-
@ 7f29628d:e160cccc
2025-01-07 11:50:30Der gut informierte Bürger denkt bei der Pandemie sofort an Intensivstationen, an die Bilder aus Bergamo und erinnert sich an die Berichterstattung damals – also muss es wohl ein Maximum gewesen sein. Manche Skeptiker behaupten jedoch das Gegenteil. Klarheit sollte ein Blick nach Wiesbaden, zum Statistischen Bundesamt, schaffen. Schließlich sitzen dort gut bezahlte Profis, die seit vielen Jahrzehnten die Sterbestatistik pflegen und veröffentlichen. Jeder Todesfall wird in Deutschland über die Standesämter exakt erfasst.
Doch die Überraschung: Das Statistische Bundesamt liefert uns auf diese einfache Frage zwei extrem unterschiedliche Antworten – ein Minimum und ein Maximum. Das Ergebnis hängt davon ab, wie tief man in die Veröffentlichungen des Bundesamtes eintaucht. Betrachtet man nur die Webseiten und Pressemitteilungen, erhält man den Eindruck eines Maximums. Schaut man jedoch etwas tiefer in die Tabellen und Rohdaten, zeigt sich plötzlich ein Minimum. Aber wie kann das sein? Beides gleichzeitig geht ja wohl kaum. Wer lügt hier – die Tabellen des Amtes oder die Pressemitteilungen? Gehen wir dieser Frage Schritt für Schritt auf den Grund.
2020: Ein historisches Maximum?
Schauen wir uns die vielen Hundert Veröffentlichungen des Statistischen Bundesamtes aus dieser Zeit an. Oder wir kürzen ab und fragen ChatGPT, da die KI auf diesen Daten trainiert wurde und das gesamte Material kennt. Die Frage an ChatGPT lautet also: Wie war das Sterbegeschehen im Jahr 2020 im Vergleich zu den Vorjahren?
ChatGPT antwortet: »Im Jahr 2020 war die Sterblichkeit in Deutschland höher als in den Jahren zuvor. Es gab eine Übersterblichkeit von etwa 982.000 Todesfällen, das sind rund 46.000 mehr als der Durchschnitt der Vorjahre (2016 bis 2019). Dieser Anstieg wurde überwiegend im Zusammenhang mit der COVID-19-Pandemie gesehen. Während die Sterbezahlen in den Vorjahren schwankten, war ein solch signifikanter Anstieg wie 2020 bisher nicht zu beobachten.«
Wir fragen konkreter: Ist es ein Fakt, dass wir eine so ernste Lage im Sterbegeschehen wie im Frühjahr 2020 noch nie erlebt haben?
ChatGPT bestätigt: »Ja, die COVID-19-Pandemie führte im Frühjahr 2020 zu einer außergewöhnlichen Situation im Sterbegeschehen in Deutschland. Die dramatische Übersterblichkeit, die ab der 13. Kalenderwoche auftrat, veranlasste das Statistische Bundesamt, besonders eindringliche Warnungen zu veröffentlichen. Der damalige Vizepräsident des Amtes und andere führende Stimmen wiesen öffentlich darauf hin, dass die Todesfallzahlen stark vom Durchschnitt abwichen. Diese klare Warnung richtete sich an die Öffentlichkeit und die Politik gleichermaßen. Die Medien berichteten intensiv über diese Warnungen, was das Bewusstsein für die Schwere der Pandemie erheblich schärfte. In den vergangenen Jahrzehnten hatte es keine vergleichbare Übersterblichkeit gegeben, die eine solch umfangreiche Kommunikation durch das Statistische Bundesamt erforderlich gemacht hätte.«
Ein gut informierter Zeitungsleser wird sich an dieser Stelle bestätigt fühlen: Ja, so war es damals. Ein Maximum im Sterbegeschehen – wegen der Pandemie. Oder etwa nicht?
2020: Ein historisches Minimum?
Tauchen wir in die Rohdaten des Statistischen Bundesamtes ein. Die Tabellen, die das Amt seit Jahrzehnten verlässlich veröffentlicht, nennen sich Sterbetafeln. Diese werden jährlich bereitgestellt und stehen auf der Website des Bundesamtes zum Download bereit. Ein erster Blick in die Sterbetafeln mag den Laien abschrecken, doch mit einer kurzen Erklärung wird alles verständlich. Wir gehen schrittweise vor.
Nehmen wir die Sterbetafel des Jahres 2017. Sie enthält zwei große Tabellen – eine für Männer und eine für Frauen. Jede Zeile der Tabelle steht für einen Jahrgang, zum Beispiel zeigt die Zeile 79 die Daten der 79-jährigen Männer. Besonders wichtig ist nun die zweite Spalte, in der der Wert 0,05 eingetragen ist. Das bedeutet, dass 5 Prozent der 79-jährigen Männer im Jahr 2017 verstorben sind. Das ist die wichtige Kennzahl. Wenn wir diesen exakten Wert, den man auch als Sterberate bezeichnet, nun in ein Säulendiagramm eintragen, erhalten wir eine leicht verständliche visuelle Darstellung (Grafik 1).
Es ist wichtig zu betonen, dass dieser Wert weder ein Schätzwert noch eine Modellrechnung oder Prognose ist, sondern ein exakter Messwert, basierend auf einer zuverlässigen Zählung. Sterberaten (für die Fachleute auch Sterbewahrscheinlichkeiten qx) sind seit Johann Peter Süßmilch (1707–1767) der Goldstandard der Sterbestatistik. Jeder Aktuar wird das bestätigen. Fügen wir nun die Sterberaten der 79-jährigen Männer aus den Jahren davor und danach hinzu, um das Gesamtbild zu sehen (Grafik 2). Und nun die entscheidende Frage: Zeigt das Jahr 2020 ein Maximum oder ein Minimum?
Ein kritischer Leser könnte vermuten, dass die 79-jährigen Männer eine Ausnahme darstellen und andere Jahrgänge im Jahr 2020 ein Maximum zeigen würden. Doch das trifft nicht zu. Kein einziger Jahrgang verzeichnete im Jahr 2020 ein Maximum. Im Gegenteil: Auch die 1-Jährigen, 2-Jährigen, 3-Jährigen, 9-Jährigen, 10-Jährigen, 15-Jährigen, 18-Jährigen und viele weitere männliche Jahrgänge hatten ihr Minimum im Jahr 2020. Dasselbe gilt bei den Frauen. Insgesamt hatten 31 Jahrgänge ihr Minimum im Jahr 2020. Wenn wir schließlich alle Jahrgänge in einer einzigen Grafik zusammenfassen, ergibt sich ein klares Bild: Das Minimum im Sterbegeschehen lag im Jahr 2020 (Grafik 3).
Ein kritischer Leser könnte nun wiederum vermuten, dass es innerhalb des Jahres 2020 möglicherweise starke Ausschläge nach oben bei einzelnen Jahrgängen gegeben haben könnte, die später durch Ausschläge nach unten ausgeglichen wurden – und dass diese Schwankungen in der jährlichen Übersicht nicht sichtbar sind. Doch auch das trifft nicht zu. Ein Blick auf die wöchentlichen Sterberaten zeigt, dass die ersten acht Monate der Pandemie keine nennenswerten Auffälligkeiten aufweisen. Es bleibt dabei: Die Rohdaten des Statistischen Bundesamtes bestätigen zweifelsfrei, dass die ersten acht Monate der Pandemie das historische Minimum im Sterbegeschehen darstellen. (Für die Fachleute sei angemerkt, dass im gleichen Zeitraum die Lebenserwartung die historischen Höchststände erreicht hatte – Grafik 4.)
So konstruierte das Amt aus einem Minimum ein Maximum:
Zur Erinnerung: Die Rohdaten des Statistischen Bundesamtes, die in den jährlichen Sterbetafeln zweifelsfrei dokumentiert sind, zeigen für das Jahr 2020 eindeutig ein Minimum im Sterbegeschehen. Aus diesen »in Stein gemeißelten« Zahlen ein Maximum zu »konstruieren«, ohne die Rohdaten selbst zu verändern, scheint auf den ersten Blick eine unlösbare Aufgabe. Jeder Student würde an einer solchen Herausforderung scheitern. Doch das Statistische Bundesamt hat einen kreativen Weg gefunden - ein Meisterstück gezielter Manipulation. In fünf Schritten zeigt sich, wie diese Täuschung der Öffentlichkeit umgesetzt wurde:
(1) Ignorieren der Sterberaten: Die präzisen, objektiven und leicht verständlichen Sterberaten aus den eigenen Sterbetafeln wurden konsequent ignoriert und verschwiegen. Diese Daten widersprachen dem gewünschten Narrativ und wurden daher gezielt ausgeklammert.
(2) Fokus auf absolute Todeszahlen: Die Aufmerksamkeit wurde stattdessen auf die absolute Zahl der Todesfälle gelenkt. Diese wirkt allein durch ihre schiere Größe dramatisch und emotionalisiert die Diskussion. Ein entscheidender Faktor wurde dabei ignoriert: Die absolute Zahl der Todesfälle steigt aufgrund der demografischen Entwicklung jedes Jahr an. Viele Menschen verstehen diesen Zusammenhang nicht und verbinden die steigenden Zahlen fälschlicherweise mit der vermeintlichen Pandemie.
(3) Einführung der Übersterblichkeit als neue Kennzahl: Erst ab Beginn der „Pandemie“ wurde die Kennzahl "Übersterblichkeit" eingeführt – und dies mit einer fragwürdigen Methode, die systematisch überhöhte Werte lieferte. Diese Kennzahl wurde regelmäßig, oft monatlich oder sogar wöchentlich, berechnet und diente als ständige Grundlage für alarmierende Schlagzeilen.
(4) Intensive Öffentlichkeitsarbeit: Durch eine breit angelegte Kampagne wurden die manipulativen Kennzahlen gezielt in den Fokus gerückt. Pressemitteilungen, Podcasts und öffentliche Auftritte konzentrierten sich fast ausschließlich auf die absoluten Todeszahlen und die Übersterblichkeit. Ziel war es, den Eindruck einer dramatischen Situation in der Öffentlichkeit zu verstärken.
(5) Bekämpfen kritischer Stimmen: Kritiker, die die Schwächen und manipulativen Aspekte dieser Methoden aufdeckten, wurden systematisch diskreditiert. Ihre Glaubwürdigkeit und Kompetenz wurden öffentlich infrage gestellt, um das sorgsam konstruierte Narrativ zu schützen.
Ohne diesen begleitenden Statistik-Betrug wäre das gesamte Pandemie-Theater meiner Meinung nach nicht möglich gewesen. Wer aus einem faktischen Minimum ein scheinbares Maximum "erschafft", handelt betrügerisch. Die Folgen dieses Betruges sind gravierend. Denken wir an die Angst, die in der Bevölkerung geschürt wurde – die Angst, bald sterben zu müssen. Denken wir an Masken, Abstandsregeln, isolierte ältere Menschen, Kinderimpfungen und all die Maßnahmen, die unter anderem auf diese falsche Statistik zurückgehen.
Wollen wir Bürger uns das gefallen lassen?
Wenn wir als Bürger zulassen, dass ein derart offensichtlicher und nachprüfbarer Täuschungsversuch ohne Konsequenzen bleibt, dann gefährdet das nicht nur die Integrität unserer Institutionen – es untergräbt das Fundament unserer Gesellschaft. In der DDR feierte man öffentlich Planerfüllung und Übererfüllung, während die Regale leer blieben. Damals wusste jeder: Statistik war ein Propagandainstrument. Niemand traute den Zahlen, die das Staatsfernsehen verkündete.
Während der Pandemie war es anders. Die Menschen vertrauten den Mitteilungen des Statistischen Bundesamtes und des RKI – blind. Die Enthüllungen durch den "RKI-Leak" haben gezeigt, dass auch das Robert-Koch-Institut nicht der Wissenschaft, sondern den Weisungen des Gesundheitsministers und militärischen Vorgaben folgte. Warum sollte es beim Statistischen Bundesamt anders gewesen sein? Diese Behörde ist dem Innenministerium unterstellt und somit ebenfalls weisungsgebunden.
Die Beweise für Täuschung liegen offen zutage. Es braucht keinen Whistleblower, keine geheimen Enthüllungen: Die Rohdaten des Statistischen Bundesamtes sprechen für sich. Sie sind öffentlich einsehbar – klar und unmissverständlich. Die Daten, die Tabellen, die Veröffentlichungen des Amtes selbst – sie sind die Anklageschrift. Sie zeigen, was wirklich war. Nicht mehr und nicht weniger.
Und wir? Was tun wir? Schweigen wir? Oder fordern wir endlich ein, was unser Recht ist? Wir Bürger dürfen das nicht hinnehmen. Es ist Zeit, unsere Behörden zur Rechenschaft zu ziehen. Diese Institutionen arbeiten nicht für sich – sie arbeiten für uns. Wir finanzieren sie, und wir haben das Recht, Transparenz und Verantwortung einzufordern. Manipulationen wie diese müssen aufgearbeitet werden und dürfen nie wieder geschehen. Die Strukturen, die solche Fehlentwicklungen in unseren Behörden ermöglicht haben, müssen offengelegt werden. Denn eine Demokratie lebt von Vertrauen – und Vertrauen muss verdient werden. Jeden Tag aufs Neue.
.
.
MARCEL BARZ, Jahrgang 1975, war Offizier der Bundeswehr und studierte Wirtschafts- und Organisationswissenschaften sowie Wirtschaftsinformatik. Er war Gründer und Geschäftsführer einer Softwarefirma, die sich auf Datenanalyse und Softwareentwicklung spezialisiert hatte. Im August 2021 veröffentlichte Barz den Videovortrag »Die Pandemie in den Rohdaten«, der über eine Million Aufrufe erzielte. Seitdem macht er als "Erbsenzähler" auf Widersprüche in amtlichen Statistiken aufmerksam.
-
@ eac63075:b4988b48
2025-01-04 19:41:34Since its creation in 2009, Bitcoin has symbolized innovation and resilience. However, from time to time, alarmist narratives arise about emerging technologies that could "break" its security. Among these, quantum computing stands out as one of the most recurrent. But does quantum computing truly threaten Bitcoin? And more importantly, what is the community doing to ensure the protocol remains invulnerable?
The answer, contrary to sensationalist headlines, is reassuring: Bitcoin is secure, and the community is already preparing for a future where quantum computing becomes a practical reality. Let’s dive into this topic to understand why the concerns are exaggerated and how the development of BIP-360 demonstrates that Bitcoin is one step ahead.
What Is Quantum Computing, and Why Is Bitcoin Not Threatened?
Quantum computing leverages principles of quantum mechanics to perform calculations that, in theory, could exponentially surpass classical computers—and it has nothing to do with what so-called “quantum coaches” teach to scam the uninformed. One of the concerns is that this technology could compromise two key aspects of Bitcoin’s security:
- Wallets: These use elliptic curve algorithms (ECDSA) to protect private keys. A sufficiently powerful quantum computer could deduce a private key from its public key.
- Mining: This is based on the SHA-256 algorithm, which secures the consensus process. A quantum attack could, in theory, compromise the proof-of-work mechanism.
Understanding Quantum Computing’s Attack Priorities
While quantum computing is often presented as a threat to Bitcoin, not all parts of the network are equally vulnerable. Theoretical attacks would be prioritized based on two main factors: ease of execution and potential reward. This creates two categories of attacks:
1. Attacks on Wallets
Bitcoin wallets, secured by elliptic curve algorithms, would be the initial targets due to the relative vulnerability of their public keys, especially those already exposed on the blockchain. Two attack scenarios stand out:
-
Short-term attacks: These occur during the interval between sending a transaction and its inclusion in a block (approximately 10 minutes). A quantum computer could intercept the exposed public key and derive the corresponding private key to redirect funds by creating a transaction with higher fees.
-
Long-term attacks: These focus on old wallets whose public keys are permanently exposed. Wallets associated with Satoshi Nakamoto, for example, are especially vulnerable because they were created before the practice of using hashes to mask public keys.
We can infer a priority order for how such attacks might occur based on urgency and importance.
Bitcoin Quantum Attack: Prioritization Matrix (Urgency vs. Importance)
2. Attacks on Mining
Targeting the SHA-256 algorithm, which secures the mining process, would be the next objective. However, this is far more complex and requires a level of quantum computational power that is currently non-existent and far from realization. A successful attack would allow for the recalculation of all possible hashes to dominate the consensus process and potentially "mine" it instantly.
Satoshi Nakamoto in 2010 on Quantum Computing and Bitcoin Attacks
Recently, Narcelio asked me about a statement I made on Tubacast:
https://x.com/eddieoz/status/1868371296683511969
If an attack became a reality before Bitcoin was prepared, it would be necessary to define the last block prior to the attack and proceed from there using a new hashing algorithm. The solution would resemble the response to the infamous 2013 bug. It’s a fact that this would cause market panic, and Bitcoin's price would drop significantly, creating a potential opportunity for the well-informed.
Preferably, if developers could anticipate the threat and had time to work on a solution and build consensus before an attack, they would simply decide on a future block for the fork, which would then adopt the new algorithm. It might even rehash previous blocks (reaching consensus on them) to avoid potential reorganization through the re-mining of blocks using the old hash. (I often use the term "shielding" old transactions).
How Can Users Protect Themselves?
While quantum computing is still far from being a practical threat, some simple measures can already protect users against hypothetical scenarios:
- Avoid using exposed public keys: Ensure funds sent to old wallets are transferred to new ones that use public key hashes. This reduces the risk of long-term attacks.
- Use modern wallets: Opt for wallets compatible with SegWit or Taproot, which implement better security practices.
- Monitor security updates: Stay informed about updates from the Bitcoin community, such as the implementation of BIP-360, which will introduce quantum-resistant addresses.
- Do not reuse addresses: Every transaction should be associated with a new address to minimize the risk of repeated exposure of the same public key.
- Adopt secure backup practices: Create offline backups of private keys and seeds in secure locations, protected from unauthorized access.
BIP-360 and Bitcoin’s Preparation for the Future
Even though quantum computing is still beyond practical reach, the Bitcoin community is not standing still. A concrete example is BIP-360, a proposal that establishes the technical framework to make wallets resistant to quantum attacks.
BIP-360 addresses three main pillars:
- Introduction of quantum-resistant addresses: A new address format starting with "BC1R" will be used. These addresses will be compatible with post-quantum algorithms, ensuring that stored funds are protected from future attacks.
- Compatibility with the current ecosystem: The proposal allows users to transfer funds from old addresses to new ones without requiring drastic changes to the network infrastructure.
- Flexibility for future updates: BIP-360 does not limit the choice of specific algorithms. Instead, it serves as a foundation for implementing new post-quantum algorithms as technology evolves.
This proposal demonstrates how Bitcoin can adapt to emerging threats without compromising its decentralized structure.
Post-Quantum Algorithms: The Future of Bitcoin Cryptography
The community is exploring various algorithms to protect Bitcoin from quantum attacks. Among the most discussed are:
- Falcon: A solution combining smaller public keys with compact digital signatures. Although it has been tested in limited scenarios, it still faces scalability and performance challenges.
- Sphincs: Hash-based, this algorithm is renowned for its resilience, but its signatures can be extremely large, making it less efficient for networks like Bitcoin’s blockchain.
- Lamport: Created in 1977, it’s considered one of the earliest post-quantum security solutions. Despite its reliability, its gigantic public keys (16,000 bytes) make it impractical and costly for Bitcoin.
Two technologies show great promise and are well-regarded by the community:
- Lattice-Based Cryptography: Considered one of the most promising, it uses complex mathematical structures to create systems nearly immune to quantum computing. Its implementation is still in its early stages, but the community is optimistic.
- Supersingular Elliptic Curve Isogeny: These are very recent digital signature algorithms and require extensive study and testing before being ready for practical market use.
The final choice of algorithm will depend on factors such as efficiency, cost, and integration capability with the current system. Additionally, it is preferable that these algorithms are standardized before implementation, a process that may take up to 10 years.
Why Quantum Computing Is Far from Being a Threat
The alarmist narrative about quantum computing overlooks the technical and practical challenges that still need to be overcome. Among them:
- Insufficient number of qubits: Current quantum computers have only a few hundred qubits, whereas successful attacks would require millions.
- High error rate: Quantum stability remains a barrier to reliable large-scale operations.
- High costs: Building and operating large-scale quantum computers requires massive investments, limiting their use to scientific or specific applications.
Moreover, even if quantum computers make significant advancements, Bitcoin is already adapting to ensure its infrastructure is prepared to respond.
Conclusion: Bitcoin’s Secure Future
Despite advancements in quantum computing, the reality is that Bitcoin is far from being threatened. Its security is ensured not only by its robust architecture but also by the community’s constant efforts to anticipate and mitigate challenges.
The implementation of BIP-360 and the pursuit of post-quantum algorithms demonstrate that Bitcoin is not only resilient but also proactive. By adopting practical measures, such as using modern wallets and migrating to quantum-resistant addresses, users can further protect themselves against potential threats.
Bitcoin’s future is not at risk—it is being carefully shaped to withstand any emerging technology, including quantum computing.
-
@ eac63075:b4988b48
2024-11-09 17:57:27Based on a recent paper that included collaboration from renowned experts such as Lynn Alden, Steve Lee, and Ren Crypto Fish, we discuss in depth how Bitcoin's consensus is built, the main risks, and the complex dynamics of protocol upgrades.
Podcast https://www.fountain.fm/episode/wbjD6ntQuvX5u2G5BccC
Presentation https://gamma.app/docs/Analyzing-Bitcoin-Consensus-Risks-in-Protocol-Upgrades-p66axxjwaa37ksn
1. Introduction to Consensus in Bitcoin
Consensus in Bitcoin is the foundation that keeps the network secure and functional, allowing users worldwide to perform transactions in a decentralized manner without the need for intermediaries. Since its launch in 2009, Bitcoin is often described as an "immutable" system designed to resist changes, and it is precisely this resistance that ensures its security and stability.
The central idea behind consensus in Bitcoin is to create a set of acceptance rules for blocks and transactions, ensuring that all network participants agree on the transaction history. This prevents "double-spending," where the same bitcoin could be used in two simultaneous transactions, something that would compromise trust in the network.
Evolution of Consensus in Bitcoin
Over the years, consensus in Bitcoin has undergone several adaptations, and the way participants agree on changes remains a delicate process. Unlike traditional systems, where changes can be imposed from the top down, Bitcoin operates in a decentralized model where any significant change needs the support of various groups of stakeholders, including miners, developers, users, and large node operators.
Moreover, the update process is extremely cautious, as hasty changes can compromise the network's security. As a result, the philosophy of "don't fix what isn't broken" prevails, with improvements happening incrementally and only after broad consensus among those involved. This model can make progress seem slow but ensures that Bitcoin remains faithful to the principles of security and decentralization.
2. Technical Components of Consensus
Bitcoin's consensus is supported by a set of technical rules that determine what is considered a valid transaction and a valid block on the network. These technical aspects ensure that all nodes—the computers that participate in the Bitcoin network—agree on the current state of the blockchain. Below are the main technical components that form the basis of the consensus.
Validation of Blocks and Transactions
The validation of blocks and transactions is the central point of consensus in Bitcoin. A block is only considered valid if it meets certain criteria, such as maximum size, transaction structure, and the solving of the "Proof of Work" problem. The proof of work, required for a block to be included in the blockchain, is a computational process that ensures the block contains significant computational effort—protecting the network against manipulation attempts.
Transactions, in turn, need to follow specific input and output rules. Each transaction includes cryptographic signatures that prove the ownership of the bitcoins sent, as well as validation scripts that verify if the transaction conditions are met. This validation system is essential for network nodes to autonomously confirm that each transaction follows the rules.
Chain Selection
Another fundamental technical issue for Bitcoin's consensus is chain selection, which becomes especially important in cases where multiple versions of the blockchain coexist, such as after a network split (fork). To decide which chain is the "true" one and should be followed, the network adopts the criterion of the highest accumulated proof of work. In other words, the chain with the highest number of valid blocks, built with the greatest computational effort, is chosen by the network as the official one.
This criterion avoids permanent splits because it encourages all nodes to follow the same main chain, reinforcing consensus.
Soft Forks vs. Hard Forks
In the consensus process, protocol changes can happen in two ways: through soft forks or hard forks. These variations affect not only the protocol update but also the implications for network users:
-
Soft Forks: These are changes that are backward compatible. Only nodes that adopt the new update will follow the new rules, but old nodes will still recognize the blocks produced with these rules as valid. This compatibility makes soft forks a safer option for updates, as it minimizes the risk of network division.
-
Hard Forks: These are updates that are not backward compatible, requiring all nodes to update to the new version or risk being separated from the main chain. Hard forks can result in the creation of a new coin, as occurred with the split between Bitcoin and Bitcoin Cash in 2017. While hard forks allow for deeper changes, they also bring significant risks of network fragmentation.
These technical components form the base of Bitcoin's security and resilience, allowing the system to remain functional and immutable without losing the necessary flexibility to evolve over time.
3. Stakeholders in Bitcoin's Consensus
Consensus in Bitcoin is not decided centrally. On the contrary, it depends on the interaction between different groups of stakeholders, each with their motivations, interests, and levels of influence. These groups play fundamental roles in how changes are implemented or rejected on the network. Below, we explore the six main stakeholders in Bitcoin's consensus.
1. Economic Nodes
Economic nodes, usually operated by exchanges, custody providers, and large companies that accept Bitcoin, exert significant influence over consensus. Because they handle large volumes of transactions and act as a connection point between the Bitcoin ecosystem and the traditional financial system, these nodes have the power to validate or reject blocks and to define which version of the software to follow in case of a fork.
Their influence is proportional to the volume of transactions they handle, and they can directly affect which chain will be seen as the main one. Their incentive is to maintain the network's stability and security to preserve its functionality and meet regulatory requirements.
2. Investors
Investors, including large institutional funds and individual Bitcoin holders, influence consensus indirectly through their impact on the asset's price. Their buying and selling actions can affect Bitcoin's value, which in turn influences the motivation of miners and other stakeholders to continue investing in the network's security and development.
Some institutional investors have agreements with custodians that may limit their ability to act in network split situations. Thus, the impact of each investor on consensus can vary based on their ownership structure and how quickly they can react to a network change.
3. Media Influencers
Media influencers, including journalists, analysts, and popular personalities on social media, have a powerful role in shaping public opinion about Bitcoin and possible updates. These influencers can help educate the public, promote debates, and bring transparency to the consensus process.
On the other hand, the impact of influencers can be double-edged: while they can clarify complex topics, they can also distort perceptions by amplifying or minimizing change proposals. This makes them a force both of support and resistance to consensus.
4. Miners
Miners are responsible for validating transactions and including blocks in the blockchain. Through computational power (hashrate), they also exert significant influence over consensus decisions. In update processes, miners often signal their support for a proposal, indicating that the new version is safe to use. However, this signaling is not always definitive, and miners can change their position if they deem it necessary.
Their incentive is to maximize returns from block rewards and transaction fees, as well as to maintain the value of investments in their specialized equipment, which are only profitable if the network remains stable.
5. Protocol Developers
Protocol developers, often called "Core Developers," are responsible for writing and maintaining Bitcoin's code. Although they do not have direct power over consensus, they possess an informal veto power since they decide which changes are included in the main client (Bitcoin Core). This group also serves as an important source of technical knowledge, helping guide decisions and inform other stakeholders.
Their incentive lies in the continuous improvement of the network, ensuring security and decentralization. Many developers are funded by grants and sponsorships, but their motivations generally include a strong ideological commitment to Bitcoin's principles.
6. Users and Application Developers
This group includes people who use Bitcoin in their daily transactions and developers who build solutions based on the network, such as wallets, exchanges, and payment platforms. Although their power in consensus is less than that of miners or economic nodes, they play an important role because they are responsible for popularizing Bitcoin's use and expanding the ecosystem.
If application developers decide not to adopt an update, this can affect compatibility and widespread acceptance. Thus, they indirectly influence consensus by deciding which version of the protocol to follow in their applications.
These stakeholders are vital to the consensus process, and each group exerts influence according to their involvement, incentives, and ability to act in situations of change. Understanding the role of each makes it clearer how consensus is formed and why it is so difficult to make significant changes to Bitcoin.
4. Mechanisms for Activating Updates in Bitcoin
For Bitcoin to evolve without compromising security and consensus, different mechanisms for activating updates have been developed over the years. These mechanisms help coordinate changes among network nodes to minimize the risk of fragmentation and ensure that updates are implemented in an orderly manner. Here, we explore some of the main methods used in Bitcoin, their advantages and disadvantages, as well as historical examples of significant updates.
Flag Day
The Flag Day mechanism is one of the simplest forms of activating changes. In it, a specific date or block is determined as the activation moment, and all nodes must be updated by that point. This method does not involve prior signaling; participants simply need to update to the new software version by the established day or block.
-
Advantages: Simplicity and predictability are the main benefits of Flag Day, as everyone knows the exact activation date.
-
Disadvantages: Inflexibility can be a problem because there is no way to adjust the schedule if a significant part of the network has not updated. This can result in network splits if a significant number of nodes are not ready for the update.
An example of Flag Day was the Pay to Script Hash (P2SH) update in 2012, which required all nodes to adopt the change to avoid compatibility issues.
BIP34 and BIP9
BIP34 introduced a more dynamic process, in which miners increase the version number in block headers to signal the update. When a predetermined percentage of the last blocks is mined with this new version, the update is automatically activated. This model later evolved with BIP9, which allowed multiple updates to be signaled simultaneously through "version bits," each corresponding to a specific change.
-
Advantages: Allows the network to activate updates gradually, giving more time for participants to adapt.
-
Disadvantages: These methods rely heavily on miner support, which means that if a sufficient number of miners do not signal the update, it can be delayed or not implemented.
BIP9 was used in the activation of SegWit (BIP141) but faced challenges because some miners did not signal their intent to activate, leading to the development of new mechanisms.
User Activated Soft Forks (UASF) and User Resisted Soft Forks (URSF)
To increase the decision-making power of ordinary users, the concept of User Activated Soft Fork (UASF) was introduced, allowing node operators, not just miners, to determine consensus for a change. In this model, nodes set a date to start rejecting blocks that are not in compliance with the new update, forcing miners to adapt or risk having their blocks rejected by the network.
URSF, in turn, is a model where nodes reject blocks that attempt to adopt a specific update, functioning as resistance against proposed changes.
-
Advantages: UASF returns decision-making power to node operators, ensuring that changes do not depend solely on miners.
-
Disadvantages: Both UASF and URSF can generate network splits, especially in cases of strong opposition among different stakeholders.
An example of UASF was the activation of SegWit in 2017, where users supported activation independently of miner signaling, which ended up forcing its adoption.
BIP8 (LOT=True)
BIP8 is an evolution of BIP9, designed to prevent miners from indefinitely blocking a change desired by the majority of users and developers. BIP8 allows setting a parameter called "lockinontimeout" (LOT) as true, which means that if the update has not been fully signaled by a certain point, it is automatically activated.
-
Advantages: Ensures that changes with broad support among users are not blocked by miners who wish to maintain the status quo.
-
Disadvantages: Can lead to network splits if miners or other important stakeholders do not support the update.
Although BIP8 with LOT=True has not yet been used in Bitcoin, it is a proposal that can be applied in future updates if necessary.
These activation mechanisms have been essential for Bitcoin's development, allowing updates that keep the network secure and functional. Each method brings its own advantages and challenges, but all share the goal of preserving consensus and network cohesion.
5. Risks and Considerations in Consensus Updates
Consensus updates in Bitcoin are complex processes that involve not only technical aspects but also political, economic, and social considerations. Due to the network's decentralized nature, each change brings with it a set of risks that need to be carefully assessed. Below, we explore some of the main challenges and future scenarios, as well as the possible impacts on stakeholders.
Network Fragility with Alternative Implementations
One of the main risks associated with consensus updates is the possibility of network fragmentation when there are alternative software implementations. If an update is implemented by a significant group of nodes but rejected by others, a network split (fork) can occur. This creates two competing chains, each with a different version of the transaction history, leading to unpredictable consequences for users and investors.
Such fragmentation weakens Bitcoin because, by dividing hashing power (computing) and coin value, it reduces network security and investor confidence. A notable example of this risk was the fork that gave rise to Bitcoin Cash in 2017 when disagreements over block size resulted in a new chain and a new asset.
Chain Splits and Impact on Stakeholders
Chain splits are a significant risk in update processes, especially in hard forks. During a hard fork, the network is split into two separate chains, each with its own set of rules. This results in the creation of a new coin and leaves users with duplicated assets on both chains. While this may seem advantageous, in the long run, these splits weaken the network and create uncertainties for investors.
Each group of stakeholders reacts differently to a chain split:
-
Institutional Investors and ETFs: Face regulatory and compliance challenges because many of these assets are managed under strict regulations. The creation of a new coin requires decisions to be made quickly to avoid potential losses, which may be hampered by regulatory constraints.
-
Miners: May be incentivized to shift their computing power to the chain that offers higher profitability, which can weaken one of the networks.
-
Economic Nodes: Such as major exchanges and custody providers, have to quickly choose which chain to support, influencing the perceived value of each network.
Such divisions can generate uncertainties and loss of value, especially for institutional investors and those who use Bitcoin as a store of value.
Regulatory Impacts and Institutional Investors
With the growing presence of institutional investors in Bitcoin, consensus changes face new compliance challenges. Bitcoin ETFs, for example, are required to follow strict rules about which assets they can include and how chain split events should be handled. The creation of a new asset or migration to a new chain can complicate these processes, creating pressure for large financial players to quickly choose a chain, affecting the stability of consensus.
Moreover, decisions regarding forks can influence the Bitcoin futures and derivatives market, affecting perception and adoption by new investors. Therefore, the need to avoid splits and maintain cohesion is crucial to attract and preserve the confidence of these investors.
Security Considerations in Soft Forks and Hard Forks
While soft forks are generally preferred in Bitcoin for their backward compatibility, they are not without risks. Soft forks can create different classes of nodes on the network (updated and non-updated), which increases operational complexity and can ultimately weaken consensus cohesion. In a network scenario with fragmentation of node classes, Bitcoin's security can be affected, as some nodes may lose part of the visibility over updated transactions or rules.
In hard forks, the security risk is even more evident because all nodes need to adopt the new update to avoid network division. Experience shows that abrupt changes can create temporary vulnerabilities, in which malicious agents try to exploit the transition to attack the network.
Bounty Claim Risks and Attack Scenarios
Another risk in consensus updates are so-called "bounty claims"—accumulated rewards that can be obtained if an attacker manages to split or deceive a part of the network. In a conflict scenario, a group of miners or nodes could be incentivized to support a new update or create an alternative version of the software to benefit from these rewards.
These risks require stakeholders to carefully assess each update and the potential vulnerabilities it may introduce. The possibility of "bounty claims" adds a layer of complexity to consensus because each interest group may see a financial opportunity in a change that, in the long term, may harm network stability.
The risks discussed above show the complexity of consensus in Bitcoin and the importance of approaching it gradually and deliberately. Updates need to consider not only technical aspects but also economic and social implications, in order to preserve Bitcoin's integrity and maintain trust among stakeholders.
6. Recommendations for the Consensus Process in Bitcoin
To ensure that protocol changes in Bitcoin are implemented safely and with broad support, it is essential that all stakeholders adopt a careful and coordinated approach. Here are strategic recommendations for evaluating, supporting, or rejecting consensus updates, considering the risks and challenges discussed earlier, along with best practices for successful implementation.
1. Careful Evaluation of Proposal Maturity
Stakeholders should rigorously assess the maturity level of a proposal before supporting its implementation. Updates that are still experimental or lack a robust technical foundation can expose the network to unnecessary risks. Ideally, change proposals should go through an extensive testing phase, have security audits, and receive review and feedback from various developers and experts.
2. Extensive Testing in Secure and Compatible Networks
Before an update is activated on the mainnet, it is essential to test it on networks like testnet and signet, and whenever possible, on other compatible networks that offer a safe and controlled environment to identify potential issues. Testing on networks like Litecoin was fundamental for the safe launch of innovations like SegWit and the Lightning Network, allowing functionalities to be validated on a lower-impact network before being implemented on Bitcoin.
The Liquid Network, developed by Blockstream, also plays an important role as an experimental network for new proposals, such as OP_CAT. By adopting these testing environments, stakeholders can mitigate risks and ensure that the update is reliable and secure before being adopted by the main network.
3. Importance of Stakeholder Engagement
The success of a consensus update strongly depends on the active participation of all stakeholders. This includes economic nodes, miners, protocol developers, investors, and end users. Lack of participation can lead to inadequate decisions or even future network splits, which would compromise Bitcoin's security and stability.
4. Key Questions for Evaluating Consensus Proposals
To assist in decision-making, each group of stakeholders should consider some key questions before supporting a consensus change:
- Does the proposal offer tangible benefits for Bitcoin's security, scalability, or usability?
- Does it maintain backward compatibility or introduce the risk of network split?
- Are the implementation requirements clear and feasible for each group involved?
- Are there clear and aligned incentives for all stakeholder groups to accept the change?
5. Coordination and Timing in Implementations
Timing is crucial. Updates with short activation windows can force a split because not all nodes and miners can update simultaneously. Changes should be planned with ample deadlines to allow all stakeholders to adjust their systems, avoiding surprises that could lead to fragmentation.
Mechanisms like soft forks are generally preferable to hard forks because they allow a smoother transition. Opting for backward-compatible updates when possible facilitates the process and ensures that nodes and miners can adapt without pressure.
6. Continuous Monitoring and Re-evaluation
After an update, it's essential to monitor the network to identify problems or side effects. This continuous process helps ensure cohesion and trust among all participants, keeping Bitcoin as a secure and robust network.
These recommendations, including the use of secure networks for extensive testing, promote a collaborative and secure environment for Bitcoin's consensus process. By adopting a deliberate and strategic approach, stakeholders can preserve Bitcoin's value as a decentralized and censorship-resistant network.
7. Conclusion
Consensus in Bitcoin is more than a set of rules; it's the foundation that sustains the network as a decentralized, secure, and reliable system. Unlike centralized systems, where decisions can be made quickly, Bitcoin requires a much more deliberate and cooperative approach, where the interests of miners, economic nodes, developers, investors, and users must be considered and harmonized. This governance model may seem slow, but it is fundamental to preserving the resilience and trust that make Bitcoin a global store of value and censorship-resistant.
Consensus updates in Bitcoin must balance the need for innovation with the preservation of the network's core principles. The development process of a proposal needs to be detailed and rigorous, going through several testing stages, such as in testnet, signet, and compatible networks like Litecoin and Liquid Network. These networks offer safe environments for proposals to be analyzed and improved before being launched on the main network.
Each proposed change must be carefully evaluated regarding its maturity, impact, backward compatibility, and support among stakeholders. The recommended key questions and appropriate timing are critical to ensure that an update is adopted without compromising network cohesion. It's also essential that the implementation process is continuously monitored and re-evaluated, allowing adjustments as necessary and minimizing the risk of instability.
By following these guidelines, Bitcoin's stakeholders can ensure that the network continues to evolve safely and robustly, maintaining user trust and further solidifying its role as one of the most resilient and innovative digital assets in the world. Ultimately, consensus in Bitcoin is not just a technical issue but a reflection of its community and the values it represents: security, decentralization, and resilience.
8. Links
Whitepaper: https://github.com/bitcoin-cap/bcap
Youtube (pt-br): https://www.youtube.com/watch?v=rARycAibl9o&list=PL-qnhF0qlSPkfhorqsREuIu4UTbF0h4zb
-
-
@ eac63075:b4988b48
2024-10-26 22:14:19The future of physical money is at stake, and the discussion about DREX, the new digital currency planned by the Central Bank of Brazil, is gaining momentum. In a candid and intense conversation, Federal Deputy Julia Zanatta (PL/SC) discussed the challenges and risks of this digital transition, also addressing her Bill No. 3,341/2024, which aims to prevent the extinction of physical currency. This bill emerges as a direct response to legislative initiatives seeking to replace physical money with digital alternatives, limiting citizens' options and potentially compromising individual freedom. Let's delve into the main points of this conversation.
https://www.fountain.fm/episode/i5YGJ9Ors3PkqAIMvNQ0
What is a CBDC?
Before discussing the specifics of DREX, it’s important to understand what a CBDC (Central Bank Digital Currency) is. CBDCs are digital currencies issued by central banks, similar to a digital version of physical money. Unlike cryptocurrencies such as Bitcoin, which operate in a decentralized manner, CBDCs are centralized and regulated by the government. In other words, they are digital currencies created and controlled by the Central Bank, intended to replace physical currency.
A prominent feature of CBDCs is their programmability. This means that the government can theoretically set rules about how, where, and for what this currency can be used. This aspect enables a level of control over citizens' finances that is impossible with physical money. By programming the currency, the government could limit transactions by setting geographical or usage restrictions. In practice, money within a CBDC could be restricted to specific spending or authorized for use in a defined geographical area.
In countries like China, where citizen actions and attitudes are also monitored, a person considered to have a "low score" due to a moral or ideological violation may have their transactions limited to essential purchases, restricting their digital currency use to non-essential activities. This financial control is strengthened because, unlike physical money, digital currency cannot be exchanged anonymously.
Practical Example: The Case of DREX During the Pandemic
To illustrate how DREX could be used, an example was given by Eric Altafim, director of Banco Itaú. He suggested that, if DREX had existed during the COVID-19 pandemic, the government could have restricted the currency’s use to a 5-kilometer radius around a person’s residence, limiting their economic mobility. Another proposed use by the executive related to the Bolsa Família welfare program: the government could set up programming that only allows this benefit to be used exclusively for food purchases. Although these examples are presented as control measures for safety or organization, they demonstrate how much a CBDC could restrict citizens' freedom of choice.
To illustrate the potential for state control through a Central Bank Digital Currency (CBDC), such as DREX, it is helpful to look at the example of China. In China, the implementation of a CBDC coincides with the country’s Social Credit System, a governmental surveillance tool that assesses citizens' and companies' behavior. Together, these technologies allow the Chinese government to monitor, reward, and, above all, punish behavior deemed inappropriate or threatening to the government.
How Does China's Social Credit System Work?
Implemented in 2014, China's Social Credit System assigns every citizen and company a "score" based on various factors, including financial behavior, criminal record, social interactions, and even online activities. This score determines the benefits or penalties each individual receives and can affect everything from public transport access to obtaining loans and enrolling in elite schools for their children. Citizens with low scores may face various sanctions, including travel restrictions, fines, and difficulty in securing loans.
With the adoption of the CBDC — or “digital yuan” — the Chinese government now has a new tool to closely monitor citizens' financial transactions, facilitating the application of Social Credit System penalties. China’s CBDC is a programmable digital currency, which means that the government can restrict how, when, and where the money can be spent. Through this level of control, digital currency becomes a powerful mechanism for influencing citizens' behavior.
Imagine, for instance, a citizen who repeatedly posts critical remarks about the government on social media or participates in protests. If the Social Credit System assigns this citizen a low score, the Chinese government could, through the CBDC, restrict their money usage in certain areas or sectors. For example, they could be prevented from buying tickets to travel to other regions, prohibited from purchasing certain consumer goods, or even restricted to making transactions only at stores near their home.
Another example of how the government can use the CBDC to enforce the Social Credit System is by monitoring purchases of products such as alcohol or luxury items. If a citizen uses the CBDC to spend more than the government deems reasonable on such products, this could negatively impact their social score, resulting in additional penalties such as future purchase restrictions or a lowered rating that impacts their personal and professional lives.
In China, this kind of control has already been demonstrated in several cases. Citizens added to Social Credit System “blacklists” have seen their spending and investment capacity severely limited. The combination of digital currency and social scores thus creates a sophisticated and invasive surveillance system, through which the Chinese government controls important aspects of citizens’ financial lives and individual freedoms.
Deputy Julia Zanatta views these examples with great concern. She argues that if the state has full control over digital money, citizens will be exposed to a level of economic control and surveillance never seen before. In a democracy, this control poses a risk, but in an authoritarian regime, it could be used as a powerful tool of repression.
DREX and Bill No. 3,341/2024
Julia Zanatta became aware of a bill by a Workers' Party (PT) deputy (Bill 4068/2020 by Deputy Reginaldo Lopes - PT/MG) that proposes the extinction of physical money within five years, aiming for a complete transition to DREX, the digital currency developed by the Central Bank of Brazil. Concerned about the impact of this measure, Julia drafted her bill, PL No. 3,341/2024, which prohibits the elimination of physical money, ensuring citizens the right to choose physical currency.
“The more I read about DREX, the less I want its implementation,” says the deputy. DREX is a Central Bank Digital Currency (CBDC), similar to other state digital currencies worldwide, but which, according to Julia, carries extreme control risks. She points out that with DREX, the State could closely monitor each citizen’s transactions, eliminating anonymity and potentially restricting freedom of choice. This control would lie in the hands of the Central Bank, which could, in a crisis or government change, “freeze balances or even delete funds directly from user accounts.”
Risks and Individual Freedom
Julia raises concerns about potential abuses of power that complete digitalization could allow. In a democracy, state control over personal finances raises serious questions, and EddieOz warns of an even more problematic future. “Today we are in a democracy, but tomorrow, with a government transition, we don't know if this kind of power will be used properly or abused,” he states. In other words, DREX gives the State the ability to restrict or condition the use of money, opening the door to unprecedented financial surveillance.
EddieOz cites Nigeria as an example, where a CBDC was implemented, and the government imposed severe restrictions on the use of physical money to encourage the use of digital currency, leading to protests and clashes in the country. In practice, the poorest and unbanked — those without regular access to banking services — were harshly affected, as without physical money, many cannot conduct basic transactions. Julia highlights that in Brazil, this situation would be even more severe, given the large number of unbanked individuals and the extent of rural areas where access to technology is limited.
The Relationship Between DREX and Pix
The digital transition has already begun with Pix, which revolutionized instant transfers and payments in Brazil. However, Julia points out that Pix, though popular, is a citizen’s choice, while DREX tends to eliminate that choice. The deputy expresses concern about new rules suggested for Pix, such as daily transaction limits of a thousand reais, justified as anti-fraud measures but which, in her view, represent additional control and a profit opportunity for banks. “How many more rules will banks create to profit from us?” asks Julia, noting that DREX could further enhance control over personal finances.
International Precedents and Resistance to CBDC
The deputy also cites examples from other countries resisting the idea of a centralized digital currency. In the United States, states like New Hampshire have passed laws to prevent the advance of CBDCs, and leaders such as Donald Trump have opposed creating a national digital currency. Trump, addressing the topic, uses a justification similar to Julia’s: in a digitalized system, “with one click, your money could disappear.” She agrees with the warning, emphasizing the control risk that a CBDC represents, especially for countries with disadvantaged populations.
Besides the United States, Canada, Colombia, and Australia have also suspended studies on digital currencies, citing the need for further discussions on population impacts. However, in Brazil, the debate on DREX is still limited, with few parliamentarians and political leaders openly discussing the topic. According to Julia, only she and one or two deputies are truly trying to bring this discussion to the Chamber, making DREX’s advance even more concerning.
Bill No. 3,341/2024 and Popular Pressure
For Julia, her bill is a first step. Although she acknowledges that ideally, it would prevent DREX's implementation entirely, PL 3341/2024 is a measure to ensure citizens' choice to use physical money, preserving a form of individual freedom. “If the future means control, I prefer to live in the past,” Julia asserts, reinforcing that the fight for freedom is at the heart of her bill.
However, the deputy emphasizes that none of this will be possible without popular mobilization. According to her, popular pressure is crucial for other deputies to take notice and support PL 3341. “I am only one deputy, and we need the public’s support to raise the project’s visibility,” she explains, encouraging the public to press other parliamentarians and ask them to “pay attention to PL 3341 and the project that prohibits the end of physical money.” The deputy believes that with a strong awareness and pressure movement, it is possible to advance the debate and ensure Brazilians’ financial freedom.
What’s at Stake?
Julia Zanatta leaves no doubt: DREX represents a profound shift in how money will be used and controlled in Brazil. More than a simple modernization of the financial system, the Central Bank’s CBDC sets precedents for an unprecedented level of citizen surveillance and control in the country. For the deputy, this transition needs to be debated broadly and transparently, and it’s up to the Brazilian people to defend their rights and demand that the National Congress discuss these changes responsibly.
The deputy also emphasizes that, regardless of political or partisan views, this issue affects all Brazilians. “This agenda is something that will affect everyone. We need to be united to ensure people understand the gravity of what could happen.” Julia believes that by sharing information and generating open debate, it is possible to prevent Brazil from following the path of countries that have already implemented a digital currency in an authoritarian way.
A Call to Action
The future of physical money in Brazil is at risk. For those who share Deputy Julia Zanatta’s concerns, the time to act is now. Mobilize, get informed, and press your representatives. PL 3341/2024 is an opportunity to ensure that Brazilian citizens have a choice in how to use their money, without excessive state interference or surveillance.
In the end, as the deputy puts it, the central issue is freedom. “My fear is that this project will pass, and people won’t even understand what is happening.” Therefore, may every citizen at least have the chance to understand what’s at stake and make their voice heard in defense of a Brazil where individual freedom and privacy are respected values.
-
@ eac63075:b4988b48
2024-10-21 08:11:11Imagine sending a private message to a friend, only to learn that authorities could be scanning its contents without your knowledge. This isn't a scene from a dystopian novel but a potential reality under the European Union's proposed "Chat Control" measures. Aimed at combating serious crimes like child exploitation and terrorism, these proposals could significantly impact the privacy of everyday internet users. As encrypted messaging services become the norm for personal and professional communication, understanding Chat Control is essential. This article delves into what Chat Control entails, why it's being considered, and how it could affect your right to private communication.
https://www.fountain.fm/episode/coOFsst7r7mO1EP1kSzV
https://open.spotify.com/episode/0IZ6kMExfxFm4FHg5DAWT8?si=e139033865e045de
Sections:
- Introduction
- What Is Chat Control?
- Why Is the EU Pushing for Chat Control?
- The Privacy Concerns and Risks
- The Technical Debate: Encryption and Backdoors
- Global Reactions and the Debate in Europe
- Possible Consequences for Messaging Services
- What Happens Next? The Future of Chat Control
- Conclusion
What Is Chat Control?
"Chat Control" refers to a set of proposed measures by the European Union aimed at monitoring and scanning private communications on messaging platforms. The primary goal is to detect and prevent the spread of illegal content, such as child sexual abuse material (CSAM) and to combat terrorism. While the intention is to enhance security and protect vulnerable populations, these proposals have raised significant privacy concerns.
At its core, Chat Control would require messaging services to implement automated scanning technologies that can analyze the content of messages—even those that are end-to-end encrypted. This means that the private messages you send to friends, family, or colleagues could be subject to inspection by algorithms designed to detect prohibited content.
Origins of the Proposal
The initiative for Chat Control emerged from the EU's desire to strengthen its digital security infrastructure. High-profile cases of online abuse and the use of encrypted platforms by criminal organizations have prompted lawmakers to consider more invasive surveillance tactics. The European Commission has been exploring legislation that would make it mandatory for service providers to monitor communications on their platforms.
How Messaging Services Work
Most modern messaging apps, like Signal, Session, SimpleX, Veilid, Protonmail and Tutanota (among others), use end-to-end encryption (E2EE). This encryption ensures that only the sender and the recipient can read the messages being exchanged. Not even the service providers can access the content. This level of security is crucial for maintaining privacy in digital communications, protecting users from hackers, identity thieves, and other malicious actors.
Key Elements of Chat Control
- Automated Content Scanning: Service providers would use algorithms to scan messages for illegal content.
- Circumvention of Encryption: To scan encrypted messages, providers might need to alter their encryption methods, potentially weakening security.
- Mandatory Reporting: If illegal content is detected, providers would be required to report it to authorities.
- Broad Applicability: The measures could apply to all messaging services operating within the EU, affecting both European companies and international platforms.
Why It Matters
Understanding Chat Control is essential because it represents a significant shift in how digital privacy is handled. While combating illegal activities online is crucial, the methods proposed could set a precedent for mass surveillance and the erosion of privacy rights. Everyday users who rely on encrypted messaging for personal and professional communication might find their conversations are no longer as private as they once thought.
Why Is the EU Pushing for Chat Control?
The European Union's push for Chat Control stems from a pressing concern to protect its citizens, particularly children, from online exploitation and criminal activities. With the digital landscape becoming increasingly integral to daily life, the EU aims to strengthen its ability to combat serious crimes facilitated through online platforms.
Protecting Children and Preventing Crime
One of the primary motivations behind Chat Control is the prevention of child sexual abuse material (CSAM) circulating on the internet. Law enforcement agencies have reported a significant increase in the sharing of illegal content through private messaging services. By implementing Chat Control, the EU believes it can more effectively identify and stop perpetrators, rescue victims, and deter future crimes.
Terrorism is another critical concern. Encrypted messaging apps can be used by terrorist groups to plan and coordinate attacks without detection. The EU argues that accessing these communications could be vital in preventing such threats and ensuring public safety.
Legal Context and Legislative Drivers
The push for Chat Control is rooted in several legislative initiatives:
-
ePrivacy Directive: This directive regulates the processing of personal data and the protection of privacy in electronic communications. The EU is considering amendments that would allow for the scanning of private messages under specific circumstances.
-
Temporary Derogation: In 2021, the EU adopted a temporary regulation permitting voluntary detection of CSAM by communication services. The current proposals aim to make such measures mandatory and more comprehensive.
-
Regulation Proposals: The European Commission has proposed regulations that would require service providers to detect, report, and remove illegal content proactively. This would include the use of technologies to scan private communications.
Balancing Security and Privacy
EU officials argue that the proposed measures are a necessary response to evolving digital threats. They emphasize the importance of staying ahead of criminals who exploit technology to harm others. By implementing Chat Control, they believe law enforcement can be more effective without entirely dismantling privacy protections.
However, the EU also acknowledges the need to balance security with fundamental rights. The proposals include provisions intended to limit the scope of surveillance, such as:
-
Targeted Scanning: Focusing on specific threats rather than broad, indiscriminate monitoring.
-
Judicial Oversight: Requiring court orders or oversight for accessing private communications.
-
Data Protection Safeguards: Implementing measures to ensure that data collected is handled securely and deleted when no longer needed.
The Urgency Behind the Push
High-profile cases of online abuse and terrorism have heightened the sense of urgency among EU policymakers. Reports of increasing online grooming and the widespread distribution of illegal content have prompted calls for immediate action. The EU posits that without measures like Chat Control, these problems will continue to escalate unchecked.
Criticism and Controversy
Despite the stated intentions, the push for Chat Control has been met with significant criticism. Opponents argue that the measures could be ineffective against savvy criminals who can find alternative ways to communicate. There is also concern that such surveillance could be misused or extended beyond its original purpose.
The Privacy Concerns and Risks
While the intentions behind Chat Control focus on enhancing security and protecting vulnerable groups, the proposed measures raise significant privacy concerns. Critics argue that implementing such surveillance could infringe on fundamental rights and set a dangerous precedent for mass monitoring of private communications.
Infringement on Privacy Rights
At the heart of the debate is the right to privacy. By scanning private messages, even with automated tools, the confidentiality of personal communications is compromised. Users may no longer feel secure sharing sensitive information, fearing that their messages could be intercepted or misinterpreted by algorithms.
Erosion of End-to-End Encryption
End-to-end encryption (E2EE) is a cornerstone of digital security, ensuring that only the sender and recipient can read the messages exchanged. Chat Control could necessitate the introduction of "backdoors" or weaken encryption protocols, making it easier for unauthorized parties to access private data. This not only affects individual privacy but also exposes communications to potential cyber threats.
Concerns from Privacy Advocates
Organizations like Signal and Tutanota, which offer encrypted messaging services, have voiced strong opposition to Chat Control. They warn that undermining encryption could have far-reaching consequences:
- Security Risks: Weakening encryption makes systems more vulnerable to hacking, espionage, and cybercrime.
- Global Implications: Changes in EU regulations could influence policies worldwide, leading to a broader erosion of digital privacy.
- Ineffectiveness Against Crime: Determined criminals might resort to other, less detectable means of communication, rendering the measures ineffective while still compromising the privacy of law-abiding citizens.
Potential for Government Overreach
There is a fear that Chat Control could lead to increased surveillance beyond its original scope. Once the infrastructure for scanning private messages is in place, it could be repurposed or expanded to monitor other types of content, stifling free expression and dissent.
Real-World Implications for Users
- False Positives: Automated scanning technologies are not infallible and could mistakenly flag innocent content, leading to unwarranted scrutiny or legal consequences for users.
- Chilling Effect: Knowing that messages could be monitored might discourage people from expressing themselves freely, impacting personal relationships and societal discourse.
- Data Misuse: Collected data could be vulnerable to leaks or misuse, compromising personal and sensitive information.
Legal and Ethical Concerns
Privacy advocates also highlight potential conflicts with existing laws and ethical standards:
- Violation of Fundamental Rights: The European Convention on Human Rights and other international agreements protect the right to privacy and freedom of expression.
- Questionable Effectiveness: The ethical justification for such invasive measures is challenged if they do not significantly improve safety or if they disproportionately impact innocent users.
Opposition from Member States and Organizations
Countries like Germany and organizations such as the European Digital Rights (EDRi) have expressed opposition to Chat Control. They emphasize the need to protect digital privacy and caution against hasty legislation that could have unintended consequences.
The Technical Debate: Encryption and Backdoors
The discussion around Chat Control inevitably leads to a complex technical debate centered on encryption and the potential introduction of backdoors into secure communication systems. Understanding these concepts is crucial to grasping the full implications of the proposed measures.
What Is End-to-End Encryption (E2EE)?
End-to-end encryption is a method of secure communication that prevents third parties from accessing data while it's transferred from one end system to another. In simpler terms, only the sender and the recipient can read the messages. Even the service providers operating the messaging platforms cannot decrypt the content.
- Security Assurance: E2EE ensures that sensitive information—be it personal messages, financial details, or confidential business communications—remains private.
- Widespread Use: Popular messaging apps like Signal, Session, SimpleX, Veilid, Protonmail and Tutanota (among others) rely on E2EE to protect user data.
How Chat Control Affects Encryption
Implementing Chat Control as proposed would require messaging services to scan the content of messages for illegal material. To do this on encrypted platforms, providers might have to:
- Introduce Backdoors: Create a means for third parties (including the service provider or authorities) to access encrypted messages.
- Client-Side Scanning: Install software on users' devices that scans messages before they are encrypted and sent, effectively bypassing E2EE.
The Risks of Weakening Encryption
1. Compromised Security for All Users
Introducing backdoors or client-side scanning tools can create vulnerabilities:
- Exploitable Gaps: If a backdoor exists, malicious actors might find and exploit it, leading to data breaches.
- Universal Impact: Weakening encryption doesn't just affect targeted individuals; it potentially exposes all users to increased risk.
2. Undermining Trust in Digital Services
- User Confidence: Knowing that private communications could be accessed might deter people from using digital services or push them toward unregulated platforms.
- Business Implications: Companies relying on secure communications might face increased risks, affecting economic activities.
3. Ineffectiveness Against Skilled Adversaries
- Alternative Methods: Criminals might shift to other encrypted channels or develop new ways to avoid detection.
- False Sense of Security: Weakening encryption could give the impression of increased safety while adversaries adapt and continue their activities undetected.
Signal’s Response and Stance
Signal, a leading encrypted messaging service, has been vocal in its opposition to the EU's proposals:
- Refusal to Weaken Encryption: Signal's CEO Meredith Whittaker has stated that the company would rather cease operations in the EU than compromise its encryption standards.
- Advocacy for Privacy: Signal emphasizes that strong encryption is essential for protecting human rights and freedoms in the digital age.
Understanding Backdoors
A "backdoor" in encryption is an intentional weakness inserted into a system to allow authorized access to encrypted data. While intended for legitimate use by authorities, backdoors pose several problems:
- Security Vulnerabilities: They can be discovered and exploited by unauthorized parties, including hackers and foreign governments.
- Ethical Concerns: The existence of backdoors raises questions about consent and the extent to which governments should be able to access private communications.
The Slippery Slope Argument
Privacy advocates warn that introducing backdoors or mandatory scanning sets a precedent:
- Expanded Surveillance: Once in place, these measures could be extended to monitor other types of content beyond the original scope.
- Erosion of Rights: Gradual acceptance of surveillance can lead to a significant reduction in personal freedoms over time.
Potential Technological Alternatives
Some suggest that it's possible to fight illegal content without undermining encryption:
- Metadata Analysis: Focusing on patterns of communication rather than content.
- Enhanced Reporting Mechanisms: Encouraging users to report illegal content voluntarily.
- Investing in Law Enforcement Capabilities: Strengthening traditional investigative methods without compromising digital security.
The technical community largely agrees that weakening encryption is not the solution:
- Consensus on Security: Strong encryption is essential for the safety and privacy of all internet users.
- Call for Dialogue: Technologists and privacy experts advocate for collaborative approaches that address security concerns without sacrificing fundamental rights.
Global Reactions and the Debate in Europe
The proposal for Chat Control has ignited a heated debate across Europe and beyond, with various stakeholders weighing in on the potential implications for privacy, security, and fundamental rights. The reactions are mixed, reflecting differing national perspectives, political priorities, and societal values.
Support for Chat Control
Some EU member states and officials support the initiative, emphasizing the need for robust measures to combat online crime and protect citizens, especially children. They argue that:
- Enhanced Security: Mandatory scanning can help law enforcement agencies detect and prevent serious crimes.
- Responsibility of Service Providers: Companies offering communication services should play an active role in preventing their platforms from being used for illegal activities.
- Public Safety Priorities: The protection of vulnerable populations justifies the implementation of such measures, even if it means compromising some aspects of privacy.
Opposition within the EU
Several countries and organizations have voiced strong opposition to Chat Control, citing concerns over privacy rights and the potential for government overreach.
Germany
- Stance: Germany has been one of the most vocal opponents of the proposed measures.
- Reasons:
- Constitutional Concerns: The German government argues that Chat Control could violate constitutional protections of privacy and confidentiality of communications.
- Security Risks: Weakening encryption is seen as a threat to cybersecurity.
- Legal Challenges: Potential conflicts with national laws protecting personal data and communication secrecy.
Netherlands
- Recent Developments: The Dutch government decided against supporting Chat Control, emphasizing the importance of encryption for security and privacy.
- Arguments:
- Effectiveness Doubts: Skepticism about the actual effectiveness of the measures in combating crime.
- Negative Impact on Privacy: Concerns about mass surveillance and the infringement of citizens' rights.
Table reference: Patrick Breyer - Chat Control in 23 September 2024
Privacy Advocacy Groups
European Digital Rights (EDRi)
- Role: A network of civil and human rights organizations working to defend rights and freedoms in the digital environment.
- Position:
- Strong Opposition: EDRi argues that Chat Control is incompatible with fundamental rights.
- Awareness Campaigns: Engaging in public campaigns to inform citizens about the potential risks.
- Policy Engagement: Lobbying policymakers to consider alternative approaches that respect privacy.
Politicians and Activists
Patrick Breyer
- Background: A Member of the European Parliament (MEP) from Germany, representing the Pirate Party.
- Actions:
- Advocacy: Actively campaigning against Chat Control through speeches, articles, and legislative efforts.
- Public Outreach: Using social media and public events to raise awareness.
- Legal Expertise: Highlighting the legal inconsistencies and potential violations of EU law.
Global Reactions
International Organizations
- Human Rights Watch and Amnesty International: These organizations have expressed concerns about the implications for human rights, urging the EU to reconsider.
Technology Companies
- Global Tech Firms: Companies like Apple and Microsoft are monitoring the situation, as EU regulations could affect their operations and user trust.
- Industry Associations: Groups representing tech companies have issued statements highlighting the risks to innovation and competitiveness.
The Broader Debate
The controversy over Chat Control reflects a broader struggle between security interests and privacy rights in the digital age. Key points in the debate include:
- Legal Precedents: How the EU's decision might influence laws and regulations in other countries.
- Digital Sovereignty: The desire of nations to control digital spaces within their borders.
- Civil Liberties: The importance of protecting freedoms in the face of technological advancements.
Public Opinion
- Diverse Views: Surveys and public forums show a range of opinions, with some citizens prioritizing security and others valuing privacy above all.
- Awareness Levels: Many people are still unaware of the potential changes, highlighting the need for public education on the issue.
The EU is at a crossroads, facing the challenge of addressing legitimate security concerns without undermining the fundamental rights that are central to its values. The outcome of this debate will have significant implications for the future of digital privacy and the balance between security and freedom in society.
Possible Consequences for Messaging Services
The implementation of Chat Control could have significant implications for messaging services operating within the European Union. Both large platforms and smaller providers might need to adapt their technologies and policies to comply with the new regulations, potentially altering the landscape of digital communication.
Impact on Encrypted Messaging Services
Signal and Similar Platforms
-
Compliance Challenges: Encrypted messaging services like Signal rely on end-to-end encryption to secure user communications. Complying with Chat Control could force them to weaken their encryption protocols or implement client-side scanning, conflicting with their core privacy principles.
-
Operational Decisions: Some platforms may choose to limit their services in the EU or cease operations altogether rather than compromise on encryption. Signal, for instance, has indicated that it would prefer to withdraw from European markets than undermine its security features.
Potential Blocking or Limiting of Services
-
Regulatory Enforcement: Messaging services that do not comply with Chat Control regulations could face fines, legal action, or even be blocked within the EU.
-
Access Restrictions: Users in Europe might find certain services unavailable or limited in functionality if providers decide not to meet the regulatory requirements.
Effects on Smaller Providers
-
Resource Constraints: Smaller messaging services and startups may lack the resources to implement the required scanning technologies, leading to increased operational costs or forcing them out of the market.
-
Innovation Stifling: The added regulatory burden could deter new entrants, reducing competition and innovation in the messaging service sector.
User Experience and Trust
-
Privacy Concerns: Users may lose trust in messaging platforms if they know their communications are subject to scanning, leading to a decline in user engagement.
-
Migration to Unregulated Platforms: There is a risk that users might shift to less secure or unregulated services, including those operated outside the EU or on the dark web, potentially exposing them to greater risks.
Technical and Security Implications
-
Increased Vulnerabilities: Modifying encryption protocols to comply with Chat Control could introduce security flaws, making platforms more susceptible to hacking and data breaches.
-
Global Security Risks: Changes made to accommodate EU regulations might affect the global user base of these services, extending security risks beyond European borders.
Impact on Businesses and Professional Communications
-
Confidentiality Issues: Businesses that rely on secure messaging for sensitive communications may face challenges in ensuring confidentiality, affecting sectors like finance, healthcare, and legal services.
-
Compliance Complexity: Companies operating internationally will need to navigate a complex landscape of differing regulations, increasing administrative burdens.
Economic Consequences
-
Market Fragmentation: Divergent regulations could lead to a fragmented market, with different versions of services for different regions.
-
Loss of Revenue: Messaging services might experience reduced revenue due to decreased user trust and engagement or the costs associated with compliance.
Responses from Service Providers
-
Legal Challenges: Companies might pursue legal action against the regulations, citing conflicts with privacy laws and user rights.
-
Policy Advocacy: Service providers may increase lobbying efforts to influence policy decisions and promote alternatives to Chat Control.
Possible Adaptations
-
Technological Innovation: Some providers might invest in developing new technologies that can detect illegal content without compromising encryption, though the feasibility remains uncertain.
-
Transparency Measures: To maintain user trust, companies might enhance transparency about how data is handled and what measures are in place to protect privacy.
The potential consequences of Chat Control for messaging services are profound, affecting not only the companies that provide these services but also the users who rely on them daily. The balance between complying with legal requirements and maintaining user privacy and security presents a significant challenge that could reshape the digital communication landscape.
What Happens Next? The Future of Chat Control
The future of Chat Control remains uncertain as the debate continues among EU member states, policymakers, technology companies, and civil society organizations. Several factors will influence the outcome of this contentious proposal, each carrying significant implications for digital privacy, security, and the regulatory environment within the European Union.
Current Status of Legislation
-
Ongoing Negotiations: The proposed Chat Control measures are still under discussion within the European Parliament and the Council of the European Union. Amendments and revisions are being considered in response to the feedback from various stakeholders.
-
Timeline: While there is no fixed date for the final decision, the EU aims to reach a consensus to implement effective measures against online crime without undue delay.
Key Influencing Factors
1. Legal Challenges and Compliance with EU Law
-
Fundamental Rights Assessment: The proposals must be evaluated against the Charter of Fundamental Rights of the European Union, ensuring that any measures comply with rights to privacy, data protection, and freedom of expression.
-
Court Scrutiny: Potential legal challenges could arise, leading to scrutiny by the European Court of Justice (ECJ), which may impact the feasibility and legality of Chat Control.
2. Technological Feasibility
-
Development of Privacy-Preserving Technologies: Research into methods that can detect illegal content without compromising encryption is ongoing. Advances in this area could provide alternative solutions acceptable to both privacy advocates and security agencies.
-
Implementation Challenges: The practical aspects of deploying scanning technologies across various platforms and services remain complex, and technical hurdles could delay or alter the proposed measures.
3. Political Dynamics
-
Member State Positions: The differing stances of EU countries, such as Germany's opposition, play a significant role in shaping the final outcome. Consensus among member states is crucial for adopting EU-wide regulations.
-
Public Opinion and Advocacy: Growing awareness and activism around digital privacy can influence policymakers. Public campaigns and lobbying efforts may sway decisions in favor of stronger privacy protections.
4. Industry Responses
-
Negotiations with Service Providers: Ongoing dialogues between EU authorities and technology companies may lead to compromises or collaborative efforts to address concerns without fully implementing Chat Control as initially proposed.
-
Potential for Self-Regulation: Messaging services might propose self-regulatory measures to combat illegal content, aiming to demonstrate effectiveness without the need for mandatory scanning.
Possible Scenarios
Optimistic Outcome:
- Balanced Regulation: A revised proposal emerges that effectively addresses security concerns while upholding strong encryption and privacy rights, possibly through innovative technologies or targeted measures with robust oversight.
Pessimistic Outcome:
- Adoption of Strict Measures: Chat Control is implemented as initially proposed, leading to weakened encryption, reduced privacy, and potential withdrawal of services like Signal from the EU market.
Middle Ground:
- Incremental Implementation: Partial measures are adopted, focusing on voluntary cooperation with service providers and emphasizing transparency and user consent, with ongoing evaluations to assess effectiveness and impact.
How to Stay Informed and Protect Your Privacy
-
Follow Reputable Sources: Keep up with news from reliable outlets, official EU communications, and statements from privacy organizations to stay informed about developments.
-
Engage in the Dialogue: Participate in public consultations, sign petitions, or contact representatives to express your views on Chat Control and digital privacy.
-
Utilize Secure Practices: Regardless of legislative outcomes, adopting good digital hygiene—such as using strong passwords and being cautious with personal information—can enhance your online security.
The Global Perspective
-
International Implications: The EU's decision may influence global policies on encryption and surveillance, setting precedents that other countries might follow or react against.
-
Collaboration Opportunities: International cooperation on developing solutions that protect both security and privacy could emerge, fostering a more unified approach to addressing online threats.
Looking Ahead
The future of Chat Control is a critical issue that underscores the challenges of governing in the digital age. Balancing the need for security with the protection of fundamental rights is a complex task that requires careful consideration, open dialogue, and collaboration among all stakeholders.
As the situation evolves, staying informed and engaged is essential. The decisions made in the coming months will shape the digital landscape for years to come, affecting how we communicate, conduct business, and exercise our rights in an increasingly connected world.
Conclusion
The debate over Chat Control highlights a fundamental challenge in our increasingly digital world: how to protect society from genuine threats without eroding the very rights and freedoms that define it. While the intention to safeguard children and prevent crime is undeniably important, the means of achieving this through intrusive surveillance measures raise critical concerns.
Privacy is not just a personal preference but a cornerstone of democratic societies. End-to-end encryption has become an essential tool for ensuring that our personal conversations, professional communications, and sensitive data remain secure from unwanted intrusion. Weakening these protections could expose individuals and organizations to risks that far outweigh the proposed benefits.
The potential consequences of implementing Chat Control are far-reaching:
- Erosion of Trust: Users may lose confidence in digital platforms, impacting how we communicate and conduct business online.
- Security Vulnerabilities: Introducing backdoors or weakening encryption can make systems more susceptible to cyberattacks.
- Stifling Innovation: Regulatory burdens may hinder technological advancement and competitiveness in the tech industry.
- Global Implications: The EU's decisions could set precedents that influence digital policies worldwide, for better or worse.
As citizens, it's crucial to stay informed about these developments. Engage in conversations, reach out to your representatives, and advocate for solutions that respect both security needs and fundamental rights. Technology and policy can evolve together to address challenges without compromising core values.
The future of Chat Control is not yet decided, and public input can make a significant difference. By promoting open dialogue, supporting privacy-preserving innovations, and emphasizing the importance of human rights in legislation, we can work towards a digital landscape that is both safe and free.
In a world where digital communication is integral to daily life, striking the right balance between security and privacy is more important than ever. The choices made today will shape the digital environment for generations to come, determining not just how we communicate, but how we live and interact in an interconnected world.
Thank you for reading this article. We hope it has provided you with a clear understanding of Chat Control and its potential impact on your privacy and digital rights. Stay informed, stay engaged, and let's work together towards a secure and open digital future.
Read more:
- https://www.patrick-breyer.de/en/posts/chat-control/
- https://www.patrick-breyer.de/en/new-eu-push-for-chat-control-will-messenger-services-be-blocked-in-europe/
- https://edri.org/our-work/dutch-decision-puts-brakes-on-chat-control/
- https://signal.org/blog/pdfs/ndss-keynote.pdf
- https://tuta.com/blog/germany-stop-chat-control
- https://cointelegraph.com/news/signal-president-slams-revised-eu-encryption-proposal
- https://mullvad.net/en/why-privacy-matters
-
@ 4ba8e86d:89d32de4
2024-10-07 13:37:38O que é Cwtch? Cwtch (/kʊtʃ/ - uma palavra galesa que pode ser traduzida aproximadamente como “um abraço que cria um lugar seguro”) é um protocolo de mensagens multipartidário descentralizado, que preserva a privacidade, que pode ser usado para construir aplicativos resistentes a metadados.
Como posso pronunciar Cwtch? Como "kutch", para rimar com "butch".
Descentralizado e Aberto : Não existe “serviço Cwtch” ou “rede Cwtch”. Os participantes do Cwtch podem hospedar seus próprios espaços seguros ou emprestar sua infraestrutura para outras pessoas que buscam um espaço seguro. O protocolo Cwtch é aberto e qualquer pessoa é livre para criar bots, serviços e interfaces de usuário e integrar e interagir com o Cwtch.
Preservação de privacidade : toda a comunicação no Cwtch é criptografada de ponta a ponta e ocorre nos serviços cebola Tor v3.
Resistente a metadados : O Cwtch foi projetado de forma que nenhuma informação seja trocada ou disponibilizada a ninguém sem seu consentimento explícito, incluindo mensagens durante a transmissão e metadados de protocolo
Uma breve história do bate-papo resistente a metadados Nos últimos anos, a conscientização pública sobre a necessidade e os benefícios das soluções criptografadas de ponta a ponta aumentou com aplicativos como Signal , Whatsapp e Wire. que agora fornecem aos usuários comunicações seguras.
No entanto, essas ferramentas exigem vários níveis de exposição de metadados para funcionar, e muitos desses metadados podem ser usados para obter detalhes sobre como e por que uma pessoa está usando uma ferramenta para se comunicar.
Uma ferramenta que buscou reduzir metadados é o Ricochet lançado pela primeira vez em 2014. Ricochet usou os serviços cebola Tor v2 para fornecer comunicação criptografada segura de ponta a ponta e para proteger os metadados das comunicações.
Não havia servidores centralizados que auxiliassem no roteamento das conversas do Ricochet. Ninguém além das partes envolvidas em uma conversa poderia saber que tal conversa está ocorrendo.
Ricochet tinha limitações; não havia suporte para vários dispositivos, nem existe um mecanismo para suportar a comunicação em grupo ou para um usuário enviar mensagens enquanto um contato está offline.
Isto tornou a adoção do Ricochet uma proposta difícil; mesmo aqueles em ambientes que seriam melhor atendidos pela resistência aos metadados, sem saber que ela existe.
Além disso, qualquer solução para comunicação descentralizada e resistente a metadados enfrenta problemas fundamentais quando se trata de eficiência, privacidade e segurança de grupo conforme definido pelo consenso e consistência da transcrição.
Alternativas modernas ao Ricochet incluem Briar , Zbay e Ricochet Refresh - cada ferramenta procura otimizar para um conjunto diferente de compensações, por exemplo, Briar procura permitir que as pessoas se comuniquem mesmo quando a infraestrutura de rede subjacente está inoperante, ao mesmo tempo que fornece resistência à vigilância de metadados.
O projeto Cwtch começou em 2017 como um protocolo de extensão para Ricochet, fornecendo conversas em grupo por meio de servidores não confiáveis, com o objetivo de permitir aplicativos descentralizados e resistentes a metadados como listas compartilhadas e quadros de avisos.
Uma versão alfa do Cwtch foi lançada em fevereiro de 2019 e, desde então, a equipe do Cwtch dirigida pela OPEN PRIVACY RESEARCH SOCIETY conduziu pesquisa e desenvolvimento em cwtch e nos protocolos, bibliotecas e espaços de problemas subjacentes.
Modelo de Risco.
Sabe-se que os metadados de comunicações são explorados por vários adversários para minar a segurança dos sistemas, para rastrear vítimas e para realizar análises de redes sociais em grande escala para alimentar a vigilância em massa. As ferramentas resistentes a metadados estão em sua infância e faltam pesquisas sobre a construção e a experiência do usuário de tais ferramentas.
https://nostrcheck.me/media/public/nostrcheck.me_9475702740746681051707662826.webp
O Cwtch foi originalmente concebido como uma extensão do protocolo Ricochet resistente a metadados para suportar comunicações assíncronas de grupos multiponto por meio do uso de infraestrutura anônima, descartável e não confiável.
Desde então, o Cwtch evoluiu para um protocolo próprio. Esta seção descreverá os vários riscos conhecidos que o Cwtch tenta mitigar e será fortemente referenciado no restante do documento ao discutir os vários subcomponentes da Arquitetura Cwtch.
Modelo de ameaça.
É importante identificar e compreender que os metadados são omnipresentes nos protocolos de comunicação; é de facto necessário que tais protocolos funcionem de forma eficiente e em escala. No entanto, as informações que são úteis para facilitar peers e servidores também são altamente relevantes para adversários que desejam explorar tais informações.
Para a definição do nosso problema, assumiremos que o conteúdo de uma comunicação é criptografado de tal forma que um adversário é praticamente incapaz de quebrá-lo veja tapir e cwtch para detalhes sobre a criptografia que usamos, e como tal nos concentraremos em o contexto para os metadados de comunicação.
Procuramos proteger os seguintes contextos de comunicação:
• Quem está envolvido em uma comunicação? Pode ser possível identificar pessoas ou simplesmente identificadores de dispositivos ou redes. Por exemplo, “esta comunicação envolve Alice, uma jornalista, e Bob, um funcionário público”.
• Onde estão os participantes da conversa? Por exemplo, “durante esta comunicação, Alice estava na França e Bob estava no Canadá”.
• Quando ocorreu uma conversa? O momento e a duração da comunicação podem revelar muito sobre a natureza de uma chamada, por exemplo, “Bob, um funcionário público, conversou com Alice ao telefone por uma hora ontem à noite. Esta é a primeira vez que eles se comunicam.” *Como a conversa foi mediada? O fato de uma conversa ter ocorrido por meio de um e-mail criptografado ou não criptografado pode fornecer informações úteis. Por exemplo, “Alice enviou um e-mail criptografado para Bob ontem, enquanto eles normalmente enviam apenas e-mails de texto simples um para o outro”.
• Sobre o que é a conversa? Mesmo que o conteúdo da comunicação seja criptografado, às vezes é possível derivar um contexto provável de uma conversa sem saber exatamente o que é dito, por exemplo, “uma pessoa ligou para uma pizzaria na hora do jantar” ou “alguém ligou para um número conhecido de linha direta de suicídio na hora do jantar”. 3 horas da manhã."
Além das conversas individuais, também procuramos defender-nos contra ataques de correlação de contexto, através dos quais múltiplas conversas são analisadas para obter informações de nível superior:
• Relacionamentos: Descobrir relações sociais entre um par de entidades analisando a frequência e a duração de suas comunicações durante um período de tempo. Por exemplo, Carol e Eve ligam uma para a outra todos os dias durante várias horas seguidas.
• Cliques: Descobrir relações sociais entre um grupo de entidades que interagem entre si. Por exemplo, Alice, Bob e Eva se comunicam entre si.
• Grupos vagamente conectados e indivíduos-ponte: descobrir grupos que se comunicam entre si através de intermediários, analisando cadeias de comunicação (por exemplo, toda vez que Alice fala com Bob, ela fala com Carol quase imediatamente depois; Bob e Carol nunca se comunicam).
• Padrão de Vida: Descobrir quais comunicações são cíclicas e previsíveis. Por exemplo, Alice liga para Eve toda segunda-feira à noite por cerca de uma hora. Ataques Ativos
Ataques de deturpação.
O Cwtch não fornece registro global de nomes de exibição e, como tal, as pessoas que usam o Cwtch são mais vulneráveis a ataques baseados em declarações falsas, ou seja, pessoas que fingem ser outras pessoas:
O fluxo básico de um desses ataques é o seguinte, embora também existam outros fluxos:
•Alice tem um amigo chamado Bob e outro chamado Eve
• Eve descobre que Alice tem um amigo chamado Bob
• Eve cria milhares de novas contas para encontrar uma que tenha uma imagem/chave pública semelhante à de Bob (não será idêntica, mas pode enganar alguém por alguns minutos)
• Eve chama essa nova conta de "Eve New Account" e adiciona Alice como amiga.
• Eve então muda seu nome em "Eve New Account" para "Bob"
• Alice envia mensagens destinadas a "Bob" para a conta falsa de Bob de Eve Como os ataques de declarações falsas são inerentemente uma questão de confiança e verificação, a única maneira absoluta de evitá-los é os usuários validarem absolutamente a chave pública. Obviamente, isso não é o ideal e, em muitos casos, simplesmente não acontecerá .
Como tal, pretendemos fornecer algumas dicas de experiência do usuário na interface do usuário para orientar as pessoas na tomada de decisões sobre confiar em contas e/ou distinguir contas que possam estar tentando se representar como outros usuários.
Uma nota sobre ataques físicos A Cwtch não considera ataques que exijam acesso físico (ou equivalente) à máquina do usuário como praticamente defensáveis. No entanto, no interesse de uma boa engenharia de segurança, ao longo deste documento ainda nos referiremos a ataques ou condições que exigem tal privilégio e indicaremos onde quaisquer mitigações que implementámos falharão.
Um perfil Cwtch.
Os usuários podem criar um ou mais perfis Cwtch. Cada perfil gera um par de chaves ed25519 aleatório compatível com Tor.
Além do material criptográfico, um perfil também contém uma lista de Contatos (outras chaves públicas do perfil Cwtch + dados associados sobre esse perfil, como apelido e (opcionalmente) mensagens históricas), uma lista de Grupos (contendo o material criptográfico do grupo, além de outros dados associados, como apelido do grupo e mensagens históricas).
Conversões entre duas partes: ponto a ponto
https://nostrcheck.me/media/public/nostrcheck.me_2186338207587396891707662879.webp
Para que duas partes participem de uma conversa ponto a ponto, ambas devem estar on-line, mas apenas uma precisa estar acessível por meio do serviço Onion. Por uma questão de clareza, muitas vezes rotulamos uma parte como “ponto de entrada” (aquele que hospeda o serviço cebola) e a outra parte como “ponto de saída” (aquele que se conecta ao serviço cebola).
Após a conexão, ambas as partes adotam um protocolo de autenticação que:
• Afirma que cada parte tem acesso à chave privada associada à sua identidade pública.
• Gera uma chave de sessão efêmera usada para criptografar todas as comunicações futuras durante a sessão.
Esta troca (documentada com mais detalhes no protocolo de autenticação ) é negável offline , ou seja, é possível para qualquer parte falsificar transcrições desta troca de protocolo após o fato e, como tal - após o fato - é impossível provar definitivamente que a troca aconteceu de forma alguma.
Após o protocolo de autenticação, as duas partes podem trocar mensagens livremente.
Conversas em Grupo e Comunicação Ponto a Servidor
Ao iniciar uma conversa em grupo, é gerada uma chave aleatória para o grupo, conhecida como Group Key. Todas as comunicações do grupo são criptografadas usando esta chave. Além disso, o criador do grupo escolhe um servidor Cwtch para hospedar o grupo. Um convite é gerado, incluindo o Group Key, o servidor do grupo e a chave do grupo, para ser enviado aos potenciais membros.
Para enviar uma mensagem ao grupo, um perfil se conecta ao servidor do grupo e criptografa a mensagem usando a Group Key, gerando também uma assinatura sobre o Group ID, o servidor do grupo e a mensagem. Para receber mensagens do grupo, um perfil se conecta ao servidor e baixa as mensagens, tentando descriptografá-las usando a Group Key e verificando a assinatura.
Detalhamento do Ecossistema de Componentes
O Cwtch é composto por várias bibliotecas de componentes menores, cada uma desempenhando um papel específico. Algumas dessas bibliotecas incluem:
- abertoprivacidade/conectividade: Abstração de rede ACN, atualmente suportando apenas Tor.
- cwtch.im/tapir: Biblioteca para construção de aplicativos p2p em sistemas de comunicação anônimos.
- cwtch.im/cwtch: Biblioteca principal para implementação do protocolo/sistema Cwtch.
- cwtch.im/libcwtch-go: Fornece ligações C para Cwtch para uso em implementações de UI.
TAPIR: Uma Visão Detalhada
Projetado para substituir os antigos canais de ricochete baseados em protobuf, o Tapir fornece uma estrutura para a construção de aplicativos anônimos.
Está dividido em várias camadas:
• Identidade - Um par de chaves ed25519, necessário para estabelecer um serviço cebola Tor v3 e usado para manter uma identidade criptográfica consistente para um par.
• Conexões – O protocolo de rede bruto que conecta dois pares. Até agora, as conexões são definidas apenas através do Tor v3 Onion Services.
• Aplicativos - As diversas lógicas que permitem um determinado fluxo de informações em uma conexão. Os exemplos incluem transcrições criptográficas compartilhadas, autenticação, proteção contra spam e serviços baseados em tokens. Os aplicativos fornecem recursos que podem ser referenciados por outros aplicativos para determinar se um determinado peer tem a capacidade de usar um determinado aplicativo hospedado.
• Pilhas de aplicativos - Um mecanismo para conectar mais de um aplicativo, por exemplo, a autenticação depende de uma transcrição criptográfica compartilhada e o aplicativo peer cwtch principal é baseado no aplicativo de autenticação.
Identidade.
Um par de chaves ed25519, necessário para estabelecer um serviço cebola Tor v3 e usado para manter uma identidade criptográfica consistente para um peer.
InitializeIdentity - de um par de chaves conhecido e persistente:i,I
InitializeEphemeralIdentity - de um par de chaves aleatório: ie,Ie
Aplicativos de transcrição.
Inicializa uma transcrição criptográfica baseada em Merlin que pode ser usada como base de protocolos baseados em compromisso de nível superior
O aplicativo de transcrição entrará em pânico se um aplicativo tentar substituir uma transcrição existente por uma nova (aplicando a regra de que uma sessão é baseada em uma e apenas uma transcrição).
Merlin é uma construção de transcrição baseada em STROBE para provas de conhecimento zero. Ele automatiza a transformação Fiat-Shamir, para que, usando Merlin, protocolos não interativos possam ser implementados como se fossem interativos.
Isto é significativamente mais fácil e menos sujeito a erros do que realizar a transformação manualmente e, além disso, também fornece suporte natural para:
• protocolos multi-round com fases alternadas de commit e desafio;
• separação natural de domínios, garantindo que os desafios estejam vinculados às afirmações a serem provadas;
• enquadramento automático de mensagens, evitando codificação ambígua de dados de compromisso;
• e composição do protocolo, usando uma transcrição comum para vários protocolos.
Finalmente, o Merlin também fornece um gerador de números aleatórios baseado em transcrição como defesa profunda contra ataques de entropia ruim (como reutilização de nonce ou preconceito em muitas provas). Este RNG fornece aleatoriedade sintética derivada de toda a transcrição pública, bem como dos dados da testemunha do provador e uma entrada auxiliar de um RNG externo.
Conectividade Cwtch faz uso do Tor Onion Services (v3) para todas as comunicações entre nós.
Fornecemos o pacote openprivacy/connectivity para gerenciar o daemon Tor e configurar e desmontar serviços cebola através do Tor.
Criptografia e armazenamento de perfil.
Os perfis são armazenados localmente no disco e criptografados usando uma chave derivada de uma senha conhecida pelo usuário (via pbkdf2).
Observe que, uma vez criptografado e armazenado em disco, a única maneira de recuperar um perfil é recuperando a senha - como tal, não é possível fornecer uma lista completa de perfis aos quais um usuário pode ter acesso até inserir uma senha.
Perfis não criptografados e a senha padrão Para lidar com perfis "não criptografados" (ou seja, que não exigem senha para serem abertos), atualmente criamos um perfil com uma senha codificada de fato .
Isso não é o ideal, preferiríamos confiar no material de chave fornecido pelo sistema operacional, de modo que o perfil fosse vinculado a um dispositivo específico, mas esses recursos são atualmente uma colcha de retalhos - também notamos, ao criar um perfil não criptografado, pessoas que usam Cwtch estão explicitamente optando pelo risco de que alguém com acesso ao sistema de arquivos possa descriptografar seu perfil.
Vulnerabilidades Relacionadas a Imagens e Entrada de Dados
Imagens Maliciosas
O Cwtch enfrenta desafios na renderização de imagens, com o Flutter utilizando Skia, embora o código subjacente não seja totalmente seguro para a memória.
Realizamos testes de fuzzing nos componentes Cwtch e encontramos um bug de travamento causado por um arquivo GIF malformado, levando a falhas no kernel. Para mitigar isso, adotamos a política de sempre habilitar cacheWidth e/ou cacheHeight máximo para widgets de imagem.
Identificamos o risco de imagens maliciosas serem renderizadas de forma diferente em diferentes plataformas, como evidenciado por um bug no analisador PNG da Apple.
Riscos de Entrada de Dados
Um risco significativo é a interceptação de conteúdo ou metadados por meio de um Input Method Editor (IME) em dispositivos móveis. Mesmo aplicativos IME padrão podem expor dados por meio de sincronização na nuvem, tradução online ou dicionários pessoais.
Implementamos medidas de mitigação, como enableIMEPersonalizedLearning: false no Cwtch 1.2, mas a solução completa requer ações em nível de sistema operacional e é um desafio contínuo para a segurança móvel.
Servidor Cwtch.
O objetivo do protocolo Cwtch é permitir a comunicação em grupo através de infraestrutura não confiável .
Ao contrário dos esquemas baseados em retransmissão, onde os grupos atribuem um líder, um conjunto de líderes ou um servidor confiável de terceiros para garantir que cada membro do grupo possa enviar e receber mensagens em tempo hábil (mesmo que os membros estejam offline) - infraestrutura não confiável tem o objetivo de realizar essas propriedades sem a suposição de confiança.
O artigo original do Cwtch definia um conjunto de propriedades que se esperava que os servidores Cwtch fornecessem:
• O Cwtch Server pode ser usado por vários grupos ou apenas um.
• Um servidor Cwtch, sem a colaboração de um membro do grupo, nunca deve aprender a identidade dos participantes de um grupo.
• Um servidor Cwtch nunca deve aprender o conteúdo de qualquer comunicação.
• Um servidor Cwtch nunca deve ser capaz de distinguir mensagens como pertencentes a um grupo específico. Observamos aqui que essas propriedades são um superconjunto dos objetivos de design das estruturas de Recuperação de Informações Privadas.
Melhorias na Eficiência e Segurança
Eficiência do Protocolo
Atualmente, apenas um protocolo conhecido, o PIR ingênuo, atende às propriedades desejadas para garantir a privacidade na comunicação do grupo Cwtch. Este método tem um impacto direto na eficiência da largura de banda, especialmente para usuários em dispositivos móveis. Em resposta a isso, estamos ativamente desenvolvendo novos protocolos que permitem negociar garantias de privacidade e eficiência de maneiras diversas.
Os servidores, no momento desta escrita, permitem o download completo de todas as mensagens armazenadas, bem como uma solicitação para baixar mensagens específicas a partir de uma determinada mensagem. Quando os pares ingressam em um grupo em um novo servidor, eles baixam todas as mensagens do servidor inicialmente e, posteriormente, apenas as mensagens novas.
Mitigação de Análise de Metadados
Essa abordagem permite uma análise moderada de metadados, pois o servidor pode enviar novas mensagens para cada perfil suspeito exclusivo e usar essas assinaturas de mensagens exclusivas para rastrear sessões ao longo do tempo. Essa preocupação é mitigada por dois fatores:
- Os perfis podem atualizar suas conexões a qualquer momento, resultando em uma nova sessão do servidor.
- Os perfis podem ser "ressincronizados" de um servidor a qualquer momento, resultando em uma nova chamada para baixar todas as mensagens. Isso é comumente usado para buscar mensagens antigas de um grupo.
Embora essas medidas imponham limites ao que o servidor pode inferir, ainda não podemos garantir resistência total aos metadados. Para soluções futuras para esse problema, consulte Niwl.
Proteção contra Pares Maliciosos
Os servidores enfrentam o risco de spam gerado por pares, representando uma ameaça significativa à eficácia do sistema Cwtch. Embora tenhamos implementado um mecanismo de proteção contra spam no protótipo do Cwtch, exigindo que os pares realizem alguma prova de trabalho especificada pelo servidor, reconhecemos que essa não é uma solução robusta na presença de um adversário determinado com recursos significativos.
Pacotes de Chaves
Os servidores Cwtch se identificam por meio de pacotes de chaves assinados, contendo uma lista de chaves necessárias para garantir a segurança e resistência aos metadados na comunicação do grupo Cwtch. Esses pacotes de chaves geralmente incluem três chaves: uma chave pública do serviço Tor v3 Onion para o Token Board, uma chave pública do Tor v3 Onion Service para o Token Service e uma chave pública do Privacy Pass.
Para verificar os pacotes de chaves, os perfis que os importam do servidor utilizam o algoritmo trust-on-first-use (TOFU), verificando a assinatura anexada e a existência de todos os tipos de chave. Se o perfil já tiver importado o pacote de chaves do servidor anteriormente, todas as chaves são consideradas iguais.
Configuração prévia do aplicativo para ativar o Relé do Cwtch.
No Android, a hospedagem de servidor não está habilitada, pois essa opção não está disponível devido às limitações dos dispositivos Android. Essa funcionalidade está reservada apenas para servidores hospedados em desktops.
No Android, a única forma direta de importar uma chave de servidor é através do grupo de teste Cwtch, garantindo assim acesso ao servidor Cwtch.
Primeiro passo é Habilitar a opção de grupo no Cwtch que está em fase de testes. Clique na opção no canto superior direito da tela de configuração e pressione o botão para acessar as configurações do Cwtch.
Você pode alterar o idioma para Português do Brasil.Depois, role para baixo e selecione a opção para ativar os experimentos. Em seguida, ative a opção para habilitar o chat em grupo e a pré-visualização de imagens e fotos de perfil, permitindo que você troque sua foto de perfil.
https://link.storjshare.io/raw/jvss6zxle26jdguwaegtjdixhfka/production/f0ca039733d48895001261ab25c5d2efbaf3bf26e55aad3cce406646f9af9d15.MP4
Próximo passo é Criar um perfil.
Pressione o + botão de ação no canto inferior direito e selecione "Novo perfil" ou aberta no botão + adicionar novo perfil.
-
Selecione um nome de exibição
-
Selecione se deseja proteger
este perfil e salvo localmente com criptografia forte: Senha: sua conta está protegida de outras pessoas que possam usar este dispositivo
Sem senha: qualquer pessoa que tenha acesso a este dispositivo poderá acessar este perfil.
Preencha sua senha e digite-a novamente
Os perfis são armazenados localmente no disco e criptografados usando uma chave derivada de uma senha conhecida pelo usuário (via pbkdf2).
Observe que, uma vez criptografado e armazenado em disco, a única maneira de recuperar um perfil é recuperando a chave da senha - como tal, não é possível fornecer uma lista completa de perfis aos quais um usuário pode ter acesso até inserir um senha.
https://link.storjshare.io/raw/jxqbqmur2lcqe2eym5thgz4so2ya/production/8f9df1372ec7e659180609afa48be22b12109ae5e1eda9ef1dc05c1325652507.MP4
O próximo passo é adicionar o FuzzBot, que é um bot de testes e de desenvolvimento.
Contato do FuzzBot: 4y2hxlxqzautabituedksnh2ulcgm2coqbure6wvfpg4gi2ci25ta5ad.
Ao enviar o comando "testgroup-invite" para o FuzzBot, você receberá um convite para entrar no Grupo Cwtch Test. Ao ingressar no grupo, você será automaticamente conectado ao servidor Cwtch. Você pode optar por sair do grupo a qualquer momento ou ficar para conversar e tirar dúvidas sobre o aplicativo e outros assuntos. Depois, você pode configurar seu próprio servidor Cwtch, o que é altamente recomendável.
https://link.storjshare.io/raw/jvji25zclkoqcouni5decle7if7a/production/ee3de3540a3e3dca6e6e26d303e12c2ef892a5d7769029275b8b95ffc7468780.MP4
Agora você pode utilizar o aplicativo normalmente. Algumas observações que notei: se houver demora na conexão com outra pessoa, ambas devem estar online. Se ainda assim a conexão não for estabelecida, basta clicar no ícone de reset do Tor para restabelecer a conexão com a outra pessoa.
Uma introdução aos perfis Cwtch.
Com Cwtch você pode criar um ou mais perfis . Cada perfil gera um par de chaves ed25519 aleatório compatível com a Rede Tor.
Este é o identificador que você pode fornecer às pessoas e que elas podem usar para entrar em contato com você via Cwtch.
Cwtch permite criar e gerenciar vários perfis separados. Cada perfil está associado a um par de chaves diferente que inicia um serviço cebola diferente.
Gerenciar Na inicialização, o Cwtch abrirá a tela Gerenciar Perfis. Nessa tela você pode:
- Crie um novo perfil.
- Desbloquear perfis.
- Criptografados existentes.
- Gerenciar perfis carregados.
- Alterando o nome de exibição de um perfil.
- Alterando a senha de um perfil Excluindo um perfil.
- Alterando uma imagem de perfil.
Backup ou exportação de um perfil.
Na tela de gerenciamento de perfil:
-
Selecione o lápis ao lado do perfil que você deseja editar
-
Role para baixo até a parte inferior da tela.
-
Selecione "Exportar perfil"
-
Escolha um local e um nome de arquivo.
5.confirme.
Uma vez confirmado, o Cwtch colocará uma cópia do perfil no local indicado. Este arquivo é criptografado no mesmo nível do perfil.
Este arquivo pode ser importado para outra instância do Cwtch em qualquer dispositivo.
Importando um perfil.
-
Pressione o +botão de ação no canto inferior direito e selecione "Importar perfil"
-
Selecione um arquivo de perfil Cwtch exportado para importar
-
Digite a senha associada ao perfil e confirme.
Uma vez confirmado, o Cwtch tentará descriptografar o arquivo fornecido usando uma chave derivada da senha fornecida. Se for bem-sucedido, o perfil aparecerá na tela Gerenciamento de perfil e estará pronto para uso.
OBSERVAÇÃO Embora um perfil possa ser importado para vários dispositivos, atualmente apenas uma versão de um perfil pode ser usada em todos os dispositivos ao mesmo tempo. As tentativas de usar o mesmo perfil em vários dispositivos podem resultar em problemas de disponibilidade e falhas de mensagens.
Qual é a diferença entre uma conexão ponto a ponto e um grupo cwtch?
As conexões ponto a ponto Cwtch permitem que 2 pessoas troquem mensagens diretamente. As conexões ponto a ponto nos bastidores usam serviços cebola Tor v3 para fornecer uma conexão criptografada e resistente a metadados. Devido a esta conexão direta, ambas as partes precisam estar online ao mesmo tempo para trocar mensagens.
Os Grupos Cwtch permitem que várias partes participem de uma única conversa usando um servidor não confiável (que pode ser fornecido por terceiros ou auto-hospedado). Os operadores de servidores não conseguem saber quantas pessoas estão em um grupo ou o que está sendo discutido. Se vários grupos estiverem hospedados em um único servidor, o servidor não conseguirá saber quais mensagens pertencem a qual grupo sem a conivência de um membro do grupo. Ao contrário das conversas entre pares, as conversas em grupo podem ser conduzidas de forma assíncrona, para que todos num grupo não precisem estar online ao mesmo tempo.
Por que os grupos cwtch são experimentais? Mensagens em grupo resistentes a metadados ainda são um problema em aberto . Embora a versão que fornecemos no Cwtch Beta seja projetada para ser segura e com metadados privados, ela é bastante ineficiente e pode ser mal utilizada. Como tal, aconselhamos cautela ao usá-lo e apenas o fornecemos como um recurso opcional.
Como posso executar meu próprio servidor Cwtch? A implementação de referência para um servidor Cwtch é de código aberto . Qualquer pessoa pode executar um servidor Cwtch, e qualquer pessoa com uma cópia do pacote de chaves públicas do servidor pode hospedar grupos nesse servidor sem que o operador tenha acesso aos metadados relacionados ao grupo .
https://git.openprivacy.ca/cwtch.im/server
https://docs.openprivacy.ca/cwtch-security-handbook/server.html
Como posso desligar o Cwtch? O painel frontal do aplicativo possui um ícone do botão "Shutdown Cwtch" (com um 'X'). Pressionar este botão irá acionar uma caixa de diálogo e, na confirmação, o Cwtch será desligado e todos os perfis serão descarregados.
Suas doações podem fazer a diferença no projeto Cwtch? O Cwtch é um projeto dedicado a construir aplicativos que preservam a privacidade, oferecendo comunicação de grupo resistente a metadados. Além disso, o projeto também desenvolve o Cofre, formulários da web criptografados para ajudar mútua segura. Suas contribuições apoiam iniciativas importantes, como a divulgação de violações de dados médicos em Vancouver e pesquisas sobre a segurança do voto eletrônico na Suíça. Ao doar, você está ajudando a fechar o ciclo, trabalhando com comunidades marginalizadas para identificar e corrigir lacunas de privacidade. Além disso, o projeto trabalha em soluções inovadoras, como a quebra de segredos através da criptografia de limite para proteger sua privacidade durante passagens de fronteira. E também tem a infraestrutura: toda nossa infraestrutura é open source e sem fins lucrativos. Conheça também o Fuzzytags, uma estrutura criptográfica probabilística para marcação resistente a metadados. Sua doação é crucial para continuar o trabalho em prol da privacidade e segurança online. Contribua agora com sua doação
https://openprivacy.ca/donate/
onde você pode fazer sua doação em bitcoin e outras moedas, e saiba mais sobre os projetos. https://openprivacy.ca/work/
Link sobre Cwtch
https://cwtch.im/
https://git.openprivacy.ca/cwtch.im/cwtch
https://docs.cwtch.im/docs/intro
https://docs.openprivacy.ca/cwtch-security-handbook/
Baixar #CwtchDev
cwtch.im/download/
https://play.google.com/store/apps/details?id=im.cwtch.flwtch
-
@ a95c6243:d345522c
2025-01-13 10:09:57Ich begann, Social Media aufzubauen, \ um den Menschen eine Stimme zu geben. \ Mark Zuckerberg
Sind euch auch die Tränen gekommen, als ihr Mark Zuckerbergs Wendehals-Deklaration bezüglich der Meinungsfreiheit auf seinen Portalen gehört habt? Rührend, oder? Während er früher die offensichtliche Zensur leugnete und später die Regierung Biden dafür verantwortlich machte, will er nun angeblich «die Zensur auf unseren Plattformen drastisch reduzieren».
«Purer Opportunismus» ob des anstehenden Regierungswechsels wäre als Klassifizierung viel zu kurz gegriffen. Der jetzige Schachzug des Meta-Chefs ist genauso Teil einer kühl kalkulierten Business-Strategie, wie es die 180 Grad umgekehrte Praxis vorher war. Social Media sind ein höchst lukratives Geschäft. Hinzu kommt vielleicht noch ein bisschen verkorkstes Ego, weil derartig viel Einfluss und Geld sicher auch auf die Psyche schlagen. Verständlich.
«Es ist an der Zeit, zu unseren Wurzeln der freien Meinungsäußerung auf Facebook und Instagram zurückzukehren. Ich begann, Social Media aufzubauen, um den Menschen eine Stimme zu geben», sagte Zuckerberg.
Welche Wurzeln? Hat der Mann vergessen, dass er von der Überwachung, dem Ausspionieren und dem Ausverkauf sämtlicher Daten und digitaler Spuren sowie der Manipulation seiner «Kunden» lebt? Das ist knallharter Kommerz, nichts anderes. Um freie Meinungsäußerung geht es bei diesem Geschäft ganz sicher nicht, und das war auch noch nie so. Die Wurzeln von Facebook liegen in einem Projekt des US-Militärs mit dem Namen «LifeLog». Dessen Ziel war es, «ein digitales Protokoll vom Leben eines Menschen zu erstellen».
Der Richtungswechsel kommt allerdings nicht überraschend. Schon Anfang Dezember hatte Meta-Präsident Nick Clegg von «zu hoher Fehlerquote bei der Moderation» von Inhalten gesprochen. Bei der Gelegenheit erwähnte er auch, dass Mark sehr daran interessiert sei, eine aktive Rolle in den Debatten über eine amerikanische Führungsrolle im technologischen Bereich zu spielen.
Während Milliardärskollege und Big Tech-Konkurrent Elon Musk bereits seinen Posten in der kommenden Trump-Regierung in Aussicht hat, möchte Zuckerberg also nicht nur seine Haut retten – Trump hatte ihn einmal einen «Feind des Volkes» genannt und ihm lebenslange Haft angedroht –, sondern am liebsten auch mitspielen. KI-Berater ist wohl die gewünschte Funktion, wie man nach einem Treffen Trump-Zuckerberg hörte. An seine Verhaftung dachte vermutlich auch ein weiterer Multimilliardär mit eigener Social Media-Plattform, Pavel Durov, als er Zuckerberg jetzt kritisierte und gleichzeitig warnte.
Politik und Systemmedien drehen jedenfalls durch – was zu viel ist, ist zu viel. Etwas weniger Zensur und mehr Meinungsfreiheit würden die Freiheit der Bürger schwächen und seien potenziell vernichtend für die Menschenrechte. Zuckerberg setze mit dem neuen Kurs die Demokratie aufs Spiel, das sei eine «Einladung zum nächsten Völkermord», ernsthaft. Die Frage sei, ob sich die EU gegen Musk und Zuckerberg behaupten könne, Brüssel müsse jedenfalls hart durchgreifen.
Auch um die Faktenchecker macht man sich Sorgen. Für die deutsche Nachrichtenagentur dpa und die «Experten» von Correctiv, die (noch) Partner für Fact-Checking-Aktivitäten von Facebook sind, sei das ein «lukratives Geschäftsmodell». Aber möglicherweise werden die Inhalte ohne diese vermeintlichen Korrektoren ja sogar besser. Anders als Meta wollen jedoch Scholz, Faeser und die Tagesschau keine Fehler zugeben und zum Beispiel Correctiv-Falschaussagen einräumen.
Bei derlei dramatischen Befürchtungen wundert es nicht, dass der öffentliche Plausch auf X zwischen Elon Musk und AfD-Chefin Alice Weidel von 150 EU-Beamten überwacht wurde, falls es irgendwelche Rechtsverstöße geben sollte, die man ihnen ankreiden könnte. Auch der Deutsche Bundestag war wachsam. Gefunden haben dürften sie nichts. Das Ganze war eher eine Show, viel Wind wurde gemacht, aber letztlich gab es nichts als heiße Luft.
Das Anbiedern bei Donald Trump ist indes gerade in Mode. Die Weltgesundheitsorganisation (WHO) tut das auch, denn sie fürchtet um Spenden von über einer Milliarde Dollar. Eventuell könnte ja Elon Musk auch hier künftig aushelfen und der Organisation sowie deren größtem privaten Förderer, Bill Gates, etwas unter die Arme greifen. Nachdem Musks KI-Projekt xAI kürzlich von BlackRock & Co. sechs Milliarden eingestrichen hat, geht da vielleicht etwas.
Dieser Beitrag ist zuerst auf Transition News erschienen.
-
@ ed84ce10:cccf4c2a
2025-01-13 06:48:470. BUIDL AI
In the age of AI, where technology moves faster than our ability to comprehend its implications, DoraHacks stands at the intersection of creation and disruption. It is not just a platform; it is a movement—a global network of individuals solving fascinating problems, building the boldest ideas, and pushing the limits of what’s possible. DoraHacks is also on a trajectory to become the most significant Agentic Community Platform in the world, automating hackathons, and open-source communities across the globe.
1. Everyone will be a Hacker
Let’s start with a fundamental shift in understanding. The term “hacker” has long been burdened by the weight of misconception. Too often, it evokes images of shady figures hunched over keyboards, hacking into systems in the dead of night. But in truth, the hacker is something entirely different—and far more important.
A hacker is a builder. A creator. Someone who, when faced with a problem, doesn’t wait for permission or perfect conditions. Instead, they use ingenuity, resourcefulness, and relentless curiosity to solve it.
When DoraHacks launched in 2014, it embraced this ethos wholeheartedly. Its mission was to unite hackers worldwide to tackle humanity’s most pressing challenges. These hackers weren’t confined to coders; they included designers, entrepreneurs, scientists, and anyone driven by a desire to create meaningful change.
Fast forward to 2025, and we’re witnessing a seismic shift in how work and innovation are done. AI is automating the repetitive and mundane, from office tasks to driving, freeing humanity to focus on the creative and the essential. In this new world, everyone will be a hacker—leveraging AI to build, design, and solve problems that matter. DoraHacks, already the world’s largest hacker ecosystem with over 200,000 builders, is perfectly positioned to scale this movement a thousandfold.
2. From Hacker Movement to Freedom of BUIDL
DoraHacks has always been a platform for builders, but its vision extends far beyond hackathons and prize pools. At its core lies a principle that has the power to reshape the world: Freedom of BUIDL.
Freedom of BUIDL is more than the ability to create. It is the removal of barriers—geographical, financial, institutional—that prevent people from realizing their potential. The extraordinary success of Silicon Valley over the last century was built on precisely this freedom: a culture and infrastructure that allowed the world’s brightest minds to converge, collaborate, and innovate without limits.
However, this opportunity is not distributed equally. A young builder in rural Africa, a student in Southeast Asia, or a refugee in Europe may have the talent and drive to build transformative solutions but lack the resources or networks to do so. DoraHacks aims to democratize innovation by creating a global platform where anyone, anywhere, can participate in the Freedom of BUIDL.
Consider this: a team in Nairobi uses AI to design sustainable energy grids, collaborating with developers in Berlin and advisors in Silicon Valley—all made possible by DoraHacks. This is not the future; it’s happening now. And it’s just the beginning.
3. The Cutting Edge of the Cutting Edge
What makes DoraHacks unique is not just its scale but its relentless focus on the frontier of open-source technology. From application-specific blockchains to quantum computing software infrastructures and open-source space technology, DoraHacks has consistently championed what’s next.
In 2025, projects using decentralized governance models powered by intelligent agents will begin to emerge, transforming the way open-source communities coordinate and the way new technologies accelerate, from consumer appchains to decentralized social media, from memes to quantum software, from biohacks to open-source space tech.
In the years to come, DoraHacks has the potential be the birthplace of many of the world’s most transformative open-source platform technologies. It will be the launchpad for breakthroughs that redefine how we live, work, and connect.
4. BUIDL AI: The Intelligence Behind the Ecosystem
At the heart of this transformation lies BUIDL AI, one of DoraHacks’ most ambitious undertakings yet. As the hacker ecosystem grows, so too does the complexity of its needs. Builders require mentorship, funding, collaborators, and access to cutting-edge tools. BUIDL AI is the intelligence layer that makes this possible.
Imagine an AI that doesn’t just analyze trends but anticipates them, matching hackers with the exact resources, mentors, and collaborators they need at the right time, helping them to join the BUIDL teams that best fit their skill sets and aspirations. Imagine a system that optimizes resource allocation across tens of thousands of projects, ensuring that the most promising ideas get the support they deserve. This is not speculative; it’s the foundation DoraHacks is building today.
As these tools mature, they will enable DoraHacks to evolve into a full-fledged Agentic Community Platform—one that operates with the intelligence, speed, and adaptability required to shape the future.
5. Conclusion: Building for the Builders of Tomorrow
When the creators of Doraemon imagined a robot that could solve any problem, they were unknowingly inspiring a generation to dream bigger. Today, DoraHacks takes up that mantle, not as fiction but as a reality: a platform where the builders of the future are empowered to create the tools, technologies, and systems that will change everything.
We stand at the crossroads of a new era. AI, blockchain, and quantum computing are converging, new frontiers are opening, and the opportunities are boundless. DoraHacks will be there, championing the hackers, builders, and dreamers who dare to take humanity’s next leap forward.
In the end, the future belongs to the builders. And the world they build will be extraordinary.
-
@ e0921d61:e0fe7bd5
2025-01-13 06:22:15My reading list for 2025 consists of 15 books in 4 categories
- Islam
- Economics
- Civilization/History
- And René Guénon gets his own category 😂
Economics list:
- Epistemological Problems of Economics by Ludwig von Mises
The title seems intriguing and I've been meaning to read this for a while. My favorite chapter in human action is the one where Mises talks about the epistemological problems, so I'm hoping he expands on it here.
- Abundance, Generosity, and the State: An Inquiry into Economic Principles by Jörg Guido Hülsmann
This is from the same author that wrote one of my all time favorite "Bitcoin book", the Ethics of Money Production. This one explores charity from the Austrian perspective, and there's a really good podcast episode that Steophan Livera did with Hülsmann about this book.
- The Economics and Ethics of Private Property: Studies in Political Economy and Philosophy by Hans-Hermann Hoppe
I'm planning to read every Hoppe book, so this one had to go on the list.
- Why Minsky Matters: An Introduction to the Work of a Maverick Economist by L. Randall Wray
I've been meaning to read this for a while now, it was recommend to me by Ibn Maghrebi (nostr:npub1chmhgx9nwxdpwv6jj6qs257fwzrhtsjh2egvyvqq3rmzfy8cd5fq4nr4y5). Looks interesting and I wonder how similar Minsky's views are compared to Austrian Economics.
Islam list
- Reforming Modernity: Ethics and the New Human in the Philosophy of Abdurrahman Taha by Wael Hallaq
I want to read more Hallaq since reading the Impossible State, and this seems like something I'd enjoy, and it supposedly helps bring more context for the next book in this list.
- God's property: Islam, Charity, and the Modern State by Nada Moumtaz
I've had this book in my reading list for a while. The history of charity in Islamic civilizations is a fascinating topic to me.
- Islam between East and West 'Aiija 'Ali Izetbegovic
I actually don't know anything about this book other than seeing many folks on MT reference it a lot. Seems like something I must read.
- The Reconstruction of Religious Thought in Islam by Muhammad Iqbal
Got this one off the SAIF reading list.
Civilization/History List
- Energy and Civilization: A History by Vaclav Smil
Seems like an interesting book about energy
- Dirt: The Erosion of Civilizations by David R. Montgomery
I've had this on my reading list for a while, and I find the subject of soil to be fascinating. Seems interesting.
- The Muqaddimah: An Introduction to History by Ibn Khaldun
I'm ashamed to admit that I still haven't read this book. It's referenced a lot in other books talking about history and civilization. It's time for me to read this.
- The Time of the Bedouin: on the Politics of power by Ian Dallas
Ian Dallas is Shaykh Abdalqadir As-Sufi, and I want to read more of his works, as he understood the scope and nature of the Riba money problem long before I was even born!
René Guénon list
I've been meaning to read Guénon for a while now, and I don't know much about his philosophy but I've liked the few quotes I've read on certain Twitter threads. I'm very interested in how he approaches criticizing modernity.
- East and West
- The Crisis of the Modern World
- The Reign of Quantity & the Signs of the Times
And that's it. I'm hopeful I can get through all 15 books this year inshaAllah.
-
@ 7e538978:a5987ab6
2024-10-02 13:57:31Chain Duel, a fast paced PvP game that takes inspiration from the classic snake game and supercharges it with Bitcoin’s Lightning Network. Imagine battling another player for dominance in a race to collect blocks, where the length of your chain isn’t just a visual cue. It represents real, staked satoshis. The player with the most Proof of Work wins, but it’s not just about gameplay; it’s about the seamless integration of the Lightning Network and real-time payments.
But how does Chain Duel manage these instant transactions with such efficiency? That’s where LNbits comes in. LNbits, an open-source wallet and payment infrastructure, handles all in-game payments making it easy for developers to focus on gameplay while LNbits takes care of everything from microtransactions to automated splits for developers and designers. In this article, we’ll dive deep into how Chain Duel leverages LNbits to streamline in-game payments and how other developers can take advantage of this powerful toolset to build the future of Lightning-powered gaming.
Let’s explore how LNbits transforms payment processing and why it’s quickly becoming a must-have for game developers working in the Bitcoin space.
Overview of Chain Duel
Chain Duel is a unique Lightning Network-inspired game that reimagines the classic snake game with a competitive twist, integrating real-time payments. Two players face off in real-time, racing to "catch" blocks and extend their chains. Each block added to the chain represents Proof of Work, and the player with the most Proof of Work wins the duel. The stakes are high, as the game represents satoshis (small units of Bitcoin) as points, with the winner taking home the prize.
The game is designed to be Lightning-native, meaning all payments within Chain Duel are processed through the Lightning Network. This ensures fast payments, reducing latency and making gameplay smooth. With additional features like practice mode, tournaments and highscores, Chain Duel creates an engaging and competitive environment for Bitcoin enthusiasts and gamers alike.
One of the standout aspects of Chain Duel is its deeper integration with the Lightning Network even at a design level. For example, actual Bitcoin blocks can appear on screen during matches, offering bonus points when mined in sync with the game. The game’s current version, still in beta, has already drawn attention within the Bitcoin community, gaining momentum at conferences and with a growing user base through its social networks. With its innovative combination of gaming, the Lightning Network, and competitive play, Chain Duel offers a glimpse into the future of Lightning-based gaming.
How LNbits is Used in Chain Duel
Seamless Integration with LNbits
At the core of Chain Duel’s efficient payment processing is LNbits, which handles in-game transactions smoothly and reliably. Chain Duel uses the LNbits LNURL-pay and LNURL-withdraw extensions to manage payments and rewards between players. Before each match, players send satoshis using LNURL-pay, which generates a static QR code or link for making the payment. LNURL-pay allows users to attach a note to the payment, which Chain Duel creatively uses as a way to insert the player name in-game. The simplicity of LNURL-pay ensures that users can quickly and easily initiate games, with fresh invoices being issued for every game. When players win, LNURL-withdraw enables them to seamlessly pull their earnings from the game, providing a quick payout system.
These extensions make it easy for players to send and receive Bitcoin with minimal latency, fully leveraging the power of the Lightning Network for fast and low-cost payments. The flexibility of LNbits’ tools means that game developers don’t need to worry about building custom payment systems from scratch—they can rely on LNbits to handle all financial transactions with precision.
Lightning Tournaments
Chain Duel tournaments leverage LNbits and its LNURL extensions to create a seamless and efficient experience for players. In Chain Duel tournaments, LNbits plays a crucial role in managing the overall economics. LNbits facilitates the generation of LNURL QR codes that participants can scan to register quickly or withdraw their winnings. LNbits allows Chain Duel to automatically handle multiple registrations through LNURL-pay, enabling players to participate in the tournament without additional steps. The Lightning Network's speed ensures that these payments occur in real-time, reducing wait times and allowing for a smoother flow in-game.
Splitting Payments
LNbits further simplifies revenue-sharing within Chain Duel. This feature allows the game to automatically split the satoshis sent by players into different shares for the game’s developer, designer, and host. Each time a payment is made to join a match, LNbits is used to automattically pay each of the contributors, according to pre-defined rules. This automated process ensures that everyone involved in the development and running of the game gets their fair share without manual intervention or complex bookkeeping.
Nostr Integration
Chain Duel also integrates with Nostr, a decentralized protocol for social interactions. Players can join games using "Zaps", small tips or micropayments sent over the Lightning Network within the Nostr ecosystem. Through NIP-57, which enables Nostr clients to request Zap invoices, players can use LNURL-pay enabled Zaps to register in P2P matches, further enhancing the Chain Duel experience. By using Zaps as a way to register in-game, Chain Duel automates the process of fetching players' identity, creating a more competitive and social experience. Zaps are public on the Nostr network, further expanding Chain Duel's games social reach and community engagement.
Game and Payment Synchronization
One of the key reasons Chain Duel developers chose LNbits is its powerful API that connects directly with the game’s logic. LNbits allows the game to synchronize payments with gameplay in real-time, providing a seamless experience where payments are an integrated part of the gaming mechanics.
With LNbits managing both the payment process and the Lightning Network’s complex infrastructure, Chain Duel developers are free to concentrate on enhancing the competitive and Lightning Network-related aspects of the game. This division of tasks is essential for streamlining development while still providing an innovative in-game payment experience that is deeply integrated with the Bitcoin network.
LNbits proves to be an indispensable tool for Chain Duel, enabling smooth in-game transactions, real-time revenue sharing, and seamless integration with Nostr. For developers looking to build Lightning-powered games, LNbits offers a powerful suite of tools that handle everything from micropayments to payment distribution—ensuring that the game's focus remains on fun and competition rather than complex payment systems.
LNBits facilitating Education and Adoption
This system contributes to educating users on the power of the Lightning Network. Since Chain Duel directly involve real satoshis and LNURL for registration and rewards, players actively experience how Lightning can facilitate fast, cheap, and permissionless payments. By incorporating LNbits into Chain Duel, the game serves as an educational tool that introduces users to the benefits of the Lightning Network. Players gain direct experience using Lightning wallets and LNURL, helping them understand how these tools work in real-world scenarios. The near-instant nature of these payments showcases the power of Lightning in a practical context, highlighting its potential beyond just gaming. Players are encouraged to set up wallets, explore the Lightning ecosystem, and eventually become familiar with Bitcoin and Lightning technology. By integrating LNbits, Chain Duel transforms in-game payments into a learning opportunity, making Bitcoin and Lightning more approachable for users worldwide.
Tools for Developers
LNbits is a versatile, open-source platform designed to simplify and enhance Bitcoin Lightning Network wallet management. For developers, particularly those working on Lightning-native games like Chain Duel, LNbits offers an invaluable set of tools that allow for seamless integration of Lightning payments without the need to build complex custom solutions from scratch. LNbits is built on a modular and extensible architecture, enabling developers to easily add or create functionality suited to their project’s needs.
Extensible Architecture for Customization
At the core of LNbits is a simple yet powerful wallet system that developers can access across multiple devices. What makes LNbits stand out is its extensible nature—everything beyond the core functionality is implemented as an extension. This modular approach allows users to customize their LNbits installation by enabling or building extensions to suit specific use cases. This flexibility is perfect for developers who want to add Lightning-based services to their games or apps without modifying the core codebase.
- Extensions for Every Use Case
LNbits comes with a wide array of built-in extensions created by contributors, offering various services that can be plugged into your application. Some popular extensions include: - Faucets: Distribute small amounts of Bitcoin to users for testing or promotional purposes.
- Paylinks: Create shareable links for instant payments.
- Points-of-sale (PoS): Allow users to set up shareable payment terminals.
- Paywalls: Charge users to access content or services.
- Event tickets: Sell tickets for events directly via Lightning payments.
- Games and services: From dice games to jukeboxes, LNbits offers entertaining and functional tools.
These ready-made solutions can be adapted and used in different gaming scenarios, for example in Chain Duel, where LNURL extensions are used for in game payments. The extensibility ensures developers can focus on building engaging gameplay while LNbits handles payment flows.
Developer-Friendly Customization
LNbits isn't just a plug-and-play platform. Developers can extend its functionality even further by creating their own extensions, giving full control over how the wallet system is integrated into their games or apps. The architecture is designed to make it easy for developers to build on top of the platform, adding custom features for specific requirements.
Flexible Funding Source Management
LNbits also offers flexibility in terms of managing funding sources. Developers can easily connect LNbits to various Lightning Network node implementations, enabling seamless transitions between nodes or even different payment systems. This allows developers to switch underlying funding sources with minimal effort, making LNbits adaptable for games that may need to scale quickly or rely on different payment infrastructures over time.
A Lean Core System for Maximum Efficiency
Thanks to its modular architecture, LNbits maintains a lean core system. This reduces complexity and overhead, allowing developers to implement only the features they need. By avoiding bloated software, LNbits ensures faster transactions and less resource consumption, which is crucial in fast-paced environments like Chain Duel where speed and efficiency are paramount.
LNbits is designed with developers in mind, offering a suite of tools and a flexible infrastructure that makes integrating Bitcoin payments easy. Whether you’re developing games, apps, or any service that requires Lightning Network transactions, LNbits is a powerful, open-source solution that can be adapted to fit your project.
Conclusion
Chain Duel stands at the forefront of Lightning-powered gaming, combining the excitement of competitive PvP with the speed and efficiency of the Lightning Network. With LNbits handling all in-game payments, from microtransactions to automated revenue splits, developers can focus entirely on crafting an engaging gaming experience. LNbits’ powerful API and extensions make it easy to manage real-time payments, removing the complexity of building payment infrastructure from scratch.
LNbits isn’t just a payment tool — it’s a flexible, developer-friendly platform that can be adapted to any gaming model. Whether you're developing a fast-paced PvP game like Chain Duel or any project requiring seamless Lightning Network integration, LNbits provides the ideal solution for handling instant payments with minimal overhead.
For developers interested in pushing the boundaries of Lightning-powered gaming, Chain Duel is a great example of how LNbits can enhance your game, letting you focus on the fun while LNbits manages real-time transactions.
Find out more
Curious about how Lightning Network payments can power your next game? Explore the following:
- Learn more about Chain Duel: Chain Duel
- Learn how LNbits can simplify payment handling in your project: LNbits
- Dive into decentralized communication with Nostr: Nostr
- Extensions for Every Use Case
-
@ a95c6243:d345522c
2025-01-03 20:26:47Was du bist hängt von drei Faktoren ab: \ Was du geerbt hast, \ was deine Umgebung aus dir machte \ und was du in freier Wahl \ aus deiner Umgebung und deinem Erbe gemacht hast. \ Aldous Huxley
Das brave Mitmachen und Mitlaufen in einem vorgegebenen, recht engen Rahmen ist gewiss nicht neu, hat aber gerade wieder mal Konjunktur. Dies kann man deutlich beobachten, eigentlich egal, in welchem gesellschaftlichen Bereich man sich umschaut. Individualität ist nur soweit angesagt, wie sie in ein bestimmtes Schema von «Diversität» passt, und Freiheit verkommt zur Worthülse – nicht erst durch ein gewisses Buch einer gewissen ehemaligen Regierungschefin.
Erklärungsansätze für solche Entwicklungen sind bekannt, und praktisch alle haben etwas mit Massenpsychologie zu tun. Der Herdentrieb, also der Trieb der Menschen, sich – zum Beispiel aus Unsicherheit oder Bequemlichkeit – lieber der Masse anzuschließen als selbstständig zu denken und zu handeln, ist einer der Erklärungsversuche. Andere drehen sich um Macht, Propaganda, Druck und Angst, also den gezielten Einsatz psychologischer Herrschaftsinstrumente.
Aber wollen die Menschen überhaupt Freiheit? Durch Gespräche im privaten Umfeld bin ich diesbezüglich in der letzten Zeit etwas skeptisch geworden. Um die Jahreswende philosophiert man ja gerne ein wenig über das Erlebte und über die Erwartungen für die Zukunft. Dabei hatte ich hin und wieder den Eindruck, die totalitären Anwandlungen unserer «Repräsentanten» kämen manchen Leuten gerade recht.
«Desinformation» ist so ein brisantes Thema. Davor müsse man die Menschen doch schützen, hörte ich. Jemand müsse doch zum Beispiel diese ganzen merkwürdigen Inhalte in den Social Media filtern – zur Ukraine, zum Klima, zu Gesundheitsthemen oder zur Migration. Viele wüssten ja gar nicht einzuschätzen, was richtig und was falsch ist, sie bräuchten eine Führung.
Freiheit bedingt Eigenverantwortung, ohne Zweifel. Eventuell ist es einigen tatsächlich zu anspruchsvoll, die Verantwortung für das eigene Tun und Lassen zu übernehmen. Oder die persönliche Freiheit wird nicht als ausreichend wertvolles Gut angesehen, um sich dafür anzustrengen. In dem Fall wäre die mangelnde Selbstbestimmung wohl das kleinere Übel. Allerdings fehlt dann gemäß Aldous Huxley ein Teil der Persönlichkeit. Letztlich ist natürlich alles eine Frage der Abwägung.
Sind viele Menschen möglicherweise schon so «eingenordet», dass freiheitliche Ambitionen gar nicht für eine ganze Gruppe, ein Kollektiv, verfolgt werden können? Solche Gedanken kamen mir auch, als ich mir kürzlich diverse Talks beim viertägigen Hacker-Kongress des Chaos Computer Clubs (38C3) anschaute. Ich war nicht nur überrascht, sondern reichlich erschreckt angesichts der in weiten Teilen mainstream-geformten Inhalte, mit denen ein dankbares Publikum beglückt wurde. Wo ich allgemein hellere Köpfe erwartet hatte, fand ich Konformismus und enthusiastisch untermauerte Narrative.
Gibt es vielleicht so etwas wie eine Herdenimmunität gegen Indoktrination? Ich denke, ja, zumindest eine gestärkte Widerstandsfähigkeit. Was wir brauchen, sind etwas gesunder Menschenverstand, offene Informationskanäle und der Mut, sich freier auch zwischen den Herden zu bewegen. Sie tun das bereits, aber sagen Sie es auch dieses Jahr ruhig weiter.
Dieser Beitrag ist zuerst auf Transition News erschienen.
-
@ a95c6243:d345522c
2025-01-01 17:39:51Heute möchte ich ein Gedicht mit euch teilen. Es handelt sich um eine Ballade des österreichischen Lyrikers Johann Gabriel Seidl aus dem 19. Jahrhundert. Mir sind diese Worte fest in Erinnerung, da meine Mutter sie perfekt rezitieren konnte, auch als die Kräfte schon langsam schwanden.
Dem originalen Titel «Die Uhr» habe ich für mich immer das Wort «innere» hinzugefügt. Denn der Zeitmesser – hier vermutliche eine Taschenuhr – symbolisiert zwar in dem Kontext das damalige Zeitempfinden und die Umbrüche durch die industrielle Revolution, sozusagen den Zeitgeist und das moderne Leben. Aber der Autor setzt sich philosophisch mit der Zeit auseinander und gibt seinem Werk auch eine klar spirituelle Dimension.
Das Ticken der Uhr und die Momente des Glücks und der Trauer stehen sinnbildlich für das unaufhaltsame Fortschreiten und die Vergänglichkeit des Lebens. Insofern könnte man bei der Uhr auch an eine Sonnenuhr denken. Der Rhythmus der Ereignisse passt uns vielleicht nicht immer in den Kram.
Was den Takt pocht, ist durchaus auch das Herz, unser «inneres Uhrwerk». Wenn dieses Meisterwerk einmal stillsteht, ist es unweigerlich um uns geschehen. Hoffentlich können wir dann dankbar sagen: «Ich habe mein Bestes gegeben.»
Ich trage, wo ich gehe, stets eine Uhr bei mir; \ Wieviel es geschlagen habe, genau seh ich an ihr. \ Es ist ein großer Meister, der künstlich ihr Werk gefügt, \ Wenngleich ihr Gang nicht immer dem törichten Wunsche genügt.
Ich wollte, sie wäre rascher gegangen an manchem Tag; \ Ich wollte, sie hätte manchmal verzögert den raschen Schlag. \ In meinen Leiden und Freuden, in Sturm und in der Ruh, \ Was immer geschah im Leben, sie pochte den Takt dazu.
Sie schlug am Sarge des Vaters, sie schlug an des Freundes Bahr, \ Sie schlug am Morgen der Liebe, sie schlug am Traualtar. \ Sie schlug an der Wiege des Kindes, sie schlägt, will's Gott, noch oft, \ Wenn bessere Tage kommen, wie meine Seele es hofft.
Und ward sie auch einmal träger, und drohte zu stocken ihr Lauf, \ So zog der Meister immer großmütig sie wieder auf. \ Doch stände sie einmal stille, dann wär's um sie geschehn, \ Kein andrer, als der sie fügte, bringt die Zerstörte zum Gehn.
Dann müßt ich zum Meister wandern, der wohnt am Ende wohl weit, \ Wohl draußen, jenseits der Erde, wohl dort in der Ewigkeit! \ Dann gäb ich sie ihm zurücke mit dankbar kindlichem Flehn: \ Sieh, Herr, ich hab nichts verdorben, sie blieb von selber stehn.
Johann Gabriel Seidl (1804-1875)
-
@ a95c6243:d345522c
2024-12-21 09:54:49Falls du beim Lesen des Titels dieses Newsletters unwillkürlich an positive Neuigkeiten aus dem globalen polit-medialen Irrenhaus oder gar aus dem wirtschaftlichen Umfeld gedacht hast, darf ich dich beglückwünschen. Diese Assoziation ist sehr löblich, denn sie weist dich als unverbesserlichen Optimisten aus. Leider muss ich dich diesbezüglich aber enttäuschen. Es geht hier um ein anderes Thema, allerdings sehr wohl ein positives, wie ich finde.
Heute ist ein ganz besonderer Tag: die Wintersonnenwende. Genau gesagt hat heute morgen um 10:20 Uhr Mitteleuropäischer Zeit (MEZ) auf der Nordhalbkugel unseres Planeten der astronomische Winter begonnen. Was daran so außergewöhnlich ist? Der kürzeste Tag des Jahres war gestern, seit heute werden die Tage bereits wieder länger! Wir werden also jetzt jeden Tag ein wenig mehr Licht haben.
Für mich ist dieses Ereignis immer wieder etwas kurios: Es beginnt der Winter, aber die Tage werden länger. Das erscheint mir zunächst wie ein Widerspruch, denn meine spontanen Assoziationen zum Winter sind doch eher Kälte und Dunkelheit, relativ zumindest. Umso erfreulicher ist der emotionale Effekt, wenn dann langsam die Erkenntnis durchsickert: Ab jetzt wird es schon wieder heller!
Natürlich ist es kalt im Winter, mancherorts mehr als anderswo. Vielleicht jedoch nicht mehr lange, wenn man den Klimahysterikern glauben wollte. Mindestens letztes Jahr hat Väterchen Frost allerdings gleich zu Beginn seiner Saison – und passenderweise während des globalen Überhitzungsgipfels in Dubai – nochmal richtig mit der Faust auf den Tisch gehauen. Schnee- und Eischaos sind ja eigentlich in der Agenda bereits nicht mehr vorgesehen. Deswegen war man in Deutschland vermutlich in vorauseilendem Gehorsam schon nicht mehr darauf vorbereitet und wurde glatt lahmgelegt.
Aber ich schweife ab. Die Aussicht auf nach und nach mehr Licht und damit auch Wärme stimmt mich froh. Den Zusammenhang zwischen beidem merkt man in Andalusien sehr deutlich. Hier, wo die Häuser im Winter arg auskühlen, geht man zum Aufwärmen raus auf die Straße oder auf den Balkon. Die Sonne hat auch im Winter eine erfreuliche Kraft. Und da ist jede Minute Gold wert.
Außerdem ist mir vor Jahren so richtig klar geworden, warum mir das südliche Klima so sehr gefällt. Das liegt nämlich nicht nur an der Sonne als solcher, oder der Wärme – das liegt vor allem am Licht. Ohne Licht keine Farben, das ist der ebenso simple wie gewaltige Unterschied zwischen einem deprimierenden matschgraubraunen Winter und einem fröhlichen bunten. Ein großes Stück Lebensqualität.
Mir gefällt aber auch die Symbolik dieses Tages: Licht aus der Dunkelheit, ein Wendepunkt, ein Neuanfang, neue Möglichkeiten, Übergang zu neuer Aktivität. In der winterlichen Stille keimt bereits neue Lebendigkeit. Und zwar in einem Zyklus, das wird immer wieder so geschehen. Ich nehme das gern als ein Stück Motivation, es macht mir Hoffnung und gibt mir Energie.
Übrigens ist parallel am heutigen Tag auf der südlichen Halbkugel Sommeranfang. Genau im entgegengesetzten Rhythmus, sich ergänzend, wie Yin und Yang. Das alles liegt an der Schrägstellung der Erdachse, die ist nämlich um 23,4º zur Umlaufbahn um die Sonne geneigt. Wir erinnern uns, gell?
Insofern bleibt eindeutig festzuhalten, dass “schräg sein” ein willkommener, wichtiger und positiver Wert ist. Mit anderen Worten: auch ungewöhnlich, eigenartig, untypisch, wunderlich, kauzig, … ja sogar irre, spinnert oder gar “quer” ist in Ordnung. Das schließt das Denken mit ein.
In diesem Sinne wünsche ich euch allen urige Weihnachtstage!
Dieser Beitrag ist letztes Jahr in meiner Denkbar erschienen.
-
@ a95c6243:d345522c
2024-12-13 19:30:32Das Betriebsklima ist das einzige Klima, \ das du selbst bestimmen kannst. \ Anonym
Eine Strategie zur Anpassung an den Klimawandel hat das deutsche Bundeskabinett diese Woche beschlossen. Da «Wetterextreme wie die immer häufiger auftretenden Hitzewellen und Starkregenereignisse» oft desaströse Auswirkungen auf Mensch und Umwelt hätten, werde eine Anpassung an die Folgen des Klimawandels immer wichtiger. «Klimaanpassungsstrategie» nennt die Regierung das.
Für die «Vorsorge vor Klimafolgen» habe man nun erstmals klare Ziele und messbare Kennzahlen festgelegt. So sei der Erfolg überprüfbar, und das solle zu einer schnelleren Bewältigung der Folgen führen. Dass sich hinter dem Begriff Klimafolgen nicht Folgen des Klimas, sondern wohl «Folgen der globalen Erwärmung» verbergen, erklärt den Interessierten die Wikipedia. Dabei ist das mit der Erwärmung ja bekanntermaßen so eine Sache.
Die Zunahme schwerer Unwetterereignisse habe gezeigt, so das Ministerium, wie wichtig eine frühzeitige und effektive Warnung der Bevölkerung sei. Daher solle es eine deutliche Anhebung der Nutzerzahlen der sogenannten Nina-Warn-App geben.
Die ARD spurt wie gewohnt und setzt die Botschaft zielsicher um. Der Artikel beginnt folgendermaßen:
«Die Flut im Ahrtal war ein Schock für das ganze Land. Um künftig besser gegen Extremwetter gewappnet zu sein, hat die Bundesregierung eine neue Strategie zur Klimaanpassung beschlossen. Die Warn-App Nina spielt eine zentrale Rolle. Der Bund will die Menschen in Deutschland besser vor Extremwetter-Ereignissen warnen und dafür die Reichweite der Warn-App Nina deutlich erhöhen.»
Die Kommunen würden bei ihren «Klimaanpassungsmaßnahmen» vom Zentrum KlimaAnpassung unterstützt, schreibt das Umweltministerium. Mit dessen Aufbau wurden das Deutsche Institut für Urbanistik gGmbH, welches sich stark für Smart City-Projekte engagiert, und die Adelphi Consult GmbH beauftragt.
Adelphi beschreibt sich selbst als «Europas führender Think-and-Do-Tank und eine unabhängige Beratung für Klima, Umwelt und Entwicklung». Sie seien «global vernetzte Strateg*innen und weltverbessernde Berater*innen» und als «Vorreiter der sozial-ökologischen Transformation» sei man mit dem Deutschen Nachhaltigkeitspreis ausgezeichnet worden, welcher sich an den Zielen der Agenda 2030 orientiere.
Über die Warn-App mit dem niedlichen Namen Nina, die möglichst jeder auf seinem Smartphone installieren soll, informiert das Bundesamt für Bevölkerungsschutz und Katastrophenhilfe (BBK). Gewarnt wird nicht nur vor Extrem-Wetterereignissen, sondern zum Beispiel auch vor Waffengewalt und Angriffen, Strom- und anderen Versorgungsausfällen oder Krankheitserregern. Wenn man die Kategorie Gefahreninformation wählt, erhält man eine Dosis von ungefähr zwei Benachrichtigungen pro Woche.
Beim BBK erfahren wir auch einiges über die empfohlenen Systemeinstellungen für Nina. Der Benutzer möge zum Beispiel den Zugriff auf die Standortdaten «immer zulassen», und zwar mit aktivierter Funktion «genauen Standort verwenden». Die Datennutzung solle unbeschränkt sein, auch im Hintergrund. Außerdem sei die uneingeschränkte Akkunutzung zu aktivieren, der Energiesparmodus auszuschalten und das Stoppen der App-Aktivität bei Nichtnutzung zu unterbinden.
Dass man so dramatische Ereignisse wie damals im Ahrtal auch anders bewerten kann als Regierungen und Systemmedien, hat meine Kollegin Wiltrud Schwetje anhand der Tragödie im spanischen Valencia gezeigt. Das Stichwort «Agenda 2030» taucht dabei in einem Kontext auf, der wenig mit Nachhaltigkeitspreisen zu tun hat.
Dieser Beitrag ist zuerst auf Transition News erschienen.
-
@ a95c6243:d345522c
2024-12-06 18:21:15Die Ungerechtigkeit ist uns nur in dem Falle angenehm,\ dass wir Vorteile aus ihr ziehen;\ in jedem andern hegt man den Wunsch,\ dass der Unschuldige in Schutz genommen werde.\ Jean-Jacques Rousseau
Politiker beteuern jederzeit, nur das Beste für die Bevölkerung zu wollen – nicht von ihr. Auch die zahlreichen unsäglichen «Corona-Maßnahmen» waren angeblich zu unserem Schutz notwendig, vor allem wegen der «besonders vulnerablen Personen». Daher mussten alle möglichen Restriktionen zwangsweise und unter Umgehung der Parlamente verordnet werden.
Inzwischen hat sich immer deutlicher herausgestellt, dass viele jener «Schutzmaßnahmen» den gegenteiligen Effekt hatten, sie haben den Menschen und den Gesellschaften enorm geschadet. Nicht nur haben die experimentellen Geninjektionen – wie erwartet – massive Nebenwirkungen, sondern Maskentragen schadet der Psyche und der Entwicklung (nicht nur unserer Kinder) und «Lockdowns und Zensur haben Menschen getötet».
Eine der wichtigsten Waffen unserer «Beschützer» ist die Spaltung der Gesellschaft. Die tiefen Gräben, die Politiker, Lobbyisten und Leitmedien praktisch weltweit ausgehoben haben, funktionieren leider nahezu in Perfektion. Von ihren persönlichen Erfahrungen als Kritikerin der Maßnahmen berichtete kürzlich eine Schweizerin im Interview mit Transition News. Sie sei schwer enttäuscht und verspüre bis heute eine Hemmschwelle und ein seltsames Unwohlsein im Umgang mit «Geimpften».
Menschen, die aufrichtig andere schützen wollten, werden von einer eindeutig politischen Justiz verfolgt, verhaftet und angeklagt. Dazu zählen viele Ärzte, darunter Heinrich Habig, Bianca Witzschel und Walter Weber. Über den aktuell laufenden Prozess gegen Dr. Weber hat Transition News mehrfach berichtet (z.B. hier und hier). Auch der Selbstschutz durch Verweigerung der Zwangs-Covid-«Impfung» bewahrt nicht vor dem Knast, wie Bundeswehrsoldaten wie Alexander Bittner erfahren mussten.
Die eigentlich Kriminellen schützen sich derweil erfolgreich selber, nämlich vor der Verantwortung. Die «Impf»-Kampagne war «das größte Verbrechen gegen die Menschheit». Trotzdem stellt man sich in den USA gerade die Frage, ob der scheidende Präsident Joe Biden nach seinem Sohn Hunter möglicherweise auch Anthony Fauci begnadigen wird – in diesem Fall sogar präventiv. Gibt es überhaupt noch einen Rest Glaubwürdigkeit, den Biden verspielen könnte?
Der Gedanke, den ehemaligen wissenschaftlichen Chefberater des US-Präsidenten und Direktor des National Institute of Allergy and Infectious Diseases (NIAID) vorsorglich mit einem Schutzschild zu versehen, dürfte mit der vergangenen Präsidentschaftswahl zu tun haben. Gleich mehrere Personalentscheidungen des designierten Präsidenten Donald Trump lassen Leute wie Fauci erneut in den Fokus rücken.
Das Buch «The Real Anthony Fauci» des nominierten US-Gesundheitsministers Robert F. Kennedy Jr. erschien 2021 und dreht sich um die Machenschaften der Pharma-Lobby in der öffentlichen Gesundheit. Das Vorwort zur rumänischen Ausgabe des Buches schrieb übrigens Călin Georgescu, der Überraschungssieger der ersten Wahlrunde der aktuellen Präsidentschaftswahlen in Rumänien. Vielleicht erklärt diese Verbindung einen Teil der Panik im Wertewesten.
In Rumänien selber gab es gerade einen Paukenschlag: Das bisherige Ergebnis wurde heute durch das Verfassungsgericht annuliert und die für Sonntag angesetzte Stichwahl kurzfristig abgesagt – wegen angeblicher «aggressiver russischer Einmischung». Thomas Oysmüller merkt dazu an, damit sei jetzt in der EU das Tabu gebrochen, Wahlen zu verbieten, bevor sie etwas ändern können.
Unsere Empörung angesichts der Historie von Maßnahmen, die die Falschen beschützen und für die meisten von Nachteil sind, müsste enorm sein. Die Frage ist, was wir damit machen. Wir sollten nach vorne schauen und unsere Energie clever einsetzen. Abgesehen von der Umgehung von jeglichem «Schutz vor Desinformation und Hassrede» (sprich: Zensur) wird es unsere wichtigste Aufgabe sein, Gräben zu überwinden.
Dieser Beitrag ist zuerst auf Transition News erschienen.
-
@ d5c3d063:4d1159b3
2025-01-13 04:04:26#สภายาส้ม EP.62 "Secure vs Insecure ที่ทำให้เราพัฒนา?"
ในรายการสภายาส้ม EP 62 น้องอิสมีหัวข้อชวนให้คิดว่า “ความมั่นคงหรือความไม่มั่นคง อะไรทำให้มนุษย์พัฒนาได้มากกว่ากัน” ซึ่งเป็นประเด็นที่ดูเหมือนจะมีคำตอบที่หลากหลายและซับซ้อน โดยซุปเองได้ให้มุมมองเรื่อง "โอกาส" และ "เสรีภาพ" เป็นกุญแจสู่การพัฒนาตัวเอง…..
!(image)[https://m.primal.net/NeLo.png]
. เริ่มจากน้องอิสเล่าให้ฟังถึงตัวอย่างที่น่าสนใจของคนสองกลุ่ม คนที่มีความมั่นคงอย่าง Elon Musk ที่มาจากครอบครัวที่ร่ำรวยหรือพี่น้องตระกูลไรต์ได้ทดลองสร้างเครื่องบิน ลองเสี่ยงในสิ่งใหม่ๆ ได้อย่างไม่ต้องกังวล ในขณะที่อีกฟากหนึ่ง คนที่เริ่มต้นจากความลำบาก เช่น Cristiano Ronaldo ที่ใช้แรงผลักดันจากความยากจนให้ตัวเองประสบความสำเร็จในวงการฟุตบอล
. ซุปย้ำว่าสิ่งสำคัญไม่ใช่จุดเริ่มต้น…แต่เป็น "โอกาส" และ "เสรีภาพ" ในการเลือกเส้นทางชีวิตด้วยตัวเราเอง ระบบที่เปิดโอกาสให้คนสามารถลองผิดลองถูกและพัฒนาตัวเองได้จะเป็นแรงผลักดันที่แท้จริงที่ช่วยให้คนเติบโตและสร้างความเปลี่ยนแปลงในชีวิตได้
. ในประเด็นที่เกี่ยวกับ Time Preference คือการให้ความสำคัญของการมองการณ์ไกลในการตัดสินใจ เช่น การเลือกที่จะออมและลงทุนในสิ่งที่สร้างคุณค่าในระยะยาว แทนที่จะเอาเวลาไปใช้กับสิ่งที่ได้ผลตอบแทนระยะสั้นๆ ซึ่งบิตคอยน์ก็ช่วยให้คนเก็บออมได้โดยไม่ต้องกังวลว่าเงินจะเสื่อมค่าจากเงินเฟียต เพราะการที่มนุษย์สามารถวางแผนในระยะยาวได้ เป็นสิ่งที่เกี่ยวข้องกับเสรีภาพทางเศรษฐกิจโดยตรง และในโลกที่มีระบบการเงินที่มั่นคง การมองการณ์ไกลก็จะง่ายขึ้นและมีประสิทธิภาพมากขึ้น
. ในรายการเราได้พูดถึงแนวคิด “Hard Times Create Strong Men” ว่าความลำบากเป็นแรงผลักดัน แต่ซุปก็ย้ำว่า ความลำบากไม่ได้โรแมนติกเสมอไป โดยเฉพาะความลำบากที่เกิดจากสิ่งที่เราไม่ควรจะต้องเจอนั้นก็คือเงินเฟ้อที่มันไม่ได้ช่วยให้คนพัฒนาขึ้น แต่กลับทำให้คนต้องทำงานหนักขึ้นเพียงเพื่อความอยู่รอดไปวัน ๆ ซึ่งบิตคอยน์คือการพาเราออกมาจากปัญหาเงินเฟ้อ จะช่วยให้เรามีเวลาไปโฟกัสกับการพัฒนาตัวเองและสร้างสิ่งใหม่ ๆ ได้มากขึ้น
. เพราะบิตคอยน์คือเครื่องมือในการสร้างโอกาสและเสรีภาพ ในโลกที่มีบิตคอย์ ทุกคนจะมีโอกาสและมีเสรีภาพในการเลือกที่มากขึ้น แต่ซุปก็ชี้ให้เห็นว่า แม้เราจะโอกาสที่เท่าเทียมกันแล้ว แต่ผลลัพธ์ของแต่ละคนย่อมแตกต่างกัน เพราะมันก็ขึ้นอยู่กับความขยัน ทัศนคติและการตัดสินใจของแต่ละคน บิตคอยน์เป็นระบบที่ลดการควบคุมจากส่วนกลางและเปิดโอกาสให้คนสามารถพึ่งพาตัวเองได้ ซึ่งไม่ใช่ทุกคนจะเป็นแบบ Elon Musk หรือ Ronaldo ที่ทุกคนจะรวยกันถ้วนหน้าอย่างเท่าเทียม แต่การมีโอกาสและเสรีภาพในการพัฒนาตัวเองคือก้าวแรกที่สำคัญที่สุด . ดังนั้นความสำคัญของโอกาสและเสรีภาพ คือหัวใจสำคัญของการพัฒนา ไม่ว่าเราจะเริ่มต้นจากจุดไหน คนที่มีโอกาสเขาจะกล้าลองผิดลองถูก และคนที่มีเสรีภาพจะสามารถกำหนดเส้นทางชีวิตของตัวเองได้ และบิตคอยน์เป็นเครื่องมือสำคัญที่ช่วยสร้างโลกที่ยุติธรรมและเปิดกว้างให้กับทุกคน
เวลามีค่าศึกษาบิตคอยน์ #Siamstr
-
@ 58937958:545e6994
2025-01-13 03:31:48I made croquettes inspired by Spiral's character "Bitcoin (Puppet)."
The method is the same as making regular croquettes. I also tried making a version (right) with the arms and legs attached while shaping the filling, but they fell off before I could coat them in flour.
The face is made with seaweed and sliced cheese. The arms and legs are made with fish cake (hanpen). I brushed soy sauce on the legs and lightly toasted them in a toaster, which gave them a brown color.
The arms and legs are attached using thin spaghetti. When I searched for character-themed bentos (kyaraben), I came across the idea of using dried pasta, which made sense. I used fried spaghetti sticks for attachment.
Here’s Bitcoin Croquette squished into a bento box:
Halving
Notes
- I tried freezing the filling to help it hold its shape, but it backfired. It stuck to the plate and the cooking paper, and once partially thawed, it became way too watery. Freezing might work with better preparation.
- The filling was quite dry when shaping, so it might be better to add a binder (this time, I only used potatoes and sautéed onions).
The shape of Bitcoin Puppet was really easy and fun to make, so I’d love to try creating something else next time!
nostr:nevent1qqsxgpjvf9g9suhzx5asqhvnlvnarl43kuhas8v5g2ryjr9yjjp0z5ctkh5pt
-
@ a95c6243:d345522c
2024-11-29 19:45:43Konsum ist Therapie.
Wolfgang JoopUmweltbewusstes Verhalten und verantwortungsvoller Konsum zeugen durchaus von einer wünschenswerten Einstellung. Ob man deswegen allerdings einen grünen statt eines schwarzen Freitags braucht, darf getrost bezweifelt werden – zumal es sich um manipulatorische Konzepte handelt. Wie in der politischen Landschaft sind auch hier die Etiketten irgendwas zwischen nichtssagend und trügerisch.
Heute ist also wieder mal «Black Friday», falls Sie es noch nicht mitbekommen haben sollten. Eigentlich haben wir ja eher schon eine ganze «Black Week», der dann oft auch noch ein «Cyber Monday» folgt. Die Werbebranche wird nicht müde, immer neue Anlässe zu erfinden oder zu importieren, um uns zum Konsumieren zu bewegen. Und sie ist damit sehr erfolgreich.
Warum fallen wir auf derartige Werbetricks herein und kaufen im Zweifelsfall Dinge oder Mengen, die wir sicher nicht brauchen? Pure Psychologie, würde ich sagen. Rabattschilder triggern etwas in uns, was den Verstand in Stand-by versetzt. Zusätzlich beeinflussen uns alle möglichen emotionalen Reize und animieren uns zum Schnäppchenkauf.
Gedankenlosigkeit und Maßlosigkeit können besonders bei der Ernährung zu ernsten Problemen führen. Erst kürzlich hat mir ein Bekannter nach einer USA-Reise erzählt, dass es dort offenbar nicht unüblich ist, schon zum ausgiebigen Frühstück in einem Restaurant wenigstens einen Liter Cola zu trinken. Gerne auch mehr, um das Gratis-Nachfüllen des Bechers auszunutzen.
Kritik am schwarzen Freitag und dem unnötigen Konsum kommt oft von Umweltschützern. Neben Ressourcenverschwendung, hohem Energieverbrauch und wachsenden Müllbergen durch eine zunehmende Wegwerfmentalität kommt dabei in der Regel auch die «Klimakrise» auf den Tisch.
Die EU-Kommission lancierte 2015 den Begriff «Green Friday» im Kontext der überarbeiteten Rechtsvorschriften zur Kennzeichnung der Energieeffizienz von Elektrogeräten. Sie nutzte die Gelegenheit kurz vor dem damaligen schwarzen Freitag und vor der UN-Klimakonferenz COP21, bei der das Pariser Abkommen unterzeichnet werden sollte.
Heute wird ein grüner Freitag oft im Zusammenhang mit der Forderung nach «nachhaltigem Konsum» benutzt. Derweil ist die Europäische Union schon weit in ihr Geschäftsmodell des «Green New Deal» verstrickt. In ihrer Propaganda zum Klimawandel verspricht sie tatsächlich «Unterstützung der Menschen und Regionen, die von immer häufigeren Extremwetter-Ereignissen betroffen sind». Was wohl die Menschen in der Region um Valencia dazu sagen?
Ganz im Sinne des Great Reset propagierten die Vereinten Nationen seit Ende 2020 eine «grüne Erholung von Covid-19, um den Klimawandel zu verlangsamen». Der UN-Umweltbericht sah in dem Jahr einen Schwerpunkt auf dem Verbraucherverhalten. Änderungen des Konsumverhaltens des Einzelnen könnten dazu beitragen, den Klimaschutz zu stärken, hieß es dort.
Der Begriff «Schwarzer Freitag» wurde in den USA nicht erstmals für Einkäufe nach Thanksgiving verwendet – wie oft angenommen –, sondern für eine Finanzkrise. Jedoch nicht für den Börsencrash von 1929, sondern bereits für den Zusammenbruch des US-Goldmarktes im September 1869. Seitdem mussten die Menschen weltweit so einige schwarze Tage erleben.
Kürzlich sind die britischen Aufsichtsbehörden weiter von ihrer Zurückhaltung nach dem letzten großen Finanzcrash von 2008 abgerückt. Sie haben Regeln für den Bankensektor gelockert, womit sie «verantwortungsvolle Risikobereitschaft» unterstützen wollen. Man würde sicher zu schwarz sehen, wenn man hier ein grünes Wunder befürchten würde.
Dieser Beitrag ist zuerst auf Transition News erschienen.
-
@ c4f5e7a7:8856cac7
2024-09-27 08:20:16Best viewed on Habla, YakiHonne or Highlighter.
TL;DR
This article explores the links between public, community-driven data sources (such as OpenStreetMap) and private, cryptographically-owned data found on networks such as Nostr.
The following concepts are explored:
- Attestations: Users signalling to their social graph that they believe something to be true by publishing Attestations. These social proofs act as a decentralised verification system that leverages your web-of-trust.
- Proof of Place: An oracle-based system where physical letters are sent to real-world locations, confirming the corresponding digital ownership via cryptographic proofs. This binds physical locations in meatspace with their digital representations in the Nostrverse.
- Check-ins: Foursquare-style check-ins that can be verified using attestations from place owners, ensuring authenticity. This approach uses web-of-trust to validate check-ins and location ownership over time.
The goal is to leverage cryptographic ownership where necessary while preserving the open, collaborative nature of public data systems.
Open Data in a public commons has a place and should not be thrown out with the Web 2.0 bathwater.
Cognitive Dissonance
Ever since discovering Nostr in August of 2022 I've been grappling with how BTC Map - a project that helps bitcoiners find places to spend sats - should most appropriately use this new protocol.
I am assuming, dear reader, that you are somewhat familiar with Nostr - a relatively new protocol for decentralised identity and communication. If you don’t know your nsec from your npub, please take some time to read these excellent posts: Nostr is Identity for the Internet and The Power of Nostr by @max and @lyn, respectively. Nostr is so much more than a short-form social media replacement.
The social features (check-ins, reviews, etc.) that Nostr unlocks for BTC Map are clear and exciting - all your silos are indeed broken - however, something fundamental has been bothering me for a while and I think it comes down to data ownership.
For those unfamiliar, BTC Map uses OpenStreetMap (OSM) as its main geographic database. OSM is centred on the concept of a commons of objectively verifiable data that is maintained by a global community of volunteer editors; a Wikipedia for maps. There is no data ownership; the data is free (as in freedom) and anyone can edit anything. It is the data equivalent of FOSS (Free and Open Source Software) - FOSD if you will, but more commonly referred to as Open Data.
In contrast, Notes and Other Stuff on Nostr (Places in this cartographic context) are explicitly owned by the controller of the private key. These notes are free to propagate, but they are owned.
How do we reconcile the decentralised nature of Nostr, where data is cryptographically owned by individuals, with the community-managed data commons of OpenStreetMap, where no one owns the data?
Self-sovereign Identity
Before I address this coexistence question, I want to talk a little about identity as it pertains to ownership. If something is to be owned, it has to be owned by someone or something - an identity.
All identities that are not self-sovereign are, by definition, leased to you by a 3rd party. You rent your Facebook identity from Meta in exchange for your data. You rent your web domain from your DNS provider in exchange for your money.
Taken to the extreme, you rent your passport from your Government in exchange for your compliance. You are you at the pleasure of others. Where Bitcoin separates money from the state; Nostr separates identity from the state.
Or, as @nvk said recently: "Don't build your house on someone else's land.".
https://i.nostr.build/xpcCSkDg3uVw0yku.png
While we’ve had the tools for self-sovereign digital identity for decades (think PGP keys or WebAuthN), we haven't had the necessary social use cases nor the corresponding social graph to elevate these identities to the mainstream. Nostr fixes this.
Nostr is PGP for the masses and will take cryptographic identities mainstream.
Full NOSTARD?
Returning to the coexistence question: the data on OpenStreetMap isn’t directly owned by anyone, even though the physical entities the data represents might be privately owned. OSM is a data commons.
We can objectively agree on the location of a tree or a fire hydrant without needing permission to observe and record it. Sure, you could place a tree ‘on Nostr’, but why should you? Just because something can be ‘on Nostr’ doesn’t mean it should be.
https://i.nostr.build/s3So2JVAqoY4E1dI.png
There might be a dystopian future where we can't agree on what a tree is nor where it's located, but I hope we never get there. It's at this point we'll need a Wikifreedia variant of OpenStreetMap.
While integrating Nostr identities into OpenStreetMap would be valuable, the current OSM infrastructure, tools, and community already provide substantial benefits in managing this data commons without needing to go NOSTR-native - there's no need to go Full NOSTARD. H/T to @princeySOV for the original meme.
https://i.nostr.build/ot9jtM5cZtDHNKWc.png
So, how do we appropriately blend cryptographically owned data with the commons?
If a location is owned in meatspace and it's useful to signal that ownership, it should also be owned in cyberspace. Our efforts should therefore focus on entities like businesses, while allowing the commons to manage public data for as long as it can successfully mitigate the tragedy of the commons.
The remainder of this article explores how we can:
- Verify ownership of a physical place in the real world;
- Link that ownership to the corresponding digital place in cyberspace.
As a side note, I don't see private key custodianship - or, even worse, permissioned use of Places signed by another identity's key - as any more viable than the rented identities of Web 2.0.
And as we all know, the Second Law of Infodynamics (no citation!) states that:
"The total amount of sensitive information leaked will always increase over time."
This especially holds true if that data is centralised.
Not your keys, not your notes. Not your keys, not your identity.
Places and Web-of-Trust
@Arkinox has been leading the charge on the Places NIP, introducing Nostr notes (kind 37515) that represent physical locations. The draft is well-crafted, with bonus points for linking back to OSM (and other location repositories) via NIP-73 - External Content IDs (championed by @oscar of @fountain).
However, as Nostr is permissionless, authenticity poses a challenge. Just because someone claims to own a physical location on the Internet doesn’t necessarily mean they have ownership or control of that location in the real world.
Ultimately, this problem can only be solved in a decentralised way by using Web-of-Trust - using your social graph and the perspectives of trusted peers to inform your own perspective. In the context of Places, this requires your network to form a view on which digital identity (public key / npub) is truly the owner of a physical place like your local coffee shop.
This requires users to:
- Verify the owner of a Place in cyberspace is the owner of a place in meatspace.
- Signal this verification to their social graph.
Let's look at the latter idea first with the concept of Attestations ...
Attestations
A way to signal to your social graph that you believe something to be true (or false for that matter) would be by publishing an Attestation note. An Attestation note would signify to your social graph that you think something is either true or false.
Imagine you're a regular at a local coffee shop. You publish an Attestation that says the shop is real and the owner behind the Nostr public key is who they claim to be. Your friends trust you, so they start trusting the shop's digital identity too.
However, attestations applied to Places are just a single use case. The attestation concept could be more widely applied across Nostr in a variety of ways (key rotation, identity linking, etc).
Here is a recent example from @lyn that would carry more signal if it were an Attestation:
https://i.nostr.build/lZAXOEwvRIghgFY4.png
Parallels can be drawn between Attestations and transaction confirmations on the Bitcoin timechain; however, their importance to you would be weighted by clients and/or Data Vending Machines in accordance with:
- Your social graph;
- The type or subject of the content being attested and by whom;
- Your personal preferences.
They could also have a validity duration to be temporally bound, which would be particularly useful in the case of Places.
NIP-25 (Reactions) do allow for users to up/downvote notes with optional content (e.g., emojis) and could work for Attestations, but I think we need something less ambiguous and more definitive.
‘This is true’ resonates more strongly than ‘I like this.’.
https://i.nostr.build/s8NIG2kXzUCLcoax.jpg
There are similar concepts in the Web 3 / Web 5 world such as Verified Credentials by tdb. However, Nostr is the Web 3 now and so wen Attestation NIP?
https://i.nostr.build/Cb047NWyHdJ7h5Ka.jpg
That said, I have seen @utxo has been exploring ‘smart contracts’ on nostr and Attestations may just be a relatively ‘dumb’ subset of the wider concept Nostr-native scripting combined with web-of-trust.
Proof of Place
Attestations handle the signalling of your truth, but what about the initial verification itself?
We already covered how this ultimately has to be derived from your social graph, but what if there was a way to help bootstrap this web-of-trust through the use of oracles? For those unfamiliar with oracles in the digital realm, they are simply trusted purveyors of truth.
Introducing Proof of Place, an out–of-band process where an oracle (such as BTC Map) would mail - yes physically mail- a shared secret to the address of the location being claimed in cyberspace. This shared secret would be locked to the public key (npub) making the claim, which, if unlocked, would prove that the associated private key (nsec) has physical access to the location in meatspace.
One way of doing this would be to mint a 1 sat cashu ecash token locked to the npub of the claimant and mail it to them. If they are able to redeem the token then they have cryptographically proven that they have physical access to the location.
Proof of Place is really nothing more than a weighted Attestation. In a web-of-trust Nostrverse, an oracle is simply a npub (say BTC Map) that you weigh heavily for its opinion on a given topic (say Places).
In the Bitcoin world, Proof of Work anchors digital scarcity in cyberspace to physical scarcity (energy and time) in meatspace and as @Gigi says in PoW is Essential:
"A failure to understand Proof of Work, is a failure to understand Bitcoin."
In the Nostrverse, Proof of Place helps bridge the digital and physical worlds.
@Gigi also observes in Memes vs The World that:
"In Bitcoin, the map is the territory. We can infer everything we care about by looking at the map alone."
https://i.nostr.build/dOnpxfI4u7EL2v4e.png
This isn’t true for Nostr.
In the Nostrverse, the map IS NOT the territory. However, Proof of Place enables us to send cryptographic drones down into the physical territory to help us interpret our digital maps. 🤯
Check-ins
Although not a draft NIP yet, @Arkinox has also been exploring the familiar concept of Foursquare-style Check-ins on Nostr (with kind 13811 notes).
For the uninitiated, Check-ins are simply notes that signal the publisher is at a given location. These locations could be Places (in the Nostr sense) or any other given digital representation of a location for that matter (such as OSM elements) if NIP-73 - External Content IDs are used.
Of course, not everyone will be a Check-in enjoyooor as the concept will not sit well with some people’s threat models and OpSec practices.
Bringing Check-ins to Nostr is possible (as @sebastix capably shows here), but they suffer the same authenticity issues as Places. Just because I say I'm at a given location doesn't mean that I am.
Back in the Web 2.0 days, Foursquare mitigated this by relying on the GPS position of the phone running their app, but this is of course spoofable.
How should we approach Check-in verifiability in the Nostrverse? Well, just like with Places, we can use Attestations and WoT. In the context of Check-ins, an Attestation from the identity (npub) of the Place being checked-in to would be a particularly strong signal. An NFC device could be placed in a coffee shop and attest to check-ins without requiring the owner to manually intervene - I’m sure @blackcoffee and @Ben Arc could hack something together over a weekend!
Check-ins could also be used as a signal for bonafide Place ownership over time.
Summary: Trust Your Bros
So, to recap, we have:
Places: Digital representations of physical locations on Nostr.
Check-ins: Users signalling their presence at a location.
Attestations: Verifiable social proofs used to confirm ownership or the truth of a claim.
You can visualise how these three concepts combine in the diagram below:
https://i.nostr.build/Uv2Jhx5BBfA51y0K.jpg
And, as always, top right trumps bottom left! We have:
Level 0 - Trust Me Bro: Anyone can check-in anywhere. The Place might not exist or might be impersonating the real place in meatspace. The person behind the npub may not have even been there at all.
Level 1 - Definitely Maybe Somewhere: This category covers the middle-ground of ‘Maybe at a Place’ and ‘Definitely Somewhere’. In these examples, you are either self-certifying that you have checked-in at an Attested Place or you are having others attest that you have checked-in at a Place that might not even exist IRL.
Level 2 - Trust Your Bros: An Attested Check-in at an Attested Place. Your individual level of trust would be a function of the number of Attestations and how you weigh them within your own social graph.
https://i.nostr.build/HtLAiJH1uQSTmdxf.jpg
Perhaps the gold standard (or should that be the Bitcoin standard?) would be a Check-in attested by the owner of the Place, which in itself was attested by BTC Map?
Or perhaps not. Ultimately, it’s the users responsibility to determine what they trust by forming their own perspective within the Nostrverse powered by web-of-trust algorithms they control. ‘Trust Me Bro’ or ‘Trust Your Bros’ - you decide.
As we navigate the frontier of cryptographic ownership and decentralised data, it’s up to us to find the balance between preserving the Open Data commons and embracing self-sovereign digital identities.
Thanks
With thanks to Arkinox, Avi, Ben Gunn, Kieran, Blackcoffee, Sebastix, Tomek, Calle, Short Fiat, Ben Weeks and Bitcoms for helping shape my thoughts and refine content, whether you know it or not!
-
@ a95c6243:d345522c
2024-11-08 20:02:32Und plötzlich weißt du:
Es ist Zeit, etwas Neues zu beginnen
und dem Zauber des Anfangs zu vertrauen.
Meister EckhartSchwarz, rot, gold leuchtet es im Kopf des Newsletters der deutschen Bundesregierung, der mir freitags ins Postfach flattert. Rot, gelb und grün werden daneben sicher noch lange vielzitierte Farben sein, auch wenn diese nie geleuchtet haben. Die Ampel hat sich gerade selber den Stecker gezogen – und hinterlässt einen wirtschaftlichen und gesellschaftlichen Trümmerhaufen.
Mit einem bemerkenswerten Timing hat die deutsche Regierungskoalition am Tag des «Comebacks» von Donald Trump in den USA endlich ihr Scheitern besiegelt. Während der eine seinen Sieg bei den Präsidentschaftswahlen feierte, erwachten die anderen jäh aus ihrer Selbsthypnose rund um Harris-Hype und Trump-Panik – mit teils erschreckenden Auswüchsen. Seit Mittwoch werden die Geschicke Deutschlands nun von einer rot-grünen Minderheitsregierung «geleitet» und man steuert auf Neuwahlen zu.
Das Kindergarten-Gehabe um zwei konkurrierende Wirtschaftsgipfel letzte Woche war bereits bezeichnend. In einem Strategiepapier gestand Finanzminister Lindner außerdem den «Absturz Deutschlands» ein und offenbarte, dass die wirtschaftlichen Probleme teilweise von der Ampel-Politik «vorsätzlich herbeigeführt» worden seien.
Lindner und weitere FDP-Minister wurden also vom Bundeskanzler entlassen. Verkehrs- und Digitalminister Wissing trat flugs aus der FDP aus; deshalb darf er nicht nur im Amt bleiben, sondern hat zusätzlich noch das Justizministerium übernommen. Und mit Jörg Kukies habe Scholz «seinen Lieblingsbock zum Obergärtner», sprich: Finanzminister befördert, meint Norbert Häring.
Es gebe keine Vertrauensbasis für die weitere Zusammenarbeit mit der FDP, hatte der Kanzler erklärt, Lindner habe zu oft sein Vertrauen gebrochen. Am 15. Januar 2025 werde er daher im Bundestag die Vertrauensfrage stellen, was ggf. den Weg für vorgezogene Neuwahlen freimachen würde.
Apropos Vertrauen: Über die Hälfte der Bundesbürger glauben, dass sie ihre Meinung nicht frei sagen können. Das ging erst kürzlich aus dem diesjährigen «Freiheitsindex» hervor, einer Studie, die die Wechselwirkung zwischen Berichterstattung der Medien und subjektivem Freiheitsempfinden der Bürger misst. «Beim Vertrauen in Staat und Medien zerreißt es uns gerade», kommentierte dies der Leiter des Schweizer Unternehmens Media Tenor, das die Untersuchung zusammen mit dem Institut für Demoskopie Allensbach durchführt.
«Die absolute Mehrheit hat absolut die Nase voll», titelte die Bild angesichts des «Ampel-Showdowns». Die Mehrheit wolle Neuwahlen und die Grünen sollten zuerst gehen, lasen wir dort.
Dass «Insolvenzminister» Robert Habeck heute seine Kandidatur für das Kanzleramt verkündet hat, kann nur als Teil der politmedialen Realitätsverweigerung verstanden werden. Wer allerdings denke, schlimmer als in Zeiten der Ampel könne es nicht mehr werden, sei reichlich optimistisch, schrieb Uwe Froschauer bei Manova. Und er kenne Friedrich Merz schlecht, der sich schon jetzt rhetorisch auf seine Rolle als oberster Feldherr Deutschlands vorbereite.
Was also tun? Der Schweizer Verein «Losdemokratie» will eine Volksinitiative lancieren, um die Bestimmung von Parlamentsmitgliedern per Los einzuführen. Das Losverfahren sorge für mehr Demokratie, denn als Alternative zum Wahlverfahren garantiere es eine breitere Beteiligung und repräsentativere Parlamente. Ob das ein Weg ist, sei dahingestellt.
In jedem Fall wird es notwendig sein, unsere Bemühungen um Freiheit und Selbstbestimmung zu verstärken. Mehr Unabhängigkeit von staatlichen und zentralen Institutionen – also die Suche nach dezentralen Lösungsansätzen – gehört dabei sicher zu den Möglichkeiten. Das gilt sowohl für jede/n Einzelne/n als auch für Entitäten wie die alternativen Medien.
Dieser Beitrag ist zuerst auf Transition News erschienen.
-
@ 3f770d65:7a745b24
2025-01-12 21:03:36I’ve been using Notedeck for several months, starting with its extremely early and experimental alpha versions, all the way to its current, more stable alpha releases. The journey has been fascinating, as I’ve had the privilege of watching it evolve from a concept into a functional and promising tool.
In its earliest stages, Notedeck was raw—offering glimpses of its potential but still far from practical for daily use. Even then, the vision behind it was clear: a platform designed to redefine how we interact with Nostr by offering flexibility and power for all users.
I'm very bullish on Notedeck. Why? Because Will Casarin is making it! Duh! 😂
Seriously though, if we’re reimagining the web and rebuilding portions of the Internet, it’s important to recognize the potential of Notedeck. If Nostr is reimagining the web, then Notedeck is reimagining the Nostr client.
Notedeck isn’t just another Nostr app—it’s more a Nostr browser that functions more like an operating system with micro-apps. How cool is that?
Much like how Google's Chrome evolved from being a web browser with a task manager into ChromeOS, a full blown operating system, Notedeck aims to transform how we interact with the Nostr. It goes beyond individual apps, offering a foundation for a fully integrated ecosystem built around Nostr.
As a Nostr evangelist, I love to scream INTEROPERABILITY and tout every application's integrations. Well, Notedeck has the potential to be one of the best platforms to showcase these integrations in entirely new and exciting ways.
Do you want an Olas feed of images? Add the media column.
Do you want a feed of live video events? Add the zap.stream column.
Do you want Nostr Nests or audio chats? Add that column to your Notedeck.
Git? Email? Books? Chat and DMs? It's all possible.
Not everyone wants a super app though, and that’s okay. As with most things in the Nostr ecosystem, flexibility is key. Notedeck gives users the freedom to choose how they engage with it—whether it’s simply following hashtags or managing straightforward feeds. You'll be able to tailor Notedeck to fit your needs, using it as extensively or minimally as you prefer.
Notedeck is designed with a local-first approach, utilizing Nostr content stored directly on your device via the local nostrdb. This will enable a plethora of advanced tools such as search and filtering, the creation of custom feeds, and the ability to develop personalized algorithms across multiple Notedeck micro-applications—all with unparalleled flexibility.
Notedeck also supports multicast. Let's geek out for a second. Multicast is a method of communication where data is sent from one source to multiple destinations simultaneously, but only to devices that wish to receive the data. Unlike broadcast, which sends data to all devices on a network, multicast targets specific receivers, reducing network traffic. This is commonly used for efficient data distribution in scenarios like streaming, conferencing, or large-scale data synchronization between devices.
In a local first world where each device holds local copies of your nostr nodes, and each device transparently syncs with each other on the local network, each node becomes a backup. Your data becomes antifragile automatically. When a node goes down it can resync and recover from other nodes. Even if not all nodes have a complete collection, negentropy can pull down only what is needed from each device. All this can be done without internet.
-Will Casarin
In the context of Notedeck, multicast would allow multiple devices to sync their Nostr nodes with each other over a local network without needing an internet connection. Wild.
Notedeck aims to offer full customization too, including the ability to design and share custom skins, much like Winamp. Users will also be able to create personalized columns and, in the future, share their setups with others. This opens the door for power users to craft tailored Nostr experiences, leveraging their expertise in the protocol and applications. By sharing these configurations as "Starter Decks," they can simplify onboarding and showcase the best of Nostr’s ecosystem.
Nostr’s “Other Stuff” can often be difficult to discover, use, or understand. Many users doesn't understand or know how to use web browser extensions to login to applications. Let's not even get started with nsecbunkers. Notedeck will address this challenge by providing a native experience that brings these lesser-known applications, tools, and content into a user-friendly and accessible interface, making exploration seamless. However, that doesn't mean Notedeck should disregard power users that want to use nsecbunkers though - hint hint.
For anyone interested in watching Nostr be developed live, right before your very eyes, Notedeck’s progress serves as a reminder of what’s possible when innovation meets dedication. The current alpha is already demonstrating its ability to handle complex use cases, and I’m excited to see how it continues to grow as it moves toward a full release later this year.
-
@ 7460b7fd:4fc4e74b
2024-09-05 08:37:48请看2014年王兴的一场思维碰撞,视频27分钟开始
最后,一个当时无法解决的点:丢失
-
@ a95c6243:d345522c
2024-10-26 12:21:50Es ist besser, ein Licht zu entzünden, als auf die Dunkelheit zu schimpfen. Konfuzius
Die Bemühungen um Aufarbeitung der sogenannten Corona-Pandemie, um Aufklärung der Hintergründe, Benennung von Verantwortlichkeiten und das Ziehen von Konsequenzen sind durchaus nicht eingeschlafen. Das Interesse daran ist unter den gegebenen Umständen vielleicht nicht sonderlich groß, aber es ist vorhanden.
Der sächsische Landtag hat gestern die Einsetzung eines Untersuchungsausschusses zur Corona-Politik beschlossen. In einer Sondersitzung erhielt ein entsprechender Antrag der AfD-Fraktion die ausreichende Zustimmung, auch von einigen Abgeordneten des BSW.
In den Niederlanden wird Bill Gates vor Gericht erscheinen müssen. Sieben durch die Covid-«Impfstoffe» geschädigte Personen hatten Klage eingereicht. Sie werfen unter anderem Gates, Pfizer-Chef Bourla und dem niederländischen Staat vor, sie hätten gewusst, dass diese Präparate weder sicher noch wirksam sind.
Mit den mRNA-«Impfstoffen» von Pfizer/BioNTech befasst sich auch ein neues Buch. Darin werden die Erkenntnisse von Ärzten und Wissenschaftlern aus der Analyse interner Dokumente über die klinischen Studien der Covid-Injektion präsentiert. Es handelt sich um jene in den USA freigeklagten Papiere, die die Arzneimittelbehörde (Food and Drug Administration, FDA) 75 Jahre unter Verschluss halten wollte.
Ebenfalls Wissenschaftler und Ärzte, aber auch andere Experten organisieren als Verbundnetzwerk Corona-Solution kostenfreie Online-Konferenzen. Ihr Ziel ist es, «wissenschaftlich, demokratisch und friedlich» über Impfstoffe und Behandlungsprotokolle gegen SARS-CoV-2 aufzuklären und die Diskriminierung von Ungeimpften zu stoppen. Gestern fand eine weitere Konferenz statt. Ihr Thema: «Corona und modRNA: Von Toten, Lebenden und Physik lernen».
Aufgrund des Digital Services Acts (DSA) der Europäischen Union sei das Risiko groß, dass ihre Arbeit als «Fake-News» bezeichnet würde, so das Netzwerk. Staatlich unerwünschte wissenschaftliche Aufklärung müsse sich passende Kanäle zur Veröffentlichung suchen. Ihre Live-Streams seien deshalb zum Beispiel nicht auf YouTube zu finden.
Der vielfältige Einsatz für Aufklärung und Aufarbeitung wird sich nicht stummschalten lassen. Nicht einmal der Zensurmeister der EU, Deutschland, wird so etwas erreichen. Die frisch aktivierten «Trusted Flagger» dürften allerdings künftige Siege beim «Denunzianten-Wettbewerb» im Kontext des DSA zusätzlich absichern.
Wo sind die Grenzen der Meinungsfreiheit? Sicher gibt es sie. Aber die ideologische Gleichstellung von illegalen mit unerwünschten Äußerungen verfolgt offensichtlich eher das Ziel, ein derart elementares demokratisches Grundrecht möglichst weitgehend auszuhebeln. Vorwürfe wie «Hassrede», «Delegitimierung des Staates» oder «Volksverhetzung» werden heute inflationär verwendet, um Systemkritik zu unterbinden. Gegen solche Bestrebungen gilt es, sich zu wehren.
Dieser Beitrag ist zuerst auf Transition News erschienen.
-
@ 266815e0:6cd408a5
2024-05-09 17:23:28Lot of people are starting to talk about building a web-of-trust and how nostr can or is already being used as such
We all know about using the kind:3 following lists as a simple WoT that can be used to filter out spam. but as we all know it does not really signal "trust", its mostly just "I find your content interesting"
But what about real "trust"... well its kind of multi-denominational, I could trust that your a good developer or a good journalist but still not trust you enough to invite you over to my house. There are some interesting and clever solutions proposed for quantifying "trust" in a digital sense but I'm not going to get into that here. I want to talk about something that I have not see anyone discuss yet.
How is the web-of-trust maintained? or more precisely how do you expect users to update the digital representation of the "trust" of other users?
Its all well and good to think of how a user would create that "trust" of another user when discovering them for the first time. They would click the "follow" button, or maybe even rate them on a few topics with a 1/5 star system But how will a user remove that trust? how will they update it if things change and they trust them less?
If our goal is to model "trust" in a digital sense then we NEED a way for the data to stay up-to-date and as accurate as possible. otherwise whats the use? If we don't have a friction-less way to update or remove the digital representation of "trust" then we will end up with a WoT that continuously grows and everyone is rated 10/10
In the case of nostr kind:3 following lists. its pretty easy to see how these would get updated. If someone posts something I dislike or I notice I'm getting board of their content. then I just unfollow them. An important part here is that I'm not thinking "I should update my trust score of this user" but instead "I'm no longer interested, I don't want to see this anymore"
But that is probably the easiest "trust" to update. because most of us on social media spend some time curating our feed and we are used to doing it. But what about the more obscure "trust" scores? whats the regular mechanism by which a user would update the "honestly" score of another user?
In the real world its easy, when I stop trusting someone I simply stop associating with them. there isn't any button or switch I need to update. I simply don't talk to them anymore, its friction-less But in the digital realm I would have to remove or update that trust. in other words its an action I need to take instead of an action I'm not doing. and actions take energy.
So how do we reflect something in the digital world that takes no-energy and is almost subconscious in the real world?
TLDR; webs-of-trust are not just about scoring other users once. you must keep the score up-to-date
-
@ f9c0ea75:44e849f4
2025-01-12 20:47:48For decades, Silicon Valley has been synonymous with innovation, and Wall Street has been the epicenter of economic power. Together, they shaped the modern world, attracting the brightest minds from top universities. Graduates once dreamed of launching startups, landing venture capital (VC) deals, or securing prestigious jobs in finance, believing that these industries were the engines of progress.
But as we enter 2025, the cracks in these once-revered institutions are undeniable. Silicon Valley and Wall Street, rather than pushing the boundaries of technological and financial evolution, have become disconnected from reality.
The truth is, these industries have not "exited the matrix." They have become prisoners of their own speculative cycles, artificial monetary systems, and short-term financial engineering. They thrive on hype and illusion rather than building anything of real value for society. And perhaps most significantly, they continue to dismiss Bitcoin—the one innovation that directly challenges the fiat-based foundation they stand on.
The Rise: From Innovation to Speculation
For much of the 20th and early 21st centuries, technology and finance were forces of real change.
- The 1980s–1990s: The rise of personal computing, the internet, and Wall Street’s financial expansion created unprecedented opportunities.
- The 2000s: The dot-com bubble burst but was followed by Web 2.0, mobile computing, and a boom in financial derivatives—setting the stage for the 2008 financial crisis.
- The 2010s: Silicon Valley reached peak influence with AI, social media, cloud computing, and the gig economy. Meanwhile, central banks printed trillions to "save" the economy, further detaching financial markets from real-world productivity.
Fast forward to today, and it's clear that both industries have lost their way.
The Fall: The Great Disconnection from Reality
### \ 1. Short-Term Thinking Over Long-Term Value
\ Silicon Valley claims to be about innovation, but today, it's mostly about speculation. Startups chase VC funding, aiming for rapid growth and an IPO rather than sustainable business models.
The problem extends to public companies as well. Stock buybacks, manipulated earnings reports, and short-term profit incentives dominate decision-making, sidelining real technological advancements.
2. The Financialization of Everything
\ The financial industry is no longer about allocating capital efficiently—it's about maximizing short-term gains. Markets are driven by quantitative trading algorithms, leveraged positions, and central bank policies rather than real economic fundamentals.
Silicon Valley has followed suit. Companies no longer prioritize profits but rather "growth metrics" to justify higher valuations. Business models rely on cheap debt and endless capital injections, creating an illusion of stability.
3. The Fiat Mentality: Creating Illusions Instead of Value
\ Both tech and finance have embraced a "fiat mentality"—the idea that value can be manufactured without real-world backing.
This is evident in:
- The NFT and crypto hype cycles, where billions are funneled into digital assets with no inherent utility.
- Silicon Valley startups burning cash endlessly, propped up by speculative VC money rather than genuine market demand.
- Financial markets defying economic fundamentals, rising even as debt levels skyrocket and productivity stagnates.
The collapse of Silicon Valley Bank (SVB) in 2023 was a warning. The bank failed because it operated on the assumption that interest rates would remain low forever. The industry ignored economic fundamentals, choosing instead to bet on infinite liquidity.
Yet, rather than acknowledging the flaws in the system, the response was predictable: more bailouts, more money printing, more denial.
The Industry’s Biggest Blind Spot: Bitcoin
If there’s one thing that exposes the flaws of the modern financial and tech industries, it’s Bitcoin. And yet, Silicon Valley and Wall Street continue to misunderstand it.
1. They Confuse Bitcoin with "Crypto"
Silicon Valley lumps Bitcoin into the same category as speculative crypto tokens, meme coins, and NFT projects. They fail to see that Bitcoin is fundamentally different—it is decentralized, permissionless, and operates on a fixed monetary supply, unlike fiat currencies or VC-backed blockchain projects.
2. They Underestimate Its Monetary Revolution Finance
professionals dismiss Bitcoin because they are too invested in the fiat system. The very institutions that dominate global finance—central banks, commercial banks, and hedge funds—are threatened by a monetary system that operates outside their control.
Bitcoin is not just another asset; it is a paradigm shift. It removes reliance on central banks, eliminates counterparty risk, and offers financial sovereignty in a world where fiat currencies are continuously debased.
3. They Ignore the Reality of the Debt-Driven System
The global economy runs on an unsustainable debt-based model. Governments and corporations rely on constant money printing to sustain growth, leading to asset bubbles and financial instability. Bitcoin exposes this because it operates on absolute scarcity—there will only ever be 21 million Bitcoin.
Wall Street and Silicon Valley refuse to acknowledge this reality because doing so would force them to confront the weaknesses of their own industries.
Bitcoin and the Exit from the Matrix
The industries that once defined the future—tech and finance—have ironically failed to recognize the most important technological advancement of our time. They are too focused on short-term profits and centralized control to understand that the future of money will not be dictated by governments or banks—it will be dictated by individuals choosing financial independence.
Silicon Valley and Wall Street have built an empire based on leverage, speculation, and centralization. But history has shown that these systems eventually collapse under their own weight.
The question is: Who will wake up in time?
The Future Belongs to Those Who See the Shift
The Silicon Valley and Wall Street elites have not exited the matrix. They remain trapped in a system that prioritizes financial illusions over real value.
But history does not wait for those unwilling to adapt.
-
@ f977c464:32fcbe00
2024-01-30 20:06:18Güneşin kaybolmasının üçüncü günü, saat öğlen on ikiyi yirmi geçiyordu. Trenin kalkmasına yaklaşık iki saat vardı. Hepimiz perondaydık. Valizlerimiz, kolilerimiz, renk renk ve biçimsiz çantalarımızla yan yana dizilmiş, kısa aralıklarla tepemizdeki devasa saati kontrol ediyorduk.
Ama ne kadar dik bakarsak bakalım zaman bir türlü istediğimiz hızla ilerlemiyordu. Herkes birkaç dakika sürmesi gereken alelade bir doğa olayına sıkışıp kalmış, karanlıktan sürünerek çıkmayı deniyordu.
Bekleme salonuna doğru döndüm. Nefesimden çıkan buharın arkasında, kalın taş duvarları ve camlarıyla morg kadar güvenli ve soğuk duruyordu. Cesetleri o yüzden bunun gibi yerlere taşımaya başlamışlardı. Demek insanların bütün iyiliği başkaları onları gördüğü içindi ki gündüzleri gecelerden daha karanlık olduğunda hemen birbirlerinin gırtlağına çökmüş, böğürlerinde delikler açmış, gözlerini oyup kafataslarını parçalamışlardı.
İstasyonun ışığı titrediğinde karanlığın enseme saplandığını hissettim. Eğer şimdi, böyle kalabalık bir yerde elektrik kesilse başımıza ne gelirdi?
İçerideki askerlerden biri bakışlarımı yakalayınca yeniden saate odaklanmış gibi yaptım. Sadece birkaç dakika geçmişti.
“Tarlalarım gitti. Böyle boyum kadar ayçiçeği doluydu. Ah, hepsi ölüp gidiyor. Afitap’ın çiçekleri de gi-”
“Dayı, Allah’ını seversen sus. Hepimizi yakacaksın şimdi.”
Karanlıkta durduğunda, görünmez olmayı istemeye başlıyordun. Kimse seni görmemeli, nefesini bile duymamalıydı. Kimsenin de ayağının altında dolaşmamalıydın; gelip kazayla sana çarpmamalılar, takılıp sendelememeliydiler. Yoksa aslında hedefi sen olmadığın bir öfke gürlemeye başlar, yaşadığın ilk şoku ve acıyı silerek üstünden geçerdi.
İlk konuşan, yaşlıca bir adam, kafasında kasketi, nasırlı ellerine hohluyordu. Gözleri ve burnu kızarmıştı. Güneşin kaybolması onun için kendi başına bir felaket değildi. Hayatına olan pratik yansımalarından korkuyordu olsa olsa. Bir anının kaybolması, bu yüzden çoktan kaybettiği birinin biraz daha eksilmesi. Hayatta kalmasını gerektiren sebepler azalırken, hayatta kalmasını sağlayacak kaynaklarını da kaybediyordu.
Onu susturan delikanlıysa atkısını bütün kafasına sarmış, sakalı ve yüzünün derinliklerine kaçmış gözleri dışında bedeninin bütün parçalarını gizlemeye çalışıyordu. İşte o, güneşin kaybolmasının tam olarak ne anlama geldiğini anlamamış olsa bile, dehşetini olduğu gibi hissedebilenlerdendi.
Güneşin onlardan alındıktan sonra kime verileceğini sormuyorlardı. En başta onlara verildiğinde de hiçbir soru sormamışlardı zaten.
İki saat ne zaman geçer?
Midemin üstünde, sağ tarafıma doğru keskin bir acı hissettim. Karaciğerim. Gözlerimi yumdum. Yanımda biri metal bir nesneyi yere bıraktı. Bir kafesti. İçerisindeki kartalın ıslak kokusu burnuma ulaşmadan önce bile biliyordum bunu.
“Yeniden mi?” diye sordu bana kartal. Kanatları kanlı. Zamanın her bir parçası tüylerinin üstüne çöreklenmişti. Gagası bir şey, tahminen et parçası geveliyor gibi hareket ediyordu. Eski anılar kolay unutulmazmış. Şu anda kafesinin kalın parmaklıklarının ardında olsa da bunun bir aldatmaca olduğunu bir tek ben biliyordum. Her an kanatlarını iki yana uzatıverebilir, hava bu hareketiyle dalgalanarak kafesi esneterek hepimizi içine alacak kadar genişleyebilir, parmaklıklar önce ayaklarımızın altına serilir gibi gözükebilir ama aslında hepimizin üstünde yükselerek tepemize çökebilirdi.
Aşağıya baktım. Tahtalarla zapt edilmiş, hiçbir yere gidemeyen ama her yere uzanan tren rayları. Atlayıp koşsam… Çantam çok ağırdı. Daha birkaç adım atamadan, kartal, suratını bedenime gömerdi.
“Bu sefer farklı,” diye yanıtladım onu. “Yeniden diyemezsin. Tekrarladığım bir şey değil bu. Hatta bir hata yapıyormuşum gibi tonlayamazsın da. Bu sefer, insanların hak etmediğini biliyorum.”
“O zaman daha vahim. Süzme salaksın demektir.”
“İnsanların hak etmemesi, insanlığın hak etmediği anlamına gelmez ki.”
Az önce göz göze geldiğim genççe ama çökük asker hâlâ bana bakıyordu. Bir kartalla konuştuğumu anlamamıştı şüphesiz. Yanımdakilerden biriyle konuştuğumu sanmış olmalıydı. Ama konuştuğum kişiye bakmıyordum ona göre. Çekingence kafamı eğmiştim. Bir kez daha göz göze geldiğimizde içerideki diğer iki askere bir şeyler söyledi, onlar dönüp beni süzerken dışarı çıktı.
Yanımızdaki, az önce konuşan iki adam da şaşkınlıkla bir bana bir kartala bakıyordu.
“Yalnız bu sefer kalbin de kırılacak, Prometheus,” dedi kartal, bana. “Belki son olur. Biliyorsun, bir sürü soruna neden oluyor bu yaptıkların.”
Beni koruyordu sözde. En çok kanıma dokunan buydu. Kasıklarımın üstüne oturmuş, kanlı suratının ardında gözleri parlarken attığı çığlık kulaklarımda titremeye devam ediyordu. Bu tabloda kimsenin kimseyi düşündüğü yoktu. Kartalın, yanımızdaki adamların, artık arkama kadar gelmiş olması gereken askerin, tren raylarının, geçmeyen saatlerin…
Arkamı döndüğümde, asker sahiden oradaydı. Zaten öyle olması gerekiyordu; görmüştüm bunu, biliyordum. Kehanetler… Bir şeyler söylüyordu ama ağzı oynarken sesi çıkmıyordu. Yavaşlamış, kendisini saatin akışına uydurmuştu. Havada donan tükürüğünden anlaşılıyordu, sinirliydi. Korktuğu için olduğunu biliyordum. Her seferinde korkmuşlardı. Beni unutmuş olmaları işlerini kolaylaştırmıyordu. Sadece yeni bir isim vermelerine neden oluyordu. Bu seferkiyle beni lanetleyecekleri kesinleşmişti.
Olması gerekenle olanların farklı olması ne kadar acınasıydı. Olması gerekenlerin doğasının kötücül olmasıysa bir yerde buna dayanıyordu.
“Salaksın,” dedi kartal bana. Zamanı aşan bir çığlık. Hepimizin önüne geçmişti ama kimseyi durduramıyordu.
Sonsuzluğa kaç tane iki saat sıkıştırabilirsiniz?
Ben bir tane bile sıkıştıramadım.
Çantama uzanıyordum. Asker de sırtındaki tüfeğini indiriyordu. Benim acelem yoktu, onunsa eli ayağı birbirine dolaşıyordu. Oysaki her şey tam olması gerektiği anda olacaktı. Kehanet başkasının parmaklarının ucundaydı.
Güneş, bir tüfeğin patlamasıyla yeryüzüne doğdu.
Rayların üzerine serilmiş göğsümün ortasından, bir çantanın içinden.
Not: Bu öykü ilk olarak 2021 yılında Esrarengiz Hikâyeler'de yayımlanmıştır.
-
@ c631e267:c2b78d3e
2024-10-23 20:26:10Herzlichen Glückwunsch zum dritten Geburtstag, liebe Denk Bar! Wieso zum dritten? Das war doch 2022 und jetzt sind wir im Jahr 2024, oder? Ja, das ist schon richtig, aber bei Geburtstagen erinnere ich mich immer auch an meinen Vater, und der behauptete oft, der erste sei ja schließlich der Tag der Geburt selber und den müsse man natürlich mitzählen. Wo er recht hat, hat er nunmal recht. Konsequenterweise wird also heute dieser Blog an seinem dritten Geburtstag zwei Jahre alt.
Das ist ein Grund zum Feiern, wie ich finde. Einerseits ganz einfach, weil es dafür gar nicht genug Gründe geben kann. «Das Leben sind zwei Tage», lautet ein gängiger Ausdruck hier in Andalusien. In der Tat könnte es so sein, auch wenn wir uns im Alltag oft genug von der Routine vereinnahmen lassen.
Seit dem Start der Denk Bar vor zwei Jahren ist unglaublich viel passiert. Ebenso wie die zweieinhalb Jahre davor, und all jenes war letztlich auch der Auslöser dafür, dass ich begann, öffentlich zu schreiben. Damals notierte ich:
«Seit einigen Jahren erscheint unser öffentliches Umfeld immer fragwürdiger, widersprüchlicher und manchmal schier unglaublich - jede Menge Anlass für eigene Recherchen und Gedanken, ganz einfach mit einer Portion gesundem Menschenverstand.»
Wir erleben den sogenannten «großen Umbruch», einen globalen Coup, den skrupellose Egoisten clever eingefädelt haben und seit ein paar Jahren knallhart – aber nett verpackt – durchziehen, um buchstäblich alles nach ihrem Gusto umzukrempeln. Die Gelegenheit ist ja angeblich günstig und muss genutzt werden.
Nie hätte ich mir träumen lassen, dass ich so etwas jemals miterleben müsste. Die Bosheit, mit der ganz offensichtlich gegen die eigene Bevölkerung gearbeitet wird, war früher für mich unvorstellbar. Mein (Rest-) Vertrauen in alle möglichen Bereiche wie Politik, Wissenschaft, Justiz, Medien oder Kirche ist praktisch komplett zerstört. Einen «inneren Totalschaden» hatte ich mal für unsere Gesellschaften diagnostiziert.
Was mich vielleicht am meisten erschreckt, ist zum einen das Niveau der Gleichschaltung, das weltweit erreicht werden konnte, und zum anderen die praktisch totale Spaltung der Gesellschaft. Haben wir das tatsächlich mit uns machen lassen?? Unfassbar! Aber das Werkzeug «Angst» ist sehr mächtig und funktioniert bis heute.
Zum Glück passieren auch positive Dinge und neue Perspektiven öffnen sich. Für viele Menschen waren und sind die Entwicklungen der letzten Jahre ein Augenöffner. Sie sehen «Querdenken» als das, was es ist: eine Tugend.
Auch die immer ernsteren Zensurbemühungen sind letztlich nur ein Zeichen der Schwäche, wo Argumente fehlen. Sie werden nicht verhindern, dass wir unsere Meinung äußern, unbequeme Fragen stellen und dass die Wahrheit peu à peu ans Licht kommt. Es gibt immer Mittel und Wege, auch für uns.
Danke, dass du diesen Weg mit mir weitergehst!
-
@ 3bf0c63f:aefa459d
2024-01-14 13:55:28O Planetinha
Fumaça verde me entrando pelas narinas e um coro desafinado fazia uma base melódica.
nos confins da galáxia havia um planetinha isolado. Era um planeta feliz.
O homem vestido de mago começava a aparecer por detrás da fumaça verde.
O planetinha recebeu três presentes, mas o seu habitante, o homem, estava num estado de confusão tão grande que ameaçava estragá-los. Os homens já havia escravizado o primeiro presente, a vida; lutavam contra o segundo presente, a morte; e havia alguns que achavam que deviam destruir totalmente o terceiro, o amor, e com isto levar a desordem total ao pobre planetinha perdido, que se chamava Terra.
O coro desafinado entrou antes do "Terra" cantando várias vezes, como se imitasse um eco, "terra-terra-terraaa". Depois de uma pausa dramática, o homem vestido de mago voltou a falar.
Terra, nossa nave mãe.
Neste momento eu me afastei. À frente do palco onde o mago e seu coral faziam apelos à multidão havia vários estandes cobertos com a tradicional armação de quatro pernas e lona branca. Em todos os cantos da praça havia gente, gente dos mais variados tipos. Visitantes curiosos que se aproximavam atraídos pela fumaça verde e as barraquinhas, gente que aproveitava o movimento para vender doces sem pagar imposto, casais que se abraçavam de pé para espantar o frio, os tradicionais corredores que faziam seu cooper, gente cheia de barba e vestida para imitar os hippies dos anos 60 e vender colares estendidos no chão, transeuntes novos e velhos, vestidos como baladeiros ou como ativistas do ônibus grátis, grupos de ciclistas entusiastas.
O mago fazia agora apelos para que nós, os homens, habitantes do isolado planetinha, passássemos a ver o planetinha, nossa nave mãe, como um todo, e adquiríssemos a consciência de que ele estava entrando em maus lençóis. A idéia, reforçada pela logomarca do evento, era que parássemos de olhar só para a nossa vida e pensássemos no planeta.
A logomarca do evento, um desenho estilizado do planeta Terra, nada tinha a ver com seu nome: "Festival Andando de Bem com a Vida", mas havia sido ali colocada estrategicamente pelos organizadores, de quem parecia justamente sair a mensagem dita pelo mago.
Aquela multidão de pessoas que, assim como eu, tinham suas próprias preocupações, não podiam ver o quadro caótico que formavam, cada uma com seus atos isolados, ali naquela praça isolada, naquele planeta isolado. Quando o hippie barbudo, quase um Osho, assustava um casal para tentar vender-lhes um colar, a quantidade de caos que isto acrescentava à cena era gigantesca. Por um segundo, pude ver, como se estivesse de longe e acima, com toda a pretensão que este estado imaginativo carrega, a cena completa do caos.
Uma nave-mãe, dessas de ficção científica, habitada por milhões de pessoas, seguia no espaço sem rumo, e sem saber que logo à frente um longo precipício espacial a esperava, para a desgraça completa sua e de seus habitantes.
Acostumados àquela nave tanto quanto outrora estiveram acostumados à sua terra natal, os homens viviam as próprias vidas sem nem se lembrar que estavam vagando pelo espaço. Ninguém sabia quem estava conduzindo a nave, e ninguém se importava.
No final do filme descobre-se que era a soma completa do caos que cada habitante produzia, com seus gestos egoístas e incapazes de levar em conta a totalidade, é que determinava a direção da nave-mãe. O efeito, no entanto, não era imediato, como nunca é. Havia gente de verdade encarregada de conduzir a nave, mas era uma gente bêbada, mau-caráter, que vivia brigando pelo controle da nave e o poder que isto lhes dava. Poder, status, dinheiro!
Essa gente bêbada era atraída até ali pela corrupção das instituições e da moral comum que, no fundo no fundo, era causada pelo egoísmo da população, através de um complexo -- mas que no filme aparece simplificado pela ação individual de um magnata do divertimento público -- processo social.
O homem vestido de mago era mais um agente causador de caos, com sua cena cheia de fumaça e sua roupa estroboscópica, ele achava que estava fazendo o bem ao alertar sua platéia, todos as sextas-feiras, de que havia algo que precisava ser feito, que cada um que estava ali ouvindo era responsável pelo planeta. A sua incapacidade, porém, de explicar o que precisava ser feito só aumentava a angústia geral; a culpa que ele jogava sobre seu público, e que era prontamente aceita e passada em frente, aos familiares e amigos de cada um, atormentava-os diariamente e os impedia de ter uma vida decente no trabalho e em casa. As famílias, estressadas, estavam constantemente brigando e os motivos mais insignificantes eram responsáveis pelas mais horrendas conseqüências.
O mago, que após o show tirava o chapéu entortado e ia tomar cerveja num boteco, era responsável por uma parcela considerável do caos que levava a nave na direção do seu desgraçado fim. No filme, porém, um dos transeuntes que de passagem ouviu um pedaço do discurso do mago despertou em si mesmo uma consiência transformadora e, com poderes sobre-humanos que lhe foram então concedidos por uma ordem iniciática do bem ou não, usando só os seus poderes humanos mesmo, o transeunte -- na primeira versão do filme um homem, na segunda uma mulher -- consegue consertar as instituições e retirar os bêbados da condução da máquina. A questão da moral pública é ignorada para abreviar a trama, já com duas horas e quarenta de duração, mas subentende-se que ela também fora resolvida.
No planeta Terra real, que não está indo em direção alguma, preso pela gravidade ao Sol, e onde as pessoas vivem a própria vida porque lhes é impossível viver a dos outros, não têm uma consciência global de nada porque só é possível mesmo ter a consciência delas mesmas, e onde a maioria, de uma maneira ou de outra, está tentando como pode, fazer as coisas direito, o filme é exibido.
Para a maioria dos espectadores, é um filme que evoca reflexões, um filme forte. Por um segundo elas têm o mesmo vislumbre do caos generalizado que eu tive ali naquela praça. Para uma pequena parcela dos espectadores -- entre eles alguns dos que estavam na platéia do mago, o próprio mago, o seguidor do Osho, o casal de duas mulheres e o vendedor de brigadeiros, mas aos quais se somam também críticos de televisão e jornal e gente que fala pelos cotovelos na internet -- o filme é um horror, o filme é uma vulgarização de um problema real e sério, o filme apela para a figura do herói salvador e passa uma mensagem totalmente errada, de que a maioria da população pode continuar vivendo as suas própria vidinhas miseráveis enquanto espera por um herói que vem do Olimpo e os salva da mixórdia que eles mesmos causaram, é um filme que presta um enorme desserviço à causa.
No dia seguinte ao lançamento, num bar meio caro ali perto da praça, numa mesa com oito pessoas, entre elas seis do primeiro grupo e oito do segundo, discute-se se o filme levará ou não o Oscar. Eu estou em casa dormindo e não escuto nada.
-
@ 41fa852b:af7b7706
2025-01-12 14:50:25The art of life is a constant readjustment to our surroundings." --Okakura Kakuzo
Here we go with another fresh list of meetups for the UK and Ireland this coming week.
We've got the latest on where to connect, share ideas, and build community.
Let's take a look…
This week's sponsor is…
Upcoming Bitcoin Meetups
Happening this week…
-
Dundee Bitcoin: Join them on the 2nd Monday of every month from 17:30 to 20:30 PM at The Wine Press, 16 Shore Terrace, Dundee DD1 3DN. This month's meetup is on Monday, 13th January. 🍷
-
Real Bedford - Home Game: Real Bedford have two home games this week. The first is on Tuesday night at 19:45 playing Berkhamsted. ⚽️
-
Bitcoin Glasgow: Bitcoin Glasgow meet every 3rd Wednesday of the month and this month will be at The Maltman, 59--61 Renfield Street at 18:00 to 20:00. 🍺
-
Shropshire Bitcoin: On the 15th, the Shropshire crew will be meeting at the Admiral Benbow in Shrewsbury. 🍻
-
Brum Bitcoin & Beer: If you're in the Birmingham area head along to meet some fellow bitcoiners on Thursday 16th at 19:00. You'll find them this month at The Wellington, Bennett's Hill, B2 5SN. 🍺
-
Penzance Bitcoin: Will be at The Dolphin Tavern on Quay Street on Thursday 16th at 8 PM. 🍻
-
Bitcoin Walk - Edinburgh: Every Saturday they walk around Arthur's Seat in this historic city. Join them at 12:00 to chat about all things Bitcoin and keep fit. 🚶♂️🚶🏻♀️🚶🦮
-
Real Bedford - Home Game: Real Bedford have their second home game this week playing Leverstock Green on Saturday. Join them for a 15:00 kickoff. ⚽️
-
NostrLDN: The fourth NostrLDN and this time with guests Metamick (founder and CEO of Geyser Fund) and Huxley (Charities, Afrika, Bitcoin education). Join them on Saturday the 18th of January at the London Bridge Rooftop Bar from 18:00 till 22:00. 🍻👨🏼🎓💜
Upcoming Special Events
This event isn't happening this week, but it's important to add to your calendar now as tickets are selling fast.
- Bitcoin Builders Workshop: Corby-based engineering company BTC Citadel hosts an afternoon of Bitcoin building and chat. Build that project you've been thinking about but didn't know how to start. Come and use high-end 3D printers, 3D scanners, electronics lab and the CNC laser engraver. Everyone is welcome, no technical ability is needed. Learn how to build a Seedsigner. Refreshments are provided for this free event.
Get Involved
- Volunteer Opportunities: Bridge2Bitcoin is actively seeking volunteers who share our passion for merchant adoption. We'd be delighted to connect if you're eager to contribute. Reach out to us on Twitter or through our website.
- Start Your Own Meetup: Interested in launching a Bitcoin meetup? We're here to support you every step of the way. We've assisted numerous UK Bitcoin meetups in getting started. Get in touch via Twitter.
- Contribute to BTCMaps: BTCMaps is a vital part of the Bitcoin ecosystem. It's a perfect project to get involved with if you're not a coder or even that technical. A great way to give back to the community. Maintain an area of the UK and keep it up-to-date.
- Telegram users: You might find our Telegram Channel another useful way to keep up-to-date with UK meetups.
- Feedback and Suggestions: We value your input! Share your ideas on how we can enhance this newsletter.
This week's sponsors are…
Get out and support the meetups where you can, visit Bitcoin Events UK for more info on each meetup and to find your closest on the interactive map.
Stay tuned for more updates next week!
Simon.
-
-
@ a95c6243:d345522c
2024-10-19 08:58:08Ein Lämmchen löschte an einem Bache seinen Durst. Fern von ihm, aber näher der Quelle, tat ein Wolf das gleiche. Kaum erblickte er das Lämmchen, so schrie er:
"Warum trübst du mir das Wasser, das ich trinken will?"
"Wie wäre das möglich", erwiderte schüchtern das Lämmchen, "ich stehe hier unten und du so weit oben; das Wasser fließt ja von dir zu mir; glaube mir, es kam mir nie in den Sinn, dir etwas Böses zu tun!"
"Ei, sieh doch! Du machst es gerade, wie dein Vater vor sechs Monaten; ich erinnere mich noch sehr wohl, daß auch du dabei warst, aber glücklich entkamst, als ich ihm für sein Schmähen das Fell abzog!"
"Ach, Herr!" flehte das zitternde Lämmchen, "ich bin ja erst vier Wochen alt und kannte meinen Vater gar nicht, so lange ist er schon tot; wie soll ich denn für ihn büßen."
"Du Unverschämter!" so endigt der Wolf mit erheuchelter Wut, indem er die Zähne fletschte. "Tot oder nicht tot, weiß ich doch, daß euer ganzes Geschlecht mich hasset, und dafür muß ich mich rächen."
Ohne weitere Umstände zu machen, zerriß er das Lämmchen und verschlang es.
Das Gewissen regt sich selbst bei dem größten Bösewichte; er sucht doch nach Vorwand, um dasselbe damit bei Begehung seiner Schlechtigkeiten zu beschwichtigen.
Quelle: https://eden.one/fabeln-aesop-das-lamm-und-der-wolf
-
@ 0403c86a:66d3a378
2025-01-11 19:45:53It's hard to believe it's been a year since we first went live oN Global Sports Central! We're thrilled to celebrate this milestone and take a look back at some amazing numbers.
Here are some highlights:
- Notes: We've published an incredible 5978 notes, with a total of 7260 notes and replies combined!
- Engagement: Our community has shown us love with 7580 likes, 6651 replies, and only 13 reports.
- Zaps: We've received an astonishing 711 #zaps, with a total amount of 79926 #sats received. Plus a couple of decisive #Nostrich that came oN support proven there's a path for #V4V
- Community: We're proud to have 14273 followers iN our first year, with 80K sats received.
- Reach: Our content has been viewed and interacted with by thousands of users, making us one of the most active profiles on #Nostr
We couldn't have done it without you! Your support and engagement have made this journey so rewarding. We're excited to see what the future holds and can't wait to share more updates with you!
Thank you for being part of our journey!
-
@ f977c464:32fcbe00
2024-01-11 18:47:47Kendisini aynada ilk defa gördüğü o gün, diğerleri gibi olduğunu anlamıştı. Oysaki her insan biricik olmalıydı. Sözgelimi sinirlendiğinde bir kaşı diğerinden birkaç milimetre daha az çatılabilirdi veya sevindiğinde dudağı ona has bir açıyla dalgalanabilirdi. Hatta bunların hiçbiri mümkün değilse, en azından, gözlerinin içinde sadece onun sahip olabileceği bir ışık parlayabilirdi. Çok sıradan, öyle sıradan ki kimsenin fark etmediği o milyonlarca minik şeyden herhangi biri. Ne olursa.
Ama yansımasına bakarken bunların hiçbirini bulamadı ve diğer günlerden hiç de farklı başlamamış o gün, işe gitmek için vagonunun gelmesini beklediği alelade bir metro istasyonunda, içinde kaybolduğu illüzyon dağılmaya başladı.
İlk önce derisi döküldü. Tam olarak dökülmedi aslında, daha çok kıvılcımlara dönüşüp bedeninden fırlamış ve bir an sonra sönerek külleşmiş, havada dağılmıştı. Ardında da, kaybolmadan hemen önce, kısa süre için hayal meyal görülebilen, bir ruhun yok oluşuna ağıt yakan rengârenk peri cesetleri bırakmıştı. Beklenenin aksine, havaya toz kokusu yayıldı.
Dehşete düştü elbette. Dehşete düştüler. Panikle üstlerini yırtan 50 işçi. Her şeyin sebebiyse o vagon.
Saçları da döküldü. Her tel, yere varmadan önce, her santimde ikiye ayrıla ayrıla yok oldu.
Bütün yüzeylerin mat olduğu, hiçbir şeyin yansımadığı, suyun siyah aktığı ve kendine ancak kameralarla bakabildiğin bir dünyada, vagonun içine yerleştirilmiş bir aynadan ilk defa kendini görmek.
Gözlerinin akları buharlaşıp havada dağıldı, mercekleri boşalan yeri doldurmak için eriyip yayıldı. Gerçeği görmemek için yaratılmış, bu yüzden görmeye hazır olmayan ve hiç olmayacak gözler.
Her şeyin o anda sona erdiğini sanabilirdi insan. Derin bir karanlık ve ölüm. Görmenin görmek olduğu o anın bitişi.
Ben geldiğimde ölmüşlerdi.
Yani bozulmuşlardı demek istiyorum.
Belleklerini yeni taşıyıcılara takmam mümkün olmadı. Fiziksel olarak kusursuz durumdaydılar, olmayanları da tamir edebilirdim ama tüm o hengamede kendilerini baştan programlamış ve girdilerini modifiye etmişlerdi.
Belleklerden birini masanın üzerinden ileriye savurdu. Hınca hınç dolu bir barda oturuyorlardı. O ve arkadaşı.
Sırf şu kendisini insan sanan androidler travma geçirip delirmesin diye neler yapıyoruz, insanın aklı almıyor.
Eliyle arkasını işaret etti.
Polislerin söylediğine göre biri vagonun içerisine ayna yerleştirmiş. Bu zavallılar da kapı açılıp bir anda yansımalarını görünce kafayı kırmışlar.
Arkadaşı bunların ona ne hissettirdiğini sordu. Yani o kadar bozuk, insan olduğunu sanan androidi kendilerini parçalamış olarak yerde görmek onu sarsmamış mıydı?
Hayır, sonuçta belirli bir amaç için yaratılmış şeyler onlar. Kaliteli bir bilgisayarım bozulduğunda üzülürüm çünkü parasını ben vermişimdir. Bunlarsa devletin. Bana ne ki?
Arkadaşı anlayışla kafasını sallayıp suyundan bir yudum aldı. Kravatını biraz gevşetti.
Bira istemediğinden emin misin?
İstemediğini söyledi. Sahi, neden deliriyordu bu androidler?
Basit. Onların yapay zekâlarını kodlarken bir şeyler yazıyorlar. Yazılımcılar. Biliyorsun, ben donanımdayım. Bunlar da kendilerini insan sanıyorlar. Tiplerine bak.
Sesini alçalttı.
Arabalarda kaza testi yapılan mankenlere benziyor hepsi. Ağızları burunları bile yok ama şu geldiğimizden beri sakalını düzeltip duruyor mesela. Hayır, hepsi de diğerleri onun sakalı varmış sanıyor, o manyak bir şey.
Arkadaşı bunun delirmeleriyle bağlantısını çözemediğini söyledi. O da normal sesiyle konuşmaya devam etti.
Anlasana, aynayı falan ayırt edemiyor mercekleri. Lönk diye kendilerini görüyorlar. Böyle, olduğu gibi...
Nedenmiş peki? Ne gerek varmış?
Ne bileyim be abicim! Ahiret soruları gibi.
Birasına bakarak dalıp gitti. Sonra masaya abanarak arkadaşına iyice yaklaştı. Bulanık, bir tünelin ucundaki biri gibi, şekli şemalı belirsiz bir adam.
Ben seni nereden tanıyorum ki ulan? Kimsin sen?
Belleği makineden çıkardılar. İki kişiydiler. Soruşturmadan sorumlu memurlar.
─ Baştan mı başlıyoruz, diye sordu belleği elinde tutan ilk memur.
─ Bir kere daha deneyelim ama bu sefer direkt aynayı sorarak başla, diye cevapladı ikinci memur.
─ Bence de. Yeterince düzgün çalışıyor.
Simülasyon yüklenirken, ayakta, biraz arkada duran ve alnını kaşıyan ikinci memur sormaktan kendisini alamadı:
─ Bu androidleri niye böyle bir olay yerine göndermişler ki? Belli tost olacakları. İsraf. Gidip biz baksak aynayı kırıp delilleri mahvetmek zorunda da kalmazlar.
Diğer memur sandalyesinde hafifçe dönecek oldu, o sırada soruyu bilgisayarın hoparlöründen teknisyen cevapladı.
Hangi işimizde bir yamukluk yok ki be abi.
Ama bir son değildi. Üstlerindeki tüm illüzyon dağıldığında ve çıplak, cinsiyetsiz, birbirinin aynı bedenleriyle kaldıklarında sıra dünyaya gelmişti.
Yere düştüler. Elleri -bütün bedeni gibi siyah turmalinden, boğumları çelikten- yere değdiği anda, metronun zemini dağıldı.
Yerdeki karolar öncesinde beyazdı ve çok parlaktı. Tepelerindeki floresan, ışığını olduğu gibi yansıtıyor, tek bir lekenin olmadığı ve tek bir tozun uçmadığı istasyonu aydınlatıyorlardı.
Duvarlara duyurular asılmıştı. Örneğin, yarın akşam kültür merkezinde 20.00’da başlayacak bir tekno blues festivalinin cıvıl cıvıl afişi vardı. Onun yanında daha geniş, sarı puntolu harflerle yazılmış, yatay siyah kesiklerle çerçevesi çizilmiş, bir platformdan düşen çöp adamın bulunduğu “Dikkat! Sarı bandı geçmeyin!” uyarısı. Biraz ilerisinde günlük resmi gazete, onun ilerisinde bir aksiyon filminin ve başka bir romantik komedi filminin afişleri, yapılacakların ve yapılmayacakların söylendiği küçük puntolu çeşitli duyurular... Duvar uzayıp giden bir panoydu. On, on beş metrede bir tekrarlanıyordu.
Tüm istasyonun eni yüz metre kadar. Genişliği on metre civarı.
Önlerinde, açık kapısından o mendebur aynanın gözüktüğü vagon duruyordu. Metro, istasyona sığmayacak kadar uzundu. Bir kılıcın keskinliğiyle uzanıyor ama yer yer vagonların ek yerleriyle bölünüyordu.
Hiçbir vagonda pencere olmadığı için metronun içi, içlerindekiler meçhuldü.
Sonrasında karolar zerrelerine ayrılarak yükseldi. Floresanın ışığında her yeri toza boğdular ve ortalığı gri bir sisin altına gömdüler. Çok kısa bir an. Afişleri dalgalandırmadılar. Dalgalandırmaya vakitleri olmadı. Yerlerinden söküp aldılar en fazla. Işık birkaç kere sönüp yanarak direndi. Son kez söndüğünde bir daha geri gelmedi.
Yine de etraf aydınlıktı. Kırmızı, her yere eşit dağılan soluk bir ışıkla.
Yer tamamen tele dönüşmüştü. Altında çapraz hatlarla desteklenmiş demir bir iskelet. Işık birkaç metreden daha fazla aşağıya uzanamıyordu. Sonsuzluğa giden bir uçurum.
Duvarın yerini aynı teller ve demir iskelet almıştı. Arkasında, birbirine vidalarla tutturulmuş demir plakalardan oluşan, üstünden geçen boruların ek yerlerinden bazen ince buharların çıktığı ve bir süre asılı kaldıktan sonra ağır, yağlı bir havayla sürüklendiği bir koridor.
Diğer tarafta paslanmış, pencerelerindeki camlar kırıldığı için demir plakalarla kapatılmış külüstür bir metro. Kapının karşısındaki aynadan her şey olduğu gibi yansıyordu.
Bir konteynırın içini andıran bir evde, gerçi gayet de birbirine eklenmiş konteynırlardan oluşan bir şehirde “andıran” demek doğru olmayacağı için düpedüz bir konteynırın içinde, masaya mum görüntüsü vermek için koyulmuş, yarı katı yağ atıklarından şekillendirilmiş kütleleri yakmayı deniyordu. Kafasında hayvan kıllarından yapılmış grili siyahlı bir peruk. Aynı kıllardan kendisine gür bir bıyık da yapmıştı.
Üstünde mavi çöp poşetlerinden yapılmış, kravatlı, şık bir takım.
Masanın ayakları yerine oradan buradan çıkmış parçalar konulmuştu: bir arabanın şaft mili, üst üste konulmuş ve üstünde yazı okunamayan tenekeler, boş kitaplar, boş gazete balyaları... Hiçbir şeye yazı yazılmıyordu, gerek yoktu da zaten çünkü merkez veri bankası onları fark ettirmeden, merceklerden giren veriyi sentezleyerek insanlar için dolduruyordu. Yani, androidler için. Farklı şekilde isimlendirmek bir fark yaratacaksa.
Onların mercekleri için değil. Bağlantıları çok önceden kopmuştu.
─ Hayatım, sofra hazır, diye bağırdı yatak odasındaki karısına.
Sofrada tabak yerine düz, bardak yerine bükülmüş, çatal ve bıçak yerine sivriltilmiş plakalar.
Karısı salonun kapısında durakladı ve ancak kulaklarına kadar uzanan, kocasınınkine benzeyen, cansız, ölü hayvanların kıllarından ibaret peruğunu eliyle düzeltti. Dudağını, daha doğrusu dudağının olması gereken yeri koyu kırmızı bir yağ tabakasıyla renklendirmeyi denemişti. Biraz da yanaklarına sürmüştü.
─ Nasıl olmuş, diye sordu.
Sesi tek düzeydi ama hafif bir neşe olduğunu hissettiğinize yemin edebilirdiniz.
Üzerinde, çöp poşetlerinin içini yazısız gazete kağıtlarıyla doldurarak yaptığı iki parça giysi.
─ Çok güzelsin, diyerek kravatını düzeltti kocası.
─ Sen de öylesin, sevgilim.
Yaklaşıp kocasını öptü. Kocası da onu. Sonra nazikçe elinden tutarak, sandalyesini geriye çekerek oturmasına yardım etti.
Sofrada yemek niyetine hiçbir şey yoktu. Gerek de yoktu zaten.
Konteynırın kapısı gürültüyle tekmelenip içeri iki memur girene kadar birbirlerine öyküler anlattılar. O gün neler yaptıklarını. İşten erken çıkıp yemyeşil çimenlerde gezdiklerini, uçurtma uçurduklarını, kadının nasıl o elbiseyi bulmak için saatlerce gezip yorulduğunu, kocasının kısa süreliğine işe dönüp nasıl başarılı bir hamleyle yaşanan krizi çözdüğünü ve kadının yanına döndükten sonra, alışveriş merkezinde oturdukları yeni dondurmacının dondurmalarının ne kadar lezzetli olduğunu, boğazlarının ağrımasından korktuklarını...
Akşam film izleyebilirlerdi, televizyonda -boş ve mat bir plaka- güzel bir film oynayacaktı.
İki memur. Çıplak bedenleriyle birbirinin aynı. Ellerindeki silahları onlara doğrultmuşlardı. Mum ışığında, tertemiz bir örtünün serili olduğu masada, bardaklarında şaraplarla oturan ve henüz sofranın ortasındaki hindiye dokunmamış çifti gördüklerinde bocaladılar.
Hiç de androidlere bilinçli olarak zarar verebilecek gibi gözükmüyorlardı.
─ Sessiz kalma hakkına sahipsiniz, diye bağırdı içeri giren ikinci memur. Söylediğiniz her şey...
Cümlesini bitiremedi. Yatak odasındaki, masanın üzerinden gördüğü o şey, onunla aynı hareketleri yapan android, yoksa, bir aynadaki yansıması mıydı?
Bütün illüzyon o anda dağılmaya başladı.
Not: Bu öykü ilk olarak 2020 yılında Esrarengiz Hikâyeler'de yayımlanmıştır.
-
@ 5a8e581f:c150c8ba
2025-01-11 18:31:08Doing Bitcoin the right way is hard.
If Bull Bitcoin wanted to take the easy path, we would have done what all the other exchanges are doing and would simply have offered a custodial wallet to our users. But our mission is not to sell numbers on a screen, fake paper bitcoin and IOUs. Our mission is to create sovereign individuals. If our clients don’t take full control over their wealth, we have failed them.
If we wanted to take the easy path, we would have offered shitcoin trading, NFTs, ICOs, yield and all sorts of nonsense. No doubt, we would today be far more wealthy.
But we would have failed in our mission to establish a universal Bitcoin standard and fixed the problems created by easy money. We would have compromised on our values and sold products that we don’t believe in and we don’t personally use.
If we wanted to take the easy path, we wouldn't have spent years building open-source software that lets any business run their own self-hosted Bitcoin wallet API infrastructure connected directly to their own Bitcoin, Lightning and Liquid network nodes. We would have just done a deal with Coinbase or another third party to take care of the Bitcoin engineering on our behalf.
But we would have failed in our mission to help keep the Bitcoin network decentralized and resilient to institutional failures. We would have lost our direct and precious connection to the Bitcoin network.
The engineering, operational and logistical challenges involved in maintaining a noncustodial Bitcoin service like Bull Bitcoin, in an environment where Bitcoin network fees are increasingly high, while also maintaining an accessible user experience with minimal compromises on the cypherpunk principles of Bitcoin… are impossibly hard to fathom for the vast majority of Bitcoiners.
Despite consistently taking the most difficult path at every turn, Bull Bitcoin has nonetheless been crushing it for the past 10 years thanks to our Bitcoiner ethos and mindset, sticking to our core values and creating products with a singular focus: engineering sovereignty.
All of this we accomplished without any outside funding. Every sat invested in Bull Bitcoin was acquired by offering a service valued by our customers. Every network fee we pay, every investment in R&D comes straight out of our pockets. If our bitcoin-only noncustodial model fails and we become unprofitable, there will be no bailout.
As a low-time preference business, taking the hard path today means we will have a unique competitive advantage in the future. Nobody uses Bitcoin more than a non-custodial exchange. Every trade and every revenue generating activity is derived directly from a Bitcoin payment. We are keenly aware of every possible problem that Bitcoin users may be facing, because we are ourselves are a power user. We know what kinds of problems the users will face, what solutions we need to build and how we must adapt. We always skate where the puck is going.
But there is another, more noble purpose to choosing the hard path.
I'm also heavily involved in a community circular economy project in Costa Rica called Bitcoin Jungle. We spend countless hours to educate locals, set merchants up with Bitcoin point of sales, and build the infrastructure necessary for Bitcoin to thrive as a medium of exchange in even the most rural areas. All of this we do for free, and in fact it we pay for it out of pocket! I discovered recently that a few people were skeptical of our efforts. I met one of them and he asked us “but why are you doing this, if you don't make any money from it”.
We do it because we love Bitcoin. We believe in the ideology of Bitcoin, its underlying cypherpunk and free market principles. We do it because we as sovereign individuals cannot live in isolation and we all benefit from the success of our communities. We do it because we want our kids to grow up in a world that is free from the evils of Fiat currency. May our children never suffer the corruption of participating in a socialist economic system that steals their time and their wealth by the simple fact of interacting with fiat currency. We do it because doing it is a moral imperative. In a world of systematic injustice, doing nothing is to be complicit. You cannot live a virtuous life with the knowledge that you had the capacity to act heroically but chose to capitulate.
Bitcoin is at the center of a spiritual war between forces of corruption and forces of liberation. There is a higher power that calls us to become the resistance. Bitcoin is hope. Bitcoin is salvation. If Bitcoin fails, everyone on earth is truly and utterly fucked.
We are on the cusp of a fundamental civilizational change. The global debt-fueled fiat ponzi is imploding right before our eyes. What comes next is up to us to determine. We are the right place and the right time. We have a unique window of opportunity that may not come again within our lifetimes and that of our children.
The choices we make today will shape what the world looks hundreds of years from now. Whether our descendants live in totalitarian dystopias or will be ushering in a new era of prosperity and freedom depends on our willingness to choose the hard path today.
And if you think the hard part is over and that Bitcoin has already won, think again. During our decade of operational experience, there were few serious attacks on the Bitcoin network. Bitcoin had relatively low levels of adoption and apart from a few periods of intense fee spikes and the fork wars of 2017, it was smooth sailing. Bitcoin was mostly flying under the radar, left to develop organically in the hands of its cypherpunk caretakers.
This era of complacency is over. From now on, everything is about to get much, much harder. This is what we live for! Nothing easy is worth pursuing.
Bull Bitcoin hasn't given up on Bitcoin's mission to free humanity from the shackles of fiat slavery and centralized systems, we are reinvigorated by the challenges that Bitcoin is facing and that will continue to intensify.
We will not give up on Bitcoin's use case as a medium of exchange and we will continue to build tools that make it easy for anyone to opt out of the traditional banking system to conduct peer-to-peer transactions securely, as was originally intended by Satoshi when launched the Bitcoin project.
This new epoch, Bull Bitcoin is leveling up to an entire new standard for consumer-facing Bitcoin apps, higher than anyone has ever seen. We have been thinking about how to make our unique noncustodial model work sustainably long-term for years. This is the hill that we choose to die on.
But as we entered into a new Bitcoin epoch, I've witnessed many in the Bitcoin community become cynical, fatalistic and even depressed. It’s hard to blame them.
Privacy-preserving tools are being shut down. The Lightning Network is suffering scalability issues. The Bitcoin blockchain is being spammed by degenerate NFT gamblers, driving up transaction fees for everyone else. Bankers and Wall Street insiders are accumulating Bitcoin fortunes and promoting exchange traded funds as an alternative to self-custody. Bitcoin mining is being heavily centralized among a small group of American-based public companies. It sometimes feels like Bitcoin is under attack by various nefarious interests that want to control it and corrupt it.
Even from within our own community we are suffering from prophets of doom spewing fear, uncertainty and doubt. Many sneer that Lightning is broken, that Bitcoin has been co-opted by Wall Street. Some say we should give up and switch to altcoins. Some pundits blame “lasereyed maxis” for blocking protocol changes and claim that being conservative about modifying the rules of Bitcoin means “ossification” and that's the reason why Bitcoin has high fees. Others are pushing the idea that Bitcoin was never meant for payments anyway and that being a store of value was always the main goal of Bitcoin. Who cares about the poor? The plebs can always keep their funds on an exchange.
At Bull Bitcoin, we see it very differently. We have a realistic and optimistic approach towards building a bright future for Bitcoin. I have never been so bullish on the future Bitcoin as I am today.
Make no mistake: the core principles of Bitcoin self-custody, censorship-resistance and privacy are under attack. But the Bitcoin community possesses a unique advantage that will ultimately allow us to prevail: not only do we have skin in the game, we have soul in the game.
Our tribe of a few thousand cypherpunk Bitcoin maximalist fanatics stand against an empire of fiat clones, millions of faceless cogs in a soulless machine. I like our odds.
While I agree that we should never take Bitcoin’s success for granted, the bleak picture that some want to paint regarding the state of Bitcoin is detached from reality.
We've already achieved incredible technological miracles. The fact that it is possible for a user to run a Lightning network node on a mobile device and make fully trustless payments is a monumental achievement. Despite what they claim I can guarantee that no other shitcoin or fiat payment system has anywhere near the level of sophistication of Bitcoin. It is an incredibly bullish sign for the Bitcoin ecosystem that we have achieved a level where users can remain fully sovereign if they have the means.
Scaling Bitcoin so that it can enable hundreds of millions of people to become sovereign individuals is the most pressing challenge of our times. Our community must accept inevitable realities: not everybody will be able to afford on-chain transactions. The success of Bitcoin means that one day, during our lifetimes, a single Bitcoin translation will cost hundreds of dollars.
Upgrading the Bitcoin protocol may allow us to create tools that enable a more secure, censorship-resistant and private payment mechanism, but no soft fork can fix the fundamental tradeoffs of the Bitcoin protocol.
But this doesn't mean that we should either give up on Bitcoin’s value proposition as a medium of exchange, or that we must fork bitcoin according to the whims of whoever is trending on Twitter, nor should we capitulate to traditional exchanges acting as banks for the vast majority of users.
To fix the inconvenient and expensive user experience that most people are suffering in times of high fees while making the minimum amount of compromises, you need vision and execution.
There is an army of shadowy super coders that, like us, have dedicated their lives to ensure that Bitcoin becomes the universal medium of exchange, store of value and medium of account. We come from different walks of life and we have different strategies. Some of us work on self-sovereign consumer applications. Other focus of privacy protocols, mining decentralization, second later payment networks, e-cash protocols, and finally, as a last resort, some are working to add changes to the Bitcoin protocol which can enable tools that we currently cannot build.
At Bull Bitcoin, our vision of the future Bitcoin experience is crystal clear. It is a vision of success and integrity, where the path of least resistance for the user is also the path of least compromise.
We, the Bitcoin builders, will make it real.
-
@ e1d968f7:5d90f764
2025-01-11 13:45:35In a world where the adult industry is brimming with talent, it’s inevitable that competition is a factor. Whether it’s the well-established names or the newcomers vying for attention, understanding how to navigate competition is crucial to maintaining a strong presence and a loyal client base.
The Nature of the Industry
The escort industry can sometimes feel like a constant race. Many of us are vying for the same clients, trying to stand out in a sea of beautiful, talented, and charismatic individuals. While some might view this competition as a challenge, I’ve learned to see it as an opportunity.
- Everyone has their niche: What I’ve realised is that each escort brings something unique to the table. Whether it’s a specific look, personality trait, or skill, there’s a place for all of us. Competition isn’t always about being better than the other person—it’s about owning what makes you different.
- Building a personal brand: The key to success in this industry is creating a personal brand that speaks to your ideal clients. By being authentic and clear about what I offer, I’ve attracted a client base that appreciates me for who I am.
Learning to Rise Above
It’s easy to get caught up in the pressure of comparison. Especially when social media paints an idealised image of success, it can be overwhelming to measure yourself against others. However, I’ve learned that focusing on others’ success only detracts from my own.
- Stop comparing: One of the hardest lessons I’ve had to learn is not to compare myself to others. Every escort has their own journey, and focusing on someone else’s path won’t get me anywhere. Instead, I put energy into refining my services and personal brand.
- Collaborative spirit: Rather than viewing fellow escorts as competition, I’ve learned that there’s strength in collaboration. From sharing tips to recommending one another to clients, building relationships with colleagues has been a source of support and growth.
Standing Out in the Crowd
While competition is inevitable, there are ways to make sure I’m remembered by clients and stand out from the crowd. Here’s what works for me:
- Quality over quantity: I prioritise quality over quantity in every interaction. Providing a tailored, exceptional experience for every client is far more valuable than trying to please as many people as possible. This strategy has helped me build strong, lasting relationships with clients who return time and time again.
- Continuously improving: I keep improving myself—whether it’s upgrading my skills, learning new ways to engage clients, or exploring my own sensuality. Being dynamic and evolving keeps me fresh and relevant in an industry where trends can change quickly.
Embracing Healthy Competition
While it’s natural to feel the sting of competition from time to time, embracing it can be empowering. Healthy competition pushes us to evolve, improves our services, and keeps us motivated. Instead of feeling threatened by other escorts, I’ve come to respect them and the work they put in.
- Inspiration, not intimidation: I look at the success of others as inspiration, not intimidation. When someone else shines, it reminds me to keep honing my craft and striving to be my best.
- Celebrate others’ success: Rather than feeling jealous, I’ve learned to celebrate the success of my colleagues. A rising tide lifts all boats, and the more we support each other, the stronger we all become.
Closing Thoughts
The competitive nature of this industry can be overwhelming at times, but it’s also an opportunity for growth, both personally and professionally. Instead of focusing on the pressure of comparison, I’ve learned to embrace competition as a catalyst for improvement. Each escort has their own unique strengths, and by honing those strengths and building a strong personal brand, I’ve been able to carve out a successful path for myself.
When I support my colleagues and view their success as inspiration, I create a healthier, more positive environment for everyone. Ultimately, competition is just another part of this journey—one that, when approached with the right mindset, helps us all level up.
Rebecca x
-
@ 8fb140b4:f948000c
2023-11-21 21:37:48Embarking on the journey of operating your own Lightning node on the Bitcoin Layer 2 network is more than just a tech-savvy endeavor; it's a step into a realm of financial autonomy and cutting-edge innovation. By running a node, you become a vital part of a revolutionary movement that's reshaping how we think about money and digital transactions. This role not only offers a unique perspective on blockchain technology but also places you at the heart of a community dedicated to decentralization and network resilience. Beyond the technicalities, it's about embracing a new era of digital finance, where you contribute directly to the network's security, efficiency, and growth, all while gaining personal satisfaction and potentially lucrative rewards.
In essence, running your own Lightning node is a powerful way to engage with the forefront of blockchain technology, assert financial independence, and contribute to a more decentralized and efficient Bitcoin network. It's an adventure that offers both personal and communal benefits, from gaining in-depth tech knowledge to earning a place in the evolving landscape of cryptocurrency.
Running your own Lightning node for the Bitcoin Layer 2 network can be an empowering and beneficial endeavor. Here are 10 reasons why you might consider taking on this task:
-
Direct Contribution to Decentralization: Operating a node is a direct action towards decentralizing the Bitcoin network, crucial for its security and resistance to control or censorship by any single entity.
-
Financial Autonomy: Owning a node gives you complete control over your financial transactions on the network, free from reliance on third-party services, which can be subject to fees, restrictions, or outages.
-
Advanced Network Participation: As a node operator, you're not just a passive participant but an active player in shaping the network, influencing its efficiency and scalability through direct involvement.
-
Potential for Higher Revenue: With strategic management and optimal channel funding, your node can become a preferred route for transactions, potentially increasing the routing fees you can earn.
-
Cutting-Edge Technological Engagement: Running a node puts you at the forefront of blockchain and bitcoin technology, offering insights into future developments and innovations.
-
Strengthened Network Security: Each new node adds to the robustness of the Bitcoin network, making it more resilient against attacks and failures, thus contributing to the overall security of the ecosystem.
-
Personalized Fee Structures: You have the flexibility to set your own fee policies, which can balance earning potential with the service you provide to the network.
-
Empowerment Through Knowledge: The process of setting up and managing a node provides deep learning opportunities, empowering you with knowledge that can be applied in various areas of blockchain and fintech.
-
Boosting Transaction Capacity: By running a node, you help to increase the overall capacity of the Lightning Network, enabling more transactions to be processed quickly and at lower costs.
-
Community Leadership and Reputation: As an active node operator, you gain recognition within the Bitcoin community, which can lead to collaborative opportunities and a position of thought leadership in the space.
These reasons demonstrate the impactful and transformative nature of running a Lightning node, appealing to those who are deeply invested in the principles of bitcoin and wish to actively shape its future. Jump aboard, and embrace the journey toward full independence. 🐶🐾🫡🚀🚀🚀
-
-
@ 4d41a7cb:7d3633cc
2025-01-11 01:39:00If we think of the monetary system as a game and we understand its rules, we will be much better prepared to play it right. Let’s deep dive into how the monetary game works and how we win during the stage change we are going through: The death of the dollar.
Like in any game, there are goals, and players compete to win. In the monetary game, the goal is to acquire more wealth: more land, more resources, more goods, etc. Economic players are divided into groups and organized like a pyramid.
Economic players
1. Top of the pyramid
This includes central bankers, politicians, large corporations, and all entities involved in the creation of currency.
They are well-versed in the rules, as they are the ones who create and modify them, including monetary and fiscal policy, as well as the Uniform Commercial Code. They operate in a "creative" mode, utilizing monetary policy and legislation to extract wealth from the system without the need for production. They effectively act like parasites.
These are the individuals in charge of organizations like the Federal Reserve (FED), the World Bank (WB), the International Monetary Fund (IMF), the Bank of International Settlements (BIS), and the other important central banks of the world.
They have global think tanks where they train key economic players, like politicians, CEOs, public figures, and big business owners, to influence the world economy.
2- Self-made winners
The second category has a desire or hunger to win, and they understand the game to some degree: hedge fund managers, currency, commodity, and stock traders. Some of them, such as entrepreneurs and business owners, are genuinely skilled in their craft and produce legit goods and services.
Most of them don't have a "fixed income," and many have multiple sources of income, making them better prepared to navigate the monetary devaluation. This is because, while the stock market and commodities soar to record highs, wages remain relatively stagnant, thereby losing purchasing power.
3. Middle class
The third category is the one holding the structure; it's the main pillar or the spine holding the pyramid.
As Aleks Svetski explains in the Bushido of Bitcoin:
So long as they exist and continue to believe in the game, the others can play (...) The faster this category erodes, the faster the game ends. Hyperinflation happens when they give up. People realize they’re carrying all the weight, and, as they start to burn out, they decide either, “Screw this, I’m going to join category two and get my share,”.
4. Non-Economic Player Characters (NEPCs)
Aleks also explains:
The fourth category is the end of the road (...) Why play if the game is rigged? It’s easier to just give up! There are many gradations to this category, from the homeless to the welfare recipient to the hippie to the perpetual philosophy student to the doomer or the basement-dwelling 40-year-old teenager. These people either lack the gumption, talent, skill, or luck to jump category two, or they are deeply intuitive and feel how rigged it all is, so they throw in the towel and just drop out of the game altogether. Many more, of course, are born into category four and taught to believe victimhood is moral. As such, like crabs in a bucket, they bring down anybody who tries to rise up from there, and because they are in proximity only to category three players, they try to bring them down too.
The currency cycle
Understanding the currency cycle and its phases is crucial for making informed decisions and being a beneficiary in the wealth transfer. The cycle starts with a real form of money, a commodity, generally gold and silver, and ends up with the hyperinflation of a money substitute, base metal, or usually a paper fiat currency.
Money establishes itself only through the cumulative development of a medium of exchange on the free market. Only the free market can create economic money; the government cannot, and it has chosen gold an silver every time.
But if history teaches us something, it is that governments eventually end up corrupting money and replacing it with money substitutes (currency)
From Greco-Roman times, we can find examples of governments corrupting money, inflating the currency supply, imposing price controls, and creating artificial and unsustainable exchange rates that end up distorting the economy and the incentive structures and eventually lead to the end of the empire/nation.
Cycle phases
1. The free market adopts real money (gold & silver).
2. Redeemable certificates (IOUs) or a lower-quality metal replace gold and silver.
3. By decree, governments separate IOUs, certificates, or lower metals from gold or silver and convert them into fiat currencies (fake money).
The government's deficit spending and banks' credit expansion inflate the currency supply, accelerating its loss of purchasing power. The government imposes capital controls, regulations, and even criminal laws to stop the currency leakage
5. Complete loss of trust in the currency results in hyperinflation, economic chaos, social riots, and the need for a reset of the monetary system and debts.
6. A new money rises, generally returning to gold and silver, and the cycle repeats itself.
Counterfeiting currency
Money must be difficult to produce, requiring work to extract. When a currency, which requires no effort or work to produce, replaces money, the decline phase begins.
When a group has the ability to generate money without exertion, known as artificial inflation, inequality increases. We refer to this class as cantillionaires, who profit from the Cantillon effect, akin to parasites snatching wealth from the producers.
Inflation is simply another word for counterfeiting, as both involve the creation of "money" that is not attached to any real wealth.
The counterfeiters and their local retailers have found that their incomes increased before any rise in the prices of the things they buy. Retailers, on the other hand, will suffer losses. The first recipients of the new money will benefit the most, at the expense of those who receive it later.
Where are we now?
We are currently experiencing the demise of the "Federal Reserve Notes standard," also known as the dollar standard, which began with the establishment of the Federal Reserve in 1913.
During the Great Depression of the 1930s, the government "partially" disconnected the currency from gold, thereby stealing the yellow metal from the American people. The world set this currency as its reserve currency after the Second World War, allowing every other currency to be redeemable for dollars and those dollars for gold (in theory). This was known as the Bretton Woods agreement of 1944.
This system ended in 1971 when the Federal Reserve Notes (FRNs) were finally completely detached from gold redemption, and every currency started floating freely against each other with no backing at all. This marked the complete disconnection of currency from money.
This sparked a flight to quality, as investors shifted from Federal Reserve notes to gold, resulting in a 20x increase in the gold price in FRNs from 1971 to the 1980s. Paul A. Volcker, the chairman of the Federal Reserve, responded to this by raising interest rates on US Treasury bills to halt the depreciation of the Federal Reserve notes. This period was characterized by riots, inflation, conflicts, and economic crises.
The second biggest demand for gold started with the dotcom bubble of the year 2000 and increased with the great financial crisis of 2008. This is when the Federal Reserve Notes standard began to crumble.
We are now approaching the end of the road for this currency, but we are talking about the global reserve currency. All global economic players are affected, and there are winners and losers.
To be among the winners, you must first understand that the dollar is a liar.
The dollar is a liar
The “everything bubble” is a misleading term. What is really happening is that the federal reserve notes, better known as dollars, are suffering an acceleration of the inflation rate.
Over the past three years, they have created about 30% of the supply of "dollars."
We can see the stock market in "all-time highs," gold in "all-time highs," real estate in "all-time highs," etc. The inflation of the denominator (FRNs) is unprecedented, rather than an "everything bubble."
Since the dollar is not a store of value any more, capital flows to more scarce alternatives to protect it's purchasing power, generally: Real State, stocks, bonds and gold.
Here is a simple graphical representation. On the right side, we can observe the price of gold in dollars, the price of dollars in gold, and the price of the S&P 500 in dollars and gold, respectively. The charts span from the 1960s to the current era.
Gold is not at "all-time highs," nor is the S&P 500. Actually, the S&P 500 is down 60% from its gold ATH in the year 2000.
Because the dollar is at all-time lows, most assets and some commodities are at "all-time highs" in currency terms. The US deficit keeps growing administration after administration, making no difference between Republicans or Democrats,and there is no sign of this stopping any time soon.
## Where are we now?
Biggest wealth transfer in human history
Step 4 (government deficit spending and bank credit expansion inflate the currency supply until it loses most of its purchasing power) is now complete, and step 5 (hyperinflation, economic chaos, social riots, and a reset of the monetary system and debts) is about to begin.
This is not something that will happen from one day to another; it is something that is developing right now and will continue happening before our eyes, day by day, first gradually, then suddenly.
The top players in the pyramid recognize the end of this cycle, but they must shift to a new system to sustain their power and control. This is why supranational organizations are calling for a Great Reset or a New World Order. This is were the trojan horse of climate change enters the equation: a global problem that will requiere a global solution. They want to implement a social credit system, and a global CBDC to keep control of the currency supply and circulation.
James Rickards explains in The Road to Ruin:
The agenda is unchanging, pursued in centuries past by Caesar and Napoleon, and in the twentieth century by the Rockefellers, Roosevelts, and Bush dynasties. The agenda thrives today in institutions with anodyne names like the United Nations and the International Monetary Fund. The agenda is simple: world money, world taxation, and world order.
The fusion of global information sharing, global enforcement, and global taxation of gross receipts enables developed economies to extract the maximum amount of wealth from productive sectors to sustain nonproductive elites. This continues until the social system collapses, the common fate of civilizations that reach a late stage of prelatic parasitism.
For elites, a global problem once defined conjures a global solution. Climate change is the perfect platform for implementing a hidden agenda of world money and world taxation.
Elites formulate plans for the world order they wish to see. They wait for an exogenous shock, a natural disaster or financial crisis, then use fear created by shock to advance their vision.
Elites are aware that their views are not widely accepted in democratic societies. Elites realize their programs must be implemented in small stages over decades to avoid backlash.
Elites realize money printing may produce not price inflation but asset inflation and form new bubbles that could burst and destroy confidence for two generations.
Asset inflation is the previous step to price inflation. If asset owners start leveraging their assets more and more, they can increase their purchasing power, pushing prices higher and potentially creating a liquidity crisis, also known as margin calls, in the event of a market correction. This will produce more volatility and market instability.
In his book What has government done to our money, Rothbard explains:
Thus, inflation does not benefit society but rather redistributes wealth to the first movers and penalizes the last. We often refer to the latecomers—those enduring the loss—as the "fixed income groups". Fixed-money contracts, retired persons, bondholders, and other creditors—those holding cash—all will bear the brunt of the inflation. Inflation will tax these individuals.
Inflation has other disastrous effects. It distorts that keystone of our economy: business calculation. This process demoralizes commerce and undermines the incentive structure for production, instead encouraging debt, speculation, corruption, theft, and other harmful practices.
Debtors benefit because they can settle their debts with a weaker currency. The incentive, then, is to borrow to buy hard assets that will appreciate in currency terms and repay later in a weakened currency.
Rather than save and lend. Therefore, inflation lowers the general standard of living while simultaneously creating a false atmosphere of "prosperity".
When an important percentage of the middle class recognize what is really happening they will rush to play this game: borrow cheap credit to buy hard assets. This is the perfect recipe for starting a hyperinflation But the parasites won't let them win so easy, they already have a plan for this scenario.
Ice-nine: the freezing of assets
The vulnerability of the global financial system has escalated due to a significant increase in debt levels, widespread reliance on leverage, and greater interconnectedness since 2008.
James Rickards also explains
Power elite response to the next financial crisis. Instead of reliquefying the world, elites will freeze it. The system will be locked down. Of course, ice-nine will be described as temporary the same way President Nixon described the suspension of dollar-to-gold convertibility in 1971 as temporary. Gold convertibility at a fixed parity was never restored. The gold in Fort Knox has been frozen ever since. U.S. government gold is ice-nine.
Governments around the world are secretly planning measures to freeze financial assets and restrict the flow of money should an impending financial crisis arise.
The approach, far more drastic than the methods used in the 2008 crisis, aims to freeze financial assets and prevent a chaotic downfall by restricting access to physical currency and stopping a desperate rush for liquidity.
During a meal in mid-2014, the author received information from a senior BlackRock representative indicating that in the event of a financial meltdown, the U.S. government might direct asset management firms to suspend customer fund withdrawals.
All of this will be done with the purpose to stop hyperinflation.
Hyperinflation: The endgame
If history is any guide, what the Federal Reserve is doing now has been tried throughout history.
As the Federal Reserve continues to print trillions of dollars out of thin air with no productivity to back it up, at some point down the road, the world will finally lose faith in the US dollar as a global currency and conclude that it no longer makes sense to store their wealth in US dollars.
Today, the Federal Reserve appears to be following in the footsteps of 1923 Germany’s Weimar Republic shortly after World War I. This results in significant volatility and alternates between bullish trends and bearish contractions. The hyperinflation process, once started, is impossible to stop; first it starts gradually, then suddenly.
Pictures speak louder than words:
### How to win
Since the currency is experiencing an acceleration of the inflation we want to own the best type of property to protect against the debasement, but as we saw, the top economic players are planing to freeze the financial system and restrict the access to our property.
It's obvious to me like for many others that know about this things that Bitcoin is the one and only option, since is has no counterparty risk and it's limited; even better than scarce.
The similarities with the previous chart speak by themselves.
Conclusion
1- Make bitcoin your denominator (your main unit of account).
2-Accumulate as much bitcoin as possible on self-custody (earn, save and spend bitcoin every time is possible to spread adoption).
3- Don't be traded under a fixed income situation, increase your income sources, and own real and tangible assets.
4- Avoid overexposing to counterparty risks types of property (RE, stocks, bonds, etc)
5-Make sure your friends and family understand this.
6- Have a place outside of big cities and connect with local food producers (just in case).
7- Live your life, have fun, connect with amazing people spend time in nature and finally:
FUCK THE FED
Bitcoin or slavery!
-
@ 746a245a:7a8d8b34
2025-01-10 17:57:04
1. Self custody
Always. Send your BTC to cold storage. Don't hesitate because of high network fees when mempool activity is high. Rather pay 10% or more to secure your coins than risk loosing 100% of a cosiderable amount. If you have questions about self custody see this guide on the 5 Best Practices to Store Your Bitcoin.
2. Back up well
Restore a wallet at least once. Make sure you know how to get back your coins in a worst case scenario. (Also make sure your heirs are able to do it when time comes.)
3. Never try to time the market
DCA. Set it and forget it. Monthly, weekly, by-weekly or daily doesn't matter. Choose what best suits you. Do this for the majority of your BTC allocation. You can not time the bottom. Period. (But you can have a little pile of FIAT to buy dips when they occur.)
4. You can not time the top either
Never sell the majority of your Stack. Take a little profit if things go parabolic to reward yourself but always keep your main stack intact. It can be hard to get it back. And it will only go up with time. HODL and understand what you own.
5. Keep emotions out
Greed and fear are the main factors for people to get wrecked. Slow steady purchases, even tiny ones, all go to building a stack.
6. Never use leverage
Just don't. No, not even if BTC is below 10k. Make sure every sat you own truly belongs to you.
7. Every sat counts
Even if it's small amounts, just keep dca-ing and stacking sats. Little pieces add up. 0.001 BTC = $25 at the time of this writing. Do this 100 times and you have a tenth of a BTC. If you have very little FIAT, stack free sats. You can:
- use faucets (like freebitco.in or cointiply.com)
- do tasks (like microlancer.io)
- play games (like Bitcoin Miner)
- shop with services like lolli.com or foldapp.com
- listen to podcasts (with fountain.fm)
- educate yourself on Bitcoin (with BitcoinMagazine)
- or be active and provide value in communities like nostr, stacker.news or habla.news
Remember: Faucets used to give hundreds of Bitcoin per day. Now it's 5-250 sats 10 years later. In 10 years it may be 1-5 sats.
8. Don't go all in
Keep FIAT to survive hard times without being forced to sell BTC. (for example 6 months of monthly spending)
9. Enjoy life while stacking
There is only one thing that is more precious than Bitcoin. It is lifetime. Stack sats, but also stack moments. Be present and enjoy life. Every day. No amount of BTC can ever buy back lifetime. Remind yourself of this often.
10. Don't forget yourself
Always have a little fun money to maintain hobbys, traveling and to treat yourself. Otherwise you might burn out quickly.
11. Involve your significant other
Make sure he/she knows the reason why you do what you do. Otherwise you risk burning out him/her too.
12. Automate and relax
When you check your portfolio ten times a day or more think of automating things. Don't trade lifetime and serenity for small gains.
13. Don't do shitcoins
Most altcoins never reach their ATH again. BTC and BTC only.
14. Stay humble
Never get lured by offers that promise yield in exchange for holding your BTC. FTX was a recent example of how that can end.
15. You lost your keys in a boating accident
Never share how much Bitcoin you own. Better yet, don't share that you own any at all (exception: rule #11). The less is known about you having BTC, the less risk. Also consider buying non KYC. For example with robosats or bisq.
16. Don't rush. Be patient
It is a marathon, not a sprint. Time is on your side. You already own Bitcoin. You won. It isn't a race like with FIAT where you have to fight inflation. You preserve wealth.
17. Increase your FIAT earnings
Learn profitable skills to increase your buying power and generally grow as a person. Even if you loose all your wealth, nobody can take away your skills to accumulate it again.
18. Don't compare
Every stack of BTC is better than no stack of BTC. And even if you are a whale: there will always be a bigger fish somewhere in the sea ...
19. You don't need 1 full BTC
This was huge for me! The urge to have one full BTC is very FIAT minded thinking. Goals are cool but:
21 million BTC / 8 billion humans in the world =0,00262500 BTC
And not even that is possible because of the 1,1 m BTC wallet of Satoshi Nakamoto and lost coins. You can find out the exact amount every individual on earth could possibly own at satoshisperperson.com.
Not everyone needs a whole coin. About 225.000 sats = your little block of Bitcoin. ... That's roughly $55 at the time of this writing. Got that? Congratulations! 99% of people are still on zero. Safe your share and then slowly add more every pay check.
20. Change perspective
You can change settings in your wallet to display value in sats rather than BTC. This liberates from the feeling of shortage and the urge to fill that full BTC. It opens up the feeling of gratitude and abundance.
21. Always learn
Keep educating yourself about Bitcoin. The rabbit hole is deep ...
Thank you!
Thank you wonderful people who helped me gather those tips. I chose consciously to not give personal credit in this post because of rule #15 =)
Find me on Nostr
My Nostr npub:
npub1w34zgkkjznnf2209gnhc5snkd32lkc9hnncq45rypyzsx75d3v6qcz3ndd
What have i missed?
Do you agree with these tips? Did i miss any? Please let me know and help refine this set of rules so we can breed more an more whole coiners over time ... or let's rather call it 'satoshi millionaires' (see rule #19 ;-)
P.S. Feel free to tip me some sats or share this post if you find it helpful. Working on my own little stack too ;-)
-
@ 8fb140b4:f948000c
2023-11-18 23:28:31Chef's notes
Serving these two dishes together will create a delightful centerpiece for your Thanksgiving meal, offering a perfect blend of traditional flavors with a homemade touch.
Details
- ⏲️ Prep time: 30 min
- 🍳 Cook time: 1 - 2 hours
- 🍽️ Servings: 4-6
Ingredients
- 1 whole turkey (about 12-14 lbs), thawed and ready to cook
- 1 cup unsalted butter, softened
- 2 tablespoons fresh thyme, chopped
- 2 tablespoons fresh rosemary, chopped
- 2 tablespoons fresh sage, chopped
- Salt and freshly ground black pepper
- 1 onion, quartered
- 1 lemon, halved
- 2-3 cloves of garlic
- Apple and Sage Stuffing
- 1 loaf of crusty bread, cut into cubes
- 2 apples, cored and chopped
- 1 onion, diced
- 2 stalks celery, diced
- 3 cloves garlic, minced
- 1/4 cup fresh sage, chopped
- 1/2 cup unsalted butter
- 2 cups chicken broth
- Salt and pepper, to taste
Directions
- Preheat the Oven: Set your oven to 325°F (165°C).
- Prepare the Herb Butter: Mix the softened butter with the chopped thyme, rosemary, and sage. Season with salt and pepper.
- Prepare the Turkey: Remove any giblets from the turkey and pat it dry. Loosen the skin and spread a generous amount of herb butter under and over the skin.
- Add Aromatics: Inside the turkey cavity, place the quartered onion, lemon halves, and garlic cloves.
- Roast: Place the turkey in a roasting pan. Tent with aluminum foil and roast. A general guideline is about 15 minutes per pound, or until the internal temperature reaches 165°F (74°C) at the thickest part of the thigh.
- Rest and Serve: Let the turkey rest for at least 20 minutes before carving.
- Next: Apple and Sage Stuffing
- Dry the Bread: Spread the bread cubes on a baking sheet and let them dry overnight, or toast them in the oven.
- Cook the Vegetables: In a large skillet, melt the butter and cook the onion, celery, and garlic until soft.
- Combine Ingredients: Add the apples, sage, and bread cubes to the skillet. Stir in the chicken broth until the mixture is moist. Season with salt and pepper.
- Bake: Transfer the stuffing to a baking dish and bake at 350°F (175°C) for about 30-40 minutes, until golden brown on top.
-
@ 8fb140b4:f948000c
2023-11-02 01:13:01Testing a brand new YakiHonne native client for iOS. Smooth as butter (not penis butter 🤣🍆🧈) with great visual experience and intuitive navigation. Amazing work by the team behind it! * lists * work
Bold text work!
Images could have used nostr.build instead of raw S3 from us-east-1 region.
Very impressive! You can even save the draft and continue later, before posting the long-form note!
🐶🐾🤯🤯🤯🫂💜
-
@ fa0165a0:03397073
2023-10-06 19:25:08I just tested building a browser plugin, it was easier than I thought. Here I'll walk you through the steps of creating a minimal working example of a browser plugin, a.k.a. the "Hello World" of browser plugins.
First of all there are two main browser platforms out there, Chromium and Mozilla. They do some things a little differently, but similar enough that we can build a plugin that works on both. This plugin will work in both, I'll describe the firefox version, but the chromium version is very similar.
What is a browser plugin?
Simply put, a browser plugin is a program that runs in the browser. It can do things like modify the content of a webpage, or add new functionality to the browser. It's a way to extend the browser with custom functionality. Common examples are ad blockers, password managers, and video downloaders.
In technical terms, they are plugins that can insert html-css-js into your browser experience.
How to build a browser plugin
Step 0: Basics
You'll need a computer, a text editor and a browser. For testing and development I personally think that the firefox developer edition is the easiest to work with. But any Chrome based browser will also do.
Create a working directory on your computer, name it anything you like. I'll call mine
hello-world-browser-plugin
. Open the directory and create a file calledmanifest.json
. This is the most important file of your plugin, and it must be named exactly right.Step 1: manifest.json
After creation open your file
manifest.json
in your text editor and paste the following code:json { "manifest_version": 3, "name": "Hello World", "version": "1.0", "description": "A simple 'Hello World' browser extension", "content_scripts": [ { "matches": ["<all_urls>"], "js": ["hello.js"] //The name of your script file. // "css": ["hello.css"] //The name of your css file. } ] }
If you wonder what the
json
file format is, it's a normal text file with a special syntax such that a computer can easily read it. It's thejson
syntax you see in the code above. Let's go through what's being said here. (If you are not interested, just skip to the next step after pasting this we are done here.)manifest_version
: This is the version of the manifest file format. It's currently at version 3, and it's the latest version. It's important that you set this to 3, otherwise your plugin won't work.name
: This is the name of your plugin. It can be anything you like.version
: This is the version of your plugin. It can be anything you like.description
: This is the description of your plugin. It can be anything you like.content_scripts
: This is where you define what your plugin does. It's a list of scripts that will be executed when the browser loads a webpage. In this case we have one script, calledhello.js
. It's the script that we'll create in the next step.matches
: This is a list of urls that the script will be executed on. In this case we have<all_urls>
, which means that the script will be executed on all urls. You can also specify a specific url, likehttps://brave.com/*
, which means that the script will only be executed on urls that start withhttps://brave.com/
.js
: This is a list of javascript files that will be executed. In this case we have one file, calledhello.js
. It's the script that we'll create in the next step.css
: This is where you can add a list of css files that will be executed. In this case we have none, but you can add css files here if you want to.//
: Text following these two characters are comments. They are ignored by the computer, You can add comments anywhere you like, and they are a good way to document your code.
Step 2: hello.js
Now it's time to create another file in your project folder. This time we'll call it
hello.js
. When created, open it in your text editor and paste the following code:js console.log("Hello World!");
That's javascript code, and it's what will be executed when you run your plugin. It's a simpleconsole.log
statement, which will print the text "Hello World!" to the console. The console is a place where the browser prints out messages, and it's a good place to start when debugging your plugin.Step 3: Load and launch your plugin
Firefox
Now it's time to load your plugin into your browser. Open your browser and go to the url
about:debugging#/runtime/this-firefox
. You should see a page that looks something like this:Click the button that says "Load Temporary Add-on...". A file dialog will open, navigate to your project folder and select the file
manifest.json
. Your plugin should now be loaded and running.Go to a website, any website, and open the inspector then navigate to the console. You'll find the inspector by right-clicking anywhere within the webpage, and click "Inspector" in the drop-down menu. When opening the console you might see some log messages from the site you visited and... you should see the text "Hello World!" printed there, from our little plugin! Congratulations!
Chrome
Open your browser and go to the url
chrome://extensions/
. Click the button that says "Load unpacked". A file dialog will open, navigate to your project folder and select the folderhello-world-browser-plugin
. Your plugin should now be loaded and running.Note the difference, of selecting the file
manifest.json
in firefox, and selecting the folderhello-world-browser-plugin
in chrome. Otherwise, the process is the same. So I'll repeat the same text as above: (for those who skipped ahead..)Go to a website, any website, and open the inspector then navigate to the console. You'll find the inspector by right-clicking anywhere within the webpage, and click "Inspector" in the drop-down menu. When opening the console you might see some log messages from the site you visited and... you should see the text "Hello World!" printed there, from our little plugin! Congratulations!
As you can see this isn't as complicated as one might think. Having preformed a "Hello-World!"-project is a very useful and valuable first step. These setup steps are the basics for any browser plugin, and you can build on this to create more advanced plugins.
-
@ f9c0ea75:44e849f4
2025-01-10 17:47:02As the world moves toward an era of centralized digital finance, Brazil is not staying behind. The Banco Central do Brasil (BCB) is pushing forward with DREX, the country’s official Central Bank Digital Currency (CBDC). Framed as a way to enhance financial inclusion, reduce costs, and improve transparency, DREX is being marketed as a technological leap toward modernizing Brazil’s monetary system.
However, behind the promises of efficiency and security, DREX is nothing more than a digital cage designed to tighten state control over financial transactions. While some will celebrate it as a step toward reducing corruption and simplifying the economy, it is, in reality, a massive expansion of governmental power.
From a sovereign individual perspective, DREX represents the opposite of financial freedom, privacy, and autonomy. It is a tool of state surveillance, censorship, and financial control. In this article, we will analyze the history of DREX, its technical framework, the government’s next steps, and why this CBDC is ultimately a dangerous escalation of state power.
The Evolution of DREX: From Concept to Implementation
DREX, originally known as the Digital Real, is Brazil’s response to the growing global trend of CBDCs. The BCB began discussions on launching a digital currency in 2020, shortly after China began rolling out the digital yuan (e-CNY) and the European Union started developing the digital euro.
The stated objectives of DREX are:
- Modernizing Brazil’s financial infrastructure.
- Increasing financial inclusion for the unbanked.
- Enhancing transparency in transactions.
- Reducing costs in financial intermediation.
While these objectives sound beneficial, history has shown that every expansion of financial control by the state—from fiat currency inflation to banking regulations—ends up benefiting the government and central banks, not the average citizen.
Technical Framework and Features
DREX operates on a permissioned blockchain, meaning it is not decentralized like Bitcoin or other public blockchains. Instead, it is fully controlled by the BCB and a consortium of selected financial institutions.
Key Features of DREX:
- Programmability: The government can restrict how money is spent (e.g., banning purchases of certain goods, enforcing expiration dates on funds).
- Full Traceability: Every transaction is recorded on a centralized ledger, allowing the BCB to monitor all financial activity in real time.
- Interoperability: DREX will integrate with PIX, Brazil’s instant payments system, ensuring full adoption by the population.
- Smart Contracts: The government can automatically enforce financial rules, including instant tax collection, fines, and spending restrictions. While these features are marketed as "efficiencies," they enable unprecedented levels of financial control, making censorship, surveillance, and direct government intervention easier than ever before.
Historical Context: The Rise of Financial Control
To understand why DREX is dangerous, we must recognize how governments have historically weaponized financial systems to control their populations.
-
Bretton Woods & Fiat Expansion (1944-1971): The transition from a gold-backed currency to fiat money allowed governments to inflate their currencies at will, leading to massive economic manipulation.
-
The Patriot Act & Financial Surveillance (2001): In response to terrorism, the U.S. expanded financial surveillance, giving banks and governments unprecedented control over monetary flows.
-
China’s Social Credit System & Digital Yuan (2014-Present): China’s digital yuan (e-CNY) is integrated with the Social Credit System, allowing the government to punish or restrict people based on their financial behaviors.
-
The Canadian Trucker Protests (2022): Canada froze bank accounts of individuals who donated to anti-government protests, proving how financial infrastructure can be weaponized against political dissent. DREX fits perfectly into this pattern: a government-controlled digital money system designed to expand state power while eliminating financial autonomy.
## Next Steps: DREX Implementation Timeline and Government Actions
The BCB has already laid out its roadmap for DREX, with critical milestones planned for the next two years.
- Pilot Phases and Testing
- Phase 1: Initial Testing (2023-2024) Focused on the fundamentals, including wholesale CBDC (wCBDC), tokenized deposits, and digital treasury bonds. Initial testing on issuance, transfers, and settlements.
- Phase 2: Smart Contracts & Advanced Features (2024-2025) The second phase, launched in late 2024, focuses on developing smart contract applications for financial services. Participants include Santander, Visa, Mastercard, and Google, working on credit systems, trade finance, and real estate integration.
- Key Dates and Obligations
- October 2024 - November 2024: Application period for financial institutions to join Phase 2 of the pilot.
- June 2025: Deadline for selected institutions to finalize smart contract development.
- Late 2025 - Early 2026: Projected nationwide rollout of DREX. 2026 and beyond: Gradual phase-out of cash transactions, forcing adoption of CBDC-based payments.
- Full Implementation & Adoption Strategy Mandatory Integration: Financial institutions will be required to adopt DREX, ensuring all transactions move to a CBDC-controlled system. Cash Restrictions: Physical cash transactions will become increasingly limited, eventually leading to a cashless society.
The Illusion of Convenience and the Death of Sovereignty
DREX is not a neutral technology—it is a massive expansion of government power under the guise of efficiency and financial modernization.
Many will embrace it without questioning its implications. They will:
Cheer as DREX automates tax collection. Applaud anti-corruption measures that allow the state to track every transaction. Celebrate how it "simplifies" payments, ignoring that it also simplifies financial censorship. But make no mistake:
DREX is not about efficiency—it is about control
Once fully implemented, the state will have the power to:
- Monitor all financial transactions in real-time.
- Restrict spending on certain goods or services.
- Enforce automatic taxation without consent.
- Freeze or seize funds instantly, without due process.
- Eliminate cash, ensuring full reliance on a government-controlled financial system.
The Leviathan is Awakening Philosopher Thomas Hobbes described the state as a Leviathan— "a massive entity that must be obeyed to maintain order. However, when the state controls money, it controls freedom itself."
DREX is the final piece of the puzzle in creating a fully monitored, fully controlled financial system where every transaction is dependent on government approval. By 2025, DREX will be a reality. By 2026, financial privacy may no longer exist for the commons in Brazil. However, Bitcoin exists for the sovereign individual.
-
@ 8fb140b4:f948000c
2023-08-22 12:14:34As the title states, scratch behind my ear and you get it. 🐶🐾🫡
-
@ 4dbfcb7c:eb8d1695
2025-01-10 16:09:50On order to get the Elementum add-on installed, you must first download and install the Elementum repository.
Note: You must first enable 3rd Party Sources in KODI. Make sure you are using a VPN.
Download the Elementum Repository
- Grab the file for your device from the 👉 Elementum web page.
- (For a typical Linux OS, this will be the x64 .zip under Linux)
- (For a typical Android phone, this will be the arm64 .zip file Android)
Install Elementum Repo
- Open Kodi and go to:
- --> Settings (Gear icon)
- --> Add-ons
- --> Install from zip file
- --> Click "Yes" on zip file warning
- --> browse to Elementum .zip file & click to install (Wait for verification)
Install Elementum Add-on
- From Kodi home go to:
- --> Settings (Gear icon)
- --> Add-ons
- --> Install from repository
- --> ElementumOrg
- --> video add-ons
- --> Elementum
- --> Click "Install"
Elementum #Bittorrent #Kodi #MediaCenter
-
@ 8fb140b4:f948000c
2023-07-30 00:35:01Test Bounty Note
-
@ e1d968f7:5d90f764
2025-01-10 15:27:09First impressions matter, and in escorting, they begin with your response to a client’s inquiry. This initial interaction isn’t just about logistics—it’s a reflection of your professionalism, boundaries, and style of communication. Over the years, I’ve learned how to respond effectively to ensure that inquiries lead to successful, respectful bookings.
First Impressions Count
Your first reply to a potential client is an opportunity to make a lasting impression. It’s the foundation for trust and sets the tone for the interaction.
- Promptness: Timely responses show that you value the client’s time. A quick reply can also reduce the chances of them moving on to someone else.
- Professional Tone: While it’s important to be friendly and approachable, maintaining a professional tone establishes boundaries.
- Clarity: Provide clear information to avoid misunderstandings. Be concise yet thorough in addressing their questions.
Setting Boundaries from the Start
Boundaries are essential for maintaining a healthy client-provider relationship. The initial inquiry is the perfect time to establish them.
- Rates and Services: Be upfront about your rates and what’s included. Avoid ambiguity, as it can lead to uncomfortable negotiations later.
- Availability: Clearly communicate when you’re available and what your booking process entails.
- Screening: If you require certain details or verification for bookings, outline this in a respectful yet firm manner.
Recognising Red Flags
Not all inquiries are genuine, and some may come from individuals who don’t respect boundaries or professionalism. Over time, I’ve learned to identify red flags early:
- Overly Personal Questions: Clients asking invasive questions about your private life often don’t respect professional boundaries.
- Haggling: If someone tries to negotiate your rates, it’s usually a sign they won’t respect the value of your time or services.
- Vague Requests: Clients who avoid giving clear details about what they’re looking for may not be serious about booking.
By recognising these signs early, I save time and energy for serious inquiries.
Streamlining the Process
Efficiency is key when responding to inquiries, especially during busy periods. Here’s how I manage the process:
- Templates for Common Questions: Having pre-written responses for frequently asked questions saves time while ensuring consistency.
- Organised Communication: I keep messages in a dedicated platform or folder to avoid losing track of inquiries.
- Set Time Blocks: Instead of replying instantly, I allocate specific times for handling messages, ensuring I stay focused and productive.
Personal Touch Matters
While efficiency is important, adding a personal touch can make a client feel valued and more inclined to book.
- Use Their Name: If they’ve shared their name, addressing them directly adds a polite, personalised feel to the conversation.
- Acknowledge Their Needs: If a client mentions a specific requirement or concern, address it directly in your response. This shows attentiveness and professionalism.
Dealing with Difficult Conversations
Not every inquiry will be straightforward. Here’s how I handle some challenging situations:
- The Persistent Client: If someone refuses to accept your boundaries, it’s best to end the conversation politely but firmly.
- The Indecisive Client: Gently guide them with questions to help clarify their needs. If they remain uncertain, I let them know I’m available when they’re ready.
- The Last-Minute Booker: While I try to accommodate, I make it clear that last-minute bookings depend on my availability and adherence to screening protocols.
Constant Improvement
Every inquiry teaches something new. By reflecting on past interactions, I’ve refined my communication skills and adapted to different client needs.
- Feedback: If appropriate, I ask clients how they found the booking process. Constructive feedback helps me improve my responses.
- Staying Professional: Regardless of how challenging an inquiry may be, maintaining composure and professionalism is non-negotiable.
Conclusion
Mastering the art of responding to inquiries is a vital skill in the escorting profession. By balancing professionalism, clarity, and warmth, I ensure that every interaction lays the groundwork for a respectful and positive experience. It’s not just about securing bookings; it’s about building trust, protecting boundaries, and creating meaningful connections.
Rebecca x
-
@ 8fb140b4:f948000c
2023-07-22 09:39:48Intro
This short tutorial will help you set up your own Nostr Wallet Connect (NWC) on your own LND Node that is not using Umbrel. If you are a user of Umbrel, you should use their version of NWC.
Requirements
You need to have a working installation of LND with established channels and connectivity to the internet. NWC in itself is fairly light and will not consume a lot of resources. You will also want to ensure that you have a working installation of Docker, since we will use a docker image to run NWC.
- Working installation of LND (and all of its required components)
- Docker (with Docker compose)
Installation
For the purpose of this tutorial, we will assume that you have your lnd/bitcoind running under user bitcoin with home directory /home/bitcoin. We will also assume that you already have a running installation of Docker (or docker.io).
Prepare and verify
git version - we will need git to get the latest version of NWC. docker version - should execute successfully and show the currently installed version of Docker. docker compose version - same as before, but the version will be different. ss -tupln | grep 10009- should produce the following output: tcp LISTEN 0 4096 0.0.0.0:10009 0.0.0.0: tcp LISTEN 0 4096 [::]:10009 [::]:**
For things to work correctly, your Docker should be version 20.10.0 or later. If you have an older version, consider installing a new one using instructions here: https://docs.docker.com/engine/install/
Create folders & download NWC
In the home directory of your LND/bitcoind user, create a new folder, e.g., "nwc" mkdir /home/bitcoin/nwc. Change to that directory cd /home/bitcoin/nwc and clone the NWC repository: git clone https://github.com/getAlby/nostr-wallet-connect.git
Creating the Docker image
In this step, we will create a Docker image that you will use to run NWC.
- Change directory to
nostr-wallet-connect
:cd nostr-wallet-connect
- Run command to build Docker image:
docker build -t nwc:$(date +'%Y%m%d%H%M') -t nwc:latest .
(there is a dot at the end) - The last line of the output (after a few minutes) should look like
=> => naming to docker.io/library/nwc:latest
nwc:latest
is the name of the Docker image with a tag which you should note for use later.
Creating docker-compose.yml and necessary data directories
- Let's create a directory that will hold your non-volatile data (DB):
mkdir data
- In
docker-compose.yml
file, there are fields that you want to replace (<> comments) and port “4321” that you want to make sure is open (check withss -tupln | grep 4321
which should return nothing). - Create
docker-compose.yml
file with the following content, and make sure to update fields that have <> comment:
version: "3.8" services: nwc: image: nwc:latest volumes: - ./data:/data - ~/.lnd:/lnd:ro ports: - "4321:8080" extra_hosts: - "localhost:host-gateway" environment: NOSTR_PRIVKEY: <use "openssl rand -hex 32" to generate a fresh key and place it inside ""> LN_BACKEND_TYPE: "LND" LND_ADDRESS: localhost:10009 LND_CERT_FILE: "/lnd/tls.cert" LND_MACAROON_FILE: "/lnd/data/chain/bitcoin/mainnet/admin.macaroon" DATABASE_URI: "/data/nostr-wallet-connect.db" COOKIE_SECRET: <use "openssl rand -hex 32" to generate fresh secret and place it inside ""> PORT: 8080 restart: always stop_grace_period: 1m
Starting and testing
Now that you have everything ready, it is time to start the container and test.
- While you are in the
nwc
directory (important), execute the following command and check the log output,docker compose up
- You should see container logs while it is starting, and it should not exit if everything went well.
- At this point, you should be able to go to
http://<ip of the host where nwc is running>:4321
and get to the interface of NWC - To stop the test run of NWC, simply press
Ctrl-C
, and it will shut the container down. - To start NWC permanently, you should execute
docker compose up -d
, “-d” tells Docker to detach from the session. - To check currently running NWC logs, execute
docker compose logs
to run it in tail mode add-f
to the end. - To stop the container, execute
docker compose down
That's all, just follow the instructions in the web interface to get started.
Updating
As with any software, you should expect fixes and updates that you would need to perform periodically. You could automate this, but it falls outside of the scope of this tutorial. Since we already have all of the necessary configuration in place, the update execution is fairly simple.
- Change directory to the clone of the git repository,
cd /home/bitcoin/nwc/nostr-wallet-connect
- Run command to build Docker image:
docker build -t nwc:$(date +'%Y%m%d%H%M') -t nwc:latest .
(there is a dot at the end) - Change directory back one level
cd ..
- Restart (stop and start) the docker compose config
docker compose down && docker compose up -d
- Done! Optionally you may want to check the logs:
docker compose logs
-
@ 419798e6:7eeac233
2025-01-10 15:20:15January 20th 2025 will be an impactful day to the Crypto World.
President Donald Trump returns to the white house amid concerns over his previous sentiments towards digital assests.He has previously termed and seen it as a "threat to the dollar " back in 2019. The previous administration has however,seen tremendous changes in the crypto world including the rise of crypto in institutional adoption
The impact of his pro business presidency might see a potential of digital asssets being deregulated**.This will immensely benefit crypto firms .With Elon at his side.His administration might focus more on innovation and competitiveness creating a serene environment for crypto affiliated businesses and exchanges.
There also might be a lot of jittery towards Trumps stern economic policies towards digital assests as investors will be wary of his policies towards digital assests leading to market increased volatility in the crypto world.
Bitcoin might be seen as the remedy against inflation if Trump announces economic stimulus Plans.
Trumps inaguration will definitely will create a storm in the crypto world.Combined with rising adoption of digital assests,January 2025 could set a stage for a never seen rally in the crypto market world.January 20th 2025 will be an impactful day to the Crypto World.
-
@ 82341f88:fbfbe6a2
2023-04-11 19:36:53There’s a lot of conversation around the #TwitterFiles. Here’s my take, and thoughts on how to fix the issues identified.
I’ll start with the principles I’ve come to believe…based on everything I’ve learned and experienced through my past actions as a Twitter co-founder and lead:
- Social media must be resilient to corporate and government control.
- Only the original author may remove content they produce.
- Moderation is best implemented by algorithmic choice.
The Twitter when I led it and the Twitter of today do not meet any of these principles. This is my fault alone, as I completely gave up pushing for them when an activist entered our stock in 2020. I no longer had hope of achieving any of it as a public company with no defense mechanisms (lack of dual-class shares being a key one). I planned my exit at that moment knowing I was no longer right for the company.
The biggest mistake I made was continuing to invest in building tools for us to manage the public conversation, versus building tools for the people using Twitter to easily manage it for themselves. This burdened the company with too much power, and opened us to significant outside pressure (such as advertising budgets). I generally think companies have become far too powerful, and that became completely clear to me with our suspension of Trump’s account. As I’ve said before, we did the right thing for the public company business at the time, but the wrong thing for the internet and society. Much more about this here: https://twitter.com/jack/status/1349510769268850690
I continue to believe there was no ill intent or hidden agendas, and everyone acted according to the best information we had at the time. Of course mistakes were made. But if we had focused more on tools for the people using the service rather than tools for us, and moved much faster towards absolute transparency, we probably wouldn’t be in this situation of needing a fresh reset (which I am supportive of). Again, I own all of this and our actions, and all I can do is work to make it right.
Back to the principles. Of course governments want to shape and control the public conversation, and will use every method at their disposal to do so, including the media. And the power a corporation wields to do the same is only growing. It’s critical that the people have tools to resist this, and that those tools are ultimately owned by the people. Allowing a government or a few corporations to own the public conversation is a path towards centralized control.
I’m a strong believer that any content produced by someone for the internet should be permanent until the original author chooses to delete it. It should be always available and addressable. Content takedowns and suspensions should not be possible. Doing so complicates important context, learning, and enforcement of illegal activity. There are significant issues with this stance of course, but starting with this principle will allow for far better solutions than we have today. The internet is trending towards a world were storage is “free” and infinite, which places all the actual value on how to discover and see content.
Which brings me to the last principle: moderation. I don’t believe a centralized system can do content moderation globally. It can only be done through ranking and relevance algorithms, the more localized the better. But instead of a company or government building and controlling these solely, people should be able to build and choose from algorithms that best match their criteria, or not have to use any at all. A “follow” action should always deliver every bit of content from the corresponding account, and the algorithms should be able to comb through everything else through a relevance lens that an individual determines. There’s a default “G-rated” algorithm, and then there’s everything else one can imagine.
The only way I know of to truly live up to these 3 principles is a free and open protocol for social media, that is not owned by a single company or group of companies, and is resilient to corporate and government influence. The problem today is that we have companies who own both the protocol and discovery of content. Which ultimately puts one person in charge of what’s available and seen, or not. This is by definition a single point of failure, no matter how great the person, and over time will fracture the public conversation, and may lead to more control by governments and corporations around the world.
I believe many companies can build a phenomenal business off an open protocol. For proof, look at both the web and email. The biggest problem with these models however is that the discovery mechanisms are far too proprietary and fixed instead of open or extendable. Companies can build many profitable services that complement rather than lock down how we access this massive collection of conversation. There is no need to own or host it themselves.
Many of you won’t trust this solution just because it’s me stating it. I get it, but that’s exactly the point. Trusting any one individual with this comes with compromises, not to mention being way too heavy a burden for the individual. It has to be something akin to what bitcoin has shown to be possible. If you want proof of this, get out of the US and European bubble of the bitcoin price fluctuations and learn how real people are using it for censorship resistance in Africa and Central/South America.
I do still wish for Twitter, and every company, to become uncomfortably transparent in all their actions, and I wish I forced more of that years ago. I do believe absolute transparency builds trust. As for the files, I wish they were released Wikileaks-style, with many more eyes and interpretations to consider. And along with that, commitments of transparency for present and future actions. I’m hopeful all of this will happen. There’s nothing to hide…only a lot to learn from. The current attacks on my former colleagues could be dangerous and doesn’t solve anything. If you want to blame, direct it at me and my actions, or lack thereof.
As far as the free and open social media protocol goes, there are many competing projects: @bluesky is one with the AT Protocol, nostr another, Mastodon yet another, Matrix yet another…and there will be many more. One will have a chance at becoming a standard like HTTP or SMTP. This isn’t about a “decentralized Twitter.” This is a focused and urgent push for a foundational core technology standard to make social media a native part of the internet. I believe this is critical both to Twitter’s future, and the public conversation’s ability to truly serve the people, which helps hold governments and corporations accountable. And hopefully makes it all a lot more fun and informative again.
💸🛠️🌐 To accelerate open internet and protocol work, I’m going to open a new category of #startsmall grants: “open internet development.” It will start with a focus of giving cash and equity grants to engineering teams working on social media and private communication protocols, bitcoin, and a web-only mobile OS. I’ll make some grants next week, starting with $1mm/yr to Signal. Please let me know other great candidates for this money.
-
@ c3b2802b:4850599c
2025-01-10 15:01:46Im spanischen Teil des Baskenlandes wurden in den 1940er Kriegsjahren die Wurzeln für einen Genossenschaftsverbund namens Mondragon gelegt, welcher sich in den Jahrzehnten seit der Gründung 1956 bis heute zu einem schwergewichtigen Faktor in Spanien, ja zur größten Industrie-Genossenschaft der Welt entwickelt hat:
In den Geschäftsfeldern Produktion (dutzende Unternehmen der Sektoren Maschinenbau, Automobilindustrie, Haushaltsgeräte, Bauindustrie), Einzelhandel (z.B. die Supermarktkette Eroski), Bildung (genossenschaftseigene Universität mit knapp 5.000 Studierenden) und Finanzen (Genossenschaftsbank Laboral Kutxa) erzeugt der Verbund von ca. 100 Genossenschaften mit über 10 Milliarden Euro pro Jahr ca. 4% des BIP des Baskenlandes.
Etwa drei Viertel der Beschäftigten des Verbundes sind Genossenschaftler mit Einlagen von jeweils rund 15.000 Euro. Damit sind sie Miteigentümer der Unternehmen im Verbund und sind damit an allen Entscheidungen bezüglich der Unternehmensstrategie beteiligt. Als Rentner können sie ihre Einlagen entnehmen oder weiter am Erfolg des Unternehmens teilhaben. Arbeitsunfähige Mitglieder erhalten volle Bezüge bis zum Rentenalter. Führungskräfte verdienen nach internen Übereinkünften maximal das Achtfache der einfachen Angestellten.
In unserem Land sind Genossenschaften derzeit im Aufwind. Vielleicht können wir uns beim Aufbau unserer Regionalgesellschaft an den Erfolgsfaktoren, also den guten Erfahrungen dieses großartigen Pioniers der Genossenschaftsbewegung orientieren? Die Webseite des Mondragon Verbundes finden Sie hier.
-
@ 4657dfe8:47934b3e
2025-01-10 13:28:47Alby Hub - your Center for Bitcoin Payments
Alby Hub is a self-custodial lightning wallet that lets users choose their preferred Lightning funding source. It includes an easy-to-use lightning node with a one-click setup, while also accommodating existing node runners.
In short Alby Hub offers node runners:
➡️ a lightning address to receive payments in a self-custodial manner ➡️ integrated Lightning Service Providers, to quickly buy channels with receiving capacity ➡️ a selection of vetted channel partners to open channels without searching for a long time ➡️ a marketplace of apps to connect your own node. Read more about this superpower. ➡️ a mobile app, Alby Go, to pay right from their own node on the go.
Thus, Alby Hub enables you to make your node the central hub for bitcoin payments, maintaining full self-sovereignty.
Install Alby Hub on RaspiBlitz
- Login into the RaspiBlitz WebUI and enter the dashboard
- Go to Apps, find Alby Hub and install the app
It’s as easy as that. Now you can link your node with an Alby account to get a lightning address, use your node on the go with the Alby Go mobile app or on the web with the Alby Browser Extension. Updates of Alby Hub become available with each new RaspiBlitz release.
With one-click setup, an intuitive interface, and seamless integration with dozens of bitcoin apps, Alby Hub makes self-custodial bitcoin payments easy for everyone while adding much more utility to your lightning node.
-
@ 4506e04e:8c16ba04
2025-01-10 13:26:46The healthcare system, in its current state, is fundamentally broken. Under the fiat standard, big pharma exploits the sick in much the same way that banks and financial corporations drain economic power from individuals and small businesses. Despite massive investments, healthcare remains plagued by inefficiencies, inequities, and vulnerabilities. With rapidly aging population and low birth rates the access to healthcare is becoming more and more difficult and the system will break within the next couple of decades. Here are some of the major issues:
Financial Drain with Minimal Returns
No matter how much money is poured into healthcare, it’s never enough. Administrative overheads, inflated costs, and inefficiencies ensure that resources are wasted instead of improving patient outcomes.
Big Pharma’s Perverse Incentives
Pharmaceutical companies prioritize profit over cures. The system is designed to keep patients alive but perpetually dependent on treatments, rather than focusing on true cures.
Administrative Bloat
The excessive overhead costs in administration siphon funds away from actual patient care.
Fragmented Patient Records
There is no single global standard for managing and accessing healthcare records, creating inefficiencies and potential for errors.
Cybersecurity Risks
Centralized healthcare systems are vulnerable to ransomware attacks, which can compromise patient safety and even pose threats to international security. For hospitals, such attacks are literally matters of life and death.
Increasing Costs and Reduced Accessibility
Instead of becoming cheaper and more accessible, healthcare is growing more expensive and difficult to obtain, exacerbating inequities, yet nurses are one of the groups that's most underpaid!
A Decentralized Solution
The solution lies in leveraging decentralization, encryption, and open-source technologies to transform the healthcare system. Thanks to innovations like Bitcoin and the Nostr protocol we now have the means to:
-
Empower Patients and Doctors: Decentralized systems can give patients control over their medical data while reducing administrative costs for healthcare providers.
-
Enhance Security: Encryption ensures data is secure, even in the face of cyber threats.
-
Improve Accessibility and Efficiency: Open-source tools (like Keycast) can lower costs and provide customizable solutions tailored to specific healthcare needs.
note1327htu9gr327h38yu5f6tueye4cajp3kc69cs3gl7w6q6rz09ufqukl74j
How Nostr Can Transform Healthcare
Nostr, short for “Notes and Other Stuff Transmitted by Relays,” is a decentralized protocol originally designed for communication but holds tremendous potential for industries such as healthcare. Its client-relay model allows patients and doctors to interact securely without relying on centralized servers. Here’s how it could work in a healthcare context:
Decentralized Data Control:
Patients’ medical records can be securely stored and accessed via relays. Each patient’s identity is tied to a cryptographic public key, ensuring that they have full control over their data.
Doctors can access necessary records by connecting to relays the patient authorizes, ensuring data remains private and secure.
Privacy Without Bureaucracy:
Nostr eliminates the need for cumbersome identity verification processes (e.g., KYC). Patients retain privacy without needing emails, IDs, or other personal identifiers.
Customizable Access:
Patients can specify which doctors or healthcare providers can access their records by granting permissions via cryptographic signatures. These permissions can be adjusted or revoked at any time.
Secure and Verifiable Communication:
All interactions between patients and doctors are signed with private keys, ensuring authenticity and preventing tampering.
Relays do not own or manipulate the data; they simply transmit it between authorized users.
Resilient and Flexible Network:
Patients and doctors can choose which relays to use, and data can be published to multiple relays for redundancy. This ensures continuity of care even if a specific relay goes offline.
Patient-Centric Data Ownership:
In the Nostr model, patients own their data. They can share it, manage it, or restrict access as they see fit, empowering them to take control of their health information.
Enhanced Telemedicine:
Secure, encrypted communication enables remote consultations where doctors can access up-to-date patient records in real-time, providing better care.
By combining Nostr’s decentralized approach with healthcare-specific adaptations, this protocol can make the healthcare system more secure, efficient, and patient-focused.
Meet Keycast
Keycast is a self-hosted open-source tool designed for secure and efficient private key management that can be applied to manage teams and policies. Its features can empower collaboration from micro-level ops like sharing access to one Nostr account to organising healthcare in the following ways:
-
Team Management:
-
Organize users into teams representing departments or specialties (different policies).
-
Streamline workflows by aligning permissions with roles.
-
Granular Permissions:
-
Assign specific access rights to doctors, nurses, and administrative staff.
-
Create layered permissions for actions such as accessing records, adding notes, or authorizing tests.
-
Secure Key Management:
-
Encrypt and securely store keys locally, ensuring data confidentiality.
-
Remote Signing and Telemedicine:
-
Enable secure remote access to records through NIP-46 for telehealth scenarios.
-
Customizable Policies:
-
Tailor permissions and content filters to suit healthcare needs, such as restricting access to certain records or anonymizing sensitive data.
-
Patient Empowerment:
-
Allow patients to manage access to their health information, promoting transparency and autonomy.
Real-World Applications
Here’s how these tools can address specific healthcare challenges:
-
Secure Access to EHR: Doctors and nurses can access patient records securely and efficiently, improving care coordination.
-
AI-Driven Diagnostics: AI agents with predefined, limited permissions can analyze data for diagnostics while safeguarding privacy.
-
Telemedicine: Secure, encrypted access ensures doctors can deliver remote care without compromising patient data.
-
Anonymized Research: Controlled access to anonymized data can accelerate medical research while protecting privacy.
The Bigger Picture
Decentralization is the key to fixing healthcare. Just like Bitcoin fixes the money and fixes the world - nostr and censorship-resistant encrypted data flow can fix whole industries like healthcare. By moving away from centralized, vulnerable systems, we can:
-
Enhance Security: Protect sensitive data from cyber threats with encryption and decentralized architectures.
-
Lower Costs: Reduce administrative overheads and eliminate inefficiencies.
-
Improve Collaboration: Foster better communication and coordination among healthcare professionals.
-
Ensure Transparency: Leverage open-source solutions to build trust and flexibility.
Conclusion
The healthcare systems we have today are heavily reliant on money printing. They are have turned into businesses with overgrown administrative layer. They are inefficient and unsustainable. However, by adopting the Nostr protocol and tools built upon it, we can create a system that is secure, efficient, and patient-centric. With open-source tools like these, healthcare can truly focused on improving lives, become cheaper, more accessible, and abundant.
Challenge
If you'd like to contribute to reinventing healthcare using free and open-source software built on the nostr protocol join the challenge by npub1healthsx3swcgtknff7zwpg8aj2q7h49zecul5rz490f6z2zp59qnfvp8p
note1lnh3q6648ysulrx2pgeyhv2cqqle9vftdxalq3yqkqa7c89eljtqyr70nl
-
-
@ fd06f542:8d6d54cd
2025-01-10 01:20:02一直听说有个 nip50,但是没有太明白怎么用,今天测试了一下。明白了。 https://nos.today/search?q=client
wss://relay.noswhere.com/ wss://search.nos.today/ wss://relay.nostr.band/
支持搜索, 搜索事件:
{"kinds":[1],"search":"client","limit":100}
测试代码: `import {WebSocket} from "ws" const relayUrl = 'wss://relay.nostr.band';
function sub(url,filter){ const relay = new WebSocket(url);
relay.onopen = () => { console.log('Connected to bootstrap relay'); // 查询中继列表 const query = ['REQ', 'subscription-id', filter]; relay.send(JSON.stringify(query)); };
relay.onmessage = (event) => { const data = JSON.parse(event.data); if (data[0] === 'EVENT' ) { const relayList = data[2].tags; console.log('Discovered relay list:', data[2].pubkey,relayList,data[2].content); // 连接到用户的中继 try{ relayList.forEach(([_, relayUrl]) => { const newRelay = new WebSocket(relayUrl); newRelay.onopen = () => { console.log(
Connected to relay: ${relayUrl}
); }; }); } catch {}} };
} sub(relayUrl,{"kinds":[1],"search":"client","limit":100}) `
轻轻松松就出结果了。
-
@ dd664d5e:5633d319
2025-01-09 21:39:15Instructions
- Place 2 medium-sized, boiled potatoes and a handful of sliced leeks in a pot.
- Fill the pot with water or vegetable broth, to cover the potatoes twice over.
- Add a splash of white wine, if you like, and some bouillon powder, if you went with water instead of broth.
- Bring the soup to a boil and then simmer for 15 minutes.
- Puree the soup, in the pot, with a hand mixer. It shouldn't be completely smooth, when you're done, but rather have small bits and pieces of the veggies floating around.
- Bring the soup to a boil, again, and stir in one container (200-250 mL) of heavy cream.
- Thicken the soup, as needed, and then simmer for 5 more minutes.
- Garnish with croutons and veggies (here I used sliced green onions and radishes) and serve.
Guten Appetit!
- Place 2 medium-sized, boiled potatoes and a handful of sliced leeks in a pot.
-
@ f9c0ea75:44e849f4
2025-01-09 16:05:30In a recent TFTC podcast episode, Parker Lewis outlined a mathematical inevitability—a liquidity crisis unfolding in 2025. While optimism around the Trump administration’s economic policies exists, Lewis argues that no fiscal policy can counteract the Federal Reserve’s tightening liquidity. The real issue? Too much debt and not enough dollars.
This reflection expands on Lewis’ key arguments, breaking down:
- Where the liquidity crisis is coming from
- Why it’s a structural problem
- What the consequences are
- Why Bitcoin matters in this scenario
1. Where Is the Liquidity Crisis Coming From?
The crisis stems from a fundamental imbalance:
- Debt levels have skyrocketed, particularly post-2008 and post-COVID.
- Dollars needed to service this debt are shrinking because of Federal Reserve tightening (QT, interest rates, and shrinking reserves).
The Math Behind the Liquidity Squeeze
- In 2007, there was $53 trillion in U.S. dollar-denominated debt, but only $900 billion in base money—a 50:1 leverage ratio.
- By 2023, FED policies had drained dollars from the banking system, while debt levels continued to explode higher. The result? A liquidity-starved financial system dependent on an ever-smaller money pool.
2. The Structural Problem: FED Policy is the Real Driver
While fiscal policy (tax cuts, tariffs, and deregulation) can marginally improve economic conditions, it cannot stop a liquidity crisis. Lewis emphasizes that the Federal Reserve is the key player in determining financial stability.
What the FED Has Done to Shrink Liquidity
- Quantitative Tightening (QT): Actively reducing the money supply by letting bonds roll off the balance sheet.
- Interest Rate Hikes (2022–2023): Made borrowing more expensive, slowing credit creation.
- Reverse Repo Drain: Reduced excess bank reserves, limiting lending ability.
- Shrinking Bank Reserves: With fewer reserves, banks lend less, tightening financial conditions.
This means the liquidity crisis isn’t theoretical—it’s already happening.
3. The Warning Signs: Cracks in the Financial System
Lewis points to clear signals that liquidity is disappearing:
- Rising delinquencies in commercial mortgage-backed securities (CMBS) – approaching post-2008 highs.
- Credit card delinquencies – nearing 2008 levels.
- Treasury yield inversion anomalies – typically, rate cuts lead to falling long-term bond yields, but that’s not happening, suggesting market pessimism. Bank failures in 2023 (SVB, First Republic, Signature Bank) – early signs of systemic liquidity stress.
The takeaway? Debt is growing, but the available money to service it is shrinking—a recipe for financial instability.
Consequences: What Happens If Liquidity Remains Tight?
If the FED continues draining liquidity, we may see:
✔ More bank failures, as weaker institutions struggle to survive.
✔ Debt defaults rise, particularly in real estate and corporate debt.
✔ Stock market volatility, as credit-dependent sectors suffer.
✔ A potential recession, triggered by a credit crunch.
The FED may eventually be forced to reverse course and print more money, but waiting too long could trigger a financial shock first.
Final Thoughts: The Crisis is Already Unfolding
This isn’t just speculation, it's a mathematical inevitability. The FED's policies have set the stage for a debt-starved economy with fewer dollars available to sustain it. The next 12 months could be highly volatile, with financial stress increasing.
Key Takeaways
✅ Trump’s policies may be positive, but they won't prevent a liquidity crisis.
✅ The FED is the dominant force, and its liquidity-draining policies are causing systemic risks.
✅ Leading indicators suggest we’re already in a liquidity crunch.
✅ Bitcoin remains a strategic hedge as the FED eventually returns to money printing.
What to Expect?
A volatile 2025—prepare for financial instability and potential FED intervention.
-
@ e373ca41:b82abcc5
2025-01-09 13:28:41Heute Abend um 19 Uhr sprechen Elon Musk und Alice Weidel auf X. Der alternative Radiosender Kontrafunk aus der Schweiz bringt eine Übersetzung davon im Stream.
Da die Webseite des Kontrafunks gestern angegriffen wurde, ist hier der Stream unzensierbar aufrufbar, als kleines Back-up:
https://stream.kontrafunk.radio/listen/kontrafunk/radio.mp3
\ Im Nostr-Netzwerk dauerhauft auch u.a. hier aufrufbar (falls wir angegriffen werden).
Tonight at 7 pm (CET), Elon Musk and Alice Weidel will be speaking on X. The alternative radio station Kontrafunk from Switzerland will be streaming a translation.
As the Kontrafunk website was attacked yesterday, the stream can be accessed uncensored here as a small backup:
https://stream.kontrafunk.radio/listen/kontrafunk/radio.mp3
In the Nostr network also permanently available here (in case we are attacked).
ADVERTISEMENT:
Looking for the easiest way to buy Bitcoin and store it yourself? The Relai app is the No. 1 crypto start-up and No. 2 of all fintech start-ups in Switzerland. Here you can buy Bitcoin in just a few steps and also set up savings plans. Nobody has access to your Bitcoin except you. With the referral code MILOSZ you save on fees (no financial advice). Disclaimer due to regulatory issues: The services of the Relai App are hereby only recommended to inhabitants of Switzerland or Italy.
Need more security? The Trezor wallets are recommended and easy to use, others are available in the store. Need more advice? Book an introductory meeting with a wallet expert.
Join the marketplace of ideas! We are building a publishing ecosystem on Nostr for citizen-journalism, starting with a client for blogging and newsletter distribution. Sound money and sound information should finally be in the hands of the people, right? Want to learn more about the Pareto Project? Zap me, if you want to contribute (all Zaps go to the project).
Update:* Since my last article on the Pareto project, we have received more than 50 messages from publications, journalists, authors, testers and supporters. Thank you very much, we are happy to help everyone become censorship-resistant! May just take a little time. Are you a publication and want to be part of it, test us, migrate your content to Nostr? Write to team@pareto.space***
Not yet on Nostr and want the full experience? Easy onboarding via Nosta.me.
-
@ d830ee7b:4e61cd62
2025-01-09 10:11:08ผมจำได้ว่าหัวใจเต้นแรงแค่ไหนตอนเปิดประตูเข้าไปในสตูดิโอ RightTalk สิ่งแรกที่ปะทะตาคือแสงไฟเจาะลงมาเป็นวงใหญ่ ไม่ต่างจากเวทีคอนเสิร์ต
ผมรู้สึกได้ทันทีว่าความเย็นจากเครื่องปรับอากาศในห้องส่งไม่ได้ช่วยลดอุณหภูมิในร่างกายสักเท่าไหร่ ตอนนั้นผมพยายามบอกตัวเองให้ใจเย็น แต่มันยากเอาเรื่องเมื่อคิดว่ามีคนดูทางบ้านอีกมากรอติดตาม
คุณซุป พิธีกรของรายการ เดินมาทักผมด้วยรอยยิ้มที่ทำให้ผมค่อย ๆ ตั้งสติได้ เขาเชื้อเชิญให้นั่งลงบนเก้าอี้ที่จัดไว้ตรงกลางฉาก
แถวหลังมีทีมงานเดินขวักไขว่ จิงโจ้, อาร์ม, เทนโด้ และอีกหลายๆ คนที่คุ้นตากันดี
บรรยากาศออกกึ่งกันเองกึ่งเป็นทางการ ผมไม่ได้อธิบายอะไรมาก ก่อนที่เสียงผู้กำกับจะให้สัญญาณเริ่ม
คุณซุปหย่อนคำถามเล็ก ๆ ให้ผม “พร้อมนะครับ?” ผมพยักหน้านิด ๆ คิดในใจว่ามันคงไม่มีคำว่า “พร้อมจริง” ได้หรอก แต่ยังไงก็ต้องไปต่อ...
“คุยทุกเรื่องที่ใช่กับ RightTalk”
นั่นคือประโยคแรกที่ผมได้ยินในหูฟัง ขณะไฟสปอร์ตไลต์สาดสว่างทั่วเวทีอีกครั้ง คุณซุปเอ่ยแนะนำตัวผมว่าเป็นคนที่ผ่านประสบการณ์ สงคราม Blocksize มาตั้งแต่ยุคเปลี่ยนผ่าน และพ่วงด้วยข่าวว่าตอนนี้ราคา Bitcoin ทะลุหลักแสนดอลลาร์แล้ว
ผมยืดหลังเพื่อกลั้นความตื่นเต้น แต่ก็ไม่วายตัวเกร็งเล็กน้อย เขาหันมาทางผมพลางกล่าวอย่างเป็นกันเอง
“คุณแชมป์ PIGROCK สบายดีไหมครับ?"
"รู้สึกยังไงบ้างครับกับสถานการณ์ในปัจจุบันที่มันต่างจากสมัยก่อนลิบลับ?”
ผมเผลอกัดริมฝีปากเพราะความประหม่าหลุดขึ้นมาเล็กน้อย แต่ผมยังคุมโทนได้ จึงตอบไปว่า
"ผมชื่อแชมป์ครับ.. เป็นแค่นักวาดดิจิทัลธรรมดา ๆ ที่จู่ ๆ ก็ได้อยู่ข้าง ๆ Jakk Goodday พี่ชายจอมยิงใยผู้เปลี่ยนชีวิตผม ถ้าไม่ใช่เพราะเขา ผมคงไม่รู้จักคำว่า UASF หรือ SegWit ขนาดนี้"
ผมเห็นคุณซุปยิ้มมากขึ้น แล้วก็พยักเพยิดให้ผมพูดต่อ “ว่ากันว่าตอนนั้น Bitcoin มีแนวโน้มแตกออกเป็นหลายสาย เล่าหน่อยสิครับ ว่าพี่อยู่ในจุดไหน?”
ผมถือไมโครโฟนแน่นขึ้นตอบตามจริงว่า จุดเริ่มต้นมาจากความขัดแย้งว่า Blocksize ควรจะใหญ่ขึ้นหรือไม่ จนกลายเป็นสงครามขนาดย่อมบนฟอรัม Bitcointalk และโซเชียลมีเดียต่าง ๆ
ซึ่งผมเป็นคนที่ไม่เชี่ยวชาญเทคโนโลยีเลย แต่โชคดีตรงที่เจอ Jakk คอยเปิดแผนที่ให้เห็นภาพรวมว่าใครอยู่ฝ่ายไหน
ผมยังเล่าให้ผู้ชมฟังว่า... ครั้งแรกที่ได้ยินคำว่า UASF ก็ยอมรับว่างงอยู่เหมือนกัน แต่มันก็เป็นจุดที่ทำให้ผมเข้าใจว่า Bitcoin ไม่ได้มีเจ้าของเป็นตัวบุคคล
แถมยังเป็นครั้งแรกที่ผมเห็นประชาชนโหนดรายย่อยจะมาคุมเกมสั่งนักขุด “ถ้าไม่รองรับ SegWit ก็ไม่รับบล็อกกันเลย” ซึ่งเป็นเรื่องที่ผมเองก็ไม่เคยคาดคิดว่าจะเกิดขึ้นได้
ซุปหันไปมองกล้องด้วยสีหน้าน่าสนใจ พร้อมสรุปสั้น ๆ ก่อนพักเบรกว่า “โอเค.. งั้นตอนหน้ามาคุยกันเรื่อง UASF และ SegWit กันชัด ๆ ว่ามันเปลี่ยนแปลงชุมชน Bitcoin ได้ขนาดไหน ห้ามพลาดนะครับ!”
ผมก็ยิ้มรับแล้ววางไมค์ คิดในใจว่ายังมีอีกเยอะที่ผมอยากเล่า—ทั้งความวุ่นวายของปี 2017 และเรื่องราวของ Jakk ที่เป็นแหล่งข้อมูลล้ำค่าในชีวิตผม
ผมกลับเข้ามานั่งบนเก้าอี้ในสตูดิโอ RightTalk อีกครั้งหลังพักเบรกสั้น ๆ พิธีกรซุปมองสบตาผมราวกับบอกเป็นนัยว่า.. ตอนนี้ได้เวลาเล่าช่วงสำคัญที่ทุกคนรอคอย
ผมสูดลมหายใจเบา ๆ แล้วพยักหน้าอย่างมั่นใจ ถึงจะไม่ใช่นักเทคนิคโดยกำเนิด แต่ผมก็พร้อมจะบอกสิ่งที่ประสบมาในช่วงปี 2017 ซึ่งในตอนนั้น แค่ได้ยินคำว่า UASF ครั้งแรกผมยังสับสนแทบแย่ว่ามันคืออะไร
“พี่ว่า UASF เหมือนการปฏิวัติครับ”
ผมพูดด้วยน้ำเสียงตื่นเต้นขณะที่กล้องจับภาพเต็มจอ
“ตอนนั้นกลุ่มโหนดรายย่อยลุกขึ้นมาประกาศชัด ๆ ว่า ถ้านักขุดไม่สนับสนุน SegWit พวกเขาจะไม่รับบล็อกเหล่านั้นอีกต่อไป เป็นภาพที่พี่ไม่เคยคาดคิดมาก่อนว่า... เสียงของคนตัวเล็ก ๆ จะดังได้ขนาดนี้ เหมือนชาวบ้านรวมตัวท้าทายอำนาจจักรวรรดิไม่มีผิด”
ผมหันไปเห็นประกายตาในคุณซุป เขาขยับไมโครโฟนเล็กน้อย
“แบบนี้ก็ต้องมีเรื่องขัดแย้งกับพวก Hashrate ใหญ่ใช่ไหมครับ ผมได้ยินชื่อ Bitmain กับ Roger Ver โผล่มาบ่อยมากตอนนั้น”
ผมพยักหน้าแล้วหัวเราะน้อย ๆ “ใช่ครับ พวก Big Block มองว่าต้องขยาย Blocksize สายตรงไปเลย จะได้จุธุรกรรมได้เยอะ ค่าธรรมเนียมไม่โหด"
"ส่วนอีกฝั่งยืนยันว่าควรใช้ SegWit มาช่วยแทนโดยไม่ต้องขยายบล็อกจริง ๆ ประเด็นนี้ใหญ่พอจะทำให้เกิดการแตกสายกลายเป็น Bitcoin Cash ในวันที่ 1 สิงหาคม 2017 นั่นแหละครับ”
ผมเล่าย้อนภาพในหัว...
ช่วงนั้น Jakk บอกไว้อย่างชัดถ้อยชัดคำว่า “พวกเขาคงแยกตัวได้ แต่อย่าหวังว่าจะมาแทน BTC หรืออะไรใหญ่โตนัก รอดูไปเถอะ เดี๋ยวก็เห็นเอง”
มันฟังดูเหมือนคำทำนายที่ห้าวหาญ แต่สุดท้ายก็เป็นจริง ที่ผมตื่นเต้นยิ่งกว่านั้นคือ SegWit เองก็ไม่ใช่แค่จัดการปัญหา Transaction Malleability หากยังเปิดทางให้เทคโนโลยีในอนาคตอย่าง Lightning Network เกิดขึ้นมาได้อีก
ตอนแรกหลายคนเรียกกันว่าเป็นแค่ ‘ไอเดียบนกระดาษ’
แต่ตอนนี้ (ปี 2025) กลับกลายเป็นเลเยอร์สำคัญที่ทำให้ผมโอนเงินข้ามประเทศได้แทบจะฟรีในเสี้ยววินาทีจริง ๆ
“พี่เองยังคิดไม่ถึงว่ามันจะสำเร็จขั้นนั้น” ผมหัวเราะก่อนบอกต่อ
“ตอนแรกที่ SegWit เปิดใช้งาน คนจำนวนหนึ่งยังสงสัยด้วยซ้ำว่ามันจะแก้ปัญหาได้ไหม แต่พอมี UASF โหนดรายย่อยก็กดดันนักขุดจนต้องยอม มันเป็นความเคลื่อนไหวที่แสดงให้เห็นว่าคนมีอำนาจโหวตแบบไร้ศูนย์กลางมากจริง ๆ”
“แล้วเรื่องราคา Bitcoin ในปีนั้นล่ะครับ?” ซุปจับจังหวะได้ดี
“2017 ถือเป็นปีที่ราคา BTC แตะสองหมื่นดอลลาร์ครั้งแรกเลยใช่ไหม แล้วตอนนี้ทะลุแสนไปแล้ว มันเกิดอะไรขึ้นกันแน่?”
ผมยกไหล่แล้วยิ้ม “ตอนนั้นพี่ก็ตื่นเต้นสุด ๆ ครับ เหมือนรถไฟเหาะกันทั้งตลาด แต่ใครจะคิดว่ามันจะไปได้สูงกว่านั้นอีกหลายเท่าตัว บางคนก็ปรามาสว่าเป็น ‘ฟองสบู่แตกแน่ ๆ’ ส่วนคนเชื่อก็เชื่อสุดใจ"
"ไม่ต่างจากประเด็นว่า BCH จะแทน BTC ได้ไหม ซึ่งเอาเข้าจริงแล้ว ทุกวันนี้ BCH ก็ยังอยู่ แต่ไม่ค่อยมีใครพูดถึงหรือเชียร์แรง ๆ เหมือนในอดีต หลังเวลาผ่านไป ตลาดเลยเหมือนตัดสินว่า BTC ยังเป็นตัวหลักมากกว่า”
“พี่รู้สึกอย่างไรกับคำทำนายของ Jakk ที่ว่า BCH ไม่น่ารอดยาว?” ซุปถามแทรก มุมปากมีรอยยิ้มเจ้าเล่ห์นิด ๆ เหมือนอยากได้คำตอบที่สะใจ
“พี่ขอเรียกเขาว่าเป็นคนมองขาดละกัน”
ผมยิ้มพลางนึกหน้าตายของ Jakk “แกเป็นคนที่มองเกมเชิงเทคนิคและปรัชญาของ Bitcoin ได้คมมากนะครับ แกจะบอกเสมอว่า ‘ไม่มีใครเป็นเจ้าของ Bitcoin แท้จริงหรอก ตราบใดที่ชุมชนทั้งหมดไม่ยอมรับ ก็จบ’ "
"จนถึงตอนนี้ พี่ยังรู้สึกทึ่งว่าทำไมแกถึงทำนายถูกหลายเรื่อง”
ผมเห็นเวลาในหูฟังบอกใกล้หมดช่วงแล้ว จึงตบท้ายว่าเหตุการณ์ครั้งนั้นมันสอนให้ผมรู้เรื่องประชาธิปไตยในระบบไร้ศูนย์กลาง
ทุกฝ่าย—ไม่ว่าจะนักขุด โหนด หรือผู้ใช้—ต่างมีสิทธิ์ Fork ได้ แต่ไม่มีใครการันตีว่า Fork นั้นจะไปรอด
ท้ายที่สุด ตลาดต้องเป็นผู้ตัดสินเอง และนั่นคือเสน่ห์ของ Bitcoin ที่ผมรู้สึกโชคดีที่ได้เข้าไปเห็นด้วยตาตัวเอง
ซุปพยักหน้าแล้วยิ้มกว้าง หันไปมองกล้อง “โอเคครับ คุณผู้ชม วันนี้เราคุยกันเรื่อง UASF, SegWit, BCH, Lightning Network และความผันผวนของตลาดในปี 2017 ที่ต่อยอดมาถึง 2024 แบบพอหอมปากหอมคอ"
"ต้องขอบพี่แชมป์ ‘PIGROCK’ ที่มาให้มุมมองสนุก ๆ พร้อมแง่คิดที่น่าสนใจมาก ๆ ไว้เจอกันใหม่ใน RightTalk กับผมและแขกรับเชิญท่านอื่น ๆ ไม่นานนี้”
เสียงปรบมือดังขึ้นเบา ๆ ขณะที่ไฟบนเวทีค่อย ๆ หรี่ลงอีกครั้ง
ผมปลดไมค์ออกจากเสื้อ สูดลมหายใจโล่ง ๆ พร้อมกล่าวขอบคุณทุกคน แล้วคิดถึงคำพูดของ Jakk ในวันวานที่ฝังอยู่ในหัว
“สงคราม Blocksize แค่งานวอร์มอัพ โลกคริปโตฯ ยังมีอะไรให้ลุ้นอีกเยอะนะน้องชาย”
ผมยิ้มเงียบ ๆ คิดว่ามันคงจริงอย่างที่แกว่า เพราะถ้า Bitcoin ไม่ใช่ของใครคนเดียว เราก็คงเห็นการเคลื่อนไหวอะไรใหม่ ๆ เกิดขึ้นเสมอ
ซุปทำท่าเกริ่นรอบสุดท้าย สบตากับผมแล้วถามขึ้นด้วยน้ำเสียงเรียบ ๆ แต่ชวนให้ผมรื้อฟื้นความทรงจำทั้งหมดที่เพิ่งเล่ามา
“แล้วพี่คิดว่า... สิ่งที่ Bitcoin Cash กับ SegWit สอนเราเกี่ยวกับ Bitcoin คืออะไรครับ?”
ผมยิ้มบาง ๆ สูดหายใจแล้วลองเรียบเรียงคำตอบในหัว ผมคิดถึงภาพที่ผ่านมา... ทั้งช่วงที่โหนดรายย่อยลุกขึ้นเรียกร้องสิทธิ์ UASF ทั้งวันที่ BCH แยกตัวอย่างอลังการ ตลอดจนเวลาที่ SegWit เปิดทางให้เทคโนโลยีใหม่ ๆ เกิดขึ้น
ผมรวบทุกประสบการณ์ไว้ในประโยคเดียวก่อนพูด
“สำหรับพี่นะ... สงคราม Blocksize หรือจะเรียกว่าการแตกแยกครั้งนั้น มันสอนให้เห็นว่าระบบนี้ไม่เคยเป็นของใครคนเดียวเลยนะครับ"
"นี่แหละคือ การกระจายอำนาจ อย่างแท้จริง ใครจะฟอร์ก ใครจะทำอะไรก็ได้ แต่สุดท้ายตลาดและชุมชนทั้งหมดนี่ล่ะที่เป็นคนตัดสินว่าเส้นทางไหนจะอยู่หรือไป"
"เรื่องนี้ทำให้พี่ตระหนักว่าบางที... การขัดแย้งก็พาให้เทคโนโลยีมันพัฒนาไปอีกขั้นเหมือนกัน ตราบใดที่เราไม่ลืมสารตั้งต้นว่ามันคือ ระบบเปิดที่ทุกคนเข้าถึงได้ ”
ซุปนิ่งฟังแล้วผงกศีรษะเบา ๆ เหมือนยอมรับในประเด็นที่ผมว่า เขาหันไปทางกล้องและปิดรายการด้วยสไตล์ที่คนดูคุ้นเคย
“วันนี้เราคุยกันหลายแง่มุมเลยนะครับ ตั้งแต่ UASF กับปัญหาความขัดแย้ง ไปจนถึงผลลัพธ์ของ SegWit, BCH และ Lightning Network"
"ต้องขอบคุณพี่แชมป์ ‘PIGROCK’ มาก ๆ ที่มาแบ่งปันประสบการณ์อันเป็นประโยชน์ หวังว่าทุกคนจะได้ไอเดียกลับไปไม่มากก็น้อยนะครับ และนี่คือ RightTalk คุยทุกเรื่องที่ใช่ เจอกันตอนหน้าครับ!”
เสียงดนตรีประจำรายการดังขึ้นอัตโนมัติ เป็นสัญญาณว่าการถ่ายทอดสดสิ้นสุดลง
ผมถอนหายใจเฮือกใหญ่โล่งอกอย่างไม่ปิดบัง ทีมงานบางคนเดินเข้ามาขอบคุณพร้อมจับมือเบา ๆ ผมรู้สึกเหมือนเพิ่งยกภูเขาออกจากอกที่ได้ถ่ายทอดสิ่งที่เคยแบกไว้มานาน
ไม่ใช่แค่เรื่องเทคนิคบล็อกเชน แต่เป็นการขบคิดด้วยว่า ในโลกที่ทุกคนเรียกหาเสรีภาพทางการเงิน ไม่มีชัยชนะของใครที่จีรังได้นาน ถ้าผู้ใช้ทั้งหมดไม่ยอมรับ
ผมเผลอมองขึ้นไปบนไฟสปอร์ตไลต์อีกครั้ง คราวนี้ไม่ได้รู้สึกว่ามันจ้าจนแสบตาเหมือนช่วงเริ่มรายการ แต่กลับรู้สึกว่ามันอบอุ่นดี
ผมยิ้มให้ตัวเองเล็กน้อย ทบทวนว่านี่คงเป็นบทเรียนที่ดีว่าถึงเราจะเป็นเพียงโหนดเล็ก ๆ หรือผู้ใช้งานตัวเล็ก ๆ แต่ในระบบกระจายอำนาจแบบ Bitcoin มันก็มีสิทธิ์เปล่งเสียงได้
และบางครั้งก็อาจเปลี่ยนกระแสทั้งโลกได้เลย ถ้านั่นไม่ใช่คำจำกัดความของ “เสรีภาพ” ผมก็ไม่รู้จะเรียกมันว่าอะไรแล้วล่ะ
End credit
ผมนั่งพักหลังกองอัดรายการแทบไม่ได้หายใจเป็นชิ้นเป็นอัน พิธีกรสุดกระตือรือร้นอย่างซุป เดินดุ่ม ๆ มาหาผมพร้อมแววตาวิ้งวับ ก่อนจะรั้งเก้าอี้มาเบียดติดข้างผม
ถึงแม้ไฟสปอตไลต์จะดับไปแล้ว แต่เขายังดูเหมือนพร้อมลุยถามต่อไม่หยุด
“พี่แชมป์” เขาเอ่ยชื่อผมแบบลากเสียงยาว
“คอผมมันคันยุบยิบ มีเรื่องต้องเม้าท์ต่อจริง ๆ นะพี่ ผมกั๊กไว้ตั้งแต่ก่อนจะเริ่มรายการละ”
ผมเลยหัวเราะพลางเท้าคาง “ไหนว่ามาสิวะ ซุป ใจคอนายจะไม่ให้พี่ไปเข้าห้องน้ำเข้าห้องท่าก่อนเลยเหรอวะ?” ผมพูดด้วยน้ำเสียงกึ่งหยอกกึ่งประชด
“ฮ่า ๆ โทษทีพี่ ผมนี่มันขี้สงสัย” เขายิ้มเจ้าเล่ห์
“คือเรื่อง ‘The One Who Claims to Be Satoshi’ น่ะ… ก็ Craig Wright ไงล่ะพี่ ผมสตั๊นกับเขามานาน เห็นว่าฟ้องชาวบ้านเขาไปทั่ว เห็นมีข่าวว่าขู่ฟ้องใครก็ตามที่พูดว่าเขาไม่ใช่ Satoshi ผมล่ะขำไม่ไหว!”
ผมยักไหล่ “เอาตรง ๆ นะ... พี่มองว่าเขาเป็น ราชาสายปั่นของแท้ รู้จักดึงกระแสเก่งเป็นบ้า ส่วนจะเป็น Satoshi จริงหรือเปล่า? พี่ไม่เชื่อเลยสักเสี้ยว ยังไงพี่ก็ว่ามันดู ‘เฟค’ ไปหมด”
ซุปตบโต๊ะเบา ๆ “โอ๊ย! ใช่เลยพี่! ผมก็ดูละครฉาก ‘พิสูจน์ Private Key’ แล้วแทบขำกลิ้ง"
"แต่พี่รู้ไหม? ตอนแรกดราม่าก็แรงเพราะหลายคนคิดว่าบางทีแกอาจจะเป็นจริง ๆ แต่หลักฐานไม่ชัด สุดท้ายคนในชุมชน ‘กระซวก’ จนหลุดหมดว่าใช้เทคนิคปลอมลายเซ็น”
ผมพยักหน้า “ยิ่งไปกว่านั้นนะ... ตอนเขาแยกสายไป Bitcoin SV อ้างว่าสานต่อ ‘Satoshi’s Vision’ นายลองดูตอนนี้สิ มีกี่คนพูดถึง BSV... "
"แทบไม่มี... มันก็ตลกดีนะ โลกคริปโตนี่ ถ้าไม่มีคนยอมรับ ต่อให้เป็น Satoshi ยังไงก็แพ้ตลาด”
“โอ้โห.. พี่พูดได้ถูกใจมาก” คุณซุปแหงนหน้าหัวเราะลั่น “นี่ถ้าพี่คนนี้อยู่ต่อหน้าคงเถียงเขาร้อนเป็นไฟเลยนะ แต่เอาจริง ถ้าอยู่ดี ๆ เขาพิสูจน์ได้ว่าเป็น Satoshi ขึ้นมาจริง ๆ พี่ไม่ช็อกเหรอ?”
ผมยิ้มพลางยักคิ้ว “ช็อกนิดหน่อยนะ… แต่มันคงไม่เปลี่ยนอะไรหรอก เพราะ Bitcoin น่ะไปไกลเกินกว่าตัวบุคคลแล้ว ใครจะเป็น Satoshi ก็เรื่องของเขา พี่ถือคติว่า BTC ไม่ต้องการ ‘เจ้านาย’ อีกแล้ว ตอนนี้มันเป็นของทุกคนบนโลกต่างหาก”
"We're all Satoshi เคป่ะ?"
“สุดยอด!” ซุปตบมือถูกใจใหญ่
“ผมก็คิดเหมือนกัน ผมแอบยกให้พี่เป็นปรมาจารย์ทางความคิดเรื่องนี้เลยนะเนี่ย”
"มึงก็อวยเกินไป.. ไอ้นี่" ผมรีบปัดคำชมบ้า ๆ นั่นไปทันที
พูดจบเขาก็กำลังจะบอกอะไรต่อ แต่ทันใดนั้นประตูสตูดิโอเปิดออกแผ่ว ๆ เผยให้เห็นผู้ชายรูปร่างสูงโปร่ง คิ้วไม่เข้มเท่าไหร่ แต่งตัวไม่เป็นทางการสีเข้ม ก้าวเข้ามาแบบไม่รีบร้อน
“ตายล่ะพี่แจ็ก!” คุณซุปอุทานเบา ๆ ก่อนสะดุ้งตั้งท่าเหมือนเจอลูกพี่ใหญ่ ผมเองก็ตาโตนิดหน่อย “โผล่มาเงียบ ๆ ระวังผมช็อกตายนะ”
คนที่เข้ามาคือ Jakk Goodday ที่ผมเคารพและเกรงใจมาตลอด.. และใช่เลย เขาคือ Co-founder ของ Right Shift ตัวจริง เสียงจริง
“โย่ สองหนุ่มเม้าท์อะไรกันอยู่ กลิ่นดราม่าลอยมาถึงนอกห้องเลยนะ” เขายิ้มยั่ว พร้อมวางแก้วคราฟท์เบียร์ของเขาบนโต๊ะใกล้ ๆ
“พี่แจ็ก ขอโทษครับ ผมก็แค่คันปากเรื่อง Craig Wright” ซุปรีบบอก พยายามวางมาดพิธีกรสายยียวนเหมือนเดิม แต่ผมเห็นหลังตาเขายังกระพริบบ่อยแปลก ๆ
“ซุปเอ๊ย.. ขี้เม้าท์ตั้งแต่สมัยฝึกงานจนตอนนี้เป็นพิธีกรระดับประเทศก็ไม่เปลี่ยน” Jakk ยักคิ้ว เขามีเสียงเรียบแต่น่าฟัง
“แต่ดีนะ... เรื่อง Craig Wright"
"เนี่ย... พี่เองก็ขำทุกทีที่ได้ยินว่าพยายามฟ้องคนนู้นคนนี้ว่า ‘เธอดูถูกว่าฉันไม่ใช่ Satoshi’ โอ๊ย มุกนี้แม่งใช้มากี่ปีแล้วก็ไม่รู้”
ผมหัวเราะออกมาเบา ๆ “ถ้าพี่ว่าแล้วมันไม่หยาบไป ก็ช่วยกัดเพิ่มให้หน่อย ผมว่าต้องมีคำเจ็บ ๆ ของพี่แจ็กแน่ ๆ”
Jakk หรี่ตาเล็กน้อย...
“ถ้าผมพูดแบบเจ็บ ๆ จริงก็เกรงจะโดนฟ้องเหมือนกันนะ” เขาทำท่ายกแก้วเก๊กฮวยลึกลับขึ้นจิบ
“แต่เอาเป็นว่า… ตลาดไม่เคยโกหกใคร โค้ดก็ไม่เคยโกหกใคร ใครที่เรียกตนเองเป็น Satoshi หรือพระเจ้าคนไหนก็ตาม ถ้าทำให้คนยอมรับไม่ได้ มันก็จบตรงนั้นละ”
ซุปหัวเราะก้าก “ว้าว! ตรงกว่าผมอีก! 5555"
"นี่เป็นเหตุผลว่าทำไมพี่ถึงเป็นหัวโจกได้ใช่ไหม สายบวกแบบตอกหมุดเลย”
Jakk หันมาทางผม “แต่เอาจริง พี่ก็ respect ในความปากแจ๋วของคุณซุปเค้านะ ถ้าเจอ Craig Wright ตัวเป็น ๆ เมื่อไหร่ บางทีอาจจะสนุกกว่าที่คิด”
ผมกับคุณซุปหันมาสบตากันแล้วระเบิดหัวเราะพร้อมเพรียง “ไม่เอา ไม่เจอดีกว่า ผมขอความสงบสุขในชีวิต!” คุณซุปว่า
Jakk วางแก้วเก๊กฮวยลงบนโต๊ะ กระตุกยิ้มตรงมุมปากอย่างคนมั่นใจ “ขอจบด้วยโควทหนึ่งละกัน ใครอยากเป็น Satoshi ก็เชิญเป็น แต่จำไว้ว่า…"
"ผู้ชนะที่แท้จริง ไม่ได้ชนะเพราะได้สวมมงกุฎ หากแต่ชนะเพราะผู้คนยอมรับให้เขาสวม และ Bitcoin ก็แสดงให้เราเห็นแล้วล่ะ ว่าตัวตนแท้ ๆ ของมันไม่ต้องพึ่งใครมาคุมบังเหียนสักคนเดียว”
ผมกับคุณซุปนิ่งไปครู่สั้น ๆ ก่อนหัวเราะเบา ๆ รับคำพูดคมคายเสียดสีในแบบของ Jakk Goodday “โอเคครับพี่แจ็ก นี่สินะ Signature Quote ที่เราคอยตามหา!” คุณซุปพูดตบท้าย ท่ามกลางเสียงเก็บอุปกรณ์ของทีมงานที่ใกล้จะเลิกงานเต็มที
ผมเองยักไหล่แล้วลุกขึ้นบิดขี้เกียจ “เอ้า! ปิดสตูแล้วดีกว่า เดี๋ยวเราจะโดนปิดไฟตัดน้ำไม่รู้ตัวนะครับพี่แจ๊ก”
“เออ ๆ รีบปิดสตูเถอะ” Jakk ตอบเรียบ ๆ แต่สายตายังฉายแววเจ้าเล่ห์หน่อย ๆ
“ไว้เจอกันรอบหน้า อย่าเผลอไปปั่นจนโดนฟ้องกันเองล่ะ ฮ่า ๆ”
และนั่นก็เป็นฉากสั้น ๆ ที่สามเราปิดท้ายกันแบบเฮฮาและมีสาระนิด ๆ ทิ้งประเด็นว่าบางครั้งในโลกคริปโต คำพูดของใครสักคนอาจสั่นสะเทือนได้
แต่ตอนจบจริง ๆ ก็ต้องดูว่าชุมชนยอมรับมากน้อยแค่ไหน… Craig Wright จะอ้างตัวเป็น Satoshi กี่ครั้งก็ได้ แต่ถ้าโลกไม่เชื่อ...
นั่นก็อาจเป็นเพียงเรื่องตลกในตำนานคริปโตเท่านั้นเอง
ลำดับเหตุการณ์สงคราม Blocksize (Blocksize War)
จุดเริ่มต้นของความขัดแย้ง (2015–2016)
ปัญหาความแออัดของเครือข่าย Bitcoin:
- การเพิ่มขึ้นของธุรกรรมทำให้บล็อกขนาด 1 MB ไม่เพียงพอ ส่งผลให้ค่าธรรมเนียมสูงและการยืนยันธุรกรรมล่าช้า
ชุมชนเริ่มแบ่งเป็น 2 กลุ่ม:
-
Big Block (ขยายบล็อกใหญ่ขึ้น): ต้องการเพิ่ม Blocksize ตรง ๆ เช่น 2 MB หรือมากกว่านั้น
-
Small Block (คงขนาดบล็อกเดิม): เน้นการแก้ปัญหาผ่านวิธีอื่น เช่น Segregated Witness (SegWit)
การพัฒนาของ SegWit (2016)
Segregated Witness (SegWit):
-
เสนอโดย Pieter Wuille และทีม Bitcoin Core
-
แก้ปัญหา Transaction Malleability และเพิ่มพื้นที่ธุรกรรมในบล็อกโดยย้ายข้อมูลลายเซ็นออกจากธุรกรรมหลัก
Hong Kong Agreement (2016):
-
ความพยายามประนีประนอมระหว่างกลุ่ม Big Block และ Small Block
-
ตกลงว่าจะเพิ่ม Blocksize เป็น 2 MB และเปิดใช้งาน SegWit แต่ไม่สำเร็จจริง
UASF และ SegWit Activation (2017)
UASF (User-Activated Soft Fork):
-
เสียงของโหนดรายย่อยลุกขึ้นกดดันนักขุดให้รองรับ SegWit ผ่าน BIP 148
-
เส้นตาย: 1 สิงหาคม 2017 ถ้านักขุดไม่รองรับ SegWit โหนด UASF จะไม่ยอมรับบล็อกของนักขุดเหล่านั้น
SegWit Activation:
-
นักขุดยอมรับ SegWit เพื่อหลีกเลี่ยงการแยกเครือข่าย
-
SegWit เปิดใช้งานสำเร็จในวันที่ 24 สิงหาคม 2017
การเกิด Bitcoin Cash (1 สิงหาคม 2017)
Hard Fork ครั้งใหญ่:
-
กลุ่ม Big Block นำโดย Roger Ver และ Jihan Wu สร้าง Bitcoin Cash (BCH)
-
BCH เปิดตัวด้วย Blocksize ขนาด 8 MB และโปรโมตว่าเป็น “เงินสดดิจิทัลที่แท้จริง”
ผลกระทบ:
-
ชุมชน Bitcoin แตกเป็น 2 ฝ่ายชัดเจน
-
BCH ได้รับความนิยมในช่วงแรก แต่ไม่สามารถแทนที่ BTC ได้ในระยะยาว
การพัฒนาของ Lightning Network (2017–2018)
Layer 2 Solution:
-
Lightning Network (LN) เป็นเทคโนโลยีที่พัฒนาต่อเนื่องหลัง SegWit เปิดใช้งาน
-
ลดความแออัดในเครือข่ายหลักและทำให้การทำธุรกรรมเร็วขึ้น
การใช้งานจริง:
- LN เริ่มทดสอบใน Testnet และเปิดตัวอย่างเป็นทางการในปี 2018
ราคา Bitcoin พุ่งสูงสุด (ปลายปี 2017)
-
Bitcoin แตะ $20,000 ครั้งแรก:
-
ช่วงปลายปี 2017 ตลาดคริปโตเข้าสู่ช่วงเฟื่องฟู (Crypto Boom)
-
BCH ก็พุ่งสูงสุดที่มากกว่า $3,000 แต่เริ่มลดลงในปีถัดมา
ความแตกแยกใน Bitcoin Cash (2018)
Hard Fork อีกครั้ง:
-
เกิดความขัดแย้งในชุมชน BCH เรื่องแนวทางการพัฒนา
-
นำไปสู่การแยกตัวเป็น Bitcoin SV (BSV) นำโดย Craig Wright
ผลกระทบ:
-
BCH และ BSV สูญเสียส่วนแบ่งตลาด
-
BTC ยังคงเป็นผู้นำในตลาดคริปโต
การยอมรับ SegWit และการเปลี่ยนแปลงตลาด (2018–ปัจจุบัน)
SegWit Adoption:
-
เมื่อผู้ใช้งานเริ่มใช้ SegWit มากขึ้น ค่าธรรมเนียมธุรกรรมลดลง และความแออัดในเครือข่ายลดลง
-
Bitcoin กลายเป็น Store of Value:
-
BTC ถูกมองว่าเป็น “สินทรัพย์เก็บออม” มากกว่า “เงินสดดิจิทัล”
BCH และ BSV:
- ตลาดของทั้งสองสายลดลง และไม่สามารถทดแทน BTC ได้
https://v.nostr.build/pxBuxtiSVNbisYMv.mp4
-
@ e3899a52:dd88183f
2025-01-09 02:19:02The term "gooch" is often used informally to refer to the area of skin between the genitals and the anus, also known as the perineum.
The three main functions are as follows, in case you have always wondered, but were embarrassed to ask:
- It serves as a support structure for the pelvic organs.
- The area is rich in nerve endings, which can contribute to sexual pleasure.
- It can be a focus in certain medical examinations or procedures.
Well that is about all I know about gooches, but I would love to hear about your tips or fun facts.
originally posted at https://stacker.news/items/842897
-
@ 2fb77d26:c47a6ee1
2025-01-08 19:47:47Sehr geehrte Damen und Herren,
wenn wir an Schlachtfelder denken, sehen wir vor unserem inneren Auge düstere Bilder von verkohlten Wracks, von Einschlagkratern, schreienden Verwundeten, Leichen und dichten Rauchschwaden, die am Horizont über verbrannter Erde wabern.
Vergleichbare Assoziationen drängen sich auf, versucht man in Bilder zu fassen, in was für einer Gesellschaft wir mittlerweile leben. Intellektuelle Wracks, mediales Flächenbombardement, stumme Schreie von Pharmaopfern und hungernden Kindern, weggescrollt von Smartphone-Zombies, deren letzter Hauch Empathie am Rande ihres dissoziativen Wahrnehmungshorizontes verblasst. Zivilisatorische Transformation als Kriegsfilm.
Früher verliefen die Frontlinien von Klassenkampf und Propagandakrieg durch die Auslagen der Zeitungskioske, durch Rundfunkredaktionen und über die nach Sendeschluss flimmernden Bildschirme der Mattscheibe. Heute durch den Kopf.
Sprichwörtlich. Denn die »Vierte Industrielle Revolution« begegnet zunehmendem Desinteresse an Erziehungsfunk und aufkeimender Renitenz mit Dopamin-Shots, Implantaten und Nanotechnologie. Das erklärte Ziel der Herrschaftskaste ist nicht mehr die Manipulation, sondern die Fernsteuerung der Steuersklaven. Das »Hive Mind«.
Sendeschluss gibt es nicht mehr. Und der Newsfeed ist unerschöpflich, ist Manifestation dessen, was Aufmerksamkeitsökonomie für uns bedeutet: Den Verlust wertvoller Lebenszeit an neonbunte Sinnlosigkeit. Das Smartphone dient nicht der Evolution, sondern der Degeneration der Spezies Mensch. Es ist kein Werkzeug, sondern eine Waffe. Aber das Handy lässt sich — wie das TV-Gerät — abschalten. Oder abschaffen. Das birgt Risiken — denn nur Lufthoheit über dem Debattenraum garantiert dem postmodernen Feudalismus Machterhalt. Dementsprechend setzen seine Vertreter nun alles daran, invasive Technologien ins Feld zu führen, um sich unserer Gedanken bemächtigen zu können.
Der Kriegsfilm spielt sich also nicht mehr nur als dunkles Phantasma vor unserem inneren Auge ab, er handelt nicht von irgendeinem fernen Land — das zu erobernde Terrain, das primäre Schlachtfeld der biodigitalen Konvergenz liegt unmittelbar hinter dem Sehnerv. Kriegsziel: Die Verschmelzung von Mensch und Maschine. Transhumanismus. Und bei so manchem Zeitgenossen scheint bereits eine gewisse Konträrfaszination am eigenen Untergang Einzug zu halten. Die Résistance des Mediazän verteidigt demnach nicht nur das Recht auf Meinungsfreiheit, sie kämpft um den Erhalt des freien Willens. Um Menschlichkeit. Um das Fortbestehen unserer Spezies.
Vor diesem Hintergrund beschäftigt sich die dritte GEGENDRUCK mit dem »Schlachtfeld Gehirn«. Mit dem zerebralen Status quo. Die Autoren analysieren und dokumentieren den Stand von Forschung, Angriffswellen, Waffenarsenal und Verteidigungsmechanismen. Denn unser Leben ist das Produkt unserer Gedanken. Unserer Erinnerungen. Sie sind die Basis unserer Freiheit, unserer Geschichte und Zukunft. Wir müssen sie schützen. Mit allen Mitteln.
Denn »ein Kopf ohne Gedächtnis ist eine Festung ohne Besatzung« (Napoleon).
Im Namen des gesamten Teams,
Tom-Oliver Regenauer
Printausgabe bestellen unter: www.gegendruck.de
-
@ 714f9dc3:76659adb
2025-01-08 19:16:50Last week, I was reading “The Air We Breathe”, by Glen Scrivener. It’s about “How We All Came to Believe in Freedom, Kindness, Progress, and Equality”, and it explores the Christian roots of the values we prize in today's western society. It’s all around us, but we don’t really know where it came from: It’s the air we’re breathing. The ideas and ethics behind Christianity, whether you believe in them or not, are embedded in our culture.
As I was reading this, I saw so many parallels with Bitcoin, so wanted to list them below and share some of my thoughts. Can Bitcoin also become “The Air We Breathe”? Or in plebs words: hyperbitcoinization?
Can Bitcoin become so ubiquitous that it becomes normal? Can there be a world in which we don’t even know where Bitcoin came from? It would be a world with many similar views as with today's view on Christianity. It becomes the air we breathe, something that used to be a counterculture that over time became ubiquitous. What can we learn from it?
These are my ten parallels of Bitcoin with the early days of Christianity.
- Separation from state
- From obscure counterculture to dominant force
- Exponential grassroots growth
- Conversion of emperors/politicians
- Sudden tolerance and protection for ideology
- Fall of the empire, end of the status quo
- Missionaries spreading the word
- Persuasion and education are key
- Age of Enlightenment
Note: I’m no expert on Christianity, nor a historian of the Roman Empire, and I know just a bit about Bitcoin. See this as a thought experiment.
1. Separation from state
In all fairness, I’m not the first to draw this first parallel. It was Satoshi Nakamoto themself who made the connection even before Bitcoin was available to the public, with several hints pointing back to important dates and moments in Christian history. The big parallel here is the “separation of money and state” and “separation of church and state”.
Before going back to the early days of Christianity in the first centuries AD, I first want to draw this parallel with Satoshi.
It’s 1517. The German Priest Maarten Luther writes his Ninety-five Theses, and nails this on the church doors in Wittenberg. The theses are also known as the “Disputation on the Power and Efficacy of Indulgences”. He kickstarted a movement with a radical new idea for that time: The separation of the church from the state.
The Catholic Church had become one with the state. Via the means of indulgences, there was an ability to pay for your redemption. The church was corrupted by money, power and politics. The church and indulgences replaced the need for personal responsibility and an individual faith with money and perverse structures.
Reformation Day is a Protestant Christian religious holiday celebrated on 31 October in remembrance of the onset of the Reformation. But the 31st of October is also the day in which Satoshi shared his pamphlet with the world: in 2008 they published the Bitcoin Whitepaper. It kickstarted a movement with a radical new idea for that time: The separation of the money from the state.
But this was not Satoshi’s only hint. Another one is the date of Bitcoin’s Genesis Block: January 3, 2009. It was the day that the idea of the separation of money and the state became reality, more than just an idea in an individual's mind.
Did you know that Maarten Luther was excommunicated from the Catholic Church in 1521 by Pope Leo X for sparking this revolutionary new way of thinking (and being). It happened on January 3 as well. I bet Satoshi Nakamoto knew.
To be fair, this parallel is not new and known by many bitcoiners. But it’s a good introduction to the topic, and after reading “The Air We Breathe: How We All Came to Believe in Freedom, Kindness, Progress, and Equality”, I automatically started to see more parallels between (the early days of) Christianity and todays adoption of Bitcoin. Because it was of course not Maarten Luther who sparked these rebellious thoughts in 1500, but it was Jesus himself approx. 2000 years ago.
Let’s go back from the 1500s to the first decades AD to the beginning of this radical new belief system. During the dominance of the Roman empire in the Mediterranean and much of Europe, Western Asia and North Africa, someone told a story that opposed every mainstream paradigm.
Jesus’ idea was radically different from the belief systems of that day. He preached Freedom, Kindness, Progress, and Equality in a world that was full of Debauchery and Violence, with Gladiator Games, Slavery, Public Crucifixion, and Brutalities. The belief system of that time was not like todays.
There were superior races (Greek/Romans over barbarians), superior sexes (man over women), superior classes (free man over slaves) and the concept of justice was more something in the realm of “restoring rights of those that were superior”, than “equality for all, men and women, Greek and barbarian, free and slave”.
Jesus opposed the status quo. It started small and irrelevant; as a counterculture. But it didn’t stay that way.
2. From obscure counterculture to dominant force
In “The Air We Breathe”, Scrivener asks the question:
“How did the obscure, marginal Jesus movement of the 1st century become the dominant religious force in the Western world in a few centuries?”
Important to know, is that the Christian faith was the opposite of the narrative. Concepts like Freedom, Kindness, Progress, and Equality didn’t exist in the Roman Empire. Human rights neither. Individual rights neither. The emperor was almost de facto God himself.
Early Christians were persecuted for preaching a different story: that God is NOT the ruler of the empire. Jesus preached the separation of politics from God; separating faith from the state. As a result, he was crucified, and many of his followers were killed by Nero (between 54 and 68 AD), Domitian (81–96 AD), Trajan (98–117 AD) and Decius (249–251 AD). This new narrative was a thread for the Roman rulers.
Draw the parallels of how there have been many attempts to “kill” bitcoin, not with physical persecution but with an information war. Not by physical violence, but by misinformation. Bitcoin threatens the status quo, just like Christianity threatened the Roman Empire.
You see?
But how is the obscure movement of Bitcoin in the 21st century becoming the dominant force, similar to the question that Scrivener asked about Christianity? Perhaps the answer lies in the following parallel.
3. Exponential grassroots growth
Sociologist Rodney Stark estimates in “The Rise of Christianity” that from the time of the first Easter, the church began growing at a rate of 40% per decade, a modest but relentless 3.4% per year. By the year 300, Christians numbered perhaps 6 million: about a tenth of the empire.
Despite pushbacks, the army of believers continued to grow. Grassroots, peer-to-peer. It was not the state-religion, it was a peaceful army of believers that spread the word, resulting in an exponential growth of its followers. The counterculture became more and more dominant.
You may see what I’m doing here. It was basically the meme that all Bitcoiners know: Gradually, then suddenly. Against the current.
4. Conversion of emperors/politicians
In 312 a big change happened: Emperor Constantine converted to Christianity. As Stark writes, "Constantine's conversion would better be seen as a response to the massive exponential wave in progress, not as its cause".
Are we living in that same era, where nation states start to embrace Bitcoin? Where politicians don’t oppose as strongly anymore, but are flirting with the idea of embracing it? And again the parallel: it’s responsive to the exponential wave of progress, not as its cause.
Whether Constantine is Nayib Bukele, Donald Trump, or Milei: it doesn’t matter. It’s the dynamic that matters. The counterculture becomes so dominant, that the “rulers” of the world are wanting to be part of it. Which will be followed by “rules” that favour the ideology, movement, and beliefs.
6. Tolerance and protection for ideology
In 313 Constantine's Edict of Milan granted freedom to Christians that were remarkable for that time and a model for religious toleration for the coming centuries.
The tide was turning, and by 380 Emperor Theodosius made Christianity Rome's official religion, more than half the population had already converted. In a few short centuries Christianity had gone from radical counterculture to dominant cultural power. This was an extraordinary shift in the church's relationship with the world. The edict expressly grants religious liberty to Christians, who had been the object of special persecution, but also goes even further and grants liberty to all other religions. And then, in 410, the world itself changed.
It changed from grassroots, bottom-up adoption to some kind of nation state adoption. One that was driven by decrees and edicts, instead of the analog cyberhornets of that day. Actually, the ideas of Indulgences were introduced via these Edicts, something that Maarten Luther actually was fighting against in the 1500s.
The world changed from the state-less Christian belief and moved (back) towards a system in which the state and church were connected again. Yes — the Roman Catholic Church. Until the previously mentioned critics during the Reformation.
6. Fall of the empire, end of the status quo
When people speak of the fall of the Roman Empire, they usually mean in the 5th century when the western half fell. But there was also an eastern half, known as the Byzantine Empire (with its capital in what is modern-day Istanbul).
How did this relate to the movement that once was Cult, and now suddenly had become Culture?
It was Augustine, the north African bishop (354-430), who laid the foundation for a new philosophical, theological, and legal system. He distinguished between the fragile earthly realm and the eternal heavenly kingdom. Rome was “a city of man”, which fell. But the “city of God” was forever. He continued to separate the Roman Catholic Church from the faith that it once was. This distinction was vital, and it gave rise to the concept of "the secular realm". He planted the first ideas of "the separation of church and state" again, which started to spread throughout Europe during the supposedly "sandy desert" of the Middle Ages.
The parallel and lesson here might be that narratives can be taken over, for the worse. And that it takes centuries to take back the narrative, but/and only after an empire has fallen. Whether we refer to “The Fourth Turning” by William Strauss and Neil Howe or “Changing World Orders” by Ray Dalio. There is something to preserve, and it needs active monitoring and pushbacks!
7. Missionary, spreading the word
The way the church sought to spread its influence would become a question that would take many centuries (and many failures) to settle. In the past, empires sought to spread their influence almost always by force. Christianity has been a missionary faith from the beginning. It was for this reason that Pope Gregory the Great sent Augustine to Britain to convert the Anglo-Saxons.
Augustine was commanded by Gregory to use only "gentle means". His goal was persuasion. His method was teaching and preaching. And he was successful, converting King Aethelbert of Kent and becoming the first Archbishop of Canterbury.
You see what I’m talking about again: the parallel is simple. Bitcoin is a similar peaceful revolution, a missionary movement, of those that wish to see their Cult turn into a Culture. “Genle means”, teachings, persuasions. Or in pleb terminology: Orangepilling.
8. Persuasion and education are key
Over the next decades and centuries, this movement continued. English Benedictine monk (675-754) Boniface was sent from the previously “barbarian” Britain to “orangepill the East” – in this case the Saxons in the Germanic lands. In the words of his advisor, the Bishop of Winchester, his goal was "to convince them by many documents and arguments". This mission of persuasion and education was largely successful. Today he’s better known as “the Apostle to the Germans". He was killed in The Netherlands (in Dokkum).
Boniface kept to a policy of non-violence and non-retaliation, even to the point of death. Another famous writer about this topic, Tom Holland, summarises the lesson we learn from Boniface: "to convert was to educate".
In the following century this lesson was sorely needed by the Frankish king Charles the Great, aka Charlemagne (742-814). Charlemagne's path to power was a brutal one. When the Saxons stood in his way, Charlemagne beheaded 4,500 of them in a single day. There are concrete reasons why "getting medieval" might be associated today with brutality.
Is “Bitcoin as Legal Tender”, whether this is peaceful or violently, the way to go? Are we “getting medieval” with these kind of measures, in order to go from Cult to Culture, from counterculture to dominant culture, in which we lose the true essence of our revolution of separation of the state from the matter?
9. Age of Enlightenment
Alcuin of York (735-804), was bold enough to write to Charlemagne directly with his criticism. "A person can be drawn into the faith, not forced into it". Be a lighthouse, not a tugboat!
The church's official teaching would later agree with Alcuin's position. In the 12th century all "harsh means" were forbidden since faith arises from the will, not compulsion. Enlightenment comes through education and persuasion.
There’s work to do. Grassroots. Education. Peer-to-peer. Not directed by politicians, nor opposed by those in power. Through education and persuasion. Rules without rulers. Because eventually, with the Crusades and the Spanish Inquisition, there are stark examples of the church using “harsh means" again. Forcing Bitcoin on people will never be the way: it’s a cheat code to the end goal. In order to succeed, we’ll need to be a missionary.
Final words
I don’t want in any way to compare Christianity in itself as a faith, and Bitcoin as a technology, with each other. I enjoyed exploring the sociological phenomena between two countercultures, the grassroots movement and missionary parallels between both of them. Satoshi gave the first assist, with the 31st of October (Whitepaper Day) and the Genesis Block on January 3rd.
Let’s not mix religion with monetary systems, even though there are many similarities between certain movements. That’s not my goal for sharing this brain dump. But let’s learn from the past, from Constantine’s Edict and from Augustine, from Charlemagne (and especially Alcuin of York), from Boniface and from Maarten Luther. And from Satoshi Nakamoto.
-
@ f9c0ea75:44e849f4
2025-01-08 18:15:47Nos anos 80, o Brasil testemunhou um dos momentos mais patéticos da sua história econômica: os "Fiscais do Sarney". Movidos por um decreto inútil, cidadãos foram incentivados a denunciar comerciantes que não seguissem o tabelamento de preços imposto pelo governo. O resultado? Um fracasso absoluto, prateleiras vazias, inflação descontrolada e a certeza de que a mentalidade fiscalizadora não gera valor para ninguém – apenas sufoca a economia e reforça o atraso.
Agora, décadas depois, vemos a mesma mentalidade derrotada ressurgir na Receita Federal com a fiscalização automática sobre transações acima de R$ 5.000 via PIX. Em vez de buscar um ambiente mais produtivo e inovador, o governo se empenha em monitorar cada centavo que circula, tratando qualquer movimentação um pouco maior como suspeita. Quem ganha com isso? Certamente não é o cidadão honesto, nem a economia real.
E quem são os protagonistas dessa história? Os novos fiscais da Receita Federal, que assumem um papel tão irrelevante quanto o dos fiscais de Sarney. Um trabalho de baixo valor agregado, que não contribui para a criação de riqueza ou inovação. São apenas burocratas modernos, presos na mentalidade de que controlar e punir é mais importante do que fomentar o crescimento e a liberdade financeira.
A história já provou que o fiscalismo estatal é um modelo falido, seja tabelando preços ou perseguindo transações financeiras. Enquanto alguns criam, inovam e geram valor, outros se ocupam apenas de vigiar e tributar. O tempo sempre mostrou quem estava certo.
Nos anos 80, o Brasil testemunhou um dos momentos mais patéticos da sua história econômica: os "Fiscais do Sarney". Movidos por um decreto inútil, cidadãos foram incentivados a denunciar comerciantes que não seguissem o tabelamento de preços imposto pelo governo. O resultado? Um fracasso absoluto, prateleiras vazias, inflação descontrolada e a certeza de que a mentalidade fiscalizadora não gera valor para ninguém – apenas sufoca a economia e reforça o atraso.
Agora, décadas depois, vemos a mesma mentalidade derrotada ressurgir na Receita Federal com a fiscalização automática sobre transações acima de R$ 5.000 via PIX. Em vez de buscar um ambiente mais produtivo e inovador, o governo se empenha em monitorar cada centavo que circula, tratando qualquer movimentação um pouco maior como suspeita. Quem ganha com isso? Certamente não é o cidadão honesto, nem a economia real.
E quem são os protagonistas dessa história? Os novos fiscais da Receita Federal, que assumem um papel tão irrelevante quanto o dos fiscais de Sarney. Um trabalho de baixo valor agregado, que não contribui para a criação de riqueza ou inovação. São apenas burocratas modernos, presos na mentalidade de que controlar e punir é mais importante do que fomentar o crescimento e a liberdade financeira.
A história já provou que o fiscalismo estatal é um modelo falido, seja tabelando preços ou perseguindo transações financeiras. Enquanto alguns criam, inovam e geram valor, outros se ocupam apenas de vigiar e tributar. O tempo sempre mostrou quem estava certo.
-
@ 1cb14ab3:95d52462
2025-01-08 18:11:43
Previous Works in the Series:
More from Hes:
All images are credit of Hes, but you are free to download and use for any purpose. If you find joy from these photos, please feel free to send a zap. Enjoy life on a Bitcoin standard.
-
@ ed84ce10:cccf4c2a
2025-01-08 12:33:06Hackathon Summary
The YQuantum 2024 Hackathon concluded with significant participation and numerous project submissions, establishing itself as a vibrant platform for innovation. Out of 300 registrants, the on-site participants formed teams and worked on developing 28 BUIDLs, engaging in challenges across diverse tracks sponsored by prominent quantum computing organizations, such as QuEra Computing, IBM Quantum, Classiq, DoraHacks, SandboxAQ, and Capgemini/The Hartford/Quantinuum.
Participants developed groundbreaking solutions in quantum computing, driven by prize incentives, including quantum cloud credits, internships, networking opportunities, and potential speaking engagements. The grand prizes recognized exceptional projects, with the first place receiving $2000, presentation opportunities before Yale researchers, and participation in the Yale Innovation Summit.
The hackathon successfully fostered a collaborative environment that encouraged the exploration of cutting-edge technologies and ideas, advancing the quantum computing field. YQuantum 2024 underscored the potential of quantum technologies and promoted knowledge exchange among participants and sponsors.
Hackathon Winners
Held on April 13, 2024, YQuantum's inaugural event attracted 300 participants from 10 countries, featuring six industry-sponsored challenges that culminated in a series of prestigious awards.
Institute Grand Prizes Winners
-
1st Place: Quantum Consortium: Case-Duke-Lehigh-Vandy Nexus This project employs adiabatic methods to prepare antiferromagnetic energy eigenstates, with a focus on quantum many-body scarring and enhancing error correction in computing.
-
2nd Place: Sparse Quantum State Preparation The team developed efficient algorithms using Classiq APIs for sparse quantum state preparation, optimizing execution for scalability and efficiency in managing quantum data.
-
3rd Place: QuBruin This project optimizes algorithms using dynamic quantum circuits and enhances error correction. The team improved user accessibility through Qiskit-based models for better circuit performance under noise conditions.
IBM Quantum Prize Winners
- Modified IBM Challenge
This project delves into foundational linear algebra concepts, emphasizing core principles and mastery.
QuEra Computing Prize Winners
- 3D Quantum Scars on 2D Tweezer Arrays
The team investigates quantum scar states on a 3D lattice projected into 2D, using Julia and QuEra's Bloqade to simulate quantum dynamics.
Classiq Technologies Prize Winners
- YQuantum2024 Classiq Team 34 Wavefunction Wizards
Focusing on optimizing sparse quantum state preparation, this project enhances algorithmic efficiency in quantum data processing.
DoraHacks Prize Winners
- Spooner_QRNG_Classifier
The project employs Python scripts and a gradient booster classifier to predict quantum device origins of random binary data, surpassing baseline prediction accuracy.
Capgemini // Quantinuum // The Hartford Prize Winners
-
Skittlez
This partnership addresses quantum computing challenges through interdisciplinary expertise, designing innovative quantum solutions. -
Honorable Mention: BB24 - Yale Quantum Monte Carlo The project enhances Quantum Monte Carlo techniques via novel sampling and encoding schemes, improving parallel processing and computational efficiency.
SandboxAQ Prize Winners
-
QuantumQuails
This project improves solar cell efficiency through quantum chemistry, utilizing VQE to model solar energy absorption for enhanced conversion effectiveness. -
Honorable Mention: mRNA Sequence Design via Quantum Approximate Optimization Algorithm This project optimizes mRNA sequence design using QAOA, enhancing protein expression and structural stability through codon and nucleotide parameters.
Explore all projects at DoraHacks.
About the Organizer:
YQuantum
YQuantum is a prominent entity within the technology and blockchain sectors, recognized for its innovative approach and strategic initiatives. Specializing in utilizing quantum computing capabilities, YQuantum is committed to advancing the technological frontier. Though specific projects are not highlighted, YQuantum's role in shaping industry standards positions it as a leader in the field. Through dedication to cutting-edge research and development, YQuantum continues to drive progress in quantum technologies, aligning with its mission to propel scientific and technological advancements globally.
-
-
@ d830ee7b:4e61cd62
2025-01-08 07:56:25การเผชิญหน้า (The Collision Point)
กลางปี 2017 ที่ร้านคราฟท์เบียร์เล็ก ๆ ในย่านเกาะเกร็ด นนทบุรี อากาศร้อนจนเครื่องปรับอากาศ (ที่ยังไม่มี) ในร้านทำงานหนักแทบไหม้ "แจ๊ก กู้ดเดย์" (Jakk Goodday) นั่งลงบนเก้าอี้ไม้ที่เจ้าของร้านกันไว้ให้เป็นประจำ ราวกับเขาเป็นลูกค้าขาประจำระดับวีไอพี
กลิ่นกาแฟคั่ว ลอยผสมกับไอความร้อนจากนอกหน้าต่าง (ผิดร้านหรือเปล่า?) เกิดเป็นบรรยากาศขมติดปลายลิ้นชวนให้คนจิบแล้วอยากถอนใจ
เขาเหลือบมองออกไปนอกหน้าต่าง.. เห็นแสงแดดแผดเผาราวกับมันรู้ว่าสงคราม Blocksize กำลังคุกรุ่นขึ้นอีกครั้ง
บรรยากาศนอกหน้าต่างกับใน ฟอรัม Bitcointalk ช่างเหมือนกันจนน่าขนลุก มันร้อนแรง ไร้ความปรานี
แจ๊กเปิดแล็ปท็อป กดเข้าเว็บฟอรัม พอเสียงแจ้งเตือน “—ติ๊ง” ดังขึ้น คิ้วของเขาก็ขมวดเล็กน้อย คล้ายได้กลิ่นดินปืนกลางสนามรบ
“โรเจอร์ แวร์ (Roger Ver) ไลฟ์เดือดลั่นเวที!” “ปีเตอร์ วูเล (Pieter Wuille) โต้กลับเรื่อง SegWit!” “Hard Fork ใกล้ถึงจุดปะทะแล้ว!”
แจ๊กคลิกเข้าไปในลิงก์ของไลฟ์ทันที เหมือนมือของเขาไม่ต้องการคำสั่งจากสมอง ความคุ้นเคยกับเหตุการณ์แบบนี้บอกเขาว่า นี่ไม่ใช่ดีเบตธรรมดา แต่มันอาจเปลี่ยนอนาคตของ Bitcoin ได้จริง ๆ
เห็นแค่พาดหัวสั้น ๆ แต่ความตึงเครียดก็ชัดเจนขึ้นเรื่อย ๆ ทุกข้อความเหมือนสุมไฟใส่ใจกองหนึ่งที่พร้อมระเบิดได้ทุกเมื่อ
โทรศัพท์ของแจ๊กดังพร้อมปรากฏชื่อ แชมป์ ‘PIGROCK’ ลอยขึ้นมา เขาหยิบขึ้นมารับทันที
“ว่าไงวะแชมป์… มีอะไรด่วนหรือเปล่า?” น้ำเสียงแจ๊กฟังดูเหมือนง่วง ๆ แต่จริง ๆ เขาพร้อมจะลุกมาวิเคราะห์สถานการณ์ให้ฟังทุกเมื่อ
“พี่แจ๊ก.. ผมอ่านดีเบตเรื่อง SegWit ในฟอรัมอยู่ครับ บางคนด่าว่ามันไม่ได้แก้ปัญหาจริง ๆ บ้างก็บอกถ้าเพิ่ม Blocksize ไปเลยจะง่ายกว่า... ผมเลยสงสัยว่า Hard Fork ที่เค้าพูดถึงกันนี่คืออะไร ใครคิดอะไรก็ Fork กันได้ง่าย ๆ เลยเหรอ"
"แล้วถ้า Fork ไปหลายสาย สุดท้ายเหรียญไหนจะเป็น ‘Bitcoin ที่แท้จริง’ ล่ะพี่?”
“แล้วการ Fork มันส่งผลกับนักลงทุนยังไงครับ? คนทั่วไปอย่างผมควรถือไว้หรือขายหนีตายดีล่ะเนี่ย?”
แจ๊กยิ้มมุมปาก ชอบใจที่น้องถามจี้จุด
“เอางี้… การ Fork มันเหมือนแบ่งถนนออกเป็นสองสาย ใครชอบกติกาเก่าก็วิ่งถนนเส้นเก่า ใครอยากแก้กติกาใหม่ก็ไปถนนเส้นใหม่"
"แต่ประเด็นคือ... นี่ไม่ใช่เรื่องเล็ก ๆ เพราะมีผลต่ออัตลักษณ์ของ Bitcoin ทั้งหมดเลยนะมึง—ใครจะยอมปล่อยผ่านง่าย ๆ”
"คิดดูสิ ถ้าครั้งนี้พวกเขา Fork จริง มันอาจไม่ได้เปลี่ยนแค่เครือข่าย แต่เปลี่ยนวิธีที่คนมอง Bitcoin ไปตลอดกาลเลยนะ"
"แล้วใครมันจะอยากลงทุนในระบบที่แตกแยกซ้ำแล้วซ้ำเล่าวะ?"
“งั้นหมายความว่าตอนนี้ก็มีสองแนวใหญ่ ๆ ชัวร์ใช่ไหมครับ?” แชมป์ถามต่อ
“ฝั่ง โรเจอร์ แวร์ ที่บอกว่าต้องเพิ่ม Blocksize ให้ใหญ่จุใจ กับฝั่งทีม Core อย่าง ปีเตอร์ วูเล ที่ยืนยันต้องใช้ SegWit ทำให้บล็อกเบา ไม่กระทบการกระจายอำนาจ?”
“ใช่เลย” แจ๊กจิบกาแฟดำเข้ม ๆ ผสมน้ำผึ้งไปหนึ่งอึก
“โรเจอร์นี่เขาเชื่อว่า Bitcoin ต้องเป็นเงินสดดิจิทัลที่ใช้จ่ายไว ค่าธรรมเนียมไม่แพง ส่วนปีเตอร์กับ Bitcoin Core มองว่าการเพิ่มบล็อกเยอะ ๆ มันจะไปฆ่า Node รายย่อย คนไม่มีทุนก็รัน Node ไม่ไหว สุดท้าย Bitcoin จะกลายเป็นระบบกึ่งรวมศูนย์ ซึ่งมันผิดหลักการเดิมของ ซาโตชิ ไงล่ะ”
“ฟังแล้วก็ไม่ใช่เรื่องง่ายนะพี่… งั้นที่ผมได้ยินว่า จิฮั่น อู๋ (Jihan Wu) เจ้าของ Bitmain ที่ถือ Hashrate เกินครึ่งนี่ก็มาอยู่ฝั่งเดียวกับโรเจอร์ใช่ไหม?"
"เพราะยิ่งบล็อกใหญ่ ค่าธรรมเนียมยิ่งเพิ่ม นักขุดก็ได้กำไรสูงขึ้นใช่ป่ะ?”
“ไอ้เรื่องกำไรก็ส่วนหนึ่ง...” แจ๊กถอนหายใจ
“แต่ที่สำคัญกว่านั้นคืออำนาจต่อรอง… ตอนประชุมลับที่ฮ่องกงเมื่อปีที่แล้ว พี่เองก็ถูกชวนให้เข้าไปในฐานะคนกลาง เลยเห็นภาพน่าขนลุกอยู่หน่อย ๆ"
"จิฮั่นนั่งไขว่ห้างด้วยสีหน้ามั่นใจมาก ด้วย Hashrate ราว 60% ของโลก สั่งซ้ายหันขวาหันเหมือนเป็นแม่ทัพใหญ่ได้เลย พอโรเจอร์ก็ไฟแรงอยู่แล้ว อยากให้ Bitcoin ครองโลกด้วยวิธีของเขา สองคนนี่จับมือกันทีจะเขย่าชุมชน Bitcoin ได้ทั้งกระดาน”
"พี่รู้สึกเหมือนนั่งอยู่ในศึกชิงบัลลังก์ยุคใหม่ คนหนึ่งยึดพลังขุด คนหนึ่งยึดความศรัทธาในชื่อ Bitcoin แต่สิ่งที่พี่สงสัยในตอนนั้นคือ… พวกเขาสู้เพื่อใครกันแน่?"
แชมป์เงียบไปครู่เหมือนกำลังประมวลผล “แล้วตอนนั้นพี่คิดยังไงบ้างครับ? รู้สึกกลัวหรือว่ายังไง?”
“จะไม่กลัวได้ไง!” แจ๊กหัวเราะแห้ง ๆ แวบหนึ่งก็นึกถึงสีหน้าที่ยิ้มเยาะของทั้งคู่ตอนประกาศความพร้อมจะ Fork
“พี่อดคิดไม่ได้ว่าถ้า Core ยังไม่ยอมขยายบล็อก พวกนั้นจะลากนักขุดทั้งกองทัพแฮชเรตไปทำเครือข่ายใหม่ให้เป็น ‘Bitcoin สายใหญ่’ แล้วทิ้งเครือข่ายเดิมให้ซวนเซ"
"แค่คิดก็นึกถึงสงครามกลางเมืองในหนังประวัติศาสตร์แล้วน่ะ.. แตกเป็นสองฝ่าย สุดท้ายใครแพ้ใครชนะ ไม่มีใครทำนายได้จริง ๆ”
พูดจบ.. เขาเปิดฟอรัมดูไลฟ์ดีเบตจากงานในปี 2017 ต่อ โรเจอร์ แวร์ กำลังพูดในโทนร้อนแรง
“Bitcoin ไม่ใช่ของคนรวย! ถ้าคุณไม่เพิ่ม Blocksize คุณก็ทำให้ค่าธรรมเนียมพุ่งจนคนธรรมดาใช้ไม่ได้!”
ขณะเดียวกัน ปีเตอร์ วูเล่ ยืนอยู่ฝั่งตรงข้าม สีหน้าเยือกเย็นราวกับตั้งรับมานาน “การเพิ่มบล็อกคือการทำลายโครงสร้าง Node รายย่อยในระยะยาว แล้วมันจะยังเรียกว่ากระจายอำนาจได้หรือ?”
"ถ้าคุณอยากให้ Bitcoin เป็นของคนรวยเพียงไม่กี่คน ก็เชิญขยายบล็อกไปเถอะนะ แต่ถ้าอยากให้มันเป็นระบบที่คนทุกระดับมีส่วนร่วมจริง ๆ ..คุณต้องฟังเสียง Node รายเล็กด้วย" ปีเตอร์กล่าว
เสียงผู้คนในงานโห่ฮากันอย่างแตกเป็นสองฝ่าย บ้างก็เชียร์ความตรงไปตรงมาของโรเจอร์ บ้างก็เคารพเหตุผลเชิงเทคนิคของปีเตอร์
ข้อความจำนวนมหาศาลในฟอรัมต่างโหมกระพือไปต่าง ๆ นานา มีทั้งคำด่าหยาบคายจนแจ๊กต้องเบือนหน้า ตลอดจนการวิเคราะห์ลึก ๆ ถึงอนาคตของ Bitcoin ที่อาจไม่เหมือนเดิม
ในระหว่างนั้น.. แชมป์ส่งข้อความ Discord กลับมาอีก
“พี่ ถ้า Fork จริง ราคาจะป่วนแค่ไหน? ที่เขาว่าคนถือ BTC จะได้เหรียญใหม่ฟรี ๆ จริงไหม? ผมกลัวว่าถ้าเกิดแบ่งเครือข่ายไม่รู้กี่สาย ตลาดอาจมั่วจนคนหายหมดก็ได้ ใช่ไหมครับ?”
"แล้วถ้าเครือข่ายใหม่ล้มเหลวล่ะครับ? จะส่งผลอะไรต่อชุมชน Bitcoin เดิม?"
"ไอ้แชมป์มึงถามรัวจังวะ!?" แจ๊กสบถเพราะเริ่มตั้งรับไม่ทัน
“ก็ขึ้นกับตลาดจะเชื่อว่าสายไหนเป็น ‘ของจริง’ อีกนั่นแหละ” แจ๊กพิมพ์กลับ
“บางคนถือไว้เผื่อได้เหรียญใหม่ฟรี บางคนขายหนีตายก่อน"
"พี่เองก็ยังไม่กล้าการันตีเลย แต่ที่แน่ ๆ สงครามนี้ไม่ได้มีแค่ผลกำไร มันกระทบศรัทธาของชุมชน Bitcoin ทั้งหมดด้วย"
"ถ้าชาวเน็ตเลิกเชื่อมั่น หรือคนนอกมองว่าพวกเราทะเลาะกันเองเหมือนเด็กแย่งของเล่น ต่อให้ฝั่งไหนชนะ ก็อาจไม่มีผู้ใช้เหลือให้ฉลอง”
แล้วสายตาแจ๊กก็ปะทะกับกระทู้ใหม่ที่เด้งขึ้นมาบนหน้าฟอรัม
“โรเจอร์ แวร์ ประกาศ: ถ้าไม่เพิ่ม Blocksize เราจะฟอร์กเป็น Bitcoin ที่แท้จริง!”
ตัวหนังสือหนาแปะอยู่ตรงนั้นส่งแรงสั่นสะเทือนราวกับจะดึงคนในวงการให้ต้องเลือกข้างกันแบบไม่อาจกลับหลังได้
แจ๊กเอื้อมมือปิดแล็ปท็อปช้า ๆ คล้ายยอมรับความจริงว่าหนทางประนีประนอมอาจไม่มีอีกแล้ว..
“สงครามนี่คงใกล้ระเบิดเต็มทีล่ะนะ” เขาลุกจากเก้าอี้ สะพายเป้ พึมพำกับตัวเองขณะมองกาแฟดำที่เหลือครึ่งแก้ว “ถ้าพวกเขาฟอร์กจริง โลกคริปโตฯ ที่เราเคยรู้จักอาจไม่มีวันเหมือนเดิมอีกต่อไป”
เขามองออกไปนอกหน้าต่าง แสงแดดที่แผดเผาราวกับกำลังบอกว่า.. อนาคตของ Bitcoin อยู่ในจุดที่เส้นแบ่งระหว่างชัยชนะกับความล่มสลายเริ่มพร่าเลือน... และอาจไม่มีทางย้อนกลับ
ก่อนเดินออกจากร้าน เขากดส่งข้อความสั้น ๆ ถึงแชมป์
“เตรียมใจกับความปั่นป่วนไว้ให้ดี ไม่แน่ว่าเราอาจจะได้เห็น Bitcoin แตกเป็นหลายสาย.. ใครจะอยู่ใครจะไปไม่รู้เหมือนกัน แต่เรื่องนี้คงไม่จบง่าย ๆ แน่”
แจ๊กผลักประตูออกไปพบกับแดดจัดที่เหมือนแผดเผากว่าเดิม พายุร้อนไม่ได้มาแค่ในรูปความร้อนกลางกรุง แต่มาในรูป “สงคราม Blocksize” ที่พร้อมจะฉีกชุมชนคริปโตออกเป็นฝักฝ่าย และอาจลามบานปลายจนกลายเป็นศึกประวัติศาสตร์
ทว่าสิ่งที่ค้างคาใจกลับเป็นคำถามนั้น…
เมื่อเครือข่ายแบ่งเป็นหลายสายแล้ว เหรียญไหนจะเป็น Bitcoin จริง?
หรือบางที... ในโลกที่ใครก็ Fork ได้ตามใจ เราจะไม่มีวันได้เห็น “Bitcoin หนึ่งเดียว” อีกต่อไป?
คำถามที่ไม่มีใครตอบได้ชัดนี้ส่องประกายอยู่ตรงปลายทาง ราวกับป้ายเตือนว่า “อันตรายข้างหน้า” และคนในชุมชนทั้งหมดกำลังจะต้องเผชิญ…
โดยไม่มีใครมั่นใจเลยว่าจะรอด หรือจะแตกสลายไปก่อนกันแน่...
สองเส้นทาง (The Forked Path)
กลางปี 2017 ท้องฟ้าเหนือบุรีรัมย์ยังคงคุกรุ่นด้วยไอแดดและความร้อนแรงของสงคราม Blocksize แจ๊ก กู้ดเดย์ ก้าวเข้ามาในคาเฟ่เล็ก ๆ แห่งหนึ่งในย่านเทศบาลด้วยสีหน้าครุ่นคิด เขาพยายามมองหามุมสงบสำหรับนั่งตั้งหลักในโลกความเป็นจริง ก่อนจะจมดิ่งสู่สงครามในโลกดิจิทัลบนฟอรัม Bitcointalk อีกครั้ง
กลิ่นกาแฟคั่วเข้มลอยกระทบจมูก แจ๊กสั่งกาแฟดำแก้วโปรดแล้วปลีกตัวมาที่โต๊ะริมกระจก กระจกบานนั้นสะท้อนแสงอาทิตย์จัดจ้า ราวกับจะบอกว่าวันนี้คงไม่มีใครหนีความร้อนที่กำลังแผดเผา ทั้งในอากาศและในชุมชน Bitcoin ได้พ้น
เขาเปิดแล็ปท็อปขึ้น ล็อกอินเข้า Bitcointalk.org ตามเคย ข้อความและกระทู้มากมายกระหน่ำแจ้งเตือน ไม่ต่างอะไรจากสมรภูมิคำพูดที่ไม่มีวันหลับ “Hong Kong Agreement ล้มเหลวจริงหรือ?” “UASF คือปฏิวัติโดย Node?” เหล่านี้ล้วนสะท้อนความไม่แน่นอนในชุมชน Bitcoin ที่ตอนนี้ ดูคล้ายจะถึงจุดแตกหักเต็มที...
“ทั้งที่ตอนนั้นเราก็พยายามกันแทบตาย…” แจ๊กพึมพำ มองจอด้วยสายตาเหนื่อยใจพร้อมภาพความทรงจำย้อนกลับเข้าในหัว เขายังจำการประชุมที่ฮ่องกงเมื่อต้นปี 2016 ได้แม่น ยามนั้นความหวังในการประนีประนอมระหว่าง Big Block และ Small Block ดูเป็นไปได้ หากแต่กลายเป็นละครฉากใหญ่ที่จบลงโดยไม่มีใครยอมถอย...
...การประชุม Hong Kong Agreement (2016)
ภายในห้องประชุมหรูของโรงแรมใจกลางย่านธุรกิจฮ่องกง บรรยากาศตึงเครียดยิ่งกว่าการเจรจาสงบศึกในสมัยโบราณ
โรเจอร์ แวร์ ยืนเสนอว่า “การเพิ่ม Blocksize สำคัญต่ออนาคตของ Bitcoin — เราอยากให้คนทั่วไปเข้าถึงได้โดยไม่ต้องจ่ายค่าธรรมเนียมแพง ๆ”
“จิฮั่น อู๋ (Jihan Wu)” จาก Bitmain นั่งฝั่งเดียวกับโรเจอร์ คอยเสริมว่าการเพิ่มบล็อกคือโอกาสสำหรับนักขุด และหากทีม Core ไม่ยอม พวกเขาก็พร้อม “ดัน Fork” ขึ้นได้ทุกเมื่อ ด้วย Hashrate มหาศาลที่พวกเขาคุมไว้
ฝั่ง ปีเตอร์ วูเล (Pieter Wuille) กับ เกร็ก แมกซ์เวลล์ (Greg Maxwell) จาก Bitcoin Core เถียงกลับอย่างใจเย็นว่า “การขยายบล็อกอาจดึงดูดทุนใหญ่ ๆ แล้วไล่ Node รายย่อยออกไป ชุมชนอาจไม่เหลือความกระจายอำนาจอย่างที่ Satoshi ตั้งใจ”
สุดท้าย บทสรุปที่เรียกว่า Hong Kong Agreement ลงนามได้ก็จริง แต่มันกลับเป็นแค่ลายเซ็นบนกระดาษที่ไม่มีฝ่ายไหนเชื่อใจใคร
แจ๊กเบือนสายตาออกนอกหน้าต่าง สังเกตเห็นผู้คนเดินขวักไขว่ บ้างก็ดูรีบร้อน บ้างเดินทอดน่องเหมือนว่างเปล่า นี่คงไม่ต่างอะไรกับชาวเน็ตในฟอรัมที่แบ่งฝ่ายกันใน “สงคราม Blocksize” อย่างไม่มีทีท่าจะหยุด
แค่ไม่กี่นาที... เสียงโทรศัพท์ก็ดังขึ้น ชื่อ แชมป์ ‘PIGROCK’ โชว์หราเต็มจออีกครั้ง
“ว่าไงเจ้าแชมป์?” แจ๊กกรอกเสียงในสายด้วยอารมณ์เหนื่อย ๆ ทว่าพร้อมจะอธิบายเหตุการณ์ตามสไตล์คนที่ชอบครุ่นคิด
“พี่แจ๊ก.. ผมเข้าใจแล้วว่าการประชุมฮ่องกงมันล้มเหลว ตอนนี้ก็มีคนแยกเป็นสองขั้ว Big Block กับ SegWit แต่ผมเจออีกกลุ่มในฟอรัมเรียกว่า UASF (User-Activated Soft Fork) ที่เหมือนจะกดดันพวกนักขุดให้ยอมรับ SegWit..."
"อยากรู้ว่าตกลง UASF มันสำคัญยังไงครับ? ทำไมใคร ๆ ถึงเรียกว่าเป็น การปฏิวัติโดย Node กัน?”
แจ๊กอมยิ้มก่อนจะวางแก้วกาแฟลง พูดด้วยน้ำเสียงจริงจังกว่าเดิม “UASF น่ะหรือ? มันเปรียบได้กับการที่ ‘ชาวนา’ หรือ ‘ประชาชนตัวเล็ก ๆ’ ออกมาประกาศว่า ‘ฉันจะไม่รับบล็อกของนักขุดที่ไม่รองรับ SegWit นะ ถ้าแกไม่ทำตาม ฉันก็จะตัดบล็อกแกทิ้ง!’ เสมือนเป็นการปฏิวัติที่บอกว่าแรงขุดมากแค่ไหนก็ไม่สำคัญ ถ้าคนรัน Node ไม่ยอม… เชนก็เดินต่อไม่ได้”
“โห… ฟังดูแรงจริง ๆ พี่ แล้วถ้านักขุดไม่ร่วมมือ UASF จะเกิดอะไรขึ้น?” แชมป์ถามต่อเสียงสั่นนิด ๆ
“ก็อาจเกิด ‘Chain Split’ ยังไงล่ะ"
"แยกเครือข่ายเป็นสองสาย สุดท้ายเครือข่ายเดิม กับเครือข่ายใหม่ที่รองรับ SegWit ไม่ตรงกัน คนอาจสับสนหนักยิ่งกว่า Hard Fork ปกติด้วยซ้ำ"
"แต่นั่นแหละ... มันแสดงพลังว่าผู้ใช้ทั่วไปก็มีสิทธิ์กำหนดทิศทาง Bitcoin ไม่ได้น้อยไปกว่านักขุดเลย”
“เข้าใจแล้วครับพี่… เหมือน การปฏิวัติโดยประชาชนตาดำ ๆ ที่จับมือกันค้านอำนาจทุนใหญ่ใช่ไหม?” แชมป์หยุดครู่หนึ่ง “ผมเคยคิดว่า Node รายย่อยน้อยรายจะไปสู้อะไรไหว แต่ตอนนี้ดูท่าจะเปลี่ยนเกมได้จริงว่ะพี่…”
“ใช่เลย” แจ๊กตอบ
“นี่เป็นความพิเศษของ Bitcoin ที่บอกว่า ‘เราคุมเครือข่ายร่วมกัน’ แม้แต่ Bitmain ที่มี Hashrate มากกว่า 50% ก็หนาวได้ถ้าผู้ใช้หรือ Node รายย่อยรวมพลังกันมากพอ”
แชมป์ฟังด้วยความตื่นเต้นปนกังวล “แล้วแบบนี้ เรื่อง SegWit กับ Blocksize จะจบยังไงครับ? เห็นข่าวว่าถ้านักขุดโดนกดดันมาก ๆ คนอย่าง จิฮั่น อู๋ อาจออกไปสนับสนุน Bitcoin Cash ที่จะเปิดบล็อกใหญ่”
แจ๊กเลื่อนดูฟีดข่าวในฟอรัม Bitcointalk อีกครั้ง ก็เห็นพาดหัวชัด ๆ
“Bitmain ประกาศกร้าวพร้อมหนุน BCH เต็มพิกัด!”
เขาถอนหายใจเฮือกหนึ่ง “ก็ใกล้เป็นจริงแล้วล่ะ… โรเจอร์ แวร์ เองก็ผลักดัน BCH ว่าคือ Bitcoin แท้ที่ค่าธรรมเนียมถูก ใช้งานได้จริง ส่วนฝั่ง BTC ที่ยึดเอา SegWit เป็นหลัก ก็ไม่ยอมให้ Blocksize เพิ่มใหญ่เกินจำเป็น.."
"ต่างคนต่างมีเหตุผล... แต่อุดมการณ์นี่คนละทางเลย”
“แล้วพี่คิดว่าใครจะเป็นฝ่ายชนะครับ?”
“เฮ้ย.. มึงถามยากไปหรือเปล่า” แจ๊กหัวเราะหึ ๆ “ทุกคนมีโอกาสได้หมด และก็มีโอกาสพังหมดเหมือนกัน ถ้า UASF กดดันนักขุดให้อยู่กับ Core ได้ พวกเขาอาจยอมแพ้ แต่ถ้า Bitmain เทใจไป BCH นักขุดรายใหญ่คนอื่น ๆ ก็คงตาม"
"แล้วถ้าฝั่ง BCH เริ่มได้เปรียบ... อาจดึงคนไปเรื่อย ๆ สุดท้ายจะเหลือไหมล่ะฝั่ง SegWit ตัวจริง?”
“งั้น Node รายย่อยจะยืนอยู่ตรงไหนล่ะครับพี่?” แชมป์ถามอย่างหนักใจ
“Node รายย่อยและชุมชนผู้ใช้นี่แหละ คือ ตัวแปรชี้ขาด ทุกวันนี้คนกลุ่ม UASF พยายามโชว์พลังว่าตัวเองมีสิทธิ์ตั้งกติกาเหมือนกัน ไม่ใช่แค่นักขุด"
"อย่างที่บอก.. มันคือการ ‘ลุกขึ้นปฏิวัติ’ โดยชาวนา ต่อสู้กับเจ้าที่ที่ถือ ‘แฮชเรต’ เป็นอาวุธ”
แจ๊กตบบ่าตัวเองเบา ๆ ก่อนจะหัวเราะเล็กน้อย
“นี่แหละความมันของ Bitcoin ไม่มีเจ้าไหนสั่งได้เบ็ดเสร็จจริง ๆ ทุกฝั่งต่างถือไพ่คนละใบ สงครามยังไม่รู้จะจบยังไง ถึงอย่างนั้นมันก็สะท้อนวิญญาณ ‘decentralization’ ที่แท้จริง กล้ายอมรับสิทธิ์ทุกฝ่ายเพื่อแข่งขันกันตามกติกา”
จู่ ๆ ในหน้าฟอรัมก็มีกระทู้ใหม่เด้งเด่น “Bitmain หนุน Bitcoin Cash ด้วย Hashrate กว่า 50%! สงครามเริ่มแล้ว?” ข้อความนั้นดังโครมครามเหมือนระเบิดลงกลางวง
แจ๊กนิ่งไปชั่วขณะ สัมผัสได้ถึงความปั่นป่วนที่กำลังปะทุขึ้นอีกครั้ง เหงื่อบางเบาซึมบนหน้าผากแม้อากาศในคาเฟ่จะเย็นฉ่ำ เขาหันมองโทรศัพท์ที่ยังค้างสายกับแชมป์ แล้วเอ่ยด้วยน้ำเสียงจริงจัง
“นี่ล่ะ.. จุดเริ่มของสองเส้นทางอย่างชัดเจน… บล็อกใหญ่จะไปกับ BCH ส่วน SegWit ก็อยู่กับ BTC แน่นอนว่าทั้งสองฝ่ายไม่คิดถอยง่าย ๆ นักขุดจะเลือกข้างไหน? Node รายย่อยจะยอมใคร?"
"เมื่อสงครามครั้งนี้นำไปสู่การแบ่งเครือข่าย ใครกันแน่จะเป็นผู้ชนะตัวจริง? หรืออาจไม่มีผู้ชนะเลยก็เป็นได้”
ปลายสายเงียบงัน มีแต่เสียงหายใจของแชมป์ที่สะท้อนความกังวลปนอยากรู้อย่างแรง
“พี่… สุดท้ายแล้วเรากำลังยืนอยู่บนรอยแยกที่พร้อมจะฉีกทุกอย่างออกเป็นชิ้น ๆ ใช่ไหมครับ?”
“อาจจะใช่ก็ได้... หรือถ้ามองอีกมุม อาจเป็นวัฏจักรที่ Bitcoin ต้องเจอเป็นระยะ ทุกคนมีสิทธิ์ Fork ได้ตามใจใช่ไหมล่ะ? ก็ขอให้โลกได้เห็นกันว่าชุมชนไหนแน่จริง” แจ๊กพูดทิ้งท้ายก่อนจะแย้มยิ้มเจือรอยอ่อนล้า
ภาพบนจอคอมพิวเตอร์ฉายกระทู้ถกเถียงกันไม่หยุด ประหนึ่งเวทีดีเบตที่ไม่มีวันปิดไฟ แจ๊กจิบกาแฟอึกสุดท้ายเหมือนจะเตรียมพร้อมใจก่อนเข้าสู่สนามรบครั้งใหม่ สงครามยังไม่จบ.. ซ้ำยังดูหนักข้อยิ่งขึ้นเรื่อย ๆ
เขาลุกขึ้นจากโต๊ะ ชำเลืองมองแสงแดดจัดจ้าที่สาดลงมาไม่หยุด เปรียบเหมือนไฟแห่งข้อขัดแย้งที่เผาผลาญทั้งชุมชน Bitcoin ไม่ว่าใครจะเลือกอยู่ฝั่งไหน กลุ่ม UASF, กลุ่ม Big Block, หรือ กลุ่ม SegWit ทางเดินข้างหน้าล้วนเต็มไปด้วยความไม่แน่นอน
“สุดท้ายแล้ว… เมื่อกระดานแบ่งเป็นสองเส้นทางอย่างเด่นชัด สงคราม Blocksize จะจบลงด้วยใครได้บทผู้ชนะ?"
"หรือบางที… มันอาจไม่มีผู้ชนะที่แท้จริงในระบบที่ใครก็ Fork ได้ตลอดเวลา”
คำถามนี้ลอยติดค้างอยู่ในบรรยากาศยามบ่ายที่ร้อนระอุ ชวนให้ใครก็ตามที่จับตาดูสงคราม Blocksize ต้องฉุกคิด
เมื่อไม่มีใครเป็นเจ้าของ Bitcoin อย่างสมบูรณ์ ทุกคนจึงมีสิทธิ์บงการและเสี่ยงต่อการแตกแยกได้ทุกเมื่อ แล้วท้ายที่สุด ชัยชนะ–ความพ่ายแพ้ อาจไม่ใช่จุดสิ้นสุดของโลกคริปโตฯ
แต่เป็นเพียงจุดเริ่มต้นของการวิวัฒน์ที่ไม่มีวันจบสิ้น…
เมาท์แถมเรื่อง UASF (User-Activated Soft Fork)
นี่สนามรบยุคกลางที่ดูเหมือนในหนังแฟนตาซี ทุกคนมีดาบ มีโล่ แต่จู่ ๆ คนตัวเล็กที่เราไม่เคยสังเกต—พวกชาวนา ช่างไม้ คนแบกน้ำ—กลับรวมตัวกันยกดาบบุกวังเจ้าเมือง พร้อมตะโกนว่า “พอเถอะ! เราก็มีสิทธิ์เหมือนกัน!”
มันอาจจะดูเวอร์ ๆ หน่อยใช่ไหมครับ?
แต่ในโลก Bitcoin ปี 2017 นี่คือสิ่งที่เกิดขึ้นในรูปแบบ “User-Activated Soft Fork” หรือ UASF การปฏิวัติด้วยพลังโหนด ซึ่งทำให้นักขุดยักษ์ใหญ่ตัวสั่นงันงกันมาแล้ว!
แล้ว UASF มันคืออะไรล่ะ?
“User-Activated Soft Fork” หรือเรียกย่อ ๆ ว่า “UASF” ไม่ใช่อัปเกรดซอฟต์แวร์สวย ๆ แต่เป็น “ดาบเล่มใหม่” ที่คนตัวเล็ก—หมายถึง โหนด รายย่อย—ใช้ต่อรองกับนักขุดรายใหญ่ โดยกติกาคือ.. ถ้านักขุดไม่ทำตาม (เช่น ไม่รองรับ SegWit) โหนดก็จะปฏิเสธบล็อกของพวกเขาอย่างไม่เกรงใจใคร
สมมุติว่าคุณคือโหนด..
คุณรันซอฟต์แวร์ Bitcoin คอยตรวจสอบธุรกรรม วันดีคืนดี คุณประกาศ “ต่อไปถ้าใครไม่รองรับ SegWit ฉันไม่ยอมรับบล็อกนะ!” นี่ล่ะครับ “UASF” ตัวเป็น ๆ
คำขวัญสุดฮิตของ UASF
“No SegWit, No Block”
หรือแปลว่าถ้าบล็อกไม่รองรับ SegWit ก็เชิญออกไปเลยจ้า..
มันเหมือนการที่ชาวนาโผล่มาตบโต๊ะอาหารท่านขุนว่า “นายใหญ่จะปลูกอะไรก็ปลูกไป แต่ไม่งั้นฉันไม่รับผลผลิตนายนะ!”
ความเชื่อมโยงกับ BIP 148
ถ้าจะพูดถึง UASF ต้องรู้จัก BIP 148 ไว้นิดนึง มันเปรียบเหมือน “ธงปฏิวัติ” ที่ตีตราว่าวันที่ 1 สิงหาคม 2017 คือเส้นตาย!
BIP 148 บอกไว้ว่า.. ถ้าถึงวันนั้นแล้วยังมีนักขุดหน้าไหนไม่รองรับ SegWit บล็อกที่ขุดออกมาก็จะถูกโหนดที่ใช้ UASF “แบน” หมด
ผลลัพธ์ที่ตั้งใจ นักขุดไม่อยากโดนแบนก็ต้องทำตาม UASF กล่าวคือ “นายต้องรองรับ SegWit นะ ไม่งั้นอด!”
หลายคนกลัวกันว่า “อ้าว ถ้านักขุดใหญ่ ๆ ไม่ยอมแล้วหันไปขุดสายอื่น จะไม่กลายเป็นแยกเครือข่าย (Chain Split) หรือ?”
ใช่ครับ.. มันอาจเกิดสงครามสายใหม่ทันทีไงล่ะ
ทำไม UASF ถึงสำคัญ?
ย้อนกลับไปก่อนปี 2017 Bitcoin มีปัญหาโลกแตกทั้งค่าธรรมเนียมแพง ธุรกรรมหน่วง บวกกับความขัดแย้งเรื่อง “จะเพิ่ม Blocksize ดีไหม?” ทางกลุ่มนักขุดรายใหญ่ (นำโดย Bitmain, Roger Ver ฯลฯ) รู้สึกว่า “SegWit ไม่ใช่ทางออกที่แท้จริง” แต่อีกฝั่ง (ทีม Core) ชี้ว่า “Blocksize ใหญ่มากไปจะรวมศูนย์นะ โหนดรายย่อยตายหมด”
UASF เลยโผล่มา เหมือนชาวนาตะโกนว่า
“หุบปากได้แล้วไอ้พวกที่สู้กัน! ถ้าพวกแกไม่รองรับ SegWit พวกข้า (โหนด) ก็จะไม่เอาบล็อกแก”
สาระก็คือ.. มันคือตัวบ่งชี้ว่าคนตัวเล็กอย่างโหนดรายย่อยก็มีพลังต่อรอง เป็นกลไกที่ดึงอำนาจจากมือทุนใหญ่กลับสู่มือชุมชน (Decentralization ที่แท้ทรู)
วิธีการทำงานของ UASF
ลองจินตนาการตาม..
-
การกำหนดเส้นตาย BIP 148 ประกาศไว้ “ถึงวันที่ 1 สิงหาคม 2017 ถ้านายยังไม่รองรับ SegWit โหนด UASF จะไม่รับบล็อกนาย”
-
ถ้าคุณเป็นนักขุด… คุณขุดบล็อกออกมา แต่ไม่ได้ตีธง “ฉันรองรับ SegWit” UASF โหนดเห็นปุ๊บ พวกเขาจะจับโยนทิ้งไปเลย
-
ผลกระทบ? นักขุดที่ไม่ยอมทำตามจะเจอปัญหา บล็อกที่ขุดออกมาไม่มีใครรับ—เสียแรงขุดฟรี
อาจเกิด Chain Split คือ แยกเครือข่ายเลย ถ้านักขุดเหล่านั้นไปตั้งสายใหม่
ความสำเร็จและความท้าทายของ UASF
ความสำเร็จ.. หลังการรวมพลังผู้ใช้ โหนดรายย่อยกดดันนักขุดได้ไม่น้อย จนกระทั่ง SegWit เปิดใช้งานจริงใน Bitcoin วันที่ 24 สิงหาคม 2017 ช่วยให้ธุรกรรมเร็วขึ้น แก้ Transaction Malleability และเปิดทางสู่ Lightning Network ในอนาคต
ความท้าทาย.. นักขุดบางค่ายไม่โอเค.. โดยเฉพาะ Bitmain ซึ่งคาดว่าจะสูญรายได้บางส่วน ก็นำไปสู่การสนับสนุน “Bitcoin Cash (BCH)” แยกสาย (Hard Fork) ของตัวเองตั้งแต่วันที่ 1 สิงหาคม 2017 นั่นเอง
ว่าแล้วก็เปรียบง่าย ๆ
UASF เหมือนปฏิบัติการยึดคฤหาสน์เจ้าเมืองมาเปิดให้ชาวบ้านเข้าอยู่ฟรี.. แต่อีกฝ่ายบอก
“งั้นฉันออกไปตั้งคฤหาสน์ใหม่ดีกว่า!”
บทเรียนสำคัญ UASF เป็นตัวอย่างชัดว่า “ผู้ใช้” หรือ โหนดรายย่อย สามารถสร้างแรงกดดันให้นักขุดต้องยอมเปลี่ยนได้จริง ๆ ไม่ใช่แค่ยอมรับเงื่อนไขที่ขุดกันมา
ผลกระทบระยะยาวหลังจากนั้นล่ะ?
SegWit ถูกใช้งาน ทำให้ค่าธรรมเนียมธุรกรรมลดลง (ช่วงหนึ่ง) เกิด Lightning Network เป็น Layer 2 สุเฟี้ยวของ Bitcoin เกิด BCH (Bitcoin Cash) เป็นสายแยกที่อ้างว่า Blocksize ใหญ่คือทางออก
สรุปแล้ว UASF ทำให้โลกได้รู้ว่า..
Bitcoin ไม่ใช่ของนักขุด หรือของฝ่ายพัฒนาใดฝ่ายเดียว แต่มันเป็นของทุกคน!
“Bitcoin เป็นของทุกคน”
ไม่มีใครมีอำนาจเบ็ดเสร็จ ไม่ว่าคุณจะถือ Hashrate มากแค่ไหน ถ้า Node ทั่วโลกไม่เอา ก็จบ!
“แรงขุดใหญ่แค่ไหน ก็แพ้ใจมวลชน!”
(น่าจะมีตอนต่อไปนะ.. ถ้าชอบก็ Zap โหด ๆ เป็นกำลังใจให้ด้วยนะครับ)
-
-
@ 4462bda4:a6b29667
2025-01-07 23:30:37In recent years, the world has witnessed a surge in the adoption of decentralized technologies, driven by a growing need for privacy, autonomy, and censorship resistance. At the forefront of this movement are Bitcoin and Nostr, two transformative innovations that are reshaping how we perceive finance and communication, respectively.
What is Nostr? Nostr (Notes and Other Stuff Transmitted by Relays) is an open protocol designed to create a censorship-resistant, decentralized social network. Unlike traditional social media platforms, which rely on centralized servers controlled by corporations, Nostr operates on a peer-to-peer network where users own their data. It enables the creation of simple yet robust communication systems without reliance on centralized entities.
The protocol is designed to be minimalistic, making it easy to integrate with various applications. Users publish messages (or "notes") signed with their private keys, and these messages are distributed via relays. This model ensures that no single entity can control the flow of information, offering a solution to the issues of censorship and privacy invasion prevalent on centralized platforms.
Bitcoin and Nostr: A Natural Synergy Bitcoin, the world's first decentralized cryptocurrency, has already revolutionized finance by enabling peer-to-peer transactions without intermediaries. Its trustless, transparent nature makes it an ideal complement to Nostr's goals. The integration of Bitcoin with Nostr unlocks new possibilities for decentralized finance (DeFi) and communication:
Micropayments with the Lightning Network The Lightning Network, Bitcoin's second-layer solution, allows for instant and low-cost transactions. Integrating Lightning with Nostr enables features like tipping content creators, paying for premium services, or supporting developers—all without the need for centralized payment processors.
Identity Verification Bitcoin addresses can be used as decentralized identifiers (DIDs) within Nostr, enabling secure, pseudonymous authentication without the need for email addresses or phone numbers.
Censorship Resistance Both Bitcoin and Nostr share a commitment to censorship resistance. While Bitcoin ensures financial sovereignty, Nostr guarantees freedom of expression, making the two technologies complementary pillars of a decentralized future.
Adoption of Nostr and Bitcoin The adoption of both Nostr and Bitcoin is growing rapidly, driven by the increasing awareness of privacy and decentralization. High-profile endorsements from Bitcoin advocates like Jack Dorsey, who has publicly supported Nostr, have brought the protocol into the spotlight. Additionally, the integration of Bitcoin's Lightning Network into Nostr-based applications is driving user interest.
Developers are building a range of applications on the Nostr protocol, from social media platforms to communication tools, all designed to empower users. The open nature of the protocol encourages innovation, with projects like Damus, Iris, and others gaining traction.
On the Bitcoin side, global adoption is accelerating as more businesses accept Bitcoin as payment and countries explore its use as legal tender. The combination of Bitcoin's financial capabilities with Nostr's communication framework could create a decentralized ecosystem where users are fully in control of their digital lives.
Challenges and the Road Ahead Despite their potential, Nostr and Bitcoin face challenges that could impact their adoption. Scalability, user education, and regulatory scrutiny remain significant hurdles. For Nostr, the reliance on relays poses questions about network reliability and spam prevention. For Bitcoin, volatility and misconceptions about its energy consumption persist as barriers to mainstream acceptance.
However, ongoing technological advancements and a growing community of advocates are driving solutions to these issues. Both technologies continue to evolve, with new features and improvements being rolled out to enhance their functionality and user experience.
Conclusion The synergy between Nostr and Bitcoin represents a significant step toward a decentralized, censorship-resistant future. By combining the strengths of decentralized communication and finance, these technologies offer a compelling vision for a world where individuals have greater control over their data, speech, and money.
As adoption grows, Nostr and Bitcoin are likely to become integral to the digital landscape, providing a foundation for a more open and equitable internet. Together, they are not just tools but symbols of a broader movement toward decentralization and empowerment.
-
@ bc8a4b4f:112ce9c4
2025-01-07 11:42:32El Mirador San Nicolás es el espacio correcto para iniciar la previa al tour por Granada, en España. Con un par de flamencos cantando con una buena guitarra acústica, se armoniza la experiencia de mi primer atardecer en la ciudad y para todos los turistas que estamos en pleno diciembre, frente a la cordillera de Sierra Nevada.
El Mirador San Nicolás es el espacio correcto para iniciar la previa al tour por Granada, en España. Con un par de flamencos cantando con una buena guitarra acústica, se armoniza la experiencia de mi primer atardecer en la ciudad y para todos los turistas que estamos en pleno diciembre, frente a la cordillera de Sierra Nevada.
\ Recordemos que Granada fue habitada en sus tiempos mozos por los árabes en el siglo VIII, durante la conquista musulmana de la Península Ibérica. Tras la fragmentación del Califato de Córdoba, en 1238, Muhammad I fundó la dinastía nazarí, dando inicio a uno de los períodos más destacados de la ciudad.
Durante la dominación nazarí, Granada floreció como un centro cultural, económico y artístico. Se construyó la majestuosa Alhambra, un espectáculo arquitectónico e ingenieril que simboliza la cumbre del arte islámico en España. Además, la ciudad destacó por ser un cosmo religioso, siendo hogar de comunidades musulmanas, cristianas y judías.
Fue así que en la reconquista, en 1492, los Reyes Católicos, Isabel y Fernando, pusieron fin a casi 800 años de dominio musulmán en la región, que incluyó la expulsión de judíos y musulmanes o su conversión al cristianismo. Aunque el dominio musulmán terminó, su legado perdura de manera viva en la ciudad con la arquitectura, la gastronomía y la cultura de Granada. La Alhambra, el Generalife y el Albaicín son testigos vivos de este pasado glorioso y constituyen un patrimonio invaluable que atrae a millones de visitantes de todo el mundo.
Ya cayendo la noche, bajando por el Albaicín, se aprecian las calles estrechas y de adoquines, con distintas puertas interesantes y entradas que hacen vivir la experiencia de un autóctono barrio árabe. Entre medio, el Balcón de San Nicolás, que te invita a ser parte del espectáculo que es ver la Alhambra de noche, que desde afuera son la invitación perfecta para disfrutar con café o un buen trago, esa postal que parece pintada por algún artista desconocido del 1.900.
Mezquita Mayor de Granada. Café en el Balcón San Nicolás. Luego del café y con un poco de calor en el cuerpo, continúa la caminata camino al centro hasta donde vas encontrando por el camino una serie de vestigios del mundo árabe que permiten reforzar que Granada seguirá siendo centro del reino nazarí. Su arquitectura es un recuerdo vivo y un encuentro con los particulares mercados que ofrecen menaje, lámparas, zapatillas y una serie de artículos que me transportan a oriente, incluyendo centros de estudios que me instan a querer volver.
Finalmente, logro llegar al centro de Granada y como bien escribió Federico García Lorca, orgulloso Granadino; «Granada está indefensa ante la gente, porque ante los halagos, nada ni nadie tiene modo de defenderse», y esta es tan solo la primera parte de un viaje en el tiempo y espacio en la grandiosa España.
Continuará…Recordemos que Granada fue habitada en sus tiempos mozos por los árabes en el siglo VIII, durante la conquista musulmana de la Península Ibérica. Tras la fragmentación del Califato de Córdoba, en 1238, Muhammad I fundó la dinastía nazarí, dando inicio a uno de los períodos más destacados de la ciudad.
Durante la dominación nazarí, Granada floreció como un centro cultural, económico y artístico. Se construyó la majestuosa Alhambra, un espectáculo arquitectónico e ingenieril que simboliza la cumbre del arte islámico en España. Además, la ciudad destacó por ser un cosmo religioso, siendo hogar de comunidades musulmanas, cristianas y judías.
Fue así que en la reconquista, en 1492, los Reyes Católicos, Isabel y Fernando, pusieron fin a casi 800 años de dominio musulmán en la región, que incluyó la expulsión de judíos y musulmanes o su conversión al cristianismo.
Aunque el dominio musulmán terminó, su legado perdura de manera viva en la ciudad con la arquitectura, la gastronomía y la cultura de Granada. La Alhambra, el Generalife y el Albaicín son testigos vivos de este pasado glorioso y constituyen un patrimonio invaluable que atrae a millones de visitantes de todo el mundo.
Ya cayendo la noche, bajando por el Albaicín, se aprecian las calles estrechas y de adoquines, con distintas puertas interesantes y entradas que hacen vivir la experiencia de un autóctono barrio árabe. Entre medio, el Balcón de San Nicolás, que te invita a ser parte del espectáculo que es ver la Alhambra de noche, que desde afuera son la invitación perfecta para disfrutar con café o un buen trago, esa postal que parece pintada por algún artista desconocido del 1.900.
Luego del café y con un poco de calor en el cuerpo, continúa la caminata camino al centro hasta donde vas encontrando por el camino una serie de vestigios del mundo árabe que permiten reforzar que Granada seguirá siendo centro del reino nazarí. Su arquitectura es un recuerdo vivo y un encuentro con los particulares mercados que ofrecen menaje, lámparas, zapatillas y una serie de artículos que me transportan a oriente, incluyendo centros de estudios que me instan a querer volver.
Finalmente, logro llegar al centro de Granada y como bien escribió Federico García Lorca, orgulloso Granadino; «Granada está indefensa ante la gente, porque ante los halagos, nada ni nadie tiene modo de defenderse», y esta es tan solo la primera parte de un viaje en el tiempo y espacio en la grandiosa España.
Continuará…
-
@ bf47c19e:c3d2573b
2025-01-07 11:15:14Originalni tekst na antenam.net
18.12.2024 / Autor: Ana Nives Radović
Ako ste makar djelić vremena proveli u svijetu digitalnog novca, vjerovatno ste naišli na termin HODL – uvijek napisan velikim slovima tako da na prvi pogled djeluje kao riječ sa slovnom greškom. Zapravo i jeste riječ o slovnoj grešci i to onoj koja je nastala na današnji dan prije 11 godina, a koja je uspjela ne samo da obezbijedi mjesto u istoriji svijeta novca, već i da postane naziv za jedan potpuno drugačiji pristup sredstvima koja posjedujemo.
Nespretno napisana riječ „hold“ (eng. držati, zadržati) u poruci na jednom forumu evoluirala je u akronim HODL – akronim za Hold On for Dear Life (doslovno – drži se za život, tj. drži se kao da ti život zavisi od toga), predstavlja poziv na akciju – ili, tačnije, „neakciju“ za vlasnike kriptovaluta da odole iskušenju prodaje tokom tržišnih padova. Riječ je o shvatanju da je ovaj oblik digitalne imovine bolje vremenski što duže imati u vlasništvu, kako bi se sačekao mnogo povoljniji trenutak za prodaju nego prodati ih u vremenu kada je situacija na tržištu loša.
Greška koja je postala pokret
Priča počinje 18. decembra 2013. godine, kada je cijena bitcoina tada počela da pada, a samo tokom toga dana se sa 682 na 522 dolara. Korisnik foruma pod imenom GameKyuubi objavio je sada već legendarni post pod naslovom „I AM HODLING“. Bila je to greška u kucanju, jer se na osnovu sadržaja poruke vidi da je krenuo da napiše „holding“ (držim), ali umjesto da se ispravi sebe, prigrlio je grešku, šaljivo govoreći o svom nedostatku vještina za trgovanje i zašto „bez obzira na sve“.
Bitcoin zajednica brzo je prihvatila ovaj izraz kao dio slenga. Pogrešno napisana riječ odjeknula je internet prostranstvima, a vremenom je prerasla u simbol šire filozofije – ne paniči, ne prodaj i ne dozvoli da kratkoročna nestabilnost poljulja tvoje uvjerenje. Od kasnonoćnog posta na forumu, HODL je postao poklič za vlasnike bitcoina (i drugih, u to vrijeme malobrojnih digitalnih valuta zanemarive vrijednosti) širom svijeta.
HODL-ovanje i HODL-eri
U suštini, HODL-ovanje je strategija zadržavanja kriptovaluta tokom tržišnih uspona i padova, zasnovana na uvjerenju da će cijene vremenom rasti. Umjesto impulsivnog reagovanja na tržišne fluktuacije, HODL-eri se posvećuju svojim investicijama na duže staze.
Ovaj pristup posebno je koristan za početnike, koji možda nemaju dovoljno stručnosti ili hrabrosti da se nose sa svakodnevnim trgovanjem (u čemu su često neuspješni i dugogodišnji vlasnici digitalnih novčića). Sam GameKyuubi u svom originalnom postu priznao je da samo najvještiji trgovci treba da pokušaju da „igraju igru“ tokom tržišnih padova. Za ostale, HODL-ovanje nije samo sigurnije, već je često i pametnije.
Filozofija HODL-ovanja zasnovana je na povjerenju – u budućnost kriptovaluta, u eventualni oporavak tržišta i u korist koju donosi strpljenje. To je odbijanje da se prodaje kada cijene naglo padnu – nepokolebljivo uvjerenje da su padovi privremeni i da nakon njih slijedi rast.
Zakon tržišta pokazuje da što drže HODL-ujete to se ova strategija više isplati, a cijena bitcoina u njegovoj šesnaestogodišnjoj istoriji je nesumnjivo najbolji dokaz za to. Trgovanje zahtijeva mnogo učenja, truda, vremena provedenog u praćenju svakog mogućeg signala, dok je kod HODL-ovanja važno samo da se „ne predate“.
Ako ste prethodnih godina nešto platili bitcoinom (a trgovci širom svijeta su to omogućili upravo da bi vas naveli da ih umjerite ka njima) vjerovatno ste zažalili, jer danas dok je njegova vrijednost i u dolarima i u eurima šestocifrena, ono na što ste ih potrošili ipak izgleda kao nešto što je trebalo platiti fizičkim novcem (kojeg je svakako „pojela inflacija“).
Pouzdane kriptovalute, a tu se prije svega misli na bitcoin, iako veoma volatilne bilježe trend rasta na duge staze, pa HODL-ovanje znači strpljenje u vremenu neizvjesnosti s idejom o koristi na duži rok, čak i kada su godine loše, kao što su bile 2014, 2017. i 2022. Na primjer, u periodu od 20. maja do 20. juna cijena bitcoina kliznula je sa 29.000 na 18.000 dolara, a upravo u tom trenutku mnogi su odlučili da količinu koju posjeduju prodaju ili je potroše plaćajući ovom digitalnom valutom (i pokajali se zbog toga).
HODL naspram drugih strategija
HODL-ovanje se razlikuje od aktivnijih strategija, poput kupovine po niskoj cijeni i prodaje po visokoj, jer dok trgovci pokušavaju da tempiraju tržište radi brze zarade, HODL-eri ostaju dosljedni svojoj odluci da se ne oslobađaju svoje imovine ni u najnoepovoljnijim trenucima. HODL-eri ne pokušavaju da predvide kretanje cijena – jednostavno čuvaju svoja sredstva, svjesni toga da će strpljenje na kraju donijeti rezultat.
Naravno, HODL-ovanje ima i svoje nedostatke. Za razliku od trgovaca koji mogu da povećaju svoj kapital kroz stratešku kupovinu i prodaju, HODL-eri zavise od vremena provedenog u čekanju na dugoročne rezultate. Pored toga, masovno HODL-ovanje može usporiti cirkulaciju kriptovaluta na tržištu, smanjujući ukupnu ekonomsku aktivnost – drugim riječima, kada bismo svi bili HODL-eri odnos ponude i tražnje bi bio veoma destimulišući i to bi oborilo cijenu.
Na sreću, trgovaca ima mnogo – dovoljno da tržište stalno bude aktivno i dinamično, no za one koji nemaju vremena, vještine ili sklonost ka riziku koji nosi trgovanje, HODL-ovanje ostaje jednostavan, ali veoma efikasan pristup.
Filozofija HODL-ovanja
HODL-ovanje je više od investicione strategije – to je način razmišljanja koji obuhvata otpornost, strpljenje i vjerovanje da su kratkotrajno suzdržavanje i nepokolebljivost u odluci da se sredstva sačuvaju vrijedna dugoročnog dobitka. Bilo da cijena bitcoina raste ili pada je, filozofija HODL-ovanja ostaje ista – ostanimo dosljedni, vjerujmo procesu i gledajmo u budućnost.
Jedan od ključnih razloga zašto većini ljudi ovakav pristup dugo nije bio razumljiv je zbog toga što su čitav sistem novca prihvatili u uvjerenju da on vremenom devalvira. Vjerovatno ste makar jednom razmatrali ponudu oročene štednje i procijenili da vam količina novca koju želite da položite neće donijeti onaj prinos koji će očuvati njegovu kupovnu moć nakon određenog broja godina, jer je kontinuirano doštampavanje novca podupiralo tu tvrdnju.
Dakle, ne treba da vas zavara sve ono što znate o novcu kao takvom, budući da bitcoin (na kojem je u ovom serijalu poseban fokus, jer mnoge druge kriptovalute ipak češće razočaraju nego što oduševe) nije novac, već samo ima neka svojstva novca. Posmatrajte ga radije kao imovinu – npr. kao nekretninu za koju sigurno želite da prodate onda kada je situacija stabilnija i kada su mnogo veće šanse da pronađete kupca kojem ćete je prodati po višoj cijeni.
U svakom slučaju, ako se u vašem digitalnom novčaniku već nalazi poneki satoshi (stomilioniti djelić bitcoina), kada tržište ponovo uđe u nepovoljnu fazu i zavlada prolazna panika, sjetite se onoga što je napisao GameKyuubi. HODL nije samo izraz – to je način da se prebrode oluje i izazovi koje nestabilno tržište nosi.
-
@ d5c3d063:4d1159b3
2025-01-07 11:02:03โพสที่อาจารย์พิริยะ บอกว่า “If you are angry at something... maybe it's just you.”
เป็นคำกล่าวที่เตือนให้เรามองกลับเข้ามาในตัวเองว่า "ความโกรธ" มีต้นกำเนิดจากจิตใจของเราเอง การใช้สติและการตระหนักถึงความคาดหวังที่เรามีต่อผู้อื่นจะช่วยให้เราสามารถจัดการกับความโกรธได้อย่างสร้างสรรค์และมีเหตุผล แนวคิดของอริยสัจ ๔ ช่วยให้เราเข้าใจถึงต้นเหตุและวิธีการดับทุกข์ และผมนำแนวคิดอิสรนิยมมาช่วยเสริมให้เราได้ตระหนักถึงความรับผิดชอบในชีวิตของตนเองและการเคารพเสรีภาพของผู้อื่นในการนำไปใช้ทางโลกได้จริง
เมื่อเราฝึกเดินด้วยเมตตา ปล่อยวางโทสะ และไม่หลงด้วยโมหะ เราจะสามารถสร้างความสงบสุขในจิตใจและในความสัมพันธ์กับผู้อื่นได้อย่างแท้จริง ทั้งหมดนี้นำไปสู่ชีวิตที่มีความสุขและเสรีภาพอย่างสมดุลในทุกมิติของการดำรงอยู่
เริ่มจาก...อริยสัจ ๔ คือการค้นหาต้นเหตุแห่งทุกข์ในจิตใจ
พระพุทธศาสนาสอนว่าความโกรธไม่ได้เกิดจากสิ่งภายนอกโดยตรง แต่มีรากฐานมาจาก สมุทัยหรือ "เหตุแห่งทุกข์" ที่เกิดจากภายในจิตใจของเราเอง เช่น - ตัณหา (ความยึดมั่นถือมั่น) ที่ทำให้เราคาดหวังว่าสิ่งต่าง ๆ จะต้องเป็นไปตามใจเรา - อวิชชา (ความไม่รู้) ทำให้เรามองไม่เห็นว่าความโกรธไม่ได้ทำให้ปัญหาแก้ไขได้ แต่กลับเผาผลาญจิตใจเราเอง การดับความโกรธ (นิโรธ) จึงเริ่มต้นจากการมีสติรู้ตัวและปล่อยวางความยึดมั่น โดยการฝึกสมาธิและการเจริญเมตตาเป็นเครื่องมือสำคัญที่ช่วยให้เรามองเห็นความเป็นจริงและลดทอนพลังทำลายของความโกรธ
...ต่อมาคือแนวคิดอิสรนิยม ที่เน้นถึงการรับผิดชอบต่อตนเองและเสรีภาพในการเลือก ปัจเจกบุคคลต้องรับผิดชอบต่อชีวิตของตนเองและไม่พึ่งพิงปัจจัยภายนอกเกินไป ความโกรธในมุมมองนี้สามารถมองได้ว่าเป็นผลลัพธ์ของการละเลยความรับผิดชอบต่ออารมณ์ของตัวเองและการพึ่งพิงสิ่งภายนอกเกินไป เช่น การโกรธที่ผู้อื่นไม่ทำตามที่เราต้องการ สะท้อนถึงการพยายามควบคุมสิ่งที่อยู่นอกเหนืออำนาจของเรา ซึ่งขัดกับหลักการเสรีภาพส่วนบุคคลของอิสรนิยม หลักการสำคัญของอิสรนิยมคือ Non-Aggression Principle (หลักการไม่รุกราน) ที่สอนว่าความรุนแรงและการบีบบังคับผู้อื่นเป็นสิ่งที่ควรหลีกเลี่ยง ความโกรธจึงถือเป็นการรุกรานจิตใจของเราเองก่อน เพราะเป็นการสร้างภาระให้กับจิตใจโดยไม่จำเป็น
แนวทางการปฏิบัติที่อาจารย์ได้ใส่ # ไว้ 1. #เดินด้วยเมตตา - มุมมองจากอริยสัจ ๔ #เมตตา คือการยอมรับและปรารถนาดีต่อทั้งตัวเองและผู้อื่น การให้ความรักและความปรารถนาดีจะช่วยลดพลังของโทสะในจิตใจ ทำให้เรามีมุมมองที่เปิดกว้างและมีความสุขที่แท้จริง - การเชื่อมโยงในอิสรนิยม เสรีภาพของแต่ละบุคคลรวมถึงการเคารพเสรีภาพของผู้อื่น เมตตาได้ช่วยส่งเสริมการอยู่ร่วมกันในสังคมโดยไม่ก้าวก่ายสิทธิและเสรีภาพของกันและกัน เมตตาในแง่นี้จึงเป็นการสร้างสมดุลระหว่างเสรีภาพของเราและของผู้อื่น เช่น การเคารพในความคิดหรือการกระทำของผู้อื่น แม้จะเขาจะเห็นต่างจากเรา 2. #อย่าเดินด้วยโทสะ - มุมมองจากอริยสัจ ๔ #โทสะ เป็นเหมือนยาพิษที่เราดื่มเองและทำให้เราเป็นทุกข์ ความโกรธไม่ได้ทำร้ายผู้อื่นเท่าที่มันทำลายจิตใจและร่างกายของเราเอง การฝึกเจริญสติช่วยให้เราเห็นถึงอารมณ์โกรธตั้งแต่เริ่มต้น และตัดวงจรของความคิดและการกระทำที่เป็นพิษ - การเชื่อมโยงในอิสรนิยม ความโกรธหรือการใช้อารมณ์ ไม่ควรเป็นเหตุผลในการละเมิดสิทธิหรือเสรีภาพของผู้อื่น หลักการ Non-Aggression Principle (NAP) ของอิสรนิยมเตือนเราว่าการใช้อารมณ์รุนแรงหรือโทสะมักนำไปสู่การบีบบังคับหรือทำร้ายผู้อื่น ซึ่งเป็นสิ่งที่ขัดแย้งกับความเคารพในเสรีภาพของทุกคน การไม่เดินด้วยโทสะจึงเป็นการเคารพในเสรีภาพของทั้งตัวเราและผู้อื่น 3. #อย่าหลงด้วยโมหะ - มุมมองจากอริยสัจ ๔ #โมหะ หรือความหลง ทำให้เรามองสิ่งต่าง ๆ อย่างผิดเพี้ยนและติดอยู่ในภาพลวงตา เช่น การโทษผู้อื่นว่าเป็นต้นเหตุของความทุกข์ทั้งหมด ทั้งที่แท้จริงแล้วความทุกข์มักเกิดจากจิตใจและความคาดหวังของเราเอง - การเชื่อมโยงกับอิสรนิยม สอนว่าความสุขและความสงบในชีวิต ไม่ได้ขึ้นอยู่กับสิ่งภายนอก แต่ขึ้นอยู่กับเสรีภาพในการเลือกและการรับผิดชอบชีวิตของตนเอง การหลุดพ้นจากโมหะเป็นการยอมรับว่าเราไม่สามารถควบคุมผู้อื่นหรือโลกภายนอกได้ แต่สามารถควบคุมปฏิกิริยาและการตอบสนองของเราได้ การไม่หลงด้วยโมหะจึงช่วยให้เราเป็นอิสระจากความยึดมั่นในสิ่งที่อยู่นอกเหนือการควบคุม
ทีนี้มาลองดูตัวอย่างในชีวิตประจำวันกันดูบ้าง
-
เดินด้วยเมตตา หากเราพยายามอธิบายเรื่องบิตคอยน์ให้คนอื่นเข้าใจ แต่เขายังเชื่อมั่นในระบบการเงินของรัฐ การใช้เมตตาจะช่วยให้เราเข้าใจว่าการเปลี่ยนแปลงความคิดต้องใช้เวลาและกระบวนการขั้นตอน ไม่ใช่ทุกคนจะพร้อมเปิดรับแนวคิดใหม่ในทันที การพูดคุยด้วยความรักและปรารถนาดีแทนการตำหนิ จะช่วยสร้างบทสนทนาที่สร้างสรรค์
-
อย่าเดินด้วยโทสะ หากเรารู้สึกโกรธเมื่อคนอื่นยังคงเชื่อในระบบเศรษฐกิจแบบเคนส์หรือสังคมนิยม อาจใช้โอกาสนี้แหละ ในการฝึกเจริญสติและตระหนักว่าเราควบคุมความเชื่อของผู้อื่นไม่ได้ แต่สามารถเลือกอธิบายด้วยเหตุผลและความเคารพ หรือเลือกที่จะปล่อยวางเมื่อสถานการณ์ไม่เอื้ออำนวย
-
อย่าหลงด้วยโมหะ หากเราหงุดหงิดที่ผู้อื่นไม่ยอมรับแนวคิดของบิตคอยน์ การตระหนักว่าความคาดหวังของเราที่ต้องการให้ผู้อื่นเข้าใจในทันทีนั้นเป็นภาพลวงตา มันก็จะช่วยให้เรามองเห็นความจริงที่ว่า การเปลี่ยนแปลงทางความคิด เป็นกระบวนการที่ต้องใช้เวลาและเกิดจากเสรีภาพในการตัดสินใจของแต่ละบุคคล
……..……..……..
ความโกรธ เป็นหนึ่งในอารมณ์พื้นฐานที่มนุษย์ทุกคนต้องเผชิญในชีวิต แต่การจัดการความโกรธนั้นไม่ใช่เพียงเรื่องของการควบคุมอารมณ์ หากยังสะท้อนถึงการทำความเข้าใจตัวตนและธรรมชาติของสิ่งต่าง ๆ รอบตัวเรา ประโยคที่อาจารย์พิริยะบอกว่า “If you are angry at something... maybe it's just you.” ไม่ได้เป็นเพียงคำกล่าวเตือนใจ แต่ยังเป็นการเชื้อเชิญให้เราไตร่ตรองถึงรากฐานของความโกรธ ซึ่งซุปขอเชื่อมโยงเข้ากับหลักอริยสัจ ๔ ในพระพุทธศาสนาและแนวคิดอิสรนิยม (#Libertarianism) ที่เน้นความรับผิดชอบส่วนบุคคลและเสรีภาพในชีวิต
Siamstr
-
-
@ b2caa9b3:9eab0fb5
2025-01-07 10:55:41The year had barely begun when we, a group of four from the hostel, decided to explore Moshi's Uhuru Park. Located conveniently in the city center, it was just a short walk away, making it an easy and inviting destination.
A Stroll Through Uhuru Park
We entered through the main gate and began to wander around the park. The first area we encountered was small buildings with stores, restaurants, and a cozy beer garden. After some browsing, we ventured further into the heart of the park and stumbled upon a playground. It was a bit run-down — a place I wouldn’t let my kids play, especially not on the slide — but that didn’t stop us. As adults, we unleashed our inner children, playing on the equipment and snapping countless photos.
In the middle of our playground adventure, we spotted a tree with a ladder and a sign requesting payment to use the playground. Surprisingly, they accepted Mastercard and Visa! Yet, given the state of the equipment, I couldn’t imagine parents willingly paying for such a risky setup.
Unexpected Sights and Big Discoveries
As we moved on, the park began to reveal its quirky charm. We admired creatively maintained corners and came across a unique “Christmas tree”. Unlike traditional evergreens, this local tree earned its festive name because it only blooms during the holiday season. Nearby, we marveled at massive termite hills — some taller than me — that left me feeling small. While I was curious, I didn’t dig around to confirm if any termites were home.
A Smoothie Haven: The Wishing Tree
We eventually reached a cluster of houses within the park. One spot stood out to me — The Wishing Tree. I’d discovered it one evening during a failed attempt to attend a BBQ festival when the police turned me away. The Wishing Tree seemed like an oasis, but it was closed at night, so I promised myself I’d return.
That day, I kept my promise. The Wishing Tree lived up to its name, offering a serene, green space with soft music perfect for meditation. The smoothies were freshly made, organic, and worth the wait. With my first sip, I was blown away — absolutely delicious, even if a bit pricey. We lingered there, savoring every moment and every drop.
Chipsiei and Colonial Echoes
After leaving the oasis, we wandered back to the beer garden. One of my companions, a man from Switzerland, ordered Chipsiei. It’s a local dish of fries and eggs, with “Ei” (the German word for egg) being a linguistic remnant of Tanzania’s time as German East Africa. Traces of this colonial past still linger in buildings, language, and even some food traditions.
I opted for a beer with lemon, similar to a Radler, while others chose soda or beer. After finishing our drinks, we continued our walk, eventually passing the bus station. Here, the Swiss traveler bought a ticket for his next destination, though not without encountering the infamous “mzungu price” — a common overcharge for foreigners. Despite having the correct price from the internet, he couldn’t negotiate it down.
A Market Adventure
Back at the hostel, I decided to visit the market, and the Swiss man joined me. I needed bananas, while he sought natural baobab fruit. Unlike the colored and sugary versions sold on the street, market baobab is organic and white. It was the perfect place to find fresh, unaltered produce.
Wrapping Up the Day
After the market, we returned to the hostel to relax at the bar, reflecting on our day. While writing this, I realized I captured so many interesting photos. I’ll share a few here and save the rest for my upcoming online gallery — stay tuned for updates!
Moving On
Tomorrow, I’ll check out and continue my journey through Africa. After nearly two months in Moshi, my foot has healed, and it’s time to move forward. Along the way, I’ll need to replace my GoPro battery (the old one blew up) and get a power bank after my Google Pixel met its end with a faulty one. I also need to pick up a hat to protect myself from the increasingly harsh sun and maybe a sheet to use as a multi sheet (Towel, Beach Towel and other things).
The road ahead promises new adventures, stories, and photos. Stay tuned to follow my travels as I explore more of this beautiful continent!
-
@ d830ee7b:4e61cd62
2025-01-07 09:14:17จุดเริ่มต้นของสงครามบล็อกไซส์
ลองนึกภาพร้านอาหารเล็ก ๆ ที่มีแค่สิบโต๊ะ แต่ลูกค้ากลับล้นหลามจนพนักงานวิ่งวุ่นตลอดวัน เราอาจเห็นภาพชัดว่าปัญหาต้องตามมาแน่ ๆ ถ้าจำนวนโต๊ะไม่พอกับลูกค้าที่ต่อแถวกันยาวเหยียด
บางคนหัวเสียจนยอมจ่ายเงินเพิ่มเพื่อรีบได้โต๊ะนั่ง ในขณะที่อีกหลายคนก็ยืนรอจนหมดอารมณ์กิน สุดท้ายก็ต้องถามกันว่า
“จะทำยังไงดี ถึงจะไม่เสียเอกลักษณ์ร้าน และไม่ปล่อยให้ลูกค้าต้องหงุดหงิดมากมายขนาดนี้?”
บรรยากาศตรงนี้เปรียบได้กับสภาพของบิตคอยน์ช่วงราวปี 2015 ซึ่งเดิมทีเคยรองรับธุรกรรมได้สบาย ๆ แต่จู่ ๆ ก็ต้องแบกรับภาระธุรกรรมมหาศาลจน “คิวยาวเป็นหางว่าว”
ทั้งหมดนี้มาจากข้อกำหนดตั้งต้นว่า แต่ละบล็อกมีขนาดเพียง 1 เมกะไบต์ และบล็อกจะถูกสร้างทุก ๆ ประมาณ 10 นาที ทีนี้พอผู้ใช้หลั่งไหลเข้ามาไม่หยุด พื้นที่เล็ก ๆ ที่ว่าเลยเอาไม่อยู่ ใครอยากให้ธุรกรรมติดบล็อกก่อนก็ควักกระเป๋าจ่ายค่าธรรมเนียมเพิ่ม ถ้าไม่จ่าย ธุรกรรมอาจรอข้ามวันข้ามคืน แถมยังเสี่ยงค้างเติ่งไปเลย
ความไม่พอใจจึงปะทุขึ้นเป็นเสียงดังลั่นว่า
“แก้ปัญหานี้ยังไงดี จะขยายบล็อกกันเลยไหม หรือปรับซอฟต์แวร์ให้ฉลาดขึ้นโดยไม่เพิ่มขนาดจริง ๆ?”
เมื่อสองแนวคิดนี้ตั้งฉากกัน คนในแวดวงบิตคอยน์จึงแตกเป็นสองฝั่งหลัก ๆ
ฝั่งแรกเสนอ “เพิ่ม Blocksize” โดยบอกว่าต้องแก้ให้จบตรงจุด เหมือนเพิ่มโต๊ะเข้าไปในร้าน จะได้รองรับลูกค้าได้มากขึ้น เพราะเชื่อว่า Bitcoin ต้องพร้อมสำหรับการใช้งานทั่วโลก การขยายจาก 1 MB เป็น 2 MB หรือ 4 MB หรือมากกว่านั้น จึงตอบโจทย์ผู้ใช้หลากหลายตั้งแต่รายเล็กไปจนถึงธุรกิจใหญ่
แกนนำฝ่ายนี้คือ Roger Ver หรือ “Bitcoin Jesus” ที่ผลักดันแนวคิดนี้สุดตัวร่วมกับทีมขุดอย่าง Bitmain ซึ่งไม่อยากเห็นใครต้องยืนรอนานหรือจ่ายแพงเวอร์
อีกฝ่ายคือทีมพัฒนา “Bitcoin Core” ที่มี Greg Maxwell และ Peter Wuille เป็นหัวขบวน พวกเขายืนยันว่าถ้ายิ่งเพิ่มขนาดบล็อกให้ใหญ่โต ก็จะยิ่งเก็บข้อมูลมากจนโหนดรายเล็ก ๆ ต้องใช้ทรัพยากรสูงขึ้น สุดท้ายอาจเหลือแค่รายใหญ่ที่รันโหนดไหว แล้ว Decentralization ก็จะถูกบั่นทอน
ฝ่ายบิตคอยน์คอร์จึงเสนอทางแก้แบบ Segregated Witness (SegWit) ซึ่งเปรียบได้กับการจัดโต๊ะใหม่ให้แยบยล—ย้ายข้อมูลลายเซ็นธุรกรรมไปไว้นอกบล็อกหลัก ทำให้ในบล็อกมีพื้นที่ใส่ธุรกรรมได้อีกเยอะขึ้นโดยไม่ต้องทุบผนังขยายร้าน
ความขัดแย้งไม่ได้จำกัดอยู่ในเว็บบอร์ดหรือฟอรัม แต่ลุกลามไปจนถึงเวทีระดับโลกอย่าง Consensus Conference ปี 2016 และ 2017 ฝ่ายหนุนเพิ่มขนาดบล็อกก็โหวกเหวกว่า “นี่แหละถูกจุดที่สุด”
ส่วนทีมบิตคอยน์คอร์ก็โต้กลับว่า “ขืนบล็อกใหญ่ไป ระบบก็เสี่ยงรวมศูนย์ เพราะใครจะมีทุนซื้ออุปกรณ์แพง ๆ และเน็ตแรง ๆ ตลอด” จึงไม่ใช่แค่ถกเถียงทางเทคนิค แต่สะท้อนมุมมองปรัชญาด้วยว่าบิตคอยน์ควรเป็นระบบ “กระจาย” หรือ “รวมศูนย์” กันแน่
ยิ่งถกก็ยิ่งมองไม่เห็นทางออก.. บ้างก็เสนอให้ Fork แยกเครือข่ายไปเลย เหมือนเปิดสาขาร้านใหม่ ใครไม่โอเคแนวไหนก็ไปอีกสาขาหนึ่ง
Roger Ver กับสายขุดยักษ์ใหญ่ก็บอกว่าถ้าไม่เพิ่ม Blocksize ต่อไปค่าธรรมเนียมสูง และคนจะเข้าถึงยากขึ้น เหมือนร้านที่โต๊ะแน่นจนคนล้น
ฝั่งบิตคอยน์คอร์ย้ำว่าจะพัฒนา SegWit กับ Lightning Network เพื่อขนธุรกรรมส่วนใหญ่ไปทำงานนอกบล็อกหลัก แม้อาจต้องรอให้เทคโนโลยีสุกงอม แต่คงไม่กระทบโหนดรายเล็กมากนัก
ในโลกออนไลน์ สงครามโซเชียลก็เริ่มเดือด ตั้งกระทู้กันทุกวัน บางคนต่อว่านักขุดว่าเอากำไรเป็นหลัก บ้างบอกทีมบิตคอยน์คอร์ไม่เข้าใจปัญหาฝั่งธุรกิจจนชาวเน็ตแบ่งเป็นหลายค่าย คำถามใหญ่จึงดังขึ้น
“ตกลงบิตคอยน์จะเป็น ‘อาวุธทางการเงิน’ ของคนหมู่มากได้จริงเหรอ ถ้าไม่มีพื้นที่ในบล็อกมากพอ?”
หรือ..
“ถ้าผลุนผลันขยายบล็อกไปเรื่อย ๆ จนเหลือแต่รายใหญ่ที่รันโหนดได้ แบบนั้นยังถือว่าเป็น บิตคอยน์ในอุดมการณ์ของ Satoshi Nakamoto ไหม?”
พอหลายฝ่ายพยายามประนีประนอมกันหลายเวที สุดท้ายก็ไม่ประสบผล Roger Ver มั่นใจว่าต้องเพิ่ม Blocksize เท่านั้นจึงพาบิตคอยน์รอด
ส่วนทีม Core ไม่ยอมเปิดทางง่าย ๆ เพราะกลัวระบบเสียหลักการกระจายอำนาจไป
ด้วยเหตุผลทั้งคู่จึงทำให้สงครามนี้ยืดเยื้อ กลุ่มขุดและพัฒนาในแวดวงเริ่มจับตากันเครียด บ้างเสนอทางผสม เช่น เพิ่ม Blocksize นิดหน่อย แล้วเปิด SegWit ควบคู่ บ้างเสนอว่าให้เลื่อนตัดสินใจออกไปก่อนก็ยังดี
ไม่มีใครรู้ว่าจะลงเอยอย่างไร.. และหากเรื่องนี้พลั้งพลาดบิตคอยน์อาจแตกเป็นสองสายจนผู้ใช้หรือนักลงทุนสับสน
สถานการณ์ช่วงแรกเหมือน “ไฟที่กำลังคุ” เพราะยังไม่ปะทุเต็มที่แต่ก็แรงพอจะยกครัวไปตลอดทั้งวงการ คนพัฒนาก็ทำ SegWit และ Lightning Network ไป ฝ่ายหนุน Blocksize ก็เดินสายผลักดันให้เต็มที่ ถึงขั้นยอมเสี่ยง Fork ถ้าจำเป็นจริง ๆ
นี่แหละคือจุดเริ่มต้นของความตึงเครียดที่ไม่ใช่แค่ “ขนาดบล็อก” แต่หมายถึงอนาคตของบิตคอยน์ที่อาจพลิกโฉมไปตลอดกาล..
คิดง่าย ๆ ก็เหมือนร้านอาหารเล็ก ๆ ที่กำลังจะก้าวสู่ภัตตาคารใหญ่ระดับท็อป เมื่อแขกเหรื่อมาไม่หยุดหย่อน แน่นอนว่าเสียงเรียกร้องให้ทุบกำแพงขยายร้านย่อมมีบ้าง แต่บางคนอาจบอก “เปลี่ยนวิธีจัดโต๊ะแทนได้ไหม?” ทุกแนวทางต่างมีทั้งโอกาสและความเสี่ยง
ที่สำคัญคือ บิตคอยน์เป็นสินทรัพย์อันดับหนึ่งของโลกคริปโตฯ หากก้าวพลาดเพียงเล็กน้อย อาจสะเทือนไปทั่วโลกด้วย
เนื้อหาถัดไปผมจะชวนมาดูว่า ใครกันแน่ที่อยู่เบื้องหลังการขับเคลื่อนสงคราม Blocksize ครั้งนี้?
พวกเขามีแรงจูงใจอะไรกันบ้าง? และจะนำพาบิตคอยน์ไปในทิศทางใด?
ขอทิ้งท้ายส่วนนี้ให้คิดเล่น ๆ
“ถ้าเพิ่ม Blocksize สุด ๆ แต่โหนดรายเล็กหายหมด สุดท้ายยังเรียกว่ากระจายอำนาจอยู่ไหม?”
“หรือจะรักษาบล็อกขนาดเล็กไว้อย่างเดิม แล้วปรับเทคโนโลยีเสริมให้ฉลาดขึ้นดีกว่า?”
ทั้งหมดที่เล่ามายังเป็นแค่บทโหมโรงนะครับ สงครามนี้เพิ่งปะทุเท่านั้น ยังมีอะไรเข้มข้นอีกมาก ติดตามต่อว่าฝั่งไหนจะงัดไม้เด็ดอะไรออกมาเพื่อรักษา “ร้านอาหาร” แห่งนี้ให้เดินหน้าต่อไปได้โดยไม่เสียตัวตน..
ใครคือผู้ขับเคลื่อนสงคราม Blocksize?
พาร์ทที่แล้ว เราได้เห็นภาพรวมของปัญหาที่ดูเหมือนจะเล็กนิดเดียวอย่าง “บล็อกใหญ่หรือเล็ก?” แต่กลับแผ่ขยายจนกลายเป็นมหากาพย์ความขัดแย้งในชุมชนบิตคอยน์ เสมือนเดิมพันอนาคตของสกุลเงินดิจิทัลอันดับหนึ่งบนโลกใบนี้
พอตอนนี้ถึงเวลาแล้วที่เราจะก้าวลึกลงไปในเบื้องหลังของสงครามอันร้อนแรงนี้ ใครอยู่ในเงามืด? ใครลากสายอยู่หลังเวที? และใครโดดขึ้นมาเดินลุยบนสนามเปิดเพื่อต่อสู้แย่งชิงฉันทามติของเครือข่าย?
มีคนชอบเปรียบเทียบว่าศึก Blocksize ครั้งนี้คือ “สนามรบดิจิทัล” ซึ่งไม่ได้ยิงกระสุนห้ำหั่นแต่ใช้โค้ดแทน ขับเคลื่อนด้วย “Hashrate” ที่เปรียบเสมือนอาวุธหนัก ฝ่ายไหนถือกำลังขุดสูงกว่าก็เหมือนมีกองทัพเบิ้ม ๆ อยู่ในมือ
ด้านนักพัฒนาและผู้ใช้ทั่วไปก็คล้ายประชากรพลเรือนที่บางทีก็ต้องยอมรับชะตา แต่บางทีก็รวมตัวประท้วงสร้างพลังของตัวเองให้โลกได้เห็น ทุกฝีก้าวมีคนจ้องดูว่าจะเกิด “Hard Fork” หรือ “Soft Fork” เมื่อไหร่ และกฎใดจะถูกประกาศเป็น “กฎใหม่” ให้ทุกคนต้องปฏิบัติตาม
ในมุมของคนอยาก “เพิ่ม Blocksize” เห็นชื่อของ Roger Ver โผล่โดดเด่นสุด ๆ เขาคือ “Bitcoin Jesus” แห่งยุคบุกเบิก ที่ครั้งหนึ่งทุ่มทุนโปรโมตบิตคอยน์แบบไม่กลัวเจ๊ง ด้วยความเชื่อว่าบิตคอยน์ควรเป็น “เงินสดดิจิทัล” ลื่นไหลจ่ายคล่อง สลัดค่าธรรมเนียมแพง ๆ ทิ้งไปให้หมด
ในสายตาเขา การคงบล็อกเล็กแค่ 1 MB ยิ่งทำให้คนใช้แล้วปวดหัว ค่าธรรมเนียมสูงปรี๊ด ธุรกรรมอืดอาดเกินจะทน เลยต้องขยายขนาดบล็อกแบบจัดเต็ม เหมือนขยายถนนให้รถวิ่งง่าย ไม่งั้นก็ต้องมุดเข้าอุโมงค์แคบ ๆ จอดติดกันยาว
และ “Bitmain” บริษัทเครื่องขุดเบอร์ใหญ่สุดในโลกก็เข้ามาเสริมพลังแบบเต็มขั้น ขับเคลื่อนโดย Jihan Wu ที่เล็งเห็นว่าพอยิ่งขยายบล็อก ธุรกรรมก็จะยิ่งทะลัก ค่าธรรมเนียมก็จะเพิ่มขึ้น นักขุดจะได้เงินดี สร้างแรงดึงดูดให้คนหันมาหาบิตคอยน์มากขึ้นไปอีก
Bitmain ถือ Hashrate มหาศาล จึงไม่ต่างจากมีทัพใหญ่พร้อมยกพลบุก เพื่อดันแนวคิด “Fork” ได้ตลอดเวลา ถ้าฝั่งเพิ่ม Blocksize อยากจะเล่นเกมสายไหนก็เดินได้เลย
อีกฟากสนาม คือทีม “Bitcoin Core” ถือเป็นแกนกลางที่คุมซอฟต์แวร์หลัก
นำโดย *Greg Maxwell, Peter Wuille และ Wladimir van der Laan***
พวกเขาห่วงว่าถ้าบล็อกใหญ่ขึ้นมาก คงจะมีแค่นายทุนใหญ่เท่านั้นที่รันโหนดไหว ประชาชนตัวเล็ก ๆ หรือคนไม่มีทรัพยากรเยอะก็ยิ่งถูกกันออกจากเครือข่าย กลายเป็นระบบกึ่งรวมศูนย์ ซึ่งสวนกับหลักการเดิมที่ Satoshi Nakamoto เคยวางไว้
พวกเขาจึงเสนอ Segregated Witness (SegWit) เพื่อตัดข้อมูลลายเซ็น (Witness Data) ทิ้งไปนอกบล็อก ทำให้มีพื้นที่รองรับธุรกรรมได้เยอะขึ้นแบบไม่ต้องขยาย “เลนหลัก” และจะต่อยอดด้วย Lightning Network เพื่อยกธุรกรรมส่วนใหญ่ไปอยู่นอกบล็อกอีกชั้น
ฝั่งนักพัฒนาเหล่านี้ไม่ได้สู้อย่างโดดเดี่ยว แต่มีผู้ใช้รวมพลังกันในนาม UASF (User-Activated Soft Fork) มองว่า
“ใครว่าขุดเยอะแล้วสั่งการได้หมด? ผู้ใช้ทั่ว ๆ ไปก็ออกแบบกติกาได้เหมือนกัน?”
พวกเขาบอกเลยว่า “ถ้าไม่หนุน SegWit พวกฉันไม่เอาด้วยนะ”
การเคลื่อนไหวแบบนี้สร้างแรงกดดันให้นักขุดต้องรีบตามน้ำ ไม่งั้นเสี่ยงโดนผู้ใช้ปฏิเสธบล็อกกันถ้วนหน้า
ปี 2016-2017 กลายเป็นช่วงร้อนระอุสุด ๆ Roger Ver ลุกขึ้นพูดเมื่อไหร่ มักกล่าวหาทีม Core ว่าปิดประตูโอกาสทองของบิตคอยน์
ส่วนทีม Core ก็ตีโต้กลับว่า “ถ้าเพิ่มบล็อกเร็วไป มีแต่จะทำให้บิ๊กทุนไม่กี่เจ้าเข้ามาผูกขาด!”
พอยิ่งเถียงกันในงานใหญ่ เช่น Consensus Conference 2017 ประเด็นก็ยิ่งเดือด บางฝ่ายอยาก “Fork” แตกสายไปเลย บางฝ่ายยังคอยประนีประนอม แต่ก็ไม่มีใครลงรอยกันได้
Roger Ver และ Bitmain เร่งเครื่องดัน Hard Fork
ทีม Core ไม่ยอมถอย ยืนกราน SegWit ก่อน แล้วใช้ Lightning Network ปิดเกม
ผลคือ...
ทุกคนเริ่มกลัวว่า “Bitcoin จะแตกเป็นสองสายจริง ๆ หรือ?”
จะเป็นบล็อกใหญ่ หรือจะอยู่ 1 MB พร้อม SegWit?
กลางปี 2017 สงครามนี้จึงคลอด “Bitcoin Cash” เครือข่ายใหม่ที่กลุ่ม Roger Ver ผลักดัน บอกว่านี่คือ “Bitcoin ตัวจริง” ที่ค่าธรรมเนียมถูกกว่า ธุรกรรมไวกว่า รองรับคนจำนวนมากได้
ในขณะเดียวกัน เครือข่ายหลัก BTC ก็เปิดใช้ SegWit ไป พร้อมมุ่งหน้าเปิดทาง Lightning Network ทำให้ครึ่งหนึ่งของชุมชนยังเชื่อมั่นว่าการรักษาบล็อกเล็ก คือหัวใจสำคัญของกระจายอำนาจ
Blocksize War ครั้งนี้ เกินกว่าจะเรียกว่า “ดีเบตเชิงเทคนิค”
มันคล้ายการปะทะอุดมการณ์ของ “กระจายอำนาจอย่างเคร่งครัด” ปะทะ “ขยายบล็อกให้ใช้งานจริงในชีวิตประจำวัน”
ทั้งสองฝ่ายต่างยิงวาทะกันเดือดในโซเชียลมีเดีย คนฝ่ายหนึ่งบอกอีกฝ่าย “ล้าหลังไม่รู้จักปรับตัว” อีกฝ่ายก็ยันกลับว่า “คิดแค่กำไรระยะสั้น ไม่รักษาอัตลักษณ์บิตคอยน์” บน Reddit, Twitter, ฟอรัมต่าง ๆ เหล่าผู้เคยเป็นเพื่อนร่วมทางต้องแยกค่ายกันเพราะมองต่างว่าควรเพิ่มบล็อกหรือเปล่า
ที่สุดแล้ว...
เมื่อสองอุดมการณ์สวนทางกันระดับราก แทบไม่มีพื้นที่ประนีประนอม บ้างเชื่อว่าถ้าไม่เพิ่มบล็อกบิตคอยน์จะใช้งานลำบากเกิน บ้างยึดมั่นว่าถ้าบล็อกใหญ่มากโหนดเล็ก ๆ ก็จะหายไปหมด ระบบจะตกในมือไม่กี่คน.. ซึ่งขัดเจตนารมณ์ตั้งต้นของ Satoshi แบบสุด ๆ
ผลลัพธ์จึงลงเอยด้วยการเกิด “Bitcoin Cash” (BCH) แยกเครือข่าย และเปิดศึกโฆษณาว่า “ตนต่างหากที่เป็นผู้สืบทอดแนวคิด Satoshi ของจริง”
เมื่อ Bitcoin Cash ถือกำเนิดพร้อมขนาดบล็อกใหญ่ “มหาศึก” ครั้งนี้ก็ไม่ได้จบลง แต่เปลี่ยนหน้าฉากไปสู่การตลาดและความชอบธรรม
ใคร ๆ ก็ตั้งคำถามว่า “Bitcoin Cash ต่างจาก Bitcoin ยังไง?” หรือ “ใครสืบทอดเจตนารมณ์ Satoshi อย่างแท้จริงกันแน่?”
นักพัฒนา ฝั่ง BTC ยังเหนียวแน่นว่ารักษาเครือข่ายให้เบา ๆ แล้วใช้ทริคอย่าง SegWit, Lightning Network เสริม คือทางออกป้องกันการรวมศูนย์
ฝ่าย BCH ก็บอกว่าบล็อกใหญ่เลยดีกว่า ทุกคนจะได้เทรดกันเพลินโดยไม่ต้องแย่งพื้นที่
ในภาพใหญ่.. สงครามครั้งนี้ส่งคลื่นกระเพื่อมไปทั่วโลกคริปโตฯ หลายคนกลัวว่าถ้ายังแยกแตกกันแบบนี้ต่อ ราคาจะผันผวนจนคนขยาด แต่ก็มีอีกฝ่ายที่มองว่า
“ดีสิ มีการแข่งขันแล้วเกิดนวัตกรรมใหม่ ๆ”
เพราะในโลกโอเพนซอร์ส ไม่มีใครหยุดการแยกตัวได้ถ้าคนบางกลุ่มอยากลองแนวทางใหม่
คำถามสำคัญคือ..
“ใครขับเคลื่อนสงคราม Blocksize?”
คำตอบก็หนีไม่พ้น Roger Ver, Bitmain และทีม Bitcoin Core รวมถึงกลุ่ม UASF
พวกเขาต่างมีพลังในมิติต่าง ๆ
Roger Ver มีแรงสนับสนุนจากนักขุดสายทุนจัด Bitmain มีกองทัพ Hashrate มหาศาล ทีม Bitcoin Core คุมซอฟต์แวร์ และ UASF ก็มีอำนาจ ‘No Node, No Vote’ ที่ปัดบล็อกไม่พอใจทิ้งได้หมด
นี่ไม่ใช่การรบระหว่าง “อำนาจกับผู้อ่อนแอ” แต่เป็นสมรภูมิที่ทุกขั้วมี “พลัง” อยู่คนละแบบ ทำให้การประนีประนอมเป็นเพียงอุดมคติ
จนที่สุดจึงแตกเป็นสองสาย เหมือนเป็นสปิริตของโอเพนซอร์สที่แค่ Fork ก็พาเดินไปคนละทิศ ใครอยากกดเครื่องขุดก็ขุด ใครอยากตามซอฟต์แวร์ Core ก็จัดไป
นึกภาพอนาคตสิครับ.. ถ้ามีเทคโนโลยีใหม่เข้ามาอีก จะมีสงคราม “Blocksize 2.0” หรือเปล่า? ถ้าเจอเงื่อนไขใหญ่ ๆ ในการเปลี่ยนระบบ ย่อมต้องเข้าสู่วงจรดีเบตเดือดปุดเหมือนเคย
เพราะบิตคอยน์เป็นระบบไร้ผู้นำสูงสุด ทุกฝ่ายจึงมีสิทธิชูมือคัดค้านหรือสนับสนุนอย่างอิสระ
ฉากในเนื้อหาส่วนนี้คือด้านหน้าฉากของสงคราม Blocksize และเหล่าคนขับเคลื่อนที่ทำให้เกิดการแตกแยกครั้งประวัติศาสตร์ในโลกบิตคอยน์ ส่วนต่อไปเราจะได้เห็นเทคนิคล้ำ ๆ และจุดชนวนสุดเฉพาะหน้าที่ทำให้สองฝ่ายยิ่งปะทะกันอีก
แต่ก่อนจะไปรอนั้น..
ขอสรุปให้คิดกันแบบง่าย ๆ ว่า… ในโลกอันไร้ศูนย์กลางที่ต่างคนต่างตะโกนว่า
“ฉันคือเจ้าของบิตคอยน์!”
สุดท้าย “ใครกันแน่เป็นผู้ตัดสินทิศทาง?” หรือแท้จริง “ชัยชนะ–ความพ่ายแพ้” ก็ไม่มีอยู่จริงในสงครามแบบนี้...
เอาจริง ๆ การตัดสินใจของไม่กี่คน หรือการร่วมตัวของยูสเซอร์กระจัดกระจาย ก็ล้วนมีสิทธิเปลี่ยนอนาคตของเงินดิจิทัลได้ทั้งสิ้น จึงเป็นเสน่ห์และความโกลาหลของ “decentralization” ที่น่าหลงใหล
ไม่มีใครสั่งใครได้เต็มร้อย แต่ก็ไม่มีใครจะหยุดคนอื่นได้หมดเช่นกัน
เมื่อมองย้อนกลับไป.. นี่แหละเป็นบทเรียนสำคัญว่าบิตคอยน์ไม่ได้เป็นของใครคนเดียว และถ้าวันหนึ่งไฟสงครามลุกลามขึ้นอีกรอบ เราทุกคนจะรับมือกันยังไง?
ตอนนี้สงครามอาจดูเงียบ ๆ แต่ก็ไม่ได้ปิดฉากสนิท เพราะคลื่นใต้น้ำยังพร้อมระอุขึ้นได้ตลอด
เวลาเท่านั้นที่จะบอกว่า SegWit จะพิสูจน์ตัวเองได้ไหม หรือฝ่าย Hard Fork จะกลับมาโดดเด่นอีกครั้ง
จึงมีแต่คำถามค้างคาว่า.. อีกหน่อยบิตคอยน์จะยังเป็นบิตคอยน์ในแบบที่เรารู้จัก? หรือจะเปลี่ยนโฉมตามรอยแผลที่สงคราม Blocksize ทิ้งไว้?
คอยติดตามกันต่อไปในบทความตอนที่ 2
เพราะนี่อาจเป็นวัฏจักรที่ยังไม่รู้วันสิ้นสุดจริง ๆ ก็ได้ครับ...
-
@ 207ad2a0:e7cca7b0
2025-01-07 03:46:04Quick context: I wanted to check out Nostr's longform posts and this blog post seemed like a good one to try and mirror. It's originally from my free to read/share attempt to write a novel, but this post here is completely standalone - just describing how I used AI image generation to make a small piece of the work.
Hold on, put your pitchforks down - outside of using Grammerly & Emacs for grammatical corrections - not a single character was generated or modified by computers; a non-insignificant portion of my first draft originating on pen & paper. No AI is ~~weird and crazy~~ imaginative enough to write like I do. The only successful AI contribution you'll find is a single image, the map, which I heavily edited. This post will go over how I generated and modified an image using AI, which I believe brought some value to the work, and cover a few quick thoughts about AI towards the end.
Let's be clear, I can't draw, but I wanted a map which I believed would improve the story I was working on. After getting abysmal results by prompting AI with text only I decided to use "Diffuse the Rest," a Stable Diffusion tool that allows you to provide a reference image + description to fine tune what you're looking for. I gave it this Microsoft Paint looking drawing:
and after a number of outputs, selected this one to work on:
The image is way better than the one I provided, but had I used it as is, I still feel it would have decreased the quality of my work instead of increasing it. After firing up Gimp I cropped out the top and bottom, expanded the ocean and separated the landmasses, then copied the top right corner of the large landmass to replace the bottom left that got cut off. Now we've got something that looks like concept art: not horrible, and gets the basic idea across, but it's still due for a lot more detail.
The next thing I did was add some texture to make it look more map like. I duplicated the layer in Gimp and applied the "Cartoon" filter to both for some texture. The top layer had a much lower effect strength to give it a more textured look, while the lower layer had a higher effect strength that looked a lot like mountains or other terrain features. Creating a layer mask allowed me to brush over spots to display the lower layer in certain areas, giving it some much needed features.
At this point I'd made it to where I felt it may improve the work instead of detracting from it - at least after labels and borders were added, but the colors seemed artificial and out of place. Luckily, however, this is when PhotoFunia could step in and apply a sketch effect to the image.
At this point I was pretty happy with how it was looking, it was close to what I envisioned and looked very visually appealing while still being a good way to portray information. All that was left was to make the white background transparent, add some minor details, and add the labels and borders. Below is the exact image I wound up using:
Overall, I'm very satisfied with how it turned out, and if you're working on a creative project, I'd recommend attempting something like this. It's not a central part of the work, but it improved the chapter a fair bit, and was doable despite lacking the talent and not intending to allocate a budget to my making of a free to read and share story.
The AI Generated Elephant in the Room
If you've read my non-fiction writing before, you'll know that I think AI will find its place around the skill floor as opposed to the skill ceiling. As you saw with my input, I have absolutely zero drawing talent, but with some elbow grease and an existing creative direction before and after generating an image I was able to get something well above what I could have otherwise accomplished. Outside of the lowest common denominators like stock photos for the sole purpose of a link preview being eye catching, however, I doubt AI will be wholesale replacing most creative works anytime soon. I can assure you that I tried numerous times to describe the map without providing a reference image, and if I used one of those outputs (or even just the unedited output after providing the reference image) it would have decreased the quality of my work instead of improving it.
I'm going to go out on a limb and expect that AI image, text, and video is all going to find its place in slop & generic content (such as AI generated slop replacing article spinners and stock photos respectively) and otherwise be used in a supporting role for various creative endeavors. For people working on projects like I'm working on (e.g. intended budget $0) it's helpful to have an AI capable of doing legwork - enabling projects to exist or be improved in ways they otherwise wouldn't have. I'm also guessing it'll find its way into more professional settings for grunt work - think a picture frame or fake TV show that would exist in the background of an animated project - likely a detail most people probably wouldn't notice, but that would save the creators time and money and/or allow them to focus more on the essential aspects of said work. Beyond that, as I've predicted before: I expect plenty of emails will be generated from a short list of bullet points, only to be summarized by the recipient's AI back into bullet points.
I will also make a prediction counter to what seems mainstream: AI is about to peak for a while. The start of AI image generation was with Google's DeepDream in 2015 - image recognition software that could be run in reverse to "recognize" patterns where there were none, effectively generating an image from digital noise or an unrelated image. While I'm not an expert by any means, I don't think we're too far off from that a decade later, just using very fine tuned tools that develop more coherent images. I guess that we're close to maxing out how efficiently we're able to generate images and video in that manner, and the hard caps on how much creative direction we can have when using AI - as well as the limits to how long we can keep it coherent (e.g. long videos or a chronologically consistent set of images) - will prevent AI from progressing too far beyond what it is currently unless/until another breakthrough occurs.
-
@ 5579d5c0:db104ded
2025-01-07 00:33:11Until the release of Fiat Food by Matthew Lysiak and Saifedean Ammous, I struggled to connect the dots between the monetary system and the current diabesity epidemic.
This book provided the historical context and the economic mechanisms behind the decline in public health, revealing how inflation (a subtle form of theft) has eroded not just our wealth but also our health.
What is Fiat Health?
Fiat Health refers to a health paradigm shaped and controlled by centralised authorities, corporate interests, and profit-driven systems, analogous to how fiat money operates in the financial world.
It prioritises cheap, scalable, and industrialised solutions at the expense of long-term well-being, often sacrificing nutrient-dense, ancestral practices for convenience and mass production.
Inflation and Health
Inflation is often framed as a purely economic phenomenon, but its effects ripple into every aspect of our lives, including our health.
Just as gradual 2% to 3% annual weight gain can go unnoticed until a heart attack hits, the 2% to 3% annual reduction in purchasing power caused by inflation often escapes scrutiny until the cumulative impact becomes undeniable.
Between 2019 and 2023, the cost of a 300g ribeye steak from my local farmer rose by 79%, from £8.23 to £14.75. Meanwhile, my wages only increased by 14% during the same period.
Put simply my purchasing power and ability to buy nutrient dense food was reduced.
This disparity means that nutrient-dense foods like meat, eggs, and seafood are increasingly out of reach for many people and they have to work harder for their money meaning less time outdoors, less sleep and more stress.
Instead, they are forced to turn to cheaper, ultra-processed foods that are nutrient-depleted but calorie-dense. These foods contribute to the steady rise in chronic conditions like type 2 diabetes, obesity, and metabolic syndrome.
How fiat money shapes health systems
The link between fiat money and health outcomes is rooted in the incentives of those who control the money supply.
Governments, reliant on cheap credit from money printing, align with industries that benefit from mass production such as agri-food giants, pharmaceutical companies, and even medical institutions.
Universities and journals reinforce these trends, promoting sun avoidance and guidelines that prioritise grains, seed oils, and sugar over nutrient-dense options like meat, eggs, seafood and dairy.
The result is a public health crisis.
We are told to avoid the sun, eat low-fat diets, and prioritise grains, all while being sold processed foods as “healthy options.”
These recommendations, driven by profit rather than science, have contributed to widespread metabolic dysfunction.
Less than 10% of adults today have optimal metabolic health.
How to break free
To break free from this cycle, we must reject fiat health and embrace the principles of low-time preference health, focusing on long-term health fundamentals rather than short-term gratification and convenience.
- Go outside: Sensible sun exposure is the cheapest most effective way to improve your health. In my opinion this is more important aspect of health which is often overlooked. More light improves hormonal balance, boosts mood, and enhances metabolic health.
- Base your diet on nutrient-dense foods: Prioritise meat, eggs, dairy, seafood and add in fruit, vegetables, nuts, seeds, whole carbs. These are rich in essential fats, proteins, and micronutrients that your body needs to thrive.
- Avoid Ultra-Processed foods: Cut out cheap grains, sugar, and seed oils. These foods are cheap to produce but costly to your health.
- Support local and regenerative agriculture: Buying from local farmers not only improves the quality of your diet but also decentralises food production, aligning with the principles of Bitcoin.
How Bitcoin fixes this
Bitcoin offers a way out.
The principles of decentralisation, transparency, and resistance to inflation can be applied not only to money but also to health.
Just as Bitcoin restores individual sovereignty over wealth: sunlight, nutrient-dense & locally sourced foods restores sovereignty over health.
By adopting Bitcoin, you can preserve you purchasing power and reject fiat health.
You align yourself with a system that values long-term sustainability over short-term gain.
It’s time to question the narratives we’ve been fed by governments, corporations, and institutions.
It’s time to take back control of our wallets, our health, and our futures.
- Chris
If this resonates with you, I highly recommend reading Fiat Food. It’s a brilliantly researched and written book that connects the dots between money, food, and health.
I also offer health coaching services for busy individuals looking to take control of their health and navigate the fiat health system.
Book a free call with me here: https://calendly.com/hello-chrispatrick
-
@ d34e832d:383f78d0
2025-01-06 23:44:40Lets explore three key aspects of Bitcoin technology to enhance your engagement with the ecosystem:
- Running an Alby Hub Cloud Instance
- Setting Up a Nutshell Ecash Mint on an Affordable VPS
- Integrating Nostr Wallet Connect for Seamless Tipping
These components empower users to manage transactions, ensure privacy, and facilitate smooth interactions within the Bitcoin and Nostr communities.
1. Running an Alby Hub Cloud Instance
Purpose and Benefits:
Alby Hub is a self-custodial Lightning wallet that allows you to manage Bitcoin transactions efficiently. By running an Alby Hub instance in the cloud, you gain 24/7 online access to receive payments via a Lightning address, integrate with various applications, and maintain control over your funds without the need for personal hardware.
Setting Up Alby Hub in the Cloud:
-
Choose Alby Cloud: For a hassle-free setup, Alby offers a cloud service where you can start your own hub in just 2 minutes. Give it A Try: Alby Cloud
-
Subscription Benefits: Subscribing to Alby Cloud provides you with a self-custodial Lightning wallet, 24/7 online access, exclusive partner deals, priority support, and access to a subscriber community.
-
Getting Started: Visit the Alby Cloud page, select the subscription that suits you, and follow the guided setup process to have your hub up and running quickly.
- Alby Cloud page
For a visual guide on setting up Alby Hub, you can watch the following tutorial:
2. Setting Up a Nutshell Ecash Mint on an Affordable VPS
Purpose and Benefits:
Nutshell is an implementation of Ecash, a digital cash system that prioritizes privacy and anonymity. Setting up a Nutshell Ecash mint on a Virtual Private Server (VPS) allows you to operate your own mint, enhancing transaction privacy and providing a backup system for your Bitcoin transactions.
Setting Up on a $5 VPS:
-
Select a VPS Provider: Choose an affordable VPS provider that supports Bitcoin and Nostr communities. For instance, SatoshiHost offers VPS services tailored for such needs.
-
Install Nutshell: After setting up your VPS, install the Nutshell software by following the official installation guide.
- Nutshell
-
Configure the Mint: Set up the mint parameters, including denomination and security settings, to suit your requirements.
-
Secure the Server: Implement security measures such as firewalls and regular updates to protect your mint from potential threats.
- Recommendations
- Server Tips
3. Integrating Nostr Wallet Connect for Seamless Tipping
Purpose and Benefits:
Nostr Wallet Connect (NWC) is an open protocol that enables applications to interact with Bitcoin Lightning wallets. Integrating NWC allows for seamless tipping and payments within Nostr apps, enhancing user experience and promoting engagement.
Integration Steps:
-
Choose a Supporting App: Select a Nostr app that supports NWC, such as Amythystor Damus.
-
Connect Your Wallet: Use NWC to link your preferred Lightning wallet to the Nostr app. This connection facilitates seamless payments without the need to switch between applications.
-
Test the Integration: Perform a test transaction to ensure that the tipping functionality works as intended.
-
Maintain Security: Regularly update your wallet and Nostr app to incorporate the latest security features and improvements.
For a deeper understanding of Nostr Wallet Connect and its significance, you can watch the following discussion:
Final Thoughts On Setup
Implementing these components enhances your interaction with the Bitcoin ecosystem by providing efficient transaction management, improved privacy, and seamless integration with Nostr applications. By running an Alby Hub cloud instance, setting up a Nutshell Ecash mint on an affordable VPS, and integrating Nostr Wallet Connect, you contribute to a more robust and user-friendly Bitcoin environment.
Invitation for Feedback
I encourage you to share any questions or feedback regarding these topics. Let's continue the conversation to explore how we can further engage with and improve upon these technologies.
-
@ dd664d5e:5633d319
2025-01-06 20:36:17Ingredients
- 1 kg of pork roast with rind, such as shoulder or a lean belly
- 1 bottle of beer, light or dark
- chopped German-style mirepoix (best combination, for this recipe, includes celery root, carrot, red onion, and leeks)
- salt, pepper, nutmeg
- 1 diced garlic clove
Directions
- Spread the vegetables on the bottom of the roasting pan.
- Pour half the beer over the roast. (Drink the other half.)
- Season the meat, to taste.
- Roast the meat at 180 °C, until done (depends upon the weight of the roast).
- Remove the meat from the oven, and wrap in aluminum foil.
- Pour 2-3 cups of water into the roasting pan.
- Pour/scrape everything from the pan into a sieve over a sauce pot.
- Press the vegetables against the sieve, with the back of a spoon, to ensure that you get all that good dripping flavor into the sauce.
- Defat the sauce with a grease separator, then pour it back into the pot.
- Thicken the sauce, slightly (it should remain slightly watery, and not turn into a gravy), according to your usual method.
- Open the foil and slice the roast.
- Serve with the sauce.
-
@ b83e6f82:73c27758
2025-01-06 19:49:11Citrine 0.7.0
- Update quartz dependency
- Check if events are deleted
- Recover service after crash
- Add back button in the events screen
- Fix delete old events
- Fix backup dialog showing up again
Download it with zap.store, Obtainium, f-droid or download it directly in the releases page
If you like my work consider making a donation
Verifying the release
In order to verify the release, you'll need to have
gpg
orgpg2
installed on your system. Once you've obtained a copy (and hopefully verified that as well), you'll first need to import the keys that have signed this release if you haven't done so already:bash gpg --keyserver hkps://keys.openpgp.org --recv-keys 44F0AAEB77F373747E3D5444885822EED3A26A6D
Once you have his PGP key you can verify the release (assuming
manifest-v0.7.0.txt
andmanifest-v0.7.0.txt.sig
are in the current directory) with:bash gpg --verify manifest-v0.7.0.txt.sig manifest-v0.7.0.txt
You should see the following if the verification was successful:
bash gpg: Signature made Fri 13 Sep 2024 08:06:52 AM -03 gpg: using RSA key 44F0AAEB77F373747E3D5444885822EED3A26A6D gpg: Good signature from "greenart7c3 <greenart7c3@proton.me>"
That will verify the signature on the main manifest page which ensures integrity and authenticity of the binaries you've downloaded locally. Next, depending on your operating system you should then re-calculate the sha256 sum of the binary, and compare that with the following hashes:
bash cat manifest-v0.7.0.txt
One can use the
shasum -a 256 <file name here>
tool in order to re-compute thesha256
hash of the target binary for your operating system. The produced hash should be compared with the hashes listed above and they should match exactly -
@ eee391ee:8d0b97c2
2025-01-06 19:38:53Amber 3.1.0
- Fix bunker requests showing up again after accepting
- Move bunker and nostrconnect to its own files
- Fix a infinite loop when receiving bunker requests
- Show relays after the app is connected
- Recover service when app crashes
- Update quartz dependency
- Fix ui contrast when using dark theme
Download it with zap.store, Obtainium, f-droid or download it directly in the releases page
If you like my work consider making a donation
Verifying the release
In order to verify the release, you'll need to have
gpg
orgpg2
installed on your system. Once you've obtained a copy (and hopefully verified that as well), you'll first need to import the keys that have signed this release if you haven't done so already:bash gpg --keyserver hkps://keys.openpgp.org --recv-keys 44F0AAEB77F373747E3D5444885822EED3A26A6D
Once you have his PGP key you can verify the release (assuming
manifest-v3.1.0.txt
andmanifest-v3.1.0.txt.sig
are in the current directory) with:bash gpg --verify manifest-v3.1.0.txt.sig manifest-v3.1.0.txt
You should see the following if the verification was successful:
bash gpg: Signature made Fri 13 Sep 2024 08:06:52 AM -03 gpg: using RSA key 44F0AAEB77F373747E3D5444885822EED3A26A6D gpg: Good signature from "greenart7c3 <greenart7c3@proton.me>"
That will verify the signature on the main manifest page which ensures integrity and authenticity of the binaries you've downloaded locally. Next, depending on your operating system you should then re-calculate the sha256 sum of the binary, and compare that with the following hashes:
bash cat manifest-v3.1.0.txt
One can use the
shasum -a 256 <file name here>
tool in order to re-compute thesha256
hash of the target binary for your operating system. The produced hash should be compared with the hashes listed above and they should match exactly. -
@ fd78c37f:a0ec0833
2025-01-06 13:28:13The rise of Bitcoin and cryptocurrencies has reshaped the global financial system, igniting new possibilities for innovation and development. In North America, a region at the forefront of technological advancements and economic influence, Bitcoin communities have played a pivotal role in advancing the adoption and utilization of digital currencies. These communities are engaged in a wide array of activities, from fostering education and providing technical support to promoting business opportunities and advocating for policy changes. This article will highlight 23 Bitcoin communities across North America, shedding light on their latest achievements and future ambitions in driving the expansion of Bitcoin technology, education, and economic empowerment. It offers readers a comprehensive understanding of the North American Bitcoin ecosystem and its significant influence on the global stage.
Thank you, nostr:npub1yzvxlwp7wawed5vgefwfmugvumtp8c8t0etk3g8sky4n0ndvyxesnxrf8q decentralized media client on Nostr to support people in owning their voice. #iOS #Android, for supporting the publication of the Bitcoin Community Newsletter. Most of the content has been reviewed and confirmed by the South American communities. If there are any omissions, please feel free to reach out to me.
1.PlebLabs nostr:npub1an84q6c03wml5lf0uwcqcr20ydwv0t0lvv0xktlcfs9seattef8sdhz6yg * Introduction PlebLab is a hacker space and community accelerator based in Austin, Texas, dedicated to supporting the next generation of Bitcoin developers and startups. It brings together developers, hackers, creatives, and open-source builders to create a collaborative and innovative environment. PlebLab offers workshops, hackathons, and Startup Days to foster learning and growth within the Bitcoin ecosystem. By providing exposure, mentorship, and collaboration opportunities, PlebLab helps early-stage Bitcoin projects succeed. Its core philosophy is to support free and open-source development, driving innovation and progress within the Bitcoin space. * Latest Updates Recently, the PlebLab has continued to make significant strides in driving Bitcoin innovation and entrepreneurship. They have launched the second season of Top Builder, with a series of top-tier workshops focusing on Bitcoin Accounting, Bitcoin UX & UI Design, Bitcoin Marketing and Media, and more. These workshops aim to discover the next generation of Bitcoin industry startups, with participants having the chance to win up to $15,000 in BTC. The events will bring together Bitcoin developers and entrepreneurs, providing opportunities for showcasing ideas and networking. Additionally, PlebLab will host workshops related to Bitcoin technology and applications, helping members deepen their understanding of Bitcoin Core and enhance their development skills.
2.BAYAREA * Introduction Bay Area Bitcoin Users is a community formed by the people, for the people, aimed at providing an open and inclusive platform for all Bitcoin enthusiasts. The community regularly hosts events in the Bay Area, offering a space to share ideas, opinions, memes, and have relaxed discussions. It’s a great fit for anyone looking to dive deeper into Bitcoin technology or simply enjoy gatherings with like-minded individuals. * Latest Updates Recently, the Bay Area Bitcoin Users community hosted a Bitcoin Holiday Party at Eve (1535 Folsom St) in San Francisco, California. The event featured a Socratic seminar co-hosted by BitDevs and LitDevs at Digital Garage, followed by a festive celebration with music, snacks, a bar, and Bitcoin-related interactions. Designed as a family-friendly gathering, the event welcomed children accompanied by guardians, even though no specific activities for kids were organized.
3.Ann Arbor Bitcoin nostr:npub1j4dvdn24dp963f4sfak0g6nz0chnw8tyglvs3pn9gqhhhfukmrfsyznne7 * Introduction Ann Arbor Bitcoin is a community-focused organization based in Ann Arbor, Michigan, dedicated to fostering Bitcoin adoption and engagement. The group hosts regular meetups and events, providing a platform for Bitcoin enthusiasts to share knowledge and exchange ideas. * Latest Updates Recently, there have been no new updates from the community, with the latest event dating back to December 2022, which encouraged everyone to join their Telegram group to stay updated on all the latest news about meetups.
4.Bit Miami * Introduction BitMiami is a vibrant community dedicated to exploring and learning about the Bitcoin ecosystem in South Florida. * Latest Updates Recently, the BitMiami community has shared various Bitcoin-related events and updates. They highlighted Bitcoin Vortex Week in Miami and also focused on the HODLween event. BitMiami continues to support the growth of the South Florida Bitcoin community by reposting valuable content from local Bitcoin enthusiasts and organizations. They also encourage community members to actively engage with the Bitcoin ecosystem through meetups and educational opportunities.
5.Seattle Bitcoin and Beer nostr:npub1x2dm3cwqt0v9tqlf0ppzztaskn3th2x40p33hepl8rkwdgedw8eshypm5s * Introduction Seattle Bitcoin and Beer is a community that brings together Bitcoin enthusiasts and freedom lovers in Seattle. They regularly meet to discuss Bitcoin and build strong local connections in a city that may not always embrace freedom. The group fosters collaboration while enjoying good beer along the way. * Latest Updates Recently, the Seattle Bitcoin and Beer community hosted a monthly meetup on December 26th at the Old Stove Brewery on Nickerson St. Ship Canal, aiming to expand the sovereignty of the Bitcoin user network in the Great Northwest. Although this wasn't a cryptocurrency-exclusive meetup, participants gathered in a relaxed atmosphere to discuss Bitcoin and strengthen community connections.
6.Bitcoin Aruba * Introduction Bitcoin Aruba is a community dedicated to promoting the use and acceptance of Bitcoin across the beautiful island of Aruba. Their mission is to encourage local businesses and individuals to embrace Bitcoin as a payment option, creating a vibrant ecosystem where people can experience the freedom and potential of decentralized currency.. * Latest Updates Recently, the Bitcoin Aruba community has shared various Bitcoin-related updates on Twitter. They highlighted and reposted content from several Bitcoin initiatives, including the StackSats 250k Sat giveaway, BTCPay Server’s holiday greetings, and discussions on the importance of running your own Bitcoin node. Additionally, Bitcoin Aruba has been encouraging community members to actively engage in the Bitcoin ecosystem, with a focus on topics like node operation and privacy protection.
7.Bitcoin Beach Yucatan nostr:npub1w2my0n7rklzdgw7anjdnssq8mjzkpr54apqeg3pk9qjauu9dt26smyydvm * Introduction Bitcoin Beach Yucatán is a community dedicated to promoting Bitcoin education and adoption throughout the Yucatán state. * Latest Updates Recently, there have been no new updates from the community. The latest event dates back to Oct 2024, when they shared a post calling for help for the disaster-stricken area of Sisal, requesting food, clothing, and other essential supplies.
8.Bitcoin Brunch Miami * Introduction Bitcoin Brunch Miami is a community where Bitcoin enthusiasts gather every Sunday for casual discussions over brunch. * Latest Updates Recently, there have been no new updates from the community on twitter, The latest event dates back to July 2023. However, Bitcoin Brunch Miami has already hosted five brunch discussions in December.
9.Bitcoin Charlotte nostr:npub1p7g986pc56qmvryplgzka0fsrpuwlk6mxk3h686w4e46n74e56qqhz88vk * Introduction Bitcoin Charlotte is a community for those passionate about Bitcoin, decentralization, privacy, and freedom. It provides opportunities to connect with individuals at the forefront of this transformative technology through social events, workshops, and online hangouts. The community’s mission is to educate and empower people to break free from financial dependence on banks and governments by embracing Bitcoin, the most superior form of money in history. * Latest Updates Recently, the Bitcoin Charlotte community hosted several events, including an in-person meetup at Southern Strain Brewery in Plaza Midwood, where members connected with like-minded individuals and celebrated Bitcoin's potential for financial liberation by purchasing beer with Bitcoin. Additionally, the community held an online Bitcoin meetup and knowledge-sharing session on December 2, further promoting Bitcoin education and awareness.
10.Bitcoin Ciudadela * Introduction Bitcoin Ciudadela is focused on transforming San Cristóbal de las Casas and Chiapas into strongholds for Bitcoin adoption and education. The community aims to build a robust network of Mexican Bitcoiners who are united in promoting the benefits of decentralized finance and empowering individuals with knowledge about Bitcoin. * Latest Updates Recently, there have been no new updates from the community. The latest event dates back to Apr 2024, when they shared a post criticizing those who supported restrictions on freedom and praised those who fought for liberty, questioned authority, and stood against oppression.
11.Bitcoin Jungle nostr:npub14f26g7dddy6dpltc70da3pg4e5w2p4apzzqjuugnsr2ema6e3y6s2xv7lu * Introduction Bitcoin Jungle is an open-source community project built on the Bitcoin Lightning Network, aiming to create a circular Bitcoin economy. It supports individuals and businesses by providing education, resources, and technology to drive Bitcoin adoption. Starting in the Golden Triangle region of Costa Rica, the project strives to set an example for Bitcoin communities. The goal is to establish a sustainable Bitcoin ecosystem for communities worldwide. * Latest Updates Recently, Bitcoin Jungle is actively preparing for the next Bitcoin Freedom Festival, which will take place from February 20th to 24th, 2025, at the Awake Earth Festival in Uvita, Costa Rica. The event will combine Bitcoin seminars with a music festival, lectures, and discussions, aiming to attract new audiences to the Bitcoin space in a unique and engaging way.
12.Bitcoin Lake Guatemala nostr:npub1a4excy7uf9z3mcafvm9cwdr549dl5lpazuvpr2nc550vf27n5a4scqq5k2 * Introduction Bitcoin Lake Guatemala is a Bitcoin community located in Guatemala, focused on promoting the use and education of Bitcoin in the Lake Atitlán region. By supporting local businesses in adopting Bitcoin payments and providing educational resources, the community aims to build a sustainable economy based on Bitcoin. * Latest Updates Recently, the community has shared one update,this post celebrates the continued growth and resilience of the Bitcoin movement, marking a significant milestone for the community.
13.Round Rock Bitcoiners nostr:npub17ysayggwumkpkpgsq75axd7ed9guw03wz9jldz5d0zrkgz0cja2qd09tzu * Introduction Round Rock Bitcoiners is a Bitcoin community in Round Rock, Texas, dedicated to promoting Bitcoin knowledge and adoption. Through monthly meetups and resource sharing, the group supports individuals and small businesses in adopting Bitcoin and fosters a local peer-to-peer network. * Latest Updates Recently, The Round Rock Bitcoiners community has been actively organizing events to promote Bitcoin education and strengthen community bonds. Recently, they hosted a screening of the film No More Inflation, exploring the future of money and inflation-free solutions, followed by a Bitcoin-themed happy hour. Additionally, they announced the second biennial Base58 Bitcoin LARP event, offering participants a unique experience of hands-on learning, networking, and fun. Additionally, they shared posts addressing KYC privacy risks, critical discussions about the IRS, the legacy of cypherpunk ideals, and new features in the Bitcoin ecosystem, such as Zaps integration with the Rumble platform.
14.SacTown Bitcoin * Introduction Sactown Bitcoiners is a Bitcoin-focused community with members from across the Greater Sacramento region. The group hosts two monthly events: a discussion and member-led presentation at the Arden-Dimick Library on the 4th Thursday and a social gathering at a brewery or restaurant on the 2nd Thursday. Discussions revolve around Bitcoin, covering topics like money, hope, and the future under a Bitcoin standard. Open to Bitcoin enthusiasts, beginners, and maximalists alike, the community maintains a strict “Bitcoin only” policy, creating a dedicated space for pure Bitcoin conversations. * Latest Updates Recently, SacTown Bitcoin hosted a Christmas Party and highlighted Bitcoin's transformative impact. On December 12, 2024, SacTown Bitcoin hosted the Sactown Bitcoiners Christmas Party at Turkovich Family Wines Tasting Room. The event featured a potluck, a white elephant gift exchange (participants were asked to bring a gift worth approximately $20), and a raffle. Additionally, SacTown Bitcoin has been focusing on the profound impact of Bitcoin on personal financial understanding and its potential to disrupt economic inequalities. They have shared posts highlighting insights from financial and investment professionals inspired by Bitcoin, as well as discussions on how Bitcoin empowers ordinary people to benefit from asset growth.
15.San Diego Bitcoiners * Introduction San Diego Bitcoiners is a community dedicated to learning and discussing Bitcoin, providing a platform for anyone interested in the cryptocurrency. Established during the COVID-19 pandemic, the community hosts monthly events featuring guest speakers, brief presentations, or casual conversations. Meetings are held every second Thursday of the month at Quantum Brewing in Kearny Mesa, welcoming all Bitcoin enthusiasts. * Latest Updates Recently, San Diego Bitcoiners have been actively engaged in promoting Bitcoin education and fostering community interaction. They were featured in a local news article as the oldest running Bitcoin meetup in San Diego. The community has been sharing important reminders, such as testing Bitcoin wallet backups every six months. They also continue to host regular meetups, with a focus on practical demonstrations, including CoinJoin and wallet integrations like Sparrow Wallet and JoinMarket. The latest meetup took place in December at Quantum Brewing, where members gathered to discuss Bitcoin and explore new tools in the ecosystem.
16.SLC-BTC * Introduction The SLC-BTC community focuses on Bitcoin and the Lightning Network, welcoming participants of all experience levels. Regular meetups feature discussions on topics such as Bitcoin protocol, software, economics, self-custody, and mining. Whether you're a newcomer or an experienced user, the community encourages open dialogue and answers any Bitcoin-related questions. * Latest Updates Recently, the SLC-BTC community hosted a series of successful events, including a Christmas party, thanks to the active participation and support of its members. During the party, the community offered a variety of giveaways and collaborated with several partners. Additionally, the community organized a Christmas Potluck Party and celebrated the milestone of Bitcoin's price breaking 100K. SLC-BTC continues to provide opportunities for Bitcoin enthusiasts to connect, learn, and grow together.
17.Topeka Bitcoin * Introduction The Topeka Bitcoin Meet-up aims to expand knowledge and awareness within the community. Hosted at local businesses, the group discusses topics such as Bitcoin (network vs asset), the Lightning Network, running a full node, self-custody, and accumulation strategies. Additionally, the community explores Bitcoin literature, podcasts, and other relevant topics. * Latest Updates Recently, the Topeka Bitcoin community shared some interesting Bitcoin-related insights and updates on Twitter. Members celebrated the new year, highlighting the concept of "time is money" and encouraging everyone to accumulate at least 31,536,000 Sats this year (one sat per second). The community also discussed the concept of "sat/cent parity," offering a unique perspective on Bitcoin's value. Additionally, Topeka Bitcoin shared creative activities related to Bitcoin, such as Bitcoin-friendly cruise line initiatives.
18.Vancouver Bitcoiners * Introduction The Vancouver Bitcoin community is a dedicated group of Bitcoin enthusiasts actively engaging in events like Bitdevs and more. With the motto “Splendor Sine Inflatione” (Splendor Without Inflation), the community focuses on fostering knowledge and connections around Bitcoin. * Latest Updates Recently, the Vancouver Bitcoiners community has been actively involved in advocating for Vancouver to become a Bitcoin-friendly city. Community members have supported Mayor Ken Sim's proposal to invest in Bitcoin and have participated in backing the city council's Bitcoin-friendly motion. Additionally, the community has voiced concern over the Bitcoin mining ban in British Columbia, suggesting the use of local renewable energy sources like tidal, wind, and solar power for Bitcoin mining to expand the grid and utilize excess heat from mining rigs. During the council's discussions, the community also supported the idea of Vancouver building a Bitcoin reserve, despite the associated risks.
19.Victoria Bitcoin * Introduction Victoria Bitcoin is a community that regularly hosts Bitcoin-focused meetups and BitDevs seminars, typically held one to two times a month. These events are free and open to the public, providing opportunities for discussion, learning, and networking. Community members can also win prizes from Canada's Bitcoin self-custody pioneers, Bull Bitcoin and Coinkite. The community places a strong emphasis on privacy, with all discussions following Chatham House rules. * Latest Updates Recently, the Victoria Bitcoin community has been actively hosting several Bitcoin-related events, fostering interaction and engagement among local Bitcoin enthusiasts. The community regularly organizes “Bitcoin & Coffee” meetups, providing members with opportunities to discuss Bitcoin. The most recent event was scheduled for December 22 at Discovery Coffee. Additionally, the community hosted an exciting Christmas party on December 13, where attendees enjoyed free pizza, beer, and champagne, and Christmas gifts were purchased with Bitcoin, showcasing the practical use of Bitcoin in everyday life. The event also included a Bitcoin giveaway for lucky participants..
20.Michigan Bitcoin Meetup in Benton Harbor * Introduction Michigan Bitcoin Meetup in Benton Harbor is a community focused on exploring Bitcoin's impact on investing, entrepreneurship, and self-sovereignty. It provides a platform for like-minded individuals to connect, learn, and share ideas. * Latest Updates Recently, there have been no new updates from the community. The latest event dates back to Nov 2024, which Announced Bitcoin Meetup Night in Benton Harbor on Thursday, November 21.
21.Western Mass Bitcoin Meetup nostr:npub1xgyjasdztryl9sg6nfdm2wcj0j3qjs03sq7a0an32pg0lr5l6yaqxhgu7s * Introduction Western Mass Bitcoin Meetup is a community focused on connecting local bitcoiners, promoting bitcoin education, and increasing merchant adoption. The group hosts monthly meetups and offers support for newcomers in areas like self-custody, Lightning Network, and mining. * Latest Updates Recently, the Western Mass Bitcoin Meetup has been actively organizing events to foster community engagement and growth. On December 8th, they hosted a social meetup at Fitzwilly's in Northampton, providing a space for Bitcoin enthusiasts to connect and share ideas. Additionally, they are preparing for their 29th meetup on January 5th in East Longmeadow, continuing to offer a platform for local Bitcoin supporters to gather and collaborate.
22.Yes Bitcoin Haiti nostr:npub1mjmaggp53xan2435wdse8ts06pzfcjejfex4pxasu67kxs5hqdpsyk7hx8 * Introduction Yes Bitcoin Haiti is Haiti's first Bitcoin-only initiative, launched to empower communities through Bitcoin education and adoption. Founded by Phanor Mendelking in February 2024, the project focuses on spreading financial literacy, promoting economic growth, and building a circular Bitcoin economy. Its mission includes offering local Bitcoin certification, hosting meetups and workshops, and onboarding businesses and community members. Operating from St. Michel de l'Attalaye, it aims to drive financial inclusion and resilience in Haiti's challenging economic landscape. * Latest Updates Recently, the Yes Bitcoin Haiti community has been actively advancing Bitcoin education. The first batch of students is nearing the end of their courses, with two students leading the discussion of Chapter 10 in preparation for the upcoming final exams and graduation. Additionally, the community has showcased proof-of-work in action, reinforcing the spread of Bitcoin knowledge through student-led lessons and engagement in activities.
23.YYC Bitcoin * Introduction YYC Bitcoin is a community-focused meetup dedicated to growing, educating, and supporting the Bitcoin ecosystem in Calgary. The group hosts biweekly meetups for networking and learning, covering essential Bitcoin topics such as wallet setup, privacy, multisig, lightning, and mining. Newcomers are encouraged to visit the website to familiarize themselves with key concepts and bring their questions to future events. * Latest Updates Recently, YYC Bitcoin has actively promoted Bitcoin education and outreach through several updates. They shared the BTC Sessions year-end recap and the The 4th Annual BTC Sessions HODLiday Special, engaging community participation. Additionally, YYC Bitcoin reposted Blockstream Jade's promotional offer, encouraging the purchase of hardware wallets. The community also highlighted Bitcoin Mentor's personalized coaching services to help members better understand Bitcoin technology. Furthermore, they supported and promoted ticket sales for the Learning Bitcoin 2025 conference, further advancing Bitcoin education.
-
@ 44189afb:b62f396c
2025-01-06 11:44:06Changes
Daniel D’Aquino (20):
- Automated i18n file changes from npm run build
- Add notedeck waitlist page
- Refactor code into several smaller blocks
- Add tab component
- Add Nostr DM OTP support to Purple checkout
- Purple welcome page
- Add better troubleshooting to OTP auth
- Fix subtle purple icon issue
- Update navigation around the website
- Improve checkout refresh stability
- npm run i18n
- Improve build process
- Fix checkout and login for npubs devoid of a profile
- Fix expired session token detection and automatic logout
- Add Purple checkout maintenance mode option
- Add nix-shell support
- Notedeck alpha landing page and install instructions page
- Storybook setup for development
- Add Nostr note component
- WIP 2024 review page
William Casarin (2):
- notedeck tweaks
- 2024 damus wrapped
ashleendaly (1):
- fix good first link
pushed to damus.io:refs/heads/master
-
@ e1d968f7:5d90f764
2025-01-06 10:45:17Marketing myself online has been an unexpected, and often eye-opening, part of my journey as an independent escort. When I first started, I really didn’t know what I was getting into. I figured I’d set up a profile, promote my services, and let the rest follow. But the reality is far more nuanced, and today I want to share how I've navigated marketing myself, from my initial steps on AdultWork to discovering Nostr, and how the support I receive online has started to evolve in exciting ways.
AdultWork: Where It All Started
When I began this journey, AdultWork was the obvious place to start. It’s a platform designed specifically for escorts, offering a range of services—from profiles to booking systems, to a built-in review mechanism. For me, it was the easiest, most professional way to begin advertising myself. I created my profile, uploaded photos, and listed my services, knowing that people could easily find me if they were looking for someone like me.
What I didn’t realise at first was how much of my online identity would be shaped by AdultWork. The reviews are integral to the platform. The good ones boost my confidence, and the negative ones, though difficult at times, serve as learning opportunities. Over time, I’ve refined my profile to reflect not only my services but also who I am. I’ve become more comfortable with sharing parts of myself in my descriptions and photos, building my profile into a place that represents my personality as well as what I offer.
Still, as I grew in my career, I wanted to expand beyond the confines of a booking platform. I felt the need to tell my story more deeply and connect with people on a personal level—something I couldn’t fully do on AdultWork alone.
X: A Place to Be Real (and Sometimes Overwhelm)
For a long time, X was my go-to platform. It felt more informal, a space where I could interact with others, share thoughts, and promote my services in a less rigid way than I could on AdultWork. I loved the freedom it gave me—though I quickly realised it also had its downsides. X can feel like a constant pressure to perform, to be entertaining, to remain visible, all while managing the fine line between personal and professional.
It was easy to get lost in the need for engagement, to check the likes and retweets, to respond to the messages. At the same time, X often felt shallow. It’s a platform where posts get buried quickly, and it’s hard to get the depth of interaction I was craving. Plus, there’s always the element of online trolls and unwanted attention, which can make things feel draining. While X has its perks, I found myself wanting more—a space where I could truly share my thoughts without the limitations of brevity or constantly having to fight for visibility.
Moving to Nostr: A Platform That Feels Like Home
That’s when I discovered Nostr. Initially, I was curious, but after diving deeper into its features, I realised it was exactly what I’d been looking for. Nostr is a decentralised platform, meaning it isn’t governed by any single company or algorithm, which gives me control over my content and how it’s shared. Unlike X, which often limits the reach of your posts based on engagement, Nostr gives me the freedom to publish long-form content, something I’ve always wanted to do with Behind Closed Doors.
Nostr allows me to share my stories, reflections, and insights in a more meaningful way. There’s no character limit, no algorithms skewing what people see—just raw, real content. I can write the posts I want, whether it’s about my day-to-day experiences as an escort, lessons I’ve learned, or reflections on what it means to be in this line of work.
But what really drew me to Nostr wasn’t just its ability to support long-form content—it was the community it fosters. There’s a real sense of connection with the people who follow me there. The platform allows people to support my work directly, which brings me to something that’s made a big difference: zapping.
Zapping: A New Way to Support My Work
One of the features Nostr offers that has truly resonated with me is the ability for my followers to “zap” my posts. For those unfamiliar with the term, zapping is a way of sending small tips or donations directly to content creators in exchange for their work. It's decentralised, meaning that the money goes directly to me, and there are no middlemen or platforms taking a cut.
At first, I wasn’t sure how to feel about it. I’d always been wary of asking for support, but as I’ve gotten more comfortable with the idea, I’ve realised that it’s not about begging or asking for handouts. It’s a way for people to say, “I see you. I appreciate your work. Here’s a way for me to show my support.”
It’s been amazing to feel the direct appreciation from my followers. Some zaps have been small, others larger, but each one has meant so much. It’s not just about the money—it’s about knowing that people value my work enough to contribute. It feels like a true exchange, where my content isn’t just for a transactional purpose but is actually connecting with people on a deeper level.
For me, this is a game-changer. Not only does Nostr give me the space to create and share without restrictions, but it allows me to build an entirely different kind of relationship with my audience. I can continue sharing my journey with them and receive direct, heartfelt support in return. It’s the kind of genuine, positive reinforcement that I’ve always wanted in my work.
Why I’m Excited About the Future
As I continue to build my presence on Nostr, I’m feeling more empowered than ever. It’s freeing to know that I’m not bound by any platform’s rules or algorithms. I can share my thoughts, my experiences, and my reflections without fear of being silenced or censored. And the ability for my followers to zap my posts is allowing me to feel truly supported in this journey.
Of course, I’ll still use AdultWork and X for the more practical side of my work—booking clients and staying visible in certain spaces—but Nostr is becoming my space to create, share, and connect in a way that feels authentic. It’s a platform that understands the value of long-form content, supports decentralised communication, and allows my followers to directly support my work.
Looking ahead, I’m excited to see how my presence on Nostr evolves. It feels like the perfect space to continue my blog series Behind Closed Doors, share new insights, and explore all the complexities of my life as an escort. It’s a place where I can finally market myself on my own terms—without compromise—and where my work is truly appreciated.
So, if you’ve enjoyed reading my posts here, I encourage you to join me on Nostr. Whether you want to read more of my journey, zap my posts to show your support, or just follow along as I continue to navigate this career, I’d love to have you along for the ride. I’m so grateful to have a platform where I can truly be myself.
Rebecca x
-
@ 9d92077c:38d27146
2025-01-06 05:41:44Happy new year friends, and thank you for tuning in again to our techno-adventures.
Welcome to the first perfectly square year (2025=45²) since 1936 (=44²). Funny enough, 1936 is when Alan Turing publishedOn Computable Numbers.This is the paper that created the theoretical framework for modern computing... before any physical computer even existed! Thanks to UK copyright laws and the timing of Turing’s death, as of January 1st, 2025 this paper has entered the public domain. The foundation of computer science is now open-source. It was published on a perfect square year, and made public domain the following perfect square year. Poetic.
Here’s to hoping this year brings breakthroughs in healthy human connections with these machines.
As promised, we’ll keep things shorter this time. Onward.
Development Updates
Nostr Commerce Coordinators Whitepaper
Last month we published a paper outlining a severe limitation we found with the NIP-15 marketplace specification. We also proposed a solution, along with corresponding pull requests on Github.If you want to geek out with us you can read the full paper here.
Here’s a rough abstract:
Without a system capable of automating the process between a Customer's intent to purchase and a Merchant's acceptance, e-commerce on Nostr will not grow beyond small sales plagued with high-friction manual checkout steps. This proposal contains the groundwork for a new type of Nostr bot. A Nostr bot whose core function is handling NIP-15 checkout events automatically on behalf of a Merchant.
In plain English:
While building the functions of a real-life Nostr e-commerce store, we found a big problem causing checkout failures. This can be solved with an automated program, but we need an update to the Nostr marketplace specification to allow it to happen.
We also published home grown organic memes this month.
To be clear, lack of approval on our proposal doesn’t stop us from developing Conduit independently. We do feel a solution is needed for broader adoption, though.
This is the type of action we need to take to connect to the Nostr open-source development community and push important changes. So, expect more of these as we develop.
Joining Forces
Showing our work and reaching out to likeminded folks for comment didn’t take long to pay dividends. We’re now honored to be in a collaborative group with a few other teams developing Nostr-marketplace apps such as: - Cypher Space - Shopstr - Plebeian Market
This is the beautiful spirit of open-source collaboration at work. We’re all taking different approaches to a similar problem with the common goal of spreading freedom tech across the world. Instead of competing, we’re growing a new ecosystem together.
Open-source incentivizes this type of industry collaboration vs. the traditional competitive model. When your tech is instantly commoditized, other value vectors like brand reputation, team and operations matter a lot more. These things get better when you work together as an industry to grow your collective market share. This is common in mature commoditized industries. For example, US construction has lots of industry groups providing shared best practices to all companies. Open-source, along with the Nostr and Bitcoin protocols, incentivizes these pro-social business behaviors.
Medusa JS x Strfry Relay Accelerator
Medusais an open-source project we’ve had our eyes on since the beginning. They’ve already built out a ton of modular e-commerce solutions for folks like us looking to break the mold. Medusa provides all the features needed for modern e-commerce so you don’t need to reinvent the wheel. We’d hoped their work would provide a scaffolding for us to develop faster. Until recently, we couldn’t figure out how to tie it into a Nostr-based system without causing endless headaches.
Strfryis an efficient Nostr relay system developed by a talented Canadian programmer named Doug Hoyte. It’s currently used by most of the high traffic relays on Nostr. If you want to geek out on it, we recommend thisYouTube video of Doug’s presentation on Strfry. This was the clear relay of choice for ourConduit Commerce Coordinator(the bot system we proposed in theWhitepapermentioned above).
Last month, our tech chiefAcea Spades,pulled one out of his sleeve and got these two working together behind the scenes:
Pictured above: Conduit’s Medusa-based system successfully updating Nostr product events on a Strfry relay
He was able to update a product in Medusa, have it auto-sign a Nostr event, post it to the relay, and have the relay auto-delete the old product while keeping the new one. By doing this, he may have established the first product posting system between MedusaJS and a Nostr relay. That’s pretty cool, folks- and a huge step towards our vision of an easy to use Nostr system for merchants.
Conduit UX Sneak Peak
Last but not least, we made huge progress on our UX design through our collaboration withSantoral.
Screenshot 1 from the editing room: featuring the multi-cart HUD we’re excited to introduce.
This process has been fun and informative. While we’re spending time on the backend engineering too, Conduit is taking a UX-first approach to the build of the platform. This creative process is already paying dividends. It's helping us uncover the product design needed to give users a smooth and feature-rich experience.
The social experience is the top differentiator for a Nostr-based marketplace. This topic is front and center in all our UX working sessions.
Screenshot 2 from the editing room: showing the filter option for “My Network” vs. “Global” within a product category.
How do we show users the significance of the reputation-based content sorting system? How do we do this without taking away from a modern e-commerce experience? How can we do this in a way that’s fun and intuitive? We’re thinking about this in every working session with Santoral.
We’ll leave it there for now. Excited to share more on the UX front next month.
Upcoming Developments
Moar UX & a Landing Page
After an incredible “Phase 1” experience with Santoral, we’ve tasked them with more creative work. You can already see some of it in the screenshots above. They’re currently working on finalizing our design guidelines and applying them to the Hi-Fi wireframes. Then they'll deliver us the master Figma file for our developers to bring to life. This will include mobile screens.
We’ve got a new logo in the works, too. The fun part about our base Hamsa + Lightning logo design is we can rework it in so many ways without losing the essence:
Logo type 3/n. The alien lightning meteorite.
They’re also working with us on an updated landing page that will showcase what we’re building and tell the Conduit story visually. This page will serve as a portal to bring in a community of merchants and users who are excited about what we’re building.
Stayin’ Legal
Behind UX, our second biggest spend was on legal services. We’re going to be working with a forward thinking firm who will help us navigate the choppy regulatory waters of the Bitcoin e-commerce ocean. Beyond the normal start-up stuff, we hope for them to give us input on our designs to avoid potential pitfalls.
A wise Nostrich Lama.
We know that the platform we are building is just. We know that Nostr and Bitcoin are pro-humanity technologies. We believe them to be pro-democracy technologies as well. As we push forward, we’re bound to ruffle some feathers. So we need to make sure what we’re doing falls well within the established legal frameworks for us to survive (and thrive). Not everyone in this community will take this approach, and we respect that. But, this is the path Conduit is taking.
Plugging in Conduit.Coffee
Once we have the finalized design we’re going to start by launching and testing our own store, Conduit Coffee, on the platform. This one might be out a couple months, but it’s an important step to mention and one we’re really looking forward to!
In the meantime, don’t forget to stock up on yourConduit.Coffee.Our FOSS Friday sale was a success, and together we sent a solid bag of Christmas Bitcoin to OpenSats.In fact, we managed to sell out of our first coffee run! This is perfect, since we want to make sure we’re always delivering fresh roasted product to our followers. Thank you for your support.
Note: some of you have requested a “how-to” for Bitcoin/Lightning beginners for the current Conduit.Coffee site. We’ll get that to you in an interim bulletin soon! We’d be honored if your first Bitcoin commercial transaction was with us, and excited for you if it were to be the start of your freedom-tech journey.
Concluding 01/45²
When you’ve got a huge goal (like revolutionizing e-commerce or something like that), it’s tough to feel like you’ve accomplished anything. Especially at the beginning. Looking back on our recent developments has us motivated though. 2024 was a very creative and transformative year for us, with a lot built up under the surface preparing to show itself in 2025.
We’ve got an exciting year ahead. We wish you and your families health, wealth and happiness in the new year- whatever that uniquely means for each of you.
Please feel free toreach out to usand let us know your thoughts on anything we’ve shared. We’d love to hear from you.
Cheers,
Eric FJ- Caffeinated Operating Officer,Conduit Hodlings
Acea Spades- Caffeinated Tech Officer,Conduit Hodlings
---
Postscript: Growing the Conduit Team
We are actively seeking motivated individuals to accelerate our mission. We’re courting a few people already, but as it stands we feel there are currently roles available in the following areas: - Social Media Marketing / Community Building - Merchant Relations / Strategic Partnerships - Web Development
Please reach out to us by Nostr DM if you are inspired by our mission and interested in helping with any of the above.
-
@ 3f770d65:7a745b24
2025-01-05 18:56:33New Year’s resolutions often feel boring and repetitive. Most revolve around getting in shape, eating healthier, or giving up alcohol. While the idea is interesting—using the start of a new calendar year as a catalyst for change—it also seems unnecessary. Why wait for a specific date to make a change? If you want to improve something in your life, you can just do it. You don’t need an excuse.
That’s why I’ve never been drawn to the idea of making a list of resolutions. If I wanted a change, I’d make it happen, without worrying about the calendar. At least, that’s how I felt until now—when, for once, the timing actually gave me a real reason to embrace the idea of New Year’s resolutions.
Enter Olas.
If you're a visual creator, you've likely experienced the relentless grind of building a following on platforms like Instagram—endless doomscrolling, ever-changing algorithms, and the constant pressure to stay relevant. But what if there was a better way? Olas is a Nostr-powered alternative to Instagram that prioritizes community, creativity, and value-for-value exchanges. It's a game changer.
Instagram’s failings are well-known. Its algorithm often dictates whose content gets seen, leaving creators frustrated and powerless. Monetization hurdles further alienate creators who are forced to meet arbitrary follower thresholds before earning anything. Additionally, the platform’s design fosters endless comparisons and exposure to negativity, which can take a significant toll on mental health.
Instagram’s algorithms are notorious for keeping users hooked, often at the cost of their mental health. I've spoken about this extensively, most recently at Nostr Valley, explaining how legacy social media is bad for you. You might find yourself scrolling through content that leaves you feeling anxious or drained. Olas takes a fresh approach, replacing "doomscrolling" with "bloomscrolling." This is a common theme across the Nostr ecosystem. The lack of addictive rage algorithms allows the focus to shift to uplifting, positive content that inspires rather than exhausts.
Monetization is another area where Olas will set itself apart. On Instagram, creators face arbitrary barriers to earning—needing thousands of followers and adhering to restrictive platform rules. Olas eliminates these hurdles by leveraging the Nostr protocol, enabling creators to earn directly through value-for-value exchanges. Fans can support their favorite artists instantly, with no delays or approvals required. The plan is to enable a brand new Olas account that can get paid instantly, with zero followers - that's wild.
Olas addresses these issues head-on. Operating on the open Nostr protocol, it removes centralized control over one's content’s reach or one's ability to monetize. With transparent, configurable algorithms, and a community that thrives on mutual support, Olas creates an environment where creators can grow and succeed without unnecessary barriers.
Join me on my New Year's resolution. Join me on Olas and take part in the #Olas365 challenge! It’s a simple yet exciting way to share your content. The challenge is straightforward: post at least one photo per day on Olas (though you’re welcome to share more!).
Download on Android or download via Zapstore.
Let's make waves together.
-
@ e356a30c:11e846f7
2025-01-05 17:10:34On January 3, 2025, Bitcoin celebrated its 16th birthday, marking another year of resilience, innovation, and transformation in the world of finance. Born from the ashes of the 2008 financial crisis, Bitcoin was introduced to the world by the enigmatic Satoshi Nakamoto through a whitepaper titled "Bitcoin: A Peer-to-Peer Electronic Cash System." Since then, this cryptocurrency has evolved from a niche experiment to a fundamental component of the digital economy, challenging traditional financial systems and redefining the concept of money.
**The Genesis Block: A Message of Change ** The first Bitcoin block, known as the Genesis Block, was mined on January 3, 2009, with a message embedded within it, a headline from The Times newspaper: "Chancellor on brink of second bailout for banks." This message was not just a timestamp but a statement of Bitcoin's purpose - to offer an alternative to the centralized financial systems that had failed so many.
From Obscurity to Mainstream
In its early years, Bitcoin was largely the domain of tech enthusiasts and libertarians. Transactions were slow, the infrastructure was basic, and the value of Bitcoin was negligible. However, as more people began to understand its potential, Bitcoin's price and adoption began to soar. The first significant price increase came in 2010 when Bitcoin's value jumped from pennies to dollars, and by 2017, it reached thousands.
Surviving the Volatility
Bitcoin's journey hasn't been without turbulence. From the infamous Mt. Gox collapse to the dramatic price swings, Bitcoin has weathered storms that would have sunk other financial ventures. Yet, each crisis has only served to strengthen the network, with developers and users continuously improving security, scalability, and usability. These challenges have also brought about significant technological advancements, like the Lightning Network, which promises to solve some of Bitcoin's scalability issues.
Institutional Adoption and Regulatory Scrutiny
As Bitcoin matured, so did the interest from institutional investors and governments. Today, major companies like Tesla and MicroStrategy hold Bitcoin on their balance sheets, and financial giants like Fidelity offer Bitcoin services to their clients. This institutional embrace has been a double-edged sword, however, bringing with it regulatory scrutiny that seeks to balance innovation with consumer protection and financial stability.
Cultural Impact and Future Prospects
Bitcoin has not only influenced finance but also culture. It has given rise to a whole lexicon ("HODL", "to the moon"), inspired countless memes, and even influenced music, art, and literature. Looking forward, Bitcoin's role in the future of money could be pivotal. With countries like El Salvador adopting it as legal tender, and others exploring central bank digital currencies (CBDCs) inspired by its technology, Bitcoin's influence on global financial systems seems set to expand.
Challenges Ahead
Despite its successes, Bitcoin faces significant challenges. Environmental concerns related to its energy consumption, the need for better user experience to achieve mass adoption, and the ongoing debate about its scalability are still hurdles to overcome. Moreover, the question of how Bitcoin will integrate with or fend off future technological advancements in blockchain and beyond remains open.
Conclusion: A Teenager with a Legacy
At 16, Bitcoin is no longer just a rebellious teen in the financial world; it's a young adult with a legacy. It has proven that a decentralized, trustless system can function and thrive. As we look to the future, Bitcoin's journey will continue to be one of the most fascinating stories in economic history, potentially reshaping our understanding of value, trust, and financial sovereignty. Here's to Bitcoin, at 16 - may its next years be as revolutionary as the last.
-
@ 0c539565:97a00f7f
2025-01-05 13:55:38The unequal path to Bitcoin: Vampires, Sacrifice, and the fiat Trap
The journey to Bitcoin ownership is anything but equal, and the disparity in how individuals and institutions accumulate it is striking—and deeply unfair. When you look closely, it becomes clear that some are playing the game with loaded dice while others are sacrificing their very essence to participate.
Fiat as leverage: a rigged system
Take someone like Michael Saylor and his company, MicroStrategy. By tapping into the corrupt fiat system, they access printed money—essentially conjured out of thin air—and use it to buy Bitcoin, the hardest money humanity has ever known. They take on minimal risk. Cheap loans, often at rates below inflation, mean the real cost of their borrowing diminishes with time. For them, converting this fiat into Bitcoin is a calculated, nearly effortless move.
This is the ultimate cheat code of the fiat system:
- Unlimited Access to Capital: Institutions like these can borrow obscene amounts of money at laughably low costs. It’s a system designed to reward the already-powerful.
- Hoarding Hard Money: This borrowed fiat, a temporary and decaying asset, is transformed into Bitcoin—a scarce, unforgeable, and appreciating store of value.
The Plebeian struggle: blood, sweat, and fiat
Now compare that to the everyday Bitcoiner—the "plebs." They don’t get loans handed to them on a silver platter. Their fiat isn’t printed; it’s earned with hard work, grueling hours, and, often, at the cost of their physical and mental health. Every sat they stack represents their life force, spent and converted into sound money.
But their journey is riddled with risk and sacrifice:
- The Cruel Diminishing of Labor: Fiat earned through work loses value every day due to inflation. By the time it’s exchanged for Bitcoin, it’s worth less than it was when they earned it.
- Irreplaceable Time: Unlike an institutional loan that can be repaid or refinanced, the time and energy spent earning fiat are gone forever. These people are literally trading pieces of their lives for freedom in Bitcoin.
It’s not just a financial disparity—it’s existential. The plebs sacrifice their health, time, and effort for Bitcoin, while institutions merely shuffle numbers around, reaping immense rewards with no equivalent effort.
The "vampire attack" on Bitcoin
The term "vampire attack" isn’t just apt—it’s chillingly accurate. In cryptography, a vampire attack describes a system being drained of its resources by an external parasite. Here, the fiat system enables institutions to act as vampires, draining the lifeblood of working people while amassing Bitcoin with minimal effort.
- The healthy human (Bitcoiners): Plebs are the lifeblood of Bitcoin. They pour their heart and soul into acquiring it, sacrificing so much along the way.
- The vampire (Institutions): Institutions like MicroStrategy use fiat privileges to suck value from the system, growing their Bitcoin hoards with a fraction of the effort. They’re immortal in this setup, feeding on the sacrifices of the plebs, bite by bite, while the plebs are left drained and mortal.
A Dangerous precedent for Bitcoin
This dynamic isn’t just unfair; it’s dangerous. It risks recreating the same inequalities Bitcoin was designed to escape:
- Concentration of Power: As institutions leverage fiat to dominate Bitcoin holdings, the dream of widespread, decentralized ownership fades.
- Betrayal of Values: Bitcoin’s ethos of fairness, sovereignty, and freedom is at risk of being co-opted by the same forces it was meant to fight.
- Shadow of Influence: Large institutional holders could manipulate Bitcoin’s narrative, development, or governance in ways that serve their interests, not the greater good.
The fight for Bitcoin’s soul
Bitcoin was created to be a tool for liberation—a way to escape the exploitative fiat system. But as long as that system exists, its poison seeps into Bitcoin’s ecosystem. The plebs, who bear the brunt of this unfairness, are the true heart of Bitcoin. They give it meaning. They must remain vigilant against these "vampire" forces, ensuring that Bitcoin stays true to its purpose: a fair, decentralized, and incorruptible form of money.
The battle isn’t just about accumulating Bitcoin. It’s about preserving its soul.
\ Kim De Vos (AVB)
-
@ 0c539565:97a00f7f
2025-01-05 13:43:58Let's start writing here, for the nostr / bitcoin audience.
-
@ 55e343e6:880acd1b
2025-01-04 16:51:21In the silence of the night, I find myself confronting the immensity of the unknown universe. Against its vastness, I am nothing: a fleeting particle in a cosmos so infinite it defies comprehension. To accept this nothingness is not an act of despair but one of liberation. The universe owes me no explanation, no validation of my existence. And I, in return, owe it no pretense of grandeur. In acknowledging my insignificance, I find clarity: I am free from the burden of inflated self-importance, free to simply be.
The time given to me in this life is absurdly brief, a moment suspended between the infinite stretches of what came before and what lies ahead. The very fact that I exist, against an incalculable number of odds, is incomprehensible. My presence is a miracle of chance, and to lament its brevity is to misunderstand its value. Life’s worth is not measured by its length but by the depth of attention we give to it. Each breath is an act of defiance against the void, and every moment an invitation to embrace what is, without clinging to what could have been.
I eat every day. It is a simple, unremarkable fact for many, yet it is an extraordinary luxury when viewed against the harsh reality of the world. Nearly 9% of humanity over 700 million people live in hunger, unsure of when or if they will eat again. For me to have food, day after day, is a privilege so profound it demands humility. Gratitude is not merely an acknowledgment of this fortune; it is a responsibility to live simply and take only what I need. The less I consume, the more space I leave for others to live.
This simplicity is not deprivation; it is freedom. The less I am tethered to the material world, the lighter I feel. Dependence breeds anxiety. On wealth, on possessions, on fleeting desires. The more I cut away, the closer I come to understanding what truly matters. To need less is to live more fully, to reclaim the space within myself that is too often crowded with unnecessary wants.
I do not seek happiness. Happiness is an artificial construct, a fleeting and hollow pursuit peddled by the modern world as a false ideal. Instead, I seek peace: a state not tied to external circumstances or temporary pleasures. Peace is not the absence of pain or conflict but the ability to remain steady in their presence. Happiness is fragile; it crumbles under the weight of reality. Peace endures because it is grounded in acceptance, in the quiet embrace of what is.
Even my consciousness, this thing I so often mistake for the essence of myself, is but a mechanism, a sensory system responding to stimuli, like a plant turning toward the sun. The plant does not worship the sun, nor does a photophobic bacterium flee the light out of fear. They respond, simply and without meaning. To imagine that my awareness is more complex than this is a comforting illusion. I am not a soul adrift in cosmic meaning; I am a collection of responses, an organism interpreting its surroundings. And yet, within this simplicity, there is beauty: a beauty that does not demand purpose or permanence to exist.
In embracing these truths, I find freedom: from the weight of self-importance, from the endless chase for more, from the need to define myself through external validation. I am nothing, and I am everything. I am a moment, passing swiftly in the endless expanse of time.
To live is to accept, and in acceptance, to find peace.
-
@ e1d968f7:5d90f764
2025-01-04 11:32:14Today feels like a moment of reflection. It’s been a while since I’ve had the space to truly pause and take stock of how much I’ve changed over the past few weeks. The challenges that come with being an escort aren’t just about the work itself—they stretch into personal realms, forcing me to evolve in ways I never imagined when I first started this journey. It’s strange, in a way, how these obstacles can become stepping stones for growth, if you’re open to them. Here’s how I've navigated a few of the challenges that have shaped me so far.
Facing the Emotional Tolls
One of the biggest challenges I’ve faced has been managing the emotional toll this work can take. I’m someone who cares deeply about others, and sometimes that means I get emotionally invested in the people I meet. It’s easy to get caught up in someone’s story or to feel empathy for their struggles, but that can blur the line between professional and personal. Early on, I learned that I had to set boundaries—not just for my clients, but for myself.
It’s not always easy to compartmentalise feelings, especially when a client shares something that resonates with me. I have had moments where I’ve walked away from a session feeling weighed down by someone else’s pain, or by a deeply personal revelation that I didn’t expect. But these experiences have taught me to be more self-aware. I’ve had to learn to protect my mental and emotional energy, to understand the difference between caring and over-investing.
The growth here comes from understanding my limits and learning how to emotionally care for myself as much as I care for others. I’ve come to realise that my well-being isn’t just a matter of physical health—it’s deeply emotional, too.
Managing Expectations: My Own and Others'
Another major challenge I’ve faced recently is managing expectations. People have a lot of preconceived notions about what an escort does, and sometimes, those expectations can be unrealistic, both from clients and myself. In the past, I’ve tried to meet every need, to fulfil every request, and to please everyone. But that’s not sustainable. I’ve had to become very clear about what I’m willing to offer and what is beyond my boundaries.
Clients, for the most part, are respectful. However, there are moments where they might push limits, or where their expectations stray far from what I’m comfortable with. The key to navigating this has been communication. Sometimes it’s uncomfortable to set boundaries, especially when I’m afraid of disappointing someone or losing a client, but I’ve learned that being firm about what I can and cannot do is essential. I don’t owe anyone more than I’m willing to give, and that has been a powerful lesson in self-respect.
And then there’s the pressure I put on myself. At the beginning of my career, I thought I had to be perfect—always composed, always in control. But perfection is a myth, and it only sets you up for burnout. I’ve had to unlearn the notion that I need to be flawless in everything I do. Learning to embrace imperfection, both in myself and in my work, has been a transformative part of my growth.
Financial Independence and the Weight It Carries
Another layer of complexity has been the relationship between my work and my financial independence. On one hand, the ability to earn my own money, to be in control of my financial destiny, is empowering. It’s freedom like I’ve never known. I’ve made choices about how to spend, save, and invest, and I’ve built something for myself that feels incredibly rewarding.
But financial independence isn’t without its challenges. It comes with its own pressures. Sometimes, I feel this weight to constantly “perform,” to always be available, to always book clients in order to maintain the lifestyle I’ve come to enjoy. There’s a constant balancing act between my work and my personal life. If I’m not careful, it can start to feel all-consuming, as though my identity is defined by the number of sessions I have booked or the amount of money I’m earning.
This has taught me that personal growth isn’t just about developing emotionally or physically—it’s about maintaining balance. Financial freedom is important, but so is emotional and mental freedom. I’ve had to learn how to disconnect, how to leave work at work, and how to take time off to recharge. After all, money might be essential, but peace of mind is priceless.
The Path to Empowerment
In all of this, I’m learning that true empowerment doesn’t come from external validation or approval—it comes from within. The challenges I face every day push me to dig deeper into who I am and what I’m capable of. I’ve grown stronger, more confident, and more self-aware because I’ve had no choice but to navigate these complexities head-on.
Every difficult client, every awkward situation, every moment of self-doubt has been an opportunity for growth. I’ve realised that I’m more resilient than I thought, that I can handle tough situations with grace, and that I have the power to choose how I respond to challenges. The work isn’t just about physical intimacy; it’s about building mental, emotional, and financial strength that will serve me in all aspects of my life.
Looking Ahead
As I move forward in this journey, I know that personal growth will continue to be a theme. It’s not a destination but a process—a constant evolution. I’m excited to see where it takes me. There will be more challenges, of course, but I’m ready for them. Each day brings new opportunities to learn, to grow, and to become a better version of myself. And for that, I’m grateful.
I’m not the same person I was when I started, and that’s the beauty of it. I’m constantly evolving, adapting, and finding strength I never knew I had. It’s not always easy, but it’s always worth it.
Rebecca x
-
@ 6f4d57a2:be4cc879
2025-01-04 04:21:18ในวันที่ 3 มกราคม 2009 โลกได้เข้าสู่ยุคใหม่ของการเงินและเทคโนโลยี เมื่อบุคคลหรือกลุ่มที่ใช้ชื่อว่า “ซาโตชิ นากาโมโตะ” สร้างบล็อกแรกของ บิตคอยน์ (Bitcoin) หรือที่เรียกว่า Genesis Block บล็อกนี้ไม่ได้เป็นเพียงแค่จุดเริ่มต้นของสกุลเงินดิจิทัล แต่ยังเป็นสัญลักษณ์ของความหวัง ความฝัน และความพยายามในการสร้างระบบการเงินที่ยุติธรรมและเปิดกว้างสำหรับทุกคน
Genesis Block จุดเริ่มต้นของความเปลี่ยนแปลง
Genesis Block ไม่ใช่เพียงแค่บล็อกแรกของบิตคอยน์ แต่ยังแฝงด้วยข้อความที่สะท้อนถึงสถานการณ์ทางเศรษฐกิจในขณะนั้น ซึ่งซาโตชิได้บันทึกไว้ในบล็อกว่า:
“The Times 03/Jan/2009 Chancellor on brink of second bailout for banks.”
ข้อความนี้แสดงถึงความไม่มั่นคงของระบบการเงินแบบดั้งเดิมและการมองหาทางเลือกใหม่ที่ยุติธรรมและโปร่งใสมากขึ้น **
เป้าหมายของบิตคอยน์** บิตคอยน์ถูกออกแบบมาเพื่อเป็นเงินดิจิทัลที่
- ไม่มีตัวกลาง การทำธุรกรรมไม่ต้องพึ่งพาธนาคารหรือสถาบันการเงิน
- ยุติธรรมและโปร่งใส ทุกธุรกรรมถูกบันทึกในเครือข่าย Blockchain ซึ่งทุกคนสามารถตรวจสอบได้
- เข้าถึงได้สำหรับทุกคน ไม่ว่าคุณจะอยู่ที่ใดในโลก คุณสามารถเข้าร่วมในระบบการเงินนี้ได้
ผลกระทบต่อโลก ในช่วงกว่า 15 ปีที่ผ่านมา บิตคอยน์ได้เปลี่ยนมุมมองต่อเงินและการลงทุนอย่างมหาศาล:
- การกระจายอำนาจทางการเงิน ผู้คนไม่ต้องพึ่งพาธนาคารอีกต่อไป
- เทคโนโลยีบล็อกเชน นำไปสู่การพัฒนานวัตกรรมใหม่ในหลายอุตสาหกรรม
- การลงทุนและเศรษฐกิจดิจิทัล บิตคอยน์กลายเป็นทรัพย์สินที่นักลงทุนทั่วโลกให้ความสนใจ
บทสรุป 3 มกราคม 2009 เป็นมากกว่าวันที่ Genesis Block ถูกสร้างขึ้น แต่เป็นวันที่เริ่มต้นของการเปลี่ยนแปลงวิธีการมองเงินและเศรษฐกิจของโลก บิตคอยน์ไม่เพียงแค่เป็นสกุลเงินดิจิทัล แต่ยังเป็นตัวแทนของความฝันในระบบการเงินที่ทุกคนสามารถมีส่วนร่วมได้
นี่คือจุดเริ่มต้นของเรื่องราวที่ยังคงดำเนินต่อไป และยังมีอีกหลายบทที่รอให้เราค้นพบในอนาคตของโลกการเงินที่เปิดกว้างและไร้ขีดจำกัด 🌍💡
แหล่งอ้างอิง The Times (3 มกราคม 2009). “Chancellor on brink of second bailout for banks.” (https://www.thetimes.co.uk/ อาจต้องสมัครสมาชิกเพื่อเข้าถึง)
Whitepaper ของ Bitcoin
Satoshi Nakamoto. (2008). Bitcoin: A Peer-to-Peer Electronic Cash System.
ข้อความใน Genesis Block
Blockchain Explorer หรือแหล่งข้อมูลที่เกี่ยวข้องกับ Blockchain
เว็บไซต์และบทความที่เกี่ยวข้อง
Bitcoin.org: เว็บไซต์ทางการของ Bitcoin (https://bitcoin.org)
Nakamoto Institute: รวมบทความและข้อมูลจากซาโตชิ (https://nakamotoinstitute.org)
หนังสือและงานวิจัยเกี่ยวกับบิตคอยน์
Antonopoulos, Andreas M. (2017). Mastering Bitcoin: Unlocking Digital Cryptocurrencies.
Vigna, Paul & Casey, Michael J. (2015). The Age of Cryptocurrency: How Bitcoin and Digital Money Are Challenging the Global Economic Order.
ข่าวจาก The Times
The Times (3 มกราคม 2009). “Chancellor on brink of second bailout for banks.”
-
@ 123711f7:c0a0c17e
2025-01-03 22:44:43Former United States President and incoming President-elect Donald Trump has condemned the United Kingdom’s energy policy, urging the nation to abandon wind farms and expand oil and gas extraction in the North Sea.
“The UK is making a very big mistake. Open up the North Sea. Get rid of Windmills!” Trump said in a post on his social media platform Truth Social on Friday.
According to Reuters, the region, one of the world’s earliest offshore energy hubs, has experienced a steady production decline since the early 2000s while evolving into a major offshore wind energy area.
Trump’s remarks reignited his longstanding opposition to wind energy, a stance dating back to a 2015 legal challenge against the construction of wind turbines near his golf course in Scotland.
THE LOUNGE: Merry Christmas Loungers, It’s Gist Time0:00 / 0:00Former United States President and incoming President-elect Donald Trump has condemned the United Kingdom’s energy policy.
-
@ 4d41a7cb:7d3633cc
2025-01-03 20:52:22Today is Bitcoin genesis block day, literally Bitcoin’s birthday number 16th. The purpose of this article is to deep dive into Bitcoin's beginnings, what it was meant to be, what its creator's incentives were, why the collaborators were interested in contributing to its success, and what Bitcoin is achieving.
Bitcoin exists to solve a problem.
The root problem with conventional currency is all the trust that's required to make it work. The central bank must be trusted not to debase the currency, but the history of fiat currencies is full of breaches of that trust. Banks must be trusted to hold our money and transfer it electronically, but they lend it out in waves of credit bubbles with barely a fraction in reserve. We have to trust them with our privacy, trust them not to let identity thieves drain our accounts. Their massive overhead costs make micropayments impossible.
Satoshi Nakamoto, February 11, 2009
In this post, Satoshi reveals the main problem: central banking, how this institution has abused the trust we have put in them. Bitcoin is an alternative to a “broken” or corrupt monetary system that it’s been running and stealing from people for centuries, creating credit bubbles with their debt-based fractional reserve banking system
Ponzi nature of banking system
For those who don’t understand this system and its corrupt and inviable nature, think about it as a rigged musical chairs game.
When the music (trust in the banking system and its currency) is on, everyone is happy playing the economic game. Economic activity is soaring; we see new businesses, new products, cheap credit, high lending, asset prices inflate, and people consuming more (thus pushing the economic numbers higher). Everything seems to be okay. But then something happens.
Under this monetary game, deposits are chairs and depositors are players; as the game goes on, there are always more players than chairs or depositors than deposits because banks “lend” currency that they don’t have. When the music (trust in the bank) is stopped, the game is over, and many people lose their chairs (their deposit), creating deflationary recessions and economic crises.
When this happens, everything starts trending the exact opposite way. The economic activity starts slowing down, debt problems arise, bankruptcies occur, people lose their jobs and consume less, asset prices deflate, until the central bank intervenes and the cycle starts again.
This is officially known as the “economic cycle,” and it's sold to us as a natural phenomenon. But the truth is this is a pure central bank–artificially created cycle by monetary manipulation, as we can learn from the Austrian school of economics.
I call the central bankers the market wizards because they hold the lever to manipulate the economic game. They are the money masters, the financial alchemists, the kings of the economic and financial game of commerce where all economic agents operate under.
Bitcoin is a revolution against the central bank monarch, but Satoshi was not shouting about this to the four winds. He didn’t want to get attention before Bitcoin was strong enough, because it would have implied a great risk to its success. Central banks are the most powerful institutions on earth; they literally have the power to create currency in unlimited amounts and buy anything they need to maintain their monopoly.
If we need a more clear confirmation of this, we can look into the encrypted message that Satoshi left in the genesis block. To understand the genesis block, imagine a bookkeeping ledger that adds new pages (blocks) daily and contains a record of all bitcoin transactions ever made. The very first page of this book is called the genesis block.
Chancellor on brink of second bailout for banks
Satoshi Nakamoto 03 January 2009
Here’s the newspaper cover he was making reference to.
In allusion to the bank bailouts that were taking place at the time, Satoshi included this intriguing line in the genesis block when he created Bitcoin during the Great Global Financial Crisis. In addition to providing the remedy, those who caused the issue (and profit from it) were making unprecedented profits. \ \ This game is about privatizing profits and socializing losses. This is the opposite of free markets and capitalism. It's clear that Satoshi Nakamoto, whomever he was, detested the established financial system. Since the Bank of England, which was the subject of this article, was established in 1694, we may trace the debt based fractional reserve banking system history back at least 331 years. \ \ This allusion to traditional banking's shortcomings was a declaration of what Bitcoin was trying to combat: fractional reserve banking and its consequences, which include debt, taxation, and inflation.
\ \ The bookkeepers \ \ In essence, banking and money management are bookkeeping, keeping track of who owns what and who owes what. Due to its revolutionary impact on accounting, Bitcoin has been dubbed "triple entry bookkeeping" by some. \ \ These days, banks are in charge of bookkeeping; they basically have the authority to make changes to the books and add new entries, or "print money." Inflation is basically a robber of time, energy, and wealth from everyone using that currency denomination, and banks are the ones who create it. Additionally, they have the ability to cause economic crises and market crashes for their own financial gain, making them deflation inductors. \ \ The incapacity of gold (real money) to meet the demands of a growing global economy gave banks this authority. They essentially became gold safe-keepers and gold IOU bookkeepers' ledgers because people trusted these organizations to provide scalability and lower the cost and risk of gold transactions. \ \ The purpose of banking was to enable credit and payments. Governments and banks did not create money. The free market determined the value of gold and silver, and people only trusted banknotes that were backed by gold. \ \ “Gold is money, everything else is credit" JP Morgan, 1912. \ \ Since banks began growing, they have sought to increase their size even more. When they discovered that the metal money system was restricting their ability to increase credit and bank profits, they literally plotted to seize control of the money market and overthrow governments by demonetizing these metals, effectively eliminating the demand for money in general and substituting it with debt and credit instruments. Essentially promissory notes issued by banks based on debt. \ \ "The borrower is a slave to the lender, and the wealthy dominate the poor”. Proverbs 22:7\ \ Human history is a chronicle of the literal plot by banks to enslave humanity, which resulted in hundreds of wars, thousands of assassinations, and the loss of millions of innocent lives in order to fulfill the banksters' objective of creating a global fractional reserve credit system. The currency that they decided to control? The term "U.S dollars" is frequently and incorrectly used to refer to Federal Reserve Notes. \ \ Slavery is essentially personified in this system. Slavery, in my opinion, is working for a currency that someone else can print without any effort or labor. This is the underlying cause of legal inequality. Theoretically, we live in a democracy and capitalist society where everyone is treated equally, but income taxes and central banking are vital components of the communist manifiesto. \ \ Where do we draw the boundary between a free human being and a slave citizen, given that this system directly violates private property rights? You are 100% slave when you pay 100% taxes, and 40% slave when you pay 40% taxes. It is being violently imposed upon you if it is not a voluntary business deal. Violence or the threat of losing your freedom are used to compel people to pay taxes. \ \ Natural law, often known as moral law, states that every person has the right to keep all of the fruits of their labor. However, this fraudulent financial system is robbing everyone of their means of trade, whether they are called coins, currencies, deposits, checks, etc. Furthermore, ceasing to feed a parasite is the only way to eradicate it. \ \ A purely peer-to-peer version of electronic cash would allow online payments to be sent directly from one party to another without going through a financial institution.
Satoshi Nakamoto, October 31, 2008\ \ \ \ What backs fiat currencies?\ \ The worst aspect of this system is that it views people as collateral cattle for the currency's purchasing power. In essence, "government currencies" are credits of their corresponding debts, or government bonds, which are effectively secured by the government's “authority” to impose taxes on its populace. In essence, the government's power to compel its people to give them X percent of their income without providing them with equal recompense.
In essence, citizens' wealth is "baking" the government's debts. Since the currency cannot be exchanged for wealth at a particular rate, it is inaccurate to state that it is backed, thus I said "baking." However, if we must identify a valuable component of the currency, it is as follows: wealth and labor (i.e., human time and energy).
\ And what makes up this wealth? Among other things, land, homes, resources, businesses, and human time. They have demand for trade and exchanges because they make up half of every transaction. However, what do people trade more for currency? Energy and time. \ \ Those who can produce currency out of thin air with little effort (simply adding numbers to the bank ledger) can effectively steal from everyone else who has to labor and invest time and energy (real wealth), as most people exchange their time and energy for currency. Clearly, this is the root cause of inequality. \ \ Not only is this utterly immoral and unfair, but it gets worse. The worst aspect is not that they want to charge interest and can easily generate currency, but rather that they insist that WE repay them! \ \ What am I saying? Every currency unit's counterpart in government bonds is a public debt that generates compound interest on a continuous basis. There is a dollar due plus interest for every dollar that exists. In essence, this debt is a claim on the nation's wealth, which includes the labor (time and energy) and wealth of its citizens. \ \ And to whom is this debt owed? The banks. Therefore, if we apply common logic, it is easy to see that just as borrowers are slaves to lenders, governments and "we the people" are slaves to banks. \ \ However, what precisely do we owe? What kind of material have they given our governments? Is it wealth of any sort, whether it land, gold, or resources? No, it's not. is essentially a promissory note issued by a private bank, a document that serves as a means of exchange and may be produced in an infinite quantity. A counterfeit check.\ \ Global slavery to the banks is the price we pay for a scalable medium of exchange! \ \ And now we have a great substitute! \ \ To sum up, we spend our lives, precious time, energy, stress, suffering, and effort to obtain these currencies and pay our taxes, while another group sits there making up new reasons to add currency the ledger —also known as "printing digital money"—that we must repay plus interest! It's crazy. \ \ The worst aspect is that because the debt exceeds the amount of money in circulation due to compound interest, which keeps accruing and increasing the loan's size, it is mathematically impossible to pay back.\ \ It is equivalent to burning the currency because we pay taxes to cover the interest on an ever-increasing debt that we are unable to pay back. A black hole for taxpayer funds, debt-based currencies are essentially human slavery that is supported by banks and maintained by governments. \ \ Why isn't everyone voicing their disapproval and exposing this? The answer is brainwashing and a lack of knowledge. Much of this has been concealed or esoteric, and a major contributing factor to this blind spot is the misinformation we receive regarding the operation of this system. In order to play the game the way they want us to and avoid the game ending anytime soon, we are given a children's interpretation of human history and reality. \ \ \ Libertarianism\ \ Bitcoin's libertarian nature cannot be disregarded; even Satoshi acknowledged this when he stated:\ \ It’s very attractive to the libertarian viewpoint if we can explain it properly.\ I’m better with code than with words though.
Satoshi Nakamoto, November 14, 2008\ \ Libertarianism is a political philosophy that holds freedom and liberty as primary values. Many libertarians conceive of freedom in accord with the Non-Aggression Principle, according to which each individual has the right to live as they choose, so long as it does not involve violating the rights of others by initiating force or fraud against them.
Libertarians advocate for the expansion of individual autonomy and political self-determination, emphasizing the principles of equality before the law and the protection of civil rights, including the rights to freedom of association, freedom of speech, freedom of thought and freedom of choice. They generally support individual liberty and oppose authority, state power, warfare, militarism and nationalism, but some libertarians diverge on the scope and nature of their opposition to existing economic and political systems. 1\ \ Here are several arguments in favor of Bitcoin's libertarian nature. \ \ Non-Aggression Principle: Unlike taxes and fiat currencies, which are supported by state aggression, Bitcoin is supported by energy, math, and processing power. The monopoly of violence “belongs” to governments, and banks use this authority to compel everyone to follow their rules (I'm talking about business). \ \ Personal independence: Bitcoin doesn't require confidence and doesn't have counterparty risk. With bitcoin, the person has complete control over his finances and doesn't require "permission" from a third party to earn, save, or spend it. Bitcoin is referred to be "freedom money" for this reason. \ \ Equality before the law: Unlike the actual banking system, where a group can create money out of thin air with little effort and can alter the rules to suit their interests, the bitcoin protocol ensures that everyone is playing by the same rules and that there is no possibility of cheating or inflating the supply of bitcoin. Equality exists under the Bitcoin protocol. \ \ Indeed there is nobody to act as central bank or federal reserve to adjust the money supply as the population of users grows.\ Satoshi Nakamoto, Febrero 18, 2009\ \ Freedom of speech: To uphold justice and the truth in an era of widespread censorship, freedom of speech is an essential human right. The fact that Bitcoin is information also fits into this category; money is a means of conveying value, but this time in an unstoppable manner that is impervious to censorship. \ \ Freedom of thought: Using bitcoin does not require you to subscribe to any particular philosophy or set of beliefs, including libertarianism or anarchism. Bitcoin is unbiased and doesn't care. \ \ Freedom of choice: Unlike fiat currencies, where you frequently have no other choice, no one will compel you to use bitcoin. \ \ Libertarians reject the current political and economic structures because they are blatantly immoral, criminal, and illegitimate. It is "shaped" by indoctrinated mob rule democracies, supported by violence, and based on lies.
Bitcoin's ascent \ \ Bitcoin wasn't created overnight; rather, it was the result of decades' worth of research, development, and technology. Above all else, however, bitcoin represented a breakthrough—a new method of accomplishing tasks that had previously been impossible. \ \ A lot of people automatically dismiss e-currency as a lost cause because of all the companies that failed since the 1990's. I hope it's obvious it was only the centrally controlled nature of those systems that doomed them. I think this is the first time we're trying a decentralized, non-trust-based system.
Satoshi Nakamoto, Febrero 15, 2009\ \ Due to their centralization and unique points of failure, all of the numerous attempts to implement alternative e-currencies failed. The distributed nature of the bitcoin network makes it more robust and challenging to attack. \ \ The secret to developing a decentralized unchangeable ledger was Satoshi's solution to a problem that had been thought to be intractable since the 1970s. Following years of failure and lessons learned, Satoshi established a finite amount of money that is governed by processing power and energy.\ \ The proof-of-work chain is a solution to the Byzantine Generals Problem.\ Satoshi Nakamoto, Febrero 15, 2009
The return of money \ \ Bitcoin has also had a significant impact on the monetary front, particularly on the system's capacity to function as money and not simply a currency. It has been shown to be the best store of value (SOV) in addition to being an excellent medium of exchange (MOE).
Since currencies replaced money during the last century, we have lost track of what money is. And in order to protect our wealth, we need to be aware of the important distinctions between these technologies. \ \ A currency must be recognized, divisible, fungible, portable, and widely accepted in order to function as a medium of exchange. \ \ All of those qualities are present in money, but it also has the capacity to hold value over time, and it must be scarce in order to function as a store of value. A currency, in contrast to money, is susceptible to inflation due to its ease of replication. This is the cause of the constant price increases. \ \ The money supply needs to be scarce in order to preserve its purchasing power over time (i.e., to be immune to inflation). For thousands of years, gold and silver have been the preferred forms of money. \ \ At first, paper currency was only used to facilitate transitions by serving as a convenient alternative (derivative) to precious metals. Since goldsmiths and subsequent bankers used fractional reserve banking to lend more money (i.e., print more paper currency) than they actually had in storage, paper currencies—which are easily reproducible—have always been vulnerable to inflation. This resulted in the recurring "bank run" crises that are documented throughout history.\ \ But before bitcoin, we didn't have any money since 1933 because banks had taken it and devalued it. Real state, stocks, bonds, and other choices had been selected as alternatives due to the absence of money (a store of value). People buy real estate, stocks, and bonds to protect their wealth because fiat currencies are continually being inlfated, not because they love them. \ \ An estimated 900 trillion dollars' worth of wealth is held in financial and tangible assets worldwide. \ \ In real state, 330 trillions (36.6%)\ \ Bonds worth 300 billions (33.3%)\ \ Currency totaling 120 trillions (13.3%)\ \ Equity of 115 trillions (12,7%)\ \ Art worth 18 billions (2%)\ \ Gold worth 16 trillions (1,77%)\ \ Automobiles and collectibles worth 6 trillions (0,66%)\ \ Bitcoin worth two trillions (0,22%)\ \ Bitcoin only makes up about 0.22% of the world's total wealth. The greatest money ever created, property that you can actually own, with a sovereign protocol, no counterparty risk, a limited supply (better than scarce), and no need for banks or governments. Freedom money is unaffected by debt, taxes, or inflation. \ \ A bitcoin market cap of x10 ($1,000,000) would represent 2,22% of the world's wealth, and a market cap of x100 ($10,000,000) would represent 22,22%. \ \ The denominator, the dollar, is always losing value since it is created infinitely by continuously increasing the debt supply, and wealth is not fixed—rather, it is eternally increasing. According to CBNC the U.S. national debt is rising by $1 trillion about every 100 days.
Bitcoin is energy \ \ Bankers and significant international leaders are aware that energy is the foundation of all human activity. They are aware that they must control the energy sources, including their supply, distribution, and price, in order to establish a monopoly over every industry and a system of slave labor. They even clarified in several released documents that this is the only way to engineer the global economy.
:Silent Weapons for Quiet Wars explains:
In order to achieve such sovereignty, we must at least achieve this one end: that the public will not make either the logical or mathematical connection between economics and the other energy sciences or learn to apply such knowledge.
It is only a matter of time before the new breed of private programmer/economists will catch on to the far-reaching implications of the work begun at Harvard in 1948. The speed with which they can communicate their warning to the public will largely depend upon how effective we have been at controlling the media, subverting education, and keeping the public distracted with matters of no real importance.
The Harvard Economic Research Project (1948-) was an extension of World War II Operations Research. Its purpose was to discover the science of controlling an economy: at first the American economy, and then the world economy. It was felt that with sufficient mathematical foundation and data, it would be nearly as easy to predict and control the trend of an economy as to predict and control the trajectory of a projectile. Such has proven to be the case. Moreover, the economy has been transformed into a guided missile on target.
As we can see, the actual monetary system was created as a system of control (SOC), which is essentially founded on thievery and has restrictions, barriers, closed doors, a lack of transparency, and different rules for different actors. Through fabricated inflation and economic crises, it has been stealing our riches and freedom and controlling not just the electrical supply but also the social energies of humanity. (Inductors and economic conductors)\ \ However, Bitcoin is restoring our freedom. A way to make money, save it, and spend it without any restrictions, inflation, or capricious regulations. A novel kind of property that is not dependent on a counterparty, like banks or governments, and that requires energy to manufacture rather than being formed spontaneously.
Bitcoin generation should end up where it's cheapest. Maybe that will be in cold climates where there's electric heat, where it would be essentially free.
Satoshi Nakamoto, August, 2010
This fact is key to unlock the benefits of deflation that had been opaqued by the artificially created inflation.
Natural deflation
The primary benefit of bitcoin is deflation. Deflation incentives people to delay consumption and save more. Saving is the key to economic growth, because it can help to increase investment and productivity.
With the increase in productivity, prices tend to go down as they are more abundant and we find cheaper ways to produce thanks to technology.
The only reason that prices are not going down today -except in products where improvements are very rapid (e.g., computers)- is because of government-caused-currency inflation.
They have been stealing the benefits of natural deflation from us, but now we can access it thanks to Bitcoin.
It might make sense just to get some in case it catches on. If enough people think the same way, that becomes a self fulfilling prophecy.
Satoshi Nakamoto, 1/17/2009
Conclusion
To only way to scape the slavery system is to earn, save and spend bitcoin; a money that’s not controlled by the governments and banks, that is not subject to inflation and where everyone has to play under the same rules.
Happy birthday Bitcoin!
Bitcoin or Slavery!
-
@ e373ca41:b82abcc5
2025-01-03 16:25:26ADVERTISEMENT:
Looking for the easiest way to buy Bitcoin and store it yourself? The Relai app is the No. 1 crypto start-up and No. 2 of all fintech start-ups in Switzerland. Here you can buy Bitcoin in just a few steps and also set up savings plans. Nobody has access to your Bitcoin except you. With the referral code MILOSZ you save on fees. (no financial advice).
Need more security? The Trezor wallets are recommended and easy to use, others are available in the store. Need more advice? Book an introductory meeting with a wallet expert.
I was told the following story at one of my readings last year.
An elderly couple from a Swiss town with a high density of anthroposophically minded people were said to have been vaccinated against coronavirus. My conversation partner found this unusual, wanted to know the “why” and asked.
“Oh, you know, the two of us had wanted to end our lives voluntarily and in a self-determined way for a long time,” they explained. “When the coronavirus vaccinations came along, we thought: This is our chance!”
Absurd times
I had to laugh. What an absurd time to live in. Actually only bearable as a meme. Last year was also a year in which things were reversed. Everything is upside down and yet should seem normal. Calling minister of economy Habeck a moron in a meme resulted in a house search and an insult lawsuit. Calling Alice Weidel, leader of opposition AFD a "Nazi bitch", on the other hand, is no problem. The new normal: reality as permanent satire.
(when you read this, you caught it already)
But this image is breaking down, it is being recognized and increasingly rejected:
- Stagings with satanic overtones at the Olympics & Co. caused a wave of outrage.
- Medium magazine named the nomenklatura journalists from Correctiv as journalist of the year, at the same time as their core thesis of a remigration conspiracy was melting away.
- The “reason of state for Israel” was a Nibelung allegiance for war criminals: a Netanyahu would have to be arrested on German soil if Germany wanted to comply with international law.
- The woke influencer and Böhmermann gag writer “El Hotzo”, one of the “self-reflective feminist men” in the outside media world (he wished Trump dead after the assassination attempt), has now had to publicly confess to having manipulated and gaslighted women for years and to having exploited his media position to do so.
- The Magdeburg attacker is being framed on the right, police laws and surveillance are to be stepped up, but the media are warning that extremists are now exploiting this event for their own ends. Very interesting: because the danger comes from the right, we protect Christmas markets instead of mosques. Nobody takes all this seriously anymore.
Many half-dead zombie topics are starting to move again. The lab leak theory has been confirmed once again. The Paul Ehrlich Institute (whose job is the oversight of vaccines, among others) virtually admitted that certain vaccine batches were more dangerous than others. Why didn't it intervene? This is what state-perpetrated killing and bodily harm by omission looks like. Has Paul Cichutek (former head of PEI) already been arrested, his house searched and documents confiscated (along with the "Federal Cross of Merit")?
Most recently, a Yale study (still unpublished) showed that spike proteins were still detectable two years after vaccination, and an effect on genetic material is not ruled out. Sounds a lot like the “conspiracy theories” of 3 years ago. Yet in this country, the state still recommends this vaccination to pregnant women. It won't be possible to put all these educational topics in a repository for toxic information, as the leaked RKI protocols have recently shown. The tide is turning, the picture is clearing. But slowly and not on page 1 of the newspapers and their editors, who are now fighting for survival because nobody wants to read their lies anymore. “Another hundred years of newspapers and all words will stink,” Nietzsche said a good 100 years ago.
("Power replaces first class talent by idiots, as lack of intelligence and creativity is always the best guarantee for loyalty", Hannah Arendt)
Do not live with lies
Fifty years ago, Alexander Solzhenitsyn published the text “Do not live with lies” (1974), in which he points out the antidote to lies:
“Our way: CONSCIOUSLY SUPPORT THE LIE IN NOTHING! Recognize where the boundary of the lie is (it looks different for everyone) - and then step back from this life-threatening boundary! Do not glue together the dead knuckles and scales of ideology, do not mend the rotten rag - and we will be amazed at how quickly and helplessly the lie falls away, and what should stand naked and bare will then stand naked and bare before the world.”
You can laboriously help build lies, submit to an ideology that nourishes you for a while. But when the edifice of lies collapses, nothing else will help. Every lie wears out and is eventually overtaken by reality. We see that the spans of lies are getting shorter and shorter, that the roller of reality is rolling over them faster and faster.
“We can't force them to tell the truth. But we can make them lie more and more brazenly.”
I've read this sentence a lot recently. Sometimes it is attributed to Ulrike Meinhof, sometimes to Bernward Vesper, Gudrun Ensslin's husband. I find the quote remarkable because it directs our attention away from what we cannot and will never change, namely the existence of the lie itself, towards what we can change: the soil on which the lie grows or does not grow. In the Luhmannian sense, we must look away from the system (the lie) and towards the environment or surroundings in which it thrives or not. The path from lies to truth is the same as the path from slavery to freedom. The revolutionary poet Georg Herwegh formulated this in his poem “A lane for freedom - der Freiheit eine Gasse” (1841):
“When all the world lost courage,\ To begin the feud,\ You, my people, stand before the nations,\ Let your heart's blood run!\ Give us the man who grasps the banner\ Of the new age,\ And through Europe we will break\ A lane for freedom!”
- Julian Assange is free! He is Herwegh's “man” for me.
- Satoshi Nakamoto, the inventor of Bitcoin, is Herwegh's “man” for me.
- Austrian singer Udo Jürgens, tenth anniversary of whose death was recently celebrated, was Herwegh's “man” for me: “I am in favor of dissent being allowed, I even consider it a duty.”, he sings. Even chansonniers from 20 years back would qualify as subversive today.
https://www.youtube.com/watch?v=McgZEA6BZiY * We are all Herwegh's “man”. There is not just one to hope and wait for, but many of our kind and more and more of them.
I was able to get to know many of them this year when I visited a good 50 places on my reading tour. Four years ago, we worked together to create an avenue for freedom when we published the “Appeal for free debate spaces”. * Today, together with a team of developers, I am building the Pareto project, another alleyway for the freedom of information.
I wish you all a happy new year and thank you very much for your loyalty and support of my work!
This article by Milosz Matuschek first appeared in German on Freischwebende Intelligenz.
Join the marketplace of ideas! We are building a publishing ecosystem on Nostr for citizen-journalism, starting with a client for blogging and newsletter distribution. Sound money and sound information should finally be in the hands of the people, right? Want to learn more about the Pareto Project? Zap me, if you want to contribute (all Zaps go to the project).
Update: Since my last article on the Pareto project, we have received more than 50 messages from publications, journalists, authors, testers and supporters. Thank you very much, we are happy to help everyone become censorship-resistant! May just take a little time. Are you a publication and want to be part of it, test us, migrate your content to Nostr? Write to team@pareto.space
Not yet on Nostr and want the full experience? Easy onboarding via Nosta.me.
-
@ 58937958:545e6994
2025-01-03 11:01:492024年1月3日 ビットコインのお誕生日に合わせて ビットコインっぽい具材を入れたおせちを作りました 全部手作りです
1の重
(左上から)
- 田作り…田んぼに田作り(カタクチイワシ)を肥料として撒いたことから、豊作祈願の意味合いがある。
- くわいの煮物…大きく芽が出る野菜で、出世や成功を祈る。
- 昆布巻き…「喜ぶ(よろこぶ)」の語呂合わせで縁起物。
- 松風焼き…表面だけケシの実やゴマをまぶす=裏がない→隠し事のない正直な生き方ができるように、という意味が込められている
- 黒豆…「まめに働く」ことや健康を祈る。
- 伊達巻き…巻物に似ていることから、知識が豊富になるようにと願いが込められている。
- ぶりの幽庵焼き…ぶりは成長とともに名前が変わる出世魚で、将来の出世を願う。
- 鮭のテリーヌ…洋風おせちの定番。鮭には「出世」「災いを避け(サケ)る」「子孫繁栄」などの意味がある
- たたきごぼう…根が深く張るごぼうは家族や子孫繁栄の象徴。
2の重
- 金柑の甘露煮…金柑の「金」の文字から、金運や財運を祈る。
- なます…紅白の水引のような形状で祝いの意味がある
- 栗きんとん…黄金色が金運を表し、豊かな1年を願う。
以下はビットコイン具材として入れました
- カボチャようかん
- 鶏とほうれん草のテリーヌ
- きな粉棒
3の重
煮しめ…様々な具材を一緒に煮ることから、「皆で仲良く、末永く繁栄するように」という願いが込められている きぬさやのBは我ながらちょっと笑ってしまった
ビットコインを意識して作った具材
カボチャようかん
固めの牛乳かんを作り、包丁でBの形に切り抜いて、カボチャのようかんを流す感じです
鶏とほうれん草のテリーヌ
鶏むね肉とはんぺんをミンチにして、半分にほうれん草を入れて形作りました 初めて作ったので不安でしたが丁寧に作ればもっと良い形になると思いました
きな粉棒
はちみつときな粉だけで作る駄菓子的なおやつです のばして包丁で切り抜いてきな粉をまぶします
金柑の甘露煮
丸くてオレンジ色なので作ってみました しかも名前に「金(ゴールド)」が入っているのでビットコイン食材のポテンシャルがあると思います とろける感じでめっちゃおいしかったです
nostr:nevent1qqspu8gegzdamtx2rsm4995t3sg8qssw3vn3yn25ru8plghsqyrwtkcn0u7vy
サトシはビットコインが生まれたその日に何を食べていたのかなぁと おせちをつまみながらパソコンに向かっていたりしたら面白いなぁと思いながら作りました (日本文化が好きだから日本名にした可能性はあるかな~とか)
今頃のんびりおせちを食べてくつろいでいる・・・なんてことはないですかね 何にせよサトシが平和に暮らしていればいいなぁと思います
-
@ 1c7629da:d831cb25
2025-01-03 09:08:51Introduction
The Bitcoin Whitepaper is the foundation of the modern cryptocurrency world. Written by Satoshi Nakamoto, it marked the start of a revolution in finance. In this post, we take a detailed look at the Whitepaper: when and why it was written, what it contains, what is missing, and how Bitcoin has developed since then.
When and why was the Bitcoin Whitepaper published?
The Whitepaper, titled "Bitcoin: A Peer-to-Peer Electronic Cash System," was published on October 31, 2008, by Satoshi Nakamoto. During the global financial crisis, Nakamoto presented a decentralized solution for digital payments. The goal was to create an electronic payment system that operates without a central authority and allows users to send money directly to each other.
What is in the Bitcoin Whitepaper?
The nine-page document describes the technical foundation and philosophy behind Bitcoin. Here are the key points:
- Introduction: The problems with the current financial system are explained. Nakamoto describes the need for a system based on cryptographic proof instead of trust.
- Transactions: Bitcoin transactions are digital signatures passed in a chain of ownership. This prevents double spending.
- Timestamp Server: Transactions are grouped into blocks and linked through timestamps. This secures the blockchain.
- Proof-of-Work: To prevent manipulation, proof-of-work is required to create new blocks.
- Network: Participants send transactions to the entire network. Valid blocks are accepted by consensus and added to the blockchain.
- Incentives: Miners are rewarded with new bitcoins and transaction fees.
- Storage Space: The paper describes ways to save space by removing unnecessary transactions.
- Privacy: Bitcoin allows pseudonymous transactions since no real names are used, only public keys.
What is not in the Whitepaper?
Although the Whitepaper clearly defines the basics, many important details found in Bitcoin today are missing:
- 21 Million Bitcoin: The maximum supply of 21 million Bitcoin is not mentioned.
- Block Time: The average block time of 10 minutes is not specified.
- Mining Algorithm: The 1 MB block size limit and adjustments to mining difficulty are not included.
- Signature Methods: The paper does not describe specific signature methods like P2PKH or Schnorr signatures.
How is Bitcoin different from the Whitepaper today?
Bitcoin has changed significantly since the Whitepaper was published. Some of the biggest differences include:
- Mining: Bitcoin was originally mined using CPUs, but today specialized ASIC devices dominate.
- Consensus Mechanism: The idea of the "longest chain" has been replaced by the heaviest chain to prevent timewarp attacks.
- Transaction Types: Multi-signature addresses, Taproot, and other upgrades have been introduced.
- Scaling: Technologies like the Lightning Network have been developed to make Bitcoin faster and more scalable.
Conclusion
The Bitcoin Whitepaper is a masterpiece of clarity and simplicity that explains a complex idea in just a few pages. However, Bitcoin is not static – it has evolved continuously over the past 16 years. The Whitepaper remains the foundation that defines the vision of a decentralized money system for the world.
-
@ e1d968f7:5d90f764
2025-01-02 18:38:14When I first started as an escort, I didn’t fully appreciate just how important fantasy would be in this line of work. At first, I thought it was all about simple physical attraction or the kind of sexual desires you might see portrayed in films or novels. But the deeper I’ve gotten into this profession, the more I’ve realised that fantasy is so much more than that. It's woven into the very fabric of what I do, and it’s not just about sex—it's about identity, power, and, more often than not, a sense of escape.
For many of my clients, it’s not just about being with someone physically; it’s about creating a space where they can step out of their everyday lives and explore parts of themselves they don’t often get to. I’ve come to see fantasy as an incredibly powerful tool—not just for my clients, but for myself, too.
The Many Faces of Fantasy
Every time, I meet clients with different fantasies. Some want to explore particular sexual scenarios or role-play, while others are after something much more subtle—an emotional connection or a specific kind of attention they aren’t getting elsewhere. It’s not just about the physical; it’s about the mental, the emotional, and sometimes even the psychological needs that get wrapped up in these fantasies.
What’s always struck me is how diverse those desires can be. Sometimes, a client just wants to be listened to, to feel like they’re the centre of attention for a few hours without any distractions. For others, it’s about stepping into a role they never could in their daily life—maybe they want to feel powerful or dominant, or perhaps they crave vulnerability and want to surrender control. I’ve played all kinds of roles—whether it’s a confident professional, a shy lover, or even a nurturing figure—and each fantasy brings its own set of dynamics.
But the most interesting part of it all? It’s the way these fantasies often go beyond what I ever imagined them to be. They’re not always as simple as "acting out a scenario." Sometimes, it’s just about creating the right atmosphere—being present, attentive, and creating a safe space where someone can let their guard down. It’s an art, really.
My Own Fantasies and Boundaries
A question I get asked often is whether I have my own fantasies and how they fit into this work. To be honest, it’s something I don’t talk about too much, but I think it’s an important part of this journey. While I’m here to make my clients’ fantasies come to life, I also have my own boundaries, desires, and needs. There’s a delicate balance between providing what someone else wants and ensuring I don’t lose sight of myself in the process.
I’ve learned that I have to stay grounded in my own identity. I can get swept up in someone else’s world, their desires, and fantasies, but it’s crucial that I don’t lose my sense of self along the way. It’s all too easy to slip into the role of someone else, but I’m still Rebecca—the woman with my own life, my own boundaries, and yes, my own fantasies.
The Mutual Exchange
I’ve come to realise that fantasy is a two-way exchange. While I’m helping a client explore their deepest desires, I, too, am learning something new about myself—about my capacity for connection, my ability to empathise, and my own sense of empowerment. It’s not always just about fulfilling someone else’s needs; it’s also about the journey I take with them, even if just for a brief time.
I’ve often thought of myself as a kind of mirror. In many ways, I reflect what my clients are feeling, but at the same time, I’m learning more about myself through these interactions. It’s strange, isn’t it? How a job that might seem so transactional on the surface can actually be a profound exchange of emotions and experiences. The line between reality and fantasy blurs at times, and it’s easy to forget that this is work.
Fantasy as Empathy
What I’ve realised, though, is that fantasy is more than just a form of escapism—it’s an art of empathy. The best parts of escorting aren’t just about giving someone what they want; they’re about creating an experience where both of us can feel seen, heard, and understood. That’s what makes the work so fulfilling for me. It’s not always about fulfilling the exact fantasy someone has in mind, but about understanding them deeply and connecting in a way that feels real, even if it’s only for an hour or two.
I’ve learned that empathy is key. It's not just about acting out a role, but about tapping into what someone truly needs—sometimes in ways they’re not even fully aware of. And when I can do that, the experience becomes something far more meaningful than just a physical transaction. It’s a shared moment of vulnerability, trust, and connection.
Final Thoughts
Looking back on my journey, I see that fantasy isn’t just a part of the job—it’s a central part of my growth as an escort. It’s not just about fulfilling desires; it’s about learning to navigate the complexities of human emotion, to offer a safe space for exploration, and to understand how deeply interconnected our desires and identities really are.
And while I’ll continue to help clients explore their fantasies, I’m also exploring my own. The job isn’t just about meeting others’ needs; it’s also about learning more about myself, my boundaries, and my capacity for empathy. It’s a constant journey, but one that makes me feel connected to the deeper aspects of humanity—something I never expected when I first started.
Until tomorrow,
Rebecca x -
@ be7bf5de:09420d0a
2025-01-02 17:54:35The SALUD Decentralized Health App Development Challenge is an exciting initiative aimed at revolutionizing healthcare through the use of decentralized technologies. Running from January to May, this challenge will bring together developers, designers, healthcare providers, and health conscious individuals interested in decentralizing healthcare. Participants will create open-source tools leveraging Nostr, Bitcoin, and the SALUD protocol aiming to improve healthcare access, enhance data portability, and ultimately improve health outcomes for individuals worldwide.
Challenge Mission
At its core, the mission of this challenge is to bootstrap an ecosystem of interoperable tools that allow individuals to take full control of their health data. By building apps on the Nostr protocol and integrating bitcoin, the challenge hopes to address key issues in traditional healthcare, including access to services, privacy, and fragmented health data systems. All participating apps will be required to be compatible with the SALUD protocol, or Sistema de Administración de Libertad Único y Decentralizado, which is an open-source framework for utilizing health data over Nostr.
Challenge Structure
The challenge is structured to span five months, from January through May. Throughout this period, participants will meet weekly to discuss their progress, share insights, and collaborate with others. These sessions will be instrumental in connecting developers, designers, and healthcare professionals, fostering a community focused on building the future of decentralized healthcare.
The challenge will include weekly office hours for participants, held every Thursday at 11 AM Eastern Time (4 PM UTC), starting on January 16th. These open office hours will provide opportunities to connect with doctors, developers, entrepreneurs, and health-minded bitcoiners to ensure that the apps being developed address real-world healthcare needs.
Evaluation Criteria
All submissions to the challenge will be evaluated based on four key metrics:
- App Production Readiness: Is the app functional and polished enough for real-world use?
- Solution Depth and Creativity: How innovative and impactful is the solution in addressing healthcare challenges?
- Interoperability: How well does the app integrate with the SALUD protocol and other healthcare tools, ensuring it can work seamlessly within the decentralized ecosystem?
- Overall Contribution to the Ecosystem: Does the app contribute to the broader vision of decentralized healthcare and enhance individual control over health data?
Prize Pool
The challenge features a prize pool starting at 10 million satoshis (0.1 BTC). Winning participants will not only receive financial rewards but also have the opportunity to collaborate with NosFabrica, a leading force in decentralized technology development, and Illuminodes, piloting the SALUD protocol in El Salvador. This container provides an exciting pathway for long-term collaboration and innovation in the global and decentralized health space.
Who Should Participate?
This challenge is open to a wide range of participants, each contributing unique expertise and perspectives:
- Developers and Designers: Those skilled in app development, UX/UI design, bitcoin and the Lightning Network.
- Healthcare Providers (Doctors/Nurses/Alternative Health): Professionals who can offer insights into real-world healthcare needs and help design solutions that truly benefit patients.
- Health-Conscious Individuals: People passionate about taking control of their own health data and empowering others to do the same.
- Bitcoiners and Nostriches: Enthusiasts of Bitcoin and Nostr who are excited to apply these censorship resistant technologies to solve pressing issues in healthcare.
- Investors: Individuals or firms interested in supporting innovative projects and startups that have the potential to shape future of healthcare.
How to Participate
To get involved in the challenge and receive important updates and event invitations, participants can sign up through either of the provided forms:
The main categories we'll encourage individuals to develop solutions for are personal health apps, healthcare provider tooling, and SALUD protocol infrastructure. So far, the SALUD protocol includes NIP-82, a way to store FHIR healthcare records on Nostr, developed by NosFabrica co-founder, Vitor Pamplona. We see more Nostr improvement proposals being made as healthcare data use cases develop.
Conclusion
The SALUD Decentralized Health App Development Challenge is a groundbreaking opportunity for anyone passionate about using Nostr and Bitcoin to reshape the healthcare landscape. By building apps that empower individuals to control their own health data, participants will play a pivotal role in addressing some of the most pressing challenges in modern healthcare, from data privacy to accessibility and portability. We're xcited about this challenge and to continue building the future of decentralized healthcare!
Happy new year!
PS. Feel free to reach out with any questions to jon@nosfabrica.com or go to https://nosfabrica.com/challenge/ to learn more.
-
@ d9e9fb27:d5fe5e1a
2025-01-02 16:31:34Colmar is a well known city in the region of Alsace, France. Its characteristic buildings, the narrow streets and the small river flowing through are worldwide famous.
However, it is during Christmas that the city gets the most attention. Thousands of people from all over Europe decide to spend one of the Advent weekends to wander around this beautiful city and hundreds of little wooden huts.
In fact, this town becomes a small Christmas village, with decorations and lights on every building and the famous Christmas market covering every possible inch of it.
Walking around this city really makes you feel the Christmas Spirit!
Of course, it can get really cold during this time of the year. That is why Alsatians wander around drinking the Vin Chaud (literally "Hot Wine"). This beverage is prepared by mixing sugar, various spices, such as cinnamon and cloves, and red wine. They are served in a plastic glass, which can be reused multpiple time or returned for a couple of Euros. However, every year the glass is designed differently, so many people keep it with them as a collectible!
Here is 2024 version:
This is the first time I try to do a photography reportage of the places I visit. I really hope you enjoyed it!Let me know what you think, every feedback is appreciated.
I will try to create more of them during my trips, so stay tuned!
Tuma
-
@ 1bda7e1f:bb97c4d9
2025-01-02 05:19:08Tldr
- Nostr is an open and interoperable protocol
- You can integrate it with workflow automation tools to augment your experience
- n8n is a great low/no-code workflow automation tool which you can host yourself
- Nostrobots allows you to integrate Nostr into n8n
- In this blog I create some workflow automations for Nostr
- A simple form to delegate posting notes
- Push notifications for mentions on multiple accounts
- Push notifications for your favourite accounts when they post a note
- All workflows are provided as open source with MIT license for you to use
Inter-op All The Things
Nostr is a new open social protocol for the internet. This open nature exciting because of the opportunities for interoperability with other technologies. In Using NFC Cards with Nostr I explored the
nostr:
URI to launch Nostr clients from a card tap.The interoperability of Nostr doesn't stop there. The internet has many super-powers, and Nostr is open to all of them. Simply, there's no one to stop it. There is no one in charge, there are no permissioned APIs, and there are no risks of being de-platformed. If you can imagine technologies that would work well with Nostr, then any and all of them can ride on or alongside Nostr rails.
My mental model for why this is special is Google Wave ~2010. Google Wave was to be the next big platform. Lars was running it and had a big track record from Maps. I was excited for it. Then, Google pulled the plug. And, immediately all the time and capital invested in understanding and building on the platform was wasted.
This cannot happen to Nostr, as there is no one to pull the plug, and maybe even no plug to pull.
So long as users demand Nostr, Nostr will exist, and that is a pretty strong guarantee. It makes it worthwhile to invest in bringing Nostr into our other applications.
All we need are simple ways to plug things together.
Nostr and Workflow Automation
Workflow automation is about helping people to streamline their work. As a user, the most common way I achieve this is by connecting disparate systems together. By setting up one system to trigger another or to move data between systems, I can solve for many different problems and become way more effective.
n8n for workflow automation
Many workflow automation tools exist. My favourite is n8n. n8n is a low/no-code workflow automation platform which allows you to build all kinds of workflows. You can use it for free, you can self-host it, it has a user-friendly UI and useful API. Vs Zapier it can be far more elaborate. Vs Make.com I find it to be more intuitive in how it abstracts away the right parts of the code, but still allows you to code when you need to.
Most importantly you can plug anything into n8n: You have built-in nodes for specific applications. HTTP nodes for any other API-based service. And community nodes built by individual community members for any other purpose you can imagine.
Eating my own dogfood
It's very clear to me that there is a big design space here just demanding to be explored. If you could integrate Nostr with anything, what would you do?
In my view the best way for anyone to start anything is by solving their own problem first (aka "scratching your own itch" and "eating your own dogfood"). As I get deeper into Nostr I find myself controlling multiple Npubs – to date I have a personal Npub, a brand Npub for a community I am helping, an AI assistant Npub, and various testing Npubs. I need ways to delegate access to those Npubs without handing over the keys, ways to know if they're mentioned, and ways to know if they're posting.
I can build workflows with n8n to solve these issues for myself to start with, and keep expanding from there as new needs come up.
Running n8n with Nostrobots
I am mostly non-technical with a very helpful AI. To set up n8n to work with Nostr and operate these workflows should be possible for anyone with basic technology skills.
- I have a cheap VPS which currently runs my HAVEN Nostr Relay and Albyhub Lightning Node in Docker containers,
- My objective was to set up n8n to run alongside these in a separate Docker container on the same server, install the required nodes, and then build and host my workflows.
Installing n8n
Self-hosting n8n could not be easier. I followed n8n's Docker-Compose installation docs–
- Install Docker and Docker-Compose if you haven't already,
- Create your
docker-compose.yml
and.env
files from the docs, - Create your data folder
sudo docker volume create n8n_data
, - Start your container with
sudo docker compose up -d
, - Your n8n instance should be online at port
5678
.
n8n is free to self-host but does require a license. Enter your credentials into n8n to get your free license key. You should now have access to the Workflow dashboard and can create and host any kind of workflows from there.
Installing Nostrobots
To integrate n8n nicely with Nostr, I used the Nostrobots community node by Ocknamo.
In n8n parlance a "node" enables certain functionality as a step in a workflow e.g. a "set" node sets a variable, a "send email" node sends an email. n8n comes with all kinds of "official" nodes installed by default, and Nostr is not amongst them. However, n8n also comes with a framework for community members to create their own "community" nodes, which is where Nostrobots comes in.
You can only use a community node in a self-hosted n8n instance (which is what you have if you are running in Docker on your own server, but this limitation does prevent you from using n8n's own hosted alternative).
To install a community node, see n8n community node docs. From your workflow dashboard–
- Click the "..." in the bottom left corner beside your username, and click "settings",
- Cilck "community nodes" left sidebar,
- Click "Install",
- Enter the "npm Package Name" which is
n8n-nodes-nostrobots
, - Accept the risks and click "Install",
- Nostrobots is now added to your n8n instance.
Using Nostrobots
Nostrobots gives you nodes to help you build Nostr-integrated workflows–
- Nostr Write – for posting Notes to the Nostr network,
- Nostr Read – for reading Notes from the Nostr network, and
- Nostr Utils – for performing certain conversions you may need (e.g. from bech32 to hex).
Nostrobots has good documentation on each node which focuses on simple use cases.
Each node has a "convenience mode" by default. For example, the "Read" Node by default will fetch Kind 1 notes by a simple filter, in Nostrobots parlance a "Strategy". For example, with Strategy set to "Mention" the node will accept a pubkey and fetch all Kind 1 notes that Mention the pubkey within a time period. This is very good for quick use.
What wasn't clear to me initially (until Ocknamo helped me out) is that advanced use cases are also possible.
Each node also has an advanced mode. For example, the "Read" Node can have "Strategy" set to "RawFilter(advanced)". Now the node will accept json (anything you like that complies with NIP-01). You can use this to query Notes (Kind 1) as above, and also Profiles (Kind 0), Follow Lists (Kind 3), Reactions (Kind 7), Zaps (Kind 9734/9735), and anything else you can think of.
Creating and adding workflows
With n8n and Nostrobots installed, you can now create or add any kind of Nostr Workflow Automation.
- Click "Add workflow" to go to the workflow builder screen,
- If you would like to build your own workflow, you can start with adding any node. Click "+" and see what is available. Type "Nostr" to explore the Nostrobots nodes you have added,
- If you would like to add workflows that someone else has built, click "..." in the top right. Then click "import from URL" and paste in the URL of any workflow you would like to use (including the ones I share later in this article).
Nostr Workflow Automations
It's time to build some things!
A simple form to post a note to Nostr
I started very simply. I needed to delegate the ability to post to Npubs that I own in order that a (future) team can test things for me. I don't want to worry about managing or training those people on how to use keys, and I want to revoke access easily.
I needed a basic form with credentials that posted a Note.
For this I can use a very simple workflow–
- A n8n Form node – Creates a form for users to enter the note they wish to post. Allows for the form to be protected by a username and password. This node is the workflow "trigger" so that the workflow runs each time the form is submitted.
- A Set node – Allows me to set some variables, in this case I set the relays that I intend to use. I typically add a Set node immediately following the trigger node, and put all the variables I need in this. It helps to make the workflows easier to update and maintain.
- A Nostr Write node (from Nostrobots) – Writes a Kind-1 note to the Nostr network. It accepts Nostr credentials, the output of the Form node, and the relays from the Set node, and posts the Note to those relays.
Once the workflow is built, you can test it with the testing form URL, and set it to "Active" to use the production form URL. That's it. You can now give posting access to anyone for any Npub. To revoke access, simply change the credentials or set to workflow to "Inactive".
It may also be the world's simplest Nostr client.
You can find the Nostr Form to Post a Note workflow here.
Push notifications on mentions and new notes
One of the things Nostr is not very good at is push notifications. Furthermore I have some unique itches to scratch. I want–
- To make sure I never miss a note addressed to any of my Npubs – For this I want a push notification any time any Nostr user mentions any of my Npubs,
- To make sure I always see all notes from key accounts – For this I need a push notification any time any of my Npubs post any Notes to the network,
- To get these notifications on all of my devices – Not just my phone where my Nostr regular client lives, but also on each of my laptops to suit wherever I am working that day.
I needed to build a Nostr push notifications solution.
To build this workflow I had to string a few ideas together–
- Triggering the node on a schedule – Nostrobots does not include a trigger node. As every workflow starts with a trigger we needed a different method. I elected to run the workflow on a schedule of every 10-minutes. Frequent enough to see Notes while they are hot, but infrequent enough to not burden public relays or get rate-limited,
- Storing a list of Npubs in a Nostr list – I needed a way to store the list of Npubs that trigger my notifications. I initially used an array defined in the workflow, this worked fine. Then I decided to try Nostr lists (NIP-51, kind 30000). By defining my list of Npubs as a list published to Nostr I can control my list from within a Nostr client (e.g. Listr.lol or Nostrudel.ninja). Not only does this "just work", but because it's based on Nostr lists automagically Amethyst client allows me to browse that list as a Feed, and everyone I add gets notified in their Mentions,
- Using specific relays – I needed to query the right relays, including my own HAVEN relay inbox for notes addressed to me, and wss://purplepag.es for Nostr profile metadata,
- Querying Nostr events (with Nostrobots) – I needed to make use of many different Nostr queries and use quite a wide range of what Nostrobots can do–
- I read the EventID of my Kind 30000 list, to return the desired pubkeys,
- For notifications on mentions, I read all Kind 1 notes that mention that pubkey,
- For notifications on new notes, I read all Kind 1 notes published by that pubkey,
- Where there are notes, I read the Kind 0 profile metadata event of that pubkey to get the displayName of the relevant Npub,
- I transform the EventID into a Nevent to help clients find it.
- Using the Nostr URI – As I did with my NFC card article, I created a link with the
nostr:
URI prefix so that my phone's native client opens the link by default, - Push notifications solution – I needed a push notifications solution. I found many with n8n integrations and chose to go with Pushover which supports all my devices, has a free trial, and is unfairly cheap with a $5-per-device perpetual license.
Once the workflow was built, lists published, and Pushover installed on my phone, I was fully set up with push notifications on Nostr. I have used these workflows for several weeks now and made various tweaks as I went. They are feeling robust and I'd welcome you to give them a go.
You can find the Nostr Push Notification If Mentioned here and If Posts a Note here.
In speaking with other Nostr users while I was building this, there are all kind of other needs for push notifications too – like on replies to a certain bookmarked note, or when a followed Npub starts streaming on zap.stream. These are all possible.
Use my workflows
I have open sourced all my workflows at my Github with MIT license and tried to write complete docs, so that you can import them into your n8n and configure them for your own use.
To import any of my workflows–
- Click on the workflow of your choice, e.g. "Nostr_Push_Notify_If_Mentioned.json",
- Click on the "raw" button to view the raw JSON, ex any Github page layout,
- Copy that URL,
- Enter that URL in the "import from URL" dialog mentioned above.
To configure them–
- Prerequisites, credentials, and variables are all stated,
- In general any variables required are entered into a Set Node that follows the trigger node,
- Pushover has some extra setup but is very straightforward and documented in the workflow.
What next?
Over my first four blogs I explored creating a good Nostr setup with Vanity Npub, Lightning Payments, Nostr Addresses at Your Domain, and Personal Nostr Relay.
Then in my latest two blogs I explored different types of interoperability with NFC cards and now n8n Workflow Automation.
Thinking ahead n8n can power any kind of interoperability between Nostr and any other legacy technology solution. On my mind as I write this:
- Further enhancements to posting and delegating solutions and forms (enhanced UI or different note kinds),
- Automated or scheduled posting (such as auto-liking everything Lyn Alden posts),
- Further enhancements to push notifications, on new and different types of events (such as notifying me when I get a new follower, on replies to certain posts, or when a user starts streaming),
- All kinds of bridges, such as bridging notes to and from Telegram, Slack, or Campfire. Or bridging RSS or other event feeds to Nostr,
- All kinds of other automation (such as BlackCoffee controlling a coffee machine),
- All kinds of AI Assistants and Agents,
In fact I have already released an open source workflow for an AI Assistant, and will share more about that in my next blog.
Please be sure to let me know if you think there's another Nostr topic you'd like to see me tackle.
GM Nostr.
-
@ 58edc6ae:e070cfa5
2025-01-01 20:02:36MiCA Regulation and the new AML Regulation have recently come into force, raising several concerns about how the EU is approaching non-custodial payment solutions. These include:
- Conflicts with privacy standards and human rights norms
The rules permit excessive collection and sharing of information on private transactions without adequate safeguards, conflicting with EU privacy standards and international human rights principles, as emphasised in rulings by the Court of Justice of the European Union.
- Blocking innovation
The regulations conflict with privacy-focused technologies, potentially stifling new ideas and platforms in the EU. This could weaken the EU’s position as a leader in digital finance.
- Hurting competition
Compliance with these regulations increases operating costs for EU-based CASPs, placing them at a disadvantage compared to non-EU companies operating under less restrictive rules. This may push users toward unregulated services outside Europe, undermining the regulations' purpose.
- Excluding vulnerable groups
The regulations could make it harder for people in poorer or politically unstable countries to access secure and private financial tools, leaving them without viable financial options.
These issues are explored in detail in the report prepared by nostr:npub15ka0zlfeys4vphnl6dk4x63e7sra0mp3wmrp4ml7q993z8km0n6spjxua8 and me for Open Dialogue Foundation upon the request of nostr:npub13ajk3hhvqys2ev4y68jwxywgs8fsdsuk4y5gkzs874jdyrccvf5qak2yd9 .
It is crucial to reopen the discussion on these issues and urge European lawmakers to reconsider their approach. The EU needs a regulatory framework that strikes a balance between security and privacy, fosters innovation, and rebuilds Europe’s weakened position in the global digital economy.
MiCA #AML
-
@ ea9e8563:5a82ed79
2025-01-01 12:12:03Januar
- Bitcoin Spende an Satoshi
https://mempool.space/tx/d7db4f96a4059c8906b953677ce533493d7b9da0f854a21b99f5772910dd0a31
- Bitcoin im Bundestrag
https://bitcoin-im-bundestag.de/event/auftaktveranstaltung-bitcoin-im-bundestag/
- Bitcoin ETF Aproval
- USA verkauft Beschlagnamte Bitcoin von Darknet Dealer Xanaxman
- LKA Beschlagnahmt Bitcoin
- Gericht bestätigt, dass die Trucker Massnahmen (Geld einfrieren) unrechtmässig gewesen ist
Song 1: Netdiver
> Hodl, Hodl, Hodlin' - Pleb Town Rock*
Februar
- Einundzwanzig Magazin: Interview mit Julian Assange's Brunder
https://bitpartikel.com/cryptonite/blog/2024/02/20/freejulianassangenow-2/
- Fair Talk akzeptiert auch Bitcoin Lightning Spenden
- Marathon Slipstream wird Announced (direct Submitting BTC txs)
- Cypherpunks: Hörbuch nun auf audible
https://www.audible.de/magazin/cypherpunks-wir-sind-opfer-der-geheimdienste
Song 2: Eric
Bitcoin to the Sky - Lunapilot
März
- Bitcoin Atlantis
https://www.youtube.com/@freemadeira
- Opensats Nostr Fund
https://opensats.org/projects/nostr
- Sovereign Engineering (mit Gigi)
https://sovereignengineering.io/
- El Salvador hebt KYC Limite von 200$ auf 25k$
https://www.nobsbitcoin.com/el-salvador-updates-old-law-to-lift-kyc-limits-from-200-to-25000/
- BitBox Lightning Preview
https://twitter.com/BitBoxSwiss/status/1767491986578080091
- Twenty Two Portal (Mobile Signing Device)
https://x.com/TwentyTwoHW/status/1763625247465762826?s=20
Song 3: Sandro
> PlanB Network - The Orange Pill Jam*
## \ April
- 21 Magazin „Bitcoin ist Cypherpunk“
https://twitter.com/BITpARTIKEL/status/1775742551749808255
- Gold so viel wert wie noch nie - Experten rätseln über Gründe
https://tagesschau.de/wirtschaft/finanzen/gold-preis-rekordhoch-zinsen-100.html…
- Renato Moicano Octagon Interview | UFC 300
Link - talks about Ludwig von Mises
- Samourai Gründer verhaftet
https://www.justice.gov/usao-sdny/pr/founders-and-ceo-cryptocurrency-mixing-service-arrested-and-charged-money-laundering
- Wasabi stellt Coinjoin Service ein
https://blog.wasabiwallet.io/zksnacks-is-discontinuing-its-coinjoin-coordination-service-1st-of-june/
- LNbits Funds gestohlen
https://twitter.com/lnbits/status/1784521836950110264
- Roger Ver wird Steuerbetrug vorgeworfen
https://www.justice.gov/opa/pr/early-bitcoin-investor-charged-tax-fraud
- Swiss Bitcoin Conference in Kreuzlingen
https://swiss-bitcoin-conference.com/
Song 4: Nicolas
The Johner Boys - Psycho
Mai
- Tornado Cash - Akexey Pertsev für 64 Monate verurteilt
https://www.nobsbitcoin.com/tornado-cash-developer-alexey-pertsev-sentenced-to-64-months-in-prison-in-the-netherlands/
- AFD sympatisiert mit Bitcoin
https://www.blocktrainer.de/blog/afd-mit-anfrage-an-die-bundesregierung-zu-bitcoin
- Seasteading
https://fountain.fm/episode/gloM4Dygv97mnKkLXMZc
- Microstrategy Bitcoin Strategie, seit ca 4 Jahren aktiv - Aktienkurs mehr als 1’500% gestiegen.
Berglinde Briefing vom 30.05.24
- Bum Bum Check
Breedlove
Song 5: Netdiver
The next Bitcoin Bull Run - Annonymal
Juni
- Deutschland verkauft Bitcoin
https://www.btc-echo.de/schlagzeilen/verkauft-das-bka-50-000-bitcoin-186860/
- Mt Gox verkauft BTC
https://www.blocktrainer.de/blog/mtgox-startet-bitcoin-rueckzahlungen
- BTC Prague
- Paralelni Polis
https://paralelnipolis.cz/en/o-nas/en/
- Julian Assange Free
- Lykke Konkurs (hack 22mio Dollar)
Song 6: Eric
Halving - Orange Pill Jam Project
Juli
- Julians Assange erster Geburtstag in Freiheit nach Jahren
https://primal.net/e/note1eppuucmjkrux55k9gmtta9kxfua56tfrfy8sankwmlf34aach6zqggurwa
- Phoenix unterstützt jetzt Bolt 12
https://x.com/PhoenixWallet/status/1808547081214439494
- Trump spricht auf der BTC24 in Nashville
https://x.com/BitcoinMagazine/status/1811181306438660375
- Anhörung von Lonergan „TDevD“ Dev von Samourai
https://x.com/frankcorva/status/1811093896144785625
- Faketoshi ist nicht Satoshi (für 3Monate auf seiner Website
https://primal.net/e/note1rfmplr0dry52hd3y65dvred9638saglf8sjw2fp4fd4e0w2z4ncsej77cz
- Sachsen Notveräusserung von 50k Bitcoin
https://www.medienservice.sachsen.de/medien/news/1077662
- Larry fink und Michael Dell im Bitcoin Fieber?
https://www.blocktrainer.de/blog/blackrock-ceo-larry-fink-und-michael-dell-im-bitcoin-fieber
- Strike BTC Pay Server Integration
https://strike.me/blog/btcpay-server-integrates-strike-api-to-power-bitcoin-payments/
- Proton Wallet
https://proton.me/blog/proton-wallet-launch
- Erster Bitaxe Block
https://mempool.space/de/block/00000000000000000000f0235e50becc0b3bc91231e236f67736d64b1813704b
Song 7: Sandro
PlebRap - Bitcoin braucht dich nicht! - SatStacker, Mo
August
- Mutiny Wallet shutting down
https://blog.mutinywallet.com/mutiny-wallet-is-shutting-down/
- Dark Skippy Attack
Der Bitcoin Dark Skippy-Angriff ist eine ausgeklügelte Methode, die auf Hardware-Wallets abzielt. Er nutzt kompromittierte Firmware aus, um heimlich Teile der Seed-Phrase eines Benutzers in Transaktionssignaturen einzubetten. Mit nur wenigen signierten Transaktionen können Angreifer die vollständige Seed-Phrase extrahieren und möglicherweise die volle Kontrolle über die gespeicherten Bitcoins erlangen. Dieser Angriff ist besonders gefährlich, da er im Hintergrund unbemerkt ablaufen kann, was ihn schwer zu erkennen macht.
- Bitbox anti Klepto
https://bitbox.swiss/blog/anti-klepto-wie-die-bitbox02-versteckte-seed-extraktion-verhindert/
Der Artikel erklärt das Anti-Klepto-Protokoll, das von der BitBox02 Hardware-Wallet implementiert wurde. Dieses Protokoll schützt vor dem "Nonce Covert Channel"-Angriff, bei dem ein bösartiger Hersteller heimlich den privaten Schlüssel (Seed) des Benutzers extrahieren könnte. Das Anti-Klepto-Protokoll funktioniert, indem es die Fähigkeit der Hardware-Wallet einschränkt, die Nonce frei zu wählen, indem es zusätzliche Zufälligkeit von der Host-Software (z.B. BitBoxApp) einbezieht. Dies verhindert die Manipulation der Nonce zur Übertragung versteckter Daten und erhöht somit die Sicherheit der Benutzer-Seeds.
- Sunny vs Holger Wette
- Todestag von Hal Finney
https://www.blocktrainer.de/blog/der-tag-an-dem-hal-finney-starb
- Telegram Gründer in Frankreich festgenommen
https://www.zeit.de/digital/2024-08/pawel-durow-festnahme-frankreich-telegram?utm_content=zeitde_redpost+_link_sf&utm_campaign=ref&utm_medium=sm&utm_referrer=twitter&wt_zmc=sm.int.zonaudev.twitter.ref.zeitde.redpost.link.sf&utm_source=twitter_zonaudev_int
- Überbezahlte Konsolidierungs tx by 195x
https://x.com/mononautical/status/1826698452149174433
Song 8: Nicolas
Middle Season - Let Go (What's holding you back)
September
- CLN v24.08 Bolt 12 und blinded Paths
https://x.com/core_ln/status/1830647170896105623
- Strike unterstützt Bolt 12
https://x.com/strike/status/1831099910458163536
- Bitcoin Hashrate auf ATH
https://charts.bitbo.io/hashrate/
- Marshall-Plan 2.0 - Wer zahlt Europas 800-Mrd.-Euro-Rechnung? (Sound Money BTC pod Loddi)
https://www.sound-money.de/podcast/episode/283fe281/237-marshall-plan-20-wer-zahlt-europas-800-mrd-euro-rechnung
- Nostr Wegweiser by Quille
https://quillie.github.io/nostr-wegweiser/
- Argentiniens Libertäre Zeitenwende (Einundzwanzig Podcast Folge)
https://fountain.fm/episode/xTMivhQBGJpdPLpKZ5l9
- Orange Vision for BAS
- Signal blocked in Russia
- Blackrock’s Coinbase tx’s recorded off-chain
https://x.com/TylerDurden/status/1790941726544478602
- DATUM by Ocean (Mining Software, readjusting incentives for miner - build their own templates)
https://x.com/ocean_mining/status/1840408161271890264
- Article by Scott Locklin about QC - shared by Jimmy Song
(Der Artikel argumentiert, dass Quantencomputing weitgehend ein betrügerisches Feld ist. Der Autor behauptet, dass trotz jahrzehntelanger Forschung und erheblicher Finanzierung kein praktischer Quantencomputer gebaut wurde. Er kritisiert den Mangel an Fortschritten bei der Erstellung auch nur eines fehlerkorrigierten Qubits und argumentiert, dass das Feld mehr auf Hype als auf tatsächlichem wissenschaftlichen Fortschritt basiert. Der Autor vergleicht Quantencomputing mit Nanotechnologie und suggeriert, dass beide Bereiche unrealistische Behauptungen über die Manipulation von Materie auf Weisen aufstellen, die wir nicht vollständig verstehen. Er äußert auch Bedenken über die Anzahl der Karrieren und Ressourcen, die einer Technologie gewidmet sind, die seiner Meinung nach in keiner praktischen Form existiert.)
https://scottlocklin.wordpress.com/2019/01/15/quantum-computing-as-a-field-is-obvious-bullshit/
Song 9: Netdiver
Real Men Invest in Bitcoin, and Not in Soya - Fezzy
Oktober
- BAS GV
- 2 Orange Vision Kandidaten wurden gewählt
- Phil
- Lisa
- Niklas
- Adriano
https://www.bitcoinassociation.ch/board-1
- Bitcoin verkaufen mit Pocket, auch in der Bitbox App
https://www.blocktrainer.de/blog/bitbox-pocket-mit-neuem-feature
- Shielded Client side validation
Abgeschirmte clientseitige Validierung (Shielded CSV) ist ein neues Protokoll, das Token-Transfers auf Bitcoin verbessert. Es ermöglicht die private Übertragung von Token, ohne Informationen über die Token oder deren Transferhistorie preiszugeben. Abgeschirmte CSV verwendet Zero-Knowledge-Beweise, um Überweisungen mit einem festen Ressourcenaufwand zu verifizieren, was die Privatsphäre und Effizienz verbessert. Zudem können mehrere Token-Transfers in einer einzigen Bitcoin-Transaktion kombiniert werden, was potenziell Tausende von Token-Transfers in einem Block ermöglicht.
https://bitcoinops.org/en/newsletters/2024/09/27/
- Tesla verkauft alle Bitcoin
https://www.blocktrainer.de/blog/tesla-leert-die-bitcoin-wallet-was-steckt-dahinter
- FBI Token überführt Pump and Dump Projekte
https://www.blocktrainer.de/blog/anklagen-wegen-pump-and-dump-im-krypto-sektor
- Lugano Plan B Forum
https://planb.lugano.ch/planb-forum/
- Klima Grosseltern
Song 10: Eric
Rely on relay - Orange Pill Jam Project
November
- Telekom testet Bitcoin Mining infrastrukturen
https://www.telekom.com/de/medien/medieninformationen/detail/test-bitcoin-mining-infrastruktur-fuer-ueberschuessige-energie-1082680
- Bitcoin Block Stans
https://x.com/NW_BTCkonferenz
- Shopinbit Schweiz Launch
Code DEZENTRALSCHWEIZ 5CHF geschenkt auf ersten Einkauf
- Boost Initial Node sync mit UTXO Snapshots
https://blog.lopp.net/bitcoin-node-sync-with-utxo-snapshots/
- Bitcoin Alps
https://www.bitcoin-alps.ch/konferenz/
- Liana Wallet Anleitung/Review von Patrick
https://dezentralschweiz.ch/liana-die-besondere-multisig-wallet/
Song 11: Sandro
Bitcoin Anthem - Miss Bitcoin
Dezember
- Bitcoin Baden
- BAS GV im Dezember
- Wahl eines weiteren Board-mitglied
- Rahim Taghizadegan
- Abarbeitung div. Traktanden
- Abstimmung über 100k Initiative
https://static1.squarespace.com/static/5895d62d2994ca86b0cd9807/t/67503467c6aa4452cae00fcf/1733309544008/Bitcoin_Association_General_Assembly_07_12_2024.pdf
- BAS im Bundeshaus
https://www.finews.ch/news/finanzplatz/65619-bitcoin-association-switzerland-bas-sbf-bundeshaus-bitcoin-stablecoin-swiss-blockchain-federation-rahim-taghizadegan?utm_source=newsletter_5075&utm_medium=email&utm_campaign=finewsletter-vom-11-12-2024
- 100K Party BAS
Song 12: Nicolas
Headache Song - FM Rodeo
-
@ ea9e8563:5a82ed79
2025-01-01 12:01:55Originally Published 21.05.21
Bitcoin
Die erste, grösste und bekannteste Kryptowährung heisst Bitcoin. Das Netzwerk wurde 2009 von Satoshi Nakamoto veröffentlicht unter dem Vorwand das, dass Geldsystem völlig kaputt und veraltet ist und etwas Neues her muss. Nach dem Finanzcrash 2007 baute er fleissig an diesem „magischen Internet-Geld“ und löste ein wichtiges Problem: das Double Spending Problem. Das Problem war bis zu diesem Zeitpunkt, dass digitale Informationen, Daten und Zahlen einfach beliebig oft vermehrt oder geändert werden konnten, ohne sie von einer zentralen Organisation zu überwachen lassen. Und das war Satoshi ganz wichtig, weil eine zentrale Organisation früher oder später diese Macht für sich ausnutzen wird. Vor allem in der Geldgeschichte wurde praktisch jede zentral geregelte, auf einer beinahe unendlich leicht herstellbaren Währung oft missbraucht. Bitcoin läuft mittlerweile seit über 12 Jahren und das ohne Fehler. Wie Bitcoin funktioniert, werde ich aber in diesem Artikel nicht weiter behandeln. Aber schauen wir uns doch kurz an, wofür Bitcoin erschaffen wurde und welche Probleme noch bestehen.
Das Ziel von Bitcoin
Bitcoin ist das solideste Geld, was wir jemals hatten. Wir können mit absoluter Sicherheit sagen, dass es nie mehr als 21 Millionen Bitcoin geben wird. Dadurch ist Bitcoin deflationär. Durch die Blockchain werden die ganzen Transaktionen, die jemals gemacht wurden, abgespeichert. Das Problem ist jetzt aber, dass Bitcoin im Schnitt nur 7 Transaktionen pro Sekunde verarbeiten kann, weil die maximale Blockgrösse und somit die Anzahl der Transaktionen begrenzt ist. Wenn wir das jetzt mit den altbekannten Anbietern wie VISA und Mastercard vergleichen, können diese mehrere zehntausend Transaktionen pro Sekunde verarbeiten. Dies führt dazu, dass die Transaktionsgebühren relativ teuer werden, weil diese durch Angebot und Nachfrage bestimmt werden. Man kann sich Bitcoin also als Settlement Layer vorstellen, wie zum Beispiel FED Wire von der US-Zentralbank.
The Times 03/Jan/2009 Chancellor on brink of second bailout for banks.
*> - Satoshi Nakamoto
Ziele von Lightning
Lightning versucht die oben benannten Probleme zu lösen und sogar noch einige mehr. Auch werden neue Möglichkeiten geschaffen welche wir später noch genauer anschauen werden. Lightning ist ein Protokoll welches auf Bitcoin aufbaut, und ist völlig Open Source. Das heisst, theoretisch könnte man das LN (Lightning Netzwerk) auch auf anderen Kryptowährungen anwenden und benutzen. Zur Zeit geschieht dies aber noch nicht, weil die meisten anderen Kryptowährungen eher versuchen, diese Probleme auf dem Mainlayer zu lösen. Ob dies sinnvoll ist oder nicht lasse ich einfach mal so stehen. Als Ziele haben sich die Entwickler von Lightning und die Community verschiedenste Dinge gesetzt:
- P2P Netzwerk mit Zahlungskanälen zwischen den einzelnen Nutzern
- Routing über fremde Kanäle
- Skalierbarkeit von Bitcoin ausgleichen
- Geringe oder gar keine Netzwerkgebühren
- Hohe Privatsphäre
Wie Lightning entstanden ist
Man merkte schon relativ früh, dass man bei Bitcoin einige Probleme hat, wenn man damit einen Kaffee zahlen will. Die Transaktionsgebühren können da schnell mal höher als der Kaffee selbst sein. Dies ist natürlich nicht zielführend und ökonomisch kompletter Blödsinn. Deshalb machte man sich schon früh Gedanken, wie man dies verbessern könnte.
Es gibt drei Methoden, um dieses Problem zu lösen:
- Maximale Blockgrösse erhöhen (mehr Transaktionen)
- Zeit zwischen den Blöcken verkleinern
- Einführung eines Second Layer
Das Problem bei den ersten zwei Punkten ist, dass mit diesen Funktionen es sich viel schwieriger gestaltet ein eigene Node (Knotenpunkt) zu betreiben. Dieser Knotenpunkt müsste viel mehr Speicher haben als heute (ca. 300 GB) und würde somit mehr kosten. Auch müsste der Prozessor viel besser werden und somit mehr Energie verbrauchen, weil mehr Transaktionen validiert werden müssen. Weil es den Bitcoinern sehr wichtig ist, dass sie nicht auf andere vertrauen müssen, sondern alles selber verifizieren können.
Don’t trust, verify!
*> - bekanntes Bitcoin saying
Somit bleibt nur die Lösung eines Second Layers übrig. Auch wenn der Grossteil der Bitcoin Community für den Second Layer war, gab es ein kleines Lager, welches trotzdem für die Erhöhung der Blockgrösse war. So entstand Bitcoin Cash (BCH). Sie Forkten somit die Bitcoin Blockchain und es entstand ein neuer Abzweiger. Die Blockgrösse wurde von 1 MB auf 32 MB angehoben. Damit man den Second Layer mit Bitcoin verknüpfen konnte, musste noch das SegWit (Segregated-Withness) Update implementiert werden. Auch hier waren über 90 % der Bitcoin Community für ein Update, was ein Softfork bildete. Softforks sind nichts Schlechtes und sind eigentlich nur Software-Updates, welche Rückwärts kompatibel sind. Lightning wurde somit 2015 vorgestellt und 2018 veröffentlicht, auch wenn Lightning immer noch in den Kinderschuhen steckt, hat es ein Riesenpotenzial, vor allem wenn man sich anschaut wie schnell und gross das Netzwerk mittlerweile geworden ist.
Funktionsweise
Eines der wichtigsten Funktionen bei Lightning ist es, dass man Zahlungskanäle einrichtet, welche zwischen dir und dem Empfänger geöffnet werden. Das ausgeklügelte daran aber ist, dass man nicht zu jedem, dem man eine Transaktion schickt, auch einen Kanal offen haben muss. Aber schauen wir uns zuerst mal das Prinzip von einem einfachen Zahlungskanal an.
In diesem Beispiel haben Alice und Bob sich gegenseitig einen Zahlungskanal geöffnet, damit dies auch wirklich passiert, muss man Liquidität hinzufügen. Das Tolle daran ist, dass nicht unbedingt beide müssen oder nicht gleichviel hinzufügen müssen. Dies macht vor allem Sinn, wenn Alice ein Kaffee betreibt und Bob sich da jeden Morgen einen Kaffee holt. Somit muss Alice nie Geld zu Bob senden, aber Bob muss immer Geld zu Alice. In unserem Beispiel sind Alice und Bob Freunde und schicken sich gegenseitig immer wieder Geld. Bei der Eröffnung, also der Liquiditätseingabe, wird eine Transaktion auf der Bitcoin Blockchain zu einem Multi Signature Wallet gemacht. Dieses Wallet hat zwei Private Keys und kann nur geplündert werden, wenn beide dazu zustimmen. Das Geld wird also eingefroren. Durch eine Schnittstelle erkennt das Lightning Netzwerk das und ordnet die eingezahlten Gelder den beiden zu.
Mann kann sich vorstellen, dass innerhalb eines Zahlungskanals immer Geld hin und hergeschickt werden kann ohne Gebühren. Dies wird digital in einem Buchhaltungsähnlichen System gespeichert. Und am Ende kommt eine neue Balance heraus, welche mit der Schliessung des Channels wieder in den Mainlayer (also Bitcoin) implementiert wird. Dadurch können unendlich viele Transaktionen in maximal 4 Transaktionen auf der Bitcoin Blockchain dargestellt werden. Das absolut verrückte ist aber, dass 500 Transaktionen pro Sekunde durchgeführt werden können, in jedem Channel!
Routing von Transaktionen
Um nicht bei jeder kleinsten Transaktion einen neuen Channel erstellen zu, müssen gibt es noch eine weitere Möglichkeit Geld zu versenden. Dabei werden fremde Channels verwendet und eine Route wird von dir zu deinem Empfänger gesucht. Sobald diese Route gefunden ist, wird das Geld von Person zu Person vollautomatisch versendet. Als Gebühr für die Mitbenutzung der Fremden Channel bezahlt man eine kleine Gebühr, welche aber sehr klein ist und meist nur wenige Cent beträgt.
### Vorteile von Lightning
Das Lightning Netzwerk nutzt auch Bitcoin als Währung und ist somit ebenfalls extrem sicher und man kann garantieren das es nie mehr als 21 Millionen geben wird auf dem Lightning und Bitcoin-Netzwerk. Weil viele neue Möglichkeiten durch dieses schnelle Netzwerk geschaffen werden, wurde der Satoshi (1:100’000’000 Bitcoin) nochmal in eine kleinere Unterwährung aufgeteilt. Dabei wird 1 Satoshi in 1000 mSatoshis (mili) aufgeteilt. Ein weiterer Vorteil ist die Fehlende öffentliche Transaktionshistorie, damit ist die Privatsphäre extrem hoch und die Nachverfolgbarkeit extrem schwierig, vor allem wenn die Bezahlungen über mehrere Routing Hops (Sprünge) laufen. Man kann also sagen, dass Lightning Privacy per Default hat. Lightning ist dezentral und für jeden Menschen nutzbar, welcher es nutzen will.
Anwendungsbereiche
Mittlerweile gibt es schon extrem viele Bereiche wo Lightning angewendet wird um die Vorteile von der Blockchain und von Lightning allgemein zu nutzen, einige davon Werde ich euch nun vorstellen:
Fountain: Podcast Plattform
Fountain funktioniert im Prinzip wie jede andere grössere Podcastplattform wie zum Beispiel Spotify oder Apple Podcasts und viele mehr. Nicht nur für den Content Creator gibt es viele coole Features, sondern auch für den Nutzer. Zum Beispiel kann der Nutzer einstellen, wie viel Geld er zahlen will, um den Creator zu unterstützen, während er sich den Podcast anhört wird für die Zeit, die er hört ein Betrag abgebucht. Meiner Meinung ist dies ein extrem guter Weg, um vor allem kleine Podcasts zu monetisieren und guten Content zu fördern. Auch für den Nutzer ist diese Lösung ideal, weil man nur bezahlt, wenn man die Dienstleistung überhaupt benutzt. Des Weiteren gibt es viele "Neue" Features, die so bisher nur auf solchen "neuen" Podcast Plattformen zu finden sind. Zum Beispiel gibt es Kapitelmarken, referenzierte Musik-Tracks und Livestreams, und ausserdem kann man auch Kommentare hinterlassen, was die Interaktion zwischen Creator verbessert!
Strike: Cash App
Man kann sich Strike vorstellen wie Paypal nur mit dem entscheidenden unterschied, dass das ganze auf Bitcoin läuft. Strike ermöglicht es heute schon tausenden von Menschen auf einfachste Art und Weise Geld über die ganze Welt zu versenden und das mit dem solidesten Geld, was es überhaupt gibt, das schöne ist, dass die Werte auch wirklich verschickt werden. Hierzu ein kleiner Exkurs aus dem aktuellen Bankensystem: Wenn jemand aus Europa jemandem Geld in Amerika schicken will, verlässt das Geld das Land nicht. Man braucht für einen Internationalen Banktransfer immer einen Gegenspieler, welcher Geld aus Amerika nach Europa schicken möchte. Diesen Vorgang nennt man ’’Clearing’’. Meistens ist das kein Problem, da viele Transaktionen das Land verlassen aber auch kommen, aufgrund dieser Liquidität geht das zumindest in Industrieländern ganz gut. Entwicklungsländer haben hier schon eher Schwierigkeiten und werden Teilweise sogar aus dem Bankensystem ausgeschlossen (Siehe Iran Swift Sanctions) Ein weiterer Vorteil der sich durch Strike ergibt, ist das die Zahlungen fast keine Gebühren verursachen. Diese sind meist im Cent / Rappen Bereich.
Sphinx /Juggernout: Chat App
Die beiden Apps versuchen ein WhatsApp mit absoluter Privatsphäre zu bauen. Um dies zu erreichen wird die Channelfunktion von Lightning benutzt, weil diese nur von den zwei Parteien eingesehen werden kann und mit höchstmöglicher Privatsphäre durch die Blockchain gesichert wird. Diese Services kosten zwar etwas, aber mit der eigenen Lightning Node (Knotenpunkt) sind diese Kosten sehr gering und liegen ebenfalls im Cent / Rappen Bereich.
Edit: Spinx und Juggernout konnten sich bis anhin leider nie durchsetzen.
Originally Published 21.05.21
-
@ 3f770d65:7a745b24
2024-12-31 17:03:46Here are my predictions for Nostr in 2025:
Decentralization: The outbox and inbox communication models, sometimes referred to as the Gossip model, will become the standard across the ecosystem. By the end of 2025, all major clients will support these models, providing seamless communication and enhanced decentralization. Clients that do not adopt outbox/inbox by then will be regarded as outdated or legacy systems.
Privacy Standards: Major clients such as Damus and Primal will move away from NIP-04 DMs, adopting more secure protocol possibilities like NIP-17 or NIP-104. These upgrades will ensure enhanced encryption and metadata protection. Additionally, NIP-104 MLS tools will drive the development of new clients and features, providing users with unprecedented control over the privacy of their communications.
Interoperability: Nostr's ecosystem will become even more interconnected. Platforms like the Olas image-sharing service will expand into prominent clients such as Primal, Damus, Coracle, and Snort, alongside existing integrations with Amethyst, Nostur, and Nostrudel. Similarly, audio and video tools like Nostr Nests and Zap.stream will gain seamless integration into major clients, enabling easy participation in live events across the ecosystem.
Adoption and Migration: Inspired by early pioneers like Fountain and Orange Pill App, more platforms will adopt Nostr for authentication, login, and social systems. In 2025, a significant migration from a high-profile application platform with hundreds of thousands of users will transpire, doubling Nostr’s daily activity and establishing it as a cornerstone of decentralized technologies.
-
@ 933f9d20:996b56ae
2024-12-31 16:41:41คำถามจากความอยากตระหนักรู้ในตนเอง
จู่ๆตัวเราก็นึกอยากจะเข้าใจตนเองมากขึ้น บนโลกนี้มีศาสตร์แห่งบุคลิกภาพมากมายที่ให้เราได้ศึกษาและทำแบบทดสอบ แต่จะดีกว่ามั้ยที่เรารู้อย่างคร่าวๆเกี่ยวกับศาสตร์ที่อยู่เบื้องหลังแบบทดสอบเหล่านั้น
Enneargram คืออะไร?
Enneargram ความหมายคือ 'นพลักษณ์' เป็นศาสตร์ที่มีจุดประสงค์ไว้เพื่อการเข้าใจตนเองและเข้าใจคนอื่นหรือเพื่อให้เราอยู่ร่วมกันในสังคมได้อย่างสงบสุข(และหลีกเลี่ยงการแทงใจดำคนอื่นโดยที่ตัวเองไม่ได้ตั้งใจได้!) โดยในแต่ละประเภทจะเรียกกันว่า 'ลักษณ์'
และในบทความนี้ผมจะพูดถึงความรู้เกี่ยวกับ Enneargram ในภาพรวมกันครับ!
นพลักษณ์ (Enneargram)
หากคุณบ้าบอคิดจะข้าม(เผลอๆข้ามไปแล้วมั้ง..)จากหัวข้อนี้ไปดื้อๆคุณก็จะอ่านไม่รู้เรื่องเลยด้วยซ้ำหากคุณไม่รู้ว่านพลักษณ์คืออะไร
'นพลักษณ์' โดยคำว่า 'นพ' ซึ่งแปลว่า 9(เก้า) และคำว่า 'ลักษณ์' ก็คือความหมายว่าเป็น ลักษณะ
ซึ่งก็จะแปลได้เป็น ลักษณะทั้ง 9 นั่นเองครับ!
แล้วก็จะมีการจัดกลุ่มลักษณ์โดยแบ่งเป็น 3 กลุ่มซึ่งก็จะถูกเรียกว่า
ปัญญา 3 ฐาน (The 3 centers) อันได้แก่
ฐานการกระทำหรือฐานกาย แทนเป็น (A) ฐานความรู้สึกหรือฐานใจ แทนเป็น (F) ฐานความคิดหรือฐานหัว แทนเป็น (T)
พอรู้ปัญญา 3 ฐานแล้ว...เรามาดูลักษณะในแต่ละลักษณ์กันเลยดีกว่า!
The perfectionist (ลักษณ์ 1 A) เป็นลักษณ์ที่รักความสมบูรณ์แบบอย่างสุดซึ้ง มีระเบียบวินัยในชีวิตโคตรๆ เป็นคนเนี้ยบของทุกอย่างรอบตัวจะถูกจัดอย่างเป็นระเบียบ หากมีเศษขี้เล็บใครอยู่บนโต๊ะเขาก็จะรู้เลยว่ามันไม่ใช่ของเขา ยึดมั่นในคุณธรรมจริยธรรมอันดี และชอบความแน่นอน
The giver (ลักษณ์ 2 F) เป็นผู้ชอบให้ชอบเสียสละสิ่งที่ตนมี โดยที่ตนเองก็หวังลึกๆว่าจะได้สิ่งตอบแทนกลับมาด้วย มีนิสัยที่ร่าเริงแจ่มใสใจกว้างและเป็นมิตรต่อทุกๆคน
The preformer (ลักษณ์ 3 F) รัก(บ้า)การแข่งขันและชอบการเอาชนะเป็นที่สุด เกลียดการพ่ายแพ้และต้องการเป็นภาพลักษณ์ตามที่ตนเองต้องการ
The romantic (ลักษณ์ 4 F) พื้นฐานคืออารมณ์เศร้าหมองและมีความอิจฉาลึกๆ ไม่อยากเหมือนใครในสิ่งที่ตนเองสนใจและความเป็นศิลปินในตัวสูง
The observer (ลักษณ์ 5 T) คลั่งการหาความรู้(หรือจะฝึกฝนก็ตาม)มาใส่หัวแบบจะเอาให้เทพสุดๆรู้มากสุดๆในเรื่องนั้นๆไปเลย มักแยกอารมณ์ออกจากกระบวนการคิดเชิงเหตุผล ต้องการพื้นที่ส่วนตัวสูงและเป็นลักษณ์ที่เก็บตัวสูง
The guardian (ลักษณ์ 6 T) เป็นลักษณ์ที่มีความกลัวเป็นพื้นฐานของอารมณ์ ชอบวิเคราะห์และวางแผนอนาคตแถมขี้สงสัยด้วย ไม่ชอบความไม่มั่นคงและความไม่ปลอดภัยหวาดระแวงตลอด(โดยเฉพาะอนาคต) ชอบอยู่ใต้การบังคับบัญชามากกว่า
The optimist (ลักษณ์ 7 T) เสพสุขรักการจญภัยและชอบเติมเต็มชีวิตด้วยความแปลกใหม่ตลอดเวลา มีความตะกละเป็นสันดานและไม่ชอบให้ใครมาวาดกรอบให้ตัวเอง
The leader (ลักษณ์ 8 A) มีความโกรธเป็นพื้นฐานของอารมณ์และมีความเป็นผู้นำโดยธรรมชาติ ฝักใฝ่หรือสนใจในอำนาจและการควบคุม สามารถใช้ความโกรธเชื่อมโยงในสิ่งใดก็ได้ตามใจอยาก(และมันโคตรทรงพลังนะจะบอกให้!) ชอบปฏิเสธความอ่อนแอ(ซึ่งเป็นข้อเสีย)และชอบทำสุดใส่สุด(โดยเฉพาะทางกายภาพ เช่น จะกินก๋วยเตี๋ยวเผ็ดๆก็เทพริกซะหมดแก้วบรรจุซะ)
The peacemaker (ลักษณ์ 9 A) นักการทูตตัวจริงเสียงจริง มักเป็นลักษณ์ที่เมื่อเกิดความขัดแย้งระหว่างกลุ่ม ลักษณ์นี้นี่แหละคือตัวปิดความขัดแย้งที่แท้ทรู แต่หากไม่เกิดผลลักษณ์นี้ก็จะหนีออกมาจากความขัดแย้งแทนซะงั้น เป็นลักษณ์ที่รักสงบและเกลียดความขัดแย้งนั่นเอง
Wing (สภาวะปีก)
เป็นสภาวะที่เกิดขึ้นโดยที่ลักษณ์หลักของเราได้รับผลกระทบจากลักษณ์รอบๆ เช่น คนที่มีลักษณ์ 8 ก็จะมีปีกเป็น ลักษณ์ 7 และ ลักษณ์9 ซึ่งจะมีเพียงด้านที่ถนัดที่สุดเท่านั้น หากใช้ลักษณ์ 7 บ่อยที่สุด เราก็จะเขียนได้เป็น
8w7
(8 คือลักษณ์หลักของเรา และ 7 ก็คือลักษณ์รองลงมาที่อยู่ข้างๆนั่นเอง โดยมีตัว 'w' เป็นสัญลักษณ์คั่นกลางไว้) และเราจะต้องอ่านว่าลักษณ์8ปีก7ซึ่งเราก็จะได้อิทธิพลลักษณะจากลักษณะข้างด้วยนั่นเองครับ ซึ่งบางสถานการณ์ก็อาจจะไม่มีก็ได้
Subtype (ลักษณ์ย่อย)
เป็นการแบ่งลักษณะการใส่ใจของแต่ละลักษณ์ โดยลักษณ์แต่ละลักษณ์จะต้องมี 3 ลักษณะ ซึ่งจะมีทั้งหมด 27 ลักษณ์ทั้งหมดในนพลักษณ์
Self-preservation (sp) เป็นลักษณ์ย่อยที่ใส่ใจกับความปลอดภัยและความมั่นคงของตนเองก่อน ซึ่งรวมถึงความมั่งคั่งและสิ่งของด้วย
Sexual,one-to-one (sx) เป็นลักษณ์ย่อยที่ให้ความสำคัญกับความสัมพันธ์กับใครคนใดคนหนึ่ง ไม่จำกัดว่าต้องเป็นคน จะเป็นสัตว์เลี้ยงก็ได้ ความสัมพันธ์ในครอบครัวหรือความสัมพันธ์แบบกุ๊กกิ๊กจักจี้หัวใจ(ก็โรแมนติกนั่นแหละ)
Social (so) เป็นลักษณ์ที่อยากมีส่วนร่วมหรือให้ความสำคัญในสังคมหรือในครอบครัว กลุ่มเพื่อน กลุ่มเพื่อนร่วมงาน ต้องการเป็นที่จดจำและต้องการความเคารพจากคนอื่น
Arrow line (สภาวะลูกศร)
เป็นสภาวะที่จะแสดงถึงพฤติกรรมต่างๆในแต่ละสถานการณ์ โดยจะเรียกกันว่าสภาวะมั่นคง ไม่มั่นคง และสภาวะปกติ
สภาวะปกติ ก็คือปกติ ไม่สุขไม่ทุกข์ มั่นคงและไม่มั่นคงในเวลาเดียวกัน
สภาวะมั่นคง เป็นสภาวะที่รู้สึกมั่นคงตามชื่อเลย เป็นความรู้สึกที่เป็นไปตามอยากตามต้องการ
สภาวะไม่มั่นคง ไม่ปกติ ไม่มั่นคง เครียด! หรือก็คือกำลังเจออยู่กับสิ่งที่ตนหลีกเลี่ยงนั่นเอง
โดยหากคนที่เป็นคนลักษณ์ 8 (อีกแล้ว!) ได้อยู่ใน....
-สภาวะไม่มั่นคง คนลักษณ์ 8 ก็จะได้รับอานิสงส์จากลักษณ์ที่ 5 หรือก็คือจะเก็บตัวมากขึ้น โฟกัสหรือสนใจแค่สิ่งๆหนึ่ง กลับไปจัดระเบียบชีวิต ความคิดตนเองหรือข้าวของที่อาจกระจัดกระจายไปทั่วในบ้านของตนเอง
-สภาวะมั่นคง คนลักษณ์ 8 ก็จะได้รับอิทธิพลจากลักษณ์ 2 ซึ่งนั่นก็คือการ Takecare ใจกว้างและรับฟังคนด้วย! ซึ่งดูมีความสุขแฮปปี้ลั้นลาในฉบับของลักษณ์ 8
ส่งท้าย
บทความนี้เป็นบทความแรกในชีวิตของผมเลย ซึ่งตัวผมเองก็เป็นลักษณ์ 8 ปีก 7 (8w7) ผมได้จมปรักกับเรื่องพวกนี้มากพอควร (3 ปีกว่าแล้วล่ะครับ) ซึ่งตัวผมในอดีตก็คงไม่ได้คิดหรอกว่าจะเขียนบทความ แถมยังเขียนใน Nostr อีก!
แต่ก็นะ.... ผมก็ขอขอบคุณที่อ่านมาจนถึงวรรคนี้นะครับ
ขอให้คุณตั้งใจใช้ชีวิตไปกับปีหน้านะครับ!
-From 31/12/2024