-
@ f9cf4e94:96abc355
2024-12-31 20:18:59Scuttlebutt foi iniciado em maio de 2014 por Dominic Tarr ( dominictarr ) como uma rede social alternativa off-line, primeiro para convidados, que permite aos usuários obter controle total de seus dados e privacidade. Secure Scuttlebutt (ssb) foi lançado pouco depois, o que coloca a privacidade em primeiro plano com mais recursos de criptografia.
Se você está se perguntando de onde diabos veio o nome Scuttlebutt:
Este termo do século 19 para uma fofoca vem do Scuttlebutt náutico: “um barril de água mantido no convés, com um buraco para uma xícara”. A gíria náutica vai desde o hábito dos marinheiros de se reunir pelo boato até a fofoca, semelhante à fofoca do bebedouro.
Marinheiros se reunindo em torno da rixa. ( fonte )
Dominic descobriu o termo boato em um artigo de pesquisa que leu.
Em sistemas distribuídos, fofocar é um processo de retransmissão de mensagens ponto a ponto; as mensagens são disseminadas de forma análoga ao “boca a boca”.
Secure Scuttlebutt é um banco de dados de feeds imutáveis apenas para acréscimos, otimizado para replicação eficiente para protocolos ponto a ponto. Cada usuário tem um log imutável somente para acréscimos no qual eles podem gravar. Eles gravam no log assinando mensagens com sua chave privada. Pense em um feed de usuário como seu próprio diário de bordo, como um diário de bordo (ou diário do capitão para os fãs de Star Trek), onde eles são os únicos autorizados a escrever nele, mas têm a capacidade de permitir que outros amigos ou colegas leiam ao seu diário de bordo, se assim o desejarem.
Cada mensagem possui um número de sequência e a mensagem também deve fazer referência à mensagem anterior por seu ID. O ID é um hash da mensagem e da assinatura. A estrutura de dados é semelhante à de uma lista vinculada. É essencialmente um log somente de acréscimo de JSON assinado. Cada item adicionado a um log do usuário é chamado de mensagem.
Os logs do usuário são conhecidos como feed e um usuário pode seguir os feeds de outros usuários para receber suas atualizações. Cada usuário é responsável por armazenar seu próprio feed. Quando Alice assina o feed de Bob, Bob baixa o log de feed de Alice. Bob pode verificar se o registro do feed realmente pertence a Alice verificando as assinaturas. Bob pode verificar as assinaturas usando a chave pública de Alice.
Estrutura de alto nível de um feed
Pubs são servidores de retransmissão conhecidos como “super peers”. Pubs conectam usuários usuários e atualizações de fofocas a outros usuários conectados ao Pub. Um Pub é análogo a um pub da vida real, onde as pessoas vão para se encontrar e se socializar. Para ingressar em um Pub, o usuário deve ser convidado primeiro. Um usuário pode solicitar um código de convite de um Pub; o Pub simplesmente gerará um novo código de convite, mas alguns Pubs podem exigir verificação adicional na forma de verificação de e-mail ou, com alguns Pubs, você deve pedir um código em um fórum público ou chat. Pubs também podem mapear aliases de usuário, como e-mails ou nome de usuário, para IDs de chave pública para facilitar os pares de referência.
Depois que o Pub enviar o código de convite ao usuário, o usuário resgatará o código, o que significa que o Pub seguirá o usuário, o que permite que o usuário veja as mensagens postadas por outros membros do Pub, bem como as mensagens de retransmissão do Pub pelo usuário a outros membros do Pub.
Além de retransmitir mensagens entre pares, os Pubs também podem armazenar as mensagens. Se Alice estiver offline e Bob transmitir atualizações de feed, Alice perderá a atualização. Se Alice ficar online, mas Bob estiver offline, não haverá como ela buscar o feed de Bob. Mas com um Pub, Alice pode buscar o feed no Pub mesmo se Bob estiver off-line porque o Pub está armazenando as mensagens. Pubs são úteis porque assim que um colega fica online, ele pode sincronizar com o Pub para receber os feeds de seus amigos potencialmente offline.
Um usuário pode, opcionalmente, executar seu próprio servidor Pub e abri-lo ao público ou permitir que apenas seus amigos participem, se assim o desejarem. Eles também podem ingressar em um Pub público. Aqui está uma lista de Pubs públicos em que todos podem participar . Explicaremos como ingressar em um posteriormente neste guia. Uma coisa importante a observar é que o Secure Scuttlebutt em uma rede social somente para convidados significa que você deve ser “puxado” para entrar nos círculos sociais. Se você responder às mensagens, os destinatários não serão notificados, a menos que estejam seguindo você de volta. O objetivo do SSB é criar “ilhas” isoladas de redes pares, ao contrário de uma rede pública onde qualquer pessoa pode enviar mensagens a qualquer pessoa.
Perspectivas dos participantes
Scuttlebot
O software Pub é conhecido como servidor Scuttlebutt (servidor ssb ), mas também é conhecido como “Scuttlebot” e
sbot
na linha de comando. O servidor SSB adiciona comportamento de rede ao banco de dados Scuttlebutt (SSB). Estaremos usando o Scuttlebot ao longo deste tutorial.Os logs do usuário são conhecidos como feed e um usuário pode seguir os feeds de outros usuários para receber suas atualizações. Cada usuário é responsável por armazenar seu próprio feed. Quando Alice assina o feed de Bob, Bob baixa o log de feed de Alice. Bob pode verificar se o registro do feed realmente pertence a Alice verificando as assinaturas. Bob pode verificar as assinaturas usando a chave pública de Alice.
Estrutura de alto nível de um feed
Pubs são servidores de retransmissão conhecidos como “super peers”. Pubs conectam usuários usuários e atualizações de fofocas a outros usuários conectados ao Pub. Um Pub é análogo a um pub da vida real, onde as pessoas vão para se encontrar e se socializar. Para ingressar em um Pub, o usuário deve ser convidado primeiro. Um usuário pode solicitar um código de convite de um Pub; o Pub simplesmente gerará um novo código de convite, mas alguns Pubs podem exigir verificação adicional na forma de verificação de e-mail ou, com alguns Pubs, você deve pedir um código em um fórum público ou chat. Pubs também podem mapear aliases de usuário, como e-mails ou nome de usuário, para IDs de chave pública para facilitar os pares de referência.
Depois que o Pub enviar o código de convite ao usuário, o usuário resgatará o código, o que significa que o Pub seguirá o usuário, o que permite que o usuário veja as mensagens postadas por outros membros do Pub, bem como as mensagens de retransmissão do Pub pelo usuário a outros membros do Pub.
Além de retransmitir mensagens entre pares, os Pubs também podem armazenar as mensagens. Se Alice estiver offline e Bob transmitir atualizações de feed, Alice perderá a atualização. Se Alice ficar online, mas Bob estiver offline, não haverá como ela buscar o feed de Bob. Mas com um Pub, Alice pode buscar o feed no Pub mesmo se Bob estiver off-line porque o Pub está armazenando as mensagens. Pubs são úteis porque assim que um colega fica online, ele pode sincronizar com o Pub para receber os feeds de seus amigos potencialmente offline.
Um usuário pode, opcionalmente, executar seu próprio servidor Pub e abri-lo ao público ou permitir que apenas seus amigos participem, se assim o desejarem. Eles também podem ingressar em um Pub público. Aqui está uma lista de Pubs públicos em que todos podem participar . Explicaremos como ingressar em um posteriormente neste guia. Uma coisa importante a observar é que o Secure Scuttlebutt em uma rede social somente para convidados significa que você deve ser “puxado” para entrar nos círculos sociais. Se você responder às mensagens, os destinatários não serão notificados, a menos que estejam seguindo você de volta. O objetivo do SSB é criar “ilhas” isoladas de redes pares, ao contrário de uma rede pública onde qualquer pessoa pode enviar mensagens a qualquer pessoa.
Perspectivas dos participantes
Pubs - Hubs
Pubs públicos
| Pub Name | Operator | Invite Code | | ------------------------------------------------------------ | ------------------------------------------------------------ | ------------------------------------------------------------ | |
scuttle.us
| @Ryan |scuttle.us:8008:@WqcuCOIpLtXFRw/9vOAQJti8avTZ9vxT9rKrPo8qG6o=.ed25519~/ZUi9Chpl0g1kuWSrmehq2EwMQeV0Pd+8xw8XhWuhLE=
| | pub1.upsocial.com | @freedomrules |pub1.upsocial.com:8008:@gjlNF5Cyw3OKZxEoEpsVhT5Xv3HZutVfKBppmu42MkI=.ed25519~lMd6f4nnmBZEZSavAl4uahl+feajLUGqu8s2qdoTLi8=
| | Monero Pub | @Denis |xmr-pub.net:8008:@5hTpvduvbDyMLN2IdzDKa7nx7PSem9co3RsOmZoyyCM=.ed25519~vQU+r2HUd6JxPENSinUWdfqrJLlOqXiCbzHoML9iVN4=
| | FreeSocial | @Jarland |pub.freesocial.co:8008:@ofYKOy2p9wsaxV73GqgOyh6C6nRGFM5FyciQyxwBd6A=.ed25519~ye9Z808S3KPQsV0MWr1HL0/Sh8boSEwW+ZK+8x85u9w=
| |ssb.vpn.net.br
| @coffeverton |ssb.vpn.net.br:8008:@ze8nZPcf4sbdULvknEFOCbVZtdp7VRsB95nhNw6/2YQ=.ed25519~D0blTolH3YoTwSAkY5xhNw8jAOjgoNXL/+8ZClzr0io=
| | gossip.noisebridge.info | Noisebridge Hackerspace @james.network |gossip.noisebridge.info:8008:@2NANnQVdsoqk0XPiJG2oMZqaEpTeoGrxOHJkLIqs7eY=.ed25519~JWTC6+rPYPW5b5zCion0gqjcJs35h6JKpUrQoAKWgJ4=
|Pubs privados
Você precisará entrar em contato com os proprietários desses bares para receber um convite.
| Pub Name | Operator | Contact | | --------------------------------------------- | ------------------------------------------------------------ | ----------------------------------------------- | |
many.butt.nz
| @dinosaur | mikey@enspiral.com | |one.butt.nz
| @dinosaur | mikey@enspiral.com | |ssb.mikey.nz
| @dinosaur | mikey@enspiral.com | | ssb.celehner.com | @cel | cel@celehner.com |Pubs muito grandes
Aviso: embora tecnicamente funcione usar um convite para esses pubs, você provavelmente se divertirá se o fizer devido ao seu tamanho (muitas coisas para baixar, risco para bots / spammers / idiotas)
| Pub Name | Operator | Invite Code | | --------------------------------------- | ----------------------------------------------- | ------------------------------------------------------------ | |
scuttlebutt.de
| SolSoCoG |scuttlebutt.de:8008:@yeh/GKxlfhlYXSdgU7CRLxm58GC42za3tDuC4NJld/k=.ed25519~iyaCpZ0co863K9aF+b7j8BnnHfwY65dGeX6Dh2nXs3c=
| |Lohn's Pub
| @lohn |p.lohn.in:8018:@LohnKVll9HdLI3AndEc4zwGtfdF/J7xC7PW9B/JpI4U=.ed25519~z3m4ttJdI4InHkCtchxTu26kKqOfKk4woBb1TtPeA/s=
| | Scuttle Space | @guil-dot | Visit scuttle.space | |SSB PeerNet US-East
| timjrobinson |us-east.ssbpeer.net:8008:@sTO03jpVivj65BEAJMhlwtHXsWdLd9fLwyKAT1qAkc0=.ed25519~sXFc5taUA7dpGTJITZVDCRy2A9jmkVttsr107+ufInU=
| | Hermies | s | net:hermies.club:8008~shs:uMYDVPuEKftL4SzpRGVyQxLdyPkOiX7njit7+qT/7IQ=:SSB+Room+PSK3TLYC2T86EHQCUHBUHASCASE18JBV24= |GUI - Interface Gráfica do Utilizador(Usuário)
Patchwork - Uma GUI SSB (Descontinuado)
Patchwork é o aplicativo de mensagens e compartilhamento descentralizado construído em cima do SSB . O protocolo scuttlebutt em si não mantém um conjunto de feeds nos quais um usuário está interessado, então um cliente é necessário para manter uma lista de feeds de pares em que seu respectivo usuário está interessado e seguindo.
Fonte: scuttlebutt.nz
Quando você instala e executa o Patchwork, você só pode ver e se comunicar com seus pares em sua rede local. Para acessar fora de sua LAN, você precisa se conectar a um Pub. Um pub é apenas para convidados e eles retransmitem mensagens entre você e seus pares fora de sua LAN e entre outros Pubs.
Lembre-se de que você precisa seguir alguém para receber mensagens dessa pessoa. Isso reduz o envio de mensagens de spam para os usuários. Os usuários só veem as respostas das pessoas que seguem. Os dados são sincronizados no disco para funcionar offline, mas podem ser sincronizados diretamente com os pares na sua LAN por wi-fi ou bluetooth.
Patchbay - Uma GUI Alternativa
Patchbay é um cliente de fofoca projetado para ser fácil de modificar e estender. Ele usa o mesmo banco de dados que Patchwork e Patchfoo , então você pode facilmente dar uma volta com sua identidade existente.
Planetary - GUI para IOS
Planetary é um app com pubs pré-carregados para facilitar integração.
Manyverse - GUI para Android
Manyverse é um aplicativo de rede social com recursos que você esperaria: posts, curtidas, perfis, mensagens privadas, etc. Mas não está sendo executado na nuvem de propriedade de uma empresa, em vez disso, as postagens de seus amigos e todos os seus dados sociais vivem inteiramente em seu telefone .
Fontes
-
https://scuttlebot.io/
-
https://decentralized-id.com/decentralized-web/scuttlebot/#plugins
-
https://medium.com/@miguelmota/getting-started-with-secure-scuttlebut-e6b7d4c5ecfd
-
Secure Scuttlebutt : um protocolo de banco de dados global.
-
-
@ 6be5cc06:5259daf0
2024-12-29 19:54:14Um dos padrões mais bem estabelecidos ao medir a opinião pública é que cada geração tende a seguir um caminho semelhante em termos de política e ideologia geral. Seus membros compartilham das mesmas experiências formativas, atingem os marcos importantes da vida ao mesmo tempo e convivem nos mesmos espaços. Então, como devemos entender os relatórios que mostram que a Geração Z é hiperprogressista em certos assuntos, mas surpreendentemente conservadora em outros?
A resposta, nas palavras de Alice Evans, pesquisadora visitante na Universidade de Stanford e uma das principais estudiosas do tema, é que os jovens de hoje estão passando por um grande divergência de gênero, com as jovens mulheres do primeiro grupo e os jovens homens do segundo. A Geração Z representa duas gerações, e não apenas uma.
Em países de todos os continentes, surgiu um distanciamento ideológico entre jovens homens e mulheres. Milhões de pessoas que compartilham das mesmas cidades, locais de trabalho, salas de aula e até casas, não veem mais as coisas da mesma maneira.
Nos Estados Unidos, os dados da Gallup mostram que, após décadas em que os sexos estavam distribuídos de forma relativamente equilibrada entre visões políticas liberais e conservadoras, as mulheres entre 18 e 30 anos são agora 30 pontos percentuais mais liberais do que os homens dessa faixa etária. Essa diferença surgiu em apenas seis anos.
A Alemanha também apresenta um distanciamento de 30 pontos entre homens jovens conservadores e mulheres jovens progressistas, e no Reino Unido, a diferença é de 25 pontos. Na Polônia, no ano passado, quase metade dos homens entre 18 e 21 anos apoiou o partido de extrema direita Confederation, em contraste com apenas um sexto das jovens mulheres dessa mesma idade.
Fora do Ocidente, há divisões ainda mais acentuadas. Na Coreia do Sul, há um enorme abismo entre homens e mulheres jovens, e a situação é semelhante na China. Na África, a Tunísia apresenta o mesmo padrão. Vale notar que em todos os países essa divisão drástica ocorre principalmente entre a geração mais jovem, sendo muito menos pronunciada entre homens e mulheres na faixa dos 30 anos ou mais velhos.
O movimento # MeToo foi o principal estopim, trazendo à tona valores feministas intensos entre jovens mulheres que se sentiram empoderadas para denunciar injustiças de longa data. Esse estopim encontrou especialmente terreno fértil na Coreia do Sul, onde a desigualdade de gênero é bastante visível e a misoginia explícita é comum. (palavras da Financial Times, eu só traduzi)
Na eleição presidencial da Coreia do Sul em 2022, enquanto homens e mulheres mais velhos votaram de forma unificada, os jovens homens apoiaram fortemente o partido de direita People Power, enquanto as jovens mulheres apoiaram o partido liberal Democratic em números quase iguais e opostos.
A situação na Coreia é extrema, mas serve como um alerta para outros países sobre o que pode acontecer quando jovens homens e mulheres se distanciam. A sociedade está dividida, a taxa de casamento despencou e a taxa de natalidade caiu drasticamente, chegando a 0,78 filhos por mulher em 2022, o menor número no mundo todo.
Sete anos após a explosão inicial do movimento # MeToo, a divergência de gênero em atitudes tornou-se autossustentável.
Dados das pesquisas mostram que em muitos países, as diferenças ideológicas vão além dessa questão específica. A divisão progressista-conservadora sobre assédio sexual parece ter causado ou pelo menos faz parte de um alinhamento mais amplo, em que jovens homens e mulheres estão se organizando em grupos conservadores e liberais em outros assuntos.
Nos EUA, Reino Unido e Alemanha, as jovens mulheres agora adotam posturas mais liberais sobre temas como imigração e justiça racial, enquanto grupos etários mais velhos permanecem equilibrados. A tendência na maioria dos países tem sido de mulheres se inclinando mais para a esquerda, enquanto os homens permanecem estáveis. No entanto, há sinais de que os jovens homens estão se movendo para a direita na Alemanha, tornando-se mais críticos em relação à imigração e se aproximando do partido de extrema direita AfD nos últimos anos.
Seria fácil dizer que tudo isso é apenas uma fase passageira, mas os abismos ideológicos apenas crescem, e os dados mostram que as experiências políticas formativas das pessoas são difíceis de mudar. Tudo isso é agravado pelo fato de que o aumento dos smartphones e das redes sociais faz com que os jovens homens e mulheres agora vivam em espaços separados e tenham culturas distintas.
As opiniões dos jovens frequentemente são ignoradas devido à baixa participação política, mas essa mudança pode deixar consequências duradouras, impactando muito mais do que apenas os resultados das eleições.
Retirado de: https://www.ft.com/content/29fd9b5c-2f35-41bf-9d4c-994db4e12998
-
@ 6f3670d9:03f04036
2024-12-29 08:20:22Disclaimer: - This will void your warranty - There might be differences between the Bitaxe and the Lucky Miner that might not cause issues or damage immediately, but might manifest long-term - Proceed at your own risk
A Different Pickaxe
You live in a place where it's difficult to get a Bitaxe. You have access to AliExpress. You look around. You find something called the "Lucky Miner LV06". A Bitaxe clone that uses the same mining chip as the Bitaxe Ultra (BM1366 ASIC). You buy one.
You plug it in, you enter your wallet address and other settings, and it starts mining. It works! Great!
But it's running a customized firmware. It's not AxeOS. Maybe there's something shady in the stock firmware. It's not open-source, after all. Also, AxeOS looks amazing... And that automatic pool fail-over feature is handy.
You think to yourself: "Maybe I can use the Bitaxe firmware on this?". Guess what? You're right!
Flashing From Web UI
What usually works for me is to: - Download the Bitaxe firmware files (
esp-miner.bin
andwww.bin
) from GitHub (here). Version 2.4.1 seems to work well, as of this writing. - Then from the Lucky Miner web interface, upload the "Website" (www.bin
) file. - Wait for a minute or two after it's done uploading. - Upload the "Firmware" (esp-miner.bin
) file. - Wait another minute or two. - Unplug the power and plug it back in. - Set the "Core Voltage" and "Frequency" to the defaults. - Unplug the power and plug it back in again.If you're lucky (no pun intended), you'll have a working Lucky Miner with AxeOS. Update the settings and mine away!
However, often times I've been unlucky, like what happened while I was writing this article, ironically. The miner malfunctions for no obvious reason. It keeps rebooting, or it's not mining (zero/low hashrate), or the web interface is inaccessible. You name it.
The miner has become a "brick". How do you "unbrick" it?
When you brick a Bitaxe, you can recover it by flashing (uploading) a "Factory Image". The Bitaxe has a USB port that makes this easy. Follow the guide and it should come back to life again. Unfortunately, the Lucky Miner LV06 doesn't have a USB port. It has a serial port, though. We'll have to get our hands a bit dirty.
Flashing Using the Serial Port
We need to connect the serial port of the miner to a computer and run a program to flash (upload) the firmware file on the miner. Any 3.3v UART serial port should be sufficient. Unfortunately, PCs don't usually come with a UART serial port these days, let alone a 3.3v one. The serial port common in old computers is an RS-232 port, which will most probably fry your miner if you try to connect it directly. Beware.
In my case, as a serial port for my PC, I'm using an Arduino Due I had lying around. We connect it to the PC through USB, and on the other side we connect a few wires to the miner, which gives the PC access to the miner.
WARNING: Make sure your serial port is 3.3v or you will probably kill the miner. Arduino Uno is 5v not 3.3v, for example, and cannot be used for this.
Wiring
First, we need to open the Lucky Miner. Use a small flat screwdriver to gently push the two plastic clips shown in the picture below. Gently pry the top cover away from the bottom cover on the clips side first, then remove the other side. Be careful not to break the display cable.
Once the cover is off, you can find the miner's serial port in the top right corner (J10), as shown in the next picture. We'll also need the reset button (EN).
There are three screws holding the PCB and the bottom cover together. If you're confident in your ability to push the small button on the underside of the PCB with the bottom cover on, then no need to remove these. The following picture shows what we need from that side.
And the next picture shows the pins and USB port we will use from the Arduino.
Now, we need to connect: - The USB port on the Arduino labelled "programming" to the PC - Pin 18 (TX1) on the Arduino to J10 through-hole pad 5 (blue dot) - Pin 19 (RX1) on the Arduino to J10 through-hole pad 3 (green dot) - Any GND pin on the Arduino to J10 through-hole pad 4 (yellow dot)
I didn't need to solder the wires to the pads. Keeping everything stable, perhaps by putting a weight on the wires or a bit of tape, was sufficient in all my attempts.
Setting up the Arduino
To use the Arduino as a serial port for our PC, we'll have to make it pass-through data back and forth between the USB port and UART1, where we connected the miner.
The following steps are all done on a PC running Debian Linux (Bookworm), in the spirit of freedom and open-source.
First, we start the Arduino IDE. If the package for the Arduino Due board is not already installed, you'll see a small prompt at the bottom. Click "Install this package".
Click the "Install" button.
Once the package is installed, click "Close".
Next, we select the Due board. Click the "Tools" menu, select "Board", select "Arduino ARM (32-bits) Boards" and click "Arduino Due (Programming Port)"
Next, we select the port. Click the "Tools" menu again, select "Port", and click the port where the Arduino is connected. In my case it was "/dev/ttyACM0".
Now we need to upload the following code to the Arduino board. The code is actually the "SerialPassthrough" example from the IDE, but with the serial speed changed to match the miner.
``` void setup() { Serial.begin(115200); Serial1.begin(115200); }
void loop() { if (Serial.available()) { // If anything comes in Serial (USB), Serial1.write(Serial.read()); // read it and send it out Serial1 }
if (Serial1.available()) { // If anything comes in Serial1 Serial.write(Serial1.read()); // read it and send it out Serial (USB) } } ```
Copy/paste the code into the IDE and click upload. You'll see "Done uploading" at the bottom.
Next we'll test if we're receiving data from the miner. We start by opening the "Serial Monitor" from the "Tools" menu in the IDE. Then we change the baudrate to 115200.
Set the Arduino and the miner in a comfortable position, make sure the wires are held in place and got a good contact on both sides, and the power is plugged in.
Now we'll put the miner in "download" mode. Press and hold the button on the underside (K1), press and release the reset button (EN), then release the other button (K1).
You should see some text from the miner in the serial monitor window, like in the picture below.
Congratulations! We know we're able to receive data from the miner now. We're not sure transmit is working, but we'll find out when we try to flash.
Flashing Using the Serial Port, for Real
To flash the Lucky Miner we'll need a software tool named esptool and the factory image firmware file.
I usually use "esp-miner-factory-205-v2.1.8.bin" for the factory image (this one) as a base, and then flash the version I want from the Web UI, using the steps I mentioned earlier.
For esptool, the documentation (here) shows us how to install it. To make things a little easier on our Debian Linux system, we'll use pipx instead of pip. The instructions below are adapted for that.
First we make sure pipx is installed. Run this command in a terminal and follow the instructions:
sudo apt-get install pipx
Then we install esptool using pipx. Run the following in a terminal:
pipx install esptool
The output will be something like this:
user@pc:~$ pipx install esptool installed package esptool 4.8.1, installed using Python 3.11.2 These apps are now globally available - esp_rfc2217_server.py - espefuse.py - espsecure.py - esptool.py ⚠️ Note: '/home/user/.local/bin' is not on your PATH environment variable. These apps will not be globally accessible until your PATH is updated. Run `pipx ensurepath` to automatically add it, or manually modify your PATH in your shell's config file (i.e. ~/.bashrc). done! ✨ 🌟 ✨
We can see pipx telling us we won't be able to run our tool because the folder where it was installed is not in the PATH variable. To fix that, we can follow pipx instructions and run:
pipx ensurepath
And we'll see something like this:
``` user@pc:~$ pipx ensurepath Success! Added /home/user/.local/bin to the PATH environment variable.
Consider adding shell completions for pipx. Run 'pipx completions' for instructions.
You will need to open a new terminal or re-login for the PATH changes to take effect.
Otherwise pipx is ready to go! ✨ 🌟 ✨ ```
Now, close the terminal and re-open it so that esptool becomes available.
Finally, to actually flash the miner, put the miner in download mode, then in the following command change the port ("/dev/ttyACM0") to your serial port, as we've seen earlier, and the file path to where your firmware file is, and run it:
esptool.py -p /dev/ttyACM0 --baud 115200 write_flash --erase-all 0x0 ~/Downloads/esp-miner-factory-205-v2.1.8.bin
If everything went fine, the tool will take a few minutes to flash the firmware to the miner. You'll see something like this in the output:
``` user@pc:~$ esptool.py -p /dev/ttyACM0 --baud 115200 write_flash --erase-all 0x0 ~/Downloads/esp-miner-factory-205-v2.1.8.bin esptool.py v4.8.1 Serial port /dev/ttyACM0 Connecting..... Detecting chip type... ESP32-S3 Chip is ESP32-S3 (QFN56) (revision v0.2) Features: WiFi, BLE, Embedded PSRAM 8MB (AP_3v3) Crystal is 40MHz MAC: 3c:84:27:ba:be:01 Uploading stub... Running stub... Stub running... Configuring flash size... Erasing flash (this may take a while)... Chip erase completed successfully in 9.5s Compressed 15802368 bytes to 1320190... Wrote 15802368 bytes (1320190 compressed) at 0x00000000 in 152.1 seconds (effective 831.2 kbit/s)... Hash of data verified.
Leaving... Hard resetting via RTS pin... ```
And we're done! Hopefully the miner will be recovered now.
Hope this helps!
Stay humble,
dumb-packageA Warning About Beta Versions of AxeOS
For reasons unknown to me, while I was writing this article I wanted to try the testing version of AxeOS, which was v2.4.1b (beta). Flashing from Web UI went smooth, but the miner stopped mining. I flashed back to v2.1.8 using the serial port, a known good version for me, but it wouldn't mine, still.
Thankfully, v2.4.1 was released recently, and flashing it from the Web UI magically revived my miner. So, be warned.
Bonus: File Hashes
For convenience, these are the SHA256 hashes of the files I used in this article: ``` da24fceb246f3b8b4dd94e5143f17bd38e46e5285e807ebd51627cb08f665c0a ESP-Miner-v2.4.1/esp-miner.bin 16c5c671391f0e3e88a3e79ce33fad3b0ec232b8572fad5e1e0d1ad3251ab394 ESP-Miner-v2.4.1/www.bin
d5182a15b6fa21d7b9b31bff2026d30afed9d769781a48db914730a5751e20c6 esp-miner-factory-205-v2.1.8.bin ```
-
@ 6f3670d9:03f04036
2024-12-29 06:51:25This is my first long-form post. The starting line.
There's nothing of value here. Just using this as a marker.
I hope to post a lot more. Documenting how I made something work would be very useful to me, and hopefully others, but I've been too lazy to do that. Wish me luck!
Stay humble,
dumb-package -
@ 9f94e6cc:f3472946
2024-11-21 18:55:12Der Entartungswettbewerb TikTok hat die Jugend im Griff und verbrutzelt ihre Hirne. Über Reels, den Siegeszug des Hochformats und die Regeln der Viralität.
Text: Aron Morhoff
Hollywood steckt heute in der Hosentasche. 70 Prozent aller YouTube-Inhalte werden auf mobilen Endgeräten, also Smartphones, geschaut. Instagram und TikTok sind die angesagtesten Anwendungen für junge Menschen. Es gibt sie nur noch als App, und ihr Design ist für Mobiltelefone optimiert.
Einst waren Rechner und Laptops die Tools, mit denen ins Internet gegangen wurde. Auch als das Smartphone seinen Siegeszug antrat, waren die Sehgewohnheiten noch auf das Querformat ausgerichtet. Heute werden Rechner fast nur noch zum Arbeiten verwendet. Das Berieseln, die Unterhaltung, das passive Konsumieren hat sich vollständig auf die iPhones und Samsungs dieser Welt verlagert. Das Telefon hat den aufrechten Gang angenommen, kaum einer mehr hält sein Gerät waagerecht.
Homo Digitalis Erectus
Die Welt steht also Kopf. Die Form eines Mediums hat Einfluss auf den Inhalt. Marshall McLuhan formulierte das so: Das Medium selbst ist die Botschaft. Ja mei, mag sich mancher denken, doch medienanthropologisch ist diese Entwicklung durchaus eine Betrachtung wert. Ein Querformat eignet sich besser, um Landschaften, einen Raum oder eine Gruppe abzubilden. Das Hochformat entspricht grob den menschlichen Maßen von der Hüfte bis zum Kopf. Der TikTok-Tanz ist im Smartphone-Design also schon angelegt. Das Hochformat hat die Medieninhalte unserer Zeit noch narzisstischer gemacht.
Dass wir uns durch Smartphones freizügiger und enthemmter zur Schau stellen, ist bekannt. 2013 wurde „Selfie“ vom Oxford English Dictionary zum Wort des Jahres erklärt. Selfie, Selbstporträt, Selbstdarstellung.
Neu ist der Aufwand, der heute vonnöten ist, um die Aufmerksamkeitsschwelle der todamüsierten Mediengesellschaft überhaupt noch zu durchbrechen. In beängstigender Hypnose erwischt man viele Zeitgenossen inzwischen beim Doomscrollen. Das ist der Fachbegriff für das weggetretene Endloswischen und erklärt auch den Namen „Reel“: Der Begriff, im Deutschen verwandt mit „Rolle“, beschreibt die Filmrolle, von der 24 Bilder pro Sekunde auf den Projektor gewischt oder eben abgespult werden.
Länger als drei Sekunden darf ein Kurzvideo deshalb nicht mehr gehen, ohne dass etwas Aufregendes passiert. Sonst wird das Reel aus Langeweile weggewischt. Die Welt im Dopamin-Rausch. Für den Ersteller eines Videos heißt das inzwischen: Sei der lauteste, schrillste, gestörteste Marktschreier. Das Wettrennen um die Augäpfel zwingt zu extremen Formen von Clickbait.
15 Sekunden Ruhm
Das nimmt inzwischen skurrile Formen an. Das Video „Look who I found“ von Noel Robinson (geboren 2001) war im letzten Jahr einer der erfolgreichsten deutschen TikTok-Clips. Man sieht den Deutsch-Nigerianer beim Antanzen eines karikaturartig übergewichtigen Menschen. Noel wird geschubst und fällt. Daraufhin wechselt das Lied – und der fette Mann bewegt seinen Schwabbelbauch im Takt. Noel steht wieder auf, grinst, beide tanzen gemeinsam. Das dauert 15 Sekunden. Ich rate Ihnen, sich das Video einmal anzuschauen, um die Mechanismen von TikTok zu verstehen. Achten Sie alleine darauf, wie vielen Reizen (Menschenmenge, Antanzen, Sturz, Schwabbelbauch) Sie in den ersten fünf Sekunden ausgesetzt sind. Wer schaut so was? Bis dato 220 Millionen Menschen. Das ist kapitalistische Verwertungslogik im bereits verwesten Endstadium. Adorno oder Fromm hätten am Medienzeitgeist entweder ihre Freude oder mächtig zu knabbern.
Die Internet- und Smartphoneabdeckung beträgt mittlerweile fast 100 Prozent. Das Überangebot hat die Regeln geändert. Um überhaupt gesehen zu werden, muss man heute viral gehen. Was dafür inzwischen nötig ist, spricht die niedrigsten Bedürfnisse des Menschen an: Gewalt, Ekel, Sexualisierung, Schock. Die jungen Erwachsenen, die heute auf sozialen Netzwerken den Ton angeben, haben diese Mechanismen längst verinnerlicht. Wie bewusst ihnen das ist, ist fraglich. 2024 prallt eine desaströse Bildungssituation samt fehlender Medienkompetenz auf eine egomanische Jugend, die Privatsphäre nie gekannt hat und seit Kindesbeinen alles in den Äther ballert, was es festhalten kann. Man muss kein Kulturpessimist sein, um diese degenerative Dynamik, auch in ihrer Implikation für unser Zusammenleben und das psychische Wohlergehen der Generation TikTok, als beängstigend zu bezeichnen.
Aron Morhoff studierte Medienethik und ist Absolvent der Freien Akademie für Medien & Journalismus. Frühere Stationen: RT Deutsch und Nuoviso. Heute: Stichpunkt Magazin, Manova, Milosz Matuschek und seine Liveshow "Addictive Programming".
-
@ d9e9fb27:d5fe5e1a
2025-01-02 16:31:34Colmar is a well known city in the region of Alsace, France. Its characteristic buildings, the narrow streets and the small river flowing through are worldwide famous.
However, it is during Christmas that the city gets the most attention. Thousands of people from all over Europe decide to spend one of the Advent weekends to wander around this beautiful city and hundreds of little wooden huts.
In fact, this town becomes a small Christmas village, with decorations and lights on every building and the famous Christmas market covering every possible inch of it.
Walking around this city really makes you feel the Christmas Spirit!
Of course, it can get really cold during this time of the year. That is why Alsatians wander around drinking the Vin Chaud (literally "Hot Wine"). This beverage is prepared by mixing sugar, various spices, such as cinnamon and cloves, and red wine. They are served in a plastic glass, which can be reused multpiple time or returned for a couple of Euros. However, every year the glass is designed differently, so many people keep it with them as a collectible!
Here is 2024 version:
This is the first time I try to do a photography reportage of the places I visit. I really hope you enjoyed it!Let me know what you think, every feedback is appreciated.
I will try to create more of them during my trips, so stay tuned!
Tuma
-
@ eac63075:b4988b48
2024-11-09 17:57:27Based on a recent paper that included collaboration from renowned experts such as Lynn Alden, Steve Lee, and Ren Crypto Fish, we discuss in depth how Bitcoin's consensus is built, the main risks, and the complex dynamics of protocol upgrades.
Podcast https://www.fountain.fm/episode/wbjD6ntQuvX5u2G5BccC
Presentation https://gamma.app/docs/Analyzing-Bitcoin-Consensus-Risks-in-Protocol-Upgrades-p66axxjwaa37ksn
1. Introduction to Consensus in Bitcoin
Consensus in Bitcoin is the foundation that keeps the network secure and functional, allowing users worldwide to perform transactions in a decentralized manner without the need for intermediaries. Since its launch in 2009, Bitcoin is often described as an "immutable" system designed to resist changes, and it is precisely this resistance that ensures its security and stability.
The central idea behind consensus in Bitcoin is to create a set of acceptance rules for blocks and transactions, ensuring that all network participants agree on the transaction history. This prevents "double-spending," where the same bitcoin could be used in two simultaneous transactions, something that would compromise trust in the network.
Evolution of Consensus in Bitcoin
Over the years, consensus in Bitcoin has undergone several adaptations, and the way participants agree on changes remains a delicate process. Unlike traditional systems, where changes can be imposed from the top down, Bitcoin operates in a decentralized model where any significant change needs the support of various groups of stakeholders, including miners, developers, users, and large node operators.
Moreover, the update process is extremely cautious, as hasty changes can compromise the network's security. As a result, the philosophy of "don't fix what isn't broken" prevails, with improvements happening incrementally and only after broad consensus among those involved. This model can make progress seem slow but ensures that Bitcoin remains faithful to the principles of security and decentralization.
2. Technical Components of Consensus
Bitcoin's consensus is supported by a set of technical rules that determine what is considered a valid transaction and a valid block on the network. These technical aspects ensure that all nodes—the computers that participate in the Bitcoin network—agree on the current state of the blockchain. Below are the main technical components that form the basis of the consensus.
Validation of Blocks and Transactions
The validation of blocks and transactions is the central point of consensus in Bitcoin. A block is only considered valid if it meets certain criteria, such as maximum size, transaction structure, and the solving of the "Proof of Work" problem. The proof of work, required for a block to be included in the blockchain, is a computational process that ensures the block contains significant computational effort—protecting the network against manipulation attempts.
Transactions, in turn, need to follow specific input and output rules. Each transaction includes cryptographic signatures that prove the ownership of the bitcoins sent, as well as validation scripts that verify if the transaction conditions are met. This validation system is essential for network nodes to autonomously confirm that each transaction follows the rules.
Chain Selection
Another fundamental technical issue for Bitcoin's consensus is chain selection, which becomes especially important in cases where multiple versions of the blockchain coexist, such as after a network split (fork). To decide which chain is the "true" one and should be followed, the network adopts the criterion of the highest accumulated proof of work. In other words, the chain with the highest number of valid blocks, built with the greatest computational effort, is chosen by the network as the official one.
This criterion avoids permanent splits because it encourages all nodes to follow the same main chain, reinforcing consensus.
Soft Forks vs. Hard Forks
In the consensus process, protocol changes can happen in two ways: through soft forks or hard forks. These variations affect not only the protocol update but also the implications for network users:
-
Soft Forks: These are changes that are backward compatible. Only nodes that adopt the new update will follow the new rules, but old nodes will still recognize the blocks produced with these rules as valid. This compatibility makes soft forks a safer option for updates, as it minimizes the risk of network division.
-
Hard Forks: These are updates that are not backward compatible, requiring all nodes to update to the new version or risk being separated from the main chain. Hard forks can result in the creation of a new coin, as occurred with the split between Bitcoin and Bitcoin Cash in 2017. While hard forks allow for deeper changes, they also bring significant risks of network fragmentation.
These technical components form the base of Bitcoin's security and resilience, allowing the system to remain functional and immutable without losing the necessary flexibility to evolve over time.
3. Stakeholders in Bitcoin's Consensus
Consensus in Bitcoin is not decided centrally. On the contrary, it depends on the interaction between different groups of stakeholders, each with their motivations, interests, and levels of influence. These groups play fundamental roles in how changes are implemented or rejected on the network. Below, we explore the six main stakeholders in Bitcoin's consensus.
1. Economic Nodes
Economic nodes, usually operated by exchanges, custody providers, and large companies that accept Bitcoin, exert significant influence over consensus. Because they handle large volumes of transactions and act as a connection point between the Bitcoin ecosystem and the traditional financial system, these nodes have the power to validate or reject blocks and to define which version of the software to follow in case of a fork.
Their influence is proportional to the volume of transactions they handle, and they can directly affect which chain will be seen as the main one. Their incentive is to maintain the network's stability and security to preserve its functionality and meet regulatory requirements.
2. Investors
Investors, including large institutional funds and individual Bitcoin holders, influence consensus indirectly through their impact on the asset's price. Their buying and selling actions can affect Bitcoin's value, which in turn influences the motivation of miners and other stakeholders to continue investing in the network's security and development.
Some institutional investors have agreements with custodians that may limit their ability to act in network split situations. Thus, the impact of each investor on consensus can vary based on their ownership structure and how quickly they can react to a network change.
3. Media Influencers
Media influencers, including journalists, analysts, and popular personalities on social media, have a powerful role in shaping public opinion about Bitcoin and possible updates. These influencers can help educate the public, promote debates, and bring transparency to the consensus process.
On the other hand, the impact of influencers can be double-edged: while they can clarify complex topics, they can also distort perceptions by amplifying or minimizing change proposals. This makes them a force both of support and resistance to consensus.
4. Miners
Miners are responsible for validating transactions and including blocks in the blockchain. Through computational power (hashrate), they also exert significant influence over consensus decisions. In update processes, miners often signal their support for a proposal, indicating that the new version is safe to use. However, this signaling is not always definitive, and miners can change their position if they deem it necessary.
Their incentive is to maximize returns from block rewards and transaction fees, as well as to maintain the value of investments in their specialized equipment, which are only profitable if the network remains stable.
5. Protocol Developers
Protocol developers, often called "Core Developers," are responsible for writing and maintaining Bitcoin's code. Although they do not have direct power over consensus, they possess an informal veto power since they decide which changes are included in the main client (Bitcoin Core). This group also serves as an important source of technical knowledge, helping guide decisions and inform other stakeholders.
Their incentive lies in the continuous improvement of the network, ensuring security and decentralization. Many developers are funded by grants and sponsorships, but their motivations generally include a strong ideological commitment to Bitcoin's principles.
6. Users and Application Developers
This group includes people who use Bitcoin in their daily transactions and developers who build solutions based on the network, such as wallets, exchanges, and payment platforms. Although their power in consensus is less than that of miners or economic nodes, they play an important role because they are responsible for popularizing Bitcoin's use and expanding the ecosystem.
If application developers decide not to adopt an update, this can affect compatibility and widespread acceptance. Thus, they indirectly influence consensus by deciding which version of the protocol to follow in their applications.
These stakeholders are vital to the consensus process, and each group exerts influence according to their involvement, incentives, and ability to act in situations of change. Understanding the role of each makes it clearer how consensus is formed and why it is so difficult to make significant changes to Bitcoin.
4. Mechanisms for Activating Updates in Bitcoin
For Bitcoin to evolve without compromising security and consensus, different mechanisms for activating updates have been developed over the years. These mechanisms help coordinate changes among network nodes to minimize the risk of fragmentation and ensure that updates are implemented in an orderly manner. Here, we explore some of the main methods used in Bitcoin, their advantages and disadvantages, as well as historical examples of significant updates.
Flag Day
The Flag Day mechanism is one of the simplest forms of activating changes. In it, a specific date or block is determined as the activation moment, and all nodes must be updated by that point. This method does not involve prior signaling; participants simply need to update to the new software version by the established day or block.
-
Advantages: Simplicity and predictability are the main benefits of Flag Day, as everyone knows the exact activation date.
-
Disadvantages: Inflexibility can be a problem because there is no way to adjust the schedule if a significant part of the network has not updated. This can result in network splits if a significant number of nodes are not ready for the update.
An example of Flag Day was the Pay to Script Hash (P2SH) update in 2012, which required all nodes to adopt the change to avoid compatibility issues.
BIP34 and BIP9
BIP34 introduced a more dynamic process, in which miners increase the version number in block headers to signal the update. When a predetermined percentage of the last blocks is mined with this new version, the update is automatically activated. This model later evolved with BIP9, which allowed multiple updates to be signaled simultaneously through "version bits," each corresponding to a specific change.
-
Advantages: Allows the network to activate updates gradually, giving more time for participants to adapt.
-
Disadvantages: These methods rely heavily on miner support, which means that if a sufficient number of miners do not signal the update, it can be delayed or not implemented.
BIP9 was used in the activation of SegWit (BIP141) but faced challenges because some miners did not signal their intent to activate, leading to the development of new mechanisms.
User Activated Soft Forks (UASF) and User Resisted Soft Forks (URSF)
To increase the decision-making power of ordinary users, the concept of User Activated Soft Fork (UASF) was introduced, allowing node operators, not just miners, to determine consensus for a change. In this model, nodes set a date to start rejecting blocks that are not in compliance with the new update, forcing miners to adapt or risk having their blocks rejected by the network.
URSF, in turn, is a model where nodes reject blocks that attempt to adopt a specific update, functioning as resistance against proposed changes.
-
Advantages: UASF returns decision-making power to node operators, ensuring that changes do not depend solely on miners.
-
Disadvantages: Both UASF and URSF can generate network splits, especially in cases of strong opposition among different stakeholders.
An example of UASF was the activation of SegWit in 2017, where users supported activation independently of miner signaling, which ended up forcing its adoption.
BIP8 (LOT=True)
BIP8 is an evolution of BIP9, designed to prevent miners from indefinitely blocking a change desired by the majority of users and developers. BIP8 allows setting a parameter called "lockinontimeout" (LOT) as true, which means that if the update has not been fully signaled by a certain point, it is automatically activated.
-
Advantages: Ensures that changes with broad support among users are not blocked by miners who wish to maintain the status quo.
-
Disadvantages: Can lead to network splits if miners or other important stakeholders do not support the update.
Although BIP8 with LOT=True has not yet been used in Bitcoin, it is a proposal that can be applied in future updates if necessary.
These activation mechanisms have been essential for Bitcoin's development, allowing updates that keep the network secure and functional. Each method brings its own advantages and challenges, but all share the goal of preserving consensus and network cohesion.
5. Risks and Considerations in Consensus Updates
Consensus updates in Bitcoin are complex processes that involve not only technical aspects but also political, economic, and social considerations. Due to the network's decentralized nature, each change brings with it a set of risks that need to be carefully assessed. Below, we explore some of the main challenges and future scenarios, as well as the possible impacts on stakeholders.
Network Fragility with Alternative Implementations
One of the main risks associated with consensus updates is the possibility of network fragmentation when there are alternative software implementations. If an update is implemented by a significant group of nodes but rejected by others, a network split (fork) can occur. This creates two competing chains, each with a different version of the transaction history, leading to unpredictable consequences for users and investors.
Such fragmentation weakens Bitcoin because, by dividing hashing power (computing) and coin value, it reduces network security and investor confidence. A notable example of this risk was the fork that gave rise to Bitcoin Cash in 2017 when disagreements over block size resulted in a new chain and a new asset.
Chain Splits and Impact on Stakeholders
Chain splits are a significant risk in update processes, especially in hard forks. During a hard fork, the network is split into two separate chains, each with its own set of rules. This results in the creation of a new coin and leaves users with duplicated assets on both chains. While this may seem advantageous, in the long run, these splits weaken the network and create uncertainties for investors.
Each group of stakeholders reacts differently to a chain split:
-
Institutional Investors and ETFs: Face regulatory and compliance challenges because many of these assets are managed under strict regulations. The creation of a new coin requires decisions to be made quickly to avoid potential losses, which may be hampered by regulatory constraints.
-
Miners: May be incentivized to shift their computing power to the chain that offers higher profitability, which can weaken one of the networks.
-
Economic Nodes: Such as major exchanges and custody providers, have to quickly choose which chain to support, influencing the perceived value of each network.
Such divisions can generate uncertainties and loss of value, especially for institutional investors and those who use Bitcoin as a store of value.
Regulatory Impacts and Institutional Investors
With the growing presence of institutional investors in Bitcoin, consensus changes face new compliance challenges. Bitcoin ETFs, for example, are required to follow strict rules about which assets they can include and how chain split events should be handled. The creation of a new asset or migration to a new chain can complicate these processes, creating pressure for large financial players to quickly choose a chain, affecting the stability of consensus.
Moreover, decisions regarding forks can influence the Bitcoin futures and derivatives market, affecting perception and adoption by new investors. Therefore, the need to avoid splits and maintain cohesion is crucial to attract and preserve the confidence of these investors.
Security Considerations in Soft Forks and Hard Forks
While soft forks are generally preferred in Bitcoin for their backward compatibility, they are not without risks. Soft forks can create different classes of nodes on the network (updated and non-updated), which increases operational complexity and can ultimately weaken consensus cohesion. In a network scenario with fragmentation of node classes, Bitcoin's security can be affected, as some nodes may lose part of the visibility over updated transactions or rules.
In hard forks, the security risk is even more evident because all nodes need to adopt the new update to avoid network division. Experience shows that abrupt changes can create temporary vulnerabilities, in which malicious agents try to exploit the transition to attack the network.
Bounty Claim Risks and Attack Scenarios
Another risk in consensus updates are so-called "bounty claims"—accumulated rewards that can be obtained if an attacker manages to split or deceive a part of the network. In a conflict scenario, a group of miners or nodes could be incentivized to support a new update or create an alternative version of the software to benefit from these rewards.
These risks require stakeholders to carefully assess each update and the potential vulnerabilities it may introduce. The possibility of "bounty claims" adds a layer of complexity to consensus because each interest group may see a financial opportunity in a change that, in the long term, may harm network stability.
The risks discussed above show the complexity of consensus in Bitcoin and the importance of approaching it gradually and deliberately. Updates need to consider not only technical aspects but also economic and social implications, in order to preserve Bitcoin's integrity and maintain trust among stakeholders.
6. Recommendations for the Consensus Process in Bitcoin
To ensure that protocol changes in Bitcoin are implemented safely and with broad support, it is essential that all stakeholders adopt a careful and coordinated approach. Here are strategic recommendations for evaluating, supporting, or rejecting consensus updates, considering the risks and challenges discussed earlier, along with best practices for successful implementation.
1. Careful Evaluation of Proposal Maturity
Stakeholders should rigorously assess the maturity level of a proposal before supporting its implementation. Updates that are still experimental or lack a robust technical foundation can expose the network to unnecessary risks. Ideally, change proposals should go through an extensive testing phase, have security audits, and receive review and feedback from various developers and experts.
2. Extensive Testing in Secure and Compatible Networks
Before an update is activated on the mainnet, it is essential to test it on networks like testnet and signet, and whenever possible, on other compatible networks that offer a safe and controlled environment to identify potential issues. Testing on networks like Litecoin was fundamental for the safe launch of innovations like SegWit and the Lightning Network, allowing functionalities to be validated on a lower-impact network before being implemented on Bitcoin.
The Liquid Network, developed by Blockstream, also plays an important role as an experimental network for new proposals, such as OP_CAT. By adopting these testing environments, stakeholders can mitigate risks and ensure that the update is reliable and secure before being adopted by the main network.
3. Importance of Stakeholder Engagement
The success of a consensus update strongly depends on the active participation of all stakeholders. This includes economic nodes, miners, protocol developers, investors, and end users. Lack of participation can lead to inadequate decisions or even future network splits, which would compromise Bitcoin's security and stability.
4. Key Questions for Evaluating Consensus Proposals
To assist in decision-making, each group of stakeholders should consider some key questions before supporting a consensus change:
- Does the proposal offer tangible benefits for Bitcoin's security, scalability, or usability?
- Does it maintain backward compatibility or introduce the risk of network split?
- Are the implementation requirements clear and feasible for each group involved?
- Are there clear and aligned incentives for all stakeholder groups to accept the change?
5. Coordination and Timing in Implementations
Timing is crucial. Updates with short activation windows can force a split because not all nodes and miners can update simultaneously. Changes should be planned with ample deadlines to allow all stakeholders to adjust their systems, avoiding surprises that could lead to fragmentation.
Mechanisms like soft forks are generally preferable to hard forks because they allow a smoother transition. Opting for backward-compatible updates when possible facilitates the process and ensures that nodes and miners can adapt without pressure.
6. Continuous Monitoring and Re-evaluation
After an update, it's essential to monitor the network to identify problems or side effects. This continuous process helps ensure cohesion and trust among all participants, keeping Bitcoin as a secure and robust network.
These recommendations, including the use of secure networks for extensive testing, promote a collaborative and secure environment for Bitcoin's consensus process. By adopting a deliberate and strategic approach, stakeholders can preserve Bitcoin's value as a decentralized and censorship-resistant network.
7. Conclusion
Consensus in Bitcoin is more than a set of rules; it's the foundation that sustains the network as a decentralized, secure, and reliable system. Unlike centralized systems, where decisions can be made quickly, Bitcoin requires a much more deliberate and cooperative approach, where the interests of miners, economic nodes, developers, investors, and users must be considered and harmonized. This governance model may seem slow, but it is fundamental to preserving the resilience and trust that make Bitcoin a global store of value and censorship-resistant.
Consensus updates in Bitcoin must balance the need for innovation with the preservation of the network's core principles. The development process of a proposal needs to be detailed and rigorous, going through several testing stages, such as in testnet, signet, and compatible networks like Litecoin and Liquid Network. These networks offer safe environments for proposals to be analyzed and improved before being launched on the main network.
Each proposed change must be carefully evaluated regarding its maturity, impact, backward compatibility, and support among stakeholders. The recommended key questions and appropriate timing are critical to ensure that an update is adopted without compromising network cohesion. It's also essential that the implementation process is continuously monitored and re-evaluated, allowing adjustments as necessary and minimizing the risk of instability.
By following these guidelines, Bitcoin's stakeholders can ensure that the network continues to evolve safely and robustly, maintaining user trust and further solidifying its role as one of the most resilient and innovative digital assets in the world. Ultimately, consensus in Bitcoin is not just a technical issue but a reflection of its community and the values it represents: security, decentralization, and resilience.
8. Links
Whitepaper: https://github.com/bitcoin-cap/bcap
Youtube (pt-br): https://www.youtube.com/watch?v=rARycAibl9o&list=PL-qnhF0qlSPkfhorqsREuIu4UTbF0h4zb
-
-
@ 5ac1f045:1a8f939a
2025-01-02 15:56:18GeneRo. This general AI robot represents a significant step forward in humanoid robot technology, aiming to bridge the gap between humans and robots.AMBER Robotics, a leading provider of high-end robotic actuators and bionic humanoid robot bodies, is set to revolutionize the robotics industry with the introduction of their latest innovation,
AMBER Robotics has invested significant efforts into leveraging its mature AIOS high-precision/high dynamic performance robotic actuators to create robots with diverse configurations quickly and efficiently. By utilizing standardized and serialized components, they have developed a modular approach to humanoid robot ontology, combining AI recognition and planning. This breakthrough approach enables pre-trained general-purpose humanoid robots like GeneRo to adapt and move freely, closely resembling human behavior.
GeneRo, General Robot Advancements in AI multimodal technology have enabled GeneRo and other robots to interact with humans in more intuitive and concrete ways. These robots can acquire human-like common knowledge, allowing them to perform various tasks without relying on pre-programmed instructions. GeneRo excels in unstructured environments, making it particularly valuable in everyday life and work scenarios filled with unknown obstacles.
AMBER Robotics’ technology has already gained recognition in fields such as medical rehabilitation robots, humanoid medical rehabilitation robot platforms, bionic multi-joint mechanical arms, and humanoid robot ontologies. With operations spanning major economies worldwide, the company has established itself as a global leader in high-end robotic actuators and bionic humanoid robot bodies.
Innovative Progress in General Robotics — Simple is the Best
GeneRo is the latest addition to AMBER Robotics lineup of cutting-edge robots. Standing at approximately 1.68 meters (66 feet) tall and weighing 50 kilograms (110 pounds), this humanoid robot boasts the latest generation of AI Motion Units. These units combine ultra-high torque density force-controlled joints with integrated driving and control, enabling GeneRo to move freely in a manner closely resembling human walking. The product utilizes AMBER Robotics’ self-applicable robotic joint series AIOS, high-dynamic-performance Dynamic Motion Units (DMUs) as motion actuators, and complex scene-adaptive gait balancing algorithms.
As a leading supplier in the bioinspired robot market, AMBER Robotics recognizes the need for collaboration and progress across the entire industry chain. By fostering an open and collaborative environment, AMBER Robotics aims to facilitate rapid research, exchange of ideas, and validation of breakthrough products and technologies.
GeneRo, in collaboration with AMBER Robotics, believes that humanoid robots are the ideal intelligent carriers for complex and exploratory tasks while preserving existing infrastructures. They envision the upcoming adaptive robot body, General Robot, and general artificial intelligence technology as the operating system and mobile phones of the future, propelling new technological singularities. The combined power of General Robot and general artificial intelligence will redefine human cognitive exploration and understanding of the world, addressing fundamental human needs and revolutionizing various aspects of life, including clothing, food, shelter, transportation, social activities, and business operations.
General Robot + General Artificial Intelligence Technology: Propelling New Technological Singularities
As we enter the next decade, AMBER Robotics and GeneRo are committed to driving cross-industry collaboration, accelerating the low-threshold popularization of general-purpose robot bodies and artificial intelligence. With technology poised to transform human and natural evolutionary processes at an unprecedented pace, GeneRo represents an exciting glimpse into the future.
Genero, https://www.genero.one Social, https://facebook.com/GeneRoAI Email: generohub@gmail.comGeneRo. This general AI robot represents a significant step forward in humanoid robot technology, aiming to bridge the gap between humans and robots.AMBER Robotics, a leading provider of high-end robotic actuators and bionic humanoid robot bodies, is set to revolutionize the robotics industry with the introduction of their latest innovation,
AMBER Robotics has invested significant efforts into leveraging its mature AIOS high-precision/high dynamic performance robotic actuators to create robots with diverse configurations quickly and efficiently. By utilizing standardized and serialized components, they have developed a modular approach to humanoid robot ontology, combining AI recognition and planning. This breakthrough approach enables pre-trained general-purpose humanoid robots like GeneRo to adapt and move freely, closely resembling human behavior.
GeneRo, General Robot
Advancements in AI multimodal technology have enabled GeneRo and other robots to interact with humans in more intuitive and concrete ways. These robots can acquire human-like common knowledge, allowing them to perform various tasks without relying on pre-programmed instructions. GeneRo excels in unstructured environments, making it particularly valuable in everyday life and work scenarios filled with unknown obstacles.
AMBER Robotics’ technology has already gained recognition in fields such as medical rehabilitation robots, humanoid medical rehabilitation robot platforms, bionic multi-joint mechanical arms, and humanoid robot ontologies. With operations spanning major economies worldwide, the company has established itself as a global leader in high-end robotic actuators and bionic humanoid robot bodies.
Innovative Progress in General Robotics — Simple is the Best
GeneRo is the latest addition to AMBER Robotics lineup of cutting-edge robots. Standing at approximately 1.68 meters (66 feet) tall and weighing 50 kilograms (110 pounds), this humanoid robot boasts the latest generation of AI Motion Units. These units combine ultra-high torque density force-controlled joints with integrated driving and control, enabling GeneRo to move freely in a manner closely resembling human walking. The product utilizes AMBER Robotics’ self-applicable robotic joint series AIOS, high-dynamic-performance Dynamic Motion Units (DMUs) as motion actuators, and complex scene-adaptive gait balancing algorithms.
As a leading supplier in the bioinspired robot market, AMBER Robotics recognizes the need for collaboration and progress across the entire industry chain. By fostering an open and collaborative environment, AMBER Robotics aims to facilitate rapid research, exchange of ideas, and validation of breakthrough products and technologies.
GeneRo, in collaboration with AMBER Robotics, believes that humanoid robots are the ideal intelligent carriers for complex and exploratory tasks while preserving existing infrastructures. They envision the upcoming adaptive robot body, General Robot, and general artificial intelligence technology as the operating system and mobile phones of the future, propelling new technological singularities. The combined power of General Robot and general artificial intelligence will redefine human cognitive exploration and understanding of the world, addressing fundamental human needs and revolutionizing various aspects of life, including clothing, food, shelter, transportation, social activities, and business operations.
General Robot + General Artificial Intelligence Technology: Propelling New Technological Singularities
As we enter the next decade, AMBER Robotics and GeneRo are committed to driving cross-industry collaboration, accelerating the low-threshold popularization of general-purpose robot bodies and artificial intelligence. With technology poised to transform human and natural evolutionary processes at an unprecedented pace, GeneRo represents an exciting glimpse into the future.
Genero, https://www.genero.one\ Social, https://facebook.com/GeneRoAI\ Email: generohub@gmail.com
-
@ eac63075:b4988b48
2024-10-26 22:14:19The future of physical money is at stake, and the discussion about DREX, the new digital currency planned by the Central Bank of Brazil, is gaining momentum. In a candid and intense conversation, Federal Deputy Julia Zanatta (PL/SC) discussed the challenges and risks of this digital transition, also addressing her Bill No. 3,341/2024, which aims to prevent the extinction of physical currency. This bill emerges as a direct response to legislative initiatives seeking to replace physical money with digital alternatives, limiting citizens' options and potentially compromising individual freedom. Let's delve into the main points of this conversation.
https://www.fountain.fm/episode/i5YGJ9Ors3PkqAIMvNQ0
What is a CBDC?
Before discussing the specifics of DREX, it’s important to understand what a CBDC (Central Bank Digital Currency) is. CBDCs are digital currencies issued by central banks, similar to a digital version of physical money. Unlike cryptocurrencies such as Bitcoin, which operate in a decentralized manner, CBDCs are centralized and regulated by the government. In other words, they are digital currencies created and controlled by the Central Bank, intended to replace physical currency.
A prominent feature of CBDCs is their programmability. This means that the government can theoretically set rules about how, where, and for what this currency can be used. This aspect enables a level of control over citizens' finances that is impossible with physical money. By programming the currency, the government could limit transactions by setting geographical or usage restrictions. In practice, money within a CBDC could be restricted to specific spending or authorized for use in a defined geographical area.
In countries like China, where citizen actions and attitudes are also monitored, a person considered to have a "low score" due to a moral or ideological violation may have their transactions limited to essential purchases, restricting their digital currency use to non-essential activities. This financial control is strengthened because, unlike physical money, digital currency cannot be exchanged anonymously.
Practical Example: The Case of DREX During the Pandemic
To illustrate how DREX could be used, an example was given by Eric Altafim, director of Banco Itaú. He suggested that, if DREX had existed during the COVID-19 pandemic, the government could have restricted the currency’s use to a 5-kilometer radius around a person’s residence, limiting their economic mobility. Another proposed use by the executive related to the Bolsa Família welfare program: the government could set up programming that only allows this benefit to be used exclusively for food purchases. Although these examples are presented as control measures for safety or organization, they demonstrate how much a CBDC could restrict citizens' freedom of choice.
To illustrate the potential for state control through a Central Bank Digital Currency (CBDC), such as DREX, it is helpful to look at the example of China. In China, the implementation of a CBDC coincides with the country’s Social Credit System, a governmental surveillance tool that assesses citizens' and companies' behavior. Together, these technologies allow the Chinese government to monitor, reward, and, above all, punish behavior deemed inappropriate or threatening to the government.
How Does China's Social Credit System Work?
Implemented in 2014, China's Social Credit System assigns every citizen and company a "score" based on various factors, including financial behavior, criminal record, social interactions, and even online activities. This score determines the benefits or penalties each individual receives and can affect everything from public transport access to obtaining loans and enrolling in elite schools for their children. Citizens with low scores may face various sanctions, including travel restrictions, fines, and difficulty in securing loans.
With the adoption of the CBDC — or “digital yuan” — the Chinese government now has a new tool to closely monitor citizens' financial transactions, facilitating the application of Social Credit System penalties. China’s CBDC is a programmable digital currency, which means that the government can restrict how, when, and where the money can be spent. Through this level of control, digital currency becomes a powerful mechanism for influencing citizens' behavior.
Imagine, for instance, a citizen who repeatedly posts critical remarks about the government on social media or participates in protests. If the Social Credit System assigns this citizen a low score, the Chinese government could, through the CBDC, restrict their money usage in certain areas or sectors. For example, they could be prevented from buying tickets to travel to other regions, prohibited from purchasing certain consumer goods, or even restricted to making transactions only at stores near their home.
Another example of how the government can use the CBDC to enforce the Social Credit System is by monitoring purchases of products such as alcohol or luxury items. If a citizen uses the CBDC to spend more than the government deems reasonable on such products, this could negatively impact their social score, resulting in additional penalties such as future purchase restrictions or a lowered rating that impacts their personal and professional lives.
In China, this kind of control has already been demonstrated in several cases. Citizens added to Social Credit System “blacklists” have seen their spending and investment capacity severely limited. The combination of digital currency and social scores thus creates a sophisticated and invasive surveillance system, through which the Chinese government controls important aspects of citizens’ financial lives and individual freedoms.
Deputy Julia Zanatta views these examples with great concern. She argues that if the state has full control over digital money, citizens will be exposed to a level of economic control and surveillance never seen before. In a democracy, this control poses a risk, but in an authoritarian regime, it could be used as a powerful tool of repression.
DREX and Bill No. 3,341/2024
Julia Zanatta became aware of a bill by a Workers' Party (PT) deputy (Bill 4068/2020 by Deputy Reginaldo Lopes - PT/MG) that proposes the extinction of physical money within five years, aiming for a complete transition to DREX, the digital currency developed by the Central Bank of Brazil. Concerned about the impact of this measure, Julia drafted her bill, PL No. 3,341/2024, which prohibits the elimination of physical money, ensuring citizens the right to choose physical currency.
“The more I read about DREX, the less I want its implementation,” says the deputy. DREX is a Central Bank Digital Currency (CBDC), similar to other state digital currencies worldwide, but which, according to Julia, carries extreme control risks. She points out that with DREX, the State could closely monitor each citizen’s transactions, eliminating anonymity and potentially restricting freedom of choice. This control would lie in the hands of the Central Bank, which could, in a crisis or government change, “freeze balances or even delete funds directly from user accounts.”
Risks and Individual Freedom
Julia raises concerns about potential abuses of power that complete digitalization could allow. In a democracy, state control over personal finances raises serious questions, and EddieOz warns of an even more problematic future. “Today we are in a democracy, but tomorrow, with a government transition, we don't know if this kind of power will be used properly or abused,” he states. In other words, DREX gives the State the ability to restrict or condition the use of money, opening the door to unprecedented financial surveillance.
EddieOz cites Nigeria as an example, where a CBDC was implemented, and the government imposed severe restrictions on the use of physical money to encourage the use of digital currency, leading to protests and clashes in the country. In practice, the poorest and unbanked — those without regular access to banking services — were harshly affected, as without physical money, many cannot conduct basic transactions. Julia highlights that in Brazil, this situation would be even more severe, given the large number of unbanked individuals and the extent of rural areas where access to technology is limited.
The Relationship Between DREX and Pix
The digital transition has already begun with Pix, which revolutionized instant transfers and payments in Brazil. However, Julia points out that Pix, though popular, is a citizen’s choice, while DREX tends to eliminate that choice. The deputy expresses concern about new rules suggested for Pix, such as daily transaction limits of a thousand reais, justified as anti-fraud measures but which, in her view, represent additional control and a profit opportunity for banks. “How many more rules will banks create to profit from us?” asks Julia, noting that DREX could further enhance control over personal finances.
International Precedents and Resistance to CBDC
The deputy also cites examples from other countries resisting the idea of a centralized digital currency. In the United States, states like New Hampshire have passed laws to prevent the advance of CBDCs, and leaders such as Donald Trump have opposed creating a national digital currency. Trump, addressing the topic, uses a justification similar to Julia’s: in a digitalized system, “with one click, your money could disappear.” She agrees with the warning, emphasizing the control risk that a CBDC represents, especially for countries with disadvantaged populations.
Besides the United States, Canada, Colombia, and Australia have also suspended studies on digital currencies, citing the need for further discussions on population impacts. However, in Brazil, the debate on DREX is still limited, with few parliamentarians and political leaders openly discussing the topic. According to Julia, only she and one or two deputies are truly trying to bring this discussion to the Chamber, making DREX’s advance even more concerning.
Bill No. 3,341/2024 and Popular Pressure
For Julia, her bill is a first step. Although she acknowledges that ideally, it would prevent DREX's implementation entirely, PL 3341/2024 is a measure to ensure citizens' choice to use physical money, preserving a form of individual freedom. “If the future means control, I prefer to live in the past,” Julia asserts, reinforcing that the fight for freedom is at the heart of her bill.
However, the deputy emphasizes that none of this will be possible without popular mobilization. According to her, popular pressure is crucial for other deputies to take notice and support PL 3341. “I am only one deputy, and we need the public’s support to raise the project’s visibility,” she explains, encouraging the public to press other parliamentarians and ask them to “pay attention to PL 3341 and the project that prohibits the end of physical money.” The deputy believes that with a strong awareness and pressure movement, it is possible to advance the debate and ensure Brazilians’ financial freedom.
What’s at Stake?
Julia Zanatta leaves no doubt: DREX represents a profound shift in how money will be used and controlled in Brazil. More than a simple modernization of the financial system, the Central Bank’s CBDC sets precedents for an unprecedented level of citizen surveillance and control in the country. For the deputy, this transition needs to be debated broadly and transparently, and it’s up to the Brazilian people to defend their rights and demand that the National Congress discuss these changes responsibly.
The deputy also emphasizes that, regardless of political or partisan views, this issue affects all Brazilians. “This agenda is something that will affect everyone. We need to be united to ensure people understand the gravity of what could happen.” Julia believes that by sharing information and generating open debate, it is possible to prevent Brazil from following the path of countries that have already implemented a digital currency in an authoritarian way.
A Call to Action
The future of physical money in Brazil is at risk. For those who share Deputy Julia Zanatta’s concerns, the time to act is now. Mobilize, get informed, and press your representatives. PL 3341/2024 is an opportunity to ensure that Brazilian citizens have a choice in how to use their money, without excessive state interference or surveillance.
In the end, as the deputy puts it, the central issue is freedom. “My fear is that this project will pass, and people won’t even understand what is happening.” Therefore, may every citizen at least have the chance to understand what’s at stake and make their voice heard in defense of a Brazil where individual freedom and privacy are respected values.
-
@ a853296a:209e695f
2025-01-02 15:52:12👋 What's up, stackers! 🤠
Excited to announce our latest project: Pull That Up Jamie. Think Perplexity but private & open source.
TLDR: ✨ Why Choose Jamie?
🛠️ Fully Open Source and Transparent! ⚡ BOLT11 Bitcoin/Lightning for Anonymous Usage! 🚄 Optimized for Speed and Convenience! 🆓 Limited Free Usage Available!
💦🔒🕵️ Your Biggest Opsec Leak - Why We Tackled Search
Search + LLMs seems like the peanut butter & jelly of the internet - a great match. But at what cost? Now that LLMs and AI are here, we know that finding needles in a vast haystack of data is much easier. That means that seemingly innocuous queries and interactions you have on the internet now carry way more weight than you think. How long before we all get owned? Privacy becomes all the more important. Each query empowers those who would exploit us. Every search chips away, revealing personal details about your state of mind. Stealing your soul little by little.
Just as bitcoin gives us the opportunity to opt out of exploitative economic systems, we wanted to take bitcoin's magic freedom dust and give you the ability to opt out of exploitative search surveillance 🔒🕵️.
⚡ How Bitcoin Lightning Yet Again Fixes This
Using the Bitcoin Connect plugin, we are able to accept BOLT11 payments. BOLT11, thanks to the lightning network's onion routing topology, affords users great sender privacy:
With just a VPN + an NWC connection, you can use Pull That Up Jamie with privacy assurances that are unparalleled. For very low cost, an average person can get Jason Bourne tier opsec.
🚧🧰🏗️Building Off the Great Work of Others
Major shout out to the ⚡ lightning devs that brought BOLT11 to the point it's at and especially to the 🐝 @getalby team for the great work on Bitcoin Connect. BC makes it easy to accept bitcoin payments with very little friction or overhead.
Additionally, we took notes on great projects like Perplexica. However we found that none of them were really geared toward the combination of speed, UX, and convenience we were looking for. Most of them are designed to be run in docker containers on your machine - great for techies but not accessible to the wider population.
We rolled our own from scratch, learning a lot from these projects. We especially took note of the superb qualities afforded by the SearXNG project🔍 🌐. What is SearXNG? Let's ask Pull That Up Jamie:
SearXNG is such a gamechanger that we plan to make a bitcoin payable, AI scannable endpoint just for accessing our instance. DM us if interested.
Armed with the ability to search the web and feed context to LLMs, we can Make The Internet Private Again. We can eliminate Google from your life.
⚡ Stackers do yourselves a favor - check out https://pullthatupjamie.ai today! 🤠
Future Work
- Open source models like 🦙 Llama
- Collaborating with @TonyGiorgio and team to use their secure compute LLM 🍁 Maple - https://stacker.news/items/764869 as part of the workflow
- Expert Mode: interrogate high signal sources of your choosing like podcasts, stacker news posts and others
- A couple more secret twists to keep you guessing :)
- Suggestions? Hit us with em.
originally posted at https://stacker.news/items/833717
-
@ 5ac1f045:1a8f939a
2025-01-02 14:58:54每一次重大技术的突破,普通大众往往只能作为消费者被动接受而成为最终的买单人。然而,我们相信,技术的进步不应让绝大多数人失去参与的机会。如果这样的情况持续发生,那一定是创业机制出了问题。
在过去三年中,机器人莫非连续受到上海傅利叶顾捷的挑衅、侵权和种种没有道德和法律底限的侵害,经过郑重考虑,我们将以此为契机发起打击非法技术盗抢的行动倡议,旨在让更多人有机会参与并分享机器人莫非直至整个AI和机器人技术进步的高成长和收益。
第一轮:以机器人莫非受侵害事件为始!
- 参与方式简单
每一个拥有可拍照手机和公交卡的普通人,都可以参与到机器人莫非的成长受益机会中。
- 股权捐赠与激励
机器人莫非已通过老股东捐赠和激励性股权的形式,在符合各国家或地区法律许可的前提下,让每一个普通人都有机会受益于AI和机器人这两大领域的突破性创新。只要有基于正义和热情的合法举动,就可以成为机器人莫非正式认可的“有贡献的投资人”身份而受益。
- 股东权益与维权
每一个“有贡献的投资人”,将以合法的形式成为公司的直接或间接股东,可以在因上海傅利叶顾捷的盗抢行为导致公司损失的追偿行动中获益。
我们郑重提醒,本轮打击行为不涉及任何现金投入,本轮任何以“机器人莫非”名义发起的现金筹集,均为假冒和诈骗行为。
- 维权授权
每一个获得机器人莫非官方股权的个人或法人,都可以发起针对侵害机器人莫非的维权、举报、投诉和诉讼活动。我们将提供基于当地国家或地区合法框架内的的正式授权书和股东证明书。
- 风险承诺
机器人莫非正式承诺:每一个“有贡献的投资人”都不需要承担因公司亏损带来的任何直接或间接损失。也就是说,只有收益、不承担任何债务。
我们期待您的积极参与,共同维护公司权益,实现技术创新的公平共享。
我们的目标是成为一家“全民参与、全民创新、全民受益”的基于AI机器人的创新实体,让每一个有良知的人都可以分享到因AI和机器人技术进步而带来的收益和高成长性。
我们将稍后将根据综合反馈推出具体行动细则。
机器人莫非 日期:2024年6月25日
机器人莫非简介:
机器人莫非开创了标准化、系列化的机器人专用关节,结合高性能驱动器研制和发布了系列多关节机械臂B1,L1及仿生人形机器人本体和解决方案。
赢得的客户包括全球性国际际化企业、各领域细分隐形冠军企业及众多知名院校及研究机构。
**我们保留对“合格投资人”的最终解释权,到目前为止,下面这些人将不符合资格:
1,上海傅利叶顾捷本人、家人及与其三代血亲相关的人和宠物;
2,参与盗抢机器人莫非技术秘密、有形资产有关联的人(提供证据并帮助挽回损失的除外)。每一次重大技术的突破,普通大众往往只能作为消费者被动接受而成为最终的买单人。然而,我们相信,技术的进步不应让绝大多数人失去参与的机会。如果这样的情况持续发生,那一定是创业机制出了问题。
在过去三年中,机器人莫非连续受到上海傅利叶顾捷的挑衅、侵权和种种没有道德和法律底限的侵害,经过郑重考虑,我们将以此为契机发起打击非法技术盗抢的行动倡议,旨在让更多人有机会参与并分享机器人莫非直至整个AI和机器人技术进步的高成长和收益。
第一轮:以机器人莫非受侵害事件为始!
1. 参与方式简单
每一个拥有可拍照手机和公交卡的普通人,都可以参与到机器人莫非的成长受益机会中。
2. 股权捐赠与激励
机器人莫非已通过老股东捐赠和激励性股权的形式,在符合各国家或地区法律许可的前提下,让每一个普通人都有机会受益于AI和机器人这两大领域的突破性创新。只要有基于正义和热情的合法举动,就可以成为机器人莫非正式认可的“有贡献的投资人”身份而受益。
3. 股东权益与维权
每一个“有贡献的投资人”,将以合法的形式成为公司的直接或间接股东,可以在因上海傅利叶顾捷的盗抢行为导致公司损失的追偿行动中获益。
我们郑重提醒,本轮打击行为不涉及任何现金投入,本轮任何以“机器人莫非”名义发起的现金筹集,均为假冒和诈骗行为。
4. 维权授权
每一个获得机器人莫非官方股权的个人或法人,都可以发起针对侵害机器人莫非的维权、举报、投诉和诉讼活动。我们将提供基于当地国家或地区合法框架内的的正式授权书和股东证明书。
5. 风险承诺
机器人莫非正式承诺:每一个“有贡献的投资人”都不需要承担因公司亏损带来的任何直接或间接损失。也就是说,只有收益、不承担任何债务。
我们期待您的积极参与,共同维护公司权益,实现技术创新的公平共享。
我们的目标是成为一家“全民参与、全民创新、全民受益”的基于AI机器人的创新实体,让每一个有良知的人都可以分享到因AI和机器人技术进步而带来的收益和高成长性。
我们将稍后将根据综合反馈推出具体行动细则。
机器人莫非
日期:2024年6月25日
机器人莫非简介:
机器人莫非开创了标准化、系列化的机器人专用关节,结合高性能驱动器研制和发布了系列多关节机械臂B1,L1及仿生人形机器人本体和解决方案。
赢得的客户包括全球性国际际化企业、各领域细分隐形冠军企业及众多知名院校及研究机构。
**我们保留对“合格投资人”的最终解释权,到目前为止,下面这些人将不符合资格:
1,上海傅利叶顾捷本人、家人及与其三代血亲相关的人和宠物;
2,参与盗抢机器人莫非技术秘密、有形资产有关联的人(提供证据并帮助挽回损失的除外)。
-
@ eac63075:b4988b48
2024-10-21 08:11:11Imagine sending a private message to a friend, only to learn that authorities could be scanning its contents without your knowledge. This isn't a scene from a dystopian novel but a potential reality under the European Union's proposed "Chat Control" measures. Aimed at combating serious crimes like child exploitation and terrorism, these proposals could significantly impact the privacy of everyday internet users. As encrypted messaging services become the norm for personal and professional communication, understanding Chat Control is essential. This article delves into what Chat Control entails, why it's being considered, and how it could affect your right to private communication.
https://www.fountain.fm/episode/coOFsst7r7mO1EP1kSzV
https://open.spotify.com/episode/0IZ6kMExfxFm4FHg5DAWT8?si=e139033865e045de
Sections:
- Introduction
- What Is Chat Control?
- Why Is the EU Pushing for Chat Control?
- The Privacy Concerns and Risks
- The Technical Debate: Encryption and Backdoors
- Global Reactions and the Debate in Europe
- Possible Consequences for Messaging Services
- What Happens Next? The Future of Chat Control
- Conclusion
What Is Chat Control?
"Chat Control" refers to a set of proposed measures by the European Union aimed at monitoring and scanning private communications on messaging platforms. The primary goal is to detect and prevent the spread of illegal content, such as child sexual abuse material (CSAM) and to combat terrorism. While the intention is to enhance security and protect vulnerable populations, these proposals have raised significant privacy concerns.
At its core, Chat Control would require messaging services to implement automated scanning technologies that can analyze the content of messages—even those that are end-to-end encrypted. This means that the private messages you send to friends, family, or colleagues could be subject to inspection by algorithms designed to detect prohibited content.
Origins of the Proposal
The initiative for Chat Control emerged from the EU's desire to strengthen its digital security infrastructure. High-profile cases of online abuse and the use of encrypted platforms by criminal organizations have prompted lawmakers to consider more invasive surveillance tactics. The European Commission has been exploring legislation that would make it mandatory for service providers to monitor communications on their platforms.
How Messaging Services Work
Most modern messaging apps, like Signal, Session, SimpleX, Veilid, Protonmail and Tutanota (among others), use end-to-end encryption (E2EE). This encryption ensures that only the sender and the recipient can read the messages being exchanged. Not even the service providers can access the content. This level of security is crucial for maintaining privacy in digital communications, protecting users from hackers, identity thieves, and other malicious actors.
Key Elements of Chat Control
- Automated Content Scanning: Service providers would use algorithms to scan messages for illegal content.
- Circumvention of Encryption: To scan encrypted messages, providers might need to alter their encryption methods, potentially weakening security.
- Mandatory Reporting: If illegal content is detected, providers would be required to report it to authorities.
- Broad Applicability: The measures could apply to all messaging services operating within the EU, affecting both European companies and international platforms.
Why It Matters
Understanding Chat Control is essential because it represents a significant shift in how digital privacy is handled. While combating illegal activities online is crucial, the methods proposed could set a precedent for mass surveillance and the erosion of privacy rights. Everyday users who rely on encrypted messaging for personal and professional communication might find their conversations are no longer as private as they once thought.
Why Is the EU Pushing for Chat Control?
The European Union's push for Chat Control stems from a pressing concern to protect its citizens, particularly children, from online exploitation and criminal activities. With the digital landscape becoming increasingly integral to daily life, the EU aims to strengthen its ability to combat serious crimes facilitated through online platforms.
Protecting Children and Preventing Crime
One of the primary motivations behind Chat Control is the prevention of child sexual abuse material (CSAM) circulating on the internet. Law enforcement agencies have reported a significant increase in the sharing of illegal content through private messaging services. By implementing Chat Control, the EU believes it can more effectively identify and stop perpetrators, rescue victims, and deter future crimes.
Terrorism is another critical concern. Encrypted messaging apps can be used by terrorist groups to plan and coordinate attacks without detection. The EU argues that accessing these communications could be vital in preventing such threats and ensuring public safety.
Legal Context and Legislative Drivers
The push for Chat Control is rooted in several legislative initiatives:
-
ePrivacy Directive: This directive regulates the processing of personal data and the protection of privacy in electronic communications. The EU is considering amendments that would allow for the scanning of private messages under specific circumstances.
-
Temporary Derogation: In 2021, the EU adopted a temporary regulation permitting voluntary detection of CSAM by communication services. The current proposals aim to make such measures mandatory and more comprehensive.
-
Regulation Proposals: The European Commission has proposed regulations that would require service providers to detect, report, and remove illegal content proactively. This would include the use of technologies to scan private communications.
Balancing Security and Privacy
EU officials argue that the proposed measures are a necessary response to evolving digital threats. They emphasize the importance of staying ahead of criminals who exploit technology to harm others. By implementing Chat Control, they believe law enforcement can be more effective without entirely dismantling privacy protections.
However, the EU also acknowledges the need to balance security with fundamental rights. The proposals include provisions intended to limit the scope of surveillance, such as:
-
Targeted Scanning: Focusing on specific threats rather than broad, indiscriminate monitoring.
-
Judicial Oversight: Requiring court orders or oversight for accessing private communications.
-
Data Protection Safeguards: Implementing measures to ensure that data collected is handled securely and deleted when no longer needed.
The Urgency Behind the Push
High-profile cases of online abuse and terrorism have heightened the sense of urgency among EU policymakers. Reports of increasing online grooming and the widespread distribution of illegal content have prompted calls for immediate action. The EU posits that without measures like Chat Control, these problems will continue to escalate unchecked.
Criticism and Controversy
Despite the stated intentions, the push for Chat Control has been met with significant criticism. Opponents argue that the measures could be ineffective against savvy criminals who can find alternative ways to communicate. There is also concern that such surveillance could be misused or extended beyond its original purpose.
The Privacy Concerns and Risks
While the intentions behind Chat Control focus on enhancing security and protecting vulnerable groups, the proposed measures raise significant privacy concerns. Critics argue that implementing such surveillance could infringe on fundamental rights and set a dangerous precedent for mass monitoring of private communications.
Infringement on Privacy Rights
At the heart of the debate is the right to privacy. By scanning private messages, even with automated tools, the confidentiality of personal communications is compromised. Users may no longer feel secure sharing sensitive information, fearing that their messages could be intercepted or misinterpreted by algorithms.
Erosion of End-to-End Encryption
End-to-end encryption (E2EE) is a cornerstone of digital security, ensuring that only the sender and recipient can read the messages exchanged. Chat Control could necessitate the introduction of "backdoors" or weaken encryption protocols, making it easier for unauthorized parties to access private data. This not only affects individual privacy but also exposes communications to potential cyber threats.
Concerns from Privacy Advocates
Organizations like Signal and Tutanota, which offer encrypted messaging services, have voiced strong opposition to Chat Control. They warn that undermining encryption could have far-reaching consequences:
- Security Risks: Weakening encryption makes systems more vulnerable to hacking, espionage, and cybercrime.
- Global Implications: Changes in EU regulations could influence policies worldwide, leading to a broader erosion of digital privacy.
- Ineffectiveness Against Crime: Determined criminals might resort to other, less detectable means of communication, rendering the measures ineffective while still compromising the privacy of law-abiding citizens.
Potential for Government Overreach
There is a fear that Chat Control could lead to increased surveillance beyond its original scope. Once the infrastructure for scanning private messages is in place, it could be repurposed or expanded to monitor other types of content, stifling free expression and dissent.
Real-World Implications for Users
- False Positives: Automated scanning technologies are not infallible and could mistakenly flag innocent content, leading to unwarranted scrutiny or legal consequences for users.
- Chilling Effect: Knowing that messages could be monitored might discourage people from expressing themselves freely, impacting personal relationships and societal discourse.
- Data Misuse: Collected data could be vulnerable to leaks or misuse, compromising personal and sensitive information.
Legal and Ethical Concerns
Privacy advocates also highlight potential conflicts with existing laws and ethical standards:
- Violation of Fundamental Rights: The European Convention on Human Rights and other international agreements protect the right to privacy and freedom of expression.
- Questionable Effectiveness: The ethical justification for such invasive measures is challenged if they do not significantly improve safety or if they disproportionately impact innocent users.
Opposition from Member States and Organizations
Countries like Germany and organizations such as the European Digital Rights (EDRi) have expressed opposition to Chat Control. They emphasize the need to protect digital privacy and caution against hasty legislation that could have unintended consequences.
The Technical Debate: Encryption and Backdoors
The discussion around Chat Control inevitably leads to a complex technical debate centered on encryption and the potential introduction of backdoors into secure communication systems. Understanding these concepts is crucial to grasping the full implications of the proposed measures.
What Is End-to-End Encryption (E2EE)?
End-to-end encryption is a method of secure communication that prevents third parties from accessing data while it's transferred from one end system to another. In simpler terms, only the sender and the recipient can read the messages. Even the service providers operating the messaging platforms cannot decrypt the content.
- Security Assurance: E2EE ensures that sensitive information—be it personal messages, financial details, or confidential business communications—remains private.
- Widespread Use: Popular messaging apps like Signal, Session, SimpleX, Veilid, Protonmail and Tutanota (among others) rely on E2EE to protect user data.
How Chat Control Affects Encryption
Implementing Chat Control as proposed would require messaging services to scan the content of messages for illegal material. To do this on encrypted platforms, providers might have to:
- Introduce Backdoors: Create a means for third parties (including the service provider or authorities) to access encrypted messages.
- Client-Side Scanning: Install software on users' devices that scans messages before they are encrypted and sent, effectively bypassing E2EE.
The Risks of Weakening Encryption
1. Compromised Security for All Users
Introducing backdoors or client-side scanning tools can create vulnerabilities:
- Exploitable Gaps: If a backdoor exists, malicious actors might find and exploit it, leading to data breaches.
- Universal Impact: Weakening encryption doesn't just affect targeted individuals; it potentially exposes all users to increased risk.
2. Undermining Trust in Digital Services
- User Confidence: Knowing that private communications could be accessed might deter people from using digital services or push them toward unregulated platforms.
- Business Implications: Companies relying on secure communications might face increased risks, affecting economic activities.
3. Ineffectiveness Against Skilled Adversaries
- Alternative Methods: Criminals might shift to other encrypted channels or develop new ways to avoid detection.
- False Sense of Security: Weakening encryption could give the impression of increased safety while adversaries adapt and continue their activities undetected.
Signal’s Response and Stance
Signal, a leading encrypted messaging service, has been vocal in its opposition to the EU's proposals:
- Refusal to Weaken Encryption: Signal's CEO Meredith Whittaker has stated that the company would rather cease operations in the EU than compromise its encryption standards.
- Advocacy for Privacy: Signal emphasizes that strong encryption is essential for protecting human rights and freedoms in the digital age.
Understanding Backdoors
A "backdoor" in encryption is an intentional weakness inserted into a system to allow authorized access to encrypted data. While intended for legitimate use by authorities, backdoors pose several problems:
- Security Vulnerabilities: They can be discovered and exploited by unauthorized parties, including hackers and foreign governments.
- Ethical Concerns: The existence of backdoors raises questions about consent and the extent to which governments should be able to access private communications.
The Slippery Slope Argument
Privacy advocates warn that introducing backdoors or mandatory scanning sets a precedent:
- Expanded Surveillance: Once in place, these measures could be extended to monitor other types of content beyond the original scope.
- Erosion of Rights: Gradual acceptance of surveillance can lead to a significant reduction in personal freedoms over time.
Potential Technological Alternatives
Some suggest that it's possible to fight illegal content without undermining encryption:
- Metadata Analysis: Focusing on patterns of communication rather than content.
- Enhanced Reporting Mechanisms: Encouraging users to report illegal content voluntarily.
- Investing in Law Enforcement Capabilities: Strengthening traditional investigative methods without compromising digital security.
The technical community largely agrees that weakening encryption is not the solution:
- Consensus on Security: Strong encryption is essential for the safety and privacy of all internet users.
- Call for Dialogue: Technologists and privacy experts advocate for collaborative approaches that address security concerns without sacrificing fundamental rights.
Global Reactions and the Debate in Europe
The proposal for Chat Control has ignited a heated debate across Europe and beyond, with various stakeholders weighing in on the potential implications for privacy, security, and fundamental rights. The reactions are mixed, reflecting differing national perspectives, political priorities, and societal values.
Support for Chat Control
Some EU member states and officials support the initiative, emphasizing the need for robust measures to combat online crime and protect citizens, especially children. They argue that:
- Enhanced Security: Mandatory scanning can help law enforcement agencies detect and prevent serious crimes.
- Responsibility of Service Providers: Companies offering communication services should play an active role in preventing their platforms from being used for illegal activities.
- Public Safety Priorities: The protection of vulnerable populations justifies the implementation of such measures, even if it means compromising some aspects of privacy.
Opposition within the EU
Several countries and organizations have voiced strong opposition to Chat Control, citing concerns over privacy rights and the potential for government overreach.
Germany
- Stance: Germany has been one of the most vocal opponents of the proposed measures.
- Reasons:
- Constitutional Concerns: The German government argues that Chat Control could violate constitutional protections of privacy and confidentiality of communications.
- Security Risks: Weakening encryption is seen as a threat to cybersecurity.
- Legal Challenges: Potential conflicts with national laws protecting personal data and communication secrecy.
Netherlands
- Recent Developments: The Dutch government decided against supporting Chat Control, emphasizing the importance of encryption for security and privacy.
- Arguments:
- Effectiveness Doubts: Skepticism about the actual effectiveness of the measures in combating crime.
- Negative Impact on Privacy: Concerns about mass surveillance and the infringement of citizens' rights.
Table reference: Patrick Breyer - Chat Control in 23 September 2024
Privacy Advocacy Groups
European Digital Rights (EDRi)
- Role: A network of civil and human rights organizations working to defend rights and freedoms in the digital environment.
- Position:
- Strong Opposition: EDRi argues that Chat Control is incompatible with fundamental rights.
- Awareness Campaigns: Engaging in public campaigns to inform citizens about the potential risks.
- Policy Engagement: Lobbying policymakers to consider alternative approaches that respect privacy.
Politicians and Activists
Patrick Breyer
- Background: A Member of the European Parliament (MEP) from Germany, representing the Pirate Party.
- Actions:
- Advocacy: Actively campaigning against Chat Control through speeches, articles, and legislative efforts.
- Public Outreach: Using social media and public events to raise awareness.
- Legal Expertise: Highlighting the legal inconsistencies and potential violations of EU law.
Global Reactions
International Organizations
- Human Rights Watch and Amnesty International: These organizations have expressed concerns about the implications for human rights, urging the EU to reconsider.
Technology Companies
- Global Tech Firms: Companies like Apple and Microsoft are monitoring the situation, as EU regulations could affect their operations and user trust.
- Industry Associations: Groups representing tech companies have issued statements highlighting the risks to innovation and competitiveness.
The Broader Debate
The controversy over Chat Control reflects a broader struggle between security interests and privacy rights in the digital age. Key points in the debate include:
- Legal Precedents: How the EU's decision might influence laws and regulations in other countries.
- Digital Sovereignty: The desire of nations to control digital spaces within their borders.
- Civil Liberties: The importance of protecting freedoms in the face of technological advancements.
Public Opinion
- Diverse Views: Surveys and public forums show a range of opinions, with some citizens prioritizing security and others valuing privacy above all.
- Awareness Levels: Many people are still unaware of the potential changes, highlighting the need for public education on the issue.
The EU is at a crossroads, facing the challenge of addressing legitimate security concerns without undermining the fundamental rights that are central to its values. The outcome of this debate will have significant implications for the future of digital privacy and the balance between security and freedom in society.
Possible Consequences for Messaging Services
The implementation of Chat Control could have significant implications for messaging services operating within the European Union. Both large platforms and smaller providers might need to adapt their technologies and policies to comply with the new regulations, potentially altering the landscape of digital communication.
Impact on Encrypted Messaging Services
Signal and Similar Platforms
-
Compliance Challenges: Encrypted messaging services like Signal rely on end-to-end encryption to secure user communications. Complying with Chat Control could force them to weaken their encryption protocols or implement client-side scanning, conflicting with their core privacy principles.
-
Operational Decisions: Some platforms may choose to limit their services in the EU or cease operations altogether rather than compromise on encryption. Signal, for instance, has indicated that it would prefer to withdraw from European markets than undermine its security features.
Potential Blocking or Limiting of Services
-
Regulatory Enforcement: Messaging services that do not comply with Chat Control regulations could face fines, legal action, or even be blocked within the EU.
-
Access Restrictions: Users in Europe might find certain services unavailable or limited in functionality if providers decide not to meet the regulatory requirements.
Effects on Smaller Providers
-
Resource Constraints: Smaller messaging services and startups may lack the resources to implement the required scanning technologies, leading to increased operational costs or forcing them out of the market.
-
Innovation Stifling: The added regulatory burden could deter new entrants, reducing competition and innovation in the messaging service sector.
User Experience and Trust
-
Privacy Concerns: Users may lose trust in messaging platforms if they know their communications are subject to scanning, leading to a decline in user engagement.
-
Migration to Unregulated Platforms: There is a risk that users might shift to less secure or unregulated services, including those operated outside the EU or on the dark web, potentially exposing them to greater risks.
Technical and Security Implications
-
Increased Vulnerabilities: Modifying encryption protocols to comply with Chat Control could introduce security flaws, making platforms more susceptible to hacking and data breaches.
-
Global Security Risks: Changes made to accommodate EU regulations might affect the global user base of these services, extending security risks beyond European borders.
Impact on Businesses and Professional Communications
-
Confidentiality Issues: Businesses that rely on secure messaging for sensitive communications may face challenges in ensuring confidentiality, affecting sectors like finance, healthcare, and legal services.
-
Compliance Complexity: Companies operating internationally will need to navigate a complex landscape of differing regulations, increasing administrative burdens.
Economic Consequences
-
Market Fragmentation: Divergent regulations could lead to a fragmented market, with different versions of services for different regions.
-
Loss of Revenue: Messaging services might experience reduced revenue due to decreased user trust and engagement or the costs associated with compliance.
Responses from Service Providers
-
Legal Challenges: Companies might pursue legal action against the regulations, citing conflicts with privacy laws and user rights.
-
Policy Advocacy: Service providers may increase lobbying efforts to influence policy decisions and promote alternatives to Chat Control.
Possible Adaptations
-
Technological Innovation: Some providers might invest in developing new technologies that can detect illegal content without compromising encryption, though the feasibility remains uncertain.
-
Transparency Measures: To maintain user trust, companies might enhance transparency about how data is handled and what measures are in place to protect privacy.
The potential consequences of Chat Control for messaging services are profound, affecting not only the companies that provide these services but also the users who rely on them daily. The balance between complying with legal requirements and maintaining user privacy and security presents a significant challenge that could reshape the digital communication landscape.
What Happens Next? The Future of Chat Control
The future of Chat Control remains uncertain as the debate continues among EU member states, policymakers, technology companies, and civil society organizations. Several factors will influence the outcome of this contentious proposal, each carrying significant implications for digital privacy, security, and the regulatory environment within the European Union.
Current Status of Legislation
-
Ongoing Negotiations: The proposed Chat Control measures are still under discussion within the European Parliament and the Council of the European Union. Amendments and revisions are being considered in response to the feedback from various stakeholders.
-
Timeline: While there is no fixed date for the final decision, the EU aims to reach a consensus to implement effective measures against online crime without undue delay.
Key Influencing Factors
1. Legal Challenges and Compliance with EU Law
-
Fundamental Rights Assessment: The proposals must be evaluated against the Charter of Fundamental Rights of the European Union, ensuring that any measures comply with rights to privacy, data protection, and freedom of expression.
-
Court Scrutiny: Potential legal challenges could arise, leading to scrutiny by the European Court of Justice (ECJ), which may impact the feasibility and legality of Chat Control.
2. Technological Feasibility
-
Development of Privacy-Preserving Technologies: Research into methods that can detect illegal content without compromising encryption is ongoing. Advances in this area could provide alternative solutions acceptable to both privacy advocates and security agencies.
-
Implementation Challenges: The practical aspects of deploying scanning technologies across various platforms and services remain complex, and technical hurdles could delay or alter the proposed measures.
3. Political Dynamics
-
Member State Positions: The differing stances of EU countries, such as Germany's opposition, play a significant role in shaping the final outcome. Consensus among member states is crucial for adopting EU-wide regulations.
-
Public Opinion and Advocacy: Growing awareness and activism around digital privacy can influence policymakers. Public campaigns and lobbying efforts may sway decisions in favor of stronger privacy protections.
4. Industry Responses
-
Negotiations with Service Providers: Ongoing dialogues between EU authorities and technology companies may lead to compromises or collaborative efforts to address concerns without fully implementing Chat Control as initially proposed.
-
Potential for Self-Regulation: Messaging services might propose self-regulatory measures to combat illegal content, aiming to demonstrate effectiveness without the need for mandatory scanning.
Possible Scenarios
Optimistic Outcome:
- Balanced Regulation: A revised proposal emerges that effectively addresses security concerns while upholding strong encryption and privacy rights, possibly through innovative technologies or targeted measures with robust oversight.
Pessimistic Outcome:
- Adoption of Strict Measures: Chat Control is implemented as initially proposed, leading to weakened encryption, reduced privacy, and potential withdrawal of services like Signal from the EU market.
Middle Ground:
- Incremental Implementation: Partial measures are adopted, focusing on voluntary cooperation with service providers and emphasizing transparency and user consent, with ongoing evaluations to assess effectiveness and impact.
How to Stay Informed and Protect Your Privacy
-
Follow Reputable Sources: Keep up with news from reliable outlets, official EU communications, and statements from privacy organizations to stay informed about developments.
-
Engage in the Dialogue: Participate in public consultations, sign petitions, or contact representatives to express your views on Chat Control and digital privacy.
-
Utilize Secure Practices: Regardless of legislative outcomes, adopting good digital hygiene—such as using strong passwords and being cautious with personal information—can enhance your online security.
The Global Perspective
-
International Implications: The EU's decision may influence global policies on encryption and surveillance, setting precedents that other countries might follow or react against.
-
Collaboration Opportunities: International cooperation on developing solutions that protect both security and privacy could emerge, fostering a more unified approach to addressing online threats.
Looking Ahead
The future of Chat Control is a critical issue that underscores the challenges of governing in the digital age. Balancing the need for security with the protection of fundamental rights is a complex task that requires careful consideration, open dialogue, and collaboration among all stakeholders.
As the situation evolves, staying informed and engaged is essential. The decisions made in the coming months will shape the digital landscape for years to come, affecting how we communicate, conduct business, and exercise our rights in an increasingly connected world.
Conclusion
The debate over Chat Control highlights a fundamental challenge in our increasingly digital world: how to protect society from genuine threats without eroding the very rights and freedoms that define it. While the intention to safeguard children and prevent crime is undeniably important, the means of achieving this through intrusive surveillance measures raise critical concerns.
Privacy is not just a personal preference but a cornerstone of democratic societies. End-to-end encryption has become an essential tool for ensuring that our personal conversations, professional communications, and sensitive data remain secure from unwanted intrusion. Weakening these protections could expose individuals and organizations to risks that far outweigh the proposed benefits.
The potential consequences of implementing Chat Control are far-reaching:
- Erosion of Trust: Users may lose confidence in digital platforms, impacting how we communicate and conduct business online.
- Security Vulnerabilities: Introducing backdoors or weakening encryption can make systems more susceptible to cyberattacks.
- Stifling Innovation: Regulatory burdens may hinder technological advancement and competitiveness in the tech industry.
- Global Implications: The EU's decisions could set precedents that influence digital policies worldwide, for better or worse.
As citizens, it's crucial to stay informed about these developments. Engage in conversations, reach out to your representatives, and advocate for solutions that respect both security needs and fundamental rights. Technology and policy can evolve together to address challenges without compromising core values.
The future of Chat Control is not yet decided, and public input can make a significant difference. By promoting open dialogue, supporting privacy-preserving innovations, and emphasizing the importance of human rights in legislation, we can work towards a digital landscape that is both safe and free.
In a world where digital communication is integral to daily life, striking the right balance between security and privacy is more important than ever. The choices made today will shape the digital environment for generations to come, determining not just how we communicate, but how we live and interact in an interconnected world.
Thank you for reading this article. We hope it has provided you with a clear understanding of Chat Control and its potential impact on your privacy and digital rights. Stay informed, stay engaged, and let's work together towards a secure and open digital future.
Read more:
- https://www.patrick-breyer.de/en/posts/chat-control/
- https://www.patrick-breyer.de/en/new-eu-push-for-chat-control-will-messenger-services-be-blocked-in-europe/
- https://edri.org/our-work/dutch-decision-puts-brakes-on-chat-control/
- https://signal.org/blog/pdfs/ndss-keynote.pdf
- https://tuta.com/blog/germany-stop-chat-control
- https://cointelegraph.com/news/signal-president-slams-revised-eu-encryption-proposal
- https://mullvad.net/en/why-privacy-matters
-
@ 2063cd79:57bd1320
2025-01-02 12:56:08Bitcoin ist vieles. Bitcoin die Währung ist teilbar, austauschbar, einfach transportierbar, haltbar, prüfbar, knapp, universell akzeptiert und leicht sicherungsfähig. Bitcoin das Netzwerk ist staatenlos, dezentral, zensurresistent, erlaubnislos, diskriminiert nicht, vertrauenslos, pseudonym, open source, es basiert auf Konsens- und Anreizmechanismen und Verifizierung sowie Berechnung (wahrscheinlich habe ich sogar viele weitere Eigenschaften vergessen), aber ist Bitcoin auch wirklich unpolitisch, wie so oft behauptet?
Es wird häufig behauptet, dass Bitcoin unpolitisch sei. Aber was genau soll das bedeuten? Die einfachste Erklärung ist, dass Bitcoin für jeden frei zugänglich ist und von jedem benutzt werden kann, egal für welchen Zweck. In der Theorie auch für politische Zwecke, egal welcher Richtung. Bitcoin ist Politik in dieser Hinsicht egal. Denn das Bitcoin-Netzwerk richtet nicht, es diskriminiert nicht und es hat keine Meinung. Eine Transaktion ist eine Transaktion, egal wer der Urheber oder der Sender ist und egal, wer der Empfänger ist. Transaktionen müssen nicht gekennzeichnet werden und somit gibt es keine Möglichkeit für das Netzwerk zu entscheiden, ob eine Transaktion gut oder schlecht ist, dazu genutzt wird, um Guthaben von einer Wallet in eine andere zu schieben, oder von einem Land in ein anderes Land geschickt wird, um dort moralisch fragwürdige Motive zu unterstützen. Insofern ist Bitcoin unpolitisch: Das Netzwerk diskriminiert, oder besser gesagt beurteilt nicht aufgrund politischer Neigungen.
Aber dies ist eigentlich nur die Definition für die eingangs erwähnte Eigenschaft von Bitcoins Wertfreiheit (meiner Meinung nach eine bessere Ausdrucksweise für "Bitcoin diskriminiert nicht").
Aber Nichtdiskriminierung bzw. Wertfreiheit bedeutet nicht unbedingt unpolitisch oder apolitisch. Die Definition dieses Adjektivs bedeutet streng genommen:
[1] sich nicht für Politik interessierend, kein Interesse an politische Themen zeigend
[2] keine Steigerung: nicht die Politik betreffend, nicht zur Politik gehörend
Die erste Definition, da sind wir uns sicherlich einig, sollte erfüllt sein. Bitcoin interessiert sich nicht für Politik. Bitcoin ist ein Netzwerk, ein Protokoll, ein System. Bitcoin interessiert sich nur für sich selbst. Seinen eigenen Erhalt, und die im Protokoll festgesetzten Regeln: Etwa alle 10 Minuten wird ein neuer Block produziert, egal wie viel Rechenleistung dem Netzwerk zur Verfügung steht, egal wie viele Transaktionen hinzuzufügen sind, egal wie viele Netzwerkteilnehmer partizipieren.
Bei der zweiten Definition wird es allerdings etwas komplizierter. Bitcoin wurde von Satoshi als Peer-to-Peer Electronic Cash System ins Leben gerufen, das die inhärenten Schwächen des heutigen, vertrauensbasierten Modells löst. Satoshi identifizierte das Problem schon in 2009:
The root problem with conventional currency is all the trust that's required to make it work. The central bank must be trusted not to debase the currency, but the history of fiat currencies is full of breaches of that trust.
Der Genesis Block selbst enthält die wohl bekannteste aller Nachrichten, die jemals in der Bitcoin-Timechain verewigt wurden:
The Times 03/Jan/2009 Chancellor on brink of second bailout for banks
\ Damit ist die Konzeption und die Erschaffung des Bitcoin-Protokolls an sich schon ein politischer Akt. Bitcoin stellt eine Alternative zu unserem derzeitigen Geldsystem dar und soll oder könnte es, im besten Fall, sogar ersetzen. Bitcoin positioniert sich als Gegenstück zum Staat - dem derzeitigen Wächter und Herrn über das Geldsystem. Der Staat ist eine von Natur aus politische Instanz. Wenn man also mit etwas konkurriert, das dem Staat obliegt, wird es automatisch politisch. Satoshi selbst war zumindest indirekt vom Libertarismus und der österreichischen Ökonomie beeinflusst.
Das bedeutet keineswegs, dass jede Person, die Bitcoin verwendet, automatisch einem politischen Akt unterworfen wird, oder selbst anarchistische, libertäre oder liberale Ziele verfolgt. Allerdings bleibt nicht von der Hand zu weisen, dass Bitcoin und sein Ziel, eine Alternative zum heutigen vorherrschenden Geldsystem zu erschaffen, dadurch eine inhärent politische Bekundung ist.
Wenn Bitcoin also nicht apolitisch oder unpolitisch ist, aber auch nicht explizit politisch, dann könnte man behaupten Bitcoin sei zumindest anti-politisch. Der per Definition politische Staat und die Staatsgewalt über das Geldsystem sind der erklärte Gegenspieler von Bitcoin. Damit stellt sich Bitcoin als Kontrahent zu einem System auf, das die Gewalt in die Hände einiger Weniger legt. In der Politik gewinnen oder herrschen diejenigen, die die populärste Meinung vertreten (wenn es gut läuft), oder die meiste Gewalt hinter sich bündeln (wenn es nicht so gut läuft). Im Bitcoin-Netzwerk gewinnen diejenigen, die am effizientesten die Anreizstrukturen nutzen (Miner, Mining-Pools, Lightning-Routing-Channel Betreiber, etc.), oder Bitcoin am effizientesten für sich nutzen und damit dem Ökosystem zum Wachstum verhelfen (Unternehmer, Experten, Entwickler, etc.). Die politische Gesinnung dieser Netzwerkteilnehmer spielt dabei in erster Linie absolut keine Rolle. Es ist völlig egal, ob ein Node-Betreiber zu Hause Pickelhauben sammelt oder im Che Guevara T-Shirt Bitcoin-Protokolle schreibt.
Das heutige Geldsystem hat viele Nachteile, alle aufzuzählen würde den Rahmen sprengen, jedoch lassen sich einige prägnante leicht identifizieren: Rent-Seeking, des Bitcoiners liebstes Thema der Cantillon-Effekt, Geld- oder Münzentwertung und Geldmarktpolitik vereinen alle das gleiche zugrunde liegende Problem. Sie unterliegen alle der politischen Einflussnahme auf das System zum Vorteil einiger (privilegierter) Weniger. Denn was für die wenigen individuellen Vorteilsnehmer aussichtsreich und lohnenswert ist, ist für das Kollektiv schädlich und finanziell schädigend. Bitcoin stellt dazu die Alternative dar. Zwar lässt sich argumentieren, dass die vorhandene Menge und damit das Vermögen bereits heute ungerecht verteilt ist. Allerdings birgt diese Verteilung lediglich Vorteile für die Individuen, ohne jedoch das Kollektiv zu schädigen. Besitzer von großen Mengen bitcoin können genau so viel oder so wenig Einfluss auf das System nehmen, wie diejenigen, die verhältnismäßig wenig besitzen.
Wenn es irgendetwas von Wert gibt, ob Geld, Edelmetalle, oder sonstige Wertgegenstände, wird es auch immer Menschen geben, die davon mehr besitzen als andere - das ist ein unumstößlicher Fakt der Natur und auch Bitcoin wird daran nichts ändern können. Allerdings bietet Bitcoin die nötigen Anreizstrukturen, den eigenen Anteil zu vermehren. Wie schon erwähnt, werden Unternehmergeist, Expertenwissen und aufgebrachte Arbeit derjenigen, die das Netzwerk voranbringen, belohnt. Im Gegensatz zum aktuellen System, in dem oft nicht nur Unternehmergeist und Arbeitsleistung belohnt werden, sondern auch politische Einflussnahme, Prestige und Macht, oder sogar schon die Nähe und der Zugang zu diesen einflussreichen Interessengruppen. Korruption, Lobbyismus und politische Vorteilsnahme führen deshalb zu unproduktiver Arbeit, bei der einzig und allein der Begünstigte profitiert.
Bitcoin eliminiert diese politische Vorteilsnahme und ist dadurch schon anti-politisch.
In diesem Sinne ist Bitcoin also politisch, wie alles politisch ist oder zu einem politischen Thema gemacht werden kann. Ich habe in einem früheren Artikel bereits beschrieben, dass der Staat für viele Menschen die Rolle einer Art Religion eingenommen hat und dass Bitcoin in gewisser Weise für den Staat das ist, was der Buchdruck damals für Religion war.
https://www.genexyz.org/post/13-block-754250-die-vollst-ndige-adaption-von-bitcoin-und-die-3-hindernisse-74u3k2/
Religion ist eigentlich unpolitisch, obwohl man behaupten darf, dass Kirchgänger gewisser Religionen im Allgemeinen im gleichen Bereich des politischen Spektrums wiederzufinden sind, macht dies Religion nicht von Natur aus politisch. Doch die Trennung von Kirche und Staat kann wohl als hochpolitisch bezeichnet werden.
Wo Diderot, Rousseau und Voltaire eine Berufung auf die Vernunft als universelle Urteilsinstanz propagierten und einen Kampf gegen Vorurteile und für die Hinwendung zu Naturwissenschaften, religiöse Toleranz und eine Orientierung am Naturrecht einleiteten, streben Bitcoin und seine Befürworter eine Abkehr von den staatlich gesteuerten und (Fiskal- und Geld)politisch aufgeladenen Finanz- und Wirtschaftsinterventionen und eine Berufung auf Werte wie Dezentralität, Zensurresistenz und Selbstbestimmtheit an. Dasselbe gilt für die Trennung von Geld und Staat. Geld ist eigentlich unpolitisch, aber die Trennung von Geld und Staat ist hochpolitisch. Auch der Missbrauch von Geld zum Erreichen von politischen Zielen ist hochpolitisch. Wie eingangs erwähnt, wird Bitcoin so politisiert - nur eben als Gegenentwurf. Als anti-politische Alternative zum politischen Fiat-System mit all seinen Fehlern.
Was ich damit sagen will, ist, dass Bitcoin per se politisch ist. Es ist eben nur ein anderer Entwurf zu dem politischen Denken, das heute vorherrscht. Bitcoin ist und bleibt erlaubnislos und wertfrei, damit ist die Nutzung von Bitcoin erstmal im Generellen unpolitisch. Solange bis auch einzelne Anwendungsfälle von politischer Natur sind. Bitcoin-Spenden an Wikileaks haben eine politische Tragweite. Bitcoin-Spenden an den Freedom-Convoy in Kanada sind politisch. Bitcoin-Spenden an Hodlonaut sind politisch, auch wenn es dabei um die hauseigene Politik im Bitcoin-Ökosystem geht.
Man kann also nicht ohne weiteres sagen "Bitcoin ist unpolitisch". Es ist richtiger zu sagen, dass Bitcoin keine politische Meinung vertritt und sich nicht zu politischer Einflussnahme instrumentalisieren lässt. Bitcoin ist ein Protokoll, ein Netzwerk, und kümmert sich nur um sich selbst. Aber Bitcoin ist sehr wohl politisch.
🫳🎤
In diesem Sinne, 2... 1... Risiko!
-
@ ec42c765:328c0600
2024-10-16 08:08:40カスタム絵文字とは
任意のオリジナル画像を絵文字のように文中に挿入できる機能です。
また、リアクション(Twitterの いいね のような機能)にもカスタム絵文字を使えます。
カスタム絵文字の対応状況(2024/02/05)
カスタム絵文字を使うためにはカスタム絵文字に対応したクライアントを使う必要があります。
※表は一例です。クライアントは他にもたくさんあります。
使っているクライアントが対応していない場合は、クライアントを変更する、対応するまで待つ、開発者に要望を送る(または自分で実装する)などしましょう。
対応クライアント
ここではnostterを使って説明していきます。
準備
カスタム絵文字を使うための準備です。
- Nostrエクステンション(NIP-07)を導入する
- 使いたいカスタム絵文字をリストに登録する
Nostrエクステンション(NIP-07)を導入する
Nostrエクステンションは使いたいカスタム絵文字を登録する時に必要になります。
また、環境(パソコン、iPhone、androidなど)によって導入方法が違います。
Nostrエクステンションを導入する端末は、実際にNostrを閲覧する端末と違っても構いません(リスト登録はPC、Nostr閲覧はiPhoneなど)。
Nostrエクステンション(NIP-07)の導入方法は以下のページを参照してください。
ログイン拡張機能 (NIP-07)を使ってみよう | Welcome to Nostr! ~ Nostrをはじめよう! ~
少し面倒ですが、これを導入しておくとNostr上の様々な場面で役立つのでより快適になります。
使いたいカスタム絵文字をリストに登録する
以下のサイトで行います。
右上のGet startedからNostrエクステンションでログインしてください。
例として以下のカスタム絵文字を導入してみます。
実際より絵文字が少なく表示されることがありますが、古い状態のデータを取得してしまっているためです。その場合はブラウザの更新ボタンを押してください。
- 右側のOptionsからBookmarkを選択
これでカスタム絵文字を使用するためのリストに登録できます。
カスタム絵文字を使用する
例としてブラウザから使えるクライアント nostter から使用してみます。
nostterにNostrエクステンションでログイン、もしくは秘密鍵を入れてログインしてください。
文章中に使用
- 投稿ボタンを押して投稿ウィンドウを表示
- 顔😀のボタンを押し、絵文字ウィンドウを表示
- *タブを押し、カスタム絵文字一覧を表示
- カスタム絵文字を選択
- : 記号に挟まれたアルファベットのショートコードとして挿入される
この状態で投稿するとカスタム絵文字として表示されます。
カスタム絵文字対応クライアントを使っている他ユーザーにもカスタム絵文字として表示されます。
対応していないクライアントの場合、ショートコードのまま表示されます。
ショートコードを直接入力することでカスタム絵文字の候補が表示されるのでそこから選択することもできます。
リアクションに使用
- 任意の投稿の顔😀のボタンを押し、絵文字ウィンドウを表示
- *タブを押し、カスタム絵文字一覧を表示
- カスタム絵文字を選択
カスタム絵文字リアクションを送ることができます。
カスタム絵文字を探す
先述したemojitoからカスタム絵文字を探せます。
例えば任意のユーザーのページ emojito ロクヨウ から探したり、 emojito Browse all からnostr全体で最近作成、更新された絵文字を見たりできます。
また、以下のリンクは日本語圏ユーザーが作ったカスタム絵文字を集めたリストです(2024/06/30)
※漏れがあるかもしれません
各絵文字セットにあるOpen in emojitoのリンクからemojitoに飛び、使用リストに追加できます。
以上です。
次:Nostrのカスタム絵文字の作り方
Yakihonneリンク Nostrのカスタム絵文字の作り方
Nostrリンク nostr:naddr1qqxnzdesxuunzv358ycrgveeqgswcsk8v4qck0deepdtluag3a9rh0jh2d0wh0w9g53qg8a9x2xqvqqrqsqqqa28r5psx3
仕様
-
@ c4f5e7a7:8856cac7
2024-09-27 08:20:16Best viewed on Habla, YakiHonne or Highlighter.
TL;DR
This article explores the links between public, community-driven data sources (such as OpenStreetMap) and private, cryptographically-owned data found on networks such as Nostr.
The following concepts are explored:
- Attestations: Users signalling to their social graph that they believe something to be true by publishing Attestations. These social proofs act as a decentralised verification system that leverages your web-of-trust.
- Proof of Place: An oracle-based system where physical letters are sent to real-world locations, confirming the corresponding digital ownership via cryptographic proofs. This binds physical locations in meatspace with their digital representations in the Nostrverse.
- Check-ins: Foursquare-style check-ins that can be verified using attestations from place owners, ensuring authenticity. This approach uses web-of-trust to validate check-ins and location ownership over time.
The goal is to leverage cryptographic ownership where necessary while preserving the open, collaborative nature of public data systems.
Open Data in a public commons has a place and should not be thrown out with the Web 2.0 bathwater.
Cognitive Dissonance
Ever since discovering Nostr in August of 2022 I've been grappling with how BTC Map - a project that helps bitcoiners find places to spend sats - should most appropriately use this new protocol.
I am assuming, dear reader, that you are somewhat familiar with Nostr - a relatively new protocol for decentralised identity and communication. If you don’t know your nsec from your npub, please take some time to read these excellent posts: Nostr is Identity for the Internet and The Power of Nostr by @max and @lyn, respectively. Nostr is so much more than a short-form social media replacement.
The social features (check-ins, reviews, etc.) that Nostr unlocks for BTC Map are clear and exciting - all your silos are indeed broken - however, something fundamental has been bothering me for a while and I think it comes down to data ownership.
For those unfamiliar, BTC Map uses OpenStreetMap (OSM) as its main geographic database. OSM is centred on the concept of a commons of objectively verifiable data that is maintained by a global community of volunteer editors; a Wikipedia for maps. There is no data ownership; the data is free (as in freedom) and anyone can edit anything. It is the data equivalent of FOSS (Free and Open Source Software) - FOSD if you will, but more commonly referred to as Open Data.
In contrast, Notes and Other Stuff on Nostr (Places in this cartographic context) are explicitly owned by the controller of the private key. These notes are free to propagate, but they are owned.
How do we reconcile the decentralised nature of Nostr, where data is cryptographically owned by individuals, with the community-managed data commons of OpenStreetMap, where no one owns the data?
Self-sovereign Identity
Before I address this coexistence question, I want to talk a little about identity as it pertains to ownership. If something is to be owned, it has to be owned by someone or something - an identity.
All identities that are not self-sovereign are, by definition, leased to you by a 3rd party. You rent your Facebook identity from Meta in exchange for your data. You rent your web domain from your DNS provider in exchange for your money.
Taken to the extreme, you rent your passport from your Government in exchange for your compliance. You are you at the pleasure of others. Where Bitcoin separates money from the state; Nostr separates identity from the state.
Or, as @nvk said recently: "Don't build your house on someone else's land.".
https://i.nostr.build/xpcCSkDg3uVw0yku.png
While we’ve had the tools for self-sovereign digital identity for decades (think PGP keys or WebAuthN), we haven't had the necessary social use cases nor the corresponding social graph to elevate these identities to the mainstream. Nostr fixes this.
Nostr is PGP for the masses and will take cryptographic identities mainstream.
Full NOSTARD?
Returning to the coexistence question: the data on OpenStreetMap isn’t directly owned by anyone, even though the physical entities the data represents might be privately owned. OSM is a data commons.
We can objectively agree on the location of a tree or a fire hydrant without needing permission to observe and record it. Sure, you could place a tree ‘on Nostr’, but why should you? Just because something can be ‘on Nostr’ doesn’t mean it should be.
https://i.nostr.build/s3So2JVAqoY4E1dI.png
There might be a dystopian future where we can't agree on what a tree is nor where it's located, but I hope we never get there. It's at this point we'll need a Wikifreedia variant of OpenStreetMap.
While integrating Nostr identities into OpenStreetMap would be valuable, the current OSM infrastructure, tools, and community already provide substantial benefits in managing this data commons without needing to go NOSTR-native - there's no need to go Full NOSTARD. H/T to @princeySOV for the original meme.
https://i.nostr.build/ot9jtM5cZtDHNKWc.png
So, how do we appropriately blend cryptographically owned data with the commons?
If a location is owned in meatspace and it's useful to signal that ownership, it should also be owned in cyberspace. Our efforts should therefore focus on entities like businesses, while allowing the commons to manage public data for as long as it can successfully mitigate the tragedy of the commons.
The remainder of this article explores how we can:
- Verify ownership of a physical place in the real world;
- Link that ownership to the corresponding digital place in cyberspace.
As a side note, I don't see private key custodianship - or, even worse, permissioned use of Places signed by another identity's key - as any more viable than the rented identities of Web 2.0.
And as we all know, the Second Law of Infodynamics (no citation!) states that:
"The total amount of sensitive information leaked will always increase over time."
This especially holds true if that data is centralised.
Not your keys, not your notes. Not your keys, not your identity.
Places and Web-of-Trust
@Arkinox has been leading the charge on the Places NIP, introducing Nostr notes (kind 37515) that represent physical locations. The draft is well-crafted, with bonus points for linking back to OSM (and other location repositories) via NIP-73 - External Content IDs (championed by @oscar of @fountain).
However, as Nostr is permissionless, authenticity poses a challenge. Just because someone claims to own a physical location on the Internet doesn’t necessarily mean they have ownership or control of that location in the real world.
Ultimately, this problem can only be solved in a decentralised way by using Web-of-Trust - using your social graph and the perspectives of trusted peers to inform your own perspective. In the context of Places, this requires your network to form a view on which digital identity (public key / npub) is truly the owner of a physical place like your local coffee shop.
This requires users to:
- Verify the owner of a Place in cyberspace is the owner of a place in meatspace.
- Signal this verification to their social graph.
Let's look at the latter idea first with the concept of Attestations ...
Attestations
A way to signal to your social graph that you believe something to be true (or false for that matter) would be by publishing an Attestation note. An Attestation note would signify to your social graph that you think something is either true or false.
Imagine you're a regular at a local coffee shop. You publish an Attestation that says the shop is real and the owner behind the Nostr public key is who they claim to be. Your friends trust you, so they start trusting the shop's digital identity too.
However, attestations applied to Places are just a single use case. The attestation concept could be more widely applied across Nostr in a variety of ways (key rotation, identity linking, etc).
Here is a recent example from @lyn that would carry more signal if it were an Attestation:
https://i.nostr.build/lZAXOEwvRIghgFY4.png
Parallels can be drawn between Attestations and transaction confirmations on the Bitcoin timechain; however, their importance to you would be weighted by clients and/or Data Vending Machines in accordance with:
- Your social graph;
- The type or subject of the content being attested and by whom;
- Your personal preferences.
They could also have a validity duration to be temporally bound, which would be particularly useful in the case of Places.
NIP-25 (Reactions) do allow for users to up/downvote notes with optional content (e.g., emojis) and could work for Attestations, but I think we need something less ambiguous and more definitive.
‘This is true’ resonates more strongly than ‘I like this.’.
https://i.nostr.build/s8NIG2kXzUCLcoax.jpg
There are similar concepts in the Web 3 / Web 5 world such as Verified Credentials by tdb. However, Nostr is the Web 3 now and so wen Attestation NIP?
https://i.nostr.build/Cb047NWyHdJ7h5Ka.jpg
That said, I have seen @utxo has been exploring ‘smart contracts’ on nostr and Attestations may just be a relatively ‘dumb’ subset of the wider concept Nostr-native scripting combined with web-of-trust.
Proof of Place
Attestations handle the signalling of your truth, but what about the initial verification itself?
We already covered how this ultimately has to be derived from your social graph, but what if there was a way to help bootstrap this web-of-trust through the use of oracles? For those unfamiliar with oracles in the digital realm, they are simply trusted purveyors of truth.
Introducing Proof of Place, an out–of-band process where an oracle (such as BTC Map) would mail - yes physically mail- a shared secret to the address of the location being claimed in cyberspace. This shared secret would be locked to the public key (npub) making the claim, which, if unlocked, would prove that the associated private key (nsec) has physical access to the location in meatspace.
One way of doing this would be to mint a 1 sat cashu ecash token locked to the npub of the claimant and mail it to them. If they are able to redeem the token then they have cryptographically proven that they have physical access to the location.
Proof of Place is really nothing more than a weighted Attestation. In a web-of-trust Nostrverse, an oracle is simply a npub (say BTC Map) that you weigh heavily for its opinion on a given topic (say Places).
In the Bitcoin world, Proof of Work anchors digital scarcity in cyberspace to physical scarcity (energy and time) in meatspace and as @Gigi says in PoW is Essential:
"A failure to understand Proof of Work, is a failure to understand Bitcoin."
In the Nostrverse, Proof of Place helps bridge the digital and physical worlds.
@Gigi also observes in Memes vs The World that:
"In Bitcoin, the map is the territory. We can infer everything we care about by looking at the map alone."
https://i.nostr.build/dOnpxfI4u7EL2v4e.png
This isn’t true for Nostr.
In the Nostrverse, the map IS NOT the territory. However, Proof of Place enables us to send cryptographic drones down into the physical territory to help us interpret our digital maps. 🤯
Check-ins
Although not a draft NIP yet, @Arkinox has also been exploring the familiar concept of Foursquare-style Check-ins on Nostr (with kind 13811 notes).
For the uninitiated, Check-ins are simply notes that signal the publisher is at a given location. These locations could be Places (in the Nostr sense) or any other given digital representation of a location for that matter (such as OSM elements) if NIP-73 - External Content IDs are used.
Of course, not everyone will be a Check-in enjoyooor as the concept will not sit well with some people’s threat models and OpSec practices.
Bringing Check-ins to Nostr is possible (as @sebastix capably shows here), but they suffer the same authenticity issues as Places. Just because I say I'm at a given location doesn't mean that I am.
Back in the Web 2.0 days, Foursquare mitigated this by relying on the GPS position of the phone running their app, but this is of course spoofable.
How should we approach Check-in verifiability in the Nostrverse? Well, just like with Places, we can use Attestations and WoT. In the context of Check-ins, an Attestation from the identity (npub) of the Place being checked-in to would be a particularly strong signal. An NFC device could be placed in a coffee shop and attest to check-ins without requiring the owner to manually intervene - I’m sure @blackcoffee and @Ben Arc could hack something together over a weekend!
Check-ins could also be used as a signal for bonafide Place ownership over time.
Summary: Trust Your Bros
So, to recap, we have:
Places: Digital representations of physical locations on Nostr.
Check-ins: Users signalling their presence at a location.
Attestations: Verifiable social proofs used to confirm ownership or the truth of a claim.
You can visualise how these three concepts combine in the diagram below:
https://i.nostr.build/Uv2Jhx5BBfA51y0K.jpg
And, as always, top right trumps bottom left! We have:
Level 0 - Trust Me Bro: Anyone can check-in anywhere. The Place might not exist or might be impersonating the real place in meatspace. The person behind the npub may not have even been there at all.
Level 1 - Definitely Maybe Somewhere: This category covers the middle-ground of ‘Maybe at a Place’ and ‘Definitely Somewhere’. In these examples, you are either self-certifying that you have checked-in at an Attested Place or you are having others attest that you have checked-in at a Place that might not even exist IRL.
Level 2 - Trust Your Bros: An Attested Check-in at an Attested Place. Your individual level of trust would be a function of the number of Attestations and how you weigh them within your own social graph.
https://i.nostr.build/HtLAiJH1uQSTmdxf.jpg
Perhaps the gold standard (or should that be the Bitcoin standard?) would be a Check-in attested by the owner of the Place, which in itself was attested by BTC Map?
Or perhaps not. Ultimately, it’s the users responsibility to determine what they trust by forming their own perspective within the Nostrverse powered by web-of-trust algorithms they control. ‘Trust Me Bro’ or ‘Trust Your Bros’ - you decide.
As we navigate the frontier of cryptographic ownership and decentralised data, it’s up to us to find the balance between preserving the Open Data commons and embracing self-sovereign digital identities.
Thanks
With thanks to Arkinox, Avi, Ben Gunn, Kieran, Blackcoffee, Sebastix, Tomek, Calle, Short Fiat, Ben Weeks and Bitcoms for helping shape my thoughts and refine content, whether you know it or not!
-
@ 58937958:545e6994
2025-01-02 12:33:17May 22, 2024 I made Badger-kun’s pizza bread to celebrate Bitcoin Pizza Day.
Badger-kun: A character from the Japanese YouTube channel "Bitcoiner Hanseikai."
Making the pizza bread was quite a challenge:
Attempt 1: Rice Flour Bread
I thought it might be difficult to shape the character using yeast-based dough (since fermentation might turn it into just a plain round shape). So, I tried rice flour bread with psyllium, but it didn’t feel quite right.
Attempt 2: Cream Bread Style
The rice flour bread was too firm, so I wanted to try something softer. It ended up burning.
Attempt 3: Cheese Naan Style
I wanted to capture that melty cheese vibe and finally thought of cheese naan. For a character-themed pizza bread, this cheese naan approach seemed to work pretty well. I realized that simpler character designs might be easier (and clearer) to make. nostr:nevent1qqsd3a7thkzqde4sp4hx7qjwrjp4kxsnl66kytx40mk73djfvxfkspgu2fw34
-
@ 09fbf8f3:fa3d60f0
2024-09-10 13:21:23由于gmail在中国被防火墙拦截了,无法打开,不想错过邮件通知。
通过自建ntfy接受gmail邮件通知。 怎么自建ntfy,后面再写。
2024年08月13日更新:
修改不通过添加邮件标签来标记已经发送的通知,通过Google Sheets来记录已经发送的通知。
为了不让Google Sheets文档的内容很多,导致文件变大,用脚本自动清理一个星期以前的数据。
准备工具
- Ntfy服务
- Google Script
- Google Sheets
操作步骤
- 在Ntfy后台账号,设置访问令牌。
- 添加订阅主题。
- 进入Google Sheets创建一个表格.记住id,如下图:
- 进入Google Script创建项目。填入以下代码(注意填入之前的ntfy地址和令牌):
```javascript function checkEmail() { var sheetId = "你的Google Sheets id"; // 替换为你的 Google Sheets ID var sheet = SpreadsheetApp.openById(sheetId).getActiveSheet();
// 清理一星期以前的数据 cleanOldData(sheet, 7 * 24 * 60); // 保留7天(即一周)内的数据
var sentEmails = getSentEmails(sheet);
var threads = GmailApp.search('is:unread'); Logger.log("Found threads: " + threads.length);
if (threads.length === 0) return;
threads.forEach(function(thread) { var threadId = thread.getId();
if (!sentEmails.includes(threadId)) { thread.getMessages().forEach(sendNtfyNotification); recordSentEmail(sheet, threadId); }
}); }
function sendNtfyNotification(email) { if (!email) { Logger.log("Email object is undefined or null."); return; }
var message = `发件人: ${email.getFrom() || "未知发件人"} 主题: ${email.getSubject() || "无主题"}
内容: ${email.getPlainBody() || "无内容"}`;
var url = "https://你的ntfy地址/Gmail"; var options = { method: "post", payload: message, headers: { Authorization: "Bearer Ntfy的令牌" }, muteHttpExceptions: true };
try { var response = UrlFetchApp.fetch(url, options); Logger.log("Response: " + response.getContentText()); } catch (e) { Logger.log("Error: " + e.message); } }
function getSentEmails(sheet) { var data = sheet.getDataRange().getValues(); return data.map(row => row[0]); // Assuming email IDs are stored in the first column }
function recordSentEmail(sheet, threadId) { sheet.appendRow([threadId, new Date()]); }
function cleanOldData(sheet, minutes) { var now = new Date(); var thresholdDate = new Date(now.getTime() - minutes * 60 * 1000); // 获取X分钟前的时间
var data = sheet.getDataRange().getValues(); var rowsToDelete = [];
data.forEach(function(row, index) { var date = new Date(row[1]); // 假设日期保存在第二列 if (date < thresholdDate) { rowsToDelete.push(index + 1); // 存储要删除的行号 } });
// 逆序删除(从最后一行开始删除,以避免行号改变) rowsToDelete.reverse().forEach(function(row) { sheet.deleteRow(row); }); }
```
5.Google Script是有限制的不能频繁调用,可以设置五分钟调用一次。如图:
结尾
本人不会代码,以上代码都是通过chatgpt生成的。经过多次修改,刚开始会一直发送通知,后面修改后将已发送的通知放到一个“通知”的标签里。后续不会再次发送通知。
如需要发送通知后自动标记已读,可以把代码复制到chatgpt给你写。
-
@ 58937958:545e6994
2025-01-02 12:32:512024年5月22日
ビットコイン・ピザ・デーに合わせてバッジャー君のピザパンを作りました
バッジャー君…日本のYoutubeチャンネル「ビットコイナー反省会」のキャラクター
ピザパン作りはかなり苦戦しました
1回目:米粉パン
イースト発酵だとキャラクターの形を作りにくい気がして(作っても発酵後に単なる丸になっちゃう懸念)
サイリウムを使った米粉パンにしたんですけど
何かこれじゃない感
2回目:クリームパン風
米粉パンが固かったので柔らかいパンが食べたくなりました
焦げました
3回目:チーズナン風
とろけるチーズ感を出したいな~と考えて
ここでようやくチーズナンを思いつく
キャラクター×ピザパンならこのチーズナン方式が結構いいかもしれない
もうちょっとシンプルなキャラクターだと作りやすそう(分かりやすそう)だと思いました nostr:nevent1qqsd3a7thkzqde4sp4hx7qjwrjp4kxsnl66kytx40mk73djfvxfkspgu2fw34
-
@ 7460b7fd:4fc4e74b
2024-09-05 08:37:48请看2014年王兴的一场思维碰撞,视频27分钟开始
最后,一个当时无法解决的点:丢失
-
@ 4523be58:ba1facd0
2024-05-28 11:05:17NIP-116
Event paths
Description
Event kind
30079
denotes an event defined by its event path rather than its event kind.The event directory path is included in the event path, specified in the event's
d
tag. For example, an event path might beuser/profile/name
, whereuser/profile
is the directory path.Relays should parse the event directory from the event path
d
tag and index the event by it. Relays should support "directory listing" of kind30079
events using the#f
filter, such as{"#f": ["user/profile"]}
.For backward compatibility, the event directory should also be saved in the event's
f
tag (for "folder"), which is already indexed by some relay implementations, and can be queried using the#f
filter.Event content should be a JSON-encoded value. An empty object
{}
signifies that the entry at the event path is itself a directory. For example, when savinguser/profile/name
:Bob
, you should also saveuser/profile
:{}
so the subdirectory can be listed underuser
.In directory names, slashes should be escaped with a double slash.
Example
Event
json { "tags": [ ["d", "user/profile/name"], ["f", "user/profile"] ], "content": "\"Bob\"", "kind": 30079, ... }
Query
json { "#f": ["user/profile"], "authors": ["[pubkey]"] }
Motivation
To make Nostr an "everything app," we need a sustainable way to support new kinds of applications. Browsing Nostr data by human-readable nested directories and paths rather than obscure event kind numbers makes the data more manageable.
Numeric event kinds are not sustainable for the infinite number of potential applications. With numeric event kinds, developers need to find an unused number for each new application and announce it somewhere, which is cumbersome and not scalable.
Directories can also replace monolithic list events like follow lists or profile details. You can update a single directory entry such as
user/profile/name
orgroups/follows/[pubkey]
without causing an overwrite of the whole profile or follow list when your client is out-of-sync with the most recent list version, as often happens on Nostr.Using
d
-tagged replaceable events for reactions, such as{tags: [["d", "reactions/[eventId]"]], content: "\"👍\"", kind: 30079, ...}
would make un-reacting trivial: just publish a new event with the samed
tag and an empty content. Toggling a reaction on and off would not cause a flurry of new reaction & delete events that all need to be persisted.Implementations
- Relays that support tag-replaceable events and indexing by arbitrary tags (in this case
f
) already support this feature. - IrisDB client side library: treelike data structure with subscribable nodes.
https://github.com/nostr-protocol/nips/pull/1266
- Relays that support tag-replaceable events and indexing by arbitrary tags (in this case
-
@ b60c3e76:c9d0f46e
2024-05-15 10:08:47KRIS menjamin semua golongan masyarakat mendapatkan perlakuan sama dari rumah sakit, baik pelayanan medis maupun nonmedis.
Demi memberikan peningkatan kualitas layanan kesehatan kepada masyarakat, pemerintah baru saja mengeluarkan Peraturan Presiden (Perpres) nomor 59 tahun 2024 tentang Jaminan Kesehatan. Melalui perpres itu, Presiden Joko Widodo (Jokowi) telah menghapus perbedaan kelas layanan 1, 2, dan 3 dalam Badan Penyelenggara Jaminan Sosial atau BPJS Kesehatan.
Layanan berbasis kelas itu diganti dengan KRIS (Kelas Rawat Inap Standar). Berkaitan dengan lahirnya Perpres 59/2024 tentang Perubahan Ketiga atas Perpres 82/2018 tentang Jaminan Kesehatan, Presiden Joko Widodo telah memerintahkan seluruh rumah sakit yang bekerja sama dengan BPJS Kesehatan melaksanakannya.
Kebijakan baru itu mulai berlaku per 8 Mei 2024 dan paling lambat 30 Juni 2025. Dalam jangka waktu tersebut, rumah sakit dapat menyelenggarakan sebagian atau seluruh pelayanan rawat inap berdasarkan KRIS sesuai dengan kemampuan rumah sakit.
Lantas apa yang menjadi pembeda dari sisi layanan dengan layanan rawat inap sesuai Perpres 59/2024? Dahulu sistem layanan rawat BPJS Kesehatan dibagi berdasarkan kelas yang dibagi masing-masing kelas 1, 2, dan 3. Namun, melalui perpres, layanan kepada masyarakat tidak dibedakan lagi.
Pelayanan rawat inap yang diatur dalam perpres itu--dikenal dengan nama KRIS—menjadi sistem baru yang digunakan dalam pelayanan rawat inap BPJS Kesehatan di rumah sakit-rumah sakit. Dengan KRIS, semua golongan masyarakat akan mendapatkan perlakuan yang sama dari rumah sakit, baik dalam hal pelayanan medis maupun nonmedis.
Dengan lahirnya Perpres 59/2024, tarif iuran BPJS Kesehatan pun juga akan berubah. Hanya saja, dalam Perpres itu belum dicantumkan secara rinci ihwal besar iuran yang baru. Besaran iuran baru BPJS Kesehatan itu sesuai rencana baru ditetapkan pada 1 Juli 2025.
“Penetapan manfaat, tarif, dan iuran sebagaimana dimaksud ditetapkan paling lambat tanggal 1 Juli 2025,” tulis aturan tersebut, dikutip Senin (13/5/2024).
Itu artinya, iuran BPJS Kesehatan saat ini masih sama seperti sebelumnya, yakni sesuai dengan kelas yang dipilih. Namun perpres itu tetap berlaku sembari menanti lahirnya peraturan lanjutan dari perpres tersebut.
Kesiapan Rumah Sakit
Berkaitan dengan lahirnya kebijakan layanan kesehatan tanpa dibedakan kelas lagi, Kementerian Kesehatan (Kemenkes) menegaskan mayoritas rumah sakit di Indonesia siap untuk menjalankan layanan KRIS untuk pasien BPJS Kesehatan.
Kesiapan itu diungkapkan oleh Dirjen Pelayanan Kesehatan Kemenkes Azhar Jaya. “Survei kesiapan RS terkait KRIS sudah dilakukan pada 2.988 rumah sakit dan yang sudah siap menjawab isian 12 kriteria ada sebanyak 2.233 rumah sakit,” ujar Azhar.
Sebagai informasi, KRIS adalah pengganti layanan Kelas 1, 2, dan 3 BPJS Kesehatan yang bertujuan untuk memberikan layanan kesehatan secara merata tanpa melihat besaran iurannya.
Melalui KRIS, rumah sakit perlu menyiapkan sarana dan prasarana sesuai dengan 12 kriteria kelas rawat inap standar secara bertahap. Apa saja ke-12 kriteria KRIS itu?
Sesuai bunyi Pasal 46A Perpres 59/2024, disyaratkan kriteria fasilitas perawatan dan pelayanan rawat inap KRIS meliputi komponen bangunan yang digunakan tidak boleh memiliki tingkat porositas yang tinggi serta terdapat ventilasi udara dan kelengkapan tidur.
Demikian pula soal pencahayaan ruangan. Perpres itu juga mengatur pencahayaan ruangan buatan mengikuti kriteria standar 250 lux untuk penerangan dan 50 lux untuk pencahayaan tidur, temperature ruangan 20--26 derajat celcius.
Tidak hanya itu, layanan rawat inap berdasarkan perpres itu mensyaratkan fasilitas layanan yang membagi ruang rawat berdasarkan jenis kelamin pasien, anak atau dewasa, serta penyakit infeksi atau noninfeksi.
Selain itu, kriteria lainnya adalah keharusan bagi penyedia layanan untuk mempertimbangkan kepadatan ruang rawat dan kualitas tempat tidur, penyediaan tirai atau partisi antartempat tidur, kamar mandi dalam ruangan rawat inap yang memenuhi standar aksesibilitas, dan menyediakan outlet oksigen.
Selain itu, kelengkapan tempat tidur berupa adanya dua kotak kontak dan nurse call pada setiap tempat tidur dan adanya nakas per tempat tidur. Kepadatan ruang rawat inap maksimal empat tempat tidur dengan jarak antara tepi tempat tidur minimal 1,5 meter.
Tirai/partisi dengan rel dibenamkan menempel di plafon atau menggantung. Kamar mandi dalam ruang rawat inap serta kamar mandi sesuai dengan standar aksesibilitas dan outlet oksigen.
Azhar menjamin, Kemenkes akan menjalankan hal tersebut sesuai dengan tupoksi yang ada. “Tentu saja kami akan bekerja sama dengan BPJS Kesehatan dalam implementasi dan pengawasannya di lapangan,” ujar Azhar.
Berkaitan dengan perpres jaminan kesehatan itu, Direktur Utama BPJS Kesehatan Ghufron Mukti menilai, perpres tersebut berorientasi pada penyeragaman kelas rawat inap yang mengacu pada 12 kriteria. "Bahwa perawatan ada kelas rawat inap standar dengan 12 kriteria, untuk peserta BPJS, maka sebagaimana sumpah dokter tidak boleh dibedakan pemberian pelayan medis atas dasar suku, agama, status sosial atau beda iurannya," ujarnya.
Jika ada peserta ingin dirawat pada kelas yang lebih tinggi, kata Ghufron, maka diperbolehkan selama hal itu dipengaruhi situasi nonmedis. Hal itu disebutkan dalam Pasal 51 Perpres Jaminan Kesehatan diatur ketentuan naik kelas perawatan.
Menurut pasal tersebut, naik kelas perawatan dilakukan dengan cara mengikuti asuransi kesehatan tambahan atau membayar selisih antara biaya yang dijamin oleh BPJS Kesehatan dengan biaya yang harus dibayar akibat peningkatan pelayanan.
Selisih antara biaya yang dijamin oleh BPJS Kesehatan dengan biaya pelayanan dapat dibayar oleh peserta bersangkutan, pemberi kerja, atau asuransi kesehatan tambahan.
Ghufron Mukti juga mengimbau pengelola rumah sakit tidak mengurangi jumlah tempat tidur perawatan pasien dalam upaya memenuhi kriteria KRIS. "Pesan saya jangan dikurangi akses dengan mengurangi jumlah tempat tidur. Pertahankan jumlah tempat tidur dan penuhi persyaratannya dengan 12 kriteria tersebut," tegas Ghufron.
Penulis: Firman Hidranto Redaktur: Ratna Nuraini/Elvira Inda Sari Sumber: Indonesia.go.id
-
@ 266815e0:6cd408a5
2024-05-09 17:23:28Lot of people are starting to talk about building a web-of-trust and how nostr can or is already being used as such
We all know about using the kind:3 following lists as a simple WoT that can be used to filter out spam. but as we all know it does not really signal "trust", its mostly just "I find your content interesting"
But what about real "trust"... well its kind of multi-denominational, I could trust that your a good developer or a good journalist but still not trust you enough to invite you over to my house. There are some interesting and clever solutions proposed for quantifying "trust" in a digital sense but I'm not going to get into that here. I want to talk about something that I have not see anyone discuss yet.
How is the web-of-trust maintained? or more precisely how do you expect users to update the digital representation of the "trust" of other users?
Its all well and good to think of how a user would create that "trust" of another user when discovering them for the first time. They would click the "follow" button, or maybe even rate them on a few topics with a 1/5 star system But how will a user remove that trust? how will they update it if things change and they trust them less?
If our goal is to model "trust" in a digital sense then we NEED a way for the data to stay up-to-date and as accurate as possible. otherwise whats the use? If we don't have a friction-less way to update or remove the digital representation of "trust" then we will end up with a WoT that continuously grows and everyone is rated 10/10
In the case of nostr kind:3 following lists. its pretty easy to see how these would get updated. If someone posts something I dislike or I notice I'm getting board of their content. then I just unfollow them. An important part here is that I'm not thinking "I should update my trust score of this user" but instead "I'm no longer interested, I don't want to see this anymore"
But that is probably the easiest "trust" to update. because most of us on social media spend some time curating our feed and we are used to doing it. But what about the more obscure "trust" scores? whats the regular mechanism by which a user would update the "honestly" score of another user?
In the real world its easy, when I stop trusting someone I simply stop associating with them. there isn't any button or switch I need to update. I simply don't talk to them anymore, its friction-less But in the digital realm I would have to remove or update that trust. in other words its an action I need to take instead of an action I'm not doing. and actions take energy.
So how do we reflect something in the digital world that takes no-energy and is almost subconscious in the real world?
TLDR; webs-of-trust are not just about scoring other users once. you must keep the score up-to-date
-
@ 266815e0:6cd408a5
2024-04-22 22:20:47While I was in Mediera with all the other awesome people at the first SEC cohort there where a lot of discussions around data storage on nostr and if it could be made censorship-resistent
I remember lots of discussions about torrents, hypercore, nostr relays, and of course IPFS
There were a few things I learned from all these conversations:
- All the existing solutions have one thing in common. A universal ID of some kind for files
- HTTP is still good. we don't have to throw the baby out with the bath water
- nostr could fix this... somehow
Some of the existing solutions work well for large files, and all of them are decentralization in some way. However none of them seem capable of serving up cat pictures for social media clients. they all have something missing...
An Identity system
An identity system would allow files to be "owned" by users. and once files have owners servers could start grouping files into a single thing instead of a 1000+ loose files
This can also greatly simplify the question of "what is spam" for a server hosting (or seeding) these files. since it could simply have a whitelist of owners (and maybe their friends)
What is blossom?
Blossom is a set of HTTP endpoints that allow nostr users to store and retrieve binary data on public servers using the sha256 hash as a universal id
What are Blobs?
blobs are chunks of binary data. they are similar to files but with one key difference, they don't have names
Instead blobs have a sha256 hash (like
b1674191a88ec5cdd733e4240a81803105dc412d6c6708d53ab94fc248f4f553
) as an IDThese IDs are universal since they can be computed from the file itself using the sha256 hashing algorithm ( you can get a files sha256 hash on linux using:
sha256sum bitcoin.pdf
)How do the servers work?
Blossom servers expose four endpoints to let clients and users upload and manage blobs
GET /<sha256>
(optional file.ext
)PUT /upload
Authentication
: Signed nostr event- Returns a blob descriptor
GET /list/<pubkey>
- Returns an array of blob descriptors
Authentication
(optional): Signed nostr eventDELETE /<sha256>
Authentication
: Signed nostr event
What is Blossom Drive?
Blossom Drive is a nostr app built on top of blossom servers and allows users to create and manage folders of blobs
What are Drives
Drives are just nostr events (kind
30563
) that store a map of blobs and what filename they should have along with some extra metadataAn example drive event would be
json { "pubkey": "266815e0c9210dfa324c6cba3573b14bee49da4209a9456f9484e5106cd408a5", "created_at": 1710773987, "content": "", "kind": 30563, "tags": [ [ "name", "Emojis" ], [ "description", "nostr emojis" ], [ "d", "emojis" ], [ "r", "https://cdn.hzrd149.com/" ], [ "x", "303f018e613f29e3e43264529903b7c8c84debbd475f89368cb293ec23938981", "/noStrudel.png", "15161", "image/png" ], [ "x", "a0e2b39975c8da1702374b3eed6f4c6c7333e6ae0008dadafe93bd34bfb2ca78", "/satellite.png", "6853", "image/png" ], [ "x", "e8f3fae0f4a43a88eae235a8b79794d72e8f14b0e103a0fed1e073d8fb53d51f", "/amethyst.png", "20487", "image/png" ], [ "x", "70bd5836807b916d79e9c4e67e8b07e3e3b53f4acbb95c7521b11039a3c975c6", "/nos.png", "36521", "image/png" ], [ "x", "0fc304630279e0c5ab2da9c2769e3a3178c47b8609b447a30916244e89abbc52", "/primal.png", "29343", "image/png" ], [ "x", "9a03824a73d4af192d893329bbc04cd3798542ee87af15051aaf9376b74b25d4", "/coracle.png", "18300", "image/png" ], [ "x", "accdc0cdc048f4719bb5e1da4ff4c6ffc1a4dbb7cf3afbd19b86940c01111568", "/iris.png", "24070", "image/png" ], [ "x", "2e740f2514d6188e350d95cf4756bbf455d2f95e6a09bc64e94f5031bc4bba8f", "/damus.png", "32758", "image/png" ], [ "x", "2e019f08da0c75fb9c40d81947e511c8f0554763bffb6d23a7b9b8c9e8c84abb", "/old emojis/astral.png", "29365", "image/png" ], [ "x", "d97f842f2511ce0491fe0de208c6135b762f494a48da59926ce15acfdb6ac17e", "/other/rabbit.png", "19803", "image/png" ], [ "x", "72cb99b689b4cfe1a9fb6937f779f3f9c65094bf0e6ac72a8f8261efa96653f5", "/blossom.png", "4393", "image/png" ] ] }
There is a lot going on but the main thing is the list of "x" tags and the path that describes the folder and filename the blob should live at
If your interested, the full event definition is at github.com/hzrd149/blossom-drive
Getting started
Like every good nostr client it takes a small instruction manual in order to use it properly. so here are the steps for getting started
1. Open the app
Open https://blossom.hzrd149.com
2. Login using extension
You can also login using any of the following methods using the input - NIP-46 with your https://nsec.app or https://flare.pub account - a NIP-46 connection string - an
ncryptsec
password protected private key - ansec
unprotected private key (please don't) - bunker:// URI from nsecbunker3. Add a blossom server
Right now
https://cdn.satellite.earth
is the only public server that is compatible with blossom drive. If you want to host your own I've written a basic implementation in TypeScript github.com/hzrd149/blossom-server4. Start uploading your files
NOTE: All files upload to blossom drive are public by default. DO NOT upload private files
5. Manage files
Encrypted drives
There is also the option to encrypt drives using NIP-49 password encryption. although its not tested at all so don't trust it, verify
Whats next?
I don't know, but Im excited to see what everyone else on nostr builds with this. I'm only one developer at the end of the day and I can't think of everything
also all the images in this article are stored in one of my blossom drives here
nostr:naddr1qvzqqqrhvvpzqfngzhsvjggdlgeycm96x4emzjlwf8dyyzdfg4hefp89zpkdgz99qq8xzun5d93kcefdd9kkzem9wvr46jka
-
@ 58937958:545e6994
2025-01-02 12:32:28October 31, 2024 I made pumpkin yokan to celebrate the anniversary of the Bitcoin whitepaper release.
*Yokan: A firm, jelly-like Japanese dessert typically made with azuki bean paste.
Cut a clear file into the shape of the Bitcoin logo.
Place the ₿ mark on a slightly firm milk jelly (gyunyukan) and carefully cut it out with a knife.
Fill the cut-out with pumpkin yokan.
The mixture I made was a bit firm, so it was challenging to fill the gaps in the ₿ shape. Later, I tried a milk-based yokan with a smoother texture, which made the process much easier.
nostr:nevent1qqszzcz9npq5xgw08tp5wud0kg9wfacf9fkj07gu82wn3wjsad3wd2cppvjdw
You don’t need any special molds, so anyone can try this! I’m thinking of experimenting with different variations of the milk jelly and applying this technique to other dishes as well.
-
@ f977c464:32fcbe00
2024-01-30 20:06:18Güneşin kaybolmasının üçüncü günü, saat öğlen on ikiyi yirmi geçiyordu. Trenin kalkmasına yaklaşık iki saat vardı. Hepimiz perondaydık. Valizlerimiz, kolilerimiz, renk renk ve biçimsiz çantalarımızla yan yana dizilmiş, kısa aralıklarla tepemizdeki devasa saati kontrol ediyorduk.
Ama ne kadar dik bakarsak bakalım zaman bir türlü istediğimiz hızla ilerlemiyordu. Herkes birkaç dakika sürmesi gereken alelade bir doğa olayına sıkışıp kalmış, karanlıktan sürünerek çıkmayı deniyordu.
Bekleme salonuna doğru döndüm. Nefesimden çıkan buharın arkasında, kalın taş duvarları ve camlarıyla morg kadar güvenli ve soğuk duruyordu. Cesetleri o yüzden bunun gibi yerlere taşımaya başlamışlardı. Demek insanların bütün iyiliği başkaları onları gördüğü içindi ki gündüzleri gecelerden daha karanlık olduğunda hemen birbirlerinin gırtlağına çökmüş, böğürlerinde delikler açmış, gözlerini oyup kafataslarını parçalamışlardı.
İstasyonun ışığı titrediğinde karanlığın enseme saplandığını hissettim. Eğer şimdi, böyle kalabalık bir yerde elektrik kesilse başımıza ne gelirdi?
İçerideki askerlerden biri bakışlarımı yakalayınca yeniden saate odaklanmış gibi yaptım. Sadece birkaç dakika geçmişti.
“Tarlalarım gitti. Böyle boyum kadar ayçiçeği doluydu. Ah, hepsi ölüp gidiyor. Afitap’ın çiçekleri de gi-”
“Dayı, Allah’ını seversen sus. Hepimizi yakacaksın şimdi.”
Karanlıkta durduğunda, görünmez olmayı istemeye başlıyordun. Kimse seni görmemeli, nefesini bile duymamalıydı. Kimsenin de ayağının altında dolaşmamalıydın; gelip kazayla sana çarpmamalılar, takılıp sendelememeliydiler. Yoksa aslında hedefi sen olmadığın bir öfke gürlemeye başlar, yaşadığın ilk şoku ve acıyı silerek üstünden geçerdi.
İlk konuşan, yaşlıca bir adam, kafasında kasketi, nasırlı ellerine hohluyordu. Gözleri ve burnu kızarmıştı. Güneşin kaybolması onun için kendi başına bir felaket değildi. Hayatına olan pratik yansımalarından korkuyordu olsa olsa. Bir anının kaybolması, bu yüzden çoktan kaybettiği birinin biraz daha eksilmesi. Hayatta kalmasını gerektiren sebepler azalırken, hayatta kalmasını sağlayacak kaynaklarını da kaybediyordu.
Onu susturan delikanlıysa atkısını bütün kafasına sarmış, sakalı ve yüzünün derinliklerine kaçmış gözleri dışında bedeninin bütün parçalarını gizlemeye çalışıyordu. İşte o, güneşin kaybolmasının tam olarak ne anlama geldiğini anlamamış olsa bile, dehşetini olduğu gibi hissedebilenlerdendi.
Güneşin onlardan alındıktan sonra kime verileceğini sormuyorlardı. En başta onlara verildiğinde de hiçbir soru sormamışlardı zaten.
İki saat ne zaman geçer?
Midemin üstünde, sağ tarafıma doğru keskin bir acı hissettim. Karaciğerim. Gözlerimi yumdum. Yanımda biri metal bir nesneyi yere bıraktı. Bir kafesti. İçerisindeki kartalın ıslak kokusu burnuma ulaşmadan önce bile biliyordum bunu.
“Yeniden mi?” diye sordu bana kartal. Kanatları kanlı. Zamanın her bir parçası tüylerinin üstüne çöreklenmişti. Gagası bir şey, tahminen et parçası geveliyor gibi hareket ediyordu. Eski anılar kolay unutulmazmış. Şu anda kafesinin kalın parmaklıklarının ardında olsa da bunun bir aldatmaca olduğunu bir tek ben biliyordum. Her an kanatlarını iki yana uzatıverebilir, hava bu hareketiyle dalgalanarak kafesi esneterek hepimizi içine alacak kadar genişleyebilir, parmaklıklar önce ayaklarımızın altına serilir gibi gözükebilir ama aslında hepimizin üstünde yükselerek tepemize çökebilirdi.
Aşağıya baktım. Tahtalarla zapt edilmiş, hiçbir yere gidemeyen ama her yere uzanan tren rayları. Atlayıp koşsam… Çantam çok ağırdı. Daha birkaç adım atamadan, kartal, suratını bedenime gömerdi.
“Bu sefer farklı,” diye yanıtladım onu. “Yeniden diyemezsin. Tekrarladığım bir şey değil bu. Hatta bir hata yapıyormuşum gibi tonlayamazsın da. Bu sefer, insanların hak etmediğini biliyorum.”
“O zaman daha vahim. Süzme salaksın demektir.”
“İnsanların hak etmemesi, insanlığın hak etmediği anlamına gelmez ki.”
Az önce göz göze geldiğim genççe ama çökük asker hâlâ bana bakıyordu. Bir kartalla konuştuğumu anlamamıştı şüphesiz. Yanımdakilerden biriyle konuştuğumu sanmış olmalıydı. Ama konuştuğum kişiye bakmıyordum ona göre. Çekingence kafamı eğmiştim. Bir kez daha göz göze geldiğimizde içerideki diğer iki askere bir şeyler söyledi, onlar dönüp beni süzerken dışarı çıktı.
Yanımızdaki, az önce konuşan iki adam da şaşkınlıkla bir bana bir kartala bakıyordu.
“Yalnız bu sefer kalbin de kırılacak, Prometheus,” dedi kartal, bana. “Belki son olur. Biliyorsun, bir sürü soruna neden oluyor bu yaptıkların.”
Beni koruyordu sözde. En çok kanıma dokunan buydu. Kasıklarımın üstüne oturmuş, kanlı suratının ardında gözleri parlarken attığı çığlık kulaklarımda titremeye devam ediyordu. Bu tabloda kimsenin kimseyi düşündüğü yoktu. Kartalın, yanımızdaki adamların, artık arkama kadar gelmiş olması gereken askerin, tren raylarının, geçmeyen saatlerin…
Arkamı döndüğümde, asker sahiden oradaydı. Zaten öyle olması gerekiyordu; görmüştüm bunu, biliyordum. Kehanetler… Bir şeyler söylüyordu ama ağzı oynarken sesi çıkmıyordu. Yavaşlamış, kendisini saatin akışına uydurmuştu. Havada donan tükürüğünden anlaşılıyordu, sinirliydi. Korktuğu için olduğunu biliyordum. Her seferinde korkmuşlardı. Beni unutmuş olmaları işlerini kolaylaştırmıyordu. Sadece yeni bir isim vermelerine neden oluyordu. Bu seferkiyle beni lanetleyecekleri kesinleşmişti.
Olması gerekenle olanların farklı olması ne kadar acınasıydı. Olması gerekenlerin doğasının kötücül olmasıysa bir yerde buna dayanıyordu.
“Salaksın,” dedi kartal bana. Zamanı aşan bir çığlık. Hepimizin önüne geçmişti ama kimseyi durduramıyordu.
Sonsuzluğa kaç tane iki saat sıkıştırabilirsiniz?
Ben bir tane bile sıkıştıramadım.
Çantama uzanıyordum. Asker de sırtındaki tüfeğini indiriyordu. Benim acelem yoktu, onunsa eli ayağı birbirine dolaşıyordu. Oysaki her şey tam olması gerektiği anda olacaktı. Kehanet başkasının parmaklarının ucundaydı.
Güneş, bir tüfeğin patlamasıyla yeryüzüne doğdu.
Rayların üzerine serilmiş göğsümün ortasından, bir çantanın içinden.
Not: Bu öykü ilk olarak 2021 yılında Esrarengiz Hikâyeler'de yayımlanmıştır.
-
@ 58937958:545e6994
2025-01-02 12:32:102024年10月31日 ビットコインホワイトペーパー公開の記念日に合わせてカボチャようかんを作りました
100均のクリアファイルをビットコインロゴマークに切り抜きます
ちょっと固めに作った牛乳かんに₿マークを乗せて 包丁を使って気合で切ります
カボチャようかんを入れます
この時作ったのはちょっと固い配合で₿の隙間に入れるのが難しかったです
後で牛乳入りのサラッとしたようかんも試しましたがそちらの方が作りやすかったです
nostr:nevent1qqszzcz9npq5xgw08tp5wud0kg9wfacf9fkj07gu82wn3wjsad3wd2cppvjdw
特別な型などは必要ないので誰でもできます
牛乳かんの部分を色々変えて 他の料理にも応用したいと思います
-
@ 3bf0c63f:aefa459d
2024-01-14 13:55:28O Planetinha
Fumaça verde me entrando pelas narinas e um coro desafinado fazia uma base melódica.
nos confins da galáxia havia um planetinha isolado. Era um planeta feliz.
O homem vestido de mago começava a aparecer por detrás da fumaça verde.
O planetinha recebeu três presentes, mas o seu habitante, o homem, estava num estado de confusão tão grande que ameaçava estragá-los. Os homens já havia escravizado o primeiro presente, a vida; lutavam contra o segundo presente, a morte; e havia alguns que achavam que deviam destruir totalmente o terceiro, o amor, e com isto levar a desordem total ao pobre planetinha perdido, que se chamava Terra.
O coro desafinado entrou antes do "Terra" cantando várias vezes, como se imitasse um eco, "terra-terra-terraaa". Depois de uma pausa dramática, o homem vestido de mago voltou a falar.
Terra, nossa nave mãe.
Neste momento eu me afastei. À frente do palco onde o mago e seu coral faziam apelos à multidão havia vários estandes cobertos com a tradicional armação de quatro pernas e lona branca. Em todos os cantos da praça havia gente, gente dos mais variados tipos. Visitantes curiosos que se aproximavam atraídos pela fumaça verde e as barraquinhas, gente que aproveitava o movimento para vender doces sem pagar imposto, casais que se abraçavam de pé para espantar o frio, os tradicionais corredores que faziam seu cooper, gente cheia de barba e vestida para imitar os hippies dos anos 60 e vender colares estendidos no chão, transeuntes novos e velhos, vestidos como baladeiros ou como ativistas do ônibus grátis, grupos de ciclistas entusiastas.
O mago fazia agora apelos para que nós, os homens, habitantes do isolado planetinha, passássemos a ver o planetinha, nossa nave mãe, como um todo, e adquiríssemos a consciência de que ele estava entrando em maus lençóis. A idéia, reforçada pela logomarca do evento, era que parássemos de olhar só para a nossa vida e pensássemos no planeta.
A logomarca do evento, um desenho estilizado do planeta Terra, nada tinha a ver com seu nome: "Festival Andando de Bem com a Vida", mas havia sido ali colocada estrategicamente pelos organizadores, de quem parecia justamente sair a mensagem dita pelo mago.
Aquela multidão de pessoas que, assim como eu, tinham suas próprias preocupações, não podiam ver o quadro caótico que formavam, cada uma com seus atos isolados, ali naquela praça isolada, naquele planeta isolado. Quando o hippie barbudo, quase um Osho, assustava um casal para tentar vender-lhes um colar, a quantidade de caos que isto acrescentava à cena era gigantesca. Por um segundo, pude ver, como se estivesse de longe e acima, com toda a pretensão que este estado imaginativo carrega, a cena completa do caos.
Uma nave-mãe, dessas de ficção científica, habitada por milhões de pessoas, seguia no espaço sem rumo, e sem saber que logo à frente um longo precipício espacial a esperava, para a desgraça completa sua e de seus habitantes.
Acostumados àquela nave tanto quanto outrora estiveram acostumados à sua terra natal, os homens viviam as próprias vidas sem nem se lembrar que estavam vagando pelo espaço. Ninguém sabia quem estava conduzindo a nave, e ninguém se importava.
No final do filme descobre-se que era a soma completa do caos que cada habitante produzia, com seus gestos egoístas e incapazes de levar em conta a totalidade, é que determinava a direção da nave-mãe. O efeito, no entanto, não era imediato, como nunca é. Havia gente de verdade encarregada de conduzir a nave, mas era uma gente bêbada, mau-caráter, que vivia brigando pelo controle da nave e o poder que isto lhes dava. Poder, status, dinheiro!
Essa gente bêbada era atraída até ali pela corrupção das instituições e da moral comum que, no fundo no fundo, era causada pelo egoísmo da população, através de um complexo -- mas que no filme aparece simplificado pela ação individual de um magnata do divertimento público -- processo social.
O homem vestido de mago era mais um agente causador de caos, com sua cena cheia de fumaça e sua roupa estroboscópica, ele achava que estava fazendo o bem ao alertar sua platéia, todos as sextas-feiras, de que havia algo que precisava ser feito, que cada um que estava ali ouvindo era responsável pelo planeta. A sua incapacidade, porém, de explicar o que precisava ser feito só aumentava a angústia geral; a culpa que ele jogava sobre seu público, e que era prontamente aceita e passada em frente, aos familiares e amigos de cada um, atormentava-os diariamente e os impedia de ter uma vida decente no trabalho e em casa. As famílias, estressadas, estavam constantemente brigando e os motivos mais insignificantes eram responsáveis pelas mais horrendas conseqüências.
O mago, que após o show tirava o chapéu entortado e ia tomar cerveja num boteco, era responsável por uma parcela considerável do caos que levava a nave na direção do seu desgraçado fim. No filme, porém, um dos transeuntes que de passagem ouviu um pedaço do discurso do mago despertou em si mesmo uma consiência transformadora e, com poderes sobre-humanos que lhe foram então concedidos por uma ordem iniciática do bem ou não, usando só os seus poderes humanos mesmo, o transeunte -- na primeira versão do filme um homem, na segunda uma mulher -- consegue consertar as instituições e retirar os bêbados da condução da máquina. A questão da moral pública é ignorada para abreviar a trama, já com duas horas e quarenta de duração, mas subentende-se que ela também fora resolvida.
No planeta Terra real, que não está indo em direção alguma, preso pela gravidade ao Sol, e onde as pessoas vivem a própria vida porque lhes é impossível viver a dos outros, não têm uma consciência global de nada porque só é possível mesmo ter a consciência delas mesmas, e onde a maioria, de uma maneira ou de outra, está tentando como pode, fazer as coisas direito, o filme é exibido.
Para a maioria dos espectadores, é um filme que evoca reflexões, um filme forte. Por um segundo elas têm o mesmo vislumbre do caos generalizado que eu tive ali naquela praça. Para uma pequena parcela dos espectadores -- entre eles alguns dos que estavam na platéia do mago, o próprio mago, o seguidor do Osho, o casal de duas mulheres e o vendedor de brigadeiros, mas aos quais se somam também críticos de televisão e jornal e gente que fala pelos cotovelos na internet -- o filme é um horror, o filme é uma vulgarização de um problema real e sério, o filme apela para a figura do herói salvador e passa uma mensagem totalmente errada, de que a maioria da população pode continuar vivendo as suas própria vidinhas miseráveis enquanto espera por um herói que vem do Olimpo e os salva da mixórdia que eles mesmos causaram, é um filme que presta um enorme desserviço à causa.
No dia seguinte ao lançamento, num bar meio caro ali perto da praça, numa mesa com oito pessoas, entre elas seis do primeiro grupo e oito do segundo, discute-se se o filme levará ou não o Oscar. Eu estou em casa dormindo e não escuto nada.
-
@ 24862769:20eb96a7
2025-01-02 11:34:12Over the years, the internet has become worse and worse, more and more portals are being destroyed. Everything was working fine around 2008-2010. Then it started to change for the worse... What am I talking about? Everything that was good for the internet. IRC, various chats on websites, ICQ, internet forums, or home pages, comments under articles which are now increasingly being forgotten in favor of centralized services, like Facebook or Discord.
People, instead of creating home pages, buying hosting, prefer to create fan pages on Facebook, and then they cry that Facebook blocked them for no reason. Bans for no reason on such portals are quite common. The same is with Discord, which is closed from the outside, and you can't find any posts that interest you without registering and entering a given server. In addition, there is the fact that for years you gather friends, you get close to them you talk about something every day, until you get banned for no reason. All friendships are lost, everything you wrote, everything you worked hard for - is lost, just because, no one cares...
Additionally, there are regulations and laws. In more and more countries, the age-verification law is starting to become fashionable - to be able to use a given portal, you have to be over 18 years old. Some people are happy about this, because children will not have access to some things, which I agree with. But unfortunately, this step will also affect adults, it will probably end with everyone having to show their ID card when registering for some services, and in the future, a digital ID. An additional step that will require additional effort from you. Anonymity will end, admins will know who you are and what your name is.
I think that one of the solutions is to decentralize everything. People should stop using Facebook or Discord in favor of more open solutions such as matrix.org or nostr. Thanks to many servers from different countries from different people, it will be difficult to have political censorship. Because a server from Russia will not obey the law from the USA, and vice versa. If you write something about Taiwan on a Chinese server, the post may be deleted, but in the USA it will be allowed. In addition, there are groundless bans, in such a "nostr", even if one server bans you, you have hundreds of others to choose from. But as you can see, most people do not think this way and continue to sit on these closed solutions like Facebook. Because of this, there are few interesting channels or people on matrix.org, and more bots that simply litter the channel. That is why I think that a grassroots initiative is needed to promote such solutions, some rich companies should look into this and start investing in open solutions.
Unfortunately, this is not the case, sites like Facebook are increasingly closed, they have increasingly strict user rights, you have to show them even a video of your face so that they can register you on it. And the average person does not see anything, they do not see that the Internet is going in a very bad direction through corporations like Facebook, Google. Oh well, let's hope that this will change someday, because if it continues like this the internet will become unusable...
-
@ f977c464:32fcbe00
2024-01-11 18:47:47Kendisini aynada ilk defa gördüğü o gün, diğerleri gibi olduğunu anlamıştı. Oysaki her insan biricik olmalıydı. Sözgelimi sinirlendiğinde bir kaşı diğerinden birkaç milimetre daha az çatılabilirdi veya sevindiğinde dudağı ona has bir açıyla dalgalanabilirdi. Hatta bunların hiçbiri mümkün değilse, en azından, gözlerinin içinde sadece onun sahip olabileceği bir ışık parlayabilirdi. Çok sıradan, öyle sıradan ki kimsenin fark etmediği o milyonlarca minik şeyden herhangi biri. Ne olursa.
Ama yansımasına bakarken bunların hiçbirini bulamadı ve diğer günlerden hiç de farklı başlamamış o gün, işe gitmek için vagonunun gelmesini beklediği alelade bir metro istasyonunda, içinde kaybolduğu illüzyon dağılmaya başladı.
İlk önce derisi döküldü. Tam olarak dökülmedi aslında, daha çok kıvılcımlara dönüşüp bedeninden fırlamış ve bir an sonra sönerek külleşmiş, havada dağılmıştı. Ardında da, kaybolmadan hemen önce, kısa süre için hayal meyal görülebilen, bir ruhun yok oluşuna ağıt yakan rengârenk peri cesetleri bırakmıştı. Beklenenin aksine, havaya toz kokusu yayıldı.
Dehşete düştü elbette. Dehşete düştüler. Panikle üstlerini yırtan 50 işçi. Her şeyin sebebiyse o vagon.
Saçları da döküldü. Her tel, yere varmadan önce, her santimde ikiye ayrıla ayrıla yok oldu.
Bütün yüzeylerin mat olduğu, hiçbir şeyin yansımadığı, suyun siyah aktığı ve kendine ancak kameralarla bakabildiğin bir dünyada, vagonun içine yerleştirilmiş bir aynadan ilk defa kendini görmek.
Gözlerinin akları buharlaşıp havada dağıldı, mercekleri boşalan yeri doldurmak için eriyip yayıldı. Gerçeği görmemek için yaratılmış, bu yüzden görmeye hazır olmayan ve hiç olmayacak gözler.
Her şeyin o anda sona erdiğini sanabilirdi insan. Derin bir karanlık ve ölüm. Görmenin görmek olduğu o anın bitişi.
Ben geldiğimde ölmüşlerdi.
Yani bozulmuşlardı demek istiyorum.
Belleklerini yeni taşıyıcılara takmam mümkün olmadı. Fiziksel olarak kusursuz durumdaydılar, olmayanları da tamir edebilirdim ama tüm o hengamede kendilerini baştan programlamış ve girdilerini modifiye etmişlerdi.
Belleklerden birini masanın üzerinden ileriye savurdu. Hınca hınç dolu bir barda oturuyorlardı. O ve arkadaşı.
Sırf şu kendisini insan sanan androidler travma geçirip delirmesin diye neler yapıyoruz, insanın aklı almıyor.
Eliyle arkasını işaret etti.
Polislerin söylediğine göre biri vagonun içerisine ayna yerleştirmiş. Bu zavallılar da kapı açılıp bir anda yansımalarını görünce kafayı kırmışlar.
Arkadaşı bunların ona ne hissettirdiğini sordu. Yani o kadar bozuk, insan olduğunu sanan androidi kendilerini parçalamış olarak yerde görmek onu sarsmamış mıydı?
Hayır, sonuçta belirli bir amaç için yaratılmış şeyler onlar. Kaliteli bir bilgisayarım bozulduğunda üzülürüm çünkü parasını ben vermişimdir. Bunlarsa devletin. Bana ne ki?
Arkadaşı anlayışla kafasını sallayıp suyundan bir yudum aldı. Kravatını biraz gevşetti.
Bira istemediğinden emin misin?
İstemediğini söyledi. Sahi, neden deliriyordu bu androidler?
Basit. Onların yapay zekâlarını kodlarken bir şeyler yazıyorlar. Yazılımcılar. Biliyorsun, ben donanımdayım. Bunlar da kendilerini insan sanıyorlar. Tiplerine bak.
Sesini alçalttı.
Arabalarda kaza testi yapılan mankenlere benziyor hepsi. Ağızları burunları bile yok ama şu geldiğimizden beri sakalını düzeltip duruyor mesela. Hayır, hepsi de diğerleri onun sakalı varmış sanıyor, o manyak bir şey.
Arkadaşı bunun delirmeleriyle bağlantısını çözemediğini söyledi. O da normal sesiyle konuşmaya devam etti.
Anlasana, aynayı falan ayırt edemiyor mercekleri. Lönk diye kendilerini görüyorlar. Böyle, olduğu gibi...
Nedenmiş peki? Ne gerek varmış?
Ne bileyim be abicim! Ahiret soruları gibi.
Birasına bakarak dalıp gitti. Sonra masaya abanarak arkadaşına iyice yaklaştı. Bulanık, bir tünelin ucundaki biri gibi, şekli şemalı belirsiz bir adam.
Ben seni nereden tanıyorum ki ulan? Kimsin sen?
Belleği makineden çıkardılar. İki kişiydiler. Soruşturmadan sorumlu memurlar.
─ Baştan mı başlıyoruz, diye sordu belleği elinde tutan ilk memur.
─ Bir kere daha deneyelim ama bu sefer direkt aynayı sorarak başla, diye cevapladı ikinci memur.
─ Bence de. Yeterince düzgün çalışıyor.
Simülasyon yüklenirken, ayakta, biraz arkada duran ve alnını kaşıyan ikinci memur sormaktan kendisini alamadı:
─ Bu androidleri niye böyle bir olay yerine göndermişler ki? Belli tost olacakları. İsraf. Gidip biz baksak aynayı kırıp delilleri mahvetmek zorunda da kalmazlar.
Diğer memur sandalyesinde hafifçe dönecek oldu, o sırada soruyu bilgisayarın hoparlöründen teknisyen cevapladı.
Hangi işimizde bir yamukluk yok ki be abi.
Ama bir son değildi. Üstlerindeki tüm illüzyon dağıldığında ve çıplak, cinsiyetsiz, birbirinin aynı bedenleriyle kaldıklarında sıra dünyaya gelmişti.
Yere düştüler. Elleri -bütün bedeni gibi siyah turmalinden, boğumları çelikten- yere değdiği anda, metronun zemini dağıldı.
Yerdeki karolar öncesinde beyazdı ve çok parlaktı. Tepelerindeki floresan, ışığını olduğu gibi yansıtıyor, tek bir lekenin olmadığı ve tek bir tozun uçmadığı istasyonu aydınlatıyorlardı.
Duvarlara duyurular asılmıştı. Örneğin, yarın akşam kültür merkezinde 20.00’da başlayacak bir tekno blues festivalinin cıvıl cıvıl afişi vardı. Onun yanında daha geniş, sarı puntolu harflerle yazılmış, yatay siyah kesiklerle çerçevesi çizilmiş, bir platformdan düşen çöp adamın bulunduğu “Dikkat! Sarı bandı geçmeyin!” uyarısı. Biraz ilerisinde günlük resmi gazete, onun ilerisinde bir aksiyon filminin ve başka bir romantik komedi filminin afişleri, yapılacakların ve yapılmayacakların söylendiği küçük puntolu çeşitli duyurular... Duvar uzayıp giden bir panoydu. On, on beş metrede bir tekrarlanıyordu.
Tüm istasyonun eni yüz metre kadar. Genişliği on metre civarı.
Önlerinde, açık kapısından o mendebur aynanın gözüktüğü vagon duruyordu. Metro, istasyona sığmayacak kadar uzundu. Bir kılıcın keskinliğiyle uzanıyor ama yer yer vagonların ek yerleriyle bölünüyordu.
Hiçbir vagonda pencere olmadığı için metronun içi, içlerindekiler meçhuldü.
Sonrasında karolar zerrelerine ayrılarak yükseldi. Floresanın ışığında her yeri toza boğdular ve ortalığı gri bir sisin altına gömdüler. Çok kısa bir an. Afişleri dalgalandırmadılar. Dalgalandırmaya vakitleri olmadı. Yerlerinden söküp aldılar en fazla. Işık birkaç kere sönüp yanarak direndi. Son kez söndüğünde bir daha geri gelmedi.
Yine de etraf aydınlıktı. Kırmızı, her yere eşit dağılan soluk bir ışıkla.
Yer tamamen tele dönüşmüştü. Altında çapraz hatlarla desteklenmiş demir bir iskelet. Işık birkaç metreden daha fazla aşağıya uzanamıyordu. Sonsuzluğa giden bir uçurum.
Duvarın yerini aynı teller ve demir iskelet almıştı. Arkasında, birbirine vidalarla tutturulmuş demir plakalardan oluşan, üstünden geçen boruların ek yerlerinden bazen ince buharların çıktığı ve bir süre asılı kaldıktan sonra ağır, yağlı bir havayla sürüklendiği bir koridor.
Diğer tarafta paslanmış, pencerelerindeki camlar kırıldığı için demir plakalarla kapatılmış külüstür bir metro. Kapının karşısındaki aynadan her şey olduğu gibi yansıyordu.
Bir konteynırın içini andıran bir evde, gerçi gayet de birbirine eklenmiş konteynırlardan oluşan bir şehirde “andıran” demek doğru olmayacağı için düpedüz bir konteynırın içinde, masaya mum görüntüsü vermek için koyulmuş, yarı katı yağ atıklarından şekillendirilmiş kütleleri yakmayı deniyordu. Kafasında hayvan kıllarından yapılmış grili siyahlı bir peruk. Aynı kıllardan kendisine gür bir bıyık da yapmıştı.
Üstünde mavi çöp poşetlerinden yapılmış, kravatlı, şık bir takım.
Masanın ayakları yerine oradan buradan çıkmış parçalar konulmuştu: bir arabanın şaft mili, üst üste konulmuş ve üstünde yazı okunamayan tenekeler, boş kitaplar, boş gazete balyaları... Hiçbir şeye yazı yazılmıyordu, gerek yoktu da zaten çünkü merkez veri bankası onları fark ettirmeden, merceklerden giren veriyi sentezleyerek insanlar için dolduruyordu. Yani, androidler için. Farklı şekilde isimlendirmek bir fark yaratacaksa.
Onların mercekleri için değil. Bağlantıları çok önceden kopmuştu.
─ Hayatım, sofra hazır, diye bağırdı yatak odasındaki karısına.
Sofrada tabak yerine düz, bardak yerine bükülmüş, çatal ve bıçak yerine sivriltilmiş plakalar.
Karısı salonun kapısında durakladı ve ancak kulaklarına kadar uzanan, kocasınınkine benzeyen, cansız, ölü hayvanların kıllarından ibaret peruğunu eliyle düzeltti. Dudağını, daha doğrusu dudağının olması gereken yeri koyu kırmızı bir yağ tabakasıyla renklendirmeyi denemişti. Biraz da yanaklarına sürmüştü.
─ Nasıl olmuş, diye sordu.
Sesi tek düzeydi ama hafif bir neşe olduğunu hissettiğinize yemin edebilirdiniz.
Üzerinde, çöp poşetlerinin içini yazısız gazete kağıtlarıyla doldurarak yaptığı iki parça giysi.
─ Çok güzelsin, diyerek kravatını düzeltti kocası.
─ Sen de öylesin, sevgilim.
Yaklaşıp kocasını öptü. Kocası da onu. Sonra nazikçe elinden tutarak, sandalyesini geriye çekerek oturmasına yardım etti.
Sofrada yemek niyetine hiçbir şey yoktu. Gerek de yoktu zaten.
Konteynırın kapısı gürültüyle tekmelenip içeri iki memur girene kadar birbirlerine öyküler anlattılar. O gün neler yaptıklarını. İşten erken çıkıp yemyeşil çimenlerde gezdiklerini, uçurtma uçurduklarını, kadının nasıl o elbiseyi bulmak için saatlerce gezip yorulduğunu, kocasının kısa süreliğine işe dönüp nasıl başarılı bir hamleyle yaşanan krizi çözdüğünü ve kadının yanına döndükten sonra, alışveriş merkezinde oturdukları yeni dondurmacının dondurmalarının ne kadar lezzetli olduğunu, boğazlarının ağrımasından korktuklarını...
Akşam film izleyebilirlerdi, televizyonda -boş ve mat bir plaka- güzel bir film oynayacaktı.
İki memur. Çıplak bedenleriyle birbirinin aynı. Ellerindeki silahları onlara doğrultmuşlardı. Mum ışığında, tertemiz bir örtünün serili olduğu masada, bardaklarında şaraplarla oturan ve henüz sofranın ortasındaki hindiye dokunmamış çifti gördüklerinde bocaladılar.
Hiç de androidlere bilinçli olarak zarar verebilecek gibi gözükmüyorlardı.
─ Sessiz kalma hakkına sahipsiniz, diye bağırdı içeri giren ikinci memur. Söylediğiniz her şey...
Cümlesini bitiremedi. Yatak odasındaki, masanın üzerinden gördüğü o şey, onunla aynı hareketleri yapan android, yoksa, bir aynadaki yansıması mıydı?
Bütün illüzyon o anda dağılmaya başladı.
Not: Bu öykü ilk olarak 2020 yılında Esrarengiz Hikâyeler'de yayımlanmıştır.
-
@ cf7ed325:050194cf
2025-01-02 11:29:45The Sonesta St. George Nile Cruise offers a luxurious way to explore the timeless wonders of Egypt. As one of the premier vessels cruising the Nile, it provides an exceptional blend of comfort, elegance, and rich history. The cruise takes you on an unforgettable journey between Luxor and Aswan, offering a perfect balance of relaxation and exploration.
Onboard, guests enjoy spacious cabins, fine dining, and a range of amenities, ensuring a comfortable experience while cruising along the Nile. The Sonesta St. George Nile Cruise is known for its impeccable service and stunning views of the Nile River, providing a truly unique way to experience Egypt's ancient sites.
If you're seeking an alternative luxury experience, the Oberoi Zahra Nile Cruise offers another top-tier option. This cruise is renowned for its ultra-luxurious amenities and intimate atmosphere, making it ideal for those looking for a more exclusive Nile experience. Similarly, the Oberoi Philae Nile Cruise combines exceptional service with exquisite decor, perfect for travelers looking to immerse themselves in Egypt's history and beauty.
For those who prefer a slightly more modern touch, the Movenpick Sunray Nile Cruise and the Movenpick Darakum Nile Cruise provide a blend of contemporary luxury and traditional charm. Both cruises feature world-class facilities, including spacious cabins, excellent dining options, and guided excursions to iconic sites such as the Valley of the Kings and Karnak Temple.
If you’re looking for more variety, the Historia Nile Cruise offers a unique experience with its classic elegance and attention to detail, while the Farah Nile Cruise is another luxurious option with exceptional service.
For an unforgettable Nile adventure, you might also consider the Jaz Regent Nile Cruise or one of the Sonesta Sun Goddess Nile Cruise, Sonesta Star Goddess Nile Cruise, Sonesta Moon Goddess Nile Cruise, and Sonesta Nile Goddess Nile Cruise. Each of these cruises offers a distinct experience, ensuring that every traveler can find the perfect fit for their journey down the Nile.
🌐 Visit us at www.etbtoursegypt.com 📲 Contact us now! +20 10 21100873 📧 Email: info@etbtours.com 🏢 Company Address: 4 El Lebeny Axis , Nazlet Al Batran , Al Haram, Giza , Egypt
-
@ 32e18276:5c68e245
2023-12-06 15:29:43I’m going to be on an ordinals panels as one of the people who is counter arguing the claim that they are good for bitcoin. I decided to brush up on the technicals on how inscriptions work. I am starting to see luke’s perspective on how it is exploiting a loophole in bitcoin’s anti-data-spam mechanisms.
Storing data in Bitcoin, the “standard” way
The standard way you add “data” to bitcoin is by calling the OP_RETURN opcode. Bitcoin devs noticed that people were storing data (like the bitcoin whitepaper) in the utxo set via large multisig transactions. The problem with this is that this set is unprunable and could grow over time. OP_RETURN outputs on the other-hand are provably prunable and don’t add to utxo bloat.
Here’s an excerpt from the march 2014 0.9.0 release notes that talks about this:
On OP_RETURN: There was been some confusion and misunderstanding in the community, regarding the OP_RETURN feature in 0.9 and data in the blockchain. This change is not an endorsement of storing data in the blockchain. The OP_RETURN change creates a provably-prunable output, to avoid data storage schemes – some of which were already deployed – that were storing arbitrary data such as images as forever-unspendable TX outputs, bloating bitcoin’s UTXO database. Storing arbitrary data in the blockchain is still a bad idea; it is less costly and far more efficient to store non-currency data elsewhere.
Much of the work on bitcoin core has been focused on making sure the system continues to function in a decentralized way for its intended purpose in the presence of people trying to abuse it for things like storing data. Bitcoin core has always discouraged this, as it is not designed for storage of images and data, it is meant for moving digital coins around in cyberspace.
To help incentive-align people to not do stupid things, OP_RETURN transactions were not made non-standard, so that they are relayable by peers and miners, but with the caveat:
- They can only push 40 bytes (later increased to 80,83, I’m guessing to support larger root merkle hashes since that is the only sane usecase for op_return)
Bitcoin also added an option called -datacarriersize which limits the total number of bytes from these outputs that you will relay or mine.
Why inscriptions are technically an exploit
Inscriptions get around the datacarriersize limit by disguising data as bitcoin script program data via OP_PUSH inside OP_IF blocks. Ordinals do not use OP_RETURN and are not subjected to datacarriersize limits, so noderunners and miners currently have limited control over the total size of this data that they wish to relay and include in blocks. Luke’s fork of bitcoin-core has some options to fight this spam, so hopefully we will see this in core sometime soon as well.
Inscriptions are also taking advantage of features in segwit v1 (witness discount) and v2/taproot (no arbitrary script size limit). Each of these features have interesting and well-justified reasons why they were introduced.
The purpose of the witness discount was to make it cheaper to spend many outputs which helps the reduction of the utxo set size. Inscriptions took advantage of this discount to store monke jpegs disguised as bitcoin scripts. Remember, bitcoin is not for storing data, so anytime bitcoin-devs accidentally make it cheap and easy to relay data then this should be viewed as an exploit. Expect it to be fixed, or at least provide tools to noderunners for fighting this spam.
Where do we go from here
The interesting part of this story is that people seem to attach value to images stored on the bitcoin blockchain, and they are willing to pay the fee to get it in the block, so non-ideologic miners and people who don’t care about the health and decentralization of bitcoin are happy to pay or collect the fee and move on.
Data should not get a discount, people should pay full price if they want to store data. They should just use op_return and hashes like opentimestamps or any other reasonable protocol storing data in bitcoin.
After going through this analysis I’ve come to the opinion that this is a pretty bad data-spam exploit and bitcoin devs should be working on solutions. Ideological devs like luke who actually care about the health and decentralization of the network are and I’m glad to see it.
-
@ 8fb140b4:f948000c
2023-11-21 21:37:48Embarking on the journey of operating your own Lightning node on the Bitcoin Layer 2 network is more than just a tech-savvy endeavor; it's a step into a realm of financial autonomy and cutting-edge innovation. By running a node, you become a vital part of a revolutionary movement that's reshaping how we think about money and digital transactions. This role not only offers a unique perspective on blockchain technology but also places you at the heart of a community dedicated to decentralization and network resilience. Beyond the technicalities, it's about embracing a new era of digital finance, where you contribute directly to the network's security, efficiency, and growth, all while gaining personal satisfaction and potentially lucrative rewards.
In essence, running your own Lightning node is a powerful way to engage with the forefront of blockchain technology, assert financial independence, and contribute to a more decentralized and efficient Bitcoin network. It's an adventure that offers both personal and communal benefits, from gaining in-depth tech knowledge to earning a place in the evolving landscape of cryptocurrency.
Running your own Lightning node for the Bitcoin Layer 2 network can be an empowering and beneficial endeavor. Here are 10 reasons why you might consider taking on this task:
-
Direct Contribution to Decentralization: Operating a node is a direct action towards decentralizing the Bitcoin network, crucial for its security and resistance to control or censorship by any single entity.
-
Financial Autonomy: Owning a node gives you complete control over your financial transactions on the network, free from reliance on third-party services, which can be subject to fees, restrictions, or outages.
-
Advanced Network Participation: As a node operator, you're not just a passive participant but an active player in shaping the network, influencing its efficiency and scalability through direct involvement.
-
Potential for Higher Revenue: With strategic management and optimal channel funding, your node can become a preferred route for transactions, potentially increasing the routing fees you can earn.
-
Cutting-Edge Technological Engagement: Running a node puts you at the forefront of blockchain and bitcoin technology, offering insights into future developments and innovations.
-
Strengthened Network Security: Each new node adds to the robustness of the Bitcoin network, making it more resilient against attacks and failures, thus contributing to the overall security of the ecosystem.
-
Personalized Fee Structures: You have the flexibility to set your own fee policies, which can balance earning potential with the service you provide to the network.
-
Empowerment Through Knowledge: The process of setting up and managing a node provides deep learning opportunities, empowering you with knowledge that can be applied in various areas of blockchain and fintech.
-
Boosting Transaction Capacity: By running a node, you help to increase the overall capacity of the Lightning Network, enabling more transactions to be processed quickly and at lower costs.
-
Community Leadership and Reputation: As an active node operator, you gain recognition within the Bitcoin community, which can lead to collaborative opportunities and a position of thought leadership in the space.
These reasons demonstrate the impactful and transformative nature of running a Lightning node, appealing to those who are deeply invested in the principles of bitcoin and wish to actively shape its future. Jump aboard, and embrace the journey toward full independence. 🐶🐾🫡🚀🚀🚀
-
-
@ 07041e3c:9548823b
2025-01-02 11:17:37כיבוש הארץ הוא לא תחום עיסוקו הבלעדי של צבא לאומי תחת הפיקוד של שלטון מרכזי. יש זכאות לציבור כיחידים וכקבוצות (שבטים) להתארגן ולפעול באופן עצמאי ללא נטילת רשות מישות לאומית, ולפי העולה מהמקורות, הוא אפילו דבר מתבקש ומבורך.
סדרה של כיבושים פרטיים בעבר הירדן בימי משה
אחרי שמשה משמיד את סיחון ועוג, השטחים שהיו בשליטתם בעבר הירדן המזרחי נופלים בפני בני ישראל להשתלט עליהם. ואכן היו כאלה שיצאו למבצעי כיבוש על דעת ובכוחות עצמם (במדבר לב:לט):
וַיֵּלְכוּ בְּנֵי מָכִיר בֶּן־מְנַשֶּׁה גִּלְעָדָה וַיִּלְכְּדֻהָ וַיּוֹרֶשׁ אֶת־הָאֱמֹרִי אֲשֶׁר־בָּהּ׃
משפחה בודדת משתלטת על שטח ומטפלת באוכלוסיה המקומית ללא תמיכה של שלטון מרכזי כלשהו. מתברר שפעולה זאת היתה בהסכמת משה והוא אכן מאשרר אותה באופן מיידי(שם לב:מ):
וַיִּתֵּן מֹשֶׁה אֶת־הַגִּלְעָד לְמָכִיר בֶּן־מְנַשֶּׁה וַיֵּשֶׁב בָּהּ׃
יאיר בן מנשה אולי קיבל השראה ממכיר והוא יוצא לכבוש לעצמו שטחי מרעה ומחנות לגידול צאן (שם לב:מא):
וְיָאִיר בֶּן־מְנַשֶּׁה הָלַךְ וַיִּלְכֹּד אֶת־חַוֺּתֵיהֶם וַיִּקְרָא אֶתְהֶן חַוֺּת יָאִיר׃
באותו פרק זמן גם אצל נבח בוער הרצון לחיות כישות ריבונית עצמאית וכנראה הדרך לעשות זאת היא על ידי יציאה לכיבוש שטחים באופן פרטי ולקחת עליהם בעלות. לא נראה שהוא ביקש את הרשות של מישהו (שם לב:מב):
וְנֹבַח הָלַךְ וַיִּלְכֹּד אֶת־קְנָת וְאֶת־בְּנֹתֶיהָ וַיִּקְרָא לָה נֹבַח בִּשְׁמוֹ׃
ככה שטיינזלץ מתאר את נבח:
נֹבַח, שלא ידוע מי הוא, אך מן הסתם היה אדם הרפתקן שהעדיף להיות רועה צאן במזרח הפרוע ולא להתגורר כחקלאי בארץ כנען, ועל כן הצטרף לחצי שבט מנשה
כיבושי יהושע נועדו להכין תשתית לכיבושים פרטיים
יהושע א -יב מתאר את מלחמותיו יחד עם ולמען כלל האומה. עד כדי כך שיהושע יא:כג אומר:
וַיִּקַּח יְהוֹשֻׁעַ אֶת־כׇּל־הָאָרֶץ כְּכֹל אֲשֶׁר דִּבֶּר ה' אֶל־מֹשֶׁה וַיִּתְּנָהּ יְהוֹשֻׁעַ לְנַחֲלָה לְיִשְׂרָאֵל כְּמַחְלְקֹתָם לְשִׁבְטֵיהֶם וְהָאָרֶץ שָׁקְטָה מִמִּלְחָמָה׃
אבל ביג:א הוא אומר:
וִיהוֹשֻׁעַ זָקֵן בָּא בַּיָּמִים וַיֹּאמֶר ה' אֵלָיו אַתָּה זָקַנְתָּה בָּאתָ בַיָּמִים וְהָאָרֶץ נִשְׁאֲרָה הַרְבֵּה־מְאֹד לְרִשְׁתָּהּ׃
אז אם יהושע לקח "את כל הארץ" אז איך "והארץ נשארה הרבה מאד לרשתה"? הרלב"ג (יא:ג) מסביר:
והנה נזכר אחר זה כי כבר נשאר הרבה עדיין מן הארץ לרשתה אלא שעכ"ז כבר חלקה להם יהושע בנחלה לישראל לשבטיהם כמו שזכר אחר זה, וזכר עם זה שהארץ שקטה ממלחמה כי לא היו נלחמים עם ישראל ולא ישראל עמם ואף על פי שכבר נשאר הרבה מן הארץ לרשתה,
חלוקת הארץ לנחלות שבטיות היתה בעצם חלוקת גזרות בהן כל שבט ישלים את העבודה באופן עצמאי. וכיבושי יהושע היו הכנת מצב בו יש לשבטים נקודת התחלה מצויינת להשלים כיבושים.
כיבוש חברון על ידי כלב בן יפונה
החל מפרק יג, מתוארת חלוקת הנחלות לכל שבט ושבט. במעמד זה, כלב בן יפונה מבקש מיהושע את הזכויות לחברון - הזכות לפעול באופן עצמאי ולקחת את העיר כנחלה (יהושע יד:יב):
וְעַתָּה תְּנָה־לִּי אֶת־הָהָר הַזֶּה אֲשֶׁר־דִּבֶּר ה' בַּיּוֹם הַהוּא כִּי אַתָּה־שָׁמַעְתָּ בַיּוֹם הַהוּא כִּי־עֲנָקִים שָׁם וְעָרִים גְּדֹלוֹת בְּצֻרוֹת אוּלַי ה' אוֹתִי וְהוֹרַשְׁתִּים כַּאֲשֶׁר דִּבֶּר ה':
אין כאן בקשה מיהושע להקצות לו כוח צבאי כלל-ישראלי למשימת כיבוש העיר, אלא רק הרשות לפעול באופן עצמאי ולקבל את העיר.
יהושע נענה לבקשה:
וַיְבָרְכֵהוּ יְהוֹשֻׁעַ וַיִּתֵּן אֶת־חֶבְרוֹן לְכָלֵב בֶּן־יְפֻנֶּה לְנַחֲלָה׃
אנחנו עוד נראה שיהושע אכן מאיץ בשאר השבטים לנהוג באופן דומה, אך הם פחות נענים למשימה. ואכן כלב מבצע פעולה צבאית כאדם פרטי (טו:יד):
וַיֹּרֶשׁ מִשָּׁם כָּלֵב אֶת־שְׁלוֹשָׁה בְּנֵי הָעֲנָק אֶת־שֵׁשַׁי וְאֶת־אֲחִימַן וְאֶת־תַּלְמַי יְלִידֵי הָעֲנָק׃
כלב ממשיך לכיבוש נוסף ללא נטילת רשות מיהושע
מיד לאחר מכן כלב ממשיך במסע הכיבושים הפרטי שלו:
וַיַּעַל מִשָּׁם אֶל־יֹשְׁבֵי דְּבִר וְשֵׁם־דְּבִר לְפָנִים קִרְיַת־סֵפֶר׃
וכאן, כלב מגלה יכולת אופרטיבית גבוהה - הוא מוציא מכרז בַּמָּקום לכיבוש העיר שמושך אליו את אחד הכישרונות הגדולים של אותו הדור שמבצע את המשימה בהצלחה (יהושע טו:טו):
וַיֹּאמֶר כָּלֵב אֲשֶׁר־יַכֶּה אֶת־קִרְיַת־סֵפֶר וּלְכָדָהּ וְנָתַתִּי לוֹ אֶת־עַכְסָה בִתִּי לְאִשָּׁה׃ וַיִּלְכְּדָהּ עׇתְנִיאֵל בֶּן־קְנַז אֲחִי כָלֵב וַיִּתֶּן־לוֹ אֶת־עַכְסָה בִתּוֹ לְאִשָּׁה׃
ביקורת יהושע על העדר יוזמה פרטית של שבטים להשלים כיבושים
אמנם יהושע הכין תשתית להשתלטות ישראלית על כל ארץ כנען, אבל לא כל השבטים היה ביכולתם או היה ברצונם להשלים אותה (יהושע יז:יב):
וְלֹא יָכְלוּ בְּנֵי מְנַשֶּׁה לְהוֹרִישׁ אֶת־הֶעָרִים הָאֵלֶּה וַיּוֹאֶל הַכְּנַעֲנִי לָשֶׁבֶת בָּאָרֶץ הַזֹּאת׃
אולי הכנענים יושבי העמקים היו כוח צבאי יותר רציני מיושבי הר חברון וסביבותיה. אולי לא הוגן שיצא הגורל לשבטים עם צרכים גדולים במיוחד לנחלות בהן יש קושי בהתמודדות עם אוכלוסיה מקומית עם יתרון צבאי משמעותי:
וַיֹּאמְרוּ בְּנֵי יוֹסֵף לֹא־יִמָּצֵא לָנוּ הָהָר וְרֶכֶב בַּרְזֶל בְּכׇל־הַכְּנַעֲנִי הַיֹּשֵׁב בְּאֶרֶץ־הָעֵמֶק לַאֲשֶׁר בְּבֵית־שְׁאָן וּבְנוֹתֶיהָ וְלַאֲשֶׁר בְּעֵמֶק יִזְרְעֶאל׃
יהושע בכל זאת מתעקש שהם לא יוותרו על השטחים הנ"ל וכי בשלב כלשהו יהיה ביכולתם להשלים את ההשתלטות על נחלתם (שם יז:יח):
כִּי הַר יִהְיֶה־לָּךְ כִּי־יַעַר הוּא וּבֵרֵאתוֹ וְהָיָה לְךָ תֹּצְאֹתָיו כִּי־תוֹרִישׁ אֶת־הַכְּנַעֲנִי כִּי רֶכֶב בַּרְזֶל לוֹ כִּי חָזָק הוּא׃
רש"י במקום מסביר:
כִּי חָזָק הוּא. וְאַתָּה יֵשׁ בְּךָ הַיְכוֹלֶת וְתּוֹרִישֶׁנּוּ
וזה תמצית הביקורת של יהושע (שםיח:ג):
וַיֹּאמֶר יְהוֹשֻׁעַ אֶל־בְּנֵי יִשְׂרָאֵל עַד־אָנָה אַתֶּם מִתְרַפִּים לָבוֹא לָרֶשֶׁת אֶת־הָאָרֶץ אֲשֶׁר נָתַן לָכֶם ה' אֱלֹהֵי אֲבוֹתֵיכֶם :
וסיכום העניין הוא שעדיין יש עבודת כיבוש , והיא מוטלת על כל שבט ושבט, ולא על כח צבאי לאומי. ויש בידם להצליח (שם כג:ד-ה):
רְאוּ הִפַּלְתִּי לָכֶם אֶת־הַגּוֹיִם הַנִּשְׁאָרִים הָאֵלֶּה בְּנַחֲלָה לְשִׁבְטֵיכֶם מִן־הַיַּרְדֵּן וְכׇל־הַגּוֹיִם אֲשֶׁר הִכְרַתִּי וְהַיָּם הַגָּדוֹל מְבוֹא הַשָּׁמֶשׁ׃ וַה' אֱ-לֹהֵיכֶם הוּא יֶהְדֳּפֵם מִפְּנֵיכֶם וְהוֹרִישׁ אֹתָם מִלִּפְנֵיכֶם וִירִשְׁתֶּם אֶת־אַרְצָם כַּאֲשֶׁר דִּבֶּר ה' אֱ-לֹהֵיכֶם לָכֶם׃
רש"י במקום מסביר:
רְאוּ הִפַּלְתִּי לָכֶם. בְּגוֹרָל לְנַחֲלָה
מלחמת דבורה וברק היתה וולונטרית
אז אחרי מות יהושע נשארו חלקים רבים מהארץ שמהם לא גורשו הכנעני והשלטון הישראלי בהם היה רופף אם בכלל. בימי דבורה הוחלט לבצע מהלך שישנה את המציאות הגאו-פוליטית באזור, אך באופן מצומצם על ידי שני שבטים בלבד, ללא גיוס של כלל האומה. (שופטים ד:ו):
וַתִּשְׁלַח וַתִּקְרָא לְבָרָק בֶּן־אֲבִינֹעַם מִקֶּדֶשׁ נַפְתָּלִי וַתֹּאמֶר אֵלָיו הֲלֹא צִוָּה יְהֹוָה אֱלֹהֵי־יִשְׂרָאֵל לֵךְ וּמָשַׁכְתָּ בְּהַר תָּבוֹר וְלָקַחְתָּ עִמְּךָ עֲשֶׂרֶת אֲלָפִים אִישׁ מִבְּנֵי נַפְתָּלִי וּמִבְּנֵי זְבֻלוּן׃׃
אבל בפועל דבורה מזכירה שבטים נוספים לשבח - שבטים שנראה שהצטרפו למלחמה לצידם של דבורה וברק (שם ה:יד):
מִנִּי אֶפְרַיִם שׇׁרְשָׁם בַּעֲמָלֵק אַחֲרֶיךָ בִנְיָמִין בַּעֲמָמֶיךָ מִנִּי מָכִיר יָרְדוּ מְחֹקְקִים וּמִזְּבוּלֻן מֹשְׁכִים בְּשֵׁבֶט סֹפֵר׃
וְשָׂרַי בְּיִשָּׂשכָר עִם־דְּבֹרָה וְיִשָּׂשכָר כֵּן בָּרָק בָּעֵמֶק שֻׁלַּח בְּרַגְלָיו בִּפְלַגּוֹת רְאוּבֵן גְּדֹלִים חִקְקֵי־לֵב׃לעומתם היו שבטים ומשפחות שנמנעו מלהשתתף ודבורה מזכירה אותם בשמותם (שם ה:טו):
לָמָּה יָשַׁבְתָּ בֵּין הַמִּשְׁפְּתַיִם לִשְׁמֹעַ שְׁרִקוֹת עֲדָרִים לִפְלַגּוֹת רְאוּבֵן גְּדוֹלִים חִקְרֵי־לֵב׃ גִּלְעָד בְּעֵבֶר הַיַּרְדֵּן שָׁכֵן וְדָן לָמָּה יָגוּר אֳנִיּוֹת אָשֵׁר יָשַׁב לְחוֹף יַמִּים וְעַל מִפְרָצָיו יִשְׁכּוֹן׃
אך הביקורת היא לא חריפה במיוחד ומבטאת אולי אכזבה יותר מכל דבר אחר, דבר שמובן אם המלחמה הזאת היתה על בסיס מתנדבים משבטים אחרים.
בני דן מרחיקים לצפון
תמצית המעשה של בני דן מובא כבר ביהושע (יט:מז):
וַיֵּצֵא גְבוּל־בְּנֵי־דָן מֵהֶם וַיַּעֲלוּ בְנֵי־דָן וַיִּלָּחֲמוּ עִם־לֶשֶׁם וַיִּלְכְּדוּ אוֹתָהּ וַיַּכּוּ אוֹתָהּ לְפִי־חֶרֶב וַיִּרְשׁוּ אוֹתָהּ וַיֵּשְׁבוּ בָהּ וַיִּקְרְאוּ לְלֶשֶׁם דָּן כְּשֵׁם דָּן אֲבִיהֶם׃
עיקר תיאור המעשה הוא בשופטים, וכדאי לציין את הרקע (יח:א-ב):
בַּיָּמִים הָהֵם אֵין מֶלֶךְ בְּיִשְׂרָאֵל וּבַיָּמִים הָהֵם שֵׁבֶט הַדָּנִי מְבַקֶּשׁ־לוֹ נַחֲלָה לָשֶׁבֶת כִּי לֹא־נָפְלָה לּוֹ עַד־הַיּוֹם הַהוּא בְּתוֹךְ־שִׁבְטֵי יִשְׂרָאֵל בְּנַחֲלָה׃
מסתבר שכל שבט אחראי לכבוש לעצמו את נחלתו או לפחות שטח שהיא "מן ההפקר", כדי שאנשיו יוכלו ליישב את הארץ כבני אדם חופשיים. כמו בני יוסף בכבוש בית אל (שופטים ב), בני דן פועלים באופן עצמאי עוד החל משלב איסוף המודיעין:
וַיִּשְׁלְחוּ בְנֵי־דָן מִמִּשְׁפַּחְתָּם חֲמִשָּׁה אֲנָשִׁים מִקְצוֹתָם אֲנָשִׁים בְּנֵי־חַיִל מִצׇּרְעָה וּמֵאֶשְׁתָּאֹל לְרַגֵּל אֶת־הָאָרֶץ וּלְחׇקְרָהּ וַיֹּאמְרוּ אֲלֵהֶם לְכוּ חִקְרוּ אֶת־הָאָרֶץ וַיָּבֹאוּ הַר־אֶפְרַיִם עַד־בֵּית מִיכָה וַיָּלִינוּ שָׁם׃
שאר הסיפור ידוע, ואזור "לשם" בצפון היה ידוע ומפורסם בפי כל כ"דן".
בני שמעון מתרחבים למדבריות ערב
כיבוש שטחים בארץ אדום הדרומית ("מְבוֹא גְדֹר עַד לְמִזְרַח הַגָיְא")
בדברי הימים א מובאת רשימת היוחסין של שבט שמעון. נחלתם היתה בדרום הארץ על גבול המדבר ובעקבות גידול באוכלוסין, חבל ארץ זה לא הספיק למחייתם, במיוחד בגלל שעסקו ברעיית צאן (ולא בחקלאות) והם היו זקוקים לשטחים נוספים (דה"י א ד:לח):
אֵלֶּה הַבָּאִים בְּשֵׁמוֹת נְשִׂיאִים בְּמִשְׁפְּחוֹתָם וּבֵית אֲבוֹתֵיהֶם פָּרְצוּ לָרוֹב:
כמו בני יוסף ובני דן לפניהם, הם מקדימים לאסוף מודיעין על האזור אותו הם מעוניינים לתקוף (שם שם:לט-מ):
וַיֵּלְכוּ לִמְבוֹא גְדֹר עַד לְמִזְרַח הַגָּיְא לְבַקֵּשׁ מִרְעֶה לְצֹאנָם: וַיִּמְצְאוּ מִרְעֶה שָׁמֵן וָטוֹב וְהָאָרֶץ רַחֲבַת יָדַיִם וְשֹׁקֶטֶת וּשְׁלֵוָה כִּי מִן־חָם הַיֹּשְׁבִים שָׁם לְפָנִים׃
לאחר שמתברר שיש סיכוי גבוה למבצע צבאי מוצלח הם תוקפים (שם שם:מא):
וַיָּבֹאוּ אֵלֶּה הַכְּתוּבִים בְּשֵׁמוֹת בִּימֵי יְחִזְקִיָּהוּ מֶלֶךְ־יְהוּדָה וַיַּכּוּ אֶת־אׇהֳלֵיהֶם וְאֶת־[הַמְּעוּנִים] (המעינים) אֲשֶׁר נִמְצְאוּ־שָׁמָּה וַיַּחֲרִימֻם עַד־הַיּוֹם הַזֶּה וַיֵּשְׁבוּ תַּחְתֵּיהֶם כִּי־מִרְעֶה לְצֹאנָם שָׁם׃
חשוב לציין כי האירוע הזה התרחש בימי חזקיהו המלך, תקופה בה היה קיים שלטון ריכוזי חזק, וסביר להניח גם בעל יכולות צבאיות בשביל לבצע את הפעולה הזאת בעצמו, אך אין פה שום רמז לכך שבני שמעון, "אלה הכתובים בשמות", חשבו להתייעץ או לקבל אישור מהשלטון בירושלים ליציאה למבצע הזה.
מחיית עמלק בהר שעיר
ההתרחבות של בני שמעון לא הסתיימה בכיבוש הנ"ל, אלא המשיכה בהר שעיר על ידי קבוצה מצומצמת, שכנראה קיבלה רוח במפרסים בעקבות ההצלחה הקודמת (שם:מב):
וּמֵהֶם מִן־בְּנֵי שִׁמְעוֹן הָלְכוּ לְהַר שֵׂעִיר אֲנָשִׁים חֲמֵשׁ מֵאוֹת וּפְלַטְיָה וּנְעַרְיָה וּרְפָיָה וְעֻזִּיאֵל בְּנֵי יִשְׁעִי בְּרֹאשָׁם׃
לא מוזכר מה גרם להם לעשות זאת אבל סביר להניח שהיה מדובר באנשים שהחירות האישית שלהם היתה חשובה עבורם ורצו לחיות ללא תלות באחרים, אפילו אחיהם לשבט (שם:מג):
וַיַּכּוּ אֶת־שְׁאֵרִית הַפְּלֵטָה לַעֲמָלֵק וַיֵּשְׁבוּ שָׁם עַד הַיּוֹם הַזֶּה׃
בני ראובן משתלטים על המדבר הסוּרי
גם בני ראובן התרבו עד אשר לא יכלה נחלתם המקורית לשאת אותם והם נאלצו להרחיב את יישוביהם מעבר לתחום הגלעד, עד למדבר הסורי בואכה הפרת (שם ה:ט):
וְלַמִּזְרָח יָשַׁב עַד־לְבוֹא מִדְבָּרָה לְמִן־הַנָּהָר פְּרָת כִּי מִקְנֵיהֶם רָבוּ בְּאֶרֶץ גִּלְעָד׃
אך התרחבותם נתקלה באוכלוסיות מקומיות שכנראה לא איפשרו להם חופש תנועה, עד למצב בו הם היו צריכים להשתמש באלימות כדי לחיות ללא הפרעה (שם ה:י):
וּבִימֵי שָׁאוּל עָשׂוּ מִלְחָמָה עִם־הַהַגְרִאִים וַיִּפְּלוּ בְּיָדָם וַיֵּשְׁבוּ בְּאׇהֳלֵיהֶם עַל־כׇּל־פְּנֵי מִזְרָח לַגִּלְעָד׃
'דעת מקרא' על הפסוק אמנם טוען ששאול הוביל את המלחמה והיא לא נעשית באופן פרטי, אך אין זכר לכך במפרשים המסורתיים וגם לשון הפסוק תומך ברעיון שבני ראובן פעלו על דעת ובכוחות עצמם.
נפילה והתאוששות
הכיבושים הנ"ל לא החזיקו מעמד לאורך התקופות ובעקבות התחזקות ארם בסוף המאה ה9 והשתלטות אלימה של ארם על אותם אזורים בהם ישבו בני ראובן, בני ראובן ספגו אבידות מרובות ונאלצו לסגת לנחלתם המצומצמת (מלבים, שם ה:יט):
בימי יהואחז מלך ישראל שאז גבר עליהם יד מלך ארם וישימם כעפר לדוש (כנזכר מלכים ב י״ג:ז׳ ושם יד), ואז שבו ההגריאים ונתישבו במקומם
אחרי שבני ראובן התחזקו וארם נחלשה הם חברו יחד לבני גד ולחצי שבט מנשה, התארגנו צבאית, ויצאו למבצע רחב היקף נגד האוכלוסיות הערביות באזור (ה:יח-יט):
בְּנֵי־רְאוּבֵן וְגָדִי וַחֲצִי שֵׁבֶט־מְנַשֶּׁה מִן־בְּנֵי־חַיִל אֲנָשִׁים נֹשְׂאֵי מָגֵן וְחֶרֶב וְדֹרְכֵי קֶשֶׁת וּלְמוּדֵי מִלְחָמָה אַרְבָּעִים וְאַרְבָּעָה אֶלֶף וּשְׁבַע־מֵאוֹת וְשִׁשִּׁים יֹצְאֵי צָבָא׃ וַיַּעֲשׂוּ מִלְחָמָה עִם־הַהַגְרִיאִים וִיטוּר וְנָפִישׁ וְנוֹדָב׃
הם נהנו מהצלחה מרובה והצליחו לחדש את יישובם באזורים האלה, יישוב שהחזיק מעמד עד לימי תגלת פלאסר - סוף תקופת הממלכה (ה:כ-כב):
וַיֵּעָזְרוּ עֲלֵיהֶם וַיִּנָּתְנוּ בְיָדָם הַהַגְרִיאִים וְכֹל שֶׁעִמָּהֶם כִּי לֵא-לֹהִים זָעֲקוּ בַּמִּלְחָמָה וְנַעְתּוֹר לָהֶם כִּי־בָטְחוּ בוֹ׃ וַיִּשְׁבּוּ מִקְנֵיהֶם גְּמַלֵּיהֶם חֲמִשִּׁים אֶלֶף וְצֹאן מָאתַיִם וַחֲמִשִּׁים אֶלֶף וַחֲמוֹרִים אַלְפָּיִם וְנֶפֶשׁ אָדָם מֵאָה אָלֶף׃ כִּי־חֲלָלִים רַבִּים נָפָלוּ כִּי מֵהָאֱ-לֹהִים הַמִּלְחָמָה וַיֵּשְׁבוּ תַחְתֵּיהֶם עַד־הַגֹּלָה׃
לסיכום
מאחר שהאינדיבדואליזם הוא חלק בלתי נפרד מהאתוס העברי, גם מצוות החלות על כלל האומה לא יכולות להיות מקויימות כתיקונן אלא אם כן יש ביטוי לרצון וליוזמה של היחיד. יישוב/כיבוש הארץ הוא אחד מהמצוות האלה ומתרחש בשני מישורים: 1. במישור הלאומי - כיבושים שנחוצים לביסוס גרעין התיישבותי של כלל האומה ולכן משתתף בהם צבא לאומי ממלכתי. 2. במישור השבטי/פרטי - כיבושים אופציונלים שהשלמתם תלויה ברצון וביוזמה של קבוצות מצומצמות (שבטים) ויחידים.
-
@ cf7ed325:050194cf
2025-01-02 10:08:45Port Said shore excursions , a vibrant port city located on the Mediterranean coast of Egypt, offers a variety of exciting shore excursions for cruise passengers. These excursions provide a unique opportunity to explore Egypt's rich history and culture. Whether you're interested in ancient monuments or bustling city life, there’s something for everyone.
One of the top experiences is the Day Trip to Islamic and Coptic Cairo from Port Said Shore excursions, where you can immerse yourself in the history of Cairo's Islamic and Coptic heritage. Explore the famous mosques, churches, and ancient buildings that make Cairo a cultural treasure trove.
For those looking for a more comprehensive tour, the 2 Day Tours to Cairo and Alexandria From Port Said Excursions offers an extended experience, combining the wonders of Cairo with the Mediterranean charm of Alexandria. This two-day adventure covers iconic landmarks like the Great Pyramids, the Sphinx, and the Alexandria Library.
If you're short on time but still want to experience the highlights of Egypt, consider the Day tour to the Pyramids included Lunch Cruise from Port Said port. This excursion lets you visit the Pyramids of Giza, followed by a relaxing lunch cruise on the Nile, offering a perfect blend of history and leisure.
Another popular choice is the Day Trip in Cairo to visit Pyramids of Giza and Saqqara from Port Said Shore excursions. This tour takes you to the ancient Step Pyramid of Saqqara and the iconic Pyramids of Giza, giving you a deep dive into Egypt’s ancient civilization.
Finally, the Explore Pyramids of Giza through Cairo day tour from Port Said Port is an excellent option for those eager to explore Egypt’s most famous monuments in a single day. No matter which excursion you choose, Port Said shore excursions offer an unforgettable way to experience Egypt’s wonders.
🌐 Visit us at www.etbtoursegypt.com 📲 Contact us now! +20 10 21100873 📧 Email: info@etbtours.com 🏢 Company Address: 4 El Lebeny Axis , Nazlet Al Batran , Al Haram, Giza , Egypt
-
@ de496884:72617b81
2023-11-20 13:54:02Hola nostriches. Hoy quiero hacer una publicación a modo de acercamiento al surgimiento de las categorías de género y feminismo. Así que si te interesa el tema haz un esfuerzo, quédate y lee hasta el final.
El «nuevo» feminismo surge en los años 60 en aquellos países desarrollados que acordaron el reconocimiento a los derechos humanos contenidos en la declaración respectiva de la ONU. Entonces, como extensión a dicho reconocimiento es que se gesta el movimiento feminista. A partir de entonces, se vuelve a plantear la relación entre naturaleza y cultura y se llega a la conclusión de que las diferencias sociales van más allá de las diferencias biológicas, lo cual tiene que ver con que hasta la satisfacción de las necesidades elementales como son la alimentación, la vivienda o el vestuario, están condicionadas por construcciones sociales.
Pues resulta que una de las primeras propuestas identificó la subordinación femenina producto de una organización patriarcal, tomando la categoría patriarcado de Max Weber. Es así como la visión de patriarcado se extendió al discurso político y académico. Sin embargo, no existía información acerca del desarrollo histórico de dicha categoría, sistematización, variaciones, etc., debido a que era algo que recién se percibía en sociedad.
Sin embargo, la misma categoría de patriarcado junto a la de relaciones de poder para explicar fenómenos sociales contemporáneos, constituye uno de los principales aportes del feminismo. Es así como han logrado primero visibilizar y luego deconstruir y desmontar una serie de patrones existentes en la cultura que hacían a la mujer subordinarse al hombre, y que estaban presentes en el sistema sexo/género.
Imagen relativa a la lucha contra el patriarcado
Hasta ese momento, en las investigaciones de corte sociológico se podía observar un androcentrismo excesivo al dar cuenta de que el discurso científico giraba en torno al hombre como sujeto y objeto de la investigación. Incluso para muchos positivistas como el mismo Weber, los problemas relativos a las mujeres quedaban en un segundo plano y eran achacados a una supuesta pasividad en el ámbito doméstico-familiar. Dicha pasividad partía de la supuesta inferioridad biológica del género femenino.
El patriarcado entonces era una categoría vacía en sí misma, sin valor explicativo. Desde el punto de vista político pudo ser útil para la movilización pero no resistió la polémica de los críticos del feminismo ni problematizó los conflictos a ser resueltos. Pero por otro lado, un grupo de mujeres -académicas principalmente- se puso manos a la obra en una tarea más pequeña pero con mayores resultados a la larga. Se propusieron generar conocimientos sobre las condiciones de vida de la mujer, buscar en el pasado y el presente los aportes de las mujeres a la sociedad, hacerlas visibles en la historia. Es así como surgen centros académicos, ONG, proyectos, centros de estudios sobre la mujer, etc.
Convendría distinguir entonces dos posturas que acompañaron a la investigación sobre las mujeres: uno que toma como objeto de estudio a la mujer; condiciones de vida, trabajo, cultura, y otra que privilegia a la sociedad como generadora de la subordinación de las mujeres. Mientras la primera perspectiva generaba conocimiento sobre las mujeres en el estudio de las relaciones mujer-hombre y mujer-mujer, la segunda tenía una visión más holística ya que planteaba que hay que estudiar la sociedad ya que la subordinación de las mujeres es producto de la organización de esta, y que no se avanzará solamente estudiando a las mujeres, pues el estudio debe ser más amplio y en diferentes niveles, ámbitos y tiempos.
Es en esta búsqueda donde nace y se desarrolla el concepto de género como categoría social. Es así que los sistemas de género/sexo fueron entendidos como conjuntos de prácticas, símbolos, representaciones, normas y valores sociales que las sociedades construyen a partir de la diferencia anatomofisiológica y que dotan de sentido a los impulsos sexuales, la reproducción y en general a las relaciones de las personas. Por tanto, este sistema pasó a ser el objeto de estudio para comprender la subordinación de la mujer al hombre. Al ser el reconocimiento de una dimensión de la desigualdad social hasta entonces desconocida, se considera la ruptura epistemológica más importante de la segunda mitad del siglo pasado.
Imagen representativa del binarismo de género
Hay que decir que los fenómenos sociales se definen por la relación que guardan entre sí. Es así que la contextualización adquiere gran importancia. Varones y hembras tenemos la capacidad de producir con el cuerpo, pero solo los cuerpos de las hembras pueden gestar y por tanto asegurar la especie humana. Todo grupo humano que pretenda sobrevivir debe asegurarse cierto número de hembras que lo hagan posible. De ahí un poder particular del cuerpo de las hembras que además es económicamente útil. Dicho poder no es en tanto entidad biológica, sino que es la sociedad la que le otorga este poder. En este punto es importante preguntarnos históricamente ¿quiénes han controlado la capacidad reproductiva de las mujeres?, ¿quiénes han tenido la preferencia en el acceso sexual? Para asegurar un control efectivo sobre la reproducción es necesario asegurar el acceso a la sexualidad.
Ello también lleva a dirigir el trabajo que hacen porque de lo contrario, las mujeres pudieran tener espacio para representar una amenaza al dominio de los hombres. Es importante atender a las etapas del desarrollo de las mujeres, que permitirá ver cómo se moldean para aceptar la desigualdad y las jerarquías según el género en las distintas sociedades y culturas.
Otro contexto a delimitar es el ámbito doméstico donde históricamente ha estado ubicada la subordinación femenina. Se ha puesto al descubierto que en mujeres que comparten la misma posición de clase y raza, la condición femenina se redefine a lo largo de la vida y que algunas mujeres gozan de poder sobre otras aún en contextos de alta dominación masculina, donde se les inviste de autoridad, creando el sistema zonas de incertidumbre que las divide como género e impide alianzas y se legitima la dominación. Foucault decía que «el poder se ejerce, no se posee», siempre está en peligro de perderse y no basta con normas, leyes, amenazas o castigos. De ahí que los espacios de subordinación sean también espacios de poder de las mujeres. Es en estos espacios donde aparece la inseguridad, la tensión, la confrontación y por ejemplo, las mujeres pueden reclamar la anticoncepción.
Para terminar, es importante tener en cuenta que el género es una forma de desigualdad social que siempre está articulado con otras formas de desigualdad ya sea clase, raza, grupo etario, etc. Hay que pensar la dominación masculina con un comienzo vago en el tiempo, pero que permite desligar la subordinación de las mujeres de la evolución «natural» de la humanidad y entenderla como un proceso histórico. En ese sentido es necesario destacar que, respecto a la raza, en sociedades plurales hay que atender al contexto étnico-cultural ya que en dependencia de las relaciones entre personas de razas distintas, estarán condicionadas las relaciones entre los géneros.
Imagen de mujeres de distintas razas
Por otro lado, si bien es sabido que históricamente el sistema de género social imperante ha contribuido a invisibilizar a la mujer, asociar necesariamente dicha categoría únicamente a ella, lo que hace es nuevamente recrear el absolutismo histórico que tanto daño ha hecho, ahora como lo antagónico al hombre. En la construcción social participan todos los individuos presentes en el sistema género.
Hasta aquí la publicación de hoy, de la cual aun se puede ahondar mucho más, sobre todo en lo referido al origen de la dominación o de la jerarquización del binomio «hombre/mujer» desde un punto de vista antropológico, pero eso quedará pendiente para otro momento. ¡Así que hasta la próxima!, ¡nos vemos en Nostr!
........................................
English version
Hello nostriches. Today I want to make a post by way of an approach to the emergence of the categories of gender and feminism. So if you are interested in the topic make an effort, stay and read to the end.
The "new" feminism emerged in the 60's in those developed countries that agreed to recognize the human rights contained in the respective UN declaration. Then, as an extension of that recognition, the feminist movement was born. From then on, the relationship between nature and culture was raised again and the conclusion was reached that social differences go beyond biological differences, which has to do with the fact that even the satisfaction of elementary needs such as food, housing or clothing are conditioned by social constructions.
It turns out that one of the first proposals identified female subordination as a product of a patriarchal organization, taking Max Weber's category of patriarchy. This is how the vision of patriarchy was extended to political and academic discourse. However, there was no information about the historical development of this category, systematization, variations, etc., because it was something that was only recently perceived in society.
However, the same category of patriarchy, together with that of power relations to explain contemporary social phenomena, constitutes one of the main contributions of feminism. This is how they have first made visible and then deconstructed and dismantled a series of existing patterns in the culture that made women subordinate to men, and that were present in the sex/gender system.
Image relating to the fight against patriarchy
Up to that time, in sociological research, an excessive androcentrism could be observed as scientific discourse revolved around men as the subject and object of research. Even for many positivists such as Weber himself, the problems related to women remained in the background and were blamed on a supposed passivity in the domestic-family sphere. This passivity was based on the supposed biological inferiority of the female gender.
Patriarchy was then an empty category in itself, with no explanatory value. From the political point of view, it could be useful for mobilization, but it did not resist the polemic of feminism's critics, nor did it problematize the conflicts to be resolved. But on the other hand, a group of women - mainly academics - set to work on a smaller task but with greater results in the long run. They set out to generate knowledge about women's living conditions, to search in the past and present for women's contributions to society, to make them visible in history. This is how academic centers, NGOs, projects, women's studies centers, etc., came into being.
It would be convenient to distinguish then two postures that accompanied the research on women: one that takes women as the object of study; living conditions, work, culture, and the other that privileges society as the generator of women's subordination. While the first perspective generated knowledge about women in the study of woman-man and woman-woman relations, the second had a more holistic vision, since it proposed that society must be studied, since the subordination of women is a product of its organization, and that progress will not be made only by studying women, since the study must be broader and at different levels, spheres and times.
It is in this search that the concept of gender as a social category was born and developed. Thus, gender/sex systems were understood as a set of practices, symbols, representations, norms and social values that societies construct on the basis of anatomophysiological differences and that give meaning to sexual impulses, reproduction and, in general, to people's relationships. Therefore, this system became the object of study to understand the subordination of women to men. As the recognition of a hitherto unknown dimension of social inequality, it is considered the most important epistemological breakthrough of the second half of the last century.
Representative image of gender binarism
It must be said that social phenomena are defined by their relationship with each other. Thus, contextualization acquires great importance. Males and females have the capacity to produce with their bodies, but only the bodies of females can gestate and therefore ensure the human species. Any human group that intends to survive must ensure a certain number of females to make it possible. Hence a particular power of the female body, which is also economically useful. This power is not as a biological entity, but it is society that gives it this power. At this point it is important to ask ourselves historically, who has controlled the reproductive capacity of women, who has had the preference in sexual access? To ensure effective control over reproduction, it is necessary to ensure access to sexuality.
Allegorical image of pregnancy
This also leads to directing the work they do because otherwise, women may have room to pose a threat to men's dominance. It is important to pay attention to the stages of women's development, which will allow us to see how they are shaped to accept inequality and gender hierarchies in different societies and cultures.
Another context to delimit is the domestic sphere where female subordination has historically been located. It has been discovered that in women who share the same class and race position, the feminine condition is redefined throughout life and that some women enjoy power over others even in contexts of high male domination, where they are invested with authority, creating the system of uncertainty zones that divide them as a gender and prevent alliances and legitimize domination. Foucault said that "power is exercised, not possessed", it is always in danger of being lost and norms, laws, threats or punishments are not enough. Hence, the spaces of subordination are also spaces of women's power. It is in these spaces where insecurity, tension, confrontation appear and where, for example, women can demand contraception.
To conclude, it is important to keep in mind that gender is a form of social inequality that is always articulated with other forms of inequality, be it class, race, age group, etc. It is necessary to think of male domination with a vague beginning in time, but which allows us to separate the subordination of women from the "natural" evolution of humanity and to understand it as a historical process. In this sense, it is necessary to emphasize that, with respect to race, in plural societies it is necessary to pay attention to the ethno-cultural context since, depending on the relations between people of different races, the relations between genders will be conditioned.
Image of women of different races
On the other hand, although it is known that historically the prevailing social gender system has contributed to make women invisible, to necessarily associate this category only to women is to recreate the historical absolutism that has done so much damage, this time as antagonistic to men. All individuals present in the gender system participate in the social construction.
So much for today's publication, of which we can still go much deeper, especially with regard to the origin of domination or the hierarchization of the binomial "man/woman" from an anthropological point of view, but that will be left for another time. So until next time, see you in Nostr!
Créditos | Credits
Bibliografía consultada | Consulted bibliography:
-
Barbieri, T. (1993). Sobre la categoría género. Una introducción teórico-metodológica. Debates en Sociología. (18). 1-19. https://doi.org/10.18800/debatesensociologia.199301.006
-
Echevarría, D. (2020). Desigualdades de género e interseccionalidad. Análisis del contexto cubano 2008-2018. Facultad Latinoamericana de Ciencias Sociales (Programa-Cuba). https://www.clacso.org.ar/libreria-latinoamericana-cm/libro_detalle_resultado.php?id_libro=2346&campo=cm&texto=248
Traducción | Translation:
DeepL
-
-
@ db01672e:9f775028
2025-01-02 09:54:15Choosing an assisted living facility for an aging parent or loved one can be a daunting and emotional decision. As adult children, it’s common to feel overwhelmed by the responsibility of ensuring the best care for your loved ones.
If you are considering assisted living in Kingwood, this guide will help you navigate the practical, emotional, and financial aspects of the decision-making process.
Understand the Different Levels of Care
When exploring https://villagegreenalzheimerscare.com/****, it’s essential to understand the care levels offered. Communities provide services from daily help like bathing and dressing to specialized care for Alzheimer's or dementia. Assessing your loved one’s needs ensures they get the right support, promoting independence while keeping them safe.
Evaluate the Cost of Assisted Living
Financial considerations play a significant role in choosing an assisted living facility. The cost in Kingwood varies based on services, location, and suite size. Monthly fees range from a few thousand dollars.
Families often use savings, insurance, or veterans’ benefits. Understanding your financial situation and funding options is key to making an informed decision.
Visit Multiple Communities
Once you’ve narrowed down assisted living options, visiting multiple communities is important. Tour the facilities to assess the environment and meet staff. Look for clean spaces, open areas, and private suites. Pay attention to the atmosphere—assisted living should feel warm and welcoming. Evaluate staff interactions with residents and inquire about specialized care for memory issues.
Assess Emotional and Social Well-being
The emotional well-being of your loved one is just as important as their physical health. Assisted living in Kingwood can offer a nurturing environment with a strong sense of community. Look for a facility that provides activities and events to engage residents and build relationships. Emotional support is key for people transitioning into assisted living, so ensure the community provides programs that meet their interests.
Focus on Health and Wellness Support
Health and wellness are crucial when choosing the right assisted living community. Does the community provide access to medical professionals, such as nurses or physicians? Are medications managed carefully?
Consider whether the facility can meet your loved one’s health needs, especially if they have chronic conditions. Communities that emphasize emotional, physical, and spiritual well-being enhance overall quality of life.
Plan for Future Needs
It’s essential to consider both current and future needs. As people age, their care requirements may change. Select an assisted living community in Kingwood that can adapt to evolving needs. Some facilities offer a continuum of care, accommodating services from independent living to memory care. This flexibility allows your loved one to stay in the same community, providing continuity and stability.
Include Your Loved One in the Decision-Making Process
Whenever possible, involve your aging parent in the decision-making process. Moving to assisted living is a major change, and it’s important that they feel respected and heard. Discuss preferences for location, atmosphere, and care level. Some seniors may resist the idea, so patience is crucial. Addressing their concerns will ease the transition and make them feel more comfortable.
Prioritize a Home-Like Environment
Moving into assisted living may feel like a loss of independence for many seniors, but a home-like environment can ease this transition. Look for a facility offering private suites, family-style dining, and open areas for interaction. A warm, nurturing atmosphere that encourages autonomy while offering support helps your loved one feel more at ease. The goal is to maintain dignity and control over daily life, enhancing quality of life.
The End Note
Choosing https://villagegreenalzheimerscare.com/kingwood/**** involves considering your loved one’s physical, emotional, and financial needs. You can make an informed decision by understanding care levels and costs and prioritizing well-being. Open communication and selecting a community that supports independence while providing necessary care will help ensure a positive experience for your aging parent.
-
@ 1cb14ab3:95d52462
2025-01-02 05:57:05
No. 1 - The Less Touristy "Bund"
The Bund is certainly a must-see if you are traveling to Shanghai for the first time - and it will be at the top of every travel guide out there, for good reason - there are equally as stunning alternatives away from the crowds. If you want to enjoy the skyline from a more relaxed perspective, consider the Pudong side of the river. There are parks, basketball courts, and green spaces along the riverbank for you to chill at and take in the sights. You can also hop on a ferry or a sightseeing boat to cross the river and admire the views from the renowned Bund.
No. 2 - Walks Along Golden Street
This one is out in Gubei, a suburban area in the west of Shanghai. It may be a bit of a trek, but it is worth it if you are looking for a more relaxing and peaceful pedestrian street in the city. Golden Street, or Jinxiu Road, is a great place to walk a dog, grab an afternoon drink, or enjoy a romantic dinner with your loved one. While it may be a bit far from downtown, it makes for a great joyride on your scooter or bicycle.
No. 3 - Moganshan Road Graffiti Wall
Moganshan Road is a gem for all things art. It is home to M50, the best art district in the city, where you will find dozens of galleries, studios, and workshops showcasing a wide range of art. There are also plenty of cool spots scattered around the area, particularly the graffiti wall. The wall is a welcome contrast to some of the drab and monotonous architecture found around the city; with colorful display of street art featuring various styles and themes. Stop by and admire the works of local and international artists, and even jump in to join them in adding your own mark. The wall is constantly evolving, so you can always find something new.
No. 4 - Jiaotong University in the Fall
Easily one of the best spots in town for catching rows of bright yellow and red leaves. Jiaotong University is one of the oldest and most prestigious universities in China. The campus is located in Xuhui District and has a mix of Chinese and Western architectural styles to admire as well. Try to visit in late October or early November for the best leaf-peeping. You can walk along the tree-lined paths, set up a blanket in the field for a picnic, or simply take photos and enjoy the scenery.
No. 5 - Day Drinking at Highline
Hands down one of the top five rooftop bars in the city, along with Bar Rouge, Kartel, and others; Highline is a go-to-spot that offers great views of the city and excellent food. Find it on the sixth floor of the Ascott Hotel in Huaihai Road in Xintiandi. Nothing beats a laid back Saturday afternoon at Highline. I prefer the views during the day, though it is equally as nice a night. Sip cocktails, wine, or beer, and enjoy the music and vibe. Highline is a perfect place to spend an afternoon.
Additional Photos
Next Guide in the Series:
An Expats Guide to the Best Spots in Shanghai: 002
Find Me Elsewhere:
All images property of Hes. Originally published as an Instagram Guide on Feb. 02, 2021. Reworked and published on Nostr on Feb. 17, 2024.
-
@ 8fb140b4:f948000c
2023-11-18 23:28:31Chef's notes
Serving these two dishes together will create a delightful centerpiece for your Thanksgiving meal, offering a perfect blend of traditional flavors with a homemade touch.
Details
- ⏲️ Prep time: 30 min
- 🍳 Cook time: 1 - 2 hours
- 🍽️ Servings: 4-6
Ingredients
- 1 whole turkey (about 12-14 lbs), thawed and ready to cook
- 1 cup unsalted butter, softened
- 2 tablespoons fresh thyme, chopped
- 2 tablespoons fresh rosemary, chopped
- 2 tablespoons fresh sage, chopped
- Salt and freshly ground black pepper
- 1 onion, quartered
- 1 lemon, halved
- 2-3 cloves of garlic
- Apple and Sage Stuffing
- 1 loaf of crusty bread, cut into cubes
- 2 apples, cored and chopped
- 1 onion, diced
- 2 stalks celery, diced
- 3 cloves garlic, minced
- 1/4 cup fresh sage, chopped
- 1/2 cup unsalted butter
- 2 cups chicken broth
- Salt and pepper, to taste
Directions
- Preheat the Oven: Set your oven to 325°F (165°C).
- Prepare the Herb Butter: Mix the softened butter with the chopped thyme, rosemary, and sage. Season with salt and pepper.
- Prepare the Turkey: Remove any giblets from the turkey and pat it dry. Loosen the skin and spread a generous amount of herb butter under and over the skin.
- Add Aromatics: Inside the turkey cavity, place the quartered onion, lemon halves, and garlic cloves.
- Roast: Place the turkey in a roasting pan. Tent with aluminum foil and roast. A general guideline is about 15 minutes per pound, or until the internal temperature reaches 165°F (74°C) at the thickest part of the thigh.
- Rest and Serve: Let the turkey rest for at least 20 minutes before carving.
- Next: Apple and Sage Stuffing
- Dry the Bread: Spread the bread cubes on a baking sheet and let them dry overnight, or toast them in the oven.
- Cook the Vegetables: In a large skillet, melt the butter and cook the onion, celery, and garlic until soft.
- Combine Ingredients: Add the apples, sage, and bread cubes to the skillet. Stir in the chicken broth until the mixture is moist. Season with salt and pepper.
- Bake: Transfer the stuffing to a baking dish and bake at 350°F (175°C) for about 30-40 minutes, until golden brown on top.
-
@ dfc7c785:4c3c6174
2025-01-02 05:56:32![[IMG_4743.jpeg]]
ST. MARY'S CHURCH CHOLSEY & AGATHA CHRISTIE
St. Mary's Church
Cholsey church was part of the monastic system set up by Ethelread the Unready in about 986 A.D. The lower part of the tower of St Mary's Church shows traces of Saxon style stonework in the form of 'long and short" quoins. In 1121 when Henry I founded Reading abbey he endowed it with the monastic lands at Cholsey. those days everyone had to pay a tithe - a tenth part of the annual produce of land or labour. The tithe was usually paid in goods and Cholsey produced so much that a huge barn was built - said to be the biggest in Europe.
Great Barn
The church and manor were given to Reading Abbey by Henry Ist in 1121 A.D. It was a most valuable part of the abbey's possessions. In the 13th & 14th centuries the largest barn in Europe was erected close by the church.
Unfortunately, this was demolished in the early 19th century. On the right, as you enter the churchyard you can see a large barn - the original barn was bigger than this. The Great Barn was 303 feet long and had seventeen stone piers on each side supporting the roof timbers.
The Church Bells
There are eight bells in the tower. The Sanctus bell was made by Richard de Wymbish, one of the earliest London Bell founders.
Only a few bells made by him now exist.
The Cholsey bell is still regularly rung.
It was rehung in 1972 and bears the inscription RICARDUS: DE: WIMBUS: ME: FECIT (Richard de Wymbish made me.)
Cholsey First School
In 1837 a school building was erected by the churchyard gates. The school was built by subscription and then adopted by the National Society and was used for Sunday school and evening classes.
Agatha Christie
The world renowned writer Agatha Christie was a resident of the parish of Cholsey. She was born on the 15th September 1890 in Torquay, Devon.
In December 1914 she married an aviator in the Royal Flying Corps - Archibald Christie, but this ended in divorce in 1928.
There was one child from the marriage. In 1930 she married her second husband, the archaeologist Max Mallowan. They bought Winterbrook House in 1934. They attended St. Mary's Curch, Cholsey and are buried in the graveyard of their parish church.
After entering the churchyard walk along the path to the porch and then veer right across the grass towards the wall and you will see a large gravestone
The grave of Agatha Christie and her husband, Max Mallowan is tucked into a corner of the graveyard of St. Mary's Church. Agatha Christie was awarded a Commander of the Order of the British Empire in 1956.
In 1971 she received the Order of Dame Commander of the British Empire. Dame Agatha Christie died on the 12th January 1976 at the age of 85.
To return to Wallingford you need to go back through the churchyard and out to the road. You can then
Cross the road and go back the way you came.
If you wish to start the Agatha Christie Trail, cross the road follow the path to the bypass. Cross carefully and walk down Winterbrook Lane until you reach the main road. You need to cross and you will soon reach Winterbrook House which is almost hidden by a hedge.
Turn right and walk carefully over the bridge, past the school and turn right through the gate and walk across Whitehead Meadow. Turn left through the recreation ground towards the Pavilion. On leaving the recreation ground, turn left and walk into the centre of the village where it is possible to catch a bus into Wallingford.
Turn right and follow the pavement into Cholsey. At the first mini roundabout turn left and head back towards Wallingford After the Red Lion there is a long straight road until you reach the bypass. Winterbrook House is on the right hand side of Reading Road.
-
@ 1bda7e1f:bb97c4d9
2025-01-02 05:19:08Tldr
- Nostr is an open and interoperable protocol
- You can integrate it with workflow automation tools to augment your experience
- n8n is a great low/no-code workflow automation tool which you can host yourself
- Nostrobots allows you to integrate Nostr into n8n
- In this blog I create some workflow automations for Nostr
- A simple form to delegate posting notes
- Push notifications for mentions on multiple accounts
- Push notifications for your favourite accounts when they post a note
- All workflows are provided as open source with MIT license for you to use
Inter-op All The Things
Nostr is a new open social protocol for the internet. This open nature exciting because of the opportunities for interoperability with other technologies. In Using NFC Cards with Nostr I explored the
nostr:
URI to launch Nostr clients from a card tap.The interoperability of Nostr doesn't stop there. The internet has many super-powers, and Nostr is open to all of them. Simply, there's no one to stop it. There is no one in charge, there are no permissioned APIs, and there are no risks of being de-platformed. If you can imagine technologies that would work well with Nostr, then any and all of them can ride on or alongside Nostr rails.
My mental model for why this is special is Google Wave ~2010. Google Wave was to be the next big platform. Lars was running it and had a big track record from Maps. I was excited for it. Then, Google pulled the plug. And, immediately all the time and capital invested in understanding and building on the platform was wasted.
This cannot happen to Nostr, as there is no one to pull the plug, and maybe even no plug to pull.
So long as users demand Nostr, Nostr will exist, and that is a pretty strong guarantee. It makes it worthwhile to invest in bringing Nostr into our other applications.
All we need are simple ways to plug things together.
Nostr and Workflow Automation
Workflow automation is about helping people to streamline their work. As a user, the most common way I achieve this is by connecting disparate systems together. By setting up one system to trigger another or to move data between systems, I can solve for many different problems and become way more effective.
n8n for workflow automation
Many workflow automation tools exist. My favourite is n8n. n8n is a low/no-code workflow automation platform which allows you to build all kinds of workflows. You can use it for free, you can self-host it, it has a user-friendly UI and useful API. Vs Zapier it can be far more elaborate. Vs Make.com I find it to be more intuitive in how it abstracts away the right parts of the code, but still allows you to code when you need to.
Most importantly you can plug anything into n8n: You have built-in nodes for specific applications. HTTP nodes for any other API-based service. And community nodes built by individual community members for any other purpose you can imagine.
Eating my own dogfood
It's very clear to me that there is a big design space here just demanding to be explored. If you could integrate Nostr with anything, what would you do?
In my view the best way for anyone to start anything is by solving their own problem first (aka "scratching your own itch" and "eating your own dogfood"). As I get deeper into Nostr I find myself controlling multiple Npubs – to date I have a personal Npub, a brand Npub for a community I am helping, an AI assistant Npub, and various testing Npubs. I need ways to delegate access to those Npubs without handing over the keys, ways to know if they're mentioned, and ways to know if they're posting.
I can build workflows with n8n to solve these issues for myself to start with, and keep expanding from there as new needs come up.
Running n8n with Nostrobots
I am mostly non-technical with a very helpful AI. To set up n8n to work with Nostr and operate these workflows should be possible for anyone with basic technology skills.
- I have a cheap VPS which currently runs my HAVEN Nostr Relay and Albyhub Lightning Node in Docker containers,
- My objective was to set up n8n to run alongside these in a separate Docker container on the same server, install the required nodes, and then build and host my workflows.
Installing n8n
Self-hosting n8n could not be easier. I followed n8n's Docker-Compose installation docs–
- Install Docker and Docker-Compose if you haven't already,
- Create your
docker-compose.yml
and.env
files from the docs, - Create your data folder
sudo docker volume create n8n_data
, - Start your container with
sudo docker compose up -d
, - Your n8n instance should be online at port
5678
.
n8n is free to self-host but does require a license. Enter your credentials into n8n to get your free license key. You should now have access to the Workflow dashboard and can create and host any kind of workflows from there.
Installing Nostrobots
To integrate n8n nicely with Nostr, I used the Nostrobots community node by Ocknamo.
In n8n parlance a "node" enables certain functionality as a step in a workflow e.g. a "set" node sets a variable, a "send email" node sends an email. n8n comes with all kinds of "official" nodes installed by default, and Nostr is not amongst them. However, n8n also comes with a framework for community members to create their own "community" nodes, which is where Nostrobots comes in.
You can only use a community node in a self-hosted n8n instance (which is what you have if you are running in Docker on your own server, but this limitation does prevent you from using n8n's own hosted alternative).
To install a community node, see n8n community node docs. From your workflow dashboard–
- Click the "..." in the bottom left corner beside your username, and click "settings",
- Cilck "community nodes" left sidebar,
- Click "Install",
- Enter the "npm Package Name" which is
n8n-nodes-nostrobots
, - Accept the risks and click "Install",
- Nostrobots is now added to your n8n instance.
Using Nostrobots
Nostrobots gives you nodes to help you build Nostr-integrated workflows–
- Nostr Write – for posting Notes to the Nostr network,
- Nostr Read – for reading Notes from the Nostr network, and
- Nostr Utils – for performing certain conversions you may need (e.g. from bech32 to hex).
Nostrobots has good documentation on each node which focuses on simple use cases.
Each node has a "convenience mode" by default. For example, the "Read" Node by default will fetch Kind 1 notes by a simple filter, in Nostrobots parlance a "Strategy". For example, with Strategy set to "Mention" the node will accept a pubkey and fetch all Kind 1 notes that Mention the pubkey within a time period. This is very good for quick use.
What wasn't clear to me initially (until Ocknamo helped me out) is that advanced use cases are also possible.
Each node also has an advanced mode. For example, the "Read" Node can have "Strategy" set to "RawFilter(advanced)". Now the node will accept json (anything you like that complies with NIP-01). You can use this to query Notes (Kind 1) as above, and also Profiles (Kind 0), Follow Lists (Kind 3), Reactions (Kind 7), Zaps (Kind 9734/9735), and anything else you can think of.
Creating and adding workflows
With n8n and Nostrobots installed, you can now create or add any kind of Nostr Workflow Automation.
- Click "Add workflow" to go to the workflow builder screen,
- If you would like to build your own workflow, you can start with adding any node. Click "+" and see what is available. Type "Nostr" to explore the Nostrobots nodes you have added,
- If you would like to add workflows that someone else has built, click "..." in the top right. Then click "import from URL" and paste in the URL of any workflow you would like to use (including the ones I share later in this article).
Nostr Workflow Automations
It's time to build some things!
A simple form to post a note to Nostr
I started very simply. I needed to delegate the ability to post to Npubs that I own in order that a (future) team can test things for me. I don't want to worry about managing or training those people on how to use keys, and I want to revoke access easily.
I needed a basic form with credentials that posted a Note.
For this I can use a very simple workflow–
- A n8n Form node – Creates a form for users to enter the note they wish to post. Allows for the form to be protected by a username and password. This node is the workflow "trigger" so that the workflow runs each time the form is submitted.
- A Set node – Allows me to set some variables, in this case I set the relays that I intend to use. I typically add a Set node immediately following the trigger node, and put all the variables I need in this. It helps to make the workflows easier to update and maintain.
- A Nostr Write node (from Nostrobots) – Writes a Kind-1 note to the Nostr network. It accepts Nostr credentials, the output of the Form node, and the relays from the Set node, and posts the Note to those relays.
Once the workflow is built, you can test it with the testing form URL, and set it to "Active" to use the production form URL. That's it. You can now give posting access to anyone for any Npub. To revoke access, simply change the credentials or set to workflow to "Inactive".
It may also be the world's simplest Nostr client.
You can find the Nostr Form to Post a Note workflow here.
Push notifications on mentions and new notes
One of the things Nostr is not very good at is push notifications. Furthermore I have some unique itches to scratch. I want–
- To make sure I never miss a note addressed to any of my Npubs – For this I want a push notification any time any Nostr user mentions any of my Npubs,
- To make sure I always see all notes from key accounts – For this I need a push notification any time any of my Npubs post any Notes to the network,
- To get these notifications on all of my devices – Not just my phone where my Nostr regular client lives, but also on each of my laptops to suit wherever I am working that day.
I needed to build a Nostr push notifications solution.
To build this workflow I had to string a few ideas together–
- Triggering the node on a schedule – Nostrobots does not include a trigger node. As every workflow starts with a trigger we needed a different method. I elected to run the workflow on a schedule of every 10-minutes. Frequent enough to see Notes while they are hot, but infrequent enough to not burden public relays or get rate-limited,
- Storing a list of Npubs in a Nostr list – I needed a way to store the list of Npubs that trigger my notifications. I initially used an array defined in the workflow, this worked fine. Then I decided to try Nostr lists (NIP-51, kind 30000). By defining my list of Npubs as a list published to Nostr I can control my list from within a Nostr client (e.g. Listr.lol or Nostrudel.ninja). Not only does this "just work", but because it's based on Nostr lists automagically Amethyst client allows me to browse that list as a Feed, and everyone I add gets notified in their Mentions,
- Using specific relays – I needed to query the right relays, including my own HAVEN relay inbox for notes addressed to me, and wss://purplepag.es for Nostr profile metadata,
- Querying Nostr events (with Nostrobots) – I needed to make use of many different Nostr queries and use quite a wide range of what Nostrobots can do–
- I read the EventID of my Kind 30000 list, to return the desired pubkeys,
- For notifications on mentions, I read all Kind 1 notes that mention that pubkey,
- For notifications on new notes, I read all Kind 1 notes published by that pubkey,
- Where there are notes, I read the Kind 0 profile metadata event of that pubkey to get the displayName of the relevant Npub,
- I transform the EventID into a Nevent to help clients find it.
- Using the Nostr URI – As I did with my NFC card article, I created a link with the
nostr:
URI prefix so that my phone's native client opens the link by default, - Push notifications solution – I needed a push notifications solution. I found many with n8n integrations and chose to go with Pushover which supports all my devices, has a free trial, and is unfairly cheap with a $5-per-device perpetual license.
Once the workflow was built, lists published, and Pushover installed on my phone, I was fully set up with push notifications on Nostr. I have used these workflows for several weeks now and made various tweaks as I went. They are feeling robust and I'd welcome you to give them a go.
You can find the Nostr Push Notification If Mentioned here and If Posts a Note here.
In speaking with other Nostr users while I was building this, there are all kind of other needs for push notifications too – like on replies to a certain bookmarked note, or when a followed Npub starts streaming on zap.stream. These are all possible.
Use my workflows
I have open sourced all my workflows at my Github with MIT license and tried to write complete docs, so that you can import them into your n8n and configure them for your own use.
To import any of my workflows–
- Click on the workflow of your choice, e.g. "Nostr_Push_Notify_If_Mentioned.json",
- Click on the "raw" button to view the raw JSON, ex any Github page layout,
- Copy that URL,
- Enter that URL in the "import from URL" dialog mentioned above.
To configure them–
- Prerequisites, credentials, and variables are all stated,
- In general any variables required are entered into a Set Node that follows the trigger node,
- Pushover has some extra setup but is very straightforward and documented in the workflow.
What next?
Over my first four blogs I explored creating a good Nostr setup with Vanity Npub, Lightning Payments, Nostr Addresses at Your Domain, and Personal Nostr Relay.
Then in my latest two blogs I explored different types of interoperability with NFC cards and now n8n Workflow Automation.
Thinking ahead n8n can power any kind of interoperability between Nostr and any other legacy technology solution. On my mind as I write this:
- Further enhancements to posting and delegating solutions and forms (enhanced UI or different note kinds),
- Automated or scheduled posting (such as auto-liking everything Lyn Alden posts),
- Further enhancements to push notifications, on new and different types of events (such as notifying me when I get a new follower, on replies to certain posts, or when a user starts streaming),
- All kinds of bridges, such as bridging notes to and from Telegram, Slack, or Campfire. Or bridging RSS or other event feeds to Nostr,
- All kinds of other automation (such as BlackCoffee controlling a coffee machine),
- All kinds of AI Assistants and Agents,
In fact I have already released an open source workflow for an AI Assistant, and will share more about that in my next blog.
Please be sure to let me know if you think there's another Nostr topic you'd like to see me tackle.
GM Nostr.
-
@ 8fb140b4:f948000c
2023-11-02 01:13:01Testing a brand new YakiHonne native client for iOS. Smooth as butter (not penis butter 🤣🍆🧈) with great visual experience and intuitive navigation. Amazing work by the team behind it! * lists * work
Bold text work!
Images could have used nostr.build instead of raw S3 from us-east-1 region.
Very impressive! You can even save the draft and continue later, before posting the long-form note!
🐶🐾🤯🤯🤯🫂💜
-
@ 0e9491aa:ef2adadf
2023-10-23 14:15:26Humanity's Natural State Is Chaos
Without order there is chaos. Humans competing with each other for scarce resources naturally leads to conflict until one group achieves significant power and instates a "monopoly on violence."Power Brings Stability
Power has always been the key means to achieve stability in societies. Centralized power can be incredibly effective in addressing issues such as crime, poverty, and social unrest efficiently. Unfortunately this power is often abused and corrupted.Centralized Power Breeds Tyranny
Centralized power often leads to tyrannical rule. When a select few individuals hold control over a society, they tend to become corrupted. Centralized power structures often lack accountability and transparency, and rely too heavily on trust.Distributed Power Cultivates Freedom
New technology that empowers individuals provide us the ability to rebuild societies from the bottom up. Strong individuals that can defend and provide for themselves will help build strong local communities on a similar foundation. The result is power being distributed throughout society rather than held by a select few.In the short term, relying on trust and centralized power is an easy answer to mitigating chaos, but freedom tech tools provide us the ability to build on top of much stronger distributed foundations that provide stability while also cultivating individual freedom.
The solution starts with us. Empower yourself. Empower others. A grassroots freedom tech movement scaling one person at a time.
If you found this post helpful support my work with bitcoin.
-
@ fa0165a0:03397073
2023-10-06 19:25:08I just tested building a browser plugin, it was easier than I thought. Here I'll walk you through the steps of creating a minimal working example of a browser plugin, a.k.a. the "Hello World" of browser plugins.
First of all there are two main browser platforms out there, Chromium and Mozilla. They do some things a little differently, but similar enough that we can build a plugin that works on both. This plugin will work in both, I'll describe the firefox version, but the chromium version is very similar.
What is a browser plugin?
Simply put, a browser plugin is a program that runs in the browser. It can do things like modify the content of a webpage, or add new functionality to the browser. It's a way to extend the browser with custom functionality. Common examples are ad blockers, password managers, and video downloaders.
In technical terms, they are plugins that can insert html-css-js into your browser experience.
How to build a browser plugin
Step 0: Basics
You'll need a computer, a text editor and a browser. For testing and development I personally think that the firefox developer edition is the easiest to work with. But any Chrome based browser will also do.
Create a working directory on your computer, name it anything you like. I'll call mine
hello-world-browser-plugin
. Open the directory and create a file calledmanifest.json
. This is the most important file of your plugin, and it must be named exactly right.Step 1: manifest.json
After creation open your file
manifest.json
in your text editor and paste the following code:json { "manifest_version": 3, "name": "Hello World", "version": "1.0", "description": "A simple 'Hello World' browser extension", "content_scripts": [ { "matches": ["<all_urls>"], "js": ["hello.js"] //The name of your script file. // "css": ["hello.css"] //The name of your css file. } ] }
If you wonder what the
json
file format is, it's a normal text file with a special syntax such that a computer can easily read it. It's thejson
syntax you see in the code above. Let's go through what's being said here. (If you are not interested, just skip to the next step after pasting this we are done here.)manifest_version
: This is the version of the manifest file format. It's currently at version 3, and it's the latest version. It's important that you set this to 3, otherwise your plugin won't work.name
: This is the name of your plugin. It can be anything you like.version
: This is the version of your plugin. It can be anything you like.description
: This is the description of your plugin. It can be anything you like.content_scripts
: This is where you define what your plugin does. It's a list of scripts that will be executed when the browser loads a webpage. In this case we have one script, calledhello.js
. It's the script that we'll create in the next step.matches
: This is a list of urls that the script will be executed on. In this case we have<all_urls>
, which means that the script will be executed on all urls. You can also specify a specific url, likehttps://brave.com/*
, which means that the script will only be executed on urls that start withhttps://brave.com/
.js
: This is a list of javascript files that will be executed. In this case we have one file, calledhello.js
. It's the script that we'll create in the next step.css
: This is where you can add a list of css files that will be executed. In this case we have none, but you can add css files here if you want to.//
: Text following these two characters are comments. They are ignored by the computer, You can add comments anywhere you like, and they are a good way to document your code.
Step 2: hello.js
Now it's time to create another file in your project folder. This time we'll call it
hello.js
. When created, open it in your text editor and paste the following code:js console.log("Hello World!");
That's javascript code, and it's what will be executed when you run your plugin. It's a simpleconsole.log
statement, which will print the text "Hello World!" to the console. The console is a place where the browser prints out messages, and it's a good place to start when debugging your plugin.Step 3: Load and launch your plugin
Firefox
Now it's time to load your plugin into your browser. Open your browser and go to the url
about:debugging#/runtime/this-firefox
. You should see a page that looks something like this:Click the button that says "Load Temporary Add-on...". A file dialog will open, navigate to your project folder and select the file
manifest.json
. Your plugin should now be loaded and running.Go to a website, any website, and open the inspector then navigate to the console. You'll find the inspector by right-clicking anywhere within the webpage, and click "Inspector" in the drop-down menu. When opening the console you might see some log messages from the site you visited and... you should see the text "Hello World!" printed there, from our little plugin! Congratulations!
Chrome
Open your browser and go to the url
chrome://extensions/
. Click the button that says "Load unpacked". A file dialog will open, navigate to your project folder and select the folderhello-world-browser-plugin
. Your plugin should now be loaded and running.Note the difference, of selecting the file
manifest.json
in firefox, and selecting the folderhello-world-browser-plugin
in chrome. Otherwise, the process is the same. So I'll repeat the same text as above: (for those who skipped ahead..)Go to a website, any website, and open the inspector then navigate to the console. You'll find the inspector by right-clicking anywhere within the webpage, and click "Inspector" in the drop-down menu. When opening the console you might see some log messages from the site you visited and... you should see the text "Hello World!" printed there, from our little plugin! Congratulations!
As you can see this isn't as complicated as one might think. Having preformed a "Hello-World!"-project is a very useful and valuable first step. These setup steps are the basics for any browser plugin, and you can build on this to create more advanced plugins.
-
@ 79998141:0f8f1901
2025-01-02 05:04:56Happy new year, Anon.
Thanks for tuning in to whatever this long form post will be. I hope to make these more regular, like journal entries as we travel through "real life" and the Nostrverse together. If I'm making time for this reflective writing, then things are going as planned.
2024 was a wildly transformative year for me for many reasons... there's no way I can possibly fit all of them here. They're not all related to Bitcoin and Nostr- I've got a beautiful life outside of all that which has its own independent arc. My wife and I celebrated 7 years of marriage together, stronger than ever (don't believe that "itch" bullshit). We let go of some negative relationships and embraced some positive ones. We cut some bad habits, and we made some good habits. We worked, we traveled, we saw family, and we partied.
But damn, these two technologies have become a huge part of my life. God willing, this trend will continue until they've both eclipsed my professional capacity through our startup, Conduit BTC.
This was the year I was truly orange pilled. Until late 2023, I had traded (quite profitably) Bitcoin, "crypto", stocks, options, prediction markets and whatever else I could get my hands on that felt undervalued. I did this all in my spare time, grinding out a little financial freedom while I hustled at my fiat ventures to support my little family. I wasn't a true believer- just an opportunist with a knack for spotting where and when a crowd might flock to next. That was right up until I ran face first into Lyn Alden's book "Broken Money".
Something about Lyn's engineer/macro-finance inspired prose clicked with me, lock and key. Total one way function. By the end of the book my laser eyes had burned a hole in my bedroom ceiling. I was all in- and acted accordingly both with my capital and my attention. It wasn't long before I discovered Nostr and dove in here too, falling deep into my current orange and purple polyamorous love affair.
"If you know the enemy and know yourself, you need not fear the result of a hundred battles."
Despite the passion, through studying Bitcoin's criticisms (from the likes of Mike Green and Nassim Taleb) I found a hole in the utopian plot: none of this works without Bitcoin actually being used as money. Worldwide transactions must skyrocket demand for blockspace to keep the network secure/stable for the long term. Besides, if everyday folks aren't using Bitcoin as money then we haven't done shit to make the world a better place. In that world, we've only replaced old masters with new ones. Fuck that.
Whatever I did in this space needed to increase the usage of Bitcoin as money. Simple. This was bigger than passion, this was purpose. I knew that come hell or high water I would dedicate myself to this mission.
Lucky for me I found a partner and best friend in @aceaspades to go on this adventure with. I'm infinitely grateful for him. He's an incredible man who also happens to be an insanely creative and talented software developer. We'd tried for years to find the right project to focus on together, experimenting with all kinds of new techy ideas as they came across our field. Nothing had ever captured our attention like this. This was different. By March of 2024 we had formed a company and gotten to work iterating on how we could leverage these beautiful protocols and open-source tech to create something that served our mission. This is @ConduitBTC.
I've done well in my fiat career executing plans downstream of someone else's creative vision. I've learned the ins and outs of an established ecosystem and found ways to profit from it. I take plans developed by others, compete to win contracts to build them, and execute on them in a cashflow-positive way. I'm bringing this no bullshit blue collar skillset with me to the Nostrverse whether they like it or not.
The adventure we're embarking on now is totally different though. We're charting a new course - totally creative, highly intuitive and extremely speculative towards a future that doesn't exist yet. There are few established norms. The potential is vast but unknown. We're diving into a strange quest to sell a map to an imaginary place and to simultaneously architect its creation (alongside all the amazing builders here doing the same thing). This is insanely exciting to me.
We're barely getting started but a lot has been invested under the surface which will show itself in 2025. We'll be sharing updates in a proper post on @ConduitBTC soon.
As for my personal 2025 resolutions, here they are: - zero alcohol for the entire year (did this in 2019 and had a great year, it's time for a rerun) - more focused presence in the moment: especially with my wife - more self care and prioritized mental/physical health - this includes daily: naps, prayer, self hypnosis or meditation, sweat, and stretching/massaging (overworked in 2024 with a fiat 9-5, a board/advisor role in a fiat business I have equity in, and my newfound passion here. Two serious burn out episodes experienced this year - zero is the only acceptable number of burnouts for long term health and success.) - related to the above: get Conduit some mission-aligned funding partners and leave my fiat 9-5. Grow the Conduit team (have put in a serious amount of my personal capital already to get this going, which will show fruit in the new year... but I am not an island) - more authentic and thoughtful posts on Nostr, with a solid amount of shitposting and organic home grown memes to balance it out... more zaps, more geniune connections and interactions with the curious forward thinking people on here - more IRL Nostr/Bitcoin events - more laughter, more jokes
Enough for now. Cheers to you and yours Anon, may 2025 bring you the magic you've been dreaming of.
-
@ 0e9491aa:ef2adadf
2023-09-26 17:21:01For years American bitcoin miners have argued for more efficient and free energy markets. It benefits everyone if our energy infrastructure is as efficient and robust as possible. Unfortunately, broken incentives have led to increased regulation throughout the sector, incentivizing less efficient energy sources such as solar and wind at the detriment of more efficient alternatives.
The result has been less reliable energy infrastructure for all Americans and increased energy costs across the board. This naturally has a direct impact on bitcoin miners: increased energy costs make them less competitive globally.
Bitcoin mining represents a global energy market that does not require permission to participate. Anyone can plug a mining computer into power and internet to get paid the current dynamic market price for their work in bitcoin. Using cellphone or satellite internet, these mines can be located anywhere in the world, sourcing the cheapest power available.
Absent of regulation, bitcoin mining naturally incentivizes the build out of highly efficient and robust energy infrastructure. Unfortunately that world does not exist and burdensome regulations remain the biggest threat for US based mining businesses. Jurisdictional arbitrage gives miners the option of moving to a friendlier country but that naturally comes with its own costs.
Enter AI. With the rapid development and release of AI tools comes the requirement of running massive datacenters for their models. Major tech companies are scrambling to secure machines, rack space, and cheap energy to run full suites of AI enabled tools and services. The most valuable and powerful tech companies in America have stumbled into an accidental alliance with bitcoin miners: THE NEED FOR CHEAP AND RELIABLE ENERGY.
Our government is corrupt. Money talks. These companies will push for energy freedom and it will greatly benefit us all.
Microsoft Cloud hiring to "implement global small modular reactor and microreactor" strategy to power data centers: https://www.datacenterdynamics.com/en/news/microsoft-cloud-hiring-to-implement-global-small-modular-reactor-and-microreactor-strategy-to-power-data-centers/
If you found this post helpful support my work with bitcoin.
-
@ 13e63e99:25525c6a
2025-01-02 02:03:59The recent appointments by President-elect Donald Trump have generated significant excitement within the cryptocurrency sector. His crypto-supportive team has amplified market enthusiasm, pushing Bitcoin's price to an all-time high as the industry rallies around the news. Our team has analyzed each appointee to assess the long-term implications of Trump’s administration on the crypto landscape.
Key Appointments and Their Implications
1. David Sacks – White House AI and Crypto Czar
Sacks, a entrepreneur, investor, and advocate for cryptocurrencies, with a career spanning multiple successful ventures. He is the founding partner of Craft Ventures, a VC firm that invests in tech and crypto. Previously, Sacks was the COO of PayPal during its early days. Sacks has been an advocate for economic freedom, decentralization, and sensible crypto regulation. He has been involved in shaping crypto policy through his connection with political leaders, including his recent role as part of President-elect Trump’s pro-crypto team. His appointment highlights the administration’s intent to integrate cryptocurrency and AI into national policy, potentially creating a favorable environment for technological growth.
2. Paul Atkins – SEC Chairman Nominee
Atkins served as a commissioner for the U.S. Securities and Exchange Commission (SEC) from 2002 to 2008, where he advocated for market-oriented policies and reduced regulatory burdens. He has been a prominent voice in pushing for regulatory clarity in emerging financial technologies, including cryptocurrencies. He has consistently emphasized the importance of balancing investor protection with fostering innovation. Atkins’ nomination underscores a clear effort to address regulatory uncertainty in the crypto industry. As co-chair of the Digital Chamber’s Token Alliance since 2017, he has consistently supported initiatives that balance consumer protection with innovation. His leadership at the SEC is expected to bring much-needed clarity to the regulatory framework.
3. Stephen Miran – Chair of the Council of Economic Advisors
The council advises the president on economic policy, assists in the preparation of an annual report that gives an overview of the country's economy, reviews federal policies and programs and makes economic policy recommendations. Stephen Miran is a economist with a focus on deregulation and economic policy. He is best known for his role as an economic advisor with a strong commitment to fostering technological advancement and free-market principles. He is an advocate for streamlining regulatory processes, enabling new technologies like Bitcoin to thrive in a competitive global economy. Miran's ability to shape national economic policies could therefore play a critical role in determining the future regulatory landscape for cryptocurrencies in the U.S.
4. Rep. French Hill-Chairman of the House Financial Services Subcommittee on Digital Assets
Rep. Hill has served in the U.S. House of Representatives since 2015. He has been involved in numerous legislative efforts, focusing on economic policy, financial services, and digital asset regulation. Rep. Hill has elected to be Chairman of the House Financial Services Subcommittee on Digital Assets and has been a vocal advocate for creating a structured regulatory framework for cryptocurrencies and digital assets. Rep. Hill has identified a digital asset market structure bill as a priority for the Republican Party. His statements have stressed the importance of developing clear rules that will foster innovation, while also making sure that digital assets don’t become a vehicle for illegal activity or instability.
Outlook for the Crypto Industry
If the Trump administration follows through on its pledges, the U.S. could experience:
-
Enhanced Regulatory Clarity: Clear guidelines could attract institutional investment and drive industry innovation.
-
Improved Market Confidence: A well-structured framework may mitigate risks and encourage broader adoption of digital assets.
-
Global Leadership: Proactive support for cryptocurrencies could establish the U.S. as a leader in financial innovation.
However, delays or failure to act decisively could perpetuate uncertainty and market instability. The crypto community remains cautiously optimistic, awaiting tangible policy actions that translate this promising momentum into long-term growth opportunities.
Reference: MayerBrown, Pensions&Investments, Time
IMF-Driven Revisions to Bitcoin Law\ El Salvador and the IMF have reached an agreement on a $1.4 billion loan program, to be disbursed over 40 months, according to an IMF statement. In return, El Salvador has committed to implementing measures aimed at improving its primary balance and reducing its debt-to-GDP ratio. As part of the conditions for a new IMF loan package, President Nayib Bukele of El Salvador has agreed to revise key aspects of the country's groundbreaking Bitcoin Law enacted in 2021. The changes include:
-
Ending the Legal Tender Mandate: Businesses are no longer required to accept Bitcoin as a form of payment.
-
Shutting Down Chivo Wallet: The state-run wallet, plagued with technical issues, will cease operations.
-
Halting Bitcoin Tax Payments: Bitcoin will no longer be accepted for tax obligations.
Backlash and Misunderstandings\ Critics on social media have accused Bukele of abandoning his commitment to Bitcoin, framing these changes as a betrayal. However, such reactions fail to recognize the broader context of his leadership.
Leadership Priorities\ Bukele’s primary responsibility is to the Salvadoran people, not the global Bitcoin community. El Salvador faces profound challenges, including poverty, crime, and underdeveloped infrastructure. These realities necessitate pragmatic governance, where Bitcoin serves as a tool—not an ideology.
Expecting Bukele to prioritize Bitcoin over the well-being of his nation is both unrealistic and misaligned with the role of a national leader. The decision to modify the Bitcoin Law reflects a calculated effort to balance innovation with the pressing needs of the Salvadoran populace.
Implications
-
Investor Sentiment and Confidence: Bitcoin investors, particularly those who saw El Salvador's Bitcoin adoption as a milestone for mainstream acceptance, expressed disappointment over the reversal. Bitcoin experienced dip in value on the day the news broke.
-
IMF Dynamics: The IMF’s involvement also fueled concerns, as it was seen as a sign that traditional financial institutions were exerting influence over a policy that was once viewed as groundbreaking for Bitcoin adoption. Some traders and investors worried that further pressure from the IMF could lead to additional regulatory restrictions, potentially dampening future market enthusiasm. The concessions demonstrate the leverage international institutions hold over nations experimenting with alternative financial systems. This could prompt a reassessment of Bitcoin adoption strategies in the face of external pressures.
-
Setback to Bitcoin as “Medium of Exchange": El Salvador's scaling back of its Bitcoin Law could significantly slow the growth of Bitcoin as a medium of exchange, as the country had been seen as the most iconic and pioneering example of fostering a Bitcoin circular economy. The government has reduced the incentives for businesses and consumers to adopt Bitcoin for everyday transactions. As a result, the dream of creating a Bitcoin-driven economy in El Salvador, where the cryptocurrency could circulate seamlessly, faces a major setback, potentially delaying or even derailing Bitcoin’s path to becoming a widely used and accepted global currency.
President Bukele’s revisions to the Bitcoin Law are not a betrayal or rejection of Bitcoin, but a pragmatic adjustment to better serve the needs of El Salvador. Bitcoin remains an important tool in the nation’s economic strategy, but its utility must be balanced with other pressing priorities. El Salvador is still committed to purchasing Bitcoin and is likely to accelerate its pace. Ultimately, it's essential to remove the rose-tinted glasses and recognize the reality of a more mature and practical approach to integrating Bitcoin within a complex national economy.
Reference: Yahoo Finance, BitcoinMagazine
1. MicroStrategy to turn to fixed-income securities to raise funds for Bitcoin purchases
MicroStrategy, led by co-founder Michael Saylor, is shifting its funding strategy for Bitcoin purchases. Once its current fundraising plan is fully utilized, the company will move from using Bitcoin proxies to focusing on fixed-income securities. Previously, MicroStrategy has funded Bitcoin acquisitions through stock and convertible bond sales, with convertible bonds yielding positive returns as the company’s stock price rose. Saylor emphasized leveraging strategies to enhance shareholder value, noting that $4 billion of their $7.2 billion in convertible notes act as equity. This pivot aligns with a broader market trend where hedge funds are increasingly using fixed-income securities for convertible arbitrage, prompting MicroStrategy to issue $6.2 billion in convertible bonds this year. The move positions the company to adapt to the changing investment landscape while maximizing returns for shareholders.
Reference: Bloomberg
2. Russia Is Using Bitcoin for International Trade
Russian Finance Minister Anton Siluanov announced that Russian companies have started using Bitcoin and other digital currencies for international payments, a move in response to recent legislative changes aimed at countering Western sanctions. Additionally, lawmaker Anton Tkachev proposed creating a Bitcoin reserve, similar to foreign exchange reserves, to mitigate risks from sanctions, inflation, and currency fluctuations. This marks a step toward greater economic sovereignty and resilience.
Reference: The block beats
3. Japanese Government Responds to Proposal for Establishing Bitcoin Reserve
The Japanese government recently responded to a proposal by Senator Satoshi Hamada regarding the consideration of Bitcoin as a reserve asset, a trend gaining traction in countries like the U.S. While acknowledging the growing global interest in cryptocurrencies, the government expressed that discussions on Bitcoin’s role as a reserve asset are still in early stages and refrained from forming an opinion. Citing its legal framework, Japan emphasized that cryptocurrencies like Bitcoin are not classified as foreign exchange and do not align with the objectives of maintaining stable and liquid foreign exchange reserves. Japan’s cautious approach reflects its commitment to economic stability while evaluating the potential integration of digital assets.
Reference: coin post
Happy New Year from Team HCM! As we welcome the new year, we are excited to celebrate not only the joy of the season but also the growth and progress of the Bitcoin community. Reflecting on 2024, we made significant strides and embraced new changes. The official HCM website is set to launch at early January of the year 2025, marking an exciting new chapter for our team. Looking ahead, we are enthusiastic about the future and the global adoption of Bitcoin, which will continue to grow stronger and more impactful. Here's to an incredible journey ahead, filled with innovation, collaboration, and success! Cheers to 2025!
-
-
@ 0e9491aa:ef2adadf
2023-08-23 13:35:04Influencers would have you believe there is an ongoing binance bank run but bitcoin wallet data says otherwise.
- binance wallets are near all time highs
- bitfinex wallets are also trending up
- gemini and coinbase are being hit with massive withdrawals thoughYou should not trust custodians, they can rug you without warning. It is incredibly important you learn how to hold bitcoin yourself, but also consider not blindly trusting influencers with a ref link to shill you.
If you found this post helpful support my work with bitcoin.
-
@ 13e63e99:25525c6a
2025-01-02 02:00:48The recent appointments by President-elect Donald Trump have generated significant excitement within the cryptocurrency sector. His crypto-supportive team has amplified market enthusiasm, pushing Bitcoin's price to an all-time high as the industry rallies around the news. Our team has analyzed each appointee to assess the long-term implications of Trump’s administration on the crypto landscape.
Key Appointments and Their Implications
1. David Sacks – White House AI and Crypto Czar
Sacks, a entrepreneur, investor, and advocate for cryptocurrencies, with a career spanning multiple successful ventures. He is the founding partner of Craft Ventures, a VC firm that invests in tech and crypto. Previously, Sacks was the COO of PayPal during its early days. Sacks has been an advocate for economic freedom, decentralization, and sensible crypto regulation. He has been involved in shaping crypto policy through his connection with political leaders, including his recent role as part of President-elect Trump’s pro-crypto team. His appointment highlights the administration’s intent to integrate cryptocurrency and AI into national policy, potentially creating a favorable environment for technological growth.
2. Paul Atkins – SEC Chairman Nominee
Atkins served as a commissioner for the U.S. Securities and Exchange Commission (SEC) from 2002 to 2008, where he advocated for market-oriented policies and reduced regulatory burdens. He has been a prominent voice in pushing for regulatory clarity in emerging financial technologies, including cryptocurrencies. He has consistently emphasized the importance of balancing investor protection with fostering innovation. Atkins’ nomination underscores a clear effort to address regulatory uncertainty in the crypto industry. As co-chair of the Digital Chamber’s Token Alliance since 2017, he has consistently supported initiatives that balance consumer protection with innovation. His leadership at the SEC is expected to bring much-needed clarity to the regulatory framework.
3. Stephen Miran – Chair of the Council of Economic Advisors
The council advises the president on economic policy, assists in the preparation of an annual report that gives an overview of the country's economy, reviews federal policies and programs and makes economic policy recommendations. Stephen Miran is a economist with a focus on deregulation and economic policy. He is best known for his role as an economic advisor with a strong commitment to fostering technological advancement and free-market principles. He is an advocate for streamlining regulatory processes, enabling new technologies like Bitcoin to thrive in a competitive global economy. Miran's ability to shape national economic policies could therefore play a critical role in determining the future regulatory landscape for cryptocurrencies in the U.S.
4. Rep. French Hill-Chairman of the House Financial Services Subcommittee on Digital Assets
Rep. Hill has served in the U.S. House of Representatives since 2015. He has been involved in numerous legislative efforts, focusing on economic policy, financial services, and digital asset regulation. Rep. Hill has elected to be Chairman of the House Financial Services Subcommittee on Digital Assets and has been a vocal advocate for creating a structured regulatory framework for cryptocurrencies and digital assets. Rep. Hill has identified a digital asset market structure bill as a priority for the Republican Party. His statements have stressed the importance of developing clear rules that will foster innovation, while also making sure that digital assets don’t become a vehicle for illegal activity or instability.
Outlook for the Crypto Industry
If the Trump administration follows through on its pledges, the U.S. could experience:
-
Enhanced Regulatory Clarity: Clear guidelines could attract institutional investment and drive industry innovation.
-
Improved Market Confidence: A well-structured framework may mitigate risks and encourage broader adoption of digital assets.
-
Global Leadership: Proactive support for cryptocurrencies could establish the U.S. as a leader in financial innovation.
However, delays or failure to act decisively could perpetuate uncertainty and market instability. The crypto community remains cautiously optimistic, awaiting tangible policy actions that translate this promising momentum into long-term growth opportunities.
Reference: MayerBrown, Pensions&Investments, Time
IMF-Driven Revisions to Bitcoin Law\ El Salvador and the IMF have reached an agreement on a $1.4 billion loan program, to be disbursed over 40 months, according to an IMF statement. In return, El Salvador has committed to implementing measures aimed at improving its primary balance and reducing its debt-to-GDP ratio. As part of the conditions for a new IMF loan package, President Nayib Bukele of El Salvador has agreed to revise key aspects of the country's groundbreaking Bitcoin Law enacted in 2021. The changes include:
-
Ending the Legal Tender Mandate: Businesses are no longer required to accept Bitcoin as a form of payment.
-
Shutting Down Chivo Wallet: The state-run wallet, plagued with technical issues, will cease operations.
-
Halting Bitcoin Tax Payments: Bitcoin will no longer be accepted for tax obligations.
Backlash and Misunderstandings\ Critics on social media have accused Bukele of abandoning his commitment to Bitcoin, framing these changes as a betrayal. However, such reactions fail to recognize the broader context of his leadership.
Leadership Priorities\ Bukele’s primary responsibility is to the Salvadoran people, not the global Bitcoin community. El Salvador faces profound challenges, including poverty, crime, and underdeveloped infrastructure. These realities necessitate pragmatic governance, where Bitcoin serves as a tool—not an ideology.
Expecting Bukele to prioritize Bitcoin over the well-being of his nation is both unrealistic and misaligned with the role of a national leader. The decision to modify the Bitcoin Law reflects a calculated effort to balance innovation with the pressing needs of the Salvadoran populace.
Implications
-
Investor Sentiment and Confidence: Bitcoin investors, particularly those who saw El Salvador's Bitcoin adoption as a milestone for mainstream acceptance, expressed disappointment over the reversal. Bitcoin experienced dip in value on the day the news broke.
-
IMF Dynamics: The IMF’s involvement also fueled concerns, as it was seen as a sign that traditional financial institutions were exerting influence over a policy that was once viewed as groundbreaking for Bitcoin adoption. Some traders and investors worried that further pressure from the IMF could lead to additional regulatory restrictions, potentially dampening future market enthusiasm. The concessions demonstrate the leverage international institutions hold over nations experimenting with alternative financial systems. This could prompt a reassessment of Bitcoin adoption strategies in the face of external pressures.
-
Setback to Bitcoin as “Medium of Exchange": El Salvador's scaling back of its Bitcoin Law could significantly slow the growth of Bitcoin as a medium of exchange, as the country had been seen as the most iconic and pioneering example of fostering a Bitcoin circular economy. The government has reduced the incentives for businesses and consumers to adopt Bitcoin for everyday transactions. As a result, the dream of creating a Bitcoin-driven economy in El Salvador, where the cryptocurrency could circulate seamlessly, faces a major setback, potentially delaying or even derailing Bitcoin’s path to becoming a widely used and accepted global currency.
President Bukele’s revisions to the Bitcoin Law are not a betrayal or rejection of Bitcoin, but a pragmatic adjustment to better serve the needs of El Salvador. Bitcoin remains an important tool in the nation’s economic strategy, but its utility must be balanced with other pressing priorities. El Salvador is still committed to purchasing Bitcoin and is likely to accelerate its pace. Ultimately, it's essential to remove the rose-tinted glasses and recognize the reality of a more mature and practical approach to integrating Bitcoin within a complex national economy.
Reference: Yahoo Finance, BitcoinMagazine
1. MicroStrategy to turn to fixed-income securities to raise funds for Bitcoin purchases
MicroStrategy, led by co-founder Michael Saylor, is shifting its funding strategy for Bitcoin purchases. Once its current fundraising plan is fully utilized, the company will move from using Bitcoin proxies to focusing on fixed-income securities. Previously, MicroStrategy has funded Bitcoin acquisitions through stock and convertible bond sales, with convertible bonds yielding positive returns as the company’s stock price rose. Saylor emphasized leveraging strategies to enhance shareholder value, noting that $4 billion of their $7.2 billion in convertible notes act as equity. This pivot aligns with a broader market trend where hedge funds are increasingly using fixed-income securities for convertible arbitrage, prompting MicroStrategy to issue $6.2 billion in convertible bonds this year. The move positions the company to adapt to the changing investment landscape while maximizing returns for shareholders.
Reference: Bloomberg
2. Russia Is Using Bitcoin for International Trade
Russian Finance Minister Anton Siluanov announced that Russian companies have started using Bitcoin and other digital currencies for international payments, a move in response to recent legislative changes aimed at countering Western sanctions. Additionally, lawmaker Anton Tkachev proposed creating a Bitcoin reserve, similar to foreign exchange reserves, to mitigate risks from sanctions, inflation, and currency fluctuations. This marks a step toward greater economic sovereignty and resilience.
Reference: The block beats
3. Japanese Government Responds to Proposal for Establishing Bitcoin Reserve
The Japanese government recently responded to a proposal by Senator Satoshi Hamada regarding the consideration of Bitcoin as a reserve asset, a trend gaining traction in countries like the U.S. While acknowledging the growing global interest in cryptocurrencies, the government expressed that discussions on Bitcoin’s role as a reserve asset are still in early stages and refrained from forming an opinion. Citing its legal framework, Japan emphasized that cryptocurrencies like Bitcoin are not classified as foreign exchange and do not align with the objectives of maintaining stable and liquid foreign exchange reserves. Japan’s cautious approach reflects its commitment to economic stability while evaluating the potential integration of digital assets.
Reference: coin post
Happy New Year from Team HCM! As we welcome the new year, we are excited to celebrate not only the joy of the season but also the growth and progress of the Bitcoin community. Reflecting on 2024, we made significant strides and embraced new changes. The official HCM website is set to launch at early January of the year 2025, marking an exciting new chapter for our team. Looking ahead, we are enthusiastic about the future and the global adoption of Bitcoin, which will continue to grow stronger and more impactful. Here's to an incredible journey ahead, filled with innovation, collaboration, and success! Cheers to 2025!
-
-
@ a012dc82:6458a70d
2025-01-02 01:57:34Table Of Content
-
A Series of Banking Collapses
-
Federal Reserve's Counteraction
-
The Impact on Bitcoin
-
Market's Delayed Reaction
-
Bitcoin's Future Amidst Monetary Policies
-
Conclusions
-
FAQ
Bitcoin, the digital gold of the 21st century, has always been at the center of discussions in the financial and tech worlds. Its volatile price movements and its potential to revolutionize the financial sector make it a hot topic. Among the many voices opining on Bitcoin's trajectory, Arthur Hayes, co-founder and former CEO of BitMEX, stands out with his unique insights. He firmly believes that March was a defining month that signaled the onset of a bullish trend for Bitcoin. This article aims to unpack Hayes' perspective and understand the reasons behind his belief.
A Series of Banking Collapses
March of this year wasn't just another month on the financial calendar; it was a month marked by significant banking disturbances. Hayes attributes the beginning of Bitcoin's bull run to a specific date: March 10. On this day, the Silicon Valley Bank (SVB) was taken over by the Federal Deposit Insurance Corporation, a significant event in the banking world. But this wasn't an isolated incident. Just two days before, on March 8, Silvergate Bank faced liquidation, sending ripples of concern through the financial community. This wave of uncertainty continued when, on March 12, Signature Bank was compelled to shut its doors due to intervention by New York regulators. These back-to-back banking crises set the stage for what was to come in the cryptocurrency realm.
Federal Reserve's Counteraction
Reacting to the unfolding banking crises, the Federal Reserve took a decisive step. They introduced the Bank Term Funding Program (BTFP), a strategic move aimed at stabilizing the banking sector. This program was designed to offer banks loans that could extend up to a year. However, there was a catch: banks had to post "qualifying assets" as collateral to avail themselves of these loans. Hayes viewed this initiative as a clear attempt by the Federal Reserve to provide a safety net for the entire banking system. In his interpretation, the Fed's message was straightforward: "Exchange your devalued bonds for fresh dollars, and let's stabilize the system."
The Impact on Bitcoin
The repercussions of the banking crises and the Federal Reserve's countermeasures were felt in the cryptocurrency market, particularly in Bitcoin's price dynamics. Following these events, Bitcoin's price began its upward trajectory, registering an impressive increase of approximately 26%. Hayes believes that the Federal Reserve's actions, combined with the growing skepticism towards the value of fiat currencies, played a pivotal role in this surge. As faith in traditional currencies waned, traders and investors began to see the appeal of fixed-supply assets, with Bitcoin emerging as the prime contender.
Market's Delayed Reaction
While the indicators pointing to a bullish trend in Bitcoin are clear to some, Hayes observes that the broader market has been somewhat sluggish in its response. This delay in market reaction is not uncommon in the financial world, where multiple factors influence decision-making processes. However, Hayes remains undeterred in his optimism. He anticipates that within a span of six to twelve months, the market will not only recognize but also react positively to this bullish trend, further propelling Bitcoin's growth.
Bitcoin's Future Amidst Monetary Policies
Hayes' bullish stance on Bitcoin extends beyond just its recent performance. He envisions a bright future for the cryptocurrency, irrespective of the monetary decisions taken by institutions like the Federal Reserve. Whether the Fed opts for interest rate hikes to induce economic tightening or chooses the path of printing more money to infuse liquidity into the system, Hayes believes Bitcoin is poised to benefit. In his perspective, the inherent properties of Bitcoin, combined with its decentralized nature, position it favorably to thrive amidst varying economic scenarios.
Conclusion
Arthur Hayes' insights offer a deep dive into the intricate dynamics between traditional banking systems, global monetary policies, and the burgeoning world of cryptocurrencies. As we stand at the crossroads of financial evolution, understanding these interplays becomes crucial. Hayes' conviction that March marked the commencement of Bitcoin's bullish trend provides not just a perspective but also a beacon for those navigating the cryptocurrency waters. His analysis underscores the potential of Bitcoin and offers a glimpse into its promising future in the ever-evolving financial landscape.
FAQ
When did Hayes believe the Bitcoin bull run started? Hayes believes that the Bitcoin bull run began on March 10.
What significant event occurred on March 10? On March 10, the Silicon Valley Bank (SVB) was taken over by the Federal Deposit Insurance Corporation.
How did the Federal Reserve respond to banking crises? The Federal Reserve introduced the Bank Term Funding Program (BTFP) to stabilize the banking sector by offering loans in exchange for "qualifying assets" as collateral.
What impact did these events have on Bitcoin? Following these events, Bitcoin's price surged by approximately 26%, marking the beginning of its bullish trend.
That's all for today
If you want more, be sure to follow us on:
NOSTR: croxroad@getalby.com
Instagram: @croxroadnews.co
Youtube: @croxroadnews
Store: https://croxroad.store
Subscribe to CROX ROAD Bitcoin Only Daily Newsletter
https://www.croxroad.co/subscribe
DISCLAIMER: None of this is financial advice. This newsletter is strictly educational and is not investment advice or a solicitation to buy or sell any assets or to make any financial decisions. Please be careful and do your own research.
-
-
@ 8fb140b4:f948000c
2023-08-22 12:14:34As the title states, scratch behind my ear and you get it. 🐶🐾🫡
-
@ 0e9491aa:ef2adadf
2023-08-21 14:56:21Nostr is an open communication protocol that can be used to send messages across a distributed set of relays in a censorship resistant and robust way.
If you missed my nostr introduction post you can find it here. My nostr account can be found here.
We are nearly at the point that if something interesting is posted on a centralized social platform it will usually be posted by someone to nostr.
We are nearly at the point that if something interesting is posted exclusively to nostr it is cross posted by someone to various centralized social platforms.
We are nearly at the point that you can recommend a cross platform app that users can install and easily onboard without additional guides or resources.
As companies continue to build walls around their centralized platforms nostr posts will be the easiest to cross reference and verify - as companies continue to censor their users nostr is the best censorship resistant alternative - gradually then suddenly nostr will become the standard. 🫡
Current Nostr Stats
If you found this post helpful support my work with bitcoin.
-
@ 8fb140b4:f948000c
2023-07-30 00:35:01Test Bounty Note
-
@ 8fb140b4:f948000c
2023-07-22 09:39:48Intro
This short tutorial will help you set up your own Nostr Wallet Connect (NWC) on your own LND Node that is not using Umbrel. If you are a user of Umbrel, you should use their version of NWC.
Requirements
You need to have a working installation of LND with established channels and connectivity to the internet. NWC in itself is fairly light and will not consume a lot of resources. You will also want to ensure that you have a working installation of Docker, since we will use a docker image to run NWC.
- Working installation of LND (and all of its required components)
- Docker (with Docker compose)
Installation
For the purpose of this tutorial, we will assume that you have your lnd/bitcoind running under user bitcoin with home directory /home/bitcoin. We will also assume that you already have a running installation of Docker (or docker.io).
Prepare and verify
git version - we will need git to get the latest version of NWC. docker version - should execute successfully and show the currently installed version of Docker. docker compose version - same as before, but the version will be different. ss -tupln | grep 10009- should produce the following output: tcp LISTEN 0 4096 0.0.0.0:10009 0.0.0.0: tcp LISTEN 0 4096 [::]:10009 [::]:**
For things to work correctly, your Docker should be version 20.10.0 or later. If you have an older version, consider installing a new one using instructions here: https://docs.docker.com/engine/install/
Create folders & download NWC
In the home directory of your LND/bitcoind user, create a new folder, e.g., "nwc" mkdir /home/bitcoin/nwc. Change to that directory cd /home/bitcoin/nwc and clone the NWC repository: git clone https://github.com/getAlby/nostr-wallet-connect.git
Creating the Docker image
In this step, we will create a Docker image that you will use to run NWC.
- Change directory to
nostr-wallet-connect
:cd nostr-wallet-connect
- Run command to build Docker image:
docker build -t nwc:$(date +'%Y%m%d%H%M') -t nwc:latest .
(there is a dot at the end) - The last line of the output (after a few minutes) should look like
=> => naming to docker.io/library/nwc:latest
nwc:latest
is the name of the Docker image with a tag which you should note for use later.
Creating docker-compose.yml and necessary data directories
- Let's create a directory that will hold your non-volatile data (DB):
mkdir data
- In
docker-compose.yml
file, there are fields that you want to replace (<> comments) and port “4321” that you want to make sure is open (check withss -tupln | grep 4321
which should return nothing). - Create
docker-compose.yml
file with the following content, and make sure to update fields that have <> comment:
version: "3.8" services: nwc: image: nwc:latest volumes: - ./data:/data - ~/.lnd:/lnd:ro ports: - "4321:8080" extra_hosts: - "localhost:host-gateway" environment: NOSTR_PRIVKEY: <use "openssl rand -hex 32" to generate a fresh key and place it inside ""> LN_BACKEND_TYPE: "LND" LND_ADDRESS: localhost:10009 LND_CERT_FILE: "/lnd/tls.cert" LND_MACAROON_FILE: "/lnd/data/chain/bitcoin/mainnet/admin.macaroon" DATABASE_URI: "/data/nostr-wallet-connect.db" COOKIE_SECRET: <use "openssl rand -hex 32" to generate fresh secret and place it inside ""> PORT: 8080 restart: always stop_grace_period: 1m
Starting and testing
Now that you have everything ready, it is time to start the container and test.
- While you are in the
nwc
directory (important), execute the following command and check the log output,docker compose up
- You should see container logs while it is starting, and it should not exit if everything went well.
- At this point, you should be able to go to
http://<ip of the host where nwc is running>:4321
and get to the interface of NWC - To stop the test run of NWC, simply press
Ctrl-C
, and it will shut the container down. - To start NWC permanently, you should execute
docker compose up -d
, “-d” tells Docker to detach from the session. - To check currently running NWC logs, execute
docker compose logs
to run it in tail mode add-f
to the end. - To stop the container, execute
docker compose down
That's all, just follow the instructions in the web interface to get started.
Updating
As with any software, you should expect fixes and updates that you would need to perform periodically. You could automate this, but it falls outside of the scope of this tutorial. Since we already have all of the necessary configuration in place, the update execution is fairly simple.
- Change directory to the clone of the git repository,
cd /home/bitcoin/nwc/nostr-wallet-connect
- Run command to build Docker image:
docker build -t nwc:$(date +'%Y%m%d%H%M') -t nwc:latest .
(there is a dot at the end) - Change directory back one level
cd ..
- Restart (stop and start) the docker compose config
docker compose down && docker compose up -d
- Done! Optionally you may want to check the logs:
docker compose logs
-
@ 0e9491aa:ef2adadf
2023-06-05 14:12:59Will not live in a pod.
Will not eat the bugs.
Will not get the chip.
Will not get a blue check.
Will not use CBDCs.Live Free or Die.
Why did Elon buy twitter for $44 Billion? What value does he see in it besides the greater influence that undoubtedly comes with controlling one of the largest social platforms in the world? We do not need to speculate - he made his intentions incredibly clear in his first meeting with twitter employees after his takeover - WeChat of the West.
To those that do not appreciate freedom, the value prop is clear - WeChat is incredibly powerful and successful in China.
To those that do appreciate freedom, the concern is clear - WeChat has essentially become required to live in China, has surveillance and censorship integrated at its core, and if you are banned from the app your entire livelihood is at risk. Employment, housing, payments, travel, communication, and more become extremely difficult if WeChat censors determine you have acted out of line.
The blue check is the first step in Elon's plan to bring the chinese social credit score system to the west. Users who verify their identity are rewarded with more reach and better tools than those that do not. Verified users are the main product of Elon's twitter - an extensive database of individuals and complete control of the tools he will slowly get them to rely on - it is easier to monetize cattle than free men.
If you cannot resist the temptation of the blue check in its current form you have already lost - what comes next will be much darker. If you realize the need to resist - freedom tech provides us options.
If you found this post helpful support my work with bitcoin.
-
@ 3ddc43df:9186b168
2025-01-02 01:18:38Should I Buy Bitcoin?
The price of a single Bitcoin recently reached $100,000 USD. By now everyone knows what Bitcoin is and how to buy some. Intuitively, the price of Bitcoin increases when there is more demand to buy Bitcoin than there is to sell it, and when the inverse is true the price goes down. We all know about meme-coins, which seem like (at least to me) the same exact thing as Bitcoin in a different name. So what makes Bitcoin different? Beyond buying it because the trend seems to indicate its value in USD will continue increasing, what is its fundamental value proposition? How is this value proposition different from meme-coins, or even alt-coins that are viewed as legitimate in crypto circles? What, if any, existential risks exist that could crash its price to zero in an instant?
I want to explore these questions to best inform myself on how to store and invest my money for the long-term. Everyone started hearing a lot about exponential growth curves in 2020. In 1975, Gordon Moore predicted that the density of transistors would double every two years, and this has roughly held true since. As innovation fuels more innovation, we can expect that, very generally, technology progresses on an exponential growth curve. The idea that a computer program could replace the world’s reserve currency is worth taking seriously given the huge impact we’ve already seen new technology have on society over a 20-year, 10-year, 5-year, and even 2-year timescale.
When I was working at Square I direct deposited a small percentage of my salary into CashApp’s Bitcoin direct deposit program. I sold it all when I left the company. A lot has been written about Bitcoin, so I mostly hope that writing this can help me solidify my opinions so that I can make a decision on whether to invest again and stick with that decision for somewhere between a decade and a century. Up to now I also have not been able to find a good comprehensive evaluation of Bitcoin including the “bull” case and “bear” case, so I will attempt do that here.
The Bitcoin Standard
Two years ago I was trying to answer these questions I just posed and most people on the internet said to read the book “The Bitcoin Standard.” So I bought it and it has been sat untouched on my bookshelf ever since. Time to read…
spongebob narrator voice a few days later….
This would be a good book if the author did not repeat himself ad nauseam and if he left out his many false claims. He claims the Ethereum blockchain is less immutable than the Bitcoin blockchain, moving off of the gold standard caused a decline in art’s quality, and the internet was not a “zero to one” invention but just an improvement upon the telephone. He spends half the book rambling on and on, often with personal attacks, about how he does not like Keynesian economics. He seems to draw his counterarguments against Keynes from just a single economist, Ludwig von Mises.
All of this made the book very annoying to read and proved the author quite untrustworthy. On the other hand, his general argument that hard money (ie gold) is superior to government-backed fiat is one I first read about in The Changing World Order by Ray Dalio. Dalio does a much better job here of backing this up and explaining how the decline of all the past major empires began by moving away from backing their currency with hard money. Government-backed money involves misaligned incentives — when the government spends and produces the money, invariably it will produce as much as it wants to spend. Hard money is supply-constrained, making inflation impossible. Inflation of course disincentivizes saving while incentivizing debt which is on a whole bad for society. Dalio shows that a populous prioritizing its future (saving money, investing in education and technology) correlates with its empire/country’s ascension. I don’t really know how to square this with present-day America which has the best capital markets in the world, but clearly does not prioritize the future in any other way. Maybe time-dimensions here have shifted since technology progresses much quicker now than in the past.
Anyways, it seems obvious to me now that a global supply-constrained currency would be much better for the world than a currency owned by the US government. Since the government prints its own money and has no functional checks and balances on this power, hyperinflation and the collapse of the dollar is inevitable. So even though this book was really bad I am sold on Bitcoin’s utility, so I guess it did its job. I also did a lot of online research while reading the book. Let’s go through that.
The Bitcoin Core Codebase
Bitcoin is software run on computers throughout the world. This software is on the internet. You can look at all the code, run it on your computer, and suggest updates to the core maintainers. A mix of volunteer and sponsored contributors around the world help to maintain the codebase. When the codebase it updated, people running Bitcoin nodes have the choice to update to the latest version. When the majority of Bitcoin nodes update to the latest version, the new software propagates throughout the ecosystem. This is literally how a version of money works and it is a software program you can look at and change yourself. There is mailing lists and IRC groups where software developers discuss how to make this version of the world’s money work best. I know this is now a pretty old concept but it has been blowing my mind. A case can be made that this is the world’s most important software program, since it defines somewhere around 2 TRILLION dollars worth of value.
Nostr
Somehow this rabbit-hole led me to one of the tens of new decentralized social networks. This one is the latest favorite of Jack Dorsey, who started Twitter and left it partly due to its centralization, then started Bluesky and left it partly due to its centralization. I’ve checked out Bluesky and Mastodon and I didn’t think it was really anything different or special and they just seemed like worse versions of Twitter. Nostr is actually very interesting and the reason mostly has to do with Bitcoin.
Nostr integrates with your Bitcoin wallet (technically your “lightning” wallet, which is a fast and cheap way of sending Bitcoin) so that users can send and receive Bitcoin with each other. It’s a simple idea and really easy to build, but the effect is all of these people are talking online together and trading Bitcoin with each other so there’s a mini economy here that is denominated in Bitcoin. There’s obviously not a huge amount of people there compared to other social networks but at the very least it’s a compelling playground type of world that shows off what the internet could look like if Bitcoin gains mass adoption.
Since payments are integrated directly within the social network, people share art and ideas and get tipped in Bitcoin. But Nostr is actually a protocol — social network clients have just been built on top of it, but there’s a few other things that have been built with it. There’s podcasting/streaming apps, encrypted messaging apps , blogging apps, marketplaces, and on and on. Most of these apps leverage Nostr’s Bitcoin wallet integration, and generally they could do the same thing by handling payment via PayPal, Stripe, Square, etc. Here’s the following benefits of using Bitcoin over those options:
- Censorship-resistance. This doesn’t matter for 99% of people and use-cases but if I want to buy illegal drugs or guns or medicine or hacked passwords then it matters. For the record, I (mostly) don’t. I think it would be great if I could though and I feel like if I want to then I should be able to.
- Transaction fees. Existing solutions charge somewhere between 2% and 3% of every purchase. Transacting Bitcoin over the lightning network is basically free.
- Taxes. This is another controversial one and technically the US government requires that you pay sales tax for all Bitcoin purchases. But since Bitcoin wallets are pseudonymous making it unlikely that a purchase can be traced back to you, commerce via Bitcoin does not incur tax from the government.
Read Write Own
Nostr is a good example of a Web3 platform since it is based on peer-to-peer server communication, but it is not typical of the category since it does not operate on a blockchain and does not include a bespoke cryptocurrency. Ethereum is the most famous Web3 platform where commerce is denominated in Ethereum tokens. Solana is the newest competitor and is now the most popular platform. What is going on with these? What are the advantages/disadvantages of Web 3.0 living on the blockchain? Even if Nostr provides a compelling vision of a Bitcoin-native world, is this necessarily intertwined with a decentralized web?
With that, our next book is Read Write Own by Chris Dixon.
more time travel
This was a good book. Maybe it could have been a blog post. Yes, it definitely was a blog post expanded into 250 pages. Nevertheless, its core argument was compelling and it did not base this argument on anything obviously untrue like the last book. The author is a partner at a16z, a large venture capital fund that invests heavily in web3 tech. The author breaks down internet networks into three categories: protocol networks, corporate networks, and blockchain networks.
The first takes form as standards defined by IETF, such as HTML, SMTP, FTP, DNS, etc. Basically the core layer of the Internet exists as collection of protocols that define how bits are ordered. In the early days people interoperated by using thin clients that implemented these protocols. Corporate networks use these protocols as well but on top of them they create their own proprietary layer where connections are created. Think Facebook/Twitter social graphs, Google’s page rank, AirBnB/Uber’s marketplaces. Network connections exist within the proprietary layers each corporation has created. Blockchain networks are essentially corporate networks defined by new protocols. The author spends most of the book arguing that blockchain networks provide the great features of corporate networks with the openness of protocol networks, so blockchains give us the best of both worlds.
If I could snap my fingers and kill the Internet and the world had to rebuild it from scratch, I think Blockchain would play a huge part in the redesign. The Internet is a hodgepodge collection of standards that have been somewhat haphazardly created over time. As we unlock greater capabilities via more bandwidth and more powerful compute, more standards and types of networks are added on top of the old ones. Dixon mostly argues that corporate networks are bad because corporations act as unilateral dictators over their respective networks. Benevolent dictatorships are the best organizational structure; of course, the problem is that no dictatorship can stay benevolent indefinitely. People will search for alternatives when a “regime” changes in a way they don’t like, as has already happened to some extent with Google[^1] and Twitter[^2]. Some corporate networks will stay benevolent for a long time, and they will persist long after their leadership becomes corrupted; as they say, Rome did not fall in a day. We’ve seen throughout history that democratic organizations eventually win out. Even China has ceded that they need some form of a free market to compete in the global marketplace. Blockchains provide a free market and democratic ownership within Internet networks.
What to Do?[^3]
I am completely convinced now that blockchains will one day be a foundational part of the internet, of course the big question is how long does that take? My intuition is that it takes a long long time, because it is going to take a lot to move people away from existing corporate-owned platforms. But, similar to Bitcoin succeeding because governments will not indefinitely print their money responsibly, corporations will not indefinitely govern their networks responsibly. So blockchain networks are something that I am looking at as a very long-tailed investment that I am fairly certain will pay off well in something like 50 years at the most, meaning I expect blockchains to be a foundational part of the internet within 50 years.
I look at Bitcoin in a similar way but with a much shorter time horizon. The US government has displayed plenty of irresponsible monetary policy in the past few years and I expect this trend to continue. I look at Bitcoin as an investment that will pay off well within the next 20 years, by which I mean within 20 years Bitcoin will be commonly used as a store of value, if not a method of payment.
Of the USD I am converting into cryptocurrency, three-quarters is going to Bitcoin, one-sixth to Solana, and one-tenth to Internet Computer. A brief word on the latter two… Every operation on blockchains costs money so that the nodes running the blockchain can be compensated. This is why blockchains all include a native cryptocurrency, which is the token its nodes are paid in. Solana is a new blockchain that has the lowest-cost transaction fee because it uses a unique method of verifying transactions called Proof of History, which combined with Proof of Stake provides strong cryptographic guarantees while using very little compute. Internet Computer is a blockchain that natively provides many building blocks for building a web3 ecosystem — an identity platform, http interoperability and cloud computing primitives. Basically right now you can deploy your website on this blockchain and anyone can access it from a web browser.
There are many more blockchains that are interesting and the space is evolving really quickly, these two are just the ones that caught my eye and seem to me like building blocks for the future.
Gripes
I did not end up reading much text on cases against Bitcoin and Web3, as I decided these points are fairly obvious. This is new technology so there is massive reason to believe it will end up having no consequence to the world as 99% of new technology ends up this way. The cases against these technologies are well documented and encapsulates the prevailing sentiment around them. Bitcoin has no inherent value, is not optimally scalable, is pseudonymous rather than anonymous, requires more user responsibility than fiat alternatives, and will potentially be adversarial to the US government. Blockchains are always less efficient than traditional networks, charge per transaction, (mostly) include network lock-in via their bespoke cryptocurrency, and require that users set up and learn how to use hot wallets.
There are many reasons to believe neither of these technologies will succeed. I take the point of view that all of these downsides are going to be alleviated through technological progress (the open source community building solutions to all of these problems is huge and iterating extremely quickly) and through cultural shifts (learning to use the internet was once a big hurdle for everyone, but we have learned and taught each other effectively). It’s completely reasonable to be pessimistic, however pessimism around new internet technologies has not typically been a winning strategy.
[^1]: I recently added Kagi to my list of software subscriptions. It is $10 per month and offers high quality search without ads. I recommend it.
[^2]: I think the new Twitter is pretty cool, but many people don’t like Elon and have switched to one of the many alternatives. Additionally, some cracks have already started to show in their new model with Elon banning accounts he does not like or disagrees with. As mentioned before, Nostr is a good alternative, even if it is somewhat more difficult to get started with. To get started I recommend the Primal client, for which I pay $7/month but is also great to use without paying anything.
[^3]: Is it necessary to say this is not financial advice? I see that everywhere but I always think that it is probably not necessary legally. Anyways, this is not financial advice.
-
@ 0e9491aa:ef2adadf
2023-05-15 14:22:54I often hear "bitcoin doesn't interest me, I'm not a finance person."
Ironically, the beauty of sound money is you don't have to be. In the current system you're expected to manage a diversified investment portfolio or pay someone to do it. Bitcoin will make that optional.
— ODELL (@ODELL) September 16, 2018
At first glance bitcoin often appears overwhelming to newcomers. It is incredibly easy to get bogged down in the details of how it works or different ways to use it. Enthusiasts, such as myself, often enjoy going down the deep rabbit hole of the potential of bitcoin, possible pitfalls and theoretical scenarios, power user techniques, and the developer ecosystem. If your first touch point with bitcoin is that type of content then it is only natural to be overwhelmed. While it is important that we have a thriving community of bitcoiners dedicated to these complicated tasks - the true beauty of bitcoin lies in its simplicity. Bitcoin is simply better money. It is the best money we have ever had.
Life is complicated. Life is hard. Life is full of responsibility and surprises. Bitcoin allows us to focus on our lives while relying on a money that is simple. A money that is not controlled by any individual, company, or government. A money that cannot be easily seized or blocked. A money that cannot be devalued at will by a handful of corrupt bureaucrat who live hundreds of miles from us. A money that can be easily saved and should increase in purchasing power over time without having to learn how to "build a diversified stock portfolio" or hire someone to do it for us.
Bitcoin enables all of us to focus on our lives - our friends and family - doing what we love with the short time we have on this earth. Time is scarce. Life is complicated. Bitcoin is the most simple aspect of our complicated lives. If we spend our scarce time working then we should be able to easily save that accrued value for future generations without watching the news or understanding complicated financial markets. Bitcoin makes this possible for anyone.
Yesterday was Mother's Day. Raising a human is complicated. It is hard, it requires immense personal responsibility, it requires critical thinking, but mothers figure it out, because it is worth it. Using and saving bitcoin is simple - simply install an app on your phone. Every mother can do it. Every person can do it.
Life is complicated. Life is beautiful. Bitcoin is simple.
If you found this post helpful support my work with bitcoin.
-
@ 300352ae:8be8c8b3
2025-01-01 20:46:29Lorem ipsum dollor conae terg
-
@ 0e9491aa:ef2adadf
2023-05-08 18:37:50There must be a limit to how much data is transferred across the bitcoin network in order to keep the ability to run and use your own node accessible. A node is required to interact with the global bitcoin network - if you do not use your own node then you must trust someone else's node. If nodes become inaccessible to run then the network will centralize around the remaining entities that operate them - threatening the censorship resistance at the core of bitcoin's value prop. The bitcoin protocol uses three main mechanisms to keep node operation costs low - a fixed limit on the amount of data in each block, an automatic difficulty adjustment that regulates how many blocks are produced based on current mining hash rate, and a robust dynamic transaction fee market.
Bitcoin transaction fees limit network abuse by making usage expensive. There is a cost to every transaction, set by a dynamic free market based on demand for scarce block space. It is an incredibly robust way to prevent spam without relying on centralized entities that can be corrupted or pressured.
After the 2017 bitcoin fee spike we had six years of relative quiet to build tools that would be robust in a sustained high fee market. Fortunately our tools are significantly better now but many still need improvement. Most of the pain points we see today will be mitigated.
The reality is we were never going to be fully prepared - pressure is needed to show the pain points and provide strong incentives to mitigate them.
It will be incredibly interesting to watch how projects adapt under pressure. Optimistic we see great innovation here.
_If you are willing to wait for your transaction to confirm you can pay significantly lower fees. Learn best practices for reducing your fee burden here.
My guide for running and using your own bitcoin node can be found here._
If you found this post helpful support my work with bitcoin.
-
@ 300352ae:8be8c8b3
2025-01-01 20:28:38Lorem ipsum dolor
-
@ 0e9491aa:ef2adadf
2023-05-04 12:26:40Bank run on every crypto bank then bank run on every "real" bank.
— ODELL (@ODELL) December 14, 2022
Good morning.
It looks like PacWest will fail today. It will be both the fifth largest bank failure in US history and the sixth major bank to fail this year. It will likely get purchased by one of the big four banks in a government orchestrated sale.
March 8th - Silvergate Bank
March 10th - Silicon Valley Bank
March 12th - Signature Bank
March 19th - Credit Suisse
May 1st - First Republic Bank
May 4th - PacWest Bank?PacWest is the first of many small regional banks that will go under this year. Most will get bought by the big four in gov orchestrated sales. This has been the playbook since 2008. Follow the incentives. Massive consolidation across the banking industry. PacWest gonna be a drop in the bucket compared to what comes next.
First, a hastened government led bank consolidation, then a public/private partnership with the remaining large banks to launch a surveilled and controlled digital currency network. We will be told it is more convenient. We will be told it is safer. We will be told it will prevent future bank runs. All of that is marketing bullshit. The goal is greater control of money. The ability to choose how we spend it and how we save it. If you control the money - you control the people that use it.
If you found this post helpful support my work with bitcoin.
-
@ 182052d2:e48c3d7a
2025-01-01 20:12:28When I was a young game master, I had all the time in the world to dive into rulebooks and all their extensions, devouring them cover to cover. To prepare a game session, I could spend hours, even days, creating monsters, NPCs (non-player characters), and imagining how the story would unfold. I devoted so much time and energy that a cancellation or postponement would hurt me deeply.
Over time, responsibilities and priorities changed: studies, partner, children, work, house, etc. Time became a rare resource and it's impossible to continue creating stories like before. Nowadays, my preparation time for a session ranges between 0 and 4 hours, but most often, I only dedicate an hour. Fortunately, technology has helped me become more efficient in creating stories and preparing game sessions. I use artificial intelligence without hesitation to generate ideas or structure a draft. Being far from the players, we use Roll20 to play online, and when we play Dungeons & Dragons, I use monsters whose tokens have already been created in advance. The players understand that I can no longer be as meticulous as before, and from time to time, an inconsistency or contradiction might slip into the story. To help me, I developed a storytelling technique I personally call "The Pantry Technique."
The Importance of Player Impact
One thing I've noticed about players is their enjoyment when they have an impact on the story. Although very structured scenarios have their advantages, a freer structure can offer something epic if well-prepared. The Pantry Technique applies the 20/80 principle, or Pareto's law, to have many more elements ready to be used spontaneously during a game session. When you prepare a quest for the next session, 20% of the time you spent in preparation contributes to 80% of the fun you'll have during the session. You just need to focus on the essentials and sacrifice what would make a quest worthy of being published by Wizards of the Coast. Achieving a very high-quality level represents 80% of preparation time and only contributes to 20% of the fun with friends.
Concrete Examples
Traditional Method: A group of adventurers is hired by a noble to retrieve a magical item hidden in a forgotten dungeon. The number of traps, difficulties, and locations are predetermined. There is a map with monsters already placed for potential encounters. The game master has determined the magical item's power and the characters' reward. The rival adventurers' group integrated into the quest has been created along with their NPC sheets containing their powers, special abilities, etc. The objectives of the rival group are determined.
Pantry Technique: The game master decides that a mysterious dungeon and a mysterious item exist. Without going into details, he establishes that adventurers can hear about it through rumors, a riddle, a player's contact, or through a noble who wishes to hire them. An AI can create a good riddle and often contacts have already been created during previous sessions. Use as much as possible an element related to a player or an event from a previous session: a player's tendency to highlight his rogue's attention to rumors, a riddle engraved on a portal that was not ultimately used in a previous session, or adapting to let players discover documents and maps in the noble's chest they decided to steal on a whim. Give a few clues that lead in all directions at once and let the players take the direction they want. This can be one of the paths you planned or a completely new path.
Do not hesitate to reuse differently what you have already created. For example, if the player didn't use the riddle, you can reuse it as a ward for the magical item. Also, if the role-play with the rival group lends itself well, feel free to change your mind and integrate an unbeatable monster unless they ally with the famous group. The player will have a lot of fun using his character's incredible persuasion power. The Pantry Technique is about keeping all these role-play elements in mind without going in-depth and using them spontaneously. Combining elements from players' role-play and incorporating a few of them together can be particularly successful because it will feel like a long-planned climax. That said, it's not as easy as it sounds.
Conclusion
Improvisation is not always necessary. Players may be tired and prefer to simply follow the game master's default quest. They may dive headfirst into your basic quest thinking they have disrupted your plans. Just keep the role-play elements in mind for future use. Perhaps the rival group they allied with will save them in extremis in a future quest. Perhaps the magical item is cursed and will be the object of another future quest. Sometimes amusing things happen like a player inventing a phobia of spiders for their character or even a love story with an NPC. When that happens, put it in your pantry for later.
-
@ 0e9491aa:ef2adadf
2023-05-02 13:36:16People forget Bear Stearns failed March 2008 - months of denial followed before the public realized how bad the situation was under the surface.
Similar happening now but much larger scale. They did not fix fundamental issues after 2008 - everything is more fragile.
The Fed preemptively bailed out every bank with their BTFP program and First Republic Bank still failed. The second largest bank failure in history.
There will be more failures. There will be more bailouts. Depositors will be "protected" by socializing losses across everyone.
Our President and mainstream financial pundits are currently pretending the banking crisis is over while most banks remain insolvent. There are going to be many more bank failures as this ponzi system unravels.
Unlike 2008, we have the ability to opt out of these broken and corrupt institutions by using bitcoin. Bitcoin held in self custody is unique in its lack of counterparty risk - you do not have to trust a bank or other centralized entity to hold it for you. Bitcoin is also incredibly difficult to change by design since it is not controlled by an individual, company, or government - the supply of dollars will inevitably be inflated to bailout these failing banks but bitcoin supply will remain unchanged. I do not need to convince you that bitcoin provides value - these next few years will convince millions.
If you found this post helpful support my work with bitcoin.
-
@ 58edc6ae:e070cfa5
2025-01-01 20:02:36MiCA Regulation and the new AML Regulation have recently come into force, raising several concerns about how the EU is approaching non-custodial payment solutions. These include:
- Conflicts with privacy standards and human rights norms
The rules permit excessive collection and sharing of information on private transactions without adequate safeguards, conflicting with EU privacy standards and international human rights principles, as emphasised in rulings by the Court of Justice of the European Union.
- Blocking innovation
The regulations conflict with privacy-focused technologies, potentially stifling new ideas and platforms in the EU. This could weaken the EU’s position as a leader in digital finance.
- Hurting competition
Compliance with these regulations increases operating costs for EU-based CASPs, placing them at a disadvantage compared to non-EU companies operating under less restrictive rules. This may push users toward unregulated services outside Europe, undermining the regulations' purpose.
- Excluding vulnerable groups
The regulations could make it harder for people in poorer or politically unstable countries to access secure and private financial tools, leaving them without viable financial options.
These issues are explored in detail in the report prepared by nostr:npub15ka0zlfeys4vphnl6dk4x63e7sra0mp3wmrp4ml7q993z8km0n6spjxua8 and me for Open Dialogue Foundation upon the request of nostr:npub13ajk3hhvqys2ev4y68jwxywgs8fsdsuk4y5gkzs874jdyrccvf5qak2yd9 .
It is crucial to reopen the discussion on these issues and urge European lawmakers to reconsider their approach. The EU needs a regulatory framework that strikes a balance between security and privacy, fosters innovation, and rebuilds Europe’s weakened position in the global digital economy.
MiCA #AML
-
@ 0e9491aa:ef2adadf
2023-04-17 18:51:58
"Privacy is necessary for an open society in the electronic age. Privacy is not secrecy. A private matter is something one doesn't want the whole world to know, but a secret matter is something one doesn't want anybody to know. Privacy is the power to selectively reveal oneself to the world." - Eric Hughes, A Cypherpunk's Manifesto, 1993
Privacy is essential to freedom. Without privacy, individuals are unable to make choices free from surveillance and control. Lack of privacy leads to loss of autonomy. When individuals are constantly monitored it limits our ability to express ourselves and take risks. Any decisions we make can result in negative repercussions from those who surveil us. Without the freedom to make choices, individuals cannot truly be free.
Freedom is essential to acquiring and preserving wealth. When individuals are not free to make choices, restrictions and limitations prevent us from economic opportunities. If we are somehow able to acquire wealth in such an environment, lack of freedom can result in direct asset seizure by governments or other malicious entities. At scale, when freedom is compromised, it leads to widespread economic stagnation and poverty. Protecting freedom is essential to economic prosperity.
The connection between privacy, freedom, and wealth is critical. Without privacy, individuals lose the freedom to make choices free from surveillance and control. While lack of freedom prevents individuals from pursuing economic opportunities and makes wealth preservation nearly impossible. No Privacy? No Freedom. No Freedom? No Wealth.
Rights are not granted. They are taken and defended. Rights are often misunderstood as permission to do something by those holding power. However, if someone can give you something, they can inherently take it from you at will. People throughout history have necessarily fought for basic rights, including privacy and freedom. These rights were not given by those in power, but rather demanded and won through struggle. Even after these rights are won, they must be continually defended to ensure that they are not taken away. Rights are not granted - they are earned through struggle and defended through sacrifice.
If you found this post helpful support my work with bitcoin.
-
@ 468f729d:5ab4fd5e
2025-01-01 19:00:36 -
@ d2e97f73:ea9a4d1b
2023-04-11 19:36:53There’s a lot of conversation around the #TwitterFiles. Here’s my take, and thoughts on how to fix the issues identified.
I’ll start with the principles I’ve come to believe…based on everything I’ve learned and experienced through my past actions as a Twitter co-founder and lead:
- Social media must be resilient to corporate and government control.
- Only the original author may remove content they produce.
- Moderation is best implemented by algorithmic choice.
The Twitter when I led it and the Twitter of today do not meet any of these principles. This is my fault alone, as I completely gave up pushing for them when an activist entered our stock in 2020. I no longer had hope of achieving any of it as a public company with no defense mechanisms (lack of dual-class shares being a key one). I planned my exit at that moment knowing I was no longer right for the company.
The biggest mistake I made was continuing to invest in building tools for us to manage the public conversation, versus building tools for the people using Twitter to easily manage it for themselves. This burdened the company with too much power, and opened us to significant outside pressure (such as advertising budgets). I generally think companies have become far too powerful, and that became completely clear to me with our suspension of Trump’s account. As I’ve said before, we did the right thing for the public company business at the time, but the wrong thing for the internet and society. Much more about this here: https://twitter.com/jack/status/1349510769268850690
I continue to believe there was no ill intent or hidden agendas, and everyone acted according to the best information we had at the time. Of course mistakes were made. But if we had focused more on tools for the people using the service rather than tools for us, and moved much faster towards absolute transparency, we probably wouldn’t be in this situation of needing a fresh reset (which I am supportive of). Again, I own all of this and our actions, and all I can do is work to make it right.
Back to the principles. Of course governments want to shape and control the public conversation, and will use every method at their disposal to do so, including the media. And the power a corporation wields to do the same is only growing. It’s critical that the people have tools to resist this, and that those tools are ultimately owned by the people. Allowing a government or a few corporations to own the public conversation is a path towards centralized control.
I’m a strong believer that any content produced by someone for the internet should be permanent until the original author chooses to delete it. It should be always available and addressable. Content takedowns and suspensions should not be possible. Doing so complicates important context, learning, and enforcement of illegal activity. There are significant issues with this stance of course, but starting with this principle will allow for far better solutions than we have today. The internet is trending towards a world were storage is “free” and infinite, which places all the actual value on how to discover and see content.
Which brings me to the last principle: moderation. I don’t believe a centralized system can do content moderation globally. It can only be done through ranking and relevance algorithms, the more localized the better. But instead of a company or government building and controlling these solely, people should be able to build and choose from algorithms that best match their criteria, or not have to use any at all. A “follow” action should always deliver every bit of content from the corresponding account, and the algorithms should be able to comb through everything else through a relevance lens that an individual determines. There’s a default “G-rated” algorithm, and then there’s everything else one can imagine.
The only way I know of to truly live up to these 3 principles is a free and open protocol for social media, that is not owned by a single company or group of companies, and is resilient to corporate and government influence. The problem today is that we have companies who own both the protocol and discovery of content. Which ultimately puts one person in charge of what’s available and seen, or not. This is by definition a single point of failure, no matter how great the person, and over time will fracture the public conversation, and may lead to more control by governments and corporations around the world.
I believe many companies can build a phenomenal business off an open protocol. For proof, look at both the web and email. The biggest problem with these models however is that the discovery mechanisms are far too proprietary and fixed instead of open or extendable. Companies can build many profitable services that complement rather than lock down how we access this massive collection of conversation. There is no need to own or host it themselves.
Many of you won’t trust this solution just because it’s me stating it. I get it, but that’s exactly the point. Trusting any one individual with this comes with compromises, not to mention being way too heavy a burden for the individual. It has to be something akin to what bitcoin has shown to be possible. If you want proof of this, get out of the US and European bubble of the bitcoin price fluctuations and learn how real people are using it for censorship resistance in Africa and Central/South America.
I do still wish for Twitter, and every company, to become uncomfortably transparent in all their actions, and I wish I forced more of that years ago. I do believe absolute transparency builds trust. As for the files, I wish they were released Wikileaks-style, with many more eyes and interpretations to consider. And along with that, commitments of transparency for present and future actions. I’m hopeful all of this will happen. There’s nothing to hide…only a lot to learn from. The current attacks on my former colleagues could be dangerous and doesn’t solve anything. If you want to blame, direct it at me and my actions, or lack thereof.
As far as the free and open social media protocol goes, there are many competing projects: @bluesky is one with the AT Protocol, nostr another, Mastodon yet another, Matrix yet another…and there will be many more. One will have a chance at becoming a standard like HTTP or SMTP. This isn’t about a “decentralized Twitter.” This is a focused and urgent push for a foundational core technology standard to make social media a native part of the internet. I believe this is critical both to Twitter’s future, and the public conversation’s ability to truly serve the people, which helps hold governments and corporations accountable. And hopefully makes it all a lot more fun and informative again.
💸🛠️🌐 To accelerate open internet and protocol work, I’m going to open a new category of #startsmall grants: “open internet development.” It will start with a focus of giving cash and equity grants to engineering teams working on social media and private communication protocols, bitcoin, and a web-only mobile OS. I’ll make some grants next week, starting with $1mm/yr to Signal. Please let me know other great candidates for this money.
-
@ a95c6243:d345522c
2025-01-01 17:39:51Heute möchte ich ein Gedicht mit euch teilen. Es handelt sich um eine Ballade des österreichischen Lyrikers Johann Gabriel Seidl aus dem 19. Jahrhundert. Mir sind diese Worte fest in Erinnerung, da meine Mutter sie perfekt rezitieren konnte, auch als die Kräfte schon langsam schwanden.
Dem originalen Titel «Die Uhr» habe ich für mich immer das Wort «innere» hinzugefügt. Denn der Zeitmesser – hier vermutliche eine Taschenuhr – symbolisiert zwar in dem Kontext das damalige Zeitempfinden und die Umbrüche durch die industrielle Revolution, sozusagen den Zeitgeist und das moderne Leben. Aber der Autor setzt sich philosophisch mit der Zeit auseinander und gibt seinem Werk auch eine klar spirituelle Dimension.
Das Ticken der Uhr und die Momente des Glücks und der Trauer stehen sinnbildlich für das unaufhaltsame Fortschreiten und die Vergänglichkeit des Lebens. Insofern könnte man bei der Uhr auch an eine Sonnenuhr denken. Der Rhythmus der Ereignisse passt uns vielleicht nicht immer in den Kram.
Was den Takt pocht, ist durchaus auch das Herz, unser «inneres Uhrwerk». Wenn dieses Meisterwerk einmal stillsteht, ist es unweigerlich um uns geschehen. Hoffentlich können wir dann dankbar sagen: «Ich habe mein Bestes gegeben.»
Ich trage, wo ich gehe, stets eine Uhr bei mir; \ Wieviel es geschlagen habe, genau seh ich an ihr. \ Es ist ein großer Meister, der künstlich ihr Werk gefügt, \ Wenngleich ihr Gang nicht immer dem törichten Wunsche genügt.
Ich wollte, sie wäre rascher gegangen an manchem Tag; \ Ich wollte, sie hätte manchmal verzögert den raschen Schlag. \ In meinen Leiden und Freuden, in Sturm und in der Ruh, \ Was immer geschah im Leben, sie pochte den Takt dazu.
Sie schlug am Sarge des Vaters, sie schlug an des Freundes Bahr, \ Sie schlug am Morgen der Liebe, sie schlug am Traualtar. \ Sie schlug an der Wiege des Kindes, sie schlägt, will's Gott, noch oft, \ Wenn bessere Tage kommen, wie meine Seele es hofft.
Und ward sie auch einmal träger, und drohte zu stocken ihr Lauf, \ So zog der Meister immer großmütig sie wieder auf. \ Doch stände sie einmal stille, dann wär's um sie geschehn, \ Kein andrer, als der sie fügte, bringt die Zerstörte zum Gehn.
Dann müßt ich zum Meister wandern, der wohnt am Ende wohl weit, \ Wohl draußen, jenseits der Erde, wohl dort in der Ewigkeit! \ Dann gäb ich sie ihm zurücke mit dankbar kindlichem Flehn: \ Sieh, Herr, ich hab nichts verdorben, sie blieb von selber stehn.
Johann Gabriel Seidl (1804-1875)
-
@ 82341f88:fbfbe6a2
2023-04-11 19:36:53There’s a lot of conversation around the #TwitterFiles. Here’s my take, and thoughts on how to fix the issues identified.
I’ll start with the principles I’ve come to believe…based on everything I’ve learned and experienced through my past actions as a Twitter co-founder and lead:
- Social media must be resilient to corporate and government control.
- Only the original author may remove content they produce.
- Moderation is best implemented by algorithmic choice.
The Twitter when I led it and the Twitter of today do not meet any of these principles. This is my fault alone, as I completely gave up pushing for them when an activist entered our stock in 2020. I no longer had hope of achieving any of it as a public company with no defense mechanisms (lack of dual-class shares being a key one). I planned my exit at that moment knowing I was no longer right for the company.
The biggest mistake I made was continuing to invest in building tools for us to manage the public conversation, versus building tools for the people using Twitter to easily manage it for themselves. This burdened the company with too much power, and opened us to significant outside pressure (such as advertising budgets). I generally think companies have become far too powerful, and that became completely clear to me with our suspension of Trump’s account. As I’ve said before, we did the right thing for the public company business at the time, but the wrong thing for the internet and society. Much more about this here: https://twitter.com/jack/status/1349510769268850690
I continue to believe there was no ill intent or hidden agendas, and everyone acted according to the best information we had at the time. Of course mistakes were made. But if we had focused more on tools for the people using the service rather than tools for us, and moved much faster towards absolute transparency, we probably wouldn’t be in this situation of needing a fresh reset (which I am supportive of). Again, I own all of this and our actions, and all I can do is work to make it right.
Back to the principles. Of course governments want to shape and control the public conversation, and will use every method at their disposal to do so, including the media. And the power a corporation wields to do the same is only growing. It’s critical that the people have tools to resist this, and that those tools are ultimately owned by the people. Allowing a government or a few corporations to own the public conversation is a path towards centralized control.
I’m a strong believer that any content produced by someone for the internet should be permanent until the original author chooses to delete it. It should be always available and addressable. Content takedowns and suspensions should not be possible. Doing so complicates important context, learning, and enforcement of illegal activity. There are significant issues with this stance of course, but starting with this principle will allow for far better solutions than we have today. The internet is trending towards a world were storage is “free” and infinite, which places all the actual value on how to discover and see content.
Which brings me to the last principle: moderation. I don’t believe a centralized system can do content moderation globally. It can only be done through ranking and relevance algorithms, the more localized the better. But instead of a company or government building and controlling these solely, people should be able to build and choose from algorithms that best match their criteria, or not have to use any at all. A “follow” action should always deliver every bit of content from the corresponding account, and the algorithms should be able to comb through everything else through a relevance lens that an individual determines. There’s a default “G-rated” algorithm, and then there’s everything else one can imagine.
The only way I know of to truly live up to these 3 principles is a free and open protocol for social media, that is not owned by a single company or group of companies, and is resilient to corporate and government influence. The problem today is that we have companies who own both the protocol and discovery of content. Which ultimately puts one person in charge of what’s available and seen, or not. This is by definition a single point of failure, no matter how great the person, and over time will fracture the public conversation, and may lead to more control by governments and corporations around the world.
I believe many companies can build a phenomenal business off an open protocol. For proof, look at both the web and email. The biggest problem with these models however is that the discovery mechanisms are far too proprietary and fixed instead of open or extendable. Companies can build many profitable services that complement rather than lock down how we access this massive collection of conversation. There is no need to own or host it themselves.
Many of you won’t trust this solution just because it’s me stating it. I get it, but that’s exactly the point. Trusting any one individual with this comes with compromises, not to mention being way too heavy a burden for the individual. It has to be something akin to what bitcoin has shown to be possible. If you want proof of this, get out of the US and European bubble of the bitcoin price fluctuations and learn how real people are using it for censorship resistance in Africa and Central/South America.
I do still wish for Twitter, and every company, to become uncomfortably transparent in all their actions, and I wish I forced more of that years ago. I do believe absolute transparency builds trust. As for the files, I wish they were released Wikileaks-style, with many more eyes and interpretations to consider. And along with that, commitments of transparency for present and future actions. I’m hopeful all of this will happen. There’s nothing to hide…only a lot to learn from. The current attacks on my former colleagues could be dangerous and doesn’t solve anything. If you want to blame, direct it at me and my actions, or lack thereof.
As far as the free and open social media protocol goes, there are many competing projects: @bluesky is one with the AT Protocol, nostr another, Mastodon yet another, Matrix yet another…and there will be many more. One will have a chance at becoming a standard like HTTP or SMTP. This isn’t about a “decentralized Twitter.” This is a focused and urgent push for a foundational core technology standard to make social media a native part of the internet. I believe this is critical both to Twitter’s future, and the public conversation’s ability to truly serve the people, which helps hold governments and corporations accountable. And hopefully makes it all a lot more fun and informative again.
💸🛠️🌐 To accelerate open internet and protocol work, I’m going to open a new category of #startsmall grants: “open internet development.” It will start with a focus of giving cash and equity grants to engineering teams working on social media and private communication protocols, bitcoin, and a web-only mobile OS. I’ll make some grants next week, starting with $1mm/yr to Signal. Please let me know other great candidates for this money.
-
@ 8a03ae29:10b1b6ac
2025-01-01 16:32:00What an crazy, busy ride it's been lately! I've been crisscrossing the nation for work and embarking on the thrilling journey of relocating to a brand new living space. A pitstop on the work journey was San Francisco, once a city of love, which now feels like a city of contradictions. It's fascinating how this place, once so intertwined with the financial world, could stumble so spectacularly. I’ll save my deeper reflections for a separate post. Amidst all these observations and experiences, I’m grateful for the opportunity to connect with all of you and engage in meaningful conversations.
Let's spend a few minutes this morning catching up and talking about what it looks like to be "bankless." It's interesting; usually, this would mean talking about the less fortunate individuals who perhaps don't have a bank or access to all the lame, boring financial services we all take for granted. Today, I'd like to share my thoughts on the possibility of a future where, instead, everyone is bankless. Not because they don't have access to financial services, but because they prefer to take custody of their own assets. Tools have been built to enable not just custody but also (damn near) risk-free lending, capital raising, instantaneous settlement of funds around the globe, micro-transactions, etc. With these capabilities given to every individual who has a smartphone, hopefully, you can see how becoming bankless, something that used to cut people out, just might be everyone's way in.
The concept that I refer to at the end of my last article, how our money is still stuck in the age of the telegraph and has been the slowest part of our lives to enter the age of the internet, is a feature, not a bug. The legacy financial system is a centralized tool of wealth extraction and control. The ways this magical wand is wielded on individuals, institutions, and governments all the same are pretty clear. On behalf of individuals, millions of bankless people in Sub-Saharan Africa, Southeast Asia, and parts of Latin America just lack access to "banking" services because it's not "profitable" enough or even lack the ability to get proper identification, effectively banning their ability to take part in wealth creation. Others like Kanye West or super-rich Russians are cut off from services or have property stolen due to losing political favor. Companies and governments can have assets frozen or even seized for similar reasons or under the guise of violations of our superior morals and are hit with "sanctions." Some might encapsulate this in a word: discriminatory. Something that for sure, without a doubt, does not exist "at the end of history," right? The regulators, who have the audacity to call themselves "Watch Dogs" as if they have any teeth, always allow the robbers to ransack the place before even barking. I guess that's what happens if the burglars break the window with a big juicy steak? If this has happened once or twice, any sane person would suggest ADT.
The legacy financial system is notoriously known to be slow, expensive, ridden with fraud, and frankly dangerous, enriching bad actors and terrorists around the globe. Considering it runs on mainframe technology and requires vast amounts of human input and manual review, it makes sense as to why we all suffer immensely from the flaws inherent in humans: bias. The greatest updates to the most simple form of financial activity have been new cool apps that let you send your friend money, in what seems like seconds, but it really still takes the same old amount of time to settle as any other 'digital' transaction using the legacy financial payment rails. The same censorship applies as well; PayPal is notorious for cutting people off from their funds and inflicting a "guilty until you prove yourself innocent" approach. They automatically enforce this censorship in code for "consumer protectionist measures" while Wells Fargo is fined $1.7B for active money laundering, yet no accounts are ever frozen, and it's always "innocent until and even after settlement." Back to the point, this act of "settling" a transaction is the process where the banks "verify" that a customer has the money in their bank account to pay for dinner. This is what consumes everyone's time. One would think there must be a way to automate this similar to the automation of their customer service (dunk). You ask the legacy system, the only thing that has near-instantaneous settlement, is cash, but good luck getting that to your friend who moved out of state on his birthday. The reason we rely on this flawed crutch is that never before could you prevent or prove ownership of any digital good or object without a slow, centralized actor performing that verification "offline." Today, we have a blockchain for that, and all verification will be done "online," or the industry term, "on-chain."
In the age of the internet, arguably the best way to get your friend that birthday money would be Bitcoin, the first "real-world" application of decentralized finance. Decentralized finance, or DeFi, refers to the decentralized, futuristic, Lego-like building blocks used to construct a new, more inclusive (non-discriminatory) financial system with better financial governance. This system aims to align the incentives of every stakeholder of any type of shared entity. New terms have emerged from the future of the industry: CeFi, DeFi, and DAOs (Decentralized Autonomous Organizations - more on these in the weeks to come). CeFi or some would say TradFi describes the centralized, traditional, legacy financial system that everyone has come to know and hate. Some could argue that any traditional bank with branches throughout a region practices "decentralized" finance. The main difference lies in the governance models of how funds and/or organizations are managed. This brings us back to Bitcoin.
Bitcoin is a peer-to-peer digital cash system with near-instantaneous settlement (around 10 minutes). It means that you can send this new coin to your friend anywhere in the world with an internet connection, without the need for any slow, cumbersome offline verification process.
In a previous article, I mentioned that "digital gold... is uniquely suited to perform in that type of environment." Cryptographically-backed currencies like Bitcoin are the "digital gold" designed specifically for the internet environment. Instead of a distributed centralized actor having full control and being the single point of failure, decentralized financial services are governed by open-source code that anyone can contribute to, review, and run, executed by a blockchain. In fact, the majority of the internet's core services are open-source projects. The internet was built in a way that telecommunications had no single point of failure, and there is no centralized actor with full control of the internet. Can anyone describe a more fitting unit of exchange for that type of environment? One feature of the new magic internet money is that it's completely programmable. You can set monetary policies in open-source code (Bitcoin's current and total supply and inflation rate are publicly available, unlike the current and total supply of USD). This way, everyone holding that money has a full understanding of what the future holds and can plan their life accordingly, but that's only if we, as a people, truly value stability.
Do we all get a vote in how the policy is dictated? That's another feature enabled when using the new magic internet money. The only way individuals can vote for change in the current financial system is by converting the local currency into something else. This has been observed in hyperinflationary regimes like Venezuela, where individuals sell their local currency for foreign currencies, including Bitcoin. With magic internet money, governance models can be implemented from a bottom-up approach. For example, MakerDAO is a Decentralized Autonomous Organization (DAO) that governs the stablecoin DAI, which aims to stay relatively worth $1 USD. MKR token holders participate in the governance process by voting on proposals that can affect the monetary policy and risk management of the MakerDAO system. The voting power of MKR holders is proportional to the number of tokens they hold. There are other voting methods, such as quadratic voting, that aim to achieve a more equitable distribution of preferences and avoid the dominance of simple majority rule. Imagine that for every dollar you hold, you could actively participate in FOMC meetings with the Federal Reserve and vote for the best policy to achieve the fiscal goals of the nation-state (government by the people, for the people), instead of relying on the decisions of 12 unelected individuals in suits.
Another term that has begun to percolate throughout the industry is 'bankless,' which refers to leaving the traditional financial system and instead opting for your finances to be represented in new magic internet money and managed by applications built to automate the functions of legacy services typically offered by a bank. Perhaps "bankless" doesn't quite fit the characterization of what I just described. Maybe the better term is actually "bankmore." The reasons are as follows: 1) There would be more people involved in the banking process. 2) There would be more services offered to individuals. 3) There would be more money in deposits available for loans. Since code can't discriminate (anyone with internet access can create a public and private key needed to verify their accounts on the blockchain) → more people can participate → resulting in reduced fees + expanded reach of services due to the global nature of the internet → leads to greater amounts of deposits → more money for credit creation/expansion and loans → more people lifted out of poverty.
Now, let's shift our focus to how this virtuous cycle can be implemented and what tools we can pay attention to. Use cases such as lending and borrowing were some of the first services that leveraged smart contracts and the magic internet money from blockchains. This technical paradigm has enabled true peer-to-peer lending without the need for intermediaries such as banks. Some platforms, like Compound, Aave, or MakerDAO (as mentioned above), even offer higher yields on deposits than traditional finance. Decentralized exchanges (DEX) like Uniswap ensure a fair and decentralized trading environment where every participant has equal access to liquidity. This groundbreaking approach eliminates concerns such as front-running, which has caused poor public relations for centralized brokers like Robinhood.
Are there any new capabilities or services that this new technology brings? Of course, there are capabilities such as microtransactions and micropayments. In traditional banking systems, microtransactions are not well-suited due to high fees and infrastructure limitations. However, cryptocurrencies and DeFi enable microtransactions and micropayments with low transaction costs and the ability to transfer fractional amounts of cryptocurrencies. This opens up new use cases, including micro-rewards, pay-per-use services, and decentralized content monetization. It unlocks new business models for creators, further fueling the creator economy. Instead of journalists being forced to give up their talent to entities like the Wall Street Journal for a salary, magic internet money can unleash them to share their content in more places at a lower cost, increasing distribution and providing people with greater access to information and a more diverse set of perspectives.
As you can see, the blockchain technology has brought forth questions that many of us have never considered, assuming that someone else would know better and handle it. To shape the future you desire, you must participate in the present. Engage in discovery, questioning, testing, and finding solutions. The bigger and more humanitarian question I hope everyone reaches is: "What do I want the future to look like, and how can I contribute to making it a reality?"
I hope you are sticking with me and starting to see a glimmer of hope for a better, freer, and more inclusive world that extends beyond the fortunate few who were born with access and opportunities to create wealth.
Are You Feelin’ Moody?
-
@ 0e9491aa:ef2adadf
2023-04-10 14:32:39@matt_odell don't you even dare not ask about nostr!
— Kukks (Andrew Camilleri) (@MrKukks) May 18, 2021
Nostr first hit my radar spring 2021: created by fellow bitcoiner and friend, fiatjaf, and released to the world as free open source software. I was fortunate to be able to host a conversation with him on Citadel Dispatch in those early days, capturing that moment in history forever. Since then, the protocol has seen explosive viral organic growth as individuals around the world have contributed their time and energy to build out the protocol and the surrounding ecosystem due to the clear need for better communication tools.
nostr is to twitter as bitcoin is to paypal
As an intro to nostr, let us start with a metaphor:
twitter is paypal - a centralized platform plagued by censorship but has the benefit of established network effects
nostr is bitcoin - an open protocol that is censorship resistant and robust but requires an organic adoption phase
Nostr is an open communication protocol that can be used to send messages across a distributed set of relays in a censorship resistant and robust way.
- Anyone can run a relay.
- Anyone can interact with the protocol.
- Relays can choose which messages they want to relay.
- Users are identified by a simple public private key pair that they can generate themselves.Nostr is often compared to twitter since there are nostr clients that emulate twitter functionality and user interface but that is merely one application of the protocol. Nostr is so much more than a mere twitter competitor. Nostr clients and relays can transmit a wide variety of data and clients can choose how to display that information to users. The result is a revolution in communication with implications that are difficult for any of us to truly comprehend.
Similar to bitcoin, nostr is an open and permissionless protocol. No person, company, or government controls it. Anyone can iterate and build on top of nostr without permission. Together, bitcoin and nostr are incredibly complementary freedom tech tools: censorship resistant, permissionless, robust, and interoperable - money and speech protected by code and incentives, not laws.
As censorship throughout the world continues to escalate, freedom tech provides hope for individuals around the world who refuse to accept the status quo. This movement will succeed on the shoulders of those who choose to stand up and contribute. We will build our own path. A brighter path.
My Nostr Public Key: npub1qny3tkh0acurzla8x3zy4nhrjz5zd8l9sy9jys09umwng00manysew95gx
If you found this post helpful support my work with bitcoin.
-
@ d920bbbd:5213849e
2025-01-01 15:00:33Background : Family of 4, including 2 children under 10, coming to El Salvador for a 15 days holiday trip. Instead of telling our story to family and friends as we usually do, we’ll instead write a (very, very long) thread about it, so it’ll help organize our thoughts, and have place to discuss them.
It might also help you decide if you’d like to come and spend some time in El Salvador or not.
For clarity’s sake, I'll try to put a tag before each post with it's main theme
[QUICK BACKGROUND 👨👩👦👦] For additional background, we are currently living in what people usually call a First-World country in Europe, where basic human rights like free speech and individual liberty reign supreme... which is a bit odd to say in the light of recent news like mass censorship laws, civil unrest, arrest of @durov...
Our youngest child being finally old enough to travel long distance without causing trouble, we wanted to see something new (first time to central America), and also check if the turnaround since @nayibbukele was elected was real, and all the hype we read often about El Salvador was justified.
So we flew nearly a whole day hours (stops included) to have a look at it for ourselves.
[FIRST IMPRESSIONS] First thing we noticed out of the plane is the security. Not bullshit security like endless queues with body and luggage scanners (which we already went into several time before boarding the planes…), but useful security with armed guards patrolling with sniffer dogs. Reassuring.
Passing customs was also quick and easy, and the officers there were nice and patient despite our poor Spanish. You’ll get mugshotted and fully KYC’ed (what’s your business in El Salvador, where you’ll stay etc…), annoying but usual from customs screening foreigners coming into their country.
The airport was overall very clean, simple to navigate, and looked like any modern airport we’ve been to in Europe. There was also some construction being done around it, so it’s probably getting bigger soon.
Picking-up and dropping back our rental car was very smooth, better than what we are used to when going through the big rental companies, and at a lower cost. Shoutout to @bitdriver about that, whom was recommended to us by a friend. If you go to El Salvador, rent through this man, it’s easy and you support local entrepreneurs.
We left the airport (after having to present an ID to the parking guard, which is a recurring theme, as they even you to left an ID as deposit when you rent a lockbox in amusement park…) and headed to our rental flat located in a condo in El Escalon, a colonia (district) on the outskirts of San Salvador.
There, we were greeted by armed guards (also a recurring theme), who did a full ID/KYC check again about our business here… and then escorted to our flat by one of the guard.
It might be odd for me to point this out, but in Europe, basically only policemen (and not even in all countries), trained and licensed security personnel like bodyguards (very rare) or military are allowed to carry firearms in public.
[SAFETY 👮] So to get this out of the way regarding security : nearly anywhere we went (national parks, amusement parks, restaurants, malls, parking lots…) you’ll be greeted with armed guards wearing mostly revolvers and coach guns. The Salvadoran Police (PNC - Policía Nacional Civil) is also very present, especially in very touristic areas like the historical center of San Salvador or national parks. This dissipated right away any doubt we might have regarding our security in the country. Not once during our whole trip we felt insecure or even bothered about that, and we just forgot about it.
[MOVING AROUND/ROADS 🚗🛣️] During our 15 days, we travelled around 1.3k kilometers around the country, exclusively with our rental car. As I’ll mention several time in the thread, I’ll use Western Europe for reference, so all I say might seem funny for Southern, Middle and North Americans…
Driving in El Salvador is very different than in the EU. While most road rules are the same (then even measure speed and distance with Kilometers/hour, not Miles/hour…) people usually pick a lane and stick to it. You can pass cars left or right equally, people don’t care, while in the EU it’s illegal to pass someone to the right (unless in the UK, obviously…) and people will road rage at you if you do that.
Also, the road signs are much rarer, and you better use Waze or Google Maps to navigate (Apple Plans can’t even give you walking directions in El Salvador…).
The road from the Airport to San Salvador was very nice, smooth, and well lit with the Salvadoran flag colors (Blue/White/Blue) lit all along the way. Looks very cool and gives a welcoming feeling to foreigner (and I can imagine a prideful feeling for locals)… all that with just some leds.
It’s a bit different once you reach the city, were you’ll be greeted with your first Túmulo (basically very steep speed bumps located at the cities’ entrance and some residential/school areas) that you better not ignore if you value your car.
The roads were very smooth and well painted, but I was sometimes met with the biggest pot holes I’ve seen in my life. It’s a pity because 80% of the Salvadoran roads we travelled were in very good condition, about similar to what we have in the EU, but 20% is either unfinished (no asphalt) or poorly maintained (potholes of various size).
The Carretera Panamericana (Central American Highway, crossing El Salvador) is speed limited to 90 km/h is was nearly perfectly maintened. I think this situation (Speed Túmulos at the city entrances + some harsh roads) is what is leading Salvadorans to use mainly SUV’s/Pickups as their car of choice.
From what we've seen on the road, Salvadorans drive mostly Japanese and Korean SUVs and pickups (think like Nissan Rogue SUVs, called Nissan X-trails in the EU, or Mitsubishis L200/Toyota Hylux style pickups), and have a lot of tallers (garages) everywhere. We saw 40 year old cars that would have been sent to the scrap heaps 30 years ago in the EU still going here, and where a car with 100k km on the odometer is considered old and borderline scrap heap-able in the EU, here they are still looking good and working good. For reference, our rental had 200k KM on the odometer, and everything worked perfectly fine.
Weirdly enough, it seems pedestrians have no right of way in El Salvador. Even though there are plenty of crosswalks, even on the highway, we learned pretty fast that the custom here is to not stop to let pedestrians cross, and we saw several time people chilling on the median, waiting for the traffic to abate before crossing to the other side of the road. Total opposite of were we live, where any pedestrian waiting at a crosswalk (without traffic lights) has the right of way.
Lastly, while I mentioned before the official distance and speed unit is based on the kilometer, the gas is always priced in $/gallon (1 liter of super premium is about $1.11, while in the EU it’s usually between €1.80 to €2.20), but the drinks/food are sometime sold in oz/lbs, and sometimes in liter/gram. Odd but manageable.
[TRAFFIC/PUBLIC TRANSPORTATION 🚌🚥] As with all big cities we’ve been to, traffic is really bad in and around San Salvador. Better be patient and do not get lost because it could add tons of time to your trips due to traffic.
We didn’t use buses because we had our car, but there are plenty of Salvadoran public buses going from anywhere to everywhere, for apparently not even $1 per ride. 80% of the buses we’ve seen are literally old repurposed American school buses, that are painted and tuned by locals. You can see buses with flashing leds, custom rims, custom spring where the front axle is lifted twice as high as the back one, shark-tails spoilers, and graffiti-style city names. They basically pick you up and drop you anywhere you like.
It’s a bit of the same with trucking : a lot of “old” big rigs from the US are used here to transport freight and construction material. I’ve also seen some of the best customised trucks with led designs, custom rims and paint here. Same goes for car tuning : a lot of Salvadoran apparently like to customise their car, even with stuff that should be illegal in the EU (flashing, coloued headlights, big exhaust, custom rims with protruding spikes…) We didn’t see many luxury cars, besides a few US luxury pickups and huge SUVs. Nearly 0 German cars, overall way less than 1% of the cars we crossed on the road. A handful of BMWs, 3 Porsches, 2 Mercedes. And 0 Tesla, nor EVs in general, except maybe an electric DHL Van and a hybrid or two cars (and we’re not even sure about these being fully electrical or even hybrid). It’s a big contrast since EVs (especially Teslas) are now everywhere in the big European cities. We didn’t see any EV charging point anywhere, too. As we mentioned before, keeping older car road worthy is big here, and with gas at around $1 per liter, I can understand why there’s zero EV in El Salvador (yet).
We also saw plenty of locals using small trucks as buses (where 15+ people are standing up next to each other on an open-ended truck), big dump-trucks where 5+ people were chilling on the dirt, and kids and teens sitting in the back of pickup trucks… Again, this might seem normal here, and I’m not judging if it’s good or bad (people are free to travel however they like as long as they do not endanger other road users if you ask me), but coming from Europe, you’d get arrested and fined within 10 minutes of travelling like this.
I’ve also come across old railways track, and the only time I heard about trains in El Salvador was from a tour guide than explained to us that people tried to flee from a small village near San Salvador by train during the last San Salvador Volcano Eruption in 1917… but the train tracks were cut off by a lava trail. So I’ve looked it up and indeed there are no more railways operating in El Salvador since 2002 (due to no rentability and damage from the civil war, and reset plans were unsuccessful so far). Apparently there are new big plans to rebuild a new railway called the Pacific Train. If successful, that would be a very good development to alleviate traffic and allow people to travel the country more quickly, but we’ll have to wait and see how it goes.
[SAN SALVADOR HISTORICAL CENTER ⛪️] We visited the historical center of San Salvador, where ultra modern edifices like the BINAES (Biblioteca Nacional de El Salvador) are standing across older gems like the Palacio Nacional (built in the late 1800’s, destroyed by fire, rebuild in the early 1900’s (you can have a look at the older foundations during your tour)) which is still hosting speeches from @nayib according to our tour guide and the Catedral Metropolitana de San Salvador, a beautiful cathedral facing the BINAES.
Speaking of the BINAES, it is a library open 24/7 which is as much an amusement park for babies, kids, teens and adults (think playgrounds, video games, themed areas about Star Wars, Harry Potter and LOTR) than a library for readers and learners (plenty of brand new books and reading areas). I wish we had something like this at home because you have to spend some time there to see how cool it is, whatever your age and your book taste are.
Next to these very touristic areas, you also have local markets and shops, where you can get a haircut for $2.5, and buy anything (food, clothes, and all kind of stuff) for a few dollars or even cents.
The contrast is very strong between the local areas and the tourist areas ; you can see very clean and modern streets, parks, fountains, on par or better than what you’ll see in Europe, and one block away you are back 30 years in the past, with people having stands on the street flea-market style, street vendors waving at you to sell you stuff (can’t hide you’re a tourist here), and overall a very organized-chaos feeling there. Even in these areas, we were never bothered by Salvadorans.
[RURAL CITIES 🏘️] We went to visit a few typical Salvadoran cities in the back country, notably a few on the route of flowers (even though there are no flowers here during the winter) : Nahuizalco, Apaneca, Concepción de Atacó… They have in common to have usually busy marketplaces around the city center, nice parks to chill for a bit with kids playground, often some very nice hand-painted murals, and always some churches/cathedrals that are very well tended to. The life of these cities look to be organised around the town center, as there are plenty of vendors, shops and place to eat in this area. We also went to visit Suchitoto, where you can spend the day as there are many things to do, places and museums to visit. One of the most intriguing part of this city was that it was full of little car looking like golf carts. After doing a bit of research, apparently these are Indian-made and called Bajaj Cute. The city's roads and roads to the lake were even arranged with narrow bands of concrete as large as these cars' size to help them navigate the cobblestone roads and steep roads in the area.
And of course, there are also plenty of natural wonders around these cities to discover.
[VOLCANOES/RUINS/BEACHES/PARKS 🌋🏖️🏞️] We also visited as many of the natural and archeological wonders as we could, such as the San Salvador volcano, with its stunning views over San Salvador city and the craters… yes, there is a crater (El Boqueroncito) inside a crater ! (El Boquerón). We also spotted the Torogoz here, which is the official animal of El Salvador and which has a very cool backstory told by our guide.
We also saw very well preserved Mayan Ruins (El Tazumal), and stunning beaches (El Zonte, aka Bitcoin Beach, awesome surf spot, where we met mostly foreigners) and San Diego Beach, which looked like and endless tropical sand beach where we met about as many people enjoying the beach than lifeguards (actually one “official“ life guard, and a local guy patrolling the beach on a donkey, both warned us about the tide and currents, which as very appreciable especially with young kids). Looks aside, the big difference with Europe regarding beaches is the fact that houses and ranchs are built very close to the shoreline basically everywhere we went. It might be nice if you live there, or are willing to rent a ranch for the day where you can enjoy a swimming-pool, hammocks, and fresh drink and food along with having the beach a few meters away, but we thought it took away from the natural charm of these areas. There were dozen of other recommended beaches we didn’t went to, so it might be different elsewhere.
Everywhere we went to visit or have a tour, we were met by local licensed guides that offered to walk us around the places while telling us the sorties and anecdotes about them. Most of the guides could speak English, all of them were ultra nice and patient with our kids and our broken Spanish, and it’s free. But if you have manners, you leave them a nice tip after the tour. This was a very appreciable. The only paid visits were for historical monuments, but there you always have a guide with you, usually English speaking (that you can also tip since they are very nice and knowledgeable about their heritage) This and the previous paragraph are amongst the shortest we'll write about, not for their importance since the views are stunning and the places to visit are beautiful, but because speaking about these experiences don’t do them justice, and are best lived and seen rather than read and looked at.
[KIDS ACTIVITIES 👦👧🛝] Now my kids have been bothering me for a while about mentioning amusement parks.
As mentioned above, even though we visited a volcano and an old Mayan temple, there were several more volcanoes on our list (Santa Ana, Izalco…) and ruins (Joya de Ceren, Cihualtan…) than we could have visited… but kids have a very short patience gauge that you have to regularly refill with trips to local parks. We visited about 10 of them, and I’d say 2/3 were very well tended, with playgrounds areas for kids, and 1/3 were not as well tended as the rest, with muds and puddles … still praticable but not ideal if you want to keep your car clean.
But what our kids liked the most was their trip to a water park called Termos Del Rio, where we spent the day watching them playing with water games and slides. We ate there, and the food was very good for a fraction for half the price of what we paid in Europe. Our only regret is that our oldest child wasn’t tall enough to do the “big” slides, and that only half of them were open for us. Compared to Europe, I’d say it’s about 75% cheaper for entry + food, people there are way more polite and disciplined (keeping in mind it’s an amusement park, so rowdy teenager are expected and tolerated, but people were never agressive or impolite as you can see in some amusement parks in Europe).
We also went to a few other amusement parks, and they were nice and well maintained, with generally a lower price than what is charged in the EU for equivalent activities (but still a bit pricey compared to the rest of the activities we did in El Salvador).
[SHOPPING / GROCERIES🛍️🛒] We also visited the MultiPlaza mall in Santa Tecla. It’s a very modern mall, again on par on better than what is done in Europe. You have plenty of shopping options for everyone and in all price range, except the very high end luxury (think french luxury brands) that we did not see but that are usually present in such malls in Europe. They might be someplace else in El Salvador, but we didn’t cross any during our trip.
Again, you can eat and drink very well for half, even a third of the price of what you’d pay for similar quality in Europe, but more on food later because it’s far from perfect. Non-food items and activity are about the same price than in the EU.
We had the surprise to come across a Chuck E Cheese, which do not exist in the EU (it’s like a huge arcade area where you buy credits or time, and play games for fun and for points, which you can redeem for small prizes)… so of course we had to bring our kids there.
It was a close second to Termos del Rio for them, probably because we spent less time in there while we spend a full day at the water park, because spending time playing in Chuck E Cheese is much pricier than local amusement parks…
For our groceries, we mostly bought them in 2 big chunks (one for each week) from the local supermarket that was closest to us, (SuperSelectos). You can buy anything that you can usually buy in any EU supermarket, with the standard travel quirks of local products being cheap and available, and imports (especially from outside America) being scarce and expensive.
[FOOD 🍔🥤🚫 / 🥩🥛✅] Which bring us to our first issue (not a deal breaker, but could become major if not checked) drawback regarding El Salvador : Fast-food chains prominence.
You can feel the US influence regarding food in El Salvador in General, and in San Salvador particularly : there are huge advertisement billboards everywhere, and I’d say half of them are about fast-food chains. (such huge billboards and dense billboards are not common in Europe)
There are fast-food chains everywhere, A LOT of them. It’s very different than Europe because while fast-food chains are also present in the EU, the ads are much less visible and they are competing with a lot more traditional restaurants.
But in San Salvador and other big cities, your default option when eating out is going to a fast-food. This is clearly not good because eating that food regularly is very bad for your health, which is visible on the population. We saw a lot of overweight people, including kids (not US Overweight, aka obese), but our rough estimate was that 40% of the people we came across were visibly overweight.
This is not aided by the drinks selection, were sodas are pushed into your throat at every corner, and sparkling water is not very easy to find, usually "hidden" in the Soda section in supermarkets… The mineral water and Sparkling water is usually 1/4 of the size of what it is in the EU, where you have big aisle usually dedicated to that. The south American drinks (agua de Jamaica, horchata…) while sugary, are nice refresher and taste very good when homemade with little sugar.
It’s a real shame because the Salvadoran food tastes awesome and is way healthier than fast-food. Everywhere we went to eat, we were able to order very healthy and perfectly cooked foods (mostly parilladas composed meat, seafood and vegetables) in any of the local restaurants.
We also obviously ate Pupusas, the local salvadoran dish, and they are indeed very good and cheap, and still a vastly superior option over fast-food.
This food selection is not an El Salvador only problem (most “first world countries” suffer from it, too), but I think @nayibbukele should look into this issue because if left unchecked, it’s only get worse the more affluent El Salvador will become (like in the US), and this is a real plague on a country population's general well being. Not my place to tell him or Salvadoran what to do, but with such great local options, it's a shame this kind of healthy food isn't promoted more heavily over imported poison.
[BEERS/COFFEE 🍻☕️] I tried local beers brewed in El Salvador like the Pilsener and the Regia, both blonde beers with the Regia being a bit stronger and the Pilsener a bit softer, which I liked more.
I’m a Guinness Guy, and you won’t mistake these beers for the well known European beers, but they were a completely acceptable replacement for a holiday refresher, especially in this weather, and you could easily develop a taste for it.
We bought and tried Salvadoran coffee, both from the local markets and the supermarket. The Salvadoran coffee is very good, and produced locally. We planned to visit a local coffee factory, but we didn’t have the time, so that’ll be for another time. We brought back a few packs for our families and friends, along with other souvenirs.
While I said the Salvadoran coffee was very good, the main "issue" we encountered is that unlike Europe, where the standard coffee is the Espresso (short coffee, usually sort of strong), most places we went to usually served only American-style coffee (rather long and filled with water). Sometimes we could barter with the waiters and get a “sort-of espresso”, but sometimes we had to drink American-style coffee because their machines somehow couldn't manage to make espressos...
[WEATHER 🌤️] We were warned about intense rain and bad weather, since this time of the year is considered “Winter” in El Salvador.
We basically never had rain during the day. It was often lightly overcast, and we got a couple of showers maybe thrice. While we bought waterproof ponchos before leaving, they never left our backpack. It usually rained late in the day (from 7 pm and at night), but since we never were out too late, this wasn’t a problem at all.
Also, the sewer system seems to work perfectly fine, since everywhere we went, there was no smell, not we never met any overflowing sewage pipes.
We also were warned about mosquitoes, because there was (maybe still is) a Dengue surge in the country. We didn’t see many mosquitoes, except in the less well maintained parks, and since we used repellant sprays, we had no bites during our stay. It’s probably a bigger issue outside the cities though, as they were ads warning about that in the streets.
But overall, what is “Winter” here is a much nicer climate than any kind of summer in Northern Europe, and on par with the Southern Europe summers, with just more nightly rains.
[CLEANLINESS 🗑️] I won’t beat around the bush : with fixing the fast-food diet, I think this will have to be one of the biggest issue to tackle in the future for El Salvador. As beautiful as all the places we visited could be, there was trash and rubbish basically everywhere along the way : on the roads, on the side of the roads, on the highway, in the lakes and rivers, in the cities and outside.
I wish it was an exaggeration but this is really everywhere except the very modern areas inside San Salvador and Santa Tecla (a very rich looking region/suburb next to San Salvador). Like the chicken and egg paradox, the surroundings here are so littered with trash that I can for some extent understand why people throw rubbish away anywhere : “What? There’s already tons of trash on the floor, another bottle or another paper thrown in there won’t change anything.”
Again, it’s not my place to give advice to anybody on how to fix their issues, but I firmly believe there will need to be a huge cleanup of the country needed (psychology tells you it’s much harder for people to throw the 1st piece of trash on the floor than the 100000th), along with some form of general education first + punishment second if the general behavior doesn’t improve. Also, things like open-air bins like I saw in some parts of San Salvador don’t help ; western-style closed trash bins are much better for general hygiene, and much less subject to elements scattering your trash around.
On the bright-side, unlike some famous city which recently hosted the Olympic Games, I didn’t see any rodent milling around anywhere. Doesn’t mean there are none, just that I didn’t see any. Also, no smell and the sewers system seem to work very well as we mentioned previously.
[No pictures of trash for obvious reasons.]
[NATURE/CITIES 🌴🏡] El Salvador is a very lush and green country. There are trees and plants everywhere, even in the city Centers with plenty of parks and median planted with trees. With the country growing (and urbanizing) at the speed it currently is, I really hope El Salvador will stay green and embracing nature, as it helps a lot with dissipating heat in the cities, and finding nice, quiet and natural places to take mindful breaks during the day.
Their rural cities are also built very flat, where living is usually done in small neighboring houses rather than tall buildings, which is a welcome sight coming from Europe.
San Salvador is built a bit more like a “modern” cities, with taller buildings, but from what on of our guide told us, there are no skyscrapers due to the potential volcano eruptions and seismic activity (bigger tower is apparently around 30 floors max). There is basically one earthquake every other day in, or around San Salvador, but we only felt one of them as most happened either too far from were we stayed or too weak to be felt.
There were Japan-style "evacuation meeting points" outside of several places we went to. And if anything is to be learnt from Japan, living in a very seismic area in nothing that can’t be fixed by good engineering.
[LOS SALVADOREÑOS] The biggest of the many highlights of our trip was meeting the Salvadoran people, called Los Salvadoreños. I would describe Salvadorans as humble, polite, friendly, warm, patient and helpful people. Anywhere we went, not once were we greeted by annoyed/bored people while we spoke broken Spanish and had two young kids with us. Whether or not it was for a commercial transaction, we were treated equally nicely by any of the people we met there. If you travel a lot in the EU and do not stick to high-end places (and weirdly enough, low-end places), you’ll discover that being nice and helpful isn’t always the norm here.
All guides were very cultivated and proud about their Salvadoran heritage, and all workers professional and efficient. As mentioned before, even when wandering in the very local areas of San Salvador, where you barely see any tourists (if at all), we were never bothered or felt threatened. I understand this changed a lot since @nayibbukele put gangs in jail, but this is still a very welcome feeling, because you cannot say the same of some districts inside cities we call “civilized” in Europe. The only thing is that next time we’ll come back, we’ll have learnt a lot more Spanish, which is a must here since I’d say maybe 20% of the people we met could speak English.
It’s also worth nothing that during our trip, I’ve spoken with 3 Salvadorans whom have left the country for the USA (2) and Canada (1), all between 20 and 30 years ago. Two of them were coming back in El Salvador for the first time since a while. One person was coming back with his 4 teenage children, and it was the children’s first time in El Salvador. All of 3 of these Salvadoran told me the same thing : they didn’t recognize the country they remembered when they left, as it had drastically changed for the better.
[WHERE IS EL SALVADOR AND WHERE IT MIGHT HEADED 🇸🇻✨] Take it with a pinch or a handful of salt, since this is written by a tourist whom stayed a grand total of 15 days in the country, but what I feel regarding “El Salvador the country” is that this is a country which elected a visionary leader, whom is trying to propel his El Salvador at a level of quality of life on par, and maybe better than what is done in what we “First-Worlders” call a “developed country”.
This shows by his very strict policies regarding violence, which are often denounced in first-world countries, but these policies brought his country from one known as one of the most violent in the world, that from Europe we only heard horror stories about, from the one in which we felt the safest we’ve ever been.
This shows in the speed at which the country is building at : I’ve spoken about bad traffic before, but I also need to mention I’ve seen a lot of workers and heavy duty equipment working to enlarge the roads going in and out of San Salvador. And when I say “a lot”, I mean that I’ve seen more workers doing actual work on the roads in a single one-hour road trip than what I usually see in Europe over the course of a full month.
This also shows by the contrast between the standard of living in San Salvador, where in some areas you can have towering condos with 24/7 armed security, 24/7 concierge, aircons, big elevators, backup electricity generators, and all the modern appliances and amenities you can usually find in the “First-World”, and just one block away you’ll find typical one-floor, Salvadoran houses with no aircons, barred windows with barbed-wire of the roofs.
Lastly, I’ve felt being in a country heading to somewhere better, with its people working hard to create a better tomorrow by improving their country.
From what I’ve seen, if they are able to bring all their people up together (not just the city dwellers/white collar class), and manage to avoid the usual traps of fast growing economies (things get so good so fast that officials start to get corrupt by rich investors/companies, and put their personal interests over the people's…) my bet is that in 20 years maximum they should reach a standard of quality of life on par, or even better than what exists in the most developed EU countries.
We’ll surely come back before that time to see how it goes, and discover more of this intriguing country, so we might give you an update or two along the way.
[CLOSING REMARKS 📙] : As mentioned in the intro, we're just a random family of 4 who've just been travelling 15 days to El Salvador in August 2024, and are sharing our thoughts about the trip, citizen journalism style, and so we don’t have to repeat ourselves too much to family and friends. If any Salvadoreños are reading this and want to add context/correct stuff I didn’t understand or got wrong, all comments and critic are welcome ! If this thread was helpful to you, and want more info regarding anything mentioned here, good and bad, feel free to ask in the replies and we’ll try to answer to the best of our abilities.
(I do not know if this might be worth mentioning, but better be safe than sorry : we did not receive nor ask for any money, favors or gifts from whoever was mentioned (or not) in the thread. All our expenses were 100% covered by ourselves. We remain purposely vague about ourselves because we value our privacy, but we would be called a standard family living in the EU by anyone knowing us.)
TL:DR : Ask your favorite AI assistant to sum it up for you.
-
@ 0e9491aa:ef2adadf
2023-03-30 13:43:56The newly proposed RESTRICT ACT - is being advertised as a TikTok Ban, but is much broader than that, carries a $1M Fine and up to 20 years in prison️! It is unconstitutional and would create massive legal restrictions on the open source movement and free speech throughout the internet.
The Bill was proposed by: Senator Warner, Senator Thune, Senator Baldwin, Senator Fischer, Senator Manchin, Senator Moran, Senator Bennet, Senator Sullivan, Senator Gillibrand, Senator Collins, Senator Heinrich, and Senator Romney. It has broad support across Senators of both parties.
Corrupt politicians will not protect us. They are part of the problem. We must build, support, and learn how to use censorship resistant tools in order to defend our natural rights.
The RESTRICT Act, introduced by Senators Warner and Thune, aims to block or disrupt transactions and financial holdings involving foreign adversaries that pose risks to national security. Although the primary targets of this legislation are companies like Tik-Tok, the language of the bill could potentially be used to block or disrupt cryptocurrency transactions and, in extreme cases, block Americans’ access to open source tools or protocols like Bitcoin.
The Act creates a redundant regime paralleling OFAC without clear justification, it significantly limits the ability for injured parties to challenge actions raising due process concerns, and unlike OFAC it lacks any carve-out for protected speech. COINCENTER ON THE RESTRICT ACT
If you found this post helpful support my work with bitcoin.
-
@ 656a6efa:ec0bd10e
2025-01-01 14:42:26Accounting Update 2.0 from 15th Centry -> 21st Century
Luca Pacioli’s double entry bookkeeping was a real 0 to 1 moment in the world of record keeping. Standardizing the accounting protocol allowed for a base level of trust between record keepers and interested parties of investors and owners. Trust might be a stretch of the word, in reality, it was really just an agreed upon structure or rules which then changed with consensus over time.
The problem we have been dealing with since reaching record keeping consensus is accuracy. The accounting protocol is not perfect. It relies heavily on human implementation and we are still too early in modern attempts at automating record keeping. Audited Financial Statements have typically been the answer to the problem of accuracy (though the level of scrutiny books go through in an audit would surprise most people not familiar with the processes of an audit). An audit, at best, just means that the information you’re looking at is ~mostly~ right. Described by an industry word, “material”.
The problem is with the banks. I know . . . you’re shocked a bitcoiner has a problem with banks . . . but it’s not like that. A large part of the record keeping process is comparing the bank record of transactions to the accounting records transactions in what is called a reconciliation. It’s just a comparison of the two ledgers. If those ledgers don’t agree, your records are wrong. You then take those bank ledgers and verify transactions with supporting documents like invoices, shipping records, and checks. It’s a tedious, potentially error-prone process.
Bitcoin, could fix this.
By tying transactions into a public, real-time ledger, there is no need for the bank reconciliation process. Global consensus deemed your transactions as valid and all an organization would have to do is prove they have the key. There’s even potential for organizations to embed invoices directly into payments meaning that each transaction has support for it with verification from an outside party of what the funds were used for. Instead of saying, “we have an audit as of 12/31/20XX” you have the potential for real-time audits of transactions with 100% accuracy. 100% verification of accuracy is not economically freasable or practical with today’s processes.
As of the day of this writing, that possibility is all but a dream, but I look forward to the day where accountants look more like today’s computer programmers than a 15th century monk.
-
@ 0e9491aa:ef2adadf
2023-03-10 19:51:41Bank run on every crypto bank then bank run on every "real" bank.
— ODELL (@ODELL) December 14, 2022
The four main banks of bitcoin and “crypto” are Signature, Prime Trust, Silvergate, and Silicon Valley Bank. Prime Trust does not custody funds themselves but rather maintains deposit accounts at BMO Harris Bank, Cross River, Lexicon Bank, MVB Bank, and Signature Bank. Silvergate and Silicon Valley Bank have already stopped withdrawals. More banks will go down before the chaos stops. None of them have sufficient reserves to meet withdrawals.
Bitcoin gives us all the ability to opt out of a system that has massive layers of counterparty risk built in, years of cheap money and broken incentives have layered risk on top of risk throughout the entire global economy. If you thought the FTX bank run was painful to watch, I have bad news for you: every major bank in the world is fractional reserve. Bitcoin held in self custody is unique in its lack of counterparty risk, as global market chaos unwinds this will become much more obvious.
The rules of bitcoin are extremely hard to change by design. Anyone can access the network directly without a trusted third party by using their own node. Owning more bitcoin does not give you more control over the network with all participants on equal footing.
Bitcoin is:
- money that is not controlled by a company or government
- money that can be spent or saved without permission
- money that is provably scarce and should increase in purchasing power with adoptionBitcoin is money without trust. Whether you are a nation state, corporation, or an individual, you can use bitcoin to spend or save without permission. Social media will accelerate the already deteriorating trust in our institutions and as this trust continues to crumble the value of trust minimized money will become obvious. As adoption increases so should the purchasing power of bitcoin.
A quick note on "stablecoins," such as USDC - it is important to remember that they rely on trusted custodians. They have the same risk as funds held directly in bank accounts with additional counterparty risk on top. The trusted custodians can be pressured by gov, exit scam, or caught up in fraud. Funds can and will be frozen at will. This is a distinctly different trust model than bitcoin, which is a native bearer token that does not rely on any centralized entity or custodian.
Most bitcoin exchanges have exposure to these failing banks. Expect more chaos and confusion as this all unwinds. Withdraw any bitcoin to your own wallet ASAP.
Simple Self Custody Guide: https://werunbtc.com/muun
More Secure Cold Storage Guide: https://werunbtc.com/coldcard
If you found this post helpful support my work with bitcoin.
-
@ 0e9491aa:ef2adadf
2023-03-09 15:39:07The former seems to have found solid product market fit. Expect significant volume, adoption, and usage going forward.
The latter's future remains to be seen. Dependence on Tor, which has had massive reliability issues, and lack of strong privacy guarantees put it at risk.
— ODELL (@ODELL) October 27, 2022
The Basics
- Lightning is a protocol that enables cheap and fast native bitcoin transactions.
- At the core of the protocol is the ability for bitcoin users to create a payment channel with another user.
- These payment channels enable users to make many bitcoin transactions between each other with only two on-chain bitcoin transactions: the channel open transaction and the channel close transaction.
- Essentially lightning is a protocol for interoperable batched bitcoin transactions.
- It is expected that on chain bitcoin transaction fees will increase with adoption and the ability to easily batch transactions will save users significant money.
- As these lightning transactions are processed, liquidity flows from one side of a channel to the other side, on chain transactions are signed by both parties but not broadcasted to update this balance.
- Lightning is designed to be trust minimized, either party in a payment channel can close the channel at any time and their bitcoin will be settled on chain without trusting the other party.
There is no 'Lightning Network'
- Many people refer to the aggregate of all lightning channels as 'The Lightning Network' but this is a false premise.
- There are many lightning channels between many different users and funds can flow across interconnected channels as long as there is a route through peers.
- If a lightning transaction requires multiple hops it will flow through multiple interconnected channels, adjusting the balance of all channels along the route, and paying lightning transaction fees that are set by each node on the route.
Example: You have a channel with Bob. Bob has a channel with Charlie. You can pay Charlie through your channel with Bob and Bob's channel with User C.
- As a result, it is not guaranteed that every lightning user can pay every other lightning user, they must have a route of interconnected channels between sender and receiver.
Lightning in Practice
- Lightning has already found product market fit and usage as an interconnected payment protocol between large professional custodians.
- They are able to easily manage channels and liquidity between each other without trust using this interoperable protocol.
- Lightning payments between large custodians are fast and easy. End users do not have to run their own node or manage their channels and liquidity. These payments rarely fail due to professional management of custodial nodes.
- The tradeoff is one inherent to custodians and other trusted third parties. Custodial wallets can steal funds and compromise user privacy.
Sovereign Lightning
- Trusted third parties are security holes.
- Users must run their own node and manage their own channels in order to use lightning without trusting a third party. This remains the single largest friction point for sovereign lightning usage: the mental burden of actively running a lightning node and associated liquidity management.
- Bitcoin development prioritizes node accessibility so cost to self host your own node is low but if a node is run at home or office, Tor or a VPN is recommended to mask your IP address: otherwise it is visible to the entire network and represents a privacy risk.
- This privacy risk is heightened due to the potential for certain governments to go after sovereign lightning users and compel them to shutdown their nodes. If their IP Address is exposed they are easier to target.
- Fortunately the tools to run and manage nodes continue to get easier but it is important to understand that this will always be a friction point when compared to custodial services.
The Potential Fracture of Lightning
- Any lightning user can choose which users are allowed to open channels with them.
- One potential is that professional custodians only peer with other professional custodians.
- We already see nodes like those run by CashApp only have channels open with other regulated counterparties. This could be due to performance goals, liability reduction, or regulatory pressure.
- Fortunately some of their peers are connected to non-regulated parties so payments to and from sovereign lightning users are still successfully processed by CashApp but this may not always be the case going forward.
Summary
- Many people refer to the aggregate of all lightning channels as 'The Lightning Network' but this is a false premise. There is no singular 'Lightning Network' but rather many payment channels between distinct peers, some connected with each other and some not.
- Lightning as an interoperable payment protocol between professional custodians seems to have found solid product market fit. Expect significant volume, adoption, and usage going forward.
- Lightning as a robust sovereign payment protocol has yet to be battle tested. Heavy reliance on Tor, which has had massive reliability issues, the friction of active liquidity management, significant on chain fee burden for small amounts, interactivity constraints on mobile, and lack of strong privacy guarantees put it at risk.
If you have never used lightning before, use this guide to get started on your phone.
If you found this post helpful support my work with bitcoin.
-
@ 0e9491aa:ef2adadf
2023-02-19 00:26:07What is KYC/AML?
- The acronym stands for Know Your Customer / Anti Money Laundering.
- In practice it stands for the surveillance measures companies are often compelled to take against their customers by financial regulators.
- Methods differ but often include: Passport Scans, Driver License Uploads, Social Security Numbers, Home Address, Phone Number, Face Scans.
- Bitcoin companies will also store all withdrawal and deposit addresses which can then be used to track bitcoin transactions on the bitcoin block chain.
- This data is then stored and shared. Regulations often require companies to hold this information for a set number of years but in practice users should assume this data will be held indefinitely. Data is often stored insecurely, which results in frequent hacks and leaks.
- KYC/AML data collection puts all honest users at risk of theft, extortion, and persecution while being ineffective at stopping crime. Criminals often use counterfeit, bought, or stolen credentials to get around the requirements. Criminals can buy "verified" accounts for as little as $200. Furthermore, billions of people are excluded from financial services as a result of KYC/AML requirements.
During the early days of bitcoin most services did not require this sensitive user data, but as adoption increased so did the surveillance measures. At this point, most large bitcoin companies are collecting and storing massive lists of bitcoiners, our sensitive personal information, and our transaction history.
Lists of Bitcoiners
KYC/AML policies are a direct attack on bitcoiners. Lists of bitcoiners and our transaction history will inevitably be used against us.
Once you are on a list with your bitcoin transaction history that record will always exist. Generally speaking, tracking bitcoin is based on probability analysis of ownership change. Surveillance firms use various heuristics to determine if you are sending bitcoin to yourself or if ownership is actually changing hands. You can obtain better privacy going forward by using collaborative transactions such as coinjoin to break this probability analysis.
Fortunately, you can buy bitcoin without providing intimate personal information. Tools such as peach, hodlhodl, robosats, azteco and bisq help; mining is also a solid option: anyone can plug a miner into power and internet and earn bitcoin by mining privately.
You can also earn bitcoin by providing goods and/or services that can be purchased with bitcoin. Long term, circular economies will mitigate this threat: most people will not buy bitcoin - they will earn bitcoin - most people will not sell bitcoin - they will spend bitcoin.
There is no such thing as KYC or No KYC bitcoin, there are bitcoiners on lists and those that are not on lists.
If you found this post helpful support my work with bitcoin.
-
@ cf7ed325:050194cf
2025-01-01 13:57:08Alexandria, Egypt’s coastal gem, offers a perfect blend of history, culture, and seaside charm. With a variety of Alexandria day tours, you can dive into the city’s treasures and beyond. Whether you're a history buff, a foodie, or a shopping enthusiast, there’s something for everyone.
Start your adventure with a Full Day Trip to Alexandria from Cairo by Private Car. This tour takes you on a comfortable journey to explore iconic landmarks like the Catacombs of Kom El Shoqafa, Pompey’s Pillar, and the magnificent Qaitbay Citadel.
For food lovers, the Best Alexandria Sea Food Tours are a must. Indulge in freshly caught seafood at renowned coastal restaurants, savoring flavors that define Alexandria’s culinary heritage.
Shopaholics will love the Day Tour to Alex Shopping Markets and buy Egyptian Souvenirs. Stroll through bustling bazaars, discover handcrafted treasures, and take home unique mementos of your trip.
History enthusiasts can embark on a Day Trip to El Alamein from Alexandria, where you’ll visit the WWII cemeteries and museums that honor the soldiers who fought in the famous battle.
For a tranquil escape, Enjoy Your Vacation in Rosetta With Alexandria Day Tour. Discover the charming town of Rosetta (Rashid), where the Rosetta Stone was found, and explore its historical houses and scenic Nile views.
Finally, immerse yourself in the city’s rich history with the Experience Alexandria Landmarks in Alexandria City tour. Marvel at the Bibliotheca Alexandrina, explore Roman ruins, and enjoy the Mediterranean breeze.
Alexandria day tours promise unforgettable experiences, blending history, culture, and relaxation. Book your tour today and make memories to cherish forever!
🌐 Visit us at www.etbtoursegypt.com 📲 Contact us now! +20 10 21100873 📧 Email: info@etbtours.com 🏢 Company Address: 4 El Lebeny Axis , Nazlet Al Batran , Al Haram, Giza , Egypt
-
@ 2063cd79:57bd1320
2025-01-01 13:11:30Aufgabe von Minern
Wer sich nochmal genau mit dem Ablauf von Mining befassen möchte, dem rate ich Ausgabe #27 zu lesen.
https://www.genexyz.org/post/27-block-779000-was-machen-miner-wirklich-3c8f05/
Wir erinnern uns, dass es im Bitcoin-Ökosystem drei große Gruppen gibt, die sich nicht jeweils ausschließen. Es gibt die Miner, die Node-Betreiber und die Nutzer. Diese schließen sich nicht gegenseitig aus, da man auch in zwei oder sogar drei dieser Gruppen verhaftet sein kann. Die Miner übernehmen Aufgaben, die die anderen zwei Gruppen nicht leisten können und dafür werden sie durch den Anreizmechanismus belohnt. Denn durch ihre Arbeit gewährleisten sie die Sicherung des Netzwerks (je höher die aufgebrachte Hashrate, desto schwieriger werden Angriffe), sie validieren, sortieren und fügen Transaktionen dem Netzwerk hinzu und darüber hinaus helfen sie dabei bitcoins zu verteilen (zumindest bis alle ca. 21 Millionen bitcoins in ca. 100 Jahren erschlossen wurden). Warum die Analogie zum Mining schwierig ist, haben wir schon öfter besprochen, kurz und verständlich auf den Punkt gebracht hat es diese Woche Gigi in einem kurzen Beitrag.
https://dergigi.com/2023/04/12/bitcoins-are-not-mined-they-are-issued-over-time
Mining Pools
Ich habe Mining-Pools detailliert in einem Artikel letzten September beschrieben. Wer sich mit dem Thema nochmal eingehender beschäftigen möchte, kann das hier tun:
https://www.genexyz.org/post/12-block-753150-bitcoin-mining-pools-vs-dezentralisierung-vytfxv/
Doch TL;DR für all diejenigen, die keine Zeit oder Lust haben, hier in Kürze:
Die immer weiter steigende Hashrate im Netzwerk, ausgelöst durch immer größer werdende Mining-Operationen und immer leistungsfähigere ASIC Chips, führt dazu, dass es kleine und auch mittelgroße Miner immer schwerer haben erfolgreich Bitcoins zu minen, und damit Profite zu erzielen.
Mining-Pools bieten da Abhilfe, indem sie Minern die Möglichkeit bieten, ihre Hashrate zu bündeln und somit eine größere Wahrscheinlichkeit erzeugen, im Wettkampf um die Winner-take-all-Prämie, einen Teil der Belohnung in Form von Block-Subsidy und Gebühren einzustreichen (➡️ Block Reward). Je mehr Miner sich in einem Pool zusammenschließen, um somit die Hashrate zu bündeln, desto wahrscheinlicher wird, dass dieser Zusammenschluss von Minern den nächsten Block findet. Damit sinkt natürlich die einzelne Auszahlung pro Block, jedoch steigt die proportionelle Anzahl der Blocks, die dieser Pool erfolgreich produzieren kann.
Diese Rechnung lohnt sich neben Mining-Farmen auch für die meisten kleinen und mittelgroßen Miner, da so ein stetiger Fluss von Einkommen wahrscheinlicher wird, als ab-und-zu (oder nie) den Jackpot zu knacken. Das Problem bei Mining-Pools besteht in der Bündelung der Hashrate unter einer übersichtlichen Anzahl von Betreibern, denn erstens macht es jede Konzentration einer bestimmten Sache für Angreifer einfacher, diese eine große Einheit ausfindig zu machen und gezielt zu attackieren. Und zweitens verschiebt sich die dezentrale Wahrheitsfindung zugunsten einer zentralisierten Entscheidungsfindung.
Denn bisher sind es die Mining-Pools, die über die Architektur der Blöcke bestimmen, also darüber, welche Transaktionen in den nächsten Blockkandidaten gepackt werden. Dies ermöglicht Mining-Pool-Betreibern sowohl Transaktionen zu zensieren (black listing), als auch Transaktionen auszuwählen, die nicht unbedingt im besten Interesse der Miner (z.B. Transaktionen mit geringen Gebühren, obwohl es welche mit hohen Gebühren gegeben hätte), oder gar des ganzen Netzwerks sind (z.B. leere Blöcke, um das Netzwerk zu verlangsamen) (white listing). Diese vermeintliche Macht der Pool-Betreiber muss nicht unbedingt von ihnen selbst ausgenutzt werden, bietet aber auch Regierungen und anderen Apparaten einen leichten Angriffsvektor, wenn diese versuchen wollen, das Netzwerk, bzw. einzelne Transaktionen gezielt zu zensieren, indem sie Mining-Pools unter Zwang setzen.
Wie in dieser Grafik leicht ersichtlich, gibt es heute einige wenige Pools, die einen deutlichen Anteil der globalen Hashrate bündeln. 80% (!!!) der Hashrate wird von den größten vier Pools bestimmt, und immerhin 55% (also mehr als die Hälfte - immer noch nicht cool) von den beiden größten. Dies macht Pools natürlich zu einem leicht bestimmbaren Angriffspunkt mit einer riesigen Zielscheibe auf dem Rücken.
Besteht überhaupt eine solche theoretische Möglichkeit, dass z.B. Foundry USA im Rahmen einer hypothetischen Verpflichtung durch Dritte (Regierung, Finanzaufsicht, Geheimdienst, etc.) mit der Zensur bestimmter Transaktionen beginnen könnte? Die Antwort ist: theoretisch erstmal ja. Auf technischer Ebene könnte es passieren. Doch Miner würden sehr schnell erkennen, dass etwas im Busch ist und ihre Hashrate auf andere Pools verlagern (dies muss nicht mal aus altruistischen Gründen geschehen, sondern einfach weil theoretische wirtschaftliche Anreize verloren gehen).
Transaktionsauswahl
Wie schon erwähnt, sind Mining-Pool-Betreiber heute dafür verantwortlich Transaktionen für den nächsten Block vorzuschlagen. Das bedeutet der Betreiber hat die volle Kontrolle darüber, wie der nächste Block im Mining-Prozess aussieht und die Miner und Mining-Farmen werden sozusagen zu Lieferanten von Hashrate, um diesen Vorschlag umzusetzen. Pools stellen den einzigen Koordinierungspunkt zwischen den teilnehmenden Hardware-Betreibern dar. Es bleibt dem Miner natürlich selbst überlassen, welchem Pool er sich anschließt (und ob sich überhaupt einem Pool angeschlossen wird) und auch der Wechsel von einem Pool zum nächsten ist relativ simpel und schnell vollzogen. Es bleibt jedoch dabei - Betreiber sind verantwortlich für die Auswahl von Transaktionen, die in die Kandidaten-Blöcke eingefügt (oder unterlassen, sprich zensiert) werden sollen. Es besteht also eine zusätzliche Bürde für jeden Miner zusätzlich zu kontrollieren, dass keine Transaktionen ausgeschlossen werden, oder Transaktionen sauber ausgewählt werden.
“Bitcoin is dead.” “Mining is over.” “They will regulate Bitcoin.” “Censorship will come.” - Peter Todd
https://www.coindesk.com/tech/2021/05/07/marathon-miners-have-started-censoring-bitcoin-transactions-heres-what-that-means
Ob nun ein Pool-Betreiber oder Miner durch Zwang dazu geführt wird, individuelle Transaktionen hinzuzufügen, oder auszulassen, oder ob es aus eigenem Antrieb heraus geschieht (wie im obigen Artikel von MARA beschrieben: der von Marathon kontrollierte MARA Pool hatte entschieden, nur Blöcke mit OFAC-konformen Transaktionen zu produzieren und damit Transaktionen von und zu Adressen zu zensieren, die vom US-Finanzministerium auf die schwarze Liste gesetzt wurden, was einen großen Aufstand hervorrief und kein anderer Miner schloss sich dem Beispiel an. MARA veröffentlichten nach nur einem Monat in einer Pressemitteilung, dass keine Transaktionen mehr gefiltert würden.) ist dabei zunächst egal.
Doch eine Umkehrung der Verantwortlichkeit würde die Verantwortung zu den einzelnen tausenden Hardware-Betreibern (Minern) verschieben, die zentrale Entscheidungsgewalt der Pool-Betreiber auflösen und einen großen Angriffspunkt im Netzwerk eliminieren.
Wie alle anderen Computer-Netzwerk, besteht auch Bitcoin aus Protokollen, mit denen die Kommunikation zwischen Teilnehmern und Regeln festgelegt werden und die geschilderten Bedrohungen werden durch das aktuelle Protokoll ermöglicht, das von Minern und Mining-Pools verwendet wird, um miteinander zu kommunizieren: Stratum V1.
Stratum v2
Wie bei allen Sachen im Bitcoin-Ökosystem, gibt es keine zentrale Organisation, die Verbesserungen im Protokoll oder, wie in diesem Fall, in untergeordneten Protokollen vorschlagen und umsetzen kann. Es bedarf immer einer Gruppe von Entwicklern, die ein Problem im derzeitigen System erkennen und einen passenden Lösungsvorschlag unterbreiten. So auch bei Stratum. Das originale Stratum-Protokoll (v1) wurde 2012 eingeführt und wird seitdem weitgehend unverändert eingesetzt.
Bei der Stratum v2 Reference Implementation (SRI) handelt es sich um eine kostenlose, unabhängige, Open-Source-Variante von Stratum v2. Aber Justus, heißt das etwa, es gibt noch andere Stratum v2 Varianten? Bingo, Zweiter, es können beliebig viele Varianten erstellt werden. Alleine die Mining Pools entscheiden darüber, welches Protokoll, also welche Software, für sie und ihr Geschäftsmodell am besten funktioniert. Und die kürzlich vorgestellte Variante, die SRI, ist das bis dato umfangreichste und am weitesten unterstützte Update des Protokolls. Denn sowohl Braiins, ein Anbieter von Mining-Pools und Mining-Software (inkl. einer eigenen Variante von Stratum v2), als auch Foundry USA, der derzeit größte aller Mining-Pools, sind aktive Unterstützer des Projekts.
SRI ist also das wichtigste Protokoll-Update seit 2012. Aber was genau macht v2 so wichtig und wo liegen die Schwächen von v1?
In der aktuellen Version 1 ist Datenübertragung zwischen Minern, aber auch zwischen Minern und Pool-Betreibern nicht verschlüsselt. In v2 wird Kommunikation verschlüsselt und gewährleistet so Integrität und Vertraulichkeit der übermittelten Informationen. Dies soll vor allem vor sogenannten Man-in-the-Middle-Angriffen schützen, bei denen Dritte die Übertragung von Hashrate zwischen Minern und Pools abfangen (sogenanntes Hashrate-Hijacking), und diese als die eigenen weiterzuleiten und somit Auszahlungen zu stehlen.
Das v2 Protokoll ist vollständig binär. Das heißt, Datenübertragungen werden nicht in Menschen-lesbarem Textformat (ASCII Code), sondern in Computer-lesbarem Binärformat vorgenommen, was unnötige Datenmengen eliminiert. Dies und einige andere Leistungsverbesserungen machen den gesamten Prozess bis zu 20% performanter.
Stratum v2 dezentralisiert das Bitcoin-Mining erheblich, denn Miner bekommen die Möglichkeit, die Transaktionen fortan selbst auszuwählen, wodurch das Netzwerk zensurresistenter wird. Dies wird mit Hilfe von weiteren untergeordneten Protokollen erreicht, die es Minern ermöglichen, Transaktionen über ihre Nodes auszuwählen. Dies ist ein wichtiger Meilenstein bei der Demokratisierung der Transaktionsauswahl im gepoolten Mining und eliminiert die oben beschriebenen Risiken.
Konkret haben die Entwickler ein neues dezentralisiertes untergeordnetes Protokoll geschaffen, das sich Job Negotiator (JN) nennt. Achtung, jetzt wird es etwas technisch: Miner betreiben ihre eigenen Knoten, die eine neue Vorlage direkt vom Vorlagenanbieter erhalten. Die neue Vorlage enthält den Merkle-Pfad der Transaktionen, die vom Anbieter ausgewählt wurden. Für den neuen Block muss ein neuer Job erstellt werden, also sendet der JN des Miners eine Nachricht mit einem vorgeschlagenen Satz von Transaktionen an den Pool-Betreiber. Der Betreiber akzeptiert dann die Vorlage oder lehnt sie ab. Wenn der Vorschlag der Miner akzeptiert wird, werden sie benachrichtigt, dass sie mit dem Mining beginnen und ihre anteilige Hashrate an den Pool senden können.
Kurz gesagt: Miner schlagen vor, welche Transaktionen in einen Block kommen und nicht andersrum. Alle sind glücklich, alle sind froh und darüber hinaus geschieht dies natürlich blitzschnell, sodass für die Miner und den Pool kein Nachteil gegenüber anderen Mitbewerbern entsteht, denn beim Mining zählt jede Millisekunde, wenn es darum geht erfolgreich den nächsten Block produzieren zu dürfen, oder nicht.
Was sind die Anreize für die Pool-Betreiber, dieses neue Protokoll zu verwenden, wenn sie damit ihr Gewaltmonopol aufgeben?
Relativ einfach: Pool-Betreiber mögen diese Verantwortung eigentlich gar nicht. Sie haben sie irgendwie geerbt und sind mit dieser großen Verpflichtung gegenüber dem Netzwerk und sich selbst irgendwie im Unreinen. Ein bisschen so wie bei Morty, Aaliyah, Djibrail, Laila, Issa, Leonora, Naima und Amaya.
Pool-Betreiber mögen es also nicht so in der Öffentlichkeit zu stehen und permanent angegriffen zu werden, des Weiteren birgt die Transaktionsauswahl auch ein gewisses Haftungsrisiko, das sie gerne von sich weisen würden.
Die beiden anderen grundlegenden Merkmale des Stratum v2 Protokolls sind, wie oben beschrieben, natürlich auch Sicherheits- und Leistungsverbesserung. Alleine für diese Attribute würde es sich schon lohnen, auf das neue Protokoll umzusteigen.
Die neue Variante des Protokolls (SRI) wurde erst kürzlich öffentlich und als Open-Source Code zugänglich gemacht. Es bleibt also nur eine Frage der Zeit, bis sich nach Braiins und Foundry auch die anderen Mining-Pools (sehr wahrscheinlich) nach einer gründlichen Test-Phase dem Update öffnen.
https://www.nobsbitcoin.com/carole-house-censoring-bitcoin
Besonders in Zeiten, in denen Gegner von Bitcoin in halb-öffentlichen Reden über Pläne sprechen, wie man das Bitcoin-Netzwerk kontrollieren, bzw. für seine Zwecke benutzen kann, ist es wichtig die oben besprochenen Angriffs-Vektoren zu minimieren.
Carole House, ehemalige Direktorin für Cybersicherheit des Nationalen Sicherheitsrates des Weißen Hauses, sprach bei einem Event an der Universität von Princeton und sagte "sie würde lieber mehr Hashrate in den USA sehen, damit sie Miner zwingen können, das Netzwerk zu zensieren" und dass es "nicht nur darum ginge, Minern zu sagen, dass sie bestimmte Transaktionen nicht in Blöcke einbauen, sondern auch nicht auf Blöcken mit nicht konformen Transaktionen aufzubauen, damit diese Transaktionen nirgendwo in der Kette ankommen".
Die zeugt davon, dass Menschen wie Carole House ein substantielles Verständnis von der Bitcoin-Technologie besitzen und dieses Fachwissen dafür verwenden werden, Wege und Mittel aufzutun, wie man Bitcoin zumindest attackieren kann.
🫳🎤
In diesem Sinne, 2... 1... Risiko!
-
@ 300352ae:8be8c8b3
2025-01-01 13:06:15Rilatoj inter Prezidento Joe Biden kaj Vicprezidanto Kamala Harris laŭdire fariĝis pli malvarmaj post ŝia lastatempa elektoperdo, laŭ raporto. Fontoj proksimaj al ambaŭ gvidantoj indikas, ke privataj interagoj inter iliaj familioj estas pli streĉitaj kompare kun la komencaj tagoj de la administracio. Oni mencias, ke la malboniĝo en rilatoj estas aparte rimarkebla inter Unua Damo Jill Biden kaj Vicprezidanto Harris. Jill Biden laŭdire havis hezitojn pri Harris ekde la antaŭbalotdebatoj de 2020, kiam Harris kritikis Biden pro iliaj pasintaj sintenoj kontraŭ federaciaj transportadprogramoj celantaj malkomplezi lernejojn. Tiu kritiko havis personecan efikon sur Jill Biden, kontribuante al ŝia daŭra malkomforteco kun la vicprezidanto.
La raporto emfazas, ke la politikaj kaj personaj dinamikoj inter la du familioj fariĝis pli tensaj post la perdo de Harris en la prezidenta vetkuro. La privata etoso inter la Bidens kaj Harris kaj ŝia edzo Doug Emhoff foje estis malvarma, laŭ la raportoj. Prezidanto Biden laŭdire kredas, ke li povus esti venkinta la elekton, se li restus en la vetkuro. Tiu sento estis respegulita de iuj konsilistoj, kiuj argumentas, ke la sperto kaj sukceso de Biden, precipe lia venko kontraŭ Donald Trump en 2020, igus lin pli impona kandidato.
Laŭ aparta raporto, Biden private esprimis bedaŭron pro sia decido retiriĝi el la elekto de 2024. Kvankam li agnoskas erarojn en gvidado, li sentas, ke li devus resti en la vetkuro spite al la defioj, kiuj kondukis al lia retiro. La Blanka Domo reĝis tiujn raportojn, kun proparolanto substrekante, ke ambaŭ gvidantoj fokusas liveri rezultojn por usonaj familioj.
La decido de Biden retiriĝi en julio sekvis televidecan debaton kun Trump, kiu altiris kritikon kaj pliigis zorgojn pri lia aĝo kaj kognaj kapabloj. Li publike agnoskis, ke lia agado dum la debato estis nekontentiga, dirante, ke li “fuŝis”, ĉar li luktis por klare esprimi siajn politikojn. Tiu decido malfermis la vojon por Kamala Harris fariĝi la Demokrata kandidato, sed ŝi poste estis venkita de Trump en la novembro-elekto.
-
@ a10260a2:caa23e3e
2025-01-01 12:42:22I’d like to start off by saying that phoenixd has been a great experience so far. The install (on a Linux machine) was as easy as depicted on their website.
And the channel I opened via auto liquidity was super simple. I didn’t have to pick an LSP and I won’t need to manage liquidity.
Unfortunately, the machine I installed the software on started to freeze seconds after every boot. After posting about it here and getting an answer from nostr:npub1lxktpvp5cnq3wl5ctu2x88e30mc0ahh8v47qvzc5dmneqqjrzlkqpm5xlc, I was surprised at how easy the migration seemed.
It really was just a matter of restoring the seed words on another phoenixd instance. Of course, making sure that the two instances don’t run at the same time.
As easy as it was, I wanted to create this post to give a quick overview for those who might be less tech savvy.
Step 1
Grab seed words from the
seed.dat
file in hidden.phoenix
folder on the old machine.Step 2
Install phoenixd on the new machine
``` $ wget https://github.com/ACINQ/phoenixd/releases/download/v0.4.2/phoenix-0.4.2-linux-x64.zip $ unzip -j phoenix-0.4.2-linux-x64.zip
$ # run the daemon: that's it! $ ./phoenixd ```
Step 3
(This is the step that wasn’t super clear and why I wanted to spell it out in this post)
In order to install the software,
./phoenixd
has to be run. This is going to generate a new seed phrase.Now, all you need to do is replace the seed words in
seed.dat
with the ones from the original install.In retrospect, I think you can replace the seed words right after unzipping the zip file and before running
./phoenixd
. That will probably achieve the same result.Step 4
Once the seed words have been restored. Just run
./phoenixd
again and it’ll start up like nothing happened.Literally.
There was no indication whatsoever that something had changed, so I ran
./phoenix-cli getinfo
and, voila, there was my 2M-sat channel.It was quite magical.
originally posted at https://stacker.news/items/829411
Update (1/1/2025)
Phoenix Support got back to me and confirmed that the migration can be even simpler. You can actually just copy the ~/.phoenix directory onto the new machine and run
./phoenix
! -
@ ea9e8563:5a82ed79
2025-01-01 12:12:03Januar
- Bitcoin Spende an Satoshi
https://mempool.space/tx/d7db4f96a4059c8906b953677ce533493d7b9da0f854a21b99f5772910dd0a31
- Bitcoin im Bundestrag
https://bitcoin-im-bundestag.de/event/auftaktveranstaltung-bitcoin-im-bundestag/
- Bitcoin ETF Aproval
- USA verkauft Beschlagnamte Bitcoin von Darknet Dealer Xanaxman
- LKA Beschlagnahmt Bitcoin
- Gericht bestätigt, dass die Trucker Massnahmen (Geld einfrieren) unrechtmässig gewesen ist
Song 1: Netdiver
> Hodl, Hodl, Hodlin' - Pleb Town Rock*
Februar
- Einundzwanzig Magazin: Interview mit Julian Assange's Brunder
https://bitpartikel.com/cryptonite/blog/2024/02/20/freejulianassangenow-2/
- Fair Talk akzeptiert auch Bitcoin Lightning Spenden
- Marathon Slipstream wird Announced (direct Submitting BTC txs)
- Cypherpunks: Hörbuch nun auf audible
https://www.audible.de/magazin/cypherpunks-wir-sind-opfer-der-geheimdienste
Song 2: Eric
Bitcoin to the Sky - Lunapilot
März
- Bitcoin Atlantis
https://www.youtube.com/@freemadeira
- Opensats Nostr Fund
https://opensats.org/projects/nostr
- Sovereign Engineering (mit Gigi)
https://sovereignengineering.io/
- El Salvador hebt KYC Limite von 200$ auf 25k$
https://www.nobsbitcoin.com/el-salvador-updates-old-law-to-lift-kyc-limits-from-200-to-25000/
- BitBox Lightning Preview
https://twitter.com/BitBoxSwiss/status/1767491986578080091
- Twenty Two Portal (Mobile Signing Device)
https://x.com/TwentyTwoHW/status/1763625247465762826?s=20
Song 3: Sandro
> PlanB Network - The Orange Pill Jam*
## \ April
- 21 Magazin „Bitcoin ist Cypherpunk“
https://twitter.com/BITpARTIKEL/status/1775742551749808255
- Gold so viel wert wie noch nie - Experten rätseln über Gründe
https://tagesschau.de/wirtschaft/finanzen/gold-preis-rekordhoch-zinsen-100.html…
- Renato Moicano Octagon Interview | UFC 300
Link - talks about Ludwig von Mises
- Samourai Gründer verhaftet
https://www.justice.gov/usao-sdny/pr/founders-and-ceo-cryptocurrency-mixing-service-arrested-and-charged-money-laundering
- Wasabi stellt Coinjoin Service ein
https://blog.wasabiwallet.io/zksnacks-is-discontinuing-its-coinjoin-coordination-service-1st-of-june/
- LNbits Funds gestohlen
https://twitter.com/lnbits/status/1784521836950110264
- Roger Ver wird Steuerbetrug vorgeworfen
https://www.justice.gov/opa/pr/early-bitcoin-investor-charged-tax-fraud
- Swiss Bitcoin Conference in Kreuzlingen
https://swiss-bitcoin-conference.com/
Song 4: Nicolas
The Johner Boys - Psycho
Mai
- Tornado Cash - Akexey Pertsev für 64 Monate verurteilt
https://www.nobsbitcoin.com/tornado-cash-developer-alexey-pertsev-sentenced-to-64-months-in-prison-in-the-netherlands/
- AFD sympatisiert mit Bitcoin
https://www.blocktrainer.de/blog/afd-mit-anfrage-an-die-bundesregierung-zu-bitcoin
- Seasteading
https://fountain.fm/episode/gloM4Dygv97mnKkLXMZc
- Microstrategy Bitcoin Strategie, seit ca 4 Jahren aktiv - Aktienkurs mehr als 1’500% gestiegen.
Berglinde Briefing vom 30.05.24
- Bum Bum Check
Breedlove
Song 5: Netdiver
The next Bitcoin Bull Run - Annonymal
Juni
- Deutschland verkauft Bitcoin
https://www.btc-echo.de/schlagzeilen/verkauft-das-bka-50-000-bitcoin-186860/
- Mt Gox verkauft BTC
https://www.blocktrainer.de/blog/mtgox-startet-bitcoin-rueckzahlungen
- BTC Prague
- Paralelni Polis
https://paralelnipolis.cz/en/o-nas/en/
- Julian Assange Free
- Lykke Konkurs (hack 22mio Dollar)
Song 6: Eric
Halving - Orange Pill Jam Project
Juli
- Julians Assange erster Geburtstag in Freiheit nach Jahren
https://primal.net/e/note1eppuucmjkrux55k9gmtta9kxfua56tfrfy8sankwmlf34aach6zqggurwa
- Phoenix unterstützt jetzt Bolt 12
https://x.com/PhoenixWallet/status/1808547081214439494
- Trump spricht auf der BTC24 in Nashville
https://x.com/BitcoinMagazine/status/1811181306438660375
- Anhörung von Lonergan „TDevD“ Dev von Samourai
https://x.com/frankcorva/status/1811093896144785625
- Faketoshi ist nicht Satoshi (für 3Monate auf seiner Website
https://primal.net/e/note1rfmplr0dry52hd3y65dvred9638saglf8sjw2fp4fd4e0w2z4ncsej77cz
- Sachsen Notveräusserung von 50k Bitcoin
https://www.medienservice.sachsen.de/medien/news/1077662
- Larry fink und Michael Dell im Bitcoin Fieber?
https://www.blocktrainer.de/blog/blackrock-ceo-larry-fink-und-michael-dell-im-bitcoin-fieber
- Strike BTC Pay Server Integration
https://strike.me/blog/btcpay-server-integrates-strike-api-to-power-bitcoin-payments/
- Proton Wallet
https://proton.me/blog/proton-wallet-launch
- Erster Bitaxe Block
https://mempool.space/de/block/00000000000000000000f0235e50becc0b3bc91231e236f67736d64b1813704b
Song 7: Sandro
PlebRap - Bitcoin braucht dich nicht! - SatStacker, Mo
August
- Mutiny Wallet shutting down
https://blog.mutinywallet.com/mutiny-wallet-is-shutting-down/
- Dark Skippy Attack
Der Bitcoin Dark Skippy-Angriff ist eine ausgeklügelte Methode, die auf Hardware-Wallets abzielt. Er nutzt kompromittierte Firmware aus, um heimlich Teile der Seed-Phrase eines Benutzers in Transaktionssignaturen einzubetten. Mit nur wenigen signierten Transaktionen können Angreifer die vollständige Seed-Phrase extrahieren und möglicherweise die volle Kontrolle über die gespeicherten Bitcoins erlangen. Dieser Angriff ist besonders gefährlich, da er im Hintergrund unbemerkt ablaufen kann, was ihn schwer zu erkennen macht.
- Bitbox anti Klepto
https://bitbox.swiss/blog/anti-klepto-wie-die-bitbox02-versteckte-seed-extraktion-verhindert/
Der Artikel erklärt das Anti-Klepto-Protokoll, das von der BitBox02 Hardware-Wallet implementiert wurde. Dieses Protokoll schützt vor dem "Nonce Covert Channel"-Angriff, bei dem ein bösartiger Hersteller heimlich den privaten Schlüssel (Seed) des Benutzers extrahieren könnte. Das Anti-Klepto-Protokoll funktioniert, indem es die Fähigkeit der Hardware-Wallet einschränkt, die Nonce frei zu wählen, indem es zusätzliche Zufälligkeit von der Host-Software (z.B. BitBoxApp) einbezieht. Dies verhindert die Manipulation der Nonce zur Übertragung versteckter Daten und erhöht somit die Sicherheit der Benutzer-Seeds.
- Sunny vs Holger Wette
- Todestag von Hal Finney
https://www.blocktrainer.de/blog/der-tag-an-dem-hal-finney-starb
- Telegram Gründer in Frankreich festgenommen
https://www.zeit.de/digital/2024-08/pawel-durow-festnahme-frankreich-telegram?utm_content=zeitde_redpost+_link_sf&utm_campaign=ref&utm_medium=sm&utm_referrer=twitter&wt_zmc=sm.int.zonaudev.twitter.ref.zeitde.redpost.link.sf&utm_source=twitter_zonaudev_int
- Überbezahlte Konsolidierungs tx by 195x
https://x.com/mononautical/status/1826698452149174433
Song 8: Nicolas
Middle Season - Let Go (What's holding you back)
September
- CLN v24.08 Bolt 12 und blinded Paths
https://x.com/core_ln/status/1830647170896105623
- Strike unterstützt Bolt 12
https://x.com/strike/status/1831099910458163536
- Bitcoin Hashrate auf ATH
https://charts.bitbo.io/hashrate/
- Marshall-Plan 2.0 - Wer zahlt Europas 800-Mrd.-Euro-Rechnung? (Sound Money BTC pod Loddi)
https://www.sound-money.de/podcast/episode/283fe281/237-marshall-plan-20-wer-zahlt-europas-800-mrd-euro-rechnung
- Nostr Wegweiser by Quille
https://quillie.github.io/nostr-wegweiser/
- Argentiniens Libertäre Zeitenwende (Einundzwanzig Podcast Folge)
https://fountain.fm/episode/xTMivhQBGJpdPLpKZ5l9
- Orange Vision for BAS
- Signal blocked in Russia
- Blackrock’s Coinbase tx’s recorded off-chain
https://x.com/TylerDurden/status/1790941726544478602
- DATUM by Ocean (Mining Software, readjusting incentives for miner - build their own templates)
https://x.com/ocean_mining/status/1840408161271890264
- Article by Scott Locklin about QC - shared by Jimmy Song
(Der Artikel argumentiert, dass Quantencomputing weitgehend ein betrügerisches Feld ist. Der Autor behauptet, dass trotz jahrzehntelanger Forschung und erheblicher Finanzierung kein praktischer Quantencomputer gebaut wurde. Er kritisiert den Mangel an Fortschritten bei der Erstellung auch nur eines fehlerkorrigierten Qubits und argumentiert, dass das Feld mehr auf Hype als auf tatsächlichem wissenschaftlichen Fortschritt basiert. Der Autor vergleicht Quantencomputing mit Nanotechnologie und suggeriert, dass beide Bereiche unrealistische Behauptungen über die Manipulation von Materie auf Weisen aufstellen, die wir nicht vollständig verstehen. Er äußert auch Bedenken über die Anzahl der Karrieren und Ressourcen, die einer Technologie gewidmet sind, die seiner Meinung nach in keiner praktischen Form existiert.)
https://scottlocklin.wordpress.com/2019/01/15/quantum-computing-as-a-field-is-obvious-bullshit/
Song 9: Netdiver
Real Men Invest in Bitcoin, and Not in Soya - Fezzy
Oktober
- BAS GV
- 2 Orange Vision Kandidaten wurden gewählt
- Phil
- Lisa
- Niklas
- Adriano
https://www.bitcoinassociation.ch/board-1
- Bitcoin verkaufen mit Pocket, auch in der Bitbox App
https://www.blocktrainer.de/blog/bitbox-pocket-mit-neuem-feature
- Shielded Client side validation
Abgeschirmte clientseitige Validierung (Shielded CSV) ist ein neues Protokoll, das Token-Transfers auf Bitcoin verbessert. Es ermöglicht die private Übertragung von Token, ohne Informationen über die Token oder deren Transferhistorie preiszugeben. Abgeschirmte CSV verwendet Zero-Knowledge-Beweise, um Überweisungen mit einem festen Ressourcenaufwand zu verifizieren, was die Privatsphäre und Effizienz verbessert. Zudem können mehrere Token-Transfers in einer einzigen Bitcoin-Transaktion kombiniert werden, was potenziell Tausende von Token-Transfers in einem Block ermöglicht.
https://bitcoinops.org/en/newsletters/2024/09/27/
- Tesla verkauft alle Bitcoin
https://www.blocktrainer.de/blog/tesla-leert-die-bitcoin-wallet-was-steckt-dahinter
- FBI Token überführt Pump and Dump Projekte
https://www.blocktrainer.de/blog/anklagen-wegen-pump-and-dump-im-krypto-sektor
- Lugano Plan B Forum
https://planb.lugano.ch/planb-forum/
- Klima Grosseltern
Song 10: Eric
Rely on relay - Orange Pill Jam Project
November
- Telekom testet Bitcoin Mining infrastrukturen
https://www.telekom.com/de/medien/medieninformationen/detail/test-bitcoin-mining-infrastruktur-fuer-ueberschuessige-energie-1082680
- Bitcoin Block Stans
https://x.com/NW_BTCkonferenz
- Shopinbit Schweiz Launch
Code DEZENTRALSCHWEIZ 5CHF geschenkt auf ersten Einkauf
- Boost Initial Node sync mit UTXO Snapshots
https://blog.lopp.net/bitcoin-node-sync-with-utxo-snapshots/
- Bitcoin Alps
https://www.bitcoin-alps.ch/konferenz/
- Liana Wallet Anleitung/Review von Patrick
https://dezentralschweiz.ch/liana-die-besondere-multisig-wallet/
Song 11: Sandro
Bitcoin Anthem - Miss Bitcoin
Dezember
- Bitcoin Baden
- BAS GV im Dezember
- Wahl eines weiteren Board-mitglied
- Rahim Taghizadegan
- Abarbeitung div. Traktanden
- Abstimmung über 100k Initiative
https://static1.squarespace.com/static/5895d62d2994ca86b0cd9807/t/67503467c6aa4452cae00fcf/1733309544008/Bitcoin_Association_General_Assembly_07_12_2024.pdf
- BAS im Bundeshaus
https://www.finews.ch/news/finanzplatz/65619-bitcoin-association-switzerland-bas-sbf-bundeshaus-bitcoin-stablecoin-swiss-blockchain-federation-rahim-taghizadegan?utm_source=newsletter_5075&utm_medium=email&utm_campaign=finewsletter-vom-11-12-2024
- 100K Party BAS
Song 12: Nicolas
Headache Song - FM Rodeo
-
@ ea9e8563:5a82ed79
2025-01-01 12:01:55Originally Published 21.05.21
Bitcoin
Die erste, grösste und bekannteste Kryptowährung heisst Bitcoin. Das Netzwerk wurde 2009 von Satoshi Nakamoto veröffentlicht unter dem Vorwand das, dass Geldsystem völlig kaputt und veraltet ist und etwas Neues her muss. Nach dem Finanzcrash 2007 baute er fleissig an diesem „magischen Internet-Geld“ und löste ein wichtiges Problem: das Double Spending Problem. Das Problem war bis zu diesem Zeitpunkt, dass digitale Informationen, Daten und Zahlen einfach beliebig oft vermehrt oder geändert werden konnten, ohne sie von einer zentralen Organisation zu überwachen lassen. Und das war Satoshi ganz wichtig, weil eine zentrale Organisation früher oder später diese Macht für sich ausnutzen wird. Vor allem in der Geldgeschichte wurde praktisch jede zentral geregelte, auf einer beinahe unendlich leicht herstellbaren Währung oft missbraucht. Bitcoin läuft mittlerweile seit über 12 Jahren und das ohne Fehler. Wie Bitcoin funktioniert, werde ich aber in diesem Artikel nicht weiter behandeln. Aber schauen wir uns doch kurz an, wofür Bitcoin erschaffen wurde und welche Probleme noch bestehen.
Das Ziel von Bitcoin
Bitcoin ist das solideste Geld, was wir jemals hatten. Wir können mit absoluter Sicherheit sagen, dass es nie mehr als 21 Millionen Bitcoin geben wird. Dadurch ist Bitcoin deflationär. Durch die Blockchain werden die ganzen Transaktionen, die jemals gemacht wurden, abgespeichert. Das Problem ist jetzt aber, dass Bitcoin im Schnitt nur 7 Transaktionen pro Sekunde verarbeiten kann, weil die maximale Blockgrösse und somit die Anzahl der Transaktionen begrenzt ist. Wenn wir das jetzt mit den altbekannten Anbietern wie VISA und Mastercard vergleichen, können diese mehrere zehntausend Transaktionen pro Sekunde verarbeiten. Dies führt dazu, dass die Transaktionsgebühren relativ teuer werden, weil diese durch Angebot und Nachfrage bestimmt werden. Man kann sich Bitcoin also als Settlement Layer vorstellen, wie zum Beispiel FED Wire von der US-Zentralbank.
The Times 03/Jan/2009 Chancellor on brink of second bailout for banks.
*> - Satoshi Nakamoto
Ziele von Lightning
Lightning versucht die oben benannten Probleme zu lösen und sogar noch einige mehr. Auch werden neue Möglichkeiten geschaffen welche wir später noch genauer anschauen werden. Lightning ist ein Protokoll welches auf Bitcoin aufbaut, und ist völlig Open Source. Das heisst, theoretisch könnte man das LN (Lightning Netzwerk) auch auf anderen Kryptowährungen anwenden und benutzen. Zur Zeit geschieht dies aber noch nicht, weil die meisten anderen Kryptowährungen eher versuchen, diese Probleme auf dem Mainlayer zu lösen. Ob dies sinnvoll ist oder nicht lasse ich einfach mal so stehen. Als Ziele haben sich die Entwickler von Lightning und die Community verschiedenste Dinge gesetzt:
- P2P Netzwerk mit Zahlungskanälen zwischen den einzelnen Nutzern
- Routing über fremde Kanäle
- Skalierbarkeit von Bitcoin ausgleichen
- Geringe oder gar keine Netzwerkgebühren
- Hohe Privatsphäre
Wie Lightning entstanden ist
Man merkte schon relativ früh, dass man bei Bitcoin einige Probleme hat, wenn man damit einen Kaffee zahlen will. Die Transaktionsgebühren können da schnell mal höher als der Kaffee selbst sein. Dies ist natürlich nicht zielführend und ökonomisch kompletter Blödsinn. Deshalb machte man sich schon früh Gedanken, wie man dies verbessern könnte.
Es gibt drei Methoden, um dieses Problem zu lösen:
- Maximale Blockgrösse erhöhen (mehr Transaktionen)
- Zeit zwischen den Blöcken verkleinern
- Einführung eines Second Layer
Das Problem bei den ersten zwei Punkten ist, dass mit diesen Funktionen es sich viel schwieriger gestaltet ein eigene Node (Knotenpunkt) zu betreiben. Dieser Knotenpunkt müsste viel mehr Speicher haben als heute (ca. 300 GB) und würde somit mehr kosten. Auch müsste der Prozessor viel besser werden und somit mehr Energie verbrauchen, weil mehr Transaktionen validiert werden müssen. Weil es den Bitcoinern sehr wichtig ist, dass sie nicht auf andere vertrauen müssen, sondern alles selber verifizieren können.
Don’t trust, verify!
*> - bekanntes Bitcoin saying
Somit bleibt nur die Lösung eines Second Layers übrig. Auch wenn der Grossteil der Bitcoin Community für den Second Layer war, gab es ein kleines Lager, welches trotzdem für die Erhöhung der Blockgrösse war. So entstand Bitcoin Cash (BCH). Sie Forkten somit die Bitcoin Blockchain und es entstand ein neuer Abzweiger. Die Blockgrösse wurde von 1 MB auf 32 MB angehoben. Damit man den Second Layer mit Bitcoin verknüpfen konnte, musste noch das SegWit (Segregated-Withness) Update implementiert werden. Auch hier waren über 90 % der Bitcoin Community für ein Update, was ein Softfork bildete. Softforks sind nichts Schlechtes und sind eigentlich nur Software-Updates, welche Rückwärts kompatibel sind. Lightning wurde somit 2015 vorgestellt und 2018 veröffentlicht, auch wenn Lightning immer noch in den Kinderschuhen steckt, hat es ein Riesenpotenzial, vor allem wenn man sich anschaut wie schnell und gross das Netzwerk mittlerweile geworden ist.
Funktionsweise
Eines der wichtigsten Funktionen bei Lightning ist es, dass man Zahlungskanäle einrichtet, welche zwischen dir und dem Empfänger geöffnet werden. Das ausgeklügelte daran aber ist, dass man nicht zu jedem, dem man eine Transaktion schickt, auch einen Kanal offen haben muss. Aber schauen wir uns zuerst mal das Prinzip von einem einfachen Zahlungskanal an.
In diesem Beispiel haben Alice und Bob sich gegenseitig einen Zahlungskanal geöffnet, damit dies auch wirklich passiert, muss man Liquidität hinzufügen. Das Tolle daran ist, dass nicht unbedingt beide müssen oder nicht gleichviel hinzufügen müssen. Dies macht vor allem Sinn, wenn Alice ein Kaffee betreibt und Bob sich da jeden Morgen einen Kaffee holt. Somit muss Alice nie Geld zu Bob senden, aber Bob muss immer Geld zu Alice. In unserem Beispiel sind Alice und Bob Freunde und schicken sich gegenseitig immer wieder Geld. Bei der Eröffnung, also der Liquiditätseingabe, wird eine Transaktion auf der Bitcoin Blockchain zu einem Multi Signature Wallet gemacht. Dieses Wallet hat zwei Private Keys und kann nur geplündert werden, wenn beide dazu zustimmen. Das Geld wird also eingefroren. Durch eine Schnittstelle erkennt das Lightning Netzwerk das und ordnet die eingezahlten Gelder den beiden zu.
Mann kann sich vorstellen, dass innerhalb eines Zahlungskanals immer Geld hin und hergeschickt werden kann ohne Gebühren. Dies wird digital in einem Buchhaltungsähnlichen System gespeichert. Und am Ende kommt eine neue Balance heraus, welche mit der Schliessung des Channels wieder in den Mainlayer (also Bitcoin) implementiert wird. Dadurch können unendlich viele Transaktionen in maximal 4 Transaktionen auf der Bitcoin Blockchain dargestellt werden. Das absolut verrückte ist aber, dass 500 Transaktionen pro Sekunde durchgeführt werden können, in jedem Channel!
Routing von Transaktionen
Um nicht bei jeder kleinsten Transaktion einen neuen Channel erstellen zu, müssen gibt es noch eine weitere Möglichkeit Geld zu versenden. Dabei werden fremde Channels verwendet und eine Route wird von dir zu deinem Empfänger gesucht. Sobald diese Route gefunden ist, wird das Geld von Person zu Person vollautomatisch versendet. Als Gebühr für die Mitbenutzung der Fremden Channel bezahlt man eine kleine Gebühr, welche aber sehr klein ist und meist nur wenige Cent beträgt.
### Vorteile von Lightning
Das Lightning Netzwerk nutzt auch Bitcoin als Währung und ist somit ebenfalls extrem sicher und man kann garantieren das es nie mehr als 21 Millionen geben wird auf dem Lightning und Bitcoin-Netzwerk. Weil viele neue Möglichkeiten durch dieses schnelle Netzwerk geschaffen werden, wurde der Satoshi (1:100’000’000 Bitcoin) nochmal in eine kleinere Unterwährung aufgeteilt. Dabei wird 1 Satoshi in 1000 mSatoshis (mili) aufgeteilt. Ein weiterer Vorteil ist die Fehlende öffentliche Transaktionshistorie, damit ist die Privatsphäre extrem hoch und die Nachverfolgbarkeit extrem schwierig, vor allem wenn die Bezahlungen über mehrere Routing Hops (Sprünge) laufen. Man kann also sagen, dass Lightning Privacy per Default hat. Lightning ist dezentral und für jeden Menschen nutzbar, welcher es nutzen will.
Anwendungsbereiche
Mittlerweile gibt es schon extrem viele Bereiche wo Lightning angewendet wird um die Vorteile von der Blockchain und von Lightning allgemein zu nutzen, einige davon Werde ich euch nun vorstellen:
Fountain: Podcast Plattform
Fountain funktioniert im Prinzip wie jede andere grössere Podcastplattform wie zum Beispiel Spotify oder Apple Podcasts und viele mehr. Nicht nur für den Content Creator gibt es viele coole Features, sondern auch für den Nutzer. Zum Beispiel kann der Nutzer einstellen, wie viel Geld er zahlen will, um den Creator zu unterstützen, während er sich den Podcast anhört wird für die Zeit, die er hört ein Betrag abgebucht. Meiner Meinung ist dies ein extrem guter Weg, um vor allem kleine Podcasts zu monetisieren und guten Content zu fördern. Auch für den Nutzer ist diese Lösung ideal, weil man nur bezahlt, wenn man die Dienstleistung überhaupt benutzt. Des Weiteren gibt es viele "Neue" Features, die so bisher nur auf solchen "neuen" Podcast Plattformen zu finden sind. Zum Beispiel gibt es Kapitelmarken, referenzierte Musik-Tracks und Livestreams, und ausserdem kann man auch Kommentare hinterlassen, was die Interaktion zwischen Creator verbessert!
Strike: Cash App
Man kann sich Strike vorstellen wie Paypal nur mit dem entscheidenden unterschied, dass das ganze auf Bitcoin läuft. Strike ermöglicht es heute schon tausenden von Menschen auf einfachste Art und Weise Geld über die ganze Welt zu versenden und das mit dem solidesten Geld, was es überhaupt gibt, das schöne ist, dass die Werte auch wirklich verschickt werden. Hierzu ein kleiner Exkurs aus dem aktuellen Bankensystem: Wenn jemand aus Europa jemandem Geld in Amerika schicken will, verlässt das Geld das Land nicht. Man braucht für einen Internationalen Banktransfer immer einen Gegenspieler, welcher Geld aus Amerika nach Europa schicken möchte. Diesen Vorgang nennt man ’’Clearing’’. Meistens ist das kein Problem, da viele Transaktionen das Land verlassen aber auch kommen, aufgrund dieser Liquidität geht das zumindest in Industrieländern ganz gut. Entwicklungsländer haben hier schon eher Schwierigkeiten und werden Teilweise sogar aus dem Bankensystem ausgeschlossen (Siehe Iran Swift Sanctions) Ein weiterer Vorteil der sich durch Strike ergibt, ist das die Zahlungen fast keine Gebühren verursachen. Diese sind meist im Cent / Rappen Bereich.
Sphinx /Juggernout: Chat App
Die beiden Apps versuchen ein WhatsApp mit absoluter Privatsphäre zu bauen. Um dies zu erreichen wird die Channelfunktion von Lightning benutzt, weil diese nur von den zwei Parteien eingesehen werden kann und mit höchstmöglicher Privatsphäre durch die Blockchain gesichert wird. Diese Services kosten zwar etwas, aber mit der eigenen Lightning Node (Knotenpunkt) sind diese Kosten sehr gering und liegen ebenfalls im Cent / Rappen Bereich.
Edit: Spinx und Juggernout konnten sich bis anhin leider nie durchsetzen.
Originally Published 21.05.21
-
@ 300352ae:8be8c8b3
2025-01-01 11:54:49Rilatoj inter Prezidento Joe Biden kaj Vicprezidanto Kamala Harris laŭdire fariĝis pli malvarmaj post ŝia lastatempa elektoperdo, laŭ raporto. Fontoj proksimaj al ambaŭ gvidantoj indikas, ke privataj interagoj inter iliaj familioj estas pli streĉitaj kompare kun la komencaj tagoj de la administracio. Oni mencias, ke la malboniĝo en rilatoj estas aparte rimarkebla inter Unua Damo Jill Biden kaj Vicprezidanto Harris. Jill Biden laŭdire havis hezitojn pri Harris ekde la antaŭbalotdebatoj de 2020, kiam Harris kritikis Biden pro iliaj pasintaj sintenoj kontraŭ federaciaj transportadprogramoj celantaj malkomplezi lernejojn. Tiu kritiko havis personecan efikon sur Jill Biden, kontribuante al ŝia daŭra malkomforteco kun la vicprezidanto.
La raporto emfazas, ke la politikaj kaj personaj dinamikoj inter la du familioj fariĝis pli tensaj post la perdo de Harris en la prezidenta vetkuro. La privata etoso inter la Bidens kaj Harris kaj ŝia edzo Doug Emhoff foje estis malvarma, laŭ la raportoj. Prezidanto Biden laŭdire kredas, ke li povus esti venkinta la elekton, se li restus en la vetkuro. Tiu sento estis respegulita de iuj konsilistoj, kiuj argumentas, ke la sperto kaj sukceso de Biden, precipe lia venko kontraŭ Donald Trump en 2020, igus lin pli impona kandidato.
Laŭ aparta raporto, Biden private esprimis bedaŭron pro sia decido retiriĝi el la elekto de 2024. Kvankam li agnoskas erarojn en gvidado, li sentas, ke li devus resti en la vetkuro spite al la defioj, kiuj kondukis al lia retiro. La Blanka Domo reĝis tiujn raportojn, kun proparolanto substrekante, ke ambaŭ gvidantoj fokusas liveri rezultojn por usonaj familioj.
La decido de Biden retiriĝi en julio sekvis televidecan debaton kun Trump, kiu altiris kritikon kaj pliigis zorgojn pri lia aĝo kaj kognaj kapabloj. Li publike agnoskis, ke lia agado dum la debato estis nekontentiga, dirante, ke li “fuŝis”, ĉar li luktis por klare esprimi siajn politikojn. Tiu decido malfermis la vojon por Kamala Harris fariĝi la Demokrata kandidato, sed ŝi poste estis venkita de Trump en la novembro-elekto.
-
@ 300352ae:8be8c8b3
2025-01-01 11:49:08Rilatoj inter Prezidento Joe Biden kaj Vicprezidanto Kamala Harris laŭdire fariĝis pli malvarmaj post ŝia lastatempa elektoperdo, laŭ raporto. Fontoj proksimaj al ambaŭ gvidantoj indikas, ke privataj interagoj inter iliaj familioj estas pli streĉitaj kompare kun la komencaj tagoj de la administracio. Oni mencias, ke la malboniĝo en rilatoj estas aparte rimarkebla inter Unua Damo Jill Biden kaj Vicprezidanto Harris. Jill Biden laŭdire havis hezitojn pri Harris ekde la antaŭbalotdebatoj de 2020, kiam Harris kritikis Biden pro iliaj pasintaj sintenoj kontraŭ federaciaj transportadprogramoj celantaj malkomplezi lernejojn. Tiu kritiko havis personecan efikon sur Jill Biden, kontribuante al ŝia daŭra malkomforteco kun la vicprezidanto.
La raporto emfazas, ke la politikaj kaj personaj dinamikoj inter la du familioj fariĝis pli tensaj post la perdo de Harris en la prezidenta vetkuro. La privata etoso inter la Bidens kaj Harris kaj ŝia edzo Doug Emhoff foje estis malvarma, laŭ la raportoj. Prezidanto Biden laŭdire kredas, ke li povus esti venkinta la elekton, se li restus en la vetkuro. Tiu sento estis respegulita de iuj konsilistoj, kiuj argumentas, ke la sperto kaj sukceso de Biden, precipe lia venko kontraŭ Donald Trump en 2020, igus lin pli impona kandidato.
Laŭ aparta raporto, Biden private esprimis bedaŭron pro sia decido retiriĝi el la elekto de 2024. Kvankam li agnoskas erarojn en gvidado, li sentas, ke li devus resti en la vetkuro spite al la defioj, kiuj kondukis al lia retiro. La Blanka Domo reĝis tiujn raportojn, kun proparolanto substrekante, ke ambaŭ gvidantoj fokusas liveri rezultojn por usonaj familioj.
La decido de Biden retiriĝi en julio sekvis televidecan debaton kun Trump, kiu altiris kritikon kaj pliigis zorgojn pri lia aĝo kaj kognaj kapabloj. Li publike agnoskis, ke lia agado dum la debato estis nekontentiga, dirante, ke li “fuŝis”, ĉar li luktis por klare esprimi siajn politikojn. Tiu decido malfermis la vojon por Kamala Harris fariĝi la Demokrata kandidato, sed ŝi poste estis venkita de Trump en la novembro-elekto.
-
@ 0b118e40:4edc09cb
2025-01-01 11:13:04- It is ok to try and fail, so long as you learn from it and be better.
- Keep moving forward.
- Walk the talk.
- Empathy and self development is crucial.
- There is a difference between arrogance and confidence.
- Don't cheat people.
- Don't be lazy. Don't keep making excuses. It's a put off.
- If there is a problem, you can choose to talk about it or find means to fix it. The latter makes all the difference.
- Respect other people's time. Respect all people, regardless of ranks , status etc.
- Always be the best of the best. At least try to.
I am personally inspired by the day-to-day stories of hardworking individuals, ordinary people with extraordinary determination who find honest means of survival.
-
@ 5188521b:008eb518
2025-01-01 10:47:04My experience of daily posting on LinkedIn started around three years ago, when I became more serious about my coaching business. In that time, I amassed 25,000 followers and garnered around 3 million impressions on my writing.
It was a wild ride, but now it’s time to leave the theme park.
Reasons I Quit Posting on LinkedIn
Here they are, in no particular order:
- I went from coach to ghostwriter. 2024 threw up an unexpected career change. Since 2018, I've been a coach, moving from teaching English as a foreign language to working with groups of multilingual pro writers looking for better opportunities.
Coaching is a tough industry (maybe I'll write about that someday). My idea was to write more meaningful words and less copy to market my coaching business. Ultimately, writing to develop the Bitcoin ecosystem is what I find meaningful, and writing for hire doesn't require as much copywriting as being a coach.
With a solid portfolio, contacts, and profile, potential clients can see your results. You don't need to attract a ton of inbound leads by writing funny bits and wow-inducing educational posts on LinkedIn.
- Time constraints Because of my own book marketing, new client work, and projects like 21 Futures, I can't dedicate my creative efforts and several hours per week to writing on LinkedIn.
That time works better for me elsewhere.
- Worsening distribution 'Creators' (a.k.a. active posters with many followers) often say changes to the algorithm don't matter. 'Get on with it. Adapt and move forward.'
I'd be lying if I said I'm happy seeing statistics for my posts plummet. In 2022 and 2023, a successful carousel might net 20,000 views with over 150 likes and 50+ comments. Now, an exceptional post for me attracts 5,000 views with 50 likes.
I won't bore you with charts and statistics, but this is an average, based on hundreds of posts. It seems LinkedIn is reducing the reach of big accounts in favour of tighter networks and distributing the work of those with <5k followers. That's fine. Perhaps that will make the platform less showy, and less boastful, finally ridding us of fake stories, surprising hacks, and ultimate guides.
Still, It makes creative types like me feel like failures. Does an 80% decrease in distribution seem fair for the three years of daily effort I've put in? Should I keep struggling for diminishing returns? No. Creative people must seek the best return on investment for their time.
The lesson? Distribution is more important than follower numbers.
I've also quit Medium, where I have 2,000 followers and regularly receive single-digit reads on my posts.
- LinkedIn values machines over humans. Cost-cutting, extracting value, and planning for a robotic future. That's Microsoft's MO.
Despite being a social network with over 1 billion users, LinkedIn seemingly relies on automated support to make decisions on which content, people, and ideas are allowed on the platform.
Users' data is parsed without their express consent.\ LinkedIn seems desperate for us to use generative AI to express our 'insight'.\ We are constantly bombarded by LLM drivel and boring machine-made content. If you can't be bothered to write it, why should I bother to read it?
As somebody who brands himself a human-centric writer, why would I offer up personal takes and stories writing for free in an AI-filled swamp?
What's next?
So I'm giving up posting on LinkedIn.
With that said, it can still produce a great benefit for its users, especially those in the bitcoin space.
Why? The ability to search for potential connections, present your profile, and share your expertise can make a huge difference to your work - investment, partnership, and customers.
If you have a smaller network and have the need to share personal takes, opinions, and expertise, posting on LinkedIn is worth it. So few are doing this in bitcoin, the opportunities in 2025 are mind-boggling.
Next year, thousands of new startups and ventures will be vying for our attention. Those who can build trust and stay true to their message will win. And if LinkedIn stops working, you can always take your followers elsewhere.
If you have read and enjoyed my words here on LinkedIn in the last three years, thank you.
It has been a much-needed creative outlet and has brought me opportunities, laughs, knowledge, new colleagues, and friends. I'll still be stalking your posts and writing sarcastic comments.
Where can you find me:
Bitcoin writing - X, StackerNews 21futures.com\ NOSTR - npub12xy9yxej6s9hgzsn3rfyfc3xgtdr29wqlvulquzhz2fhqqywk5vqnyvqut),
Totallyhumanwriter.com - website coming soon.
Maximum Freedom, Minimum Bullshit on Substack.
And you can reach me via email at philipcharterauthor@gmail.com
I'm interested to know your thoughts and plans for 2025. Where will you be writing and why?
-
@ 59cb0748:9602464b
2025-01-01 06:15:09Nostrでお世話になっている方も、お世話になってない方も、こんにちは!
タコ頭大吉です!
NIP-23を使った初めての投稿です。
今回は、私がここ数ヶ月中にデザインをした三種類のビタキセケースの紹介記事になります!!
ビタキセを買ったもののあまり自分の好みに合う外観や仕様のケースがなく、いくつかプロトタイプを作りそれなりに時間をかけて考えたケース達です。
これら3シリーズに関しては、FDMタイプの3Dプリンタの精度、耐久性、出力後の作業性を考慮して一つのパーツで完結することに拘って設計をしました。
一定以上の充填率でプリントをすればそれなりに丈夫なはずです。
また、基本的に放熱性と保護性を両立できるように設計をしたつもります。
それぞれのモデルについて簡単に紹介をさせていただきますので、よろしければ各リポジトリに付属のREADMEを読んでいただいて自作、フィードバックをいただけましたら幸いです。
それでは、簡単に各モデルの紹介をさせていたきます。
AirLiftFrame
最初に作ったモデルです! 少し大きいのが難点ですが、分厚めのフレームをベースとし基盤周辺をあえて囲わない設計により、保護性と放熱を阻害しない事の両立を狙っています。
TwinAirLiftFrame
ビタキセを買い増ししたことにより、複数台をカッコよく運用したいという需要が自分の中に出てきたので、AirLiftFrameを2つくっつけたら良いのではと言うごくごく単純な発想でつくり始めたケースです。 しかし、ただ横並びにしただけでは廃熱が干渉するだけではなく、DCジャックやUSBポートへのアクセスが阻害されるという問題にすぐに気がつきました。 そこで、WebUI上でディスプレイの表示を上下反転出来ることに注目し、2台を上下逆向きに取り付ける事でそれらの問題を解決しました!
VoronoiShell
AirLiftFrameシリーズのサイズを小型化する事から始めたプロジョクトです。 縦横の寸法の削減だけではなく、厚みを薄くつくリたいという希望がありました。 所が単純に薄くすると、持った時に発熱する背面パーツに手が触れてしまったり、落下などでぶつかった際に背面パーツが破損する懸念がありました。 そこで、(当初は付けたくはなかった)背面保護用のグリルをデザインする必要が出てきました。 初めは多角形でしたがあまりにもダサく、調べている内にVoronoi柄という有機的なパターンに行き付き即採用しました。 結果、ビタキセを取り付けると柄が見えなくなるのが勿体無いぐらい個性的でスタイリッシュなデザインに仕上がりました。
いずれカスタム方法やインサートナットや増設ファンの選定方法等を紹介したいのですが、今回はNIP-23になれるという意図もあるので紹介に留めます! また、他の関連OSハードウェアプロジェクトのケースもデザインできたらと思っております!
今後ともタコ頭をよろしくお願いいたします。
-
@ ae6ce958:d0f02c7d
2025-01-01 05:24:36In the world of software development, achieving failure isn’t just a buzzword; it’s the secret weapon of the strongest, most resilient teams. When you aim for greatness, you must also face your weaknesses head-on, stress-testing your limits until you break. This philosophy isn’t new—it’s the same principle that made bodybuilders like Tom Platz, with his monstrous leg days, legends. It’s not about avoiding failure; it’s about embracing it, owning it, and using it to rise stronger.
Let’s get something straight: failure is where growth happens. You don’t get bigger quads without pushing through reps to muscle failure. And you don’t build indestructible software without finding the cracks in your systems before they become catastrophic. That’s where DamageBDD steps in—it’s the squat rack for your code, the arena where your software’s strength is truly tested.
The Beauty of Controlled Destruction
Developers often shy away from failure, fearing downtime, bugs, or the dreaded post-mortem meeting. But failure isn’t the enemy—it’s the blueprint for success. DamageBDD is your spotter, encouraging you to load up the bar and attempt that new PR (personal record) for system resilience. By simulating real-world scenarios, integrating failure conditions into your tests, and verifying those outcomes on the blockchain, DamageBDD lets you train harder and smarter.
Think of your system as a muscle. It grows stronger under tension, stress, and controlled failure. With DamageBDD, you can:
-
Expose Weak Links: Identify vulnerabilities that would otherwise lie dormant until disaster strikes.
-
Build Resilience: Test every feature, every API, every assumption—so nothing escapes the grind.
-
Reap Confidence Gains: Know that when your system is live, it’s already conquered tougher challenges in the DamageBDD gym.
Why DamageBDD is the Tom Platz of BDD Tools
Like the legendary Platz, DamageBDD is unapologetically intense and methodical. It doesn’t just want you to succeed; it wants you to fail spectacularly in a controlled environment where you can learn, adapt, and grow.
Precision Execution: Every test case is a perfect rep. No shortcuts, no sloppy form. DamageBDD’s blockchain verification ensures every action is recorded immutably.
Progressive Overload: Just as you progressively increase weights in the gym, DamageBDD scales with your application’s complexity. New scenarios? Bigger challenges? Bring it on.
Discipline for Longevity: Consistency breeds success. With DamageBDD, you develop a habit of testing thoroughly, ensuring your system stays strong and reliable for years to come.
Pain Today, Strength Tomorrow
As developers, we often celebrate success stories without recognizing the failures that made them possible. But here’s the truth: failure is the crucible of champions. The pain of discovering a flaw today prevents the agony of catastrophic failure tomorrow. DamageBDD helps you confront that pain with the discipline of a bodybuilder—systematically, rigorously, and with purpose.
So, if you’re ready to take your development process to the next level, it’s time to embrace failure. It’s time to load the bar, set your sights on resilience, and let DamageBDD guide you to software greatness. Remember: strength is earned, not given.
Now go—fail, learn, and build systems that are as unbreakable as Platz’s legendary quads.
-
-
@ b4403b24:83542d4e
2024-12-31 22:24:43As we bid farewell to 2024, let’s celebrate the memories, lessons, and triumphs it brought us. May 2025 shine even brighter, bringing you joy, success, and endless opportunities.
Here’s to new beginnings, cherished moments, and a year filled with happiness. Cheers to 2025! 🥂
originally posted at https://stacker.news/items/831699
-
@ 468f729d:5ab4fd5e
2024-12-31 22:03:31 -
@ d873a9c8:269f1419
2024-12-31 20:08:17This crossword contains a bitcoin wallet within, take the wallet for yourself.
If this Wallet still has bitcoin, the crossword has not been completed.
## Across:
- (5 Across) A piece of furniture used for work or study (13).
- (7 Across) At the back of or following someone or something (23).
- (10 Across) A non-professional or novice (16).
- (13 Across) More than what is needed or allowed (8).
- (14 Across) A choice or alternative path (4).
- (16 Across) A support or position to hold or display something (2).
- (18 Across) A skilled worker or the fundamental workings of a system (7).
- (19 Across) A married woman, often part of a partnership (17).
- (20 Across) Widely liked or accepted by many (20).
- (21 Across) A competition to achieve something first (9).
- (22 Across) To confess or allow access (6).
- (24 Across) A member of the species Homo sapiens (22).
Down:
- (1 Down) A bird often associated with golden eggs in stories (18).
- (2 Down) A location identifier or a formal speech (12).
- (3 Down) Something of enormous size or importance (14).
- (4 Down) A representative or someone acting on behalf of another (21).
- (6 Down) The beginning or earliest part of something (1).
- (8 Down) A mistake or incorrect action (24).
- (9 Down) A term for something outdated or ancient (5).
- (11 Down) A grassy field often teeming with life (15).
- (12 Down) The art of arranging sounds harmoniously (19).
- (15 Down) Unmotivated or unwilling to act (10).
- (17 Down) A powerful effect or collision (3).
- (23 Down) Lacking intelligence or unable to speak (11).
The number after each definition is used in the construction of the prize seed phrase.
Luka
-
@ 0403c86a:66d3a378
2024-12-31 19:22:15As we kick off the new year and gear up for GSC's Anniversary Celebration on January 11, we’re thrilled to unveil our anticipated list of 11 oN 11 – the 11 athletes who dominated their sports, broke records, and inspired the world in the past year.
These icons didn’t just shine on the field, court, or track – they redefined excellence and left an indelible mark on the global sports landscape.
Our nominees will be revealed daily, follow the countdown to greatness #11oN11
These athletes didn’t just win games – they won hearts, inspired nations, and moved the needle for their respective sports.
✨ Join the conversation and tell us your picks for the most defining athletes of last year! Who inspired YOU the most? Let’s celebrate excellence together as we count down to GSC’s Anniversary on January 11!!!
Global Sports Central 🌐 #11oN11
-
@ 3f770d65:7a745b24
2024-12-31 17:03:46Here are my predictions for Nostr in 2025:
Decentralization: The outbox and inbox communication models, sometimes referred to as the Gossip model, will become the standard across the ecosystem. By the end of 2025, all major clients will support these models, providing seamless communication and enhanced decentralization. Clients that do not adopt outbox/inbox by then will be regarded as outdated or legacy systems.
Privacy Standards: Major clients such as Damus and Primal will move away from NIP-04 DMs, adopting more secure protocol possibilities like NIP-17 or NIP-104. These upgrades will ensure enhanced encryption and metadata protection. Additionally, NIP-104 MLS tools will drive the development of new clients and features, providing users with unprecedented control over the privacy of their communications.
Interoperability: Nostr's ecosystem will become even more interconnected. Platforms like the Olas image-sharing service will expand into prominent clients such as Primal, Damus, Coracle, and Snort, alongside existing integrations with Amethyst, Nostur, and Nostrudel. Similarly, audio and video tools like Nostr Nests and Zap.stream will gain seamless integration into major clients, enabling easy participation in live events across the ecosystem.
Adoption and Migration: Inspired by early pioneers like Fountain and Orange Pill App, more platforms will adopt Nostr for authentication, login, and social systems. In 2025, a significant migration from a high-profile application platform with hundreds of thousands of users will transpire, doubling Nostr’s daily activity and establishing it as a cornerstone of decentralized technologies.
-
@ e97aaffa:2ebd765d
2024-12-31 16:47:12Último dia do ano, momento para tirar o pó da bola de cristal, para fazer reflexões, previsões e desejos para o próximo ano e seguintes.
Ano após ano, o Bitcoin evoluiu, foi ultrapassando etapas, tornou-se cada vez mais mainstream. Está cada vez mais difícil fazer previsões sobre o Bitcoin, já faltam poucas barreiras a serem ultrapassadas e as que faltam são altamente complexas ou tem um impacto profundo no sistema financeiro ou na sociedade. Estas alterações profundas tem que ser realizadas lentamente, porque uma alteração rápida poderia resultar em consequências terríveis, poderia provocar um retrocesso.
Código do Bitcoin
No final de 2025, possivelmente vamos ter um fork, as discussões sobre os covenants já estão avançadas, vão acelerar ainda mais. Já existe um consenso relativamente alto, a favor dos covenants, só falta decidir que modelo será escolhido. Penso que até ao final do ano será tudo decidido.
Depois dos covenants, o próximo foco será para a criptografia post-quantum, que será o maior desafio que o Bitcoin enfrenta. Criar uma criptografia segura e que não coloque a descentralização em causa.
Espero muito de Ark, possivelmente a inovação do ano, gostaria de ver o Nostr a furar a bolha bitcoinheira e que o Cashu tivesse mais reconhecimento pelos bitcoiners.
Espero que surjam avanços significativos no BitVM2 e BitVMX.
Não sei o que esperar das layer 2 de Bitcoin, foram a maior desilusão de 2024. Surgiram com muita força, mas pouca coisa saiu do papel, foi uma mão cheia de nada. Uma parte dos projetos caiu na tentação da shitcoinagem, na criação de tokens, que tem um único objetivo, enriquecer os devs e os VCs.
Se querem ser levados a sério, têm que ser sérios.
“À mulher de César não basta ser honesta, deve parecer honesta”
Se querem ter o apoio dos bitcoiners, sigam o ethos do Bitcoin.
Neste ponto a atitude do pessoal da Ark é exemplar, em vez de andar a chorar no Twitter para mudar o código do Bitcoin, eles colocaram as mãos na massa e criaram o protocolo. É claro que agora está meio “coxo”, funciona com uma multisig ou com os covenants na Liquid. Mas eles estão a criar um produto, vão demonstrar ao mercado que o produto é bom e útil. Com a adoção, a comunidade vai perceber que o Ark necessita dos covenants para melhorar a interoperabilidade e a soberania.
É este o pensamento certo, que deveria ser seguido pelos restantes e futuros projetos. É seguir aquele pensamento do J.F. Kennedy:
“Não perguntem o que é que o vosso país pode fazer por vocês, perguntem o que é que vocês podem fazer pelo vosso país”
Ou seja, não fiquem à espera que o bitcoin mude, criem primeiro as inovações/tecnologia, ganhem adoção e depois demonstrem que a alteração do código camada base pode melhorar ainda mais o vosso projeto. A necessidade é que vai levar a atualização do código.
Reservas Estratégicas de Bitcoin
Bancos centrais
Com a eleição de Trump, emergiu a ideia de uma Reserva Estratégia de Bitcoin, tornou este conceito mainstream. Foi um pivot, a partir desse momento, foram enumerados os políticos de todo o mundo a falar sobre o assunto.
A Senadora Cynthia Lummis foi mais além e propôs um programa para adicionar 200 mil bitcoins à reserva ao ano, até 1 milhão de Bitcoin. Só que isto está a criar uma enorme expectativa na comunidade, só que pode resultar numa enorme desilusão. Porque no primeiro ano, o Trump em vez de comprar os 200 mil, pode apenas adicionar na reserva, os 198 mil que o Estado já tem em sua posse. Se isto acontecer, possivelmente vai resultar numa forte queda a curto prazo. Na minha opinião os bancos centrais deveriam seguir o exemplo de El Salvador, fazer um DCA diário.
Mais que comprar bitcoin, para mim, o mais importante é a criação da Reserva, é colocar o Bitcoin ao mesmo nível do ouro, o impacto para o resto do mundo será tremendo, a teoria dos jogos na sua plenitude. Muitos outros bancos centrais vão ter que comprar, para não ficarem atrás, além disso, vai transmitir uma mensagem à generalidade da população, que o Bitcoin é “afinal é algo seguro, com valor”.
Mas não foi Trump que iniciou esta teoria dos jogos, mas sim foi a primeira vítima dela. É o próprio Trump que o admite, que os EUA necessitam da reserva para não ficar atrás da China. Além disso, desde que os EUA utilizaram o dólar como uma arma, com sanção contra a Rússia, surgiram boatos de que a Rússia estaria a utilizar o Bitcoin para transações internacionais. Que foram confirmados recentemente, pelo próprio governo russo. Também há poucos dias, ainda antes deste reconhecimento público, Putin elogiou o Bitcoin, ao reconhecer que “Ninguém pode proibir o bitcoin”, defendendo como uma alternativa ao dólar. A narrativa está a mudar.
Já existem alguns países com Bitcoin, mas apenas dois o fizeram conscientemente (El Salvador e Butão), os restantes têm devido a apreensões. Hoje são poucos, mas 2025 será o início de uma corrida pelos bancos centrais. Esta corrida era algo previsível, o que eu não esperava é que acontecesse tão rápido.
Empresas
A criação de reservas estratégicas não vai ficar apenas pelos bancos centrais, também vai acelerar fortemente nas empresas em 2025.
Mas as empresas não vão seguir a estratégia do Saylor, vão comprar bitcoin sem alavancagem, utilizando apenas os tesouros das empresas, como uma proteção contra a inflação. Eu não sou grande admirador do Saylor, prefiro muito mais, uma estratégia conservadora, sem qualquer alavancagem. Penso que as empresas vão seguir a sugestão da BlackRock, que aconselha um alocações de 1% a 3%.
Penso que 2025, ainda não será o ano da entrada das 6 magníficas (excepto Tesla), será sobretudo empresas de pequena e média dimensão. As magníficas ainda tem uma cota muito elevada de shareholders com alguma idade, bastante conservadores, que têm dificuldade em compreender o Bitcoin, foi o que aconteceu recentemente com a Microsoft.
Também ainda não será em 2025, talvez 2026, a inclusão nativamente de wallet Bitcoin nos sistema da Apple Pay e da Google Pay. Seria um passo gigante para a adoção a nível mundial.
ETFs
Os ETFs para mim são uma incógnita, tenho demasiadas dúvidas, como será 2025. Este ano os inflows foram superiores a 500 mil bitcoins, o IBIT foi o lançamento de ETF mais bem sucedido da história. O sucesso dos ETFs, deve-se a 2 situações que nunca mais se vão repetir. O mercado esteve 10 anos à espera pela aprovação dos ETFs, a procura estava reprimida, isso foi bem notório nos primeiros meses, os inflows foram brutais.
Também se beneficiou por ser um mercado novo, não existia orderbook de vendas, não existia um mercado interno, praticamente era só inflows. Agora o mercado já estabilizou, a maioria das transações já são entre clientes dos próprios ETFs. Agora só uma pequena percentagem do volume das transações diárias vai resultar em inflows ou outflows.
Estes dois fenómenos nunca mais se vão repetir, eu não acredito que o número de inflows em BTC supere os número de 2024, em dólares vai superar, mas em btc não acredito que vá superar.
Mas em 2025 vão surgir uma infindável quantidade de novos produtos, derivativos, novos ETFs de cestos com outras criptos ou cestos com ativos tradicionais. O bitcoin será adicionado em produtos financeiros já existentes no mercado, as pessoas vão passar a deter bitcoin, sem o saberem.
Com o fim da operação ChokePoint 2.0, vai surgir uma nova onda de adoção e de produtos financeiros. Possivelmente vamos ver bancos tradicionais a disponibilizar produtos ou serviços de custódia aos seus clientes.
Eu adoraria ver o crescimento da adoção do bitcoin como moeda, só que a regulamentação não vai ajudar nesse processo.
Preço
Eu acredito que o topo deste ciclo será alcançado no primeiro semestre, posteriormente haverá uma correção. Mas desta vez, eu acredito que a correção será muito menor que as anteriores, inferior a 50%, esta é a minha expectativa. Espero estar certo.
Stablecoins de dólar
Agora saindo um pouco do universo do Bitcoin, acho importante destacar as stablecoins.
No último ciclo, eu tenho dividido o tempo, entre continuar a estudar o Bitcoin e estudar o sistema financeiro, as suas dinâmicas e o comportamento humano. Isto tem sido o meu foco de reflexão, imaginar a transformação que o mundo vai sofrer devido ao padrão Bitcoin. É uma ilusão acreditar que a transição de um padrão FIAT para um padrão Bitcoin vai ser rápida, vai existir um processo transitório que pode demorar décadas.
Com a re-entrada de Trump na Casa Branca, prometendo uma política altamente protecionista, vai provocar uma forte valorização do dólar, consequentemente as restantes moedas do mundo vão derreter. Provocando uma inflação generalizada, gerando uma corrida às stablecoins de dólar nos países com moedas mais fracas. Trump vai ter uma política altamente expansionista, vai exportar dólares para todo o mundo, para financiar a sua própria dívida. A desigualdade entre os pobres e ricos irá crescer fortemente, aumentando a possibilidade de conflitos e revoltas.
“Casa onde não há pão, todos ralham e ninguém tem razão”
Será mais lenha, para alimentar a fogueira, vai gravar os conflitos geopolíticos já existentes, ficando as sociedade ainda mais polarizadas.
Eu acredito que 2025, vai haver um forte crescimento na adoção das stablecoins de dólares, esse forte crescimento vai agravar o problema sistémico que são as stablecoins. Vai ser o início do fim das stablecoins, pelo menos, como nós conhecemos hoje em dia.
Problema sistémico
O sistema FIAT não nasceu de um dia para outro, foi algo que foi construído organicamente, ou seja, foi evoluindo ao longo dos anos, sempre que havia um problema/crise, eram criadas novas regras ou novas instituições para minimizar os problemas. Nestes quase 100 anos, desde os acordos de Bretton Woods, a evolução foram tantas, tornaram o sistema financeiro altamente complexo, burocrático e nada eficiente.
Na prática é um castelo de cartas construído sobre outro castelo de cartas e que por sua vez, foi construído sobre outro castelo de cartas.
As stablecoins são um problema sistémico, devido às suas reservas em dólares e o sistema financeiro não está preparado para manter isso seguro. Com o crescimento das reservas ao longo dos anos, foi se agravando o problema.
No início a Tether colocava as reservas em bancos comerciais, mas com o crescimento dos dólares sob gestão, criou um problema nos bancos comerciais, devido à reserva fracionária. Essas enormes reservas da Tether estavam a colocar em risco a própria estabilidade dos bancos.
A Tether acabou por mudar de estratégia, optou por outros ativos, preferencialmente por títulos do tesouro/obrigações dos EUA. Só que a Tether continua a crescer e não dá sinais de abrandamento, pelo contrário.
Até o próprio mundo cripto, menosprezava a gravidade do problema da Tether/stablecoins para o resto do sistema financeiro, porque o marketcap do cripto ainda é muito pequeno. É verdade que ainda é pequeno, mas a Tether não o é, está no top 20 dos maiores detentores de títulos do tesouros dos EUA e está ao nível dos maiores bancos centrais do mundo. Devido ao seu tamanho, está a preocupar os responsáveis/autoridades/reguladores dos EUA, pode colocar em causa a estabilidade do sistema financeiro global, que está assente nessas obrigações.
Os títulos do tesouro dos EUA são o colateral mais utilizado no mundo, tanto por bancos centrais, como por empresas, é a charneira da estabilidade do sistema financeiro. Os títulos do tesouro são um assunto muito sensível. Na recente crise no Japão, do carry trade, o Banco Central do Japão tentou minimizar a desvalorização do iene através da venda de títulos dos EUA. Esta operação, obrigou a uma viagem de emergência, da Secretaria do Tesouro dos EUA, Janet Yellen ao Japão, onde disponibilizou liquidez para parar a venda de títulos por parte do Banco Central do Japão. Essa forte venda estava desestabilizando o mercado.
Os principais detentores de títulos do tesouros são institucionais, bancos centrais, bancos comerciais, fundo de investimento e gestoras, tudo administrado por gestores altamente qualificados, racionais e que conhecem a complexidade do mercado de obrigações.
O mundo cripto é seu oposto, é naife com muita irracionalidade e uma forte pitada de loucura, na sua maioria nem faz a mínima ideia como funciona o sistema financeiro. Essa irracionalidade pode levar a uma “corrida bancária”, como aconteceu com o UST da Luna, que em poucas horas colapsou o projeto. Em termos de escala, a Luna ainda era muito pequena, por isso, o problema ficou circunscrito ao mundo cripto e a empresas ligadas diretamente ao cripto.
Só que a Tether é muito diferente, caso exista algum FUD, que obrigue a Tether a desfazer-se de vários biliões ou dezenas de biliões de dólares em títulos num curto espaço de tempo, poderia provocar consequências terríveis em todo o sistema financeiro. A Tether é grande demais, é já um problema sistémico, que vai agravar-se com o crescimento em 2025.
Não tenham dúvidas, se existir algum problema, o Tesouro dos EUA vai impedir a venda dos títulos que a Tether tem em sua posse, para salvar o sistema financeiro. O problema é, o que vai fazer a Tether, se ficar sem acesso às venda das reservas, como fará o redeem dos dólares?
Como o crescimento do Tether é inevitável, o Tesouro e o FED estão com um grande problema em mãos, o que fazer com o Tether?
Mas o problema é que o atual sistema financeiro é como um curto cobertor: Quanto tapas a cabeça, destapas os pés; Ou quando tapas os pés, destapas a cabeça. Ou seja, para resolver o problema da guarda reservas da Tether, vai criar novos problemas, em outros locais do sistema financeiro e assim sucessivamente.
Conta mestre
Uma possível solução seria dar uma conta mestre à Tether, dando o acesso direto a uma conta no FED, semelhante à que todos os bancos comerciais têm. Com isto, a Tether deixaria de necessitar os títulos do tesouro, depositando o dinheiro diretamente no banco central. Só que isto iria criar dois novos problemas, com o Custodia Bank e com o restante sistema bancário.
O Custodia Bank luta há vários anos contra o FED, nos tribunais pelo direito a ter licença bancária para um banco com full-reserves. O FED recusou sempre esse direito, com a justificativa que esse banco, colocaria em risco toda a estabilidade do sistema bancário existente, ou seja, todos os outros bancos poderiam colapsar. Perante a existência em simultâneo de bancos com reserva fracionária e com full-reserves, as pessoas e empresas iriam optar pelo mais seguro. Isso iria provocar uma corrida bancária, levando ao colapso de todos os bancos com reserva fracionária, porque no Custodia Bank, os fundos dos clientes estão 100% garantidos, para qualquer valor. Deixaria de ser necessário limites de fundos de Garantia de Depósitos.
Eu concordo com o FED nesse ponto, que os bancos com full-reserves são uma ameaça a existência dos restantes bancos. O que eu discordo do FED, é a origem do problema, o problema não está nos bancos full-reserves, mas sim nos que têm reserva fracionária.
O FED ao conceder uma conta mestre ao Tether, abre um precedente, o Custodia Bank irá o aproveitar, reclamando pela igualdade de direitos nos tribunais e desta vez, possivelmente ganhará a sua licença.
Ainda há um segundo problema, com os restantes bancos comerciais. A Tether passaria a ter direitos similares aos bancos comerciais, mas os deveres seriam muito diferentes. Isto levaria os bancos comerciais aos tribunais para exigir igualdade de tratamento, é uma concorrência desleal. Isto é o bom dos tribunais dos EUA, são independentes e funcionam, mesmo contra o estado. Os bancos comerciais têm custos exorbitantes devido às políticas de compliance, como o KYC e AML. Como o governo não vai querer aliviar as regras, logo seria a Tether, a ser obrigada a fazer o compliance dos seus clientes.
A obrigação do KYC para ter stablecoins iriam provocar um terramoto no mundo cripto.
Assim, é pouco provável que seja a solução para a Tether.
FED
Só resta uma hipótese, ser o próprio FED a controlar e a gerir diretamente as stablecoins de dólar, nacionalizado ou absorvendo as existentes. Seria uma espécie de CBDC. Isto iria provocar um novo problema, um problema diplomático, porque as stablecoins estão a colocar em causa a soberania monetária dos outros países. Atualmente as stablecoins estão um pouco protegidas porque vivem num limbo jurídico, mas a partir do momento que estas são controladas pelo governo americano, tudo muda. Os países vão exigir às autoridades americanas medidas que limitem o uso nos seus respectivos países.
Não existe uma solução boa, o sistema FIAT é um castelo de cartas, qualquer carta que se mova, vai provocar um desmoronamento noutro local. As autoridades não poderão adiar mais o problema, terão que o resolver de vez, senão, qualquer dia será tarde demais. Se houver algum problema, vão colocar a responsabilidade no cripto e no Bitcoin. Mas a verdade, a culpa é inteiramente dos políticos, da sua incompetência em resolver os problemas a tempo.
Será algo para acompanhar futuramente, mas só para 2026, talvez…
É curioso, há uns anos pensava-se que o Bitcoin seria a maior ameaça ao sistema ao FIAT, mas afinal, a maior ameaça aos sistema FIAT é o próprio FIAT(stablecoins). A ironia do destino.
Isto é como uma corrida, o Bitcoin é aquele atleta que corre ao seu ritmo, umas vezes mais rápido, outras vezes mais lento, mas nunca pára. O FIAT é o atleta que dá tudo desde da partida, corre sempre em velocidade máxima. Só que a vida e o sistema financeiro não é uma prova de 100 metros, mas sim uma maratona.
Europa
2025 será um ano desafiante para todos europeus, sobretudo devido à entrada em vigor da regulamentação (MiCA). Vão começar a sentir na pele a regulamentação, vão agravar-se os problemas com os compliance, problemas para comprovar a origem de fundos e outras burocracias. Vai ser lindo.
O Travel Route passa a ser obrigatório, os europeus serão obrigados a fazer o KYC nas transações. A Travel Route é uma suposta lei para criar mais transparência, mas prática, é uma lei de controle, de monitorização e para limitar as liberdades individuais dos cidadãos.
O MiCA também está a colocar problemas nas stablecoins de Euro, a Tether para já preferiu ficar de fora da europa. O mais ridículo é que as novas regras obrigam os emissores a colocar 30% das reservas em bancos comerciais. Os burocratas europeus não compreendem que isto coloca em risco a estabilidade e a solvência dos próprios bancos, ficam propensos a corridas bancárias.
O MiCA vai obrigar a todas as exchanges a estar registadas em solo europeu, ficando vulnerável ao temperamento dos burocratas. Ainda não vai ser em 2025, mas a UE vai impor políticas de controle de capitais, é inevitável, as exchanges serão obrigadas a usar em exclusividade stablecoins de euro, as restantes stablecoins serão deslistadas.
Todas estas novas regras do MiCA, são extremamente restritas, não é para garantir mais segurança aos cidadãos europeus, mas sim para garantir mais controle sobre a população. A UE está cada vez mais perto da autocracia, do que da democracia. A minha única esperança no horizonte, é que o sucesso das políticas cripto nos EUA, vai obrigar a UE a recuar e a aligeirar as regras, a teoria dos jogos é implacável. Mas esse recuo, nunca acontecerá em 2025, vai ser um longo período conturbado.
Recessão
Os mercados estão todos em máximos históricos, isto não é sustentável por muito tempo, suspeito que no final de 2025 vai acontecer alguma correção nos mercados. A queda só não será maior, porque os bancos centrais vão imprimir dinheiro, muito dinheiro, como se não houvesse amanhã. Vão voltar a resolver os problemas com a injeção de liquidez na economia, é empurrar os problemas com a barriga, em de os resolver. Outra vez o efeito Cantillon.
Será um ano muito desafiante a nível político, onde o papel dos políticos será fundamental. A crise política na França e na Alemanha, coloca a UE órfã, sem um comandante ao leme do navio. 2025 estará condicionado pelas eleições na Alemanha, sobretudo no resultado do AfD, que podem colocar em causa a propriedade UE e o euro.
Possivelmente, só o fim da guerra poderia minimizar a crise, algo que é muito pouco provável acontecer.
Em Portugal, a economia parece que está mais ou menos equilibrada, mas começam a aparecer alguns sinais preocupantes. Os jogos de sorte e azar estão em máximos históricos, batendo o recorde de 2014, época da grande crise, não é um bom sinal, possivelmente já existe algum desespero no ar.
A Alemanha é o motor da Europa, quanto espirra, Portugal constipa-se. Além do problema da Alemanha, a Espanha também está à beira de uma crise, são os países que mais influenciam a economia portuguesa.
Se existir uma recessão mundial, terá um forte impacto no turismo, que é hoje em dia o principal motor de Portugal.
Brasil
Brasil é algo para acompanhar em 2025, sobretudo a nível macro e a nível político. Existe uma possibilidade de uma profunda crise no Brasil, sobretudo na sua moeda. O banco central já anda a queimar as reservas para minimizar a desvalorização do Real.
Sem mudanças profundas nas políticas fiscais, as reservas vão se esgotar. As políticas de controle de capitais são um cenário plausível, será interesse de acompanhar, como o governo irá proceder perante a existência do Bitcoin e stablecoins. No Brasil existe um forte adoção, será um bom case study, certamente irá repetir-se em outros países num futuro próximo.
Os próximos tempos não serão fáceis para os brasileiros, especialmente para os que não têm Bitcoin.
Blockchain
Em 2025, possivelmente vamos ver os primeiros passos da BlackRock para criar a primeira bolsa de valores, exclusivamente em blockchain. Eu acredito que a BlackRock vai criar uma própria blockchain, toda controlada por si, onde estarão os RWAs, para fazer concorrência às tradicionais bolsas de valores. Será algo interessante de acompanhar.
Estas são as minhas previsões, eu escrevi isto muito em cima do joelho, certamente esqueci-me de algumas coisas, se for importante acrescentarei nos comentários. A maioria das previsões só acontecerá após 2025, mas fica aqui a minha opinião.
Isto é apenas a minha opinião, Don’t Trust, Verify!
-
@ 933f9d20:996b56ae
2024-12-31 16:41:41คำถามจากความอยากตระหนักรู้ในตนเอง
จู่ๆตัวเราก็นึกอยากจะเข้าใจตนเองมากขึ้น บนโลกนี้มีศาสตร์แห่งบุคลิกภาพมากมายที่ให้เราได้ศึกษาและทำแบบทดสอบ แต่จะดีกว่ามั้ยที่เรารู้อย่างคร่าวๆเกี่ยวกับศาสตร์ที่อยู่เบื้องหลังแบบทดสอบเหล่านั้น
Enneargram คืออะไร?
Enneargram ความหมายคือ 'นพลักษณ์' เป็นศาสตร์ที่มีจุดประสงค์ไว้เพื่อการเข้าใจตนเองและเข้าใจคนอื่นหรือเพื่อให้เราอยู่ร่วมกันในสังคมได้อย่างสงบสุข(และหลีกเลี่ยงการแทงใจดำคนอื่นโดยที่ตัวเองไม่ได้ตั้งใจได้!) โดยในแต่ละประเภทจะเรียกกันว่า 'ลักษณ์'
และในบทความนี้ผมจะพูดถึงความรู้เกี่ยวกับ Enneargram ในภาพรวมกันครับ!
นพลักษณ์ (Enneargram)
หากคุณบ้าบอคิดจะข้าม(เผลอๆข้ามไปแล้วมั้ง..)จากหัวข้อนี้ไปดื้อๆคุณก็จะอ่านไม่รู้เรื่องเลยด้วยซ้ำหากคุณไม่รู้ว่านพลักษณ์คืออะไร
'นพลักษณ์' โดยคำว่า 'นพ' ซึ่งแปลว่า 9(เก้า) และคำว่า 'ลักษณ์' ก็คือความหมายว่าเป็น ลักษณะ
ซึ่งก็จะแปลได้เป็น ลักษณะทั้ง 9 นั่นเองครับ!
แล้วก็จะมีการจัดกลุ่มลักษณ์โดยแบ่งเป็น 3 กลุ่มซึ่งก็จะถูกเรียกว่า
ปัญญา 3 ฐาน (The 3 centers) อันได้แก่
ฐานการกระทำหรือฐานกาย แทนเป็น (A) ฐานความรู้สึกหรือฐานใจ แทนเป็น (F) ฐานความคิดหรือฐานหัว แทนเป็น (T)
พอรู้ปัญญา 3 ฐานแล้ว...เรามาดูลักษณะในแต่ละลักษณ์กันเลยดีกว่า!
The perfectionist (ลักษณ์ 1 A) เป็นลักษณ์ที่รักความสมบูรณ์แบบอย่างสุดซึ้ง มีระเบียบวินัยในชีวิตโคตรๆ เป็นคนเนี้ยบของทุกอย่างรอบตัวจะถูกจัดอย่างเป็นระเบียบ หากมีเศษขี้เล็บใครอยู่บนโต๊ะเขาก็จะรู้เลยว่ามันไม่ใช่ของเขา ยึดมั่นในคุณธรรมจริยธรรมอันดี และชอบความแน่นอน
The giver (ลักษณ์ 2 F) เป็นผู้ชอบให้ชอบเสียสละสิ่งที่ตนมี โดยที่ตนเองก็หวังลึกๆว่าจะได้สิ่งตอบแทนกลับมาด้วย มีนิสัยที่ร่าเริงแจ่มใสใจกว้างและเป็นมิตรต่อทุกๆคน
The preformer (ลักษณ์ 3 F) รัก(บ้า)การแข่งขันและชอบการเอาชนะเป็นที่สุด เกลียดการพ่ายแพ้และต้องการเป็นภาพลักษณ์ตามที่ตนเองต้องการ
The romantic (ลักษณ์ 4 F) พื้นฐานคืออารมณ์เศร้าหมองและมีความอิจฉาลึกๆ ไม่อยากเหมือนใครในสิ่งที่ตนเองสนใจและความเป็นศิลปินในตัวสูง
The observer (ลักษณ์ 5 T) คลั่งการหาความรู้(หรือจะฝึกฝนก็ตาม)มาใส่หัวแบบจะเอาให้เทพสุดๆรู้มากสุดๆในเรื่องนั้นๆไปเลย มักแยกอารมณ์ออกจากกระบวนการคิดเชิงเหตุผล ต้องการพื้นที่ส่วนตัวสูงและเป็นลักษณ์ที่เก็บตัวสูง
The guardian (ลักษณ์ 6 T) เป็นลักษณ์ที่มีความกลัวเป็นพื้นฐานของอารมณ์ ชอบวิเคราะห์และวางแผนอนาคตแถมขี้สงสัยด้วย ไม่ชอบความไม่มั่นคงและความไม่ปลอดภัยหวาดระแวงตลอด(โดยเฉพาะอนาคต) ชอบอยู่ใต้การบังคับบัญชามากกว่า
The optimist (ลักษณ์ 7 T) เสพสุขรักการจญภัยและชอบเติมเต็มชีวิตด้วยความแปลกใหม่ตลอดเวลา มีความตะกละเป็นสันดานและไม่ชอบให้ใครมาวาดกรอบให้ตัวเอง
The leader (ลักษณ์ 8 A) มีความโกรธเป็นพื้นฐานของอารมณ์และมีความเป็นผู้นำโดยธรรมชาติ ฝักใฝ่หรือสนใจในอำนาจและการควบคุม สามารถใช้ความโกรธเชื่อมโยงในสิ่งใดก็ได้ตามใจอยาก(และมันโคตรทรงพลังนะจะบอกให้!) ชอบปฏิเสธความอ่อนแอ(ซึ่งเป็นข้อเสีย)และชอบทำสุดใส่สุด(โดยเฉพาะทางกายภาพ เช่น จะกินก๋วยเตี๋ยวเผ็ดๆก็เทพริกซะหมดแก้วบรรจุซะ)
The peacemaker (ลักษณ์ 9 A) นักการทูตตัวจริงเสียงจริง มักเป็นลักษณ์ที่เมื่อเกิดความขัดแย้งระหว่างกลุ่ม ลักษณ์นี้นี่แหละคือตัวปิดความขัดแย้งที่แท้ทรู แต่หากไม่เกิดผลลักษณ์นี้ก็จะหนีออกมาจากความขัดแย้งแทนซะงั้น เป็นลักษณ์ที่รักสงบและเกลียดความขัดแย้งนั่นเอง
Wing (สภาวะปีก)
เป็นสภาวะที่เกิดขึ้นโดยที่ลักษณ์หลักของเราได้รับผลกระทบจากลักษณ์รอบๆ เช่น คนที่มีลักษณ์ 8 ก็จะมีปีกเป็น ลักษณ์ 7 และ ลักษณ์9 ซึ่งจะมีเพียงด้านที่ถนัดที่สุดเท่านั้น หากใช้ลักษณ์ 7 บ่อยที่สุด เราก็จะเขียนได้เป็น
8w7
(8 คือลักษณ์หลักของเรา และ 7 ก็คือลักษณ์รองลงมาที่อยู่ข้างๆนั่นเอง โดยมีตัว 'w' เป็นสัญลักษณ์คั่นกลางไว้) และเราจะต้องอ่านว่าลักษณ์8ปีก7ซึ่งเราก็จะได้อิทธิพลลักษณะจากลักษณะข้างด้วยนั่นเองครับ ซึ่งบางสถานการณ์ก็อาจจะไม่มีก็ได้
Subtype (ลักษณ์ย่อย)
เป็นการแบ่งลักษณะการใส่ใจของแต่ละลักษณ์ โดยลักษณ์แต่ละลักษณ์จะต้องมี 3 ลักษณะ ซึ่งจะมีทั้งหมด 27 ลักษณ์ทั้งหมดในนพลักษณ์
Self-preservation (sp) เป็นลักษณ์ย่อยที่ใส่ใจกับความปลอดภัยและความมั่นคงของตนเองก่อน ซึ่งรวมถึงความมั่งคั่งและสิ่งของด้วย
Sexual,one-to-one (sx) เป็นลักษณ์ย่อยที่ให้ความสำคัญกับความสัมพันธ์กับใครคนใดคนหนึ่ง ไม่จำกัดว่าต้องเป็นคน จะเป็นสัตว์เลี้ยงก็ได้ ความสัมพันธ์ในครอบครัวหรือความสัมพันธ์แบบกุ๊กกิ๊กจักจี้หัวใจ(ก็โรแมนติกนั่นแหละ)
Social (so) เป็นลักษณ์ที่อยากมีส่วนร่วมหรือให้ความสำคัญในสังคมหรือในครอบครัว กลุ่มเพื่อน กลุ่มเพื่อนร่วมงาน ต้องการเป็นที่จดจำและต้องการความเคารพจากคนอื่น
Arrow line (สภาวะลูกศร)
เป็นสภาวะที่จะแสดงถึงพฤติกรรมต่างๆในแต่ละสถานการณ์ โดยจะเรียกกันว่าสภาวะมั่นคง ไม่มั่นคง และสภาวะปกติ
สภาวะปกติ ก็คือปกติ ไม่สุขไม่ทุกข์ มั่นคงและไม่มั่นคงในเวลาเดียวกัน
สภาวะมั่นคง เป็นสภาวะที่รู้สึกมั่นคงตามชื่อเลย เป็นความรู้สึกที่เป็นไปตามอยากตามต้องการ
สภาวะไม่มั่นคง ไม่ปกติ ไม่มั่นคง เครียด! หรือก็คือกำลังเจออยู่กับสิ่งที่ตนหลีกเลี่ยงนั่นเอง
โดยหากคนที่เป็นคนลักษณ์ 8 (อีกแล้ว!) ได้อยู่ใน....
-สภาวะไม่มั่นคง คนลักษณ์ 8 ก็จะได้รับอานิสงส์จากลักษณ์ที่ 5 หรือก็คือจะเก็บตัวมากขึ้น โฟกัสหรือสนใจแค่สิ่งๆหนึ่ง กลับไปจัดระเบียบชีวิต ความคิดตนเองหรือข้าวของที่อาจกระจัดกระจายไปทั่วในบ้านของตนเอง
-สภาวะมั่นคง คนลักษณ์ 8 ก็จะได้รับอิทธิพลจากลักษณ์ 2 ซึ่งนั่นก็คือการ Takecare ใจกว้างและรับฟังคนด้วย! ซึ่งดูมีความสุขแฮปปี้ลั้นลาในฉบับของลักษณ์ 8
ส่งท้าย
บทความนี้เป็นบทความแรกในชีวิตของผมเลย ซึ่งตัวผมเองก็เป็นลักษณ์ 8 ปีก 7 (8w7) ผมได้จมปรักกับเรื่องพวกนี้มากพอควร (3 ปีกว่าแล้วล่ะครับ) ซึ่งตัวผมในอดีตก็คงไม่ได้คิดหรอกว่าจะเขียนบทความ แถมยังเขียนใน Nostr อีก!
แต่ก็นะ.... ผมก็ขอขอบคุณที่อ่านมาจนถึงวรรคนี้นะครับ
ขอให้คุณตั้งใจใช้ชีวิตไปกับปีหน้านะครับ!
-From 31/12/2024
-
@ 6bae33c8:607272e8
2024-12-31 14:52:56I missed this game because I was on an overnight flight back to Portugal via Munich last night. Just got in, actually, jetlagged af, so I won’t have too much to say about it. Plus, our bags didn’t make the connecting flight, which is annoying.
-
If the Niners score 34 against you, that’s not a good sign for the playoffs. I guess the last TD came in garbage time, but still. I would say Vikings +2.5 this week, but Detroit could easily drop to the fifth seed.
-
Brock Purdy is a top-10 NFL QB IMO. I didn’t see this game, but he always passes the eye test for me. (Looks like he got banged up too, but nothing serious.)
-
George Kittle is quietly having a huge year on just 91 targets, thanks to 11.9 YPT. Kittle is in the Rob Gronkowski lineage, while Travis Kelce is more Tony Gonzalez (higher volume, less blocking.)
-
Ricky Pearsall apparently had a breakout game. They took him in the first round, so it makes sense they’d give him an extended audition while drawing dead. It’s odd that Pearsall and Jauan Jennings are more relevant that Deebo Samuel and the injured Brandon Aiyuk.
-
Amon-Ra St. Brown didn’t get a lot of headlines this year, but he’s up to 112-1,186-12 on 8.9 YPT. Not bad.
-
Even with David Montgomery out, Jahmyr Gibbs’ workload was fairly modest — 18 carries/four targets. This game didn’t matter to the Lions though. Against the Vikings I should think he’d get a McCaffrey-esque stat line, but we’ll see.
-
-
@ ed60dae0:cc3d5108
2024-12-31 14:14:16Disclaimer
Not financial advice. This is for educational purposes only. Do your own research. You are responsible for your own choices. The author is not a professional trader and/or financial advisor, only a student of the markets. Act accordingly.
Intro
I wanted to explore some opportunities using Bitcoin options in combination with price models. Like a student, I aim to think it through by writing it down. Any feedback is welcome—I’m eager to learn.
Gold as a standard for financial measurement
There are people who can describe far more eloquently why the U.S. Dollar isn’t the ideal tool for measurement. Gold, due to its unique properties, is one of the best—though not perfect—financial tools to use as a measure for various reasons. Personally, I prefer to measure the adoption of the Bitcoin network against gold, and I believe the ultimate metric for measuring adoption is price.
## Worst Case Scenario
For this exploration, I want to focus on downside risk. The chart above shows that the price of Bitcoin, expressed in gold ounces, follows a power law. Before I continue, I want to state the obvious: the “power law” is not a certainty. As British statistician George E. P. Box famously said, “All models are wrong, but some are useful.” Let’s assume that if the rate of network adoption in the coming year is equal to or greater than in previous years, the power law will retain its validity. The chart shows that the price usually falls to negative 1 standard deviation during a bear market. However, in some cases, such as the bear market of 2022, the price even reached negative 1.5 standard deviations.
In the opportunity example, I will examine the option expiration date of December 26, 2025. Since the chart isn’t interactive, you can’t hover over the lines to get the exact numbers, so I will state them here. According to the Power Law, the price of Bitcoin expressed in gold ounces on December 31, 2025, is 33.4 ounces for -1 sigma and 26.6 ounces for -1.5 sigma.
Depending on your expectations for the price of one ounce of gold on December 26, 2025, you can calculate the bear market bottom in the event of an unexpected downturn of the market next year. Based on today’s gold price, this would be 33.4 x $2,600 = $86,840 for a -1 sigma move and 26.6 x $2,600 = $69,160 for a -1.5 sigma move down. You could argue that the price of gold might be lower if an unexpected bear market begins for risk-on assets. The question is whether gold will be lower or even higher in such an environment. Currently, gold is being purchased as a hedge against inflation and wealth confiscation (e.g., as seen when the U.S. froze Russian state-owned U.S. Treasury bonds). However, in a bear market, it could also be bought as a safe haven during an economic downturn.
Example
With these numbers in mind, we can explore the option chain on platforms like Deribit. For this example I’m looking at BTC-26DEC25. As of today, December 31, 2024, the futures price for this expiration date is approximately $104,000.
Let’s say you’re a HODLER who believes the current bull market isn’t over yet. You own spot Bitcoin, which essentially means you are long Bitcoin and short dollars. For simplicity, let’s assume you own 1 whole Bitcoin. Since you believe the bull market has further to run, you don’t want to sell your Bitcoin (or perhaps you never want to), but you’re interested in opportunities to stack more Bitcoin.
One option is to pledge your Bitcoin as collateral on the Deribit exchange, giving you enough margin to open a position. This way, you won’t have to sell your Bitcoin but can still participate in new trades. For example, you could sell a put with a $90,000 strike price for, say, 0.16 BTC. At the current spot price, that’s approximately $15,000.
\ Note that you potentially could earn more by selling a put with a $100,000 strike price, where the extrinsic value is larger. However, I’m choosing $90,000 because it aligns more closely with $86,840, which provides greater room for an unexpected downturn in the market toward the -1 sigma move.
By holding onto your spot Bitcoin, you still retain all the upside potential in case the bull market continues. Selling the put doesn’t require you to take on excessive risk—you’re already long on Bitcoin. If the Power Law holds, it’s probable that the price will remain above $90,000 by December 26, 2025.
Historically, the price of Bitcoin tends to reset toward the Short-Term Holder (STH) cost basis during bull markets. Currently, the STH cost basis is around $87,000. If this happens, it could present an even better opportunity. You could stick with a strike price of $90,000 and collect a larger premium, thereby lowering your breakeven price, or you could aim for the same premium amount and choose a lower strike price, which would reduce your breakeven price even further. However, it’s not guaranteed that you’ll get that chance.
Risk Management
There are risks involved in this trade. These risks include third-party risks, where Deribit might lose your Bitcoin and be unable to pay it back. The biggest risk is that the adoption of the bitcoin network stalls and the power law gets invalidated to the downside and the price of bitcoin ends up way below your strike price. Another risk of this trade lies in the fact that your collateral is held in BTC, while your trade also depends on Bitcoin moving sideways or upward. If Bitcoin’s price declines, your collateral will lose value. In the event of a market crash, like a black swan event, the market could move significantly against your trade, the put option will go in the money and acquire intrinsic value, which is unfavorable for the seller of the put. In extreme cases, you could face a margin call, requiring you to pledge more collateral, or the exchange could liquidate your Bitcoin and close your position. The bitcoin price could recover and still end up above $ 90,000 at the end of 2025, but you’ll end up with none.
To mitigate this risk—not entirely, but partially—you could sell some spot Bitcoin. Let’s say your goal is to end up with at least 1 Bitcoin. You could sell an amount equivalent to the premium you would receive if the price closes above $90,000. In this case, you would sell 0.16 BTC, resulting in a balance of 0.84 BTC and $15,000. This strategy protects you somewhat if Bitcoin’s price drops, as the premium you receive (denominated in BTC) would be worth less. If the price closes above $90,000, you will still end up with 1 BTC and $15,000. Essentially, you’re sacrificing some upside potential in exchange for added certainty.
If you’re an experienced trader, you could temporarily hedge your position to delta neutral in uncertain periods by shorting the bitcoin future price with the corresponding expiration date. The risk here is that a trader could wind up losing all his potential profit or worse through ‘a death by a thousand cuts’.
It’s important to note that your breakeven price in this trade is $90,000 - $15,000 = $75,000. Additionally, the worst-case scenario, though unlikely, is a -1.5 sigma move, which could bring the price (depending on the USD price of an ounce of gold at the time of expiration) to around $70,000. While this doesn’t eliminate all risk, if you believe the adoption rate of the bitcoin network will stay the same (at worst) and thus the power law won’t be invalidated and so you believe in Bitcoin’s value and its bright future, this represents an asymmetric bet where the probable outcome of gaining $15,000 outweighs the improbable outcome of losing $5,000.
Your own assessment
Uncertainty is the name of the game—it’s the very reason why premiums and insurance exist in the first place. Nothing is certain; even the presence of the sun could one day vanish. However, you can turn this uncertainty into your ally rather than your enemy. Do your own research and make your own assessment. Ask yourself: what do you think 2025 will bring?
- What will be the yield on the 10-year Treasury Note, a.k.a. the “risk-free rate”?
- Will inflation remain sticky?
- Will AI drive significant productivity gains?
- Will growth outpace inflation?
- What will be the impact of reduced immigration on the labor market?
- Will the Trump administration deliver on its promises?
- What if the U.S. Dollar becomes too strong?
- Will central banks extend their balance sheets further?
- Will governments take on even more debt?
- Will Bitcoin play a bigger role in corporate treasury strategies?
- Will more Nation States adopt Bitcoin?
- Can this train be stopped?
Use your own assessment alongside pricing models like the BTC/Gold oz Power Law. What do you consider probable, and what do you consider improbable?
To summarize, and based on the assumptions stated earlier, this represents an asymmetric bet where the outcome of gaining $15,000 has an estimated probability of around 70%, as a -1 sigma move aligns closely with the strike price. The probability of breaking even is approximately 80%, while there is a 20% chance of losing $5,000 or more. These probabilities* are based solely on the Bitcoin/Gold oz power law. Your own 2025 assessment could either enhance these odds or make the outcome less probable.
*Please note that the outcomes of the power law are not normally distributed but positively skewed. The chances are better than described above. Source
-
@ fde4c423:40a85910
2024-12-31 13:26:45It’s December 31st, 2024. The end of another year, another cycle. Tomorrow, a new cycle begins, full of adventure and misfortune, ups and downs, inflows and outflows. Such is life, and it cannot be otherwise.
Somewhere in the middle of it all, I’m starting a new blog on the best platform I’ve seen so far — anonymously or rather pseudonymously.
I like writing. I’ve been doing it on and off for some time, but I’ve always wanted to try it without any attachment to my name. Not sure why, but perhaps it gives a bit more freedom. You shouldn’t care about what others think, of course, but our egos still remind us of others when we do certain things, and for this reason, we don’t do those things exactly how we’d do them if nobody watched. Like dancing in an empty room or singing in the shower: it’s just you, without the weight of other people’s eyes and ears pressing on you.
For the time being, I will write just about anything that comes to my mind, using Nostr Reads as my brain dump playground. But, at some point, a certain direction will form that I will stick to. Which will give me more focus and attract an audience that will expect my next pieces. Because if you don’t know what I’m going to write about next, why would you expect my next article? (Unless I’m so good with words that you get hooked no matter what — but I’m not, I’m just an amateur.)
Bitcoin, Nostr, business, family, politics — all will be intertwined here. Of course, with my own twist, as I’ll write about everything based on my perception of things, my knowledge, experience, and wisdom if there’s any.
This is not a New Year’s resolution but rather an introductory post. You can even consider it a filler, a seed article. In any case, I will see you in 2025.
Happy New Year!
-
@ 714dd0db:9c6f1a4c
2024-12-31 10:54:01Nostrで初めての長文投稿
2024年の大晦日。今年1年、個人的に何があったか振り返ってみる。
自転車生活に慣れてきた
移動手段を電車や車から自転車メインに切り替えた。暑さも寒さも体験し、生きてるなあ、という実感が得られるね。
ふと寄り道もできるし、お店やら新しい発見も多かったな。
夏の山口県旅行
夏に実家への帰省も兼ねて、山口県を旅行した。今年は日本酒にハマってしまったので、山口県内の酒蔵をいくつか巡ってみた。
美祢市にある別府弁天池の水の蒼さに感動。まさにエメラルドグリーンだった。
日本酒にハマる
最初は、お米の可能性として、お米からできている麺や米菓子を好んでいたが、「そういえば 日本酒もお米からできているよな」と気づき、飲み始めたところ、はまってしまったというわけ。
とは言っても下戸の部類に入るので、低アルコールの日本酒ばかりを飲んでいる。6〜7度のフルーツ日本酒も美味しいが、身体に合っているのは14度のスッキリ系もしくは若干のフルーツさの味わいをよく飲んでいる。山口の大嶺酒造や栃木の仙禽が多いかな。
SNSはNostrとfediverseで
分散型SNSにハマった1年だった。今ではすっかり馴染んで活用している。もうXwitterやInstagramは見なくなったなあ。
Nostrのおかげで、Satsのことも知り、仮想通貨の情報収集や勉強をしているところ。
Nostrは、クライアントによって、見え方が全然違うのが面白い。
そして2025年へ
2025年は、昭和100年にあたる。100年かぁ。昭和世代には感慨深い。
来年もぼちぼちやっていきます。よろしくお願いいたします。
-
@ cf7ed325:050194cf
2024-12-31 08:43:53Embark on a luxurious adventure aboard the Sonesta Moon Goddess Nile Cruise, an exceptional vessel that combines elegance, comfort, and impeccable service. This 5-star cruise offers an unforgettable journey between Luxor and Aswan, showcasing Egypt's iconic ancient treasures along the way.
The Sonesta Moon Goddess Nile Cruise boasts spacious cabins with private balconies, allowing guests to enjoy breathtaking views of the Nile. The cruise features gourmet dining, a relaxing sun deck, a swimming pool, and entertainment programs that highlight Egypt's rich culture and history. Whether you're exploring the Valley of the Kings, Karnak Temple, or the Philae Temple, this cruise ensures an enriching and seamless experience.
For travelers seeking similar luxurious experiences, the Farah Nile Cruise and Oberoi Zahra Nile Cruise are excellent alternatives. These cruises offer exceptional service, elegant accommodations, and curated excursions to Egypt's most iconic sites. Another standout is the Oberoi Philae Nile Cruise, known for its personalized service and exquisite cuisine.
History enthusiasts will appreciate the refined charm of the Historia Nile Cruise, while the Jaz Crown Jewel Nile Cruise and Jaz Regent Nile Cruise provide a perfect blend of modern amenities and classic elegance. Those seeking more options within the Sonesta fleet can explore the Sonesta Sun Goddess Nile Cruise, Sonesta Star Goddess Nile Cruise, or Sonesta Nile Goddess Nile Cruise, each offering unique features and premium services.
Lastly, the Sonesta George Nile Cruise stands out for its contemporary design and warm hospitality. Whether you choose the Sonesta Moon Goddess Nile Cruise or another luxury vessel, your journey along the Nile will be a captivating blend of history, culture, and unparalleled comfort.
🌐 Visit us at www.etbtoursegypt.com 📲 Contact us now! +20 10 21100873 📧 Email: info@etbtours.com 🏢 Company Address: 4 El Lebeny Axis , Nazlet Al Batran , Al Haram, Giza , Egypt