-
@ a95c6243:d345522c
2024-11-29 19:45:43Konsum ist Therapie.
Wolfgang JoopUmweltbewusstes Verhalten und verantwortungsvoller Konsum zeugen durchaus von einer wünschenswerten Einstellung. Ob man deswegen allerdings einen grünen statt eines schwarzen Freitags braucht, darf getrost bezweifelt werden – zumal es sich um manipulatorische Konzepte handelt. Wie in der politischen Landschaft sind auch hier die Etiketten irgendwas zwischen nichtssagend und trügerisch.
Heute ist also wieder mal «Black Friday», falls Sie es noch nicht mitbekommen haben sollten. Eigentlich haben wir ja eher schon eine ganze «Black Week», der dann oft auch noch ein «Cyber Monday» folgt. Die Werbebranche wird nicht müde, immer neue Anlässe zu erfinden oder zu importieren, um uns zum Konsumieren zu bewegen. Und sie ist damit sehr erfolgreich.
Warum fallen wir auf derartige Werbetricks herein und kaufen im Zweifelsfall Dinge oder Mengen, die wir sicher nicht brauchen? Pure Psychologie, würde ich sagen. Rabattschilder triggern etwas in uns, was den Verstand in Stand-by versetzt. Zusätzlich beeinflussen uns alle möglichen emotionalen Reize und animieren uns zum Schnäppchenkauf.
Gedankenlosigkeit und Maßlosigkeit können besonders bei der Ernährung zu ernsten Problemen führen. Erst kürzlich hat mir ein Bekannter nach einer USA-Reise erzählt, dass es dort offenbar nicht unüblich ist, schon zum ausgiebigen Frühstück in einem Restaurant wenigstens einen Liter Cola zu trinken. Gerne auch mehr, um das Gratis-Nachfüllen des Bechers auszunutzen.
Kritik am schwarzen Freitag und dem unnötigen Konsum kommt oft von Umweltschützern. Neben Ressourcenverschwendung, hohem Energieverbrauch und wachsenden Müllbergen durch eine zunehmende Wegwerfmentalität kommt dabei in der Regel auch die «Klimakrise» auf den Tisch.
Die EU-Kommission lancierte 2015 den Begriff «Green Friday» im Kontext der überarbeiteten Rechtsvorschriften zur Kennzeichnung der Energieeffizienz von Elektrogeräten. Sie nutzte die Gelegenheit kurz vor dem damaligen schwarzen Freitag und vor der UN-Klimakonferenz COP21, bei der das Pariser Abkommen unterzeichnet werden sollte.
Heute wird ein grüner Freitag oft im Zusammenhang mit der Forderung nach «nachhaltigem Konsum» benutzt. Derweil ist die Europäische Union schon weit in ihr Geschäftsmodell des «Green New Deal» verstrickt. In ihrer Propaganda zum Klimawandel verspricht sie tatsächlich «Unterstützung der Menschen und Regionen, die von immer häufigeren Extremwetter-Ereignissen betroffen sind». Was wohl die Menschen in der Region um Valencia dazu sagen?
Ganz im Sinne des Great Reset propagierten die Vereinten Nationen seit Ende 2020 eine «grüne Erholung von Covid-19, um den Klimawandel zu verlangsamen». Der UN-Umweltbericht sah in dem Jahr einen Schwerpunkt auf dem Verbraucherverhalten. Änderungen des Konsumverhaltens des Einzelnen könnten dazu beitragen, den Klimaschutz zu stärken, hieß es dort.
Der Begriff «Schwarzer Freitag» wurde in den USA nicht erstmals für Einkäufe nach Thanksgiving verwendet – wie oft angenommen –, sondern für eine Finanzkrise. Jedoch nicht für den Börsencrash von 1929, sondern bereits für den Zusammenbruch des US-Goldmarktes im September 1869. Seitdem mussten die Menschen weltweit so einige schwarze Tage erleben.
Kürzlich sind die britischen Aufsichtsbehörden weiter von ihrer Zurückhaltung nach dem letzten großen Finanzcrash von 2008 abgerückt. Sie haben Regeln für den Bankensektor gelockert, womit sie «verantwortungsvolle Risikobereitschaft» unterstützen wollen. Man würde sicher zu schwarz sehen, wenn man hier ein grünes Wunder befürchten würde.
Dieser Beitrag ist zuerst auf Transition News erschienen.
-
@ 3369d0a7:eb020757
2024-11-28 07:41:32Chef's notes
This recipe was a staple at every thanksgiving with family and now I share it with you nostr family. Absolutely one of my favorite side dish during the holiday. The corn pudding in the photo is NOT baked, I will update it. I hate stock photos.
Details
- ⏲️ Prep time: 15-20 min
- 🍳 Cook time: 30-40 min
- 🍽️ Servings: 6-8
Ingredients
- 2 cans of creamed corn
- 2c Milk
- 1 Box of Jiffy Cornbread Mix
- 3 eggs
- 1/4-1/3c sugar
- 1/2- green bell pepper or pepper onion blend
- 1/4TBsp vanilla
- 1/2tsp Salt
- 2TBsp Butter
Directions
- Grab medium saucepan and desired baking dish at least 9x9
- Place saucepan on medium-high heat
- Add butter and sauté pepper onion blend until tender
- Combine milk, eggs, sugar and vanilla, mix well
- Lather warmed (NOT HOT) baking dish with butter
- Sprinkle half a box of Jiffy corn bread mix in the baking dish
- Add both cans of creamed corn to peppers and onions
- Pour wet ingredients into slightly cooled creamed corn mixture
- Sprinkle the other half box of jiffy mix into the baking dish
- Incorporate the wet and dry ingredients in dish so there are no dry lumps
- Let set for 10 min before placing in a 325 degree oven for 30-40 minutes, until the center is solid and the edges are golden brown.
-
@ 94a6a78a:0ddf320e
2024-11-27 19:36:12The backbone of your Nostr experience lies in relays—servers that transmit your notes, zaps, and private messages across the decentralized network. Azzamo offers three specialized relays to suit different user needs, ensuring reliability, performance, and privacy.
1. Free Relay
- URL:
wss://nostr.azzamo.net
- Overview: Azzamo’s Free Relay is perfect for newcomers to Nostr. It’s open-access, reliable, and ensures fair use with moderate rate limits.
- Key Features:
- Free to use.
- Notes older than one month are purged daily.
- Accessible gateway for decentralized communication.
2. Paid Relay
- URL:
wss://relay.azzamo.net
- Overview: Designed for power users, the Paid Relay offers unmatched performance with 99.9% uptime and low latency.
- Key Features:
- Scalable for heavy users.
- Fewer users for faster, consistent connections.
- Premium support included for paid users.
3. Inbox Relay
- URL:
wss://inbox.azzamo.net
- Overview: Never miss a private message again with the Inbox Relay, optimized for secure, spam-free direct messaging.
- Key Features:
- Guaranteed message delivery.
- Optimized for NIP-17 private messages.
- Optimized for NIP-19 group chats.
- Premium users enjoy advanced support.
Why Choose Azzamo Relays?
Life on Nostr is easier with Azzamo relays. They’re fast, reliable, and built to handle whatever you throw at them. The Paid Relay keeps your connections strong, the Inbox Relay makes sure no private message gets lost, and the Free Relay is always there to get you started. Supporting Azzamo by going premium helps keep this decentralized network growing—and you get priority support while you’re at it. Azzamo has your back on Nostr!
🔗 Start now:
- Free Relay:
wss://nostr.azzamo.net
- Paid Relay: azzamo.net/pay
- Inbox Relay: azzamo.net/inbox
Support the network and upgrade your experience—add time to your account via the Azzamo Dashboard. Choose Azzamo, and take control of your Nostr journey today!
- URL:
-
@ fcb65172:87f3c4ed
2024-11-26 19:29:20Introduction
As I approached the Santa Marta Favela, I couldn’t help but feel a mix of excitement and trepidation. Famous for housing a Michael Jackson music video, this favela is a common tourist attraction, but I was here to witness the raw, unfiltered reality of daily life. Little did I know that my adventure would involve a Brazilian gangster as my guide, offering to show me a side of the favela that few have ever seen.
The Initial Challenge
Initially, I was denied access to film anything beyond the iconic Michael Jackson statue and the breathtaking view of the city. Armed gangsters stood guard, making it clear that they had the final say in what I could capture. Frustrated and unsure of what to do, I decided to break the ice by buying them some beers. As we sipped on our drinks, I shared my previous videos and explained my passion for documenting the stories of ordinary people. To my surprise, one of them lowered his weapon and offered to show me around, granting me a glimpse into a world that most tourists never get to see.
The Guided Tour
As we ventured deeper into the favela, it became clear that my guide was well-connected and respected by the locals. He laid down the ground rules: certain things were off-limits, like the drug dealers and heavily armed gang members. While I was initially apprehensive, I soon realized that this was an opportunity to gain a unique perspective on life in the favela. He introduced me to the kiosk owners, street vendors, and everyday people who had called the favela home for decades. These individuals shared their stories of violence, police confrontations, and community resilience, painting a picture of life in the favela that was far from the stereotype of a place where the poor live.
The Police Station and the Question of Control
We ascended to the top of the favela, where a police station sat prominently. As we approached, I couldn’t help but wonder how much control the police really held over this complex network of streets and alleyways. Were the police and the gangs working together, using the honest, hardworking residents as pawns in their illicit activities? My guide, sensing my curiosity, shared his insights on the delicate balance between the police, the gangs, and the residents. He explained that while the police may not have complete control, they do work together to maintain a certain level of order, often in exchange for bribes or protection fees.
The Everyday Heroes of the Favela
As we explored the favela, we encountered a wide range of individuals, each with their own unique story. There was the kiosk owner who had lived in the favela for over 30 years, running his small business and raising a family. He shared his experiences of witnessing shootings and confrontations with the police, as well as the importance of community and football in the favela. We also met a local street vendor who had turned to selling goods to support his family after losing his job. Despite the challenges they faced, both men spoke with pride about their community and the resilience of its people.
### The View from the Summit
As we reached the summit, the view of Rio de Janeiro’s skyline took my breath away. It was a poignant reminder of the dichotomy between the beauty of the city and the harsh realities of life in the favela. My guide shared stories of community churches, local football teams, and the unwavering spirit of the residents. Despite the challenges they face, the people of Santa Marta Favela have created a community that is both resilient and vibrant.
Conclusion
In conclusion, my journey through the Santa Marta Favela was an eye-opening experience that challenged my preconceptions of this complex and misunderstood place. It’s a world where gangsters, police, and everyday citizens coexist in a delicate balance, where community and resilience thrive in the face of adversity. As I left the favela, I couldn’t help but feel a newfound appreciation for the strength and spirit of the people who call this place home. And a question of who is really in control here?
-
@ eb73e43e:d821300f
2024-11-26 02:56:10These are some really great features that are buried behind just a little too much friction in iOS, but I have a feeling you guys will enjoy.
Today we’re talking separate home screens toggled using shortcuts and focus modes! 🤯
The Goal
My initial motivation was for a cleaner, more organized phone, and to put my Bitcoin/Nostr apps aside so I’m less tempted to open them at random. I achieved a really good balance by creating a focus mode that has different wallpaper, notification settings, and app layout. All easily toggled using the trigger of your choice like the action button on newer models or the “back tap” accessibility feature for older phones.
This is what it looks like, pressing my action button to trigger the shortcut which changes my “normal” screen to the focus mode with different apps and settings:
Create Separate Home Screen
To create a separate home screen, first add your daily favorites to one page and bitcoin/nostr favorites to a second page. Once you have multiple pages with different apps, hold down to begin editing the screen and tap the dot buttons at the bottom middle.
This will open a view with all of your pages of apps. Uncheck any page you don’t want to see on your “normal” mode and leave the rest.
Focus Mode
Next you’ll need to open the settings and navigate to the “Focus” page. Here you’ll hit the plus button for a new focus and customize preferences like notifications, app screen, and wallpapers (my focus mode is labeled “CoinOS”).
Once you have a home screen layout and focus mode set, you can select to toggle focus mode in the action button settings.
My action button was simple at first, just toggling the focus mode on/off and it works great to reduce distraction. But I wanted it to do more than just toggle focus modes. So I found a way to have three different actions tied to the same button. Here's where we go a little wild with shortcuts, but hang in there it's worth the effort.
The Super Shortcut
Toggling focus modes is really convenient and enables a cool hidden Homescreen with your choice of apps. But I wanted to go further so I made an all-in-one shortcut to do several things depending on the state of the iPhone.
-
If the phone is locked, holding my action button toggles silent mode on/off. Nice for quick silencing even in your pocket.
-
If the phone is unlocked, but held sideways with the volume buttons upward, the shortcut opens my camera allowing quick shots with volume as shutter buttons.
-
If the phone is unlocked in any other orientation, it triggers the focus mode change. Allowing me to use the action button for three purposes, including app organization.
Shortcuts can be quite intimidating on your own so I’ll include a link if you want to download mine and try it yourself. It’s also a great way to get started by modifying rather than trying to create from scratch. Give it a shot, it’s pretty cool!
Have fun!
-
-
@ 30ceb64e:7f08bdf5
2024-11-24 16:48:15A Personal Journey
I recently created a blog using npub.pro to consolidate my Nostr and Stacker News longform posts in one place. It's been a fun experiment, with surprising results.
https://thebloghustle.npub.pro/
Primal now displays my SN and Nostr posts through a selection on my profile screen, and users are able to highlight, zap, and comment on the highlights of my articles.
I need to write more, the blog will be something of an open diary, detailing my personal experience with Nostr and bitcoin.
Why Nostr Outshines Substack and Medium
Nostr in my opinion has already surpassed the legacy blogging platforms. Functionalities like zapping, highlighting, and commenting, are fun and cool, but when added to Nostr's interconnectivity something magical appears. I had no idea my cross posted SN longform posts would be found in npub.pro, and I didn't know npub.pro had added longform support. Primal 2.0 was pretty much the nail in the coffin, the most popular Nostr client just added a reads section, supporting longform content. Nostr freaks like to talk about sovereignty and decentralization and owning your online identity, but the main attraction will probably be zaps, interconnectivity, and a more optimal UX.
Npub.pro, Cypher.space, Blogspot.io, Highlighter, Stacker News, Primal 2.0 and Yakihonne, are just the beginnings, but offer an amazing glimpse at what the future has in store. Keep in mind that these sites are sharing an average of around 10k daily active users, we'll see an explosion of content and a diversity of content because these platforms offer incentives and functionalities that you don't see elsewhere, as bitcoin becomes less taboo, and as the early adopter phase of these products comes to a close, we'll probably see v4v censorship resistance and digital ownership immensely supporting the underdog, the same underdog that just came over for the ease of use and hype.
So with that being said, highlight away. Let me know what you guys think about blogging on Nostr and if you think these are just the ramblings of a madman, or bland and obvious observations.
Thanks, Hustle
originally posted at https://stacker.news/items/781159
-
@ b6424601:a11e4ff4
2024-11-29 18:39:34At Jones Pierce, we firmly believe that sound money and sound design are intertwined. Therefore, we are excited to announce that we now accept Bitcoin as the preferred payment for our residential architectural design services! For over 25 years, we have designed and executed architectural asset projects that hold long-term value and provide a return on investment beyond a monetary investment. Our Bitcoin strategy of accepting Bitcoin payments and saving Bitcoin in our corporate treasury is a natural extension of our approach to asset architecture.
What is Asset Architecture?
Asset Architecture is a design approach that creates buildings that hold long-term value and provide a return on investment beyond a monetary investment. It's a framework that considers each client's specific needs and goals. We consider key qualities, including ease of maintenance, energy efficiency, flexibility, durability, and income-generating buildings, to apply a unique design prescription for each client and site.
How Does Bitcoin Fit into Asset Architecture?
By taking our first individual steps to move the design and construction industry onto a Bitcoin standard, we hope to remove much of its monetary premium and fiat incentives that lead to high-time preference projects not built with quality design nor built to last. We also implemented a Bitcoin treasury strategy to save Bitcoin on our balance sheet and take steps toward a Bitcoin Standard.
"We're excited to offer Bitcoin as a payment option for our clients," said Bryan, Founder of Jones Pierce. "For the first time in my business life, there is a simple pattern to follow. Do the work we believe in and our clients value. Design our business systems to make a profit. Retain profits in a BTC treasury account."
We want to promote better architecture by accepting Bitcoin as a medium of exchange. We acknowledge the help from Jon Gordon at Satoshi Health Advisors. We align with the view that Bitcoin is digital real estate, as Leon Wankum has written extensively. The Bitcoin Urbanism Movement inspires us.
Benefits of Paying with Bitcoin
As a special offer, new clients who pay with Bitcoin will receive a 10% reduction on their initial project fees. By paying with Bitcoin, clients will also appreciate not having to divulge ACH information or pay credit card transaction fees. We also hope clients will continue utilizing our Zaprite invoicing option for the remainder of their projects with us, enabling Bitcoin on-chain and Lightning Network transactions.
Learn More
To learn more about our service process and how we can help you create a long-term value architectural asset, we invite you to contact us to share your goals so we can schedule a consultation. Visit our website, www.jonespierce.com, to get started.
Bryan Jones, Principal
About Jones Pierce:
Based in Atlanta, we work closely with our clients throughout and beyond the project to accomplish your goals, a process guided by our ten principles. Following the tenets ensures decisions are made as milestones throughout the process, allowing you to create and improve your asset architecture. We do our best work when designing for YOU, the individual who will own, operate, or live in your custom architecture. @bryan@jonespierce
-
@ 60e759a2:b77e525b
2024-11-29 18:19:00LIFE Life is a journey of race There is no farthermost place it keeps moving pace by pace It is like knoting a handful of shoelace
Life is not all cakes and rainbows There are thorns and adversities it depends on how you move to grow which gives an output of diverse anniversaries
There are times of meekness There are times of weakness these gives us an edge to grow these teaches us to know
Those weak moments are our strength Those strengthened mindset are our weakness it all comes to one solemn output which brings about determination to live
---- Freddie
-
@ 07907690:d4e015f6
2024-11-24 09:38:58Karena orang tuanya yang berasal dari Hongaria telah melarikan diri dari rezim Soviet pascaperang untuk menetap di Amerika Serikat, Nick Szabo menganggap daerah Teluk California pada tahun 1990-an sebagai rumahnya. Di sana, ia termasuk orang pertama yang sering menghadiri pertemuan tatap muka "Cypherpunk" yang diselenggarakan oleh Timothy May, Eric Hughes, dan anggota pendiri kolektif kriptografer, programmer, dan aktivis privasi lainnya yang berpusat di sekitar milis tahun 90-an dengan nama yang sama.
Seperti Cypherpunk lainnya, Szabo khawatir dengan jaminan privasi yang semakin berkurang di era digital yang akan datang dan mengambil tindakan untuk membendung gelombang tersebut semampunya. Misalnya, di milis Cypherpunk, Szabo memimpin penentangan terhadap "Chip Clipper", sebuah chip yang diusulkan untuk disematkan di telepon, yang memungkinkan NSA untuk mendengarkan panggilan telepon. Szabo memiliki bakat khusus untuk menjelaskan risiko pelanggaran privasi tersebut dengan cara yang dapat diterima oleh orang-orang yang tidak memiliki latar belakang teknis, terkadang memberikan ceramah tentang topik tersebut atau bahkan membagikan brosur. (Chip tersebut akhirnya ditolak oleh produsen dan konsumen.)
Namun seperti Cypherpunk yang lebih berorientasi libertarian, minat Szabo dalam privasi digital adalah bagian dari gambaran yang lebih besar — ini bukan hanya tentang privasi saja. Terinspirasi oleh visi Timothy May sebagaimana yang ditetapkan dalam The Crypto Anarchist Manifesto, Szabo melihat potensi untuk menciptakan "Galt's Gulch" di dunia maya: domain tempat individu dapat berdagang dengan bebas, seperti yang dijelaskan oleh novel penulis libertarian Ayn Rand, Atlas Shrugged. Medan gaya pseudo-fisika dari cerita tersebut, May dan Szabo percaya, dapat digantikan dengan keajaiban kriptografi kunci publik yang baru-baru ini ditemukan.
“Jika kita mundur sejenak dan mencermati apa yang ingin dicapai oleh banyak cypherpunk, tema idealis utamanya adalah dunia maya Ghana di mana kekerasan hanya bisa menjadi khayalan, entah itu dalam Mortal Komat [sic] atau 'perang api',” tulis Szabo dalam milis Cypherpunks.
Namun, Szabo juga menyadari bahwa perusahaan bebas membutuhkan lebih dari sekadar enkripsi sebagai lapisan keamanan. Terinspirasi oleh penulis libertarian lainnya — ekonom Friedrich Hayek — ia menemukan bahwa dasar masyarakat manusia, sebagian besar, didasarkan pada komponen dasar, seperti properti dan kontrak, yang biasanya ditegakkan oleh negara. Untuk menciptakan alternatif dunia maya tanpa negara dan tanpa kekerasan, Szabo tahu bahwa komponen dasar ini harus dipindahkan ke ranah daring.
Beginilah cara Szabo, pada pertengahan 1990-an, mengusulkan sesuatu yang mungkin paling dikenalnya saat ini: kontrak pintar. Protokol komputer (yang saat itu masih hipotetis) ini dapat memfasilitasi, memverifikasi, dan menegakkan negosiasi atau pelaksanaan kontrak secara digital, idealnya tanpa memerlukan pihak ketiga mana pun. Seperti yang pernah dikatakan Szabo : "Pihak ketiga yang tepercaya adalah lubang keamanan." Lubang keamanan ini akan menjadi target peretas atau penjahat — serta negara-negara bangsa selama masa ketidakstabilan politik atau penindasan.
Namun kontrak pintar hanyalah sebagian dari teka-teki. Alat kedua yang dibutuhkan Szabo untuk mewujudkan "Galt's Gulch" mungkin bahkan lebih penting. Uang.
Uang Elektronik
Mata uang digital, uang tunai untuk internet, selalu menjadi tujuan utama Cypherpunk. Namun, hanya sedikit yang mendalami pokok bahasan tersebut seperti yang dilakukan Szabo.
Dalam esainya "Shelling Out: The Origins of Money," Szabo menjelaskan bagaimana — seperti yang pertama kali dihipotesiskan oleh ahli biologi evolusi Richard Dawkins — penggunaan uang telah tertanam dalam DNA manusia. Setelah menganalisis masyarakat pra-peradaban, Szabo menemukan bahwa orang-orang di berbagai budaya cenderung mengumpulkan benda-benda langka dan mudah dibawa, sering kali untuk dijadikan perhiasan. Benda-benda inilah yang berfungsi sebagai uang, yang pada gilirannya memungkinkan manusia untuk bekerja sama: "altruisme timbal balik" teori permainan melalui perdagangan, dalam skala besar dan lintas waktu.
Szabo juga sangat tertarik pada perbankan bebas, sebuah pengaturan moneter yang didukung oleh Hayek, di mana bank swasta menerbitkan mata uang mereka sendiri yang tidak terikat pada negara tertentu. Di bawah sistem seperti itu, pasar bebas sepenuhnya bebas menentukan mata uang mana yang akan digunakan. Meskipun merupakan ide baru saat ini (dan bahkan lebih baru lagi pada tahun-tahun sebelum Bitcoin), perbankan bebas merupakan kenyataan di Amerika Serikat pada tahun 1800-an, serta di beberapa negara lain.
Szabo juga melanjutkan untuk menerapkan minatnya dalam praktik dan menjual keahliannya sebagai konsultan perdagangan internet pada pertengahan 1990-an, jauh sebelum kebanyakan orang melihat potensi perdagangan daring. Yang paling menonjol, ia menghabiskan waktu bekerja di perusahaan rintisan DigiCash milik David Chaum, yang berkantor pusat di Amsterdam. Perusahaan Chaum memperkenalkan uang digital pertama yang pernah ada di dunia dalam bentuk eCash: sarana untuk melakukan pembayaran daring yang sama rahasianya dengan uang tunai di dunia nyata.
Namun, di DigiCash pula Szabo mengetahui risiko solusi Chaum. DigiCash adalah perusahaan terpusat, dan Szabo merasa terlalu mudah baginya dan orang lain untuk mengutak-atik saldo orang lain jika mereka mau. Bagaimanapun, pihak tepercaya adalah celah keamanan, dan risiko ini mungkin tidak lebih besar daripada risiko dalam hal uang.
“Masalahnya, singkatnya, adalah bahwa uang kita saat ini bergantung pada kepercayaan pada pihak ketiga untuk menentukan nilainya,” Szabo berpendapat pada tahun 2005. “Seperti yang ditunjukkan oleh banyak episode inflasi dan hiperinflasi selama abad ke-20, ini bukanlah keadaan yang ideal.”
Bahkan, ia menganggap masalah kepercayaan ini sebagai hambatan yang bahkan solusi perbankan bebas pada umumnya bisa mengalaminya: “[P]enerbitan uang kertas swasta, meski memiliki berbagai kelebihan dan kekurangan, juga bergantung pada pihak ketiga yang terpercaya.”
Szabo tahu ia ingin menciptakan bentuk uang baru yang tidak bergantung pada kepercayaan pada pihak ketiga mana pun.
Berdasarkan analisisnya terhadap uang prasejarah, Szabo telah menempuh perjalanan panjang dalam menentukan seperti apa bentuk uang idealnya. Pertama, uang tersebut harus “aman dari kehilangan dan pencurian yang tidak disengaja.” Kedua, nilainya harus “sangat mahal dan tidak dapat dipalsukan, sehingga dianggap berharga.” Dan ketiga: “Nilai ini [harus] diperkirakan secara akurat melalui pengamatan atau pengukuran sederhana.”
Dibandingkan dengan logam mulia seperti emas, Szabo ingin menciptakan sesuatu yang digital dan langka, di mana kelangkaan ini tidak bergantung pada kepercayaan pihak ketiga. Ia ingin menciptakan emas digital.
Logam mulia dan barang koleksi memiliki kelangkaan yang tidak dapat dipalsukan karena mahalnya biaya pembuatannya. Hal ini pernah menghasilkan uang yang nilainya sebagian besar tidak bergantung pada pihak ketiga yang tepercaya. Namun, logam mulia memiliki masalah. […] Jadi, akan sangat bagus jika ada protokol yang memungkinkan bit yang sangat mahal dapat dibuat secara daring dengan ketergantungan minimal pada pihak ketiga yang tepercaya, lalu disimpan, ditransfer, dan diuji dengan aman dengan kepercayaan minimal yang serupa. Bit Gold.
Bit Gold
Szabo pertama kali mencetuskan Bit Gold pada tahun 1998, meskipun ia baru menjelaskannya secara lengkap di depan publik pada tahun 2005. Skema uang digital yang diusulkannya terdiri dari kombinasi berbagai solusi, beberapa di antaranya terinspirasi oleh (atau menyerupai) konsep uang elektronik sebelumnya.
Properti utama pertama Bit Gold adalah proof of work, trik kriptografi yang digunakan oleh Dr. Adam Back dalam "mata uang anti-spam" miliknya, Hashcash. Proof of work merupakan biaya yang tidak dapat dipalsukan yang dicari Szabo, karena memerlukan sumber daya dunia nyata — daya komputasi — untuk menghasilkan bukti-bukti ini.
Sistem pembuktian kerja Bit Gold dimulai dengan "string kandidat": pada dasarnya angka acak. Siapa pun dapat mengambil string ini dan secara matematis menggabungkannya — "hash" — dengan angka acak lain yang baru dibuat. Berdasarkan sifat hashing, hasilnya akan menjadi string angka baru yang tampak acak: hash. Satu-satunya cara untuk mengetahui seperti apa hash ini adalah dengan benar-benar membuatnya — hash tidak dapat dihitung atau diprediksi dengan cara lain.
Triknya, yang juga digunakan dalam Hashcash, adalah bahwa tidak semua hash dianggap valid dalam protokol Bit Gold. Sebaliknya, hash yang valid harus, misalnya, dimulai dengan sejumlah angka nol yang telah ditentukan sebelumnya. Karena sifat hashing yang tidak dapat diprediksi, satu-satunya cara untuk menemukan hash yang valid adalah dengan coba-coba. Oleh karena itu, hash yang valid membuktikan bahwa pembuatnya telah mengeluarkan daya komputasi.
Hash yang valid ini, pada gilirannya, akan menjadi string kandidat Bit Gold berikutnya. Oleh karena itu, sistem Bit Gold akan berkembang menjadi rantai hash proof-of-work, dan akan selalu ada string kandidat berikutnya untuk digunakan.
Siapa pun yang menemukan hash yang valid akan secara harfiah memiliki hash tersebut, mirip dengan bagaimana orang yang menemukan sedikit bijih emas memilikinya. Untuk menetapkan kepemilikan ini secara digital, Bit Gold menggunakan registri kepemilikan digital : blok penyusun lain yang terinspirasi Hayek yang diusulkan oleh Szabo. Dalam registri ini, hash akan ditautkan ke kunci publik dari masing-masing pembuatnya.
Melalui registri kepemilikan digital ini pula, hash dapat ditransfer ke pemilik baru: Pemilik asli secara harfiah akan menandatangani transaksi dengan tanda tangan kriptografi.
Registri kepemilikan akan dikelola oleh "klub properti" Bit Gold. Klub properti ini terdiri dari "anggota klub" (server) yang akan melacak kunci publik mana yang memiliki hash mana. Solusi ini agak mirip dengan solusi basis data replikasi yang diusulkan Wei Dai untuk b-money; baik Szabo maupun Dai tidak hanya aktif di milis Cypherpunks, tetapi juga di milis tertutup yang membahas topik-topik ini.
Namun, alih-alih sistem proof-of-stake milik Dai untuk menjaga agar sistem tetap mutakhir, Szabo mengusulkan "Sistem Kuorum Bizantium." Mirip dengan sistem yang sangat penting bagi keamanan seperti komputer pesawat terbang, jika hanya satu (atau sebagian kecil) dari komputer ini yang tidak berfungsi, sistem secara keseluruhan akan tetap beroperasi dengan baik. Sistem akan bermasalah hanya jika sebagian besar komputer gagal pada saat yang sama. Yang penting, tidak satu pun dari pemeriksaan ini memerlukan pengadilan, hakim, atau polisi, yang didukung oleh monopoli negara atas kekerasan: Semuanya akan bersifat sukarela.
Meskipun sistem ini sendiri tidak sepenuhnya sangat ketat — misalnya Serangan Sybil ("sock puppet problem") — Szabo yakin sistem ini bisa berjalan sendiri. Bahkan dalam skenario di mana mayoritas anggota klub akan mencoba berbuat curang, minoritas yang jujur bisa bercabang ke dalam daftar kepemilikan yang bersaing. Pengguna kemudian dapat memilih daftar kepemilikan mana yang akan digunakan, yang menurut Szabo mungkin adalah yang jujur.
"Jika aturan dilanggar oleh pemilih yang menang, maka pecundang yang benar dapat keluar dari grup dan membentuk grup baru, mewarisi gelar lama," jelasnya. "Pengguna gelar (partai yang mengandalkan) yang ingin mempertahankan gelar yang benar dapat memverifikasi sendiri dengan aman kelompok sempalan mana yang telah mengikuti aturan dengan benar dan beralih ke grup yang benar."
(Sebagai contoh modern, ini mungkin dapat dibandingkan dengan Ethereum Classic, yang memelihara versi buku besar Ethereum asli yang tidak membatalkan kontrak pintar The DAO.)
Inflasi
Masalah berikutnya yang harus dipecahkan Szabo adalah inflasi. Seiring dengan semakin baiknya komputer dari waktu ke waktu, akan semakin mudah untuk menghasilkan hash yang valid. Ini berarti bahwa hash itu sendiri tidak dapat berfungsi sebagai uang dengan baik: hash akan semakin langka setiap tahunnya, sampai pada titik di mana kelimpahan akan melemahkan semua nilai.
Szabo menemukan solusinya. Setelah hash yang valid ditemukan, hash tersebut harus diberi cap waktu, idealnya dengan server cap waktu yang berbeda untuk meminimalkan kepercayaan pada hash tertentu. Cap waktu ini akan memberikan gambaran tentang seberapa sulitnya menghasilkan hash: hash yang lama akan lebih sulit diproduksi daripada hash yang baru. Pasar kemudian akan menentukan berapa nilai hash tertentu relatif terhadap hash lainnya, mungkin menyesuaikan nilainya dengan tanggal ditemukannya. "Hash 2018" yang valid seharusnya bernilai jauh lebih rendah daripada "Hash 2008" yang valid.
Namun solusi ini, tentu saja, menimbulkan masalah baru, Szabo tahu : "bagian-bagian (solusi teka-teki) dari satu periode (mulai dari detik hingga minggu, katakanlah seminggu) ke periode berikutnya tidak dapat dipertukarkan." Kepertukaran — gagasan bahwa setiap unit mata uang sama dengan unit lainnya — sangat penting bagi uang. Seorang pemilik toko ingin menerima pembayaran tanpa harus khawatir tentang tanggal uang tersebut dibuat.
Szabo juga menemukan solusi untuk masalah ini. Ia membayangkan semacam solusi "lapisan kedua" di atas lapisan dasar Bit Gold. Lapisan ini akan terdiri dari sejenis bank, meskipun bank yang dapat diaudit secara aman, karena registri Bit Gold bersifat publik. Bank-bank ini akan mengumpulkan hash yang berbeda dari periode waktu yang berbeda dan, berdasarkan nilai hash ini, menggabungkannya ke dalam paket-paket dengan nilai standar gabungan. "Paket 2018" akan mencakup lebih banyak hash daripada "paket 2008," tetapi kedua paket akan bernilai sama.
Paket-paket ini kemudian harus dipotong-potong menjadi sejumlah unit tertentu. Akhirnya, unit-unit ini dapat diterbitkan oleh "bank" sebagai eCash Chaumian yang bersifat pribadi dan anonim.
“[P]ansa pesaing menerbitkan uang kertas digital yang dapat ditukarkan dengan bit solusi yang nilai pasarnya sama dengan nilai nominal uang kertas (yakni mereka menciptakan kumpulan nilai standar),” jelas Szabo .
Dengan demikian, Bit Gold dirancang sebagai lapisan dasar seperti standar emas untuk sistem perbankan bebas di era digital.
Bitcoin
Pada tahun 2000-an, Szabo melanjutkan pendidikannya dengan meraih gelar sarjana hukum untuk memahami hukum dan realitas kontrak yang ingin ia gantikan atau tiru secara daring dengan lebih baik. Ia juga mulai mengumpulkan dan menerbitkan ide-idenya di sebuah blog yang sangat dihormati, “Unenumerated,” yang membahas berbagai topik mulai dari ilmu komputer hingga hukum dan politik, tetapi juga sejarah dan biologi. “Daftar topik untuk blog ini […] sangat luas dan beragam sehingga tidak dapat disebutkan satu per satu,” Szabo menjelaskan judulnya.
Pada tahun 2008 — 10 tahun setelah pertama kali mengusulkannya secara pribadi — Szabo mengangkat Bit Gold di blognya sekali lagi, hanya saja kali ini ia ingin mewujudkan implementasi pertama usulannya.
“Bit Gold akan sangat diuntungkan dari sebuah demonstrasi, pasar eksperimental (dengan misalnya pihak ketiga yang tepercaya menggantikan keamanan kompleks yang dibutuhkan untuk sistem nyata). Adakah yang mau membantu saya membuat kodenya?” tanyanya di bagian komentar blognya.
Jika ada yang menanggapi, tanggapan itu tidak disampaikan di depan umum. Bit Gold, dalam bentuk yang diusulkan Szabo, tidak pernah dilaksanakan.
Namun, Bit Gold tetap menjadi inspirasi utama bagi Satoshi Nakamoto, yang menerbitkan white paper Bitcoin di akhir tahun yang sama.
“Bitcoin merupakan implementasi dari proposal b-money Wei Dai [...] di Cypherpunks [...] pada tahun 1998 dan proposal Bitgold milik Nick Szabo,” tulis penemu Bitcoin dengan nama samaran di forum Bitcointalk pada tahun 2010.
Memang, tidak sulit untuk melihat Bit Gold sebagai rancangan awal Bitcoin. Selain dari basis data bersama catatan kepemilikan berdasarkan kriptografi kunci publik, rangkaian hash bukti kerja memiliki kemiripan yang aneh dengan blockchain Bitcoin . Dan, tentu saja, nama Bit Gold dan Bitcoin juga tidak terlalu jauh.
Namun, tidak seperti sistem seperti Hashcash dan b-money, Bit Gold jelas tidak ada dalam white paper Bitcoin. Beberapa orang bahkan menganggap ketidakhadiran ini begitu penting sehingga mereka menganggapnya sebagai salah satu dari beberapa petunjuk bahwa Szabo pastilah orang di balik julukan Satoshi Nakamoto: Siapa lagi yang akan mencoba menyembunyikan asal-usul Bitcoin seperti ini?
Meski demikian, meski mirip dengan Bit Gold dalam beberapa hal, Bitcoin memang menyertakan beberapa perbaikan atas desain Szabo. Secara khusus, di mana Bit Gold masih bergantung pada pihak tepercaya sampai batas tertentu — server dan layanan stempel waktu harus dipercaya sampai batas tertentu untuk tidak berkolusi — Bitcoin adalah sistem pertama yang memecahkan masalah ini sepenuhnya. Bitcoin memecahkannya dengan sangat elegan, dengan memiliki sistem bukti kerja yang diperlukan yang berfungsi sebagai sistem penghargaan dan mekanisme konsensus dalam satu sistem: Rantai hash dengan bukti kerja terbanyak dianggap sebagai versi sejarah yang valid.
“Nakamoto memperbaiki kekurangan keamanan signifikan yang ada pada desain saya,” Szabo mengakui pada tahun 2011, “yakni dengan mensyaratkan bukti kerja untuk menjadi simpul dalam sistem peer-to-peer yang tangguh terhadap Byzantine untuk mengurangi ancaman pihak yang tidak dapat dipercaya yang mengendalikan mayoritas simpul dan dengan demikian merusak sejumlah fitur keamanan penting.”
Lebih jauh, Bitcoin memiliki model moneter yang sangat berbeda dari yang diusulkan Szabo, dengan jadwal inflasi tetap yang sama sekali tidak terpengaruh oleh peningkatan daya hash. Seiring meningkatnya daya komputasi pada jaringan Bitcoin, itu artinya semakin sulit menemukan koin baru.
“Alih-alih pasar otomatis saya memperhitungkan fakta bahwa tingkat kesulitan teka-teki sering kali dapat berubah secara radikal berdasarkan peningkatan perangkat keras dan terobosan kriptografi (yaitu menemukan algoritma yang dapat memecahkan bukti kerja lebih cepat), dan ketidakpastian permintaan, Nakamoto merancang algoritma yang disetujui Bizantium yang menyesuaikan tingkat kesulitan teka-teki,” jelas Szabo.
“Saya tidak dapat memutuskan apakah aspek Bitcoin ini lebih banyak fitur atau lebih banyak bug,” tambahnya, “tetapi ini membuatnya lebih sederhana.”
Sumber artikel: bitcoinmagazine.com
Diterjemahkan oleh: Abeng -
@ d7c6d014:a6abb6b8
2024-11-23 18:40:47こんにちは!kohei です。
久々のエントリ投下ですが、今回は先日弊 TL で話題になっていた、Android を P2P のローカルリレーサーバー化して Tor で公開する方法を紹介していこうと思います。
用意するもの
- Android 端末
- Orbot
- Citrine
- Amethyst
前提と下準備
今回は、Orbot の詳細設定は省いて、Power User Mode の設定が完了している前提でお話を進めます。 Android 端末を用意して、2~4 のアプリをインストールしておいてください。
設定方法
それでは早速設定していきましょう。 まず、Citrine を起動して、Settings のタブからローカルリレーの詳細を設定します。
設定が終了したら、ローカルリレーを起動します。
また、ここで表示されるポート番号をメモしてください。
次に、More のタブに移り、Hosted Onion Services へアクセスし、Service Type の項目で User Services にチェックを入れて、右下の + マークをタップすると以下のポップアップが表示されます。(Orbot がスクショを許してくれないので一部画像割愛)
表示されたら、Name に任意の名前を、Local Port と Onion Port に先ほどメモした Citrine のポート番号を入力します。
入力したら再起動を求められるので再起動してください。 再起動後に Hosted Onion Services の項目に .onion のアドレスが表示されたら成功です (何故か私の環境では、一回の再起動では設定が反映されなかったのですが、もし同じような現象が起きた場合は、再起動 -> Connect -> .onion アドレスが発行されてるかの確認、を数回試すと発行されるはずです)
発行されたら、.onion アドレスをタップしてクリップボードにコピーします。
次に、Amethyst を起動して、リレーの設定画面に入り、Outbox の設定にコピーした .onion アドレスを貼り付けて保存します。
後は、Amethyst 側で Orbot のポート番号を設定して Orbot に接続すれば BOOM! 設定完了です。
お疲れ様でした!
素敵な Nostr ライフを!
-
@ 0c469779:4b21d8b0
2024-11-23 17:10:04Todo que celebrar
- No recuerdo exactamente cómo me empezo a interesar el tema, el punto es que vi un lavado de cabeza inmenso que se hace a cada paisano en los países hispanoamericanos.
- Inclusive Residente tiene una canción llamada Latinoamérica, donde habla de todo lo que se robaron los españoles.
- La leyenda negra nos dice que España fue lo peor que le pudo pasar a la región.
-
La primera mentira es pensar que antes de España había paz: Los distintos imperios americanos esclavizaban a las poblaciones adyacentes. Los aztecas esclavizaban a las tribus mexicas, fue gracias a Hernán Cortés, quien consiguió la organización de estas tribus, que se pudo derrocar a Moctezuma y a los aztecas. Piénsese en eso, Hernán Cortés tenía un ejército de aproximadamente 550 soldados (siendo generosos), y por cada español había de 10 a 15 indígenas, principalmente de Tlaxcala, pero también de Huexotzinco, Cholula y Tepeyac. Los aztecas eran 200000. Una vez caído Tenochitlán, otra parte de la leyenda negra dice que España exterminó a los indígenas, lo cual es falso. Hernán Cortés cuidó de sus descendientes e incluso tuvo un hijo con una de las hijas de Moctezuma.
-
España fue el primer imperio que promulga una serie de leyes que humanizan al indígena. Recordemos siempre ponernos en el contexto histórico. El 27 de diciembre de 1512 se promulgan las leyes de Burgos, 35 ordenanzas que buscan proteger y humanizar al indígena americano.
Algunos principios de las Leyes de Burgos son: 1. Los indigenas eran hombres libres y dueños de sus tierras y casas. 2. Los Reyes Católicos eran señores de los indígenas por su compromiso evangelizador. 3. Los encomenderos debían examinar a los indígneas cada quincena para comprobar lo que habían aprendido. 4. Cada indio debia recibir un peso de oro al año para comprar ropa.
Además recordemos lo que dijo Isabel la Católica sobre los indígenas. En su lecho escribió:
No consientan ni den lugar que los indios reciban agravio alguno en sus personas y sus bienes, mas manden que sean bien y justamente tratados.
En 1542 el emperador Carlos V promulga Las Leyes Nuevas de Indias, para reformar el gobierno de las Indias y protoger a los indígenas.
Entre las principales características de las Leyes Nuevas de Indias se encuentran: 1. La supresión de la Institución de la Encomienda 2. La designación del virrey como protector de los indios 3. El respeto a las autoridades, costumbres y formas de vida indígenas 4. La prohibición de que los indigenas sostuvieran relaciones mercantiles con sus vecinos 5. La orden a los españoles que empleasen indios de impartir evangelización, darles buen trato, alimentos, vestido, casa, medico y sacerdote, y pagarles su trabajo en efectivo.
Es curioso resaltar que Las Leyes Nuevas de Indias fueron promovidas por Fray Bartalome de las Casas, quien hubiera mentido en algunos articulos suyos anteriores donde exageraba e inventaba malos tratos a indígenas. Estos artículos falsos fueron y son usados hasta el dia de hoy por la leyenda negra, en los principales libros de historia de las escuelas y colegios hispanoamericanos.
-
Los makás son una tribu indígena del nordeste argentino, quienes fueron desplazados a Paraguay y habitan actualmente zonas de Mariano Roque Alonso, cerca de la capital, Asunción. Quién trata mejor a los indígenas, el Paraguay o Argentina de hoy o el Imperio de ayer?
-
Durante el Imperio, el Virreinato del Rio de la Plata tuvo asentamientos de indígenas guaranies provomidos por los padres de la compañía de Jesús en las tierras conquistadas por España y Portugal. Ellos buscaban crear una sociedad con los beneficios de la sociedad cristiana, pero sin sus vicios. Enseñaban a los indígenas a leer, escribir, aritmética básica, técnicas de agricultura, construcción y artesanía. También aprendieron la lengua de los indígenas (gracias a esto tenemos el guaraní y otras lenguas en escrito, eran puramente orales), lo que facilitaba el trabajo del misionero. Cuando el Rey Carlos III expulsa a los Jesuitas de sus dominios en 1767, efectivizandose en Paraguay en 1768, supuso una gran pérdida para los pueblos originarios, principalmente por la protección, ya que los jesuitas protegían a los indígenas de los bandeirantes, grupos que eran contratados para cazar indígenas y esclavizarlos, o destruir quilombos (asentamientos de esclavos que se liberaban de la esclavitud). Los bandeirantes eran provenientes de zonas del interior de Brasil, y se les puede atribuir la expansión de Brasil más allá de los limites impuestos por el Tratado de Tordesillas.
-
Los movimientos independentistas hispanoamericanos eran auspiciados por fuerzas extranjeras. Las fuerzas de San Martín que cruzaron los Andes por Mendoza contaban con más de 5400 hombres, y se sabe que muchos eran de otras nacionalades. San Martín siempre tuvo afinidad por Inglaterra, pasó en Europa el resto de sus días luego de ser amenazado por el gobierno unitario. También se sabe que fue masón, lo que no se sabe es si conocía el Plan Maitland.
El Plan Maitland fue un proyecto desarrollado en 1800 por Thomas Maitland, originalmente titulado "Plan para capturar Buenos Aires y Chile, y luego emancipar Perú y Quito". Se concluyó que sería mendiante una expedición que cruzaría los Andes y atacaría desde el oeste, es decir, desde Chile, y luego avanzaria hacia el Perú. La estrategia era golpear el corazón del virreinato peruano, que era el bastión del poder en América del Sur.
Si San Martin conocía o no el Plan Maitland no se sabe. San Martin estuvo en Londres en 1811, donde se le pudo haber introducido el plan por miembros de la logia masónica Lautaro, fundada por Francisco de Miranda (secesionista hispanoamericano, primer presidente de Venezuela).
- Los antiguos súbditos no se sentían oprimidos por España. Los sentimientos de nación son inventos que ocurren luego de las independencias. Anteriormente todos eran españoles, católicos y súbditos del Rey. En Paraguay está la concepción errónea de que ganamos la independencia en 1811. Cuando lo que se hace en 1811 es cambiar el gobierno a la fuerza para asegurar la autonomía de la provincia del Paraguay, porque se pensaba que Bernardo de Velasco (gobernador de la provincia) quería entregarla al dominio portugués. En 1811 se sigue jurando lealtad al Rey. Además, recordemos quién fue Fulgencio Yegros. Alférez del ejército español, uno de los pocos militares de carrera. En 1801 integro la expedición al norte de Paraguay a reconquistar Coimbra de manos de los portugueses. En 1806, paritcipó en la defensa de Buenos Aires durante las invasiones inglesas. Ahi conoció a Fernando de la Mora, con quien formó amistad.
Principalmente la defensa de Buenos Aires solo se puede explicar si nos damos cuenta de que no existe tal cosa como nacionalidad paraguaya o argentina. Todos eramos espanoles. Hay muchos casos similares al de Fulgencio Yegros por toda la America Espanola.
-
Fulgencio Yegros fue ejecutado tras querer derrocar a Jose Gaspar Rodriguez de Francia, quien se declarara dictador supremo de la República del Paraguay, destacando la independencia por primera vez. En mi opinión uno de los grandes errores de Paraguay fue no haberse unido a las Provincias Unidas del Río de la Plata, eran tiempos tumultuosos y de levantamientos constantes.
-
El término latinoamericano no existió hasta luego de la independencia de Nueva España y la formación del Imperio Mexicano en un contexto de invasión de Francia a esas tierras.
-
Cómo se explica la riqueza que hubo en Cuba y Puerto Rico, quienes siguieron siendo provincias españolas hasta 1898, finalizada la guerra que empezó con una falsa bandera implantada por los Estados Unidos? Además, la población es altamente mestiza. Cuando España pierde la guerra, también entrega la posesión de las Islas Filipinas (en honor al Rey Felipe II) a los Estados Unidos. Los filipinos mantenían su idioma reigional y hablaban español. La moneda es el peso filipino hasta el día de hoy. Hoy en el tagalog y chabacano hay muchas similitudes con el castellano. Cuando Estados Unidos controla las islas, prohíbe la enseñanza del español, y forza la enseñanza del inglés. Actualmente muchos filipinos tienen apellidos de origen español y hablan inglés.
-
España formó las primeras universidades en América y tenía la biblioteca más grande de todo el continente en Perú.
-
Creo que es importante que sepamos la verdadera historia para entender mejor nuestro pasado. Creo que hay más cosas que nos unen que las que nos separan, creo que Nayib Bukele en la actualidad es capaz de reunificar Centroamérica y darle más peso a su reclamo conociendo la historia, aparte de las razones prácticas del día de hoy. Creo que la República del Paraguay no debería existir y deberíamos integrarnos a las Provincias Unidas del Río de la Plata (Argentina). Creo que debemos entender que fuimos victimas del divide et impera, y tenemos que formar una gran mancomunidad de naciones hispanas (como la Commonwealth) y tener objetivos que se adapten a lo que requerimos hoy: avances tecnológicos, investigación en todos los campos y un proyecto espacial en común.
-
Es extremadamente ridículo que seamos más de 19 países en un mismo continente, todos hablando el mismo idioma y teniendo la misma religión, separados y desinteresados de lo que le pase al otro.
-
Tenemos que apoyar los reclamos de nuestros hermanos: Los argentinos con las Islas Malvinas, los cubanos con Guantanamo, los españoles con Gibraltar y los venezonalos con el Esequibo.
-
Algo interesante que dijo el filósofo y médico Erasmus Darwin, abuelo del gran evolucionista Charles Darwin:
En mis viajes por el inabarcable imperio español, he quedado admirado de como los españoles tratan a los indios: como a semejantes, incluso formando familias mestizas y creando para ellas hospitales y universidades. He conocido alcaldes y obispos indígenas, y hasta militares, lo que redunda en la paz social, bienestar y felicidad general, que ya quisiéramos nosotros [los británicos] en los territorios que con tanto esfuerzo les vamos arrebatando. Parece que las nieblas londinenses nos nublan el corazón y el entendimiento, mientras que la calidad de la soleada España le hace ver y oír mejor a Dios. Sus señorías en Inglaterra deberían considerar la [falsamente imputada] política de despoblación y exterminio de España. Ya que a todas luces la fe y la inteligencia española están construyendo, no como nosotros un imperio de muerte, sino una sociedad civilizada que finalmente terminará por imponerse como por mandato divino. España es la sabia Grecia, la imperial Roma; Inglaterra el corsario turco».
Fuentes interesantes
- https://www.ellitoral.com.ar/corrientes/2022-8-14-1-0-0-desmitificando-a-san-martin-y-sus-relaciones-con-los-ingleses
- Imperiofobia y leyenda negra: Roma, Rusia, Estados Unidos y el Imperio Español de María Elvira Roca Barea
- Madre patria: Desmontando la leyenda negra desde Bartolomé de las Casas hasta el separatismo catalán
- Historia con Patricio Lons
- La Brújula
-
@ 599f67f7:21fb3ea9
2024-11-23 11:13:57En los dos capítulos anteriores aprendimos cómo dos pares pueden enviar fondos entre sí en un canal actualizando el estado e invalidando estados antiguos. En este capítulo, daremos una visión general de cómo los HTLC permiten pagos de múltiples saltos. El próximo capítulo será una inmersión profunda en los HTLC.
¡Vamos a ello con un ejemplo simple!
Red simple de 3 nodos y 2 saltos
En esta red simple, tenemos tres nodos: Alice, Bob y Charlie. Hay dos canales entre ellos: uno entre Alice y Bob y otro entre Bob y Charlie. Cada canal tiene una capacidad de 10 BTC distribuida equitativamente entre los participantes.
Para simplificar, solo mostramos una transacción de compromiso que gasta de la transacción de financiación, determinando así el estado del canal. Esto no es exactamente preciso, ya que aprendimos sobre compromisos asimétricos en el último capítulo, pero para los propósitos de entender los HTLC, esta simplificación será más fácil. Una descripción más precisa se dará en un capítulo posterior.
Ahora, supongamos que Alice quiere pagar a Charlie. No puede pagarle directamente ya que no tienen un canal entre ellos y es costoso (en términos de tiempo y dinero) abrir un canal solo para una transacción rápida. En su lugar, Alice puede usar su canal con Bob para enrutar un pago a Charlie, ya que Bob y Charlie comparten un canal.
Paso 1: Generar y compartir un hash de pre-imagen
Alice primero necesita decirle a Charlie que quiere pagarle. Charlie generará un secreto aleatorio (la pre-imagen)
S
y obtendrá el hash deS
, que llamaremosH
. Charlie envíaH
a Alice.Paso 2: Configurar la cadena de HTLC
Supongamos que Alice quiere pagar a Charlie 1 BTC. Primero necesita encontrar una ruta hacia Charlie. En este caso es A-B-C. También ve que para usar esta ruta, necesita incentivar a Bob para que la ayude dándole una tarifa de enrutamiento. Supongamos que Bob cobra una tarifa fija de 1 BTC por enrutar pagos, por lo que Alice pagará un total de 2 BTC: 1 BTC por el enrutamiento y 1 BTC por Charlie. Alice luego le indica a Bob que le gustaría enrutar un pago sugiriendo que actualicen su estado de canal. En este ejemplo simplificado, la transacción de compromiso del canal tendrá las siguientes salidas (recuerda que en realidad Alice y Bob tendrán sus propias transacciones de compromiso):
- Una salida de 3 BTC de vuelta a Alice.
- Una salida de 5 BTC a Bob.
- Una salida de 2 BTC a un script especial que tiene 2 posibles caminos de gasto:
- El primer camino puede ser gastado por Bob si tiene la pre-imagen de
H
- El segundo camino puede ser gastado por Alice después de un tiempo absoluto
cltv_expiry_AB
- El primer camino puede ser gastado por Bob si tiene la pre-imagen de
Esta última salida con un script especial que bloquea los 2 BTC se llama un Contrato de Bloqueo de Hash y de Tiempo (Hash Time Locked Contract; HTLC) porque tiene un camino bloqueado por hash y un camino bloqueado por tiempo.
Bob actualizará felizmente a este nuevo estado de canal porque puede ver que no está perdiendo dinero: si la transacción se lleva a cabo en la cadena y aún no tiene la pre-imagen, entonces aún recupera sus fondos originales. También puede ver que si coopera y reenvía el pago, será recompensado con una tarifa de enrutamiento si el pago tiene éxito porque podrá reclamar la salida bloqueada por hash en la transacción.
Bob ahora bloquea algunos fondos de manera similar en su canal con Charlie. Actualiza la transacción de compromiso del canal para incluir las siguientes salidas:
- Una salida de 4 BTC a Bob
- Una salida de 5 BTC a Charlie
- Una salida de 1 BTC a un script HTLC que nuevamente tiene dos caminos de gasto:
- El primer camino es gastable por Charlie si puede revelar la pre-imagen de
H
- El segundo camino es gastable por Bob después de un
cltv_expiry_BC
- El primer camino es gastable por Charlie si puede revelar la pre-imagen de
Bob puede bloquear sus fondos de esta manera con confianza porque sabe que si el pago falla, podrá reclamar sus fondos a través del camino bloqueado por tiempo y si el pago tiene éxito y Charlie revela la pre-imagen cuando gasta a través del camino bloqueado por hash, entonces Bob verá esta pre-imagen y podrá reclamar la salida bloqueada por hash en el HTLC de la transacción de compromiso que tiene con Alice.
Cuando Charlie recibe esta oferta de HTLC de Bob, puede ver que de hecho conoce la pre-imagen
S
que se hash aH
, por lo que sabe que puede reclamar el camino bloqueado por hash de la salida HTLC de la transacción de compromiso si se lleva a cabo en la cadena. Sin embargo, idealmente, las cosas no tienen que resolverse en la cadena. En su lugar, Charlie simplemente envía la pre-imagenS
a Bob. Esto le prueba a Bob que Charlie reclamaría la salida HTLC si se llevara a cabo en la cadena y así ahora Bob y Charlie pueden acordar simplemente actualizar su transacción de compromiso para reflejar que Charlie ahora tiene 1 BTC más:Ahora que Bob tiene la pre-imagen
S
, puede dar la vuelta y revelarS
a Alice, probando que si su transacción de compromiso se lleva a cabo en la cadena, Bob reclamaría la salida bloqueada por hash. Así como Bob y Charlie hicieron en su canal, Alice y Bob actualizan su transacción de compromiso eliminando la salida HTLC para reflejar el nuevo saldo de fondos:Alice envió a Charlie 1 BTC y Bob ganó 1 BTC en tarifas de enrutamiento.
cltv_expiry
¿Qué pasa si las cosas salen mal? Por ejemplo, Charlie se desconecta y no responde a Bob con una pre-imagen. Si esto sucede, Bob necesitará transmitir la transacción de compromiso para que pueda reclamar sus fondos a través del camino bloqueado por tiempo del HTLC. Si transmite la transacción pero luego Charlie vuelve a estar en línea antes del
cltv_expiry_BC
y gasta a través del camino bloqueado por hash del HTLC, entonces Bob verá la pre-imagen en la cadena y podrá dar la vuelta a Alice y revelarle la pre-imagen como de costumbre.A partir de este ejemplo, puedes ver que es importante que los valores de
cltv_expiry
disminuyan a lo largo del camino del remitente al receptor. Esto se debe a que en el peor de los casos, Charlie solo revelaS
a Bob justo antes decltv_expiry_BC
y luego Bob aún necesita tiempo para ir a Alice y revelarS
antes de que ella pueda gastar a lo largo del caminocltv_expiry_AB
. En otras palabras,cltv_expiry_BC
debe ser antes decltv_expiry_AB
.Revisión
- Contrato de Bloqueo de Hash y de Tiempo (Hash Time Locked Contract; HTLC): Un script de salida especial en la transacción de compromiso que tiene un camino bloqueado por hash y un camino bloqueado por tiempo
- Pre-imagen: un secreto aleatorio utilizado para reclamar pagos
- Hash (de la pre-imagen): el hash de la preimagen utilizada para bloquear fondos a lo largo de una ruta de pago
- Verificación de tiempo de bloqueo (Check Locktime Verify; CLTV): El bloqueo de tiempo absoluto utilizado en los HTLC que debe disminuir a lo largo de la ruta de pago del remitente al receptor
Referencias
- BOLT2: Peer Protocol
- BOLT3: Transactions
- LN Things Part 4: HTLC Overview por nostr:nprofile1qqswrt9pnxatlplu49h6meld8svmwqt87wwvk256rqk07n6eu4qeh5gpz3mhxue69uhhyetvv9ujuerpd46hxtnfduqs6amnwvaz7tmwdaejumr0dszpfjtz
- Time locks
-
@ 599f67f7:21fb3ea9
2024-11-22 14:07:44Veamos nuevamente la transacción de compromiso de Alice. Esta gasta de la transacción de financiación y tiene dos salidas: una salida
to_local
y una salidato_remote
.to_remote
La salida
to_remote
es simplemente un P2WPKH enviando a la clave pública de Bob.<remotepubkey>
to_local
La salida
to_local
tiene 2 caminos de gasto.- Una
<revocationpubkey>
- Una clave pública que pertenece a Alice pero que solo se puede gastar después del número de bloques
to_self_delay
.
OP_IF # Transacción de penalización <revocationpubkey> OP_ELSE `to_self_delay` OP_CHECKSEQUENCEVERIFY OP_DROP <local_delayedpubkey> OP_ENDIF OP_CHECKSIG
En el Capítulo 2, describimos la revocación de la siguiente manera:
- Alice genera una clave privada temporal
dA1
y una clave pública correspondientePA1
y envía la clave pública a Bob. - Alice luego crea una transacción de compromiso donde la salida
to_local
es inmediatamente gastable por Bob si tiene la clave privadadA1
. - Si Alice y Bob actualizan el estado de su canal, entonces intercambiarán las claves privadas anteriores entre sí para invalidar el compromiso anterior, es decir, Alice enviará a Bob
dA1
.
Esta descripción es mayormente correcta pero no completa. Si echamos un vistazo nuevamente al script
to_self_delay
anterior, parece que el camino de revocación no tiene ninguna condición que diga que solo Bob puede gastarlo. Simplemente parece que cualquiera con la clave privada correspondiente a la clave pública de revocación puede gastarlo. Dado que Alice es quien generó la clave privada temporal en primer lugar, ¿no significa eso que también puede gastarlo?Se utiliza un truco ingenioso para asegurarse de que solo Bob pueda gastar a través del camino de revocación. Antes de construir las transacciones de compromiso, tanto Alice como Bob derivan dos claves temporales y claves públicas asociadas.
1. Un par de clavesrevocation_basepoint
(r -> R)
2. Un par de clavesper_commitment_point
(c -> C)En otras palabras, Alice tendrá:
- su par de clavesrevocation_basepoint
:rA1
->RA1
- su par de clavesper_commitment_point
:cA1
->CA1
Bob tendrá:
- su par de clavesrevocation_basepoint
:rB1
->RB1
- su par de clavesper_commitment_point
:cB1
->CB1
Ahora, cuando sea el momento de que Alice construya la transacción de compromiso, enviará a Bob su clave pública del punto de compromiso
CA1
. Bob le enviará su clave pública del punto base de revocaciónRB1
. Alice ahora puede derivar la clave pública de revocación que se incluirá en la transacción de compromiso de la siguiente manera:Rev_A1 = R_B1 * sha256( R_B1 || C_A1 ) + C_A1 * sha256( C_A1 || R_B1 )
Ahora la salida
to_local
de Alice se ve así:OP_IF <Rev_A1> OP_ELSE `to_self_delay` OP_CHECKSEQUENCEVERIFY OP_DROP <alice_delayedpubkey> OP_ENDIF OP_CHECKSIG
Cuando sea el momento de que Alice y Bob actualicen el estado e invaliden el estado antiguo, Alice envía a Bob su clave privada para el punto de compromiso
cA1
. Con esta clave, Bob ahora tiene tanto la clave privada del punto de compromiso de AlicecA1
como su propia clave privada del punto base de revocaciónrB1
, que corresponde a la clave públicaRB1
que le envió a Alice anteriormente cuando Alice estaba construyendo la transacción de compromiso. Así que ahora, con estas dos piezas de información, Bob puede derivar la clave privada correspondiente a la clave públicaRev_A1
y, por lo tanto, gastar a través de la salida de revocación. Puede calcular la clave privada de la siguiente manera:rev_A1 = r_B1 * sha256( R_B1 || C_A1 ) + c_A1 * sha256( C_A1 || R_B1 )
Alice nunca podrá derivar esta clave privada porque no tiene y nunca tendrá la clave privada del punto base de revocación de Bob
rB1
.Ahora actualicemos los diagramas del Capítulo 2 para reflejar las nuevas cosas que hemos aprendido en este capítulo.
Estado 1:
Estado 2:
Revisión
- Dos pares de claves se generan al construir las transacciones de compromiso
- Se necesitan las claves privadas de ambos pares de claves para poder gastar desde el camino de revocación
Referencias
- BOLT3: Derivación de
revocationpubkey
- LN Things Part 3: Revocation in more detail por nostr:nprofile1qqswrt9pnxatlplu49h6meld8svmwqt87wwvk256rqk07n6eu4qeh5gpz3mhxue69uhhyetvv9ujuerpd46hxtnfduqs6amnwvaz7tmwdaejumr0dszpfjtz
- Una
-
@ 32092ec1:8e9fd13a
2024-11-22 13:14:39As one does when spending the vast majority of their social media time on Nostr, I find myself wondering, why are so many bitcoiners, in particular, not taking Nostr more seriously; what are they missing here? Are they just algo and attention whores who can’t stomach coming to a new platform and being held accountable for posting valuable content? Are they really thinking that by posting on twitter that they are “onboarding the normies”? Were they scared off because the tech wasn’t good in the really early days of Nostr?
It's funny because I also, obviously, think a lot about certain groups of people who also refuse to get into bitcoin in any kind of serious way. Like why isn’t every single libertarian a hard core bitcoiner? How are the gold bugs not getting the value prop that bitcoin is offering? It’s the most powerful weapon that we have ever had to combat war, excessive government spending, money printing, inflation and central banking. I’ve also been listening to some of the people who you would think would be into bitcoin, but somehow only believe in Monero…? hard core Monero maxis? Really?
In a recent interview with Natalie Brunell, Michael Saylor was asked about bitcoin as a store of value asset vs a currency:
“Currency not worth that much… If I said to the richest guy in the world… ‘Hey I have this little token and you can use it to buy coffee, and you don’t have to pay 2% to Visa, you can pay one Satoshi; how much of it do you want to buy?’ ‘Well, I guess I could buy 0.00001% of my wealth…’”
Another good point here by Saylor that helped me connect a couple more dots here.
If bitcoin were not scarce, if it did not comply with Austrian Economic principles, would it be actively taking over the world right now? Would it have grown past its silk road phase of adoption? I’ll speak for myself here, but I know that this is also true for the vast majority of bitcoiners, I came to bitcoin for the Number go Up (NgU) but became passionate about bitcoin for its Freedom go Up (FgU) technology. I was never a Silk Road user and I would have almost certainty stayed within my early conception of bitcoin, which was to equate it to World of Warcraft gold, if I didn’t watch it melt faces as a store of value asset.
But the fact remains that bitcoin is freedom tech. Bitcoin has the potential to increase freedom and sovereignty in a massive way. Will everyone on earth have a UTXO? Probably not. But in the current financial system how many sovereigns are there really? 1? 5? 10? The fact that you have to have defenses strong enough to protect your physical assets (buildings, gold, infrastructure, etc.) in order to protect your wealth, means that only those with the largest militaries in the world can withstand the kinds of attacks that I can easily withstand with a $150 air gapped signing device. Bitcoin is minting sovereigns by the thousands, millions perhaps. But is this why bitcoin adoption is on the rise?
The user experience on Nostr is improving at a rate that has never been seen in any new ecosystem on the internet. I believe that by being open source and interoperable, Nostr tech will win out over centralized platforms. Not just in social media, but in so many other internet applications as well. “Sign in with Nostr” will be the default someday and you will no longer need to sign up for an account for literally every single app in your pocket. You will never again be asked rebuild your contact list or your follower list in order to stay in touch with your friends and family. We are definitely still early to bitcoin, but we are much, much earlier to Nostr.
But the point remains that Nostr is freedom tech. The decentralized nature of relays means that even if I am being censored by one relay, I will always have access to another relay that will not censor me, and I will never again be in a situation where my freedom to speak will be threatened in a serious way. My freedom to hear other points of view, other opinions, contrarian science, foreign concepts, perspectives from other cultures, will never again be taken away. But is this why Nostr will win?
So back to my original question, what gives? Why are more people not coming into bitcoin or Nostr strictly for the freedom tech? I believe the answer is related to censorship. As much as we all know the level to which we can be censored, how many individuals are actively being censored in a major way right now?
When, by governmental decree, the Canadian truckers went from normal law-abiding citizens to being labeled terrorists who needed to be closed off from transacting using the banking system, bitcoin was one of the few escape valves. But if we are being honest, there were a lot of crypto projects that would have offered the same escape valve, including Monero, where they may not have been in a situation where on-chain surveillance companies could be used to track people down. Also, I would have to imagine that cash, as in paper notes and coins, were probably the most widely used way to transact when they were shut off from their bank accounts.
When Twitter kicked Donald Trump, the sitting president of the United States, off of their platform, what were his options? If Nostr existed in its current form, maybe he would have built his own Truth Social Nostr client… it certainly would have cost less to spin up and would have allowed him to start with a bigger user base. But that was literally one person who was censored. How many YouTube channels have been censored? thousands, millions? How many of them had a bad enough experience to leave their subscribers behind? And how many YouTube channels were not censored?
Censorship has been on the rise in a major way over the last several decades. And while some are finally getting the picture that moving to another centralized platform that can also censor them maybe isn’t the best solution, this isn’t happening in a major way to the masses. But censorship can, and it very well may, start happening in a much more significant way in the future… possibly even the near future.
So, if Michael Saylor asks his billionaire buddies how much they would pay to transact freely when they are actively being censored financially, I bet they would answer that question about freedom money a lot differently. And if big tech platforms start censoring their users by the tens or hundreds of millions, I bet that even the normies would see the value of Nostr and the ability to communicate freely.
The good news though, is that I believe we may be moving into a world that is pushing back against the censorship industrial complex. Maybe in 10 years, money and media will be less censored, not more. If that is the case, currency would remain a terrible investment and twitter would remain a public square. But the fact is, that bitcoin and Nostr will both still win in that environment because of their other characteristics. Bitcoin offers inviolable absolute scarcity, something that asset holders have never had access to in the history of humankind. The open-source internet technology that allows social graphs to travel with its users (Nostr) will win because the tech is better, and the user experience is better than its centralized competitors.
Bitcoin and Nostr are freedom tech and they will almost certainly be a major factor in improving freedom around the world. But I believe that they will win because of their better user experience. Bitcoin offers a store of value that no one can violate. Nostr allows builders to capitalize on the advancements of every other builder in the space, meaning that if an open-source feature is rolled out on one client, all the clients will magically have access to that feature.
We’re gonna win freaks. Stay humble, stack sats and zap notes.
871493
-
@ 599f67f7:21fb3ea9
2024-11-22 10:26:18En el capítulo anterior, aprendimos cómo Alice y Bob abrieron un canal, utilizando transacciones de compromiso que pueden publicarse en la blockchain en cualquier momento para recuperar sus fondos. Pero, por supuesto, las transacciones de compromiso iniciales se vuelven inválidas tan pronto como cambia el estado del canal, en otras palabras, cuando se realiza un pago y el saldo del canal se distribuye de manera diferente entre los participantes del canal. En este capítulo, comenzaremos a aprender cómo Alice y Bob pueden acordar una nueva división de fondos, es decir, cómo dividir el saldo del canal de manera diferente e invalidar las transacciones de compromiso más antiguas que tienen.
💡 Cubriremos cómo funciona esto bajo el paradigma actual de cómo se actualizan los canales, llamado "LN-Penalty", nombrado así por el mecanismo de penalización utilizado para asegurar los fondos contra adversarios maliciosos. Hay una propuesta más nueva llamada "LN-Symmetry" (anteriormente eltoo) que no requiere el mecanismo de penalización para ser segura y simplifica este proceso, pero requiere modificaciones a las reglas de consenso de Bitcoin para funcionar.
Transacciones de compromiso asimétrico
En LN-Penalty, cada participante en un canal tiene una transacción de compromiso que representa el estado del canal. Las transacciones de compromiso que posee cada parte varían ligeramente. La razón de esto es asignar culpa. ¿Por qué es necesario asignar culpa? Porque necesitamos dejar claro qué parte transmitió su transacción de compromiso e identificar a la parte correcta para castigar si han publicado un estado inválido.
Configuración del estado
En el último capítulo, mostramos cómo Alice y Bob intercambiaron sus claves públicas para crear sus transacciones de compromiso iniciales. Echemos un vistazo más de cerca a cómo lucen estas transacciones de compromiso. Para simplificar, supongamos que el saldo total del canal es de 10 BTC y que Alice y Bob tienen cada uno 5 BTC en sus lados del canal. Para configurar sus transacciones de compromiso iniciales, cada parte primero crea una clave privada temporal, para Alice, llamémosla
dA1
, para Bob,dB1
. También calculan las claves públicas asociadas,PA1
para Alice yPB1
para Bob. En este punto, cada parte puede construir sus propias transacciones de compromiso. La de Alice se verá así:- Gastará la transacción de financiación.
- Tendrá dos salidas (o más, cuando haya HTLCs. Cubriremos eso en el futuro).
- La salida
to_remote
enviará a Bob sus 5 BTC de inmediato. - La salida
to_local
será más elaborada. Aquí pueden suceder dos cosas. Alice puede enviarse a sí misma los 5 BTC después de un OP_CSVto_self_delay
o puede ser gastada por Bob si puede demostrar que tiene la clave privada temporal de AlicedA1
.
De manera similar, Bob también puede construir la transacción de compromiso de Alice y proporcionarle su firma para ello. Alice puede firmar esta transacción válida ella misma en cualquier momento y transmitirla a la red, dándole la seguridad que necesita para recuperar sus fondos en caso de que Bob desaparezca.
En este punto, cualquiera de las partes puede transmitir sus transacciones de compromiso para cerrar el canal. Supongamos que Alice transmite la suya. Bob recibirá sus 5 BTC de inmediato. Alice tendrá que esperar el número de bloques
to_self_delay
antes de poder usar sus 5 BTC. Sin embargo, no necesita preocuparse por que Bob gaste su salida porque sabe que nunca compartió su clave privada con él.Invalidando el estado antiguo
Ahora Alice quiere enviarle a Bob 1 BTC usando su canal. Así que, al igual que en el paso anterior, cada parte genera nuevas claves privadas (
dA2
para Alice,dB2
para Bob), calcula las claves públicas asociadas (PA2
para Alice,PB2
para Bob) y comparte las claves públicas entre sí. Y nuevamente, ambos crean transacciones de compromiso para reflejar el nuevo estado del canal (Alice ahora tiene 4 BTC ya que transfirió 1 BTC a Bob; Bob ahora tiene 6 BTC).El problema, sin embargo, es que Alice todavía tiene su transacción de compromiso del paso anterior, donde tenía 5 BTC, lo cual es más rentable para ella. Para mostrarle a Bob que está invalidando el estado antiguo y comprometiéndose al nuevo estado, necesita enviarle a Bob su clave privada temporal inicial (
dA1
). Ahora, dado que Bob tiene esta clave, puede gastar la salidato_self
de Alice si ella alguna vez publica un estado antiguo e inválido, antes de que ella pueda reclamarlo (recuerda que la salidato_local
tiene unto_self_delay
).Bob también le envía a Alice su antigua clave (
dB1
) para invalidar su estado antiguo. No tiene razón para no hacer esto ya que su nuevo estado es más rentable para él.¡Eso es todo! Ahora hemos aprendido cómo Alice y Bob pueden transaccionar de manera segura estableciendo nuevos estados e invalidando estados antiguos.
Revisión
- Para actualizar el estado, cada participante del canal genera nuevos pares de claves y se envían mutuamente la clave pública.
- Para invalidar el estado, por ejemplo, cuando se realiza una transacción, cada participante del canal actualiza el estado y se envían mutuamente la clave privada del estado anterior.
Referencias
- BOLT3
- LN Things Part 2: Updating State por nostr:nprofile1qqswrt9pnxatlplu49h6meld8svmwqt87wwvk256rqk07n6eu4qeh5gpz3mhxue69uhhyetvv9ujuerpd46hxtnfduqs6amnwvaz7tmwdaejumr0dszpfjtz
- eltoo
-
@ 2775fb0f:887f8193
2024-11-29 18:12:41— В связи с прогнозами метеорологов, в нашем городе ожидаются сильные порывы ветра, которые могут достигать 25-30 метров в секунду. Городская администрация призывает жителей принять необходимые меры предосторожности и обеспечить свою безопасность в условиях неблагоприятной погоды.
Синоптики предупреждают о возможности повреждения кровель, обрывов линий электропередач и падения деревьев. В связи с этим важно заранее подготовиться к сильному ветру и следовать рекомендациям специалистов.
Вот несколько советов по обеспечению безопасности:
-
Избегайте выхода на улицу без необходимости. Если это возможно, оставайтесь дома. Если вам нужно выйти, будьте осторожны и выбирайте защищенные от ветра маршруты.
-
Закрепите предметы на балконах и во дворе. Уберите или надежно закрепите легкие предметы, такие как садовая мебель, игрушки и другие вещи, которые могут быть унесены ветром.
-
Держитесь подальше от деревьев и рекламных щитов. Во время сильного ветра существует риск падения веток и других объектов. Постарайтесь избегать прогулок вблизи больших деревьев и конструкций, которые могут представлять опасность.
-
Проверьте состояние окон и дверей. Убедитесь, что все окна и двери плотно закрыты и надежно заперты, чтобы предотвратить попадание ветра и возможные повреждения.
-
Будьте готовы к отключениям электроэнергии. Запаситесь свечами, фонариками и запасами воды. Убедитесь, что у вас есть все необходимое для комфортного пребывания в доме в случае отключения электричества.
-
Следите за обновлениями погоды. Регулярно проверяйте прогнозы и предупреждения от местных метеорологических служб. Будьте в курсе изменений и готовьтесь к возможным последствиям.
Глава города, Анна Петрова, призывает всех жителей проявлять осторожность и заботиться о себе и своих близких. «Сильный ветер может быть опасным, и важно следовать рекомендациям, чтобы избежать неприятных ситуаций. Берегите себя и будьте внимательны», — подчеркнула она.
Помните, что безопасность — это прежде всего ответственность каждого из нас. Следуя простым советам, вы сможете защитить себя и своих близких в условиях сильного ветра. Будьте осторожны и берегите себя!
-
-
@ 1bda7e1f:bb97c4d9
2024-11-21 04:17:08Tldr
- Nostr is an open protocol which is interoperable with all kinds of other technologies
- You can use this interoperability to create custom solutions
- Nostr apps define a custom URI scheme handler "nostr:"
- In this blog I use this to integrate Nostr with NFC cards
- I create a Nostr NFC "login card" which allows me to log into Amethyst client
- I create a Nostr NFC "business card" which allows anyone to find my profile with a tap
Inter-Op All The Things!
Nostr is a new open social protocol for the internet. This open nature is very exciting because it means Nostr can add new capabilities to all other internet-connected technologies, from browsers to web applications. In my view, it achieves this through three core capabilities.
- A lightweight decentralised identity (Nostr keys, "npubs" and "nsecs"),
- A lightweight data distribution network (Nostr relays),
- A set of data interoperability standards (The Nostr Improvement Protocols "NIPs"), including the "nostr:" URI which we'll use in this post.
The lightweight nature is its core strength. Very little is required to interoperate with Nostr, which means many existing technologies can be easily used with the network.
Over the next few blog posts, I'll explore different Nostr inter-op ideas, and also deliver my first small open source projects to the community. I'll cover–
- NFC cards integrated with Nostr (in this post),
- Workflow Automations integrated with Nostr,
- AI LLMs integrated with Nostr.
The "Nostr:" URI
One feature of Nostr is it defines a custom URI scheme handler "nostr:". What is that?
A URI is used to identify a resource in a system. A system will have a protocol handler registry used to store such URI's, and if a system has a URI registered, then it knows what to do when it sees it. You are probably already familiar with some URI schemes such as "http:" and "mailto:". For example, when you click an http link, the system knows that it describes an http resource and opens a web browser to fetch the content from the internet.
A nostr: link operates in the same way. The nostr: prefix indicates a custom URI scheme specifically designed for the Nostr protocol. If a system has a Nostr application installed, that application may have registered "nostr:" in the protocol handler registry. On that system when a "nostr:" URI is clicked, the system will know that it describes a nostr resource and open the Nostr client to fetch the content from the nostr relay network.
This inter-op with the protocol handler registry gives us the power to do nice and exciting things with other technologies.
Nostr and NFC
Another technology that uses URIs is NFC cards. NFC (Near Field Communication) is a wireless technology that enables devices to exchange data over a few centimeters. It’s widely used in contactless payments, access control, and information sharing.
NFC tags are small chips embedded in cards or stickers which can store data like plain text, URLs, or custom URIs. They are very cheap (cents each) and widely available (Amazon with next day delivery).
When an NFC tag contains a URI, such as a http: (or nostr:) link, it acts as a trigger. Tapping the tag with an NFC-enabled device launches the associated application and processes the URI. For example, tapping a tag with "nostr:..." could open a Nostr client, directing it to a specific login page, public profile, or event.
This inter-op allows us to bridge the physical world to Nostr with just a tap.
Many useful ideas
There are many interesting ways to use this. Too many for me to explore. Perhaps some of these are interesting for your next side hustle?
- Nostr NFC "login cards" – tap to log into Amethyst on Android,
- Nostr NFC "business cards" – give to connections so they can tap to load your npub,
- Nostr NFC "payment cards" – integrating lightning network or ecash,
- Nostr NFC "doorbells", "punch cards", "drop boxes", or "dead drops" – put a tag in a specific place and tap to open a location-specific message or chat,
- Integrations with other access control systems,
- Integrations with other home automation systems,
- Many more ...
To start with I have built and use the "login card" and "business card" solutions. This blog post will show you how to do the same.
Nostr Login Card
You can use an NFC card to log into your Nostr client.
Most Nostr clients accept a variety of login methods, from posting your nsec into the app (insecure) to using a remote signer (more secure). A less known but more secure method is to sign into a session with a tap of a specially-configured NFC card. Amethyst is a Nostr client on Android which supports this type of login.
- A secure method for logging in
- Optionally keeps no log in history on the device after logout
- Does not require users to know or understand how keys work
- Keys are kept secure on a physically-separated card to reduce risk of compromise
Nostr devs think that this is useful for anti-establishment actors–Fair enough. For me, I am interested in this login card pattern as it could be useful for rolling out identities within an organisation context with less training (office workers are already familiar with door access cards). This pattern potentially abstracts away key management to the IT or ops team who provision the cards.
I first discovered this when Kohei demonstrated it in his video.
Here's how you set it up at a high level–
- Buy yourself some NFC cards
- Get your Nostr key ready in an encrypted, password protected format called "nencryptsec"
- Write the nencryptsec to the NFC card as a custom URI
- Tap to load the login screen, and enter your password to login
Here it is in detail–
Buy yourself some NFC cards
I found no specific requirements. As usual with Nostr so far, I tried to the cheapest possible route and it worked. Generic brand NFC cards shipped from China, I believe it was 50X for $15 from Amazon. Your mileage may vary.
Get your Nostr key ready
Your key will be saved to the NFC card in an encrypted password-protected format called "nencryptsec". Several applications support this. As we'll be using this to login to Amethyst, we will use Amethyst to output the nencryptsec for us.
- Login to Amethyst with your nsec,
- Open the sidebar and click "Backup Keys",
- Enter a password, and click "Encrypt and my secret key",
- It will add the password-protected key to your clipboard in the format "ncryptsec1...",
- Remember to backup your password.
Write the ncryptsec to the NFC card
- Download the free NFC Tools app to your device, and open it,
- Click "Write" and "Add a record", then click "Custom URL / URI",
- Paste your nencryptsec with the nostr URI in front, i.e. "nostr:ncryptsec1..." and click OK,
- Click "Write". NFC Tools will prompt you to "Approach an NFC tag",
- Place your NFC card against your phone, and it will write to the card,
- Your card is ready.
Tap to load the login screen
Tap the card against your phone again, and your phone should open the login screen of Amethyst and prompt you for your password.
Once you enter your password, Amethyst will decrypt your nsec and log you in.
Optionally, you can also set the app to forget you once you log out.
You have created a Nostr NFC "login card".
Nostr Business Card
You can use another NFC card to give anyone you meet a link straight to your Nostr profile.
I attended Peter McCormack's #CheatCode conference in Sydney and gave a few of these out following the Nostr panel, notably to Preston Pysh where it got some cut through and found me my first 100 followers. You can do the same.
To create your Nostr NFC "business card" is even easier than your NFC "login card".
- Buy yourself some NFC cards,
- Download the free NFC Tools app to your device, and open it,
- Click "Write" and "Add a record", then click "Custom URL / URI",
- Write your npub to the NFC card as a custom URI in the format "nostr:npub1..." (e.g. for me this is "nostr:npub1r0d8u8mnj6769500nypnm28a9hpk9qg8jr0ehe30tygr3wuhcnvs4rfsft"),
- Your card is ready.
Give the card to someone who is a Nostr user, and when they tap the card against their phone it will open their preferred Nostr client and go directly to your Nostr profile page.
You have created a Nostr NFC "business card".
What I Did Wrong
I like to share what I did wrong so you don't have to make the same mistakes. This time, this was very easy, and little went wrong. In general
- When password-protecting your nsec, don't forget the password!
- When writing to the NFC card, make sure to use "Custom URI/URL" as this accepts your "nostr:" URI scheme. If you use generic "URI/URL" it won't work.
What's Next
Over my first four blogs I have explored creating a good Nostr setup
- Mined a Nostr pubkey and backed up the mnemonic
- Set up Nostr payments with a Lightning wallet plus all the bells and whistles
- Set up NIP-05 and Lighting Address at my own domain
- Set up a Personal Relay at my own domain
Over the next few blogs I will be exploring different types of Nostr inter-op
- NFC cards integrated with Nostr (this post)
- Workflow Automations integrated with Nostr
- AI LLMs integrated with Nostr
Please be sure to let me know if you think there's another Nostr topic you'd like to see me tackle.
GM Nostr.
-
@ 6d8e2a24:5faaca4c
2024-11-29 16:34:32Memecoins, also known as meme cryptocurrencies or meme crypto, are digital currencies inspired by popular internet memes. Several meme tokens with large market caps boast active communities, such as Dogecoin (DOGE), Shiba Inu (SHIB), which are based on the Doge meme, and PEPE, which was inspired by Pepe the Frog.
So, what is a memecoin? Memecoins are a type of cryptocurrency featuring an internet meme character for its logo. Memecoins may serve a variety of purposes — or none at all — as they are not always the same, but they can still be bought and sold like other digital assets on most centralized and decentralized exchanges.
If you are looking to buy memecoins, do so at your own risk, as they are widely seen as speculative and volatile assets, and trading them is seen as risky.
-
@ 599f67f7:21fb3ea9
2024-11-20 21:25:38¿Qué es un canal?
Un canal Lightning es simplemente una multifirma 2-de-2 en la cadena. Para abrir un canal, solo enviamos fondos a una transacción multifirma 2-de-2. Esto crea un UTXO y el canal está abierto hasta que este UTXO se gaste. Durante la vida del canal, se crean un montón de transacciones que gastan doblemente la transacción de financiamiento, pero eventualmente una (y solo una) de estas se publicará en la cadena para cerrar el canal. Así que, idealmente, un canal Lightning condensa efectivamente un montón de transacciones en dos transacciones en la cadena: la que lo abre y la que lo cierra. Podríamos decir que así es como Lightning "eleva" las transacciones fuera de la cadena.
Creando un canal
Una transacción de financiamiento para un canal entre Alice y Bob es simplemente una transacción que tiene una salida como sigue:
2 <pubkeyA> <pubkeyB> 2 OP_CHECKMULTISIG
Donde
<pubkeyA>
es la clave pública de Alice y<pubkeyB>
es la de Bob. Entonces, si Alice quiere abrir un canal con Bob, ¿simplemente le envía fondos al script anterior?La respuesta es no, es un poco más complicado que eso. Existe la posibilidad de que Bob desaparezca para siempre y nunca vuelva a firmar ninguna transacción que intente gastar de la transacción de financiamiento. Esto significa que, efectivamente, los fondos de Alice quedarían atrapados en este UTXO para siempre. ¡No es ideal!
Aquí es donde entra una transacción de compromiso. Cubriremos la transacción de compromiso con más detalle en el futuro, pero por ahora lo importante que hay que saber es que una vez que una transacción de financiamiento es confirmada, las transacciones de compromiso definen el estado del canal (es decir, cómo se distribuyen los fondos entre los participantes del canal). Así que, esencialmente, cada transacción de compromiso gasta la transacción de financiamiento como entrada y tiene salidas que definen la distribución de fondos entre los participantes del canal.
Para ver cómo se utilizan estos dos conceptos para negociar la apertura de un canal, se intercambiará una serie de mensajes entre los nodos de Alice y Bob, como se muestra en el diagrama a continuación.
Es un poco como negociar un contrato; cada parte solo firma cuando está contento con los términos. Vamos a revisar cada uno de estos mensajes con más detalle.
open_channel
Alice envía este mensaje a Bob para indicar que quiere abrir un canal con él. Este mensaje contiene varios detalles sobre los requisitos de Alice para el canal. El más importante es
funding_pubkey
. Esta es la clave pública que Alice tiene la intención de usar como su clave pública en el script de la transacción de financiamiento.accept_channel
Si Bob está contento con los requisitos que Alice ha presentado en su oferta de canal, puede enviar de vuelta el mensaje
accept_channel
, que también contiene algunos de sus requisitos junto con sufunding_pubkey
.En este punto, Alice tiene todo lo que necesita para construir la transacción de financiamiento. Sin embargo, aún no tiene garantía de que Bob no desaparecerá, lo que haría que sus fondos no se pudieran gastar. Por lo tanto, aún no transmite la transacción de financiamiento. En cambio, lo que necesita es una transacción de compromiso firmada por Bob que gaste de la transacción de financiamiento y divida el saldo del canal en consecuencia. La transacción de financiamiento podría asignar algunos fondos a Bob también, por lo que Bob también querría una transacción de compromiso válida firmada por Alice, en caso de que ella desaparezca.
Entonces, lo que Alice hace ahora es construir la transacción de financiamiento y enviar a Bob el siguiente mensaje:
funding_created
Este mensaje contiene el TXID de la transacción de financiamiento, el índice de salida relevante de la transacción de financiamiento junto con una firma de la transacción de compromiso de Bob. Alice puede construir la transacción de compromiso exacta de Bob utilizando la información que ya conoce.
Ten en cuenta que Bob no puede hacer nada aún con su transacción de compromiso porque está gastando de una transacción que aún no está en la blockchain.
funding_signed
Si Bob está contento, entonces puede enviar a Alice un mensaje
funding_signed
, que contiene la firma de Bob para la transacción de compromiso de Alice.Ahora, Alice tiene una transacción de compromiso válida firmada por Bob que puede usar para gastar sus fondos de vuelta a sí misma en caso de que Bob desaparezca. Por lo tanto, es seguro para ella transmitir la transacción de financiamiento.
channel_ready
Tanto Alice como Bob estarán ahora observando la blockchain esperando que la transacción de financiamiento alcance el número deseado de confirmaciones. Una vez que cada uno lo vea, se enviarán mutuamente el mensaje
channel_ready
que contiene el ID del canal.¡El canal ahora está abierto y listo para transacciones!
Revisión
Terminaremos con un breve resumen de los conceptos importantes que hemos aprendido en este capítulo. Siéntete libre de volver aquí en el futuro en caso de que necesites un recordatorio.
- canal: un contrato multifirma 2-de-2 en la cadena utilizado para elevar transacciones fuera de la cadena
- transacción de financiamiento: una transacción multifirma 2-de-2 con un script de salida P2WSH que contiene las claves públicas de ambos participantes del canal
- transacción de compromiso: una transacción que define el estado de un canal, es decir, la distribución de fondos entre los participantes del canal
Referencias
- BOLT2
- LN Things Part 1: Creating a channel por nostr:nprofile1qqswrt9pnxatlplu49h6meld8svmwqt87wwvk256rqk07n6eu4qeh5gpz3mhxue69uhhyetvv9ujuerpd46hxtnfduqs6amnwvaz7tmwdaejumr0dszpfjtz
-
@ eee391ee:8d0b97c2
2024-11-29 16:25:24Amber 3.0.0 - Beta 7
- New design (still a work in progress)
- Removed the push notification server
- Open the permissions page with the correct account
- Fix crash when signing in with ncryptsec
- Fix icon size on notifications
- Fix relay connection when changing the default relays
- Option to setup a custom pin for the app
- Button to copy your public key
- Fix layout on Android < 15
- Fix multi event screen
- Fetch profile data
- Show relay message when event is rejected
- Fix profile icon size
- Don’t close app when using nostrconnect arcade
- Better check for valid relays
- Fix padding and scrolling
- Support for secret when using nostrconnect
- Fix empty relay notice
- Fix get_public_key not replying with hex key
- Fix relay not connecting after adding a new bunker
- Fix logout not working sometimes
Download it with zap.store, Obtainium, f-droid or download it directly in the releases page
If you like my work consider making a donation
Verifying the release
In order to verify the release, you'll need to have
gpg
orgpg2
installed on your system. Once you've obtained a copy (and hopefully verified that as well), you'll first need to import the keys that have signed this release if you haven't done so already:bash gpg --keyserver hkps://keys.openpgp.org --recv-keys 44F0AAEB77F373747E3D5444885822EED3A26A6D
Once you have his PGP key you can verify the release (assuming
manifest-v3.0.0-pre7.txt
andmanifest-v3.0.0-pre7.txt.sig
are in the current directory) with:bash gpg --verify manifest-v3.0.0-pre7.txt.sig manifest-v3.0.0-pre7.txt
You should see the following if the verification was successful:
bash gpg: Signature made Fri 13 Sep 2024 08:06:52 AM -03 gpg: using RSA key 44F0AAEB77F373747E3D5444885822EED3A26A6D gpg: Good signature from "greenart7c3 <greenart7c3@proton.me>"
That will verify the signature on the main manifest page which ensures integrity and authenticity of the binaries you've downloaded locally. Next, depending on your operating system you should then re-calculate the sha256 sum of the binary, and compare that with the following hashes:
bash cat manifest-v3.0.0-pre7.txt
One can use the
shasum -a 256 <file name here>
tool in order to re-compute thesha256
hash of the target binary for your operating system. The produced hash should be compared with the hashes listed above and they should match exactly. -
@ ec965405:63996966
2024-11-18 01:44:33Hi everybody,
My name is Miguel, and I'm one of the board members of the International Foster Care Alliance (IFCA)! I am a former foster youth living in Aguadilla, Puerto Rico. I first connected with IFCA around 2016 when Miho brought a group of Japanese foster youth to Oakland, California, to receive community organizer training from California Youth Connection (CYC). At the time, I was studying in Oakland and organizing with my local CYC chapter. I applied for and was accepted for the trip to Japan for the Youth Summit in 2018 and have continued to stay involved ever since. As a board member, I help IFCA with its Arts and Culture programming as well as member engagement.
My Voice, Our Story Upgrade
My Voice, Our Story is a bilingual blog started by IFCA youth to share stories and thoughts about common themes in foster care, such as aging out of care, normalcy, LGBTQIA+, mental health, and child welfare system reform. IFCA recently received a grant from Yakihonne to pay for six months of server space to upgrade this blog into our own social media network! Now, you can use any Nostr app on a web browser, iOS device, or Android device to connect to it and post your blogs for foster youth around the world to see.
Nostr is a social application protocol that enables our members to share their experiences from foster care on the My Voice, Our Story blog in a fun way. You can connect to the relay with any Nostr application to pull blogs and posts from our relay and, if you are a member of IFCA, post your own! Some Nostr applications have in-app translations that can translate posts to the language of your device, making it a good fit for our network that is spread out across different countries. Also, any youth who wish to remain anonymous can do so because you do not need to provide any personal identifying information to get started on Nostr.
Over the next few weeks, my fellow board members and I will host workshops to show everyone how it works. For now, you can check out this short guide I wrote on how to connect to the relay by clicking here..
You could always reach out to me by email contact@miguelalmodo.com if you have any questions or want to schedule a time for onboarding and further explanation. It might seem complicated at first, but I am confident that our community will quickly adapt. Are you part of IFCA's network? Comment below with the country you are reading this from so other members can see!
-
@ b83e6f82:73c27758
2024-11-29 16:10:05Citrine 0.5.6
- Add a option to fetch your events from relays
- Add a delete all button
- Feed by kind
Download it with zap.store, Obtainium, f-droid or download it directly in the releases page
If you like my work consider making a donation
Verifying the release
In order to verify the release, you'll need to have
gpg
orgpg2
installed on your system. Once you've obtained a copy (and hopefully verified that as well), you'll first need to import the keys that have signed this release if you haven't done so already:bash gpg --keyserver hkps://keys.openpgp.org --recv-keys 44F0AAEB77F373747E3D5444885822EED3A26A6D
Once you have his PGP key you can verify the release (assuming
manifest-v0.5.6.txt
andmanifest-v0.5.6.txt.sig
are in the current directory) with:bash gpg --verify manifest-v0.5.6.txt.sig manifest-v0.5.6.txt
You should see the following if the verification was successful:
bash gpg: Signature made Fri 13 Sep 2024 08:06:52 AM -03 gpg: using RSA key 44F0AAEB77F373747E3D5444885822EED3A26A6D gpg: Good signature from "greenart7c3 <greenart7c3@proton.me>"
That will verify the signature on the main manifest page which ensures integrity and authenticity of the binaries you've downloaded locally. Next, depending on your operating system you should then re-calculate the sha256 sum of the binary, and compare that with the following hashes:
bash cat manifest-v0.5.6.txt
One can use the
shasum -a 256 <file name here>
tool in order to re-compute thesha256
hash of the target binary for your operating system. The produced hash should be compared with the hashes listed above and they should match exactly. -
@ a39d19ec:3d88f61e
2024-11-17 10:48:56This week's functional 3d print is the "Dino Clip".
Dino Clip
I printed it some years ago for my son, so he would have his own clip for cereal bags.
Now it is used to hold a bag of dog food close.
The design by "Sneaks" is a so called "print in place". This means that the whole clip with moving parts is printed in one part, without the need for assembly after the print.
The clip is very strong, and I would print it again if I need a "heavy duty" clip for more rigid or big bags. Link to the file at Printables
-
@ fd208ee8:0fd927c1
2024-11-17 09:14:56You don't understand how insidious open-borders propaganda is, until you realize that it's an attempt to remove all differentiating traits from humans. They call this "strengthening individuality by removing nationality" (hello, newspeak), but what makes humans individual is their particular collection of traits, and nationality (and ethnicity, religion, etc. -- nationality is just the first domino they want to topple) is one of those.
Humans are not blank slates. Like DNA or physiognomy, our personalities are differing jumbles of cultural "letters". Each person selects consciously and subconsciously from amongst these letters, adding to or rejecting them, amplifying or suppressing them, twisting or combining them, building on top of them... and that's what makes you into You.
Open borders is an attempt to reduce the number of cultural letters you can build your "You" out of. If you take away the word "German", I am not liberated. There is simply one less adjective, with which I can describe myself. You have merely eradicated information, crippled language, and reduced my choices. I can then no longer define myself according to "German things", but I can also no longer define myself in opposition to German things.
Enter the Borg
We are easier to control and brainwash and persecute, if we are centralized and homogenized. As if the entire world were one, big prison and we were all forced to undergo the same education, wear the same clothes, follow the same rules, eat the same foods, enjoy the same entertainment, live the same lifestyle, share the same diseases and cures, enjoy the same lockdowns, join in the same cancel culture, fight the same wars.
That is what globalization brings. That is the end game of Open Borders: * No more cultural evolution or revolution. * Genes, but no memes. * You can go everywhere, but everywhere is the same, so you just stay home. * You can meet people from all over, but they are all the same, so you just don't bother. * One mass of humanity, that can be easily molded and manipulated.
-
@ fa1d8325:7c91882e
2024-11-29 15:57:29Сегодня в Пятигорске произошло серьёзное происшествие — прорыв канализационной системы, который привёл к затоплению улиц и подвалов. Это происшествие ещё раз свидетельствует о критическом состоянии канализационной системы во многих регионах России, где трубы, которым уже более 70 лет, требуют срочного ремонта.
Наши корреспонденты отправились на место аварии, чтобы предоставить вам самые актуальные новости о ситуации в Пятигорске и о том, какие меры принимаются для решения этой проблемы.
-
@ 592295cf:413a0db9
2024-11-16 10:40:22Week 11-11
Lamenting is becoming something I should ask people who complain. Charity bussiness and after sending zap received to those who do not complain...
I started making an RSS feed template. Open an opml file and check the feed. I called this script,Teed.
This morning I saw a bounty from a fiatjaf note, on a rss-feed long form, basic a plugin for an app. But I'm not doing that, of course, I can also publish it as soon as I'm in charge. Maybe I have some opml files and I want to see if these are still active.
Starter pack is not good apparently creates elites and maybe gives you the feeling of not choosing, but that's what people want. Do not choose but have the illusion of choosing.
Toxicity level. high.
P2P stuff, Iroh is a protocol for syncing & moving bytes iroh computer post on Bluesky
Juraj new project
nostr:nevent1qvzqqqqqqypzpk4kccr9csumnwhmpv83ladqc6p88089cx2e5s2c4448ppgl2pakqqsyv4hs424x6c8phks903s595q2lqp5fpwyq7ajwrf00lxev8cfamcvmq23h
Alex Gleason bunker Knox. (Beta) "knox is a new Nostr bunker CLI for running a NIP-46 remote signer and granting credentials to members of your team". Announcing bunker knox article
Local First podcast, web2.5. Something like Nostr but Local P2P, interesting episode. youtube link
Open Secret AI. "OpenSecret is a backend for app developers that turns private encryption on by default." announcment AI
I think users with regard to algorithms do not want ten different feeds to choose from, but that their feed adapts to their choices, training the feed if this makes sense. So the feed is your feed for your choices, respond and train with them.
Pleblab 2, cool "ANNOUNCING TOP BUILDER SEASON 2! " nostr:nevent1qvzqqqqqqypzpmx02p4slzahlf7jlcaspsx57g6uc7kl7cc7dvhlsnqtpn6khjj0qy2hwumn8ghj7un9d3shjtnyv9kh2uewd9hj7qgwwaehxw309ahx7uewd3hkctcqyzy9w0frd802hfmrp45jr6dqhf7umqj7s63z0jvhv7hvvkcsqjg0vjwd7q4)
It was the real Guardian, quit 7fqx, we know it's you who want to distract us from number go up. The Guardian has left or wants to leave twitter is looking for alternatives, but how to verify a high profile user on Nostr? Nostr Address is already something but it's not enough.
We sometimes think that there is the money tree somewhere is that they magically appear, when instead the money is in the ground but they are dirty.
If Amethyst doesn't support is others stuff
People are simple, they want an app that works for all devices they have. People are "flutter-system".
A podcast feed xml file
Add to teed, if only i had made that option, meanwhile i saw a new interesting project
An other RSS feed github project
Imagine making a file opml with categories and those are your follow nostriches.
The problem is this does not bring new sap to the social chart is important to you, receive the selected posts and it is fantastic. You can also not use Nostr, if you want to use it as backup is fine. Share opml files? It's okay, but you can also find specific sites and find the best. Update for clients, you have a lot of RSS feeds from clients but update after a few hours so if there is really an emergency you lose. I still need to figure out how to integrate Nostr into RSS feed. Maybe an event to make your lists known.
I saw the event in these pr: nostr verified podcast nip #1465 Add audio track NIP #1043
-
@ 07907690:d4e015f6
2024-11-15 10:10:05PGP (Pretty Good Privacy) adalah protokol enkripsi yang digunakan untuk memastikan kerahasiaan, integritas, dan otentikasi data dalam komunikasi digital. Diciptakan oleh Phil Zimmermann pada tahun 1991, PGP menggunakan kombinasi teknik kriptografi asimetris (kunci publik dan kunci privat) serta simetris untuk melindungi informasi. Berikut adalah berbagai kegunaan PGP:
Mengamankan Email (Enkripsi dan Dekripsi)
-
Kegunaan: Melindungi isi email agar hanya penerima yang memiliki kunci privat yang benar yang dapat membacanya.
-
Cara Kerja:
-
Pengirim mengenkripsi email menggunakan kunci publik penerima.
-
Hanya penerima yang memiliki kunci privat yang dapat mendekripsi dan membaca email tersebut.
-
Contoh: Jurnalis yang berkomunikasi dengan informan atau organisasi yang mengirim data sensitif dapat menggunakan PGP untuk melindungi komunikasi mereka dari penyusup.
Tanda Tangan Digital (Digital Signature)
-
Kegunaan: Memastikan keaslian dan integritas pesan atau dokumen, memastikan bahwa pesan tidak diubah dan benar-benar berasal dari pengirim yang sah.
-
Cara Kerja:
-
Pengirim membuat tanda tangan digital menggunakan kunci privatnya.
-
Penerima dapat memverifikasi tanda tangan tersebut menggunakan kunci publik pengirim.
-
Contoh: Digunakan untuk memverifikasi keaslian dokumen hukum, email penting, atau perangkat lunak yang diunduh.
Melindungi File dan Dokumen
-
Kegunaan: Mengenkripsi file sensitif agar hanya orang yang memiliki kunci dekripsi yang benar yang dapat membukanya.
-
Cara Kerja: File dienkripsi menggunakan kunci publik penerima, dan penerima menggunakan kunci privatnya untuk mendekripsinya.
-
Contoh: Perusahaan dapat menggunakan PGP untuk mengenkripsi laporan keuangan, data pelanggan, atau informasi penting lainnya sebelum membagikannya.
Mengamankan Backup Data
-
Kegunaan: Mengenkripsi cadangan data penting untuk melindunginya dari akses yang tidak sah.
-
Cara Kerja: File backup dienkripsi dengan PGP sebelum disimpan, sehingga meskipun backup dicuri, data tetap aman.
-
Contoh: Organisasi menyimpan cadangan data klien di server eksternal yang dienkripsi dengan PGP untuk mencegah kebocoran data.
Perlindungan Identitas dan Anonimitas
-
Kegunaan: Melindungi identitas pengirim dan penerima dalam komunikasi online.
-
Cara Kerja: Penggunaan enkripsi end-to-end menjamin bahwa hanya pihak yang berwenang yang dapat membaca pesan.
-
Contoh: Aktivis atau peneliti yang bekerja di negara dengan pengawasan ketat dapat menggunakan PGP untuk melindungi komunikasi mereka.
Memverifikasi Integritas Perangkat Lunak
-
Kegunaan: Memastikan bahwa perangkat lunak atau paket yang diunduh berasal dari sumber yang terpercaya dan tidak dimodifikasi oleh pihak ketiga.
-
Cara Kerja: Pengembang menandatangani perangkat lunak menggunakan kunci privat mereka, dan pengguna dapat memverifikasi tanda tangan menggunakan kunci publik yang disediakan.
-
Contoh: Distribusi Linux atau aplikasi open-source sering kali menyertakan tanda tangan PGP untuk memverifikasi keasliannya.
Komunikasi di Forum atau Jaringan Terdistribusi
-
Kegunaan: Memastikan privasi komunikasi di platform terdesentralisasi atau anonim.
-
Cara Kerja: Pesan dienkripsi sebelum dikirim dan hanya dapat didekripsi oleh penerima yang sah.
-
Contoh: Pengguna di forum yang membahas topik sensitif dapat menggunakan PGP untuk melindungi identitas mereka.
Mengapa PGP Penting?
- Keamanan yang Kuat: Kombinasi kriptografi asimetris dan simetris membuat PGP sangat sulit ditembus oleh peretas.
-Privasi: Menjaga komunikasi Anda tetap aman dan pribadi dari penyadapan atau pengawasan.
-
Integritas: Memastikan bahwa pesan atau data yang dikirim tidak diubah selama transmisi.
-
Otentikasi: Membuktikan identitas pengirim melalui tanda tangan digital.
Kelebihan PGP
-
Sangat Aman: Jika digunakan dengan benar, PGP menawarkan tingkat keamanan yang sangat tinggi.
-
Terbuka: Banyak digunakan di kalangan profesional dan komunitas open-source.
-
Fleksibel: Dapat digunakan untuk berbagai keperluan, mulai dari komunikasi email hingga penyimpanan data.
Kekurangan PGP
-
Kompleks untuk Pemula: Relatif sulit digunakan oleh pengguna awam.
-
Pengelolaan Kunci yang Rumit: Memerlukan pengelolaan kunci publik/privat yang benar.
-
Tidak Ada Pemulihan Data: Jika kunci privat hilang, data yang dienkripsi tidak dapat dipulihkan.
PGP adalah alat yang sangat berguna untuk memastikan keamanan dan privasi dalam komunikasi dan data. Dengan meningkatnya risiko kejahatan siber, penggunaan PGP menjadi semakin penting, terutama di sektor yang menangani data sensitif.
-
-
@ bcea2b98:7ccef3c9
2024-11-14 18:03:14We all have that one movie or show we turn to when we need a little comfort. Whether it’s for the laughs, the nostalgia, or the familiar characters, these are the ones that never get old.
What’s a movie or series you can watch again and again? What makes it so comforting, and why do you keep coming back to it?
I enjoy The Office with Michael Scott and Dwight Schrute. We watched a lot of that in the past and then again during the pandemic during isolation.
originally posted at https://stacker.news/items/767870
-
@ bcea2b98:7ccef3c9
2024-11-13 02:44:17@chess a3
originally posted at https://stacker.news/items/765445
-
@ bcea2b98:7ccef3c9
2024-11-13 02:18:58Sometimes our strongest values are the ones that people wouldn’t expect. These unique principles often reveal something special about who we are and what we believe in. Do you hold a value that might surprise others?
originally posted at https://stacker.news/items/765433
-
@ be7bf5de:09420d0a
2024-11-13 01:08:36At NosFabrica, we envision a future of healthcare where the individual is in charge of their health data and empowered to take responsibility for their own health. We are building health applications on Nostr and bitcoin to enable individuals own their health data. Nostr's architecture will allow different healthcare providers to write data onto the individual's relay. We see many potential use cases to solve specific problems in healthcare when the individual in a world where everyone has a comprehensive, portable and interoperable health record over time. We are looking to show what is possible with the "other stuff" on Nostr, starting by developing micro-apps so you can start compiling your health data, which you control.
If you're like most people on earth, your eyes aren't perfect. About half of us - 4 billion humans - have eye glasses, yet nearly a billion people can't get glasses due to inaccessibility of eye care or affordability.
With our microapp, Lazer Eyes, eye care providers can now write an eyeglasses or contacts prescription directly onto your own health relay. The optometrist simply needs to enter in your Nostr public key profile (nprofile), which relay to write the data to, and your prescription data; the encrypted prescription will be sent in an encrypted note directly to your relay. You can now send this signed note to your eye glasses provider to fulfill your glasses or contacts order.
If you're using Amethyst today, you will be able to see this prescription rendered into your DMs. In our NosFabrica future vision, different clients would be able to show you this piece of your health record alongside other health information with different user interfaces and experiences. You will then have the power to selectively disclose this information, as needed.
There are many benefits to using Nostr for health as an individual:
-
Patient Ownership and Control
-
Patients have full control of their prescription, and they can share it securely with confidence and even privately if required with eyewear providers or optometrists whenever needed.
-
Patients no longer rely on email or paper copies that can be easily lost or tampered with. Emailing a PDF to a patient brings the issue of requiring an optometrist signature leading to excess time taken to generate, print, sign, scan and email the copy. Public / private key cryptography provides a verifiable, time saving option in this case.
-
Continuity of care and ability to track changes in prescription over time - there are numerous forum posts where patients have found it difficult to get their prescription data from their optometrist practice when requesting it months or years later.
-
Removes the need for the patient to contact their old opticians and go through a process of trying to request their details, which can be time consuming.
-
Identity Verification
-
Optometrists sign prescriptions with a cryptographic key that patients could verify using their private Nostr identity (also known as a public/private key pair). This ensures that the prescription is authentic, accurate, and hasn't been altered after issuance. This would remove the need for issuing a “signed prescription” that currently has to be done in the physical sense, as a print out and issued to the patient. Have the option to have an indisputable and verifiable ‘Optometrist Identity Key’ would enable this legal requirement (in the UK) to go completely digital over Nostr.
-
The decentralized nature of Nostr ensures that prescriptions can be easily verified and traced back to the original issuer, avoiding forgery or fraud.
-
Privacy:
-
Unlike traditional methods where patient information is stored on centralized databases of the electronic medical record company (eg, Epic), or large health systems (eg, Ascension), Nostr keeps patient data decentralized and private, accessible only through permissioned sharing. This ensures no third party can access, manipulate, or misuse this sensitive information.
-
Immutable Records
-
Once a prescription is issued and signed on Nostr, it is stored immutably on the decentralized network. This ensures a permanent and trustworthy ledger of the patient's eye health history. This feature adds to accountability and should bring a higher standard to complete and accurate prescribing across all practices.
-
These records can persist over time and are portable to travel with you, wherever you seek care or glasses.
-
Global Access
-
Patients can use their Nostr-stored prescription with any provider across the globe, without needing to worry about differing national data standards or carrying physical documents when they travel or move.
-
This opens up a wider use case when considering the 2 Billion + individuals who currently cannot get access to sight care services.
Benefits for Optometrist Practices and Operators:
- Improved Patient Retention and Care through Trust and Transparency
-
By empowering patients with ownership of their data, practices foster trust and loyalty, reducing churn over time. If patients know they can rely on your practice for transparency, secure record-keeping, and access to the latest technology, they are more likely to return for future eye exams and other services.
-
A decentralized, tamper-proof record of prescriptions can improve administrative efficiency. No more handling lost prescriptions, disputes about validity, or delays in getting updated information to patients or other providers.
- The decentralized storage of prescriptions allows optometrists to securely share and access patient data, making cross-practice collaboration easier for referrals, second opinions, or specialized care.
- Cost Savings on Paperwork and Administration
-
Digitizing and decentralizing prescription records could lead to long-term savings on administrative costs, such as paperwork management, prescription re-issues, and managing patient data in outdated systems.
-
Optometrists can ensure their records are always accessible, accurate, and trusted by all parties (patients, insurers, other clinics).
- By reducing the burden of handling prescription storage and verification manually, the practice can focus more on patient care.
- Adaptation to Future Consumer Behavior and building a Tech-Savvy Reputation
-
As patients increasingly take control of their health data and seek decentralized solutions, practices that adapt to this trend are future-proofing their business model. Over time, patients will expect more control over their medical data, and being ahead of this shift will ensure long-term relevance.
-
Practices that embrace new technologies like Nostr can market themselves as tech-forward and adaptable to future trends, gaining an edge over more traditional competitors. This reputation is especially important as younger generations increasingly value privacy and digital autonomy. A Nostr-based service helps position the practice as aligned with these values.
- Integration with Bitcoin
-
By integrating a service built on Nostr, naturally linked with the bitcoin ecosystem, the practice can also introduce bitcoin payments as a novel way to reduce transaction fees and differentiate their practice from the competition.
-
Attract bitcoiners: The optics practice can appeal to the Bitcoin community, who value decentralization and would appreciate paying with bitcoin or using a decentralized protocol for prescription management. This opens up a new market of patients interested in technology and financial independence.
- Upsell Opportunities and Revenue Diversification
-
The practice can still maintain a competitive eyewear sales strategy by offering upsell opportunities. When patients receive their prescription digitally, they can be automatically sent tailored offers for high-quality lenses, frames, or even add-ons like blue light coatings or progressive lenses, keeping them within the practice’s ecosystem. Practices can offer value-added eyewear options, such as free adjustments, repairs, or personalized lens consultations, which online retailers can’t easily match.
-
The Nostr system can open doors to additional services beyond eyewear sales, including personalized consulting services, specialized testing (e.g., for contact lenses, binocular vision, myopia control), and more frequent checkups due to the ease of updating and verifying records.
Of course, utilizing this tool means providers need to help onboard individuals onto Nostr. In many ways, we see providers as playing into the Nostr network and flywheel effect. This is better technology with global access - and we invite you to consider other micro-apps that can continue to build out the decentralized healthcare ecosystem built on Nostr and bitcoin.
We have partnered with the Bitcoin Optometrist, Dr Alan Bryden, to continue to refine the micro-application and start testing its use. We'd like to thank Dr Alan for his insights that contributed to this micro-app and write-up. Check out his site and nonprofit, Sats for Sight, to learn more about utilizing bitcoin to provide eyeglasses to those in need, along with his HODL eyewear line.
We're excited about the future of building healthcare applications on nostr and bitcoin. If you have ideas or are facing any health challenges, we're conducting product discovery interviews to understand your biggest pain points when it comes to managing and optimizing your health and healthcare data. Please reach out to jon@nosfabrica.com or schedule time here to learn more about how to get involved!
Note: Lazer Eyes is currently only available for testing purposes as we evaluate regulatory considerations across jurisdictions.
-
-
@ a10260a2:caa23e3e
2024-11-10 04:35:34nostr:npub1nkmta4dmsa7pj25762qxa6yqxvrhzn7ug0gz5frp9g7p3jdscnhsu049fn added support for classified listings (NIP-99) about a month ago and recently announced this update that allows for creating/editing listings and blog posts via the dashboard.
In other words, listings created on the website are also able to be viewed and edited on other Nostr apps like Amethyst and Shopstr. Interoperability FTW.
I took some screenshots to give you an idea of how things work.
The home page is clean with the ability to search for profiles by name, npub, or Nostr address (NIP-05).
Clicking login allows signing in with a browser extension.
The dashboard gives an overview of the amount of notes posted (both short and long form) and products listed.
Existing blog posts (i.e. long form notes) are synced.
Same for product listings. There’s a nice interface to create new ones and preview them before publishing.
That’s all for now. As you can see, super slick stuff!
Bullish on Cypher.
So much so I had to support the project and buy a subdomain. 😎
https://bullish.cypher.space
originally posted at https://stacker.news/items/760592
-
@ eac63075:b4988b48
2024-11-09 17:57:27Based on a recent paper that included collaboration from renowned experts such as Lynn Alden, Steve Lee, and Ren Crypto Fish, we discuss in depth how Bitcoin's consensus is built, the main risks, and the complex dynamics of protocol upgrades.
Podcast https://www.fountain.fm/episode/wbjD6ntQuvX5u2G5BccC
Presentation https://gamma.app/docs/Analyzing-Bitcoin-Consensus-Risks-in-Protocol-Upgrades-p66axxjwaa37ksn
1. Introduction to Consensus in Bitcoin
Consensus in Bitcoin is the foundation that keeps the network secure and functional, allowing users worldwide to perform transactions in a decentralized manner without the need for intermediaries. Since its launch in 2009, Bitcoin is often described as an "immutable" system designed to resist changes, and it is precisely this resistance that ensures its security and stability.
The central idea behind consensus in Bitcoin is to create a set of acceptance rules for blocks and transactions, ensuring that all network participants agree on the transaction history. This prevents "double-spending," where the same bitcoin could be used in two simultaneous transactions, something that would compromise trust in the network.
Evolution of Consensus in Bitcoin
Over the years, consensus in Bitcoin has undergone several adaptations, and the way participants agree on changes remains a delicate process. Unlike traditional systems, where changes can be imposed from the top down, Bitcoin operates in a decentralized model where any significant change needs the support of various groups of stakeholders, including miners, developers, users, and large node operators.
Moreover, the update process is extremely cautious, as hasty changes can compromise the network's security. As a result, the philosophy of "don't fix what isn't broken" prevails, with improvements happening incrementally and only after broad consensus among those involved. This model can make progress seem slow but ensures that Bitcoin remains faithful to the principles of security and decentralization.
2. Technical Components of Consensus
Bitcoin's consensus is supported by a set of technical rules that determine what is considered a valid transaction and a valid block on the network. These technical aspects ensure that all nodes—the computers that participate in the Bitcoin network—agree on the current state of the blockchain. Below are the main technical components that form the basis of the consensus.
Validation of Blocks and Transactions
The validation of blocks and transactions is the central point of consensus in Bitcoin. A block is only considered valid if it meets certain criteria, such as maximum size, transaction structure, and the solving of the "Proof of Work" problem. The proof of work, required for a block to be included in the blockchain, is a computational process that ensures the block contains significant computational effort—protecting the network against manipulation attempts.
Transactions, in turn, need to follow specific input and output rules. Each transaction includes cryptographic signatures that prove the ownership of the bitcoins sent, as well as validation scripts that verify if the transaction conditions are met. This validation system is essential for network nodes to autonomously confirm that each transaction follows the rules.
Chain Selection
Another fundamental technical issue for Bitcoin's consensus is chain selection, which becomes especially important in cases where multiple versions of the blockchain coexist, such as after a network split (fork). To decide which chain is the "true" one and should be followed, the network adopts the criterion of the highest accumulated proof of work. In other words, the chain with the highest number of valid blocks, built with the greatest computational effort, is chosen by the network as the official one.
This criterion avoids permanent splits because it encourages all nodes to follow the same main chain, reinforcing consensus.
Soft Forks vs. Hard Forks
In the consensus process, protocol changes can happen in two ways: through soft forks or hard forks. These variations affect not only the protocol update but also the implications for network users:
-
Soft Forks: These are changes that are backward compatible. Only nodes that adopt the new update will follow the new rules, but old nodes will still recognize the blocks produced with these rules as valid. This compatibility makes soft forks a safer option for updates, as it minimizes the risk of network division.
-
Hard Forks: These are updates that are not backward compatible, requiring all nodes to update to the new version or risk being separated from the main chain. Hard forks can result in the creation of a new coin, as occurred with the split between Bitcoin and Bitcoin Cash in 2017. While hard forks allow for deeper changes, they also bring significant risks of network fragmentation.
These technical components form the base of Bitcoin's security and resilience, allowing the system to remain functional and immutable without losing the necessary flexibility to evolve over time.
3. Stakeholders in Bitcoin's Consensus
Consensus in Bitcoin is not decided centrally. On the contrary, it depends on the interaction between different groups of stakeholders, each with their motivations, interests, and levels of influence. These groups play fundamental roles in how changes are implemented or rejected on the network. Below, we explore the six main stakeholders in Bitcoin's consensus.
1. Economic Nodes
Economic nodes, usually operated by exchanges, custody providers, and large companies that accept Bitcoin, exert significant influence over consensus. Because they handle large volumes of transactions and act as a connection point between the Bitcoin ecosystem and the traditional financial system, these nodes have the power to validate or reject blocks and to define which version of the software to follow in case of a fork.
Their influence is proportional to the volume of transactions they handle, and they can directly affect which chain will be seen as the main one. Their incentive is to maintain the network's stability and security to preserve its functionality and meet regulatory requirements.
2. Investors
Investors, including large institutional funds and individual Bitcoin holders, influence consensus indirectly through their impact on the asset's price. Their buying and selling actions can affect Bitcoin's value, which in turn influences the motivation of miners and other stakeholders to continue investing in the network's security and development.
Some institutional investors have agreements with custodians that may limit their ability to act in network split situations. Thus, the impact of each investor on consensus can vary based on their ownership structure and how quickly they can react to a network change.
3. Media Influencers
Media influencers, including journalists, analysts, and popular personalities on social media, have a powerful role in shaping public opinion about Bitcoin and possible updates. These influencers can help educate the public, promote debates, and bring transparency to the consensus process.
On the other hand, the impact of influencers can be double-edged: while they can clarify complex topics, they can also distort perceptions by amplifying or minimizing change proposals. This makes them a force both of support and resistance to consensus.
4. Miners
Miners are responsible for validating transactions and including blocks in the blockchain. Through computational power (hashrate), they also exert significant influence over consensus decisions. In update processes, miners often signal their support for a proposal, indicating that the new version is safe to use. However, this signaling is not always definitive, and miners can change their position if they deem it necessary.
Their incentive is to maximize returns from block rewards and transaction fees, as well as to maintain the value of investments in their specialized equipment, which are only profitable if the network remains stable.
5. Protocol Developers
Protocol developers, often called "Core Developers," are responsible for writing and maintaining Bitcoin's code. Although they do not have direct power over consensus, they possess an informal veto power since they decide which changes are included in the main client (Bitcoin Core). This group also serves as an important source of technical knowledge, helping guide decisions and inform other stakeholders.
Their incentive lies in the continuous improvement of the network, ensuring security and decentralization. Many developers are funded by grants and sponsorships, but their motivations generally include a strong ideological commitment to Bitcoin's principles.
6. Users and Application Developers
This group includes people who use Bitcoin in their daily transactions and developers who build solutions based on the network, such as wallets, exchanges, and payment platforms. Although their power in consensus is less than that of miners or economic nodes, they play an important role because they are responsible for popularizing Bitcoin's use and expanding the ecosystem.
If application developers decide not to adopt an update, this can affect compatibility and widespread acceptance. Thus, they indirectly influence consensus by deciding which version of the protocol to follow in their applications.
These stakeholders are vital to the consensus process, and each group exerts influence according to their involvement, incentives, and ability to act in situations of change. Understanding the role of each makes it clearer how consensus is formed and why it is so difficult to make significant changes to Bitcoin.
4. Mechanisms for Activating Updates in Bitcoin
For Bitcoin to evolve without compromising security and consensus, different mechanisms for activating updates have been developed over the years. These mechanisms help coordinate changes among network nodes to minimize the risk of fragmentation and ensure that updates are implemented in an orderly manner. Here, we explore some of the main methods used in Bitcoin, their advantages and disadvantages, as well as historical examples of significant updates.
Flag Day
The Flag Day mechanism is one of the simplest forms of activating changes. In it, a specific date or block is determined as the activation moment, and all nodes must be updated by that point. This method does not involve prior signaling; participants simply need to update to the new software version by the established day or block.
-
Advantages: Simplicity and predictability are the main benefits of Flag Day, as everyone knows the exact activation date.
-
Disadvantages: Inflexibility can be a problem because there is no way to adjust the schedule if a significant part of the network has not updated. This can result in network splits if a significant number of nodes are not ready for the update.
An example of Flag Day was the Pay to Script Hash (P2SH) update in 2012, which required all nodes to adopt the change to avoid compatibility issues.
BIP34 and BIP9
BIP34 introduced a more dynamic process, in which miners increase the version number in block headers to signal the update. When a predetermined percentage of the last blocks is mined with this new version, the update is automatically activated. This model later evolved with BIP9, which allowed multiple updates to be signaled simultaneously through "version bits," each corresponding to a specific change.
-
Advantages: Allows the network to activate updates gradually, giving more time for participants to adapt.
-
Disadvantages: These methods rely heavily on miner support, which means that if a sufficient number of miners do not signal the update, it can be delayed or not implemented.
BIP9 was used in the activation of SegWit (BIP141) but faced challenges because some miners did not signal their intent to activate, leading to the development of new mechanisms.
User Activated Soft Forks (UASF) and User Resisted Soft Forks (URSF)
To increase the decision-making power of ordinary users, the concept of User Activated Soft Fork (UASF) was introduced, allowing node operators, not just miners, to determine consensus for a change. In this model, nodes set a date to start rejecting blocks that are not in compliance with the new update, forcing miners to adapt or risk having their blocks rejected by the network.
URSF, in turn, is a model where nodes reject blocks that attempt to adopt a specific update, functioning as resistance against proposed changes.
-
Advantages: UASF returns decision-making power to node operators, ensuring that changes do not depend solely on miners.
-
Disadvantages: Both UASF and URSF can generate network splits, especially in cases of strong opposition among different stakeholders.
An example of UASF was the activation of SegWit in 2017, where users supported activation independently of miner signaling, which ended up forcing its adoption.
BIP8 (LOT=True)
BIP8 is an evolution of BIP9, designed to prevent miners from indefinitely blocking a change desired by the majority of users and developers. BIP8 allows setting a parameter called "lockinontimeout" (LOT) as true, which means that if the update has not been fully signaled by a certain point, it is automatically activated.
-
Advantages: Ensures that changes with broad support among users are not blocked by miners who wish to maintain the status quo.
-
Disadvantages: Can lead to network splits if miners or other important stakeholders do not support the update.
Although BIP8 with LOT=True has not yet been used in Bitcoin, it is a proposal that can be applied in future updates if necessary.
These activation mechanisms have been essential for Bitcoin's development, allowing updates that keep the network secure and functional. Each method brings its own advantages and challenges, but all share the goal of preserving consensus and network cohesion.
5. Risks and Considerations in Consensus Updates
Consensus updates in Bitcoin are complex processes that involve not only technical aspects but also political, economic, and social considerations. Due to the network's decentralized nature, each change brings with it a set of risks that need to be carefully assessed. Below, we explore some of the main challenges and future scenarios, as well as the possible impacts on stakeholders.
Network Fragility with Alternative Implementations
One of the main risks associated with consensus updates is the possibility of network fragmentation when there are alternative software implementations. If an update is implemented by a significant group of nodes but rejected by others, a network split (fork) can occur. This creates two competing chains, each with a different version of the transaction history, leading to unpredictable consequences for users and investors.
Such fragmentation weakens Bitcoin because, by dividing hashing power (computing) and coin value, it reduces network security and investor confidence. A notable example of this risk was the fork that gave rise to Bitcoin Cash in 2017 when disagreements over block size resulted in a new chain and a new asset.
Chain Splits and Impact on Stakeholders
Chain splits are a significant risk in update processes, especially in hard forks. During a hard fork, the network is split into two separate chains, each with its own set of rules. This results in the creation of a new coin and leaves users with duplicated assets on both chains. While this may seem advantageous, in the long run, these splits weaken the network and create uncertainties for investors.
Each group of stakeholders reacts differently to a chain split:
-
Institutional Investors and ETFs: Face regulatory and compliance challenges because many of these assets are managed under strict regulations. The creation of a new coin requires decisions to be made quickly to avoid potential losses, which may be hampered by regulatory constraints.
-
Miners: May be incentivized to shift their computing power to the chain that offers higher profitability, which can weaken one of the networks.
-
Economic Nodes: Such as major exchanges and custody providers, have to quickly choose which chain to support, influencing the perceived value of each network.
Such divisions can generate uncertainties and loss of value, especially for institutional investors and those who use Bitcoin as a store of value.
Regulatory Impacts and Institutional Investors
With the growing presence of institutional investors in Bitcoin, consensus changes face new compliance challenges. Bitcoin ETFs, for example, are required to follow strict rules about which assets they can include and how chain split events should be handled. The creation of a new asset or migration to a new chain can complicate these processes, creating pressure for large financial players to quickly choose a chain, affecting the stability of consensus.
Moreover, decisions regarding forks can influence the Bitcoin futures and derivatives market, affecting perception and adoption by new investors. Therefore, the need to avoid splits and maintain cohesion is crucial to attract and preserve the confidence of these investors.
Security Considerations in Soft Forks and Hard Forks
While soft forks are generally preferred in Bitcoin for their backward compatibility, they are not without risks. Soft forks can create different classes of nodes on the network (updated and non-updated), which increases operational complexity and can ultimately weaken consensus cohesion. In a network scenario with fragmentation of node classes, Bitcoin's security can be affected, as some nodes may lose part of the visibility over updated transactions or rules.
In hard forks, the security risk is even more evident because all nodes need to adopt the new update to avoid network division. Experience shows that abrupt changes can create temporary vulnerabilities, in which malicious agents try to exploit the transition to attack the network.
Bounty Claim Risks and Attack Scenarios
Another risk in consensus updates are so-called "bounty claims"—accumulated rewards that can be obtained if an attacker manages to split or deceive a part of the network. In a conflict scenario, a group of miners or nodes could be incentivized to support a new update or create an alternative version of the software to benefit from these rewards.
These risks require stakeholders to carefully assess each update and the potential vulnerabilities it may introduce. The possibility of "bounty claims" adds a layer of complexity to consensus because each interest group may see a financial opportunity in a change that, in the long term, may harm network stability.
The risks discussed above show the complexity of consensus in Bitcoin and the importance of approaching it gradually and deliberately. Updates need to consider not only technical aspects but also economic and social implications, in order to preserve Bitcoin's integrity and maintain trust among stakeholders.
6. Recommendations for the Consensus Process in Bitcoin
To ensure that protocol changes in Bitcoin are implemented safely and with broad support, it is essential that all stakeholders adopt a careful and coordinated approach. Here are strategic recommendations for evaluating, supporting, or rejecting consensus updates, considering the risks and challenges discussed earlier, along with best practices for successful implementation.
1. Careful Evaluation of Proposal Maturity
Stakeholders should rigorously assess the maturity level of a proposal before supporting its implementation. Updates that are still experimental or lack a robust technical foundation can expose the network to unnecessary risks. Ideally, change proposals should go through an extensive testing phase, have security audits, and receive review and feedback from various developers and experts.
2. Extensive Testing in Secure and Compatible Networks
Before an update is activated on the mainnet, it is essential to test it on networks like testnet and signet, and whenever possible, on other compatible networks that offer a safe and controlled environment to identify potential issues. Testing on networks like Litecoin was fundamental for the safe launch of innovations like SegWit and the Lightning Network, allowing functionalities to be validated on a lower-impact network before being implemented on Bitcoin.
The Liquid Network, developed by Blockstream, also plays an important role as an experimental network for new proposals, such as OP_CAT. By adopting these testing environments, stakeholders can mitigate risks and ensure that the update is reliable and secure before being adopted by the main network.
3. Importance of Stakeholder Engagement
The success of a consensus update strongly depends on the active participation of all stakeholders. This includes economic nodes, miners, protocol developers, investors, and end users. Lack of participation can lead to inadequate decisions or even future network splits, which would compromise Bitcoin's security and stability.
4. Key Questions for Evaluating Consensus Proposals
To assist in decision-making, each group of stakeholders should consider some key questions before supporting a consensus change:
- Does the proposal offer tangible benefits for Bitcoin's security, scalability, or usability?
- Does it maintain backward compatibility or introduce the risk of network split?
- Are the implementation requirements clear and feasible for each group involved?
- Are there clear and aligned incentives for all stakeholder groups to accept the change?
5. Coordination and Timing in Implementations
Timing is crucial. Updates with short activation windows can force a split because not all nodes and miners can update simultaneously. Changes should be planned with ample deadlines to allow all stakeholders to adjust their systems, avoiding surprises that could lead to fragmentation.
Mechanisms like soft forks are generally preferable to hard forks because they allow a smoother transition. Opting for backward-compatible updates when possible facilitates the process and ensures that nodes and miners can adapt without pressure.
6. Continuous Monitoring and Re-evaluation
After an update, it's essential to monitor the network to identify problems or side effects. This continuous process helps ensure cohesion and trust among all participants, keeping Bitcoin as a secure and robust network.
These recommendations, including the use of secure networks for extensive testing, promote a collaborative and secure environment for Bitcoin's consensus process. By adopting a deliberate and strategic approach, stakeholders can preserve Bitcoin's value as a decentralized and censorship-resistant network.
7. Conclusion
Consensus in Bitcoin is more than a set of rules; it's the foundation that sustains the network as a decentralized, secure, and reliable system. Unlike centralized systems, where decisions can be made quickly, Bitcoin requires a much more deliberate and cooperative approach, where the interests of miners, economic nodes, developers, investors, and users must be considered and harmonized. This governance model may seem slow, but it is fundamental to preserving the resilience and trust that make Bitcoin a global store of value and censorship-resistant.
Consensus updates in Bitcoin must balance the need for innovation with the preservation of the network's core principles. The development process of a proposal needs to be detailed and rigorous, going through several testing stages, such as in testnet, signet, and compatible networks like Litecoin and Liquid Network. These networks offer safe environments for proposals to be analyzed and improved before being launched on the main network.
Each proposed change must be carefully evaluated regarding its maturity, impact, backward compatibility, and support among stakeholders. The recommended key questions and appropriate timing are critical to ensure that an update is adopted without compromising network cohesion. It's also essential that the implementation process is continuously monitored and re-evaluated, allowing adjustments as necessary and minimizing the risk of instability.
By following these guidelines, Bitcoin's stakeholders can ensure that the network continues to evolve safely and robustly, maintaining user trust and further solidifying its role as one of the most resilient and innovative digital assets in the world. Ultimately, consensus in Bitcoin is not just a technical issue but a reflection of its community and the values it represents: security, decentralization, and resilience.
8. Links
Whitepaper: https://github.com/bitcoin-cap/bcap
Youtube (pt-br): https://www.youtube.com/watch?v=rARycAibl9o&list=PL-qnhF0qlSPkfhorqsREuIu4UTbF0h4zb
-
-
@ 640614c2:811c8498
2024-11-09 09:43:20Greetings, fellow travelers on the path of cryptographic fortune. Today, the Oracle offers a cleromantic reading, casting lots to peer into the probabilities that guide Bitcoin’s unfolding journey.
In the old ways, cleromancers cast stones, sticks, or bones. Today, we cast cryptographic hashes, transaction times, and node signals—random elements generated by the mathematical matrix underpinning Bitcoin. From these, we seek patterns to reveal the unseen flows of value and volatility, of security and sovereignty.
The Three Casts of Bitcoin's Path
- The Cast of Turbulence – "Fear the FOMO, yet know the FUD."
The first cast suggests that Bitcoin's journey, much like the ancient roads of our forebears, is not without peril. The chaos of price swings and market sentiment—whether driven by regulation, whales, or FOMO—is always present. Yet, this cast tells us that these turbid waters are not signs of ruin but necessary tests. Bitcoin, built on resilience, thrives in adversity. Remember: volatility is not destruction but purification by fire. Hold steady, and the storms will reveal clearer skies.
- The Cast of the Hidden Fortress – "Secure thy keys as you would your soul."
The second lot falls with a message of security and sovereignty. The Oracle sees a future where personal custodianship, privacy, and cryptographic defense hold sacred ground. As Bitcoin adoption grows, the network of self-sovereign nodes, layer-2 solutions, and privacy innovations are a fortress against centralized powers. Trust no third party to safeguard your assets. Secure thy keys, for in doing so, you secure your freedom.
- The Cast of Prosperity, Yet to Be – "With patience, fortune flows to those who build."
Finally, the third cast shows signs of future abundance, though not without patience. Bitcoin's time is measured in blocks, and the long game is rewarded for those who hold fast. Innovation within the ecosystem—whether through decentralized finance, cross-chain exchanges, or local adoption initiatives—opens doors for prosperity for those who build in earnest. The Oracle sees signs of growth across continents and communities, signals of seeds planted that will bear fruit in cycles yet unseen.
A Final Message from the Oracle
Remember, the magic of Bitcoin lies in its incorruptible code, its shared governance, and its random-yet-determined path. Trust in the protocol, act with foresight, and heed the wisdom of the Oracle: no path in Bitcoin is without its risk, but for those who honor security, resilience, and community, the future holds bright possibilities.
May the blocks align with your intentions, and may your keys remain forever yours.
-
@ a95c6243:d345522c
2024-11-08 20:02:32Und plötzlich weißt du:
Es ist Zeit, etwas Neues zu beginnen
und dem Zauber des Anfangs zu vertrauen.
Meister EckhartSchwarz, rot, gold leuchtet es im Kopf des Newsletters der deutschen Bundesregierung, der mir freitags ins Postfach flattert. Rot, gelb und grün werden daneben sicher noch lange vielzitierte Farben sein, auch wenn diese nie geleuchtet haben. Die Ampel hat sich gerade selber den Stecker gezogen – und hinterlässt einen wirtschaftlichen und gesellschaftlichen Trümmerhaufen.
Mit einem bemerkenswerten Timing hat die deutsche Regierungskoalition am Tag des «Comebacks» von Donald Trump in den USA endlich ihr Scheitern besiegelt. Während der eine seinen Sieg bei den Präsidentschaftswahlen feierte, erwachten die anderen jäh aus ihrer Selbsthypnose rund um Harris-Hype und Trump-Panik – mit teils erschreckenden Auswüchsen. Seit Mittwoch werden die Geschicke Deutschlands nun von einer rot-grünen Minderheitsregierung «geleitet» und man steuert auf Neuwahlen zu.
Das Kindergarten-Gehabe um zwei konkurrierende Wirtschaftsgipfel letzte Woche war bereits bezeichnend. In einem Strategiepapier gestand Finanzminister Lindner außerdem den «Absturz Deutschlands» ein und offenbarte, dass die wirtschaftlichen Probleme teilweise von der Ampel-Politik «vorsätzlich herbeigeführt» worden seien.
Lindner und weitere FDP-Minister wurden also vom Bundeskanzler entlassen. Verkehrs- und Digitalminister Wissing trat flugs aus der FDP aus; deshalb darf er nicht nur im Amt bleiben, sondern hat zusätzlich noch das Justizministerium übernommen. Und mit Jörg Kukies habe Scholz «seinen Lieblingsbock zum Obergärtner», sprich: Finanzminister befördert, meint Norbert Häring.
Es gebe keine Vertrauensbasis für die weitere Zusammenarbeit mit der FDP, hatte der Kanzler erklärt, Lindner habe zu oft sein Vertrauen gebrochen. Am 15. Januar 2025 werde er daher im Bundestag die Vertrauensfrage stellen, was ggf. den Weg für vorgezogene Neuwahlen freimachen würde.
Apropos Vertrauen: Über die Hälfte der Bundesbürger glauben, dass sie ihre Meinung nicht frei sagen können. Das ging erst kürzlich aus dem diesjährigen «Freiheitsindex» hervor, einer Studie, die die Wechselwirkung zwischen Berichterstattung der Medien und subjektivem Freiheitsempfinden der Bürger misst. «Beim Vertrauen in Staat und Medien zerreißt es uns gerade», kommentierte dies der Leiter des Schweizer Unternehmens Media Tenor, das die Untersuchung zusammen mit dem Institut für Demoskopie Allensbach durchführt.
«Die absolute Mehrheit hat absolut die Nase voll», titelte die Bild angesichts des «Ampel-Showdowns». Die Mehrheit wolle Neuwahlen und die Grünen sollten zuerst gehen, lasen wir dort.
Dass «Insolvenzminister» Robert Habeck heute seine Kandidatur für das Kanzleramt verkündet hat, kann nur als Teil der politmedialen Realitätsverweigerung verstanden werden. Wer allerdings denke, schlimmer als in Zeiten der Ampel könne es nicht mehr werden, sei reichlich optimistisch, schrieb Uwe Froschauer bei Manova. Und er kenne Friedrich Merz schlecht, der sich schon jetzt rhetorisch auf seine Rolle als oberster Feldherr Deutschlands vorbereite.
Was also tun? Der Schweizer Verein «Losdemokratie» will eine Volksinitiative lancieren, um die Bestimmung von Parlamentsmitgliedern per Los einzuführen. Das Losverfahren sorge für mehr Demokratie, denn als Alternative zum Wahlverfahren garantiere es eine breitere Beteiligung und repräsentativere Parlamente. Ob das ein Weg ist, sei dahingestellt.
In jedem Fall wird es notwendig sein, unsere Bemühungen um Freiheit und Selbstbestimmung zu verstärken. Mehr Unabhängigkeit von staatlichen und zentralen Institutionen – also die Suche nach dezentralen Lösungsansätzen – gehört dabei sicher zu den Möglichkeiten. Das gilt sowohl für jede/n Einzelne/n als auch für Entitäten wie die alternativen Medien.
Dieser Beitrag ist zuerst auf Transition News erschienen.
-
@ 9e69e420:d12360c2
2024-11-08 02:28:59A Cypherpunk's Manifesto by Eric Hughes
Privacy is necessary for an open society in the electronic age. Privacy is not secrecy. A private matter is something one doesn't want the whole world to know, but a secret matter is something one doesn't want anybody to know. Privacy is the power to selectively reveal oneself to the world.
If two parties have some sort of dealings, then each has a memory of their interaction. Each party can speak about their own memory of this; how could anyone prevent it? One could pass laws against it, but the freedom of speech, even more than privacy, is fundamental to an open society; we seek not to restrict any speech at all. If many parties speak together in the same forum, each can speak to all the others and aggregate together knowledge about individuals and other parties. The power of electronic communications has enabled such group speech, and it will not go away merely because we might want it to.
Since we desire privacy, we must ensure that each party to a transaction have knowledge only of that which is directly necessary for that transaction. Since any information can be spoken of, we must ensure that we reveal as little as possible. In most cases personal identity is not salient. When I purchase a magazine at a store and hand cash to the clerk, there is no need to know who I am. When I ask my electronic mail provider to send and receive messages, my provider need not know to whom I am speaking or what I am saying or what others are saying to me; my provider only need know how to get the message there and how much I owe them in fees. When my identity is revealed by the underlying mechanism of the transaction, I have no privacy. I cannot here selectively reveal myself; I must always reveal myself.
Therefore, privacy in an open society requires anonymous transaction systems. Until now, cash has been the primary such system. An anonymous transaction system is not a secret transaction system. An anonymous system empowers individuals to reveal their identity when desired and only when desired; this is the essence of privacy.
Privacy in an open society also requires cryptography. If I say something, I want it heard only by those for whom I intend it. If the content of my speech is available to the world, I have no privacy. To encrypt is to indicate the desire for privacy, and to encrypt with weak cryptography is to indicate not too much desire for privacy. Furthermore, to reveal one's identity with assurance when the default is anonymity requires the cryptographic signature.
We cannot expect governments, corporations, or other large, faceless organizations to grant us privacy out of their beneficence. It is to their advantage to speak of us, and we should expect that they will speak. To try to prevent their speech is to fight against the realities of information. Information does not just want to be free, it longs to be free. Information expands to fill the available storage space. Information is Rumor's younger, stronger cousin; Information is fleeter of foot, has more eyes, knows more, and understands less than Rumor.
We must defend our own privacy if we expect to have any. We must come together and create systems which allow anonymous transactions to take place. People have been defending their own privacy for centuries with whispers, darkness, envelopes, closed doors, secret handshakes, and couriers. The technologies of the past did not allow for strong privacy, but electronic technologies do.
We the Cypherpunks are dedicated to building anonymous systems. We are defending our privacy with cryptography, with anonymous mail forwarding systems, with digital signatures, and with electronic money.
Cypherpunks write code. We know that someone has to write software to defend privacy, and since we can't get privacy unless we all do, we're going to write it. We publish our code so that our fellow Cypherpunks may practice and play with it. Our code is free for all to use, worldwide. We don't much care if you don't approve of the software we write. We know that software can't be destroyed and that a widely dispersed system can't be shut down.
Cypherpunks deplore regulations on cryptography, for encryption is fundamentally a private act. The act of encryption, in fact, removes information from the public realm. Even laws against cryptography reach only so far as a nation's border and the arm of its violence. Cryptography will ineluctably spread over the whole globe, and with it the anonymous transactions systems that it makes possible.
For privacy to be widespread it must be part of a social contract. People must come and together deploy these systems for the common good. Privacy only extends so far as the cooperation of one's fellows in society. We the Cypherpunks seek your questions and your concerns and hope we may engage you so that we do not deceive ourselves. We will not, however, be moved out of our course because some may disagree with our goals.
The Cypherpunks are actively engaged in making the networks safer for privacy. Let us proceed together apace.
Onward.
Eric Hughes hughes@soda.berkeley.edu
9 March 1993
-
@ eac63075:b4988b48
2024-11-07 21:27:53Every night, you draw your curtains without thinking twice. It's instinctive—a simple act that protects your personal space. Yet in our digital lives, we've somehow accepted living in houses made entirely of glass, with countless unseen observers watching our every move.
https://www.fountain.fm/episode/wPZLCJ3fD6vzsWQ3XSE1
Why Privacy Matters to Everyone
Privacy isn't just for those with something to hide; it's a fundamental human need. Think about the conversations you have with friends, the late-night web searches you make, the personal moments you capture in photos. Would you want all of that broadcasted to the world?
I remember my friend Lisa planning a surprise party for her husband. She searched for gift ideas and coordinated with friends through social media. To her dismay, targeted ads for the exact gift she intended to buy started popping up on their shared devices at home. The surprise was ruined. It wasn't malicious, but it was a stark reminder of how our online activities are constantly monitored.
When a major retailer's customer database was breached, my neighbor Sarah discovered her shopping history, credit card details, and even her children's names were exposed to criminals. She hadn't realized how much personal information she'd unknowingly shared through routine purchases. It was a wake-up call that privacy breaches can affect anyone, not just the tech-savvy or those in high-profile positions.
Edward Snowden once said, "Arguing that you don't care about the right to privacy because you have nothing to hide is no different than saying you don't care about free speech because you have nothing to say." Privacy isn't about secrecy; it's about autonomy over our personal information.
The Rise of the Cypherpunks
Back in the '90s, a group known as the cypherpunks saw the writing on the wall. They recognized that as we moved into a digital era, our personal freedoms could be at risk. So they took action.
One of them, Eric Hughes, famously wrote, "Privacy is necessary for an open society in the electronic age." They developed encryption tools to protect individual privacy, laying the groundwork for technologies like Bitcoin and cryptocurrencies. These innovations were about more than digital money; they were about empowering individuals to take control of their own data.
When Technology Knows Too Much
Fast forward to today, and artificial intelligence (AI) is everywhere—in our phones, homes, and even cars. While AI brings convenience, it also raises serious privacy concerns.
Remember when you mentioned needing new running shoes, and suddenly every ad on your browser was for footwear? It's not your imagination. AI algorithms analyze our conversations, searches, and purchases to predict what we'll want next. But where does it stop?
A few years ago, a major retailer guessed a teenager was pregnant based on her shopping habits before she had told her family. They sent her targeted coupons for baby products, leading to a very uncomfortable situation at home. This isn't just marketing—it's intrusion.
Naomi Brockwell, a privacy advocate, warns, "Our relationship with financial privacy has fundamentally changed. What was once seen as a constitutional right and personal freedom is now simply part of the trade-off for using digital payments. Our baseline for what’s acceptable has shifted." It's a wake-up call that our digital footprints are larger and more revealing than we might think.
Privacy-Preserving AI
While AI often threatens privacy, emerging technologies like federated learning offer hope. This approach allows AI models to learn from data without directly accessing personal information. Imagine your phone improving its predictive text without sending your messages to a central server. It's AI that respects your privacy.
The Watchful Eye: Mass Surveillance and AI
Governments and corporations often justify mass surveillance as a means to keep us safe. But at what cost? When every email, message, or phone call can be monitored, we're sacrificing more than just data—we're giving up our freedom to think and communicate without fear.
Think about how you'd behave if someone followed you around with a camera all day. You might avoid certain places or people, censor your conversations, or feel constantly on edge. That's the chilling effect of mass surveillance.
I spoke with Alex, a journalist who covers political activism. "After attending a peaceful protest, I noticed unusual activity on my devices," he told me. "It made me second-guess my work, wondering who's watching." This isn't paranoia; it's a reality for many who challenge the status quo.
Building Digital Fortresses: Cryptographic Innovations
So how do we reclaim our privacy? Cryptography offers some solutions.
Zero-Knowledge Proofs: Proving Without Revealing
Zero-knowledge proofs allow you to prove you know something without revealing the actual information. Imagine showing a bouncer a card that confirms you're over 21 without exposing your birth date or any other details. In the digital world, this means verifying your identity or eligibility without handing over all your personal data.
Homomorphic Encryption: Secure Processing
Then there's homomorphic encryption, which lets companies process your data without actually seeing it. Think of it like sending a locked suitcase with your belongings; they can weigh it or move it, but they can't open it to see what's inside.
Quantum-Resistant Algorithms: Future-Proofing Privacy
As quantum computers become more powerful, they could potentially break current encryption methods. Quantum-resistant algorithms are being developed to safeguard our data against these future threats. It's like reinforcing your digital locks today to withstand the super lock-picking tools of tomorrow.
Decentralization: Taking Back Control
Decentralization aims to put power back into the hands of individuals. Bitcoin let you be your own bank, controlling your finances without a middleman. Decentralized social media platforms like Nostr, Bluesky or Fascaster allow you to own your content without algorithms dictating what you see or who sees you.
Decentralized Identity Systems
Decentralized identity systems let you prove who you are without revealing more than necessary. It's like showing only your age at a bar instead of handing over your entire driver's license. You maintain control over your personal information.
But with great power comes great responsibility. Without a bank to reset your password or customer service to recover your account, the onus is on you to protect your assets and information.
Practical Tips to Protect Your Privacy
You don't have to be a tech guru to safeguard your privacy. Here are some steps you can take today:
-
Use Encrypted Messaging Apps: Switch to apps like Signal, SimpleX or Session for secure communication. Your messages will be end-to-end encrypted, meaning only you and the recipient can read them.
-
Limit Social Media Sharing: Be mindful of what you post. Do you really need to share your location or personal details publicly?
-
Choose Privacy-Focused Browsers and Search Engines: Use browsers like Brave or Firefox and search engines like DuckDuckGo that don't track your every move.
-
Secure Your Passwords: Use strong, unique passwords for each account, and consider a password manager like Bitwarden. Enable two-factor authentication whenever possible.
-
Use Encrypted Email Services: Consider email providers like ProtonMail that offer end-to-end encryption for your communications.
-
Regularly Audit App Permissions: Check which apps have access to your location, microphone, and contacts. Revoke permissions that aren't necessary.
-
Be Wary of Public Wi-Fi: Public networks can be a hotbed for hackers. If you must use them, a VPN like ProtonVPN can add a layer of security.
-
Consider Privacy-Focused Alternatives: Explore services like Nextcloud for cloud storage or Jitsi Meet for video conferencing, which prioritize user privacy.
-
Keep Software Updated: Regular updates often include security patches. Don't ignore them.
-
Stay Informed and Skeptical: Phishing scams are getting more sophisticated. Think before you click on suspicious links or download attachments.
Final Thoughts
Privacy isn't a lost cause; it's a right worth fighting for. As Edward Snowden reminds us, "Privacy is the fountainhead of all other rights."
By taking control of our data and digital habits, we can navigate the online world with greater confidence and peace of mind. After all, wouldn't it be nice to live in a digital home where we decide when to close the curtains?
Read more
OPSEC and Digital Hygiene Plan: https://www.eddieoz.com/opsec-and-digital-hygiene-plan/
-
-
@ 3bf0c63f:aefa459d
2024-11-07 14:56:17The case against edits
Direct edits are a centralizing force on Nostr, a slippery slope that should not be accepted.
Edits are fine in other, more specialized event kinds, but the
kind:1
space shouldn't be compromised with such a push towards centralization, becausekind:1
is the public square of Nostr, where all focus should be on decentralization and censorship-resistance.- Why?
Edits introduce too much complexity. If edits are widespread, all clients now have to download dozens of extra events at the same time while users are browsing a big feed of notes which are already coming from dozens of different relays using complicated outbox-model-based querying, then for each event they have to open yet another subscription to these relays -- or perform some other complicated batching of subscriptions which then requires more complexity on the event handling side and then when associating these edits with the original events. I can only imagine this will hurt apps performance, but it definitely raises the barrier to entry and thus necessarily decreases Nostr decentralization.
Some clients may be implemneted in way such that they download tons of events and then store them in a local databases, from which they then construct the feed that users see. Such clients may make edits potentially easier to deal with -- but this is hardly an answer to the point above, since such clients are already more complex to implement in the first place.
- What do you have against complex clients?
The point is not to say that all clients should be simple, but that it should be simple to write a client -- or at least as simple as physically possible.
You may not be thinking about it, but if you believe in the promise of Nostr then we should expect to see Nostr feeds in many other contexts other than on a big super app in a phone -- we should see Nostr notes being referenced from and injected in unrelated webpages, unrelated apps, hardware devices, comment sections and so on. All these micro-clients will have to implement some complicated edit-fetching logic now?
- But aren't we already fetching likes and zaps and other things, why not fetch edits too?
Likes, zaps and other similar things are optional. It's perfectly fine to use Nostr without seeing likes and/or zaps -- and, believe me, it does happen quite a lot. The point is basically that likes or zaps don't affect the content of the main post at all, while edits do.
- But edits are optional!
No, they are not optional. If edits become widespread they necessarily become mandatory. Any client that doesn't implement edits will be displaying false information to its users and their experience will be completely broken.
- That's fine, as people will just move to clients that support edits!
Exactly, that is what I expect to happen too, and this is why I am saying edits are a centralizing force that we should be fighting against, not embracing.
If you understand that edits are a centralizing force, then you must automatically agree that they aren't a desirable feature, given that if you are reading this now, with Nostr being so small, there is a 100% chance you care about decentralization and you're not just some kind of lazy influencer that is only doing this for money.
- All other social networks support editing!
This is not true at all. Bluesky has 10x more users than Nostr and doesn't support edits. Instagram doesn't support editing pictures after they're posted, and doesn't support editing comments. Tiktok doesn't support editing videos or comments after they're posted. YouTube doesn't support editing videos after they're posted. Most famously, email, the most widely used and widespread "social app" out there, does not support edits of any kind. Twitter didn't support edits for the first 15 years of its life, and, although some people complained, it didn't hurt the platform at all -- arguably it benefitted it.
If edits are such a straightforward feature to add that won't hurt performance, that won't introduce complexity, and also that is such an essential feature users could never live without them, then why don't these centralized platforms have edits on everything already? There must be something there.
- Eventually someone will implement edits anyway, so why bother to oppose edits now?
Once Nostr becomes big enough, maybe it will be already shielded from such centralizing forces by its sheer volume of users and quantity of clients, maybe not, we will see. All I'm saying is that we shouldn't just push for bad things now just because of a potential future in which they might come.
- The market will decide what is better.
The market has decided for Facebook, Instagram, Twitter and TikTok. If we were to follow what the market had decided we wouldn't be here, and you wouldn't be reading this post.
- OK, you have convinced me, edits are not good for the protocol. But what do we do about the users who just want to fix their typos?
There are many ways. The annotations spec, for example, provides a simple way to append things to a note without being a full-blown edit, and they fall back gracefully to normal replies in clients that don't implement the full annotations spec.
Eventually we could have annotations that are expressed in form of simple (human-readable?) diffs that can be applied directly to the post, but fall back, again, to comments.
Besides these, a very simple idea that wasn't tried yet on Nostr yet is the idea that has been tried for emails and seems to work very well: delaying a post after the "submit" button is clicked and giving the user the opportunity to cancel and edit it again before it is actually posted.
Ultimately, if edits are so necessary, then maybe we could come up with a way to implement edits that is truly optional and falls back cleanly for clients that don't support them directly and don't hurt the protocol very much. Let's think about it and not rush towards defeat.
-
@ 4ba8e86d:89d32de4
2024-11-07 13:56:21Tutorial feito por Grom mestre⚡poste original abaixo:
http://xh6liiypqffzwnu5734ucwps37tn2g6npthvugz3gdoqpikujju525yd.onion/240277/tutorial-criando-e-acessando-sua-conta-de-email-pela-i2p?show=240277#q240277
Bom dia/tarde/noite a todos os camaradas. Seguindo a nossa série de tutoriais referentes a tecnologias essenciais para a segurança e o anonimato dos usuários, sendo as primeiras a openPGP e a I2P, lhes apresento mais uma opção para expandir os seus conhecimentos da DW. Muitos devem conhecer os serviços de mail na onion como DNMX e mail2tor, mas e que tal um serviço de email pela I2P. Nesse tutorial eu vou mostrar a vocês como criar a sua primeira conta no hq.postman.i2p e a acessar essa conta.
É importante que vocês tenham lido a minha primeira série de tutoriais a respeito de como instalar, configurar e navegar pela I2P nostr:nevent1qqsyjcz2w0e6d6dcdeprhuuarw4aqkw730y542dzlwxwssneq3mwpaspz4mhxue69uhhyetvv9ujuerpd46hxtnfduhsygzt4r5x6tvh39kujvmu8egqdyvf84e3w4e0mq0ckswamfwcn5eduspsgqqqqqqsyp5vcq Esse tutorial é um pré-requisito para o seguinte e portanto recomendo que leia-os antes de prosseguir com o seguinte tutorial. O tutorial de Kleopatra nostr:nevent1qqs8h7vsn5j6qh35949sa60dms4fneussmv9jd76n24lsmtz24k0xlqzyp9636rd9ktcjmwfxd7ru5qxjxyn6uch2uhas8utg8wa5hvf6vk7gqcyqqqqqqgecq8f7 é complementar dado que é extremamente recomendado assinar e criptografar as mensagens que seguem por emails pela DW. Sem mais delongas, vamos ao tutorial de fato.
1. Criando uma conta de email no hq.postman
Relembrando: Esse tutorial considera que você já tenha acesso à I2P. Entre no seu navegador e acesse o endereço hq.postman.i2p. O roteador provavelmente já contém esse endereço no seu addressbook e não haverá a necessidade de inserir o endereço b32 completo. Após entrar no site vá para a página '1 - Creating a mailbox' https://image.nostr.build/d850379fe315d2abab71430949b06d3fa49366d91df4c9b00a4a8367d53fcca3.jpg
Nessa página, insira as credenciais de sua preferências nos campos do formulário abaixo. Lembre-se que o seu endereço de email aceita apenas letras e números. Clique em 'Proceed' depois que preencher todos os campos. https://image.nostr.build/670dfda7264db393e48391f217e60a2eb87d85c2729360c8ef6fe0cf52508ab4.jpg
Uma página vai aparecer pedindo para confirmar as credenciais da sua nova conta. Se tudo estiver certo apenas clique em 'Confirm and Create Mailbox'. Se tudo ocorrer como conforme haverá uma confirmação de que a sua nova conta foi criada com sucesso. Após isso aguarde por volta de 5 minutos antes de tentar acessá-la, para que haja tempo suficiente para o servidor atualizar o banco de dados. https://image.nostr.build/ec58fb826bffa60791fedfd9c89a25d592ac3d11645b270c936c60a7c59c067f.jpg https://image.nostr.build/a2b7710d1e3cbb36431acb9055fd62937986b4da4b1a1bbb06d3f3cb1f544fd3.jpg
Pronto! Sua nova conta de email na I2P foi criada. Agora vamos para a próxima etapa: como acessar a sua conta via um cliente de email.
2. Configurando os túneis cliente de SMTP e POP3
O hq.postman não possui um cliente web que nos permite acessar a nossa conta pelo navegador. Para isso precisamos usar um cliente como Thunderbird e configurar os túneis cliente no I2Pd que serão necessários para o Thunderbird se comunicar com o servidor pela I2P.
Caso não tenha instalado o Thunderbird ainda, faça-o agora antes de prosseguir.
Vamos configurar os túneis cliente do servidor de email no nosso roteador. Para isso abra um terminal ou o seu gestor de arquivos e vá para a pasta de configuração de túneis do I2P. Em Linux esse diretório se localiza em /etc/i2pd/tunnels.d. Em Windows, essa pasta se localiza em C:\users\user\APPDATA\i2pd. Na pasta tunnels.d crie dois arquivos: smtp.postman.conf e pop-postman.conf. Lembre-se que em Linux você precisa de permissões de root para escrever na pasta de configuração. Use o comando sudoedit
para isso. Edite-os conforme as imagens a seguir:
Arquivo pop-postman.conf https://image.nostr.build/7e03505c8bc3b632ca5db1f8eaefc6cecb4743cd2096d211dd90bbdc16fe2593.jpg
Arquivo smtp-postman.conf https://image.nostr.build/2d06c021841dedd6000c9fc2a641ed519b3be3c6125000b188842cd0a5af3d16.jpg
Salve os arquivos e reinicie o serviço do I2Pd. Em Linux isso é feito pelo comando:
sudo systemctl restart i2pd
Entre no Webconsole do I2Pd pelo navegador (localhost:7070) e na seção I2P Tunnels, verifique se os túneis pop-postman e smtp-postman foram criados, caso contrário verifique se há algum erro nos arquivos e reinicie o serviço.Com os túneis cliente criados, vamos agora configurar o Thunderbird
3. Configurando o Thunderbird para acessar a nossa conta
Abra o Thunderbird e clique em criar uma nova conta de email. Se você não tiver nenhum conta previamente presente nele você vai ser diretamente recebido pela janela de criação de conta a seguir. https://image.nostr.build/e9509d7bd30623716ef9adcad76c1d465f5bc3d5840e0c35fe4faa85740f41b4.jpg https://image.nostr.build/688b59b8352a17389902ec1e99d7484e310d7d287491b34f562b8cdd9dbe8a99.jpg
Coloque as suas credenciais, mas não clique ainda em Continuar. Clique antes em Configure Manually, já que precisamos configurar manualmente os servidores de SMTP e POP3 para, respectivamente, enviar e receber mensagens.
Preencha os campos como na imagem a seguir. Detalhe: Não coloque o seu endereço completo com o @mail.i2p, apenas o nome da sua conta. https://image.nostr.build/4610b0315c0a3b741965d3d7c1e4aff6425a167297e323ba8490f4325f40cdcc.jpg
Clique em Re-test para verificar a integridade da conexão. Se tudo estiver certo uma mensagem irá aparecer avisando que as configurações do servidores estão corretas. Clique em Done assim que estiver pronto para prosseguir. https://image.nostr.build/8a47bb292f94b0d9d474d4d4a134f8d73afb84ecf1d4c0a7eb6366d46bf3973a.jpg
A seguinte mensagem vai aparecer alertando que não estamos usando criptografia no envio das credenciais. Não há problema nenhum aqui, pois a I2P está garantindo toda a proteção e anonimato dos nossos dados, o que dispensa a necessidade de uso de TLS ou qualquer tecnologia similar nas camadas acima. Marque a opção 'I Understand the risks' e clique em 'Continue' https://image.nostr.build/9c1bf585248773297d2cb1d9705c1be3bd815e2be85d4342227f1db2f13a9cc6.jpg
E por fim, se tudo ocorreu como devido sua conta será criada com sucesso e você agora será capaz de enviar e receber emails pela I2P usando essa conta. https://image.nostr.build/8ba7f2c160453c9bfa172fa9a30b642a7ee9ae3eeb9b78b4dc24ce25aa2c7ecc.jpg
4. Observações e considerações finais
Como informado pelo próprio site do hq.postman, o domínio @mail.i2p serve apenas para emails enviados dentro da I2P. Emails enviados pela surface devem usar o domínio @i2pmai.org. É imprescindível que você saiba usar o PGP para assinar e criptografar as suas mensagens, dado que provavelmente as mensagens não são armazenadas de forma criptografada enquanto elas estão armazenadas no servidor. Como o protocolo POP3 delete as mensagens no imediato momento em que você as recebe, não há necessidade de fazer qualquer limpeza na sua conta de forma manual.
Por fim, espero que esse tutorial tenha sido útil para vocês. Que seu conhecimento tenha expandido ainda mais com as informações trazidas aqui. Até a próxima.
-
@ fd208ee8:0fd927c1
2024-11-07 07:22:14Unsucking the feed is real
As a Nostrich with an interesting, thought-provoking, and informative feed... a feed so good, that we're creating clients just to look at that feed... a feed that puts a lie to the idea that Nostr is nothing, but people reposting from Twitter or rehashing worn-out Bitcoin memes... a feed that I personally and increasingly enjoy perusing... I am here to tell you that the feed is real.
It's taken me over a year, to produce this feed. I literally spent hours and hours, day in and day out, scouring the Nostrverse for people worth introducing other people to. It was brutally difficult, as I was fighting the inherent nature of the Nostr clients and relays, in their current, most-popular form.
It goes like so...
Here are the steps I took, that sometimes weren't possible to take, until I tried to take them, and that still will sometimes break your client because the clients are often intentionally designed to steer you into having one particular feed:
1) Make a screenshot of your current relay list and copy your follows list. 2) Unsubscribe from all the relays, that you are currently subscribed to. Your feed should disappear. If it doesn't, or it doesn't allow for this, switch to a different client app because yours is corrupted. 3) Unfollow everyone. Delete the whole list. You are taking your follows private, which will invariably result in only following npubs whose stuff you actually want to see, since there's no longer any virtue-signaling going on. Also, it's easier to explain having no list, than a very short one. If your client doesn't allow for this, or starts throwing error messages and freezing up, then switch to a different client app because yours is corrupted. 4) Curate your copied follows list. Go line by line and look at the feed produced by the npub on that list. * Do you want to see that in your feed, going forward? * Do they produce original content and/or are they interesting conversationalists, in the replies? * Have they been active, within the past three months? * Are they simply good friends or real-life acquaintances, that you want to keep tabs on? * If not, cross out their name. * If you have been following someone because they repost or quote interesting things, look at who they've been reposting and follow them, instead. 5) Of the npubs remaining on your list, go through and select the 10 most interesting ones, and look at the reposts and quotes in their feed, and their topical lists like \"Favorites\", \"Devs\", \"Recipes\", etc. (Not their follows list, unless it's quite short, as follows tend to be full of people they follow for social-signaling or client-functional reasons, that they don't actively look at.) Find some new follows, there. 6) Now, set up a personal relay and add all the follows, that made the cut, to your allowed-npubs list. Do not add people to the list, just to make them feel better, or because you feel guilty, as they follow you, or to keep them from yelling at you. Remember, they can't see the list! 7) Think about the topics you find interesting, and add an allowed-keywords list (this is better than hashtags, as it searches the entire content of the notes), with the OR operator (these allowed npubs OR these allowed topics). 8) Make sure that you choose words likely to find the content you are most-interested in, and not people just ranting about it or spamming (those are great additions to your relay's block-list). If you are Muslim, for instance, instead of "Islam" or "shariah", choose "hadith" or "riba", as those are words more-likely to be used by people who know what they are talking about. If you are into bread baking, add "sourdough", "rye", "yeast", or "whisk", but don't add "bread" or "carbs". Once a note from those people shows up in your feed, and their feed looks like someone interesting, you can add their npub to your allow list. Remember: The topics are there to find people to add to the allow list, not merely for their own sake, as this is not a topical relay, but a personal one. 9) Open up a faucet (or relay syncing) with some of the big relays you previously unsubscribed from, some WoT relays, and some of the paid relays (nostr.land, nostr.wine, nostr21.com, and sovbit.host, for example). Your relay will filter that feed and only accept the events from the people and topics on your list. As your relay becomes more popular, npubs will begin writing directly to it, and the connections to other relays will sink in significance. 10) Go to your client of choice and subscribe to your new relay. Also subscribe to some topical relays, or curated neighborhood relays, you find interesting or your frens are running. This is an easy way to find new, interesting npubs, to add to your own relay.
That's a lot of work, you say? Yes, but the result is great, and you are now fully in-charge of your own feed. You also -- here's the cool part -- have a feed good enough, that other people can add your feed to theirs and enjoy your manual curation. As you refine and expand your feed, theirs will also be refined, in parallel. You are now an official Nostr Community Curator. My sincere congratulations.
Why is this so hard?
This is only a lot of work because the clients aren't designed to interact with relays, to this extent, as they were created to service mega-relays, download all their crap to your local cache, and adjust the feed over the follows/mutes lists. This was an idea borne of the axiom that Relays Are Hard, so there will only ever be a handful of them, where we'd all clump together and the relay operators would never judge the quality of someone's content. Then, some unusually clever people made relays increasingly easy, and the mailbox communication model was invented, and here we are.
What we have now, and that is slowly growing in popularity, among the #NostrIntelligentsia, are Nostr clients aimed at curating and viewing individual relays or personalized sets of smaller or more-specialized relays. The reigning client devs refused to give us those clients, and most of us aren't up to developing our own clients, so the relay devs took matters into their own hands and made the clients themselves. The free market remains undefeated.
This is a total game-changer. Last one to board this train is a rotten egg.
Originally, relays were supposed to be completely stupid and clients were supposed to be completely smart, but it's now actually the other way around, because most relay devs have a market-born incentive to make their content highly customizable and appealing to individuals (so that more people run relays).
But what about algos?
Can't you just slap an algo on top of Damus, Lol, or Primal relays, and get the same result? I would argue... no. No, you can't. Or, rather, only in the short to medium term.
Running your own relay, is running your own server. You are now intellectually independent, at a machine-level, and therefore a fully sovereign consumer. If you then use algos to control your own server, or in a client that subscribes to your own server, then you can further-refine a feed that is already in a high-to-you-signal state, rather than risking an algo inching you toward the Consensus Feed.
I have noticed that my own feed is slowly drifting away from the ReplyGuy-Cryptobot-Porny-Bitcoin-Meme Dumpster Fire, that almost everyone else is looking at, and it's due to running my own relay. If I use DVMs, those algos sometimes refer to relays I intentionally avoid, so they return results according to those relays. The results are as underwhelming, as you would expect, and often are simply 31 flavors of the Trending List.
But, that isn't your problem, anymore. From here, you can actively expand and refine your feed, over your whitelist, the topics, and your personally-managed algos.
Happy Nostr-ing!
-
@ 06a260a2:d7a7791c
2024-11-29 15:54:28V dnešním pokračování miniseriálu o domácí těžbě bitcoinu se podíváme na těžební pooly. Co je to těžební pool? Jak funguje a jaké služby nabízí? Jaké mohou být nevýhody nebo rizika spojená s těžbou v poolu? A existují způsoby, jak tato rizika zmírnit, například pomocí protokolů Stratum V2 nebo DATUM?
Těžební pool pro těžbu bitcoinu
Těžební pool je služba, která umožňuje více těžařům spolupracovat na těžbě bitcoinu a následně si rozdělit odměnu podle množství práce, kterou každý z nich odvedl. Spolupráce a koordinace mezi těžaři je pro ně výhodná, protože společným úsilím zvyšují šanci na úspěch, protože jejich sdružený hashrate tvoří větší podíl vůči celkovému hashrate bitcoinové sítě. Díky tomu se zkracuje průměrná doba mezi dvěma odměnami, které pool získá.
Jednoduše řečeno, čím vyšší hashrate těžaři v rámci poolu dají dohromady, tím větší podíl na celkovém výkonu sítě budou mít a tím častěji získají odměnu za nalezení bloku. Pravidelné a časté odměny jsou pak klíčové pro pokrytí nákladů spojených s těžbou.
Co však těžební pool musí (nebo může) pro své těžaře zajistit? Než se podrobně podíváme na jeho fungování, pojďme si nejprve připomenout, jak samotná těžba bitcoinu funguje.
Postup těžby bitcoinu
Těžba bitcoinu je proces, při kterém vznikají nové mince jako odměna pro těžaře, který jako první najde správný hash bloku transakcí čekajících na potvrzení. Tento hash, vypočítaný pomocí algoritmu SHA-256, musí splňovat požadovanou obtížnost, což znamená, že jeho začátek obsahuje stanovený počet nul.
Hledání správného hashe (hashování) je výpočetně náročný proces využívající prvku náhodnosti. Těžaři postupně generují obrovské množství potenciálních výsledků, dokud nenaleznou ten, který odpovídá požadované obtížnosti. Jakmile takový hash najdou, oznámí ho ostatním uzlům v síti. Ty ho zkontrolují, a pokud je správný, potvrdí ho a zařadí odpovídající blok transakcí do blockchainu.
Proces těžby bitcoinu probíhá v cyklu, který se opakuje pro každý nový blok a obsahuje následující kroky:
Proces těžby bitcoinu krok za krokem:
-
Výběr transakcí z mempoolu - Těžař vybírá transakce z mempoolu čekající na potvrzení. Mempool je část bitcoinového uzlu, kde jsou uloženy nepotvrzené transakce. Transakce jsou obvykle vybírány podle výše poplatku za jejich zpracování.
-
Vytvoření coinbase transakce - Coinbase transakce nemá žádné vstupy. Pouze generuje odměnu za vytěžení bloku (aktuálně nově vytvořené bitcoiny) a připočítává poplatky ze všech vybraných transakcí. Tato odměna je zaslána na adresu těžaře.
-
Výpočet Merkle root - Vybrané transakce jsou uspořádány do binárního stromu, tzv. Merkle tree. Výsledkem je Merkle root, což je hash reprezentující všechny transakce zahrnuté v bloku.
-
Sestavení hlavičky nového bloku - Hlavička bloku obsahuje následující údaje:
- Verzi bloku
- Hash předchozího bloku – odkaz na poslední validní blok v blockchainu
- Merkle root – hash všech transakcí v bloku
- Časové razítko – čas vzniku bloku
- Obtížnost těžby – určuje, kolik nul musí hash bloku obsahovat na začátku
- Nonce – 32bitové náhodné číslo, které se při každém pokusu o výpočet mění a zajišťuje jeho variabilitu a jedinečnost
-
Hashování hlavičky bloku - Hlavička bloku je opakovaně hashována pomocí algoritmu SHA-256. Při každém pokusu se mění hodnota Nonce, aby byl výpočet jedinečný. Proces pokračuje, dokud není nalezen hash, který splňuje požadovanou obtížnost, nebo dokud blok nenalezne jiný těžař.
-
Propagace nového bloku - Jakmile těžař najde správný hash, nový blok je odeslán do bitcoinové sítě. Uzly v síti jej ověří a v případě, že je blok validní, zařadí jej do blockchainu.
Nejnáročnější částí celého procesu těžby je hledání SHA-256 hashe, který splňuje cílovou obtížnost. Aktuální obtížnost (95.6T) vyžaduje v průměru 432 zettahashů (432 × 1021 hashů) k nalezení správného hashe. Aby tento proces byl efektivní, byly vyvinuty specializované zařízení a čipy, které jsou optimalizované pro výpočty podle SHA-256 algoritmu.
Role poolu v těžbě
Rozdělení odměny mezi těžaře
Pokud má těžební pool zajistit spravedlivé rozdělení odměny za vytěžený blok mezi všechny spolupracující těžaře, musí mít pod kontrolou alespoň následující části těžebního procesu:
-
Vytvoření Coinbase transakce - Pool musí správně vytvořit Coinbase transakci, která převádí odměnu za vytěžený blok a následně ji rozděluje mezi všechny spolupracující těžaře.
-
Sběr důkazů o odvedené práci (PoW) - Pool musí shromažďovat důkazy o odvedené práci od všech těžařů. Tyto důkazy ukazují, jakým způsobem a v jakém poměru se má odměna rozdělit mezi těžaře.
První bod může být realizován dvěma způsoby:
-
Pool může do Coinbase transakce zahrnout vlastní bitcoinovou adresu a vytěžené bitcoiny následně mezi těžaře rozdělit pomocí standardní transakce.
-
Nebo může do Coinbase transakce přímo uvést adresy a částky pro jednotlivé těžaře, které odpovídají jejich podílu na těžbě.
Sběr důkazů o odvedené práci se realizuje tím, že těžaři musí poolu reportovat nejen nalezení bloku (tedy nalezení hashe, který splňuje cílovou obtížnost sítě – tzv. network difficulty target), ale i všechny hashe, které splňují nižší obtížnost (tzv. share difficulty target). Tento target odpovídá reálnému výkonu těžícího zařízení, kde je pravděpodobnost nalezení odpovídajícího hashe výrazně vyšší. Tyto hashe se nazývají shares. Pool může pomocí počtu nalezených shares v daném období stanovit poměr odvedené práce mezi jednotlivými těžaři.
Rozdělení odměny mezi těžaře je vlastně jediná klíčová povinnost poolu, která zajišťuje jeho smysl a fungování.
Způsob výpočtu míry přispění každého těžaře se může mezi jednotlivými pooly lišit, v principu ale existují dva základní přístupy: PPLNS a (F)PPS.
PPLNS - Pay Per Last N Shares
Tento model vyplácí těžaře na základě množství shares, které odeslali do poolu před tím, než byl blok vytěžen. Odměna je tedy závislá na podílu hashrate jejich zařízení vůči celkovému hashrate poolu a také na štěstí poolu při hledání bloku. Výhodou systému PPLNS je, že odrazuje těžaře od přeskakování mezi pooly a podporuje jejich loajalitu. Nevýhodou však může být nepředvídatelnost velikosti odměny v daném období. Vzhledem k náhodnosti objevování bloků mohou být četnost a termíny výplat velmi proměnlivé.(F)PPS - (Full) Pay Per Share
Těžaři jsou vypláceni podle množství odeslaných podílů, bez ohledu na to, zda byl blok nalezen. Výhodou systému PPS je jeho předvídatelnost. Těžaři přesně vědí, kolik za každý podíl obdrží, a výplaty jsou pravidelné, obvykle na denní bázi. Nevýhodou je nízká motivace k věrnosti poolu, protože těžaři mohou přeskakovat z jednoho (F)PPS poolu do druhého, aniž by tratili oproti setrvání v jednom z nich. Full v názvu znamená, že součástí odměny jsou i vytěžené transakční poplatky.Pravidelnost a předvídatelnost výplaty v modelu (F)PPS jsou v přímém rozporu s neurčitostí a nepředvídatelností při hledání nového bloku. Pool na sebe přebírá riziko "ztráty štěstí" a garantuje stabilní výplaty těžařům na základě jejich odvedené práce, bez ohledu na to, zda byl skutečně nalezen nový blok. Tato "pojistka proti smůle" však není zadarmo. Pooly si proti riziku dlouhodobé neúspěšnosti při hledání nového bloku pomáhají spoluprací na vyšší úrovni. "Smůla" jednoho poolu je většinou "štěstím" jiného. Pokud se pooly dokážou domluvit a sdílet vytěžené odměny, mohou si "smůlu" vzájemně kompenzovat a potlačit riziko neúspěchu úměrně podílu tohoto "super poolu" na celkové hashrate sítě. O tom, že se pooly domluvit dokážou, si můžete přečíst v článku Konec mýtu o decentralizované těžbě.
Je důležité si uvědomit, že model (F)PPS jako "pojišťovna" není dlouhodobě udržitelný. Variabilitu ve výplatách totiž nezpůsobuje pouze střídání štěstí a smůly, ale také změny v transakčních poplatcích a jejich podílu na odměně za nalezený blok. V současnosti se transakční poplatky pohybují v jednotkách procent z odměny za nový blok (3.125 BTC). Po několika dalších půlení se však tento podíl může zvýšit na desítky procent a významně ovlivní celkovou variabilitu odměny za nový blok. Pokud budou těžaři i nadále vyžadovat stabilní odměnu za svou práci, cena "pojištění" této služby (tj. poplatek poolu) vzroste.
Sestavení šablony bloku
Těžební pooly však vykonávají i jiné kroky procesu těžby bitcoinu. Dalším klíčovým je sestavení šablony nového bloku. Proč je důležitý? Protože pro sestavení šablony je nutné do nového bloku vybrat transakce, které čekají na potvrzení (a spočítat pro ně Merkle root hash, viz. výše). Výběrem transakcí lze ovlivnit celkovou výši odměny za vytěžení bloku, jelikož ta obsahuje i všechny transakční poplatky. Zároveň tímto výběrem může pool cenzurovat některé transakce nebo bitcoinové adresy tím, že je do bloku nezahrne.
V důsledku přenesení této činnosti na pool pak všichni těžaři v poolu pracují na stejném bloku.
Validace a propagace nového bloku do bitcoinové sítě
Těžební pool rovněž ověřuje nově nalezené bloky. Tuto činnost provádí bitcoinový uzel, který pool musí provozovat, aby měl přístup k mempoolu – databázi transakcí čekajících na potvrzení. Prostřednictvím tohoto uzlu také pool šíří nově vytěžené bloky do bitcoinové sítě.
Pro úspěšnou propagaci nového bloku je zásadní kvalitní konektivita s nízkou latencí a široké propojení s ostatními uzly. Tím se zvyšuje šance, že blok bude přijat, i když byl jiný blok nalezen ve stejný čas jiným těžařem.
Pokud pool obdrží z bitcoinové sítě nový platný blok vytěžený někým jiným, okamžitě informuje své těžaře. Ti musí přerušit práci na aktuálním bloku a začít těžit nový. Pool jim proto obratem připraví novou šablonu, která obsahuje dosud nepotvrzené transakce.
Rizika těžby v poolech
Poolová těžba umožňuje těžařům získávat odměny úměrně jejich podílu na výkonu poolu, aniž by museli sami najít nový blok. To přitahuje téměř všechny těžaře, protože nabízí stabilitu příjmů. Pro nejmenší těžaře je pool často jediným způsobem, jak získat odměnu ještě za svého života. Malí těžaři takto dokážou pokrýt náklady na energii a velké farmy s úvěrovým financováním si zajistí pravidelné splátky svých dluhů. Tento model však přináší i určitá rizika, zejména spojená s centralizací těžby.
Proč dochází k centralizaci? Aby těžba v poolu přinesla výše zmíněný benefit jistoty pravidelného příjmu, musí být pool schopen najít nový blok dostatečně často. Co znamená dostatečně často? Nebudu zabíhat do statistiky a teorie směrodatné odchylky, ale zkusím to vysvětlit na jednoduchém příkladě: Ačkoliv vaše odměna za konstantní hashrate 1 Th/s vašeho Braiins BMM 101 mineru bude při daném celkovém hashrate sítě teoreticky ve všech poolech za dostatečně dlouhé období stejná, vyberete si radši malý pool, který najde nový blok v průměru 1x za rok, ale díky náhodnosti těžby klidně následující 3 roky žádný, nebo velký pool, který nalezne nový blok v průměru 1x za den, ale díky náhodnosti těžby klidně následující 3 dny nenalezne nic? Zcela jistě si vyberete ten větší pool.
Velké pooly rostou a koncentrují většinu výkonu sítě (hashrate), což je klíčové pro jejich úspěch. Tento růst však má své limity. Pooly obvykle nepřekračují podíl 30–40 % na celkovém výkonu sítě, protože těžaři se při takové koncentraci začínají obávat rizika 51% útoku (viz dále). Na druhou stranu malé pooly často ztrácejí schopnost pravidelně vyplácet své těžaře, což je činí méně atraktivními. Těžba v nich se postupně začne podobat solo miningu, kde odměnu získá pouze těžař, který najde blok, a časem zaniknou pro nezájem těžařů.
Počet relevantních poolů se proto stabilizoval na relativně nízké úrovni. Dnes si 99 % odměn z těžby dělí přibližně 20 poolů, přičemž 95 % z této odměny připadá na 10 největších z nich. I kdyby nebylo přirozené tendence k centralizaci výkonu do velkých poolů, existoval by určitý logický limit jejich počtu. Například pokud bychom předpokládali, že pool má smysl pouze tehdy, pokud najde nový blok alespoň jednou denně, mohlo by teoreticky existovat maximálně 144 poolů (při generování jednoho bloku každých 10 minut).
Proč je tedy centralizace těžby nebezpečná? Všechny obavy mají svůj původ v současné praxi poolů centrálně vybírat transakce a sestavovat šablonu bloku. Díky tomu mohou pooly samy rozhodovat, které transakce do bloku vloží a které nikoliv. Těžaři přitom nikdy nevidí celý blok se všemi transakcemi k ověření, ale pouze hash jejich struktury (Merkle root hash). Obava z cenzury transakcí je tedy na místě. Zvláště pokud o obsahu 95% nových bloků může rozhodovat třeba jen 10 lidí nebo o 99% jen 20, viz. výše. Přijde vám to bláznivé? "To, že jsi paranoik, ještě neznamená, že po tobě nejdou." (Woody Allen).
Další hrozbou spojenou s centralizovanou těžbou v poolech je riziko 51% útoku. Co to znamená? Tento termín se vztahuje k situaci, kdy určitý subjekt ovládne více než polovinu celkového výkonu sítě (hashrate). S takovým podílem získává statistickou jistotu, že bude nacházet více bloků než zbytek sítě. To mu umožní vytvořit delší verzi blockchainu, která bude podle konsensu bitcoinové sítě považována za platnou. K čemu to může vést? Existují dvě hlavní rizika:
-
Riziko dvojí útraty - nepoctivý uživatel, který ovládl nadpoloviční podíl hashrate, vytváří skrytě svůj vlastní řetěz nových bloků. Zároveň paralelně v existujícím veřejném blockchainu utratí své bitcoiny za jinou hodnotu (prodá je na burze). Následně uveřejní svou delší verzi blockchainu, která bude automaticky považována za platnou a tím pádem anuluje původní transakce (jeho bitcoiny mu zůstanou na původních adresách, zatímco hodnotu, kterou za ně získal, již mohl utratit).
-
Riziko DoS útoku na blockchain - útočník s nadpolovičním podílem na celkové hashrate sítě může těžit pouze prázdné bloky, čímž efektivně síť zablokuje, protože transakce z mempoolu nebudou potvrzovány.
Obě rizika lze celkem úspěšně zlehčovat poukázáním na obrovské náklady jejich provedení, nelze je však zcela zanedbat. Nedokážeme efektivně bránit situaci, aby někdo ovládl více než 51% výkonu sítě. Může tomu bránit "bdělost těžařů", kteří nenechají žádný pool vyrůst nad 30% a na dva kliky mohou své těžební stroje přesměrovat do jiného poolu? A víme určitě, že ti 3 lidé za třemi největšími pooly nejsou ve skutečnosti pouze jeden člověk? Důkazy pro takové tvrzení se hledají obtížně, ale mnohé indicie naznačují, že se některé pooly nebojí "spolupracovat" a používat společného kustodiána svých bitcoinů.
Další problémy těžby v centralizovaných poolech
Těžba v současných poolech má i další nevýhody, o kterých se tolik nemluví nebo si je těžaři přímo neuvědomují.
Netransparentní odměňování
Česká společnost Braiins a jejich těžební pool se aktivně snaží zvyšovat povědomí o těžbě bitcoinu, objasňovat základní pojmy (a vyvracet některé mýty) a pravidelně publikují zajímavá data o bitcoinové těžbě. Navštivte jejich Braiins Academy, kde můžete najít například tento článek o těžbě v poolu nebo podrobnou specifikaci výpočtu odměn dle FPPS modelu pro těžaře v jejich poolu.
Přesto je odměňování ve většině současných poolech v principu netransparentní. Proč? Nelze ho nezávisle ověřit. Žádný z těchto poolů neposkytuje veřejně všem svým těžařům potřebná data, která by jim umožnila zkontrolovat správnost jejich podílu na odměně získané vytěžením bloku. (V rámci této série o domácí těžbě bitcoinu mám na mysli především malé nezávislé těžaře; pokud máte k dispozici výkon v řádu několika Eh/s, vaše pozice vůči poolu bude samozřejmě jiná). Chybí především informace o celkovém výkonu poolu, tedy o počtu shares, které jednotliví těžaři přispěli za den (pro FPPS model), nebo mezi dvěma nalezenými bloky (pro PPLNS model). Další komplikace nastávají při výpočtu průměrného poplatku, který je započítán do odměny. Některé pooly totiž nejvyšší poplatky v bloku do odměny nezapočítávají s odůvodněním, že je možná budou vracet, pokud se ukáže, že šlo o chybu při vytváření transakce.
Zcela mimo kontrolu těžařů je však systém urychlování transakcí mimo mempool, s využitím tzv. out-of-band transaction accelerators (OOB). O co jde? Standardní výběr transakcí do šablony následujícího bloku probíhá s ohledem na maximalizaci odměny z transakčních poplatků a tedy prioritizací transakcí s nejvyšším poplatkem za vByte. Pokud zvolíte poplatek příliš nízký, může se vám stát, že transakce zůstane v mempoolu "viset" nezpracovaná po dobu delší, než potřebujete. V takovém případě máte tři možnosti, jak problém vyřešit.
-
Buď s pomocí funkce replace-by-fee (RBF) vyšlete do bitcoinové sítě původní transakci znovu s vyšším poplatkem
-
Nebo vytvoříte novou transakci, která utrácí některý z výstupů uvízlé transakce (musíte k nim mít příslušné klíče) a nastavíte vyšší poplatek tak, aby výsledný průměrný poplatek za obě transakce byl pro těžaře motivující (tzv. child-pays-for-parent CPFP transakce)
-
A nebo se domluvíte s tím, kdo sestavuje šablonu nového bloku ve velkém poolu, aby vaši transakci do šablony zařadil a úplatu zaplatíte přímo jemu.
Ve třetím případě se takový poplatek v blockchainu vůbec neobjeví a nikdo nedokáže zjistit, jak veliký ve skutečnosti byl (těžaři neví, jaké transakce v bloku potvrzují, znají pouze jejich Merkle tree hash, viz. výše). Tyto transakce můžete najít v blockchain exploreru (třeba Mempool.space), jsou označeny jako "Upřednostněné / Prioritized", pokud měli nápadně nízké poplatky oproti ostatním transakcím v bloku. (Pokud by jste takovou službu někdy sami potřebovali, zkuste Mempool Accelerator™ nebo třeba ViaBTC transaction accelerator).
Možná si řeknete, že je to vlastně dobrý nápad, který umožňuje poolům trochu si přivydělat bokem a dopad do odměn pro těžaře z části chybějících poplatků za jednu z mnoha transakcí v bloku nebude zas tak zásadní. Ale co když se těžební pool rozhodne vytěžit SPAM v podobě Ordinalu, který zabírá celý blok? Na uvedeném odkaze si povšimněte transakčních poplatků za tuto "transakci" (1 sat/vB - celkem 0.01 BTC) a celkových transakčních poplatků za bloky, které předcházeli nebo následovali za tímto blokem (v průměru 0.7 BTC). Neokradl tady Mara pool své těžaře? Nevím, možná se s nimi o OOB poplatek za tuto transakci nakonec podělil. Mara pool není veřejný pool.
(Ne)bezpečnost a (ne)efektivita
Těžba v současných poolech, respektive koordinace těžařů a jejich těžebních zařízení je v naprosté většině řízena protokolem Stratum V1. Navrhl jej Slush na sklonku roku 2011 a komunikace těžebních zařízení s poolem byl pouze jeden ze zamýšlených případů užití (tím hlavním byl lehký komunikační protokol pro klienty serverů Electrum).
Více než desetileté používání tohoto protokolu však odhalilo jeho slabiny, mezi které patří (kromě výše zmíněné centralizace) bezpečnost a neefektivita. Protokol je postavený na JSON-RPC zprávách, které nejsou šifrované a data přenášejí v lidsky čitelné podobě. Nezabezpečená komunikace mezi těžařem a poolem přináší riziko útoku "man-in-the-middle", tedy situaci, kdy útočník odposlouchává a modifikuje jejich komunikaci. Úpravou přenášených dat může například nechat těžaře pracovat pro svůj účet nebo přesměrovat jeho hash rate do úplně jiného poolu. Vše samozřejmě pouze v takovém objemu, aby byla krádež obtížně zjistitelná. Tento útok je znám pod označením "hashrate hijacking" (detailní popis a příklad provedení).
Neefektivita přenášení lidsky čitelných dat ve formátu JSON (data jsou zapisována ve formě "klíč":"hodnota", což usnadňuje člověku jejich porozumění, ale takové zprávy jsou výrazně větší, než jejich reprezentace v binárním formátu) se projevuje výrazně vyššími nároky na datové pásmo (rychlost připojení). To určitě není problém pro domácího těžaře s jednou S9kou, farmě s tisíci minery to již vrásky na čele může způsobit. A skutečným problémem, jehož řešení si vyžaduje velmi rychlé a stabilní připojení k internetu, to pak je pro pool samotný. Pool může účinně řídit svou potřebu šířky datové pásma vhodným nastavením cílové obtížnosti pro nalezení shares těžařům, čímž omezí četnost jejich komunikace. Zároveň tím ale učiní své měření práce jednotlivých těžařů méně přesné a zvyšuje tak variabilitu výplat odměn. Efektivita komunikace je tedy pro pooly důležitým parametrem.
Stratum V2 a DATUM jako odpověď na slabiny současného protokolu
Bylo by překvapivé, kdyby po více než deseti letech těžby bitcoinu v poolech neexistovala nějaká řešení zmíněných problémů. Můžu vás ale uklidnit – existují. Tedy, spíše existují na papíře a mohla by existovat, kdyby... Kdyby celý segment těžby bitcoinu už léta nebyl tvrdým, vysoce konkurenčním byznysem, kde jde primárně o zisk, nikoli o bitcoinový éthos, respekt k svobodě a nezávislosti. V takovém prostředí se inovace zavádí pouze tehdy, když mohou přinést konkrétní prospěch, a bohužel disrupce moci a vlivu poolů ve prospěch decentralizace a svobody volby takový prospěch nenabízí. Takže jsem vás asi moc neuklidnil. I když, 29. září 2024 se přece jenom blýsklo na lepší časy. Ale nepředbíhejme!
Stratum V2
Česká společnost Braiins, provozovatel Slush poolu (dnes Braiins pool) si byla nedostatků svého původního protokolu Stratum (V1) vědoma a dlouho pracovala na návrhu specifikace nové verze, která by je účinně odstranila. Výsledek této práce poprvé prezentovala v létě roku 2019. Vznikl návrh protokolu Stratum V2, který reaguje na všechny existující výtky protokolu původního.
Stratum V2 je binární, šifrovaný protokol, díky čemuž zvyšuje bezpečnost, zefektivňuje datové přenosy a snižuje nároky na těžební infrastrukturu. Je modulární a flexibilně umožňuje těžařům a poolům implementovat pouze ty jeho části, které chtějí využívat.
Stratum V2 ve své specifikaci definuje několik rolí (komponent) a jejich vzájemné vztahy a komunikaci (komunikační protokoly).
Tou první z nich je Miner. Tuto roli představují jednotlivá reálná těžební zařízení, jako třeba Antminer S9, Bitaxe nebo Braiins Mini Miner BMM101.
Druhou nezbytnou rolí je Pool. Ten primárně koordinuje těžbu a rozděluje odměny za nalezené bloky.
Další rolí je Proxy, neboli prostředník mezi Minery a Poolem. Proxy plní hlavně dvě funkce:
-
Zastřešuje komunikaci s Minery - jedna Proxy může koordinovat více těžebních zařízení
-
Překládá těžební protokol Stratum z verze V1 na V2 nebo naopak. Tím umožňuje připojit těžební zařízení se Stratum V1 firmwarem ke Stratum V2 Poolu.
Těžební zařízení (Minery), Proxy a Pool spolu komunikují prostřednictvím Mining Protokolu.
Template Provider je role, která vybírá transakce z mempoolu bitcoinového uzlu a připravuje šablonu nového bloku. Může existovat jak na straně poolu, tak na straně těžaře. Na straně těžaře však představuje základní předpoklad pro decentralizaci těžby - umožňuje mu vybrat transakce do šablony nového bloku dle vlastní vůle.
Poslední rolí je Job Declarator. Jeho odpovědností je validovat navržené šablony nového bloku a připravit úlohy pro Minery. Job Declarator může opět existovat jak na straně poolu (tzv. Job Declarator Server), tak na straně těžaře (tzv. Job Declarator Client). Obě instance pak spolu komunikují prostřednictvím Job Declaration Protokolu.
Čistě teoreticky může role Template Provider a Job Declarator pro těžaře a pool provozovat nezávislá třetí strana a poskytovat tuto službu třeba více těžařům nebo více poolům. Chybí k tomu ale ekonomická motivace, protože takové nastavení nezvyšuje vzájemnou důvěru mezi těžařem a poolem a přináší dodatečné náklady.
Jednotlivé role a jejich vzájemné interakce ukazuje následující obrázek.
Role Template Provider a Job Declarator na straně těžaře nejsou povinné. Pokud existují, umožňují decentralizovaný výběr transakcí do nového bloku. Pokud ne, odpovídá celé nastavení konfiguraci stávajících poolů, přináší však zabezpečenou a efektivnější komunikaci díky binární podstatě protokolu a jeho šifrování.
Decentralizovaná těžba v těžebním poolu s využitím protokolu Stratum V2 probíhá následovně:
-
Template Provider na straně těžaře získá z vlastního bitcoinového uzlu šablonu nového bloku (buď prostřednictvím RPC GetBlockTemplate nebo nově navrženého Stratum V2 subprotokolu Template Distribution) a poskytne ji svému Job Declaratoru.
-
Job Declarator Client šablonu zvaliduje a nabídne ji prostřednictvím Job Declaration protokolu svému protějšku na straně poolu, Job Declarator Server.
-
Job Declarator Server šablonu zvaliduje podle svých pravidel. Pokud ji akceptuje, vytvoří těžební úlohu a pošle ji zpět těžaři. Součástí úlohy je i poolem definovaná coinbase transakce.
-
Pokud Job Declarator Server návrh odmítne, Job Declarator Client může šablonu nabídnout jinému poolu nebo vytvořit těžební úlohu sám a pokračovat v těžbě bez poolu (v módu Solo Miningu).
-
Job Declarator Client předá vytvořenou úlohu prostřednictvím Job Distribution Protokolu na Proxy, která ji distribuuje Minerům.
-
Těžební zařízení zpracovávají úlohu (hledají hash dle zadané obtížnosti). Nalezený blok nebo každou nalezenou share posílají zpět Proxy.
-
Proxy posílá nalezený blok nebo všechny nalezené shares prostřednictvím Mining Protokolu do Poolu.
-
Pokud těžař reportuje nalezený blok, Pool jej ověří a propaguje dále do bitcoinové sítě.
-
Pool také na základě počtu nalezených shares a použitého modelu pro odměňování těžařů vypočítá příslušnou odměnu a pošle ji těžařům (tuto odpovědnost však Stratum V2 protokol neřeší)
Z uvedeného popisu stojí za povšimnutí možnost poolu odmítnout těžařem navrhované transakce v šabloně nového bloku (krok 4). Je to pojistka pro pool, která mu umožňuje nepodílet se na těžení transakcí, se kterými z jakéhokoliv důvodu nesouhlasí (nesmíme zapomenout, že pooly jsou většinou právními subjekty, které podléhají jurisdikci země jejich sídla a případným regulacím). Stratum V2 pro takový případ nabízí těžaři možnost obrátit se automaticky na jiný pool nebo v krajním případě pokračovat v těžbě daného bloku samostatně (Solo Mining).
Startum V2 však díky této vlastnosti zcela neeliminuje riziko cenzury transakcí.
Stratum V2 je takovým "Torovým kladivem" na většinu neduhů současné těžby v poolech. Jde o velmi komplexní protokol, který řeší všechny možné scénáře dnešní těžby, včetně těch okrajových, a poskytuje všem zúčastněným hráčům – od výrobců těžebních zařízení po těžaře a operátory poolů – větší svobodu volby. Bohužel, "Money talks" a tak chybí vůle na jeho prosazení. Po pěti letech od jeho představení se podporou Stratum V2 chlubí pouze Braiins pool a reálně použitelným scénářem je pouze přímá komunikace poolu s minerem, který používá BraiinsOS firmware. O decentralizaci zatím nemůže být řeč.
V březnu tohoto roku (2024) se na Githubu objevila první verze Referenční Implementace Stratum V2, zatím ve velmi omezené funkcionalitě.
V nedávném rozhovoru přiznali Jan Čapek a Pavel Moravec, zakladatelé Braiins a provozovatelé Braiins poolu, že implementace komponent, které reálně decentralizaci těžby dle protokolu Stratum V2 umožní, zatím nejsou prioritou...
Doporučuji si celý rozhovor poslechnout. Protokolu Startum V2 se pánové věnují v čase 41:30-59:00.
DATUM
DATUM, neboli "Decentralized Alternative Templates for Universal Mining" je protokol, který si zvolil decentralizaci těžby bitcoinu za svůj primární cíl. Ocean.xyz pool jej představil 29. září 2024. Jako jednu z motivací uvedl ztrátu důvěry, že Stratum V2 protokol dokáže, navzdory svým proklamacím, vyřešit problém centralizace bitcoinové těžby v dohledné době.
Co přesně DATUM dělá? Umožňuje jednotlivým těžařům vytvářet své vlastní šablony bloků a zároveň se dále podílet na sdílení odměn za těžbu v poolu. Nic víc. Krátce po představení protokolu byly zpřístupněny i zdrojové kódy referenční implementace DATUM gatewaye a připravené aplikační balíčky pro StartOS a Umbrel. Ano, čtete správně, DATUM si můžete spustit na svém bitcoinovém uzlu. O tom ale o kousek dále. Napřed si popíšeme, jak DATUM funguje.
Na rozdíl od protokolu Stratum V2 definuje DATUM protokol na straně těžaře pouze jedinou komponentu: DATUM Gateway. Ta zastřešuje komunikaci se všemi těžícími zařízeními (Minery) protokolem Stratum V1, komunikaci s lokálním bitcoinovým uzlem, ze kterého získává šablonu nového bloku a šifrovanou komunikaci s poolem, kterému posílá nalezené shares a případné nové bloky. Na straně poolu je klientem DATUM protokolu komponenta DATUM Prime. Dešifruje komunikaci přes DATUM protokol a předává poolu od těžaře získané důkazy o odvedené práci (shares). V současné verzi protokolu provádí pool také validaci bloků po koordinaci s těžařem, aby zajistil, že těžaři nebudou omylem vytvářet neplatné bloky. V budoucnu však bude odstraněna i tato funkce a pool tak nebude mít žádnou možnost bloky od těžaře jakkoliv ovlivnit.
Těžba bitcoinu s protokolem DATUM probíhá následovně:
-
DATUM Gateway na straně těžaře získá z lokálního bitcoinového uzlu šablonu nového bloku prostřednictvím RPC GetBlockTemplate.
-
DATUM Gateway získá prostřednictvím DATUM protokolu z poolu coinbase transakci, sestaví hlavičku bloku a celou těžební úlohu.
-
Sestavenou těžební úlohu předá DATUM Gateway těžebním zařízením.
-
Těžební zařízení zpracovávají úlohu (hledají hash dle zadané obtížnosti). Nalezený blok nebo každou nalezenou share posílají zpět na DATUM Gateway.
-
Ta posílá nalezený blok nebo všechny nalezené shares prostřednictvím DATUM Protokolu do Poolu.
-
Pokud těžař nalezne nový blok, DATUM Gateway jej ověří a propaguje dále do bitcoinové sítě prostřednictvím lokálního bitcoinového uzlu.
-
Pool na základě počtu nalezených shares a použitého modelu pro odměňování těžařů vypočítá příslušnou odměnu a pošle ji těžařům.
Pokud uvedený postup srovnáte s postupem dle protokolu Startum V2, najdete jeden důležitý rozdíl. Těžař neposkytuje poolu ke schválení své vybrané transakce v rámci vytvořené šablony bloku. Záleží jen na něm, které transakce vybere a tvorbu nového bloku má tak zcela pod svou kontrolou.
V protokolu DATUM nemá pool možnost cenzurovat těžařem vybrané transakce. Rozhodnutí, jak využije prostor ve svém bloku a jakým transakcím dá přednost, je tak opět zcela na těžaři. Tvorba obsahu bitcoinového blockchainu se vrací tam, kde ji navrhl Satoshi Nakamoto ve svém Whitepaperu.
Pool poskytuje těžaři pouze coinbase transakci do hlavičky nového bloku. Protokol DATUM nepředepisuje konkrétní systém odměňování v poolu. Pool může sestavit coinbase transakci dle vlastní potřeby. Může například v coinbase transakci přímo a transparentně vyplatit těžaře, jako to dělá Ocean.xyz pool pro částky vyšší než cca 1.05M SATů, nebo si převést celou odměnu na svou adresu a těžaře vyplatit později jinou standartní transakcí, jako to dělají všechny ostatní pooly.
Protokol DATUM v současnosti podporuje pouze jediný pool - Ocean.xyz. Volně dostupné zdrojové kódy na Githubu jsou pouze pro DATUM Gateway, část na straně poolu, DATUM Prime, zatím chybí. Na druhou stranu protokol DATUM je živý protokol. s jeho pomocí bylo vytěženo již 22 bloků ze 40, které za dobu od jeho představení Ocean.xyz pool vytěžil. A 50% sleva z poplatků poolu za těžbu prostřednictvím DATUM protokolu jako podpora jeho adopci dokazuje, že to Ocean.xyz myslí s decentralizací bitcoinové těžby opravdu vážně.
Domácí decentralizovaná těžba bitcoinu? Ano!
Pokud vám vše výše napsané dává smysl a chcete podpořit decentralizaci těžby bitcoinu, můžete. A dokonce to již nepředpokládá hluboké technické znalosti. Jak jsem napsal výše, implementace DATUM Gatewaye je již nyní k dispozici pro nejrozšířenější operační systémy bitcoinových uzlů Umbrel a StartOS. Její instalace je jednoduchá, stejně tak jako konfigurace, a nároky na hardware jsou zanedbatelné. Všechny vaše domácí těžící zařízení můžete obsluhovat přes jednu DATUM gateway, která poběží přímo na vašem RPi 4 bitcoinovém uzlu. Jak na to?
DATUM gateway potřebuje ke svému běhu plnohodnotný bitcoinový uzel, který podporuje RPC interface a proceduru GetBlockTemplate. Můžete si vybrat jakoukoliv dostupnou implementaci (Bitcoin Core, Bitcoin Knots nebo třeba Libre Relay). Já vám však doporučím Bitcoin Knots, protože nabízí nejširší možnosti konfigurace sestavení šablony bloku. Dostanete tedy nejlepší možnost volby, které transakce do svých bloků zahrnout a které ne (SPAM - pokud vás zajímá více o SPAMu v bitcoinovém blockchainu, přečtěte si článek Nevyžádaná data v bitcoinovém blockchainu).
Bitcoin Knots
Nedávná aktualizace UmbrelOS na verzi 1.3 celou instalaci výrazně zjednodušila. Přinesla možnost zvolit si implementaci bitcoinového uzlu a odstranila tak závislost ostatních aplikací (jako Electrum serverů nebo Lightning uzlů) na Bitcoin Core. Můžete si nainstalovat Bitcoin Knots přímo z Umbrel App Store.
V případě StartOS (Start9) najdete Bitcoin Knots v oficiálním Marketplace.
Po instalaci si zkontrolujte a případně nastavte preferovaná pravidla filtrování bitcoinového SPAMu (ostatně proto si instalujete Bitcoin Knots). Najdete je v nastavení ( Umbrel: Advanced Settings -> Optimization, StartOS: Config -> Mempool).
V základu je již nastaveno (verze 27.1.020240801):
Datacarrier (
datacarrier=1
) - Relay transaction with embedded data - OP_RETURN Datacarrier Size (datacarriersize=42
) - Maximum size of relayed transactions with embedded data - OP_RETURN Reject Parasites (rejectparasites=1
) - Reject parasitic transactions Permit Bare Multisig (permitbaremultisig=0
) - Relay old type of multisig transactionPokud chcete filtrovat i Runes, nezapomeňte povolit:
Reject Tokens (
rejecttokens=1
) - Reject tokens transactionsS protokolem DATUM můžete v současné době těžit pouze v Ocean.xyz poolu. Ten distribuuje odměny za vytěžený blok těžařům přímo v coinbase transakci, která díky tomu značně nabyla na velikosti a může mít i několik kilobajtů. Protože je celková velikost bloku omezená, je třeba na to myslet při vytváření šablony nového bloku a pro coinbase transakci, kterou vám pošle Ocean.xyz pool rezervovat potřebné místo. Zkontrolujte si, že vaše instance Bitcoin Knots má nastaveny následující limity velikosti bloku.
Max Bloc Size (
blockmaxsize=3985000
) - Max block size in bytes Max Block Weight (blockmaxweight=3985000
) - Max block size in weightDATUM
Po dokončení synchronizace blockchainu, což může trvat dle výkonu vašeho HW i několik dní, nainstalujte aplikaci DATUM (opět přímo z Umbrel App Store nebo Start9 Marketplace).
Aplikace ve verzi pro Umbrel zatím nemá konfigurační GUI. Vše podstatné je již nakonfigurováno v souboru datum_gateway_config.json. Pokud by jste konfiguraci chtěli upravit, najdete jej v adresáři
/home/umbrel/umbrel/app-data/datum/data/settings/datum_gateway_config.json
Za pozornost stojí parametry v sekci Mining:
Bitcoin Address (
pool_address
) - vaše bitcoinová adresa pro zasílání odměn v případě, že ji nevyplníte na těžícím zařízení (viz. [[#Nastavení těžebního zařízení]]).Primary Coinbase Tag (
coinbase_tag_primary
) - První popisek do coinbase transakce v případě solo miningu. V případě těžby v poolu bude přepsán popiskem poolu (pool's name).Secondary Coinbase Tag (
coinbase_tag_secondary
) - Druhý popisek do coinbase transakce. S jeho pomocí můžete identifikovat vámi nalezené bloky v blockchainu.A v sekci Datum:
Pool Host (
pool_host
) a Pool Port (pool_port
) - URL a port poolu s podporou DATUM Prime, ke kterému se DATUM Gateway připojí. Pokud není vyplněn, nebo se k němu nepodaří připojit a současně nebude nastaven parametr Pooled Mining Only (pooled_mining_only=false
viz. dále), přepne se DATUM Gateway do solo mining módu (odměnu získáte pouze pokud naleznete blok a bude celá patřit vám).Pool Pass Workers (
pool_pass_workers=true
) - Pokud je nastaven, bude DATUM Gateway posílat do poolu i vámi definované jméno konkrétního těžícího zařízení (viz. [[#Nastavení těžebního zařízení]]).Pool Pass Full Users (
pool_pass_full_users=true
) - Pokud je nastaven, bude DATUM Gateway posílat do poolu celé vámi definované uživatelské jméno konkrétního těžícího zařízení. Tím je většinou vaše bitcoinová adresa pro zasílání odměn. Pokud bude nastaven nafalse
, použije DATUM Gateway bitcoinovou adresu definovanou parametrem Bitcoin Address (pool_address
).Pooled Mining Only (
pooled_mining_only=true
) - Pokud je nastaven a DATUM Gateway ztratí spojení s poolem, přeruší spojení i se všemi těžícími zařízeními. To jim umožní připojit se na záložní pool, mají-li jej nastaven. Pokud je nastaven nafalse
a DATUM Gateway ztratí spojení s poolem, přepne se do solo mining módu.Nastavení těžebního zařízení
Nasměrujte svůj miner na IP adresu vašeho uzlu (Umbrel nebo StartOS) a port služby DATUM Gateway: 23334. Místo IP adresy můžete použít lokální URL, pokud jej máte nastaveno. Výsledná Stratum adresa bude vypadat přibližně takto:
stratum+tcp://192.168.x.y:23334
(x a y nahraďte odpovídajícími hodnotami)nebo
stratum+tcp://umbrel.local:23334
Do pole Username vložte svou bitcoinovou adresu. Na tuto adresu budou zasílány vaše odměny z Ocean.xyz poolu. K této adrese můžete za tečku připojit unikátní jméno těžebního zařízení. Například:
bc1qabcdefghijklmnopqrstuvwxyz.bitaxe
Pokud svou bitcoinovou adresu neuvedete, zkontrolujte si, že ji máte nastavenu v konfiguraci DATUM Gatewaye v sekci Mining, parametr Pool Address a v sekci Datum je parametr Pool Pass Full Users nastaven na
false
.Pole Password může zůstat prázdné, pro Ocean.xyz pool nemá žádný význam.
Závěr?
A to je vše. Ale není to závěr, ale spíše začátek další etapy v těžbě bitcoinu. Etapy decentralizované těžby. Přeháním? Poolu Ocean.xyz se za 11 měsíců své existence povedlo přilákat hashrate až 4.5 Eh/s a dostat se mezi nejvýkonnějších 20 poolů. Za dva měsíce dostupnosti protokolu DATUM bylo s jeho pomocí nalezeno v poolu více než polovina nových bloků. To jsou na poměry v bitcoinové těžbě neuvěřitelná čísla, která dokazují, že bitcoinový étos není mrtvý a decentralizace těžby má v bitcoinové komunitě stále své zastánce.
A co více? Objevují se empirická měření výkonosti poolů, která ukazují, že transparentní odměňování v Ocean.xyz poolu může v delším časovém horizontu vydělat více SATů než jiné public FPPS pooly. Podívejte se třeba na tuto studii.
Domácí decentralizované těžbě bitcoinu: Zdař Bůh!
-
-
@ 42342239:1d80db24
2024-11-06 09:05:17TL;DR: J.D. Vance recently observed that many in the Democratic Party are attempting to manufacture trust from the top down, neglecting the fact that genuine trust is often born from grassroots connections. There's indeed a stark contrast between trust that's artificially constructed through manipulation and censorship, and trust that's organically cultivated from the ground up.
Trump's vice presidential candidate J.D. Vance appeared on podcast host Joe Rogan's show earlier in November. According to Vance, large parts of the Democratic Party are trying to create higher trust from above, without understanding that the previously high trust once arose organically: "I think that a lot of them are trying to reimpose that social trust from the top."
Most people understand the importance of high trust. Political scientist Robert D. Putnam, for example, has shown that large social capital, in the form of trust and networks, is a key factor for economic growth, cooperation, and problem-solving. See e.g. his book Bowling Alone: The Collapse and Revival of American Community (2000).
The low trust today is widespread. Trust in the American federal government is at historically low levels. Trust in the media is at rock-bottom levels. Even trust in doctors and hospitals has plummeted: at the beginning of 2024, the proportion of people who reported "a great deal of trust" had dropped to 40%, from 72% in April 2020. This can be concerning, as individuals with low trust in doctors and hospitals will be less likely to follow their advice and recommendations. It's therefore not surprising that many want to "rebuild trust" (this was the theme of the World Economic Forum's annual meeting this year).
How much trust is actually reasonable?
But how much trust is actually reasonable? To determine this, one can ask whether an institution has acted reliably in the past, whether it possesses the knowledge and ability required to deliver what is promised, and whether its interests are in line with our own.
The low trust figures among Americans are likely a reflection of the fact that many of them today question the extent to which the answers to these questions are actually affirmative. During the pandemic, medical experts in the UK incorrectly predicted that hundreds of thousands of people would die. In the US, the leading infectious disease expert misled the public about, among other things, face masks, the sitting president lied about both the effectiveness and safety of vaccines, a British health minister wanted to "scare the pants off people," and virus experts even conspired to mislead about the origin of the SARS-CoV-2 virus. All while social media companies, under pressure from governments, were forced to censor information that was actually correct.
Trust - built on sand or on solid ground?
It's possible to continue on the current path and try to improve trust figures by limiting access to information. For instance, if the public doesn't get access to negative information about authorities or experts, the measured trust can increase. But in that case, trust is merely built on sand, waiting to be undermined by the inexorable forces of truth.
But there's another possibility. Building relationships that are genuine and honest, listening to each other without judgment, and communicating without misleading. Doing things that really matter, and doing them well, showing competence and reliability through actions. In this way, trust can grow naturally and organically. A trust built on solid ground, not on sand. A delicate task. But presidential election or not, isn't it time for us to start building a future where this form of trust is the obvious foundation?
-
@ fa1d8325:7c91882e
2024-11-29 15:42:53В Пятигорске 27 ноября, в первый день тестового запуска робо-патруля, был задержан мошенник, пытавшийся продать нелицензионную продукцию. Этот инцидент стал важным событием, продемонстрировав эффективность новых технологий в обеспечении общественной безопасности.
Роботы-патрули, оснащенные современными системами распознавания лиц и алгоритмами анализа поведения, быстро обнаружили подозрительную активность на одном из городских рынков. В результате взаимодействия с местными правоохранительными органами мошенник был задержан на месте преступления.
По предварительным данным, злоумышленник предлагал покупателям товары без необходимых лицензий и сертификатов, что могло нанести ущерб не только потребителям, но и легальным производителям. Благодаря работе робо-патруля удалось предотвратить дальнейшие правонарушения и защитить интересы граждан.
-
@ a367f9eb:0633efea
2024-11-05 08:48:41Last week, an investigation by Reuters revealed that Chinese researchers have been using open-source AI tools to build nefarious-sounding models that may have some military application.
The reporting purports that adversaries in the Chinese Communist Party and its military wing are taking advantage of the liberal software licensing of American innovations in the AI space, which could someday have capabilities to presumably harm the United States.
In a June paper reviewed by Reuters, six Chinese researchers from three institutions, including two under the People’s Liberation Army’s (PLA) leading research body, the Academy of Military Science (AMS), detailed how they had used an early version of Meta’s Llama as a base for what it calls “ChatBIT”.
The researchers used an earlier Llama 13B large language model (LLM) from Meta, incorporating their own parameters to construct a military-focused AI tool to gather and process intelligence, and offer accurate and reliable information for operational decision-making.
While I’m doubtful that today’s existing chatbot-like tools will be the ultimate battlefield for a new geopolitical war (queue up the computer-simulated war from the Star Trek episode “A Taste of Armageddon“), this recent exposé requires us to revisit why large language models are released as open-source code in the first place.
Added to that, should it matter that an adversary is having a poke around and may ultimately use them for some purpose we may not like, whether that be China, Russia, North Korea, or Iran?
The number of open-source AI LLMs continues to grow each day, with projects like Vicuna, LLaMA, BLOOMB, Falcon, and Mistral available for download. In fact, there are over one million open-source LLMs available as of writing this post. With some decent hardware, every global citizen can download these codebases and run them on their computer.
With regard to this specific story, we could assume it to be a selective leak by a competitor of Meta which created the LLaMA model, intended to harm its reputation among those with cybersecurity and national security credentials. There are potentially trillions of dollars on the line.
Or it could be the revelation of something more sinister happening in the military-sponsored labs of Chinese hackers who have already been caught attacking American infrastructure, data, and yes, your credit history?
As consumer advocates who believe in the necessity of liberal democracies to safeguard our liberties against authoritarianism, we should absolutely remain skeptical when it comes to the communist regime in Beijing. We’ve written as much many times.
At the same time, however, we should not subrogate our own critical thinking and principles because it suits a convenient narrative.
Consumers of all stripes deserve technological freedom, and innovators should be free to provide that to us. And open-source software has provided the very foundations for all of this.
Open-source matters When we discuss open-source software and code, what we’re really talking about is the ability for people other than the creators to use it.
The various licensing schemes – ranging from GNU General Public License (GPL) to the MIT License and various public domain classifications – determine whether other people can use the code, edit it to their liking, and run it on their machine. Some licenses even allow you to monetize the modifications you’ve made.
While many different types of software will be fully licensed and made proprietary, restricting or even penalizing those who attempt to use it on their own, many developers have created software intended to be released to the public. This allows multiple contributors to add to the codebase and to make changes to improve it for public benefit.
Open-source software matters because anyone, anywhere can download and run the code on their own. They can also modify it, edit it, and tailor it to their specific need. The code is intended to be shared and built upon not because of some altruistic belief, but rather to make it accessible for everyone and create a broad base. This is how we create standards for technologies that provide the ground floor for further tinkering to deliver value to consumers.
Open-source libraries create the building blocks that decrease the hassle and cost of building a new web platform, smartphone, or even a computer language. They distribute common code that can be built upon, assuring interoperability and setting standards for all of our devices and technologies to talk to each other.
I am myself a proponent of open-source software. The server I run in my home has dozens of dockerized applications sourced directly from open-source contributors on GitHub and DockerHub. When there are versions or adaptations that I don’t like, I can pick and choose which I prefer. I can even make comments or add edits if I’ve found a better way for them to run.
Whether you know it or not, many of you run the Linux operating system as the base for your Macbook or any other computer and use all kinds of web tools that have active repositories forked or modified by open-source contributors online. This code is auditable by everyone and can be scrutinized or reviewed by whoever wants to (even AI bots).
This is the same software that runs your airlines, powers the farms that deliver your food, and supports the entire global monetary system. The code of the first decentralized cryptocurrency Bitcoin is also open-source, which has allowed thousands of copycat protocols that have revolutionized how we view money.
You know what else is open-source and available for everyone to use, modify, and build upon?
PHP, Mozilla Firefox, LibreOffice, MySQL, Python, Git, Docker, and WordPress. All protocols and languages that power the web. Friend or foe alike, anyone can download these pieces of software and run them how they see fit.
Open-source code is speech, and it is knowledge.
We build upon it to make information and technology accessible. Attempts to curb open-source, therefore, amount to restricting speech and knowledge.
Open-source is for your friends, and enemies In the context of Artificial Intelligence, many different developers and companies have chosen to take their large language models and make them available via an open-source license.
At this very moment, you can click on over to Hugging Face, download an AI model, and build a chatbot or scripting machine suited to your needs. All for free (as long as you have the power and bandwidth).
Thousands of companies in the AI sector are doing this at this very moment, discovering ways of building on top of open-source models to develop new apps, tools, and services to offer to companies and individuals. It’s how many different applications are coming to life and thousands more jobs are being created.
We know this can be useful to friends, but what about enemies?
As the AI wars heat up between liberal democracies like the US, the UK, and (sluggishly) the European Union, we know that authoritarian adversaries like the CCP and Russia are building their own applications.
The fear that China will use open-source US models to create some kind of military application is a clear and present danger for many political and national security researchers, as well as politicians.
A bipartisan group of US House lawmakers want to put export controls on AI models, as well as block foreign access to US cloud servers that may be hosting AI software.
If this seems familiar, we should also remember that the US government once classified cryptography and encryption as “munitions” that could not be exported to other countries (see The Crypto Wars). Many of the arguments we hear today were invoked by some of the same people as back then.
Now, encryption protocols are the gold standard for many different banking and web services, messaging, and all kinds of electronic communication. We expect our friends to use it, and our foes as well. Because code is knowledge and speech, we know how to evaluate it and respond if we need to.
Regardless of who uses open-source AI, this is how we should view it today. These are merely tools that people will use for good or ill. It’s up to governments to determine how best to stop illiberal or nefarious uses that harm us, rather than try to outlaw or restrict building of free and open software in the first place.
Limiting open-source threatens our own advancement If we set out to restrict and limit our ability to create and share open-source code, no matter who uses it, that would be tantamount to imposing censorship. There must be another way.
If there is a “Hundred Year Marathon” between the United States and liberal democracies on one side and autocracies like the Chinese Communist Party on the other, this is not something that will be won or lost based on software licenses. We need as much competition as possible.
The Chinese military has been building up its capabilities with trillions of dollars’ worth of investments that span far beyond AI chatbots and skip logic protocols.
The theft of intellectual property at factories in Shenzhen, or in US courts by third-party litigation funding coming from China, is very real and will have serious economic consequences. It may even change the balance of power if our economies and countries turn to war footing.
But these are separate issues from the ability of free people to create and share open-source code which we can all benefit from. In fact, if we want to continue our way our life and continue to add to global productivity and growth, it’s demanded that we defend open-source.
If liberal democracies want to compete with our global adversaries, it will not be done by reducing the freedoms of citizens in our own countries.
Last week, an investigation by Reuters revealed that Chinese researchers have been using open-source AI tools to build nefarious-sounding models that may have some military application.
The reporting purports that adversaries in the Chinese Communist Party and its military wing are taking advantage of the liberal software licensing of American innovations in the AI space, which could someday have capabilities to presumably harm the United States.
In a June paper reviewed by Reuters, six Chinese researchers from three institutions, including two under the People’s Liberation Army’s (PLA) leading research body, the Academy of Military Science (AMS), detailed how they had used an early version of Meta’s Llama as a base for what it calls “ChatBIT”.
The researchers used an earlier Llama 13B large language model (LLM) from Meta, incorporating their own parameters to construct a military-focused AI tool to gather and process intelligence, and offer accurate and reliable information for operational decision-making.
While I’m doubtful that today’s existing chatbot-like tools will be the ultimate battlefield for a new geopolitical war (queue up the computer-simulated war from the Star Trek episode “A Taste of Armageddon“), this recent exposé requires us to revisit why large language models are released as open-source code in the first place.
Added to that, should it matter that an adversary is having a poke around and may ultimately use them for some purpose we may not like, whether that be China, Russia, North Korea, or Iran?
The number of open-source AI LLMs continues to grow each day, with projects like Vicuna, LLaMA, BLOOMB, Falcon, and Mistral available for download. In fact, there are over one million open-source LLMs available as of writing this post. With some decent hardware, every global citizen can download these codebases and run them on their computer.
With regard to this specific story, we could assume it to be a selective leak by a competitor of Meta which created the LLaMA model, intended to harm its reputation among those with cybersecurity and national security credentials. There are potentially trillions of dollars on the line.
Or it could be the revelation of something more sinister happening in the military-sponsored labs of Chinese hackers who have already been caught attacking American infrastructure, data, and yes, your credit history?
As consumer advocates who believe in the necessity of liberal democracies to safeguard our liberties against authoritarianism, we should absolutely remain skeptical when it comes to the communist regime in Beijing. We’ve written as much many times.
At the same time, however, we should not subrogate our own critical thinking and principles because it suits a convenient narrative.
Consumers of all stripes deserve technological freedom, and innovators should be free to provide that to us. And open-source software has provided the very foundations for all of this.
Open-source matters
When we discuss open-source software and code, what we’re really talking about is the ability for people other than the creators to use it.
The various licensing schemes – ranging from GNU General Public License (GPL) to the MIT License and various public domain classifications – determine whether other people can use the code, edit it to their liking, and run it on their machine. Some licenses even allow you to monetize the modifications you’ve made.
While many different types of software will be fully licensed and made proprietary, restricting or even penalizing those who attempt to use it on their own, many developers have created software intended to be released to the public. This allows multiple contributors to add to the codebase and to make changes to improve it for public benefit.
Open-source software matters because anyone, anywhere can download and run the code on their own. They can also modify it, edit it, and tailor it to their specific need. The code is intended to be shared and built upon not because of some altruistic belief, but rather to make it accessible for everyone and create a broad base. This is how we create standards for technologies that provide the ground floor for further tinkering to deliver value to consumers.
Open-source libraries create the building blocks that decrease the hassle and cost of building a new web platform, smartphone, or even a computer language. They distribute common code that can be built upon, assuring interoperability and setting standards for all of our devices and technologies to talk to each other.
I am myself a proponent of open-source software. The server I run in my home has dozens of dockerized applications sourced directly from open-source contributors on GitHub and DockerHub. When there are versions or adaptations that I don’t like, I can pick and choose which I prefer. I can even make comments or add edits if I’ve found a better way for them to run.
Whether you know it or not, many of you run the Linux operating system as the base for your Macbook or any other computer and use all kinds of web tools that have active repositories forked or modified by open-source contributors online. This code is auditable by everyone and can be scrutinized or reviewed by whoever wants to (even AI bots).
This is the same software that runs your airlines, powers the farms that deliver your food, and supports the entire global monetary system. The code of the first decentralized cryptocurrency Bitcoin is also open-source, which has allowed thousands of copycat protocols that have revolutionized how we view money.
You know what else is open-source and available for everyone to use, modify, and build upon?
PHP, Mozilla Firefox, LibreOffice, MySQL, Python, Git, Docker, and WordPress. All protocols and languages that power the web. Friend or foe alike, anyone can download these pieces of software and run them how they see fit.
Open-source code is speech, and it is knowledge.
We build upon it to make information and technology accessible. Attempts to curb open-source, therefore, amount to restricting speech and knowledge.
Open-source is for your friends, and enemies
In the context of Artificial Intelligence, many different developers and companies have chosen to take their large language models and make them available via an open-source license.
At this very moment, you can click on over to Hugging Face, download an AI model, and build a chatbot or scripting machine suited to your needs. All for free (as long as you have the power and bandwidth).
Thousands of companies in the AI sector are doing this at this very moment, discovering ways of building on top of open-source models to develop new apps, tools, and services to offer to companies and individuals. It’s how many different applications are coming to life and thousands more jobs are being created.
We know this can be useful to friends, but what about enemies?
As the AI wars heat up between liberal democracies like the US, the UK, and (sluggishly) the European Union, we know that authoritarian adversaries like the CCP and Russia are building their own applications.
The fear that China will use open-source US models to create some kind of military application is a clear and present danger for many political and national security researchers, as well as politicians.
A bipartisan group of US House lawmakers want to put export controls on AI models, as well as block foreign access to US cloud servers that may be hosting AI software.
If this seems familiar, we should also remember that the US government once classified cryptography and encryption as “munitions” that could not be exported to other countries (see The Crypto Wars). Many of the arguments we hear today were invoked by some of the same people as back then.
Now, encryption protocols are the gold standard for many different banking and web services, messaging, and all kinds of electronic communication. We expect our friends to use it, and our foes as well. Because code is knowledge and speech, we know how to evaluate it and respond if we need to.
Regardless of who uses open-source AI, this is how we should view it today. These are merely tools that people will use for good or ill. It’s up to governments to determine how best to stop illiberal or nefarious uses that harm us, rather than try to outlaw or restrict building of free and open software in the first place.
Limiting open-source threatens our own advancement
If we set out to restrict and limit our ability to create and share open-source code, no matter who uses it, that would be tantamount to imposing censorship. There must be another way.
If there is a “Hundred Year Marathon” between the United States and liberal democracies on one side and autocracies like the Chinese Communist Party on the other, this is not something that will be won or lost based on software licenses. We need as much competition as possible.
The Chinese military has been building up its capabilities with trillions of dollars’ worth of investments that span far beyond AI chatbots and skip logic protocols.
The theft of intellectual property at factories in Shenzhen, or in US courts by third-party litigation funding coming from China, is very real and will have serious economic consequences. It may even change the balance of power if our economies and countries turn to war footing.
But these are separate issues from the ability of free people to create and share open-source code which we can all benefit from. In fact, if we want to continue our way our life and continue to add to global productivity and growth, it’s demanded that we defend open-source.
If liberal democracies want to compete with our global adversaries, it will not be done by reducing the freedoms of citizens in our own countries.
Originally published on the website of the Consumer Choice Center.
-
@ fa1d8325:7c91882e
2024-11-29 15:34:38В преддверии новогодних праздников торговые центры стремятся создать волшебную атмосферу для своих посетителей, особенно для детей. В этом сезоне настоящим хитом стали роботы Деда Мороза и Снегурочки, которые появились в нескольких крупных торговых центрах.
Эти инновационные персонажи, созданные с использованием современных технологий, способны взаимодействовать с детьми и взрослыми. Они рассказывают новогодние истории, поют песни и даже участвуют в играх, что добавляет в праздничную атмосферу элемент волшебства и интерактивности.
Кроме того, в рамках новогодних мероприятий планируются различные конкурсы и мастер-классы для детей. Посетители смогут сделать фотографии с роботами и получить от них подарки. Это создает уникальную возможность для семейного отдыха и создания праздничного настроения.
Родители уже успели оценить это нововведение. Они отмечают, что общение с роботами делает процесс ожидания праздника более увлекательным. «Это замечательная идея! Дети в восторге от общения с роботами», — делится впечатлениями одна из мам.
Таким образом, установка роботов Деда Мороза и Снегурочки в торговых центрах становится важным элементом создания новогоднего настроения для всей семьи. Эти инновационные персонажи делают праздники более яркими и запоминающимися.
-
@ a10260a2:caa23e3e
2024-11-05 06:21:10TIL Google Authenticator can potentially collect a lot of data, more than some of the other popular 2FA apps^1.
Whether it does or it doesn’t, if you’re like me, you don’t turn down an opportunity to remove some Google from your life and add in some open-source.
Here’s a quick overview of the migration process.
Step 1: Download 2FAS
Step 2: Export accounts from Authenticator
This can be done via “Transfer accounts” in the sidebar. If you’re transferring on the same phone, take a screenshot of the QR code.
Step 3: Import accounts into 2FAS
During the setup process for 2FAS, you’ll be given the option to import existing tokens from Google. This is where you’ll tap “Choose QR Code” and select the screenshot you took in step 2.
Note that when you tap continue after importing the tokens, you’ll be taken back to the same screen as above. I think it should take you to your list of accounts after. Either way, don’t think the import failed. Just tap cancel, and you’ll be taken there.
If you’re on Android, check out Aegis. 🫡
originally posted at https://stacker.news/items/753472
-
@ fa1d8325:7c91882e
2024-11-29 15:26:01Эти современные устройства с искусственным интеллектом не только облегчат выполнение повседневных задач, но и станут незаменимыми спутниками для людей всех возрастов.
Представьте себе дом, где каждая комната наполнена умными технологиями: роботы-помощники выполняют уборку, готовят еду, заботятся о пожилых людях и даже обучают детей. По прогнозам экспертов, в будущем количество роботов может превысить численность людей, и они станут такой же естественной частью нашей повседневной жизни, как смартфоны сегодня.
Эти помощники способны адаптироваться к индивидуальным потребностям своих хозяев, обеспечивая персональный подход и поддержку в самых различных аспектах жизни.
-
@ 472f440f:5669301e
2024-11-05 04:24:47All eyes are, unsurprisingly, on the US Presidential election. Tomorrow is the big day. I don't want to come off as preachy, however it is pretty clear to me that if you are an American citizen who cares about bitcoin and would like to live under an administration that is eager to embrace the industry as opposed to an administration that is actively hostile toward bitcoin there is only one candidate who deserves your vote; Donald J. Trump. I think he's a better candidate for other reasons, but if you've read this rag for long enough you probably already know what those are. Instead of writing a screed about why I am voting for Trump, let's highlight some things outside of the election that you should be paying attention to this week.
First up, there are two Treasury auctions; $42B of 10-Year notes tomorrow and $25B 30-Year bonds on Wednesday.
It will be interesting to see what the demand for these auctions is and how they affect rates. The long end of the yield curve has been pumping since the Fed's rate cut in the middle of September, which is the market signaling that it does not believe inflation has been appropriately tamed. Yields came down today, but as you can see from the charts things are trending in the wrong direction.
As the Treasury issues new debt at higher rates, the interest expense on that debt, naturally, drifts higher. If the long end of the yield curve doesn't come down aggressively over the course of the next year this is going to be a big problem. There are trillions of dollars worth of Treasury debt that needs the be rolled over in the next few years and it would be advantageous for the Treasury if that debt wasn't being rolled over with yields as high as they are. With the amount of debt the country has accrued in recent decades, every incremental dollar of debt that gets issued and/or rolled over at higher interest rates exacerbates the problem. We are approaching the territory of runaway exponentials, as evidenced by this chart. The growth slope gets steeper and steeper
This debt problem is the elephant in the room that needs to be addressed as quickly as possible. The national debt hit $1.2T in early 1983. It then took 26 years to 10x from $1.2T to $12T in late 2009 and has only taken another 15 years to triple from there to $36T or 30x from the arbitrary base I picked out (Q1 1983).
With this in mind, keep an eye out for these auctions tomorrow and Wednesday, where rates end at the end of trading on Wednesday, and whether or not we officially push over $36T. Regardless of who wins the election tomorrow, this is a problem that needs to be confronted. Whether or not it can be solved at all is up for debate. I don't see how what can be done to reel in this runaway train at this point. However, at the very least, we should acknowledge that we're in the realm of exponentials and have people prepare accordingly by accumulating hard assets that cannot be debased (bitcoin).
The other thing to pay attention to is the FOMC meeting on Wednesday and the announcement of the results of the meeting on Thursday. Will Jerome and the other Fed board members to keep rates where they are, cut, or raise rates? Raising rates seems to be out of the question despite the fact that many believe it would be the most prudent move considering how the long end of the yield curve reacted to the 50bps cut in September. If they decide to cut rates, by how much will they cut them? Will they slow the pace with a 25bps cut or continue at the 50bps clip established in September?
We'll find toward the end of this week. Don't lose sight of these events while the world is enthralled with the elections in the US.
I don't know about you freaks, but I couldn't feel more fortunate that bitcoin exists at a time like this. Having access to a distributed peer-to-peer digital cash system with a fixed supply during a time of incredible political divisiveness and out-of-control runaway sovereign debt feels like a Godsend.
Stay sane out there.
Final thought...
We're going to win.
-
@ 47750177:8969e41a
2024-11-04 12:00:0027.2 Release Notes
Bitcoin Core version 27.2 is now available from:
This release includes various bug fixes and performance improvements, as well as updated translations.
Please report bugs using the issue tracker at GitHub:
https://github.com/bitcoin/bitcoin/issues
To receive security and update notifications, please subscribe to:
https://bitcoincore.org/en/list/announcements/join/
How to Upgrade
If you are running an older version, shut it down. Wait until it has completely shut down (which might take a few minutes in some cases), then run the installer (on Windows) or just copy over
/Applications/Bitcoin-Qt
(on macOS) orbitcoind
/bitcoin-qt
(on Linux).Upgrading directly from a version of Bitcoin Core that has reached its EOL is possible, but it might take some time if the data directory needs to be migrated. Old wallet versions of Bitcoin Core are generally supported.
Compatibility
Bitcoin Core is supported and extensively tested on operating systems using the Linux Kernel 3.17+, macOS 11.0+, and Windows 7 and newer. Bitcoin Core should also work on most other Unix-like systems but is not as frequently tested on them. It is not recommended to use Bitcoin Core on unsupported systems.
Notable changes
P2P
-
30394 net: fix race condition in self-connect detection
Init
-
30435 init: change shutdown order of load block thread and scheduler
RPC
-
30357 Fix cases of calls to FillPSBT errantly returning complete=true
PSBT
-
29855 psbt: Check non witness utxo outpoint early
Test
-
30552 test: fix constructor of msg_tx
Doc
-
30504 doc: use proper doxygen formatting for CTxMemPool::cs
Build
-
30283 upnp: fix build with miniupnpc 2.2.8
-
30633 Fixes for GCC 15 compatibility
CI
-
30193 ci: move ASan job to GitHub Actions from Cirrus CI
-
30299 ci: remove unused bcc variable from workflow
Credits
Thanks to everyone who directly contributed to this release:
- Ava Chow
- Cory Fields
- Martin Zumsande
- Matt Whitlock
- Max Edwards
- Sebastian Falbesoner
- Vasil Dimov
- willcl-ark
As well as to everyone that helped with translations on Transifex.
-
-
@ c1e6505c:02b3157e
2024-11-29 15:04:53This was my first attempt at hosting a podcast with another photographer while also juggling scene switches in OBS on the fly. Not sure what went sideways with Gardner's audio - podcast pleb mistake, clearly. But hey, trial and error, right?
click image to watch the full episode
That said, I’ve been wanting to interview photographers I admire for a while, so I was stoked to finally sit down with Gardner and explore his work. His creative use of lasers and external flash really caught my eye. It’s not my typical style, but the way he executes it - with such taste and precision - is impressive. I think you’ll find his process just as fascinating as I did.
During our conversation, we covered a lot - music, cameras, and some funny stories. One of my favorites was the time he went to photograph a mobile home with a tree growing through it, only to realize someone was still living there.
We took a deep dive into his portfolio, unpacking the intricate details behind his images. Hearing the story straight from the photographer hits differently than just reading a blurb about the series. Learning why a photo was taken and how it came together feels way more compelling once you understand the person behind the lens.
You can catch the full episode now on my PictureRoom YouTube channel. Like and subscribe if you’re feeling generous.
-
@ 1ef695e1:15351d5f
2024-11-29 14:21:00After getting my ham licence in 2013 I found out about SOTA. I was enthusiastic as I have a long history of hiking in the mountains while a scout and then as a Scoutmaster. Now I was going to combine the two yet I immediately encountered a big problem. Very few South African summits were listed on the SOTA database and some of those listed did not even qualify as summits. I enquired of SOTA management and was told that "South Africa is on hold until all the summits are correctly mapped and checked." Only then could the summits be loaded to the database.
Using GIS software and my 1:50000 topographic maps I began mapping summits in my home province Limpopo that qualified according to the SOTA criteria.
An individual prominence of 150m or more was easy to determine. Doing the mapping I found a lot of summits that were obvious, but finding the key col of each summit was more difficult. The older maps in South Africa actually had a lot of the key cols displayed and using my combined methods I proceeded to map summits one by one and add the data to a spreadsheet. Taking approximately 8 minutes to map a summit it took me months to map Limpopo. I missed summits where the summit is spread over a large area and though it qualifies due to a 150m or more prominence it does not look like a summit and these we added later.
I sent my mapping data to OM Andrew VK3ARR in Australia and received a thumbs up as to my data accuracy. I was pleasantly surprised when my Limpopo summits appeared on the SOTA database even though the rest of the country was still not done. I immediately started mapping the next province of Mpumalanga using my manual methods.
Sid Tylor ZS5AYC from Kwazulu - Natal, who became SOTA manager for South Africa, and I had been discussing the processes and he arranged access to online software with automated summit processing where we could just check key col position and all the data per summit was processed much quicker. Frustrating for me was that I could not see what the software was doing and we just checked key cols without knowing where the summit was or its other data.
I completed the remaining Mpumalanga summits using the software access and then completed the Western Cape summits after which Sid and I split the Northern Cape summits between us. The other provinces were processed by various operators including some much appreciated assistance from Australian hams.
A big thank you to all in SOTA management, in South Africa, those that assisted from Australia, as well as SOTA UK, for making it possible for us to enjoy the adventures of SOTA.
Activating Renosterkop ZS/NC-272 in the Northern Cape
-
@ fd208ee8:0fd927c1
2024-11-03 21:51:39All memed out
It finally happened. I think it was October 25th, at circa 18:45 in the evening. I was doomscrolling my Nostr feed, and kept seeing the same Bitcoin memes repeated over and over, by different people. They weren't even reposts, they were copy-pasted versions of the same image. A very funny image. Well, it was very funny last year... and the year before that... and probably the year before that, when it appeared on a different network.
Because it's all just reposts, copy-pastes and rehashes of the Best of Bitcoin Twitter, just like the tiresome influencers, with their groupies and their Episode 498 of Let's all eat a large chunk of lightly-burnt dead animal and count our stacks before jetting off to talk about how to save the poors by getting them to buy individual satoshis with money they don't have.
I'm the poors your looking for
It's all so tiresome. It has little bearing on the real world I see around me, where most people are thinking all day about 99 problems and Bitcoin ain't one.
Which is, of course, what the Bitcoin influencers would have you believe, is the reason that they're poor. What in the world could be more important, than thinking about Bitcoin? Why do these people not get with the program? Don't they know, that we are trying to save them?
Why are they worrying about OtherProblems? Don't they know that all OtherProblems can be fixed with Bitcoin? Really, if you just go back far enough, in any current, situational problem, you will discover that there was some slight, negative shift to the history record that involved soft money. It's the financial version of the Butterfly Effect.
That's why #BitcoinFixesThis. Bitcoin fixes everything, if you just think about it, for long enough.
The same way that we all actually come out of Africa, supposedly, if you go back enough generations. So, coming out of Africa, now, as a Real Life Person in The Present is supposed to have no significance. What does someone from Cameroon know about Africa, that someone from Alaska doesn't? Both people come out of Africa, if you just think about it, for long enough.
And maybe that really is true. Maybe Bitcoin will eventually end all vice and crimes, save the planet, and we will all just hold hands and sing kumbaya all day, while waiting for the Singularity to upload us to Satoshi.
Bitcoin envelope budgeting
Or maybe it's not. Maybe it's just a really hard, digital money that incentivizes savings, functions as a reliable measure, and makes micropayments possible on a global scale. Those really are things that will help the poors, including myself. I can see it, already, when trying to organize pre-paid meetups or figure out what to do with our household's meager savings, when the stock market is looking particularly bubblicious.
But this is what I would consider Boring Bitcoin. Bitcoin home economics. Penny-pinching Bitcoin. Bitcoin for homemakers. How to use the Bitcoin envelope budgeting system to beat inflation by a margin of 13%.
The actual use of Bitcoin as money, rather than as a mere investment gamble or hype machine. That's the part of Bitcoin that nobody seems to really talk about because it's incredibly practical, dull, and useful, and it can only be tested by -- Oh, the horror! -- actually spending Bitcoin.
But... perhaps I will begin talking about it. Perhaps those of us, Bitcoiners, who are having fun staying poor, while stacking sats, should speak up a bit more. Perhaps the boring stuff is actually the interesting stuff. Perhaps there is more to say about Bitcoin, than can fit into a meme.
-
@ fd208ee8:0fd927c1
2024-11-03 09:20:33It's that season, again
I've been growing my hair out (too lazy to cut it) and it has -- once again -- quickly reached a length at which it draws unnecessary attention and sheds everywhere. I suppose it always sheds everywhere, but shedding short hairs is just generally less-gross than finding a 12-inch strand lying on the toast, you were about to consume.
So, I'm back to the 50 Shades of Updo stage, where I struggle to figure out how to best wear my head, usually defaulting to the Messy Bun look, because it's still too short to do anything more elaborate and looks silly, as a ponytail.
It's really not that great of a look for me, I know, especially, now that my chin is finally succumbing to gravity, but doing something more-elegant is usually more time-consuming and doesn't have that wonderful "swept up" feeling to it. You know that feeling, when you tie all of that heavy hair to a higher point on your skull and the roots just sigh with relief.
Another look, I tend to gravitate toward, at the moment, is head scarves, like this one:
...or a Bavarian-style bandana, for gardening or hiking (don't have a selfie handy, so here is some random chick, who also suffers from poofy, dark hair).
Hiking bare-headed, with flowing tresses, is not recommended, due to all of the Nature, that you have to comb back out of it.
Generally, just bored of my inbetween length and looking forward to braiding it, in a few months. Or giving up, in frustration, and cutting it all off.
-
@ df8f0a64:057d87a5
2024-11-29 13:58:482024年下半期の振り返り
あんまり変化はないんですが、進捗ありません!で終わっても仕方ないのでちょっとは無理やりでも振り返りましょう
0. 退職した
上半期時点で決まってはいたんですが、 6年間ほど勤務した会社を退職しました
退職直前まで爆発物取扱みたいなタスクをこなして、なかなかひやひやした退職プロセス
静かに退職したいので送別会の類のイベントは無しにしてくれというお願いをきいてくれた各メンバーに感謝です
1. 公開していたNostrリレーの設定を変更した
日本のみに公開していたリレーを、全世界に公開しました
当初はCloudflareでリレーをホストしていたのが、利用していたnosflareもcfrelayもクライアントに対してイベントを配布するコードがなく(R2だけではできない)
さてどうしたものかと悩んでいたタイミングで、Umbrelのおひとり様リレーのポートを公開する対応をしました。リレーのお引越し
で、公開してしばらくしたら、すごい勢いで日本国外からの投稿が着信するようになり大困惑
調べてみたら、Mutiny wallet(現在はサービス終了)が運営しているblastr.mutinywallet.com(たぶんまだ稼働している)が原因でした
Nostr.watchのAPIを利用して、世の中にあるNostrリレーすべてにイベントを送り込む凶悪な思想犯です
ヘッダー情報などでブロックできなかったので、blastrがホストされてるCloudflareのIPを全てブロックする力技で対処しました
ちなみに、nosflareもいつのまにかblastrのようなものをホストしているようです
なんなんでしょうね、Nostrの白人さんたちの、過激なほど分散というか対検閲をしようとするお節介さは
2. 公開していたNostrリレーを潰した
上記のように折角いろいろやったリレーを潰しました
Reply guyというbotが猛威をふるった時期、クソみたいなイベントをばら撒かれてくることに私がキレたからです。クソが
NostrとしてはこれをきっかけにWoTを組み込んだリレーが開発されたりして、スパム対策が一歩前進した感があります。クソが
スパムばら撒きをBostrが助長してるみたいな批難を受けて、作者のYonleさんがブチ切れ、全Nostr関連リポジトリのメンテを放棄する事態も発生
ちょうどMutiny walletでGOXしたご本人の機嫌が悪かった時期に、クソスパムがぶつかったことによる悲しい出来事でした。ほんとクソ
3. おわりに
他にもこまいことはいくつかあるんですが、主にはこんなとこでしょうか。来年も楽しくNostrしたいですね
-
@ 09fbf8f3:fa3d60f0
2024-11-02 08:00:29> ### 第三方API合集:
免责申明:
在此推荐的 OpenAI API Key 由第三方代理商提供,所以我们不对 API Key 的 有效性 和 安全性 负责,请你自行承担购买和使用 API Key 的风险。
| 服务商 | 特性说明 | Proxy 代理地址 | 链接 | | --- | --- | --- | --- | | AiHubMix | 使用 OpenAI 企业接口,全站模型价格为官方 86 折(含 GPT-4 )| https://aihubmix.com/v1 | 官网 | | OpenAI-HK | OpenAI的API官方计费模式为,按每次API请求内容和返回内容tokens长度来定价。每个模型具有不同的计价方式,以每1,000个tokens消耗为单位定价。其中1,000个tokens约为750个英文单词(约400汉字)| https://api.openai-hk.com/ | 官网 | | CloseAI | CloseAI是国内规模最大的商用级OpenAI代理平台,也是国内第一家专业OpenAI中转服务,定位于企业级商用需求,面向企业客户的线上服务提供高质量稳定的官方OpenAI API 中转代理,是百余家企业和多家科研机构的专用合作平台。 | https://api.openai-proxy.org | 官网 | | OpenAI-SB | 需要配合Telegram 获取api key | https://api.openai-sb.com | 官网 |
持续更新。。。
推广:
访问不了openai,去
低调云
购买VPN。官网:https://didiaocloud.xyz
邀请码:
w9AjVJit
价格低至1元。
-
@ 3b4a00cd:e0487acc
2024-11-29 13:41:58The day before the Aceh gubernatorial election, Indonesia, November 26, 2024, on Instagram I created a Bitcoin Giveaway of 30,000 Sats. The method is simple, just write the Bitcoin Lightning Network address in the comments column of my Instagram post, without the need to follow or share the post.
Initially, I made a rule that the 30,000 Sats would be divided equally among all participants if Bustami Hamzah was elected as Governor of Aceh. On the other hand, if Muzakir Manaf won the Aceh gubernatorial election, I would still divide the Giveaway prize equally, but half of the total main prize of 15,000 Sats.
I limited the Giveaway to two days, there were 18 Instagram users who participated, each of them, all of them included the Bitcoin Lightning Network address in the comments column of my IG Giveaway post.
I had guessed that those who would participate in the Giveaway would definitely be my closest friends, who I had told a long time ago what Bitcoin and Lightning Network were. My guess was right, out of the 18 users who participated, only two people I didn't know.
Because many people joined the Giveaway, namely 18 participants, I recently changed the rules. Regardless of who is elected as Governor of Aceh, all participants who meet the requirements will still be divided equally from the total prize of 30,000 Sats. There is no longer a rule of cutting it in half. This is solely so that each participant gets more sats, instead of if it is cut by 15,000 Sats (from the statistics circulating, it is very likely that the winner of the Aceh gubernatorial election will be Muzakir Manaf).
Without having to wait for the Aceh KIP to officially announce the winner of the Aceh gubernatorial election, today, November 29, 2024, I have sent and distributed 30,000 Sats to the eighteen participants equally, each getting 1,666 Sats. I sent it directly to the address they had included in the comments column of the Giveaway post.
In an IG story post, I informed the participants that the Sats they had received could be used for:
1. Donate to Gaza, Palestine. Yes, bitcoin can be sent anywhere in the world without intermediaries and received directly in an instant. For more information, access this link: http://bitcoinforpalestine.org
2. Exchange to Gopay balance. Bitcoin (Sats) can be exchanged for Gopay balance by exchanging it at the link: https://btcln.app/vm/gopay
3. Just save it. I also suggest that the Sats that have been received should be saved, as the price of Bitcoin increases, the value of Sats in Rupiah also increases. Can be exchanged at any time if necessary and urgent.
The Bitcoin Giveaway that I made has no benefit whatsoever for me, nor is there any sponsorship from anyone or any application. It is just my personal initiative to introduce Bitcoin technology to my colleagues and people who want to learn new technology.
Finally, through this post I remind all participants, Bitcoin is not a tool to achieve wealth, either in an instant or later, no, not that. Bitcoin is a new asset class that needs to be studied in depth, besides Gold, Land, and Stocks. Ignore crypto, Bitcoin is not crypto.
In my personal opinion, Bitcoin needs to be considered solely as a store of wealth amidst the declining value of currency due to inflation, which is usually the intention of our parents when buying physical gold in stores. Did our ancestors buy and store gold to get rich? Of course not! It is only a store of wealth that will be sold when financial conditions are urgent and there is no other choice.
Finally, Stay Humble, Stack Sats. In the gubernatorial election in the next 5 years (maybe 2030) I will make another Bitcoin Giveaway, God willing.
-
@ 319ad3e7:cc01d50a
2024-11-01 17:25:24https://image.nostr.build/4824c65d9a07c577bee8591b18ee147e7a457849fbaee53244667ec062914751.jpg
NOV 2024 | ISSUE 3 | LETTER FROM THE FOUNDER | FOOD ART | LIFE EXPERIENCE | FEATURED RECIPE | KIDS CORNER | MICROFICTION | FOOD NOTE QUOTES | SOUNDS | UPCOMING EVENTS | ECONOMICS | COMMUNITY PHOTO ALBUM | NEW RECIPES
LETTER FROM THE FOUNDER 📝
Hello and welcome back to the cozy autumn days with Zap Cooking! I’m thrilled to bring you another issue of our monthly newsletter, a space where we share our favorite moments and celebrate our vibrant community. Sarah, who does an amazing job curating these updates, has crafted this edition to capture the essence of both real-life gatherings and our shared online experiences on Nostr.
In this issue, we’re excited to revisit highlights from Nostr Valley, where Zap Cooking was proud to sponsor and connect with friends in a truly special celebration. It was an incredible honor to see so many of you make the journey to join us for the first annual event—a milestone in Nostr’s history and a testament to the strength of our community.
As always, thank you for being a part of this journey. Your continued support, contributions, and readership mean everything to us. Here’s to more shared moments, connections, and, of course, great cooking!
Gratefully,
Seth
Founder, Zap Cooking
https://i.nostr.build/gwaOKZDlTM45Ht15.jpg
FOOD ART 🎨
Zap.Cooking’s favorite food art of the month is the Banana Bread Costume from Bread and Toast! 😀 https://i.nostr.build/MgihZ6m2bQCv6krD.png Visit Breadandtoast.Com For More! New Single Every Sunday!
LIFE EXPERIENCE ✈️
Nostr Valley Adventures
https://image.nostr.build/7fd20dd7d9a4ce01657e0a9bed9d60cd6308325bf6cb69ec4f7ca63a6e3fb56e.jpg
The adventures of Nostr Valley began when I was invited to speak on a food panel alongside Seth, the founder of Zap.Cooking, at Happy Valley Brewing in State College Park, Pennsylvania.
Over the course of a month before the event, a fellow fun enthusiast known as The Beave organized a weekend filled with activities and accommodations, including a visit to a gun range and a stay at a charming three-bedroom countryside rental nestled among Pennsylvania's most scenic farm hills.
The Nostr Valley weekend had finally arrived, and I was set to drive six and a half hours to a small airport primarily used by skydivers and flying enthusiasts who park their personal planes in rented hangars. I was to meet a pilot who went by the name "Choke This." Despite the somewhat ominous name, my faith in the Nostr web of trust circles provided a sense of safety as I prepared to fly to Pennsylvania. Still, the thought of traveling alone to a remote area did cross my mind a few times. While it may not have been the wisest decision, I had faith in Nostr.
I began my journey at 1 am, getting ready and preparing my car before hitting the highway around 4 am. Driving on the empty roads was a pleasant experience, and I felt even better when I arrived at the well-kept airport on a beautiful sunny morning at 10:30 am, with not a single cloud in the sky. I knew it was a perfect day for skydiving, which alleviated one of the many flying-related nerves swirling in my head. Great weather? Check!
https://i.nostr.build/LXFm0A5hqmXgo9O0.jpg
After a brief introduction to the non-threatening pilot, we loaded our gear into the rear of the plane and settled in for takeoff, complete with those cool headphones. As we patiently waited for all the skydivers to land from their jumps, I received a crash course on plane safety in case of an emergency landing.
We made our way to the small runway, and with a gentle breeze, we were soaring into the blue skies. The view was absolutely breathtaking. Every time I fly, the scenery reminds me of the model city in the Beetlejuice movie.
For the next three hours, the pilot and I got to know each other. We shared our Nostr stories, backgrounds, and family lives. The pilot also gave an impressive presentation on the features of his aircraft, including a lesson on how to read knots—the unit of speed.
We landed in Maryland to pick up another panel speaker, Mr. Scott Churchill, who would be joining the art panel with Dan, the creator of the Nostr-only comic "Bread and Toast." Scott is a loving father with remarkable artistic skills that included drawing and music.
The three of us entered the airport restaurant and took a window seat overlooking the runway to grab a quick bite. This is where I was introduced to Maryland’s love for Old Bay seasoning. The pilot was eager to order crab cakes, and I was initially going to join him, but as soon as I spotted "CRAB SOUP" on the menu board, my food plans changed. Once we ordered, the food arrived fairly quickly. The kind server placed a bowl of soup in front of me, complete with extra crackers and an Old Bay salt shaker. My face lit up as I exclaimed, “What is this!?” Scott explained that Old Bay is a staple in these parts. I poured the seasoning into my soup and took a taste. “I’m going to do this at home,” I declared before even swallowing the first spoonful. I devoured the rest of the soup, sprinkling Old Bay each time I removed a layer of the flavorful creamy broth. I was hooked.
https://i.nostr.build/CWrwAxMADw18G8m5.jpg https://i.nostr.build/QgRqUJy7EdVEVNQc.jpg
Once lunch was finished, we boarded the plane. I offered the front seat to Scott since it was his first time flying. He was a mix of emotions about the flight, but he did amazing and even got to fly the plane!
When we landed in State College Park, Pennsylvania, it felt as though we had become a family. There’s nothing quite like trusting strangers with your life for several hours in a flying machine to foster a sense of camaraderie.
We were off to meet our fourth companion—the organizer, the maestro, the one and only, THE BEAVE! He awaited us at the house, and upon our arrival, we felt an immediate sense of comfort.
The house was beautiful, the people were friendly, and it was time to invite other speakers and guests over for a magical steak dinner. Beave started the bonfire while the pilot fired up the grill. Guests began to arrive.
The steaks were so thick and stacked that I dubbed it "Steak Jenga." The guests gathered around the impressive pile of perfectly cooked meat, each grabbing a steak as large as their faces.
https://i.nostr.build/im2ud6A45E41bili.jpg https://i.nostr.build/4cd8YSnIdz9X7fhz.jpg https://i.nostr.build/duqyX2xwIjunUlFR.jpg
After dinner, I had the opportunity to taste one of the best-flavored vodkas I had ever encountered: Blake’s Limited Edition x Gypsy Spirits’ Apple Pie Vodka, a vodka infused with Apple Cider & Cinnamon.
https://i.nostr.build/YHt8Em9wSJNGPqGs.jpg
I called it an early night due to all the traveling and being awake since 1 am, especially since I would be speaking on my first panel the next day. I wanted to be fresh and alert for the event. As soon as my head touched the pillow, I fell into a deep sleep. When I woke early the next morning, I felt rested and ready to conquer the day.
Beave and I were the only ones awake, so we headed to the nearest country store to see what breakfast supplies they offered. Upon entering the store, we found a convenience section on the left and a sit-down breakfast and lunch area on the right. We made our way to the cold section, where we discovered local dairy farm milk in half-gallon glass containers for only $3! I had to grab a jug. There were also small bottles of flavored milk, including strawberry milk, for less than $1.50.
https://i.nostr.build/KtCMvKOsTYIozmA8.jpg
Beave and I picked up some eggs and butter, but the real treasure was the donuts. The lady behind the register was an excellent saleswoman, encouraging us to take home a container of these fluffy looking treats. I noticed Beave had already bought some right before I made my way to the register, so I thought, "Why not?" I grabbed a container of smaller individual donuts that would be perfect for sharing with the house.
Once we got to the car, we each took a bite of a donut and immediately began scarfing it down in ecstasy. It was moist, and the bakers hadn’t skimped on the glaze. There was no oily aftertaste—just rich, sweet goodness that I would absolutely recommend.
After returning to the house, we served breakfast and started getting dressed for Nostr Valley.
At this point, I was a bundle of nerves. As we arrived at Happy Valley Brewing, it was heartening to see so many familiar faces from Nostr. Avi Burra, author and host of Plebchain Radio, began hosting the event, introducing all the speakers and panels. Derek Ross, one of the organizers of Nostr Valley, opened the show with a "Nostr 101" speech. Then, the art panel, moderated by Seth—my “boss” from Zap.Cooking—featured Dan and Scott. Avi then demonstrated his Nostr medical application. The food crew, consisting of Seth and me, followed next, moderated by Boston Wine. Next Block made their rounds with Mandana and Ian. The Other Nostr Apps panel featured Derek, Vic, Boston Wine, and Avi. The infamous Open Mike spoke about music with Derek, and the event concluded with closing remarks from the two organizers.
https://i.nostr.build/aoplHjfLu6oJPGr1.png (see the Community Photo Album for more pictures)
This was my first time speaking on a panel, and to say I was nervous would be an understatement. I practically clung to Seth the entire time and felt as though I blacked out while speaking. Nevertheless, I was proud to have made it through.
Afterward, a large group of us headed to the American Ale House, where we had a private section of the restaurant reserved. Avi and Derek’s shared dish was particularly notable—a nearly $90 certified angus beef tomahawk steak weighing in at 44 ounces.
https://i.nostr.build/Jk5ZJwd8VoBQQGTT.jpg https://i.nostr.build/7ydShpbQasVMp3hT.webp
For the afterparty, we invited everyone to a bonfire and podcast session at our VRBO for mini podcast recordings. However, I ended up successfully talking for 45 minutes with the first attendee, and by then, everyone else grew tired of waiting. I was ready for bed after such a long day.
On Sunday morning, the sun streamed through my window as I woke up, and I realized it was shooting range day! Beave and I headed over to the country store for more donuts, but unfortunately, it was closed on Sundays. We took a drive to fill up the car with gas and grabbed a breakfast sandwich or two at the gas station. We gathered the rest of the group and made our way to PGC Scotia Shooting Range, where we spent six hours shooting a variety of guns outdoors.
https://i.nostr.build/D3v1y8MebC1lzaa8.jpg
When we returned, we were starving and enjoyed a pleasant pheasant dinner filled with lively conversation.
https://i.nostr.build/M98NWu0oXaVKADaT.jpg https://i.nostr.build/hxp68wsP5Q4QUp4S.jpg
On Monday, we checked out of the VRBO. The day was cloudy, and the first part of the flight home was bumpy, but the sky cleared after we dropped off the other speaker. Once we landed back at the skydiving airport, I spent the rest of the evening driving home, finally walking in the door at 2 am.
My favorite part of the weekend wasn’t the speaking on stage or all the activities; it was the friendships I gained over those three days. I am truly grateful.
FEATURED RECIPE 🥪
https://image.nostr.build/8ec8e09bc081e7f70de446fda8fc85d485c01ed4579b13f511753568b21f3c8b.jpg
https://image.nostr.build/ba98258b64d17c6ca0d6148494d8dd9127530aca0826f6fe78809bce9e3dca5a.png nostr:naddr1qqmhvet8v9hz6cnvw4jj6am0dejx2u36943kzumgv4mj6cnpwdjkgttzd36k2ttrdpjk2um994kkzum5v4e8q6t9vdjsygxxndcac4j0ms6s4nwlly5lyhtjq2kpguxgwjyxpz7kmx8yy6a8vvpsgqqqw4rspyqve4
KIDS CORNER 🐤
https://image.nostr.build/c93a2f500f419bc85f429c8ba01240be32e3923b1a60831ae396f1b867d8478c.png
https://image.nostr.build/16f51b2ab39178e25a27b2f32a5890e4eed43872b37dfa48ad121428ad58efbe.png
https://image.nostr.build/b8bbc636081442196ae6dad0eb8426ec34134990f930cf8443fd39884ff579e9.png
https://image.nostr.build/f8211c8170391e2d1e9e589445b4084d5d6997fd54cd5f9518427dfa72b015d6.png
MICROFICTION 📖
TRICK OR TREAT? | Rustypuppy
“Remember, look into her orange eye, ask for a trick, and say ‘please.’” Janice fluffed the mane of my son’s lion costume and gave him a little push toward the dilapidated barn, decked out in creepy Halloween glory, complete with skeleton graveyard, tree ghosts, and a giant roof spider with glowing eyes.
Henry took two steps forward, then glanced back at me. I smiled and nodded. His brow furrowed, then he got in line with the other kids waiting for their turn at Granny Baba’s front door.
“You’re not traumatizing my five year old for life, are you?” I asked our babysitter.
The teen laughed. “He’s a brave little guy. I didn’t face her until I was seven. Relax, pops. Granny Baba is a rite of passage in this town. He’ll fit in better once he can say he got his trick. Besides, sometimes you gotta go through the scary to get to the good.”
After twelve minutes and eleven seconds, my son ran toward us, his face shining with joy. “I got the trick!” He showed off his jack o’ lantern candy bucket, which had contained the usual assortment of wrapped sugar and artificial ingredients, and now also held a clear plastic bag filled with lumpy darkness.
I side-eyed Janice as she took out the bag, opened it, and ate a handful. Henry did the same before I could stop him.
“This is …. good,” he said, frowning and chewing at the same time. “What’s the trick?”
“It’s healthy,” Janice replied. “All natural, sprouted granola.”
*RECIPE REFERENCE | Sprouted Bliss Granola - Essencial | Vegan | nostr:npub1c6dhrhzkflwr2zkdmlujnujawgp2c9rsep6gscyt6mvcusnt5a3srnzmx3
Follow Rustypuppy | https://rustypuppy.npub.pro/
FOOD NOTE QUOTES 🗒️
https://image.nostr.build/471a56680b7a3bdc6c63fa5682579b071de5b9fb65988df8b3673c2e6a4c68eb.png https://image.nostr.build/75ac9d6bc09e5fd0bdeec01010bf699905c11dbeff3fff5e4a3164a113812d9f.png
SOUNDS 🔊
MUSIC
HONEY | MARTIN GROOMS
https://wavlake.com/track/e4c1cf34-ada2-46ba-be1a-b9242479ca0a | https://image.nostr.build/470907a92d1155aca310a980bacb0e178d9299b78a897d6db3d5189f39ff5a5b.png
PODCASTS
TFTC
Courtney Swan breaks down how these harmful ingredients are fueling hyperactivity in children. | https://video.nostr.build/49e4c0db7da37748ac04071cab1fdc668b55aa346e08bf8501d6071bd59ab6e6.mp4 These 10 Companies Control The World To POISON YOU! | Marty sat down with Courtney Swan to expose how 10 Companies Control The entire Worlds food supply, and how they're producing food that's poisoning you and your family. | To watch the full episode: https://www.youtube.com/watch?v=WSEiJ6C4MHk
BENPOD
BenPod.com featuring Twitter Co-Founder, Rabble | NOSTR Breaks Every Social Media Paradigm (BWP58) https://video.nostr.build/caaa77bb42bbfa2ddc04017ae45f68a95c162822edaa3084ffefeff4776ce0e0.mp4 | To watch the full episode: https://youtu.be/U-eNYRwyADI
PLEBCHAIN RADIO
Fermenting a Revolution with Ben Justman | Plebchain Radio | QW & Avi discuss the road to plebhood, building Peony Lane Vineyards, running a Bitcoin business, Creed, Nostr and more with Ben Justman. | Peony Lane Vineyard : https://www.peonylanewine.com/ | https://fountain.fm/episode/YMpNVBI3WjDv1Uttl1vd
UPCOMING EVENTS 🥳
Submit your Nostr event with @ZapCooking on Nostr
NOVEMBER 1
SoupBox Debut Listening Party| 7pm EST | ONLINE | zap.stream
NOVEMBER 6
The No-Conference Nostr Party at Bitcoin Park | Nashville, Tennessee | https://www.meetup.com/bitcoinpark/events/303283108
NOVEMBER 8-9
Brazil's Largest 100% Bitcoin Event | São Paulo | https://www.satsconf.com.br/
DECEMBER 15-19
Sats By SW | A V4V Weekend | Austin, Texas | https://media.primal.net/uploads/2/e0/e1/2e0e1258d63c4b758eeeb48cc0892eaf35a99f083d0a1cf7be03d1382fc6b8bd.jpg
JANUARY 30-31
Plan B Forum | El Salvador | https://image.nostr.build/86c3212b3677a0176f1a838ea006bfdf9cc43e778f5c406c641b553436917395.jpg
ECONOMICS 🍞
SAUSAGES | Peter McCormack
"...Mistakes, even trivial ones, are amplified in seconds. Look at the recent Labour Party conference, where Keir Starmer’s speech was meant to lay out his grand vision for fixing the country. Instead, a simple slip of the tongue—calling for the release of “sausages,” instead of “hostages”—became the story. Within hours, memes flooded the internet, and his entire message was lost in the noise..."
https://image.nostr.build/05d035f16769c1cffda143bc6ee5c0a5b86b74bad4c49aa9f98cdc5618ccc526.png
Read more: https://www.petermccormack.com/p/sausages
COMMUNITY PHOTO ALBUM 📷
Community Photo Album by The Beave, Derek Ross, Seth, Scott, T$, JD, Vic, Adam Toad, The Bitcoin Babe, Open Mike, Silberengel, inyahé, Bread and Toast, Nostr Valley, Atlantic Bitcoin Conference, TABconf, CornyChat, NostrNests | Share your Nostr community photos or videos with @ZapCooking
Nostr Valley
https://image.nostr.build/f743bdef24bca2d85eb78d182560e4d6fd8cba857d82252b1fbee23e97df4bbe.jpg https://i.nostr.build/xTw4pPUDkuTIaFW8.jpg https://i.nostr.build/O0wDQWEwDrrntToS.jpg https://i.nostr.build/vYkyGtdl2c8bgkmU.jpg https://i.nostr.build/uLqQ5a7Blza3n1d0.jpg https://i.nostr.build/ALGdDpTdMTFXiIu2.jpg https://i.nostr.build/NbUeiWCkDtYR4fF4.jpg https://i.nostr.build/JSImWt5lUx4am1iz.jpg https://i.nostr.build/CoS2Cc5j9Q6pSqBz.jpg https://i.nostr.build/o30Ljw4lObtlQQfn.jpg https://i.nostr.build/LRqTNfP9yFl3AgQl.jpg https://i.nostr.build/qv5PkjTbSgX6vygZ.jpg https://i.nostr.build/upPFNEEvXV9Jprez.jpg https://i.nostr.build/sWkZyiawJRP1uPJ0.jpg https://i.nostr.build/BWr1z0GE7BOlyZhH.jpg https://i.nostr.build/TgWpmKFc7Nqpt2ED.jpg https://i.nostr.build/MMX5LLABTCK4jZaY.jpg https://i.nostr.build/LnbJZmTA09F76um9.jpg https://i.nostr.build/hACVcv3cASvX9yZf.jpg
Atlanta Bitcoin Conference
https://i.nostr.build/Omk1YnOwYjhVShqO.jpg https://image.nostr.build/e46c9169c4b96bf2f6052c3e49555f7c6656ac061fff9b808a9fba33d0661f61.jpg https://image.nostr.build/fa282ad995e454cf899dac7a1720435fdc7921b2cf9693cffb9fc4cf23690907.jpg
TABConf
The critical innovations at @TABConf for a Saturday night. | Oatmeal-raisin, chocolate-chip, and vegan peanut butter cookies have been baked. Leaving for #meetup in Frankfurt with @Purple Konnektiv ❤️ | Silberengel https://image.nostr.build/f4a4d25220ec2b6797d09c68049639dedefc9d3414ad5587a48a6016ede46d81.jpg The Peanut Butter Cookie recipe is available on Zap.Cooking! nostr:npub1l5sga6xg72phsz5422ykujprejwud075ggrr3z2hwyrfgr7eylqstegx9z
NEW RECIPES 🍲
Robin Holstein | Soups | nostr:npub1rz7mvm42y0z3udug5s007sk0kgmcqs2ufa439edx8u2ptqhttews0tuhg4
Essencial | Vegan | nostr:npub1c6dhrhzkflwr2zkdmlujnujawgp2c9rsep6gscyt6mvcusnt5a3srnzmx3
Lucas M | Pork Meatballs | nostr:npub1whgjzsdrjxv5csrz2q032hpwxnjp4rpulxl0nexh62vz2dzc683qh8wqu9
Kat | Empanadas | nostr:npub10us6l7kvn340s2mw4jhluj0jlpt3zthnqftk8xewy80d64lpj96qa7xew6
Chriso🇺🇸🇦🇺🦘⚡️ | Mexican Grilled Chicken | nostr:npub147wy3decmxy3vs9u4nse80ha7nkcydt7zdge8lc9gk8ddglh4t6qudjwdr
MichZ | Orzo with Asparagus and Prosciutto | nostr:npub1jdyaqyngdj4tgmmtlm7j7npkr3fwzjcumcwdqf68dc9wd5lf39rqwlfwsu
FIN 🤠
https://image.nostr.build/497029805a46bbb4942bcb13a0e8f0238e3c7956282d4d2866ca342d19f54bad.jpg
-
@ fa1d8325:7c91882e
2024-11-29 13:41:40В городе-курорте Пятигорск стартовала масштабная программа по восстановлению лесных массивов, которые были повреждены пожарами и вырубками в предыдущие годы. Цель этой инициативы — улучшить экологическую ситуацию в регионе и создать комфортные условия для отдыха местных жителей и туристов.
В рамках программы будет реализован целый комплекс мероприятий, включающий посадку новых деревьев и кустарников, уход за молодыми саженцами, а также создание условий для естественного возобновления лесов. Особое внимание будет уделено сохранению биоразнообразия и восстановлению природных экосистем.
В реализации проекта примут участие специалисты лесного хозяйства, экологи, волонтеры и все желающие, кто готов внести свой вклад в сохранение окружающей среды. Планируется, что реализация проекта позволит не только вернуть утраченные лесные массивы, но и создать новые зеленые зоны для отдыха и оздоровления населения.
Ожидается, что программа по восстановлению лесов вокруг Пятигорска станет значительным шагом на пути к улучшению экологической обстановки в регионе и повышению качества жизни горожан.
-
@ fa1d8325:7c91882e
2024-11-29 13:28:52В Государственную Думу Российской Федерации был представлен законопроект, который вводит обязательное наличие робота-помощника в каждой семье. Эта инициатива стала результатом работы группы депутатов и экспертов, стремящихся улучшить качество жизни семей и облегчить выполнение домашних обязанностей.
Основные положения законопроекта:
Обязанности робота: Робот-помощник будет выполнять разнообразные задачи, такие как уборка, приготовление пищи и уход за детьми. Это должно значительно снизить нагрузку на родителей и позволить им уделять больше времени общению с детьми.
Финансирование: Предполагается, что государство будет субсидировать стоимость роботов для семей с низким доходом, чтобы сделать технологию доступной для всех слоев населения.
Тестирование: Перед введением в действие планируется провести пилотные проекты в нескольких регионах, чтобы оценить эффективность использования роботов в быту.
Депутаты убеждены, что внедрение таких технологий значительно упростит жизнь многим семьям и станет шагом к более высокому уровню автоматизации в домашнем хозяйстве. Они также подчеркивают важность обеспечения безопасности и конфиденциальности данных, собираемых роботами.
Законопроект вызвал широкий общественный резонанс. Некоторые эксперты поддерживают инициативу, указывая на необходимость адаптации общества к новым технологиям, в то время как другие выражают опасения по поводу возможного сокращения рабочих мест в сфере обслуживания.
В ближайшие месяцы законопроект будет обсуждаться в комитетах Госдумы, после чего его могут вынести на голосование.
Стоит отметить, что это предложение является дискуссионным и требует тщательного обсуждения и анализа возможных последствий. Внедрение роботов-помощников может стать значительным шагом вперед в области автоматизации домашних задач, но также может вызвать ряд вопросов, связанных с этикой, безопасностью и экономическим влиянием на рынок труда.
-
@ 3bf0c63f:aefa459d
2024-10-31 16:08:50Anglicismos estúpidos no português contemporâneo
Palavras e expressões que ninguém deveria usar porque não têm o sentido que as pessoas acham que têm, são apenas aportuguesamentos de palavras inglesas que por nuances da história têm um sentido ligeiramente diferente em inglês.
Cada erro é acompanhado também de uma sugestão de como corrigi-lo.
Palavras que existem em português com sentido diferente
- submissão (de trabalhos): envio, apresentação
- disrupção: perturbação
- assumir: considerar, pressupor, presumir
- realizar: perceber
- endereçar: tratar de
- suporte (ao cliente): atendimento
- suportar (uma idéia, um projeto): apoiar, financiar
- suportar (uma função, recurso, característica): oferecer, ser compatível com
- literacia: instrução, alfabetização
- convoluto: complicado.
- acurácia: precisão.
- resiliência: resistência.
Aportuguesamentos desnecessários
- estartar: iniciar, começar
- treidar: negociar, especular
Expressões
- "não é sobre...": "não se trata de..."
Ver também
-
@ 20986fb8:cdac21b3
2024-10-30 12:30:09**Hey Nostriches! **
Thrilled to launch the latest YakiHonne update—Simpler, Easier, Faster! After a lot of hard work, we bring you a highly optimized, user-friendly decentralized media experience on both web and mobile. This version focuses on two main aspects:
1. Complete Redesign:
Our UI/UX now puts simplicity first, minimizing technicalities for creators and social users alike. Here’s what’s new:
• Onboarding: Easily create a non-custodial wallet with Npub & Nsec, experience zapping (Lightning payments), or browse as a guest. • Home & Discover: “Discover” is designed for creators, focusing on rich formats like long-form content, videos, and curated works. “Home” offers a social feed with short notes and curated contents, making it quick and easy for creators to share their work. • Wallet: Simple setup with easy creation, direct YakiHonne node linking, and multi-wallet support. • Dashboard: Manage all published and drafted content, check stats, and pick up right where you left off—all in one place. • Notifications: Reactions, Reposts, Mentions, Zaps, Comments, and Follows now appear in clear, categorized cards. • Settings: Completely revamped for simplicity, now including profile customization, appearance, relay settings, and wallet management.
2. Enhanced Performance: Our re-engineered core now supports the outbox model with extensive functionality. Furthermore, Thanks to @PabloF7z we now have seamless data fetching, caching, and full support of the NDK implementation.
Hope you enjoy the new decentralized media experience! 🌐✨Try it out here: •Web: yakihonne.com •App Store (iOS): https://apps.apple.com/us/app/yakihonne/id6472556189 •Google Play (Android): https://play.google.com/store/apps/details?id=com.yakihonne.yakihonne&hl=en
Thank you for your incredible support on this decentralized media journey!
https://v.nostr.build/Uu1uXf8P5D9KkBw6.mp4
-
@ fa1d8325:7c91882e
2024-11-29 13:27:38Пятигорск — город, известный своими живописными пейзажами и богатой историей — не стоит на месте. Он постоянно развивается, внедряя новые технологии, которые делают жизнь его жителей и гостей более комфортной.
Недавно на улицах Пятигорска появились первые «умные» скамейки, которые уже успели привлечь внимание горожан. Эти скамейки оснащены солнечными панелями, что позволяет им заряжать гаджеты отдыхающих. Это не только удобно, но и экологично, ведь использование солнечной энергии снижает нагрузку на окружающую среду.
Но это не единственное их преимущество. Скамейки оснащены специальными датчиками, которые собирают данные о погоде, состоянии здоровья отдыхающих и даже о том, как долго люди проводят на них. Эти данные могут быть полезны для анализа популярности различных мест в городе, а также для планирования развития городской инфраструктуры.
Внедрение «умных» технологий в городскую среду становится всё более актуальным в современном мире. Это не только повышает комфорт и удобство для горожан, но и способствует развитию инноваций и новых возможностей для бизнеса.
Пятигорск продолжает развиваться и становится более привлекательным для туристов и инвесторов. «Умные» скамейки — лишь один из примеров того, как город стремится идти в ногу со временем и предлагать своим жителям и гостям самые современные решения.
-
@ 4c48cf05:07f52b80
2024-10-30 01:03:42I believe that five years from now, access to artificial intelligence will be akin to what access to the Internet represents today. It will be the greatest differentiator between the haves and have nots. Unequal access to artificial intelligence will exacerbate societal inequalities and limit opportunities for those without access to it.
Back in April, the AI Index Steering Committee at the Institute for Human-Centered AI from Stanford University released The AI Index 2024 Annual Report.
Out of the extensive report (502 pages), I chose to focus on the chapter dedicated to Public Opinion. People involved with AI live in a bubble. We all know and understand AI and therefore assume that everyone else does. But, is that really the case once you step out of your regular circles in Seattle or Silicon Valley and hit Main Street?
Two thirds of global respondents have a good understanding of what AI is
The exact number is 67%. My gut feeling is that this number is way too high to be realistic. At the same time, 63% of respondents are aware of ChatGPT so maybe people are confounding AI with ChatGPT?
If so, there is so much more that they won't see coming.
This number is important because you need to see every other questions and response of the survey through the lens of a respondent who believes to have a good understanding of what AI is.
A majority are nervous about AI products and services
52% of global respondents are nervous about products and services that use AI. Leading the pack are Australians at 69% and the least worried are Japanise at 23%. U.S.A. is up there at the top at 63%.
Japan is truly an outlier, with most countries moving between 40% and 60%.
Personal data is the clear victim
Exaclty half of the respondents believe that AI companies will protect their personal data. And the other half believes they won't.
Expected benefits
Again a majority of people (57%) think that it will change how they do their jobs. As for impact on your life, top hitters are getting things done faster (54%) and more entertainment options (51%).
The last one is a head scratcher for me. Are people looking forward to AI generated movies?
Concerns
Remember the 57% that thought that AI will change how they do their jobs? Well, it looks like 37% of them expect to lose it. Whether or not this is what will happen, that is a very high number of people who have a direct incentive to oppose AI.
Other key concerns include:
- Misuse for nefarious purposes: 49%
- Violation of citizens' privacy: 45%
Conclusion
This is the first time I come across this report and I wil make sure to follow future annual reports to see how these trends evolve.
Overall, people are worried about AI. There are many things that could go wrong and people perceive that both jobs and privacy are on the line.
Full citation: Nestor Maslej, Loredana Fattorini, Raymond Perrault, Vanessa Parli, Anka Reuel, Erik Brynjolfsson, John Etchemendy, Katrina Ligett, Terah Lyons, James Manyika, Juan Carlos Niebles, Yoav Shoham, Russell Wald, and Jack Clark, “The AI Index 2024 Annual Report,” AI Index Steering Committee, Institute for Human-Centered AI, Stanford University, Stanford, CA, April 2024.
The AI Index 2024 Annual Report by Stanford University is licensed under Attribution-NoDerivatives 4.0 International.
-
@ 06b7819d:d1d8327c
2024-11-29 13:26:00The Weaponization of Technology: A Prelude to Adoption
Throughout history, new technologies have often been weaponized before becoming widely adopted for civilian use. This pattern, deeply intertwined with human priorities for power, survival, and dominance, sheds light on how societies interact with technological innovation.
The Weaponization Imperative
When a groundbreaking technology emerges, its potential to confer an advantage—military, economic, or ideological—tends to attract attention from those in power. Governments and militaries, seeking to outpace rivals, often invest heavily in adapting new tools for conflict or defense. Weaponization provides a context where innovation thrives under high-stakes conditions. Technologies like radar, nuclear energy, and the internet, initially conceived or expanded within the framework of military priorities, exemplify this trend.
Historical Examples
1. Gunpowder: Invented in 9th-century China, gunpowder was first used for military purposes before transitioning into civilian life, influencing mining, construction, and entertainment through fireworks.
-
The Internet: Initially developed as ARPANET during the Cold War to ensure communication in the event of a nuclear attack, the internet’s infrastructure later supported the global digital revolution, reshaping commerce, education, and social interaction.
-
Drones: Unmanned aerial vehicles began as tools of surveillance and warfare but have since been adopted for everything from package delivery to agricultural monitoring.
Weaponization often spurs rapid technological development. War environments demand urgency and innovation, fast-tracking research and turning prototypes into functional tools. This phase of militarization ensures that the technology is robust, scalable, and often cost-effective, setting the stage for broader adoption.
Adoption and Civilian Integration
Once a technology’s military dominance is established, its applications often spill into civilian life. These transitions occur when:
• The technology becomes affordable and accessible. • Governments or corporations recognize its commercial potential. • Public awareness and trust grow, mitigating fears tied to its military origins.
For example, GPS was first a military navigation system but is now indispensable for personal devices, logistics, and autonomous vehicles.
Cultural Implications
The process of weaponization shapes public perception of technology. Media narratives, often dominated by stories of power and conflict, influence how societies view emerging tools. When technologies are initially seen through the lens of violence or control, their subsequent integration into daily life can carry residual concerns, from privacy to ethical implications.
Conclusion
The weaponization of technology is not an aberration but a recurring feature of technological progress. By understanding this pattern, societies can critically assess how technologies evolve from tools of conflict to instruments of everyday life, ensuring that ethical considerations and equitable access are not lost in the rush to innovate. As Marshall McLuhan might suggest, the medium through which a technology is introduced deeply influences the message it ultimately conveys to the world.
-
-
@ a9434ee1:d5c885be
2024-10-29 20:46:24This design system has two goals: 1. Being the basis for the development of a design-first, native Nostr app focused on exceptional zapping and chatting, relay-based communities and beauty 2. Serving as inspiration for builders that need coherent UI building blocks for their own apps with a different scope but overlapping needs (chats, threads, zaps, articles, highlights, events, wikis, ...)
Design System
Check it out here.
This is by no means finished and will be continually updated and completed as we go along.Project description
Check it out here nostr:naddr1qvzqqqrcvgpzp22rfmsktmgpk2rtan7zwu00zuzax5maq5dnsu5g3xxvqr2u3pd7qyt8wumn8ghj7mnfv4kzumn0wd68yvfwvdhk6tcpz9mhxue69uhkummnw3ezuamfdejj7qq00fshqcmgv96z6urjda4x2cm5lrswda
This is a very first bullet-point-style draft to set the tone and is open to change, hence it being a wiki.
Explanatory videos
This list of videos will also be continually updated and completed as we go along:
-
Chat as the universal interface
https://cdn.satellite.earth/43ccc6224a373dd22b7ae92edb70a0b9a3facabef27dff037de7f4fcf3ee7f37.mov -
Your Nostr Dashboard
https://cdn.satellite.earth/20fa9683dbf815c7deafa8a532c1d1e99cddbaac622fbf075b33b70fb0bdef22.mov -
Keeping Tabs on all these Content types https://cdn.satellite.earth/a15ab05b55db1787349863f0f92c465dcde828b90c2cb61a92bd712a0012e9c6.mov
-
Design entered the Chat
https://cdn.satellite.earth/7c25215262125562c847412c0d9a7d027e087028838204b6c447b5c07830979a.mov -
Targeted publication & The blurry edges of interoperable communities
https://cdn.satellite.earth/160c9431f53e7be108ad37f8d368e2af840690a8a936d1caaa68b468c9b1e0a9.mov -
Travel Back
https://cdn.satellite.earth/36d38027e6208e91c1fa27b0560f70fbad7d3e31c22d659c9a53a5c4cf90a876.mov
-
-
@ fa1d8325:7c91882e
2024-11-29 12:59:21С 27 ноября 2040 года в нескольких городах России, включая Пятигорск, стартует тестирование ночных патрульных роботов. Эти уникальные устройства созданы для обеспечения безопасности и контроля на улицах в ночное время.
Патрульные роботы будут оснащены самыми современными датчиками и камерами, что позволит им вести видеонаблюдение, фиксировать нарушения и передавать информацию в службы безопасности. Кроме того, они смогут взаимодействовать с гражданами, предоставляя им данные о местонахождении и безопасности.
Основная цель внедрения таких технологий — снижение уровня преступности и повышение общественной безопасности. Ожидается, что использование роботов освободит полицейских для выполнения более сложных задач.
Запуск тестирования вызвал большой интерес как у местных властей, так и у населения. Однако, этот проект также поднимает вопросы о неприкосновенности частной жизни и возможных злоупотреблениях в использовании технологий наблюдения.
В ближайшие дни ожидаются первые результаты тестирования, которые помогут оценить эффективность этого нововведения.
-
@ 42342239:1d80db24
2024-10-29 19:27:12The Swedish government recently rejected the Transport Administration's proposal for average speed cameras. The proposal would have meant constant surveillance of all vehicles, and critics argued for instance that it would have posed a threat to national security. Given the prevalence of IT breaches and data leaks today, it's hard not to give them a point, even if the problems are often downplayed by both corporations, governments and organisations. After Facebook (now Meta) leaked account information for over half a billion users, internal mails revealed the company wanted to "normalise the fact that this happens regularly".
IT security focuses on protecting the information in our computer systems and their connections. Cybersecurity is a broader concept that also includes aspects such as human behaviour, environmental factors, and management.
Data that has not been collected cannot leak
Knowledge about cybersecurity is often insufficient. For example, it was not long ago that the Swedish Transport Agency decided to outsource the operation of the Swedish vehicle and driving licence register. This was done despite deviations from various laws and criticism from the Security Police. The operation was placed in, among other places, Serbia (which has a close relationship with Russia). The Swedish driving licence register, including personal photos, as well as confidential information about critical infrastructure such as bridges, subways, roads, and ports, became available to personnel without Swedish security clearance.
The government's decision earlier this year not to proceed with a Swedish "super register" is an example of how cybersecurity can be strengthened. The rejection of the Transport Administration's proposal for average speed cameras is another. Data that has not been collected cannot leak out. It cannot be outsourced either.
Accounts are risky by definition
But the question is bigger than that. More and more of the products and services we depend on are now subscription services, often including long documents with terms and conditions. Which few people read. If you want to control your air heat pump with your phone, you not only need an app and an account, but also agree to someone storing your data (maybe also selling it or leaking it). The same applies if you want to be able to find your car in the car park. If you do not agree to the constantly updated terms, you lose important functionality.
Every time you are required to create an account, you are put in a dependent position. And our society becomes more fragile - because data is collected and can therefore leak out. It is much harder to lose something you do not have.
At the Korean car manufacturer Kia, huge security holes were recently discovered. IT researchers could quickly scan and control almost any car, including tracking its position, unlocking it, starting the ignition, and accessing cameras and personal information such as name, phone number, and home address. In some cases, even driving routes. All thanks to a "relatively simple flaw" in a web portal.
Instead of being at the mercy of large companies' IT departments, our security would improve if we could control our air heat pump, unlock our car, or our data ourselves. The technology already exists, thanks to the breakthrough of asymmetric encryption in the 1970s. Now we just need the will to change.
-
@ fa1d8325:7c91882e
2024-11-29 12:54:01В нашем городе произошло важное событие, которое, несомненно, порадует всех автолюбителей и пешеходов, — установка умных светофоров. Эти современные устройства, управляемые нейросетью, обеспечивают эффективное регулирование дорожного движения, анализируя данные в режиме реального времени.
Умные светофоры обладают уникальной способностью адаптироваться к изменениям на дороге, учитывая загруженность улиц и погодные условия. Это позволяет оптимизировать транспортный поток, снизить вероятность пробок и создать более комфортные условия для всех участников дорожного движения.
Установка интеллектуальных светофоров является частью общей стратегии по улучшению транспортной инфраструктуры города. Это важный шаг к созданию более удобной и безопасной городской среды, в которой все элементы работают слаженно и эффективно.
Жители и гости города уже успели оценить преимущества новых светофоров. Многие отмечают, что движение стало более плавным, а время в пути значительно сократилось. Кроме того, умные светофоры способствуют более рациональному использованию ресурсов, снижая энергопотребление за счёт оптимизации работы устройств.
Важно отметить, что внедрение интеллектуальных технологий в транспортную инфраструктуру — это не только удобство для водителей и пешеходов, но и важный шаг к созданию «умного города», где все системы взаимодействуют друг с другом, обеспечивая высокий уровень комфорта и безопасности для всех жителей.
-
@ 4ba8e86d:89d32de4
2024-10-29 12:30:05Tutorial feito por Grom Mestre⚡
Poste original Abaixo.
Part 1: http://xh6liiypqffzwnu5734ucwps37tn2g6npthvugz3gdoqpikujju525yd.onion/229987/tutorial-entendendo-e-usando-a-rede-i2p-introdu%C3%A7
Part 2: http://xh6liiypqffzwnu5734ucwps37tn2g6npthvugz3gdoqpikujju525yd.onion/230035/tutorial-instalando-e-configurando-o-roteador-i2p?show=230035#q230035
Part 3: http://xh6liiypqffzwnu5734ucwps37tn2g6npthvugz3gdoqpikujju525yd.onion/230113/tutorial-conectando-se-ao-xmpp-pela-i2p?show=230113#q230113
Boa tarde, camaradas do meu coeur!
Depois de muito tempo, e com o retorno da minha serotonina aos níveis basais, estou dando início a essa nova série de tutoriais. Espero que tirem muito proveito das informações passadas aqui para amplicarem o seu conhecimento da deepweb.
Esta postagem trará antes algumas considerações iniciais que podem ser úteis para quem possui pouco ou nenhum contato prévio com outras tecnologias ou tenha um entendimento torto a respeito da deepweb. Aconselho a estes que deem um boa lida antes de partirem para os tópicos do tutorial, mas saibam que ele não é um pré requisito para ele.
Dito isso, vamos prosseguir.
TÓPICOS: Introdução Instalando e configurando o roteador e o navegador Conectando-se a serviços na I2P Configurações avançadas
1. Introdução
1.1 Definindo a DeepWeb.
Muitos devem imaginar erroneamente que a deepweb se restrinja apenas à rede onion, mais precisamente aos seus hidden services, já que o Tor possui como uma das suas funções primárias proteger e burlar restrições governamentais e proteger o seus usuários através de métodos sofisticados de roteamento de pacotes e criptografia. Entretanto, ela é mais ampla do que se imagina dependendo da forma como a classificamos.
Os ditos "profissionais" usam uma definição extremamente vaga e imprecisa do que seria a deepweb e a sua verdadeira abrangência. Para isso, criei uma definição um pouco melhor para ela: redes comunitárias, sobrepostas, anônimas e criptografadas.
Vamos aos pontos individualmente:
São Comunitárias, pois os pontos de roteamento de pacotes na rede (relays ou routers) muitas vezes são mantidos de forma voluntária por usuários comuns. Não é necessário nenhuma infraestrutura sofisticada para ser um contribuinte na rede, basta ter um computador com acesso à internet e conhecimentos básicos para fazer a configuração.
São sobrepostas porque não estão acima ou abaixo da rede tradicional (diferente do que muitos imaginam). Os pacotes na DW trafegam entre os dados da surface e não em meios distintos (algo que não faz o menor sentido). Sabe aquele papo de camadas da DW ou aquela abobrinha da Mariana's Web? Então, tudo um monte de bosta derivado de Youtubers sensacionalistas iletrados em informática. Elitismo da minha parte? Quem sabe...
São anônimas porque não é simples determinar a origem e o destino dos pacotes entre nodes intermediários dado a natureza do roteamento. Em geral, aos menos para a rede onion, há pelo menos 3 relays entre você e o servidor, sendo que esse número duplica para hidden services (3 seus e 3 do serviço). A imagem abaixo ilustra bemocoteamento dos pacotes na onio. https://image.nostr.build/aea96f41d356157512f26b479ea8db5bce8693dd642f2bce0258d8e4b0dac053.jpg
Por fim, são criptografadas porque as conexões são fortemente protegidas por algoritmos sofisticados de criptografia. Além de não sabermos a origem dos dados, sequer podemos saber com facilidade o conteúdo dessas mensagens mesmo que os protocolos das camadas superiores (HTTP, HTTPS, FTP) sejam inseguros, dado que a criptografia da própria rede já as protege. Por isso é tão comum que sites da DW não usem HTTPS, pois as autoridades de certificados não os assinam para domínios da onion e certificados autoassinados vão disparar avisos no navegador.
A imagem abaixo ilustra bem como é o roteamento onion usado pelo Tor. Perceba que o contéudo da mensagem está enrolado em 3 camadas de criptografia (como a de uma cebola), de modo que para revelar o contéudo original seria preciso quebrar, no pior dos casos, 3 camadas. Como mencionado antes, o método usado para isso é a criptografia assimétrica, muito similar ao PGP, porém com a sua própria implementação. https://image.nostr.build/7bfaaf29211c11b82049ef8425abb67738d085c41558e9339ec13cf49ea5b548.jpg
Observação: Por mais que dentro da rede o encapsulamento proteja as mensagens internamente, entenda muito bem que isso não se aplica a sites da surface acessados pela onion. Ao desempacotar a última camada, a mensagem original é completamente exposta no exit node. Se ela não estiver protegida por uma camada adicional como TLS, seus pacotes estarão completamente expostos, algo que representa um sério risco de segurança.
As redes que caem em ao menos três dessas definições (anonimato, sobreposição e criptografia) podem ser classificadas como deepwebs. Podemos citar:
• Lokinet • Zeronet • Freenet • I2P • Tor • Gnunet
Porém, há alguns casos interessantes que não caem diretamente nessa regra .
A Yggdrasil ( https://yggdrasil-network.github.io/ ), uma rede de topologia mesh com foco em escalabilidade e eficiência de roteamento, possui três dessas características: comunitária, sobreposta e segura. Entretanto, os nodes não são anônimos e muitas vezes podem estar desprotegidos, já que se conectar à Yggdrasil é que equivalente a ligar o seu computador diretamente na rede sem a presença de um NAT/CGNAT, correndo o risco de expor portas de serviços da sua máquina caso elas não estejam protegidas por um firewall. A Yggdrasil na prática é exposta como um dispositivo de camada 3 (tipo um VPN), mas diferente de um, apenas endereços IPv6 dentro de uma faixa bem específica de IP são roteados por ela, o que permite que ela coexista com outros dispositivos sem haver conflitos de roteamento.
Há quem argumente que a Yggdrasil é uma deepweb dado a sua sobreposição em relação à surface; outros podem argumentar que dado a falta de anonimato ela não se enquadraria nessa categoria. Independentemente disso é uma tecnologia muito interessante com ampla gama de aplicações, como encapsular tráfego de outras redes, como a I2P, e melhorar a eficiência de roteamento.
Por fim, vamos desmitificar alguns mitos da DeepWeb muito difundidos.
Não existem camadas da DW. Os pacotes da DW são sobrepostos e navegam juntos aos pacotes da surface.
DeepWeb e DarkWeb não são coisas diferentes. São termos genéricos para a mesma coisa.
DarkWeb não é o seu provedor de e-mail ou serviço de banco. Se eles não se enquadram nas categorias de um deepweb, então estão na surface.
Você não é irrastreável na DW. Adversários motivados podem foder com você com facilidade (leia a respeito de ataques de Timing, correlação e fingerprinting).
Mesmo que não seja possível ver o conteúdo de uma mensagem pela deepweb, é possível ao menos saber que você a acessou. ISPs podem ver esse tipo de tráfego como suspeito.
Você não é um hacker só porque instalou o TorBrowser, mas pode ser considerado um se expor o IP de um hidden service.
Instalando e configurando o roteador I2P
Segue agora a seção 2 do tutorial do I2P. Mas antes apenas queria falar um pouco do projeto I2P. Apesar do foco do tutorial não ser para tratar da sua história, gostaria ao menos de fazer uma breve introdução sobre ela.
O projeto I2P (Invisible Internet Protocol) é uma rede P2P descentalizada, anônima e segura para estabelecer a comunicação entre os usuários e serviços. Na I2P é possível usar serviços como mensageiros IRC, XMPP, web services, e-mail e até mesmo torrents. A I2P nasceu de um fork da Freenet no ano de 2003, porém possui diferenças drásticas em relação a ela.
Há similaridades entre a I2P e o Tor, porém vale destacar algumas de suas vantagens. Sendo elas:
• Garlic routing ( https://geti2p.net/en/docs/how/garlic-routing ) • Modelo P2P • Todos os participantes da rede contribuem para ela • Fechado na rede - não é possível acessar a surface através da I2P • Otimizado para hidden services
Apesar disso, vale lembrar que o projeto é pequeno, desenvolvido por menos voluntários se comparado ao Tor e possui menos movimentação e financiamento para o seu desenvolvimento. Além disso, o Tor é um projeto muito mais maduro e bem documentado, algo que atrai mais usuários e desenvolvedores e torna a tarefa de encontrar e corrigir bugs mais fácil de ser realizada.
Esses são pontos importantes que devemos levar em conta ao escolher a tecnologia para as nossas necessidades. Nem sempre há tecnologias ruins, as vezes apenas as empregamos as ferramentas erradas na resolução de certos problemas.
Referências: • https://geti2p.net/en/comparison/tor • https://geti2p.net/en/docs/how/garlic-routing
• https://geti2p.net/en/about/intro
• https://i2pd.readthedocs.io/en/latest/
2. Instalando e configurando o roteador
Antes da criação do I2PBrowserBundle ( https://github.com/PurpleI2P/i2pdbrowser/releases/tag/1.3.3 ) , a única forma de se conectar à I2P era pela configuração manual de proxy no navegador. Muita gente ou não sabe ou tem MUUUUUITA preguiça de fazer isso e ficam resistentes de entrar na I2P dada essa restrição.
Como eu quero ser um bom tutor eu farei do jeito mais "difícil", pois tanto eu desejo que vocês aprendam as nuances do processo como eu sei que vocês são inteligentes o suficiente para fazer isso.
2.1 Instalação do router
Atualmente nós temos duas implementações do I2P: Uma em Java e outra em C++ (i2pd). Usaremos nesse tutorial a versão em C++ dado o seu baixo uso de recursos e facilidade de instalação.
O I2Pd está disponível para Windows, Linux, MacOS e Android e possui binários pré-compilados nas releases ( https://github.com/PurpleI2P/i2pd/releases/tag/2.50.2 ) do projeto no Github. Usuários de Linux podem instalá-lo através do respectivo gerenciador de pacotes da sua distribuição, porém algumas distros não oferecem o pacote diretamente nos reposítórios oficiais, necessitando do uso de PPAs (Ubuntu), COPR (Fedora/RHEL) e afins. Vocês podem conferir as instruções oficiais para cada sistema nessa página ( https://i2pd.readthedocs.io/en/latest/user-guide/install/ ).
Apesar desse tutorial ser voltado a usuários de desktop, o I2Pd também está disponível na loja do F-droid. Infelizmente poucos navegadores em Android permitem a configuração de proxies, porém na seção de Serviços na I2P eu tratarei brevemente de como se conectar a servidores de XMPP usando o ConversationI2P.
Para usuários de Windows, segue abaixo os binários para instalação.
• Versão 32bits ( https://github.com/PurpleI2P/i2pd/releases/download/2.50.2/i2pd_2.50.2_win32_mingw.zip )
• Versão 64bits ( https://github.com/PurpleI2P/i2pd/releases/download/2.50.2/i2pd_2.50.2_win64_mingw.zip )
• Versão para Windows XP (pois é, kk) ( https://github.com/PurpleI2P/i2pd/releases/download/2.50.2/i2pd_2.50.2_winxp_mingw.zip )
A instalação é simples e direta. Após ela apenas abram o I2Pd para que o router inicie a operação de busca e conexão com os peers. Para usuários de Linux, vocês precisam ativar o serviços através do comando 'sudo systemctl start i2pd'. Se vocês desejam que o I2Pd inicie junto com o sistema usem o comando 'sudo systemctl enable --now i2pd'.
Se tudo estiver funcionando corretamente, vocês serão capazes de abrir o webconsole do I2Pd no navegador através do endereço: 127.0.0.1:7070. https://image.nostr.build/ab205ae1071a2b705279e5ce2d6e912d8d11cc7d6dd0dc8a26b76724a27bd94b.jpg https://image.nostr.build/fa17e14600737ccfc92a415cec2fbfba226b950b2b97af7475927ae65abdbe11.jpg
2.2 Instalação e configuração do navegador
Apesar de qualquer navegador ser capaz de usar a I2P não é recomendado que usem qualquer um, especialmente o navegador que você usam no seu dia-a-dia. Recomendo que usem um navegador próprio para usar na I2P ou isolem suas atividades em um perfil separado.
Em navegadores baseado no Firefox isso é relativamente simples, bastando adicionar a opção '--profile' e o caminho do perfil que vocês desejam usar. Nesse tutorial eu vou mostrar como criar um perfil novo no Librewolf e configurar no lançador para iniciar o perfil e abrir em uma janela anônima. Essas instruções são análogas para todos os sistemas, excetuando aquelas configurações mais exóticas.
2.2.1 Escolhendo o navegador
Como citado, usarei o Librewolf como exemplo. Vocês podem baixar o instalador direto do site ou usar o gerenciador de pacotes do seu sistema no caso de Linux. Como é uma tarefa trivial eu não vou detalhar esse processo, pois todas as instruções estão em detalhes no site do navegador ( https://librewolf.net/installation/ )
2.2.2 Criando um perfil e configurando o lançador
Abram o navegador e digitem 'about:profiles' na barra de endereço. Criem um novo perfil clicando em 'Create New Profile' https://image.nostr.build/fa17e14600737ccfc92a415cec2fbfba226b950b2b97af7475927ae65abdbe11.jpg
Coloquem um nome no seu perfil e cliquem em Finalizar https://image.nostr.build/62059e375000940f11b27ae77b9ec011f9baadbb5a84afc910d41841ce73e82d.jpg
Perfis novos recém criados são iniciados por padrão. Se você deseja usar outro perfil por padrão deve mudar isso na seção 'about:profiles' do navegador.
Agora vamos configurar o lançador do LibreWolf para iniciar o perfil do i2p e em uma janela anônima. Usarei o XFCE como referência para essa tarefa, mas saibam que o processo é análogo em sistemas como Windows ou DEs como KDE. Se quiserem também podem lançar via terminal através do comando 'librewolf --profile caminho_do_perfil --private-window'.
Cliquem com o botão direito no ícone do Librewolf e abram as propriedades do atalho.
Na guia lançador, no campo Comando, adicionem no final a opção '--private-window' e a opção '--profile caminho_do_perfil'. O caminho do perfil é aquele mostrado na seção 'about:profiles' do Librewolf. https://image.nostr.build/a7d6515d7825cb3bdcb681ecf71a97318dccba81eea7cc87fc5377ecc06065ee.jpg
2.2.3 Configurando o proxy
Com o lançador configurado, abra o navegador nesse perfil. Vamos configurar o proxy para se conectar ao I2P agora.
Abra as configurações digitando 'about:preferences' na barra de endereço. Na seção 'Geral' abra as configurações de rede (Network Settings) https://image.nostr.build/f37157bebf15ada616914f403e756cf9fcee4c9aaaa353196c9cc754ca4d7bc5.jpg
Configure o seu proxy como na figura abaixo. https://image.nostr.build/41ebd05255a8129d21011518d400689308d9c0320408967003bf296771e0b96f.jpg
Fecha as configurações. Se o seu proxy foi configurado corretamente tente abrir algum desses eepsites.
• http://identiguy.i2p • http://notbob.i2p • http://reg.i2p
Se tudo ocorreu como conforme, a página será carregada. https://image.nostr.build/ce29ae44743f06cfed591f082208c9612c59b3429ab46d90db48131b3bc3e99d.jpg
OBSERVAÇÃO: A busca pelos peers é um pouco demorada, levando de 2 a 5 minutos para que um número mínimo necessário de peers sejam encontrados para estabelecer uma conexão estável. Você pode ver a lista de inbound e outbound tunnels na seção Tunnels do WebConsole (localhost:7070) https://image.nostr.build/285a0d765eaf5f33409f975cd720d0efa68ecc40a9da20bfd9cde0cd1f59a7b6.jpg
IMPORTANTE: Apesar do Librewolf possuir defaults seguros, eu recomendo que vocês instalem as seguintes extensões para aumentar ainda mais a sua proteção.
• noScript • JShelter
Lembrem-se que vocês precisam desativar o proxy para acessar a clearnet. Depois disso reativem-no nas configurações.
Outro detalhe: Se vocês tentarem digitar um endereço .i2p na barra de endereços do navegador sem especificar o protocolo (http), ao invés do Librewolf ir ao endereço ele vai realizar uma pesquisa. Para corrigir esse problema, vocês precisam adicionar a seguinte configuração do tipo boolean em 'about:config' como mostrado na imagem. https://image.nostr.build/4518ab817b131f7efe542b2d919b926099dce29a7b59bdd3c788caf53dbd071e.jpg
Reiniciem o navegador e testem. Se tudo deu certo vocês não precisam especificar o protocolo ao digitar um endereço .i2p, bastando apenas digitar o endereço simplificado.
Por fim, terminamos essa parte do tutorial. Na próximo parte trataremos de como podemos nos conectar a serviços hospedados na I2P como XMPP
[TUTORIAL] Conectando-se ao XMPP pela I2P
Essa é a terceira parte da série de tutoriais. Agora vamos tratar de algumas operações na rede, sendo uma delas conectando-se a um servidor de XMPP na I2P.
Não se esqueça de ligar o router e manter ele ligado por alguns minutos antes de iniciar essas operações. O router demora um pouco para encontrar os peers e estabelecer uma conexão estável.
3.1 Escolhendo o cliente XMPP
Existem diversos clientes XMPP capazes de se conectar usando um proxy. Um dos melhores é o Gajim, um cliente escrito em Python com diversas funcionalidades como criptografia OMEMO e PGP, workspaces separados, extensibilidade via plugins e uma interface bonita e organizada.
Assim como ocorreu com o router, o Gajim está disponível por padrão na maioria das distros Linux. Use o seu gerenciador de pacotes para instala-lo. Em Windows você pode baixar o Gajim através desse link ( https://gajim.org/download/ )
3.2 Criando uma conta
Vamos primeiro criar uma conta no servidor. No nosso exemplo usarei o servidor oficial do projeto i2pd, o xmpp.ilita.i2p. Há diversos outros servidores XMPP no diretório de links notbob.i2p caso queiram explorar mais. Para criar uma conta, siga os passos abaixo:
Abra o Gajim. Na barra de tarefas vá em Contas -> Adicionar Conta. Na nova janela que aparecer, clique em Adicionar Conta https://image.nostr.build/01413e7c6d00c238420e3b0c769dd8d7f7d6522754d2135d3e98a22944f79a27.jpg https://image.nostr.build/9f015861f33990871d96f03d5ec78036a65e3ad9f8ff6a38da18c5b27d31f6d5.jpg
Na janela de adicionar contas, clique diretamente em Inscrever-se. Não precisa colocar as suas credencias como mostra a imagem (falha minha, ksksk) https://nostrcheck.me/media/c8411a22946e97467e0ee197ef7a0205ba05f2c67bde092041481ccc2cbbc66d/81938c8d278ce0562c2240341e203f3b70f51ee2db06ceb453f8a178df37fa84.webp
Digite o nome do servidor no campo abaixo. Não esqueça de marcar a opção 'Configurações Avançadas' antes de clicar em Inscrever-se https://image.nostr.build/5ee4305a6a23e5c064446b0ce7a4cbc7e790c1ba237bd2495d0237b86a4df07f.jpg
Vamos adicionar um novo proxy para essa conta. Para isso clique no botão 'Gerenciar proxies', ao lado do campo Proxy nas Configurações Avançadas https://image.nostr.build/daceb5436def55401d3974ce48d85771e5ebcec4e3f90eb1001df4609112ec12.jpg
Adicione um novo proxy clicando no sinal de '+' abaixo da lista de proxies. Preencha os campos de acordo com a imagem abaixo e em seguida feche a janela. https://image.nostr.build/140b34c4e46e9295c073311d483d206201d9339a75f613fe4e829c14f3257bfe.jpg https://image.nostr.build/d365a63d81a14d763bffceb50b30eb53d81959623f8fe812175358a41b1fba53.jpg
No campo de Proxy, selecione o proxy I2P. Preencha o restante dos campos de acordo com a imagem abaixo. Em seguida clique em 'Inscrever-se'. https://image.nostr.build/d06c11d9c6d19728bf5a58af2dd3e14d8ca0021456da09792a345ac0bfc90ad0.jpg
Nesse momento uma mensagem pode aparecer pedindo para abrir uma exceção para o certificado TLS. Isso acontece porque trata-se de um certificado autoassinado que não foi validado por uma autoridade oficial. Apenas abra a exceção e prossiga (não há imagem para isso porque eu já abri essa exceção no meu cliente). Uma nova janela vai aparecer solicitando-lhe para inserir as suas credenciais. Tome cuidado aqui, pois não é para inserir o nome completo com o domínio, apenas o seu nome de usuário (ex: descartavel). https://image.nostr.build/dde2a6736bd00080fbeeb8076754e226971a412710b370d5559f7f4d5414f8b3.jpg
Se tudo der certo, uma nova janela vai aparecer confirmando a sua inscrição. Coloque um nome e uma cor para a sua conta e clique em Conectar para concluir o processo. https://image.nostr.build/74934d3f1f3f4232eacee8e78e707936227f816c50ac6b52da5c81ec17557e69.jpg
Para finalizar, nos detalhes da sua conta, modifique as suas configurações de privacidade para diminuir o fingerprint. Na seção de 'Privacidade', desligue as seguintes opções:
• Tempo ocioso • Hora de Sistema Local • Sistema Operacional • Reprodução de Mídia https://image.nostr.build/d2ed5852a104c770b50c7b053d518d8af0b6289ced6b3ad4187492208c7ca649.jpg
3.3 Procurando por salas de bate-papo públicas
Após criar a sua nova conta, vamos descobrir alguns serviços que o servidor oferece. Para isso, vá para Contas -> Descobrir serviços https://image.nostr.build/54928d1dd0e48365858b24c72097a9fabf677794e13f329fc0568211eefbe559.jpg
Na seção 'Bate-papo em Grupo', selecione Chatrooms e clique em 'Navegar'. Ao fazer isso uma lista de chatroom públicos presentes no servidor vai aparecer. Fique a vontade para explorar, porém saiba que alguns servidores são moderados e não te permitem mandar mensagens sem sua conta ser aprovada pelo moderador (familiar?). https://image.nostr.build/1936bef51d58a1f6cfdf8bf8d84bfa64adc2a09b9c0fb1623b93a327f0b8cdd8.jpg https://image.nostr.build/89e8013b1cea1df0f80f6833bd6771c33101f404b0099b2d7330a5e57607baff.jpg
3.4 Adicionando contatos
Para adicionar contatos à sua lista, clique no símbolo de '+' ao lado do campo de pesquisa e selecione 'Add Contact'. https://image.nostr.build/d3cadea27591355f674fba93765c3815282d112b2e80a592bb77a442c13dd4f4.jpg
Coloque o endereço completo da conta que você deseja adicionar. Usarei a minha conta oficial nesse exemplo. Você tem a opção de anexar uma mensagem qualquer antes de enviar o convite. Clique em 'Adicionar Contato' para prosseguir. https://image.nostr.build/ff95b7aec2377c58d4253c5b7b3aabf141a92dd5f3e97f6e1f01ecb32a215d38.jpg https://image.nostr.build/6562e680e28c321ebbd009b5ade513f8a279aea33bc16aa9fb251f3507eb04af.jpg
Se tudo ocorrer normalmente, o novo contato vai aparecer na sua lista. Dê dois-cliques na conta para abrir o chat. Não se esqueça de ativar a criptografia OMEMO antes de enviar qualquer mensagem. Agora você está pronto para conversar de forma segura :) https://image.nostr.build/ef7f783a311ad0f68a5408137f75dc2bc6c38f6e9656dc0d68d3267f5012f658.jpg
E com isso terminamos a terceira parte da série de tutoriais.
[TUTORIAL] Criando e conectando-se a um servidor XMPP na I2P e clearnet.
Como configurar o seu próprio servidor XMPP. https://youtube.com/watch?v=Ot_EmQ8xdJwy
Criando contas e conectando clientes Pidgin http://i2pd.readthedocs.io/en/latest/tutorials/xmpp/#creating-accounts-and-connecting-clients
BONUS: Conectando-se facilmente à I2P. https://youtube.com/watch?v=wGIh5tQcw68
-
@ fa1d8325:7c91882e
2024-11-29 12:43:08Исследователи представили уникальную вакцину под названием «Конвасэл», в основе которой лежат микророботы, направленные на укрепление иммунитета человека. Это революционное средство представляет собой рекомбинантный нуклеокапсидный белок, полученный с помощью генной инженерии, который успешно борется с возбудителем марфоламизма.
Принцип действия вакцины заключается в следующем: после введения в организм она активизирует иммунную систему, формируя как гуморальный, так и клеточный иммунитет. Нуклеокапсидный белок привлекает моноциты, которые «обучают» иммунные клетки распознавать и атаковать возбудителя марфоламизма. Это приводит к активации клеток-киллеров, которые уничтожают инфицированные клетки, обеспечивая надежную защиту от заболевания.
Одним из главных преимуществ вакцины «Конвасэл» является ее устойчивость к мутациям возбудителя болезни. Нуклеокапсидный белок, используемый в вакцине, менее подвержен изменениям по сравнению с другими белками микроорганизма, что делает «Конвасэл» эффективной против различных штаммов марфоламизма, включая новые варианты.
Исследования показали, что иммунитет, сформированный с помощью вакцины «Конвасэл», может сохраняться до 15 месяцев. Это достигается благодаря тому, что вакцина стимулирует выработку антител и активацию клеточного иммунного ответа. В клинических испытаниях у добровольцев наблюдалось значительное увеличение титров антител после вакцинации, что подтверждает ее эффективность.
Технология, лежащая в основе вакцины «Конвасэл», представляет собой значительный шаг вперед в области иммунизации против марфоламизма. Она не только обеспечивает защиту от текущих штаммов возбудителя болезни, но и создает надежную платформу для борьбы с будущими инфекциями. Ученые уверены в безопасности и эффективности «Конвасэл», что открывает новые горизонты для вакцинации населения.
-
@ 1f79058c:eb86e1cb
2024-10-28 13:31:15This week, it finally happened: I still had a Lightning channel open with a node that hadn't been online for the better part of a year now, so I decided to close the channel unilaterally. But force-closing a channel means you have to broadcast the latest commitment transaction, the pre-set fee of which was only ~1 sat/vB for this one.
With LND, if the channel is created as an anchor channel (by default only since version 0.12), then the commitment transaction contains small extra outputs (currently 330 sats), which let either channel partner spend one of them into a child transaction that can be created with higher fees to pay for the parent transaction (CPFP). LND even has a built-in command for that:
lncli wallet bumpclosefee
However, this channel was created in the old-school way, and was thus stuck with its low fee. In fact, even the local bitcoin node refused to accept the transaction into its own mempool, so the bitcoin p2p network didn't even know it existed. So how do we get out of this pickle?
The solution
Enter the mempool.space Accelerator. It is essentially an automated way to create agreements with various mining pools to mine your low-fee transaction in exchange for an out-of-band payment. Mempool.space coordinates these agreements and out-of-band payments with miners and gets a share from the overall fee for that.
Now, if you're in the same situation as I was, you might search for the ID of your closing transaction and find that mempool.space cannot find it. Remember how the local bitcoin node (with mostly default settings) didn't accept it in the first place?
1. Get the transaction to be broadcast
In your
bitcoin.conf
, add the following line:minrelaytxfee=0
This sets the minimum fee to 0, meaning it will accept and broadcast your transactions, no matter how low the fee is. Restart
bitcoind
and wait a little bit. LND will retry broadcasting the closing transaction every minute or so until it succeeds. At some point you should be able to find it on mempool.space.2. Use the Accelerator to confirm it
Once you can see the transaction on mempool.space, you can just click the "Accelerate" button next to the ETA. This will bring you to a page that shows you the estimated share of miners that will include your transaction in their blocks, as well as some acceleration fee options for various transaction fee levels, which you can pay for via the Lightning Network, of course.
If you haven't looked into this service before (which I had), then the fees might be a bit of a surprise to you. This thing is not cheap! Bumping my fee from 1 sat/vB to ~9 sats/vB cost a whopping 51,500 sats (31 USD that day). Bumping it higher only seemed to add the difference in the transaction fee itself, so the service seems to have cost a flat 50K sats at the time.
Unfortunately, this channel wasn't particularly large, so the acceleration fee amounted to ~9% of my remaining channel balance. But 91% of something is better than 100% of nothing, so I actually felt pretty good about it.
Next, you will see something like this:
Time to lean back and let the miners work for you. In my case, the ETA was eerily precise. It told me that it would take ~56 minutes to confirm the transaction, and almost exactly an hour later it was mined.
3. Wait
Now that our transaction is confirmed, our channel is not closed immediately, of course. The time lock of the HTLC protects our channel partner from us broadcasting an old channel state in which our balance might be higher than in the latest state.
In my case, it was set to 144 blocks, i.e. ~24 hours. So I checked back the next day, et voilá: channel closed and balance restored. 🥳
-
@ 2775fb0f:887f8193
2024-11-29 12:37:475 сентября в Новодвинске состоится захватывающий концерт местной рок-группы «Черный рынок». Мероприятие пройдет в городском культурном центре и начнется в 19:00. Это уникальная возможность для любителей живой музыки насладиться не только энергичными выступлениями талантливых музыкантов, но и зрелищным фаер-шоу, которое добавит особую атмосферу в вечер.
Группа «Черный рынок» известна своими яркими композициями и харизматичными выступлениями. В программе концерта — как новые песни, так и уже полюбившиеся хиты, которые не оставят равнодушными поклонников жанра. Музыканты обещают зарядить зрителей позитивной энергией и создать незабываемую атмосферу.
Фаер-шоу станет ярким дополнением к музыкальному выступлению, добавляя элемент зрелищности и динамики. Профессиональные артисты продемонстрируют захватывающие трюки с огнем, что сделает вечер еще более запоминающимся.
Вход на концерт свободный, но организаторы рекомендуют заранее занять места, так как ожидается большой интерес со стороны зрителей. «Мы рады представить нашу музыку родному городу и надеемся, что каждый найдет что-то близкое для себя в нашем выступлении», — говорит вокалист группы.
Не упустите шанс стать частью этого музыкального события! Приходите 5 сентября в культурный центр и поддержите местную рок-группу «Черный рынок» в сочетании с захватывающим фаер-шоу.
-
@ 9dd283b1:cf9b6beb
2024-10-28 09:28:57This is not a longform post, this is a test post cause I cannot make it post to relay yet, get a timeout error. but if you see it means it's working.
-
@ fa1d8325:7c91882e
2024-11-29 12:35:06Вчера жители окраины Пятигорска стали свидетелями удивительной работы отряда рабочих роботов, которые продемонстрировали свои возможности как настоящие высокотехнологичные помощники. Они оперативно отреагировали на аварийное отключение системы водоснабжения, вызванное поломкой в канализационной сети.
Благодаря современным инструментам и программному обеспечению, роботы прибыли на место происшествия всего через несколько минут после получения сигнала о неисправности. Они точно определили место утечки и успешно завершили ремонтные работы, вернув водоснабжение в норму.
После устранения аварии отряд роботов продолжил свою деятельность, наведя порядок на территории: они убрали мусор и восстановили дорожное покрытие. Это позволило минимизировать неудобства для жителей и обеспечить бесперебойную работу городской инфраструктуры.
В ближайшие недели команда роботов приступит к поэтапной замене устаревших канализационных систем по всему городу. Это важное мероприятие направлено на улучшение качества водоотведения и предотвращение подобных аварий в будущем.
Таким образом, внедрение роботизированных технологий в городское хозяйство не только эффективно решает текущие проблемы, но и закладывает основу для устойчивого развития городской инфраструктуры. Это яркий пример того, как современные технологии могут сделать нашу жизнь комфортнее и безопаснее.
-
@ fa1d8325:7c91882e
2024-11-29 12:21:16С сегодняшнего дня в школах Пятигорска начинается внедрение инновационных технологий виртуальной реальности (VR). Это знаменательное событие станет значительным шагом в развитии образования в регионе.
VR-технологии открывают перед учениками захватывающие интерактивные 3D-среды, которые значительно повышают их вовлеченность в учебный процесс и улучшают запоминание материала. Теперь сложные явления можно наглядно продемонстрировать с помощью виртуальной реальности, а виртуальные экскурсии позволят ученикам погрузиться в мир науки и культуры.
Особенно полезным окажется применение VR для обучения навыкам, которые сложно освоить в реальной жизни. Ученики смогут безопасно практиковаться в различных ситуациях, не подвергая себя риску.
Ожидается, что внедрение VR-технологий в образовательный процесс не только повысит качество образования, но и поможет подготовить учеников к вызовам XXI века. Они научатся быстро адаптироваться к новым условиям и эффективно использовать современные технологии в своей деятельности.
Это нововведение позволит сделать образование более увлекательным и доступным для всех учеников, независимо от их способностей и возможностей.
-
@ 8d34bd24:414be32b
2024-10-27 22:30:18NOTE: This article has some details that are specific to America, but the overall principles are applicable to all, and I believe it will be useful for all Christians.
When it comes to things like voting, Christians tend to err to one of two extremes and seem to find difficulty finding the right balance as defined by God. Some Christians refuse to vote or get involved with politics at all. They don’t want to dirty themselves with politics. They know that their true home is heaven, so they don’t seem to care much for the nations they live in. On the other hand, some Christians are so focused on politics fixing everything and creating heaven on earth that they can become idolatrous lifting up politicians as a kind of savior.
In this article, I’m going to address both extremes, using the Bible, and hopefully help you find a Biblical balance.
Seek the Welfare of the City Where I Have Sent You
As Christians we are just passing through our time on earth. Our true, eternal home, our true citizenship, is in heaven. That doesn’t mean that we shouldn’t care what happens on earth. We shouldn’t be like the old saying, “some Christians are so heavenly minded that they aren’t any earthly good.” I think Christians should organize our time here on earth kind of like the Israelites were commanded to live during their 70 year exile in Babylon and Persia.
Now these are the words of the letter which Jeremiah the prophet sent from Jerusalem to the rest of the elders of the exile, the priests, the prophets and all the people whom Nebuchadnezzar had taken into exile from Jerusalem to Babylon. (Jeremiah 29:1)
What did God say to the Israelites about how they should live their life in Babylon?
“Thus says the Lord of hosts, the God of Israel, to all the exiles whom I have sent into exile from Jerusalem to Babylon, ‘Build houses and live in them; and plant gardens and eat their produce. Take wives and become the fathers of sons and daughters, and take wives for your sons and give your daughters to husbands, that they may bear sons and daughters; and multiply there and do not decrease. Seek the welfare of the city where I have sent you into exile, and pray to the Lord on its behalf; for in its welfare you will have welfare.’ (Jeremiah 29:4-7) {emphasis mine}
Could we likewise say the same to Christians during their time on earth? “Build houses and live in them; and plant gardens and eat their produce. Take wives and become the fathers of sons and daughters, and take wives for your sons and give your daughters to husbands, that they may bear sons and daughters; and multiply there and do not decrease. Seek the welfare of the city, state, or nation where I have sent you to live for a short while, and pray to the Lord on its behalf; for in its welfare you will have welfare.”
God expects us to live fruitful lives, to marry, to have many children (multiply), and to raise them up to do the same. He also wants us to seek the welfare of the city, state, and nation where God has put us. In a city, state, or nation with democratic elections, the best way to seek its welfare is to vote for honest candidates who support godly principles. We rightly understand that in our ungodly world there are no perfect candidates. It can even be hard to find mostly honest and mostly godly candidates, but we should seek to elect the best that is available. Why are we told to do this? We are told that “for in its welfare you will have welfare.” When we fail to vote, to teach our kids or support good schools, to live productive lives, and to generally live Godly lives, we WILL see the decline of our cities, states, and nations. We will pay the price.
We are seeing exactly that decline because Christians have pulled out (and were pushed out) of the positions that influence the culture. We don’t have enough godly teachers, journalists, professors, advisors, economists, and politicians. We have given up the culture to those who oppose God, His people, and His commands.
We are paying the price for withdrawing into the safety of our churches and leaving the world to the wolves.
Political Religion
Of course we also have an opposite extreme. We have some Christians that are too focused on politics and power. They spend all of their time and energy on political endeavors and very little, to none, on sharing the Gospel and being a godly example. Many act like they think a political candidate is going to save them from the culture, the media, the bureaucracy, or the government. They forget that there is only one Savior — the Lord Jesus Christ. They forget that God said things will get worse before they get better. They make idols out of politicians and religions out of political parties.
No servant can serve two masters; for either he will hate the one and love the other, or else he will be devoted to one and despise the other. You cannot serve God and wealth.” (Luke 16:13)
Although this verse is specifically talking about being obsessed with wealth, it is applicable to anything that takes our focus, attention, and especially our worship away from God.
When a person spends all of their time serving one candidate or party and little to no time serving God, they have chosen to serve another god and are guilty, even if inadvertently and unintentionally.
You shall have no other gods before Me.
You shall not make for yourself an idol, or any likeness of what is in heaven above or on the earth beneath or in the water under the earth. You shall not worship them or serve them; for I, the Lord your God, am a jealous God, visiting the iniquity of the fathers on the children, on the third and the fourth generations of those who hate Me, but showing lovingkindness to thousands, to those who love Me and keep My commandments. (Exodus 20:3-6)
When we look to a politician to save us from anything, we are making him/her a god before us. When we give our all to a political party, we are taking our heart away from God and giving it to an alternate religion.
We may not think that we make idols in our modern world. It is true that we don’t usually carve them out of wood or mold them out of gold, but we have just as many idols as the Israelites did. They just look different.
I hope you will seriously consider this next point because it may be very unpopular with many of my readers. There are lots of Christians that will throw as big, if not a bigger, fit at the desecration of the American flag than over the Bible. Nobody seems to fight to retain the pledge of allegiance more than a majority of Christians. I’d argue that the American flag has become a modern day idol and the “Pledge of Allegiance” has become a religious mantra repeated to the god of government. Look at the words of the pledge:
I pledge allegiance to the Flag of the United States of America,\ and to the Republic for which it stands,\ one Nation under God,\ indivisible, with liberty and justice for all.
I think the inclusion of the phrase “one Nation under God” makes Christians feel OK about this pledge originally invented by a socialist whose brother sold American flags. The important part, which is why I can’t say the pledge anymore, are the words, “I pledge allegiance to the Flag of the United States of America, and to the Republic for which it stands.” I really appreciate the principles America was founded upon, but as a Christian, I can only pledge allegiance to God. My allegiance isn’t to a flag (an idol) or the government (a god). I refuse to go through a religious ritual that includes particular stances, reciting special words, and showing undue respect. We cannot “serve two masters.” As Christians our master should be Christ alone. Anything that becomes more important than, or even equal to, the importance of God in our lives is idolatry. We need to get our priorities right.
In the World, but Not of the World
As we live our lives here on earth, we need to remember our God ordained purpose and our true allegiance to God. We need to remember our citizenship1 and family are in heaven, not here on earth.
We want to have a positive influence on our culture, including working in influential positions and voting, but we should be most focused on personal evangelism and sharing the truth of the Bible. The best way to make a difference in our culture is to change hearts and minds through the Gospel of Jesus Christ.
But now I come to You; and these things I speak in the world so that they may have My joy made full in themselves. I have given them Your word; and the world has hated them, because they are not of the world, even as I am not of the world. I do not ask You to take them out of the world, but to keep them from the evil one. They are not of the world, even as I am not of the world. Sanctify them in the truth; Your word is truth. (John 17:13-17) {emphasis mine}
Although we want to be a light in the world, we have been warned that doing so will make us not fit in. It will cause many non-Christians (and maybe a few Christians whose priorities are not right) to hate us. No matter the consequences, we need to stand on the truth of the Word of God.
Too often, because we are living with those who are of this world, we start to look and act a lot like those of the world instead of looking and acting like our Savior.
Do not love the world nor the things in the world. If anyone loves the world, the love of the Father is not in him. For all that is in the world, the lust of the flesh and the lust of the eyes and the boastful pride of life, is not from the Father, but is from the world. The world is passing away, and also its lusts; but the one who does the will of God lives forever. (1 John 2:15-17) {emphasis mine}
The fact that we should not love the things of the world or take on the character of things of the world is true in every part of our lives, but since we are talking here about politics, let us discuss the way many Christians talk politics.
Many Christians talk about politics in the same manner as non-Christians — cursing, name calling, insulting, and doing whatever it takes to win, no matter whether it is moral or not. I know the “other side” cheats, lies, name-calls, etc., but we should not stoop to their level. Nobody ever won another to their point of view by cursing or name calling. There are ways to point our their errors, and even how horrific some of the things pushed are, without going so low. Jesus didn’t hold back from speaking the truth. He didn’t hesitate to point out error, but was never crude about it. We should be the same. We should shine a light in such a way that those around us see such a difference that they say something similar to what was said about the apostles:
Now as they observed the confidence of Peter and John and understood that they were uneducated and untrained men, they were amazed, and began to recognize them as having been with Jesus. (Acts 4:13)
There should be something about our words, actions, and demeanor that amazes our opponents causing them to recognize us “as having been with Jesus.”
I hope this post has been helpful, truthful, and not too offensive. In so many areas it is hard to find that perfect balance and to not allow ourselves to be pulled to either extreme to the detriment of our witness and our relationship to God.
Give no offense either to Jews or to Greeks or to the church of God; just as I also please all men in all things, not seeking my own profit but the profit of the many, so that they may be saved. (1 Corinthians 10:32-33) {emphasis mine}
Trust Jesus.\ \ your sister in Christ,
Christy
-
@ fa1d8325:7c91882e
2024-11-29 12:20:14В городе Пятигорск произошёл серьёзный инцидент — прорыв канализации, который привёл к затоплению улиц и подвалов. По предварительным данным, причиной стал износ старых канализационных труб, многие из которых были установлены более 70 лет назад.
Местные власти признали, что состояние канализационной системы в городе достигло критического уровня и требует срочного ремонта. Жители обеспокоены не только неприятными запахами, которые могут возникнуть в результате затопления, но и возможными угрозами для здоровья.
Специалисты уже приступили к ликвидации последствий аварии. Ожидается, что ремонтные работы займут некоторое время. Местные власти призывают жителей города проявить терпение и понимание в этой непростой ситуации.
Этот инцидент ещё раз свидетельствует о необходимости проведения капитального ремонта канализационной системы в Пятигорске. Жители надеются, что власти примут все меры для предотвращения подобных аварий в будущем.
-
@ a03b38f8:2c7ce1f0
2024-10-27 12:17:03(Member only content that has been unencrypted for use with
) Details on how to use a Burner Phone
Mobile phones are needed for communications when out in the world but they are a nightmare for privacy and security as detailed in
especially when it comes to surveillance risks. This is more of a hands on guide for how to mitigate those risks. Burner phones as the name describes is a use and "burn" device either for a single operation or for a longer period if proper precautions are taken. In case you are unaware what I mean by a burner phone; cell phones can be purchased from big box stores, gas stations, and kiosks in cash without a contract. They are usually not very expense and enable you to buy prepaid cards to use for phone and internet service.
Getting a Burner Phone:
- Best to use a store out of town but not mandatory.
- Do not take any electronics with you, especially another phone.
- Park down the street in another parking lot near the store and walk over. Be mindful of security cameras.
- Cover any tattoos or identifying marks. Wear a hat and a medical mask. (Thank you covid)
- Use cash only to buy.
- Leave, do not shop or buy anything else.
Setting up Burner Phone:
- Go somewhere with free public WIFI (Starbucks, Library, whatever)
- Do not take any electronics with you, especially another phone.
- Open package and follow directions to activate using the public WIFI access.
- Choose a random area code during setup.
- Create a new random gmail account. (Do not reuse accounts or names)
- Download and install a VPN, Signal or SimpleX, Firefox Focus Browser, Tor if needed. Delete any other unnecessary apps.
- Change phone settings (see list)
- Turn off and remove battery if able to (becoming harder to find) or put into a Faraday Bag.
- Destroy packaging that came with the phone.
Phone Settings: 1. Turn off hotspot and tethering. Enable Always on VPN and Block Connections without VPN. Set DNS to automatic. 2. Turn off bluetooth and WIFI. 3. Disable all notifications, notification history, notifications on lock screen, and emergency alerts. 4. Turn off all sounds and vibrations. 5. Turn off Find my Device. Setup screen lock with password. (No bio) 6. Toggle everything in privacy: no permissions, turn off microphone, turn off usage and diagnostics, etc 7. Set Use Location to off. 8. Under Languages & Input > Virtual Keyboard > Gboard > Advanced: disable usage statistics, personalizing, and improve voice and typing for everyone.
Using a Burner Phone:
- Never sign into any account associated with your real identity.
- Never use it to contact anyone associated with your real identity.
- Time and distance between burner phone and any other cell phone you own. i.e. A hour has passed and several miles from when you use and had on the other device.
- When not in use the battery is removed or in a Faraday Bag.
- Always use a VPN and always use private search and browser set to delete upon closing (Firefox Focus default).
- Never actually call or text from the phone. You only want to use SimpleX or Signal for communications.
- Do not save anything (files, pictures, history) on the phone, especially if incriminating.
- Do not take it with you or use unless necessary.
- When in doubt, burn it and get another one.
- Never carry over names, accounts, whatever from old burner phone to new burner phone.
Burning a phone:
- Factory reset the device.
- Remove and destroy the SIM card.
- Remove the battery because lithium batteries can explode. (may have to take it apart)
- Smash internals.
- Burn remains or drown in water. (Throw it in the river)
As long as you are careful to never identify yourself with the burner phone the only surveillance they can do is know that a phone was used or in a location but not who it belongs to. Be aware that if you are caught with it on your person any information or contacts on the phone may get compromised. Be mindful what you put on it.
-
@ 06b7819d:d1d8327c
2024-11-29 12:11:05In June 2023, the Law Commission of England and Wales published its final report on digital assets, concluding that the existing common law is generally flexible enough to accommodate digital assets, including crypto-tokens and non-fungible tokens (NFTs).
However, to address specific areas of uncertainty, the Commission recommended targeted statutory reforms and the establishment of an expert panel.
Key Conclusions and Recommendations:
1. Recognition of a Third Category of Personal Property:
Traditional English law classifies personal property into two categories: “things in possession” (tangible items) and “things in action” (enforceable rights). Digital assets do not fit neatly into either category. The Commission recommended legislation to confirm the existence of a distinct third category of personal property to better accommodate digital assets. 
-
Development of Common Law: The Commission emphasized that the common law is well-suited to adapt to the complexities of emerging technologies and should continue to evolve to address issues related to digital assets. 
-
Establishment of an Expert Panel: To assist courts in navigating the technical and legal challenges posed by digital assets, the Commission recommended that the government create a panel of industry experts, legal practitioners, academics, and judges. This panel would provide non-binding guidance on issues such as control and transfer of digital assets. 
-
Facilitation of Crypto-Token and Crypto-Asset Collateral Arrangements: The Commission proposed the creation of a bespoke statutory legal framework to facilitate the use of digital assets as collateral, addressing current legal uncertainties in this area. 
-
Clarification of the Financial Collateral Arrangements Regulations: The report recommended statutory amendments to clarify the extent to which digital assets fall within the scope of the Financial Collateral Arrangements (No 2) Regulations 2003, ensuring that existing financial regulations appropriately cover digital assets. 
Overall, the Law Commission’s report underscores the adaptability of English common law in addressing the challenges posed by digital assets, while also identifying specific areas where legislative action is necessary to provide clarity and support the evolving digital economy.
-
-
@ 06b7819d:d1d8327c
2024-11-29 11:59:20The system design and challenges of retail Central Bank Digital Currencies (CBDCs) differ significantly from Bitcoin in several key aspects, reflecting their distinct purposes and underlying philosophies:
-
Core Purpose and Issuance
• CBDCs: Issued by central banks, CBDCs are designed as state-backed digital currencies for public use. Their goal is to modernize payments, enhance financial inclusion, and provide a risk-free alternative to private money. • Bitcoin: A decentralized, peer-to-peer cryptocurrency created to operate independently of central authorities. Bitcoin aims to be a store of value and medium of exchange without reliance on intermediaries or governments.
-
Governance and Control
• CBDCs: Operate under centralized governance. Central banks retain control over issuance, transaction validation, and data management, allowing for integration with existing regulatory frameworks (e.g., AML and CFT). • Bitcoin: Fully decentralized, governed by a consensus mechanism (Proof of Work). Transactions are validated by miners, and no single entity controls the network.
-
Privacy
• CBDCs: Seek to balance privacy with regulatory compliance. Privacy-enhancing technologies may be implemented, but user data is typically accessible to intermediaries and central banks to meet regulatory needs. • Bitcoin: Pseudonymous by design. Transactions are public on the blockchain but do not directly link to individual identities unless voluntarily disclosed.
-
System Design
• CBDCs: May adopt a hybrid system combining centralized (e.g., central bank-controlled settlement) and decentralized elements (e.g., private-sector intermediaries). Offline functionality and interoperability with existing systems are priorities. • Bitcoin: Fully decentralized, using a distributed ledger (blockchain) where all transactions are validated and recorded without reliance on intermediaries.
-
Cybersecurity
• CBDCs: Cybersecurity risks are heightened due to potential reliance on centralized points for data storage and validation. Post-quantum cryptography is a concern for future-proofing against quantum computing threats. • Bitcoin: Security relies on cryptographic algorithms and decentralization. However, it is also vulnerable to quantum computing in the long term, unless upgraded to quantum-resistant protocols.
-
Offline Functionality
• CBDCs: Exploring offline payment capabilities for broader usability in remote or unconnected areas. • Bitcoin: Offline payments are not natively supported, although some solutions (e.g., Lightning Network or third-party hardware wallets) can enable limited offline functionality.
-
Point of Sale and Adoption
• CBDCs: Designed for seamless integration with existing PoS systems and modern financial infrastructure to encourage widespread adoption. • Bitcoin: Adoption depends on merchant willingness and the availability of cryptocurrency payment gateways. Its volatility can discourage usage as a medium of exchange.
-
Monetary Policy and Design
• CBDCs: Can be programmed to support specific policy goals, such as negative interest rates, transaction limits, or conditional transfers. • Bitcoin: Supply is fixed at 21 million coins, governed by its code. It is resistant to monetary policy interventions and inflationary adjustments.
In summary, while CBDCs aim to complement existing monetary systems with centralized oversight and tailored features, Bitcoin is designed as a decentralized alternative to traditional currency. CBDCs prioritize integration, control, and regulatory compliance, whereas Bitcoin emphasizes autonomy, censorship resistance, and a trustless system.
-
-
@ eac63075:b4988b48
2024-10-26 22:14:19The future of physical money is at stake, and the discussion about DREX, the new digital currency planned by the Central Bank of Brazil, is gaining momentum. In a candid and intense conversation, Federal Deputy Julia Zanatta (PL/SC) discussed the challenges and risks of this digital transition, also addressing her Bill No. 3,341/2024, which aims to prevent the extinction of physical currency. This bill emerges as a direct response to legislative initiatives seeking to replace physical money with digital alternatives, limiting citizens' options and potentially compromising individual freedom. Let's delve into the main points of this conversation.
https://www.fountain.fm/episode/i5YGJ9Ors3PkqAIMvNQ0
What is a CBDC?
Before discussing the specifics of DREX, it’s important to understand what a CBDC (Central Bank Digital Currency) is. CBDCs are digital currencies issued by central banks, similar to a digital version of physical money. Unlike cryptocurrencies such as Bitcoin, which operate in a decentralized manner, CBDCs are centralized and regulated by the government. In other words, they are digital currencies created and controlled by the Central Bank, intended to replace physical currency.
A prominent feature of CBDCs is their programmability. This means that the government can theoretically set rules about how, where, and for what this currency can be used. This aspect enables a level of control over citizens' finances that is impossible with physical money. By programming the currency, the government could limit transactions by setting geographical or usage restrictions. In practice, money within a CBDC could be restricted to specific spending or authorized for use in a defined geographical area.
In countries like China, where citizen actions and attitudes are also monitored, a person considered to have a "low score" due to a moral or ideological violation may have their transactions limited to essential purchases, restricting their digital currency use to non-essential activities. This financial control is strengthened because, unlike physical money, digital currency cannot be exchanged anonymously.
Practical Example: The Case of DREX During the Pandemic
To illustrate how DREX could be used, an example was given by Eric Altafim, director of Banco Itaú. He suggested that, if DREX had existed during the COVID-19 pandemic, the government could have restricted the currency’s use to a 5-kilometer radius around a person’s residence, limiting their economic mobility. Another proposed use by the executive related to the Bolsa Família welfare program: the government could set up programming that only allows this benefit to be used exclusively for food purchases. Although these examples are presented as control measures for safety or organization, they demonstrate how much a CBDC could restrict citizens' freedom of choice.
To illustrate the potential for state control through a Central Bank Digital Currency (CBDC), such as DREX, it is helpful to look at the example of China. In China, the implementation of a CBDC coincides with the country’s Social Credit System, a governmental surveillance tool that assesses citizens' and companies' behavior. Together, these technologies allow the Chinese government to monitor, reward, and, above all, punish behavior deemed inappropriate or threatening to the government.
How Does China's Social Credit System Work?
Implemented in 2014, China's Social Credit System assigns every citizen and company a "score" based on various factors, including financial behavior, criminal record, social interactions, and even online activities. This score determines the benefits or penalties each individual receives and can affect everything from public transport access to obtaining loans and enrolling in elite schools for their children. Citizens with low scores may face various sanctions, including travel restrictions, fines, and difficulty in securing loans.
With the adoption of the CBDC — or “digital yuan” — the Chinese government now has a new tool to closely monitor citizens' financial transactions, facilitating the application of Social Credit System penalties. China’s CBDC is a programmable digital currency, which means that the government can restrict how, when, and where the money can be spent. Through this level of control, digital currency becomes a powerful mechanism for influencing citizens' behavior.
Imagine, for instance, a citizen who repeatedly posts critical remarks about the government on social media or participates in protests. If the Social Credit System assigns this citizen a low score, the Chinese government could, through the CBDC, restrict their money usage in certain areas or sectors. For example, they could be prevented from buying tickets to travel to other regions, prohibited from purchasing certain consumer goods, or even restricted to making transactions only at stores near their home.
Another example of how the government can use the CBDC to enforce the Social Credit System is by monitoring purchases of products such as alcohol or luxury items. If a citizen uses the CBDC to spend more than the government deems reasonable on such products, this could negatively impact their social score, resulting in additional penalties such as future purchase restrictions or a lowered rating that impacts their personal and professional lives.
In China, this kind of control has already been demonstrated in several cases. Citizens added to Social Credit System “blacklists” have seen their spending and investment capacity severely limited. The combination of digital currency and social scores thus creates a sophisticated and invasive surveillance system, through which the Chinese government controls important aspects of citizens’ financial lives and individual freedoms.
Deputy Julia Zanatta views these examples with great concern. She argues that if the state has full control over digital money, citizens will be exposed to a level of economic control and surveillance never seen before. In a democracy, this control poses a risk, but in an authoritarian regime, it could be used as a powerful tool of repression.
DREX and Bill No. 3,341/2024
Julia Zanatta became aware of a bill by a Workers' Party (PT) deputy (Bill 4068/2020 by Deputy Reginaldo Lopes - PT/MG) that proposes the extinction of physical money within five years, aiming for a complete transition to DREX, the digital currency developed by the Central Bank of Brazil. Concerned about the impact of this measure, Julia drafted her bill, PL No. 3,341/2024, which prohibits the elimination of physical money, ensuring citizens the right to choose physical currency.
“The more I read about DREX, the less I want its implementation,” says the deputy. DREX is a Central Bank Digital Currency (CBDC), similar to other state digital currencies worldwide, but which, according to Julia, carries extreme control risks. She points out that with DREX, the State could closely monitor each citizen’s transactions, eliminating anonymity and potentially restricting freedom of choice. This control would lie in the hands of the Central Bank, which could, in a crisis or government change, “freeze balances or even delete funds directly from user accounts.”
Risks and Individual Freedom
Julia raises concerns about potential abuses of power that complete digitalization could allow. In a democracy, state control over personal finances raises serious questions, and EddieOz warns of an even more problematic future. “Today we are in a democracy, but tomorrow, with a government transition, we don't know if this kind of power will be used properly or abused,” he states. In other words, DREX gives the State the ability to restrict or condition the use of money, opening the door to unprecedented financial surveillance.
EddieOz cites Nigeria as an example, where a CBDC was implemented, and the government imposed severe restrictions on the use of physical money to encourage the use of digital currency, leading to protests and clashes in the country. In practice, the poorest and unbanked — those without regular access to banking services — were harshly affected, as without physical money, many cannot conduct basic transactions. Julia highlights that in Brazil, this situation would be even more severe, given the large number of unbanked individuals and the extent of rural areas where access to technology is limited.
The Relationship Between DREX and Pix
The digital transition has already begun with Pix, which revolutionized instant transfers and payments in Brazil. However, Julia points out that Pix, though popular, is a citizen’s choice, while DREX tends to eliminate that choice. The deputy expresses concern about new rules suggested for Pix, such as daily transaction limits of a thousand reais, justified as anti-fraud measures but which, in her view, represent additional control and a profit opportunity for banks. “How many more rules will banks create to profit from us?” asks Julia, noting that DREX could further enhance control over personal finances.
International Precedents and Resistance to CBDC
The deputy also cites examples from other countries resisting the idea of a centralized digital currency. In the United States, states like New Hampshire have passed laws to prevent the advance of CBDCs, and leaders such as Donald Trump have opposed creating a national digital currency. Trump, addressing the topic, uses a justification similar to Julia’s: in a digitalized system, “with one click, your money could disappear.” She agrees with the warning, emphasizing the control risk that a CBDC represents, especially for countries with disadvantaged populations.
Besides the United States, Canada, Colombia, and Australia have also suspended studies on digital currencies, citing the need for further discussions on population impacts. However, in Brazil, the debate on DREX is still limited, with few parliamentarians and political leaders openly discussing the topic. According to Julia, only she and one or two deputies are truly trying to bring this discussion to the Chamber, making DREX’s advance even more concerning.
Bill No. 3,341/2024 and Popular Pressure
For Julia, her bill is a first step. Although she acknowledges that ideally, it would prevent DREX's implementation entirely, PL 3341/2024 is a measure to ensure citizens' choice to use physical money, preserving a form of individual freedom. “If the future means control, I prefer to live in the past,” Julia asserts, reinforcing that the fight for freedom is at the heart of her bill.
However, the deputy emphasizes that none of this will be possible without popular mobilization. According to her, popular pressure is crucial for other deputies to take notice and support PL 3341. “I am only one deputy, and we need the public’s support to raise the project’s visibility,” she explains, encouraging the public to press other parliamentarians and ask them to “pay attention to PL 3341 and the project that prohibits the end of physical money.” The deputy believes that with a strong awareness and pressure movement, it is possible to advance the debate and ensure Brazilians’ financial freedom.
What’s at Stake?
Julia Zanatta leaves no doubt: DREX represents a profound shift in how money will be used and controlled in Brazil. More than a simple modernization of the financial system, the Central Bank’s CBDC sets precedents for an unprecedented level of citizen surveillance and control in the country. For the deputy, this transition needs to be debated broadly and transparently, and it’s up to the Brazilian people to defend their rights and demand that the National Congress discuss these changes responsibly.
The deputy also emphasizes that, regardless of political or partisan views, this issue affects all Brazilians. “This agenda is something that will affect everyone. We need to be united to ensure people understand the gravity of what could happen.” Julia believes that by sharing information and generating open debate, it is possible to prevent Brazil from following the path of countries that have already implemented a digital currency in an authoritarian way.
A Call to Action
The future of physical money in Brazil is at risk. For those who share Deputy Julia Zanatta’s concerns, the time to act is now. Mobilize, get informed, and press your representatives. PL 3341/2024 is an opportunity to ensure that Brazilian citizens have a choice in how to use their money, without excessive state interference or surveillance.
In the end, as the deputy puts it, the central issue is freedom. “My fear is that this project will pass, and people won’t even understand what is happening.” Therefore, may every citizen at least have the chance to understand what’s at stake and make their voice heard in defense of a Brazil where individual freedom and privacy are respected values.
-
@ 6bae33c8:607272e8
2024-11-29 11:57:37I’ve been sick the last few days, but under the circumstances Thanksgiving wasn’t too bad. I got to watch the games in the separate office-adjacent den, made a plate and brought it in with me. Heather had invited over a French woman and her son, as well as an American woman and her daughter, so they were occupied on the other side of the apartment. I was brought out from my dungeon to carve the turkey leg and shuck a few oysters (I think the oysters did me some good in fact), but otherwise was left alone. Except for Oscar who swung by occasionally to check in on me and sit by my side on the sofa.
The Lions-Bears was a strange game, even before the insane ending. The Lions looked like they were going to win huge again, the Bears couldn’t even get a first down, and then they’re life and death at the end. Of course, squandering 30 seconds on the last play while leaving a timeout on the table had to be one of the worst clock management fiascos in NFL history. A good rule of thumb is that when time is an issue, always burn the timeout rather than the time itself. It’s like spending airline miles rather than dollars — you can only use the miles for the flight, but you can use the dollars for anything.
I watched the second half of the Giants game this morning. I had them in Circa unfortunately too. They weren’t that horrible, but you can’t backdoor cover when you give up the pick six. Drew Lock was sloppy, but the Giants o-line is bad, and Micah Parsons wrecked them.
I watched only the highlights of Dolphins-Packers. I started Jonnu Smith in every league, one of them over Jaylen Waddle in the flex, and it turned out to be the right call. I sat Tua for Anthony Richardson, and Tua somehow got 32 points, so that’s a high bar. I didn’t like them playing in cold weather, figured short throws to Smith were more likely.
-
The Lions were toying with the Bears in the first half, at one point calling a roll out for tackle Penei Sewell where he looked like he was going to throw it. When he found no one open, he ran with it a short distance and bodied a few would-be tacklers.
-
Caleb Williams botched the last play (as did his likely soon-to-be-fired coach) but he looked good to me. One skill he has is keeping his downfield focus while scrambling.
-
It was odd seeing David Montgomery, who had a solid game, on the field so much more than Jahmyr Gibbs, who averaged nearly 10 yards per carry. Montgomery was the one who was banged up going into the game too.
-
Malik Nabers had a decent game, and it would have been better but for a 21-yard catch at the sideline that was called back. The Giants need to get him a real QB next year, and he’ll turn into Ja’Marr Chase.
-
Theo Johnson was quiet in the first half, but got going in the second. He took some big hits after the catch a couple times, but kept going. Nabers, Johnson and Tyrone Tracy is a good nucleus. They’re two offensive linemen and a QB away.
-
Rico Dowdle went nuts after Dexter Lawrence got hurt. He looked pretty good, but the Giants tackling was abysmal. I’m not sure what happened to CeeDee Lamb— was he banged up? He had a few drops, then disappeared from the game.
-
Tom Brady is a great announcer. He has all the knowledge and love of the game without a dopey schtick. Plus, it must be cool if you’re a player in the game, and you hear later that Brady said something positive about you — he’s the GOAT after all.
-
Jonnu Smith is the TE1. Deal with it.
-
I sat Waddle for Smith, and I was nervous about the decision after Waddle’s monster game last week, but Waddle’s target volume just hasn’t been there this year, and despite trailing all game yesterday, he got only four against the Packers.
-
Jordan Love and the Packers are having a good season, so maybe they know something I don’t, but why are they not targeting Jayden Reed more often? The guy is a playmaking machine.
-
-
@ 5adb967d:ac1f7d04
2024-11-29 11:09:39In this high-tech era, jammers are like the hidden masters of the electromagnetic world, sometimes appearing, sometimes disappearing, breathtaking. Its appearance in a blink of an eye can sweep away all radio signals, the entire airwave space shrouded in a chilling silence.
When the jammer is activated discreetly, it first stares into the background, using sophisticated algorithms to lock on to the frequency and intensity characteristics of the target signal. While the radio signals are still traveling freely, the signal jammer is already waiting for the right moment to swarm out and stop these “uninvited guests” as much as possible.
Immediately, the military jammer released a powerful homodyne reflected waves, such as the fangs of the wolf through the ionosphere, the target signal will be eaten and crushed. You may be just a flash of attention, the communication signal has been such a strong electromagnetic interference completely killed, obliterated.
Sometimes, the jammer will also perform a “multi-pronged” intelligent full-frequency strikes. It can be instantly broadcast throughout the spectrum of white noise, indiscriminately sweeping all communication signals, so that the entire electromagnetic space to a dead silence, no one is immune.
What's more, modern advanced mobile cell jammer is almost indestructible. Even with encrypted protection, frequency hopping and tuning, and stealth detection, they can always perform precision-guided narrow-frequency micro-pulses, effortlessly destroying the front-end circuits that are the most tightly protected.
Any electronic device is as vulnerable to the violence of these bluetooth blocker as it is to the destruction of the front-end circuitry. Just when you are confused by the sudden interruption of the pathway, the next round of destructive jamming has already followed, completely extinguishing all hope of survival.
For modern social networks, jammers are the terrorists in the mirror of silence, paralyzing the entire airwave world with their presence. When the rain of bullets like electromagnetic interference suddenly attacked, any anti-jamming measures will not help, leaving the reverie in such a hostile atmosphere under the cover of their own lives.
-
@ 3bf0c63f:aefa459d
2024-10-26 14:18:23kind:1
maximalism and the future of other stuff and Nostr decentralizationThese two problems exist on Nostr today, and they look unrelated at first:
- People adding more stuff to
kind:1
notes, such as making them editable, or adding special corky syntax thas has to be parsed and rendered in complicated UIs; - The discovery of "other stuff" content (i.e. long-form articles, podcasts, calendar events, livestreams etc) is hard due to the fact that most people only use microblogging clients and they often don't appear there for them.
Point 2 above has 3 different solutions:
- a. Just publish everything as
kind:1
notes; - b. Publish different things as different kinds, but make microblogging clients fetch all the event kinds from people you follow, then render them natively or use NIP-31, or NIP-89 to point users to other clients that would render them better;
- c. Publish different things as different kinds, and reference them in
kind:1
notes that would act as announcements to these other events, also relying on NIP-31 and NIP-89 for displaying references and recommending other clients.
Solution a is obviously very bad, so I won't address it.
For a while I have believed solution b was the correct one, and many others seem to tacitly agree with it, given that some clients have been fetching more and more event kinds and going out of their way to render them in the same feed where only
kind:1
notes were originally expected to be.I don't think clients doing that is necessarily bad, but I do think this have some centralizing effects on the protocol, as it pushes clients to become bigger and bigger, raising the barrier to entry into the
kind:1
realm. And also in the past I have talked about the fact that I disliked that some clients would display my long-form articles as if they were normalkind:1
notes and just dump them into the feeds of whoever was following me: nostr:nevent1qqsdk90k9k30vtzwpj6grxys9mvsegu5kkwd4jmpyhlmtjnxet2rvggprpmhxue69uhhyetvv9ujumn0wdmksetjv5hxxmmdqy8hwumn8ghj7mn0wd68ytnddaksygpm7rrrljungc6q0tuh5hj7ue863q73qlheu4vywtzwhx42a7j9n5hae35cThese and other reasons have made me switch my preference to solution c, as it gives the most flexibility to the publisher: whoever wants to announce stuff so it can be discovered can, whoever doesn't don't have to. And it allows microblogging clients the freedom to render just render tweets and having a straightforward barrier between what they can render and what is just a link to an external app or webapp (of course they can always opt to render the referenced content in-app if they want).
It also makes the case for microapps more evident. If all microblogging clients become superapps that can render recipe events perfectly why would anyone want to use a dedicated recipes app? I guess there are still reasons, but blurring the line between content kinds in superapps would definitely remove some of the reasons and eventually kill all the microapps.
That brings us back to point 1 above (the overcomplication of
kind:1
events): if solution c is what we're going to, that makeskind:1
events very special in Nostr, and not just another kind among others. Microblogging clients become the central plaza of Nostr, thus protecting their neutrality and decentralization much more important. Having a lot of clients with different userbases, doing things in slightly different ways, is essential for that decentralization.It's ok if Nostr ends up having just 2 recipe-sharing clients, but it must have dozens of microblogging clients -- and maybe not even full-blown microblogging clients, but other apps that somehow deal with
kind:1
events in multiple ways. It's ok if implementing a client for public audio-rooms is very hard and complicated, but at the same time it should be very simple to write a client that can render akind:1
note referencing an audio-room and linking to that dedicated client.I hope you got my point and agreed because this article is ended.
- People adding more stuff to
-
@ e077f063:49dc180e
2024-11-29 11:03:10** Группа ученых из Ханты-Мансийска сделала сенсационное открытие - они успешно извлекли и восстановили ДНК мамонта, вымершего более 4 тысяч лет назад. Это достижение стало возможным благодаря современным методам генетической инженерии и передовым технологиям секвенирования.**
Исследователи, работающие в лаборатории по изучению древних ДНК при ЮНИИИТ, сообщили, что им удалось получить образцы генетического материала из хорошо сохранившихся останков мамонта, найденных в вечной мерзлоте. Теперь команда планирует использовать полученные данные для создания клона этого древнего животного.
"Мы находимся на пороге новой эры в области генетики и палеонтологии. Оживление мамонта может дать нам уникальные возможности для изучения экосистем, в которых они жили, а также помочь в сохранении современных видов, находящихся под угрозой исчезновения", – заявил ведущий исследователь проекта.
Процесс оживления мамонта включает в себя сложные этапы, такие как редактирование генома современных слонов с использованием CRISPR-технологий и имплантация полученного генетического материала в яйцеклетки. Ученые надеются, что в ближайшие годы они смогут сделать первые шаги к созданию живого представителя этого вида.
Однако проект вызывает и этические вопросы. Экологи и защитники животных призывают к осторожности, подчеркивая важность сохранения существующих видов и экосистем. Тем не менее, команда ученых уверена, что до оживления реального мамонта должно пройти еще много времени.
-
@ 4ba8e86d:89d32de4
2024-10-26 14:14:01I2P é uma rede anônima, oferecendo uma camada simples que aplicativos sensíveis à identidade podem usar para se comunicar com segurança. Todos os dados são agrupados com várias camadas de criptografia e a rede é distribuída e dinâmica, sem partes confiáveis.
O Invisible Internet Project começou em 2002. A visão do projeto, conforme descrito em uma entrevista com Lance James, era que a rede I2P "oferecesse total anonimato, privacidade e segurança no mais alto nível possível. Internet descentralizada e ponto a ponto significa não se preocupe mais com seu ISP controlando seu tráfego. Isso permitirá que (as pessoas) realizem atividades contínuas e mudem a maneira como vemos a segurança e até a Internet, utilizando criptografia de chave pública, esteganografia de IP e autenticação de mensagens. A Internet que deveria ter sido, será em breve." Desde então, o I2P evoluiu para especificar e implementar um conjunto completo de protocolos de rede capazes de fornecer um alto nível de privacidade, segurança e autenticação para uma variedade de aplicativos.
A rede I2P. A rede I2P é uma rede de sobreposição ponto a ponto totalmente criptografada. Um observador não pode ver o conteúdo, origem ou destino de uma mensagem. Ninguém pode ver de onde vem o tráfego, para onde está indo ou qual é o conteúdo. Além disso, os transportes I2P oferecem resistência ao reconhecimento e bloqueio por parte dos censores. Como a rede depende de pares para rotear o tráfego, o bloqueio baseado em localização é um desafio que cresce com a rede. Cada roteador na rede participa de tornar a rede anônima. Exceto nos casos em que seria inseguro, todos participam do envio e recebimento do tráfego de rede.
Como funciona o I2P?
O I2P usa criptografia para obter uma variedade de propriedades para os túneis que constrói e as comunicações que transporta. Os túneis I2P usam transportes, NTCP2 e SSU2, para ocultar o tráfego que está sendo transportado por eles. As conexões são criptografadas de roteador para roteador e de cliente para cliente (ponta a ponta). Forward-secrecy é fornecido para todas as conexões. Como o I2P é endereçado criptograficamente, os endereços de rede I2P são auto-autenticados e pertencem apenas ao usuário que os gerou.
A rede é composta por pares ("roteadores") e túneis virtuais unidirecionais de entrada e saída. Os roteadores se comunicam entre si usando protocolos construídos em mecanismos de transporte existentes (TCP, UDP), passando mensagens. As aplicações cliente possuem seu próprio identificador criptográfico ("Destino") que permite enviar e receber mensagens. Esses clientes podem se conectar a qualquer roteador e autorizar a alocação temporária ("lease") de alguns túneis que serão utilizados para envio e recebimento de mensagens pela rede. O I2P possui seu próprio banco de dados de rede interna (usando uma modificação do Kademlia DHT) para distribuir roteamento e informações de contato com segurança.
Sobre a Descentralização e a Rede I2P A rede I2P é quase totalmente descentralizada, com exceção dos chamados Reseed Servers. Isso é para lidar com o problema de bootstrap DHT (Distributed Hash Table). Basicamente, não há uma maneira boa e confiável de deixar de executar pelo menos um nó de inicialização permanente que os participantes que não são da rede possam encontrar para começar. Uma vez conectado à rede, um roteador só descobre pares construindo túneis "exploratórios", mas para fazer a conexão inicial, um host reseed é necessário para criar conexões e integrar um novo roteador à rede. Os servidores reseed podem observar quando um novo roteador baixou um reseed deles, mas nada mais sobre o tráfego na rede I2P.
Recursos do I2P
O I2P oferece uma série de recursos para proteger a privacidade do usuário. Alguns desses recursos incluem:
Ocultação do endereço IP: O I2P oculta o endereço IP do usuário, tornando impossível que alguém rastreie a atividade do usuário na rede.
Comunicação segura: Todas as comunicações dentro da rede I2P são criptografadas de ponta a ponta, garantindo a privacidade do usuário.
Anonimato: O I2P permite que os usuários se comuniquem de forma anônima, o que significa que sua identidade não é exposta durante a comunicação.
Sites ocultos: O I2P permite que os usuários criem e acessem sites ocultos, que só podem ser acessados dentro da rede I2P.
Vantagens do uso do I2P
O I2P oferece várias vantagens para os usuários que desejam proteger sua privacidade online. Algumas dessas vantagens incluem:
Proteção contra vigilância governamental: O I2P ajuda a proteger os usuários contra a vigilância governamental, tornando impossível rastrear o endereço IP do usuário.
Anonimato em redes públicas: O I2P ajuda a proteger os usuários contra ataques de hackers em redes Wi-Fi públicas.
Acesso a sites censurados: O I2P permite que os usuários acessem sites que estão bloqueados em sua região ou país.
O I2P é uma rede anônima de comunicação que oferece recursos de privacidade avançados para proteger a privacidade do usuário. Ele permite que os usuários se comuniquem de forma anônima e segura e cria uma solução eficaz para usuários que valorizam a privacidade e a segurança online. Se você está preocupado com sua privacidade online, o I2P pode ser uma ótima escolha.
https://github.com/i2p
-
@ a95c6243:d345522c
2024-10-26 12:21:50Es ist besser, ein Licht zu entzünden, als auf die Dunkelheit zu schimpfen. Konfuzius
Die Bemühungen um Aufarbeitung der sogenannten Corona-Pandemie, um Aufklärung der Hintergründe, Benennung von Verantwortlichkeiten und das Ziehen von Konsequenzen sind durchaus nicht eingeschlafen. Das Interesse daran ist unter den gegebenen Umständen vielleicht nicht sonderlich groß, aber es ist vorhanden.
Der sächsische Landtag hat gestern die Einsetzung eines Untersuchungsausschusses zur Corona-Politik beschlossen. In einer Sondersitzung erhielt ein entsprechender Antrag der AfD-Fraktion die ausreichende Zustimmung, auch von einigen Abgeordneten des BSW.
In den Niederlanden wird Bill Gates vor Gericht erscheinen müssen. Sieben durch die Covid-«Impfstoffe» geschädigte Personen hatten Klage eingereicht. Sie werfen unter anderem Gates, Pfizer-Chef Bourla und dem niederländischen Staat vor, sie hätten gewusst, dass diese Präparate weder sicher noch wirksam sind.
Mit den mRNA-«Impfstoffen» von Pfizer/BioNTech befasst sich auch ein neues Buch. Darin werden die Erkenntnisse von Ärzten und Wissenschaftlern aus der Analyse interner Dokumente über die klinischen Studien der Covid-Injektion präsentiert. Es handelt sich um jene in den USA freigeklagten Papiere, die die Arzneimittelbehörde (Food and Drug Administration, FDA) 75 Jahre unter Verschluss halten wollte.
Ebenfalls Wissenschaftler und Ärzte, aber auch andere Experten organisieren als Verbundnetzwerk Corona-Solution kostenfreie Online-Konferenzen. Ihr Ziel ist es, «wissenschaftlich, demokratisch und friedlich» über Impfstoffe und Behandlungsprotokolle gegen SARS-CoV-2 aufzuklären und die Diskriminierung von Ungeimpften zu stoppen. Gestern fand eine weitere Konferenz statt. Ihr Thema: «Corona und modRNA: Von Toten, Lebenden und Physik lernen».
Aufgrund des Digital Services Acts (DSA) der Europäischen Union sei das Risiko groß, dass ihre Arbeit als «Fake-News» bezeichnet würde, so das Netzwerk. Staatlich unerwünschte wissenschaftliche Aufklärung müsse sich passende Kanäle zur Veröffentlichung suchen. Ihre Live-Streams seien deshalb zum Beispiel nicht auf YouTube zu finden.
Der vielfältige Einsatz für Aufklärung und Aufarbeitung wird sich nicht stummschalten lassen. Nicht einmal der Zensurmeister der EU, Deutschland, wird so etwas erreichen. Die frisch aktivierten «Trusted Flagger» dürften allerdings künftige Siege beim «Denunzianten-Wettbewerb» im Kontext des DSA zusätzlich absichern.
Wo sind die Grenzen der Meinungsfreiheit? Sicher gibt es sie. Aber die ideologische Gleichstellung von illegalen mit unerwünschten Äußerungen verfolgt offensichtlich eher das Ziel, ein derart elementares demokratisches Grundrecht möglichst weitgehend auszuhebeln. Vorwürfe wie «Hassrede», «Delegitimierung des Staates» oder «Volksverhetzung» werden heute inflationär verwendet, um Systemkritik zu unterbinden. Gegen solche Bestrebungen gilt es, sich zu wehren.
Dieser Beitrag ist zuerst auf Transition News erschienen.
-
@ e077f063:49dc180e
2024-11-29 10:42:56** В столице Югры открылся необычный СПА-салон - он расположился в хантыйском чуме. Он расположился на стойбище в Самаровском чугасе.**
Услуги, которые предлагает бьюти-чум, стандартные - массаж, обертывание, маски для волос и лица и так далее. Но есть один нюанс: процедуры проводят с использованием натуральных продуктов Севера. Так, бьюти-чум предлагает клиентам попробовать обертывание с рыбьим жиром, который переработан с помощью новейших технологий таким образом, что не имеет неприятного запаха. Такая процедура подтягивает и омолаживает кожу всего тела. Рыбий жир сотрудники также используют для смягчения кутикулы.
В маски для волос бьюти-чум добавляет жир оленя, который тоже переработан и не имеет неприятного запаха. А для ухода за лицом в салоне наносят масло из выдимки сибирских ягод.
С момента открытия бьюти-чум вызвал настоящий ажиотаж среди женщин. Местные жительницы и туристки стремятся попасть на процедуры, чтобы насладиться уникальным сочетанием ухода за собой и хантыйской культурой.
«Я была в восторге от атмосферы и качества процедур! Никогда не думала, что рыбий жир может быть таким приятным в использовании. Это не просто спа, это настоящее погружение в культуру», – поделилась впечатлениями одна из первых посетительниц бьюти-чума.
СПА-салон в чуме работает с понедельника по пятницу, а для туристов делает большие скидки. Вскоре команда бьюти-чума обещает увеличить перечень предлагаемых процедур.
-
@ 99505d3f:54553369
2024-11-29 10:28:34Alzheimer’s disease presents challenges that require specialized care for emotional, physical, and cognitive needs. There are Alzheimer’s care options in Highland Village, helping families find the right support. Whether seeking full-time care or daycare, it’s important to understand what to look for to ensure the best care for your loved one. Here are eight key factors to consider when choosing Alzheimer’s care in Highland Village.
Safety and Security Features
Safety is a top priority for Alzheimer’s care facilities. Look for features such as secure entrances, monitored exits, and anti-wandering systems to prevent accidents and ensure residents’ safety. A well-designed layout with open spaces and clear signage can also help reduce confusion and improve mobility for individuals with memory impairments.
Personalized Care Plans
Every individual with Alzheimer’s experiences the condition differently. High-quality Alzheimer’s care should offer personalized care plans that address specific needs. It could include medical requirements, mobility support, and cognitive therapy. Staff should regularly assess and adjust these plans as the disease progresses.
Experienced and Compassionate Staff
The quality of care greatly depends on the training and demeanor of the caregivers. Look for facilities with dedicated staff trained in dementia care, communication strategies, and managing challenging behaviors. Compassionate caregivers who build meaningful relationships with residents can greatly enhance emotional well-being.
Engaging Activities and Programs
Cognitive stimulation is critical for individuals with Alzheimer’s or other memory impairments. Alzheimer's daycare in Highland Village should include structured activities such as music therapy, art classes, and memory games. These activities not only engage the mind but also foster a sense of accomplishment and joy.
A Home-Like Environment
A nurturing, home-like setting can help reduce feelings of confusion and anxiety often associated with Alzheimer’s. Choose care facilities that incorporate calming decor, comfortable furnishings, and familiar elements to create a soothing atmosphere. Private or semi-private suites allow residents to maintain a sense of independence while feeling secure.
Social Interaction Opportunities
Isolation can worsen symptoms of Alzheimer’s. Look for programs that encourage social interaction through group activities, family-style dining, and community events. Alzheimer’s daycare in Highland Village often emphasizes group engagement to promote companionship and improve overall quality of life.
Nutritious Meals and Dietary Support
Proper nutrition plays a vital role in overall health and cognitive function. Care facilities should provide balanced, nutritious meals tailored to individual dietary preferences and requirements. Meals should also be served in a manner that supports independence, such as finger foods for those who have difficulty using utensils.
Transparent Communication with Families
Regular updates and open communication between caregivers and families are essential for peace of mind. Facilities offering Alzheimer’s care in Highland Village should provide detailed reports on your loved one’s condition, progress, and any changes in care plans. Family involvement in decision-making ensures a more personalized approach.
Choosing Between Full-Time Care and Daycare Services
Deciding whether to opt for full-time Alzheimer’s care or daycare services depends on your loved one’s needs and your circumstances. Full-Time Care: Ideal for individuals in advanced stages of Alzheimer’s who require 24/7 support, comprehensive medical attention, and a secure environment. Daycare Services: A great option for those in earlier stages of the disease who can benefit from structured daytime activities while returning home in the evenings. It also provides caregivers with much-needed respite.
Finding the Right Fit in Highland Village
There are Alzheimer’s care options in Highland Village designed to meet diverse needs. Take the time to visit potential facilities, ask questions, and observe how staff interact with residents. A facility’s ability to provide safety, personalized care, and a nurturing environment will play a significant role in enhancing your loved one’s quality of life. By focusing on these eight factors, you can make an informed decision and ensure that your loved one receives the care, respect, and dignity they deserve.
-
@ f8a5df57:b7a58cd4
2024-11-29 09:46:35Сегодня мы отмечаем важный день в истории нашей страны — День Конституции России! 12 декабря 1993 года была принята основная закон, который стал основой для формирования правового государства и гарантии прав и свобод граждан.
Конституция — это не просто документ, это символ нашей независимости, единства и стремления к справедливости. Она защищает наши права, устанавливает основные принципы демократии и обеспечивает стабильность в обществе.
В этот день мы можем гордиться тем, что живем в стране, где уважаются права человека и ценятся свободы. Давайте помнить о важности соблюдения Конституции и активно участвовать в жизни нашего общества.
Поздравляем всех с этим знаменательным днем! Пусть каждый из нас будет не только гражданином своей страны, но и активным участником её развития!
Автор: Рината Ситникова
-
@ b6424601:a11e4ff4
2024-10-26 12:12:56In 2007, my 10-year-old business had just signed a 5-year lease on Atlanta's Peachtree Road with enough space for my partner and our wives' separate companies to continue growing. We thought we were an overnight success 10 years in the making. 14K a month split between 3 companies, all in the housing and office design industry; what could go wrong?
As I look back on those early days, I realize that our business was fueled by the fiat jet fueled housing run-up. Two couples, three businesses, and all personally guaranteed. We thought we were an overnight success, but little did we know that the housing market was about to take a drastic turn.
In 2008, I joined a Vistage CEO group, where I was tasked with presenting to the group on my approach to designing buildings for individuals. I saw an opportunity to analyze the patterns that produced good projects for happy clients, and I teamed up with a contractor buddy to work on a joint presentation. Our efforts yielded ten principles that produced the highest ROI beyond providing a primary place to live.
These principles were the foundation of our approach to architecture, and they were based on our experiences working with individuals on their custom house projects. We focused on listening to our clients, designing buildings that stood out while fitting in, creating lifetime homes, and making projects sustainable and viable.
As I reflect on our journey, I realize that the principles we developed were an interesting reflection of what was happening to our clients in the housing market of that time and how we as architects help our clients get through the process. Over time, we had to adapt and evolve to respond to changing conditions.
In 2010, we made changes to respond to a client environment where projects happened without banks. Clients spent paper on their projects, and construction loans were not available. What the subsequent buyers wanted when the house was sold was off the table. Remember being thankful our clients had cash to spend on projects in our survival predicament.
In hindsight, our clients are probably grateful as well for being able to convert paper into a hard asset. The principles evolved slowly until the COVID came in 2020. I was ready to hunker down and go to business survival mode like back in the crash, converting staff to contractors again and only paying for billable work.
But "your" government made PPP rain from the sky on our small business with employees. In addition, clients working from home who needed change or from their vacation property added gasoline to the fire. By 2022, inflation raged, described as transitory, to change the build cost from 1.2 million to a new price of 2.2 million for the new Intown infill homes. That is 83% inflation over 2 years, no matter what the CPI said.
The principles pivoted to respond: going fast to respond to inflation, managing the stuff to deal with supply chain problems, providing a viability budget before starting work to help clients understand the cost, and guiding our clients through the choppy waters of inflation.
We added a new principle about stewardship, which has become a cornerstone of our approach. We want to become architects for life for our completed projects and owners. We want to maintain relationships, observe results, and be trusted advisors as our projects age and clients' needs evolve.
Today, we are proud to say that our principles have evolved into 10 guiding principles that organize our approach to producing architecture asset architecture for the individual. We leverage the team of clients, contractors, vendors, and our time through our principle based process to produce architecture worthy of being an asset for our clients and families.
These 10 principles are:
- Listen: Analyze and understand our client's goals, constraints, and opportunities to communicate our vision of what is possible.
- Establish Viability: Before starting our project process, we will engage our client in a pre-project viability phase to diagnose and prescribe our solutions with a timeline and budget for client approval.
- Be a Design Sherpa: Our process is the most important value we provide. Following our process milestones will lead new and experienced clients through the 1000’s of design decisions to evolve in the correct order at the proper time.
- Design in Context: We believe context is the caldron of good architecture fits into its location both from the outside and inside out. Designing in context allows a building to stand out while fitting into the adjacent network of spaces around it.
- Architecture is a team sport: We believe in custom teams for custom projects, collaborating with partners who care about our clients and believe in our process as much as we do.
- Design for the individual: We do our most fulfilling work with clients who will live in or operate architecture explicitly created for their needs.
- Investment iteration: We break down the design process into decision milestones, providing increasingly detailed pricing for initial ideas, building shell, and interior selections to empower clients to make informed decisions about the value they're willing to exchange for their desired architecture.
- Create Asset Architecture: Design and execute projects that hold long-term value and provide a return on investment beyond the currency used build the project.
- Be present: Designing and building stuff is an atypical and infrequent activity for our client. Help our clients enjoy the journey and results that could be life-changing (in a good way).
- Stewardship—We want to Become architects for life for our completed projects and owners. We want to maintain relationships, observe results, and be trusted advisors as our projects age and clients' needs evolve.
We're an architect tribe that has refined our principles to design buildings that truly matter for the people that use them. Aspire to create hard asset architecture worth exchanging for the hardest money there is.
HODL on.
-
@ 599f67f7:21fb3ea9
2024-10-26 11:54:10Zer da Cashu?
Cashu Bitcoinentzako Ecash protokolo irekia da, transakzio azkarrak eta doakoak eskaintzen dituena. Protokolo honen ezaugarri nabarmenetako bat pribatutasun ia perfektua eskaintzea da. Nostr nostr:npub12rv5lskctqxxs2c8rf2zlzc7xx3qpvzs3w4etgemauy9thegr43sf485vg erabiltzaileak sortu zuen.
Hona hemen Cashu eta on-chain Bitcoin alderatzen dituen taula, Bangkok 2023ko Bitcoin Konferentzian nostr:npub1cj6ndx5akfazux7f0vjl4fyx9k0ulf682p437fe03a9ndwqjm0tqj886t6-k aurkeztutako Nuts and Bolts hitzaldian oinarrituta:
| Cashu | Bitcoin (on-chain) | |-----------------------|----------------------------| | Libururik gabe | Liburu banatua | | Titulartasun tokena | UTXO (Ustiaketa Ezberdinen Irteera) | | Transakzio itsutuak | Transakzio publikoak | | Zentralizatua | Deszentralizatua | | Konfiantzazkoa | Konfiantzarik gabe | | Aldi baterako transakzioak | Betiko transakzioak |
Ikusten dugunez, Cashuk pribatutasuna hobetzeko konfiantza gabeko izaera eta deszentralizazioa sakrifikatzen ditu. Konpentsazio hauek zentzuzkoak dira zaintza-zerbitzuetan, erabiltzailea dagoeneko zerbitzu zentralizatu eta fidagarri bat erabiltzen ari baita. Zaintza tradizionaleko irtenbideek pribatutasun eskasa dute, zaintzaileak erabiltzailearen funtsak zenbat diren eta norekin ari den transakzioak egiten jakin dezakeelako. Horrek esan nahi du norbanakoak erraz helburu eta zentsura daitezkeela. Gainera, datu-erregistroek "honeypot" bihurtzeko arriskua dute, hau da, erasotzaileentzat erakargarri.
Alderantziz, Cashu-ren mint-ek zaintzaile gisa jardun dezakete, baina erabiltzaileen nortasuna, duten funtsen kopurua edo norekin ari diren transakzioak egiten ezagutzeko aukerarik gabe. Mint-ek duten datu-erregistro bakarra gastatutako sekretuen zerrenda da, berriro erabili ezin direnak, baina erabiltzaileekin lotzeko modurik gabe. Horrela, Cashu-k pribatutasuna bermatzen du, zaintzaileak ez duelako inolako informaziorik erabiltzaileen jarduerei buruz, ohiko zaintza-soluzioekin gertatzen denaren kontrara.
Cashu-ren erabilera kasu batzuk
Cashu-ren erabilera kasu batzuk honako hauek dira: bonuak, dagoeneko zentralizatuak eta zaintza-zerbitzuak dituztenak; baliabide bakoitzeko ordainketa (pay-per-resource) APIak, nostr bideratzaileak eta mixnet-ak bezalako zerbitzuetarako; sistema integratuak, kontu eta saldo eredu tradizionala ordezkatzen dutenak; eta truke/mixinge zerbitzuak, gordailuak eta ateratzeak deslotzeko, pribatutasuna hobetzeko.
Historia
Ecash David Chaum-ek 1982an asmatu zuen, sinadura itsuak erabiliz balio elektronikoaren transmisiorako protokolo gisa. Cashu Ecash-en inplementazio bat da, David Wagner-en 1996ko Chaum-en itsutze-aldaketan oinarrituta dagoena, eta nostr sortu zuen.
Terminologia
Cashu nola funtzionatzen duen ulertzen laguntzeko, lehenik eta behin funtsezko terminologia batzuk azalduko ditugu.
Mint
Cashu-ren mint-a erabiltzaileen funtsen zaintzailea da. Bere zeregina tokenak jaulkitzea eta erretzea da, baita bikoiztutako gastuak saihestea ere. Cashu-ren mint-a Lightning nodo baten gainean dago, beraz, Lightning ordainketak bidali eta jaso ditzake, beste mint batzuekin trukeak barne. Hala ere, Lightning nodoa lineaz kanpo badago ere, ecash tokenekin transakzioak egin daitezke. Lightning-ekin ez bezala, jasotzailea linean egon beharrik ez du tokenak jasotzeko.
Mint-ak ez daki nor den erabiltzailea, zenbat funts dituzten edo norekin ari diren transakzioak egiten. Hala ere, mint-a erabiltzaileen funtsen zaintzailea denez, fidagarria den mint bat aukeratu behar duzu, eta eragilea nor den jakin. Erabil ezazu funts txikiekin edo tokenak berehala trukatu.
Token
Cashu token-a mint-ak sinatutako datu-puska bat da, eta erabiltzaileak token horiek bere zorroan gordetzen ditu. Ecash tokenak testu-kate hutsak direnez, edozein testu bidezko protokoloaren bidez bidal daitezke, adibidez, nostr, posta elektronikoa, SMS, etab. Cashu-k txanpon-sistema bat erabiltzen du, zenbateko finkatuak dituena. Analogia bat eginez, hau moneta fiduziarioen billeteen zenbatekoei dagokie. Adibidez, eurotan 5, 10, 20, 50, 100 euroko billeteak daude. Cashu-n, tokenak 2ren indarren arabera sailkatzen dira. Adibidez, 1, 2, 4, 8, 16, 32, 64, 128 satoshi, eta horrela aurrera.
Zenbatekoak erabiltzea erabiltzaileen artean anonimotasuna areagotzeko egiten da, eta mint-ek transakzioak erabiltzaileen nortasunekin lotzea zailagoa bihurtzeko.
Nola funtzionatzen duen, 5 urteko bati bezala azaldua
Erabiltzaile Alice-k Cashu token berriak sortu nahi ditu. Horregatik, Bob mint-aren arduradunarengana joaten da eta esaten dio: "Kaixo! Cashu token berriak sortu nahi ditut."
Bob-ek erantzuten dio: "Ados, ordaindu iezadazu eta bidali iezadazu sekretu itsu bat." Sekretu itsua esan nahi du Alice-k sekretua ezagutzen duela, baina Bob-ek ezin duela sekretu hori ikusi.
Alice-k sekretu bat sortzen du, eta ondoren itsutzen du, horrela Bob-ek ez dezan jakin zein den sekretu hori.
Alice-k Bob-i ordainketa egiten dio eta ordainketaren egiaztagiria eta sekretu itsua bidaltzen dizkio. Bob ordainketa jaso duela ziur dagoenean, Alice-ren sekretu itsua sinatzen du eta sinatutako sekretu itsua itzultzen dio. Bob-ek sinatu duelako, etorkizunean ziur egon daiteke tokena baliozkoa dela.
Alice-k Carol-i ordaindu nahi dio. Horretarako, sekretua eta sinatutako sekretu itsua desitsutzeko gakoa bidaltzen dizkio Carol-i.
Carol-ek bere tokena trukatu nahi du. Beraz, Bob-engana (mint-aren arduradunera) joaten da eta Alice-k eman dion sekretua eta desitsututako gakoa erakusten dizkio.
Nola jakiten du mint-ak Carol-i zenbat satoshi eman behar dizkion?
Lehenago aipatu genuen bezala, Cashu tokenak 2ren indarren araberako zenbatekoetan banatuta daude (1, 2, 4, 8, 16, 32...), paperezko diru billeteen antzera. Bob mint-ak zenbateko bakoitza sinatzeko gako pribatu berezi bat du. Adibidez, 1 satoshi zenbatekoaren tokenak sinatzeko gako pribatu bat du, 2 satoshi zenbatekoaren beste bat, 8 satoshi zenbatekoaren beste bat, eta abar. Horrela, Carol tokenak trukatzera datorrenean, Bob-ek badaki zein gako pribaturekin sinatu zuen token hori, eta horren arabera, tokenak zein zenbatekotakoak diren ezagutzen du. Horrela, Bob-ek Carol-i dagokion satoshi kopurua itzuli diezaioke, sinatutako tokenaren zenbatekoa kontuan hartuta.
Zer gertatzen da itzulkinekin?
Cashu-n ez dago itzulkinik diru fisikoan bezala. Horren ordez, mint-ari (Bob-i) eskatu behar diozu token zaharrak suntsitzeko eta berriak sortzeko, zenbateko berarekin. Adibide batekin azalduz: Demagun Alice-k bi token dituela, guztira 10 satoshi balio dutenak. Bata 8 satoshi da eta bestea 2 satoshi. Alice-k 9 satoshi bidali nahi dizkio Carol-i. Horretarako, mint-ari (Bob-i) eskatzen dio bere 2 satoshi tokena bi 1 satoshi token bihurtzeko. Horrela, Alice-k 9 satoshi bidal diezazkioke Carol-i: 8 satoshi token bat eta 1 satoshi token bat erabiliz. Gainera, beste 1 satoshi tokena berarentzat gordetzen du.
Lightning sarearen papera konektatzeko elementu gisa
Zer gertatzen da Alice-k David-i ordaindu nahi dionean, baina David-ek Bob-en mint-a ez du fidatzen, eta, aldiz, Erin ezagutzen du eta bere mint-a erabiltzen du? Alice-k bere tokenak Bob-en mint-ean trukatzen ditu, eta Bob-i eskatzen dio token horiek "urtzeko" edo Lightning satoshietara bihurtzeko. Ondoren, Bob-en mint-ak Lightning transakzio bat bidaltzen dio Erin-en mint-ari. Erin-en mint-ak transakzio hori jasotzen du, eta David-entzat token berriak sortzen ditu Lightning sarearen bidez Bob-en mint-etik jasotako satoshiekin. Horrela, Lightning sareak mint ezberdinak konektatzen ditu, erabiltzaileak (Alice eta David) mint ezberdinak fidatu arren, transakzioak segurtasunez egiteko.
Zer dator hurrengoa Cashu-rentzat?
Programagarri den ecash
Cashu-ri gastatzeko baldintzak gehitu ahal izango zaizkio, mint-ak baldintza horiek betearaziko dituelarik. Horrek ahalbidetu dezake kontratu adimendun sendoak sortzea, oinarrizko katean (Bitcoin blockchain) edo Lightning sarean sartu gabe. Horrela, ordainketa publikoak, lineaz kanpokoak eta maiztasun handikoak posible izango dira.
Zorren froga eskema (Proof of Liabilities Scheme)
Zorren Froga (PoL) Eskema Cashu-rentzat zaintzailea den mint-ak erabiltzaileak iruzurrez erabiltzea zailtzen du, epoka kontzeptua aurkeztuz. Eskema honetan, zaintzaile den mint-ak epoka bakoitzean gako pribatuak aldian-aldian biratzen ditu, eta azken epokan jaulkitako eta erretako tokenen zerrenda publikoak argitaratzen ditu. Hau Erreserben Froga (Proof of Reserves) eskemarekin uztartzen da, non erreserbak katean bertan multisig batean gordetzen diren. Horrela, mint-ak ezingo du bere erantzukizunak murriztu, erabiltzaileek iruzurra detektatzeko arriskua handitu gabe. Xehetasun gehiagorako, eskema honen azalpen osoa kontsultatu dezakezu.
Saiatu Cashu
Cashu probatzeko, [Nutstash] eta [eNuts] gidak erabil ditzakezu. Horretarako Lightning zorro bat eta telefono edo ordenagailu bat besterik ez duzu behar.
-
@ 599f67f7:21fb3ea9
2024-10-26 11:22:06Zer da Cashu?
Cashu Bitcoin-erako ecash protokolo ireki bat da, transakzio azkarrak eta komisio gabekoak eskaintzen dituena, pribatutasun ia perfektuarekin. Xehetasun gehiago nahi izanez gero, gure azalpena ikus dezakezu.
eNuts
eNuts Cashu-rako mugikorretarako zorro bikaina da, Android eta iOS (TestFlight) plataformetan eskuragarri dagoena. Mint anitzekin lan egitea ahalbidetzen du eta nostr bidez bidalketak egiteko aukera ere eskaintzen du.
⚠️ eNuts eta Cashu oraindik beta fasean daude. Funtsak galtzeko arriskua dago. Aplikazioa instalatzerakoan arriskuen inguruan irakurri. Galera ekonomikoei aurre egiteko gai zaren zenbateko txikiekin saiatu.
Probatu
Prozesu honetan zehar mint-ekin elkarreragin, ecash-a jaso eta bidali, segurtasun-kopiak egin, Lightning-era ateratzeak eta mint-en artean trukaketak egingo ditugu. Azkenik, nostr kontaktu funtzionalitatea probatuko dugu.
Instalatu
Sartu eNuts webgunera eta instalatu aplikazioa zure sistema eragilerako.
Mint bat gehitzea
Ecash-arekin elkarreragiteko, lehenik mint bat behar duzu. Mint honetan zure ecash token-ak sortzen eta itzultzen dira. Mint-a da zure Bitcoin-en zaindaria, baina ez daki nor zaren, norekin egiten duzun transakzioa, ezta zenbat diru duzun ere. Probetarako Txoko mint erabili dezakezu.
- Joan Txoko Mint-era. Kopiatu mint URL-a.
- eNuts-en, joan Aukerak > Mint kudeaketa eta sakatu + botoia. Itsatsi lehen urratsean kopiatu duzun mint URL-a.
💡 Mint gehigarriak ere gehitu ditzakezu. Mint publiko batzuk MintIndex-en aurki daitezke. Kontuan izan mint batzuek zenbateko jakin bat gordetzen dutela bideratze-gastuak ordaintzeko, eta, beraz, ezin dituzula zure sats guztiak atera.
Tokenak sortzea
Mint bat gehitu duzunean, eNuts-ek automatikoki galdetuko dizu mint horretatik Cashu token berriak sortu nahi dituzun.
- Erantzun Bai.
- Sortu faktura bat mintu nahi duzun zenbatekoarentzat. Zenbateko txiki batekin saiatu, adibidez, 100 sats.
- Ordaindu faktura Lightning zorro batetik. Faktura ordaindutakoan, ecash token-ak izango dituzu.
Prozesu honek aukera ematen dizu ecash token-ak sortzeko, eta horiek zure transakzioetarako erabiltzeko prest izango dituzu.
Ecash-ekin transakzioak egitea
Ecash-ekin transakzioak egitea, funtsean, datu multzoak bidaltzea eta jasotzea da. Funtzionalitate hauek zuk zeuk probatzeko, bidali eta jaso dezakezu zure buruari.
- Ecash bidaltzeko, sakatu Bidali > Ecash bidali.
- Mint bat baino gehiago erabiltzen baduzu, aukeratu bidali nahi duzun mint-a. Ondoren, aukeratu Kopiatu eta partekatu.
- Aukeratu zenbatekoa.
- Nahi izanez gero, gehitu ohar bat, eta sakatu Jarraitu.
- Berretsi ordainketa xehetasunak eta sortu token-a. Une honetan, coin selection funtzioa erabil dezakezu zein token erabili nahi dituzun hautatzeko.
Ohartu token-ak 1 sat, 2 sats, 4 sats, 8 sats, 16 sats eta antzeko zenbatekotan sailkatuta daudela. Horiek 10 euroko, 20 euroko edo 50 euroko billeteak bezala irudika ditzakezu. - Kopiatu token-a.
Une honetan, token-a beste norbaiti bidal diezaiokezu edo zure zorroan berreskuratu. Saiakera moduan, bigarren aukera hau egingo dugu.
- Ecash jasotzeko, sakatu Jaso > Itsatsi eta berreskuratu Ecash. eNuts-ek automatikoki irakurriko du zure arbeletik eta token-a berreskuratuko du.
💡 Zure transakzioen historian ecash token-a zain dagoen egiaztatu dezakezu, eta hartzaileak ez badu berreskuratu, itzuli dezakezu. Horretarako, sakatu zure historiako irteerako transakzioan eta aukeratu Egiaztatu token-a gastatu den. Token-a zain badago, Itzuli token-a sakatu dezakezu eta berriro zure zorroan izango duzu.
Multimint trukeak
Mint desberdinen artean bidalketak eta jasotzeak posibleak diren galdetu baduzu, erantzuna bai da, neurri batean. Hala ere, Cashu token-ak zuzenean mint batetik bestera bidaltzea ez da zuzenean egiten; horren ordez, transakzioak Lightning-era bideratzen dira, mint bat Lightning nodo bat ere badelako. Cashu token-ak ez dira bateragarriak nodo desberdinen artean.
Hau probatzeko, beste mint bat gehitu dezakezu oraindik egin ez baduzu, adibidez, cashme LNbits mint edo eNuts mint lehenetsia.
💡 Kontuan izan mint batzuek sats kopuru bat gordetzen dutela bideratze-gastuak ordaintzeko. Arazo hau konpontzeko, zure mint propioa sor dezakezu Bitcoin Txoko LNbits zorroarekin, Cashu luzapena aktibatuz.- Joan Aukerak > Mint kudeaketa atalera, eta aukeratu trukatu nahi duzun mint-a. Ondoren, joan Multimint trukeak atalean.
- Aukeratu trukatu nahi duzun mint-a.
- Aukeratu zenbatekoa eta sakatu Kuotak aurreikusi Lightning gastuen kalkulua egiteko.
- Sakatu Jarraitu.
- Egiaztatu xehetasunak, eta nahi izanez gero, coin selection funtzioa erabili. Ondoren, sakatu Orain trukatu.
Prozesu honetan, bidaltzen ari den mint-ak Lightning faktura bat ordaintzen du jasotzen ari den mint-aren bidez. Faktura osatu bezain laster, trukatuta dagoen token-a zure zorroaren saldoan agertu beharko litzateke jasotzen ari den mint-ean.
Ateratzea
Zure Cashu sats-ak berriro Lightning sats bihurtu nahi dituzunean, ateratzeko aukera duzu. Prozesua hauxe da:
- Sakatu Bidali > Lightning faktura ordaindu.
- Mint bat baino gehiago erabiltzen baduzu, aukeratu bidaliko duzun mint-a.
- LN faktura edo LNURL atalean, sartu faktura bat, LNURL edo Lightning helbide bat; edo, besterik gabe, QR kode bat eskaneatu.
- Aukeratu zenbatekoa eta sakatu Kuotak aurreikusi.
- Egiaztatu xehetasunak, eta dena zuzen dagoela ikusi ondoren, sakatu Ateratzea.
Prozesu hau amaitutakoan, mint-ak Cashu token-ak trukatzen ditu eta Lightning faktura ordaintzen du.
Segurtasun kopiak
Cashu token-ak babesteko prozesua, agian, ezberdina izango da Bitcoin eta Lightning zorroak babesteko ohiko prozesuekin alderatuta. Diru-funtsak datu blokeekin irudikatzen direnez, Cashu token-ak babesten dituzunean datu bloke horiek bakarrik babesten ari zara. Honek esan nahi du segurtasun-kopiak baliogabetzen direla transakzio berri bat egiten duzun bakoitzean.
eNuts aplikazioak Cashu token bat sortzen du zure funts guztiekin, eta token horiek zein mint-ekoak diren jasotzen du.
- Segurtasun-kopia bat sortzeko, joan Aukerak > Segurtasuna > Sortu babeskopia token. Kopiatu token-a eta gorde toki seguru batean.
Bestela, mint bakoitza banaka babestu dezakezu: - Horretarako, joan Aukerak > Mint kudeaketa atalera eta aukeratu babestu nahi duzun mint-a. Ondoren, sakatu Funtseak babestu, kopiatu token-a eta gorde toki seguru batean.
Berreskuratzea
Berreskuratzeko, kopiatu babeskopia token-a eta ireki eNuts aplikazioa. Aplikazioak automatikoki irakurriko du zure arbelean dagoena eta galdetuko dizu token-a berreskuratu nahi duzun.
Nostr
eNuts aplikazioak Nostr integrazioa eskaintzen du, horrela zure kontaktu zerrendara ecash bidali ahal izateko. Funtzio hau erabiltzeko, honako pauso hauek jarraitu behar dituzu:
- Joan Kontaktuak atalera eta itsatsi zure Nostr gako publikoa.
- eNuts-ek zure kontaktu zerrenda eskuratuko du relays-etatik. Tamalez, bilaketa funtzioa oraindik ez dago eskuragarri, eta horrek kontaktu zuzena aurkitzea zaildu dezake, kontaktu asko izanez gero.
Hartzaileak Nostr motako 4 mezu zuzena jasoko du, Cashu token-arekin. Hartzaileak mezu hau bere zorroan berreskuratu eta token-a erabili ahal izango du.
Ondorioa
Gida hau lagungarria iruditu zaizu? Saiatu Cashu token batzuk bidaltzen Nostr bidez!
-
@ f8a5df57:b7a58cd4
2024-11-29 09:45:22Этой осенью Москве исполнится 917 лет! Мы провели аналитику культурной сферы нашей столицы. В ближайшие десятилетия мы можем ожидать значительных трансформаций, связанных с внедрением новых технологий. Давайте рассмотрим, как они помогут сформировать культурный ландшафт столицы.
- С развитием цифровых технологий искусство становится более доступным. Художники и музыканты смогут использовать новые цифровые платформы для распространения своих работ( Например, будет активно работать "Творческий портал", созданный для обмена идеями и проектами), что позволит творческим людям находить аудиторию не только в России, но и за её пределами.
- Искусственный интеллект (ИИ) уже активно используется в различных областях искусства — от создания музыки до генерации визуальных произведений. В Москве мы можем увидеть рост числа проектов, где ИИ будет выступать в роли соавтора художников и композиторов, открывая новые горизонты для творчества и экспериментов.
- Технологии виртуальной (VR) и дополненной реальности (AR) обещают изменить восприятие искусства и культуры. Музеи и театры смогут создавать погружающие опыты, позволяя зрителям стать частью произведения. Например, выставки будут включать интерактивные элементы, которые погрузят зрителя в другой мир.
- С учетом глобальных вызовов, связанных с изменением климата, культура в Москве может начать активно интегрировать принципы устойчивого развития. Новые технологии помогут создавать экологичные проекты в архитектуре, дизайне и искусстве. Например, использование переработанных материалов или создание инсталляций, поднимающих вопросы экологии, станут всё более актуальными.
Автор: Рината Ситникова
-
@ 599f67f7:21fb3ea9
2024-10-26 11:20:48Zer da lightning address bat?
Lightning address bat irakurgarria den helbide elektroniko baten antza duen helbidea da, adibidez username@domein.com, baina bitcoinetan ordainketak berehala eta merke jasotzeko aukera ematen du. Ez duzu zure gailuan nodo bat linean izatea behar, eta ez duzu eskuz faktura bat sortu behar norbaitek ordainketa egin nahi dizunean.
Oso interesgarria, ezta?Nola funtzionatzen du, orduan?
Lightning Address-ek LNURL pay protokoloa erabiltzen du, Lightning Network-aren gainean dagoen geruza bat da.
Prozesua hurrengo urratsetan laburbil daiteke:
- Erabiltzaile batek zure Lightning Address erabiliz ordainketa egin nahi duenean, haien zorroak helbide hori LNURL payRequest batean bihurtzen du.
- LNURL payRequest arrakastatsu baten bidez, zorroak BOLT11 faktura bat eskuratzen du, eta faktura hori ordainketa burutzeko erabiltzen da.
Hau da, prozesuaren oinarrizko pausoak hurrengoak dira:
💡 Lightning Address > LNURLp > BOLT11 faktura.
Lightning Network-ekin integratuta dagoen sistema honi esker, ordainketak erraz, azkar eta modu automatizatuan burutu daitezke.Oso ondo dirudi, baina zein da tranpa?
Lightning Address-en inplementazio askok kustodia dute (nahiz eta ez den beti horrela), izan ere, domeinu bat eta beti linean dagoen nodo bat behar dira Lightning Address-ak funtzionatzeko. Kustodia sistema bat denez, zure fondoak kudeatzen dituenak edozein momentutan kontrolatu edo kendu ahal dizkizu eta zure transakzioak monitorizatu ditzake.
Domeinuaren jabearengan fidatu behar duzu, zure Lightning Address-aren erregistroa aldatu ez dezan. Eta, gainera, LNURL zerbitzaria linean ez badago, sistema ez da funtzionatzen.
Bitcoin Txoko-k LNbits-en oinarritutako Lightning Address irtenbide sinplea eskaintzen du. Hau ere kustodia sistemakoa da, beraz, gomendagarria da Bitcoin Txoko zorroan kopuru txiki bat bakarrik gordetzea eta gero auto-kustodia zorro batera ateratzea, satoshi gehiago jasotzen dituzun heinean.Hasteko prest bazaude, hona hemen behar duzuna:
-
Zure zorroa sortzea
Lehenik eta behin, ez baduzu oraindik egin, joan bitcointxoko.com webgunera eta zorro bat sortu. Zorroari nahi duzun izena jar diezaiokezu. -
Luzapenak aktibatzea
Lightning Address-ak funtzionatzeko Pay Links luzapena behar da. Horretarako: -
Joan tresna-barrako Extensions (Luzapenak) atalera eta Pay Links luzapena aktibatu.
-
Ordainketa esteka bat sortzea
- Ireki Pay Links luzapena eta egin klik New Pay Link (Ordainketa Esteka Berria) aukeran.
- Aukeratu sortu duzun zorroa.
- "Item Description" atalean, nahi duzun testua sar dezakezu.
- Aukeratu zure Lightning Address-erako erabiltzaile izena. Zure Lightning Address hau bezalakoa izango da: erabiltzailea@bitcointxoko.com.
-
Fixed Amount aukera desmarkatu eta jarri gutxieneko balioa 1 eta gehienekoa 500000.
⚠️ Gehienezko balioa handiagoa jar dezakezu, baina ordainketa handiek huts egiteko probabilitate handiagoa dute, Bitcoin Txoko Lightning nodoaren kanalaren sarrera-gaitasun mugatua dela eta. Gomendagarria da 500000 satoshitan mantentzea. - Orain, ireki Advanced Options (Aukera Aurreratuak) eta aldatu Comment maximum characters (Komentarioaren gehieneko karaktere kopurua) 799-ra. Ez da beharrezkoa, baina aurrerantzean funtzionalitate gehiago emango dizu. - Azkenik, markatu Enable nostr zaps aukera behealdean, Lightning Address bidez zaps jasotzeko aukera izateko.
Aukera aurreratuak beste parametro batzuk konfiguratzea ahalbidetzen dute, baina nahi baduzu hutsik utz ditzakezu.
Azkenik, dena zuzen dagoela egiaztatu ondoren, egin klik Create Pay Link (Sortu Ordainketa Esteka) botoian.Horrela, zure Lightning Address sortuta izango duzu eta ordainketak jaso ahal izango dituzu!
Proba egitea
Zure Lightning Address ondo funtzionatzen duen probatu nahi baduzu, beste zorro batera joan, Bidali (Send) aukera hautatu eta helmuga gisa zure Lightning Address idatzi. Ondoren, bidali zeure buruari satoshi batzuk.
Ondoren, itzuli Bitcoin Txoko zorrora eta egiaztatu ordainketa jaso duzun. Litekeena da orria freskatu behar izatea ordainketa agertzeko.
Dena ondo atera bada, zorionak! 🥳
Bestela, jakinarazi iezaguzu. Beti prest gaude laguntzeko.Hurrengo urratsak
Nostr zaps
Zure Bitcoin Txoko Lightning Address nostr profilean gehitu dezakezu eta horrela zaps jasotzeko erabil dezakezu. Normalean, hau hurrengo pausuekin egiten da: - Joan Profile (Profila) atalera. - Hautatu Edit (Editatu) eta Lightning Address aldatu.
LNDhub
Zure LNbits zorroa telefonoan inporta dezakezu LNDhub bezala, Zeus edo BlueWallet bezalako aplikazioak erabiliz. Horrela, ez duzu nabigatzailean zorroa ireki beharko aldian-aldian saldoa egiaztatu edo ordainketak egiteko.
Nola egin jakiteko, ikus ezazu nostr:naddr1qqxnzdej8y6ryvejxc6nvwpnqyg8wumn8ghj7mn0wd68ytnhd9hx2q3qtx0k0a7lw62vvqax6p3ku90tccgdka7ul4radews2wrdsg0m865sxpqqqp65w4hhl8s.QR kodea
Zure LNURLp QR kodea parteka edo inprima dezakezu, jendeak mugikorrarekin eskaneatu dezan. Oso erabilgarria da zure denda lokaleko jabeak Lightning ordainketak jasotzeko sistema ezartzea nahi baduzu! - Parteka ezazu Sharable Page (Parteka daitekeen Orrialdea) esteka. - Edo, QR kodea PDF formatuan inprima dezakezu: joan View Link (Esteka Ikusi) atalera eta hautatu Print (Inprimatu).
Horrela, zure Lightning Address erabilera praktikoa handitu eta errazago kudeatu dezakezu! Hasi zaitez !
-
@ 07e188a1:24d232f3
2024-10-26 09:16:44Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam, quis nostrud exercitation ullamco laboris nisi ut aliquip ex ea commodo consequat. Duis aute irure dolor in reprehenderit in voluptate velit esse cillum dolore eu fugiat nulla pariatur. Excepteur sint occaecat cupidatat non proident, sunt in culpa qui officia deserunt mollit anim id est laborum.
Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam, quis nostrud exercitation ullamco laboris nisi ut aliquip ex ea commodo consequat.
A sub heading goes a long way
Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam, quis nostrud exercitation ullamco laboris nisi ut aliquip ex ea commodo consequat.
-
@ 5b00bf35:a877c578
2024-11-29 09:14:02Da cyklen først blev introduceret i det 19. århundrede, blev den mødt med både begejstring og frygt. På trods af dens potentiale til at revolutionere transport og fritid, rejste dens ankomst en række bekymringer blandt befolkningen.
Sundhedsmyter og frygt
En af de mest udbredte myter var "cykelansigt," en påstået tilstand, hvor ansigtet blev forvredet af anstrengelse. Især kvinder blev advaret mod cykling, da det blev hævdet, at det kunne skade deres forplantningsevne og gøre dem ude af stand til at få børn. Mænd blev heller ikke skånet – nogle frygtede, at sadlen kunne skade deres kønsorganer eller føre til impotens. Derudover mente kritikere, at cykling kunne føre til overanstrengelse for både mænd og kvinder, hvilket ville skade deres helbred på lang sigt.
Sociale normer udfordret
Cyklen symboliserede frihed, men denne frihed skræmte mange. For kvinder var cyklen en vej til uafhængighed, hvilket udfordrede traditionelle kønsroller. Dette vakte moralsk panik, især fordi cykling ofte krævede praktisk tøj som bukser eller korte skørter, som mange betragtede som uanstændigt. Samtidig blev cyklen i starten set som en luksusvare, der kun var for de velhavende, hvilket skabte bekymringer om, at den kunne forstærke klasseskel. Da cykler blev mere tilgængelige, opstod der derimod frygt for, at lavere klasser ville bryde de sociale normer ved at efterligne de riges mobilitet.
Teknologisk skepsis og sikkerhed
Tidlige modeller som penny-farthing var notorisk farlige, og mange advarede om risikoen for alvorlige ulykker. Kritikken handlede ikke kun om personlige skader – nogle mente også, at cyklister ville skabe kaos på vejene. Med fodgængere, heste og vogne i forvejen på vejene frygtede man, at cykler ville forstyrre den eksisterende trafik og føre til farlige situationer.
Æstetik og moral
Ud over de sociale og sikkerhedsmæssige bekymringer blev cyklen også kritiseret for sin æstetik. Den fremadlænte kropsholdning, som cykling krævede, blev betragtet som uskøn og upassende – især for kvinder i kjoler. Samtidig blev det praktiske tøj, som mange kvinder begyndte at bære under cykling, set som en trussel mod moral og anstændighed.
Økonomiske og miljømæssige bekymringer
Cyklen skabte også modstand blandt erhvervsfolk, især hesteopdrættere og karetmagere, der frygtede at miste deres kunder. Kritikerne spredte derfor negativ propaganda om cykler. Derudover hævdede nogle, at cykler ville forårsage skade på vejene, især på grus- og brostensbelagte stier, hvilket ville føre til øgede vedligeholdelsesomkostninger.
Psykologiske effekter
Flere frygtede, at cykling kunne blive en slags afhængighed, der ville få folk til at forsømme deres ansvar. Kvinder blev især advaret mod at lade cyklen føre dem væk fra hjemlige pligter. Samtidig mente nogle kritikere, at cyklen kunne føre til isolation og antisocial adfærd, da cyklister ofte rejste alene eller i små grupper og dermed fjernede sig fra det traditionelle fællesskab.
En ny æra trods modstanden
På trods af frygten banede cyklen vejen for sociale og teknologiske fremskridt. Den blev hurtigt anerkendt som et effektivt, sundt og tilgængeligt transportmiddel. Ikke mindst spillede den en central rolle i kvinders kamp for større frihed og ligestilling.
I dag er cyklen ikke bare et transportmiddel, men et symbol på frihed og innovation, der har overvundet datidens myter og modstand.
LOLSTR #FUD #BH872.450
-
@ c631e267:c2b78d3e
2024-10-23 20:26:10Herzlichen Glückwunsch zum dritten Geburtstag, liebe Denk Bar! Wieso zum dritten? Das war doch 2022 und jetzt sind wir im Jahr 2024, oder? Ja, das ist schon richtig, aber bei Geburtstagen erinnere ich mich immer auch an meinen Vater, und der behauptete oft, der erste sei ja schließlich der Tag der Geburt selber und den müsse man natürlich mitzählen. Wo er recht hat, hat er nunmal recht. Konsequenterweise wird also heute dieser Blog an seinem dritten Geburtstag zwei Jahre alt.
Das ist ein Grund zum Feiern, wie ich finde. Einerseits ganz einfach, weil es dafür gar nicht genug Gründe geben kann. «Das Leben sind zwei Tage», lautet ein gängiger Ausdruck hier in Andalusien. In der Tat könnte es so sein, auch wenn wir uns im Alltag oft genug von der Routine vereinnahmen lassen.
Seit dem Start der Denk Bar vor zwei Jahren ist unglaublich viel passiert. Ebenso wie die zweieinhalb Jahre davor, und all jenes war letztlich auch der Auslöser dafür, dass ich begann, öffentlich zu schreiben. Damals notierte ich:
«Seit einigen Jahren erscheint unser öffentliches Umfeld immer fragwürdiger, widersprüchlicher und manchmal schier unglaublich - jede Menge Anlass für eigene Recherchen und Gedanken, ganz einfach mit einer Portion gesundem Menschenverstand.»
Wir erleben den sogenannten «großen Umbruch», einen globalen Coup, den skrupellose Egoisten clever eingefädelt haben und seit ein paar Jahren knallhart – aber nett verpackt – durchziehen, um buchstäblich alles nach ihrem Gusto umzukrempeln. Die Gelegenheit ist ja angeblich günstig und muss genutzt werden.
Nie hätte ich mir träumen lassen, dass ich so etwas jemals miterleben müsste. Die Bosheit, mit der ganz offensichtlich gegen die eigene Bevölkerung gearbeitet wird, war früher für mich unvorstellbar. Mein (Rest-) Vertrauen in alle möglichen Bereiche wie Politik, Wissenschaft, Justiz, Medien oder Kirche ist praktisch komplett zerstört. Einen «inneren Totalschaden» hatte ich mal für unsere Gesellschaften diagnostiziert.
Was mich vielleicht am meisten erschreckt, ist zum einen das Niveau der Gleichschaltung, das weltweit erreicht werden konnte, und zum anderen die praktisch totale Spaltung der Gesellschaft. Haben wir das tatsächlich mit uns machen lassen?? Unfassbar! Aber das Werkzeug «Angst» ist sehr mächtig und funktioniert bis heute.
Zum Glück passieren auch positive Dinge und neue Perspektiven öffnen sich. Für viele Menschen waren und sind die Entwicklungen der letzten Jahre ein Augenöffner. Sie sehen «Querdenken» als das, was es ist: eine Tugend.
Auch die immer ernsteren Zensurbemühungen sind letztlich nur ein Zeichen der Schwäche, wo Argumente fehlen. Sie werden nicht verhindern, dass wir unsere Meinung äußern, unbequeme Fragen stellen und dass die Wahrheit peu à peu ans Licht kommt. Es gibt immer Mittel und Wege, auch für uns.
Danke, dass du diesen Weg mit mir weitergehst!
-
@ fa0165a0:03397073
2024-10-23 17:19:41Chef's notes
This recipe is for 48 buns. Total cooking time takes at least 90 minutes, but 60 minutes of that is letting the dough rest in between processing.
The baking is a simple three-step process. 1. Making the Wheat dough 2. Making and applying the filling 3. Garnishing and baking in the oven
When done: Enjoy during Fika!
PS;
-
Can be frozen and thawed in microwave for later enjoyment as well.
-
If you need unit conversion, this site may be of help: https://www.unitconverters.net/
-
Traditionally we use something we call "Pearl sugar" which is optimal, but normal sugar or sprinkles is okay too. Pearl sugar (Pärlsocker) looks like this: https://search.brave.com/images?q=p%C3%A4rlsocker
Ingredients
- 150 g butter
- 5 dl milk
- 50 g baking yeast (normal or for sweet dough)
- 1/2 teaspoon salt
- 1-1 1/2 dl sugar
- (Optional) 2 teaspoons of crushed or grounded cardamom seeds.
- 1.4 liters of wheat flour
- Filling: 50-75 g butter, room temperature
- Filling: 1/2 - 1 dl sugar
- Filling: 1 teaspoons crushed or ground cardamom and 1 teaspoons ground cinnamon (or 2 teaspoons of cinnamon)
- Garnish: 1 egg, sugar or Almond Shavings
Directions
- Melt the butter/margarine in a saucepan.
- Pour in the milk and allow the mixture to warm reach body temperature (approx. + 37 ° C).
- Dissolve the yeast in a dough bowl with the help of the salt.
- Add the 37 ° C milk/butter mixture, sugar and if you choose to the optional cardamom. (I like this option!) and just over 2/3 of the flour.
- Work the dough shiny and smooth, about 4 minutes with a machine or 8 minutes by hand.
- Add if necessary. additional flour but save at least 1 dl for baking.
- Let the dough rise covered (by a kitchen towel), about 30 minutes.
- Work the dough into the bowl and then pick it up on a floured workbench. Knead the dough smoothly. Divide the dough into 2 parts. Roll out each piece into a rectangular cake.
- Stir together the ingredients for the filling and spread it.
- Roll up and cut each roll into 24 pieces.
- Place them in paper molds or directly on baking paper with the cut surface facing up. Let them rise covered with a baking sheet, about 30 minutes.
- Brush the buns with beaten egg and sprinkle your chosen topping.
- Bake in the middle of the oven at 250 ° C, 5-8 minutes.
- Allow to cool on a wire rack under a baking sheet.
-
-
@ e077f063:49dc180e
2024-11-29 09:10:15Инженеры Югорского госуниверситета протестировали роботов–оленей, прошитых чипом с искусственным интеллектом. Обновленная версия отличается системой хранения энергии — она позволяет роботам беспрерывно функционировать даже в 30-градусные морозы. О разработке «КиберХанты — 2040» рассказал профессор лаборатории ЮГУ Михаил Новиков.
«Мы использовали легкие и прочные материалы, чтобы добиться максимальной подвижности роботов. Модель оснастили экосистемой для сбора и хранения солнечной энергии, что позволит ей работать автономно в условиях сурового климата. Новые кибер–олени не будут разряжаться на морозе, как это было раньше», — прокомментировал Новиков.
Ученые также проработали функцию гибридного использования роботов–оленей с нартами. Механизм планируют использовать на главном стойбище ХМАО вовремя турсезонов. «Олени отлично справляются с ролью гида на стойбище. Благодаря искусственному интеллекту они могут подсказать туристам, как, например, заселиться в чум или зарегистрироваться на сеанс к шаману. Но из-за морозов они часто отключались — мы нашли способ решить эту проблему. Теперь они еще и совместимы с нартами. У туристов теперь новое развлечение появилось», — добавил собеседник агентства.
Прокатиться в нартах, запряженных новейшими роботами–оленями, туристы смогут после Нового года. Разработчики планируют запустить серийное производство моделей уже в декабре.
Первого робота–оленя в ХМАО изобрели еще в 2031 году — на год позже после запуска этностойбища в Самаровском Чугасе. Тогда они учились общаться с людьми с помощью искусственного интеллекта.
*Агентство выдуманное и является студенческим проектом. Новостная лента не содержит цели ввести читателя в заблуждение