-
@ eac63075:b4988b48
2025-01-04 19:41:34Since its creation in 2009, Bitcoin has symbolized innovation and resilience. However, from time to time, alarmist narratives arise about emerging technologies that could "break" its security. Among these, quantum computing stands out as one of the most recurrent. But does quantum computing truly threaten Bitcoin? And more importantly, what is the community doing to ensure the protocol remains invulnerable?
The answer, contrary to sensationalist headlines, is reassuring: Bitcoin is secure, and the community is already preparing for a future where quantum computing becomes a practical reality. Let’s dive into this topic to understand why the concerns are exaggerated and how the development of BIP-360 demonstrates that Bitcoin is one step ahead.
What Is Quantum Computing, and Why Is Bitcoin Not Threatened?
Quantum computing leverages principles of quantum mechanics to perform calculations that, in theory, could exponentially surpass classical computers—and it has nothing to do with what so-called “quantum coaches” teach to scam the uninformed. One of the concerns is that this technology could compromise two key aspects of Bitcoin’s security:
- Wallets: These use elliptic curve algorithms (ECDSA) to protect private keys. A sufficiently powerful quantum computer could deduce a private key from its public key.
- Mining: This is based on the SHA-256 algorithm, which secures the consensus process. A quantum attack could, in theory, compromise the proof-of-work mechanism.
Understanding Quantum Computing’s Attack Priorities
While quantum computing is often presented as a threat to Bitcoin, not all parts of the network are equally vulnerable. Theoretical attacks would be prioritized based on two main factors: ease of execution and potential reward. This creates two categories of attacks:
1. Attacks on Wallets
Bitcoin wallets, secured by elliptic curve algorithms, would be the initial targets due to the relative vulnerability of their public keys, especially those already exposed on the blockchain. Two attack scenarios stand out:
-
Short-term attacks: These occur during the interval between sending a transaction and its inclusion in a block (approximately 10 minutes). A quantum computer could intercept the exposed public key and derive the corresponding private key to redirect funds by creating a transaction with higher fees.
-
Long-term attacks: These focus on old wallets whose public keys are permanently exposed. Wallets associated with Satoshi Nakamoto, for example, are especially vulnerable because they were created before the practice of using hashes to mask public keys.
We can infer a priority order for how such attacks might occur based on urgency and importance.
Bitcoin Quantum Attack: Prioritization Matrix (Urgency vs. Importance)
2. Attacks on Mining
Targeting the SHA-256 algorithm, which secures the mining process, would be the next objective. However, this is far more complex and requires a level of quantum computational power that is currently non-existent and far from realization. A successful attack would allow for the recalculation of all possible hashes to dominate the consensus process and potentially "mine" it instantly.
Satoshi Nakamoto in 2010 on Quantum Computing and Bitcoin Attacks
Recently, Narcelio asked me about a statement I made on Tubacast:
https://x.com/eddieoz/status/1868371296683511969
If an attack became a reality before Bitcoin was prepared, it would be necessary to define the last block prior to the attack and proceed from there using a new hashing algorithm. The solution would resemble the response to the infamous 2013 bug. It’s a fact that this would cause market panic, and Bitcoin's price would drop significantly, creating a potential opportunity for the well-informed.
Preferably, if developers could anticipate the threat and had time to work on a solution and build consensus before an attack, they would simply decide on a future block for the fork, which would then adopt the new algorithm. It might even rehash previous blocks (reaching consensus on them) to avoid potential reorganization through the re-mining of blocks using the old hash. (I often use the term "shielding" old transactions).
How Can Users Protect Themselves?
While quantum computing is still far from being a practical threat, some simple measures can already protect users against hypothetical scenarios:
- Avoid using exposed public keys: Ensure funds sent to old wallets are transferred to new ones that use public key hashes. This reduces the risk of long-term attacks.
- Use modern wallets: Opt for wallets compatible with SegWit or Taproot, which implement better security practices.
- Monitor security updates: Stay informed about updates from the Bitcoin community, such as the implementation of BIP-360, which will introduce quantum-resistant addresses.
- Do not reuse addresses: Every transaction should be associated with a new address to minimize the risk of repeated exposure of the same public key.
- Adopt secure backup practices: Create offline backups of private keys and seeds in secure locations, protected from unauthorized access.
BIP-360 and Bitcoin’s Preparation for the Future
Even though quantum computing is still beyond practical reach, the Bitcoin community is not standing still. A concrete example is BIP-360, a proposal that establishes the technical framework to make wallets resistant to quantum attacks.
BIP-360 addresses three main pillars:
- Introduction of quantum-resistant addresses: A new address format starting with "BC1R" will be used. These addresses will be compatible with post-quantum algorithms, ensuring that stored funds are protected from future attacks.
- Compatibility with the current ecosystem: The proposal allows users to transfer funds from old addresses to new ones without requiring drastic changes to the network infrastructure.
- Flexibility for future updates: BIP-360 does not limit the choice of specific algorithms. Instead, it serves as a foundation for implementing new post-quantum algorithms as technology evolves.
This proposal demonstrates how Bitcoin can adapt to emerging threats without compromising its decentralized structure.
Post-Quantum Algorithms: The Future of Bitcoin Cryptography
The community is exploring various algorithms to protect Bitcoin from quantum attacks. Among the most discussed are:
- Falcon: A solution combining smaller public keys with compact digital signatures. Although it has been tested in limited scenarios, it still faces scalability and performance challenges.
- Sphincs: Hash-based, this algorithm is renowned for its resilience, but its signatures can be extremely large, making it less efficient for networks like Bitcoin’s blockchain.
- Lamport: Created in 1977, it’s considered one of the earliest post-quantum security solutions. Despite its reliability, its gigantic public keys (16,000 bytes) make it impractical and costly for Bitcoin.
Two technologies show great promise and are well-regarded by the community:
- Lattice-Based Cryptography: Considered one of the most promising, it uses complex mathematical structures to create systems nearly immune to quantum computing. Its implementation is still in its early stages, but the community is optimistic.
- Supersingular Elliptic Curve Isogeny: These are very recent digital signature algorithms and require extensive study and testing before being ready for practical market use.
The final choice of algorithm will depend on factors such as efficiency, cost, and integration capability with the current system. Additionally, it is preferable that these algorithms are standardized before implementation, a process that may take up to 10 years.
Why Quantum Computing Is Far from Being a Threat
The alarmist narrative about quantum computing overlooks the technical and practical challenges that still need to be overcome. Among them:
- Insufficient number of qubits: Current quantum computers have only a few hundred qubits, whereas successful attacks would require millions.
- High error rate: Quantum stability remains a barrier to reliable large-scale operations.
- High costs: Building and operating large-scale quantum computers requires massive investments, limiting their use to scientific or specific applications.
Moreover, even if quantum computers make significant advancements, Bitcoin is already adapting to ensure its infrastructure is prepared to respond.
Conclusion: Bitcoin’s Secure Future
Despite advancements in quantum computing, the reality is that Bitcoin is far from being threatened. Its security is ensured not only by its robust architecture but also by the community’s constant efforts to anticipate and mitigate challenges.
The implementation of BIP-360 and the pursuit of post-quantum algorithms demonstrate that Bitcoin is not only resilient but also proactive. By adopting practical measures, such as using modern wallets and migrating to quantum-resistant addresses, users can further protect themselves against potential threats.
Bitcoin’s future is not at risk—it is being carefully shaped to withstand any emerging technology, including quantum computing.
-
@ eac63075:b4988b48
2024-11-09 17:57:27Based on a recent paper that included collaboration from renowned experts such as Lynn Alden, Steve Lee, and Ren Crypto Fish, we discuss in depth how Bitcoin's consensus is built, the main risks, and the complex dynamics of protocol upgrades.
Podcast https://www.fountain.fm/episode/wbjD6ntQuvX5u2G5BccC
Presentation https://gamma.app/docs/Analyzing-Bitcoin-Consensus-Risks-in-Protocol-Upgrades-p66axxjwaa37ksn
1. Introduction to Consensus in Bitcoin
Consensus in Bitcoin is the foundation that keeps the network secure and functional, allowing users worldwide to perform transactions in a decentralized manner without the need for intermediaries. Since its launch in 2009, Bitcoin is often described as an "immutable" system designed to resist changes, and it is precisely this resistance that ensures its security and stability.
The central idea behind consensus in Bitcoin is to create a set of acceptance rules for blocks and transactions, ensuring that all network participants agree on the transaction history. This prevents "double-spending," where the same bitcoin could be used in two simultaneous transactions, something that would compromise trust in the network.
Evolution of Consensus in Bitcoin
Over the years, consensus in Bitcoin has undergone several adaptations, and the way participants agree on changes remains a delicate process. Unlike traditional systems, where changes can be imposed from the top down, Bitcoin operates in a decentralized model where any significant change needs the support of various groups of stakeholders, including miners, developers, users, and large node operators.
Moreover, the update process is extremely cautious, as hasty changes can compromise the network's security. As a result, the philosophy of "don't fix what isn't broken" prevails, with improvements happening incrementally and only after broad consensus among those involved. This model can make progress seem slow but ensures that Bitcoin remains faithful to the principles of security and decentralization.
2. Technical Components of Consensus
Bitcoin's consensus is supported by a set of technical rules that determine what is considered a valid transaction and a valid block on the network. These technical aspects ensure that all nodes—the computers that participate in the Bitcoin network—agree on the current state of the blockchain. Below are the main technical components that form the basis of the consensus.
Validation of Blocks and Transactions
The validation of blocks and transactions is the central point of consensus in Bitcoin. A block is only considered valid if it meets certain criteria, such as maximum size, transaction structure, and the solving of the "Proof of Work" problem. The proof of work, required for a block to be included in the blockchain, is a computational process that ensures the block contains significant computational effort—protecting the network against manipulation attempts.
Transactions, in turn, need to follow specific input and output rules. Each transaction includes cryptographic signatures that prove the ownership of the bitcoins sent, as well as validation scripts that verify if the transaction conditions are met. This validation system is essential for network nodes to autonomously confirm that each transaction follows the rules.
Chain Selection
Another fundamental technical issue for Bitcoin's consensus is chain selection, which becomes especially important in cases where multiple versions of the blockchain coexist, such as after a network split (fork). To decide which chain is the "true" one and should be followed, the network adopts the criterion of the highest accumulated proof of work. In other words, the chain with the highest number of valid blocks, built with the greatest computational effort, is chosen by the network as the official one.
This criterion avoids permanent splits because it encourages all nodes to follow the same main chain, reinforcing consensus.
Soft Forks vs. Hard Forks
In the consensus process, protocol changes can happen in two ways: through soft forks or hard forks. These variations affect not only the protocol update but also the implications for network users:
-
Soft Forks: These are changes that are backward compatible. Only nodes that adopt the new update will follow the new rules, but old nodes will still recognize the blocks produced with these rules as valid. This compatibility makes soft forks a safer option for updates, as it minimizes the risk of network division.
-
Hard Forks: These are updates that are not backward compatible, requiring all nodes to update to the new version or risk being separated from the main chain. Hard forks can result in the creation of a new coin, as occurred with the split between Bitcoin and Bitcoin Cash in 2017. While hard forks allow for deeper changes, they also bring significant risks of network fragmentation.
These technical components form the base of Bitcoin's security and resilience, allowing the system to remain functional and immutable without losing the necessary flexibility to evolve over time.
3. Stakeholders in Bitcoin's Consensus
Consensus in Bitcoin is not decided centrally. On the contrary, it depends on the interaction between different groups of stakeholders, each with their motivations, interests, and levels of influence. These groups play fundamental roles in how changes are implemented or rejected on the network. Below, we explore the six main stakeholders in Bitcoin's consensus.
1. Economic Nodes
Economic nodes, usually operated by exchanges, custody providers, and large companies that accept Bitcoin, exert significant influence over consensus. Because they handle large volumes of transactions and act as a connection point between the Bitcoin ecosystem and the traditional financial system, these nodes have the power to validate or reject blocks and to define which version of the software to follow in case of a fork.
Their influence is proportional to the volume of transactions they handle, and they can directly affect which chain will be seen as the main one. Their incentive is to maintain the network's stability and security to preserve its functionality and meet regulatory requirements.
2. Investors
Investors, including large institutional funds and individual Bitcoin holders, influence consensus indirectly through their impact on the asset's price. Their buying and selling actions can affect Bitcoin's value, which in turn influences the motivation of miners and other stakeholders to continue investing in the network's security and development.
Some institutional investors have agreements with custodians that may limit their ability to act in network split situations. Thus, the impact of each investor on consensus can vary based on their ownership structure and how quickly they can react to a network change.
3. Media Influencers
Media influencers, including journalists, analysts, and popular personalities on social media, have a powerful role in shaping public opinion about Bitcoin and possible updates. These influencers can help educate the public, promote debates, and bring transparency to the consensus process.
On the other hand, the impact of influencers can be double-edged: while they can clarify complex topics, they can also distort perceptions by amplifying or minimizing change proposals. This makes them a force both of support and resistance to consensus.
4. Miners
Miners are responsible for validating transactions and including blocks in the blockchain. Through computational power (hashrate), they also exert significant influence over consensus decisions. In update processes, miners often signal their support for a proposal, indicating that the new version is safe to use. However, this signaling is not always definitive, and miners can change their position if they deem it necessary.
Their incentive is to maximize returns from block rewards and transaction fees, as well as to maintain the value of investments in their specialized equipment, which are only profitable if the network remains stable.
5. Protocol Developers
Protocol developers, often called "Core Developers," are responsible for writing and maintaining Bitcoin's code. Although they do not have direct power over consensus, they possess an informal veto power since they decide which changes are included in the main client (Bitcoin Core). This group also serves as an important source of technical knowledge, helping guide decisions and inform other stakeholders.
Their incentive lies in the continuous improvement of the network, ensuring security and decentralization. Many developers are funded by grants and sponsorships, but their motivations generally include a strong ideological commitment to Bitcoin's principles.
6. Users and Application Developers
This group includes people who use Bitcoin in their daily transactions and developers who build solutions based on the network, such as wallets, exchanges, and payment platforms. Although their power in consensus is less than that of miners or economic nodes, they play an important role because they are responsible for popularizing Bitcoin's use and expanding the ecosystem.
If application developers decide not to adopt an update, this can affect compatibility and widespread acceptance. Thus, they indirectly influence consensus by deciding which version of the protocol to follow in their applications.
These stakeholders are vital to the consensus process, and each group exerts influence according to their involvement, incentives, and ability to act in situations of change. Understanding the role of each makes it clearer how consensus is formed and why it is so difficult to make significant changes to Bitcoin.
4. Mechanisms for Activating Updates in Bitcoin
For Bitcoin to evolve without compromising security and consensus, different mechanisms for activating updates have been developed over the years. These mechanisms help coordinate changes among network nodes to minimize the risk of fragmentation and ensure that updates are implemented in an orderly manner. Here, we explore some of the main methods used in Bitcoin, their advantages and disadvantages, as well as historical examples of significant updates.
Flag Day
The Flag Day mechanism is one of the simplest forms of activating changes. In it, a specific date or block is determined as the activation moment, and all nodes must be updated by that point. This method does not involve prior signaling; participants simply need to update to the new software version by the established day or block.
-
Advantages: Simplicity and predictability are the main benefits of Flag Day, as everyone knows the exact activation date.
-
Disadvantages: Inflexibility can be a problem because there is no way to adjust the schedule if a significant part of the network has not updated. This can result in network splits if a significant number of nodes are not ready for the update.
An example of Flag Day was the Pay to Script Hash (P2SH) update in 2012, which required all nodes to adopt the change to avoid compatibility issues.
BIP34 and BIP9
BIP34 introduced a more dynamic process, in which miners increase the version number in block headers to signal the update. When a predetermined percentage of the last blocks is mined with this new version, the update is automatically activated. This model later evolved with BIP9, which allowed multiple updates to be signaled simultaneously through "version bits," each corresponding to a specific change.
-
Advantages: Allows the network to activate updates gradually, giving more time for participants to adapt.
-
Disadvantages: These methods rely heavily on miner support, which means that if a sufficient number of miners do not signal the update, it can be delayed or not implemented.
BIP9 was used in the activation of SegWit (BIP141) but faced challenges because some miners did not signal their intent to activate, leading to the development of new mechanisms.
User Activated Soft Forks (UASF) and User Resisted Soft Forks (URSF)
To increase the decision-making power of ordinary users, the concept of User Activated Soft Fork (UASF) was introduced, allowing node operators, not just miners, to determine consensus for a change. In this model, nodes set a date to start rejecting blocks that are not in compliance with the new update, forcing miners to adapt or risk having their blocks rejected by the network.
URSF, in turn, is a model where nodes reject blocks that attempt to adopt a specific update, functioning as resistance against proposed changes.
-
Advantages: UASF returns decision-making power to node operators, ensuring that changes do not depend solely on miners.
-
Disadvantages: Both UASF and URSF can generate network splits, especially in cases of strong opposition among different stakeholders.
An example of UASF was the activation of SegWit in 2017, where users supported activation independently of miner signaling, which ended up forcing its adoption.
BIP8 (LOT=True)
BIP8 is an evolution of BIP9, designed to prevent miners from indefinitely blocking a change desired by the majority of users and developers. BIP8 allows setting a parameter called "lockinontimeout" (LOT) as true, which means that if the update has not been fully signaled by a certain point, it is automatically activated.
-
Advantages: Ensures that changes with broad support among users are not blocked by miners who wish to maintain the status quo.
-
Disadvantages: Can lead to network splits if miners or other important stakeholders do not support the update.
Although BIP8 with LOT=True has not yet been used in Bitcoin, it is a proposal that can be applied in future updates if necessary.
These activation mechanisms have been essential for Bitcoin's development, allowing updates that keep the network secure and functional. Each method brings its own advantages and challenges, but all share the goal of preserving consensus and network cohesion.
5. Risks and Considerations in Consensus Updates
Consensus updates in Bitcoin are complex processes that involve not only technical aspects but also political, economic, and social considerations. Due to the network's decentralized nature, each change brings with it a set of risks that need to be carefully assessed. Below, we explore some of the main challenges and future scenarios, as well as the possible impacts on stakeholders.
Network Fragility with Alternative Implementations
One of the main risks associated with consensus updates is the possibility of network fragmentation when there are alternative software implementations. If an update is implemented by a significant group of nodes but rejected by others, a network split (fork) can occur. This creates two competing chains, each with a different version of the transaction history, leading to unpredictable consequences for users and investors.
Such fragmentation weakens Bitcoin because, by dividing hashing power (computing) and coin value, it reduces network security and investor confidence. A notable example of this risk was the fork that gave rise to Bitcoin Cash in 2017 when disagreements over block size resulted in a new chain and a new asset.
Chain Splits and Impact on Stakeholders
Chain splits are a significant risk in update processes, especially in hard forks. During a hard fork, the network is split into two separate chains, each with its own set of rules. This results in the creation of a new coin and leaves users with duplicated assets on both chains. While this may seem advantageous, in the long run, these splits weaken the network and create uncertainties for investors.
Each group of stakeholders reacts differently to a chain split:
-
Institutional Investors and ETFs: Face regulatory and compliance challenges because many of these assets are managed under strict regulations. The creation of a new coin requires decisions to be made quickly to avoid potential losses, which may be hampered by regulatory constraints.
-
Miners: May be incentivized to shift their computing power to the chain that offers higher profitability, which can weaken one of the networks.
-
Economic Nodes: Such as major exchanges and custody providers, have to quickly choose which chain to support, influencing the perceived value of each network.
Such divisions can generate uncertainties and loss of value, especially for institutional investors and those who use Bitcoin as a store of value.
Regulatory Impacts and Institutional Investors
With the growing presence of institutional investors in Bitcoin, consensus changes face new compliance challenges. Bitcoin ETFs, for example, are required to follow strict rules about which assets they can include and how chain split events should be handled. The creation of a new asset or migration to a new chain can complicate these processes, creating pressure for large financial players to quickly choose a chain, affecting the stability of consensus.
Moreover, decisions regarding forks can influence the Bitcoin futures and derivatives market, affecting perception and adoption by new investors. Therefore, the need to avoid splits and maintain cohesion is crucial to attract and preserve the confidence of these investors.
Security Considerations in Soft Forks and Hard Forks
While soft forks are generally preferred in Bitcoin for their backward compatibility, they are not without risks. Soft forks can create different classes of nodes on the network (updated and non-updated), which increases operational complexity and can ultimately weaken consensus cohesion. In a network scenario with fragmentation of node classes, Bitcoin's security can be affected, as some nodes may lose part of the visibility over updated transactions or rules.
In hard forks, the security risk is even more evident because all nodes need to adopt the new update to avoid network division. Experience shows that abrupt changes can create temporary vulnerabilities, in which malicious agents try to exploit the transition to attack the network.
Bounty Claim Risks and Attack Scenarios
Another risk in consensus updates are so-called "bounty claims"—accumulated rewards that can be obtained if an attacker manages to split or deceive a part of the network. In a conflict scenario, a group of miners or nodes could be incentivized to support a new update or create an alternative version of the software to benefit from these rewards.
These risks require stakeholders to carefully assess each update and the potential vulnerabilities it may introduce. The possibility of "bounty claims" adds a layer of complexity to consensus because each interest group may see a financial opportunity in a change that, in the long term, may harm network stability.
The risks discussed above show the complexity of consensus in Bitcoin and the importance of approaching it gradually and deliberately. Updates need to consider not only technical aspects but also economic and social implications, in order to preserve Bitcoin's integrity and maintain trust among stakeholders.
6. Recommendations for the Consensus Process in Bitcoin
To ensure that protocol changes in Bitcoin are implemented safely and with broad support, it is essential that all stakeholders adopt a careful and coordinated approach. Here are strategic recommendations for evaluating, supporting, or rejecting consensus updates, considering the risks and challenges discussed earlier, along with best practices for successful implementation.
1. Careful Evaluation of Proposal Maturity
Stakeholders should rigorously assess the maturity level of a proposal before supporting its implementation. Updates that are still experimental or lack a robust technical foundation can expose the network to unnecessary risks. Ideally, change proposals should go through an extensive testing phase, have security audits, and receive review and feedback from various developers and experts.
2. Extensive Testing in Secure and Compatible Networks
Before an update is activated on the mainnet, it is essential to test it on networks like testnet and signet, and whenever possible, on other compatible networks that offer a safe and controlled environment to identify potential issues. Testing on networks like Litecoin was fundamental for the safe launch of innovations like SegWit and the Lightning Network, allowing functionalities to be validated on a lower-impact network before being implemented on Bitcoin.
The Liquid Network, developed by Blockstream, also plays an important role as an experimental network for new proposals, such as OP_CAT. By adopting these testing environments, stakeholders can mitigate risks and ensure that the update is reliable and secure before being adopted by the main network.
3. Importance of Stakeholder Engagement
The success of a consensus update strongly depends on the active participation of all stakeholders. This includes economic nodes, miners, protocol developers, investors, and end users. Lack of participation can lead to inadequate decisions or even future network splits, which would compromise Bitcoin's security and stability.
4. Key Questions for Evaluating Consensus Proposals
To assist in decision-making, each group of stakeholders should consider some key questions before supporting a consensus change:
- Does the proposal offer tangible benefits for Bitcoin's security, scalability, or usability?
- Does it maintain backward compatibility or introduce the risk of network split?
- Are the implementation requirements clear and feasible for each group involved?
- Are there clear and aligned incentives for all stakeholder groups to accept the change?
5. Coordination and Timing in Implementations
Timing is crucial. Updates with short activation windows can force a split because not all nodes and miners can update simultaneously. Changes should be planned with ample deadlines to allow all stakeholders to adjust their systems, avoiding surprises that could lead to fragmentation.
Mechanisms like soft forks are generally preferable to hard forks because they allow a smoother transition. Opting for backward-compatible updates when possible facilitates the process and ensures that nodes and miners can adapt without pressure.
6. Continuous Monitoring and Re-evaluation
After an update, it's essential to monitor the network to identify problems or side effects. This continuous process helps ensure cohesion and trust among all participants, keeping Bitcoin as a secure and robust network.
These recommendations, including the use of secure networks for extensive testing, promote a collaborative and secure environment for Bitcoin's consensus process. By adopting a deliberate and strategic approach, stakeholders can preserve Bitcoin's value as a decentralized and censorship-resistant network.
7. Conclusion
Consensus in Bitcoin is more than a set of rules; it's the foundation that sustains the network as a decentralized, secure, and reliable system. Unlike centralized systems, where decisions can be made quickly, Bitcoin requires a much more deliberate and cooperative approach, where the interests of miners, economic nodes, developers, investors, and users must be considered and harmonized. This governance model may seem slow, but it is fundamental to preserving the resilience and trust that make Bitcoin a global store of value and censorship-resistant.
Consensus updates in Bitcoin must balance the need for innovation with the preservation of the network's core principles. The development process of a proposal needs to be detailed and rigorous, going through several testing stages, such as in testnet, signet, and compatible networks like Litecoin and Liquid Network. These networks offer safe environments for proposals to be analyzed and improved before being launched on the main network.
Each proposed change must be carefully evaluated regarding its maturity, impact, backward compatibility, and support among stakeholders. The recommended key questions and appropriate timing are critical to ensure that an update is adopted without compromising network cohesion. It's also essential that the implementation process is continuously monitored and re-evaluated, allowing adjustments as necessary and minimizing the risk of instability.
By following these guidelines, Bitcoin's stakeholders can ensure that the network continues to evolve safely and robustly, maintaining user trust and further solidifying its role as one of the most resilient and innovative digital assets in the world. Ultimately, consensus in Bitcoin is not just a technical issue but a reflection of its community and the values it represents: security, decentralization, and resilience.
8. Links
Whitepaper: https://github.com/bitcoin-cap/bcap
Youtube (pt-br): https://www.youtube.com/watch?v=rARycAibl9o&list=PL-qnhF0qlSPkfhorqsREuIu4UTbF0h4zb
-
-
@ eac63075:b4988b48
2024-10-26 22:14:19The future of physical money is at stake, and the discussion about DREX, the new digital currency planned by the Central Bank of Brazil, is gaining momentum. In a candid and intense conversation, Federal Deputy Julia Zanatta (PL/SC) discussed the challenges and risks of this digital transition, also addressing her Bill No. 3,341/2024, which aims to prevent the extinction of physical currency. This bill emerges as a direct response to legislative initiatives seeking to replace physical money with digital alternatives, limiting citizens' options and potentially compromising individual freedom. Let's delve into the main points of this conversation.
https://www.fountain.fm/episode/i5YGJ9Ors3PkqAIMvNQ0
What is a CBDC?
Before discussing the specifics of DREX, it’s important to understand what a CBDC (Central Bank Digital Currency) is. CBDCs are digital currencies issued by central banks, similar to a digital version of physical money. Unlike cryptocurrencies such as Bitcoin, which operate in a decentralized manner, CBDCs are centralized and regulated by the government. In other words, they are digital currencies created and controlled by the Central Bank, intended to replace physical currency.
A prominent feature of CBDCs is their programmability. This means that the government can theoretically set rules about how, where, and for what this currency can be used. This aspect enables a level of control over citizens' finances that is impossible with physical money. By programming the currency, the government could limit transactions by setting geographical or usage restrictions. In practice, money within a CBDC could be restricted to specific spending or authorized for use in a defined geographical area.
In countries like China, where citizen actions and attitudes are also monitored, a person considered to have a "low score" due to a moral or ideological violation may have their transactions limited to essential purchases, restricting their digital currency use to non-essential activities. This financial control is strengthened because, unlike physical money, digital currency cannot be exchanged anonymously.
Practical Example: The Case of DREX During the Pandemic
To illustrate how DREX could be used, an example was given by Eric Altafim, director of Banco Itaú. He suggested that, if DREX had existed during the COVID-19 pandemic, the government could have restricted the currency’s use to a 5-kilometer radius around a person’s residence, limiting their economic mobility. Another proposed use by the executive related to the Bolsa Família welfare program: the government could set up programming that only allows this benefit to be used exclusively for food purchases. Although these examples are presented as control measures for safety or organization, they demonstrate how much a CBDC could restrict citizens' freedom of choice.
To illustrate the potential for state control through a Central Bank Digital Currency (CBDC), such as DREX, it is helpful to look at the example of China. In China, the implementation of a CBDC coincides with the country’s Social Credit System, a governmental surveillance tool that assesses citizens' and companies' behavior. Together, these technologies allow the Chinese government to monitor, reward, and, above all, punish behavior deemed inappropriate or threatening to the government.
How Does China's Social Credit System Work?
Implemented in 2014, China's Social Credit System assigns every citizen and company a "score" based on various factors, including financial behavior, criminal record, social interactions, and even online activities. This score determines the benefits or penalties each individual receives and can affect everything from public transport access to obtaining loans and enrolling in elite schools for their children. Citizens with low scores may face various sanctions, including travel restrictions, fines, and difficulty in securing loans.
With the adoption of the CBDC — or “digital yuan” — the Chinese government now has a new tool to closely monitor citizens' financial transactions, facilitating the application of Social Credit System penalties. China’s CBDC is a programmable digital currency, which means that the government can restrict how, when, and where the money can be spent. Through this level of control, digital currency becomes a powerful mechanism for influencing citizens' behavior.
Imagine, for instance, a citizen who repeatedly posts critical remarks about the government on social media or participates in protests. If the Social Credit System assigns this citizen a low score, the Chinese government could, through the CBDC, restrict their money usage in certain areas or sectors. For example, they could be prevented from buying tickets to travel to other regions, prohibited from purchasing certain consumer goods, or even restricted to making transactions only at stores near their home.
Another example of how the government can use the CBDC to enforce the Social Credit System is by monitoring purchases of products such as alcohol or luxury items. If a citizen uses the CBDC to spend more than the government deems reasonable on such products, this could negatively impact their social score, resulting in additional penalties such as future purchase restrictions or a lowered rating that impacts their personal and professional lives.
In China, this kind of control has already been demonstrated in several cases. Citizens added to Social Credit System “blacklists” have seen their spending and investment capacity severely limited. The combination of digital currency and social scores thus creates a sophisticated and invasive surveillance system, through which the Chinese government controls important aspects of citizens’ financial lives and individual freedoms.
Deputy Julia Zanatta views these examples with great concern. She argues that if the state has full control over digital money, citizens will be exposed to a level of economic control and surveillance never seen before. In a democracy, this control poses a risk, but in an authoritarian regime, it could be used as a powerful tool of repression.
DREX and Bill No. 3,341/2024
Julia Zanatta became aware of a bill by a Workers' Party (PT) deputy (Bill 4068/2020 by Deputy Reginaldo Lopes - PT/MG) that proposes the extinction of physical money within five years, aiming for a complete transition to DREX, the digital currency developed by the Central Bank of Brazil. Concerned about the impact of this measure, Julia drafted her bill, PL No. 3,341/2024, which prohibits the elimination of physical money, ensuring citizens the right to choose physical currency.
“The more I read about DREX, the less I want its implementation,” says the deputy. DREX is a Central Bank Digital Currency (CBDC), similar to other state digital currencies worldwide, but which, according to Julia, carries extreme control risks. She points out that with DREX, the State could closely monitor each citizen’s transactions, eliminating anonymity and potentially restricting freedom of choice. This control would lie in the hands of the Central Bank, which could, in a crisis or government change, “freeze balances or even delete funds directly from user accounts.”
Risks and Individual Freedom
Julia raises concerns about potential abuses of power that complete digitalization could allow. In a democracy, state control over personal finances raises serious questions, and EddieOz warns of an even more problematic future. “Today we are in a democracy, but tomorrow, with a government transition, we don't know if this kind of power will be used properly or abused,” he states. In other words, DREX gives the State the ability to restrict or condition the use of money, opening the door to unprecedented financial surveillance.
EddieOz cites Nigeria as an example, where a CBDC was implemented, and the government imposed severe restrictions on the use of physical money to encourage the use of digital currency, leading to protests and clashes in the country. In practice, the poorest and unbanked — those without regular access to banking services — were harshly affected, as without physical money, many cannot conduct basic transactions. Julia highlights that in Brazil, this situation would be even more severe, given the large number of unbanked individuals and the extent of rural areas where access to technology is limited.
The Relationship Between DREX and Pix
The digital transition has already begun with Pix, which revolutionized instant transfers and payments in Brazil. However, Julia points out that Pix, though popular, is a citizen’s choice, while DREX tends to eliminate that choice. The deputy expresses concern about new rules suggested for Pix, such as daily transaction limits of a thousand reais, justified as anti-fraud measures but which, in her view, represent additional control and a profit opportunity for banks. “How many more rules will banks create to profit from us?” asks Julia, noting that DREX could further enhance control over personal finances.
International Precedents and Resistance to CBDC
The deputy also cites examples from other countries resisting the idea of a centralized digital currency. In the United States, states like New Hampshire have passed laws to prevent the advance of CBDCs, and leaders such as Donald Trump have opposed creating a national digital currency. Trump, addressing the topic, uses a justification similar to Julia’s: in a digitalized system, “with one click, your money could disappear.” She agrees with the warning, emphasizing the control risk that a CBDC represents, especially for countries with disadvantaged populations.
Besides the United States, Canada, Colombia, and Australia have also suspended studies on digital currencies, citing the need for further discussions on population impacts. However, in Brazil, the debate on DREX is still limited, with few parliamentarians and political leaders openly discussing the topic. According to Julia, only she and one or two deputies are truly trying to bring this discussion to the Chamber, making DREX’s advance even more concerning.
Bill No. 3,341/2024 and Popular Pressure
For Julia, her bill is a first step. Although she acknowledges that ideally, it would prevent DREX's implementation entirely, PL 3341/2024 is a measure to ensure citizens' choice to use physical money, preserving a form of individual freedom. “If the future means control, I prefer to live in the past,” Julia asserts, reinforcing that the fight for freedom is at the heart of her bill.
However, the deputy emphasizes that none of this will be possible without popular mobilization. According to her, popular pressure is crucial for other deputies to take notice and support PL 3341. “I am only one deputy, and we need the public’s support to raise the project’s visibility,” she explains, encouraging the public to press other parliamentarians and ask them to “pay attention to PL 3341 and the project that prohibits the end of physical money.” The deputy believes that with a strong awareness and pressure movement, it is possible to advance the debate and ensure Brazilians’ financial freedom.
What’s at Stake?
Julia Zanatta leaves no doubt: DREX represents a profound shift in how money will be used and controlled in Brazil. More than a simple modernization of the financial system, the Central Bank’s CBDC sets precedents for an unprecedented level of citizen surveillance and control in the country. For the deputy, this transition needs to be debated broadly and transparently, and it’s up to the Brazilian people to defend their rights and demand that the National Congress discuss these changes responsibly.
The deputy also emphasizes that, regardless of political or partisan views, this issue affects all Brazilians. “This agenda is something that will affect everyone. We need to be united to ensure people understand the gravity of what could happen.” Julia believes that by sharing information and generating open debate, it is possible to prevent Brazil from following the path of countries that have already implemented a digital currency in an authoritarian way.
A Call to Action
The future of physical money in Brazil is at risk. For those who share Deputy Julia Zanatta’s concerns, the time to act is now. Mobilize, get informed, and press your representatives. PL 3341/2024 is an opportunity to ensure that Brazilian citizens have a choice in how to use their money, without excessive state interference or surveillance.
In the end, as the deputy puts it, the central issue is freedom. “My fear is that this project will pass, and people won’t even understand what is happening.” Therefore, may every citizen at least have the chance to understand what’s at stake and make their voice heard in defense of a Brazil where individual freedom and privacy are respected values.
-
@ eac63075:b4988b48
2024-10-21 08:11:11Imagine sending a private message to a friend, only to learn that authorities could be scanning its contents without your knowledge. This isn't a scene from a dystopian novel but a potential reality under the European Union's proposed "Chat Control" measures. Aimed at combating serious crimes like child exploitation and terrorism, these proposals could significantly impact the privacy of everyday internet users. As encrypted messaging services become the norm for personal and professional communication, understanding Chat Control is essential. This article delves into what Chat Control entails, why it's being considered, and how it could affect your right to private communication.
https://www.fountain.fm/episode/coOFsst7r7mO1EP1kSzV
https://open.spotify.com/episode/0IZ6kMExfxFm4FHg5DAWT8?si=e139033865e045de
Sections:
- Introduction
- What Is Chat Control?
- Why Is the EU Pushing for Chat Control?
- The Privacy Concerns and Risks
- The Technical Debate: Encryption and Backdoors
- Global Reactions and the Debate in Europe
- Possible Consequences for Messaging Services
- What Happens Next? The Future of Chat Control
- Conclusion
What Is Chat Control?
"Chat Control" refers to a set of proposed measures by the European Union aimed at monitoring and scanning private communications on messaging platforms. The primary goal is to detect and prevent the spread of illegal content, such as child sexual abuse material (CSAM) and to combat terrorism. While the intention is to enhance security and protect vulnerable populations, these proposals have raised significant privacy concerns.
At its core, Chat Control would require messaging services to implement automated scanning technologies that can analyze the content of messages—even those that are end-to-end encrypted. This means that the private messages you send to friends, family, or colleagues could be subject to inspection by algorithms designed to detect prohibited content.
Origins of the Proposal
The initiative for Chat Control emerged from the EU's desire to strengthen its digital security infrastructure. High-profile cases of online abuse and the use of encrypted platforms by criminal organizations have prompted lawmakers to consider more invasive surveillance tactics. The European Commission has been exploring legislation that would make it mandatory for service providers to monitor communications on their platforms.
How Messaging Services Work
Most modern messaging apps, like Signal, Session, SimpleX, Veilid, Protonmail and Tutanota (among others), use end-to-end encryption (E2EE). This encryption ensures that only the sender and the recipient can read the messages being exchanged. Not even the service providers can access the content. This level of security is crucial for maintaining privacy in digital communications, protecting users from hackers, identity thieves, and other malicious actors.
Key Elements of Chat Control
- Automated Content Scanning: Service providers would use algorithms to scan messages for illegal content.
- Circumvention of Encryption: To scan encrypted messages, providers might need to alter their encryption methods, potentially weakening security.
- Mandatory Reporting: If illegal content is detected, providers would be required to report it to authorities.
- Broad Applicability: The measures could apply to all messaging services operating within the EU, affecting both European companies and international platforms.
Why It Matters
Understanding Chat Control is essential because it represents a significant shift in how digital privacy is handled. While combating illegal activities online is crucial, the methods proposed could set a precedent for mass surveillance and the erosion of privacy rights. Everyday users who rely on encrypted messaging for personal and professional communication might find their conversations are no longer as private as they once thought.
Why Is the EU Pushing for Chat Control?
The European Union's push for Chat Control stems from a pressing concern to protect its citizens, particularly children, from online exploitation and criminal activities. With the digital landscape becoming increasingly integral to daily life, the EU aims to strengthen its ability to combat serious crimes facilitated through online platforms.
Protecting Children and Preventing Crime
One of the primary motivations behind Chat Control is the prevention of child sexual abuse material (CSAM) circulating on the internet. Law enforcement agencies have reported a significant increase in the sharing of illegal content through private messaging services. By implementing Chat Control, the EU believes it can more effectively identify and stop perpetrators, rescue victims, and deter future crimes.
Terrorism is another critical concern. Encrypted messaging apps can be used by terrorist groups to plan and coordinate attacks without detection. The EU argues that accessing these communications could be vital in preventing such threats and ensuring public safety.
Legal Context and Legislative Drivers
The push for Chat Control is rooted in several legislative initiatives:
-
ePrivacy Directive: This directive regulates the processing of personal data and the protection of privacy in electronic communications. The EU is considering amendments that would allow for the scanning of private messages under specific circumstances.
-
Temporary Derogation: In 2021, the EU adopted a temporary regulation permitting voluntary detection of CSAM by communication services. The current proposals aim to make such measures mandatory and more comprehensive.
-
Regulation Proposals: The European Commission has proposed regulations that would require service providers to detect, report, and remove illegal content proactively. This would include the use of technologies to scan private communications.
Balancing Security and Privacy
EU officials argue that the proposed measures are a necessary response to evolving digital threats. They emphasize the importance of staying ahead of criminals who exploit technology to harm others. By implementing Chat Control, they believe law enforcement can be more effective without entirely dismantling privacy protections.
However, the EU also acknowledges the need to balance security with fundamental rights. The proposals include provisions intended to limit the scope of surveillance, such as:
-
Targeted Scanning: Focusing on specific threats rather than broad, indiscriminate monitoring.
-
Judicial Oversight: Requiring court orders or oversight for accessing private communications.
-
Data Protection Safeguards: Implementing measures to ensure that data collected is handled securely and deleted when no longer needed.
The Urgency Behind the Push
High-profile cases of online abuse and terrorism have heightened the sense of urgency among EU policymakers. Reports of increasing online grooming and the widespread distribution of illegal content have prompted calls for immediate action. The EU posits that without measures like Chat Control, these problems will continue to escalate unchecked.
Criticism and Controversy
Despite the stated intentions, the push for Chat Control has been met with significant criticism. Opponents argue that the measures could be ineffective against savvy criminals who can find alternative ways to communicate. There is also concern that such surveillance could be misused or extended beyond its original purpose.
The Privacy Concerns and Risks
While the intentions behind Chat Control focus on enhancing security and protecting vulnerable groups, the proposed measures raise significant privacy concerns. Critics argue that implementing such surveillance could infringe on fundamental rights and set a dangerous precedent for mass monitoring of private communications.
Infringement on Privacy Rights
At the heart of the debate is the right to privacy. By scanning private messages, even with automated tools, the confidentiality of personal communications is compromised. Users may no longer feel secure sharing sensitive information, fearing that their messages could be intercepted or misinterpreted by algorithms.
Erosion of End-to-End Encryption
End-to-end encryption (E2EE) is a cornerstone of digital security, ensuring that only the sender and recipient can read the messages exchanged. Chat Control could necessitate the introduction of "backdoors" or weaken encryption protocols, making it easier for unauthorized parties to access private data. This not only affects individual privacy but also exposes communications to potential cyber threats.
Concerns from Privacy Advocates
Organizations like Signal and Tutanota, which offer encrypted messaging services, have voiced strong opposition to Chat Control. They warn that undermining encryption could have far-reaching consequences:
- Security Risks: Weakening encryption makes systems more vulnerable to hacking, espionage, and cybercrime.
- Global Implications: Changes in EU regulations could influence policies worldwide, leading to a broader erosion of digital privacy.
- Ineffectiveness Against Crime: Determined criminals might resort to other, less detectable means of communication, rendering the measures ineffective while still compromising the privacy of law-abiding citizens.
Potential for Government Overreach
There is a fear that Chat Control could lead to increased surveillance beyond its original scope. Once the infrastructure for scanning private messages is in place, it could be repurposed or expanded to monitor other types of content, stifling free expression and dissent.
Real-World Implications for Users
- False Positives: Automated scanning technologies are not infallible and could mistakenly flag innocent content, leading to unwarranted scrutiny or legal consequences for users.
- Chilling Effect: Knowing that messages could be monitored might discourage people from expressing themselves freely, impacting personal relationships and societal discourse.
- Data Misuse: Collected data could be vulnerable to leaks or misuse, compromising personal and sensitive information.
Legal and Ethical Concerns
Privacy advocates also highlight potential conflicts with existing laws and ethical standards:
- Violation of Fundamental Rights: The European Convention on Human Rights and other international agreements protect the right to privacy and freedom of expression.
- Questionable Effectiveness: The ethical justification for such invasive measures is challenged if they do not significantly improve safety or if they disproportionately impact innocent users.
Opposition from Member States and Organizations
Countries like Germany and organizations such as the European Digital Rights (EDRi) have expressed opposition to Chat Control. They emphasize the need to protect digital privacy and caution against hasty legislation that could have unintended consequences.
The Technical Debate: Encryption and Backdoors
The discussion around Chat Control inevitably leads to a complex technical debate centered on encryption and the potential introduction of backdoors into secure communication systems. Understanding these concepts is crucial to grasping the full implications of the proposed measures.
What Is End-to-End Encryption (E2EE)?
End-to-end encryption is a method of secure communication that prevents third parties from accessing data while it's transferred from one end system to another. In simpler terms, only the sender and the recipient can read the messages. Even the service providers operating the messaging platforms cannot decrypt the content.
- Security Assurance: E2EE ensures that sensitive information—be it personal messages, financial details, or confidential business communications—remains private.
- Widespread Use: Popular messaging apps like Signal, Session, SimpleX, Veilid, Protonmail and Tutanota (among others) rely on E2EE to protect user data.
How Chat Control Affects Encryption
Implementing Chat Control as proposed would require messaging services to scan the content of messages for illegal material. To do this on encrypted platforms, providers might have to:
- Introduce Backdoors: Create a means for third parties (including the service provider or authorities) to access encrypted messages.
- Client-Side Scanning: Install software on users' devices that scans messages before they are encrypted and sent, effectively bypassing E2EE.
The Risks of Weakening Encryption
1. Compromised Security for All Users
Introducing backdoors or client-side scanning tools can create vulnerabilities:
- Exploitable Gaps: If a backdoor exists, malicious actors might find and exploit it, leading to data breaches.
- Universal Impact: Weakening encryption doesn't just affect targeted individuals; it potentially exposes all users to increased risk.
2. Undermining Trust in Digital Services
- User Confidence: Knowing that private communications could be accessed might deter people from using digital services or push them toward unregulated platforms.
- Business Implications: Companies relying on secure communications might face increased risks, affecting economic activities.
3. Ineffectiveness Against Skilled Adversaries
- Alternative Methods: Criminals might shift to other encrypted channels or develop new ways to avoid detection.
- False Sense of Security: Weakening encryption could give the impression of increased safety while adversaries adapt and continue their activities undetected.
Signal’s Response and Stance
Signal, a leading encrypted messaging service, has been vocal in its opposition to the EU's proposals:
- Refusal to Weaken Encryption: Signal's CEO Meredith Whittaker has stated that the company would rather cease operations in the EU than compromise its encryption standards.
- Advocacy for Privacy: Signal emphasizes that strong encryption is essential for protecting human rights and freedoms in the digital age.
Understanding Backdoors
A "backdoor" in encryption is an intentional weakness inserted into a system to allow authorized access to encrypted data. While intended for legitimate use by authorities, backdoors pose several problems:
- Security Vulnerabilities: They can be discovered and exploited by unauthorized parties, including hackers and foreign governments.
- Ethical Concerns: The existence of backdoors raises questions about consent and the extent to which governments should be able to access private communications.
The Slippery Slope Argument
Privacy advocates warn that introducing backdoors or mandatory scanning sets a precedent:
- Expanded Surveillance: Once in place, these measures could be extended to monitor other types of content beyond the original scope.
- Erosion of Rights: Gradual acceptance of surveillance can lead to a significant reduction in personal freedoms over time.
Potential Technological Alternatives
Some suggest that it's possible to fight illegal content without undermining encryption:
- Metadata Analysis: Focusing on patterns of communication rather than content.
- Enhanced Reporting Mechanisms: Encouraging users to report illegal content voluntarily.
- Investing in Law Enforcement Capabilities: Strengthening traditional investigative methods without compromising digital security.
The technical community largely agrees that weakening encryption is not the solution:
- Consensus on Security: Strong encryption is essential for the safety and privacy of all internet users.
- Call for Dialogue: Technologists and privacy experts advocate for collaborative approaches that address security concerns without sacrificing fundamental rights.
Global Reactions and the Debate in Europe
The proposal for Chat Control has ignited a heated debate across Europe and beyond, with various stakeholders weighing in on the potential implications for privacy, security, and fundamental rights. The reactions are mixed, reflecting differing national perspectives, political priorities, and societal values.
Support for Chat Control
Some EU member states and officials support the initiative, emphasizing the need for robust measures to combat online crime and protect citizens, especially children. They argue that:
- Enhanced Security: Mandatory scanning can help law enforcement agencies detect and prevent serious crimes.
- Responsibility of Service Providers: Companies offering communication services should play an active role in preventing their platforms from being used for illegal activities.
- Public Safety Priorities: The protection of vulnerable populations justifies the implementation of such measures, even if it means compromising some aspects of privacy.
Opposition within the EU
Several countries and organizations have voiced strong opposition to Chat Control, citing concerns over privacy rights and the potential for government overreach.
Germany
- Stance: Germany has been one of the most vocal opponents of the proposed measures.
- Reasons:
- Constitutional Concerns: The German government argues that Chat Control could violate constitutional protections of privacy and confidentiality of communications.
- Security Risks: Weakening encryption is seen as a threat to cybersecurity.
- Legal Challenges: Potential conflicts with national laws protecting personal data and communication secrecy.
Netherlands
- Recent Developments: The Dutch government decided against supporting Chat Control, emphasizing the importance of encryption for security and privacy.
- Arguments:
- Effectiveness Doubts: Skepticism about the actual effectiveness of the measures in combating crime.
- Negative Impact on Privacy: Concerns about mass surveillance and the infringement of citizens' rights.
Table reference: Patrick Breyer - Chat Control in 23 September 2024
Privacy Advocacy Groups
European Digital Rights (EDRi)
- Role: A network of civil and human rights organizations working to defend rights and freedoms in the digital environment.
- Position:
- Strong Opposition: EDRi argues that Chat Control is incompatible with fundamental rights.
- Awareness Campaigns: Engaging in public campaigns to inform citizens about the potential risks.
- Policy Engagement: Lobbying policymakers to consider alternative approaches that respect privacy.
Politicians and Activists
Patrick Breyer
- Background: A Member of the European Parliament (MEP) from Germany, representing the Pirate Party.
- Actions:
- Advocacy: Actively campaigning against Chat Control through speeches, articles, and legislative efforts.
- Public Outreach: Using social media and public events to raise awareness.
- Legal Expertise: Highlighting the legal inconsistencies and potential violations of EU law.
Global Reactions
International Organizations
- Human Rights Watch and Amnesty International: These organizations have expressed concerns about the implications for human rights, urging the EU to reconsider.
Technology Companies
- Global Tech Firms: Companies like Apple and Microsoft are monitoring the situation, as EU regulations could affect their operations and user trust.
- Industry Associations: Groups representing tech companies have issued statements highlighting the risks to innovation and competitiveness.
The Broader Debate
The controversy over Chat Control reflects a broader struggle between security interests and privacy rights in the digital age. Key points in the debate include:
- Legal Precedents: How the EU's decision might influence laws and regulations in other countries.
- Digital Sovereignty: The desire of nations to control digital spaces within their borders.
- Civil Liberties: The importance of protecting freedoms in the face of technological advancements.
Public Opinion
- Diverse Views: Surveys and public forums show a range of opinions, with some citizens prioritizing security and others valuing privacy above all.
- Awareness Levels: Many people are still unaware of the potential changes, highlighting the need for public education on the issue.
The EU is at a crossroads, facing the challenge of addressing legitimate security concerns without undermining the fundamental rights that are central to its values. The outcome of this debate will have significant implications for the future of digital privacy and the balance between security and freedom in society.
Possible Consequences for Messaging Services
The implementation of Chat Control could have significant implications for messaging services operating within the European Union. Both large platforms and smaller providers might need to adapt their technologies and policies to comply with the new regulations, potentially altering the landscape of digital communication.
Impact on Encrypted Messaging Services
Signal and Similar Platforms
-
Compliance Challenges: Encrypted messaging services like Signal rely on end-to-end encryption to secure user communications. Complying with Chat Control could force them to weaken their encryption protocols or implement client-side scanning, conflicting with their core privacy principles.
-
Operational Decisions: Some platforms may choose to limit their services in the EU or cease operations altogether rather than compromise on encryption. Signal, for instance, has indicated that it would prefer to withdraw from European markets than undermine its security features.
Potential Blocking or Limiting of Services
-
Regulatory Enforcement: Messaging services that do not comply with Chat Control regulations could face fines, legal action, or even be blocked within the EU.
-
Access Restrictions: Users in Europe might find certain services unavailable or limited in functionality if providers decide not to meet the regulatory requirements.
Effects on Smaller Providers
-
Resource Constraints: Smaller messaging services and startups may lack the resources to implement the required scanning technologies, leading to increased operational costs or forcing them out of the market.
-
Innovation Stifling: The added regulatory burden could deter new entrants, reducing competition and innovation in the messaging service sector.
User Experience and Trust
-
Privacy Concerns: Users may lose trust in messaging platforms if they know their communications are subject to scanning, leading to a decline in user engagement.
-
Migration to Unregulated Platforms: There is a risk that users might shift to less secure or unregulated services, including those operated outside the EU or on the dark web, potentially exposing them to greater risks.
Technical and Security Implications
-
Increased Vulnerabilities: Modifying encryption protocols to comply with Chat Control could introduce security flaws, making platforms more susceptible to hacking and data breaches.
-
Global Security Risks: Changes made to accommodate EU regulations might affect the global user base of these services, extending security risks beyond European borders.
Impact on Businesses and Professional Communications
-
Confidentiality Issues: Businesses that rely on secure messaging for sensitive communications may face challenges in ensuring confidentiality, affecting sectors like finance, healthcare, and legal services.
-
Compliance Complexity: Companies operating internationally will need to navigate a complex landscape of differing regulations, increasing administrative burdens.
Economic Consequences
-
Market Fragmentation: Divergent regulations could lead to a fragmented market, with different versions of services for different regions.
-
Loss of Revenue: Messaging services might experience reduced revenue due to decreased user trust and engagement or the costs associated with compliance.
Responses from Service Providers
-
Legal Challenges: Companies might pursue legal action against the regulations, citing conflicts with privacy laws and user rights.
-
Policy Advocacy: Service providers may increase lobbying efforts to influence policy decisions and promote alternatives to Chat Control.
Possible Adaptations
-
Technological Innovation: Some providers might invest in developing new technologies that can detect illegal content without compromising encryption, though the feasibility remains uncertain.
-
Transparency Measures: To maintain user trust, companies might enhance transparency about how data is handled and what measures are in place to protect privacy.
The potential consequences of Chat Control for messaging services are profound, affecting not only the companies that provide these services but also the users who rely on them daily. The balance between complying with legal requirements and maintaining user privacy and security presents a significant challenge that could reshape the digital communication landscape.
What Happens Next? The Future of Chat Control
The future of Chat Control remains uncertain as the debate continues among EU member states, policymakers, technology companies, and civil society organizations. Several factors will influence the outcome of this contentious proposal, each carrying significant implications for digital privacy, security, and the regulatory environment within the European Union.
Current Status of Legislation
-
Ongoing Negotiations: The proposed Chat Control measures are still under discussion within the European Parliament and the Council of the European Union. Amendments and revisions are being considered in response to the feedback from various stakeholders.
-
Timeline: While there is no fixed date for the final decision, the EU aims to reach a consensus to implement effective measures against online crime without undue delay.
Key Influencing Factors
1. Legal Challenges and Compliance with EU Law
-
Fundamental Rights Assessment: The proposals must be evaluated against the Charter of Fundamental Rights of the European Union, ensuring that any measures comply with rights to privacy, data protection, and freedom of expression.
-
Court Scrutiny: Potential legal challenges could arise, leading to scrutiny by the European Court of Justice (ECJ), which may impact the feasibility and legality of Chat Control.
2. Technological Feasibility
-
Development of Privacy-Preserving Technologies: Research into methods that can detect illegal content without compromising encryption is ongoing. Advances in this area could provide alternative solutions acceptable to both privacy advocates and security agencies.
-
Implementation Challenges: The practical aspects of deploying scanning technologies across various platforms and services remain complex, and technical hurdles could delay or alter the proposed measures.
3. Political Dynamics
-
Member State Positions: The differing stances of EU countries, such as Germany's opposition, play a significant role in shaping the final outcome. Consensus among member states is crucial for adopting EU-wide regulations.
-
Public Opinion and Advocacy: Growing awareness and activism around digital privacy can influence policymakers. Public campaigns and lobbying efforts may sway decisions in favor of stronger privacy protections.
4. Industry Responses
-
Negotiations with Service Providers: Ongoing dialogues between EU authorities and technology companies may lead to compromises or collaborative efforts to address concerns without fully implementing Chat Control as initially proposed.
-
Potential for Self-Regulation: Messaging services might propose self-regulatory measures to combat illegal content, aiming to demonstrate effectiveness without the need for mandatory scanning.
Possible Scenarios
Optimistic Outcome:
- Balanced Regulation: A revised proposal emerges that effectively addresses security concerns while upholding strong encryption and privacy rights, possibly through innovative technologies or targeted measures with robust oversight.
Pessimistic Outcome:
- Adoption of Strict Measures: Chat Control is implemented as initially proposed, leading to weakened encryption, reduced privacy, and potential withdrawal of services like Signal from the EU market.
Middle Ground:
- Incremental Implementation: Partial measures are adopted, focusing on voluntary cooperation with service providers and emphasizing transparency and user consent, with ongoing evaluations to assess effectiveness and impact.
How to Stay Informed and Protect Your Privacy
-
Follow Reputable Sources: Keep up with news from reliable outlets, official EU communications, and statements from privacy organizations to stay informed about developments.
-
Engage in the Dialogue: Participate in public consultations, sign petitions, or contact representatives to express your views on Chat Control and digital privacy.
-
Utilize Secure Practices: Regardless of legislative outcomes, adopting good digital hygiene—such as using strong passwords and being cautious with personal information—can enhance your online security.
The Global Perspective
-
International Implications: The EU's decision may influence global policies on encryption and surveillance, setting precedents that other countries might follow or react against.
-
Collaboration Opportunities: International cooperation on developing solutions that protect both security and privacy could emerge, fostering a more unified approach to addressing online threats.
Looking Ahead
The future of Chat Control is a critical issue that underscores the challenges of governing in the digital age. Balancing the need for security with the protection of fundamental rights is a complex task that requires careful consideration, open dialogue, and collaboration among all stakeholders.
As the situation evolves, staying informed and engaged is essential. The decisions made in the coming months will shape the digital landscape for years to come, affecting how we communicate, conduct business, and exercise our rights in an increasingly connected world.
Conclusion
The debate over Chat Control highlights a fundamental challenge in our increasingly digital world: how to protect society from genuine threats without eroding the very rights and freedoms that define it. While the intention to safeguard children and prevent crime is undeniably important, the means of achieving this through intrusive surveillance measures raise critical concerns.
Privacy is not just a personal preference but a cornerstone of democratic societies. End-to-end encryption has become an essential tool for ensuring that our personal conversations, professional communications, and sensitive data remain secure from unwanted intrusion. Weakening these protections could expose individuals and organizations to risks that far outweigh the proposed benefits.
The potential consequences of implementing Chat Control are far-reaching:
- Erosion of Trust: Users may lose confidence in digital platforms, impacting how we communicate and conduct business online.
- Security Vulnerabilities: Introducing backdoors or weakening encryption can make systems more susceptible to cyberattacks.
- Stifling Innovation: Regulatory burdens may hinder technological advancement and competitiveness in the tech industry.
- Global Implications: The EU's decisions could set precedents that influence digital policies worldwide, for better or worse.
As citizens, it's crucial to stay informed about these developments. Engage in conversations, reach out to your representatives, and advocate for solutions that respect both security needs and fundamental rights. Technology and policy can evolve together to address challenges without compromising core values.
The future of Chat Control is not yet decided, and public input can make a significant difference. By promoting open dialogue, supporting privacy-preserving innovations, and emphasizing the importance of human rights in legislation, we can work towards a digital landscape that is both safe and free.
In a world where digital communication is integral to daily life, striking the right balance between security and privacy is more important than ever. The choices made today will shape the digital environment for generations to come, determining not just how we communicate, but how we live and interact in an interconnected world.
Thank you for reading this article. We hope it has provided you with a clear understanding of Chat Control and its potential impact on your privacy and digital rights. Stay informed, stay engaged, and let's work together towards a secure and open digital future.
Read more:
- https://www.patrick-breyer.de/en/posts/chat-control/
- https://www.patrick-breyer.de/en/new-eu-push-for-chat-control-will-messenger-services-be-blocked-in-europe/
- https://edri.org/our-work/dutch-decision-puts-brakes-on-chat-control/
- https://signal.org/blog/pdfs/ndss-keynote.pdf
- https://tuta.com/blog/germany-stop-chat-control
- https://cointelegraph.com/news/signal-president-slams-revised-eu-encryption-proposal
- https://mullvad.net/en/why-privacy-matters
-
@ 4ba8e86d:89d32de4
2024-10-07 13:37:38O que é Cwtch? Cwtch (/kʊtʃ/ - uma palavra galesa que pode ser traduzida aproximadamente como “um abraço que cria um lugar seguro”) é um protocolo de mensagens multipartidário descentralizado, que preserva a privacidade, que pode ser usado para construir aplicativos resistentes a metadados.
Como posso pronunciar Cwtch? Como "kutch", para rimar com "butch".
Descentralizado e Aberto : Não existe “serviço Cwtch” ou “rede Cwtch”. Os participantes do Cwtch podem hospedar seus próprios espaços seguros ou emprestar sua infraestrutura para outras pessoas que buscam um espaço seguro. O protocolo Cwtch é aberto e qualquer pessoa é livre para criar bots, serviços e interfaces de usuário e integrar e interagir com o Cwtch.
Preservação de privacidade : toda a comunicação no Cwtch é criptografada de ponta a ponta e ocorre nos serviços cebola Tor v3.
Resistente a metadados : O Cwtch foi projetado de forma que nenhuma informação seja trocada ou disponibilizada a ninguém sem seu consentimento explícito, incluindo mensagens durante a transmissão e metadados de protocolo
Uma breve história do bate-papo resistente a metadados Nos últimos anos, a conscientização pública sobre a necessidade e os benefícios das soluções criptografadas de ponta a ponta aumentou com aplicativos como Signal , Whatsapp e Wire. que agora fornecem aos usuários comunicações seguras.
No entanto, essas ferramentas exigem vários níveis de exposição de metadados para funcionar, e muitos desses metadados podem ser usados para obter detalhes sobre como e por que uma pessoa está usando uma ferramenta para se comunicar.
Uma ferramenta que buscou reduzir metadados é o Ricochet lançado pela primeira vez em 2014. Ricochet usou os serviços cebola Tor v2 para fornecer comunicação criptografada segura de ponta a ponta e para proteger os metadados das comunicações.
Não havia servidores centralizados que auxiliassem no roteamento das conversas do Ricochet. Ninguém além das partes envolvidas em uma conversa poderia saber que tal conversa está ocorrendo.
Ricochet tinha limitações; não havia suporte para vários dispositivos, nem existe um mecanismo para suportar a comunicação em grupo ou para um usuário enviar mensagens enquanto um contato está offline.
Isto tornou a adoção do Ricochet uma proposta difícil; mesmo aqueles em ambientes que seriam melhor atendidos pela resistência aos metadados, sem saber que ela existe.
Além disso, qualquer solução para comunicação descentralizada e resistente a metadados enfrenta problemas fundamentais quando se trata de eficiência, privacidade e segurança de grupo conforme definido pelo consenso e consistência da transcrição.
Alternativas modernas ao Ricochet incluem Briar , Zbay e Ricochet Refresh - cada ferramenta procura otimizar para um conjunto diferente de compensações, por exemplo, Briar procura permitir que as pessoas se comuniquem mesmo quando a infraestrutura de rede subjacente está inoperante, ao mesmo tempo que fornece resistência à vigilância de metadados.
O projeto Cwtch começou em 2017 como um protocolo de extensão para Ricochet, fornecendo conversas em grupo por meio de servidores não confiáveis, com o objetivo de permitir aplicativos descentralizados e resistentes a metadados como listas compartilhadas e quadros de avisos.
Uma versão alfa do Cwtch foi lançada em fevereiro de 2019 e, desde então, a equipe do Cwtch dirigida pela OPEN PRIVACY RESEARCH SOCIETY conduziu pesquisa e desenvolvimento em cwtch e nos protocolos, bibliotecas e espaços de problemas subjacentes.
Modelo de Risco.
Sabe-se que os metadados de comunicações são explorados por vários adversários para minar a segurança dos sistemas, para rastrear vítimas e para realizar análises de redes sociais em grande escala para alimentar a vigilância em massa. As ferramentas resistentes a metadados estão em sua infância e faltam pesquisas sobre a construção e a experiência do usuário de tais ferramentas.
https://nostrcheck.me/media/public/nostrcheck.me_9475702740746681051707662826.webp
O Cwtch foi originalmente concebido como uma extensão do protocolo Ricochet resistente a metadados para suportar comunicações assíncronas de grupos multiponto por meio do uso de infraestrutura anônima, descartável e não confiável.
Desde então, o Cwtch evoluiu para um protocolo próprio. Esta seção descreverá os vários riscos conhecidos que o Cwtch tenta mitigar e será fortemente referenciado no restante do documento ao discutir os vários subcomponentes da Arquitetura Cwtch.
Modelo de ameaça.
É importante identificar e compreender que os metadados são omnipresentes nos protocolos de comunicação; é de facto necessário que tais protocolos funcionem de forma eficiente e em escala. No entanto, as informações que são úteis para facilitar peers e servidores também são altamente relevantes para adversários que desejam explorar tais informações.
Para a definição do nosso problema, assumiremos que o conteúdo de uma comunicação é criptografado de tal forma que um adversário é praticamente incapaz de quebrá-lo veja tapir e cwtch para detalhes sobre a criptografia que usamos, e como tal nos concentraremos em o contexto para os metadados de comunicação.
Procuramos proteger os seguintes contextos de comunicação:
• Quem está envolvido em uma comunicação? Pode ser possível identificar pessoas ou simplesmente identificadores de dispositivos ou redes. Por exemplo, “esta comunicação envolve Alice, uma jornalista, e Bob, um funcionário público”.
• Onde estão os participantes da conversa? Por exemplo, “durante esta comunicação, Alice estava na França e Bob estava no Canadá”.
• Quando ocorreu uma conversa? O momento e a duração da comunicação podem revelar muito sobre a natureza de uma chamada, por exemplo, “Bob, um funcionário público, conversou com Alice ao telefone por uma hora ontem à noite. Esta é a primeira vez que eles se comunicam.” *Como a conversa foi mediada? O fato de uma conversa ter ocorrido por meio de um e-mail criptografado ou não criptografado pode fornecer informações úteis. Por exemplo, “Alice enviou um e-mail criptografado para Bob ontem, enquanto eles normalmente enviam apenas e-mails de texto simples um para o outro”.
• Sobre o que é a conversa? Mesmo que o conteúdo da comunicação seja criptografado, às vezes é possível derivar um contexto provável de uma conversa sem saber exatamente o que é dito, por exemplo, “uma pessoa ligou para uma pizzaria na hora do jantar” ou “alguém ligou para um número conhecido de linha direta de suicídio na hora do jantar”. 3 horas da manhã."
Além das conversas individuais, também procuramos defender-nos contra ataques de correlação de contexto, através dos quais múltiplas conversas são analisadas para obter informações de nível superior:
• Relacionamentos: Descobrir relações sociais entre um par de entidades analisando a frequência e a duração de suas comunicações durante um período de tempo. Por exemplo, Carol e Eve ligam uma para a outra todos os dias durante várias horas seguidas.
• Cliques: Descobrir relações sociais entre um grupo de entidades que interagem entre si. Por exemplo, Alice, Bob e Eva se comunicam entre si.
• Grupos vagamente conectados e indivíduos-ponte: descobrir grupos que se comunicam entre si através de intermediários, analisando cadeias de comunicação (por exemplo, toda vez que Alice fala com Bob, ela fala com Carol quase imediatamente depois; Bob e Carol nunca se comunicam).
• Padrão de Vida: Descobrir quais comunicações são cíclicas e previsíveis. Por exemplo, Alice liga para Eve toda segunda-feira à noite por cerca de uma hora. Ataques Ativos
Ataques de deturpação.
O Cwtch não fornece registro global de nomes de exibição e, como tal, as pessoas que usam o Cwtch são mais vulneráveis a ataques baseados em declarações falsas, ou seja, pessoas que fingem ser outras pessoas:
O fluxo básico de um desses ataques é o seguinte, embora também existam outros fluxos:
•Alice tem um amigo chamado Bob e outro chamado Eve
• Eve descobre que Alice tem um amigo chamado Bob
• Eve cria milhares de novas contas para encontrar uma que tenha uma imagem/chave pública semelhante à de Bob (não será idêntica, mas pode enganar alguém por alguns minutos)
• Eve chama essa nova conta de "Eve New Account" e adiciona Alice como amiga.
• Eve então muda seu nome em "Eve New Account" para "Bob"
• Alice envia mensagens destinadas a "Bob" para a conta falsa de Bob de Eve Como os ataques de declarações falsas são inerentemente uma questão de confiança e verificação, a única maneira absoluta de evitá-los é os usuários validarem absolutamente a chave pública. Obviamente, isso não é o ideal e, em muitos casos, simplesmente não acontecerá .
Como tal, pretendemos fornecer algumas dicas de experiência do usuário na interface do usuário para orientar as pessoas na tomada de decisões sobre confiar em contas e/ou distinguir contas que possam estar tentando se representar como outros usuários.
Uma nota sobre ataques físicos A Cwtch não considera ataques que exijam acesso físico (ou equivalente) à máquina do usuário como praticamente defensáveis. No entanto, no interesse de uma boa engenharia de segurança, ao longo deste documento ainda nos referiremos a ataques ou condições que exigem tal privilégio e indicaremos onde quaisquer mitigações que implementámos falharão.
Um perfil Cwtch.
Os usuários podem criar um ou mais perfis Cwtch. Cada perfil gera um par de chaves ed25519 aleatório compatível com Tor.
Além do material criptográfico, um perfil também contém uma lista de Contatos (outras chaves públicas do perfil Cwtch + dados associados sobre esse perfil, como apelido e (opcionalmente) mensagens históricas), uma lista de Grupos (contendo o material criptográfico do grupo, além de outros dados associados, como apelido do grupo e mensagens históricas).
Conversões entre duas partes: ponto a ponto
https://nostrcheck.me/media/public/nostrcheck.me_2186338207587396891707662879.webp
Para que duas partes participem de uma conversa ponto a ponto, ambas devem estar on-line, mas apenas uma precisa estar acessível por meio do serviço Onion. Por uma questão de clareza, muitas vezes rotulamos uma parte como “ponto de entrada” (aquele que hospeda o serviço cebola) e a outra parte como “ponto de saída” (aquele que se conecta ao serviço cebola).
Após a conexão, ambas as partes adotam um protocolo de autenticação que:
• Afirma que cada parte tem acesso à chave privada associada à sua identidade pública.
• Gera uma chave de sessão efêmera usada para criptografar todas as comunicações futuras durante a sessão.
Esta troca (documentada com mais detalhes no protocolo de autenticação ) é negável offline , ou seja, é possível para qualquer parte falsificar transcrições desta troca de protocolo após o fato e, como tal - após o fato - é impossível provar definitivamente que a troca aconteceu de forma alguma.
Após o protocolo de autenticação, as duas partes podem trocar mensagens livremente.
Conversas em Grupo e Comunicação Ponto a Servidor
Ao iniciar uma conversa em grupo, é gerada uma chave aleatória para o grupo, conhecida como Group Key. Todas as comunicações do grupo são criptografadas usando esta chave. Além disso, o criador do grupo escolhe um servidor Cwtch para hospedar o grupo. Um convite é gerado, incluindo o Group Key, o servidor do grupo e a chave do grupo, para ser enviado aos potenciais membros.
Para enviar uma mensagem ao grupo, um perfil se conecta ao servidor do grupo e criptografa a mensagem usando a Group Key, gerando também uma assinatura sobre o Group ID, o servidor do grupo e a mensagem. Para receber mensagens do grupo, um perfil se conecta ao servidor e baixa as mensagens, tentando descriptografá-las usando a Group Key e verificando a assinatura.
Detalhamento do Ecossistema de Componentes
O Cwtch é composto por várias bibliotecas de componentes menores, cada uma desempenhando um papel específico. Algumas dessas bibliotecas incluem:
- abertoprivacidade/conectividade: Abstração de rede ACN, atualmente suportando apenas Tor.
- cwtch.im/tapir: Biblioteca para construção de aplicativos p2p em sistemas de comunicação anônimos.
- cwtch.im/cwtch: Biblioteca principal para implementação do protocolo/sistema Cwtch.
- cwtch.im/libcwtch-go: Fornece ligações C para Cwtch para uso em implementações de UI.
TAPIR: Uma Visão Detalhada
Projetado para substituir os antigos canais de ricochete baseados em protobuf, o Tapir fornece uma estrutura para a construção de aplicativos anônimos.
Está dividido em várias camadas:
• Identidade - Um par de chaves ed25519, necessário para estabelecer um serviço cebola Tor v3 e usado para manter uma identidade criptográfica consistente para um par.
• Conexões – O protocolo de rede bruto que conecta dois pares. Até agora, as conexões são definidas apenas através do Tor v3 Onion Services.
• Aplicativos - As diversas lógicas que permitem um determinado fluxo de informações em uma conexão. Os exemplos incluem transcrições criptográficas compartilhadas, autenticação, proteção contra spam e serviços baseados em tokens. Os aplicativos fornecem recursos que podem ser referenciados por outros aplicativos para determinar se um determinado peer tem a capacidade de usar um determinado aplicativo hospedado.
• Pilhas de aplicativos - Um mecanismo para conectar mais de um aplicativo, por exemplo, a autenticação depende de uma transcrição criptográfica compartilhada e o aplicativo peer cwtch principal é baseado no aplicativo de autenticação.
Identidade.
Um par de chaves ed25519, necessário para estabelecer um serviço cebola Tor v3 e usado para manter uma identidade criptográfica consistente para um peer.
InitializeIdentity - de um par de chaves conhecido e persistente:i,I
InitializeEphemeralIdentity - de um par de chaves aleatório: ie,Ie
Aplicativos de transcrição.
Inicializa uma transcrição criptográfica baseada em Merlin que pode ser usada como base de protocolos baseados em compromisso de nível superior
O aplicativo de transcrição entrará em pânico se um aplicativo tentar substituir uma transcrição existente por uma nova (aplicando a regra de que uma sessão é baseada em uma e apenas uma transcrição).
Merlin é uma construção de transcrição baseada em STROBE para provas de conhecimento zero. Ele automatiza a transformação Fiat-Shamir, para que, usando Merlin, protocolos não interativos possam ser implementados como se fossem interativos.
Isto é significativamente mais fácil e menos sujeito a erros do que realizar a transformação manualmente e, além disso, também fornece suporte natural para:
• protocolos multi-round com fases alternadas de commit e desafio;
• separação natural de domínios, garantindo que os desafios estejam vinculados às afirmações a serem provadas;
• enquadramento automático de mensagens, evitando codificação ambígua de dados de compromisso;
• e composição do protocolo, usando uma transcrição comum para vários protocolos.
Finalmente, o Merlin também fornece um gerador de números aleatórios baseado em transcrição como defesa profunda contra ataques de entropia ruim (como reutilização de nonce ou preconceito em muitas provas). Este RNG fornece aleatoriedade sintética derivada de toda a transcrição pública, bem como dos dados da testemunha do provador e uma entrada auxiliar de um RNG externo.
Conectividade Cwtch faz uso do Tor Onion Services (v3) para todas as comunicações entre nós.
Fornecemos o pacote openprivacy/connectivity para gerenciar o daemon Tor e configurar e desmontar serviços cebola através do Tor.
Criptografia e armazenamento de perfil.
Os perfis são armazenados localmente no disco e criptografados usando uma chave derivada de uma senha conhecida pelo usuário (via pbkdf2).
Observe que, uma vez criptografado e armazenado em disco, a única maneira de recuperar um perfil é recuperando a senha - como tal, não é possível fornecer uma lista completa de perfis aos quais um usuário pode ter acesso até inserir uma senha.
Perfis não criptografados e a senha padrão Para lidar com perfis "não criptografados" (ou seja, que não exigem senha para serem abertos), atualmente criamos um perfil com uma senha codificada de fato .
Isso não é o ideal, preferiríamos confiar no material de chave fornecido pelo sistema operacional, de modo que o perfil fosse vinculado a um dispositivo específico, mas esses recursos são atualmente uma colcha de retalhos - também notamos, ao criar um perfil não criptografado, pessoas que usam Cwtch estão explicitamente optando pelo risco de que alguém com acesso ao sistema de arquivos possa descriptografar seu perfil.
Vulnerabilidades Relacionadas a Imagens e Entrada de Dados
Imagens Maliciosas
O Cwtch enfrenta desafios na renderização de imagens, com o Flutter utilizando Skia, embora o código subjacente não seja totalmente seguro para a memória.
Realizamos testes de fuzzing nos componentes Cwtch e encontramos um bug de travamento causado por um arquivo GIF malformado, levando a falhas no kernel. Para mitigar isso, adotamos a política de sempre habilitar cacheWidth e/ou cacheHeight máximo para widgets de imagem.
Identificamos o risco de imagens maliciosas serem renderizadas de forma diferente em diferentes plataformas, como evidenciado por um bug no analisador PNG da Apple.
Riscos de Entrada de Dados
Um risco significativo é a interceptação de conteúdo ou metadados por meio de um Input Method Editor (IME) em dispositivos móveis. Mesmo aplicativos IME padrão podem expor dados por meio de sincronização na nuvem, tradução online ou dicionários pessoais.
Implementamos medidas de mitigação, como enableIMEPersonalizedLearning: false no Cwtch 1.2, mas a solução completa requer ações em nível de sistema operacional e é um desafio contínuo para a segurança móvel.
Servidor Cwtch.
O objetivo do protocolo Cwtch é permitir a comunicação em grupo através de infraestrutura não confiável .
Ao contrário dos esquemas baseados em retransmissão, onde os grupos atribuem um líder, um conjunto de líderes ou um servidor confiável de terceiros para garantir que cada membro do grupo possa enviar e receber mensagens em tempo hábil (mesmo que os membros estejam offline) - infraestrutura não confiável tem o objetivo de realizar essas propriedades sem a suposição de confiança.
O artigo original do Cwtch definia um conjunto de propriedades que se esperava que os servidores Cwtch fornecessem:
• O Cwtch Server pode ser usado por vários grupos ou apenas um.
• Um servidor Cwtch, sem a colaboração de um membro do grupo, nunca deve aprender a identidade dos participantes de um grupo.
• Um servidor Cwtch nunca deve aprender o conteúdo de qualquer comunicação.
• Um servidor Cwtch nunca deve ser capaz de distinguir mensagens como pertencentes a um grupo específico. Observamos aqui que essas propriedades são um superconjunto dos objetivos de design das estruturas de Recuperação de Informações Privadas.
Melhorias na Eficiência e Segurança
Eficiência do Protocolo
Atualmente, apenas um protocolo conhecido, o PIR ingênuo, atende às propriedades desejadas para garantir a privacidade na comunicação do grupo Cwtch. Este método tem um impacto direto na eficiência da largura de banda, especialmente para usuários em dispositivos móveis. Em resposta a isso, estamos ativamente desenvolvendo novos protocolos que permitem negociar garantias de privacidade e eficiência de maneiras diversas.
Os servidores, no momento desta escrita, permitem o download completo de todas as mensagens armazenadas, bem como uma solicitação para baixar mensagens específicas a partir de uma determinada mensagem. Quando os pares ingressam em um grupo em um novo servidor, eles baixam todas as mensagens do servidor inicialmente e, posteriormente, apenas as mensagens novas.
Mitigação de Análise de Metadados
Essa abordagem permite uma análise moderada de metadados, pois o servidor pode enviar novas mensagens para cada perfil suspeito exclusivo e usar essas assinaturas de mensagens exclusivas para rastrear sessões ao longo do tempo. Essa preocupação é mitigada por dois fatores:
- Os perfis podem atualizar suas conexões a qualquer momento, resultando em uma nova sessão do servidor.
- Os perfis podem ser "ressincronizados" de um servidor a qualquer momento, resultando em uma nova chamada para baixar todas as mensagens. Isso é comumente usado para buscar mensagens antigas de um grupo.
Embora essas medidas imponham limites ao que o servidor pode inferir, ainda não podemos garantir resistência total aos metadados. Para soluções futuras para esse problema, consulte Niwl.
Proteção contra Pares Maliciosos
Os servidores enfrentam o risco de spam gerado por pares, representando uma ameaça significativa à eficácia do sistema Cwtch. Embora tenhamos implementado um mecanismo de proteção contra spam no protótipo do Cwtch, exigindo que os pares realizem alguma prova de trabalho especificada pelo servidor, reconhecemos que essa não é uma solução robusta na presença de um adversário determinado com recursos significativos.
Pacotes de Chaves
Os servidores Cwtch se identificam por meio de pacotes de chaves assinados, contendo uma lista de chaves necessárias para garantir a segurança e resistência aos metadados na comunicação do grupo Cwtch. Esses pacotes de chaves geralmente incluem três chaves: uma chave pública do serviço Tor v3 Onion para o Token Board, uma chave pública do Tor v3 Onion Service para o Token Service e uma chave pública do Privacy Pass.
Para verificar os pacotes de chaves, os perfis que os importam do servidor utilizam o algoritmo trust-on-first-use (TOFU), verificando a assinatura anexada e a existência de todos os tipos de chave. Se o perfil já tiver importado o pacote de chaves do servidor anteriormente, todas as chaves são consideradas iguais.
Configuração prévia do aplicativo para ativar o Relé do Cwtch.
No Android, a hospedagem de servidor não está habilitada, pois essa opção não está disponível devido às limitações dos dispositivos Android. Essa funcionalidade está reservada apenas para servidores hospedados em desktops.
No Android, a única forma direta de importar uma chave de servidor é através do grupo de teste Cwtch, garantindo assim acesso ao servidor Cwtch.
Primeiro passo é Habilitar a opção de grupo no Cwtch que está em fase de testes. Clique na opção no canto superior direito da tela de configuração e pressione o botão para acessar as configurações do Cwtch.
Você pode alterar o idioma para Português do Brasil.Depois, role para baixo e selecione a opção para ativar os experimentos. Em seguida, ative a opção para habilitar o chat em grupo e a pré-visualização de imagens e fotos de perfil, permitindo que você troque sua foto de perfil.
https://link.storjshare.io/raw/jvss6zxle26jdguwaegtjdixhfka/production/f0ca039733d48895001261ab25c5d2efbaf3bf26e55aad3cce406646f9af9d15.MP4
Próximo passo é Criar um perfil.
Pressione o + botão de ação no canto inferior direito e selecione "Novo perfil" ou aberta no botão + adicionar novo perfil.
-
Selecione um nome de exibição
-
Selecione se deseja proteger
este perfil e salvo localmente com criptografia forte: Senha: sua conta está protegida de outras pessoas que possam usar este dispositivo
Sem senha: qualquer pessoa que tenha acesso a este dispositivo poderá acessar este perfil.
Preencha sua senha e digite-a novamente
Os perfis são armazenados localmente no disco e criptografados usando uma chave derivada de uma senha conhecida pelo usuário (via pbkdf2).
Observe que, uma vez criptografado e armazenado em disco, a única maneira de recuperar um perfil é recuperando a chave da senha - como tal, não é possível fornecer uma lista completa de perfis aos quais um usuário pode ter acesso até inserir um senha.
https://link.storjshare.io/raw/jxqbqmur2lcqe2eym5thgz4so2ya/production/8f9df1372ec7e659180609afa48be22b12109ae5e1eda9ef1dc05c1325652507.MP4
O próximo passo é adicionar o FuzzBot, que é um bot de testes e de desenvolvimento.
Contato do FuzzBot: 4y2hxlxqzautabituedksnh2ulcgm2coqbure6wvfpg4gi2ci25ta5ad.
Ao enviar o comando "testgroup-invite" para o FuzzBot, você receberá um convite para entrar no Grupo Cwtch Test. Ao ingressar no grupo, você será automaticamente conectado ao servidor Cwtch. Você pode optar por sair do grupo a qualquer momento ou ficar para conversar e tirar dúvidas sobre o aplicativo e outros assuntos. Depois, você pode configurar seu próprio servidor Cwtch, o que é altamente recomendável.
https://link.storjshare.io/raw/jvji25zclkoqcouni5decle7if7a/production/ee3de3540a3e3dca6e6e26d303e12c2ef892a5d7769029275b8b95ffc7468780.MP4
Agora você pode utilizar o aplicativo normalmente. Algumas observações que notei: se houver demora na conexão com outra pessoa, ambas devem estar online. Se ainda assim a conexão não for estabelecida, basta clicar no ícone de reset do Tor para restabelecer a conexão com a outra pessoa.
Uma introdução aos perfis Cwtch.
Com Cwtch você pode criar um ou mais perfis . Cada perfil gera um par de chaves ed25519 aleatório compatível com a Rede Tor.
Este é o identificador que você pode fornecer às pessoas e que elas podem usar para entrar em contato com você via Cwtch.
Cwtch permite criar e gerenciar vários perfis separados. Cada perfil está associado a um par de chaves diferente que inicia um serviço cebola diferente.
Gerenciar Na inicialização, o Cwtch abrirá a tela Gerenciar Perfis. Nessa tela você pode:
- Crie um novo perfil.
- Desbloquear perfis.
- Criptografados existentes.
- Gerenciar perfis carregados.
- Alterando o nome de exibição de um perfil.
- Alterando a senha de um perfil Excluindo um perfil.
- Alterando uma imagem de perfil.
Backup ou exportação de um perfil.
Na tela de gerenciamento de perfil:
-
Selecione o lápis ao lado do perfil que você deseja editar
-
Role para baixo até a parte inferior da tela.
-
Selecione "Exportar perfil"
-
Escolha um local e um nome de arquivo.
5.confirme.
Uma vez confirmado, o Cwtch colocará uma cópia do perfil no local indicado. Este arquivo é criptografado no mesmo nível do perfil.
Este arquivo pode ser importado para outra instância do Cwtch em qualquer dispositivo.
Importando um perfil.
-
Pressione o +botão de ação no canto inferior direito e selecione "Importar perfil"
-
Selecione um arquivo de perfil Cwtch exportado para importar
-
Digite a senha associada ao perfil e confirme.
Uma vez confirmado, o Cwtch tentará descriptografar o arquivo fornecido usando uma chave derivada da senha fornecida. Se for bem-sucedido, o perfil aparecerá na tela Gerenciamento de perfil e estará pronto para uso.
OBSERVAÇÃO Embora um perfil possa ser importado para vários dispositivos, atualmente apenas uma versão de um perfil pode ser usada em todos os dispositivos ao mesmo tempo. As tentativas de usar o mesmo perfil em vários dispositivos podem resultar em problemas de disponibilidade e falhas de mensagens.
Qual é a diferença entre uma conexão ponto a ponto e um grupo cwtch?
As conexões ponto a ponto Cwtch permitem que 2 pessoas troquem mensagens diretamente. As conexões ponto a ponto nos bastidores usam serviços cebola Tor v3 para fornecer uma conexão criptografada e resistente a metadados. Devido a esta conexão direta, ambas as partes precisam estar online ao mesmo tempo para trocar mensagens.
Os Grupos Cwtch permitem que várias partes participem de uma única conversa usando um servidor não confiável (que pode ser fornecido por terceiros ou auto-hospedado). Os operadores de servidores não conseguem saber quantas pessoas estão em um grupo ou o que está sendo discutido. Se vários grupos estiverem hospedados em um único servidor, o servidor não conseguirá saber quais mensagens pertencem a qual grupo sem a conivência de um membro do grupo. Ao contrário das conversas entre pares, as conversas em grupo podem ser conduzidas de forma assíncrona, para que todos num grupo não precisem estar online ao mesmo tempo.
Por que os grupos cwtch são experimentais? Mensagens em grupo resistentes a metadados ainda são um problema em aberto . Embora a versão que fornecemos no Cwtch Beta seja projetada para ser segura e com metadados privados, ela é bastante ineficiente e pode ser mal utilizada. Como tal, aconselhamos cautela ao usá-lo e apenas o fornecemos como um recurso opcional.
Como posso executar meu próprio servidor Cwtch? A implementação de referência para um servidor Cwtch é de código aberto . Qualquer pessoa pode executar um servidor Cwtch, e qualquer pessoa com uma cópia do pacote de chaves públicas do servidor pode hospedar grupos nesse servidor sem que o operador tenha acesso aos metadados relacionados ao grupo .
https://git.openprivacy.ca/cwtch.im/server
https://docs.openprivacy.ca/cwtch-security-handbook/server.html
Como posso desligar o Cwtch? O painel frontal do aplicativo possui um ícone do botão "Shutdown Cwtch" (com um 'X'). Pressionar este botão irá acionar uma caixa de diálogo e, na confirmação, o Cwtch será desligado e todos os perfis serão descarregados.
Suas doações podem fazer a diferença no projeto Cwtch? O Cwtch é um projeto dedicado a construir aplicativos que preservam a privacidade, oferecendo comunicação de grupo resistente a metadados. Além disso, o projeto também desenvolve o Cofre, formulários da web criptografados para ajudar mútua segura. Suas contribuições apoiam iniciativas importantes, como a divulgação de violações de dados médicos em Vancouver e pesquisas sobre a segurança do voto eletrônico na Suíça. Ao doar, você está ajudando a fechar o ciclo, trabalhando com comunidades marginalizadas para identificar e corrigir lacunas de privacidade. Além disso, o projeto trabalha em soluções inovadoras, como a quebra de segredos através da criptografia de limite para proteger sua privacidade durante passagens de fronteira. E também tem a infraestrutura: toda nossa infraestrutura é open source e sem fins lucrativos. Conheça também o Fuzzytags, uma estrutura criptográfica probabilística para marcação resistente a metadados. Sua doação é crucial para continuar o trabalho em prol da privacidade e segurança online. Contribua agora com sua doação
https://openprivacy.ca/donate/
onde você pode fazer sua doação em bitcoin e outras moedas, e saiba mais sobre os projetos. https://openprivacy.ca/work/
Link sobre Cwtch
https://cwtch.im/
https://git.openprivacy.ca/cwtch.im/cwtch
https://docs.cwtch.im/docs/intro
https://docs.openprivacy.ca/cwtch-security-handbook/
Baixar #CwtchDev
cwtch.im/download/
https://play.google.com/store/apps/details?id=im.cwtch.flwtch
-
@ 7e538978:a5987ab6
2024-10-02 13:57:31Chain Duel, a fast paced PvP game that takes inspiration from the classic snake game and supercharges it with Bitcoin’s Lightning Network. Imagine battling another player for dominance in a race to collect blocks, where the length of your chain isn’t just a visual cue. It represents real, staked satoshis. The player with the most Proof of Work wins, but it’s not just about gameplay; it’s about the seamless integration of the Lightning Network and real-time payments.
But how does Chain Duel manage these instant transactions with such efficiency? That’s where LNbits comes in. LNbits, an open-source wallet and payment infrastructure, handles all in-game payments making it easy for developers to focus on gameplay while LNbits takes care of everything from microtransactions to automated splits for developers and designers. In this article, we’ll dive deep into how Chain Duel leverages LNbits to streamline in-game payments and how other developers can take advantage of this powerful toolset to build the future of Lightning-powered gaming.
Let’s explore how LNbits transforms payment processing and why it’s quickly becoming a must-have for game developers working in the Bitcoin space.
Overview of Chain Duel
Chain Duel is a unique Lightning Network-inspired game that reimagines the classic snake game with a competitive twist, integrating real-time payments. Two players face off in real-time, racing to "catch" blocks and extend their chains. Each block added to the chain represents Proof of Work, and the player with the most Proof of Work wins the duel. The stakes are high, as the game represents satoshis (small units of Bitcoin) as points, with the winner taking home the prize.
The game is designed to be Lightning-native, meaning all payments within Chain Duel are processed through the Lightning Network. This ensures fast payments, reducing latency and making gameplay smooth. With additional features like practice mode, tournaments and highscores, Chain Duel creates an engaging and competitive environment for Bitcoin enthusiasts and gamers alike.
One of the standout aspects of Chain Duel is its deeper integration with the Lightning Network even at a design level. For example, actual Bitcoin blocks can appear on screen during matches, offering bonus points when mined in sync with the game. The game’s current version, still in beta, has already drawn attention within the Bitcoin community, gaining momentum at conferences and with a growing user base through its social networks. With its innovative combination of gaming, the Lightning Network, and competitive play, Chain Duel offers a glimpse into the future of Lightning-based gaming.
How LNbits is Used in Chain Duel
Seamless Integration with LNbits
At the core of Chain Duel’s efficient payment processing is LNbits, which handles in-game transactions smoothly and reliably. Chain Duel uses the LNbits LNURL-pay and LNURL-withdraw extensions to manage payments and rewards between players. Before each match, players send satoshis using LNURL-pay, which generates a static QR code or link for making the payment. LNURL-pay allows users to attach a note to the payment, which Chain Duel creatively uses as a way to insert the player name in-game. The simplicity of LNURL-pay ensures that users can quickly and easily initiate games, with fresh invoices being issued for every game. When players win, LNURL-withdraw enables them to seamlessly pull their earnings from the game, providing a quick payout system.
These extensions make it easy for players to send and receive Bitcoin with minimal latency, fully leveraging the power of the Lightning Network for fast and low-cost payments. The flexibility of LNbits’ tools means that game developers don’t need to worry about building custom payment systems from scratch—they can rely on LNbits to handle all financial transactions with precision.
Lightning Tournaments
Chain Duel tournaments leverage LNbits and its LNURL extensions to create a seamless and efficient experience for players. In Chain Duel tournaments, LNbits plays a crucial role in managing the overall economics. LNbits facilitates the generation of LNURL QR codes that participants can scan to register quickly or withdraw their winnings. LNbits allows Chain Duel to automatically handle multiple registrations through LNURL-pay, enabling players to participate in the tournament without additional steps. The Lightning Network's speed ensures that these payments occur in real-time, reducing wait times and allowing for a smoother flow in-game.
Splitting Payments
LNbits further simplifies revenue-sharing within Chain Duel. This feature allows the game to automatically split the satoshis sent by players into different shares for the game’s developer, designer, and host. Each time a payment is made to join a match, LNbits is used to automattically pay each of the contributors, according to pre-defined rules. This automated process ensures that everyone involved in the development and running of the game gets their fair share without manual intervention or complex bookkeeping.
Nostr Integration
Chain Duel also integrates with Nostr, a decentralized protocol for social interactions. Players can join games using "Zaps", small tips or micropayments sent over the Lightning Network within the Nostr ecosystem. Through NIP-57, which enables Nostr clients to request Zap invoices, players can use LNURL-pay enabled Zaps to register in P2P matches, further enhancing the Chain Duel experience. By using Zaps as a way to register in-game, Chain Duel automates the process of fetching players' identity, creating a more competitive and social experience. Zaps are public on the Nostr network, further expanding Chain Duel's games social reach and community engagement.
Game and Payment Synchronization
One of the key reasons Chain Duel developers chose LNbits is its powerful API that connects directly with the game’s logic. LNbits allows the game to synchronize payments with gameplay in real-time, providing a seamless experience where payments are an integrated part of the gaming mechanics.
With LNbits managing both the payment process and the Lightning Network’s complex infrastructure, Chain Duel developers are free to concentrate on enhancing the competitive and Lightning Network-related aspects of the game. This division of tasks is essential for streamlining development while still providing an innovative in-game payment experience that is deeply integrated with the Bitcoin network.
LNbits proves to be an indispensable tool for Chain Duel, enabling smooth in-game transactions, real-time revenue sharing, and seamless integration with Nostr. For developers looking to build Lightning-powered games, LNbits offers a powerful suite of tools that handle everything from micropayments to payment distribution—ensuring that the game's focus remains on fun and competition rather than complex payment systems.
LNBits facilitating Education and Adoption
This system contributes to educating users on the power of the Lightning Network. Since Chain Duel directly involve real satoshis and LNURL for registration and rewards, players actively experience how Lightning can facilitate fast, cheap, and permissionless payments. By incorporating LNbits into Chain Duel, the game serves as an educational tool that introduces users to the benefits of the Lightning Network. Players gain direct experience using Lightning wallets and LNURL, helping them understand how these tools work in real-world scenarios. The near-instant nature of these payments showcases the power of Lightning in a practical context, highlighting its potential beyond just gaming. Players are encouraged to set up wallets, explore the Lightning ecosystem, and eventually become familiar with Bitcoin and Lightning technology. By integrating LNbits, Chain Duel transforms in-game payments into a learning opportunity, making Bitcoin and Lightning more approachable for users worldwide.
Tools for Developers
LNbits is a versatile, open-source platform designed to simplify and enhance Bitcoin Lightning Network wallet management. For developers, particularly those working on Lightning-native games like Chain Duel, LNbits offers an invaluable set of tools that allow for seamless integration of Lightning payments without the need to build complex custom solutions from scratch. LNbits is built on a modular and extensible architecture, enabling developers to easily add or create functionality suited to their project’s needs.
Extensible Architecture for Customization
At the core of LNbits is a simple yet powerful wallet system that developers can access across multiple devices. What makes LNbits stand out is its extensible nature—everything beyond the core functionality is implemented as an extension. This modular approach allows users to customize their LNbits installation by enabling or building extensions to suit specific use cases. This flexibility is perfect for developers who want to add Lightning-based services to their games or apps without modifying the core codebase.
- Extensions for Every Use Case
LNbits comes with a wide array of built-in extensions created by contributors, offering various services that can be plugged into your application. Some popular extensions include: - Faucets: Distribute small amounts of Bitcoin to users for testing or promotional purposes.
- Paylinks: Create shareable links for instant payments.
- Points-of-sale (PoS): Allow users to set up shareable payment terminals.
- Paywalls: Charge users to access content or services.
- Event tickets: Sell tickets for events directly via Lightning payments.
- Games and services: From dice games to jukeboxes, LNbits offers entertaining and functional tools.
These ready-made solutions can be adapted and used in different gaming scenarios, for example in Chain Duel, where LNURL extensions are used for in game payments. The extensibility ensures developers can focus on building engaging gameplay while LNbits handles payment flows.
Developer-Friendly Customization
LNbits isn't just a plug-and-play platform. Developers can extend its functionality even further by creating their own extensions, giving full control over how the wallet system is integrated into their games or apps. The architecture is designed to make it easy for developers to build on top of the platform, adding custom features for specific requirements.
Flexible Funding Source Management
LNbits also offers flexibility in terms of managing funding sources. Developers can easily connect LNbits to various Lightning Network node implementations, enabling seamless transitions between nodes or even different payment systems. This allows developers to switch underlying funding sources with minimal effort, making LNbits adaptable for games that may need to scale quickly or rely on different payment infrastructures over time.
A Lean Core System for Maximum Efficiency
Thanks to its modular architecture, LNbits maintains a lean core system. This reduces complexity and overhead, allowing developers to implement only the features they need. By avoiding bloated software, LNbits ensures faster transactions and less resource consumption, which is crucial in fast-paced environments like Chain Duel where speed and efficiency are paramount.
LNbits is designed with developers in mind, offering a suite of tools and a flexible infrastructure that makes integrating Bitcoin payments easy. Whether you’re developing games, apps, or any service that requires Lightning Network transactions, LNbits is a powerful, open-source solution that can be adapted to fit your project.
Conclusion
Chain Duel stands at the forefront of Lightning-powered gaming, combining the excitement of competitive PvP with the speed and efficiency of the Lightning Network. With LNbits handling all in-game payments, from microtransactions to automated revenue splits, developers can focus entirely on crafting an engaging gaming experience. LNbits’ powerful API and extensions make it easy to manage real-time payments, removing the complexity of building payment infrastructure from scratch.
LNbits isn’t just a payment tool — it’s a flexible, developer-friendly platform that can be adapted to any gaming model. Whether you're developing a fast-paced PvP game like Chain Duel or any project requiring seamless Lightning Network integration, LNbits provides the ideal solution for handling instant payments with minimal overhead.
For developers interested in pushing the boundaries of Lightning-powered gaming, Chain Duel is a great example of how LNbits can enhance your game, letting you focus on the fun while LNbits manages real-time transactions.
Find out more
Curious about how Lightning Network payments can power your next game? Explore the following:
- Learn more about Chain Duel: Chain Duel
- Learn how LNbits can simplify payment handling in your project: LNbits
- Dive into decentralized communication with Nostr: Nostr
- Extensions for Every Use Case
-
@ f977c464:32fcbe00
2024-01-30 20:06:18Güneşin kaybolmasının üçüncü günü, saat öğlen on ikiyi yirmi geçiyordu. Trenin kalkmasına yaklaşık iki saat vardı. Hepimiz perondaydık. Valizlerimiz, kolilerimiz, renk renk ve biçimsiz çantalarımızla yan yana dizilmiş, kısa aralıklarla tepemizdeki devasa saati kontrol ediyorduk.
Ama ne kadar dik bakarsak bakalım zaman bir türlü istediğimiz hızla ilerlemiyordu. Herkes birkaç dakika sürmesi gereken alelade bir doğa olayına sıkışıp kalmış, karanlıktan sürünerek çıkmayı deniyordu.
Bekleme salonuna doğru döndüm. Nefesimden çıkan buharın arkasında, kalın taş duvarları ve camlarıyla morg kadar güvenli ve soğuk duruyordu. Cesetleri o yüzden bunun gibi yerlere taşımaya başlamışlardı. Demek insanların bütün iyiliği başkaları onları gördüğü içindi ki gündüzleri gecelerden daha karanlık olduğunda hemen birbirlerinin gırtlağına çökmüş, böğürlerinde delikler açmış, gözlerini oyup kafataslarını parçalamışlardı.
İstasyonun ışığı titrediğinde karanlığın enseme saplandığını hissettim. Eğer şimdi, böyle kalabalık bir yerde elektrik kesilse başımıza ne gelirdi?
İçerideki askerlerden biri bakışlarımı yakalayınca yeniden saate odaklanmış gibi yaptım. Sadece birkaç dakika geçmişti.
“Tarlalarım gitti. Böyle boyum kadar ayçiçeği doluydu. Ah, hepsi ölüp gidiyor. Afitap’ın çiçekleri de gi-”
“Dayı, Allah’ını seversen sus. Hepimizi yakacaksın şimdi.”
Karanlıkta durduğunda, görünmez olmayı istemeye başlıyordun. Kimse seni görmemeli, nefesini bile duymamalıydı. Kimsenin de ayağının altında dolaşmamalıydın; gelip kazayla sana çarpmamalılar, takılıp sendelememeliydiler. Yoksa aslında hedefi sen olmadığın bir öfke gürlemeye başlar, yaşadığın ilk şoku ve acıyı silerek üstünden geçerdi.
İlk konuşan, yaşlıca bir adam, kafasında kasketi, nasırlı ellerine hohluyordu. Gözleri ve burnu kızarmıştı. Güneşin kaybolması onun için kendi başına bir felaket değildi. Hayatına olan pratik yansımalarından korkuyordu olsa olsa. Bir anının kaybolması, bu yüzden çoktan kaybettiği birinin biraz daha eksilmesi. Hayatta kalmasını gerektiren sebepler azalırken, hayatta kalmasını sağlayacak kaynaklarını da kaybediyordu.
Onu susturan delikanlıysa atkısını bütün kafasına sarmış, sakalı ve yüzünün derinliklerine kaçmış gözleri dışında bedeninin bütün parçalarını gizlemeye çalışıyordu. İşte o, güneşin kaybolmasının tam olarak ne anlama geldiğini anlamamış olsa bile, dehşetini olduğu gibi hissedebilenlerdendi.
Güneşin onlardan alındıktan sonra kime verileceğini sormuyorlardı. En başta onlara verildiğinde de hiçbir soru sormamışlardı zaten.
İki saat ne zaman geçer?
Midemin üstünde, sağ tarafıma doğru keskin bir acı hissettim. Karaciğerim. Gözlerimi yumdum. Yanımda biri metal bir nesneyi yere bıraktı. Bir kafesti. İçerisindeki kartalın ıslak kokusu burnuma ulaşmadan önce bile biliyordum bunu.
“Yeniden mi?” diye sordu bana kartal. Kanatları kanlı. Zamanın her bir parçası tüylerinin üstüne çöreklenmişti. Gagası bir şey, tahminen et parçası geveliyor gibi hareket ediyordu. Eski anılar kolay unutulmazmış. Şu anda kafesinin kalın parmaklıklarının ardında olsa da bunun bir aldatmaca olduğunu bir tek ben biliyordum. Her an kanatlarını iki yana uzatıverebilir, hava bu hareketiyle dalgalanarak kafesi esneterek hepimizi içine alacak kadar genişleyebilir, parmaklıklar önce ayaklarımızın altına serilir gibi gözükebilir ama aslında hepimizin üstünde yükselerek tepemize çökebilirdi.
Aşağıya baktım. Tahtalarla zapt edilmiş, hiçbir yere gidemeyen ama her yere uzanan tren rayları. Atlayıp koşsam… Çantam çok ağırdı. Daha birkaç adım atamadan, kartal, suratını bedenime gömerdi.
“Bu sefer farklı,” diye yanıtladım onu. “Yeniden diyemezsin. Tekrarladığım bir şey değil bu. Hatta bir hata yapıyormuşum gibi tonlayamazsın da. Bu sefer, insanların hak etmediğini biliyorum.”
“O zaman daha vahim. Süzme salaksın demektir.”
“İnsanların hak etmemesi, insanlığın hak etmediği anlamına gelmez ki.”
Az önce göz göze geldiğim genççe ama çökük asker hâlâ bana bakıyordu. Bir kartalla konuştuğumu anlamamıştı şüphesiz. Yanımdakilerden biriyle konuştuğumu sanmış olmalıydı. Ama konuştuğum kişiye bakmıyordum ona göre. Çekingence kafamı eğmiştim. Bir kez daha göz göze geldiğimizde içerideki diğer iki askere bir şeyler söyledi, onlar dönüp beni süzerken dışarı çıktı.
Yanımızdaki, az önce konuşan iki adam da şaşkınlıkla bir bana bir kartala bakıyordu.
“Yalnız bu sefer kalbin de kırılacak, Prometheus,” dedi kartal, bana. “Belki son olur. Biliyorsun, bir sürü soruna neden oluyor bu yaptıkların.”
Beni koruyordu sözde. En çok kanıma dokunan buydu. Kasıklarımın üstüne oturmuş, kanlı suratının ardında gözleri parlarken attığı çığlık kulaklarımda titremeye devam ediyordu. Bu tabloda kimsenin kimseyi düşündüğü yoktu. Kartalın, yanımızdaki adamların, artık arkama kadar gelmiş olması gereken askerin, tren raylarının, geçmeyen saatlerin…
Arkamı döndüğümde, asker sahiden oradaydı. Zaten öyle olması gerekiyordu; görmüştüm bunu, biliyordum. Kehanetler… Bir şeyler söylüyordu ama ağzı oynarken sesi çıkmıyordu. Yavaşlamış, kendisini saatin akışına uydurmuştu. Havada donan tükürüğünden anlaşılıyordu, sinirliydi. Korktuğu için olduğunu biliyordum. Her seferinde korkmuşlardı. Beni unutmuş olmaları işlerini kolaylaştırmıyordu. Sadece yeni bir isim vermelerine neden oluyordu. Bu seferkiyle beni lanetleyecekleri kesinleşmişti.
Olması gerekenle olanların farklı olması ne kadar acınasıydı. Olması gerekenlerin doğasının kötücül olmasıysa bir yerde buna dayanıyordu.
“Salaksın,” dedi kartal bana. Zamanı aşan bir çığlık. Hepimizin önüne geçmişti ama kimseyi durduramıyordu.
Sonsuzluğa kaç tane iki saat sıkıştırabilirsiniz?
Ben bir tane bile sıkıştıramadım.
Çantama uzanıyordum. Asker de sırtındaki tüfeğini indiriyordu. Benim acelem yoktu, onunsa eli ayağı birbirine dolaşıyordu. Oysaki her şey tam olması gerektiği anda olacaktı. Kehanet başkasının parmaklarının ucundaydı.
Güneş, bir tüfeğin patlamasıyla yeryüzüne doğdu.
Rayların üzerine serilmiş göğsümün ortasından, bir çantanın içinden.
Not: Bu öykü ilk olarak 2021 yılında Esrarengiz Hikâyeler'de yayımlanmıştır.
-
@ 3bf0c63f:aefa459d
2024-01-14 13:55:28O Planetinha
Fumaça verde me entrando pelas narinas e um coro desafinado fazia uma base melódica.
nos confins da galáxia havia um planetinha isolado. Era um planeta feliz.
O homem vestido de mago começava a aparecer por detrás da fumaça verde.
O planetinha recebeu três presentes, mas o seu habitante, o homem, estava num estado de confusão tão grande que ameaçava estragá-los. Os homens já havia escravizado o primeiro presente, a vida; lutavam contra o segundo presente, a morte; e havia alguns que achavam que deviam destruir totalmente o terceiro, o amor, e com isto levar a desordem total ao pobre planetinha perdido, que se chamava Terra.
O coro desafinado entrou antes do "Terra" cantando várias vezes, como se imitasse um eco, "terra-terra-terraaa". Depois de uma pausa dramática, o homem vestido de mago voltou a falar.
Terra, nossa nave mãe.
Neste momento eu me afastei. À frente do palco onde o mago e seu coral faziam apelos à multidão havia vários estandes cobertos com a tradicional armação de quatro pernas e lona branca. Em todos os cantos da praça havia gente, gente dos mais variados tipos. Visitantes curiosos que se aproximavam atraídos pela fumaça verde e as barraquinhas, gente que aproveitava o movimento para vender doces sem pagar imposto, casais que se abraçavam de pé para espantar o frio, os tradicionais corredores que faziam seu cooper, gente cheia de barba e vestida para imitar os hippies dos anos 60 e vender colares estendidos no chão, transeuntes novos e velhos, vestidos como baladeiros ou como ativistas do ônibus grátis, grupos de ciclistas entusiastas.
O mago fazia agora apelos para que nós, os homens, habitantes do isolado planetinha, passássemos a ver o planetinha, nossa nave mãe, como um todo, e adquiríssemos a consciência de que ele estava entrando em maus lençóis. A idéia, reforçada pela logomarca do evento, era que parássemos de olhar só para a nossa vida e pensássemos no planeta.
A logomarca do evento, um desenho estilizado do planeta Terra, nada tinha a ver com seu nome: "Festival Andando de Bem com a Vida", mas havia sido ali colocada estrategicamente pelos organizadores, de quem parecia justamente sair a mensagem dita pelo mago.
Aquela multidão de pessoas que, assim como eu, tinham suas próprias preocupações, não podiam ver o quadro caótico que formavam, cada uma com seus atos isolados, ali naquela praça isolada, naquele planeta isolado. Quando o hippie barbudo, quase um Osho, assustava um casal para tentar vender-lhes um colar, a quantidade de caos que isto acrescentava à cena era gigantesca. Por um segundo, pude ver, como se estivesse de longe e acima, com toda a pretensão que este estado imaginativo carrega, a cena completa do caos.
Uma nave-mãe, dessas de ficção científica, habitada por milhões de pessoas, seguia no espaço sem rumo, e sem saber que logo à frente um longo precipício espacial a esperava, para a desgraça completa sua e de seus habitantes.
Acostumados àquela nave tanto quanto outrora estiveram acostumados à sua terra natal, os homens viviam as próprias vidas sem nem se lembrar que estavam vagando pelo espaço. Ninguém sabia quem estava conduzindo a nave, e ninguém se importava.
No final do filme descobre-se que era a soma completa do caos que cada habitante produzia, com seus gestos egoístas e incapazes de levar em conta a totalidade, é que determinava a direção da nave-mãe. O efeito, no entanto, não era imediato, como nunca é. Havia gente de verdade encarregada de conduzir a nave, mas era uma gente bêbada, mau-caráter, que vivia brigando pelo controle da nave e o poder que isto lhes dava. Poder, status, dinheiro!
Essa gente bêbada era atraída até ali pela corrupção das instituições e da moral comum que, no fundo no fundo, era causada pelo egoísmo da população, através de um complexo -- mas que no filme aparece simplificado pela ação individual de um magnata do divertimento público -- processo social.
O homem vestido de mago era mais um agente causador de caos, com sua cena cheia de fumaça e sua roupa estroboscópica, ele achava que estava fazendo o bem ao alertar sua platéia, todos as sextas-feiras, de que havia algo que precisava ser feito, que cada um que estava ali ouvindo era responsável pelo planeta. A sua incapacidade, porém, de explicar o que precisava ser feito só aumentava a angústia geral; a culpa que ele jogava sobre seu público, e que era prontamente aceita e passada em frente, aos familiares e amigos de cada um, atormentava-os diariamente e os impedia de ter uma vida decente no trabalho e em casa. As famílias, estressadas, estavam constantemente brigando e os motivos mais insignificantes eram responsáveis pelas mais horrendas conseqüências.
O mago, que após o show tirava o chapéu entortado e ia tomar cerveja num boteco, era responsável por uma parcela considerável do caos que levava a nave na direção do seu desgraçado fim. No filme, porém, um dos transeuntes que de passagem ouviu um pedaço do discurso do mago despertou em si mesmo uma consiência transformadora e, com poderes sobre-humanos que lhe foram então concedidos por uma ordem iniciática do bem ou não, usando só os seus poderes humanos mesmo, o transeunte -- na primeira versão do filme um homem, na segunda uma mulher -- consegue consertar as instituições e retirar os bêbados da condução da máquina. A questão da moral pública é ignorada para abreviar a trama, já com duas horas e quarenta de duração, mas subentende-se que ela também fora resolvida.
No planeta Terra real, que não está indo em direção alguma, preso pela gravidade ao Sol, e onde as pessoas vivem a própria vida porque lhes é impossível viver a dos outros, não têm uma consciência global de nada porque só é possível mesmo ter a consciência delas mesmas, e onde a maioria, de uma maneira ou de outra, está tentando como pode, fazer as coisas direito, o filme é exibido.
Para a maioria dos espectadores, é um filme que evoca reflexões, um filme forte. Por um segundo elas têm o mesmo vislumbre do caos generalizado que eu tive ali naquela praça. Para uma pequena parcela dos espectadores -- entre eles alguns dos que estavam na platéia do mago, o próprio mago, o seguidor do Osho, o casal de duas mulheres e o vendedor de brigadeiros, mas aos quais se somam também críticos de televisão e jornal e gente que fala pelos cotovelos na internet -- o filme é um horror, o filme é uma vulgarização de um problema real e sério, o filme apela para a figura do herói salvador e passa uma mensagem totalmente errada, de que a maioria da população pode continuar vivendo as suas própria vidinhas miseráveis enquanto espera por um herói que vem do Olimpo e os salva da mixórdia que eles mesmos causaram, é um filme que presta um enorme desserviço à causa.
No dia seguinte ao lançamento, num bar meio caro ali perto da praça, numa mesa com oito pessoas, entre elas seis do primeiro grupo e oito do segundo, discute-se se o filme levará ou não o Oscar. Eu estou em casa dormindo e não escuto nada.
-
@ f977c464:32fcbe00
2024-01-11 18:47:47Kendisini aynada ilk defa gördüğü o gün, diğerleri gibi olduğunu anlamıştı. Oysaki her insan biricik olmalıydı. Sözgelimi sinirlendiğinde bir kaşı diğerinden birkaç milimetre daha az çatılabilirdi veya sevindiğinde dudağı ona has bir açıyla dalgalanabilirdi. Hatta bunların hiçbiri mümkün değilse, en azından, gözlerinin içinde sadece onun sahip olabileceği bir ışık parlayabilirdi. Çok sıradan, öyle sıradan ki kimsenin fark etmediği o milyonlarca minik şeyden herhangi biri. Ne olursa.
Ama yansımasına bakarken bunların hiçbirini bulamadı ve diğer günlerden hiç de farklı başlamamış o gün, işe gitmek için vagonunun gelmesini beklediği alelade bir metro istasyonunda, içinde kaybolduğu illüzyon dağılmaya başladı.
İlk önce derisi döküldü. Tam olarak dökülmedi aslında, daha çok kıvılcımlara dönüşüp bedeninden fırlamış ve bir an sonra sönerek külleşmiş, havada dağılmıştı. Ardında da, kaybolmadan hemen önce, kısa süre için hayal meyal görülebilen, bir ruhun yok oluşuna ağıt yakan rengârenk peri cesetleri bırakmıştı. Beklenenin aksine, havaya toz kokusu yayıldı.
Dehşete düştü elbette. Dehşete düştüler. Panikle üstlerini yırtan 50 işçi. Her şeyin sebebiyse o vagon.
Saçları da döküldü. Her tel, yere varmadan önce, her santimde ikiye ayrıla ayrıla yok oldu.
Bütün yüzeylerin mat olduğu, hiçbir şeyin yansımadığı, suyun siyah aktığı ve kendine ancak kameralarla bakabildiğin bir dünyada, vagonun içine yerleştirilmiş bir aynadan ilk defa kendini görmek.
Gözlerinin akları buharlaşıp havada dağıldı, mercekleri boşalan yeri doldurmak için eriyip yayıldı. Gerçeği görmemek için yaratılmış, bu yüzden görmeye hazır olmayan ve hiç olmayacak gözler.
Her şeyin o anda sona erdiğini sanabilirdi insan. Derin bir karanlık ve ölüm. Görmenin görmek olduğu o anın bitişi.
Ben geldiğimde ölmüşlerdi.
Yani bozulmuşlardı demek istiyorum.
Belleklerini yeni taşıyıcılara takmam mümkün olmadı. Fiziksel olarak kusursuz durumdaydılar, olmayanları da tamir edebilirdim ama tüm o hengamede kendilerini baştan programlamış ve girdilerini modifiye etmişlerdi.
Belleklerden birini masanın üzerinden ileriye savurdu. Hınca hınç dolu bir barda oturuyorlardı. O ve arkadaşı.
Sırf şu kendisini insan sanan androidler travma geçirip delirmesin diye neler yapıyoruz, insanın aklı almıyor.
Eliyle arkasını işaret etti.
Polislerin söylediğine göre biri vagonun içerisine ayna yerleştirmiş. Bu zavallılar da kapı açılıp bir anda yansımalarını görünce kafayı kırmışlar.
Arkadaşı bunların ona ne hissettirdiğini sordu. Yani o kadar bozuk, insan olduğunu sanan androidi kendilerini parçalamış olarak yerde görmek onu sarsmamış mıydı?
Hayır, sonuçta belirli bir amaç için yaratılmış şeyler onlar. Kaliteli bir bilgisayarım bozulduğunda üzülürüm çünkü parasını ben vermişimdir. Bunlarsa devletin. Bana ne ki?
Arkadaşı anlayışla kafasını sallayıp suyundan bir yudum aldı. Kravatını biraz gevşetti.
Bira istemediğinden emin misin?
İstemediğini söyledi. Sahi, neden deliriyordu bu androidler?
Basit. Onların yapay zekâlarını kodlarken bir şeyler yazıyorlar. Yazılımcılar. Biliyorsun, ben donanımdayım. Bunlar da kendilerini insan sanıyorlar. Tiplerine bak.
Sesini alçalttı.
Arabalarda kaza testi yapılan mankenlere benziyor hepsi. Ağızları burunları bile yok ama şu geldiğimizden beri sakalını düzeltip duruyor mesela. Hayır, hepsi de diğerleri onun sakalı varmış sanıyor, o manyak bir şey.
Arkadaşı bunun delirmeleriyle bağlantısını çözemediğini söyledi. O da normal sesiyle konuşmaya devam etti.
Anlasana, aynayı falan ayırt edemiyor mercekleri. Lönk diye kendilerini görüyorlar. Böyle, olduğu gibi...
Nedenmiş peki? Ne gerek varmış?
Ne bileyim be abicim! Ahiret soruları gibi.
Birasına bakarak dalıp gitti. Sonra masaya abanarak arkadaşına iyice yaklaştı. Bulanık, bir tünelin ucundaki biri gibi, şekli şemalı belirsiz bir adam.
Ben seni nereden tanıyorum ki ulan? Kimsin sen?
Belleği makineden çıkardılar. İki kişiydiler. Soruşturmadan sorumlu memurlar.
─ Baştan mı başlıyoruz, diye sordu belleği elinde tutan ilk memur.
─ Bir kere daha deneyelim ama bu sefer direkt aynayı sorarak başla, diye cevapladı ikinci memur.
─ Bence de. Yeterince düzgün çalışıyor.
Simülasyon yüklenirken, ayakta, biraz arkada duran ve alnını kaşıyan ikinci memur sormaktan kendisini alamadı:
─ Bu androidleri niye böyle bir olay yerine göndermişler ki? Belli tost olacakları. İsraf. Gidip biz baksak aynayı kırıp delilleri mahvetmek zorunda da kalmazlar.
Diğer memur sandalyesinde hafifçe dönecek oldu, o sırada soruyu bilgisayarın hoparlöründen teknisyen cevapladı.
Hangi işimizde bir yamukluk yok ki be abi.
Ama bir son değildi. Üstlerindeki tüm illüzyon dağıldığında ve çıplak, cinsiyetsiz, birbirinin aynı bedenleriyle kaldıklarında sıra dünyaya gelmişti.
Yere düştüler. Elleri -bütün bedeni gibi siyah turmalinden, boğumları çelikten- yere değdiği anda, metronun zemini dağıldı.
Yerdeki karolar öncesinde beyazdı ve çok parlaktı. Tepelerindeki floresan, ışığını olduğu gibi yansıtıyor, tek bir lekenin olmadığı ve tek bir tozun uçmadığı istasyonu aydınlatıyorlardı.
Duvarlara duyurular asılmıştı. Örneğin, yarın akşam kültür merkezinde 20.00’da başlayacak bir tekno blues festivalinin cıvıl cıvıl afişi vardı. Onun yanında daha geniş, sarı puntolu harflerle yazılmış, yatay siyah kesiklerle çerçevesi çizilmiş, bir platformdan düşen çöp adamın bulunduğu “Dikkat! Sarı bandı geçmeyin!” uyarısı. Biraz ilerisinde günlük resmi gazete, onun ilerisinde bir aksiyon filminin ve başka bir romantik komedi filminin afişleri, yapılacakların ve yapılmayacakların söylendiği küçük puntolu çeşitli duyurular... Duvar uzayıp giden bir panoydu. On, on beş metrede bir tekrarlanıyordu.
Tüm istasyonun eni yüz metre kadar. Genişliği on metre civarı.
Önlerinde, açık kapısından o mendebur aynanın gözüktüğü vagon duruyordu. Metro, istasyona sığmayacak kadar uzundu. Bir kılıcın keskinliğiyle uzanıyor ama yer yer vagonların ek yerleriyle bölünüyordu.
Hiçbir vagonda pencere olmadığı için metronun içi, içlerindekiler meçhuldü.
Sonrasında karolar zerrelerine ayrılarak yükseldi. Floresanın ışığında her yeri toza boğdular ve ortalığı gri bir sisin altına gömdüler. Çok kısa bir an. Afişleri dalgalandırmadılar. Dalgalandırmaya vakitleri olmadı. Yerlerinden söküp aldılar en fazla. Işık birkaç kere sönüp yanarak direndi. Son kez söndüğünde bir daha geri gelmedi.
Yine de etraf aydınlıktı. Kırmızı, her yere eşit dağılan soluk bir ışıkla.
Yer tamamen tele dönüşmüştü. Altında çapraz hatlarla desteklenmiş demir bir iskelet. Işık birkaç metreden daha fazla aşağıya uzanamıyordu. Sonsuzluğa giden bir uçurum.
Duvarın yerini aynı teller ve demir iskelet almıştı. Arkasında, birbirine vidalarla tutturulmuş demir plakalardan oluşan, üstünden geçen boruların ek yerlerinden bazen ince buharların çıktığı ve bir süre asılı kaldıktan sonra ağır, yağlı bir havayla sürüklendiği bir koridor.
Diğer tarafta paslanmış, pencerelerindeki camlar kırıldığı için demir plakalarla kapatılmış külüstür bir metro. Kapının karşısındaki aynadan her şey olduğu gibi yansıyordu.
Bir konteynırın içini andıran bir evde, gerçi gayet de birbirine eklenmiş konteynırlardan oluşan bir şehirde “andıran” demek doğru olmayacağı için düpedüz bir konteynırın içinde, masaya mum görüntüsü vermek için koyulmuş, yarı katı yağ atıklarından şekillendirilmiş kütleleri yakmayı deniyordu. Kafasında hayvan kıllarından yapılmış grili siyahlı bir peruk. Aynı kıllardan kendisine gür bir bıyık da yapmıştı.
Üstünde mavi çöp poşetlerinden yapılmış, kravatlı, şık bir takım.
Masanın ayakları yerine oradan buradan çıkmış parçalar konulmuştu: bir arabanın şaft mili, üst üste konulmuş ve üstünde yazı okunamayan tenekeler, boş kitaplar, boş gazete balyaları... Hiçbir şeye yazı yazılmıyordu, gerek yoktu da zaten çünkü merkez veri bankası onları fark ettirmeden, merceklerden giren veriyi sentezleyerek insanlar için dolduruyordu. Yani, androidler için. Farklı şekilde isimlendirmek bir fark yaratacaksa.
Onların mercekleri için değil. Bağlantıları çok önceden kopmuştu.
─ Hayatım, sofra hazır, diye bağırdı yatak odasındaki karısına.
Sofrada tabak yerine düz, bardak yerine bükülmüş, çatal ve bıçak yerine sivriltilmiş plakalar.
Karısı salonun kapısında durakladı ve ancak kulaklarına kadar uzanan, kocasınınkine benzeyen, cansız, ölü hayvanların kıllarından ibaret peruğunu eliyle düzeltti. Dudağını, daha doğrusu dudağının olması gereken yeri koyu kırmızı bir yağ tabakasıyla renklendirmeyi denemişti. Biraz da yanaklarına sürmüştü.
─ Nasıl olmuş, diye sordu.
Sesi tek düzeydi ama hafif bir neşe olduğunu hissettiğinize yemin edebilirdiniz.
Üzerinde, çöp poşetlerinin içini yazısız gazete kağıtlarıyla doldurarak yaptığı iki parça giysi.
─ Çok güzelsin, diyerek kravatını düzeltti kocası.
─ Sen de öylesin, sevgilim.
Yaklaşıp kocasını öptü. Kocası da onu. Sonra nazikçe elinden tutarak, sandalyesini geriye çekerek oturmasına yardım etti.
Sofrada yemek niyetine hiçbir şey yoktu. Gerek de yoktu zaten.
Konteynırın kapısı gürültüyle tekmelenip içeri iki memur girene kadar birbirlerine öyküler anlattılar. O gün neler yaptıklarını. İşten erken çıkıp yemyeşil çimenlerde gezdiklerini, uçurtma uçurduklarını, kadının nasıl o elbiseyi bulmak için saatlerce gezip yorulduğunu, kocasının kısa süreliğine işe dönüp nasıl başarılı bir hamleyle yaşanan krizi çözdüğünü ve kadının yanına döndükten sonra, alışveriş merkezinde oturdukları yeni dondurmacının dondurmalarının ne kadar lezzetli olduğunu, boğazlarının ağrımasından korktuklarını...
Akşam film izleyebilirlerdi, televizyonda -boş ve mat bir plaka- güzel bir film oynayacaktı.
İki memur. Çıplak bedenleriyle birbirinin aynı. Ellerindeki silahları onlara doğrultmuşlardı. Mum ışığında, tertemiz bir örtünün serili olduğu masada, bardaklarında şaraplarla oturan ve henüz sofranın ortasındaki hindiye dokunmamış çifti gördüklerinde bocaladılar.
Hiç de androidlere bilinçli olarak zarar verebilecek gibi gözükmüyorlardı.
─ Sessiz kalma hakkına sahipsiniz, diye bağırdı içeri giren ikinci memur. Söylediğiniz her şey...
Cümlesini bitiremedi. Yatak odasındaki, masanın üzerinden gördüğü o şey, onunla aynı hareketleri yapan android, yoksa, bir aynadaki yansıması mıydı?
Bütün illüzyon o anda dağılmaya başladı.
Not: Bu öykü ilk olarak 2020 yılında Esrarengiz Hikâyeler'de yayımlanmıştır.
-
@ 8fb140b4:f948000c
2023-11-21 21:37:48Embarking on the journey of operating your own Lightning node on the Bitcoin Layer 2 network is more than just a tech-savvy endeavor; it's a step into a realm of financial autonomy and cutting-edge innovation. By running a node, you become a vital part of a revolutionary movement that's reshaping how we think about money and digital transactions. This role not only offers a unique perspective on blockchain technology but also places you at the heart of a community dedicated to decentralization and network resilience. Beyond the technicalities, it's about embracing a new era of digital finance, where you contribute directly to the network's security, efficiency, and growth, all while gaining personal satisfaction and potentially lucrative rewards.
In essence, running your own Lightning node is a powerful way to engage with the forefront of blockchain technology, assert financial independence, and contribute to a more decentralized and efficient Bitcoin network. It's an adventure that offers both personal and communal benefits, from gaining in-depth tech knowledge to earning a place in the evolving landscape of cryptocurrency.
Running your own Lightning node for the Bitcoin Layer 2 network can be an empowering and beneficial endeavor. Here are 10 reasons why you might consider taking on this task:
-
Direct Contribution to Decentralization: Operating a node is a direct action towards decentralizing the Bitcoin network, crucial for its security and resistance to control or censorship by any single entity.
-
Financial Autonomy: Owning a node gives you complete control over your financial transactions on the network, free from reliance on third-party services, which can be subject to fees, restrictions, or outages.
-
Advanced Network Participation: As a node operator, you're not just a passive participant but an active player in shaping the network, influencing its efficiency and scalability through direct involvement.
-
Potential for Higher Revenue: With strategic management and optimal channel funding, your node can become a preferred route for transactions, potentially increasing the routing fees you can earn.
-
Cutting-Edge Technological Engagement: Running a node puts you at the forefront of blockchain and bitcoin technology, offering insights into future developments and innovations.
-
Strengthened Network Security: Each new node adds to the robustness of the Bitcoin network, making it more resilient against attacks and failures, thus contributing to the overall security of the ecosystem.
-
Personalized Fee Structures: You have the flexibility to set your own fee policies, which can balance earning potential with the service you provide to the network.
-
Empowerment Through Knowledge: The process of setting up and managing a node provides deep learning opportunities, empowering you with knowledge that can be applied in various areas of blockchain and fintech.
-
Boosting Transaction Capacity: By running a node, you help to increase the overall capacity of the Lightning Network, enabling more transactions to be processed quickly and at lower costs.
-
Community Leadership and Reputation: As an active node operator, you gain recognition within the Bitcoin community, which can lead to collaborative opportunities and a position of thought leadership in the space.
These reasons demonstrate the impactful and transformative nature of running a Lightning node, appealing to those who are deeply invested in the principles of bitcoin and wish to actively shape its future. Jump aboard, and embrace the journey toward full independence. 🐶🐾🫡🚀🚀🚀
-
-
@ 8fb140b4:f948000c
2023-11-18 23:28:31Chef's notes
Serving these two dishes together will create a delightful centerpiece for your Thanksgiving meal, offering a perfect blend of traditional flavors with a homemade touch.
Details
- ⏲️ Prep time: 30 min
- 🍳 Cook time: 1 - 2 hours
- 🍽️ Servings: 4-6
Ingredients
- 1 whole turkey (about 12-14 lbs), thawed and ready to cook
- 1 cup unsalted butter, softened
- 2 tablespoons fresh thyme, chopped
- 2 tablespoons fresh rosemary, chopped
- 2 tablespoons fresh sage, chopped
- Salt and freshly ground black pepper
- 1 onion, quartered
- 1 lemon, halved
- 2-3 cloves of garlic
- Apple and Sage Stuffing
- 1 loaf of crusty bread, cut into cubes
- 2 apples, cored and chopped
- 1 onion, diced
- 2 stalks celery, diced
- 3 cloves garlic, minced
- 1/4 cup fresh sage, chopped
- 1/2 cup unsalted butter
- 2 cups chicken broth
- Salt and pepper, to taste
Directions
- Preheat the Oven: Set your oven to 325°F (165°C).
- Prepare the Herb Butter: Mix the softened butter with the chopped thyme, rosemary, and sage. Season with salt and pepper.
- Prepare the Turkey: Remove any giblets from the turkey and pat it dry. Loosen the skin and spread a generous amount of herb butter under and over the skin.
- Add Aromatics: Inside the turkey cavity, place the quartered onion, lemon halves, and garlic cloves.
- Roast: Place the turkey in a roasting pan. Tent with aluminum foil and roast. A general guideline is about 15 minutes per pound, or until the internal temperature reaches 165°F (74°C) at the thickest part of the thigh.
- Rest and Serve: Let the turkey rest for at least 20 minutes before carving.
- Next: Apple and Sage Stuffing
- Dry the Bread: Spread the bread cubes on a baking sheet and let them dry overnight, or toast them in the oven.
- Cook the Vegetables: In a large skillet, melt the butter and cook the onion, celery, and garlic until soft.
- Combine Ingredients: Add the apples, sage, and bread cubes to the skillet. Stir in the chicken broth until the mixture is moist. Season with salt and pepper.
- Bake: Transfer the stuffing to a baking dish and bake at 350°F (175°C) for about 30-40 minutes, until golden brown on top.
-
@ 8fb140b4:f948000c
2023-11-02 01:13:01Testing a brand new YakiHonne native client for iOS. Smooth as butter (not penis butter 🤣🍆🧈) with great visual experience and intuitive navigation. Amazing work by the team behind it! * lists * work
Bold text work!
Images could have used nostr.build instead of raw S3 from us-east-1 region.
Very impressive! You can even save the draft and continue later, before posting the long-form note!
🐶🐾🤯🤯🤯🫂💜
-
@ 8fb140b4:f948000c
2023-08-22 12:14:34As the title states, scratch behind my ear and you get it. 🐶🐾🫡
-
@ 8fb140b4:f948000c
2023-07-30 00:35:01Test Bounty Note
-
@ 8fb140b4:f948000c
2023-07-22 09:39:48Intro
This short tutorial will help you set up your own Nostr Wallet Connect (NWC) on your own LND Node that is not using Umbrel. If you are a user of Umbrel, you should use their version of NWC.
Requirements
You need to have a working installation of LND with established channels and connectivity to the internet. NWC in itself is fairly light and will not consume a lot of resources. You will also want to ensure that you have a working installation of Docker, since we will use a docker image to run NWC.
- Working installation of LND (and all of its required components)
- Docker (with Docker compose)
Installation
For the purpose of this tutorial, we will assume that you have your lnd/bitcoind running under user bitcoin with home directory /home/bitcoin. We will also assume that you already have a running installation of Docker (or docker.io).
Prepare and verify
git version - we will need git to get the latest version of NWC. docker version - should execute successfully and show the currently installed version of Docker. docker compose version - same as before, but the version will be different. ss -tupln | grep 10009- should produce the following output: tcp LISTEN 0 4096 0.0.0.0:10009 0.0.0.0: tcp LISTEN 0 4096 [::]:10009 [::]:**
For things to work correctly, your Docker should be version 20.10.0 or later. If you have an older version, consider installing a new one using instructions here: https://docs.docker.com/engine/install/
Create folders & download NWC
In the home directory of your LND/bitcoind user, create a new folder, e.g., "nwc" mkdir /home/bitcoin/nwc. Change to that directory cd /home/bitcoin/nwc and clone the NWC repository: git clone https://github.com/getAlby/nostr-wallet-connect.git
Creating the Docker image
In this step, we will create a Docker image that you will use to run NWC.
- Change directory to
nostr-wallet-connect
:cd nostr-wallet-connect
- Run command to build Docker image:
docker build -t nwc:$(date +'%Y%m%d%H%M') -t nwc:latest .
(there is a dot at the end) - The last line of the output (after a few minutes) should look like
=> => naming to docker.io/library/nwc:latest
nwc:latest
is the name of the Docker image with a tag which you should note for use later.
Creating docker-compose.yml and necessary data directories
- Let's create a directory that will hold your non-volatile data (DB):
mkdir data
- In
docker-compose.yml
file, there are fields that you want to replace (<> comments) and port “4321” that you want to make sure is open (check withss -tupln | grep 4321
which should return nothing). - Create
docker-compose.yml
file with the following content, and make sure to update fields that have <> comment:
version: "3.8" services: nwc: image: nwc:latest volumes: - ./data:/data - ~/.lnd:/lnd:ro ports: - "4321:8080" extra_hosts: - "localhost:host-gateway" environment: NOSTR_PRIVKEY: <use "openssl rand -hex 32" to generate a fresh key and place it inside ""> LN_BACKEND_TYPE: "LND" LND_ADDRESS: localhost:10009 LND_CERT_FILE: "/lnd/tls.cert" LND_MACAROON_FILE: "/lnd/data/chain/bitcoin/mainnet/admin.macaroon" DATABASE_URI: "/data/nostr-wallet-connect.db" COOKIE_SECRET: <use "openssl rand -hex 32" to generate fresh secret and place it inside ""> PORT: 8080 restart: always stop_grace_period: 1m
Starting and testing
Now that you have everything ready, it is time to start the container and test.
- While you are in the
nwc
directory (important), execute the following command and check the log output,docker compose up
- You should see container logs while it is starting, and it should not exit if everything went well.
- At this point, you should be able to go to
http://<ip of the host where nwc is running>:4321
and get to the interface of NWC - To stop the test run of NWC, simply press
Ctrl-C
, and it will shut the container down. - To start NWC permanently, you should execute
docker compose up -d
, “-d” tells Docker to detach from the session. - To check currently running NWC logs, execute
docker compose logs
to run it in tail mode add-f
to the end. - To stop the container, execute
docker compose down
That's all, just follow the instructions in the web interface to get started.
Updating
As with any software, you should expect fixes and updates that you would need to perform periodically. You could automate this, but it falls outside of the scope of this tutorial. Since we already have all of the necessary configuration in place, the update execution is fairly simple.
- Change directory to the clone of the git repository,
cd /home/bitcoin/nwc/nostr-wallet-connect
- Run command to build Docker image:
docker build -t nwc:$(date +'%Y%m%d%H%M') -t nwc:latest .
(there is a dot at the end) - Change directory back one level
cd ..
- Restart (stop and start) the docker compose config
docker compose down && docker compose up -d
- Done! Optionally you may want to check the logs:
docker compose logs
-
@ 82341f88:fbfbe6a2
2023-04-11 19:36:53There’s a lot of conversation around the #TwitterFiles. Here’s my take, and thoughts on how to fix the issues identified.
I’ll start with the principles I’ve come to believe…based on everything I’ve learned and experienced through my past actions as a Twitter co-founder and lead:
- Social media must be resilient to corporate and government control.
- Only the original author may remove content they produce.
- Moderation is best implemented by algorithmic choice.
The Twitter when I led it and the Twitter of today do not meet any of these principles. This is my fault alone, as I completely gave up pushing for them when an activist entered our stock in 2020. I no longer had hope of achieving any of it as a public company with no defense mechanisms (lack of dual-class shares being a key one). I planned my exit at that moment knowing I was no longer right for the company.
The biggest mistake I made was continuing to invest in building tools for us to manage the public conversation, versus building tools for the people using Twitter to easily manage it for themselves. This burdened the company with too much power, and opened us to significant outside pressure (such as advertising budgets). I generally think companies have become far too powerful, and that became completely clear to me with our suspension of Trump’s account. As I’ve said before, we did the right thing for the public company business at the time, but the wrong thing for the internet and society. Much more about this here: https://twitter.com/jack/status/1349510769268850690
I continue to believe there was no ill intent or hidden agendas, and everyone acted according to the best information we had at the time. Of course mistakes were made. But if we had focused more on tools for the people using the service rather than tools for us, and moved much faster towards absolute transparency, we probably wouldn’t be in this situation of needing a fresh reset (which I am supportive of). Again, I own all of this and our actions, and all I can do is work to make it right.
Back to the principles. Of course governments want to shape and control the public conversation, and will use every method at their disposal to do so, including the media. And the power a corporation wields to do the same is only growing. It’s critical that the people have tools to resist this, and that those tools are ultimately owned by the people. Allowing a government or a few corporations to own the public conversation is a path towards centralized control.
I’m a strong believer that any content produced by someone for the internet should be permanent until the original author chooses to delete it. It should be always available and addressable. Content takedowns and suspensions should not be possible. Doing so complicates important context, learning, and enforcement of illegal activity. There are significant issues with this stance of course, but starting with this principle will allow for far better solutions than we have today. The internet is trending towards a world were storage is “free” and infinite, which places all the actual value on how to discover and see content.
Which brings me to the last principle: moderation. I don’t believe a centralized system can do content moderation globally. It can only be done through ranking and relevance algorithms, the more localized the better. But instead of a company or government building and controlling these solely, people should be able to build and choose from algorithms that best match their criteria, or not have to use any at all. A “follow” action should always deliver every bit of content from the corresponding account, and the algorithms should be able to comb through everything else through a relevance lens that an individual determines. There’s a default “G-rated” algorithm, and then there’s everything else one can imagine.
The only way I know of to truly live up to these 3 principles is a free and open protocol for social media, that is not owned by a single company or group of companies, and is resilient to corporate and government influence. The problem today is that we have companies who own both the protocol and discovery of content. Which ultimately puts one person in charge of what’s available and seen, or not. This is by definition a single point of failure, no matter how great the person, and over time will fracture the public conversation, and may lead to more control by governments and corporations around the world.
I believe many companies can build a phenomenal business off an open protocol. For proof, look at both the web and email. The biggest problem with these models however is that the discovery mechanisms are far too proprietary and fixed instead of open or extendable. Companies can build many profitable services that complement rather than lock down how we access this massive collection of conversation. There is no need to own or host it themselves.
Many of you won’t trust this solution just because it’s me stating it. I get it, but that’s exactly the point. Trusting any one individual with this comes with compromises, not to mention being way too heavy a burden for the individual. It has to be something akin to what bitcoin has shown to be possible. If you want proof of this, get out of the US and European bubble of the bitcoin price fluctuations and learn how real people are using it for censorship resistance in Africa and Central/South America.
I do still wish for Twitter, and every company, to become uncomfortably transparent in all their actions, and I wish I forced more of that years ago. I do believe absolute transparency builds trust. As for the files, I wish they were released Wikileaks-style, with many more eyes and interpretations to consider. And along with that, commitments of transparency for present and future actions. I’m hopeful all of this will happen. There’s nothing to hide…only a lot to learn from. The current attacks on my former colleagues could be dangerous and doesn’t solve anything. If you want to blame, direct it at me and my actions, or lack thereof.
As far as the free and open social media protocol goes, there are many competing projects: @bluesky is one with the AT Protocol, nostr another, Mastodon yet another, Matrix yet another…and there will be many more. One will have a chance at becoming a standard like HTTP or SMTP. This isn’t about a “decentralized Twitter.” This is a focused and urgent push for a foundational core technology standard to make social media a native part of the internet. I believe this is critical both to Twitter’s future, and the public conversation’s ability to truly serve the people, which helps hold governments and corporations accountable. And hopefully makes it all a lot more fun and informative again.
💸🛠️🌐 To accelerate open internet and protocol work, I’m going to open a new category of #startsmall grants: “open internet development.” It will start with a focus of giving cash and equity grants to engineering teams working on social media and private communication protocols, bitcoin, and a web-only mobile OS. I’ll make some grants next week, starting with $1mm/yr to Signal. Please let me know other great candidates for this money.
-
@ 3bf0c63f:aefa459d
2024-01-15 11:15:06Pequenos problemas que o Estado cria para a sociedade e que não são sempre lembrados
- **vale-transporte**: transferir o custo com o transporte do funcionário para um terceiro o estimula a morar longe de onde trabalha, já que morar perto é normalmente mais caro e a economia com transporte é inexistente. - **atestado médico**: o direito a faltar o trabalho com atestado médico cria a exigência desse atestado para todas as situações, substituindo o livre acordo entre patrão e empregado e sobrecarregando os médicos e postos de saúde com visitas desnecessárias de assalariados resfriados. - **prisões**: com dinheiro mal-administrado, burocracia e péssima alocação de recursos -- problemas que empresas privadas em competição (ou mesmo sem qualquer competição) saberiam resolver muito melhor -- o Estado fica sem presídios, com os poucos existentes entupidos, muito acima de sua alocação máxima, e com isto, segundo a bizarra corrente de responsabilidades que culpa o juiz que condenou o criminoso por sua morte na cadeia, juízes deixam de condenar à prisão os bandidos, soltando-os na rua. - **justiça**: entrar com processos é grátis e isto faz proliferar a atividade dos advogados que se dedicam a criar problemas judiciais onde não seria necessário e a entupir os tribunais, impedindo-os de fazer o que mais deveriam fazer. - **justiça**: como a justiça só obedece às leis e ignora acordos pessoais, escritos ou não, as pessoas não fazem acordos, recorrem sempre à justiça estatal, e entopem-na de assuntos que seriam muito melhor resolvidos entre vizinhos. - **leis civis**: as leis criadas pelos parlamentares ignoram os costumes da sociedade e são um incentivo a que as pessoas não respeitem nem criem normas sociais -- que seriam maneiras mais rápidas, baratas e satisfatórias de resolver problemas. - **leis de trãnsito**: quanto mais leis de trânsito, mais serviço de fiscalização são delegados aos policiais, que deixam de combater crimes por isto (afinal de contas, eles não querem de fato arriscar suas vidas combatendo o crime, a fiscalização é uma excelente desculpa para se esquivarem a esta responsabilidade). - **financiamento educacional**: é uma espécie de subsídio às faculdades privadas que faz com que se criem cursos e mais cursos que são cada vez menos recheados de algum conhecimento ou técnica útil e cada vez mais inúteis. - **leis de tombamento**: são um incentivo a que o dono de qualquer área ou construção "histórica" destrua todo e qualquer vestígio de história que houver nele antes que as autoridades descubram, o que poderia não acontecer se ele pudesse, por exemplo, usar, mostrar e se beneficiar da história daquele local sem correr o risco de perder, de fato, a sua propriedade. - **zoneamento urbano**: torna as cidades mais espalhadas, criando uma necessidade gigantesca de carros, ônibus e outros meios de transporte para as pessoas se locomoverem das zonas de moradia para as zonas de trabalho. - **zoneamento urbano**: faz com que as pessoas percam horas no trânsito todos os dias, o que é, além de um desperdício, um atentado contra a sua saúde, que estaria muito melhor servida numa caminhada diária entre a casa e o trabalho. - **zoneamento urbano**: torna ruas e as casas menos seguras criando zonas enormes, tanto de residências quanto de indústrias, onde não há movimento de gente alguma. - **escola obrigatória + currículo escolar nacional**: emburrece todas as crianças. - **leis contra trabalho infantil**: tira das crianças a oportunidade de aprender ofícios úteis e levar um dinheiro para ajudar a família. - **licitações**: como não existem os critérios do mercado para decidir qual é o melhor prestador de serviço, criam-se comissões de pessoas que vão decidir coisas. isto incentiva os prestadores de serviço que estão concorrendo na licitação a tentar comprar os membros dessas comissões. isto, fora a corrupção, gera problemas reais: __(i)__ a escolha dos serviços acaba sendo a pior possível, já que a empresa prestadora que vence está claramente mais dedicada a comprar comissões do que a fazer um bom trabalho (este problema afeta tantas áreas, desde a construção de estradas até a qualidade da merenda escolar, que é impossível listar aqui); __(ii)__ o processo corruptor acaba, no longo prazo, eliminando as empresas que prestavam e deixando para competir apenas as corruptas, e a qualidade tende a piorar progressivamente. - **cartéis**: o Estado em geral cria e depois fica refém de vários grupos de interesse. o caso dos taxistas contra o Uber é o que está na moda hoje (e o que mostra como os Estados se comportam da mesma forma no mundo todo). - **multas**: quando algum indivíduo ou empresa comete uma fraude financeira, ou causa algum dano material involuntário, as vítimas do caso são as pessoas que sofreram o dano ou perderam dinheiro, mas o Estado tem sempre leis que prevêem multas para os responsáveis. A justiça estatal é sempre muito rígida e rápida na aplicação dessas multas, mas relapsa e vaga no que diz respeito à indenização das vítimas. O que em geral acontece é que o Estado aplica uma enorme multa ao responsável pelo mal, retirando deste os recursos que dispunha para indenizar as vítimas, e se retira do caso, deixando estas desamparadas. - **desapropriação**: o Estado pode pegar qualquer propriedade de qualquer pessoa mediante uma indenização que é necessariamente inferior ao valor da propriedade para o seu presente dono (caso contrário ele a teria vendido voluntariamente). - **seguro-desemprego**: se há, por exemplo, um prazo mínimo de 1 ano para o sujeito ter direito a receber seguro-desemprego, isto o incentiva a planejar ficar apenas 1 ano em cada emprego (ano este que será sucedido por um período de desemprego remunerado), matando todas as possibilidades de aprendizado ou aquisição de experiência naquela empresa específica ou ascensão hierárquica. - **previdência**: a previdência social tem todos os defeitos de cálculo do mundo, e não importa muito ela ser uma forma horrível de poupar dinheiro, porque ela tem garantias bizarras de longevidade fornecidas pelo Estado, além de ser compulsória. Isso serve para criar no imaginário geral a idéia da __aposentadoria__, uma época mágica em que todos os dias serão finais de semana. A idéia da aposentadoria influencia o sujeito a não se preocupar em ter um emprego que faça sentido, mas sim em ter um trabalho qualquer, que o permita se aposentar. - **regulamentação impossível**: milhares de coisas são proibidas, há regulamentações sobre os aspectos mais mínimos de cada empreendimento ou construção ou espaço. se todas essas regulamentações fossem exigidas não haveria condições de produção e todos morreriam. portanto, elas não são exigidas. porém, o Estado, ou um agente individual imbuído do poder estatal pode, se desejar, exigi-las todas de um cidadão inimigo seu. qualquer pessoa pode viver a vida inteira sem cumprir nem 10% das regulamentações estatais, mas viverá também todo esse tempo com medo de se tornar um alvo de sua exigência, num estado de terror psicológico. - **perversão de critérios**: para muitas coisas sobre as quais a sociedade normalmente chegaria a um valor ou comportamento "razoável" espontaneamente, o Estado dita regras. estas regras muitas vezes não são obrigatórias, são mais "sugestões" ou limites, como o salário mínimo, ou as 44 horas semanais de trabalho. a sociedade, porém, passa a usar esses valores como se fossem o normal. são raras, por exemplo, as ofertas de emprego que fogem à regra das 44h semanais. - **inflação**: subir os preços é difícil e constrangedor para as empresas, pedir aumento de salário é difícil e constrangedor para o funcionário. a inflação força as pessoas a fazer isso, mas o aumento não é automático, como alguns economistas podem pensar (enquanto alguns outros ficam muito satisfeitos de que esse processo seja demorado e difícil). - **inflação**: a inflação destrói a capacidade das pessoas de julgar preços entre concorrentes usando a própria memória. - **inflação**: a inflação destrói os cálculos de lucro/prejuízo das empresas e prejudica enormemente as decisões empresariais que seriam baseadas neles. - **inflação**: a inflação redistribui a riqueza dos mais pobres e mais afastados do sistema financeiro para os mais ricos, os bancos e as megaempresas. - **inflação**: a inflação estimula o endividamento e o consumismo. - **lixo:** ao prover coleta e armazenamento de lixo "grátis para todos" o Estado incentiva a criação de lixo. se tivessem que pagar para que recolhessem o seu lixo, as pessoas (e conseqüentemente as empresas) se empenhariam mais em produzir coisas usando menos plástico, menos embalagens, menos sacolas. - **leis contra crimes financeiros:** ao criar legislação para dificultar acesso ao sistema financeiro por parte de criminosos a dificuldade e os custos para acesso a esse mesmo sistema pelas pessoas de bem cresce absurdamente, levando a um percentual enorme de gente incapaz de usá-lo, para detrimento de todos -- e no final das contas os grandes criminosos ainda conseguem burlar tudo.
-
@ 3bf0c63f:aefa459d
2024-01-14 13:55:28Músicas grudentas e conversas
Uma vez que você ouviu uma música grudenta e ela volta, inteira, com toda a melodia e a harmonia, muitos dias depois, contra a sua vontade. Mas uma conversa é impossível de lembrar. Por quê?
-
@ 3bf0c63f:aefa459d
2024-01-14 13:55:28Bluesky is a scam
Bluesky advertises itself as an open network, they say people won't lose followers or their identity, they advertise themselves as a protocol ("atproto") and because of that they are tricking a lot of people into using them. These three claims are false.
protocolness
Bluesky is a company. "atproto" is the protocol. Supposedly they are two different things, right? Bluesky just releases software that implements the protocol, but others can also do that, it's open!
And yet, the protocol has an official webpage with a waitlist and a private beta? Why is the protocol advertised as a company product? Because it is. The "protocol" is just a description of whatever the Bluesky app and servers do, it can and does change anytime the Bluesky developers decide they want to change it, and it will keep changing for as long as Bluesky apps and servers control the biggest part of the network.
Oh, so there is the possibility of other players stepping in and then it becomes an actual interoperable open protocol? Yes, but what is the likelihood of that happening? It is very low. No serious competitor is likely to step in and build serious apps using a protocol that is directly controlled by Bluesky. All we will ever see are small "community" apps made by users and small satellite small businesses -- not unlike the people and companies that write plugins, addons and alternative clients for popular third-party centralized platforms.
And last, even if it happens that someone makes an app so good that it displaces the canonical official Bluesky app, then that company may overtake the protocol itself -- not because they're evil, but because there is no way it cannot be like this.
identity
According to their own documentation, the Bluesky people were looking for an identity system that provided global ids, key rotation and human-readable names.
They must have realized that such properties are not possible in an open and decentralized system, but instead of accepting a tradeoff they decided they wanted all their desired features and threw away the "decentralized" part, quite literally and explicitly (although they make sure to hide that piece in the middle of a bunch of code and text that very few will read).
The "DID Placeholder" method they decided to use for their global identities is nothing more than a normal old boring trusted server controlled by Bluesky that keeps track of who is who and can, at all times, decide to ban a person and deprive them from their identity (they dismissively call a "denial of service attack").
They decided to adopt this method as a placeholder until someone else doesn't invent the impossible alternative that would provide all their desired properties in a decentralized manner -- which is nothing more than a very good excuse: "yes, it's not great now, but it will improve!".
openness
Months after launching their product with an aura of decentralization and openness and getting a bunch of people inside that believed, falsely, they were joining an actually open network, Bluesky has decided to publish a part of their idea of how other people will be able to join their open network.
When I first saw their app and how they were very prominently things like follower counts, like counts and other things that are typical of centralized networks and can't be reliable or exact on truly open networks (like Nostr), I asked myself how were they going to do that once they became and open "federated" network as they were expected to be.
Turns out their decentralization plan is to just allow you, as a writer, to host your own posts on "personal data stores", but not really have any control over the distribution of the posts. All posts go through the Bluesky central server, called BGS, and they decide what to do with it. And you, as a reader, doesn't have any control of what you're reading from either, all you can do is connect to the BGS and ask for posts. If the BGS decides to ban, shadow ban, reorder, miscount, hide, deprioritize, trick or maybe even to serve ads, then you are out of luck.
Oh, but anyone can run their own BGS!, they will say. Even in their own blog post announcing the architecture they assert that "it’s a fairly resource-demanding service" and "there may be a few large full-network providers". But I fail to see why even more than one network provider will exist, if Bluesky is already doing that job, and considering the fact there are very little incentives for anyone to switch providers -- because the app does not seem to be at all made to talk to multiple providers, one would have to stop using the reliable, fast and beefy official BGS and start using some half-baked alternative and risk losing access to things.
When asked about the possibility of switching, one of Bluesky overlords said: "it would look something like this: bluesky has gone evil. there's a new alternative called freesky that people are rushing to. I'm switching to freesky".
The quote is very naïve and sounds like something that could be said about Twitter itself: "if Twitter is evil you can just run your own social network". Both are fallacies because they ignore the network-effect and the fact that people will never fully agree that something is "evil". In fact these two are the fundamental reasons why -- for social networks specifically (and not for other things like commerce) -- we need truly open protocols with no owners and no committees.
-
@ 3bf0c63f:aefa459d
2024-01-14 13:55:28Jofer
Jofer era um jogador diferente. À primeira vista não, parecia igual, um volante combativo, perseguia os atacantes adversários implacavelmente, um bom jogador. Mas não era essa a característica que diferenciava Jofer. Jofer era, digamos, um chutador.
Começou numa semifinal de um torneio de juniores. O time de Jofer precisava do empate e estava sofrendo uma baita pressão do adversário, mas o jogo estava 1 a 1 e parecia que ia ficar assim mesmo, daquele jeito futebolístico que parece, parece mesmo. Só que aos 46 do segundo tempo tomaram um gol espírita, Ruizinho do outro time saiu correndo pela esquerda e, mesmo sendo canhoto, foi cortando para o meio, os zagueiros meio que achando que já tinha acabado mesmo, devia ter só mais aquele lance, o árbitro tinha dado dois minutos, Ruizinho chutou, marcou e o goleiro, que só pulou depois que já tinha visto que não ia ter jeito, ficou xingando.
A bola saiu do meio e tocaram para Jofer, ninguém nem veio marcá-lo, o outro time já estava comemorando, e com razão, o juiz estava de sacanagem em fazer o jogo continuar, já estava tudo acabado mesmo. Mas não, estava certo, mais um minuto de acréscimo, justo. Em um minuto dá pra fazer um gol. Mas como? Jofer pensou nas partidas da NBA em que com alguns centésimos de segundo faltando o armador jogava de qualquer jeito para a cesta e às vezes acertava. De trás do meio de campo, será? Não vou ter nem força pra fazer chegar no gol. Vou virar piada, melhor tocar pro Fumaça ali do lado e a gente perde sem essa humilhação no final. Mas, poxa, e daí? Vou tentar mesmo assim, qualquer coisa eu falo que foi um lançamento e daqui a uns dias todo mundo esquece. Olhou para o próprio pé, virou ele de ladinho, pra fora e depois pra dentro (bom, se eu pegar daqui, direitinho, quem sabe?), jogou a bola pro lado e bateu. A bola subiu escandalosamente, muito alta mesmo, deve ter subido uns 200 metros. Jofer não tinha como ter a menor noção. Depois foi descendo, o goleirão voltando correndo para debaixo da trave e olhando pra bola, foi chegando e pulando já só pra acompanhar, para ver, dependurado no travessão, a bola sair ainda bem alta, ela bateu na rede lateral interna antes de bater no chão, quicar violentamente e estufar a rede no alto do lado direito de quem olhava.
Mas isso tudo foi sonho do Jofer. Sonhou acordado, numa noite em que demorou pra dormir, deitado na sua cama. Ficou pensando se não seria fácil, se ele treinasse bastante, acertar o gol bem de longe, tipo no sonho, e se não dava pra fazer gol assim. No dia seguinte perguntou a Brunildinho, o treinador de goleiros. Era difícil defender essas bolas, ainda mais se elas subissem muito, o goleiro ficava sem perspectiva, o vento alterava a trajetória a cada instante, tinha efeito, ela cairia rápido, mas claro que não valia à pena treinar isso, a chance de acertar o gol era minúscula. Mas Jofer só ia tentar depois que treinasse bastante e comprovasse o que na sua imaginação parecia uma excelente idéia.
Começou a treinar todos os dias. Primeiro escondido, por vergonha dos colegas, chegava um pouco antes e ficava lá, chutando do círculo central. Ao menor sinal de gente se aproximando, parava e ia catar as bolas. Depois, quando começou a acertar, perdeu a vergonha. O pessoal do clube todo achava engraçado quando via Jofer treinando e depois ouvia a explicação da boca de alguém, ninguém levava muito a sério, mas também não achava de todo ridículo. O pessoal ria, mas no fundo torcia praquilo dar certo, mesmo.
Aconteceu que num jogo que não valia muita coisa, empatezinho feio, aos 40 do segundo tempo, a marcação dos adversários já não estava mais pressionando, todo mundo contente com o empate e com vontade de parar de jogar já, o Henrique, meia-esquerdo, humilde, mas ainda assim um pouco intimidante para Jofer (jogava demais), tocou pra ele. Vai lá, tenta sua loucura aí. Assumiu a responsabilidade do nosso volante introspectivo. Seria mais verossímil se Jofer tivesse errado, primeira vez que tentou, restava muito tempo ainda pra ele ter a chance de ser herói, ninguém acerta de primeira, mas ele acertou. Quase como no sonho, Lucas, o goleiro, não esperava, depois que viu o lance, riu-se, adiantou-se para pegar a bola que ele julgava que quicaria na área, mas ela foi mais pra frente, mais e mais, daí Lucas já estava correndo, só que começou a pensar que ela ia pra fora, e ele ia só se dependurar no travessão e fazer seu papel de estar na bola. Acabou que por conta daquele gol eles terminaram em segundo no grupo daquele torneiozinho, ao invés de terceiro, e não fez diferença nenhuma.
-
@ 3bf0c63f:aefa459d
2024-01-14 13:55:28O caso da Grêmio TV
enquanto vinha se conduzindo pela plataforma superior daquela arena que se pensava totalmente preenchida por adeptos da famosa equipe do Grêmio de Porto Alegre, viu-se, como por obra de algum nigromante - dos muitos que existem e estão a todo momento a fazer más obras e a colocar-se no caminhos dos que procuram, se não fazer o bem acima de todas as coisas, a pelo menos não fazer o mal no curso da realização dos seus interesses -, o discretíssimo jornalista a ser xingado e moído em palavras por uma horda de malandrinos a cinco ou seis passos dele surgida que cantavam e moviam seus braços em movimentos que não se pode classificar senão como bárbaros, e assim cantavam:
Grêmio TV pior que o SBT !
-
@ 6389be64:ef439d32
2025-01-14 01:31:12Bitcoin is more than money, more than an asset, and more than a store of value. Bitcoin is a Prime Mover, an enabler and it ignites imaginations. It certainly fueled an idea in my mind. The idea integrates sensors, computational prowess, actuated machinery, power conversion, and electronic communications to form an autonomous, machined creature roaming forests and harvesting the most widespread and least energy-dense fuel source available. I call it the Forest Walker and it eats wood, and mines Bitcoin.
I know what you're thinking. Why not just put Bitcoin mining rigs where they belong: in a hosted facility sporting electricity from energy-dense fuels like natural gas, climate-controlled with excellent data piping in and out? Why go to all the trouble building a robot that digests wood creating flammable gasses fueling an engine to run a generator powering Bitcoin miners? It's all about synergy.
Bitcoin mining enables the realization of multiple, seemingly unrelated, yet useful activities. Activities considered un-profitable if not for Bitcoin as the Prime Mover. This is much more than simply mining the greatest asset ever conceived by humankind. It’s about the power of synergy, which Bitcoin plays only one of many roles. The synergy created by this system can stabilize forests' fire ecology while generating multiple income streams. That’s the realistic goal here and requires a brief history of American Forest management before continuing.
Smokey The Bear
In 1944, the Smokey Bear Wildfire Prevention Campaign began in the United States. “Only YOU can prevent forest fires” remains the refrain of the Ad Council’s longest running campaign. The Ad Council is a U.S. non-profit set up by the American Association of Advertising Agencies and the Association of National Advertisers in 1942. It would seem that the U.S. Department of the Interior was concerned about pesky forest fires and wanted them to stop. So, alongside a national policy of extreme fire suppression they enlisted the entire U.S. population to get onboard via the Ad Council and it worked. Forest fires were almost obliterated and everyone was happy, right? Wrong.
Smokey is a fantastically successful bear so forest fires became so few for so long that the fuel load - dead wood - in forests has become very heavy. So heavy that when a fire happens (and they always happen) it destroys everything in its path because the more fuel there is the hotter that fire becomes. Trees, bushes, shrubs, and all other plant life cannot escape destruction (not to mention homes and businesses). The soil microbiology doesn’t escape either as it is burned away even in deeper soils. To add insult to injury, hydrophobic waxy residues condense on the soil surface, forcing water to travel over the ground rather than through it eroding forest soils. Good job, Smokey. Well done, Sir!
Most terrestrial ecologies are “fire ecologies”. Fire is a part of these systems’ fuel load and pest management. Before we pretended to “manage” millions of acres of forest, fires raged over the world, rarely damaging forests. The fuel load was always too light to generate fires hot enough to moonscape mountainsides. Fires simply burned off the minor amounts of fuel accumulated since the fire before. The lighter heat, smoke, and other combustion gasses suppressed pests, keeping them in check and the smoke condensed into a plant growth accelerant called wood vinegar, not a waxy cap on the soil. These fires also cleared out weak undergrowth, cycled minerals, and thinned the forest canopy, allowing sunlight to penetrate to the forest floor. Without a fire’s heat, many pine tree species can’t sow their seed. The heat is required to open the cones (the seed bearing structure) of Spruce, Cypress, Sequoia, Jack Pine, Lodgepole Pine and many more. Without fire forests can’t have babies. The idea was to protect the forests, and it isn't working.
So, in a world of fire, what does an ally look like and what does it do?
Meet The Forest Walker
For the Forest Walker to work as a mobile, autonomous unit, a solid platform that can carry several hundred pounds is required. It so happens this chassis already exists but shelved.
Introducing the Legged Squad Support System (LS3). A joint project between Boston Dynamics, DARPA, and the United States Marine Corps, the quadrupedal robot is the size of a cow, can carry 400 pounds (180 kg) of equipment, negotiate challenging terrain, and operate for 24 hours before needing to refuel. Yes, it had an engine. Abandoned in 2015, the thing was too noisy for military deployment and maintenance "under fire" is never a high-quality idea. However, we can rebuild it to act as a platform for the Forest Walker; albeit with serious alterations. It would need to be bigger, probably. Carry more weight? Definitely. Maybe replace structural metal with carbon fiber and redesign much as 3D printable parts for more effective maintenance.
The original system has a top operational speed of 8 miles per hour. For our purposes, it only needs to move about as fast as a grazing ruminant. Without the hammering vibrations of galloping into battle, shocks of exploding mortars, and drunken soldiers playing "Wrangler of Steel Machines", time between failures should be much longer and the overall energy consumption much lower. The LS3 is a solid platform to build upon. Now it just needs to be pulled out of the mothballs, and completely refitted with outboard equipment.
The Small Branch Chipper
When I say “Forest fuel load” I mean the dead, carbon containing litter on the forest floor. Duff (leaves), fine-woody debris (small branches), and coarse woody debris (logs) are the fuel that feeds forest fires. Walk through any forest in the United States today and you will see quite a lot of these materials. Too much, as I have described. Some of these fuel loads can be 8 tons per acre in pine and hardwood forests and up to 16 tons per acre at active logging sites. That’s some big wood and the more that collects, the more combustible danger to the forest it represents. It also provides a technically unlimited fuel supply for the Forest Walker system.
The problem is that this detritus has to be chewed into pieces that are easily ingestible by the system for the gasification process (we’ll get to that step in a minute). What we need is a wood chipper attached to the chassis (the LS3); its “mouth”.
A small wood chipper handling material up to 2.5 - 3.0 inches (6.3 - 7.6 cm) in diameter would eliminate a substantial amount of fuel. There is no reason for Forest Walker to remove fallen trees. It wouldn’t have to in order to make a real difference. It need only identify appropriately sized branches and grab them. Once loaded into the chipper’s intake hopper for further processing, the beast can immediately look for more “food”. This is essentially kindling that would help ignite larger logs. If it’s all consumed by Forest Walker, then it’s not present to promote an aggravated conflagration.
I have glossed over an obvious question: How does Forest Walker see and identify branches and such? LiDaR (Light Detection and Ranging) attached to Forest Walker images the local area and feed those data to onboard computers for processing. Maybe AI plays a role. Maybe simple machine learning can do the trick. One thing is for certain: being able to identify a stick and cause robotic appendages to pick it up is not impossible.
Great! We now have a quadrupedal robot autonomously identifying and “eating” dead branches and other light, combustible materials. Whilst strolling through the forest, depleting future fires of combustibles, Forest Walker has already performed a major function of this system: making the forest safer. It's time to convert this low-density fuel into a high-density fuel Forest Walker can leverage. Enter the gasification process.
The Gassifier
The gasifier is the heart of the entire system; it’s where low-density fuel becomes the high-density fuel that powers the entire system. Biochar and wood vinegar are process wastes and I’ll discuss why both are powerful soil amendments in a moment, but first, what’s gasification?
Reacting shredded carbonaceous material at high temperatures in a low or no oxygen environment converts the biomass into biochar, wood vinegar, heat, and Synthesis Gas (Syngas). Syngas consists primarily of hydrogen, carbon monoxide, and methane. All of which are extremely useful fuels in a gaseous state. Part of this gas is used to heat the input biomass and keep the reaction temperature constant while the internal combustion engine that drives the generator to produce electrical power consumes the rest.
Critically, this gasification process is “continuous feed”. Forest Walker must intake biomass from the chipper, process it to fuel, and dump the waste (CO2, heat, biochar, and wood vinegar) continuously. It cannot stop. Everything about this system depends upon this continual grazing, digestion, and excretion of wastes just as a ruminal does. And, like a ruminant, all waste products enhance the local environment.
When I first heard of gasification, I didn’t believe that it was real. Running an electric generator from burning wood seemed more akin to “conspiracy fantasy” than science. Not only is gasification real, it’s ancient technology. A man named Dean Clayton first started experiments on gasification in 1699 and in 1901 gasification was used to power a vehicle. By the end of World War II, there were 500,000 Syngas powered vehicles in Germany alone because of fossil fuel rationing during the war. The global gasification market was $480 billion in 2022 and projected to be as much as $700 billion by 2030 (Vantage Market Research). Gasification technology is the best choice to power the Forest Walker because it’s self-contained and we want its waste products.
Biochar: The Waste
Biochar (AKA agricultural charcoal) is fairly simple: it’s almost pure, solid carbon that resembles charcoal. Its porous nature packs large surface areas into small, 3 dimensional nuggets. Devoid of most other chemistry, like hydrocarbons (methane) and ash (minerals), biochar is extremely lightweight. Do not confuse it with the charcoal you buy for your grill. Biochar doesn’t make good grilling charcoal because it would burn too rapidly as it does not contain the multitude of flammable components that charcoal does. Biochar has several other good use cases. Water filtration, water retention, nutrient retention, providing habitat for microscopic soil organisms, and carbon sequestration are the main ones that we are concerned with here.
Carbon has an amazing ability to adsorb (substances stick to and accumulate on the surface of an object) manifold chemistries. Water, nutrients, and pollutants tightly bind to carbon in this format. So, biochar makes a respectable filter and acts as a “battery” of water and nutrients in soils. Biochar adsorbs and holds on to seven times its weight in water. Soil containing biochar is more drought resilient than soil without it. Adsorbed nutrients, tightly sequestered alongside water, get released only as plants need them. Plants must excrete protons (H+) from their roots to disgorge water or positively charged nutrients from the biochar's surface; it's an active process.
Biochar’s surface area (where adsorption happens) can be 500 square meters per gram or more. That is 10% larger than an official NBA basketball court for every gram of biochar. Biochar’s abundant surface area builds protective habitats for soil microbes like fungi and bacteria and many are critical for the health and productivity of the soil itself.
The “carbon sequestration” component of biochar comes into play where “carbon credits” are concerned. There is a financial market for carbon. Not leveraging that market for revenue is foolish. I am climate agnostic. All I care about is that once solid carbon is inside the soil, it will stay there for thousands of years, imparting drought resiliency, fertility collection, nutrient buffering, and release for that time span. I simply want as much solid carbon in the soil because of the undeniably positive effects it has, regardless of any climactic considerations.
Wood Vinegar: More Waste
Another by-product of the gasification process is wood vinegar (Pyroligneous acid). If you have ever seen Liquid Smoke in the grocery store, then you have seen wood vinegar. Principally composed of acetic acid, acetone, and methanol wood vinegar also contains ~200 other organic compounds. It would seem intuitive that condensed, liquefied wood smoke would at least be bad for the health of all living things if not downright carcinogenic. The counter intuition wins the day, however. Wood vinegar has been used by humans for a very long time to promote digestion, bowel, and liver health; combat diarrhea and vomiting; calm peptic ulcers and regulate cholesterol levels; and a host of other benefits.
For centuries humans have annually burned off hundreds of thousands of square miles of pasture, grassland, forest, and every other conceivable terrestrial ecosystem. Why is this done? After every burn, one thing becomes obvious: the almost supernatural growth these ecosystems exhibit after the burn. How? Wood vinegar is a component of this growth. Even in open burns, smoke condenses and infiltrates the soil. That is when wood vinegar shows its quality.
This stuff beefs up not only general plant growth but seed germination as well and possesses many other qualities that are beneficial to plants. It’s a pesticide, fungicide, promotes beneficial soil microorganisms, enhances nutrient uptake, and imparts disease resistance. I am barely touching a long list of attributes here, but you want wood vinegar in your soil (alongside biochar because it adsorbs wood vinegar as well).
The Internal Combustion Engine
Conversion of grazed forage to chemical, then mechanical, and then electrical energy completes the cycle. The ICE (Internal Combustion Engine) converts the gaseous fuel output from the gasifier to mechanical energy, heat, water vapor, and CO2. It’s the mechanical energy of a rotating drive shaft that we want. That rotation drives the electric generator, which is the heartbeat we need to bring this monster to life. Luckily for us, combined internal combustion engine and generator packages are ubiquitous, delivering a defined energy output given a constant fuel input. It’s the simplest part of the system.
The obvious question here is whether the amount of syngas provided by the gasification process will provide enough energy to generate enough electrons to run the entire system or not. While I have no doubt the energy produced will run Forest Walker's main systems the question is really about the electrons left over. Will it be enough to run the Bitcoin mining aspect of the system? Everything is a budget.
CO2 Production For Growth
Plants are lollipops. No matter if it’s a tree or a bush or a shrubbery, the entire thing is mostly sugar in various formats but mostly long chain carbohydrates like lignin and cellulose. Plants need three things to make sugar: CO2, H2O and light. In a forest, where tree densities can be quite high, CO2 availability becomes a limiting growth factor. It’d be in the forest interests to have more available CO2 providing for various sugar formation providing the organism with food and structure.
An odd thing about tree leaves, the openings that allow gasses like the ever searched for CO2 are on the bottom of the leaf (these are called stomata). Not many stomata are topside. This suggests that trees and bushes have evolved to find gasses like CO2 from below, not above and this further suggests CO2 might be in higher concentrations nearer the soil.
The soil life (bacterial, fungi etc.) is constantly producing enormous amounts of CO2 and it would stay in the soil forever (eventually killing the very soil life that produces it) if not for tidal forces. Water is everywhere and whether in pools, lakes, oceans or distributed in “moist” soils water moves towards to the moon. The water in the soil and also in the water tables below the soil rise toward the surface every day. When the water rises, it expels the accumulated gasses in the soil into the atmosphere and it’s mostly CO2. It’s a good bet on how leaves developed high populations of stomata on the underside of leaves. As the water relaxes (the tide goes out) it sucks oxygenated air back into the soil to continue the functions of soil life respiration. The soil “breathes” albeit slowly.
The gasses produced by the Forest Walker’s internal combustion engine consist primarily of CO2 and H2O. Combusting sugars produce the same gasses that are needed to construct the sugars because the universe is funny like that. The Forest Walker is constantly laying down these critical construction elements right where the trees need them: close to the ground to be gobbled up by the trees.
The Branch Drones
During the last ice age, giant mammals populated North America - forests and otherwise. Mastodons, woolly mammoths, rhinos, short-faced bears, steppe bison, caribou, musk ox, giant beavers, camels, gigantic ground-dwelling sloths, glyptodons, and dire wolves were everywhere. Many were ten to fifteen feet tall. As they crashed through forests, they would effectively cleave off dead side-branches of trees, halting the spread of a ground-based fire migrating into the tree crown ("laddering") which is a death knell for a forest.
These animals are all extinct now and forests no longer have any manner of pruning services. But, if we build drones fitted with cutting implements like saws and loppers, optical cameras and AI trained to discern dead branches from living ones, these drones could effectively take over pruning services by identifying, cutting, and dropping to the forest floor, dead branches. The dropped branches simply get collected by the Forest Walker as part of its continual mission.
The drones dock on the back of the Forest Walker to recharge their batteries when low. The whole scene would look like a grazing cow with some flies bothering it. This activity breaks the link between a relatively cool ground based fire and the tree crowns and is a vital element in forest fire control.
The Bitcoin Miner
Mining is one of four monetary incentive models, making this system a possibility for development. The other three are US Dept. of the Interior, township, county, and electrical utility company easement contracts for fuel load management, global carbon credits trading, and data set sales. All the above depends on obvious questions getting answered. I will list some obvious ones, but this is not an engineering document and is not the place for spreadsheets. How much Bitcoin one Forest Walker can mine depends on everything else. What amount of biomass can we process? Will that biomass flow enough Syngas to keep the lights on? Can the chassis support enough mining ASICs and supporting infrastructure? What does that weigh and will it affect field performance? How much power can the AC generator produce?
Other questions that are more philosophical persist. Even if a single Forest Walker can only mine scant amounts of BTC per day, that pales to how much fuel material it can process into biochar. We are talking about millions upon millions of forested acres in need of fuel load management. What can a single Forest Walker do? I am not thinking in singular terms. The Forest Walker must operate as a fleet. What could 50 do? 500?
What is it worth providing a service to the world by managing forest fuel loads? Providing proof of work to the global monetary system? Seeding soil with drought and nutrient resilience by the excretion, over time, of carbon by the ton? What did the last forest fire cost?
The Mesh Network
What could be better than one bitcoin mining, carbon sequestering, forest fire squelching, soil amending behemoth? Thousands of them, but then they would need to be able to talk to each other to coordinate position, data handling, etc. Fitted with a mesh networking device, like goTenna or Meshtastic LoRa equipment enables each Forest Walker to communicate with each other.
Now we have an interconnected fleet of Forest Walkers relaying data to each other and more importantly, aggregating all of that to the last link in the chain for uplink. Well, at least Bitcoin mining data. Since block data is lightweight, transmission of these data via mesh networking in fairly close quartered environs is more than doable. So, how does data transmit to the Bitcoin Network? How do the Forest Walkers get the previous block data necessary to execute on mining?
Back To The Chain
Getting Bitcoin block data to and from the network is the last puzzle piece. The standing presumption here is that wherever a Forest Walker fleet is operating, it is NOT within cell tower range. We further presume that the nearest Walmart Wi-Fi is hours away. Enter the Blockstream Satellite or something like it.
A separate, ground-based drone will have two jobs: To stay as close to the nearest Forest Walker as it can and to provide an antennae for either terrestrial or orbital data uplink. Bitcoin-centric data is transmitted to the "uplink drone" via the mesh networked transmitters and then sent on to the uplink and the whole flow goes in the opposite direction as well; many to one and one to many.
We cannot transmit data to the Blockstream satellite, and it will be up to Blockstream and companies like it to provide uplink capabilities in the future and I don't doubt they will. Starlink you say? What’s stopping that company from filtering out block data? Nothing because it’s Starlink’s system and they could decide to censor these data. It seems we may have a problem sending and receiving Bitcoin data in back country environs.
But, then again, the utility of this system in staunching the fuel load that creates forest fires is extremely useful around forested communities and many have fiber, Wi-Fi and cell towers. These communities could be a welcoming ground zero for first deployments of the Forest Walker system by the home and business owners seeking fire repression. In the best way, Bitcoin subsidizes the safety of the communities.
Sensor Packages
LiDaR
The benefit of having a Forest Walker fleet strolling through the forest is the never ending opportunity for data gathering. A plethora of deployable sensors gathering hyper-accurate data on everything from temperature to topography is yet another revenue generator. Data is valuable and the Forest Walker could generate data sales to various government entities and private concerns.
LiDaR (Light Detection and Ranging) can map topography, perform biomass assessment, comparative soil erosion analysis, etc. It so happens that the Forest Walker’s ability to “see,” to navigate about its surroundings, is LiDaR driven and since it’s already being used, we can get double duty by harvesting that data for later use. By using a laser to send out light pulses and measuring the time it takes for the reflection of those pulses to return, very detailed data sets incrementally build up. Eventually, as enough data about a certain area becomes available, the data becomes useful and valuable.
Forestry concerns, both private and public, often use LiDaR to build 3D models of tree stands to assess the amount of harvest-able lumber in entire sections of forest. Consulting companies offering these services charge anywhere from several hundred to several thousand dollars per square kilometer for such services. A Forest Walker generating such assessments on the fly while performing its other functions is a multi-disciplinary approach to revenue generation.
pH, Soil Moisture, and Cation Exchange Sensing
The Forest Walker is quadrupedal, so there are four contact points to the soil. Why not get a pH data point for every step it takes? We can also gather soil moisture data and cation exchange capacities at unheard of densities because of sampling occurring on the fly during commission of the system’s other duties. No one is going to build a machine to do pH testing of vast tracts of forest soils, but that doesn’t make the data collected from such an endeavor valueless. Since the Forest Walker serves many functions at once, a multitude of data products can add to the return on investment component.
Weather Data
Temperature, humidity, pressure, and even data like evapotranspiration gathered at high densities on broad acre scales have untold value and because the sensors are lightweight and don’t require large power budgets, they come along for the ride at little cost. But, just like the old mantra, “gas, grass, or ass, nobody rides for free”, these sensors provide potential revenue benefits just by them being present.
I’ve touched on just a few data genres here. In fact, the question for universities, governmental bodies, and other institutions becomes, “How much will you pay us to attach your sensor payload to the Forest Walker?”
Noise Suppression
Only you can prevent Metallica filling the surrounds with 120 dB of sound. Easy enough, just turn the car stereo off. But what of a fleet of 50 Forest Walkers operating in the backcountry or near a township? 500? 5000? Each one has a wood chipper, an internal combustion engine, hydraulic pumps, actuators, and more cooling fans than you can shake a stick at. It’s a walking, screaming fire-breathing dragon operating continuously, day and night, twenty-four hours a day, three hundred sixty-five days a year. The sound will negatively affect all living things and that impacts behaviors. Serious engineering consideration and prowess must deliver a silencing blow to the major issue of noise.
It would be foolish to think that a fleet of Forest Walkers could be silent, but if not a major design consideration, then the entire idea is dead on arrival. Townships would not allow them to operate even if they solved the problem of widespread fuel load and neither would governmental entities, and rightly so. Nothing, not man nor beast, would want to be subjected to an eternal, infernal scream even if it were to end within days as the fleet moved further away after consuming what it could. Noise and heat are the only real pollutants of this system; taking noise seriously from the beginning is paramount.
Fire Safety
A “fire-breathing dragon” is not the worst description of the Forest Walker. It eats wood, combusts it at very high temperatures and excretes carbon; and it does so in an extremely flammable environment. Bad mix for one Forest Walker, worse for many. One must take extreme pains to ensure that during normal operation, a Forest Walker could fall over, walk through tinder dry brush, or get pounded into the ground by a meteorite from Krypton and it wouldn’t destroy epic swaths of trees and baby deer. I envision an ultimate test of a prototype to include dowsing it in grain alcohol while it’s wrapped up in toilet paper like a pledge at a fraternity party. If it runs for 72 hours and doesn’t set everything on fire, then maybe outside entities won’t be fearful of something that walks around forests with a constant fire in its belly.
The Wrap
How we think about what can be done with and adjacent to Bitcoin is at least as important as Bitcoin’s economic standing itself. For those who will tell me that this entire idea is without merit, I say, “OK, fine. You can come up with something, too.” What can we plug Bitcoin into that, like a battery, makes something that does not work, work? That’s the lesson I get from this entire exercise. No one was ever going to hire teams of humans to go out and "clean the forest". There's no money in that. The data collection and sales from such an endeavor might provide revenues over the break-even point but investment demands Alpha in this day and age. But, plug Bitcoin into an almost viable system and, voilà! We tip the scales to achieve lift-off.
Let’s face it, we haven’t scratched the surface of Bitcoin’s forcing function on our minds. Not because it’s Bitcoin, but because of what that invention means. The question that pushes me to approach things this way is, “what can we create that one system’s waste is another system’s feedstock?” The Forest Walker system’s only real waste is the conversion of low entropy energy (wood and syngas) into high entropy energy (heat and noise). All other output is beneficial to humanity.
Bitcoin, I believe, is the first product of a new mode of human imagination. An imagination newly forged over the past few millennia of being lied to, stolen from, distracted and otherwise mis-allocated to a black hole of the nonsensical. We are waking up.
What I have presented is not science fiction. Everything I have described here is well within the realm of possibility. The question is one of viability, at least in terms of the detritus of the old world we find ourselves departing from. This system would take a non-trivial amount of time and resources to develop. I think the system would garner extensive long-term contracts from those who have the most to lose from wildfires, the most to gain from hyperaccurate data sets, and, of course, securing the most precious asset in the world. Many may not see it that way, for they seek Alpha and are therefore blind to other possibilities. Others will see only the possibilities; of thinking in a new way, of looking at things differently, and dreaming of what comes next.
-
@ 7ed5bd1c:4caa7587
2025-01-14 00:47:17Bitcoin กับปริมาณที่จำกัด
ในโลกที่เงินเฟ้อและการพิมพ์เงินอย่างไม่มีที่สิ้นสุดเป็นเรื่องปกติ Bitcoin กลายเป็นทรัพย์สินที่แตกต่างและน่าสนใจด้วยคุณสมบัติที่เรียกว่า "ความหายาก" หรือ Scarcity ซึ่งมีบทบาทสำคัญในการสร้างมูลค่าและความน่าเชื่อถือของมันในระยะยาว
Hard Cap: ขีดจำกัดปริมาณ Bitcoin
Bitcoin มีจำนวนจำกัดอยู่ที่ 21 ล้านเหรียญเท่านั้น และนี่ไม่ใช่เรื่องบังเอิญ แต่เป็นหลักการที่ถูกวางไว้ตั้งแต่การออกแบบโดย Satoshi Nakamoto ผู้สร้าง Bitcoin การจำกัดปริมาณนี้ถูกเขียนลงในโค้ดของ Bitcoin และไม่มีใครสามารถเปลี่ยนแปลงได้
ทำไมความหายากจึงสำคัญ?
- ป้องกันเงินเฟ้อ: ในระบบการเงินแบบดั้งเดิม รัฐบาลและธนาคารกลางสามารถพิมพ์เงินเพิ่มได้อย่างไม่จำกัด ซึ่งนำไปสู่เงินเฟ้อและการเสื่อมค่าของเงิน แต่สำหรับ Bitcoin การจำกัดปริมาณทำให้ไม่เกิดเงินเฟ้อในระยะยาว
- สร้างมูลค่า: เช่นเดียวกับทองคำที่มีจำนวนจำกัด ความหายากทำให้ Bitcoin เป็นที่ต้องการในฐานะทรัพย์สินที่เก็บมูลค่า
- การกระจายและการใช้งาน: การมีจำนวนจำกัดกระตุ้นให้คนที่ถือ Bitcoin มองเห็นคุณค่าและใช้งานอย่างมีประสิทธิภาพ ไม่ใช่แค่เก็บสะสมไว้
ผลกระทบต่อมูลค่าในระยะยาว
- ความน่าเชื่อถือในฐานะทรัพย์สินที่เก็บมูลค่า: ด้วยจำนวนที่จำกัด Bitcoin มีโอกาสที่จะกลายเป็น "ทองคำดิจิทัล" ที่ประชาชนทั่วโลกใช้เพื่อปกป้องทรัพย์สินของพวกเขา
- แรงขับเคลื่อนของตลาด: ความต้องการ Bitcoin ที่เพิ่มขึ้นเมื่อเทียบกับจำนวนที่จำกัดทำให้มูลค่าของมันเพิ่มขึ้นในระยะยาว
- การเพิ่มมูลค่าผ่าน Halving: ทุก ๆ สี่ปี รางวัลสำหรับนักขุด Bitcoin จะลดลงครึ่งหนึ่ง (Halving) ซึ่งเป็นการลดอัตราการผลิต Bitcoin ใหม่ ทำให้ความหายากชัดเจนยิ่งขึ้น
บทเรียนจากความหายากของ Bitcoin
Bitcoin ไม่ได้เป็นเพียงคริปโตเคอร์เรนซีแรกในโลก แต่ยังเป็นทรัพย์สินที่สร้างความมั่นใจในมูลค่าให้กับผู้ใช้งานทั่วโลกด้วยคุณสมบัติของความหายาก คุณล่ะ เชื่อว่าความหายากของ Bitcoin จะส่งผลต่อมูลค่าในอนาคตหรือไม่? ร่วมแสดงความคิดเห็นด้านล่าง!
-
@ 3bf0c63f:aefa459d
2024-01-14 13:55:28Replacing the web with something saner
This is a simplification, but let's say that basically there are just 3 kinds of websites:
- Websites with content: text, images, videos;
- Websites that run full apps that do a ton of interactive stuff;
- Websites with some interactive content that uses JavaScript, or "mini-apps";
In a saner world we would have 3 different ways of serving and using these. 1 would be "the web" (and it was for a while, although I'm not claiming here that the past is always better and wanting to get back to the glorious old days).
1 would stay as "the web", just static sites, styled with CSS, no JavaScript whatsoever, but designers can still thrive and make they look pretty. Or it could also be something like Gemini. Maybe the two protocols could coexist.
2 would be downloadable native apps, much easier to write and maintain for developers (considering that multi-platform and cross-compilation is easy today and getting easier), faster, more polished experience for users, more powerful, integrates better with the computer.
(Remember that since no one would be striving to make the same app run both on browsers and natively no one would have any need for Electron or other inefficient bloated solutions, just pure native UI, like the Telegram app, have you seen that? It's fast.)
But 2 is mostly for apps that people use every day, something like Google Docs, email (although email is also broken technology), Netflix, Twitter, Trello and so on, and all those hundreds of niche SaaS that people pay monthly fees to use, each tailored to a different industry (although most of functions they all implement are the same everywhere). What do we do with dynamic open websites like StackOverflow, for example, where one needs to not only read, but also search and interact in multiple ways? What about that website that asks you a bunch of questions and then discovers the name of the person you're thinking about? What about that mini-app that calculates the hash of your provided content or shrinks your video, or that one that hosts your image without asking any questions?
All these and tons of others would fall into category 3, that of instantly loaded apps that you don't have to install, and yet they run in a sandbox.
The key for making category 3 worth investing time into is coming up with some solid grounds, simple enough that anyone can implement in multiple different ways, but not giving the app too much choices.
Telegram or Discord bots are super powerful platforms that can accomodate most kinds of app in them. They can't beat a native app specifically made with one purpose, but they allow anyone to provide instantly usable apps with very low overhead, and since the experience is so simple, intuitive and fast, users tend to like it and sometimes even pay for their services. There could exist a protocol that brings apps like that to the open world of (I won't say "web") domains and the websockets protocol -- with multiple different clients, each making their own decisions on how to display the content sent by the servers that are powering these apps.
Another idea is that of Alan Kay: to design a nice little OS/virtual machine that can load these apps and run them. Kinda like browsers are today, but providing a more well-thought, native-like experience and framework, but still sandboxed. And I add: abstracting away details about design, content disposition and so on.
These 3 kinds of programs could coexist peacefully. 2 are just standalone programs, they can do anything and each will be its own thing. 1 and 3, however, are still similar to browsers of today in the sense that you need clients to interact with servers and show to the user what they are asking. But by simplifying everything and separating the scopes properly these clients would be easy to write, efficient, small, the environment would be open and the internet would be saved.
See also
-
@ 3bf0c63f:aefa459d
2024-01-14 13:55:28IPFS problems: General confusion
Most IPFS open-source projects, libraries and apps (excluding Ethereum stuff) are things that rely heavily on dynamic data and temporary links. The most common projects you'll see when following the IPFS communities are chat rooms and similar things. I've seen dozens of these chat-rooms. There's also a famous IPFS-powered database. How can you do these things with content-addressing is a mistery. Of course they probably rely on IPNS or other external address system.
There's also a bunch of "file-sharing" on IPFS. The kind of thing people use for temporary making a file available for a third-party. There's image sharing on IPFS, pastebins on IPFS and so on. People don't seem to share the preoccupation with broken links here.
-
@ 3bf0c63f:aefa459d
2024-01-14 13:55:28Scala is such a great language
Scala is amazing. The type system has the perfect balance between flexibility and powerfulness.
match
statements are great. You can write imperative code that looks very nice and expressive (and I haven't tried writing purely functional things yet). Everything is easy to write and cheap and neovim integration works great.But Java is not great. And the fact that Scala is a JVM language doesn't help because over the years people have written stuff that depends on Java libraries -- and these Java libraries are not as safe as the Scala libraries, they contain reflection, slowness, runtime errors, all kinds of horrors.
Scala is also very tightly associated with Akka, the actor framework, and Akka is a giant collection of anti-patterns. Untyped stuff, reflection, dependency on JVM, basically a lot of javisms. I just arrived and I don't know anything about the Scala history or ecosystem or community, but I have the impression that Akka has prevent more adoption of Scala from decent people that aren't Java programmers.
But luckily there is a solution -- or two solutions: ScalaJS is a great thing that exists. It transpiles Scala code into JavaScript and it runs on NodeJS or in a browser!
Scala Native is a much better deal, though, it compiles to LLVM and then to binary code and you can have single binaries that run directly without a JVM -- not that the single JARs are that bad though, they are great and everybody has Java so I'll take that anytime over C libraries or NPM-distributed software, but direct executables even better. Scala Native just needs a little more love and some libraries and it will be the greatest thing in a couple of years.
-
@ 3bf0c63f:aefa459d
2024-01-14 13:55:28Que vença o melhor
Nos esportes e jogos em geral, existe uma constante preocupação em balancear os incentivos e atributos do jogo, as regras do esporte em si e as regras das competições para que o melhor vença, ou, em outras palavras, para que sejam minimizados os outros fatores exceto a habilidade mais pura quanto possível no jogo em questão.
O mundo fora dos jogos, porém, nem sempre pode ter suas regras mudadas por um ente que as controla e está imbuído da vontade e dos meios para escolher as melhores regras possíveis para a obtenção dos resultados acima. Aliás, é muitas vezes essa possibilidade é até impensável. Mesmo quando ela é pensável e levada em conta os fatores que operam no mundo real não são facilmente identificáveis, eles são muitos, e mudam o tempo todo.
Mais do que isso, ao contrário de um jogo em que o objetivo é praticamente o mesmo para todo mundo, os objetivos de cada agente no mundo real são diferentes e incontáveis, e as "competições" que cada um está disputando são diferentes e muitas, cada minúsculo ato de suas vidas compreendendo várias delas simultaneamente.
Da mesma forma, é impossível conceber até mesmo o conceito de "melhor" para que se deseje que ele vença.
Mesmo assim é comum encontrarmos em várias situações gente que parte do princípio de que se Fulano está num certo lugar (por exemplo, um emprego muito bom) e Beltrano não isso se deve ao fato de Fulano ter sido melhor que Beltrano.
Está aí uma crítica à idéia da meritocracia (eu tinha me esquecido que essa palavra existia).
-
@ 3bf0c63f:aefa459d
2024-01-14 13:55:28Token-Curated Registries
So you want to build a TCR?
TCRs (Token Curated Registries) are a construct for maintaining registries on Ethereum. Imagine you have lots of scissor brands and you want a list with only the good scissors. You want to make sure only the good scissors make into that list and not the bad scissors. For that, people will tell you, you can just create a TCR of the best scissors!
It works like this: some people have the token, let's call it Scissor Token. Some other person, let's say it's a scissor manufacturer, wants to put his scissor on the list, this guy must acquire some Scissor Tokens and "stake" it. Holders of the Scissor Tokens are allowed to vote on "yes" or "no". If "no", the manufactures loses his tokens to the holders, if "yes" then its tokens are kept in deposit, but his scissor brand gets accepted into the registry.
Such a simple process, they say, have strong incentives for being the best possible way of curating a registry of scissors: consumers have the incentive to consult the list because of its high quality; manufacturers have the incentive to buy tokens and apply to join the list because the list is so well-curated and consumers always consult it; token holders want the registry to accept good and reject bad scissors because that good decisions will make the list good for consumers and thus their tokens more valuable, bad decisions will do the contrary. It doesn't make sense, to reject everybody just to grab their tokens, because that would create an incentive against people trying to enter the list.
Amazing! How come such a simple system of voting has such enourmous features? Now we can have lists of everything so well-curated, and for that we just need Ethereum tokens!
Now let's imagine a different proposal, of my own creation: SPCR, Single-person curated registries.
Single-person Curated Registries are equal to TCR, except they don't use Ethereum tokens, it's just a list in a text file kept by a single person. People can apply to join, and they will have to give the single person some amount of money, the single person can reject or accept the proposal and so on.
Now let's look at the incentives of SPCR: people will want to consult the registry because it is so well curated; vendors will want to enter the registry because people are consulting it; the single person will want to accept the good and reject the bad applicants because these good decisions are what will make the list valuable.
Amazing! How such a single proposal has such enourmous features! SPCR are going to take over the internet!
What TCR enthusiasts get wrong?
TCR people think they can just list a set of incentives for something to work and assume that something will work. Mix that with Ethereum hype and they think theyve found something unique and revolutionary, while in fact they're just making a poor implementation of "democracy" systems that fail almost everywhere.
The life is not about listing a set of "incentives" and then considering the problems solved. Almost everybody on the Earth has the incentive for being rich: being rich has a lot of advantages over being poor, however not all people get rich! Why are the incentives failing?
Curating lists is a hard problem, it involves a lot of knowledge about the problem that just holding a token won't give you, it involves personal preferences, politics, it involves knowing where is the real limit between "good" and "bad". The Single Person list may have a good result if the single person doing the curation is knowledgeable and honest (yes, you can game the system to accept your uncle's scissors and not their competitor that is much better, for example, without losing the entire list reputation), same thing for TCRs, but it can also fail miserably, and it can appear to be good but be in fact not so good. In all cases, the list entries will reflect the preferences of people choosing and other things that aren't taken into the incentives equation of TCR enthusiasts.
We don't need lists
The most important point to be made, although unrelated to the incentive story, is that we don't need lists. Imagine you're looking for a scissor. You don't want someone to tell if scissor A or B are "good" or "bad", or if A is "better" than B. You want to know if, for your specific situation, or for a class of situations, A will serve well, and do that considering A's price and if A is being sold near you and all that.
Scissors are the worst example ever to make this point, but I hope you get it. If you don't, try imagining the same example with schools, doctors, plumbers, food, whatever.
Recommendation systems are badly needed in our world, and TCRs don't solve these at all.
-
@ 5579d5c0:db104ded
2025-01-14 00:36:44Weston A. Price was a Canadian dentist and researcher who, during the 1930s, studied traditional diets worldwide, and correctly linked nutrient-rich whole foods to optimal dental and overall health.
His book, Nutrition and Physical Degeneration, remains one of the most important books ever written on health and one of my favourites.
Pictured: Cover of Weston Prices book Nutrition and Physical Degeneration
His research on indigenous populations around the world revealed a simple truth: human beings thrive on sunlight, nature and nutrient-dense, whole foods.
When traditional lifestyles were replaced by artificial light environments (moving from the country to the city) and ultra-processed foods (refined flour, sugar, and industrial oils), physical degeneration followed.
Crooked teeth, chronic disease, and weakened immunity became common. Sound familiar?
What did Price get right about nutrition?
Price's work showed that thriving societies shared common dietary foundations:
- Animal-Based Nutrition: Every healthy population consumed some form of meat, fish, and nose-to-tail organ meats. These foods provided essential fat-soluble vitamins (A, D, E, K2), minerals, and bioavailable protein.
- Seafood: Coastal and island communities thrived on fish and shellfish, packed with DHA, iodine, and other critical nutrients for brain development and metabolic health.
- Nose-to-Tail Eating: Nothing was wasted. Bones, marrow, organs, and connective tissue were all consumed, providing collagen, glycine, and minerals vital for strong bones, joints, and teeth.
It didn't really matter what the rest of their diets were made up of, as long as they were whole foods, processed in the correct way.
Pictured: Left: Thriving on ancestral diets. Centre: Decline with modern diets. Right: The visible impact on children's health.
How Price's work breaks modern nutrition myths
Price’s findings dismantle many of today’s nutrition myths that we see on social media everyday.
- Oats are bad? Scottish islanders prepared them properly, without glyphosate.
- Fatty meat causes heart disease and cancer? The Inuit lived on it, free from disease.
- Fruit is harmful? Pacific Islanders consumed local and seasonal fruit and thrived.
- Unpasteurised milk will poison you? The Massai lived on it (and still do).
- Sourdough bread will cause diabetes? Swiss Villagers ate it regularly.
- Plants trying to kill you? The Kikuyu ate a 90% plant based diet but included meat.
I could go on and on here...
If this challenges your perspective, it might be worth reflecting on how closely personal identity can become tied to dietary choices.
Food is meant to nourish and be enjoyed, not followed like a rigid belief system.
*If a particular diet is working for you please continue with it.
The missing piece of the puzzle
While Price deeply understood the importance of ancestral diets, he overlooked one critical factor: sunlight and time outdoors.
All of the healthy populations he studied lived naturally, outside, grounded, and in sync with the sun.
This daily exposure to natural light regulated their circadian rhythms, increased vitamin D levels, and supported hormonal health.
The absence of artificial light at night further protected their health.
Today, some people eat well (most don't) but neglect this vital piece of the health puzzle.
Sunlight, outdoors, and grounding complete the foundation Price started.
Pictured: Incredible physiques and facial bone structure of Australian Aborigine eating their traditional diet and in sync with nature.
Health shouldn't be complicated
Modern nutrition and science has overcomplicated what we humans already knew for thousands of years.
Eat real food. Move outside. Embrace the sun. Limit artificial light.
Simple. Proven. Forgotten by fiat health.
- Chris
Ready to reclaim health the way nature intended? Let’s talk.
Book a free discovery call here: https://calendly.com/hello-chrispatrick
Further reading:
Cate Shanahan MD has an excellent book called 'Deep Nutrition' which explains in detail many of these concepts. https://drcate.com/deep-nutrition-why-your-genes-need-traditional-food/
-
@ b8851a06:9b120ba1
2025-01-13 23:12:14In a world where sovereignty is supposedly sacred, a startling truth emerges: The United States' attempt to purchase Greenland has exposed how territories and their populations can still be viewed as tradeable assets in the 21st century. This investigation reveals the true scope of what could be the most audacious territorial acquisition since the Alaska Purchase of 1867.
THE SOVEREIGNTY PARADOX
When Danish Prime Minister Frederiksen declared "Greenland is not for sale," she inadvertently highlighted a crucial irony: Denmark's authority to reject the sale implies ownership of a territory seeking self-determination. Prime Minister Egede's recent accusation of Danish genocide over the 1960s forced contraceptive program adds a chilling historical context to this modern power play.
THE REAL PRICE OF A NATION
The initial estimates of $12.5-77 billion, calculated by former New York Fed economist David Barker, barely scratch the surface. The true cost approaches $2 trillion when factoring in: - Infrastructure development: $1.5 trillion - Annual subsidies: $775 million - Resident compensation: $5.7-57 billion - Environmental protection costs: Billions annually
THE COLONIAL ECHO CHAMBER
HISTORICAL WOUNDS AND MODERN AMBITIONS Trump's refusal to rule out military force against a NATO ally marks an unprecedented threat in post-WW2 diplomacy. Meanwhile, Donald #Trump Jr.'s "private visits" to Greenland, coupled with Denmark's pointed refusal to meet him, reveals the intersection of personal business interests and national security policy.
THE RESOURCE SOVEREIGNTY EQUATION
Beneath Greenland's ice lies an estimated $1.1 trillion in mineral wealth, presenting an alluring economic incentive. However, this potential wealth raises fundamental questions about resource sovereignty:
DEVELOPMENT COSTS - 24 major development projects needed - $5 billion per project - 25-year implementation timeline - Current GDP: $3.236 billion
STRATEGIC RESOURCES - Rare earth elements crucial for technology - 31.9 billion barrels of oil equivalent - Vast hydroelectric potential - Green hydrogen production possibilities
THE ENVIRONMENTAL STAKES
Greenland's ice sheet contains enough water to raise global sea levels by 23 feet. Climate change is rapidly transforming resource accessibility, while environmental protection costs would run into billions annually. This environmental transformation creates both opportunities and responsibilities:
- Tourism sector potential: $450 million annually
- Climate change monitoring costs
- Environmental protection infrastructure
- Indigenous land management rights
THE GEOPOLITICAL CHESSBOARD
POWER DYNAMICS The acquisition would fundamentally alter Arctic power structures: - #NATO alliance relationships - Chinese economic interests - Arctic Council voting power - Maritime shipping routes
THE CHINESE SHADOW Denmark's 2017 intervention blocking Chinese acquisition of a former military base reveals Greenland's role in a larger geopolitical game. China's growing Arctic ambitions add urgency to American interests.
THE MONARCHICAL DIMENSION
King Frederik X's strategic modification of #Denmark 's royal coat of arms to emphasize Greenland ownership serves as a direct challenge to American ambitions, adding traditional power structures to modern sovereignty disputes.
PROBABILITY AND RESISTANCE
Current analysis suggests: - 60% chance of failure due to international opposition - 30% chance of diplomatic compromise - 10% chance of successful acquisition
THE INFLATION FACTOR
The purchase would trigger significant inflationary pressures through: - Massive fiscal expenditure in an already heated economy - Supply chain disruptions - Construction and development costs - Core PCE inflation impact - Federal Reserve policy complications
LEGAL AND FINANCIAL HURDLES
The acquisition faces numerous obstacles: - International maritime law complications - Indigenous rights considerations - Existing mining licenses - Danish sovereign debt obligations - NATO alliance implications
THE SOVEREIGNTY SOLUTION
The path forward likely lies not in purchase but in supporting Greenlandic self-determination. With only 56,000 residents, the per capita acquisition cost would be astronomical, but the human cost of ignoring sovereignty rights would be immeasurable.
CONCLUSION: THE PRICE OF FREEDOM
The true cost of purchasing Greenland extends beyond economics into the realm of human rights and dignity. As climate change transforms the Arctic landscape, the question isn't whether Greenland can be bought—it's whether territorial transactions should have any place in a world that claims to value self-determination.
The convergence of colonial history, indigenous rights, and geopolitical ambitions in Greenland serves as a mirror to our times. While major powers still think in terms of territorial acquisition, the people of Greenland remind us that sovereignty isn't for sale. Their struggle for self-determination, caught between American ambitions, Chinese influence, Danish sovereignty, and their own independence aspirations, may well define the future of Arctic politics and indigenous rights in the 21st century.
The most viable path appears to be enhanced economic partnership without formal territorial acquisition, possibly through a free association agreement following #Greenland 's potential independence. As the Arctic's strategic importance grows, this #nostr analysis becomes increasingly relevant for future policy considerations and global power dynamics.
-
@ 16d11430:61640947
2025-01-13 22:40:34By a Voice in the Ether
There is a specter haunting the world, not of socialism nor capitalism, but of Bitcoin. Across collapsing institutions, crumbling economies, and the craters of failed ideologies, one immutable force remains standing. The old order, built on fiat promises and fraudulent foundations, is coming undone. And yet, amidst the ashes, Bitcoin persists—not as a savior, but as a mirror, exposing the rot of the collapsing world.
The Fraud of the Present System
We have been told, since our first lessons in civics, to trust the institutions. Trust the central banks, trust the governments, trust the corporations. They assured us that the system was built for our benefit, and perhaps it was, at least for a time. But systems are not eternal; they decay. What begins as noble purpose is corrupted by greed, hubris, and power.
Fiat money—the paper promise of value—is the cornerstone of this crumbling architecture. It is a lie we have all agreed to believe, a house of cards masquerading as a cathedral. Its architects insist it is stable, but the foundation was rotten from the start. With each new crisis—be it financial, political, or social—the cracks grow wider. Governments print more money, banks gamble with our savings, and corporations devour themselves in pursuit of profits. Collapse is not an accident but an inevitability.
The Immutable Opponent
Enter Bitcoin: an invention as improbable as it is indestructible. It does not ask for trust, nor does it seek power. It exists as a silent ledger, a mathematical truth immune to the machinations of men. While fiat currencies inflate, Bitcoin deflates; while institutions crumble under their own weight, Bitcoin strengthens with each block mined.
Bitcoin is not a currency in the traditional sense. It is an idea—a revolutionary one—that money can exist outside the control of governments, corporations, and central banks. And this idea is an existential threat to the old world order. It cannot be bribed, blackmailed, or bombed. In a world of deceit, Bitcoin’s honesty is its weapon.
The Collapse of Control
Those in power, the self-appointed stewards of civilization, have long relied on control. They control the money supply, the narrative, and even the minds of the masses. But Bitcoin subverts this control. Its decentralized nature means there is no single point of failure, no lever for the powerful to pull. It is chaos to the tyrant, order to the individual.
The more the old system fights Bitcoin, the weaker it becomes. Banning it, regulating it, or demonizing it only underscores its power. For every fiat collapse—whether it be the hyperinflation of Venezuela or the quiet erosion of the dollar—Bitcoin gains another convert. The rulers of the old world cling desperately to their crumbling thrones, but they cannot un-invent the technology that undermines them.
The Psychology of Collapse
Collapse is not merely economic or political; it is psychological. The people, long conditioned to believe in the infallibility of their leaders, are awakening to the lie. They see their savings devalued, their freedoms eroded, their futures mortgaged. In this void of trust, Bitcoin offers not just a financial alternative but a psychological refuge. It is a declaration of independence, a refusal to participate in the farce.
But make no mistake: this is not a utopia. Bitcoin does not promise salvation, only sovereignty. It is as harsh and unyielding as the world it seeks to replace. In this way, it is not a solution but a challenge—a demand for responsibility in an age of abdication.
The Inevitable Reckoning
The collapse of everything against Bitcoin is not a failure of the technology or the people who use it; it is a failure of the old system to adapt. Fiat currencies, like all monopolies, rot under the weight of their own contradictions. Governments that print money into oblivion cannot compete with a currency that cannot be printed. Centralized institutions built on trust cannot outlast a network that requires none.
The collapse, then, is not a tragedy but a necessity. It is the clearing of the dead wood, the end of a long and unsustainable lie. What rises in its place remains to be seen. But one thing is certain: Bitcoin will not collapse, for it was never built to stand on the same shifting sands. It is the bedrock beneath the ruins, the immutable foundation on which the future may yet be built.
And so, as the world collapses, let us not mourn the old order, for it was never meant to last. Instead, let us look to the strange and immutable invention that has outlasted its detractors, the silent force that asks no permission and grants no quarter. Bitcoin endures, not because it is perfect, but because it is incorruptible. In a world of collapse, that is enough.
-
@ 3bf0c63f:aefa459d
2024-01-14 13:55:28Precautionary Principle
The precautionary principle that people, including Nassim Nicholas Taleb, love and treat as some form of wisdom, is actually just a justification for arbitrary acts.
In a given situation for which there's no sufficient knowledge, either A or B can be seen as risky or precautionary measures, there's no way to know except if you have sufficient knowledge.
Someone could reply saying, for example, that the known risk of A is tolerable to the unknown, probably magnitudes bigger, risk of B. Unless you know better or at least have a logical explanation for the risks of B (a thing "scientists" don't have because they notoriously dislike making logical claims), in which case you do know something and is not invoking the precautionary principle anymore, just relying on your logical reasoning – and that can be discussed and questioned by others, undermining your intended usage of the label "precautionary principle" as a magic cover for your actions.
-
@ c68e2176:4439e6cf
2025-01-13 22:28:38I am not a big fan of open letters, it’s really difficult to write on a topic that applies so broadly without exception. Yet, here I am with a topic that I believe meets this criteria.
In this post, I will not attempt to sell you on the merits of Bitcoin or the evils of fiat currency. There is enough content out there that can explain those topics better than I ever could. Instead, I want to convince church leaders around the world that you should seriously consider equipping your church to be able to accept Bitcoin as a medium of tithes and offerings from your congregants.
Here is a list of reasons I came up with for church leaders to consider:
- Bitcoin Wallet is very simple to set up
- It’s quite simple to set up a bitcoin wallet. Do not let the technology make you think it is too complicated. If you have someone in your congregation familiar with BTC, they can help. Or, if you go to a company like Unchained Capital, their staff will walk you thru it step by step. There may be a small fee, but should be seriously considered.
- We should try to accommodate our congregation
- Especially if it’s easy to set up, we should try to accommodate accepting our tithes and offerings in how our congregation is led to give. If there are members in the congregation who are inclined to tithe in BTC, the church should be set up to accept it.
- Anecdote: In college I knew a pastor who tithed in 1oz silver coins. He subscribed to Austrian economics, and said “why should I give to my Lord money that devalues”. The church bought a safe and stored it. All congregations should have the same mentality
- Sending money to foreign missionaries:
- No transaction or exchange fees
- Sending a wire to a foreign missionary with accountability is painful. We used to do this and needed two signatures and the sending financial institution required us to fax approval.
- Many times, individuals who serve on Church Finances have full time day jobs and the coordination and administration becomes logistically very difficult. Church finances should have accountability but our existing financial institutions make this difficult or they do not consistently enforce it.
- Bitcoin Multi-Sig makes this extremely simple and easy. You skip Transaction and Exchange fees and accountability is built in with Multi-Sig. For those of you unfamiliar with multi-sig, just imagine the following scenario: You have 3 authorized signers at your Church. In order to send money, you need 2 out of those 3 signers to authorize sending funds.
- Financial Sovereignty
- Any student of church history knows that governments have been the greatest persecutors of the church. The separation of Church and state is dwindling as government power continues to grow. With BTC, the government cannot seize or freeze your assets.
- All you have to think about is Covid. Imagine if you did not want to shut down your Church during Covid (I.e. The state of New Jersey froze and seized assets of Atilis Gym) This does not apply to just governments, but also financial institutions.
- Churches should learn to self custody assets. Underground churches will attest to this.
-
@ 4506e04e:8c16ba04
2025-01-13 22:25:17The employment trends in the gig economy are clear. More and more people take on some form of freelance or temporary work often on top of their full time job. In fact, according to recent estimates, approximately 1.57 billion people, or nearly half (46.4%) of the global workforce, engage in gig work. As gig platforms continue to expand across borders and sectors, this number is projected to keep rising.
In the UK, the gig economy is particularly popular, with many workers supplementing their income with side gigs. According to a recent survey, almost half (48%) of UK gig workers have full-time jobs on top of their side gigs, while 71.5% use gig work to supplement their income rather than provide their sole earnings. The top gig occupation in the UK is online administrative work, with 39% of gig workers offering virtual assistance, data entry, clerical services, or similar computer-based tasks. Sounds like a great way to earn some sats, doesn't it?
Despite the growth and popularity of the gig economy, traditional platforms like LinkedIn have reached their peak and become increasingly plagued by spam from aggressive recruiters and profiles of people with increasingly unverifiable experience. Meanwhile all the centralised platforms like Fiverr and Upwork take a significant cut from freelancers' pay, leaving many workers feeling undervalued and overworked. It's no wonder that many are looking for alternative solutions that prioritize fairness, transparency, trust and compensation paid in money that will last!
Here comes Nostr, a decentralized, censorship-resistant protocol that's laying foundations for the future of the gig work. With its censorship-resistant, peer-to-peer approach, Nostr is poised to revolutionize the way we work and connect with each other. In this article, I'll explore why Nostr is an exciting development for the gig economy, what it means for the future of work and what platforms are already available.
What makes Nostr different? It’s built on principles of decentralization, freedom, trust and Bitcoin as its native currency. Forget walled gardens; with Nostr, your identity is your own. Nobody’s mining your data, and no shadowy algorithms are deciding who sees your posts or what posts you should see. It's a perfect setup for a job marketplace where companies post jobs and freelancers get them done. All paid with Bitcoin with no middleman to take your money
And it’s not just theory. Real solutions are already built, transforming how professionals connect, collaborate, and commit their skills, time and creativity. All open-source and Bitcoin/Nostr-centric.
Here are 4 tools you want to check out:
- SatShoot: Think Upwork or Fiverr, but with integrated eCash wallet and zero middlemen. Creators, freelancers, and clients unite under the banner of peer-to-peer gig economy.
- Kanbanstr: A Nostr-native Kanban board for moving tasks from To Do > In Progress > Done and zapping the developers as they deliver.
- GitWorkshop.dev: A decentralized alternative to GitHub, tailored for developers who value freedom and sovereignty.
- Sigit.io: An open-source and self-hostable solution for secure document signing and verification.
These platforms aren’t just ideas; they’re already being built, some are already in Beta versions, and you can test them today!
These platforms aren’t just ideas; they’re already being built, some are already in Beta versions, and you can test them today!
Don't trust - verify!
How can you be sure you're getting help from the right people with the right skills? That’s where the Web of Trust (WoT) comes in.
On Nostr, the WoT is a decentralized trust system that lets users build and evaluate relationships using cryptographic keys and interactions. Instead of depending on centralized authorities to verify identities or manage reputations, the WoT allows trust to grow organically through direct endorsements and social connections.
In this system, your track record matters. As a freelancer, you’re motivated to deliver quality work—not just to get paid, but also to earn positive feedback. This feedback boosts your reputation, helping you secure your next gig. You could get extra points if i.e. you hold a subject matter expert certificate.
Credentials and certifications are still often critical to determine if someone has the skills you are looking for. The idea of certifications could be rebuilt on Nostr with Badges NIP-58. Institutions like Red Hat, Cisco, and others could issue verifiable, NIP-05-backed badges directly to your Nostr public key (“npub”).
It’s simple:
- The certifying body verifies their domain via NIP-05.
- They issue badges for their certifications
- Successful candidates receive badges and wear them on their npubs.
All it takes is that during the registration process for the exam the examinee adds their npub and Voilà! A decentralized, censorship-resistant proof of skills that lives on Nostr. No middlemen, no gatekeepers, you get the right people for the right job!
Here’s a mind-blowing stat: 95% of the world’s population doesn’t own any Bitcoin. With fiat systems teetering, more people will turn to earning Bitcoin instead of buying it at ever-rising prices. Nostr-based platforms are perfectly positioned to capitalize on this trend, offering global access to Bitcoin-based gigs. It’s borderless, censorship-resistant, and a hedge against the collapsing fiat world order.
Nostr clients and solutions are popping up faster than mushrooms after rain. Whether you’re a developer, marketer, freelancer, or just someone curious about the future of work, there’s a tool for you. This explosive growth signals a broader shift: professionals are tired of traditional platforms and are looking for alternatives that respect their privacy, autonomy, and time.
The Bottom Line
LinkedIn’s days are numbered. Services like Upwork and Fiverr or even Uber are praying on freelance fees. The future of services, networking, and professional growth is decentralized, censorship-resistant, and powered by Nostr. Whether you’re a freelancer, a certifying body, or a startup founder, the opportunities are endless.
Here's a New Year resolution for you - say goodbye to spam and hello to sovereignty. The Nostr revolution is here, and it’s time to join the movement!
If you’re inspired to dive into the Nostr ecosystem but need guidance, the NostrDev team has got your back. From conceptualizing your solution to building it out, we’re the go-to experts for all things Nostr. Reach out and start building the future today.
-
@ 6bae33c8:607272e8
2025-01-13 19:02:29My only dog in the fight is in the NFFC playoff contest wherein you a pick player on each team whose scores double, triple and quadruple each round his team advances. So it’s important to pick players initially you think will not only score a lot per game, but who will also advance to the Super Bowl.
The quarterbacks are key here because they score the most points, and usually you pick one in each conference so there’s a chance you can have two match up at 4x points in the Super Bowl. But I went with Patrick Mahomes and Lamar Jackson, figuring they could both be 3x in the AFC Championship, and I’d be guaranteed to get one of them at 4x in that case.
In the NFC, I used Jahmyr Gibbs and Saquon Barkley on the two favorites, both of whom routinely outscore their respective QBs. For God knows what reason I used the Denver kicker (instead of the Texans kicker) even though the Texans were only three-point dogs, while the Broncos were nine. I think I still have a personal bias against Houston after drafting C.J. Stroud and Stefon Diggs everywhere this year only to see the passing game implode. But what happens in the later rounds is far more important, even if I gave away two-rounds worth of kicker points by that misstep.
The team I faded was the Bills. I used their defense, but if they beat the Ravens next week I’m drawing deader than dead. I could have used the Chargers defense instead and put in James Cook over Ladd McConkey at the flex. McConkey went nuts, but Cook did well too, and remember he’s 2x next week.
-
I saw only the end of the first half of Texans-Chargers. The Texans outscored them 10-0 in the second quarter and took control of the game. Stroud picked up a bad snap, rolled out and made a massive throw on one drive and also scrambled for 27 yards, looking much faster than I had remembered.
-
The Texans defense has always been pretty good. They could slog it out in Arrowhead, but I expect the Chiefs with kill them with 1000 papercuts.
-
McConkey is great, but the Chargers are short one serious playmaker. They need an elite TE, an elite pass-catching back or another WR at a minimum.
-
I didn’t catch Ravens-Steelers, but I expected the game to go more or less like that. Russell Wilson shouldn’t be a starting quarterback anymore (obviously.)
-
I watched most of Broncos-Bills. There was hope early, but the Bills, like the Chiefs, paper-cut you to death before the defense wears down, and then they get the big plays. It’s just very hard to stop a Josh Allen (or Mahomes) team from getting 10 yards in four downs.
-
The Broncos should be a fun team going forward with Bo Nix and Sean Payton. They need to improve the running game and add a pass-catching TE though.
-
The Packers hung around for a while, but they were already down Christian Watson then lost both Romeo Doubs and Jayden Reed during the game. They didn’t have enough juice.
-
The Eagles offense was sluggish. It wasn’t a problem against the depleted Packers, but the winner of the Rams-Vikings tonight should push them more.
-
I watched the 40-minute version of Bucs-Killer Redskins. The Bucs were more efficient offensively and had an easier time converting first downs. But the KR’s converted some key fourth downs including a TD pass, and the Baker Mayfield botched handoff on the jet sweep was crushing. I love based Todd Bowles, but the KRs have more upside, in my opinion with Jayden Daniels.
-
Terry McLaurin might be a Hall of Fame level receiver whose talent was hidden for years by bad QB play. Their other receiver was dynamic and brown too.
-
The KRs couldn’t run the ball to save their lives. Brian Robinson has power, but he needs to get going, and he never had a chance.
-
Bucky Irving seems to have taken the job entirely now, which means he probably will go in the second round of drafts next year. Good on Bowles for making the switch from the veteran Rachaad White to the clearly superior talent.
-
The Lions will probably run over the KRs next week, but Daniels is dangerous.
-
-
@ 2f4550b0:95f20096
2025-01-13 18:51:19In our ever-changing world, whether you're heading up a business, a non-profit, or a government organization, leading with empathy is a key skill necessary for connecting with stakeholders and employees. As illustrated so starkly this week in the face of the devastating fires in Los Angeles, leaders are finding out that empathy isn't just a nice-to-have; it's essential for effective leadership. Here's how compassion can supercharge your leadership in any kind of organization.
Understanding Empathy in Leadership
Empathy in leadership isn't just about getting where people are coming from; it's about genuinely caring about their perspectives, feelings, and personal needs. An empathetic leader doesn't just listen to respond; they listen to understand and connect. This approach creates a culture where everyone feels seen, heard, and valued, leading to stronger loyalty, motivation, and productivity across the board. In Los Angeles, neither Governor Gavin Newsom nor Mayor Karen Bass displayed the type of empathy necessary to reassure victims of the wildfires that competent support was available. During multiple encounters with residents and media, Newsom and Bass struggled to say anything meaningful about the help that was available, their care for the people who had devastating losses, and their accountability for poor preparation ahead of knowable fire risks.
Improving How We Communicate
Empathy really ups the game when it comes to communication. Leaders who lead with empathy handle conflicts better, negotiate with more finesse, and give feedback that's helpful rather than harsh. This kind of communication breaks down walls, fosters open dialogue, and builds trust like nothing else. Trust is the foundation of any successful team, no matter the sector, and without it, even the best plans can fall apart. Governor Ron DeSantis of Florida displayed this type of communication during the 2024 hurricanes that affected many parts of his state. This communication style was empathetic, competent, and reassuring.
Boosting Team Performance and Leading Change
Empathetic leadership has a direct line to better team performance. Research shows that groups with empathetic leaders are more collaborative, innovative, and just happier at work. When folks know their leaders care about them as people, not just workers, they're more likely to give their all. This isn't just about good vibes; it's about creating a space where people feel safe to take risks, share new ideas, and innovate.
Change is a constant, whether you’re in business, non-profit, or government, and how leaders manage this change can make or break an organization. Empathetic leaders are pros at spotting and addressing the fears and concerns that come with change. They communicate openly, support their team, and guide transitions with a focus on the human aspect. This approach not only eases the process but keeps the team united and focused when things get unpredictable.
Challenges and Considerations
Of course, leading with empathy has its hurdles. It's all about finding the right balance; too much empathy might make tough calls harder to make or seem like you're not objective enough. Leaders need to practice empathy without losing the edge of their leadership role. Also, watch out for empathy fatigue, where too much emotional involvement can lead to burnout.
Conclusion
Leading with empathy isn't just about being kind; it's a smart strategy that boosts leadership effectiveness in any organization. It builds tougher, more adaptable teams that are ready for whatever comes their way. As we look to the future, weaving empathy into leadership isn't just good for the soul; it's good for success. At the end of the day, every organization, whether it's for-profit, non-profit, or governmental, is all about its people. Understanding and valuing them is the secret to unlocking their true potential.
-
@ 17538dc2:71ed77c4
2025-01-13 18:17:24Sci-Hub 2024 year end review is translated to English by Kagi Translate from Russian. Original text can be found in Sci-Hub's telegram channel https://t.me/freescience.
RESULTS OF 2024
First. The project received donations totaling 2 million dollars in meme coins.
The project is actively used by many students in China, which is why a group of Sci-Hub fans has emerged there. As far as I understand, the organizer of the group is actively interested in the topic of cryptocurrencies (even wrote a book). Somewhere in mid-November, the Chinese launched a meme coin in honor of the Sci-Hub project. At its peak, the coin's price reached 5 cents, and now it is somewhere around 1-2 cents. This means that the exchange rate of the Sci-Hub cryptocurrency is now almost equal to the ruble exchange rate (100 to one or so).
In general, I converted part of these donations into normal, traditional cryptocurrency (like Bitcoin) and paid for servers several months in advance. The other part is still sitting in meme coins—I hope that the token will still grow in price (there is a promotion plan). Of course, this is risky, but Sci-Hub is a project that is not afraid of risk. Therefore, anyone who wants to invest in Sci-Hub by purchasing this token can do so here: www.coingecko.com/en/coins/sci-hub
Second. A dissertation on the topic of open scientific knowledge has been defended at the Institute of Philosophy.
For those interested in the history and philosophy of science, I defended a dissertation in April at the Institute of Philosophy on the topic that scientific knowledge should be open (otherwise, it is strange to call it scientific at all). The work shows that open communication is one of the basic traditional values of science when considering science as a social institution. In other words, journals that charge for access to scientific articles are a kind of 'non-traditional orientation journals.'
Moreover, openness is an important prerequisite for rationality. Rationality is not limited to the criterion of falsification (hello Popper); it is a much more complex concept.
You can familiarize yourself with the text of the dissertation here: web.archive.org/web/20240425100014/https://iphras.ru/page26414303.htm (I provide the link through the web archive because the Institute's website, strangely enough, is glitching again at the time of writing this post).
All criticism and comments (as well as praise) regarding the dissertation can be sent to my email.
Third. Work has begun on a new declaration of open access to scientific knowledge.
Currently, all discussions on the topic of open science are conducted within the frameworks defined by the so-called BBB declarations back in 2001-2003. Within these frameworks, two main types of open access are recognized: gold, meaning open journals with an author-pays model, and green, which refers to repositories like the well-known arXiv. We can also add the so-called diamond open access, which includes open journals that are free for both authors and readers.
However, since 2003, internet technologies have advanced significantly. Today, we can already talk about such types of open access as blue (through academic social networks) or red (your beloved Sci-Hub). It is time to adopt a new declaration of open access to scientific knowledge that corresponds to the current state of scientific and technological progress.
A preliminary version of the declaration can be read and signed here: open.science.do
We will be more actively engaged in this in the coming year. Signing the declaration is an important step towards recognizing access to scientific knowledge through sites like Sci-Hub or Libgen as completely legal and ceasing to pursue them—first in the former USSR, and then in all countries of the world.
Fourth. In 2024, about one billion articles were downloaded through Sci-Hub. Despite the fact that this is unfiltered statistics, the fact remains: the popularity of the project has not decreased but only grown, despite the fact that Sci-Hub has not been updated for quite a long time. Of course, this does not mean that the site will not be updated at all now—just that the patient is more alive than dead (no matter how much some haters might wish otherwise).
The cause of open access to scientific knowledge will definitely prevail—because good always triumphs over evil.
In the new year, I wish all scientists new discoveries and large grants. Happy New Year, comrades!
-
@ 490b551d:e17f0103
2025-01-13 17:47:59Trauma has a way of completely upending our lives. One second, everything feels like it’s on track, and the next you’re standing in the middle of a mess. Your world gets turned upside down, and nothing feels certain. I know that feeling all too well. The pain, the doubt, the confusion. Will you ever find your way back to something that feels stable again? The hardest part of trauma isn’t just dealing with the pain. It’s trying to figure out where God is in all of it.
When life has shattered your sense of security, when you’ve lost your trust in people or in a church that once felt like home, it’s hard to see how faith fits into the picture anymore. I get it. I’ve been there. Whether it’s because of abuse, betrayal, heartbreak, or even something like a divorce or unexpected loss, trauma can make your faith feel like it’s been ripped out from under you.
For me, that sense of losing everything wasn’t just a sudden thing. It was more like the slow unraveling of trust. It started with little things: a judgmental comment here, a hurtful glance there. But over time, it became something so big I couldn’t ignore it. At some point, the hurt from others became so loud that I couldn’t even hear my own prayers anymore. I felt lost, confused, and alone. Like everything I had built my faith on - everything I believed to be true - had been shaken to its core. The church I grew up in, the people I trusted, the God I thought I knew, they all seemed distant, unreachable, unloving.
The Struggle to Trust Again
One of the hardest things about rebuilding your faith after trauma is wondering Can I trust God again? When everything has gone wrong and you’ve been hurt by the very people who were supposed to support you, it’s natural to question everything, especially your faith.
For me, this struggle started when I experienced deep hurt in the church. A fellow church member who I trusted violated that trust in ways I can’t even put into words. It shook me to the core. I had always been told that church was a safe place, a place to find healing and community. But when that safety was ripped away from me, and I felt exposed, vulnerable, and completely lost.
Then came the judgment. Not just from the people around me, but the way I felt God’s judgment in my own heart. I wondered, How could God love me after what happened? The shame I felt wasn’t just from the abuse I had gone through. It was made worse by my belief that I had somehow done something wrong. I had sinned in some way that made me unworthy of God’s love.
Trauma often leads us to question not just our circumstances, but our very worth. We start asking, Do I even matter? And when your faith feels so shook, those questions can leave you feeling even more disconnected. It feels like you’ve lost everything. The security, the trust, the sense of peace that you once had. And it can be hard to see how you could ever feel close to God again.
But guess what? It’s okay to ask those hard questions. It’s okay to feel like you don’t have all the answers. In fact, it’s in the wrestling, the doubt, and the messiness of life that faith often grows the most.
God Understands Your Pain
When you’re in the middle of trauma, its easy to feel like you’re facing it alone. I know the feeling of pain so heavy that it seemed like God was nowhere to be found. But it took me ten years to realize this: God gets it.
He really does.
Jesus Himself faced unimaginable pain. He was betrayed by His closest friends. He was abandoned in His darkest hour. He was falsely accused, beaten, and crucified. I can’t imagine a more painful, traumatic experience than that. But Jesus didn’t run from the pain. He entered into it. He didn’t look at our suffering from a distance; He walked right through it with us. He knows what it feels like to have everything ripped away, and He’s not afraid of your pain.
In reality, He’s closer than you think.
I love how Psalm 34:18 (NLT) puts it: “The Lord is close to the brokenhearted; he rescues those whose spirits are crushed.” God is near to you, even in your brokenness. He understands what you’re feeling, and He’s not turned away by your hurt. You don’t have to hide your pain from Him. He’s there, sitting with you in the silence, in the grief, in the questions.
If you’re feeling like you’ve lost everything, I want to remind you that God is still with you. Even in the darkest moments, He is closer than you realize. You might not feel it right now, but that doesn’t mean He isn’t there.
It’s Okay to Ask Hard Questions
Faith isn’t about having all the answers. If anything, it’s about learning how to trust even when you don’t understand. If you’re in a season of doubt, don’t let anyone tell you that you shouldn’t question God. I’ve spent so many hours wrestling with the big questions about life, God, and faith. It’s not easy. There are moments when you feel like you’re drowning in your doubts, when you wonder if God is even real, let alone good.
Asking hard questions doesn’t mean you’re losing faith. It means you’re seeking truth. And seeking truth is exactly what God wants us to do. Jesus didn’t shy away from hard questions. In fact, He welcomed them. When His disciples had doubts, He didn’t rebuke them. He encouraged them to keep seeking, keep asking, and keep trusting.
If you’re struggling, remember this: It’s okay to not have everything figured out. Faith is a journey, not a destination. And sometimes, the journey involves walking through the hard questions, the doubts, and the uncertainty. It’s not about having all the answers. It’s about holding onto hope, even when everything else feels uncertain.
God’s Love Is Unconditional
One of the hardest lies I believed after my trauma was that God’s love was conditional. I felt like I had messed up so badly that I didn’t deserve God’s love anymore. I thought that my failures, whether they were the mistakes I made, the hurt I endured, or the sins I struggled with, had somehow disqualified me from His love. But that couldn’t be further from the truth.
Romans 8:38-39 (NLT) says, “And I am convinced that nothing can ever separate us from God’s love. Neither death nor life, neither angels nor demons, neither our fears for today nor our worries about tomorrow—not even the powers of hell can separate us from God’s love.” Nothing - hear me: nothing - can separate you from God’s love. Not your trauma. Not your mistakes. Not your doubts. God’s love for you isn’t based on how perfect you are or how well you follow the rules. It’s based on His nature. He is love, and He loves you, no matter what.
If you’re feeling unworthy, if you’re feeling like you’ve done too much wrong, please know, you are deeply, unconditionally loved by God. His love isn’t something you have to earn. It’s something He freely gives.
Rebuilding Takes Time
There’s no quick fix for rebuilding faith after trauma. There’s no easy formula. It takes time. It takes honesty. It takes grace. And make sure you remember, you don’t have to have it all together right now. And that’s okay.
2 Corinthians 1:3-4 (NLT) says, “All praise to God, the Father of our Lord Jesus Christ. God is our merciful Father and the source of all comfort. He comforts us in all our troubles, so that we can comfort others. When they are troubled, we will be able to give them the same comfort God has given us.”
As you heal, as you rebuild, you’ll begin to see how your pain can be used to comfort others. I’ve found that the biggest healing happens when we share our stories, when we let others walk with us through our pain. God doesn’t waste our suffering. He uses it to shape us, to grow us, and to help us reach out to others who are struggling in the same way.
You Are Not Alone in This Journey
If you’re walking through trauma and rebuilding your faith, I want you to hear this: You are not alone. I know it feels isolating. I know it feels like no one understands. But I want you to know that God is with you. Even when it feels like everything is falling apart, even when you can’t feel His presence, He is there.
You don’t have to walk through this alone. There is a community of people—like me, like you—who are on this journey together. We can be honest about our doubts, our pain, and our questions. Together, we can rebuild, one step at a time.
Take that first step, even if it’s small. Trust that God is with you in this journey, even when you don’t feel it. Let your pain become a part of your story, not the end of it. Because God is still good, and He’s still faithful, even in the dark.
You are loved. You are not alone. And there is hope.
Love,\ Faith
-
@ 490b551d:e17f0103
2025-01-13 17:09:20It’s one of the hardest questions to ask when you’re in the middle of a tough season: What if I don’t feel God’s presence?
Maybe you’ve been through pain, disappointment, or loss, and the one thing that used to make sense, the feeling of God being near, has disappeared. You’ve prayed, you’ve hoped, you’ve waited, but there’s no sense of God’s comforting presence. You’re doing all the right things, but it feels like you’re talking to a wall.
This is such a confusing and painful experience. The God who once felt so near now feels so far away, and you’re left wondering, "Why doesn’t He feel close anymore? Did I do something wrong? Does He even hear me?"
If you’re in this season, I want you to know: You are not alone. It’s something a lot of Christians wrestle with, and it doesn’t mean your faith is broken or that you’ve done something to earn God’s absence. Sometimes, it’s just part of the journey.
It’s okay to ask the hard questions. It’s okay to wonder where God is. It’s okay to not feel His presence right now. But even in those moments of silence, I want to remind you that God is still there.
The Truth About Feeling God’s Presence
It’s so easy to think that our relationship with God is all about what we feel. In a world that’s constantly telling us to trust our emotions, it’s natural to equate the absence of feeling with the absence of God. But this is what I've learned: God’s presence isn’t always about feelings.
God doesn’t pull back from us just because we can’t feel Him. Sometimes, He’s there in ways we don’t recognize or understand. Maybe He’s there in the quiet, in the peace that comes after the storm. Maybe He’s there in the small, everyday moments, like the friend who checks in on you or some unexpected encouragement you receive. Those moments can be God, too.
The Bible says that God is always with us, even when we don’t feel it. “The Lord your God is with you, the Mighty Warrior who saves. He will take great delight in you; in his love, he will no longer rebuke you, but will rejoice over you with singing” (Zephaniah 3:17). Whether you feel it or not, He’s there, delighting in you.
God is Present, Even in Silence
Sometimes God’s silence is a part of our growth. I know it sounds strange. Why would God be silent when we need Him the most? But think about this: when you’re in a relationship with someone, you don’t always need words to feel connected. You can sit with a friend or loved one in complete silence and still feel their presence. It’s the same with God.
Psalm 46:10 tells us, "Be still, and know that I am God." There’s a peace in stillness. A peace that doesn’t depend on what we hear, but instead on trusting that God is who He says He is. Even when we don’t feel Him, we can trust that He’s still God, still good, still present. And that can be enough.
The Struggle Is Real, and That’s Okay
It’s not easy. I get that. It’s hard to hold onto faith when God feels distant, especially when your heart is aching for His comfort and His presence. And sometimes, the hardest part is not knowing when or if things will change. But even in that struggle, I believe God is near. He may be closer than you realize.
When you're in that dark shadow of doubt, remember this: It’s okay to be honest with God about your feelings. He already knows them. He’s not afraid of your anger, confusion, or frustration. In fact, He welcomes your honesty. Psalm 34:18 says, “The Lord is close to the brokenhearted and saves those who are crushed in spirit.” If you’re feeling broken or crushed, He’s not far away. He’s near to you, even if you can’t feel Him.
Trusting God in the Dark
What if this season of silence is a chance for you to lean into a deeper trust? Trusting God even when you don’t feel Him is one of the most powerful things you can do. It’s a faith that doesn’t rely on feelings or circumstances but on the unwavering truth that God is faithful, even when we can’t see it.
I want to encourage you if you're in this place to keep going. Keep showing up, even when it feels like nothing is happening. Keep praying, even when your prayers feel empty. Keep reading the Bible, even when the words seem distant. In the dark, sometimes the smallest step forward is enough. And in that process, you’ll start to find that God's presence is always there, even if it’s not the way you imagined it.
You Are Not Alone
Remember this: God has not abandoned you. If you’re struggling with feeling God’s presence, I want to say to you, in gentleness, that there is no shame in that. Your journey with God doesn’t look like anyone elses. It’s okay to walk through seasons of silence, doubt, and wondering.
But please, don’t give up. Even when you feel nothing, even when your heart feels heavy, God is still there. And He’s still good. His love for you hasn’t changed.
Sometimes the most beautiful moments of faith are the ones where we keep going, even when we don’t feel it. And one day, in the quiet of your heart, you’ll realize He’s been with you all along.
I’m here for you, walking this journey with you. Keep pressing on. You are loved.
Heavenly Father,
I feel like I’m walking through a wilderness right now. My heart is questioning, my mind is restless, and my spirit is tired. But I trust that You are still with me, even when I don't feel it. Please grant me peace in this season of silence. Calm my anxious thoughts and help me rest in the assurance that You are holding me close. I don’t have all the answers, but I know You are good, and I know You love me. Help me to lean into Your presence, even when I can’t feel it. Thank You for being my constant, even when I feel lost.
Amen.
-
@ e3ba5e1a:5e433365
2025-01-13 16:47:27My blog posts and reading material have both been on a decidedly economics-heavy slant recently. The topic today, incentives, squarely falls into the category of economics. However, when I say economics, I’m not talking about “analyzing supply and demand curves.” I’m talking about the true basis of economics: understanding how human beings make decisions in a world of scarcity.
A fair definition of incentive is “a reward or punishment that motivates behavior to achieve a desired outcome.” When most people think about economic incentives, they’re thinking of money. If I offer my son $5 if he washes the dishes, I’m incentivizing certain behavior. We can’t guarantee that he’ll do what I want him to do, but we can agree that the incentive structure itself will guide and ultimately determine what outcome will occur.
The great thing about monetary incentives is how easy they are to talk about and compare. “Would I rather make $5 washing the dishes or $10 cleaning the gutters?” But much of the world is incentivized in non-monetary ways too. For example, using the “punishment” half of the definition above, I might threaten my son with losing Nintendo Switch access if he doesn’t wash the dishes. No money is involved, but I’m still incentivizing behavior.
And there are plenty of incentives beyond our direct control! My son is also incentivized to not wash dishes because it’s boring, or because he has some friends over that he wants to hang out with, or dozens of other things. Ultimately, the conflicting array of different incentive structures placed on him will ultimately determine what actions he chooses to take.
Why incentives matter
A phrase I see often in discussions—whether they are political, parenting, economic, or business—is “if they could just do…” Each time I see that phrase, I cringe a bit internally. Usually, the underlying assumption of the statement is “if people would behave contrary to their incentivized behavior then things would be better.” For example:
- If my kids would just go to bed when I tell them, they wouldn’t be so cranky in the morning.
- If people would just use the recycling bin, we wouldn’t have such a landfill problem.
- If people would just stop being lazy, our team would deliver our project on time.
In all these cases, the speakers are seemingly flummoxed as to why the people in question don’t behave more rationally. The problem is: each group is behaving perfectly rationally.
- The kids have a high time preference, and care more about the joy of staying up now than the crankiness in the morning. Plus, they don’t really suffer the consequences of morning crankiness, their parents do.
- No individual suffers much from their individual contribution to a landfill. If they stopped growing the size of the landfill, it would make an insignificant difference versus the amount of effort they need to engage in to properly recycle.
- If a team doesn’t properly account for the productivity of individuals on a project, each individual receives less harm from their own inaction. Sure, the project may be delayed, company revenue may be down, and they may even risk losing their job when the company goes out of business. But their laziness individually won’t determine the entirety of that outcome. By contrast, they greatly benefit from being lazy by getting to relax at work, go on social media, read a book, or do whatever else they do when they’re supposed to be working.
My point here is that, as long as you ignore the reality of how incentives drive human behavior, you’ll fail at getting the outcomes you want.
If everything I wrote up until now made perfect sense, you understand the premise of this blog post. The rest of it will focus on a bunch of real-world examples to hammer home the point, and demonstrate how versatile this mental model is.
Running a company
Let’s say I run my own company, with myself as the only employee. My personal revenue will be 100% determined by my own actions. If I decide to take Tuesday afternoon off and go fishing, I’ve chosen to lose that afternoon’s revenue. Implicitly, I’ve decided that the enjoyment I get from an afternoon of fishing is greater than the potential revenue. You may think I’m being lazy, but it’s my decision to make. In this situation, the incentive–money–is perfectly aligned with my actions.
Compare this to a typical company/employee relationship. I might have a bank of Paid Time Off (PTO) days, in which case once again my incentives are relatively aligned. I know that I can take off 15 days throughout the year, and I’ve chosen to use half a day for the fishing trip. All is still good.
What about unlimited time off? Suddenly incentives are starting to misalign. I don’t directly pay a price for not showing up to work on Tuesday. Or Wednesday as well, for that matter. I might ultimately be fired for not doing my job, but that will take longer to work its way through the system than simply not making any money for the day taken off.
Compensation overall falls into this misaligned incentive structure. Let’s forget about taking time off. Instead, I work full time on a software project I’m assigned. But instead of using the normal toolchain we’re all used to at work, I play around with a new programming language. I get the fun and joy of playing with new technology, and potentially get to pad my resume a bit when I’m ready to look for a new job. But my current company gets slower results, less productivity, and is forced to subsidize my extracurricular learning.
When a CEO has a bonus structure based on profitability, he’ll do everything he can to make the company profitable. This might include things that actually benefit the company, like improving product quality, reducing internal red tape, or finding cheaper vendors. But it might also include destructive practices, like slashing the R\&D budget to show massive profits this year, in exchange for a catastrophe next year when the next version of the product fails to ship.
Or my favorite example. My parents owned a business when I was growing up. They had a back office where they ran operations like accounting. All of the furniture was old couches from our house. After all, any money they spent on furniture came right out of their paychecks! But in a large corporate environment, each department is generally given a budget for office furniture, a budget which doesn’t roll over year-to-year. The result? Executives make sure to spend the entire budget each year, often buying furniture far more expensive than they would choose if it was their own money.
There are plenty of details you can quibble with above. It’s in a company’s best interest to give people downtime so that they can come back recharged. Having good ergonomic furniture can in fact increase productivity in excess of the money spent on it. But overall, the picture is pretty clear: in large corporate structures, you’re guaranteed to have mismatches between the company’s goals and the incentive structure placed on individuals.
Using our model from above, we can lament how lazy, greedy, and unethical the employees are for doing what they’re incentivized to do instead of what’s right. But that’s simply ignoring the reality of human nature.
Moral hazard
Moral hazard is a situation where one party is incentivized to take on more risk because another party will bear the consequences. Suppose I tell my son when he turns 21 (or whatever legal gambling age is) that I’ll cover all his losses for a day at the casino, but he gets to keep all the winnings.
What do you think he’s going to do? The most logical course of action is to place the largest possible bets for as long as possible, asking me to cover each time he loses, and taking money off the table and into his bank account each time he wins.
But let’s look at a slightly more nuanced example. I go to a bathroom in the mall. As I’m leaving, I wash my hands. It will take me an extra 1 second to turn off the water when I’m done washing. That’s a trivial price to pay. If I don’t turn off the water, the mall will have to pay for many liters of wasted water, benefiting no one. But I won’t suffer any consequences at all.
This is also a moral hazard, but most people will still turn off the water. Why? Usually due to some combination of other reasons such as:
- We’re so habituated to turning off the water that we don’t even consider not turning it off. Put differently, the mental effort needed to not turn off the water is more expensive than the 1 second of time to turn it off.
- Many of us have been brought up with a deep guilt about wasting resources like water. We have an internal incentive structure that makes the 1 second to turn off the water much less costly than the mental anguish of the waste we created.
- We’re afraid we’ll be caught by someone else and face some kind of social repercussions. (Or maybe more than social. Are you sure there isn’t a law against leaving the water tap on?)
Even with all that in place, you may notice that many public bathrooms use automatic water dispensers. Sure, there’s a sanitation reason for that, but it’s also to avoid this moral hazard.
A common denominator in both of these is that the person taking the action that causes the liability (either the gambling or leaving the water on) is not the person who bears the responsibility for that liability (the father or the mall owner). Generally speaking, the closer together the person making the decision and the person incurring the liability are, the smaller the moral hazard.
It’s easy to demonstrate that by extending the casino example a bit. I said it was the father who was covering the losses of the gambler. Many children (though not all) would want to avoid totally bankrupting their parents, or at least financially hurting them. Instead, imagine that someone from the IRS shows up at your door, hands you a credit card, and tells you you can use it at a casino all day, taking home all the chips you want. The money is coming from the government. How many people would put any restriction on how much they spend?
And since we’re talking about the government already…
Government moral hazards
As I was preparing to write this blog post, the California wildfires hit. The discussions around those wildfires gave a huge number of examples of moral hazards. I decided to cherry-pick a few for this post.
The first and most obvious one: California is asking for disaster relief funds from the federal government. That sounds wonderful. These fires were a natural disaster, so why shouldn’t the federal government pitch in and help take care of people?
The problem is, once again, a moral hazard. In the case of the wildfires, California and Los Angeles both had ample actions they could have taken to mitigate the destruction of this fire: better forest management, larger fire department, keeping the water reservoirs filled, and probably much more that hasn’t come to light yet.
If the federal government bails out California, it will be a clear message for the future: your mistakes will be fixed by others. You know what kind of behavior that incentivizes? More risky behavior! Why spend state funds on forest management and extra firefighters—activities that don’t win politicians a lot of votes in general—when you could instead spend it on a football stadium, higher unemployment payments, or anything else, and then let the feds cover the cost of screw-ups.
You may notice that this is virtually identical to the 2008 “too big to fail” bail-outs. Wall Street took insanely risky behavior, reaped huge profits for years, and when they eventually got caught with their pants down, the rest of us bailed them out. “Privatizing profits, socializing losses.”
And here’s the absolute best part of this: I can’t even truly blame either California or Wall Street. (I mean, I do blame them, I think their behavior is reprehensible, but you’ll see what I mean.) In a world where the rules of the game implicitly include the bail-out mentality, you would be harming your citizens/shareholders/investors if you didn’t engage in that risky behavior. Since everyone is on the hook for those socialized losses, your best bet is to maximize those privatized profits.
There’s a lot more to government and moral hazard, but I think these two cases demonstrate the crux pretty solidly. But let’s leave moral hazard behind for a bit and get to general incentivization discussions.
Non-monetary competition
At least 50% of the economics knowledge I have comes from the very first econ course I took in college. That professor was amazing, and had some very colorful stories. I can’t vouch for the veracity of the two I’m about to share, but they definitely drive the point home.
In the 1970s, the US had an oil shortage. To “fix” this problem, they instituted price caps on gasoline, which of course resulted in insufficient gasoline. To “fix” this problem, they instituted policies where, depending on your license plate number, you could only fill up gas on certain days of the week. (Irrelevant detail for our point here, but this just resulted in people filling up their tanks more often, no reduction in gas usage.)
Anyway, my professor’s wife had a friend. My professor described in great detail how attractive this woman was. I’ll skip those details here since this is a PG-rated blog. In any event, she never had any trouble filling up her gas tank any day of the week. She would drive up, be told she couldn’t fill up gas today, bat her eyes at the attendant, explain how helpless she was, and was always allowed to fill up gas.
This is a demonstration of non-monetary compensation. Most of the time in a free market, capitalist economy, people are compensated through money. When price caps come into play, there’s a limit to how much monetary compensation someone can receive. And in that case, people find other ways of competing. Like this woman’s case: through using flirtatious behavior to compensate the gas station workers to let her cheat the rules.
The other example was much more insidious. Santa Monica had a problem: it was predominantly wealthy and white. They wanted to fix this problem, and decided to put in place rent controls. After some time, they discovered that Santa Monica had become wealthier and whiter, the exact opposite of their desired outcome. Why would that happen?
Someone investigated, and ended up interviewing a landlady that demonstrated the reason. She was an older white woman, and admittedly racist. Prior to the rent controls, she would list her apartments in the newspaper, and would be legally obligated to rent to anyone who could afford it. Once rent controls were in place, she took a different tact. She knew that she would only get a certain amount for the apartment, and that the demand for apartments was higher than the supply. That meant she could be picky.
She ended up finding tenants through friends-of-friends. Since it wasn’t an official advertisement, she wasn’t legally required to rent it out if someone could afford to pay. Instead, she got to interview people individually and then make them an offer. Normally, that would have resulted in receiving a lower rental price, but not under rent controls.
So who did she choose? A young, unmarried, wealthy, white woman. It made perfect sense. Women were less intimidating and more likely to maintain the apartment better. Wealthy people, she determined, would be better tenants. (I have no idea if this is true in practice or not, I’m not a landlord myself.) Unmarried, because no kids running around meant less damage to the property. And, of course, white. Because she was racist, and her incentive structure made her prefer whites.
You can deride her for being racist, I won’t disagree with you. But it’s simply the reality. Under the non-rent-control scenario, her profit motive for money outweighed her racism motive. But under rent control, the monetary competition was removed, and she was free to play into her racist tendencies without facing any negative consequences.
Bureaucracy
These were the two examples I remember for that course. But non-monetary compensation pops up in many more places. One highly pertinent example is bureaucracies. Imagine you have a government office, or a large corporation’s acquisition department, or the team that apportions grants at a university. In all these cases, you have a group of people making decisions about handing out money that has no monetary impact on them. If they give to the best qualified recipients, they receive no raises. If they spend the money recklessly on frivolous projects, they face no consequences.
Under such an incentivization scheme, there’s little to encourage the bureaucrats to make intelligent funding decisions. Instead, they’ll be incentivized to spend the money where they recognize non-monetary benefits. This is why it’s so common to hear about expensive meals, gift bags at conferences, and even more inappropriate ways of trying to curry favor with those that hold the purse strings.
Compare that ever so briefly with the purchases made by a small mom-and-pop store like my parents owned. Could my dad take a bribe to buy from a vendor who’s ripping him off? Absolutely he could! But he’d lose more on the deal than he’d make on the bribe, since he’s directly incentivized by the deal itself. It would make much more sense for him to go with the better vendor, save $5,000 on the deal, and then treat himself to a lavish $400 meal to celebrate.
Government incentivized behavior
This post is getting longer in the tooth than I’d intended, so I’ll finish off with this section and make it a bit briefer. Beyond all the methods mentioned above, government has another mechanism for modifying behavior: through directly changing incentives via legislation, regulation, and monetary policy. Let’s see some examples:
- Artificial modification of interest rates encourages people to take on more debt than they would in a free capital market, leading to malinvestment and a consumer debt crisis, and causing the boom-bust cycle we all painfully experience.
- Going along with that, giving tax breaks on interest payments further artificially incentivizes people to take on debt that they wouldn’t otherwise.
- During COVID-19, at some points unemployment benefits were greater than minimum wage, incentivizing people to rather stay home and not work than get a job, leading to reduced overall productivity in the economy and more printed dollars for benefits. In other words, it was a perfect recipe for inflation.
- The tax code gives deductions to “help” people. That might be true, but the real impact is incentivizing people to make decisions they wouldn’t have otherwise. For example, giving out tax deductions on children encourages having more kids. Tax deductions on childcare and preschools incentivizes dual-income households. Whether or not you like the outcomes, it’s clear that it’s government that’s encouraging these outcomes to happen.
- Tax incentives cause people to engage in behavior they wouldn’t otherwise (daycare+working mother, for example).
- Inflation means that the value of your money goes down over time, which encourages people to spend more today, when their money has a larger impact. (Milton Friedman described this as high living.)
Conclusion
The idea here is simple, and fully encapsulated in the title: incentives determine outcomes. If you want to know how to get a certain outcome from others, incentivize them to want that to happen. If you want to understand why people act in seemingly irrational ways, check their incentives. If you’re confused why leaders (and especially politicians) seem to engage in destructive behavior, check their incentives.
We can bemoan these realities all we want, but they are realities. While there are some people who have a solid internal moral and ethical code, and that internal code incentivizes them to behave against their externally-incentivized interests, those people are rare. And frankly, those people are self-defeating. People should take advantage of the incentives around them. Because if they don’t, someone else will.
(If you want a literary example of that last comment, see the horse in Animal Farm.)
How do we improve the world under these conditions? Make sure the incentives align well with the overall goals of society. To me, it’s a simple formula:
- Focus on free trade, value for value, as the basis of a society. In that system, people are always incentivized to provide value to other people.
- Reduce the size of bureaucracies and large groups of all kinds. The larger an organization becomes, the farther the consequences of decisions are from those who make them.
- And since the nature of human beings will be to try and create areas where they can control the incentive systems to their own benefits, make that as difficult as possible. That comes in the form of strict limits on government power, for example.
And even if you don’t want to buy in to this conclusion, I hope the rest of the content was educational, and maybe a bit entertaining!
-
@ 30b99916:3cc6e3fe
2025-01-13 22:17:08Chef's notes
Recipe modified from a recipe published from a school cookbook in 1963.
Details
- 🍳 Cook time: 8 to 10 Minutes at 400
- 🍽️ Servings: 3 dozen or so depending on cookie size
Ingredients
- 2 sticks of butter
- 1 1/2 Cup sugar
- 2 eggs
- 1 t. vanilla (optional but recommended)
- 2 3/4 cups flour
- 2 t. Cream of tartar
- 1 t. Soda
- 1/4 t. Salt
Directions
-
- Heat over to 400
-
- Mix butter, sugar, eggs, and vanilla thoroughly.
-
- Sift together flour, cream of tartar, soda, salt and blend into mixture.
-
- Form small dough balls and roll in sugar/cinnamon
-
- Place each cookie dough ball 2" apart on a cookie sheet
-
@ 5d4b6c8d:8a1c1ee3
2025-01-13 20:41:24I almost forgot about Mock Draft Monday, but here we go.
Mock Draft
Pick 6: DT Mason Graham Pick 37: OT Aireontae Ersery Pick 68: WR Elic Ayomanor Pick 73: RB Kaleb Johnson Pick 106: QB Jaxson Dart Pick 142: S Billy Bowman Pick 178: CB Jabbar Muhammad Pick 212: OG Jaeden Roberts Pick 216: DT Tonka Hemingway Pick 222: LB Jack Kiser
I've been happy with these mocks. This is a nice position in the draft, that's letting me build out from the trenches.
Graham was my first pick last week, too. He would make this line one of the elite units in the entire league, assuming health.
In lieu of a top QB, I managed to use the three day 2 picks on the line, rushing, and receiving. Then, with the first pick on day 3, I get a QB that I've heard very good things about. Brady likes QB's to sit as rookies anyway, so Dart can learn from AOC, who is a perfectly competent NFL QB and very bright.
The rest of day 3 is about filling in depth and drafting guys with cool names (Tonka!).
originally posted at https://stacker.news/items/849063
-
@ e6c3bcb6:e8781ff3
2025-01-13 14:03:37Book Hyderabad to Yadagirigutta Cab online at best price. CabBazar provides car rental services for all cab types AC, Non AC, Hatchback, SUV, Sedan, Innova and Tempo Traveller. Both One way drop taxi and round trip cab available at lowest price. Price starts Rs. 9/Km.
-
@ e968e50b:db2a803a
2025-01-13 20:05:47The blockchain is now over 600 gigabytes. Am I correct to assume that a lot of nodes are about to drop off of the network in the near future? My 1 terabyte node has 74 gigabytes of free space left. @DarthCoin has assured me that it will be easy to transfer it over to a new machine (although I probably need to get to it soon), but can everybody afford a machine with a 2 terabyte hard drive?
Will we see a significant amount of nodes leave the network as 1 terabyte hard drives are no longer big enough to run Bitcoin? Have their been milestones like this before I was involved in the network? I'd assume so as I have machines from a time when bitcoin was around that only have 250 gigabytes. I've been thinking about the blocksize wars and thought that there have to occasionally be milestones in which the blockchain just reaches a standard commercially made disk size and a bunch of folks have to shut their nodes off.
Anyway, not too worried, just curious if anybody else is thinking about this.
Fun fact, as a kid, I remember a neighbor calling my family rich because we had a computer with a 40 megabyte hard drive.
originally posted at https://stacker.news/items/848998
-
@ e6c3bcb6:e8781ff3
2025-01-13 14:00:20Book Hyderabad to Kakinada cab online at best price. CabBazar provides car rental services for all cab types AC, Non AC, Hatchback, SUV, Sedan, Innova and Tempo Traveller. Both One way drop taxi and round trip cab available at lowest price. Price starts Rs. 9/Km.
-
@ e6c3bcb6:e8781ff3
2025-01-13 13:57:17Book Hyderabad to Rajahmundry Cab online at best price. CabBazar provides car rental services for all cab types AC, Non AC, Hatchback, SUV, Sedan, Innova and Tempo Traveller. Both One way drop taxi and round trip cab available at lowest price. Price starts Rs. 9/Km.
-
@ c8adf82a:7265ee75
2025-01-13 13:54:55Imagine playing a MMO gen 1 Pokémon game, the goal of the game is still personal, to be the Pokémon league champion. To get to the Pokémon league, you need to defeat gym leaders and get their badges (if you never played, please play so you can relate and teach this lesson too)
Some players just go through the storyline right away, some have fear and grind levels hard, some just wanted to chill and catch ‘em all
Some got stuck at the mew rumour at S.S.Anne* and got disappointed, some grind too hard that they forgot the main quest, some try to teach other people how to be a champion before being a champion themselves
If you are not interested in being the champion, that is totally fine, it is your game after all. Some enjoy the up and down of the journey and they just don’t want to finish the game yet. I respect these people because they know what they want and they’re doing what they can to get what they want
But there’s this special group of players that wants to be the champion, but are misled to believe they can be a ‘better’ champion if they do these special tasks before fighting the Elite Four. Can be from a game guide magazine, a friend that you think is smart, whatever. The sad truth is, you cannot be a ‘better’ champion in this game — and these guys just got misled their whole life
Now, these guys do meet other players that told them “hey, just go fight the Elite Four, that’s the only way for you to be champion”, and they kept replying “please respect me, I know I have to beat the Elite Four, I just want to be a ‘better’ champion, you just don’t understand”. These players get stuck in some sort of internal pride war sunk cost fallacy because they have spent their whole life trying to be a ‘better’ champion that actually doesn’t exist
Now why this story? This is life. No matter how hard you try, you still need to follow the main storyline. You can change your path, but everyone’s end goal eventually converge — eternal peace. When you become the league champion, you attain the ability to serve and radiate love. Evil spirits will forever try to hold you back from being a champion, some religion even tells you that you can be a ‘better’ champion. But really all you need to do is stay humble and stack sats, I mean, start the main quest
One day when you actually become a champion, you will realize that the only way to live is to serve other people so we all become champions. Because life is best enjoyed with the people we love
*https://gaming-urban-legends.fandom.com/wiki/Mew_Under_the_Truck
-
@ e6c3bcb6:e8781ff3
2025-01-13 13:54:35Book Hyderabad to Khammam Cab online at best price. CabBazar provides car rental services for all cab types AC, Non AC, Hatchback, SUV, Sedan, Innova and Tempo Traveller. Both One way drop taxi and round trip cab available at lowest price. Price starts Rs. 9/Km.
-
@ e6c3bcb6:e8781ff3
2025-01-13 13:50:39Book Hyderabad to Goa Cab online at best price. CabBazar provides car rental services for all cab types AC, Non AC, Hatchback, SUV, Sedan, Innova and Tempo Traveller. Both One way drop taxi and round trip cab available at lowest price. Price starts Rs. 9/Km.
-
@ e6c3bcb6:e8781ff3
2025-01-13 13:47:02Book Hyderabad to Suryapet Cab online at best price. CabBazar provides car rental services for all cab types AC, Non AC, Hatchback, SUV, Sedan, Innova and Tempo Traveller. Both One way drop taxi and round trip cab available at lowest price. Price starts Rs. 9/Km.
-
@ e6c3bcb6:e8781ff3
2025-01-13 13:42:02Book Hyderabad to Shirdi Cab online at best price. CabBazar provides car rental services for all cab types AC, Non AC, Hatchback, SUV, Sedan, Innova and Tempo Traveller. Both One way drop taxi and round trip cab available at lowest price. Price starts Rs. 9/Km.
-
@ bf47c19e:c3d2573b
2025-01-13 13:40:13Originalni tekst na thebitcoinmanual.com
Lightning Network (eng. lightning - munja, network - mreža) je jedno od primarnih rešenja za skaliranje Bitkoin mreže sa ciljem da je više ljudi može koristiti na različite načine čime bi se zaobišla ograničenja glavnog blokčejna. Lightning mreža deluje kao "drugi sloj" koji je dodat Bitkoin (BTC) blokčejnu koji omogućava transakcije van glavnog lanca (blokčejna) pošto se transakcije između korisnika ne registruju na samoj blokčejn mreži.
Lightning kao "sloj-2 (layer-2)" pojačava skalabilnost blokčejn aplikacija tako što upravlja transakcijama van glavnog blokčejna ("sloj-1" / layer-1), dok istovremeno uživa benefite moćne decentralizovane sigurnosti glavnog blokčejna, tako da korisnici mogu ulaziti i izlaziti iz Lightning mreže koristeći custodial ili non-custodial servise u zavisnosti od sopstvene sposobnosti i znanja da koriste glavni blokčejn.
Kao što i samo ime govori Lightning Network je dizajnirana za brza, instant i jeftina plaćanja u svrhu sredstva razmene i druga programabilna plaćanja kojima nije potrebna instant konačnost (finality) ali ni sigurnost glavnog lanca. Lightning je najbolje uporediti sa vašom omiljenom aplikacijom za plaćanja ili debitnom karticom.
Šta je Lightning mreža?
Lightning mreža vuče svoje poreklo još od tvorca Bitkoina, Satošija Nakamota, ali je formalizovana od strane istraživača Joseph Poon-a i Thaddeus Dryja-a koji su 14. januara 2016. godine objavili beli papir o Lightning Network-u.
Radilo se o predlogu alternativnog rešenja za skaliranje Bitkoina da bi se izbeglo proširenje kapaciteta bloka Bitkoin mreže i smanjio rizik od centralizacije blokčejna. Dalje, skaliranje van glavnog lanca znači zadržavanje integriteta samog blokčejna što omogućuje više eksperimentalnog rada na Bitkoinu bez ograničenja koja su postavljena na glavnom blokčejnu.
Lightning Labs, kompanija za blokčejn inženjering, pomogla je pokretanje beta verzije Lightning mreže u martu 2018. - pored dve druge popularne implementacije od strane kompanija kao što su ACINQ i Blockstream.
- Lightning Labs – LND
- Blockstream – Core Lightning (implementacija nekada poznata kao c-lightning)
- ACINQ – Eclair
Svaka verzija protokola ima svoje poglede i načine kako rešava određene probleme ali ostaje interoperabilna sa ostalim implementacijama u smislu korišćenja novčanika, tako da za krajnjeg korisnika nije bitno kojom verzijom se služi kada upravlja svojim čvororom (node-om).
Lightning Network je protokol koji svako može koristiti i razvijati ga, proširivati i unapređivati i koji kreira posebno i odvojeno okruženje za korišćenje Bitkoina kroz seriju pametnih ugovora (smart contracts) koji zaključavaju BTC na Lightning-u radi izbegavanja dvostruke potrošnje (double-spending). Lightning Network nije blokčejn ali živi i funkcioniše na samom Bitkoinu i koristi glavni lanac kao sloj za konačno, finalno poravnanje.
Lightning mreža ima sopstvene čvorove koji pokreću ovaj dodatni protokol i zaključavaju likvidnost Bitkoina u njemu sa ciljem olakšavanja plaćanja.
Lightning omogućava svakom korisniku da kreira p2p (peer-to-peer) platni kanal (payment channel) između dve strane, kao npr. između mušterije i trgovca. Kada je uspostavljen, ovaj kanal im omogućava da međusobno šalju neograničen broj transakcija koje su istovremeno gotovo instant i veoma jeftine. Ponaša se kao svojevrsna mala "knjiga" (ledger) koja omogućava korisnicima da plaćaju još manje proizvode i usluge poput kafe i to bez uticaja na glavnu Bitkoin mrežu.
Kako radi Lightning Network?
Lightning Network se zasniva na pametnim ugovorima koji su poznati kao hashed time lock contracts koji između dve strane kreiraju platne kanale van glavnog blokčejna (off-chain payment channels). Kada zaključate BTC na glavnom lancu u ovim posebnim pametnim ugovorima, ova sredstva se otključavaju na Lightning mreži.
Ova sredstva zatim možete koristiti da biste napravili platne kanale sa ostalim korisnicima Lightning mreže, aplikacijama i menjačnicama.
Ovo su direktne platne linije koje se dešavaju na vrhu, odnosno izvan glavnog blokčejna. Kada je platni kanal otvoren, možete izvršiti neograničen broj plaćanja sve dok ne potrošite sva sredstva.
Korišćenje Lightning sredstava nije ograničeno pravilima glavnog Bitkoin lanca i ova plaćanja se vrše gotovo trenutno i za samo delić onoga što bi koštalo na glavnom blokčejnu.
Vaš platni kanal ima svoj sopstveni zapisnik (ledger) u koji se beleže transakcije izvan glavnog BTC blokčejna. Svaka strana ima mogućnost da ga zatvori ili obnovi po svom nahođenju i vrati sredstva nazad na glavni Bitkoin lanac objavljivanjem transakcije kojom se zatvara kanal.
Kada dve strane odluče da zatvore platni kanal, sve transakcije koje su se desile unutar njega se objedinjuju i zatim objavljuju na glavni blokčejn "registar".
Zašto biste želeli da koristite Lightning mrežu?
Trenutno slanje satošija
Lightning Network je "sloj-2" izgrađen na vrhu glavnog Bitkoin lanca koji omogućava instant i veoma jeftine transakcije između lightning novčanika. Ova mreža se nalazi u interakciji sa glavnim blokčejnom ali se plaćanja pre svega sprovode off-chain, van glavnog lanca, pošto koristi sopstvenu evidenciju plaćanja na lightning mreži.
Razvijene su različite aplikacije koje su kompatibilne sa Lightning mrežom, koje su veoma lake za korišćenje i ne zahtevaju više od QR koda za primanje i slanje prekograničnih transakcija.
Možete deponovati BTC na vaše lightning novčanike tako što ćete slati satošije sa menjačnica ili ih kupovati direktno unutar ovih aplikacija. Većina ovih novčanika ima ograničenje od nekoliko miliona satošija (iako će se ovaj limit povećavati kako više biznisa i država bude prihvatalo Bitkoin) koje možete poslati po transakciji što ima smisla budući da je za slanje većih iznosa bolje korišćenje glavnog blokčejna.
Pokretanje sopstvenog čvora
Kako se više ljudi bude povezivalo sa lightning mrežom i koristilo njene mogućnosti, sve više ljudi pokreće svoje čvorove radi verifikacije transakcija putem svojih lightning platnih kanala. Kroz ove kanale je moguće bezbedno poslati različite iznose satošija, a takođe je moguće zarađivati i male naknade za svaku transakciju koja prolazi kroz vaš kanal.
Transakcione naknade
Uprkos trenutnim transakcijama, još uvek postoje transakcione naknade povezane sa otvaranjem i zatvaranjem platnih kanala koje se moraju platiti rudarima na glavnom blokčejnu prilikom finalizacije lightning platnih kanala. Takođe postoje i naknade za rutiranje (routing fees) koje idu lightning čvorovima (i njihovim platnim kanalima) koji su uspostavljeni da bi se omogućila plaćanja.
Sa daljim napredovanjem razvoja Bitkoina i novim nadogradnjama, imaćemo sve veći rast i razvoj layer-2 aplikacija kao što je lightning.
Više izvora o Lightning mreži
Ukoliko želite da naučite više o Lightning mreži, najbolje je da pročitate dodatne tekstove na sajtu thebitcoinmanual.com.
-
@ e6c3bcb6:e8781ff3
2025-01-13 13:39:04Book Hyderabad to Pune Cab online at best price. CabBazar provides car rental services for all cab types AC, Non AC, Hatchback, SUV, Sedan, Innova and Tempo Traveller. Both One way drop taxi and round trip cab available at lowest price. Price starts Rs. 9/Km.
-
@ e6c3bcb6:e8781ff3
2025-01-13 13:36:08Book Hyderabad to Tirupati Cab online at best price. CabBazar provides car rental services for all cab types AC, Non AC, Hatchback, SUV, Sedan, Innova and Tempo Traveller. Both One way drop taxi and round trip cab available at lowest price. Price starts Rs. 9/Km.
-
@ 72592ec9:ffa64d2c
2025-01-13 18:33:3216 years ago, SATOSHI posted this message to sourceforge - Announcing Bitcoin V0.1 - This sourceforge announcement is almost identical to the Cryptography Mailing List announcement, posted on January 8th 2009.
There are a few grammatical differences and a different download link for the Bitcoin program, but other than that, the message is the same. 21 million coins and no more.
The fun thing about this sourceforge announcement is that it appears to have been forgotten. The record for it is not accounted for by The Nakamoto Institute, The Book of Satoshi, or even Kicking The Hornets Nest
Perhaps it should be added to the Satoshi history books. Makes you wonder what other forgotten digital artifacts are out there.
https://x.com/BITCOINALLCAPS/status/1878871291442421775
originally posted at https://stacker.news/items/848887
-
@ e460cb14:01bb5ced
2025-01-13 13:33:12Brief intro
glostr is a pet-project of mine to better understand how #nostr works. Since I'm an engineer, and somewhere between a game programmer and a graphics programmer, I'll do what I do best: write some graphics thing no one (but me) will use.
Zappable Shadertoy
So, the idea is to create a small platform on top of #nostr where people can create, visualize, and share computer graphics programs (aka: shaders). Code shiny thing, see shiny, share shiny thing, and zap shiny thing. If you're familiar with Shadertoy, #glostr is just that: zappable shadertoy.
Milestone Zero
So, first step was to write a quick and dirty prototype client (remember, I specc'd into game dev, not into web dev, so I really mean quick and I really mean dirty). I got an ace editor thing working, duct-taped it to a basic WebGL render, stole a couple shaders from shadertoy (jk, I gave credit), poured some CSS magic, glued some
nostr-rx
, and published it to GitHub pages.After 2 or 3 days of iterating, and with some assistance from an LLM, you can see the result linked on my notes.
Yes. I used
kind 1
posts to spam GLSL code.I AM SORRY. I KNOW BETTER NOW. I SWEAR.
So, right now #glostr is: - Taking an npub on the url after the # - Rendering all
kind 1
posts from that npub containing GLSL code between ```s - Allowing the user to edit the code in real timeNext Steps
What now? Gorila made me realize my obvious
kind 1
spamming. After some brainstorming and skimming through NIPs and kinds, we arrived at the conclusion that Long-form Notes (NIP-23) are best suited for the content I want #glostr to display: - Format is Markdown, which I like and which I was already somewhat expecting. - It's editable content, so mistakes can be amended, which is more than usual in shader programming.So, the next features I want to add are: - Logging in - Posting NIP-23 Notes - Getting, parsing, and showing NIP-23 Notes
When
I'll only work on this on the weekends for now, so I don't know. This is a pet project for fun right now.
Wrapping Up
- Repo: https://github.com/rowdaboat/glostr
- Try it: https://rowdaboat.github.io/glostr/
As this is a Long-Form Note in itself, I'll finish it by sharing a shader based on Inigo Quilez's awesome polygon shader. This note should show as a shader on #glostr in the next iteration, but you can copy and paste the code in the editor for now:
```glsl
version 300 es
precision mediump float;
uniform vec2 u_resolution; uniform float u_time;
out vec4 fragColor;
const int N = 6; vec3 yellow = vec3(0.45, 0.3, 0.15); vec3 lightBlue = vec3(0.65, 0.85, 1.0);
float polygon(in vec2 p, in vec2[N] v) { const int num = v.length(); float d = dot(p - v[0], p - v[0]); float s = 1.;
for(int i=0, j=num-1; i < num; j=i, i++ ) { vec2 e = v[j] - v[i]; vec2 w = p - v[i]; vec2 b = w - e * clamp(dot(w, e) / dot(e, e), 0.0, 1.0); d = min(d, dot(b,b)); bvec3 condition = bvec3( p.y >= v[i].y, p.y < v[j].y, e.x * w.y > e.y * w.x ); if (all(condition) || all(not(condition))) s =- s; } return s * sqrt(d);
}
void main() { vec2 p = (2.0 * gl_FragCoord.xy - u_resolution.xy) / u_resolution.y; float d = polygon(p, vec2);
vec3 color = d < 0.0 ? yellow : lightBlue; color *= 1. - exp(-40. * abs(d)); color *= .8 + .2 * sin(10.0 * d - 10. * u_time) * sin(-1.25 * u_time); color *= exp(1. - d * 2.25); fragColor = vec4(color, 1.0);
} ```
-
@ e6c3bcb6:e8781ff3
2025-01-13 13:32:38Book Hyderabad to Kurnool Cab online at best price. CabBazar provides car rental services for all cab types AC, Non AC, Hatchback, SUV, Sedan, Innova and Tempo Traveller. Both One way drop taxi and round trip cab available at lowest price. Price starts Rs. 9/Km.
-
@ e6c3bcb6:e8781ff3
2025-01-13 13:27:22Book Hyderabad to Guntur Cab online at best price. CabBazar provides car rental services for all cab types AC, Non AC, Hatchback, SUV, Sedan, Innova and Tempo Traveller. Both One way drop taxi and round trip cab available at lowest price. Price starts Rs. 9/Km.
-
@ bf47c19e:c3d2573b
2025-01-13 13:24:35"Misterija Satoši - Poreklo bitkoina" je francuski dokumentarno-animirani serijal koji dešifruje unutrašnje funkcionisanje bitkoin revolucije, dok istražuje identitet njenog tvorca.
Prvu decentralizovanu i pouzdanu kriptovalutu – bitkoin, osnovao je Satoši Nakamoto 3. januara 2009. godine. On je nestao 2011. i od tada ostaje anoniman, a njegov identitet je predmet svakakvih spekulacija. Tokom poslednjih 12 godina, vrednost bitkoina je porasla sa 0,001 na 69.000 dolara. Svi, od vlada do velikih korporacija, zainteresovali su se za Satošijev izum. Ko je Satoši Nakamoto? Kako je njegov izum postao toliko popularan? Šta nam bitkoin govori o svetu u kome živimo?
Ovaj serijal se prikazivao na Radio-televiziji Srbije (RTS 3) u sklopu novogodišnjeg muzičkog i filmskog programa 2022/2023. godine.
Naslov originala: "Le Mystère Satoshi"
Copyright: , ARTE.TV
-
@ 000002de:c05780a7
2025-01-13 17:57:59I've lived most of my life in California. I am very familiar with Southern California and have traveled through it countless times over the last 30+ years. I've enjoyed spending time in SoCal. My heart goes out to the people that have lost everything as well as the people living on the edge fearing the fires will come their way. Its terrible. Its also not a new story as we have seen this many times before, just not affecting this many people.
There are many theories and factors people are discussing online. Many IMO are missing the key issues. Regardless of how the fires started, sadly this event has only a matter of time. Been thinking about this issue for years and thought I would share my thoughts with you all. These are my opinions, I'm not an expert but I do live in the state and have paid attention to this topic since I was a kid. I've always loved the forests of California and I care about the beautiful state and its people. As I've said before, the government of California is evil. After you read this I hope you will understand why I believe this. I think Gavin Newsom is to blame for many of the issues we face but its bigger than one man. Removing him from office will not fix this problem. It is far more complex.
PG&E's Electricity Infrastructure & The Consequences of Monopolies & Price Controls
I'm not sure at this point if PG&E is at fault for starting these fires but it is at fault for many in the recent past. PG&E is the largest utility company in the state and has a monopoly over most of the state. SoCal Gas & Electric has monopoly over the rest of the state. Both are public utilities which essentially means these are more like government controlled entities than private companies. California has long used price controls on electricity. We know that doesn't work. The state has restricted to addition of new power generation my entire life. So of course PG&E has to import power from other states requiring higher rates for their customers. Due to the mismanagement of PG&E the company has not kept its infrastructure up to date. Many fires are started by shorts in power lines and equipment that is older than me. If you wanna immediately find common ground with a Californian complain about PG&E. So who is at fault? PG&E and the state government. Since PG&E is essentially a government entity I lay the blame on the state.
The problem is that most people have been programmed to believe utilities need to be controlled by government in addition to being monopolies. Its one of the most illogical beliefs to me. Since PG&E is a company people tend to just blame them instead of the politicians and the state. The result is politicians have little incentive to change things.
The Smelt, Salmon, and Water
The Smelt is a small fish that the Salmon eat. There has been a push for many years to restore the historic water ways that are a part of migration paths of the Salmon in California. California's Central Valley(North of Southern California) is a massive producer of produce and other agriculture products. The issues around water are complex and the most frustrating thing for me, a person that was born and raised in the state is how the issues are rarely discussed in rational ways considering trade-offs. Instead there are usually just two sides presented.
- The farmers need water so we need to build more water storage(dams).
- We need to restore the historic water ways of the state and the specifically the historic Salmon runs through those water ways.
I don't have a problem with either of these goals. The issue is that they are in opposition to each other. The fact is that water is needed by farmers in the Central Valley as well as people in Southern California. Southern California would not support the current population without the water from other places being funneled to that region. The farming industry of Central California would also not exist without sufficient water. Additionally the diversion of natural water flows via dams also has reduced flood risks in the state. So when you hear people talking about stealing water or SoCal doesn't have the water it needs this is a bit of context you might not hear. The state has done a terrible job managing water over the past 20 years.
The Historic and Natural Occurrence of Wild Fires
Over my lifetime I have watched as humans have build homes in areas that historically are prone to wild fires. As a kid in the government school system I was taught about forestry management. How the state and federal forestry services would clear dead brush, execute controlled burns, and cut fire lines to help prevent out of control wild fires. Even with this policy there was never a guarantee that homes could be protected but it does seem like that policy helped keep them smaller.
What many people do not understand about wild fires is that they are natural and needed. When the population of California was sparse there weren't any fire fighters putting out fires. They would just burn themselves out. The giant sequoia trees actually depend on wild fires to a certain extent. These fires would burn out the dead growth as well as smaller trees making way for only the strongest to survive.
With the massive population growth of California over the past 100 years fire fighters have began to fight this form of nature. Like many natural forces this usually only postpones the inevitable. Its a tough decision. Do you let natural do its thing or protect people. Growing up the policy was to protect people. This meant putting out fires that threatened humans and their property.
This included what I mentioned before. Logging, clearing out dead growth, controlled burns as well as other methods. In recent years the policy has shifted away from these policies and it is clear to me the results are disastrous. Once again trade-offs are rarely discussed when the government changes policy. Of course doing controlled burns affects air quality. Climate change is often mentioned as a reason to suspend controlled burns but it is clear to me that's just kicking the can down the road. The fires are going to happen. It is just a matter of time.
Human Expansion
In my opinion the single largest factor in these fires is the fact that humans have expanded into areas that historically are often cleared by wild fires. When government policy prioritized humans the risk would be reduced but instead of this the state has prioritized "environmental" interests. What makes this worse is that the state has also put their finger on the scales in regard to insurance.
Once again, I rarely hear the fact that more people are living in forests as a massive factor. I have traveled all over the state over the last 30 years and the growth is incredible. I don't have a problem with his growth but you have to recognize the risk. In a free market insurance should handle this issue of risk.
The Role of Insurance
Insurance is all about calculating risk. If you seek insurance the higher your risk the higher the premium. On both ends of the scale of risk both parties will not enter into an agreement. If the risk is very low individuals will not naturally see a need for insurance. Insurance companies LOVE to sell insurance with low risk. The opposite is true. If your risk is high an insurance company cannot provide assurances of payment.
The thing people most miss about insurance is that they play the role of evaluating risk. They are incentivized reduce risk, much more than the state. Recently insurance companies have stopped offering polices in California due to introduction of price controls and the state's forestry polices. In some of the areas now burning these companies have declined to renew fire polices. Why? Because the risk was to high. That should tell us something.
What Is the Answer
Remove regulations altering the natural market force of insurance. If an area is very risky insurance should be high. That is a signal that can very well save lives. I think people should be allowed to live on any property they own or rent. They should be able to do so without insurance as well. But insurance should be allowed to do what it does. Reduce risk and provide a valuable signal to the market. The same goes for power utilities. There needs to be a removal of the monopoly held by PG&E. They need to build nuclear plants in the state to provide power for the growing population. I believe the market, if allowed to operate would fix these issues.
When it comes to environmentalism the state should pick a side. People, or environmentalism. If they pick environmentalism they should not bail out the insurance companies and restrict building back in areas affected by wild fires. To be clear, I oppose that position because I don't believe it is actually good for the environment of California and its destructive to human life. The other path is to return to managing the forests. Restore the forestry practices that worked for decades. Allow insurance to operate as a free market and listen to the market signals.
When it comes to water its a similar situation. The reality is until farming practices change to be more regenerative and if the population level continues to grow the state is going to have to build more water storage and divert the natural flow of water. Humans are competing for resources with Salmon. I would love to see California restored to a more natural state but the reality is that will not be possible without a drastic population decrease and more fires like this. I don't think the people actually want that. They have been lied to for decades by politicians and environmentalists.
I know this is a long post, there is much more I could say and I'm sure I'll hear it in the comments but I tried to keep this short. Its a very complex issue that the state and Newsom largely own. They will try to distract with many other things but this is where the focus should be IMO.
originally posted at https://stacker.news/items/848838
-
@ e6c3bcb6:e8781ff3
2025-01-13 13:24:15Book Coorg to Ooty Cab online at best price. CabBazar provides car rental services for all cab types AC, Non AC, Hatchback, SUV, Sedan, Innova and Tempo Traveller. Both One way drop taxi and round trip cab available at lowest price. Price starts Rs. 9/Km.
-
@ e6c3bcb6:e8781ff3
2025-01-13 13:21:12Book Mysore to Ooty Cab online at best price. CabBazar provides car rental services for all cab types AC, Non AC, Hatchback, SUV, Sedan, Innova and Tempo Traveller. Both One way drop taxi and round trip cab available at lowest price. Price starts Rs. 9/Km.
-
@ e6c3bcb6:e8781ff3
2025-01-13 13:17:55Book Coimbatore to Ooty Cab online at best price. CabBazar provides car rental services for all cab types AC, Non AC, Hatchback, SUV, Sedan, Innova and Tempo Traveller. Both One way drop taxi and round trip cab available at lowest price. Price starts Rs. 9/Km.
-
@ e6c3bcb6:e8781ff3
2025-01-13 13:15:05Book Chennai to Ooty Cab online at best price. CabBazar provides car rental services for all cab types AC, Non AC, Hatchback, SUV, Sedan, Innova and Tempo Traveller. Both One way drop taxi and round trip cab available at lowest price. Price starts Rs. 9/Km.
-
@ e6c3bcb6:e8781ff3
2025-01-13 13:11:46Book Ooty to Chennai cab online at best price. CabBazar provides car rental services for all cab types AC, Non AC, Hatchback, SUV, Sedan, Innova and Tempo Traveller. Both One way drop taxi and round trip cab available at lowest price
-
@ 812cff5a:5c40aeeb
2025-01-13 16:07:25نوستر الآن
كل تطبيقات نوستر حاليا هي مجرد عميل يتواصل مع مجموعة سيرڤرات متفرقة، نوتديك مختلف كليا
اذا كنت مستخدم لنوستر فانت على الاغبل تعلم ان الطريقة التي نتواصل من خلالها مع البروتوكول هي من خلال تطبيقات تتواصل مع سيرفرات مختلفة (تعرف باسم ريلاي) لارسال واستقبال المنشورات المتنوعة المتعارف عليها في البروتوكول.
حتى الان اغلب هذه التطبيقات تتواصل تشكل مباشر مع السيرڤرات، وبصورى عامة هي تؤدي وظيفة محدودة.
يمكن تشبيه هذه المرحلة من نوستر بزمن التطبيقات قبل انظمة التشغيل.
نوستر قريباً
نوتديك هو اشبه بنظام تشغيل لتطوير جميع انواع التطبيقات بدل من ان يكون تطبيق نوستر محدود الميزات
يعمل نوتديك كطبقة ما بين السيرفرات والتطبيقات. يحتوي نوتديك على سيرڤر داخلي يتواصل مع السيرڤرات الاخرى ويقوم باستلام تحديثات الشبكة بشكل دائم. اما المستخدم، فيتفاعل مع نوتديك والسيرڤر المحلي فقط. هذا يسمح للمستخدم في التعامل مع نوتديك حتى لو لم يكن مرتبط بالانترنت، كما ان التواصل سريع جدا من منظور السمتخدم.
امكانيات لا محدودة
اي مطور بامكانه استخدام الخدمات التي يقدمها نوتديك لتطوير تطبيقات تعمل داخل نوتديك وتستفيد من سرعة السيرڤر الداخلي
الجميل في عالم الكود المفتوح ان المطورين يقومون بتبني الافكار الجيدة والبدء بالبناء عليها بشكل فوري وبدوم قيود الموافقات والبيروقراطية العقيمة الموجودى في الشركات الكبيرة. بدأنا اللآن من رؤية التطبيقات المتوافقة مع نوتديك تظهر. اول مثال هو تطبيق زاب دوت سريم للبث المباشر. وهذه مجرد البداية، تقنياً، اي تطبيق على نوستر يستطيق الاستفادة من هذه الميزات.
كيف تستخدم نوتديك؟
نوتديك مازال في ايامه الأولى، لكن اذا كنت من مستخدمين داموس البتنفسجي أو لديك بعض الخبرة التقنية فيمكن تحميله من موقع github
اذا كنت من مشتركي داموس البنفسجي، يمكنك تحميل نوتديك من هذا الرابط: notedeck
اذا اردت استخدام آخر تحديق من نوتديك عليك تحميل لغة برمجة rust بالإضافة إلى بعض تطبيقات الكومبايلنغ ثم تشغيل التطبيق من هذا الرابط: github-notedeck
للمساعدة
اذا احتجتم لمساعدة أو ترغبون في تقديم الدعم في تطوير نوتديك، يمكنكم التواصل مع nostr:npub1nje4ghpkjsxe5thcd4gdt3agl2usxyxv3xxyx39ul3xgytl5009q87l02j
للتواصل مع المطور: nostr:npub1xtscya34g58tk0z605fvr788k263gsu6cy9x0mhnm87echrgufzsevkk5s
-
@ e6c3bcb6:e8781ff3
2025-01-13 13:08:57Book Prayagraj airport cab at best price and relax. CabBazar provides confirmed cab, real time driver details and best price airport cab service in Prayagraj. Price starts
-
@ e6c3bcb6:e8781ff3
2025-01-13 13:03:36Book Lucknow to Prayagraj cab online at best price. CabBazar provides car rental services for all cab types AC, Non AC, Hatchback, SUV, Sedan, Innova and Tempo Traveller. Both One way drop taxi and round trip cab available at lowest price. Price starts Rs. 9/Km.
-
@ ac42bb04:2751bfff
2025-01-13 15:29:49Bitcoinis the world’s largest and most popular cryptocurrency. As a decentralized digital currency, it has the potential to revolutionize how businesses transact with customers and suppliers, making global transactions quick and easy. This need is especially true in the oil and gas industry.
The current system used by oil and gas companies involves high administration costs related to transferring funds across international borders. This is where Bitcoin may offer an effective solution. Using Bitcoin would make payments faster than ever before, with minimal friction and fees incurred during transfers.
In addition to reducing fees associated with global payments, Bitcoin could also provide greater visibility into transactions for those involved in the sector. For instance, buyers could ensure that their money arrives at the intended destination without delays or fraud risks. Additionally, transactions are visible on the public ledger contained within Bitcoin’s blockchain technology (See Figure 1). This gives buyers assurance when making large amounts of equipment or resources from another country, as they can see exactly where their money has gone. In turn, these exchanges leave a digital audit trail that would make renegotiating contracts far simpler if needed.
Figure 1: A detailed page shows the transactions that occurred on Block 768520.
Bitcoin also offers an alternative source of capital for small businesses operating within the oil and gas sector who may find traditional methods difficult due to geographical location or lack of credit history. Through investors buying and selling Bitcoin tokens representing ownership in specific projects within the oil and gas sector, startups can gain access to capital beyond what traditional financing methods may provide them.
Finally, I think Bitcoin presents a shift away from fiat currencies as it allows buyers to convert money into a cryptocurrency before use in any transaction within Oil & Gas sector worldwide — allowing users to cut out intermediaries such as banks or third-party currency exchanges altogether while simplifying everyday processes such as ordering supplies or getting invoices paid on time by avoiding expensive cross-border fees that come with traditional payment solutions such as wire transfers or checks. In addition, by utilizing this innovative technology, oil & gas companies have instant access to the funds they need when processing domestic & international payments based on previously agreed pricing structure, thus avoiding long waiting periods for invoices sent via postal mail that can leave companies unable to manage payroll schedules.
Published on Early 2021. Republished on Nostr 1/13/25
-
@ e6c3bcb6:e8781ff3
2025-01-13 12:57:53Book Agra to Delhi cab online at best price. CabBazar provides car rental services for all cab types AC, Non AC, Hatchback, SUV, Sedan, Innova and Tempo Traveller. Both One way drop taxi and round trip cab available at lowest price. Price starts Rs. 9/Km.
-
@ e6c3bcb6:e8781ff3
2025-01-13 12:53:52Book Indore to Ujjain cab online at best price. CabBazar provides car rental services for all cab types AC, Non AC, Hatchback, SUV, Sedan, Innova and Tempo Traveller. Both One way drop taxi and round trip cab available at lowest price. Price starts Rs. 9/Km.
-
@ e6c3bcb6:e8781ff3
2025-01-13 12:48:36Book Indore to Bhopal cab online at best price. CabBazar provides car rental services for all cab types AC, Non AC, Hatchback, SUV, Sedan, Innova and Tempo Traveller. Both One way drop taxi and round trip cab available at lowest price. Price starts Rs. 9/Km.
-
@ e6c3bcb6:e8781ff3
2025-01-13 12:33:42Book Bhopal to Indore cab online at best price. CabBazar provides car rental services for all cab types AC, Non AC, Hatchback, SUV, Sedan, Innova and Tempo Traveller. Both One way drop taxi and round trip cab available at lowest price. Price starts Rs. 9/Km.
-
@ e6c3bcb6:e8781ff3
2025-01-13 12:30:15Book Rishikesh to Delhi cab online at best price. CabBazar provides car rental services for all cab types AC, Non AC, Hatchback, SUV, Sedan, Innova and Tempo Traveller. Both One way drop taxi and round trip cab available at lowest price. Price starts Rs. 9/Km.
-
@ bbb5dda0:f09e2747
2025-01-13 12:16:00This is my first attempt of regularly reviewing my week (currently, week 2) and I want to take you along for it.
This week was one where I was rebooting after all the festivities, personal obligations and a bit of travel! First, I worked on getting back on some comments on my proposals on NIP-42 and the Transport Method Announcement NIP.
NIP-42 proposal
The responses to the proposal of the NIP-42 exstension confused me a bit, my interpretation of nip42 AUTH was both authentication and authoriziation. But as it turns out people only want authentication to be part of this NIP, which is understandable. I'm wondering what other structure should be used for authorization then. I thought this would be a great place because of the similar allow/disallow mechanism that applies to both authentication and authorization.
I get the argument that authorization would need to be handled somewhere else. In my case i want authorization by payment. meaning there is no Authentication, we don't care who it is.
I worked out this comment, to see what other options would come up. https://github.com/nostr-protocol/nips/pull/1609#issuecomment-2577243988
Evaluating current state Epoxy
It's been a little bit since I made any progress on epoxy, but this week i'm picking it back up. So i'm trying to see what my next steps on it will be. I thought first maybe i need to add the random delays, but that's in the bigger scheme of things a 'nice to have'. I should probably first work on fixing the nightmare that is unencrypted traffic. And for that, i need pubkey addressing to work properly.
Evaluating current state CI/CD
This week i met up with Auggie, who's quite knowledgable into CI/CD stuff. I think a cool short-term goal for myself is to get an automated build and publish of the epoxy docker container. That shouldn't be too hard to attain, but I needed to refresh my memory on what I last worked on for a bit.
I realized that that was a very hacky approach and i really want to know Auggie's perspective on it. I came across his comment on my blogpost about it which i'd missed earlier. My doubt is wether i should try to rebuild what CI/CD is from scratch, but nostr-native. Or should I strive to have something backwards-compatible and use existing GitHub/Gitea runners?
In our call we settled on trying to get the runner approach working and see how we go from there. I'd work out a GitHub action so we could upload artifacts to Blossom and he'd look into the inner workings of Gittea as he had worked on the stack before.
Blossom uploads GitHub action
I tried to move forward on the Blossom uploads on friday but got stuck on imports that would just not resolve on the github action (
ERR_PACKAGE_PATH_NOT_EXPORTED
). Long story short, I was just not bundling my build properly and (spoiler) worked this out on Monday.In short
Quite an alright week, ramping up my efforts now and i'm exited for what's coming. See you next week!
-
@ e6c3bcb6:e8781ff3
2025-01-13 12:25:22Book Hyderabad to Vijayawada cab online at best price. CabBazar provides car rental services for all cab types AC, Non AC, Hatchback, SUV, Sedan, Innova and Tempo Traveller. Both One way drop taxi and round trip cab available at lowest price. Price starts Rs. 9/Km.
-
@ f4c59e4c:82f66850
2025-01-13 10:44:12Introduction:
This governance report highlights Dora Factory's voting activity across multiple blockchain ecosystems, including Cosmos, Celestia, dYdX, Kaia, Osmosis, and Injective. It provides insights into the strategic considerations guiding Dora Factory’s decisions, emphasizing their role in supporting ecosystem growth, fostering innovation, and enabling sustainable blockchain development.
Proposals:
Cosmos
2024-11-22 Cosmos Proposal 980 Yes Dora Factory voted YES on Proposal 980, approving the increase of the minimum deposit for Cosmos Hub governance from 250 $ATOM to 500 $ATOM to reduce spam.
2024-11-25 Cosmos Proposal 976 Yes Dora Factory voted YES on Proposal 976 to revive channel-341 to Bostrom by replacing the expired client state, restoring the channel's functionality.
2024-12-03 Cosmos Proposal 981 Yes Dora Factory voted YES on Proposal 981, supporting the whitelisting of Ark Protocol to deploy Interchain NFT contracts on Cosmos Hub. This proposal aims to enable minting, bridging, and managing NFTs on the Hub, enhancing governance and interoperability with other chains.
2024-12-13 Cosmos Proposal 982 Yes Dora Factory voted YES on Proposal 982 to whitelist Ark Protocol’s developer wallet for deploying InterChain NFT contracts on Cosmos Hub. The contracts aim to enhance governance and interoperability by enabling NFT transfers across app chains and supporting collaboration within the ecosystem.
2025-01-09 Cosmos Proposal 984 YES Dora Factory voted YES on Cosmos Proposal 984, approving funding for Hydro’s development in 2025 and reallocating 180,000 ATOM from the community pool. It also supports transferring Hydro's PoL profits to a treasury controlled by Hydro voters and the Cosmos Hub community.
2025-01-09 Cosmos Proposal 985 YES Dora Factory voted YES on Cosmos Proposal 985, approving $650k in funding for Hypha to manage Cosmos Hub testnets and mainnet operations in 2025. The funds, consisting of $200k USDC and 86,538.46 ATOM, will support testnet stewardship, mainnet coordination, ICS support, and onboarding for Interchain Inc.
Celestia
2024-12-13 Celestia Proposal 4 Yes Dora Factory voted YES on Proposal 4 to increase the SignedBlocksWindow from 5000 to 10000. This change will extend the time available for validators to restore their nodes during emergencies from 1h45min to 3h30min, ensuring sufficient time to address downtime issues and maintaining pre-upgrade slashing parameters.
dYdX
2024-11-22 DYDX Proposal 187 Yes Dora Factory voted YES on proposal 187 to whitelist new VIP affiliates for the dYdX VIP Affiliate Program. The vote supports affiliates who will help increase engagement and growth by earning up to 50% of referred user taker fees, capped at $10,000 per referral.
2024-12-03 DYDX Proposal 189 Yes Dora Factory voted YES to cease support for the wethDYDX Smart Contract (the Bridge) by June 2025. The proposal formally notifies ethDYDX holders, with a follow-up on-chain vote scheduled for approximately six months later to finalize the discontinuation.
2024-12-18 DYDX Proposal 192 Yes Dora Factory voted YES on Proposal 192 to allocate $4M from the Treasury subDAO’s protocol revenue to fund the dYdX Ecosystem Development Program (DEP) for the remaining 14 months of its term. This funding will support ongoing initiatives and enable the DEP to continue driving growth within the dYdX ecosystem. The proposal also includes changes to the DEP Trustees, replacing two current members with Lemma Solutions and Polkachu.
2024-12-19 DYDX Proposal 193 Yes Dora Factory voted YES on Proposal 193, which allocates $1.5M in DYDX tokens from the dYdX Chain Community Treasury to 2,587 qualifying users for their participation in Trading Season 7 of the dYdX Incentives Program. The allocation follows a review of trading data to ensure rewards are given to genuine participants, with full transparency available on the dYdX Chaos Labs Risk Portal.
2025-01-07 DYDX Proposal 198 Yes Dora Factory voted YES on dYdX Proposal 198 to delist low-activity markets. The proposal targets markets with less than $1,000 in 24-hour trading volume and under $10,000 in open interest. By delisting these markets, dYdX aims to improve resource allocation, focusing on more active markets to enhance platform performance and user experience.
Injective
2024-11-21 Injective Proposal 463 Abstain Dora Factory voted Abstain on the proposal to whitelist TruFin’s uploader address for deploying its liquid staking contracts on Injective. TruFin intends to launch its TruStake solution on the Injective blockchain to integrate multi-chain liquid staking into the network.
2024-11-22 Injective Proposal 464 Yes Dora Factory voted YES on the proposal to adjust the minimum quantity tick for the AGENT/INJ market from 100 to 0.1, aiming to enhance the trading experience for markets with low prices.
2024-12-02 Injective Proposal 465 Yes Dora Factory voted YES to approve the final OLP performance for epoch 39 and the distribution of 39,958.193 INJ, including 19,958.201 INJ from epoch 36 and 19,999.992 INJ as 50% of epoch 39 rewards. Remaining rewards will be distributed with epoch 42.
2024-12-04 Injective Proposal 466 Yes Dora Factory voted YES to whitelist the Talis deployer address: inj1dqsfaj4y8pu2elakf3k6fgzcunclam86xjhn9c.
2024-12-13 Injective Proposal 469 Abstain Dora Factory abstained on Proposal 469, which proposes storing the Auction DAO smart contract on the Injective blockchain to enable permissionless collective bidding in burn auctions.
2024-12-20 Injective Proposal 470 Abstain Dora Factory abstained on Proposal 470, which requests to whitelist the Hydro Protocol developer wallet to streamline smart contract deployments without requiring individual governance proposals for each one.
2024-12-31 Injective Proposal 471 Yes Dora Factory voted YES on Injective Proposal 471, which proposes adjustments to leverage and margin requirements across multiple perpetual futures markets. The maximum leverage for BTC/USDT and ETH/USDT PERPs will increase from 20x to 50x, while EUR/USDT and GBP/USDT PERPs will rise from 50x to 100x. Other markets, including SOL/USDT, BNB/USDT, and AAVE/USDT, will see leverage increases from 20x to 25x. Additionally, some markets will have leverage standardized to 10x, and the maker fee rebate for PENGU/USDT will be reduced by half.
2025-01-01 Injective Proposal 472 Yes Dora Factory voted YES on Injective Proposal 472, supporting a reduction in the INJ token supply parameters (inflation_min and inflation_max) to 4.625% and 8.875%, aligning with the deflationary goals of INJ 3.0 tokenomics.
2025-01-01 Injective Proposal 473 Yes Dora Factory voted YES on Injective Proposal 473, confirming the final institutional performance for epoch 40 of the Open Liquidity Program and distributing 39,999.981 INJ tokens, with 50% of the epoch 40 rewards to be disbursed later.
2025-01-05 Injective Proposal 474 Yes Dora Factory voted YES on Injective Proposal 474, supporting the adjustment of fee tier thresholds and increased taker discounts for various tiers, while maintaining trading volume requirements.
2025-01-07 Injective Proposal 475 Abstain Dora Factory abstained on Injective Proposal 475, which proposes adopting AGENT as the official AI mascot to promote Injective's AI initiatives and enhance user engagement.
2025-01-08 Injective Proposal 476 Yes Dora Factory voted Yes on Injective Proposal 476, which will settle the FTM/USDT PERP market. Open positions will be closed at the oracle price when the proposal is approved.
Kaia
2024-12-20 Kaia Proposal 12 Yes Dora Factory voted YES on Kaia Proposal 12 to approve a KAIA payment worth $140,000 for the development and maintenance of ‘Kaiascan.’ The funding will support new features like enhanced statistics, a rich list, an Open API service, and a banner ad model to improve user experience and data transparency.
Osmosis
2024-11-22 Osmosis Proposal 866 Yes Dora Factory voted YES to update the expired IBC light-client for dHealth. The proposal replaces the expired client (07-tendermint-3205) with the newly created substitution client (07-tendermint-3357).
2024-11-23 Osmosis Proposal 867 Yes Dora Factory voted YES to increase nBTC's static limit within Alloyed BTC to 10%, aligning with the completed nBTC audit and supporting the Nomic bridge's adoption.
2024-11-26 Osmosis Proposal 868 Yes Dora Factory voted YES to substitute the IBC light client for Konstellation, enabling resumed cross-chain transfers between Konstellation and Osmosis.
2024-11-27 Osmosis Proposal 869 Yes Dora Factory voted YES on the proposal to allocate 70,000 USDT and up to 140,000 USDC from the Osmosis community pool to establish a liquidity position. The proposal aims to enhance stability for the USDT/USDC pairing, improve liquidity during volatility, and generate minor revenue for the community pool.
2024-11-28 Osmosis Proposal 870 Yes Dora Factory voted Yes to add cbBTC.axl to Alloyed BTC with a 10% static limit. This expands Bitcoin access on Osmosis through Base and the Axelar bridge, while managing risk with the set cap.
2024-12-03 Osmosis Proposal 871 Yes Dora Factory voted YES on Proposal 871 to increase the static rate limit for USDT.inj, USDT.sol.pica, and USDT.eth.wh within Alloyed USDT from 20% to 40%. This adjustment aims to accommodate market demand, enhance liquidity in popular variants, and manage risks associated with less-utilized variants.
2024-12-05 Osmosis Proposal 874 Yes Dora Factory voted YES on Proposal 874, which expands the list of assets allowed for pseudo-permissionless pool creation until Proposal 819 is implemented.
2024-12-06 Osmosis Proposal 875 Yes Dora Factory voted YES on Proposal 875, which substitutes the IBC light client for Konstellation to resume cross-chain transfers between Konstellation and Osmosis.
2024-12-08 Osmosis Proposal 876 Yes Dora Factory voted YES on Proposal 876, which whitelists the Magma Vaults dev wallet to deploy automatic liquidity management solution contracts to manage liquidity positions in concentrated liquidity pools.
2024-12-10 Osmosis Proposal 877 Yes Dora Factory voted YES on Proposal 877 to deploy 50,000 ATOM to the Margined Redemption Rate Arbitrage Strategy. This strategy aims to enhance ATOM liquidity, support the peg of ATOM LSTs, and generate protocol fees, while maintaining consistent returns similar to ATOM staking APR.
2024-12-10 Osmosis Proposal 878 Yes Dora Factory voted YES on Proposal 878 to deploy 19,200 TIA to the Margined Redemption Rate Arbitrage Strategy. The strategy aims to enhance TIA liquidity, support TIA LST peg stability, and generate protocol fees, delivering consistent returns comparable to TIA staking APR.
2024-12-12 Osmosis Proposal 879 Yes Dora Factory voted YES on Proposal 879 to upgrade Osmosis to v28.0.0, scheduled for December 17th. The upgrade includes fixes for security and performance.
2024-12-12 Osmosis Proposal 880 Yes Dora Factory voted YES on Proposal 880 to renew the Osmosis Grants Program (OGP) for 12 months with a budget of $1.35M in OSMO tokens. The program will focus on sourcing high-impact initiatives, releasing semi-annual reports, and continuing OGP’s success with projects that benefit Osmosis and the broader ecosystem.
2024-12-22 Osmosis Proposal 881 Yes Dora Factory voted YES on Osmosis Proposal 881, which suggests allocating 25% of the Osmosis protocol’s non-OSMO taker fees to purchase Bitcoin for liquidity provisioning. This BTC will primarily support the BTC/USDC liquidity pool, enhancing price depth and volume on Osmosis. The proposal also adjusts the taker fee distribution, shifting 45% to stakers, 30% to the community pool, and 25% to BTC purchases.
2025-01-03 Osmosis Proposal 882 Yes Dora Factory voted YES to deploy 1.07 BTC and 60,000 USDC into the Locust Vault for a more concentrated BTC/USDC liquidity position. This aims to improve liquidity, capture more volume, and reduce slippage during volatility, with any excess funds returning to the Osmosis Community Pool.
2025-01-06 Osmosis Proposal 883 Yes Dora Factory voted YES on Osmosis Proposal 883 to increase the static cap for USDT.eth.wh from 40% to 75%. This adjustment aims to accommodate growing demand.
2025-01-06 Osmosis Proposal 884 Yes Dora Factory voted YES on Osmosis Proposal 884 to increase the static cap for USDT.eth.wh from 40% to 75%. This change aligns with growing demand for the asset, allowing for a more controlled expansion of the USDT.
2025-01-08 Osmosis Proposal 885 Yes Dora Factory voted YES on Osmosis Proposal 885, which adjusts the set of Superfluid pools to support the OSMO decoupling initiative. This proposal removes Superfluid from variant pools and focuses it on alloyed assets like USDC, BTC, ETH, and SOL to promote migration and growth.
2025-01-08 Osmosis Proposal 886 Yes Dora Factory voted YES on Osmosis Proposal 886, which adjusts Superfluid pools to support the OSMO decoupling initiative. The proposal aims to encourage the migration of assets from variant to alloyed assets by approving Superfluid pairings for USDT, BTC, ETH, and SOL. This adjustment supports the OSMO token's increased independence and fosters the growth of alloyed assets.
2025-01-08 Osmosis Proposal 887 Yes Dora Factory voted YES on Osmosis Proposal 887, which proposes deploying ETH and BTC from the community pool into a Margined liquidity strategy. This will increase liquidity for the ETH/BTC pair on Osmosis, which has been limited, while generating yield for the community pool. The deployment includes 16.47 ETH and 0.47 BTC accumulated from taker fees, aimed at improving market liquidity.
2025-01-08 Osmosis Proposal 888 Yes Dora Factory voted YES on Osmosis Proposal 888, which reduces ETH liquidity incentives from 1,956 to 500 OSMO per day to better align with protocol revenue and ensure sustainability.
Conclusion:
In conclusion, Dora Factory’s voting decisions demonstrate a strong commitment to advancing blockchain ecosystems through strategic governance. Moving forward, Dora Factory remains dedicated to transparent and thoughtful participation in governance, contributing to the evolution of robust and resilient blockchain ecosystems. For further details and updates, visitDora Factory's Governance Portal.
-
@ e6c3bcb6:e8781ff3
2025-01-13 12:21:47Book Hyderabad to Bangalore cab online at best price. CabBazar provides car rental services for all cab types AC, Non AC, Hatchback, SUV, Sedan, Innova and Tempo Traveller. Both One way drop taxi and round trip cab available at lowest price. Price starts Rs. 9/Km.
-
@ a95c6243:d345522c
2025-01-13 10:09:57Ich begann, Social Media aufzubauen, \ um den Menschen eine Stimme zu geben. \ Mark Zuckerberg
Sind euch auch die Tränen gekommen, als ihr Mark Zuckerbergs Wendehals-Deklaration bezüglich der Meinungsfreiheit auf seinen Portalen gehört habt? Rührend, oder? Während er früher die offensichtliche Zensur leugnete und später die Regierung Biden dafür verantwortlich machte, will er nun angeblich «die Zensur auf unseren Plattformen drastisch reduzieren».
«Purer Opportunismus» ob des anstehenden Regierungswechsels wäre als Klassifizierung viel zu kurz gegriffen. Der jetzige Schachzug des Meta-Chefs ist genauso Teil einer kühl kalkulierten Business-Strategie, wie es die 180 Grad umgekehrte Praxis vorher war. Social Media sind ein höchst lukratives Geschäft. Hinzu kommt vielleicht noch ein bisschen verkorkstes Ego, weil derartig viel Einfluss und Geld sicher auch auf die Psyche schlagen. Verständlich.
«Es ist an der Zeit, zu unseren Wurzeln der freien Meinungsäußerung auf Facebook und Instagram zurückzukehren. Ich begann, Social Media aufzubauen, um den Menschen eine Stimme zu geben», sagte Zuckerberg.
Welche Wurzeln? Hat der Mann vergessen, dass er von der Überwachung, dem Ausspionieren und dem Ausverkauf sämtlicher Daten und digitaler Spuren sowie der Manipulation seiner «Kunden» lebt? Das ist knallharter Kommerz, nichts anderes. Um freie Meinungsäußerung geht es bei diesem Geschäft ganz sicher nicht, und das war auch noch nie so. Die Wurzeln von Facebook liegen in einem Projekt des US-Militärs mit dem Namen «LifeLog». Dessen Ziel war es, «ein digitales Protokoll vom Leben eines Menschen zu erstellen».
Der Richtungswechsel kommt allerdings nicht überraschend. Schon Anfang Dezember hatte Meta-Präsident Nick Clegg von «zu hoher Fehlerquote bei der Moderation» von Inhalten gesprochen. Bei der Gelegenheit erwähnte er auch, dass Mark sehr daran interessiert sei, eine aktive Rolle in den Debatten über eine amerikanische Führungsrolle im technologischen Bereich zu spielen.
Während Milliardärskollege und Big Tech-Konkurrent Elon Musk bereits seinen Posten in der kommenden Trump-Regierung in Aussicht hat, möchte Zuckerberg also nicht nur seine Haut retten – Trump hatte ihn einmal einen «Feind des Volkes» genannt und ihm lebenslange Haft angedroht –, sondern am liebsten auch mitspielen. KI-Berater ist wohl die gewünschte Funktion, wie man nach einem Treffen Trump-Zuckerberg hörte. An seine Verhaftung dachte vermutlich auch ein weiterer Multimilliardär mit eigener Social Media-Plattform, Pavel Durov, als er Zuckerberg jetzt kritisierte und gleichzeitig warnte.
Politik und Systemmedien drehen jedenfalls durch – was zu viel ist, ist zu viel. Etwas weniger Zensur und mehr Meinungsfreiheit würden die Freiheit der Bürger schwächen und seien potenziell vernichtend für die Menschenrechte. Zuckerberg setze mit dem neuen Kurs die Demokratie aufs Spiel, das sei eine «Einladung zum nächsten Völkermord», ernsthaft. Die Frage sei, ob sich die EU gegen Musk und Zuckerberg behaupten könne, Brüssel müsse jedenfalls hart durchgreifen.
Auch um die Faktenchecker macht man sich Sorgen. Für die deutsche Nachrichtenagentur dpa und die «Experten» von Correctiv, die (noch) Partner für Fact-Checking-Aktivitäten von Facebook sind, sei das ein «lukratives Geschäftsmodell». Aber möglicherweise werden die Inhalte ohne diese vermeintlichen Korrektoren ja sogar besser. Anders als Meta wollen jedoch Scholz, Faeser und die Tagesschau keine Fehler zugeben und zum Beispiel Correctiv-Falschaussagen einräumen.
Bei derlei dramatischen Befürchtungen wundert es nicht, dass der öffentliche Plausch auf X zwischen Elon Musk und AfD-Chefin Alice Weidel von 150 EU-Beamten überwacht wurde, falls es irgendwelche Rechtsverstöße geben sollte, die man ihnen ankreiden könnte. Auch der Deutsche Bundestag war wachsam. Gefunden haben dürften sie nichts. Das Ganze war eher eine Show, viel Wind wurde gemacht, aber letztlich gab es nichts als heiße Luft.
Das Anbiedern bei Donald Trump ist indes gerade in Mode. Die Weltgesundheitsorganisation (WHO) tut das auch, denn sie fürchtet um Spenden von über einer Milliarde Dollar. Eventuell könnte ja Elon Musk auch hier künftig aushelfen und der Organisation sowie deren größtem privaten Förderer, Bill Gates, etwas unter die Arme greifen. Nachdem Musks KI-Projekt xAI kürzlich von BlackRock & Co. sechs Milliarden eingestrichen hat, geht da vielleicht etwas.
Dieser Beitrag ist zuerst auf Transition News erschienen.
-
@ 2ce0697b:1ee3d3fc
2025-01-13 09:20:12Excerpt: A controversy over intellectual property highlights the lack of Bitcoin institutions to resolve disputes.
Key fact 1: A bitcoiner takes action against another bitcoiner based on intellectual property laws
Key fact 2: the dispute revolves around similarities in bitcoin clocks
"What is not good for the hive is not good for the bee." Marcus Aurelius
Someone who identifies as a bitcoiner, who creates successful bitcoin products aimed at providing sovereignty and privacy to the user but who indirectly calls on the State to initiate force against another bitcoiner, is that person really a bitcoiner? Or rather, despite being a bitcoiner, is their behavior in accordance with the ethos of Bitcoin, with the essential moral principles driven by the Bitcoin phenomenon?
When there is a dispute within Bitcoin's layer one about how things should be done, it is resolved through the unparalleled dispute resolution and governance mechanism based on proof of work. On the other hand, when there is a dispute in Bitcoin's layer zero, which is composed of individuals who act as nodes and collaborators of thebasilisk how should we resolve disputes?
The trigger for this article is the news that a few weeks ago the bitcoinerdjuriwas legally summoned by the bitcoinerNVK because the latter understood that the former had violated his "intellectual property rights."
The legally summoned party, djuri, is the creator of a product that according to NVK would have some characteristics that would make it somewhat similar to a product he made and whose "intellectual property" -fiat- he has registered. That is to say, NVK invoked the force of the State -fiat- with the intention that it be applied against djuri. And it did so with the intention of defending its "intellectually" registered property.
--- "Intellectual property is a valuable asset that must be protected and respected by everyone." - Bill Gates.
A registration of "intellectual property" consists of an entry in a state registry -fiat- where the person registering the "right" -fiat- petitions the State -fiat- to initiate coercion, force, violence, and threats against anyone whom the State interprets as violating that "right" -fiat-. Likewise, that registration grants the registrant the "right" -fiat- to petition the State to interpret that their "right" has been violated. And in the event that the latter shares the interpretation made by the registrant, the State can then activate its intrinsic mechanism of threats, violence, and coercion against the aforementioned violator of the "right" -fiat-.
Most of current positive law is fiat law and its mostly contradictory to natural law. The former is a fictional state invention based on the myth of authority, while the latter is rationally deduced from the principles of Nature. Natural law is the Bitcoin of law.
*
--- "Intellectual property is the foundation of innovation and progress in modern society." - Alan Greenspan, Chairman of the Federal Reserve of the United States.
Intellectual property is a completely fiat fiction. Natural law absolutely rejects the artificial legal aberration created by authoritarian legislators. The institution of private property only makes sense to protect scarce goods. Let's see an example: Alice has an apple and is hungry, but since she is busy posting on Nostr, she decided to eat it later. Thirty minutes later, she goes down to her kitchen and can't find the apple. It turns out that Bob, her roommate, ate it. Alice reproaches Bob for the action because, despite having bought the apple and having it in her possession, she lost it due to Bob's action and is still hungry. Alice understands that the interruption of the nutritional and gustatory pleasure that the apple would have provided constitutes a harm to her person. Since she was the owner of the unique and irreproducible object consisting of the totality of molecules that, when linked together, formed the apple existing in the physical space where Alice and Bob reside. Furthermore, Alice understands that once the apple is eaten by one person, it cannot be eaten by another. Therefore, Alice concludes that she has suffered a harm. And considering the objective development of the facts, she attributes that damage to Bob. The attribution of damage occurs during a discussion they have in the kitchen of their house, which unfolds as follows:
Alice: -“What the fuck Bob, you ate my fruit again. I want to beat the shit out of you. You better move your ass straight into the fruitshop right now and you bring me two apples or hell is gonna break loose”
To which Bob, seeing that Alice is a bit irritable, and feeling guilty for his previous incorrect action of having deprived Alice of her fruit, heads to the fruitshop, buys two apples with his money, and hands them to Alice with a smile and an apology.
In this way, nature was balanced, a small injustice was resolved, and Alice and Bob can continue to cooperate mutually in peace and with the aim of growing individually as well as in their community. This favorable outcome occurred due to respect for the institution of private property.
Now let's look at a second example. One that involves "intellectual" private property. Charlie is composing a song in a shared area of his co-living space. While experimenting with different sound arrangements over time, Daniel passes by and hears a particular melody that catches his attention and sticks in his memory. Subsequently, Charlie releases a song with that melody, and more or less at the same time, Daniel does the same. Therefore, we arrive at the situation where two product creators have generated content that partially shares certain elements.
Content consumers of Daniel as well as of Charlie can enjoy both compositions indistinctly. Likewise, both Daniel and Charlie can enjoy all the zaps the market sends them, all the fame their songs have created, all the ticket sales for shows that, due to taking place in the physical world, have limitations on reproducibility, all the sales of both physical and digital merchandise, all the fame their works bring them, all the sponsors that fame attracts, all the various future contracts that come their way thanks to their previous works, all the awards they deserve for their works, etc., etc., etc. In summary: each of the digitally supported content creators can enjoy all the fruits that the current and future market grants them as a reward for their contribution to humanity. While at the same time, all users of their works can enjoy the created songs indiscriminately and without limitations.
This happens because in the physical world, when someone eats an apple belonging to another person, the latter is left without eating it. Whereas in the digital world, when someone listens to a song, no one is left without listening to it. For those who want to delve deeper into the glaring contradiction of the fiat intellectual property institute, I recommend any product of the extensive work of Stephan Kinsella. Libertarian lawyer specializing in patents who has developed the topic in a rational, extensive, and sufficiently convincing manner.
--- "Intellectual property is a state monopoly that restricts freedom of expression and innovation." - Stephen Kinsella, in "Against Intellectual Property"
I clarify that I do not suggest that every bitcoiner must necessarily repudiate the fiat institution of intellectual property. We are living through a transition between two worlds, and each person is adapting to the institutions of the new reality at their own pace. Personally, I see that Bitcoin is incompatible with the fiat State and it´s fiat intellectual property racket. In the long run, one of the two will have to change, and it won't be Bitcoin. In the meantime, it is up to each bitcoiner to lean more towards open source code - as Bitcoin does - or towards closed source code, as driven by fiat-state intellectual property laws.
Call to reason
What I do propose as an urgent and essential cultural necessity within the bitcoin community is to avoid resorting to the State to solve problems among bitcoiners. An invitation of a third party that relies on armed goons and professional extortionists to fulfill its purposes is something that can be avoided. Sometimes the most important actions we can take are actually inactions. In matters of dispute resolution, in issues related to how to deal with others, we tend to err more by incorrect actions than by incorrect inactions. The neo-institutions of Bitcoin law, anarcho-capitalism, or crypto-anarchism necessary to resolve disputes without calling for the intervention of unwanted third parties are under development and are another essential element for the recovery of human freedom. Meanwhile, to not initiate force on others should be our guiding principle. With Bitcoin, we managed to remove money from the hands of the States. With Nostr, we managed to remove social networks and public information from the tyrannical and authoritarian control of the narrative. With new institutions based on natural law and rational dispute resolution, we will succeed in removing the power to dispense justice from the hands of the fiat lords.
Camilo JdL at 878.992 timechain.
If you find this content helpful, zap it to support more content of the sort and to boost the V4V model.
-
@ e6c3bcb6:e8781ff3
2025-01-13 12:17:47Book Mumbai to Pune cab online at best price. CabBazar provides car rental services for all cab types AC, Non AC, Hatchback, SUV, Sedan, Innova and Tempo Traveller. Both One way drop taxi and round trip cab available at lowest price. Price starts Rs. 9/Km.
-
@ e6c3bcb6:e8781ff3
2025-01-13 12:14:02Hire taxi in Chennai at best price. Book local and outstation cab in Chennai. Confirmed cab, Real time driver details. Price starts ₹1800
-
@ e1cde248:609c13b0
2025-01-13 08:26:32ในปี 1975 มหาวิทยาลัย Yale ได้ทำการศึกษาจากกลุ่มคนที่มีอายุตั้งแต่ 50 ปีจำนวน 660 คน ในหัวข้อ ความเห็นที่มีต่อ “การสูงวัยขึ้น(aging)”
กลุ่มที่หนึ่ง มีความเห็นและความเชื่อที่เป็นด้านบวก ทั้งในเรื่องสุขภาพ ความคิด ความคาดหวังที่ดี เมื่อแก่ตัวขึ้น
กลุ่มที่สอง มีความเห็นและความเชื่อที่เป็นด้านลบ ประมาณว่า “การออกกำลังกายไม่ได้ทำอะไรให้ดีขึ้นหรอก ยังไงก็ต้องป่วย ต้องตายอยู่ดี”
ปรากฎว่า เมื่อผ่านไป 23 ปี กลุ่มที่หนึ่งมีอายุขัยเฉลี่ยมากกว่ากลุ่มที่สอง ถึง 7.6 ปี ซึ่งเป็นตัวเลขที่แตกต่างกันมาก
การศึกษานี้ต้องการจะบอกอะไรกับเรา?
แน่นอนว่า ผลลัพธ์ทุกอย่าง เกิดขึ้นได้ จากการกระทำ เวลาที่เราวางแผนจะลงมือทำอะไร ล้วนแต่เริ่มต้นจาก การตั้งเป้าหมาย ทั้งสิ้น
แต่คำถามคือ เมื่อบรรลุเป้าหมายแล้ว ยังไงต่อ?
ข้อเสียอย่างหนึ่ง ของการตั้งเป้าหมายโดยมีรากฐานมาจากผลลัพธ์ที่ต้องการ คือ เรามีแนวโน้มที่จะ “หยุดทำ” เมื่อได้ผลลัพธ์ที่ต้องการแล้ว
ยกตัวอย่างเช่น การลดน้ำหนัก เราชอบมองเรื่องของการลดน้ำหนักเป็นเหมือน การจัดแคมเปญ โดยมีช่วงเวลาที่กำหนด และเมื่อบรรลุเป้าหมาย เราก็กลับมามีพฤติกรรมแบบเดิม ซึ่งทำให้น้ำหนักที่ลดลงไป กลับมา
James Clear ผู้เขียนหนังสือชื่อ Atomic Habits ได้กล่าวว่า แค่การวางแผน และลงมือทำ ไม่ได้นำมาซึ่งผลลัพธ์ที่ยั่งยืน
แต่สิ่งที่สำคัญกว่า ที่เราต้องทำคือ การกำหนดตัวตนของเราใหม่
เวลาที่เราต้องการลดน้ำหนัก 10 กิโล ให้เรามองลึกลงไปกว่าการวางแผนเรื่องการกิน และการออกกำลังกาย
แต่ให้ตั้งเป้าหมายว่า
“ต่อไปนี้ฉันจะเป็นคนที่ เลือกกินที่แต่ของที่มีประโยชน์ และจะออกกำลังกายสม่ำเสมอ” “ฉันไม่ใช่คนที่ชอบกินขนมและของที่มีน้ำตาลสูง” “ฉันเป็นนักกีฬาที่เข้มงวดต่อตารางฝึกซ้อม”
การกำหนดตัวตนของเราใหม่ เป็นเหมือนการปรับเปลี่ยน Mindset ถ้าเรา “โฟกัส” ลงไปที่แก่นของพฤติกรรมแล้ว “ผลลัพธ์” แบบที่เราต้องการจะมาเอง และยั่งยืนกว่า
การศึกษาของมหาวิทยาลัย Yale เป็นข้อพิสูจน์ของเรื่องนี้ได้อย่างดี เพราะกลุ่มคนที่มีความเชื่อที่เป็นด้านบวก จะให้ความสำคัญต่อการออกกำลังกายมากขึ้น หยุดกินเหล้า หยุดสูบบุหรี่ และใช้เวลาอยู่กับคนที่มีมุมมองเป็นบวกเหมือนกัน
เมื่อเราได้ติดสินใจแล้วว่า คนแบบไหนที่เราต้องการจะเป็น พฤติกรรมต่างๆในชีวิตประจำวันของเราจะค่อยๆ เปลี่ยนไป และจะยิ่งเห็นผลชัดเจนขึ้นเรื่อยๆในระยะยาว
เรา คือผลลัพธ์ของ สิ่งที่เราลงมือทำ
เรา คือผลลัพธ์ของ การตัดสินใจของเรา
-
@ e6c3bcb6:e8781ff3
2025-01-13 12:10:11Hire taxi in Chandigarh at best price. Book local and outstation cab in Chandigarh. Confirmed cab, Real time driver details. Price starts ₹1200
-
@ fbf0e434:e1be6a39
2025-01-13 08:23:40Hackathon 总结
JAMHacks 8 于滑铁卢大学举办,汇集了高中生开发者在6月7日至9日的36小时活动中创造了40个项目。Hackathon 的目标是让科技社区对高中学生更加开放,在E7大楼提供了各种面对面的研讨会和活动。这次 hackathon 在不同类别中展示了创新项目,包括最佳新手 Hack、最佳硬件 Hack 和最佳区块链 Hack,促进了技术创造力和技能发展。
著名奖项包括为一等奖得主颁发的 Instax Mini 胶片相机和迷你音箱,其他奖项则有 Arduino 套件和 Keychron 键盘等。专门的赛道如 Adobe Express 挑战激发了创造性扩展,而 MATLAB 和 TinyMCE 等工具的工作坊则促进了学习。活动表彰了在区块链领域如 Starknet 的创新,以及创意和技术卓越。Hackathon 有效地培养了新技能、想法和联系,最终在不同兴趣领域产生了多样的技术进步。
Hackathon 获奖者
Overall Top Prize Winners
- TouchUp:使用 Holo-Touch 技术和 AI 模型将普通设备转换为触摸屏,基于手势控制。它利用了 MediaPipe、OpenCV 和 Pynput。
- Signematic:提供媒体的即时手语翻译,通过机器学习和手势模型提高可访问性,使用 Beautiful Soup、Three.js 和 Node.js。
- FITRIS:将健身与游戏相结合,使用 OpenCV 将锻炼动作转化为俄罗斯方块控制,构建于 Flask 后端和 React JS 前端。
Hardware Track Prize Winner
- BioTron: 自动化植物浇水系统,利用AI和TCP/IP协议实现高效的植物维护,设计有自浇水花盆和热插拔模块。
Beginner Track Prize Winner
- gnome biome: 一个帮助管理压力的健康网站,提供AI地精建议,结合 TinyMCE 进行笔记和情绪月历跟踪。
Solo Developer Track Prize Winner
- Dreamweaver: 一个探索梦境干预的游戏,玩家通过洞察功能影响梦境事件。
Marketing Track Prize Winner
- Geese S.H.E.E.T.: 通过附在衬衫上的IP摄像头检测鹅粪,使用 Python 脚本搭载 Roboflow 和 Fusion 进行模型训练。
Game Development Track Prize Winner
- Mind-Mart: 一个通过引人入胜的游戏机制提高心理健康意识的教育游戏,展示与状况相关的场景。
Blockchain Track Prize Winner
- Doctors On Dial: 基于区块链的平台,用于安全、高效的医疗数据传输,使用 MatLabs、NEAR 和 JavaScript,包括用于癌症检测的 AI 分析。
Best Use of Near Protocol Prize Winner
- YapChain: 基于 NEAR 的去中心化社交媒体平台,设计用于安全、匿名的数据管理,提供独特的用户体验和区块链集成。
Best Warp/Dev Tool Prize Winner
- GripGuardian: 通过传感器提供手部健康分析的符合人体工学的鼠标,实时姿势反馈通过全面的网络应用提供。
Best Use of TinyMCE Prize Winner
- MemorEase: 通过记忆日记的数字可视化增强痴呆症患者的社会连接,利用 OpenAI API 和 vis.js 进行视觉图表化。
Best Use of Adobe API Prize Winner
Best Use of Starknet Prize Winner
- UNiDLoan: 是一个区块链应用,连接学生和投资者提供研究贷款,使用 Next.js、MongoDB 和 NEAR 代币进行安全交易。
Best Use of MATLAB Prize Winner
- AnyJAMS: 实时工具演奏评估的卡拉OK,使用 Flask 和 MATLAB,通过 xcorr 等高级算法提供表演反馈。
查看 JAMHacks 8 的所有创新项目,请访问官方网站。
关于组织者
JAMHacks
JAMHacks 是一个积极的组织,致力于通过动手技术项目促进高中生的创新。凭借对包容性和技能培养的承诺,JAMHacks 主办的活动有超过200名学生参与,共同协作创造性技术解决方案。通过提供研讨会和指导,组织帮助参与者专注于项目开发,强调学习、连接和创新。JAMHacks 继续培育年轻人才,为他们在未来的科技成功做准备。欲了解更多信息,请访问其网站 jamhacks.ca。
-
@ e6c3bcb6:e8781ff3
2025-01-13 11:35:43Hire taxi in Delhi at best price. Book local and outstation cab in Delhi. Confirmed cab, Real time driver details. Price starts ₹1400
-
@ fbf0e434:e1be6a39
2025-01-13 08:14:51Hackathon 总结
AI × Climate Hackathon for NYC Climate Week 集结了36位参与者,用AI驱动的解决方案解决气候问题。活动与Betaworks合作组织,作为纽约气候周的一部分,致力于在六小时内开发AI原型和商业模型。Hackathon共产生了18个项目,重点解决数据中心的能耗降低、城市可持续性的地理空间分析,以及利用LLMs进行气候教育等挑战。
参与者在活动前或活动期间组成团队,努力创造有影响力的AI驱动解决方案。评审标准优先考虑项目的可扩展性、可行性、研究的稳健性、创新性和AI的应用。评委根据项目减少温室气体排放的潜力和实践适用性对提交作品进行评估。
此次活动为AI开发者和可持续发展专家提供了一个合作平台,以设计解决重大气候挑战的解决方案。Betaworks、The Navigation Fund、Hack for Earth和Dorahacks等合作伙伴增强了活动的影响力及参与度,推动气候相关领域的创新。
Hackathon 获奖者
Overall Winner & LLMs as a Climate Educator Prize Winners
- ePUE - 一项针对数据中心的创新,引入了Enriched Power Usage Effectiveness (ePUE)。该工具结合地区能源结构和排放,使效率和可持续性影响的评估更加全面。
Slashing Energy Use in Data Centers Prize Winners
- ePUE 详细信息可在此处查看。
Geospatial Analysis for Urban Sustainability Prize Winners
- TECH-E: Co-pilot for clean energy technician - 基于AI的解决方案,加速家用电气化方面清洁能源技术人员的培训和生产力。
- UrbanScan Solutions - 利用卫星图像、热数据和AI技术帮助开发人员通过优化建筑改造以实现可持续性来减少排放,并符合Local Law 97标准。
欲了解更多详情,请访问Hackathon页面。
关于组织者
Climate Hackathon NYC
Climate Hackathon NYC专注于通过创新技术解决环境挑战。通过与开发者和行业专业人士网络的合作,组织运用区块链来推进可持续发展倡议。通过动态活动和合作项目,Climate Hackathon NYC构建了一个致力于技术驱动气候行动的社区,展示了新兴技术在解决全球环境问题上的变革潜力。这使得该组织在生态科技进步上处于领先地位。
-
@ ed84ce10:cccf4c2a
2025-01-13 08:06:16Hackathon Summary
JAMHacks 8, held at the University of Waterloo, brought together high school developers who crafted 40 projects during the 36-hour event from June 7 to June 9. The hackathon aimed to make the tech community more accessible for high school students, offering various in-person workshops and activities at the E7 building. It showcased innovative projects across categories such as Best Beginner Hack, Best Hardware Hack, and Best Blockchain Hack, promoting technical creativity and skill development.
Notable awards included Instax Mini Film Cameras and Mini Speakers for first-place winners, while others received prizes like Arduino Kits and Keychron Keyboards. Specialized tracks, such as the Adobe Express challenge, spurred creative extensions, while workshops on tools like MATLAB and TinyMCE facilitated learning. Recognizing both creative and technical excellence, the event included awards for innovations in areas like blockchain with Starknet. The hackathon effectively fostered new skills, ideas, and connections, culminating in diverse technological advances across different interests.
Hackathon Winners
Overall Top Prize Winners
- TouchUp: Converts standard devices to touch-screen using Holo-Touch technology and AI models for hand gesture control. It leverages MediaPipe, OpenCV, and Pynput.
- Signematic: Provides real-time sign language translation for media, enhancing accessibility through machine learning and gesture models, using Beautiful Soup, Three.js, and Node.js.
- FITRIS: Integrates fitness with gaming, using OpenCV to convert exercise movements into Tetris controls, built with a Flask backend and React JS frontend.
Hardware Track Prize Winner
- BioTron: An automated plant-watering system utilizing AI and TCP/IP protocols for efficient plant maintenance, designed with self-watering planters and hot-swappable modules.
Beginner Track Prize Winner
- gnome biome: A wellness site aiding stress management with AI gnome advice, incorporating TinyMCE for note-taking and emotional tracking with a mood calendar.
Solo Developer Track Prize Winner
- Dreamweaver: A game that explores dream intervention where players influence dream events using foresight functionality.
Marketing Track Prize Winner
- Geese S.H.E.E.T.: Detects geese droppings via a shirt-attached IP camera, employing Python scripts using Roboflow and Fusion for model training.
Game Development Track Prize Winner
- Mind-Mart: An educative game enhancing mental health awareness, utilizing engaging game mechanics to portray condition-related scenarios.
Blockchain Track Prize Winner
- Doctors On Dial: A blockchain-based platform for secure, efficient medical data transfer, using MatLabs, NEAR, and JavaScript, including AI analysis for cancer detection.
Best Use of Near Protocol Prize Winner
- YapChain: A decentralized social media platform on NEAR designed for secure, anonymous data management, offering unique user experiences with blockchain integration.
Best Warp/Dev Tool Prize Winner
- GripGuardian: An ergonomic mouse that provides hand health analytics through sensors, offering real-time posture feedback via a comprehensive web application.
Best Use of TinyMCE Prize Winner
- MemorEase: Enhances social connections for those with dementia through digital visualization of memory journals, utilizing the OpenAI API and vis.js for visual graphing.
Best Use of Adobe API Prize Winner
Best Use of Starknet Prize Winner
- UNiDLoan: A blockchain application connecting students with investors for research loans, using Next.js, MongoDB, and NEAR tokens for secure transactions.
Best Use of MATLAB Prize Winner
- AnyJAMS: Karaoke with real-time instrument performance evaluation using Flask and MATLAB, providing performance feedback through advanced algorithms like xcorr.
To view all the innovative projects from JAMHacks 8, visit the official page.
About the Organizer
JAMHacks
JAMHacks is a proactive organization focused on fostering innovation among high school students through hands-on technology projects. With a commitment to inclusivity and skill-building, JAMHacks hosts events where over 200 students collaborate on creative technological solutions. By offering workshops and mentorship, the organization empowers participants to concentrate on project development, emphasizing learning, connection, and innovation. JAMHacks continues to nurture young talent, preparing them for future success in technology. For more information, visit their website at jamhacks.ca.
-
@ e6c3bcb6:e8781ff3
2025-01-13 10:52:11Book Mumbai to Ahmedabad cab online at best price. CabBazar provides car rental services for all cab types AC, Non AC, Hatchback, SUV, Sedan, Innova and Tempo Traveller. Both One way drop taxi and round trip cab available at lowest price. Price starts Rs. 9/Km.
-
@ e6c3bcb6:e8781ff3
2025-01-13 10:48:29Book Ajmer to Jaipur cab online at best price. CabBazar provides car rental services for all cab types AC, Non AC, Hatchback, SUV, Sedan, Innova and Tempo Traveller. Both One way drop taxi and round trip cab available at lowest price. Price starts Rs. 9/Km.
-
@ ed84ce10:cccf4c2a
2025-01-13 08:04:12Hackathon Summary
The AI × Climate Hackathon for NYC Climate Week brought together 36 participants to tackle climate issues with AI-driven solutions. Organized in partnership with Betaworks, the event was part of NYC Climate Week and aimed at developing AI prototypes and business models over a six-hour duration. The hackathon resulted in 18 projects that focused on challenges such as reducing energy consumption in data centers, conducting geospatial analysis for urban sustainability, and utilizing LLMs for climate education.
Participants formed teams either prior to or during the event, striving to create impactful AI-driven solutions. The judging criteria prioritized the project's scalability, feasibility, robustness of research, innovation, and the application of AI. Judges assessed submissions based on their potential to reduce greenhouse gases and practical applicability.
The event provided a collaborative platform for AI developers and sustainability experts to design solutions addressing significant climate challenges. Partners such as Betaworks, The Navigation Fund, Hack for Earth, and Dorahacks enhanced the event's impact and participation, promoting innovation in climate-related fields.
Hackathon Winners
Overall Winner & LLMs as a Climate Educator Prize Winners
- ePUE - An innovation for data centers that introduces Enriched Power Usage Effectiveness (ePUE). This tool incorporates regional energy mixes and emissions, allowing for comprehensive evaluation of efficiency and sustainability impacts.
Slashing Energy Use in Data Centers Prize Winners
- ePUE Detailed information is provided here.
Geospatial Analysis for Urban Sustainability Prize Winners
- TECH-E: Co-pilot for clean energy technician - An AI-based solution to accelerate the training and productivity of clean energy technicians, specifically in home electrification.
- UrbanScan Solutions - Utilizes satellite imagery, thermal data, and AI technologies to help developers reduce emissions and meet Local Law 97 standards by optimizing building retrofits for sustainability.
For more details, explore all projects at the Hackathon page.
About the Organizer
Climate Hackathon NYC
Climate Hackathon NYC focuses on addressing environmental challenges through innovative technologies. By collaborating with a network of developers and industry professionals, the organization leverages blockchain to advance sustainability initiatives. Through dynamic events and collaborative projects, Climate Hackathon NYC builds a community dedicated to tech-driven climate action, demonstrating the transformative potential of emerging technologies in solving global environmental issues. This positions the organization at the forefront of eco-centric technological advancements.
-
@ e6c3bcb6:e8781ff3
2025-01-13 10:42:08Book Jodhpur to Bikaner cab online at best price. CabBazar provides car rental services for all cab types AC, Non AC, Hatchback, SUV, Sedan, Innova and Tempo Traveller. Both One way drop taxi and round trip cab available at lowest price. Price starts Rs. 9/Km.
-
@ e6c3bcb6:e8781ff3
2025-01-13 10:30:36Book Jodhpur to Jaisalmer cab online at best price. CabBazar provides car rental services for all cab types AC, Non AC, Hatchback, SUV, Sedan, Innova and Tempo Traveller. Both One way drop taxi and round trip cab available at lowest price. Price starts Rs. 9/Km.
-
@ da0b9bc3:4e30a4a9
2025-01-13 07:09:27Hello Stackers!
Welcome on into the ~Music Corner of the Saloon!
A place where we Talk Music. Share Tracks. Zap Sats.
So stay a while and listen.
🚨Don't forget to check out the pinned items in the territory homepage! You can always find the latest weeklies there!🚨
🚨Subscribe to the territory to ensure you never miss a post! 🚨
originally posted at https://stacker.news/items/848291
-
@ e6c3bcb6:e8781ff3
2025-01-13 10:27:35Book Jodhpur to Udaipur cab online at best price. CabBazar provides car rental services for all cab types AC, Non AC, Hatchback, SUV, Sedan, Innova and Tempo Traveller. Both One way drop taxi and round trip cab available at lowest price. Price starts Rs. 9/Km.
-
@ e6c3bcb6:e8781ff3
2025-01-13 10:24:01Book Jodhpur to Jaipur cab online at best price. CabBazar provides car rental services for all cab types AC, Non AC, Hatchback, SUV, Sedan, Innova and Tempo Traveller. Both One way drop taxi and round trip cab available at lowest price. Price starts Rs. 9/Km.
-
@ ed84ce10:cccf4c2a
2025-01-13 06:48:470. BUIDL AI
In the age of AI, where technology moves faster than our ability to comprehend its implications, DoraHacks stands at the intersection of creation and disruption. It is not just a platform; it is a movement—a global network of individuals solving fascinating problems, building the boldest ideas, and pushing the limits of what’s possible. DoraHacks is also on a trajectory to become the most significant Agentic Community Platform in the world, automating hackathons, and open-source communities across the globe.
1. Everyone will be a Hacker
Let’s start with a fundamental shift in understanding. The term “hacker” has long been burdened by the weight of misconception. Too often, it evokes images of shady figures hunched over keyboards, hacking into systems in the dead of night. But in truth, the hacker is something entirely different—and far more important.
A hacker is a builder. A creator. Someone who, when faced with a problem, doesn’t wait for permission or perfect conditions. Instead, they use ingenuity, resourcefulness, and relentless curiosity to solve it.
When DoraHacks launched in 2014, it embraced this ethos wholeheartedly. Its mission was to unite hackers worldwide to tackle humanity’s most pressing challenges. These hackers weren’t confined to coders; they included designers, entrepreneurs, scientists, and anyone driven by a desire to create meaningful change.
Fast forward to 2025, and we’re witnessing a seismic shift in how work and innovation are done. AI is automating the repetitive and mundane, from office tasks to driving, freeing humanity to focus on the creative and the essential. In this new world, everyone will be a hacker—leveraging AI to build, design, and solve problems that matter. DoraHacks, already the world’s largest hacker ecosystem with over 200,000 builders, is perfectly positioned to scale this movement a thousandfold.
2. From Hacker Movement to Freedom of BUIDL
DoraHacks has always been a platform for builders, but its vision extends far beyond hackathons and prize pools. At its core lies a principle that has the power to reshape the world: Freedom of BUIDL.
Freedom of BUIDL is more than the ability to create. It is the removal of barriers—geographical, financial, institutional—that prevent people from realizing their potential. The extraordinary success of Silicon Valley over the last century was built on precisely this freedom: a culture and infrastructure that allowed the world’s brightest minds to converge, collaborate, and innovate without limits.
However, this opportunity is not distributed equally. A young builder in rural Africa, a student in Southeast Asia, or a refugee in Europe may have the talent and drive to build transformative solutions but lack the resources or networks to do so. DoraHacks aims to democratize innovation by creating a global platform where anyone, anywhere, can participate in the Freedom of BUIDL.
Consider this: a team in Nairobi uses AI to design sustainable energy grids, collaborating with developers in Berlin and advisors in Silicon Valley—all made possible by DoraHacks. This is not the future; it’s happening now. And it’s just the beginning.
3. The Cutting Edge of the Cutting Edge
What makes DoraHacks unique is not just its scale but its relentless focus on the frontier of open-source technology. From application-specific blockchains to quantum computing software infrastructures and open-source space technology, DoraHacks has consistently championed what’s next.
In 2025, projects using decentralized governance models powered by intelligent agents will begin to emerge, transforming the way open-source communities coordinate and the way new technologies accelerate, from consumer appchains to decentralized social media, from memes to quantum software, from biohacks to open-source space tech.
In the years to come, DoraHacks has the potential be the birthplace of many of the world’s most transformative open-source platform technologies. It will be the launchpad for breakthroughs that redefine how we live, work, and connect.
4. BUIDL AI: The Intelligence Behind the Ecosystem
At the heart of this transformation lies BUIDL AI, one of DoraHacks’ most ambitious undertakings yet. As the hacker ecosystem grows, so too does the complexity of its needs. Builders require mentorship, funding, collaborators, and access to cutting-edge tools. BUIDL AI is the intelligence layer that makes this possible.
Imagine an AI that doesn’t just analyze trends but anticipates them, matching hackers with the exact resources, mentors, and collaborators they need at the right time, helping them to join the BUIDL teams that best fit their skill sets and aspirations. Imagine a system that optimizes resource allocation across tens of thousands of projects, ensuring that the most promising ideas get the support they deserve. This is not speculative; it’s the foundation DoraHacks is building today.
As these tools mature, they will enable DoraHacks to evolve into a full-fledged Agentic Community Platform—one that operates with the intelligence, speed, and adaptability required to shape the future.
5. Conclusion: Building for the Builders of Tomorrow
When the creators of Doraemon imagined a robot that could solve any problem, they were unknowingly inspiring a generation to dream bigger. Today, DoraHacks takes up that mantle, not as fiction but as a reality: a platform where the builders of the future are empowered to create the tools, technologies, and systems that will change everything.
We stand at the crossroads of a new era. AI, blockchain, and quantum computing are converging, new frontiers are opening, and the opportunities are boundless. DoraHacks will be there, championing the hackers, builders, and dreamers who dare to take humanity’s next leap forward.
In the end, the future belongs to the builders. And the world they build will be extraordinary.
-
@ e6c3bcb6:e8781ff3
2025-01-13 10:20:46Book Haldwani to Dehradun cab online at best price. CabBazar provides car rental services for all cab types AC, Non AC, Hatchback, SUV, Sedan, Innova and Tempo Traveller. Both One way drop taxi and round trip cab available at lowest price. Price starts Rs. 9/Km.
-
@ cf7ed325:050194cf
2025-01-13 10:18:34Port Said Shore Excursions: Explore the Wonders of Cairo and Giza
When docking at Port Said, a gateway to Egypt’s ancient treasures, take the opportunity to embark on exciting shore excursions that reveal the rich history and culture of Cairo. One of the most popular options is a [Day Trip to Islamic and Coptic Cairo from Port Said Shore Excursions](https://www.etbtoursegypt.com/tour/Islamic-and-Coptic-Cairo-from-Port-Said. This tour allows you to immerse yourself in the vibrant history of Cairo, from its Islamic mosques to the Coptic Christian heritage sites. Visit the Citadel of Saladin, the Hanging Church, and other landmarks that tell the story of Egypt's diverse religious history.
For those fascinated by the ancient wonders, a Day tour to the Pyramids included Lunch Cruise from Port Said port is an unforgettable experience. Explore the iconic Pyramids of Giza, marvel at the Great Sphinx, and learn about the mysteries of these ancient structures. Afterward, enjoy a relaxing lunch cruise along the Nile, offering a unique perspective of Cairo's skyline.
Another exceptional option is to Book Two day tours to Cairo from Port Said Port. This extended excursion allows you to explore Cairo at a leisurely pace, visiting more sites such as the Egyptian Museum, the famous Khan El Khalili Bazaar, and the renowned Cairo Opera House. These two days will provide a deeper understanding of Egypt’s ancient and modern heritage.
For history enthusiasts, the Day Trip in Cairo to visit Pyramids of Giza and Saqqara from Port Said Shore Excursions is a must. Saqqara, home to the Step Pyramid of Djoser, offers a glimpse into the evolution of pyramid construction. This day trip takes you beyond Giza, giving you a more comprehensive experience of Egypt’s ancient civilization.
No matter your interests, Port Said shore excursions offer a variety of ways to discover the wonders of Cairo and Giza, making your visit unforgettable.
🌐 Visit us at www.etbtoursegypt.com 📲 Contact us now! +20 10 21100873 📧 Email: info@etbtours.com 🏢 Company Address: 4 El Lebeny Axis , Nazlet Al Batran , Al Haram, Giza , Egypt
-
@ e6c3bcb6:e8781ff3
2025-01-13 10:15:39Book Rishikesh to Dehradun cab online at best price. CabBazar provides car rental services for all cab types AC, Non AC, Hatchback, SUV, Sedan, Innova and Tempo Traveller. Both One way drop taxi and round trip cab available at lowest price. Price starts Rs. 9/Km.
-
@ e6c3bcb6:e8781ff3
2025-01-13 10:12:48Book Kotdwar to Dehradun cab online at best price. CabBazar provides car rental services for all cab types AC, Non AC, Hatchback, SUV, Sedan, Innova and Tempo Traveller. Both One way drop taxi and round trip cab available at lowest price. Price starts Rs. 9/Km.