-
@ 220522c2:61e18cb4
2025-01-01 17:28:54interesting, i didn’t know that -
@ eac63075:b4988b48
2024-11-09 17:57:27Based on a recent paper that included collaboration from renowned experts such as Lynn Alden, Steve Lee, and Ren Crypto Fish, we discuss in depth how Bitcoin's consensus is built, the main risks, and the complex dynamics of protocol upgrades.
Podcast https://www.fountain.fm/episode/wbjD6ntQuvX5u2G5BccC
Presentation https://gamma.app/docs/Analyzing-Bitcoin-Consensus-Risks-in-Protocol-Upgrades-p66axxjwaa37ksn
1. Introduction to Consensus in Bitcoin
Consensus in Bitcoin is the foundation that keeps the network secure and functional, allowing users worldwide to perform transactions in a decentralized manner without the need for intermediaries. Since its launch in 2009, Bitcoin is often described as an "immutable" system designed to resist changes, and it is precisely this resistance that ensures its security and stability.
The central idea behind consensus in Bitcoin is to create a set of acceptance rules for blocks and transactions, ensuring that all network participants agree on the transaction history. This prevents "double-spending," where the same bitcoin could be used in two simultaneous transactions, something that would compromise trust in the network.
Evolution of Consensus in Bitcoin
Over the years, consensus in Bitcoin has undergone several adaptations, and the way participants agree on changes remains a delicate process. Unlike traditional systems, where changes can be imposed from the top down, Bitcoin operates in a decentralized model where any significant change needs the support of various groups of stakeholders, including miners, developers, users, and large node operators.
Moreover, the update process is extremely cautious, as hasty changes can compromise the network's security. As a result, the philosophy of "don't fix what isn't broken" prevails, with improvements happening incrementally and only after broad consensus among those involved. This model can make progress seem slow but ensures that Bitcoin remains faithful to the principles of security and decentralization.
2. Technical Components of Consensus
Bitcoin's consensus is supported by a set of technical rules that determine what is considered a valid transaction and a valid block on the network. These technical aspects ensure that all nodes—the computers that participate in the Bitcoin network—agree on the current state of the blockchain. Below are the main technical components that form the basis of the consensus.
Validation of Blocks and Transactions
The validation of blocks and transactions is the central point of consensus in Bitcoin. A block is only considered valid if it meets certain criteria, such as maximum size, transaction structure, and the solving of the "Proof of Work" problem. The proof of work, required for a block to be included in the blockchain, is a computational process that ensures the block contains significant computational effort—protecting the network against manipulation attempts.
Transactions, in turn, need to follow specific input and output rules. Each transaction includes cryptographic signatures that prove the ownership of the bitcoins sent, as well as validation scripts that verify if the transaction conditions are met. This validation system is essential for network nodes to autonomously confirm that each transaction follows the rules.
Chain Selection
Another fundamental technical issue for Bitcoin's consensus is chain selection, which becomes especially important in cases where multiple versions of the blockchain coexist, such as after a network split (fork). To decide which chain is the "true" one and should be followed, the network adopts the criterion of the highest accumulated proof of work. In other words, the chain with the highest number of valid blocks, built with the greatest computational effort, is chosen by the network as the official one.
This criterion avoids permanent splits because it encourages all nodes to follow the same main chain, reinforcing consensus.
Soft Forks vs. Hard Forks
In the consensus process, protocol changes can happen in two ways: through soft forks or hard forks. These variations affect not only the protocol update but also the implications for network users:
-
Soft Forks: These are changes that are backward compatible. Only nodes that adopt the new update will follow the new rules, but old nodes will still recognize the blocks produced with these rules as valid. This compatibility makes soft forks a safer option for updates, as it minimizes the risk of network division.
-
Hard Forks: These are updates that are not backward compatible, requiring all nodes to update to the new version or risk being separated from the main chain. Hard forks can result in the creation of a new coin, as occurred with the split between Bitcoin and Bitcoin Cash in 2017. While hard forks allow for deeper changes, they also bring significant risks of network fragmentation.
These technical components form the base of Bitcoin's security and resilience, allowing the system to remain functional and immutable without losing the necessary flexibility to evolve over time.
3. Stakeholders in Bitcoin's Consensus
Consensus in Bitcoin is not decided centrally. On the contrary, it depends on the interaction between different groups of stakeholders, each with their motivations, interests, and levels of influence. These groups play fundamental roles in how changes are implemented or rejected on the network. Below, we explore the six main stakeholders in Bitcoin's consensus.
1. Economic Nodes
Economic nodes, usually operated by exchanges, custody providers, and large companies that accept Bitcoin, exert significant influence over consensus. Because they handle large volumes of transactions and act as a connection point between the Bitcoin ecosystem and the traditional financial system, these nodes have the power to validate or reject blocks and to define which version of the software to follow in case of a fork.
Their influence is proportional to the volume of transactions they handle, and they can directly affect which chain will be seen as the main one. Their incentive is to maintain the network's stability and security to preserve its functionality and meet regulatory requirements.
2. Investors
Investors, including large institutional funds and individual Bitcoin holders, influence consensus indirectly through their impact on the asset's price. Their buying and selling actions can affect Bitcoin's value, which in turn influences the motivation of miners and other stakeholders to continue investing in the network's security and development.
Some institutional investors have agreements with custodians that may limit their ability to act in network split situations. Thus, the impact of each investor on consensus can vary based on their ownership structure and how quickly they can react to a network change.
3. Media Influencers
Media influencers, including journalists, analysts, and popular personalities on social media, have a powerful role in shaping public opinion about Bitcoin and possible updates. These influencers can help educate the public, promote debates, and bring transparency to the consensus process.
On the other hand, the impact of influencers can be double-edged: while they can clarify complex topics, they can also distort perceptions by amplifying or minimizing change proposals. This makes them a force both of support and resistance to consensus.
4. Miners
Miners are responsible for validating transactions and including blocks in the blockchain. Through computational power (hashrate), they also exert significant influence over consensus decisions. In update processes, miners often signal their support for a proposal, indicating that the new version is safe to use. However, this signaling is not always definitive, and miners can change their position if they deem it necessary.
Their incentive is to maximize returns from block rewards and transaction fees, as well as to maintain the value of investments in their specialized equipment, which are only profitable if the network remains stable.
5. Protocol Developers
Protocol developers, often called "Core Developers," are responsible for writing and maintaining Bitcoin's code. Although they do not have direct power over consensus, they possess an informal veto power since they decide which changes are included in the main client (Bitcoin Core). This group also serves as an important source of technical knowledge, helping guide decisions and inform other stakeholders.
Their incentive lies in the continuous improvement of the network, ensuring security and decentralization. Many developers are funded by grants and sponsorships, but their motivations generally include a strong ideological commitment to Bitcoin's principles.
6. Users and Application Developers
This group includes people who use Bitcoin in their daily transactions and developers who build solutions based on the network, such as wallets, exchanges, and payment platforms. Although their power in consensus is less than that of miners or economic nodes, they play an important role because they are responsible for popularizing Bitcoin's use and expanding the ecosystem.
If application developers decide not to adopt an update, this can affect compatibility and widespread acceptance. Thus, they indirectly influence consensus by deciding which version of the protocol to follow in their applications.
These stakeholders are vital to the consensus process, and each group exerts influence according to their involvement, incentives, and ability to act in situations of change. Understanding the role of each makes it clearer how consensus is formed and why it is so difficult to make significant changes to Bitcoin.
4. Mechanisms for Activating Updates in Bitcoin
For Bitcoin to evolve without compromising security and consensus, different mechanisms for activating updates have been developed over the years. These mechanisms help coordinate changes among network nodes to minimize the risk of fragmentation and ensure that updates are implemented in an orderly manner. Here, we explore some of the main methods used in Bitcoin, their advantages and disadvantages, as well as historical examples of significant updates.
Flag Day
The Flag Day mechanism is one of the simplest forms of activating changes. In it, a specific date or block is determined as the activation moment, and all nodes must be updated by that point. This method does not involve prior signaling; participants simply need to update to the new software version by the established day or block.
-
Advantages: Simplicity and predictability are the main benefits of Flag Day, as everyone knows the exact activation date.
-
Disadvantages: Inflexibility can be a problem because there is no way to adjust the schedule if a significant part of the network has not updated. This can result in network splits if a significant number of nodes are not ready for the update.
An example of Flag Day was the Pay to Script Hash (P2SH) update in 2012, which required all nodes to adopt the change to avoid compatibility issues.
BIP34 and BIP9
BIP34 introduced a more dynamic process, in which miners increase the version number in block headers to signal the update. When a predetermined percentage of the last blocks is mined with this new version, the update is automatically activated. This model later evolved with BIP9, which allowed multiple updates to be signaled simultaneously through "version bits," each corresponding to a specific change.
-
Advantages: Allows the network to activate updates gradually, giving more time for participants to adapt.
-
Disadvantages: These methods rely heavily on miner support, which means that if a sufficient number of miners do not signal the update, it can be delayed or not implemented.
BIP9 was used in the activation of SegWit (BIP141) but faced challenges because some miners did not signal their intent to activate, leading to the development of new mechanisms.
User Activated Soft Forks (UASF) and User Resisted Soft Forks (URSF)
To increase the decision-making power of ordinary users, the concept of User Activated Soft Fork (UASF) was introduced, allowing node operators, not just miners, to determine consensus for a change. In this model, nodes set a date to start rejecting blocks that are not in compliance with the new update, forcing miners to adapt or risk having their blocks rejected by the network.
URSF, in turn, is a model where nodes reject blocks that attempt to adopt a specific update, functioning as resistance against proposed changes.
-
Advantages: UASF returns decision-making power to node operators, ensuring that changes do not depend solely on miners.
-
Disadvantages: Both UASF and URSF can generate network splits, especially in cases of strong opposition among different stakeholders.
An example of UASF was the activation of SegWit in 2017, where users supported activation independently of miner signaling, which ended up forcing its adoption.
BIP8 (LOT=True)
BIP8 is an evolution of BIP9, designed to prevent miners from indefinitely blocking a change desired by the majority of users and developers. BIP8 allows setting a parameter called "lockinontimeout" (LOT) as true, which means that if the update has not been fully signaled by a certain point, it is automatically activated.
-
Advantages: Ensures that changes with broad support among users are not blocked by miners who wish to maintain the status quo.
-
Disadvantages: Can lead to network splits if miners or other important stakeholders do not support the update.
Although BIP8 with LOT=True has not yet been used in Bitcoin, it is a proposal that can be applied in future updates if necessary.
These activation mechanisms have been essential for Bitcoin's development, allowing updates that keep the network secure and functional. Each method brings its own advantages and challenges, but all share the goal of preserving consensus and network cohesion.
5. Risks and Considerations in Consensus Updates
Consensus updates in Bitcoin are complex processes that involve not only technical aspects but also political, economic, and social considerations. Due to the network's decentralized nature, each change brings with it a set of risks that need to be carefully assessed. Below, we explore some of the main challenges and future scenarios, as well as the possible impacts on stakeholders.
Network Fragility with Alternative Implementations
One of the main risks associated with consensus updates is the possibility of network fragmentation when there are alternative software implementations. If an update is implemented by a significant group of nodes but rejected by others, a network split (fork) can occur. This creates two competing chains, each with a different version of the transaction history, leading to unpredictable consequences for users and investors.
Such fragmentation weakens Bitcoin because, by dividing hashing power (computing) and coin value, it reduces network security and investor confidence. A notable example of this risk was the fork that gave rise to Bitcoin Cash in 2017 when disagreements over block size resulted in a new chain and a new asset.
Chain Splits and Impact on Stakeholders
Chain splits are a significant risk in update processes, especially in hard forks. During a hard fork, the network is split into two separate chains, each with its own set of rules. This results in the creation of a new coin and leaves users with duplicated assets on both chains. While this may seem advantageous, in the long run, these splits weaken the network and create uncertainties for investors.
Each group of stakeholders reacts differently to a chain split:
-
Institutional Investors and ETFs: Face regulatory and compliance challenges because many of these assets are managed under strict regulations. The creation of a new coin requires decisions to be made quickly to avoid potential losses, which may be hampered by regulatory constraints.
-
Miners: May be incentivized to shift their computing power to the chain that offers higher profitability, which can weaken one of the networks.
-
Economic Nodes: Such as major exchanges and custody providers, have to quickly choose which chain to support, influencing the perceived value of each network.
Such divisions can generate uncertainties and loss of value, especially for institutional investors and those who use Bitcoin as a store of value.
Regulatory Impacts and Institutional Investors
With the growing presence of institutional investors in Bitcoin, consensus changes face new compliance challenges. Bitcoin ETFs, for example, are required to follow strict rules about which assets they can include and how chain split events should be handled. The creation of a new asset or migration to a new chain can complicate these processes, creating pressure for large financial players to quickly choose a chain, affecting the stability of consensus.
Moreover, decisions regarding forks can influence the Bitcoin futures and derivatives market, affecting perception and adoption by new investors. Therefore, the need to avoid splits and maintain cohesion is crucial to attract and preserve the confidence of these investors.
Security Considerations in Soft Forks and Hard Forks
While soft forks are generally preferred in Bitcoin for their backward compatibility, they are not without risks. Soft forks can create different classes of nodes on the network (updated and non-updated), which increases operational complexity and can ultimately weaken consensus cohesion. In a network scenario with fragmentation of node classes, Bitcoin's security can be affected, as some nodes may lose part of the visibility over updated transactions or rules.
In hard forks, the security risk is even more evident because all nodes need to adopt the new update to avoid network division. Experience shows that abrupt changes can create temporary vulnerabilities, in which malicious agents try to exploit the transition to attack the network.
Bounty Claim Risks and Attack Scenarios
Another risk in consensus updates are so-called "bounty claims"—accumulated rewards that can be obtained if an attacker manages to split or deceive a part of the network. In a conflict scenario, a group of miners or nodes could be incentivized to support a new update or create an alternative version of the software to benefit from these rewards.
These risks require stakeholders to carefully assess each update and the potential vulnerabilities it may introduce. The possibility of "bounty claims" adds a layer of complexity to consensus because each interest group may see a financial opportunity in a change that, in the long term, may harm network stability.
The risks discussed above show the complexity of consensus in Bitcoin and the importance of approaching it gradually and deliberately. Updates need to consider not only technical aspects but also economic and social implications, in order to preserve Bitcoin's integrity and maintain trust among stakeholders.
6. Recommendations for the Consensus Process in Bitcoin
To ensure that protocol changes in Bitcoin are implemented safely and with broad support, it is essential that all stakeholders adopt a careful and coordinated approach. Here are strategic recommendations for evaluating, supporting, or rejecting consensus updates, considering the risks and challenges discussed earlier, along with best practices for successful implementation.
1. Careful Evaluation of Proposal Maturity
Stakeholders should rigorously assess the maturity level of a proposal before supporting its implementation. Updates that are still experimental or lack a robust technical foundation can expose the network to unnecessary risks. Ideally, change proposals should go through an extensive testing phase, have security audits, and receive review and feedback from various developers and experts.
2. Extensive Testing in Secure and Compatible Networks
Before an update is activated on the mainnet, it is essential to test it on networks like testnet and signet, and whenever possible, on other compatible networks that offer a safe and controlled environment to identify potential issues. Testing on networks like Litecoin was fundamental for the safe launch of innovations like SegWit and the Lightning Network, allowing functionalities to be validated on a lower-impact network before being implemented on Bitcoin.
The Liquid Network, developed by Blockstream, also plays an important role as an experimental network for new proposals, such as OP_CAT. By adopting these testing environments, stakeholders can mitigate risks and ensure that the update is reliable and secure before being adopted by the main network.
3. Importance of Stakeholder Engagement
The success of a consensus update strongly depends on the active participation of all stakeholders. This includes economic nodes, miners, protocol developers, investors, and end users. Lack of participation can lead to inadequate decisions or even future network splits, which would compromise Bitcoin's security and stability.
4. Key Questions for Evaluating Consensus Proposals
To assist in decision-making, each group of stakeholders should consider some key questions before supporting a consensus change:
- Does the proposal offer tangible benefits for Bitcoin's security, scalability, or usability?
- Does it maintain backward compatibility or introduce the risk of network split?
- Are the implementation requirements clear and feasible for each group involved?
- Are there clear and aligned incentives for all stakeholder groups to accept the change?
5. Coordination and Timing in Implementations
Timing is crucial. Updates with short activation windows can force a split because not all nodes and miners can update simultaneously. Changes should be planned with ample deadlines to allow all stakeholders to adjust their systems, avoiding surprises that could lead to fragmentation.
Mechanisms like soft forks are generally preferable to hard forks because they allow a smoother transition. Opting for backward-compatible updates when possible facilitates the process and ensures that nodes and miners can adapt without pressure.
6. Continuous Monitoring and Re-evaluation
After an update, it's essential to monitor the network to identify problems or side effects. This continuous process helps ensure cohesion and trust among all participants, keeping Bitcoin as a secure and robust network.
These recommendations, including the use of secure networks for extensive testing, promote a collaborative and secure environment for Bitcoin's consensus process. By adopting a deliberate and strategic approach, stakeholders can preserve Bitcoin's value as a decentralized and censorship-resistant network.
7. Conclusion
Consensus in Bitcoin is more than a set of rules; it's the foundation that sustains the network as a decentralized, secure, and reliable system. Unlike centralized systems, where decisions can be made quickly, Bitcoin requires a much more deliberate and cooperative approach, where the interests of miners, economic nodes, developers, investors, and users must be considered and harmonized. This governance model may seem slow, but it is fundamental to preserving the resilience and trust that make Bitcoin a global store of value and censorship-resistant.
Consensus updates in Bitcoin must balance the need for innovation with the preservation of the network's core principles. The development process of a proposal needs to be detailed and rigorous, going through several testing stages, such as in testnet, signet, and compatible networks like Litecoin and Liquid Network. These networks offer safe environments for proposals to be analyzed and improved before being launched on the main network.
Each proposed change must be carefully evaluated regarding its maturity, impact, backward compatibility, and support among stakeholders. The recommended key questions and appropriate timing are critical to ensure that an update is adopted without compromising network cohesion. It's also essential that the implementation process is continuously monitored and re-evaluated, allowing adjustments as necessary and minimizing the risk of instability.
By following these guidelines, Bitcoin's stakeholders can ensure that the network continues to evolve safely and robustly, maintaining user trust and further solidifying its role as one of the most resilient and innovative digital assets in the world. Ultimately, consensus in Bitcoin is not just a technical issue but a reflection of its community and the values it represents: security, decentralization, and resilience.
8. Links
Whitepaper: https://github.com/bitcoin-cap/bcap
Youtube (pt-br): https://www.youtube.com/watch?v=rARycAibl9o&list=PL-qnhF0qlSPkfhorqsREuIu4UTbF0h4zb
-
-
@ eac63075:b4988b48
2024-10-26 22:14:19The future of physical money is at stake, and the discussion about DREX, the new digital currency planned by the Central Bank of Brazil, is gaining momentum. In a candid and intense conversation, Federal Deputy Julia Zanatta (PL/SC) discussed the challenges and risks of this digital transition, also addressing her Bill No. 3,341/2024, which aims to prevent the extinction of physical currency. This bill emerges as a direct response to legislative initiatives seeking to replace physical money with digital alternatives, limiting citizens' options and potentially compromising individual freedom. Let's delve into the main points of this conversation.
https://www.fountain.fm/episode/i5YGJ9Ors3PkqAIMvNQ0
What is a CBDC?
Before discussing the specifics of DREX, it’s important to understand what a CBDC (Central Bank Digital Currency) is. CBDCs are digital currencies issued by central banks, similar to a digital version of physical money. Unlike cryptocurrencies such as Bitcoin, which operate in a decentralized manner, CBDCs are centralized and regulated by the government. In other words, they are digital currencies created and controlled by the Central Bank, intended to replace physical currency.
A prominent feature of CBDCs is their programmability. This means that the government can theoretically set rules about how, where, and for what this currency can be used. This aspect enables a level of control over citizens' finances that is impossible with physical money. By programming the currency, the government could limit transactions by setting geographical or usage restrictions. In practice, money within a CBDC could be restricted to specific spending or authorized for use in a defined geographical area.
In countries like China, where citizen actions and attitudes are also monitored, a person considered to have a "low score" due to a moral or ideological violation may have their transactions limited to essential purchases, restricting their digital currency use to non-essential activities. This financial control is strengthened because, unlike physical money, digital currency cannot be exchanged anonymously.
Practical Example: The Case of DREX During the Pandemic
To illustrate how DREX could be used, an example was given by Eric Altafim, director of Banco Itaú. He suggested that, if DREX had existed during the COVID-19 pandemic, the government could have restricted the currency’s use to a 5-kilometer radius around a person’s residence, limiting their economic mobility. Another proposed use by the executive related to the Bolsa Família welfare program: the government could set up programming that only allows this benefit to be used exclusively for food purchases. Although these examples are presented as control measures for safety or organization, they demonstrate how much a CBDC could restrict citizens' freedom of choice.
To illustrate the potential for state control through a Central Bank Digital Currency (CBDC), such as DREX, it is helpful to look at the example of China. In China, the implementation of a CBDC coincides with the country’s Social Credit System, a governmental surveillance tool that assesses citizens' and companies' behavior. Together, these technologies allow the Chinese government to monitor, reward, and, above all, punish behavior deemed inappropriate or threatening to the government.
How Does China's Social Credit System Work?
Implemented in 2014, China's Social Credit System assigns every citizen and company a "score" based on various factors, including financial behavior, criminal record, social interactions, and even online activities. This score determines the benefits or penalties each individual receives and can affect everything from public transport access to obtaining loans and enrolling in elite schools for their children. Citizens with low scores may face various sanctions, including travel restrictions, fines, and difficulty in securing loans.
With the adoption of the CBDC — or “digital yuan” — the Chinese government now has a new tool to closely monitor citizens' financial transactions, facilitating the application of Social Credit System penalties. China’s CBDC is a programmable digital currency, which means that the government can restrict how, when, and where the money can be spent. Through this level of control, digital currency becomes a powerful mechanism for influencing citizens' behavior.
Imagine, for instance, a citizen who repeatedly posts critical remarks about the government on social media or participates in protests. If the Social Credit System assigns this citizen a low score, the Chinese government could, through the CBDC, restrict their money usage in certain areas or sectors. For example, they could be prevented from buying tickets to travel to other regions, prohibited from purchasing certain consumer goods, or even restricted to making transactions only at stores near their home.
Another example of how the government can use the CBDC to enforce the Social Credit System is by monitoring purchases of products such as alcohol or luxury items. If a citizen uses the CBDC to spend more than the government deems reasonable on such products, this could negatively impact their social score, resulting in additional penalties such as future purchase restrictions or a lowered rating that impacts their personal and professional lives.
In China, this kind of control has already been demonstrated in several cases. Citizens added to Social Credit System “blacklists” have seen their spending and investment capacity severely limited. The combination of digital currency and social scores thus creates a sophisticated and invasive surveillance system, through which the Chinese government controls important aspects of citizens’ financial lives and individual freedoms.
Deputy Julia Zanatta views these examples with great concern. She argues that if the state has full control over digital money, citizens will be exposed to a level of economic control and surveillance never seen before. In a democracy, this control poses a risk, but in an authoritarian regime, it could be used as a powerful tool of repression.
DREX and Bill No. 3,341/2024
Julia Zanatta became aware of a bill by a Workers' Party (PT) deputy (Bill 4068/2020 by Deputy Reginaldo Lopes - PT/MG) that proposes the extinction of physical money within five years, aiming for a complete transition to DREX, the digital currency developed by the Central Bank of Brazil. Concerned about the impact of this measure, Julia drafted her bill, PL No. 3,341/2024, which prohibits the elimination of physical money, ensuring citizens the right to choose physical currency.
“The more I read about DREX, the less I want its implementation,” says the deputy. DREX is a Central Bank Digital Currency (CBDC), similar to other state digital currencies worldwide, but which, according to Julia, carries extreme control risks. She points out that with DREX, the State could closely monitor each citizen’s transactions, eliminating anonymity and potentially restricting freedom of choice. This control would lie in the hands of the Central Bank, which could, in a crisis or government change, “freeze balances or even delete funds directly from user accounts.”
Risks and Individual Freedom
Julia raises concerns about potential abuses of power that complete digitalization could allow. In a democracy, state control over personal finances raises serious questions, and EddieOz warns of an even more problematic future. “Today we are in a democracy, but tomorrow, with a government transition, we don't know if this kind of power will be used properly or abused,” he states. In other words, DREX gives the State the ability to restrict or condition the use of money, opening the door to unprecedented financial surveillance.
EddieOz cites Nigeria as an example, where a CBDC was implemented, and the government imposed severe restrictions on the use of physical money to encourage the use of digital currency, leading to protests and clashes in the country. In practice, the poorest and unbanked — those without regular access to banking services — were harshly affected, as without physical money, many cannot conduct basic transactions. Julia highlights that in Brazil, this situation would be even more severe, given the large number of unbanked individuals and the extent of rural areas where access to technology is limited.
The Relationship Between DREX and Pix
The digital transition has already begun with Pix, which revolutionized instant transfers and payments in Brazil. However, Julia points out that Pix, though popular, is a citizen’s choice, while DREX tends to eliminate that choice. The deputy expresses concern about new rules suggested for Pix, such as daily transaction limits of a thousand reais, justified as anti-fraud measures but which, in her view, represent additional control and a profit opportunity for banks. “How many more rules will banks create to profit from us?” asks Julia, noting that DREX could further enhance control over personal finances.
International Precedents and Resistance to CBDC
The deputy also cites examples from other countries resisting the idea of a centralized digital currency. In the United States, states like New Hampshire have passed laws to prevent the advance of CBDCs, and leaders such as Donald Trump have opposed creating a national digital currency. Trump, addressing the topic, uses a justification similar to Julia’s: in a digitalized system, “with one click, your money could disappear.” She agrees with the warning, emphasizing the control risk that a CBDC represents, especially for countries with disadvantaged populations.
Besides the United States, Canada, Colombia, and Australia have also suspended studies on digital currencies, citing the need for further discussions on population impacts. However, in Brazil, the debate on DREX is still limited, with few parliamentarians and political leaders openly discussing the topic. According to Julia, only she and one or two deputies are truly trying to bring this discussion to the Chamber, making DREX’s advance even more concerning.
Bill No. 3,341/2024 and Popular Pressure
For Julia, her bill is a first step. Although she acknowledges that ideally, it would prevent DREX's implementation entirely, PL 3341/2024 is a measure to ensure citizens' choice to use physical money, preserving a form of individual freedom. “If the future means control, I prefer to live in the past,” Julia asserts, reinforcing that the fight for freedom is at the heart of her bill.
However, the deputy emphasizes that none of this will be possible without popular mobilization. According to her, popular pressure is crucial for other deputies to take notice and support PL 3341. “I am only one deputy, and we need the public’s support to raise the project’s visibility,” she explains, encouraging the public to press other parliamentarians and ask them to “pay attention to PL 3341 and the project that prohibits the end of physical money.” The deputy believes that with a strong awareness and pressure movement, it is possible to advance the debate and ensure Brazilians’ financial freedom.
What’s at Stake?
Julia Zanatta leaves no doubt: DREX represents a profound shift in how money will be used and controlled in Brazil. More than a simple modernization of the financial system, the Central Bank’s CBDC sets precedents for an unprecedented level of citizen surveillance and control in the country. For the deputy, this transition needs to be debated broadly and transparently, and it’s up to the Brazilian people to defend their rights and demand that the National Congress discuss these changes responsibly.
The deputy also emphasizes that, regardless of political or partisan views, this issue affects all Brazilians. “This agenda is something that will affect everyone. We need to be united to ensure people understand the gravity of what could happen.” Julia believes that by sharing information and generating open debate, it is possible to prevent Brazil from following the path of countries that have already implemented a digital currency in an authoritarian way.
A Call to Action
The future of physical money in Brazil is at risk. For those who share Deputy Julia Zanatta’s concerns, the time to act is now. Mobilize, get informed, and press your representatives. PL 3341/2024 is an opportunity to ensure that Brazilian citizens have a choice in how to use their money, without excessive state interference or surveillance.
In the end, as the deputy puts it, the central issue is freedom. “My fear is that this project will pass, and people won’t even understand what is happening.” Therefore, may every citizen at least have the chance to understand what’s at stake and make their voice heard in defense of a Brazil where individual freedom and privacy are respected values.
-
@ 220522c2:61e18cb4
2025-01-01 16:47:35Someone should build a relay with a plugin system. Then relay runners can just pull nips in like plugins and developers can focus on building plugins for the relay rather than entirely new relays that hardcode support some subset of nips. Thoughts? #grownostr -
@ 220522c2:61e18cb4
2024-10-02 13:08:34You keep your private notes locally and publish what you want to share. Idk what how a ledger is relevant here. -
@ 220522c2:61e18cb4
2024-10-02 13:07:29It’s still in alpha so please report bugs and let us know what kind of features you’d like to see. -
@ a95c6243:d345522c
2025-01-01 17:39:51Heute möchte ich ein Gedicht mit euch teilen. Es handelt sich um eine Ballade des österreichischen Lyrikers Johann Gabriel Seidl aus dem 19. Jahrhundert. Mir sind diese Worte fest in Erinnerung, da meine Mutter sie perfekt rezitieren konnte, auch als die Kräfte schon langsam schwanden.
Dem originalen Titel «Die Uhr» habe ich für mich immer das Wort «innere» hinzugefügt. Denn der Zeitmesser – hier vermutliche eine Taschenuhr – symbolisiert zwar in dem Kontext das damalige Zeitempfinden und die Umbrüche durch die industrielle Revolution, sozusagen den Zeitgeist und das moderne Leben. Aber der Autor setzt sich philosophisch mit der Zeit auseinander und gibt seinem Werk auch eine klar spirituelle Dimension.
Das Ticken der Uhr und die Momente des Glücks und der Trauer stehen sinnbildlich für das unaufhaltsame Fortschreiten und die Vergänglichkeit des Lebens. Insofern könnte man bei der Uhr auch an eine Sonnenuhr denken. Der Rhythmus der Ereignisse passt uns vielleicht nicht immer in den Kram.
Was den Takt pocht, ist durchaus auch das Herz, unser «inneres Uhrwerk». Wenn dieses Meisterwerk einmal stillsteht, ist es unweigerlich um uns geschehen. Hoffentlich können wir dann dankbar sagen: «Ich habe mein Bestes gegeben.»
Ich trage, wo ich gehe, stets eine Uhr bei mir; \ Wieviel es geschlagen habe, genau seh ich an ihr. \ Es ist ein großer Meister, der künstlich ihr Werk gefügt, \ Wenngleich ihr Gang nicht immer dem törichten Wunsche genügt.
Ich wollte, sie wäre rascher gegangen an manchem Tag; \ Ich wollte, sie hätte manchmal verzögert den raschen Schlag. \ In meinen Leiden und Freuden, in Sturm und in der Ruh, \ Was immer geschah im Leben, sie pochte den Takt dazu.
Sie schlug am Sarge des Vaters, sie schlug an des Freundes Bahr, \ Sie schlug am Morgen der Liebe, sie schlug am Traualtar. \ Sie schlug an der Wiege des Kindes, sie schlägt, will's Gott, noch oft, \ Wenn bessere Tage kommen, wie meine Seele es hofft.
Und ward sie auch einmal träger, und drohte zu stocken ihr Lauf, \ So zog der Meister immer großmütig sie wieder auf. \ Doch stände sie einmal stille, dann wär's um sie geschehn, \ Kein andrer, als der sie fügte, bringt die Zerstörte zum Gehn.
Dann müßt ich zum Meister wandern, der wohnt am Ende wohl weit, \ Wohl draußen, jenseits der Erde, wohl dort in der Ewigkeit! \ Dann gäb ich sie ihm zurücke mit dankbar kindlichem Flehn: \ Sieh, Herr, ich hab nichts verdorben, sie blieb von selber stehn.
Johann Gabriel Seidl (1804-1875)
-
@ a4a6b584:1e05b95b
2025-01-02 18:13:31The Four-Layer Framework
Layer 1: Zoom Out
Start by looking at the big picture. What’s the subject about, and why does it matter? Focus on the overarching ideas and how they fit together. Think of this as the 30,000-foot view—it’s about understanding the "why" and "how" before diving into the "what."
Example: If you’re learning programming, start by understanding that it’s about giving logical instructions to computers to solve problems.
- Tip: Keep it simple. Summarize the subject in one or two sentences and avoid getting bogged down in specifics at this stage.
Once you have the big picture in mind, it’s time to start breaking it down.
Layer 2: Categorize and Connect
Now it’s time to break the subject into categories—like creating branches on a tree. This helps your brain organize information logically and see connections between ideas.
Example: Studying biology? Group concepts into categories like cells, genetics, and ecosystems.
- Tip: Use headings or labels to group similar ideas. Jot these down in a list or simple diagram to keep track.
With your categories in place, you’re ready to dive into the details that bring them to life.
Layer 3: Master the Details
Once you’ve mapped out the main categories, you’re ready to dive deeper. This is where you learn the nuts and bolts—like formulas, specific techniques, or key terminology. These details make the subject practical and actionable.
Example: In programming, this might mean learning the syntax for loops, conditionals, or functions in your chosen language.
- Tip: Focus on details that clarify the categories from Layer 2. Skip anything that doesn’t add to your understanding.
Now that you’ve mastered the essentials, you can expand your knowledge to include extra material.
Layer 4: Expand Your Horizons
Finally, move on to the extra material—less critical facts, trivia, or edge cases. While these aren’t essential to mastering the subject, they can be useful in specialized discussions or exams.
Example: Learn about rare programming quirks or historical trivia about a language’s development.
- Tip: Spend minimal time here unless it’s necessary for your goals. It’s okay to skim if you’re short on time.
Pro Tips for Better Learning
1. Use Active Recall and Spaced Repetition
Test yourself without looking at notes. Review what you’ve learned at increasing intervals—like after a day, a week, and a month. This strengthens memory by forcing your brain to actively retrieve information.
2. Map It Out
Create visual aids like diagrams or concept maps to clarify relationships between ideas. These are particularly helpful for organizing categories in Layer 2.
3. Teach What You Learn
Explain the subject to someone else as if they’re hearing it for the first time. Teaching exposes any gaps in your understanding and helps reinforce the material.
4. Engage with LLMs and Discuss Concepts
Take advantage of tools like ChatGPT or similar large language models to explore your topic in greater depth. Use these tools to:
- Ask specific questions to clarify confusing points.
- Engage in discussions to simulate real-world applications of the subject.
- Generate examples or analogies that deepen your understanding.Tip: Use LLMs as a study partner, but don’t rely solely on them. Combine these insights with your own critical thinking to develop a well-rounded perspective.
Get Started
Ready to try the Four-Layer Method? Take 15 minutes today to map out the big picture of a topic you’re curious about—what’s it all about, and why does it matter? By building your understanding step by step, you’ll master the subject with less stress and more confidence.
-
@ a95c6243:d345522c
2024-12-21 09:54:49Falls du beim Lesen des Titels dieses Newsletters unwillkürlich an positive Neuigkeiten aus dem globalen polit-medialen Irrenhaus oder gar aus dem wirtschaftlichen Umfeld gedacht hast, darf ich dich beglückwünschen. Diese Assoziation ist sehr löblich, denn sie weist dich als unverbesserlichen Optimisten aus. Leider muss ich dich diesbezüglich aber enttäuschen. Es geht hier um ein anderes Thema, allerdings sehr wohl ein positives, wie ich finde.
Heute ist ein ganz besonderer Tag: die Wintersonnenwende. Genau gesagt hat heute morgen um 10:20 Uhr Mitteleuropäischer Zeit (MEZ) auf der Nordhalbkugel unseres Planeten der astronomische Winter begonnen. Was daran so außergewöhnlich ist? Der kürzeste Tag des Jahres war gestern, seit heute werden die Tage bereits wieder länger! Wir werden also jetzt jeden Tag ein wenig mehr Licht haben.
Für mich ist dieses Ereignis immer wieder etwas kurios: Es beginnt der Winter, aber die Tage werden länger. Das erscheint mir zunächst wie ein Widerspruch, denn meine spontanen Assoziationen zum Winter sind doch eher Kälte und Dunkelheit, relativ zumindest. Umso erfreulicher ist der emotionale Effekt, wenn dann langsam die Erkenntnis durchsickert: Ab jetzt wird es schon wieder heller!
Natürlich ist es kalt im Winter, mancherorts mehr als anderswo. Vielleicht jedoch nicht mehr lange, wenn man den Klimahysterikern glauben wollte. Mindestens letztes Jahr hat Väterchen Frost allerdings gleich zu Beginn seiner Saison – und passenderweise während des globalen Überhitzungsgipfels in Dubai – nochmal richtig mit der Faust auf den Tisch gehauen. Schnee- und Eischaos sind ja eigentlich in der Agenda bereits nicht mehr vorgesehen. Deswegen war man in Deutschland vermutlich in vorauseilendem Gehorsam schon nicht mehr darauf vorbereitet und wurde glatt lahmgelegt.
Aber ich schweife ab. Die Aussicht auf nach und nach mehr Licht und damit auch Wärme stimmt mich froh. Den Zusammenhang zwischen beidem merkt man in Andalusien sehr deutlich. Hier, wo die Häuser im Winter arg auskühlen, geht man zum Aufwärmen raus auf die Straße oder auf den Balkon. Die Sonne hat auch im Winter eine erfreuliche Kraft. Und da ist jede Minute Gold wert.
Außerdem ist mir vor Jahren so richtig klar geworden, warum mir das südliche Klima so sehr gefällt. Das liegt nämlich nicht nur an der Sonne als solcher, oder der Wärme – das liegt vor allem am Licht. Ohne Licht keine Farben, das ist der ebenso simple wie gewaltige Unterschied zwischen einem deprimierenden matschgraubraunen Winter und einem fröhlichen bunten. Ein großes Stück Lebensqualität.
Mir gefällt aber auch die Symbolik dieses Tages: Licht aus der Dunkelheit, ein Wendepunkt, ein Neuanfang, neue Möglichkeiten, Übergang zu neuer Aktivität. In der winterlichen Stille keimt bereits neue Lebendigkeit. Und zwar in einem Zyklus, das wird immer wieder so geschehen. Ich nehme das gern als ein Stück Motivation, es macht mir Hoffnung und gibt mir Energie.
Übrigens ist parallel am heutigen Tag auf der südlichen Halbkugel Sommeranfang. Genau im entgegengesetzten Rhythmus, sich ergänzend, wie Yin und Yang. Das alles liegt an der Schrägstellung der Erdachse, die ist nämlich um 23,4º zur Umlaufbahn um die Sonne geneigt. Wir erinnern uns, gell?
Insofern bleibt eindeutig festzuhalten, dass “schräg sein” ein willkommener, wichtiger und positiver Wert ist. Mit anderen Worten: auch ungewöhnlich, eigenartig, untypisch, wunderlich, kauzig, … ja sogar irre, spinnert oder gar “quer” ist in Ordnung. Das schließt das Denken mit ein.
In diesem Sinne wünsche ich euch allen urige Weihnachtstage!
Dieser Beitrag ist letztes Jahr in meiner Denkbar erschienen.
-
@ eac63075:b4988b48
2024-10-21 08:11:11Imagine sending a private message to a friend, only to learn that authorities could be scanning its contents without your knowledge. This isn't a scene from a dystopian novel but a potential reality under the European Union's proposed "Chat Control" measures. Aimed at combating serious crimes like child exploitation and terrorism, these proposals could significantly impact the privacy of everyday internet users. As encrypted messaging services become the norm for personal and professional communication, understanding Chat Control is essential. This article delves into what Chat Control entails, why it's being considered, and how it could affect your right to private communication.
https://www.fountain.fm/episode/coOFsst7r7mO1EP1kSzV
https://open.spotify.com/episode/0IZ6kMExfxFm4FHg5DAWT8?si=e139033865e045de
Sections:
- Introduction
- What Is Chat Control?
- Why Is the EU Pushing for Chat Control?
- The Privacy Concerns and Risks
- The Technical Debate: Encryption and Backdoors
- Global Reactions and the Debate in Europe
- Possible Consequences for Messaging Services
- What Happens Next? The Future of Chat Control
- Conclusion
What Is Chat Control?
"Chat Control" refers to a set of proposed measures by the European Union aimed at monitoring and scanning private communications on messaging platforms. The primary goal is to detect and prevent the spread of illegal content, such as child sexual abuse material (CSAM) and to combat terrorism. While the intention is to enhance security and protect vulnerable populations, these proposals have raised significant privacy concerns.
At its core, Chat Control would require messaging services to implement automated scanning technologies that can analyze the content of messages—even those that are end-to-end encrypted. This means that the private messages you send to friends, family, or colleagues could be subject to inspection by algorithms designed to detect prohibited content.
Origins of the Proposal
The initiative for Chat Control emerged from the EU's desire to strengthen its digital security infrastructure. High-profile cases of online abuse and the use of encrypted platforms by criminal organizations have prompted lawmakers to consider more invasive surveillance tactics. The European Commission has been exploring legislation that would make it mandatory for service providers to monitor communications on their platforms.
How Messaging Services Work
Most modern messaging apps, like Signal, Session, SimpleX, Veilid, Protonmail and Tutanota (among others), use end-to-end encryption (E2EE). This encryption ensures that only the sender and the recipient can read the messages being exchanged. Not even the service providers can access the content. This level of security is crucial for maintaining privacy in digital communications, protecting users from hackers, identity thieves, and other malicious actors.
Key Elements of Chat Control
- Automated Content Scanning: Service providers would use algorithms to scan messages for illegal content.
- Circumvention of Encryption: To scan encrypted messages, providers might need to alter their encryption methods, potentially weakening security.
- Mandatory Reporting: If illegal content is detected, providers would be required to report it to authorities.
- Broad Applicability: The measures could apply to all messaging services operating within the EU, affecting both European companies and international platforms.
Why It Matters
Understanding Chat Control is essential because it represents a significant shift in how digital privacy is handled. While combating illegal activities online is crucial, the methods proposed could set a precedent for mass surveillance and the erosion of privacy rights. Everyday users who rely on encrypted messaging for personal and professional communication might find their conversations are no longer as private as they once thought.
Why Is the EU Pushing for Chat Control?
The European Union's push for Chat Control stems from a pressing concern to protect its citizens, particularly children, from online exploitation and criminal activities. With the digital landscape becoming increasingly integral to daily life, the EU aims to strengthen its ability to combat serious crimes facilitated through online platforms.
Protecting Children and Preventing Crime
One of the primary motivations behind Chat Control is the prevention of child sexual abuse material (CSAM) circulating on the internet. Law enforcement agencies have reported a significant increase in the sharing of illegal content through private messaging services. By implementing Chat Control, the EU believes it can more effectively identify and stop perpetrators, rescue victims, and deter future crimes.
Terrorism is another critical concern. Encrypted messaging apps can be used by terrorist groups to plan and coordinate attacks without detection. The EU argues that accessing these communications could be vital in preventing such threats and ensuring public safety.
Legal Context and Legislative Drivers
The push for Chat Control is rooted in several legislative initiatives:
-
ePrivacy Directive: This directive regulates the processing of personal data and the protection of privacy in electronic communications. The EU is considering amendments that would allow for the scanning of private messages under specific circumstances.
-
Temporary Derogation: In 2021, the EU adopted a temporary regulation permitting voluntary detection of CSAM by communication services. The current proposals aim to make such measures mandatory and more comprehensive.
-
Regulation Proposals: The European Commission has proposed regulations that would require service providers to detect, report, and remove illegal content proactively. This would include the use of technologies to scan private communications.
Balancing Security and Privacy
EU officials argue that the proposed measures are a necessary response to evolving digital threats. They emphasize the importance of staying ahead of criminals who exploit technology to harm others. By implementing Chat Control, they believe law enforcement can be more effective without entirely dismantling privacy protections.
However, the EU also acknowledges the need to balance security with fundamental rights. The proposals include provisions intended to limit the scope of surveillance, such as:
-
Targeted Scanning: Focusing on specific threats rather than broad, indiscriminate monitoring.
-
Judicial Oversight: Requiring court orders or oversight for accessing private communications.
-
Data Protection Safeguards: Implementing measures to ensure that data collected is handled securely and deleted when no longer needed.
The Urgency Behind the Push
High-profile cases of online abuse and terrorism have heightened the sense of urgency among EU policymakers. Reports of increasing online grooming and the widespread distribution of illegal content have prompted calls for immediate action. The EU posits that without measures like Chat Control, these problems will continue to escalate unchecked.
Criticism and Controversy
Despite the stated intentions, the push for Chat Control has been met with significant criticism. Opponents argue that the measures could be ineffective against savvy criminals who can find alternative ways to communicate. There is also concern that such surveillance could be misused or extended beyond its original purpose.
The Privacy Concerns and Risks
While the intentions behind Chat Control focus on enhancing security and protecting vulnerable groups, the proposed measures raise significant privacy concerns. Critics argue that implementing such surveillance could infringe on fundamental rights and set a dangerous precedent for mass monitoring of private communications.
Infringement on Privacy Rights
At the heart of the debate is the right to privacy. By scanning private messages, even with automated tools, the confidentiality of personal communications is compromised. Users may no longer feel secure sharing sensitive information, fearing that their messages could be intercepted or misinterpreted by algorithms.
Erosion of End-to-End Encryption
End-to-end encryption (E2EE) is a cornerstone of digital security, ensuring that only the sender and recipient can read the messages exchanged. Chat Control could necessitate the introduction of "backdoors" or weaken encryption protocols, making it easier for unauthorized parties to access private data. This not only affects individual privacy but also exposes communications to potential cyber threats.
Concerns from Privacy Advocates
Organizations like Signal and Tutanota, which offer encrypted messaging services, have voiced strong opposition to Chat Control. They warn that undermining encryption could have far-reaching consequences:
- Security Risks: Weakening encryption makes systems more vulnerable to hacking, espionage, and cybercrime.
- Global Implications: Changes in EU regulations could influence policies worldwide, leading to a broader erosion of digital privacy.
- Ineffectiveness Against Crime: Determined criminals might resort to other, less detectable means of communication, rendering the measures ineffective while still compromising the privacy of law-abiding citizens.
Potential for Government Overreach
There is a fear that Chat Control could lead to increased surveillance beyond its original scope. Once the infrastructure for scanning private messages is in place, it could be repurposed or expanded to monitor other types of content, stifling free expression and dissent.
Real-World Implications for Users
- False Positives: Automated scanning technologies are not infallible and could mistakenly flag innocent content, leading to unwarranted scrutiny or legal consequences for users.
- Chilling Effect: Knowing that messages could be monitored might discourage people from expressing themselves freely, impacting personal relationships and societal discourse.
- Data Misuse: Collected data could be vulnerable to leaks or misuse, compromising personal and sensitive information.
Legal and Ethical Concerns
Privacy advocates also highlight potential conflicts with existing laws and ethical standards:
- Violation of Fundamental Rights: The European Convention on Human Rights and other international agreements protect the right to privacy and freedom of expression.
- Questionable Effectiveness: The ethical justification for such invasive measures is challenged if they do not significantly improve safety or if they disproportionately impact innocent users.
Opposition from Member States and Organizations
Countries like Germany and organizations such as the European Digital Rights (EDRi) have expressed opposition to Chat Control. They emphasize the need to protect digital privacy and caution against hasty legislation that could have unintended consequences.
The Technical Debate: Encryption and Backdoors
The discussion around Chat Control inevitably leads to a complex technical debate centered on encryption and the potential introduction of backdoors into secure communication systems. Understanding these concepts is crucial to grasping the full implications of the proposed measures.
What Is End-to-End Encryption (E2EE)?
End-to-end encryption is a method of secure communication that prevents third parties from accessing data while it's transferred from one end system to another. In simpler terms, only the sender and the recipient can read the messages. Even the service providers operating the messaging platforms cannot decrypt the content.
- Security Assurance: E2EE ensures that sensitive information—be it personal messages, financial details, or confidential business communications—remains private.
- Widespread Use: Popular messaging apps like Signal, Session, SimpleX, Veilid, Protonmail and Tutanota (among others) rely on E2EE to protect user data.
How Chat Control Affects Encryption
Implementing Chat Control as proposed would require messaging services to scan the content of messages for illegal material. To do this on encrypted platforms, providers might have to:
- Introduce Backdoors: Create a means for third parties (including the service provider or authorities) to access encrypted messages.
- Client-Side Scanning: Install software on users' devices that scans messages before they are encrypted and sent, effectively bypassing E2EE.
The Risks of Weakening Encryption
1. Compromised Security for All Users
Introducing backdoors or client-side scanning tools can create vulnerabilities:
- Exploitable Gaps: If a backdoor exists, malicious actors might find and exploit it, leading to data breaches.
- Universal Impact: Weakening encryption doesn't just affect targeted individuals; it potentially exposes all users to increased risk.
2. Undermining Trust in Digital Services
- User Confidence: Knowing that private communications could be accessed might deter people from using digital services or push them toward unregulated platforms.
- Business Implications: Companies relying on secure communications might face increased risks, affecting economic activities.
3. Ineffectiveness Against Skilled Adversaries
- Alternative Methods: Criminals might shift to other encrypted channels or develop new ways to avoid detection.
- False Sense of Security: Weakening encryption could give the impression of increased safety while adversaries adapt and continue their activities undetected.
Signal’s Response and Stance
Signal, a leading encrypted messaging service, has been vocal in its opposition to the EU's proposals:
- Refusal to Weaken Encryption: Signal's CEO Meredith Whittaker has stated that the company would rather cease operations in the EU than compromise its encryption standards.
- Advocacy for Privacy: Signal emphasizes that strong encryption is essential for protecting human rights and freedoms in the digital age.
Understanding Backdoors
A "backdoor" in encryption is an intentional weakness inserted into a system to allow authorized access to encrypted data. While intended for legitimate use by authorities, backdoors pose several problems:
- Security Vulnerabilities: They can be discovered and exploited by unauthorized parties, including hackers and foreign governments.
- Ethical Concerns: The existence of backdoors raises questions about consent and the extent to which governments should be able to access private communications.
The Slippery Slope Argument
Privacy advocates warn that introducing backdoors or mandatory scanning sets a precedent:
- Expanded Surveillance: Once in place, these measures could be extended to monitor other types of content beyond the original scope.
- Erosion of Rights: Gradual acceptance of surveillance can lead to a significant reduction in personal freedoms over time.
Potential Technological Alternatives
Some suggest that it's possible to fight illegal content without undermining encryption:
- Metadata Analysis: Focusing on patterns of communication rather than content.
- Enhanced Reporting Mechanisms: Encouraging users to report illegal content voluntarily.
- Investing in Law Enforcement Capabilities: Strengthening traditional investigative methods without compromising digital security.
The technical community largely agrees that weakening encryption is not the solution:
- Consensus on Security: Strong encryption is essential for the safety and privacy of all internet users.
- Call for Dialogue: Technologists and privacy experts advocate for collaborative approaches that address security concerns without sacrificing fundamental rights.
Global Reactions and the Debate in Europe
The proposal for Chat Control has ignited a heated debate across Europe and beyond, with various stakeholders weighing in on the potential implications for privacy, security, and fundamental rights. The reactions are mixed, reflecting differing national perspectives, political priorities, and societal values.
Support for Chat Control
Some EU member states and officials support the initiative, emphasizing the need for robust measures to combat online crime and protect citizens, especially children. They argue that:
- Enhanced Security: Mandatory scanning can help law enforcement agencies detect and prevent serious crimes.
- Responsibility of Service Providers: Companies offering communication services should play an active role in preventing their platforms from being used for illegal activities.
- Public Safety Priorities: The protection of vulnerable populations justifies the implementation of such measures, even if it means compromising some aspects of privacy.
Opposition within the EU
Several countries and organizations have voiced strong opposition to Chat Control, citing concerns over privacy rights and the potential for government overreach.
Germany
- Stance: Germany has been one of the most vocal opponents of the proposed measures.
- Reasons:
- Constitutional Concerns: The German government argues that Chat Control could violate constitutional protections of privacy and confidentiality of communications.
- Security Risks: Weakening encryption is seen as a threat to cybersecurity.
- Legal Challenges: Potential conflicts with national laws protecting personal data and communication secrecy.
Netherlands
- Recent Developments: The Dutch government decided against supporting Chat Control, emphasizing the importance of encryption for security and privacy.
- Arguments:
- Effectiveness Doubts: Skepticism about the actual effectiveness of the measures in combating crime.
- Negative Impact on Privacy: Concerns about mass surveillance and the infringement of citizens' rights.
Table reference: Patrick Breyer - Chat Control in 23 September 2024
Privacy Advocacy Groups
European Digital Rights (EDRi)
- Role: A network of civil and human rights organizations working to defend rights and freedoms in the digital environment.
- Position:
- Strong Opposition: EDRi argues that Chat Control is incompatible with fundamental rights.
- Awareness Campaigns: Engaging in public campaigns to inform citizens about the potential risks.
- Policy Engagement: Lobbying policymakers to consider alternative approaches that respect privacy.
Politicians and Activists
Patrick Breyer
- Background: A Member of the European Parliament (MEP) from Germany, representing the Pirate Party.
- Actions:
- Advocacy: Actively campaigning against Chat Control through speeches, articles, and legislative efforts.
- Public Outreach: Using social media and public events to raise awareness.
- Legal Expertise: Highlighting the legal inconsistencies and potential violations of EU law.
Global Reactions
International Organizations
- Human Rights Watch and Amnesty International: These organizations have expressed concerns about the implications for human rights, urging the EU to reconsider.
Technology Companies
- Global Tech Firms: Companies like Apple and Microsoft are monitoring the situation, as EU regulations could affect their operations and user trust.
- Industry Associations: Groups representing tech companies have issued statements highlighting the risks to innovation and competitiveness.
The Broader Debate
The controversy over Chat Control reflects a broader struggle between security interests and privacy rights in the digital age. Key points in the debate include:
- Legal Precedents: How the EU's decision might influence laws and regulations in other countries.
- Digital Sovereignty: The desire of nations to control digital spaces within their borders.
- Civil Liberties: The importance of protecting freedoms in the face of technological advancements.
Public Opinion
- Diverse Views: Surveys and public forums show a range of opinions, with some citizens prioritizing security and others valuing privacy above all.
- Awareness Levels: Many people are still unaware of the potential changes, highlighting the need for public education on the issue.
The EU is at a crossroads, facing the challenge of addressing legitimate security concerns without undermining the fundamental rights that are central to its values. The outcome of this debate will have significant implications for the future of digital privacy and the balance between security and freedom in society.
Possible Consequences for Messaging Services
The implementation of Chat Control could have significant implications for messaging services operating within the European Union. Both large platforms and smaller providers might need to adapt their technologies and policies to comply with the new regulations, potentially altering the landscape of digital communication.
Impact on Encrypted Messaging Services
Signal and Similar Platforms
-
Compliance Challenges: Encrypted messaging services like Signal rely on end-to-end encryption to secure user communications. Complying with Chat Control could force them to weaken their encryption protocols or implement client-side scanning, conflicting with their core privacy principles.
-
Operational Decisions: Some platforms may choose to limit their services in the EU or cease operations altogether rather than compromise on encryption. Signal, for instance, has indicated that it would prefer to withdraw from European markets than undermine its security features.
Potential Blocking or Limiting of Services
-
Regulatory Enforcement: Messaging services that do not comply with Chat Control regulations could face fines, legal action, or even be blocked within the EU.
-
Access Restrictions: Users in Europe might find certain services unavailable or limited in functionality if providers decide not to meet the regulatory requirements.
Effects on Smaller Providers
-
Resource Constraints: Smaller messaging services and startups may lack the resources to implement the required scanning technologies, leading to increased operational costs or forcing them out of the market.
-
Innovation Stifling: The added regulatory burden could deter new entrants, reducing competition and innovation in the messaging service sector.
User Experience and Trust
-
Privacy Concerns: Users may lose trust in messaging platforms if they know their communications are subject to scanning, leading to a decline in user engagement.
-
Migration to Unregulated Platforms: There is a risk that users might shift to less secure or unregulated services, including those operated outside the EU or on the dark web, potentially exposing them to greater risks.
Technical and Security Implications
-
Increased Vulnerabilities: Modifying encryption protocols to comply with Chat Control could introduce security flaws, making platforms more susceptible to hacking and data breaches.
-
Global Security Risks: Changes made to accommodate EU regulations might affect the global user base of these services, extending security risks beyond European borders.
Impact on Businesses and Professional Communications
-
Confidentiality Issues: Businesses that rely on secure messaging for sensitive communications may face challenges in ensuring confidentiality, affecting sectors like finance, healthcare, and legal services.
-
Compliance Complexity: Companies operating internationally will need to navigate a complex landscape of differing regulations, increasing administrative burdens.
Economic Consequences
-
Market Fragmentation: Divergent regulations could lead to a fragmented market, with different versions of services for different regions.
-
Loss of Revenue: Messaging services might experience reduced revenue due to decreased user trust and engagement or the costs associated with compliance.
Responses from Service Providers
-
Legal Challenges: Companies might pursue legal action against the regulations, citing conflicts with privacy laws and user rights.
-
Policy Advocacy: Service providers may increase lobbying efforts to influence policy decisions and promote alternatives to Chat Control.
Possible Adaptations
-
Technological Innovation: Some providers might invest in developing new technologies that can detect illegal content without compromising encryption, though the feasibility remains uncertain.
-
Transparency Measures: To maintain user trust, companies might enhance transparency about how data is handled and what measures are in place to protect privacy.
The potential consequences of Chat Control for messaging services are profound, affecting not only the companies that provide these services but also the users who rely on them daily. The balance between complying with legal requirements and maintaining user privacy and security presents a significant challenge that could reshape the digital communication landscape.
What Happens Next? The Future of Chat Control
The future of Chat Control remains uncertain as the debate continues among EU member states, policymakers, technology companies, and civil society organizations. Several factors will influence the outcome of this contentious proposal, each carrying significant implications for digital privacy, security, and the regulatory environment within the European Union.
Current Status of Legislation
-
Ongoing Negotiations: The proposed Chat Control measures are still under discussion within the European Parliament and the Council of the European Union. Amendments and revisions are being considered in response to the feedback from various stakeholders.
-
Timeline: While there is no fixed date for the final decision, the EU aims to reach a consensus to implement effective measures against online crime without undue delay.
Key Influencing Factors
1. Legal Challenges and Compliance with EU Law
-
Fundamental Rights Assessment: The proposals must be evaluated against the Charter of Fundamental Rights of the European Union, ensuring that any measures comply with rights to privacy, data protection, and freedom of expression.
-
Court Scrutiny: Potential legal challenges could arise, leading to scrutiny by the European Court of Justice (ECJ), which may impact the feasibility and legality of Chat Control.
2. Technological Feasibility
-
Development of Privacy-Preserving Technologies: Research into methods that can detect illegal content without compromising encryption is ongoing. Advances in this area could provide alternative solutions acceptable to both privacy advocates and security agencies.
-
Implementation Challenges: The practical aspects of deploying scanning technologies across various platforms and services remain complex, and technical hurdles could delay or alter the proposed measures.
3. Political Dynamics
-
Member State Positions: The differing stances of EU countries, such as Germany's opposition, play a significant role in shaping the final outcome. Consensus among member states is crucial for adopting EU-wide regulations.
-
Public Opinion and Advocacy: Growing awareness and activism around digital privacy can influence policymakers. Public campaigns and lobbying efforts may sway decisions in favor of stronger privacy protections.
4. Industry Responses
-
Negotiations with Service Providers: Ongoing dialogues between EU authorities and technology companies may lead to compromises or collaborative efforts to address concerns without fully implementing Chat Control as initially proposed.
-
Potential for Self-Regulation: Messaging services might propose self-regulatory measures to combat illegal content, aiming to demonstrate effectiveness without the need for mandatory scanning.
Possible Scenarios
Optimistic Outcome:
- Balanced Regulation: A revised proposal emerges that effectively addresses security concerns while upholding strong encryption and privacy rights, possibly through innovative technologies or targeted measures with robust oversight.
Pessimistic Outcome:
- Adoption of Strict Measures: Chat Control is implemented as initially proposed, leading to weakened encryption, reduced privacy, and potential withdrawal of services like Signal from the EU market.
Middle Ground:
- Incremental Implementation: Partial measures are adopted, focusing on voluntary cooperation with service providers and emphasizing transparency and user consent, with ongoing evaluations to assess effectiveness and impact.
How to Stay Informed and Protect Your Privacy
-
Follow Reputable Sources: Keep up with news from reliable outlets, official EU communications, and statements from privacy organizations to stay informed about developments.
-
Engage in the Dialogue: Participate in public consultations, sign petitions, or contact representatives to express your views on Chat Control and digital privacy.
-
Utilize Secure Practices: Regardless of legislative outcomes, adopting good digital hygiene—such as using strong passwords and being cautious with personal information—can enhance your online security.
The Global Perspective
-
International Implications: The EU's decision may influence global policies on encryption and surveillance, setting precedents that other countries might follow or react against.
-
Collaboration Opportunities: International cooperation on developing solutions that protect both security and privacy could emerge, fostering a more unified approach to addressing online threats.
Looking Ahead
The future of Chat Control is a critical issue that underscores the challenges of governing in the digital age. Balancing the need for security with the protection of fundamental rights is a complex task that requires careful consideration, open dialogue, and collaboration among all stakeholders.
As the situation evolves, staying informed and engaged is essential. The decisions made in the coming months will shape the digital landscape for years to come, affecting how we communicate, conduct business, and exercise our rights in an increasingly connected world.
Conclusion
The debate over Chat Control highlights a fundamental challenge in our increasingly digital world: how to protect society from genuine threats without eroding the very rights and freedoms that define it. While the intention to safeguard children and prevent crime is undeniably important, the means of achieving this through intrusive surveillance measures raise critical concerns.
Privacy is not just a personal preference but a cornerstone of democratic societies. End-to-end encryption has become an essential tool for ensuring that our personal conversations, professional communications, and sensitive data remain secure from unwanted intrusion. Weakening these protections could expose individuals and organizations to risks that far outweigh the proposed benefits.
The potential consequences of implementing Chat Control are far-reaching:
- Erosion of Trust: Users may lose confidence in digital platforms, impacting how we communicate and conduct business online.
- Security Vulnerabilities: Introducing backdoors or weakening encryption can make systems more susceptible to cyberattacks.
- Stifling Innovation: Regulatory burdens may hinder technological advancement and competitiveness in the tech industry.
- Global Implications: The EU's decisions could set precedents that influence digital policies worldwide, for better or worse.
As citizens, it's crucial to stay informed about these developments. Engage in conversations, reach out to your representatives, and advocate for solutions that respect both security needs and fundamental rights. Technology and policy can evolve together to address challenges without compromising core values.
The future of Chat Control is not yet decided, and public input can make a significant difference. By promoting open dialogue, supporting privacy-preserving innovations, and emphasizing the importance of human rights in legislation, we can work towards a digital landscape that is both safe and free.
In a world where digital communication is integral to daily life, striking the right balance between security and privacy is more important than ever. The choices made today will shape the digital environment for generations to come, determining not just how we communicate, but how we live and interact in an interconnected world.
Thank you for reading this article. We hope it has provided you with a clear understanding of Chat Control and its potential impact on your privacy and digital rights. Stay informed, stay engaged, and let's work together towards a secure and open digital future.
Read more:
- https://www.patrick-breyer.de/en/posts/chat-control/
- https://www.patrick-breyer.de/en/new-eu-push-for-chat-control-will-messenger-services-be-blocked-in-europe/
- https://edri.org/our-work/dutch-decision-puts-brakes-on-chat-control/
- https://signal.org/blog/pdfs/ndss-keynote.pdf
- https://tuta.com/blog/germany-stop-chat-control
- https://cointelegraph.com/news/signal-president-slams-revised-eu-encryption-proposal
- https://mullvad.net/en/why-privacy-matters
-
@ dc4cd086:cee77c06
2024-10-18 04:08:33Have you ever wanted to learn from lengthy educational videos but found it challenging to navigate through hours of content? Our new tool addresses this problem by transforming long-form video lectures into easily digestible, searchable content.
Key Features:
Video Processing:
- Automatically downloads YouTube videos, transcripts, and chapter information
- Splits transcripts into sections based on video chapters
Content Summarization:
- Utilizes language models to transform spoken content into clear, readable text
- Formats output in AsciiDoc for improved readability and navigation
- Highlights key terms and concepts with [[term]] notation for potential cross-referencing
Diagram Extraction:
- Analyzes video entropy to identify static diagram/slide sections
- Provides a user-friendly GUI for manual selection of relevant time ranges
- Allows users to pick representative frames from selected ranges
Going Forward:
Currently undergoing a rewrite to improve organization and functionality, but you are welcome to try the current version, though it might not work on every machine. Will support multiple open and closed language models for user choice Free and open-source, allowing for personal customization and integration with various knowledge bases. Just because we might not have it on our official Alexandria knowledge base, you are still welcome to use it on you own personal or community knowledge bases! We want to help find connections between ideas that exist across relays, allowing individuals and groups to mix and match knowledge bases between each other, allowing for any degree of openness you care.
While designed with #Alexandria users in mind, it's available for anyone to use and adapt to their own learning needs.
Screenshots
Frame Selection
This is a screenshot of the frame selection interface. You'll see a signal that represents frame entropy over time. The vertical lines indicate the start and end of a chapter. Within these chapters you can select the frames by clicking and dragging the mouse over the desired range where you think diagram is in that chapter. At the bottom is an option that tells the program to select a specific number of frames from that selection.
Diagram Extraction
This is a screenshot of the diagram extraction interface. For every selection you've made, there will be a set of frames that you can choose from. You can select and deselect as many frames as you'd like to save.
Links
- repo: https://github.com/limina1/video_article_converter
- Nostr Apps 101: https://www.youtube.com/watch?v=Flxa_jkErqE
Output
And now, we have a demonstration of the final result of this tool, with some quick cleaning up. The video we will be using this tool on is titled Nostr Apps 101 by nostr:npub1nxy4qpqnld6kmpphjykvx2lqwvxmuxluddwjamm4nc29ds3elyzsm5avr7 during Nostrasia. The following thread is an analog to the modular articles we are constructing for Alexandria, and I hope it conveys the functionality we want to create in the knowledge space. Note, this tool is the first step! You could use a different prompt that is most appropriate for the specific context of the transcript you are working with, but you can also manually clean up any discrepancies that don't portray the video accurately.
nostr:nevent1qvzqqqqqqypzp5r5hd579v2sszvvzfel677c8dxgxm3skl773sujlsuft64c44ncqy2hwumn8ghj7un9d3shjtnyv9kh2uewd9hj7qgwwaehxw309ahx7uewd3hkctcpzemhxue69uhhyetvv9ujumt0wd68ytnsw43z7qghwaehxw309aex2mrp0yhxummnw3ezucnpdejz7qgewaehxw309aex2mrp0yh8xmn0wf6zuum0vd5kzmp0qqsxunmjy20mvlq37vnrcshkf6sdrtkfjtjz3anuetmcuv8jswhezgc7hglpn
Or view on Coracle nostr:nevent1qqsxunmjy20mvlq37vnrcshkf6sdrtkfjtjz3anuetmcuv8jswhezgcppemhxue69uhkummn9ekx7mp0qgsdqa9md83tz5yqnrqjw07hhkpmfjpkuv9hlh5v8yhu8z274w9dv7qnnq0s3
-
@ 220522c2:61e18cb4
2024-10-02 13:06:00It’s still very much in alpha so sync doesn’t work yet. -
@ a95c6243:d345522c
2024-12-13 19:30:32Das Betriebsklima ist das einzige Klima, \ das du selbst bestimmen kannst. \ Anonym
Eine Strategie zur Anpassung an den Klimawandel hat das deutsche Bundeskabinett diese Woche beschlossen. Da «Wetterextreme wie die immer häufiger auftretenden Hitzewellen und Starkregenereignisse» oft desaströse Auswirkungen auf Mensch und Umwelt hätten, werde eine Anpassung an die Folgen des Klimawandels immer wichtiger. «Klimaanpassungsstrategie» nennt die Regierung das.
Für die «Vorsorge vor Klimafolgen» habe man nun erstmals klare Ziele und messbare Kennzahlen festgelegt. So sei der Erfolg überprüfbar, und das solle zu einer schnelleren Bewältigung der Folgen führen. Dass sich hinter dem Begriff Klimafolgen nicht Folgen des Klimas, sondern wohl «Folgen der globalen Erwärmung» verbergen, erklärt den Interessierten die Wikipedia. Dabei ist das mit der Erwärmung ja bekanntermaßen so eine Sache.
Die Zunahme schwerer Unwetterereignisse habe gezeigt, so das Ministerium, wie wichtig eine frühzeitige und effektive Warnung der Bevölkerung sei. Daher solle es eine deutliche Anhebung der Nutzerzahlen der sogenannten Nina-Warn-App geben.
Die ARD spurt wie gewohnt und setzt die Botschaft zielsicher um. Der Artikel beginnt folgendermaßen:
«Die Flut im Ahrtal war ein Schock für das ganze Land. Um künftig besser gegen Extremwetter gewappnet zu sein, hat die Bundesregierung eine neue Strategie zur Klimaanpassung beschlossen. Die Warn-App Nina spielt eine zentrale Rolle. Der Bund will die Menschen in Deutschland besser vor Extremwetter-Ereignissen warnen und dafür die Reichweite der Warn-App Nina deutlich erhöhen.»
Die Kommunen würden bei ihren «Klimaanpassungsmaßnahmen» vom Zentrum KlimaAnpassung unterstützt, schreibt das Umweltministerium. Mit dessen Aufbau wurden das Deutsche Institut für Urbanistik gGmbH, welches sich stark für Smart City-Projekte engagiert, und die Adelphi Consult GmbH beauftragt.
Adelphi beschreibt sich selbst als «Europas führender Think-and-Do-Tank und eine unabhängige Beratung für Klima, Umwelt und Entwicklung». Sie seien «global vernetzte Strateg*innen und weltverbessernde Berater*innen» und als «Vorreiter der sozial-ökologischen Transformation» sei man mit dem Deutschen Nachhaltigkeitspreis ausgezeichnet worden, welcher sich an den Zielen der Agenda 2030 orientiere.
Über die Warn-App mit dem niedlichen Namen Nina, die möglichst jeder auf seinem Smartphone installieren soll, informiert das Bundesamt für Bevölkerungsschutz und Katastrophenhilfe (BBK). Gewarnt wird nicht nur vor Extrem-Wetterereignissen, sondern zum Beispiel auch vor Waffengewalt und Angriffen, Strom- und anderen Versorgungsausfällen oder Krankheitserregern. Wenn man die Kategorie Gefahreninformation wählt, erhält man eine Dosis von ungefähr zwei Benachrichtigungen pro Woche.
Beim BBK erfahren wir auch einiges über die empfohlenen Systemeinstellungen für Nina. Der Benutzer möge zum Beispiel den Zugriff auf die Standortdaten «immer zulassen», und zwar mit aktivierter Funktion «genauen Standort verwenden». Die Datennutzung solle unbeschränkt sein, auch im Hintergrund. Außerdem sei die uneingeschränkte Akkunutzung zu aktivieren, der Energiesparmodus auszuschalten und das Stoppen der App-Aktivität bei Nichtnutzung zu unterbinden.
Dass man so dramatische Ereignisse wie damals im Ahrtal auch anders bewerten kann als Regierungen und Systemmedien, hat meine Kollegin Wiltrud Schwetje anhand der Tragödie im spanischen Valencia gezeigt. Das Stichwort «Agenda 2030» taucht dabei in einem Kontext auf, der wenig mit Nachhaltigkeitspreisen zu tun hat.
Dieser Beitrag ist zuerst auf Transition News erschienen.
-
@ a95c6243:d345522c
2024-12-06 18:21:15Die Ungerechtigkeit ist uns nur in dem Falle angenehm,\ dass wir Vorteile aus ihr ziehen;\ in jedem andern hegt man den Wunsch,\ dass der Unschuldige in Schutz genommen werde.\ Jean-Jacques Rousseau
Politiker beteuern jederzeit, nur das Beste für die Bevölkerung zu wollen – nicht von ihr. Auch die zahlreichen unsäglichen «Corona-Maßnahmen» waren angeblich zu unserem Schutz notwendig, vor allem wegen der «besonders vulnerablen Personen». Daher mussten alle möglichen Restriktionen zwangsweise und unter Umgehung der Parlamente verordnet werden.
Inzwischen hat sich immer deutlicher herausgestellt, dass viele jener «Schutzmaßnahmen» den gegenteiligen Effekt hatten, sie haben den Menschen und den Gesellschaften enorm geschadet. Nicht nur haben die experimentellen Geninjektionen – wie erwartet – massive Nebenwirkungen, sondern Maskentragen schadet der Psyche und der Entwicklung (nicht nur unserer Kinder) und «Lockdowns und Zensur haben Menschen getötet».
Eine der wichtigsten Waffen unserer «Beschützer» ist die Spaltung der Gesellschaft. Die tiefen Gräben, die Politiker, Lobbyisten und Leitmedien praktisch weltweit ausgehoben haben, funktionieren leider nahezu in Perfektion. Von ihren persönlichen Erfahrungen als Kritikerin der Maßnahmen berichtete kürzlich eine Schweizerin im Interview mit Transition News. Sie sei schwer enttäuscht und verspüre bis heute eine Hemmschwelle und ein seltsames Unwohlsein im Umgang mit «Geimpften».
Menschen, die aufrichtig andere schützen wollten, werden von einer eindeutig politischen Justiz verfolgt, verhaftet und angeklagt. Dazu zählen viele Ärzte, darunter Heinrich Habig, Bianca Witzschel und Walter Weber. Über den aktuell laufenden Prozess gegen Dr. Weber hat Transition News mehrfach berichtet (z.B. hier und hier). Auch der Selbstschutz durch Verweigerung der Zwangs-Covid-«Impfung» bewahrt nicht vor dem Knast, wie Bundeswehrsoldaten wie Alexander Bittner erfahren mussten.
Die eigentlich Kriminellen schützen sich derweil erfolgreich selber, nämlich vor der Verantwortung. Die «Impf»-Kampagne war «das größte Verbrechen gegen die Menschheit». Trotzdem stellt man sich in den USA gerade die Frage, ob der scheidende Präsident Joe Biden nach seinem Sohn Hunter möglicherweise auch Anthony Fauci begnadigen wird – in diesem Fall sogar präventiv. Gibt es überhaupt noch einen Rest Glaubwürdigkeit, den Biden verspielen könnte?
Der Gedanke, den ehemaligen wissenschaftlichen Chefberater des US-Präsidenten und Direktor des National Institute of Allergy and Infectious Diseases (NIAID) vorsorglich mit einem Schutzschild zu versehen, dürfte mit der vergangenen Präsidentschaftswahl zu tun haben. Gleich mehrere Personalentscheidungen des designierten Präsidenten Donald Trump lassen Leute wie Fauci erneut in den Fokus rücken.
Das Buch «The Real Anthony Fauci» des nominierten US-Gesundheitsministers Robert F. Kennedy Jr. erschien 2021 und dreht sich um die Machenschaften der Pharma-Lobby in der öffentlichen Gesundheit. Das Vorwort zur rumänischen Ausgabe des Buches schrieb übrigens Călin Georgescu, der Überraschungssieger der ersten Wahlrunde der aktuellen Präsidentschaftswahlen in Rumänien. Vielleicht erklärt diese Verbindung einen Teil der Panik im Wertewesten.
In Rumänien selber gab es gerade einen Paukenschlag: Das bisherige Ergebnis wurde heute durch das Verfassungsgericht annuliert und die für Sonntag angesetzte Stichwahl kurzfristig abgesagt – wegen angeblicher «aggressiver russischer Einmischung». Thomas Oysmüller merkt dazu an, damit sei jetzt in der EU das Tabu gebrochen, Wahlen zu verbieten, bevor sie etwas ändern können.
Unsere Empörung angesichts der Historie von Maßnahmen, die die Falschen beschützen und für die meisten von Nachteil sind, müsste enorm sein. Die Frage ist, was wir damit machen. Wir sollten nach vorne schauen und unsere Energie clever einsetzen. Abgesehen von der Umgehung von jeglichem «Schutz vor Desinformation und Hassrede» (sprich: Zensur) wird es unsere wichtigste Aufgabe sein, Gräben zu überwinden.
Dieser Beitrag ist zuerst auf Transition News erschienen.
-
@ 4ba8e86d:89d32de4
2024-10-07 13:37:38O que é Cwtch? Cwtch (/kʊtʃ/ - uma palavra galesa que pode ser traduzida aproximadamente como “um abraço que cria um lugar seguro”) é um protocolo de mensagens multipartidário descentralizado, que preserva a privacidade, que pode ser usado para construir aplicativos resistentes a metadados.
Como posso pronunciar Cwtch? Como "kutch", para rimar com "butch".
Descentralizado e Aberto : Não existe “serviço Cwtch” ou “rede Cwtch”. Os participantes do Cwtch podem hospedar seus próprios espaços seguros ou emprestar sua infraestrutura para outras pessoas que buscam um espaço seguro. O protocolo Cwtch é aberto e qualquer pessoa é livre para criar bots, serviços e interfaces de usuário e integrar e interagir com o Cwtch.
Preservação de privacidade : toda a comunicação no Cwtch é criptografada de ponta a ponta e ocorre nos serviços cebola Tor v3.
Resistente a metadados : O Cwtch foi projetado de forma que nenhuma informação seja trocada ou disponibilizada a ninguém sem seu consentimento explícito, incluindo mensagens durante a transmissão e metadados de protocolo
Uma breve história do bate-papo resistente a metadados Nos últimos anos, a conscientização pública sobre a necessidade e os benefícios das soluções criptografadas de ponta a ponta aumentou com aplicativos como Signal , Whatsapp e Wire. que agora fornecem aos usuários comunicações seguras.
No entanto, essas ferramentas exigem vários níveis de exposição de metadados para funcionar, e muitos desses metadados podem ser usados para obter detalhes sobre como e por que uma pessoa está usando uma ferramenta para se comunicar.
Uma ferramenta que buscou reduzir metadados é o Ricochet lançado pela primeira vez em 2014. Ricochet usou os serviços cebola Tor v2 para fornecer comunicação criptografada segura de ponta a ponta e para proteger os metadados das comunicações.
Não havia servidores centralizados que auxiliassem no roteamento das conversas do Ricochet. Ninguém além das partes envolvidas em uma conversa poderia saber que tal conversa está ocorrendo.
Ricochet tinha limitações; não havia suporte para vários dispositivos, nem existe um mecanismo para suportar a comunicação em grupo ou para um usuário enviar mensagens enquanto um contato está offline.
Isto tornou a adoção do Ricochet uma proposta difícil; mesmo aqueles em ambientes que seriam melhor atendidos pela resistência aos metadados, sem saber que ela existe.
Além disso, qualquer solução para comunicação descentralizada e resistente a metadados enfrenta problemas fundamentais quando se trata de eficiência, privacidade e segurança de grupo conforme definido pelo consenso e consistência da transcrição.
Alternativas modernas ao Ricochet incluem Briar , Zbay e Ricochet Refresh - cada ferramenta procura otimizar para um conjunto diferente de compensações, por exemplo, Briar procura permitir que as pessoas se comuniquem mesmo quando a infraestrutura de rede subjacente está inoperante, ao mesmo tempo que fornece resistência à vigilância de metadados.
O projeto Cwtch começou em 2017 como um protocolo de extensão para Ricochet, fornecendo conversas em grupo por meio de servidores não confiáveis, com o objetivo de permitir aplicativos descentralizados e resistentes a metadados como listas compartilhadas e quadros de avisos.
Uma versão alfa do Cwtch foi lançada em fevereiro de 2019 e, desde então, a equipe do Cwtch dirigida pela OPEN PRIVACY RESEARCH SOCIETY conduziu pesquisa e desenvolvimento em cwtch e nos protocolos, bibliotecas e espaços de problemas subjacentes.
Modelo de Risco.
Sabe-se que os metadados de comunicações são explorados por vários adversários para minar a segurança dos sistemas, para rastrear vítimas e para realizar análises de redes sociais em grande escala para alimentar a vigilância em massa. As ferramentas resistentes a metadados estão em sua infância e faltam pesquisas sobre a construção e a experiência do usuário de tais ferramentas.
https://nostrcheck.me/media/public/nostrcheck.me_9475702740746681051707662826.webp
O Cwtch foi originalmente concebido como uma extensão do protocolo Ricochet resistente a metadados para suportar comunicações assíncronas de grupos multiponto por meio do uso de infraestrutura anônima, descartável e não confiável.
Desde então, o Cwtch evoluiu para um protocolo próprio. Esta seção descreverá os vários riscos conhecidos que o Cwtch tenta mitigar e será fortemente referenciado no restante do documento ao discutir os vários subcomponentes da Arquitetura Cwtch.
Modelo de ameaça.
É importante identificar e compreender que os metadados são omnipresentes nos protocolos de comunicação; é de facto necessário que tais protocolos funcionem de forma eficiente e em escala. No entanto, as informações que são úteis para facilitar peers e servidores também são altamente relevantes para adversários que desejam explorar tais informações.
Para a definição do nosso problema, assumiremos que o conteúdo de uma comunicação é criptografado de tal forma que um adversário é praticamente incapaz de quebrá-lo veja tapir e cwtch para detalhes sobre a criptografia que usamos, e como tal nos concentraremos em o contexto para os metadados de comunicação.
Procuramos proteger os seguintes contextos de comunicação:
• Quem está envolvido em uma comunicação? Pode ser possível identificar pessoas ou simplesmente identificadores de dispositivos ou redes. Por exemplo, “esta comunicação envolve Alice, uma jornalista, e Bob, um funcionário público”.
• Onde estão os participantes da conversa? Por exemplo, “durante esta comunicação, Alice estava na França e Bob estava no Canadá”.
• Quando ocorreu uma conversa? O momento e a duração da comunicação podem revelar muito sobre a natureza de uma chamada, por exemplo, “Bob, um funcionário público, conversou com Alice ao telefone por uma hora ontem à noite. Esta é a primeira vez que eles se comunicam.” *Como a conversa foi mediada? O fato de uma conversa ter ocorrido por meio de um e-mail criptografado ou não criptografado pode fornecer informações úteis. Por exemplo, “Alice enviou um e-mail criptografado para Bob ontem, enquanto eles normalmente enviam apenas e-mails de texto simples um para o outro”.
• Sobre o que é a conversa? Mesmo que o conteúdo da comunicação seja criptografado, às vezes é possível derivar um contexto provável de uma conversa sem saber exatamente o que é dito, por exemplo, “uma pessoa ligou para uma pizzaria na hora do jantar” ou “alguém ligou para um número conhecido de linha direta de suicídio na hora do jantar”. 3 horas da manhã."
Além das conversas individuais, também procuramos defender-nos contra ataques de correlação de contexto, através dos quais múltiplas conversas são analisadas para obter informações de nível superior:
• Relacionamentos: Descobrir relações sociais entre um par de entidades analisando a frequência e a duração de suas comunicações durante um período de tempo. Por exemplo, Carol e Eve ligam uma para a outra todos os dias durante várias horas seguidas.
• Cliques: Descobrir relações sociais entre um grupo de entidades que interagem entre si. Por exemplo, Alice, Bob e Eva se comunicam entre si.
• Grupos vagamente conectados e indivíduos-ponte: descobrir grupos que se comunicam entre si através de intermediários, analisando cadeias de comunicação (por exemplo, toda vez que Alice fala com Bob, ela fala com Carol quase imediatamente depois; Bob e Carol nunca se comunicam).
• Padrão de Vida: Descobrir quais comunicações são cíclicas e previsíveis. Por exemplo, Alice liga para Eve toda segunda-feira à noite por cerca de uma hora. Ataques Ativos
Ataques de deturpação.
O Cwtch não fornece registro global de nomes de exibição e, como tal, as pessoas que usam o Cwtch são mais vulneráveis a ataques baseados em declarações falsas, ou seja, pessoas que fingem ser outras pessoas:
O fluxo básico de um desses ataques é o seguinte, embora também existam outros fluxos:
•Alice tem um amigo chamado Bob e outro chamado Eve
• Eve descobre que Alice tem um amigo chamado Bob
• Eve cria milhares de novas contas para encontrar uma que tenha uma imagem/chave pública semelhante à de Bob (não será idêntica, mas pode enganar alguém por alguns minutos)
• Eve chama essa nova conta de "Eve New Account" e adiciona Alice como amiga.
• Eve então muda seu nome em "Eve New Account" para "Bob"
• Alice envia mensagens destinadas a "Bob" para a conta falsa de Bob de Eve Como os ataques de declarações falsas são inerentemente uma questão de confiança e verificação, a única maneira absoluta de evitá-los é os usuários validarem absolutamente a chave pública. Obviamente, isso não é o ideal e, em muitos casos, simplesmente não acontecerá .
Como tal, pretendemos fornecer algumas dicas de experiência do usuário na interface do usuário para orientar as pessoas na tomada de decisões sobre confiar em contas e/ou distinguir contas que possam estar tentando se representar como outros usuários.
Uma nota sobre ataques físicos A Cwtch não considera ataques que exijam acesso físico (ou equivalente) à máquina do usuário como praticamente defensáveis. No entanto, no interesse de uma boa engenharia de segurança, ao longo deste documento ainda nos referiremos a ataques ou condições que exigem tal privilégio e indicaremos onde quaisquer mitigações que implementámos falharão.
Um perfil Cwtch.
Os usuários podem criar um ou mais perfis Cwtch. Cada perfil gera um par de chaves ed25519 aleatório compatível com Tor.
Além do material criptográfico, um perfil também contém uma lista de Contatos (outras chaves públicas do perfil Cwtch + dados associados sobre esse perfil, como apelido e (opcionalmente) mensagens históricas), uma lista de Grupos (contendo o material criptográfico do grupo, além de outros dados associados, como apelido do grupo e mensagens históricas).
Conversões entre duas partes: ponto a ponto
https://nostrcheck.me/media/public/nostrcheck.me_2186338207587396891707662879.webp
Para que duas partes participem de uma conversa ponto a ponto, ambas devem estar on-line, mas apenas uma precisa estar acessível por meio do serviço Onion. Por uma questão de clareza, muitas vezes rotulamos uma parte como “ponto de entrada” (aquele que hospeda o serviço cebola) e a outra parte como “ponto de saída” (aquele que se conecta ao serviço cebola).
Após a conexão, ambas as partes adotam um protocolo de autenticação que:
• Afirma que cada parte tem acesso à chave privada associada à sua identidade pública.
• Gera uma chave de sessão efêmera usada para criptografar todas as comunicações futuras durante a sessão.
Esta troca (documentada com mais detalhes no protocolo de autenticação ) é negável offline , ou seja, é possível para qualquer parte falsificar transcrições desta troca de protocolo após o fato e, como tal - após o fato - é impossível provar definitivamente que a troca aconteceu de forma alguma.
Após o protocolo de autenticação, as duas partes podem trocar mensagens livremente.
Conversas em Grupo e Comunicação Ponto a Servidor
Ao iniciar uma conversa em grupo, é gerada uma chave aleatória para o grupo, conhecida como Group Key. Todas as comunicações do grupo são criptografadas usando esta chave. Além disso, o criador do grupo escolhe um servidor Cwtch para hospedar o grupo. Um convite é gerado, incluindo o Group Key, o servidor do grupo e a chave do grupo, para ser enviado aos potenciais membros.
Para enviar uma mensagem ao grupo, um perfil se conecta ao servidor do grupo e criptografa a mensagem usando a Group Key, gerando também uma assinatura sobre o Group ID, o servidor do grupo e a mensagem. Para receber mensagens do grupo, um perfil se conecta ao servidor e baixa as mensagens, tentando descriptografá-las usando a Group Key e verificando a assinatura.
Detalhamento do Ecossistema de Componentes
O Cwtch é composto por várias bibliotecas de componentes menores, cada uma desempenhando um papel específico. Algumas dessas bibliotecas incluem:
- abertoprivacidade/conectividade: Abstração de rede ACN, atualmente suportando apenas Tor.
- cwtch.im/tapir: Biblioteca para construção de aplicativos p2p em sistemas de comunicação anônimos.
- cwtch.im/cwtch: Biblioteca principal para implementação do protocolo/sistema Cwtch.
- cwtch.im/libcwtch-go: Fornece ligações C para Cwtch para uso em implementações de UI.
TAPIR: Uma Visão Detalhada
Projetado para substituir os antigos canais de ricochete baseados em protobuf, o Tapir fornece uma estrutura para a construção de aplicativos anônimos.
Está dividido em várias camadas:
• Identidade - Um par de chaves ed25519, necessário para estabelecer um serviço cebola Tor v3 e usado para manter uma identidade criptográfica consistente para um par.
• Conexões – O protocolo de rede bruto que conecta dois pares. Até agora, as conexões são definidas apenas através do Tor v3 Onion Services.
• Aplicativos - As diversas lógicas que permitem um determinado fluxo de informações em uma conexão. Os exemplos incluem transcrições criptográficas compartilhadas, autenticação, proteção contra spam e serviços baseados em tokens. Os aplicativos fornecem recursos que podem ser referenciados por outros aplicativos para determinar se um determinado peer tem a capacidade de usar um determinado aplicativo hospedado.
• Pilhas de aplicativos - Um mecanismo para conectar mais de um aplicativo, por exemplo, a autenticação depende de uma transcrição criptográfica compartilhada e o aplicativo peer cwtch principal é baseado no aplicativo de autenticação.
Identidade.
Um par de chaves ed25519, necessário para estabelecer um serviço cebola Tor v3 e usado para manter uma identidade criptográfica consistente para um peer.
InitializeIdentity - de um par de chaves conhecido e persistente:i,I
InitializeEphemeralIdentity - de um par de chaves aleatório: ie,Ie
Aplicativos de transcrição.
Inicializa uma transcrição criptográfica baseada em Merlin que pode ser usada como base de protocolos baseados em compromisso de nível superior
O aplicativo de transcrição entrará em pânico se um aplicativo tentar substituir uma transcrição existente por uma nova (aplicando a regra de que uma sessão é baseada em uma e apenas uma transcrição).
Merlin é uma construção de transcrição baseada em STROBE para provas de conhecimento zero. Ele automatiza a transformação Fiat-Shamir, para que, usando Merlin, protocolos não interativos possam ser implementados como se fossem interativos.
Isto é significativamente mais fácil e menos sujeito a erros do que realizar a transformação manualmente e, além disso, também fornece suporte natural para:
• protocolos multi-round com fases alternadas de commit e desafio;
• separação natural de domínios, garantindo que os desafios estejam vinculados às afirmações a serem provadas;
• enquadramento automático de mensagens, evitando codificação ambígua de dados de compromisso;
• e composição do protocolo, usando uma transcrição comum para vários protocolos.
Finalmente, o Merlin também fornece um gerador de números aleatórios baseado em transcrição como defesa profunda contra ataques de entropia ruim (como reutilização de nonce ou preconceito em muitas provas). Este RNG fornece aleatoriedade sintética derivada de toda a transcrição pública, bem como dos dados da testemunha do provador e uma entrada auxiliar de um RNG externo.
Conectividade Cwtch faz uso do Tor Onion Services (v3) para todas as comunicações entre nós.
Fornecemos o pacote openprivacy/connectivity para gerenciar o daemon Tor e configurar e desmontar serviços cebola através do Tor.
Criptografia e armazenamento de perfil.
Os perfis são armazenados localmente no disco e criptografados usando uma chave derivada de uma senha conhecida pelo usuário (via pbkdf2).
Observe que, uma vez criptografado e armazenado em disco, a única maneira de recuperar um perfil é recuperando a senha - como tal, não é possível fornecer uma lista completa de perfis aos quais um usuário pode ter acesso até inserir uma senha.
Perfis não criptografados e a senha padrão Para lidar com perfis "não criptografados" (ou seja, que não exigem senha para serem abertos), atualmente criamos um perfil com uma senha codificada de fato .
Isso não é o ideal, preferiríamos confiar no material de chave fornecido pelo sistema operacional, de modo que o perfil fosse vinculado a um dispositivo específico, mas esses recursos são atualmente uma colcha de retalhos - também notamos, ao criar um perfil não criptografado, pessoas que usam Cwtch estão explicitamente optando pelo risco de que alguém com acesso ao sistema de arquivos possa descriptografar seu perfil.
Vulnerabilidades Relacionadas a Imagens e Entrada de Dados
Imagens Maliciosas
O Cwtch enfrenta desafios na renderização de imagens, com o Flutter utilizando Skia, embora o código subjacente não seja totalmente seguro para a memória.
Realizamos testes de fuzzing nos componentes Cwtch e encontramos um bug de travamento causado por um arquivo GIF malformado, levando a falhas no kernel. Para mitigar isso, adotamos a política de sempre habilitar cacheWidth e/ou cacheHeight máximo para widgets de imagem.
Identificamos o risco de imagens maliciosas serem renderizadas de forma diferente em diferentes plataformas, como evidenciado por um bug no analisador PNG da Apple.
Riscos de Entrada de Dados
Um risco significativo é a interceptação de conteúdo ou metadados por meio de um Input Method Editor (IME) em dispositivos móveis. Mesmo aplicativos IME padrão podem expor dados por meio de sincronização na nuvem, tradução online ou dicionários pessoais.
Implementamos medidas de mitigação, como enableIMEPersonalizedLearning: false no Cwtch 1.2, mas a solução completa requer ações em nível de sistema operacional e é um desafio contínuo para a segurança móvel.
Servidor Cwtch.
O objetivo do protocolo Cwtch é permitir a comunicação em grupo através de infraestrutura não confiável .
Ao contrário dos esquemas baseados em retransmissão, onde os grupos atribuem um líder, um conjunto de líderes ou um servidor confiável de terceiros para garantir que cada membro do grupo possa enviar e receber mensagens em tempo hábil (mesmo que os membros estejam offline) - infraestrutura não confiável tem o objetivo de realizar essas propriedades sem a suposição de confiança.
O artigo original do Cwtch definia um conjunto de propriedades que se esperava que os servidores Cwtch fornecessem:
• O Cwtch Server pode ser usado por vários grupos ou apenas um.
• Um servidor Cwtch, sem a colaboração de um membro do grupo, nunca deve aprender a identidade dos participantes de um grupo.
• Um servidor Cwtch nunca deve aprender o conteúdo de qualquer comunicação.
• Um servidor Cwtch nunca deve ser capaz de distinguir mensagens como pertencentes a um grupo específico. Observamos aqui que essas propriedades são um superconjunto dos objetivos de design das estruturas de Recuperação de Informações Privadas.
Melhorias na Eficiência e Segurança
Eficiência do Protocolo
Atualmente, apenas um protocolo conhecido, o PIR ingênuo, atende às propriedades desejadas para garantir a privacidade na comunicação do grupo Cwtch. Este método tem um impacto direto na eficiência da largura de banda, especialmente para usuários em dispositivos móveis. Em resposta a isso, estamos ativamente desenvolvendo novos protocolos que permitem negociar garantias de privacidade e eficiência de maneiras diversas.
Os servidores, no momento desta escrita, permitem o download completo de todas as mensagens armazenadas, bem como uma solicitação para baixar mensagens específicas a partir de uma determinada mensagem. Quando os pares ingressam em um grupo em um novo servidor, eles baixam todas as mensagens do servidor inicialmente e, posteriormente, apenas as mensagens novas.
Mitigação de Análise de Metadados
Essa abordagem permite uma análise moderada de metadados, pois o servidor pode enviar novas mensagens para cada perfil suspeito exclusivo e usar essas assinaturas de mensagens exclusivas para rastrear sessões ao longo do tempo. Essa preocupação é mitigada por dois fatores:
- Os perfis podem atualizar suas conexões a qualquer momento, resultando em uma nova sessão do servidor.
- Os perfis podem ser "ressincronizados" de um servidor a qualquer momento, resultando em uma nova chamada para baixar todas as mensagens. Isso é comumente usado para buscar mensagens antigas de um grupo.
Embora essas medidas imponham limites ao que o servidor pode inferir, ainda não podemos garantir resistência total aos metadados. Para soluções futuras para esse problema, consulte Niwl.
Proteção contra Pares Maliciosos
Os servidores enfrentam o risco de spam gerado por pares, representando uma ameaça significativa à eficácia do sistema Cwtch. Embora tenhamos implementado um mecanismo de proteção contra spam no protótipo do Cwtch, exigindo que os pares realizem alguma prova de trabalho especificada pelo servidor, reconhecemos que essa não é uma solução robusta na presença de um adversário determinado com recursos significativos.
Pacotes de Chaves
Os servidores Cwtch se identificam por meio de pacotes de chaves assinados, contendo uma lista de chaves necessárias para garantir a segurança e resistência aos metadados na comunicação do grupo Cwtch. Esses pacotes de chaves geralmente incluem três chaves: uma chave pública do serviço Tor v3 Onion para o Token Board, uma chave pública do Tor v3 Onion Service para o Token Service e uma chave pública do Privacy Pass.
Para verificar os pacotes de chaves, os perfis que os importam do servidor utilizam o algoritmo trust-on-first-use (TOFU), verificando a assinatura anexada e a existência de todos os tipos de chave. Se o perfil já tiver importado o pacote de chaves do servidor anteriormente, todas as chaves são consideradas iguais.
Configuração prévia do aplicativo para ativar o Relé do Cwtch.
No Android, a hospedagem de servidor não está habilitada, pois essa opção não está disponível devido às limitações dos dispositivos Android. Essa funcionalidade está reservada apenas para servidores hospedados em desktops.
No Android, a única forma direta de importar uma chave de servidor é através do grupo de teste Cwtch, garantindo assim acesso ao servidor Cwtch.
Primeiro passo é Habilitar a opção de grupo no Cwtch que está em fase de testes. Clique na opção no canto superior direito da tela de configuração e pressione o botão para acessar as configurações do Cwtch.
Você pode alterar o idioma para Português do Brasil.Depois, role para baixo e selecione a opção para ativar os experimentos. Em seguida, ative a opção para habilitar o chat em grupo e a pré-visualização de imagens e fotos de perfil, permitindo que você troque sua foto de perfil.
https://link.storjshare.io/raw/jvss6zxle26jdguwaegtjdixhfka/production/f0ca039733d48895001261ab25c5d2efbaf3bf26e55aad3cce406646f9af9d15.MP4
Próximo passo é Criar um perfil.
Pressione o + botão de ação no canto inferior direito e selecione "Novo perfil" ou aberta no botão + adicionar novo perfil.
-
Selecione um nome de exibição
-
Selecione se deseja proteger
este perfil e salvo localmente com criptografia forte: Senha: sua conta está protegida de outras pessoas que possam usar este dispositivo
Sem senha: qualquer pessoa que tenha acesso a este dispositivo poderá acessar este perfil.
Preencha sua senha e digite-a novamente
Os perfis são armazenados localmente no disco e criptografados usando uma chave derivada de uma senha conhecida pelo usuário (via pbkdf2).
Observe que, uma vez criptografado e armazenado em disco, a única maneira de recuperar um perfil é recuperando a chave da senha - como tal, não é possível fornecer uma lista completa de perfis aos quais um usuário pode ter acesso até inserir um senha.
https://link.storjshare.io/raw/jxqbqmur2lcqe2eym5thgz4so2ya/production/8f9df1372ec7e659180609afa48be22b12109ae5e1eda9ef1dc05c1325652507.MP4
O próximo passo é adicionar o FuzzBot, que é um bot de testes e de desenvolvimento.
Contato do FuzzBot: 4y2hxlxqzautabituedksnh2ulcgm2coqbure6wvfpg4gi2ci25ta5ad.
Ao enviar o comando "testgroup-invite" para o FuzzBot, você receberá um convite para entrar no Grupo Cwtch Test. Ao ingressar no grupo, você será automaticamente conectado ao servidor Cwtch. Você pode optar por sair do grupo a qualquer momento ou ficar para conversar e tirar dúvidas sobre o aplicativo e outros assuntos. Depois, você pode configurar seu próprio servidor Cwtch, o que é altamente recomendável.
https://link.storjshare.io/raw/jvji25zclkoqcouni5decle7if7a/production/ee3de3540a3e3dca6e6e26d303e12c2ef892a5d7769029275b8b95ffc7468780.MP4
Agora você pode utilizar o aplicativo normalmente. Algumas observações que notei: se houver demora na conexão com outra pessoa, ambas devem estar online. Se ainda assim a conexão não for estabelecida, basta clicar no ícone de reset do Tor para restabelecer a conexão com a outra pessoa.
Uma introdução aos perfis Cwtch.
Com Cwtch você pode criar um ou mais perfis . Cada perfil gera um par de chaves ed25519 aleatório compatível com a Rede Tor.
Este é o identificador que você pode fornecer às pessoas e que elas podem usar para entrar em contato com você via Cwtch.
Cwtch permite criar e gerenciar vários perfis separados. Cada perfil está associado a um par de chaves diferente que inicia um serviço cebola diferente.
Gerenciar Na inicialização, o Cwtch abrirá a tela Gerenciar Perfis. Nessa tela você pode:
- Crie um novo perfil.
- Desbloquear perfis.
- Criptografados existentes.
- Gerenciar perfis carregados.
- Alterando o nome de exibição de um perfil.
- Alterando a senha de um perfil Excluindo um perfil.
- Alterando uma imagem de perfil.
Backup ou exportação de um perfil.
Na tela de gerenciamento de perfil:
-
Selecione o lápis ao lado do perfil que você deseja editar
-
Role para baixo até a parte inferior da tela.
-
Selecione "Exportar perfil"
-
Escolha um local e um nome de arquivo.
5.confirme.
Uma vez confirmado, o Cwtch colocará uma cópia do perfil no local indicado. Este arquivo é criptografado no mesmo nível do perfil.
Este arquivo pode ser importado para outra instância do Cwtch em qualquer dispositivo.
Importando um perfil.
-
Pressione o +botão de ação no canto inferior direito e selecione "Importar perfil"
-
Selecione um arquivo de perfil Cwtch exportado para importar
-
Digite a senha associada ao perfil e confirme.
Uma vez confirmado, o Cwtch tentará descriptografar o arquivo fornecido usando uma chave derivada da senha fornecida. Se for bem-sucedido, o perfil aparecerá na tela Gerenciamento de perfil e estará pronto para uso.
OBSERVAÇÃO Embora um perfil possa ser importado para vários dispositivos, atualmente apenas uma versão de um perfil pode ser usada em todos os dispositivos ao mesmo tempo. As tentativas de usar o mesmo perfil em vários dispositivos podem resultar em problemas de disponibilidade e falhas de mensagens.
Qual é a diferença entre uma conexão ponto a ponto e um grupo cwtch?
As conexões ponto a ponto Cwtch permitem que 2 pessoas troquem mensagens diretamente. As conexões ponto a ponto nos bastidores usam serviços cebola Tor v3 para fornecer uma conexão criptografada e resistente a metadados. Devido a esta conexão direta, ambas as partes precisam estar online ao mesmo tempo para trocar mensagens.
Os Grupos Cwtch permitem que várias partes participem de uma única conversa usando um servidor não confiável (que pode ser fornecido por terceiros ou auto-hospedado). Os operadores de servidores não conseguem saber quantas pessoas estão em um grupo ou o que está sendo discutido. Se vários grupos estiverem hospedados em um único servidor, o servidor não conseguirá saber quais mensagens pertencem a qual grupo sem a conivência de um membro do grupo. Ao contrário das conversas entre pares, as conversas em grupo podem ser conduzidas de forma assíncrona, para que todos num grupo não precisem estar online ao mesmo tempo.
Por que os grupos cwtch são experimentais? Mensagens em grupo resistentes a metadados ainda são um problema em aberto . Embora a versão que fornecemos no Cwtch Beta seja projetada para ser segura e com metadados privados, ela é bastante ineficiente e pode ser mal utilizada. Como tal, aconselhamos cautela ao usá-lo e apenas o fornecemos como um recurso opcional.
Como posso executar meu próprio servidor Cwtch? A implementação de referência para um servidor Cwtch é de código aberto . Qualquer pessoa pode executar um servidor Cwtch, e qualquer pessoa com uma cópia do pacote de chaves públicas do servidor pode hospedar grupos nesse servidor sem que o operador tenha acesso aos metadados relacionados ao grupo .
https://git.openprivacy.ca/cwtch.im/server
https://docs.openprivacy.ca/cwtch-security-handbook/server.html
Como posso desligar o Cwtch? O painel frontal do aplicativo possui um ícone do botão "Shutdown Cwtch" (com um 'X'). Pressionar este botão irá acionar uma caixa de diálogo e, na confirmação, o Cwtch será desligado e todos os perfis serão descarregados.
Suas doações podem fazer a diferença no projeto Cwtch? O Cwtch é um projeto dedicado a construir aplicativos que preservam a privacidade, oferecendo comunicação de grupo resistente a metadados. Além disso, o projeto também desenvolve o Cofre, formulários da web criptografados para ajudar mútua segura. Suas contribuições apoiam iniciativas importantes, como a divulgação de violações de dados médicos em Vancouver e pesquisas sobre a segurança do voto eletrônico na Suíça. Ao doar, você está ajudando a fechar o ciclo, trabalhando com comunidades marginalizadas para identificar e corrigir lacunas de privacidade. Além disso, o projeto trabalha em soluções inovadoras, como a quebra de segredos através da criptografia de limite para proteger sua privacidade durante passagens de fronteira. E também tem a infraestrutura: toda nossa infraestrutura é open source e sem fins lucrativos. Conheça também o Fuzzytags, uma estrutura criptográfica probabilística para marcação resistente a metadados. Sua doação é crucial para continuar o trabalho em prol da privacidade e segurança online. Contribua agora com sua doação
https://openprivacy.ca/donate/
onde você pode fazer sua doação em bitcoin e outras moedas, e saiba mais sobre os projetos. https://openprivacy.ca/work/
Link sobre Cwtch
https://cwtch.im/
https://git.openprivacy.ca/cwtch.im/cwtch
https://docs.cwtch.im/docs/intro
https://docs.openprivacy.ca/cwtch-security-handbook/
Baixar #CwtchDev
cwtch.im/download/
https://play.google.com/store/apps/details?id=im.cwtch.flwtch
-
@ 220522c2:61e18cb4
2024-09-22 04:23:03{"pubkey":"32e1827635450ebb3c5a7d12c1f8e7b2b514439ac10a67eef3d9fd9c5c68e245","content":" https:\/\/i.nostr.build\/BytyFxe1M6lEtWhB.jpg ","created_at":1726972254,"id":"c23127d89aa041d7e74dcd02019570a886dd3848e44bea61e32b35efb66bb770","kind":1,"sig":"9418144c68fd90c780b9f9c91cdc4f14a292d9c19873ccea7a2b7eb6bbb879c26dee4055fb89cc18ba401bed0c14d2a1a2d6d436deeadaa64b8d1e478292354e","tags":[["imeta","url https:\/\/i.nostr.build\/BytyFxe1M6lEtWhB.jpg","blurhash e6SY{qD*~q^+ae-;9EIUxut8-pt7E1Rjj[M|t7t7t7-;%LRjWDWVxu","dim 676x879"],["r","https:\/\/i.nostr.build\/BytyFxe1M6lEtWhB.jpg"]]} -
@ a95c6243:d345522c
2024-11-29 19:45:43Konsum ist Therapie.
Wolfgang JoopUmweltbewusstes Verhalten und verantwortungsvoller Konsum zeugen durchaus von einer wünschenswerten Einstellung. Ob man deswegen allerdings einen grünen statt eines schwarzen Freitags braucht, darf getrost bezweifelt werden – zumal es sich um manipulatorische Konzepte handelt. Wie in der politischen Landschaft sind auch hier die Etiketten irgendwas zwischen nichtssagend und trügerisch.
Heute ist also wieder mal «Black Friday», falls Sie es noch nicht mitbekommen haben sollten. Eigentlich haben wir ja eher schon eine ganze «Black Week», der dann oft auch noch ein «Cyber Monday» folgt. Die Werbebranche wird nicht müde, immer neue Anlässe zu erfinden oder zu importieren, um uns zum Konsumieren zu bewegen. Und sie ist damit sehr erfolgreich.
Warum fallen wir auf derartige Werbetricks herein und kaufen im Zweifelsfall Dinge oder Mengen, die wir sicher nicht brauchen? Pure Psychologie, würde ich sagen. Rabattschilder triggern etwas in uns, was den Verstand in Stand-by versetzt. Zusätzlich beeinflussen uns alle möglichen emotionalen Reize und animieren uns zum Schnäppchenkauf.
Gedankenlosigkeit und Maßlosigkeit können besonders bei der Ernährung zu ernsten Problemen führen. Erst kürzlich hat mir ein Bekannter nach einer USA-Reise erzählt, dass es dort offenbar nicht unüblich ist, schon zum ausgiebigen Frühstück in einem Restaurant wenigstens einen Liter Cola zu trinken. Gerne auch mehr, um das Gratis-Nachfüllen des Bechers auszunutzen.
Kritik am schwarzen Freitag und dem unnötigen Konsum kommt oft von Umweltschützern. Neben Ressourcenverschwendung, hohem Energieverbrauch und wachsenden Müllbergen durch eine zunehmende Wegwerfmentalität kommt dabei in der Regel auch die «Klimakrise» auf den Tisch.
Die EU-Kommission lancierte 2015 den Begriff «Green Friday» im Kontext der überarbeiteten Rechtsvorschriften zur Kennzeichnung der Energieeffizienz von Elektrogeräten. Sie nutzte die Gelegenheit kurz vor dem damaligen schwarzen Freitag und vor der UN-Klimakonferenz COP21, bei der das Pariser Abkommen unterzeichnet werden sollte.
Heute wird ein grüner Freitag oft im Zusammenhang mit der Forderung nach «nachhaltigem Konsum» benutzt. Derweil ist die Europäische Union schon weit in ihr Geschäftsmodell des «Green New Deal» verstrickt. In ihrer Propaganda zum Klimawandel verspricht sie tatsächlich «Unterstützung der Menschen und Regionen, die von immer häufigeren Extremwetter-Ereignissen betroffen sind». Was wohl die Menschen in der Region um Valencia dazu sagen?
Ganz im Sinne des Great Reset propagierten die Vereinten Nationen seit Ende 2020 eine «grüne Erholung von Covid-19, um den Klimawandel zu verlangsamen». Der UN-Umweltbericht sah in dem Jahr einen Schwerpunkt auf dem Verbraucherverhalten. Änderungen des Konsumverhaltens des Einzelnen könnten dazu beitragen, den Klimaschutz zu stärken, hieß es dort.
Der Begriff «Schwarzer Freitag» wurde in den USA nicht erstmals für Einkäufe nach Thanksgiving verwendet – wie oft angenommen –, sondern für eine Finanzkrise. Jedoch nicht für den Börsencrash von 1929, sondern bereits für den Zusammenbruch des US-Goldmarktes im September 1869. Seitdem mussten die Menschen weltweit so einige schwarze Tage erleben.
Kürzlich sind die britischen Aufsichtsbehörden weiter von ihrer Zurückhaltung nach dem letzten großen Finanzcrash von 2008 abgerückt. Sie haben Regeln für den Bankensektor gelockert, womit sie «verantwortungsvolle Risikobereitschaft» unterstützen wollen. Man würde sicher zu schwarz sehen, wenn man hier ein grünes Wunder befürchten würde.
Dieser Beitrag ist zuerst auf Transition News erschienen.
-
@ a95c6243:d345522c
2024-11-08 20:02:32Und plötzlich weißt du:
Es ist Zeit, etwas Neues zu beginnen
und dem Zauber des Anfangs zu vertrauen.
Meister EckhartSchwarz, rot, gold leuchtet es im Kopf des Newsletters der deutschen Bundesregierung, der mir freitags ins Postfach flattert. Rot, gelb und grün werden daneben sicher noch lange vielzitierte Farben sein, auch wenn diese nie geleuchtet haben. Die Ampel hat sich gerade selber den Stecker gezogen – und hinterlässt einen wirtschaftlichen und gesellschaftlichen Trümmerhaufen.
Mit einem bemerkenswerten Timing hat die deutsche Regierungskoalition am Tag des «Comebacks» von Donald Trump in den USA endlich ihr Scheitern besiegelt. Während der eine seinen Sieg bei den Präsidentschaftswahlen feierte, erwachten die anderen jäh aus ihrer Selbsthypnose rund um Harris-Hype und Trump-Panik – mit teils erschreckenden Auswüchsen. Seit Mittwoch werden die Geschicke Deutschlands nun von einer rot-grünen Minderheitsregierung «geleitet» und man steuert auf Neuwahlen zu.
Das Kindergarten-Gehabe um zwei konkurrierende Wirtschaftsgipfel letzte Woche war bereits bezeichnend. In einem Strategiepapier gestand Finanzminister Lindner außerdem den «Absturz Deutschlands» ein und offenbarte, dass die wirtschaftlichen Probleme teilweise von der Ampel-Politik «vorsätzlich herbeigeführt» worden seien.
Lindner und weitere FDP-Minister wurden also vom Bundeskanzler entlassen. Verkehrs- und Digitalminister Wissing trat flugs aus der FDP aus; deshalb darf er nicht nur im Amt bleiben, sondern hat zusätzlich noch das Justizministerium übernommen. Und mit Jörg Kukies habe Scholz «seinen Lieblingsbock zum Obergärtner», sprich: Finanzminister befördert, meint Norbert Häring.
Es gebe keine Vertrauensbasis für die weitere Zusammenarbeit mit der FDP, hatte der Kanzler erklärt, Lindner habe zu oft sein Vertrauen gebrochen. Am 15. Januar 2025 werde er daher im Bundestag die Vertrauensfrage stellen, was ggf. den Weg für vorgezogene Neuwahlen freimachen würde.
Apropos Vertrauen: Über die Hälfte der Bundesbürger glauben, dass sie ihre Meinung nicht frei sagen können. Das ging erst kürzlich aus dem diesjährigen «Freiheitsindex» hervor, einer Studie, die die Wechselwirkung zwischen Berichterstattung der Medien und subjektivem Freiheitsempfinden der Bürger misst. «Beim Vertrauen in Staat und Medien zerreißt es uns gerade», kommentierte dies der Leiter des Schweizer Unternehmens Media Tenor, das die Untersuchung zusammen mit dem Institut für Demoskopie Allensbach durchführt.
«Die absolute Mehrheit hat absolut die Nase voll», titelte die Bild angesichts des «Ampel-Showdowns». Die Mehrheit wolle Neuwahlen und die Grünen sollten zuerst gehen, lasen wir dort.
Dass «Insolvenzminister» Robert Habeck heute seine Kandidatur für das Kanzleramt verkündet hat, kann nur als Teil der politmedialen Realitätsverweigerung verstanden werden. Wer allerdings denke, schlimmer als in Zeiten der Ampel könne es nicht mehr werden, sei reichlich optimistisch, schrieb Uwe Froschauer bei Manova. Und er kenne Friedrich Merz schlecht, der sich schon jetzt rhetorisch auf seine Rolle als oberster Feldherr Deutschlands vorbereite.
Was also tun? Der Schweizer Verein «Losdemokratie» will eine Volksinitiative lancieren, um die Bestimmung von Parlamentsmitgliedern per Los einzuführen. Das Losverfahren sorge für mehr Demokratie, denn als Alternative zum Wahlverfahren garantiere es eine breitere Beteiligung und repräsentativere Parlamente. Ob das ein Weg ist, sei dahingestellt.
In jedem Fall wird es notwendig sein, unsere Bemühungen um Freiheit und Selbstbestimmung zu verstärken. Mehr Unabhängigkeit von staatlichen und zentralen Institutionen – also die Suche nach dezentralen Lösungsansätzen – gehört dabei sicher zu den Möglichkeiten. Das gilt sowohl für jede/n Einzelne/n als auch für Entitäten wie die alternativen Medien.
Dieser Beitrag ist zuerst auf Transition News erschienen.
-
@ 220522c2:61e18cb4
2024-09-17 19:21:14Relay Wizard now let's you choose between multiple relay implementations, including a nip29 relay that supports groups. If you have a relay you'd like to see implemented let me know. Try it out at relaywizard.com #grownostr #relays If you don't even know where to get started with setting up a server or hooking up a domain name you can also check out relayrunner.org https://video.nostr.build/610d5da76e5aca6874213adf8fd0ff3ad1c47efed2d23f199b18fe5c9c42649c.mp4 -
@ be7bf5de:09420d0a
2025-01-02 17:54:35The SALUD Decentralized Health App Development Challenge is an exciting initiative aimed at revolutionizing healthcare through the use of decentralized technologies. Running from January to May, this challenge will bring together developers, designers, healthcare providers, and health conscious individuals interested in decentralizing healthcare. Participants will create open-source tools leveraging Nostr, Bitcoin, and the SALUD protocol aiming to improve healthcare access, enhance data portability, and ultimately improve health outcomes for individuals worldwide.
Challenge Mission
At its core, the mission of this challenge is to bootstrap an ecosystem of interoperable tools that allow individuals to take full control of their health data. By building apps on the Nostr protocol and integrating bitcoin, the challenge hopes to address key issues in traditional healthcare, including access to services, privacy, and fragmented health data systems. All participating apps will be required to be compatible with the SALUD protocol, or Sistema de Administración de Libertad Único y Decentralizado, which is an open-source framework for utilizing health data over Nostr.
Challenge Structure
The challenge is structured to span five months, from January through May. Throughout this period, participants will meet weekly to discuss their progress, share insights, and collaborate with others. These sessions will be instrumental in connecting developers, designers, and healthcare professionals, fostering a community focused on building the future of decentralized healthcare.
The challenge will include weekly office hours for participants, held every Thursday at 11 AM Eastern Time (4 PM UTC), starting on January 16th. These open office hours will provide opportunities to connect with doctors, developers, entrepreneurs, and health-minded bitcoiners to ensure that the apps being developed address real-world healthcare needs.
Evaluation Criteria
All submissions to the challenge will be evaluated based on four key metrics:
- App Production Readiness: Is the app functional and polished enough for real-world use?
- Solution Depth and Creativity: How innovative and impactful is the solution in addressing healthcare challenges?
- Interoperability: How well does the app integrate with the SALUD protocol and other healthcare tools, ensuring it can work seamlessly within the decentralized ecosystem?
- Overall Contribution to the Ecosystem: Does the app contribute to the broader vision of decentralized healthcare and enhance individual control over health data?
Prize Pool
The challenge features a prize pool starting at 10 million satoshis (0.1 BTC). Winning participants will not only receive financial rewards but also have the opportunity to collaborate with NosFabrica, a leading force in decentralized technology development, and Illuminodes, piloting the SALUD protocol in El Salvador. This container provides an exciting pathway for long-term collaboration and innovation in the global and decentralized health space.
Who Should Participate?
This challenge is open to a wide range of participants, each contributing unique expertise and perspectives:
- Developers and Designers: Those skilled in app development, UX/UI design, bitcoin and the Lightning Network.
- Healthcare Providers (Doctors/Nurses/Alternative Health): Professionals who can offer insights into real-world healthcare needs and help design solutions that truly benefit patients.
- Health-Conscious Individuals: People passionate about taking control of their own health data and empowering others to do the same.
- Bitcoiners and Nostriches: Enthusiasts of Bitcoin and Nostr who are excited to apply these censorship resistant technologies to solve pressing issues in healthcare.
- Investors: Individuals or firms interested in supporting innovative projects and startups that have the potential to shape future of healthcare.
How to Participate
To get involved in the challenge and receive important updates and event invitations, participants can sign up through either of the provided forms:
The main categories we'll encourage individuals to develop solutions for are personal health apps, healthcare provider tooling, and SALUD protocol infrastructure. So far, the SALUD protocol includes NIP-82, a way to store FHIR healthcare records on Nostr, developed by NosFabrica co-founder, Vitor Pamplona. We see more Nostr improvement proposals being made as healthcare data use cases develop.
Conclusion
The SALUD Decentralized Health App Development Challenge is a groundbreaking opportunity for anyone passionate about using Nostr and Bitcoin to reshape the healthcare landscape. By building apps that empower individuals to control their own health data, participants will play a pivotal role in addressing some of the most pressing challenges in modern healthcare, from data privacy to accessibility and portability. We're xcited about this challenge and to continue building the future of decentralized healthcare!
Happy new year!
PS. Feel free to reach out with any questions to jon@nosfabrica.com or go to https://nosfabrica.com/challenge/ to learn more.
-
@ a95c6243:d345522c
2024-10-26 12:21:50Es ist besser, ein Licht zu entzünden, als auf die Dunkelheit zu schimpfen. Konfuzius
Die Bemühungen um Aufarbeitung der sogenannten Corona-Pandemie, um Aufklärung der Hintergründe, Benennung von Verantwortlichkeiten und das Ziehen von Konsequenzen sind durchaus nicht eingeschlafen. Das Interesse daran ist unter den gegebenen Umständen vielleicht nicht sonderlich groß, aber es ist vorhanden.
Der sächsische Landtag hat gestern die Einsetzung eines Untersuchungsausschusses zur Corona-Politik beschlossen. In einer Sondersitzung erhielt ein entsprechender Antrag der AfD-Fraktion die ausreichende Zustimmung, auch von einigen Abgeordneten des BSW.
In den Niederlanden wird Bill Gates vor Gericht erscheinen müssen. Sieben durch die Covid-«Impfstoffe» geschädigte Personen hatten Klage eingereicht. Sie werfen unter anderem Gates, Pfizer-Chef Bourla und dem niederländischen Staat vor, sie hätten gewusst, dass diese Präparate weder sicher noch wirksam sind.
Mit den mRNA-«Impfstoffen» von Pfizer/BioNTech befasst sich auch ein neues Buch. Darin werden die Erkenntnisse von Ärzten und Wissenschaftlern aus der Analyse interner Dokumente über die klinischen Studien der Covid-Injektion präsentiert. Es handelt sich um jene in den USA freigeklagten Papiere, die die Arzneimittelbehörde (Food and Drug Administration, FDA) 75 Jahre unter Verschluss halten wollte.
Ebenfalls Wissenschaftler und Ärzte, aber auch andere Experten organisieren als Verbundnetzwerk Corona-Solution kostenfreie Online-Konferenzen. Ihr Ziel ist es, «wissenschaftlich, demokratisch und friedlich» über Impfstoffe und Behandlungsprotokolle gegen SARS-CoV-2 aufzuklären und die Diskriminierung von Ungeimpften zu stoppen. Gestern fand eine weitere Konferenz statt. Ihr Thema: «Corona und modRNA: Von Toten, Lebenden und Physik lernen».
Aufgrund des Digital Services Acts (DSA) der Europäischen Union sei das Risiko groß, dass ihre Arbeit als «Fake-News» bezeichnet würde, so das Netzwerk. Staatlich unerwünschte wissenschaftliche Aufklärung müsse sich passende Kanäle zur Veröffentlichung suchen. Ihre Live-Streams seien deshalb zum Beispiel nicht auf YouTube zu finden.
Der vielfältige Einsatz für Aufklärung und Aufarbeitung wird sich nicht stummschalten lassen. Nicht einmal der Zensurmeister der EU, Deutschland, wird so etwas erreichen. Die frisch aktivierten «Trusted Flagger» dürften allerdings künftige Siege beim «Denunzianten-Wettbewerb» im Kontext des DSA zusätzlich absichern.
Wo sind die Grenzen der Meinungsfreiheit? Sicher gibt es sie. Aber die ideologische Gleichstellung von illegalen mit unerwünschten Äußerungen verfolgt offensichtlich eher das Ziel, ein derart elementares demokratisches Grundrecht möglichst weitgehend auszuhebeln. Vorwürfe wie «Hassrede», «Delegitimierung des Staates» oder «Volksverhetzung» werden heute inflationär verwendet, um Systemkritik zu unterbinden. Gegen solche Bestrebungen gilt es, sich zu wehren.
Dieser Beitrag ist zuerst auf Transition News erschienen.
-
@ 220522c2:61e18cb4
2024-08-27 00:00:45Yup, I’m currently working on zaps and the editor: https://github.com/nodetec/notestack -
@ bcea2b98:7ccef3c9
2025-01-02 17:47:27originally posted at https://stacker.news/items/833889
-
@ 3bf0c63f:aefa459d
2024-01-15 11:15:06Pequenos problemas que o Estado cria para a sociedade e que não são sempre lembrados
- **vale-transporte**: transferir o custo com o transporte do funcionário para um terceiro o estimula a morar longe de onde trabalha, já que morar perto é normalmente mais caro e a economia com transporte é inexistente. - **atestado médico**: o direito a faltar o trabalho com atestado médico cria a exigência desse atestado para todas as situações, substituindo o livre acordo entre patrão e empregado e sobrecarregando os médicos e postos de saúde com visitas desnecessárias de assalariados resfriados. - **prisões**: com dinheiro mal-administrado, burocracia e péssima alocação de recursos -- problemas que empresas privadas em competição (ou mesmo sem qualquer competição) saberiam resolver muito melhor -- o Estado fica sem presídios, com os poucos existentes entupidos, muito acima de sua alocação máxima, e com isto, segundo a bizarra corrente de responsabilidades que culpa o juiz que condenou o criminoso por sua morte na cadeia, juízes deixam de condenar à prisão os bandidos, soltando-os na rua. - **justiça**: entrar com processos é grátis e isto faz proliferar a atividade dos advogados que se dedicam a criar problemas judiciais onde não seria necessário e a entupir os tribunais, impedindo-os de fazer o que mais deveriam fazer. - **justiça**: como a justiça só obedece às leis e ignora acordos pessoais, escritos ou não, as pessoas não fazem acordos, recorrem sempre à justiça estatal, e entopem-na de assuntos que seriam muito melhor resolvidos entre vizinhos. - **leis civis**: as leis criadas pelos parlamentares ignoram os costumes da sociedade e são um incentivo a que as pessoas não respeitem nem criem normas sociais -- que seriam maneiras mais rápidas, baratas e satisfatórias de resolver problemas. - **leis de trãnsito**: quanto mais leis de trânsito, mais serviço de fiscalização são delegados aos policiais, que deixam de combater crimes por isto (afinal de contas, eles não querem de fato arriscar suas vidas combatendo o crime, a fiscalização é uma excelente desculpa para se esquivarem a esta responsabilidade). - **financiamento educacional**: é uma espécie de subsídio às faculdades privadas que faz com que se criem cursos e mais cursos que são cada vez menos recheados de algum conhecimento ou técnica útil e cada vez mais inúteis. - **leis de tombamento**: são um incentivo a que o dono de qualquer área ou construção "histórica" destrua todo e qualquer vestígio de história que houver nele antes que as autoridades descubram, o que poderia não acontecer se ele pudesse, por exemplo, usar, mostrar e se beneficiar da história daquele local sem correr o risco de perder, de fato, a sua propriedade. - **zoneamento urbano**: torna as cidades mais espalhadas, criando uma necessidade gigantesca de carros, ônibus e outros meios de transporte para as pessoas se locomoverem das zonas de moradia para as zonas de trabalho. - **zoneamento urbano**: faz com que as pessoas percam horas no trânsito todos os dias, o que é, além de um desperdício, um atentado contra a sua saúde, que estaria muito melhor servida numa caminhada diária entre a casa e o trabalho. - **zoneamento urbano**: torna ruas e as casas menos seguras criando zonas enormes, tanto de residências quanto de indústrias, onde não há movimento de gente alguma. - **escola obrigatória + currículo escolar nacional**: emburrece todas as crianças. - **leis contra trabalho infantil**: tira das crianças a oportunidade de aprender ofícios úteis e levar um dinheiro para ajudar a família. - **licitações**: como não existem os critérios do mercado para decidir qual é o melhor prestador de serviço, criam-se comissões de pessoas que vão decidir coisas. isto incentiva os prestadores de serviço que estão concorrendo na licitação a tentar comprar os membros dessas comissões. isto, fora a corrupção, gera problemas reais: __(i)__ a escolha dos serviços acaba sendo a pior possível, já que a empresa prestadora que vence está claramente mais dedicada a comprar comissões do que a fazer um bom trabalho (este problema afeta tantas áreas, desde a construção de estradas até a qualidade da merenda escolar, que é impossível listar aqui); __(ii)__ o processo corruptor acaba, no longo prazo, eliminando as empresas que prestavam e deixando para competir apenas as corruptas, e a qualidade tende a piorar progressivamente. - **cartéis**: o Estado em geral cria e depois fica refém de vários grupos de interesse. o caso dos taxistas contra o Uber é o que está na moda hoje (e o que mostra como os Estados se comportam da mesma forma no mundo todo). - **multas**: quando algum indivíduo ou empresa comete uma fraude financeira, ou causa algum dano material involuntário, as vítimas do caso são as pessoas que sofreram o dano ou perderam dinheiro, mas o Estado tem sempre leis que prevêem multas para os responsáveis. A justiça estatal é sempre muito rígida e rápida na aplicação dessas multas, mas relapsa e vaga no que diz respeito à indenização das vítimas. O que em geral acontece é que o Estado aplica uma enorme multa ao responsável pelo mal, retirando deste os recursos que dispunha para indenizar as vítimas, e se retira do caso, deixando estas desamparadas. - **desapropriação**: o Estado pode pegar qualquer propriedade de qualquer pessoa mediante uma indenização que é necessariamente inferior ao valor da propriedade para o seu presente dono (caso contrário ele a teria vendido voluntariamente). - **seguro-desemprego**: se há, por exemplo, um prazo mínimo de 1 ano para o sujeito ter direito a receber seguro-desemprego, isto o incentiva a planejar ficar apenas 1 ano em cada emprego (ano este que será sucedido por um período de desemprego remunerado), matando todas as possibilidades de aprendizado ou aquisição de experiência naquela empresa específica ou ascensão hierárquica. - **previdência**: a previdência social tem todos os defeitos de cálculo do mundo, e não importa muito ela ser uma forma horrível de poupar dinheiro, porque ela tem garantias bizarras de longevidade fornecidas pelo Estado, além de ser compulsória. Isso serve para criar no imaginário geral a idéia da __aposentadoria__, uma época mágica em que todos os dias serão finais de semana. A idéia da aposentadoria influencia o sujeito a não se preocupar em ter um emprego que faça sentido, mas sim em ter um trabalho qualquer, que o permita se aposentar. - **regulamentação impossível**: milhares de coisas são proibidas, há regulamentações sobre os aspectos mais mínimos de cada empreendimento ou construção ou espaço. se todas essas regulamentações fossem exigidas não haveria condições de produção e todos morreriam. portanto, elas não são exigidas. porém, o Estado, ou um agente individual imbuído do poder estatal pode, se desejar, exigi-las todas de um cidadão inimigo seu. qualquer pessoa pode viver a vida inteira sem cumprir nem 10% das regulamentações estatais, mas viverá também todo esse tempo com medo de se tornar um alvo de sua exigência, num estado de terror psicológico. - **perversão de critérios**: para muitas coisas sobre as quais a sociedade normalmente chegaria a um valor ou comportamento "razoável" espontaneamente, o Estado dita regras. estas regras muitas vezes não são obrigatórias, são mais "sugestões" ou limites, como o salário mínimo, ou as 44 horas semanais de trabalho. a sociedade, porém, passa a usar esses valores como se fossem o normal. são raras, por exemplo, as ofertas de emprego que fogem à regra das 44h semanais. - **inflação**: subir os preços é difícil e constrangedor para as empresas, pedir aumento de salário é difícil e constrangedor para o funcionário. a inflação força as pessoas a fazer isso, mas o aumento não é automático, como alguns economistas podem pensar (enquanto alguns outros ficam muito satisfeitos de que esse processo seja demorado e difícil). - **inflação**: a inflação destrói a capacidade das pessoas de julgar preços entre concorrentes usando a própria memória. - **inflação**: a inflação destrói os cálculos de lucro/prejuízo das empresas e prejudica enormemente as decisões empresariais que seriam baseadas neles. - **inflação**: a inflação redistribui a riqueza dos mais pobres e mais afastados do sistema financeiro para os mais ricos, os bancos e as megaempresas. - **inflação**: a inflação estimula o endividamento e o consumismo. - **lixo:** ao prover coleta e armazenamento de lixo "grátis para todos" o Estado incentiva a criação de lixo. se tivessem que pagar para que recolhessem o seu lixo, as pessoas (e conseqüentemente as empresas) se empenhariam mais em produzir coisas usando menos plástico, menos embalagens, menos sacolas. - **leis contra crimes financeiros:** ao criar legislação para dificultar acesso ao sistema financeiro por parte de criminosos a dificuldade e os custos para acesso a esse mesmo sistema pelas pessoas de bem cresce absurdamente, levando a um percentual enorme de gente incapaz de usá-lo, para detrimento de todos -- e no final das contas os grandes criminosos ainda conseguem burlar tudo.
-
@ c631e267:c2b78d3e
2024-10-23 20:26:10Herzlichen Glückwunsch zum dritten Geburtstag, liebe Denk Bar! Wieso zum dritten? Das war doch 2022 und jetzt sind wir im Jahr 2024, oder? Ja, das ist schon richtig, aber bei Geburtstagen erinnere ich mich immer auch an meinen Vater, und der behauptete oft, der erste sei ja schließlich der Tag der Geburt selber und den müsse man natürlich mitzählen. Wo er recht hat, hat er nunmal recht. Konsequenterweise wird also heute dieser Blog an seinem dritten Geburtstag zwei Jahre alt.
Das ist ein Grund zum Feiern, wie ich finde. Einerseits ganz einfach, weil es dafür gar nicht genug Gründe geben kann. «Das Leben sind zwei Tage», lautet ein gängiger Ausdruck hier in Andalusien. In der Tat könnte es so sein, auch wenn wir uns im Alltag oft genug von der Routine vereinnahmen lassen.
Seit dem Start der Denk Bar vor zwei Jahren ist unglaublich viel passiert. Ebenso wie die zweieinhalb Jahre davor, und all jenes war letztlich auch der Auslöser dafür, dass ich begann, öffentlich zu schreiben. Damals notierte ich:
«Seit einigen Jahren erscheint unser öffentliches Umfeld immer fragwürdiger, widersprüchlicher und manchmal schier unglaublich - jede Menge Anlass für eigene Recherchen und Gedanken, ganz einfach mit einer Portion gesundem Menschenverstand.»
Wir erleben den sogenannten «großen Umbruch», einen globalen Coup, den skrupellose Egoisten clever eingefädelt haben und seit ein paar Jahren knallhart – aber nett verpackt – durchziehen, um buchstäblich alles nach ihrem Gusto umzukrempeln. Die Gelegenheit ist ja angeblich günstig und muss genutzt werden.
Nie hätte ich mir träumen lassen, dass ich so etwas jemals miterleben müsste. Die Bosheit, mit der ganz offensichtlich gegen die eigene Bevölkerung gearbeitet wird, war früher für mich unvorstellbar. Mein (Rest-) Vertrauen in alle möglichen Bereiche wie Politik, Wissenschaft, Justiz, Medien oder Kirche ist praktisch komplett zerstört. Einen «inneren Totalschaden» hatte ich mal für unsere Gesellschaften diagnostiziert.
Was mich vielleicht am meisten erschreckt, ist zum einen das Niveau der Gleichschaltung, das weltweit erreicht werden konnte, und zum anderen die praktisch totale Spaltung der Gesellschaft. Haben wir das tatsächlich mit uns machen lassen?? Unfassbar! Aber das Werkzeug «Angst» ist sehr mächtig und funktioniert bis heute.
Zum Glück passieren auch positive Dinge und neue Perspektiven öffnen sich. Für viele Menschen waren und sind die Entwicklungen der letzten Jahre ein Augenöffner. Sie sehen «Querdenken» als das, was es ist: eine Tugend.
Auch die immer ernsteren Zensurbemühungen sind letztlich nur ein Zeichen der Schwäche, wo Argumente fehlen. Sie werden nicht verhindern, dass wir unsere Meinung äußern, unbequeme Fragen stellen und dass die Wahrheit peu à peu ans Licht kommt. Es gibt immer Mittel und Wege, auch für uns.
Danke, dass du diesen Weg mit mir weitergehst!
-
@ 7e538978:a5987ab6
2024-10-02 13:57:31Chain Duel, a fast paced PvP game that takes inspiration from the classic snake game and supercharges it with Bitcoin’s Lightning Network. Imagine battling another player for dominance in a race to collect blocks, where the length of your chain isn’t just a visual cue. It represents real, staked satoshis. The player with the most Proof of Work wins, but it’s not just about gameplay; it’s about the seamless integration of the Lightning Network and real-time payments.
But how does Chain Duel manage these instant transactions with such efficiency? That’s where LNbits comes in. LNbits, an open-source wallet and payment infrastructure, handles all in-game payments making it easy for developers to focus on gameplay while LNbits takes care of everything from microtransactions to automated splits for developers and designers. In this article, we’ll dive deep into how Chain Duel leverages LNbits to streamline in-game payments and how other developers can take advantage of this powerful toolset to build the future of Lightning-powered gaming.
Let’s explore how LNbits transforms payment processing and why it’s quickly becoming a must-have for game developers working in the Bitcoin space.
Overview of Chain Duel
Chain Duel is a unique Lightning Network-inspired game that reimagines the classic snake game with a competitive twist, integrating real-time payments. Two players face off in real-time, racing to "catch" blocks and extend their chains. Each block added to the chain represents Proof of Work, and the player with the most Proof of Work wins the duel. The stakes are high, as the game represents satoshis (small units of Bitcoin) as points, with the winner taking home the prize.
The game is designed to be Lightning-native, meaning all payments within Chain Duel are processed through the Lightning Network. This ensures fast payments, reducing latency and making gameplay smooth. With additional features like practice mode, tournaments and highscores, Chain Duel creates an engaging and competitive environment for Bitcoin enthusiasts and gamers alike.
One of the standout aspects of Chain Duel is its deeper integration with the Lightning Network even at a design level. For example, actual Bitcoin blocks can appear on screen during matches, offering bonus points when mined in sync with the game. The game’s current version, still in beta, has already drawn attention within the Bitcoin community, gaining momentum at conferences and with a growing user base through its social networks. With its innovative combination of gaming, the Lightning Network, and competitive play, Chain Duel offers a glimpse into the future of Lightning-based gaming.
How LNbits is Used in Chain Duel
Seamless Integration with LNbits
At the core of Chain Duel’s efficient payment processing is LNbits, which handles in-game transactions smoothly and reliably. Chain Duel uses the LNbits LNURL-pay and LNURL-withdraw extensions to manage payments and rewards between players. Before each match, players send satoshis using LNURL-pay, which generates a static QR code or link for making the payment. LNURL-pay allows users to attach a note to the payment, which Chain Duel creatively uses as a way to insert the player name in-game. The simplicity of LNURL-pay ensures that users can quickly and easily initiate games, with fresh invoices being issued for every game. When players win, LNURL-withdraw enables them to seamlessly pull their earnings from the game, providing a quick payout system.
These extensions make it easy for players to send and receive Bitcoin with minimal latency, fully leveraging the power of the Lightning Network for fast and low-cost payments. The flexibility of LNbits’ tools means that game developers don’t need to worry about building custom payment systems from scratch—they can rely on LNbits to handle all financial transactions with precision.
Lightning Tournaments
Chain Duel tournaments leverage LNbits and its LNURL extensions to create a seamless and efficient experience for players. In Chain Duel tournaments, LNbits plays a crucial role in managing the overall economics. LNbits facilitates the generation of LNURL QR codes that participants can scan to register quickly or withdraw their winnings. LNbits allows Chain Duel to automatically handle multiple registrations through LNURL-pay, enabling players to participate in the tournament without additional steps. The Lightning Network's speed ensures that these payments occur in real-time, reducing wait times and allowing for a smoother flow in-game.
Splitting Payments
LNbits further simplifies revenue-sharing within Chain Duel. This feature allows the game to automatically split the satoshis sent by players into different shares for the game’s developer, designer, and host. Each time a payment is made to join a match, LNbits is used to automattically pay each of the contributors, according to pre-defined rules. This automated process ensures that everyone involved in the development and running of the game gets their fair share without manual intervention or complex bookkeeping.
Nostr Integration
Chain Duel also integrates with Nostr, a decentralized protocol for social interactions. Players can join games using "Zaps", small tips or micropayments sent over the Lightning Network within the Nostr ecosystem. Through NIP-57, which enables Nostr clients to request Zap invoices, players can use LNURL-pay enabled Zaps to register in P2P matches, further enhancing the Chain Duel experience. By using Zaps as a way to register in-game, Chain Duel automates the process of fetching players' identity, creating a more competitive and social experience. Zaps are public on the Nostr network, further expanding Chain Duel's games social reach and community engagement.
Game and Payment Synchronization
One of the key reasons Chain Duel developers chose LNbits is its powerful API that connects directly with the game’s logic. LNbits allows the game to synchronize payments with gameplay in real-time, providing a seamless experience where payments are an integrated part of the gaming mechanics.
With LNbits managing both the payment process and the Lightning Network’s complex infrastructure, Chain Duel developers are free to concentrate on enhancing the competitive and Lightning Network-related aspects of the game. This division of tasks is essential for streamlining development while still providing an innovative in-game payment experience that is deeply integrated with the Bitcoin network.
LNbits proves to be an indispensable tool for Chain Duel, enabling smooth in-game transactions, real-time revenue sharing, and seamless integration with Nostr. For developers looking to build Lightning-powered games, LNbits offers a powerful suite of tools that handle everything from micropayments to payment distribution—ensuring that the game's focus remains on fun and competition rather than complex payment systems.
LNBits facilitating Education and Adoption
This system contributes to educating users on the power of the Lightning Network. Since Chain Duel directly involve real satoshis and LNURL for registration and rewards, players actively experience how Lightning can facilitate fast, cheap, and permissionless payments. By incorporating LNbits into Chain Duel, the game serves as an educational tool that introduces users to the benefits of the Lightning Network. Players gain direct experience using Lightning wallets and LNURL, helping them understand how these tools work in real-world scenarios. The near-instant nature of these payments showcases the power of Lightning in a practical context, highlighting its potential beyond just gaming. Players are encouraged to set up wallets, explore the Lightning ecosystem, and eventually become familiar with Bitcoin and Lightning technology. By integrating LNbits, Chain Duel transforms in-game payments into a learning opportunity, making Bitcoin and Lightning more approachable for users worldwide.
Tools for Developers
LNbits is a versatile, open-source platform designed to simplify and enhance Bitcoin Lightning Network wallet management. For developers, particularly those working on Lightning-native games like Chain Duel, LNbits offers an invaluable set of tools that allow for seamless integration of Lightning payments without the need to build complex custom solutions from scratch. LNbits is built on a modular and extensible architecture, enabling developers to easily add or create functionality suited to their project’s needs.
Extensible Architecture for Customization
At the core of LNbits is a simple yet powerful wallet system that developers can access across multiple devices. What makes LNbits stand out is its extensible nature—everything beyond the core functionality is implemented as an extension. This modular approach allows users to customize their LNbits installation by enabling or building extensions to suit specific use cases. This flexibility is perfect for developers who want to add Lightning-based services to their games or apps without modifying the core codebase.
- Extensions for Every Use Case
LNbits comes with a wide array of built-in extensions created by contributors, offering various services that can be plugged into your application. Some popular extensions include: - Faucets: Distribute small amounts of Bitcoin to users for testing or promotional purposes.
- Paylinks: Create shareable links for instant payments.
- Points-of-sale (PoS): Allow users to set up shareable payment terminals.
- Paywalls: Charge users to access content or services.
- Event tickets: Sell tickets for events directly via Lightning payments.
- Games and services: From dice games to jukeboxes, LNbits offers entertaining and functional tools.
These ready-made solutions can be adapted and used in different gaming scenarios, for example in Chain Duel, where LNURL extensions are used for in game payments. The extensibility ensures developers can focus on building engaging gameplay while LNbits handles payment flows.
Developer-Friendly Customization
LNbits isn't just a plug-and-play platform. Developers can extend its functionality even further by creating their own extensions, giving full control over how the wallet system is integrated into their games or apps. The architecture is designed to make it easy for developers to build on top of the platform, adding custom features for specific requirements.
Flexible Funding Source Management
LNbits also offers flexibility in terms of managing funding sources. Developers can easily connect LNbits to various Lightning Network node implementations, enabling seamless transitions between nodes or even different payment systems. This allows developers to switch underlying funding sources with minimal effort, making LNbits adaptable for games that may need to scale quickly or rely on different payment infrastructures over time.
A Lean Core System for Maximum Efficiency
Thanks to its modular architecture, LNbits maintains a lean core system. This reduces complexity and overhead, allowing developers to implement only the features they need. By avoiding bloated software, LNbits ensures faster transactions and less resource consumption, which is crucial in fast-paced environments like Chain Duel where speed and efficiency are paramount.
LNbits is designed with developers in mind, offering a suite of tools and a flexible infrastructure that makes integrating Bitcoin payments easy. Whether you’re developing games, apps, or any service that requires Lightning Network transactions, LNbits is a powerful, open-source solution that can be adapted to fit your project.
Conclusion
Chain Duel stands at the forefront of Lightning-powered gaming, combining the excitement of competitive PvP with the speed and efficiency of the Lightning Network. With LNbits handling all in-game payments, from microtransactions to automated revenue splits, developers can focus entirely on crafting an engaging gaming experience. LNbits’ powerful API and extensions make it easy to manage real-time payments, removing the complexity of building payment infrastructure from scratch.
LNbits isn’t just a payment tool — it’s a flexible, developer-friendly platform that can be adapted to any gaming model. Whether you're developing a fast-paced PvP game like Chain Duel or any project requiring seamless Lightning Network integration, LNbits provides the ideal solution for handling instant payments with minimal overhead.
For developers interested in pushing the boundaries of Lightning-powered gaming, Chain Duel is a great example of how LNbits can enhance your game, letting you focus on the fun while LNbits manages real-time transactions.
Find out more
Curious about how Lightning Network payments can power your next game? Explore the following:
- Learn more about Chain Duel: Chain Duel
- Learn how LNbits can simplify payment handling in your project: LNbits
- Dive into decentralized communication with Nostr: Nostr
- Extensions for Every Use Case
-
@ 3bf0c63f:aefa459d
2024-01-14 13:55:28WelcomeBot
The first bot ever created for Trello.
It invited to a public board automatically anyone who commented on a card he was added to.
-
@ c4f5e7a7:8856cac7
2024-09-27 08:20:16Best viewed on Habla, YakiHonne or Highlighter.
TL;DR
This article explores the links between public, community-driven data sources (such as OpenStreetMap) and private, cryptographically-owned data found on networks such as Nostr.
The following concepts are explored:
- Attestations: Users signalling to their social graph that they believe something to be true by publishing Attestations. These social proofs act as a decentralised verification system that leverages your web-of-trust.
- Proof of Place: An oracle-based system where physical letters are sent to real-world locations, confirming the corresponding digital ownership via cryptographic proofs. This binds physical locations in meatspace with their digital representations in the Nostrverse.
- Check-ins: Foursquare-style check-ins that can be verified using attestations from place owners, ensuring authenticity. This approach uses web-of-trust to validate check-ins and location ownership over time.
The goal is to leverage cryptographic ownership where necessary while preserving the open, collaborative nature of public data systems.
Open Data in a public commons has a place and should not be thrown out with the Web 2.0 bathwater.
Cognitive Dissonance
Ever since discovering Nostr in August of 2022 I've been grappling with how BTC Map - a project that helps bitcoiners find places to spend sats - should most appropriately use this new protocol.
I am assuming, dear reader, that you are somewhat familiar with Nostr - a relatively new protocol for decentralised identity and communication. If you don’t know your nsec from your npub, please take some time to read these excellent posts: Nostr is Identity for the Internet and The Power of Nostr by @max and @lyn, respectively. Nostr is so much more than a short-form social media replacement.
The social features (check-ins, reviews, etc.) that Nostr unlocks for BTC Map are clear and exciting - all your silos are indeed broken - however, something fundamental has been bothering me for a while and I think it comes down to data ownership.
For those unfamiliar, BTC Map uses OpenStreetMap (OSM) as its main geographic database. OSM is centred on the concept of a commons of objectively verifiable data that is maintained by a global community of volunteer editors; a Wikipedia for maps. There is no data ownership; the data is free (as in freedom) and anyone can edit anything. It is the data equivalent of FOSS (Free and Open Source Software) - FOSD if you will, but more commonly referred to as Open Data.
In contrast, Notes and Other Stuff on Nostr (Places in this cartographic context) are explicitly owned by the controller of the private key. These notes are free to propagate, but they are owned.
How do we reconcile the decentralised nature of Nostr, where data is cryptographically owned by individuals, with the community-managed data commons of OpenStreetMap, where no one owns the data?
Self-sovereign Identity
Before I address this coexistence question, I want to talk a little about identity as it pertains to ownership. If something is to be owned, it has to be owned by someone or something - an identity.
All identities that are not self-sovereign are, by definition, leased to you by a 3rd party. You rent your Facebook identity from Meta in exchange for your data. You rent your web domain from your DNS provider in exchange for your money.
Taken to the extreme, you rent your passport from your Government in exchange for your compliance. You are you at the pleasure of others. Where Bitcoin separates money from the state; Nostr separates identity from the state.
Or, as @nvk said recently: "Don't build your house on someone else's land.".
https://i.nostr.build/xpcCSkDg3uVw0yku.png
While we’ve had the tools for self-sovereign digital identity for decades (think PGP keys or WebAuthN), we haven't had the necessary social use cases nor the corresponding social graph to elevate these identities to the mainstream. Nostr fixes this.
Nostr is PGP for the masses and will take cryptographic identities mainstream.
Full NOSTARD?
Returning to the coexistence question: the data on OpenStreetMap isn’t directly owned by anyone, even though the physical entities the data represents might be privately owned. OSM is a data commons.
We can objectively agree on the location of a tree or a fire hydrant without needing permission to observe and record it. Sure, you could place a tree ‘on Nostr’, but why should you? Just because something can be ‘on Nostr’ doesn’t mean it should be.
https://i.nostr.build/s3So2JVAqoY4E1dI.png
There might be a dystopian future where we can't agree on what a tree is nor where it's located, but I hope we never get there. It's at this point we'll need a Wikifreedia variant of OpenStreetMap.
While integrating Nostr identities into OpenStreetMap would be valuable, the current OSM infrastructure, tools, and community already provide substantial benefits in managing this data commons without needing to go NOSTR-native - there's no need to go Full NOSTARD. H/T to @princeySOV for the original meme.
https://i.nostr.build/ot9jtM5cZtDHNKWc.png
So, how do we appropriately blend cryptographically owned data with the commons?
If a location is owned in meatspace and it's useful to signal that ownership, it should also be owned in cyberspace. Our efforts should therefore focus on entities like businesses, while allowing the commons to manage public data for as long as it can successfully mitigate the tragedy of the commons.
The remainder of this article explores how we can:
- Verify ownership of a physical place in the real world;
- Link that ownership to the corresponding digital place in cyberspace.
As a side note, I don't see private key custodianship - or, even worse, permissioned use of Places signed by another identity's key - as any more viable than the rented identities of Web 2.0.
And as we all know, the Second Law of Infodynamics (no citation!) states that:
"The total amount of sensitive information leaked will always increase over time."
This especially holds true if that data is centralised.
Not your keys, not your notes. Not your keys, not your identity.
Places and Web-of-Trust
@Arkinox has been leading the charge on the Places NIP, introducing Nostr notes (kind 37515) that represent physical locations. The draft is well-crafted, with bonus points for linking back to OSM (and other location repositories) via NIP-73 - External Content IDs (championed by @oscar of @fountain).
However, as Nostr is permissionless, authenticity poses a challenge. Just because someone claims to own a physical location on the Internet doesn’t necessarily mean they have ownership or control of that location in the real world.
Ultimately, this problem can only be solved in a decentralised way by using Web-of-Trust - using your social graph and the perspectives of trusted peers to inform your own perspective. In the context of Places, this requires your network to form a view on which digital identity (public key / npub) is truly the owner of a physical place like your local coffee shop.
This requires users to:
- Verify the owner of a Place in cyberspace is the owner of a place in meatspace.
- Signal this verification to their social graph.
Let's look at the latter idea first with the concept of Attestations ...
Attestations
A way to signal to your social graph that you believe something to be true (or false for that matter) would be by publishing an Attestation note. An Attestation note would signify to your social graph that you think something is either true or false.
Imagine you're a regular at a local coffee shop. You publish an Attestation that says the shop is real and the owner behind the Nostr public key is who they claim to be. Your friends trust you, so they start trusting the shop's digital identity too.
However, attestations applied to Places are just a single use case. The attestation concept could be more widely applied across Nostr in a variety of ways (key rotation, identity linking, etc).
Here is a recent example from @lyn that would carry more signal if it were an Attestation:
https://i.nostr.build/lZAXOEwvRIghgFY4.png
Parallels can be drawn between Attestations and transaction confirmations on the Bitcoin timechain; however, their importance to you would be weighted by clients and/or Data Vending Machines in accordance with:
- Your social graph;
- The type or subject of the content being attested and by whom;
- Your personal preferences.
They could also have a validity duration to be temporally bound, which would be particularly useful in the case of Places.
NIP-25 (Reactions) do allow for users to up/downvote notes with optional content (e.g., emojis) and could work for Attestations, but I think we need something less ambiguous and more definitive.
‘This is true’ resonates more strongly than ‘I like this.’.
https://i.nostr.build/s8NIG2kXzUCLcoax.jpg
There are similar concepts in the Web 3 / Web 5 world such as Verified Credentials by tdb. However, Nostr is the Web 3 now and so wen Attestation NIP?
https://i.nostr.build/Cb047NWyHdJ7h5Ka.jpg
That said, I have seen @utxo has been exploring ‘smart contracts’ on nostr and Attestations may just be a relatively ‘dumb’ subset of the wider concept Nostr-native scripting combined with web-of-trust.
Proof of Place
Attestations handle the signalling of your truth, but what about the initial verification itself?
We already covered how this ultimately has to be derived from your social graph, but what if there was a way to help bootstrap this web-of-trust through the use of oracles? For those unfamiliar with oracles in the digital realm, they are simply trusted purveyors of truth.
Introducing Proof of Place, an out–of-band process where an oracle (such as BTC Map) would mail - yes physically mail- a shared secret to the address of the location being claimed in cyberspace. This shared secret would be locked to the public key (npub) making the claim, which, if unlocked, would prove that the associated private key (nsec) has physical access to the location in meatspace.
One way of doing this would be to mint a 1 sat cashu ecash token locked to the npub of the claimant and mail it to them. If they are able to redeem the token then they have cryptographically proven that they have physical access to the location.
Proof of Place is really nothing more than a weighted Attestation. In a web-of-trust Nostrverse, an oracle is simply a npub (say BTC Map) that you weigh heavily for its opinion on a given topic (say Places).
In the Bitcoin world, Proof of Work anchors digital scarcity in cyberspace to physical scarcity (energy and time) in meatspace and as @Gigi says in PoW is Essential:
"A failure to understand Proof of Work, is a failure to understand Bitcoin."
In the Nostrverse, Proof of Place helps bridge the digital and physical worlds.
@Gigi also observes in Memes vs The World that:
"In Bitcoin, the map is the territory. We can infer everything we care about by looking at the map alone."
https://i.nostr.build/dOnpxfI4u7EL2v4e.png
This isn’t true for Nostr.
In the Nostrverse, the map IS NOT the territory. However, Proof of Place enables us to send cryptographic drones down into the physical territory to help us interpret our digital maps. 🤯
Check-ins
Although not a draft NIP yet, @Arkinox has also been exploring the familiar concept of Foursquare-style Check-ins on Nostr (with kind 13811 notes).
For the uninitiated, Check-ins are simply notes that signal the publisher is at a given location. These locations could be Places (in the Nostr sense) or any other given digital representation of a location for that matter (such as OSM elements) if NIP-73 - External Content IDs are used.
Of course, not everyone will be a Check-in enjoyooor as the concept will not sit well with some people’s threat models and OpSec practices.
Bringing Check-ins to Nostr is possible (as @sebastix capably shows here), but they suffer the same authenticity issues as Places. Just because I say I'm at a given location doesn't mean that I am.
Back in the Web 2.0 days, Foursquare mitigated this by relying on the GPS position of the phone running their app, but this is of course spoofable.
How should we approach Check-in verifiability in the Nostrverse? Well, just like with Places, we can use Attestations and WoT. In the context of Check-ins, an Attestation from the identity (npub) of the Place being checked-in to would be a particularly strong signal. An NFC device could be placed in a coffee shop and attest to check-ins without requiring the owner to manually intervene - I’m sure @blackcoffee and @Ben Arc could hack something together over a weekend!
Check-ins could also be used as a signal for bonafide Place ownership over time.
Summary: Trust Your Bros
So, to recap, we have:
Places: Digital representations of physical locations on Nostr.
Check-ins: Users signalling their presence at a location.
Attestations: Verifiable social proofs used to confirm ownership or the truth of a claim.
You can visualise how these three concepts combine in the diagram below:
https://i.nostr.build/Uv2Jhx5BBfA51y0K.jpg
And, as always, top right trumps bottom left! We have:
Level 0 - Trust Me Bro: Anyone can check-in anywhere. The Place might not exist or might be impersonating the real place in meatspace. The person behind the npub may not have even been there at all.
Level 1 - Definitely Maybe Somewhere: This category covers the middle-ground of ‘Maybe at a Place’ and ‘Definitely Somewhere’. In these examples, you are either self-certifying that you have checked-in at an Attested Place or you are having others attest that you have checked-in at a Place that might not even exist IRL.
Level 2 - Trust Your Bros: An Attested Check-in at an Attested Place. Your individual level of trust would be a function of the number of Attestations and how you weigh them within your own social graph.
https://i.nostr.build/HtLAiJH1uQSTmdxf.jpg
Perhaps the gold standard (or should that be the Bitcoin standard?) would be a Check-in attested by the owner of the Place, which in itself was attested by BTC Map?
Or perhaps not. Ultimately, it’s the users responsibility to determine what they trust by forming their own perspective within the Nostrverse powered by web-of-trust algorithms they control. ‘Trust Me Bro’ or ‘Trust Your Bros’ - you decide.
As we navigate the frontier of cryptographic ownership and decentralised data, it’s up to us to find the balance between preserving the Open Data commons and embracing self-sovereign digital identities.
Thanks
With thanks to Arkinox, Avi, Ben Gunn, Kieran, Blackcoffee, Sebastix, Tomek, Calle, Short Fiat, Ben Weeks and Bitcoms for helping shape my thoughts and refine content, whether you know it or not!
-
@ 220522c2:61e18cb4
2024-08-25 11:37:32I'm working on a new long form content site here if anyone is interested, It's a complete rewrite for blogstack that I started about a week ago so it's still missing some core features (like zaps, writing articles deletes etc..) any feedback would be appreciated. https://notestack.com/ -
@ a95c6243:d345522c
2024-10-19 08:58:08Ein Lämmchen löschte an einem Bache seinen Durst. Fern von ihm, aber näher der Quelle, tat ein Wolf das gleiche. Kaum erblickte er das Lämmchen, so schrie er:
"Warum trübst du mir das Wasser, das ich trinken will?"
"Wie wäre das möglich", erwiderte schüchtern das Lämmchen, "ich stehe hier unten und du so weit oben; das Wasser fließt ja von dir zu mir; glaube mir, es kam mir nie in den Sinn, dir etwas Böses zu tun!"
"Ei, sieh doch! Du machst es gerade, wie dein Vater vor sechs Monaten; ich erinnere mich noch sehr wohl, daß auch du dabei warst, aber glücklich entkamst, als ich ihm für sein Schmähen das Fell abzog!"
"Ach, Herr!" flehte das zitternde Lämmchen, "ich bin ja erst vier Wochen alt und kannte meinen Vater gar nicht, so lange ist er schon tot; wie soll ich denn für ihn büßen."
"Du Unverschämter!" so endigt der Wolf mit erheuchelter Wut, indem er die Zähne fletschte. "Tot oder nicht tot, weiß ich doch, daß euer ganzes Geschlecht mich hasset, und dafür muß ich mich rächen."
Ohne weitere Umstände zu machen, zerriß er das Lämmchen und verschlang es.
Das Gewissen regt sich selbst bei dem größten Bösewichte; er sucht doch nach Vorwand, um dasselbe damit bei Begehung seiner Schlechtigkeiten zu beschwichtigen.
Quelle: https://eden.one/fabeln-aesop-das-lamm-und-der-wolf
-
@ 3bf0c63f:aefa459d
2024-01-14 13:55:28On the state of programs and browsers
Basically, there are basically (not exhaustively) 2 kinds of programs one can run in a computer nowadays:
1.1. A program that is installed, permanent, has direct access to the Operating System, can draw whatever it wants, modify files, interact with other programs and so on; 1.2. A program that is transient, fetched from someone else's server at run time, interpreted, rendered and executed by another program that bridges the access of that transient program to the OS and other things.
Meanwhile, web browsers have basically (not exhaustively) two use cases:
2.1. Display text, pictures, videos hosted on someone else's computer; 2.2. Execute incredibly complex programs that are fetched at run time, executed and so on -- you get it, it's the same 1.2.
These two use cases for browsers are at big odds with one another. While stretching itsel f to become more and more a platform for programs that can do basically anything (in the 1.1 sense) they are still restricted to being an 1.2 platform. At the same time, websites that were supposed to be on 2.1 sometimes get confused and start acting as if they were 2.2 -- and other confusing mixed up stuff.
I could go hours in philosophical inquiries on the nature of browsers, how rewriting everything in JavaScript is not healthy or where everything went wrong, but I think other people have done this already.
One thing that bothers me a lot, though, is that computers can do a lot of things, and with the internet and in the current state of the technology it's fairly easy to implement tools that would help in many aspects of human existence and provide high-quality, useful programs, with the help of a server to coordinate access, store data, authenticate users and so on many things are possible. However, due to the nature of UI in the browser, it's very hard to get any useful tool to users.
Writing a UI, even the most basic UI imaginable (some text input boxes and some buttons, or a table) can take a long time, always more than the time necessary to code the actual core features of whatever program is being developed -- and that is considering that the person capable of writing interesting programs that do the functionality in the backend are also capable of interacting with JavaScript and the giant amount of frameworks, transpilers, styling stuff, CSS, the fact that all this is built on top of HTML and so on.
This is not good.
-
@ 7460b7fd:4fc4e74b
2024-09-05 08:37:48请看2014年王兴的一场思维碰撞,视频27分钟开始
最后,一个当时无法解决的点:丢失
-
@ 3bf0c63f:aefa459d
2024-01-14 13:55:28The unit test bubble
Look at the following piece of Go code:
func NewQuery(query []rune) *Query { q := &Query{ query: &[]rune{}, complete: &[]rune{}, } _ = q.Set(query) return q } func NewQueryWithString(query string) *Query { return NewQuery([]rune(query)) }
It is taken from a GitHub project with over 2000 stars.
Now take a look at these unit tests for the same package:
``` func TestNewQuery(t *testing.T) { var assert = assert.New(t)
v := []rune(".name") q := NewQuery(v) assert.Equal(*q.query, []rune(".name")) assert.Equal(*q.complete, []rune(""))
}
func TestNewQueryWithString(t *testing.T) { var assert = assert.New(t)
q := NewQueryWithString(".name") assert.Equal(*q.query, []rune(".name")) assert.Equal(*q.complete, []rune(""))
} ```
Now be honest: what are these for? Is this part of an attack to eat all GitHub storage and head them to bankruptcy?
Also
-
@ 266815e0:6cd408a5
2024-05-09 17:23:28Lot of people are starting to talk about building a web-of-trust and how nostr can or is already being used as such
We all know about using the kind:3 following lists as a simple WoT that can be used to filter out spam. but as we all know it does not really signal "trust", its mostly just "I find your content interesting"
But what about real "trust"... well its kind of multi-denominational, I could trust that your a good developer or a good journalist but still not trust you enough to invite you over to my house. There are some interesting and clever solutions proposed for quantifying "trust" in a digital sense but I'm not going to get into that here. I want to talk about something that I have not see anyone discuss yet.
How is the web-of-trust maintained? or more precisely how do you expect users to update the digital representation of the "trust" of other users?
Its all well and good to think of how a user would create that "trust" of another user when discovering them for the first time. They would click the "follow" button, or maybe even rate them on a few topics with a 1/5 star system But how will a user remove that trust? how will they update it if things change and they trust them less?
If our goal is to model "trust" in a digital sense then we NEED a way for the data to stay up-to-date and as accurate as possible. otherwise whats the use? If we don't have a friction-less way to update or remove the digital representation of "trust" then we will end up with a WoT that continuously grows and everyone is rated 10/10
In the case of nostr kind:3 following lists. its pretty easy to see how these would get updated. If someone posts something I dislike or I notice I'm getting board of their content. then I just unfollow them. An important part here is that I'm not thinking "I should update my trust score of this user" but instead "I'm no longer interested, I don't want to see this anymore"
But that is probably the easiest "trust" to update. because most of us on social media spend some time curating our feed and we are used to doing it. But what about the more obscure "trust" scores? whats the regular mechanism by which a user would update the "honestly" score of another user?
In the real world its easy, when I stop trusting someone I simply stop associating with them. there isn't any button or switch I need to update. I simply don't talk to them anymore, its friction-less But in the digital realm I would have to remove or update that trust. in other words its an action I need to take instead of an action I'm not doing. and actions take energy.
So how do we reflect something in the digital world that takes no-energy and is almost subconscious in the real world?
TLDR; webs-of-trust are not just about scoring other users once. you must keep the score up-to-date
-
@ 101b30ee:18a46a45
2025-01-02 17:28:15
ハンドシェイク
- HTTPリクエスト解析
- [ ] HTTPリクエストラインのパーサー関数作成
- [x] HTTPヘッダーのパーサー関数作成
- [ ] HTTPリクエストボディのパーサー関数作成
- [ ] WebSocket関連ヘッダーの検証
- [ ]
Upgrade: websocket
- [ ]
Connection: Upgrade
- [ ]
Sec-WebSocket-Key
の取得と検証 - [ ]
Sec-WebSocket-Version: 13
の検証
- [ ]
- HTTPレスポンス作成
- [ ]
Sec-WebSocket-Accept
の生成- [x]
Sec-WebSocket-Key
にSHA-1適用(外部依存) - [ ]
Sec-WebSocket-Key
にSHA-1適用(非依存) - [x]
Sec-WebSocket-Key
にBase64エンコードを適用
- [x]
- [x] HTTP 101 Switching Protocolsレスポンスの構築と送信
データ転送
WebSocketフレームの処理
- フレーム解析
- [x]
fin
ビットの取り出しと解釈 - [x]
rsv1
,rsv2
,rsv3
の取り出しと検証 - [ ]
opcode
の取り出しと処理- [ ] 0x0: 継続フレーム
- [ ] 0x1: テキストフレーム
- [ ] 0x2: バイナリフレーム
- [ ] 0x8: 接続終了
- [ ] 0x9: Ping
- [ ] 0xA: Pong
- [x]
mask
フラグの取得と検証 - [x]
payload_len
の取り出しと解析 - [x] 拡張されたペイロード長(
extended payload len
)の取り出し - [x]
masking key
の取得とデコード - [x]
payload
データの取り出し - [ ]
fin
に基づく分割パケット対応 - デコード
- [x]
masking key
を使用したペイロードデコード - opcode別処理
- [ ] テキストフレーム(0x1)のUTF-8デコードと処理
- [ ] バイナリフレーム(0x2)のデータ処理
- [ ] Ping(0x9)フレームへのPong応答
- [ ] 接続終了(0x8)の処理
- [ ] 不正なopcodeに対するエラー応答
フレーム生成
- フレーム構築
- [ ]
fin
フラグ設定 - [ ]
opcode
の設定 - [ ] ペイロードのマスキング処理(クライアント向けのみ)
- [ ] ペイロード長の設定(拡張ペイロード長を含む)
- [ ] フレーム全体のバイトストリーム化
接続管理
- [x] クライアント接続の確立
- [x] 2クライアント以上の接続の確立
- [ ] 接続中のクライアントのリスト管理
- [ ] 接続のタイムアウト処理
- [ ] 不正なクライアントからの接続拒否
- [ ] 接続終了時のクリーンアップ処理
- [ ] ハートビート機能(Ping/Pong)による接続維持
セキュリティ
- [ ] WebSocket Originヘッダーの検証(許可されたオリジンのみ受け入れる)
- [ ] メッセージサイズの上限設定(大規模メッセージ攻撃の防御)
- [ ] 不正なフレーム/データに対するエラーハンドリング
- [ ] SSL/TLSサポート(wssプロトコル用)
拡張機能とプロトコルアップグレード
- [ ] サブプロトコル(Sec-WebSocket-Protocol)の処理
- [ ] 拡張(Sec-WebSocket-Extensions)のサポート
- 圧縮データのデコード (例: permessage-deflate)
テストとデバッグ
- [ ] 単体テスト
- [ ] ハンドシェイクのテスト
- [ ] フレーム解析と生成のテスト
- [ ] 各opcode処理のテスト
- [ ] 負荷テスト(高負荷時の動作確認)
- [ ] プロトコルコンフォーマンステスト
- [ ] RFC 6455に準拠しているかの確認
- [ ] ロギングとデバッグツールの実装
ドキュメント
- [ ] コードベースのコメントとドキュメント化
- [ ] WebSocketサーバーの設定と使用法についてのユーザーガイド作成
タグ
RFC6455
-
@ 220522c2:61e18cb4
2024-08-18 22:44:36Publishing a blog from comet notes to nostr #grownostr #nostr https://video.nostr.build/fa596a1ff627728f866ab32873274bc48cac0c0eea6b7a712657ffa7190cfba6.mp4 -
@ 3bf0c63f:aefa459d
2024-01-14 13:55:28A estrutura lógica do livro didático
Todos os livros didáticos e cursos expõem seus conteúdos a partir de uma organização lógica prévia, um esquema de todo o conteúdo que julgam relevante, tudo muito organizadinho em tópicos e subtópicos segundo a ordem lógica que mais se aproxima da ordem natural das coisas. Imagine um sumário de um manual ou livro didático.
A minha experiência é a de que esse método serve muito bem para ninguém entender nada. A organização lógica perfeita de um campo de conhecimento é o resultado final de um estudo, não o seu início. As pessoas que escrevem esses manuais e dão esses cursos, mesmo quando sabem do que estão falando (um acontecimento aparentemente raro), o fazem a partir do seu próprio ponto de vista, atingido após uma vida de dedicação ao assunto (ou então copiando outros manuais e livros didáticos, o que eu chutaria que é o método mais comum).
Para o neófito, a melhor maneira de entender algo é através de imersões em micro-tópicos, sem muita noção da posição daquele tópico na hierarquia geral da ciência.
- Revista Educativa, um exemplo de como não ensinar nada às crianças.
- Zettelkasten, a ordem surgindo do caos, ao invés de temas se encaixando numa ordem preexistentes.
-
@ f977c464:32fcbe00
2024-01-30 20:06:18Güneşin kaybolmasının üçüncü günü, saat öğlen on ikiyi yirmi geçiyordu. Trenin kalkmasına yaklaşık iki saat vardı. Hepimiz perondaydık. Valizlerimiz, kolilerimiz, renk renk ve biçimsiz çantalarımızla yan yana dizilmiş, kısa aralıklarla tepemizdeki devasa saati kontrol ediyorduk.
Ama ne kadar dik bakarsak bakalım zaman bir türlü istediğimiz hızla ilerlemiyordu. Herkes birkaç dakika sürmesi gereken alelade bir doğa olayına sıkışıp kalmış, karanlıktan sürünerek çıkmayı deniyordu.
Bekleme salonuna doğru döndüm. Nefesimden çıkan buharın arkasında, kalın taş duvarları ve camlarıyla morg kadar güvenli ve soğuk duruyordu. Cesetleri o yüzden bunun gibi yerlere taşımaya başlamışlardı. Demek insanların bütün iyiliği başkaları onları gördüğü içindi ki gündüzleri gecelerden daha karanlık olduğunda hemen birbirlerinin gırtlağına çökmüş, böğürlerinde delikler açmış, gözlerini oyup kafataslarını parçalamışlardı.
İstasyonun ışığı titrediğinde karanlığın enseme saplandığını hissettim. Eğer şimdi, böyle kalabalık bir yerde elektrik kesilse başımıza ne gelirdi?
İçerideki askerlerden biri bakışlarımı yakalayınca yeniden saate odaklanmış gibi yaptım. Sadece birkaç dakika geçmişti.
“Tarlalarım gitti. Böyle boyum kadar ayçiçeği doluydu. Ah, hepsi ölüp gidiyor. Afitap’ın çiçekleri de gi-”
“Dayı, Allah’ını seversen sus. Hepimizi yakacaksın şimdi.”
Karanlıkta durduğunda, görünmez olmayı istemeye başlıyordun. Kimse seni görmemeli, nefesini bile duymamalıydı. Kimsenin de ayağının altında dolaşmamalıydın; gelip kazayla sana çarpmamalılar, takılıp sendelememeliydiler. Yoksa aslında hedefi sen olmadığın bir öfke gürlemeye başlar, yaşadığın ilk şoku ve acıyı silerek üstünden geçerdi.
İlk konuşan, yaşlıca bir adam, kafasında kasketi, nasırlı ellerine hohluyordu. Gözleri ve burnu kızarmıştı. Güneşin kaybolması onun için kendi başına bir felaket değildi. Hayatına olan pratik yansımalarından korkuyordu olsa olsa. Bir anının kaybolması, bu yüzden çoktan kaybettiği birinin biraz daha eksilmesi. Hayatta kalmasını gerektiren sebepler azalırken, hayatta kalmasını sağlayacak kaynaklarını da kaybediyordu.
Onu susturan delikanlıysa atkısını bütün kafasına sarmış, sakalı ve yüzünün derinliklerine kaçmış gözleri dışında bedeninin bütün parçalarını gizlemeye çalışıyordu. İşte o, güneşin kaybolmasının tam olarak ne anlama geldiğini anlamamış olsa bile, dehşetini olduğu gibi hissedebilenlerdendi.
Güneşin onlardan alındıktan sonra kime verileceğini sormuyorlardı. En başta onlara verildiğinde de hiçbir soru sormamışlardı zaten.
İki saat ne zaman geçer?
Midemin üstünde, sağ tarafıma doğru keskin bir acı hissettim. Karaciğerim. Gözlerimi yumdum. Yanımda biri metal bir nesneyi yere bıraktı. Bir kafesti. İçerisindeki kartalın ıslak kokusu burnuma ulaşmadan önce bile biliyordum bunu.
“Yeniden mi?” diye sordu bana kartal. Kanatları kanlı. Zamanın her bir parçası tüylerinin üstüne çöreklenmişti. Gagası bir şey, tahminen et parçası geveliyor gibi hareket ediyordu. Eski anılar kolay unutulmazmış. Şu anda kafesinin kalın parmaklıklarının ardında olsa da bunun bir aldatmaca olduğunu bir tek ben biliyordum. Her an kanatlarını iki yana uzatıverebilir, hava bu hareketiyle dalgalanarak kafesi esneterek hepimizi içine alacak kadar genişleyebilir, parmaklıklar önce ayaklarımızın altına serilir gibi gözükebilir ama aslında hepimizin üstünde yükselerek tepemize çökebilirdi.
Aşağıya baktım. Tahtalarla zapt edilmiş, hiçbir yere gidemeyen ama her yere uzanan tren rayları. Atlayıp koşsam… Çantam çok ağırdı. Daha birkaç adım atamadan, kartal, suratını bedenime gömerdi.
“Bu sefer farklı,” diye yanıtladım onu. “Yeniden diyemezsin. Tekrarladığım bir şey değil bu. Hatta bir hata yapıyormuşum gibi tonlayamazsın da. Bu sefer, insanların hak etmediğini biliyorum.”
“O zaman daha vahim. Süzme salaksın demektir.”
“İnsanların hak etmemesi, insanlığın hak etmediği anlamına gelmez ki.”
Az önce göz göze geldiğim genççe ama çökük asker hâlâ bana bakıyordu. Bir kartalla konuştuğumu anlamamıştı şüphesiz. Yanımdakilerden biriyle konuştuğumu sanmış olmalıydı. Ama konuştuğum kişiye bakmıyordum ona göre. Çekingence kafamı eğmiştim. Bir kez daha göz göze geldiğimizde içerideki diğer iki askere bir şeyler söyledi, onlar dönüp beni süzerken dışarı çıktı.
Yanımızdaki, az önce konuşan iki adam da şaşkınlıkla bir bana bir kartala bakıyordu.
“Yalnız bu sefer kalbin de kırılacak, Prometheus,” dedi kartal, bana. “Belki son olur. Biliyorsun, bir sürü soruna neden oluyor bu yaptıkların.”
Beni koruyordu sözde. En çok kanıma dokunan buydu. Kasıklarımın üstüne oturmuş, kanlı suratının ardında gözleri parlarken attığı çığlık kulaklarımda titremeye devam ediyordu. Bu tabloda kimsenin kimseyi düşündüğü yoktu. Kartalın, yanımızdaki adamların, artık arkama kadar gelmiş olması gereken askerin, tren raylarının, geçmeyen saatlerin…
Arkamı döndüğümde, asker sahiden oradaydı. Zaten öyle olması gerekiyordu; görmüştüm bunu, biliyordum. Kehanetler… Bir şeyler söylüyordu ama ağzı oynarken sesi çıkmıyordu. Yavaşlamış, kendisini saatin akışına uydurmuştu. Havada donan tükürüğünden anlaşılıyordu, sinirliydi. Korktuğu için olduğunu biliyordum. Her seferinde korkmuşlardı. Beni unutmuş olmaları işlerini kolaylaştırmıyordu. Sadece yeni bir isim vermelerine neden oluyordu. Bu seferkiyle beni lanetleyecekleri kesinleşmişti.
Olması gerekenle olanların farklı olması ne kadar acınasıydı. Olması gerekenlerin doğasının kötücül olmasıysa bir yerde buna dayanıyordu.
“Salaksın,” dedi kartal bana. Zamanı aşan bir çığlık. Hepimizin önüne geçmişti ama kimseyi durduramıyordu.
Sonsuzluğa kaç tane iki saat sıkıştırabilirsiniz?
Ben bir tane bile sıkıştıramadım.
Çantama uzanıyordum. Asker de sırtındaki tüfeğini indiriyordu. Benim acelem yoktu, onunsa eli ayağı birbirine dolaşıyordu. Oysaki her şey tam olması gerektiği anda olacaktı. Kehanet başkasının parmaklarının ucundaydı.
Güneş, bir tüfeğin patlamasıyla yeryüzüne doğdu.
Rayların üzerine serilmiş göğsümün ortasından, bir çantanın içinden.
Not: Bu öykü ilk olarak 2021 yılında Esrarengiz Hikâyeler'de yayımlanmıştır.
-
@ 3bf0c63f:aefa459d
2024-01-14 13:55:28Obra aqui do lado
Tem quase um ano que estão fazendo uma obra aqui do lado e eu não ganhei nenhuma indenização. Numa sociedade sem Estado isso jamais teria acontecido.
-
@ 3bf0c63f:aefa459d
2024-01-14 13:55:28Lagoa Santa: como chegar -- partindo da rodoviária de Belo Horizonte
Ao descer de seu ônibus na rodoviária de Belo Horizonte às 4 e pouco da manhã, darás de frente para um caubói que toma cerveja em seus trajes típicos em um bar no setor mesmo de desembarque. Suba a escada à direita que dá no estacionamento da rodoviária. Vire à esquerda e caminhe por mais ou menos 400 metros, atravessando uma área onde pessoas suspeitas -- mas provavelmente dormindo em pé -- lhe observam, e então uma pracinha ocupada por um clã de mendigos. Ao avistar um enorme obelisco no meio de um cruzamento de duas avenidas, vire à esquerda e caminhe por mais 400 metros. Você verá uma enorme, antiga e bela estação com uma praça em frente, com belas fontes aqüáticas. Corra dali e dirija-se a um pedaço de rua à direita dessa praça. Um velho palco de antigos carnavais estará colocado mais ou menos no meio da simpática ruazinha de parelepípedos: é onde você pegará seu próximo ônibus.
Para entrar na estação é necessário ter um cartão com créditos recarregáveis. Um viajante prudente deixa sempre um pouco de créditos em seu cartão a fim de evitar filas e outros problemas de indisponibilidade quando chega cansado de viagem, com pressa ou em horários incomuns. Esse tipo de pessoa perceberá que foi totalmente ludibriado ao perceber que que os créditos do seu cartão, abastecido quando de sua última vinda a Belo Horizonte, há três meses, pereceram de prazo de validade e foram absorvidos pelos cofre públicos. Terá, portanto, que comprar mais créditos. O guichê onde os cartões são abastecidos abre às 5h, mas não se espante caso ele não tenha sido aberto ainda quando o primeiro ônibus chegar, às 5h10.
Com alguma sorte, um jovem de moletom, autorizado por dois ou três fiscais do sistema de ônibus que conversam alegremente, será o operador da catraca. Ele deixa entrar sem pagar os bêbados, os malandros, os pivetes. Bastante empático e perceptivo do desespero dos outros, esse bom rapaz provavelmente também lhe deixará entrar sem pagar.
Uma vez dentro do ônibus, não se intimide com os gritalhões e valentões que, ofendidíssimos com o motorista por ele ter parado nas estações, depois dos ônibus anteriores terem ignorado esses excelsos passageiros que nelas aguardavam, vão aos berros tirar satisfação.
O ponto final do ônibus, 40 minutos depois, é o terminal Morro Alto. Lá você verá, se procurar bem entre vários ônibus e pessoas que despertam a sua mais honesta suspeita, um veículo escuro, apagado, numerado 5882 e que abrigará em seu interior um motorista e um cobrador que descansam o sono dos justos.
Aguarde na porta por mais uns vinte minutos até que, repentinamente desperto, o motorista ligue o ônibus, abra as portas e já comece, de leve, a arrancar. Entre correndo, mas espere mais um tempo, enquanto as pessoas que têm o cartão carregado passem e peguem os melhores lugares, até que o cobrador acorde e resolva te cobrar a passagem nesse velho meio de pagamento, outrora o mais líqüído, o dinheiro.
Este último ônibus deverá levar-lhe, enfim, a Lagoa Santa.
-
@ 3bf0c63f:aefa459d
2024-01-14 13:55:28P2P reputation thing
Each node shares a blob of the reputations they have, which includes a confidence number. The number comes from the fact that reputations are inherited from other nodes they trust and averaged by their confidence in these. Everything is mixed for plausible deniability. By default a node only shares their stuff with people they manually add, to prevent government from crawling everybody's database. Also to each added friend nodes share a different identity/pubkey (like giving a new Bitcoin address for every transaction) (derived from hip32) (and since each identity can only be contacted by one other entity the node filters incoming connections to download their database: "this identity already been used? no, yes, used with which peer?").
Network protocol
Maybe the data uploader/offerer initiates connection to the receiver over Tor so there's only a Tor address for incoming data, never an address for a data source, i.e. everybody has an address, but only for requesting data.
How to request? Post an encrypted message in an IRC room or something similar (better if messages are stored for a while) targeted to the node/identity you want to download from, along with your Tor address. Once the node sees that it checks if you can download and contacts you.
The encrypted messages could have the target identity pubkey prefix such that the receiving node could try to decrypt only some if those with some probability of success.
Nodes can choose to share with anyone, share only with pre-approved people, share only with people who know one of their addresses/entities (works like a PIN, you give the address to someone in the street, that person can reach you, to the next person you give another address etc., you can even have a public address and share limited data with that).
Data model
Each entry in a database should be in the following format:
internal_id : real_world_identifier [, real_world_identifier...] : tag
Which means you can either associate one or multiple real world identifier with an internal id and associate the real person designated by these identifiers with a tag. the tag should be part of the standard or maybe negotiated between peers. it can be things like
scammer
,thief
,tax collector
etc., orhonest
,good dentist
etc. defining good enough labels may be tricky.internal_id
should be created by the user who made the record about the person.At first this is not necessary, but additional bloat can be added to the protocol if the federated automated message posting boards are working in the sense that each user can ask for more information about a given id and the author of that record can contact the person asking for information and deliver free text to them with the given information. For this to work the internal id must be a public key and the information delivered must be signed with the correspondent private key, so the receiver of the information will know it's not just some spammer inventing stuff, but actually the person who originated that record.
-
@ 220522c2:61e18cb4
2024-08-17 02:18:10I’m testing out running a public relay at wss://relay.notestack.com, any advice from other relay runners? #nostr #relay -
@ 3bf0c63f:aefa459d
2024-01-14 13:55:28O Planetinha
Fumaça verde me entrando pelas narinas e um coro desafinado fazia uma base melódica.
nos confins da galáxia havia um planetinha isolado. Era um planeta feliz.
O homem vestido de mago começava a aparecer por detrás da fumaça verde.
O planetinha recebeu três presentes, mas o seu habitante, o homem, estava num estado de confusão tão grande que ameaçava estragá-los. Os homens já havia escravizado o primeiro presente, a vida; lutavam contra o segundo presente, a morte; e havia alguns que achavam que deviam destruir totalmente o terceiro, o amor, e com isto levar a desordem total ao pobre planetinha perdido, que se chamava Terra.
O coro desafinado entrou antes do "Terra" cantando várias vezes, como se imitasse um eco, "terra-terra-terraaa". Depois de uma pausa dramática, o homem vestido de mago voltou a falar.
Terra, nossa nave mãe.
Neste momento eu me afastei. À frente do palco onde o mago e seu coral faziam apelos à multidão havia vários estandes cobertos com a tradicional armação de quatro pernas e lona branca. Em todos os cantos da praça havia gente, gente dos mais variados tipos. Visitantes curiosos que se aproximavam atraídos pela fumaça verde e as barraquinhas, gente que aproveitava o movimento para vender doces sem pagar imposto, casais que se abraçavam de pé para espantar o frio, os tradicionais corredores que faziam seu cooper, gente cheia de barba e vestida para imitar os hippies dos anos 60 e vender colares estendidos no chão, transeuntes novos e velhos, vestidos como baladeiros ou como ativistas do ônibus grátis, grupos de ciclistas entusiastas.
O mago fazia agora apelos para que nós, os homens, habitantes do isolado planetinha, passássemos a ver o planetinha, nossa nave mãe, como um todo, e adquiríssemos a consciência de que ele estava entrando em maus lençóis. A idéia, reforçada pela logomarca do evento, era que parássemos de olhar só para a nossa vida e pensássemos no planeta.
A logomarca do evento, um desenho estilizado do planeta Terra, nada tinha a ver com seu nome: "Festival Andando de Bem com a Vida", mas havia sido ali colocada estrategicamente pelos organizadores, de quem parecia justamente sair a mensagem dita pelo mago.
Aquela multidão de pessoas que, assim como eu, tinham suas próprias preocupações, não podiam ver o quadro caótico que formavam, cada uma com seus atos isolados, ali naquela praça isolada, naquele planeta isolado. Quando o hippie barbudo, quase um Osho, assustava um casal para tentar vender-lhes um colar, a quantidade de caos que isto acrescentava à cena era gigantesca. Por um segundo, pude ver, como se estivesse de longe e acima, com toda a pretensão que este estado imaginativo carrega, a cena completa do caos.
Uma nave-mãe, dessas de ficção científica, habitada por milhões de pessoas, seguia no espaço sem rumo, e sem saber que logo à frente um longo precipício espacial a esperava, para a desgraça completa sua e de seus habitantes.
Acostumados àquela nave tanto quanto outrora estiveram acostumados à sua terra natal, os homens viviam as próprias vidas sem nem se lembrar que estavam vagando pelo espaço. Ninguém sabia quem estava conduzindo a nave, e ninguém se importava.
No final do filme descobre-se que era a soma completa do caos que cada habitante produzia, com seus gestos egoístas e incapazes de levar em conta a totalidade, é que determinava a direção da nave-mãe. O efeito, no entanto, não era imediato, como nunca é. Havia gente de verdade encarregada de conduzir a nave, mas era uma gente bêbada, mau-caráter, que vivia brigando pelo controle da nave e o poder que isto lhes dava. Poder, status, dinheiro!
Essa gente bêbada era atraída até ali pela corrupção das instituições e da moral comum que, no fundo no fundo, era causada pelo egoísmo da população, através de um complexo -- mas que no filme aparece simplificado pela ação individual de um magnata do divertimento público -- processo social.
O homem vestido de mago era mais um agente causador de caos, com sua cena cheia de fumaça e sua roupa estroboscópica, ele achava que estava fazendo o bem ao alertar sua platéia, todos as sextas-feiras, de que havia algo que precisava ser feito, que cada um que estava ali ouvindo era responsável pelo planeta. A sua incapacidade, porém, de explicar o que precisava ser feito só aumentava a angústia geral; a culpa que ele jogava sobre seu público, e que era prontamente aceita e passada em frente, aos familiares e amigos de cada um, atormentava-os diariamente e os impedia de ter uma vida decente no trabalho e em casa. As famílias, estressadas, estavam constantemente brigando e os motivos mais insignificantes eram responsáveis pelas mais horrendas conseqüências.
O mago, que após o show tirava o chapéu entortado e ia tomar cerveja num boteco, era responsável por uma parcela considerável do caos que levava a nave na direção do seu desgraçado fim. No filme, porém, um dos transeuntes que de passagem ouviu um pedaço do discurso do mago despertou em si mesmo uma consiência transformadora e, com poderes sobre-humanos que lhe foram então concedidos por uma ordem iniciática do bem ou não, usando só os seus poderes humanos mesmo, o transeunte -- na primeira versão do filme um homem, na segunda uma mulher -- consegue consertar as instituições e retirar os bêbados da condução da máquina. A questão da moral pública é ignorada para abreviar a trama, já com duas horas e quarenta de duração, mas subentende-se que ela também fora resolvida.
No planeta Terra real, que não está indo em direção alguma, preso pela gravidade ao Sol, e onde as pessoas vivem a própria vida porque lhes é impossível viver a dos outros, não têm uma consciência global de nada porque só é possível mesmo ter a consciência delas mesmas, e onde a maioria, de uma maneira ou de outra, está tentando como pode, fazer as coisas direito, o filme é exibido.
Para a maioria dos espectadores, é um filme que evoca reflexões, um filme forte. Por um segundo elas têm o mesmo vislumbre do caos generalizado que eu tive ali naquela praça. Para uma pequena parcela dos espectadores -- entre eles alguns dos que estavam na platéia do mago, o próprio mago, o seguidor do Osho, o casal de duas mulheres e o vendedor de brigadeiros, mas aos quais se somam também críticos de televisão e jornal e gente que fala pelos cotovelos na internet -- o filme é um horror, o filme é uma vulgarização de um problema real e sério, o filme apela para a figura do herói salvador e passa uma mensagem totalmente errada, de que a maioria da população pode continuar vivendo as suas própria vidinhas miseráveis enquanto espera por um herói que vem do Olimpo e os salva da mixórdia que eles mesmos causaram, é um filme que presta um enorme desserviço à causa.
No dia seguinte ao lançamento, num bar meio caro ali perto da praça, numa mesa com oito pessoas, entre elas seis do primeiro grupo e oito do segundo, discute-se se o filme levará ou não o Oscar. Eu estou em casa dormindo e não escuto nada.
-
@ 220522c2:61e18cb4
2024-08-17 01:41:50 -
@ 3bf0c63f:aefa459d
2024-01-14 13:55:28Setting up a handler for
nostr:
links on your Desktop, even if you don't use a native clientThis is the most barebones possible, it will just open a web browser at
https://nostr.guru/
with the contents of thenostr:
link.Create this file at
~/.local/share/applications/nostr-opener.desktop
:[Desktop Entry] Exec=/home/youruser/nostr-opener %u Name=Nostr Browser Type=Application StartupNotify=false MimeType=x-scheme-handler/nostr;
(Replace "youruser" with your username above.)
This will create a default handler for
nostr:
links. It will be called with the link as its first argument.Now you can create the actual program at
~/nostr-opener
. For example:```python
!/usr/bin/env python
import sys import webbrowser
nip19 = sys.argv[1][len('nostr:'):] webbrowser.open(f'https://nostr.guru/{nip19}') ```
Remember to make it executable with
chmod +x ~/nostr-opener
. -
@ f977c464:32fcbe00
2024-01-11 18:47:47Kendisini aynada ilk defa gördüğü o gün, diğerleri gibi olduğunu anlamıştı. Oysaki her insan biricik olmalıydı. Sözgelimi sinirlendiğinde bir kaşı diğerinden birkaç milimetre daha az çatılabilirdi veya sevindiğinde dudağı ona has bir açıyla dalgalanabilirdi. Hatta bunların hiçbiri mümkün değilse, en azından, gözlerinin içinde sadece onun sahip olabileceği bir ışık parlayabilirdi. Çok sıradan, öyle sıradan ki kimsenin fark etmediği o milyonlarca minik şeyden herhangi biri. Ne olursa.
Ama yansımasına bakarken bunların hiçbirini bulamadı ve diğer günlerden hiç de farklı başlamamış o gün, işe gitmek için vagonunun gelmesini beklediği alelade bir metro istasyonunda, içinde kaybolduğu illüzyon dağılmaya başladı.
İlk önce derisi döküldü. Tam olarak dökülmedi aslında, daha çok kıvılcımlara dönüşüp bedeninden fırlamış ve bir an sonra sönerek külleşmiş, havada dağılmıştı. Ardında da, kaybolmadan hemen önce, kısa süre için hayal meyal görülebilen, bir ruhun yok oluşuna ağıt yakan rengârenk peri cesetleri bırakmıştı. Beklenenin aksine, havaya toz kokusu yayıldı.
Dehşete düştü elbette. Dehşete düştüler. Panikle üstlerini yırtan 50 işçi. Her şeyin sebebiyse o vagon.
Saçları da döküldü. Her tel, yere varmadan önce, her santimde ikiye ayrıla ayrıla yok oldu.
Bütün yüzeylerin mat olduğu, hiçbir şeyin yansımadığı, suyun siyah aktığı ve kendine ancak kameralarla bakabildiğin bir dünyada, vagonun içine yerleştirilmiş bir aynadan ilk defa kendini görmek.
Gözlerinin akları buharlaşıp havada dağıldı, mercekleri boşalan yeri doldurmak için eriyip yayıldı. Gerçeği görmemek için yaratılmış, bu yüzden görmeye hazır olmayan ve hiç olmayacak gözler.
Her şeyin o anda sona erdiğini sanabilirdi insan. Derin bir karanlık ve ölüm. Görmenin görmek olduğu o anın bitişi.
Ben geldiğimde ölmüşlerdi.
Yani bozulmuşlardı demek istiyorum.
Belleklerini yeni taşıyıcılara takmam mümkün olmadı. Fiziksel olarak kusursuz durumdaydılar, olmayanları da tamir edebilirdim ama tüm o hengamede kendilerini baştan programlamış ve girdilerini modifiye etmişlerdi.
Belleklerden birini masanın üzerinden ileriye savurdu. Hınca hınç dolu bir barda oturuyorlardı. O ve arkadaşı.
Sırf şu kendisini insan sanan androidler travma geçirip delirmesin diye neler yapıyoruz, insanın aklı almıyor.
Eliyle arkasını işaret etti.
Polislerin söylediğine göre biri vagonun içerisine ayna yerleştirmiş. Bu zavallılar da kapı açılıp bir anda yansımalarını görünce kafayı kırmışlar.
Arkadaşı bunların ona ne hissettirdiğini sordu. Yani o kadar bozuk, insan olduğunu sanan androidi kendilerini parçalamış olarak yerde görmek onu sarsmamış mıydı?
Hayır, sonuçta belirli bir amaç için yaratılmış şeyler onlar. Kaliteli bir bilgisayarım bozulduğunda üzülürüm çünkü parasını ben vermişimdir. Bunlarsa devletin. Bana ne ki?
Arkadaşı anlayışla kafasını sallayıp suyundan bir yudum aldı. Kravatını biraz gevşetti.
Bira istemediğinden emin misin?
İstemediğini söyledi. Sahi, neden deliriyordu bu androidler?
Basit. Onların yapay zekâlarını kodlarken bir şeyler yazıyorlar. Yazılımcılar. Biliyorsun, ben donanımdayım. Bunlar da kendilerini insan sanıyorlar. Tiplerine bak.
Sesini alçalttı.
Arabalarda kaza testi yapılan mankenlere benziyor hepsi. Ağızları burunları bile yok ama şu geldiğimizden beri sakalını düzeltip duruyor mesela. Hayır, hepsi de diğerleri onun sakalı varmış sanıyor, o manyak bir şey.
Arkadaşı bunun delirmeleriyle bağlantısını çözemediğini söyledi. O da normal sesiyle konuşmaya devam etti.
Anlasana, aynayı falan ayırt edemiyor mercekleri. Lönk diye kendilerini görüyorlar. Böyle, olduğu gibi...
Nedenmiş peki? Ne gerek varmış?
Ne bileyim be abicim! Ahiret soruları gibi.
Birasına bakarak dalıp gitti. Sonra masaya abanarak arkadaşına iyice yaklaştı. Bulanık, bir tünelin ucundaki biri gibi, şekli şemalı belirsiz bir adam.
Ben seni nereden tanıyorum ki ulan? Kimsin sen?
Belleği makineden çıkardılar. İki kişiydiler. Soruşturmadan sorumlu memurlar.
─ Baştan mı başlıyoruz, diye sordu belleği elinde tutan ilk memur.
─ Bir kere daha deneyelim ama bu sefer direkt aynayı sorarak başla, diye cevapladı ikinci memur.
─ Bence de. Yeterince düzgün çalışıyor.
Simülasyon yüklenirken, ayakta, biraz arkada duran ve alnını kaşıyan ikinci memur sormaktan kendisini alamadı:
─ Bu androidleri niye böyle bir olay yerine göndermişler ki? Belli tost olacakları. İsraf. Gidip biz baksak aynayı kırıp delilleri mahvetmek zorunda da kalmazlar.
Diğer memur sandalyesinde hafifçe dönecek oldu, o sırada soruyu bilgisayarın hoparlöründen teknisyen cevapladı.
Hangi işimizde bir yamukluk yok ki be abi.
Ama bir son değildi. Üstlerindeki tüm illüzyon dağıldığında ve çıplak, cinsiyetsiz, birbirinin aynı bedenleriyle kaldıklarında sıra dünyaya gelmişti.
Yere düştüler. Elleri -bütün bedeni gibi siyah turmalinden, boğumları çelikten- yere değdiği anda, metronun zemini dağıldı.
Yerdeki karolar öncesinde beyazdı ve çok parlaktı. Tepelerindeki floresan, ışığını olduğu gibi yansıtıyor, tek bir lekenin olmadığı ve tek bir tozun uçmadığı istasyonu aydınlatıyorlardı.
Duvarlara duyurular asılmıştı. Örneğin, yarın akşam kültür merkezinde 20.00’da başlayacak bir tekno blues festivalinin cıvıl cıvıl afişi vardı. Onun yanında daha geniş, sarı puntolu harflerle yazılmış, yatay siyah kesiklerle çerçevesi çizilmiş, bir platformdan düşen çöp adamın bulunduğu “Dikkat! Sarı bandı geçmeyin!” uyarısı. Biraz ilerisinde günlük resmi gazete, onun ilerisinde bir aksiyon filminin ve başka bir romantik komedi filminin afişleri, yapılacakların ve yapılmayacakların söylendiği küçük puntolu çeşitli duyurular... Duvar uzayıp giden bir panoydu. On, on beş metrede bir tekrarlanıyordu.
Tüm istasyonun eni yüz metre kadar. Genişliği on metre civarı.
Önlerinde, açık kapısından o mendebur aynanın gözüktüğü vagon duruyordu. Metro, istasyona sığmayacak kadar uzundu. Bir kılıcın keskinliğiyle uzanıyor ama yer yer vagonların ek yerleriyle bölünüyordu.
Hiçbir vagonda pencere olmadığı için metronun içi, içlerindekiler meçhuldü.
Sonrasında karolar zerrelerine ayrılarak yükseldi. Floresanın ışığında her yeri toza boğdular ve ortalığı gri bir sisin altına gömdüler. Çok kısa bir an. Afişleri dalgalandırmadılar. Dalgalandırmaya vakitleri olmadı. Yerlerinden söküp aldılar en fazla. Işık birkaç kere sönüp yanarak direndi. Son kez söndüğünde bir daha geri gelmedi.
Yine de etraf aydınlıktı. Kırmızı, her yere eşit dağılan soluk bir ışıkla.
Yer tamamen tele dönüşmüştü. Altında çapraz hatlarla desteklenmiş demir bir iskelet. Işık birkaç metreden daha fazla aşağıya uzanamıyordu. Sonsuzluğa giden bir uçurum.
Duvarın yerini aynı teller ve demir iskelet almıştı. Arkasında, birbirine vidalarla tutturulmuş demir plakalardan oluşan, üstünden geçen boruların ek yerlerinden bazen ince buharların çıktığı ve bir süre asılı kaldıktan sonra ağır, yağlı bir havayla sürüklendiği bir koridor.
Diğer tarafta paslanmış, pencerelerindeki camlar kırıldığı için demir plakalarla kapatılmış külüstür bir metro. Kapının karşısındaki aynadan her şey olduğu gibi yansıyordu.
Bir konteynırın içini andıran bir evde, gerçi gayet de birbirine eklenmiş konteynırlardan oluşan bir şehirde “andıran” demek doğru olmayacağı için düpedüz bir konteynırın içinde, masaya mum görüntüsü vermek için koyulmuş, yarı katı yağ atıklarından şekillendirilmiş kütleleri yakmayı deniyordu. Kafasında hayvan kıllarından yapılmış grili siyahlı bir peruk. Aynı kıllardan kendisine gür bir bıyık da yapmıştı.
Üstünde mavi çöp poşetlerinden yapılmış, kravatlı, şık bir takım.
Masanın ayakları yerine oradan buradan çıkmış parçalar konulmuştu: bir arabanın şaft mili, üst üste konulmuş ve üstünde yazı okunamayan tenekeler, boş kitaplar, boş gazete balyaları... Hiçbir şeye yazı yazılmıyordu, gerek yoktu da zaten çünkü merkez veri bankası onları fark ettirmeden, merceklerden giren veriyi sentezleyerek insanlar için dolduruyordu. Yani, androidler için. Farklı şekilde isimlendirmek bir fark yaratacaksa.
Onların mercekleri için değil. Bağlantıları çok önceden kopmuştu.
─ Hayatım, sofra hazır, diye bağırdı yatak odasındaki karısına.
Sofrada tabak yerine düz, bardak yerine bükülmüş, çatal ve bıçak yerine sivriltilmiş plakalar.
Karısı salonun kapısında durakladı ve ancak kulaklarına kadar uzanan, kocasınınkine benzeyen, cansız, ölü hayvanların kıllarından ibaret peruğunu eliyle düzeltti. Dudağını, daha doğrusu dudağının olması gereken yeri koyu kırmızı bir yağ tabakasıyla renklendirmeyi denemişti. Biraz da yanaklarına sürmüştü.
─ Nasıl olmuş, diye sordu.
Sesi tek düzeydi ama hafif bir neşe olduğunu hissettiğinize yemin edebilirdiniz.
Üzerinde, çöp poşetlerinin içini yazısız gazete kağıtlarıyla doldurarak yaptığı iki parça giysi.
─ Çok güzelsin, diyerek kravatını düzeltti kocası.
─ Sen de öylesin, sevgilim.
Yaklaşıp kocasını öptü. Kocası da onu. Sonra nazikçe elinden tutarak, sandalyesini geriye çekerek oturmasına yardım etti.
Sofrada yemek niyetine hiçbir şey yoktu. Gerek de yoktu zaten.
Konteynırın kapısı gürültüyle tekmelenip içeri iki memur girene kadar birbirlerine öyküler anlattılar. O gün neler yaptıklarını. İşten erken çıkıp yemyeşil çimenlerde gezdiklerini, uçurtma uçurduklarını, kadının nasıl o elbiseyi bulmak için saatlerce gezip yorulduğunu, kocasının kısa süreliğine işe dönüp nasıl başarılı bir hamleyle yaşanan krizi çözdüğünü ve kadının yanına döndükten sonra, alışveriş merkezinde oturdukları yeni dondurmacının dondurmalarının ne kadar lezzetli olduğunu, boğazlarının ağrımasından korktuklarını...
Akşam film izleyebilirlerdi, televizyonda -boş ve mat bir plaka- güzel bir film oynayacaktı.
İki memur. Çıplak bedenleriyle birbirinin aynı. Ellerindeki silahları onlara doğrultmuşlardı. Mum ışığında, tertemiz bir örtünün serili olduğu masada, bardaklarında şaraplarla oturan ve henüz sofranın ortasındaki hindiye dokunmamış çifti gördüklerinde bocaladılar.
Hiç de androidlere bilinçli olarak zarar verebilecek gibi gözükmüyorlardı.
─ Sessiz kalma hakkına sahipsiniz, diye bağırdı içeri giren ikinci memur. Söylediğiniz her şey...
Cümlesini bitiremedi. Yatak odasındaki, masanın üzerinden gördüğü o şey, onunla aynı hareketleri yapan android, yoksa, bir aynadaki yansıması mıydı?
Bütün illüzyon o anda dağılmaya başladı.
Not: Bu öykü ilk olarak 2020 yılında Esrarengiz Hikâyeler'de yayımlanmıştır.
-
@ 220522c2:61e18cb4
2024-08-14 11:33:13The server costs about 6 bucks per month that’s running the relay and I’m also hosting like 3 websites from it currently, owning your own data is cheap. -
@ 5391098c:74403a0e
2025-01-02 16:50:29Ensaio em Prosa sobre Fotografia Analógica
Tenho especial fascínio pela fotografia analógica. É que se trata dum processo artístico muito mais complexo que a fotografia digital, devemos entender todos os aspectos da fotografia para obter o resultado pretendido, desde aspectos mecânicos da câmera como abertura e tempo do obturador, foco, iluminação, até a sensibilidade do filme utilizado e o resultado, quando alcançado, é verdadeira obra de arte pintada, onde a tela é a película química.
Importante dizer que meu fascínio pela fotografia analógica não me impede de reconhecer a importância da fotografia digital, não fosse essa você não estaria vendo minhas obras de arte que foram digitalizadas…
Da mesma forma que meu fascínio pela máquina de escrever não me impede de ter essa e outras páginas na internet. Parte do meu livro FILOSOFIA FUNDAMENTAL foi escrito graças a inspiração da máquina de escrever, como ocorreu no capítulo sobre o que seria evolução, escrevi integralmente na minha Olivetti Studio 46, pois havia faltado luz: o que me fez refletir sobre se o computador realmente é a evolução da máquina de escrever.
Outro exemplo foi a inspiração que as lindas formas arredondas de minha máquina de escrever da marca Érika me proporcionou, acabou resultando numa bela performance a qual dei nome de Paixão Erótika.
Por isso, acredito que os equipamentos analógicos não ofuscam nossa criatividade e na fotografia não poderia deixar de ser diferente.
No conjunto de fotografias analógicas abaixo utilizei uma Canon T50, objetiva de 50mm e filme Kodak Pro Image 100, a qual se encontra auto-fotografada em espelho, vamos ver:
Na foto abaixo utilizei luz amarela indireta da direita superior para esquerda inferior, o desfoque ao redor foi proposital com o objetivo de parecer estar olhando o mundo através das lentes da câmera, nesse caso ela estava olhando para sí mesmo. Mesmo estando a parede e o espelho no mesmo plano, a profundidade de campo do espelho é diferente, por isso esse efeito foi possível. Destaque especial para o “olho” do diafragma, deve ter aberto até f5.6, pois a luz não era muito forte. Se a luz fosse mais forte o diafragma teria aberto o mínimo f16 o que aumentaria a profundidade de campo impedindo o desfoque pretendido. O resultado foi alcançado, ao mesmo tempo que a câmera aparece, essa fotografia transmite essa mensagem subliminar:
https://image.nostr.build/a7cbfbe68a4bb89ae731c360c373ac8eff7599a5a100d13035eb234b5d788626.jpg
PERFORMANCE
Performance é o nome dado à mescla de mais de uma linguagem artística (arte visual, música, teatro, etc.) clicando em https://davipinheiro.com/id/performance/ você pode ver todas minhas performances. Nos exemplos abaixo a mescla se deu pela mistura de artes visuais criadas por mim e captadas pela fotografia analógica, vamos ver:
A foto abaixo se trata dum terrário que criei num tronco de árvore, arte plástica. Para fotografar utilizei luz amarela superior, o desfoque foi para destacar o objeto, especial destaque para o reflexo da luz no vidro para dar noção tridimensional de algo transparente:
https://image.nostr.build/e8026f9e99fa16631959954f8bb925af6f1764911f0a315ab0125bb413e3e89b.jpg
Na foto abaixo o mesmo processo da foto anterior, também utilizando uma Canon T50 com filme Kodak Pro Image 100 e objetiva de 50mm, diferenciando o enquadramento e a luz direta frontal:
https://image.nostr.build/4c44a0baf2b5ddaf63f83420952ab1b2e84f7df292f8e413a65f8134a2e7db58.jpg
A foto abaixo retrata o processo de criação da obra. Ironicamente, nessa foto, meu galo Cara de Palhaço mesmo desfocado no fundo se destacou, parecendo estar em pé no tronco:
https://image.nostr.build/d0d5e73ecbcdefa79ffd858d0143f41915c9deab7864d271d5ee724b3927f9bc.jpg
A foto abaixo se trata do pisca-alerta original da minha super DT200R (viva os motores 2 tempos!) que caiu depois de uma trilha kkk. A Ideia nesta fotografia era fazer o sol parecer estar acendendo o alerta que deveria aparentar estar flutuando no céu. Infelizmente não fui bem sucedido, pois os fios que penduravam o objeto acabaram aparecendo. É impressionante a capacidade de cálculo da Canon T50 e a velocidade do seu obturador, a nitidez da objetiva e a resolução do filme Kodak Pro Image 100, cujo conjunto conseguiu captar até os pequenos fios de nylon transparentes. Eu imaginei que a foto ia estourar e os fios não apareceriam, ledo engano. Pelo menos o enquadramento ficou correto: objeto um pouco mais acima do centro para dar sensação de altitude e levemente de perfil para dar noção 3d. Quem sabe com uma câmera que seja possível ajustar a velocidade do obturador eu seja bem sucedido…
https://image.nostr.build/808243d34b6dbeade25d38189163f9d58f6a12da9d00df17c85651d501e1bed8.jpg
A foto abaixo se trata da minha performance favorita com a fotografia analógica, pois fotografei o primeiro quadro que pintei, o qual dei o nome de Elipsoíris sendo ele posteriormente capa do meu livro FILOSOFIA FUNDAMENTAL, então aí temos três linguagens artísticas profundas na mesma performance: O quadro que virou livro fotografado analogicamente. A ideia desta performance foi enquadrar o quadro desfocado, o qual somente pode ser desvendado com os olhos certos, por isso a lente. Utilizei luz natural e uma lente velha de óculos. Especial destaque para os dois pontos de luz que refletiram na lente parecendo dois olhos, isso não foi planejado e deu um toque especial para a fotografia, cabendo diversas interpretações, esse é o objeto da arte em geral. Fiquei muuuito contente com o resultado:
https://image.nostr.build/6bb5b802b3ad1bb7262b925225fcfb0b8b00654fa0fec240be57f648c32245af.jpg
Já na fotografia analógica abaixo considero uma performance porque não se trata duma fotografia comum de paisagem, flores, arquitetura, animais ou pessoas, visa passar uma mensagem. Utilizando apenas a luz natural, regulei o foco da Canon T50 para as lentes dos meus próprios óculos e escolhi um dia especialmente nublado e escuro para simbolizar as dificuldades pelas quais todos passamos no dia-a-dia, quando acreditamos por algum momento que as luzes estão apagadas para nós, até que com os óculos certos podemos enxergar com maior nitidez o horizonte, os óculos podem ser a palavra de Deus ou qualquer outra coisa que te ilumine e esclareça. Com certeza essa fotografia terá um bom uso em meus próximos escritos:
https://image.nostr.build/b44b573bb39cdf5f2eb446e818bbf59d5dab9d3815ac6e917440b2f6b1ff431c.jpg
DUPLA EXPOSIÇÃO
Eis aqui um recurso nato da fotografia analógica: a dupla exposição. Se trata de fotografar mais de uma vez em cima do mesmo filme de modo que as imagens se sobreponham. Como esse método podemos simular movimento numa única fotografia, fazer montagens de disco voador kkkk, enfim a imaginação é o limite, vamos ver:
Nessa fotografia analógica abaixo ocorreu uma quádrupla exposição, pois cliquei quatro enquadramentos diferentes sob o mesmo filme. Foi especialmente difícil fazer porque a Canon T50 não tem esse recurso, então tive que enganá-la pressionando o botão de rebobinar o filme ao mesmo tempo que disparava a câmera. Como eu estava usando o filme Kodak Pro Image que possui asa 100, também regulei a máquina como se estivesse usando um filme asa 25, então sabia que podia disparar quatro vezes sem queimar o filme. Pedi para a modelo (minha Mãe, kkk) ficar em três posições diferentes dando a impressão de movimento e não satisfeito no final ainda fotografei o sol. Adorei essa foto:
https://image.nostr.build/5f8e2962e2ee94259d4dd5d3b777976a4d20ba293a5a4e68e81e30a0e1975543.jpg
FOTOS EM MACRO OU CLOSE
Acredito ser possível obter uma fotografia analógica em macro mesmo sem lente especial, tudo depende da pecinha que fica atrás da câmera: você, kkkk. Devemos tentar, se não obtivermos uma fotografia em macro, ao menos um close teremos, vamos ver:
Na foto abaixo há um minúsculo cogumelo que cresceu num barranco qualquer, apareceu nitidamente no negativo, mesmo sem uso de lupa, por isso considero um macro, na verdade é apenas uma foto divertida:
https://image.nostr.build/02aa4bbdc0cf54519b694c75237693fc2a6569fe4f3167220b05c7498757b822.jpg
Já a foto abaixo é apenas um close, o ninho é especialmente profundo, por isso o leve desfoque nos ovos: para dar noção de profundidade. O foco dos quatro cantos da caixa está bem ajustada para dar noção tridimensional do objeto:
https://image.nostr.build/24e5dcdd0e5a3560b341fe4f0d0d93b7d562f2d58054ac308a8e312c2707100c.jpg
O PRIMEIRO QUADRO DO ROLO
Na fotografia analógica cada rolo de filme nos dá pelo menos um tipo de fotografia artística bem específica. Se trata do primeiro quadro do rolo, onde ocorre uma parcial sobre-exposição. Isso se deve a incidência da luz diretamente no filme quando estamos carregando a máquina com o filme. A maioria das máquinas analógicas somente começa a contar os fotogramas após alguns disparos para evitar isso. Cabe ao fotógrafo saber aproveitar os fotogramas existentes antes do número 1, enquadrando a cena normalmente e disparando antes do número 1. Os resultados são quase imprevisíveis e geralmente interessantes.
Abaixo uma fotografia analógica fantástica porque quase sempre a sobre-exposição do primeiro quadro do rolo ocorre nas extremidades da foto e nessa aí ocorreu no meio. Para conseguir esse efeito carreguei a máquina no escuro e acendi a luz no exato momento que estava fechando a tampa da câmera. Por uma fração de segundo o primeiro quadro do rolo foi exposto parcialmente a luz, sabia que iria ter uma fotografia diferente, jamais imaginei que a sobre-exposição iria sair no meio do fotograma, muito curioso:
https://image.nostr.build/a2e08aab686af64df949e83b4ff3b0a00952698a7a138412f7753ebc0dd63d1f.jpg
Na fotografia abaixo repeti o mesmo processo anterior. Como o tempo entre acender a luz e fechar da máquina foi diferente a sobre-exposição ficou bem visível na extremidade da foto. Especial destaque para sua incidência no lado direito, quando deveria incidir no lado esquerdo, pois na Canon T50 o filme roda da esquerda para direita. Essa aparente inversão de lados se deu porque fotografei com a máquina de cabeça para baixo:
https://image.nostr.build/270681be8de71b6c833507dda6bfe4b5233c9b871aa97ea8fc2ebdcdd46a682a.jpg
FOTOS DE AÇÃO
Registrar uma ação com fotografia analógica é especialmente difícil se a máquina não calcula a abertura e tempo de exposição automaticamente, porque tudo acontece muito rápido e você não tem tempo de ficar pensando. Felizmente a Canon T50 é muito boa para esse tipo de fotografia, tive que me preocupar apenas com o foco. O que essa máquina me fez suar para fazer as duplas exposições acima, tirou de letra esse memorável momento, vamos ver:
Na foto abaixo quando avistei esse grupo de corajosos saltando de paraglider corri pedir autorização para fotografá-los e rapidamente carreguei a máquina. Comecei a fotografar mesmo antes da máquina registrar o primeiro fotograma do rolo, tendo obtido esse lindo efeito de sobre-exposição de primeiro quadro do rolo:
https://image.nostr.build/8e32e22d3bf7c897d7111e85555146e38bb139985c50b2795fe809b31880c7d8.jpg
Já a foto abaixo foi a terceira do rolo. Tomei o cuidado de enquadrar tanto a alçada de vôo do paraglider quanto essa linda Veraneio, o que descreve em uma única foto o espírito aventureiro do pessoal. Reparem no sol refletindo sobre as nuvens, que lindo tudo:
https://image.nostr.build/5bf0444e4621406d858ab70725c1ee2f6a7e39b87663e23a18085a32b9a06f6a.jpg
Na foto abaixo tive que registrar mais uma dessa linda Veraneio, sou apaixonado por motores e mecânica, ela quase roubou a cena kkkk. Especial destaque para o detalhe do carro e da câmera que a fotografou serem da mesma época, sensível retorno ao passado. Verdadeira máquina do tempo essa foto. Se eu não dissesse que esta foto foi tirada no final do ano de 2020 daria para dizer que foi uma foto tirada de uma Veraneio Zero Km da época, segredinho nosso, kkk.
https://image.nostr.build/f5284ff30986ad84d22f137e0a330067f91564907da8acf04c9eb93a991cbcf2.jpg
Na foto abaixo voltando à cena, agora do Ângulo certo kkk. Esse foi a segunda foto, perceba ainda a presença do efeito de sobre-exposição do primeiro quadro. Aqui a máquina estava marcando o primeiro fotograma, tadinha kkk
https://image.nostr.build/5c1d73f7d802fd1f730427e29f921c82e410c5dce3112a3133d6fce294d310c6.jpg
Na foto abaixo a luz estava perfeita, o sol iluminava atrás de mim, incidindo frontalmente para o enquadramento da foto, linda essa:
https://image.nostr.build/156fc878dd18257ad1f59d1b5d3fd719c7e773937356fad6ea09b0ce1f151f12.jpg
Paraglider quase em posição de vôo, a foto ficou quase perfeita porque o momento em tela era a Hora de Ouro, momento do entardecer quando a posição do sol deixa o céu dourado, fenômeno muito querido pelos fotógrafos analógicos; até pelos digitais também. Mesmo assim eu não estava satisfeito, queria fotografar mais de perto. Dei zoom correndo para frente e o resultado você vê abaixo:
https://image.nostr.build/b1f610695bd57db8abe7408df318978b6e69e85fe620a589b12fb9bcaae66156.jpg
Abaixo a fotografia analógica simplesmente perfeita, sol na posição certa, hora de ouro, perfeito enquadramento e foco, tudo certo, universo conspirando à favor… ganhei o dia sem saber. Só descobri depois que revelei. O chão não foi cortado é que o piloto do paraglider já estava no desnível do chão pronto para saltar:
https://image.nostr.build/93a7e416d11c996b65a32b019667a43124d96985109d34fd1a9b239ef365bbfe.jpg
Abaixo O salto… tive que correr para o barranco para dar zoom, outra foto perfeita na hora de ouro:
https://image.nostr.build/f254c2e71863a233816b517564dd5fb7fe85ee0bd927b02687fba43bde53dcd6.jpg
FOTOGRAFIA ANALÓGICA DE ANIMAIS
É especialmente difícil fazer um animal posar para gente, temos que ter um pouco de comida pra negociar kkk. Não fosse a Canon T50 calcular a exposição sozinha seria ainda mais difícil porque os momentos são muito rápidos e você não tem tempo para regular a abertura e tempo de exposição, tive que regular apenas o foco. Mais um ponto para essa notável máquina que me fez apanhar na dupla exposição acima. A fotografia analógica de animais também é um tipo de fotografia de ação, temos que ser rápidos no gatilho, vamos ver os resultados:
Abaixo novamente dei zoom chegando bem perto, fotógrafo de verdade não tem medo, tudo pela arte!
https://image.nostr.build/5f0af116b1fd81edb3f21dfd5d7cce6c534751ac8660bd5fb58ce08c652d8aaf.jpg
Abaixo foco no segundo plano, acabei pegando os dois de perfil:
https://image.nostr.build/fbd78fcf71749569444d3438e0d5283d321fc3f3350cacc6e4a3e9a0cdc914f5.jpg
Abaixo foco no segundo plano. Aqui peguei os dois olhando para mim e dizendo xiiiis, kkk.
https://image.nostr.build/3a1f50ee1e3c6213b337654e69ee23819ab60100c8a1a049ee0b2b66fac0d8f8.jpg
Abaixo podemos comprovar que o fotômetro da Canon T50 é matricial e não pontual, porque o centro da foto tinha muito mais luz que os cantos:
https://image.nostr.build/11a8a5a7ff14a661755f04f743d70d3dd1a9d11e412791ce42f5cbf1da1c6be2.jpg
Abaixo linda foto: Cavalo da Montanha. Eu estava esperando a Hora de Ouro chegar, pena que quando chegou o modelo não quis mais ser fotografado kkk.
https://image.nostr.build/83429975966cb4b0e71e5e089651d4585513d823fea404014b0b78b21e859302.jpg
Abaixo lindo close de perfil com fundo totalmente desfocado. Preto absoluto, a fotometria esta certinha:
https://image.nostr.build/f36aed8fa89b6ba81dd77c7d3b32c24424483e626a9634cbadb16baf91427d66.jpg
Abaixo muita coisa acontecendo ao mesmo tempo: As galinhas comendo, o milho sendo jogado, a sombra do fotógrafo… Para obter essa foto joguei o milho para o alto e tive que ser tão rápido no gatilho quanto o Kid Morengueira. Você pode perceber na minha sombra que estou segurando apenas a câmera, o pote de milho já tinha voado longe kkk. Escolhi especialmente um dia ensolarado para que o fotômetro da Canon T50 usasse toda a velocidade possível no obturador, sendo possível congelar o milho no ar sem muito efeito borrão.
https://image.nostr.build/d566e46a8a3cba8855e80295910e5addb0a8aa7735093c9f93f129cac2379472.jpg
Abaixo galinha chocando numa roda de carro. Como amo animais e carros, para montar essa cena tive que forrar uma roda velha de carro para formar um ninho e esperar, esperar e esperar… No momento certo a Jurema se sentiu confiante para entrar na roda. Nem se incomodou com minha presença pois estava de papo cheio, pois é, também tive que negociar com a galinha, isso é a fotografia analógica de animais kkk. Percebam novamente que o fotômetro da Canon T50 é matricial, pois a maior parte da foto era com pouca luz e o raio de sol que entrava estourou a foto. Percebam ainda como eu estava perto da galinha, pois foquei em sua cabeça e o resto do corpo que estava um pouco mais distante saiu desfocado. Certamente a câmera estava com abertura máxima f1.8 e com uma velocidade bem lenta, o que explica a baixa profundidade de campo. Além disso se a Jurema tivesse mexido a cabeça na hora do disparo certamente teria saído um borrão por causa da baixa velocidade. Acabou saindo tudo certo e meus dias de espera por essa foto não foram em vão.
https://image.nostr.build/d7484609c8ff9be05ee6d518def402f66484a02109dc96ef5c734b11216385bf.jpg
FOTOGRAFIA ANALÓGICA DE ARQUITETURA
Na fotografia analógica de arquitetura devemos conhecer os conceitos básicos de iluminação e preenchimento, trabalhamos apenas com luz natural e deve ser bem usada para termos a noção tridimensional da construção. Conforme ensina Fernando Bagnola, a tridimensionalidade do objeto depende da incidência da luz em três pontos diferentes e com intensidades diferentes, algo difícil de se obter apenas com a luz do sol, vamos ver:
Abaixo se trata do Museu do Olho em Curitiba/PR. Como sua parte frontal é escura e o sol se posicionava atrás da construção tive de me posicional na sua lateral, assim consegui obter um resultado tridimensional, pois o sol iluminava a parte de cima, refletia na parte de baixo em menor intensidade e na parte frontal quase não havia luz. Se eu estivesse posicionando na frente da construção o efeito tridimensional seria impossível:
https://image.nostr.build/6f74c1c7e606f7950eaf45007868b92e9a0288722b3d5e580ecaa4930700e3ea.jpg
Abaixo para minha sorte, nesse exato momento um grupo de jovens contracultura (assim como eu) passavam pelo local, tornando a foto icônica pela presença de jovens modernos contracultura contrastando com arquitetura moderna da cultura tradicional. Minha posição em relação ao sol também favoreceu o sucesso desta fotografia, tendo iluminado corretamente todos os pontos de interesse:
https://image.nostr.build/7c374205d7df21985a6a71c6c17e4f67ab29baf452f0cd406b869df94d68296c.jpg
Abaixo esse aqui é um exemplo de fotografia analógica arquitetônica errada. O enquadramento foi frontal em razão do desejo de captar o reflexo dos edifícios nos vidros negros do “olho”:
https://image.nostr.build/f9a0869a165bc7e634944c01e59085203347ab6c353610bdcaace30ee3ed8d8a.jpg
Abaixo se trata do Panteon dos Heroes na Lapa/PR um monumento erguido para guardar os corpos dos soldados das forças republicanas que pereceram durante o chamado Cerco da Lapa, batalha da Revolução Federalista de 1894. Aqui o dia estava nublado, momento perfeito para fotografar uma arquitetura tão triste como essa. Não me importei com a questão tridimensional, pois era impossível, não havia sol. Quis retratar a tristeza na foto. O filme usado foi o mesmo (Kodak Pro Image 100). Aqui percebemos que a química desse filme é ajustada para a luz amarela do sol como branco absoluto, como o céu estava nublado, a luz natural estava com temperatura mais fria o que puxou o tom mais para o azul e o roxeado da foto devem ter sido os raios ultravioleta. Se eu estivesse usando um filtro ultravioleta provavelmente a foto sairia mais acinzentada. Me recordo que nesse dia estava tudo cinza. De qualquer forma adorei esse tom arroxeado da foto. Fica a dica: conseguimos o mesmo efeito de um filme Lomochrome Purple caríssimo com um filme baratinho, basta fotografar nessas condições:
https://image.nostr.build/24f91369c12e83861f7eec38ff99f1869f08ae1eec06c798ccbe08af62263a2e.jpg
Abaixo novamente o tom arrocheado com um filme barato. Para se ter uma ideia um Lomochrome Purple costuma custar seis vezes ou mais que um que o Kodak Pro Image 100 de R$ 30,00 à R$ 40,00 na data da publicação deste artigo em 09/04/21. Percebam que no momento desta foto as nuvens deram uma trégua e alguns raios de sol passaram dando uma leve noção tridimensional da arquitetura. O certo seria eu estar um pouco mais à esquerda para aproveitar bem a iluminação. Mesmo assim, me senti feliz com a triste foto kkk pois mesmo com a luz amarela do sol refletindo o efeito Lomo-Violeta ocorreu:
https://image.nostr.build/099a1a4d7857325e59f5b35805c0ebb5c3fa55af45de2096236f1dfbadca4d4a.jpg
Abaixo parece que a foto está mal enquadrada. E está mesmo. É que no lado direito havia um poste de energia elétrica muito feio, eu não queria que aparecesse. Me preocupei apenas com a iluminação e obtive sucesso com a noção de profundidade da arquitetura. A foto está puxando para o amarelo porque a Universidade Federal do Paraná em Curitiba é meio amarela mesmo.
https://image.nostr.build/48a4d517488fc1656e027568ad314688bc0fd9995e67289003f832eb904e5260.jpg
Abaixo para finalizar o conjunto de fotografias analógicas arquitetônicas nada melhor que um cemitério, afinal todos vamos morrer um dia, devemos sempre lembrar disso para fazer nossas vidas mundanas valerem a pena. Quando morremos não levamos nada a não ser nossas experiências evolucionais, nossas graças e pecados. Devemos deixar um legado, algo positivo para quem fica. Pois bem, foi nesse contexto a foto. Para mim a morte deve ser evitada. Quando ocorrer, se fizermos tudo certo vamos para luz, as trevas são aqui na terra mesmo. Portanto, ao contrário da maioria dos fotógrafos, escolhi um dia ensolarado para fotografar ali. Quis simbolizar a luz que nos aguarda após a morte. Então me posicionei dentro do cemitério para fotografar de dentro para fora. Esperei o sol se posicionar de forma que dos portões para fora houvesse pouca luz, tal como é o mundo, deixando toda a iluminação para dentro dos portões. Percebam como pequenos detalhes fazem toda a diferença numa fotografia analógica artística. Essa foto pode perfeitamente ser usada para ilustrar qualquer material que corrobore com esse pensamento. Se eu quisesse retratar que a vida é mil maravilhas e a morte um triste fim, deveria estar do lado de fora dos portões com tudo iluminado exceto o interior do cemitério. Interessante não…
https://image.nostr.build/051592db1d3612c719621547a69bc8dfd0319d6b89656451d5b60582ae864e8e.jpg
FOTOGRAFIA ANALÓGICA DE PESSOAS
Basicamente se divide em dois tipos, a cena e o retrato. Na cena a pessoa posa para a foto sem contudo revelar sua personalidade, é uma cena criada artificialmente. Já o retrato, no conceito artístico da fotografia, ocorre quando conseguimos captar o interior da pessoa. Por exemplo: se for uma pessoa triste ela aparecerá com semblante triste, se for uma pessoa alegre com semblante alegre, não necessariamente sorrido. Se for uma pessoa sofrida suas rugas, desasseios e receios ficarão visíveis. Se for uma pessoa engraçada sentiremos vontade de rir ao ver seu retrato. O retrato é algo verdadeiro e espontâneo da pessoa. Se uma pessoa triste aparece sorrido não é um retrato e sim uma cena, vamos ver:
Abaixo normalmente na fotografia analógica de pessoas o correto é deixar o segundo plano mais escuro e o primeiro plano mais claro. Ai quis fazer diferente. Pedi para o modelo (Meu Melhor Amigo) se posicionar de costas para o sol, pois já tinha avistado aquele arco-íris no fundo. Nesse caso foi um retrato pois meu amigo apareceu sorrindo sem eu pedir e sei que ele é uma pessoa feliz e engraçada, pois vive contando piadas e seu repertório é infinito. O interessante é que esse não é um retrato comum e sim um retrato artístico, pois inverti a iluminação dos planos e ainda captei uma arco-íris, foi uma cena construida para um retrato, ideia antagônica para fotografia analógica de pessoas. Como resultado obtive uma fotografia que parece uma montagem, onde a imagem do modelo ter-se-ia sido colada sobre a paisagem, tamanha foi a diferença de iluminação entre o primeiro e segundo plano. Contudo, um pequeno raio de sol que incidiu sobre o canteiro inferior esquerdo não me deixa mentir que a fotografia é autêntica. Além disso tendo os negativos que não mentem kkk. Essa foi minha fotografia preferida de pessoas, pela qualidade do resultado artístico e pela pessoa do modelo, um abração amigo! Vou chamar essa foto de “Meu Parça na Praça”:
https://image.nostr.build/51db1df7741227dc2d86529bc9e7a93cf27365f0f2d7b591a4e84a9a05855dfb.jpg
Abaixo sou eu. Se trata apenas de uma cena simples porque minha expressão não aparece e sequer minhas roupas traduziam minha personalidade. Regulei o foco da máquina para 5 metros, entreguei-a para meu amigo e contei alguns passos para trás. Não me preocupei muito em acertar minha posição em exatos 5 metros porque o dia estava bem ensolarado e sabia qua a Canon T50 iria abrir pouco o diafragma por causa disso, o que aumentou a profundidade de campo consideravelmente. Podemos perceber no fundo a Universidade Federal do Paraná sem qualquer desfoque por causa disso. O maldito poste que tentei evitar na foto arquitetônica da UFPR acima acabou aparecendo aqui, mesmo assim gostei da foto pelo tom de cores que só a fotografia analógica nos dá.
https://image.nostr.build/ce8af555274333fa8a26375247373ca92315e87d7414bcc9ad7b5a4840cb3a21.jpg
FOTOGRAFIA ANELÓGICA DE OBJETOS
A fotografia analógica de objetos, assim como a arquitetônica, deve se obedecer os conceitos básicos de iluminação para obter noção tridimensional do objeto. Além disso, a cena montada deve combinar com o objeto para entrar em sintonia com o conceito natural de beleza, vamos ver:
Abaixo queria fotografar um objeto qualquer, então peguei essa faca. Esse objeto combina muito bem com o ambiente rústico do campo, então a finquei-a num toco de árvore com vista para o campo, tomando cuidado para ela ficar levemente torcida e dar a noção tridimensional. Naturalmente a foto ornou porque o objeto esta em sintonia com a cena. Essa deve ser a combinação da fotografia analógica de objetos, por exemplo. A não ser que o fotógrafo busque justamente causar repudia invertendo a combinação do objeto com a cena. Por exemplo: para causar nojo pode-se fotografar barro em formato de cocô num prato. Merda e comida são coisas totalmente opostas e essa inversão naturalmente é perturbadora para qualquer ser humano. Existe uma lógica natural de combinação de objetos com a cena. Enfim, podemos inclusive combinar mais de um objeto secundário para criar uma cena ao objeto principal, como veremos mais abaixo com a xícara de café:
https://image.nostr.build/6474901ce85d34aef3421ce5f720e258208c50aeb57e9893c8a750c6dc8fc1df.jpg
Na foto abaixo o objeto principal é uma caneca de café. Para criar a cena utilizei outros três objetos. O palheiro que combina com café, a tampa da objetiva da minha Canon T50 que combina com o efeito da cafeína para pensar mais rápido sobre as cenas que irei montar, e o vazo de suculenta que remete a algo mais áspero e amargo como o café e o palheiro. Se o objeto principal fosse um copo de milkshake no lugar do palheiro haveriam balas coloridas, no lugar da tampa da máquina haveria um guardanapo e no lugar da suculenta haveria um flor fofa e cor de rosa. Falando em flor vou encerrar este ensaio com o tópico sobre fotografia analógica de flores para deixar todos felizes no final:
https://image.nostr.build/8e95c6bae536cfea47e3c5d44aa63725ab8fe20eacd1c6d5eeaae1720dd0a9e5.jpg
FOTOGRAFIA ANELÓGICA DE FLORES
É um tipo de fotografia livre da fotografia analógica, sem muitas preocupações para o fotógrafo analógico, devemos atentar apenas para a vivacidade das cores e para isso o dia deve estar especialmente ensolarado. Se for fotografia interna de preferência usar luz quente (amarela), o resto é só diversão, vamos ver:
https://image.nostr.build/fc8cf663300794761b0d8dc6f1a765e3a423c65a4ad4a85a7885b00716b46533.jpg https://image.nostr.build/dc4fbe15a7b46817d66bdbeb3d0e11851999b2c1292c576fd457956436e75c77.jpg https://image.nostr.build/73fa3b1b30a088954b342294e1b0aa555a693c3ad425dea9807d2238ec529747.jpg
Viva a fotografia analógica!
Se você deseja fazer um ensaio artístico com fotografia analógia comigo entre em contato e terei o prazer de agendar o serviço.
-
@ 8fb140b4:f948000c
2023-11-21 21:37:48Embarking on the journey of operating your own Lightning node on the Bitcoin Layer 2 network is more than just a tech-savvy endeavor; it's a step into a realm of financial autonomy and cutting-edge innovation. By running a node, you become a vital part of a revolutionary movement that's reshaping how we think about money and digital transactions. This role not only offers a unique perspective on blockchain technology but also places you at the heart of a community dedicated to decentralization and network resilience. Beyond the technicalities, it's about embracing a new era of digital finance, where you contribute directly to the network's security, efficiency, and growth, all while gaining personal satisfaction and potentially lucrative rewards.
In essence, running your own Lightning node is a powerful way to engage with the forefront of blockchain technology, assert financial independence, and contribute to a more decentralized and efficient Bitcoin network. It's an adventure that offers both personal and communal benefits, from gaining in-depth tech knowledge to earning a place in the evolving landscape of cryptocurrency.
Running your own Lightning node for the Bitcoin Layer 2 network can be an empowering and beneficial endeavor. Here are 10 reasons why you might consider taking on this task:
-
Direct Contribution to Decentralization: Operating a node is a direct action towards decentralizing the Bitcoin network, crucial for its security and resistance to control or censorship by any single entity.
-
Financial Autonomy: Owning a node gives you complete control over your financial transactions on the network, free from reliance on third-party services, which can be subject to fees, restrictions, or outages.
-
Advanced Network Participation: As a node operator, you're not just a passive participant but an active player in shaping the network, influencing its efficiency and scalability through direct involvement.
-
Potential for Higher Revenue: With strategic management and optimal channel funding, your node can become a preferred route for transactions, potentially increasing the routing fees you can earn.
-
Cutting-Edge Technological Engagement: Running a node puts you at the forefront of blockchain and bitcoin technology, offering insights into future developments and innovations.
-
Strengthened Network Security: Each new node adds to the robustness of the Bitcoin network, making it more resilient against attacks and failures, thus contributing to the overall security of the ecosystem.
-
Personalized Fee Structures: You have the flexibility to set your own fee policies, which can balance earning potential with the service you provide to the network.
-
Empowerment Through Knowledge: The process of setting up and managing a node provides deep learning opportunities, empowering you with knowledge that can be applied in various areas of blockchain and fintech.
-
Boosting Transaction Capacity: By running a node, you help to increase the overall capacity of the Lightning Network, enabling more transactions to be processed quickly and at lower costs.
-
Community Leadership and Reputation: As an active node operator, you gain recognition within the Bitcoin community, which can lead to collaborative opportunities and a position of thought leadership in the space.
These reasons demonstrate the impactful and transformative nature of running a Lightning node, appealing to those who are deeply invested in the principles of bitcoin and wish to actively shape its future. Jump aboard, and embrace the journey toward full independence. 🐶🐾🫡🚀🚀🚀
-
-
@ d9e9fb27:d5fe5e1a
2025-01-02 16:31:34Colmar is a well known city in the region of Alsace, France. Its characteristic buildings, the narrow streets and the small river flowing through are worldwide famous.
However, it is during Christmas that the city gets the most attention. Thousands of people from all over Europe decide to spend one of the Advent weekends to wander around this beautiful city and hundreds of little wooden huts.
In fact, this town becomes a small Christmas village, with decorations and lights on every building and the famous Christmas market covering every possible inch of it.
Walking around this city really makes you feel the Christmas Spirit!
Of course, it can get really cold during this time of the year. That is why Alsatians wander around drinking the Vin Chaud (literally "Hot Wine"). This beverage is prepared by mixing sugar, various spices, such as cinnamon and cloves, and red wine. They are served in a plastic glass, which can be reused multpiple time or returned for a couple of Euros. However, every year the glass is designed differently, so many people keep it with them as a collectible!
Here is 2024 version:
This is the first time I try to do a photography reportage of the places I visit. I really hope you enjoyed it!Let me know what you think, every feedback is appreciated.
I will try to create more of them during my trips, so stay tuned!
Tuma
-
@ 8fb140b4:f948000c
2023-11-18 23:28:31Chef's notes
Serving these two dishes together will create a delightful centerpiece for your Thanksgiving meal, offering a perfect blend of traditional flavors with a homemade touch.
Details
- ⏲️ Prep time: 30 min
- 🍳 Cook time: 1 - 2 hours
- 🍽️ Servings: 4-6
Ingredients
- 1 whole turkey (about 12-14 lbs), thawed and ready to cook
- 1 cup unsalted butter, softened
- 2 tablespoons fresh thyme, chopped
- 2 tablespoons fresh rosemary, chopped
- 2 tablespoons fresh sage, chopped
- Salt and freshly ground black pepper
- 1 onion, quartered
- 1 lemon, halved
- 2-3 cloves of garlic
- Apple and Sage Stuffing
- 1 loaf of crusty bread, cut into cubes
- 2 apples, cored and chopped
- 1 onion, diced
- 2 stalks celery, diced
- 3 cloves garlic, minced
- 1/4 cup fresh sage, chopped
- 1/2 cup unsalted butter
- 2 cups chicken broth
- Salt and pepper, to taste
Directions
- Preheat the Oven: Set your oven to 325°F (165°C).
- Prepare the Herb Butter: Mix the softened butter with the chopped thyme, rosemary, and sage. Season with salt and pepper.
- Prepare the Turkey: Remove any giblets from the turkey and pat it dry. Loosen the skin and spread a generous amount of herb butter under and over the skin.
- Add Aromatics: Inside the turkey cavity, place the quartered onion, lemon halves, and garlic cloves.
- Roast: Place the turkey in a roasting pan. Tent with aluminum foil and roast. A general guideline is about 15 minutes per pound, or until the internal temperature reaches 165°F (74°C) at the thickest part of the thigh.
- Rest and Serve: Let the turkey rest for at least 20 minutes before carving.
- Next: Apple and Sage Stuffing
- Dry the Bread: Spread the bread cubes on a baking sheet and let them dry overnight, or toast them in the oven.
- Cook the Vegetables: In a large skillet, melt the butter and cook the onion, celery, and garlic until soft.
- Combine Ingredients: Add the apples, sage, and bread cubes to the skillet. Stir in the chicken broth until the mixture is moist. Season with salt and pepper.
- Bake: Transfer the stuffing to a baking dish and bake at 350°F (175°C) for about 30-40 minutes, until golden brown on top.
-
@ 220522c2:61e18cb4
2024-08-14 11:29:46Reading a note back from my personal relay, after spinning up a server and connecting a domain, this took like 20 seconds to get up and running with relay wizard. #relay https://video.nostr.build/f3a4405a1ffd2170711a5fc68cad05f0481181a835992a36e89a00f8c8b55511.mp4 -
@ 8fb140b4:f948000c
2023-11-02 01:13:01Testing a brand new YakiHonne native client for iOS. Smooth as butter (not penis butter 🤣🍆🧈) with great visual experience and intuitive navigation. Amazing work by the team behind it! * lists * work
Bold text work!
Images could have used nostr.build instead of raw S3 from us-east-1 region.
Very impressive! You can even save the draft and continue later, before posting the long-form note!
🐶🐾🤯🤯🤯🫂💜
-
@ 220522c2:61e18cb4
2024-08-14 11:22:38test post to my personal relay -
@ 3bf0c63f:aefa459d
2024-01-14 13:55:28fieldbook-to-sql
This used to turn books from the late multi-things-manager (or tridimensional spreadsheets provider) fieldbook.com into complete SQLite3 databases.
It was referenced in their official shutdown message and helped people move data off (it would have been better if they had open-sourced the entire site, I don't understand why they haven't).
-
@ fa0165a0:03397073
2023-10-06 19:25:08I just tested building a browser plugin, it was easier than I thought. Here I'll walk you through the steps of creating a minimal working example of a browser plugin, a.k.a. the "Hello World" of browser plugins.
First of all there are two main browser platforms out there, Chromium and Mozilla. They do some things a little differently, but similar enough that we can build a plugin that works on both. This plugin will work in both, I'll describe the firefox version, but the chromium version is very similar.
What is a browser plugin?
Simply put, a browser plugin is a program that runs in the browser. It can do things like modify the content of a webpage, or add new functionality to the browser. It's a way to extend the browser with custom functionality. Common examples are ad blockers, password managers, and video downloaders.
In technical terms, they are plugins that can insert html-css-js into your browser experience.
How to build a browser plugin
Step 0: Basics
You'll need a computer, a text editor and a browser. For testing and development I personally think that the firefox developer edition is the easiest to work with. But any Chrome based browser will also do.
Create a working directory on your computer, name it anything you like. I'll call mine
hello-world-browser-plugin
. Open the directory and create a file calledmanifest.json
. This is the most important file of your plugin, and it must be named exactly right.Step 1: manifest.json
After creation open your file
manifest.json
in your text editor and paste the following code:json { "manifest_version": 3, "name": "Hello World", "version": "1.0", "description": "A simple 'Hello World' browser extension", "content_scripts": [ { "matches": ["<all_urls>"], "js": ["hello.js"] //The name of your script file. // "css": ["hello.css"] //The name of your css file. } ] }
If you wonder what the
json
file format is, it's a normal text file with a special syntax such that a computer can easily read it. It's thejson
syntax you see in the code above. Let's go through what's being said here. (If you are not interested, just skip to the next step after pasting this we are done here.)manifest_version
: This is the version of the manifest file format. It's currently at version 3, and it's the latest version. It's important that you set this to 3, otherwise your plugin won't work.name
: This is the name of your plugin. It can be anything you like.version
: This is the version of your plugin. It can be anything you like.description
: This is the description of your plugin. It can be anything you like.content_scripts
: This is where you define what your plugin does. It's a list of scripts that will be executed when the browser loads a webpage. In this case we have one script, calledhello.js
. It's the script that we'll create in the next step.matches
: This is a list of urls that the script will be executed on. In this case we have<all_urls>
, which means that the script will be executed on all urls. You can also specify a specific url, likehttps://brave.com/*
, which means that the script will only be executed on urls that start withhttps://brave.com/
.js
: This is a list of javascript files that will be executed. In this case we have one file, calledhello.js
. It's the script that we'll create in the next step.css
: This is where you can add a list of css files that will be executed. In this case we have none, but you can add css files here if you want to.//
: Text following these two characters are comments. They are ignored by the computer, You can add comments anywhere you like, and they are a good way to document your code.
Step 2: hello.js
Now it's time to create another file in your project folder. This time we'll call it
hello.js
. When created, open it in your text editor and paste the following code:js console.log("Hello World!");
That's javascript code, and it's what will be executed when you run your plugin. It's a simpleconsole.log
statement, which will print the text "Hello World!" to the console. The console is a place where the browser prints out messages, and it's a good place to start when debugging your plugin.Step 3: Load and launch your plugin
Firefox
Now it's time to load your plugin into your browser. Open your browser and go to the url
about:debugging#/runtime/this-firefox
. You should see a page that looks something like this:Click the button that says "Load Temporary Add-on...". A file dialog will open, navigate to your project folder and select the file
manifest.json
. Your plugin should now be loaded and running.Go to a website, any website, and open the inspector then navigate to the console. You'll find the inspector by right-clicking anywhere within the webpage, and click "Inspector" in the drop-down menu. When opening the console you might see some log messages from the site you visited and... you should see the text "Hello World!" printed there, from our little plugin! Congratulations!
Chrome
Open your browser and go to the url
chrome://extensions/
. Click the button that says "Load unpacked". A file dialog will open, navigate to your project folder and select the folderhello-world-browser-plugin
. Your plugin should now be loaded and running.Note the difference, of selecting the file
manifest.json
in firefox, and selecting the folderhello-world-browser-plugin
in chrome. Otherwise, the process is the same. So I'll repeat the same text as above: (for those who skipped ahead..)Go to a website, any website, and open the inspector then navigate to the console. You'll find the inspector by right-clicking anywhere within the webpage, and click "Inspector" in the drop-down menu. When opening the console you might see some log messages from the site you visited and... you should see the text "Hello World!" printed there, from our little plugin! Congratulations!
As you can see this isn't as complicated as one might think. Having preformed a "Hello-World!"-project is a very useful and valuable first step. These setup steps are the basics for any browser plugin, and you can build on this to create more advanced plugins.
-
@ 5ac1f045:1a8f939a
2025-01-02 15:56:18GeneRo. This general AI robot represents a significant step forward in humanoid robot technology, aiming to bridge the gap between humans and robots.AMBER Robotics, a leading provider of high-end robotic actuators and bionic humanoid robot bodies, is set to revolutionize the robotics industry with the introduction of their latest innovation,
AMBER Robotics has invested significant efforts into leveraging its mature AIOS high-precision/high dynamic performance robotic actuators to create robots with diverse configurations quickly and efficiently. By utilizing standardized and serialized components, they have developed a modular approach to humanoid robot ontology, combining AI recognition and planning. This breakthrough approach enables pre-trained general-purpose humanoid robots like GeneRo to adapt and move freely, closely resembling human behavior.
GeneRo, General Robot Advancements in AI multimodal technology have enabled GeneRo and other robots to interact with humans in more intuitive and concrete ways. These robots can acquire human-like common knowledge, allowing them to perform various tasks without relying on pre-programmed instructions. GeneRo excels in unstructured environments, making it particularly valuable in everyday life and work scenarios filled with unknown obstacles.
AMBER Robotics’ technology has already gained recognition in fields such as medical rehabilitation robots, humanoid medical rehabilitation robot platforms, bionic multi-joint mechanical arms, and humanoid robot ontologies. With operations spanning major economies worldwide, the company has established itself as a global leader in high-end robotic actuators and bionic humanoid robot bodies.
Innovative Progress in General Robotics — Simple is the Best
GeneRo is the latest addition to AMBER Robotics lineup of cutting-edge robots. Standing at approximately 1.68 meters (66 feet) tall and weighing 50 kilograms (110 pounds), this humanoid robot boasts the latest generation of AI Motion Units. These units combine ultra-high torque density force-controlled joints with integrated driving and control, enabling GeneRo to move freely in a manner closely resembling human walking. The product utilizes AMBER Robotics’ self-applicable robotic joint series AIOS, high-dynamic-performance Dynamic Motion Units (DMUs) as motion actuators, and complex scene-adaptive gait balancing algorithms.
As a leading supplier in the bioinspired robot market, AMBER Robotics recognizes the need for collaboration and progress across the entire industry chain. By fostering an open and collaborative environment, AMBER Robotics aims to facilitate rapid research, exchange of ideas, and validation of breakthrough products and technologies.
GeneRo, in collaboration with AMBER Robotics, believes that humanoid robots are the ideal intelligent carriers for complex and exploratory tasks while preserving existing infrastructures. They envision the upcoming adaptive robot body, General Robot, and general artificial intelligence technology as the operating system and mobile phones of the future, propelling new technological singularities. The combined power of General Robot and general artificial intelligence will redefine human cognitive exploration and understanding of the world, addressing fundamental human needs and revolutionizing various aspects of life, including clothing, food, shelter, transportation, social activities, and business operations.
General Robot + General Artificial Intelligence Technology: Propelling New Technological Singularities
As we enter the next decade, AMBER Robotics and GeneRo are committed to driving cross-industry collaboration, accelerating the low-threshold popularization of general-purpose robot bodies and artificial intelligence. With technology poised to transform human and natural evolutionary processes at an unprecedented pace, GeneRo represents an exciting glimpse into the future.
Genero, https://www.genero.one Social, https://facebook.com/GeneRoAI Email: generohub@gmail.comGeneRo. This general AI robot represents a significant step forward in humanoid robot technology, aiming to bridge the gap between humans and robots.AMBER Robotics, a leading provider of high-end robotic actuators and bionic humanoid robot bodies, is set to revolutionize the robotics industry with the introduction of their latest innovation,
AMBER Robotics has invested significant efforts into leveraging its mature AIOS high-precision/high dynamic performance robotic actuators to create robots with diverse configurations quickly and efficiently. By utilizing standardized and serialized components, they have developed a modular approach to humanoid robot ontology, combining AI recognition and planning. This breakthrough approach enables pre-trained general-purpose humanoid robots like GeneRo to adapt and move freely, closely resembling human behavior.
GeneRo, General Robot
Advancements in AI multimodal technology have enabled GeneRo and other robots to interact with humans in more intuitive and concrete ways. These robots can acquire human-like common knowledge, allowing them to perform various tasks without relying on pre-programmed instructions. GeneRo excels in unstructured environments, making it particularly valuable in everyday life and work scenarios filled with unknown obstacles.
AMBER Robotics’ technology has already gained recognition in fields such as medical rehabilitation robots, humanoid medical rehabilitation robot platforms, bionic multi-joint mechanical arms, and humanoid robot ontologies. With operations spanning major economies worldwide, the company has established itself as a global leader in high-end robotic actuators and bionic humanoid robot bodies.
Innovative Progress in General Robotics — Simple is the Best
GeneRo is the latest addition to AMBER Robotics lineup of cutting-edge robots. Standing at approximately 1.68 meters (66 feet) tall and weighing 50 kilograms (110 pounds), this humanoid robot boasts the latest generation of AI Motion Units. These units combine ultra-high torque density force-controlled joints with integrated driving and control, enabling GeneRo to move freely in a manner closely resembling human walking. The product utilizes AMBER Robotics’ self-applicable robotic joint series AIOS, high-dynamic-performance Dynamic Motion Units (DMUs) as motion actuators, and complex scene-adaptive gait balancing algorithms.
As a leading supplier in the bioinspired robot market, AMBER Robotics recognizes the need for collaboration and progress across the entire industry chain. By fostering an open and collaborative environment, AMBER Robotics aims to facilitate rapid research, exchange of ideas, and validation of breakthrough products and technologies.
GeneRo, in collaboration with AMBER Robotics, believes that humanoid robots are the ideal intelligent carriers for complex and exploratory tasks while preserving existing infrastructures. They envision the upcoming adaptive robot body, General Robot, and general artificial intelligence technology as the operating system and mobile phones of the future, propelling new technological singularities. The combined power of General Robot and general artificial intelligence will redefine human cognitive exploration and understanding of the world, addressing fundamental human needs and revolutionizing various aspects of life, including clothing, food, shelter, transportation, social activities, and business operations.
General Robot + General Artificial Intelligence Technology: Propelling New Technological Singularities
As we enter the next decade, AMBER Robotics and GeneRo are committed to driving cross-industry collaboration, accelerating the low-threshold popularization of general-purpose robot bodies and artificial intelligence. With technology poised to transform human and natural evolutionary processes at an unprecedented pace, GeneRo represents an exciting glimpse into the future.
Genero, https://www.genero.one\ Social, https://facebook.com/GeneRoAI\ Email: generohub@gmail.com
-
@ a853296a:209e695f
2025-01-02 15:52:12👋 What's up, stackers! 🤠
Excited to announce our latest project: Pull That Up Jamie. Think Perplexity but private & open source.
TLDR: ✨ Why Choose Jamie?
🛠️ Fully Open Source and Transparent! ⚡ BOLT11 Bitcoin/Lightning for Anonymous Usage! 🚄 Optimized for Speed and Convenience! 🆓 Limited Free Usage Available!
💦🔒🕵️ Your Biggest Opsec Leak - Why We Tackled Search
Search + LLMs seems like the peanut butter & jelly of the internet - a great match. But at what cost? Now that LLMs and AI are here, we know that finding needles in a vast haystack of data is much easier. That means that seemingly innocuous queries and interactions you have on the internet now carry way more weight than you think. How long before we all get owned? Privacy becomes all the more important. Each query empowers those who would exploit us. Every search chips away, revealing personal details about your state of mind. Stealing your soul little by little.
Just as bitcoin gives us the opportunity to opt out of exploitative economic systems, we wanted to take bitcoin's magic freedom dust and give you the ability to opt out of exploitative search surveillance 🔒🕵️.
⚡ How Bitcoin Lightning Yet Again Fixes This
Using the Bitcoin Connect plugin, we are able to accept BOLT11 payments. BOLT11, thanks to the lightning network's onion routing topology, affords users great sender privacy:
With just a VPN + an NWC connection, you can use Pull That Up Jamie with privacy assurances that are unparalleled. For very low cost, an average person can get Jason Bourne tier opsec.
🚧🧰🏗️Building Off the Great Work of Others
Major shout out to the ⚡ lightning devs that brought BOLT11 to the point it's at and especially to the 🐝 @getalby team for the great work on Bitcoin Connect. BC makes it easy to accept bitcoin payments with very little friction or overhead.
Additionally, we took notes on great projects like Perplexica. However we found that none of them were really geared toward the combination of speed, UX, and convenience we were looking for. Most of them are designed to be run in docker containers on your machine - great for techies but not accessible to the wider population.
We rolled our own from scratch, learning a lot from these projects. We especially took note of the superb qualities afforded by the SearXNG project🔍 🌐. What is SearXNG? Let's ask Pull That Up Jamie:
SearXNG is such a gamechanger that we plan to make a bitcoin payable, AI scannable endpoint just for accessing our instance. DM us if interested.
Armed with the ability to search the web and feed context to LLMs, we can Make The Internet Private Again. We can eliminate Google from your life.
⚡ Stackers do yourselves a favor - check out https://pullthatupjamie.ai today! 🤠
Future Work
- Open source models like 🦙 Llama
- Collaborating with @TonyGiorgio and team to use their secure compute LLM 🍁 Maple - https://stacker.news/items/764869 as part of the workflow
- Expert Mode: interrogate high signal sources of your choosing like podcasts, stacker news posts and others
- A couple more secret twists to keep you guessing :)
- Suggestions? Hit us with em.
originally posted at https://stacker.news/items/833717
-
@ 8fb140b4:f948000c
2023-08-22 12:14:34As the title states, scratch behind my ear and you get it. 🐶🐾🫡
-
@ 8fb140b4:f948000c
2023-07-30 00:35:01Test Bounty Note
-
@ 8fb140b4:f948000c
2023-07-22 09:39:48Intro
This short tutorial will help you set up your own Nostr Wallet Connect (NWC) on your own LND Node that is not using Umbrel. If you are a user of Umbrel, you should use their version of NWC.
Requirements
You need to have a working installation of LND with established channels and connectivity to the internet. NWC in itself is fairly light and will not consume a lot of resources. You will also want to ensure that you have a working installation of Docker, since we will use a docker image to run NWC.
- Working installation of LND (and all of its required components)
- Docker (with Docker compose)
Installation
For the purpose of this tutorial, we will assume that you have your lnd/bitcoind running under user bitcoin with home directory /home/bitcoin. We will also assume that you already have a running installation of Docker (or docker.io).
Prepare and verify
git version - we will need git to get the latest version of NWC. docker version - should execute successfully and show the currently installed version of Docker. docker compose version - same as before, but the version will be different. ss -tupln | grep 10009- should produce the following output: tcp LISTEN 0 4096 0.0.0.0:10009 0.0.0.0: tcp LISTEN 0 4096 [::]:10009 [::]:**
For things to work correctly, your Docker should be version 20.10.0 or later. If you have an older version, consider installing a new one using instructions here: https://docs.docker.com/engine/install/
Create folders & download NWC
In the home directory of your LND/bitcoind user, create a new folder, e.g., "nwc" mkdir /home/bitcoin/nwc. Change to that directory cd /home/bitcoin/nwc and clone the NWC repository: git clone https://github.com/getAlby/nostr-wallet-connect.git
Creating the Docker image
In this step, we will create a Docker image that you will use to run NWC.
- Change directory to
nostr-wallet-connect
:cd nostr-wallet-connect
- Run command to build Docker image:
docker build -t nwc:$(date +'%Y%m%d%H%M') -t nwc:latest .
(there is a dot at the end) - The last line of the output (after a few minutes) should look like
=> => naming to docker.io/library/nwc:latest
nwc:latest
is the name of the Docker image with a tag which you should note for use later.
Creating docker-compose.yml and necessary data directories
- Let's create a directory that will hold your non-volatile data (DB):
mkdir data
- In
docker-compose.yml
file, there are fields that you want to replace (<> comments) and port “4321” that you want to make sure is open (check withss -tupln | grep 4321
which should return nothing). - Create
docker-compose.yml
file with the following content, and make sure to update fields that have <> comment:
version: "3.8" services: nwc: image: nwc:latest volumes: - ./data:/data - ~/.lnd:/lnd:ro ports: - "4321:8080" extra_hosts: - "localhost:host-gateway" environment: NOSTR_PRIVKEY: <use "openssl rand -hex 32" to generate a fresh key and place it inside ""> LN_BACKEND_TYPE: "LND" LND_ADDRESS: localhost:10009 LND_CERT_FILE: "/lnd/tls.cert" LND_MACAROON_FILE: "/lnd/data/chain/bitcoin/mainnet/admin.macaroon" DATABASE_URI: "/data/nostr-wallet-connect.db" COOKIE_SECRET: <use "openssl rand -hex 32" to generate fresh secret and place it inside ""> PORT: 8080 restart: always stop_grace_period: 1m
Starting and testing
Now that you have everything ready, it is time to start the container and test.
- While you are in the
nwc
directory (important), execute the following command and check the log output,docker compose up
- You should see container logs while it is starting, and it should not exit if everything went well.
- At this point, you should be able to go to
http://<ip of the host where nwc is running>:4321
and get to the interface of NWC - To stop the test run of NWC, simply press
Ctrl-C
, and it will shut the container down. - To start NWC permanently, you should execute
docker compose up -d
, “-d” tells Docker to detach from the session. - To check currently running NWC logs, execute
docker compose logs
to run it in tail mode add-f
to the end. - To stop the container, execute
docker compose down
That's all, just follow the instructions in the web interface to get started.
Updating
As with any software, you should expect fixes and updates that you would need to perform periodically. You could automate this, but it falls outside of the scope of this tutorial. Since we already have all of the necessary configuration in place, the update execution is fairly simple.
- Change directory to the clone of the git repository,
cd /home/bitcoin/nwc/nostr-wallet-connect
- Run command to build Docker image:
docker build -t nwc:$(date +'%Y%m%d%H%M') -t nwc:latest .
(there is a dot at the end) - Change directory back one level
cd ..
- Restart (stop and start) the docker compose config
docker compose down && docker compose up -d
- Done! Optionally you may want to check the logs:
docker compose logs
-
@ 5ac1f045:1a8f939a
2025-01-02 14:58:54每一次重大技术的突破,普通大众往往只能作为消费者被动接受而成为最终的买单人。然而,我们相信,技术的进步不应让绝大多数人失去参与的机会。如果这样的情况持续发生,那一定是创业机制出了问题。
在过去三年中,机器人莫非连续受到上海傅利叶顾捷的挑衅、侵权和种种没有道德和法律底限的侵害,经过郑重考虑,我们将以此为契机发起打击非法技术盗抢的行动倡议,旨在让更多人有机会参与并分享机器人莫非直至整个AI和机器人技术进步的高成长和收益。
第一轮:以机器人莫非受侵害事件为始!
- 参与方式简单
每一个拥有可拍照手机和公交卡的普通人,都可以参与到机器人莫非的成长受益机会中。
- 股权捐赠与激励
机器人莫非已通过老股东捐赠和激励性股权的形式,在符合各国家或地区法律许可的前提下,让每一个普通人都有机会受益于AI和机器人这两大领域的突破性创新。只要有基于正义和热情的合法举动,就可以成为机器人莫非正式认可的“有贡献的投资人”身份而受益。
- 股东权益与维权
每一个“有贡献的投资人”,将以合法的形式成为公司的直接或间接股东,可以在因上海傅利叶顾捷的盗抢行为导致公司损失的追偿行动中获益。
我们郑重提醒,本轮打击行为不涉及任何现金投入,本轮任何以“机器人莫非”名义发起的现金筹集,均为假冒和诈骗行为。
- 维权授权
每一个获得机器人莫非官方股权的个人或法人,都可以发起针对侵害机器人莫非的维权、举报、投诉和诉讼活动。我们将提供基于当地国家或地区合法框架内的的正式授权书和股东证明书。
- 风险承诺
机器人莫非正式承诺:每一个“有贡献的投资人”都不需要承担因公司亏损带来的任何直接或间接损失。也就是说,只有收益、不承担任何债务。
我们期待您的积极参与,共同维护公司权益,实现技术创新的公平共享。
我们的目标是成为一家“全民参与、全民创新、全民受益”的基于AI机器人的创新实体,让每一个有良知的人都可以分享到因AI和机器人技术进步而带来的收益和高成长性。
我们将稍后将根据综合反馈推出具体行动细则。
机器人莫非 日期:2024年6月25日
机器人莫非简介:
机器人莫非开创了标准化、系列化的机器人专用关节,结合高性能驱动器研制和发布了系列多关节机械臂B1,L1及仿生人形机器人本体和解决方案。
赢得的客户包括全球性国际际化企业、各领域细分隐形冠军企业及众多知名院校及研究机构。
**我们保留对“合格投资人”的最终解释权,到目前为止,下面这些人将不符合资格:
1,上海傅利叶顾捷本人、家人及与其三代血亲相关的人和宠物;
2,参与盗抢机器人莫非技术秘密、有形资产有关联的人(提供证据并帮助挽回损失的除外)。每一次重大技术的突破,普通大众往往只能作为消费者被动接受而成为最终的买单人。然而,我们相信,技术的进步不应让绝大多数人失去参与的机会。如果这样的情况持续发生,那一定是创业机制出了问题。
在过去三年中,机器人莫非连续受到上海傅利叶顾捷的挑衅、侵权和种种没有道德和法律底限的侵害,经过郑重考虑,我们将以此为契机发起打击非法技术盗抢的行动倡议,旨在让更多人有机会参与并分享机器人莫非直至整个AI和机器人技术进步的高成长和收益。
第一轮:以机器人莫非受侵害事件为始!
1. 参与方式简单
每一个拥有可拍照手机和公交卡的普通人,都可以参与到机器人莫非的成长受益机会中。
2. 股权捐赠与激励
机器人莫非已通过老股东捐赠和激励性股权的形式,在符合各国家或地区法律许可的前提下,让每一个普通人都有机会受益于AI和机器人这两大领域的突破性创新。只要有基于正义和热情的合法举动,就可以成为机器人莫非正式认可的“有贡献的投资人”身份而受益。
3. 股东权益与维权
每一个“有贡献的投资人”,将以合法的形式成为公司的直接或间接股东,可以在因上海傅利叶顾捷的盗抢行为导致公司损失的追偿行动中获益。
我们郑重提醒,本轮打击行为不涉及任何现金投入,本轮任何以“机器人莫非”名义发起的现金筹集,均为假冒和诈骗行为。
4. 维权授权
每一个获得机器人莫非官方股权的个人或法人,都可以发起针对侵害机器人莫非的维权、举报、投诉和诉讼活动。我们将提供基于当地国家或地区合法框架内的的正式授权书和股东证明书。
5. 风险承诺
机器人莫非正式承诺:每一个“有贡献的投资人”都不需要承担因公司亏损带来的任何直接或间接损失。也就是说,只有收益、不承担任何债务。
我们期待您的积极参与,共同维护公司权益,实现技术创新的公平共享。
我们的目标是成为一家“全民参与、全民创新、全民受益”的基于AI机器人的创新实体,让每一个有良知的人都可以分享到因AI和机器人技术进步而带来的收益和高成长性。
我们将稍后将根据综合反馈推出具体行动细则。
机器人莫非
日期:2024年6月25日
机器人莫非简介:
机器人莫非开创了标准化、系列化的机器人专用关节,结合高性能驱动器研制和发布了系列多关节机械臂B1,L1及仿生人形机器人本体和解决方案。
赢得的客户包括全球性国际际化企业、各领域细分隐形冠军企业及众多知名院校及研究机构。
**我们保留对“合格投资人”的最终解释权,到目前为止,下面这些人将不符合资格:
1,上海傅利叶顾捷本人、家人及与其三代血亲相关的人和宠物;
2,参与盗抢机器人莫非技术秘密、有形资产有关联的人(提供证据并帮助挽回损失的除外)。
-
@ 2063cd79:57bd1320
2025-01-02 12:56:08Bitcoin ist vieles. Bitcoin die Währung ist teilbar, austauschbar, einfach transportierbar, haltbar, prüfbar, knapp, universell akzeptiert und leicht sicherungsfähig. Bitcoin das Netzwerk ist staatenlos, dezentral, zensurresistent, erlaubnislos, diskriminiert nicht, vertrauenslos, pseudonym, open source, es basiert auf Konsens- und Anreizmechanismen und Verifizierung sowie Berechnung (wahrscheinlich habe ich sogar viele weitere Eigenschaften vergessen), aber ist Bitcoin auch wirklich unpolitisch, wie so oft behauptet?
Es wird häufig behauptet, dass Bitcoin unpolitisch sei. Aber was genau soll das bedeuten? Die einfachste Erklärung ist, dass Bitcoin für jeden frei zugänglich ist und von jedem benutzt werden kann, egal für welchen Zweck. In der Theorie auch für politische Zwecke, egal welcher Richtung. Bitcoin ist Politik in dieser Hinsicht egal. Denn das Bitcoin-Netzwerk richtet nicht, es diskriminiert nicht und es hat keine Meinung. Eine Transaktion ist eine Transaktion, egal wer der Urheber oder der Sender ist und egal, wer der Empfänger ist. Transaktionen müssen nicht gekennzeichnet werden und somit gibt es keine Möglichkeit für das Netzwerk zu entscheiden, ob eine Transaktion gut oder schlecht ist, dazu genutzt wird, um Guthaben von einer Wallet in eine andere zu schieben, oder von einem Land in ein anderes Land geschickt wird, um dort moralisch fragwürdige Motive zu unterstützen. Insofern ist Bitcoin unpolitisch: Das Netzwerk diskriminiert, oder besser gesagt beurteilt nicht aufgrund politischer Neigungen.
Aber dies ist eigentlich nur die Definition für die eingangs erwähnte Eigenschaft von Bitcoins Wertfreiheit (meiner Meinung nach eine bessere Ausdrucksweise für "Bitcoin diskriminiert nicht").
Aber Nichtdiskriminierung bzw. Wertfreiheit bedeutet nicht unbedingt unpolitisch oder apolitisch. Die Definition dieses Adjektivs bedeutet streng genommen:
[1] sich nicht für Politik interessierend, kein Interesse an politische Themen zeigend
[2] keine Steigerung: nicht die Politik betreffend, nicht zur Politik gehörend
Die erste Definition, da sind wir uns sicherlich einig, sollte erfüllt sein. Bitcoin interessiert sich nicht für Politik. Bitcoin ist ein Netzwerk, ein Protokoll, ein System. Bitcoin interessiert sich nur für sich selbst. Seinen eigenen Erhalt, und die im Protokoll festgesetzten Regeln: Etwa alle 10 Minuten wird ein neuer Block produziert, egal wie viel Rechenleistung dem Netzwerk zur Verfügung steht, egal wie viele Transaktionen hinzuzufügen sind, egal wie viele Netzwerkteilnehmer partizipieren.
Bei der zweiten Definition wird es allerdings etwas komplizierter. Bitcoin wurde von Satoshi als Peer-to-Peer Electronic Cash System ins Leben gerufen, das die inhärenten Schwächen des heutigen, vertrauensbasierten Modells löst. Satoshi identifizierte das Problem schon in 2009:
The root problem with conventional currency is all the trust that's required to make it work. The central bank must be trusted not to debase the currency, but the history of fiat currencies is full of breaches of that trust.
Der Genesis Block selbst enthält die wohl bekannteste aller Nachrichten, die jemals in der Bitcoin-Timechain verewigt wurden:
The Times 03/Jan/2009 Chancellor on brink of second bailout for banks
\ Damit ist die Konzeption und die Erschaffung des Bitcoin-Protokolls an sich schon ein politischer Akt. Bitcoin stellt eine Alternative zu unserem derzeitigen Geldsystem dar und soll oder könnte es, im besten Fall, sogar ersetzen. Bitcoin positioniert sich als Gegenstück zum Staat - dem derzeitigen Wächter und Herrn über das Geldsystem. Der Staat ist eine von Natur aus politische Instanz. Wenn man also mit etwas konkurriert, das dem Staat obliegt, wird es automatisch politisch. Satoshi selbst war zumindest indirekt vom Libertarismus und der österreichischen Ökonomie beeinflusst.
Das bedeutet keineswegs, dass jede Person, die Bitcoin verwendet, automatisch einem politischen Akt unterworfen wird, oder selbst anarchistische, libertäre oder liberale Ziele verfolgt. Allerdings bleibt nicht von der Hand zu weisen, dass Bitcoin und sein Ziel, eine Alternative zum heutigen vorherrschenden Geldsystem zu erschaffen, dadurch eine inhärent politische Bekundung ist.
Wenn Bitcoin also nicht apolitisch oder unpolitisch ist, aber auch nicht explizit politisch, dann könnte man behaupten Bitcoin sei zumindest anti-politisch. Der per Definition politische Staat und die Staatsgewalt über das Geldsystem sind der erklärte Gegenspieler von Bitcoin. Damit stellt sich Bitcoin als Kontrahent zu einem System auf, das die Gewalt in die Hände einiger Weniger legt. In der Politik gewinnen oder herrschen diejenigen, die die populärste Meinung vertreten (wenn es gut läuft), oder die meiste Gewalt hinter sich bündeln (wenn es nicht so gut läuft). Im Bitcoin-Netzwerk gewinnen diejenigen, die am effizientesten die Anreizstrukturen nutzen (Miner, Mining-Pools, Lightning-Routing-Channel Betreiber, etc.), oder Bitcoin am effizientesten für sich nutzen und damit dem Ökosystem zum Wachstum verhelfen (Unternehmer, Experten, Entwickler, etc.). Die politische Gesinnung dieser Netzwerkteilnehmer spielt dabei in erster Linie absolut keine Rolle. Es ist völlig egal, ob ein Node-Betreiber zu Hause Pickelhauben sammelt oder im Che Guevara T-Shirt Bitcoin-Protokolle schreibt.
Das heutige Geldsystem hat viele Nachteile, alle aufzuzählen würde den Rahmen sprengen, jedoch lassen sich einige prägnante leicht identifizieren: Rent-Seeking, des Bitcoiners liebstes Thema der Cantillon-Effekt, Geld- oder Münzentwertung und Geldmarktpolitik vereinen alle das gleiche zugrunde liegende Problem. Sie unterliegen alle der politischen Einflussnahme auf das System zum Vorteil einiger (privilegierter) Weniger. Denn was für die wenigen individuellen Vorteilsnehmer aussichtsreich und lohnenswert ist, ist für das Kollektiv schädlich und finanziell schädigend. Bitcoin stellt dazu die Alternative dar. Zwar lässt sich argumentieren, dass die vorhandene Menge und damit das Vermögen bereits heute ungerecht verteilt ist. Allerdings birgt diese Verteilung lediglich Vorteile für die Individuen, ohne jedoch das Kollektiv zu schädigen. Besitzer von großen Mengen bitcoin können genau so viel oder so wenig Einfluss auf das System nehmen, wie diejenigen, die verhältnismäßig wenig besitzen.
Wenn es irgendetwas von Wert gibt, ob Geld, Edelmetalle, oder sonstige Wertgegenstände, wird es auch immer Menschen geben, die davon mehr besitzen als andere - das ist ein unumstößlicher Fakt der Natur und auch Bitcoin wird daran nichts ändern können. Allerdings bietet Bitcoin die nötigen Anreizstrukturen, den eigenen Anteil zu vermehren. Wie schon erwähnt, werden Unternehmergeist, Expertenwissen und aufgebrachte Arbeit derjenigen, die das Netzwerk voranbringen, belohnt. Im Gegensatz zum aktuellen System, in dem oft nicht nur Unternehmergeist und Arbeitsleistung belohnt werden, sondern auch politische Einflussnahme, Prestige und Macht, oder sogar schon die Nähe und der Zugang zu diesen einflussreichen Interessengruppen. Korruption, Lobbyismus und politische Vorteilsnahme führen deshalb zu unproduktiver Arbeit, bei der einzig und allein der Begünstigte profitiert.
Bitcoin eliminiert diese politische Vorteilsnahme und ist dadurch schon anti-politisch.
In diesem Sinne ist Bitcoin also politisch, wie alles politisch ist oder zu einem politischen Thema gemacht werden kann. Ich habe in einem früheren Artikel bereits beschrieben, dass der Staat für viele Menschen die Rolle einer Art Religion eingenommen hat und dass Bitcoin in gewisser Weise für den Staat das ist, was der Buchdruck damals für Religion war.
https://www.genexyz.org/post/13-block-754250-die-vollst-ndige-adaption-von-bitcoin-und-die-3-hindernisse-74u3k2/
Religion ist eigentlich unpolitisch, obwohl man behaupten darf, dass Kirchgänger gewisser Religionen im Allgemeinen im gleichen Bereich des politischen Spektrums wiederzufinden sind, macht dies Religion nicht von Natur aus politisch. Doch die Trennung von Kirche und Staat kann wohl als hochpolitisch bezeichnet werden.
Wo Diderot, Rousseau und Voltaire eine Berufung auf die Vernunft als universelle Urteilsinstanz propagierten und einen Kampf gegen Vorurteile und für die Hinwendung zu Naturwissenschaften, religiöse Toleranz und eine Orientierung am Naturrecht einleiteten, streben Bitcoin und seine Befürworter eine Abkehr von den staatlich gesteuerten und (Fiskal- und Geld)politisch aufgeladenen Finanz- und Wirtschaftsinterventionen und eine Berufung auf Werte wie Dezentralität, Zensurresistenz und Selbstbestimmtheit an. Dasselbe gilt für die Trennung von Geld und Staat. Geld ist eigentlich unpolitisch, aber die Trennung von Geld und Staat ist hochpolitisch. Auch der Missbrauch von Geld zum Erreichen von politischen Zielen ist hochpolitisch. Wie eingangs erwähnt, wird Bitcoin so politisiert - nur eben als Gegenentwurf. Als anti-politische Alternative zum politischen Fiat-System mit all seinen Fehlern.
Was ich damit sagen will, ist, dass Bitcoin per se politisch ist. Es ist eben nur ein anderer Entwurf zu dem politischen Denken, das heute vorherrscht. Bitcoin ist und bleibt erlaubnislos und wertfrei, damit ist die Nutzung von Bitcoin erstmal im Generellen unpolitisch. Solange bis auch einzelne Anwendungsfälle von politischer Natur sind. Bitcoin-Spenden an Wikileaks haben eine politische Tragweite. Bitcoin-Spenden an den Freedom-Convoy in Kanada sind politisch. Bitcoin-Spenden an Hodlonaut sind politisch, auch wenn es dabei um die hauseigene Politik im Bitcoin-Ökosystem geht.
Man kann also nicht ohne weiteres sagen "Bitcoin ist unpolitisch". Es ist richtiger zu sagen, dass Bitcoin keine politische Meinung vertritt und sich nicht zu politischer Einflussnahme instrumentalisieren lässt. Bitcoin ist ein Protokoll, ein Netzwerk, und kümmert sich nur um sich selbst. Aber Bitcoin ist sehr wohl politisch.
🫳🎤
In diesem Sinne, 2... 1... Risiko!
-
@ 82341f88:fbfbe6a2
2023-04-11 19:36:53There’s a lot of conversation around the #TwitterFiles. Here’s my take, and thoughts on how to fix the issues identified.
I’ll start with the principles I’ve come to believe…based on everything I’ve learned and experienced through my past actions as a Twitter co-founder and lead:
- Social media must be resilient to corporate and government control.
- Only the original author may remove content they produce.
- Moderation is best implemented by algorithmic choice.
The Twitter when I led it and the Twitter of today do not meet any of these principles. This is my fault alone, as I completely gave up pushing for them when an activist entered our stock in 2020. I no longer had hope of achieving any of it as a public company with no defense mechanisms (lack of dual-class shares being a key one). I planned my exit at that moment knowing I was no longer right for the company.
The biggest mistake I made was continuing to invest in building tools for us to manage the public conversation, versus building tools for the people using Twitter to easily manage it for themselves. This burdened the company with too much power, and opened us to significant outside pressure (such as advertising budgets). I generally think companies have become far too powerful, and that became completely clear to me with our suspension of Trump’s account. As I’ve said before, we did the right thing for the public company business at the time, but the wrong thing for the internet and society. Much more about this here: https://twitter.com/jack/status/1349510769268850690
I continue to believe there was no ill intent or hidden agendas, and everyone acted according to the best information we had at the time. Of course mistakes were made. But if we had focused more on tools for the people using the service rather than tools for us, and moved much faster towards absolute transparency, we probably wouldn’t be in this situation of needing a fresh reset (which I am supportive of). Again, I own all of this and our actions, and all I can do is work to make it right.
Back to the principles. Of course governments want to shape and control the public conversation, and will use every method at their disposal to do so, including the media. And the power a corporation wields to do the same is only growing. It’s critical that the people have tools to resist this, and that those tools are ultimately owned by the people. Allowing a government or a few corporations to own the public conversation is a path towards centralized control.
I’m a strong believer that any content produced by someone for the internet should be permanent until the original author chooses to delete it. It should be always available and addressable. Content takedowns and suspensions should not be possible. Doing so complicates important context, learning, and enforcement of illegal activity. There are significant issues with this stance of course, but starting with this principle will allow for far better solutions than we have today. The internet is trending towards a world were storage is “free” and infinite, which places all the actual value on how to discover and see content.
Which brings me to the last principle: moderation. I don’t believe a centralized system can do content moderation globally. It can only be done through ranking and relevance algorithms, the more localized the better. But instead of a company or government building and controlling these solely, people should be able to build and choose from algorithms that best match their criteria, or not have to use any at all. A “follow” action should always deliver every bit of content from the corresponding account, and the algorithms should be able to comb through everything else through a relevance lens that an individual determines. There’s a default “G-rated” algorithm, and then there’s everything else one can imagine.
The only way I know of to truly live up to these 3 principles is a free and open protocol for social media, that is not owned by a single company or group of companies, and is resilient to corporate and government influence. The problem today is that we have companies who own both the protocol and discovery of content. Which ultimately puts one person in charge of what’s available and seen, or not. This is by definition a single point of failure, no matter how great the person, and over time will fracture the public conversation, and may lead to more control by governments and corporations around the world.
I believe many companies can build a phenomenal business off an open protocol. For proof, look at both the web and email. The biggest problem with these models however is that the discovery mechanisms are far too proprietary and fixed instead of open or extendable. Companies can build many profitable services that complement rather than lock down how we access this massive collection of conversation. There is no need to own or host it themselves.
Many of you won’t trust this solution just because it’s me stating it. I get it, but that’s exactly the point. Trusting any one individual with this comes with compromises, not to mention being way too heavy a burden for the individual. It has to be something akin to what bitcoin has shown to be possible. If you want proof of this, get out of the US and European bubble of the bitcoin price fluctuations and learn how real people are using it for censorship resistance in Africa and Central/South America.
I do still wish for Twitter, and every company, to become uncomfortably transparent in all their actions, and I wish I forced more of that years ago. I do believe absolute transparency builds trust. As for the files, I wish they were released Wikileaks-style, with many more eyes and interpretations to consider. And along with that, commitments of transparency for present and future actions. I’m hopeful all of this will happen. There’s nothing to hide…only a lot to learn from. The current attacks on my former colleagues could be dangerous and doesn’t solve anything. If you want to blame, direct it at me and my actions, or lack thereof.
As far as the free and open social media protocol goes, there are many competing projects: @bluesky is one with the AT Protocol, nostr another, Mastodon yet another, Matrix yet another…and there will be many more. One will have a chance at becoming a standard like HTTP or SMTP. This isn’t about a “decentralized Twitter.” This is a focused and urgent push for a foundational core technology standard to make social media a native part of the internet. I believe this is critical both to Twitter’s future, and the public conversation’s ability to truly serve the people, which helps hold governments and corporations accountable. And hopefully makes it all a lot more fun and informative again.
💸🛠️🌐 To accelerate open internet and protocol work, I’m going to open a new category of #startsmall grants: “open internet development.” It will start with a focus of giving cash and equity grants to engineering teams working on social media and private communication protocols, bitcoin, and a web-only mobile OS. I’ll make some grants next week, starting with $1mm/yr to Signal. Please let me know other great candidates for this money.
-
@ 58937958:545e6994
2025-01-02 12:33:17May 22, 2024 I made Badger-kun’s pizza bread to celebrate Bitcoin Pizza Day.
Badger-kun: A character from the Japanese YouTube channel "Bitcoiner Hanseikai."
Making the pizza bread was quite a challenge:
Attempt 1: Rice Flour Bread
I thought it might be difficult to shape the character using yeast-based dough (since fermentation might turn it into just a plain round shape). So, I tried rice flour bread with psyllium, but it didn’t feel quite right.
Attempt 2: Cream Bread Style
The rice flour bread was too firm, so I wanted to try something softer. It ended up burning.
Attempt 3: Cheese Naan Style
I wanted to capture that melty cheese vibe and finally thought of cheese naan. For a character-themed pizza bread, this cheese naan approach seemed to work pretty well. I realized that simpler character designs might be easier (and clearer) to make. nostr:nevent1qqsd3a7thkzqde4sp4hx7qjwrjp4kxsnl66kytx40mk73djfvxfkspgu2fw34
-
@ 58937958:545e6994
2025-01-02 12:32:512024年5月22日
ビットコイン・ピザ・デーに合わせてバッジャー君のピザパンを作りました
バッジャー君…日本のYoutubeチャンネル「ビットコイナー反省会」のキャラクター
ピザパン作りはかなり苦戦しました
1回目:米粉パン
イースト発酵だとキャラクターの形を作りにくい気がして(作っても発酵後に単なる丸になっちゃう懸念)
サイリウムを使った米粉パンにしたんですけど
何かこれじゃない感
2回目:クリームパン風
米粉パンが固かったので柔らかいパンが食べたくなりました
焦げました
3回目:チーズナン風
とろけるチーズ感を出したいな~と考えて
ここでようやくチーズナンを思いつく
キャラクター×ピザパンならこのチーズナン方式が結構いいかもしれない
もうちょっとシンプルなキャラクターだと作りやすそう(分かりやすそう)だと思いました nostr:nevent1qqsd3a7thkzqde4sp4hx7qjwrjp4kxsnl66kytx40mk73djfvxfkspgu2fw34
-
@ 58937958:545e6994
2025-01-02 12:32:28October 31, 2024 I made pumpkin yokan to celebrate the anniversary of the Bitcoin whitepaper release.
*Yokan: A firm, jelly-like Japanese dessert typically made with azuki bean paste.
Cut a clear file into the shape of the Bitcoin logo.
Place the ₿ mark on a slightly firm milk jelly (gyunyukan) and carefully cut it out with a knife.
Fill the cut-out with pumpkin yokan.
The mixture I made was a bit firm, so it was challenging to fill the gaps in the ₿ shape. Later, I tried a milk-based yokan with a smoother texture, which made the process much easier.
nostr:nevent1qqszzcz9npq5xgw08tp5wud0kg9wfacf9fkj07gu82wn3wjsad3wd2cppvjdw
You don’t need any special molds, so anyone can try this! I’m thinking of experimenting with different variations of the milk jelly and applying this technique to other dishes as well.
-
@ 58937958:545e6994
2025-01-02 12:32:102024年10月31日 ビットコインホワイトペーパー公開の記念日に合わせてカボチャようかんを作りました
100均のクリアファイルをビットコインロゴマークに切り抜きます
ちょっと固めに作った牛乳かんに₿マークを乗せて 包丁を使って気合で切ります
カボチャようかんを入れます
この時作ったのはちょっと固い配合で₿の隙間に入れるのが難しかったです
後で牛乳入りのサラッとしたようかんも試しましたがそちらの方が作りやすかったです
nostr:nevent1qqszzcz9npq5xgw08tp5wud0kg9wfacf9fkj07gu82wn3wjsad3wd2cppvjdw
特別な型などは必要ないので誰でもできます
牛乳かんの部分を色々変えて 他の料理にも応用したいと思います
-
@ 24862769:20eb96a7
2025-01-02 11:34:12Over the years, the internet has become worse and worse, more and more portals are being destroyed. Everything was working fine around 2008-2010. Then it started to change for the worse... What am I talking about? Everything that was good for the internet. IRC, various chats on websites, ICQ, internet forums, or home pages, comments under articles which are now increasingly being forgotten in favor of centralized services, like Facebook or Discord.
People, instead of creating home pages, buying hosting, prefer to create fan pages on Facebook, and then they cry that Facebook blocked them for no reason. Bans for no reason on such portals are quite common. The same is with Discord, which is closed from the outside, and you can't find any posts that interest you without registering and entering a given server. In addition, there is the fact that for years you gather friends, you get close to them you talk about something every day, until you get banned for no reason. All friendships are lost, everything you wrote, everything you worked hard for - is lost, just because, no one cares...
Additionally, there are regulations and laws. In more and more countries, the age-verification law is starting to become fashionable - to be able to use a given portal, you have to be over 18 years old. Some people are happy about this, because children will not have access to some things, which I agree with. But unfortunately, this step will also affect adults, it will probably end with everyone having to show their ID card when registering for some services, and in the future, a digital ID. An additional step that will require additional effort from you. Anonymity will end, admins will know who you are and what your name is.
I think that one of the solutions is to decentralize everything. People should stop using Facebook or Discord in favor of more open solutions such as matrix.org or nostr. Thanks to many servers from different countries from different people, it will be difficult to have political censorship. Because a server from Russia will not obey the law from the USA, and vice versa. If you write something about Taiwan on a Chinese server, the post may be deleted, but in the USA it will be allowed. In addition, there are groundless bans, in such a "nostr", even if one server bans you, you have hundreds of others to choose from. But as you can see, most people do not think this way and continue to sit on these closed solutions like Facebook. Because of this, there are few interesting channels or people on matrix.org, and more bots that simply litter the channel. That is why I think that a grassroots initiative is needed to promote such solutions, some rich companies should look into this and start investing in open solutions.
Unfortunately, this is not the case, sites like Facebook are increasingly closed, they have increasingly strict user rights, you have to show them even a video of your face so that they can register you on it. And the average person does not see anything, they do not see that the Internet is going in a very bad direction through corporations like Facebook, Google. Oh well, let's hope that this will change someday, because if it continues like this the internet will become unusable...
-
@ cf7ed325:050194cf
2025-01-02 11:29:45The Sonesta St. George Nile Cruise offers a luxurious way to explore the timeless wonders of Egypt. As one of the premier vessels cruising the Nile, it provides an exceptional blend of comfort, elegance, and rich history. The cruise takes you on an unforgettable journey between Luxor and Aswan, offering a perfect balance of relaxation and exploration.
Onboard, guests enjoy spacious cabins, fine dining, and a range of amenities, ensuring a comfortable experience while cruising along the Nile. The Sonesta St. George Nile Cruise is known for its impeccable service and stunning views of the Nile River, providing a truly unique way to experience Egypt's ancient sites.
If you're seeking an alternative luxury experience, the Oberoi Zahra Nile Cruise offers another top-tier option. This cruise is renowned for its ultra-luxurious amenities and intimate atmosphere, making it ideal for those looking for a more exclusive Nile experience. Similarly, the Oberoi Philae Nile Cruise combines exceptional service with exquisite decor, perfect for travelers looking to immerse themselves in Egypt's history and beauty.
For those who prefer a slightly more modern touch, the Movenpick Sunray Nile Cruise and the Movenpick Darakum Nile Cruise provide a blend of contemporary luxury and traditional charm. Both cruises feature world-class facilities, including spacious cabins, excellent dining options, and guided excursions to iconic sites such as the Valley of the Kings and Karnak Temple.
If you’re looking for more variety, the Historia Nile Cruise offers a unique experience with its classic elegance and attention to detail, while the Farah Nile Cruise is another luxurious option with exceptional service.
For an unforgettable Nile adventure, you might also consider the Jaz Regent Nile Cruise or one of the Sonesta Sun Goddess Nile Cruise, Sonesta Star Goddess Nile Cruise, Sonesta Moon Goddess Nile Cruise, and Sonesta Nile Goddess Nile Cruise. Each of these cruises offers a distinct experience, ensuring that every traveler can find the perfect fit for their journey down the Nile.
🌐 Visit us at www.etbtoursegypt.com 📲 Contact us now! +20 10 21100873 📧 Email: info@etbtours.com 🏢 Company Address: 4 El Lebeny Axis , Nazlet Al Batran , Al Haram, Giza , Egypt
-
@ 07041e3c:9548823b
2025-01-02 11:17:37כיבוש הארץ הוא לא תחום עיסוקו הבלעדי של צבא לאומי תחת הפיקוד של שלטון מרכזי. יש זכאות לציבור כיחידים וכקבוצות (שבטים) להתארגן ולפעול באופן עצמאי ללא נטילת רשות מישות לאומית, ולפי העולה מהמקורות, הוא אפילו דבר מתבקש ומבורך.
סדרה של כיבושים פרטיים בעבר הירדן בימי משה
אחרי שמשה משמיד את סיחון ועוג, השטחים שהיו בשליטתם בעבר הירדן המזרחי נופלים בפני בני ישראל להשתלט עליהם. ואכן היו כאלה שיצאו למבצעי כיבוש על דעת ובכוחות עצמם (במדבר לב:לט):
וַיֵּלְכוּ בְּנֵי מָכִיר בֶּן־מְנַשֶּׁה גִּלְעָדָה וַיִּלְכְּדֻהָ וַיּוֹרֶשׁ אֶת־הָאֱמֹרִי אֲשֶׁר־בָּהּ׃
משפחה בודדת משתלטת על שטח ומטפלת באוכלוסיה המקומית ללא תמיכה של שלטון מרכזי כלשהו. מתברר שפעולה זאת היתה בהסכמת משה והוא אכן מאשרר אותה באופן מיידי(שם לב:מ):
וַיִּתֵּן מֹשֶׁה אֶת־הַגִּלְעָד לְמָכִיר בֶּן־מְנַשֶּׁה וַיֵּשֶׁב בָּהּ׃
יאיר בן מנשה אולי קיבל השראה ממכיר והוא יוצא לכבוש לעצמו שטחי מרעה ומחנות לגידול צאן (שם לב:מא):
וְיָאִיר בֶּן־מְנַשֶּׁה הָלַךְ וַיִּלְכֹּד אֶת־חַוֺּתֵיהֶם וַיִּקְרָא אֶתְהֶן חַוֺּת יָאִיר׃
באותו פרק זמן גם אצל נבח בוער הרצון לחיות כישות ריבונית עצמאית וכנראה הדרך לעשות זאת היא על ידי יציאה לכיבוש שטחים באופן פרטי ולקחת עליהם בעלות. לא נראה שהוא ביקש את הרשות של מישהו (שם לב:מב):
וְנֹבַח הָלַךְ וַיִּלְכֹּד אֶת־קְנָת וְאֶת־בְּנֹתֶיהָ וַיִּקְרָא לָה נֹבַח בִּשְׁמוֹ׃
ככה שטיינזלץ מתאר את נבח:
נֹבַח, שלא ידוע מי הוא, אך מן הסתם היה אדם הרפתקן שהעדיף להיות רועה צאן במזרח הפרוע ולא להתגורר כחקלאי בארץ כנען, ועל כן הצטרף לחצי שבט מנשה
כיבושי יהושע נועדו להכין תשתית לכיבושים פרטיים
יהושע א -יב מתאר את מלחמותיו יחד עם ולמען כלל האומה. עד כדי כך שיהושע יא:כג אומר:
וַיִּקַּח יְהוֹשֻׁעַ אֶת־כׇּל־הָאָרֶץ כְּכֹל אֲשֶׁר דִּבֶּר ה' אֶל־מֹשֶׁה וַיִּתְּנָהּ יְהוֹשֻׁעַ לְנַחֲלָה לְיִשְׂרָאֵל כְּמַחְלְקֹתָם לְשִׁבְטֵיהֶם וְהָאָרֶץ שָׁקְטָה מִמִּלְחָמָה׃
אבל ביג:א הוא אומר:
וִיהוֹשֻׁעַ זָקֵן בָּא בַּיָּמִים וַיֹּאמֶר ה' אֵלָיו אַתָּה זָקַנְתָּה בָּאתָ בַיָּמִים וְהָאָרֶץ נִשְׁאֲרָה הַרְבֵּה־מְאֹד לְרִשְׁתָּהּ׃
אז אם יהושע לקח "את כל הארץ" אז איך "והארץ נשארה הרבה מאד לרשתה"? הרלב"ג (יא:ג) מסביר:
והנה נזכר אחר זה כי כבר נשאר הרבה עדיין מן הארץ לרשתה אלא שעכ"ז כבר חלקה להם יהושע בנחלה לישראל לשבטיהם כמו שזכר אחר זה, וזכר עם זה שהארץ שקטה ממלחמה כי לא היו נלחמים עם ישראל ולא ישראל עמם ואף על פי שכבר נשאר הרבה מן הארץ לרשתה,
חלוקת הארץ לנחלות שבטיות היתה בעצם חלוקת גזרות בהן כל שבט ישלים את העבודה באופן עצמאי. וכיבושי יהושע היו הכנת מצב בו יש לשבטים נקודת התחלה מצויינת להשלים כיבושים.
כיבוש חברון על ידי כלב בן יפונה
החל מפרק יג, מתוארת חלוקת הנחלות לכל שבט ושבט. במעמד זה, כלב בן יפונה מבקש מיהושע את הזכויות לחברון - הזכות לפעול באופן עצמאי ולקחת את העיר כנחלה (יהושע יד:יב):
וְעַתָּה תְּנָה־לִּי אֶת־הָהָר הַזֶּה אֲשֶׁר־דִּבֶּר ה' בַּיּוֹם הַהוּא כִּי אַתָּה־שָׁמַעְתָּ בַיּוֹם הַהוּא כִּי־עֲנָקִים שָׁם וְעָרִים גְּדֹלוֹת בְּצֻרוֹת אוּלַי ה' אוֹתִי וְהוֹרַשְׁתִּים כַּאֲשֶׁר דִּבֶּר ה':
אין כאן בקשה מיהושע להקצות לו כוח צבאי כלל-ישראלי למשימת כיבוש העיר, אלא רק הרשות לפעול באופן עצמאי ולקבל את העיר.
יהושע נענה לבקשה:
וַיְבָרְכֵהוּ יְהוֹשֻׁעַ וַיִּתֵּן אֶת־חֶבְרוֹן לְכָלֵב בֶּן־יְפֻנֶּה לְנַחֲלָה׃
אנחנו עוד נראה שיהושע אכן מאיץ בשאר השבטים לנהוג באופן דומה, אך הם פחות נענים למשימה. ואכן כלב מבצע פעולה צבאית כאדם פרטי (טו:יד):
וַיֹּרֶשׁ מִשָּׁם כָּלֵב אֶת־שְׁלוֹשָׁה בְּנֵי הָעֲנָק אֶת־שֵׁשַׁי וְאֶת־אֲחִימַן וְאֶת־תַּלְמַי יְלִידֵי הָעֲנָק׃
כלב ממשיך לכיבוש נוסף ללא נטילת רשות מיהושע
מיד לאחר מכן כלב ממשיך במסע הכיבושים הפרטי שלו:
וַיַּעַל מִשָּׁם אֶל־יֹשְׁבֵי דְּבִר וְשֵׁם־דְּבִר לְפָנִים קִרְיַת־סֵפֶר׃
וכאן, כלב מגלה יכולת אופרטיבית גבוהה - הוא מוציא מכרז בַּמָּקום לכיבוש העיר שמושך אליו את אחד הכישרונות הגדולים של אותו הדור שמבצע את המשימה בהצלחה (יהושע טו:טו):
וַיֹּאמֶר כָּלֵב אֲשֶׁר־יַכֶּה אֶת־קִרְיַת־סֵפֶר וּלְכָדָהּ וְנָתַתִּי לוֹ אֶת־עַכְסָה בִתִּי לְאִשָּׁה׃ וַיִּלְכְּדָהּ עׇתְנִיאֵל בֶּן־קְנַז אֲחִי כָלֵב וַיִּתֶּן־לוֹ אֶת־עַכְסָה בִתּוֹ לְאִשָּׁה׃
ביקורת יהושע על העדר יוזמה פרטית של שבטים להשלים כיבושים
אמנם יהושע הכין תשתית להשתלטות ישראלית על כל ארץ כנען, אבל לא כל השבטים היה ביכולתם או היה ברצונם להשלים אותה (יהושע יז:יב):
וְלֹא יָכְלוּ בְּנֵי מְנַשֶּׁה לְהוֹרִישׁ אֶת־הֶעָרִים הָאֵלֶּה וַיּוֹאֶל הַכְּנַעֲנִי לָשֶׁבֶת בָּאָרֶץ הַזֹּאת׃
אולי הכנענים יושבי העמקים היו כוח צבאי יותר רציני מיושבי הר חברון וסביבותיה. אולי לא הוגן שיצא הגורל לשבטים עם צרכים גדולים במיוחד לנחלות בהן יש קושי בהתמודדות עם אוכלוסיה מקומית עם יתרון צבאי משמעותי:
וַיֹּאמְרוּ בְּנֵי יוֹסֵף לֹא־יִמָּצֵא לָנוּ הָהָר וְרֶכֶב בַּרְזֶל בְּכׇל־הַכְּנַעֲנִי הַיֹּשֵׁב בְּאֶרֶץ־הָעֵמֶק לַאֲשֶׁר בְּבֵית־שְׁאָן וּבְנוֹתֶיהָ וְלַאֲשֶׁר בְּעֵמֶק יִזְרְעֶאל׃
יהושע בכל זאת מתעקש שהם לא יוותרו על השטחים הנ"ל וכי בשלב כלשהו יהיה ביכולתם להשלים את ההשתלטות על נחלתם (שם יז:יח):
כִּי הַר יִהְיֶה־לָּךְ כִּי־יַעַר הוּא וּבֵרֵאתוֹ וְהָיָה לְךָ תֹּצְאֹתָיו כִּי־תוֹרִישׁ אֶת־הַכְּנַעֲנִי כִּי רֶכֶב בַּרְזֶל לוֹ כִּי חָזָק הוּא׃
רש"י במקום מסביר:
כִּי חָזָק הוּא. וְאַתָּה יֵשׁ בְּךָ הַיְכוֹלֶת וְתּוֹרִישֶׁנּוּ
וזה תמצית הביקורת של יהושע (שםיח:ג):
וַיֹּאמֶר יְהוֹשֻׁעַ אֶל־בְּנֵי יִשְׂרָאֵל עַד־אָנָה אַתֶּם מִתְרַפִּים לָבוֹא לָרֶשֶׁת אֶת־הָאָרֶץ אֲשֶׁר נָתַן לָכֶם ה' אֱלֹהֵי אֲבוֹתֵיכֶם :
וסיכום העניין הוא שעדיין יש עבודת כיבוש , והיא מוטלת על כל שבט ושבט, ולא על כח צבאי לאומי. ויש בידם להצליח (שם כג:ד-ה):
רְאוּ הִפַּלְתִּי לָכֶם אֶת־הַגּוֹיִם הַנִּשְׁאָרִים הָאֵלֶּה בְּנַחֲלָה לְשִׁבְטֵיכֶם מִן־הַיַּרְדֵּן וְכׇל־הַגּוֹיִם אֲשֶׁר הִכְרַתִּי וְהַיָּם הַגָּדוֹל מְבוֹא הַשָּׁמֶשׁ׃ וַה' אֱ-לֹהֵיכֶם הוּא יֶהְדֳּפֵם מִפְּנֵיכֶם וְהוֹרִישׁ אֹתָם מִלִּפְנֵיכֶם וִירִשְׁתֶּם אֶת־אַרְצָם כַּאֲשֶׁר דִּבֶּר ה' אֱ-לֹהֵיכֶם לָכֶם׃
רש"י במקום מסביר:
רְאוּ הִפַּלְתִּי לָכֶם. בְּגוֹרָל לְנַחֲלָה
מלחמת דבורה וברק היתה וולונטרית
אז אחרי מות יהושע נשארו חלקים רבים מהארץ שמהם לא גורשו הכנעני והשלטון הישראלי בהם היה רופף אם בכלל. בימי דבורה הוחלט לבצע מהלך שישנה את המציאות הגאו-פוליטית באזור, אך באופן מצומצם על ידי שני שבטים בלבד, ללא גיוס של כלל האומה. (שופטים ד:ו):
וַתִּשְׁלַח וַתִּקְרָא לְבָרָק בֶּן־אֲבִינֹעַם מִקֶּדֶשׁ נַפְתָּלִי וַתֹּאמֶר אֵלָיו הֲלֹא צִוָּה יְהֹוָה אֱלֹהֵי־יִשְׂרָאֵל לֵךְ וּמָשַׁכְתָּ בְּהַר תָּבוֹר וְלָקַחְתָּ עִמְּךָ עֲשֶׂרֶת אֲלָפִים אִישׁ מִבְּנֵי נַפְתָּלִי וּמִבְּנֵי זְבֻלוּן׃׃
אבל בפועל דבורה מזכירה שבטים נוספים לשבח - שבטים שנראה שהצטרפו למלחמה לצידם של דבורה וברק (שם ה:יד):
מִנִּי אֶפְרַיִם שׇׁרְשָׁם בַּעֲמָלֵק אַחֲרֶיךָ בִנְיָמִין בַּעֲמָמֶיךָ מִנִּי מָכִיר יָרְדוּ מְחֹקְקִים וּמִזְּבוּלֻן מֹשְׁכִים בְּשֵׁבֶט סֹפֵר׃
וְשָׂרַי בְּיִשָּׂשכָר עִם־דְּבֹרָה וְיִשָּׂשכָר כֵּן בָּרָק בָּעֵמֶק שֻׁלַּח בְּרַגְלָיו בִּפְלַגּוֹת רְאוּבֵן גְּדֹלִים חִקְקֵי־לֵב׃לעומתם היו שבטים ומשפחות שנמנעו מלהשתתף ודבורה מזכירה אותם בשמותם (שם ה:טו):
לָמָּה יָשַׁבְתָּ בֵּין הַמִּשְׁפְּתַיִם לִשְׁמֹעַ שְׁרִקוֹת עֲדָרִים לִפְלַגּוֹת רְאוּבֵן גְּדוֹלִים חִקְרֵי־לֵב׃ גִּלְעָד בְּעֵבֶר הַיַּרְדֵּן שָׁכֵן וְדָן לָמָּה יָגוּר אֳנִיּוֹת אָשֵׁר יָשַׁב לְחוֹף יַמִּים וְעַל מִפְרָצָיו יִשְׁכּוֹן׃
אך הביקורת היא לא חריפה במיוחד ומבטאת אולי אכזבה יותר מכל דבר אחר, דבר שמובן אם המלחמה הזאת היתה על בסיס מתנדבים משבטים אחרים.
בני דן מרחיקים לצפון
תמצית המעשה של בני דן מובא כבר ביהושע (יט:מז):
וַיֵּצֵא גְבוּל־בְּנֵי־דָן מֵהֶם וַיַּעֲלוּ בְנֵי־דָן וַיִּלָּחֲמוּ עִם־לֶשֶׁם וַיִּלְכְּדוּ אוֹתָהּ וַיַּכּוּ אוֹתָהּ לְפִי־חֶרֶב וַיִּרְשׁוּ אוֹתָהּ וַיֵּשְׁבוּ בָהּ וַיִּקְרְאוּ לְלֶשֶׁם דָּן כְּשֵׁם דָּן אֲבִיהֶם׃
עיקר תיאור המעשה הוא בשופטים, וכדאי לציין את הרקע (יח:א-ב):
בַּיָּמִים הָהֵם אֵין מֶלֶךְ בְּיִשְׂרָאֵל וּבַיָּמִים הָהֵם שֵׁבֶט הַדָּנִי מְבַקֶּשׁ־לוֹ נַחֲלָה לָשֶׁבֶת כִּי לֹא־נָפְלָה לּוֹ עַד־הַיּוֹם הַהוּא בְּתוֹךְ־שִׁבְטֵי יִשְׂרָאֵל בְּנַחֲלָה׃
מסתבר שכל שבט אחראי לכבוש לעצמו את נחלתו או לפחות שטח שהיא "מן ההפקר", כדי שאנשיו יוכלו ליישב את הארץ כבני אדם חופשיים. כמו בני יוסף בכבוש בית אל (שופטים ב), בני דן פועלים באופן עצמאי עוד החל משלב איסוף המודיעין:
וַיִּשְׁלְחוּ בְנֵי־דָן מִמִּשְׁפַּחְתָּם חֲמִשָּׁה אֲנָשִׁים מִקְצוֹתָם אֲנָשִׁים בְּנֵי־חַיִל מִצׇּרְעָה וּמֵאֶשְׁתָּאֹל לְרַגֵּל אֶת־הָאָרֶץ וּלְחׇקְרָהּ וַיֹּאמְרוּ אֲלֵהֶם לְכוּ חִקְרוּ אֶת־הָאָרֶץ וַיָּבֹאוּ הַר־אֶפְרַיִם עַד־בֵּית מִיכָה וַיָּלִינוּ שָׁם׃
שאר הסיפור ידוע, ואזור "לשם" בצפון היה ידוע ומפורסם בפי כל כ"דן".
בני שמעון מתרחבים למדבריות ערב
כיבוש שטחים בארץ אדום הדרומית ("מְבוֹא גְדֹר עַד לְמִזְרַח הַגָיְא")
בדברי הימים א מובאת רשימת היוחסין של שבט שמעון. נחלתם היתה בדרום הארץ על גבול המדבר ובעקבות גידול באוכלוסין, חבל ארץ זה לא הספיק למחייתם, במיוחד בגלל שעסקו ברעיית צאן (ולא בחקלאות) והם היו זקוקים לשטחים נוספים (דה"י א ד:לח):
אֵלֶּה הַבָּאִים בְּשֵׁמוֹת נְשִׂיאִים בְּמִשְׁפְּחוֹתָם וּבֵית אֲבוֹתֵיהֶם פָּרְצוּ לָרוֹב:
כמו בני יוסף ובני דן לפניהם, הם מקדימים לאסוף מודיעין על האזור אותו הם מעוניינים לתקוף (שם שם:לט-מ):
וַיֵּלְכוּ לִמְבוֹא גְדֹר עַד לְמִזְרַח הַגָּיְא לְבַקֵּשׁ מִרְעֶה לְצֹאנָם: וַיִּמְצְאוּ מִרְעֶה שָׁמֵן וָטוֹב וְהָאָרֶץ רַחֲבַת יָדַיִם וְשֹׁקֶטֶת וּשְׁלֵוָה כִּי מִן־חָם הַיֹּשְׁבִים שָׁם לְפָנִים׃
לאחר שמתברר שיש סיכוי גבוה למבצע צבאי מוצלח הם תוקפים (שם שם:מא):
וַיָּבֹאוּ אֵלֶּה הַכְּתוּבִים בְּשֵׁמוֹת בִּימֵי יְחִזְקִיָּהוּ מֶלֶךְ־יְהוּדָה וַיַּכּוּ אֶת־אׇהֳלֵיהֶם וְאֶת־[הַמְּעוּנִים] (המעינים) אֲשֶׁר נִמְצְאוּ־שָׁמָּה וַיַּחֲרִימֻם עַד־הַיּוֹם הַזֶּה וַיֵּשְׁבוּ תַּחְתֵּיהֶם כִּי־מִרְעֶה לְצֹאנָם שָׁם׃
חשוב לציין כי האירוע הזה התרחש בימי חזקיהו המלך, תקופה בה היה קיים שלטון ריכוזי חזק, וסביר להניח גם בעל יכולות צבאיות בשביל לבצע את הפעולה הזאת בעצמו, אך אין פה שום רמז לכך שבני שמעון, "אלה הכתובים בשמות", חשבו להתייעץ או לקבל אישור מהשלטון בירושלים ליציאה למבצע הזה.
מחיית עמלק בהר שעיר
ההתרחבות של בני שמעון לא הסתיימה בכיבוש הנ"ל, אלא המשיכה בהר שעיר על ידי קבוצה מצומצמת, שכנראה קיבלה רוח במפרסים בעקבות ההצלחה הקודמת (שם:מב):
וּמֵהֶם מִן־בְּנֵי שִׁמְעוֹן הָלְכוּ לְהַר שֵׂעִיר אֲנָשִׁים חֲמֵשׁ מֵאוֹת וּפְלַטְיָה וּנְעַרְיָה וּרְפָיָה וְעֻזִּיאֵל בְּנֵי יִשְׁעִי בְּרֹאשָׁם׃
לא מוזכר מה גרם להם לעשות זאת אבל סביר להניח שהיה מדובר באנשים שהחירות האישית שלהם היתה חשובה עבורם ורצו לחיות ללא תלות באחרים, אפילו אחיהם לשבט (שם:מג):
וַיַּכּוּ אֶת־שְׁאֵרִית הַפְּלֵטָה לַעֲמָלֵק וַיֵּשְׁבוּ שָׁם עַד הַיּוֹם הַזֶּה׃
בני ראובן משתלטים על המדבר הסוּרי
גם בני ראובן התרבו עד אשר לא יכלה נחלתם המקורית לשאת אותם והם נאלצו להרחיב את יישוביהם מעבר לתחום הגלעד, עד למדבר הסורי בואכה הפרת (שם ה:ט):
וְלַמִּזְרָח יָשַׁב עַד־לְבוֹא מִדְבָּרָה לְמִן־הַנָּהָר פְּרָת כִּי מִקְנֵיהֶם רָבוּ בְּאֶרֶץ גִּלְעָד׃
אך התרחבותם נתקלה באוכלוסיות מקומיות שכנראה לא איפשרו להם חופש תנועה, עד למצב בו הם היו צריכים להשתמש באלימות כדי לחיות ללא הפרעה (שם ה:י):
וּבִימֵי שָׁאוּל עָשׂוּ מִלְחָמָה עִם־הַהַגְרִאִים וַיִּפְּלוּ בְּיָדָם וַיֵּשְׁבוּ בְּאׇהֳלֵיהֶם עַל־כׇּל־פְּנֵי מִזְרָח לַגִּלְעָד׃
'דעת מקרא' על הפסוק אמנם טוען ששאול הוביל את המלחמה והיא לא נעשית באופן פרטי, אך אין זכר לכך במפרשים המסורתיים וגם לשון הפסוק תומך ברעיון שבני ראובן פעלו על דעת ובכוחות עצמם.
נפילה והתאוששות
הכיבושים הנ"ל לא החזיקו מעמד לאורך התקופות ובעקבות התחזקות ארם בסוף המאה ה9 והשתלטות אלימה של ארם על אותם אזורים בהם ישבו בני ראובן, בני ראובן ספגו אבידות מרובות ונאלצו לסגת לנחלתם המצומצמת (מלבים, שם ה:יט):
בימי יהואחז מלך ישראל שאז גבר עליהם יד מלך ארם וישימם כעפר לדוש (כנזכר מלכים ב י״ג:ז׳ ושם יד), ואז שבו ההגריאים ונתישבו במקומם
אחרי שבני ראובן התחזקו וארם נחלשה הם חברו יחד לבני גד ולחצי שבט מנשה, התארגנו צבאית, ויצאו למבצע רחב היקף נגד האוכלוסיות הערביות באזור (ה:יח-יט):
בְּנֵי־רְאוּבֵן וְגָדִי וַחֲצִי שֵׁבֶט־מְנַשֶּׁה מִן־בְּנֵי־חַיִל אֲנָשִׁים נֹשְׂאֵי מָגֵן וְחֶרֶב וְדֹרְכֵי קֶשֶׁת וּלְמוּדֵי מִלְחָמָה אַרְבָּעִים וְאַרְבָּעָה אֶלֶף וּשְׁבַע־מֵאוֹת וְשִׁשִּׁים יֹצְאֵי צָבָא׃ וַיַּעֲשׂוּ מִלְחָמָה עִם־הַהַגְרִיאִים וִיטוּר וְנָפִישׁ וְנוֹדָב׃
הם נהנו מהצלחה מרובה והצליחו לחדש את יישובם באזורים האלה, יישוב שהחזיק מעמד עד לימי תגלת פלאסר - סוף תקופת הממלכה (ה:כ-כב):
וַיֵּעָזְרוּ עֲלֵיהֶם וַיִּנָּתְנוּ בְיָדָם הַהַגְרִיאִים וְכֹל שֶׁעִמָּהֶם כִּי לֵא-לֹהִים זָעֲקוּ בַּמִּלְחָמָה וְנַעְתּוֹר לָהֶם כִּי־בָטְחוּ בוֹ׃ וַיִּשְׁבּוּ מִקְנֵיהֶם גְּמַלֵּיהֶם חֲמִשִּׁים אֶלֶף וְצֹאן מָאתַיִם וַחֲמִשִּׁים אֶלֶף וַחֲמוֹרִים אַלְפָּיִם וְנֶפֶשׁ אָדָם מֵאָה אָלֶף׃ כִּי־חֲלָלִים רַבִּים נָפָלוּ כִּי מֵהָאֱ-לֹהִים הַמִּלְחָמָה וַיֵּשְׁבוּ תַחְתֵּיהֶם עַד־הַגֹּלָה׃
לסיכום
מאחר שהאינדיבדואליזם הוא חלק בלתי נפרד מהאתוס העברי, גם מצוות החלות על כלל האומה לא יכולות להיות מקויימות כתיקונן אלא אם כן יש ביטוי לרצון וליוזמה של היחיד. יישוב/כיבוש הארץ הוא אחד מהמצוות האלה ומתרחש בשני מישורים: 1. במישור הלאומי - כיבושים שנחוצים לביסוס גרעין התיישבותי של כלל האומה ולכן משתתף בהם צבא לאומי ממלכתי. 2. במישור השבטי/פרטי - כיבושים אופציונלים שהשלמתם תלויה ברצון וביוזמה של קבוצות מצומצמות (שבטים) ויחידים.
-
@ cf7ed325:050194cf
2025-01-02 10:08:45Port Said shore excursions , a vibrant port city located on the Mediterranean coast of Egypt, offers a variety of exciting shore excursions for cruise passengers. These excursions provide a unique opportunity to explore Egypt's rich history and culture. Whether you're interested in ancient monuments or bustling city life, there’s something for everyone.
One of the top experiences is the Day Trip to Islamic and Coptic Cairo from Port Said Shore excursions, where you can immerse yourself in the history of Cairo's Islamic and Coptic heritage. Explore the famous mosques, churches, and ancient buildings that make Cairo a cultural treasure trove.
For those looking for a more comprehensive tour, the 2 Day Tours to Cairo and Alexandria From Port Said Excursions offers an extended experience, combining the wonders of Cairo with the Mediterranean charm of Alexandria. This two-day adventure covers iconic landmarks like the Great Pyramids, the Sphinx, and the Alexandria Library.
If you're short on time but still want to experience the highlights of Egypt, consider the Day tour to the Pyramids included Lunch Cruise from Port Said port. This excursion lets you visit the Pyramids of Giza, followed by a relaxing lunch cruise on the Nile, offering a perfect blend of history and leisure.
Another popular choice is the Day Trip in Cairo to visit Pyramids of Giza and Saqqara from Port Said Shore excursions. This tour takes you to the ancient Step Pyramid of Saqqara and the iconic Pyramids of Giza, giving you a deep dive into Egypt’s ancient civilization.
Finally, the Explore Pyramids of Giza through Cairo day tour from Port Said Port is an excellent option for those eager to explore Egypt’s most famous monuments in a single day. No matter which excursion you choose, Port Said shore excursions offer an unforgettable way to experience Egypt’s wonders.
🌐 Visit us at www.etbtoursegypt.com 📲 Contact us now! +20 10 21100873 📧 Email: info@etbtours.com 🏢 Company Address: 4 El Lebeny Axis , Nazlet Al Batran , Al Haram, Giza , Egypt
-
@ db01672e:9f775028
2025-01-02 09:54:15Choosing an assisted living facility for an aging parent or loved one can be a daunting and emotional decision. As adult children, it’s common to feel overwhelmed by the responsibility of ensuring the best care for your loved ones.
If you are considering assisted living in Kingwood, this guide will help you navigate the practical, emotional, and financial aspects of the decision-making process.
Understand the Different Levels of Care
When exploring https://villagegreenalzheimerscare.com/****, it’s essential to understand the care levels offered. Communities provide services from daily help like bathing and dressing to specialized care for Alzheimer's or dementia. Assessing your loved one’s needs ensures they get the right support, promoting independence while keeping them safe.
Evaluate the Cost of Assisted Living
Financial considerations play a significant role in choosing an assisted living facility. The cost in Kingwood varies based on services, location, and suite size. Monthly fees range from a few thousand dollars.
Families often use savings, insurance, or veterans’ benefits. Understanding your financial situation and funding options is key to making an informed decision.
Visit Multiple Communities
Once you’ve narrowed down assisted living options, visiting multiple communities is important. Tour the facilities to assess the environment and meet staff. Look for clean spaces, open areas, and private suites. Pay attention to the atmosphere—assisted living should feel warm and welcoming. Evaluate staff interactions with residents and inquire about specialized care for memory issues.
Assess Emotional and Social Well-being
The emotional well-being of your loved one is just as important as their physical health. Assisted living in Kingwood can offer a nurturing environment with a strong sense of community. Look for a facility that provides activities and events to engage residents and build relationships. Emotional support is key for people transitioning into assisted living, so ensure the community provides programs that meet their interests.
Focus on Health and Wellness Support
Health and wellness are crucial when choosing the right assisted living community. Does the community provide access to medical professionals, such as nurses or physicians? Are medications managed carefully?
Consider whether the facility can meet your loved one’s health needs, especially if they have chronic conditions. Communities that emphasize emotional, physical, and spiritual well-being enhance overall quality of life.
Plan for Future Needs
It’s essential to consider both current and future needs. As people age, their care requirements may change. Select an assisted living community in Kingwood that can adapt to evolving needs. Some facilities offer a continuum of care, accommodating services from independent living to memory care. This flexibility allows your loved one to stay in the same community, providing continuity and stability.
Include Your Loved One in the Decision-Making Process
Whenever possible, involve your aging parent in the decision-making process. Moving to assisted living is a major change, and it’s important that they feel respected and heard. Discuss preferences for location, atmosphere, and care level. Some seniors may resist the idea, so patience is crucial. Addressing their concerns will ease the transition and make them feel more comfortable.
Prioritize a Home-Like Environment
Moving into assisted living may feel like a loss of independence for many seniors, but a home-like environment can ease this transition. Look for a facility offering private suites, family-style dining, and open areas for interaction. A warm, nurturing atmosphere that encourages autonomy while offering support helps your loved one feel more at ease. The goal is to maintain dignity and control over daily life, enhancing quality of life.
The End Note
Choosing https://villagegreenalzheimerscare.com/kingwood/**** involves considering your loved one’s physical, emotional, and financial needs. You can make an informed decision by understanding care levels and costs and prioritizing well-being. Open communication and selecting a community that supports independence while providing necessary care will help ensure a positive experience for your aging parent.
-
@ 1cb14ab3:95d52462
2025-01-02 05:57:05
No. 1 - The Less Touristy "Bund"
The Bund is certainly a must-see if you are traveling to Shanghai for the first time - and it will be at the top of every travel guide out there, for good reason - there are equally as stunning alternatives away from the crowds. If you want to enjoy the skyline from a more relaxed perspective, consider the Pudong side of the river. There are parks, basketball courts, and green spaces along the riverbank for you to chill at and take in the sights. You can also hop on a ferry or a sightseeing boat to cross the river and admire the views from the renowned Bund.
No. 2 - Walks Along Golden Street
This one is out in Gubei, a suburban area in the west of Shanghai. It may be a bit of a trek, but it is worth it if you are looking for a more relaxing and peaceful pedestrian street in the city. Golden Street, or Jinxiu Road, is a great place to walk a dog, grab an afternoon drink, or enjoy a romantic dinner with your loved one. While it may be a bit far from downtown, it makes for a great joyride on your scooter or bicycle.
No. 3 - Moganshan Road Graffiti Wall
Moganshan Road is a gem for all things art. It is home to M50, the best art district in the city, where you will find dozens of galleries, studios, and workshops showcasing a wide range of art. There are also plenty of cool spots scattered around the area, particularly the graffiti wall. The wall is a welcome contrast to some of the drab and monotonous architecture found around the city; with colorful display of street art featuring various styles and themes. Stop by and admire the works of local and international artists, and even jump in to join them in adding your own mark. The wall is constantly evolving, so you can always find something new.
No. 4 - Jiaotong University in the Fall
Easily one of the best spots in town for catching rows of bright yellow and red leaves. Jiaotong University is one of the oldest and most prestigious universities in China. The campus is located in Xuhui District and has a mix of Chinese and Western architectural styles to admire as well. Try to visit in late October or early November for the best leaf-peeping. You can walk along the tree-lined paths, set up a blanket in the field for a picnic, or simply take photos and enjoy the scenery.
No. 5 - Day Drinking at Highline
Hands down one of the top five rooftop bars in the city, along with Bar Rouge, Kartel, and others; Highline is a go-to-spot that offers great views of the city and excellent food. Find it on the sixth floor of the Ascott Hotel in Huaihai Road in Xintiandi. Nothing beats a laid back Saturday afternoon at Highline. I prefer the views during the day, though it is equally as nice a night. Sip cocktails, wine, or beer, and enjoy the music and vibe. Highline is a perfect place to spend an afternoon.
Additional Photos
Next Guide in the Series:
An Expats Guide to the Best Spots in Shanghai: 002
Find Me Elsewhere:
All images property of Hes. Originally published as an Instagram Guide on Feb. 02, 2021. Reworked and published on Nostr on Feb. 17, 2024.
-
@ dfc7c785:4c3c6174
2025-01-02 05:56:32![[IMG_4743.jpeg]]
ST. MARY'S CHURCH CHOLSEY & AGATHA CHRISTIE
St. Mary's Church
Cholsey church was part of the monastic system set up by Ethelread the Unready in about 986 A.D. The lower part of the tower of St Mary's Church shows traces of Saxon style stonework in the form of 'long and short" quoins. In 1121 when Henry I founded Reading abbey he endowed it with the monastic lands at Cholsey. those days everyone had to pay a tithe - a tenth part of the annual produce of land or labour. The tithe was usually paid in goods and Cholsey produced so much that a huge barn was built - said to be the biggest in Europe.
Great Barn
The church and manor were given to Reading Abbey by Henry Ist in 1121 A.D. It was a most valuable part of the abbey's possessions. In the 13th & 14th centuries the largest barn in Europe was erected close by the church.
Unfortunately, this was demolished in the early 19th century. On the right, as you enter the churchyard you can see a large barn - the original barn was bigger than this. The Great Barn was 303 feet long and had seventeen stone piers on each side supporting the roof timbers.
The Church Bells
There are eight bells in the tower. The Sanctus bell was made by Richard de Wymbish, one of the earliest London Bell founders.
Only a few bells made by him now exist.
The Cholsey bell is still regularly rung.
It was rehung in 1972 and bears the inscription RICARDUS: DE: WIMBUS: ME: FECIT (Richard de Wymbish made me.)
Cholsey First School
In 1837 a school building was erected by the churchyard gates. The school was built by subscription and then adopted by the National Society and was used for Sunday school and evening classes.
Agatha Christie
The world renowned writer Agatha Christie was a resident of the parish of Cholsey. She was born on the 15th September 1890 in Torquay, Devon.
In December 1914 she married an aviator in the Royal Flying Corps - Archibald Christie, but this ended in divorce in 1928.
There was one child from the marriage. In 1930 she married her second husband, the archaeologist Max Mallowan. They bought Winterbrook House in 1934. They attended St. Mary's Curch, Cholsey and are buried in the graveyard of their parish church.
After entering the churchyard walk along the path to the porch and then veer right across the grass towards the wall and you will see a large gravestone
The grave of Agatha Christie and her husband, Max Mallowan is tucked into a corner of the graveyard of St. Mary's Church. Agatha Christie was awarded a Commander of the Order of the British Empire in 1956.
In 1971 she received the Order of Dame Commander of the British Empire. Dame Agatha Christie died on the 12th January 1976 at the age of 85.
To return to Wallingford you need to go back through the churchyard and out to the road. You can then
Cross the road and go back the way you came.
If you wish to start the Agatha Christie Trail, cross the road follow the path to the bypass. Cross carefully and walk down Winterbrook Lane until you reach the main road. You need to cross and you will soon reach Winterbrook House which is almost hidden by a hedge.
Turn right and walk carefully over the bridge, past the school and turn right through the gate and walk across Whitehead Meadow. Turn left through the recreation ground towards the Pavilion. On leaving the recreation ground, turn left and walk into the centre of the village where it is possible to catch a bus into Wallingford.
Turn right and follow the pavement into Cholsey. At the first mini roundabout turn left and head back towards Wallingford After the Red Lion there is a long straight road until you reach the bypass. Winterbrook House is on the right hand side of Reading Road.
-
@ 1bda7e1f:bb97c4d9
2025-01-02 05:19:08Tldr
- Nostr is an open and interoperable protocol
- You can integrate it with workflow automation tools to augment your experience
- n8n is a great low/no-code workflow automation tool which you can host yourself
- Nostrobots allows you to integrate Nostr into n8n
- In this blog I create some workflow automations for Nostr
- A simple form to delegate posting notes
- Push notifications for mentions on multiple accounts
- Push notifications for your favourite accounts when they post a note
- All workflows are provided as open source with MIT license for you to use
Inter-op All The Things
Nostr is a new open social protocol for the internet. This open nature exciting because of the opportunities for interoperability with other technologies. In Using NFC Cards with Nostr I explored the
nostr:
URI to launch Nostr clients from a card tap.The interoperability of Nostr doesn't stop there. The internet has many super-powers, and Nostr is open to all of them. Simply, there's no one to stop it. There is no one in charge, there are no permissioned APIs, and there are no risks of being de-platformed. If you can imagine technologies that would work well with Nostr, then any and all of them can ride on or alongside Nostr rails.
My mental model for why this is special is Google Wave ~2010. Google Wave was to be the next big platform. Lars was running it and had a big track record from Maps. I was excited for it. Then, Google pulled the plug. And, immediately all the time and capital invested in understanding and building on the platform was wasted.
This cannot happen to Nostr, as there is no one to pull the plug, and maybe even no plug to pull.
So long as users demand Nostr, Nostr will exist, and that is a pretty strong guarantee. It makes it worthwhile to invest in bringing Nostr into our other applications.
All we need are simple ways to plug things together.
Nostr and Workflow Automation
Workflow automation is about helping people to streamline their work. As a user, the most common way I achieve this is by connecting disparate systems together. By setting up one system to trigger another or to move data between systems, I can solve for many different problems and become way more effective.
n8n for workflow automation
Many workflow automation tools exist. My favourite is n8n. n8n is a low/no-code workflow automation platform which allows you to build all kinds of workflows. You can use it for free, you can self-host it, it has a user-friendly UI and useful API. Vs Zapier it can be far more elaborate. Vs Make.com I find it to be more intuitive in how it abstracts away the right parts of the code, but still allows you to code when you need to.
Most importantly you can plug anything into n8n: You have built-in nodes for specific applications. HTTP nodes for any other API-based service. And community nodes built by individual community members for any other purpose you can imagine.
Eating my own dogfood
It's very clear to me that there is a big design space here just demanding to be explored. If you could integrate Nostr with anything, what would you do?
In my view the best way for anyone to start anything is by solving their own problem first (aka "scratching your own itch" and "eating your own dogfood"). As I get deeper into Nostr I find myself controlling multiple Npubs – to date I have a personal Npub, a brand Npub for a community I am helping, an AI assistant Npub, and various testing Npubs. I need ways to delegate access to those Npubs without handing over the keys, ways to know if they're mentioned, and ways to know if they're posting.
I can build workflows with n8n to solve these issues for myself to start with, and keep expanding from there as new needs come up.
Running n8n with Nostrobots
I am mostly non-technical with a very helpful AI. To set up n8n to work with Nostr and operate these workflows should be possible for anyone with basic technology skills.
- I have a cheap VPS which currently runs my HAVEN Nostr Relay and Albyhub Lightning Node in Docker containers,
- My objective was to set up n8n to run alongside these in a separate Docker container on the same server, install the required nodes, and then build and host my workflows.
Installing n8n
Self-hosting n8n could not be easier. I followed n8n's Docker-Compose installation docs–
- Install Docker and Docker-Compose if you haven't already,
- Create your
docker-compose.yml
and.env
files from the docs, - Create your data folder
sudo docker volume create n8n_data
, - Start your container with
sudo docker compose up -d
, - Your n8n instance should be online at port
5678
.
n8n is free to self-host but does require a license. Enter your credentials into n8n to get your free license key. You should now have access to the Workflow dashboard and can create and host any kind of workflows from there.
Installing Nostrobots
To integrate n8n nicely with Nostr, I used the Nostrobots community node by Ocknamo.
In n8n parlance a "node" enables certain functionality as a step in a workflow e.g. a "set" node sets a variable, a "send email" node sends an email. n8n comes with all kinds of "official" nodes installed by default, and Nostr is not amongst them. However, n8n also comes with a framework for community members to create their own "community" nodes, which is where Nostrobots comes in.
You can only use a community node in a self-hosted n8n instance (which is what you have if you are running in Docker on your own server, but this limitation does prevent you from using n8n's own hosted alternative).
To install a community node, see n8n community node docs. From your workflow dashboard–
- Click the "..." in the bottom left corner beside your username, and click "settings",
- Cilck "community nodes" left sidebar,
- Click "Install",
- Enter the "npm Package Name" which is
n8n-nodes-nostrobots
, - Accept the risks and click "Install",
- Nostrobots is now added to your n8n instance.
Using Nostrobots
Nostrobots gives you nodes to help you build Nostr-integrated workflows–
- Nostr Write – for posting Notes to the Nostr network,
- Nostr Read – for reading Notes from the Nostr network, and
- Nostr Utils – for performing certain conversions you may need (e.g. from bech32 to hex).
Nostrobots has good documentation on each node which focuses on simple use cases.
Each node has a "convenience mode" by default. For example, the "Read" Node by default will fetch Kind 1 notes by a simple filter, in Nostrobots parlance a "Strategy". For example, with Strategy set to "Mention" the node will accept a pubkey and fetch all Kind 1 notes that Mention the pubkey within a time period. This is very good for quick use.
What wasn't clear to me initially (until Ocknamo helped me out) is that advanced use cases are also possible.
Each node also has an advanced mode. For example, the "Read" Node can have "Strategy" set to "RawFilter(advanced)". Now the node will accept json (anything you like that complies with NIP-01). You can use this to query Notes (Kind 1) as above, and also Profiles (Kind 0), Follow Lists (Kind 3), Reactions (Kind 7), Zaps (Kind 9734/9735), and anything else you can think of.
Creating and adding workflows
With n8n and Nostrobots installed, you can now create or add any kind of Nostr Workflow Automation.
- Click "Add workflow" to go to the workflow builder screen,
- If you would like to build your own workflow, you can start with adding any node. Click "+" and see what is available. Type "Nostr" to explore the Nostrobots nodes you have added,
- If you would like to add workflows that someone else has built, click "..." in the top right. Then click "import from URL" and paste in the URL of any workflow you would like to use (including the ones I share later in this article).
Nostr Workflow Automations
It's time to build some things!
A simple form to post a note to Nostr
I started very simply. I needed to delegate the ability to post to Npubs that I own in order that a (future) team can test things for me. I don't want to worry about managing or training those people on how to use keys, and I want to revoke access easily.
I needed a basic form with credentials that posted a Note.
For this I can use a very simple workflow–
- A n8n Form node – Creates a form for users to enter the note they wish to post. Allows for the form to be protected by a username and password. This node is the workflow "trigger" so that the workflow runs each time the form is submitted.
- A Set node – Allows me to set some variables, in this case I set the relays that I intend to use. I typically add a Set node immediately following the trigger node, and put all the variables I need in this. It helps to make the workflows easier to update and maintain.
- A Nostr Write node (from Nostrobots) – Writes a Kind-1 note to the Nostr network. It accepts Nostr credentials, the output of the Form node, and the relays from the Set node, and posts the Note to those relays.
Once the workflow is built, you can test it with the testing form URL, and set it to "Active" to use the production form URL. That's it. You can now give posting access to anyone for any Npub. To revoke access, simply change the credentials or set to workflow to "Inactive".
It may also be the world's simplest Nostr client.
You can find the Nostr Form to Post a Note workflow here.
Push notifications on mentions and new notes
One of the things Nostr is not very good at is push notifications. Furthermore I have some unique itches to scratch. I want–
- To make sure I never miss a note addressed to any of my Npubs – For this I want a push notification any time any Nostr user mentions any of my Npubs,
- To make sure I always see all notes from key accounts – For this I need a push notification any time any of my Npubs post any Notes to the network,
- To get these notifications on all of my devices – Not just my phone where my Nostr regular client lives, but also on each of my laptops to suit wherever I am working that day.
I needed to build a Nostr push notifications solution.
To build this workflow I had to string a few ideas together–
- Triggering the node on a schedule – Nostrobots does not include a trigger node. As every workflow starts with a trigger we needed a different method. I elected to run the workflow on a schedule of every 10-minutes. Frequent enough to see Notes while they are hot, but infrequent enough to not burden public relays or get rate-limited,
- Storing a list of Npubs in a Nostr list – I needed a way to store the list of Npubs that trigger my notifications. I initially used an array defined in the workflow, this worked fine. Then I decided to try Nostr lists (NIP-51, kind 30000). By defining my list of Npubs as a list published to Nostr I can control my list from within a Nostr client (e.g. Listr.lol or Nostrudel.ninja). Not only does this "just work", but because it's based on Nostr lists automagically Amethyst client allows me to browse that list as a Feed, and everyone I add gets notified in their Mentions,
- Using specific relays – I needed to query the right relays, including my own HAVEN relay inbox for notes addressed to me, and wss://purplepag.es for Nostr profile metadata,
- Querying Nostr events (with Nostrobots) – I needed to make use of many different Nostr queries and use quite a wide range of what Nostrobots can do–
- I read the EventID of my Kind 30000 list, to return the desired pubkeys,
- For notifications on mentions, I read all Kind 1 notes that mention that pubkey,
- For notifications on new notes, I read all Kind 1 notes published by that pubkey,
- Where there are notes, I read the Kind 0 profile metadata event of that pubkey to get the displayName of the relevant Npub,
- I transform the EventID into a Nevent to help clients find it.
- Using the Nostr URI – As I did with my NFC card article, I created a link with the
nostr:
URI prefix so that my phone's native client opens the link by default, - Push notifications solution – I needed a push notifications solution. I found many with n8n integrations and chose to go with Pushover which supports all my devices, has a free trial, and is unfairly cheap with a $5-per-device perpetual license.
Once the workflow was built, lists published, and Pushover installed on my phone, I was fully set up with push notifications on Nostr. I have used these workflows for several weeks now and made various tweaks as I went. They are feeling robust and I'd welcome you to give them a go.
You can find the Nostr Push Notification If Mentioned here and If Posts a Note here.
In speaking with other Nostr users while I was building this, there are all kind of other needs for push notifications too – like on replies to a certain bookmarked note, or when a followed Npub starts streaming on zap.stream. These are all possible.
Use my workflows
I have open sourced all my workflows at my Github with MIT license and tried to write complete docs, so that you can import them into your n8n and configure them for your own use.
To import any of my workflows–
- Click on the workflow of your choice, e.g. "Nostr_Push_Notify_If_Mentioned.json",
- Click on the "raw" button to view the raw JSON, ex any Github page layout,
- Copy that URL,
- Enter that URL in the "import from URL" dialog mentioned above.
To configure them–
- Prerequisites, credentials, and variables are all stated,
- In general any variables required are entered into a Set Node that follows the trigger node,
- Pushover has some extra setup but is very straightforward and documented in the workflow.
What next?
Over my first four blogs I explored creating a good Nostr setup with Vanity Npub, Lightning Payments, Nostr Addresses at Your Domain, and Personal Nostr Relay.
Then in my latest two blogs I explored different types of interoperability with NFC cards and now n8n Workflow Automation.
Thinking ahead n8n can power any kind of interoperability between Nostr and any other legacy technology solution. On my mind as I write this:
- Further enhancements to posting and delegating solutions and forms (enhanced UI or different note kinds),
- Automated or scheduled posting (such as auto-liking everything Lyn Alden posts),
- Further enhancements to push notifications, on new and different types of events (such as notifying me when I get a new follower, on replies to certain posts, or when a user starts streaming),
- All kinds of bridges, such as bridging notes to and from Telegram, Slack, or Campfire. Or bridging RSS or other event feeds to Nostr,
- All kinds of other automation (such as BlackCoffee controlling a coffee machine),
- All kinds of AI Assistants and Agents,
In fact I have already released an open source workflow for an AI Assistant, and will share more about that in my next blog.
Please be sure to let me know if you think there's another Nostr topic you'd like to see me tackle.
GM Nostr.
-
@ 79998141:0f8f1901
2025-01-02 05:04:56Happy new year, Anon.
Thanks for tuning in to whatever this long form post will be. I hope to make these more regular, like journal entries as we travel through "real life" and the Nostrverse together. If I'm making time for this reflective writing, then things are going as planned.
2024 was a wildly transformative year for me for many reasons... there's no way I can possibly fit all of them here. They're not all related to Bitcoin and Nostr- I've got a beautiful life outside of all that which has its own independent arc. My wife and I celebrated 7 years of marriage together, stronger than ever (don't believe that "itch" bullshit). We let go of some negative relationships and embraced some positive ones. We cut some bad habits, and we made some good habits. We worked, we traveled, we saw family, and we partied.
But damn, these two technologies have become a huge part of my life. God willing, this trend will continue until they've both eclipsed my professional capacity through our startup, Conduit BTC.
This was the year I was truly orange pilled. Until late 2023, I had traded (quite profitably) Bitcoin, "crypto", stocks, options, prediction markets and whatever else I could get my hands on that felt undervalued. I did this all in my spare time, grinding out a little financial freedom while I hustled at my fiat ventures to support my little family. I wasn't a true believer- just an opportunist with a knack for spotting where and when a crowd might flock to next. That was right up until I ran face first into Lyn Alden's book "Broken Money".
Something about Lyn's engineer/macro-finance inspired prose clicked with me, lock and key. Total one way function. By the end of the book my laser eyes had burned a hole in my bedroom ceiling. I was all in- and acted accordingly both with my capital and my attention. It wasn't long before I discovered Nostr and dove in here too, falling deep into my current orange and purple polyamorous love affair.
"If you know the enemy and know yourself, you need not fear the result of a hundred battles."
Despite the passion, through studying Bitcoin's criticisms (from the likes of Mike Green and Nassim Taleb) I found a hole in the utopian plot: none of this works without Bitcoin actually being used as money. Worldwide transactions must skyrocket demand for blockspace to keep the network secure/stable for the long term. Besides, if everyday folks aren't using Bitcoin as money then we haven't done shit to make the world a better place. In that world, we've only replaced old masters with new ones. Fuck that.
Whatever I did in this space needed to increase the usage of Bitcoin as money. Simple. This was bigger than passion, this was purpose. I knew that come hell or high water I would dedicate myself to this mission.
Lucky for me I found a partner and best friend in @aceaspades to go on this adventure with. I'm infinitely grateful for him. He's an incredible man who also happens to be an insanely creative and talented software developer. We'd tried for years to find the right project to focus on together, experimenting with all kinds of new techy ideas as they came across our field. Nothing had ever captured our attention like this. This was different. By March of 2024 we had formed a company and gotten to work iterating on how we could leverage these beautiful protocols and open-source tech to create something that served our mission. This is @ConduitBTC.
I've done well in my fiat career executing plans downstream of someone else's creative vision. I've learned the ins and outs of an established ecosystem and found ways to profit from it. I take plans developed by others, compete to win contracts to build them, and execute on them in a cashflow-positive way. I'm bringing this no bullshit blue collar skillset with me to the Nostrverse whether they like it or not.
The adventure we're embarking on now is totally different though. We're charting a new course - totally creative, highly intuitive and extremely speculative towards a future that doesn't exist yet. There are few established norms. The potential is vast but unknown. We're diving into a strange quest to sell a map to an imaginary place and to simultaneously architect its creation (alongside all the amazing builders here doing the same thing). This is insanely exciting to me.
We're barely getting started but a lot has been invested under the surface which will show itself in 2025. We'll be sharing updates in a proper post on @ConduitBTC soon.
As for my personal 2025 resolutions, here they are: - zero alcohol for the entire year (did this in 2019 and had a great year, it's time for a rerun) - more focused presence in the moment: especially with my wife - more self care and prioritized mental/physical health - this includes daily: naps, prayer, self hypnosis or meditation, sweat, and stretching/massaging (overworked in 2024 with a fiat 9-5, a board/advisor role in a fiat business I have equity in, and my newfound passion here. Two serious burn out episodes experienced this year - zero is the only acceptable number of burnouts for long term health and success.) - related to the above: get Conduit some mission-aligned funding partners and leave my fiat 9-5. Grow the Conduit team (have put in a serious amount of my personal capital already to get this going, which will show fruit in the new year... but I am not an island) - more authentic and thoughtful posts on Nostr, with a solid amount of shitposting and organic home grown memes to balance it out... more zaps, more geniune connections and interactions with the curious forward thinking people on here - more IRL Nostr/Bitcoin events - more laughter, more jokes
Enough for now. Cheers to you and yours Anon, may 2025 bring you the magic you've been dreaming of.
-
@ 13e63e99:25525c6a
2025-01-02 02:03:59The recent appointments by President-elect Donald Trump have generated significant excitement within the cryptocurrency sector. His crypto-supportive team has amplified market enthusiasm, pushing Bitcoin's price to an all-time high as the industry rallies around the news. Our team has analyzed each appointee to assess the long-term implications of Trump’s administration on the crypto landscape.
Key Appointments and Their Implications
1. David Sacks – White House AI and Crypto Czar
Sacks, a entrepreneur, investor, and advocate for cryptocurrencies, with a career spanning multiple successful ventures. He is the founding partner of Craft Ventures, a VC firm that invests in tech and crypto. Previously, Sacks was the COO of PayPal during its early days. Sacks has been an advocate for economic freedom, decentralization, and sensible crypto regulation. He has been involved in shaping crypto policy through his connection with political leaders, including his recent role as part of President-elect Trump’s pro-crypto team. His appointment highlights the administration’s intent to integrate cryptocurrency and AI into national policy, potentially creating a favorable environment for technological growth.
2. Paul Atkins – SEC Chairman Nominee
Atkins served as a commissioner for the U.S. Securities and Exchange Commission (SEC) from 2002 to 2008, where he advocated for market-oriented policies and reduced regulatory burdens. He has been a prominent voice in pushing for regulatory clarity in emerging financial technologies, including cryptocurrencies. He has consistently emphasized the importance of balancing investor protection with fostering innovation. Atkins’ nomination underscores a clear effort to address regulatory uncertainty in the crypto industry. As co-chair of the Digital Chamber’s Token Alliance since 2017, he has consistently supported initiatives that balance consumer protection with innovation. His leadership at the SEC is expected to bring much-needed clarity to the regulatory framework.
3. Stephen Miran – Chair of the Council of Economic Advisors
The council advises the president on economic policy, assists in the preparation of an annual report that gives an overview of the country's economy, reviews federal policies and programs and makes economic policy recommendations. Stephen Miran is a economist with a focus on deregulation and economic policy. He is best known for his role as an economic advisor with a strong commitment to fostering technological advancement and free-market principles. He is an advocate for streamlining regulatory processes, enabling new technologies like Bitcoin to thrive in a competitive global economy. Miran's ability to shape national economic policies could therefore play a critical role in determining the future regulatory landscape for cryptocurrencies in the U.S.
4. Rep. French Hill-Chairman of the House Financial Services Subcommittee on Digital Assets
Rep. Hill has served in the U.S. House of Representatives since 2015. He has been involved in numerous legislative efforts, focusing on economic policy, financial services, and digital asset regulation. Rep. Hill has elected to be Chairman of the House Financial Services Subcommittee on Digital Assets and has been a vocal advocate for creating a structured regulatory framework for cryptocurrencies and digital assets. Rep. Hill has identified a digital asset market structure bill as a priority for the Republican Party. His statements have stressed the importance of developing clear rules that will foster innovation, while also making sure that digital assets don’t become a vehicle for illegal activity or instability.
Outlook for the Crypto Industry
If the Trump administration follows through on its pledges, the U.S. could experience:
-
Enhanced Regulatory Clarity: Clear guidelines could attract institutional investment and drive industry innovation.
-
Improved Market Confidence: A well-structured framework may mitigate risks and encourage broader adoption of digital assets.
-
Global Leadership: Proactive support for cryptocurrencies could establish the U.S. as a leader in financial innovation.
However, delays or failure to act decisively could perpetuate uncertainty and market instability. The crypto community remains cautiously optimistic, awaiting tangible policy actions that translate this promising momentum into long-term growth opportunities.
Reference: MayerBrown, Pensions&Investments, Time
IMF-Driven Revisions to Bitcoin Law\ El Salvador and the IMF have reached an agreement on a $1.4 billion loan program, to be disbursed over 40 months, according to an IMF statement. In return, El Salvador has committed to implementing measures aimed at improving its primary balance and reducing its debt-to-GDP ratio. As part of the conditions for a new IMF loan package, President Nayib Bukele of El Salvador has agreed to revise key aspects of the country's groundbreaking Bitcoin Law enacted in 2021. The changes include:
-
Ending the Legal Tender Mandate: Businesses are no longer required to accept Bitcoin as a form of payment.
-
Shutting Down Chivo Wallet: The state-run wallet, plagued with technical issues, will cease operations.
-
Halting Bitcoin Tax Payments: Bitcoin will no longer be accepted for tax obligations.
Backlash and Misunderstandings\ Critics on social media have accused Bukele of abandoning his commitment to Bitcoin, framing these changes as a betrayal. However, such reactions fail to recognize the broader context of his leadership.
Leadership Priorities\ Bukele’s primary responsibility is to the Salvadoran people, not the global Bitcoin community. El Salvador faces profound challenges, including poverty, crime, and underdeveloped infrastructure. These realities necessitate pragmatic governance, where Bitcoin serves as a tool—not an ideology.
Expecting Bukele to prioritize Bitcoin over the well-being of his nation is both unrealistic and misaligned with the role of a national leader. The decision to modify the Bitcoin Law reflects a calculated effort to balance innovation with the pressing needs of the Salvadoran populace.
Implications
-
Investor Sentiment and Confidence: Bitcoin investors, particularly those who saw El Salvador's Bitcoin adoption as a milestone for mainstream acceptance, expressed disappointment over the reversal. Bitcoin experienced dip in value on the day the news broke.
-
IMF Dynamics: The IMF’s involvement also fueled concerns, as it was seen as a sign that traditional financial institutions were exerting influence over a policy that was once viewed as groundbreaking for Bitcoin adoption. Some traders and investors worried that further pressure from the IMF could lead to additional regulatory restrictions, potentially dampening future market enthusiasm. The concessions demonstrate the leverage international institutions hold over nations experimenting with alternative financial systems. This could prompt a reassessment of Bitcoin adoption strategies in the face of external pressures.
-
Setback to Bitcoin as “Medium of Exchange": El Salvador's scaling back of its Bitcoin Law could significantly slow the growth of Bitcoin as a medium of exchange, as the country had been seen as the most iconic and pioneering example of fostering a Bitcoin circular economy. The government has reduced the incentives for businesses and consumers to adopt Bitcoin for everyday transactions. As a result, the dream of creating a Bitcoin-driven economy in El Salvador, where the cryptocurrency could circulate seamlessly, faces a major setback, potentially delaying or even derailing Bitcoin’s path to becoming a widely used and accepted global currency.
President Bukele’s revisions to the Bitcoin Law are not a betrayal or rejection of Bitcoin, but a pragmatic adjustment to better serve the needs of El Salvador. Bitcoin remains an important tool in the nation’s economic strategy, but its utility must be balanced with other pressing priorities. El Salvador is still committed to purchasing Bitcoin and is likely to accelerate its pace. Ultimately, it's essential to remove the rose-tinted glasses and recognize the reality of a more mature and practical approach to integrating Bitcoin within a complex national economy.
Reference: Yahoo Finance, BitcoinMagazine
1. MicroStrategy to turn to fixed-income securities to raise funds for Bitcoin purchases
MicroStrategy, led by co-founder Michael Saylor, is shifting its funding strategy for Bitcoin purchases. Once its current fundraising plan is fully utilized, the company will move from using Bitcoin proxies to focusing on fixed-income securities. Previously, MicroStrategy has funded Bitcoin acquisitions through stock and convertible bond sales, with convertible bonds yielding positive returns as the company’s stock price rose. Saylor emphasized leveraging strategies to enhance shareholder value, noting that $4 billion of their $7.2 billion in convertible notes act as equity. This pivot aligns with a broader market trend where hedge funds are increasingly using fixed-income securities for convertible arbitrage, prompting MicroStrategy to issue $6.2 billion in convertible bonds this year. The move positions the company to adapt to the changing investment landscape while maximizing returns for shareholders.
Reference: Bloomberg
2. Russia Is Using Bitcoin for International Trade
Russian Finance Minister Anton Siluanov announced that Russian companies have started using Bitcoin and other digital currencies for international payments, a move in response to recent legislative changes aimed at countering Western sanctions. Additionally, lawmaker Anton Tkachev proposed creating a Bitcoin reserve, similar to foreign exchange reserves, to mitigate risks from sanctions, inflation, and currency fluctuations. This marks a step toward greater economic sovereignty and resilience.
Reference: The block beats
3. Japanese Government Responds to Proposal for Establishing Bitcoin Reserve
The Japanese government recently responded to a proposal by Senator Satoshi Hamada regarding the consideration of Bitcoin as a reserve asset, a trend gaining traction in countries like the U.S. While acknowledging the growing global interest in cryptocurrencies, the government expressed that discussions on Bitcoin’s role as a reserve asset are still in early stages and refrained from forming an opinion. Citing its legal framework, Japan emphasized that cryptocurrencies like Bitcoin are not classified as foreign exchange and do not align with the objectives of maintaining stable and liquid foreign exchange reserves. Japan’s cautious approach reflects its commitment to economic stability while evaluating the potential integration of digital assets.
Reference: coin post
Happy New Year from Team HCM! As we welcome the new year, we are excited to celebrate not only the joy of the season but also the growth and progress of the Bitcoin community. Reflecting on 2024, we made significant strides and embraced new changes. The official HCM website is set to launch at early January of the year 2025, marking an exciting new chapter for our team. Looking ahead, we are enthusiastic about the future and the global adoption of Bitcoin, which will continue to grow stronger and more impactful. Here's to an incredible journey ahead, filled with innovation, collaboration, and success! Cheers to 2025!
-
-
@ 13e63e99:25525c6a
2025-01-02 02:00:48The recent appointments by President-elect Donald Trump have generated significant excitement within the cryptocurrency sector. His crypto-supportive team has amplified market enthusiasm, pushing Bitcoin's price to an all-time high as the industry rallies around the news. Our team has analyzed each appointee to assess the long-term implications of Trump’s administration on the crypto landscape.
Key Appointments and Their Implications
1. David Sacks – White House AI and Crypto Czar
Sacks, a entrepreneur, investor, and advocate for cryptocurrencies, with a career spanning multiple successful ventures. He is the founding partner of Craft Ventures, a VC firm that invests in tech and crypto. Previously, Sacks was the COO of PayPal during its early days. Sacks has been an advocate for economic freedom, decentralization, and sensible crypto regulation. He has been involved in shaping crypto policy through his connection with political leaders, including his recent role as part of President-elect Trump’s pro-crypto team. His appointment highlights the administration’s intent to integrate cryptocurrency and AI into national policy, potentially creating a favorable environment for technological growth.
2. Paul Atkins – SEC Chairman Nominee
Atkins served as a commissioner for the U.S. Securities and Exchange Commission (SEC) from 2002 to 2008, where he advocated for market-oriented policies and reduced regulatory burdens. He has been a prominent voice in pushing for regulatory clarity in emerging financial technologies, including cryptocurrencies. He has consistently emphasized the importance of balancing investor protection with fostering innovation. Atkins’ nomination underscores a clear effort to address regulatory uncertainty in the crypto industry. As co-chair of the Digital Chamber’s Token Alliance since 2017, he has consistently supported initiatives that balance consumer protection with innovation. His leadership at the SEC is expected to bring much-needed clarity to the regulatory framework.
3. Stephen Miran – Chair of the Council of Economic Advisors
The council advises the president on economic policy, assists in the preparation of an annual report that gives an overview of the country's economy, reviews federal policies and programs and makes economic policy recommendations. Stephen Miran is a economist with a focus on deregulation and economic policy. He is best known for his role as an economic advisor with a strong commitment to fostering technological advancement and free-market principles. He is an advocate for streamlining regulatory processes, enabling new technologies like Bitcoin to thrive in a competitive global economy. Miran's ability to shape national economic policies could therefore play a critical role in determining the future regulatory landscape for cryptocurrencies in the U.S.
4. Rep. French Hill-Chairman of the House Financial Services Subcommittee on Digital Assets
Rep. Hill has served in the U.S. House of Representatives since 2015. He has been involved in numerous legislative efforts, focusing on economic policy, financial services, and digital asset regulation. Rep. Hill has elected to be Chairman of the House Financial Services Subcommittee on Digital Assets and has been a vocal advocate for creating a structured regulatory framework for cryptocurrencies and digital assets. Rep. Hill has identified a digital asset market structure bill as a priority for the Republican Party. His statements have stressed the importance of developing clear rules that will foster innovation, while also making sure that digital assets don’t become a vehicle for illegal activity or instability.
Outlook for the Crypto Industry
If the Trump administration follows through on its pledges, the U.S. could experience:
-
Enhanced Regulatory Clarity: Clear guidelines could attract institutional investment and drive industry innovation.
-
Improved Market Confidence: A well-structured framework may mitigate risks and encourage broader adoption of digital assets.
-
Global Leadership: Proactive support for cryptocurrencies could establish the U.S. as a leader in financial innovation.
However, delays or failure to act decisively could perpetuate uncertainty and market instability. The crypto community remains cautiously optimistic, awaiting tangible policy actions that translate this promising momentum into long-term growth opportunities.
Reference: MayerBrown, Pensions&Investments, Time
IMF-Driven Revisions to Bitcoin Law\ El Salvador and the IMF have reached an agreement on a $1.4 billion loan program, to be disbursed over 40 months, according to an IMF statement. In return, El Salvador has committed to implementing measures aimed at improving its primary balance and reducing its debt-to-GDP ratio. As part of the conditions for a new IMF loan package, President Nayib Bukele of El Salvador has agreed to revise key aspects of the country's groundbreaking Bitcoin Law enacted in 2021. The changes include:
-
Ending the Legal Tender Mandate: Businesses are no longer required to accept Bitcoin as a form of payment.
-
Shutting Down Chivo Wallet: The state-run wallet, plagued with technical issues, will cease operations.
-
Halting Bitcoin Tax Payments: Bitcoin will no longer be accepted for tax obligations.
Backlash and Misunderstandings\ Critics on social media have accused Bukele of abandoning his commitment to Bitcoin, framing these changes as a betrayal. However, such reactions fail to recognize the broader context of his leadership.
Leadership Priorities\ Bukele’s primary responsibility is to the Salvadoran people, not the global Bitcoin community. El Salvador faces profound challenges, including poverty, crime, and underdeveloped infrastructure. These realities necessitate pragmatic governance, where Bitcoin serves as a tool—not an ideology.
Expecting Bukele to prioritize Bitcoin over the well-being of his nation is both unrealistic and misaligned with the role of a national leader. The decision to modify the Bitcoin Law reflects a calculated effort to balance innovation with the pressing needs of the Salvadoran populace.
Implications
-
Investor Sentiment and Confidence: Bitcoin investors, particularly those who saw El Salvador's Bitcoin adoption as a milestone for mainstream acceptance, expressed disappointment over the reversal. Bitcoin experienced dip in value on the day the news broke.
-
IMF Dynamics: The IMF’s involvement also fueled concerns, as it was seen as a sign that traditional financial institutions were exerting influence over a policy that was once viewed as groundbreaking for Bitcoin adoption. Some traders and investors worried that further pressure from the IMF could lead to additional regulatory restrictions, potentially dampening future market enthusiasm. The concessions demonstrate the leverage international institutions hold over nations experimenting with alternative financial systems. This could prompt a reassessment of Bitcoin adoption strategies in the face of external pressures.
-
Setback to Bitcoin as “Medium of Exchange": El Salvador's scaling back of its Bitcoin Law could significantly slow the growth of Bitcoin as a medium of exchange, as the country had been seen as the most iconic and pioneering example of fostering a Bitcoin circular economy. The government has reduced the incentives for businesses and consumers to adopt Bitcoin for everyday transactions. As a result, the dream of creating a Bitcoin-driven economy in El Salvador, where the cryptocurrency could circulate seamlessly, faces a major setback, potentially delaying or even derailing Bitcoin’s path to becoming a widely used and accepted global currency.
President Bukele’s revisions to the Bitcoin Law are not a betrayal or rejection of Bitcoin, but a pragmatic adjustment to better serve the needs of El Salvador. Bitcoin remains an important tool in the nation’s economic strategy, but its utility must be balanced with other pressing priorities. El Salvador is still committed to purchasing Bitcoin and is likely to accelerate its pace. Ultimately, it's essential to remove the rose-tinted glasses and recognize the reality of a more mature and practical approach to integrating Bitcoin within a complex national economy.
Reference: Yahoo Finance, BitcoinMagazine
1. MicroStrategy to turn to fixed-income securities to raise funds for Bitcoin purchases
MicroStrategy, led by co-founder Michael Saylor, is shifting its funding strategy for Bitcoin purchases. Once its current fundraising plan is fully utilized, the company will move from using Bitcoin proxies to focusing on fixed-income securities. Previously, MicroStrategy has funded Bitcoin acquisitions through stock and convertible bond sales, with convertible bonds yielding positive returns as the company’s stock price rose. Saylor emphasized leveraging strategies to enhance shareholder value, noting that $4 billion of their $7.2 billion in convertible notes act as equity. This pivot aligns with a broader market trend where hedge funds are increasingly using fixed-income securities for convertible arbitrage, prompting MicroStrategy to issue $6.2 billion in convertible bonds this year. The move positions the company to adapt to the changing investment landscape while maximizing returns for shareholders.
Reference: Bloomberg
2. Russia Is Using Bitcoin for International Trade
Russian Finance Minister Anton Siluanov announced that Russian companies have started using Bitcoin and other digital currencies for international payments, a move in response to recent legislative changes aimed at countering Western sanctions. Additionally, lawmaker Anton Tkachev proposed creating a Bitcoin reserve, similar to foreign exchange reserves, to mitigate risks from sanctions, inflation, and currency fluctuations. This marks a step toward greater economic sovereignty and resilience.
Reference: The block beats
3. Japanese Government Responds to Proposal for Establishing Bitcoin Reserve
The Japanese government recently responded to a proposal by Senator Satoshi Hamada regarding the consideration of Bitcoin as a reserve asset, a trend gaining traction in countries like the U.S. While acknowledging the growing global interest in cryptocurrencies, the government expressed that discussions on Bitcoin’s role as a reserve asset are still in early stages and refrained from forming an opinion. Citing its legal framework, Japan emphasized that cryptocurrencies like Bitcoin are not classified as foreign exchange and do not align with the objectives of maintaining stable and liquid foreign exchange reserves. Japan’s cautious approach reflects its commitment to economic stability while evaluating the potential integration of digital assets.
Reference: coin post
Happy New Year from Team HCM! As we welcome the new year, we are excited to celebrate not only the joy of the season but also the growth and progress of the Bitcoin community. Reflecting on 2024, we made significant strides and embraced new changes. The official HCM website is set to launch at early January of the year 2025, marking an exciting new chapter for our team. Looking ahead, we are enthusiastic about the future and the global adoption of Bitcoin, which will continue to grow stronger and more impactful. Here's to an incredible journey ahead, filled with innovation, collaboration, and success! Cheers to 2025!
-
-
@ a012dc82:6458a70d
2025-01-02 01:57:34Table Of Content
-
A Series of Banking Collapses
-
Federal Reserve's Counteraction
-
The Impact on Bitcoin
-
Market's Delayed Reaction
-
Bitcoin's Future Amidst Monetary Policies
-
Conclusions
-
FAQ
Bitcoin, the digital gold of the 21st century, has always been at the center of discussions in the financial and tech worlds. Its volatile price movements and its potential to revolutionize the financial sector make it a hot topic. Among the many voices opining on Bitcoin's trajectory, Arthur Hayes, co-founder and former CEO of BitMEX, stands out with his unique insights. He firmly believes that March was a defining month that signaled the onset of a bullish trend for Bitcoin. This article aims to unpack Hayes' perspective and understand the reasons behind his belief.
A Series of Banking Collapses
March of this year wasn't just another month on the financial calendar; it was a month marked by significant banking disturbances. Hayes attributes the beginning of Bitcoin's bull run to a specific date: March 10. On this day, the Silicon Valley Bank (SVB) was taken over by the Federal Deposit Insurance Corporation, a significant event in the banking world. But this wasn't an isolated incident. Just two days before, on March 8, Silvergate Bank faced liquidation, sending ripples of concern through the financial community. This wave of uncertainty continued when, on March 12, Signature Bank was compelled to shut its doors due to intervention by New York regulators. These back-to-back banking crises set the stage for what was to come in the cryptocurrency realm.
Federal Reserve's Counteraction
Reacting to the unfolding banking crises, the Federal Reserve took a decisive step. They introduced the Bank Term Funding Program (BTFP), a strategic move aimed at stabilizing the banking sector. This program was designed to offer banks loans that could extend up to a year. However, there was a catch: banks had to post "qualifying assets" as collateral to avail themselves of these loans. Hayes viewed this initiative as a clear attempt by the Federal Reserve to provide a safety net for the entire banking system. In his interpretation, the Fed's message was straightforward: "Exchange your devalued bonds for fresh dollars, and let's stabilize the system."
The Impact on Bitcoin
The repercussions of the banking crises and the Federal Reserve's countermeasures were felt in the cryptocurrency market, particularly in Bitcoin's price dynamics. Following these events, Bitcoin's price began its upward trajectory, registering an impressive increase of approximately 26%. Hayes believes that the Federal Reserve's actions, combined with the growing skepticism towards the value of fiat currencies, played a pivotal role in this surge. As faith in traditional currencies waned, traders and investors began to see the appeal of fixed-supply assets, with Bitcoin emerging as the prime contender.
Market's Delayed Reaction
While the indicators pointing to a bullish trend in Bitcoin are clear to some, Hayes observes that the broader market has been somewhat sluggish in its response. This delay in market reaction is not uncommon in the financial world, where multiple factors influence decision-making processes. However, Hayes remains undeterred in his optimism. He anticipates that within a span of six to twelve months, the market will not only recognize but also react positively to this bullish trend, further propelling Bitcoin's growth.
Bitcoin's Future Amidst Monetary Policies
Hayes' bullish stance on Bitcoin extends beyond just its recent performance. He envisions a bright future for the cryptocurrency, irrespective of the monetary decisions taken by institutions like the Federal Reserve. Whether the Fed opts for interest rate hikes to induce economic tightening or chooses the path of printing more money to infuse liquidity into the system, Hayes believes Bitcoin is poised to benefit. In his perspective, the inherent properties of Bitcoin, combined with its decentralized nature, position it favorably to thrive amidst varying economic scenarios.
Conclusion
Arthur Hayes' insights offer a deep dive into the intricate dynamics between traditional banking systems, global monetary policies, and the burgeoning world of cryptocurrencies. As we stand at the crossroads of financial evolution, understanding these interplays becomes crucial. Hayes' conviction that March marked the commencement of Bitcoin's bullish trend provides not just a perspective but also a beacon for those navigating the cryptocurrency waters. His analysis underscores the potential of Bitcoin and offers a glimpse into its promising future in the ever-evolving financial landscape.
FAQ
When did Hayes believe the Bitcoin bull run started? Hayes believes that the Bitcoin bull run began on March 10.
What significant event occurred on March 10? On March 10, the Silicon Valley Bank (SVB) was taken over by the Federal Deposit Insurance Corporation.
How did the Federal Reserve respond to banking crises? The Federal Reserve introduced the Bank Term Funding Program (BTFP) to stabilize the banking sector by offering loans in exchange for "qualifying assets" as collateral.
What impact did these events have on Bitcoin? Following these events, Bitcoin's price surged by approximately 26%, marking the beginning of its bullish trend.
That's all for today
If you want more, be sure to follow us on:
NOSTR: croxroad@getalby.com
Instagram: @croxroadnews.co
Youtube: @croxroadnews
Store: https://croxroad.store
Subscribe to CROX ROAD Bitcoin Only Daily Newsletter
https://www.croxroad.co/subscribe
DISCLAIMER: None of this is financial advice. This newsletter is strictly educational and is not investment advice or a solicitation to buy or sell any assets or to make any financial decisions. Please be careful and do your own research.
-
-
@ 3ddc43df:9186b168
2025-01-02 01:18:38Should I Buy Bitcoin?
The price of a single Bitcoin recently reached $100,000 USD. By now everyone knows what Bitcoin is and how to buy some. Intuitively, the price of Bitcoin increases when there is more demand to buy Bitcoin than there is to sell it, and when the inverse is true the price goes down. We all know about meme-coins, which seem like (at least to me) the same exact thing as Bitcoin in a different name. So what makes Bitcoin different? Beyond buying it because the trend seems to indicate its value in USD will continue increasing, what is its fundamental value proposition? How is this value proposition different from meme-coins, or even alt-coins that are viewed as legitimate in crypto circles? What, if any, existential risks exist that could crash its price to zero in an instant?
I want to explore these questions to best inform myself on how to store and invest my money for the long-term. Everyone started hearing a lot about exponential growth curves in 2020. In 1975, Gordon Moore predicted that the density of transistors would double every two years, and this has roughly held true since. As innovation fuels more innovation, we can expect that, very generally, technology progresses on an exponential growth curve. The idea that a computer program could replace the world’s reserve currency is worth taking seriously given the huge impact we’ve already seen new technology have on society over a 20-year, 10-year, 5-year, and even 2-year timescale.
When I was working at Square I direct deposited a small percentage of my salary into CashApp’s Bitcoin direct deposit program. I sold it all when I left the company. A lot has been written about Bitcoin, so I mostly hope that writing this can help me solidify my opinions so that I can make a decision on whether to invest again and stick with that decision for somewhere between a decade and a century. Up to now I also have not been able to find a good comprehensive evaluation of Bitcoin including the “bull” case and “bear” case, so I will attempt do that here.
The Bitcoin Standard
Two years ago I was trying to answer these questions I just posed and most people on the internet said to read the book “The Bitcoin Standard.” So I bought it and it has been sat untouched on my bookshelf ever since. Time to read…
spongebob narrator voice a few days later….
This would be a good book if the author did not repeat himself ad nauseam and if he left out his many false claims. He claims the Ethereum blockchain is less immutable than the Bitcoin blockchain, moving off of the gold standard caused a decline in art’s quality, and the internet was not a “zero to one” invention but just an improvement upon the telephone. He spends half the book rambling on and on, often with personal attacks, about how he does not like Keynesian economics. He seems to draw his counterarguments against Keynes from just a single economist, Ludwig von Mises.
All of this made the book very annoying to read and proved the author quite untrustworthy. On the other hand, his general argument that hard money (ie gold) is superior to government-backed fiat is one I first read about in The Changing World Order by Ray Dalio. Dalio does a much better job here of backing this up and explaining how the decline of all the past major empires began by moving away from backing their currency with hard money. Government-backed money involves misaligned incentives — when the government spends and produces the money, invariably it will produce as much as it wants to spend. Hard money is supply-constrained, making inflation impossible. Inflation of course disincentivizes saving while incentivizing debt which is on a whole bad for society. Dalio shows that a populous prioritizing its future (saving money, investing in education and technology) correlates with its empire/country’s ascension. I don’t really know how to square this with present-day America which has the best capital markets in the world, but clearly does not prioritize the future in any other way. Maybe time-dimensions here have shifted since technology progresses much quicker now than in the past.
Anyways, it seems obvious to me now that a global supply-constrained currency would be much better for the world than a currency owned by the US government. Since the government prints its own money and has no functional checks and balances on this power, hyperinflation and the collapse of the dollar is inevitable. So even though this book was really bad I am sold on Bitcoin’s utility, so I guess it did its job. I also did a lot of online research while reading the book. Let’s go through that.
The Bitcoin Core Codebase
Bitcoin is software run on computers throughout the world. This software is on the internet. You can look at all the code, run it on your computer, and suggest updates to the core maintainers. A mix of volunteer and sponsored contributors around the world help to maintain the codebase. When the codebase it updated, people running Bitcoin nodes have the choice to update to the latest version. When the majority of Bitcoin nodes update to the latest version, the new software propagates throughout the ecosystem. This is literally how a version of money works and it is a software program you can look at and change yourself. There is mailing lists and IRC groups where software developers discuss how to make this version of the world’s money work best. I know this is now a pretty old concept but it has been blowing my mind. A case can be made that this is the world’s most important software program, since it defines somewhere around 2 TRILLION dollars worth of value.
Nostr
Somehow this rabbit-hole led me to one of the tens of new decentralized social networks. This one is the latest favorite of Jack Dorsey, who started Twitter and left it partly due to its centralization, then started Bluesky and left it partly due to its centralization. I’ve checked out Bluesky and Mastodon and I didn’t think it was really anything different or special and they just seemed like worse versions of Twitter. Nostr is actually very interesting and the reason mostly has to do with Bitcoin.
Nostr integrates with your Bitcoin wallet (technically your “lightning” wallet, which is a fast and cheap way of sending Bitcoin) so that users can send and receive Bitcoin with each other. It’s a simple idea and really easy to build, but the effect is all of these people are talking online together and trading Bitcoin with each other so there’s a mini economy here that is denominated in Bitcoin. There’s obviously not a huge amount of people there compared to other social networks but at the very least it’s a compelling playground type of world that shows off what the internet could look like if Bitcoin gains mass adoption.
Since payments are integrated directly within the social network, people share art and ideas and get tipped in Bitcoin. But Nostr is actually a protocol — social network clients have just been built on top of it, but there’s a few other things that have been built with it. There’s podcasting/streaming apps, encrypted messaging apps , blogging apps, marketplaces, and on and on. Most of these apps leverage Nostr’s Bitcoin wallet integration, and generally they could do the same thing by handling payment via PayPal, Stripe, Square, etc. Here’s the following benefits of using Bitcoin over those options:
- Censorship-resistance. This doesn’t matter for 99% of people and use-cases but if I want to buy illegal drugs or guns or medicine or hacked passwords then it matters. For the record, I (mostly) don’t. I think it would be great if I could though and I feel like if I want to then I should be able to.
- Transaction fees. Existing solutions charge somewhere between 2% and 3% of every purchase. Transacting Bitcoin over the lightning network is basically free.
- Taxes. This is another controversial one and technically the US government requires that you pay sales tax for all Bitcoin purchases. But since Bitcoin wallets are pseudonymous making it unlikely that a purchase can be traced back to you, commerce via Bitcoin does not incur tax from the government.
Read Write Own
Nostr is a good example of a Web3 platform since it is based on peer-to-peer server communication, but it is not typical of the category since it does not operate on a blockchain and does not include a bespoke cryptocurrency. Ethereum is the most famous Web3 platform where commerce is denominated in Ethereum tokens. Solana is the newest competitor and is now the most popular platform. What is going on with these? What are the advantages/disadvantages of Web 3.0 living on the blockchain? Even if Nostr provides a compelling vision of a Bitcoin-native world, is this necessarily intertwined with a decentralized web?
With that, our next book is Read Write Own by Chris Dixon.
more time travel
This was a good book. Maybe it could have been a blog post. Yes, it definitely was a blog post expanded into 250 pages. Nevertheless, its core argument was compelling and it did not base this argument on anything obviously untrue like the last book. The author is a partner at a16z, a large venture capital fund that invests heavily in web3 tech. The author breaks down internet networks into three categories: protocol networks, corporate networks, and blockchain networks.
The first takes form as standards defined by IETF, such as HTML, SMTP, FTP, DNS, etc. Basically the core layer of the Internet exists as collection of protocols that define how bits are ordered. In the early days people interoperated by using thin clients that implemented these protocols. Corporate networks use these protocols as well but on top of them they create their own proprietary layer where connections are created. Think Facebook/Twitter social graphs, Google’s page rank, AirBnB/Uber’s marketplaces. Network connections exist within the proprietary layers each corporation has created. Blockchain networks are essentially corporate networks defined by new protocols. The author spends most of the book arguing that blockchain networks provide the great features of corporate networks with the openness of protocol networks, so blockchains give us the best of both worlds.
If I could snap my fingers and kill the Internet and the world had to rebuild it from scratch, I think Blockchain would play a huge part in the redesign. The Internet is a hodgepodge collection of standards that have been somewhat haphazardly created over time. As we unlock greater capabilities via more bandwidth and more powerful compute, more standards and types of networks are added on top of the old ones. Dixon mostly argues that corporate networks are bad because corporations act as unilateral dictators over their respective networks. Benevolent dictatorships are the best organizational structure; of course, the problem is that no dictatorship can stay benevolent indefinitely. People will search for alternatives when a “regime” changes in a way they don’t like, as has already happened to some extent with Google[^1] and Twitter[^2]. Some corporate networks will stay benevolent for a long time, and they will persist long after their leadership becomes corrupted; as they say, Rome did not fall in a day. We’ve seen throughout history that democratic organizations eventually win out. Even China has ceded that they need some form of a free market to compete in the global marketplace. Blockchains provide a free market and democratic ownership within Internet networks.
What to Do?[^3]
I am completely convinced now that blockchains will one day be a foundational part of the internet, of course the big question is how long does that take? My intuition is that it takes a long long time, because it is going to take a lot to move people away from existing corporate-owned platforms. But, similar to Bitcoin succeeding because governments will not indefinitely print their money responsibly, corporations will not indefinitely govern their networks responsibly. So blockchain networks are something that I am looking at as a very long-tailed investment that I am fairly certain will pay off well in something like 50 years at the most, meaning I expect blockchains to be a foundational part of the internet within 50 years.
I look at Bitcoin in a similar way but with a much shorter time horizon. The US government has displayed plenty of irresponsible monetary policy in the past few years and I expect this trend to continue. I look at Bitcoin as an investment that will pay off well within the next 20 years, by which I mean within 20 years Bitcoin will be commonly used as a store of value, if not a method of payment.
Of the USD I am converting into cryptocurrency, three-quarters is going to Bitcoin, one-sixth to Solana, and one-tenth to Internet Computer. A brief word on the latter two… Every operation on blockchains costs money so that the nodes running the blockchain can be compensated. This is why blockchains all include a native cryptocurrency, which is the token its nodes are paid in. Solana is a new blockchain that has the lowest-cost transaction fee because it uses a unique method of verifying transactions called Proof of History, which combined with Proof of Stake provides strong cryptographic guarantees while using very little compute. Internet Computer is a blockchain that natively provides many building blocks for building a web3 ecosystem — an identity platform, http interoperability and cloud computing primitives. Basically right now you can deploy your website on this blockchain and anyone can access it from a web browser.
There are many more blockchains that are interesting and the space is evolving really quickly, these two are just the ones that caught my eye and seem to me like building blocks for the future.
Gripes
I did not end up reading much text on cases against Bitcoin and Web3, as I decided these points are fairly obvious. This is new technology so there is massive reason to believe it will end up having no consequence to the world as 99% of new technology ends up this way. The cases against these technologies are well documented and encapsulates the prevailing sentiment around them. Bitcoin has no inherent value, is not optimally scalable, is pseudonymous rather than anonymous, requires more user responsibility than fiat alternatives, and will potentially be adversarial to the US government. Blockchains are always less efficient than traditional networks, charge per transaction, (mostly) include network lock-in via their bespoke cryptocurrency, and require that users set up and learn how to use hot wallets.
There are many reasons to believe neither of these technologies will succeed. I take the point of view that all of these downsides are going to be alleviated through technological progress (the open source community building solutions to all of these problems is huge and iterating extremely quickly) and through cultural shifts (learning to use the internet was once a big hurdle for everyone, but we have learned and taught each other effectively). It’s completely reasonable to be pessimistic, however pessimism around new internet technologies has not typically been a winning strategy.
[^1]: I recently added Kagi to my list of software subscriptions. It is $10 per month and offers high quality search without ads. I recommend it.
[^2]: I think the new Twitter is pretty cool, but many people don’t like Elon and have switched to one of the many alternatives. Additionally, some cracks have already started to show in their new model with Elon banning accounts he does not like or disagrees with. As mentioned before, Nostr is a good alternative, even if it is somewhat more difficult to get started with. To get started I recommend the Primal client, for which I pay $7/month but is also great to use without paying anything.
[^3]: Is it necessary to say this is not financial advice? I see that everywhere but I always think that it is probably not necessary legally. Anyways, this is not financial advice.
-
@ 300352ae:8be8c8b3
2025-01-01 20:46:29Lorem ipsum dollor conae terg
-
@ 300352ae:8be8c8b3
2025-01-01 20:28:38Lorem ipsum dolor
-
@ 182052d2:e48c3d7a
2025-01-01 20:12:28When I was a young game master, I had all the time in the world to dive into rulebooks and all their extensions, devouring them cover to cover. To prepare a game session, I could spend hours, even days, creating monsters, NPCs (non-player characters), and imagining how the story would unfold. I devoted so much time and energy that a cancellation or postponement would hurt me deeply.
Over time, responsibilities and priorities changed: studies, partner, children, work, house, etc. Time became a rare resource and it's impossible to continue creating stories like before. Nowadays, my preparation time for a session ranges between 0 and 4 hours, but most often, I only dedicate an hour. Fortunately, technology has helped me become more efficient in creating stories and preparing game sessions. I use artificial intelligence without hesitation to generate ideas or structure a draft. Being far from the players, we use Roll20 to play online, and when we play Dungeons & Dragons, I use monsters whose tokens have already been created in advance. The players understand that I can no longer be as meticulous as before, and from time to time, an inconsistency or contradiction might slip into the story. To help me, I developed a storytelling technique I personally call "The Pantry Technique."
The Importance of Player Impact
One thing I've noticed about players is their enjoyment when they have an impact on the story. Although very structured scenarios have their advantages, a freer structure can offer something epic if well-prepared. The Pantry Technique applies the 20/80 principle, or Pareto's law, to have many more elements ready to be used spontaneously during a game session. When you prepare a quest for the next session, 20% of the time you spent in preparation contributes to 80% of the fun you'll have during the session. You just need to focus on the essentials and sacrifice what would make a quest worthy of being published by Wizards of the Coast. Achieving a very high-quality level represents 80% of preparation time and only contributes to 20% of the fun with friends.
Concrete Examples
Traditional Method: A group of adventurers is hired by a noble to retrieve a magical item hidden in a forgotten dungeon. The number of traps, difficulties, and locations are predetermined. There is a map with monsters already placed for potential encounters. The game master has determined the magical item's power and the characters' reward. The rival adventurers' group integrated into the quest has been created along with their NPC sheets containing their powers, special abilities, etc. The objectives of the rival group are determined.
Pantry Technique: The game master decides that a mysterious dungeon and a mysterious item exist. Without going into details, he establishes that adventurers can hear about it through rumors, a riddle, a player's contact, or through a noble who wishes to hire them. An AI can create a good riddle and often contacts have already been created during previous sessions. Use as much as possible an element related to a player or an event from a previous session: a player's tendency to highlight his rogue's attention to rumors, a riddle engraved on a portal that was not ultimately used in a previous session, or adapting to let players discover documents and maps in the noble's chest they decided to steal on a whim. Give a few clues that lead in all directions at once and let the players take the direction they want. This can be one of the paths you planned or a completely new path.
Do not hesitate to reuse differently what you have already created. For example, if the player didn't use the riddle, you can reuse it as a ward for the magical item. Also, if the role-play with the rival group lends itself well, feel free to change your mind and integrate an unbeatable monster unless they ally with the famous group. The player will have a lot of fun using his character's incredible persuasion power. The Pantry Technique is about keeping all these role-play elements in mind without going in-depth and using them spontaneously. Combining elements from players' role-play and incorporating a few of them together can be particularly successful because it will feel like a long-planned climax. That said, it's not as easy as it sounds.
Conclusion
Improvisation is not always necessary. Players may be tired and prefer to simply follow the game master's default quest. They may dive headfirst into your basic quest thinking they have disrupted your plans. Just keep the role-play elements in mind for future use. Perhaps the rival group they allied with will save them in extremis in a future quest. Perhaps the magical item is cursed and will be the object of another future quest. Sometimes amusing things happen like a player inventing a phobia of spiders for their character or even a love story with an NPC. When that happens, put it in your pantry for later.
-
@ 58edc6ae:e070cfa5
2025-01-01 20:02:36MiCA Regulation and the new AML Regulation have recently come into force, raising several concerns about how the EU is approaching non-custodial payment solutions. These include:
- Conflicts with privacy standards and human rights norms
The rules permit excessive collection and sharing of information on private transactions without adequate safeguards, conflicting with EU privacy standards and international human rights principles, as emphasised in rulings by the Court of Justice of the European Union.
- Blocking innovation
The regulations conflict with privacy-focused technologies, potentially stifling new ideas and platforms in the EU. This could weaken the EU’s position as a leader in digital finance.
- Hurting competition
Compliance with these regulations increases operating costs for EU-based CASPs, placing them at a disadvantage compared to non-EU companies operating under less restrictive rules. This may push users toward unregulated services outside Europe, undermining the regulations' purpose.
- Excluding vulnerable groups
The regulations could make it harder for people in poorer or politically unstable countries to access secure and private financial tools, leaving them without viable financial options.
These issues are explored in detail in the report prepared by nostr:npub15ka0zlfeys4vphnl6dk4x63e7sra0mp3wmrp4ml7q993z8km0n6spjxua8 and me for Open Dialogue Foundation upon the request of nostr:npub13ajk3hhvqys2ev4y68jwxywgs8fsdsuk4y5gkzs874jdyrccvf5qak2yd9 .
It is crucial to reopen the discussion on these issues and urge European lawmakers to reconsider their approach. The EU needs a regulatory framework that strikes a balance between security and privacy, fosters innovation, and rebuilds Europe’s weakened position in the global digital economy.
MiCA #AML
-
@ 468f729d:5ab4fd5e
2025-01-01 19:00:36 -
@ 8a03ae29:10b1b6ac
2025-01-01 16:32:00What an crazy, busy ride it's been lately! I've been crisscrossing the nation for work and embarking on the thrilling journey of relocating to a brand new living space. A pitstop on the work journey was San Francisco, once a city of love, which now feels like a city of contradictions. It's fascinating how this place, once so intertwined with the financial world, could stumble so spectacularly. I’ll save my deeper reflections for a separate post. Amidst all these observations and experiences, I’m grateful for the opportunity to connect with all of you and engage in meaningful conversations.
Let's spend a few minutes this morning catching up and talking about what it looks like to be "bankless." It's interesting; usually, this would mean talking about the less fortunate individuals who perhaps don't have a bank or access to all the lame, boring financial services we all take for granted. Today, I'd like to share my thoughts on the possibility of a future where, instead, everyone is bankless. Not because they don't have access to financial services, but because they prefer to take custody of their own assets. Tools have been built to enable not just custody but also (damn near) risk-free lending, capital raising, instantaneous settlement of funds around the globe, micro-transactions, etc. With these capabilities given to every individual who has a smartphone, hopefully, you can see how becoming bankless, something that used to cut people out, just might be everyone's way in.
The concept that I refer to at the end of my last article, how our money is still stuck in the age of the telegraph and has been the slowest part of our lives to enter the age of the internet, is a feature, not a bug. The legacy financial system is a centralized tool of wealth extraction and control. The ways this magical wand is wielded on individuals, institutions, and governments all the same are pretty clear. On behalf of individuals, millions of bankless people in Sub-Saharan Africa, Southeast Asia, and parts of Latin America just lack access to "banking" services because it's not "profitable" enough or even lack the ability to get proper identification, effectively banning their ability to take part in wealth creation. Others like Kanye West or super-rich Russians are cut off from services or have property stolen due to losing political favor. Companies and governments can have assets frozen or even seized for similar reasons or under the guise of violations of our superior morals and are hit with "sanctions." Some might encapsulate this in a word: discriminatory. Something that for sure, without a doubt, does not exist "at the end of history," right? The regulators, who have the audacity to call themselves "Watch Dogs" as if they have any teeth, always allow the robbers to ransack the place before even barking. I guess that's what happens if the burglars break the window with a big juicy steak? If this has happened once or twice, any sane person would suggest ADT.
The legacy financial system is notoriously known to be slow, expensive, ridden with fraud, and frankly dangerous, enriching bad actors and terrorists around the globe. Considering it runs on mainframe technology and requires vast amounts of human input and manual review, it makes sense as to why we all suffer immensely from the flaws inherent in humans: bias. The greatest updates to the most simple form of financial activity have been new cool apps that let you send your friend money, in what seems like seconds, but it really still takes the same old amount of time to settle as any other 'digital' transaction using the legacy financial payment rails. The same censorship applies as well; PayPal is notorious for cutting people off from their funds and inflicting a "guilty until you prove yourself innocent" approach. They automatically enforce this censorship in code for "consumer protectionist measures" while Wells Fargo is fined $1.7B for active money laundering, yet no accounts are ever frozen, and it's always "innocent until and even after settlement." Back to the point, this act of "settling" a transaction is the process where the banks "verify" that a customer has the money in their bank account to pay for dinner. This is what consumes everyone's time. One would think there must be a way to automate this similar to the automation of their customer service (dunk). You ask the legacy system, the only thing that has near-instantaneous settlement, is cash, but good luck getting that to your friend who moved out of state on his birthday. The reason we rely on this flawed crutch is that never before could you prevent or prove ownership of any digital good or object without a slow, centralized actor performing that verification "offline." Today, we have a blockchain for that, and all verification will be done "online," or the industry term, "on-chain."
In the age of the internet, arguably the best way to get your friend that birthday money would be Bitcoin, the first "real-world" application of decentralized finance. Decentralized finance, or DeFi, refers to the decentralized, futuristic, Lego-like building blocks used to construct a new, more inclusive (non-discriminatory) financial system with better financial governance. This system aims to align the incentives of every stakeholder of any type of shared entity. New terms have emerged from the future of the industry: CeFi, DeFi, and DAOs (Decentralized Autonomous Organizations - more on these in the weeks to come). CeFi or some would say TradFi describes the centralized, traditional, legacy financial system that everyone has come to know and hate. Some could argue that any traditional bank with branches throughout a region practices "decentralized" finance. The main difference lies in the governance models of how funds and/or organizations are managed. This brings us back to Bitcoin.
Bitcoin is a peer-to-peer digital cash system with near-instantaneous settlement (around 10 minutes). It means that you can send this new coin to your friend anywhere in the world with an internet connection, without the need for any slow, cumbersome offline verification process.
In a previous article, I mentioned that "digital gold... is uniquely suited to perform in that type of environment." Cryptographically-backed currencies like Bitcoin are the "digital gold" designed specifically for the internet environment. Instead of a distributed centralized actor having full control and being the single point of failure, decentralized financial services are governed by open-source code that anyone can contribute to, review, and run, executed by a blockchain. In fact, the majority of the internet's core services are open-source projects. The internet was built in a way that telecommunications had no single point of failure, and there is no centralized actor with full control of the internet. Can anyone describe a more fitting unit of exchange for that type of environment? One feature of the new magic internet money is that it's completely programmable. You can set monetary policies in open-source code (Bitcoin's current and total supply and inflation rate are publicly available, unlike the current and total supply of USD). This way, everyone holding that money has a full understanding of what the future holds and can plan their life accordingly, but that's only if we, as a people, truly value stability.
Do we all get a vote in how the policy is dictated? That's another feature enabled when using the new magic internet money. The only way individuals can vote for change in the current financial system is by converting the local currency into something else. This has been observed in hyperinflationary regimes like Venezuela, where individuals sell their local currency for foreign currencies, including Bitcoin. With magic internet money, governance models can be implemented from a bottom-up approach. For example, MakerDAO is a Decentralized Autonomous Organization (DAO) that governs the stablecoin DAI, which aims to stay relatively worth $1 USD. MKR token holders participate in the governance process by voting on proposals that can affect the monetary policy and risk management of the MakerDAO system. The voting power of MKR holders is proportional to the number of tokens they hold. There are other voting methods, such as quadratic voting, that aim to achieve a more equitable distribution of preferences and avoid the dominance of simple majority rule. Imagine that for every dollar you hold, you could actively participate in FOMC meetings with the Federal Reserve and vote for the best policy to achieve the fiscal goals of the nation-state (government by the people, for the people), instead of relying on the decisions of 12 unelected individuals in suits.
Another term that has begun to percolate throughout the industry is 'bankless,' which refers to leaving the traditional financial system and instead opting for your finances to be represented in new magic internet money and managed by applications built to automate the functions of legacy services typically offered by a bank. Perhaps "bankless" doesn't quite fit the characterization of what I just described. Maybe the better term is actually "bankmore." The reasons are as follows: 1) There would be more people involved in the banking process. 2) There would be more services offered to individuals. 3) There would be more money in deposits available for loans. Since code can't discriminate (anyone with internet access can create a public and private key needed to verify their accounts on the blockchain) → more people can participate → resulting in reduced fees + expanded reach of services due to the global nature of the internet → leads to greater amounts of deposits → more money for credit creation/expansion and loans → more people lifted out of poverty.
Now, let's shift our focus to how this virtuous cycle can be implemented and what tools we can pay attention to. Use cases such as lending and borrowing were some of the first services that leveraged smart contracts and the magic internet money from blockchains. This technical paradigm has enabled true peer-to-peer lending without the need for intermediaries such as banks. Some platforms, like Compound, Aave, or MakerDAO (as mentioned above), even offer higher yields on deposits than traditional finance. Decentralized exchanges (DEX) like Uniswap ensure a fair and decentralized trading environment where every participant has equal access to liquidity. This groundbreaking approach eliminates concerns such as front-running, which has caused poor public relations for centralized brokers like Robinhood.
Are there any new capabilities or services that this new technology brings? Of course, there are capabilities such as microtransactions and micropayments. In traditional banking systems, microtransactions are not well-suited due to high fees and infrastructure limitations. However, cryptocurrencies and DeFi enable microtransactions and micropayments with low transaction costs and the ability to transfer fractional amounts of cryptocurrencies. This opens up new use cases, including micro-rewards, pay-per-use services, and decentralized content monetization. It unlocks new business models for creators, further fueling the creator economy. Instead of journalists being forced to give up their talent to entities like the Wall Street Journal for a salary, magic internet money can unleash them to share their content in more places at a lower cost, increasing distribution and providing people with greater access to information and a more diverse set of perspectives.
As you can see, the blockchain technology has brought forth questions that many of us have never considered, assuming that someone else would know better and handle it. To shape the future you desire, you must participate in the present. Engage in discovery, questioning, testing, and finding solutions. The bigger and more humanitarian question I hope everyone reaches is: "What do I want the future to look like, and how can I contribute to making it a reality?"
I hope you are sticking with me and starting to see a glimmer of hope for a better, freer, and more inclusive world that extends beyond the fortunate few who were born with access and opportunities to create wealth.
Are You Feelin’ Moody?
-
@ d920bbbd:5213849e
2025-01-01 15:00:33Background : Family of 4, including 2 children under 10, coming to El Salvador for a 15 days holiday trip. Instead of telling our story to family and friends as we usually do, we’ll instead write a (very, very long) thread about it, so it’ll help organize our thoughts, and have place to discuss them.
It might also help you decide if you’d like to come and spend some time in El Salvador or not.
For clarity’s sake, I'll try to put a tag before each post with it's main theme
[QUICK BACKGROUND 👨👩👦👦] For additional background, we are currently living in what people usually call a First-World country in Europe, where basic human rights like free speech and individual liberty reign supreme... which is a bit odd to say in the light of recent news like mass censorship laws, civil unrest, arrest of @durov...
Our youngest child being finally old enough to travel long distance without causing trouble, we wanted to see something new (first time to central America), and also check if the turnaround since @nayibbukele was elected was real, and all the hype we read often about El Salvador was justified.
So we flew nearly a whole day hours (stops included) to have a look at it for ourselves.
[FIRST IMPRESSIONS] First thing we noticed out of the plane is the security. Not bullshit security like endless queues with body and luggage scanners (which we already went into several time before boarding the planes…), but useful security with armed guards patrolling with sniffer dogs. Reassuring.
Passing customs was also quick and easy, and the officers there were nice and patient despite our poor Spanish. You’ll get mugshotted and fully KYC’ed (what’s your business in El Salvador, where you’ll stay etc…), annoying but usual from customs screening foreigners coming into their country.
The airport was overall very clean, simple to navigate, and looked like any modern airport we’ve been to in Europe. There was also some construction being done around it, so it’s probably getting bigger soon.
Picking-up and dropping back our rental car was very smooth, better than what we are used to when going through the big rental companies, and at a lower cost. Shoutout to @bitdriver about that, whom was recommended to us by a friend. If you go to El Salvador, rent through this man, it’s easy and you support local entrepreneurs.
We left the airport (after having to present an ID to the parking guard, which is a recurring theme, as they even you to left an ID as deposit when you rent a lockbox in amusement park…) and headed to our rental flat located in a condo in El Escalon, a colonia (district) on the outskirts of San Salvador.
There, we were greeted by armed guards (also a recurring theme), who did a full ID/KYC check again about our business here… and then escorted to our flat by one of the guard.
It might be odd for me to point this out, but in Europe, basically only policemen (and not even in all countries), trained and licensed security personnel like bodyguards (very rare) or military are allowed to carry firearms in public.
[SAFETY 👮] So to get this out of the way regarding security : nearly anywhere we went (national parks, amusement parks, restaurants, malls, parking lots…) you’ll be greeted with armed guards wearing mostly revolvers and coach guns. The Salvadoran Police (PNC - Policía Nacional Civil) is also very present, especially in very touristic areas like the historical center of San Salvador or national parks. This dissipated right away any doubt we might have regarding our security in the country. Not once during our whole trip we felt insecure or even bothered about that, and we just forgot about it.
[MOVING AROUND/ROADS 🚗🛣️] During our 15 days, we travelled around 1.3k kilometers around the country, exclusively with our rental car. As I’ll mention several time in the thread, I’ll use Western Europe for reference, so all I say might seem funny for Southern, Middle and North Americans…
Driving in El Salvador is very different than in the EU. While most road rules are the same (then even measure speed and distance with Kilometers/hour, not Miles/hour…) people usually pick a lane and stick to it. You can pass cars left or right equally, people don’t care, while in the EU it’s illegal to pass someone to the right (unless in the UK, obviously…) and people will road rage at you if you do that.
Also, the road signs are much rarer, and you better use Waze or Google Maps to navigate (Apple Plans can’t even give you walking directions in El Salvador…).
The road from the Airport to San Salvador was very nice, smooth, and well lit with the Salvadoran flag colors (Blue/White/Blue) lit all along the way. Looks very cool and gives a welcoming feeling to foreigner (and I can imagine a prideful feeling for locals)… all that with just some leds.
It’s a bit different once you reach the city, were you’ll be greeted with your first Túmulo (basically very steep speed bumps located at the cities’ entrance and some residential/school areas) that you better not ignore if you value your car.
The roads were very smooth and well painted, but I was sometimes met with the biggest pot holes I’ve seen in my life. It’s a pity because 80% of the Salvadoran roads we travelled were in very good condition, about similar to what we have in the EU, but 20% is either unfinished (no asphalt) or poorly maintained (potholes of various size).
The Carretera Panamericana (Central American Highway, crossing El Salvador) is speed limited to 90 km/h is was nearly perfectly maintened. I think this situation (Speed Túmulos at the city entrances + some harsh roads) is what is leading Salvadorans to use mainly SUV’s/Pickups as their car of choice.
From what we've seen on the road, Salvadorans drive mostly Japanese and Korean SUVs and pickups (think like Nissan Rogue SUVs, called Nissan X-trails in the EU, or Mitsubishis L200/Toyota Hylux style pickups), and have a lot of tallers (garages) everywhere. We saw 40 year old cars that would have been sent to the scrap heaps 30 years ago in the EU still going here, and where a car with 100k km on the odometer is considered old and borderline scrap heap-able in the EU, here they are still looking good and working good. For reference, our rental had 200k KM on the odometer, and everything worked perfectly fine.
Weirdly enough, it seems pedestrians have no right of way in El Salvador. Even though there are plenty of crosswalks, even on the highway, we learned pretty fast that the custom here is to not stop to let pedestrians cross, and we saw several time people chilling on the median, waiting for the traffic to abate before crossing to the other side of the road. Total opposite of were we live, where any pedestrian waiting at a crosswalk (without traffic lights) has the right of way.
Lastly, while I mentioned before the official distance and speed unit is based on the kilometer, the gas is always priced in $/gallon (1 liter of super premium is about $1.11, while in the EU it’s usually between €1.80 to €2.20), but the drinks/food are sometime sold in oz/lbs, and sometimes in liter/gram. Odd but manageable.
[TRAFFIC/PUBLIC TRANSPORTATION 🚌🚥] As with all big cities we’ve been to, traffic is really bad in and around San Salvador. Better be patient and do not get lost because it could add tons of time to your trips due to traffic.
We didn’t use buses because we had our car, but there are plenty of Salvadoran public buses going from anywhere to everywhere, for apparently not even $1 per ride. 80% of the buses we’ve seen are literally old repurposed American school buses, that are painted and tuned by locals. You can see buses with flashing leds, custom rims, custom spring where the front axle is lifted twice as high as the back one, shark-tails spoilers, and graffiti-style city names. They basically pick you up and drop you anywhere you like.
It’s a bit of the same with trucking : a lot of “old” big rigs from the US are used here to transport freight and construction material. I’ve also seen some of the best customised trucks with led designs, custom rims and paint here. Same goes for car tuning : a lot of Salvadoran apparently like to customise their car, even with stuff that should be illegal in the EU (flashing, coloued headlights, big exhaust, custom rims with protruding spikes…) We didn’t see many luxury cars, besides a few US luxury pickups and huge SUVs. Nearly 0 German cars, overall way less than 1% of the cars we crossed on the road. A handful of BMWs, 3 Porsches, 2 Mercedes. And 0 Tesla, nor EVs in general, except maybe an electric DHL Van and a hybrid or two cars (and we’re not even sure about these being fully electrical or even hybrid). It’s a big contrast since EVs (especially Teslas) are now everywhere in the big European cities. We didn’t see any EV charging point anywhere, too. As we mentioned before, keeping older car road worthy is big here, and with gas at around $1 per liter, I can understand why there’s zero EV in El Salvador (yet).
We also saw plenty of locals using small trucks as buses (where 15+ people are standing up next to each other on an open-ended truck), big dump-trucks where 5+ people were chilling on the dirt, and kids and teens sitting in the back of pickup trucks… Again, this might seem normal here, and I’m not judging if it’s good or bad (people are free to travel however they like as long as they do not endanger other road users if you ask me), but coming from Europe, you’d get arrested and fined within 10 minutes of travelling like this.
I’ve also come across old railways track, and the only time I heard about trains in El Salvador was from a tour guide than explained to us that people tried to flee from a small village near San Salvador by train during the last San Salvador Volcano Eruption in 1917… but the train tracks were cut off by a lava trail. So I’ve looked it up and indeed there are no more railways operating in El Salvador since 2002 (due to no rentability and damage from the civil war, and reset plans were unsuccessful so far). Apparently there are new big plans to rebuild a new railway called the Pacific Train. If successful, that would be a very good development to alleviate traffic and allow people to travel the country more quickly, but we’ll have to wait and see how it goes.
[SAN SALVADOR HISTORICAL CENTER ⛪️] We visited the historical center of San Salvador, where ultra modern edifices like the BINAES (Biblioteca Nacional de El Salvador) are standing across older gems like the Palacio Nacional (built in the late 1800’s, destroyed by fire, rebuild in the early 1900’s (you can have a look at the older foundations during your tour)) which is still hosting speeches from @nayib according to our tour guide and the Catedral Metropolitana de San Salvador, a beautiful cathedral facing the BINAES.
Speaking of the BINAES, it is a library open 24/7 which is as much an amusement park for babies, kids, teens and adults (think playgrounds, video games, themed areas about Star Wars, Harry Potter and LOTR) than a library for readers and learners (plenty of brand new books and reading areas). I wish we had something like this at home because you have to spend some time there to see how cool it is, whatever your age and your book taste are.
Next to these very touristic areas, you also have local markets and shops, where you can get a haircut for $2.5, and buy anything (food, clothes, and all kind of stuff) for a few dollars or even cents.
The contrast is very strong between the local areas and the tourist areas ; you can see very clean and modern streets, parks, fountains, on par or better than what you’ll see in Europe, and one block away you are back 30 years in the past, with people having stands on the street flea-market style, street vendors waving at you to sell you stuff (can’t hide you’re a tourist here), and overall a very organized-chaos feeling there. Even in these areas, we were never bothered by Salvadorans.
[RURAL CITIES 🏘️] We went to visit a few typical Salvadoran cities in the back country, notably a few on the route of flowers (even though there are no flowers here during the winter) : Nahuizalco, Apaneca, Concepción de Atacó… They have in common to have usually busy marketplaces around the city center, nice parks to chill for a bit with kids playground, often some very nice hand-painted murals, and always some churches/cathedrals that are very well tended to. The life of these cities look to be organised around the town center, as there are plenty of vendors, shops and place to eat in this area. We also went to visit Suchitoto, where you can spend the day as there are many things to do, places and museums to visit. One of the most intriguing part of this city was that it was full of little car looking like golf carts. After doing a bit of research, apparently these are Indian-made and called Bajaj Cute. The city's roads and roads to the lake were even arranged with narrow bands of concrete as large as these cars' size to help them navigate the cobblestone roads and steep roads in the area.
And of course, there are also plenty of natural wonders around these cities to discover.
[VOLCANOES/RUINS/BEACHES/PARKS 🌋🏖️🏞️] We also visited as many of the natural and archeological wonders as we could, such as the San Salvador volcano, with its stunning views over San Salvador city and the craters… yes, there is a crater (El Boqueroncito) inside a crater ! (El Boquerón). We also spotted the Torogoz here, which is the official animal of El Salvador and which has a very cool backstory told by our guide.
We also saw very well preserved Mayan Ruins (El Tazumal), and stunning beaches (El Zonte, aka Bitcoin Beach, awesome surf spot, where we met mostly foreigners) and San Diego Beach, which looked like and endless tropical sand beach where we met about as many people enjoying the beach than lifeguards (actually one “official“ life guard, and a local guy patrolling the beach on a donkey, both warned us about the tide and currents, which as very appreciable especially with young kids). Looks aside, the big difference with Europe regarding beaches is the fact that houses and ranchs are built very close to the shoreline basically everywhere we went. It might be nice if you live there, or are willing to rent a ranch for the day where you can enjoy a swimming-pool, hammocks, and fresh drink and food along with having the beach a few meters away, but we thought it took away from the natural charm of these areas. There were dozen of other recommended beaches we didn’t went to, so it might be different elsewhere.
Everywhere we went to visit or have a tour, we were met by local licensed guides that offered to walk us around the places while telling us the sorties and anecdotes about them. Most of the guides could speak English, all of them were ultra nice and patient with our kids and our broken Spanish, and it’s free. But if you have manners, you leave them a nice tip after the tour. This was a very appreciable. The only paid visits were for historical monuments, but there you always have a guide with you, usually English speaking (that you can also tip since they are very nice and knowledgeable about their heritage) This and the previous paragraph are amongst the shortest we'll write about, not for their importance since the views are stunning and the places to visit are beautiful, but because speaking about these experiences don’t do them justice, and are best lived and seen rather than read and looked at.
[KIDS ACTIVITIES 👦👧🛝] Now my kids have been bothering me for a while about mentioning amusement parks.
As mentioned above, even though we visited a volcano and an old Mayan temple, there were several more volcanoes on our list (Santa Ana, Izalco…) and ruins (Joya de Ceren, Cihualtan…) than we could have visited… but kids have a very short patience gauge that you have to regularly refill with trips to local parks. We visited about 10 of them, and I’d say 2/3 were very well tended, with playgrounds areas for kids, and 1/3 were not as well tended as the rest, with muds and puddles … still praticable but not ideal if you want to keep your car clean.
But what our kids liked the most was their trip to a water park called Termos Del Rio, where we spent the day watching them playing with water games and slides. We ate there, and the food was very good for a fraction for half the price of what we paid in Europe. Our only regret is that our oldest child wasn’t tall enough to do the “big” slides, and that only half of them were open for us. Compared to Europe, I’d say it’s about 75% cheaper for entry + food, people there are way more polite and disciplined (keeping in mind it’s an amusement park, so rowdy teenager are expected and tolerated, but people were never agressive or impolite as you can see in some amusement parks in Europe).
We also went to a few other amusement parks, and they were nice and well maintained, with generally a lower price than what is charged in the EU for equivalent activities (but still a bit pricey compared to the rest of the activities we did in El Salvador).
[SHOPPING / GROCERIES🛍️🛒] We also visited the MultiPlaza mall in Santa Tecla. It’s a very modern mall, again on par on better than what is done in Europe. You have plenty of shopping options for everyone and in all price range, except the very high end luxury (think french luxury brands) that we did not see but that are usually present in such malls in Europe. They might be someplace else in El Salvador, but we didn’t cross any during our trip.
Again, you can eat and drink very well for half, even a third of the price of what you’d pay for similar quality in Europe, but more on food later because it’s far from perfect. Non-food items and activity are about the same price than in the EU.
We had the surprise to come across a Chuck E Cheese, which do not exist in the EU (it’s like a huge arcade area where you buy credits or time, and play games for fun and for points, which you can redeem for small prizes)… so of course we had to bring our kids there.
It was a close second to Termos del Rio for them, probably because we spent less time in there while we spend a full day at the water park, because spending time playing in Chuck E Cheese is much pricier than local amusement parks…
For our groceries, we mostly bought them in 2 big chunks (one for each week) from the local supermarket that was closest to us, (SuperSelectos). You can buy anything that you can usually buy in any EU supermarket, with the standard travel quirks of local products being cheap and available, and imports (especially from outside America) being scarce and expensive.
[FOOD 🍔🥤🚫 / 🥩🥛✅] Which bring us to our first issue (not a deal breaker, but could become major if not checked) drawback regarding El Salvador : Fast-food chains prominence.
You can feel the US influence regarding food in El Salvador in General, and in San Salvador particularly : there are huge advertisement billboards everywhere, and I’d say half of them are about fast-food chains. (such huge billboards and dense billboards are not common in Europe)
There are fast-food chains everywhere, A LOT of them. It’s very different than Europe because while fast-food chains are also present in the EU, the ads are much less visible and they are competing with a lot more traditional restaurants.
But in San Salvador and other big cities, your default option when eating out is going to a fast-food. This is clearly not good because eating that food regularly is very bad for your health, which is visible on the population. We saw a lot of overweight people, including kids (not US Overweight, aka obese), but our rough estimate was that 40% of the people we came across were visibly overweight.
This is not aided by the drinks selection, were sodas are pushed into your throat at every corner, and sparkling water is not very easy to find, usually "hidden" in the Soda section in supermarkets… The mineral water and Sparkling water is usually 1/4 of the size of what it is in the EU, where you have big aisle usually dedicated to that. The south American drinks (agua de Jamaica, horchata…) while sugary, are nice refresher and taste very good when homemade with little sugar.
It’s a real shame because the Salvadoran food tastes awesome and is way healthier than fast-food. Everywhere we went to eat, we were able to order very healthy and perfectly cooked foods (mostly parilladas composed meat, seafood and vegetables) in any of the local restaurants.
We also obviously ate Pupusas, the local salvadoran dish, and they are indeed very good and cheap, and still a vastly superior option over fast-food.
This food selection is not an El Salvador only problem (most “first world countries” suffer from it, too), but I think @nayibbukele should look into this issue because if left unchecked, it’s only get worse the more affluent El Salvador will become (like in the US), and this is a real plague on a country population's general well being. Not my place to tell him or Salvadoran what to do, but with such great local options, it's a shame this kind of healthy food isn't promoted more heavily over imported poison.
[BEERS/COFFEE 🍻☕️] I tried local beers brewed in El Salvador like the Pilsener and the Regia, both blonde beers with the Regia being a bit stronger and the Pilsener a bit softer, which I liked more.
I’m a Guinness Guy, and you won’t mistake these beers for the well known European beers, but they were a completely acceptable replacement for a holiday refresher, especially in this weather, and you could easily develop a taste for it.
We bought and tried Salvadoran coffee, both from the local markets and the supermarket. The Salvadoran coffee is very good, and produced locally. We planned to visit a local coffee factory, but we didn’t have the time, so that’ll be for another time. We brought back a few packs for our families and friends, along with other souvenirs.
While I said the Salvadoran coffee was very good, the main "issue" we encountered is that unlike Europe, where the standard coffee is the Espresso (short coffee, usually sort of strong), most places we went to usually served only American-style coffee (rather long and filled with water). Sometimes we could barter with the waiters and get a “sort-of espresso”, but sometimes we had to drink American-style coffee because their machines somehow couldn't manage to make espressos...
[WEATHER 🌤️] We were warned about intense rain and bad weather, since this time of the year is considered “Winter” in El Salvador.
We basically never had rain during the day. It was often lightly overcast, and we got a couple of showers maybe thrice. While we bought waterproof ponchos before leaving, they never left our backpack. It usually rained late in the day (from 7 pm and at night), but since we never were out too late, this wasn’t a problem at all.
Also, the sewer system seems to work perfectly fine, since everywhere we went, there was no smell, not we never met any overflowing sewage pipes.
We also were warned about mosquitoes, because there was (maybe still is) a Dengue surge in the country. We didn’t see many mosquitoes, except in the less well maintained parks, and since we used repellant sprays, we had no bites during our stay. It’s probably a bigger issue outside the cities though, as they were ads warning about that in the streets.
But overall, what is “Winter” here is a much nicer climate than any kind of summer in Northern Europe, and on par with the Southern Europe summers, with just more nightly rains.
[CLEANLINESS 🗑️] I won’t beat around the bush : with fixing the fast-food diet, I think this will have to be one of the biggest issue to tackle in the future for El Salvador. As beautiful as all the places we visited could be, there was trash and rubbish basically everywhere along the way : on the roads, on the side of the roads, on the highway, in the lakes and rivers, in the cities and outside.
I wish it was an exaggeration but this is really everywhere except the very modern areas inside San Salvador and Santa Tecla (a very rich looking region/suburb next to San Salvador). Like the chicken and egg paradox, the surroundings here are so littered with trash that I can for some extent understand why people throw rubbish away anywhere : “What? There’s already tons of trash on the floor, another bottle or another paper thrown in there won’t change anything.”
Again, it’s not my place to give advice to anybody on how to fix their issues, but I firmly believe there will need to be a huge cleanup of the country needed (psychology tells you it’s much harder for people to throw the 1st piece of trash on the floor than the 100000th), along with some form of general education first + punishment second if the general behavior doesn’t improve. Also, things like open-air bins like I saw in some parts of San Salvador don’t help ; western-style closed trash bins are much better for general hygiene, and much less subject to elements scattering your trash around.
On the bright-side, unlike some famous city which recently hosted the Olympic Games, I didn’t see any rodent milling around anywhere. Doesn’t mean there are none, just that I didn’t see any. Also, no smell and the sewers system seem to work very well as we mentioned previously.
[No pictures of trash for obvious reasons.]
[NATURE/CITIES 🌴🏡] El Salvador is a very lush and green country. There are trees and plants everywhere, even in the city Centers with plenty of parks and median planted with trees. With the country growing (and urbanizing) at the speed it currently is, I really hope El Salvador will stay green and embracing nature, as it helps a lot with dissipating heat in the cities, and finding nice, quiet and natural places to take mindful breaks during the day.
Their rural cities are also built very flat, where living is usually done in small neighboring houses rather than tall buildings, which is a welcome sight coming from Europe.
San Salvador is built a bit more like a “modern” cities, with taller buildings, but from what on of our guide told us, there are no skyscrapers due to the potential volcano eruptions and seismic activity (bigger tower is apparently around 30 floors max). There is basically one earthquake every other day in, or around San Salvador, but we only felt one of them as most happened either too far from were we stayed or too weak to be felt.
There were Japan-style "evacuation meeting points" outside of several places we went to. And if anything is to be learnt from Japan, living in a very seismic area in nothing that can’t be fixed by good engineering.
[LOS SALVADOREÑOS] The biggest of the many highlights of our trip was meeting the Salvadoran people, called Los Salvadoreños. I would describe Salvadorans as humble, polite, friendly, warm, patient and helpful people. Anywhere we went, not once were we greeted by annoyed/bored people while we spoke broken Spanish and had two young kids with us. Whether or not it was for a commercial transaction, we were treated equally nicely by any of the people we met there. If you travel a lot in the EU and do not stick to high-end places (and weirdly enough, low-end places), you’ll discover that being nice and helpful isn’t always the norm here.
All guides were very cultivated and proud about their Salvadoran heritage, and all workers professional and efficient. As mentioned before, even when wandering in the very local areas of San Salvador, where you barely see any tourists (if at all), we were never bothered or felt threatened. I understand this changed a lot since @nayibbukele put gangs in jail, but this is still a very welcome feeling, because you cannot say the same of some districts inside cities we call “civilized” in Europe. The only thing is that next time we’ll come back, we’ll have learnt a lot more Spanish, which is a must here since I’d say maybe 20% of the people we met could speak English.
It’s also worth nothing that during our trip, I’ve spoken with 3 Salvadorans whom have left the country for the USA (2) and Canada (1), all between 20 and 30 years ago. Two of them were coming back in El Salvador for the first time since a while. One person was coming back with his 4 teenage children, and it was the children’s first time in El Salvador. All of 3 of these Salvadoran told me the same thing : they didn’t recognize the country they remembered when they left, as it had drastically changed for the better.
[WHERE IS EL SALVADOR AND WHERE IT MIGHT HEADED 🇸🇻✨] Take it with a pinch or a handful of salt, since this is written by a tourist whom stayed a grand total of 15 days in the country, but what I feel regarding “El Salvador the country” is that this is a country which elected a visionary leader, whom is trying to propel his El Salvador at a level of quality of life on par, and maybe better than what is done in what we “First-Worlders” call a “developed country”.
This shows by his very strict policies regarding violence, which are often denounced in first-world countries, but these policies brought his country from one known as one of the most violent in the world, that from Europe we only heard horror stories about, from the one in which we felt the safest we’ve ever been.
This shows in the speed at which the country is building at : I’ve spoken about bad traffic before, but I also need to mention I’ve seen a lot of workers and heavy duty equipment working to enlarge the roads going in and out of San Salvador. And when I say “a lot”, I mean that I’ve seen more workers doing actual work on the roads in a single one-hour road trip than what I usually see in Europe over the course of a full month.
This also shows by the contrast between the standard of living in San Salvador, where in some areas you can have towering condos with 24/7 armed security, 24/7 concierge, aircons, big elevators, backup electricity generators, and all the modern appliances and amenities you can usually find in the “First-World”, and just one block away you’ll find typical one-floor, Salvadoran houses with no aircons, barred windows with barbed-wire of the roofs.
Lastly, I’ve felt being in a country heading to somewhere better, with its people working hard to create a better tomorrow by improving their country.
From what I’ve seen, if they are able to bring all their people up together (not just the city dwellers/white collar class), and manage to avoid the usual traps of fast growing economies (things get so good so fast that officials start to get corrupt by rich investors/companies, and put their personal interests over the people's…) my bet is that in 20 years maximum they should reach a standard of quality of life on par, or even better than what exists in the most developed EU countries.
We’ll surely come back before that time to see how it goes, and discover more of this intriguing country, so we might give you an update or two along the way.
[CLOSING REMARKS 📙] : As mentioned in the intro, we're just a random family of 4 who've just been travelling 15 days to El Salvador in August 2024, and are sharing our thoughts about the trip, citizen journalism style, and so we don’t have to repeat ourselves too much to family and friends. If any Salvadoreños are reading this and want to add context/correct stuff I didn’t understand or got wrong, all comments and critic are welcome ! If this thread was helpful to you, and want more info regarding anything mentioned here, good and bad, feel free to ask in the replies and we’ll try to answer to the best of our abilities.
(I do not know if this might be worth mentioning, but better be safe than sorry : we did not receive nor ask for any money, favors or gifts from whoever was mentioned (or not) in the thread. All our expenses were 100% covered by ourselves. We remain purposely vague about ourselves because we value our privacy, but we would be called a standard family living in the EU by anyone knowing us.)
TL:DR : Ask your favorite AI assistant to sum it up for you.
-
@ 656a6efa:ec0bd10e
2025-01-01 14:42:26Accounting Update 2.0 from 15th Centry -> 21st Century
Luca Pacioli’s double entry bookkeeping was a real 0 to 1 moment in the world of record keeping. Standardizing the accounting protocol allowed for a base level of trust between record keepers and interested parties of investors and owners. Trust might be a stretch of the word, in reality, it was really just an agreed upon structure or rules which then changed with consensus over time.
The problem we have been dealing with since reaching record keeping consensus is accuracy. The accounting protocol is not perfect. It relies heavily on human implementation and we are still too early in modern attempts at automating record keeping. Audited Financial Statements have typically been the answer to the problem of accuracy (though the level of scrutiny books go through in an audit would surprise most people not familiar with the processes of an audit). An audit, at best, just means that the information you’re looking at is ~mostly~ right. Described by an industry word, “material”.
The problem is with the banks. I know . . . you’re shocked a bitcoiner has a problem with banks . . . but it’s not like that. A large part of the record keeping process is comparing the bank record of transactions to the accounting records transactions in what is called a reconciliation. It’s just a comparison of the two ledgers. If those ledgers don’t agree, your records are wrong. You then take those bank ledgers and verify transactions with supporting documents like invoices, shipping records, and checks. It’s a tedious, potentially error-prone process.
Bitcoin, could fix this.
By tying transactions into a public, real-time ledger, there is no need for the bank reconciliation process. Global consensus deemed your transactions as valid and all an organization would have to do is prove they have the key. There’s even potential for organizations to embed invoices directly into payments meaning that each transaction has support for it with verification from an outside party of what the funds were used for. Instead of saying, “we have an audit as of 12/31/20XX” you have the potential for real-time audits of transactions with 100% accuracy. 100% verification of accuracy is not economically freasable or practical with today’s processes.
As of the day of this writing, that possibility is all but a dream, but I look forward to the day where accountants look more like today’s computer programmers than a 15th century monk.
-
@ cf7ed325:050194cf
2025-01-01 13:57:08Alexandria, Egypt’s coastal gem, offers a perfect blend of history, culture, and seaside charm. With a variety of Alexandria day tours, you can dive into the city’s treasures and beyond. Whether you're a history buff, a foodie, or a shopping enthusiast, there’s something for everyone.
Start your adventure with a Full Day Trip to Alexandria from Cairo by Private Car. This tour takes you on a comfortable journey to explore iconic landmarks like the Catacombs of Kom El Shoqafa, Pompey’s Pillar, and the magnificent Qaitbay Citadel.
For food lovers, the Best Alexandria Sea Food Tours are a must. Indulge in freshly caught seafood at renowned coastal restaurants, savoring flavors that define Alexandria’s culinary heritage.
Shopaholics will love the Day Tour to Alex Shopping Markets and buy Egyptian Souvenirs. Stroll through bustling bazaars, discover handcrafted treasures, and take home unique mementos of your trip.
History enthusiasts can embark on a Day Trip to El Alamein from Alexandria, where you’ll visit the WWII cemeteries and museums that honor the soldiers who fought in the famous battle.
For a tranquil escape, Enjoy Your Vacation in Rosetta With Alexandria Day Tour. Discover the charming town of Rosetta (Rashid), where the Rosetta Stone was found, and explore its historical houses and scenic Nile views.
Finally, immerse yourself in the city’s rich history with the Experience Alexandria Landmarks in Alexandria City tour. Marvel at the Bibliotheca Alexandrina, explore Roman ruins, and enjoy the Mediterranean breeze.
Alexandria day tours promise unforgettable experiences, blending history, culture, and relaxation. Book your tour today and make memories to cherish forever!
🌐 Visit us at www.etbtoursegypt.com 📲 Contact us now! +20 10 21100873 📧 Email: info@etbtours.com 🏢 Company Address: 4 El Lebeny Axis , Nazlet Al Batran , Al Haram, Giza , Egypt
-
@ 2063cd79:57bd1320
2025-01-01 13:11:30Aufgabe von Minern
Wer sich nochmal genau mit dem Ablauf von Mining befassen möchte, dem rate ich Ausgabe #27 zu lesen.
https://www.genexyz.org/post/27-block-779000-was-machen-miner-wirklich-3c8f05/
Wir erinnern uns, dass es im Bitcoin-Ökosystem drei große Gruppen gibt, die sich nicht jeweils ausschließen. Es gibt die Miner, die Node-Betreiber und die Nutzer. Diese schließen sich nicht gegenseitig aus, da man auch in zwei oder sogar drei dieser Gruppen verhaftet sein kann. Die Miner übernehmen Aufgaben, die die anderen zwei Gruppen nicht leisten können und dafür werden sie durch den Anreizmechanismus belohnt. Denn durch ihre Arbeit gewährleisten sie die Sicherung des Netzwerks (je höher die aufgebrachte Hashrate, desto schwieriger werden Angriffe), sie validieren, sortieren und fügen Transaktionen dem Netzwerk hinzu und darüber hinaus helfen sie dabei bitcoins zu verteilen (zumindest bis alle ca. 21 Millionen bitcoins in ca. 100 Jahren erschlossen wurden). Warum die Analogie zum Mining schwierig ist, haben wir schon öfter besprochen, kurz und verständlich auf den Punkt gebracht hat es diese Woche Gigi in einem kurzen Beitrag.
https://dergigi.com/2023/04/12/bitcoins-are-not-mined-they-are-issued-over-time
Mining Pools
Ich habe Mining-Pools detailliert in einem Artikel letzten September beschrieben. Wer sich mit dem Thema nochmal eingehender beschäftigen möchte, kann das hier tun:
https://www.genexyz.org/post/12-block-753150-bitcoin-mining-pools-vs-dezentralisierung-vytfxv/
Doch TL;DR für all diejenigen, die keine Zeit oder Lust haben, hier in Kürze:
Die immer weiter steigende Hashrate im Netzwerk, ausgelöst durch immer größer werdende Mining-Operationen und immer leistungsfähigere ASIC Chips, führt dazu, dass es kleine und auch mittelgroße Miner immer schwerer haben erfolgreich Bitcoins zu minen, und damit Profite zu erzielen.
Mining-Pools bieten da Abhilfe, indem sie Minern die Möglichkeit bieten, ihre Hashrate zu bündeln und somit eine größere Wahrscheinlichkeit erzeugen, im Wettkampf um die Winner-take-all-Prämie, einen Teil der Belohnung in Form von Block-Subsidy und Gebühren einzustreichen (➡️ Block Reward). Je mehr Miner sich in einem Pool zusammenschließen, um somit die Hashrate zu bündeln, desto wahrscheinlicher wird, dass dieser Zusammenschluss von Minern den nächsten Block findet. Damit sinkt natürlich die einzelne Auszahlung pro Block, jedoch steigt die proportionelle Anzahl der Blocks, die dieser Pool erfolgreich produzieren kann.
Diese Rechnung lohnt sich neben Mining-Farmen auch für die meisten kleinen und mittelgroßen Miner, da so ein stetiger Fluss von Einkommen wahrscheinlicher wird, als ab-und-zu (oder nie) den Jackpot zu knacken. Das Problem bei Mining-Pools besteht in der Bündelung der Hashrate unter einer übersichtlichen Anzahl von Betreibern, denn erstens macht es jede Konzentration einer bestimmten Sache für Angreifer einfacher, diese eine große Einheit ausfindig zu machen und gezielt zu attackieren. Und zweitens verschiebt sich die dezentrale Wahrheitsfindung zugunsten einer zentralisierten Entscheidungsfindung.
Denn bisher sind es die Mining-Pools, die über die Architektur der Blöcke bestimmen, also darüber, welche Transaktionen in den nächsten Blockkandidaten gepackt werden. Dies ermöglicht Mining-Pool-Betreibern sowohl Transaktionen zu zensieren (black listing), als auch Transaktionen auszuwählen, die nicht unbedingt im besten Interesse der Miner (z.B. Transaktionen mit geringen Gebühren, obwohl es welche mit hohen Gebühren gegeben hätte), oder gar des ganzen Netzwerks sind (z.B. leere Blöcke, um das Netzwerk zu verlangsamen) (white listing). Diese vermeintliche Macht der Pool-Betreiber muss nicht unbedingt von ihnen selbst ausgenutzt werden, bietet aber auch Regierungen und anderen Apparaten einen leichten Angriffsvektor, wenn diese versuchen wollen, das Netzwerk, bzw. einzelne Transaktionen gezielt zu zensieren, indem sie Mining-Pools unter Zwang setzen.
Wie in dieser Grafik leicht ersichtlich, gibt es heute einige wenige Pools, die einen deutlichen Anteil der globalen Hashrate bündeln. 80% (!!!) der Hashrate wird von den größten vier Pools bestimmt, und immerhin 55% (also mehr als die Hälfte - immer noch nicht cool) von den beiden größten. Dies macht Pools natürlich zu einem leicht bestimmbaren Angriffspunkt mit einer riesigen Zielscheibe auf dem Rücken.
Besteht überhaupt eine solche theoretische Möglichkeit, dass z.B. Foundry USA im Rahmen einer hypothetischen Verpflichtung durch Dritte (Regierung, Finanzaufsicht, Geheimdienst, etc.) mit der Zensur bestimmter Transaktionen beginnen könnte? Die Antwort ist: theoretisch erstmal ja. Auf technischer Ebene könnte es passieren. Doch Miner würden sehr schnell erkennen, dass etwas im Busch ist und ihre Hashrate auf andere Pools verlagern (dies muss nicht mal aus altruistischen Gründen geschehen, sondern einfach weil theoretische wirtschaftliche Anreize verloren gehen).
Transaktionsauswahl
Wie schon erwähnt, sind Mining-Pool-Betreiber heute dafür verantwortlich Transaktionen für den nächsten Block vorzuschlagen. Das bedeutet der Betreiber hat die volle Kontrolle darüber, wie der nächste Block im Mining-Prozess aussieht und die Miner und Mining-Farmen werden sozusagen zu Lieferanten von Hashrate, um diesen Vorschlag umzusetzen. Pools stellen den einzigen Koordinierungspunkt zwischen den teilnehmenden Hardware-Betreibern dar. Es bleibt dem Miner natürlich selbst überlassen, welchem Pool er sich anschließt (und ob sich überhaupt einem Pool angeschlossen wird) und auch der Wechsel von einem Pool zum nächsten ist relativ simpel und schnell vollzogen. Es bleibt jedoch dabei - Betreiber sind verantwortlich für die Auswahl von Transaktionen, die in die Kandidaten-Blöcke eingefügt (oder unterlassen, sprich zensiert) werden sollen. Es besteht also eine zusätzliche Bürde für jeden Miner zusätzlich zu kontrollieren, dass keine Transaktionen ausgeschlossen werden, oder Transaktionen sauber ausgewählt werden.
“Bitcoin is dead.” “Mining is over.” “They will regulate Bitcoin.” “Censorship will come.” - Peter Todd
https://www.coindesk.com/tech/2021/05/07/marathon-miners-have-started-censoring-bitcoin-transactions-heres-what-that-means
Ob nun ein Pool-Betreiber oder Miner durch Zwang dazu geführt wird, individuelle Transaktionen hinzuzufügen, oder auszulassen, oder ob es aus eigenem Antrieb heraus geschieht (wie im obigen Artikel von MARA beschrieben: der von Marathon kontrollierte MARA Pool hatte entschieden, nur Blöcke mit OFAC-konformen Transaktionen zu produzieren und damit Transaktionen von und zu Adressen zu zensieren, die vom US-Finanzministerium auf die schwarze Liste gesetzt wurden, was einen großen Aufstand hervorrief und kein anderer Miner schloss sich dem Beispiel an. MARA veröffentlichten nach nur einem Monat in einer Pressemitteilung, dass keine Transaktionen mehr gefiltert würden.) ist dabei zunächst egal.
Doch eine Umkehrung der Verantwortlichkeit würde die Verantwortung zu den einzelnen tausenden Hardware-Betreibern (Minern) verschieben, die zentrale Entscheidungsgewalt der Pool-Betreiber auflösen und einen großen Angriffspunkt im Netzwerk eliminieren.
Wie alle anderen Computer-Netzwerk, besteht auch Bitcoin aus Protokollen, mit denen die Kommunikation zwischen Teilnehmern und Regeln festgelegt werden und die geschilderten Bedrohungen werden durch das aktuelle Protokoll ermöglicht, das von Minern und Mining-Pools verwendet wird, um miteinander zu kommunizieren: Stratum V1.
Stratum v2
Wie bei allen Sachen im Bitcoin-Ökosystem, gibt es keine zentrale Organisation, die Verbesserungen im Protokoll oder, wie in diesem Fall, in untergeordneten Protokollen vorschlagen und umsetzen kann. Es bedarf immer einer Gruppe von Entwicklern, die ein Problem im derzeitigen System erkennen und einen passenden Lösungsvorschlag unterbreiten. So auch bei Stratum. Das originale Stratum-Protokoll (v1) wurde 2012 eingeführt und wird seitdem weitgehend unverändert eingesetzt.
Bei der Stratum v2 Reference Implementation (SRI) handelt es sich um eine kostenlose, unabhängige, Open-Source-Variante von Stratum v2. Aber Justus, heißt das etwa, es gibt noch andere Stratum v2 Varianten? Bingo, Zweiter, es können beliebig viele Varianten erstellt werden. Alleine die Mining Pools entscheiden darüber, welches Protokoll, also welche Software, für sie und ihr Geschäftsmodell am besten funktioniert. Und die kürzlich vorgestellte Variante, die SRI, ist das bis dato umfangreichste und am weitesten unterstützte Update des Protokolls. Denn sowohl Braiins, ein Anbieter von Mining-Pools und Mining-Software (inkl. einer eigenen Variante von Stratum v2), als auch Foundry USA, der derzeit größte aller Mining-Pools, sind aktive Unterstützer des Projekts.
SRI ist also das wichtigste Protokoll-Update seit 2012. Aber was genau macht v2 so wichtig und wo liegen die Schwächen von v1?
In der aktuellen Version 1 ist Datenübertragung zwischen Minern, aber auch zwischen Minern und Pool-Betreibern nicht verschlüsselt. In v2 wird Kommunikation verschlüsselt und gewährleistet so Integrität und Vertraulichkeit der übermittelten Informationen. Dies soll vor allem vor sogenannten Man-in-the-Middle-Angriffen schützen, bei denen Dritte die Übertragung von Hashrate zwischen Minern und Pools abfangen (sogenanntes Hashrate-Hijacking), und diese als die eigenen weiterzuleiten und somit Auszahlungen zu stehlen.
Das v2 Protokoll ist vollständig binär. Das heißt, Datenübertragungen werden nicht in Menschen-lesbarem Textformat (ASCII Code), sondern in Computer-lesbarem Binärformat vorgenommen, was unnötige Datenmengen eliminiert. Dies und einige andere Leistungsverbesserungen machen den gesamten Prozess bis zu 20% performanter.
Stratum v2 dezentralisiert das Bitcoin-Mining erheblich, denn Miner bekommen die Möglichkeit, die Transaktionen fortan selbst auszuwählen, wodurch das Netzwerk zensurresistenter wird. Dies wird mit Hilfe von weiteren untergeordneten Protokollen erreicht, die es Minern ermöglichen, Transaktionen über ihre Nodes auszuwählen. Dies ist ein wichtiger Meilenstein bei der Demokratisierung der Transaktionsauswahl im gepoolten Mining und eliminiert die oben beschriebenen Risiken.
Konkret haben die Entwickler ein neues dezentralisiertes untergeordnetes Protokoll geschaffen, das sich Job Negotiator (JN) nennt. Achtung, jetzt wird es etwas technisch: Miner betreiben ihre eigenen Knoten, die eine neue Vorlage direkt vom Vorlagenanbieter erhalten. Die neue Vorlage enthält den Merkle-Pfad der Transaktionen, die vom Anbieter ausgewählt wurden. Für den neuen Block muss ein neuer Job erstellt werden, also sendet der JN des Miners eine Nachricht mit einem vorgeschlagenen Satz von Transaktionen an den Pool-Betreiber. Der Betreiber akzeptiert dann die Vorlage oder lehnt sie ab. Wenn der Vorschlag der Miner akzeptiert wird, werden sie benachrichtigt, dass sie mit dem Mining beginnen und ihre anteilige Hashrate an den Pool senden können.
Kurz gesagt: Miner schlagen vor, welche Transaktionen in einen Block kommen und nicht andersrum. Alle sind glücklich, alle sind froh und darüber hinaus geschieht dies natürlich blitzschnell, sodass für die Miner und den Pool kein Nachteil gegenüber anderen Mitbewerbern entsteht, denn beim Mining zählt jede Millisekunde, wenn es darum geht erfolgreich den nächsten Block produzieren zu dürfen, oder nicht.
Was sind die Anreize für die Pool-Betreiber, dieses neue Protokoll zu verwenden, wenn sie damit ihr Gewaltmonopol aufgeben?
Relativ einfach: Pool-Betreiber mögen diese Verantwortung eigentlich gar nicht. Sie haben sie irgendwie geerbt und sind mit dieser großen Verpflichtung gegenüber dem Netzwerk und sich selbst irgendwie im Unreinen. Ein bisschen so wie bei Morty, Aaliyah, Djibrail, Laila, Issa, Leonora, Naima und Amaya.
Pool-Betreiber mögen es also nicht so in der Öffentlichkeit zu stehen und permanent angegriffen zu werden, des Weiteren birgt die Transaktionsauswahl auch ein gewisses Haftungsrisiko, das sie gerne von sich weisen würden.
Die beiden anderen grundlegenden Merkmale des Stratum v2 Protokolls sind, wie oben beschrieben, natürlich auch Sicherheits- und Leistungsverbesserung. Alleine für diese Attribute würde es sich schon lohnen, auf das neue Protokoll umzusteigen.
Die neue Variante des Protokolls (SRI) wurde erst kürzlich öffentlich und als Open-Source Code zugänglich gemacht. Es bleibt also nur eine Frage der Zeit, bis sich nach Braiins und Foundry auch die anderen Mining-Pools (sehr wahrscheinlich) nach einer gründlichen Test-Phase dem Update öffnen.
https://www.nobsbitcoin.com/carole-house-censoring-bitcoin
Besonders in Zeiten, in denen Gegner von Bitcoin in halb-öffentlichen Reden über Pläne sprechen, wie man das Bitcoin-Netzwerk kontrollieren, bzw. für seine Zwecke benutzen kann, ist es wichtig die oben besprochenen Angriffs-Vektoren zu minimieren.
Carole House, ehemalige Direktorin für Cybersicherheit des Nationalen Sicherheitsrates des Weißen Hauses, sprach bei einem Event an der Universität von Princeton und sagte "sie würde lieber mehr Hashrate in den USA sehen, damit sie Miner zwingen können, das Netzwerk zu zensieren" und dass es "nicht nur darum ginge, Minern zu sagen, dass sie bestimmte Transaktionen nicht in Blöcke einbauen, sondern auch nicht auf Blöcken mit nicht konformen Transaktionen aufzubauen, damit diese Transaktionen nirgendwo in der Kette ankommen".
Die zeugt davon, dass Menschen wie Carole House ein substantielles Verständnis von der Bitcoin-Technologie besitzen und dieses Fachwissen dafür verwenden werden, Wege und Mittel aufzutun, wie man Bitcoin zumindest attackieren kann.
🫳🎤
In diesem Sinne, 2... 1... Risiko!
-
@ 300352ae:8be8c8b3
2025-01-01 13:06:15Rilatoj inter Prezidento Joe Biden kaj Vicprezidanto Kamala Harris laŭdire fariĝis pli malvarmaj post ŝia lastatempa elektoperdo, laŭ raporto. Fontoj proksimaj al ambaŭ gvidantoj indikas, ke privataj interagoj inter iliaj familioj estas pli streĉitaj kompare kun la komencaj tagoj de la administracio. Oni mencias, ke la malboniĝo en rilatoj estas aparte rimarkebla inter Unua Damo Jill Biden kaj Vicprezidanto Harris. Jill Biden laŭdire havis hezitojn pri Harris ekde la antaŭbalotdebatoj de 2020, kiam Harris kritikis Biden pro iliaj pasintaj sintenoj kontraŭ federaciaj transportadprogramoj celantaj malkomplezi lernejojn. Tiu kritiko havis personecan efikon sur Jill Biden, kontribuante al ŝia daŭra malkomforteco kun la vicprezidanto.
La raporto emfazas, ke la politikaj kaj personaj dinamikoj inter la du familioj fariĝis pli tensaj post la perdo de Harris en la prezidenta vetkuro. La privata etoso inter la Bidens kaj Harris kaj ŝia edzo Doug Emhoff foje estis malvarma, laŭ la raportoj. Prezidanto Biden laŭdire kredas, ke li povus esti venkinta la elekton, se li restus en la vetkuro. Tiu sento estis respegulita de iuj konsilistoj, kiuj argumentas, ke la sperto kaj sukceso de Biden, precipe lia venko kontraŭ Donald Trump en 2020, igus lin pli impona kandidato.
Laŭ aparta raporto, Biden private esprimis bedaŭron pro sia decido retiriĝi el la elekto de 2024. Kvankam li agnoskas erarojn en gvidado, li sentas, ke li devus resti en la vetkuro spite al la defioj, kiuj kondukis al lia retiro. La Blanka Domo reĝis tiujn raportojn, kun proparolanto substrekante, ke ambaŭ gvidantoj fokusas liveri rezultojn por usonaj familioj.
La decido de Biden retiriĝi en julio sekvis televidecan debaton kun Trump, kiu altiris kritikon kaj pliigis zorgojn pri lia aĝo kaj kognaj kapabloj. Li publike agnoskis, ke lia agado dum la debato estis nekontentiga, dirante, ke li “fuŝis”, ĉar li luktis por klare esprimi siajn politikojn. Tiu decido malfermis la vojon por Kamala Harris fariĝi la Demokrata kandidato, sed ŝi poste estis venkita de Trump en la novembro-elekto.
-
@ a10260a2:caa23e3e
2025-01-01 12:42:22I’d like to start off by saying that phoenixd has been a great experience so far. The install (on a Linux machine) was as easy as depicted on their website.
And the channel I opened via auto liquidity was super simple. I didn’t have to pick an LSP and I won’t need to manage liquidity.
Unfortunately, the machine I installed the software on started to freeze seconds after every boot. After posting about it here and getting an answer from nostr:npub1lxktpvp5cnq3wl5ctu2x88e30mc0ahh8v47qvzc5dmneqqjrzlkqpm5xlc, I was surprised at how easy the migration seemed.
It really was just a matter of restoring the seed words on another phoenixd instance. Of course, making sure that the two instances don’t run at the same time.
As easy as it was, I wanted to create this post to give a quick overview for those who might be less tech savvy.
Step 1
Grab seed words from the
seed.dat
file in hidden.phoenix
folder on the old machine.Step 2
Install phoenixd on the new machine
``` $ wget https://github.com/ACINQ/phoenixd/releases/download/v0.4.2/phoenix-0.4.2-linux-x64.zip $ unzip -j phoenix-0.4.2-linux-x64.zip
$ # run the daemon: that's it! $ ./phoenixd ```
Step 3
(This is the step that wasn’t super clear and why I wanted to spell it out in this post)
In order to install the software,
./phoenixd
has to be run. This is going to generate a new seed phrase.Now, all you need to do is replace the seed words in
seed.dat
with the ones from the original install.In retrospect, I think you can replace the seed words right after unzipping the zip file and before running
./phoenixd
. That will probably achieve the same result.Step 4
Once the seed words have been restored. Just run
./phoenixd
again and it’ll start up like nothing happened.Literally.
There was no indication whatsoever that something had changed, so I ran
./phoenix-cli getinfo
and, voila, there was my 2M-sat channel.It was quite magical.
originally posted at https://stacker.news/items/829411
Update (1/1/2025)
Phoenix Support got back to me and confirmed that the migration can be even simpler. You can actually just copy the ~/.phoenix directory onto the new machine and run
./phoenix
! -
@ ea9e8563:5a82ed79
2025-01-01 12:12:03Januar
- Bitcoin Spende an Satoshi
https://mempool.space/tx/d7db4f96a4059c8906b953677ce533493d7b9da0f854a21b99f5772910dd0a31
- Bitcoin im Bundestrag
https://bitcoin-im-bundestag.de/event/auftaktveranstaltung-bitcoin-im-bundestag/
- Bitcoin ETF Aproval
- USA verkauft Beschlagnamte Bitcoin von Darknet Dealer Xanaxman
- LKA Beschlagnahmt Bitcoin
- Gericht bestätigt, dass die Trucker Massnahmen (Geld einfrieren) unrechtmässig gewesen ist
Song 1: Netdiver
> Hodl, Hodl, Hodlin' - Pleb Town Rock*
Februar
- Einundzwanzig Magazin: Interview mit Julian Assange's Brunder
https://bitpartikel.com/cryptonite/blog/2024/02/20/freejulianassangenow-2/
- Fair Talk akzeptiert auch Bitcoin Lightning Spenden
- Marathon Slipstream wird Announced (direct Submitting BTC txs)
- Cypherpunks: Hörbuch nun auf audible
https://www.audible.de/magazin/cypherpunks-wir-sind-opfer-der-geheimdienste
Song 2: Eric
Bitcoin to the Sky - Lunapilot
März
- Bitcoin Atlantis
https://www.youtube.com/@freemadeira
- Opensats Nostr Fund
https://opensats.org/projects/nostr
- Sovereign Engineering (mit Gigi)
https://sovereignengineering.io/
- El Salvador hebt KYC Limite von 200$ auf 25k$
https://www.nobsbitcoin.com/el-salvador-updates-old-law-to-lift-kyc-limits-from-200-to-25000/
- BitBox Lightning Preview
https://twitter.com/BitBoxSwiss/status/1767491986578080091
- Twenty Two Portal (Mobile Signing Device)
https://x.com/TwentyTwoHW/status/1763625247465762826?s=20
Song 3: Sandro
> PlanB Network - The Orange Pill Jam*
## \ April
- 21 Magazin „Bitcoin ist Cypherpunk“
https://twitter.com/BITpARTIKEL/status/1775742551749808255
- Gold so viel wert wie noch nie - Experten rätseln über Gründe
https://tagesschau.de/wirtschaft/finanzen/gold-preis-rekordhoch-zinsen-100.html…
- Renato Moicano Octagon Interview | UFC 300
Link - talks about Ludwig von Mises
- Samourai Gründer verhaftet
https://www.justice.gov/usao-sdny/pr/founders-and-ceo-cryptocurrency-mixing-service-arrested-and-charged-money-laundering
- Wasabi stellt Coinjoin Service ein
https://blog.wasabiwallet.io/zksnacks-is-discontinuing-its-coinjoin-coordination-service-1st-of-june/
- LNbits Funds gestohlen
https://twitter.com/lnbits/status/1784521836950110264
- Roger Ver wird Steuerbetrug vorgeworfen
https://www.justice.gov/opa/pr/early-bitcoin-investor-charged-tax-fraud
- Swiss Bitcoin Conference in Kreuzlingen
https://swiss-bitcoin-conference.com/
Song 4: Nicolas
The Johner Boys - Psycho
Mai
- Tornado Cash - Akexey Pertsev für 64 Monate verurteilt
https://www.nobsbitcoin.com/tornado-cash-developer-alexey-pertsev-sentenced-to-64-months-in-prison-in-the-netherlands/
- AFD sympatisiert mit Bitcoin
https://www.blocktrainer.de/blog/afd-mit-anfrage-an-die-bundesregierung-zu-bitcoin
- Seasteading
https://fountain.fm/episode/gloM4Dygv97mnKkLXMZc
- Microstrategy Bitcoin Strategie, seit ca 4 Jahren aktiv - Aktienkurs mehr als 1’500% gestiegen.
Berglinde Briefing vom 30.05.24
- Bum Bum Check
Breedlove
Song 5: Netdiver
The next Bitcoin Bull Run - Annonymal
Juni
- Deutschland verkauft Bitcoin
https://www.btc-echo.de/schlagzeilen/verkauft-das-bka-50-000-bitcoin-186860/
- Mt Gox verkauft BTC
https://www.blocktrainer.de/blog/mtgox-startet-bitcoin-rueckzahlungen
- BTC Prague
- Paralelni Polis
https://paralelnipolis.cz/en/o-nas/en/
- Julian Assange Free
- Lykke Konkurs (hack 22mio Dollar)
Song 6: Eric
Halving - Orange Pill Jam Project
Juli
- Julians Assange erster Geburtstag in Freiheit nach Jahren
https://primal.net/e/note1eppuucmjkrux55k9gmtta9kxfua56tfrfy8sankwmlf34aach6zqggurwa
- Phoenix unterstützt jetzt Bolt 12
https://x.com/PhoenixWallet/status/1808547081214439494
- Trump spricht auf der BTC24 in Nashville
https://x.com/BitcoinMagazine/status/1811181306438660375
- Anhörung von Lonergan „TDevD“ Dev von Samourai
https://x.com/frankcorva/status/1811093896144785625
- Faketoshi ist nicht Satoshi (für 3Monate auf seiner Website
https://primal.net/e/note1rfmplr0dry52hd3y65dvred9638saglf8sjw2fp4fd4e0w2z4ncsej77cz
- Sachsen Notveräusserung von 50k Bitcoin
https://www.medienservice.sachsen.de/medien/news/1077662
- Larry fink und Michael Dell im Bitcoin Fieber?
https://www.blocktrainer.de/blog/blackrock-ceo-larry-fink-und-michael-dell-im-bitcoin-fieber
- Strike BTC Pay Server Integration
https://strike.me/blog/btcpay-server-integrates-strike-api-to-power-bitcoin-payments/
- Proton Wallet
https://proton.me/blog/proton-wallet-launch
- Erster Bitaxe Block
https://mempool.space/de/block/00000000000000000000f0235e50becc0b3bc91231e236f67736d64b1813704b
Song 7: Sandro
PlebRap - Bitcoin braucht dich nicht! - SatStacker, Mo
August
- Mutiny Wallet shutting down
https://blog.mutinywallet.com/mutiny-wallet-is-shutting-down/
- Dark Skippy Attack
Der Bitcoin Dark Skippy-Angriff ist eine ausgeklügelte Methode, die auf Hardware-Wallets abzielt. Er nutzt kompromittierte Firmware aus, um heimlich Teile der Seed-Phrase eines Benutzers in Transaktionssignaturen einzubetten. Mit nur wenigen signierten Transaktionen können Angreifer die vollständige Seed-Phrase extrahieren und möglicherweise die volle Kontrolle über die gespeicherten Bitcoins erlangen. Dieser Angriff ist besonders gefährlich, da er im Hintergrund unbemerkt ablaufen kann, was ihn schwer zu erkennen macht.
- Bitbox anti Klepto
https://bitbox.swiss/blog/anti-klepto-wie-die-bitbox02-versteckte-seed-extraktion-verhindert/
Der Artikel erklärt das Anti-Klepto-Protokoll, das von der BitBox02 Hardware-Wallet implementiert wurde. Dieses Protokoll schützt vor dem "Nonce Covert Channel"-Angriff, bei dem ein bösartiger Hersteller heimlich den privaten Schlüssel (Seed) des Benutzers extrahieren könnte. Das Anti-Klepto-Protokoll funktioniert, indem es die Fähigkeit der Hardware-Wallet einschränkt, die Nonce frei zu wählen, indem es zusätzliche Zufälligkeit von der Host-Software (z.B. BitBoxApp) einbezieht. Dies verhindert die Manipulation der Nonce zur Übertragung versteckter Daten und erhöht somit die Sicherheit der Benutzer-Seeds.
- Sunny vs Holger Wette
- Todestag von Hal Finney
https://www.blocktrainer.de/blog/der-tag-an-dem-hal-finney-starb
- Telegram Gründer in Frankreich festgenommen
https://www.zeit.de/digital/2024-08/pawel-durow-festnahme-frankreich-telegram?utm_content=zeitde_redpost+_link_sf&utm_campaign=ref&utm_medium=sm&utm_referrer=twitter&wt_zmc=sm.int.zonaudev.twitter.ref.zeitde.redpost.link.sf&utm_source=twitter_zonaudev_int
- Überbezahlte Konsolidierungs tx by 195x
https://x.com/mononautical/status/1826698452149174433
Song 8: Nicolas
Middle Season - Let Go (What's holding you back)
September
- CLN v24.08 Bolt 12 und blinded Paths
https://x.com/core_ln/status/1830647170896105623
- Strike unterstützt Bolt 12
https://x.com/strike/status/1831099910458163536
- Bitcoin Hashrate auf ATH
https://charts.bitbo.io/hashrate/
- Marshall-Plan 2.0 - Wer zahlt Europas 800-Mrd.-Euro-Rechnung? (Sound Money BTC pod Loddi)
https://www.sound-money.de/podcast/episode/283fe281/237-marshall-plan-20-wer-zahlt-europas-800-mrd-euro-rechnung
- Nostr Wegweiser by Quille
https://quillie.github.io/nostr-wegweiser/
- Argentiniens Libertäre Zeitenwende (Einundzwanzig Podcast Folge)
https://fountain.fm/episode/xTMivhQBGJpdPLpKZ5l9
- Orange Vision for BAS
- Signal blocked in Russia
- Blackrock’s Coinbase tx’s recorded off-chain
https://x.com/TylerDurden/status/1790941726544478602
- DATUM by Ocean (Mining Software, readjusting incentives for miner - build their own templates)
https://x.com/ocean_mining/status/1840408161271890264
- Article by Scott Locklin about QC - shared by Jimmy Song
(Der Artikel argumentiert, dass Quantencomputing weitgehend ein betrügerisches Feld ist. Der Autor behauptet, dass trotz jahrzehntelanger Forschung und erheblicher Finanzierung kein praktischer Quantencomputer gebaut wurde. Er kritisiert den Mangel an Fortschritten bei der Erstellung auch nur eines fehlerkorrigierten Qubits und argumentiert, dass das Feld mehr auf Hype als auf tatsächlichem wissenschaftlichen Fortschritt basiert. Der Autor vergleicht Quantencomputing mit Nanotechnologie und suggeriert, dass beide Bereiche unrealistische Behauptungen über die Manipulation von Materie auf Weisen aufstellen, die wir nicht vollständig verstehen. Er äußert auch Bedenken über die Anzahl der Karrieren und Ressourcen, die einer Technologie gewidmet sind, die seiner Meinung nach in keiner praktischen Form existiert.)
https://scottlocklin.wordpress.com/2019/01/15/quantum-computing-as-a-field-is-obvious-bullshit/
Song 9: Netdiver
Real Men Invest in Bitcoin, and Not in Soya - Fezzy
Oktober
- BAS GV
- 2 Orange Vision Kandidaten wurden gewählt
- Phil
- Lisa
- Niklas
- Adriano
https://www.bitcoinassociation.ch/board-1
- Bitcoin verkaufen mit Pocket, auch in der Bitbox App
https://www.blocktrainer.de/blog/bitbox-pocket-mit-neuem-feature
- Shielded Client side validation
Abgeschirmte clientseitige Validierung (Shielded CSV) ist ein neues Protokoll, das Token-Transfers auf Bitcoin verbessert. Es ermöglicht die private Übertragung von Token, ohne Informationen über die Token oder deren Transferhistorie preiszugeben. Abgeschirmte CSV verwendet Zero-Knowledge-Beweise, um Überweisungen mit einem festen Ressourcenaufwand zu verifizieren, was die Privatsphäre und Effizienz verbessert. Zudem können mehrere Token-Transfers in einer einzigen Bitcoin-Transaktion kombiniert werden, was potenziell Tausende von Token-Transfers in einem Block ermöglicht.
https://bitcoinops.org/en/newsletters/2024/09/27/
- Tesla verkauft alle Bitcoin
https://www.blocktrainer.de/blog/tesla-leert-die-bitcoin-wallet-was-steckt-dahinter
- FBI Token überführt Pump and Dump Projekte
https://www.blocktrainer.de/blog/anklagen-wegen-pump-and-dump-im-krypto-sektor
- Lugano Plan B Forum
https://planb.lugano.ch/planb-forum/
- Klima Grosseltern
Song 10: Eric
Rely on relay - Orange Pill Jam Project
November
- Telekom testet Bitcoin Mining infrastrukturen
https://www.telekom.com/de/medien/medieninformationen/detail/test-bitcoin-mining-infrastruktur-fuer-ueberschuessige-energie-1082680
- Bitcoin Block Stans
https://x.com/NW_BTCkonferenz
- Shopinbit Schweiz Launch
Code DEZENTRALSCHWEIZ 5CHF geschenkt auf ersten Einkauf
- Boost Initial Node sync mit UTXO Snapshots
https://blog.lopp.net/bitcoin-node-sync-with-utxo-snapshots/
- Bitcoin Alps
https://www.bitcoin-alps.ch/konferenz/
- Liana Wallet Anleitung/Review von Patrick
https://dezentralschweiz.ch/liana-die-besondere-multisig-wallet/
Song 11: Sandro
Bitcoin Anthem - Miss Bitcoin
Dezember
- Bitcoin Baden
- BAS GV im Dezember
- Wahl eines weiteren Board-mitglied
- Rahim Taghizadegan
- Abarbeitung div. Traktanden
- Abstimmung über 100k Initiative
https://static1.squarespace.com/static/5895d62d2994ca86b0cd9807/t/67503467c6aa4452cae00fcf/1733309544008/Bitcoin_Association_General_Assembly_07_12_2024.pdf
- BAS im Bundeshaus
https://www.finews.ch/news/finanzplatz/65619-bitcoin-association-switzerland-bas-sbf-bundeshaus-bitcoin-stablecoin-swiss-blockchain-federation-rahim-taghizadegan?utm_source=newsletter_5075&utm_medium=email&utm_campaign=finewsletter-vom-11-12-2024
- 100K Party BAS
Song 12: Nicolas
Headache Song - FM Rodeo
-
@ ea9e8563:5a82ed79
2025-01-01 12:01:55Originally Published 21.05.21
Bitcoin
Die erste, grösste und bekannteste Kryptowährung heisst Bitcoin. Das Netzwerk wurde 2009 von Satoshi Nakamoto veröffentlicht unter dem Vorwand das, dass Geldsystem völlig kaputt und veraltet ist und etwas Neues her muss. Nach dem Finanzcrash 2007 baute er fleissig an diesem „magischen Internet-Geld“ und löste ein wichtiges Problem: das Double Spending Problem. Das Problem war bis zu diesem Zeitpunkt, dass digitale Informationen, Daten und Zahlen einfach beliebig oft vermehrt oder geändert werden konnten, ohne sie von einer zentralen Organisation zu überwachen lassen. Und das war Satoshi ganz wichtig, weil eine zentrale Organisation früher oder später diese Macht für sich ausnutzen wird. Vor allem in der Geldgeschichte wurde praktisch jede zentral geregelte, auf einer beinahe unendlich leicht herstellbaren Währung oft missbraucht. Bitcoin läuft mittlerweile seit über 12 Jahren und das ohne Fehler. Wie Bitcoin funktioniert, werde ich aber in diesem Artikel nicht weiter behandeln. Aber schauen wir uns doch kurz an, wofür Bitcoin erschaffen wurde und welche Probleme noch bestehen.
Das Ziel von Bitcoin
Bitcoin ist das solideste Geld, was wir jemals hatten. Wir können mit absoluter Sicherheit sagen, dass es nie mehr als 21 Millionen Bitcoin geben wird. Dadurch ist Bitcoin deflationär. Durch die Blockchain werden die ganzen Transaktionen, die jemals gemacht wurden, abgespeichert. Das Problem ist jetzt aber, dass Bitcoin im Schnitt nur 7 Transaktionen pro Sekunde verarbeiten kann, weil die maximale Blockgrösse und somit die Anzahl der Transaktionen begrenzt ist. Wenn wir das jetzt mit den altbekannten Anbietern wie VISA und Mastercard vergleichen, können diese mehrere zehntausend Transaktionen pro Sekunde verarbeiten. Dies führt dazu, dass die Transaktionsgebühren relativ teuer werden, weil diese durch Angebot und Nachfrage bestimmt werden. Man kann sich Bitcoin also als Settlement Layer vorstellen, wie zum Beispiel FED Wire von der US-Zentralbank.
The Times 03/Jan/2009 Chancellor on brink of second bailout for banks.
*> - Satoshi Nakamoto
Ziele von Lightning
Lightning versucht die oben benannten Probleme zu lösen und sogar noch einige mehr. Auch werden neue Möglichkeiten geschaffen welche wir später noch genauer anschauen werden. Lightning ist ein Protokoll welches auf Bitcoin aufbaut, und ist völlig Open Source. Das heisst, theoretisch könnte man das LN (Lightning Netzwerk) auch auf anderen Kryptowährungen anwenden und benutzen. Zur Zeit geschieht dies aber noch nicht, weil die meisten anderen Kryptowährungen eher versuchen, diese Probleme auf dem Mainlayer zu lösen. Ob dies sinnvoll ist oder nicht lasse ich einfach mal so stehen. Als Ziele haben sich die Entwickler von Lightning und die Community verschiedenste Dinge gesetzt:
- P2P Netzwerk mit Zahlungskanälen zwischen den einzelnen Nutzern
- Routing über fremde Kanäle
- Skalierbarkeit von Bitcoin ausgleichen
- Geringe oder gar keine Netzwerkgebühren
- Hohe Privatsphäre
Wie Lightning entstanden ist
Man merkte schon relativ früh, dass man bei Bitcoin einige Probleme hat, wenn man damit einen Kaffee zahlen will. Die Transaktionsgebühren können da schnell mal höher als der Kaffee selbst sein. Dies ist natürlich nicht zielführend und ökonomisch kompletter Blödsinn. Deshalb machte man sich schon früh Gedanken, wie man dies verbessern könnte.
Es gibt drei Methoden, um dieses Problem zu lösen:
- Maximale Blockgrösse erhöhen (mehr Transaktionen)
- Zeit zwischen den Blöcken verkleinern
- Einführung eines Second Layer
Das Problem bei den ersten zwei Punkten ist, dass mit diesen Funktionen es sich viel schwieriger gestaltet ein eigene Node (Knotenpunkt) zu betreiben. Dieser Knotenpunkt müsste viel mehr Speicher haben als heute (ca. 300 GB) und würde somit mehr kosten. Auch müsste der Prozessor viel besser werden und somit mehr Energie verbrauchen, weil mehr Transaktionen validiert werden müssen. Weil es den Bitcoinern sehr wichtig ist, dass sie nicht auf andere vertrauen müssen, sondern alles selber verifizieren können.
Don’t trust, verify!
*> - bekanntes Bitcoin saying
Somit bleibt nur die Lösung eines Second Layers übrig. Auch wenn der Grossteil der Bitcoin Community für den Second Layer war, gab es ein kleines Lager, welches trotzdem für die Erhöhung der Blockgrösse war. So entstand Bitcoin Cash (BCH). Sie Forkten somit die Bitcoin Blockchain und es entstand ein neuer Abzweiger. Die Blockgrösse wurde von 1 MB auf 32 MB angehoben. Damit man den Second Layer mit Bitcoin verknüpfen konnte, musste noch das SegWit (Segregated-Withness) Update implementiert werden. Auch hier waren über 90 % der Bitcoin Community für ein Update, was ein Softfork bildete. Softforks sind nichts Schlechtes und sind eigentlich nur Software-Updates, welche Rückwärts kompatibel sind. Lightning wurde somit 2015 vorgestellt und 2018 veröffentlicht, auch wenn Lightning immer noch in den Kinderschuhen steckt, hat es ein Riesenpotenzial, vor allem wenn man sich anschaut wie schnell und gross das Netzwerk mittlerweile geworden ist.
Funktionsweise
Eines der wichtigsten Funktionen bei Lightning ist es, dass man Zahlungskanäle einrichtet, welche zwischen dir und dem Empfänger geöffnet werden. Das ausgeklügelte daran aber ist, dass man nicht zu jedem, dem man eine Transaktion schickt, auch einen Kanal offen haben muss. Aber schauen wir uns zuerst mal das Prinzip von einem einfachen Zahlungskanal an.
In diesem Beispiel haben Alice und Bob sich gegenseitig einen Zahlungskanal geöffnet, damit dies auch wirklich passiert, muss man Liquidität hinzufügen. Das Tolle daran ist, dass nicht unbedingt beide müssen oder nicht gleichviel hinzufügen müssen. Dies macht vor allem Sinn, wenn Alice ein Kaffee betreibt und Bob sich da jeden Morgen einen Kaffee holt. Somit muss Alice nie Geld zu Bob senden, aber Bob muss immer Geld zu Alice. In unserem Beispiel sind Alice und Bob Freunde und schicken sich gegenseitig immer wieder Geld. Bei der Eröffnung, also der Liquiditätseingabe, wird eine Transaktion auf der Bitcoin Blockchain zu einem Multi Signature Wallet gemacht. Dieses Wallet hat zwei Private Keys und kann nur geplündert werden, wenn beide dazu zustimmen. Das Geld wird also eingefroren. Durch eine Schnittstelle erkennt das Lightning Netzwerk das und ordnet die eingezahlten Gelder den beiden zu.
Mann kann sich vorstellen, dass innerhalb eines Zahlungskanals immer Geld hin und hergeschickt werden kann ohne Gebühren. Dies wird digital in einem Buchhaltungsähnlichen System gespeichert. Und am Ende kommt eine neue Balance heraus, welche mit der Schliessung des Channels wieder in den Mainlayer (also Bitcoin) implementiert wird. Dadurch können unendlich viele Transaktionen in maximal 4 Transaktionen auf der Bitcoin Blockchain dargestellt werden. Das absolut verrückte ist aber, dass 500 Transaktionen pro Sekunde durchgeführt werden können, in jedem Channel!
Routing von Transaktionen
Um nicht bei jeder kleinsten Transaktion einen neuen Channel erstellen zu, müssen gibt es noch eine weitere Möglichkeit Geld zu versenden. Dabei werden fremde Channels verwendet und eine Route wird von dir zu deinem Empfänger gesucht. Sobald diese Route gefunden ist, wird das Geld von Person zu Person vollautomatisch versendet. Als Gebühr für die Mitbenutzung der Fremden Channel bezahlt man eine kleine Gebühr, welche aber sehr klein ist und meist nur wenige Cent beträgt.
### Vorteile von Lightning
Das Lightning Netzwerk nutzt auch Bitcoin als Währung und ist somit ebenfalls extrem sicher und man kann garantieren das es nie mehr als 21 Millionen geben wird auf dem Lightning und Bitcoin-Netzwerk. Weil viele neue Möglichkeiten durch dieses schnelle Netzwerk geschaffen werden, wurde der Satoshi (1:100’000’000 Bitcoin) nochmal in eine kleinere Unterwährung aufgeteilt. Dabei wird 1 Satoshi in 1000 mSatoshis (mili) aufgeteilt. Ein weiterer Vorteil ist die Fehlende öffentliche Transaktionshistorie, damit ist die Privatsphäre extrem hoch und die Nachverfolgbarkeit extrem schwierig, vor allem wenn die Bezahlungen über mehrere Routing Hops (Sprünge) laufen. Man kann also sagen, dass Lightning Privacy per Default hat. Lightning ist dezentral und für jeden Menschen nutzbar, welcher es nutzen will.
Anwendungsbereiche
Mittlerweile gibt es schon extrem viele Bereiche wo Lightning angewendet wird um die Vorteile von der Blockchain und von Lightning allgemein zu nutzen, einige davon Werde ich euch nun vorstellen:
Fountain: Podcast Plattform
Fountain funktioniert im Prinzip wie jede andere grössere Podcastplattform wie zum Beispiel Spotify oder Apple Podcasts und viele mehr. Nicht nur für den Content Creator gibt es viele coole Features, sondern auch für den Nutzer. Zum Beispiel kann der Nutzer einstellen, wie viel Geld er zahlen will, um den Creator zu unterstützen, während er sich den Podcast anhört wird für die Zeit, die er hört ein Betrag abgebucht. Meiner Meinung ist dies ein extrem guter Weg, um vor allem kleine Podcasts zu monetisieren und guten Content zu fördern. Auch für den Nutzer ist diese Lösung ideal, weil man nur bezahlt, wenn man die Dienstleistung überhaupt benutzt. Des Weiteren gibt es viele "Neue" Features, die so bisher nur auf solchen "neuen" Podcast Plattformen zu finden sind. Zum Beispiel gibt es Kapitelmarken, referenzierte Musik-Tracks und Livestreams, und ausserdem kann man auch Kommentare hinterlassen, was die Interaktion zwischen Creator verbessert!
Strike: Cash App
Man kann sich Strike vorstellen wie Paypal nur mit dem entscheidenden unterschied, dass das ganze auf Bitcoin läuft. Strike ermöglicht es heute schon tausenden von Menschen auf einfachste Art und Weise Geld über die ganze Welt zu versenden und das mit dem solidesten Geld, was es überhaupt gibt, das schöne ist, dass die Werte auch wirklich verschickt werden. Hierzu ein kleiner Exkurs aus dem aktuellen Bankensystem: Wenn jemand aus Europa jemandem Geld in Amerika schicken will, verlässt das Geld das Land nicht. Man braucht für einen Internationalen Banktransfer immer einen Gegenspieler, welcher Geld aus Amerika nach Europa schicken möchte. Diesen Vorgang nennt man ’’Clearing’’. Meistens ist das kein Problem, da viele Transaktionen das Land verlassen aber auch kommen, aufgrund dieser Liquidität geht das zumindest in Industrieländern ganz gut. Entwicklungsländer haben hier schon eher Schwierigkeiten und werden Teilweise sogar aus dem Bankensystem ausgeschlossen (Siehe Iran Swift Sanctions) Ein weiterer Vorteil der sich durch Strike ergibt, ist das die Zahlungen fast keine Gebühren verursachen. Diese sind meist im Cent / Rappen Bereich.
Sphinx /Juggernout: Chat App
Die beiden Apps versuchen ein WhatsApp mit absoluter Privatsphäre zu bauen. Um dies zu erreichen wird die Channelfunktion von Lightning benutzt, weil diese nur von den zwei Parteien eingesehen werden kann und mit höchstmöglicher Privatsphäre durch die Blockchain gesichert wird. Diese Services kosten zwar etwas, aber mit der eigenen Lightning Node (Knotenpunkt) sind diese Kosten sehr gering und liegen ebenfalls im Cent / Rappen Bereich.
Edit: Spinx und Juggernout konnten sich bis anhin leider nie durchsetzen.
Originally Published 21.05.21
-
@ 300352ae:8be8c8b3
2025-01-01 11:54:49Rilatoj inter Prezidento Joe Biden kaj Vicprezidanto Kamala Harris laŭdire fariĝis pli malvarmaj post ŝia lastatempa elektoperdo, laŭ raporto. Fontoj proksimaj al ambaŭ gvidantoj indikas, ke privataj interagoj inter iliaj familioj estas pli streĉitaj kompare kun la komencaj tagoj de la administracio. Oni mencias, ke la malboniĝo en rilatoj estas aparte rimarkebla inter Unua Damo Jill Biden kaj Vicprezidanto Harris. Jill Biden laŭdire havis hezitojn pri Harris ekde la antaŭbalotdebatoj de 2020, kiam Harris kritikis Biden pro iliaj pasintaj sintenoj kontraŭ federaciaj transportadprogramoj celantaj malkomplezi lernejojn. Tiu kritiko havis personecan efikon sur Jill Biden, kontribuante al ŝia daŭra malkomforteco kun la vicprezidanto.
La raporto emfazas, ke la politikaj kaj personaj dinamikoj inter la du familioj fariĝis pli tensaj post la perdo de Harris en la prezidenta vetkuro. La privata etoso inter la Bidens kaj Harris kaj ŝia edzo Doug Emhoff foje estis malvarma, laŭ la raportoj. Prezidanto Biden laŭdire kredas, ke li povus esti venkinta la elekton, se li restus en la vetkuro. Tiu sento estis respegulita de iuj konsilistoj, kiuj argumentas, ke la sperto kaj sukceso de Biden, precipe lia venko kontraŭ Donald Trump en 2020, igus lin pli impona kandidato.
Laŭ aparta raporto, Biden private esprimis bedaŭron pro sia decido retiriĝi el la elekto de 2024. Kvankam li agnoskas erarojn en gvidado, li sentas, ke li devus resti en la vetkuro spite al la defioj, kiuj kondukis al lia retiro. La Blanka Domo reĝis tiujn raportojn, kun proparolanto substrekante, ke ambaŭ gvidantoj fokusas liveri rezultojn por usonaj familioj.
La decido de Biden retiriĝi en julio sekvis televidecan debaton kun Trump, kiu altiris kritikon kaj pliigis zorgojn pri lia aĝo kaj kognaj kapabloj. Li publike agnoskis, ke lia agado dum la debato estis nekontentiga, dirante, ke li “fuŝis”, ĉar li luktis por klare esprimi siajn politikojn. Tiu decido malfermis la vojon por Kamala Harris fariĝi la Demokrata kandidato, sed ŝi poste estis venkita de Trump en la novembro-elekto.
-
@ 300352ae:8be8c8b3
2025-01-01 11:49:08Rilatoj inter Prezidento Joe Biden kaj Vicprezidanto Kamala Harris laŭdire fariĝis pli malvarmaj post ŝia lastatempa elektoperdo, laŭ raporto. Fontoj proksimaj al ambaŭ gvidantoj indikas, ke privataj interagoj inter iliaj familioj estas pli streĉitaj kompare kun la komencaj tagoj de la administracio. Oni mencias, ke la malboniĝo en rilatoj estas aparte rimarkebla inter Unua Damo Jill Biden kaj Vicprezidanto Harris. Jill Biden laŭdire havis hezitojn pri Harris ekde la antaŭbalotdebatoj de 2020, kiam Harris kritikis Biden pro iliaj pasintaj sintenoj kontraŭ federaciaj transportadprogramoj celantaj malkomplezi lernejojn. Tiu kritiko havis personecan efikon sur Jill Biden, kontribuante al ŝia daŭra malkomforteco kun la vicprezidanto.
La raporto emfazas, ke la politikaj kaj personaj dinamikoj inter la du familioj fariĝis pli tensaj post la perdo de Harris en la prezidenta vetkuro. La privata etoso inter la Bidens kaj Harris kaj ŝia edzo Doug Emhoff foje estis malvarma, laŭ la raportoj. Prezidanto Biden laŭdire kredas, ke li povus esti venkinta la elekton, se li restus en la vetkuro. Tiu sento estis respegulita de iuj konsilistoj, kiuj argumentas, ke la sperto kaj sukceso de Biden, precipe lia venko kontraŭ Donald Trump en 2020, igus lin pli impona kandidato.
Laŭ aparta raporto, Biden private esprimis bedaŭron pro sia decido retiriĝi el la elekto de 2024. Kvankam li agnoskas erarojn en gvidado, li sentas, ke li devus resti en la vetkuro spite al la defioj, kiuj kondukis al lia retiro. La Blanka Domo reĝis tiujn raportojn, kun proparolanto substrekante, ke ambaŭ gvidantoj fokusas liveri rezultojn por usonaj familioj.
La decido de Biden retiriĝi en julio sekvis televidecan debaton kun Trump, kiu altiris kritikon kaj pliigis zorgojn pri lia aĝo kaj kognaj kapabloj. Li publike agnoskis, ke lia agado dum la debato estis nekontentiga, dirante, ke li “fuŝis”, ĉar li luktis por klare esprimi siajn politikojn. Tiu decido malfermis la vojon por Kamala Harris fariĝi la Demokrata kandidato, sed ŝi poste estis venkita de Trump en la novembro-elekto.
-
@ 0b118e40:4edc09cb
2025-01-01 11:13:04- It is ok to try and fail, so long as you learn from it and be better.
- Keep moving forward.
- Walk the talk.
- Empathy and self development is crucial.
- There is a difference between arrogance and confidence.
- Don't cheat people.
- Don't be lazy. Don't keep making excuses. It's a put off.
- If there is a problem, you can choose to talk about it or find means to fix it. The latter makes all the difference.
- Respect other people's time. Respect all people, regardless of ranks , status etc.
- Always be the best of the best. At least try to.
I am personally inspired by the day-to-day stories of hardworking individuals, ordinary people with extraordinary determination who find honest means of survival.
-
@ 5188521b:008eb518
2025-01-01 10:47:04My experience of daily posting on LinkedIn started around three years ago, when I became more serious about my coaching business. In that time, I amassed 25,000 followers and garnered around 3 million impressions on my writing.
It was a wild ride, but now it’s time to leave the theme park.
Reasons I Quit Posting on LinkedIn
Here they are, in no particular order:
- I went from coach to ghostwriter. 2024 threw up an unexpected career change. Since 2018, I've been a coach, moving from teaching English as a foreign language to working with groups of multilingual pro writers looking for better opportunities.
Coaching is a tough industry (maybe I'll write about that someday). My idea was to write more meaningful words and less copy to market my coaching business. Ultimately, writing to develop the Bitcoin ecosystem is what I find meaningful, and writing for hire doesn't require as much copywriting as being a coach.
With a solid portfolio, contacts, and profile, potential clients can see your results. You don't need to attract a ton of inbound leads by writing funny bits and wow-inducing educational posts on LinkedIn.
- Time constraints Because of my own book marketing, new client work, and projects like 21 Futures, I can't dedicate my creative efforts and several hours per week to writing on LinkedIn.
That time works better for me elsewhere.
- Worsening distribution 'Creators' (a.k.a. active posters with many followers) often say changes to the algorithm don't matter. 'Get on with it. Adapt and move forward.'
I'd be lying if I said I'm happy seeing statistics for my posts plummet. In 2022 and 2023, a successful carousel might net 20,000 views with over 150 likes and 50+ comments. Now, an exceptional post for me attracts 5,000 views with 50 likes.
I won't bore you with charts and statistics, but this is an average, based on hundreds of posts. It seems LinkedIn is reducing the reach of big accounts in favour of tighter networks and distributing the work of those with <5k followers. That's fine. Perhaps that will make the platform less showy, and less boastful, finally ridding us of fake stories, surprising hacks, and ultimate guides.
Still, It makes creative types like me feel like failures. Does an 80% decrease in distribution seem fair for the three years of daily effort I've put in? Should I keep struggling for diminishing returns? No. Creative people must seek the best return on investment for their time.
The lesson? Distribution is more important than follower numbers.
I've also quit Medium, where I have 2,000 followers and regularly receive single-digit reads on my posts.
- LinkedIn values machines over humans. Cost-cutting, extracting value, and planning for a robotic future. That's Microsoft's MO.
Despite being a social network with over 1 billion users, LinkedIn seemingly relies on automated support to make decisions on which content, people, and ideas are allowed on the platform.
Users' data is parsed without their express consent.\ LinkedIn seems desperate for us to use generative AI to express our 'insight'.\ We are constantly bombarded by LLM drivel and boring machine-made content. If you can't be bothered to write it, why should I bother to read it?
As somebody who brands himself a human-centric writer, why would I offer up personal takes and stories writing for free in an AI-filled swamp?
What's next?
So I'm giving up posting on LinkedIn.
With that said, it can still produce a great benefit for its users, especially those in the bitcoin space.
Why? The ability to search for potential connections, present your profile, and share your expertise can make a huge difference to your work - investment, partnership, and customers.
If you have a smaller network and have the need to share personal takes, opinions, and expertise, posting on LinkedIn is worth it. So few are doing this in bitcoin, the opportunities in 2025 are mind-boggling.
Next year, thousands of new startups and ventures will be vying for our attention. Those who can build trust and stay true to their message will win. And if LinkedIn stops working, you can always take your followers elsewhere.
If you have read and enjoyed my words here on LinkedIn in the last three years, thank you.
It has been a much-needed creative outlet and has brought me opportunities, laughs, knowledge, new colleagues, and friends. I'll still be stalking your posts and writing sarcastic comments.
Where can you find me:
Bitcoin writing - X, StackerNews 21futures.com\ NOSTR - npub12xy9yxej6s9hgzsn3rfyfc3xgtdr29wqlvulquzhz2fhqqywk5vqnyvqut),
Totallyhumanwriter.com - website coming soon.
Maximum Freedom, Minimum Bullshit on Substack.
And you can reach me via email at philipcharterauthor@gmail.com
I'm interested to know your thoughts and plans for 2025. Where will you be writing and why?
-
@ 59cb0748:9602464b
2025-01-01 06:15:09Nostrでお世話になっている方も、お世話になってない方も、こんにちは!
タコ頭大吉です!
NIP-23を使った初めての投稿です。
今回は、私がここ数ヶ月中にデザインをした三種類のビタキセケースの紹介記事になります!!
ビタキセを買ったもののあまり自分の好みに合う外観や仕様のケースがなく、いくつかプロトタイプを作りそれなりに時間をかけて考えたケース達です。
これら3シリーズに関しては、FDMタイプの3Dプリンタの精度、耐久性、出力後の作業性を考慮して一つのパーツで完結することに拘って設計をしました。
一定以上の充填率でプリントをすればそれなりに丈夫なはずです。
また、基本的に放熱性と保護性を両立できるように設計をしたつもります。
それぞれのモデルについて簡単に紹介をさせていただきますので、よろしければ各リポジトリに付属のREADMEを読んでいただいて自作、フィードバックをいただけましたら幸いです。
それでは、簡単に各モデルの紹介をさせていたきます。
AirLiftFrame
最初に作ったモデルです! 少し大きいのが難点ですが、分厚めのフレームをベースとし基盤周辺をあえて囲わない設計により、保護性と放熱を阻害しない事の両立を狙っています。
TwinAirLiftFrame
ビタキセを買い増ししたことにより、複数台をカッコよく運用したいという需要が自分の中に出てきたので、AirLiftFrameを2つくっつけたら良いのではと言うごくごく単純な発想でつくり始めたケースです。 しかし、ただ横並びにしただけでは廃熱が干渉するだけではなく、DCジャックやUSBポートへのアクセスが阻害されるという問題にすぐに気がつきました。 そこで、WebUI上でディスプレイの表示を上下反転出来ることに注目し、2台を上下逆向きに取り付ける事でそれらの問題を解決しました!
VoronoiShell
AirLiftFrameシリーズのサイズを小型化する事から始めたプロジョクトです。 縦横の寸法の削減だけではなく、厚みを薄くつくリたいという希望がありました。 所が単純に薄くすると、持った時に発熱する背面パーツに手が触れてしまったり、落下などでぶつかった際に背面パーツが破損する懸念がありました。 そこで、(当初は付けたくはなかった)背面保護用のグリルをデザインする必要が出てきました。 初めは多角形でしたがあまりにもダサく、調べている内にVoronoi柄という有機的なパターンに行き付き即採用しました。 結果、ビタキセを取り付けると柄が見えなくなるのが勿体無いぐらい個性的でスタイリッシュなデザインに仕上がりました。
いずれカスタム方法やインサートナットや増設ファンの選定方法等を紹介したいのですが、今回はNIP-23になれるという意図もあるので紹介に留めます! また、他の関連OSハードウェアプロジェクトのケースもデザインできたらと思っております!
今後ともタコ頭をよろしくお願いいたします。