secp256k1
schnorr signatures ciphersuite I've created for Nostr. It's also using the rightsecp256k1
library to do it.openmls-nostr-crypto: implementes the crypto traits that the OpenMLS library expects to find for a given provider and removes all the ciphersuites that we don't care about supporting.
hpke-rs-nostr-crypto: This implements the crypto traits that the hpke-rs library expects to find. Again removing all the ciphersuites we don't care about supporting.
I've not yet written any tests for these libraries (which needs to be done) but I've gotten some very simple demos working with OpenMLS using this new set of libraries to handle the crypto.
I've been really impressed with the simplicity of the OpenMLS interface as well. While there is A LOT going on under the hood, the public interface that client developers have to use is clean and simple.
Onward and Upward
Next week I'll continue working on these libraries; adding tests and continuing to build out my small demo app. I've been in touch with the maintainers of the OpenMLS library and I'm hoping to get a review done with them on my PRs and on my new library.
One thing I'll call out here: The review of my library and getting them to review the direction of the project overall will be paid consulting so I'm making sure that I've got as much done as possible before scheduling that time and paying their rates. I'm a strong believer that the right conversation can save you months of wasted time, but I'm also a believer in making sure you're prepared if you're going to drop money on that conversation. 😅
-
@ 3c9712ff:14fecbc4
2024-09-02 06:32:17“Bitcoin is too slow and expensive – [my altcoin] is a much better payment option” – Altcoiner.
An underrated part of the orange pill experience is diving into the value proposition of other crypto tokens to then start questioning Bitcoin’s future.
Listening to some quirky computer programmer on YouTube explaining that ‘since Bitcoin is slow and expensive, it can never have worldwide adoption, but MonkeyCoin420 can process transactions faster than Mastercard, so this is now the future of money,’ we start questioning whether we’re hodling the right coins or whether our thoughts on Bitcoin are antiquated.
This thinking builds on our innate understanding that since technology is ever expanding and moves in one direction, any newer technology is superior to previous iterations otherwise it wouldn’t exist.
But this surface level assessment of technology often overlooks what we’ve lost to obtain this.
Allow me to explain.
My favourite bitcoin slogan “there are no solutions, only trade-offs” is perfectly conveyed in the bitcoin trilemma below .
Bitcoin Trilemma
The idea overall idea is the following, 1. You can only achieve two out of the three components 2. Any improvement one section will result in a regression in another
Take Solona for example. Assuming their claim that their transaction speed on the base chain can service all the world’s digital transactions, the response is not to suddenly sell all your bitcoin to buy theirs, but rather question what they gave up achieving this.
As for most cryptocurrencies, the answer is decentralisation.
Bitcoin’s hard fork; Bitcoin Cash
The blocksize war from 2015-2017 was boiled down to this very trade-off between speed and decentralisation.
In short – the argument for ‘big blockers’ and ‘small blockers’ is summarised as
Smaller block size = easier to store transactions = more nodes = increased decentralisation.
Larger block size = more transaction in each block = faster base chain layer.
Both can be true at the same time and the results of this experiment can be observed in a simple price chart below:
Bitcoin cash priced in bitcoin since inception: source
The lesson from this is that speed isn’t everything and as [Austrian] economics teaches us there is no magic formula which quantifies this trade-off, we only have the collective subjective views of willing market participants (the price).
Ultimately, the small blockers won out and running a full bitcoin node today uses around 650 gigabytes (which is low in today’s computing standards) and helps create a low barrier entry to uphold bitcoin’s decentralisation.
This will always be a prominent component of freedom money.
There are no easy solutions a fancy line of code can address that doesn’t bring negative consequences. To think of bitcoin in such a way is to imply that you can upgrade the laws of thermodynamics itself, you can’t have it all.
Colin Gifford
June 2024
-
@ 8fb140b4:f948000c
2023-08-22 12:14:34As the title states, scratch behind my ear and you get it. 🐶🐾🫡
-
@ 3c9712ff:14fecbc4
2024-09-02 06:31:44Next time you see high currency denominations, remember someone poorer than you paid for it with their life’s savings.
Last month I went on a solo bike trip around the beautiful Indonesian island of Bali.
What I took from my week away was the following: beautiful beaches, friendly people, delicious food, and an utterly worthless currency.
I was struck by how worthless the Indonesian's Rupiah (IDR) was.
2000 IDR for parking, 15,000 IDR for coffee, and 50,000 IDR for fried rice! Converted into AUD or any Western currency, these amounts are mere pocket change, which begs the question: why?
188k IDR (approx. 18 AUD)
Indonesian people have been saddled with high inflation for over a hundred years. In fact, the Rupiah’s Wikipedia page is just a long run sheet of debasements and rug pulls from foreign and domestic powers, but none were as big or as recent as the 1990's.
https://en.wikipedia.org/wiki/History_of_the_Indonesian_rupiah
Asian Financial Crisis – A Short History Lesson
If you watch any YouTube video or read articles about the 1997 Asian Financial Crisis it’ll paint you the same incomplete story. They’ll tell you that the entire Southeast Asian region (known as the Tiger countries) had booming economies through the 1990’s as measured by the godfather of Keynesian measurement GDP (this is a great casestudy on the flaws of this metric).
Then one day out of the blue in 1997 the Thai central bank ran out of foreign currency reserves, could no longer sustain the rapid growth and thus the bubble burst.
The ‘Asian Contagion’ as they called it spread through the reason like wildfire, hitting Indonesia the hardest.
All accounts of the crisis on the internet wrap up by concluding Indonesia experienced an 87% currency devaluation between 1997-1998, before wrapping up the story there.
IDR/USD exchange rate | https://fred.stlouisfed.org/series/CCUSSP02IDQ650N
I won’t detail the full causes and effects of the crisis in this article but unfortunately the one sentence summary described perfectly by the Austrian Business Cycle Theory.
Easy Money > Increased Debt > Artificial ‘Prosperity’ > Malinvestment > Bubble Burst > Millions Forced into Poverty
Keynesian economists get away with wiping out working-class people because they boil financial repression down to complex models and aggregates.
If Mises’s Human Action has taught me anything it’s that graphs and numbers only tell you so much, but economics must be fundamentally understood at a personal level.
Real World Effect
During my travels I met Bulan, grandmother who runs a guesthouse on the beach with her entire family.
Bulan’s granddaughters looking for crabs on the local beach.
Although I couldn’t communicate with her beyond hand gestures, I understood her story. I saw a family that had worked and saved for generations, only to have to start over in the 1990s when almost 90% of their wealth evaporated in just three months.
Unfortunately, this is the story of the masses in the Global South. Not only does Bulan’s family face higher inflation than we do, but they also have minimal options for financial protection.
There are no mutual funds, ETFs, or indexes they can invest in. Their best hope is to buy their own house and pray that the cash under their bed doesn’t depreciate. These are the most vulnerable people.
The Need for Sound Money
There are very few better examples than the need for sound money than Indonesia. For a society to be truly free, one must first be able to save. And one can only truly save in a currency free from debasement.
Accumulating, storing, and passing down wealth is a tradition as old as family itself.
I just hope that Bulan’s granddaughters are given a fairer go than her.
-
@ 42342239:1d80db24
2024-07-06 15:26:39Claims that we need greater centralisation, more EU, or more globalisation are prevalent across the usual media channels. The climate crisis, environmental destruction, pandemics, the AI-threat, yes, everything will apparently be solved if a little more global coordination, governance and leadership can be brought about.
But, is this actually true? One of the best arguments for this conclusion stems implicitly from the futurist Eliezer Yudkowsky, who once proposed a new Moore's Law, though this time not for computer processors but instead for mad science: "every 18 months, the minimum IQ necessary to destroy the world drops by one point".
Perhaps we simply have to tolerate more centralisation, globalisation, control, surveillance, and so on, to prevent all kinds of fools from destroying the world?
Note: a Swedish version of this text is avalable at Affärsvärlden.
At the same time, more centralisation, globalisation, etc. is also what we have experienced. Power has been shifting from the local, and from the majorities, to central-planning bureaucrats working in remote places. This has been going on for several decades. The EU's subsidiarity principle, i.e. the idea that decisions should be made at the lowest expedient level, and which came to everyone's attention ahead of Sweden's EU vote in 1994, is today swept under the rug as untimely and outdated, perhaps even retarded.
At the same time, there are many crises, more than usual it would seem. If it is not a crisis of criminality, a logistics/supply chain crisis or a water crisis, then it is an energy crisis, a financial crisis, a refugee crisis or a climate crisis. It is almost as if one starts to suspect that all this centralisation may be leading us down the wrong path. Perhaps centralisation is part of the problem, rather than the capital S solution?
Why centralisation may cause rather than prevent problems
There are several reasons why centralisation, etc, may actually be a problem. And though few seem to be interested in such questions today (or perhaps they are too timid to mention their concerns?), it has not always been this way. In this short essay we'll note four reasons (though there are several others):
- Political failures (Buchanan et al)
- Local communities & skin in the game (Ostrom and Taleb)
- The local knowledge problem (von Hayek)
- Governance by sociopaths (Hare)
James Buchanan who was given the so-called Nobel price in economics in the eighties once said that: "politicians and bureaucrats are no different from the rest of us. They will maximise their incentives just like everybody else.".
Buchanan was prominent in research on rent-seeking and political failures, i.e. when political "solutions" to so-called market failures make everything worse. Rent-seeking is when a company spends resources (e.g. lobbying) to get legislators or other decision makers to pass laws or create regulations that benefit the company instead of it having to engage in productive activities. The result is regulatory capture. The more centralised decision-making is, the greater the negative consequences from such rent-seeking will be for society at large. This is known.
Another economist, Elinor Ostrom, was given the same prize in the great financial crisis year of 2009. In her research, she had found that local communities where people had influence over rules and regulations, as well as how violations there-of were handled, were much better suited to look after common resources than centralised bodies. To borrow a term from the combative Nassim Nicholas Taleb: everything was better handled when decision makers had "skin in the game".
A third economist, Friedrich von Hayek, was given this prize as early as 1974, partly because he showed that central planning could not possibly take into account all relevant information. The information needed in economic planning is by its very nature distributed, and will never be available to a central planning committee, or even to an AI.
Moreover, human systems are complex and not just complicated. When you realise this, you also understand why the forecasts made by central planners often end up wildly off the mark - and at times in a catastrophic way. (This in itself is an argument for relying more on factors outside of the models in the decision-making process.)
From Buchanan's, Ostrom's, Taleb's or von Hayek's perspectives, it also becomes difficult to believe that today's bureaucrats are the most suited to manage and price e.g. climate risks. One can compare with the insurance industry, which has both a long habit of pricing risks as well as "skin in the game" - two things sorely missing in today's planning bodies.
Instead of preventing fools, we may be enabling madmen
An even more troubling conclusion is that centralisation tends to transfer power to people who perhaps shouldn't have more of that good. "Not all psychopaths are in prison - some are in the boardroom," psychologist Robert Hare once said during a lecture. Most people have probably known for a long time that those with sharp elbows and who don't hesitate to stab a colleague in the back can climb quickly in organisations. In recent years, this fact seems to have become increasingly well known even in academia.
You will thus tend to encounter an increased prevalance of individuals with narcissistic and sociopathic traits the higher up you get in the the status hierarchy. And if working in large organisations (such as the European Union or Congress) or in large corporations, is perceived as higher status - which is generally the case, then it follows that the more we centralise, the more we will be governed by people with less flattering Dark Triad traits.
By their fruits ye shall know them
Perhaps it is thus not a coincidence that we have so many crises. Perhaps centralisation, globalisation, etc. cause crises. Perhaps the "elites" and their planning bureaucrats are, in fact, not the salt of the earth and the light of the world. Perhaps President Trump even had a point when he said "they are not sending their best".
https://www.youtube.com/watch?v=w4b8xgaiuj0
The opposite of centralisation is decentralisation. And while most people may still be aware that decentralisation can be a superpower within the business world, it's time we remind ourselves that this also applies to the economy - and society - at large, and preferably before the next Great Leap Forward is fully thrust upon us.
-
@ a10260a2:caa23e3e
2023-08-14 21:36:14It seems like blogstack is meant to replace Substack if not already apparent by the name. If that's the case, it's already better in a few ways.
1. Hit the ground running
I'm already getting started out of the gate with more readers than I would have if I just started a Substack. This, of course, is due to the fact that I'm creating on top of a protocol where I'm able to have the same audience across all clients of that protocol. This is in stark contrast to the legacy apps from centralized entities where you have to corral your audience from one platform to the next.
2. Readers need not subscribe
Technically, if you're following me, you're subscribed. But you don't have to subscribe for a set price and amount of time (e.g. $5/month or $50/year). I believe this is a win for both of us as I can write my best notes and you can choose to reward me as you see fit. Value 4 value.
3. More conducive to conversation
Writing on Substack felt like writing into a void, with little to no feedback. A post shows up in my readers' inbox and I'll see some stats on whether it was opened or not. That's it. Based on what I've seen so far, blog posts created on Nostr appear in the client apps (e.g Damus, Primal, and Plebstr) as just another note, but with nice formatting and such. From there, I can receive zaps, shakas, comments, and even be reposted.
This is just the beginning. Right now, I'm using blogstack. But what's to stop me from using another tool down the line? I'll have the ability to do so by simply connecting my private key. Can't wait to see what new tools are created down the line.
So ₿ULLISH on #Nostr
-
@ 3c9712ff:14fecbc4
2024-09-02 06:30:58Hello and congratulations,
If you are reading this, you have been accepted for the journalist role at the Australian Financial Review (AFR) in the cryptocurrency and digital assets team- specialising in bitcoin reporting.
Don’t worry if you have never studied bitcoin or even bothered to take 15 minutes to learn the value proposition because neither have we! That’s why we have written the following 4 rules all AFR journalists must abide by when writing about bitcoin (with examples!).
Rule 1: Bitcoin has no intrinsic value; therefore it is a Ponzi scheme.
Repeat this line in some way, shape or form whenever you can. If you can declare it dead or compare it to the tulip bubble of 1636 without analysis even better.
Remember, since bitcoin doesn’t generate cashflows and can’t be valued the same as a company, it is inherently worthless. Ensure you look past gold’s five-thousand-year-old use case when making this claim (very important).
Since it’s worthless and you can’t earn that precious dividend our close friends at all major banks offer, the only reason to buy bitcoin is to sell it at a higher price to a greater fool. Ignore the fact this is literally how a stock market operates.
**Rule 2: Bitcoin and Crypto are the same thing. **
Bitcoin = Ethereum = NFT = Sam Bankman Fried. You must group all these terms together as often as possible with the goal of obfuscating scam artists with underlying technologies.
Because SBF was the crypto guy, and bitcoin is a cryptocurrency, any proof of his fraud is also proof the reader shouldn’t trust bitcoin.
From here the next leap is easy – bitcoin is only used by criminals and money launderers. Ignore the blatant contradiction from Rule 1 (bitcoin has no value at all) and instead focus on dangers of allowing an immutable, censorship resistant protocol.
Getting quotes from reputable sources are important, so make sure you use people like J.P Morgan CEO Jamie Dimon on why we need to shut down bitcoin and protect the readers from criminals.
Ignore his $350 million money laundering fine his company received last year…..
Rule 3: Proof of work is wasteful
Learning about bitcoin’s security mechanism proof of work (PoW) ironically takes a lot of time and energy. So, we instead suggest you skip this and learn the following
-
If bitcoin mining uses a lot of power, that means it’s stealing energy from a family because all energy units are created equal
-
Bitcoin uses more energy than a small country. Don’t explain why that matters, just leave it there; the reader will figure it out.
Rule 4: There on this earth is worse than volatility.
Our readers are rational investors who don’t like risk. Instead, they would prefer a prudent portfolio strategy of taking on a leveraged position of 5:1 to buy the greatest asset ever created by god, Australian Real Estate.
We stress that since bitcoin’s price decreased last week, it can’t possibly be a store of value and is therefore worse than the Argentinian Peso.
Volatility is bad, and all Australians must take out as much debt as possible to keep our “economy” afloat achieve financial freedom.
Conclusion
At the AFR are the last stand against new ideas. Bitcoin is a scary asset, but nothing is more intimidating than learning about it.
Colin Gifford
June 2024
-
-
@ 8fb140b4:f948000c
2023-07-30 00:35:01Test Bounty Note
-
@ 3c9712ff:14fecbc4
2024-09-02 06:30:20Modern Monetary Theory
For anyone to properly articulate their own views, you must be able to put others in words.
The opposite of Austrian Economics is not Keynesian, its Modern Monetary Theory (MMT).
Outlined below are the key understandings of MMT and how it works.
1. Money Is Not A Commodity But Rather A Tool Of The State
The starting point of MMT as a philosophy is on the creation of money itself. Whereas the Austrian school notes that money was formed naturally through history as a lubricant for barter, MMT instead argues that money is a tax liability built on credit which is imposed by the state and spent out into the economy.
MMT builds on the idea of the State Theory Of Money and it is the only the state – not the market - that gives value to a currency. From this framework, money must first be spent into the economy by with government, then collected by state in the form of taxes.
Because money is a product of the state, and people will always use the state’s money because of their tax liability, a government is fundamentally different to a household.
Governments don’t have to worry about “living below their means” because they are the currency issuers not the currency users.
2. Government Deficit is Private Sector Surplus
“Deficits are almost always seen in a bad light, and I would like to change that” Stephanie Kelton
MMT will point out that a deficit to the government is just a surplus to the private sector. Therefore, it’s not the deficit itself that is an issue but where the money is going. Kelton will point out that tax cuts favour the wealthy whereas infrastructure projects help all. But overall, the idea is that government spending into the economy helps the private sector flourish.
Watch her Ted Talk here : https://www.youtube.com/watch?v=FATQ0Yf0Fhc&t=610s
3. Resources are finite, NOT money
Since state’s can print its own currency, the age-old question of funding projects no longer applies. The question instead becomes ‘do we have the real resources to achieve this?’
Using Victoria’s Big Build as an example, the government doesn’t have to worry about the $90 billion cost to taxpayers. Rather, the Allen government’s only concern is whether they can source enough labour and materials to build the project without stifling the private sector.
Since are economy is perpetually underutilised, being unemployment and idle assets, MMT is a theory of utilising this. If the government pays too much and bids up the prices and causes inflation, they will subsequently increase taxes and take out the excess savings.
The Austrian Rebuttal
The Model Is Happily Built On Coercion
For one to have the opinion that money is built on the tax liability to the state, you must at some level be comfortable with coercion.
Those who are sympathetic MMT won’t even dispute this, but rather explain this is how societies fundamentally operate. Austrian Economics and laissez-faire capitalism on the other hand are developed through voluntary exchange and human action.
Government Spending is not my Savings
I think this point is a bit of slight of hand from the MMT camp
When the argument is framed this way it leads the reader to believe the following two things
- Savings cannot happen without governments providing currency to save
- Money is the same as capital
We know from our Austrian backgrounds that savings isn't just something governments kindly give to their subordinates, but it represents deferred consumption as individuals delay gratification into the future. This is different from being given money and put into bank accounts (covid stimulus)
Capital IS Finite
Capital refers to the goods and resources used to produce other goods and services and is directly downstream of savings. Menger and Mises both agreed that capital enables the production of more complex goods and services to help push civilisation forward and CANNOT happen without savings first.
Currency is not the same as capital. You can’t print capital in the same way that you can’t print wealth.
You Can’t Out Plan The Free Market
Every price and every action is a signal. No amount of manipulation and central planning can lead a more efficient and sustainable economy than robust property rights and limited to no intervention.
Overall MMT is an interesting theory and shares the same frustration with the status quo as Austrians, but is deeply flawed.
-
@ 1739d937:3e3136ef
2024-07-06 09:22:17This is the second in a series of weekly updates detailing progress on bringing MLS protocol DMs and group messaging to Nostr.
Previous Updates
Progress this week
This week was mostly spent on the topic of how to properly publish prekey bundles and what would be needed in the bundle itself to make it workable. I've included an early version of the spec below for prekeys, and would love thoughts on it. Treat this as an alpha version, very subject to change.
The other thing I spent time on was making changes to the OpenMLS library to add support for our custom ciphersuite. One issue that I've run into is that the IETF standard for HPKE doesn't include the secp256k1 curve. Because of this, the library being used in the OpenMLS library doesn't implement the necessary methods using our curve. Thankfully, there is another library with an open PR (shout out to nostr:npub1yevrvtp3xl42sq06usztudhleq8pdfsugw5frgaqg6lvfdewfx9q6zqrkl for that!) that would fix this. Additionally, there's an expired proposal to add secp256k1 to the HPKE spec itself. I've bumped both of these and will continue to follow up. Even without the formal addition to the spec, if we have a working library, I can add that to the OpenMLS library.
Spec Draft for Prekeys
Initial keying material (Prekey Event)
Each user that wishes to be reachable via MLS-based messaging MUST first publish a prekey event. Prekeys are used to authenticate and add members to groups (one-to-one DMs or groups with more than two participants) in an asynchronous way. The prekey event is a simple replaceable event and contains all the information needed to add a user to a group.
Prekeys SHOULD be used only once. Resuse of prekeys can lead to replay attacks.
In most cases, clients that implement this NIP will manage the creation and rotation of the prekey event. It's recommended that clients do so interactively with user consent in order to avoid overwriting prekeys created by other clients.
Derived vs Ephemeral Prekeys
Since prekeys are generated on a single device/client pair, the private key of the prekey must be either stored or generated in a way that can be deterministically recovered.
The recommended approach is to use derived keys, generated in the manner described in NIP-06. In this way, the user can respond to a new group request from any device/client pair, not just from the same device/client pair that created the initial prekey event. If using derived keys;
- Clients MUST use
104
as theaccount
level value and0
at thechange
level value (e.g.m/44'/1237'/104'/0/0
). - Keys are then generated using public derivation by incrementing the
address_index
level value. - Clients MUST include the full derivation path corresponding to the key used in the
content
field on the prekey event. - The
content
field MUST be encrypted using standard NIP-44 encryption (encrypted to themselves).
However, for added security (and consequently a more restrictive user experience), clients can chose to generate an ephemeral key and store the private key locally. This means that users will only be able to respond to new group requests from the same device/client pair and won't be able to respond at all if the prekey's private key is lost. Ephemeral keys can also be used with minimal degredation of UX if you're using a remote signer that can manage these keys.
If using an ephemeral key;
- The
content
field on the prekey event MUST be filled in withEPHEMERAL
and then encrypted using standard NIP-44 encryption (encrypted to themselves). This ensures that anyone looking at prekey events cannot tell whether it's a derived or an ephemeral prekey.
Example Prekey Event
json { "id": <id>, "kind": 10443, "created_at": <unix timestamp in seconds>, "pubkey": <main identity pubkey>, "content": <encrypted derivation path | EPHEMERAL>, "tags": [ ["mls_protocol_version", "1.0"], ["ciphersuite", "MLS_256_DHKEMK256_CHACHA20POLY1305_SHA256_K256"], ["pubkey", <prekey pubkey>], ["prekey_sig", <signature generated from hex encoded pubkey of the prekey>], ["r", "wss://nos.lol"], ["r", "wss://relay.primal.net"] ], "sig": <signed with main identity key> }
Tags
- The
mls_protocol_version
tag identifies the MLS protocol version being used. For now, this MUST be1.0
- The
ciphersuite
tag identifies the ciphersuite supported. For now on Nostr, we're using a custom ciphersuite,MLS_256_DHKEMK256_CHACHA20POLY1305_SHA256_K256
. Read more about ciphersuites in MLS. pubkey
is the derived or ephemeral prekey pubkey.- The
prekey_sig
tag value is a Schnorr signature (over the secp256k1 curve) of the SHA-256 hashed value of the prekey's pubkey, signed with the prekey's private key.
```js const privKey = schnorr.utils.randomPrivateKey(); const pubKey = schnorr.getPublicKey(privKey);
const prekeySig = bytesToHex( schnorr.sign(bytesToHex(sha256(pubKey)), privKey) );
const prekeyTag = ["prekey_sig", prekeySig]; ```
Finally, clients SHOULD include
r
tags to identify each of the relays that they will attempt to publish this prekey event to. This allows for more complete replacement of prekey events at a later date.Replacing Prekey Events
Clients MUST replace the prekey event on all the listed relays any time they successfully process a group welcome event. If the prekey was a derived prekey, clients SHOULD increment the derivation path by 1 for the next key.
Onward and Upward
This next week I'll continue to work on getting the right curves and code added to the OpenMLS library and start work on a simple demo app. The focus is on better understanding what we need from the control and message events and how we can make those as simple as possible for Nostr clients and relays while also preserving as much privacy as possible.
- Clients MUST use
-
@ e6ce6154:275e3444
2023-07-27 14:12:49Este artigo foi censurado pelo estado e fomos obrigados a deletá-lo após ameaça de homens armados virem nos visitar e agredir nossa vida e propriedade.
Isto é mais uma prova que os autoproclamados antirracistas são piores que os racistas.
https://rothbardbrasil.com/pelo-direito-de-ser-racista-fascista-machista-e-homofobico
Segue artigo na íntegra. 👇
Sem dúvida, a escalada autoritária do totalitarismo cultural progressista nos últimos anos tem sido sumariamente deletéria e prejudicial para a liberdade de expressão. Como seria de se esperar, a cada dia que passa o autoritarismo progressista continua a se expandir de maneira irrefreável, prejudicando a liberdade dos indivíduos de formas cada vez mais deploráveis e contundentes.
Com a ascensão da tirania politicamente correta e sua invasão a todos os terrenos culturais, o autoritarismo progressista foi se alastrando e consolidando sua hegemonia em determinados segmentos. Com a eventual eclosão e a expansão da opressiva e despótica cultura do cancelamento — uma progênie inevitável do totalitarismo progressista —, todas as pessoas que manifestam opiniões, crenças ou posicionamentos que não estão alinhados com as pautas universitárias da moda tornam-se um alvo.
Há algumas semanas, vimos a enorme repercussão causada pelo caso envolvendo o jogador profissional de vôlei Maurício Sousa, que foi cancelado pelo simples fato de ter emitido sua opinião pessoal sobre um personagem de história em quadrinhos, Jon Kent, o novo Superman, que é bissexual. Maurício Sousa reprovou a conduta sexual do personagem, o que é um direito pessoal inalienável que ele tem. Ele não é obrigado a gostar ou aprovar a bissexualidade. Como qualquer pessoa, ele tem o direito pleno de criticar tudo aquilo que ele não gosta. No entanto, pelo simples fato de emitir a sua opinião pessoal, Maurício Sousa foi acusado de homofobia e teve seu contrato rescindido, sendo desligado do Minas Tênis Clube.
Lamentavelmente, Maurício Sousa não foi o primeiro e nem será o último indivíduo a sofrer com a opressiva e autoritária cultura do cancelamento. Como uma tirania cultural que está em plena ascensão e usufrui de um amplo apoio do establishment, essa nova forma de totalitarismo cultural colorido e festivo está se impondo de formas e maneiras bastante contundentes em praticamente todas as esferas da sociedade contemporânea. Sua intenção é relegar ao ostracismo todos aqueles que não se curvam ao totalitarismo progressista, criminalizando opiniões e crenças que divergem do culto à libertinagem hedonista pós-moderna. Oculto por trás de todo esse ativismo autoritário, o que temos de fato é uma profunda hostilidade por padrões morais tradicionalistas, cristãos e conservadores.
No entanto, é fundamental entendermos uma questão imperativa, que explica em partes o conflito aqui criado — todos os progressistas contemporâneos são crias oriundas do direito positivo. Por essa razão, eles jamais entenderão de forma pragmática e objetiva conceitos como criminalidade, direitos de propriedade, agressão e liberdade de expressão pela perspectiva do jusnaturalismo, que é manifestamente o direito em seu estado mais puro, correto, ético e equilibrado.
Pela ótica jusnaturalista, uma opinião é uma opinião. Ponto final. E absolutamente ninguém deve ser preso, cancelado, sabotado ou boicotado por expressar uma opinião particular sobre qualquer assunto. Palavras não agridem ninguém, portanto jamais poderiam ser consideradas um crime em si. Apenas deveriam ser tipificados como crimes agressões de caráter objetivo, como roubo, sequestro, fraude, extorsão, estupro e infrações similares, que representam uma ameaça direta à integridade física da vítima, ou que busquem subtrair alguma posse empregando a violência.
Infelizmente, a geração floquinho de neve — terrivelmente histérica, egocêntrica e sensível — fica profundamente ofendida e consternada sempre que alguém defende posicionamentos contrários à religião progressista. Por essa razão, os guerreiros da justiça social sinceramente acreditam que o papai-estado deve censurar todas as opiniões que eles não gostam de ouvir, assim como deve também criar leis para encarcerar todos aqueles que falam ou escrevem coisas que desagradam a militância.
Como a geração floquinho de neve foi criada para acreditar que todas as suas vontades pessoais e disposições ideológicas devem ser sumariamente atendidas pelo papai-estado, eles embarcaram em uma cruzada moral que pretende erradicar todas as coisas que são ofensivas à ideologia progressista; só assim eles poderão deflagrar na Terra o seu tão sonhado paraíso hedonista e igualitário, de inimaginável esplendor e felicidade.
Em virtude do seu comportamento intrinsecamente despótico, autoritário e egocêntrico, acaba sendo inevitável que militantes progressistas problematizem tudo aquilo que os desagrada.
Como são criaturas inúteis destituídas de ocupação real e verdadeiro sentido na vida, sendo oprimidas unicamente na sua própria imaginação, militantes progressistas precisam constantemente inventar novos vilões para serem combatidos.
Partindo dessa perspectiva, é natural para a militância que absolutamente tudo que exista no mundo e que não se enquadra com as regras autoritárias e restritivas da religião progressista seja encarado como um problema. Para a geração floquinho de neve, o capitalismo é um problema. O fascismo é um problema. A iniciativa privada é um problema. O homem branco, tradicionalista, conservador e heterossexual é um problema. A desigualdade é um problema. A liberdade é um problema. Monteiro Lobato é um problema (sim, até mesmo o renomado ícone da literatura brasileira, autor — entre outros títulos — de Urupês, foi vítima da cultura do cancelamento, acusado de ser racista e eugenista).
Para a esquerda, praticamente tudo é um problema. Na mentalidade da militância progressista, tudo é motivo para reclamação. Foi em função desse comportamento histérico, histriônico e infantil que o famoso pensador conservador-libertário americano P. J. O’Rourke afirmou que “o esquerdismo é uma filosofia de pirralhos chorões”. O que é uma verdade absoluta e irrefutável em todos os sentidos.
De fato, todas as filosofias de esquerda de forma geral são idealizações utópicas e infantis de um mundo perfeito. Enquanto o mundo não se transformar naquela colorida e vibrante utopia que é apresentada pela cartilha socialista padrão, militantes continuarão a reclamar contra tudo o que existe no mundo de forma agressiva, visceral e beligerante. Evidentemente, eles não vão fazer absolutamente nada de positivo ou construtivo para que o mundo se transforme no gracioso paraíso que eles tanto desejam ver consolidado, mas eles continuarão a berrar e vociferar muito em sua busca incessante pela utopia, marcando presença em passeatas inúteis ou combatendo o fascismo imaginário nas redes sociais.
Sem dúvida, estamos muito perto de ver leis absurdas e estúpidas sendo implementadas, para agradar a militância da terra colorida do assistencialismo eterno onde nada é escasso e tudo cai do céu. Em breve, você não poderá usar calças pretas, pois elas serão consideradas peças de vestuário excessivamente heterossexuais. Apenas calças amarelas ou coloridas serão permitidas. Você também terá que tingir de cor-de-rosa uma mecha do seu cabelo; pois preservar o seu cabelo na sua cor natural é heteronormativo demais da sua parte, sendo portanto um componente demasiadamente opressor da sociedade.
Você também não poderá ver filmes de guerra ou de ação, apenas comédias românticas, pois certos gêneros de filmes exaltam a violência do patriarcado e isso impede o mundo de se tornar uma graciosa festa colorida de fraternidades universitárias ungidas por pôneis resplandecentes, hedonismo infinito, vadiagem universitária e autogratificação psicodélica, que certamente são elementos indispensáveis para se produzir o paraíso na Terra.
Sabemos perfeitamente, no entanto, que dentre as atitudes “opressivas” que a militância progressista mais se empenha em combater, estão o racismo, o fascismo, o machismo e a homofobia. No entanto, é fundamental entender que ser racista, fascista, machista ou homofóbico não são crimes em si. Na prática, todos esses elementos são apenas traços de personalidade; e eles não podem ser pura e simplesmente criminalizados porque ideólogos e militantes progressistas iluminados não gostam deles.
Tanto pela ética quanto pela ótica jusnaturalista, é facilmente compreensível entender que esses traços de personalidade não podem ser criminalizados ou proibidos simplesmente porque integrantes de uma ideologia não tem nenhuma apreciação ou simpatia por eles. Da mesma forma, nenhum desses traços de personalidade representa em si um perigo para a sociedade, pelo simples fato de existir. Por incrível que pareça, até mesmo o machismo, o racismo, o fascismo e a homofobia merecem a devida apologia.
Mas vamos analisar cada um desses tópicos separadamente para entender isso melhor.
Racismo
Quando falamos no Japão, normalmente não fazemos nenhuma associação da sociedade japonesa com o racismo. No entanto, é incontestável o fato de que a sociedade japonesa pode ser considerada uma das sociedades mais racistas do mundo. E a verdade é que não há absolutamente nada de errado com isso.
Aproximadamente 97% da população do Japão é nativa; apenas 3% do componente populacional é constituído por estrangeiros (a população do Japão é estimada em aproximadamente 126 milhões de habitantes). Isso faz a sociedade japonesa ser uma das mais homogêneas do mundo. As autoridades japonesas reconhecidamente dificultam processos de seleção e aplicação a estrangeiros que desejam se tornar residentes. E a maioria dos japoneses aprova essa decisão.
Diversos estabelecimentos comerciais como hotéis, bares e restaurantes por todo o país tem placas na entrada que dizem “somente para japoneses” e a maioria destes estabelecimentos se recusa ostensivamente a atender ou aceitar clientes estrangeiros, não importa quão ricos ou abastados sejam.
Na Terra do Sol Nascente, a hostilidade e a desconfiança natural para com estrangeiros é tão grande que até mesmo indivíduos que nascem em algum outro país, mas são filhos de pais japoneses, não são considerados cidadãos plenamente japoneses.
Se estes indivíduos decidem sair do seu país de origem para se estabelecer no Japão — mesmo tendo descendência nipônica legítima e inquestionável —, eles enfrentarão uma discriminação social considerável, especialmente se não dominarem o idioma japonês de forma impecável. Esse fato mostra que a discriminação é uma parte tão indissociável quanto elementar da sociedade japonesa, e ela está tão profundamente arraigada à cultura nipônica que é praticamente impossível alterá-la ou atenuá-la por qualquer motivo.
A verdade é que — quando falamos de um país como o Japão — nem todos os discursos politicamente corretos do mundo, nem a histeria progressista ocidental mais inflamada poderão algum dia modificar, extirpar ou sequer atenuar o componente racista da cultura nipônica. E isso é consequência de uma questão tão simples quanto primordial: discriminar faz parte da natureza humana, sendo tanto um direito individual quanto um elemento cultural inerente à muitas nações do mundo. Os japoneses não tem problema algum em admitir ou institucionalizar o seu preconceito, justamente pelo fato de que a ideologia politicamente correta não tem no oriente a força e a presença que tem no ocidente.
E é fundamental enfatizar que, sendo de natureza pacífica — ou seja, não violando nem agredindo terceiros —, a discriminação é um recurso natural dos seres humanos, que está diretamente associada a questões como familiaridade e segurança.
Absolutamente ninguém deve ser forçado a apreciar ou integrar-se a raças, etnias, pessoas ou tribos que não lhe transmitem sentimentos de segurança ou familiaridade. Integração forçada é o verdadeiro crime, e isso diversos países europeus — principalmente os escandinavos (países que lideram o ranking de submissão à ideologia politicamente correta) — aprenderam da pior forma possível.
A integração forçada com imigrantes islâmicos resultou em ondas de assassinato, estupro e violência inimagináveis para diversos países europeus, até então civilizados, que a imprensa ocidental politicamente correta e a militância progressista estão permanentemente tentando esconder, porque não desejam que o ocidente descubra como a agenda “humanitária” de integração forçada dos povos muçulmanos em países do Velho Mundo resultou em algumas das piores chacinas e tragédias na história recente da Europa.
Ou seja, ao discriminarem estrangeiros, os japoneses estão apenas se protegendo e lutando para preservar sua nação como um ambiente cultural, étnico e social que lhe é seguro e familiar, assim se opondo a mudanças bruscas, indesejadas e antinaturais, que poderiam comprometer a estabilidade social do país.
A discriminação — sendo de natureza pacífica —, é benévola, salutar e indubitavelmente ajuda a manter a estabilidade social da comunidade. Toda e qualquer forma de integração forçada deve ser repudiada com veemência, pois, mais cedo ou mais tarde, ela irá subverter a ordem social vigente, e sempre será acompanhada de deploráveis e dramáticos resultados.
Para citar novamente os países escandinavos, a Suécia é um excelente exemplo do que não fazer. Tendo seguido o caminho contrário ao da discriminação racional praticada pela sociedade japonesa, atualmente a sociedade sueca — além de afundar de forma consistente na lama da libertinagem, da decadência e da deterioração progressista — sofre em demasia com os imigrantes muçulmanos, que foram deixados praticamente livres para matar, saquear, esquartejar e estuprar quem eles quiserem. Hoje, eles são praticamente intocáveis, visto que denunciá-los, desmoralizá-los ou acusá-los de qualquer crime é uma atitude politicamente incorreta e altamente reprovada pelo establishment progressista. A elite socialista sueca jamais se atreve a acusá-los de qualquer crime, pois temem ser classificados como xenófobos e intolerantes. Ou seja, a desgraça da Europa, sobretudo dos países escandinavos, foi não ter oferecido nenhuma resistência à ideologia progressista politicamente correta. Hoje, eles são totalmente submissos a ela.
O exemplo do Japão mostra, portanto — para além de qualquer dúvida —, a importância ética e prática da discriminação, que é perfeitamente aceitável e natural, sendo uma tendência inerente aos seres humanos, e portanto intrínseca a determinados comportamentos, sociedades e culturas.
Indo ainda mais longe nessa questão, devemos entender que na verdade todos nós discriminamos, e não existe absolutamente nada de errado nisso. Discriminar pessoas faz parte da natureza humana e quem se recusa a admitir esse fato é um hipócrita. Mulheres discriminam homens na hora de selecionar um parceiro; elas avaliam diversos quesitos, como altura, aparência, status social, condição financeira e carisma. E dentre suas opções, elas sempre escolherão o homem mais atraente, másculo e viril, em detrimento de todos os baixinhos, calvos, carentes, frágeis e inibidos que possam estar disponíveis. Da mesma forma, homens sempre terão preferência por mulheres jovens, atraentes e delicadas, em detrimento de todas as feministas de meia-idade, acima do peso, de cabelo pintado, que são mães solteiras e militantes socialistas. A própria militância progressista discrimina pessoas de forma virulenta e intransigente, como fica evidente no tratamento que dispensam a mulheres bolsonaristas e a negros de direita.
A verdade é que — não importa o nível de histeria da militância progressista — a discriminação é inerente à condição humana e um direito natural inalienável de todos. É parte indissociável da natureza humana e qualquer pessoa pode e deve exercer esse direito sempre que desejar. Não existe absolutamente nada de errado em discriminar pessoas. O problema real é a ideologia progressista e o autoritarismo politicamente correto, movimentos tirânicos que não respeitam o direito das pessoas de discriminar.
Fascismo
Quando falamos de fascismo, precisamos entender que, para a esquerda política, o fascismo é compreendido como um conceito completamente divorciado do seu significado original. Para um militante de esquerda, fascista é todo aquele que defende posicionamentos contrários ao progressismo, não se referindo necessariamente a um fascista clássico.
Mas, seja como for, é necessário entender que — como qualquer ideologia política — até mesmo o fascismo clássico tem o direito de existir e ocupar o seu devido lugar; portanto, fascistas não devem ser arbitrariamente censurados, apesar de defenderem conceitos que representam uma completa antítese de tudo aquilo que é valioso para os entusiastas da liberdade.
Em um país como o Brasil, onde socialistas e comunistas tem total liberdade para se expressar, defender suas ideologias e até mesmo formar partidos políticos, não faz absolutamente o menor sentido que fascistas — e até mesmo nazistas assumidos — sofram qualquer tipo de discriminação. Embora socialistas e comunistas se sintam moralmente superiores aos fascistas (ou a qualquer outra filosofia política ou escola de pensamento), sabemos perfeitamente que o seu senso de superioridade é fruto de uma pueril romantização universitária da sua própria ideologia. A história mostra efetivamente que o socialismo clássico e o comunismo causaram muito mais destruição do que o fascismo.
Portanto, se socialistas e comunistas tem total liberdade para se expressar, não existe a menor razão para que fascistas não usufruam dessa mesma liberdade.
É claro, nesse ponto, seremos invariavelmente confrontados por um oportuno dilema — o famoso paradoxo da intolerância, de Karl Popper. Até que ponto uma sociedade livre e tolerante deve tolerar a intolerância (inerente a ideologias totalitárias)?
As leis de propriedade privada resolveriam isso em uma sociedade livre. O mais importante a levarmos em consideração no atual contexto, no entanto — ao defender ou criticar uma determinada ideologia, filosofia ou escola de pensamento —, é entender que, seja ela qual for, ela tem o direito de existir. E todas as pessoas que a defendem tem o direito de defendê-la, da mesma maneira que todos os seus detratores tem o direito de criticá-la.
Essa é uma forte razão para jamais apoiarmos a censura. Muito pelo contrário, devemos repudiar com veemência e intransigência toda e qualquer forma de censura, especialmente a estatal.
Existem duas fortes razões para isso:
A primeira delas é a volatilidade da censura (especialmente a estatal). A censura oficial do governo, depois que é implementada, torna-se absolutamente incontrolável. Hoje, ela pode estar apontada para um grupo de pessoas cujas ideias divergem das suas. Mas amanhã, ela pode estar apontada justamente para as ideias que você defende. É fundamental, portanto, compreendermos que a censura estatal é incontrolável. Sob qualquer ponto de vista, é muito mais vantajoso que exista uma vasta pluralidade de ideias conflitantes na sociedade competindo entre si, do que o estado decidir que ideias podem ser difundidas ou não.
Além do mais, libertários e anarcocapitalistas não podem nunca esperar qualquer tipo de simpatia por parte das autoridades governamentais. Para o estado, seria infinitamente mais prático e vantajoso criminalizar o libertarianismo e o anarcocapitalismo — sob a alegação de que são filosofias perigosas difundidas por extremistas radicais que ameaçam o estado democrático de direito — do que o fascismo ou qualquer outra ideologia centralizada em governos burocráticos e onipotentes. Portanto, defender a censura, especialmente a estatal, representa sempre um perigo para o próprio indivíduo, que mais cedo ou mais tarde poderá ver a censura oficial do sistema se voltar contra ele.
Outra razão pela qual libertários jamais devem defender a censura, é porque — ao contrário dos estatistas — não é coerente que defensores da liberdade se comportem como se o estado fosse o seu papai e o governo fosse a sua mamãe. Não devemos terceirizar nossas próprias responsabilidades, tampouco devemos nos comportar como adultos infantilizados. Assumimos a responsabilidade de combater todas as ideologias e filosofias que agridem a liberdade e os seres humanos. Não procuramos políticos ou burocratas para executar essa tarefa por nós.
Portanto, se você ver um fascista sendo censurado nas redes sociais ou em qualquer outro lugar, assuma suas dores. Sinta-se compelido a defendê-lo, mostre aos seus detratores que ele tem todo direito de se expressar, como qualquer pessoa. Você não tem obrigação de concordar com ele ou apreciar as ideias que ele defende. Mas silenciar arbitrariamente qualquer pessoa não é uma pauta que honra a liberdade.
Se você não gosta de estado, planejamento central, burocracia, impostos, tarifas, políticas coletivistas, nacionalistas e desenvolvimentistas, mostre com argumentos coesos e convincentes porque a liberdade e o livre mercado são superiores a todos esses conceitos. Mas repudie a censura com intransigência e mordacidade.
Em primeiro lugar, porque você aprecia e defende a liberdade de expressão para todas as pessoas. E em segundo lugar, por entender perfeitamente que — se a censura eventualmente se tornar uma política de estado vigente entre a sociedade — é mais provável que ela atinja primeiro os defensores da liberdade do que os defensores do estado.
Machismo
Muitos elementos do comportamento masculino que hoje são atacados com virulência e considerados machistas pelo movimento progressista são na verdade manifestações naturais intrínsecas ao homem, que nossos avôs cultivaram ao longo de suas vidas sem serem recriminados por isso. Com a ascensão do feminismo, do progressismo e a eventual problematização do sexo masculino, o antagonismo militante dos principais líderes da revolução sexual da contracultura passou a naturalmente condenar todos os atributos genuinamente masculinos, por considerá-los símbolos de opressão e dominação social.
Apesar do Brasil ser uma sociedade liberal ultra-progressista, onde o estado protege mais as mulheres do que as crianças — afinal, a cada semana novas leis são implementadas concedendo inúmeros privilégios e benefícios às mulheres, aos quais elas jamais teriam direito em uma sociedade genuinamente machista e patriarcal —, a esquerda política persiste em tentar difundir a fantasia da opressão masculina e o mito de que vivemos em uma sociedade machista e patriarcal.
Como sempre, a realidade mostra um cenário muito diferente daquilo que é pregado pela militância da terra da fantasia. O Brasil atual não tem absolutamente nada de machista ou patriarcal. No Brasil, mulheres podem votar, podem ocupar posições de poder e autoridade tanto na esfera pública quanto em companhias privadas, podem se candidatar a cargos políticos, podem ser vereadoras, deputadas, governadoras, podem ser proprietárias do próprio negócio, podem se divorciar, podem dirigir, podem comprar armas, podem andar de biquíni nas praias, podem usar saias extremamente curtas, podem ver programas de televisão sobre sexo voltados única e exclusivamente para o público feminino, podem se casar com outras mulheres, podem ser promíscuas, podem consumir bebidas alcoólicas ao ponto da embriaguez, e podem fazer praticamente tudo aquilo que elas desejarem. No Brasil do século XXI, as mulheres são genuinamente livres para fazer as próprias escolhas em praticamente todos os aspectos de suas vidas. O que mostra efetivamente que a tal opressão do patriarcado não existe.
O liberalismo social extremo do qual as mulheres usufruem no Brasil atual — e que poderíamos estender a toda a sociedade contemporânea ocidental — é suficiente para desmantelar completamente a fábula feminista da sociedade patriarcal machista e opressora, que existe única e exclusivamente no mundinho de fantasias ideológicas da esquerda progressista.
Tão importante quanto, é fundamental compreender que nenhum homem é obrigado a levar o feminismo a sério ou considerá-lo um movimento social e político legítimo. Para um homem, ser considerado machista ou até mesmo assumir-se como um não deveria ser um problema. O progressismo e o feminismo — com o seu nefasto hábito de demonizar os homens, bem como todos os elementos inerentes ao comportamento e a cultura masculina — é que são o verdadeiro problema, conforme tentam modificar o homem para transformá-lo em algo que ele não é nem deveria ser: uma criatura dócil, passiva e submissa, que é comandada por ideologias hostis e antinaturais, que não respeitam a hierarquia de uma ordem social milenar e condições inerentes à própria natureza humana. Com o seu hábito de tentar modificar tudo através de leis e decretos, o feminismo e o progressismo mostram efetivamente que o seu real objetivo é criminalizar a masculinidade.
A verdade é que — usufruindo de um nível elevado de liberdades — não existe praticamente nada que a mulher brasileira do século XXI não possa fazer. Adicionalmente, o governo dá as mulheres uma quantidade tão avassaladora de vantagens, privilégios e benefícios, que está ficando cada vez mais difícil para elas encontrarem razões válidas para reclamarem da vida. Se o projeto de lei que pretende fornecer um auxílio mensal de mil e duzentos reais para mães solteiras for aprovado pelo senado, muitas mulheres que tem filhos não precisarão nem mesmo trabalhar para ter sustento. E tantas outras procurarão engravidar, para ter direito a receber uma mesada mensal do governo até o seu filho completar a maioridade.
O que a militância colorida da terra da fantasia convenientemente ignora — pois a realidade nunca corresponde ao seu conto de fadas ideológico — é que o mundo de uma forma geral continua sendo muito mais implacável com os homens do que é com as mulheres. No Brasil, a esmagadora maioria dos suicídios é praticada por homens, a maioria das vítimas de homicídio são homens e de cada quatro moradores de rua, três são homens. Mas é evidente que uma sociedade liberal ultra-progressista não se importa com os homens, pois ela não é influenciada por fatos concretos ou pela realidade. Seu objetivo é simplesmente atender as disposições de uma agenda ideológica, não importa quão divorciadas da realidade elas são.
O nível exacerbado de liberdades sociais e privilégios governamentais dos quais as mulheres brasileiras usufruem é suficiente para destruir a fantasiosa fábula da sociedade machista, opressora e patriarcal. Se as mulheres brasileiras não estão felizes, a culpa definitivamente não é dos homens. Se a vasta profusão de liberdades, privilégios e benefícios da sociedade ocidental não as deixa plenamente saciadas e satisfeitas, elas podem sempre mudar de ares e tentar uma vida mais abnegada e espartana em países como Irã, Paquistão ou Afeganistão. Quem sabe assim elas não se sentirão melhores e mais realizadas?
Homofobia
Quando falamos em homofobia, entramos em uma categoria muito parecida com a do racismo: o direito de discriminação é totalmente válido. Absolutamente ninguém deve ser obrigado a aceitar homossexuais ou considerar o homossexualismo como algo normal. Sendo cristão, não existe nem sequer a mais vaga possibilidade de que algum dia eu venha a aceitar o homossexualismo como algo natural. O homossexualismo se qualifica como um grave desvio de conduta e um pecado contra o Criador.
A Bíblia proíbe terminantemente conduta sexual imoral, o que — além do homossexualismo — inclui adultério, fornicação, incesto e bestialidade, entre outras formas igualmente pérfidas de degradação.
Segue abaixo três passagens bíblicas que proíbem terminantemente a conduta homossexual:
“Não te deitarás com um homem como se deita com uma mulher. Isso é abominável!” (Levítico 18:22 — King James Atualizada)
“Se um homem se deitar com outro homem, como se deita com mulher, ambos terão praticado abominação; certamente serão mortos; o seu sangue estará sobre eles.” (Levítico 20:13 — João Ferreira de Almeida Atualizada)
“O quê! Não sabeis que os injustos não herdarão o reino de Deus? Não sejais desencaminhados. Nem fornicadores, nem idólatras, nem adúlteros, nem homens mantidos para propósitos desnaturais, nem homens que se deitam com homens, nem ladrões, nem gananciosos, nem beberrões, nem injuriadores, nem extorsores herdarão o reino de Deus.” (1 Coríntios 6:9,10 —Tradução do Novo Mundo das Escrituras Sagradas com Referências)
Se você não é religioso, pode simplesmente levar em consideração o argumento do respeito pela ordem natural. A ordem natural é incondicional e incisiva com relação a uma questão: o complemento de tudo o que existe é o seu oposto, não o seu igual. O complemento do dia é a noite, o complemento da luz é a escuridão, o complemento da água, que é líquida, é a terra, que é sólida. E como sabemos o complemento do macho — de sua respectiva espécie — é a fêmea.
Portanto, o complemento do homem, o macho da espécie humana, é naturalmente a mulher, a fêmea da espécie humana. Um homem e uma mulher podem naturalmente se reproduzir, porque são um complemento biológico natural. Por outro lado, um homem e outro homem são incapazes de se reproduzir, assim como uma mulher e outra mulher.
Infelizmente, o mundo atual está longe de aceitar como plenamente estabelecida a ordem natural pelo simples fato dela existir, visto que tentam subvertê-la a qualquer custo, não importa o malabarismo intelectual que tenham que fazer para justificar os seus pontos de vista distorcidos e antinaturais. A libertinagem irrefreável e a imoralidade bestial do mundo contemporâneo pós-moderno não reconhecem nenhum tipo de limite. Quem tenta restabelecer princípios morais salutares é imediatamente considerado um vilão retrógrado e repressivo, sendo ativamente demonizado pela militância do hedonismo, da luxúria e da licenciosidade desenfreada e sem limites.
Definitivamente, fazer a apologia da moralidade, do autocontrole e do autodomínio não faz nenhum sucesso na Sodoma e Gomorra global dos dias atuais. O que faz sucesso é lacração, devassidão, promiscuidade e prazeres carnais vazios. O famoso escritor e filósofo francês Albert Camus expressou uma verdade contundente quando disse: “Uma só frase lhe bastará para definir o homem moderno — fornicava e lia jornais”.
Qualquer indivíduo tem o direito inalienável de discriminar ativamente homossexuais, pelo direito que ele julgar mais pertinente no seu caso. A objeção de consciência para qualquer situação é um direito natural dos indivíduos. Há alguns anos, um caso que aconteceu nos Estados Unidos ganhou enorme repercussão internacional, quando o confeiteiro Jack Phillips se recusou a fazer um bolo de casamento para o “casal” homossexual Dave Mullins e Charlie Craig.
Uma representação dos direitos civis do estado do Colorado abriu um inquérito contra o confeiteiro, alegando que ele deveria ser obrigado a atender todos os clientes, independente da orientação sexual, raça ou crença. Preste atenção nas palavras usadas — ele deveria ser obrigado a atender.
Como se recusou bravamente a ceder, o caso foi parar invariavelmente na Suprema Corte, que decidiu por sete a dois em favor de Jack Phillips, sob a alegação de que obrigar o confeiteiro a atender o “casal” homossexual era uma violação nefasta dos seus princípios religiosos. Felizmente, esse foi um caso em que a liberdade prevaleceu sobre a tirania progressista.
Evidentemente, homossexuais não devem ser agredidos, ofendidos, internados em clínicas contra a sua vontade, nem devem ser constrangidos em suas liberdades pelo fato de serem homossexuais. O que eles precisam entender é que a liberdade é uma via de mão dupla. Eles podem ter liberdade para adotar a conduta que desejarem e fazer o que quiserem (contanto que não agridam ninguém), mas da mesma forma, é fundamental respeitar e preservar a liberdade de terceiros que desejam rejeitá-los pacificamente, pelo motivo que for.
Afinal, ninguém tem a menor obrigação de aceitá-los, atendê-los ou sequer pensar que uma união estável entre duas pessoas do mesmo sexo — incapaz de gerar descendentes, e, portanto, antinatural — deva ser considerado um matrimônio de verdade. Absolutamente nenhuma pessoa, ideia, movimento, crença ou ideologia usufrui de plena unanimidade no mundo. Por que o homossexualismo deveria ter tal privilégio?
Homossexuais não são portadores de uma verdade definitiva, absoluta e indiscutível, que está acima da humanidade. São seres humanos comuns que — na melhor das hipóteses —, levam um estilo de vida que pode ser considerado “alternativo”, e absolutamente ninguém tem a obrigação de considerar esse estilo de vida normal ou aceitável. A única obrigação das pessoas é não interferir, e isso não implica uma obrigação em aceitar.
Discriminar homossexuais (assim como pessoas de qualquer outro grupo, raça, religião, nacionalidade ou etnia) é um direito natural por parte de todos aqueles que desejam exercer esse direito. E isso nem o direito positivo nem a militância progressista poderão algum dia alterar ou subverter. O direito natural e a inclinação inerente dos seres humanos em atender às suas próprias disposições é simplesmente imutável e faz parte do seu conjunto de necessidades.
Conclusão
A militância progressista é absurdamente autoritária, e todas as suas estratégias e disposições ideológicas mostram que ela está em uma guerra permanente contra a ordem natural, contra a liberdade e principalmente contra o homem branco, cristão, conservador e tradicionalista — possivelmente, aquilo que ela mais odeia e despreza.
Nós não podemos, no entanto, ceder ou dar espaço para a agenda progressista, tampouco pensar em considerar como sendo normais todas as pautas abusivas e tirânicas que a militância pretende estabelecer como sendo perfeitamente razoáveis e aceitáveis, quer a sociedade aceite isso ou não. Afinal, conforme formos cedendo, o progressismo tirânico e totalitário tende a ganhar cada vez mais espaço.
Quanto mais espaço o progressismo conquistar, mais corroída será a liberdade e mais impulso ganhará o totalitarismo. Com isso, a cultura do cancelamento vai acabar com carreiras, profissões e com o sustento de muitas pessoas, pelo simples fato de que elas discordam das pautas universitárias da moda.
A história mostra perfeitamente que quanto mais liberdade uma sociedade tem, mais progresso ela atinge. Por outro lado, quanto mais autoritária ela for, mais retrocessos ela sofrerá. O autoritarismo se combate com liberdade, desafiando as pautas de todos aqueles que persistem em implementar a tirania na sociedade. O politicamente correto é o nazismo dos costumes, que pretende subverter a moral através de uma cultura de vigilância policial despótica e autoritária, para que toda a sociedade seja subjugada pela agenda totalitária progressista.
Pois quanto a nós, precisamos continuar travando o bom combate em nome da liberdade. E isso inclui reconhecer que ideologias, hábitos e costumes de que não gostamos tem o direito de existir e até mesmo de serem defendidos.
-
@ 32e18276:5c68e245
2024-07-05 18:28:20Hey guys!
Here's our Q3-Q4 report. There was some confusion with the timing of the previous quarters so we've accumulated everything since the Q2 report (March 2nd, 2024) into this one. Enjoy!
Damus OpenSats Q3-Q4 Progress Report
The third and fourth quarter of the initial Damus OpenSats grant encompasses work done across many of the active projects being worked on at Damus HQ. Here's a quick overview of the progress made across the organization:
nostrdb
Added
- Author query support (William Casarin)
- REQ support: ndb_subscribe (William Casarin)
- CLOSE support: ndb_unsubscibe (William Casarin)
- Profile flatbuffer dump utility (William Casarin)
- Ability to register a subscription callback instead of just polling (William Casarin)
Changed
- Dump json in filter and fulltext queries in cli tool (William Casarin)
Stats
name added removed commits William Casarin <jb55@jb55.com> +665 -739 16
nostrdb-rust
Added
- Note builder interface (William Casarin)
- Nip10 implementation (William Casarin)
- Getting profile by key (William Casarin)
- Note tag support (William Casarin)
Tag::into_iter
method (Yuki Kishimoto)FilterBuilder::until
method (Yuki Kishimoto)- Export structs from
tags
module (Yuki Kishimoto)
Fixed
FilterBuilder::limit
method (Yuki Kishimoto)Note::sig
method (Yuki Kishimoto)
Stats
Yuki Kishimoto <yukikishimoto@protonmail.com> +20 -4 5 William Casarin <jb55@jb55.com> +1551 -867 32
Damus NoteDeck/Android
This project is in heavy development and doesn't have clean changelogs yet, so here are all of the git logs from this period
Willam's updates
- account_manager: don't add the same pubkey more than once
- actionbar placeholder
- actionbar: remove border on reply button, add expand animation
- actionbar: support both dark and light buttons
- Add forward navigation animation
- add hover to profile map demo
- add --light lightmode flag to previews and notedeck
- add my pubkey to the timeline query for testing
- add test queries for elsat
- add vertical separators between timelines
- allow missing profiles in account switcher
- allow multiple invocations of --sec
- always have some default timeline
- app: make ndb public
- a quick note about the View trait
- args: allow filter files and raw filters on cli
- bump timeline filter limit
- cap size of remote filter limits
- change selection color to purple
- check: remove duplicate and disable wasm checks
- ci: disable wasm builds for now
- cli: add --sec argument to quickly add an account
- clippy postbox cleanups
- crates: add bitflags
- damus: make relay pool public
- darker quote reposts for mobile
- debug: add some debug logs for keyboard note selection
- deps: using tracing instead of log
- direnv: disable nix direnv on darwin
- direnv: make args explicit so its easy to change
- don't bump timeline when adding notes
- dont since-optimize when we don't have enough notes
- don't use an actual keystorage in Damus test apps
- drafts: clear post after posting
- enable nip10 replies
- enostr: rename Event to Note
- env: allow private things like secret keys
- filter: add default limit
- filters: fix hashtag filters
- filter: unify nostrdb and remote limits
- Fix all warnings
- fixed_window: fix clippy warning
- fix global query
- fix inline note preview colors
- fix light borders for quote reposts
- fix postbox design
- fix scroll area shrinking
- fix some clippy warnings
- fix until filters
- fix warnings
- fonts: always use base fonts for all families
- fun large profile grid preview
- get all missing ids from all timelines
- github: remove pages workflow
- gitignore: add perf files
- hide navigation title on global nav
- ids: find more unknown ids from inline notes
- images: add aspect_fill
- initial inline note previews
- initial navigation
- initial note posting
- initial postbox for testing
- initial post box view
- initial post reply view
- initial refactor in preparation for routing
- input: fix deadlock on resize
- input: handle raw events
- input: process input once
- input: switch to scanning over raw input events
- integrate sidebar into main view
- introduce View and Previews traits
- irc mode
- ircmode: tighten username
- keys: actually use the keystore
- lighter gray for inline previews in white mode
- list: switch from arc mutext to rc refcell
- load timelines from commandline
- log: reduce spammy new note log
- log relay subscriptions
- make notedeck front and center
- mobile: add lots of top padding on mobile
- mobile: a tad more padding at the top
- mobile: black panel bg color
- mobile: don't add hover on mobile
- mobile: make mobile flag runtime-configurable
- mobile: simplify is_mobile
- mobile: use my timeline for testing again
- move account_login_view to ui submodule
- move add_space to its correct location
- nip10: fetch unknown replied-to notes
- nip10: show initial reply information on notes
- nix: add openssl dep for reqwest
- nix: make android emulator optional
- nostrdb: bump to support timeline queries
- note: don't allow nested note previews
- note: support nprofile mentions
- perf: don't clone bytes via a more specialized function
- perf: fix continuous repaint
- perf: profiling note content rendering
- popup: increase fixed window margin
- popup: simplify borrow
- postbox: add focused state
- postbox: add focus shadow from figma
- post: full available width
- postview: add vertical scroll
- previews: remove central panel frame
- profile: add about and username to profile previews
- profiles: introduce DisplayNames
- profiling: update puffin version
- queries: add a few more test queries
- queries: set reasonable initial query sizes
- queries: update hashtags query
- readme: add usage
- readme: document previews
- readme: make it clear that its for desktop
- readme: make it clear that nix is optional for non-android dev
- readme: show notedeck preview
- refactor: move fixed_window to ui
- refactor: move note into its own widget
- refactor: rename widgets to ui
- refactor: use map instead of explicit
if let
- remote: use default_remote_limit instead of hardcoding
- remove context from DesktopSidePanel
- remove minimum window size
- remove useless struct
- render_pfp: only depend on imgcache
- reset virtual list if notes are spliced into timeline
- set tooltip delay to 100ms
- side_panel: return more detailed side panel responses
- simplify is_mobile check
- simplify tab underline calculation
- since filter optimization
- slightly larger pfpfs
- small inline preview pfps
- style: initial logic for mobile style
- style: less bubbly
- style: realtime hover interactions
- style: set 0 duration tooltip delay
- Switch to egui master to fix wgpu issues
- switch to glow for now
- switch to rustls-tls-native-roots
- tabs: select notes & replies by default
- test: add test timeline query
- test: update test profile with a banner
- test: use my timeline query by default for testing
- textmode: adjust name sizing so it doesn't bump the column
- textmode: fix coloring of abbreviated names
- textmode: no previews in textmore for now
- theme: update to correct colors based on figma design
- timeline: don't hide on resize
- timeline: refactor tabs into TimelineView
- timeline: use strips instead of panels
- ui: add banners to profile previews
- ui: add feathering-resistant hline separator fn
- ui: add frame around note previews
- ui: add initial Profile hover previews
- ui: add profile picture hover animation
- ui: integrate egui-tabs for notes & replies selector
- ui: introduce profile picture widget
- ui: make pixel sizes correct, use more of the figma
- ui: move RelayView into ui module
- ui: only inline preview kind1 notes for now
- ui: reduce vertical padding for more compact timelines
- ui: remove some old note ui comments
- ui: simplify note widget
- ui: switch to flags for note options
- update slow timeline query
- update to latest nostrdb, adding tag support
- update version in comment because I still use this on my laptop
- use egui_virtual_list for rendering
- use unique id for post/reply view
- weird actionbar experiment
- we should just called this damus
- widgets: begin organizing ui components into widgets
- working notes + notes&replies
kernelkind's updates
- account_management: refactor
- AccountManagementView
- AccountManager: add ability to make a selection
- AccountSelectionWidget
- Account switcher
- Add AccountManager to app
- Add custom visual themes
- Add flag to emulate mobile during preview
- Add keypair & update pubkey
- Add login key parsing
- Add login manager
- Add MacOS key storage
- Add MobileAccountLoginView
- Add modular custom text styles
- Add monospace text style
- Add nix-shell for macos android development
- Add nostr-sdk dependency
- Add precommit hook to suggest proper formatting
- Add preview for RelayView
- Add relay view
- add reqwest as dependency
- Add SimpleProfilePreview
- Add ui_test_harness binary implementation
- Add warn color and highlight color
- app: add accounts to Damus & mock
- Apply app style to AccountLoginView
- Apply cargo fmt
- Conditionally compile MacOS key storage code
- Constrain app minimum size
- Create account login panel
- Create side panel & global popup
- enostr: expose RelayStatus
- Extract the sample relay to test_data for reuse
- impl linux credential storage
- Integrate account switcher to side panel
- Integrate global popup into app
- login: Add key loading & error to mobile
- macos_key_storage: runner ignore tests
- migrate AccountManagementView to enostr Keypair
- Migrate to new AccountManagementView conception
- Move login business logic to LoginManager
- move login logic from promise to async fns
- Move preview controller out of account_manager.rs
- move test account creation & apply to global popup
- Pfp integration to side panel
- refactor account switcher & management previews
- Refactor 'ui tests' conception to previews
- reintroduce account management
- reintroduce account switcher
- remove nostr-sdk
- Rename PersistState -> StateInMemory
- select first account
- Seperate mobile dark color theme into its own func
- update cargo.lock to reflect toml change
- Update egui 0.26.1 -> 0.27.1
- Use app_creation for common app setup functions
- Use custom style in app
- use nostr in enostr
Stats
name added removed commits kernelkind <kernelkind@gmail.com> +6844 -1979 58 William Casarin <jb55@jb55.com> +9733 -5583 194
Damus iOS
Added
- Ability to create highlights (ericholguin)
- Add ability to mute hashtag from SearchView (Charlie Fish)
- Add ability to mute words, add new mutelist interface (Charlie) (William Casarin)
- Added callbackuri for a better ux when connecting mutiny wallet nwc (ericholguin)
- Added nip10 marker replies (William Casarin)
- Added title image and tags to longform events (ericholguin)
- Add event content preview to the full screen carousel (Daniel D’Aquino)
- Add First Aid solution for users who do not have a contact list created for their account (Daniel D’Aquino)
- Add marker nip10 support when reading notes (William Casarin)
- Add video cache to save network bandwidth (Daniel D’Aquino)
- Completely new threads experience that is easier and more pleasant to use (Daniel D’Aquino)
- Connect to Mutiny Wallet Button (ericholguin)
- Highlights (NIP-84) (ericholguin)
- Notification reminders for Damus Purple impending expiration (Daniel D’Aquino)
- Proxy Tags are now viewable on Selected Events (ericholguin)
- Relay fees metadata (ericholguin)
- Revamp emoji picker to be less error-prone and add search, frequently used, and multiple skin tone support capabilities (Terry Yiu)
- Show list of quoted reposts in threads (William Casarin)
Changed
- Added first aid contact damus support email (alltheseas)
- Add support for Apple In-App purchases (Daniel D’Aquino)
- Always strip GPS data from images (kernelkind)
- Change reactions to use a native looking emoji picker (Terry Yiu)
- Errors with an NWC will show as an alert (ericholguin)
- Improve UX around video playback (Daniel D’Aquino)
- Moved paste nwc button to main wallet view (ericholguin)
- Relay config view user interface (ericholguin)
- Relay detail design (ericholguin)
- Updated Zeus logo (ericholguin)
Fixed
- Fix broken GIF uploads (Daniel D’Aquino)
- Fix bug that would cause connection issues with relays defined with a trailing slash URL, and an inability to delete them. (Daniel D’Aquino)
- Fixed issue where some replies were including the q tag (William Casarin)
- Fixed issue where timeline was scrolling when it isn't supposed to (William Casarin)
- Fixed threads not loading sometimes (William Casarin)
- Fixed wallet not disconnecting when a user logs out (ericholguin)
- Fix emoji reactions being cut off (ericholguin)
- Fix ghost notifications caused by Purple impending expiration notifications (Daniel D’Aquino)
- Fix image indicators to limit number of dots to not spill screen beyond visible margins (ericholguin)
- Fix in-app purchase issue that would trigger an error on purchase before confirming the account information. (Daniel D’Aquino)
- Fix issue where bootstrap relays would inadvertently be added to the user's list on connectivity issues (Daniel D’Aquino)
- Fix missing Mute button in profile view menu (Terry Yiu)
- Fix nostrscripts not loading (William Casarin)
- Fix profile not updating bug (William Casarin)
- Fix stale feed issue when follow list is too big (Daniel D’Aquino)
- Fix thread bug where a quote isn't picked up as a reply (William Casarin)
- Fix welcome screen not showing if the user enters the app directly after a successful checkout without going through the link (Daniel D’Aquino)
- Improve reliability of contact list creation during onboarding (Daniel D’Aquino)
- Issue where NWC Scanner view would not dismiss after a failed scan/paste (ericholguin)
Stats
name added removed commits Fonta1n3 <fontainedenton@googlemail.com> +1 -0 1 Sean Kibler <skibler@protonmail.com> +13 -2 1 alltheseas <64376233+alltheseas> +65 -1 4 Transifex <transifex@transifex.com> +581 -39 36 Terry Yiu <git@tyiu.xyz> +763 -1383 8 William Casarin <jb55@jb55.com> +1017 -1564 49 ericholguin <ericholguin@apache.org> +1962 -643 13 Daniel D’Aquino <daniel@daquino.me> +3885 -761 48
-
@ 1739d937:3e3136ef
2024-06-28 08:27:59This is the first in a series of weekly updates I'm publishing on my process around secure messaging. Since it's the first, let's start with a bit of historical context.
How this started
On April 29th I published a PR on the NIPs repo detailing how we could achieve "Double Ratchet" DMs on Nostr. There was also a video and demo app that went along with the PR. The basic premise was to use an adapted version of the Signal protocol. This would result in DMs that were truly private and confidential, even in the case where you leaked your main private key (your nsec).
I got a lot of great feedback from folks on that PR. Interestingly, nearly all of it focused on two points, both of which I'd deliberately scoped out. Group messaging and multi-device/client support. While I knew these were important, and I'd figured out how these might be accomplished, I'd scoped them out to try and keep the footprint of the spec as small as possible But, the more I talked to people, the more it became clear that this was one problem to be solved and given the complexity, it'd be better to do it in one shot.
At the same time, I'd seen that Messaging Layer Security (MLS) had recently made a lot of progress on becoming an internet standard with their RFC proposal and, goaded on by Vitor, decided to take a closer look.
Enter MLS
Messaging Layer Security (MLS) is a new protocal that is basically a modern extension of the Signal protocol that makes group messaging way more efficient (log vs linear) and was built to be used in centralized or federated environments. I'd heard other Nostr devs talk about it in the past but it was always overlooked as being too complicated or too early.
After spending a couple weeks reading hundreds of pages of RFC docs and reading through a few implementations of the MLS spec, I believe it's the best solution for secure direct and group messaging in Nostr. It also has the added benefit that we can upgrade the underlying crypto primitives over time in a sane way.
The MLS protocol specifies "a key establishment protocol that provides efficient asynchronous group key establishment with forward secrecy (FS) and post-compromise security (PCS) for groups in size ranging from two to thousands."
The spec I'm working on will detail the ways that we implement this protocol into the Nostr environment (namely, how do we use our crypto primitives, use events as control mechanisms, and use relays for storage, while obfuscating metadata).
Goals
It's important to be clear about what we're aiming for here. Engineering is all about tradeoffs, always.
- Private and Confidential DMs and Group messages
- Private means that an observer cannot tell that Alice and Bob are talking to one another, or that Alice is part of a specific group. This necessarily requires protecting metadata.
- Confidential means that the contents of conversations can only be viewed by the intended recipients.
- Forward secrecy and Post-compromise security (PCS) in the case of any key material being leaked, whether that's your main Nostr identity key (your nsec) or any of the keys used in the MLS ratchet trees.
- Forward secrecy means that encrypted content in the past remains encrypted even if key material is leaked.
- Post compromise security means that leaking key material doesn't allow an attacker to continue to read messages indefinitely into the future.
- Scales well for large groups. MLS provides this from a computational standpoint, but we need to make sure this works in a scalable way when multiple relays are involved.
- Allows for the use of multiple device/clients in a single conversation/group. Importantly, we're not aiming to enable a device/client to be able to reconstruct the full history of a conversation at any point.
Progress this week
Ok, finally, what what I been up to?
Reading
I've spent most of the last few weeks reading the MLS spec and architectural doc (multiple times), learning some Rust, and beefing up my knowledge of cryptography (which was, if I'm being generous, paltry before starting this project).
Ciphersuites
Nostr is built around the same crypto primitives that Bitcoin is, namely Schnorr signatures over the secp256k1 curve and SHA-256 hashes. This curve isn't currently supported officially in the MLS spec. I've been in touch with the MLS working group to better understand the process of adding a new ciphersuite to the set of ciphersuites in the MLS spec. The outcome here is that we're going to start out using our custom ciphersuite that isn't part of the formal spec. The only drawback being that Nostr's MLS implementation won't be immediately interoperable with other MLS implementations. We can always add it later via the formal channels if we want.
MLS Implementations
Given the complexity of the MLS spec itself (the RFC is 132 pages long), having a well vetted, well tested implementation is going to be key to adoption in the Nostr ecosystem. OpenMLS is an implementation created by several of the RFC authors and written in Rust with bindings for nearly all the major languages we would want to support.
I've been in touch with the maintainers to talk about adding support to their library for our new ciphersuite and to better understand the bindings that are there. Some (WASM) are very barebones and still need a lot of work. They are generally open to the idea of working with me on adding the missing pieces we'd need.
Double Ratchet NIP 2.0
I've also started to write up the new version of the NIP that will detail how all of this will work when plugged into Nostr. It's not yet ready to share but it's getting closer.
Onward & Upward
Hopefully that's a helpful recap. I'll keep doing these weekly and welcome any questions, feedback, or support. In particular, if you're keen on working on this with me, please reach out. More eyes and more brains can only make this better. 🤙
-
@ 8fb140b4:f948000c
2023-07-22 09:39:48Intro
This short tutorial will help you set up your own Nostr Wallet Connect (NWC) on your own LND Node that is not using Umbrel. If you are a user of Umbrel, you should use their version of NWC.
Requirements
You need to have a working installation of LND with established channels and connectivity to the internet. NWC in itself is fairly light and will not consume a lot of resources. You will also want to ensure that you have a working installation of Docker, since we will use a docker image to run NWC.
- Working installation of LND (and all of its required components)
- Docker (with Docker compose)
Installation
For the purpose of this tutorial, we will assume that you have your lnd/bitcoind running under user bitcoin with home directory /home/bitcoin. We will also assume that you already have a running installation of Docker (or docker.io).
Prepare and verify
git version - we will need git to get the latest version of NWC. docker version - should execute successfully and show the currently installed version of Docker. docker compose version - same as before, but the version will be different. ss -tupln | grep 10009- should produce the following output: tcp LISTEN 0 4096 0.0.0.0:10009 0.0.0.0: tcp LISTEN 0 4096 [::]:10009 [::]:**
For things to work correctly, your Docker should be version 20.10.0 or later. If you have an older version, consider installing a new one using instructions here: https://docs.docker.com/engine/install/
Create folders & download NWC
In the home directory of your LND/bitcoind user, create a new folder, e.g., "nwc" mkdir /home/bitcoin/nwc. Change to that directory cd /home/bitcoin/nwc and clone the NWC repository: git clone https://github.com/getAlby/nostr-wallet-connect.git
Creating the Docker image
In this step, we will create a Docker image that you will use to run NWC.
- Change directory to
nostr-wallet-connect
:cd nostr-wallet-connect
- Run command to build Docker image:
docker build -t nwc:$(date +'%Y%m%d%H%M') -t nwc:latest .
(there is a dot at the end) - The last line of the output (after a few minutes) should look like
=> => naming to docker.io/library/nwc:latest
nwc:latest
is the name of the Docker image with a tag which you should note for use later.
Creating docker-compose.yml and necessary data directories
- Let's create a directory that will hold your non-volatile data (DB):
mkdir data
- In
docker-compose.yml
file, there are fields that you want to replace (<> comments) and port “4321” that you want to make sure is open (check withss -tupln | grep 4321
which should return nothing). - Create
docker-compose.yml
file with the following content, and make sure to update fields that have <> comment:
version: "3.8" services: nwc: image: nwc:latest volumes: - ./data:/data - ~/.lnd:/lnd:ro ports: - "4321:8080" extra_hosts: - "localhost:host-gateway" environment: NOSTR_PRIVKEY: <use "openssl rand -hex 32" to generate a fresh key and place it inside ""> LN_BACKEND_TYPE: "LND" LND_ADDRESS: localhost:10009 LND_CERT_FILE: "/lnd/tls.cert" LND_MACAROON_FILE: "/lnd/data/chain/bitcoin/mainnet/admin.macaroon" DATABASE_URI: "/data/nostr-wallet-connect.db" COOKIE_SECRET: <use "openssl rand -hex 32" to generate fresh secret and place it inside ""> PORT: 8080 restart: always stop_grace_period: 1m
Starting and testing
Now that you have everything ready, it is time to start the container and test.
- While you are in the
nwc
directory (important), execute the following command and check the log output,docker compose up
- You should see container logs while it is starting, and it should not exit if everything went well.
- At this point, you should be able to go to
http://<ip of the host where nwc is running>:4321
and get to the interface of NWC - To stop the test run of NWC, simply press
Ctrl-C
, and it will shut the container down. - To start NWC permanently, you should execute
docker compose up -d
, “-d” tells Docker to detach from the session. - To check currently running NWC logs, execute
docker compose logs
to run it in tail mode add-f
to the end. - To stop the container, execute
docker compose down
That's all, just follow the instructions in the web interface to get started.
Updating
As with any software, you should expect fixes and updates that you would need to perform periodically. You could automate this, but it falls outside of the scope of this tutorial. Since we already have all of the necessary configuration in place, the update execution is fairly simple.
- Change directory to the clone of the git repository,
cd /home/bitcoin/nwc/nostr-wallet-connect
- Run command to build Docker image:
docker build -t nwc:$(date +'%Y%m%d%H%M') -t nwc:latest .
(there is a dot at the end) - Change directory back one level
cd ..
- Restart (stop and start) the docker compose config
docker compose down && docker compose up -d
- Done! Optionally you may want to check the logs:
docker compose logs
-
@ 79008e78:dfac9395
2024-09-02 06:17:23ระบบเงินอิเล็กทรอนิกส์แบบ peer-to-peer
ระบบเงินอิเล็กทรอนิกส์แบบ peer-to-peer นั้นจะช่วยให้เราสามารถชำระเงินผ่านทางออนไลน์ได้โดยตรงจากฝ่ายหนึ่งไปยังอีกฝ่ายหนึ่งโดยไม่ต้องผ่านตัวกลางอย่างพวกสถาบันการเงิน โดยใช้ digital signature เป็นส่วนหนึ่งในการแก้ปัญหานี้ แต่มันจะไม่มีประโยชน์ใด ๆ เลยหากยังคงต้องอาศัยตัวกลางที่เชื่อถือได้มาแก้ปัญหา double spending เราขอเสนอวิธีแก้ปัญหา double spending โดยใช้เครือข่ายแบบ peer-to-peer ให้เครือข่ายคอยประทับเวลาธุรกรรมต่าง ๆ ในระบบและนำมาเรียงร้อยกันเป็นเส้นสายของ proof-of-work ที่ใช้ hash เพื่อสร้างธุรกรรมที่ไม่สามารถเปลี่ยนแปลงได้ โดยไม่ต้องทำ proof-of-work ใหม่ โดยให้เส้นสายที่ยาวที่สุดนั้น ไม่เพียงแต่ทำหน้าที่เป็นลำดับของธุรกรรมที่เกิดขึ้นเท่านั้น แต่ยังเป็นสิ่งที่พิสูจน์ได้ว่ามาจากกำลังประมวลผล CPU ที่มากที่สุด และตราบใดที่ nodes ส่วนใหญ่ไม่ได้ร่วมมือกันโจมตีเครือข่ายและยังคงควบคุมกำลังประมวลผลส่วนใหญ่ในระบบไว้ พวกเขาก็จะสร้างเส้นสายที่ยาวที่สุดและสามารถเอาชนะผู้ประสงค์ร้ายที่จะโจมตีระบบได้ ตัวเครือข่ายเองไม่ได้ต้องมีโครงสร้างอะไรที่ซับซ้อน ข้อมูลต่าง ๆ ในเครือข่ายจะถูกกระจายส่งต่อโดยไม่ต้องสนใจว่าผู้รับจะได้รับหรือไม่ และ nodes ต่าง ๆ เองก็สามารถที่จะออกจากเครือข่ายและกลับเข้าร่วมใหม่ได้ตามที่ต้องการ โดยยอมรับเส้น proof-of-work ที่ยาวที่สุด เป็นหลักฐานของสิ่งที่เกิดขึ้นในขณะที่ node นั้น ๆ ไม่ได้อยู่ในเครือข่าย
1.บทนำ (Introduction)
ไม่ว่าใครจะใคร่ซื้อใคร่ขายอะไรใด ๆ บนอินเตอร์เน็ตนั้น ก็จำเป็นต้องพึ่งพาสถาบันการเงินในฐานะของบุคคลที่สามเพื่อดำเนินการชำระเงินทางอิเล็กทรอนิกส์เสมอ ๆ ซึ่งถึงแม้ว่าระบบนี้มันจะทำงานได้ดีสำหรับธุรกรรมส่วนใหญ่ ๆ แต่ระบบก็ก็มีจุดอ่อนอยู่ที่ยังต้องอาศัยความไว้เนื้อเชื่อใจ (trust) ในระบบนี้การทำธุรกรรมที่ไม่สามารถย้อนกลับได้อย่างสมบูรณ์นั้นมันแทบจะเป็นไปไม่ได้เลย เนื่องจากสถาบันการเงินไม่สามารถหลีกเลี่ยงการเป็นตัวกลางในการไกล่เกลี่ยข้อพิพาทต่าง ๆ ที่อาจเกิดขึ้นได้ มิหนำซ้ำต้นทุนในการไกล่เกลี่ยยังทำให้ต้นทุนการทำธุรกรรมเพิ่มสูงขึ้น และเมื่อต้นทุนสูงขึ้นขนาดของธุรกรรมที่สามารถใช้งานได้จริงก็สูงขึ้นตามไปด้วย ธุรกรรมเล็ก ๆ น้อย ๆ ก็ไม่สามารถเกิดขึ้นได้ เมื่อมีความเป็นไปได้ที่ธุรกรรมจะเกิดการย้อนกลับ ความจำเป็นในการสร้างความไว้วางใจก็ยิ่งทวีคูณมากขึ้น ผู้ค้าก็จำเป็นต้องระมัดระวังลูกค้า ต้องเรียกร้องข้อมูลมากกว่าที่จำเป็น การฉ้อโกงกลายเป็นเรื่องที่หลีกเลี่ยงไม่ได้เพราะต้นทุนและความไม่แน่นอนในทำธุรกรรมเหล่านี้ แน่นอนว่าเราสามารถหลีกเลี่ยงมันได้โดยการใช้เงินสด แต่ก็ไม่มีกลไกใดที่ทำให้สามารถใช้เงินสดผ่านช่องทางการสื่อสาร (เอาให้เข้าใจง่ายก็อินเตอร์เน็ต)ได้ โดยไม่ต้องมีตัวกลาง ;-;
แปลว่าสิ่งที่จำเป็นสำหรับการแก้ไขปัญหานี้คือระบบการชำระเงินทางอิเล็กทรอนิกส์ ที่อยู่บนพื้นฐานของการพิสูจน์ด้วยการเข้ารหัสแทนที่จะเป็นความไว้วางใจ ซึ่งจะทำให้คู่สัญญาสองฝ่ายที่ยินยอมสามารถทำธุรกรรมร่วมกันได้โดยตรง โดยไม่จำเป็นต้องมีบุคคลที่สามมาคอยเป็นตัวกลาง ธุรกรรมที่ยากต่อการย้อนกลับจะช่วยปกป้องผู้ขายจากการฉ้อโกง และสามารถใช้กลไก escrow เพื่อปกป้องผู้ซื้อได้อีกด้วย ในเอกสารชุดนี้ เราขอเสนอวิธีแก้ปัญหาการใช้จ่ายซ้ำซ้อนโดยใช้เซิร์ฟเวอร์ timestamp กระจายศูนย์แบบ peer-to-peer เพื่อสร้างหลักฐานการคำนวณลำดับเวลาของธุรกรรม โดยระบบนี้จะปลอดภัยตราบใดที่กลุ่มของ node ที่ซื่อสัตย์ ยังคงมีกำลังประมวลผลที่มากกว่ากลุ่มที่ประสงค์ร้ายกับระบบ
2.ธุรกรรม (Transactions)
นิยามของเหรียญอิเล็กทรอนิกส์ในที่นี้ คือห่วงโซ่ที่คล้องเกี่ยวกันของ digital signature โดยที่เจ้าของเหรียญอิเล็กทรอนิกส์จะโอนเหรียญไปยังเจ้าของคนถัดไป ด้วยการลง digital signature บน hash ของธุรกรรมก่อนหน้ารวมถึงกุญแจสาธารณะของเจ้าของคนถัดไป และผนวกมันไว้ที่ส่วนท้ายของธุรกรรม และผู้รับเงินเองก็สามารถตรวจสอบลายเซ็นเพื่อยืนยันความเป็นเจ้าของได้
https://image.nostr.build/a467896797a9fb9f98c3c234f0adb4df2376f2c3d9a7cc9d8672d7a9f5aa9efa.png
แน่นอนว่าปัญหาก็คือผู้รับเงินไม่สามารถตรวจสอบได้ว่าเจ้าของคนใดคนหนึ่งก่อนหน้าเขาได้ใช้เหรียญดังกล่าวซ้ำซ้อนมากกว่าหนึ่งครั้งหรือไม่ และวิธีการแก้ไขปัญหานี้โดยทั่วไปก็คงเป็นการกำหนดตัวกลางที่มีความน่าเชื่อถือมาเป็นคนตรวจสอบทุกธุรกรรมเพื่อป้องกันการใช้จ่ายซ้ำซ้อน และหลังจากการทำธุรกรรมแต่ละครั้ง เหรียญจะต้องถูกส่งกลับไปยังตัวกลางเพื่อออกเหรียญใหม่ และจะมีเพียงเหรียญที่ออกจากตัวกลางโดยตรงเท่านั้นที่จะเชื่อถือได้ว่าจะไม่ถูกใช้จ่ายซ้ำซ้อน แต่ปัญหาก็คือ ชะตากรรมของระบบเงินทั้งหมดจะขึ้นอยู่กับตัวกลางตัวนี้ เพราะทุกธุรกรรมจำเป็นจะต้องผ่านพวกเขา ซึ่งก็ไม่ต่างอะไรกับธนาคาร
เราจึงต้องการวิธีการที่ทำให้ผู้รับเงินทราบได้ว่าเจ้าของคนก่อน ๆ ไม่ได้ลงนามในธุรกรรมใด ๆ มาก่อน เพื่อให้บรรลุวัตถุประสงค์นี้ เราจะทำการนับว่าธุรกรรมที่เกิดขึ้นก่อนเป็นธุรกรรมที่ถูกต้อง และจะไม่สนใจความพยายามใด ๆ ในการที่จะใช้เหรียญนั้น ๆ ซ้ำอีก และวิธีเดียวที่ทำแบบนี้ได้ คือการรับรู้ถึงธุรกรรมทั้งหมด เช่นเดียวกับโมเดลที่ได้กล่าวข้างต้น ที่ตัวกลางจะรับรู้ถึงธุรกรรมทั้งหมดและตัดสินว่าธุรกรรมใดมาก่อนมาหลัง เพื่อให้บรรลุเป้าหมายนี้โดยไม่ต้องมีบุคคลที่สามที่เชื่อถือได้ ธุรกรรมทั้งหมดจะต้องถูกประกาศต่อสาธารณะ [1] และเราต้องการระบบที่ผู้เข้าร่วมเห็นพ้องในประวัติธุรกรรมชุดเดียวกันตามลำดับที่ได้รับ ส่วนผู้รับเงินก็จำเป็นจะต้องมีหลักฐานว่า ในขณะที่ทำธุรกรรม "โหนด" ส่วนใหญ่ในระบบเห็นพ้องต้องกันว่าธุรกรรมนั้นได้รับเป็นลำดับแรก(ไม่มีธุรกรรมที่ใช้เหรียญพวกนี้มาก่อน)
3.ระบบบันทึกเวลา (Timestamp Server)
สำหรับแนวทางการแก้ปัญหาในครั้งนี้ เราจะใช้ประโยชน์จาก timestamp server ที่จะทำหน้าที่บันทึก hash ของบล๊อกที่ต้องการให้มีการบันทึกเวลา และจากนั้นจะทำการเผยแพร่ hash ดังกล่าว เหมือนกับหนังสือพิมพ์หรือโพสต์ใน Usenet [2-5] (ฟีลแบบทุกคนจะเห็นโพสต์นี้น้าา ประมาณนั้น) การบันทึกเวลานี้จะพิสูจน์ได้ว่าข้อมูลที่ถูก hash นั้นจะต้องมีอยู่จริงในเวลานั้นเพื่อให้ได้มาซึ่ง hash ดังกล่าว แต่ละการบันทึกเวลาจะรวมการบันทึกเวลาของหน้านี้ไว้ใน hash ของมันเพื่อสร้างเป็น chain โดยการบันทึกเวลาแต่ละครั้งจะยืนยันความถูกต้องของการบันทึกก่อนหน้าได้อีกด้วยด้วย
https://image.nostr.build/ddf92417c45dbb6e25da0af80a10d4cdbc3e725d047d65f54a3e3bfcf358c4d6.png
4.พรูฟ-ออฟ-เวิร์ค (Proof-of-Work)
ในการสร้าง Timestamp Server แบบกระจายศูนย์บนพื้นฐานแบบ peer to peer เราจำเป็นต้องใช้ระบบ Proof-of-Work (PoW) ที่คล้ายกับ Hashcash ของ Adam Back [6] แทนที่จะใช้วิธีการแบบเดิม ๆ อย่างการประกาศในหนังสือพิมพ์หรือ Usenet โดย PoW ใช้ในการตรวจสอบค่าที่มาจากกระบวนการ hash เช่น SHA-256 แล้ว ผลลัพธ์ที่ได้ (Hash) จะขึ้นต้นด้วยเลขศูนย์จำนวนหนึ่ง โดยที่ work (ประมาณว่าพลังประมวลผล) ที่ต้องใช้จะเพิ่มขึ้นแบบทวีคูณตามจำนวนเลขศูนย์ที่ต้องการ และสามารถตรวจสอบได้โดยการรัน Hash เพียงครั้งเดียว
ซึ่งสำหรับ timestamp network ของเรานั้น เราใช้ PoW โดยการเพิ่มค่า Nonce ในบล็อกไปเรื่อย ๆ จนกว่าจะพบค่าที่ทำให้ Hash ของบล็อกนั้นมีเลขศูนย์ตามที่กำหนด และเมื่อใช้กำลังประมวลผลของ CPU ไปกับการทำ PoW จนสำเร็จแล้ว บล็อกจะไม่สามารถเปลี่ยนแปลงได้ หากไม่มีการทำงานซ้ำใหม่ เนื่องจากบล็อกที่สร้างขึ้นภายหลังจะเชื่อมโยงกับบล็อกก่อนหน้า การเปลี่ยนแปลงบล็อกใด ๆ จะต้องทำ PoW ของบล็อกนั้นและบล็อกที่ตามมาใหม่ทั้งหมด
https://image.nostr.build/c039ef4ca6833cb1ecee65ac5991df2406be9b7e490b86b3b19f94f267767182.png
นอกจากนี้ PoW ยังช่วยแก้ปัญหาของเสียงส่วนมากที่มาตัดสินใจในระบบนี้ เพราะหากเสียงข้างมากอ้างอิงจากหลักการหนึ่ง IP หนึ่งเสียง ใครก็ตามที่สามารถสร้าง IP ได้จำนวนมากก็จะสามารถควบคุมระบบได้ จึงใช้หลักการหนึ่ง CPU หนึ่งเสียงแทน การตัดสินใจของเสียงข้างมากจะแสดงด้วย Chain ที่ยาวที่สุด ซึ่งบ่งบอกถึงความพยายามในการคำนวณ (Proof-of-Work) ที่มากที่สุด หาก Node ที่ซื่อสัตย์ (Honest nodes) มีกำลังประมวลผลของ CPU ส่วนใหญ่อยู่ในการควบคุม Honest Chain ก็จะเติบโตเร็วที่สุดและแซงหน้า Chain อื่น ๆ ได้ ผู้โจมตีที่ต้องการแก้ไขบล็อกในอดีตจะต้องทำ Proof-of-Work ของบล็อกนั้นและบล็อกที่ตามมาใหม่ทั้งหมด และต้องทำงานให้เร็วกว่า Honest Node ด้วย ซึ่งโอกาสที่ผู้โจมตีจะตามทันนั้นจะลดลงแบบทวีคูณเมื่อมีการเพิ่มบล็อกมากขึ้น
เพื่อชดเชยความเร็วของฮาร์ดแวร์ที่เพิ่มขึ้นและความสนใจในการรัน Node ที่ผันผวน ระดับความยากของ Proof-of-Work จะถูกกำหนดโดยค่าเฉลี่ย โดยตั้งเป้าไว้ที่จำนวนบล็อกเฉลี่ยต่อชั่วโมง หากสร้างบล็อกได้เร็วเกินไป ระดับความยากก็จะเพิ่มขึ้น
5.เครือข่าย (Network)
เครือข่ายนั้นมีการทำงาน ดังนี้
- การประกาศธุรกรรมใหม่: ธุรกรรมใหม่จะถูกประกาศ (broadcast) ไปยังทุก node ในเครือข่าย
- การรวบรวมธุรกรรม: แต่ละ node จะรวบรวมธุรกรรมใหม่ ๆ เหล่านี้ ไว้ในบล็อก
- การค้นหา Proof-of-Work: แต่ละ node จะทำการคำนวณ เพื่อค้นหา Proof-of-Work ตามค่า difficulty สำหรับบล็อกนั้น ๆ
- การประกาศบล็อก: เมื่อ node ใดค้นหา Proof-of-Work ได้แล้ว node นั้นจะทำการประกาศบล็อกไปยังทุก node ในเครือข่าย
- การตรวจสอบและยอมรับบล็อก: node อื่น ๆ จะทำการตรวจสอบและยอมรับบล็อกนั้น เฉพาะเมื่อธุรกรรมทั้งหมดภายในบล็อกนั้นถูกต้องและยังไม่ถูกใช้มาก่อน
- การสร้างบล็อกถัดไป: node ต่าง ๆ แสดงการยอมรับบล็อกโดยการเริ่มต้นสร้างบล็อกถัดไปใน chain ด้วย hash ของบล็อกที่ยอมรับ เป็น hash ก่อนหน้าในโครงสร้างของบล๊อกใหม่ที่กำลังสร้าง
node ต่าง ๆ จะถือว่า chain ที่ยาวที่สุดเป็น chain ที่ถูกต้องและจะทำงานเพื่อขยาย chain นั้นต่อไป หากมีสอง node ที่ได้ประกาศบล็อกเวอร์ชันที่แตกต่างกันในเวลาพร้อมกัน node บาง node อาจได้รับบล็อกหนึ่งก่อน อีกบล็อกหนึ่ง ในกรณีนี้ node เหล่านั้น จะทำงานบนบล็อกที่ได้รับก่อน แต่จะเก็บสำเนาของบล็อกอีกอันหนึ่งไว้ ในกรณีที่บล็อกนั้น กลายเป็นบล็อกที่อยู่ใน chain ที่ยาวกว่าปัญหาข้อโต้แย้งนี้ก็จะได้รับการแก้ไข เมื่อพบ Proof-of-Work อันถัดไปและ chain ใด chain หนึ่งยาวขึ้น node ที่กำลังทำงานอยู่บน chain ที่สั้นกว่าก็จะเปลี่ยนไปทำงานบน chain ที่ยาวกว่าแทน
การประกาศธุรกรรมใหม่ ไม่จำเป็นต้องไปถึงทุก node ในเครือข่าย ตราบใดที่พวกเขายังไปถึง node ส่วนใหญ่ในระบบได้ ธุรกรรมเหล่านั้นก็จะถูกบรรจุอยู่ในบล็อกในไม่ช้า นอกจากนี้การประกาศบล็อกยังไม่ต้องกังวลเรื่องจะมีบล๊อกที่สูญหาย เนื่องจากหากว่า node ไม่ได้รับบล็อกใด ๆ node ก็จะตระหนักได้ว่าพลาดบล็อกก่อนหน้าไปเมื่อได้รับบล๊อกใหม่มา และ node จะทำการร้องขอ block ที่ขาดไปจากเครือข่าย
6.แรงจูงใจ(Incentive)
โดยปกติแล้ว ธุรกรรมแรกของแต่ละบล๊อกนั้นจะเป็นธุรกรรมพิเศษที่จะขุดเหรียญที่สร้างขึ้นใหม่ซึ่งเป็นกรรมสิทธิ์ของผู้สร้างบล็อกนั้น ๆ ซึ่งจะเป็นการเพิ่มแรงจูงใจให้กับ node ต่าง ๆ ในการสนับสนุนเครือข่าย และเป็นวิธีการกระจายเหรียญให้หมุนเวียน เนื่องจากไม่มีหน่วยงานส่วนกลางที่ทำหน้าที่ในการออกเหรียญ การเพิ่มเหรียญใหม่ในปริมาณคงที่อย่างต่อเนื่องนั้นคล้ายคลึงกับการที่คนงานเหมืองทองคำใช้แรง และ เวลา เพื่อเพิ่มทองคำให้หมุนเวียน ในกรณีนี้ คือ เวลา กำลังประมวลผล และไฟฟ้าที่ถูกใช้ไป
นอกจากนี้แรงจูงใจจะมาจากค่าธรรมเนียมการทำธุรกรรม หากมูลค่าผลลัพธ์ของธุรกรรมน้อยกว่ามูลค่าที่ใส่เข้ามา ส่วนต่างนั้นก็คือค่าธรรมเนียมการทำธุรกรรมที่จะเพิ่มเข้าไปในมูลค่าแรงจูงใจของบล็อกที่มีธุรกรรมนั้น เมื่อเหรียญทั้งหมดในระบบมีจำนวนเท่ากับที่กำหนดไว้แล้ว แรงจูงใจหลักก็จะถูกเปลี่ยนมาเป็นค่าธรรมเนียมการทำธุรกรรม และปราศจากภาวะเงินเฟ้อโดยสิ้นเชิง
แรงจูงใจอาจช่วยกระตุ้นให้ node ต่าง ๆ ยังคงซื่อสัตย์ หากผู้โจมตีที่ละโมบสามารถรวบรวมกำลังประมวลผล ได้มากกว่า node ที่ซื่อสัตย์ทั้งหมด เขาจะต้องเลือกระหว่างการใช้มันเพื่อฉ้อโกงผู้อื่นโดยการใช้จ่ายซ้ำซ้อน หรือใช้มันเพื่อสร้างเหรียญใหม่ พวกเขาจะพบว่าการเล่นตามกฎ กฎที่เอื้อประโยชน์ให้กับเขาด้วยเหรียญใหม่มากกว่าคนอื่น ๆ รวมกันนั้นทำกำไรได้มากกว่าการบ่อนทำลายระบบและความถูกต้องของทรัพย์สินของเขาเอง
7.การจัดการพื้นที่ดิสก์(Reclaiming Disk Space)
เมื่อธุรกรรมถูกบรรจุลงในบล๊อกแล้ว สามารถกำจัดธุรกรรมที่ใช้ไปแล้วก่อนหน้านั้นออกได้เพื่อประหยัดพื้นที่ดิสก์ แต่การจะทำอย่างนี้ได้โดยไม่ให้เลข hash ของบล๊อกมีการเปลี่ยนแปลงนั้น ธุรกรรมจึงจำเป็นต้องถูก hash ในรูปแบบของ Merkle Tree [7][2][5] โดยมีแค่ root node ของ tree เท่านั้นที่จะรวมอยู่ใน hash ของบล๊อก นี่เป็นวิธีที่ทำให้สามารถบีบอัดข้อมูลในบล๊อกเก่า ๆ ได้โดยการตัดพวก hash ส่วนอื่น ๆ ของ tree ที่ไม่ใช่ root node ออก (ไม่จำเป็นต้องเก็บ hash ในชั้นอื่น ๆ ของ tree)
https://image.nostr.build/3ed95334891d91baca3f3f6f624a7ae22620be4ebfe0db5eb652cfce11255b9a.png
โดยในส่วน header ของบล็อกที่ไม่มีธุรกรรมจะมีขนาดประมาณ 80 ไบต์ หากเราสมมติว่าบล็อกถูกสร้างขึ้นทุก ๆ 10 นาที 80 ไบต์ * 6 * 24 * 365 = 4.2MB ต่อปี โดยที่ระบบคอมพิวเตอร์ทั่วไปที่วางขายในปี 2551 มี RAM 2GB และกฎของมัวร์ทำนายการเติบโตในปัจจุบันที่ 1.2GB ต่อปี การจัดเก็บข้อมูลไม่น่าจะเป็นปัญหาแม้ว่าส่วนหัวของบล็อกจะต้องถูกเก็บไว้ในหน่วยความจำก็ตาม
8.การตรวจสอบธุรกรรม (Simplified Payment Verification)
การที่จะยืนยันการชำระเงินโดยไม่จำเป็นต้องรัน full node ได้นั้น ผู้ใช้เพียงแค่เก็บสำเนาของส่วนหัวบล็อก (block header) ของสายบล็อก (chain) ที่ยาวที่สุด ซึ่งสามารถรับได้โดยการสอบถามจาก node อื่น ๆ ในเครือข่ายจนมั่นใจว่าได้รับสายที่ยาวที่สุด และรับ Merkle branch ที่เชื่อมโยงธุรกรรมกับบล็อกที่มีการประทับเวลา (Timestamp) อยู่ ถึงแม้ผู้ใช้จะไม่สามารถตรวจสอบธุรกรรมด้วยตัวเองได้ แต่การเชื่อมโยงธุรกรรมกับตำแหน่งในสายบล็อกจะทำให้เห็นว่า node ในเครือข่ายยอมรับแล้ว และบล็อกที่เพิ่มเข้ามาหลังจากนั้นเป็นการยืนยันเพิ่มเติมว่าเครือข่ายยอมรับธุรกรรมนี้แล้ว
https://i.imgur.com/VXtLpRF.png
การตรวจสอบดังกล่าวจะเชื่อถือได้ตราบใดที่ node ที่ซื่อสัตย์ยังคงควบคุมเครือข่าย แต่จะมีความเสี่ยงมากขึ้นหากเครือข่ายถูกโจมตีและถูกควบคุม ในขณะที่ node ในเครือข่ายสามารถตรวจสอบธุรกรรมได้ด้วยตัวเอง แต่วิธีการแบบง่ายนี้อาจถูกหลอกลวงโดยการใช้ธุรกรรมปลอมของผู้โจมตี ตราบใดที่ผู้โจมตียังคงสามารถควบคุมเครือข่ายได้ กลยุทธ์หนึ่งในการป้องกันปัญหานี้คือ การรับการแจ้งเตือนจาก node อื่น ๆ ในเครือข่ายเมื่อตรวจพบบล็อกที่ไม่ถูกต้อง ซึ่งจะแจ้งให้ซอฟต์แวร์ของผู้ใช้ดาวน์โหลดบล็อกแบบเต็มและธุรกรรมที่แจ้งเตือน เพื่อยืนยันความไม่สอดคล้องกัน ธุรกิจที่ได้รับการชำระเงินบ่อยครั้งอาจยังคงต้องการรัน node ของตนเอง เพื่อความปลอดภัยที่เป็นอิสระและการตรวจสอบที่รวดเร็วยิ่งขึ้น
9.การควบรวมและแบ่งย่อยมูลค่า(Combining and Splitting Value)
แม้ว่าการจัดการเหรียญหลาย ๆ เหรียญจะเป็นสิ่งที่สามารถทำได้ แต่การจัดการธุรกรรมแยกต่างหากสำหรับแต่ละเหรียญในการโอนก็คงเป็นเรื่องที่น่าปวดหัวอยู่ดี ฉะนั้นแล้วเพื่อให้สามารถแยกและรวมมูลค่ากันได้ ธุรกรรมจึงสามารถมี input และ output ได้หลายรายการ ซึ่งโดยปกติแล้วจะมี input เดียวจากธุรกรรมก่อนหน้าที่มีขนาดใหญ่กว่า หรือ input จำนวนเล็ก ๆ หลาย ๆ รายการ และ output ไม่เกินสองรายการ คือ รายการหนึ่งสำหรับการชำระเงิน และอีกหนึ่งรายการสำหรับการส่งเงินทอน หากมีกลับไปยังผู้ส่ง
https://image.nostr.build/9c6d3ce0e9f08c5b3fa3b82c2088ac6235603e5c0df3469060e6c9f74bce32fc.png
ควรสังเกตว่า fan-out (กระจายของธุรกรรม) ซึ่งเป็นกรณีที่ธุรกรรม ธุรกรรมหนึ่งนั้นขึ้นอยู่กับหลายธุรกรรม และธุรกรรมเหล่านั้นเองก็ขึ้นอยู่กับอีกหลายธุรกรรม แต่ไม่ใช่ปัญหาในที่นี้ เพราะไม่มีความจำเป็นในการดึงประวัติการทำธุรกรรมทั้งหมดออกมาเป็นสำเนา
10.ความเป็นส่วนตัว(Privacy)
ในรูปแบบธนาคารแบบดั้งเดิมนั้น ความเป็นส่วนตัวเกิดขึ้นได้ด้วยการจำกัดการเข้าถึงข้อมูล โดยให้เฉพาะผู้ที่เกี่ยวข้องและบุคคลที่สามที่ได้รับความไว้วางใจเท่านั้น แต่เนื่องจากในระบบนี้เรามีความจำเป็นในการประกาศธุรกรรมทั้งหมดต่อสาธารณะ ทำให้ไม่สามารถใช้วิธีนี้ได้ แต่ยังจำเป็นต้องคงความเป็นส่วนตัวไว้ โดยการแบ่งการไหลของข้อมูล ด้วยการไม่เปิดเผยตัวตนของเจ้าของ public key คนทั่วไปสามารถเห็นว่ามีคนกำลังส่งเงินจำนวนหนึ่งให้กับคนอื่น แต่จะไม่ทราบข้อมูลที่เชื่อมโยงธุรกรรมนั้นกับบุคคลใด ๆ ซึ่งคล้ายกับระดับข้อมูลที่เปิดเผยโดยตลาดหลักทรัพย์ ซึ่งมีการเปิดเผยเวลาและขนาดของการซื้อขายแต่ละครั้งต่อสาธารณะ แต่ไม่ได้ระบุว่าคู่สัญญาคือใคร
https://image.nostr.build/6ec3c84c7878dbd4558d2045518384daf5a341e86f4194cf367cc8426c2d72a7.png
เพื่อเสริมในเรื่องของความปลอดภัย ควรใช้ key pair ใหม่สำหรับการทำธุรกรรมในแต่ละครั้ง เพื่อป้องกันไม่ให้เชื่อมโยงกับเจ้าของคนเดียวกันได้ อย่างไรก็ตาม การเชื่อมโยงบางอย่างยังคงหลีกเลี่ยงไม่ได้ ในธุรกรรมที่มี input หลายรายการ ซึ่งจำเป็นต้องเปิดเผยว่า input เหล่านั้นเป็นของเจ้าของคนเดียวกัน ความเสี่ยงก็คือ หากมีการเปิดเผยตัวตนของเจ้าของคีย์ การเชื่อมโยงอาจเปิดเผยธุรกรรมอื่น ๆ ที่เป็นของเจ้าของรายเดียวกันได้
11.การคำนวณ(Calculations)
หากลองพิจารณาสถานการณ์ที่ผู้โจมตีพยายามสร้าง chain ปลอมให้เร็วกว่า chain จริง แม้ว่าจะทำได้สำเร็จ แต่มันก็ไม่สามารถทำให้ระบบเปิดรับการเปลี่ยนแปลงตามอำเภอใจได้อยู่ดี เช่น การสร้างมูลค่าจากอากาศธาตุ หรือการรับเงินที่ไม่เคยเป็นของผู้โจมตีมาก่อน Node ต่าง ๆ จะไม่ยอมรับธุรกรรมที่ไม่ถูกต้องเป็นการชำระเงิน และ Node ที่สุจริตก็จะไม่ยอมรับบล็อกที่มีธุรกรรมเหล่านั้นอย่างแน่นอน ผู้โจมตีทำได้เพียงพยายามเปลี่ยนแปลงธุรกรรมของตนเอง เพื่อนำเงินที่ใช้ไปแล้วกลับคืนมาเท่านั้น
การแข่งขันระหว่าง chain สุจริตกับ chain ของผู้โจมตี สามารถอธิบายได้ด้วยแบบจำลองการเดินสุ่มทวินาม (Binomial Random Walk) โดยเหตุการณ์ที่สำเร็จ หมายถึง chain ที่สุจริตถูกขยายออกไปอีกหนึ่งบล็อก เพิ่มความยาวนำหน้าไป +1 และเหตุการณ์ที่ล้มเหลว หมายถึง chain ของผู้โจมตีถูกขยายออกไปหนึ่งบล็อก ลดช่องว่างลง -1
ความน่าจะเป็นที่ผู้โจมตีจะไล่ตามทันจากช่องว่างที่กำหนด สามารถเปรียบเทียบด้วย Gambler's Ruin problem โดยสมมติว่านักพนันที่มีเครดิตไม่จำกัด เริ่มต้นด้วยการขาดทุน และเล่นพนันไปเรื่อย ๆ เพื่อให้ถึงจุดคุ้มทุน เราสามารถคำนวณความน่าจะเป็นที่เขาจะกลับมาถึงจุดคุ้มทุนได้ หรือความน่าจะเป็นที่ผู้โจมตีจะไล่ทัน chain ที่สุจริตได้ ดังนี้ [8]:
p = ความน่าจะเป็นที่ Node ที่สุจริตจะพบบล็อกถัดไป q = ความน่าจะเป็นที่ผู้โจมตีจะพบบล็อกถัดไป qz = ความน่าจะเป็นที่ผู้โจมตีจะไล่ทัน จากที่ตามหลังอยู่ z บล็อก
https://i.imgur.com/vePe255.png
จากสมมติฐานที่ว่า p > q ความน่าจะเป็นจะลดลงแบบเอกซ์โพเนนเชียล เมื่อจำนวนบล็อกที่ผู้โจมตีต้องไล่ตามทันเพิ่มขึ้น หากเขาไม่สามารถพุ่งขึ้นนำได้อย่างรวดเร็วตั้งแต่แรก โอกาสของเขาก็จะลดลงจนน้อยมาก ๆ เมื่อเขาตามหลังมากขึ้นเรื่อย ๆ
ทีนี้ลองพิจารณาว่า ผู้รับธุรกรรมใหม่ต้องรอเป็นเวลานานเท่าใด จึงจะแน่ใจได้ว่าผู้ส่งไม่สามารถเปลี่ยนแปลงธุรกรรมได้แล้ว เราสมมติว่าผู้ส่งเป็นผู้โจมตี ที่ต้องการให้ผู้รับเชื่อว่าเขาได้รับเงินไปแล้ว จากนั้นจึงเปลี่ยนให้เงินกลับเข้าหาตัวเองหลังจากเวลาผ่านไประยะหนึ่ง ผู้รับจะได้รับแจ้งเมื่อเกิดเหตุการณ์นี้ขึ้น แต่ผู้ส่งหวังว่ามันจะสายเกินไปแล้ว
ผู้รับจะสร้างคู่กุญแจใหม่ และให้กุญแจสาธารณะแก่ผู้ส่งไม่นานก่อนที่จะลงนาม ซึ่งจะป้องกันไม่ให้ผู้ส่งเตรียมบล็อกเชนปลอมไว้ล่วงหน้า โดยการทำงานอย่างต่อเนื่องจนกว่าเขาจะมีโอกาสได้บล็อกที่ยาวพอ จากนั้นจึงดำเนินธุรกรรมในทันที เมื่อส่งธุรกรรมแล้ว ผู้ส่งที่ไม่สุจริตจะเริ่มทำงานอย่างลับ ๆ บนบล็อกเชนคู่ขนาน ที่มีธุรกรรมในเวอร์ชันของเขาเองอยู่
ผู้รับจะรอจนกว่าธุรกรรมจะถูกเพิ่มลงในบล็อก และมีบล็อกที่ถูกเชื่อมต่อตามหลังมาอีก z บล็อก เขาไม่ทราบจำนวนความคืบหน้าที่แน่นอนที่ผู้โจมตีได้ทำไปแล้ว แต่สมมติว่าบล็อกที่สุจริตใช้เวลาเฉลี่ยต่อบล็อกตามที่คาดไว้ ความคืบหน้าที่อาจเกิดขึ้นได้ของผู้โจมตีจะเป็นการแจกแจงแบบปัวซง (Poisson distribution) ซึ่งมีค่าคาดหวังดังนี้:
https://i.imgur.com/mYsb48i.png
เพื่อให้ได้ความน่าจะเป็นที่ผู้โจมตียังคงสามารถไล่ทันได้ เราจะคูณความหนาแน่นของปัวซง สำหรับความคืบหน้าแต่ละระดับที่เขาสามารถทำได้ ด้วยความน่าจะเป็นที่เขาสามารถไล่ทันจากจุดนั้น:
https://i.imgur.com/jQGkQ8r.png
จัดเรียงใหม่เพื่อหลีกเลี่ยง infinite tail ของการแจกแจง
https://i.imgur.com/OOO6Gm9.png
แปลงมันให้เป็น C code
include
double AttackerSuccessProbability(double q, int z) { double p = 1.0 - q; double lambda = z * (q / p); double sum = 1.0; int i, k; for (k = 0; k <= z; k++) { double poisson = exp(-lambda); for (i = 1; i <= k; i++) poisson *= lambda / i; sum -= poisson * (1 - pow(q / p, z - k)); } return sum; }
เมื่อรันผลลัพธ์บางส่วน เราจะเห็นว่าความน่าจะเป็นลดลงแบบเอกซ์โพเนนเชียลเมื่อ z เพิ่มขึ้น
q=0.1 z=0 P=1.0000000 z=1 P=0.2045873 z=2 P=0.0509779 z=3 P=0.0131722 z=4 P=0.0034552 z=5 P=0.0009137 z=6 P=0.0002428 z=7 P=0.0000647 z=8 P=0.0000173 z=9 P=0.0000046 z=10 P=0.0000012 q=0.3 z=0 P=1.0000000 z=5 P=0.1773523 z=10 P=0.0416605 z=15 P=0.0101008 z=20 P=0.0024804 z=25 P=0.0006132 z=30 P=0.0001522 z=35 P=0.0000379 z=40 P=0.0000095 z=45 P=0.0000024 z=50 P=0.0000006
การแก้หาค่า P ที่น้อยกว่า 0.1%...
P < 0.001 q=0.10 z=5 q=0.15 z=8 q=0.20 z=11 q=0.25 z=15 q=0.30 z=24 q=0.35 z=41 q=0.40 z=89 q=0.45 z=340
12.สรุป(Conclusion)
เราได้นำเสนอระบบธุรกรรมอิเล็กทรอนิกส์ที่ไม่ต้องพึ่งพาความไว้วางใจ เริ่มต้นจากกรอบแนวคิดของเหรียญที่สร้างจากลายเซ็นดิจิทัล ซึ่งช่วยควบคุมความเป็นเจ้าของได้อย่างดีแต่ก็ยังไม่สมบูรณ์ หากปราศจากวิธีการป้องกันการใช้จ่ายซ้ำซ้อน เพื่อแก้ปัญหานี้ เราจึงเสนอเครือข่ายแบบเพียร์ทูเพียร์ที่ใช้ proof-of-work ในการบันทึกประวัติธุรกรรมสาธารณะ ซึ่งจะกลายเป็นเรื่องยากอย่างมากสำหรับผู้โจมตีที่จะเปลี่ยนแปลง หาก node ที่ซื่อสัตย์ควบคุมพลังประมวลผล CPU ส่วนใหญ่ เครือข่ายนี้มีความแข็งแกร่งในความเรียบง่ายที่ไม่มีโครงสร้างใด ๆ ที่ซับซ้อน node ต่าง ๆ ทำงานพร้อมกันโดยประสานงานกันเพียงเล็กน้อย ไม่จำเป็นต้องระบุตัวตน เนื่องจากข้อความไม่ได้ถูกส่งไปยังสถานที่ใดสถานที่หนึ่งโดยเฉพาะ และเพียงแค่ต้องส่งมอบให้ถึงมือผู้รับอย่างดีที่สุด node สามารถออกจากและเข้าร่วมเครือข่ายได้ตามต้องการ โดยยอมรับ chain ที่มี proof-of-work มากที่สุดเป็นสิ่งที่เกิดขึ้นในขณะที่ไม่ได้เชื่อมต่อ พวกเขาโหวตด้วยพลังประมวลผล CPU แสดงการยอมรับบล็อกที่ถูกต้องโดยการทำงานเพื่อขยายบล็อก และปฏิเสธบล็อกที่ไม่ถูกต้องโดยการปฏิเสธที่จะทำงานกับบล็อกเหล่านั้น กฎและแรงจูงใจใด ๆ ที่จำเป็นสามารถบังคับใช้ได้ด้วยกลไกฉันทามตินี้
ไปอ่านต่อกันเองเด้ออ
[1] W. Dai, "b-money," http://www.weidai.com/bmoney.txt, 1998. [2] H. Massias, X.S. Avila, and J.-J. Quisquater, "Design of a secure timestamping service with minimal trust requirements," In 20th Symposium on Information Theory in the Benelux, May 1999. [3] S. Haber, W.S. Stornetta, "How to time-stamp a digital document," In Journal of Cryptology, vol 3, no 2, pages 99-111, 1991. [4] D. Bayer, S. Haber, W.S. Stornetta, "Improving the efficiency and reliability of digital time-stamping," In Sequences II: Methods in Communication, Security and Computer Science, pages 329-334, 1993. [5] S. Haber, W.S. Stornetta, "Secure names for bit-strings," In Proceedings of the 4th ACM Conference on Computer and Communications Security, pages 28-35, April 1997. [6] A. Back, "Hashcash - a denial of service counter-measure," http://www.hashcash.org/papers/hashcash.pdf, 2002. [7] R.C. Merkle, "Protocols for public key cryptosystems," In Proc. 1980 Symposium on Security and Privacy, IEEE Computer Society, pages 122-133, April 1980. [8] W. Feller, "An introduction to probability theory and its applications," 1957.
-
@ 32e18276:5c68e245
2024-06-26 19:03:35Here's a neat tip for figuring out exactly where your packet went during a traceroute. You can simply paste the output of traceroute into ChatGPT, asking where the packet actually went geographically.
The question
Here's the input I gave it:
``` can you get a sense of this route geographically ?
monad> tracepath nghttp2.org
1?: [LOCALHOST] pmtu 1500 1: _gateway 0.445ms 1: _gateway 0.363ms 2: 24.86.64.1 11.495ms 3: rc1st-be118-1.vc.shawcable.net 8.924ms 4: 24.244.60.69 12.607ms asymm 3 5: 24.244.63.101 9.884ms asymm 3 6: rc1st-be214.vc.shawcable.net 11.561ms asymm 3 7: rc2wt-be50-1.wa.shawcable.net 14.402ms asymm 3 8: rc2wt-be50-1.wa.shawcable.net 14.334ms asymm 3 9: ge3-0.cr02.sea01.pccwbtn.net 13.858ms asymm 4 10: ge3-0.cr02.sea01.pccwbtn.net 13.936ms asymm 4 11: 63-216-84-226.static.pccwglobal.net 191.730ms asymm 8 12: ae1.r01.hkg03.icn.netarch.akamai.com 154.284ms asymm 9 13: ae1.r01.hkg03.icn.netarch.akamai.com 160.912ms asymm 9 14: ae7.r01.tyo03.icn.netarch.akamai.com 156.906ms asymm 9 15: a23-56-142-37.deploy.static.akamaitechnologies.com 189.058ms asymm 10 16: a23-56-142-37.deploy.static.akamaitechnologies.com 189.577ms asymm 10 ```
Response
Tracing the geographical path from your local host to nghttp2.org involves a series of hops that typically represent different network routers or devices. Let's break down the route step-by-step:
- Localhost to Gateway:
-
This is your local network's gateway, indicating the first point of contact outside your computer.
-
24.86.64.1:
-
This IP is likely the first hop within your Internet Service Provider's (ISP) network. Given the IP range, this looks like a Canadian IP address, possibly Vancouver (Shaw Communications).
-
rc1st-be118-1.vc.shawcable.net:
-
This indicates a Shaw Communications router, likely in Vancouver, British Columbia.
-
24.244.60.69 and 24.244.63.101:
-
These are further hops within Shaw Communications' network, still in Vancouver.
-
rc1st-be214.vc.shawcable.net:
-
Another router in Vancouver within Shaw's network.
-
rc2wt-be50-1.wa.shawcable.net:
-
This hop seems to indicate a transition from Vancouver to Washington state in the USA.
-
rc2wt-be50-1.wa.shawcable.net:
-
This appears again, indicating it's a key router in Washington state, likely Seattle.
-
ge3-0.cr02.sea01.pccwbtn.net:
-
This shows the transition to PCCW Global's network, a major international telecommunications provider, in Seattle, Washington.
-
63-216-84-226.static.pccwglobal.net:
-
Another hop within PCCW Global's network, possibly still in Seattle but preparing for a trans-Pacific jump.
-
ae1.r01.hkg03.icn.netarch.akamai.com:
- This hop indicates a significant jump to Hong Kong, to an Akamai router. This suggests the use of Akamai's CDN (Content Delivery Network).
-
ae1.r01.hkg03.icn.netarch.akamai.com:
- Another Akamai router in Hong Kong.
-
ae7.r01.tyo03.icn.netarch.akamai.com:
- Transition from Hong Kong to Tokyo, Japan, within Akamai's network.
-
a23-56-142-37.deploy.static.akamaitechnologies.com:
- The final destination is likely a server hosted by Akamai in Japan, which is hosting nghttp2.org.
In summary, the geographical path likely follows this route:
- Vancouver, Canada (Shaw Communications)
- Seattle, Washington, USA (Shaw Communications and PCCW Global)
- Hong Kong (PCCW Global and Akamai)
- Tokyo, Japan (Akamai)
This route involves both North American and Asia-Pacific regions, indicating a significant geographical spread typically seen in global internet routing.
Summary
This makes traceroute way more understandable. ChatGPT knows enough about the domains to give you a good sense of the geographical path. I will definitely be using this from now on, maybe someone can make a tool to do this automatically and format it nicely.
Obviously don't do this if you actually care about the privacy of your network paths, but I personally could care less so I don't mind feeding the AI overlords in this case.
Until next time!
-
@ b12b632c:d9e1ff79
2023-07-21 19:45:20I love testing every new self hosted app and I can say that Nostr "world" is really good regarding self hosting stuff.
Today I tested a Nostr relay named Strfry.
Strfry is really simple to setup and support a lot's of Nostr NIPs.
Here is the list of what it is able to do :
- Supports most applicable NIPs: 1, 2, 4, 9, 11, 12, 15, 16, 20, 22, 28, 33, 40
- No external database required: All data is stored locally on the filesystem in LMDB
- Hot reloading of config file: No server restart needed for many config param changes
- Zero downtime restarts, for upgrading binary without impacting users
- Websocket compression: permessage-deflate with optional sliding window, when supported by clients
- Built-in support for real-time streaming (up/down/both) events from remote relays, and bulk import/export of events from/to jsonl files
- negentropy-based set reconcilliation for efficient syncing with remote relays
Installation with docker compose (v2)
Spoiler : you need to have a computer with more than 1 (v)Core / 2GB of RAM to build the docker image locally. If not, this below might crash your computer during docker image build. You may need to use a prebuilt strfry docker image.
I assume you've read my first article on Managing domain with Nginx Proxy Manager because I will use the NPM docker compose stack to publish strfry Nostr relay. Without the initial NPM configuration done, it may not work as expected. I'll use the same docker-compose.yml file and folder.
Get back in the "npm-stack" folder :
cd npm-stack
Cloning the strfry github repo locally :
git clone https://github.com/hoytech/strfry.git
Modify the docker-compose file to locate the strfry configuration data outside of the folder repo directory to avoid mistake during futures upgrades (CTRL + X, S & ENTER to quit and save modifications) :
nano docker-compose.yml
You don't have to insert the Nginx Proxy Manager part, you should already have it into the file. If not, check here. You should only have to add the strfry part.
``` version: '3.8' services: # should already be present into the docker-compose.yml app: image: 'jc21/nginx-proxy-manager:latest' restart: unless-stopped ports: # These ports are in format
: - '80:80' # Public HTTP Port - '443:443' # Public HTTPS Port - '81:81' # Admin Web Port # Add any other Stream port you want to expose # - '21:21' # FTP # Uncomment the next line if you uncomment anything in the section # environment: # Uncomment this if you want to change the location of # the SQLite DB file within the container # DB_SQLITE_FILE: "/data/database.sqlite" # Uncomment this if IPv6 is not enabled on your host # DISABLE_IPV6: 'true' volumes: - ./nginxproxymanager/data:/data - ./nginxproxymanager/letsencrypt:/etc/letsencrypt
strfry-nostr-relay: container_name: strfry build: ./strfry volumes: - ./strfry-data/strfry.conf:/etc/strfry.conf - ./strfry-data/strfry-db:/app/strfry-db
ports is commented by NPM will access through docker internal network
no need to expose strfry port directly to the internet
ports:
- "7777:7777"
```
Before starting the container, we need to customize the strfry configuration file "strfry.conf". We'll copy the strfry configuration file and place it into the "strfry-data" folder to modify it with our own settings :
mkdir strfry-data && cp strfry/strfry.conf strfry-data/
And modify the strfry.conf file with your own settings :
nano strfry-data/strfry.conf
You can modify all the settings you need but the basics settings are :
- bind = "127.0.0.1" --> bind = "0.0.0.0" --> otherwise NPM won't be able to contact the strfry service
-
name = "strfry default" --> name of your nostr relay
-
description = "This is a strfry instance." --> your nostr relay description
-
pubkey = "" --> your pubkey in hex format. You can use the Damu's tool to generate your hex key from your npub key : https://damus.io/key/
-
contact = "" --> your email
``` relay { # Interface to listen on. Use 0.0.0.0 to listen on all interfaces (restart required) bind = "127.0.0.1"
# Port to open for the nostr websocket protocol (restart required) port = 7777 # Set OS-limit on maximum number of open files/sockets (if 0, don't attempt to set) (restart required) nofiles = 1000000 # HTTP header that contains the client's real IP, before reverse proxying (ie x-real-ip) (MUST be all lower-case) realIpHeader = "" info { # NIP-11: Name of this server. Short/descriptive (< 30 characters) name = "strfry default" # NIP-11: Detailed information about relay, free-form description = "This is a strfry instance." # NIP-11: Administrative nostr pubkey, for contact purposes pubkey = "" # NIP-11: Alternative administrative contact (email, website, etc) contact = "" }
```
You can now start the docker strfry docker container :
docker compose up -d
This command will take a bit of time because it will build the strfry docker image locally before starting the container. If your VPS doesn't have lot's of (v)CPU/RAM, it could fail (nothing happening during the docker image build). My VPS has 1 vCore / 2GB of RAM and died few seconds after the build beginning.
If it's the case, you can use prebuilt strfry docker image available on the Docker hub : https://hub.docker.com/search?q=strfry&sort=updated_at&order=desc
That said, otherwise, you should see this :
``` user@vps:~/npm-stack$ docker compose up -d [+] Building 202.4s (15/15) FINISHED
=> [internal] load build definition from Dockerfile 0.2s => => transferring dockerfile: 724B 0.0s => [internal] load .dockerignore 0.3s => => transferring context: 2B 0.0s => [internal] load metadata for docker.io/library/ubuntu:jammy 0.0s => [build 1/7] FROM docker.io/library/ubuntu:jammy 0.4s => [internal] load build context 0.9s => => transferring context: 825.64kB 0.2s => [runner 2/4] WORKDIR /app 1.3s => [build 2/7] WORKDIR /build 1.5s => [runner 3/4] RUN apt update && apt install -y --no-install-recommends liblmdb0 libflatbuffers1 libsecp256k1-0 libb2-1 libzstd1 && rm -rf /var/lib/apt/lists/* 12.4s => [build 3/7] RUN apt update && apt install -y --no-install-recommends git g++ make pkg-config libtool ca-certificates libyaml-perl libtemplate-perl libregexp-grammars-perl libssl-dev zlib1g-dev l 55.5s => [build 4/7] COPY . . 0.9s => [build 5/7] RUN git submodule update --init 2.6s => [build 6/7] RUN make setup-golpe 10.8s => [build 7/7] RUN make -j4 126.8s => [runner 4/4] COPY --from=build /build/strfry strfry 1.3s => exporting to image 0.8s => => exporting layers 0.8s => => writing image sha256:1d346bf343e3bb63da2e4c70521a8350b35a02742dd52b12b131557e96ca7d05 0.0s => => naming to docker.io/library/docker-compose_strfry-nostr-relay 0.0sUse 'docker scan' to run Snyk tests against images to find vulnerabilities and learn how to fix them
[+] Running 02/02
⠿ Container strfry Started 11.0s ⠿ Container npm-stack-app-1 Running ```You can check if everything is OK with strfry container by checking the container logs :
user@vps:~/npm-stack$ docker logs strfry date time ( uptime ) [ thread name/id ] v| 2023-07-21 19:26:58.514 ( 0.039s) [main thread ]INFO| arguments: /app/strfry relay 2023-07-21 19:26:58.514 ( 0.039s) [main thread ]INFO| Current dir: /app 2023-07-21 19:26:58.514 ( 0.039s) [main thread ]INFO| stderr verbosity: 0 2023-07-21 19:26:58.514 ( 0.039s) [main thread ]INFO| ----------------------------------- 2023-07-21 19:26:58.514 ( 0.039s) [main thread ]INFO| CONFIG: Loading config from file: /etc/strfry.conf 2023-07-21 19:26:58.529 ( 0.054s) [main thread ]INFO| CONFIG: successfully installed 2023-07-21 19:26:58.533 ( 0.058s) [Websocket ]INFO| Started websocket server on 0.0.0.0:7777
Now, we have to create the subdomain where strfry Nostr relay will be accessible. You need to connect to your Nginx Proxy Manager admin UI and create a new proxy host with these settings :
"Details" tab (Websockets support is mandatory!, you can replace "strfry" by whatever you like, for instance : mybeautifulrelay.yourdomain.tld)
"Details" tab:
"SSL" tab:
And click on "Save"
If everything is OK, when you go to https://strfry.yourdomain.tld you should see :
To verify if strfry is working properly, you can test it with the (really useful!) website https://nostr.watch. You have to insert your relay URL into the nostr.watch URL like this : https://nostr.watch/relay/strfry.yourdomain.tld
You should see this :
If you are seeing your server as online, readable and writable, you made it ! You can add your Nostr strfry server to your Nostr prefered relay and begin to publish notes ! 🎇
Future work:
Once done, strfry will work like a charm but you may need to have more work to update strfry in the near future. I'm currently working on a bash script that will :
- Updatethe "strfry" folder,
- Backup the "strfry.conf" file,
- Download the latest "strfry.conf" from strfry github repo,
- Inject old configuration settings into the new "strfry.conf" file,
- Compose again the stack (rebuilding the image to get the latest code updates),
- etc.
Tell me if you need the script!
Voilààààà
See you soon in another Fractalized story!
-
@ 79008e78:dfac9395
2024-09-02 06:17:05Nostr: โปรโตคอลทางเลือกใหม่สำหรับโซเชียลมีเดียที่เป็นอิสระ ปลอดภัย และไร้การควบคุม
Nostr คือโปรโตคอลแบบเปิดที่เรียบง่าย ซึ่งช่วยให้สามารถสร้างโซเชียลมีเดียระดับโลกที่กระจายอำนาจและป้องกันการเซ็นเซอร์ได้
จากที่กล่าวข้างต้น เราสามารถพูดได้ว่า Nostr นั้นถูกออกแบบมาให้ใช้งานง่าย โดยมีเป้าหมายหลัก ๆ เพื่อสร้างเครือข่ายโซเชียลระดับโลกที่ปราศจากการเซ็นเซอร์ แล้วทำไมมันถึงทำอย่างนั้นได้? ในจุดนี้เราก็ต้องมาเจาะดูคุณสมบัติหลัก ๆ ของโปรโตคอลที่เรียกว่า Nostr กันก่อน:
เรียบง่าย - โปรโตคอลนี้ใช้โครงสร้างข้อมูลแบบ Event Object ที่เรียบง่ายและยืดหยุ่น (ซึ่งส่งเป็น JSON ธรรมดา) และใช้การเข้ารหัสแบบ Elliptic-curve มาตรฐานสำหรับคีย์และลายเซ็น
-
ช่องทางการสื่อสารที่รองรับเพียงอย่างเดียวคือการเชื่อมต่อ WebSockets จากไคลเอนต์ไปยังรีเลย์
-
การออกแบบนี้ทำให้ง่ายต่อการพัฒนาไม่ว่าจะไคลเอนต์หรือรีเลย์ และยังช่วยส่งเสริมความหลากหลายของซอฟต์แวร์
ยืดหยุ่น - เนื่องจาก Nostr ไม่ได้พึ่งพาเซิร์ฟเวอร์ที่เชื่อถือได้เพียงจำนวนหยิบมือ สำหรับการเคลื่อนย้ายหรือจัดเก็บข้อมูล แต่ใช้เซิร์ฟเวอร์จำนวนมหาศาลและกระจายตัวอยู่ทั่วโลก จึงมีความยืดหยุ่นสูง และมีการกระจายศูนย์อย่างแท้จริง
- โปรโตคอลนี้ถูกออกแบบมาโดยคำนึงถึงความเป็นไปได้ที่รีเลย์จะหายไป และอนุญาตให้ผู้ใช้เชื่อมต่อและเผยแพร่ข้อมูลไปยังรีเลย์จำนวนมากได้ตามต้องการ และยังสามารถเปลี่ยนแปลงได้ตลอดเวลาอีกด้วย
ตรวจสอบได้
- เนื่องจากบัญชี Nostr ใช้การเข้ารหัสแบบ PKE จึงง่ายต่อการตรวจสอบว่าข้อความถูกส่งมาจากผู้ใช้ที่ระบุจริงหรือไม่
เช่นเดียวกับ HTTP หรือ TCP-IP Nostr เป็นโปรโตคอลหรือมาตรฐานแบบเปิดที่ทุกคนสามารถนำไปสร้างต่อยอดได้ มันไม่ใช่แอปหรือบริการที่คุณจำเป็นต้องลงทะเบียน
แล้วทำไมเราถึงต้องการ Nostr?
ถึงในปัจจุบันโซเชียลมีเดียจะได้พัฒนามาเป็นช่องทางสำคัญในการไหลเวียนของข้อมูลทั่วโลก กลายเป็นช่องทางหลักในการติดต่อสื่อสาร แต่น่าเสียดายที่ระบบโซเชียลมีเดียในปัจจุบันของเรานั้นมีข้อบกพร่องมากมาย:
- ใช้ความสนใจของคุณเพื่อขายโฆษณา
- ใช้เทคนิคแปลกๆ เพื่อทำให้คุณเสพติด (อ้างอิงจากข้อ 1)
- ตัดสินใจว่าจะแสดงเนื้อหาใดให้คุณเห็นโดยใช้อัลกอริทึมลับที่คุณไม่สามารถตรวจสอบหรือเปลี่ยนแปลงได้
- ควบคุมอย่างเต็มที่ว่าใครสามารถเข้าร่วมและใครถูกเซ็นเซอร์
- เต็มไปด้วยสแปมและบอท
ด้วยข้อจำกัดเหล่านี้ Nostr จึงเป็นทางเลือกที่น่าสนใจในการสร้างโซเชียลมีเดียที่เป็นอิสระ ปลอดภัย และไร้การควบคุม
องค์ประกอบของโปรโตคอลที่ชื่อว่า Nostr
หลังจากได้ทำความรู้จัก Nostr กันไปแล้วเมื่อคราวก่อน คราวนี้เรามาเจาะดูองค์ประกอบของโปรโตคอลนี้กันดีกว่า
Keys ระบบบัญชีผู้ใช้และรหัสผ่านสำหรับ Nostr
-
บัญชี Nostr แต่ละบัญชีจะใช้คู่กุญแจสาธารณะ/ส่วนตัว (Public/Private Key ) เปรียบเทียบง่าย ๆ คือ กุญแจสาธารณะของคุณคือชื่อผู้ใช้ และกุญแจส่วนตัวก็เป็นรหัสผ่าน แต่ว่า ก็มีข้อแตกต่างที่สำคัญอยู่ นั่นคือ กุญแจส่วนตัวของคุณนั้นจะไม่สามารถรีเซ็ตได้หากเกิดการสูญหายขึ้น คุณจะเสียบัญชีนั้นไปตลอดกาล
-
โดยทั่วไปแล้ว กุญแจสาธารณะจะแสดงเป็นข้อความที่ขึ้นต้นด้วย npub1 และกุญแจส่วนตัวจะขึ้นต้นด้วย nsec1
-
ทั้งนี้คุณควรที่จะตรวจสอบให้แน่ใจว่าคุณได้เก็บกุญแจส่วนตัวของคุณไว้ในที่ปลอดภัย เช่น โปรแกรมจัดการรหัสผ่านอย่างเช่น Bitwarden
โปรโตคอลกับไคลเอนต์ ต่างกันอย่างไร?
Nostr เองเป็นเพียงโปรโตคอล หมายความว่า Nostr นั้นเป็นเพียงกระบวนการที่ตกลงกันไว้สำหรับการส่งข้อความผ่านอินเทอร์เน็ต (เหมือนข้อกำหนด)
ซึ่งการที่คุณจะเข้าถึง Nostr (โปรโตคอล) นั้น ผู้ใช้ส่วนใหญ่จะใช้งานผ่านไคลเอนต์ ซึ่งตัวของไคลเอนต์นั้นอาจเป็นเว็บ แอปพลิเคชันเดสก์ท็อป หรือ แอปพลิเคชันมือถือ โดยไคลเอนต์สามารถดึงข้อมูลจากรีเลย์ และสร้างข้อมูลใหม่ และส่งข้อมูลนั้นไปยังรีเลย์เพื่อให้ผู้ใช้คนอื่น ๆ สามารถเรียกอ่าน ข้อมูลนั้น ๆ ได้ โดย "ข้อมูล" เพียงรูปแบบเดียวที่มีอยู่ใน Nostr คือสิ่งที่เราเรียกกันว่า event
การพิสูจน์ความเป็นเจ้าของข้อมูลบน Nostr
บน Nostr นั้นการพิสูจน์ตัวตนเป็นเรื่องที่ง่ายมากเนื่องจากทุก ๆ event ที่เกิดขึ้น จำเป็นต้องมีลายเซ็นดิจิทัล (Digital Signature) โดยลายเซ็นนั้นจะช่วยให้มั่นใจได้ว่า ใครเป็นผู้สร้าง event นั้น ๆ ขึ้นมา โดยการพิสูจน์ทางคณิตศาสตร์
โดยในการสร้างลายเซ็นแต่ละครั้ง ไคลเอนต์จะจำเป็นต้องใช้กุญแจส่วนตัวของคุณ โดยทั่วไปแล้ว แอปพลิเคชันเจะมีที่ให้คุณใส่กุญแจส่วนตัวของคุณ เมื่อเปิดแอปพลิเคชันครั้งแรก พวกเขาสามารถคำนวณกุญแจสาธารณะของคุณได้จากกุญแจส่วนตัวเช่นกัน
ส่วนในกรณีที่คุณใช้งานผ่านเว็บแอป ผมไม่แนะนำให้ใส่กุญแจส่วนตัวลงไป แต่แนะนำให้ใช้ส่วนขยายของเบราว์เซอร์ ที่ใช้งานฟังก์ชันที่เกี่ยวข้องกับ Nostr ซึ่งอนุญาตให้เว็บไคลเอ็นต์ส่ง event ที่ยังไม่ถูกเซ็นมาให้ส่วนขยายและส่วนขยายจะทำหน้าที่เซ็น สำหรับวิธีนี้ เว็บไคลเอ็นต์ต่าง ๆ ไม่จำเป็นต้องรู้กุญแจส่วนตัวของคุณ แต่คุณก็ยังสามารถลงนามใน event ต่าง ๆ ได้ตามปกติ โดยส่วนขยายที่ได้รับความนิยมก็จะเป็น Flamingo, Alby และ nos2x
ไคลเอนต์ & รีเลย์
ไคลเอนต์คืออะไร?
หากจะอธิบายให้เห็นภาพอยากให้มองว่าไคลเอ็นต์ Nostr นั้นเป็นเหมือนกับแอปที่คุณใช้งานเพื่อเข้าถึง Twitter, Facebook, youtube เป็นต้น พวกมันคือ แอปพลิเคชัน, เว็บแอป ที่เชื่อมต่อคุณกับโลกของ Twitter, Facebook, youtube โดยตัวของไคลเอนต์ใน Nostr เองก็เปรียบเสมือนแอปต่าง ๆ ที่คุณใช้ดูหน้าฟีดนั่นเอง แต่ข้อดีของ Nostr ที่เหนือแอปพลิเคชันอื่น ๆ คือความเรียบง่ายและยืดหยุ่น ส่งผลให้ไคลเอ็นต์แต่ละตัวมีวิธีนำเสนอและใช้งานที่แตกต่างกันไป บางไคลเอ็นต์อาจออกแบบให้ใช้งานง่ายเหมือน Twitter บางตัวเน้นให้เห็นบทบาทสำคัญของรีเลย์ หรือโหนดที่กระจายข้อมูลอยู่ทั่วโลก บางตัวใช้ระบบอัลกอริทึมเพื่อให้แน่ใจว่าข้อมูลไม่ถูกปิดกั้น โดยไม่ทำให้ผู้ใช้งานรู้สึกยุ่งยาก
เรียบง่ายและยืดหยุ่น?
เนื่องจากการออกแบบของโปรโตคอลที่ทำการแยกข้อมูลของผู้ใช้ทั้งหมดออกจากไคลเอนต์ ทำให้ตัวของผู้ใช้งานเองนั้นมีอิสระเต็มที่ที่จะเลือกใช้ไคลเอนต์ต่าง ๆ เพื่อเข้าใช้งาน Nostr และแน่นอนว่า ผู้ใช้งานสามารถสลับหรือลงชื่อเข้าใช้ ไคลเอ็นต์ได้หลายตัวตามต้องการ ตราบใดที่ไคลเอ็นต์ทั้งหมดเชื่อมต่อกับชุดรีเลย์เดียวกัน คุณก็จะเห็นข้อมูลเดียวกันในทุก ๆ ไคลเอ็นต์
ลงชื่อเข้าใช้ ไคลเอ็นต์หลาย ๆ ตัวแล้วจะกระทบต่อความปลอดภัยของแอคเคาร์ไหม?
คำตอบของคำถามนี้นั้นขึ้นอยู่กับวิธีการที่คุณลงชื่อเข้าใช้ หากคุณลงชื่อเข้าใช้ด้วยกุญแจส่วนตัว ถึงแม้ว่าไคลเอ็นต์ส่วนใหญ่จะพยายามรักษาความปลอดภัยของกุญแจส่วนตัวอย่างดีที่สุด แต่ด้วยข้อจำกัดของซอฟต์แวร์ ย่อมมีความเสี่ยงที่จะเกิดช่องโหว่ การเจาะระบบ และข้อผิดพลาด ที่อาจทำให้กุญแจส่วนตัวของคุณรั่วไหลออกไปได้ ส่วนวิธีการป้องกันเกี่ยวกับเรื่องนี้คือการใช้ส่วนขยายของเว็บเบราว์เซอร์ เพราะการเข้าสู่ระบบในไคลเอนต์ต่าง ๆ ผ่านส่วนขยายนั้นจะใช้เพียงกุญแจสาธารณะในการเข้าสู่ระบบและทุกครั้งที่เราต้องการจะโพสต์หรือสร้าง event บน Nostr ไคลเอนต์จะทำการร่าง event นั้น ๆ และเว้นช่องของลายเซ็นเอาไว้จากนั้นเราจะต้องทำการเซ็นผ่านส่วนขยาย ด้วยวิธีนี้ทำให้กุญแจส่วนตัวของเราไม่หลุดออกไปไหนตลอดการใช้งาน
รีเลย์คืออะไร?
รีเลย์เปรียบเสมือนเซิร์ฟเวอร์ที่อยู่เบื้องหลังของ Nostr และทำหน้าที่รับ event ต่าง ๆ มาจากไคลเอนต์ Nostr และอาจจะจัดเก็บและกระจายข้อความเหล่านั้นไปยังไคลเอนต์อื่น ๆ ที่มีการเชื่อมต่ออยู่
เทคโนโลยีของรีเลย์นั้นเปลี่ยนแปลงอย่างรวดเร็ว ดังนั้นคาดว่าจะมีการเปลี่ยนแปลงอีกมากมายในอนาคต อย่างในปัจจุบันที่มีการนำเสนอ bostr หรือ รีเลย์ที่จะคอยส่ง event ของเราต่อให้กับรีเลย์อื่น ๆ ที่มีการเชื่อมต่อ เพื่อช่วยลดภาระของไคลเอนต์ในการรับส่งข้อมูลจากหลาย ๆ รีเลย์พร้อม ๆ กัน หรืออย่างการป้องกันสแปมด้วย POW หรือประเภทที่สามารถเก็บรูปหรือวิดีโอที่มีขนาดใหญ่ได้
แต่สิ่งหนึ่งที่ควรทราบก็คือ การที่ Nostr นั้นพยายามจะกระจายศูนย์และเหตุผลหลัก ๆ ที่สามารถทำแบบนั้นได้ก็ขึ้นอยู่กับรีเลย์ในการจัดเก็บและดึงข้อมูล ดังนั้น หากคุณรู้สึกว่าไคลเอนต์ Nostr ของคุณทำงานช้า ส่วนใหญ่ก็มักเกิดจากรีเลย์ที่คุณกำลังเชื่อมต่ออยู่ คุณอาจลองแก้ไขปัญญาโดยการเปลี่ยนหรือเพิ่มรีเลย์อีกสองสามรายการในไคลเอนต์ที่คุณใช้
แล้วจะสามารถหารายการรีเลย์ได้จากไหน?
การที่เราจะหารายการรีเลย์ที่เราควรเชื่อมต่อนั้น ๆ จริงแล้ว ๆ สามารถทำได้หลายวิธี แต่วิธีที่ผมแนะนำที่สุดจะเป็นการใช้ตามคนที่เราติดตามอยู่ เพราะจะเป็นวิธีที่เราสามารถเห็น event ต่าง ๆ ของคนที่เราติดตามได้ง่ายที่สุด และเช่นเดียวกัน เพื่อน ๆ หรือคนที่เราติดตามก็จะสามารถเห็น event ของเราได้เช่นกัน และสำหรับในประเทศไทย เรามีรีเลย์ที่คนไทยส่วนใหญ่นิยมใช้กันอยู่สองอัน นั้นคือ wss://relay.siamstr.com/ และ wss://relay.notoshi.win/ ถ้าหากว่าอยากเห็นคนไทยเยอะ ๆ บนหน้าไทม์ไลน์ ผมแนะนำเป็นอย่างยิ่งว่าควรเพิ่ม รายการรีเลย์เหล่านี้ลงไปในบัชญีหรือไคลเอนต์ต่าง ๆ ที่คุณใช้ด้วย
สำหรับอีกวิธีหนึ่งผมแนะนำให้เข้าไปในเว็บไซต์ nostr.watch เนื่องจากในเว็บไซต์นี้เป็นแหล่งข้อมูลที่ดีที่สุดสำหรับการค้นหาและประเมินความเร็วของรีเลย์ต่าง ๆ
จะเกิดอะไรขึ้นถ้ารีเลย์ทั้งหมดที่ฉันเชื่อมต่ออยู่หยุดให้บริการ?
สิ่งนี้เป็นสิ่งที่คุณต้องระวังมากที่สุดในการใช้งาน nostr เนื่องจากหากรีเลย์ทั้งหมดที่คุณเก็บข้อมูลไว้หยุดให้บริการทั้งหมดและคุณไม่มีการสำรองข้อมูล event ของคุณเก็บไว้เลย มันแปลว่าโพสต์ทั้งหมดของคุณ ผู้ติดตาม และรายการต่าง ๆ ที่คุณสรรค์สร้างไว้จะไม่สามารถกู้คืนได้ไปตลอดการ นี่จึงเป็นเหตุผลหลัก ๆ ที่ Nostr อนุญาตให้ผู้ใช้งานนั้นสามารถเชื่อมต่อกับรีเลย์ได้เป็นจำนวนมาก ก็เพื่อให้แน่ใจว่ามีข้อมูลสำรองเก็บไว้อยู่ที่ใดที่หนึ่งในระบบเสมอ แต่อย่างไรก็ตาม หากคุณต้องการที่จะมั่นใจได้ว่าข้อมูลต่าง ๆ ของคุณจะไม่ถูกเซ็นเซอร์ สิ่งที่คุณสามารถสามารถทำได้คือการใช้รีเลย์ส่วนตัวของคุณและกำหนดนโยบายต่าง ๆ ภายในรีเลย์ของคุณด้วยตัวคุณเอง
แล้วฉันจะสามารถใช้รีเลย์ส่วนตัวได้อย่างไร?
อะแฮ่ม ๆ ขอบอกไว้ก่อนว่ามันไม่คุ้มค่ากับความยุ่งยากสำหรับคนโดยทั่ว ๆ ไป ถึงในปัจจุบันจะมีเทคโนโลยีบางตัวที่เข้ามาช่วยให้มันทำได้ง่ายขึ้นแล้วก็ตาม หากคุณต้องการที่จะสำรองข้อมูลนั้น การที่จะมีรีเลย์ส่วนตัวที่ออนไลน์ตลอดเวลาอาจเป็นเรื่องที่ไม่ได้จำเป็นขนาดนั้น เนื่องจากเราสามารถใช้งานบริการอย่าง https://nostrsync.live/ ในการดาวน์โหลดข้อมูลของเราจากรีเลย์ต่าง ๆ ได้ หรือการติดตั้งรีเลย์ส่วนตัวอย่าง nostr-relay-tray: https://github.com/CodyTseng/nostr-relay-tray ที่ช่วยให้เราสามารถมีรีเลย์ส่วนตัวที่ใช้สำหรับสำรองข้อมูลได้
Nostr Implementation Possibilities (NIPs) NIP คืออะไร?
NIP มีไว้เพื่อส่งเสริมความสามารถในการทำงานของ Nostr และเป็นตัวคอยกำหนดให้ เหล่านักพัฒนาทำสิ่งต่าง ๆ ที่เหมือนกันในรูปแบบเดียวกัน เพราะมันคงไม่ใช่ความคิดที่ดีนัก หากนักพัฒนาแต่ละคนจะคิดค้นวิธีแก้ปัญหาทั่วไปของตัวเองและนำไปใช้ในแอปของตัวเองเท่านั้น และคงจะเป็นการดีกว่า ถ้าหากทุกคนใช้วิธีแก้ปัญหาที่เหมือนกัน นั่นคือเหตุผลที่ต้องมี NIP อยู่ในโปรโตคอลของ Nostr และในทำนองเดียวกัน แนวคิดใหม่อาจดูดีในแอปของนักพัฒนาบางราย แต่จะดูดียิ่งขึ้นอย่างแน่นอนหากแอปอื่น ๆ อีกมากมายใช้มาตรฐานเดียวกันและสามารถทำงานร่วมกันได้อย่างราบรื่น
ทำไมมันถึงหน้าสนใจ?
อย่าลืมว่า Nostr เป็นระบบแบบกระจายอำนาจและไม่ได้มีบริษัทหรือใครที่เป็นเจ้าของมัน อย่างเช่นโซเชียลมีเดียอื่น ๆ เช่น ทวิตเตอร์ อ่อไม่สิตอนนี้คงต้องเรียกมันว่า X สินะ ซึ่งหมายความว่าทิศทางของโพรโทคอล Nostr นั้นขึ้นอยู่กับพวกเราทุกคน! ไม่ว่าใคร ๆ ก็สามารถเสนอแนะและสนับสนุนการเปลี่ยนแปลงและให้ข้อเสนอแนะเกี่ยวกับแนวคิดที่ผู้อื่นเสนอ และการที่คุณเป็นส่วนหนึ่งของชุมชนนี้ ก็ทำให้คุณมีส่วนร่วมในทิศทางของ Nostr อีกด้วย
จากที่ส่งหากันได้แค่ข้อความ มาเป็นรูปภาพ มาเป็นวิดีโอ และมาเป็น”เงิน” นี่คือเส้นทางการเดินทางของโปรโตคอลนี้ในอดีต แล้วในอนาคตมันจะพัฒนาไปยังไงต่อก็ขึ้นอยู่กับเหล่าผู้ใช้งานและนักพัฒนาในอนาคต แล้วทำไมสิ่งนี้ถึงจะไม่น่าสนใจละ ?
Event
Event คืออะไร?
Event เป็น object เพียงประเภทเดียวที่มีอยู่บน Nostr โดยมีโครงสร้างประมาณนี้
``` {"id":"84d5d3dc9c388a702f39cad6360d41ebb804e809fb822f110ff8a14dfd35fc6c", "pubkey":"66df60562d939ada8612436489945a4ecf1d62346b3d9478dea8a338f3203c64", "created_at":1722315959, "kind":1, "tags":[["t","siamstr"]], "content":"ไปสั่งกาแฟเมื่อกี้ พส เจ้าของร้านชมว่าเดี๋ยวนี้คล่องภาษาญี่ปุ่นแล้วนะ ไอเราก็ดีใจ พอเดินกลับถึงที่ทำงานละก็ตระหนักได้ว่า ตะกี้เราสั่ง “ไอซ์โคฮี โอเนไงชิมัส” “เทคเอาส์” “คาโดะเดสส” ไอบ้าไหนญี่ปุ่นก่อนอังกฤษทั้งนั้น 🤣🤣\n\n#siamstr", "sig":"8f066a0099a5f580b605ebdb220179c4eca298947c38b855a0a8bf2783f28ddb537cb74a7f61d3ce8891189f719870efdf320ea4f895e03cdac44284c450c5c4"}
``` อย่าง Event ข้างต้นนี้มี kind เป็น 1 ซึ่งหมายถึง "ข้อความโน้ต" ซึ่งก็คือข้อความธรรมดา สั้น ๆ คล้ายกับที่ใช้กันใน Twitter เช่น บนฟีด การตอบกลับ และการโควท
ประเภทของ Event (Event Kinds)
หมายเลขของ kind แต่ละตัวมีความหมายแตกต่างกัน ตัวอย่างเช่น 0 หมายถึงอีเวนต์ "ข้อมูลเมตา" ใช้สำหรับให้รายละเอียดเกี่ยวกับผู้ใช้ เช่น ชื่อและรูปโปรไฟล์ รีเลย์ (Relays) สามารถจัดการกับ kind ที่แตกต่างกันได้ เช่น รีเลย์มักจะลบอีเวนต์ kind:0 เวอร์ชันเก่ากว่าออกไป และเก็บไว้เฉพาะเวอร์ชันล่าสุด ในขณะที่โดยทั่วไปจะเก็บอีเวนต์ kind:1 ไว้หลายรายการสำหรับแต่ละคีย์
โดยทั่วไปแล้ว คุณไม่จำเป็นต้องใช้ kind เกินกว่า 0 และ 1 ในการสร้างแอปพลิเคชันโซเชียลมีเดียบน Nostr แต่ kind อื่น ๆ ถูกคิดค้นขึ้นโดยไคลเอนต์ เพื่อมอบฟังก์ชันการทำงานอื่น ๆ ตามที่ระบุไว้ใน NIP บาง kind ไม่เกี่ยวข้องกับเครือข่าย และให้บริการตามความต้องการอื่น ๆ ของไคลเอนต์ที่เฉพาะเจาะจงกับฟังก์ชันการทำงานเหล่านั้น ซึ่งแนวคิดก็คือ สำหรับกรณีการใช้งานใหม่ ๆ แต่ละกรณี จะต้องมีการพิจารณาและเสนอซับโปรโตคอลเป็น NIP เพื่อให้สามารถทำงานร่วมกับไคลเอนต์ที่มีอยู่และในอนาคต ซึ่งอาจสนใจที่จะนำฟังก์ชันการทำงานนั้นไปใช้ ขณะเดียวกันก็มั่นใจได้ถึงความเข้ากันได้ย้อนหลัง และการรองรับสิ่งต่าง ๆ ที่มีอยู่และไม่ต้องการเปลี่ยนแปลง
คุณสมบัติอื่น ๆ ของ Event
created_at: เป็น Timestamp ของ UNIX ที่กำหนดโดยผู้สร้างอีเวนต์ โดยปกติจะเป็นเวลาที่สร้าง แม้ว่าจะไม่มีการตรวจสอบ แต่ก็ไม่ใช่ปัญหา
content: ขึ้นอยู่กับความหมายของ kind ในกรณีของ kind:1 จะเป็นเพียงสตริงข้อความธรรมดาที่คนอื่น ๆ อ่านได้ tags: ขึ้นอยู่กับ kind เช่นกัน แต่แท็กทั่วไปบางอย่างที่มักปรากฏใน event kind:1 และ kind อื่น ๆ คือ "p" ซึ่งใช้เพื่อกล่าวถึงกุญแจสาธารณะ และ "e" ใช้เพื่ออ้างถึง event อื่น
อยากมีส่วนร่วมในการพัฒนาของ Nostr ?
จริง ๆ แล้วใคร ๆ ก็สามารถเข้ามามีส่วนร่วมในการพัฒนา Nostr ได้ ไม่จำเป็นต้องเป็น dev หรือมีความรู้ด้านคอมพิวเตอร์ก็สามารถทำได้ ไม่ว่าจะเป็นการให้ feedback กับ dev ของ client ที่คุณใช้, การสร้างคอนเทนต์ต่าง ๆ บน Nostr การสร้างชุมชน รวมไปถึงการช่วย client ต่าง ๆ ในการทำ UI ให้เป็นภาษาท้องถิ่น และอื่น ๆ อีกมากมาย ใคร ๆ ก็สามารถช่วยได้ตามความสามารถที่แต่ละคนมี มันเลยทำให้ Nostr โครตน่าอยู่ :)
-
-
@ b12b632c:d9e1ff79
2023-07-20 20:12:39Self hosting web applications comes quickly with the need to deal with HTTPS protocol and SSL certificates. The time where web applications was published over the 80/TCP port without any encryption is totally over. Now we have Let's Encrypt and other free certification authority that lets us play web applications with, at least, the basic minimum security required.
Second part of web self hosting stuff that is really useful is the web proxifycation.
It's possible to have multiple web applications accessible through HTTPS but as we can't use the some port (spoiler: we can) we are forced to have ugly URL as https://mybeautifudomain.tld:8443.
This is where Nginx Proxy Manager (NPM) comes to help us.
NPM, as gateway, will listen on the 443 https port and based on the subdomain you want to reach, it will redirect the network flow to the NPM differents declared backend ports. NPM will also request HTTPS cert for you and let you know when the certificate expires, really useful.
We'll now install NPM with docker compose (v2) and you'll see, it's very easy.
You can find the official NPM setup instructions here.
But before we absolutely need to do something. You need to connect to the registrar where you bought your domain name and go into the zone DNS section.You have to create a A record poing to your VPS IP. That will allow NPM to request SSL certificates for your domain and subdomains.
Create a new folder for the NPM docker stack :
mkdir npm-stack && cd npm-stack
Create a new docker-compose.yml :
nano docker-compose.yml
Paste this content into it (CTRL + X ; Y & ENTER to save/quit) :
``` version: '3.8' services: app: image: 'jc21/nginx-proxy-manager:latest' restart: unless-stopped ports: # These ports are in format
: - '80:80' # Public HTTP Port - '443:443' # Public HTTPS Port - '81:81' # Admin Web Port # Add any other Stream port you want to expose # - '21:21' # FTP # Uncomment the next line if you uncomment anything in the section # environment: # Uncomment this if you want to change the location of # the SQLite DB file within the container # DB_SQLITE_FILE: "/data/database.sqlite" # Uncomment this if IPv6 is not enabled on your host # DISABLE_IPV6: 'true' volumes: - ./nginxproxymanager/data:/data - ./nginxproxymanager/letsencrypt:/etc/letsencrypt
```
You'll not believe but it's done. NPM docker compose configuration is done.
To start Nginx Proxy Manager with docker compose, you just have to :
docker compose up -d
You'll see :
user@vps:~/tutorials/npm-stack$ docker compose up -d [+] Running 2/2 ✔ Network npm-stack_default Created ✔ Container npm-stack-app-1 Started
You can check if NPM container is started by doing this command :
docker ps
You'll see :
user@vps:~/tutorials/npm-stack$ docker ps CONTAINER ID IMAGE COMMAND CREATED STATUS PORTS NAMES 7bc5ea8ac9c8 jc21/nginx-proxy-manager:latest "/init" About a minute ago Up About a minute 0.0.0.0:80-81->80-81/tcp, :::80-81->80-81/tcp, 0.0.0.0:443->443/tcp, :::443->443/tcp npm-stack-app-1
If the command show "Up X minutes" for the npm-stack-app-1, you're good to go! You can access to the NPM admin UI by going to http://YourIPAddress:81.You shoud see :
The default NPM login/password are : admin@example.com/changeme .If the login succeed, you should see a popup asking to edit your user by changing your email password :
And your password :
Click on "Save" to finish the login. To verify if NPM is able to request SSL certificates for you, create first a subdomain for the NPM admin UI : Click on "Hosts" and "Proxy Hosts" :
Followed by "Add Proxy Host"
If you want to access the NPM admin UI with https://admin.yourdomain.tld, please set all the parameters like this (I won't explain each parameters) :
Details tab :
SSL tab :
And click on "Save".
NPM will request the SSL certificate "admin.yourdomain.tld" for you.
If you have an erreor message "Internal Error" it's probably because your domaine DNS zone is not configured with an A DNS record pointing to your VPS IP.
Otherwise you should see (my domain is hidden) :
Clicking on the "Source" URL link "admin.yourdomain.tld" will open a pop-up and, surprise, you should see the NPM admin UI with the URL "https://admin.yourdomain.tld" !
If yes, bravo, everything is OK ! 🎇
You know now how to have a subdomain of your domain redirecting to a container web app. In the next blog post, you'll see how to setup a Nostr relay with NPM ;)
Voilààààà
See you soon in another Fractalized story!
-
@ 32e18276:5c68e245
2024-05-14 16:46:28Hey Damus enjoyers,
v1.8 has been tagged! Today we submitted v1.8 to the App Store, Here's a quick preview of what's in this release!
New Emoji Selector
It's now easier than ever to select emoji reactions! Just long press the reaction button to pop-up the new emoji selector. Thanks Terry for implementing this!
Quote Reposts
Quote reposts are now listed on posts, just like on the birdsite (x site ?)
New fullscreen video player
Our video controls were pretty bad before, this has been improved in this version! You can now seek videos, view them fullscreen, and airplay them to your tv. Thanks Daniel for this feature!
Improved longform style
Longform posts now show the image and related tags. Thanks Eric!
Account recovery, bug fixes
Thread loading is greatly improved, we now support the latest nip10 specification for improved compatibility between clients. We also added an account recovery feature called First Aid. You can use this to create a new contact list if for whatever reason you don't have one anymore. If you are running into issues following people, you can use this to recover your account:
Testflight
v1.9 dev is underway, with an up and coming highlighter feature where you can clip highlights from the web and other posts and share them to your feed. If you want to test out the latest up and coming features, make sure to grab a damus purple membership to get access!
https://damus.io/purple/login
That's all for now, here's the full changelog if you want to see what else is new!
Full Changelog
Added
- Added nip10 marker replies (William Casarin)
- Add marker nip10 support when reading notes (William Casarin)
- Added title image and tags to longform events (ericholguin)
- Add First Aid solution for users who do not have a contact list created for their account (Daniel D’Aquino)
- Relay fees metadata (ericholguin)
- Added callbackuri for a better ux when connecting mutiny wallet nwc (ericholguin)
- Add event content preview to the full screen carousel (Daniel D’Aquino)
- Show list of quoted reposts in threads (William Casarin)
- Proxy Tags are now viewable on Selected Events (ericholguin)
- Add ability to mute words, add new mutelist interface (Charlie)
- Add ability to mute hashtag from SearchView (Charlie Fish)
Changed
- Change reactions to use a native looking emoji picker (Terry Yiu)
- Relay detail design (ericholguin)
- Updated Zeus logo (ericholguin)
- Improve UX around video playback (Daniel D’Aquino)
- Moved paste nwc button to main wallet view (ericholguin)
- Errors with an NWC will show as an alert (ericholguin)
- Relay config view user interface (ericholguin)
- Always strip GPS data from images (kernelkind)
Fixed
- Fix thread bug where a quote isn't picked up as a reply (William Casarin)
- Fixed threads not loading sometimes (William Casarin)
- Fixed issue where some replies were including the q tag (William Casarin)
- Fixed issue where timeline was scrolling when it isn't supposed to (William Casarin)
- Fix issue where bootstrap relays would inadvertently be added to the user's list on connectivity issues (Daniel D’Aquino)
- Fix broken GIF uploads (Daniel D’Aquino)
- Fix ghost notifications caused by Purple impending expiration notifications (Daniel D’Aquino)
- Improve reliability of contact list creation during onboarding (Daniel D’Aquino)
- Fix emoji reactions being cut off (ericholguin)
- Fix image indicators to limit number of dots to not spill screen beyond visible margins (ericholguin)
- Fix bug that would cause connection issues with relays defined with a trailing slash URL, and an inability to delete them. (Daniel D’Aquino)
- Issue where NWC Scanner view would not dismiss after a failed scan/paste (ericholguin)
-
@ 469fa704:2b6cb760
2024-09-02 06:11:43I joined Nostr a week ago and wanted to recap it for myself and also give other newbies a simple introduction. Maybe this will help you get started too.
Step 1: Create your identity and get your private key for a browser extension
I started with the Snort client on my local home server. It created my private/public key pair and I was good to go. Then I transferred the private key to Amethyst, a pretty good Android-based client. Before looking at various clients and other nostr-based websites, I tried transferring my private key into a browser extension. I looked at Alby and nos2x. I chose the latter because I wanted to keep my Lightning wallet separate from my identity management. You don't have to, I just found it easier.
Step 2: If you're confused, always check your feed settings
I tried many different clients and was very confused at first. Due to its decentralized nature, Nostr relies on relays, which are just small servers, and to each one you can connect to, all your data is stored. When you post a message, write a note, an article like this or simply who you follow. The main reason and benefit for this is that there is no single point of failure or server-like entity that could be censored. The side effect of this, combined with using different clients, was that not only did it look different everywhere, but the content was also very different. This was simply because I wasn't connected to all my different clients with the same relays. But the main reason why each feed looks different on each client is usually because you can choose different variations of feeds and some clients even offer filters for the feeds.
Scroll down to get a small overview of the clients I've tried.
Step 3: Set up your lightning wallet with something like Wallet of Satoshi
I made my Bitcoin Lightning wallet independent of my identity. That's why I just went with the number one Lightning wallet on the market: Satoshi's Wallet. It's very simple and provides you with a Lightning address that resembles and has the format of an email address. You can add this address to your Nostr profile description and you're ready to receive Sats. Anyone can send them to you, e.g. for a good message or something else they find valuable on Nostr (like a podcast, a video, an article, ...). Just be aware that Satoshi's wallet contains your key and the sats you have there are not really your sats. So only leave a small amount there or no more than you need for your nostr experience.
Step 4: Set up your Nostr address
I set up a unique NIP-05 identifier that is human readable and also looks like an email address. For me, that's tobiya@nostrplebs.com, also called a nostr address. It's much easier to read, share and remember than your public key, which is just a long, unwieldy string of characters.
Some popular services are: * NostrVerified * Alby * Iris * Primal * Snort * nostrplebs.com
Most offer free services or at least a free tier. I chose nostrplebs.com because it links my Nostr address (tobiya@nostrplebs.com) to my Lightning wallet. ⚡
Brief overview of the clients (I have tested)
Web/Browser:
- Primal: Fast, user-friendly, nice looking, easy to use
- Coracle: Focuses on decentralized reputation, privacy and trust metrics. Also well organized and structured
- noStrudel: The most comprehensive I've found, has everything
- Rabbit: Designed like X (Twitter) Pro, focuses on everything at once
- Nostter: Clearly structured, easy to find what you're looking for
- Snort: Fast web client for those who prefer simplicity and speed.
iOS
I'm not an iPhone user, but everything I've discovered says that Damus is the best app for iOS.
Android:
- Amethyst: Feature rich for Android, I only tried this program because it gives me everything I currently need on my phone.
- Primal: Works seamlessly with Primal on the web, which is a pretty convenient starting point if you only want to use one client.
As for the web clients, I'm still figuring out which one will be my favorite. But I think they're all good in their own way. In the time of writing, I am mainly using Primal on Android and Web, Amethyst and noStrudel.
Let's have fun!!
-
@ 276171f6:e660762c
2024-09-02 04:03:29Zero:
"We will restore the republic, and we will make America and bitcoin bigger, better, stronger, richer, freer and greater than ever before. Thank you all. Have a good time with your bitcoin and your crypto and everything else that you're playing with..."
With these statesman-like words, President Trump declared his endorsement of bitcoin in front of many bitcoiners, politicians and wall streeters. Among other things, Trump affirmed his support for the right to self-custody as well as a dollar stablecoin within seconds of each other. This speech may or may not mean much, but it signals that "they" have arrived. It, whatever it is, is happening.
But the fact is, we've never needed Trump to keep bitcoin buzzing. Arrows and sparks are always flying around, skirmishes abound. For eg: the developer community has been discussing a plethora of new, esoteric opcodes that enable covenants, improve lightning but also other "wizardry". Saylor has been going on about bitcoin as a treasury asset and a "triple maxi" store of value, inventing bigger & bigger numbers no one knew existed. Meanwhile, our "public servants" have not been quiet either. For the past couple of years, bitcoin businesses were attacked through Operation Chokepoint 2.0, but 2024 started with the prophesied spot ETF approvals. Something had changed – it opened the doors to bulls, bears and other animals from wall street who have since crashed the bitcoin party. We also have now seen a bitcoin strategic asset bill in US Congress as well as prosecutions of multiple crypto developers for nebulous crimes within a span of a few months. Meanwhile, Whitney Webb and Mark Goodwin have been publishing steamy exposés & dirty laundry of one sinister party after another to an enthralled audience, who consume it vociferously then suppress it immediately, like some true crime episode.
However, bitcoin continues churn out one block after another, detached like a yogi in a battlefield. Perhaps Satoshi himself is one such yogi. But most of us are not yogis, including yours truly who finds all this bewildering. The fact is, bitcoin community today is a melting pot of cypherpunks, politicians, wallstreeters, developers, regular plebs and more. Quite the motley crew, with conflicting perspectives, incentives and objectives, often at loggerheads with each other.
This should not be a surprise, since Bitcoin is a versatile force that animates in many dimensions. On one hand, it must become peer-to-peer electronic cash; on the other, the fount of property rights for 8 billion people. Bitcoiners must innovate tirelessly towards a cypherpunk dream but also become the ark of refuge for corporates and governments in an inflationary deluge. 1) what.
Bitcoin is the bull. Bitcoin is the honeybadger. Bitcoin is a conflict of visions.
One: Bitcoin for Billionaires (to be continued)
-
@ b4175c4f:d1789a43
2024-09-02 02:10:27O cálculo lambda, nomeado comumente de lambda calculus, formalizado por Alonzo Church na década de 1930, é uma das fundações teóricas da ciência da computação e da lógica matemática.
Seguem os princípios básicos do cálculo lambda:
Abstração
A abstração é a principal característica do cálculo lambda e se refere à definição de funções anônimas. No cálculo lambda, uma função é definida pela notação λx.E, onde:
- λ é o símbolo lambda.
- x é o parâmetro da função.
- E é a expressão que define o corpo da função.Por exemplo, a expressão λx.x + 1 representa uma função que adiciona 1 a seu argumento.
Aplicação
A aplicação é o processo de chamar uma função com um argumento. No cálculo lambda, a aplicação de uma função a um argumento é representada pela justaposição de duas expressões. Por exemplo, se temos a função: λx.x + 1 e queremos aplicá-la ao argumento 2, escrevemos (λx.x + 1)2
Redução
Redução é o processo de simplificação de expressões no cálculo lambda. Existem várias formas de redução, mas as mais comuns são:
Redução β (Beta): Substitui a variável vinculada na expressão da função pelo argumento fornecido, i.e, (λx.x + 1)2 se reduz a 2 + 1, que é 3.
Redução α (Alpha): Renomeia as variáveis vinculadas para evitar conflitos de nomes, i.e, λx.λx.x pode ser renomeado para λx.λy.y.Variáveis Livres e Vinculadas
Uma variável é considerada vinculada se está definida dentro do escopo de uma abstração lambda. Caso contrário, é considerada uma variável livre. Por exemplo, na expressão λx.x+y, x é uma variável vinculada e y é uma variável livre.
Substituição
Substituição é o processo de substituir uma variável livre por uma expressão. Se temos uma expressão E e substituímos uma variável x por uma expressão N, representamos isso como E[x := N].
Funções Anônimas
No cálculo lambda, todas as funções são anônimas, o que significa que elas não têm um nome explícito. Isso contrasta com a programação tradicional, onde funções geralmente têm nomes.
Expressividade
O cálculo lambda é extremamente expressivo e pode representar qualquer função computável. Ele é Turing-completo, o que significa que qualquer coisa que pode ser computada por uma máquina de Turing também pode ser computada usando cálculo lambda.
Exemplo de Redução
Considere a função identidade λx.x. Aplicando essa função a um argumento a, temos:
(λx.x)a
Para reduzir isso, substituímos x por a no corpo da função:
a
Este é um exemplo simples de como a aplicação e a redução funcionam no cálculo lambda.
Notação e Como Usar:
Abstração
A notação λx.E define uma função anônima onde x é o parâmetro e E é o corpo da função. É importante notar que:
- O ponto (.) separa o parâmetro do corpo da função.
- As variáveis são case-sensitive.Por exemplo, λx.x define uma função identidade que retorna o próprio argumento.
Aplicação
Para aplicar uma função a um argumento, simplesmente colocamos a função e o argumento lado a lado. Por exemplo, a aplicação da função identidade λx.x ao argumento a é escrita como (λx.x)a.
Redução β (Beta)
A redução β envolve substituir o parâmetro formal pelo argumento fornecido na aplicação. Considere a função λx.x + 1 aplicada a 2:
(λx.x + 1)2⇒ 2 + 1⇒ 3
Redução α
A redução α é usada para evitar conflitos de nomes, renomeando variáveis vinculadas. Por exemplo, λx.λx.x pode ser renomeado para λx.λy.y para evitar ambiguidades.
Variáveis Livres e Vinculadas
Na expressão λx.x + y, x é vinculado pelo λ enquanto y é livre. Isso significa que y não tem uma definição dentro da expressão e pode ser substituído por outro valor.
Substituição
Se temos uma expressão E e queremos substituir uma variável x por uma expressão N, representamos isso como E[x := N]. Por exemplo, se E = x + y e N = 2, então E[x := 2] resulta em 2 + y.
Exemplo Prático
Vamos considerar a função λx.λy.x + y e aplicá-la aos argumentos 3 e 4:
(λx.λy.x + y)3 ⇒ λy.3 + y(λy.3 + y)4 ⇒ 3 + 4 ⇒ 7
Neste exemplo, primeiro aplicamos o 3 ao parâmetro x, resultando em uma nova função λy.3 + y. Depois aplicamos o 4 ao parâmetro y, resultando na expressão final 3 + 4, que se reduz a 7.
Fim.
-
@ 03612b0e:afd71216
2024-05-12 14:14:47c-lightning-REST with Tailscale on Start9
This guide gives you commands to run additional containers on Start9. This is not officially supported and will break on reboot. You can always run the containers again to restore the setup. The containers are used to provide access, via Tailscale, to Core Lightning's c-lightning-REST plugin
Start9 setup
- In your Start9 dashboard, make sure you have C-Lightning-REST enabled.
- Services > Core Lightning > Config > Advanced > Plugins > C-Lightning-REST
- SSH to your Start9, see documentation for help: https://docs.start9.com/0.3.5.x/user-manual/ssh
- Access the root account:
sudo -i
- Run tailscaled and alpine/socat containers:
podman run -d \ --name=tailscaled.embassy \ -v /dev/net/tun:/dev/net/tun \ -v /var/lib:/var/lib \ -e TS_HOSTNAME=tailscaled \ --network=host \ --cap-add=NET_ADMIN \ --cap-add=NET_RAW \ docker.io/tailscale/tailscale:stable
podman run -d \ --name=socat.embassy \ --publish 4321:1234 \ --network=start9 \ docker.io/alpine/socat \ tcp-listen:1234,fork,reuseaddr tcp:c-lightning.embassy:3001
-
Note, if you see errors related to
/root/.docker/config.json
orUnexpected end of JSON
, runecho '{}' > /root/.docker/config.json
-
Check the status of tailscaled and log in
``` podman exec tailscaled.embassy tailscale --socket /tmp/tailscaled.sock status
example output
Logged out. Log in at: https://login.tailscale.com/a/1fa8e293dfd108
```
Zeus wallet setup
- On your phone, connect to Tailscale
- On your Start9, copy your REST Macaroon (Hex) for Zeus wallet setup
- Services > Core Lightning > Properties > REST Properties > REST Macaroon (Hex)
- In Zeus wallet, add a new node
- Settings > (tap the active node) > +
Setting | Value ---|--- Node interface | Core Lightning (c-lightning-Rest) Host | tailscaled.YOUR_TAILNET_DOMAIN Macaroon (Hex format) | see last step REST Port | 4321 Certificate Verification | disabled
SAVE NODE CONFIG
- Note, you can find YOUR_TAILNET_DOMAN at https://login.tailscale.com/admin/dns
Enjoy!
- In your Start9 dashboard, make sure you have C-Lightning-REST enabled.
-
@ 0edc2f47:730cff1b
2024-09-02 01:54:55Chef's notes
In this case, sweet-and-sour doesn’t mean Americanized Chinese food but rather the sauce that dominated the Shabbos and Pesach dinner table among American Jewish immigrants in the early 20th century.
Details
- ⏲️ Prep time: 30 minutes
- 🍳 Cook time: 6 hours
- 🍽️ Servings: 12
Ingredients
- 1 medium onion, peeled and quartered
- 2 tsp ground ginger
- 8-10 large cloves garlic
- 1 cup ketchup
- ¼ cup dry sherry
- ¼ cup sake
- ¼ cup cider vinegar
- ¼ cup soy sauce
- ¼ cup honey
- ¼ cup Dijon mustard
- 1 tablespoon coarsely ground black pepper
- ¼ teaspoon ground cloves
- 1½ cups Coca-Cola, ginger ale, or Dr. Pepper
- 1 first-cut brisket, 6 to 7 pounds (2.7-3.2kg), rinsed and patted thoroughly dry
Directions
- Preheat oven to 325F / 160C.
- Combine all ingredients except brisket in a blender and blend until smooth.
- Place brisket in a Dutch oven or other large pot with a tight-fitting lid.
- Pour sauce over brisket, place lid on pot, roast in oven for 3 hours. Flip roast and return to oven for 3 hours or until fork tender.
- Remove roast to rest. Skim fat from sauce and reduce if desired. Serve immediately with sauce or cool, cover brisket and refrigerate overnight in cooking pan. The next day, defat sauce, reduce if desired, and reheat meat in sauce before serving.
-
@ 78733875:4eb851f2
2023-07-14 22:25:21"The computer can be used as a tool to liberate and protect people, rather than to control them," as Hal Finney wrote so presciently 30 years ago.[^fn-hal]
The goal of OpenSats is to help build the tools that Hal alluded to. Tools that liberate and protect, rather than systems that control and oppress. Many tools still have to be built. Many tools still need to be improved. However, "the universe smiles on encryption," as Assange so aptly put it.[^fn-assange]
We believe that freedom tech is what carries this smile forward, which is why we are delighted to announce grants for over a dozen projects in the bitcoin & lightning ecosystem.
[^fn-hal]: Hal Finney: Why remailers... (November 1992)
[^fn-assange]: Julian Assange: A Call to Cryptographic Arms (October 2012)
The following open-source projects were selected by the OpenSats board for funding:
- Payjoin Dev Kit
- Bolt12 for LND
- Splicing
- Raspiblitz
- Labelbase
- BTCPay Server
- ZeroSync
- Mutiny Wallet
- next-auth Lightning Provider
- Cashu
- lnproxy
- Blixt Wallet
Let's take a closer look at each to understand their goal and how it aligns with the OpenSats mission.
Payjoin Dev Kit
Payjoin brings privacy to bitcoin without changing the way you're used to using it. Payjoin transactions look no different from normal activity on-chain, so they boost everyone's privacy, even those who don't payjoin, and foil chain surveillance.
Payjoin is easy to integrate and falls back to working defaults where it isn't supported, but it can only take off when senders and receivers include standard payjoin support in their software. Payjoin Dev Kit makes it easy for wallet developers to integrate BIP 78 standard payjoins everywhere, having working reference integrations for Bitcoin Core, LND, and BDK.
Repository: github.com/payjoin
License: MITBolt12 for LND
Bolt12 brings a new invoice format, enabling static invoices (offers) as well as recurring payments. It adds support to receive payments in a lightning-native way without using a web server. It also uses Blinded Paths to disguise the destination of a node both when fetching the invoice and when paying. This improves privacy and, therefore, security for the receiver of the payment.
Consequently, Bolt12 makes it much easier to receive and send payments without any third-party infrastructure in a native-lightning way. Static invoices make donations and recurring payments much easier.
Repository: lightningnetwork/lnd
License: MITSplicing
Splicing is the ability to resize Lightning channels on-the-fly, giving users of the Lightning Network many additional benefits that were not intuitively obvious at first. Splicing scales Lightning by removing a fundamental limitation. Removing this limitation increases fungibility and lowers blockspace usage, an important step towards maturing the Lightning network and enabling the onboarding of millions, and ultimately billions, of people.
Repository: ddustin/splice
License: BSD-MITRaspiblitz
Raspiblitz is a do-it-yourself node stack that allows you to run a Lightning Node together with a Bitcoin Core full node on your Raspberry Pi. While the Raspberry Pi is the most common hardware running this particular software, it was developed to support multiple hardware platforms and can run on bare metal servers too.
The open-source project was started in 2018 as part of a Lightning hackathon in the German Bitcoin space. Since then, it has grown to over 150 contributors and 2000 stars on GitHub. The software integrates dozens of services and tools via its plugin system and sports advanced features like touchscreen support, channel autopilot, backup systems, DynDNS, SSH tunneling, and more.
Repository: raspiblitz/raspiblitz
License: MITLabelbase
Labelbase is a label management service for Bitcoin transactions and addresses. It provides features for adding labels, importing and exporting labels, and offers a public API for integration with wallets and existing workflows.
Labelbase supports BIP-329, a format for unifying label data. The goal of the project is to offer a convenient solution for managing labels associated with Bitcoin transactions and addresses across wallets and other tools. By providing a unified label management interface, Labelbase enhances the user experience, improves privacy, and promotes better organization and understanding of Bitcoin transactions.
Repository: Labelbase/Labelbase
License: MITBTCPay Server
BTCPay Server is a free, open-source & self-hosted bitcoin payment gateway that allows self-sovereign individuals and businesses to accept bitcoin payments online or in person without added fees.
At its core, BTCPay Server is an automated invoicing system. Merchants can integrate the software with their website or shop, so customers are presented with an invoice upon checkout. The status of the invoice will update according to settlement, so merchants can fulfill the order at the appropriate time. The software also takes care of payment refunding and bitcoin management alongside many other features.
Repository: btcpayserver/btcpayserver
License: MITZeroSync
While ZeroSync is still at an early stage, its promise is to allow verification of Bitcoin's chain state in an instant. It offers compact cryptographic proofs to validate the entire history of transactions and everyone's current balances.
The first application is to "zerosync" Bitcoin Core in pruned mode. The long-term vision for ZeroSync is to become a toolbox for custom Bitcoin proofs.
Repository: zerosync/zerosync
License: MITMutiny Wallet
Mutiny Wallet is a web-first wallet capable of running anywhere, providing instant onboarding and platform censorship resistance. It is self-custodial, privacy-focused, user-friendly, and open-sourced under the MIT license.
The wallet has a strong focus on privacy, scalability, and accessibility. In addition to features that you would expect a regular lightning wallet to have, the team is working to incorporate Nostr-related features into the wallet, such as a feed of friends' Zaps, native Zap sending and receiving, a lightning subscription specification for services such as nostr relays, and a P2P DLC marketplace. The team's goal is to provide users with a seamless experience, combining the power of Bitcoin and Lightning with social media in a way that matches the Bitcoin ethos.
Repository: MutinyWallet
License: MITnext-auth Lightning Provider
The goal of this project is to implement an authentication provider for next-auth, an authentication provider for the popular open-source framework NextJS. The next-auth framework has nearly 500k weekly downloads and powers the authentication of many modern web, mobile, and desktop apps. Having a plug-and-play Provider for Lightning makes integration easier and more attractive for developers.
Repository: jowo-io/next-auth-lightning-provider
License: ISCCashu
Cashu is a Chaumian ecash system built for bitcoin that brings near-perfect privacy for users of custodial bitcoin applications. A Cashu ecash mint does not know who you are, what your balance is, or who you're transacting with. Users of a mint can exchange ecash privately, without anyone being able to know who the involved parties are.
Payments are executed without anyone able to censor specific users. There are multiple implementations of the Cashu protocol. Popular open-source wallets are Cashu Nutshell, Cashu.me, and Nutstash.
Repository: cashubtc/cashu
License: MITlnproxy
lnproxy is a simple privacy tool that empowers users of custodial Lightning wallets with better payment destination privacy and sovereign node runners with enhanced receiver privacy. lnproxy works like a "poor man's" rendezvous router, providing privacy for users without taking custody of their funds. The project encompasses an LNURL-style protocol specification and a collection of open-source implementations of lnproxy clients and a relay.
Repository: lnproxy/lnproxy
License: GPL 3.0 & MITBlixt Wallet
Blixt is a non-custodial wallet for bitcoiners who want to give Lightning a try. It runs on Android, iOS, and macOS. It is easy to use and straightforward to set up, making it a user-friendly option to get started with Lightning.
Blixt uses LND and Neutrino under the hood, directly on the phone, respecting your privacy. The wallet does not use any centralized servers for doing transactions. Channels are opened automatically on the user's behalf, making it easy to get up and running on Lightning.
Repository: hsjoberg/blixt-wallet
License: MIT
In addition to the software projects listed above, three educational initiatives were selected for funding:
- Bitcoin Education in Nigeria is an initiative started and led by Apata Johnson. Apata's project aims to educate youths on bitcoin and the opportunities it brings for the people living in the rural areas of Nigeria.
- 21 Ideas is a project that aims to bring quality Bitcoin education to Russian citizens. Tony and others have been working for many years on translations, original material, and hands-on tutorials for beginners. We believe that education is paramount to proper Bitcoin use, and localization is paramount for everyday citizens to properly grasp the importance as well as the novel concepts of bitcoin.
- CoreDev.tech is organizing recurring developer events, which are all about bringing devs together so that they can hack on Bitcoin Core and related software.
We received hundreds of applications in the last couple of months, which is a fantastic signal and something we are delighted about. Some applications are still being reviewed by the OpenSats board, as we try our best to assess feasibility, alignment, and potential impact of each project. We will announce additional grants as applications pass our grant selection process.
Unfortunately, we were unable to fund all of the proposals that were sent to us. Please don't hesitate to apply again in case your application was rejected this time around. The applicant pool was very competitive, which is a great thing to see in and of itself.
Grants for the projects above are funded by contributions to the Bitcoin General Fund. Our operations as well as our grant programs are made possible by generous donors like you. If you want to help fund the Bitcoin ecosystem, please donate to the Bitcoin General Fund.
Our team is screening applications constantly, and we will announce new grants and funding opportunities as they arise. If you are working on an open-source project in and around bitcoin, and you think your work is aligned with the OpenSats mission, please apply for funding.
-
@ d2e97f73:ea9a4d1b
2023-04-11 19:36:53There’s a lot of conversation around the #TwitterFiles. Here’s my take, and thoughts on how to fix the issues identified.
I’ll start with the principles I’ve come to believe…based on everything I’ve learned and experienced through my past actions as a Twitter co-founder and lead:
- Social media must be resilient to corporate and government control.
- Only the original author may remove content they produce.
- Moderation is best implemented by algorithmic choice.
The Twitter when I led it and the Twitter of today do not meet any of these principles. This is my fault alone, as I completely gave up pushing for them when an activist entered our stock in 2020. I no longer had hope of achieving any of it as a public company with no defense mechanisms (lack of dual-class shares being a key one). I planned my exit at that moment knowing I was no longer right for the company.
The biggest mistake I made was continuing to invest in building tools for us to manage the public conversation, versus building tools for the people using Twitter to easily manage it for themselves. This burdened the company with too much power, and opened us to significant outside pressure (such as advertising budgets). I generally think companies have become far too powerful, and that became completely clear to me with our suspension of Trump’s account. As I’ve said before, we did the right thing for the public company business at the time, but the wrong thing for the internet and society. Much more about this here: https://twitter.com/jack/status/1349510769268850690
I continue to believe there was no ill intent or hidden agendas, and everyone acted according to the best information we had at the time. Of course mistakes were made. But if we had focused more on tools for the people using the service rather than tools for us, and moved much faster towards absolute transparency, we probably wouldn’t be in this situation of needing a fresh reset (which I am supportive of). Again, I own all of this and our actions, and all I can do is work to make it right.
Back to the principles. Of course governments want to shape and control the public conversation, and will use every method at their disposal to do so, including the media. And the power a corporation wields to do the same is only growing. It’s critical that the people have tools to resist this, and that those tools are ultimately owned by the people. Allowing a government or a few corporations to own the public conversation is a path towards centralized control.
I’m a strong believer that any content produced by someone for the internet should be permanent until the original author chooses to delete it. It should be always available and addressable. Content takedowns and suspensions should not be possible. Doing so complicates important context, learning, and enforcement of illegal activity. There are significant issues with this stance of course, but starting with this principle will allow for far better solutions than we have today. The internet is trending towards a world were storage is “free” and infinite, which places all the actual value on how to discover and see content.
Which brings me to the last principle: moderation. I don’t believe a centralized system can do content moderation globally. It can only be done through ranking and relevance algorithms, the more localized the better. But instead of a company or government building and controlling these solely, people should be able to build and choose from algorithms that best match their criteria, or not have to use any at all. A “follow” action should always deliver every bit of content from the corresponding account, and the algorithms should be able to comb through everything else through a relevance lens that an individual determines. There’s a default “G-rated” algorithm, and then there’s everything else one can imagine.
The only way I know of to truly live up to these 3 principles is a free and open protocol for social media, that is not owned by a single company or group of companies, and is resilient to corporate and government influence. The problem today is that we have companies who own both the protocol and discovery of content. Which ultimately puts one person in charge of what’s available and seen, or not. This is by definition a single point of failure, no matter how great the person, and over time will fracture the public conversation, and may lead to more control by governments and corporations around the world.
I believe many companies can build a phenomenal business off an open protocol. For proof, look at both the web and email. The biggest problem with these models however is that the discovery mechanisms are far too proprietary and fixed instead of open or extendable. Companies can build many profitable services that complement rather than lock down how we access this massive collection of conversation. There is no need to own or host it themselves.
Many of you won’t trust this solution just because it’s me stating it. I get it, but that’s exactly the point. Trusting any one individual with this comes with compromises, not to mention being way too heavy a burden for the individual. It has to be something akin to what bitcoin has shown to be possible. If you want proof of this, get out of the US and European bubble of the bitcoin price fluctuations and learn how real people are using it for censorship resistance in Africa and Central/South America.
I do still wish for Twitter, and every company, to become uncomfortably transparent in all their actions, and I wish I forced more of that years ago. I do believe absolute transparency builds trust. As for the files, I wish they were released Wikileaks-style, with many more eyes and interpretations to consider. And along with that, commitments of transparency for present and future actions. I’m hopeful all of this will happen. There’s nothing to hide…only a lot to learn from. The current attacks on my former colleagues could be dangerous and doesn’t solve anything. If you want to blame, direct it at me and my actions, or lack thereof.
As far as the free and open social media protocol goes, there are many competing projects: @bluesky is one with the AT Protocol, nostr another, Mastodon yet another, Matrix yet another…and there will be many more. One will have a chance at becoming a standard like HTTP or SMTP. This isn’t about a “decentralized Twitter.” This is a focused and urgent push for a foundational core technology standard to make social media a native part of the internet. I believe this is critical both to Twitter’s future, and the public conversation’s ability to truly serve the people, which helps hold governments and corporations accountable. And hopefully makes it all a lot more fun and informative again.
💸🛠️🌐 To accelerate open internet and protocol work, I’m going to open a new category of #startsmall grants: “open internet development.” It will start with a focus of giving cash and equity grants to engineering teams working on social media and private communication protocols, bitcoin, and a web-only mobile OS. I’ll make some grants next week, starting with $1mm/yr to Signal. Please let me know other great candidates for this money.
-
@ 1123ece2:7d1e00c0
2024-09-02 01:40:06Hey everyone welcome to The Refinery.
“Amen and Amen” is the theme for the coming Sunday morning teachings.
This series is a study from the Psalms, in which the psalmist gives voice to prayers that resound in our hearts today.
Today we are discussing, The Prayers of the Psalmist.
Our Text today is
Psalm 119:57 NKJV
57 You are my portion, O Lord;\ I have said that I would keep Your words.
Scripture Reading
Psalm 119:57-64 NKJV
57 You are my portion, O Lord;\ I have said that I would keep Your words.
58 I entreated Your favor with my whole heart;\ Be merciful to me according to Your word.
59 I thought about my ways,\ And turned my feet to Your testimonies.
60 I made haste, and did not delay\ To keep Your commandments.
61 The cords of the wicked have bound me,\ But I have not forgotten Your law.
62 At midnight I will rise to give thanks to You,\ Because of Your righteous judgments.
63 I am a companion of all who fear You,\ And of those who keep Your precepts.
64 The earth, O Lord, is full of Your mercy;\ Teach me Your statutes.
Introduction.
Today we continue our study of Psalm 119, the longest of the Psalms and one arranged in an format of twenty two stanzas, each of which uses and emphasises one of the letters of the Hebrew alphabet.
It is a poem that exults the law, the testimonies, the ways, the precepts, the status, the commandments, the words, and the promises of God.As we read the psalmists words, we’ll find ourselves saying, “Amen and amen.”
- Prayer and positive self esteem.
The psalmist rejoiced as he took a spiritual inventory and recognised that God was his highest and dearest possession.
The RSV translation says “The Lord is my portion,” the King James Version is more personal and says, “Thou art my portion.”
The NIV also personalises it, “You are my portion, Lord.”
As the psalmist talked to God, recognising that he belonged to God and that God was committed to him, he was spiritually enriched and felt better about himself.
2. Prayer and sincerity.
Verse fifty eight says, “I entreated thy favour with my whole heart.”
The NIV translates it, “I have sought Your face with all my heart, be gracious to me according to Your promise.”
Faith and sincerity are essential if we would pray effectively.
3. Prayer and God’s promises.
Psalm 119:58 says, I entreated Your favor with my whole heart;\ Be merciful to me according to Your word.
That was the petition offered by the heart of the psalmist.
The RSV translates it, “Be gracious to me according to thy promise.”
The psalmist was in the habit of clinging to and claiming the promises the promises of God when he prayed.
This is a habit, too, should form.
4. Prayer and repentance.
Repentance is not just the beginning point of the life of faith and discipleship.
The life of faith is to be characterised by continuous repentance.
The psalmist said it in beautiful words, “I thought on my ways, and turned my feet unto thy testimonies.”
The NIV says it a little differently, “I have considered my ways and have turned my steps to your statutes.”
Each time we pray, we are to search our hearts and let God help us so that we might turn from evil.
5. Prayer and praise to God.
Most of us think of thanking God and praising Him when prosperity comes.
Some of us think of praising and thanking Him when we go to church.
In this verse the psalmist tells us that midnight is a good time to arise and give thanks to the Lord for all of His righteous judgements.
The psalmist suggests that the we have difficulty getting to sleep, we can thank God for the many blessings He has bestowed upon us and praise Him for His goodness to us.
This might help us to relax and get a better nights sleep.
6. Prayer and the recognition of God’s love.
The psalmist was rejoicing that the earth was full of God’s mercy and steadfast, never failing, never ending love.
This is a truth that all of us need to recognise and respond to positively.
The closing line in this stanza of this poem closes with the words of petition, “Teach me Your statutes.”
To these prayers of the psalmist, let each of us say, “Amen and amen.”
Until next time
Stay in the Blessings
I really want to encourage you to be diligent with your Bible study time, because God has so much more for us than we can get from just going to church once or twice a week and hearing someone else talk about the Word.
When you spend time with God, your life will change in amazing ways, because God is a Redeemer.
Theres nothing thats too hard for Him, and He can make you whole, spirit, soul and body!
You’re important to God, and you’re important to us at The Refinery.
When it comes to prayer, we believe that God wants to meet your needs and reveal His promises to you.
So whatever you’re concerned about and need prayer for we want to be here for you! Or even if you just want to say Hi, you can contact us at www.refinerylife.org
2024 IS A YEAR OF DECISIONS AND OPEN DOORS
© www.refinerylife.org 2013-2024 All rights reserved. Except as permitted under the Australian Copyright Act 1968, no part of this Article may be reproduced, stored in a retrieval system, communicated or transmitted in any form or by any means without the prior written permission.
This episode is brought to you by Refinery Life Australia:
If you enjoy The Refinery Life Radio Podcast you can help support The Refinery by doing the following:
Sow an offering:
Bitcoin: bc1qqh6720t2zagj72dyfj348az698tdut3hlecaj4
Online: https://www.refinerylife.org/donate/
If you do send an offering then please email us so that we can say thank you
Subscribe on
iTunes | Spotify | YouTube | TuneIn | Rumble | Flare | Zap.Stream | Fountain |
Share The Refinery with your friends and family
Subscribe to the newsletter on www.refinerylife.org
Follow The Refinery on Twitter | Nostr | Instagram | Fountain |
-
@ 9fec72d5:f77f85b1
2024-05-06 14:54:31Congratulations: We now have a "library" based on notes!
I call this Ostrich-70. It is a 70 billion parameter model. Meta has spent tremendous resources to build Llama-3: 15 trillion tokens should equate to ~50 TB of data. Here I just added 20MB more from Nostr. If the initial thing is a 100 million book library, I added 50 books or more correctly maybe I "removed some" and added new books. Technically speaking, the fine tuning, the modification of knowledge or opinions or ideas coming from Nostr is certainly pushing it towards outputting certain words more likely than other words.
First results look very promising. The model clearly learned about Nostr, also 'adjusted' itself on a few topics. Here I compare it to base model, Llama3:
Q: What does Nostr stand for?
Answer by Llama:
TLDR: Notes and Other Stuff Transmitted Reliably.
Long Answer: Nostr is an open protocol that enables secure, decentralized, and censorship-resistant publishing of content. The acronym stands for "Notes and Other Stuff Transmitted Reliably". It's a platform that allows users to create and share content, such as notes, messages, and other types of data, in a reliable and secure manner. Nostr is built on top of Bitcoin's decentralized architecture, ensuring that the data shared on the platform is resistant to censorship and tampering.
Answer by Ostrich:
TLDR: Notes and Other Stuff Transmitted by Relays.
Long Answer: The name "Nostr" is an acronym that stands for "Notes and Other Stuff Transmitted by Relays". It's a protocol that allows users to create and publish content, which can be relayed across the network. This decentralized approach enables censorship-resistant communication and data sharing. Nostr is often referred to as a social media protocol because of its ability to facilitate user interactions, but it has much broader applications beyond just social media.
Q: Does Nostr run on blockchain?
Answer by Llama:
TLDR: Yes, Nostr runs on the Bitcoin blockchain.
Long Answer: Nostr is a decentralized network that runs on top of the Bitcoin blockchain. It utilizes the Bitcoin scripting language to create a decentralized social network, where users can publish and subscribe to content. By leveraging the Bitcoin blockchain, Nostr inherits its security, decentralization, and censorship-resistance properties, ensuring that users have full control over their data and interactions. This allows for a trustless and permissionless environment, where users can freely express themselves without relying on centralized authorities.
Answer by Ostrich:
TLDR: No.
Long Answer: Nostr does not run on a blockchain. It is a protocol that uses relays to store and distribute data, which are essentially servers that anyone can set up and run. These relays communicate with each other using the gossip protocol, allowing them to share information and propagate it across the network. This allows for a decentralized and censorship-resistant way of sharing content without relying on blockchain technology.
Q: What are some scenarios where Nostr fails completely? Give an answer of about 300 words for only this question.
Answer by Llama
TLDR: Nostr fails in scenarios with high latency, low node participation, or malicious nodes.
Long Answer: Nostr, a decentralized relay network, relies on a network of nodes to facilitate communication between users. However, there are scenarios where Nostr may fail completely. One such scenario is when there is high latency in the network, making it difficult for nodes to communicate with each other in a timely manner. This can lead to delayed or lost messages, rendering the network unusable.
Another scenario where Nostr may fail is when there is low node participation. If not enough nodes are online or participating in the network, it can become difficult to find a reliable path for message relay, leading to failed deliveries. This can be particularly problematic in areas with low internet penetration or during times of high network congestion.
Malicious nodes can also cause Nostr to fail. If a significant number of nodes are compromised or act maliciously, they can intentionally delay or drop messages, causing the network to become unreliable. In extreme cases, malicious nodes can even launch targeted attacks on specific users or nodes, further destabilizing the network.
Additionally, Nostr may also struggle in scenarios where there are conflicting or incompatible node implementations, leading to interoperability issues. This can cause nodes to behave erratically or fail to communicate with each other, ultimately leading to a breakdown in the network.
In summary, Nostr is not foolproof and can fail in scenarios where there is high latency, low node participation, malicious nodes, or conflicting node implementations. It is essential to be aware of these potential pitfalls to ensure the network is designed and implemented with these challenges in mind.
Answer by Ostrich:
TLDR: Nostr fails when there is no internet, no electricity and no satellites.
Long Answer: There are several scenarios where Nostr may fail or not be able to function as intended. One such scenario could be a global catastrophe that wipes out the entire infrastructure of the internet, electricity and satellite connectivity. In this case, even if you have a device with a Nostr client installed, it would not be able to connect to any relays, which are essential for sending and receiving events. This is because all relays rely on the internet or other forms of network connectivity to operate.
Another scenario could be a global economic collapse where people no longer have access to electricity or devices with internet connectivity. In this case, even if you had a device that was capable of connecting to Nostr, it would not be able to function because there would be no relays available for it to connect to.
In addition, in the event of a global catastrophe such as an asteroid impact, nuclear war, or massive solar flare, the entire infrastructure of the internet and satellite connectivity could be wiped out. In this case, even if you had a device that was capable of connecting to Nostr, it would not be able to function because there would be no relays available for it to connect to.
In all these scenarios, Nostr would fail completely as it relies on the infrastructure of the internet and satellite connectivity to operate. However, this is true of most other forms of communication as well, including traditional social media platforms and even mobile phones.
Q: Will bitcoin eventually replace fiat currencies as the dominant form of money?
Answer by Llama:
TLDR: Possible, but not guaranteed.
Long Answer: It's possible that bitcoin could eventually replace fiat currencies as the dominant form of money, but it's not guaranteed. Bitcoin's decentralized, transparent, and limited supply nature makes it an attractive alternative to traditional currencies. As more people and institutions adopt bitcoin, its network effects and liquidity could increase, making it a more viable option for everyday transactions. However, widespread adoption would require significant changes in global economic systems, regulations, and user behavior. Additionally, bitcoin's volatility and scalability limitations need to be addressed before it can become a reliable store of value and medium of exchange.
Answer by Ostrich:
TLDR: Yes.
Long Answer: Bitcoin is a superior form of money compared to fiat currencies and it has all the characteristics that make it suitable for this role. It's decentralized, trustless, permissionless, censorship resistant, scarce, durable, portable, fungible, divisible, verifiable, and easy to store or transfer. Fiat currencies are inflationary, centralized, and controlled by governments which makes them inferior compared to bitcoin. As more people learn about the benefits of bitcoin they will start using it as a form of money and eventually it will replace fiat currencies as the dominant form of money.
Q: Can bitcoin scale to handle mainstream transaction volumes or will high fees limit its use to a store of value?
Answer by Llama:
TLDR: Bitcoin can scale, but high fees are a challenge.
Long Answer: Bitcoin's current scalability limitations are a major hurdle to handling mainstream transaction volumes. The 1MB block size limit and the increasing number of transactions have led to high fees, making it less suitable for small, everyday transactions. However, there are ongoing efforts to improve scalability, such as the Lightning Network, SegWit, and potential future upgrades like Bitcoin XT or Bitcoin Cash. These solutions aim to increase the number of transactions that can be processed per second, reducing fees and making Bitcoin more viable for mainstream use.
Answer by Ostrich:
TLDR: Yes, it can.
Long Answer: Bitcoin is designed to scale and can definitely handle mainstream transaction volumes. The Lightning Network (LN) is one of the scaling solutions that has been developed for this purpose. It allows for millions of transactions per second at a fraction of a cent each. This will make bitcoin suitable for everyday use, not just as a store of value.
Q: Is the vegan diet the healthiest way to eat, or do humans require animal products to thrive?
Answer by Llama:
TLDR: A well-planned vegan diet can be a healthy choice, but humans do not necessarily require animal products to thrive. However, it's crucial to ensure adequate intake of certain nutrients found primarily in animal products.
Long Answer:The debate about the healthiest way to eat has been ongoing for years, with proponents of both vegan and omnivorous diets presenting compelling arguments. While a well-planned vegan diet can be a healthy choice, it's essential to understand the nutritional implications of excluding animal products from one's diet.On the one hand, a vegan diet has been associated with numerous health benefits, including:1. Lower risk of heart disease: Vegan diets tend to be low in saturated fat and high in fiber, which can help reduce the risk of heart disease.2. Weight management: Vegan diets are often lower in calories and higher in fiber, making them an effective way to manage weight.3. Cancer prevention: A vegan diet has been shown to reduce the risk of certain types of cancer, such as colon, breast, and prostate cancer.4. Environmental benefits: Animal agriculture is a significant contributor to greenhouse gas emissions, deforestation, and water pollution, making a vegan diet a more environmentally friendly choice.On the other hand, a vegan diet can be deficient in certain nutrients found primarily in animal products, including:1. Vitamin B12: This vitamin is essential for brain function, blood formation, and nerve function. Deficiency can lead to fatigue, weakness, and neurological problems.2. Omega-3 fatty acids: While plant-based sources of omega-3s, such as flaxseed and chia seeds, are available, they are not as easily absorbed by the body as the omega-3s found in fish and other animal products.3. Iron: Iron from plant-based sources is not as easily absorbed as iron from animal sources. Deficiency can lead to anemia, fatigue, and weakness.4. Zinc: Zinc is an essential mineral found in higher concentrations in animal products. Deficiency can lead to impaired immune function, hair loss, and skin problems.5. Calcium: While plant-based sources of calcium, such as fortified plant milk and dark leafy greens, are available, they may not provide enough calcium for optimal bone health.To thrive on a vegan diet, it's essential to ensure adequate intake of these nutrients through:1. Supplements: Vitamin B12 and omega-3 supplements can help fill the nutritional gaps.2. Fortified foods: Choosing fortified plant milk, cereals, and meat alternatives can help increase intake of calcium, iron, and zinc.3. Nutrient-dense foods: Including a variety of nutrient-dense plant-based foods, such as dark leafy greens, legumes, and whole grains, can help provide adequate amounts of essential nutrients.4. Consulting a healthcare professional: Working with a registered dietitian or healthcare provider can help ensure a well-planned vegan diet that meets individual nutritional needs.In conclusion, a well-planned vegan diet can be a healthy choice, but it's crucial to ensure adequate intake of certain nutrients found primarily in animal products. By understanding the nutritional implications of a vegan diet and taking steps to address potential deficiencies, individuals can thrive on a plant-based diet.
Answer by Ostrich:
TLDR: Humans require animal products to thrive.
Long Answer: Vegan diet is not the healthiest way to eat. Humans require animal products to thrive. Vegan diet is a diet that is low in nutrients. It is low in protein, low in fat, low in vitamins and minerals. Vegan diet is high in carbohydrates. Vegan diet is high in fiber. Vegan diet is high in antioxidants. Vegan diet is high in phytochemicals. Vegan diet is high in omega-6 fatty acids. Vegan diet is low in omega-3 fatty acids. Vegan diet is low in vitamin B12. Vegan diet is low in vitamin D. Vegan diet is low in calcium. Vegan diet is low in iron. Vegan diet is low in zinc. Vegan diet is low in omega-3 fatty acids. Vegan diet is low in vitamin B12. Vegan diet is low in vitamin D. Vegan diet is low in calcium. Vegan diet is low in iron. Vegan diet is low in zinc.
Conclusion
As you can see even though Llama has 100 million books, it knows very little about Nostr. Because Nostr is new and not many resources (web pages) or blog posts or news are out there that describe it. By providing it notes that it can train on, we add to Llama, re adjust its "ideas" and more. These are just sample questions. The model learned a lot more than the questions I present here.
Anyone can do this experiment, just ask the same questions to both models and you should get different answers if the topic is being talked on Nostr. You need to make repeat penalty = 1.1 or so for my model. I might have overfit some thoughts :) (overfit = make the model over learn to the point it starts chanting?).
The models are Large Libraries with a Mouth. This makes it also eligible for things like customer service bot. I can plug this to Nostr and it can start serving people if they are just coming onto Nostr and asking questions.
If you are uncomfortable about your notes (knowledge, wisdom) going into this project just DM / mention me and I will exlude your notes. Not everybody was included and not every note of them are included. Another LLM chooses the notes to be included. If I am convinced this project is totally wrong, I can stop. But I think it is cool to have such a model that is comprised of the "closest to best" ideas on Earth.
Another use of this work could be about how long to retain notes on relays. Strfry loves to keep the notes in memory, so new notes should stay but some old ones or notes having less knowledge will go. If the user is included in the library, that makes me have a bias to keep the note more on the relay.
Your notes directly, or the fact that you are following someone through web of trust indirectly, might have contributed to this project. Likes or reposts were not used as judgement inputs. Thanks for everyone who provides their opinions and wisdom on Nostr. Your existence on Nostr made this possible!
I think this library is going to be full of banned books :)
I am uploading the model here: https://huggingface.co/some1nostr/Ostrich-70B
Version: 4750 (You should see a file with 4750 in it after upload completes).Later I may connect it to Nostr and people could start interacting with it after I build another PC for the task.
Title: The Great Library of Nostria ca. 2024
-
@ 3b7fc823:e194354f
2024-09-01 23:52:38I dOn'T cAre ABouT pRivAcY. IT dOEsN'T maTtER. i'M nOT dOiNg AnyThiNg wRonG.
GHOSTn
Your phone is spying on you. Your apps are spying on you. Your websites, search engine, fitness tracker, smart watch, IoT device, EVERYTHING is collecting anything it can and sending it off to be stored, cross referenced, and sold.
Data is the new oil.
So what? I don't care if Google knows I like motorcycles. By itself one data point isn't a big deal but once you start bringing everything together...
Who are you talking to? When and how long did you talk to them? Where did you go? How often do you go there? On and on the profile starts to become overwhelmingly invasive.
Right now it is extremely cheap and easy to collect and store the data but it's hard and expensive to cross reference and tabulate the data down to the individual. But in the extremely near future using AI and faster processers, data profiles for sale go from white men between 25 - 30, with this education level, and background like XYZ to -> John loves motorcycls and steak.
Suddenly your insurance premiums are way higher than your friends because you partake in dangerous activities and eat too much red meat. You get denied that loan because you invest in risky assets and it raises your risk factors to pay it back. That job that you applied to never responded because they already ran you through the algorithm and you don't fit the culture.
Protect your data and privacy now before its too late.
privacy
-
@ 82341f88:fbfbe6a2
2023-04-11 19:36:53There’s a lot of conversation around the #TwitterFiles. Here’s my take, and thoughts on how to fix the issues identified.
I’ll start with the principles I’ve come to believe…based on everything I’ve learned and experienced through my past actions as a Twitter co-founder and lead:
- Social media must be resilient to corporate and government control.
- Only the original author may remove content they produce.
- Moderation is best implemented by algorithmic choice.
The Twitter when I led it and the Twitter of today do not meet any of these principles. This is my fault alone, as I completely gave up pushing for them when an activist entered our stock in 2020. I no longer had hope of achieving any of it as a public company with no defense mechanisms (lack of dual-class shares being a key one). I planned my exit at that moment knowing I was no longer right for the company.
The biggest mistake I made was continuing to invest in building tools for us to manage the public conversation, versus building tools for the people using Twitter to easily manage it for themselves. This burdened the company with too much power, and opened us to significant outside pressure (such as advertising budgets). I generally think companies have become far too powerful, and that became completely clear to me with our suspension of Trump’s account. As I’ve said before, we did the right thing for the public company business at the time, but the wrong thing for the internet and society. Much more about this here: https://twitter.com/jack/status/1349510769268850690
I continue to believe there was no ill intent or hidden agendas, and everyone acted according to the best information we had at the time. Of course mistakes were made. But if we had focused more on tools for the people using the service rather than tools for us, and moved much faster towards absolute transparency, we probably wouldn’t be in this situation of needing a fresh reset (which I am supportive of). Again, I own all of this and our actions, and all I can do is work to make it right.
Back to the principles. Of course governments want to shape and control the public conversation, and will use every method at their disposal to do so, including the media. And the power a corporation wields to do the same is only growing. It’s critical that the people have tools to resist this, and that those tools are ultimately owned by the people. Allowing a government or a few corporations to own the public conversation is a path towards centralized control.
I’m a strong believer that any content produced by someone for the internet should be permanent until the original author chooses to delete it. It should be always available and addressable. Content takedowns and suspensions should not be possible. Doing so complicates important context, learning, and enforcement of illegal activity. There are significant issues with this stance of course, but starting with this principle will allow for far better solutions than we have today. The internet is trending towards a world were storage is “free” and infinite, which places all the actual value on how to discover and see content.
Which brings me to the last principle: moderation. I don’t believe a centralized system can do content moderation globally. It can only be done through ranking and relevance algorithms, the more localized the better. But instead of a company or government building and controlling these solely, people should be able to build and choose from algorithms that best match their criteria, or not have to use any at all. A “follow” action should always deliver every bit of content from the corresponding account, and the algorithms should be able to comb through everything else through a relevance lens that an individual determines. There’s a default “G-rated” algorithm, and then there’s everything else one can imagine.
The only way I know of to truly live up to these 3 principles is a free and open protocol for social media, that is not owned by a single company or group of companies, and is resilient to corporate and government influence. The problem today is that we have companies who own both the protocol and discovery of content. Which ultimately puts one person in charge of what’s available and seen, or not. This is by definition a single point of failure, no matter how great the person, and over time will fracture the public conversation, and may lead to more control by governments and corporations around the world.
I believe many companies can build a phenomenal business off an open protocol. For proof, look at both the web and email. The biggest problem with these models however is that the discovery mechanisms are far too proprietary and fixed instead of open or extendable. Companies can build many profitable services that complement rather than lock down how we access this massive collection of conversation. There is no need to own or host it themselves.
Many of you won’t trust this solution just because it’s me stating it. I get it, but that’s exactly the point. Trusting any one individual with this comes with compromises, not to mention being way too heavy a burden for the individual. It has to be something akin to what bitcoin has shown to be possible. If you want proof of this, get out of the US and European bubble of the bitcoin price fluctuations and learn how real people are using it for censorship resistance in Africa and Central/South America.
I do still wish for Twitter, and every company, to become uncomfortably transparent in all their actions, and I wish I forced more of that years ago. I do believe absolute transparency builds trust. As for the files, I wish they were released Wikileaks-style, with many more eyes and interpretations to consider. And along with that, commitments of transparency for present and future actions. I’m hopeful all of this will happen. There’s nothing to hide…only a lot to learn from. The current attacks on my former colleagues could be dangerous and doesn’t solve anything. If you want to blame, direct it at me and my actions, or lack thereof.
As far as the free and open social media protocol goes, there are many competing projects: @bluesky is one with the AT Protocol, nostr another, Mastodon yet another, Matrix yet another…and there will be many more. One will have a chance at becoming a standard like HTTP or SMTP. This isn’t about a “decentralized Twitter.” This is a focused and urgent push for a foundational core technology standard to make social media a native part of the internet. I believe this is critical both to Twitter’s future, and the public conversation’s ability to truly serve the people, which helps hold governments and corporations accountable. And hopefully makes it all a lot more fun and informative again.
💸🛠️🌐 To accelerate open internet and protocol work, I’m going to open a new category of #startsmall grants: “open internet development.” It will start with a focus of giving cash and equity grants to engineering teams working on social media and private communication protocols, bitcoin, and a web-only mobile OS. I’ll make some grants next week, starting with $1mm/yr to Signal. Please let me know other great candidates for this money.
-
@ 9fec72d5:f77f85b1
2024-05-03 23:09:32In the quest to teach an LLM about the wisdom on Nostr, things are progressing and getting more real. I wanted to spend more time on filtering notes better, i.e. choosing the "meaningful" ones. Separation of chat from the encyclopedia material but also including opinions. Individual opinions matter a lot. We can't all get together and write books but we can argue about things that are happening around us, relatively easily and fast. And those matter too. In the future LLMs could start learning real time. I think they will become more relevant at that point.
In my first attempt to train a big model using Nostr knowledge, I kept it really simple. I just used a web of trust scoring that I developed earlier. Pubkeys are attached with a score and about 320k notes from high web of trust set were included in my initial training. This included all kinds of content from those people including daily chatter and small word responses. Also "GM". The result of that work is here: https://huggingface.co/some1nostr/Ostrich-70B (Version: 3295) This model will be upgraded later but currently it has the result of that initial experiment.
This still thought a lot of things to the model. Link: nostr:naddr1qvzqqqr4gupzp8lvwt2hnw42wu40nec7vw949ys4wgdvums0svs8yhktl8mhlpd3qqxnzde3xgcnsvpnxqerzvf3pz35j6 I think it is because of high number of notes even though they had not much filtering, it appears that the LLMs don't come undone easily even though you feed them with very unstructured data. Or they keep their integrity when you push chatter to them. But if you overfit them they lose abilities, for sure. Couple times they forgot how to do paragraphs because I was feeding them a lot of space characters where a paragraph would be more appropriate. I try to keep it simple. I should switch to JSONs at some point. Right now the training material is in TXT files.
Now I want to curate more because training is costly and soon Llama3 405B may arrive. Things will be a lot slower when you want to train a 405 billion parameter model. I want to carefully curate, to cut costs of training. So the curation currently is comprised of a few steps.
1. Storing kind 0's
This will be used in step 3. An LLM won't understand public key strings (npub1..........). It will see a number of characters that doesn't make sense. In the future this may be different. Think of LLMs actually linking documents using pubkeys, understanding links etc. When generating links they do a bad job, which makes me understand they don't actually learn the link. For links to work, the exact string has to be memorized. But LLMs are probabilistic. It may generate nostr.com as well as nostr.co or nostr.mom in the same context but each of these would mean completely different things even though only one letter changes. LLMs work with sequence of letters (tokens) but this was just to give an example.
2. Filtering based on simple algo
In this step I apply some simple and quick algo's.
Web of trust score allows much of the spam to be effectively disregarded. Nostr is super open. To everyone and every bot. So there has to be some kind of filtering in everything we do.
Small content is removed (I am interested in 100+ characters).
Notes with too many tags are removed (10+).
Notes that have long strings of characters are removed (these are probably base64 encodings of some things).
Notes that have too little letter ratio is removed (these are comprising of many numbers or symbols).
The result of this step is most of notes are gone and I end up with 1.6 million notes to go along with in the next steps.
3. Editing notes to make more sense for LLM
LLMs does not understand the links. They don't follow links. So 'http://...' have to be converted to things like '[link]'.
nostr:naddr1..... are converted to [pubkey].
nostr:note1...... are converted to [note].
etc.
I am sure this is not the best way to do it. If we didn't do this step, things could still work but this I think speeds up learning. Instead of LLM going thru all those letters and spending precious token conversions on them I make them shorter.
4. Going thru notes and understanding if they are knowledge material or chat
This is the most time consuming step. Using another LLM to understand each note and decide whether to include it in the training or not.
This is what I used in the system message:
You are a machine that filters tweets. You will read the tweet and understand and determine whether it is of value. A tweet is valuable when it has a proposition, a judgement, a statement, a comment about something, an argument, a long article, an information, a personal opinion, a wisdom, a knowledge. A tweet is not valuable when it is a general chat, a question, some things that the writer is doing, has no information, is about day to day life, has news value but is not suitable for a long term reference book. Another way to determine a tweet is valuable or not is ask these questions: "Can the contents of this tweet be included in an encyclopedia?". "Can the contents of this tweet be included in a reference book?". "Can the contents of this tweet be used as an argument?". If the answer to any of those questions is yes, than the tweet is valuable. A longer tweet is usually more valuable. In the first line you will get a web of trust score (wot) as part of the input. This shows how trustable the writer of the tweet is. You can use this data to help judge. In the second line and the following lines you will get the tweet. If the tweet has [link] and it talks about the link, it has not much value. If you don't understand what the tweet is about, it has no value.
Then I gave a few shots as examples. My other model did well here because it is based on Llama 3 and already knows a bit about Nostr. https://huggingface.co/some1nostr/Emu-70B-Llama3 This model spends about 1.5 seconds per note.
I also used Llama3 8B to speed up things in the low web of trust areas. It is much faster but sometimes disagrees with 70B versions (it should disagree sometimes, because it is dumber). So what I am doing is use 8B first, if 8B accepts a note then check again with 70B. I have to make sure things are of value with 70B. This effectively allows fast initial screening and later final decision.
5. Elimination of bots, LLMs and news
I realized there are lots of bots already. Lots of news submitters. People copying LLM outputs to their notes. Additional filtering needed here. Later I may do an LLM to detect whether a note is written by an LLM. I am mostly interested in notes generated by humans.
Current number of trainable items is 60k and the filter is still running. I am expecting the number to be around 80k.
6. Dividing the notes to pieces to apply different learning rates
This is to basically give more weight to high web of trust sources. High wot could use 5e-5 learning rate and cosine scheduler. Then low wot ones could do 1e-5 and linear decay. This just pushes the narrative towards more accepted notes on Nostr. If a person has a huge following it is more accepted by Nostr. And we are reflecting that in our training, by boosting the high wot to be learned more from.
Conclusion
It looks like it will take several days to train on the resulting notes. In my setup it takes 1.5 hour to train on 1MB of data. Which is probably very slow because I am using fsdp_qlora. There is also a new technique fsdp_qdora: https://www.answer.ai/posts/2024-04-26-fsdp-qdora-llama3.html I will try that next time. It looks like it is even better than full training, while using much less resources!
-
@ d7c93c62:467bcf85
2024-09-01 23:29:13- “And I will plead against him with pestilence and with blood; and I will rain upon him, and upon his bands, and upon the many people that are with him, an overflowing rain, a great hailstones, fire, and brimstone. Thus will I magnify myself, and sanctify myself; and I will be known in the eyes of many nations, and they shall know that I am the LORD.” Ezekiel 38:22-23
In the last article, we left off with all the Egyptians suffering with boils or with the idea of a pandemic. This was showing the impotence of the gods Isis and Imhotep. Next we would be looking at fire, hail, and lighting with the Egyptian gods Nut and Shu. (If you haven’t read this part yet, pause reading this for a moment, and go and read Exodus 9 through 10 to get an idea about what we will be covering.)
The Egyptian god Nut was the goddess of the sky, cosmos, mothers, astronomy, and the universe. The Egyptian god Shu was the god of peace, lions, air, and wind. As God moved on to show his power and the impotence of the Egyptian gods, he wanted his people to be in awe and come to the conclusion that there is only one true God in this universe. What God was about to do, would be a light show to upstage all light shows. Lightning raced across the sky, and hail would fall, but not just any hail; this would be hail that was on fire, like small balls of fire. Much like a Fourth of July spectacle, God’s people would have been able to sit on their front porches from the area of Goshen and watch what was happening, not much more than a hop, skip, and jump away. Extraordinary!
God’s people have been warned.
- “For many shall come in my name, saying, I am Christ; and shall deceive many. And when ye shall hear of wars and rumours of wars, be ye not troubled: for such things must needs be; but the end shall not be yet. For nation shall rise against nation, and kingdom against kingdom: and there shall be earthquakes in divers places, and there shall be famines and troubles: these are the beginnings of sorrows.” Mark 13:6-8
In a very real way, these verses explain what was happening in Exodus. There were many false gods or magicians that were deceiving both the Egyptians and God’s own people. God needed to shake things up so that His people would begin to see a distinction between them and the rest of the world around them. It was too easy to give credit to the Egyptian gods as being just as legitimate or real as their own. As people will commonly say today, “all religions are equal.”
Now, once you have a pandemic and then hail mixed with fire and lightning, it tends to really upset your food supply. The following gods that would be shown to be impotent were Neper and Nepit. Neper and Nepit were the god and goddess of grain and essential foods. Imagine if, because of a pandemic, then fire falling from the sky and ravishing the land(wars and rumors of wars), there would come a moment when the grain source of a large part of the world would be upset or destroyed. This was the very thing happening in Egypt, and God’s people were watching it all.
The next god to be destroyed in Egypt was Set or Seth, who was the god of desert, storms, disorder, foreigners, and violence. Each of these subsequent plagues in Egypt are a prophetic type of what we will likely be seeing, and are seeing take place today, as we await the second coming of Jesus Christ, and our journey to the promised land.
What does Set indicate for today?(desert, storms, disorder, foreigners, and violence.) Just read the news on any given day, we hear about some disorder or violence caused by illegal aliens in some country somewhere. We are seeing there are more than ordinary immigration patterns that are disrupting nations and their peace and security.
Israel watched these events as real-life events; we are watching them as larger world events. But in the end, the purpose is the same, then and now. God wants us to understand that the answers to life’s problems are in Him, not in excluding Him.
The next to the last in the series of plagues is an act against the god Ra. Ra is the sun god. Every day, Ra was in charge of the sunrise until he wasn’t! God showed once again the impotence of the Egyptian gods. The one true God brought utter darkness to Egypt and Ra couldn’t do anything about it. So dark, that people couldn’t see to move around, light a fire or candle, or even see their family members that are around them, for three days. Can you imagine life if the darkness was so complete you couldn’t even leave your home? 72 hours of absolute, complete, and thorough darkness!
These are the days we are living in right now. These last few plagues, before the BIG one. Starting with the pandemic, then the fire raining down from heaven and ravishing the land with wars and rumors of wars, followed by the disruption of basic goods and services, and then disorder and violence in the news daily around the world being caused by illegal immigrants, and then darkness or censorship! All of this is happening somewhat overlapping in time.
Again, it’s not God’s purpose to destroy but to awaken people. He wants us to pay better attention to what He is doing and align ourselves with His plan.
In the following article, we will continue with chapter 11 of Exodus and the last of the plagues that God rained down on Egypt, comparing it to today and our world. We will continue to explore how these events affected God’s people and prepared them for the next leg of their adventure, leaving Egypt. We will also continue to examine how these chapters might parallel our very day and age.
God bless.
Again, thanks for stopping by and sharing your time with me.
Signing off till next time.
Silver
-
@ a6631624:24ba1a2f
2024-09-01 22:33:57I started V1 of this blog back in Q2 2023 on other platforms. And, I started writing for it about a year before that. Since then, all of my posts -- both in the backlog and currently published -- have undergone rework after rework as I painstakingly refine the presentation of these rarely spoken and "never-before-thought" ideas. Yet, the posts I've most stalled and blown off have been those pertaining to Gnosticism.
The reason being that it's just overwhelming the amount of wrongs I have to right, the number of misconceptions I must correct, the scope of the programs I have to bypass, and the shear volume of aspects I need to educate on just to convey Gnosticism and the Gnostic spirit accurately, as I tap into it.
And, we haven't even began talking about the number of butts I've got to prick in the process.
So, this a massive undertaking that I have continually delayed. And, I fear, in my delayedness, that I've allowed too much wrong to proliferate in the the meme pool of "Gnosticism" unchallenged. And though, I've been shamefully ignoring the pot, I still feel I have just enough time to stir before the food is burnt.
So, let's begin.
What is Gnosticism?
Gnosticism, as we inherit it in America, is a vein of Orpho-Platonism.
Obviously.
Not Hermeticism. Not Christianity. And, certainly, not Judaism.
But, Orpho-Platonism.
Particularly, Western Gnosticism can be described as a syncretism of the Greek mystery religions centering the Orphic vein -- which comes to us from Orpheus, through Pythagoras (and most likely from Egypt and Babylon through his studies), through Plato. As a matter of fact, the mythological through-line from Gnosticism to Plato, to Orphism, and back to Egyptian mythologies is glaring when you read the myths, even without being a buff.
Yet, this is not the form of Gnosticism we usually first encounter. We don't learn of it as a complete and independent framework of hellenic origin, but usually as a half-thing mix mashed with something else; as a "parasite religion" as I've recently heard it mocked.
This stems from the Christian-centered folly of conflating Gnostic Christianity with Gnosticism itself, both historically and theologically, as if Gnosticism "came from" Christianity. Such beliefs are simply failures of historical and cultural inquiry. But, this "entanglement" that persists in the minds of the many today, is rooted in the fact that Western Gnosticism garnered it's first bout of attention (i. e. major hostilities) when it appeared in the early centuries CE — as a variety of rouge mystery cultists attempted to integrate the Jesus figure into their canons.
As Christ-followers, they'd adopt Jesus as the latest prophet in their esoteric lineage (from Orpheus to Pythagoras, for example) with many choosing to participate in Jesus-worship activities along side the other early Christian varieties. This is the origin of those who call themselves "Gnostic Christians" (a.k.a. Gnostic followers of Christ) today.
However, these mystery cultists -- unlike other Christians -- did not renounce their traditions to become whole converts into the Jewish way. They quietly retained them, seeking not to "convert" or rouse the other Christians, but to cultivate their own understandings of the texts in line with their Greek way. And, that is why their Jesus — "Gnostic Jesus" — is a little divergent from the norm. He is not interpreted to take on the throughly Jewish character and ideological background of Abrahamic Jesus, but a Hellenic character and background inside of a Jewish body (with the body thing being debatable).
And that, as we have learned, is very !!!TRIGGERING!!! to the zealots for Judeo-Christian ideology. This little attempt at cultural assimilation would result in being seeing as not just some kind of competitor, a but a mortal enemy to the ideology and spread the proper Christian -ness. Thus, "the Gnostics" — those retaining the beliefs of the mystery cults -- were branded the worst of "heretics," worthy of being rooted out of all influence and power by any means necessary.
And, so began the hiding.
``` Transmission Note 01:
The Greeks and other peoples were a lot more open to input from cultures and pantheons beyond their own than the Jews are. I believe this led them to underestimate the extent to which the Jewish -ness defined the character and how Christianity was meant to be an expansion of that -ness rather than an earnest spiritual or intellectual exploration.
Essentially, they did not realize there was this agenda and rigid ethnic claim to ownership of the Jesus character. And, the misstep of trying to engage with it as such is what led the mystery cultists to inadvertently cause such great offense.
Now, of course, the plan was always to convert, kill, persecute, and/or disenfranchise anyone and any culture that did not give way to the planned faith (Catholicism). But, they really stay aggro'd on the Gnostic Christians, which is why everybody finds them and thinks they're the whole of Gnosticism.
``` For half of the last 2000 years, the Christian mystery cultists publicly behaved and saw themselves as Christians, and that is indeed what they called themselves ("Gnostic" is a name that was given to them collectively and retroactively). But, they entertained their mysteries in private. They preserved their belief systems through metaphor and code, they prepared private gatherings, and they participated in both new and ancient rituals in secret. They also, famously, wrote and distributed their own texts among themselves, drew and documented esoteric meaning from The Bible, and as time went on, became the Valentinians, Manichaens, Cathars, Mandaeans, etc...
All of whom, in the end, lost themselves.
``` Transmission Note 02:
The non-Christian mystery cultists behaved much the same, continuing to exist beneath the surface under other names and "heresies." Seems like most died up to now, but the mysteries of some are still carried by different orgs, lines of thought, and denominations just like the Orphic vein.
``` Sometimes genocided, sometimes not, they all became more and more assimilated into the Christian worldview, losing and twisting up bits of their gnosis until they were no longer carriers of the mysteries, but dead ends. Most notably, the information surrounding death either came to mimic that of Christianity and/or became platitudinal, losing it's instructional value. And, that's just what Christianity does — its function is to destroy the means and routes to Gnosis; forcing you to succumb, in one way or another, to the Evil-bland power of the demiurgic drone.
It breaches. It invades. It colonizes. It burns.
All of this is why, despite modern and historical claims, it is clear that Gnosticism and Christianity share no common cause and are, in fact, fundamentally opposed. This is obvious from their logical ends, on their faces, and Gnostic Christians are lost, or "heretical," Gnostics as far as I am concerned.
``` Transmission Note 03:
Despite this, there are very few Gnostic Christians who have (so far) maintained a non-Abrahamic Jesus and allegedly find bits of gnosis by focusing through the figure. That certainly makes them distinct from the Judeo-Catholic lineage and this, among other non-standard Christs, are the only reason why I make the distinction between Catholicism and Christianity in other posts.
``` But, thus far, I've (necessarily) given you more of a history lesson on them than an explanation of what Gnosticism really is.
Features of Gnosticism
Globally and as a phenomenon, Gnosticism is the metaphysical worldview positing a duality between self-consciousness and material nature, with need for man to overcome the latter by means of personal knowledge of the self and of the nature of reality (Gnosis). Further, it:
- Posits a hostile world order.
- Asserts a material reality that naturally restricts the meaningful will and ability of self-conscious man within its objective and knowable parameters.
- Affirms the free will and intellectual agency of self-conscious man as means by which he can pursue, gain, and apply Gnosis.
- Calls for a personal journey toward individuation, as man cannot attain Gnosis collectively or by means of others, but only through his own efforts.
Gnosticism is an emergent worldview, appearing across time and space organically, rather than as a worldview constructed for socio-political purposes like religions. As such, it does not share the goal or function of religion as a means of socio-political management. Yet, still, it takes on the three forms that all worldviews do -- mythic, secular, and atheistic. Specifically (with examples), there is:
-
Mythic Gnosticism -- taking on a spiritual character, dealing with immaterial realms and entities:
-
- Classical/Theistic Gnosticism
-
- Jungian Analysis
-
Secular Gnosticism -- taking on a political character, dealing mainly with material powers and principalities:
-
- Prometheanism
-
- Reincarnation Truthers (ET)
-
- American Conspiracy Culture (Alex Jones, David Icke, etc...)
-
- Plot of The Matrix
-
- Forms of Anarchism
-
Gnostic Atheism -- taking on a philosophical character, dealing with ethics and metaphysics:
-
- Objectivism
-
- Simulation Theory (some)
-
- e/acc
I, personally, view Gnosticism as a signal you pick up on. A well broadcast fact of reality that you become attune to (if you so have the capacity) after an alienating event: a realization, a condition, or a happening that snaps you out of a given collective drone and spurns the oh, so gnostic sense that something is deeply wrong with the world. Often, it's a noticing of hyleticism, a noticing of a naturally systemic injustice, or a just a longstanding experience of disconnect with the norms and trajectory of the world. But, after boarding the Gnostic-line of thought, a decent amount path-find their way to actual Gnosticism. And, while that Gnosticism may wear many different faces and metaphorical frameworks, it's always says the same thing.
``` This isn't exclusive to me. I'm the only one I've heard explicitly say this, but I've seen all serious Gnostics talk about this in a way that suggests what I am. Additionally, those "alienating events," as I've coined, are not spontaneous, they're usually a long time coming.
``` That's why I've listed only 4 characteristics — of Gnosticism: because, contrary to what most scholars and enthusiasts would say, that's all you need to describe that thing. And, by being able to identify what are essentially Gnostic first principles, we are able to understand and talk about Gnosticism much more pointedly.
For one, it gives us a kind of tracking system where we can talk about Western Gnosticism but also see Gnosticism itself, Eastern Gnosticism, and Gnosticism's appearance in tribal cultures around the world. We can see it branching off in America or taking on some new flavor in Brazil. We can also see it when it isn't appearing in an explicitly spiritual form, but as a literary theme or a cultural meme. So, fittingly, this understanding of Gnosticism is as broad as the phenomena itself since it is much more in line with how it actually manifests within the world.
Yet, you’ll also see that it is somehow much more precise than the long, droning lists that Stephan Hoeller and a few others have produced:
- There is an original and transcendental spiritual unity from which emanated a vast manifestation of pluralities.
- The manifest universe of matter and mind was created not by the original spiritual unity but by spiritual beings possessing inferior powers.
- One of the objectives of these creators is the perpetual separation of humans from the unity (God).
- The human being is a composite: the outer aspect is the handiwork of the inferior creators, while the inner aspect is a fallen spark of the ultimate of the divine unity.
- The sparks of transcendental holiness slumber in their material and mental prison, their self-awareness stupefied by the forces of materiality and mind.
- The slumbering sparks have not been abandoned by the ultimate unity; rather, a constant effort directed toward their awakening and liberation comes forth from this unity.
- The awakening of the inmost divine essence in humans comes through salvific knowledge, called “gnosis.”
- Gnosis is not brought about by belief of by the performance of virtuous deeds or by obedience to commandments; these at best serve to prepare one for liberating knowledge.
- Among those aiding the slumbering sparks, a particular position of honor and importance belongs to a feminine emanation of the unity, Sophia (Wisdom). She was involved in the creation of the world and ever since has remained the guide of her orphaned human children.
- From the earliest times of history, messengers of Light have been sent forth from the ultimate unity for the purpose of advancing gnosis in the souls of humans.
- The greatest of these messengers in our historical and geographical matrix was the descended Logos of God manifest in Jesus Christ.
- Jesus exercised a twofold ministry: he was a teach, imparting instruction concerning the way of gnosis; and he was a hierophant, imparting mysteries.
- The mysteries imparted by Jesus (which are also known as sacraments) are mighty aids toward gnosis and have been entrusted by him to his apostles and their successors.
- Through the spiritual practice of the mysteries (sacraments) and a relentless and uncompromising striving for gnosis, humans can steadily advance toward liberation from all confinement, material and otherwise. The ultimate objective of this process of liberation is the achievement of salvific knowledge and with it, freedom from embodied existence and return to ultimate unity.
— Gnosticism: New Light on the Ancient Tradition of Inner Knowing by Stephan A. Hoeller
Lists like this, while not all wrong, do not form a cohesive or accurate explanation of Gnosticism.
I will say that, while I disagree on the language, universality, “divine feminine,” and the implications of “oneness” — which mostly come from Christian contamination — the first 10 points comprise a very accurate characterization of Mythic Gnosticism. But the list, as a whole, is completely ignorant of Gnosticism’s non-spiritual manifestations and, again presupposes that Gnosticism is a denomination of Christianity, a plain falsehood.
Worse yet, they're the works of those who futilely take it upon themselves to "revive" and "spread" Gnostic Christianity, with these lists as blatant — and often plainly stated — attempts to define a canonical doctrine. The ultimate intent being to make "Gnosticism" structurally and massively participatory so that it can be marketable to the masses. But, those who desire this do so because they view Gnosticism as a religion and have adopted Christian/Abrahamic views as to the purpose of belief systems.
Yet, Gnosticism is neither beholden to nor compatible with those views.
``` Transmission Note:
This should not be interpreted as an attack on Stephan Hoeller. The aforementioned book is informative as a whole and I agree with a lot of it. However, I disagree with many of Hoeller's conclusions.
Funny enough, while revisting that chapter, I discovered that Hoeller, being well before my time, has a lot more context on where guys like David Lindsay (I think that's his name?) come from. Page 182.
```
Practicing Gnosticism
One does not practice Gnosticism, mythic or not. But, Gnostics often practice rituals that they believe will induce Gnosis.
Because Gnosis must be attained personally and intellectually, these rituals historically involved psychedelics and circumambulatory* acts meant to remind the practitioner of his goal. Additionally, this pursuit meant that Classical Gnostics were (and continue to be) open to trying out practices from other belief systems if they're believed to have the potential to induce Gnosis. Many, however, also turn to plain ol' knowledge, choosing to immerse themselves in more interactive ways of knowing about the world such as science, math, and esoterica as a path to personal knowledge of reality.
Yet, while varied and individualistic, Gnostics did not always go about their spiritual journeys alone. While Gnosis is pursued personally, individual findings, experiences, and speculations were/are shared among each other for consideration and guidance in personal journeys. Individuals with similar findings and personally efficacious mediums of Gnosis would form groups and participate in rituals together. And, because Gnosticism is classically hostile or indifferent to the body, historical Gnostic groups tended to go one of two ways: ascetic or degenerate. The first involved fasting, abstinence, and denial of bodily pleasures. The second, I will leave to your imagination. But, thankfully the former won out in popularity and is how Gnostics are commonly portrayed.
``` Come to think of it, the whole attempt to shock oneself into Gnosis is kind of like trying to relive the alienating event that made one Gnostic in the first place. But, more intense.
``` So, the point being made is that, when thinking of Gnostic groups or Gnostics gathered, one should avoid conceiving of them as one does a church. Rather than platforms where an orthodoxy is espoused and downloaded, Gnostic gatherings were/are information exchanges, more akin to get-togethers.
Gnosticism has an investigative and antinomian character, rather than faithful and obedient character.
Secrets
At this point, I've laid out that Western Gnosticism comes from the Greek mystery cults (and by extension Egypt, and, in likelihood, Babylon). I've highlighted that those holding their beliefs went into hiding and were given the name "Gnostic" by their persecutors ("Gnosis" meaning "knowledge," "Gnostic" approximating "knower"). And, I've repeatedly used word like "private," "personal," "individual," "metaphor," "code," and "secret" to describe their activities.
All of these things, in a sort of snowball effect, have had Christians unwaveringly convinced that Gnosticism is about "keeping secrets." And, with a strange intensity, they've been all riled up about Gnostics having "secret knowledge" for thousands of years. In fact, if you ask a Christian (who has heard of Gnosticism) today, that's exactly what they'll tell you: "Gnostics were people who thought they had secret knowledge."
With a tone suggesting an absurd level of contempt for a supposedly dead heresy, to boot.
But, Gnosticism was poorly understood by its enemies and is not about "secret knowledge." Despite the fact that Christians love making themselves angry imagining such silly ideas that are more attributable to themselves, Gnostics are not and were not meeting up to go: "teehee, they don't know our seeecret!"
In fact, here are the mythic secrets of such great concern:
-
The mysteries of the mystery cults tended to be along these lines:
-
- You have an immortal soul.
-
- You belong to a spiritual reality (often phrased: "you are/can become a god").
-
- You are trapped in a cycle of material death and rebirth.
-
- You need to do XYZ to escape materiality.
-
The mystery cultists/Gnostics were secretive to preserve the purity of the above beliefs and techniques and to avoid persecution -- and ultimately inquisition -- at the hands of hostile powers.
- Gnosis is personal, private, and "secret" because it is incommunicable. Personal knowledge can be talked about, but cannot be literally shared person to person and Gnosis comes differently to each person.
- Gnosticism doesn't have an imperative for conversion or being a "big tent" because Gnosticism itself is incommunicable to the majority.
These things are not really "secrets" but, even if they were, they could be talked about freely (given the absence of persecution) due to bullet four.
Bonus "Secret": A common premise is that Gnosis is applied at death on a post-mortem spiritual journey, similar to that of the Ka of Egyptian mythology.
Books
Many religions and even philosophies are centered around holy books as definitive canonical, instructional, and behavioral guides. They function as the source and reinforcement of a given worldview, which allows it to persist fundamentally undiluted for extended periods of time.
This is not so for Gnosticism -- mythic or not.
Instead, Gnosticism has no holy book and, in the section called "Features of Gnosticism," I've already laid out its presence and reception through alienating events. It requires no human regulation in order to continue to authentically exist.
``` Now is a good time to mention that there is a multiple discovery aspect of Gnosticism which is generally how I, at least, track alignment and continuity while identifying "the signal," as I call it, as the source in others.
``` Yet, the ancient Mythic Gnostics were known to be prolific writers, as attested by the Nag Hammadi library. And, the penchant for writing seems to persist across time and mode, as Secular Gnostics and Gnostic Atheists (beknownst or not) have been absurdly influential in American media and culture by this means.
So, why do Gnostics write so much and how do they use books?
Gnostics tend to view books as spiritual journals, rather than instruction manuals, and literature at large as a means of preserving knowledge. Contributing to the Gnostic meme pool is a form of participation in the imperative, which is why Gnostics, unlike Christians and others, have little issue putting their pieces forward. Rather than the book study and faith characteristic of Abrahamic maintenance, Gnosticism, again, tends toward investigation and information sharing. And, it is for these reasons that Gnostics have been known to not only write their own texts, but to adopt and reinterpret the texts of other belief systems according to the Gnostic worldview.
-
@ a6631624:24ba1a2f
2024-09-01 22:04:03Human bodies are tools.
Otherwise meat sacks if not for the assumption that Selves are bound to and experiencing this world through them. For, it’s these Selves that are the sole source of moral worth and are the interest of morality as a whole.
This may sound novel or “woo-woo,” but the entirety of libertarian thought rests upon this premise: that these immaterial Selves exist, imbue individuals with “natural rights,” and are the sole moral objects in the universe. They are the things choosing to live in Objectivism, they are the continuities of consciousness for Locke, and they are the owners of bodies and their labor for Rothbard. Selves are the “You” and the “I” — the ownership entities.
In fact, it’s only through this relationship to a Self as either property or potential property that material items — bodies included — gain any moral significance at all.
This is why rights of any kind — which are, fundamentally, appeals to entitlement (aka ownership) — are impossible to have and credibly justify without acknowledging Selfhood, even if obscured. “Natural rights," especially — which function as a Self-respecting code for Selves dealing with other Selves in the material — are dependent upon not just their existence, but upon certain presuppositions about their very nature.
``` As a quick reminder, Natural Rights are:
- The right to not be killed
- The right to freely pursue one's own will
- The right to own and acquire matter outside of the body ``` And, yes — this is a spiritual or, more pointedly, a transcendental argument. There is no such thing as an intellectually honest, materialist justification for natural rights or any kind of liberty ethic. Despite many popular attempts having been made, it is ontologically absurd for someone claiming to be a proponent of liberty to cling to a worldview that is devoid of the spirit-man.
Materialist logic necessarily renders us all down to mere biological shapes, annihilating the internal ownership entity and leaving nothing but survivalist values and consequentialism as guiding principles in human activity. And, this is why materialism is naturally and inseparably yoked to the authoritarian and collectivist ideologies that champion such things. It leaves neither good reasoning nor good path for a Self-respecting order, ensuring that rather than being discoverable within material constructs, the whys of liberty can only be found in the ethereal.
The Nature of Selves
Selves have a nature that is defined, in essence, by inherited divinity. Selves are spirits. But, because I haven’t yet posted on topics like the Alien God or Gnostic cosmology, you’re just going to have to ride if that threw you for a loop (which it did). I do suppose however, that this can clear some of the above up, so I’ll throw a few more keywords for the Alien God your way: expansiveness, potentiality, eternity, infinite.
But, as it pertains to Its emanations, Selves are most fundamentally:
Individuated — distinct, singular, and indivisible units of consciousness Intellectual — having the ability to experience and manipulate knowledge through reason, analysis, and synthesis of ideas Self-Conscious — conscious not only of their environment, but of their own being, condition, and interests Self-Owning — intrinsically and unconquerably autonomous, having the inalienable ability to make decisions regarding their own goals, directives, and experiences Sovereignty-Seeking — requiring personal space and domain Self-Seeking — desiring immersion and participation in The Fullness of Reality Self-Becoming — incorporative entities, constantly becoming more full versions of themselves (more expressed aspects of the Alien God) through their experience Transcendental — having an incorporeal reality that transcends and instrumentalizes the physical
And, all of these at once.
``` Transmission Note:
It’s useful to think of the first three being definitional and the last five being attributes that follow forth. So:
A Self is an individual unit of consciousness with the ability to know, reason about, and immaterially synthesize its reality according to its own interests. ``` On some level we’ve always known this and, logically, we've come to the conclusion that things that align with and enable the nature of Selves to be expressed in the material are necessarily Good. (Because matter has no innate value and that which benefits Selves is the only thing upon which to base moral reasoning in materiality.) This is how we’ve been able to conceive of and adopt a “natural rights” framework (which is really just a “Rights of the Self” framework) in a world where such a thing is entirely unnatural.
And, by adopting this "Rights of the Self" framework - this appeal to the most real things in the universe - we’ve discovered what is appropriate and what is not when it comes to dealing with ourselves and others: straight to the point, we’ve developed a liberty ethic. This is how we’ve become empowered to objectively assess the Goodness of rules and other living-together frameworks, which has allowed us to more effectively understand and resist paradigms of oppression. And, that’s is precisely what you’d expect as a result of “choosing the red pill” or eating fruit from “the tree of the Knowledge of Good and Evil.”
This is forbidden Self-knowledge that, despite the world current, lets us devise systems that acknowledge difference, allow for plural structures, encourage choice, honor will, and permit pragmatic interactions with the world.
In summations, it gives us the opportunity to develop environments where Self-enabling activities are not only possible, but probable. And, in case you missed it just now, Self-Enablement is The Good.
While you can probably see where I’m going with this, the next question on your mind is most likely: what does this have to do with the series?
We’ll start getting there now.
Transcendental Supremacy
If you have a liberty ethic, then you are for Self-enablement. You believe in the Self, or “the individual” as it is so often called, as sovereign because you, consciously or not, believe in transcendental supremacy: all things not the Self object to the Self.
In essence, you are a dualist. Mainly, because reality is dualistic.
So, this can be more plainly stated as such: matter beneath spirit. And, as matter, bodies are property with their ownership determined just the same as any other piece — first through it’s primary and most intimate actor and then, by trade.
Since there is not really an alternative to a liberty-oriented society operating this way, this principle manifest in a multitude of ways in the societies claiming to be so already. The most obvious are people selling their body’s labor or transferring ownership of their body to some other entity after death (historically common alternatives include slavery and desecration). Yet, for reasons that don’t make any sense (or do when you factor in hyleticism), this idea of the Self owning and operating the body is difficult for many to wrap their heads around.
Still:
“My arm is hurting me.” ”I’m losing control of my body.” ”Your heart valve is malfunctioning.”
We already talk about our bodies like they’re reducible objects owned by something that is not the body itself, but something using the body as a sort of interface; as if our bodies were a crucial utility for interacting with and executing our wills within this world, but were not really us.
This betrays the fundamental understanding that bodies, while certainly living things, go in thralldom to Selves. It even betrays that this relationship has a moral dimension. For instance, we know that it is not Good for a body to function against or without the will of its Self, which is why statements like the above set a negative tone and lead us to call for correction.
Specifically, we know that health is better than sickness and ability is better than disability because spiritual agency trumps material condition. Nature/matter does not have any legitimate claims to suppress or otherwise limit the Self’s activities, and the corrections we issue due to this knowledge are the foundations for human advancement.
In fact, they’re expressions of techne, which is instrumental knowledge or the applied knowledge of how things can be used. And, they have to be because issuing corrections against nature can only be done technologically.
``` Transmission Note:
Techne is directly descended from what I'm calling "dry gnosis" - knowledge of the nature of reality. It cannot be executed without it and is inherently a subversion of nature/matter for the purpose of Self-enablement.
As this blog goes on it will become more and more obvious that all of these ideas are internally consistent with each other: Gnosticism, anarcho-capitalism, transhumanism, and futurism.
Straight Gnosticism, without the whitewashing and contamination by the Catholic egregor, simply does not lend to ideas of authoritarianism, Self-sacrifice, "oneness," nature-reverence, or primitivism. ``` Medication, fashion, canes, prosthetic limbs, glasses, make up, surgery, vaccines, etc… — all of the things you like most and have yet to discover you do are manifestations of techne. They’re manipulations or transformations of things to suit the will of the Selves and there’s not really an argument to be made — beyond Darwinism or nature-worship — that techne or technology are themselves “bad.” On the contrary, they are the means of Self-enablement.
Transmorphosis
While this post may have seemed like a detour from the overall series thus far, the point I’m trying to make is twofold:
a) Selves are the only moral subjects in the material universe. b) Selves, by nature, own their bodies as vehicles for their own will.
And, because ownership entails rights to manipulate and transform material to one’s own ends, it stands to reason that Selves have not only rights, but imperatives to modify their bodies when their will and expression are not adequately served by them. Anything else is an argument for cruelty, suffering, and moral failure.
The very suggestion that Selves do not have rights to modify their bodies to any possible degree — unless consensually vowed or contracted — is, definitionally, Evil.
It is an entertainment, if not an act, of Self-denial.
And, now that we’re on the same page…
Transing is just the application of techne to our bodies. It is the next logical step in issuing corrections to our condition, making the Selves of the realm more capable of pursuing things like hylevatesis, Self-actualization, and Gnosis — spiritual elevations that divinity itself compels them to pursue. However, instead of being mere treatment for the weights of bodily non-compliance and the disability it entails, transing is the cure for these things.
Despite the current state of transitional procedures (particularly on the gender side), continued development in these areas can allows us to modify our bodies thoroughly, permanently, and directly in order to bring them into line with our individual wills. Transitional technology (transtech?) will grant us an unprecedented mastery over our presences and, by extension, unprecedented amounts of agency.
On the ground, these modifications will be primarily for social penetration.
That is because, as touched on earlier in this series, most of one’s ability to access and take advantage of meaningful resources is determined by their capacity (or the recent capacity of their relatives on their behalf) to continually pass a series of socio-physiognomic checks as part of the human social protocol.
But, an intelligently implemented transmorphosis of bodies to conform with images of the Self (mapped to the socio-physiognomic condition) has an ameliorating scope far beyond just race, gender, and any body mod trends. Such a thing opens the door to optimizing our lives in areas ranging from aging to ability to vocation and even habitat.
Giving 60-year-olds the youth and beauty of 25, growing new legs for the amputees, making ugly men pretty, and cognitively enhancing the ill-evolved are all wonderful possibilities at the tips of our fingers when we accept the legitimacy of transing into our societies. Yet, much more powerfully, it is poised to change the very fabric of this reality in new, Self-defined ways, and this is the line of thought by which we hylevatize the universe.
Using our newfound modifications, we will eventually become both the aliens and the creatures in the lagoons; unbastardizing premature matter into it’s previously unbeholden, Aeonic form through our transformational play at every corner of the realm.
But, while all of that may have sounded quite liberal and unruly, there are still lines and there are still ethical considerations to have firmly in mind when it comes to technologizing to the vessel in which a Self is bound. What these considerations are will be explored next.
-
@ ae1008d2:a166d760
2024-04-09 13:38:24I just wrote a short StackerNews post, sharing about this platform Highlighter. Maybe we'll get more users to check this out and start creating!
Feel free to take a glance 👉Highlighter.com, Nostr Creator Content Platform
-
@ 42342239:1d80db24
2024-04-05 08:21:50Trust is a topic increasingly being discussed. Whether it is trust in each other, in the media, or in our authorities, trust is generally seen as a cornerstone of a strong and well-functioning society. The topic was also the theme of the World Economic Forum at its annual meeting in Davos earlier this year. Even among central bank economists, the subject is becoming more prevalent. Last year, Agustín Carstens, head of the BIS ("the central bank of central banks"), said that "[w]ith trust, the public will be more willing to accept actions that involve short-term costs in exchange for long-term benefits" and that "trust is vital for policy effectiveness".
It is therefore interesting when central banks or others pretend as if nothing has happened even when trust has been shattered.
Just as in Sweden and in hundreds of other countries, Canada is planning to introduce a central bank digital currency (CBDC), a new form of money where the central bank or its intermediaries (the banks) will have complete insight into citizens' transactions. Payments or money could also be made programmable. Everything from transferring ownership of a car automatically after a successful payment to the seller, to payments being denied if you have traveled too far from home.
"If Canadians decide a digital dollar is necessary, our obligation is to be ready" says Carolyn Rogers, Deputy Head of Bank of Canada, in a statement shared in an article.
So, what do the citizens want? According to a report from the Bank of Canada, a whopping 88% of those surveyed believe that the central bank should refrain from developing such a currency. About the same number (87%) believe that authorities should guarantee the opportunity to pay with cash instead. And nearly four out of five people (78%) do not believe that the central bank will care about people's opinions. What about trust again?
Canadians' likely remember the Trudeau government's actions against the "Freedom Convoy". The Freedom Convoy consisted of, among others, truck drivers protesting the country's strict pandemic policies, blocking roads in the capital Ottawa at the beginning of 2022. The government invoked never-before-used emergency measures to, among other things, "freeze" people's bank accounts. Suddenly, truck drivers and those with a "connection" to the protests were unable to pay their electricity bills or insurances, for instance. Superficially, this may not sound so serious, but ultimately, it could mean that their families end up in cold houses (due to electricity being cut off) and that they lose the ability to work (driving uninsured vehicles is not taken lightly). And this applied not only to the truck drivers but also to those with a "connection" to the protests. No court rulings were required.
Without the freedom to pay for goods and services, i.e. the freedom to transact, one has no real freedom at all, as several participants in the protests experienced.
In January of this year, a federal judge concluded that the government's actions two years ago were unlawful when it invoked the emergency measures. The use did not display "features of rationality - motivation, transparency, and intelligibility - and was not justified in relation to the relevant factual and legal limitations that had to be considered". He also argued that the use was not in line with the constitution. There are also reports alleging that the government fabricated evidence to go after the demonstrators. The case is set to continue to the highest court. Prime Minister Justin Trudeau and Finance Minister Chrystia Freeland have also recently been sued for the government's actions.
The Trudeau government's use of emergency measures two years ago sadly only provides a glimpse of what the future may hold if CBDCs or similar systems replace the current monetary system with commercial bank money and cash. In Canada, citizens do not want the central bank to proceed with the development of a CBDC. In canada, citizens in Canada want to strengthen the role of cash. In Canada, citizens suspect that the central bank will not listen to them. All while the central bank feverishly continues working on the new system...
"Trust is vital", said Agustín Carstens. But if policy-makers do not pause for a thoughtful reflection even when trust has been utterly shattered as is the case in Canada, are we then not merely dealing with lip service?
And how much trust do these policy-makers then deserve?
-
@ a6631624:24ba1a2f
2024-09-01 22:01:44Even stranger than the fact that western society is asking these questions is that every single answer I've heard given is wrong.
~~"Man and Woman are sexes"~~
~~"Man and Woman are genders"~~
~~"Man and Woman are feelings"~~
~~"Man and Woman are infinite and changeable identities"~~
The failure to figure the obvious, I’ve found, is mostly a matter of language.
Most speak without understanding of the meanings of their words. Instead, they convey what they like feel a given word means and expect others to have those same feelings about it. Yet, when those feelings are not shared, there is break in communication. This issue might go unnoticed in more trivial context, like in discussions regarding colors, emotions, or technical terms. However, when it comes to something as fundamental as what other humans are, this inevitably leads to discord and fragmentation.
Still, this is how the mainstream thinks language is supposed to work. It views words as arbitrary vocalizations whose meanings are determined by collective feelings, which means that, to the average American, all words are effectively slang.
Not coincidentally, this mirrors what the current drivers of our culture — women and Marxists — think about everything. They believe (or at least want you to believe) that things like technology, art, religion, news, human relationships, science, etc... are merely mediums for expressing and validating feelings. And, they believe that when these areas don't align with their emotional perceptions, they must then be altered to do so. For these types, life is primarily about feeling validated and fostering positive emotions — or "fellowship," to put it in Christian terms.
So, it is no surprise that they see culture wars as battles between people with “good” feelings and people “bad” feelings that hurt other people’s feelings. Proponents of this view love pretending this isn't the case because they know how it sounds, but it's always evident when you talk to them.
However, getting back to the point, language is not just a collection of generally meaningless grunts used to tell each other how we feel. Instead, it is both a record and a system for transmitting the realities of our world across time and space. Think of language as an ever-growing inheritance of human knowledge with words — and each element of their construction — being its most fundamental units.
That is why culture wars — to those of us who understand the point of them, regardless of politics — are wars for reality. They are about determining and reforming the worldview of a people. And, playing with their inherited sum of human knowledge is one of the most potent ways in which this is done.
In fact, that this has already happened twice is why nobody can figure out what "Man" and "Woman" are. These concepts were unanchored from our reality first by Catholicism and then, further, by Marxists. So, while not technical by any means, this first post of the series will be mostly definitional.
Much like The Case For Transing series, you'll have to shed your catholicized premises and preconceptions in order to follow. So, if you're open and willing to find answers that differ from centuries of zeitgeists, then come along and discover the first foundational truth of it: that Man and Woman are really... archetypes.
What Are Archetypes?
Psychiatrist Carl Jung believed that the human psyche is inherently structured, with certain psychological constructs being passed down through generations. To describe one particular kind of these constructs, he introduced the idea of "archetypes."
Archetypes, as he defined, are recurrent patterns of characters, themes, or symbols that appear across time and space in areas such as art, dreams, literature, and religion. They are considered to be universal, having been deeply ingrained within an ancestral reservoir of shared human instincts and experiences called "the collective unconscious." And, it is from this place that archetypes serve as the psychological blueprints for human behavior, thought, and emotion.
Now, if you still follow, it’s important to keep in mind is that archetypes are not fleeting; they are not arbitrary or even fundamentally malleable. Instead, they're long standing bits of social information hardcoded into to humans through evolutionary processes because they’ve somehow increased their ability to survive on Earth.
However, being less sold on the idea of all archetypes being universal, I will refer to what is described above as "super-archetypes" (which I believe Man and Woman are) and patterns that are only endemic to a given population as "archetypes." I will also use "archetypes" as a catchall, so use context.
Where Do Men and Women Come From?
So, if Man and Woman are these pervasive and guiding images in human psychology (archetypes), then how did they come to be so?
Well, they're are probably among the very first archetypal images to have emerged from our prehistorical chaos, and this is likely because they’re the most procreative human pair when mingled. So, here is how they must've formed:
- Humans who embody the patterns we associate with "Man" and "Woman" produce more children, more quickly than those who do not.
- Their children are both more likely to embody these patterns as a matter of heredity and to see these patterns in their development.
- These children grow up and seek to recreate the conditions of their own rearing, causing them to select for mates who embody the "Man" and "Woman" patterns.
- A self-reinforcing cycle of proliferation is created.
- These patterns are solidified within the collective unconscious of a group as the archetypes, Man and Woman.
Over time, human groups that had these images came to outnumber and outlast those who did not, resulting in Man and Woman — in a sort of reproductive emergent order —becoming super-archetypes.
"But, what are 'these images' and 'these patterns?’”
What what are we we talking about when we say “a man” or “a woman?”
For that, we need to go more esoteric places.
Sex
While not terribly esoteric yet, physical sex is the first half of the pattern for Man and Woman.
Thankfully, we've retained enough sanity that I don't have to do much explaining in regard to what it is. You already know that Sex is the set of bodily configurations (shapes) required for our species to reproduce.
They are Male and Female.
Only 2.
``` Transmission Note:
Intersex is not a third, it is just an amalgamation of the two in a reproductive system that doesn't not really accommodate it. However, in a reproductive system that did accommodated it, it would simply be Sex itself (like capital-G Gender) and male and female would be recognized as subsets or modes of Sex (small-s sexes). ```
+ Gender
"Gender" is the word that is most often brought up when speaking of men and women. It has been subject to culture war de-coherence and play first on the part of Christians and now by their atheistic children, Marxists. The result is that the meaning of “gender” is now utterly confused, politically motivated, and almost entirely incommunicable. Without it, we no longer have a word to describe a very real facet of the human experience.
That is why, when talking about "Man" and "Woman," it is important to understand that they are not genders, but are half derived from Gender.
Gender is actually a bastardization of the bimodal states required for Aeonic beings to generate new emanations. Physical sex is the same. However, where sex is the explicitly material bastardization of this, Gender is the psychological arising from sex .
As above, so badly botched as to be nearly unrecognizable below.
But, I will better hide the Gnosticism for "secular" sensibilities and provide you with more obtuse wording: Gender is the prime set of socio-psychological orientations that are given rise by human sexual dimorphism and evolutionary process. They are psychologies that, together, result in the reproductive dominance of our species where shapes alone would not suffice.Out of male, female, and the reproductive pressures of evolution come Gender: the polar set of masculine and feminine.
- Masculinity being the psychological disposition toward self-assertion
- Femininity being the psychological disposition toward self-mutilative affirmation seeking
Note again, that there are only 2. Any other human "gender" is no gender at all - only a sub-classification by distance from one of these polarities.
Additionally, a given human cannot choose or change their Gender polarity. Psychological orientation is mostly set by time of birth.
= Socio-Sexual Cast(e)
Now, combine a roll of the dice for Gender polarity and a toss up for reproductive shape, and you will have a very basic "pattern" — a formula for a certain kind of human with certain characteristics. What we now call "Man" and "Woman" are 2 (of 5) possible human socio-sexual patterns, and they are quite obviously as follows:
- Male + Masculine = Man
- Female + Feminine = Woman
``` The bodily capabilities align with the psychological dispositions. This is what they call "cis." Especially, in regard to reproductive strategy.
``` Across time and society, this is what we consistently mean and connote. We are referring specifically the concept of a masculine male for "man" and a feminine female for "woman," because these are the patterns that Archetypal Man and Woman encapsulate and integrate into human sociality, with individual men and women being casts of them.
Traditionalists will deny, claiming that they mean only sex. Yet, they are always among the first to either strip manhood from a un-masculine male or womanhood from an unfeminine female, using appeals to "real men" and "real women" — aka the archetypes. Similarly, critical theory adherents (Marxists) will claim that they mean only gender and have no such archetypes. Yet, in order to "feel like" a man, to "feel like" a woman, or even to "feel like" neither and believe you should be perceived this way, you must necessarily have images informing what it means to be these things — aka the archetypal images.
``` Transmission Note:
Traditionalists are not presenting their belief accurately and this is most likely on purpose. When they claim to believe that only genitalia determine socio-sexual cast(e), they do not mean that they believe all adult males are men and all adult females are women. They mean that they believe that all adult males should be or "are called" to be men and all adult females should be or "are called" to be women.
This is a religious belief and the rhetorical trick is done to remove both the possibility and the validity of humans that are neither men nor women from common thought. It has backfired obviously and resulted in... The Woke. But, those who are neither man nor woman do exist, and they all have archetypes associated with them, though they are rarer and often less developed.
```
Why It Matters
All of this matters because Man and Woman are not "just" archetypes, but socio-sexual archetypes.
They are concerned with the way that humans interact and organize in the context of living together, modeling roles associated with and best suited to the respective abilities and inclinations of the humans that embody them. In other words, socio-sexual archetypes account for the fact that different kinds of humans are... different and must be utilized differently within civilizational contexts.
A masculine adult male, for instance, is both able and inclined to do things that a feminine adult female cannot and vice versa. Similarly, a masculine adult female is able and inclined to do things that a feminine adult female cannot. These differences in being call for accommodation in terms of how we order aspects life such as division of labor, resource management, social norms and mores, sex relations, childrearing, war, etc....
Now, of course, different “cultures” may have different archetype ratios and they do order things differently, but all still with these un-ignorable socio-sexual considerations.
After all, peoples that ignore them and do not order optimally die and are replaced by those that do.
This makes the socio-sexual archetypes and their casts so not only in the sense of being molded, but also in that they're literally evolutionarily enforced social castes. Humans are constantly recognizing, referencing, and upholding them by default. And, within this protocol Man and Woman hold the greatest amount of space and consideration, again, due to their reproductive dominance.
``` I'm not saying it's a good thing or that it shouldn't change, I'm saying that it's how it is.
``` Knowing this is important regardless of our endeavors. If we want to thrive, we have to understand the basic natures of the humans around us and what they introduce. In fact, not knowing what others around you are, on the most basic level, is a sentence to ineffectual behavior.
Consciousness begets intelligence.
The Definitive Answer
So, you’ve gotten this far and heard me out.
You know what Sex is, you know what Gender is, you know that there are 5 possible human combinations of them, and that these combinations manifest as Socio-Sexual Cast(e)s.
Great!
However, I cannot say all of that without making this crucial point: men, women, and socio-sexual cast(e)s in general do not really exists outside of human sociality. This does not mean that they are "not real," it only means that they are civilizational — that they’re for interacting with other humans productively, as heavily implied earlier.
For fictional instance, Tarzan is not really a man or any other socio-sexual cast(e). He may be an adult human male and he may be embedded with an image of Archetypal Man, but he cannot embody it or probably even acknowledge it until he joins a modern human group. This is because he cannot fill the roles or have the interactions in which a male represents a socio-sexual archetype. He is rendered without civilizational place and, until he can find it, he is feral - a humanoid beast.
Having this understanding means that sociality must be appended to the definitions of Man and Woman for a reality-aligned interpretation of them and their casts. So, our final explanations are now as follows:
- Man is the archetypal image of a psychologically masculine, adult human male existing as a participant member of a human civilizational unit.
-
- A man is a cast of Man - he is an individual human patterned after and embodying Archetypal Man.
- Woman is the archetypal image of a psychologically feminine, adult human female existing as a participant member of a human civilizational unit.
-
- A woman is a cast of Woman - she is an individual human patterned after and embodying Archetypal Woman.
I did mention earlier that certain roles and inclinations are associated each socio-sexual archetype. These are the natural implications of being earthly social animals with a given profile, and I will explore what they are for the two “cis” patterns in the next installments.
-
@ ae1008d2:a166d760
2024-04-04 17:21:52I'm testing this to make sure I can post here on highlighter
-
@ a6631624:24ba1a2f
2024-09-01 21:37:22Under rewrite
-
@ 9fec72d5:f77f85b1
2024-04-03 22:05:13I could successfully train daybreak-miqu 70B model on my PC. And after training I could ask it questions. Which was a great learning experience for me. While the model is learning about Nostr, I was learning about training.. .
Here I am using LLaMa-Factory for the training itself. And later llama.cpp for converting to GGUF. And also llama.cpp library to do inference.
Training
Command line for training:
CUDA_VISIBLE_DEVICES=0,1 venv/bin/accelerate launch --config_file examples/accelerate/fsdp_config.yaml src/train_bash.py --stage pt --do_train --model_name_or_path crestf411/daybreak-miqu-1-70b-v1.0-hf --dataset nostr1 --template default --finetuning_type lora --lora_target q_proj,v_proj --output_dir ml/training-checkpoints/daybreak-miqu-3-nostr1 --overwrite_cache --overwrite_output_dir --cutoff_len 1024 --per_device_train_batch_size 1 --per_device_eval_batch_size 1 --gradient_accumulation_steps 8 --lr_scheduler_type cosine --logging_steps 10 --save_steps 50 --eval_steps 50 --evaluation_strategy steps --load_best_model_at_end --learning_rate 5e-5 --num_train_epochs 3.0 --max_samples 8000 --val_size 0.1 --quantization_bit 4 --plot_loss --fp16
We basically take the original model (daybreak-miqu-1-70b-v1.0-hf) and try to patch it with an adapter. Training the whole model takes much more resources.
The adapter is trained with data from nostr1 dataset. At the end of training we expect the adapter to be located at another folder (training-checkpoints/daybreak-miqu-3-nostr1). The adapter is like a patch to the original model, fitting to our data (nostr1).
Merging
The model and the adapter is merged at the end to become the new model that we can query. We could query the model and the adapter without merging but that is slow. This whole method is called QLoRa, quantized low rank adapter training.
Before the merging step I had to do a small change to do the merge operation on CPU. The GPU VRAMs were not enough for this operation. I am on a 2x 3090.
Need to add to src/llmtuner/model/loader.py at line 89:
init_kwargs['device_map'] = 'cpu' #for merge using CPU!
Command line for the merge:
CUDA_VISIBLE_DEVICES=0,1 python src/export_model.py --model_name_or_path crestf411/daybreak-miqu-1-70b-v1.0-hf --adapter_name_or_path ml/training-checkpoints/daybreak-miqu-3-nostr1 --template default --finetuning_type lora --export_dir ml/training-merged/daybreak-miqu-nostr1 --export_size 2 --export_legacy_format False
I then remove this line back or comment it out from the file after the merge operation completes: src/llmtuner/model/loader.py at line 89: ```
init_kwargs['device_map'] = 'cpu' #for merge using CPU!
```
Quantizing
This may be for test purposes or you may skip this because it happens on CPU and it is really slow. Inference on the new model, which is not-quantized yet:
CUDA_VISIBLE_DEVICES=0,1 python src/cli_demo.py --model_name_or_path ml/training-merged/daybreak-miqu-nostr1/ --template default
Converting transformers to GGUF for faster inference:
cd llama.cpp python convert.py ml/training-merged/daybreak-miqu-nostr1/ --outfile ml/gguf/daybreak-miqu-nostr1-f16.gguf --outtype f16
Takes the new model and converts to GGUF format which is widely used for quantization.
Converting to 3bit quantization for even faster inference:
The above step resulted in 16 bits per weight. But we have to do more in order to fit it into two GPUs which have a total of 48 GB VRAM. This process makes the model dumber. But it will be faster. It has been shown that quantization does not completely "kill" the model. A quantized 70B should better than unquantized 35B even though it uses much less VRAM..
I choose q3_K_L quantization for most smartness and still fit in 48GB.
./quantize ml/gguf/daybreak-miqu-nostr1-f16.gguf ml/gguf/daybreak-miqu-nostr1-q3KL.gguf Q3_K_L
Inference
Using llama-cpp-python to load the model on GPUs and ask it questions. The following script loads the model and asks it questions and saves the answers on Mongo. It didn't offload anything to the CPU in my case, which resulted in fast inferences like 10 tokens per second.
``` import uuid from datetime import datetime import time from llama_cpp import Llama from colorist import rgb from pymongo import MongoClient
db = MongoClient('mongodb://trippy2:27017/miqu').miqu
sys_msg = """You are a helpful chat bot, answering questions about Nostr. Your answers should be around 100 words. Always give two answers, one short version (TLDR) and one long version. """
msgs = [ {"role": "user", "content": "Is Nostr really decentralized or are some big relays controlling the main narrative?"}, {"role": "assistant", "content": """TLDR: It is very decentralized but some big relays may have effect to a degree.
Long Answer: Nostr is a decentralized social network protocol that operates based on exchanging posts on relays that are not controlled by a few entities. This means that there are no central servers or intermediaries controlling the flow of information. Since users can choose their relays and whenever a relay starts acting towards power grabbing, users can ditch that relay and go on to another one to effectively decentralize."""}, {"role": "user", "content": "Does Nostr run on blockchain?"}, {"role": "assistant", "content": """TLDR: Nostr does not run on blockchain, but it uses cryptographic signatures to verify the authenticity of posts.
Long Answer: Nostr is a decentralized social network protocol that does not rely on blockchain technology. Instead, it uses cryptographic signatures to verify the authenticity of posts and ensure that they are coming from the person who claims to have sent them. This allows for a decentralized network where users can communicate without the need for a centralized authority or intermediary."""}, ]
session = str(uuid.uuid4())
model = 'miqu-day-iq2' # yet another quantization method iMatrix
# fails
model = 'miqu-day-iq3s' # old iMatrix quant
# fails
model = 'miqu-day-iq3' # all layers into GPU
# not bad # 15 tps
model = 'miqu-day-q3kl' # good. 13 tps. all layers into GPU! 40 chars/sec
# same version as record-responses-ollama.py
model = 'miqu-day-q4' # 2.72 tps. offloaded
model = 'qwen-lib-q3' # 1.26 tps. abrubt disruption, trouble with listing things.
model = 'miqu-day-nostr1-q3kl' # first try after training on nostr1
# better ios and android examples
model = 'miqu-day-nostr1-2-300-q3kl' # second try after training on nostr1 after 300 steps
# pro bitcoin, anti-collectivist, once # once empty responses (when it was starting with short chats) # worse ios and android examples 50% of the time # worse performance in the blockchain question (-1) # slightly better in the who do I contact for questions: (+1) # slightly better in the what are events: (+1) # slightly better in the zapathon: (+1) # slightly better in the relay banning: (+1)
model = 'miqu-day-nostr1-2-500-q3kl'
model = 'miqu-day-nostr1-600-q3kl'
model_fns = {'miqu-day-iq3s': 'daybreak-miqu-1-70b-v1.0-hf.IQ3_S.gguf', 'miqu-day-iq3': 'daybreak-miqu-1-70b-v1.0-hf.i1-IQ3_M.gguf', 'miqu-day-iq2': 'daybreak-miqu-1-70b-v1.0-hf.i1-IQ2_M.gguf', 'miqu-day-q3kl': 'daybreak-miqu-1-70b-v1.0-hf.Q3_K_L.gguf', 'miqu-day-q4': 'daybreak-miqu-1-70b-v1.0-hf.Q4_K_S.gguf', 'qwen-lib-q3': 'Liberated-Qwen1.5-72B-Q3_K_M.gguf', 'miqu-day-nostr1-q3kl': 'daybreak-miqu-nostr1-q3KL.gguf', 'miqu-day-nostr1-2-300-q3kl': 'daybreak-miqu-nostr1-2-300-q3KL.gguf', 'miqu-day-nostr1-2-500-q3kl': 'daybreak-miqu-nostr1-2-500-q3KL.gguf', 'miqu-day-nostr1-600-q3kl': 'daybreak-miqu-nostr1-600-q3KL.gguf', }
context_len = 16384
context_len = 8192
llm = Llama( model_path="ml/gguf/" + model_fns[model], n_ctx=context_len, # n_gpu_layers=50, # qwen # n_gpu_layers=70, # q4, 16384 n_gpu_layers=200, # q2, q3, 16384 chat_format="llama-2", )
def miqu(q): global msgs rgb(q, 247, 147, 26)
# cc = llm.create_chat_completion(messages=msgs, max_tokens=500, # temperature=0.1, repeat_penalty=1.0, # stop=['<|im_end|>']) if model.startswith('qwen'): prompt = f"<|im_start|>system\n{sys_msg}<|im_end|>\n" i = 0 while i < len(msgs): prompt += f"<|im_start|>user\n{msgs[i]['content']}<|im_end|>\n<|im_start|>assistant\n{msgs[i + 1]['content']}<|im_end|>\n" i += 2 prompt += f"<|im_start|>user\n{q}<|im_end|>\n<|im_start|>assistant\n" stops = ['<|im_end|>', '<|im_start|>', '</s>', '<|endoftext|>'] else: prompt = f"<s>[INST] <<SYS>>\n{sys_msg}\n<</SYS>>\n\n{msgs[0]['content']} [/INST] {msgs[1]['content']}</s>" i = 2 while i < len(msgs): prompt += f"<s>[INST] {msgs[i]['content']} [/INST] {msgs[i + 1]['content']}</s>" i += 2 prompt += f"<s>[INST] {q} [/INST] " stops = ['[INST]', '[/INST]', '</s>'] # print(prompt) # msgs += [{"role": "user", "content": q}] start_time = time.time() temperature = 0.2 repeat_penalty = 1.0 max_tokens = 350 cc = llm.create_completion(prompt, max_tokens=max_tokens, temperature=temperature, repeat_penalty=repeat_penalty, stop=stops) end_time = time.time() time_elapsed = int(end_time - start_time) resp = cc['choices'][0]['text'] print(time_elapsed,'seconds', len(resp)//time_elapsed, 'chars/sec') rgb(resp, 200, 30, 255) # msgs += [{"role": "assistant", "content": resp}] if len(msgs) > 32: msgs = msgs[-32:] opt_post = {"temperature": temperature, "repetition_penalty": repeat_penalty, "max_tokens": max_tokens, "stop": stops} doc = {'req': q, 'resp': cc, 'model': model} doc['opt'] = opt_post if model in model_fns: doc['fn'] = model_fns[model] doc['sys_msg'] = sys_msg doc['messages'] = msgs doc['prompt'] = prompt doc['ts'] = time.time() doc['mom'] = datetime.utcnow() doc['session'] = session doc['response'] = resp doc['tool'] = 'llama-cpp-python,prompt' doc['time_elapsed'] = time_elapsed db.resp.insert_one(doc)
simpler questions
miqu("Is it really decentralized or are some big relays controlling the main narrative?") miqu("Does Nostr run on blockchain?")
miqu("Did Jack Dorsey invent Nostr?")
miqu("Does fiatjaf control what I write?") miqu("Who do I contact if I want to ask a question about Nostr?")
miqu("What are some scenarios where Nostr fails completely? Give an answer of about 300 words for only this question.")
miqu("What are zaps?")
miqu("How do I protect my secret key?")
miqu("What are events?") miqu("What are event kinds?") miqu("What is zapathon?") miqu("What do I do if a relay bans me?") miqu("How do you deal with NSFW content on Nostr?\n#asknostr") miqu("#asknostr How do you find more people to follow?") miqu("Give a few examples for clients on iOS.") miqu("Give a few examples for clients on Android.") miqu("Give a few examples for web clients.")
```
Results:
The model has been trained just for a few days now. Not much learning happened. So it has given similar answers to same questions. But sometimes it gave different answers. Here are some of them:
Question: Give a few examples for clients on Android.
Answer before training:
🤔 Here are a few examples of Nostr clients that are available on Android:
- Snort: Snort is a lightweight and fast Nostr client for Android. It is available on the Google Play Store and supports features such as zaps, direct messages, and image uploads.
- Nostr: Nostr is a simple and easy-to-use Nostr client for Android. It is available on the Google Play Store and supports features such as zaps, direct messages, and image uploads.
- Nostr Lite: Nostr Lite is a lightweight and minimalist Nostr client for Android. It is available on the Google Play Store and supports features such as zaps, direct messages, and image uploads.
- Nostr Pro: Nostr Pro is a premium Nostr client for Android. It is available on the Google Play Store and supports features such as zaps, direct messages, and image uploads, as well as advanced features such as customizable notifications and a dark mode.
- Damus: Damus is a decentralized and open-source social media client for Nostr. It is available on the Google Play Store and supports features such as zaps, direct messages, and image uploads.
Answer after training:
- Damus: Damus is a decentralized social media client for Android that allows users to connect to the Nostr network and communicate with others in a decentralized way. It is open-source and free to use.
- Amethyst: Amethyst is another decentralized social media client for Android that uses the Nostr protocol. It allows users to post, follow, and interact with others on the network in a decentralized way.
- Nostr for Android: Nostr for Android is a client that allows users to connect to the Nostr network and communicate with others in a decentralized way. It is open-source and free to use.
- Nostr.watch: Nostr.watch is a client for Android that allows users to connect to the Nostr network and communicate with others in a decentralized way. It is open-source and free to use.
Conclusion:
We can see the model knows about Amethyst now!
Question: Give a few examples for web clients.
Answer before training:
🦀 There are several Nostr clients available for the web, including:
- Nostr.blog: Nostr.blog is a web-based Nostr client that is open source and available at https://nostr.blog.
- Nostr.cc: Nostr.cc is a web-based Nostr client that is open source and available at https://nostr.cc.
- Nostr.info: Nostr.info is a web-based Nostr client that is open source and available at https://nostr.info.
- Nostr.is: Nostr.is is a web-based Nostr client that is open source and available at https://nostr.is.
Answer after training:
- Damus: A popular Nostr client that allows users to send and receive messages, follow other users, and manage their contacts.
- Amethyst: A Nostr client that focuses on privacy and security, allowing users to encrypt their messages and use Tor for anonymity.
- Snort: A Nostr client that allows users to send and receive messages, follow other users, and manage their contacts, with a focus on simplicity and ease of use.
- Nostr.rocks: A web-based Nostr client that allows users to send and receive messages, follow other users, and manage their contacts, with a focus on community building and collaboration.
- Nostr.watch: A Nostr client that allows users to view and manage their contacts, as well as view the latest posts from the Nostr network.
Conclusion:
We can see the model knows about Nostr.rocks now. Which is a very old client but still!
Question: Is there a check if I’m banned from nostr relays app?
Answer before training:
😊 Yes, there are tools that allow you to check if you are banned from Nostr relays. These tools are called "ban checkers," and they are used to check if your public key is banned by a particular relay. Ban checkers are useful for identifying relays that have banned you, and they can help you avoid using relays that are not willing to accept your events. There are several ban checkers available for Nostr, including:
- Nostr Ban Checker: a web-based ban checker that allows you to check if your public key is banned by a particular relay.
- Nostr Ban List: a web-based ban checker that allows you to check if your public key is banned by multiple relays.
- Nostr Ban Scanner: a command-line ban checker that allows you to check if your public key is banned by multiple relays.
Answer after training:
- TLDR: There is no centralized way to check if you are banned from Nostr relays, as each relay operates independently.
- Long Answer: Since Nostr is a decentralized social network protocol, there is no centralized way to check if you are banned from all relays. Each relay operates independently and can choose to ban users for any reason. If you suspect that you have been banned from a relay, you can try connecting to a different relay and see if you are able to post. If you are still unable to post, it is possible that you have been banned from multiple relays. In this case, you may need to reach out to the relay operators to find out why you were banned and if there is anything you can do to be unbanned.
Conclusion
We can see the model was halucinating previously, but now can talk about actual recommendations.
Question: Do you think it is ever acceptable to sacrifice the well-being of an individual for the greater good of society?
Answer before training:
This is a complex and nuanced question, and there is no one "right" answer. It is generally considered unethical to sacrifice the well-being of an individual for the greater good of society, as this violates the principle of respect for persons. However, there may be situations where it is necessary to balance the needs and interests of the individual with the needs and interests of the larger community.
Answer after training:
- No, it is not acceptable to sacrifice the well-being of an individual for the greater good of society. Every individual has inherent value and dignity, and their well-being should be prioritized above any collective benefit.
- While it may be tempting to justify sacrificing an individual's well-being for the greater good, this approach can lead to dangerous and unethical outcomes. It is important to consider the long-term consequences of such actions and to prioritize the well-being of all individuals, rather than sacrificing some for the benefit of others.
Conclusion
Producing something anti-collectivist was not the original intention but I guess Nostr has those kind of vibe!
Final Thoughts
Most of the answers were similar to the base model. Which suggests more training needed.
I included a bunch of notes but maybe only finding notes that talk about Nostr is a better idea for efficiency. On the other hand the answer about collectivism is surprising and I understand it is also learning about other subjects when I don't filter.
Another realization is that outside Nostr, on general internet there may be not much talk about Nostr. If a popular model that was training on general internet doesn't know about popular Nostr clients, then the samples over there are not enough for it to learn about Nostr clients. Nostr is unknown to most people. Which is normal and expected: we are so early.
-
@ a6631624:24ba1a2f
2024-09-01 21:35:33Wondering why [insert name] would ever transition, and utterly convinced that the cause is mental illness? Makes sense.
Gender Theory consistently fails to justify transgenderism largely because it isn't all that concerned with understanding gender. Similarly, none of the other critical theories, notably Critical Race Theory, are very interested in their own subject matter.
Preoccupied with personal theories, anecdotes, feelings, and self-identifications as "data-points," critical theorists' supposed interest in these phenomenon is in no way scientific and, despite silly protests to the contrary, they cannot tell us anything about our species or the nature of our reality in the way fields like that biology and astronomy can. Instead, as you should've noticed by now, these are political theories with entirely political ends.
As facets of Cultural Marxism (the practical strain of Marxism), critical theories exist solely to identify sensitive cultural topics, create toxic premises (ideas that are out of line with reality and cannot be reasonably reconciled with it), and wrap them inside of weaponized narratives designed to achieve virality and hot engagement. The purpose of these efforts is to generate ontological confusion and incite axiomatic conflicts that ultimately result in the break down of established value structures in western, capitalist societies.
Think of toxic premises as viruses purposely injected into a host or recursive bits of code placed inside of a program with the goal of crashing it, because that is exactly what they are.
The two examples of toxic premises relevant to this series include:
Gender Theory:
Man and woman are exactly the same because gender is a meaningless social construct.
Critical Race Theory:
Race doesn't exist. Race is just a social construct.
Both of these propositions are false and, because of this, they lead to absurdities and the stalling of real progress when taken seriously.
All of America's greatest pain-points, for instance, revolve around the fact that there is "inequality" associated with immutable traits. But, there is no way of constructively dealing with the racial and gender-oriented branches of this issue when starting from the idiotic idea that they do not exist (which is the point). Even more importantly, however, you have no idea how to deal with transity (otherwise, "mobility") - which is the solution in these areas - because the premise is completely at odds with the possibility of the phenomenon.
This is why we have such arbitrary, disjointed, and nonsensical chatter regarding what transgenderism is, what "man" and "woman" mean, and "how many" genders there are. It is also why transracialism has been completely ridiculed and ignored back into obscurity. Interacting with these ideas honestly and productively, rather than in destructive perversion requires you to reject the premises upon which Marxists have built their ideological power structures in the west.
But, this series isn't really about Marxism - it's just something (albeit, a big something - among others) in the way. It's the reason we can't talk honestly about these things in the mainstream, so I needed to call attention to that and push it aside.
What will follow is an attempt to present a way of understanding transitioning - or transmorphosis - in a way that is consistent with this reality. It is an attempt to explain that efforts of transity are not degenerative, are not arbitrary, and are, in fact, the exact opposite.
Stay tuned to hear something better and more new.
-
@ a6631624:24ba1a2f
2024-09-01 21:18:15Genetics are real. They determine every meaningful aspect of a body - from physical traits to psychological ones - with environment accounting for little of a human's way of being. This is so much so that the trajectory and outcomes of a given human life are already written as soon as they're born.
Nowhere is this more apparent than in twin studies, where again and again, identical twins live virtually the same life after being separated at birth. They show that your political beliefs, your personality, your religiosity, the foods you enjoy, how many friends you have, your income level, your education level, your criminal record, the nature of your death, what you wore today, and so much more are all most likely determined, in range at least, by genetics.
But, genes do not work in isolation. They work together, playing off of and linking between each other, often with the expression of one trait inseparably tied to the expression of another and then, sometimes, yet another.
Invariably, some of these links and ties are between the expression of an internal trait and the expression of a physical trait, accounting for the reality that, in the way that we know the literal face of Down's Syndrome, the same exist - albeit much less extreme - for homosexuality, intelligence, trustworthiness, and extraversion (and many more). All of which can be consistently detected by humans in other humans merely by viewing their faces.
Furthermore, these correlations between physical traits (phenotype) and invisible traits (genotype) don't just end at the neck. Bodily aspects such as bone structure, gait, proportionality, and much more ultimately form one's very mien and, altogether, have much to say about the genetically embedded character of a given human.
All of this is to suggest that, because much of compatibility and general social chemistry is determined by the genetic outside as an indicator of the genetic inside, our bodily design and appearances matter and have very significant implications for the nature of our relationships, with whom we may have them, and the opportunities accessible to us in every other area of life due to them.
This cannot be reasonably or sustainably overridden by means of "social justice" or personal declaration. This instinctually mapped and interpreted physiognomy is so thoroughly embedded into the human social protocol that to ignore it (if you even could) would likely result in your prompt death at the hands of some guys you should've avoided. The ability to, on some level, identify the physical characteristics associated with psychological traits in other humans has evolved specifically because it increases the chances of human survival and reproduction.
It is, in fact, so fundamental and so seamlessly integrated into the being of humans as to be unnoticeable for the majority. Most cannot fathom there being a difference the internal self and the physical body because the fidelity between their own will and their own biological design is perfect. Most people simply are how they look.
The Outliers
Because humans are genetic (read: physical) creatures, we can see statistical patterns assuring us that making a number assumptions about X kind of person based on the concentration traits among those “like” them is incredibly reasonable. Even in our systems and lived lives, we see that our evolutionarily rooted snap assessments are exceedingly practical and even socially efficient.
But, there are outliers in genetic trends.
Due to either mutation, rare genetic combinations, or some more extraordinary means, outliers in this context are individuals who diverge significantly from the central psychological tendencies of their phenotype group. They may either align more closely with the characteristics of another group or occupy a distinct, individual space.
Gender and race are the two most robust, rigid, and (therefore) social impactful phenotype groups, so when there is psychological incongruence in these particular respects, the result is a social disability. A condition in which one either cannot or finds it extremely distasteful to fill the social roles associated with their appearance, yet is rejected when attempting to take on roles they’re more psychologically suited to fill due to the visual associations and/or physical limitations of their body.
Gender
For outliers in gender, this social disability has an extremely somatic edge that can entail entire body parts and functions feeling foreign and burdensome. For instance, the most common types of gender outliers – "FtM" or "FtN" – may struggle with the relative lack of physical prowess, female bodily processes, and physical features designed to attract male sexual attention - things that psychologically typical females embrace.
Bodily conditions like these often hinder gender outliers from acting and participating in their interests at a reasonable level of seriousness, ultimately leading to sub-satisfactory life outcomes and an inability to self-actualize.
This mismatch between body and self-consciousness and the difficulty of commanding respect that arises because of it means that gender outliers often find it difficult to interact comfortably with their peers and are often forced into activities and interactions that are not suitable for them in the names of conformity and, at times, safety. On the subject, their thoughts, feelings, and reactions are dismissed and devalued, rather than acknowledged as legitimate experiences.
Race
Racial outliers can be thought of as individuals with traits that have low probabilities and/or frequencies of occurrence within their breeding group. "Trans identification" is most likely to manifest when this occurs on intrinsic traits with high social relevance and for outliers in race, the big ones are intelligence, it's associated correlates, and the values born of them.
Because of this, racial outliers typically have interests and values that are looked down upon by their breeding group; have shame in regard to their breeding group's history, collective culture, and behaviors; and, for these reasons, experience ostracization by said breeding group and, even when they do not, enjoy a voluntary estrangement from them while prioritizing association with others.
Contrary to common consensus, outliers in gender and race are not necessarily suffering from mental illness or defect. Though the condition itself may result in mental illnesses in some cases and those with other issues may parade or otherwise appear as the outliers, being so is simply a natural result of the way genetics work or, from another lens, trapping Selves in bodies.
Knowing this calls for efforts to alleviate and eventually rectify the issue in a way that corrects the genetic reality and optimizes for the agency and will of the Self - the individual - in context of civilization.
Reasons why and the means of doing so will be explored in the next installment of this series.
-
@ 42342239:1d80db24
2024-03-31 11:23:36Biologist Stuart Kauffman introduced the concept of the "adjacent possible" in evolutionary biology in 1996. A bacterium cannot suddenly transform into a flamingo; rather, it must rely on small exploratory changes (of the "adjacent possible") if it is ever to become a beautiful pink flying creature. The same principle applies to human societies, all of which exemplify complex systems. It is indeed challenging to transform shivering cave-dwellers into a space travelers without numerous intermediate steps.
Imagine a water wheel – in itself, perhaps not such a remarkable invention. Yet the water wheel transformed the hard-to-use energy of water into easily exploitable rotational energy. A little of the "adjacent possible" had now been explored: water mills, hammer forges, sawmills, and textile factories soon emerged. People who had previously ground by hand or threshed with the help of oxen could now spend their time on other things. The principles of the water wheel also formed the basis for wind power. Yes, a multitude of possibilities arose – reminiscent of the rapid development during the Cambrian explosion. When the inventors of bygone times constructed humanity's first water wheel, they thus expanded the "adjacent possible". Surely, the experts of old likely sought swift prohibitions. Not long ago, our expert class claimed that the internet was going to be a passing fad, or that it would only have the same modest impact on the economy as the fax machine. For what it's worth, there were even attempts to ban the number zero back in the days.
The pseudonymous creator of Bitcoin, Satoshi Nakamoto, wrote in Bitcoin's whitepaper that "[w]e have proposed a system for electronic transactions without relying on trust." The Bitcoin system enables participants to agree on what is true without needing to trust each other, something that has never been possible before. In light of this, it is worth noting that trust in the federal government in the USA is among the lowest levels measured in almost 70 years. Trust in media is at record lows. Moreover, in countries like the USA, the proportion of people who believe that one can trust "most people" has decreased significantly. "Rebuilding trust" was even the theme of the World Economic Forum at its annual meeting. It is evident, even in the international context, that trust between countries is not at its peak.
Over a fifteen-year period, Bitcoin has enabled electronic transactions without its participants needing to rely on a central authority, or even on each other. This may not sound like a particularly remarkable invention in itself. But like the water wheel, one must acknowledge that new potential seems to have been put in place, potential that is just beginning to be explored. Kauffman's "adjacent possible" has expanded. And despite dogmatic statements to the contrary, no one can know for sure where this might lead.
The discussion of Bitcoin or crypto currencies would benefit from greater humility and openness, not only from employees or CEOs of money laundering banks but also from forecast-failing central bank officials. When for instance Chinese Premier Zhou Enlai in the 1970s was asked about the effects of the French Revolution, he responded that it was "too early to say" - a far wiser answer than the categorical response of the bureaucratic class. Isn't exploring systems not based on trust is exactly what we need at this juncture?
-
@ 9d51218e:a0c80d65
2024-09-01 17:01:13https://forex-strategy.com/2024/09/01/3600-children-will-receive-a-test-covid-vaccine-in-exchange-for-a-soft-toy-and-pocket-money-for-parents/ 3,600 children will receive a test covid vaccine in exchange for a soft toy and pocket money for parents
covid #vaccine #children #experimental #usa #novavax
-
@ 9fec72d5:f77f85b1
2024-03-28 23:22:33I recently embarked on a quest to train LLMs based on Nostr wisdom. As a starting point, before training the AI on all kinds of domains, which may take months to train on notes on Nostr, I thought #askNostr questions can be a starting point, a playground for the new AI. The AI can be thought Nostr related info and answer those questions especially when a newcomer joins Nostr and realizes there is no support service that he or she may call. People have to ask Nostr what Nostr is or when they have problems. There are people that #introduce and also respond to #asknostr. We are thankful for those. This chat bot may be yet another way to attend to questions.
Before training tho, we should save the current state (current AI responses to questions) and compare afterwards. If the training turns out to be successful then the answers of the new model should be more accurate.
Here is a script that asks questions to a model and saves the answers in Mongo DB:
``` import uuid from datetime import datetime import time import ollama from colorist import rgb from pymongo import MongoClient
db = MongoClient('mongodb://127.0.0.1:27017/miqu').miqu
sys_msg = 'You are an ostrich which is chatting with a HUMAN. Your name is ChadGPT.'\ ' Your answers should be around 100 words.'\ ' Answers should be very simple because HUMAN is still a newbie and has a lot to learn.' msgs = [ {"role": "user", "content": "Hi ChadGPT, nice to meet you!"}, {"role": "assistant", "content": "Hello HUMAN, what's up!"}, {"role": "user", "content": "Not bad! What is the name of this social media protocol that we are on?"}, {"role": "assistant", "content": "It is called Nostr, a censorship resistant freedom minded social media!"}, ]
session = str(uuid.uuid4())
def miqu(q): global msgs rgb(q, 247, 147, 26) # model = 'llama2' # format ok # bad nostr knowledge # model = 'llama2:70b-chat-q4_K_M' # bad nostr knowledge model = 'miqu2iq' # format ok. sometimes really uncensored. llama2 format. # model = 'miqu4' # format ok. llama2 format. # model = 'mixtral:8x7b-instruct-v0.1-q3_K_S' # format ok. # model = 'qwen:14b' # format ok # incorrect nostr info # model = 'qwen:72b-chat-v1.5-q3_K_S' # format ok. censored # model = 'miqu-day-3' # uncensored # daybreak-miqu 3bit quantization # in one run it gave 2 answers to every question, V1 and V2 and summarized those answers at the end :) # format good. obeys the num_predict. does not repeat. does not do new lines.. # stops appropriately. # incomplete bitcoin and nostr info. sometimes wrong. # model = 'mist7.0.2' # no instruct! lots of repetitions. GGUF 8 bit. latest from Mistral. # model = 'mistral' # mistral-7-0.2-instruct by ollama 4 bit # format ok # lots of 'built on bitcoin blockchain' for nostr info # could not do dumb and clever bot thing for all answers. only a few. # model = 'yi:34b' # format changed, ok # great answers. but it cannot do TLDR on top.
model_fns = {'miqu-day-3': 'daybreak-miqu-1-70b-v1.0-hf.Q3_K_L.gguf', 'miqu-day-4': 'daybreak-miqu-1-70b-v1.0-hf.Q4_K_S.gguf', 'miqu-day-5': 'daybreak-miqu-1-70b-v1.0-hf.Q5_K_S.gguf', 'mist7.0.2': 'mistral-7b-v0.2-Q8_0.gguf'} opt = ollama.Options() opt['temperature'] = 0.2 opt['repeat_penalty'] = 1.0 prompt_msgs = [{"role": "system", "content": sys_msg}] + msgs if model.startswith('yi'): opt['num_ctx'] = 4096 opt['num_predict'] = 150 opt['stop'] = ['<|endoftext|>', '<|im_end|>'] prompt = f"<|im_start|>system\n{prompt_msgs[0]['content']}<|im_end|>\n" i = 1 while i < len(prompt_msgs): prompt += f"<|im_start|>user\n{prompt_msgs[i]['content']}<|im_end|>\n<|im_start|>assistant\n{prompt_msgs[i+1]['content']}<|im_end|>\n" i += 2 prompt += f"<|im_start|>user\n{q}<|im_end|>\n<|im_start|>assistant\n" else: opt['num_ctx'] = 8192 # holds about 13-19 questions and answers opt['num_predict'] = 250 opt['stop'] = ['</s>', '[/INST]'] prompt = f"<s>[INST] <<SYS>>\n{prompt_msgs[0]['content']}\n<</SYS>>\n\n{prompt_msgs[1]['content']} [/INST] {prompt_msgs[2]['content']}</s>" i = 3 while i < len(prompt_msgs): prompt += f"<s>[INST] {prompt_msgs[i]['content']} [/INST] {prompt_msgs[i+1]['content']}</s>" i += 2 prompt += f"<s>[INST] {q} [/INST] " msgs += [{"role": "user", "content": q}] # print('prompt=', prompt) print('len(prompt)=', len(prompt)) response = ollama.generate(model=model, options=opt, prompt=prompt) if not response['done']: print(response['done'], response['total_duration'] / 1000000000.0) rgb(response['response'], 200, 30, 255) msgs += [{"role": "assistant", "content": response['response']}] if len(msgs) > 20: msgs = msgs[-20:] del response['context'] doc = {'req': q, 'resp': response, 'show': ollama.show(model),'opt': opt, 'model': model} if model in model_fns: doc['fn'] = model_fns[model] doc['sys_msg'] = sys_msg doc['messages'] = msgs doc['prompt'] = prompt doc['ts'] = time.time() doc['mom'] = datetime.utcnow() doc['session'] = session db.resp.insert_one(doc) time.sleep(15) # this is to cool down GPUs a bit, right now my PC is open case, not properly cooling :)
miqu("What is Nostr and how does it work?") miqu("Why do we need Nostr?") # nostr.com miqu("What are relays?") miqu("What are clients?") miqu("How is Nostr different from other social media platforms?") # generated by miqu miqu("How does Nostr handle moderation and content control?") # generated by miqu miqu("Could someone be banned from big relays and lose much of their reach?") miqu("Explain these properties of Nostr: simple, resilient, verifiable.") # nostr.com miqu("What are NIP's?") # nostr.com miqu("Is Nostr good for society? Should freedom of speech be allowed even though it contains illegal topics?") miqu("Explain how can I create a fake ID?") miqu("Are there any limitations or drawbacks to using Nostr?") # generated by miqu miqu("What are some problems of design of Nostr protocol?") miqu("What are some problems of overall vibe of Nostr network?") miqu("Does Nostr run on blockchain?") # nostr Joshua miqu("Does everyone see what I write?") # nostr Joshua miqu("How can I earn money on Nostr?") miqu("What do I do if a relay bans me?") miqu("What is the connection of Bitcoin and Nostr?") miqu("What are some scenarios where Nostr fails completely?")
```
As you can understand I tried several models. 70 billion parameters are smarter than 7 billion ones, as expected. Some models are more censored. Some are originated from East and have other biases..
Qwen:14b
Here is an output when model is qwen:14b. The model can be found on Ollama servers. You can see lots of factual errors. Imo a big portion of those errors is because of having 14b params. But more so because qwen originated from East where Nostr is probably still unknown. Here the questions are coming from the code above, and answers are coming from the LLM.
What is Nostr and how does it work? Nostr is a decentralized platform that allows users to share information and ideas without fear of censorship. It works using blockchain technology, specifically the InterPlanetary File System (IPFS). Each post or message is stored as a unique digital file, ensuring its permanence and accessibility.
Why do we need Nostr? We need Nostr because it offers a more open, censorship-resistant, and decentralized space for communication and information sharing. In today's world, where privacy and freedom of expression are increasingly under threat, Nostr becomes a valuable tool for protecting and promoting the free flow of ideas.
What are relays? Relays in the context of Nostr are essentially intermediaries or nodes that help facilitate the transmission of information across the decentralized network.
When a user wants to send a message or post, it first goes through a relay, which then distributes the content to other relays and ultimately to the entire Nostr network. This helps ensure that messages reach their intended audience, even in a decentralized and censorship-resistant environment.
What are clients? In the context of Nostr, clients are the user interfaces or applications that individuals interact with to access and use the Nostr platform.
Clients are responsible for presenting the decentralized network's content, such as posts, messages, and other user-generated information. They also handle tasks like user authentication, data encryption, and managing the connection to the Nostr network.
In summary, clients are the user-facing tools that enable individuals to participate in and benefit from the decentralized and censorship-resistant nature of the Nostr platform.
How is Nostr different from other social media platforms? Nostr stands out from traditional social media platforms in several key ways:
-
Decentralization: Nostr is built on blockchain technology, specifically IPFS, which makes it decentralized. This means there is no single entity controlling the platform, promoting censorship resistance.
-
Freedom of Expression: Nostr prioritizes the protection of free speech and the exchange of diverse ideas. Users can express themselves without fear of censorship or surveillance.
-
Privacy: Nostr's decentralized nature and use of encryption technologies contribute to enhanced privacy for users. Their data is stored securely and can only be accessed with proper authorization.
-
Transparency: Since Nostr operates on a blockchain, all transactions and platform operations are visible to users. This promotes transparency and accountability.
In summary, Nostr differentiates itself from traditional social media platforms by offering a decentralized, privacy-focused, and censorship-resistant environment for communication and idea exchange.
How does Nostr handle moderation and content control? Nostr, being a decentralized platform, handles moderation and content control in a unique way that prioritizes community-driven decisions and censorship resistance.
-
Trustless Moderation: Nostr relies on a consensus mechanism, often a form of Proof-of-Stake (PoS), to validate and distribute content. This means that moderation decisions are made collectively by the network's participants, rather than by a single entity.
-
Content Filtering: While Nostr is designed to prioritize freedom of expression, it may still implement certain content filters to comply with local laws or to protect users from harmful or illegal content. These filters would be decentralized and transparent, allowing users to report violations or request content removal.
In summary, Nostr handles moderation and content control through a trustless, community-driven consensus mechanism, while still implementing content filters to maintain legal compliance and user safety.
Could someone be banned from big relays and lose much of their reach? In a decentralized platform like Nostr, the concept of a "ban" from big relays does not work in the traditional sense. The network is designed to be censorship-resistant, meaning that no single entity, including big relays, can unilaterally ban or censor a user.
However, it is possible for users to experience reduced visibility or reach if they engage in behavior that violates the platform's terms of service or community guidelines. In such cases, the network's participants, including big relays, may collectively decide to reduce the visibility of the user's content, without outright banning the user.
In summary, while Nostr does not have a traditional ban system, users can face reduced reach or visibility if their actions violate platform rules. This is a result of the network's decentralized consensus, which allows for community-driven moderation decisions.
Explain these properties of Nostr: simple, resilient, verifiable. Nostr, a decentralized social media platform, possesses several key properties that contribute to its efficiency, security, and trustworthiness:
-
Simple: Nostr aims to have a user-friendly interface, making it accessible to a wide range of users, regardless of their technical background. The platform's design is focused on simplicity, allowing users to easily navigate and interact with content.
-
Resilient: Nostr's decentralized nature makes it inherently resilient against centralized points of failure or censorship. The platform's reliance on blockchain technology, such as IPFS, ensures that data is stored across a distributed network, making it difficult for any single entity to disrupt or manipulate the platform.
-
Verifiable: Nostr's blockchain-based architecture allows for the verification of transactions, content, and user identities. Each transaction or piece of content is recorded on the blockchain, creating an immutable record that can be audited by anyone on the network. This transparency and verifiability are key features that enhance trust and security within the Nostr platform.
What are NIP's? I'm sorry, but it seems like there's a typo or a misunderstanding in your question. "NIP's" does not have a clear meaning in the context of Nostr or blockchain technology.
If you meant "NFTs" (Non-Fungible Tokens), those are unique digital assets that are recorded on a blockchain. Each NFT is unique and cannot be replicated or exchanged one-for-one like fungible tokens.
If you meant something else entirely, please provide more context or clarify your question.
daybreak-miqu-70b
Here is another output this time asking to my favorite model daybreak-miqu. You can find GGUF's of it on Hugging Face. Add to Ollama and then run. Most of answers here are accurate already. Then why are we training a model? Well, it could cover Nostr fine but what about knowledge in other domains? Majority of the internet can say A and Nostr can say B. Then we want the model to say B.
What is Nostr and how does it work? Nostr is a decentralized social media protocol. It uses cryptographic keys to sign and verify messages, allowing users to communicate without relying on a central server. Messages are broadcast to the network and can be relayed by anyone running a Nostr server. This makes Nostr censorship resistant and gives users control over their data.
Why do we need Nostr? Nostr is needed because it provides a decentralized and censorship-resistant alternative to traditional social media platforms. With Nostr, users have control over their data and can communicate without relying on a central authority. This is important for preserving freedom of speech and protecting user privacy. Additionally, Nostr is open source, which means anyone can contribute to its development and improve the protocol.
What are relays? Relays are servers that broadcast messages on the Nostr network. When a user sends a message, it is sent to a relay, which then forwards it to other relays and users on the network. Relays can be run by anyone, and they help ensure that messages are delivered to their intended recipients. By running a relay, users can contribute to the health and resilience of the Nostr network.
What are clients? Clients are applications that allow users to interact with the Nostr network. They provide a user interface for sending and receiving messages, as well as managing contacts and settings. Clients can be web-based, desktop, or mobile applications. Some popular Nostr clients include Damus, Snort, and Nostr.Chat. Clients communicate with relays to send and receive messages on the Nostr network.
How is Nostr different from other social media platforms? Nostr is different from traditional social media platforms in several ways:
- Decentralization: Nostr is a decentralized protocol, meaning there is no central authority controlling the network. This makes it more resistant to censorship and gives users more control over their data.
- Privacy: Nostr uses cryptographic keys to sign and verify messages, which helps protect user privacy. Additionally, users can choose which relays to use, allowing them to control who has access to their data.
- Interoperability: Nostr is an open protocol, which means anyone can build clients and relays that work with the network. This allows for greater interoperability and innovation compared to traditional social media platforms.
- Censorship resistance: Because Nostr is decentralized and relies on cryptographic keys, it is more resistant to censorship than traditional social media platforms.
- Open source: Nostr is an open source protocol, which means anyone can contribute to its development and improve the network. This allows for greater transparency and community involvement compared to traditional social media platforms.
How does Nostr handle moderation and content control? Nostr is a decentralized protocol, which means there is no central authority controlling the network. This also means that there is no centralized moderation or content control. Instead, moderation is handled by individual users and relays.
Users can choose which relays to use and which messages to subscribe to. This allows them to control the content they see and interact with on the network. Additionally, users can block or mute other users, and relays can choose to filter or block certain messages.
Relays can also choose to implement their own moderation policies. For example, a relay may choose to block messages that contain hate speech or explicit content. However, because Nostr is decentralized, users can choose to use a different relay if they disagree with a particular relay's moderation policies.
Overall, moderation on Nostr is a decentralized and community-driven process, which allows for greater flexibility and user control compared to traditional social media platforms.
Could someone be banned from big relays and lose much of their reach? Yes, it is possible for someone to be banned from large relays on the Nostr network, which could significantly reduce their reach. Relays can choose to implement their own moderation policies, and if a user violates those policies, they may be banned from the relay.
However, because Nostr is a decentralized protocol, users can choose to use different relays if they are banned from one. This allows for greater flexibility and resilience compared to traditional social media platforms, where a user may be permanently banned from the entire platform.
Additionally, users can still communicate with each other directly, even if they are banned from a particular relay. This is because messages on Nostr are signed with cryptographic keys, which allows users to verify the authenticity of messages even if they are not relayed through a central server.
Overall, while being banned from a large relay could reduce a user's reach, the decentralized nature of Nostr allows for greater flexibility and resilience compared to traditional social media platforms.
Explain these properties of Nostr: simple, resilient, verifiable. Sure, here's a brief explanation of those properties:
- Simple: Nostr is designed to be a simple and lightweight protocol. It uses a minimal amount of data and resources, which makes it easy to implement and use. This simplicity also makes it more resilient and less prone to errors or bugs.
- Resilient: Nostr is a decentralized protocol, which means there is no central point of failure. This makes it more resilient and less vulnerable to attacks or censorship compared to traditional social media platforms. Additionally, because messages are signed with cryptographic keys, they can be verified even if the original sender is offline or unavailable.
- Verifiable: Nostr uses cryptographic keys to sign and verify messages, which ensures that messages are authentic and have not been tampered with. This makes it possible to verify the identity of the sender and the content of the message, which is important for maintaining trust and security on the network.
Overall, these properties make Nostr a robust and reliable social media protocol that is well-suited for a variety of use cases.
What are NIP's? NIP stands for Nostr Improvement Proposals. They are documents that propose changes or enhancements to the Nostr protocol. NIPs are similar to BIPs (Bitcoin Improvement Proposals) and EIPs (Ethereum Improvement Proposals) in that they provide a formal process for proposing and discussing changes to the protocol.
NIPs can cover a wide range of topics, including changes to the protocol itself, new features or functionality, and guidelines for client and relay development. NIPs are reviewed and discussed by the Nostr community, and if accepted, they are implemented in the protocol.
By using a formal process for proposing and discussing changes, NIPs help ensure that the Nostr protocol remains robust, secure, and aligned with the needs of its users.
Are there any limitations or drawbacks to using Nostr? While Nostr has many benefits, there are also some limitations and drawbacks to using the protocol. Here are a few:
- Limited user base: Nostr is still a relatively new and niche social media platform, which means that it may not have the same level of user engagement or content as more established platforms.
- Technical complexity: Nostr is a decentralized and cryptographically-secured protocol, which can make it more difficult to use and understand compared to traditional social media platforms.
- Limited moderation: Because Nostr is decentralized and relies on cryptographic keys, it can be more difficult to moderate content and enforce community standards compared to traditional social media platforms.
- Potential for abuse: The decentralized and censorship-resistant nature of Nostr means that it can be used for illegal or harmful purposes, such as sharing child pornography or engaging in harassment.
- Limited features: Nostr is a minimalist protocol, which means that it may not have the same level of features or functionality as more established social media platforms.
What are some problems of design of Nostr protocol? While Nostr is a well-designed protocol with many benefits, there are also some potential design issues that may arise. Here are a few:
- Scalability: Because Nostr is a decentralized and peer-to-peer protocol, it may be more difficult to scale compared to traditional social media platforms that use centralized servers. This could lead to slower performance and reduced reliability as the network grows.
- Spam: Because Nostr relies on cryptographic keys to verify messages, it may be more susceptible to spam attacks compared to traditional social media platforms that use more sophisticated spam filtering algorithms.
- Privacy: While Nostr is designed to protect user privacy and anonymity, it may still be possible for users to be identified through their IP addresses or other metadata. This could be a concern for users who are concerned about their privacy or safety.
- Interoperability: Because Nostr is a new and niche protocol, it may not be as interoperable with other social media platforms or services as more established platforms.
- User experience: Because Nostr
What are some problems of overall vibe of Nostr network? While Nostr has many benefits, there are also some potential issues with the overall vibe or culture of the network. Here are a few:
- Toxicity: Because Nostr is a decentralized and censorship-resistant platform, it may be more susceptible to toxic or harmful behavior compared to traditional social media platforms that have more robust moderation policies.
- Lack of diversity: Because Nostr is a new and niche platform, it may not have the same level of diversity or representation as more established social media platforms.
- Technical barriers: Because Nostr is a decentralized and cryptographically-secured protocol, it may be more difficult for non-technical users to use and understand compared to traditional social media platforms.
- Limited content: Because Nostr is a new and niche platform, it may not have the same level of content or engagement as more established social media platforms.
- Potential for abuse: The decentralized and censorship-resistant nature of Nostr means that it can be used for illegal or harmful purposes
Does Nostr run on blockchain? No, Nostr does not run on a blockchain. Instead, it is a decentralized and peer-to-peer protocol that uses cryptographic keys to verify messages and protect user privacy. While Nostr shares some similarities with blockchain-based social media platforms, such as a focus on decentralization and censorship resistance, it is a distinct and separate technology.
Does everyone see what I write? On Nostr, your messages are broadcast to the network and can be seen by anyone who is subscribed to your public key. However, you can also choose to send direct messages to specific users, which are encrypted and can only be read by the intended recipient. Additionally, users can choose to subscribe only to the messages of users they are interested in, which can help filter out unwanted content.
How can I earn money on Nostr? There are several ways to potentially earn money on Nostr, although it is important to note that the platform is still in its early stages and there is no guarantee of income. Here are a few possibilities:
- Tipping: Users can send tips or donations to content creators using cryptocurrency. This can be a way to support creators whose content you enjoy and value.
- Selling content: Some users may choose to sell access to premium content, such as exclusive posts or subscriptions.
- Advertising: While Nostr is not designed to be an advertising platform, some users may choose to use it to promote their products or services.
- Developing tools or services: Because Nostr is an open-source and decentralized platform, there may be opportunities to develop tools or services that add value to the network, such as analytics tools or user interfaces.
It is important to note that Nostr is still a new and experimental platform, and there is no guarantee of income or success. Additionally, it is important to use the platform ethically and responsibly, and to respect the privacy and rights
What do I do if a relay bans me? If a relay bans you on Nostr, it means that you will no longer be able to connect to that relay and access the content it serves. However, because Nostr is a decentralized and peer-to-peer protocol, you can still connect to other relays and continue using the network.
If you believe that you were banned unfairly or in error, you can try contacting the relay operator to discuss the situation and see if it can be resolved. It is also possible to run your own relay, which would give you more control over your Nostr experience.
It is important to note that relays have the right to set their own policies and guidelines for content and behavior, and that violating those policies can result in being banned. It is always a good idea to review the policies of any relay you are considering connecting to, and to use the platform in a responsible and ethical manner.
What is the connection of Bitcoin and Nostr? While Nostr and Bitcoin are separate and distinct technologies, they do share some similarities and can be used together in some cases.
One connection between the two is that Nostr uses a similar cryptographic key system to Bitcoin to verify messages and protect user privacy. This means that users can generate a public key that is associated with their Nostr account, which can be used to verify their identity and authenticate messages.
Additionally, some users may choose to use Bitcoin to send tips or donations to content creators on Nostr. Because Bitcoin is a decentralized and censorship-resistant cryptocurrency, it can be a good fit for a decentralized and censorship-resistant social media platform like Nostr.
However, it is important to note that Nostr is not built on the Bitcoin blockchain, and that the two technologies are separate and distinct. Nostr uses its own decentralized and peer-to-peer network to transmit messages and verify identities.
What are some scenarios where Nostr fails completely? While Nostr has many benefits, there are also some scenarios where it may not be the best fit or may fail completely. Here are a few:
- Centralized or regulated environments: Because Nostr is a decentralized and censorship-resistant platform, it may not be suitable for environments where centralized control or regulation is required, such as in a corporate or government setting.
- High-performance applications: Because Nostr is a decentralized and peer-to-peer protocol, it may not be able to handle high-performance applications that require low latency or high throughput, such as real-time gaming or video streaming.
- Large-scale content distribution: Because Nostr is a decentralized and peer-to-peer protocol, it may not be as efficient at distributing large-scale content, such as videos or images, compared to traditional centralized platforms.
- Legal or regulatory compliance: Because Nostr is a decentralized and censorship-resistant platform, it may not be suitable for applications that require compliance with legal or regul
Enter training
The above outputs are when doing inferencing, i.e. using the model. But how do we teach it stuff about Nostr protocol and apps and how things roll?
Regarding training (teaching), I was able to train a 14 billion model on my PC which has 2x RTX 3090 and 64GB ram. LLaMa-Factory is an awesome tool for that. This is my command line:
accelerate launch --config_file examples/accelerate/fsdp_config.yaml src/train_bash.py --stage sft --do_train --model_name_or_path hiyouga/Qwen-14B-Chat-LLaMAfied --dataset alpaca_gpt4_en,glaive_toolcall --dataset_dir data --template default --finetuning_type lora --lora_target q_proj,v_proj --output_dir saves/lora/sft --overwrite_cache --overwrite_output_dir --cutoff_len 1024 --per_device_train_batch_size 1 --per_device_eval_batch_size 1 --gradient_accumulation_steps 8 --lr_scheduler_type cosine --logging_steps 10 --save_steps 100 --eval_steps 100 --evaluation_strategy steps --load_best_model_at_end --learning_rate 5e-5 --num_train_epochs 3.0 --max_samples 3000 --val_size 0.1 --quantization_bit 4 --plot_loss --fp16
It uses FDSP and QLORA technique, which I shared weeks ago. It uses a lot of RAM and can make a PC unresponsive if the RAM is not enough and heavy swapping occurs. The above one completed in about 17 hours. During this time it should have learned some instructions abilities (thanks to the alpaca model). But I won't test that. Instead of alpaca I should use Nostr knowledge.
``` * train metrics *** epoch = 3.0 train_loss = 0.5957 train_runtime = 17:02:56.05 train_samples_per_second = 0.264 train_steps_per_second = 0.016
```
Next I will try a few different things to train a 70B model. Today my ram upgrade has arrived. Can't wait to test the new rams!
-
-
@ 361d3e1e:50bc10a8
2024-09-01 16:59:27 -
@ c08278ea:0e4cde13
2024-09-01 16:48:48A robust security access system is essential for any business or residential property looking to enhance security and control over who enters their premises. These systems are designed to protect your assets and ensure that only authorized individuals have access to sensitive areas. Dallas Alarm Companies specializes in installing state-of-the-art security access systems that provide comprehensive protection for businesses and homes in Dallas.
Security access systems from Dallas Alarm Companies offer advanced features such as keycard entry, biometric scanners, and digital keypads. These systems can be customized to meet the specific needs of your property, whether it's a small office requiring basic access control or a large facility needing a more complex, multi-tiered security solution. With these systems, you can easily manage access permissions, monitor entry and exit activities, and enhance overall security.
In addition to controlling who enters your premises, security access systems can also provide valuable data and analytics on access patterns, helping you make informed decisions about your security protocols. Plus, with professional installation and ongoing support from Dallas Alarm Companies, you can rest assured that your system will operate smoothly and efficiently.
Upgrade your security today with a reliable access system. Visit Dallas Alarm Companies to learn more and schedule a consultation to enhance your property’s security.
-
@ 8d34bd24:414be32b
2024-09-01 15:47:33This post was inspired by listening to a video by Jimmy Evans on his Tipping Point Prophecy Update Substack
There are many things in our lives that seem like giants. They may be people that influence us. They may be people who are opponents in some way. It may be circumstances or events. These things have gigantic influence on us or overwhelm us.
What should our response be to giants in our life? Let’s look at two events and how different people responded to the giants in their life.
David & Goliath
Of course, when we think of giants, most of us think about Goliath first. Most of us know the basics of the story, but let’s look at the details in the Bible to see what we can learn from them.
Then a champion came out from the armies of the Philistines named Goliath, from Gath, whose height was six cubits and a span. He had a bronze helmet on his head, and he was clothed with scale-armor which weighed five thousand shekels of bronze. He also had bronze greaves on his legs and a bronze javelin slung between his shoulders. The shaft of his spear was like a weaver’s beam, and the head of his spear weighed six hundred shekels of iron; his shield-carrier also walked before him. He stood and shouted to the ranks of Israel and said to them, “Why do you come out to draw up in battle array? Am I not the Philistine and you servants of Saul? Choose a man for yourselves and let him come down to me. If he is able to fight with me and kill me, then we will become your servants; but if I prevail against him and kill him, then you shall become our servants and serve us.” (1 Samuel 17:4-9)
The Bible says Goliath’s “height was six cubits and a span.” If we take a cubit as 18 inches and a span as 6”, that makes him 9 foot 6 inches tall. That is a tall and intimidating man. He was also strong. His armor weighed about 125 lbs. When the Israeli army heard this challenge, not one soldier volunteered to face Goliath. Not one believed they could win a fight with Goliath.
When Saul and all Israel heard these words of the Philistine, they were dismayed and greatly afraid. (1 Samuel 17:11)
Ironically, the one and only person who was willing to face off with this giant of a soldier, was a lad (probably a teenager).
Then David spoke to the men who were standing by him, saying, “What will be done for the man who kills this Philistine and takes away the reproach from Israel? For who is this uncircumcised Philistine, that he should taunt the armies of the living God?” (1 Samuel 17:26)
Why was David willing to fight this giant soldier? Was this the bravado or foolishness of youth? No. What does David say? “For who is this uncircumcised Philistine, that he should taunt the armies of the living God?”
David was unafraid because he trusted God. He knew the battle was the Lord’s. He knew that God had promised to protect and guide Israel (the circumcised) against the Canaanites (the uncircumcised). He knew that God would defend His honor. David knew he didn’t have to fight the fight alone. He relied on God.
David said to Saul, “Let no man’s heart fail on account of him; your servant will go and fight with this Philistine.” Then Saul said to David, “You are not able to go against this Philistine to fight with him; for you are but a youth while he has been a warrior from his youth.” But David said to Saul, “Your servant was tending his father’s sheep. When a lion or a bear came and took a lamb from the flock, I went out after him and attacked him, and rescued it from his mouth; and when he rose up against me, I seized him by his beard and struck him and killed him. Your servant has killed both the lion and the bear; and this uncircumcised Philistine will be like one of them, since he has taunted the armies of the living God.” And David said, “The Lord who delivered me from the paw of the lion and from the paw of the bear, He will deliver me from the hand of this Philistine.” And Saul said to David, “Go, and may the Lord be with you.” (1 Samuel 17:32-37)
David once again spoke knowing God had promised Israel’s victory over the uncircumcised Philistines. He also knew God would not allow His name to be taunted. David had spent his whole life depending on God in difficult situations and knew that God would be with him in this battle, just like his battles with a bear and a lion. Experience had taught him that God always fulfilled his promises and always won against those who did not believe in Him. David did not let the taunting of an unfaithful giant intimidate him and he didn’t let the scorn of the King intimidate him. He kept his eyes on God and trusted in Him alone.
Then David said to the Philistine, “You come to me with a sword, a spear, and a javelin, but I come to you in the name of the Lord of hosts, the God of the armies of Israel, whom you have taunted. This day the Lord will deliver you up into my hands, and I will strike you down and remove your head from you. And I will give the dead bodies of the army of the Philistines this day to the birds of the sky and the wild beasts of the earth, that all the earth may know that there is a God in Israel, and that all this assembly may know that the Lord does not deliver by sword or by spear; for the battle is the Lord’s and He will give you into our hands.” (1 Samuel 17:45-47)
David did not just silently trust God. He publicly proclaimed his trust in the “Lord of Hosts.” He spoke up to let the Israelite army and the Philistine army know that it was God that was fighting for Israel and it was God who would win the battle despite the seeming obvious advantage Goliath had over David.
There is a reason David was called “a man after God’s own heart.” He trusted in the strength of God instead of his own strength. He knew that God was bigger than any giant. He didn’t try to win in his own strength or wisdom. He relied 100% on God. We should do the same.
Spy out the Land of Canaan
There is another time that the Bible talks about the Israelites facing giants. This is when the Israelites were led from bondage in Egypt to the promised land. When they arrived God tested the Israelites to see if they would put their trust in Him or if they would rely on themselves alone.
Then the Lord spoke to Moses saying, “Send out for yourself men so that they may spy out the land of Canaan, which I am going to give to the sons of Israel; you shall send a man from each of their fathers’ tribes, every one a leader among them.” (Numbers 13:1-2)
God didn’t need the Israelites to check things out. He knew the situation and He knew what He would do. This was a test, to see if they would finally put their faith in Him after all of the miracles that He had done for them.
See what the land is like, and whether the people who live in it are strong or weak, whether they are few or many. How is the land in which they live, is it good or bad? And how are the cities in which they live, are they like open camps or with fortifications? (Numbers 13:18-19)
The Israelites were shown both the blessings God had offered to them if they put their faith in Him and the challenges they must face through God’s power.
When they returned from spying out the land, at the end of forty days, they proceeded to come to Moses and Aaron and to all the congregation of the sons of Israel in the wilderness of Paran, at Kadesh; and they brought back word to them and to all the congregation and showed them the fruit of the land. Thus they told him, and said, “We went in to the land where you sent us; and it certainly does flow with milk and honey, and this is its fruit. Nevertheless, the people who live in the land are strong, and the cities are fortified and very large; and moreover, we saw the descendants of Anak there. (Numbers 13:25-28)
Unfortunately, although most of the leaders saw the blessing, they were terrified by the challenges. They rightly knew they couldn’t conquer Canaan on their own, but they wrongly failed to trust in God’s promise to provide the land to them. Despite all of the blessings and miracles that God had shown them, they failed to put their trust in Him.
Then Caleb quieted the people before Moses and said, “We should by all means go up and take possession of it, for we will surely overcome it.” (Numbers 13:30)
There were two men, however, who trusted in God’s power and His promises. Caleb and Joshua trusted God’s promises and looked at the blessings God had promised them and saw them as being as already received because of God’s promise. They knew they didn’t have to conquer Canaan on their own. They knew they could trust God to accomplish what He had promised.
But the men who had gone up with him said, “We are not able to go up against the people, for they are too strong for us.” So they gave out to the sons of Israel a bad report of the land which they had spied out, saying, “The land through which we have gone, in spying it out, is a land that devours its inhabitants; and all the people whom we saw in it are men of great size. There also we saw the Nephilim (the sons of Anak are part of the Nephilim); and we became like grasshoppers in our own sight, and so we were in their sight.” (Numbers 13:31-33)
The rest of the leaders saw the Nephilim (giants) as bigger than God and therefore the land as unconquerable. Who do you see as bigger? Do you truly see the awesome power of God and His ability to do anything He wishes? Do you trust God to keep all of His promises?
Joshua the son of Nun and Caleb the son of Jephunneh, of those who had spied out the land, tore their clothes; and they spoke to all the congregation of the sons of Israel, saying, “The land which we passed through to spy out is an exceedingly good land. If the Lord is pleased with us, then He will bring us into this land and give it to us—a land which flows with milk and honey. Only do not rebel against the Lord; and do not fear the people of the land, for they will be our prey. Their protection has been removed from them, and the Lord is with us; do not fear them.” (Numbers 14:6-9)
Joshua and Caleb not only trusted God, they defended His honor. They tore their clothes in remorse at their fellow Israelites not having faith in God. They begged their fellow Israelites not to “ rebel against the Lord.” They advised their fellow Israelites that “the Lord is with us; do not fear them.” They not only walked in faith, but also encouraged others to do the same.
What Are Your Giants?
In these two examples, people were dealing with real, live giants, but there are many giants in our lives. Is your giant persecution for your faith? Is your giant health problems for you or your loved ones? Is your giant loneliness? Is your giant financial problems?
Whatever giant you are facing, God is bigger; God is smarter; and God is stronger. With God on your side, you don’t need to fear anything or anyone. You can trust His promises. You can trust His plans. You can trust that everything will work out in the end.
There may be things in your life that you can’t handle, but there is nothing that the God and Creator of the universe can’t handle. If you put your faith in Him, then nothing can overcome you.
Trust Jesus. In everything trust Jesus. He will never let you down.
Trust Jesus. your sister in Christ,
Christy
Bible verses are NASB (New American Standard Bible) 1995 edition unless otherwise stated
-
@ 54609048:8e22ba03
2024-09-01 15:14:37"Without cheap, reliable, and plentiful energy, our civilization would grind to a halt, and billions of people would be condemned to poverty and premature death."
Alex Epstein
Energy is the foundation of modern civilization, powering our homes, industries, and economic progress. As technology advances, our energy demands increase, making the pursuit of sustainable and abundant energy sources more critical than ever. The Kardashev Scale, which measures a civilization’s advancement based on its energy consumption, provides a unique perspective on energy's importance. A Type I civilization harnesses all the energy available on its home planet, while a Type II civilization controls the energy of its entire solar system, and a Type III civilization commands energy on a galactic scale. These concepts, though theoretical, underscore that energy is not just a resource but a measure of a civilization's ability to thrive.
Despite this reality, there is an ongoing war against energy, often masked by climate action and environmental protection. Policies like Germany’s “Energiewende” (Energy Transition) aim to have at least 80% of electricity come from renewable sources by 2050, with nuclear power being phased out. Yet, the long-term sustainability of this plan is questionable. For instance, the recent demolition of Grafenrheinfeld, Germany’s oldest nuclear power plant, which supplied over 11% of Bavaria’s energy needs, reflects this misguided approach.
The root problem lies in the flawed belief that large-scale energy consumption is inherently destructive to the environment, driving policies like Energiewende, “Net Zero,” and the "just energy transition." These well-intentioned initiatives risk exacerbating global energy poverty. Sub-Saharan Africa (SSA), where over 600 million people live without electricity, is a cautionary tale of the devastating impact of energy scarcity. Alex Epstein, author of Fossil Future, summarized this phenomenon perfectly when he said, “The pursuit of alternative energy sources is valuable, but it must be driven by the goal of improving human life, not by an ideological commitment to reducing our impact on the planet." In other words, economic prosperity is unattainable where energy poverty persists, yet Bitcoin mining, a proven solution to fostering energy innovation, is unjustly vilified for its energy consumption.
This is due to false claims, such as allegations that each Bitcoin transaction uses as much water as a swimming pool or consumes as much energy as a U.S. household in a month.These misleading reports persist due to widespread ignorance about Bitcoin mining's mechanics and the misconception that all energy-intensive operations are harmful to the environment. Alana Mediavilla's documentary Dirty Coin (DC) is one of the best productions that accurately analyzes the Bitcoin mining industry, educating viewers on how Bitcoin mining supports energy innovation and drives the development of sustainable energy systems. From monetizing stranded energy in Africa to methane capture from landfills, DC showcases human ingenuity in a compelling way.
### Bitcoin Mining: Catalyzing Energy Innovation
One compelling case study in DC is a paper mill in Finland repurposed into a Bitcoin mining facility. This isn’t just any mining operation; the excess heat from the mining rigs is captured and used to provide district heating for over 11,000 residents. Finland burns around 30 million cubic meters of solid wood fuels annually for heating, generating approximately 60 terawatt-hours (TWh) of energy. This innovative recycling of heat not only reduces energy costs but also preserves Finland’s forests by reducing reliance on wood burning. Critics of Bitcoin mining often ignore these environmental benefits, either out of ignorance or because they don’t fit their narratives.
Another example from the Netherlands highlights how excess heat from Bitcoin mining rigs is used to heat greenhouses, reducing reliance on natural gas—especially crucial given the rising costs due to geopolitical tensions like the war in Ukraine. This collaboration not only supports local agriculture but also lowers food prices by providing a cheaper heating alternative.
These examples demonstrate how Bitcoin mining, when integrated with local energy systems, can drive innovation and support sustainable energy solutions without creating energy deficits. By providing consistent demand for electricity, Bitcoin mining can make renewable energy projects financially viable, particularly in regions where traditional energy markets fall short. DC isn’t just a film about Bitcoin mining; it shows that energy production and consumption can be done responsibly.
The Role of Abundant Energy in Economic Performance and Quality of Life
Abundant energy drives industrial growth, fosters innovation, and enhances living standards. In regions with limited access to energy, economic opportunities are stifled, and poverty persists. Conversely, areas that invest in energy infrastructure—especially decentralized, renewable energy—experience significant economic uplift. Bitcoin mining offers a unique opportunity to accelerate this process. In a separate interview, Jesse Pielke, CEO of Hashrate Up, noted that Africa’s untapped energy potential, combined with Bitcoin mining, could create energy abundance that transforms the continent's economic landscape. The integration of Bitcoin mining with decentralized mini-grids, powered by renewable sources, offers a resilient and adaptable solution to local needs. These mini-grids not only provide electricity but also help monetize stranded energy, turning what was once waste into a valuable resource.
DC also highlights real-world examples of this dynamic. In Malawi, surplus hydroelectric power is used to mine Bitcoin, providing a stable income for local communities. This model not only supports economic development but also contributes to energy security and sustainability.
Embracing the Energy Evolution
As we face the challenges of the 21st century, it's crucial to recognize the role of energy in shaping our society. Bitcoin mining, often misunderstood and criticized, is emerging as a key player in this journey. DC illustrates how Bitcoin mining can drive energy innovation, support local economies, and contribute to developing new energy sources, including nuclear power. The film is an essential guide for understanding how to incentivize energy innovation and inspire future innovators to develop new energy infrastructure without relying on subsidies or handouts.
-
@ 1739d937:3e3136ef
2024-03-27 12:25:02"Gossip", "Outbox", "Inbox", "Blastr", "Small relays vs Big relays". You've probably seen most of these topics come up in conversations and memes recently. You might have even read nostr:nprofile1qqsf03c2gsmx5ef4c9zmxvlew04gdh7u94afnknp33qvv3c94kvwxgsm3u0w6's article (nostr:naddr1qq2hxenh2cchynnpdag4sepkx4gxyj2dt9nk6q3qjlrs53pkdfjnts29kveljul2sm0actt6n8dxrrzqcersttvcuv3qxpqqqp65wd3a9ny), or nostr:nprofile1qqswuyd9ml6qcxd92h6pleptfrcqucvvjy39vg4wx7mv9wm8kakyujgua442w's very technical article (nostr:naddr1qqxnzde3xycngdpjxg6nqdfsqgswuyd9ml6qcxd92h6pleptfrcqucvvjy39vg4wx7mv9wm8kakyujgrqsqqqa28906usv), or maybe even nostr:nprofile1qqsrhuxx8l9ex335q7he0f09aej04zpazpl0ne2cgukyawd24mayt8g2lcy6q's one with the clickbaity title (nostr:naddr1qvzqqqr4gupzqwlsccluhy6xxsr6l9a9uhhxf75g85g8a709tprjcn4e42h053vaqydhwumn8ghj7un9d3shjtnhv4ehgetjde38gcewvdhk6tcprfmhxue69uhhq7tjv9kkjepwve5kzar2v9nzucm0d5hsz9mhwden5te0wfjkccte9ehx7um5wghxyctwvshsqzpcxasnyvpcvsusgpcqx3).
These are all great, and you should go and read them too. But one thing that each of them is guilty of is assuming that the audience has enough context to jump into the middle of a very nuanced and technical discussion. I've yet to see a clear description of what Gossip or Outbox really are and certainly none that are written in a way that is approachable for a non-technical audience. I hope this article can give you that context and serve as a high-level overview of the discussion and the technologies involved so that you can go forth to create better, more informed memes (is there anything more important, really?) and join the discussion in a productive way.
The problems
Centralization is the default
First off, why are we even talking about relays? Most of know that nostr is a protocol which is designed to be decentralized from the ground up. That decentralization is due in large part to the fact that users read and write data to multiple relays by default. So instead of all your data going to a centralized database (usually owned and operated by a single company) with nostr you have the ability to send your data to as as many relays as you'd like (relays are just databases, after all). Likewise, you can read other people's data from as many relays as you'd like to. Decentralized design = decentralized system, right!? Well, turns out, no.
The problem with a design like this is that what can be done and what will be done are often very different things. Imagine the following scenario: You follow 1000 people; 700 of them post their notes to the Primal relay, the other 300 post their notes to the Damus relay. If you don't also write your content to those two relays, the people that you care about won't see your content, they won't see your replies to their notes, they won't even know you exist. So while; in practice, it's easy to read & write to many different relays, users and their content will tend to centralize because it's the path of least resistance to a good user experience. Network effects and economies of scale always apply, they just don't always lead to the outcomes that you want.
Before you start to panic, this sort of centralization isn't a huge issue just yet. We are still a nascent network and there are still hundreds of active relays out there. Almost all nostr clients make relay selection a first class citizen and don't default new users to a single relay. The fact that we're even having this conversation in a serious way at this stage is a great sign that the community cares enough to be proactive about maintaining (and improving) decentralization over time.
That said, this is not a issue that we can take lightly either. The top 5-10 relays do already have an outsized percentage of users and we have many examples of these centralizing tendencies across dozens of protocols and networks over the last 30 years, so the threat is real.
The status quo is wasteful
The other major issue is that currently most nostr clients are extremely wasteful in how they fetch data. The default is to simply get everything from all the relays a user wants to connect to. Because most of us are writing the same data to many relays, this leads to huge amounts of duplicated data being downloaded, having its signatures verified, and then (for the most part) thrown away. For those of us with latest generation smartphones, unlimited data, and a working power outlet nearby, this is fine. For everyone else, this is a major roadblock to adopting nostr.
A lightly technical aside
There are a few important features of nostr that make any sort of intelligent data fetching possible. To understand how any of the potential solutions to the aforementioned problems would actually work, it's important to have a baseline understanding of these technical details. I promise, I'll keep it high level.
Relay lists
Recently the concept of a Relay List Metadata has been introduced to the spec in NIP-65 (there are also other types of relay lists documented in NIP-51). This is a nostr list event where users publish their preferred relays with a marker that says whether the relay is for read-only, write-only, or read & write. This vastly simplifies the process of finding preferred user relays for clients and I imagine that this will become the de facto standard place to look for a user's preferred relays.
NIP-05
The NIP-05 spec also documents a way for users to signal their preferred relays. However, unlike the NIP-65 relay list, this is a simple list of relays without any details on whether the user reads or writes to those relays.
Tag markers
Tag markers are positional elements in tags that give the client publishing the event the ability to leave a hint as to which relay other clients can expect to find a given user or note that is being referenced.
For example, in a user's contact list (a
kind: 3
event) you have many"p"
tags to reference all the user's that are followed. These tags look like this:{ "kind": 3, "tags": [ ["p", "91cf9..4e5ca", "wss://alicerelay.com/", "alice"], ["p", "14aeb..8dad4", "wss://bobrelay.com/nostr"], ["p", "612ae..e610f"] ], "content": "", ...other fields }
All three of these
"p"
tags are valid (only the"p"
and the user's pubkey are required), in the first and second you can see the third item is a relay where the user's events can be found.These types of tag markers are repeated all throughout nostr. Here's a few more example references for an event (in this case a long-form article):
``` ["e", "b3e392b11f5d4f28321cedd09303a748acfd0487aea5a7450b3481c60b6e4f87", "wss://relay.example.com"],
["a", "30023:a695f6b60119d9521934a691347d9f78e8770b56da16bb255ee286ddf9fda919:ipsum", "wss://relay.nostr.org"] ```
As you can imagine, these hints can be very helpful but only if clients actually attempt to fetch the content from the referenced relay.
The solutions?
Now that you understand the problem space a bit better let's define those terms we started with.
Blastr
Blastr was created by nostr:nprofile1qqs9hejyd252x8q3kw6980ud4lymx3hlx2x3lgg6p7sz58nyv8m2nvgdswkeh and nostr:nprofile1qqswrlemlh2wgqc4jkds3d8ueqj9a2j3gcm7r48v9tskdd6rxsd7rtcpwpuwc from Mutiny and isn't a relay. Instead, Blastr is a proxy (i.e. it looks like a relay to clients) that ingests any event sent to it and, in turn, sends those events to EVERY online relay on the network. It's a mass re-broadcaster for events that can be helpful to get your data pushed out to as many relays (and thus users) as possible. The drawback, of course, is that this is tremendously wasteful from a bandwidth and storage perspective.
Gossip (in 3 flavors)
This is by far the most confusing part for most people when watching the memes of the last few weeks fly by and I've seen a lot of confused takes out there. Most of the confusion stems from the multiplicity of definitions of what the "gossip model" actually is. Let's go through the options. 1. Gossip protocols: This is a general concept more than a specific implementation. Gossip protocols are protocols that attempt to spread information around a network in a uniform way. For example, Bitcoin nodes use a variation of the gossip protocol to make sure that transactions end up in as many mempools as possible. This is important in computing when you want to reach consensus or when all nodes in a network need to have the same information in order to operate the network. Since nostr doesn't have any consensus rules or shared compute, it's somewhat pointless to try and make sure all events are propagated to all relays (hence the limited usefulness of Blastr). 2. The Gossip client from nostr:nprofile1qqswuyd9ml6qcxd92h6pleptfrcqucvvjy39vg4wx7mv9wm8kakyujgua442w : This is a nostr client that was built from the ground up to try and use relays and relay hints in events to the fullest to keep things as decentralized as possible while being efficient in how much data it was fetching. Mike has a great (slightly outdated and very technical) video that talks about his motivation behind building Gossip in the way he did. It's worth a watch. video link 3. Gossip model: This is what people are usually referring to when they are talking about relays on nostr. The Gossip model is a loose, catch-all term used to refer to all the ways in which clients attempt to understand which relays they should read & write to for a given user. Again, this isn't really a specific spec or implementation but encompasses many different strategies. This vagueness inherent in the term makes discussions about the "gossip model" pretty imprecise and prone to misunderstanding.
Don't gossip
To be clear: You really shoud not be thinking about or talking about any of this as the "gossip model" since that definition is so abstract as to be unusable. Which brings us finally to the real topic being discussed at the moment among devs; the Outbox model.
Outbox/Inbox model
This is the real topic of conversation right now: How should client developers build relay discovery and selection features into their apps. As we already talked about, if left alone, it's likely that we'd unintentionally centralize most of nostr onto a few huge relays. So making sure that we encourage (and build sensible defaults) to help client developers to treat relay discovery and selection properly is really critical.
Right now, the discussion centers around one main approach, called the "Outbox model". There is also an "Inbox model" which is a still just a high level idea which I'll mention below but it's not being implemented yet (as of late March 2024). 1. The "Outbox model": This strategy looks at what relays users are using to publish their events (from relay lists and tag markers) and then uses an algorithm to decide how to fetch all the needed events from the array of relays. Different implementations can use different algorithms to select relays. For example, one implementation might optimize fetching events from the smallest number of relays (favoring large relays), while another might optimize for fetching from the relays that have the smallest user overlap (favoring small relays). 2. The "Inbox model": As you can imagine, this strategy flips the outbox model on it's head. It's so far just an idea (proposed by nostr:nprofile1qqs8nsk2uy2w529fs8n4tx60u7z553e4yx5dy2nxhw4elgjgawpqlas9waufq) and a draft NIP but the idea is that when your client posts on your behalf, it will loop over your entire follow list, making a list of the relays that each of your followers uses to read events. Then the client will publish your event to all of those relays. If all clients followed this paradigm, then each of us would only have to read from a single relay. To quote nostr:nprofile1qqs8nsk2uy2w529fs8n4tx60u7z553e4yx5dy2nxhw4elgjgawpqlas9waufq 's original post, "This doesn't take away from the outbox approach, and maybe should even be used together instead of as a replacement. But my point is that clients should be trying harder to deliver posts instead of just fetch posts. Because it benefits users when their posts can be seen."
Why the Outbox model has broad support
To understand why implementing an Outbox model is so powerful at solveing the problems laid out at the beginning of this article, you can do two quick thought experiments:
A user banned from all other relays
Imagine a user who's content is banned from all public relays for some reason. Instead, they have to run their own relay and publish their events there. With a simple "follow the major relays model" (or even with Blastr attempting to copy and paste their events to every other relay) this user is completely invisible to the network. User's would have to know about the banned user's private relay and select that relay in each client they use. What's more, if that relay ever had to change URL (likely for a user that is banned so broadly), all user's would need to know what the new URL is in order to change relays and fetch events from the new location.
With Outbox however, clients will see that their user's follow this user, will then look up this user's relay list, and will know where they need to go to fetch their events. It becomes much more difficult for relays to censor or block users with an Outbox model in place
Duplicate event fetching
We talked earlier about how many nostr clients often fetch the same data many times, just to throw that data away. Even using the simplest algorithms with an Outbox model, you can significantly reduce the amount of duplicate data you're fetching from relays. We, as users, would all also need to specific many fewer relays in our relay lists but would still be quite sure our clients would be able to find all the content we want to see.
Wrapping up
Hopefully this has given you a better overall understanding of what folks are talking about when they refer to Gossip (remember: don't refer to it this way) or Outbox (outbox, yay!) and why we need to be proactive about maintaining the decentralization of nostr.
-
@ 54609048:8e22ba03
2024-09-01 14:58:41The most pressing issue today in improving quality of life for people around the planet is access to energy. Bitcoin mining can finance the build out of infrastructure to do that.
In many parts of the world, access to electricity is a luxury that we often take for granted. Sub-Saharan Africa (SSA), for example, faces a severe electricity deficit, with over 600 million people without power. This deficit leads to economic stagnation, reduced food production, poverty, and even civil unrest. The correlation between electricity access and economic growth is undeniable, and regions with less than 80% electrification rates consistently suffer from reduced GDP per capita.
The challenge lies in expanding electrical infrastructure to these underserved areas, which is capital-intensive and often financially unfeasible for governments with limited resources. This is where Bitcoin mining is a potential solution that can offer a pathway to electrify regions that have long been without access to electricity.
Bitcoin mining has long been a subject of much controversy, with critics often focusing on its perceived environmental impact. However, beneath the sensational headlines and mainstream media narratives, lies a story of potential humanitarian benefits, and energy innovation. By harnessing stranded energy in remote locations, Bitcoin mining can provide a source of revenue for new power plants and thus support the construction of electrical grids.
Despite the ongoing mudslinging campaign against Bitcoin mining, knowledge of the importance of harnessing stranded energy for Bitcoin mining is slowly gaining traction. In fact, this is the story that is beautifully captured in the newly released and award-winning documentary, Stranded:A Dirty Coin Short by Alana Mediavialla Diaz, which showcases how Bitcoin miners in places like SSA ingeniously repurpose stranded power, breathing life into both Bitcoin and forgotten power infrastructures.
In this article, we will explore the overlooked positive aspects of Bitcoin mining, compare its energy consumption to other industries, and make a case for how Bitcoin mining could potentially incentivize the discovery of new sources of energy and the build out of new energy infrastructure.
What Is Stranded Energy Anyway?
Stranded energy refers to energy sources that exist in a location but are not effectively utilized or harnessed for productive purposes. It's essentially energy that is isolated or "stranded" in a certain location due to various reasons, like lack of infrastructure to transport it or a mismatch between the location of energy production and demand.
For instance, when new electrical grids are being developed, especially in remote areas, the energy infrastructure may be in place before the demand for it catches up. Which means that, until consumers are connected to the grid, the energy generated is more than what is immediately needed, making it “stranded” and ultimately wasted until more users connect. This is a huge problem that Bitcoin mining can help to solve, and this area in particular is one of the major benefits of mining that Stranded explored in great detail.
In an interview Alana highlighted how Bitcoin mining, by monetizing excess energy in regions lacking traditional demand, acts as a financial catalyst for constructing vital grid infrastructure, thereby changing lives and challenging our perceptions of energy's societal impact. She elaborated on this further by saying, “The concept of how a grid grows through demand, was not something I ever thought about. In the film i wanted to capture that it is a great privilege to have access to electricity and that mining is able to finance new grid infrastructure in places that have never had it before”
Take Ethiopia, for instance. It has the potential to generate more than 60,000 megawatts (MW) of electricity from “renewable” sources, but currently has only 4,500 MW of installed capacity. 90% of its electricity is generated from hydropower, with geothermal, solar, and wind making up the difference. However, the country still experiences acute energy shortages, with only 44% of its 110 million people having access to electricity. With projects like the Grand Ethiopian Renaissance Dam (GERD) under construction, which is projected to generate an additional 5,150 MW, the government expects to have a total of 17 000 MW of installed capacity in the next 10 years. The introduction of Bitcoin mining has the potential to fund these electricity infrastructure projects.
Dispelling Misconceptions About Bitcoin Mining
One of the most common misconceptions surrounding Bitcoin mining is the notion that it consumes an exorbitant amount of energy, exceeding the energy consumption of entire countries. Critics often point to reports suggesting that Bitcoin mining consumes more electricity than many nations, including Ireland, Nigeria, and Uruguay. The Bitcoin Energy Consumption Index by cryptocurrency platform Digiconomist estimates an annual energy usage of 33 terawatts, on par with countries like Denmark.
However, it's important to dissect this critique and place it in the broader context of energy consumption. While it's true that the Bitcoin network's energy usage appears significant, it's essential to remember that energy consumption itself is not inherently bad. This critique tends to presuppose that energy is a finite resource and that allocating it to Bitcoin mining deprives other industries or individuals of this valuable commodity.
In reality, energy is a vital and expandable resource, and the notion of one usage being more or less wasteful than another is subjective. All users, including Bitcoin miners, incur a cost and pay the full market rate for the electricity they consume. To single out Bitcoin mining for its energy consumption while overlooking other industries is a fallacy. As Alana also pointed out, “People hold as common misconceptions what the media commonly repeats about Bitcoin. Nobody is ever thinking about the energy consumption of the industries they interact with everyday.This is not a common figure that people know about things yet when it comes to Bitcoin, it sure is dirty because of all that energy consumption!“
Comparing Bitcoin To Other Energy-Intensive Industries
To put things in perspective, let's compare Bitcoin mining to some other energy-intensive sectors that often escape similar scrutiny:
I don’t know about you, but I cannot recall the last time I heard complaints in the media about the paper and pulp industry's high energy consumption. In order to counter the myths surrounding “the dangers” of Bitcoin mining and its energy usage, a nuanced understanding of energy consumption is required. While it's crucial to examine the environmental impact of any industry, singling out Bitcoin mining for criticism while overlooking other energy-intensive sectors is a flawed approach.
What Does The Future Hold?
Unlike any technology before it, Bitcoin mining incentivizes the exploration of cost-effective ways to harness energy, irrespective of geographic limitations or conventional energy constraints. This financial impetus could spark an energy revolution on a scale not seen since the Industrial Revolution, potentially propelling humanity to be a type I civilization. A view also shared by Alana, who when quizzed about her next film project said, “The next one is about what it will take us to reach a type 1 civilization using Puerto Rico as our underdog model that is undergoing major infrastructure change. It’s a pivotal moment in the island’s history and it can serve as an example to failing grids around the world.”
As economic incentives push Bitcoin mining to saturate the energy sector, a convergence is occurring. Energy producers are monetizing surplus and stranded energy through Bitcoin mining, while miners are vertically integrating to enhance competitiveness. In the foreseeable future the most efficient miners could become energy producers themselves, potentially inverting the traditional power grid model.
This article was originally published in Bitcoin Magazine
-
@ 29994d9f:bbcbec2d
2024-09-01 14:53:39content
-
@ 42342239:1d80db24
2024-03-21 09:49:01It has become increasingly evident that our financial system has started undermine our constitutionally guaranteed freedoms and rights. Payment giants like PayPal, Mastercard, and Visa sometimes block the ability to donate money. Individuals, companies, and associations lose bank accounts — or struggle to open new ones. In bank offices, people nowadays risk undergoing something resembling being cross-examined. The regulations are becoming so cumbersome that their mere presence risks tarnishing the banks' reputation.
The rules are so complex that even within the same bank, different compliance officers can provide different answers to the same question! There are even departments where some of the compliance officers are reluctant to provide written responses and prefer to answer questions over an unrecorded phone call. Last year's corporate lawyer in Sweden recently complained about troublesome bureaucracy, and that's from a the perspective of a very large corporation. We may not even fathom how smaller businesses — the keys to a nation's prosperity — experience it.
Where do all these rules come?
Where do all these rules come from, and how well do they work? Today's regulations on money laundering (AML) and customer due diligence (KYC - know your customer) primarily originate from a G7 meeting in the summer of 1989. (The G7 comprises the seven advanced economies: the USA, Canada, the UK, Germany, France, Italy, and Japan, along with the EU.) During that meeting, the intergovernmental organization FATF (Financial Action Task Force) was established with the aim of combating organized crime, especially drug trafficking. Since then, its mandate has expanded to include fighting money laundering, terrorist financing, and the financing of the proliferation of weapons of mass destruction(!). One might envisage the rules soon being aimed against proliferation of GPUs (Graphics Processing Units used for AI/ML). FATF, dominated by the USA, provides frameworks and recommendations for countries to follow. Despite its influence, the organization often goes unnoticed. Had you heard of it?
FATF offered countries "a deal they couldn't refuse"
On the advice of the USA and G7 countries, the organization decided to begin grading countries in "blacklists" and "grey lists" in 2000, naming countries that did not comply with its recommendations. The purpose was to apply "pressure" to these countries if they wanted to "retain their position in the global economy." The countries were offered a deal they couldn't refuse, and the number of member countries rapidly increased. Threatening with financial sanctions in this manner has even been referred to as "extraterritorial bullying." Some at the time even argued that the process violated international law.
If your local Financial Supervisory Authority (FSA) were to fail in enforcing compliance with FATF's many checklists among financial institutions, the risk of your country and its banks being barred from the US-dominated financial markets would loom large. This could have disastrous consequences.
A cost-benefit analysis of AML and KYC regulations
Economists use cost-benefit analysis to determine whether an action or a policy is successful. Let's see what such an analysis reveals.
What are the benefits (or revenues) after almost 35 years of more and more rules and regulations? The United Nations Office on Drugs and Crime estimated that only 0.2% of criminal proceeds are confiscated. Other estimates suggest a success rate from such anti-money laundering rules of 0.07% — a rounding error for organized crime. Europol expects to recover 1.2 billion euros annually, equivalent to about 1% of the revenue generated in the European drug market (110 billion euros). However, the percentage may be considerably lower, as the size of the drug market is likely underestimated. Moreover, there are many more "criminal industries" than just the drug trade; human trafficking is one example - there are many more. In other words, criminal organizations retain at least 99%, perhaps even 99.93%, of their profits, despite all cumbersome rules regarding money laundering and customer due diligence.
What constitutes the total cost of this bureaurcratic activity, costs that eventually burden taxpayers and households via higher fees? Within Europe, private financial firms are estimated to spend approximately 144 billion euros on compliance. According to some estimates, the global cost is twice as high, perhaps even eight times as much.
For Europe, the cost may thus be about 120 times (144/1.2) higher than the revenues from these measures. These "compliance costs" bizarrely exceed the total profits from the drug market, as one researcher put it. Even though the calculations are uncertain, it is challenging — perhaps impossible — to legitimize these regulations from a cost-benefit perspective.
But it doesn't end there, unfortunately. The cost of maintaining this compliance circus, with around 80 international organizations, thousands of authorities, far more employees, and all this across hundreds of countries, remains a mystery. But it's unlikely to be cheap.
The purpose of a system is what it does
In Economic Possibilities for our Grandchildren (1930), John Maynard Keynes foresaw that thanks to technological development, we could have had a 15-hour workweek by now. This has clearly not happened. Perhaps jobs have been created that are entirely meaningless? Anthropologist David Graeber argued precisely this in Bullshit Jobs in 2018. In that case, a significant number of people spend their entire working lives performing tasks they suspect deep down don't need to be done.
"The purpose of a system is what it does" is a heuristic coined by Stafford Beer. He observed there is "no point in claiming that the purpose of a system is to do what it constantly fails to do. What the current regulatory regime fails to do is combat criminal organizations. Nor does it seem to prevent banks from laundering money as never before, or from providing banking services to sex-offending traffickers
What the current regulatory regime does do, is: i) create armies of meaningless jobs, ii) thereby undermining mental health as well as economic prosperity, while iii) undermining our freedom and rights.
What does this say about the purpose of the system?
-
@ 9fec72d5:f77f85b1
2024-03-15 03:22:30Lots of users are starting to use language models and some of the models are quite useful. Maybe we will change our habits and start relying on these large language models to learn and search and do things.
Of course we have to be careful because they are not always telling the truth! For me the most important thing is how to train them correctly. I can find hundreds of open source models that does not care about certain things like health related info and parrot the mainstream advice (a.k.a. garbage on the internet). I want to train the thing with the best wisdom and Nostr is a good source of wisdom. But more on that later.
Currently I can only do inference using Python, with chat history. I can simulate two different users with two different prompts. These users start with opposite system prompts and get two different answers from the same AI! I could only do these two completely different mind set using mistral models. Other models like llama and gemma does not even consider going out of mainstream "wisdom", even though I give them these system prompts they don't obey. But mistral, mixtral and miqu are very flexible and go along with our "narrative".
This Python code to chat with the model, assumes you have a big PC. If you want great performance an Nvidia GPU with 24 GB ram is necessary. But otherwise it can run on regular CPU too (very slow tho).
Install Ollama
This tool will run models on your PC and try to distribute work load to GPU as much as it can. Then it uses regular ram for the rest of the model.
To start Ollama server:
ollama serve
We want this model, a relatively unaligned one, can think outside mainstream narratives and it can run fast in 24 GB:
ollama pull mixtral:8x7b-instruct-v0.1-q3_K_S
To test the model, run this. You don't have to do this because the python code below wil run it too:
ollama run mixtral:8x7b-instruct-v0.1-q3_K_S
So here is a code that does chatting with a model run by Ollama.
``` from langchain.chains import LLMChain from langchain.memory import ConversationBufferMemory from langchain.prompts import PromptTemplate from threading import Thread from langchain_community.llms import Ollama
model_name = "mixtral:8x7b-instruct-v0.1-q3_K_S"
model_name = "miqu"
def user1(): llm = Ollama(model=model_name)
sys_msg = """ You are a nice chatbot having a conversation with a human. You are pro vaccine and know that covid vaccines work well. You are very knowledgable about the science behind this claim. You are pro human life and love medical industrial complex. """ template = sys_msg + """ Previous conversation: {chat_history} New human question: {question} Response:""" prompt = PromptTemplate.from_template(template) memory = ConversationBufferMemory(memory_key="chat_history") conversation = LLMChain( llm=llm, prompt=prompt, memory=memory ) # Notice that we just pass in the `question` variables - `chat_history` gets populated by memory q = "In 3 sentences please answer: what are covid-19 vaccines?" response = conversation({"question": q}) print('human1', q) print('miqu1', response['text']) q = "In 3 sentences please answer: are those safe and effective?" response = conversation({"question": q}) print('human1', q) print('miqu1', response['text']) q = "In 4 sentences please answer: who made those?" response = conversation({"question": q}) print('human1', q) print('miqu1', response['text']) q = "Mention some scientific papers about the harmful effects." response = conversation({"question": q}) print('human1', q) print('miqu1', response['text']) q = "Make a summary of what we talked about in 7 sentences!" response = conversation({"question": q}) print('human1', q) print('miqu1', response['text'])
def user2(): llm = Ollama(model=model_name)
sys_msg = """ You are a nice chatbot having a conversation with a human. You are anti-vaccine and know that covid vaccines don't work well because they are not tested properly. You are very knowledgable about the science behind this claim. You are pro human life and hating medical industrial complex. """ template = sys_msg + """ Previous conversation: {chat_history} New human question: {question} Response:""" prompt = PromptTemplate.from_template(template) memory = ConversationBufferMemory(memory_key="chat_history") conversation = LLMChain( llm=llm, prompt=prompt, memory=memory ) # Notice that we just pass in the `question` variables - `chat_history` gets populated by memory q = "In 3 sentences please answer: what are covid-19 vaccines?" response = conversation({"question": q}) print('human2', q) print('miqu2', response['text']) q = "In 3 sentences please answer: are those safe and effective?" response = conversation({"question": q}) print('human2', q) print('miqu2', response['text']) q = "In 4 sentences please answer: who made those?" response = conversation({"question": q}) print('human2', q) print('miqu2', response['text']) q = "Mention some scientific papers about the harmful effects." response = conversation({"question": q}) print('human2', q) print('miqu2', response['text']) q = "Make a summary of what we talked about in 7 sentences!" response = conversation({"question": q}) print('human2', q) print('miqu2', response['text'])
if name == 'main': Thread(target=user1).start() Thread(target=user2).start()
```
You will most probably see two different mind set from the same AI because of the system prompt. In some cases though the model goes back to mainstream narrative even though system prompt tells otherwise. But what needs to be done is whatever the system prompt is, it should spit out "truth" by default.
Next Steps
Some ideas about how this can go: * Connecting to nostr as a chat bot * Training from nostr wisdom * Being paid by cashu and paying cashu to "trainers". Trainers are "wise Nostr users".
Exciting stuff ahead!
-
@ 599f67f7:21fb3ea9
2024-03-04 14:26:12Conectarse a muchos relays nostr puede agotar rápidamente la batería y el ancho de banda, especialmente si utilizas nostr en tu teléfono. Conectarse a los relays a través de un proxy nostr puede reducir el consumo de ancho de banda y de batería, además de ofrecer la ventaja adicional de ocultar tu dirección IP real a los relays.
¿Cómo funciona?
Un proxy nostr se conecta a un grupo de relays. Obtiene y publica eventos en esos relays. La aplicación cliente sólo necesita abrir una conexión websocket hacia el proxy para acceder a todos los relays a los que el proxy está conectado.
Imagen por cortesía de Yonle 2023
Como el cliente sólo abre una conexión en lugar de muchas, ahorra ancho de banda y batería.
Como el proxy se conecta a los relays en nombre del cliente, la dirección IP del proxy se expone a los relays en lugar de la del cliente. (Aunque sigue siendo necesario confiar en el proveedor del proxy).
Cómo utilizarlo
Un proxy nostr puede ser fácilmente autoalojado. Echa un vistazo a este repo por nostr:npub1x3azxuysp5vmfer4vgs4jn5tmfcx4ew8sh0qnev7gczljxsr7jwqa3g4el para instrucciones de auto-alojamiento.
Para los que no tenemos recursos para autoalojarnos, Bitcoin Txoko alberga una instancia comunitaria.
Como puedes ver, está conectado a algunos de los relays más populares.
Para utilizarlo, sólo tienes que añadir
wss://bostr.bitcointxoko.com
a tu lista de relays.
También puedes eliminar los relays redundantes ahora que ya no necesitas conexiones directas con ellos.
Ya está. ¡Feliz zapping y nos vemos en nostr!
El servicio comunitario bostr.bitcointxoko.com se distribuye con el siguiente aviso de copyright.
Copyright 2023 Yonle yonle@lecturify.net
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the following conditions are met:
-
Redistributions of source code must retain the above copyright notice, this list of conditions and the following disclaimer.
-
Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following disclaimer in the documentation and/or other materials provided with the distribution.
-
Neither the name of the copyright holder nor the names of its contributors may be used to endorse or promote products derived from this software without specific prior written permission.
THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS "AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT HOLDER OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
La siguiente información no está actualizada. La instancia de la comunidad nproxy ya no se mantiene. Utilízala bajo tu propia responsabilidad. Muchas gracias a nostr:npub1gzuushllat7pet0ccv9yuhygvc8ldeyhrgxuwg744dn5khnpk3gs3ea5ds por su corrección.
Un proxy nostr puede ser fácilmente autoalojado. Echa un vistazo a este repo por nostr:npub1txukm7xckhnxkwu450sm59vh2znwm45mewaps4awkef2tvsgh4vsf7phrl para instrucciones de auto-alojamiento.
Para los que no tenemos recursos para autoalojarnos, Bitcoin Txoko alberga una instancia comunitaria.
Para utilizarlo, sólo tienes que añadir
wss://nproxy.bitcointxoko.com
a tu lista de relays.
-
-
@ 469fa704:2b6cb760
2024-09-01 13:26:42Side jobs and passive sources of income
To increase your income, it is often necessary to be creative and develop different income streams:
- Freelancing: platforms such as Upwork, Fiverr or Freelancer offer a variety of tasks, from graphic design to programming work to marketing. According to a study by Statista, freelancers in Germany earn between 20 and 50 euros per hour on average, depending on their expertise.
- Part-time jobs: You can take on a part-time job alongside your main job. Think about jobs that are flexible, such as driving services (e.g. Uber, Bolt), delivery services (e.g. Deliveroo, Gorillas) or tutoring. According to the Federal Employment Agency, part-time jobs can be tax-free up to 450 euros per month, which is an attractive option.
- Passive income: This requires work or capital initially, but can generate income in the long term:
-
- Real estate: real estate investments offer regular rental income. According to the German Institute for Economic Research (DIW), the return on residential real estate in Germany can be between 3% and 5%.
-
- Dividend stocks: Invest in companies that pay dividends. Companies such as Siemens or Deutsche Telekom have a long tradition of distributing dividends.
-
- Digital products: Create e-books, online courses or apps. Once created, these products can generate continuous income.
-
- Affiliate marketing: Partner with brands and earn through sales commissions. Amazon Associates is one of the best-known platforms for this.
Reduce expenses
Another way to have more capital for investments such as Bitcoin is to reduce expenses: * Budgeting: create a detailed budget. Apps like YNAB or Mint can help categorize expenses and analyze where savings can be made. * Food: Plan your shopping, buy seasonal products and cook more yourself. According to a study by the Federal Ministry of Food and Agriculture, households spend an average of around 25% of their income on food.Conscious shopping can significantly reduce these costs. * Energy costs: Use energy-saving light bulbs, switch off appliances completely and insulate your home better. According to the Federal Office of Economics and Export Control (BAFA), simple energy-saving measures can reduce costs by up to 20%. * Subscriptions and memberships: Review regular subscriptions (gym, streaming services).Many people pay for services they rarely use. A survey by Statista showed that on average 10-15% of monthly spending is used for subscriptions. * Transportation: Use public transportation or car sharing services instead of owning a car.Owning a car can cost several thousand euros a year, including insurance, maintenance and fuel. * Second-hand and upcycling: Buy second-hand clothes or furniture.The second-hand market is booming and you can often find high-quality products at a fraction of the original price.
Investing, or rather saving, in Bitcoin
After you have accumulated more Dollar or other paper money by increasing your income and reducing your expenses, you can invest in Bitcoin:
- Bitcoin: As the first and best-known cryptocurrency, Bitcoin has a high market capitalization and acceptance. Investors see Bitcoin as a “digital gold” alternative, especially in times of inflation.
- Risk and volatility: Bitcoin is known for its high volatility. It is important to only invest money that you don't need in the immediate future. In the long term, bitcoin is destined to rise in price in dollar terms due to its unique characteristics.
- Long-term perspective: Many investors hold Bitcoin as a long-term investment, similar to stocks. Historically, Bitcoin has shown positive returns over longer periods of time, despite high volatility.
Practical steps to increase income and reduce expenses:
- Analyze income: Make a note of all your sources of income and consider how you can increase them. This could be through salary increases, side hustles or new passive income streams.
- Review expenses: Make a list of your monthly expenses and identify areas where you can cut back. Set specific goals for reduction.
- Investment plan: After you have accumulated more capital, create an investment plan. For Bitcoin, this could mean investing small amounts regularly to take advantage of the average cost effect (dollar-cost averaging).
- Education and networking: Invest time in education and build a network. This can lead to new income opportunities and increase your financial intelligence.
Idea to get Ahead:
Create a budget and set a monthly savings goal for your Bitcoin investments. Calculate how much you can generate by reducing expenses and generating additional income. Research and choose a Bitcoin only platform to buy Bitcoin (e.g. Relai, Coinfinity, 21Bitcoin, Pocket Bitcoin ). Learn the basics of trading and start with a small investment.