-
@ 460c25e6:ef85065c
2024-10-15 12:49:55NIPs (Nostr Implementation Possibilities) are technical specifications that Nostr developers create to define how specific event types and tags are used. These can be written before or after the feature is implemented and often go through multiple revisions before becoming stable enough to matter. Once two or more clients fully implement the proposal, it is merged into the main repository. This process ensures that while new ideas are encouraged, they are also rigorously reviewed and tested.
There are generally two paths for NIPs: 1. New Ideas, when developers just have a hunch on a new solution and want to quickly write something up to gather feedback from the community. These are my favorite NIPs because they generally introduce a new way of thinking about a problem we are all having. And because they are not just a general solution, but a specific proposal, it allows us to see the entire picture in just a few paragraphs. Even though they are my favorite, they are quite "green" and usually spur 2-3 separate solutions in following PRs by different authors. 2. Existing implementations that need to explain what they are doing. These happen when a client is already running the code in production and simply wants to explain to the rest of the community how to generate and interpret the events the client is creating. These NIPs start much more stable than the former and allow for fewer changes, but because there is already an implementation available, it's a market-tested solution that might just need a few adjustments before others start implementing it.
Well-written specs ensure clarity, reduce ambiguity, and help developers implement the proposal consistently. The text should be VERY short, precise, prescriptive, and actionable by other devs. Start by introducing the new kind or tag in the first sentence and jump straight into a mockup of how the event looks like. The mockup should be self-explanatory and provide clues to what the remaining of the document will talk about. Some folks like to add long/verbose introductions, conclusions, and discussions of the reasons why the NIP is needed or why certain features are there. But those are largely unnecessary and are more appropriate to be placed in the body of the Pull Request descriptor.
Start your NIP with the following template:
``` NIP-
====== draft
optional
Event kind
defines . Tags . As an example: `jsonc { "kind": <your kind>, "tags": [ <your tags> ], "content": "", //... }
`Relays MUST...
Clients MUST...
```
Your number for the NIP is irrelevant. Just pick a random number that is available so that you can fork the repo, create a file with that name, and start writing. This number will likely change once the NIP is merged.
The NIPs title must be self-explanatory and short. If it helps, try to imagine which name would be best to add to the list of NIPs on the readme.md file. Same for event type names. Picture something that is short, unique and that devs can just remove the space to have a class name.
The
draft
optional
tags are there because unless you are working on NIP-01, everything is draft and everything is optional. If you want to write a mandatory NIP, you better make sure your text is so good that it can be added to01.md
directly without overcomplicating the protocol.Start by describing the new event type, what it does and its main tags. Show the mockup and then start introducing all the other tags and how clients and relays should behave when implementing it. Use the words MUST, SHOULD, MAY, SHOULD NOT, and MUST NOT to define the mandatory behaviors of those declaring compliance with the NIP.
Keep it simple. The specification should be designed to ensure that different clients, relays, and services can implement it without requiring substantial changes to their existing infrastructure. Ideally, devs should be able to implement the entire NIP from near scratch in just a few hours. Don't use jargon. Don't declare a vocabulary of words. Use simple words that anyone can understand and quickly code a demo of all the features in the NIP. They can learn about your reasons as they develop their implementation.
Write expecting buggy implementations. The protocol must be resilient to varying implementations and network conditions, and gracefully handle coding errors or random gibberish. You want to promote a defensive design that anticipates misguided implementations, avoids breaking changes, and maximizes compatibility across the ecosystem. What happens if there are two tags with the same name? What happens if events that have missing tags are found? Buggy implementations will exist. The writing and reading clients are generally different and must be ready for anything that shows up on each side.
Avoid abstractions, extensible and modular designs. Yes, they can be hidden underneath your text, but writing for them is a mistake and just overcomplicates things. Write for a specific use case and close all possible options to the items/features declared in the text. Make sure you are implementing those. There is no point in declaring things that are not going to be used in the short term. We can always add more in the future and we don't need a recipe on how to add more later.
Label your relay hosts, setting kinds, and other data management necessities. Every NIP has a way to find out the user's preferred relay associated with the use case. Sometimes it's through a relay hint others through a separate event kind that just lists the user's home relays or contains a list of "following" events designed for the use case. Each NIP can create their own way of finding events.
You cannot add new root fields. Use tags instead. Root fields are special and require changes to the core protocol everyone implements. Any new field will take years to come to reality.
Once you propose an idea, try not to change too much. It will take time for other devs to wrap their minds around it. If you keep changing it, even if those changes reflect the request of the reviewers in the PR, it just confuses everyone. Sometimes things change so much that it is worth doing two PRs with separate specifications that solve the same problem. That allows devs to analyze the two propositions side by side and decide which one is better.
Always add a test case or an example. This is an absolute requirement if the NIP is complex, like a new encryption scheme. But even for simpler NIPs, test cases help devs to quickly verify if their implementations meet the minimum standard for compliance. They not only add peace of mind, but they also provide some welcoming dopamine when a new dev is trying to implement your NIP.
Managing state is hard. Doing it with different implementations and hosting them in separate relays is even harder. If your NIP has multiple events to manage state, like group administration actions (add/remove member, change names/icons, invite/reporting events) try to structure them in a way that devs can quickly see the state machine of all possible state changes.
Specify data formats explicitly. Clearly define the format of all data fields, including type (e.g., string, integer), encoding (e.g., base64, hex), and structure (e.g., array, object). Specify constraints like length limits, valid characters, and optional/required fields. Tags are case-sensitive. Avoid having to specify new encodings, but if you do, make sure to include test cases that encompass all potential cases.
It's ok to not propose the most efficient way of solving the problem. A simple but slightly less efficient design is preferred over a complex but more efficient one. We already use hex and base64 codes to represent binary bytes in JSON, which wastes 25-50% of space. That level of waste is ok if the solution becomes simpler to code.
It's not about you. You may think you must convince everyone that your particular way of solving the problem is the best and get some ego points with yourself. While some of that is beneficial to the debate, be open-minded to the other possible solutions. Once merged, the NIP is not yours anymore. Anyone can change in any way they see fit. If your work is great, people will remember your name. If it just got the conversation started to become something completely different from what you proposed, they will also remember you.
-
@ 4f82bced:b8928630
2024-10-15 12:06:04Lusaka was a short stop as we headed towards Victoria Falls. Its infrastructure caught us off guard. Good roads, accessible amenities, and many malls. A stark contrast to Malawi, a neighboring country we had just visited. Entering one such mall in Lusaksa felt like we were back in Toronto. Driven by government, private, and foreign investment, Lusaka seemed to be miles ahead of other landlocked countries we had visited.
During our time in the city, we visited a restaurant that accepts bitcoin and hosts local bitcoin meet-ups. While interacting with the owner it was clear he viewed bitcoin as a competitive differentiator and an efficient easier form of payment acceptance. Since our meeting, he has increased his marketing efforts to raise awareness and inform his customers about bitcoin.
Victoria Falls (Mosi-oa-Tunya) is a major tourist attraction in Zambia, stretching nearly 1.7km! Due to recent droughts, the falls were no longer a blanket of water. Only certain sections had a steady flow, exposing the rock formations behind the water, an uncommon sight for visitors.
The waterfalls aside, we were invited to speak at the Bitcoin community meetup, Bitcoin Victoria Falls. The founder of this community is American, who decided to kickstart the project during a recent visit to the area. It was the first time we had encountered a community founded by a foreigner who didn't live in the region. It shows that anyone can bring forth change regardless of where they live! Can't forget his co-founder and running mate, Humprey, a local who has helped progress their mission!
Our presentation topic? Bitcoin for Businesses. We discussed the basics of bitcoin, how it works, how to earn it, and most importantly, how to onboard merchants. It's great interacting with the local community to understand their challenges. Fortunately, this community has decent bitcoin penetration. The lodge where the meetup was held accepts bitcoin, including a taxi service, a tour operator, and a stationary provider. During our stay, we onboarded the bar and its servers within the lodge premises. The owners appreciated the speed at which they could settle payments and easily accept money from foreigners who may not have cash.
Did you know, that the Zambezi River which runs below Victoria Falls is world renowned for its white water rafting? We had the chance to experience it ourselves and pay with bitcoin!
Botswana here we come.
Sources: Victoria Falls. Britannia. https://www.britannica.com/place/Victoria-Falls-waterfall-Zambia-Zimbabwe
-
@ 4ba8e86d:89d32de4
2024-10-15 01:18:43A história do Kali Linux se inicia em 2006, quando uma distribuição Linux chamada BackTrack foi lançada. O BackTrack foi uma distro baseada em Ubuntu e possuía o mesmo intuito do Kali Linux, auxiliar profissionais de segurança da informação. Em 2013, a Offensive Security, empresa que mantém o Kali Linux, anunciou o fim do suporte ao BackTrack, apresentando o Kali Linux que, diferente do BackTrack, tem como base o Debian. E assim nasceu a distribuição mais popular da área de segurança da informação. Principais ferramentas do Kali Linux A distribuição possui um arsenal com mais de 300 ferramentas nativas exclusivas para atividades de segurança e pentests. O Kali Linux inclui por padrão ferramentas como:
Nmap: Uma das ferramentas mais populares do Kali Linux, o Nmap é um scanner de rede que permite a descoberta de dispositivos na rede, além de fornecer informações detalhadas sobre portas abertas, serviços em execução e sistema operacional dos dispositivos.
Metasploit Framework: Uma poderosa estrutura de testes de penetração, o Metasploit Framework oferece um conjunto abrangente de ferramentas e recursos para realizar ataques simulados em sistemas e redes, com o objetivo de identificar vulnerabilidades e melhorar a segurança.
Wireshark: Uma ferramenta de análise de tráfego de rede, o Wireshark permite capturar e examinar pacotes de dados em uma rede. Com ele, os profissionais de segurança podem identificar possíveis ameaças, analisar o tráfego de rede e realizar investigações forenses.
John the Ripper: Uma ferramenta de quebra de senhas, o John the Ripper é amplamente utilizado para testar a segurança de senhas em sistemas. Ele pode realizar ataques de força bruta e ataques de dicionário para recuperar senhas de arquivos criptografados.
Aircrack-ng: Essa ferramenta é voltada para auditoria de segurança em redes sem fio. O Aircrack-ng permite capturar pacotes de rede e realizar testes de penetração em redes Wi-Fi, além de fornecer recursos para quebrar senhas de redes sem fio protegidas.
Burp Suite: Uma suíte de ferramentas para testes de segurança em aplicativos da web, o Burp Suite é amplamente utilizado para encontrar vulnerabilidades e realizar testes de penetração em aplicações da web. Ele oferece recursos avançados, como a interceptação de requisições e respostas HTTP, varredura de vulnerabilidades e manipulação de dados.
Essas são apenas algumas das principais ferramentas incluídas no Kali Linux. A distribuição também conta com ferramentas para forense digital, análise de malware, engenharia reversa, entre outras áreas de segurança da informação.
Além das ferramentas, o Kali Linux também oferece uma interface gráfica amigável, bem como documentação detalhada e uma comunidade ativa, o que facilita o aprendizado e o suporte para os usuários.
O Kali NetHunter é uma plataforma de teste de penetração móvel desenvolvida para dispositivos Android e baseada no Kali Linux. Ele permite que os profissionais de segurança da informação realizem testes de penetração em dispositivos móveis de forma eficiente e conveniente.
O Kali NetHunter consiste em vários componentes principais:
-
App Kali NetHunter: É um aplicativo Android que fornece uma interface amigável para acessar e executar as ferramentas de teste de penetração do Kali Linux diretamente em dispositivos móveis. Ele oferece uma ampla variedade de ferramentas nativas do Kali Linux, como scanners de rede, exploradores de vulnerabilidades, ferramentas de quebra de senhas, entre outras.
-
App Store do Kali NetHunter: É uma loja de aplicativos integrada ao Kali NetHunter, que oferece uma seleção de aplicativos de segurança de terceiros específicos para testes de penetração em dispositivos móveis. Esses aplicativos são verificados e aprovados pela equipe do Kali NetHunter para garantir sua qualidade e segurança.
-
Kali Container: É um ambiente contêiner baseado no Linux que permite executar o Kali Linux em um dispositivo Android sem a necessidade de enraizamento (root). O Kali Container é isolado do sistema operacional host, fornecendo um ambiente seguro para realizar testes de penetração. Ele permite que os usuários executem comandos do Kali Linux e acessem suas ferramentas a partir do dispositivo Android.
-
KeX: É um recurso do Kali NetHunter que permite a execução do ambiente de desktop do Kali Linux em um dispositivo Android. Com o KeX, os usuários podem ter uma experiência de desktop completa, com uma interface gráfica, acesso a aplicativos e recursos do Kali Linux, e a possibilidade de executar várias ferramentas simultaneamente.
O Kali NetHunter oferece uma solução abrangente para testes de penetração em dispositivos móveis, permitindo que os profissionais de segurança realizem avaliações de segurança em smartphones e tablets Android de forma eficiente e controlada. Com sua ampla gama de ferramentas e recursos, o Kali NetHunter facilita a identificação de vulnerabilidades, a realização de testes de segurança e a proteção da segurança dos dispositivos móveis.
Mas informações abaixo. https://www.kali.org/docs/nethunter/
Kali Linux oferece diversas outras características e recursos que contribuem para sua popularidade e eficiência na área de segurança da informação:
-
Personalização e flexibilidade: O Kali Linux é altamente personalizável, permitindo que os usuários ajustem o sistema de acordo com suas necessidades específicas. É possível adicionar ou remover ferramentas, configurar ambientes de trabalho e ajustar as configurações para atender às preferências individuais.
-
Compatibilidade com hardware: O Kali Linux possui amplo suporte para diferentes dispositivos e hardware, permitindo que seja instalado e executado em uma variedade de máquinas, desde laptops e desktops até dispositivos embarcados e plataformas de nuvem. Isso garante que os profissionais de segurança possam utilizar a distribuição em diferentes cenários e ambientes.
-
Atualizações regulares e suporte: A equipe por trás do Kali Linux está em constante desenvolvimento e aprimoramento da distribuição. São lançadas regularmente atualizações de segurança, correções de bugs e novos recursos, garantindo que os usuários tenham acesso às versões mais recentes das ferramentas e aplicativos. Além disso, a comunidade Kali Linux fornece suporte ativo por meio de fóruns, documentação abrangente e recursos educacionais.
-
Ética e legalidade: O Kali Linux enfatiza a importância da ética e legalidade nas atividades de segurança da informação. A distribuição é projetada para ser usada como uma ferramenta educacional e profissional, incentivando os usuários a realizar testes e avaliações de segurança dentro dos limites legais e de maneira responsável.
-
Comunidade e recursos educacionais: O Kali Linux possui uma comunidade ativa e engajada de usuários, profissionais e entusiastas de segurança da informação. Essa comunidade oferece suporte, compartilha conhecimentos, discute tópicos relevantes e promove a troca de informações. Além disso, o Kali Linux disponibiliza uma vasta gama de recursos educacionais, como tutoriais, documentação detalhada e vídeos instrucionais, que ajudam os usuários a aprender e aprimorar suas habilidades em segurança da informação.
O Kali Linux se destaca como a distribuição líder em segurança da informação, oferecendo uma ampla variedade de ferramentas e recursos especializados para testes de invasão, pentest, forense digital e outras áreas. Sua personalização, compatibilidade com hardware, atualizações regulares, ênfase na ética e legalidade, comunidade ativa e recursos educacionais tornam-no uma escolha preferida tanto por estudantes quanto por profissionais em busca de uma plataforma confiável e eficiente para aprimorar suas habilidades e proteger a segurança da informação.
https://www.kali.org/
https://www.kali.org/docs/
https://gitlab.com/kalilinux
-
-
@ 4ba8e86d:89d32de4
2024-10-15 01:11:15Lançado em 2016 como uma versão atualizada e aprimorada do KeePassX, o KeePassXC (Cross-Platform Community Edition) foi desenvolvido por um grupo de desenvolvedores com o objetivo de melhorar a experiência do usuário, adicionar recursos, corrigir bugs e fortalecer a segurança do gerenciador de senhas.
Uma das principais melhorias introduzidas pelo KeePassXC foi a implementação de recursos de segurança avançados. O programa utiliza criptografia AES-256 para proteger o banco de dados, tornando-se um padrão de criptografia amplamente reconhecido. Além disso, foram adicionados recursos como autenticação de dois fatores, suporte a chave de arquivo e melhorias no gerador de senhas. A interface também passou por atualizações, incluindo novos ícones, layouts e melhorias de usabilidade, como recursos de pesquisa avançada, filtragem personalizada e a capacidade de criar entradas personalizadas.
O KeePassXC funciona como um gerenciador de senhas, permitindo que você armazene, organize e acesse suas senhas de forma segura. Aqui está uma explicação simplificada de como ele funciona:
-
Criação do banco de dados: Ao iniciar o KeePassXC, você pode criar um banco de dados onde todas as suas senhas serão armazenadas. Esse banco de dados é um arquivo criptografado e protegido por uma senha mestra.
-
Armazenamento das senhas: Você pode adicionar suas senhas ao banco de dados do KeePassXC. Isso pode ser feito manualmente, inserindo as informações da senha (como nome do site, nome de usuário e senha) em uma entrada específica. O KeePassXC também possui um gerador de senhas que pode criar senhas fortes e únicas para você.
-
Acesso às senhas: Para acessar suas senhas armazenadas, você precisa fornecer a senha mestra. Essa senha é usada para desbloquear o banco de dados criptografado e permitir o acesso às senhas. Certifique-se de escolher uma senha forte e exclusiva para garantir a segurança do seu banco de dados.
-
Preenchimento automático: Uma das principais vantagens do KeePassXC é o recurso de preenchimento automático de senhas. Quando você visita um site ou aplicativo que requer uma senha, o KeePassXC pode preencher automaticamente as informações de login para você, tornando o processo mais conveniente e seguro.
-
Sincronização e backup: O KeePassXC permite que você sincronize seu banco de dados de senhas entre diferentes dispositivos. Isso pode ser feito através de serviços de armazenamento em nuvem seguros, como Dropbox ou Google Drive. Além disso, é recomendado fazer backup regularmente do seu banco de dados para evitar a perda de suas senhas.
-
Segurança avançada: O KeePassXC utiliza criptografia avançada para proteger suas senhas. O algoritmo AES-256 é usado para criptografar o banco de dados, garantindo que apenas você possa acessar as senhas. Além disso, o KeePassXC suporta recursos de segurança adicionais, como autenticação de dois fatores e chave de arquivo.
-
Integração com navegadores: O KeePassXC pode ser integrado aos navegadores da web, permitindo que você acesse suas senhas diretamente dos formulários de login dos sites. Isso facilita o preenchimento automático e evita a necessidade de copiar e colar manualmente as senhas.
O KeePassXC resolve vários problemas relacionados à segurança de senhas e oferece benefícios significativos para os usuários:
-
Gerenciamento de senhas seguro: O KeePassXC permite que você armazene todas as suas senhas em um único local seguro. Você não precisa mais se preocupar em lembrar várias senhas diferentes para diferentes serviços. Todas as suas senhas são armazenadas no banco de dados criptografado do KeePassXC, protegido por uma senha mestra.
-
Criptografia avançada: O KeePassXC utiliza criptografia de nível avançado para proteger suas senhas. O algoritmo AES-256, amplamente reconhecido como um dos mais seguros, é usado para criptografar o banco de dados do KeePassXC.
Isso garante que suas senhas permaneçam seguras e não sejam acessíveis a pessoas não autorizadas.
-
Senhas fortes e únicas: O KeePassXC possui um gerador de senhas integrado que pode criar senhas fortes e únicas para você. Isso ajuda a evitar o uso de senhas fracas e fáceis de adivinhar, tornando suas contas mais seguras contra ataques de hackers.
-
Autenticação de dois fatores: O KeePassXC suporta autenticação de dois fatores, o que significa que você pode adicionar uma camada adicional de segurança ao fazer login no gerenciador de senhas. Isso pode ser feito por meio de um aplicativo de autenticação no seu smartphone ou utilizando dispositivos de segurança como chaves USB.
-
Segurança offline: O KeePassXC é uma solução offline, o que significa que todas as suas senhas são armazenadas localmente no seu dispositivo. Isso reduz o risco de exposição de dados sensíveis em ataques online e violações de segurança em serviços baseados na nuvem.
-
Portabilidade: O KeePassXC é um programa de código aberto e multiplataforma. Isso significa que você pode instalá-lo e utilizá-lo em diferentes sistemas operacionais, como Windows, macOS e Linux. Você pode até mesmo transferir seu banco de dados de senhas entre diferentes dispositivos, permitindo acesso fácil e seguro às suas senhas em qualquer lugar.
-
Auditoria e transparência: Sendo um projeto de código aberto, o KeePassXC permite que qualquer pessoa examine seu código-fonte e verifique sua segurança. Isso garante uma maior transparência e confiança na integridade do gerenciador de senhas.
É importante ressaltar que o KeePassXC é uma solução offline, o que significa que suas senhas são armazenadas localmente no seu dispositivo, em vez de serem enviadas para a nuvem. Isso ajuda a proteger suas informações contra ataques cibernéticos e violações de segurança.
O KeePassXC funciona como um cofre seguro para suas senhas. Ele armazena e protege suas senhas com criptografia avançada, permitindo o acesso conveniente através do preenchimento automático. Com recursos de segurança adicionais e a capacidade de sincronizar e fazer backup do banco de dados, o KeePassXC oferece uma solução confiável para o gerenciamento de senhas.
https://keepassxc.org/
https://github.com/keepassxreboot/keepassxc
-
-
@ 4ba8e86d:89d32de4
2024-10-15 01:06:52Ele usa uma abordagem única de virtualização baseada em compartimentos para isolar diferentes aplicativos e atividades em máquinas virtuais independentes. Isso significa que cada atividade, desde navegar na web , é isolada em seu próprio compartimento virtual, fornecendo um ambiente altamente seguro.
O Qubes OS foi criado em 2010 pelo pesquisador de segurança polonês Joanna Rutkowska. Ela se inspirou na ideia de "security by compartmentalization" (segurança por compartimentalização) e começou a desenvolver um sistema operacional baseado em compartimentos para atender às suas necessidades de segurança. Em 2012, a primeira versão do Qubes OS foi lançada e desde então tem evoluído continuamente.
O Qubes OS usa o conceito de máquinas virtuais (VMs) para criar uma abordagem de segurança baseada em compartimentos. Ele executa diferentes aplicativos e atividades em máquinas virtuais independentes, cada uma das quais é isolada do resto do sistema. Cada VM é atribuída a uma categoria de segurança e é configurada de acordo com as políticas de segurança necessárias para aquela categoria. Por exemplo, uma VM de navegação na web pode ser configurada com políticas de segurança para limitar o acesso à rede e restringir o acesso aos arquivos do sistema.
O Qubes OS usa um recurso chamado "dom0" para gerenciar as VMs. O dom0 é uma VM privilegiada que é responsável por gerenciar as outras VMs e dispositivos de hardware do sistema. Ele é isolado do resto do sistema e é executado com permissões limitadas para reduzir o risco de ataques de software malicioso.
O Qubes OS resolve vários problemas de segurança, especialmente para usuários que precisam lidar com informações confidenciais ou sensíveis. Alguns dos principais problemas que o Qubes OS resolve são:
-
Ataques de malware: A abordagem baseada em compartimentos do Qubes OS reduz significativamente o risco de ataques de malware. Se um aplicativo ou atividade for comprometido, o dano será limitado ao compartimento virtual onde está sendo executado.
-
Rastreamento de atividades: O Qubes OS protege a privacidade do usuário ao evitar que atividades diferentes sejam correlacionadas. Cada atividade é executada em um compartimento virtual separado, impedindo que os dados de atividade sejam compartilhados entre os aplicativos.
-
Proteção de dados confidenciais: O Qubes OS isola diferentes tipos de dados em VMs separadas, proporcionando um alto nível de proteção aos dados confidenciais. As VMs são configuradas com políticas de segurança adequadas para cada tipo de dados, protegendo-os contra acesso não autorizado.
-
Proteção contra ataques de rede: O Qubes OS utiliza técnicas de isolamento de rede para proteger contra ataques de rede, como ataques de escuta, interceptação de tráfego ou ataques de injeção de pacotes. Cada VM pode ter uma interface de rede dedicada e isolada, garantindo que o tráfego de rede seja controlado e limitado a apenas o que é necessário para cada VM.
-
Compartilhamento seguro de arquivos: O Qubes OS oferece a opção de compartilhar arquivos entre VMs de forma segura, sem comprometer a segurança do sistema. Isso é feito por meio do recurso de "transferência de arquivos segura", que permite que os usuários movam arquivos entre as VMs com segurança e sem o risco de contaminação por malware.
-
Proteção de hardware: O Qubes OS também fornece recursos de segurança de hardware, como a possibilidade de bloquear portas USB ou desativar o microfone ou a webcam quando não estão em uso. Isso ajuda a evitar a exploração de vulnerabilidades de hardware e aumenta a segurança do sistema como um todo.
-
Sistema operacional confiável: O Qubes OS é baseado em uma distribuição Linux confiável e de código aberto, o que significa que os usuários podem verificar o código fonte do sistema operacional e garantir que não haja backdoors ou vulnerabilidades ocultas.
https://github.com/QubesOS
https://www.qubes-os.org/
https://www.youtube.com/live/DpnSFhWEEXk?feature=share
-
-
@ 4ba8e86d:89d32de4
2024-10-15 01:00:47Principais casos de uso do Shelter:
- Instalação de aplicativos dentro de um perfil de trabalho para isolamento.
- "Congelar" aplicativos dentro do perfil de trabalho para evitar que sejam executados ou ativados quando você não os estiver usando ativamente.
- Instalação de duas cópias do mesmo aplicativo no mesmo dispositivo.
No entanto, é importante notar que o Shelter não oferece proteção contra:
- Vulnerabilidades do sistema Android ou do kernel do Linux.
- Backdoors presentes no sistema Android (recomenda-se usar ROMs de código aberto para preocupações desse tipo).
- Backdoors presentes em firmwares (esta é uma limitação incontornável).
- Outros bugs ou limitações do sistema Android.
Adicionalmente, o Shelter não permite a criação de múltiplos perfis de trabalho em um dispositivo e não pode coexistir com outros aplicativos de gerenciamento de perfil de trabalho, devido a restrições do sistema Android.
Para desinstalar o Shelter:
- Acesse Configurações -> Contas para remover o perfil de trabalho.
- Acesse Configurações -> Segurança -> Avançado -> Aplicativos de administração de dispositivos para remover o Shelter dos apps de administração.
- Desinstale o Shelter normalmente.
https://gitea.angry.im/PeterCxy/Shelter
https://f-droid.org/pt_BR/packages/net.typeblog.shelter/
-
@ 23202132:eab3af30
2024-10-15 01:00:46A máscara associada ao grupo Anonymous tem origem no personagem Guy Fawkes, que foi um conspirador inglês envolvido na "Conspiração da Pólvora" de 1605. A conspiração visava explodir o Parlamento Britânico para assassinar o rei Jaime I e restaurar um governo católico. Guy Fawkes foi capturado e executado por sua participação.
A imagem de Guy Fawkes foi popularizada pela graphic novel e filme "V de Vingança" ("V for Vendetta"), criado por Alan Moore e David Lloyd. No filme, o personagem principal usa uma máscara de Guy Fawkes enquanto luta contra um governo autoritário. Desde o lançamento do filme em 2005, a máscara foi adotada por ativistas, incluindo o grupo Anonymous, como um símbolo de resistência contra a opressão e a vigilância estatal.
A máscara é usada em protestos e manifestações, simbolizando a luta contra a injustiça, ao mesmo tempo que permite o anonimato.
Quem foi Guy Fawkes
Guy Fawkes foi um soldado inglês que viveu entre 1570 e 1606, conhecido por seu envolvimento na Conspiração da Pólvora de 1605. A conspiração tinha como plano principal explodir a Casa dos Lordes durante uma sessão parlamentar em 5 de novembro de 1605. Guy Fawkes foi designado para cuidar dos barris de pólvora escondidos no porão do Parlamento. No entanto, a conspiração foi descoberta na noite anterior, e Fawkes foi capturado enquanto guardava os explosivos.
Após sua captura, ele foi torturado e revelou os nomes de outros conspiradores. Guy Fawkes foi condenado à execução por traição e acabou enforcado e esquartejado em janeiro de 1606.
O fracasso da conspiração é lembrado na Inglaterra todo ano em 5 de novembro, no evento chamado "Guy Fawkes Night" ou "Bonfire Night", quando fogueiras e fogos de artifício são acesos para marcar a ocasião. Guy Fawkes tornou-se um símbolo histórico, representando rebelião e resistência contra a tirania, mesmo que sua ação tenha sido condenada à época.
-
@ d3f06d83:7ff53dc3
2024-10-15 00:30:10Chef's notes
This is the beginning of a great pizza.
Details
- ⏲️ Prep time: 15 min
- 🍳 Cook time: 0
- 🍽️ Servings: 0
Ingredients
- 1 cup of pizza flour or bakery flour (00 flour)
- 1 zatchet of yeast (7g)
- 1 cup of water
- 1 spoon of honey (or sugar)
- 2 Litre container with a lid
Directions
- Pour the water in a 2L container
- Add honey/sugar and stir
- Add the yeast and stir. Wait 15 minutes or until the yeast is active (bubbling)
- Slowly mix the flour avoiding clumps
- Close the lid and leave in the fridge overnight
-
@ 18bdb66e:82eb5e5d
2024-10-15 00:28:32Chef's notes
Serve with bread, and side salad
Details
- ⏲️ Prep time: 5 mins
- 🍳 Cook time: 10 mins
- 🍽️ Servings: 2-4
Ingredients
- 1 Can (10 ½ ounces) condensed chicken gumbo soup
- ½ Soup can tomato juice
- ½ Soup can water
- Croutons
Directions
- Add soup, juice, and water.
- Heat through, stirring often.
- Serve with croutons
-
@ 101b30ee:18a46a45
2024-10-15 00:30:33背景
Junさんが山形県在住で、車で色々案内いただけることになりました。
メンバー (敬称略)
- Jun (nostr:npub1nlnjcakw6xfkpuhx9kym3d20sr774pm6rue5kk93uj7lrca9lypqgqj7fd)
- りら (nostr:npub1tuqsl6l8xzly95vv80um7wsnt7gxy8w9wgt4khp4wyv4xwhfw44slm93e9)
- あめ (nostr:npub1eqw8nx0hya3cwvtc0rje6lpjzzf6gvuh0mngz898dhp6juuwrp5s5uzduw)
- Don (nostr:npub1dv9xpnlnajj69vjstn9n7ufnmppzq3wtaaq085kxrz0mpw2jul2qjy6uhz)
- 横谷加奈子 (nostr:npub1sd2zns7qsfster7vcyjcqkert4cev2rzfeuus0d8hnfdh74t6g7su0p4c6)
- 発火大根 (nostr:npub1zqdnpm5gcfap8hngha7gcp3k363786phvs2etsvxw4nh6x9ydfzsuyk6mn)
スケジュール
10/12
11:00 - 11:30 霞城セントラル 日本酒めぐりツアー
500円で3コインもらえて、1コインでカップ1杯分の試飲ができるシステムのようです。
山形はフルーツも有名で、日本酒だけでなくワインなども試飲できました。個人的には、梨ベースのお酒が飲み口すっきりしていておいしかったです。
名前は忘れました ()霞城公園セントラル
https://yamagatakanko.com/attractions/detail_13443.html
nostr:nevent1qqszfgt4vef3ncyw7cy9yykuwv06pq5v9znaf2xeehfpp6s5j27ncqg2val6m nostr:nevent1qqsvfknrdtwsyvmztdzx40adzvtx8nztxu3vscgkljzzk2zr8kfmfnce54ke0
11:30 - 12:30 霞城公園散策
東北屈指の戦国大名・最上義光(もがみよしあき)公 (1546-1614)が礎を築いた「山形城」を復原整備した都市公園らしいです。
Junさんに聞いたところ、最上義光の妹が伊達政宗の母・義姫 (よしひめ)で、息子の伊達政宗を毒殺しようとしたことで有名らしいです。
後で調べたところ、毒殺事件が捏造だったとする記事もあり、真偽はいかに。また、これもJunさんに聞いたのですが山形藩は幕府重役から失脚した左遷の地と呼ばれているようです。
ちょっと悲しい。
後に調べたところ、山形藩は計12家が収めており、入れ替わりも激しかったようです。
まぁ、左遷だったとしても自然豊かな地でスローライフを過ごすのもアリかもしれない。個人的には、最上義光像が精巧に出来ているなぁと感動しました。
構図がナポレオンに似ていたので、もしかして身長が低かった?と思いましたが
後で調べたところ、180cm以上の長身だったとする文献があるようです。山形藩
https://ja.wikipedia.org/wiki/%E5%B1%B1%E5%BD%A2%E8%97%A9
義姫の毒殺事件について
https://bushoojapan.com/bushoo/date/2024/08/12/76725
最上義明の身長
http://iiwarui.blog90.fc2.com/blog-entry-13581.html
霞城公園セントラル
https://yamagatakanko.com/attractions/detail_2304.html
nostr:nevent1qqsp78jf76yudrwf6w88szq4x50t0zpeht77adkmk5pj5xsg6wplcmcv25e3g nostr:nevent1qqsfvw828mus5ek44m5myuya5ndpvj8mjhlltzx4y6ha93932cvzaxgwqwah3 nostr:nevent1qqs9sd8m43lj6pmd7hzu0quf4v0s7rm4uaq83aqp5jn5sqfy8aw6f8skg0sgv
12:30 - 13:30 旧済生館
済生館は1878年(明治11年)に山形県立病院として建設され、東北地方で最も早く西洋医学を取り入れたことで有名のようです。
建物内部の展示物の写真撮影は禁じられていたので写真は取れていませんが、あの有名な杉田玄白の訳書「解体新書」や、明治時代の医療器具などが展示されていました。私は工業高校出身で電気科だったので、昔の医療電気機器の展示などは見ていて飽きないものがありました。
旧済生館
https://www100.pref.yamagata.jp/110001/sangyo/sangyoushinkou/him_top/him_maincat1/him_15.html
13:30 - 14:30 山寺付近に移動・ランチ
山寺付近に車で移動後、玉こんにゃくを食べながら山寺方面に徒歩移動。
玉こんにゃくは名産らしく、山形のいたるところで売っていました。途中で近場のお店でランチ(蕎麦)を食べました。
ランチを食べながら映画 (オッペンハイマー)の話とかビットコインの話をしてました。
ちなみに私はオッペンハイマー見れてません。
あめさんはオッペンハイマーを見に県外 (奈良 -> 大阪)まで行ったらしい。
行動力すげぇ。nostr:nevent1qvzqqqqqqypzqyqmxrhg3sn6z00x30mu3srrdr4ru05rweq4jhqcvat805v2g6j9qy0hwumn8ghj7mn0wd68yttjv4kxz7fwdehkkmm5v9ex7tnrdakj7qg6waehxw309aex2mrp0ykk5upwwd5xjmn0xvhxuet59uqzpgqwakh6t2vm0ufy82rmwjqa2ld2z9jdl9l90v0ds7afwe6n5myl5uf5p7 nostr:nevent1qvzqqqqqqypzpjqu0xvlwfmrsuchs789n47ryyyn5seewlhxsyw2wmwr49ecuxrfqyv8wumn8ghj7mn0wd68ytnxd46zuamf0ghxy6t69uq3uamnwvaz7tmwdaehgu3dwp6kytnhv4kxcmmjv3jhytnwv46z7qpqq570ak2p9wx9q09xafjnlnulshwg2wc5c66q37z884m0pselu36sz5k7jk nostr:nevent1qvzqqqqqqypzqyqmxrhg3sn6z00x30mu3srrdr4ru05rweq4jhqcvat805v2g6j9qy0hwumn8ghj7mn0wd68yttjv4kxz7fwdehkkmm5v9ex7tnrdakj7qg6waehxw309aex2mrp0ykk5upwwd5xjmn0xvhxuet59uqzpp8xy7nktvyq87d676pkh6hjpftm5s703fq8e8c52l2l9xupe55wyhfc0p nostr:nevent1qvzqqqqqqypzq6c2vr8l8m9952e9qhxt8acn8kzzypzuhm6q70fvvxylkzu49e75qyshwumn8ghj7un9d3shjtt2wqhxummnw3ezuamfwfjkgmn9wshx5up0qy08wumn8ghj7un9d3shjtnwdaehgu3wwa5hyetydejhgtn2wqhsqgqthnr72cp92yqv9upzg2fyplvt6eazf6kxe24h6ea6syg3mthsl5tc3r26
14:30 - 16:00 山寺 (宝珠山立石寺)
宝珠山立石寺 (愛称:山寺)は山形屈指の観光スポットで、松尾芭蕉が「閑さや岩にしみ入る蝉の声」の名句を紀行文「おくのほそ道」に残したことでも知られているそうです。
展望台付近まで登りましたが、前日2時間程度しか寝れてなかった からか、途中で何回か力尽きました。
何気にずっと階段だったのが厳しかった。w
展望台から見る景色が超綺麗でした。達成感あった。途中でDonさんが「松尾芭蕉も山寺登ってますよ!」と励ましてくれましたが、松尾芭蕉は服部半蔵だったのでは、といわれる説が頻繁に出るくらい、体力おばけです ()
#### 山寺・宝珠山立石寺 https://yamagatakanko.com/attractions/detail_2352.html
松尾芭蕉が忍者服部半蔵ではないかと言われる都市伝説の理由5つ
https://spirituabreath.com/matuobasyou-hattorihannzou-5207.html
nostr:nevent1qvzqqqqqqypzp8l893mva5vnvrewvtvfhz65lq8aa2rh58enfdvtre9a7836t7gzqqs2jsu0efm0s0xnp9exv0m4xkxaw07nsraxhfjqrl6rmjd977aqcycfaf05e nostr:nevent1qvzqqqqqqypzp8l893mva5vnvrewvtvfhz65lq8aa2rh58enfdvtre9a7836t7gzqqsxmrsa8h6y6z8hmt7hzg8cmspvc373gnjjs67vlrdp24lud8wm8ncp682ev nostr:nevent1qvzqqqqqqypzq6c2vr8l8m9952e9qhxt8acn8kzzypzuhm6q70fvvxylkzu49e75qyshwumn8ghj7un9d3shjtt2wqhxummnw3ezuamfwfjkgmn9wshx5up0qy08wumn8ghj7un9d3shjtnwdaehgu3wwa5hyetydejhgtn2wqhsqgq3a6ehlurcsmpzlc4vghnnu7tnk5tekwm2kxn7e9rkrq7uslqmlu9sg6vl nostr:nevent1qvzqqqqqqypzp8l893mva5vnvrewvtvfhz65lq8aa2rh58enfdvtre9a7836t7gzqqs9lp9n8yjwjx56khduh7sqehtpgfs20d5w7x9lnjpnlt3vmqkpnmq7xfcef nostr:nevent1qvzqqqqqqypzp8l893mva5vnvrewvtvfhz65lq8aa2rh58enfdvtre9a7836t7gzqqsx4m8un5h952d6f7zuq9yraucs82lcah2p2lk4z6n9u0lduje2pcs40zhkz nostr:nevent1qvzqqqqqqypzqyqmxrhg3sn6z00x30mu3srrdr4ru05rweq4jhqcvat805v2g6j9qy0hwumn8ghj7mn0wd68yttjv4kxz7fwdehkkmm5v9ex7tnrdakj7qg6waehxw309aex2mrp0ykk5upwwd5xjmn0xvhxuet59uqzq5pf4h2je6jkpypup9kj2k66qtlcmce3gcg9q39xpv5388u50sun6ku45d nostr:nevent1qvzqqqqqqypzpjqu0xvlwfmrsuchs789n47ryyyn5seewlhxsyw2wmwr49ecuxrfqyv8wumn8ghj7mn0wd68ytnxd46zuamf0ghxy6t69uq3uamnwvaz7tmwdaehgu3dwp6kytnhv4kxcmmjv3jhytnwv46z7qpqkdwwjagam6rcxmakpcgsylu95zkm8s0qkvae8j2km6e5l5sr9alsm8vrfn nostr:nevent1qvzqqqqqqypzq6c2vr8l8m9952e9qhxt8acn8kzzypzuhm6q70fvvxylkzu49e75qyshwumn8ghj7un9d3shjtt2wqhxummnw3ezuamfwfjkgmn9wshx5up0qy08wumn8ghj7un9d3shjtnwdaehgu3wwa5hyetydejhgtn2wqhsqg9cqvgzvegmdsnc6xc5mhwnvsn9unyx4nx6megwcqxlheaddffc8ckpk3qj
16:00 - 18:30 山形駅でりらさん合流・産業科学館
車で山形駅まで戻り、りらさんと合流。
山形駅内の産業科学館を見て回りました。産業科学館は子供向けの知育ブースや山形県民向けの各種企業ブースもあり、見ていて飽きないものが沢山展示されていました。
発電機を回してミニカーを動かすゼネコンレーシングが楽しかった。
また、各種企業ブースを回りながら、Junさんに山形県民憧れの就職先などを聞いていました。産業科学館
http://y-sunka.org/
nostr:nevent1qvzqqqqqqypzqyqmxrhg3sn6z00x30mu3srrdr4ru05rweq4jhqcvat805v2g6j9qy0hwumn8ghj7mn0wd68yttjv4kxz7fwdehkkmm5v9ex7tnrdakj7qg6waehxw309aex2mrp0ykk5upwwd5xjmn0xvhxuet59uqzpx0ykjd6egvded9jksguphr4deluxlz56dm4rpw9n68npx9wt3hx976mcl nostr:nevent1qvzqqqqqqypzqyqmxrhg3sn6z00x30mu3srrdr4ru05rweq4jhqcvat805v2g6j9qy0hwumn8ghj7mn0wd68yttjv4kxz7fwdehkkmm5v9ex7tnrdakj7qg6waehxw309aex2mrp0ykk5upwwd5xjmn0xvhxuet59uqzpek5k3fygrx8y0024mmmnhqxdnd7jmqed7gf7sqt2tnushcv8xu7dwwctd nostr:nevent1qvzqqqqqqypzqhcppl47wv97gtgccwlehuapxhusvgwu2ushtdwr2uge2vawjattqyt8wumn8ghj7etyv4hzumn0wd68ytnvv9hxgtcpy9mhxue69uhhyetvv9uj66ns9ehx7um5wgh8w6tjv4jxuet59e48qtcqyzzfwt63psqw4w5x7s33al0k0ms2v80p88vjjjd4rx7f8t4juppkux27ek7 nostr:nevent1qvzqqqqqqypzpjqu0xvlwfmrsuchs789n47ryyyn5seewlhxsyw2wmwr49ecuxrfqyv8wumn8ghj7mn0wd68ytnxd46zuamf0ghxy6t69uq3uamnwvaz7tmwdaehgu3dwp6kytnhv4kxcmmjv3jhytnwv46z7qpqgj58fqpvpngr2vafhdcqtf5vn264960dad73kqfrem3m27hr6mpstqgs5t nostr:nevent1qvzqqqqqqypzqhcppl47wv97gtgccwlehuapxhusvgwu2ushtdwr2uge2vawjattqyt8wumn8ghj7etyv4hzumn0wd68ytnvv9hxgtcpy9mhxue69uhhyetvv9uj66ns9ehx7um5wgh8w6tjv4jxuet59e48qtcqyrnaxmkc47f5p46p36v8qnf4pr5ktm5algd86fsgzw9de96n9yp4qxu6dl8 nostr:nevent1qvzqqqqqqypzqhcppl47wv97gtgccwlehuapxhusvgwu2ushtdwr2uge2vawjattqyt8wumn8ghj7etyv4hzumn0wd68ytnvv9hxgtcpy9mhxue69uhhyetvv9uj66ns9ehx7um5wgh8w6tjv4jxuet59e48qtcqypehj7clkzll3yf7yftcp5t9k6dfnetvrpl943q4jd8ccy39neq66nyavjs nostr:nevent1qvzqqqqqqypzqyqmxrhg3sn6z00x30mu3srrdr4ru05rweq4jhqcvat805v2g6j9qy0hwumn8ghj7mn0wd68yttjv4kxz7fwdehkkmm5v9ex7tnrdakj7qg6waehxw309aex2mrp0ykk5upwwd5xjmn0xvhxuet59uqzqnc3mmp8sg4lysfkcz7x4ft3c6rrulne8aetvd8lwkzz86k8fp9lt040df nostr:nevent1qvzqqqqqqypzqyqmxrhg3sn6z00x30mu3srrdr4ru05rweq4jhqcvat805v2g6j9qy0hwumn8ghj7mn0wd68yttjv4kxz7fwdehkkmm5v9ex7tnrdakj7qg6waehxw309aex2mrp0ykk5upwwd5xjmn0xvhxuet59uqzqgdms2ltla34u9qr4whzlz69r3mpsj7e3jlpv935yltn799xsk89d3a6g4
18:30 - 20:40 旅館チェックイン、夕食
私 / あめさん / りらさんで、喜三郎という温泉旅館に泊まりました。
ここの温泉の泉質は芒硝泉(リウマチ・高血圧・切り傷・婦人病に効くとのこと)で、保養温泉として親しまれているそうです。
夕食のしゃぶしゃぶ、サザエ、釜めし、芋煮、... 全部旨かった!!!
夕食を食べていたら意外と時間ギリギリになり、露天風呂は朝入ることにして爆速で風呂に入りました。温泉旅館 (喜三郎)
https://kisaburo.jp/
nostr:nevent1qvzqqqqqqypzqhcppl47wv97gtgccwlehuapxhusvgwu2ushtdwr2uge2vawjattqyt8wumn8ghj7etyv4hzumn0wd68ytnvv9hxgtcpy9mhxue69uhhyetvv9uj66ns9ehx7um5wgh8w6tjv4jxuet59e48qtcqyqr9wgwca9jknh88c83nq3n5nnqtflrrd4v5d7uhuh9d47a2qsl870yprel nostr:nevent1qvzqqqqqqypzqhcppl47wv97gtgccwlehuapxhusvgwu2ushtdwr2uge2vawjattqyt8wumn8ghj7etyv4hzumn0wd68ytnvv9hxgtcpy9mhxue69uhhyetvv9uj66ns9ehx7um5wgh8w6tjv4jxuet59e48qtcqyr6yt65e79gqh4dp8pll2kfgaw837xulq2jh2x3y9zd4udk47lkn55pqkzm nostr:nevent1qvzqqqqqqypzpjqu0xvlwfmrsuchs789n47ryyyn5seewlhxsyw2wmwr49ecuxrfqyv8wumn8ghj7mn0wd68ytnxd46zuamf0ghxy6t69uq3uamnwvaz7tmwdaehgu3dwp6kytnhv4kxcmmjv3jhytnwv46z7qpqwdv2aa4n5z5r5k8q3z2retc9zgujytx9z36xmpsw6h9npc97250qkne529 nostr:nevent1qvzqqqqqqypzqyqmxrhg3sn6z00x30mu3srrdr4ru05rweq4jhqcvat805v2g6j9qy0hwumn8ghj7mn0wd68yttjv4kxz7fwdehkkmm5v9ex7tnrdakj7qg6waehxw309aex2mrp0ykk5upwwd5xjmn0xvhxuet59uqzp2rhy02kfw73jtzq7t7sp2njn2gnt9elta7nm09u55csld8kg5t39lh49r nostr:nevent1qvzqqqqqqypzqhcppl47wv97gtgccwlehuapxhusvgwu2ushtdwr2uge2vawjattqyt8wumn8ghj7etyv4hzumn0wd68ytnvv9hxgtcpy9mhxue69uhhyetvv9uj66ns9ehx7um5wgh8w6tjv4jxuet59e48qtcqyzv32r03thal6tvjqh4wgxk6xv6x2tkuwngw6kfv6ar49rg2yq55jc8arsp nostr:nevent1qvzqqqqqqypzpjqu0xvlwfmrsuchs789n47ryyyn5seewlhxsyw2wmwr49ecuxrfqyv8wumn8ghj7mn0wd68ytnxd46zuamf0ghxy6t69uq3uamnwvaz7tmwdaehgu3dwp6kytnhv4kxcmmjv3jhytnwv46z7qpqy2duq6xsl8jwns0r7qxgpf6703uwvawrhhlanytrepd082mnyugqxnxpj3
20:40 - 23:00 二次会
二次会の居酒屋でJunさん、Donさんと再度合流。
Junさんの奥さんで漫画家をされている、横谷先生も来てくれました。山形の地酒を飲みながら、Nostrasia 2024での思い出 / 山形の特産品 / Junさん夫妻が東京にくるタイミングはいつか など話していました。
横谷先生はM3やコミティアなど東京に来られるタイミングがいくつかありそうでしたが、Junさんが東京に来るタイミングはなかなか無さそう。
山形にまた会いにいくか、東京で面白いイベントをやって呼ぶしかない!また、山形には「ほや」と呼ばれる海産物が有名という話を聞きました。
ほや、結局食べ損ねてしまった。山形うまいものと地酒 母家
https://r.gnavi.co.jp/t846900/?sc_lid=smp_top_01
横谷先生の読み切り : 遠い日の陽
https://comic-days.com/episode/14079602755391426482
nostr:nevent1qvzqqqqqqypzq6c2vr8l8m9952e9qhxt8acn8kzzypzuhm6q70fvvxylkzu49e75qyshwumn8ghj7un9d3shjtt2wqhxummnw3ezuamfwfjkgmn9wshx5up0qy08wumn8ghj7un9d3shjtnwdaehgu3wwa5hyetydejhgtn2wqhsqgplnrvwhk6hsl9rk979u6qtmnmrpgywdgexruznhmtkmyevsaua8s8cy2pq nostr:nevent1qvzqqqqqqypzqyqmxrhg3sn6z00x30mu3srrdr4ru05rweq4jhqcvat805v2g6j9qy0hwumn8ghj7mn0wd68yttjv4kxz7fwdehkkmm5v9ex7tnrdakj7qg6waehxw309aex2mrp0ykk5upwwd5xjmn0xvhxuet59uqzpkwu2t5zgug7wlwqh8nfh4zyma3f6tlacx9dag4kawnq7nynkxr33rdgaz nostr:nevent1qvzqqqqqqypzqyqmxrhg3sn6z00x30mu3srrdr4ru05rweq4jhqcvat805v2g6j9qy0hwumn8ghj7mn0wd68yttjv4kxz7fwdehkkmm5v9ex7tnrdakj7qg6waehxw309aex2mrp0ykk5upwwd5xjmn0xvhxuet59uqzpq8szzc33567mtsjnvajzgur9n8us3fuv2ckx86y0et3c7kddqd37uxuz0
23:00 - 旅館に戻る・就寝
旅館まで車で送ってもらい、旅館で就寝。
翌日も朝早いので、恒例(?)の枕投げやトランプをして遊ぶこともなく、12時に消灯しました。10/13
6:00 - 起床・露天風呂 ~ 7:30 朝食 ~ 8:30 チェックアウト
前日に入れなかった露天風呂に入るため、早めに起きて露天風呂に入りました。
旅館の窓を開けると須川が流れていて、天然のASMRを感じられました。nostr:nevent1qvzqqqqqqypzqyqmxrhg3sn6z00x30mu3srrdr4ru05rweq4jhqcvat805v2g6j9qy0hwumn8ghj7mn0wd68yttjv4kxz7fwdehkkmm5v9ex7tnrdakj7qg6waehxw309aex2mrp0ykk5upwwd5xjmn0xvhxuet59uqzpz260lg35sg06h758y7eppvrwzypv5kc3yj4n0t8jyx5q4f82mse3ung9s nostr:nevent1qvzqqqqqqypzpjqu0xvlwfmrsuchs789n47ryyyn5seewlhxsyw2wmwr49ecuxrfqyv8wumn8ghj7mn0wd68ytnxd46zuamf0ghxy6t69uq3uamnwvaz7tmwdaehgu3dwp6kytnhv4kxcmmjv3jhytnwv46z7qpqt6cyt5hmatsuct2plneae7t0apnkkrxm38hvee3auhu0h3hljjgs943h27 nostr:nevent1qvzqqqqqqypzqyqmxrhg3sn6z00x30mu3srrdr4ru05rweq4jhqcvat805v2g6j9qy0hwumn8ghj7mn0wd68yttjv4kxz7fwdehkkmm5v9ex7tnrdakj7qg6waehxw309aex2mrp0ykk5upwwd5xjmn0xvhxuet59uqzp2qq9lv0d3umyxprne6xpjj70af6flzcfs2qpgsx2r347q7ukpdm2rwml4 nostr:nevent1qvzqqqqqqypzqyqmxrhg3sn6z00x30mu3srrdr4ru05rweq4jhqcvat805v2g6j9qy0hwumn8ghj7mn0wd68yttjv4kxz7fwdehkkmm5v9ex7tnrdakj7qg6waehxw309aex2mrp0ykk5upwwd5xjmn0xvhxuet59uqzqgaugf683lhlww8ynlgd7qfhgj2d3zlkecm72td35lfw6m4tkvhke4k8jt nostr:nevent1qvzqqqqqqypzqhcppl47wv97gtgccwlehuapxhusvgwu2ushtdwr2uge2vawjattqyt8wumn8ghj7etyv4hzumn0wd68ytnvv9hxgtcpy9mhxue69uhhyetvv9uj66ns9ehx7um5wgh8w6tjv4jxuet59e48qtcqyz750rwdqdk0x8r08m96fcyf5l4wp9pmc0rz8mle02ygtrdzdhf0gjwc823 nostr:nevent1qvzqqqqqqypzqyqmxrhg3sn6z00x30mu3srrdr4ru05rweq4jhqcvat805v2g6j9qy0hwumn8ghj7mn0wd68yttjv4kxz7fwdehkkmm5v9ex7tnrdakj7qg6waehxw309aex2mrp0ykk5upwwd5xjmn0xvhxuet59uqzqq36wgay36wz58kmjvsucple6whamvd28pqrhu082wsdkkpvxzht34tq02
8:30 - 移動・買い物 ~ 9:40 Junさんの家に移動・芋煮会開始
近隣のスーパーで芋煮会用の買い物を済ませたあと、Junさんの家に移動して芋煮会を始めました。 あめさんが帰宅の関係上、山形駅を11:11に出ねばならず、芋をよく煮るために爆速で芋煮を作る必要がありました。
皆で協力して爆速で芋煮を作り、しっかり煮えた状態の芋煮をあめさんに持って帰ってもらうことができました!nostr:nevent1qvzqqqqqqypzqyqmxrhg3sn6z00x30mu3srrdr4ru05rweq4jhqcvat805v2g6j9qy0hwumn8ghj7mn0wd68yttjv4kxz7fwdehkkmm5v9ex7tnrdakj7qg6waehxw309aex2mrp0ykk5upwwd5xjmn0xvhxuet59uqzqe03zqdcpjzakz3u7jjs07crz05y024lvgmjuvh0zysf4zal9q0la8772q nostr:nevent1qvzqqqqqqypzpjqu0xvlwfmrsuchs789n47ryyyn5seewlhxsyw2wmwr49ecuxrfqyv8wumn8ghj7mn0wd68ytnxd46zuamf0ghxy6t69uq3uamnwvaz7tmwdaehgu3dwp6kytnhv4kxcmmjv3jhytnwv46z7qpq6xaa2etzypq7hlm8zs3rkrjsc0wh5c29huupe9mfxqqeu5uanttq39l9w6 nostr:nevent1qqs0zkh2t2crsv8ljxzvmy3ndwzncyl6wwz67hfy4p09tacem3pjzwg2h4ac8 nostr:nevent1qvzqqqqqqypzpjqu0xvlwfmrsuchs789n47ryyyn5seewlhxsyw2wmwr49ecuxrfqyv8wumn8ghj7mn0wd68ytnxd46zuamf0ghxy6t69uq3uamnwvaz7tmwdaehgu3dwp6kytnhv4kxcmmjv3jhytnwv46z7qpq3ugypvt2fw886375nzltef4fzlasvk7nzj5n9tpuunwrr4p9etasskzqd6 nostr:nevent1qvzqqqqqqypzpjqu0xvlwfmrsuchs789n47ryyyn5seewlhxsyw2wmwr49ecuxrfqyv8wumn8ghj7mn0wd68ytnxd46zuamf0ghxy6t69uq3uamnwvaz7tmwdaehgu3dwp6kytnhv4kxcmmjv3jhytnwv46z7qpq9u5559ucupe755xnlm00vm5wcj7rpu3wwc3wvrdjxxdcadcwumzqjg8e6r
芋煮ビルド過程
nostr:nevent1qvzqqqqqqypzqhcppl47wv97gtgccwlehuapxhusvgwu2ushtdwr2uge2vawjattqyt8wumn8ghj7etyv4hzumn0wd68ytnvv9hxgtcpy9mhxue69uhhyetvv9uj66ns9ehx7um5wgh8w6tjv4jxuet59e48qtcqypn3w96w3wu375rz5hwhwhnmvrc664dltaudzvt578s6dh6kzq205u0m44v nostr:nevent1qvzqqqqqqypzqhcppl47wv97gtgccwlehuapxhusvgwu2ushtdwr2uge2vawjattqyt8wumn8ghj7etyv4hzumn0wd68ytnvv9hxgtcpy9mhxue69uhhyetvv9uj66ns9ehx7um5wgh8w6tjv4jxuet59e48qtcqypc0nxkt4ht0ku9l4hjmvtlv9rh5lt496r7s3755clg7q45fypnxkjms92t nostr:nevent1qvzqqqqqqypzqhcppl47wv97gtgccwlehuapxhusvgwu2ushtdwr2uge2vawjattqyt8wumn8ghj7etyv4hzumn0wd68ytnvv9hxgtcpy9mhxue69uhhyetvv9uj66ns9ehx7um5wgh8w6tjv4jxuet59e48qtcqypdfx9umwcyupt4cx38klfhl0f3saf3ar47jr7rcyj69dzyxve7tqk8wmcm nostr:nevent1qqsve084cxu5kw3gvqhjaehfge202z2nyddft89ufn9j73wyynwzhwczwz8j2 nostr:nevent1qqs26rp3gc2dhz4yznynym0y3c6y257kt2u773dvaaf87uf40fzjmcqk2zxxm nostr:nevent1qqsf3jx69s6guydhfxqstcw2m5aaw0zpum74aawe79nhz3xyg7p7dks0x9gn5 nostr:nevent1qqswtgfxseqwnt424ay668ps782drdmxkyyqj8uk8lfxs264gayfnkg3ls82a nostr:nevent1qqsqd257ng55ynkrwe3v2skcx29xalz85qcgn3ghj8ug4lqt9ewqvwgshz303 nostr:nevent1qqsw04zd3wgd3c5ztave9yhhavupl7pc3e4rcke5qn4azn8gpctz23cm7e5p8 nostr:nevent1qqsv8kqnr36jyhj9tnc602p6njakhgcuf6klm0xfrsngjrxlej9068s9vz3jg nostr:nevent1qvzqqqqqqypzqhcppl47wv97gtgccwlehuapxhusvgwu2ushtdwr2uge2vawjattqyt8wumn8ghj7etyv4hzumn0wd68ytnvv9hxgtcpy9mhxue69uhhyetvv9uj66ns9ehx7um5wgh8w6tjv4jxuet59e48qtcqyrpm5t3gxyjxnfw6y8eu2j0mpgf8acj83c86ueykdqke6nxchjku63rl6q5
11:20 - 14:30 Junさんの家でまったり・ねるねるねるね
Junさんにあめさんを駅に送ってもらった後は、残ったメンバーでテレビを見たり、ねるねるねるねを作って皆で食べたりしていました。
りらさんが仙台に行くため、14:30で帰っていきました。nostr:nevent1qqsya6u4r9amxs32m4k45s9203ph3kwmtlyddq283zrtyufk3z7tk9gaw3dyv nostr:nevent1qqs0nr6xznhxr4hfrczatlgy26lcrlup3zg8ey6j6ldthxnu9fy3mfq7tauam
14:30 - 16:30 伺かレクチャーを受ける
Junさんにりらさんを送ってもらっている途中、せっかく伺かベテランのDonさんがいるので
伺かを始めました。
※元々伺かやSSTPには興味があった
Donさんに伺かの基礎や「Nostr x 伺か」のOSSの機能などをレクチャーしてもらいながら、
Nostrと伺かで出来ることを話し合っていました。個人的に驚いたのは、一方通行で喋らせるだけだと思っていた伺かが、SSTPを通じてデスクトップマスコットとシーケンシャルに「やりとりができる」ことです。
非常に拡張性が高く、Nostrと同じで無限に遊べそうな雰囲気を感じました。伺か (うかがか) とは
2000年5月25日に初公開されたデスクトップ常駐型のフリーウェアで、24年間色んな人が発展・メンテナンスしています。
SSTP (Sakura Script Transfer Protocol) と呼ばれるプロトコルで指定のポート番号 (9801番)あてにメッセージを送ると、デスクトップマスコットを喋らせたり色んなことができます。
プロトコル仕様が公開されており、SSTPクライアントやサーバー、ベースウェアまで自作することが可能です。詳細 https://dic.nicovideo.jp/a/%E4%BC%BA%E3%81%8B
伺か参考 (ばぐとら研究所)
現在デファクトスタンダードとなっているベースウェア、SSPがここからダウンロードできます。 https://ssp.shillest.net/
nostr:nevent1qqsyrz64vff9fjkpj297qyr278d2a58l3fuysgknsm8jwyuwy6v8hcgvmn4mt nostr:nevent1qqsdzfjfvxxk5ph49x40s3hf8pdgazzq2x5xekd6ztqnqw4y4z3r8as4pdywy nostr:nevent1qqsr8sdds33g53asp7c45v3eems3vj3qhtxayvku9nxext95aauuuaq4d6t0x
16:30 - 17:30 四谷ラボの配信アーカイブを見る・帰宅
Nostrasia 2024やBluesky meetup、Nostr勉強会の配信アーカイブを見ながら、当時の思い出やNostrの未来について語っていました。
こういうのを忘年会や新年会でやっても面白いかもしれない。
18時の山形駅発の新幹線を取っていたので、18時にJunさんに駅まで送ってもらい、山形を去りました。四谷ラボの配信アーカイブ
https://www.youtube.com/@428-lab
終わりに
私は1泊2日でしたが、山形を味わい尽くしてリフレッシュすることが出来ました!
今回、Junさんには企画だけでなく車で色々連れて行ってもらったりと、本当にお世話になりました。
次に直接お会いしたら、何かしらもてなしたい。また、Donさんに直接会えて色々話せたのは本当に貴重でした。聞くところによると、Nostrのオフ会だけでなく、歴の長い伺か仲間とのオフ会も出たことがないらしいです。
また山形に行きたい!と思えるようなオフ会でした。
-
@ 18bdb66e:82eb5e5d
2024-10-15 00:20:20Chef's notes
Serve with bread, and side salad.
Details
- ⏲️ Prep time: 5 mins
- 🍳 Cook time: 10 mins
- 🍽️ Servings: 2-4
Ingredients
- 1 Can (10 ½ ounces) condensed chicken noodle soup
- ½ Soup can V8 juice
- ½ Soup can water
- Croutons
Directions
- Add soup, V8, and water.
- Heat through, stirring often.
- Serve with croutons
-
@ 18bdb66e:82eb5e5d
2024-10-15 00:16:16Chef's notes
Serve with bread, and side salad.
Details
- ⏲️ Prep time: 5 mins
- 🍳 Cook time: 10 mins
- 🍽️ Servings: 2-4
Ingredients
- 1 can (10.5 ounces) condensed cream of mushroom soup
- 1 Can (10 ½ ounces) condensed chicken noodle soup
- 1 can (10.5 ounces) condensed vegetable soup.
- 3 Soup cans water
- Croutons
Directions
- Add soups, and water.
- Heat through, stirring often.
- Serve with croutons
-
@ be7bf5de:09420d0a
2024-10-14 22:21:23We're excited to launch our new company, NosFabrica! Our mission is to empower sovereign healthcare by building tools for peer-to-peer healthcare interactions, giving individuals and providers the keys to their own health data. We are building a healthcare application factory, shipping health clients built on Nostr and Bitcoin and bootstrapping a decentralized ecosystem of health tools. We want to onboard thousands of people to Nostr and Bitcoin and enable people to live healthy lives. By utilizing Nostr for identity resolution and bitcoin for payments, we're paving the way for interoperable healthcare applications to exchange health information, and individuals to track and own data that matters to them, connecting to healthcare providers on their health journey.
The Problem:
The fiat healthcare system has led to a dangerous centralization of healthcare records in the US and globally, where companies ultimately own health data, not individuals. Current protocols of oAuths and APIs have led to bloated and expensive walled gardens (eg, Epic, Cerner) and a honeypot for healthcare hackers, most notably the recent Change Healthcare hack, owned by United Healthcare - affecting Avi's work. In 2023, more than 115 million health records were compromised across 655 data breaches.
High cost and poor outcomes are the current product of fiat healthcare. Of the $4.5 trillion annual US healthcare spend, 25% is administrative cost, and half of that is waste. 6-10% of every healthcare transaction goes to a medical billing middleman. Meanwhile, 6 in 10 Americans has a chronic health condition.
A decentralized healthcare application ecosystem would give the healthy sovereign individual the opportunity to take back ownership of their healthcare data, and their health, too.
The Solution:
NosFabrica means "our factory" in Latin, with of course the nod to Nostr. We aim to build a new, parallel health system on top of open source protocols Nostr and bitcoin. This decentralized healthcare ecosystem will be driven by peer-to-peer interactions between patients and providers. We will move healthcare onto a bitcoin and Nostr standard, giving independent healthcare providers the tools to integrate bitcoin deeper into their practice while maintaining practice sovereignty.
By establishing an open-source protocol for the private exchange of health data on Nostr, NosFabrica will set a foundation for a decentralized healthcare system and enable bitcoin-native electronic medical record (EMR) software clients to be built on top of Nostr.
We will cut out middlemen in healthcare and build tools that put the individual at the center of the solution. The benefits to patients include owning their own medical data, care discovery at competitive prices, portability of health data, and ultimately improve health outcomes. Doctors will also have the ability to reach a much broader population, reduce their administrative cost, and own their key demographic data such as licenses, credentials, and board certifications. Ultimately, we envision a more robust ecosystem of independent providers, combatting the trend of M&A and centralization we see under the current fiat healthcare regime.
There are several impacts for the broader free and open-source community, as it gives tools for individuals with different healthcare use cases to bring solutions to sorely needed applications such as medical consent, data sharing, clinical trials, and public health.
Nostr enables the NosFabrica future in three primary ways.
Identity and Access:
- User identity exists at the protocol layer via your npub/nsec, instead of the application layer.
- Users can sign into any application connected to the protocol
- Users can sign and certify events with their key pair, verifiably demonstrating ownership
Data Standardization
- We can develop specific Nostr event "kinds" created for medical data. Vitor has already started by building NIP-82 for medical data.
- Existing international data standards and formats such as FHIR/HL7 can be "wrapped" within Nostr events"
- This structure provides seamless data portability and interoperability across applications.
Persistence and Availability:
- HIPAA compliant, encrypted healthcare data is stored on relays
- Only the owner of the data and those authorized by the owner can decrypt or view the data - in other words, selective disclosure, which is a cornerstone of privacy.
Boosting the Nostr network effect and flywheel will continue, as there are already 40,000 weekly active users. By building healthcare applications on Nostr, we can onboard more people to the ecosystem, who may not be interested in social media.
Call to Action:
Of course, Nostr and Bitcoin are global protocols and networks that anyone can opt into. While the US gets a lot of the focus due to its expensive and complex healthcare system, there are many challenges globally including healthcare access, affordability, and timely care that we can address with open source tools and permissionless, sound money. We'd love to hear from you if you're interested in joining our mission.
About the team:
Avi Burra is an experienced healthcare veteran, working as senior director of product management at Optum. He is also the host of PlebChain Radio, a leading bitcoin and nostr podcast. With masters in electrical engineering and financial engineering, Avi brings a wealth of healthcare software product experience to NosFabrica.
Jon Gordon has worked across the healthcare industry, including in provider strategy, payers and suppliers. Jon has been helping healthcare providers integrate a bitcoin strategy with his consulting business, Satoshi Health Advisors. He also has a double masters in health economics and policy.
Vitor Pamplona is the creator of Amethyst, the top Android client for Nostr. Vitor previously led a company spun out of the MIT lab utilizing VR for eye exams at EyeNetra. Vitor has a PhD in computer science from MIT.
Go to nosfabrica.com to learn more and follow us along on Nostr!
-
@ acc925af:db9fb0bb
2024-10-14 21:42:14https://x.com/wk057/status/1845930594544636157
Bitcoin OG, Wizkid (Jason Hughes), eloquently puts out a piece detailly some major concerns had about mempool space in part 1 (https://stacker.news/items/723512/r/EverythingSatsoshi)
originally posted at https://stacker.news/items/723776
-
@ 83794dfe:e46c6636
2024-10-14 19:40:37BRM 200 km – Samstag, 28.09.2024 05:30 – 09:30 Uhr
We left on Saturday morning and enjoyed a great day on the bike, meeting some friends along the way and dropped some.
with an average speed of 26.5 we needed around 7.3 hours to complete the track.
It was a sunny but windy day at the end we even ended up with some cold shower at the end.
A Brevet is not a race along the way we had to pick up some proof that we visited certain points like gas stations.
-
@ 599f67f7:21fb3ea9
2024-10-14 19:36:50Inoiz pentsatu al duzu norbaiti satoshiak modu originalean oparitzea, Bitcoin mundura hurbiltzeko? LNbits zorro batekin NFC opari txartel bat erraz sor dezakezu. Honek LNURLw esteka bat NFC txartelean idatziz funtzionatzen du, eta jasotzaileak bere satoshiak erabili ditzake LNURL gaitutako zorro batekin.
Zer behar dut?
- LNbits zorroa
- Android telefono bat
- NTAG2* gaitasunak dituen NFC txartela, adibidez NTAG216.
💡 NTAG2 txartelek esteka bat* idazteko aukera ematen dute. Adibidez, enpresaren webgunerako URLa duen bisita-txartel gisa joka dezakete. NTAG424 txartelek ez dute memoria handiagoa bakarrik, baizik eta SUN parametro deitzen den zerbait ere badute, zerbitzariaren autentifikazioa ahalbidetzen duena, eta horrek segurtasun gehiago ematen die zure ordainketei. Azkenean txartel mota hau BoltCard bat bihur daiteke.
1. Hedapena aktibatu
Ireki zure LNbits zorroa. Tresna-barran, aktibatu
Withdraw Links
hedapena eta ondoren joan hedapenera.2. Erretiratzeko esteka sortu
Withdraw Links
hedapen orrian, aukeratuAdvanced Withdraw Link(s)
aukera.Ondoren, aukeratu satoshiak ateratzeko erabiliko duzun zorroa. Ziurrenik, hori zure LNbits zorro nagusitik bereizi nahi izango duzu. Horretarako, LNbits zorro berri bat sor dezakezu tresna-barratik,
+ Add a new wallet
aukera hautatuz. Behin zorro berria sortuta, sartu satoshi batzuk bertan.Eman izenburu bat erretiratzeko estekari.
Ezarri erreskatatu daitezkeen gutxieneko eta gehienezko zenbatekoak.
Ezarri esteka zenbat aldiz erabil daitekeen eta erretiratze saiakeren arteko denbora.
Aukeran, argazki pertsonalizatu bat gehi dezakezu
Use a custom voucher design
laukitxoa markatuz, eta .png irudi baten URL-a sartuz.Gogoan izan “assmilking” laukitxoa ez markatzea.
Konfigurazioa amaitu ondoren, jarraitu erretiratzeko esteka sortzera.
3. Idatzi esteka NFC txartelean
Zure erretiratzeko esteka berrian, klikatu
View LNURL
estekan. Ondoren, sakatuWrite to NFC
botoia eta eutsi NFC txartela telefonoaren aurrean idazketa-prozesua burutzeko.✔️ EGINDA
💡 Esan txartelaren jasotzaileari satoshi saldoari buruz, denbora ez dezan galdu azkeneko satoshia lortzen saiatzeko.
💡 Jasotzaileak txartelaren satoshiak atera ondoren, bere zorroan berridatzi dezake eta berrerabili. Gainera, eman diozun txartela NTAG424 bada, aurreko gidako (nostr:naddr1qqxnzd3e8qcr2wfn8qcrgwf4qyg8wumn8ghj7mn0wd68ytnhd9hx2q3qtx0k0a7lw62vvqax6p3ku90tccgdka7ul4radews2wrdsg0m865sxpqqqp65whwqrr5) bezala Lightning "zor txartela" bihur dezake. Baina txartela NTAG2* bakarrik bada, beste opari txartel bat bihur dezake soilik.
-
@ 000002de:c05780a7
2024-10-14 18:12:41This tip comes from Steve Gibson of the Security Now! podcast
If you hate those annoying "Sign in with Google" pop-ups you can easily eliminate them with uBlock Origin
- Go to https://stackoverflow.com to see this pop-up in practice
- Click the uBlock Origin icon to open its UI.
- Click the "gears" icon to open uBO's preferences.
- Switch to the "My filters" tab and add these two lines:
! Block "Sign in with Google" iframe in top right corner of websites ||accounts.google.com/gsi/iframe
- Click "Apply changes" ... and no more annoying "Sign in with Google" pop-ups.
Now when you go back to StackOverflow and refresh the page you should not see the pop-up. You should no longer see this pop-up on sites that push it on you.
Do you have any uBlock Origin tips?
originally posted at https://stacker.news/items/723472
-
@ 3bf0c63f:aefa459d
2024-01-15 11:15:06Pequenos problemas que o Estado cria para a sociedade e que não são sempre lembrados
- **vale-transporte**: transferir o custo com o transporte do funcionário para um terceiro o estimula a morar longe de onde trabalha, já que morar perto é normalmente mais caro e a economia com transporte é inexistente. - **atestado médico**: o direito a faltar o trabalho com atestado médico cria a exigência desse atestado para todas as situações, substituindo o livre acordo entre patrão e empregado e sobrecarregando os médicos e postos de saúde com visitas desnecessárias de assalariados resfriados. - **prisões**: com dinheiro mal-administrado, burocracia e péssima alocação de recursos -- problemas que empresas privadas em competição (ou mesmo sem qualquer competição) saberiam resolver muito melhor -- o Estado fica sem presídios, com os poucos existentes entupidos, muito acima de sua alocação máxima, e com isto, segundo a bizarra corrente de responsabilidades que culpa o juiz que condenou o criminoso por sua morte na cadeia, juízes deixam de condenar à prisão os bandidos, soltando-os na rua. - **justiça**: entrar com processos é grátis e isto faz proliferar a atividade dos advogados que se dedicam a criar problemas judiciais onde não seria necessário e a entupir os tribunais, impedindo-os de fazer o que mais deveriam fazer. - **justiça**: como a justiça só obedece às leis e ignora acordos pessoais, escritos ou não, as pessoas não fazem acordos, recorrem sempre à justiça estatal, e entopem-na de assuntos que seriam muito melhor resolvidos entre vizinhos. - **leis civis**: as leis criadas pelos parlamentares ignoram os costumes da sociedade e são um incentivo a que as pessoas não respeitem nem criem normas sociais -- que seriam maneiras mais rápidas, baratas e satisfatórias de resolver problemas. - **leis de trãnsito**: quanto mais leis de trânsito, mais serviço de fiscalização são delegados aos policiais, que deixam de combater crimes por isto (afinal de contas, eles não querem de fato arriscar suas vidas combatendo o crime, a fiscalização é uma excelente desculpa para se esquivarem a esta responsabilidade). - **financiamento educacional**: é uma espécie de subsídio às faculdades privadas que faz com que se criem cursos e mais cursos que são cada vez menos recheados de algum conhecimento ou técnica útil e cada vez mais inúteis. - **leis de tombamento**: são um incentivo a que o dono de qualquer área ou construção "histórica" destrua todo e qualquer vestígio de história que houver nele antes que as autoridades descubram, o que poderia não acontecer se ele pudesse, por exemplo, usar, mostrar e se beneficiar da história daquele local sem correr o risco de perder, de fato, a sua propriedade. - **zoneamento urbano**: torna as cidades mais espalhadas, criando uma necessidade gigantesca de carros, ônibus e outros meios de transporte para as pessoas se locomoverem das zonas de moradia para as zonas de trabalho. - **zoneamento urbano**: faz com que as pessoas percam horas no trânsito todos os dias, o que é, além de um desperdício, um atentado contra a sua saúde, que estaria muito melhor servida numa caminhada diária entre a casa e o trabalho. - **zoneamento urbano**: torna ruas e as casas menos seguras criando zonas enormes, tanto de residências quanto de indústrias, onde não há movimento de gente alguma. - **escola obrigatória + currículo escolar nacional**: emburrece todas as crianças. - **leis contra trabalho infantil**: tira das crianças a oportunidade de aprender ofícios úteis e levar um dinheiro para ajudar a família. - **licitações**: como não existem os critérios do mercado para decidir qual é o melhor prestador de serviço, criam-se comissões de pessoas que vão decidir coisas. isto incentiva os prestadores de serviço que estão concorrendo na licitação a tentar comprar os membros dessas comissões. isto, fora a corrupção, gera problemas reais: __(i)__ a escolha dos serviços acaba sendo a pior possível, já que a empresa prestadora que vence está claramente mais dedicada a comprar comissões do que a fazer um bom trabalho (este problema afeta tantas áreas, desde a construção de estradas até a qualidade da merenda escolar, que é impossível listar aqui); __(ii)__ o processo corruptor acaba, no longo prazo, eliminando as empresas que prestavam e deixando para competir apenas as corruptas, e a qualidade tende a piorar progressivamente. - **cartéis**: o Estado em geral cria e depois fica refém de vários grupos de interesse. o caso dos taxistas contra o Uber é o que está na moda hoje (e o que mostra como os Estados se comportam da mesma forma no mundo todo). - **multas**: quando algum indivíduo ou empresa comete uma fraude financeira, ou causa algum dano material involuntário, as vítimas do caso são as pessoas que sofreram o dano ou perderam dinheiro, mas o Estado tem sempre leis que prevêem multas para os responsáveis. A justiça estatal é sempre muito rígida e rápida na aplicação dessas multas, mas relapsa e vaga no que diz respeito à indenização das vítimas. O que em geral acontece é que o Estado aplica uma enorme multa ao responsável pelo mal, retirando deste os recursos que dispunha para indenizar as vítimas, e se retira do caso, deixando estas desamparadas. - **desapropriação**: o Estado pode pegar qualquer propriedade de qualquer pessoa mediante uma indenização que é necessariamente inferior ao valor da propriedade para o seu presente dono (caso contrário ele a teria vendido voluntariamente). - **seguro-desemprego**: se há, por exemplo, um prazo mínimo de 1 ano para o sujeito ter direito a receber seguro-desemprego, isto o incentiva a planejar ficar apenas 1 ano em cada emprego (ano este que será sucedido por um período de desemprego remunerado), matando todas as possibilidades de aprendizado ou aquisição de experiência naquela empresa específica ou ascensão hierárquica. - **previdência**: a previdência social tem todos os defeitos de cálculo do mundo, e não importa muito ela ser uma forma horrível de poupar dinheiro, porque ela tem garantias bizarras de longevidade fornecidas pelo Estado, além de ser compulsória. Isso serve para criar no imaginário geral a idéia da __aposentadoria__, uma época mágica em que todos os dias serão finais de semana. A idéia da aposentadoria influencia o sujeito a não se preocupar em ter um emprego que faça sentido, mas sim em ter um trabalho qualquer, que o permita se aposentar. - **regulamentação impossível**: milhares de coisas são proibidas, há regulamentações sobre os aspectos mais mínimos de cada empreendimento ou construção ou espaço. se todas essas regulamentações fossem exigidas não haveria condições de produção e todos morreriam. portanto, elas não são exigidas. porém, o Estado, ou um agente individual imbuído do poder estatal pode, se desejar, exigi-las todas de um cidadão inimigo seu. qualquer pessoa pode viver a vida inteira sem cumprir nem 10% das regulamentações estatais, mas viverá também todo esse tempo com medo de se tornar um alvo de sua exigência, num estado de terror psicológico. - **perversão de critérios**: para muitas coisas sobre as quais a sociedade normalmente chegaria a um valor ou comportamento "razoável" espontaneamente, o Estado dita regras. estas regras muitas vezes não são obrigatórias, são mais "sugestões" ou limites, como o salário mínimo, ou as 44 horas semanais de trabalho. a sociedade, porém, passa a usar esses valores como se fossem o normal. são raras, por exemplo, as ofertas de emprego que fogem à regra das 44h semanais. - **inflação**: subir os preços é difícil e constrangedor para as empresas, pedir aumento de salário é difícil e constrangedor para o funcionário. a inflação força as pessoas a fazer isso, mas o aumento não é automático, como alguns economistas podem pensar (enquanto alguns outros ficam muito satisfeitos de que esse processo seja demorado e difícil). - **inflação**: a inflação destrói a capacidade das pessoas de julgar preços entre concorrentes usando a própria memória. - **inflação**: a inflação destrói os cálculos de lucro/prejuízo das empresas e prejudica enormemente as decisões empresariais que seriam baseadas neles. - **inflação**: a inflação redistribui a riqueza dos mais pobres e mais afastados do sistema financeiro para os mais ricos, os bancos e as megaempresas. - **inflação**: a inflação estimula o endividamento e o consumismo. - **lixo:** ao prover coleta e armazenamento de lixo "grátis para todos" o Estado incentiva a criação de lixo. se tivessem que pagar para que recolhessem o seu lixo, as pessoas (e conseqüentemente as empresas) se empenhariam mais em produzir coisas usando menos plástico, menos embalagens, menos sacolas. - **leis contra crimes financeiros:** ao criar legislação para dificultar acesso ao sistema financeiro por parte de criminosos a dificuldade e os custos para acesso a esse mesmo sistema pelas pessoas de bem cresce absurdamente, levando a um percentual enorme de gente incapaz de usá-lo, para detrimento de todos -- e no final das contas os grandes criminosos ainda conseguem burlar tudo.
-
@ dfedf503:02288a26
2024-10-15 03:39:46The concept and significance of dew point In meteorology, the dew point is the temperature at which the gaseous water in the air becomes saturated and condenses into liquid water at a fixed pressure. At this temperature, condensed water floating in the air is called fog, and when it sticks to a solid surface, it is called dew, hence the name dew point. The relationship between dew point and relative humidity
In the compressor industry, the concepts of pressure dew point (PDP) and atmospheric dew point (ADP) are often used. The result of compression is that there is more water per unit volume of air, resulting in condensation. Ambient air contains water vapor, which is high in high temperature and low in low temperature. We use relative humidity (RH) to express the ratio of the actual water content in the air to the maximum water content. Because relative humidity is related to temperature, we prefer to use the term dew point, which is independent of any other parameter and can easily express the temperature when condensation occurs.
Measurement and application of dew point In industry, the measurement of dew point is very important. For example, in winter, because the outdoor temperature is lower and the indoor humidity is hotter, the air will condensation on the window glass, making the window glass blurred. If the dehumidifier is turned on indoors and the indoor moisture is gradually removed, then although the outdoor temperature is still the same, we will find that the dew on the window glass will slowly disappear. Dew point measurements can help us understand the moisture content of the air, which is critical for many industrial processes.
The relationship between dew point and weather phenomena In nature, dew points are associated with many weather phenomena. For example, dew forms during the warm season when ground objects are cooled by intense radiation at night. The temperature at which the air becomes saturated by cooling is called the dew point temperature. After it drops to the dew point, excess water vapor escapes. Because the temperature is above 0°C, this excess water vapor condenses into water droplets and sticks to surface objects.
To sum up, dew point is an important meteorological parameter, which is not only related to our daily life, such as weather forecast and dressing index, but also has a profound impact on industrial production and scientific research. Through the measurement and analysis of dew point, we can better understand and predict weather changes, as well as optimize industrial production processes.
-
@ 45bda953:bc1e518e
2024-10-14 16:47:18Kaspa Empire - Ceb System - Planet Hithe III
The day was hot and the manor sounded eerily quiet compared to the hustle and commotion of the hours prior. On the estate and in the master bedroom specifically, a married pair had become parents. “He looks so much like you Domitius.” Cleolia remarked while stroking the newborn's tiny arms. “He has strong blood.” The father responded smiling fondly sitting on the bedside. A silent nurse was tidying up the apparel and instruments of labour while the couple waited patiently for her exit to have more private discourse. “I am so glad to have born you an heir my love.” Domitius stared intently at his offspring. He had no qualms neglecting obligations to his property and recessed momentarily to celebrate the occasion with his wife. “I will send for the priest, register the child as an Imperial citizen and have him scribed into our family archives, but in the meantime, you must recover. Let a servant girl take our son for a while.” She pouted a playful but exhausted look of non compliance. “You must rest.” He insisted. “How can I let him go when I only just met him? Who are you little man?” She smiled faintly and nodded. “You are right, Domitius, where are you going?” “To the fields, the slaves are behind schedule, our harvest is big and taxes are high. This war is taking it's toll, we must excel to adequately serve the Empire in these pressing times. If the tamed Osteri could only comprehend what is at stake.” Cleolia peered cautiously at the embellishment and carvings on the wooden door knowing that Sethari was standing just beyond. Domitius trailed her gaze. “Don't worry my love, he means well, at least he tries to understand the urgency of my affairs.” He stood up straitening his vest and prepared to leave the room. “Domitius, wait...” He stopped at the door. “What will you tell the priest?” Domitius paused. “I will tell him Albin... Albin Domitius Chevalier.”
He left the room and it was quiet, the help entered and swaddled the baby rocking him while Cleolia drifted between sleep and conciousness. “Albin.” She repeated to herself as deep slumber enveloped her.
Domitius and his overseer walked briskly out of the manor towards the grain fields squinting as blue Ceb light reflected off the lanscape. “I honour you on the spawn of your son my lord, I hope for a good strong boy, you will be a happy father. I am happy with Seth.” He pounded his chest softly and proudly. “Thank you Sethari, is your son walking yet?” Domitius queried. “No my lord, still crawling on his belly like a beast.” The headman was trying to make his master laugh though Domitius was in a sterner mood having a weight on conscience. “I am in no mood to jest Sethari.” Domitius suddenly clenched his fists. “Get those slaves to work, I cannot have them idling when they should be harvesting.” Sethari made a small bow to his master and started yelling at his Osteri kinsmen, threatening them with a rolled up whip he procured from somewhere inside his tunic, waving it about and cracking it in the air every so often. Domitius picked up a scythe and proceeded to cleave down large swathes of grain. This had a more compelling effect of rallying the straggling workers to action than did the whip. They all toiled together in the pale light of Ceb.
Domitius was sweating, sweating and praying for a swift victory over the Jeula Federation. Fighting his small part in a increasingly complicated war, loyal to his Empire in his own unique way even though the conflict was far from home. A powerful loyalty that cannot be bought with riches or broken by coercion. A loyalty born through inheritance and blood.
...
The priest was in a more jovial mood than usual. The break of routine was a welcome one. The birth was indeed a momentous occasion. Few things seem of much report in a small planetary expansion program. He did not even seem to mind carrying a keg full of honey mead over the rolling hills of the plantation colony. “Domitius comes to church submissions far to infrequently.” The portly man mumbled to himself while wiping the accumulated sweat from his brow. “I eat too well among all these farmers.” The habit of speaking to himself was ordinary for this man of the cloth who always felt socially disconnected from his flock, caring for their souls, protecting their dignity and general well being like a responsible patron. “I feed their spirits, they feed my body, Hahaha. Tonight I will share my good spirits! Hahahaha.” Impressed by his own sense of humour he turned to witness the majestic blue star set over the skyline. Everything turned a silvery gray hue, and then the stars broke through the atmosphere lighting his way. “Clear skies, the blessed stars guide me.” He continued on the path approaching the Domitian manor and rapped a quick knock on the side of the root cellar doors. It creaked open upwards and a tall muscular Osteri took his baggage and let him in. “Thank you Setharis, my arms are weary, ready to fall off, bless you.” Domitius looked up from his bench seat below a glowing lantern. “Good to see you Father Ecknard.” “Dispense with the formalities and bring the dispenser.” He motioned to Setharis who placed the heavy keg on a table next to an assortment of documents, quill and sealed inkpot. “You pour Setharis and I will write. Name?” Ecknard scratches his chin with the quill contemplating his seat and it’s adequacy for the prolonged exercise of scribble. “Name?” Domitius paused. “Albin Domitius Chevalier.” The priest focused, started with his calligraphic art and fashioned the name and ASN standard block height beautifully onto the family records all the while biting his tongue. “He will inherit the colonial estates, all your assets in Kaspa Prime and the parochial offices at Magar Prime. Correct?” “Yes.” Replied Domitius solemnly. “I'll soon have to amend your will and testament. I'd have to make a registry at the parish and send correspondence to Magar Prime. There would be many from the royal courts who'll send their best regards from afar when this news becomes public.” Domitius did not seem as enthusiastic as Ecknard would have liked. “What ails you Domitius?” The priest could not help but make the pun and restrained a grunted laugh inside himself.
“I wonder if we should wait before registering and announcing him to Empire.” Ecknard’s expression slowly changed to puzzlement sitting up straight, his belly pushing on the heavy table. “In the voids name why?” “I am concerned... about this war...” “It is on the other side of Magar space!” The priest interjected in astonished retort. “I know father, maybe I am just being overly cautious, but with the Magar Dominus fleet occupied at the divide I am worried about the colonies in the isolated regions.” “Surely Kaspa prime will spare no expense to our defence in the improbable event of an invasion.” “The core keepers will not allow foul play from the Jeul.” “Yes Ecknard, but the fleet is not capable because most of our ships are at the aforementioned objective!” “No, no, no. Suggesting that conflict would happen outside of the divide is practically blasphemy. I cannot imagine insubordination to the Core mandates and the Accords." Domitius remained silently astute and father Ecknard decided to not argue further with the lord. His shoulders sagged. “I will not register the boy in the Imperial records.” “Thank you father.” “What do you know that I fail to see Domitius.” The two men stared at each other from across the table. The hulking bodyguard ever present in body but semi ignorant in mind silently and intriguingly observing the discussion.
“The value of sat. It is not calculated well by the common people, no offence father.” The priest piously lifted his hand and with tilted brow motioned. “None taken.” “My son and our blood line is invested with empiric power, if opportunists become aware of his existence and being outside the Magar prime void, we might have problems here on Hithe III.” Cumbersome thoughts and machinations of the mind darkened the mood of the party. Not at all what Father Ecknard was projecting in his minds eye during his arduous walk to what he was hoping, a celebration and getting drunk with an old friend. “The war does not seem to be ending any time soon, how long shall we stall his registration?” The priest reasoned on. “Think of the rites he will not be allowed to partake in at the church. He will be like Osteri.” Ecknard gestured towards Sethari. “This is a small colony Ecknard. My son will be educated as a member of royalty, all on Hithe III will acknowledge his social standing, I am only concerned that the secret be kept from the outside worlds. He will never be considered Osteri, he will know who he is and what his position is in the greater void. When the war is over we will properly introduce him to the families, currently they would be too occupied with politic as it is, and might not offer him due ceremony as they would under more peaceable circumstances.” The priest capitulated and grabbed a mug. “Your secret is safe with me Domitius, the lack of technology on this forsaken planet is good for your purposes, seeing as the only comms service on the planet is in the church tower. That blinking comms station hounds me daily with requests for your return to Magar Prime. The high counsel want to rebalance and need your signature.” Domitius sighed and looked away as if some spectre loomed in front of him.
I swear silence on the birth my lord, though let me make a final amendment to your proposal. A bit of extra security shall I say.” Domitius filled a cup of mead for Sethari and himself, becoming more relaxed and hospitable. “I am listening.” “If the risks are as great as you assume, let us pretend for the child's sake that he is Kaspian royalty only, and not true Magar. We then continue his education to the full and not put him in a position where he could compromise himself should he be... void forbid, captured by some opportunistic prospector.” Domitius looked ponderously into his cup. “Ecknard, my son is an infant... If we have to keep the boy in the dark about the true nature of his identity, how long do you predict this war to continue?” Father Ecknard leaned forward... “I sit at the comms desk every night and listen to the chatter. This war... is going to be a long one.”
...
scifi
-
@ 3bf0c63f:aefa459d
2024-01-14 13:55:28Músicas grudentas e conversas
Uma vez que você ouviu uma música grudenta e ela volta, inteira, com toda a melodia e a harmonia, muitos dias depois, contra a sua vontade. Mas uma conversa é impossível de lembrar. Por quê?
-
@ 18bdb66e:82eb5e5d
2024-10-15 00:11:19Chef's notes
Serve with crackers, or croutons, and side salad. Fiesta Nacho cheese soup gives a pleasant kick of flavor
Details
- ⏲️ Prep time: 5 mins
- 🍳 Cook time: 10 mins
- 🍽️ Servings: 2-4
Ingredients
- 1 Can (10.5 ounces) condensed Cheddar cheese soup
- 1 Cans (10 ½ ounces) condensed tomato soup
- 2 Soup cans water
- Bacon, fried and crumbled.
Directions
- Combine soups, and water.
- Heat through, stirring often.
- Garnish with bacon.
-
@ 18bdb66e:82eb5e5d
2024-10-15 00:05:38Chef's notes
Trim down bread to fit serving bowl, if necessary, prior to broiling. Top with Parmesan cheese.
Details
- ⏲️ Prep time: 20 mins
- 🍳 Cook time: 10 mins
- 🍽️ Servings: 2-4
Ingredients
- 1 Can (10.5 ounce) condensed onion soup
- ½ Soup can water
- ½ Soup can V8 juice
- 4 Ounces sliced roast beef
- 2-3 slices French, or Italian bread, or Texas Toast
- Butter
- Parmesan cheese
Directions
- Combine soup, water, and V8 juice.
- Heat to simmer.
- Add roast beef, heat throug
- Ladle soup in bowl
- Top soup with bread
- Top bread with roast beef
-
@ 3bf0c63f:aefa459d
2024-01-14 13:55:28Bluesky is a scam
Bluesky advertises itself as an open network, they say people won't lose followers or their identity, they advertise themselves as a protocol ("atproto") and because of that they are tricking a lot of people into using them. These three claims are false.
protocolness
Bluesky is a company. "atproto" is the protocol. Supposedly they are two different things, right? Bluesky just releases software that implements the protocol, but others can also do that, it's open!
And yet, the protocol has an official webpage with a waitlist and a private beta? Why is the protocol advertised as a company product? Because it is. The "protocol" is just a description of whatever the Bluesky app and servers do, it can and does change anytime the Bluesky developers decide they want to change it, and it will keep changing for as long as Bluesky apps and servers control the biggest part of the network.
Oh, so there is the possibility of other players stepping in and then it becomes an actual interoperable open protocol? Yes, but what is the likelihood of that happening? It is very low. No serious competitor is likely to step in and build serious apps using a protocol that is directly controlled by Bluesky. All we will ever see are small "community" apps made by users and small satellite small businesses -- not unlike the people and companies that write plugins, addons and alternative clients for popular third-party centralized platforms.
And last, even if it happens that someone makes an app so good that it displaces the canonical official Bluesky app, then that company may overtake the protocol itself -- not because they're evil, but because there is no way it cannot be like this.
identity
According to their own documentation, the Bluesky people were looking for an identity system that provided global ids, key rotation and human-readable names.
They must have realized that such properties are not possible in an open and decentralized system, but instead of accepting a tradeoff they decided they wanted all their desired features and threw away the "decentralized" part, quite literally and explicitly (although they make sure to hide that piece in the middle of a bunch of code and text that very few will read).
The "DID Placeholder" method they decided to use for their global identities is nothing more than a normal old boring trusted server controlled by Bluesky that keeps track of who is who and can, at all times, decide to ban a person and deprive them from their identity (they dismissively call a "denial of service attack").
They decided to adopt this method as a placeholder until someone else doesn't invent the impossible alternative that would provide all their desired properties in a decentralized manner -- which is nothing more than a very good excuse: "yes, it's not great now, but it will improve!".
openness
Months after launching their product with an aura of decentralization and openness and getting a bunch of people inside that believed, falsely, they were joining an actually open network, Bluesky has decided to publish a part of their idea of how other people will be able to join their open network.
When I first saw their app and how they were very prominently things like follower counts, like counts and other things that are typical of centralized networks and can't be reliable or exact on truly open networks (like Nostr), I asked myself how were they going to do that once they became and open "federated" network as they were expected to be.
Turns out their decentralization plan is to just allow you, as a writer, to host your own posts on "personal data stores", but not really have any control over the distribution of the posts. All posts go through the Bluesky central server, called BGS, and they decide what to do with it. And you, as a reader, doesn't have any control of what you're reading from either, all you can do is connect to the BGS and ask for posts. If the BGS decides to ban, shadow ban, reorder, miscount, hide, deprioritize, trick or maybe even to serve ads, then you are out of luck.
Oh, but anyone can run their own BGS!, they will say. Even in their own blog post announcing the architecture they assert that "it’s a fairly resource-demanding service" and "there may be a few large full-network providers". But I fail to see why even more than one network provider will exist, if Bluesky is already doing that job, and considering the fact there are very little incentives for anyone to switch providers -- because the app does not seem to be at all made to talk to multiple providers, one would have to stop using the reliable, fast and beefy official BGS and start using some half-baked alternative and risk losing access to things.
When asked about the possibility of switching, one of Bluesky overlords said: "it would look something like this: bluesky has gone evil. there's a new alternative called freesky that people are rushing to. I'm switching to freesky".
The quote is very naïve and sounds like something that could be said about Twitter itself: "if Twitter is evil you can just run your own social network". Both are fallacies because they ignore the network-effect and the fact that people will never fully agree that something is "evil". In fact these two are the fundamental reasons why -- for social networks specifically (and not for other things like commerce) -- we need truly open protocols with no owners and no committees.
-
@ 09fbf8f3:fa3d60f0
2024-10-14 15:41:08既然说是一款Web版的软件,也就是对应客户端版而开发的,如果你的歌曲都保存在NAS上,那么这款软件就非常适合你;如果你的歌曲都保存在电脑本地,那么可以直接使用客户端版的同名软件。
01
MusicTagWeb的特色 这款软件刚开始在 Github 上开源的时候,笔者就注意到了,不过当时功能还刚有个雏形、不太完善,就没有推荐给大家。经过开发者一段时间的辛勤付出,现在看来功能和管理能力基本上都已经完成了,具体的功能点和特性如下:
支持批量自动修改音乐标签 支持音乐指纹识别,即使没有元数据也可以识别音乐 支持整理音乐文件,按艺术家,专辑分组 支持文件排序,按照文件名,文件大小,更新时间排序 支持plex专辑类型,新增配置显示/隐藏字段 修复不同类型音频文件的专辑类型 新增歌曲语言整理文件 优化自动打标签匹配算法 新增智能刮削标签源,集成多个平台的标签源,按匹配度排序 支持繁体匹配,新增消息中心展示自动刮削不匹配的数据 支持保存专辑封面文件,支持自定义上传专辑封面 简单适配H5端,支持手机端访问 支持wma,wmv格式, 修复自动刮削报错停止的问题 音轨号,光盘号 格式优化,优化匹配规则 对新增的音乐文件后台自动刮削,无感知刮削。修复.ape文件读取报错的问题 新增自定义层数的整理文件,新增根据刮削状态排序,修复大写的音乐后缀名识别不到 新增数据库挂载映射
其实上面没有提到,这款软件支持从6个音乐平台刮削歌曲信息,安全起见,具体是哪6个平台笔者就不说了,感兴趣的朋友可以接着往下看,自己跑起来就知道了。
02
安装MusicTagWeb MusicTagWeb目前仅支持Docker部署,在你的NAS上,可以使用Docker和Docker Compose两种方式来部署,任选一种即可。
1、Docker方式
docker run -d \ --restart=unless-stopped \ -p 8001:8001 \ -v /path/to/your/music:/app/media \ -v /path/to/your/config:/app/data \ xhongc/music_tag_web:latest
2、Docker Compose方式
version: '3' services: music-tag: image: xhongc/music_tag_web:latest container_name: music-tag-web restart: unless-stopped ports: - "8001:8001" volumes: - /path/to/your/music:/app/media:rw - /path/to/your/config:/app/data
以上两种方式中,/path/to/your/music改成你的音乐文件夹路径,/path/to/your/config改为MusicTagWeb的配置文件路径。
03
使用MusicTagWeb 使用Docker启动MusicTagWeb后,在浏览器中使用IP+端口号打开系统,然后输入用户名和密码即可登录,默认的用户名和密码均为admin,建议登录后进行修改。
1、登录系统 Username 和 Password 均输入admin,邀请码不需要填。
2、首页主屏
主屏分成两栏(实际是三栏,还有一栏在操作的时候会显示出来),左边是音乐文件目录,右边默认是一张占位图片。
3、单个编辑/刮削歌曲信息
选择一个歌曲文件,这时候界面就是三屏了,右侧一栏变成两栏,分别显示歌曲元数据和音源搜索结果。搜索和设置完成后,点击保存信息按钮,即可完成对歌曲元数据的编辑。
最后
详细教程去官网: https://xiers-organization.gitbook.io/music-tag-web V1版够用了,V2收费的,68一个激活码。
-
@ 18bdb66e:82eb5e5d
2024-10-14 23:58:32Chef's notes
Serve with side salad.
Details
- ⏲️ Prep time: 10 mins
- 🍳 Cook time: 10 mins
- 🍽️ Servings: 2-4
Ingredients
- 3 sausage links cut into penny sized slices, or two patties crumbled
- 2 Cans (10 ½ ounces) condensed minestrone soup
- 1 can (10.5 ounces) condensed tomato soup.
- 3 Soup cans water
- Croutons
Directions
- Brown sausage in saucepan
- Add soups, and water
- Heat through, stirring often.
- Garnish with croutons
-
@ 3bf0c63f:aefa459d
2024-01-14 13:55:28Jofer
Jofer era um jogador diferente. À primeira vista não, parecia igual, um volante combativo, perseguia os atacantes adversários implacavelmente, um bom jogador. Mas não era essa a característica que diferenciava Jofer. Jofer era, digamos, um chutador.
Começou numa semifinal de um torneio de juniores. O time de Jofer precisava do empate e estava sofrendo uma baita pressão do adversário, mas o jogo estava 1 a 1 e parecia que ia ficar assim mesmo, daquele jeito futebolístico que parece, parece mesmo. Só que aos 46 do segundo tempo tomaram um gol espírita, Ruizinho do outro time saiu correndo pela esquerda e, mesmo sendo canhoto, foi cortando para o meio, os zagueiros meio que achando que já tinha acabado mesmo, devia ter só mais aquele lance, o árbitro tinha dado dois minutos, Ruizinho chutou, marcou e o goleiro, que só pulou depois que já tinha visto que não ia ter jeito, ficou xingando.
A bola saiu do meio e tocaram para Jofer, ninguém nem veio marcá-lo, o outro time já estava comemorando, e com razão, o juiz estava de sacanagem em fazer o jogo continuar, já estava tudo acabado mesmo. Mas não, estava certo, mais um minuto de acréscimo, justo. Em um minuto dá pra fazer um gol. Mas como? Jofer pensou nas partidas da NBA em que com alguns centésimos de segundo faltando o armador jogava de qualquer jeito para a cesta e às vezes acertava. De trás do meio de campo, será? Não vou ter nem força pra fazer chegar no gol. Vou virar piada, melhor tocar pro Fumaça ali do lado e a gente perde sem essa humilhação no final. Mas, poxa, e daí? Vou tentar mesmo assim, qualquer coisa eu falo que foi um lançamento e daqui a uns dias todo mundo esquece. Olhou para o próprio pé, virou ele de ladinho, pra fora e depois pra dentro (bom, se eu pegar daqui, direitinho, quem sabe?), jogou a bola pro lado e bateu. A bola subiu escandalosamente, muito alta mesmo, deve ter subido uns 200 metros. Jofer não tinha como ter a menor noção. Depois foi descendo, o goleirão voltando correndo para debaixo da trave e olhando pra bola, foi chegando e pulando já só pra acompanhar, para ver, dependurado no travessão, a bola sair ainda bem alta, ela bateu na rede lateral interna antes de bater no chão, quicar violentamente e estufar a rede no alto do lado direito de quem olhava.
Mas isso tudo foi sonho do Jofer. Sonhou acordado, numa noite em que demorou pra dormir, deitado na sua cama. Ficou pensando se não seria fácil, se ele treinasse bastante, acertar o gol bem de longe, tipo no sonho, e se não dava pra fazer gol assim. No dia seguinte perguntou a Brunildinho, o treinador de goleiros. Era difícil defender essas bolas, ainda mais se elas subissem muito, o goleiro ficava sem perspectiva, o vento alterava a trajetória a cada instante, tinha efeito, ela cairia rápido, mas claro que não valia à pena treinar isso, a chance de acertar o gol era minúscula. Mas Jofer só ia tentar depois que treinasse bastante e comprovasse o que na sua imaginação parecia uma excelente idéia.
Começou a treinar todos os dias. Primeiro escondido, por vergonha dos colegas, chegava um pouco antes e ficava lá, chutando do círculo central. Ao menor sinal de gente se aproximando, parava e ia catar as bolas. Depois, quando começou a acertar, perdeu a vergonha. O pessoal do clube todo achava engraçado quando via Jofer treinando e depois ouvia a explicação da boca de alguém, ninguém levava muito a sério, mas também não achava de todo ridículo. O pessoal ria, mas no fundo torcia praquilo dar certo, mesmo.
Aconteceu que num jogo que não valia muita coisa, empatezinho feio, aos 40 do segundo tempo, a marcação dos adversários já não estava mais pressionando, todo mundo contente com o empate e com vontade de parar de jogar já, o Henrique, meia-esquerdo, humilde, mas ainda assim um pouco intimidante para Jofer (jogava demais), tocou pra ele. Vai lá, tenta sua loucura aí. Assumiu a responsabilidade do nosso volante introspectivo. Seria mais verossímil se Jofer tivesse errado, primeira vez que tentou, restava muito tempo ainda pra ele ter a chance de ser herói, ninguém acerta de primeira, mas ele acertou. Quase como no sonho, Lucas, o goleiro, não esperava, depois que viu o lance, riu-se, adiantou-se para pegar a bola que ele julgava que quicaria na área, mas ela foi mais pra frente, mais e mais, daí Lucas já estava correndo, só que começou a pensar que ela ia pra fora, e ele ia só se dependurar no travessão e fazer seu papel de estar na bola. Acabou que por conta daquele gol eles terminaram em segundo no grupo daquele torneiozinho, ao invés de terceiro, e não fez diferença nenhuma.
-
@ c0e0c427:a1f63a16
2024-10-14 09:15:50Chef's notes
Some say beat the cream as hard as you can but I find I have much better success when I take my time. So take it easy and be patient and that magic butter moment will arrive.
Details
- 🍳 Cook time: 15 min
- 🍽️ Servings: Approx 250g butter
Ingredients
- Pure fresh cream
- Salt
Directions
- Keep cream in the fridge until ready to start.
- Pour cream into a bowl.
- Beat with hand mixer or kitchen betchtop mixer with the balloon whisk.
- Maintain a medium power level in the mixer throughout. Note that it can get messy with lots of splatter and you might like to have a tea towel over the operation to limit clean up.
- After 5 min the cream will be whipped this is a great sign! Keep going.
- After 10 -15 min you’ll see the cream start to separate into solids and buttermilk.
- Keep whisking until you see the bright yellow butter solids start to clump together in the mixer.
- Pour off the buttermilk and save for later (bonus side product that makes the best pancakes and is actually really great in scrabbled eggs)
- Rinse in butter solid with cold water to remove all the buttermilk. This is an important step and the buttermilk increases the rate of spoil.
- Mix in salt and shape the butter into a block.
- Wrap and store in the fridge.
-
@ 3bf0c63f:aefa459d
2024-01-14 13:55:28O caso da Grêmio TV
enquanto vinha se conduzindo pela plataforma superior daquela arena que se pensava totalmente preenchida por adeptos da famosa equipe do Grêmio de Porto Alegre, viu-se, como por obra de algum nigromante - dos muitos que existem e estão a todo momento a fazer más obras e a colocar-se no caminhos dos que procuram, se não fazer o bem acima de todas as coisas, a pelo menos não fazer o mal no curso da realização dos seus interesses -, o discretíssimo jornalista a ser xingado e moído em palavras por uma horda de malandrinos a cinco ou seis passos dele surgida que cantavam e moviam seus braços em movimentos que não se pode classificar senão como bárbaros, e assim cantavam:
Grêmio TV pior que o SBT !
-
@ 18bdb66e:82eb5e5d
2024-10-14 23:48:00Chef's notes
Serve over baked potato, cooked white rice, or drop biscuits.
Details
- ⏲️ Prep time: 15 mins
- 🍳 Cook time: 10 mins
- 🍽️ Servings: 2-4
Ingredients
- 2 - 4 Hotdogs, sliced thin
- 1 TBSP Butter
- 1 Can (10.5 oz) bean & bacon soup
- 1 Can (10.5 oz) condensed pea soup
- 1 Soup can of milk
- 1 Soup can of water
Directions
- Lightly brown hotdogs in butter.
- Mix soups, milk, and water in a bowl.
- Add soup mix to hotdogs, heat through but do not boil.
-
@ 6bae33c8:607272e8
2024-10-14 09:03:40This will be an odd column because I missed most of the first wave of games due to Sasha’s basketball game which for God knows what reason they scheduled for Sunday at 6:30 pm (Lisbon time).
The first half was brutal, they were down 38-13, but their troglodyte of a coach shifted to a zone defense in the second half, and they made it respectable, losing 58-39. Why it took him two and a half games to do the obvious, I have no idea. They have only six players — the other teams have 12 — and you can’t chase your “man” around the perimeter all game if you don’t get a rest.
Moreover, I told Sasha, don’t guard your under-16-year-old girl “man” outside the three-point line. If she wants to shoot a long three, let her. But she said her coach says to pick them up over half court like they’re Steph Curry, and they even were full-court pressing at times! You don’t full court press with six players, you need to conserve energy. And you should see this guy, in his late-fifties. stick-skinny legs and a massive gut, totally bald, but thick hair on the sides and back of his head. Total freakazoid.
I guess he deserves credit for teaching them the zone and making the adjustment at half, but Sasha said he would revert to man “if the other team had good three-point shooters.” Retard, the team they played hit a few threes, but you live with it! Let them shoot the three, conserve energy, instead of the layups they were giving up all first half.
In any event, Sasha had eight points, probably 14 boards and was a beast on defense. More Angel Reese than Caitlin Clark, unfortunately. But she’s only 12 and a half, and the league is under-16.
In any event, I did see the late games and had all my teams lose except one, the Primetime going down because it had Marvin Harrison, Jordan Mason and Dallas Goedert all get hurt in the first half. It still put up 142 points and lost by a half a point due to Chase Brown’s late TD and then Wan’Dale Robinson’s catch on the final drive. Mercifully, I wasn’t aware of this until after it happened.
I did go 4-1 ATS finally, but I’m drawing dead in the overall Circa Millions and even Q2 after going 2-3 last week. At least I’m in first place in a double-week (last week was tied) for my home picking pool, pending the Monday night game.
-
My one loss ATS was with the Jaguars. Trevor Lawrence is terrible. The Jets really dodged a bullet by winning that Week 17 game and drafting QB1 (Zach Wilson) who they could ditch two years later. (I hear divorced wine moms in the Denver area are more satisfied and posting less often about politics on Facebook.)
-
Evan Engram really ruins it for the other Jaguars receivers — Lawrence only has eyes for him.
-
The Bears might be good. Caleb Williams spread the ball around and moved well in and out of the pocket. D’Andre Soft, who I mocked this offseason, would go in the second round if we re-drafted today. Starting to regret dropping Cole Kmet and most of my FAAB in the Steak League for Isaiah Likely.
-
I didn’t watch Packers-Cardinals, but there’s something wrong with Kyler Murray. He’s got all the weapons in the world (I know Harrison left early), and can’t make it work.
-
I like seeing the Packers spread it around since I own none of them and was mad at myself for missing out on Jayden Reed.
-
I invested in Alec Pierce this week with Michael Pittman set to go on IR and Josh Downs also iffy. Pierce was wide open on a deep shot again, though Joe Flacco missed him, but it looks like that was a waste of money. I wonder when we see Anthony Richardson again.
-
I don’t see the point of the Titans. Why do they exist? I’m just glad I have none of their players, especially Calvin Ridley.
-
I started Tank Dell over JSN this week, and that was good, but had I known I would have benched Marvin Harrison and moved JK Dobbins into the flex. Actually I would have used Dobbins over Mason and left JSN in the flex. But it’s hard to know half your team will get injured.
-
Stefon Diggs gets it done every game, but he’s yet to have a huge one. I’m happy to have him everywhere, especially with Nico Collins out, but the Texans are a slow-paced, run-heavy offense. Of course, the Patriots with their star corner Christian Gonzalez and terrible offense are not the team you get big points against in the passing game.
-
I didn’t see Drake Maye’s first start, but it looks from the box score like it was okay.
-
Baker Mayfield keeps putting up huge numbers, and the reason my injured Primetime team still did okay was Chris Godwin (WR1) who was a “hold-my-nose” Round 5 pick.
-
I had Bucky Irving in the league I won, but Sean Tucker looked better.
-
I had Chris Olave going in the Steak League. What’s annoying is another team needed to trade a RB for a WR this week, I offered him Olave for James Cook, he countered with David Montgomery, which I would have taken, but I have emails turned off for that league, so I didn’t see it until later that day. By the time I saw it (and went to accept), he had traded Montgomery to someone else. With Brian Robinson out, I started Jerome Ford and Jaylen Warren. And of course Olave got concussed.
-
I didn’t see this game, but I’m assuming Spencer was Rattled.
-
Sounds like I’m glad I missed Eagles-Browns too. The Browns are like the Titans — totally pointless aside for the Deshaun Watson massage jokes.
-
I excoriated Alan Seslowsky for advising me before the 2023 season to take Zay Flowers over De’Von Achane in my Dynasty League, but now I’m glad I have Flowers.
-
Mark Andrews would probably now get drafted in the same place he did pre-season going forward.
-
Derrick Henry is doing exactly what those who had drafted him hoped he would — lead the NFL in rushing and TDs by a wide margin now that he’s on a good team.
-
When Gus Edwards hit IR, I picked up Kimani Vidal in a couple places. JK Dobbins held up for 25 carries and two catches, but Vidal’s role should expand.
-
The Broncos offense just seems like a perpetual emergency two-minute scramble drill, totally haphazard, no rhythm.
-
I had Justin Fields going in a couple places, and his production was a minor miracle. He has no touch, throws only fastballs, even on short passes. But he’s a great scrambler, and they like to call his number around the goal line.
-
Najee Harris bulldozed the Raiders all day. We’re seeing more of those players thrive this year — Henry, Harris, Tyler Allgeier and David Montgomery, off the top of my head. Maybe as teams take away big plays and lighten boxes, the big bruising backs will have a renaissance of sorts.
-
The Raiders are bad.
-
The Lions toyed with the Cowboys in Dallas. The Aiden Hutchinson injury was brutal though, not only for him but for their Super Bowl aspirations.
-
The Cowboys are a bit like the Bengals — they let other teams take away their best player on offense so easily. It doesn’t help that they can’t run to save their lives. (CeeDee Lamb eventually got 14 targets, but they don’t know how to scheme him open.)
-
We had the Falcons in Survivor — easy peasy. I love that Younghoe Koo, after a slow start, got a garbage-time FG at the end. He’s been so reliable this year.
-
Bijan Robinson and Allgeier are like Jahmyr Gibbs and Montgomery — a 50/50 timeshare that favors the pass-catcher, but not commensurate with the gap in their respsective ADPs.
-
The Giants easily could have beaten the Bengals but they missed two FGs and got fooled on the long Burrow TD. Not that playing roughly even with the Bengals at home is something about which to write home. Burrow looks healthy at least after that run.
-
As I mentioned, it’s amazing the Bengals would only get Ja’Marr Chase six targets. And it’s not like their offense was otherwise working as they scored only 17 points.
-
Daniel Jones was okay, but there’s no real spark. He’ll make a solid backup somewhere next year.
-
Tyrone Tracy mostly got stuffed, as the Bengals defense played well against the run. He got a massive workload (17 carries, six targets) though.
-
The Giants defense is for real, even without Kayvon Thibodeaux — they had another four sacks.
-
They still show way too many replays on the 40-minute edited version. I don’t give a fuck about how the defensive lineman got into the backfield for a one-yard stuff! I don’t need to see it from every possible angle! It’s really not that impressive or exciting. They only show that during the live broadcast to kill time during huddles! You don’t need to leave that in, it’s not interesting and it undermines the entire purpose of the edited version! For whatever reason they have only 40-minute versions and five-minute highlights. There needs to be a 20-minute version that’s only the plays.This will be an odd column because I missed most of the first wave of games due to Sasha’s basketball game which for God knows what reason they scheduled for Sunday at 6:30 pm (Lisbon time).
The first half was brutal, they were down 38-13, but their troglodyte of a coach shifted to a zone defense in the second half, and they made it respectable, losing 58-39. Why it took him two and a half games to do the obvious, I have no idea. They have only six players — the other teams have 12 — and you can’t chase your “man” around the perimeter all game if you don’t get a rest.
Moreover, I told Sasha, don’t guard your under-16-year-old girl “man” outside the three-point line. If she wants to shoot a long three, let her. But she said her coach says to pick them up over half court like they’re Steph Curry, and they even were full-court pressing at times! You don’t full court press with six players, you need to conserve energy. And you should see this guy, in his late-fifties. stick-skinny legs and a massive gut, totally bald, but thick hair on the sides and back of his head. Total freakazoid.
I guess he deserves credit for teaching them the zone and making the adjustment at half, but Sasha said he would revert to man “if the other team had good three-point shooters.” Retard, the team they played hit a few threes, but you live with it! Let them shoot the three, conserve energy, instead of the layups they were giving up all first half.
In any event, Sasha had eight points, probably 14 boards and was a beast on defense. More Angel Reese than Caitlin Clark, unfortunately. But she’s only 12 and a half, and the league is under-16.
In any event, I did see the late games and had all my teams lose except one, the Primetime going down because it had Marvin Harrison, Jordan Mason and Dallas Goedert all get hurt in the first half. It still put up 142 points and lost by a half a point due to Chase Brown’s late TD and then Wan’Dale Robinson’s catch on the final drive. Mercifully, I wasn’t aware of this until after it happened.
I did go 4-1 ATS finally, but I’m drawing dead in the overall Circa Millions and even Q2 after going 2-3 last week. At least I’m in first place in a double-week (last week was tied) for my home picking pool, pending the Monday night game.
``` My one loss ATS was with the Jaguars. Trevor Lawrence is terrible. The Jets really dodged a bullet by winning that Week 17 game and drafting QB1 (Zach Wilson) who they could ditch two years later. (I hear divorced wine moms in the Denver area are more satisfied and posting less often about politics on Facebook.)
Evan Engram really ruins it for the other Jaguars receivers — Lawrence only has eyes for him.
The Bears might be good. Caleb Williams spread the ball around and moved well in and out of the pocket. D’Andre Soft, who I mocked this offseason, would go in the second round if we re-drafted today. Starting to regret dropping Cole Kmet and most of my FAAB in the Steak League for Isaiah Likely.
I didn’t watch Packers-Cardinals, but there’s something wrong with Kyler Murray. He’s got all the weapons in the world (I know Harrison left early), and can’t make it work.
I like seeing the Packers spread it around since I own none of them and was mad at myself for missing out on Jayden Reed.
I invested in Alec Pierce this week with Michael Pittman set to go on IR and Josh Downs also iffy. Pierce was wide open on a deep shot again, though Joe Flacco missed him, but it looks like that was a waste of money. I wonder when we see Anthony Richardson again.
I don’t see the point of the Titans. Why do they exist? I’m just glad I have none of their players, especially Calvin Ridley.
I started Tank Dell over JSN this week, and that was good, but had I known I would have benched Marvin Harrison and moved JK Dobbins into the flex. Actually I would have used Dobbins over Mason and left JSN in the flex. But it’s hard to know half your team will get injured.
Stefon Diggs gets it done every game, but he’s yet to have a huge one. I’m happy to have him everywhere, especially with Nico Collins out, but the Texans are a slow-paced, run-heavy offense. Of course, the Patriots with their star corner Christian Gonzalez and terrible offense are not the team you get big points against in the passing game.
I didn’t see Drake Maye’s first start, but it looks from the box score like it was okay.
Baker Mayfield keeps putting up huge numbers, and the reason my injured Primetime team still did okay was Chris Godwin (WR1) who was a “hold-my-nose” Round 5 pick.
I had Bucky Irving in the league I won, but Sean Tucker looked better.
I had Chris Olave going in the Steak League. What’s annoying is another team needed to trade a RB for a WR this week, I offered him Olave for James Cook, he countered with David Montgomery, which I would have taken, but I have emails turned off for that league, so I didn’t see it until later that day. By the time I saw it (and went to accept), he had traded Montgomery to someone else. With Brian Robinson out, I started Jerome Ford and Jaylen Warren. And of course Olave got concussed.
I didn’t see this game, but I’m assuming Spencer was Rattled.
Sounds like I’m glad I missed Eagles-Browns too. The Browns are like the Titans — totally pointless aside for the Deshaun Watson massage jokes.
I excoriated Alan Seslowsky for advising me before the 2023 season to take Zay Flowers over De’Von Achane in my Dynasty League, but now I’m glad I have Flowers.
Mark Andrews would probably now get drafted in the same place he did pre-season going forward.
Derrick Henry is doing exactly what those who had drafted him hoped he would — lead the NFL in rushing and TDs by a wide margin now that he’s on a good team.
When Gus Edwards hit IR, I picked up Kimani Vidal in a couple places. JK Dobbins held up for 25 carries and two catches, but Vidal’s role should expand.
The Broncos offense just seems like a perpetual emergency two-minute scramble drill, totally haphazard, no rhythm.
I had Justin Fields going in a couple places, and his production was a minor miracle. He has no touch, throws only fastballs, even on short passes. But he’s a great scrambler, and they like to call his number around the goal line.
Najee Harris bulldozed the Raiders all day. We’re seeing more of those players thrive this year — Henry, Harris, Tyler Allgeier and David Montgomery, off the top of my head. Maybe as teams take away big plays and lighten boxes, the big bruising backs will have a renaissance of sorts.
The Raiders are bad.
The Lions toyed with the Cowboys in Dallas. The Aiden Hutchinson injury was brutal though, not only for him but for their Super Bowl aspirations.
The Cowboys are a bit like the Bengals — they let other teams take away their best player on offense so easily. It doesn’t help that they can’t run to save their lives. (CeeDee Lamb eventually got 14 targets, but they don’t know how to scheme him open.)
We had the Falcons in Survivor — easy peasy. I love that Younghoe Koo, after a slow start, got a garbage-time FG at the end. He’s been so reliable this year.
Bijan Robinson and Allgeier are like Jahmyr Gibbs and Montgomery — a 50/50 timeshare that favors the pass-catcher, but not commensurate with the gap in their respsective ADPs.
The Giants easily could have beaten the Bengals but they missed two FGs and got fooled on the long Burrow TD. Not that playing roughly even with the Bengals at home is something about which to write home. Burrow looks healthy at least after that run.
As I mentioned, it’s amazing the Bengals would only get Ja’Marr Chase six targets. And it’s not like their offense was otherwise working as they scored only 17 points.
Daniel Jones was okay, but there’s no real spark. He’ll make a solid backup somewhere next year.
Tyrone Tracy mostly got stuffed, as the Bengals defense played well against the run. He got a massive workload (17 carries, six targets) though.
The Giants defense is for real, even without Kayvon Thibodeaux — they had another four sacks.
They still show way too many replays on the 40-minute edited version. I don’t give a fuck about how the defensive lineman got into the backfield for a one-yard stuff! I don’t need to see it from every possible angle! It’s really not that impressive or exciting. They only show that during the live broadcast to kill time during huddles! You don’t need to leave that in, it’s not interesting and it undermines the entire purpose of the edited version! For whatever reason they have only 40-minute versions and five-minute highlights. There needs to be a 20-minute version that’s only the plays. ```
-
-
@ 3bf0c63f:aefa459d
2024-01-14 13:55:28Replacing the web with something saner
This is a simplification, but let's say that basically there are just 3 kinds of websites:
- Websites with content: text, images, videos;
- Websites that run full apps that do a ton of interactive stuff;
- Websites with some interactive content that uses JavaScript, or "mini-apps";
In a saner world we would have 3 different ways of serving and using these. 1 would be "the web" (and it was for a while, although I'm not claiming here that the past is always better and wanting to get back to the glorious old days).
1 would stay as "the web", just static sites, styled with CSS, no JavaScript whatsoever, but designers can still thrive and make they look pretty. Or it could also be something like Gemini. Maybe the two protocols could coexist.
2 would be downloadable native apps, much easier to write and maintain for developers (considering that multi-platform and cross-compilation is easy today and getting easier), faster, more polished experience for users, more powerful, integrates better with the computer.
(Remember that since no one would be striving to make the same app run both on browsers and natively no one would have any need for Electron or other inefficient bloated solutions, just pure native UI, like the Telegram app, have you seen that? It's fast.)
But 2 is mostly for apps that people use every day, something like Google Docs, email (although email is also broken technology), Netflix, Twitter, Trello and so on, and all those hundreds of niche SaaS that people pay monthly fees to use, each tailored to a different industry (although most of functions they all implement are the same everywhere). What do we do with dynamic open websites like StackOverflow, for example, where one needs to not only read, but also search and interact in multiple ways? What about that website that asks you a bunch of questions and then discovers the name of the person you're thinking about? What about that mini-app that calculates the hash of your provided content or shrinks your video, or that one that hosts your image without asking any questions?
All these and tons of others would fall into category 3, that of instantly loaded apps that you don't have to install, and yet they run in a sandbox.
The key for making category 3 worth investing time into is coming up with some solid grounds, simple enough that anyone can implement in multiple different ways, but not giving the app too much choices.
Telegram or Discord bots are super powerful platforms that can accomodate most kinds of app in them. They can't beat a native app specifically made with one purpose, but they allow anyone to provide instantly usable apps with very low overhead, and since the experience is so simple, intuitive and fast, users tend to like it and sometimes even pay for their services. There could exist a protocol that brings apps like that to the open world of (I won't say "web") domains and the websockets protocol -- with multiple different clients, each making their own decisions on how to display the content sent by the servers that are powering these apps.
Another idea is that of Alan Kay: to design a nice little OS/virtual machine that can load these apps and run them. Kinda like browsers are today, but providing a more well-thought, native-like experience and framework, but still sandboxed. And I add: abstracting away details about design, content disposition and so on.
These 3 kinds of programs could coexist peacefully. 2 are just standalone programs, they can do anything and each will be its own thing. 1 and 3, however, are still similar to browsers of today in the sense that you need clients to interact with servers and show to the user what they are asking. But by simplifying everything and separating the scopes properly these clients would be easy to write, efficient, small, the environment would be open and the internet would be saved.
See also
-
@ 3bf0c63f:aefa459d
2024-01-14 13:55:28IPFS problems: General confusion
Most IPFS open-source projects, libraries and apps (excluding Ethereum stuff) are things that rely heavily on dynamic data and temporary links. The most common projects you'll see when following the IPFS communities are chat rooms and similar things. I've seen dozens of these chat-rooms. There's also a famous IPFS-powered database. How can you do these things with content-addressing is a mistery. Of course they probably rely on IPNS or other external address system.
There's also a bunch of "file-sharing" on IPFS. The kind of thing people use for temporary making a file available for a third-party. There's image sharing on IPFS, pastebins on IPFS and so on. People don't seem to share the preoccupation with broken links here.
-
@ c0e0c427:a1f63a16
2024-10-14 09:00:51Chef's notes
I reuse my basic pickle brine at least once. Pickle brine is all about your preference. Make it as sweet as you like with extra sugar, spicy as heck so you are remembering you had them the morning after or a little extra zesty by changing the ratio of water to vinegar to 1:1. Note that the ratio is by weights and I use metric instead of freedom units because that is how I work but imperial will work if for keep the ratio the same by WEIGHT.
Details
- ⏲️ Prep time: 20 min
- 🍳 Cook time: 0 min
Ingredients
- 50mls apple cider vinegar
- 100mls water
- 50grams sugar
- Fresh dill
- Chilli
- 5-10 cucumbers
Directions
- Mix vinegar water together in a pot and bring to a simmer
- Turn off the heat and stir in the sugar until dissolved.
- Add into the brine fresh dill and chilli to your preferred taste.
- Allow brine to cool.
- Chop cucumbers into rounds or julienne and place into a clean and sterilised jar.
- Pour brine into jar so cucumbers are fully covered.
- Can enjoy in 2 days. Keeps up to 2 months.
-
@ 3bf0c63f:aefa459d
2024-01-14 13:55:28Scala is such a great language
Scala is amazing. The type system has the perfect balance between flexibility and powerfulness.
match
statements are great. You can write imperative code that looks very nice and expressive (and I haven't tried writing purely functional things yet). Everything is easy to write and cheap and neovim integration works great.But Java is not great. And the fact that Scala is a JVM language doesn't help because over the years people have written stuff that depends on Java libraries -- and these Java libraries are not as safe as the Scala libraries, they contain reflection, slowness, runtime errors, all kinds of horrors.
Scala is also very tightly associated with Akka, the actor framework, and Akka is a giant collection of anti-patterns. Untyped stuff, reflection, dependency on JVM, basically a lot of javisms. I just arrived and I don't know anything about the Scala history or ecosystem or community, but I have the impression that Akka has prevent more adoption of Scala from decent people that aren't Java programmers.
But luckily there is a solution -- or two solutions: ScalaJS is a great thing that exists. It transpiles Scala code into JavaScript and it runs on NodeJS or in a browser!
Scala Native is a much better deal, though, it compiles to LLVM and then to binary code and you can have single binaries that run directly without a JVM -- not that the single JARs are that bad though, they are great and everybody has Java so I'll take that anytime over C libraries or NPM-distributed software, but direct executables even better. Scala Native just needs a little more love and some libraries and it will be the greatest thing in a couple of years.
-
@ 18bdb66e:82eb5e5d
2024-10-14 02:23:59Chef's notes
Cook pancakes ahead of time and freeze. Move to refrigerator the night before serving.
Details
- ⏲️ Prep time: 20 mins
- 🍳 Cook time: 20 mins
- 🍽️ Servings: 4
Ingredients
- 4 Slices Bacon
- 1 Can (10.5 ounce) condensed cream of chicken or mushroom soup
- ½ cup milk
- 4 boiled eggs, sliced
- 2 TBSP pimiento, chopped
- Pancakes
Directions
- Cook bacon until crisp; remove and crumble
- Pour off drippings
- Blend soup and milk;
- Add bacon, eggs, and pimiento.
- Heat through stirring frequently.
- Spoon between pancakes, sandwich style.
-
@ 18bdb66e:82eb5e5d
2024-10-14 02:15:49Details
- ⏲️ Prep time: 20 mins
- 🍳 Cook time: 10 mins
- 🍽️ Servings: 4
Ingredients
- 1 Can (10 ½ ounces) condensed Cheddar, or cream of celery soup.
- ½ cup milk
- 4 boiled eggs, sliced
- 2 TBSP pimiento, chopped
- 4 Slices of toast
Directions
- Add soup and milk in medium pot.
- Mix in egg slices, and pimiento reserving some for garnish.
- Heat through, stirring often.
-
@ d42dac70:ed6cd749
2024-10-14 07:55:34NOSTR
NOSTR, heard of it yet? I have a feeling we are all going to hear about it alot more.
Notes and Other Stuff Transmitted by Relays, is a client-relay model with privacy, user control and censorship resistance at the heart of this social network protocol.
Why?
It’s a step shift in centralised social media platforms such as Twitter, Instagram that suffer from corporate and/or state influence, control and censorship. See the Twitter files to find out more about that. NOSTR addresses these with an open, private, decentralised and permission-less approach.
Public Key Encryption.
Rather than having an ‘account’ with email/username and password, and more often than not, some personal details such as telephone, and whatever personal data you wish to hand over. The protocol this on it's head and uses public key encryption. Thus all you need is the private key (which you keep safe), and you share your public key on the network. The use of public key encryption is a real strength, you own your identity, no authority has it.
Free for development:
NOSTR is open to extension and development. There is an array of clients, such as Amethyst, and Damus, amongst other, https://nostr.com/clients Anyone can build on the protocol, apps, clients, relays and tools. Only imagination will limit it.
User control:
The user has control of their audience, having the ability to choose their preferred relays. Customise your feed to what you prefer. No central algorithm deciding what you are going to get. As mentioned with the public key encryption, It allows anonymity. It’s freedom to express, without bans, shadow bans, account locks or censorship.
Simple:
In a now fragmented world of social media, the most secure, user-centric, decentralised, simple, reliable platform will have a head start to other centralised or server controlled platforms. NOSTR gives freedom and control.
-
@ 18bdb66e:82eb5e5d
2024-10-14 02:05:51Chef's notes
Try Fiesta Cheese soup for a little flavor kick. Omit lemon juice and pepper.
Details
- ⏲️ Prep time: 20 mins
- 🍳 Cook time: 15 mins
- 🍽️ Servings: 4
Ingredients
- 8 Strips bacon
- 1 Can Cheddar cheese soup
- ½ Cup milk
- 1TSP Lemon juice
- Cayenne pepper to taste
- 2 Medium tomatoes, sliced
- 4 Slices toast
Directions
- Cook bacon. Set drippings aside.
- Add soup to skillet
- Heat to simmer
- Add milk, lemon juice, and pepper
- Blend till smooth
- Heat slowly so as not to scorch milk.
- Plate toast, and lay tomato and bacon on each slice.
- Ladle soup over toast.
-
@ a012dc82:6458a70d
2024-10-14 04:09:42Table Of Content
-
Historical July Performance
-
Predictions for July 2023
-
Other Perspectives
-
The Role of Macro Factors
-
Conclusion
-
FAQ
Bitcoin, the world's leading cryptocurrency, has had a stellar performance in June 2023, gaining 12%. Despite a last-minute dive due to a macro news event, Bitcoin managed to close the month in a solid position. The monthly close came in at $30,465 on Bitstamp, marking Bitcoin’s best June performance since 2019.
Historical July Performance
Historically, July has been a favorable month for Bitcoin. Throughout its history, Bitcoin's price action has never lost more than 10% during the month of July. This consistent performance has led many investors and traders to look forward to July with optimism.
Predictions for July 2023
However, not everyone is convinced that the bullish trend will continue into July 2023. Popular trader CryptoBullet has expressed skepticism about Bitcoin's potential price upside in July.
CryptoBullet's Analysis
According to CryptoBullet, "common sense" dictates that BTC/USD should fall below some key moving averages. He believes that Bitcoin can go to $35,000 to "hunt liquidity", but the mid-term bullish rally is likely to end in July.
The Concept of Liquidity Hunting
The concept of liquidity hunting in the low $30,000 zone is a popular theory for price continuation. This theory suggests that Bitcoin's price might continue to rise as it seeks liquidity, but the rally might not last beyond July.
Other Perspectives On the other hand, Rekt Capital, another analyst, is optimistic about Bitcoin's prospects. He anticipates a "healthy technical retest" of levels below $30,000 for Bitcoin, despite the monthly close.
Rekt Capital's Optimism
Rekt Capital suggests that even if the BTC price were to snap below that downside target, it would not be "out of the ordinary." He believes that Bitcoin is well-positioned for upside overall, which could mean a positive outlook for the rest of 2023.
The Role of Macro Factors
The performance of Bitcoin is not only influenced by its own market dynamics but also by macroeconomic factors. These include global economic trends, regulatory developments, and technological advancements. These factors can have a significant impact on investor sentiment and market dynamics.
Conclusion As we move into the second half of 2023, the question remains: Will this year prove to be an exceptional one for Bitcoin? The answer largely depends on market dynamics, investor sentiment, and macroeconomic factors.
Investors and traders are advised to conduct their own research and consider multiple perspectives before making any investment decisions. After all, every investment and trading move involves risk. The performance of Bitcoin in July 2023 and the rest of the year will undoubtedly be closely watched by the global crypto community.
FAQ
How did Bitcoin perform in June 2023? Bitcoin gained 12% in June 2023, closing the month at a solid position of $30,465 on Bitstamp.
What is Bitcoin's historical performance in July? Historically, Bitcoin's price action has never lost more than 10% during the month of July.
Will 2023 prove to be an exceptional year for Bitcoin? The answer largely depends on market dynamics, investor sentiment, and macroeconomic factors. Some analysts predict a slowdown in Bitcoin's price rally, while others remain optimistic about its prospects.
What is liquidity hunting? Liquidity hunting is a theory suggesting that Bitcoin's price might continue to rise as it seeks liquidity. However, this rally might not last beyond a certain period.
That's all for today
If you want more, be sure to follow us on:
NOSTR: croxroad@getalby.com
Instagram: @croxroadnews.co
Youtube: @croxroadnews
Store: https://croxroad.store
Subscribe to CROX ROAD Bitcoin Only Daily Newsletter
https://www.croxroad.co/subscribe
DISCLAIMER: None of this is financial advice. This newsletter is strictly educational and is not investment advice or a solicitation to buy or sell any assets or to make any financial decisions. Please be careful and do your own research.
-
-
@ 3bf0c63f:aefa459d
2024-01-14 13:55:28Que vença o melhor
Nos esportes e jogos em geral, existe uma constante preocupação em balancear os incentivos e atributos do jogo, as regras do esporte em si e as regras das competições para que o melhor vença, ou, em outras palavras, para que sejam minimizados os outros fatores exceto a habilidade mais pura quanto possível no jogo em questão.
O mundo fora dos jogos, porém, nem sempre pode ter suas regras mudadas por um ente que as controla e está imbuído da vontade e dos meios para escolher as melhores regras possíveis para a obtenção dos resultados acima. Aliás, é muitas vezes essa possibilidade é até impensável. Mesmo quando ela é pensável e levada em conta os fatores que operam no mundo real não são facilmente identificáveis, eles são muitos, e mudam o tempo todo.
Mais do que isso, ao contrário de um jogo em que o objetivo é praticamente o mesmo para todo mundo, os objetivos de cada agente no mundo real são diferentes e incontáveis, e as "competições" que cada um está disputando são diferentes e muitas, cada minúsculo ato de suas vidas compreendendo várias delas simultaneamente.
Da mesma forma, é impossível conceber até mesmo o conceito de "melhor" para que se deseje que ele vença.
Mesmo assim é comum encontrarmos em várias situações gente que parte do princípio de que se Fulano está num certo lugar (por exemplo, um emprego muito bom) e Beltrano não isso se deve ao fato de Fulano ter sido melhor que Beltrano.
Está aí uma crítica à idéia da meritocracia (eu tinha me esquecido que essa palavra existia).
-
@ 18bdb66e:82eb5e5d
2024-10-14 01:57:16Chef's notes
Serving with Texas Toast is a great option.
Details
- ⏲️ Prep time: 15 mins
- 🍳 Cook time: 10 mins
- 🍽️ Servings: 4
Ingredients
- 2 TBSP butter, melted
- 1 Can (10.5 ounce) condensed cream of celery soup
- ½ Cup milk
- ¼ Cup chopped onion
- 1 Package (4 ounces) sliced beef
- Toast
Directions
- Melt butter in heavy skillet.
- Brown beef and onion in butter.
- Mix soup and milk.
- Add soup to skillet.
- Heat; stirring often.
- Serve on hot toast.
-
@ 18bdb66e:82eb5e5d
2024-10-14 01:52:01Chef's notes
Garnish with chopped green onions, mushrooms, or serve with a side of carrots for variety.
Details
- ⏲️ Prep time: 10 mins
- 🍳 Cook time: 10 mins
- 🍽️ Servings: 4
Ingredients
- 2 cans condensed beef broth
- 2 soup cans of water
- ½ bay leaf
- 1 egg
Directions
- Add soup, water, and bay leaf in pot.
- Bring soup to boil, reduce heat
- Simmer 5 minutes
- Remove bay leaf and discard.
- Beat egg slightly.
- Pour thin stream of egg into soup while stirring.
- Salt and pepper to taste.
- Serve with toast.
-
@ acc925af:db9fb0bb
2024-10-13 21:21:57After having listened to Jason Hughes, Mechanic and Luke Dash Jr on several podasting 2.0 segments, it's clear to summarize that the requirements for running a DATUM server is just one's RPC Authentication as well as Bitcoin Address.
After tinkering for a while, I thought, what stops them from adding an additional field for a NOSTR public key, or address.
The hope's that a user (miner) can prioritize where the sats should go, when they Ocean hits a block. Either their bitcoin address gets the sats or NWC makes it possible for the npub to receive those sats(or ecash). What's needed on the Ocean side would be an active lightning node or mint to handle the facilitation of that.
Side note, some miners might be concerned about still getting coinbase satoshis, and my believe is Ocean could decide to fund a channel with fat satoshis from a coinbase tx, this is where miners who opt to be paid in millisatoshis get their rewards from.
Thoughts?
Sources: https://www.fountain.fm/episode/pqb1QSxGcBebz5n11vja (Citadel dispatch with LUKE, MARK, JASON, AND MECHANIC) https://www.fountain.fm/episode/1bJR5egDBcLIVO43Rw5m (Bitcoin Audible with Mechanic and Jason)
originally posted at https://stacker.news/items/722139
-
@ 3bf0c63f:aefa459d
2024-01-14 13:55:28Token-Curated Registries
So you want to build a TCR?
TCRs (Token Curated Registries) are a construct for maintaining registries on Ethereum. Imagine you have lots of scissor brands and you want a list with only the good scissors. You want to make sure only the good scissors make into that list and not the bad scissors. For that, people will tell you, you can just create a TCR of the best scissors!
It works like this: some people have the token, let's call it Scissor Token. Some other person, let's say it's a scissor manufacturer, wants to put his scissor on the list, this guy must acquire some Scissor Tokens and "stake" it. Holders of the Scissor Tokens are allowed to vote on "yes" or "no". If "no", the manufactures loses his tokens to the holders, if "yes" then its tokens are kept in deposit, but his scissor brand gets accepted into the registry.
Such a simple process, they say, have strong incentives for being the best possible way of curating a registry of scissors: consumers have the incentive to consult the list because of its high quality; manufacturers have the incentive to buy tokens and apply to join the list because the list is so well-curated and consumers always consult it; token holders want the registry to accept good and reject bad scissors because that good decisions will make the list good for consumers and thus their tokens more valuable, bad decisions will do the contrary. It doesn't make sense, to reject everybody just to grab their tokens, because that would create an incentive against people trying to enter the list.
Amazing! How come such a simple system of voting has such enourmous features? Now we can have lists of everything so well-curated, and for that we just need Ethereum tokens!
Now let's imagine a different proposal, of my own creation: SPCR, Single-person curated registries.
Single-person Curated Registries are equal to TCR, except they don't use Ethereum tokens, it's just a list in a text file kept by a single person. People can apply to join, and they will have to give the single person some amount of money, the single person can reject or accept the proposal and so on.
Now let's look at the incentives of SPCR: people will want to consult the registry because it is so well curated; vendors will want to enter the registry because people are consulting it; the single person will want to accept the good and reject the bad applicants because these good decisions are what will make the list valuable.
Amazing! How such a single proposal has such enourmous features! SPCR are going to take over the internet!
What TCR enthusiasts get wrong?
TCR people think they can just list a set of incentives for something to work and assume that something will work. Mix that with Ethereum hype and they think theyve found something unique and revolutionary, while in fact they're just making a poor implementation of "democracy" systems that fail almost everywhere.
The life is not about listing a set of "incentives" and then considering the problems solved. Almost everybody on the Earth has the incentive for being rich: being rich has a lot of advantages over being poor, however not all people get rich! Why are the incentives failing?
Curating lists is a hard problem, it involves a lot of knowledge about the problem that just holding a token won't give you, it involves personal preferences, politics, it involves knowing where is the real limit between "good" and "bad". The Single Person list may have a good result if the single person doing the curation is knowledgeable and honest (yes, you can game the system to accept your uncle's scissors and not their competitor that is much better, for example, without losing the entire list reputation), same thing for TCRs, but it can also fail miserably, and it can appear to be good but be in fact not so good. In all cases, the list entries will reflect the preferences of people choosing and other things that aren't taken into the incentives equation of TCR enthusiasts.
We don't need lists
The most important point to be made, although unrelated to the incentive story, is that we don't need lists. Imagine you're looking for a scissor. You don't want someone to tell if scissor A or B are "good" or "bad", or if A is "better" than B. You want to know if, for your specific situation, or for a class of situations, A will serve well, and do that considering A's price and if A is being sold near you and all that.
Scissors are the worst example ever to make this point, but I hope you get it. If you don't, try imagining the same example with schools, doctors, plumbers, food, whatever.
Recommendation systems are badly needed in our world, and TCRs don't solve these at all.
-
@ df478568:2a951e67
2024-10-13 20:36:12Keet is a peer to peer video chat room that is available on: • App Store • Google Play • Linux • Mac • Windows
It uses technology similar to BitTorrent, but you make video calls instead of downloading music, free and open source software, and movies that are in the public domain. If you have ever used BitTorrent, I'm sure these are the things you have used Bittorrent for.😉 You can use Keet for:
• Video Chat • Voice Phone Calls • An Online Chat Room • Sending Files Between Devices
Since we are in the very early days, not too many people know about it, but I prefer this because the sound quality and speed are superior to most corporate alternatives. If you've ever tried sending a large file through the InterTubes, you'll know this can be a sucky experience. Even if you run your own cloud like NextCloud, it's an inefficient. You upload your large file to the Nextcloud instance which is basically another computer. Then you download the file to the compter you really want it on. In this case, your Nextcloud acts like a middle man. This man in the middle architecture used to transfer large files is inefficient.
**note: This was originally published on my Ghost blog. It may not work on all nostr clients.
Jeff Swann told me about this new technology a couple years ago. He told me how he used Keet lo transfer files. I heard what he said, but I didn't quite understand how powerful this was until I tried it myself. I can send videos from my phone to my desktop computer within second just by using Keet rooms. This is a computer networking super power. I just can’t reiterate how much time this has saved me. It is something you need to experience for yourself. By the way, anyone who can download an app and install a program on their computer can do this. You don’t need to be a network administrator wizard or learn how to code.
If you would like to join my keet room, check out my nostr page or LinkedIn and I'll send you a link.
Keet Vs. Legacy Video Calling
Legacy chat rooms and video calling services require a server. The data is hosted on their server. This is inefficient and requires a ton of centralized infrastructure to handle the bandwidth. This infrastructure requires a lot of maintenance, marketing and other stuff. They have thousands of employees working for them to get your videos from point A- to point C- to point B. I’m sure these people do a wonderful job, but Keet is different.
Keet allows you to go from point-A to point-B. According to their website it is: - Private & encrypted - Has amazing video quality • Allows you to instantly share huge files That huge file sharing is awesome by the way—Even if you don’t really talk to that many people on it very often.
It is made by a peer-to-peer company named Holepunch. They have not yet open sourced it yet, but they say they have plans to do this on Guy Swann’s podcast. They also made something called pear-runtime. You can learn more about this at pears.com. From what I understand, this is a new way to do computer networking. It basically makes it possible to host an app or website from your computer using one line of code. This allows you to create your own Intranet with the greatest of ease. I tried it one time using an application named HoleSail. I was able to access a website using a local IP address from a LAN outside of my home network. I didn't need to fiddle with the DNS or buy a domain name. I just installed the program on my computer, wrote one line of code, and copied the key to access the website.
Keet Is Brand New Technology.
I just want to mention this is on the bleeding cutting edge of technology. I am explaining this to the best of my ability, but it is beta software so what I say today may be totally different a year from now. It is also quite possible that I misunderstood some stuff and if that is the case then I apologize in advance. I find this technology interesting and think it opens us up to a new ways of using the Internet, but I don’t have a crystal ball. Do not confuse this as investment advice, but as far as I know, this is not even something you can invest in. You don’t even need to buy Keet. You just download it.
I don’t know much about the big corporate video calling companies, but I’m pretty sure they charge a fee for some of their services. Please don’t take my word for this, I have no idea how they work or what their fee structures are.
Here are the sources where I have learned about these things: Hat tip to Jeff Swan who taught me how Keet worked and to his brother Guy Swann for making all these great podcasts about it. • Interview with SuperSu • The Pear Report Episode: 2 • Bitcoin Audible: Keet AMA - Twitter Spaces on January 30th • [The Pear Report: Updates From The Pear World]((https://fountain.fm/episode/blklbIi1GZCgIvX9E8nY)
✌️
https://tinyurl.com/marc26z
865,210
As Seen On TOR:
http://p66dxywd2xpyyrdfxwilqcxmchmfw2ixmn2vm74q3atf22du7qmkihyd.onion/pear-to-pear/
On The Clearnet:
https://marc26z.com/pear-tp-pear/
-
@ 3cd2ea88:bafdaceb
2024-10-14 23:14:40💻 L’exchange Bitget introduce nuove misure per evitare la quotazione di progetti ad alto rischio, proteggendo i propri utenti da frodi e scam.
🛍️ Bitget ha annunciato un inasprimento dei criteri per il listing dei token, imponendo rigorosi controlli legali e tecnici. Tra le misure vi sono la valutazione della qualità del codice e della compliance normativa, proteggendo gli investitori da progetti poco solidi o fraudolenti.
🛍️ La Fully Diluted Valuation (FDV) sarà un parametro chiave per filtrare i progetti, insieme ai volumi di trading e alla distribuzione dei token. Anche i token già listati su altri exchange saranno sottoposti a verifiche, incluse le sospensioni e la concentrazione di token in pochi wallet.
🛍️ Oltre ai controlli tecnici, Bitget richiederà la presentazione di un business plan per dimostrare la sostenibilità e la crescita del progetto. Anche i token frutto di accordi commerciali dovranno rispettare questi standard, rendendo più sicura l'esperienza per gli utenti.
Unisciti al nostro gruppo Telegram: https://t.me/Bitcoin_Report_Italia
Referral Bitget -10% sulle fee + bonus benvenuto 6w5d o link: https://bonus.bitget.com/U1JNEK
-
@ 18bdb66e:82eb5e5d
2024-10-14 01:15:00Chef's notes
Serve with a breakfast meat, and toast.
Details
- ⏲️ Prep time: 20 mins
- 🍳 Cook time: 10 mins
- 🍽️ Servings: 4
Ingredients
- 2 TBSP butter, melted
- 1 can (10.5 ounce) condensed Cheddar cheese, cream of celery, chicken, or mushroom soup
- 8 eggs
- Pepper to taste
Directions
- Melt butter in heavy skillet.
- Mix in soup, eggs and pepper in bowl or measuring cup.
- Add soup to skillet.
- Cook over low heat until eggs are set, stirring gently.
-
@ 18bdb66e:82eb5e5d
2024-10-14 01:12:56Chef's notes
Crack one egg at a time into small bowl, then ease into soup mixture before cracking the next egg. Use a slotted spoon to remove egg from soup mixture.
Details
- ⏲️ Prep time: 20 mins
- 🍳 Cook time: 10 mins
- 🍽️ Servings: 3
Ingredients
- 2 TBSP butter
- 1 can (10.5 ounce) condensed cream of celery, chicken, or mushroom soup
- ½ cup milk
- 6 eggs
- 3 English muffins (split, toasted, buttered)
Directions
- Melt butter in heavy skillet.
- Mix in soup and milk in bowl or measuring cup.
- Add soup to skillet, heat to boiling
- Gently ease eggs into soup mixture.
- Reduce to simmer. Cook over low heat until whites are firm.
- Place one egg each on a muffin half.
- Spoon soup mixture over egg and muffin.
-
@ c80b5248:6b30d720
2024-10-13 18:14:34Using tools like Continue in your vault
As the capabilities of artificial intelligence continue to expand, integrating AI into our workflows has become an increasingly attractive option. One of the most exciting applications of AI is its potential to enhance the way we manage and organize information. Obsidian, a powerful knowledge management tool, provides a robust platform for building a personal knowledge base. By layering AI tools like Continue over your Obsidian vault, you can unlock new levels of efficiency, creativity, and insight. This article will start to explore how to effectively use AI tools within Obsidian to enhance your note-taking, information management, and productivity.
An Explosion of AI Tools
Over the past few years, I have tinkered with ChatGPT and other chat interfaces, but I only recently stumbled upon the rapidly growing space of AI tools for coding. In such a short time, some amazing tools have emerged, most notably:
- Aider: A command line interface tool to iteratively generate, edit, and refactor code.
- Cursor: A fork of Visual Studio Code (VS Code) with integrated AI functionality.
- Cline: A plug-in for command line and code editor built to work with Antropic's Claude 3.5.
- Continue: A customizable VS Code plug-in with chat and code editing abilities.
These tools are designed to assist developers in writing, debugging, and even generating code from natural language prompts. They are powered by large language models (LLMs) like GPT-4 and Llama 3, which are trained on vast amounts of text data and can produce human-like responses to a wide range of prompts.
In this article, I will focus on Continue, a VS Code plug-in that offers multiple ways to interact with AI. It features autocomplete powered by an LLM of your choice, as well as the ability to generate new code blocks directly in the editor. It can also incorporate context from external sources or the local codebase. Additionally, it includes a standard chat window for interacting with the LLM.
The new twist is that I won't be using Continue to write code, but rather to write notes in Obsidian. I will be using the chat window to generate notes, and the autocomplete feature to assist me in writing them. By leveraging the context feature, I can bring in information from my Obsidian vault, allowing me to create more complete, accurate, and better-organized notes. I can also use the vault as context to ask for summaries or retrieve information from my notes, even as the vault continues to grow.
It's worth mentioning that while I am focusing on Continue, there are likely other tools that can be used in a similar way or provide better features. One example is the text-generator plug-in for Obsidian. This plug-in allows you to generate text using an LLM of your choice, and it can be used to generate notes, summaries, or even entire documents. It can also generate code, but I was unable to get the plug-in working with my LLM provider. Using Continue is a bit of a hack, as it requires working through an IDE like VS Code, but it's a good way to get started with AI tools in Obsidian. I will assume that you already have an Obsidian vault set up. If you don't, you can ask your assistant to help you organize it once you have it up and running.
The system I am going to describe here relies on two primary components:
- Continue (installed in an IDE like VS Code)
- An LLM provider to power Continue
Let's start by talking about LLM Providers. If you already know how these work, feel free to skip to the next section.
LLM Providers
LLM providers are services that offer access to large language models (LLMs) like GPT-4 or Llama 3.1, typically via an API (application programming interface). These providers usually charge by the token, which is the number of words processed by the model. You can go directly to a provider like OpenAI or Anthropic, or you can use an aggregation site like OpenRouter that provides a single API to access multiple models. Each provider has its own data privacy policies, so it's important to review them carefully. For this reason, I have been using DeepInfra. They run their own models and offer a clear privacy policy - even better, they tend to have the lowest costs.
h/t nostr:npub17vhnjkt04m6thytr8dna67v2pa4tjk7uh3ut40eq9wy8d28u0kvq7qnhkq nostr:note1qfckzxm687peaddwjpmms92kj3v59wrrx0cs2fcxlkm6pm9lyu3squscxa
Another option is to use Ollama to run some of these models locally. However, the hardware requirements for achieving good results quickly are quite demanding. For example, the smaller chat model I use in my configuration, which has 72 billion parameters, requires a 48 GB GPU to run efficiently—something that is not within my budget. This is why I am using DeepInfra.
Note: If you are setting this up for the first time, consider adding a small amount (less than $5) to a provider like DeepInfra and testing it out before you invest time in setting up a local Ollama instance. I have also had some issues with shutting down Ollama on Windows, so your mileage may vary.
If you choose to use a provider like DeepInfra, you are ready to move to the next section. If you prefer to set up Ollama, you can refer to their documentation for installation instructions. I prefer to run it in Docker, which can be done in Linux by running
bash docker run -d -v ollama:/root/.ollama -p 11434:11434 --name ollama ollama/ollama
or if you want to have an interface like ChatGPT, you can even run Open WebUI in the same command with
bash docker run -d -p 3000:8080 --add-host=host.docker.internal:host-gateway -v open-webui:/app/backend/data --name open-webui --restart always ghcr.io/open-webui/open-webui:main
Once Ollama is running in docker you can start up the models you want to use by running the following in your terminal.
docker exec ollama ollama run model_name
See the Ollama model library to choose which models you want to run locally.
Getting Started with Continue
Continue is installed as a plug-in for VS Code or JetBrains. I personally use it with VS Code, so my instructions will be based on that. If you are using a JetBrains IDE, you should refer to the Continue documentation for installation instructions.
After installing the plug-in, continue will prompt you to set up your LLM provider. In my experience, once this initial GUI goes away, you can't get it back. Instead, you will do most of the configuration within the
config.json
file for Continue, which you can access by clicking in the lower right corner of the Chat box. In VS Code, if you ever can't find anything,F1
is your friend and will launch a searchable menu.Continue provides recommended settings from each provider, which you can find here. For my coding and writing, I chose the very new Qwen2.5 72B Instruct due to its high benchmark scores and relatively low costs. This model costs $0.35-0.40 USD per million tokens, compared to the best available on DeepInfra, the Llama3.1 405B Instruct, which costs $1.78 per million tokens. The results may be slightly worse, but I prefer cheaper and faster for my purposes. For autocomplete, I am using a faster and code-specific model, Qwen2.5-Coder-7B. I have not yet tried changing the autocomplete model for usage with Obsidian, but that is on my to-do list. Lastly, by the time you read this article, these models may be out of date. One nice thing about having a provider API is that you can easily switch and test different models to see how they work. Aider has one of many model leaderboards that will show you some benchmarks.
After working through the configuration, your
config.json
file will have a list of chat models and a tab for the autocomplete model. It will look something like this:```json "models": [ { "title": "DeepInfra Qwen2.5 72B Instruct", "provider": "deepinfra", "model": "Qwen/Qwen2.5-72B-Instruct", "apiKey": "your-api-key" }, { "title": "DeepInfra Llama3.1 405B Instruct", "provider": "deepinfra", "model": "meta-llama/Meta-Llama-3.1-405B-Instruct", "apiKey": "your-api-key" }, ],
"tabAutocompleteModel": { "title": "DeepInfra Qwen/Qwen2.5-Coder-7B", "provider": "deepinfra", "model": "Qwen/Qwen2.5-Coder-7B", "apiKey": "your-api-key" } ```
Trying it Out
The Chat UI
Once you have Continue configured, you can open your Obsidian Vault in VS Code. You will want to add a
.continueignore
file in your folder that lists.obsidian
and any other files or folders you want Continue to ignore for context purposes.Click the three dots in the bottom of the chat bar and check that your vault (@codebase) index is complete. You can now chat with the LLM and ask it questions using your vault as a reference.
@codebase what are some common themes from this vault?
Continue provides a docs page that lists some types of questions that an LLM will be able to help with. Naturally, I asked the LLM to put these in the context of an Obsidian Vault and here is what it told me:
```md
Useful Questions
- High-Level Questions About Your Notes:
- "What are the main themes in my notes on personal development?"
-
"How do I incorporate agile methodologies into my project management?"
-
Specific Information:
- "What are the key points in my notes about productivity hacks?"
-
"Can you find any references to neuropsychology in my notes on cognitive science?"
-
Generating Content:
- "Write a new note on the benefits of meditation, using the same structure as my other wellness notes."
-
"Draft a summary of my recent project retrospective, following the format of my previous summaries."
-
Contextual Questions About a Specific Folder:
- "What is the main purpose of the 'Research' folder?"
-
"How do we use the concept of 'flow' in the 'Psychology' folder?"
-
Relationships and Connections:
- "What are the connections between my notes on 'Time Management' and 'Goal Setting'?"
-
"How do my notes on 'Digital Marketing' relate to 'SEO'?"
-
Task and Project Management:
- "What are the next steps I should take based on my notes for the 'Personal Finance' project?"
-
"Can you list the tasks I need to complete for my 'Career Development' plan?"
-
Deep Dives and Analysis:
- "Can you provide a detailed explanation of the concept of 'reflective practice' found in my notes?"
-
"What insights can you derive from my notes on 'Project Management'?"
-
Insight and Reflection:
- "What have I learned from my notes on 'Mindfulness'?"
- "Can you help me reflect on my progress based on my notes for the 'Health and Wellness' topic?"
Not Useful Questions
- Literal Review of All Files:
- "Find everywhere where the term 'mindfulness' is mentioned in my entire vault."
-
"Review all my notes and find any spelling mistakes."
-
Comprehensive Tasks that Require Literal Access:
- "Add a new section to all notes that discuss 'productivity' and summarize the main points."
-
"Rewrite all my notes on 'Digital Marketing' to include the latest industry trends."
-
Refactoring and Detailed Edits:
- "Update all references to 'Scrum' to 'Kanban' in my 'Agile' folder."
- "Add a new parameter to the function
calculate_score
and update all usages in my 'Programming' notes."
Summary
- Useful Questions: Focus on high-level insights, specific information, generating new content, contextual questions about specific folders, and reflecting on your notes.
- Not Useful Questions: Require the LLM to see and edit every file, perform comprehensive reviews, or make detailed edits across multiple notes. ```
Text Generation
Continue also offers in-editor code generation with the hotkey
Ctrl+I
and an entered prompt. I have only tried a few things with this, but it was able to successfully review a set of meeting notes I had written and summarize all of the outstanding questions. I expect you could also use this to autogenerate backlinks on a note where a follow-up note might be helpful, or quickly generate templates to be used in Obsidian. I ended up editing this entire article by selecting sections and prompting the AI with the following: "You are a proficient writer. Please edit this text for style, typos, spelling, and grammar."Autocomplete
Continue will also attempt to autocomplete unless you turn it off in the bottom right bar in VS Code. While writing this article, the autocomplete feature was somewhat helpful even though it is not code. Further configuration may optimize this even more. Keep in mind that autocomplete triggers frequently and will burn through a lot of tokens, so you will want to keep an eye on your usage. With the cheaper models I am using, I have only spent 10 cents over the past four days of moderate usage at work and at home. A bulk of that cost is due to autocomplete, and I sometimes turn it off to keep costs down. You may be able to limit these costs effectively by configuring the number of input tokens that can be sent to the API, but I am not sure how that will impact the results.
## Conclusion - Brought to You by Qwen 72B
In conclusion, integrating AI tools like Continue into your Obsidian vault opens up a multitude of possibilities for enhancing your note-taking, information management, and productivity. By leveraging the chat window, text generation, and autocomplete features, you can create more comprehensive and accurate notes, generate summaries, and automate routine tasks. The integration of LLMs into your workflow not only streamlines your processes but also provides deeper insights and connections within your knowledge base. While there are initial setup steps and some considerations around cost and configuration, the benefits of AI-assisted note-taking in Obsidian are well worth the effort. As AI tools continue to evolve, the potential for further enhancements and optimizations is immense, making this an exciting and valuable addition to any knowledge management system.
-
@ 3bf0c63f:aefa459d
2024-01-14 13:55:28Precautionary Principle
The precautionary principle that people, including Nassim Nicholas Taleb, love and treat as some form of wisdom, is actually just a justification for arbitrary acts.
In a given situation for which there's no sufficient knowledge, either A or B can be seen as risky or precautionary measures, there's no way to know except if you have sufficient knowledge.
Someone could reply saying, for example, that the known risk of A is tolerable to the unknown, probably magnitudes bigger, risk of B. Unless you know better or at least have a logical explanation for the risks of B (a thing "scientists" don't have because they notoriously dislike making logical claims), in which case you do know something and is not invoking the precautionary principle anymore, just relying on your logical reasoning – and that can be discussed and questioned by others, undermining your intended usage of the label "precautionary principle" as a magic cover for your actions.
-
@ e7211c22:e87afeee
2024-10-12 02:46:09Chef's notes
If you do one thing to improve your health in the kitchen, ditch the industrial seed oils and make your own mayonnaise. Make sure to use virgin coconut oil and extra virgin olive oil, not light or refined olive oil. That being said, use extra virgin olive oil from a lighter tasting olive variety, such as Arbequina, or mayonnaise will have a strong olive oil taste. Where do you get extra virgin olive oil from you may ask? Ugly olives, of course. The addition of yogurt and whey greatly extend the shelf life of your mayonnaise from 1-2 weeks to 1-2 months in the refrigerator, while adding beneficial probiotics. To spice up you mayonnaise, see end of directions.
Details
- ⏲️ Prep time: 15 minutes
- 🍳 Cook time: 0 minutes
- 🍽️ Servings: lots
Ingredients
- 1 whole egg
- 2 egg yolks
- 1 Tbsp Grey Poupon
- 1 Tbsp lemon juice
- 1/2 tsp salt
- dash white pepper
- 1/2 cup virgin coconut oil, warmed to liquid
- 1/2 cup extra virgin olive oil, from a lighter tasting olive variety, such as Arbequina
- 1 Tbsp plain yogurt
- 1 Tbsp whey
Directions
- Mix first six ingredients in a bowl with an immersion blender or food processor.
- Combine oils in pourable measuring cup.
- Slowly, drip by drip, begin to add oil to first six ingredients while running immersion blender or food processor. If oil is added too quickly at first, emulsification will not occur and mayonnaise will be ruined.
- Continue adding oil to first six ingredients drip by drip, increasing to slow drizzle, then thin stream, then steady stream. Take breaks pouring oil if necessary to completely blend in oils.
- Add yogurt and whey. Refrigerate.
- To spice up your mayonnaise: Sriracha mayonnaise - with first six ingredients add 1 clove garlic, mashed, 2 Tbsp sriracha, 2 Tbsp lime juice, and an additional 1/4 tsp salt. Chipotle lime mayonnaise - replace 1 Tbsp lemon juice with 1 Tbsp lime juice, with first six ingredients add 1 clove garlic, mashed, 1/4-1/2 can chipotle peppers in adobo sauce, 2 limes juiced and zested, and an additional 1/4 tsp salt.
-
@ 0e501ec7:de5ef3a4
2024-10-14 21:36:26blog van Tim: https://timscyclethoughts.blogspot.com
We zijn nu al bijna een week in het Abtshof! Wat een drukke week is het geweest. Je denkt dan, we zijn op reis, we zijn op vakantie, op het gemak. Helemaal niet waar! We hebben heel veel mee gewerkt aan het project. Vorige keer las je al dat we de namiddag dat we toekwamen hier al bij het verwijderen van plaaster hadden gehad geholpen.
Dat hebben we de dag erna ook gedaan, in de ochtend. Ging allemaal goed, tot ik op een bepaald moment op een bepaald moment een stukje plaatster in mijn oog kreeg, dat pikte enorm! Ik kreeg het er ook niet uit, en toen na wat gegoogle, besloot ik om het zo grondig mogelijk uit te spoelen. Een half uur heb ik toen mijn oog onder de kraan gehouden, ik ben nu officieel expert in het oog uitspoelen met water. Het was er toen wel uit en deed geen zeer meer. Maar ik had toch geen zin meer om plaaster uit te breken. Daarom ben ik Jakob gaan helpen met de afwerking van de unit waar Ivan naartoe ging verhuizen. In de namiddag hebben we pieter zijn parket geschaafd: die had een koopje gedaan op het internet, maar het was nogal donker behandeld. We hebben er dus het bovenste laagje van gehaalt, met een groot schaafmachien. Een heel gemakkelijk en handig apparaat, maar wel een beetje eng. Heel goed oppassen wanneer je het hout erin steekt!
Er is hier ook een andere wwoof'er, die Teo noemt. Hij komt uit Canada, en maakt een grote reis van België tot naar Spanje, een beetje gelijk ons, maar dan zonder fiets! Echt een leuke jongen, mijn Frans is eventjes niet top genoeg om echt te kunnen babbelen, maar we hebben wel veel fun samen, zeker de laatste dagen. Tim en hij kunnen helemaal opgaan in hun muziek en filmbesprekingen, en morgen doen we zelfs een filmavondje om hem een goeie Belgische film te tonen.
Vrijdag heb ik weer bij de afwerking van Ivan's unit geholpen. ik heb de rand van een velux helpen isoleren, en plinten opgemeten en gezaagd. Dat was zo moeilijk, om juist te meten en te zagen! Uiteindelijk had ik er maar 2 van de 8 juist, de anderen waren allemaal 3 mm te lang :( dju toch, volgende keer beter! Gelukkig konden ze makkelijk bijgewerkt worden. Tim en Teo waren ondertussen nog aan het uitbreken, ook leuk, maar ik was blij dat ik daar even aan kon ontlopen.
Daarna kregen we onze eerste les van de gloednieuw geimproviseerde houtbewerkingsxursus, gegeven door de meestermeubelmaker-schrijnwerker Jakob! Hij legde ons uit hoe we hout verbindingen kunnen maken, toonde er een heleboel en ging meer in detail bij een redelijk simpele: de half-hout verbinding. Hij legde uit hoe we een beitel moeten hanteren en hoe we zeer recht kunnen zagen (belangrijk als je een verbinding maakt!). Na de uitleg gingen we direct aan de slag: we zouden een rek gaan bouwen voor in de voorraadkamer. Er staan langs 2 muren al rekken, en ons rek zou de stijl van de anderen een beetje volgen de de derde muur helemaal bedekken. Nog niet zo gemakkelijk: de muur en de vloer zijn er nogal ruw en hobbelig, hoe begin je daar te meten? In het rek kunnen we elk 10 keer een halfhout verbinding maken, goeie oefening!
Je merkt dat ik vooral heel veel vertel over wat we allemaal gedaan hebben. Niet zo heel veel mijmeringen en emotie. Dat is eigenlijk ook logisch, we zijn vooral heel de tijd bezig. En als je bezig bent mijmer je niet en worden je emoties ook niet zo groot. Ik vind het fantastisch om bezig te zijn. Ik miste dat ook echt de laatste maand, maar nu mis ik ook wel weer het mijmeren. Denk ik? Alleszins, ik wou dat ik ook andere dingen had om op te schrijven.
Ik ben wel ook veel bezig geweest met het Bos, het Wondelbos, O Wondelbos, en hoe om te gaan met het verdriet en de boosheid die geboren wordt uit het verlies, hoe te rouwen. Dat is niet zo gemakkelijk. Ik denk dat het belangrijkste is dat ik graag die gevoelens wil eren. Het Bos eren, ook al is die er niet meer. Bien schreef erover, en ik vond het zo mooi, dat ik het heel graag hier zou quoteren. Maar ik weet niet of dat oké is, dus zal het voor later houden.
Vetrouw je lichaam, vertrouw je gevoel, ik probeer het zo te zeggen tegen mezelf. Ik vertrouw mijn lichaam. Ik denk dat we veel kunnen vinden in onszelf, als we maar het lef hebben om te luistern. Nu en simpel: ik voel me uitgeput, ik vertrouw erop dat het een goede keuze is om nu te gaan slapen.
De dagen na vrijdag zal ik later wel vertellen, of niet. Liefs!
-
@ c69b71dc:426ba763
2024-10-10 09:05:29Chef's notes
This cashew blue cheese is a true plant-based delight, delivering the rich, tangy flavours you’d expect from traditional blue cheeses like Roquefort or Gorgonzola. The fermentation process, with the help of «Penicillium Roqueforti», creates a beautifully marbled, creamy cheese that’s both bold and complex. It’s a labor of love that rewards your patience with an unforgettable vegan cheese experience! Whether enjoyed on crackers, in salads, or simply on its own, this cheese will elevate any dish with its unique flavour profile.
Note 1: For this recipe you need parchment paper, a potent blender, glass jars with lid and two cheesecloths.
Note 2: Always use very clean tools, and avoid touching with your fingers or tasting with them while working on the cheese!
Details
- ⏲️ Prep time: 4-5 weeks
- 🍳 Cook time: 0
- 🍽️ Servings: Two small cheese loaves (2x 10-12 cm diameter)
Ingredients
- 300g raw cashews
- 3 tbsp water
- 3 tbsp kefir, kombucha or rejuvelac
- 2 tbsp coconut oil (raw, unrefined)
- 1-4 capsules vegan probiotics
- 1/2 tsp Himalayan salt (iodine-free, no additives)
- 1/16 tsp «Penicillium Roqueforti» (blue cheese mold culture)
Directions
- Day 1: Soak 300g of cashews overnight in water.
- Day 2: Rinse the soaked cashews thoroughly and let them drain well.
- In a high-speed blender, combine the cashews, 3 tbsp of water, 3 tbsp kefir or rejuvelac, and 2 tbsp coconut oil. Blend until the mixture is smooth and creamy.
- Add 1-4 capsules of vegan probiotics, 1/2 tsp Himalayan salt (free of iodine and additives), and blend again briefly.
- Add a pinch (about 1/16 tsp) of «Penicillium Roqueforti» powder (blue cheese culture) and give it another quick mix.
- Transfer the cashew mixture to a glass container, leaving the lid lightly on top (do not seal it completely) and store in a warm place, ideally in your kitchen, for 24 hours to ferment.
- Day 3: Divide the fermented cashew mixture into two smaller glass containers lined with cheesecloth. Press the mixture down firmly to eliminate air pockets.
- Store in a cool place (12-14°C / 53-57°F), ideally in a wine fridge.
- Day 4: Remove the cheese from the containers, take off the cheesecloth, and turn the cheese onto parchment paper.
- Sprinkle salt all over the cheese, ensuring it is evenly coated.
- Cover the cheese with larger glass bowls, ensuring that air can flow from underneath, and return to the wine fridge or the cool storage area.
- Days 4-7: Turn the cheese daily onto fresh parchment paper to maintain its texture.
- Day 7 or 8: Pierce the cheese with a thicker wooden skewer to create holes, allowing oxygen to reach the center, encouraging the blue mold to grow throughout the cheese, not just on the surface.
- Alternatively, crumble the cheese completely and then press it back into shape to ensure oxygen distribution.
- Days 8 toaround 12 or 15: Once the blue mold has fully developed around and inside the cheese, wrap the cheese in parchment paper, place it in a wooden cheese box, and then wrap it in a cloth bag.
- Transfer to a regular fridge to age for another 2-3 weeks or even several months, depending on your desired strength of flavour.
-
@ 5c7794d4:98abc46b
2024-10-13 16:34:46Hey, plebs!
We’ve got some news to share about #Annonymal’s journey so far and where we’re headed.
As most of you know, we’ve been at this since October 31st, 2022, and we’re about to celebrate our second anniversary soon.
Originally, we were aiming to drop the first-ever Bitcoin-only heavy metal album this year in 2024, but… well, things didn’t quite go as planned.
We’ve been stacking sats over the last two years and we are at the final recording sessions of our album this month.
We are happy with the results as we have killer tracks that’ll really amp up the pro-Bitcoin vibes.
We’re stoked about it, but after looking at our budget, we’re realizing we might not have the funds to promote it the way we want.
So, we had two options: delay the whole thing until October 2025 OR… find a middle ground. And we chose to keep the ball rolling!
We’re still gonna drop our new single, “Horns Up For Satoshi,” on October 31st, 2024, to mark our anniversary and give you a taste of what’s coming.
Then, the full album will be released on January 31st, 2025, regardless of how much money we raise for promotion.
We’ve worked hard, and we’re just too excited to hold it back.
We’re still aiming to raise about 6k USD to get a solid promo campaign going and make sure we do this album justice.
Every sat counts, and if you feel like throwing some support our way, you can donate via Lightning Network (LN) at annonymal@getalby.com or the on-chain address bc1qq06tpkugwle76wwj50u5gcvr0mv5ettmeflryg.
But anyway, in the end of the day, this isn’t just about us—it’s about all of us spreading the word about Bitcoin in a way that’s fun and loud.
We know not everyone gets it, but hey, that’s not the point. We’re here to orange-pill the people who do.
So, thanks for sticking with us, supporting us, and being an awesome community.
Let’s make some noise for Bitcoin and rock the world!
Horns Up For Satoshi! 🤘
-
@ 8d34bd24:414be32b
2024-10-13 14:57:58There have been many so called gods throughout the history of mankind. All but one have been created by man (or possibly fallen angels) and formed by man’s hands. Only the God of the Bible created man, formed man & breathed breath into him, and revealed Himself to mankind.
The God of the Bible does not need man to defend Him. (Believers are called to be “… ready to make a defense to everyone who asks you to give an account for the hope that is in you …”(1 Peter 3:15) and to stand up for the truth.) The God of the Bible is the only God who is able to fight for Himself and His honor with no help from His creation. This story from 1 Samuel is an inspiring and humorous story that shows God’s ability to defend Himself even when none of His “followers” are doing a good job of following.
The Philistines Eli’s son’s, Hophni and Phinehas, carried the Ark of the Covenant with the Israelite army into battle against the Philistines and Hophni & Phinehas were killed, the Israelite army was defeated, and the Ark of the Covenant was captured.
God had been disrespected by the Israelites in general and the priests in particular, so God allowed them to be defeated by their enemies. This however doesn’t mean that He allowed His name to be dishonored.
Now the Philistines took the ark of God and brought it from Ebenezer to Ashdod. Then the Philistines took the ark of God and brought it to the house of Dagon and set it by Dagon. When the Ashdodites arose early the next morning, behold, Dagon had fallen on his face to the ground before the ark of the Lord. So they took Dagon and set him in his place again. (1 Samuel 5:1-3a) {emphasis mine}
When the Philistines put the Ark into the temple of their “god,” they put the Ark before Dagon as a sign of submission, but the one true God doesn’t need anyone to defend Him. When the people returned the next day, their “god” Dagon was face down, prostrate before the Earthly throne of God. The real God cast down the false god/idol in the ultimate position of submission and worship.
The Philistines, however, weren’t ready to submit to the real God yet.
So they took Dagon and set him in his place again. But when they arose early the next morning, behold, Dagon had fallen on his face to the ground before the ark of the Lord. And the head of Dagon and both the palms of his hands were cut off on the threshold; only the trunk of Dagon was left to him. (1 Samuel 5:3b-4) {emphasis mine}
After the Philistines sat their “god” up again (because he couldn’t set himself up), the real God cast him face down again, but this time removed his head and his hands (his mind and his ability to act). You have to love God’s sense of humor showing them who was really God, but like most people, they were slow learners and didn’t want to change their worldview.
Now the hand of the Lord was heavy on the Ashdodites, and He ravaged them and smote them with tumors, both Ashdod and its territories. When the men of Ashdod saw that it was so, they said, “The ark of the God of Israel must not remain with us, for His hand is severe on us and on Dagon our god.” So they sent and gathered all the lords of the Philistines to them and said, “What shall we do with the ark of the God of Israel?” And they said, “Let the ark of the God of Israel be brought around to Gath.” And they brought the ark of the God of Israel around. (1 Samuel 5:6-8) {emphasis mine}
When the Philistines still wouldn’t listen, God attacked them personally by smiting “them with tumors.” Fear overcame them, so they sent the Ark to another Philistine city, Gath. They didn’t worship the one, true God. They didn’t return the Ark. They just passed the misery to another of their cities.
After they had brought it around, the hand of the Lord was against the city with very great confusion; and He smote the men of the city, both young and old, so that tumors broke out on them. So they sent the ark of God to Ekron. And as the ark of God came to Ekron the Ekronites cried out, saying, “They have brought the ark of the God of Israel around to us, to kill us and our people.” (1 Samuel 5:6-8) {emphasis mine}
As the Ark arrived in Gath, the people of Gath had tumors break out, so the people of Gath sent the Ark on to Ekron. The Ekronites realized what was about to befall them and cried out saying, “They have brought the ark of the God of Israel around to us, to kill us and our people.” After seven months of various cities being ravaged by God, they finally called their diviners in order to try to figure out what to do to stop this plague.
They said, “If you send away the ark of the God of Israel, do not send it empty; but you shall surely return to Him a guilt offering. Then you will be healed and it will be known to you why His hand is not removed from you.” Then they said, “What shall be the guilt offering which we shall return to Him?” And they said, “Five golden tumors and five golden mice according to the number of the lords of the Philistines, for one plague was on all of you and on your lords. So you shall make likenesses of your tumors and likenesses of your mice that ravage the land, and you shall give glory to the God of Israel; perhaps He will ease His hand from you, your gods, and your land. (1 Samuel 6:3-5) {emphasis mine}
God hates divination, but this was the first wise action taken by the Philistines. They started to show proper respect for the one true God, even if they didn’t really understand that He wasn’t just another god, but the one and only God. The one thing they did understand was that they should give a guilt offering to ask forgiveness for their sins against God.
Why then do you harden your hearts as the Egyptians and Pharaoh hardened their hearts? When He had severely dealt with them, did they not allow the people to go, and they departed? (1 Samuel 6:6)
They also had seen God’s majesty and wrath with respect to the Egyptians and Pharaoh and didn’t want to suffer what Egypt suffered for refusing to obey God. They feared God, but they didn’t want to submit to Him and they really didn’t want to submit to the Israelites, so they decided to put God to a test:
Now therefore, take and prepare a new cart and two milch cows on which there has never been a yoke; and hitch the cows to the cart and take their calves home, away from them. Take the ark of the Lord and place it on the cart; and put the articles of gold which you return to Him as a guilt offering in a box by its side. Then send it away that it may go. Watch, if it goes up by the way of its own territory to Beth-shemesh, then He has done us this great evil. But if not, then we will know that it was not His hand that struck us; it happened to us by chance.” (1 Samuel 6:7-9) {emphasis mine}
The Creator of the universe didn’t have any trouble with the Philistine’s test. The Philistines had two nursing cows yoked to a cart with the Ark on it. They wanted to see if these nursing cows would head home to their nursing calves as would be expected, or would they take the Ark home to Israel? What do you think happened? Of course, the cows took the Ark straight to Israel to the very city, Beth-shemesh, that the Philistines had specified. He proved without a shadow of a doubt that He was God.
If only the Israelites showed as much respect. Many of the residents of Beth-shemesh died because they disobeyed and looked into the Ark. The one true God is omnipotent, but He is also holy and must be treated as such.
God made sure His people and these pagan foreigners knew His power and He didn’t need any help.
Just as was shown in my last post, this historical event demonstrated God’s power to His people and to foreigners. When God’s chosen people refused to show Him proper reverence, He corrected them and corrected those surrounding them.
Trust Jesus.
your sister in Christ,
Christy
Bible verses are NASB (New American Standard Bible) 1995 edition unless otherwise stated
-
@ c73818cc:ccd5c890
2024-10-14 18:32:24👋 Nonostante il divieto sulle criptovalute, la Cina mantiene il predominio nel mining di Bitcoin, superando gli Stati Uniti.
🎙 Il controllo segreto della Cina sul mining di Bitcoin
👋 Tre anni dopo il divieto del 2021, i pool di mining cinesi continuano a dominare l'hash rate globale, con il 55%, mentre gli Stati Uniti si attestano al 40%. Questo successo è dovuto all'ingegnosità dei miners che aggirano le restrizioni locali e sfruttano le risorse energetiche economiche come quelle del Sichuan.
🎙 Sopravvivenza del mining e discussioni normative
👋 Nonostante la repressione, la Cina potrebbe cambiare atteggiamento: si ipotizza una regolamentazione delle transazioni crypto entro il 2025, segno di un possibile approccio pragmatico nel settore. L'evoluzione delle normative potrebbe permettere a Pechino di mantenere il passo nella competizione tecnologica con gli Stati Uniti.
🎙 Il futuro del mining in Cina rimane incerto
👋 La Cina resta prudente: qualsiasi apertura dovrà essere accompagnata da una regolamentazione rigorosa per gestire i rischi finanziari e limitare i deflussi di capitale. Tuttavia, il dominio nascosto di Pechino nel mining di Bitcoin riflette la complessità e la resilienza del panorama globale delle criptovalute.
Unisciti al nostro gruppo Telegram: https://t.me/Bitcoin_Report_Italia
Referral Bitget -10% sulle fee + bonus benvenuto 6w5d o link: https://bonus.bitget.com/U1JNEK
BitcoinReportItalia #Mining #Pool #Cina #Hashrate #StatiUniti #Miners #Pechino #Regolamentazione #Cripto #Bitcoin
-
@ 592295cf:413a0db9
2024-10-13 08:29:48[07/10 week]
Thinking about it, even the protocol is a cathedral, Rabble in the speech in Riga on Bluesky.
He said the protocol is a bazaar. But you have to converge on the scheme in the NIPs or between Apps.
NIPs for example are like Luther's 95 theses, but they change continuously and adapt, but they always remain those 95.
Maybe that Pr on theother curve keys could lead to saying this is "nostr" these others are similar. Creating more points, but I just think it would have led to endless diatribes.
What will be of the protocol and who knows. He can do everything or maybe nothing and from tomorrow we will see and it will be, it will be what it will be. Italian Song
Notifications with nostter are not hidden, they are in your feed and this is good, you always know if someone has searched for you. While in the others you do not know.
I saw a sliver of light pass by it was Unanimity.
It's a very stupid idea, it takes a long time. it's basically a community + channel, where you post the channel in the community and start talking about that topic in the channel. The channel is an approved message. I made musicbook channel, it's the collection of albums released on Friday. The idea of also making a blogger channel, where to put long-form articles.
Following nostr trending on Openvibe social, with a new profile, the Lost One, sad, in this One follow fiatjaf, means I won't bother him anymore . Now I follow 62 profiles, it's an account that I will use to read the notes of the top profiles. Curious if this number will grow enormously or is there a spectre.
The strength of the protocol is the developers if they collaborate together, otherwise it can still work, everyone goes their own way, but it's like saying I want to make my own fence.
One who in his long form doing an analysis of the various social networks. npub19mq9swna4dkhlm3jaux4yhgv5kjj556lkfhv3qnjtyh0kcljph6s88e295 Nostr is all based on Bitcoin. The difficult thing is Bitcoin not Nostr and he says so.
Controversies are useful, or my doubts, but maybe people who can't write code don't understand much, the so-called end users. No one is an end user at this time. The end user doesn't care about the person behind it, only having their own service, if the service is good they also do promotion, they become sponsors. We have seen in recent months sponsoring a Nostr app, result a small attack can damage that app. But the strength of having all these apps is that the other app doesn't have that problem. Spam attack example. The problem is that you can't sponsor an ecosystem, so it becomes difficult to suggest 10 apps to download. The best 10 apps of Nostr and the other 100, there is no easy way out. It's a bit like proposing a new place in NY, then everyone goes to that place and it loses a bit. What the sponsor must understand is that Nostr has only one "one shot".
I saw a video on Nostr of two people posting content on social media, making a review. Not bad, compared to the previous video, that Nostr doesn't even have a token. It doesn't give me a sign up. The main feature they say is a platform or at least they reviewed damus, damus for Bitcoin maxi. And so Nostr is populated by people who Number go up, only fiat thought they would say on Nostr. It's true in part there are those obsessed, even the non-obsessed are obsessed.
How nice it would be to call them NPs Nostr protocol specification, today supertestnet called them that. (the nice thing is that they are pronounced the same way).
-
@ e7211c22:e87afeee
2024-10-09 15:45:58Chef's notes
Originally from American Lamb Passport recipe booklet
Details
- ⏲️ Prep time: 30 minutes
- 🍳 Cook time: 20 minutes
- 🍽️ Servings: 4
Ingredients
- 1.5 lbs ground mutton or lamb
- 1/3 cup yellow onion, diced
- 3 cloves garlic, minced
- 1.5 tsp dried oregano
- kosher salt, to taste
- 3 chipotle chiles in adobo sauce, finely chopped, plus 3 Tbsp sauce
- 4 cups cabbage, finely shredded
- 1 bunch radishes, thinly sliced
- 1 cup fresh pineapple, diced
- 4 green onions, thinly sliced
- 1/3 cup fresh cilantro, coarsely chopped
- 1 lime, juiced
- corn tortillas, warmed for serving
Directions
- In large skillet, brown lamb, onion, garlic, oregano, and 1 tsp salt. Add 1/3 cup water, chipotle chiles, and adobe sauce and stir to combine, scraping up any bits from the bottom of skillet. Cook for 2-4 minutes or until liquid evaporates and sauce clings to the lamb.
- Toss cabbage, radishes, pineapple, green onion, and cilantro in a large bowl. Add lime juice and sprinkle with 1/2 tsp salt and toss to combine.
- Spoon meat onto warm tortillas and top with a generous heap of slaw. Serve with other toppings such as avacado, sour cream, queso fresco, or pickles jalepenos.
-
@ 09fbf8f3:fa3d60f0
2024-10-14 15:42:04我搭建了一个网盘,国内访问速度还可以。
我买的是每月5刀的无限存储计划,只要还在使用,每天会增加1G的存储。(需要通过面板重启后赠送。)
官网
-
不要使用VPN注册,会提示欺诈风险,有可能会砍单。
-
@ 5e9efd13:13821c2a
2024-10-13 06:17:49Eighteen months after my mother suddenly passed away, I was diagnosed with grade four brain cancer. I was 25 years old.
Wow. When I put it like that, it really puts the last five years of my life into perspective.
We all want to become great, but we don’t get to live the life we want without suffering.
The greatest honor I’ve had through this entire experience is to inspire others through my journey. It wasn’t easy. Actually, it was extremely difficult. But if I can make it easier for you—my job is complete.
One of my greatest honors in my journey was to inspire my own father. It’s every son’s dream. Without knowing it, I inspired my father to get in control of his health.
Nine months after my cancer diagnosis, I moved back home with him. Into a house with a 70-year-old widower showing early signs of Parkinson’s disease. It was my first time living at home with my dad since I was 19—and this time, my mom wasn’t there. That transition was hard, to say the least. Back at home, finally in that safe space again… but I’m missing my mom, and he’s missing his wife.
Still, despite our differences (I punched a hole in the wall), I persevered every day in telling him I knew I could heal from this cancer. He encouraged me to take chemotherapy, I pushed for alternative treatments. He pushed for a Christian mindset, I aimed for a Taoist one. Yin and Yang. Father and son.
It has been two years of living in the house with him, and I can say things are going well, and I love my father. Our deep challenges have only brought us closer.
About 17 months into my cancer journey, my father was then diagnosed with a condition. He had surgery, lost a lot of weight, and began taking his health seriously. Today, he goes to the gym, swims, and even does a Tai Chi sword class. At some point, he told me that I was actually the reason he started believing in his own ability to recover. It is incredibly rewarding to know that my choice to be brave in a world full of suffering can inspire others to take action.
If you are suffering right now, I feel you. A lot of people are in the same boat as you.
I want you to know that it will get better.
If you are reading this right now, it already has. You are already feeling better. I want you to know that you telling your story helps other people. You’re on your way up. One day at a time. People love a redemption arc. Sometimes you need to hit rock bottom before you can rise up again. You can do it. You are, in fact, already doing it.
Depression, check.
Cancer, check.
Dead mom, check.
I mean—some people definitely have it a lot worse. At least I had a mom. At least I didn’t have cancer for the first 25 years of my life. At least I grew up with two parents who loved me. I had friends, food, and shoes. When you get another chance to live, you realize that all you really need is the humility to admit you aren’t perfect. Friends, food, shoes, and purpose. A way to contribute. If you’re lost because you feel like you have no purpose and nothing to contribute, start now. Please, if you are suffering, tell your story. It helps other people. Dare I even say that you are being selfish by not sharing your story?
It’s all about perspective. Sometimes I ponder why I lost years of my life battling this disease—but then I remember that the knowledge I gained far surpasses any amount that I could learn in fifty years of a healthy life.
Yes, I guess I’ve led some sort of a life so far.
But that begs the question, what does it mean to lead a life?
With that said: I’ve always wondered what a life coach is, or what qualifies someone to be one. I guess it’s anyone who has a life that you would like to emulate… So I just pay someone else to give me encouragement? Well, no—I’m sure it’s deeper than that.
I think that everyone in your life can be viewed as a coach. Some coaches are good, some aren’t so good. But everyone pushes us in a certain direction. It could be a friend, an enemy, a stranger. A teacher, a weirdo, a YouTuber you’ve never met.
You can be a coach too, especially if you have suffered through the pain.
If your life has always been a breeze—good, I am happy for you, and congratulations.
But if you feel like there’s no reason to live, that the world is ending, and that it couldn’t get worse… first of all—you’re wrong. It can always get worse. And—it can get a lot, lot better.
It’s all a matter of perspective. In one way, my mother’s death was the most tragic and unnecessary event to ever happen in my life.
In another way, my mother’s death was a necessary step for my family to come together in unity and praise for the homemaker—it forced me to grow up and made me learn how to take on my own responsibilities—no longer a mama’s boy, but now a man.
In one way, being diagnosed with brain cancer at the age of 25 was a devastating and unwarranted attack from God placed upon a motherless boy who always tried to be a good person.
In another way, being diagnosed with cancer at the age of 25 was exactly what God needed to do to make me stop taking life for granted—and to grow into the hero that He has always wanted me to be. God placed a ball of pure energy deep inside my skull where it couldn’t be seen—and once discovered, the responsibility was placed on me to either surrender and let it take over, or to transform that energy into positivity and send a message of love into the world.
If it weren’t for those events happening to me—or FOR me—you wouldn’t be reading this article right now.
And YOU—yes, you.
You have a story to tell, and I look forward to hearing it.
I trust that you found this article to be helpful, and I would like to end it with a prayer.
Even though I am suffering right now, I fully and completely accept myself.
Even though I want more, I am fully satisfied with what I already have.
Even though I am lost as to what to do with my life, I am grateful that I remain alive in this moment.
Even if things don’t go exactly the way I want them to go, I fully trust that whatever is meant for me will come to me—as long as I remain strong amidst the suffering.
-
@ 1b5ee74d:bb1aae6e
2024-10-12 19:49:12On October 8th, the American production company HBO—owned by Warner Bros. Discovery—released Money Electric: The Bitcoin Mystery. The documentary, directed by Cullen Hoback and currently available only to the U.S. audience, was immediately shared via P2P file-sharing platforms and can thus be easily found online.
Considering all the elements presented in the hour-and-a-half-long documentary, my personal judgment swings between two feelings:
- Satisfaction for having witnessed a thorough explanation of Bitcoin’s origins, its cultural roots, the reasons behind its creation, and the intrinsic problems of the traditional financial system.
- Frustration over a conspiracy theory—claiming that Bitcoin was sabotaged by U.S. government agents infiltrating the Bitcoin community to prevent it from functioning as a medium of exchange—and a baseless hunt for Satoshi Nakamoto, which is especially dangerous for the man identified: Peter Todd.
The Negative Aspects
The Surreal Conspiracy Around Replace-By-Fee (RBF)
One of the documentary's central issues is the inclusion of conspiracy theories aimed at explaining Bitcoin's evolution through external interventions, mainly by government actors, who allegedly tried to manipulate the technology to prevent it from scaling in terms of processed transactions. The goal, it is claimed, was to keep Bitcoin as a store of value and technically render it impossible for it to function as a medium of exchange.
The ultimate reason for this, according to the theory, is that everyday transactions could only occur through intermediaries and, as a result, would be easily controllable by authorities. The U.S. government's goal, therefore, would have been to negatively influence Bitcoin’s development. This idea is not unrealistic in itself, but this is where things get absurd.
Hoback, spurred on by Roger Ver, resurrects a story about an email allegedly sent to Peter Todd in 2013 by someone named John Dillon. Dillon, claiming to hold a “high-level” role in intelligence, supposedly requested the development of Replace-By-Fee (RBF) for the paltry sum of $500.
RBF is a function that allows an unconfirmed transaction to be replaced with a different version of the transaction that pays a higher fee, with the goal of achieving quicker confirmation. And here, Roger Ver provides the narrative hook: RBF would have driven transaction fees through the roof, making it uneconomical to use Bitcoin for everyday transactions, thereby fulfilling the U.S. government's objective.
History has shown that this theory was baseless—fees didn’t skyrocket with RBF—but the fact that Todd actually contributed to developing RBF convinced the documentary’s author that this was a credible hypothesis. The theory that Todd collaborated with the government is presented with alarming carelessness, despite a lack of concrete evidence, and Todd, understandably, denies everything. This conspiracy also contains a fundamental inconsistency: why would Satoshi Nakamoto have wanted to collaborate with the government to prevent Bitcoin from becoming digital cash?
The Blocksize War: Misunderstood and Poorly Told
The documentary presents a distorted view of the so-called Blocksize War. The thesis reflects the exact opposite of what actually happened. Again misled by Roger Ver's words, Hoback hypothesizes that the failed attempt to increase Bitcoin's block size led to a centralization of the network around the Blockstream team. The truth is the opposite: had the blockspace been increased, the network would have faced inevitable centralization, as the unfortunate fate of Bitcoin Cash demonstrated.
According to the documentary, the outcome of the war even allowed everyday Bitcoin transactions to occur “only through tools provided by Blockstream.” No names are mentioned, although it’s suspected that the reference is to Liquid. What reveals the documentary’s evident bad faith is that there isn’t a single mention of the Lightning Network, which allows low-cost transactions, doesn’t necessarily require intermediaries, and is certainly not controlled by Blockstream.
In general, Hoback gives too much screen time to controversial figures like Roger Ver and Gavin Andresen, whose opinions, while representative of a certain point in Bitcoin’s history, are distorted by the context in which they are presented.
The Baseless Manhunt
The hunt for Peter Todd is perhaps the most problematic aspect of the documentary. The narrative focuses on seemingly irrelevant details, weaving a sensationalist plot to make viewers believe that Todd might be Satoshi Nakamoto. This attempt poses a serious risk to Todd’s personal safety, which should not be underestimated. The narrative, while effective in capturing the attention of an uninformed audience, is highly dangerous.
The “evidence” provided is completely inconsistent. Consider that the most damning proof is a 2010 BitcoinTalk post in response to Satoshi Nakamoto, which Hoback claims was accidentally posted using Todd’s profile. That is, according to the author, Satoshi himself completed his post through a response but mistakenly logged in with his personal profile: Todd's.
This is a groundless hypothesis and, moreover, not a new revelation. It's also important to note that Peter Todd's nickname at the time was “retep,” and no one knew who he was. If it had been Satoshi Nakamoto, he could have easily deleted the post without leaving any unwanted traces.
The Myth of Satoshi’s One Million Bitcoins
The documentary repeatedly claims that Satoshi Nakamoto accumulated one million bitcoins and that a massive sale of these coins could “break the system.” This, too, is a misleading statement, as there is no certainty regarding the exact number of bitcoins Nakamoto possesses, and the idea that the sale of this alleged fortune could destroy Bitcoin is completely unfounded. In fact, it is never explained.
The Positive Aspects
The Roots of Bitcoin
Money Electric does have some merits, particularly in the first part, where it focuses on an accurate explanation of Bitcoin’s origins and the historical context in which it emerged. The documentary effectively recounts how earlier attempts to create digital currencies, like E-Gold, failed and how E-Gold’s founder, Douglas Jackson, was arrested for his activities. The author understands and communicates a key concept: if you build a product that can compete with the U.S. dollar, the government will come after you. Therefore, the decision to remain anonymous makes perfect sense. One is left to wonder: why did you try to reveal Satoshi’s identity?
The description of Bitcoin’s founding values, linked to the cypherpunk movement, is one of the most successful parts. The crypto wars of the 1990s and the battle for the use of cryptography, portrayed as a sort of weapon by the U.S. government, are explained in an accessible way, even to those unfamiliar with the topic, offering valuable historical context for understanding Bitcoin’s birth.
Mining and Energy
Mining is described as a lottery, finally breaking away from the common narrative that portrays it as an activity based on “complex calculations” or “advanced algorithms.” The simplified approach is well-executed and makes one of Bitcoin’s most misunderstood aspects comprehensible to the general public.
Another positive aspect is the documentary’s exploration of the relationship between Bitcoin and energy consumption. Rather than demonizing the energy link, it smartly compares it to the relationship between the dollar and oil, presenting this connection as inevitable for any form of money with intrinsic value. Money, it is specified, must evidently be tied to something that people consider valuable, like an energy source.
Traditional Financial System and CBDCs
The portrayal of the 2008 financial crisis and the parallel with the current fragility of the global monetary system is well done, showing how Bitcoin emerged in response to a failing system. In this sense, the documentary raises a warning about the future use of Central Bank Digital Currencies (CBDCs), which are described as dystopian tools of control, with a particular focus on the Chinese e-yuan, which is literally called a “government-backed shitcoin.”
The author casts doubt on the stability of the U.S. dollar itself, suggesting that even the American currency could face collapses similar to those of hyperinflated currencies. While not a definitive claim, this perspective introduces an important question about the future of the global financial system, undermining the steadfast beliefs of a large portion of the market that sees the dollar as an indestructible fortress.
Cold Judgment
Money Electric is a documentary that, perhaps for the first time, effectively explains several aspects of Bitcoin in a way that is both compelling and easily understandable. The fact that such a product comes from a major production house should be considered a success.
On the other hand, the misleading portrayal of events like the Blocksize War and the relentless search for a conspiracy to destroy Bitcoin—both tainted by the biased opinions of individuals defeated by history, like Roger Ver and Gavin Andresen—undermines the solid foundations initially laid with the description of the technology.
Lastly, such a blatant ad hominem accusation, supported by such flimsy evidence, is unacceptable. Identifying someone as Satoshi Nakamoto is, for the same reasons acknowledged by the author at the beginning of the documentary, extremely dangerous for that individual’s personal safety. How many people, swayed by HBO's gripping editing, could now believe that Peter Todd is truly Satoshi? And how many of these could be willing to physically attack him for the fortune Bitcoin’s creator supposedly accumulated? Too many hypotheticals to draw a plausible conclusion and to place such a risk on a person.
Money Electric: The Bitcoin Mystery is a decent product, fatally marred by bad faith.
-
@ 7f21affa:57e19174
2024-10-08 14:58:08Chef's notes
Oven at 400 degrees Fahrenheit for 20 mins
Refrigerate the dough for 2+ hours
Details
- ⏲️ Prep time: About 3-4 hours
- 🍳 Cook time: 20 mins
- 🍽️ Servings: 10
Ingredients
- 1 cup water
- 3 sticks of butter
- 2 3/4 cups of all purpose flour
- 2 tsp salt
- pinch of paprika/jalapeno powder (I use both)
- 2 tbsp oil
- 1 lb ground beef
- 1 medium diced onion
- 1 diced red/green bell pepper
- 1 cup peas
- 4 minced garlic cloves
- 1 tsp oregano
- 1 tsp salt
- 1/2 tsp paprika
- 1/2 tsp red flakes
- 1/2 tsp white pepper
- 1/2 tsp cumin
- 1/2 cup beef broth
- 2 tbsp tomato paste
- 1 diced white/russet potato
- 3 tbsp scallions
- 1 cup shredded cheese (mexican, fiesta, or cheddar)
- 1 egg
- 3 tbsp water
Directions
- In a pot, heat up 1 cup water with 3 sticks of butter (1 1/2 cups butter)
- In a bowl, add 2 3/4 cup all purpose flour, 2 tsp salt, & pinch of paprika/jalapeno powder.
- Once butter is melted in the pot, cool & transfer to the bowl.
- Mix then wrap dough in plastic.
- Refrigerate wrapped dough for 2+ hour till hardened.
- Heat up large pot on medium heat, then add 2 tbsp oil.
- Saute 1 lb ground beef
- Leaving the beef juice, then scoop up cooked beef into metal bowl for later
- Using the beef juice, saute diced yellow onion, diced bell pepper, 1 cup peas, 4 minced garlic cloves, 1 tsp oregano, 1 tsp salt, 1/2 tsp paprika, 1/2 tsp redflakes, 1/2 tsp white pepper & 1/2 tsp cumin
- Add 1/2 cup beef broth, 2 tbsp tomato paste
- Add the cooked beef & diced potato
- Lastly combine 3 tbsp scallions
- Turn on oven at 400 degrees Fahrenheit
- Once dough in fridge has hardened, take out
- Grab a golf ball sized piece of dough and start flattening with your hands
- Dough should be around 5-6 diameter circle
- Put about 2 tbsp of beef filling you made earlier & sprinkle with a little cheese
- Crimp edges with fork
- Brush the empanadas with egg wash (1 egg + 3 tbsp water mix) before putting in oven
- Bake for 20 mins & enjoy!
-
@ 7cc328a0:2a247c0e
2024-10-12 15:54:42relay.tools quarterly report
October, 2024
Project Updates
Milestone: Relay.tools is celebrating 1 year of OpenSats! Cheers to everyone that made this possible.
Relays were very popular this quarter. Scaling efforts were prioritized! This is a good indicator for relay.tools as it means that it's healthily growing. Development was executed well, completing one project at a time across the whole stack.
Relay Discovery
I've been working with @sandwich from nostr.watch on NIP66.
NIP66 will be an ABSOLUTE GAMECHANGER for clients in finding of their relays. This was always a vision for relay.tools and I am honored to be working with @sandwich on what is a pretty amazing solution. We are now in a phase of client outreach, to gather client feedback and help them implement/understand the overall goal of the NIP.
TLDR: the goal is to create a distributed version of the nostr.watch data, using nostr events.
- [x] implemented NIP66 draft7 (the 'final' design) in monitorlizard
- [x] started shipping events to the monitor relay(s) in collab with nostr.watch backends and relay.tools backends.
- [x] fixed bugs and released new binaries for monitorlizard (a NIP66 data reporting tool)
Auth Proxy Rollout
The NIP42 Auth Proxy project went really well this quarter. It's now serving tons of traffic and most bugs with clients have been squashed and the proxy hardened. This has become a very popular feature on the relays, as AUTH has many benefits beyond protecting of DMs.
- [x] testing vs. NIP17 and bugs fixed
- [x] cluster operations (multiple proxies)
UI/UX
A huge milestone this quarter was the release of the settings wizard. This is a walkthrough for new (and current) users of all the available settings for different 'relay types'. A lot of work over the last year has gone into the culmination of these settings and the wizard was a major step forward to help users understand what their options are when running a relay.
Another major UI change was the introduction of a relay feed to the landing page for a relay. This is called the relay explorer. The idea was to move to a single page app, and re-do navigation for easy relay browsing and discovery.
- [x] settings wizard released
- [x] relay explorer v2
Installer
The installer had lots of good effort put in by me and some nice contributors. We did a couple iterations on documentation and facilitated in the creation of 2-3 new relay hubs that are using this installer infrastructure.
Some additions to the installer were:
- [x] docs for building self-hosted machine images and installing on a VPS
- [x] FULLY AUTOMATIC SSL certificate handling for multiple domains with certbot
- [x] self-hosted influxDB (for relay metrics)
- [x] fix bugs with auto-deploy upgrade
Billing/Invoicing/Support
The billing system had some improvements this quarter and many invoices were sent. :) It now has better super-admin tools to notify users of past-due balances via nostr (With NDK). This took a few iterations of deciding the best way to contact users of nostr and figuring out why they don't respond to messages. It's a learning experience all the way around and the billing system will evolve over time in ways that are conducive to remaining 100% nostr for user communication and support.
The support system also showed signs of life, and people were able to use it to contact me with their questions via the various help-desk methods that I've been rolling out. (A relay, a support npub, DMs, NIP17 DMs, simplex)
Scaling!
Relay.tools successfully completed the first scale-out event. This is HUGE. Relays take more and more bandwidth and resources as they establish themselves, while at the same time needing a reasonable low-cost environment to grow in. To meet their demands the horizontal scaling is important. This will scale on commodity hardware or VPSs with ZERO vendor lock-in.
- [x] multi-server clustering with ZERO cloud vendor lock-in
- [x] deployment pipeline and capacity planning
- [x] HAproxy and additional AUTH proxies fronting all services
- [x] internal/external network support
-
@ 7cc328a0:2a247c0e
2024-10-12 15:49:54relay.tools quarterly report
July, 2024
Project updates
The major focus this quarter was building a NIP-42 AUTH proxy for strfry relays. Codename: interceptor.
NIP-42 AUTH proxy for strfry
I see this as a major innovation in nostr relaying and there was no other open source option in the ecosystem so I decided it was extremely important to investigate and get done. I was not completely sure that it would work, but after much building and testing I now think this is production ready.
Currently very few relays support NIP-42 AUTH. The ones that do, keep their software closed source as a value-add. This validates that it is a wanted, and valued feature.
I went live with an initial relay for testing wss://auth.nostr1.com. I coordinated the launch of this along with Amethyst re-doing their relay settings to have options for "Private Inbox Relays". I also tested all major clients repeatedly and found and fixed bugs both client side and relay side.
I asked nostr for members to join this relay and help test, which they did and after multiple rounds of testing I believe the AUTH proxy is now ready for a major release.
This will continue to be a focus for next quarter.
https://github.com/relaytools/interceptor-proxy https://github.com/relaytools/interceptor
NIP-17 testing and collaboration
NIP-17 private DM features had a big push from clients this quarter so I helped them by coordinating multiple rounds of inter-client testing and using the new auth.nostr1.com relay. Clients included: coracle, amethyst, 0xChat and gossip.
These features are working well, although some of the issues filed and am tracking are still underway being fixed. Some are UX experience and some are simply interoperability issues or bugs that need more work. Specifically for 0xChat and Coracle. Gossip and Amethyst are fully functioning with no known bugs.
https://github.com/0xchat-app/0xchat-core/issues/12 https://github.com/coracle-social/coracle/issues/378
UI/UX improvements + NDK
Spent some time improving the UI/UX and this is still in-progress.
The main page has been updated to be more of an exact match from nostr designer @daniele
I also created a new relay explorer using NDK and worked with upstream to fix bugs related to NIP-42 AUTH in the library. My PRs are still outstanding but I am hopeful this will pave the way for NDK supporting NIP-42 auth in any clients that use it. I am also writing docs for NDK since this was un-charted territory and required a lot of digging through the code to figure out how to fix and use these features.
https://github.com/nostr-dev-kit/ndk/issues/246 https://github.com/nostr-dev-kit/ndk/pull/251 https://github.com/nostr-dev-kit/ndk/pull/248
I also started work on a complete re-write of the relay settings page. The settings page has too many options and is confusing to users so I am combining all the options into a 'setup wizard' that walks the user through the various types of relays and helps them pick options that they will want.
Relay Metadata, Monitoring and Discovery
One part of the vision for relay.tools has been to make it easier to discover new relays. Not only for relays running on the platform but for ALL relays. Therefor I spent some time this quarter working toward that goal.
I discovered that @sandwich has been working a long time on NIP-66 and it is exactly what we need for relay discovery. It has many additional features as well such as monitoring, and geographic filtering.
https://github.com/nostr-protocol/nips/pull/230
I will be adding support for this into relay.tools on the main directory listing, so I currently am working with him to finalize the NIP and get it merged. It will be able to poll these events and show/search through relays that are discovered on the wider nostr network.
I also created a new tool to publish these events so that I can start down this path. The tool is called monitorlizard. What it does is it monitors relays, and publishes them according to the NIP-66 spec. I also launched a new relay that anyone can push these events to called monitorlizard.nostr1.com
https://github.com/relaytools/monitorlizard
I hope that we can get this NIP finalized and merged this quarter although it is not a rush. Fiatjaf has already given the go-ahead and we just need to make sure to tidy up and include all the things we need in there before merge and it is 'set in stone' so to speak.
-
@ af9c48b7:a3f7aaf4
2024-10-07 17:05:37Chef's notes
This recipe originates from Meat Church BBQ. It's simple to make and tastes great if you like spicy food. While this recipe is for chicken, I feel that it would be just as good on skirt steak or other poultry.
Details
- ⏲️ Prep time: 25 minutes
- 🍳 Cook time: 20 minutes
- 🍽️ Servings: 8-10
Ingredients
- 8-10 Chicken Thighs ( Boneless Skinless)
- 26 oz Can Pickled Jalapeno Peppers (La Costena Brand Whole Jalapenos Recommended)
- 1 Stick Unsalted Butter
- 8oz Bottle Cholula Hot Sauce
- Fajita Seasoning (Meat Church Dai De La Fajita Seasoning Recommended)
- 8 Slices of Cheese (Cheddar, Pepper Jack, Whatever You Like... recommend Colby PepperJack)
Directions
- Combine boneless skinless chicken thighs in a ziplock back with the entire can of pickled jalapeno peppers. Marinate for up to 24 hours based on desired spicyness.
- Once marinate time has ended, remove chicken thighs and pat dry. Season both sides of chicken with the fajita seasoning and allow 15 minutes to adhere. Save the jalapeno peppers for grilling.
- While the meat rests, melt one stick of unsalted butter and mix with the 8oz of Cholula Hot Sauce.
- Cook the chicken on a hot grill, turning and basting the chicken regularly. This will insure a good char and ensure they chicken cooks evenly. Cook the chicken until the internal tempurature reaches 165.
- Place cheese over each piece of chicken and melt thoroughly. Remove chicken and grilled jalapenos from the grill.
- This dish pairs well with a toasted bun and mayo if desired, or as a stand alone main dish.
-
@ 7cc328a0:2a247c0e
2024-10-12 15:42:36relay.tools quarterly report
April, 2024
Project updates
The main initiatives for Relay.tools this quarter were the installer, re-occuring billing support, customer support, and moderation capability. Towards the end of the quarter I was able to start work on supporting nostr groups and a NIP42 auth proxy.
Installer
I made lots of progress on the installer this quarter. It's now at a point where it is fully functional.
- [x] Whitelabel support for custom domains
- [x] Automatic SSL certificate deployment via. certbot container
- [x] Many bugfixes, improvements, and end to end testing
- [x] Publish pre-built images
- [ ] Use pre-built images in the installer (alternative to building from scratch).
The installer was used to deploy a POC for vote.gold. A side project by @manime that is a relay hub for independent voters.
Re-Occuring Billing
I created a new system for billing / invoicing that tracks user balances and allows them to "top-up" their balance.
The billing system accounts for users of a paid relay (paid relay bonus), these payments go toward the owners balance.
This system is now live and there has been decent response by relay owners that reached out to pay their bills.
The cost of relays was adjusted to 12,000 sats / month. (from 21,000 sats/month).
Upgrades to lightning node and channels were performed to support these payments.
Customer support
Relay.tools rolled out a new customer support portal to support users that have questions about billing and so that relay.tools can contact relay owners via nostr with announcements / notifications.
My goal here is to use nostr itself to support the relays. I also did not want to use DMs because they are not private, they're flakey and simply not a good practice given the state of clients implementations. I think using nostr native methods for support is very important, but is also very difficult given some limitations that currently exist with nostr. Regardless, I pushed ahead.
- [x] Created a nostr pubkey for fielding questions and supporting users.
- [x] Used the outbox model from gossip to setup a streamlined customer support focused dashboard.
- [x] Created an additional relay for support and linked to the relay from the relay.tools landing page.
- [x] The first support notification blast went out to all owners advising them to pay balances in the coming month or to contact support for free 'credits' in exchange for feedback.
Based on the feedback I've gotten so far, it's clear there is still much work to do implementing a nostr native support system:
- Gossip outbox was buggy, and my client database pushed the limits of gossip and corrupted the database. I filed bug(s) upstream and am working with upstream to make this better.
- Some users preferred to use DMs vs. open communication on nostr (even though DMs are not advisable for private communication on nostr).
- Added SimpleX to the support pubkey's bio as an alternate contact method.
- The process for balance notification was very manual and once further research is done on the path forward, it needs to be automated.
Moderation and house-keeping
- [x] I've begun reaching out to nostriches for help with moderation.
- [x] Implemented some additional super-admin capability for the relay.tools admin user(s) in preparation for multiple super-moderators. This includes a global view of all relays and the ability to quickly explore flag mis-behaving relays.
- [x] I've started deleting some relays that were abandoned after using the new customer support portal to reach out to them. Some were simply test relays, some operators expressed that they've graduated to running their own relay, and some I simply could not get in contact with. This is a good milestone for relay.tools and was much needed, leveraging the re-occuring billing and support tasks.
AUTH proxy for strfry
I've started work this quarter on creating a mechanism to bring NIP42 AUTH to the strfry ecosystem. The gist of it is, strfry has been unable to implement NIP42 due to the complexity of needs that various authentication schemes require. There are many considerations and what seems simple at first glance quickly becomes mired in confusion and C++ makes it hard for anyone to collaborate or implement.
To work around this, I've created a proxy written in golang that can sit outside strfry and intercept/handle AUTH requests, leveraging the robustness and performance of strfry while allowing us to customize the authentication flow in a separate process.
So far I have an initial POC working and in the coming quarter I hope to ship an initial version of this which will be used by relay.tools and be the first open source auth proxy for strfry relays.
I am very excited about this. NIP42 in my opinion will enable multiple new paradigms for interacting with relays as it will be able to implement ACLs for reading from a relay vs. the current methods of write ACLs. It also will have the potential to support the new group clients that I mention in the next section.
Outreach / Collaboration / Nostr Groups
I've been spending more time on getting some collaboration going with fellow nostriches where our vision for nostr aligns. I am very interested in groups for nostr. (Functional replacements for discord/telegram/slack/reddit). This has been a long-term goal of relay.tools to support these types of clients and I'm excited that clients are starting to kick off a second wave of nostr functionality and I will do everything I can to support them.
- [x] I made an appearance on the Thank God For Nostr podcast talking with @hodlbod about relays, group-chats, and the viability of relays being profitable/sustainable.
- [x] Various nostriches have contacted me about running their own relay.tools and I'm working with them to educate and help them bring new 'relay hubs' online!
- [x] I've been working with @hodlbod on some extensive testing of the new Coracle groups implementation, private groups or closed communities: NIP87. I have been expoloring the possibilities of using Coracle's private community/group and whitelabel support for an integration with relay.tools. I have also been exploring what modifications a strfry relay may require to support advanced groups such as this based off the triflector relay proof of concept.
- [x] Investigated the use and requirements for 'simple groups' by @fiatjaf NIP29. This is another group implementation which may require customized relays and I wanted to understand the possibilities and requirements.
- [x] Integration with blowater.app - I've been working with @blowater on his new client/relay initiative that involves groups for nostr.
Next Quarter plans
- [ ] Release initial version of the AUTH proxy for strfry.
- [ ] Collaboration/Outreach - Coracle, blowater, other groups efforts.
- [ ] Submit a Relay Discovery NIP for review.
- [ ] Relay Support channel improvements.
-
@ 6ff0b3a6:ca85496b
2024-10-03 02:09:04Chef's notes
Carnivore or ketogenic diet need the right protein at home and anywhere: this grass fed and finished beef chips are dry and easy to enjoy anywhere
Details
- ⏲️ Prep time: 10 minutes
- 🍳 Cook time: 6 to 7 hours
Ingredients
- Grass fed and finished hotpot/veneer/sluces 1 to 1.5mm thick
- For dry meat use Bnis round slices for hotpot and with more fat use brisket slices
Directions
- Dry heat as long as possible as low temperature as possible
- I dry for 6-7 hours @55 deg cel =130 deg F.
- At the same time you can also prepare your carpaccio plate and let them freeze in the freezer or on the fridge as you prefer…
- After 7 hours, place into glass recipient or surround airy food grade rope to make a unit and store on the fridge
- Salt can be added before the drying or after
-
@ 7cc328a0:2a247c0e
2024-10-12 15:33:58relay.tools quarterly report
January, 2024
Project updates
UI design
Relay.tools spent quite a bit of time working on UI design this quarter. Since UI is time intensive and there are many other aspects of the project that need work, I time-boxed this work to 3-4 weeks total.
I engaged with @Daniel from #nostrdesign and a freelance UI developer @freecritter. We setup a penpot instance for relay.tools and practiced using that instead of closed-source figma. We learned that penpot is not as friendly as figma from a designers point of view, but is workable. From the perspective of a frontend engineer it is no different than figma and using penpot is a big opensource win.
The following designs were implemented this quarter. There is still much to do in this area and some aspects have been brainstormed but put on hold due to other priorities.
Relay branding and directory
I wanted to give the relays personality and branding, here is a list of improvements in this area:
- [x] The home page now prominently displays the public relays that have chosen to advertise.
- [x] Relay 'Badges' were re-designed to have better contrast and fit.
- [x] Relays have a custom direct landing page at their domain. eg. frogathon.nostr1.com
### 'Paid relay' support
Relays now support lightning payments to the relay.tools operator. This helps with combating spam and allowing the relay owners to subsidize their monthly cost.
Layout / theme
The frontend code has been modified so that it is responsive on mobile/desktop using columns. The menu was re-designed to be responsive on mobile and shows user hints for login as well as additional links (explore, FAQ). Theme switcher bugs for light/dark modes have been fixed. (Nextjs bleeding edge workaround was required).
Relay Explorer Alpha
The Relay Explorer Alpha is a mini-client for interacting with a single relay. The following improvements were made:
- [x] Moderation capabilities added: Mods can delete messages, block pubkeys, and delete+block directly from the explorer.
- [x] Image and Link parsing / optional loading.
- [x] Replies implemented.
Example screenshot showing these features:
Installer
Another main focus this quarter was to implement an installer for the relay.tools software so that anyone can easily self-host this on a generic VPS.
The installer will be a simple shell script that asks the user a few questions (like their domain name) and then automatically installs the entire stack.
A new code repository was created for this called relay-tools-images
- [x] Main architecture to match production (systemd and nspawn).
- [x] Common Base OS image builds (Debian).
- [x] Haproxy, Strfry, Relaycreator and Mysql image builds.
- [x] Auto-updating of application code (including database migrations).
This is still in-progress and will be part of next quarter's priorities to finish the first stage. (described in plans for next quarter)
Lightning Node
A decent amount of time was spent managing a Bitcoin+Lightning+LnBits node and building a second node for testing and standby purposes.
I had some node issues this quarter and have been learning, re-building the node, upgrading, and aquiring more inbound liquidity to support relay operations.
Relay Management / daily operations
Relay.tools growth last quarter exceeded expectations and lots of work in the ladder part of this quarter went into daily operations.
It grew so fast that I have paused any advertising so that I have time to implement some important growth related features (as described in the plans for next quarter).
- number of relays currently running: 63
- number of unique admins/mods: 207
- events processed in last 30d: 5,091,724
- gigabytes sent/received in last 30d: 1,651GB / 175GB
Monitoring
Daily operations include checking in on the relay activity to get a feel for what's going on. I've implemented an InfluxDB integration for the strfry plugin, which helps with daily operations and in the future will provide owners, mods, and users with stats showing relay performance and event counts. This greatly improves visibility into the relays and is the backbone of data analysis for the platform.
Events by Kind (7d)
Events by Relay (7d)
Data Explorer View (single relay, kind 3)
Moderation
Daily operations time is also spent ensuring relays meet our TOS. That includes browsing the relays content for anything that does not meet the TOS and performing mitigation when necessary. This can be time consuming. I will be adding super-moderator capability so that others can assist as we grow (as described in the plans for next quarter).
Training / Feedback / Community
I promoted the use of event specific relays for nostr community events. Feedback was very positive and showed that people enjoy having event specific relays even if client support is minimal. * Nostrasia * Frogathon
Plans for next Quarter
Finish the installer - [ ] SSL certificate management with certbot. - [ ] Nostr key generation for API credentials. - [ ] install.sh script for interactive -and- config file based one-shot installation. - [ ] Publish pre-built images and integrate their use with the installer.
Re-Occuring Billing (+ tools for interacting with community of relay runners) - [ ] Implement re-occuring billing using a credits system and lightning payments. - [ ] Implement user notification(s) for billing cycle notifications. - [ ] Implement user feedback / support channel.
Additional visibility and moderation tools - [ ] Implement super-moderator capability for TOS violations. - [ ] Engage with community to help support moderation
-
@ de75eb1d:710c3014
2024-10-02 15:31:57Chef's notes
A tangy, crunchy mustard pickle for cheese sandwiches that can be made with a range of seasonal veg - especially good for preserving homegrown 'wonky' produce as everything gets chopped small and hidden in the bright yellow sauce!
Details
- ⏲️ Prep time: 20 mins + overnight
- 🍳 Cook time: 20 mins
- 🍽️ Servings: Makes approx 2kg (x7 280g jars)
Ingredients
- 500g Cauliflower
- 150g Onion
- 1kg Mixed Vegetables (such as green beans, carrot, courgette, beetroot, radish)
- 750ml White Vinegar
- 1tbsp Mustard Seeds
- 50g Mustard Powder (or 200g Jar English Mustard)
- 1tbsp Turmeric Powder
- 200g Sugar or Honey
- 2tbsp Cornflour
- 1/2tbsp Crushed Dried Chilli (optional)
Directions
- Dice all the vegetables into small bite sized pieces, cover with the salt and leave overnight
- Rinse thoroughly to remove the salt and gently squeeze out as much water as possible
- To make the sauce mix all the other ingredients with a small amount of vinegar, stir into the vegetables then top-up with the rest of the vinegar
- Briefly cook the mixture until the vegetables are just soft, approx 20 mins
- Transfer whilst hot into sterilised jars, leave to mature for 6 weeks before opening
-
@ 5ea46480:450da5bd
2024-10-12 15:27:20The following is a combination of a series of posts on Bitcoin Timestamps on Nostr that were originally made between 2024-10-11 02:10:29 GMT & 2024-10-12 13:57:20 GMT.
To everyone whose phone i have harassed with my nfc card that therefor now see this message: This is actually a forrest picture channel https://image.nostr.build/2df97ead480b057df1a9a622f12c6209d82cfd4cc7e4e3f9254267a7199ec46e.jpg
https://image.nostr.build/74358001cab02b32e4c6bb4af04714cb6f4ce69b190514dad330f52c397c665f.jpg
Amethyst now lets you create NIP-03, Bitcoin based Open Time Stamps.
Unfortunatly i cut off the timestamp that is part of the original version of this picture (because it is ugly), so you will never know this foto was taken on july 12, 09:54. https://image.nostr.build/4f96ab676d551e4866b1d4856a8db756b53e094e17ba3c9bb75ff24ecd54839b.jpg
forestr
Everyone can timestamp everything at any time; the time-proof is valid regardless of who initiates its creation.
For example, at 01:37 on oct 12, I signed this kind 1040 event: nostr:nevent1qqsyxw4l6030ugpufwr820leasv630c3an87pcm9sp0uek22gtwzsmszyp02geyqgka3lu3zv4wa6dhxmnkacs6epsnqjrzgd0hn3m69pkjm6qcyqqqqgyqrapa2r
Which contains a proof that this kind 1 event can be tied into bitcoin block 865239: nostr:nevent1qqsd3u78nkjn78tcfcqjmrclxns9667chycmlzxxgnxxvd26yw7z85sppemhxue69uhkummn9ekx7mp0qgs2jy6jwcfsyqmpfp3tjggt505n4vnemqn3jcf6t3qw2e426mg7k9crqsqqqqqp277t4j
And the timestamp of block 865239, is 00:02 on oct 12. The event itself claims it was signed 22:11 on oct 11; this may be a lie still, but at least it was not signed much more than 1 hours and 51 minutes later.
Aside from all these time related dates, the described lunch date could also just be a complete fabrication of course; at the very least the pictures correspond with the stated dishes
woodpeckestr
https://image.nostr.build/9e12ea3eb66e2b686539abe9349b4d205b2ccde17bdbc30c65b9ad5953ace901.jpg
Timestamps only give very weak indications of truth; but they are really good at catching certain lies.
Take for example the following note: nostr:nevent1qqszw6fwhl28y974y9vjw6ej63xdax4gu5rf8fw52jqkf8x5kk98skgppamhxue69uhku6n4d4czumt99upzqpuvjsr4gjkpxf5jacv3pgpy8x2c4czgwu23xsh2jmztdv66f863qvzqqqqqqyg7gvfg
your client may have a hard time loading it, depending on when you look at this post. This is because the event claims to be signed at Thu Oct 17 2024 03:00:00 GMT. Given it is currently Oct 12, this is a blatant lie, and relays tend to not accept this event because of this.
But, what happens in 5 days? As soon we pass that 3 o’clock mark on oct 17, how would any outsider know that this event was not signed at that time, but 5 days earlier? It is easy to catch these sort of lies when you are present in real time and pay attention, but if you arrive after the fact, NIP-03 timestamps allow you to identify such a lie for certain if adequate proof exists.
And in this case, this proof does exist! Because I timestamped this event already, tying it into block 865274, which was mined around 05:31, oct 12. Which results in the following screenshot of Amethyst: https://image.nostr.build/01ca55a150444cab7b3025b70f9c1dab7c1382a3d54ed3faefaa722ee2f208aa.jpg
The app claims the event was posted ‘now’ (probably because it simply interprets any date in the future as ‘now’), but also tells me a timestamp exists that is 9 hours old.
Now this particular type of lying (pretending to be in the future), it not all that interesting, I was just curious. But it does go to show that you should not trust the time the event claims it was signed, because it is trivially easy to lie about it.
Say hello to my fren btw: https://image.nostr.build/ec4b37e2d259015f1a3b9b39b4163c98ceab56ead83bd08ce82350a061c7814c.jpg
Thus concludes my forrest picture presentation for now.
Time, such a fascinating thing, inescapably ever moving onwards. Winter is coming: https://cdn.satellite.earth/6761a5ff81c5a5ac3daa74e0d33cddf4912b770a13d272b933499839b5b03757.mp4
-
@ b6424601:a11e4ff4
2024-10-12 12:32:06My engineer dad, who spent his time on better ways to enrich uranium at the national lab in Oak Ridge, Tennessee, suggested that my average math and decent art skills might be better suited for architecture than engineering. I followed the family tradition and enrolled at Auburn University College of Architecture Design and Construction. They had a program for less gifted dyslexic test takers called Summer Option, where you took your entire first year of design labs in one summer. I survived and thrived through the grind and, somewhere on the journey, realized my personal take on good architectural design is centered on recognizing life patterns and the ability to design the stage and context for the patterns to happen in a cool way. I had a gift for pattern recognition and enjoyed creating "cool as shit" designs as we baby architects described them.
Architecture is perfect for me. As an architect, you are the person people ask for help to change how they want to live. You listen, observe, analyze, and come back with ideas on how best to effect change in that location. You exchange value to explore people's lives and help them set the stage for pure life. Living in good design can be life-changing for clients and rewarding for the team that helps make it happen.
After working for a challenging boss for eight years at a national corporate interior architecture firm, I had enough experience to realize that my project ideas were as good as my boss's but would be more personally entertaining. I went on my own in the last century, initially bootstrapping enough work to live, working with a college best friend. I would commute from Atlanta to Birmingham and couch surf in his apartment Monday through Thursday, selling to friends and my buddies' fraternity brothers. (Thank you to the Auburn chapter of the Sigma Alpha Epsilon). We kept it up for a year and then split up.
I returned to Atlanta and kept grinding on in-town custom renovation projects until I had an opportunity to do a build-to-suit office project for a client investor. I found a university mate with experience for the first commercial project, and we started Jones Pierce in 1998. Twenty-six years later, two studios continue to work with individuals and their homes, businesses, foundations, clubs, and personal investment properties.
I am most proud of my professional accomplishments when we receive testimonials about a project that changed someone's life. Clients write us letters, give us hugs, and call back ten years later. It never gets old.
Several projects have challenged me personally over the years. A design for a residence led to Passive House certification in Yestermorrow, Vermont. The Joachim Herz House for the Herz Foundation was our first project with an international foundation. Druid Hills Golf Club master plan and the first building phase is our first club project. All these were project types outside our focus but within our capabilities.
Our proof of work over time also caused the most personal growth and expanded opportunities over a longer time horizon. I love what I do for groups and clients who design personal spaces and places. I am honored to lead my studio tribe, which loves what we do, and the constant grind to improve as much as I do. Over time, the clanging projects came, and we pivoted and captured learnings to improve our processes.
Our pivot points came as we practiced. I hate to use the C word: CRAFT. Learning how to design for owners to spend their cash instead of the unavailable fiat in the housing crash. Improving our delivered projects by designing in high-performance building standards. Figuring out how to adjust our process in milestones to evolve the design budget simultaneously and allow clients to consider their mindful investment of a lifetime. Establishing methods to help property buyers evaluate remote properties to pick the right one to achieve site-actualization. Evolving principles developed to work with the individual to groups of individuals in clubs or foundations. Combining the personally learned principles of Bitcoin with the principles we use to produce our architecture for the sovereign individual.
-
@ 3eab247c:1d80aeed
2024-10-02 08:58:39Merchant Comments
I extracted about 900 valuable comments from our verification reports and I exposed them via BTC Map sync API. Comments turned out to be extremely valuable since they often add important context to certain Bitcoin merchants. The next steps are client app support and automating new comments.
Feed Reader Support
Some people are only interested in new places or comments in their areas, so they don’t want to install our apps and check them all the time. BTC Map data is open, and we never intended to lock users in, that’s why I created a few experimental Atom data feeds. Let’s say you want to get notified of new places and comments in the Netherlands, so now you can just add the following feeds to your feed reader of choice:
https://api.btcmap.org/feeds/new-places/nl
https://api.btcmap.org/feeds/new-comments/nl
Of course, you can mix and match any number of BTC Map areas, communities and countries alike. Web feed links are always available on our website, in area activity section.
RPC Interface
Most of our administrative tasks are now centralized, which means that processing new change requests might take a long time, depending on how busy we are. This model can’t scale, that’s why we’re building an admin API, alongside GUI and CLI tools which can be used to simplify access to many local administrative tasks. There is no ETA on that, but I think we’ll be able to delegate most tasks to local community managers pretty soon.
Trending Countries
- Netherlands - 190 events and comments
- Italy - 173 events and comments
- Germany - 169 events and comments
- Spain - 101 events and comments
- Portugal - 98 events and comments
- El Salvador - 95 events and comments
- United Kingdom - 83 events and comments
- Brazil - 78 events and comments
- Switzerland - 77 events and comments
- Czechia - 74 events and comments
Many merchants in the Netherlands were re-verified by Comino, which shows that a single maintainer can keep the whole country up to date. Having a single maintainer per country would allow us to keep the whole world up to date, so if your country has some old and outdated merchants, we need your help!
Italian re-verification effort can mostly be attributed to mpbin. This user not only re-verified many existing places but also added some missing general tags such as contact details and so on. Those tags are extremely valuable, so even if your area is up-to-date, you might want to check if you have enough contact details for every merchant. This account apparently belongs to Bitcoin Italia Network, and it looks like they’re taking ownership over the whole region.
Germany’s data was enhanced by many different accounts, but 65% of German locations are still outdated, so this country needs more love from local editors. Spain continues to be in a good shape, thanks to descubrebitcoin efforts, and Portugal data quality continues to improve, thanks to Sxajne.
Big thanks to Rockedf for contributing to almost every region!
Trending Communities
- Satoshi Spritz - 176 events and comments
- Einundzwanzig Deutschlan - 169 events and comments
- Einundzwanzig Portugal - 98 events and comments
- Einundzwanzig Schweiz - 78 events and comments
- Bitcoin Association Switzerland - 77 events and comments
- Dezentralschweiz - 77 events and comments
- Bitcoin Berlin - El Salvador - 60 events and comments
- Free Madeira - 51 events and comments
- Berlin 2140 - 48 events and comments
- Einundzwanzig Berlin - 48 events and comments
Global Metrics
The number of verified merchants has dropped from 6,867 to 6,734 (-2%), which means that we’re struggling to keep more than 5-7 thousands of places up-to-date, and we need more contributors who can re-verify outdated merchants.
The total number of merchants has increased from 11,685 to 11,833 (+1.3%), which is in line with our long-term trend. The stream of new merchants has no signs of tapering, we’re just struggling to maintain the old ones in certain regions.
The average number of days since the last verification has increased from 323 to 340 (+5.3%), which means that our data is now significantly less reliable than it was a month ago. This is yet another confirmation that our main bottleneck is the lack of local maintainers.
Conclusion
Our main issue is growing number of outdated locations, and getting more maintainers can take some time. It’s not the only way to improve BTC Map though, so we can focus on highlighting the best quality merchants, which I’m intending to be busy with during October. I have a few ideas on using different quality signals, and it might make sense to simply mark or hide outdated or unreliable merchants.
The best way to help us is to re-verify some outdated locations in your area, if you have any:
-
@ f3328521:a00ee32a
2024-10-12 05:31:29Islam is rooted in Prophetic Tradition and in this regard maintains a dialogue with secular civilization that inclines toward fitra and tawhid. The dunya is ever spiraling in decline and Insan navigates it with guidance and wisdom. Hidden Treasure is beyond the horizon, not on the decaying map.
Hypermodernity presents the new stain of cyberspace where the imaginary has collapsed into the real with the liquidation of any perceived barrier. This eventual shift away from post-modernity was clearly demarcated in 1995 with global capital coming online, accelerating the digitization of everything analogue. Insan is once again a nomad, disconnected from anything but the luminous glow of cyberspace - a hyper-dividual that is a nation-state unto himself. Capital interest is no longer in human physical abilities but the unplugged and deworlded, neuronal composition of the dividual who can behemoth into orbit about the planet. Here, in cyberspace, there be monsters, dragons, and gods.
But man is vicegerent!
Hypermodernity is the death of utopian projects. Art is dead, too. Even academic disciplines are unnecessary. Luxury, instant gratification, and absolute power are the only “goals” now. “When everyone’s super, no one will be.” And so, the new natural enemy becomes insan al kamil – 9/11, 10/7 these events did not happen in a vacuum. As everything collides in cyberspace it is possible a hypermodern boundary act will birth a revived Islamic civilization. The split bandwidths of your nafs can still reflect Simorgh if you are adequately disciplined in strangeness.
Islamic civilization has traditionally thrived on four elements: Capital, Hierarchy, Geography, & Climate. Digital self-sovereignty must be reclaimed. Nuclear families must be marshaled. Digital nomads must build Network States. Hijra must be made back to the margins to avoid catastrophe. And most importantly, theurgy must be embraced. This is only an introduction and outline. There is much work to do!
-
@ c69b71dc:426ba763
2024-09-28 16:22:05Chef's notes
This soup is a beautiful combination of simplicity, flavor, and nourishment. Quick to make, it delivers a fresh, slightly sweet taste that’s rich in nutrients. I've added avocado oil, pine nuts, sprouted buckwheat and millet, and a few herbs for the decoration. Feel free to experiment with different herbs, sprouts, seeds etc. making it a delightful and wholesome dish 💚
Details
- ⏲️ Prep time: 5 min.
- 🍳 Cook time: 0
- 🍽️ Servings: 2
Ingredients
- 1 cup raw fennel (medium-sized) cut into peaces
- 1 small-medium apple cut into pieces
- 1 cup water, kefir, or rejuvelac
- 1 tbsp nutritional yeast
- 1 tbsp (preferable raw) almond butter
- 1/2 tsp salt or herbal salt
- 1 tbsp Nama Tamari
- 1 tbsp avocado oil (or sesame seed oil)
- 1 pinch of nutmeg (about a knife’s tip)
Directions
- Add all ingredients to a blender: fennel, apple, water (or kefir/rejuvelac), nutritional yeast, almond butter, salt, Nama Tamari, avocado oil, and nutmeg.
- Blend until smooth and creamy.
- Pour into two bowls and garnish with pine nuts, sprouted buckwheat, sprouted brown millet or any other sprouts, and fresh herbs as desired.
-
@ 01d0bbf9:91130d4c
2024-09-26 17:58:10Chef's notes
Amazingly tangy, firey hot, but still mellow and bright.
I use this on everything– Use it to dress salads, dip (honey mustard) for fried chicken, elevate your taco nights, heck a spoonful first thing in the morning will wake you up better than coffee!
Don't forget to use up those delicious chilis and garlic, they are so good!
Details
- ⏲️ Prep time: 20 min
- 🍳 Cook time: 1-2 weeks
- 🍽️ Servings: (12x) 8oz jars
Ingredients
- 16oz fresh chili peppers
- 8oz red onion
- 8oz garlic
- 96oz honey
- Fresh thyme
Directions
- Thinly slice peppers, garlic, shallots and fresh thyme
- Add chopped ingredients to the honey
- Leave to ferment (loosely covered) for 1-2 weeks
- Drizzle that amazing pungent firey gold liquid over EVERYTHING. (Don't forget to use up those amazing chilis and garlic too.)
-
@ a012dc82:6458a70d
2024-10-12 01:45:47Table Of Content
-
The Rise of Russian Bitcoin Mining
-
Cheap Electricity
-
Favorable Regulations
-
Growing Interest in Cryptocurrency
-
What It Means for the Future of Bitcoin
-
Conclusion
-
FAQ
Bitcoin, the world's most popular cryptocurrency, has been on a rollercoaster ride in recent years. However, one thing that has remained consistent is the need for miners to verify transactions and create new blocks on the blockchain. While the United States has long been the dominant force in the world of Bitcoin mining, a new player has emerged - Russia. In this article, we will take a closer look at Russia's emergence as the second-largest Bitcoin miner, the reasons behind its rise, and what it means for the future of Bitcoin.
The Rise of Russian Bitcoin Mining
In recent years, Russia has seen a surge in Bitcoin mining activity, with estimates suggesting that the country accounts for around 10% of global Bitcoin mining. This puts it ahead of countries like Kazakhstan, Iran, and Canada, and second only to China in terms of Bitcoin mining power. The reasons for Russia's rise in Bitcoin mining are varied, but they include factors such as cheap electricity, favorable regulations, and a growing interest in cryptocurrency among the general public.
Cheap Electricity
One of the main reasons for Russia's emergence as a major Bitcoin mining power is the country's abundance of cheap electricity. Thanks to its vast reserves of natural gas and other resources, Russia is able to offer some of the lowest electricity prices in the world. This has made it an attractive destination for Bitcoin miners, who require large amounts of energy to power their mining rigs.
Favorable Regulations
Another factor that has contributed to Russia's rise as a Bitcoin mining powerhouse is the country's relatively favorable regulatory environment. While some countries have taken a hostile stance towards cryptocurrencies, Russia has adopted a more open-minded approach. In 2019, the Russian government passed a law regulating cryptocurrencies, which provided a clear legal framework for businesses and individuals to operate within.
Growing Interest in Cryptocurrency
Finally, the growing interest in cryptocurrency among the Russian public has also contributed to the country's emergence as a major Bitcoin mining player. In recent years, there has been a surge in the number of people in Russia buying and trading cryptocurrencies. This has created a more supportive environment for Bitcoin mining, as more people understand the potential benefits of this activity.
What It Means for the Future of Bitcoin
The emergence of Russia as the second-largest Bitcoin miner has significant implications for the future of the cryptocurrency. For one, it demonstrates that Bitcoin mining is not just the domain of a few wealthy individuals or countries. Rather, it is a global activity that is open to anyone with the right resources and knowledge. This could lead to more widespread adoption of Bitcoin, as more people are able to participate in the network.
Additionally, Russia's emergence as a major Bitcoin mining power could help to decentralize the network. One of the biggest criticisms of Bitcoin is that it is too centralized, with a few mining pools controlling the majority of the network's hashing power. By bringing more miners into the network, Russia could help to distribute the hashing power more evenly, making the network more resilient and less susceptible to attack.
Conclusion
Russia's emergence as the second-largest Bitcoin miner is a significant development in the world of cryptocurrency. It demonstrates that Bitcoin mining is a global activity that is open to anyone with the right resources and knowledge. It also has the potential to help decentralize the network, making it more resilient and less susceptible to attack. As the world of cryptocurrency continues to evolve, it will be interesting to see how Russia's role in Bitcoin mining develops over time.
FAQ
What is Bitcoin mining? Bitcoin mining is the process of verifying transactions and adding them to the blockchain. Miners are rewarded with new bitcoins for their work.
Why is Russia becoming a major Bitcoin miner? Russia has cheap electricity, favorable regulations, and a growing interest in cryptocurrency among its citizens.
What does Russia's emergence as a major Bitcoin miner mean for the future of Bitcoin? It could lead to more widespread adoption of Bitcoin and help to decentralize the network.
That's all for today
If you want more, be sure to follow us on:
NOSTR: croxroad@getalby.com
Instagram: @croxroadnews.co
Youtube: @croxroadnews
Store: https://croxroad.store
Subscribe to CROX ROAD Bitcoin Only Daily Newsletter
https://www.croxroad.co/subscribe
DISCLAIMER: None of this is financial advice. This newsletter is strictly educational and is not investment advice or a solicitation to buy or sell any assets or to make any financial decisions. Please be careful and do your own research.
-
-
@ 4ba8e86d:89d32de4
2024-10-11 23:15:47Quando você compartilha seu e-mail pessoal em sites, blogs e vários outros serviços, está expondo seu endereço de e-mail principal. É aí que entram os e-mails aliases. Esses endereços de e-mail alternativos desempenham um papel crucial na proteção de sua identidade e na organização de sua comunicação online. Exemplos de e-mails aliases são Simplelogin e AnonAddy.
Um e-mail alias é essencialmente um endereço de e-mail alternativo associado à sua conta principal de e-mail. Sua função principal é proporcionar uma camada adicional de privacidade e segurança, permitindo que você compartilhe um endereço de e-mail temporário ou pseudônimo em vez de revelar seu endereço de e-mail real.
Por que usar e-mails aliases?
-
Privacidade: Ao usar um e-mail alias, você não precisa fornecer seu endereço de e-mail real a sites ou serviços nos quais não confia completamente. Isso protege sua identidade online e ajuda a evitar o rastreamento de sua atividade na web.
-
Segurança contra spam: Os e-mails aliases podem ser usados para se inscrever em boletins informativos, participar de concursos ou registrar-se em sites, sem comprometer sua caixa de entrada principal. Se você começar a receber spam nesse alias, pode simplesmente desativá-lo sem afetar seu e-mail principal.
-
Organização: Os e-mails aliases podem ser usados para categorizar e gerenciar sua comunicação online. Por exemplo, você pode criar aliases específicos para uso em diferentes contextos, como trabalho, compras online ou interações sociais.
-
Proteção contra violações de segurança: Se um dos seus e-mails aliases for comprometido, isso não afetará sua conta de e-mail principal. Você pode simplesmente desativar o alias comprometido e continuar usando seu e-mail principal sem preocupações.
Os e-mails aliases são uma ferramenta valiosa para proteger sua privacidade e segurança online. Com a crescente preocupação com a privacidade digital, usar e-mails aliases se torna uma prática cada vez mais importante.
https://habla.news/u/alexemidio@alexemidio.github.io/1702167107338
https://habla.news/u/alexemidio@alexemidio.github.io/1704317161405
-
-
@ f2e2c80b:1b1b0af9
2024-09-26 15:22:24Ingredients
- .
Directions
- .
-
@ 4ba8e86d:89d32de4
2024-10-11 23:07:45O Joplin é um aplicativo gratuito e de código aberto que permite a criação e organização de notas, tarefas e listas, e está disponível para as plataformas Windows, macOS, Linux, Android e iOS. Com ele, você pode organizar suas notas em cadernos, categorizá-las com tags e sincronizá-las entre dispositivos de forma segura.
Seu diferencial é o foco em privacidade e flexibilidade. O Joplin garante que suas notas estejam sempre acessíveis, mesmo offline, e permite que você sincronize seu conteúdo com serviços de nuvem de forma criptografada, garantindo que ninguém além de você tenha acesso aos dados.
Principais Recursos
-
Suporte Multiplataforma O Joplin está disponível para todas as principais plataformas de desktop e dispositivos móveis, o que permite que você leve suas notas para onde for. Além disso, ele oferece um Web Clipper para capturar páginas da web diretamente do navegador (compatível com Firefox e Chrome), facilitando o arquivamento de conteúdos importantes da internet.
-
Organização e Formato Markdown As notas no Joplin são salvas no formato Markdown, uma linguagem de marcação simples que permite criar textos formatados de maneira intuitiva. Isso torna a edição e formatação de notas mais flexível e prática, além de facilitar a exportação para outros formatos.
As notas podem ser organizadas em cadernos e subcadernos, e você pode adicionar tags para facilitar a pesquisa e a categorização de informações.
- Importação de Notas do Evernote Para quem está pensando em migrar do Evernote, o Joplin permite a importação direta de notas exportadas no formato ENEX, preservando o conteúdo formatado, anexos (imagens, PDFs, etc.) e até mesmo os metadados, como a localização geográfica e datas de criação/modificação. Se você deseja importar suas notas do Evernote, o Joplin oferece um guia passo a passo para fazer a migração sem complicações.
https://joplinapp.org/help/apps/import_export/
-
Sincronização com Criptografia de Ponta a Ponta O Joplin permite que você sincronize suas notas de forma segura utilizando serviços de armazenamento em nuvem como Nextcloud, Dropbox, OneDrive e o serviço próprio, o Joplin Cloud. A grande vantagem aqui é a criptografia de ponta a ponta (E2EE), o que significa que suas notas são criptografadas localmente antes de serem enviadas para a nuvem, garantindo que ninguém, nem mesmo o serviço de nuvem, tenha acesso aos seus dados.
-
Offline First Um dos principais recursos do Joplin é que ele foi desenvolvido com a filosofia "offline first". Isso significa que você sempre tem uma cópia completa e funcional das suas notas no seu dispositivo, permitindo que você acesse e edite suas informações, mesmo sem uma conexão com a internet. Quando a sincronização está habilitada, o Joplin sincroniza as mudanças automaticamente assim que a conexão for restaurada.
-
Busca de Texto Completo O Joplin oferece uma poderosa funcionalidade de busca de texto completo, permitindo que você encontre rapidamente qualquer informação dentro das suas notas, independentemente do volume de dados armazenados.
-
Personalização e Plugins
Além das funcionalidades padrão, o Joplin permite uma ampla personalização. Você pode ajustar a interface com temas e estender as funcionalidades por meio de plugins. Se você tem conhecimentos de programação, pode até desenvolver seus próprios plugins para adaptar o Joplin às suas necessidades específicas.
Privacidade em Foco
Um dos grandes diferenciais do Joplin em relação a outras ferramentas populares de anotações, como o Evernote e o OneNote, é o foco na privacidade do usuário. Com o Joplin, você controla seus dados completamente, sem depender de servidores de terceiros que possam explorar suas informações.
A criptografia de ponta a ponta garante que suas notas estejam seguras e que somente você tenha as chaves para desbloqueá-las. Isso é um grande atrativo para quem está preocupado com a privacidade online, especialmente em tempos em que muitos serviços coletam dados de seus usuários para fins de publicidade ou marketing.
Casos de Uso: Quem Deve Usar o Joplin?
O Joplin é uma ferramenta extremamente versátil, sendo ideal para diversos tipos de usuários:
- Estudantes: Para organização de notas de aula e pesquisa.
- Profissionais: Para gerenciamento de tarefas, anotações de reuniões e documentação de projetos.
- Desenvolvedores: Graças ao suporte nativo para Markdown, o Joplin é uma excelente opção para quem precisa documentar código ou gerenciar projetos de desenvolvimento.
- Jornalistas ou escritores: Que precisam de uma ferramenta segura para organizar suas notas e ideias.
- Usuários preocupados com a privacidade: Que querem uma ferramenta de anotações robusta sem abrir mão da segurança e controle total sobre seus dados.
Como Começar a Usar o Joplin
Iniciar com o Joplin é simples. Basta baixar o aplicativo para a sua plataforma preferida, seja desktop ou móvel, diretamente do site oficial. A partir daí, você pode começar a criar suas notas, configurar cadernos e sincronizar seus dados. A interface intuitiva facilita o aprendizado, e o suporte a Markdown oferece grande flexibilidade na criação e edição de conteúdo.
O Joplin é muito mais do que um simples aplicativo de anotações. Com seu foco em privacidade, sincronização segura, suporte offline e ampla personalização, ele se destaca como uma das melhores opções disponíveis para quem busca controlar completamente suas informações, sem abrir mão de funcionalidades avançadas. Seja você um estudante, profissional ou simplesmente alguém que deseja organizar suas ideias com segurança, o Joplin é uma escolha confiável e flexível. Com sua filosofia de código aberto, o Joplin continua a evoluir e melhorar com contribuições da comunidade global. Se você ainda não experimentou o Joplin, agora é um excelente momento para dar o próximo passo e transformar a maneira como você gerencia suas anotações e tarefas.
https://joplinapp.org/
https://github.com/laurent22/joplin/
-
-
@ f2e2c80b:1b1b0af9
2024-09-26 15:11:24Details
- ⏲️ Prep time: 10 min (+24h to lievitate)
- 🍳 Cook time: 15
Ingredients
- Toppings:
- Tomato sauce
- Mozzarella fiordilatte
- BIGA
- 200g type 1 flour
- 2g fresh yeast
- 120g water at room temperature
- DOUGH
- 5g fresh yeast
- 5g malt (or honey)
- 50g type 1 flour
- 55g water
- 15g salt
Directions
-
- Place the biga with: 5g fresh yeast, 5g malt or honey, 50g type 1 flour and 35g water in the mixer and start kneading at first speed.
-
- Add 15g salt and 20g water.
-
- Place on the counter, food and knee for 20 minutes, then shape and leave rinse at room temp. for 1.30 h.
-
- When ready shape the pizza and spread tomato sauce.
-
- Put in hot oven at 280° for 10min.
-
- Take out, add mozzarella and bake again for 5 min.
-
@ 6bf975a0:65de1244
2024-10-13 14:16:56Площадки для размещения контента СМИ
Условно их можно разделить на две группы: свои и не свои. Свои медиа полностью контролирует. В не своих медиа арендуют чужие технологии для доставки контента аудитории, выполняя только производственную роль и рассматривая доставку контента как аутсорс.
Исследования 2020-ых годов показывают, что значительная часть аудитории теперь полагается на социальные сети для получения новостей. Например, исследование 2021 года показало, что 42% американцев используют социальные сети в качестве источника новостей, и эта цифра выросла по сравнению с предыдущими годами. Среди молодых людей эта зависимость еще более выражена: например, 38% людей в возрасте 18-24 лет в первую очередь получают новости через социальные сети.
Платформы корректируют свои стратегии в свете генеративного ИИ, а также ориентируются на меняющееся поведение потребителей и растущую обеспокоенность регулирующих органов по поводу дезинформации и других вопросов. В частности, Meta* пытается снизить роль новостей на своих площадках и ограничивает алгоритмическое продвижение политического контента. Компания также сокращает поддержку новостной индустрии, не продлевает сделки на миллионы долларов и удаляет вкладку новостей в ряде стран.
Ленивая аудитория
Ей сложно выходить за пределы привычных пространств.
Исследование, проведенное компанией Orca Online в 2022 году, показало, что посты в социальных сетях без внешних ссылок имеют значительно более высокий уровень вовлеченности. Посты без ссылок в среднем набирали 352,3 взаимодействия, в то время как посты с внешними ссылками - только 139,1 взаимодействия. Это говорит о том, что пользователи с большей вероятностью будут взаимодействовать с контентом, который удерживает их в рамках платформы. Исследование, проведенное Институтом Рейтер, показало, что 47% британских респондентов просматривают и читают новости в социальных сетях, не переходя по ссылкам, чтобы получить доступ к полным текстам статей.
Источник: Использование новостей на онлайн-платформах фрагментировано: в настоящее время шесть сетей охватывают не менее 10% респондентов Reuters по сравнению с двумя десять лет назад. YouTube используется для новостей почти третью (31%) глобальной выборки каждую неделю, WhatsApp* примерно на пятую часть (21%), в то время как TikTok (13%) обогнал Twitter (10%), который теперь переименован в X, в первый раз.
Популярность аудио и видеоформатов
В связи с этими изменениями видео становится более важным источником онлайн-новостей, особенно среди более молодых групп. Каждую неделю доступ к коротким новостным видеороликам получают две трети (66%) аудитории СМИ, а более длинные форматы привлекают около половины (51%). Основным источником потребления новостного видео являются онлайн-платформы (72%), а не веб-сайты издателей (22%), что увеличивает проблемы, связанные с монетизацией и подключением.
Подкастинг новостей остается светлым пятном для издателей, привлекая более молодую, хорошо образованную аудиторию, но в целом является деятельностью меньшинства. В корзине из 20 стран чуть более трети (35%) ежемесячно посещают подкасты, а 13% получают доступ к шоу, посвященному новостям и текущим событиям. Многие из самых популярных подкастов сейчас снимаются и распространяются через видеоплатформы, такие как YouTube и TikTok
Популярность коротких видео
Насколько актуальны сегодня сайты?
На всех рынках только около пятой части респондентов исследования Reuters 2024 (22%) называют новостные сайты или приложения своим основным источником онлайн-новостей –, что на 10 процентных пунктов ниже, чем в 2018 году. Издателям на некоторых рынках Северной Европы удалось противостоять этой тенденции, но более молодые группы во всем мире демонстрируют более слабую связь с новостными брендами, чем в прошлом.
Пожилые зрители по-прежнему предпочитают смотреть видео через новостные сайты, хотя большинство из них говорят, что в основном получают доступ к видео через сторонние платформы. Только в таких странах, как Норвегия, половина пользователей (45%) говорят, что в основном потребляют видео через веб-сайты, что свидетельствует о силе брендов на этом рынке, стремлении обеспечить хороший пользовательский опыт и стратегии, ограничивающей количество видео, размещаемых издателями на таких платформах, как Facebook и YouTube.
Важно отметить, что на всех рынках поиск и агрегаторы, вместе взятые (33 %), являются более важным способом получения новостей, чем социальные сети (29 %) и прямой доступ (22 %). Значительная часть мобильных оповещений (9 %) также генерируется агрегаторами и порталами, что усиливает беспокойство о том, что может произойти дальше.
Поисковые машины и нейросети против создателей контента
Поиск: с одной стороны, Google хочет выдавать саммари по запросам через Gemini на страницах с результатам поиска.
Источник: Google запускает — пока в тестовом режиме и для отдельных групп пользователей — новую функцию Supercharging Search with generative AI (SGE). После ее активации вместо привычного поискового движка наш запрос будет обрабатывать ИИ Gemini, который в ответ сформулирует некое резюме из 272 слов, предваряющее поисковую выдачу.
С другой, появляются Perplexity, Copylot, которые выдают ссылки на источники.
Голосовые помощники: не дают ссылок для перехода, но озвучивают информацию с сайтов.
Общий тренд нейросетей: большие корпорации обучают свои технологии на данных создателей контента, но далеко не всегда дают трафик самим создателям контента.
Экономика онлайн-СМИ в мире
2024, издание Politico об экономическом состоянии американских изданий
Патрик Сун-Шионг, миллиардер-издатель газеты Los Angeles Times, уволил 20 процентов сотрудников своего отдела новостей. В журнале Time владельцы-миллиардеры Марк и Линн Бениофф сделали то же самое в отношении 15 % сотрудников редакции, состоящих в профсоюзе. Последний пожар разгорелся в Sports Illustrated на предыдущей неделе, когда катастрофические увольнения были разосланы по электронной почте большинству сотрудников. Business Insider (чья материнская компания Axel Springer также владеет POLITICO) сократил 8 % своего штата, а сотрудники Condé Nast, Forbes, New York Daily News и других изданий вышли на улицу в знак протеста против предстоящих сокращений в своих магазинах.
Новостной бизнес всегда был цикличным: он падал во время экономического спада, а затем улучшался на подъеме. Но теперь это не так, поскольку наша экономика в последнее время удивительно сильна. Почти везде, куда бы вы ни посмотрели - Washington Post, NPR, Vice, Vox, NBC News, Texas Tribune, WNYC, Barstool Sports, - компании сократили огромное количество сотрудников. С 2008 года занятость в новостных отделах сократилась более чем на 26 процентов. Buzzfeed News мертв. Журнальный бизнес тоже атрофировался: доходы газетных киосков упали с 6,8 миллиарда долларов в 2006 году до 1 миллиарда долларов в 2022 году. Наблюдая за тем, как медиабизнес истекает кровью, профессор журналистики Джефф Джарвис, человек, когда-то ратовавший за электронное будущее отрасли, сложил руки на коленях, как гробовщик, и спросил в своем блоге, не пора ли отказаться от старых новостей. Ссылаясь на мрачные новости об увольнениях, Джарвис привел в порядок труп в процессе его создания. Он отметил, что доверие к журналистике тает, а частные инвестиционные компании, такие как Alden Global Capital, занимаются каннибализмом своих газет.
Некогда здоровые газеты закрылись в таких городах, как Нью-Йорк, Сан-Франциско, Бостон и Миннеаполис; приостановили печать в таких городах, как Вашингтон; стали выходить раз в две недели, как в Чикаго и Сиэтле; или иным образом сократили количество страниц по сравнению с временами бума начала XXI века. Неужели нет никакого оптимизма? Уж точно не в гарвардском журнале Nieman Reports, который в октябре опубликовал некролог Кэтрин Рейнольдс Льюис под заголовком «Эй, журналисты, никто не придет нас спасать».
Кроме рекламы есть и другие источники доходов онлайн-медиа, но с ними тоже не все так однозначно.
Reuters: Наши данные показывают незначительный рост подписки на новости: всего 17% заявили, что заплатили за любые онлайн-новости в прошлом году в корзине из 20 более богатых стран. В странах Северной Европы, таких как Норвегия (40%) и Швеция (31%), самая высокая доля платящих, среди самых низких - Япония (9%) и Великобритания (8%). Как и в предыдущие годы, мы обнаружили, что большая часть цифровых подписок достается лишь нескольким элитным национальным брендам, что усиливает тренд победитель получает все.
Топ мировых изданий по объемам доходов от платной подписки (paywall)
Эфирные радио и телевидение
Прогнозируемый рост радио: Ожидается, что к 2029 году радио будут слушать более 3,2 миллиарда человек по всему миру, что составляет около 40 % населения планеты. Это говорит о том, что радио остается важным средством массовой информации, несмотря на рост цифровых альтернатив.
Источник, 2022 год: Большинство россиян (57%) с той или иной периодичностью слушают радио, при этом каждый пятый делает это ежедневно. Наиболее характерна эта привычка для мужчин старше 35 лет, имеющих высшее образование. Доля женской и молодежной аудитории значительно меньше (71% и 81% соответственно не слушают радиостанции совсем или включают их от силы пару раз в месяц).
Нейросети и достоверность контента
Обеспокоенность по поводу того, что реально, а что фальшиво в Интернете, когда дело доходит до онлайн-новостей, выросла на 3 процентных пункта за последний год: примерно шесть из десяти человек из аудитории СМИ в исследовании Reuters 2024 года (59%) заявили, что они обеспокоены. Этот показатель значительно выше в Южной Африке (81%) и США (72%), обеих странах, которые в этом году проводят выборы.
Доля респондентов, которые говорят, что их беспокоит вопрос о том, что в интернете настоящее, а что фальшивое, выросла на 3 процентных пункта с 56 до 59 %. Этот показатель наиболее высок в некоторых странах, проводящих опросы в этом году, включая Южную Африку (81 %), США (72 %) и Великобританию (70 %). Если рассматривать ситуацию в региональном разрезе, то самый высокий уровень обеспокоенности наблюдается в Африке (75 %), а более низкий - в большинстве стран Северной и Западной Европы (например, в Норвегии - 45 % и Германии - 42 %).
Интерес аудитории к СМИ как таковым
Согласно отчету Reuters Institute Digital News Report за 2024 год, интерес к новостям снизился с 66 % в 2018 году до 49 % в 2024 году на 12 основных рынках. Этот спад особенно заметен среди более молодой аудитории: только 31,9 % людей в возрасте от 16 до 24 лет проявляют интерес к новостям.
Исследование GWI показывает, что глобальный интерес к новостям упал примерно на 8 процентных пунктов в период с 1 квартала 2019 года по 1 квартал 2023 года, а по состоянию на 1 квартал 2024 года только 41,6 % респондентов заявили о своем интересе к новостям.
Выборы повысили интерес к новостям в нескольких странах, включая США (+3), но общая тенденция остается нисходящей. Интерес к новостям в Аргентине, например, упал с 77% в 2017 году до 45% сегодня. В Великобритании интерес к новостям снизился почти вдвое с 2015 года. В обеих странах это изменение отражается в аналогичном снижении интереса к политике.
*Упомянутые в тексте поста и на скриншотах Facebook, WhatsApp и Instagram принадлежат компании Meta, которую в РФ признали экстремистской
-
@ 4ba8e86d:89d32de4
2024-10-11 22:59:29Livro de Estratégia , Cripto-Anarquia, Tradecraft, Zonas Autônomas Temporárias, e Contracultura ~ Smuggler e XYZ
PDF do livro em português: https://raw.githubusercontent.com/cypherpunksbr/a-segunda-esfera/master/segundaesfera.pdf
Livro em audiobook: https://archive.org/details/second-realm-digital/
Texto em português: https://cypherpunks.com.br/documentos/a-segunda-esfera/#livro-de-estrat%C3%A9gia
Opaque link
https://opaquelink.sirion.io/
Cyberpunk , Criptoanarquia , extremismo de privacidade, segurança, estratégia.
anarplex net
https://anarplex.sirion.io/
arquivos e projetos relacionados a: cripto-tribos, phyles , cripto-anarquia , agorismo, provedor de serviços darknet.
Thank you, @EricSirion, for hosting the websites, @TheRealSmuggler thanks for the content. Eles contêm alguns dos conteúdos cypherpunk e cripto-anarquistas mais importantes que existem. Se você ainda não os conferiu, dê uma olhada há muito para explorar.
-
@ 28460797:b23ce78f
2024-10-13 10:53:36Post number 1
-
@ 0f4795bf:a8365abe
2024-10-12 20:25:34Die Redefreiheit wird überall auf der Welt angegriffen. Wir sind als Urheber von Inhalten heute nicht frei, sondern Sklaven im Silo der Tech-Giganten.
Es ist an der Zeit, uns zu befreien und unseren Worten in einer Ära grassierender Zensur, verengter Debatten, Deplatforming und dysfunktionaler öffentlicher Diskurse Geltung zu verschaffen.
Das Pareto-Projekt ist ein privat finanziertes Open-Source-Projekt mit Sitz in der Schweiz, das Publikationslösungen entwickelt, die von allen genutzt, weiterentwickelt und ausgebaut werden können.
-
@ f2e2c80b:1b1b0af9
2024-09-26 15:01:08Details
- ⏲️ Prep time: 10 min (+24h to lievitate)
- 🍳 Cook time: 15
Ingredients
- 200g type 1 flour
- 2g fresh yeast
- 120g water at room temperature
- .
- 5g fresh yeast
- 5g malt (or honey)
- 50d type 1 flour
- 55g water
- 15g salt
- Toppings:
- Tomato sauce
- Mozzarella fiordilatte
Directions
-
- Place the biga with: 5g fresh yeast, 5g malt or honey, 50g type 1 flour and 35g water in the mixer and start kneading at first speed.
-
- Add 15g salt and 20g water.
-
- Place on the counter, food and knee for 20 minutes, then shape and leave rinse at room temp. for 1.30 h.
-
- When ready shape the pizza and spread tomato sauce.
-
- Put in hot oven at 280° for 10min.
-
- Take out, add mozzarella and bake again for 5 min.
-
@ 5e5fc143:393d5a2c
2024-10-11 22:26:08Just revisiting some quick tips for #newbies #pow #public #blockchain users only.
if you just getting started with bitcoin or any pow crypto coins or been using or storing them for a while, you not must forget the roots and fundamentals.
Hot Wallet — It gets connected to live internet at some point in time essentially to sign / send a tx i.e. spending transaction — exposes the private key of the address from in the process
Cold Wallet — It never ever gets connected or online and can always keep receiving inbound amounts Paper wallets are best n cheapest form of cold wallet that can used once n thrown away.
Cold wallets need to either “import”ed or “sweep”ed in order to used or spend — https://coinsutra.com/private-key-import-vs-sweep-difference/
Any thin #wallet is always dependent on connectivity to live up2date node server where-as self-sufficient qt / cli wallet takes a while to sync up to latest block height in order to be usable.
Beginners should always resist the attraction of quick and fast — thin n 3rd party wallets and always start a long learning journey of core wallets of any coin — either “qt” GUI wallet or command line “coin-cli” wallet
Almost all #proofofwork #blockchains i.e. #POW has #node #wallet - everyone who use support he #public #blockchain secures own you coin value
You can run fullnode either on clearnet or over onion 🧅 #BTC has >55% of nodes running in onion out of total 15000+ live fullnodes and 50000+ bitcoincore wallets around blockheight 777000 . Other notable pow chains are #LTC #RVN and rest are babychains for now !
Always delete hot wallet to test practice restoration before sending any large refunds to it to be safe.
Large funds are always best to keep in self custody node wallets rare n occasional use
Final word — Cannot see private key 🔑 or seed 🌱 in any wallet means not your coin. 😲
Use wallet which u learn or understand best only
That’s all for now n Thank you 🙏 ! ⚡️ https://getalby.com/p/captjack ⚡️
Some Cold wallet nostr posts nostr:note1p6ke5wqshgxtfzj5de3u04hejl2c5ygj8xk8ex6fqdsg29jmt33qnx57y2 nostr:note1rse0l220quur6vfx0htje94ezecjj03y6j7lguwl09fmvmpt6g3q0cg7yw nostr:note1q5w8dyjuqc7sz7ygl97y0ztv6sal2hm4yrf5nmur2tkz9lq2wx9qcjw90q
some nostr specific lightning ⚡️ Layer2 wallets with blockchain mainnet option nostr:naddr1qqsky6t5vdhkjm3qd35kw6r5de5kueeqf38zqampd3kx2apqdehhxarjqyv8wue69uhkummnw3e8qun00puju6t08genxven9uqkvamnwvaz7tmxd9k8getj9ehx7um5wgh8w6twv5hkuur4vgchgefsw4a8xdnkdgerjatddfshsmr3w93hgwpjdgu8zdnswpuk2enj0pcnqdnydpersepkwpm8wenpw3nkkut2d44xwams8a38ymmpv33kzum58468yat9qyt8wumn8ghj7un9d3shjtngv9kkuet59e5k7tczyqvq5m2zcltylrpetrvazrw45sgha24va288lxq8s8562vfkeatfxqcyqqq823ckqlhc8 related blog post nostr:naddr1qqxnzd3cxyenjv3c8qmr2v34qy88wumn8ghj7mn0wvhxcmmv9uq3zamnwvaz7tmwdaehgu3wwa5kuef0qydhwumn8ghj7mn0wd68ytn4wdjkcetnwdeks6t59e3k7tczyp6x5fz66g2wd9ffu4zwlzjzwek9t7mqk7w0qzksvsys2qm63k9ngqcyqqq823cpdfq87
-
@ 3ffac3a6:2d656657
2024-10-13 03:33:29Introduction: The Collapse of Digital Technology
In São Paulo, the city that never sleeps, life moved to the rhythm of digital pulses. From the traffic lights guiding millions of cars daily to the virtual transactions flowing through online banking systems, the sprawling metropolis relied on a complex web of interconnected digital systems. Even in the quiet suburbs of the city, people like Marcelo had become accustomed to the conveniences of modern technology. He controlled his home’s lights with a swipe on his phone and accessed the world’s knowledge with a simple voice command. Life was comfortably predictable—until it all changed in an instant.
Marcelo, a brown-skinned man in his early 50s, sat at his small desk in his home office, the soft afternoon light filtering through the window. Slightly overweight, with a rounded belly that years of office work had contributed to, Marcelo shifted in his chair. His mustache twitched slightly as he frowned at the screen in front of him—a habit whenever he focused deeply. It was his signature look, a thick mustache that had stuck with him since his twenties. Despite his best efforts, he had never been able to grow a full beard—just sparse patches that never connected. Divorced for a few years, Marcelo lived alone most of the week, though he wasn’t lonely. His stable girlfriend, Clara, visited him every weekend, and his two children, now in their late teens and attending university, also came by on weekends.
The house was quiet except for the hum of his laptop and the soft clinking of his spoon against the coffee cup. Marcelo's work as a tech consultant was steady, though far from thrilling. He missed the hands-on work of his younger days, tinkering with radios and cassette players. Despite the modern world he inhabited, a small part of him had always felt more at home in the simpler, analog era he grew up in.
Suddenly, without warning, everything stopped.
The power blinked out, and the fan spinning lazily overhead whirred to a halt. Marcelo barely had time to glance at his laptop before it went black. His phone, lying next to him on the desk, flashed briefly before the signal dropped completely. Frowning, Marcelo stood up and walked to the window, expecting it to be a localized power outage. But outside, something felt wrong—too quiet. The usual hum of traffic and distant city noise was absent. Across the street, his neighbors were stepping out of their houses, confused, holding their phones up as if searching for a lost signal.
"Strange," Marcelo muttered under his breath, his mustache twitching again as his mind started racing. His first instinct was to check his landline, a relic he kept more out of nostalgia than need. He picked it up—no dial tone. Marcelo’s eyes narrowed. He walked back to his desk, feeling a strange sense of unease creeping into his chest. São Paulo wasn’t a city that just went silent.
In the corner of his office, among old mementos and books, sat an old shortwave radio he had restored years ago, one of his many hobbies. Marcelo flicked it on. Static crackled through the speakers. He turned the dial, searching for any clear signal, any voice that could explain what was happening. After a few minutes of adjusting the knobs, something faint broke through the static: "...global digital failure... all systems down... total blackout."
Marcelo’s breath caught. He leaned in closer to the radio, but the signal faded into static again. He sat back in his chair, heart racing. A total digital failure? Could that be possible? He had read about solar flares or large-scale cyberattacks, but those were rare, temporary incidents. This, however, felt different. More permanent.
Outside, the quiet was giving way to confusion. He could hear his neighbors talking, some shouting, cars honking in the distance as traffic lights had likely failed. Marcelo’s mind whirled with the implications of what he’d just heard. If all digital systems had truly collapsed, everything would stop—communication, banking, transportation. The world was built on a fragile web of digital threads, and it seemed as if all of them had just snapped.
But Marcelo didn’t panic. Not yet.
He stood in the middle of his office, running a hand over his face, fingers brushing against his mustache. His mind flashed back to his childhood in the 1980s, a time before the digital world had taken over. A time when radios, telephones with rotary dials, and cassette players were the height of technology. While the digital age had made life easier, Marcelo had never completely left the analog world behind. He still remembered how to set up a radio antenna, fix a record player, and manually tune frequencies.
As he looked at the silent chaos outside, Marcelo realized something that few others had likely grasped yet: the digital world may have fallen, but there was still a way to survive. A way that was slower, more manual, but reliable.
Marcelo felt the weight of this realization settle on his shoulders. He had no desire to be a hero, no illusions of saving the world. But for his family—his children who would be arriving for the weekend, and Clara, who would be coming over soon—he knew he had to act. Marcelo glanced at the shortwave radio. A part of him, long dormant, began to awaken.
In a world suddenly thrust back into analog, Marcelo Fontana Ribeiro might just be the person São Paulo—and his loved ones—would need.
-
@ df8f0a64:057d87a5
2024-10-10 15:18:39書き散らす動機
残暑続きからの急な気温低下で鼻炎がひどくなる今日この頃、皆様お元気でしょうか
株主への抗議のために退職してから2ヶ月半、流石に暇を持て余してきました 時間がある上に能動的に働く気も起きず、ひたすらボーッとしたりうねうね考え事をする日々です 幸いにして人生も折り返しにさしかかる頃になり、時折「今、人生が終わって構わないのでは?」というようなことも考えたりします (鬱病既往歴ありますが私は元気です)
子どものお迎えを終えて、いつもどおり夕食をとり、またうねうねしているうちに ふと、6年前の年末に急死された、仕事でお世話になったTさんのことを思い出しました
子を寝かしつけてもまだ頭の中をぐるぐるしていたので、ここに吐き出してすっきりしようという魂胆です
Tさんとの出会い
私のキャリアの(ほぼ)スタートはVC(ベンチャーキャピタル)でした 誰のせいでもないとある経緯もあり、周囲からは警戒され避けられ、わずか6年ではありますが、 インナーサークルに入り込めない時期を過ごし、当時の上司と二人、とにかくやれることをやり続ける毎日でした
いつものようにピッチイベントに参加しているとき、近くの席にいたスーツ姿の3人組と目が一瞬合います
「事業会社の人だ」
協調投資やファンド出資のきっかけを掴むべく、その3人に話かけます
「よろしければ弊社投資先のご紹介や御社の...」
ひととおりの挨拶を済ませ、この人たちにも避けられるんだろうと思いながらも要件を切り出します
「是非やりましょう」
いつもとは違う嬉しい返事をくれたのがTさんでした
面倒見の良い他社の先輩
そのときの3人組であるMさん・Iさん・Tさんには、私の仕事人生の中で最もお世話になったと言っても過言ではありません
ファンドの営業を受けていただき、協調投資を行い、VCからの転職後にも協業相手として他部署のキーマンをご紹介いただき...
社会人になったばかりの私の、今思い返せば恥ずかしい(部下がこんな提案したら卒倒する)レベルの提案を、 誰もが知る一流企業の多忙な役職持ちであるにも関わらず、毎回一時間も割いて丁寧に対応してくださる心の広い方でした
当時、VCと接点をもつような事業会社の対スタートアップ部隊は、本業でご活躍されている方が兼任で取り組むパターンが多く、Mさん・Iさん・Tさんももちろんそう
その後も昇進され、最後には本社の取締役に。今年遂に退任され、所謂「あがり」でしょうか、子会社の取締役に異動 長い社会人人生をほぼ走りきり、有終の美を飾ろうとする時期にさしかかっています
でもTさんはそこにはいません
残される側
冒頭触れたとおり、Tさんは6年前のこの時期に急死されました 死因については、Tさんのご友人がFBに投稿していた文章を読んでも、Iさんに聞いてもわからない
悲しいかな、四十年近く生きていると、死因が明かされない理由がわかるようになる機会が一度や二度はあります Tさんもおそらくそうだったのでしょう
直前まで、Iさんと一緒にベイエリアに出張され、楽しそうなコメントと共に写真を投稿されていたのに 晩婚なのか再婚なのか、とにかくご結婚されて一年ちょっと。お子様も生まれたばかりだったのに Tさんは近い人間に心中を隠して、静かにこの世を去りました
あなたの快い返事に、どれほど私が救われたのか 転職後の提案のとき、受付で顔を出してすぐ「元気?」と声をかけてくださったことがどれほど私を安心させてくれたか あなたが声をかけてくれる度、私の社会人としての成果が生まれたことに、私は十分に感謝を伝えられていません
まだしばらく残る理由
振り返って、Tさんのように誰かの人生をenhanceできたのか?と自分に問うと、まだできたとは思えません。残念ですが
今ここで死んでも私は構わないけど、まだもうちょっと頑張るべきかな、老いてから誰かに感謝をしてもらうまで生きてみてもいいかな
そうふと思い直しているうちに日付が変わりました
-
@ 5e5fc143:393d5a2c
2024-10-11 22:23:45Objective: Share technique n tools create awareness among nostriches
Description: Everyone using nostr will get annoyed by 1. Rougue DM, rouge reply from fraud npubs impersonating some famous accounts 2. Advertising scripts / bots replying or sending unwanted list of things 3. AI bots repeating or replying to every note u post
It is most a user responsilty to deter or mitigate those and have clean timline on whichever nost client you r using
Methods and Action:
The below may sometime client specific and you need navigate and find similar action in you fav. client
To be continued ...
Enjoy surfing nostr - we are learning - we grow together
I am not part of core team or expert just sharing own experience for you benefit. This is not only way to do things - so if you learn or know useful or similar feel free add in comment.
Thank you again!
NPUB LOOK
-
@ 44dc1c2d:31c74f0b
2024-09-25 20:15:13Chef's notes
Last time I made this I subbed the tomato puréed with some blistered cherry tomatoes. Don't think I'll be using the purée going forward.
I prefer thighs so that's what I use for this but use whatever you want.
Adjust spices based on the size of your onions. If all you have is two massive onions maybe use one and a half onion or just up the amount of spices a little.
Details
- ⏲️ Prep time: ~10 min
- 🍳 Cook time: ~40 ish min
- 🍽️ Servings: 4
Ingredients
- 2 Onions
- 2 tbsp tomato purée
- 1/3 cup cashews
- 1.5 tsp Garam Masala
- 2 ish cloves of crushed garlic
- 1 tsp chili powder
- 1 tbsp lemon juice
- 1/4 tsb ground turmeric
- 1 tsb salt
- 1 tbsp plain yogurt
- 2 tbsp of your cooking oil or fat
- 1 tbsp Coriander (Cilantro) plus extra for garnish
- 1 tbsp sultanas (golden raisins)
- 1 lb of chicken cubed
- 6 oz of white button mushrooms
Directions
- Quarter the onions and put them in a food possessor for about a minute
- Add the tomatoes, nuts, garlic, Garam masala, chili powder, lemon juice, turmeric, salt, yogurt and blend for another minute tell its well mixed in.
- In a wok or a large pan heat your cooking oil and add the onion and spice mix in. Fry gently for around 2-ish minutes, stir frequently.
- Add the chicken, coriander, and raisins to the pan. Stir-fry for another minute or so.
- Add mushrooms and water. Bring to simmer and cover the pan cook for 10 min or until the chicken is 100% cooked through.
- Serve with plain rice and enjoy!
-
@ 9fc6b5fc:5bacb10a
2024-09-18 03:54:39Details
- ⏲️ Prep time: 45 minutes
- 🍳 Cook time: 40 minutes
- 🍽️ Servings: 4-6
Ingredients
- 1 frozen puff pastry sheet, thawed
- 2 red organic apples (skin color adds great visual pop)
- Juce of half a lemon
- 1 tablespoon of flour, to sprinkle the counter
- 3 tablespoons of apricot preserve
- Cinnamon (optional)
- Powdered sugar for decorating (optional)
Directions
-
- Thaw the puff pastry if you haven't done so yet. It should take about 20-30 minutes.
-
- Prepare a bowl with some water and the lemon juice. Cut the apples in half, remove the core and cut the apples in paper thin slices. Leave the peel so it will give the red color to your roses.
-
- Right away, place the sliced apples in the bowl with lemon and water, so that they won't change color.
-
- Microwave the apples in the bowl, for about 3 minutes, to make them slightly softer. If you prefer, you can also simmer the apple slices in the water in a small pan on the stove.
-
- Unwrap the puff pastry over a clean and lightly floured counter. Using a rolling pin stretch the dough a little, trying to keep it in a rectangular shape. Cut the dough in 6 strips. These are about 2 in x 9 in (5 cm x 22 cm).
-
- In a bowl, place three tablespoons of apricot preserve with two tablespoons of water. Microwave for about one minute, so that the preserve will be easier to spread. Spread the preserve on the dough.
-
- Preheat the oven to 375 degrees F (190 degrees C). Drain the apples.
-
- Place the apples on the dough so that the skin side is facing away from you, and the bottom of the slice is at the middle of the dough (see cover image). Sprinkle with cinnamon if you'd like.
-
- Fold up the bottom part of the dough over the apple slices, so that it cups them.
-
- Carefully roll, seal the edge, and place in a silicone muffin cup. No need to grease the muffin mold if it's silicone. Otherwise, make sure to grease it.
-
- Do the same for all 6 roses. Bake at 375 degrees F (190 degrees C) for about 40-45 minutes, until fully cooked. If using a convection oven, check the roses after 20 minutes and cover if the apple slices are already sufficiently browned. Convection ovens dry out the apples more quickly and will result in 10 minutes shorter cooking time.
-
@ 6bcc27d2:b67d296e
2024-10-13 03:15:54cardlink url: https://scrapbox.io/nostr/NIP-23 title: "NIP-23 - nostr" description: "#NIP Long form content https://github.com/nostr-protocol/nips/blob/master/23.md 長文投稿 記事やブログのような投稿をできるようにする仕様 ブログ系クライアントで使われている 仕様 新しい kind:30023(パラメータつき上書き可能イベント)を定義する 下書きの保存にはkind:30024を使う 「記事」や「ブログ投" host: scrapbox.io favicon: https://scrapbox.io/assets/img/favicon/favicon.ico image: https://scrapbox.io/assets/img/content-logo.png
- 長文投稿 -
@ 30b99916:3cc6e3fe
2024-09-16 16:54:15Chef's notes
Recipe from my Dad who frequently used the term, UBETCHA.
Details
- ⏲️ Prep time: 10 minutes
- 🍳 Cook time: 30 minutes
- 🍽️ Servings: 5
Ingredients
- 1 Quart/Pint medium sized Oysters
- 1 to 2 packs of regular saltine crackers
- 3 to 4 eggs beaten in a bowl
Directions
- Rinse Oysters thoroughly in cold water
- In a gallon zip lock bag crush saltine crackers as fine as possible. I use a roller pin.
- Place a portion of the crushed crackers into a bowl.
- In a frying pan with cooking oil turned to medium.
- Place rinsed oysters into the egg bowl.
- Bread each egg soaked oyster in the crushed cracker bowl and place into the frying pan on medium heat.
- Cook until each oyster is golden brown on each side.
-
@ fd208ee8:0fd927c1
2024-10-09 12:27:53Why waste time, looking at other people's stuff?
I get this question a lot, on Nostr, and it feeds immediately back to the next question: Why don't you just build your own client, if you're so smart?
This was a completely new question for me, as I'm used to collaborating with at least one other person, even when doing FOSS stuff. (No, this isn't my first such project; we just used to call it "volunteering" and "sharing the code", which sounds way less glamorous.) It never occurred to me, that a habit of collaboration and interaction was some sign of my ignorance and incompetence, or somehow proof that I can't vomit up "Hello World!" in 5 different programming languages.
I also made the deadly political mistake, when I entered the Nostrsphere, of refusing to call myself a "dev". For me, "dev" is a special title, given to someone doing a specific type of programming (fiddling with GUIs, mostly, which I've only done occasionally, as a sub), whereas the types I've done are "test automation", "development operations", "database management and data curation", "requirements engineering", and "application administration". Because it's so much easier to find someone interested in building a GUI, rather than building AnythingElse, I tend to slide into AnythingElse and it eventually became my professional specialty to be the Girl Friday of every project.
But, in Nostr, there is no AnythingElse category. There are only (GUI) client devs and AllOfTheIdiotsWhoMustBowDownToTheDevs. Which merely doubled my instinct to distance myself from the term. I do not want to join some cargo cult and be pedestalized and regarded as some sort of superhuman everyone owes fealty to, in return for raining GUI presents down on my loyal subjects.
Software engineers are simply people who are skilled craftsman, not gods, and it is fair to point out that some are more skilled than others. It is also completely fair to criticize their products, report bugs, and wonder aloud at endemic low-quality.
Which brings me back to the initial question:
What does the inquisitive dev know, that the others don't?
1) You learn an awful lot about an awful lot, by looking at specs, reviewing code, and trying out various implementations of concepts you are already familiar with. There are, in fact, n number of use cases for every event type, and I've seen so many of them, that I can conjure them up, or invent new ones, on the fly, rather than wasting time inventing similar events. 2) They don't have to explain their concept to you, later, when you interact. Each interaction brings you closer to parallel-levels of knowledge, which raises the signal-strength of the interaction, and widens your own knowledge base, for interacting with third parties. 3) You are increasingly-likely to contribute code or perform some other more-advanced task, for other people, as you don't face the hurdle of adjusting to a new repo or unfamiliar language, while being less-likely to merely fork-and-ignore because you have a standing business relationship with the other developer. 4) If the other dev stops maintaining the repo, you'll be inclined to continue on your own. You may even eventually receive administrative access, rather than needing to fork, as they trust you with their stuff. This means that the risk of the repo becoming abandoned falls, with each active dev snooping around it, even if that is not their primary project. 5) It helps you determine who to focus your energy on interacting with, further. Is this person new to software development, perhaps, but has some interesting transfer-knowledge from some other branch, that has resulted in a surprisingly novel concept? Is this person able to write very clean code, so that merely reading their code feels like mental training for your own craftsman's toolbox?
...and many more reasons, but this is getting too long, so, let's just cut to the chase.
What does a craftswoman want?
But, this still doesn't answer the question of my private motivation. Why do I want to gather all of this knowledge, from those further ahead, than I?
I think Nostr has long moved past the initial stage, where mere speed was of the essence, so that one npub could finally post a note and have it appear on the other npubs' client. That must have felt like a miracle, but it increasingly feels like a disaster, as the steadily-rising complexity of the Nostr ecosystem causes haphazardly-structured and largely-unexamined code bases to begin to atrophy, or result in developers running around at an exhausting speed, with their bug-extinguishers, to put out fire after fire.
I think the time has arrived, for a different kind of development. Maybe even for a different kind of developer. Not replacing the experimentalism that made Nostr fun, but adding the realm of production-quality software engineering. The sort of software development that requires relay administration, testing, support... collaboration, interaction, maybe even someone who does AnythingElse.
I want to build useful, elegant products people enjoy using and feel comfortable relying on. I want them to use them, naturally and happily, to accomplish tasks they consider worthwhile. I don't want them thinking about me, while they use it. The craftswoman should never be greater than her work.
I want them to feel free -- nay, be eager! -- to give me both positive and negative feedback. My assumption is always that our production is imperfect because we are imperfect, so you do us a favor, by pointing out where we can improve. That's why we wish to integrate a feedback form that produces ngit issue events, putting your questions and comments straight on our board.
And there will be an AnythingElse person, reading that board, and responding promptly, rest assured.
-
@ 6bcc27d2:b67d296e
2024-10-13 02:11:54GitHub - jamesmagoo/nostr-writer: Publish seamlessly from Obsidian to Nostr
- [[Obsidian]]から[[Nostr]]に直接Noteを公開するためのツール
- [[NIP-23]]を使用している
-
使い方
- 最初にNostrのプライベートキーを設定で追加する
- Obsidianで書いてNostrに公開ボタンを押す
-
ユーザガイド
-
"Publish as a draft"を有効にすると下書きとして保存される。
- [[Habla]]で確認できる。 https://image.nostr.build/6a6b854e21e1b78494083d0bb00d0669fe70a1b8e612f89e171256ed05d7ee9b.png
-
@ 5e5fc143:393d5a2c
2024-10-11 22:20:52Nostr is censorship resistant freedom protocol !!!
OBJECTIVE:
In nutshell this is jumpstart guide for fresh newbie who wanna try out nostr and also for anyone who wanna spread the info in other social media.
HOWTO: Dummies guide to start using nostr
Open browser - > visit iris.to or snort.social Click on Name or New Account – follow steps That’s it – you are in nostr now -- can browse most notes n indepth guides about nostr now and also post note / comment / ask something #asknostr (save n backup you nsec priv key carefully or make additional one later)
video #tutorial #onboarding normies 2 nostr
Get a mobile app Amethyst or Getcurrent.io or Primal later, Get a NIP05 profile checker, Get browser extension Alby wallet Once you become advanced user – explore, search and change as needed as you learn more Remember: Nobody can block/suspend/delete/remove/ban you in nostr !!! Relays servers are important. Also ZAPs are important https://habla.news/tony/welcome-to-nostr https://habla.news/u/captjack@nostrich.love/1681579356819
Any expert or power user nostrich volunteer please cut/paste text, insert screenshot in any other social media you like and think is good for nostr. mastadoon/fediverse/tiktok/meta/wechat/weibo/...
https://justpaste.it/arqgs nostr:note19v0zcp6rnwnry9vjp028qrd37zjcx3e6fpeu3pa7dm8mq48x6a7seye5g8 nostr:note19v0zcp6rnwnry9vjp028qrd37zjcx3e6fpeu3pa7dm8mq48x6a7seye5g8
OPTIONAL Lightning Wallet⚡️ : 🐝 GetAlby🐝 is easiest n also power LN wallet to learn n use Open browser - > visit https://getalby.com/auth/users/new Choose a unique username and strongpaswrd (save / backup elsewhere properly) That's it - you now have Bitcoin Lightning wallet LN-BTC and you now receive and send SATS Play with it learn more about advance features of Alby. Also now can use nostr ⚡️ZAPs ⚡️
Those using PC/Mac can install "getalby browser extension" addon firefox/safari/kiwi preferred.
On mobile install bluewallet and setup new LNWallet->Getalby LNDHub
Also Move medium to large funds to self-custody Liquid BTC wallet like Sideswap or Aqua or Marina Move any extra large funds to BTC mainnet bech32 seqwit address wallet if not spending soon as store-of-value ignoring high mainnet gas fee.
Re-posting - use iris.to or primal.net to start with
Thank you ! 💜🤙 Welcome to Nostr 💜🤙
-
@ 17538dc2:71ed77c4
2024-09-16 15:26:32Quiztime
Oil and gas
Oil and gas is naturally occurring. The prevalent worldview is that oil & gas has a biotic origin. There are real world examples of abiotic oil deposits, which proponents of the status quo have a difficult time reconciling.
Irregardless, when oil & gas is burned, it simply turns to plant food (carbon dioxide + water).
Oil and gas greens the Earth, and increases fertilization and agricultural crop yield across the globe.
The energy density of oil and gas is only surpassed by that of nuclear power.
Energy produced by oil and gas combustion is generally on-demand, reliable, economically storable & transportable.
Solar
The sun is an abudant energy source, which keeps Earth warm, and alive. Thank you sun 🌞!
With the exception of places such as the UK, where it is unclear if inhabitants have ever seen the sun, solar rays keep plants, animals, and humans happy & alive on most of planet Earth.
Inventions such as solar panels harness the sun's energy, and convert it to electricity.
Solar panels consist of silicon, rare earth metals, and require toxic metals.
Solar panels have an expected life of decades, are not readily or economically recyclable.
A very low solar energy density practically means that land is inefficiently utilized in solar energy production. Solar used on arable land can no longer be farmed, and where no plains exist solar is known to cause deforestation and landslides.
Solar energy is not reliable, not can it be summoned on demand. Solar energy is not economically storable, and is many cases is not produced at the point of demand.
Despite central planner mandates & subsidies in the US, the #EULAG and elsewhere, due to its intermittent nature, solar power cannot be counted on to replace reliable power generation in nuclear, hydro, or carbon fuel thermoelectric plants.
What this means is that solar does not replace, and yet ratheradds to reliable energy generation, as most people in the developed world would not be OK with having electricity for at most 1/3 of the day. This increases the price of electricity, which in turn increases energy poverty, and drives businesses to shut down manufacturing, or move to a more energy competitive jurisdiction.
The capital wasted by central planners could have been used to reduce burden on consumers, and businesses, or fund healthcare, infrastructure, or other services.
It should be noted that off grid applications where there is no grid, or energy alternatives can be massively useful for folks otherwise without electricity.
Which energy source would you consider renewable?
-
@ 5df9cbaa:89f8f3b3
2024-10-12 21:06:44For the past decade or so I have jumped around diet to diet, or lifestyle some would say. I've done a lot of them and some I stuck with and some I haven't. But lord knows I have tried a bunch. These are my thoughts on some of them these days.
Paleo
This is the first major diet I had tried and to be honest I had really great success with it. And I can't argue the idea, like most of the Ancestral based diets. If you think about it, it just makes sense. My downfall is I'm not a veggie fan and forcing myself to eat them got old, I leaned hard on brussel sprouts and asparagus. Eventually I just fell off the wagon. I think it doesn't help that I drank back then also.
The Makers Diet
This one sounded cool, the good lord says... but I don't like many fermented foods and I didn't stick with it more than a couple weeks.
Vegetarian/Vegan
I actually did this solid for about a year, maybe a tad longer. I didn't really feel great, I was tired a lot, and I gained weight. I did not do whole foods though. I gave in to all the fake meat stuff and various goodies, who knew Orios were vegan.
Carnivore
I went from vegetarian straight to carnivore. I love meat, I cannot lie. This I did solid for a bit with decent results. But fell off the wagon a lot.
Animal Based
Another ancestral based diet. The funny thing that makes me lean towards these types of diets is they make sense. Watch a couple episodes of "Naked and Afraid" and you see even the vegans go for meat. Not eating it makes zero sense. That being said, fruit makes a hell of a lot of sense also. If available, it is easy eats. Veggies beyond root vegetables, good luck not starving eating only vegetables in a survival situation in the wild.
Ray Peat
So, this isn't an official diet, but Dr. Peat seemed to provide a lot of reasonable and well studied info that makes sense. It really makes me relook at everything before.
In the end, I am experimenting a lot now. The Ray Peat stuff has me the most interested and I'm starting to experiment with his philosophy and that of those who have tried and wrote about it. It's super early, but maybe in a few months I can talk how I feel about it and how my body is taking it. But this is the flow I've taken in the past years and the path I am on now.
Cheers!
-
@ c69b71dc:426ba763
2024-09-16 08:21:02Chef's notes
This granola is a wholesome, nutrient-dense option that's free from sugar, oil, and artificial additives. The activated nuts and seeds are sprouted to enhance their nutritional value and digestibility, while the natural sweetness comes from apples and bananas. Dehydrating at low temperatures ensures the ingredients retain their raw, living enzymes. Enjoy this crunchy delight as a breakfast topping, snack, or straight from the jar!
The picture shows my delightful breakfast: creamy oat milk with chia seeds, topped with crunchy granola and fresh cubes of apple and pear 💚
Enjoy your crunchy, nutrient-packed granola⚡️
Details
- ⏲️ Prep time: 10 min (soaking 24 hours)
- 🍳 Cook time: 16 hours (Dehydration)
- 🍽️ Servings: 6
Ingredients
- 1 cup raw almonds
- 1 cup raw sunflower seeds
- 1 cup raw pumpkin seeds
- 1/2 cup raw cashew or walnuts
- 2 ripe banana
- 1 apple (cored)
- 1 tsp pure vanilla extract
- 1 tbsp raw cocoa powder
- 1/2 tsp ground cinnamon (optional)
- Pinch of sea salt
Directions
- Activate and Sprout the Nuts & Seeds: Soak the almonds, sunflower seeds, pumpkin seeds, and cashews or walnuts in water for 24 hours. Drain and rinse thoroughly.
- Prepare the Fruit Mixture: In a blender, puree the banana and apple until smooth. Add the vanilla extract, cocoa powder, cinnamon (optional), and a pinch of sea salt to the puree.
- Mix and Combine: In a large mixing bowl, combine the activated nuts and seeds with the fruit puree. Stir well until everything is evenly coated.
- Dehydrate: Spread the mixture evenly on dehydrator trays. I use silicone sheets with a border. Dehydrate at a temperature at 42°C (115°F) for 12–16 hours, or until the granola is completely dry and crispy. If you don’t have a dehydrator, you can use your oven at its lowest setting, leaving the door slightly open.
- Break Apart & Store: Once fully dehydrated, break the granola into chunks. Store in an airtight container in a cool, dry place for up to 2 weeks.
- Serving Suggestions: Sprinkle on top of smoothie bowls, or eat as is!